The SCEAS System
Navigation Menu

Conferences in DBLP

Knowledge-Based Intelligent Information & Engineering Systems (kes)
2005 (conf/kes/2005-4)

  1. Patricia S. Crowther, Robert Cox
    A Method for Optimal Division of Data Sets for Use in Neural Networks. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:1-7 [Conf]
  2. Matej Sprogar
    Excluding Fitness Helps Improve Robustness of Evolutionary Algorithms. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:8-14 [Conf]
  3. Yee W. Lau, Dat Tran, Michael Wagner
    Testing Voice Mimicry with the YOHO Speaker Verification Corpus. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:15-21 [Conf]
  4. Xu Huang, Allan C. Madoc
    Image Multi-noise Removal via Lévy Process Analysis. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:22-28 [Conf]
  5. Alexander Ridgewell, Xu Huang, Dharmendra Sharma
    Evaluating the Size of the SOAP for Integration in B2B. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:29-34 [Conf]
  6. G. L. Ligon, Bala M. Balachandran, Dharmendra Sharma
    Personalised Search on Electronic Information. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:35-41 [Conf]
  7. Ickjai Lee
    Data Mining Coupled Conceptual Spaces for Intelligent Agents in Data-Rich Environments. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:42-48 [Conf]
  8. Tapabrata Ray, Kok Sung Won
    An Evolutionary Algorithm for Constrained Bi-objective Optimization Using Radial Slots. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:49-56 [Conf]
  9. Manuel Mejía-Lavalle, Guillermo Rodríguez-Ortiz, Gustavo Arroyo-Figueroa
    An Optimization Approach for Feature Selection in an Electric Billing Database. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:57-63 [Conf]
  10. Tanveer J. Siddiqui, Uma Shanker Tiwary
    Integrating Relation and Keyword Matching in Information Retrieval. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:64-73 [Conf]
  11. Simon D. Walters, Peter A. Howson, Robert J. Howlett
    Production Testing of Spark Plugs Using a Neural Network. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:74-80 [Conf]
  12. Chong Zhang, Zhangang Lin, Zuoquan Lin
    Variable Neighborhood Search with Permutation Distance for QAP. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:81-88 [Conf]
  13. Honghai Feng, Yin Cheng, Mingyi Liao, Bingru Yang, Yumei Chen
    Using Rough Set to Induce Comparative Knowledge and Its Use in SARS Data. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:89-93 [Conf]
  14. Tien Dung Do, Siu Cheung Hui, Alvis Cheuk M. Fong
    Mining Class Association Rules with Artificial Immune System. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:94-100 [Conf]
  15. K. Sai Krishna, P. Radha Krishna, Supriya Kumar De
    Discovering Fuzzy Association Rules with Interest and Conviction Measures. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:101-107 [Conf]
  16. Satoshi Hori, Kota Hirose, Hirokazu Taki
    Automatic Generation of Operation Manuals Through Work Motion Observation. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:108-114 [Conf]
  17. Il-Joo Shim, Kyung-Bae Chang, Gwi-Tae Park
    A Method of Controlling Household Electrical Appliance by Hand Motion in LonWorks. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:115-123 [Conf]
  18. Atsuko K. Yamazaki, J. Rudi Strickler
    Contribution of Biological Studies to the Understanding and Modeling of Skilled Performance: Some Examples. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:124-128 [Conf]
  19. Kazuhiko Sumi, Koichi Tanaka, Takashi Matsuyama
    Measurement of Human Concentration with Multiple Cameras. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:129-135 [Conf]
  20. Takeshi Yamamoto, Hirokazu Taki, Noriyuki Matsuda, Hirokazu Miura, Satoshi Hori, Noriyuki Abe
    Constructive Induction-Based Clustering Method for Ubiquitous Computing Environments. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:136-142 [Conf]
  21. Junichi Sakamoto, Hirokazu Miura, Noriyuki Matsuda, Hirokazu Taki, Noriyuki Abe, Satoshi Hori
    Indoor Location Determination Using a Topological Model. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:143-149 [Conf]
