default search action
ACIIDS 2009: Dong hoi, Quang binh, Vietnam
- Ngoc Thanh Nguyen, Huynh Phan Nguyen, Adam Grzech:
First Asian Conference on Intelligent Information and Database Systems, ACIIDS 2009, Dong hoi, Quang binh, Vietnam, April 1-3, 2009. IEEE Computer Society 2009, ISBN 978-0-7695-3580-7
Invited Papers
- Adam Grzech:
Intelligent Distributed Intrusion Detection Systems of Computer Communication Systems. 1-6 - Adam Janiak, Radoslaw Rudek, Wladyslaw A. Janiak:
On Scheduling Problems with an Intelligent Use of the Learning Effect. 7-12
Data Mining and Knowledge Discovery
- Bac Le, Huy Nguyen, Tung Anh Cao, Bay Vo:
A Novel Algorithm for Mining High Utility Itemsets. 13-17 - Martin Mozina, Claudio Giuliano, Ivan Bratko:
Argument Based Machine Learning from Examples and Text. 18-23 - Hyontai Sug:
A Structural Sampling Technique for Better Decision Trees. 24-27 - Leszek Borzemski, Gabriel Starczewski:
Application of Transfer Regression to TCP Throughput Prediction. 28-33 - Katarzyna Musial, Krzysztof Juszczyszyn:
Motif-Based Analysis of Social Position Influence on Interconnection Patterns in Complex Social Network. 34-39 - Oviliani Yenty Yuliana, Suphamit Chittayasothorn:
Deriving Conceptual Schema from XML Databases. 40-45 - Younghee Kim, Ungmo Kim:
Mining Multilevel Association Rules on RFID Data. 46-50 - Feng Zhang, Guang Qiu, Jiajun Bu, Mingcheng Qu, Chun Chen:
A Novel Approach to Keyword Extraction for Contextual Advertising. 51-56 - Andrzej Swierniak, Krzysztof Fujarewicz, Krzysztof Simek, Michal Swierniak:
Class Prediction and Pattern Discovery in Microarray Data - Artificial Intelligence and Algebraic Methods. 57-60 - Jui-Yu Wu, Chi-Jie Lu:
Applying Classification Problems via a Data Mining Approach Based on a Cerebellar Model Articulation Controller. 61-66 - Radek Burget, Ivana Rudolfova:
Web Page Element Classification Based on Visual Features. 67-72 - Xuefei Leng, Yuanhung Lien, Keith Mayes, Konstantinos Markantonakis, Jung-Hui Chiu:
Select-Response Grouping Proof for RFID Tags. 73-77 - Grzegorz Kolaczek:
An Approach to Identity Theft Detection Using Social Network Analysis. 78-81 - Ehsan Mohebi, Mohd. Noor Md. Sap:
Rough Set Based Clustering of the Self Organizing Map. 82-85 - Anirut Suebsing, Nualsawat Hiransakolwong:
Feature Selection Using Euclidean Distance and Cosine Similarity for Intrusion Detection Model. 86-91 - Tzu-Fu Chiu, Chao-Fu Hong, Yu-Ting Chiu:
Visualizing the Financial Situations and Trends via Chance Discovery. 92-97 - Hai Jin, Aobing Sun, Qin Zhang, Ran Zheng, Ruhan He:
Pulmonary Disease Census Aiding System Based on Medical Image Grid. 98-103 - Hoang Chi Thanh:
Parallel Dimensionality Reduction Transformation for Time-Series Data. 104-108 - Wing Teng Ho, Hao Wooi Lim, Yong Haur Tay:
Two-Stage License Plate Detection Using Gentle Adaboost and SIFT-SVM. 109-114 - Jing Yi Tou, Yong Haur Tay, Phooi Yee Lau:
Rotational Invariant Wood Species Recognition through Wood Species Verification. 115-120
