The SCEAS System
Navigation Menu

Conferences in DBLP

Knowledge-Based Intelligent Information & Engineering Systems (kes)
2005 (conf/kes/2005-3)

  1. Li Li, Baolin Wu, Yun Yang
    Agent-Based Approach for Dynamic Ontology Management. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:1-7 [Conf]
  2. Nora Houari, Behrouz Homayoun Far
    A Novel Approach for Developing Autonomous and Collaborative Agents. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:8-15 [Conf]
  3. Dragan Jevtic, Marijan Kunstic, Denis Ouzecki
    The Effect of Alteration in Service Environments with Distributed Intelligent Agents. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:16-22 [Conf]
  4. John K. Debenham, Simeon J. Simoff
    Managing Collaboration in a Multiagent System. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:23-29 [Conf]
  5. Budhitama Subagdja, Liz Sonenberg
    Learning Plans with Patterns of Actions in Bounded-Rational Agents. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:30-36 [Conf]
  6. Ali Ben Ammar, Abdelaziz Abdellatif, Henda Hajjami Ben Ghézala
    Roles of Agents in Data-Intensive Web Sites. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:37-45 [Conf]
  7. Catherine Howard, Markus Stumptner
    Probabilistic Reasoning Techniques for the Tactical Military Domain. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:46-53 [Conf]
  8. Jahwan Koo, Seong-Jin Ahn
    A Network Service Access Control Framework Based on Network Blocking Algorithm. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:54-61 [Conf]
  9. Hong-Gyoo Sohn, Choung-Hwan Park, Joon Heo
    3-D Building Reconstruction Using IKONOS Multispectral Stereo Images. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:62-68 [Conf]
  10. Hyung Jin Kim, Bongsoo Son, Soobeom Lee, Sei-Chang Oh
    Heuristic Algorithm for Estimating Travel Speed in Traffic Signalized Networks. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:69-73 [Conf]
  11. Kyung-Sang Sung, Dong Chun Lee, Hyun-Chul Kim, Hae-Seok Oh
    Home Network Observation System Using User's Activate Pattern and Multimedia Streaming. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:74-80 [Conf]
  12. Jaimu Won, Sooil Lee, Soobeom Lee
    Determination of Optimal Locations for the Variable Message Signs by the Genetic Algorithm. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:81-86 [Conf]
  13. Hyunsoo Kim, Seong W. Kim, Soobeom Lee, Bongsoo Son
    Estimation of the Optimal Number of Cluster-Heads in Sensor Network. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:87-94 [Conf]
  14. Jeonghyun Kim, Seungpil Kang
    Development of Integrated Transit-Fare Card System in the Seoul Metropolitan Area. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:95-100 [Conf]
  15. Dong Chun Lee
    Efficient Migration Scheme Using Backward Recovery Algorithm for Mobile Agents in WLAN. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:101-106 [Conf]
  16. Ben Niu, Simon C. K. Shiu
    Using Similarity Measure to Enhance the Robustness of Web Access Prediction Model. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:107-111 [Conf]
  17. James N. K. Liu, Honghua Dai, Lina Zhou
    Intelligent Financial News Digest System. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:112-120 [Conf]
  18. Xiaoshu Hang, James N. K. Liu, Yu Ren, Honghua Dai
    An Incremental FP-Growth Web Content Mining and Its Application in Preference Identification. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:121-127 [Conf]
  19. Bo Feng, James N. K. Liu
    Similarity Retrieval from Time-Series Tropical Cyclone Observations Using a Neural Weighting Generator for Forecasting Modeling. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:128-134 [Conf]
  20. Simon C. K. Shiu, Cody K. P. Wong
    Web Access Path Prediction Using Fuzzy Case Based Reasoning. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:135-140 [Conf]
  21. Aki P. F. Chan, Wing W. Y. Ng, Daniel S. Yeung, Eric C. C. Tsang
    Multiple Classifier System with Feature Grouping for Intrusion Detection: Mutual Information Approach. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:141-148 [Conf]
  22. James N. K. Liu, Weidong Luo, Edmond M. C. Chan
    Design and Implement a Web News Retrieval System. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:149-156 [Conf]
  23. Chull Hwan Song, Young Hyun Koo, Seong Joon Yoo, ByeongHo Choi
    An Ontology for Integrating Multimedia Databases. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:157-162 [Conf]
  24. Kyong-Ha Lee, Kyu-Chul Lee, Dae-Wook Lee, Suk Ho Lee
    Integrating Service Registries with OWL-S Ontologies. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:163-169 [Conf]
