The SCEAS System
Navigation Menu

Conferences in DBLP

Knowledge-Based Intelligent Information & Engineering Systems (kes)
2005 (conf/kes/2005-2)

  1. Da Deng, Heiko Wolf
    POISE - Achieving Content-Based Picture Organisation for Image Search Engines. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:1-7 [Conf]
  2. Masoumeh D. Saberi, Sergio Carrato, Irena Koprinska, James Clark
    Estimation of the Hierarchical Structure of a Video Sequence Using MPEG-7 Descriptors and GCS. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:8-15 [Conf]
  3. Chotirat (Ann) Ratanamahatana, Eamonn J. Keogh
    Using Relevance Feedback to Learn Both the Distance Measure and the Query in Multimedia Databases. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:16-23 [Conf]
  4. Dian Tjondronegoro, Yi-Ping Phoebe Chen
    Multi-level Semantic Analysis for Sports Video. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:24-30 [Conf]
  5. Sang Kim, Sung Baik, Yung Jo, Seungbin Moon, Daewoong Rhee
    Aerial Photograph Image Retrieval Using the MPEG-7 Texture Descriptors. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:31-36 [Conf]
  6. Jiyuan An, Yi-Ping Phoebe Chen
    Yet Another Induction Algorithm. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:37-44 [Conf]
  7. An-Pin Chen, Mu-Yen Chen
    An Implementation of Learning Classifier Systems for Rule-Based Machine Learning. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:45-54 [Conf]
  8. Pedro Pablo Gómez-Martín, Marco Antonio Gómez-Martín, Pedro A. González-Calero
    Learning-by-Doing Through Metaphorical Simulation. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:55-64 [Conf]
  9. Kouji Harada
    Emergence of Immune Memory and Tolerance in an Asymmetric Idiotype Network. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:65-71 [Conf]
  10. Yuji Watanabe, Shigeyuki Sato, Yoshiteru Ishida
    Mutual Repairing System Using Immunity-Based Diagnostic Mobile Agent. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:72-78 [Conf]
  11. Yoshiteru Ishida, Toshikatsu Mori
    A Network Self-repair by Spatial Strategies in Spatial Prisoner's Dilemma. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:79-85 [Conf]
  12. Yoshiteru Ishida
    A Critical Phenomenon in a Self-repair Network by Mutual Copying. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:86-92 [Conf]
  13. Takeshi Okamoto
    A Worm Filter Based on the Number of Unacknowledged Requests. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:93-99 [Conf]
  14. Seda Postalcioglu, Kadir Erkan, Emine Dogru Bolat
    Comparison of Wavenet and Neuralnet for System Modeling. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:100-107 [Conf]
  15. Johan Iskandar, John D. Zakis
    Neurone Editor: Modelling of Neuronal Growth with Synapse Formation for Use in 3D Neurone Networks. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:108-115 [Conf]
  16. Fariba Shadabi, Robert Cox, Dharmendra Sharma, Nikolai Petrovsky
    A Hybrid Decision Tree - Artificial Neural Networks Ensemble Approach for Kidney Transplantation Outcomes Prediction. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:116-122 [Conf]
  17. S. Esugasini, Mohd. Yusoff Mashor, Nor Ashidi Mat Isa, Nor Hayati Othman
    Performance Comparison for MLP Networks Using Various Back Propagation Algorithms for Breast Cancer Diagnosis. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:123-130 [Conf]
  18. Pramod K. Singh, Paul Compton
    Combining Machine Learned and Heuristic Rules Using GRDR for Detection of Honeycombing in HRCT Lung Images. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:131-137 [Conf]
  19. Nor Ashidi Mat Isa, Shahrill Sabarudin, Umi Kalthum Ngah, Kamal Zuhairi Zamli
    Automatic Detection of Breast Tumours from Ultrasound Images Using the Modified Seed Based Region Growing Technique. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:138-144 [Conf]
  20. Tien Dung Nguyen, Sang Hyun Kim, Nam Chul Kim
    An Automatic Body ROI Determination for 3D Visualization of a Fetal Ultrasound Volume. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:145-153 [Conf]
  21. Rainer Unland, Mihaela Ulieru
    Swarm Intelligence and the Holonic Paradigm: A Promising Symbiosis for a Medical Diagnostic System. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:154-160 [Conf]
  22. Mitsuhiro Ogasawara, Hiroki Sugimori, Yukiyasu Iida, Katsumi Yoshida
    Analysis Between Lifestyle, Family Medical History and Medical Abnormalities Using Data Mining Method - Association Rule Analysis. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:161-171 [Conf]