  22. Lee Middleton, Sylvia C. Wong, Michael O. Jewell, John N. Carter, Mark S. Nixon
    Lightweight Agent Framework for Camera Array Applications. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:150-156 [Conf]
  23. Li Yan, Bin Qiu
    The Location of Optimum Set-Point Using a Fuzzy Controller. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:157-163 [Conf]
  24. Preeti Bajaj, Avinash Keskar, Amol Deshmukh, S. Dorle, D. Padole
    Genetic Modeling: Solution to Channel Assignment Problem. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:164-169 [Conf]
  25. Mikhail Prokopenko, Peter Wang, Andrew Scott, Vadim Gerasimov, Nigel Hoschke, Don Price
    On Self-organising Diagnostics in Impact Sensing Networks. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:170-178 [Conf]
  26. Myung-Won Kim, Joung Woo Ryu, Eun Ju Kim
    A Coevolutionary Algorithm with Spieces as Varying Contexts. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:179-185 [Conf]
  27. Mi Young Nam, Phill-Kyu Rhee
    Hybrid Filter Fusion for Robust Visual Information Processing. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:186-194 [Conf]
  28. Young-Hyun Baek, Oh-Sung Byun, Sung-Ryong Moon, Deok-Soo Baek
    Edge Detection in Digital Image Using Variable Template Operator. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:195-200 [Conf]
  29. Billy Yapriady, Alexandra L. Uitdenbogerd
    Combining Demographic Data with Collaborative Filtering for Automatic Music Recommendation. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:201-207 [Conf]
  30. Bastin Tony Roy Savarimuthu, Maryam Purvis, Martin K. Purvis
    Different Perspectives on Modeling Workflows in an Agent Based Workflow Management System. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:208-214 [Conf]
  31. Bastin Tony Roy Savarimuthu, Maryam Purvis, Martin K. Purvis, Stephen Cranefield
    An Agent-Enhanced Workflow Management System. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:215-220 [Conf]
  32. Sean D. Cochrane, Keith Case, Robert I. Young, Jenny A. Harding, Samir Dani
    Knowledge Sharing Between Design and Manufacture. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:221-227 [Conf]
  33. Michalis Miatidis, Matthias Jarke
    Toward Improvement-Oriented Reuse of Experience in Engineering Design Processes. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:228-234 [Conf]
  34. Yang-Cheng Lin, Hsin-Hsi Lai, Chung-Hsing Yeh, Chen-Hui Hung
    A Hybrid Approach to Determining the Best Combination on Product Form Design. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:235-241 [Conf]
  35. Jenny Eriksson Lundström
    Utilizing Active Software to Capture Tacit Knowledge for Strategic Use. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:242-248 [Conf]
  36. Chin-Chen Chang, Tzu-Chuen Lu, Jun-Bin Yeh
    A Bandwidth Efficiency of Lempel-Ziv Scheme for Data Authentication. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:249-256 [Conf]
  37. Xin Liu, Zhen Han, Ke-jun Sheng, Chang-xiang Shen
    Research on Confidential Level Extended BLP Model. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:257-262 [Conf]
  38. Niladri B. Puhan, Anthony T. S. Ho
    Secure Tamper Localization in Binary Document Image Authentication. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:263-271 [Conf]
  39. Takenobu Matsuura, Kenta Yamazaki
    A Seal Imprint Verification with Rotation Invariance. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:272-280 [Conf]
  40. Eun-Jun Yoon, Kee-Young Yoo
    Robust Authenticated Encryption Scheme with Message Linkages. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:281-288 [Conf]
  41. Eiji Kawaguchi
    BPCS-Steganography - Principle and Applications. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:289-299 [Conf]
  42. Isao Echizen, Yasuhiro Fujii, Takaaki Yamada, Satoru Tezuka, Hiroshi Yoshiura
    Improved Video Watermark Detection Using Statistically-Adaptive Accumulation. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:300-308 [Conf]
  43. Hae-Yeoun Lee, Heung-Kyu Lee, Junseok Lee
