Software Engineering,
Artificial Intelligence,
Networking and Parallel/Distributed Computing 2008
Roger Lee (Ed.):
Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing.
Studies in Computational Intelligence Vol. 149 Springer 2008, ISBN 978-3-540-70559-8
- Chotirat Ann Ratanamahatana, Dachawut Wanichsan:
Stopping Criterion Selection for Efficient Semi-supervised Time Series Classification.
1-14
- Jinyoung Ahn, Vijay Shyamasundar, Yeong-Tae Song:
Enhancing the Blockage of Spam over Internet Telephony (SPIT) Using Adaptive PMG Algorithm.
15-26
- Gihan Shin, Junchul Chun:
Spatio-temporal Facial Expression Recognition Using Optical Flow and HMM.
27-38
- Mahmoud Jazzar, Aman Jantan:
An Approach for Anomaly Intrusion Detection Based on Causal Knowledge-Driven Diagnosis and Direction.
39-48
- Belal Chowdhury, Morshed U. Chowdhury, Clare D'Souza:
Challenges Relating to RFID Implementation within the Electronic Supply Chain Management - A Practical Approach.
49-59
- Ho Min Sung, Wan Yeon Lee, Jin Kim, Young Woong Ko:
Design and Implementation of Clustering File Backup Server Using File Fingerprint.
61-73
- Haeng Kon Kim:
Aspect Oriented Testing Frameworks for Embedded Software.
75-88
- Sinjae Lee, Shaojian Zhu, Yanggon Kim, Juno Chang:
Analysis on Malicious Peer's Behavior of the P2P Trust Resource Chain Model.
89-102
- Montri Lawkobkit:
Information Technology Service Management: A Thailand Perspective.
103-111
- Rachid El Meziane, Ilham Berrada, Ismail Kassou:
A New Artificial Immune System for the Detection of Abnormal Behaviour.
113-122
- Takéhiko Nakama:
Markov Chain Analysis of Genetic Algorithms Applied to Fitness Functions Perturbed by Multiple Sources of Additive Noise.
123-136
- Françoise Sailhan, Julien Bourgeois, Valérie Issarny:
A Security Supervision System for Hybrid Networks.
137-149
- Tad Gonsalves, Kiyoshi Itoh:
Cost Minimization in Service Systems Using Particle Swarm Optimization.
151-161
- Haeng-Kon Kim, Roger Y. Lee:
MS2Web: Applying MDA and SOA to Web Services.
163-180
- Lihua Liu, Zhengjun Cao:
Security Analysis of One Verifiable Encryption Scheme.
181-187
- Thandar Thein, Sung-Do Chi, Jong Sou Park:
Proactive Fault Management with Virtualization for Software Aging.
189-200
- Smriti Agrawal, Rama Shankar Yadav, Ranvijay:
A Preemption Control Technique for System Energy Minimization of Weakly Hard Real-Time Systems.
201-215
- Naohiro Ishii, Takahiro Yamada, Yongguang Bao:
Text Classification by Relearning and Ensemble Computation.
217-226
- Kazunori Iwata, Nobuhiro Ito, Kuniyoshi Toda, Naohiro Ishii:
Analysis of Agents' Cooperation in RoboCupRescue Simulation.
227-236
- B. Chandra Mohan, R. Sandeep, D. Sridharan:
A Data Mining Approach for Predicting Reliable Path for Congestion Free Routing Using Self-motivated Neural Network.
237-246
- Gongzhu Hu:
A Formal Specification of UML Class and State Diagrams.
247-257
Copyright © Tue Mar 16 01:52:03 2010
by Michael Ley (ley@uni-trier.de)