  23. Song-yan Wang, Ming Yang, Zicai Wang
    A Moving-Mass Control System for Spinning Vehicle Based on Neural Networks and Genetic Algorithm. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:172-178 [Conf]
  24. Juan Carlos Gomez, Olac Fuentes, Ivanio Puerari
    Two-Dimensional Fitting of Brightness Profiles in Galaxy Images with a Hybrid Algorithm. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:179-185 [Conf]
  25. Yongguo Liu, Yan Liu, Libin Wang, Kefei Chen
    A Hybrid Tabu Search Based Clustering Algorithm. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:186-192 [Conf]
  26. Feng Xia, Youxian Sun
    Neural Network Based Feedback Scheduling of Multitasking Control Systems. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:193-199 [Conf]
  27. Yeon-Mo Yang, N. P. Mahalik, Sung-Cheal Byun, See-Moon Yang, Byung-Ha Ahn
    An HILS and RCP Based Inter-working Scheme for Computational Evaluation of Manipulators and Trajectory Controller. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:200-206 [Conf]
  28. Dongwon Kim, Jang-Hyun Park, Sam-Jun Seo, Gwi-Tae Park
    Modeling of Nonlinear Static System Via Neural Network Based Intelligent Technology. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:207-213 [Conf]
  29. Hyeun-Jeong Min, Sung-Bae Cho
    Bayesian Inference Driven Behavior Network Architecture for Avoiding Moving Obstacles. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:214-221 [Conf]
  30. Dong Hwa Kim, Jin Ill Park
    Loss Minimization Control of Induction Motor Using GA-PSO. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:222-227 [Conf]
  31. Xi Yong, Cungen Cao, Haitao Wang
    Context-Restricted, Role-Oriented Emotion Knowledge Acquisition and Representation. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:228-235 [Conf]
  32. Zhiwen Yu, Daqing Zhang, Xingshe Zhou, Changde Li
    User Preference Learning for Multimedia Personalization in Pervasive Computing Environment. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:236-242 [Conf]
  33. Rajiv Khosla, Chris Lai
    Emotion-Based Smart Recruitment System. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:243-250 [Conf]
  34. Seong-Joo Kim, Jong-Soo Kim, Sung-Hyun Kim, Yong-Min Kim
    Evolvable Recommendation System in the Portable Device Based on the Emotion Awareness. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:251-257 [Conf]
  35. Keiko Sato, Yasue Mitsukura, Minoru Fukumi
    Emotional Extraction System by Using the Color Combination. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:258-262 [Conf]
  36. Lina Mi, Fumiaki Takeda
    Research on Individual Recognition System with Writing Pressure Based on Customized Neuro-template with Gaussian Function. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:263-269 [Conf]
  37. Phill-Kyu Rhee, Mi Young Nam, In Ja Jeon
    Context-Aware Evolvable System Framework for Environment Identifying Systems. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:270-283 [Conf]
  38. Tae-Seon Kim, Hyun Dong Kim
    Context-Aware Computing Based Adaptable Heart Diseases Diagnosis Algorithm. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:284-290 [Conf]
  39. Woo-Kyung Choi, Seong-Joo Kim, Hong-Tae Jeon
    Multiple Sensor Fusion and Motion Control of Snake Robot Based on Soft-Computing. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:291-297 [Conf]
  40. Mi Young Nam, Phill-Kyu Rhee
    Human Face Detection Using Skin Color Context Awareness and Context-Based Bayesian Classifiers. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:298-307 [Conf]
  41. In Ja Jeon, Mi Young Nam, Phill-Kyu Rhee
    Adaptive Gabor Wavelet for Efficient Object Recognition. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:308-318 [Conf]
  42. In Ja Jeon, Phill-Kyu Rhee, Hanho Lee
    An Evolvable Hardware System Under Uneven Environment. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:319-326 [Conf]
  43. Mi Young Nam, Phill-Kyu Rhee
    An Efficient Face Location Using Integrated Feature Space. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:327-335 [Conf]
  44. Lichang Che, Bin Qiu
    Fuzzy Predictive Preferential Dropping for Active Queue Management. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:336-342 [Conf]
  45. Hsuan-Shih Lee, Pei-Di Shen, Wen-Li Chyr
    A Fuzzy Method for Measuring Efficiency Under Fuzzy Environment. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:343-349 [Conf]
  46. Feng Xia, Youxian Sun