  25. Jungkee Kim, Geoffrey Fox, Seong Joon Yoo
    Data Integration Hub for a Hybrid Paper Search. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:170-176 [Conf]
  26. Keonsoo Lee, Wonil Kim, Minkoo Kim
    Effective Information Sharing Using Concept Mapping. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:177-183 [Conf]
  27. Jorge Posada, Carlos Toro, Stefan Wundrak, André Stork
    Ontology Supported Semantic Simplification of Large Data Sets of Industrial Plant CAD Models for Design Review Visualization. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:184-190 [Conf]
  28. Rami Rifaieh, Aïcha-Nabila Benharkat
    EISCO: Enterprise Information System Contextual Ontologies Project. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:191-198 [Conf]
  29. Baowen Xu, Dazhou Kang, Jianjiang Lu, Yanhui Li, Jixiang Jiang
    Mapping Fuzzy Concepts Between Fuzzy Ontologies. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:199-205 [Conf]
  30. Soo-Mi Choi, Yong-Guk Kim
    Similarity Estimation of 3D Shapes Using Modal Strain Energy. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:206-212 [Conf]
  31. Sang-Hoon Kim, Tae-eun Kim, Malrey Lee, Jong-Soo Choi
    3D-Based Synthesis and 3D Reconstruction from Uncalibrated Images. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:213-218 [Conf]
  32. Sang-Jun Kim, Yong-Guk Kim, Jeong-Eom Lee, Min-Soo Jang, Seok-Joo Lee, Gwi-Tae Park
    3-D Pose Tracking of the Car Occupant. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:219-224 [Conf]
  33. Reza Ebrahimpour, Saeed Reza Ehteram, Ehsanollah Kabir
    Face Recognition by Multiple Classifiers, a Divide-and-Conquer Approach. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:225-232 [Conf]
  34. Jeong-Sik Kim, Yong-Guk Kim, Soo-Mi Choi, Myoung-Hee Kim
    Shape Comparison of the Hippocampus Using a Multiresolution Representation and ICP Normalization. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:233-239 [Conf]
  35. Jungwon Cho, Seungdo Jeong, Byung-Uk Choi
    A Fast Image Retrieval Using the Unification Search Method of Binary Classification and Dimensionality Condensation of Feature Vectors. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:240-247 [Conf]
  36. Miguel Torres, Giovanni Guzmán, Rolando Quintero, Marco Moreno, Serguei Levachkine
    Semantic Supervised Clustering to Land Classification in Geo-Images. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:248-254 [Conf]
  37. In-Cheol Kim
    Towards an Intelligent Web Service for Ontology-Based Query-Answering Dialogues. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:255-260 [Conf]
  38. Leszek Borzemski, Ziemowit Nowak
    Using the Geographic Distance for Selecting the Nearest Agent in Intermediary-Based Access to Internet Resources. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:261-267 [Conf]
  39. Leszek Borzemski
    Mining Internet Data Sets for Computational Grids. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:268-274 [Conf]
  40. In-Cheol Kim, Hoon Jin
    Towards Integration of Web Services into Agents for Biological Information Resources. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:275-281 [Conf]
  41. Toan Phung, Michael Winikoff, Lin Padgham
    Learning Within the BDI Framework: An Empirical Analysis. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:282-288 [Conf]
  42. Yoshiyasu Ogasawara, Masashi Okamoto, Yukiko I. Nakano, Yong Xu, Toyoaki Nishida
    How to Make Robot a Robust and Interactive Communicator. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:289-295 [Conf]
  43. Ken Saito, Hidekazu Kubota, Yasuyuki Sumi, Toyoaki Nishida
    Analysis of Conversation Quanta for Conversational Knowledge Circulation. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:296-302 [Conf]
  44. Dae Sun Kim, Choong Seon Hong, Yu Xiang
    An Intelligent Approach of Packet Marking at Edge Router for IP Traceback. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:303-309 [Conf]
  45. Sukhoon Kang, Yong-Rak Choi
    A Covert Timing Channel-Free Optimistic Concurrency Control Scheme for Multilevel Secure Database Management Systems. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:310-316 [Conf]
  46. YeongGeun Choe, Soon-Ja Kim
    Secure Password Authentication for Keystroke Dynamics. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:317-324 [Conf]
  47. Sung-Hyun Yun, Hyung-Woo Lee
    The Efficient Multipurpose Convertible Undeniable Signature Scheme. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:325-331 [Conf]
  48. Eun-Jun Yoon, Kee-Young Yoo
    A New Efficient Fingerprint-Based Remote User Authentication Scheme for Multimedia Systems. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:332-338 [Conf]
