Abstract is missing.
- Intelligent Distributed Intrusion Detection Systems of Computer Communication SystemsAdam Grzech. 1-6 [doi]
- On Scheduling Problems with an Intelligent Use of the Learning EffectAdam Janiak, Radoslaw Rudek, Wladyslaw A. Janiak. 7-12 [doi]
- A Novel Algorithm for Mining High Utility ItemsetsBac Le, Huy Nguyen, Tung Anh Cao, Bay Vo. 13-17 [doi]
- Argument Based Machine Learning from Examples and TextMartin Mozina, Claudio Giuliano, Ivan Bratko. 18-23 [doi]
- A Structural Sampling Technique for Better Decision TreesHyontai Sug. 24-27 [doi]
- Application of Transfer Regression to TCP Throughput PredictionLeszek Borzemski, Gabriel Starczewski. 28-33 [doi]
- Motif-Based Analysis of Social Position Influence on Interconnection Patterns in Complex Social NetworkKatarzyna Musial, Krzysztof Juszczyszyn. 34-39 [doi]
- Deriving Conceptual Schema from XML DatabasesOviliani Yenty Yuliana, Suphamit Chittayasothorn. 40-45 [doi]
- Mining Multilevel Association Rules on RFID DataYounghee Kim, Ungmo Kim. 46-50 [doi]
- A Novel Approach to Keyword Extraction for Contextual AdvertisingFeng Zhang, Guang Qiu, Jiajun Bu, Mingcheng Qu, Chun Chen. 51-56 [doi]
- Class Prediction and Pattern Discovery in Microarray Data - Artificial Intelligence and Algebraic MethodsAndrzej Swierniak, Krzysztof Fujarewicz, Krzysztof Simek, Michal Swierniak. 57-60 [doi]
- Applying Classification Problems via a Data Mining Approach Based on a Cerebellar Model Articulation ControllerJui-Yu Wu, Chi-Jie Lu. 61-66 [doi]
- Web Page Element Classification Based on Visual FeaturesRadek Burget, Ivana Rudolfova. 67-72 [doi]
- Select-Response Grouping Proof for RFID TagsXuefei Leng, Yuanhung Lien, Keith Mayes, Konstantinos Markantonakis, Jung-Hui Chiu. 73-77 [doi]
- An Approach to Identity Theft Detection Using Social Network AnalysisGrzegorz Kolaczek. 78-81 [doi]
- Rough Set Based Clustering of the Self Organizing MapE. Mohebi, M. N. N. Sap. 82-85 [doi]
- Feature Selection Using Euclidean Distance and Cosine Similarity for Intrusion Detection ModelAnirut Suebsing, Nualsawat Hiransakolwong. 86-91 [doi]
- Visualizing the Financial Situations and Trends via Chance DiscoveryTzu-Fu Chiu, Chao-Fu Hong, Yu-Ting Chiu. 92-97 [doi]
- Pulmonary Disease Census Aiding System Based on Medical Image GridHai Jin, Aobing Sun, Qin Zhang, Ran Zheng, Ruhan He. 98-103 [doi]
- Parallel Dimensionality Reduction Transformation for Time-Series DataHoang Chi Thanh. 104-108 [doi]
- Two-Stage License Plate Detection Using Gentle Adaboost and SIFT-SVMWing Teng Ho, Hao Wooi Lim, Yong Haur Tay. 109-114 [doi]
- Rotational Invariant Wood Species Recognition through Wood Species VerificationJing Yi Tou, Yong Haur Tay, Phooi-Yee Lau. 115-120 [doi]
- From Checking Integrity Constraints to Temporal Abstraction for Clinical DatabasesPham Van Chung, Duong Tuan Anh. 121-126 [doi]
- Comparison of Different Recommendation Methods for an e-Commerce ApplicationJanusz Sobecki, Krzysztof Piwowar. 127-131 [doi]