    Anytime Iterative Optimal Control Using Fuzzy Feedback Scheduler. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:350-356 [Conf]
  47. Zhi Li, Zhongwei Zhang
    A Coupled Fuzzy Logic Control for Routers' Queue Management over TCP/AQM Networks. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:357-363 [Conf]
  48. Hyoun-Joo Go, Keun Chang Kwak, Mann-Jun Kwon, Myung-Geun Chun
    Iris Pattern Recognition Using Fuzzy LDA Method. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:364-370 [Conf]
  49. Jae-Soo Cho, Byoung-Ju Yun, Yun-Ho Ko
    Precision Tracking Based-on Fuzzy Reasoning Segmentation in Cluttered Image Sequences. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:371-377 [Conf]
  50. Yasar Becerikli, M. Mucteba Tutuncu, H. Engin Demiray
    Fuzzy Lowpass Filtering. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:378-385 [Conf]
  51. Sevinc Ilhan, Nevcihan Duru
    Fuzzy Logic Based Intelligent Tool for Databases. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:386-392 [Conf]
  52. Anne Håkansson
    Modelling from Knowledge Versus Modelling from Rules Using UML. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:393-402 [Conf]
  53. Anneli Edman
    Meeting the Need for Knowledge Management in Schools with Knowledge-Based Systems - A Case Study. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:403-409 [Conf]
  54. Narin Mayiwar
    Aspects of Consideration When Designing Educational Knowledge Based Hypermedia Systems. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:410-415 [Conf]
  55. Torsten Palm
    Semantic Tags: Evaluating the Functioning of Rules in a Knowledge Based System. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:416-421 [Conf]
  56. Lars Oestreicher
    Knowledge Management for Robot Activities in a Real World Context. A Case for Task Pattern Analysis (TAPAS). [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:422-429 [Conf]
  57. Slobodan Ribaric
    Temporal Knowledge Representation and Reasoning Model for Temporally Rich Domains. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:430-436 [Conf]
  58. Jingde Cheng
    Reciprocal Logic: Logics for Specifying, Verifying, and Reasoning About Reciprocal Relationships. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:437-445 [Conf]
  59. Kyung-Soo Jang, Jang-Sub Kim, Jae Sang Cha, Dong Ryeol Shin
    A New Paradigm Vertical Handoff Algorithm in CDMA-WLAN Integrated Networks. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:446-452 [Conf]
  60. Hak Soo Ju, Dae Youb Kim, Dong Hoon Lee, Jongin Lim, Kilsoo Chun
    Efficient Revocation of Security Capability in Certificateless Public Key Cryptography. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:453-459 [Conf]
  61. Jang Mook Kang, Jo Nam Jung, Jae Sang Cha, Chun su Lee
    A Study on Privacy-Related Considerations in Ubiquitous Computing Environment. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:460-463 [Conf]
  62. Phil-Hun Cho, Hak-Man Kim, Myong-chul Shin, Jae Sang Cha
    Optimal Operation for Cogenerating System of Micro-grid Network. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:464-469 [Conf]
  63. Joon Heo, Choong Seon Hong
    An Efficient and Secured Media Access Mechanism Using the Intelligent Coordinator in Low-Rate WPAN Environment. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:470-476 [Conf]
  64. Sang Soon Park, Juphil Cho, Heung Ki Baik
    Pilot-Symbol Aided SFBC-OFDM Channel Estimation for Intelligent Multimedia Service. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:477-482 [Conf]
  65. Kyeongmo Park, Chuleui Hong
    Cryptographic Protocol Design Concept with Genetic Algorithms. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:483-489 [Conf]
  66. Ho-Jin Shin, Jang-Sub Kim, Dong Ryeol Shin
    An Efficient Backoff Scheme for IEEE 802.11e EDCF Differential Service. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:490-499 [Conf]
  67. Radoslaw Katarzyniak
    Some Properties of Grounding Modal Conjunctions in Artificial Cognitive Agents. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:500-506 [Conf]
  68. Przemyslaw Kazienko
    Multi-agent System for Web Advertising. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:507-513 [Conf]
  69. Grzegorz Kolaczek, Agnieszka Pieczynska-Kuchtiak, Krzysztof Juszczyszyn, Adam Grzech, Radoslaw Katarzyniak, Ngoc Thanh Nguyen
    A Mobile Agent Approach to Intrusion Detection in Network Systems. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:514-519 [Conf]
  70. Maciej Kiewra, Ngoc Thanh Nguyen
