Abstract is missing.
- Automatic Detailed Localization of Facial FeaturesQing He, Ye Duan, Danyang Zhang. 1-9 [doi]
- Confidence-Based Incremental Classification for Objects with Limited Attributes in Vertical SearchOzer Ozdikis, Pinar Senkul, Siyamed S. Sinir. 10-19 [doi]
- Algorithms for Detecting Outliers via Clustering and RanksHuaming Huang, Kishan Mehrotra, Chilukuri K. Mohan. 20-29 [doi]
- Grouping Co-occurrence Filtering Based on Bayesian FilteringTakuya Yoshimura, Yutaro Fujii, Takayuki Ito. 30-39 [doi]
- Model Fusion-Based Batch Learning with Application to Oil Spills DetectionChunsheng Yang, Yubin Yang, Jie Liu. 40-47 [doi]
- Efficient Determination of Binary Non-negative Vector Neighbors with Regard to Cosine SimilarityMarzena Kryszkiewicz. 48-57 [doi]
- Automatic Chord Recognition Based on Probabilistic Integration of Acoustic Features, Bass Sounds, and Chord TransitionKatsutoshi Itoyama, Tetsuya Ogata, Hiroshi G. Okuno. 58-67 [doi]
- A Real-Time Transportation Prediction SystemHai-Guang Li, Zhao Li, Robert T. White, Xindong Wu. 68-77 [doi]
- Several Remarks on Mining Frequent Trajectories in GraphsHenry Z. Lo, Dan A. Simovici, Wei Ding 0003. 78-87 [doi]
- Cyber-Physical Integration to Connect Vehicles for Transformed Transportation Safety and EfficiencyDaiheng Ni, Hong Liu, Wei Ding 0003, Yuanchang Xie, Honggang Wang, Hossein Pishro-Nik, Qian Yu. 88-94 [doi]
- Multi-modal Remote Sensing System for Transportation Infrastructure Inspection and MonitoringTzu-Yang Yu, Christopher Niezrecki, Farhad Ansari. 95-103 [doi]
- Operational Support in Fish Farming through Case-Based ReasoningAxel Tidemann, Finn Olav Bjørnson, Agnar Aamodt. 104-113 [doi]
- CPMD: A Matlab Toolbox for Change Point and Constrained Motif DiscoveryYasser F. O. Mohammad, Yoshimasa Ohmoto, Toyoaki Nishida. 114-123 [doi]
- Time Invariant Gesture Recognition by Modelling Body Posture SpaceBinu Muraleedharan Nair, Vijayan K. Asari. 124-133 [doi]
- Go beyond the SCOPE: A Temporal Situation Calculus-Based Software Tool for Time Petri NetsXing Tan. 134-143 [doi]
- An Algorithm of Channel Assignment of MAC Layer in Ad Hoc Network Based on Dynamic Game with Perfect and Complete InformationXiaochen Lai, Quanli Liu, Wei Wang, Likun Li, Simin Lu, Di Wu. 144-155 [doi]
- A Semantic Approach for Question AnalysisDai Quoc Nguyen, Dat Quoc Nguyen, Son Bao Pham. 156-165 [doi]
- Solving Periodic Event Scheduling Problems with SATPeter Großmann, Steffen Hölldobler, Norbert Manthey, Karl Nachtigall, Jens Opitz, Peter Steinke. 166-175 [doi]
- Improving the Performance of Constructive Multi-Start Search Using Record-KeepingDan E. Tamir, Charles R. King, Mark McKenney. 176-186 [doi]
- A Modified Particle Swarm Optimizer for Engineering DesignLi Ma, Babak Forouraghi. 187-196 [doi]
- Homogeneous RF Coil Design Using a GAKarthik Nadig, William M. Potter, Walter D. Potter. 197-205 [doi]
- A Comparative Study of Content Statistics of Coding Regions in an Evolutionary Computation Framework for Gene PredictionJavier Pérez-Rodríguez, Alexis G. Arroyo-Peña, Nicolás García-Pedrajas. 206-215 [doi]
- Enhancing Point Clouds Accuracy of Small Baseline Images Based on Convex OptimizationMy Ha Le, Andrey Vavilin, Sung-Min Yang, Kang-Hyun Jo. 216-225 [doi]
- Subset Quadratic Assignment ProblemHe Jiang, Yan Hu. 226-230 [doi]
- Forward or Ignore: User Behavior Analysis and Prediction on MicrobloggingGuanghua Song, Zhitang Li, Hao Tu. 231-241 [doi]
- Compositionality of Team Mental Models in Relation to Sharedness and Team PerformanceCatholijn M. Jonker, M. Birna van Riemsdijk, Iris van de Kieft, Maria L. Gini. 242-251 [doi]
- Feature Selection for Improved Phishing DetectionRam B. Basnet, Andrew H. Sung, Qingzhong Liu. 252-261 [doi]
- Identification of Smartphone-Image Source and ManipulationQingzhong Liu, Xiaodong Li, Lei Chen, Hyuk Cho, Peter A. Cooper, Zhongxue Chen, Mengyu Qiao, Andrew H. Sung. 262-271 [doi]