- Enhanced Content-Based Filtering Using Diverse Collaborative Prediction for Movie RecommendationMohammed Nazim Uddin, Jenu Shrestha, GeunSik Jo. 132-137 [doi]
- Korean Text Extraction by Local Color Quantization and K-means Clustering in Natural SceneAnh-Nga Lai, Keon Hee Park, Manoj Kumar, Gueesang Lee. 138-143 [doi]
- Natural Language Watermarking by Morpheme SegmentationMi-Young Kim. 144-149 [doi]
- Improved Letter Weighting Feature Selection on Arabic Script Language IdentificationChoon-Ching Ng, Ali Selamat. 150-154 [doi]
- Toward a Framework for Evaluating Heterogeneous Architecture StylesShahrouz Moaven, Ali Kamandi, Jafar Habibi, Hamed Ahmadi. 155-160 [doi]
- An Information Extraction Approach to English-Vietnamese Weather Bulletins Machine TranslationSon Bao Pham, Giang Binh Tran, Dang Duc Pham, Kien Chi Phung, Kien Trung Nguyen. 161-166 [doi]
- A Similar Music Retrieval Scheme Based on Musical Mood VariationSanghoon Jun, Byeong-jun Han, Eenjun Hwang. 167-172 [doi]
- A Data Management System for Distributed Real-Time Emissions and Air Pollutants Monitoring SystemJunghee Kim, You Lin Jin, Sang Boem Lim, Karpjoo Jeong, Jeong Hun Woo, Eun Yi Kim. 173-178 [doi]
- Agent-Based Generation of Personal ThesaurusGrzegorz Popek, Radoslaw Katarzyniak. 179-182 [doi]
- Representing the Meaning of Symbols in Autonomous AgentsWojciech Lorkiewicz, Radoslaw Katarzyniak. 183-189 [doi]
- Checking the Consistency between UCM and PSM Using a Graph-Based MethodNinh-Thuan Truong, Thi-Mai-Thuong Tran, Van-Khanh To, Viet Ha Nguyen. 190-195 [doi]
- Processing Exact Results for Sliding Window Joins over Time-Sequence, Streaming Data Using a Disk ArchiveAbhirup Chakraborty, Ajit Singh. 196-201 [doi]
- Quantitative Analysis of the Error Propagation Phenomenon in Distributed Information SystemsDariusz Król, Grzegorz Stanislaw Kukla. 202-207 [doi]
- Baseline-Oriented Modeling: An MDA Approach Based on Software Product Lines for the Expert Systems DevelopmentMarÃa Eugenia Cabello, Isidro Ramos, Abel Gómez, Rogelio N. Limón Cordero. 208-213 [doi]
- Extensions to the Relational Paths Based Learning Approach RPBLZhiqiang Gao, Zhizheng Zhang, Zhisheng Huang. 214-219 [doi]
- Security Policy Integration Method for Information SystemsTrong Hieu Tran, Ngoc Thanh Nguyen. 220-225 [doi]
- A Fuzzy Classifier with Directed Initialization Adaptive Learning of Norm Inducing MatrixLeehter Yao, Kuei-Sung Weng, Ren-Wei Chang. 226-231 [doi]
- Fuzzy Classification of Incomplete Data with Adaptive VolumeLeehter Yao, Kuei-Sung Weng, Ren-Wei Chang. 232-237 [doi]
- Stability Analysis of Fuzzy Control for Nonlinear SystemsPo-Chen Chen, Ken Yeh, Cheng-Wu Chen, Shu-Hao Lin. 238-242 [doi]
- Stability Analysis of Time-Delay Fuzzy Systems Using Fuzzy Lyapunov MethodKen Yeh, Cheng-Wu Chen, Shu-Hao Lin, Chen-Yuan Chen. 243-248 [doi]