  49. Yang Weon Lee, Heau-Jo Kang
    A Study on the Correction of Gun Fire Error Using Neural Network. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:339-345 [Conf]
  50. Da-Jinn Wang, Thou-Ho Chen, Yung-Chuen Chiou, Hung-Shiuan Liau
    An Efficient Moving Object Extraction Algorithm for Video Surveillance. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:346-352 [Conf]
  51. Yu-Long Qiao, Jeng-Shyang Pan, Sheng-He Sun
    An Experimental Comparison on Gabor Wavelet and Wavelet Frame Based Features for Image Retrieval. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:353-358 [Conf]
  52. Duan-Yu Chen, Hong-Yuan Mark Liao, Suh-Yin Lee
    Robust Video Retrieval Using Temporal MVMB Moments. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:359-365 [Conf]
  53. Tsair-Fwu Lee, Ming-Yuan Cho, Chin-Shiuh Shieh, Pei-Ju Chao, Huai-Yang Chang
    Precise Segmentation Rendering for Medical Images Based on Maximum Entropy Processing. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:366-373 [Conf]
  54. Yongwha Chung, Kichul Kim, Min Kim, Sung Bum Pan, Neungsoo Park
    A Hardware Implementation for Fingerprint Retrieval. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:374-380 [Conf]
  55. Jing-Fung Chen, Hong-Yuan Mark Liao, Chia-Wen Lin
    Fast Video Retrieval via the Statistics of Motion Within the Regions-of-Interest. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:381-387 [Conf]
  56. Wengang Cheng, De Xu, Yiwei Jiang, Congyan Lang
    Information Theoretic Metrics in Shot Boundary Detection. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:388-394 [Conf]
  57. Ross Brown, Binh Pham, Olivier Y. de Vel
    Design of a Digital Forensics Image Mining System. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:395-404 [Conf]
  58. Zhen Sun, Yue-Nan Li, Zhe-Ming Lu
    Side-Match Predictive Vector Quantization. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:405-410 [Conf]
  59. Hsiang-Cheh Huang, Kang K. Yen, Yu-Hsiu Huang, Jeng-Shyang Pan, Kuang-Chih Huang
    Improved Image Coding with Classified VQ and Side-Match VQ. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:411-417 [Conf]
  60. Tien-Ying Kuo, Huang-Bin Chen
    Fast Multiple Reference Frame Motion Estimation for H.264 Based on Qualified Frame Selection Scheme. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:418-424 [Conf]
  61. Feng Pan, H. Men, Thinh M. Le
    Block Standstill and Homogeneity Based Fast Motion Estimation Algorithm for H.264 Video Coding. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:425-432 [Conf]
  62. Feng Pan, Kenny Choo, Thinh M. Le
    Fast Rate-Distortion Optimization in H.264/AVC Video Coding. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:433-441 [Conf]
  63. Chin-Chen Chang, Yung-Chen Chou, Jau-Ji Shen
    Improving Image Quality for JPEG Compression. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:442-448 [Conf]
  64. Gyu-Sung Yeon, Chi-Hun Jun, Tae-Jin Hwang, Seongsoo Lee, Jae-Kyung Wee
    Low-Power MPEG-4 Motion Estimator Design for Deep Sub-Micron Multimedia SoC. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:449-455 [Conf]
  65. Tong-Yee Lee, Shaur-Uei Yan, Yong-Nien Chen, Ming-Te Chi
    Real-Time 3D Artistic Rendering System. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:456-462 [Conf]
  66. Wei-Soul Li, Wen-Shyong Hsieh, Ming-Hong Sun
    Index LOCO-I: A Hybrid Method of Data Hiding and Image Compression. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:463-468 [Conf]
  67. Tong-Yee Lee, Shaur-Uei Yan
    Feature-Constrained Texturing System for 3D Models. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:469-475 [Conf]
  68. Ya-Rong Hou, Zhang Xiong
    Dynamic Integrated Model for Distributed Multimedia System. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:476-482 [Conf]
  69. Zhonghui Mei, Lenan Wu, Shiyuan Zhang
    Joint Detection for a Bandwidth Efficient Modulation Method. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:483-487 [Conf]
  70. Yong Zhao, Zhen Han, Jiqiang Liu, Zhigang Li
    An Efficient and Divisible Payment Scheme for M-Commerce. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:488-496 [Conf]
  71. Bin Yan, Zhe-Ming Lu, Sheng-He Sun, Jeng-Shyang Pan
    Speech Authentication by Semi-fragile Watermarking. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:497-504 [Conf]
  72. E. V. Krishnamurthy, V. Kris Murthy
    On Engineering Smart Systems. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:505-512 [Conf]
  73. Ayahiko Niimi, Hitomi Noji, Osamu Konishi
    Distributed Web Integration with Multiagent Data Mining. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:513-519 [Conf]
