Conferences in DBLP
Li Li , Baolin Wu , Yun Yang Agent-Based Approach for Dynamic Ontology Management. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:1-7 [Conf ] Nora Houari , Behrouz Homayoun Far A Novel Approach for Developing Autonomous and Collaborative Agents. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:8-15 [Conf ] Dragan Jevtic , Marijan Kunstic , Denis Ouzecki The Effect of Alteration in Service Environments with Distributed Intelligent Agents. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:16-22 [Conf ] John K. Debenham , Simeon J. Simoff Managing Collaboration in a Multiagent System. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:23-29 [Conf ] Budhitama Subagdja , Liz Sonenberg Learning Plans with Patterns of Actions in Bounded-Rational Agents. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:30-36 [Conf ] Ali Ben Ammar , Abdelaziz Abdellatif , Henda Hajjami Ben Ghézala Roles of Agents in Data-Intensive Web Sites. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:37-45 [Conf ] Catherine Howard , Markus Stumptner Probabilistic Reasoning Techniques for the Tactical Military Domain. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:46-53 [Conf ] Jahwan Koo , Seong-Jin Ahn A Network Service Access Control Framework Based on Network Blocking Algorithm. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:54-61 [Conf ] Hong-Gyoo Sohn , Choung-Hwan Park , Joon Heo 3-D Building Reconstruction Using IKONOS Multispectral Stereo Images. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:62-68 [Conf ] Hyung Jin Kim , Bongsoo Son , Soobeom Lee , Sei-Chang Oh Heuristic Algorithm for Estimating Travel Speed in Traffic Signalized Networks. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:69-73 [Conf ] Kyung-Sang Sung , Dong Chun Lee , Hyun-Chul Kim , Hae-Seok Oh Home Network Observation System Using User's Activate Pattern and Multimedia Streaming. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:74-80 [Conf ] Jaimu Won , Sooil Lee , Soobeom Lee Determination of Optimal Locations for the Variable Message Signs by the Genetic Algorithm. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:81-86 [Conf ] Hyunsoo Kim , Seong W. Kim , Soobeom Lee , Bongsoo Son Estimation of the Optimal Number of Cluster-Heads in Sensor Network. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:87-94 [Conf ] Jeonghyun Kim , Seungpil Kang Development of Integrated Transit-Fare Card System in the Seoul Metropolitan Area. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:95-100 [Conf ] Dong Chun Lee Efficient Migration Scheme Using Backward Recovery Algorithm for Mobile Agents in WLAN. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:101-106 [Conf ] Ben Niu , Simon C. K. Shiu Using Similarity Measure to Enhance the Robustness of Web Access Prediction Model. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:107-111 [Conf ] James N. K. Liu , Honghua Dai , Lina Zhou Intelligent Financial News Digest System. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:112-120 [Conf ] Xiaoshu Hang , James N. K. Liu , Yu Ren , Honghua Dai An Incremental FP-Growth Web Content Mining and Its Application in Preference Identification. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:121-127 [Conf ] Bo Feng , James N. K. Liu Similarity Retrieval from Time-Series Tropical Cyclone Observations Using a Neural Weighting Generator for Forecasting Modeling. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:128-134 [Conf ] Simon C. K. Shiu , Cody K. P. Wong Web Access Path Prediction Using Fuzzy Case Based Reasoning. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:135-140 [Conf ] Aki P. F. Chan , Wing W. Y. Ng , Daniel S. Yeung , Eric C. C. Tsang Multiple Classifier System with Feature Grouping for Intrusion Detection: Mutual Information Approach. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:141-148 [Conf ] James N. K. Liu , Weidong Luo , Edmond M. C. Chan Design and Implement a Web News Retrieval System. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:149-156 [Conf ] Chull Hwan Song , Young Hyun Koo , Seong Joon Yoo , ByeongHo Choi An Ontology for Integrating Multimedia Databases. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:157-162 [Conf ] Kyong-Ha Lee , Kyu-Chul Lee , Dae-Wook Lee , Suk Ho Lee Integrating Service Registries with OWL-S Ontologies. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:163-169 [Conf ] Jungkee Kim , Geoffrey Fox , Seong Joon Yoo Data Integration Hub for a Hybrid Paper Search. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:170-176 [Conf ] Keonsoo Lee , Wonil Kim , Minkoo Kim Effective Information Sharing Using Concept Mapping. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:177-183 [Conf ] Jorge Posada , Carlos Toro , Stefan Wundrak , André Stork Ontology Supported Semantic Simplification of Large Data Sets of Industrial Plant CAD Models for Design Review Visualization. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:184-190 [Conf ] Rami Rifaieh , Aïcha-Nabila Benharkat EISCO: Enterprise Information System Contextual Ontologies Project. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:191-198 [Conf ] Baowen Xu , Dazhou Kang , Jianjiang Lu , Yanhui Li , Jixiang Jiang Mapping Fuzzy Concepts Between Fuzzy Ontologies. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:199-205 [Conf ] Soo-Mi Choi , Yong-Guk Kim Similarity Estimation of 3D Shapes Using Modal Strain Energy. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:206-212 [Conf ] Sang-Hoon Kim , Tae-eun Kim , Malrey Lee , Jong-Soo Choi 3D-Based Synthesis and 3D Reconstruction from Uncalibrated Images. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:213-218 [Conf ] Sang-Jun Kim , Yong-Guk Kim , Jeong-Eom Lee , Min-Soo Jang , Seok-Joo Lee , Gwi-Tae Park 3-D Pose Tracking of the Car Occupant. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:219-224 [Conf ] Reza Ebrahimpour , Saeed Reza Ehteram , Ehsanollah Kabir Face Recognition by Multiple Classifiers, a Divide-and-Conquer Approach. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:225-232 [Conf ] Jeong-Sik Kim , Yong-Guk Kim , Soo-Mi Choi , Myoung-Hee Kim Shape Comparison of the Hippocampus Using a Multiresolution Representation and ICP Normalization. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:233-239 [Conf ] Jungwon Cho , Seungdo Jeong , Byung-Uk Choi A Fast Image Retrieval Using the Unification Search Method of Binary Classification and Dimensionality Condensation of Feature Vectors. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:240-247 [Conf ] Miguel Torres , Giovanni Guzmán , Rolando Quintero , Marco Moreno , Serguei Levachkine Semantic Supervised Clustering to Land Classification in Geo-Images. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:248-254 [Conf ] In-Cheol Kim Towards an Intelligent Web Service for Ontology-Based Query-Answering Dialogues. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:255-260 [Conf ] Leszek Borzemski , Ziemowit Nowak Using the Geographic Distance for Selecting the Nearest Agent in Intermediary-Based Access to Internet Resources. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:261-267 [Conf ] Leszek Borzemski Mining Internet Data Sets for Computational Grids. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:268-274 [Conf ] In-Cheol Kim , Hoon Jin Towards Integration of Web Services into Agents for Biological Information Resources. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:275-281 [Conf ] Toan Phung , Michael Winikoff , Lin Padgham Learning Within the BDI Framework: An Empirical Analysis. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:282-288 [Conf ] Yoshiyasu Ogasawara , Masashi Okamoto , Yukiko I. Nakano , Yong Xu , Toyoaki Nishida How to Make Robot a Robust and Interactive Communicator. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:289-295 [Conf ] Ken Saito , Hidekazu Kubota , Yasuyuki Sumi , Toyoaki Nishida Analysis of Conversation Quanta for Conversational Knowledge Circulation. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:296-302 [Conf ] Dae Sun Kim , Choong Seon Hong , Yu Xiang An Intelligent Approach of Packet Marking at Edge Router for IP Traceback. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:303-309 [Conf ] Sukhoon Kang , Yong-Rak Choi A Covert Timing Channel-Free Optimistic Concurrency Control Scheme for Multilevel Secure Database Management Systems. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:310-316 [Conf ] YeongGeun Choe , Soon-Ja Kim Secure Password Authentication for Keystroke Dynamics. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:317-324 [Conf ] Sung-Hyun Yun , Hyung-Woo Lee The Efficient Multipurpose Convertible Undeniable Signature Scheme. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:325-331 [Conf ] Eun-Jun Yoon , Kee-Young Yoo A New Efficient Fingerprint-Based Remote User Authentication Scheme for Multimedia Systems. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:332-338 [Conf ] Yang Weon Lee , Heau-Jo Kang A Study on the Correction of Gun Fire Error Using Neural Network. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:339-345 [Conf ] Da-Jinn Wang , Thou-Ho Chen , Yung-Chuen Chiou , Hung-Shiuan Liau An Efficient Moving Object Extraction Algorithm for Video Surveillance. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:346-352 [Conf ] Yu-Long Qiao , Jeng-Shyang Pan , Sheng-He Sun An Experimental Comparison on Gabor Wavelet and Wavelet Frame Based Features for Image Retrieval. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:353-358 [Conf ] Duan-Yu Chen , Hong-Yuan Mark Liao , Suh-Yin Lee Robust Video Retrieval Using Temporal MVMB Moments. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:359-365 [Conf ] Tsair-Fwu Lee , Ming-Yuan Cho , Chin-Shiuh Shieh , Pei-Ju Chao , Huai-Yang Chang Precise Segmentation Rendering for Medical Images Based on Maximum Entropy Processing. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:366-373 [Conf ] Yongwha Chung , Kichul Kim , Min Kim , Sung Bum Pan , Neungsoo Park A Hardware Implementation for Fingerprint Retrieval. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:374-380 [Conf ] Jing-Fung Chen , Hong-Yuan Mark Liao , Chia-Wen Lin Fast Video Retrieval via the Statistics of Motion Within the Regions-of-Interest. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:381-387 [Conf ] Wengang Cheng , De Xu , Yiwei Jiang , Congyan Lang Information Theoretic Metrics in Shot Boundary Detection. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:388-394 [Conf ] Ross Brown , Binh Pham , Olivier Y. de Vel Design of a Digital Forensics Image Mining System. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:395-404 [Conf ] Zhen Sun , Yue-Nan Li , Zhe-Ming Lu Side-Match Predictive Vector Quantization. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:405-410 [Conf ] Hsiang-Cheh Huang , Kang K. Yen , Yu-Hsiu Huang , Jeng-Shyang Pan , Kuang-Chih Huang Improved Image Coding with Classified VQ and Side-Match VQ. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:411-417 [Conf ] Tien-Ying Kuo , Huang-Bin Chen Fast Multiple Reference Frame Motion Estimation for H.264 Based on Qualified Frame Selection Scheme. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:418-424 [Conf ] Feng Pan , H. Men , Thinh M. Le Block Standstill and Homogeneity Based Fast Motion Estimation Algorithm for H.264 Video Coding. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:425-432 [Conf ] Feng Pan , Kenny Choo , Thinh M. Le Fast Rate-Distortion Optimization in H.264/AVC Video Coding. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:433-441 [Conf ] Chin-Chen Chang , Yung-Chen Chou , Jau-Ji Shen Improving Image Quality for JPEG Compression. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:442-448 [Conf ] Gyu-Sung Yeon , Chi-Hun Jun , Tae-Jin Hwang , Seongsoo Lee , Jae-Kyung Wee Low-Power MPEG-4 Motion Estimator Design for Deep Sub-Micron Multimedia SoC. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:449-455 [Conf ] Tong-Yee Lee , Shaur-Uei Yan , Yong-Nien Chen , Ming-Te Chi Real-Time 3D Artistic Rendering System. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:456-462 [Conf ] Wei-Soul Li , Wen-Shyong Hsieh , Ming-Hong Sun Index LOCO-I: A Hybrid Method of Data Hiding and Image Compression. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:463-468 [Conf ] Tong-Yee Lee , Shaur-Uei Yan Feature-Constrained Texturing System for 3D Models. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:469-475 [Conf ] Ya-Rong Hou , Zhang Xiong Dynamic Integrated Model for Distributed Multimedia System. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:476-482 [Conf ] Zhonghui Mei , Lenan Wu , Shiyuan Zhang Joint Detection for a Bandwidth Efficient Modulation Method. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:483-487 [Conf ] Yong Zhao , Zhen Han , Jiqiang Liu , Zhigang Li An Efficient and Divisible Payment Scheme for M-Commerce. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:488-496 [Conf ] Bin Yan , Zhe-Ming Lu , Sheng-He Sun , Jeng-Shyang Pan Speech Authentication by Semi-fragile Watermarking. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:497-504 [Conf ] E. V. Krishnamurthy , V. Kris Murthy On Engineering Smart Systems. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:505-512 [Conf ] Ayahiko Niimi , Hitomi Noji , Osamu Konishi Distributed Web Integration with Multiagent Data Mining. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:513-519 [Conf ] Eiji Nunohiro , Kenneth J. Mackin , Masanori Ohshiro , Kazuko Yamasaki Self-adjusting Programming Training Support System Using Genetic Algorithm. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:520-525 [Conf ] Daisuke Yamaguchi , Kenneth J. Mackin , Eiichiro Tazaki Waste Incinerator Emission Prediction Using Probabilistically Optimal Ensemble of Multi-agents. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:526-532 [Conf ] Atsushi Yoshida , Katsuji Aoki , Shoichi Araki Cooperative Control Based on Reaction-Diffusion Equation for Surveillance System. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:533-539 [Conf ] D. T. Nanduri , Vic Ciesielski Comparison of the Effectiveness of Decimation and Automatically Defined Functions. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:540-546 [Conf ] Hiromi Miyajima , Noritaka Shigei Absolute Capacities for Higher Order Associative Memory of Sequential Patterns. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:547-553 [Conf ] Geoff Poulton , Ying Guo , Wen Lu Finding Hidden Hierarchy in Reinforcement Learning. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:554-561 [Conf ] Peter Vamplew , Robert Ollington On-Line Reinforcement Learning Using Cascade Constructive Neural Networks. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:562-568 [Conf ] Tsutomu Miyoshi Node Exchange for Improvement of SOM Learning. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:569-574 [Conf ] Honghai Feng , Baoyan Liu , Yin Cheng , Ping Li , Bingru Yang , Yumei Chen Using Rough Set to Reduce SVM Classifier Complexity and Its Use in SARS Data Set. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:575-580 [Conf ] Honghai Feng , Chen Guoshun , Yin Cheng , Bingru Yang , Yumei Chen A SVM Regression Based Approach to Filling in Missing Values. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:581-587 [Conf ] Marcus Liwicki , Lars Knipping Recognizing and Simulating Sketched Logic Circuits. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:588-594 [Conf ] Andrew Skabar Automatic MLP Weight Regularization on Mineralization Prediction Tasks. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:595-601 [Conf ] Je Yeon Oh , Jae-Yoon Jung , Nam Wook Cho , Hoontae Kim , Suk-Ho Kang Integrated Process Modeling for Dynamic B2B Collaboration. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:602-608 [Conf ] Choon Seong Leem , Sangkyun Kim , Hong Joo Lee Assessment Methodology on Maturity Level of ISMS. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:609-615 [Conf ] Hong Joo Lee , Sangkyun Kim , Choon Seong Leem CSFs for HCI in Ubiquitous Computing Environments. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:616-620 [Conf ] Minhyung Kim , Sangkyun Kim , Myungwhan Choi Practical Design Recovery Techniques for Embedded Operating System on Complying with RTCA/DO-178B and ISO/IEC15408. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:621-627 [Conf ] Tae Joong Kim , In-Ho Kim , Sang Won Lee Information Privacy Engineering in ubiComp. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:628-634 [Conf ] Chang-ho Hong , Jong-Tae Lim , Chang Sohn , Ha-eun Nam Design and Implementation of Home Media Server for Personalized Broadcasting Service in Ubiquitous Environment. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:635-641 [Conf ] Michael O. Jewell , Lee Middleton , Mark S. Nixon , Adam Prügel-Bennett , Sylvia C. Wong A Distributed Approach to Musical Composition. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:642-648 [Conf ] Il-Sun Hwang , Gi Sung Yoo , Jin-Wook Chung Efficient Mobility Management Using Dynamic Location Register in IMT-2000 Networks. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:649-654 [Conf ] Darije Ramljak , Maja Matijasevic SWSD: A P2P-Based System for Service Discovery from a Mobile Terminal. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:655-661 [Conf ] Jo Nam Jung , Mi Young Nam , Phill-Kyu Rhee An Efficient Eye Location Using Context-Aware Binarization Method. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:662-669 [Conf ] Seungwon Na , Gu-Min Jeong Design and Implementation of Context-Awareness Processor for Multiple Instructions in Mobile Internet Environment. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:670-676 [Conf ] Jun Feng , Yuelong Zhu , Naoto Mukai , Toyohide Watanabe Integrated Management of Multi-level Road Network and Transportation Networks. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:677-683 [Conf ] Jeong-Il Park , Sang-Wook Kim , Miyoung Shin Music Plagiarism Detection Using Melody Databases. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:684-693 [Conf ] Jungwon Cho , Seungdo Jeong , Byung-Uk Choi News Video Retrieval Using Automatic Indexing of Korean Closed-Caption. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:694-703 [Conf ] Jungwon Cho , Seungdo Jeong , Byung-Uk Choi Classification and Skimming of Articles for an Effective News Browsing. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:704-712 [Conf ] Youngseok Lee , Jungwon Cho , Byung-Uk Choi Intelligent Tutoring System with 300-Certification Program Based on WIPI. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:713-720 [Conf ] Dongwoo Lee , SeongHoon Lee , YongWon Kim ECA Rule Based Timely Collaboration Among Businesses in B2B e-Commerce. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:721-727 [Conf ] Hyuncheol Jeong , Inseob Song The Searching Methods of Mobile Agents in Telemedicine System Environments. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:728-734 [Conf ] Ji-Hong Kim , Byung-Hyun Ha , Wookey Lee , Cheol Young Kim , Wonchang Hur , Suk-Ho Kang Knowledge-Based RDF Specification for Ubiquitous Healthcare Services. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:735-741 [Conf ] Seiji Tsuchiya , Hirokazu Watabe , Tsukasa Kawaoka A Time Judgement System Based on an Association Mechanism. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:742-748 [Conf ] Sylvia B. Encheva , Sharil Tumin Response-Driven Web-Based Assessment System. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:749-755 [Conf ] Kwok-wing Chau Intelligence-Based Educational Package on Fluid Mechanics. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:756-762 [Conf ] Geir Kjetil Sandve , Finn Drabløs Generalized Composite Motif Discovery. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:763-769 [Conf ] Rolv Seehuus Protein Motif Discovery with Linear Genetic Programming. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:770-776 [Conf ] Kyung-Joong Kim , Si-Ho Yoo , Sung-Bae Cho Bayesian Validation of Fuzzy Clustering for Analysis of Yeast Cell Cycle Data. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:777-784 [Conf ] Yeon-Jin Cho , Hyeoncheol Kim Rule Generation Using NN and GA for SARS-CoV Cleavage Site Prediction. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:785-791 [Conf ] Min Kyung Kim , Chull Hwan Song , Seong Joon Yoo , Sang Ho Lee , Hyun Seok Park A Hybrid Approach to Combine HMM and SVM Methods for the Prediction of the Transmembrane Spanning Region. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:792-798 [Conf ] V. Kris Murthy Agents in Bio-inspired Computations. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:799-805 [Conf ] David Newth Altruistic Punishment, Social Structure and the Enforcement of Social Norms. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:806-812 [Conf ] Ang Yang , Hussein A. Abbass , Ruhul A. Sarker WISDOM-II: A Network Centric Model for Warfare. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:813-819 [Conf ] Richard M. Kim , Simon M. Kaplan Adaptation on the Commons. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:820-826 [Conf ] Ricky Robinson , Jadwiga Indulska The Emergence of Order in Random Walk Resource Discovery Protocols. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:827-833 [Conf ] Shang Gao , Zili Zhang , Jason Wells , Igor Hawryszkiewycz Supporting Adaptive Learning with High Level Timed Petri Nets. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:834-840 [Conf ] Supratip Ghose , Jason J. Jung , GeunSik Jo Exploring the Effective Search Context for the User in an Interactive and Adaptive Way. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:841-847 [Conf ] Kazunori Okamoto , Yukiko I. Nakano , Masashi Okamoto , Hung-Hsuan Huang , Toyoaki Nishida Generating CG Movies Based on a Cognitive Model of Shot Transition. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:848-854 [Conf ] Toshihiro Murayama , Tomohiro Fukuhara , Toyoaki Nishida Analyzing Concerns of People Using Weblog Articles and Natural Phenomena. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:855-860 [Conf ] Hidekazu Kubota , Satoshi Nomura , Yasuyuki Sumi , Toyoaki Nishida Sustainable Memory System Using Global and Conical Spaces. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:861-867 [Conf ] Takanori Komatsu , Koji Morikawa Entrainment of Rate of Utterances in Speech Dialogs Between Users and an Auto Response System. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:868-874 [Conf ] Rai Chan , Jun Takazawa , Junichi Hoshino Locomotion Control Technique for Immersive Conversation Environment. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:875-882 [Conf ] Daisaku Arita , Rin-ichiro Taniguchi Presentation of Human Action Information via Avatar: From the Viewpoint of Avatar-Based Communication. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:883-889 [Conf ] Yuval Marom , Ingrid Zukerman Analysis and Synthesis of Help-Desk Responses. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:890-897 [Conf ] Mitsuhiro Nakamura , Hideyuki Sawada A Talking Robot and Its Singing Skill Acquisition. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:898-907 [Conf ] Kotaro Fukui , Kazufumi Nishikawa , Shunsuke Ikeo , Eiji Shintaku , Kentaro Takada , Hideaki Takanobu , Masaaki Honda , Atsuo Takanishi Development of a New Vocal Cords Based on Human Biological Structures for Talking Robot. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:908-914 [Conf ] Gong Ruibin , Chan Kai Yun An Adaptive Model for Phonetic String Search. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:915-921 [Conf ] Eric Wang , Yong Se Kim , Hak Soo Kim , Jin Hyun Son , Sanghoon Lee , Il Hong Suh Ontology Modeling and Storage System for Robot Context Understanding. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:922-929 [Conf ] Maciej Majewski , Wojciech Kacalak Intelligent Two-Way Speech Communication System Between the Technological Device and the Operator. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:930-936 [Conf ] Youn-Suk Song , Sung-Bae Cho , Il Hong Suh Activity-Object Bayesian Networks for Detecting Occluded Objects in Uncertain Indoor Environment. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:937-944 [Conf ] Seungdo Jeong , Jonglyul Chung , Sanghoon Lee , Il Hong Suh , Byung-Uk Choi Design of a Simultaneous Mobile Robot Localization and Spatial Context Recognition System. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:945-952 [Conf ] Andrew Kusiak , Alex Burns Mining Temporal Data: A Coal-Fired Boiler Case Study. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:953-958 [Conf ] Kalyanaraman Kaesava Kshetrapalapuram , Michael Kirley Mining Classification Rules Using Evolutionary Multi-objective Algorithms. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:959-965 [Conf ] Osmar R. Zaïane , Maria-Luiza Antonie On Pruning and Tuning Rules for Associative Classifiers. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:966-973 [Conf ] Szymon K. Szukalski , Robert Cox , Patricia S. Crowther Using Artificial Neural Network Ensembles to Extract Data Content from Noisy Data. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:974-980 [Conf ] Jung-Shik Kong , Jin-Geol Kim Identification of a Motor with Multiple Nonlinearities by Improved Genetic Algorithm. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:981-987 [Conf ] Mengjie Zhang , Yun Zhang , William D. Smart Program Simplification in Genetic Programming for Object Classification. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:988-996 [Conf ] Bong-Horng Chu , In-Kai Liao , Cheng-Seen Ho An Ontology-Supported Database Refurbishing Technique and Its Application in Mining GSM Trouble Shooting Rules. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:997-1004 [Conf ] Xin Liu , Zhen Han , Jiqiang Liu , Chang-xiang Shen Develop Secure Database System with Security Extended ER Model. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:1005-1010 [Conf ] Binge Cui , Daxin Liu An Inference Detection Algorithm Based on Related Tuples Mining. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:1011-1017 [Conf ] Ron G. van Schyndel A Preliminary Design for a Privacy-Friendly Free P2P Media File Distribution System. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:1018-1024 [Conf ] Xinpeng Zhang , Shuozhong Wang Analysis of Parity Assignment Steganography in Palette Images. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:1025-1031 [Conf ] Chin-Shiuh Shieh , Chao-Chin Chang , Shu-Chuan Chu , Jui-Fang Chang A New Steganography Scheme in the Domain of Side-Match Vector Quantization. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:1032-1038 [Conf ] Osamu Takizawa , Kyoko Makino , Tsutomu Matsumoto , Hiroshi Nakagawa , Ichiro Murase Method of Hiding Information in Agglutinative Language Documents Using Adjustment to New Line Positions. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:1039-1048 [Conf ] Yongwha Chung , Daesung Moon , Kiyoung Moon , Sung Bum Pan Hiding Biometric Data for Secure Transmission. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:1049-1057 [Conf ] Chin-Chen Chang , Chih-Yang Lin , Yu-Zheng Wang VQ Image Steganographic Method with High Embedding Capacity Using Multi-way Search Approach. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:1058-1064 [Conf ] Anirban Majumdar , Clark D. Thomborson Securing Mobile Agents Control Flow Using Opaque Predicates. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:1065-1071 [Conf ] Qiong Li , Xiamu Niu , Zhifang Wang , Yuhua Jiao , Sheng-He Sun A Verifiable Fingerprint Vault Scheme. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:1072-1078 [Conf ] Xin-guang Zou , Qiong Li , Sheng-He Sun , Xiamu Niu The Research on Information Hiding Based on Command Sequence of FTP Protocol. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:1079-1085 [Conf ] Hsi-Chun Wang , Wei-Chiang Wang Data Hiding in a Hologram by Modified Digital Halftoning Techniques. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:1086-1092 [Conf ] Yunbiao Guo , Daimao Lin , Xiamu Niu , Lan Hu , Linna Zhou A Secure Steganographic Scheme in Binary Image. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:1093-1100 [Conf ] Chin-Chen Chang , Wen-Chuan Wu A Reversible Information Hiding Scheme Based on Vector Quantization. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:1101-1107 [Conf ] In Koo Kang , Hae-Yeoun Lee , Won-Young Yoo , Heung-Kyu Lee Zero-Based Code Modulation Technique for Digital Video Fingerprinting. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:1108-1114 [Conf ] Taki Kanda Studies on Method for Measuring Human Feelings. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:1115-1121 [Conf ] Masahiro Kawano , Junzo Watada , Takayuki Kawaura Data Mining Method from Text Database. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:1122-1128 [Conf ] Jaeseok Choi , TrungTinh Tran , Jungji Kwon , Sangsik Lee , Abdurrahim El-keib The Air Pollution Constraints Considered Best Generation Mix Using Fuzzy Linear Programming. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:1129-1142 [Conf ] Bernd-Jürgen Falkowski Ranking Functions, Perceptrons, and Associated Probabilities. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:1143-1150 [Conf ] Stefan Berlik , Bernd Reusch Directed Mutation Operators - An Overview. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:1151-1159 [Conf ] Abhijeet V. Nandedkar , P. K. Biswas A General Fuzzy Min Max Neural Network with Compensatory Neuron Architecture. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:1160-1167 [Conf ] King Hong Cheung , Adams Wai-Kin Kong , David Zhang , Mohamed Kamel , Jane You , Ho-Wang Lam An Analysis on Accuracy of Cancelable Biometrics Based on BioHashing. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:1168-1172 [Conf ] Robert J. Howlett , Gary Dawe , Terry Nowell Condition Monitoring Capability Developed Through a Knowledge Transfer Partnership Between a Small Company and a University. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:1173-1179 [Conf ] Laurent Alamarguy , Rose Dieng-Kuntz , Catherine Faron-Zucker Extraction of Lexico-Syntactic Information and Acquisition of Causality Schemas for Text Annotation. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:1180-1186 [Conf ] Torbjørn Nordgård , Martin Thorsen Ranang , Jostein Ven An Approach to Automatic Text Production in Electronic Medical Record Systems. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:1187-1194 [Conf ] Rune Sætre , Amund Tveit , Martin Thorsen Ranang , Tonje Strommen Steigedal , Liv Thommesen , Kamilla Stunes , Astrid Lægreid gProt: Annotating Protein Interactions Using Google and Gene Ontology. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:1195-1203 [Conf ] Ken'ichi Asami Physiological Modeling and Simulation for Aerobic Circulation with Beat-by-Beat Hemodynamics. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:1204-1209 [Conf ] Yoo-Joo Choi , Soo-Mi Choi , Seon-Min Rhee , Myoung-Hee Kim Collaborative and Immersive Medical Education in a Virtual Workbench Environment. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:1210-1217 [Conf ] Akira Hara , Takumi Ichimura , Tetsuyuki Takahama , Yoshinori Isomichi Extraction of Risk Factors by Multi-agent Voting Model Using Automatically Defined Groups. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:1218-1224 [Conf ] Jie Chen , Hongxing He , Jiuyong Li , Huidong Jin , Damien McAullay , Graham J. Williams , Ross Sparks , Chris Kelman Representing Association Classification Rules Mined from Health Data. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:1225-1231 [Conf ] Marcus Watson , Andrew Smith , Scott Watter Leximancer Concept Mapping of Patient Case Studies. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:1232-1238 [Conf ] Machi Suka , Katsumi Yoshida Barrier to Transition from Paper-Based to Computer-Based Patient Record: Analysis of Paper-Based Patient Records. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:1239-1245 [Conf ] Yoshiaki Kurosawa , Akira Hara , Machi Suka , Takumi Ichimura Preprocessing for Extracting Information from Medical Record to Add XML Tags. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:1246-1252 [Conf ] Norio Ozaki , Takumi Ichimura A Scheduling Method of Data Transmission in the Internet Communication by Recurrent Neural Network. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:1253-1259 [Conf ] Takumi Ichimura , Machi Suka , Akihiro Sugihara , Kazunari Harada Health Support Intelligent System for Diabetic Patient by Mobile Phone. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:1260-1265 [Conf ] Yoshihiro Saeki , Fumiaki Takeda Proposal of Food Intake Measuring System in Medical Use and Its Discussion of Practical Capability. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:1266-1273 [Conf ] Kiichirou Sasaki , Yurie Iribe , Masato Goto , Mamoru Endo , Takami Yasuda , Shigeki Yokoi Simple Web Mail System That Makes the Best Use of the Senior Citizens Social Experience. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:1274-1280 [Conf ] Koichi Ota , Akihiro Kashihara Evaluating Navigation History Comparison. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:1281-1287 [Conf ] Youzou Miyadera , Naohiro Hayashi , Shoichi Nakamura , Setsuo Yokoyama A Visualization System for Organizing and Sharing Research Information. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:1288-1295 [Conf ] Hisayoshi Kunimune , Masaaki Niimura , Katsumi Wasaki , Yasushi Fuwa , Yasunari Shidama , Yatsuka Nakamura The Learning System of Shinshu University Graduate School of Science and Technology on the Internet. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:1296-1302 [Conf ] Tomoko Kojiri , Sachiyo Hosono , Toyohide Watanabe Automatic Generation of Answers Using Solution Network for Mathematical Exercises. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:1303-1309 [Conf ] Kohji Itoh , Eisuke Mihara , Kenji Hasegawa , Masahiro Fujii , Makoto Itami Assisting Construction of Meta-cognitive Competence by Scaffolding Discovery of Plans in Problem-Solving. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:1310-1316 [Conf ] Mitsuru Ikeda , Yusuke Hayashi Knowledge Level Design Support for SCORM2004-Conformed Learning Contents - Ontological Consideration on Platforms for Intelligent Educational Systems. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:1317-1323 [Conf ] Jun-Ming Chen , Gwo-Haur Hwang , Gwo-Jen Hwang , Carol H. C. Chu Analyzing Domain Expertise by Considering Variants of Knowledge in Multiple Time Scales. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:1324-1330 [Conf ] Heng-Li Yang , Qing-Fung Lin A New Algorithm to Discover Page-Action Rules on Web. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:1331-1337 [Conf ] Ming-Cheng Tseng , Wen-Yang Lin , Rong Jeng Efficient Remining of Generalized Association Rules Under Multiple Minimum Support Refinement. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:1338-1344 [Conf ] Peng Zhang , Yunhai Tong , Shiwei Tang , Dongqing Yang Mining Association Rules from Distorted Data for Privacy Preservation. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:1345-1351 [Conf ] Tzung-Pei Hong , Cheng-Ming Huang , Shi-Jinn Horng Mining Linguistic Mobility Patterns for Wireless Networks. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:1352-1358 [Conf ] Maik Maurer , Udo Lindemann Individualized Product Design by Evolutionary Algorithms. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:1359-1365 [Conf ] Daw-Tung Lin , Juin-Lin Kuo , En-Chung Lin , San-Yuan Huang Fuzzy Similarity Measure and Fractional Image Query for Large Scale Protein 2D Gel Electrophoresis. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:1366-1372 [Conf ] Michal Lower , Dariusz Król , Boguslaw Szlachetko Building the Fuzzy Control System Based on the Pilot Knowledge. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:1373-1379 [Conf ]