- Application to GA-Based Fuzzy Control for Nonlinear Systems with UncertaintyPo-Chen Chen, Ken Yeh, Cheng-Wu Chen, Chen-Yuan Chen. 249-252 [doi]
- Exploration of Soft Computing Models for the Valuation of Residential Premises Using the KEEL ToolTadeusz Lasota, Ewa Pronobis, Bogdan Trawinski, Krzysztof Trawinski. 253-258 [doi]
- Using AI Approach to Solve an Integrated Three-Echelon Supply Chain Model with Strategic AlliancesJonas C. P. Yu, Y.-S. Lin, K.-J. Wang, H. M. Wee. 259-264 [doi]
- Informed Simulated Annealing for Optimizing Dorm Room AssignmentsNguyen Thanh Trung, Tran Ngoc Tuan, Duong Tuan Anh. 265-270 [doi]
- Knowledge Discovery Using a New Interpretable Simulated Annealing Based Fuzzy Classification SystemHamid Mohamadia, Jafar Habibib, Shahrouz Moavena. 271-276 [doi]
- Proposed Nature Inspired Self-Organized Secure Autonomous Mechanism for WSNsK. Saleem, Norsheila Fisal, M. S. Abdullah, A. B. Zulkarmwan, Sharifah Hafizah Syed Ariffin, Sharifah Kamilah Syed Yusof. 277-282 [doi]
- New Multi-parent Recombination in Genetic Algorithm for Solving Bounded Diameter Minimum Spanning Tree ProblemHuynh Thi Thanh Binh, Nguyen Duc Nghia. 283-288 [doi]
- A Novel Multi-objective Affinity Set Classification System: An Investigation of Delayed Diagnosis DetectionChih-Hung Wu, Wei-Ting Li, Chin-Chia Hsu, Chi-Hua Li, I-Ching Fang, Chia-Hsiang Wu. 289-294 [doi]
- Hybrid Genetic-Based Support Vector Regression with Feng Shui Theory for Appraising Real Estate PriceChih-Hung Wu, Chi-Hua Li, I-Ching Fang, Chin-Chia Hsu, Wei-Ting Lin, Chia-Hsiang Wu. 295-300 [doi]
- Learning Membership Functions in Takagi-Sugeno Fuzzy Systems by Genetic AlgorithmsTzung-Pei Hong, Wei-Tee Lin, Chun-Hao Chen, Chen-Sen Ouyang. 301-306 [doi]
- Supervising an Unsupervised Neural NetworkThe Duy Bui, Duy Khuong Nguyen, Tien Dat Ngo. 307-312 [doi]
- Implicit Camera Calibration Using MultiLayer Perceptron Type Neural NetworkDong-Min Woo, Dong-Chul Park. 313-317 [doi]
- ICA-Based Signal Reconstruction Scheme with Neural Network in Time Series ForecastingChi-Jie Lu, Jui-Yu Wu, Tian-Shyug Lee. 318-323 [doi]
- Black Box Modeling of Steam Distillation Essential Oil Extraction System Using NNARX StructureMohd Hezri Fazalul Rahiman, Mohd Nasir Taib, Yusof Md Salleh. 324-329 [doi]
- A Weighted Evolving Fuzzy Neural Network for Electricity Demand ForecastingPei-Chann Chang, Chin-Yuan Fan, Jih-Chang Hsieh. 330-335 [doi]
- Short-Term Load Forecasting Using Support Vector Regression Based on Pattern-BaseYing-Chun Guo, Dong-Xiao Niu. 336-340 [doi]
- Management of Wireless Local Area Networks by Artificial Neural Networks with Principal Components AnalysisPing-Feng Pai, Ying-Chieh Chang, Yu-Pin Hu. 341-345 [doi]
- Learning Radial Basis Function Model with Matching Score Quality for Person Authentication in Multimodal BiometricsHyunsoek Choi, Miyoung Shin. 346-350 [doi]
- An Agent-Based Workflow System for Assisting in IC DesignGuo-Ming Fang, Jim-Min Lin, Zeng-Wei Hong, De-Sheng Chen. 351-355 [doi]