    Comparison of Feature Extraction Techniques for Watermark Synchronization. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:309-316 [Conf]
  44. ShaoWei Weng, Yao Zhao, Jeng-Shyang Pan
    Reversible Watermarking Based on Improved Patchwork Algorithm and Symmetric Modulo Operation. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:317-323 [Conf]
  45. Elisa Bertino, Maria Luisa Damiani
    Spatial Knowledge-Based Applications and Technologies: Research Issues. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:324-328 [Conf]
  46. Joe Weakliam, Daniel Lynch, Julie Doyle, Helen Min Zhou, Eoin Mac Aoidh, Michela Bertolotto, David C. Wilson
    Managing Spatial Knowledge for Mobile Personalized Applications. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:329-335 [Conf]
  47. Ickjai Lee
    Geospatial Clustering in Data-Rich Environments: Features and Issues. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:336-342 [Conf]
  48. Choon-Bo Shim, Yong Won Shin
    Spatio-temporal Modeling of Moving Objects for Content- and Semantic-Based Retrieval in Video Data. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:343-351 [Conf]
  49. François Bry, Bernhard Lorenz, Stephanie Spranger
    Calendars and Topologies as Types. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:352-358 [Conf]
  50. M. Julius Hossain, Kiok Ahn, June Hyung Lee, Oksam Chae
    Moving Object Detection in Dynamic Environment. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:359-365 [Conf]
  51. Mehul Bhatt, J. Wenny Rahayu, Gerald Sterling
    A General Framework Based on Dynamic Constraints for the Enrichment of a Topological Theory of Spatial Simulation. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:366-373 [Conf]
  52. Marco Moreno, Serguei Levachkine, Miguel Torres, Rolando Quintero, Giovanni Guzmán
    Automatic Geomorphometric Analysis for Digital Elevation Models. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:374-381 [Conf]
  53. Peitsang Wu, Kung-Jiuan Yang, Yung-Yao Hung
    The Study of Electromagnetism-Like Mechanism Based Fuzzy Neural Network for Learning Fuzzy If-Then Rules. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:382-388 [Conf]
  54. Ming-Chang Lee
    Statistical Data Analysis for Software Metrics Validation. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:389-395 [Conf]
  55. Tony Cheng Kui Huang, Gwo-Jen Hwang, Judy C. R. Tseng
    A Multi-stage Fuzzy-Grey Approach to Analyzing Software Development Cost. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:396-402 [Conf]
  56. Tzung-Pei Hong, Wen-Chang Chang, Jiann-Horng Lin
    A Two-Phased Ontology Selection Approach for Semantic Web. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:403-409 [Conf]
  57. Woong-Sik Kim, Weon-Hee Yoo
    A Method for Acquiring Fingerprint by Linear Sensor. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:410-416 [Conf]
  58. Didier Nakache, Elisabeth Métais
    Evaluation and NLP. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:417-422 [Conf]
  59. Kazuo Misue, Jiro Tanaka
    A Handwriting Tool to Support Creative Activities. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:423-429 [Conf]
  60. Shigaku Iwabuchi, Buntarou Shizuki, Kazuo Misue, Jiro Tanaka
    Natural Storage in Human Body. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:430-436 [Conf]
  61. Xijin Tang, Yijun Liu, Wen Zhang
    Computerized Support for Idea Generation During Knowledge Creating Process. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:437-443 [Conf]
  62. Hitoshi Koshiba, Naotaka Kato, Susumu Kunifuji
    Awareness in Group Decision: Communication Channel and GDSS. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:444-450 [Conf]
  63. Ryozo Takatsuka, Tsutomu Fujinami
    Aware Group Home: Person-Centered Care as Creative Problem Solving. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:451-457 [Conf]
  64. Nilufar Baghaei, Antonija Mitrovic
    COLLECT-UML: Supporting Individual and Collaborative Learning of UML Class Diagrams in a Constraint-Based Intelligent Tutoring System. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:458-464 [Conf]
  65. Amali Weerasinghe, Antonija Mitrovic