  74. Eiji Nunohiro, Kenneth J. Mackin, Masanori Ohshiro, Kazuko Yamasaki
    Self-adjusting Programming Training Support System Using Genetic Algorithm. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:520-525 [Conf]
  75. Daisuke Yamaguchi, Kenneth J. Mackin, Eiichiro Tazaki
    Waste Incinerator Emission Prediction Using Probabilistically Optimal Ensemble of Multi-agents. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:526-532 [Conf]
  76. Atsushi Yoshida, Katsuji Aoki, Shoichi Araki
    Cooperative Control Based on Reaction-Diffusion Equation for Surveillance System. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:533-539 [Conf]
  77. D. T. Nanduri, Vic Ciesielski
    Comparison of the Effectiveness of Decimation and Automatically Defined Functions. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:540-546 [Conf]
  78. Hiromi Miyajima, Noritaka Shigei
    Absolute Capacities for Higher Order Associative Memory of Sequential Patterns. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:547-553 [Conf]
  79. Geoff Poulton, Ying Guo, Wen Lu
    Finding Hidden Hierarchy in Reinforcement Learning. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:554-561 [Conf]
  80. Peter Vamplew, Robert Ollington
    On-Line Reinforcement Learning Using Cascade Constructive Neural Networks. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:562-568 [Conf]
  81. Tsutomu Miyoshi
    Node Exchange for Improvement of SOM Learning. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:569-574 [Conf]
  82. Honghai Feng, Baoyan Liu, Yin Cheng, Ping Li, Bingru Yang, Yumei Chen
    Using Rough Set to Reduce SVM Classifier Complexity and Its Use in SARS Data Set. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:575-580 [Conf]
  83. Honghai Feng, Chen Guoshun, Yin Cheng, Bingru Yang, Yumei Chen
    A SVM Regression Based Approach to Filling in Missing Values. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:581-587 [Conf]
  84. Marcus Liwicki, Lars Knipping
    Recognizing and Simulating Sketched Logic Circuits. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:588-594 [Conf]
  85. Andrew Skabar
    Automatic MLP Weight Regularization on Mineralization Prediction Tasks. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:595-601 [Conf]
  86. Je Yeon Oh, Jae-Yoon Jung, Nam Wook Cho, Hoontae Kim, Suk-Ho Kang
    Integrated Process Modeling for Dynamic B2B Collaboration. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:602-608 [Conf]
  87. Choon Seong Leem, Sangkyun Kim, Hong Joo Lee
    Assessment Methodology on Maturity Level of ISMS. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:609-615 [Conf]
  88. Hong Joo Lee, Sangkyun Kim, Choon Seong Leem
    CSFs for HCI in Ubiquitous Computing Environments. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:616-620 [Conf]
  89. Minhyung Kim, Sangkyun Kim, Myungwhan Choi
    Practical Design Recovery Techniques for Embedded Operating System on Complying with RTCA/DO-178B and ISO/IEC15408. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:621-627 [Conf]
  90. Tae Joong Kim, In-Ho Kim, Sang Won Lee
    Information Privacy Engineering in ubiComp. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:628-634 [Conf]
  91. Chang-ho Hong, Jong-Tae Lim, Chang Sohn, Ha-eun Nam
    Design and Implementation of Home Media Server for Personalized Broadcasting Service in Ubiquitous Environment. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:635-641 [Conf]
  92. Michael O. Jewell, Lee Middleton, Mark S. Nixon, Adam Prügel-Bennett, Sylvia C. Wong
    A Distributed Approach to Musical Composition. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:642-648 [Conf]
  93. Il-Sun Hwang, Gi Sung Yoo, Jin-Wook Chung
    Efficient Mobility Management Using Dynamic Location Register in IMT-2000 Networks. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:649-654 [Conf]
  94. Darije Ramljak, Maja Matijasevic
    SWSD: A P2P-Based System for Service Discovery from a Mobile Terminal. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:655-661 [Conf]
  95. Jo Nam Jung, Mi Young Nam, Phill-Kyu Rhee
    An Efficient Eye Location Using Context-Aware Binarization Method. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:662-669 [Conf]
  96. Seungwon Na, Gu-Min Jeong
    Design and Implementation of Context-Awareness Processor for Multiple Instructions in Mobile Internet Environment. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:670-676 [Conf]
  97. Jun Feng, Yuelong Zhu, Naoto Mukai, Toyohide Watanabe
    Integrated Management of Multi-level Road Network and Transportation Networks. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:677-683 [Conf]
  98. Jeong-Il Park, Sang-Wook Kim, Miyoung Shin
