Abstract is missing.
- ForwardStuart Harvey Rubin, Shu-Ching Chen. [doi]
- Inventing the future of neurology: Integrated wavelet-chaos-neural network models for knowledge discovery and automated EEG-based diagnosis of neurological disordersHojjat Adeli. [doi]
- Panel: The role of information search and retrieval in economic stimulationStuart Harvey Rubin, Shu-Ching Chen, Lotfi A. Zadeh, Hojjat Adeli, Mohammad Rifaie, Gordon K. Lee, Kang Zhang, Reda Alhajj, Gary D. Boetticher, Du Zhang. [doi]
- Computation with imprecise probabilitiesLotfi A. Zadeh. [doi]
- Reengineering XML into object-oriented databaseTaher Naser, Reda Alhajj, Mick J. Ridley. 1-6 [doi]
- Modeling role-based access control using a relational database toolChia-Chu Chiang, Coskun Bayrak. 7-10 [doi]
- Using a search engine to query a relational databaseBrian Harrington, Robert P. Brazile, Kathleen M. Swigger. 11-16 [doi]
- Route selection algorithm based on integer operation Ant Colony OptimizationMasaya Yoshikawa, Hidekazu Terai. 17-21 [doi]
- Optimization of controllers in the thermal system using initial pheromone distribution in Ant Colony OptimizationQian Zhang, Ze Dong, Pu Han, Zhongli Wu, Fang Gao. 22-27 [doi]
- Portfolio selection using an artificial immune systemHamid Reza Golmakani, Elnaz Jalilipour Alishah. 28-33 [doi]
- Web service composition based on integrated substitution and adaptationLu Chen, Randy Chow. 34-39 [doi]
- Reachability analysis of Web service interfacesXutao Du, Chunxiao Xing, Lizhu Zhou. 40-45 [doi]
- Modeling and synthesis of service composition using tree automataKen Q. Pu, Ying Zhu. 46-51 [doi]
- AMSQM: Adaptive multiple super-page queue managementMoshe Itshak, Yair Wiseman. 52-57 [doi]
- Data warehouse architecture and designMohammad Rifaie, Keivan Kianmehr, Reda Alhajj, Mick J. Ridley. 58-63 [doi]
- Mining knowledge flow for modeling the information needs of task-based groupsChin-Hui Lai, Duen-Ren Liu. 64-69 [doi]
- An empirical study of supervised learning for biological sequence profiling and microarray expression data analysisAbu H. M. Kamal, Xingquan Zhu, Abhijit S. Pandya, Sam Hsu, Yong Shi. 70-75 [doi]
- An unsupervised protein sequences clustering algorithm using functional domain informationWei-bang Chen, Chengcui Zhang, Hua Zhong. 76-81 [doi]
- Outcome prediction in traumatic pelvic injuries using maximum similarity and quality measuresSimina Vasilache, Rebecca Smith, Soo-Yeon Ji, Kayvan Najarian, Toan Huynh. 82-85 [doi]
- A new agent characterization model and grouping method for multi-agent systemHyun Ko, Seungwok Han, Ung-Mo Kim, Hee Yong Youn. 86-91 [doi]
- An intelligent agent for the game of Age of Mythology: the TitansJin Park, Du Zhang, Meiliu Lu. 92-97 [doi]
- An ontology for Multi-Agent Domain and Application EngineeringAdriana Leite, Rosario Girardi, Uiratan Cavalcante. 98-103 [doi]
- Research on the COM-based reusability of evaluating modelsXujian Zhao, Peiquan Jin, Lihua Yue. 104-109 [doi]
- Coupling data understanding with software reuseGordon S. Novak Jr.. 110-115 [doi]
- Eliminating the threat of kernel stack overflowsYair Wiseman, Joel Isaacson, Eliad Lubovsky. 116-121 [doi]
- Result identification for biomedical abstracts using Conditional Random FieldsRyan T. K. Lin, Hong-Jie Dai, Yue-Yang Bow, Min-Yuh Day, Richard Tzong-Han Tsai, Wen-Lian Hsu. 122-126 [doi]
- Biomedical data correlation and reuse in analyzing the efficiency of rehabilitation treatmentDorin Carstoiu, Alexandra Cernian, Adriana Olteanu. 127-130 [doi]
- Exercise energy expenditure estimation based on acceleration data using the linear mixed modelEija Haapalainen, Perttu Laurinen, Pekka Siirtola, Juha Röning, Hannu Kinnunen, Heidi Jurvelin. 131-136 [doi]
- Risk management education support system in companySatoshi Takahashi, Muhammad Dzulqarnain bin Muhammad Nasir, Takayuki Fujimoto, Tokuro Matsuo. 137-142 [doi]
- Social network mashup: Ontology-based social network integration for statistic learningChunying Zhou, Huajun Chen, Tong Yu. 143-146 [doi]