    Non-textual Document Ranking Using Crawler Information and Web Usage Mining. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:520-526 [Conf]
  71. Dariusz Król
    A Propagation Strategy Implemented in Communicative Environment. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:527-533 [Conf]
  72. Mateusz Lenar, Janusz Sobecki
    Using Recommendation to Improve Negotiations in Agent-Based Systems. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:534-540 [Conf]
  73. Iwan Tabakow
    Fault Diagnosis of Discrete Event Systems Using Place Invariants. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:541-547 [Conf]
  74. Moussa Habib, Sami Sarhan, Lama Rajab
    A Robust-Fragile Dual Watermarking System in the DCT Domain. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:548-553 [Conf]
  75. Jia-Hong Lee, Jyh-Wei Chen, Mei-Yi Wu
    A Data Hiding Scheme to Reconstruct Missing Blocks for JPEG Image Transmission. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:554-559 [Conf]
  76. Yoon Ho Kim, Hag-hyun Song, Heau-Jo Kang
    Adaptive Selection of Coefficient's Portions in the Transform Domain Watermarking. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:560-566 [Conf]
  77. Yangsun Lee, Heau-Jo Kang, Yoon Ho Kim
    Copyright Authentication Enhancement of Digital Watermarking Based on Intelligent Human Visual System Scheme. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:567-572 [Conf]
  78. Zhe-Ming Lu, Henrik Skibbe, Hans Burkhardt
    Image Retrieval Based on a Multipurpose Watermarking Scheme. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:573-579 [Conf]
  79. Hao-Xian Wang, Yue-Nan Li, Zhe-Ming Lu, Sheng-He Sun
    Compressed Domain Video Watermarking in Motion Vector. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:580-586 [Conf]
  80. Shijun Xiang, Jiwu Huang, Xiaoyun Feng
    Analysis of Quantization-Based Audio Watermarking in DA/AD Conversions. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:587-592 [Conf]
  81. Ping-Sung Liao, Jeng-Shyang Pan, Yen-Hung Chen, Bin-Yih Liao
    A Lossless Watermarking Technique for Halftone Images. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:593-599 [Conf]
  82. Emine Dogru Bolat, H. Metin Ertunç
    Implementation of Current Mode Fuzzy-Tuning PI Control of Single Phase UPS Inverter Using DSP. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:600-607 [Conf]
  83. Byong-Hee Jun, Jang-Hwan Park, Myung-Geun Chun
    Knowledge-Based Fuzzy Control of Pilot-Scale SBR for Wastewater Treatment. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:608-614 [Conf]
  84. Avinash Keskar, Kishor Kadbe, Nikhil Damle, Pooja Deshpande
    Finely Tuned Cascaded Fuzzy Controllers with VHDL - A Case Study for Linerization of V-I Characteristics of a Convertor. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:615-621 [Conf]
  85. Tapan Sharma, Cees Bil, Andrew Eberhard
    Control System for Optimal Flight Trajectories for Terrain Collision Avoidance. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:622-627 [Conf]
  86. Hone-Jay Chu, Chin-Tsai Hsiao, Liang-Cheng Chang
    Optimal Remediation Design in Groundwater Systems by Intelligent Techniques. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:628-634 [Conf]
  87. E. Ertugrul Karsak
    Choquet Integral-Based Decision Making Approach for Robot Selection. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:635-641 [Conf]
  88. Shaun H. Lee, Robert J. Howlett, Simon D. Walters, Cyril Crua
    Fuzzy Logic and Neuro-fuzzy Modelling of Diesel Spray Penetration. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:642-650 [Conf]
  89. Sun-Gwan Han, Hee-Seop Han
    Integrating Architecture of Digital Library and e-Learning Based on Intelligent Agent. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:651-657 [Conf]
  90. Javier Andrade Garda, Juan Ares Casal, Rafael García Vázquez, Santiago Rodríguez Yánez, María Seoane, Sonia Suárez
    A Pedagogical Overview on e-Learning. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:658-664 [Conf]
  91. Akira Komedani, Tomoko Kojiri, Toyohide Watanabe
    Modeling Understanding Level of Learner in Collaborative Learning Using Bayesian Network. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:665-672 [Conf]
  92. Yosuke Murase, Tomoko Kojiri, Toyohide Watanabe
    Dynamic Generation of Diagrams for Supporting Solving Process of Mathematical Exercises. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:673-680 [Conf]
  93. Su-Jin Cho, Seongsoo Lee