    Music Plagiarism Detection Using Melody Databases. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:684-693 [Conf]
  99. Jungwon Cho, Seungdo Jeong, Byung-Uk Choi
    News Video Retrieval Using Automatic Indexing of Korean Closed-Caption. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:694-703 [Conf]
  100. Jungwon Cho, Seungdo Jeong, Byung-Uk Choi
    Classification and Skimming of Articles for an Effective News Browsing. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:704-712 [Conf]
  101. Youngseok Lee, Jungwon Cho, Byung-Uk Choi
    Intelligent Tutoring System with 300-Certification Program Based on WIPI. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:713-720 [Conf]
  102. Dongwoo Lee, SeongHoon Lee, YongWon Kim
    ECA Rule Based Timely Collaboration Among Businesses in B2B e-Commerce. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:721-727 [Conf]
  103. Hyuncheol Jeong, Inseob Song
    The Searching Methods of Mobile Agents in Telemedicine System Environments. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:728-734 [Conf]
  104. Ji-Hong Kim, Byung-Hyun Ha, Wookey Lee, Cheol Young Kim, Wonchang Hur, Suk-Ho Kang
    Knowledge-Based RDF Specification for Ubiquitous Healthcare Services. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:735-741 [Conf]
  105. Seiji Tsuchiya, Hirokazu Watabe, Tsukasa Kawaoka
    A Time Judgement System Based on an Association Mechanism. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:742-748 [Conf]
  106. Sylvia B. Encheva, Sharil Tumin
    Response-Driven Web-Based Assessment System. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:749-755 [Conf]
  107. Kwok-wing Chau
    Intelligence-Based Educational Package on Fluid Mechanics. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:756-762 [Conf]
  108. Geir Kjetil Sandve, Finn Drabløs
    Generalized Composite Motif Discovery. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:763-769 [Conf]
  109. Rolv Seehuus
    Protein Motif Discovery with Linear Genetic Programming. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:770-776 [Conf]
  110. Kyung-Joong Kim, Si-Ho Yoo, Sung-Bae Cho
    Bayesian Validation of Fuzzy Clustering for Analysis of Yeast Cell Cycle Data. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:777-784 [Conf]
  111. Yeon-Jin Cho, Hyeoncheol Kim
    Rule Generation Using NN and GA for SARS-CoV Cleavage Site Prediction. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:785-791 [Conf]
  112. Min Kyung Kim, Chull Hwan Song, Seong Joon Yoo, Sang Ho Lee, Hyun Seok Park
    A Hybrid Approach to Combine HMM and SVM Methods for the Prediction of the Transmembrane Spanning Region. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:792-798 [Conf]
  113. V. Kris Murthy
    Agents in Bio-inspired Computations. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:799-805 [Conf]
  114. David Newth
    Altruistic Punishment, Social Structure and the Enforcement of Social Norms. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:806-812 [Conf]
  115. Ang Yang, Hussein A. Abbass, Ruhul A. Sarker
    WISDOM-II: A Network Centric Model for Warfare. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:813-819 [Conf]
  116. Richard M. Kim, Simon M. Kaplan
    Adaptation on the Commons. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:820-826 [Conf]
  117. Ricky Robinson, Jadwiga Indulska
    The Emergence of Order in Random Walk Resource Discovery Protocols. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:827-833 [Conf]
  118. Shang Gao, Zili Zhang, Jason Wells, Igor Hawryszkiewycz
    Supporting Adaptive Learning with High Level Timed Petri Nets. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:834-840 [Conf]
  119. Supratip Ghose, Jason J. Jung, GeunSik Jo
    Exploring the Effective Search Context for the User in an Interactive and Adaptive Way. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:841-847 [Conf]
  120. Kazunori Okamoto, Yukiko I. Nakano, Masashi Okamoto, Hung-Hsuan Huang, Toyoaki Nishida
    Generating CG Movies Based on a Cognitive Model of Shot Transition. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:848-854 [Conf]
  121. Toshihiro Murayama, Tomohiro Fukuhara, Toyoaki Nishida
    Analyzing Concerns of People Using Weblog Articles and Natural Phenomena. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:855-860 [Conf]
  122. Hidekazu Kubota, Satoshi Nomura, Yasuyuki Sumi, Toyoaki Nishida
    Sustainable Memory System Using Global and Conical Spaces. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:861-867 [Conf]
  123. Takanori Komatsu, Koji Morikawa
    Entrainment of Rate of Utterances in Speech Dialogs Between Users and an Auto Response System. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:868-874 [Conf]