- Effective browsing of personal Tag space in social tagging systemsYun Zhang, Boqin Feng. 147-152 [doi]
- Knowledge extraction from web-based application source code: An approach to database reverse engineering for ontology developmentShuxin Zhao, Elizabeth Chang, Tharam S. Dillon. 153-159 [doi]
- Crawling programs for wrapper-based applicationsClaudio Bertoli, Valter Crescenzi, Paolo Merialdo. 160-165 [doi]
- A generic notification system for Internet informationNader Mohamed, Jameela Al-Jaroodi, Imad Jawhar. 166-171 [doi]
- An alignment-based surface pattern for a question answering systemCheng-Lung Sung, Cheng-Wei Lee, Hsu-Chun Yen, Wen-Lian Hsu. 172-177 [doi]
- Development of an evaluation model for Question Answering SystemsChorng-Shyong Ong, Min-Yuh Day, Wen-Lian Hsu. 178-183 [doi]
- Biological question answering with syntactic and semantic feature matching and an improved mean reciprocal ranking measurementRyan T. K. Lin, Justin Liang-Te Chiu, Hong-Jie Dai, Min-Yuh Day, Richard Tzong-Han Tsai, Wen-Lian Hsu. 184-189 [doi]
- Identifying learners robust to low quality dataAndres Folleco, Taghi M. Khoshgoftaar, Jason Van Hulse, Lofton A. Bullard. 190-195 [doi]
- Lightweight linked dataErik Wilde, Yiming Liu. 196-201 [doi]
- Hybrid sampling for imbalanced dataChris Seiffert, Taghi M. Khoshgoftaar, Jason Van Hulse. 202-207 [doi]
- Curate a transliteration corpus from transliteration/translation pairsShih-Hung Wu, Yu-Te Li. 208-213 [doi]
- A word-based predictive text entry method for Khmer languagePhavy Ouk, Ye Kyaw Thu, Mitsuji Matsumoto, Yoshiyori Urano. 214-219 [doi]
- Extraction of objects contours for body language studyRoumen Kountchev, Stuart Harvey Rubin, Mariofanna G. Milanova, Vladimir Todorov, Roumiana Kountcheva. 220-225 [doi]
- Compound record clustering algorithm for design pattern detection by decision tree learningJing Dong, Yongtao Sun, Yajing Zhao. 226-231 [doi]
- Web content mining using web design patternsMilos Kudelka, Václav Snásel, Ondrej Lehecka, Eyas El-Qawasmeh. 232-237 [doi]
- Fuzzy querying of nested XMLAllan Chan, Nancy Situ, Kim Wong, Keivan Kianmehr, Reda Alhajj. 238-243 [doi]
- An entropy-based method for assessing the number of spatial outliersXutong Liu, Chang-Tien Lu, Feng Chen. 244-249 [doi]
- Automatic product feature extraction from online product reviews using maximum entropy with lexical and syntactic featuresGamgarn Somprasertsri, Pattarachai Lalitrojwong. 250-255 [doi]
- A conflict-based confidence measure for associative classificationPeerapon Vateekul, Mei-Ling Shyu. 256-261 [doi]
- Authoritative documents identification based on Nonnegative Matrix FactorizationNacim Fateh Chikhi, Bernard Rothenburger, Nathalie Aussenac-Gilles. 262-267 [doi]
- A method for automatically generating proper responses to user s utterances in open-ended conversation by retrieving documents on the webMasahiro Shibata, Tomomi Nishiguchi, Yoichi Tomiura. 268-273 [doi]
- A layered approach to semantic similarity analysis of XML schemasJaewook Kim, Yun Peng, Boonserm Kulvatunyou, Nenad Ivezic, Albert Jones. 274-279 [doi]
- Towards an integrated modeling and simulation framework for freight transportation in metropolitan areasQunzhi Zhou, Amol Bakshi, Viktor K. Prasanna, Ramakrishna Soma. 280-285 [doi]
- Analysis methodology for project design utilizing UMLCitlalih Gutierrez Estrada, Sergio Diaz Zagal, Martin de Jesus Nieto Perez, Itzel Abundez Barrera, Rocio Elizabeth Pulido Alba, Mauro Sanchez Sanchez, René Arnulfo García-Hernández. 286-289 [doi]
- A General Purpose Software Evaluation SystemBehrouz H. Far, Vani Mudigonda, Abdel Halim Elamy. 290-295 [doi]
- VCI predictors: Voting on classifications from imputed learning setsXiaoyuan Su, Taghi M. Khoshgoftaar, Xingquan Zhu. 296-301 [doi]
- Robust Self-Splitting Competitive learning for data clusteringYun Zhang, Boqin Feng, Lianmeng Liu. 302-307 [doi]