    MOLEAS: Information Technology-Based Educational Software Framework. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:681-687 [Conf]
  94. Woochun Jun, Sung-Keun Cho
    A Web-Based Information Communication Ethics Education System for the Gifted Elementary School Students in Computer. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:688-693 [Conf]
  95. Sujan Pradhan, Hongen Lu
    Design of a Web Based Lab Administration System. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:694-700 [Conf]
  96. Maryam Purvis, Martin K. Purvis, Bastin Tony Roy Savarimuthu, Mark George, Stephen Cranefield
    Experiences with Pair and Tri Programming in a Second Level Course. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:701-707 [Conf]
  97. Kazumi Nakamatsu, Seiki Akama, Jair Minoro Abe
    An Intelligent Safety Verification Based on a Paraconsistent Logic Program. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:708-715 [Conf]
  98. Jair Minoro Abe, Neli Regina Siqueira Ortega, Maurício C. Mário, Marinho Del Santo
    Paraconsistent Artificial Neural Network: An Application in Cephalometric Analysis. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:716-723 [Conf]
  99. Jair Minoro Abe, Kazumi Nakamatsu, Seiki Akama
    Non-alethic Reasoning in Distributed Systems. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:724-731 [Conf]
  100. Sriram G. Sanjeevi, Pushpak Bhattacharyya
    A Connectionist Model for Predicate Logic Reasoning Using Coarse-Coded Distributed Representations. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:732-738 [Conf]
  101. Shinsuke Nara, Takashi Omi, Yuichi Goto, Jingde Cheng
    A General-Purpose Forward Deduction Engine for Modal Logics. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:739-745 [Conf]
  102. Grigoris Antoniou, Thomas Skylogiannis, Antonis Bikakis, Nick Bassiliades
    A Deductive Semantic Brokering System. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:746-752 [Conf]
  103. Umberto Straccia
    Uncertainty Management in Logic Programming: Simple and Effective Top-Down Query Answering. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:753-760 [Conf]
  104. Shujing Wang, Yan Zhang
    Specifying Distributed Authorization with Delegation Using Logic Programming. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:761-767 [Conf]
  105. Fabio Zambetta, Fabio Abbattista
    The Design and Implementation of SAMIR. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:768-774 [Conf]
  106. Masoud Mohammadian, Mark Kingham
    Intelligent Data Analysis, Decision Making and Modelling Adaptive Financial Systems Using Hierarchical Neural Networks. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:775-781 [Conf]
  107. Masoud Mohammadian, Ric Jentzsch
    Electricity Load Prediction Using Hierarchical Fuzzy Logic Systems. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:782-788 [Conf]
  108. Zul Waker Al-Kabir, Kim Le, Dharmendra Sharma
    MEDADVIS: A Medical Advisory System. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:789-795 [Conf]
  109. Piraveenan Mahendra rajah, Mikhail Prokopenko, Peter Wang, Don Price
    Towards Adaptive Clustering in Self-monitoring Multi-agent Networks. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:796-805 [Conf]
  110. Prasanna Lokuge, Damminda Alahakoon
    Shared Learning Vector Quantization in a New Agent Architecture for Intelligent Deliberation. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:806-813 [Conf]
  111. Ivan Jureta, Manuel Kolp, Stéphane Faulkner, T. Tung Do
    Patterns for Agent Oriented e-Bidding Practices. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:814-820 [Conf]
  112. Jeffrey Tweedale, Nikhil Ichalkaranje
    Innovations in Intelligent Agents. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:821-824 [Conf]
  113. Nikhil Ichalkaranje, Jeffrey Tweedale
    Multi-agent Systems: New Directions. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:825-830 [Conf]
  114. Jisun Park, Karen Fullam, David C. Han, K. Suzanne Barber
    Agent Technology for Coordinating UAV Target Tracking. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:831-837 [Conf]
  115. Christos Sioutis, Nikhil Ichalkaranje
    Cognitive Hybrid Reasoning Intelligent Agent System. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:838-843 [Conf]
  116. Bevan Jarvis, Dan Corbett, Lakhmi C. Jain
    Beyond Trust: A Belief-Desire-Intention Model of Confidence in an Agent's Intentions. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:844-850 [Conf]