  124. Rai Chan, Jun Takazawa, Junichi Hoshino
    Locomotion Control Technique for Immersive Conversation Environment. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:875-882 [Conf]
  125. Daisaku Arita, Rin-ichiro Taniguchi
    Presentation of Human Action Information via Avatar: From the Viewpoint of Avatar-Based Communication. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:883-889 [Conf]
  126. Yuval Marom, Ingrid Zukerman
    Analysis and Synthesis of Help-Desk Responses. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:890-897 [Conf]
  127. Mitsuhiro Nakamura, Hideyuki Sawada
    A Talking Robot and Its Singing Skill Acquisition. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:898-907 [Conf]
  128. Kotaro Fukui, Kazufumi Nishikawa, Shunsuke Ikeo, Eiji Shintaku, Kentaro Takada, Hideaki Takanobu, Masaaki Honda, Atsuo Takanishi
    Development of a New Vocal Cords Based on Human Biological Structures for Talking Robot. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:908-914 [Conf]
  129. Gong Ruibin, Chan Kai Yun
    An Adaptive Model for Phonetic String Search. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:915-921 [Conf]
  130. Eric Wang, Yong Se Kim, Hak Soo Kim, Jin Hyun Son, Sanghoon Lee, Il Hong Suh
    Ontology Modeling and Storage System for Robot Context Understanding. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:922-929 [Conf]
  131. Maciej Majewski, Wojciech Kacalak
    Intelligent Two-Way Speech Communication System Between the Technological Device and the Operator. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:930-936 [Conf]
  132. Youn-Suk Song, Sung-Bae Cho, Il Hong Suh
    Activity-Object Bayesian Networks for Detecting Occluded Objects in Uncertain Indoor Environment. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:937-944 [Conf]
  133. Seungdo Jeong, Jonglyul Chung, Sanghoon Lee, Il Hong Suh, Byung-Uk Choi
    Design of a Simultaneous Mobile Robot Localization and Spatial Context Recognition System. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:945-952 [Conf]
  134. Andrew Kusiak, Alex Burns
    Mining Temporal Data: A Coal-Fired Boiler Case Study. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:953-958 [Conf]
  135. Kalyanaraman Kaesava Kshetrapalapuram, Michael Kirley
    Mining Classification Rules Using Evolutionary Multi-objective Algorithms. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:959-965 [Conf]
  136. Osmar R. Zaïane, Maria-Luiza Antonie
    On Pruning and Tuning Rules for Associative Classifiers. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:966-973 [Conf]
  137. Szymon K. Szukalski, Robert Cox, Patricia S. Crowther
    Using Artificial Neural Network Ensembles to Extract Data Content from Noisy Data. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:974-980 [Conf]
  138. Jung-Shik Kong, Jin-Geol Kim
    Identification of a Motor with Multiple Nonlinearities by Improved Genetic Algorithm. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:981-987 [Conf]
  139. Mengjie Zhang, Yun Zhang, William D. Smart
    Program Simplification in Genetic Programming for Object Classification. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:988-996 [Conf]
  140. Bong-Horng Chu, In-Kai Liao, Cheng-Seen Ho
    An Ontology-Supported Database Refurbishing Technique and Its Application in Mining GSM Trouble Shooting Rules. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:997-1004 [Conf]
  141. Xin Liu, Zhen Han, Jiqiang Liu, Chang-xiang Shen
    Develop Secure Database System with Security Extended ER Model. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:1005-1010 [Conf]
  142. Binge Cui, Daxin Liu
    An Inference Detection Algorithm Based on Related Tuples Mining. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:1011-1017 [Conf]
  143. Ron G. van Schyndel
    A Preliminary Design for a Privacy-Friendly Free P2P Media File Distribution System. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:1018-1024 [Conf]
  144. Xinpeng Zhang, Shuozhong Wang
    Analysis of Parity Assignment Steganography in Palette Images. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:1025-1031 [Conf]
  145. Chin-Shiuh Shieh, Chao-Chin Chang, Shu-Chuan Chu, Jui-Fang Chang
    A New Steganography Scheme in the Domain of Side-Match Vector Quantization. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:1032-1038 [Conf]
  146. Osamu Takizawa, Kyoko Makino, Tsutomu Matsumoto, Hiroshi Nakagawa, Ichiro Murase
    Method of Hiding Information in Agglutinative Language Documents Using Adjustment to New Line Positions. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:1039-1048 [Conf]
