


default search action
6th ACIS-ICIS 2007: Melbourne, Australia
- 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 11-13 July 2007, Melbourne, Australia. IEEE Computer Society 2007, ISBN 0-7695-2841-4

Keynote Address
- Kate Smith-Miles:

Meta-Learning: From Classification to Forecasting, to Optimization, and Beyond. 2
Computer Science and Information Science
- Tsung-Yu Liu, Tan-Hsu Tan, Yu-Ling Chu:

2D Barcode and Augmented Reality Supported English Learning System. 5-10 - Abdusalam F. A. Nwesri, Seyed M. M. Tahaghoghi, Falk Scholer

:
Answering English Queries in Automatically Transcribed Arabic Speech. 11-16 - Gerhard Visser, David L. Dowe:

Minimum Message Length Clustering of Spatially-Correlated Data with Varying Inter-Class Penalties. 17-22 - Cynthia Y. Lester:

Growing the Pipeline: Restructuring an Introductory Computer Programming Course. 23-28 - Luke Bellamy, Damien Hutchinson, Jason Wells:

User Perceptions and Acceptance of Benevolent Worms -- A Matter of Fear? 29-36
Computer Architecture and VLSI
- Chien-Chuan Ko, Bo-Zhi Yang:

An Integrated Technique for Video Watermarking. 37-42 - Gin-Der Wu, Zhen-Wei Zhu:

Chip Design of LPC-cepstrum for Speech Recognition. 43-47 - Cong-Kha Pham

:
CMOS Schmitt Trigger Circuit with Controllable Hysteresis Using Logical Threshold Voltage Control Circuit. 48-53 - C. Y. Ho, Anthony Shi-Sheung Fong:

Combining Local and Global History Hashing in Perceptron Branch Prediction. 54-59 - Md. Mafijul Islam:

On the Limitations of Compilers to Exploit Thread-Level Parallelism in Embedded Applications. 60-66
Web Engineering and Applications
- Indra Seher, Athula Ginige

, Seyed A. Shahrestani
:
A Domain Identification Algorithm for Personalised Query Expansion with Contextual Information. 67-72 - Robert L. R. Mattson, Somnath Ghosh:

A performance analysis of page and object retrieval using HTTP-MPLEX in symmetric network environments. 73-80 - Kenneth Patrick Payne, Joarder Kamruzzaman:

Service Oriented Architecture for Legal Web Portal. 81-86 - Zakaria Maamar, Djamal Benslimane, Quan Z. Sheng

:
Towards A Two-Layered Framework for Managing Web Services Interaction. 87-92 - Manish Chhabra

, Hongen Lu:
Towards Agent Based Web Service. 93-99
Image Processing and Pattern Recognition I
- Gita Das, Sid Ray:

A Comparison of Relevance Feedback Strategies in CBIR. 100-105 - Ranadhir Ghosh, Moumita Ghosh, John Yearwood, Subhasis Mukherjee:

A fully Automated CAD system using Multi-category Feature Selection with Restricted Recombination. 106-111 - Andrew Skabar, Narendra Juneja:

A Kernel-Based Method for Semi-Supervised Learning. 112-117 - Jan Carlo Barca, Grace W. Rumantir:

A Modified K-means Algorithm for Noise Reduction in Optical Motion Capture Data. 118-122 - Yao-Hong Tsai:

A New Approach for Image Thresholding under Uneven Lighting Conditions. 123-127 - Abbas Golestani, Kushan Ahmadian, Ali Amiri, Mohammad Reza Jahed-Motlagh:

A Novel Adaptive-Boost-Based Strategy for Combining Classifiers Using Diversity Concept. 128-134
Mobile/Wireless Computing I
- Yong Qi, Min Xi, Saiyu Qi, Jizhong Zhao:

A Conflict Resolution Method in Context-Aware Computing. 135-140 - Babak Pazand, Chris McDonald:

A Critique of Mobility Models for Wireless Network Simulation. 141-146 - Kemeng Yang, Iqbal Gondal