    Using Affective Leaner States to Enhance Learning. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:465-471 [Conf]
  66. Mari Nakamura
    Three Foraging Models Comprised of Ants with Different Pheromone Sensitivities. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:472-479 [Conf]
  67. Sumiaki Ichikawa, Koji Hatayama, Fumio Hara
    Emerging of an Object Shape Information Caused by Signal-Transmission Relay of Multi-robots. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:480-486 [Conf]
  68. Kosuke Sekiyama, Katsuhiro Suzuki, Shigeru Fukunaga, Masaaki Date
    Autonomous Synchronization Scheme Access Control for Sensor Network. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:487-495 [Conf]
  69. T. J. Jones, Carl Allen Reidsema, A. Smith
    Supporting Design for Manufacture Through Neutral Files and Feature Recognition. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:496-502 [Conf]
  70. Mitsuaki Nakasumi
    A Programmable Pipelined Queue for Approximate String Matching. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:503-508 [Conf]
  71. Jun Luo, Sanguthevar Rajasekaran
    A Framework for Mining Association Rules. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:509-517 [Conf]
  72. Young-Joong Kim, Myo-Taeg Lim
    Near-Optimal Fuzzy Systems Using Polar Clustering: Application to Control of Vision-Based Arm-Robot. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:518-524 [Conf]
  73. Min-Wook Seo, Young-Joong Kim, Myo-Taeg Lim
    Door Traversing for a Vision-Based Mobile Robot Using PCA. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:525-531 [Conf]
  74. Yongjin Lee, Kyunghee Lee, Dosung Ahn, Sung Bum Pan, Jin Lee, Kiyoung Moon
    Local Feature Analysis with Class Information. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:532-541 [Conf]
  75. Sang Wan Lee, Dae-Jin Kim, Yong-Soo Kim, Zeungnam Bien
    Training of Feature Extractor via New Cluster Validity - Application to Adaptive Facial Expression Recognition. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:542-548 [Conf]
  76. Jang-Hyun Park, Sam-Jun Seo, Dongwon Kim, Gwi-Tae Park
    Adaptive Fuzzy Output-Feedback Controller for SISO Affine Nonlinear Systems Without State Observer. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:549-558 [Conf]
  77. Moon-sung Park, Il-sook Kim, Eun-kyung Cho, Young-hee Kwon, Jong-heung Park
    High-Speed Extraction Model of Interest Region in the Parcel Image of Large Size. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:559-565 [Conf]
  78. Dongwon Kim, Gwi-Tae Park
    Using Interval Singleton Type 2 Fuzzy Logic System in Corrupted Time Series Modelling. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:566-572 [Conf]
  79. Fabio Boschetti, Mikhail Prokopenko, Ian Macreadie, Anne-Marie Grisogono
    Defining and Detecting Emergence in Complex Networks. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:573-580 [Conf]
  80. Andrew Jennings, Daud Channa
    Annealing Sensor Networks. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:581-586 [Conf]
  81. George Mathews, Hugh F. Durrant-Whyte, Mikhail Prokopenko
    Measuring Global Behaviour of Multi-agent Systems from Pair-Wise Mutual Information. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:587-594 [Conf]
  82. Ashutosh Saxena, Gaurav Gupta, Vadim Gerasimov, Sébastien Ourselin
    In Use Parameter Estimation of Inertial Sensors by Detecting Multilevel Quasi-static States. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:595-601 [Conf]
  83. Masanori Ohshiro, Kenneth J. Mackin, Eiji Nunohiro, Kazuko Yamasaki
    Self-restructuring Peer-to-Peer Network for e-Learning. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:602-605 [Conf]
  84. El-Sayed Atlam, Elmarhomy Ghada, Masao Fuketa, Kazuhiro Morita, Jun-Ichi Aoe
    An Improvement Approach for Word Tendency Using Decision Tree. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:606-611 [Conf]
  85. Masao Fuketa, El-Sayed Atlam, Hiro Hanafusa, Kazuhiro Morita, Shinkaku Kashiji, Rokaya Mahmoud, Jun-Ichi Aoe
    A New Technique of Determining Speaker's Intention for Sentences in Conversation. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:612-618 [Conf]