  147. Yongwha Chung, Daesung Moon, Kiyoung Moon, Sung Bum Pan
    Hiding Biometric Data for Secure Transmission. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:1049-1057 [Conf]
  148. Chin-Chen Chang, Chih-Yang Lin, Yu-Zheng Wang
    VQ Image Steganographic Method with High Embedding Capacity Using Multi-way Search Approach. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:1058-1064 [Conf]
  149. Anirban Majumdar, Clark D. Thomborson
    Securing Mobile Agents Control Flow Using Opaque Predicates. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:1065-1071 [Conf]
  150. Qiong Li, Xiamu Niu, Zhifang Wang, Yuhua Jiao, Sheng-He Sun
    A Verifiable Fingerprint Vault Scheme. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:1072-1078 [Conf]
  151. Xin-guang Zou, Qiong Li, Sheng-He Sun, Xiamu Niu
    The Research on Information Hiding Based on Command Sequence of FTP Protocol. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:1079-1085 [Conf]
  152. Hsi-Chun Wang, Wei-Chiang Wang
    Data Hiding in a Hologram by Modified Digital Halftoning Techniques. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:1086-1092 [Conf]
  153. Yunbiao Guo, Daimao Lin, Xiamu Niu, Lan Hu, Linna Zhou
    A Secure Steganographic Scheme in Binary Image. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:1093-1100 [Conf]
  154. Chin-Chen Chang, Wen-Chuan Wu
    A Reversible Information Hiding Scheme Based on Vector Quantization. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:1101-1107 [Conf]
  155. In Koo Kang, Hae-Yeoun Lee, Won-Young Yoo, Heung-Kyu Lee
    Zero-Based Code Modulation Technique for Digital Video Fingerprinting. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:1108-1114 [Conf]
  156. Taki Kanda
    Studies on Method for Measuring Human Feelings. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:1115-1121 [Conf]
  157. Masahiro Kawano, Junzo Watada, Takayuki Kawaura
    Data Mining Method from Text Database. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:1122-1128 [Conf]
  158. Jaeseok Choi, TrungTinh Tran, Jungji Kwon, Sangsik Lee, Abdurrahim El-keib
    The Air Pollution Constraints Considered Best Generation Mix Using Fuzzy Linear Programming. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:1129-1142 [Conf]
  159. Bernd-Jürgen Falkowski
    Ranking Functions, Perceptrons, and Associated Probabilities. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:1143-1150 [Conf]
  160. Stefan Berlik, Bernd Reusch
    Directed Mutation Operators - An Overview. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:1151-1159 [Conf]
  161. Abhijeet V. Nandedkar, P. K. Biswas
    A General Fuzzy Min Max Neural Network with Compensatory Neuron Architecture. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:1160-1167 [Conf]
  162. King Hong Cheung, Adams Wai-Kin Kong, David Zhang, Mohamed Kamel, Jane You, Ho-Wang Lam
    An Analysis on Accuracy of Cancelable Biometrics Based on BioHashing. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:1168-1172 [Conf]
  163. Robert J. Howlett, Gary Dawe, Terry Nowell
    Condition Monitoring Capability Developed Through a Knowledge Transfer Partnership Between a Small Company and a University. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:1173-1179 [Conf]
  164. Laurent Alamarguy, Rose Dieng-Kuntz, Catherine Faron-Zucker
    Extraction of Lexico-Syntactic Information and Acquisition of Causality Schemas for Text Annotation. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:1180-1186 [Conf]
  165. Torbjørn Nordgård, Martin Thorsen Ranang, Jostein Ven
    An Approach to Automatic Text Production in Electronic Medical Record Systems. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:1187-1194 [Conf]
  166. Rune Sætre, Amund Tveit, Martin Thorsen Ranang, Tonje Strommen Steigedal, Liv Thommesen, Kamilla Stunes, Astrid Lægreid
    gProt: Annotating Protein Interactions Using Google and Gene Ontology. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:1195-1203 [Conf]
  167. Ken'ichi Asami
    Physiological Modeling and Simulation for Aerobic Circulation with Beat-by-Beat Hemodynamics. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:1204-1209 [Conf]
  168. Yoo-Joo Choi, Soo-Mi Choi, Seon-Min Rhee, Myoung-Hee Kim
    Collaborative and Immersive Medical Education in a Virtual Workbench Environment. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:1210-1217 [Conf]
  169. Akira Hara, Takumi Ichimura, Tetsuyuki Takahama, Yoshinori Isomichi
    Extraction of Risk Factors by Multi-agent Voting Model Using Automatically Defined Groups. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:1218-1224 [Conf]
  170. Jie Chen, Hongxing He, Jiuyong Li, Huidong Jin, Damien McAullay, Graham J. Williams, Ross Sparks, Chris Kelman
