researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
OR
AND
NOT
1
2003
2004
2005
Filter by Tag
[+]
OR
AND
NOT
1
C++
Java
Meta-Environment
UML
analysis
architecture
case study
context-aware
data-flow
design
e-science
logic
meta-model
meta-objects
modeling
programming
rule-based
security
systematic-approach
testing
Filter by Author
[+]
OR
AND
NOT
1
Ahmed M. Salem
Amal Perera
Ana Funes
Andy M. Connor
Aristides Dasso
Baoying Wang
C. J. Hwang
Carl G. Looney
Daniel Riesco
Evangelos A. Yfantis
George Bebis
George Hamer
German Montejano
Luis E. Teruel
Narayan C. Debnath
Oksana Kubushyna
Peter Allen Stubberud
Richard Boyle
Robert Uzal
William Perrizo
Filter by Top terms
[+]
OR
AND
NOT
1
adaptive
analysis
data
design
development
framework
fuzzy
information
intelligent
model
modeling
network
networks
neural
recognition
software
system
systems
uml
using
IASSE (iasse)
Editions
Publications
Viewing Publication 1 - 100 from 166
2005
Comparing the Performance of Principal Component Analysis and RBF Network for Face Recognition using Locally Linear Embedding
Eimad Eldin Abusham
,
David Ngo Chek Ling
,
Andrew Teoh Beng Jin
.
iasse 2005
:
78-82
Neuro Fuzzy Techniques Using MATLAB/SIMULINK Applied to Real Process
Tharwat E. Alhanafy
,
Tarek S. Sobh
,
Awad H. Khalil
.
iasse 2005
:
40-45
Dynamic Analysis of Object-Oriented Programs Using State Machines and ECA Rules
S. M. Babamir
,
S. Jalili
.
iasse 2005
:
243-248
Intelligent and Adaptive Water Level Prediction in Texas Coastal Waters
Ray Bachnak
,
Carl Steidley
,
Alex Sadovski
,
Phillipe Tissot
,
Zack Bowles
.
iasse 2005
:
89-93
State Specialization in a Service Discovery Ontology: A Financial Services Business Grid
David Bell
,
Simone A. Ludwig
,
Mark Lycett
.
iasse 2005
:
66-71
A UML Framework for Web Services-Based Clinical Decision Support
Christina Catley
,
Dorina C. Petriu
,
Monique Frize
.
iasse 2005
:
174-179
Stochastic Cost Estimation and Risk Analysis in Managing Software Projects
Andy M. Connor
,
Stephen G. MacDonell
.
iasse 2005
:
140-144
Testing as Specification in Agile Methods
Aristides Dasso
,
Narayan C. Debnath
,
Ana Funes
,
Daniel Riesco
,
German Montejano
,
Robert Uzal
.
iasse 2005
:
202-206
Java Autotester for the Triangle Function
Narayan C. Debnath
,
Maria Alejandra Barrera
,
Mark Burgin
,
Joshua Wilson
,
Joseph Cropper
.
iasse 2005
:
190-195
High-Level Design of a Ternary Asynchronous Multiplexer
Walter Dosch
,
W. L. Yeung
.
iasse 2005
:
221-228
History Abstractions of an Interactive Frequency Table
Walter Dosch
.
iasse 2005
:
31-39
IWAR Protocol: An Adaptive Routing Protocol for Wireless Ad Hoc Networks
Hamed El-Afandi
,
S. Hossein Hosseini
,
K. Vairavan
.
iasse 2005
:
129-133
Automated Code Generation for Database Applications
Ehat Ercanli
,
Necati Ercan Ozgencil
,
Murat Kahraman Gungor
.
iasse 2005
:
145-150
Sequence Algorithms for Boundary Value Analysis with Constrained Input Parameters
Wenying Feng
,
Zhenhua Zhang
.
iasse 2005
:
255-160
Designing And Exploiting The Location Concept in a Reflective Architecture
Francesca Arcelli Fontana
,
Claudia Raibulet
,
Francesco Tisato
,
Luigi Ubezio
.
iasse 2005
:
134-139
Extending Agent-Based Collaborative Virtual Environment to be HLA Compliant
Lei Guo
,
Nicolas D. Georganas
.
iasse 2005
:
112-116
Hzhr: A Software Package Of Finite Difference MethodsFor Two-Point Boundary Value Problems
H. M. Habib
,
E. R. El-Zahar
.
iasse 2005
:
249-254
Creating Short Length Masks using Vertical Processing
George Hamer
,
William Perrizo
.
iasse 2005
:
51-54
Secure Steganography using the Most Significant Bits
George Hamer
,
William Perrizo
.
iasse 2005
:
169-173
Improving Intrusion Awareness with a Neural Network Classifier
Mariana Hentea
.
