


default search action
ACIIDS 2009: Dong hoi, Quang binh, Vietnam
- Ngoc Thanh Nguyen, Huynh Phan Nguyen, Adam Grzech:

First Asian Conference on Intelligent Information and Database Systems, ACIIDS 2009, Dong hoi, Quang binh, Vietnam, April 1-3, 2009. IEEE Computer Society 2009, ISBN 978-0-7695-3580-7
Invited Papers
- Adam Grzech:

Intelligent Distributed Intrusion Detection Systems of Computer Communication Systems. 1-6 - Adam Janiak, Radoslaw Rudek

, Wladyslaw A. Janiak:
On Scheduling Problems with an Intelligent Use of the Learning Effect. 7-12
Data Mining and Knowledge Discovery
- Bac Le, Huy Nguyen, Tung Anh Cao, Bay Vo:

A Novel Algorithm for Mining High Utility Itemsets. 13-17 - Martin Mozina, Claudio Giuliano, Ivan Bratko:

Argument Based Machine Learning from Examples and Text. 18-23 - Hyontai Sug:

A Structural Sampling Technique for Better Decision Trees. 24-27 - Leszek Borzemski

, Gabriel Starczewski:
Application of Transfer Regression to TCP Throughput Prediction. 28-33 - Katarzyna Musial, Krzysztof Juszczyszyn:

Motif-Based Analysis of Social Position Influence on Interconnection Patterns in Complex Social Network. 34-39 - Oviliani Yenty Yuliana

, Suphamit Chittayasothorn:
Deriving Conceptual Schema from XML Databases. 40-45 - Younghee Kim, Ungmo Kim:

Mining Multilevel Association Rules on RFID Data. 46-50 - Feng Zhang, Guang Qiu, Jiajun Bu, Mingcheng Qu, Chun Chen:

A Novel Approach to Keyword Extraction for Contextual Advertising. 51-56 - Andrzej Swierniak

, Krzysztof Fujarewicz
, Krzysztof Simek, Michal Swierniak:
Class Prediction and Pattern Discovery in Microarray Data - Artificial Intelligence and Algebraic Methods. 57-60 - Jui-Yu Wu, Chi-Jie Lu

:
Applying Classification Problems via a Data Mining Approach Based on a Cerebellar Model Articulation Controller. 61-66 - Radek Burget

, Ivana Rudolfova
:
Web Page Element Classification Based on Visual Features. 67-72 - Xuefei Leng, Yuanhung Lien, Keith Mayes, Konstantinos Markantonakis

, Jung-Hui Chiu:
Select-Response Grouping Proof for RFID Tags. 73-77 - Grzegorz Kolaczek

:
An Approach to Identity Theft Detection Using Social Network Analysis. 78-81 - Ehsan Mohebi, Mohd. Noor Md. Sap:

Rough Set Based Clustering of the Self Organizing Map. 82-85 - Anirut Suebsing, Nualsawat Hiransakolwong:

Feature Selection Using Euclidean Distance and Cosine Similarity for Intrusion Detection Model. 86-91 - Tzu-Fu Chiu, Chao-Fu Hong, Yu-Ting Chiu:

Visualizing the Financial Situations and Trends via Chance Discovery. 92-97 - Hai Jin, Aobing Sun, Qin Zhang, Ran Zheng, Ruhan He:

Pulmonary Disease Census Aiding System Based on Medical Image Grid. 98-103 - Hoang Chi Thanh:

Parallel Dimensionality Reduction Transformation for Time-Series Data. 104-108 - Wing Teng Ho, Hao Wooi Lim, Yong Haur Tay

:
Two-Stage License Plate Detection Using Gentle Adaboost and SIFT-SVM. 109-114 - Jing Yi Tou

, Yong Haur Tay
, Phooi Yee Lau:
Rotational Invariant Wood Species Recognition through Wood Species Verification. 115-120
Knowledge and Information Retrieval
- Pham Van Chung, Duong Tuan Anh:

From Checking Integrity Constraints to Temporal Abstraction for Clinical Databases. 121-126 - Janusz Sobecki

, Krzysztof Piwowar:
Comparison of Different Recommendation Methods for an e-Commerce Application. 127-131 - Mohammed Nazim Uddin, Jenu Shrestha, GeunSik Jo:

Enhanced Content-Based Filtering Using Diverse Collaborative Prediction for Movie Recommendation. 132-137 - Anh-Nga Lai, Keon Hee Park, Manoj Kumar, Gueesang Lee:

Korean Text Extraction by Local Color Quantization and K-means Clustering in Natural Scene. 138-143 - Mi-Young Kim

:
Natural Language Watermarking by Morpheme Segmentation. 144-149 - Choon-Ching Ng, Ali Selamat:

Improved Letter Weighting Feature Selection on Arabic Script Language Identification. 150-154 - Shahrouz Moaven, Ali Kamandi

, Jafar Habibi, Hamed Ahmadi:
Toward a Framework for Evaluating Heterogeneous Architecture Styles. 155-160 - Son Bao Pham, Giang Binh Tran, Dang Duc Pham, Kien Chi Phung, Kien Trung Nguyen:

An Information Extraction Approach to English-Vietnamese Weather Bulletins Machine Translation. 161-166 - Sanghoon Jun, Byeong-jun Han, Eenjun Hwang:

A Similar Music Retrieval Scheme Based on Musical Mood Variation. 167-172 - Junghee Kim, You Lin Jin, Sang Boem Lim, Karpjoo Jeong

, Jeong Hun Woo, Eun Yi Kim
:
A Data Management System for Distributed Real-Time Emissions and Air Pollutants Monitoring System. 173-178 - Grzegorz Popek, Radoslaw P. Katarzyniak

:
Agent-Based Generation of Personal Thesaurus. 179-182 - Wojciech A. Lorkiewicz, Radoslaw P. Katarzyniak

:
Representing the Meaning of Symbols in Autonomous Agents. 183-189 - Ninh-Thuan Truong, Thi-Mai-Thuong Tran, Van-Khanh To

, Viet Ha Nguyen:
Checking the Consistency between UCM and PSM Using a Graph-Based Method. 190-195 - Abhirup Chakraborty, Ajit Singh:

Processing Exact Results for Sliding Window Joins over Time-Sequence, Streaming Data Using a Disk Archive. 196-201 - Dariusz Król

, Grzegorz Stanislaw Kukla:
Quantitative Analysis of the Error Propagation Phenomenon in Distributed Information Systems. 202-207
Soft Computing
- María Eugenia Cabello

, Isidro Ramos, Abel Gómez
, Rogelio N. Limón Cordero:
Baseline-Oriented Modeling: An MDA Approach Based on Software Product Lines for the Expert Systems Development. 208-213 - Zhiqiang Gao, Zhizheng Zhang, Zhisheng Huang:

Extensions to the Relational Paths Based Learning Approach RPBL. 214-219 - Trong Hieu Tran

, Ngoc Thanh Nguyen:
Security Policy Integration Method for Information Systems. 220-225 - Leehter Yao, Kuei-Sung Weng, Ren-Wei Chang:

A Fuzzy Classifier with Directed Initialization Adaptive Learning of Norm Inducing Matrix. 226-231 - Leehter Yao, Kuei-Sung Weng, Ren-Wei Chang:

Fuzzy Classification of Incomplete Data with Adaptive Volume. 232-237 - Po-Chen Chen, Ken Yeh, Cheng-Wu Chen, Shu-Hao Lin:

Stability Analysis of Fuzzy Control for Nonlinear Systems. 238-242 - Ken Yeh, Cheng-Wu Chen, Shu-Hao Lin, Chen-Yuan Chen:

Stability Analysis of Time-Delay Fuzzy Systems Using Fuzzy Lyapunov Method. 243-248 - Po-Chen Chen, Ken Yeh, Cheng-Wu Chen, Chen-Yuan Chen:

Application to GA-Based Fuzzy Control for Nonlinear Systems with Uncertainty. 249-252 - Tadeusz Lasota, Ewa Pronobis, Bogdan Trawinski, Krzysztof Trawinski

:
Exploration of Soft Computing Models for the Valuation of Residential Premises Using the KEEL Tool. 253-258 - Jonas C. P. Yu, Yu-Siang Lin

, Kung-Jeng Wang, Hui-Ming Wee:
Using AI Approach to Solve an Integrated Three-Echelon Supply Chain Model with Strategic Alliances. 259-264 - Nguyen Thanh Trung, Tran Ngoc Tuan, Duong Tuan Anh:

Informed Simulated Annealing for Optimizing Dorm Room Assignments. 265-270 - Hamid Mohamadi, Jafar Habibi, Shahrouz Moaven:

Knowledge Discovery Using a New Interpretable Simulated Annealing Based Fuzzy Classification System. 271-276 - Kashif Saleem

, Norsheila Fisal, Muhammad Sharil Abdullah, A. B. Zulkarmwan, Sharifah Hafizah Syed Ariffin
, Sharifah Kamilah Syed Yusof
:
Proposed Nature Inspired Self-Organized Secure Autonomous Mechanism for WSNs. 277-282 - Huynh Thi Thanh Binh, Nguyen Duc Nghia:

New Multi-parent Recombination in Genetic Algorithm for Solving Bounded Diameter Minimum Spanning Tree Problem. 283-288 - Chih-Hung Wu

, Wei-Ting Li, Chin-Chia Hsu, Chi-Hua Li, I-Ching Fang, Chia-Hsiang Wu:
A Novel Multi-objective Affinity Set Classification System: An Investigation of Delayed Diagnosis Detection. 289-294 - Chih-Hung Wu

, Chi-Hua Li, I-Ching Fang, Chin-Chia Hsu, Wei-Ting Lin, Chia-Hsiang Wu:
Hybrid Genetic-Based Support Vector Regression with Feng Shui Theory for Appraising Real Estate Price. 295-300 - Tzung-Pei Hong, Wei-Tee Lin, Chun-Hao Chen, Chen-Sen Ouyang:

Learning Membership Functions in Takagi-Sugeno Fuzzy Systems by Genetic Algorithms. 301-306 - The Duy Bui, Duy Khuong Nguyen, Tien Dat Ngo:

Supervising an Unsupervised Neural Network. 307-312 - Dong-Min Woo, Dong-Chul Park:

Implicit Camera Calibration Using MultiLayer Perceptron Type Neural Network. 313-317 - Chi-Jie Lu

, Jui-Yu Wu, Tian-Shyug Lee:
ICA-Based Signal Reconstruction Scheme with Neural Network in Time Series Forecasting. 318-323 - Mohd Hezri Fazalul Rahiman

, Mohd Nasir Taib
, Yusof Md Salleh:
Black Box Modeling of Steam Distillation Essential Oil Extraction System Using NNARX Structure. 324-329 - Pei-Chann Chang

, Chin-Yuan Fan
, Jih-Chang Hsieh:
A Weighted Evolving Fuzzy Neural Network for Electricity Demand Forecasting. 330-335 - Ying-Chun Guo, Dong-Xiao Niu:

Short-Term Load Forecasting Using Support Vector Regression Based on Pattern-Base. 336-340 - Ping-Feng Pai

, Ying-Chieh Chang, Yu-Pin Hu:
Management of Wireless Local Area Networks by Artificial Neural Networks with Principal Components Analysis. 341-345 - Hyunsoek Choi

, Miyoung Shin:
Learning Radial Basis Function Model with Matching Score Quality for Person Authentication in Multimodal Biometrics. 346-350
Technology for Autonomous System Implementation and Design
- Guo-Ming Fang, Jim-Min Lin, Zeng-Wei Hong