  86. Kazuhiro Morita, El-Sayed Atlam, Masao Fuketa, Elmarhomy Ghada, Masaki Oono, Toru Sumitomo, Jun-Ichi Aoe
    New Approach for Speeding-up Technique of the Retrieval Using Dynamic Full-Text Search Algorithm. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:619-625 [Conf]
  87. Grégoire Danoy, Pascal Bouvry, Olivier Boissier
    Dafo, a Multi-agent Framework for Decomposable Functions Optimization. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:626-632 [Conf]
  88. Benoît Calvez, Guillaume Hutzler
    Parameter Space Exploration of Agent-Based Models. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:633-639 [Conf]
  89. Nadia Nedjah, Luiza de Macedo Mourelle
    Efficient Pre-processing for Large Window-Based Modular Exponentiation Using Ant Colony. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:640-646 [Conf]
  90. Moez Hammami, Khaled Ghédira
    COSATS, X-COSATS: Two Multi-agent Systems Cooperating Simulated Annealing, Tabu Search and X-Over Operator for the K-Graph Partitioning Problem. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:647-653 [Conf]
  91. Alberto Cuesta-Cañada, Leonardo Garrido, Hugo Terashima-Marín
    Building Hyper-heuristics Through Ant Colony Optimization for the 2D Bin Packing Problem. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:654-660 [Conf]
  92. Jens J. Balvig, Taizo Miyachi
    Real-Time Co-composing System Using Multi-aspects. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:661-667 [Conf]
  93. Hiroyuki Hasegawa, Mineichi Kudo, Atsuyoshi Nakamura
    Empirical Study on Usefulness of Algorithm SACwRApper for Reputation Extraction from the WWW. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:668-674 [Conf]
  94. Tetsuya Murai, Yasuo Kudo
    New Logical Classes of Plausibility Functions in Dempster-Shafer Theory of Evidence. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:675-681 [Conf]
  95. Taisuke Hosokawa, Mineichi Kudo
    Person Tracking with Infrared Sensors. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:682-688 [Conf]
  96. Naoto Abe, Mineichi Kudo
    Entropy Criterion for Classifier-Independent Feature Selection. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:689-695 [Conf]
  97. Hiroshi Tenmoto, Mineichi Kudo
    Finding and Auto-labeling of Task Groups on E-Mails and Documents. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:696-702 [Conf]
  98. Masafumi Yamada, Jun Toyama, Mineichi Kudo
    Person Recognition by Pressure Sensors. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:703-708 [Conf]
  99. Hirokazu Watabe, Tsukasa Kawaoka
    Extraction and Revision of Signboard Images for Recognition of Character Strings. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:709-715 [Conf]
  100. Yusuke Tanahashi, Kazumi Saito, Ryohei Nakano
    Model Selection and Weight Sharing of Multi-layer Perceptrons. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:716-722 [Conf]
  101. Masahiro Kimura, Kazumi Saito, Kazuhiro Kazama, Shin-ya Sato
    Detecting Search Engine Spam from a Trackback Network in Blogspace. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:723-729 [Conf]
  102. Daisuke Kitakoshi, Hiroyuki Shioya, Ryohei Nakano
    Analysis for Adaptability of Policy-Improving System with a Mixture Model of Bayesian Networks to Dynamic Environments. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:730-737 [Conf]
  103. Yoshihiko Itoh, Kenta Taki, Susumu Iwata, Shohei Kato, Hidenori Itoh
    Parallel Stochastic Optimization for Humanoid Locomotion Based on Neural Rhythm Generator. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:738-744 [Conf]
  104. Ken-ichi Fukui, Kazumi Saito, Masahiro Kimura, Masayuki Numao
    Visualizing Dynamics of the Hot Topics Using Sequence-Based Self-organizing Maps. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:745-751 [Conf]
  105. Rajiv Khosla, Clare D'Souza, Mehdi Taghian
    Intelligent Consumer Purchase Intention Prediction System for Green Products. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:752-757 [Conf]
  106. Yoshikatsu Fujita, Jun Yoshida, Kazuhiko Tsuda
