default search action
Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing 2008
- Roger Y. Lee:
Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing. Studies in Computational Intelligence 149, Springer 2008, ISBN 978-3-540-70559-8 - Chotirat Ann Ratanamahatana, Dechawut Wanichsan:
Stopping Criterion Selection for Efficient Semi-supervised Time Series Classification. 1-14 - Jinyoung Ahn, Vijay Shyamasundar, Yeong-Tae Song:
Enhancing the Blockage of Spam over Internet Telephony (SPIT) Using Adaptive PMG Algorithm. 15-26 - Gihan Shin, Junchul Chun:
Spatio-temporal Facial Expression Recognition Using Optical Flow and HMM. 27-38 - Mahmoud Jazzar, Aman Jantan:
An Approach for Anomaly Intrusion Detection Based on Causal Knowledge-Driven Diagnosis and Direction. 39-48 - Belal Chowdhury, Morshed U. Chowdhury, Clare D'Souza:
Challenges Relating to RFID Implementation within the Electronic Supply Chain Management - A Practical Approach. 49-59 - Ho Min Sung, Wan Yeon Lee, Jin Kim, Young Woong Ko:
Design and Implementation of Clustering File Backup Server Using File Fingerprint. 61-73 - Haeng-Kon Kim:
Aspect Oriented Testing Frameworks for Embedded Software. 75-88 - Sinjae Lee, Shaojian Zhu, Yanggon Kim, Juno Chang:
Analysis on Malicious Peer's Behavior of the P2P Trust Resource Chain Model. 89-102 - Montri Lawkobkit:
Information Technology Service Management: A Thailand Perspective. 103-111 - Rachid El Meziane, Ilham Berrada, Ismail Kassou:
A New Artificial Immune System for the Detection of Abnormal Behaviour. 113-122 - Takéhiko Nakama:
Markov Chain Analysis of Genetic Algorithms Applied to Fitness Functions Perturbed by Multiple Sources of Additive Noise. 123-136 - Françoise Sailhan, Julien Bourgeois, Valérie Issarny:
A Security Supervision System for Hybrid Networks. 137-149 - Tad Gonsalves, Kiyoshi Itoh:
Cost Minimization in Service Systems Using Particle Swarm Optimization. 151-161 - Haeng-Kon Kim, Roger Y. Lee:
MS2Web: Applying MDA and SOA to Web Services. 163-180 - Lihua Liu, Zhengjun Cao:
Security Analysis of One Verifiable Encryption Scheme. 181-187 - Thandar Thein, Sung-Do Chi, Jong Sou Park:
Proactive Fault Management with Virtualization for Software Aging. 189-200 - Smriti Agrawal, Rama Shankar Yadav, Ranvijay:
A Preemption Control Technique for System Energy Minimization of Weakly Hard Real-Time Systems. 201-215 - Naohiro Ishii, Takahiro Yamada, Yongguang Bao:
Text Classification by Relearning and Ensemble Computation. 217-226 - Kazunori Iwata, Nobuhiro Ito, Kuniyoshi Toda, Naohiro Ishii:
Analysis of Agents' Cooperation in RoboCupRescue Simulation. 227-236 - B. Chandra Mohan, R. Sandeep, D. Sridharan:
A Data Mining Approach for Predicting Reliable Path for Congestion Free Routing Using Self-motivated Neural Network. 237-246 - Gongzhu Hu:
A Formal Specification of UML Class and State Diagrams. 247-257
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.