  117. Bevan Jarvis, Dan Corbett, Lakhmi C. Jain
    Reasoning About Time in a BDI Architecture. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:851-857 [Conf]
  118. Stéphane Faulkner, Stéphane Dehousse
    A Delegation Model for Designing Collaborative Multi-agent Systems. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:858-865 [Conf]
  119. Yuxin Mao, Zhaohui Wu, Huajun Chen, Xiaoqing Zheng
    An Interactive Visual Model for Web Ontologies. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:866-872 [Conf]
  120. Huajun Chen, Zhaohui Wu, Yuxin Mao
    RDF-Based Ontology View for Relational Schema Mediation in Semantic Web. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:873-879 [Conf]
  121. Patryk Burek
    Essentialized Conceptual Structures in Ontology Modeling. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:880-886 [Conf]
  122. Jun Lai, Ben Soh
    Turning Mass Media to Your Media: Intelligent Search with Customized Results. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:887-893 [Conf]
  123. Gordan Gledec, Maja Matijasevic, Damir Juric
    Improving Search on WWW.HR Web Directory by Introducing Ontologies. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:894-900 [Conf]
  124. Diego Magro, Anna Goy
    Designing a Tool for Configuring an Intelligent and Flexible Web-Based System. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:901-907 [Conf]
  125. Jong Woo Kim, Ju-Yeon Kim, Hyun-Suk Hwang, Chang Soo Kim
    Location-Sensitive Tour Guide Services Using the Semantic Web. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:908-914 [Conf]
  126. Hongen Lu
    Semantic Discovery of Web Services. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:915-921 [Conf]
  127. Osnat Horovitz, Mohamed Medhat Gaber, Shonali Krishnaswamy
    Making Sense of Ubiquitous Data Streams - A Fuzzy Logic Approach. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:922-928 [Conf]
  128. Poh Hean Yap, Kok-Leong Ong
    sigma-SCLOPE: Clustering Categorical Streams Using Attribute Selection. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:929-935 [Conf]
  129. Jae-Hong Eom, Byoung-Tak Zhang
    Extraction of Gene/Protein Interaction from Text Documents with Relation Kernel. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:936-942 [Conf]
  130. Yi Feng, Zhaohui Wu, Zhongmei Zhou
    Combining an Order-Semisensitive Text Similarity and Closest Fit Approach to Textual Missing Values in Knowledge Discovery. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:943-949 [Conf]
  131. Yali Ge, Rafal Rzepka, Kenji Araki
    Support for Internet-Based Commonsense Processing - Causal Knowledge Discovery Using Japanese "If" Forms. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:950-956 [Conf]
  132. Yong-li Wang, Hong-bing Xu, Yisheng Dong, Xue-jun Liu, Jiang-bo Qian
    APForecast: An Adaptive Forecasting Method for Data Streams. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:957-963 [Conf]
  133. Hai Wang, Wenyuan Li, Zeng-zhi Li, Lin Fan
    Finding Closed Itemsets in Data Streams. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:964-971 [Conf]
  134. Wei Cheng, Heshui Lin, Yufang Sun
    An Efficient Schema Matching Algorithm. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:972-978 [Conf]
  135. Huang-Cheng Kuo
    A Divisive Ordering Algorithm for Mapping Categorical Data to Numeric Data. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:979-985 [Conf]
  136. Ka-man Lam, Ho-fung Leung
    A Mutual Influence Algorithm for Multiple Concurrent Negotiations - A Game Theoretical Analysis. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:986-992 [Conf]
  137. Ho-Jun Na, Deok-Hyun Yoon, Chang Soo Kim, Hyun-Suk Hwang
    Vulnerability Evaluation Tools of Matching Algorithm and Integrity Verification in Fingerprint Recognition. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:993-999 [Conf]
  138. Yulin Ding, Yan Zhang
    Algorithms for CTL System Modification. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:1000-1006 [Conf]
  139. Yu-Min Chiang, Shih-Hsin Chen, Kuo-Chang Wu
    A Robust Approach for Improving Computational Efficiency of Order-Picking Problems. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:1007-1014 [Conf]
  140. Yoshitatsu Matsuda, Kazunori Yamaguchi
    An Efficient MDS Algorithm for the Analysis of Massive Document Collections. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:1015-1021 [Conf]
  141. Young Whan Lee, Byung Mun Choi