iasse 2005
:
163-168
Prediction of Annual Inflation Rate using Neural Networks
Toma I. Hentea
,
Donald L. Gray
.
iasse 2005
:
61-65
Job Scheduling with Real-Time Optimal Control
Hsiu-Jy Ho
,
Wei-Ming Lin
.
iasse 2005
:
13-18
A Empirical Comparison of Monte Carlo Methods for Simulating Random Variants that follow Cubic Polynomial Based Mathematical Models
Craig Hourie
,
James W. Jury
,
Richard T. Hurley
.
iasse 2005
:
215-220
People Tracking System with Lighting Effect Estimation in Open Environment
Ching-Tang Hsieh
,
Yeh-Kuang Wu
,
Chia-Yi Chen
.
iasse 2005
:
46-50
Proceedings of the ISCA 14th International Conference on Intelligent and Adaptive Systems and Software Engineering, July 20-22, 2005, Novotel Toronto Centre, Toronto, Canada
Richard T. Hurley
,
Wenying Feng
, editors,
ISCA,
2005.
Multiple Fuzzy Reference Model Adaptive Controller Algorithm for Aircraft Pitch-Rate Tracking
Sukumar Kamalasadan
,
Adel A. Ghandakly
.
iasse 2005
:
117-122
A Neural Network Parallel Adaptive Controller Algorithm for Fighter Aircraft Pitch Rate Control
Sukumar Kamalasadan
,
Adel A. Ghandakly
.
iasse 2005
:
123-128
One-Timer and Non-One-Timer Characterization of Web Traffic
Archana Kodaypak
,
Sivarama P. Dandamudi
.
iasse 2005
:
106-111
A Framework for Contextual Information Retrieval from the WWW
Dilip Kumar Limbu
,
Andy M. Connor
,
Stephen G. MacDonell
.
iasse 2005
:
185-189
Autonomous Requirements Specification Processing using Natural Language Processing
Stephen G. MacDonell
,
Kyongho Min
,
Andy M. Connor
.
iasse 2005
:
266-270
Automatic Cheching of the Security Systems Topologies
Kaninda Musumbu
.
iasse 2005
:
157-162
Vertical Set Square Distance Based Clustering without Prior Knowledge of K
Amal Perera
,
Taufik Abidin
,
Masum Serazi
,
George Hamer
,
William Perrizo
.
iasse 2005
:
72-77
Improving Particle Swarm Optimizer Using the Nonlinear Simplex Method at Late Stage
Yuhui Qiu
,
Fang Wang
.
iasse 2005
:
25-30
Inconsistencies of CK Metrics And Proposed Methods of Removal
Sunint Saini
.
iasse 2005
:
229-234
A Tool for Test Case Generation and Evaluation
Ahmed M. Salem
.
iasse 2005
:
261-265
A Practical Approach for Requirements Elicitation
Ahmed M. Salem
,
Kevin Leung
.
iasse 2005
:
196-201
The Seventeen Distinct Symmetrical Patterns Based on Biometrics used as Security Approach
Amer Salman
,
Rula Salman
,
Chris Alexander
.
iasse 2005
:
83-88
Generating a Domain Model from a Use Case Model
Nayanamana Samarasinghe
,
Stéphane S. Somé
.
iasse 2005
:
278
Flexibility in Satisfying Intentions in a Situational Context
Inés Bayoudh Saâdi
,
Yassine Jamoussi
,
Henda Hajjami Ben Ghézala
.
iasse 2005
:
271-277
An Api for Transparent Distributed Vertical Data Mining
Masum Serazi
,
Amal Perera
,
Taufik Abidin
,
George Hamer
,
William Perrizo
.
iasse 2005
:
151-156
Self-Organizing Clustering Based on Generalized Particle Model
Dianxun Shuai
,
Rongrong Liu
,
Wenlan Wang
,
Fangliang Xue
.
iasse 2005
:
19-24
Autonomic Computing Based on Generalized Particle Model
Dianxun Shuai
,
Rui Gong
,
Xing Wang
,
Wenlan Wang
,
Rongrong Liu
.
iasse 2005
:
7-12
Towards a Unified Approach for Cross-Platform Software Development
Jeff A. Stuart
,
Sergiu M. Dascalu
,
Frederick C. Harris Jr.
