Abstract is missing.
- Continuity and Change (Activity) Are Fundamentally Related in DEVS Simulation of Continuous SystemsBernard P. Zeigler, Rajanikanth Jammalamadaka, Salil R. Akerkar. 1-13 [doi]
- Systems Theory: Melding the AI and Simulation PerspectivesNorman Y. Foo, Pavlos Peppas. 14-23 [doi]
- Unified Modeling for Singularly Perturbed Systems by Delta Operators: Pole Assignment CaseKyungTae Lee, Kyu-Hong Shim, M. Edwin Sawan. 24-32 [doi]
- A Disaster Relief Simulation Model of a Building FireManabu Ichikawa, Hideki Tanuma, Yusuke Koyama, Hiroshi Deguchi. 33-41 [doi]
- Evaluation of Transaction Risks of Mean Variance Model Under Identical Variance of the Rate of Return - Simulation in Artificial MarketKo Ishiyama, Shusuke Komuro, Hideki Tanuma, Yusuke Koyama, Hiroshi Deguchi. 42-49 [doi]
- Association Rule Discovery in Data Mining by Implementing Principal Component AnalysisBobby D. Gerardo, Jaewan Lee, Inho Ra, Sangyong Byun. 50-60 [doi]
- Reorder Decision System Based on the Concept of the Order Risk Using Neural NetworksSungwon Jung, Yongwon Seo, Chankwon Park, Jinwoo Park. 61-70 [doi]
- Simulation Modeling with Hierarchical Planning: Application to a Metal Manufacturing SystemMi Ra Yi, Tae Ho Cho. 71-80 [doi]
- Vulnerability Modeling and Simulation for DNS Intrusion Tolerance System ConstructionHyung-Jong Kim. 81-89 [doi]
- NS-2 Based IP Traceback Simulation Against Reflector Based DDoS AttackHyung-Woo Lee, Taekyoung Kwon, Hyung-Jong Kim. 90-99 [doi]
- Recognition of Human Action for Game SystemHye Sun Park, Eun Yi Kim, Sang Su Jang, Hang Joon Kim. 100-108 [doi]
- The Implementation of IPsec-Based Internet Security System in IPv4/IPv6 NetworkSo-Hee Park, Jaehoon Nah, Kyo-Il Chung. 109-116 [doi]
- Describing the HLA Using the DFSS FormalismFernando J. Barros. 117-127 [doi]
- Proposal of High Level Architecture ExtensionJae-Hyun Kim, Tag Gon Kim. 128-137 [doi]
- High Performance Modeling for Distributed SimulationJong Sik Lee. 138-146 [doi]
- The Hierarchical Federation Architecture for the Interoperability of ROK and US SimulationsSeung-Lyeol Cha, Thomas W. Green, Chong-Ho Lee, Cheong Youn. 147-156 [doi]
- PPSS: CBR System for ERP Project Pre-planningSuhn-beom Kwon, Kyung-shik Shin. 157-166 [doi]
- A Scheduling Analysis in FMS Using the Transitive MatrixJong-Kun Lee. 167-178 [doi]
- Simulation of Artificial Life Model in Game SpaceJai Hyun Seu, Byung-Keun Song, Heung Shik Kim. 179-187 [doi]
- An Extensible Framework for Advanced Distributed Virtual Environment on GridSeung-Hun Yoo, Tae-Dong Lee, Chang-Sung Jeong. 188-197 [doi]
- Diffusion of Word-of-Mouth in Segmented Society: Agent-Based Simulation ApproachKyoichi Kjima, Hisao Hirata. 198-206 [doi]
- E-mail Classification Agent Using Category Generation and Dynamic Category HierarchySun Park, Sang Ho Park, Ju-Hong Lee, Jung-sik Lee. 207-214 [doi]
- The Investigation of the Agent in the Artificial MarketTakahiro Kitakubo, Yusuke Koyama, Hiroshi Deguchi. 215-223 [doi]
- Plan-Based Coordination of a Multi-agent System for Protein Structure PredictionHoon Jin, In-Cheol Kim. 224-232 [doi]
- Using Cell-DEVS for Modeling Complex Cell SpacesJavier Ameghino, Gabriel Andrés Wainer. 233-242 [doi]