- Situation-Aware on Mobile Phone Using Co-clustering: Algorithms and ExtensionsHyuk Cho, Deepthi Mandava, Qingzhong Liu, Lei Chen, Sangoh Jeong, Doreen Cheng. 272-282 [doi]
- Persian Text Classification Based on K-NN Using WordnetMostafa Parchami, Bahareh Akhtar, MirHossein Dezfoulian. 283-291 [doi]
- An Efficient Minimum Vocabulary Construction Algorithm for Language ModelingSina Lin, Zengchang Qin, Zehua Huang, Tao Wan. 292-301 [doi]
- Effective Co-reference Resolution in Clinical TextDavid Hinote, Carlos Ramirez, Ping Chen. 302-312 [doi]
- VAHA: Verbs Associate with Human Activity - A Study on Fairy TalesHui-Ngo Goh, Lay-Ki Soon, Su-Cheng Haw. 313-322 [doi]
- A Semantic-Based Social Network of Academic ResearchersElnaz Davoodi, Keivan Kianmehr. 323-332 [doi]
- Heuristic Resource Discovery in P2P NetworkZheng Chen, Lei Wu, Jiansong Zhang, Xuemei Hu, Yang Xu. 333-342 [doi]
- The Use of a Local Histogram Feature Vector of Classifying Diffuse Lung Opacities in High-Resolution Computed TomographyYoshihiro Mitani, Yusuke Fujita, Naofumi Matsunaga, Yoshihiko Hamamoto. 343-350 [doi]
- SOM 2 CE: Double Self-Organizing Map Based Cluster Ensemble Framework and its Application in Cancer Gene Expression ProfilesZhiwen Yu, Hantao Chen, Jane You, Le Li, Guoqiang Han. 351-360 [doi]
- A Context-Aware Enterprise Search Engine for AviationHao Wang, Qingwei Liu, Tangjian Deng, Ling Feng. 361-370 [doi]
- Formal Analysis of Aviation IncidentsTibor Bosse, Nataliya M. Mogles. 371-380 [doi]
- Common Sensorimotor Representation for Self-initiated Imitation LearningYasser F. O. Mohammad, Yoshimasa Ohmoto, Toyoaki Nishida. 381-390 [doi]
- Near-Optimal Evaluation of Network Survivability under Multi-stage AttacksFrank Yeong-Sung Lin, Pei-yu Chen, Quen-Ting Chen. 391-399 [doi]
- Solving Manufacturing Cell Design Problems Using Constraint ProgrammingRicardo Soto, Hakan Kjellerstrand, Juan Gutiérrez, Alexis López, Broderick Crawford, Eric Monfroy. 400-406 [doi]
- A Pragmatic Approach to Grounding Data Computation for Modal StatementsWojciech Lorkiewicz, Grzegorz Skorupa, Radoslaw Katarzyniak. 407-416 [doi]
- G-SteX: Greedy Stem Extension for Free-Length Constrained Motif DiscoveryYasser F. O. Mohammad, Yoshimasa Ohmoto, Toyoaki Nishida. 417-426 [doi]
- Event-Level Textual Emotion Sensing Based on Common Action Distributions between Event ParticipantsCheng-Yu Lu, William W. Y. Hsu, Jan-Ming Ho. 427-436 [doi]
- Towards a Chinese Common and Common Sense Knowledge Base for Sentiment AnalysisErik Cambria, Amir Hussain, Tariq S. Durrani, Jiajun Zhang. 437-446 [doi]
- Emotion Tracking on Blogs - A Case Study for BengaliDipankar Das, Sagnik Roy, Sivaji Bandyopadhyay. 447-456 [doi]
- Pseudo-code Programming of Designer Activities in Development of Software Intensive SystemsPetr Sosnin. 457-466 [doi]
- Intelligent Aspects of AIDA ProgrammingYutaka Watanobe, Lin Gu, Nikolay N. Mirenkov. 467-476 [doi]
- Improving Healthcare Using Cognitive Computing Based Software: An Application in Emergency SituationRoberto Revetria, Alessandro Catania A., Lucia Cassettari, Guido Guizzi, Elpidio Romano, Teresa Murino, Giovanni Improta, Hamido Fujita. 477-490 [doi]
- Detecting Changing Emotions in Natural SpeechWojtek Kowalczyk, C. Natalie van der Wal. 491-500 [doi]
- An Ambient Agent Model for Support of Informal Caregivers during StressAzizi Ab Aziz, Jan Treur, C. Natalie van der Wal. 501-513 [doi]
- Interruption Theory for Improving Work Efficiency by Reasoning WorkflowKohei Sugawara, Hamido Fujita. 514-520 [doi]
- Action Selection Using Theory of Mind: A Case Study in the Domain of Fighter Pilot TrainingMark Hoogendoorn, Robbert-Jan Merk. 521-533 [doi]
- Intelligent Decision-Making Approach Based on Fuzzy-Causal Knowledge and ReasoningAlejandro Peña Ayala, Riichiro Mizoguchi. 534-543 [doi]