, Bin Qiu, Laurence S. Dooley:
A Fuzzy Adaptive Soft Handover Scheme Supporting Four Active Sets. 147-152 - Zhitang Li, Shudong Shi:

A Secure Routing Protocol for Mobile Ad hoc Networks. 153-157 - Henry Larkin:

Applying Concurrent Versioning to Serverless Mobile Device Synchronisation. 157-162 - Guo Fang Mao, Alex Talevski, Elizabeth Chang

:
Voice over Internet Protocol on Mobile Devices. 163-169
Computer, Software Engineering and Information Engineering I
- Dussadee Praserttitipong, Peraphon Sophatsathit

:
A Framework for Deterministic Intention Specifications of an Agent toward an Incomplete Declared Intention. 170-175 - Shaochun Xu, Zendi Cui, Yufeng Gui:

Cognitive Process during Incremental Software Development. 176-181 - Phamorn Vantakavikran, Nakornthip Prompoon:

Constructing a Process Model for Decision Analysis and Resolution on COTS Selection Issue of Capability Maturity Model Integration. 182-187 - Tien N. Nguyen:

Integration of Configuration Management and Hypermedia for Managing Changes in Database Applications. 188-193 - Jinalben Patel, Roger Y. Lee, Haeng-Kon Kim:

Architectural View in Software Development Life-Cycle Practices. 194-199 - Eun-Ju Park, Haeng-Kon Kim, Roger Y. Lee:

Frameworks of Integration Repository for Software Process Improvement using SOA. 200-206
Image Processing and Pattern Recognition II
- Jun Li, Hong Peng, Zheng Pei:

Adaptive Watermarking Algorithm Using SVR in Wavelet Domain. 207-211 - Ferdous Ahmed Sohel

, Gour C. Karmakar, Laurence S. Dooley:
Bezier Curve-Based Character Descriptor Considering Shape Information. 212-216 - Kushan Ahmadian, Abbas Golestani, Morteza Analoui

, Mohammad R. Jahed:
Evolving Ensemble of Classifiers In Low-Dimensional Spaces Using Multi-Objective Evolutionary Approach. 217-222 - Chensheng Sun, Kin-Man Lam

:
The GVF Snake with a Minimal Path Approach. 223-228 - Morshed U. Chowdhury

, Rezwanur Rahman, Joydip Saha, S. M. Raiyan Kabir:
Fast Scene Change Detection Based Histogram. 229-233 - Aliaa A. A. Youssif

, Morshed U. Chowdhury
, Sid Ray, Howida Youssry Nafaa:
Fingerprint Recognition System Using Hybrid Matching Techniques. 234-240
Mobile/Wireless Computing II
- Mike Tyson, Carlo Kopp:

Defining Functional Requirements for a Lightweight GNSS Support Protocol (LGSP). 241-246 - Ping Han, Yanqin Zhu, Yuemei Hu:

Design of Multi-signature Scheme in Wireless Networks. 247-251 - David Kang, Wei Dai:

Development of Multimodal Ubiquitous System: A pilot study. 252-256 - Suhaimi Bin Abd Latif, Mohammed A. Rashid

, Fakhrul Alam
:
Effects of Varying Superframe Duration on Jitter in Interactive Multimedia Traffic Transmission over WLANs. 257-260 - Anies Hannawati Purnamadjaja, Johan Iskandar, R. Andrew Russell:

Pheromone Communication Simulation for Mobile Robots Using Java 3D. 261-266 - Nariaki Kato, Naohiro Ishii:

Cell Phone System for Tour & Information Guide. 267-273
Computer, Software Engineering, and Information Engineering II
- Shirantha Wijesekera, Sajal Palit, Bala Balachandran:

Software Development for B92 Quantum Key Distribution Communication Protocol. 274-278 - Yang Xu, Shengqun Tang, Youwei Xu, Zukai Tang:

Towards Aspect Oriented Web Service Composition with UML. 279-284 - Giuseppe Vella