- State Minimization of SP-DEVSMoon Ho Hwang, Feng Lin. 243-252 [doi]
- DEVS Formalism: A Hierarchical Generation SchemeSangjoon Park, Kwanjoong Kim. 253-261 [doi]
- Does Rational Decision Making Always Lead to High Social Welfare?Naoki Konno, Kyoichi Kijima. 262-269 [doi]
- Large-Scale Systems Design: A Revolutionary New Approach in Software Hardware Co-designSumit Ghosh. 270-274 [doi]
- Timed I/O Test Sequences for Discrete Event Model VerificationKi Jung Hong, Tag Gon Kim. 275-284 [doi]
- A Formal Description Specification for Multi-resolution Modeling (MRM) Based on DEVS FormalismLiu Baohong, Kedi Huang. 285-294 [doi]
- Research and Implementation of the Context-Aware Middleware Based on Neural NetworkJonghwa Choi, Soonyong Choi, Dongkyoo Shin, Dongil Shin. 295-303 [doi]
- An Efficient Real-Time Middleware Scheduling Algorithm for Periodic Real-Time TasksHo-Joon Park, Chang-Hoon Lee. 304-312 [doi]
- Mapping Cooperating GRID Applications by Affinity for Resource CharacteristicsKi-Hyung Kim, Sang-Ryoul Han. 313-322 [doi]
- Modeling of Policy-Based Network with SVDBWon Young Lee, Hee Suk Seo, Tae Ho Cho. 323-332 [doi]
- Timestamp Based Concurrency Control in Broadcast Disks EnvironmentSungjun Lim, Haengrae Cho. 333-341 [doi]
- Active Information Based RRK Routing for Mobile Ad Hoc NetworkSoo-Hyun Park, Soo Young Shin, Gyoo Gun Lim. 342-350 [doi]
- Applying Web Services and Design Patterns to Modeling and Simulating Real-World SystemsHeejung Chang, Kangsun Lee. 351-359 [doi]
- Ontology Based Integration of Web Databases by Utilizing Web InterfacesJeong-Oog Lee, Myeong-Cheol Ko, Hyun-Kyu Kang. 360-369 [doi]
- A Web Services-Based Distributed Simulation Architecture for Hierarchical DEVS ModelsKi-Hyung Kim, Won-Seok Kang. 370-379 [doi]
- Automated Cyber-attack Scenario Generation Using the Symbolic SimulationJong-Keun Lee, Min-Woo Lee, Jang-Se Lee, Sung-Do Chi, Syng-Yup Ohn. 380-389 [doi]
- A Discrete Event Simulation Study for Incoming Call Centers of a Telecommunication Service CompanyYun Bae Kim, Heesang Lee, Hoo-Gon Choi. 390-399 [doi]
- Requirements Analysis and a Design of Computational Environment for HSE (Human-Sensibility Ergonomics) SimulatorSugjoon Yoon, Jaechun No, Jon Ahn. 400-408 [doi]
- Using a Clustering Genetic Algorithm to Support Customer Segmentation for Personalized Recommender SystemsKyoung-jae Kim, Hyunchul Ahn. 409-415 [doi]
- System Properties of Action TheoriesNorman Y. Foo, Pavlos Peppas. 416-427 [doi]
- Identification of Gene Interaction Networks Based on Evolutionary ComputationSung Hoon Jung, Kwang-Hyun Cho. 428-439 [doi]
- Modeling Software Component Criticality Using a Machine Learning ApproachMiyoung Shin, Amrit L. Goel. 440-448 [doi]
- Component Architecture Redesigning Approach Using Component MetricsByungsun Ko, Jainyun Park. 449-459 [doi]
- A Workflow Variability Design Technique for Dynamic Component IntegrationChul Jin Kim, Eun Sook Cho. 460-469 [doi]
- Measuring Semantic Similarity Based on Weighting Attributes of Edge CountingJuHum Kwon, Chang-Joo Moon, Soo-Hyun Park, Doo-Kwon Baik. 470-480 [doi]
- 3D Watermarking Shape Recognition System Using Normal Vector Distribution ModellingKi-Ryong Kwon, Seong Geun Kwon, Suk Hwan Lee. 481-489 [doi]