    Representing Association Classification Rules Mined from Health Data. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:1225-1231 [Conf]
  171. Marcus Watson, Andrew Smith, Scott Watter
    Leximancer Concept Mapping of Patient Case Studies. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:1232-1238 [Conf]
  172. Machi Suka, Katsumi Yoshida
    Barrier to Transition from Paper-Based to Computer-Based Patient Record: Analysis of Paper-Based Patient Records. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:1239-1245 [Conf]
  173. Yoshiaki Kurosawa, Akira Hara, Machi Suka, Takumi Ichimura
    Preprocessing for Extracting Information from Medical Record to Add XML Tags. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:1246-1252 [Conf]
  174. Norio Ozaki, Takumi Ichimura
    A Scheduling Method of Data Transmission in the Internet Communication by Recurrent Neural Network. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:1253-1259 [Conf]
  175. Takumi Ichimura, Machi Suka, Akihiro Sugihara, Kazunari Harada
    Health Support Intelligent System for Diabetic Patient by Mobile Phone. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:1260-1265 [Conf]
  176. Yoshihiro Saeki, Fumiaki Takeda
    Proposal of Food Intake Measuring System in Medical Use and Its Discussion of Practical Capability. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:1266-1273 [Conf]
  177. Kiichirou Sasaki, Yurie Iribe, Masato Goto, Mamoru Endo, Takami Yasuda, Shigeki Yokoi
    Simple Web Mail System That Makes the Best Use of the Senior Citizens Social Experience. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:1274-1280 [Conf]
  178. Koichi Ota, Akihiro Kashihara
    Evaluating Navigation History Comparison. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:1281-1287 [Conf]
  179. Youzou Miyadera, Naohiro Hayashi, Shoichi Nakamura, Setsuo Yokoyama
    A Visualization System for Organizing and Sharing Research Information. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:1288-1295 [Conf]
  180. Hisayoshi Kunimune, Masaaki Niimura, Katsumi Wasaki, Yasushi Fuwa, Yasunari Shidama, Yatsuka Nakamura
    The Learning System of Shinshu University Graduate School of Science and Technology on the Internet. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:1296-1302 [Conf]
  181. Tomoko Kojiri, Sachiyo Hosono, Toyohide Watanabe
    Automatic Generation of Answers Using Solution Network for Mathematical Exercises. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:1303-1309 [Conf]
  182. Kohji Itoh, Eisuke Mihara, Kenji Hasegawa, Masahiro Fujii, Makoto Itami
    Assisting Construction of Meta-cognitive Competence by Scaffolding Discovery of Plans in Problem-Solving. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:1310-1316 [Conf]
  183. Mitsuru Ikeda, Yusuke Hayashi
    Knowledge Level Design Support for SCORM2004-Conformed Learning Contents - Ontological Consideration on Platforms for Intelligent Educational Systems. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:1317-1323 [Conf]
  184. Jun-Ming Chen, Gwo-Haur Hwang, Gwo-Jen Hwang, Carol H. C. Chu
    Analyzing Domain Expertise by Considering Variants of Knowledge in Multiple Time Scales. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:1324-1330 [Conf]
  185. Heng-Li Yang, Qing-Fung Lin
    A New Algorithm to Discover Page-Action Rules on Web. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:1331-1337 [Conf]
  186. Ming-Cheng Tseng, Wen-Yang Lin, Rong Jeng
    Efficient Remining of Generalized Association Rules Under Multiple Minimum Support Refinement. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:1338-1344 [Conf]
  187. Peng Zhang, Yunhai Tong, Shiwei Tang, Dongqing Yang
    Mining Association Rules from Distorted Data for Privacy Preservation. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:1345-1351 [Conf]
  188. Tzung-Pei Hong, Cheng-Ming Huang, Shi-Jinn Horng
    Mining Linguistic Mobility Patterns for Wireless Networks. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:1352-1358 [Conf]
  189. Maik Maurer, Udo Lindemann
    Individualized Product Design by Evolutionary Algorithms. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:1359-1365 [Conf]
  190. Daw-Tung Lin, Juin-Lin Kuo, En-Chung Lin, San-Yuan Huang
    Fuzzy Similarity Measure and Fractional Image Query for Large Scale Protein 2D Gel Electrophoresis. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:1366-1372 [Conf]
  191. Michal Lower, Dariusz Król, Boguslaw Szlachetko
    Building the Fuzzy Control System Based on the Pilot Knowledge. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:1373-1379 [Conf]
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002