, Nunzio Ingraffia, Marilia Liotta, Antonella Santangelo, Antonio Gentile:
XPL, a Presentation Language based on User Interface Design Pattern. 285-290 - Alauddin Ahmed

, Atiqur Rahman, Mohammed Anwer, Nazmul Haque, Morshed U. Chowdhury
:
A Comparison of Bipartite N-Qubit States to Classify Entangled States under Symmetric Consideration. 291-295 - Lianzhang Zhu, Yanchen Li:

Reliability Analysis of Component Software Based on Stochastic Petri Nets. 296-301 - Theodore Van Toll III, Roger Y. Lee, Tom Ahlswede:

Evaluating the Usefulness of Pair Programming in a Classroom Setting. 302-308
Image Processing and Pattern Recognition III
- Madasu Hanmandlu, A. V. Nath, A. C. Mishra, Vamsi Krishna Madasu

:
Fuzzy Model Based Recognition of Handwritten Hindi Numerals using Bacterial Foraging. 309-314 - Gin-Der Wu, Pang-Hsuan Huang:

Image Watermarking Using Structure Based Wavelet Tree Quantization. 315-319 - Manoranjan Paul

, M. Manzur Murshed
:
Impact of Clustering Techniques on Content-Based Pattern Generation Algorithm for Low Bit Rate Video Coding. 320-325 - Ross Eldridge, Heiko Rudolph, Jonathan Duckworth

, Peter H. Wilson
:
Improved Background Removal through Polarisation in Vision-Based Tabletop Interface. 326-331 - Tam Phuong Cao, Darrell M. Elton, John C. Devlin:

Real-time Linear Projection Speed Sign Detection System in Low Light Conditions. 332-338 - Luke Domanski:

Slice and Blockwise Well-Composed Sets. 339-345
Mobile/Wireless Computing III
- Yiling Wang, Phu Dung Le, Balasubramaniam Srinivasan:

Hybrid Group Key Management Scheme for Secure Wireless Multicast. 346-351 - Jing He

, Yanchun Zhang, Guangyan Huang, Yong Shi:
Network Lifetime of Application-Specific Randomly Deployed Wireless Sensor Networks in Arbitrary Sensor Density. 352-357 - Md. Mahbubur Rahman, Md. Delowar Hossain

, A. B. M. Shawkat Ali
:
Performance Analysis of OFDM Systems with Phase Noise. 358-362 - Belal Chowdhury, Rajiv Khosla:

RFID-based Hospital Real-time Patient Management System. 363-368 - Ahadur Rahaman, Jemal H. Abawajy, Michael Hobbs

:
Taxonomy and Survey of Location Management Systems. 369-374 - Shawn Haggett, Greg Knowles, Graham Bignell:

Tokenisation of Class Files for an Embedded Java Processor. 375-381
Knowledge Discovery, Artificial Intelligence, Neural Networks, and Genetic Algorithms I
- Abu Saleh Shah Muhammad Barkat Ullah

, Ruhul A. Sarker
, David Cornforth:
A Combined MA-GA Approach for Solving Constrained Optimization Problems. 382-387 - Mahmoud Tarokh:

A Genetic Robot Path Planner with Fuzzy Logic Adaptation. 388-393 - Bager Zarei

, Mohammad Reza Meybodi, Mortaza Abbaszadeh Meinagh
:
A Hybrid Method for Solving Traveling Salesman Problem. 394-399 - Mauritsius Tuga

, Regina Berretta
, Alexandre Mendes
:
A Hybrid Simulated Annealing with Kempe Chain Neighborhood for the University Timetabling Problem. 400-405 - Mohamed Shaarawy, Mohamed Belal, Ehab ElGindy:

A Neuro-Fuzzy Model for Motion Cognition. 406-411 - Megan Woods, Iqbal Gondal

:
A Procedural Approach to Forecasting Nocturnal Air Temperature for Frost Prediction. 412-418
Image, Acoustic, Speech, and Signal Processing I
- Jia Rong