Knowledge and Information Retrieval
- Pham Van Chung, Duong Tuan Anh:
From Checking Integrity Constraints to Temporal Abstraction for Clinical Databases. 121-126 - Janusz Sobecki, Krzysztof Piwowar:
Comparison of Different Recommendation Methods for an e-Commerce Application. 127-131 - Mohammed Nazim Uddin, Jenu Shrestha, GeunSik Jo:
Enhanced Content-Based Filtering Using Diverse Collaborative Prediction for Movie Recommendation. 132-137 - Anh-Nga Lai, Keon Hee Park, Manoj Kumar, Gueesang Lee:
Korean Text Extraction by Local Color Quantization and K-means Clustering in Natural Scene. 138-143 - Mi-Young Kim:
Natural Language Watermarking by Morpheme Segmentation. 144-149 - Choon-Ching Ng, Ali Selamat:
Improved Letter Weighting Feature Selection on Arabic Script Language Identification. 150-154 - Shahrouz Moaven, Ali Kamandi, Jafar Habibi, Hamed Ahmadi:
Toward a Framework for Evaluating Heterogeneous Architecture Styles. 155-160 - Son Bao Pham, Giang Binh Tran, Dang Duc Pham, Kien Chi Phung, Kien Trung Nguyen:
An Information Extraction Approach to English-Vietnamese Weather Bulletins Machine Translation. 161-166 - Sanghoon Jun, Byeong-jun Han, Eenjun Hwang:
A Similar Music Retrieval Scheme Based on Musical Mood Variation. 167-172 - Junghee Kim, You Lin Jin, Sang Boem Lim, Karpjoo Jeong, Jeong Hun Woo, Eun Yi Kim:
A Data Management System for Distributed Real-Time Emissions and Air Pollutants Monitoring System. 173-178 - Grzegorz Popek, Radoslaw P. Katarzyniak:
Agent-Based Generation of Personal Thesaurus. 179-182 - Wojciech A. Lorkiewicz, Radoslaw P. Katarzyniak:
Representing the Meaning of Symbols in Autonomous Agents. 183-189 - Ninh-Thuan Truong, Thi-Mai-Thuong Tran, Van-Khanh To, Viet Ha Nguyen:
Checking the Consistency between UCM and PSM Using a Graph-Based Method. 190-195 - Abhirup Chakraborty, Ajit Singh:
Processing Exact Results for Sliding Window Joins over Time-Sequence, Streaming Data Using a Disk Archive. 196-201 - Dariusz Król, Grzegorz Stanislaw Kukla:
Quantitative Analysis of the Error Propagation Phenomenon in Distributed Information Systems. 202-207
Soft Computing
- María Eugenia Cabello, Isidro Ramos, Abel Gómez, Rogelio N. Limón Cordero:
Baseline-Oriented Modeling: An MDA Approach Based on Software Product Lines for the Expert Systems Development. 208-213 - Zhiqiang Gao, Zhizheng Zhang, Zhisheng Huang:
Extensions to the Relational Paths Based Learning Approach RPBL. 214-219 - Trong Hieu Tran, Ngoc Thanh Nguyen:
Security Policy Integration Method for Information Systems. 220-225 - Leehter Yao, Kuei-Sung Weng, Ren-Wei Chang:
A Fuzzy Classifier with Directed Initialization Adaptive Learning of Norm Inducing Matrix. 226-231 - Leehter Yao, Kuei-Sung Weng, Ren-Wei Chang:
Fuzzy Classification of Incomplete Data with Adaptive Volume. 232-237 - Po-Chen Chen, Ken Yeh, Cheng-Wu Chen, Shu-Hao Lin:
Stability Analysis of Fuzzy Control for Nonlinear Systems. 238-242 - Ken Yeh, Cheng-Wu Chen, Shu-Hao Lin, Chen-Yuan Chen:
Stability Analysis of Time-Delay Fuzzy Systems Using Fuzzy Lyapunov Method. 243-248 - Po-Chen Chen, Ken Yeh, Cheng-Wu Chen, Chen-Yuan Chen:
Application to GA-Based Fuzzy Control for Nonlinear Systems with Uncertainty. 249-252 - Tadeusz Lasota, Ewa Pronobis, Bogdan Trawinski, Krzysztof Trawinski:
Exploration of Soft Computing Models for the Valuation of Residential Premises Using the KEEL Tool. 253-258 - Jonas C. P. Yu, Yu-Siang Lin, Kung-Jeng Wang, Hui-Ming Wee:
Using AI Approach to Solve an Integrated Three-Echelon Supply Chain Model with Strategic Alliances. 259-264 - Nguyen Thanh Trung, Tran Ngoc Tuan, Duong Tuan Anh:
Informed Simulated Annealing for Optimizing Dorm Room Assignments. 265-270 - Hamid Mohamadi, Jafar Habibi, Shahrouz Moaven:
Knowledge Discovery Using a New Interpretable Simulated Annealing Based Fuzzy Classification System. 271-276 - Kashif Saleem, Norsheila Fisal, Muhammad Sharil Abdullah, A. B. Zulkarmwan, Sharifah Hafizah Syed Ariffin, Sharifah Kamilah Syed Yusof:
Proposed Nature Inspired Self-Organized Secure Autonomous Mechanism for WSNs. 277-282 - Huynh Thi Thanh Binh, Nguyen Duc Nghia:
New Multi-parent Recombination in Genetic Algorithm for Solving Bounded Diameter Minimum Spanning Tree Problem. 283-288 - Chih-Hung Wu, Wei-Ting Li, Chin-Chia Hsu, Chi-Hua Li, I-Ching Fang, Chia-Hsiang Wu:
A Novel Multi-objective Affinity Set Classification System: An Investigation of Delayed Diagnosis Detection. 289-294 - Chih-Hung Wu, Chi-Hua Li, I-Ching Fang, Chin-Chia Hsu, Wei-Ting Lin, Chia-Hsiang Wu:
Hybrid Genetic-Based Support Vector Regression with Feng Shui Theory for Appraising Real Estate Price. 295-300 - Tzung-Pei Hong, Wei-Tee Lin, Chun-Hao Chen, Chen-Sen Ouyang:
Learning Membership Functions in Takagi-Sugeno Fuzzy Systems by Genetic Algorithms. 301-306 - The Duy Bui, Duy Khuong Nguyen, Tien Dat Ngo:
Supervising an Unsupervised Neural Network. 307-312 - Dong-Min Woo, Dong-Chul Park:
Implicit Camera Calibration Using MultiLayer Perceptron Type Neural Network. 313-317 - Chi-Jie Lu, Jui-Yu Wu, Tian-Shyug Lee:
ICA-Based Signal Reconstruction Scheme with Neural Network in Time Series Forecasting. 318-323 - Mohd Hezri Fazalul Rahiman, Mohd Nasir Taib, Yusof Md Salleh:
Black Box Modeling of Steam Distillation Essential Oil Extraction System Using NNARX Structure. 324-329 - Pei-Chann Chang, Chin-Yuan Fan, Jih-Chang Hsieh:
A Weighted Evolving Fuzzy Neural Network for Electricity Demand Forecasting. 330-335 - Ying-Chun Guo, Dong-Xiao Niu:
Short-Term Load Forecasting Using Support Vector Regression Based on Pattern-Base. 336-340 - Ping-Feng Pai, Ying-Chieh Chang, Yu-Pin Hu:
Management of Wireless Local Area Networks by Artificial Neural Networks with Principal Components Analysis. 341-345 - Hyunsoek Choi, Miyoung Shin:
Learning Radial Basis Function Model with Matching Score Quality for Person Authentication in Multimodal Biometrics. 346-350
Technology for Autonomous System Implementation and Design
- Guo-Ming Fang, Jim-Min Lin, Zeng-Wei Hong, De-Sheng Chen:
An Agent-Based Workflow System for Assisting in IC Design. 351-355 - Jason J. Jung:
Towards Collaborative Spam Filtering Based on Collective Intelligence. 356-361 - Chen Ni, Hyeon-Cheol Zin, Bokman Lee, Dosam Hwang, Chonggun Kim:
Dynamic Packet Balancing Agent in MANETs Based on AOMDV. 362-367 - Chulmo Koo, Jason J. Jung, Daeyong Lee:
Exploring the Use of Social Communications Technologies in Tasks and Its Performance in Organizations. 368-373 - Yue-Shan Chang, Pei-Chun Shih, Tong-Ying Juang:
RAKER: Resource-Aware Knowledge Extraction aRchitecture on Mobile Grid. 374-379 - Rerkchai Fooprateepsiri, Surakarn Duangphasuk:
A Highly Robust Method for Face Authentication. 380-385 - Anh Viet Nguyen, Eung-Joo Lee:
Real-Time Human Recognition by Their Walk. 386-391 - Alejandro Peña Ayala:
Student Modelling Based on Ontologies. 392-397 - Jerzy Klamka:
Controllability and Minimum Energy Control Problem of Infinite Dimensional Fractional Discrete-Time Systems with Delays. 398-403 - Chung-Ming Yang, Su-Fen Yang:
Adaptive Control Scheme for a Process with Incorrect Adjustment. 404-409 - Ping-Hui Hsu, Hui-Ming Teng, Hui-Ming Wee:
Optimal Production Decisions for Deteriorating Items with Investment on Production Processes. 410-413
Workshop on Computer Networks and Communication
- David Lai, Zhongwei Zhang:
Improving Efficiency and Scalability of Service Network Graph by Re-routing Service Routes. 414-419 - Dongxiao Niu, Yongli Wang:
A New Model to Short-Term Power Load Forecasting Combining Chaotic Time Series and SVM. 420-425 - Xingwei Wang, Hai-Quan Yang, Min Huang, Lei Guo:
ABC Supporting QoS Unicast Routing Scheme with Particle Swarm Optimization. 426-429 - Takayuki Shizuno, Tsutomu Kitamura, Toshiya Okabe, Hideaki Tani:
Comparison of Data-Searching Algorithms for a Real-Time Information-Delivery System. 430-435 - Dac-Tu Ho, Shigeru Shimamoto:
A Proposal of Relaying Data in Aeronautical Communication for Oceanic Flight Routes Employing Mobile Ad-Hoc Network. 436-441 - Azadeh Zamanifar, Mohsen Sharifi, Omid Kashefi:
Self Actor-Actor Connectivity Restoration in Wireless Sensor and Actor Networks. 442-447 - Tsutomu Kitamura, Takayuki Shizuno, Toshiya Okabe, Hideaki Tani:
A Lightweight Application-Layer Signaling Protocol. 448-452 - Tam Van Nguyen, Yi Chang Woo, Deokjai Choi:
CCBR: Chaining Case Based Reasoning in Context-Aware Smart Home. 453-458 - Zhongwei Zhang, Hong Zhou, Jason Gao:
Scrutinizing Performance of Ad Hoc Routing Protocols on Wireless Sensor Networks. 459-464 - Rung Ching Chen, Kai-Fan Cheng, Ying-Hao Chen, Chia-Fen Hsieh:
Using Rough Set and Support Vector Machine for Network Intrusion Detection System. 465-470 - Huy Anh Nguyen, Tam Van Nguyen, Deokjai Choi:
How to Maximize User Satisfaction Degree in Multi-service IP Networks. 471-476 - Zbigniew Golebiewski, Michal Koza, Marek Klonowski, Miroslaw Kutylowski:
Leader Election for Multi-channel Radio Networks - Dependent versus Independent Trials. 477-482
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.