    (SE-33)Intelligent ID-Based Threshold System by an Encryption and Decryption from Bilinear Pairing. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:1022-1028 [Conf]
  142. Il Seok Ko, Geuk Lee, Yun Ji Na
    Development of an Intelligent Information Security Evaluation Indices System for an Enterprise Organization. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:1029-1035 [Conf]
  143. Dong-Young Lee
    A Study on the Centralized Database of the Multi-agents Based Integrated Security Management System for Managing Heterogeneous Firewalls. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:1036-1042 [Conf]
  144. Jae Sang Cha, Juphil Cho
    Adaptive Modulation and Coding Scheme for Wireless Mobile Communication System. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:1043-1049 [Conf]
  145. Sungsoo Ahn, Minsoo Kim, Jungsuk Lee, Dong-Young Lee
    Performance Analysis of a Antenna Array System Using a New Beamforming Algorithm in the CDMA2000 1X Wireless Communication. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:1050-1055 [Conf]
  146. Youngsup Kim, Seung Yub Baek, Geuk Lee
    Intelligent Tool for Enterprise Vulnerability Assessment on a Distributed Network Environment Using Nessus and OVAL. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:1056-1061 [Conf]
  147. Yan Ha, Hea-Sook Park, Soon-Mi Lee, Young-Whan Park, Young-Shin Han
    Design and Implementation of SMS Security System for Wireless Environment. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:1062-1068 [Conf]
  148. Tai-Hoon Kim, Seung-youn Lee
    Intelligent Method for Building Security Countermeasures by Applying Dr. T.H. Kim's Block Model. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:1069-1075 [Conf]
  149. Ping Chen, Kagenori Nagao, Yao Zhao, Jeng-Shyang Pan
    Print and Generation Copy Image Watermarking Based on Spread Spectrum Technique. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:1076-1082 [Conf]
  150. Kotaro Sonoda, Ryouichi Nishimura, Yôiti Suzuki
    Audio CoFIP (Contents Fingerprinting) Robust Against Collusion Attack. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:1083-1089 [Conf]
  151. Mohsen Ashourian, Reza Enteshari, Ioannis Lambadaris
    A Low Cost and Efficient Sign Language Video Transmission System. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:1090-1098 [Conf]
  152. Seiichi Gohshi, Haruyuki Nakamura, Hiroshi Ito, Ryousuke Fujii, Mitsuyoshi Suzuki, Shigenori Takai, Yukari Tani
    A New Watermark Surviving After Re-shooting the Images Displayed on a Screen. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:1099-1107 [Conf]
  153. Xiaoyun Wu, Hongmei Liu, Jiwu Huang
    Semi-fragile Watermarking Based on Zernike Moments and Integer Wavelet Transform. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:1108-1114 [Conf]
  154. Feng-Hsing Wang, Kang K. Yen, Lakhmi C. Jain, Jeng-Shyang Pan
    Shadow Watermark Extraction System. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:1115-1121 [Conf]
  155. Toshio Modegi
    Development of Nearly Lossless Embedding Technology of Contactless Sensible Watermarks for Audio Signals. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:1122-1128 [Conf]
  156. Longjiang Yu, Xiamu Niu, Sheng-He Sun
    SVG-Based Countermeasure to Geometric Attack. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:1129-1133 [Conf]
  157. Xinpeng Zhang, Shuozhong Wang
    Watermarking Protocol Compatible with Secret Algorithms for Resisting Invertibility Attack. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:1134-1144 [Conf]
  158. Chaw-Seng Woo, Jiang Du, Binh Pham, Hamud Ali Abdulkadir
    System Architecture Analysis of a Hybrid Watermarking Method. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:1145-1151 [Conf]
  159. Ryouichi Nishimura, Norihiro Fujita, Yôiti Suzuki
    Audio Secret Sharing for 1-Bit Audio. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:1152-1158 [Conf]
  160. Jau-Ji Shen, Po-Wei Hsu
    Watermarking with Association Rules Alignment. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:1159-1167 [Conf]
  161. YongJie Wang, Yao Zhao, Jeng-Shyang Pan, ShaoWei Weng
    A Reversible Watermark Scheme Combined with Hash Function and Lossless Compression. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:1168-1174 [Conf]
  162. Zheng Liu
    Improved Method of Spread Spectrum Watermarking Techniques Using Pixel-Correlations. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:1175-1182 [Conf]
  163. Tsong-Yi Chen, Da-Jinn Wang, Chih-Cheng Chiu, Chien-Hua Huang