.
iasse 2005
:
235-242
SIGMA: A Multi-Agent System Architecture for Monitoring and Diagnosis in Supervisory Systems
Fabiano K. T. Tiba
,
Miriam A. M. Capretz
.
iasse 2005
:
1-6
A Design Space for Context-Sensitive User Interfaces
Jean Vanderdonckt
,
Donatien Grolaux
,
Peter Van Roy
,
Quentin Limbourg
,
Benoit M. Macq
,
Benoît Michel
.
iasse 2005
:
207-214
Profile Based Alignment Learning System For Language Inference
Xiangrui Wang
,
Narendra S. Chaudhari
.
iasse 2005
:
94-99
An Expert System for Web Site Navigation using Client Side Scripting
Scott James Williamson
,
Chris Liu
.
iasse 2005
:
180-184
A Weighted-Tree Simplicity Algorithm for Similarity Matching of Partial Product Descriptions
Lu Yang
,
Biplab Kumer Sarker
,
Virendrakumar C. Bhavsar
,
Harold Boley
.
iasse 2005
:
55-60
Search of Mathematical Contents: Issues And Methods
Abdou Youssef
.
iasse 2005
:
100-105
2004
Proceedings of the ISCA 13th International Conference on Intelligent and Adaptive Systems and Software Engineering, Nice, France, July 1-3, 2004
ISCA,
2004.
Named Entity Recognition and Classification for Text in Arabic
Saleem Abuleil
,
Martha Evens
.
iasse 2004
:
89-94
Method of Evaluation of Distributed and Token-based Mutual Exclusion Approaches
Hisham Al-Mubaid
,
Devdutt Mistry
,
Narayan C. Debnath
.
iasse 2004
:
257-262
The Bosco Project - A JMI-Compliant Template-based Code Generator
Pascal André
,
Gilles Ardourel
,
Gerson Sunyé
.
iasse 2004
:
157-162
Chemical Specification of Autonomic Systems
Jean-Pierre Banâtre
,
Yann Radenac
,
Pascal Fradet
.
iasse 2004
:
72-79
Comparison of Techniques for the Construction of Decision Trees
Bernadette Bouchon-Meunier
,
Thanh Ha Dang
,
Christophe Marsala
.
iasse 2004
:
58-62
Modeling and Realizing Security-Critical Inter-Organizational Workflows
Ruth Breu
,
Michael Hafner
,
Barbara Weber
.
iasse 2004
:
139-144
System Evolution through Design Information Evolution: a Case Study
Walter Cazzola
,
Ahmed Ghoneim
,
Gunter Saake
.
iasse 2004
:
145-150
Sociotechnical Aspects in the Integrated Engineering of Complex Systems
Michael Cebulla
.
iasse 2004
:
195-202
Using UML for Problem Frame Oriented Software Development
Christine Choppy
,
Gianna Reggio
.
iasse 2004
:
239-244
Neural Network Modeling with Medical Data
Maurice E. Cohen
,
Donna L. Hudson
.
iasse 2004
:
135-138
Metadata Considerations in the Context of an Executive Information System Project Based on Balanced Scorecard Approach
Narayan C. Debnath
,
Robert Uzal
,
German Montejano
,
Daniel Riesco
,
Aristides Dasso
,
Ana Funes
.
iasse 2004
:
115-120
Standardizing Entity-Relationship Graphs with UML
Narayan C. Debnath
,
C. Pereira
,
Daniel Riesco
,
Robert Uzal
,
German Montejano
.
iasse 2004
:
251-256
Conditions for a Successful Implementation of an Executive Information System
Narayan C. Debnath
,
Robert Uzal
,
German Montejano
,
Daniel Riesco
,
Aristides Dasso
,
Ana Funes
.
iasse 2004
:
109-114
A Model for Multi-relational Data Mining on Demand Forecasting
Qin Ding
,
Bhavin Parikh
.
iasse 2004
:
1-5
ElGamal Public-Key Cryptosystem Using Reducible Polynomials Over a Finite Field
Abdul Nasser El-Kassar
.
iasse 2004
:
189-194
Design Pattern Recognition
Francesca Arcelli Fontana
,
Claudia Raibulet
,
Francesco Tisato
.
iasse 2004
:
290-295
Supporting Pattern-based Application Authoring for the Semantic Web
Michael Fuchs
,
Claudia Niederée
,
Matthias Hemmje
.
iasse 2004
:
215-220
Java/A - Taking Components into Java
Florian Hacklinger
.
iasse 2004
:
163-168
A Comparative Study of RSA based Cryptographic Algorithms
Ramzi A. Haraty
,
Abdul Nasser El-Kassar
,
Hadi Otrok
.
iasse 2004
:
183-188
A Digital Blind Watermarking System Using Adaptive Quantization
Ching-Tang Hsieh
,
Yeh-Kuang Wu
.
iasse 2004
:
31-35
Semi-fragile Watermarking Image Authentication using Real Symmetric Matrix
Ching-Tang Hsieh
,
Chia-Yi Chen
,
Yeh-Kuang Wu
,
Hong-Yu Chen
.
iasse 2004
:
36-41
Using Intelligent Agents to Assist in Daily Activities of Patients with Dementia
Donna L. Hudson
,
Maurice E. Cohen
.
iasse 2004
:
85-88
Investigating Correlation between the Object-Oriented Design Maintainability and Two Sub-Characteristics: Understandability and Modifiability
Nongyao Jindasawat
,
Matinee Kiewkanya
,
Pornsiri Muenchaisri
.