    Reverse-Query Mechanism for Contents Delivery Management in Distributed Agent Network. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:758-764 [Conf]
  107. Masayuki Kessoku, Masakazu Takahashi, Kazuhiko Tsuda
    A My Page Service Realizing Method by Using Market Expectation Engine. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:765-771 [Conf]
  108. Shinako Matsuyama, Masaaki Kunigami, Takao Terano
    Multi-agent Modeling of Peer to Peer Communication with Scale-Free and Small-World Properties. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:772-778 [Conf]
  109. Kenji Nakano, Takao Terano
    A Case-Oriented Game for Business Learning. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:779-784 [Conf]
  110. Satoru Takahashi, Masakazu Takahashi, Hiroshi Takahashi, Kazuhiko Tsuda
    Learning Value-Added Information of Asset Management from Analyst Reports Through Text Mining. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:785-791 [Conf]
  111. Toshikazu Shimodaira, Hua Xu, Takao Terano
    HHM-Based Risk Management for Business Gaming. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:792-798 [Conf]
  112. Masakazu Takahashi, Kazutoshi Hanzawa, Takashi Kawasaki
    An Efficient Method for Creating Requirement Specification of Plant Control Software Using Domain Model. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:799-805 [Conf]
  113. Wenjun Wang, Wei Guo, Yingwei Luo, Xiaolin Wang, Zhuoqun Xu
    The Study and Application of Crime Emergency Ontology Event Model. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:806-812 [Conf]
  114. Giles Oatley, John Zeleznikow, Richard Leary, Brian Ewart
    From Links to Meaning: A Burglary Data Case Study. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:813-822 [Conf]
  115. John Zeleznikow, Giles Oatley, Richard Leary
    A Methodology for Constructing Decision Support Systems for Crime Detection. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:823-829 [Conf]
  116. Kumiko Matsunaga, Hajime Sawamura
    AASLMA: An Automated Argument System Based on Logic of Multiple-Valued Argumentation. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:830-838 [Conf]
  117. Yumiko Nara
    Trust and Information-Taking Behavior in the Web Community. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:839-847 [Conf]
  118. Dong Hwa Kim
    Robust Intelligent Tuning of PID Controller for Multivarlable System Using Clonal Selection and Fuzzy Logic. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:848-853 [Conf]
  119. Dong Hwa Kim, Jae Hoon Cho
    Intelligent Control of AVR System Using GA-BF. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:854-859 [Conf]
  120. Dae Jong Lee, Jang-Hwan Park, Dong Hwa Kim, Myung-Geun Chun
    Fault Diagnosis of Induction Motor Using Linear Discriminant Analysis. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:860-865 [Conf]
  121. Mansoor Raza, Iqbal Gondal, David G. Green, Ross L. Coppel
    Classifier Fusion to Predict Breast Cancer Tumors Based on Microarray Gene Expression Data. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:866-874 [Conf]
  122. Hongtao Yin, Ping Fu, Shengwei Meng
    An Efficient Face Detection Method in Color Images. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:875-880 [Conf]
  123. Wang Liu, Sheng-He Sun
    A Robust and Invisible Watermarking of 3D Triangle Meshes. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:881-888 [Conf]
  124. Wen-Hsiao Peng, Chia-Yang Tsai, Tihao Chiang, Hsueh-Ming Hang
    Advances of MPEG Scalable Video Coding Standard. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:889-895 [Conf]
  125. Yanhui Li, Baowen Xu, Jianjiang Lu, Dazhou Kang, Peng Wang
    Extended Fuzzy Description Logic ALCN. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:896-902 [Conf]
  126. Fredrik G. Hilding, Koren Ward
    Automated Operator Selection on Genetic Algorithms. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:903-909 [Conf]
  127. Pascal Bouvry, Gilbert Klein, Franciszek Seredynski
    Weak Key Analysis and Micro-controller Implementation of CA Stream Ciphers. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:910-915 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002