    Apply Semi-fragile Watermarking to Authentication of Compressed Video Data. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:1183-1189 [Conf]
  164. Hongli Xu, De Sun Zhijie Xu
    An Approach of Multi-level Semantics Abstraction. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:1190-1196 [Conf]
  165. Yuliang Geng, De Xu, Aimin Wu
    Effective Video Scene Detection Approach Based on Cinematic Rules. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:1197-1203 [Conf]
  166. Xu Yang, De Xu, Guan Tengfei, Aimin Wu, Congyan Lang
    3-DWT Based Motion Suppression for Video Shot Boundary Detection. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:1204-1209 [Conf]
  167. S. C. Chuang, Y. Y. Xu, Hsin-Chia Fu
    Neural Network Based Image Retrieval with Multiple Instance Leaning Techniques. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:1210-1216 [Conf]
  168. Congyan Lang, De Xu, Wengang Cheng, Yiwei Jiang
    Shot Type Classification in Sports Video Using Fuzzy Information Granular. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:1217-1223 [Conf]
  169. Chin-Chen Chang, Tzu-Chuen Lu
    Method for Searching Similar Images Using Quality Index Measurement. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:1224-1230 [Conf]
  170. Hua Yan, Ju Liu, Jiande Sun
    Edge Projection-Based Image Registration. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:1231-1237 [Conf]
  171. P. S. Lai, S. S. Cheng, S. Y. Sun, T. Y. Huang, J. M. Su, Y. Y. Xu, Y. H. Chen, S. C. Chuang, C. L. Tseng, C. L. Hsieh, Y. L. Lu, Y. C. Shen, J. R. Chen, J. B. Nie, F. P. Tsai, H. C. Huang, H. T. Pao, Hsin-Chia Fu
    Automated Information Mining on Multimedia TV News Archives. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:1238-1244 [Conf]
  172. Huey-Ming Lee, Shih-Feng Liao
    An Emergency Model of Home Network Environment Based on Genetic Algorithm. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:1245-1251 [Conf]
  173. Huey-Ming Lee, Cheng-Hsiung Yang
    A Distributed Backup Agent Based on Grid Computing Architecture. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:1252-1257 [Conf]
  174. Huey-Ming Lee, Chao-Chi Hsu, Mu-Hsiu Hsu
    A Dynamic Supervising Model Based on Grid Environment. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:1258-1264 [Conf]
  175. Huey-Ming Lee, Pin-Jen Chen, Yao-Jen Shih, Yuan-Chieh Tsai, Ching-Hao Mao
    An Intelligent Extracting Web Content Agent on the Internet. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:1265-1271 [Conf]
  176. Chihaya Watanabe, Hisao Shiizuka
    A Rendering System for Image Extraction from Music and Dance. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:1272-1282 [Conf]
  177. Junzo Watada
    Trend of Fuzzy Multivariant Analysis in Management Engineering. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:1283-1290 [Conf]
  178. Motoki Kohritani, Junzo Watada, Hideyasu Hirano, Naoyoshi Yubazaki
    Kansei Engineering for Comfortable Space Management. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:1291-1297 [Conf]
  179. Zhen Xu, Binheng Song, Liang Chen
    Fuzzy Logic Experience Model in Human Resource Management. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:1298-1304 [Conf]
  180. Hojun Shin, Haeng-Kon Kim, Boyeon Shim
    Development of Business Rule Engine and Builder for Manufacture Process Productivity. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:1305-1311 [Conf]
  181. Youngshin Han, Junghee Kim, Chilgee Lee
    Automatic Detection of Failure Patterns Using Data Mining. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:1312-1316 [Conf]
  182. Haeng-Kon Kim, Deok-Soo Han
    Logic Frameworks for Components Integration Process. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:1317-1324 [Conf]
  183. Youngshin Han, Chilgee Lee
    Automatic Classification Using Decision Tree and Support Vector Machine. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:1325-1330 [Conf]
  184. Sun-Myung Hwang, Ki-Won Song
    Opportunity Tree Framework Design for Quality and Delivery of Software Product. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:1331-1337 [Conf]
  185. M. Julia Flores, José A. Gámez
    Breeding Value Classification in Manchego Sheep: A Study of Attribute Selection and Construction. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:1338-1346 [Conf]
  186. Hiroshi Echizen-ya, Kenji Araki, Yoshio Momouchi
    Learning Method for Automatic Acquisition of Translation Knowledge. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:1347-1353 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002