- Camera Motion Estimation and Moving Object Detection Based on Local Feature TrackingAndrey Vavilin, Le-My Ha, Kang-Hyun Jo. 544-552 [doi]
- Optimization of Criminal HotSpots Based on Underlying Crime Controlling Factors Using Geospatial Discriminative PatternDawei Wang, Wei Ding 0003, Tomasz F. Stepinski, Josue Salazar, Henry Z. Lo, Melissa Morabito. 553-562 [doi]
- Spatio-temporal Reasoning with Qualitative and Quantitative Information about Constraints and ApproximationsAnthony Y. Chang. 563-573 [doi]
- A Human-Like Agent Model for Attribution of Actions Using Ownership States and Inverse MirroringJan Treur, Muhammad Umair. 574-585 [doi]
- Fault Resolution Support Based on Activated Knowledge and InformationKazuto Sasai, Gen Kitagata, Tetsuo Kinoshita. 586-595 [doi]
- Creating User's Knowledge Space from Various Information Usages to Support Human RecollectionHarumi Murakami, Kenta Mitsuhashi, Keita Senba. 596-605 [doi]
- A Robust Approach to Digit Recognition in Noisy EnvironmentsOliviu Matei, Petrica C. Pop, Honoriu Valean. 606-615 [doi]
- A One-Phase Method for Mining High Utility Mobile Sequential Patterns in Mobile Commerce EnvironmentsBai-En Shie, Ji-Hong Cheng, Kun-Ta Chuang, Vincent S. Tseng. 616-626 [doi]
- The Use of Shapley Value to Power Allocation Games in Cognitive Radio NetworksJerzy Martyna. 627-636 [doi]
- Mining Time-Gap Sequential PatternsShow-Jane Yen, Yue-Shi Lee. 637-646 [doi]
- Intelligent Post-processing via Bounding-Box-Based Morphological Operations for Moving Objects DetectionChun-Ming Tsai. 647-657 [doi]
- An Integrated Agent Model for Attention and Functional StateTibor Bosse, Rianne van Lambalgen, Peter-Paul van Maanen, Jan Treur. 658-668 [doi]
- Tracking and Constraining Authorization ProvenanceJinwei Hu, Khaled M. Khan, Yun Bai, Yan Zhang. 669-678 [doi]
- A Framework for Collaborative Business Development Based on Middle Agent ModelHiroki Nakagawa, Akihiko Nagai, Takayuki Ito. 679-688 [doi]
- Agents' Cooperation Based on Long-Term Reciprocal AltruismXiaowei Zhao, Haoxiang Xia, Hong Yu, Linlin Tian. 689-698 [doi]
- A Vietnamese Text-Based Conversational AgentDai Quoc Nguyen, Dat Quoc Nguyen, Son Bao Pham. 699-708 [doi]
- Using DRSA and Fuzzy Measure to Enlighten Policy Making for Enhancing National Competitiveness by WCY 2011Yu-Chien Ko, Hamido Fujita, Gwo-Hshiung Tzeng. 709-719 [doi]
- Evaluating Top Information Technology Firms in Standard and Poor's 500 Index by Using a Multiple Objective Programming Based Data Envelopment AnalysisChi-Yo Huang, Po-Yen Wang, Gwo-Hshiung Tzeng. 720-730 [doi]
- Using the DEMATEL Based Network Process and Structural Equation Modeling Methods for Deriving Factors Influencing the Acceptance of Smart Phone Operation SystemsChi-Yo Huang, Ming-Jenn Wu, Yu-Wei Liu, Gwo-Hshiung Tzeng. 731-741 [doi]
- Determine the Service Value Position for Package Tour Plan Based on a Novel MCDM ApproachChia-Li Lin. 742-753 [doi]
- Incremental 3D Reconstruction Using Bayesian LearningZe-Huan Yuan, Lu Tong, Hao-Yi Zhou, Chen Bin, Jia-Ning Li. 754-763 [doi]
- A Stochastic Search on the Line-Based Solution to Discretized EstimationAnis Yazidi, Ole-Christoffer Granmo, B. John Oommen. 764-773 [doi]
- A Hierarchical Learning Scheme for Solving the Stochastic Point Location ProblemAnis Yazidi, Ole-Christoffer Granmo, B. John Oommen, Morten Goodwin Olsen. 774-783 [doi]
- Discretized Bayesian Pursuit - A New Scheme for Reinforcement LearningXuan Zhang, Ole-Christoffer Granmo, B. John Oommen. 784-793 [doi]
- A Method of Software Defects Mining Based on Static AnalysisXiaochen Lai, Kuanjiu Zhou, Likun Li, Lemin Tang, Yanshuang Yao, Liang Yu. 794-807 [doi]
- An Extended ISOMAP by Enhancing Similarity for ClusteringHong Yu, Xianchao Zhang, Yuansheng Yang, Xiaowei Zhao, Lei Cai. 808-815 [doi]
- Movie Keyframe Retrieval Based on Cross-Media Correlation Detection and Context ModelYukang Jin, Tong Lu, Feng Su. 816-825 [doi]