, Yi-Ping Phoebe Chen
, Morshed U. Chowdhury
, Gang Li
:
Acoustic Features Extraction for Emotion Recognition. 419-424 - Mieng Quoc Phu, Peter E. Tischer, Hong Ren Wu

:
Statistical Analysis of Impulse Noise Model for Color Image Restoration. 425-431 - Prashan Premaratne

, Farzad Safaei
:
2D Barcodes as Watermarks in Image Authentication. 432-437 - Md. Shamsul Huda, John Yearwood, Ranadhir Ghosh:

A Hybrid Algorithm for Estimation of the Parameters of Hidden Markov Model based Acoustic Modeling of Speech Signals using Constraint-Based Genetic Algorithm and Expectation Maximization. 438-443 - Carol Pedersen, Joachim Diederich:

Accent Classification Using Support Vector Machines. 444-449 - Cheng-Hsiung Hsieh, Ren-Hsien Huang, Ting-Yu Feng:

One-Dimensional Grey Polynomial Interpolators for Image Enlargement. 450-456
Intelligent Agent Technology, Agent Based Systems
- Fenghui Ren

, Minjie Zhang
, Quan Bai
:
A Fuzzy-Based Approach for Partner Selection in Multi-Agent Systems. 457-462 - Ickjai Lee

, Bayani Portier:
An Empirical Study of Knowledge Representation and Learning within Conceptual Spaces for Intelligent Agents. 463-468 - Paola Flocchini, Amiya Nayak

, Arno Schulz:
Decontamination of Arbitrary Networks using a Team of Mobile Agents with Limited Visibility. 469-474 - Eduardo Rodrigues Gomes, Ryszard Kowalczyk

:
Learning in Market-based Resource Allocation. 475-482 - Sarmad Sadik, Arshad Ali

, Hafiz Farooq Ahmad
, Hiroki Suguri:
Policy based Ontology Framework for Mobile Agents. 483-488 - Neeraj Kumar Nehra, R. B. Patel, Vijay Kumar Bhat

:
Routing with Load Balancing in Ad Hoc Network: A Mobile Agent Approach. 489-495
Knowledge Discovery, Artificial Intelligence, Neural Networks, and Genetic Algorithms II
- Iqbal Gondal

, Muhammad Shoaib B. Sehgal, Mudasser Iqbal, Joarder Kamruzzaman
:
Ambient Cardiac Expert: A Cardiac Patient Monitoring System using Genetic and Clinical Knowledge Fusion. 496-501 - Ru Nie, Jianhua Yue

:
An Attribute Reduction Method Based on Rough Set and SVM and with Application in Oil-Gas Prediction. 502-506 - Chinnu Subramaniam, Jiyuan An, Jayavardhana Gubbi, Yi-Ping Phoebe Chen

:
Finding Motifs in miRNA Sequences. 507-512 - Ickjai Lee

, Kyungmi Lee:
Higher Order Voronoi Diagrams for Concept Boundaries and Tessellations. 513-518 - S. M. Kamrul Hasan, Ruhul A. Sarker

, David Cornforth:
Hybrid Genetic Algorithm for Solving Job-Shop Scheduling Problem. 519-524 - Ramesh Ram, Madhu Chetty

:
Learning Structure of a Gene Regulatory Network. 525-531
Data Mining, Data Warehousing, and Database
- A. B. M. Shawkat Ali, Tony Dobele:

A Novel Classifier Selection Approach for Adaptive Boosting Algorithms. 532-536 - Helyane Bronoski Borges

, Júlio C. Nievola:
Gene-finding as an Attribute Selection Task. 537-542 - Yu-lung Lo, Chun-Hsiung Wang:

Hybrid Multi-Feature Indexing for Music Data Retrieval. 543-548 - M. H. Peyravi, P. Khosraviyan Dehkordi, Z. Davari Nejad:

Obtain Weather Data with Data Warehousing. 549-554 - Bryon K. Ehlmann:

ORN Additive: Shrinking the Gap between Database Modeling and Implementation. 555-560 - Hu Wang, Chunqiang Gong, Yan Li