- Tightness: A novel heuristic and a clustering mechanism to improve the interpretation of association rulesRajesh Natarajan, B. Shekar. 308-313 [doi]
- Optimizing lineage information in genetic algorithms for producing superior modelsGary D. Boetticher, Jason Rudisill. 314-318 [doi]
- An algorithm for activation timed influence netsPanayota Papantoni-Kazakos, Abbas K. Zaidi, M. Faraz Rafi. 319-324 [doi]
- Incorporating fuzziness into timer-triggers for temporal event handlingYing Jin, Tejaswitha Bhavsar. 325-329 [doi]
- Context modeling for knowledge flowJianmei Guo, Yinglin Wang. 330-335 [doi]
- Using default logic to enhance default logic: preliminary reportÉric Grégoire. 336-340 [doi]
- Electronic learning support system based on analogy reuseTokuro Matsuo, Takayuki Fujimoto. 341-344 [doi]
- A multi-stage strategy for ontology mapping resolutionYinglin Wang, Xijuan Liu, Junquan Chen. 345-350 [doi]
- Modular ontology techniques and their applications in the biomedical domainJyotishman Pathak, Thomas M. Johnson, Christopher G. Chute. 351-356 [doi]
- An ontology-empowered model for annotating protein-protein interaction data: a case study for budding yeastArash Shaban-Nejad, Volker Haarslev. 357-362 [doi]
- Workflow instance detection: Toward a knowledge capture methodology for smart oilfieldsFan Sun, Viktor K. Prasanna, Amol Bakshi, Laurent Pianelo. 363-369 [doi]
- Injecting formulized delegation constraints into secure workflow systemsLi Zhao, Qing Li, Guoqing Wu. 370-373 [doi]
- Rule randomization for propositional logic-based workflow verificationQianhui Liang, Stuart Harvey Rubin. 374-379 [doi]
- FACT: A fusion architecture with contract templates for semantic and syntactic integrationRose F. Gamble, Robert Baird, Leigh Flagg, Melody McClure. 380-385 [doi]
- Data component based management of reservoir simulation modelsCong Zhang, Amol Bakshi, Viktor K. Prasanna. 386-392 [doi]
- Empirical-based design - quality-driven assembly of componentsMartin Kunz, Steffen Mencke, Dmytro Rud, Reiner R. Dumke. 393-397 [doi]
- Robust integration of multiple information sources by view completionShankara B. Subramanya, Baoxin Li, Huan Liu. 398-403 [doi]
- Modeling heterogeneous data in dataspaceMing Zhong, Mengchi Liu, Qian Chen. 404-409 [doi]
- Optimizing PPDM in asynchronous sparse data using random projectionR. Raja Kumar, J. Indumathi, G. V. Uma. 410-415 [doi]
- Model check stochastic supply chainsLi Tan, Shenghan Xu. 416-421 [doi]
- Modeling and analysis of a web-based collaborative enterprise using Petri netsSeung-yun Kim. 422-428 [doi]
- Preventing customer churn by using random forests modelingWeiyun Ying, Xiu Li, Yaya Xie, Ellis Johnson. 429-434 [doi]
- Hierarchical affinity hybrid tree: A multidimensional index structure to organize videos and support content-based retrievalsKasturi Chatterjee, Shu-Ching Chen. 435-440 [doi]
- Segmentation of medical images by region growingItzel Abundez Barrera, Citlalih Gutierrez Estrada, Sergio Diaz Zagal, Martin de Jesus Nieto Perez. 441-444 [doi]
- A fast retrieval algorithm for the earth mover s distance using EMD lower boundsMasami Shishibori, Satoru Tsuge, Zhang Le, Minoru Sasaki, Yoshiki Uemura, Kenji Kita. 445-450 [doi]
- Managing application domains in P2P systemsDeise de Brum Saccol, Nina Edelweiss, Renata de Matos Galante, Marcio Roberto de Mello. 451-456 [doi]
- RFID composite event definition and detectionOmar Gonzalez-Padilla, Félix F. Ramos Corchado, Herwig Unger. 457-462 [doi]
- An energy efficient framework using non-volatile flash memory for networked storage systemsMais Nijim, Ahmed Abukmail, Adel Ali. 463-468 [doi]
- Gadget creation for personal information integration on web portalsChia-Hui Chang, Shih-Feng Yang, Che-Min Liou, Mohammed Kayed. 469-472 [doi]
- Integration of information needs and seekingSabah S. Al-Fedaghi. 473-478 [doi]
- DEVS model composition by system entity structureSaehoon Cheon, Doohwan Kim, Bernard P. Zeigler. 479-484 [doi]