- Towards Collaborative Spam Filtering Based on Collective IntelligenceJason J. Jung. 356-361 [doi]
- Dynamic Packet Balancing Agent in MANETs Based on AOMDVChen Ni, Hyeon-Cheol Zin, Bokman Lee, Dosam Hwang, Chonggun Kim. 362-367 [doi]
- Exploring the Use of Social Communications Technologies in Tasks and Its Performance in OrganizationsChulmo Koo, Jason J. Jung, Daeyong Lee. 368-373 [doi]
- RAKER: Resource-Aware Knowledge Extraction aRchitecture on Mobile GridYue-Shan Chang, Pei-Chun Shih, Tong-Ying Juang. 374-379 [doi]
- A Highly Robust Method for Face AuthenticationRerkchai Fooprateepsiri, Surakran Duangphasuk. 380-385 [doi]
- Real-Time Human Recognition by Their WalkAnh Viet Nguyen, Eung-Joo Lee. 386-391 [doi]
- Student Modelling Based on OntologiesAlejandro Peña Ayala. 392-397 [doi]
- Controllability and Minimum Energy Control Problem of Infinite Dimensional Fractional Discrete-Time Systems with DelaysJerzy Klamka. 398-403 [doi]
- Adaptive Control Scheme for a Process with Incorrect AdjustmentChung-Ming Yang, Su-Fen Yang. 404-409 [doi]
- Optimal Production Decisions for Deteriorating Items with Investment on Production ProcessesPing-Hui Hsu, Hui-Ming Teng, Hui-Ming Wee. 410-413 [doi]
- Improving Efficiency and Scalability of Service Network Graph by Re-routing Service RoutesDavid Lai, Zhongwei Zhang. 414-419 [doi]
- A New Model to Short-Term Power Load Forecasting Combining Chaotic Time Series and SVMDongxiao Niu, Yongli Wang. 420-425 [doi]
- ABC Supporting QoS Unicast Routing Scheme with Particle Swarm OptimizationXingwei Wang, Hai-quan Yang, Min Huang, Lei Guo. 426-429 [doi]
- Comparison of Data-Searching Algorithms for a Real-Time Information-Delivery SystemTakayuki Shizuno, Tsutomu Kitamura, Toshiya Okabe, Hideaki Tani. 430-435 [doi]
- A Proposal of Relaying Data in Aeronautical Communication for Oceanic Flight Routes Employing Mobile Ad-Hoc NetworkHo Dac Tu, Shigeru Shimamoto. 436-441 [doi]
- Self Actor-Actor Connectivity Restoration in Wireless Sensor and Actor NetworksAzadeh Zamanifar, Mohsen Sharifi, Omid Kashefi. 442-447 [doi]
- A Lightweight Application-Layer Signaling ProtocolTsutomu Kitamura, Takayuki Shizuno, Toshiya Okabe, Hideaki Tani. 448-452 [doi]
- CCBR: Chaining Case Based Reasoning in Context-Aware Smart HomeTam Van Nguyen, Yi Chang Woo, Deokjai Choi. 453-458 [doi]
- Scrutinizing Performance of Ad Hoc Routing Protocols on Wireless Sensor NetworksZhongwei Zhang, Hong Zhou, Jason Gao. 459-464 [doi]
- Using Rough Set and Support Vector Machine for Network Intrusion Detection SystemRung Ching Chen, Kai-Fan Cheng, Ying-Hao Chen, Chia-Fen Hsieh. 465-470 [doi]
- How to Maximize User Satisfaction Degree in Multi-service IP NetworksHuy Anh Nguyen, Tam Van Nguyen, Deokjai Choi. 471-476 [doi]
- Leader Election for Multi-channel Radio Networks - Dependent versus Independent TrialsZbigniew Golebiewski, Michal Koza, Marek Klonowski, Miroslaw Kutylowski. 477-482 [doi]