iasse 2004
:
151-156
Neuro-Dynamic Programming for Task Allocation to Unmanned Aerial Vehicles
Ahmed Kamel
,
Mohd M. Anwar
,
Kendall E. Nygard
.
iasse 2004
:
121-127
A Comparison of Intelligent Admission Control Schemes for Next Generation Wireless Systems with Simulated Annealing
Dilek Karabudak
,
Chih-Cheng Hung
,
Benny Bing
.
iasse 2004
:
52-57
Netwrok Security Intrusion Detection Using Data Mining and Fuzzy Logic
D. Kaur
,
Y. Hu
.
iasse 2004
:
25-30
UML-based Modeling of Architectural Knowledge and Design
M. Kirchhof
,
B. Kraft
.
iasse 2004
:
245-250
Low Cost Fault Detection Isolation and Recovery Implemented on an Autonomous Unmanned Ground Vehicle
Phillip L. Koon
,
Mat Johnson Roberson
,
Chris Urmson
,
Jay Gowdy
,
Kevin Peterson
.
iasse 2004
:
80-84
A Framework For Modeling Financial Instruments Using Object-Oriented Technology
Paul Lajbcygier
,
Ke Cong
.
iasse 2004
:
302-305
Effective Stock Market Prediction with Neural Networks Optimized by Population-Oriented Simulated Annealing
M. Mohy Mahmoud
,
Ashraf M. Abdelbar
,
Maha Bali
,
Mohamed El Hagry
.
iasse 2004
:
131-134
A Comparative Analysis of Centralized, Voting - and Quorum-based Mutual Exclusion Algorithms
Devdutt Mistry
,
Narayan C. Debnath
,
Hisham Al-Mubaid
.
iasse 2004
:
263-268
Solving Incremental MAX-SAT
Malek Mouhoub
.
iasse 2004
:
46-51
Java with CREAM for Temporal Constraints
Malek Mouhoub
,
Mujtaba Istihad
,
Samira Sadaoui
.
iasse 2004
:
281-283
Improving Object Interactions of System Software Using Aspect-Oriented Framework
Paniti Netinant
.
iasse 2004
:
296-301
An Adaptation-safe Model for Component Platforms
Audrey Occello
,
Anne-Marie Pinna-Dery
.
iasse 2004
:
169-174
An Efficient Description Model for Dynamic Situations in Virtual Environment
Kyu-Yol Oh
,
Sun-Mi Noh
,
In-Kyun Lee
,
Jong-Hee Park
.
iasse 2004
:
104-108
Automatic Speaker Recognition using LVQ with 3 Prosodic Features
Siham Ouamour-Sayoud
,
Halim Sayoud
.
iasse 2004
:
95-99
Adaptive Sampling of Text Documents
Robert M. Patton
,
Thomas E. Potok
.
iasse 2004
:
42-45
Designing a Tool for a Personalized Distance Learning in Medicine
M. Picavet
,
Hervé Camus
,
Sabine Leroy
,
Jean-Marie Renard
.
iasse 2004
:
221-226
A Framework for the GAT Temporal Logic
Jean-Claude Royer
.
iasse 2004
:
275-280
Learning Using an Information Fusion Approach
Stuart Harvey Rubin
,
Gordon K. Lee
.
iasse 2004
:
68-71
Graceful Degradation for Component-Based Embedded Software
Titos Saridakis
.
iasse 2004
:
175-182
Automatic Speaker Recognition Using Statistical Measures
Halim Sayoud
,
Siham Ouamour-Sayoud
.
iasse 2004
:
100-103
Multi-Layered Framework for Distributed Data Mining
Masum Serazi
,
Amal Perera
,
Qiang Ding
,
Vasiliy Malakhov
,
William Perrizo
.
iasse 2004
:
63-67
Execution of A Requirement Model in Software Development
Wuwei Shen
,
Mohsen Guizani
,
Zijiang Yang
,
Kevin J. Compton
,
James Huggins
.
iasse 2004
:
203-208
An Integrated Model to Overcome IP Spoofing
Tarek S. Sobh
,
Awad H. Khalil
.
iasse 2004
:
227-232
Software Development for an Airborne Imaging System for Environmental Studies
Carl Steidley
,
Ray Bachnak
,
Rahul Kulkarni
.
iasse 2004
:
306
The Evolution of Neural Networks in a Social Context
Christina Stoica
.
iasse 2004
:
128-130
A Rationale-based Analysis Tool
Timo Wolf
,
Allen H. Dutoit
.
iasse 2004
:
209-214
Comparing the State-Based and Behavioural Approaches to Checking Consistency between Associations and State Machines in UML
W. L. Yeung
.
iasse 2004
:
233-238
Sign in
or
sign up
to see more results.