- DWT-Based Image Watermarking for Copyright ProtectionHo Seok Moon, Myung Ho Sohn, Dong-Sik Jang. 490-497 [doi]
- Cropping, Rotation and Scaling Invariant LBX Interleaved Voice-in-Image WatermarkingSungshik Koh, Chung Hwa Kim. 498-507 [doi]
- Data Aggregation for Wireless Sensor Networks Using Self-organizing MapSangHak Lee, Tae-Choong Chung. 508-517 [doi]
- Feasibility and Performance Study of a Shared Disks Cluster for Real-Time ProcessingSangho Lee, KyungOh Ohn, Haengrae Cho. 518-527 [doi]
- A Web Cluster Simulator for Performance Analysis of the ALBM Cluster SystemEunmi Choi, Dugki Min. 528-537 [doi]
- Dynamic Load Balancing Scheme Based on Resource Reservation for Migration of Agent in the Pure P2P Network EnvironmentGu Su Kim, Kyoung-in Kim, Young Ik Eom. 538-546 [doi]
- Application of Feedforward Neural Network for the Deblocking of Low Bit Rate Coded ImagesKee-Koo Kwon, Man-Seok Yang, Jin-Suk Ma, Sung-Ho Im, Dong-Sun Lim. 547-555 [doi]
- A Dynamic Bandwidth Allocation Algorithm with Supporting QoS for EPONMin-Suk Jung, Jonghoon Eom, Sang-Ryul Ryu, Sung-Ho Kim. 556-564 [doi]
- A Layered Scripting Language Technique for Avatar Behavior Representation and ControlJae-Kyung Kim, Won-Sung Sohn, Beom-Joon Cho, Soon-Bum Lim, Yoon-Chul Choy. 565-573 [doi]
- An Integrated Environment Blending Dynamic and Geometry ModelsMinho Park, Paul A. Fishwick. 574-584 [doi]
- Linux-Based System Modelling for Cyber-attack SimulationJang-Se Lee, Jung-Rae Jung, Jong Sou Park, Sung-Do Chi. 585-596 [doi]
- A Rule Based Approach to Network Fault and Security Diagnosis with Agent CollaborationSiheung Kim, Seong-Jin Ahn, Jinwok Chung, Ilsung Hwang, Sunghe Kim Minki No, Seungchung Sin. 597-606 [doi]
- Transient Time Analysis of Network Security Survivability Using DEVSJong Sou Park, Khin Mi Mi Aung. 607-616 [doi]
- A Harmful Content Protection in Peer-to-Peer NetworksTaekyong Nam, Ho Gyun Lee, Chi-Yoon Jeong, ChiMoon Han. 617-626 [doi]
- Security Agent Model Using Interactive Authentication DatabaseJae-Woo Lee. 627-634 [doi]
- Discrete-Event Semantics for Tools for Business Process Modeling in Web-Service EraRyo Sato. 635-644 [doi]
- An Architecture Modelling of a Workflow Management SystemDugki Min, Eunmi Choi. 645-654 [doi]
- Client Authentication Model Using Duplicated Authentication Server SystemsJae-Woo Lee. 655-662 [doi]
- Dynamic Visualization of Signal Transduction Pathways from Database InformationDonghoon Lee, Byoung-Hyun Ju, Kyungsook Han. 663-672 [doi]
- Integrated Term Weighting, Visualization, and User Interface Development for Bioinformation RetrievalMin Hong, Anis Kairmpour-fard, Steve Russell, Lawrence Hunter. 673-682 [doi]
- CONDOCS: A Concept-Based Document Categorization System Using Concept-Probability Vector with ThesaurusHyun-Kyu Kang, Jeong-Oog Lee, Heung Seok Jeon, Myeong-Cheol Ko, Doo-Hyun Kim, Ryum-Duck Oh, Wonseog Kang. 683-691 [doi]
- Using DEVS for Modeling and Simulation of Human BehaviourMamadou Seck, Claudia S. Frydman, Norbert Giambiasi. 692-698 [doi]
- Simulation Semantics for Min-Max DEVS ModelsMaâmar El-Amine Hamri, Norbert Giambiasi, Claudia S. Frydman. 699-708 [doi]