, De-Sheng Chen:
An Agent-Based Workflow System for Assisting in IC Design. 351-355 - Jason J. Jung

:
Towards Collaborative Spam Filtering Based on Collective Intelligence. 356-361 - Chen Ni, Hyeon-Cheol Zin, Bokman Lee, Dosam Hwang, Chonggun Kim:

Dynamic Packet Balancing Agent in MANETs Based on AOMDV. 362-367 - Chulmo Koo, Jason J. Jung

, Daeyong Lee:
Exploring the Use of Social Communications Technologies in Tasks and Its Performance in Organizations. 368-373 - Yue-Shan Chang, Pei-Chun Shih, Tong-Ying Juang:

RAKER: Resource-Aware Knowledge Extraction aRchitecture on Mobile Grid. 374-379 - Rerkchai Fooprateepsiri

, Surakarn Duangphasuk:
A Highly Robust Method for Face Authentication. 380-385 - Anh Viet Nguyen, Eungjoo Lee:

Real-Time Human Recognition by Their Walk. 386-391 - Alejandro Peña Ayala

:
Student Modelling Based on Ontologies. 392-397 - Jerzy Klamka:

Controllability and Minimum Energy Control Problem of Infinite Dimensional Fractional Discrete-Time Systems with Delays. 398-403 - Chung-Ming Yang, Su-Fen Yang:

Adaptive Control Scheme for a Process with Incorrect Adjustment. 404-409 - Ping-Hui Hsu, Hui-Ming Teng, Hui-Ming Wee:

Optimal Production Decisions for Deteriorating Items with Investment on Production Processes. 410-413
Workshop on Computer Networks and Communication
- David Lai

, Zhongwei Zhang:
Improving Efficiency and Scalability of Service Network Graph by Re-routing Service Routes. 414-419 - Dongxiao Niu, Yongli Wang:

A New Model to Short-Term Power Load Forecasting Combining Chaotic Time Series and SVM. 420-425 - Xingwei Wang, Hai-Quan Yang, Min Huang, Lei Guo:

ABC Supporting QoS Unicast Routing Scheme with Particle Swarm Optimization. 426-429 - Takayuki Shizuno, Tsutomu Kitamura, Toshiya Okabe, Hideaki Tani:

Comparison of Data-Searching Algorithms for a Real-Time Information-Delivery System. 430-435 - Dac-Tu Ho

, Shigeru Shimamoto:
A Proposal of Relaying Data in Aeronautical Communication for Oceanic Flight Routes Employing Mobile Ad-Hoc Network. 436-441 - Azadeh Zamanifar

, Mohsen Sharifi
, Omid Kashefi
:
Self Actor-Actor Connectivity Restoration in Wireless Sensor and Actor Networks. 442-447 - Tsutomu Kitamura, Takayuki Shizuno, Toshiya Okabe, Hideaki Tani:

A Lightweight Application-Layer Signaling Protocol. 448-452 - Tam Van Nguyen, Yi Chang Woo, Deokjai Choi:

CCBR: Chaining Case Based Reasoning in Context-Aware Smart Home. 453-458 - Zhongwei Zhang, Hong Zhou, Jason Gao:

Scrutinizing Performance of Ad Hoc Routing Protocols on Wireless Sensor Networks. 459-464 - Rung Ching Chen, Kai-Fan Cheng, Ying-Hao Chen, Chia-Fen Hsieh:

Using Rough Set and Support Vector Machine for Network Intrusion Detection System. 465-470 - Huy Anh Nguyen, Tam Van Nguyen, Deokjai Choi:

How to Maximize User Satisfaction Degree in Multi-service IP Networks. 471-476 - Zbigniew Golebiewski, Michal Koza, Marek Klonowski, Miroslaw Kutylowski:

Leader Election for Multi-channel Radio Networks - Dependent versus Independent Trials. 477-482

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