:
Service-mining Based on the Knowledge and Customer Databases. 561-568
Communication Systems, Networks, and Wireless Networks I
- Li Yi, Ji Hong:

A New Cooperative Communication MAC Strategy for Wireless Ad Hoc Networks. 569-574 - Jun Han, Zhaohao Sun

, Jinpeng Huai, Xian Li:
An Efficient Node Partitioning Algorithm for the Capacitated Minimum Spanning Tree Problem. 575-580 - Iqbal Gondal

, Mudasser Iqbal, Megan Woods, Muhammad Shoaib B. Sehgal:
Integrated Sensing and Diagnosis -- The next step in Real Time Patient Health Care. 581-586 - Abolfazl Toroghi Haghighat, Mostafa Esmaeili, Amin Saremi, V. R. Mousavi:

Intrusion Detection via Fuzzy-Genetic Algorithm Combination with Evolutionary Algorithms. 587-591 - Shui Yu

, Zhongwen Li:
Massive Data Delivery in Unstructured Peer-to-Peer Networks with Network Coding. 592-597 - Himanshu Agrawal, Melanie Grah, Mark A. Gregory

:
Optimization of QoS Routing. 598-603
Parallel and Distributed Computing and Systems
- Fadi N. Sibai

:
3D Graphics Performance Scaling and Workload Decomposition and Analysis. 604-609 - Hu Zhang, Weiguo Wu, Xiaoshe Dong

, Depei Qian, Luogeng Dai:
A Study on Data Placement of Extensible Parallel Storage System. 610-615 - John Casey, Ashley Chonka, Wanlei Zhou

:
Adjacency Cache: Fast Web Cache Indexing and Lookup. 616-621 - Maryam Amiripour, Hamid Abachi:

Average Routing Distance Analysis and Comparison of Master-Slave Super-Super-Hypercube 4-Cube Topology with different Message Passing Architectures. 622-626 - Yang Sun, Teng-Tiow Tay:

Improving Interactive Experience of Thin Client Computing by Reducing Data Spikes. 627-632 - Thuy T. Le:

Approximate Element Computational Time for Domain Decomposition in Parallel Finite Element Code. 633-639
Middleware Architectures and Techniques I
- Yantao Guo, Aijun Wen, Zengji Liu, Zhiqing Zhang:

A Novel Differentiated Service Hybrid Signaling Protocol for Optical Burst Switching Networks. 640-645 - Sunam Pradhan, Arkady B. Zaslavsky:

A Smart Proxy for a Next Generation Web Services Transaction. 646-651 - Lau Cheuk Lung, Joni da Silva Fraga:

Adapting the FT-CORBA Replication Management Service for Large-scale Distributed Systems. 652-657 - Cong-Kha Pham

, Koutaro Yamano:
An Edge Extraction Method for Color Image Using Multiple-Valued LoG Filter and Color Space. 658-662 - Leila Ismail

:
Evaluation of Authentication Mechanisms for Mobile Agents on top of Java. 663-668 - Wei Dai, Jonathan J. Liu:

Intelligent Adaptive Services for On-demand Systems Integration. 669-675
Communication Systems, Networks, and Wireless Networks II
- Iftekhar Ahmad

, Joarder Kamruzzaman
, Daryoush Habibi
:
Rerouting Technique for Faster Restoration of Preempted Calls. 676-681 - Atef Z. Ghalwash, Aliaa A. A. Youssif

, Sherif M. Hashad, Robin Doss
:
Self Adjusted Security Architecture for Mobile Ad Hoc Networks (MANETs). 682-687 - Seungyeon You, Sungchun Kim:

The Virtual Topology Reconfiguration Controller for WDM Networks. 688-693 - Klangjai Sithitavorn, Campbell Wilson, Bin Qiu:

Towards Multicast Delay Analysis for Ad hoc Wireless Networks. 694-699 - Lin Zou, Zhongwei Zhang:

A Comparative Study on the Performance of Wireless Sensor Networks. 700-705 - Ming Li:

Cross-layer Resource Control to Improve TCP Performance over Wireless Network. 706-711
Information Management Systems, Economic and Financial Systems, Control and Intelligent Systems
- Ashley M. Aitken:

Managing Unstructured and Semi-Structured Information in Organisations. 712-717 - Chen-Yang Cheng, Vittal Prabhu:

Performance Modeling of Business Processes Enabled by RFID and Web Services. 718-723 - Les R. Foulds, Mohammed Quaddus, Martin West:

Structural Equation Modelling of Large-scale Information System Application Development Productivity: the Hong Kong Experience. 724-731 - Jirawute Choungsirakulwit, Daricha Sutivong

:
Portfolio Management of Option-Based Investment in Technology Research and Development. 732-737 - Adriano Cavalcanti, Bijan Shirinzadeh, Declan G. Murphy

, Julian Smith
:
Nanorobots for Laparoscopic Cancer Surgery. 738-743 - Gwo-Ruey Yu:

Robust-Optimal Control of a Nonlinear Two Degree-of-Freedom Helicopter. 744-749 - Manoranjan Paul

, Golam Sorwar:
Encoding and Decoding Techniques for Medical Video Signal Transmission and Viewing. 750-756
Internet Technology and Applications, e-Commerce
- Md. Rafiqul Islam, Wanlei Zhou

, Morshed U. Chowdhury
:
Dynamic Feature Selection for Spam Filtering Using Support Vector Machine. 757-762 - Daewook Lee, Joonho Kwon, SeungHoon Yang, Sukho Lee:

Improvement of the Recall and the Precision for Semantic Web Services Search. 763-768 - Roula Michaelides, Dennis F. Kehoe:

Internet Communities and Open innovation: an Information System Design Methodology. 769-775 - Soon-Keow Chong, Jemal H. Abawajy, Robert A. Dew:

A Multilevel Trust Management Framework. 776-781 - Qiong Ren, Yi Mu, Willy Susilo

:
SEFAP: An Email System for Anti-Phishing. 782-787 - Wenying Feng, Hua Chen:

A Matrix Algorithm forWeb Cache Pre-fetching. 788-794
Visual and Multimedia Computing
- Atul Sajjanhar, Guojun Lu

, Dengsheng Zhang
, Wanlei Zhou
:
A Composite Descriptor for Shape Retrieval. 795-800 - Dengsheng Zhang

, Melissa Chen Yi Lim:
An Efficient and Robust Technique for Region Based Shape Representation and Retrieval. 801-806 - Rakib Ahmed, Gour C. Karmakar, Laurence S. Dooley:

Efficient Probabilistic Spatio-Temporal Video Object Segmentation. 807-811 - Siddhivinayak Kulkarni:

Image Retrieval Based on Fuzzy Mapping of Image Database and Fuzzy Similarity Distance. 812-817 - Mohan Ponnada, Nalin K. Sharda:

Model of a Semantic Web Search Engine for Multimedia Content Retrieval. 818-823 - Wenxiong Kang, Feiqi Deng

:
Research on Intelligent Visual Surveillance for Public Security. 824-829
1st IEEE/ACIS International Workshop on e-Activity I
- Eun Seok Jeong, Chul Sur, Kyung Hyune Rhee:

A New DRM System Based on Graded Contents Sharing and Time-Block Distribution for Home Networks. 830-833 - Yonghee You, Mee Young Sung, Kyungkoo Jun:

An Integrated Haptic Data Transmission in Haptic Collaborative Virtual Environments. 834-839 - Tomoya Kobayashi, Kazushi Nishimoto:

Analysis of relations between spoken utterances and text messages in chat-augmented meetings. 840-843 - Jizhong Zhao, Min Xi, Yong Qi:

Cache Predicting Algorithm Based on Context-Aware in Pervasive Computing. 844-849 - Takayuki Fujimoto

, Tokuro Matsuo:
A Campus Information Processing based on Educational Resources Reuse and Integration. 850-855 - Gang Chen, Ruimin Shen, Jiajun Wang, Zeyu Chen:

Collaborative Education Model and Its Application in E-learning. 856-860
Software Architectures and Frameworks, Software Reuse and Software Testing
- Jayamsakthi Shanmugam, M. Ponnavaikko:

A solution to block Cross Site Scripting Vulnerabilities based on Service Oriented Architecture. 861-866 - Zhikun Zhao, Wei Li:

Dynamic Reconfiguration Planning with Influence Control. 867-872 - Raymond Wu:

Validation process and component analysis in semantic mediation. 873-878 - Gongzhu Hu, Ivan Milenkovic:

Collaborative File Editor Using Repository in a Box. 879-884 - Dae Wan Cho, Hyeon Soo Kim, Seunguk Oh:

A new approach to detecting memory access errors in C programs. 885-890 - Weiqun Zheng, Gary A. Bundell:

Model-Based Software Component Testing: A UML-Based Approach. 891-899
Parallel and Distributed Computing, Visual and Multimedia Computing
- Xuemei Zhao, Karl Sammut

, Fangpo He
, Shaowen Qin
:
Split Private and Shared L2 Cache Architecture for Snooping-based CMP. 900-905 - Oluwafemi O. Ajayi, Richard O. Sinnott

, Anthony Stell:
Trust Realisation in Multi-domain Collaborative Environments. 906-911 - Dawei Jia, Kathy Blashki, Penelope Goward, R. T. Jim Eales:

Investigating the Shared Visual Context in Distributed Collaborative Work. 912-917 - Samar Zutshi, Campbell Wilson, Bala Srinivasan:

Reduct-Based Result Set Fusion for Relevance Feedback in CBIR. 918-923 - Wei Zhou, Zengfu Wang:

Speech Animation Based on Chinese Mandarin Triphone Model. 924-929 - Gunwoo Kim, Yan Wang, Hyewon Seo:

Motion Control of a Dancing Character with Music. 930-936
1st IEEE/ACIS International Workshop on e-Activity II
- Hyunja Lee, Junho Shim

:
Conceptual Modeling of Product Information in e-Commerce. 937-942 - Tokuro Matsuo, Takayuki Fujimoto

:
A New Cooperative Communication System in Distance Education. 943-948 - Jun Han, Xudong Liu, Jinpeng Huai, Xuelian Lin, Xiaoxuan Ma, Xian Li:

InfoXP: An E-government Information eXchange Platform Based on Overlay Network. 949-954 - Tae-Hum Lim, Sang-Uk Shin:

Intelligent Access Control Mechanism for Ubiquitous Applications. 955-960 - Yang Sun, Teng-Tiow Tay:

Long Distance Redundancy Reduction in Thin Client Computing. 961-966 - Sajad Shirali-Shahreza, Mohammad Shirali-Shahreza, Ali Movaghar

:
Restricted Access to Exam Grades on the Web by HIP. 967-971
Data Mining, Knowledge Discovery, Neural Networks and Genetic Algorithms
- A. B. M. Shawkat Ali, Yang Xiang

:
Spam Classification Using Adaptive Boosting Algorithm. 972-976 - Shangping Dai, Li Gao, Qiang Zhu, Changwu Zhu:

A Novel Genetic Algorithm Based on Image Databases for Mining Association Rules. 977-980 - Wei Xie, Musa A. Mammadov, John Yearwood:

Using Links to Aid Web Classification. 981-986 - Sol Hart, John Yearwood, Adil M. Bagirov

:
Visual Tools for Analysing Evolution, Emergence, and Error in Data Streams. 987-992 - Suriya Kaewarsa, Kitti Attakitmongcol, Thanatchai Kulworawanichpong:

Recognition of Power Quality Events by Using Multiwavelet-Based Neural Network. 993-998 - Nazar M. Zaki

, Safaai Deris, Saleh Alwahaishi
:
SubSS: A Protein-Protein Interaction Detection Tool. 999-1004 - ChunZhi Xie, Liangzhong Yi, Yajun Du, Zheng Pei:

The Research of Social Navigation based on Fuzzy Concept Lattice. 1005-1011
Programming Languages, Technology Education, and Training
- Kostadin Kratchanov, Tzanko Golemanov, Emilia Golemanova:

Control Network Programming. 1012-1018 - Stephen Drape, Anirban Majumdar, Clark D. Thomborson

:
Slicing Aided Design of Obfuscating Transforms. 1019-1024 - Faisal Sana, Shakeel Ahmed Khoja

:
A Low Cost Interactive Distance Learning Solution. 1025-1029 - Huiming Yu, Xiaohong Yuan, Jinsheng Xu, Stephen Providence

, Bill Chu, Dechang Gu:
Bridge Information Assurance Education Gap between the Majority and Minority Universities through Collaboration. 1030-1035 - Bei-tseng Chu, Gail-Joon Ahn

, Steven Blanchard, James Deese, Richard Kelly, Huiming Yu, Ashika Young:
Collegiate Cyber Game Design Criteria and Participation. 1036-1041 - Grace W. Rumantir:

Information Technology Project Management Curriculum Practice. 1042-1048
1st IEEE/ACIS International Workshop on e-Activity III
- B. Srikanth, D. Kirubakaran, N. Siddharth, Sudip Sanyal:

Software Installation on a Huge Heterogeneous Network using Mobile Agents. 1049-1052 - Heung Seok Chae, Tae Yeon Kim, Woo-Sung Jung, Joon-Sang Lee:

Using Metrics for Estimating Maintainability of Web Applications: An Empirical Study. 1053-1059
Software Metrics, Process Management, and Improvement
- Komsan Srivisut

, Pornsiri Muenchaisri:
Bad-Smell Metrics for Aspect-Oriented Software. 1060-1065 - Sean Thompson, Torab Torabi, Purva Joshi:

A Framework to Detect Deviations During Process Enactment. 1066-1073 - Jeewani Anupama Ginige

, Athula Ginige
:
Challenges and Solutions in Process Automation in Tertiary Education Institutes: An Australian Case Study. 1074-1079 - Jeewani Anupama Ginige

, Athula Ginige
, Uma Sirinivasan:
CAD model of Process Elements: Towards Effective Management of Process Evolution in Web-based Workflows. 1080-1086
Speech Processing and Healthcare Engineering
- Yousof Erfani, Mohammad Shahram Moin

, Mehdi Parviz
:
New Methods for Transparent and Accurate Echo Hiding By Using the Original Audio Cepstral Content. 1087-1092 - Cheng-Hsiung Hsieh, Ting-Yu Feng, Ren-Hsien Huang:

Voice Activity Detection Based on GM(1, 1) Model. 1093-1098 - Christopher J. Page, Syed Mahfuzul Aziz

:
Automated Speech Discrimination using Frequency Derivative Threshold Detection. 1099-1103 - Abdul Hafeez-Baig

, Shelly Grist, Raj Gururajan:
Technology Management, Data management, Improved outcomes, Efficiency and Software limitation influencing the use of wireless technology for healthcare in Pakistan. 1104-1110
Middleware Architectures and Techniques, Internet Technology and Applications
- Xinfeng Ye:

Providing Reliable Web Services through Active Replication. 1111-1116 - Alex Ng

:
Towards a Table Driven XML QoS Aware Transmission Framework. 1117-1123 - Alauddin Ahmed

, Atiqur Rahman, Mohammed Anwer, Nazmul Haque, Morshed U. Chowdhury
:
Two Logical Verification of Quantum NOT Gate. 1124-1128 - Omar Khadeer Hussain

, Elizabeth Chang
, Farookh Khadeer Hussain, Tharam S. Dillon:
Determining the Loss of Investment Probability for Risk based Decision Support System. 1129-1134 - Wen-Shan Lin

, Ming-Fong Chen, Yan-Yan Chen:
Understanding Consumer Search Activity and Online Purchase Intensions for Improving the Product Recommendation Search. 1135-1140

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














