Abstract is missing.
- Incremental Learning Using Partly Labeled DataWael Emara, Mehmed M. Kantardzic. 1-8
- Supporting Knowledge Management Within Process and Group Settings Using Visual Topic MapsLes Miller, Sree Nilakanta, Meghana Rao. 9-14
- Silicon Prediction Models for Blast FurnaceRitu Singh, Toma I. Hentea. 15-20
- Intelligent Computer-Aided Control in Flexible Manufacturing SystemJoze Balik, Franci Cus, Janez Kopac. 21-26
- Usage of the HMM-Based Speech Synthesis for Intelligent Arabic VoiceTamer S. Fares, Awad H. Khalil, Abdel Fatah A. Hegazy. 27-32
- Implementation of a Pairwise Sequence Alignment Algorithm on a Distributed Java EnvironmentHaklin Kimm, Glenn Miller, Haesun K. Lee. 33-38
- Using Formal Concept Analysis for Flexible Querying OptimizationAmel Grissa-Touzi, Minyar Sassi, Habib Ounelli. 39-46
- A Practical Method to Implement Asynchronous Iterative Algorithms on MPI and a Case Study for Asynchronous Self-Organizing MapsJie Hu, Bishow Paudel. 47-52
- Optimal Statistical Artificial Neural Networks for Arabic Character RecognitionAhmad M. Sarhan. 53-58
- On the Selection of the Fitness Function Heuristics and Prediction Parameters for an Adaptive Neural Network Fuzzy Inference ControllerGordon K. Lee, Tang Ping. 59-63
- Investigation of Random Forest Performance with Cancer Microarray DataMyungsook Klassen, Matt Cummings, Griselda Saldana. 64-69
- Toward an Intelligent Data and Visualization Desk for Endovascular SurgeryMarc Garbey, C. Picard, Victoria Hilford, S. Vadakuttu. 70-76
- Intelligent Model for Avian Influenza Virus SpreadingHonoriu Valean, Adina Pop, Camelia Avram. 77-82
- Motion Vector Search Modified to Reduce Encoding Time in H.264 and VC-1Mohamed El-Sharkawy. 83-89
- Radio Spectrum Management - An International PerspectiveS. Srinivasa. 90-94
- Fast H.264 Video Codec StandardMohamed El-Sharkawy. 95-101
- Architecture-specific Implementation of Haar-based MAD DenoisingSaleh Ibrahim, Robert Luce, Olivier Pfeiffer, Howard A. Sholl. 102-106
- A Data Stream Clustering Algorithm Using Discrete Cosine TransformDamalie Oyana, Cheng Luo, Wen-Chi Hou, Zhewei Jiang, Dunren Che. 107-112
- Time/Performance Tradeoffs in Hard Real-Time Denoising of US SignalsSaleh Ibrahim, Robert Luce, Olivier F. Pfeiffer, Howard A. Sholl. 113-117
- A Graph-Based Course Recommender SystemAlexey Kalinin, Perry Fizzano. 118-123
- A Novel Platform of Text Relatedness Evaluation for Plagiarism DetectionChung-Hong Lee, Hsin-Chang Yang. 124-129
- Fast Implementation of VC-1 Video Codec StandardMohamed El-Sharkawy. 130-135
- Formal Automated Transformation of SDL Specifications to Estelle SpecificationsHazem El-Gendy, Nabil El-Kadhi, Narayan C. Debnath. 136-141
- Reliability of Computer Communication Networks Using Binary Decision DiagramsHarpreet Singh, Adam Mustapha, Vijay Sharma, Mark Hua, Grant R. Gerhart. 142-147
- Architecture-based Performance and Reliability Analysis of Concurrent Applications with Hyperexponential Component Execution TimesRehab El-Kharboutly, Reda A. Ammar, Swapna S. Gokhale. 148-153
- L58ow FM: A Robust Non-Blocking Low Frequency Messaging Checkpoint for Parallel/Grid ApplicationsGamal A. El-Sayed, Ian R. Greenshields. 154-158
- Hierarchical Template Matching For Real-Time Symbol DetectionJohn M. Weiss. 159-164
- Distributed Localization in Sensor Networks Using Self-Organizing MapsJie Hu. 165-168
- Modified DTTL for 16QAM Symbol Recovery of DOCSIS 2.0 StandardsAmer Ibrahim, Dan Chappell, Mohamed El-Sharkawy, Dongsoo Kim, Maher E. Rizkalla. 169-174
- A Text Processing System for Mining Association RulesPengwei Yang, Gongzhu Hu. 175-180
- Transformational Design of a Fault Tolerant Sequential Memory ComponentWalter Dosch. 181-188
- A Synchronous/Asynchronous Multi-Master Replication MethodAmer Chahine, Ramzi A. Haraty. 189-195
- Improving the Accuracy of Support Vector MachinesEnnumeri A. Zanaty, Sultan Aljahdali. 196-202
- Testing: Organization and EvaluationMark Burgin, Sultan Aljahdali. 203-208
- The Value of Material-Orientation in the Separation of ConcernsJody K. Sharpe, Manzour K. Zand. 209-214
- Factors Affecting the Quality of Software Development ProcessKhalid A. Buragga, Ayad Aldaijy. 215-221
- A Perspective on Security Risk Management of SCADA Control SystemsMariana Hentea. 222-227
- Anatomy and a Framework of Mobile GamesChong Wei, Edward Grant. 228-232
- MVC-Based Requirements-Aware Design for Web ApplicationsMarcel Karam, Jad Kawtharani. 233-239
- A Method for Detecting Windows RootkitsDouglas R. Wampler, James H. Graham. 239-243
- Online Recruitment - An Intelligent ApproachSamah Rifai, Ramzi A. Haraty. 240-245
- Collaboration of Software Engineering Courses to Enhance Students Learning ExperienceThomas Philip. 246-251
- An Agent Based Framework for Peer to Peer Distributed ComputingSubhrabrata Choudhury, Devlina Mukherjee, Paramita Chakraborty, Narayan C. Debnath, Ilhyun Lee. 252-257
- Graph Coloring for Enforcing Password Identification against Brute Force AttacksJuan M. Gutiérrez Cárdenas, Wilfredo Bardales Roncalla, Lenin Orihuela Ordóñez. 258-263
- An Ontological Model for Assessing Security Risk Impact in SCADA SystemsJian Guan, James H. Graham, Thomas A. Harris, Patricia A. S. Ralston. 264-269
- A Behavioral Simulator for PCI-Express Transaction LayerBehnam S. Arad, Hong Chang. 275-280
- An Interactive Computer Design in MultisimHassan Farhat. 281-286
- Interaction-Based Mechanisms to Model Hierarchical ArchitecturesAbdelkrim Amirat, Mourad Oussalah. 287-292
- Automated Calibration of Automotive Test InstrumentationDavid C. Pheanis, Scott M. Creasman. 293-298
- An Advanced Fault Data/Information Presentation in Power SystemsMladen Kezunovic, Biljana Matic Cuka, Ozgur Gonen, K. M. O. Nunes. 299-304