Abstract is missing.
- Agent architecture for building Robocode players with SWI-PrologVasile Alaiba, Armand Rotaru. 3-7 [doi]
- Tackling complexity of distributed systems: Towards an integration of service-oriented computing and agent-oriented programmingGiacomo Cabri, Letizia Leonardi, Raffaele Quitadamo. 9-15 [doi]
- Connecting methodologies and infrastructures in the development of agent systemsGiacomo Cabri, Mariachiara Puviani, Raffaele Quitadamo. 17-23 [doi]
- Adaptation of extended polymorpohic self-slimming agent model into e-sourcing platformKonrad Fuks, Arkadiusz Kawa, Waldemar Wieczerzycki. 25-29 [doi]
- The triple model: Combining cutting-edge web technologies with a cognitive model in an ECAMaurice Grinberg, Stefan Kostadinov. 31-37 [doi]
- Planning and re-planning in multi-actors scenarios by means of social commitmentsAntonín Komenda, Michal Pechoucek, Jirí Bíba, Jirí Vokrínek. 39-45 [doi]
- Utility-based model for classifying adversarial behaviour in multi-agent systemsViliam Lisý, Michal Jakob, Jan Tozicka, Michal Pechoucek. 47-53 [doi]
- An agent based system for distributed information management: A case studyMartijn Warnier, Reinier J. Timmer, Michel A. Oey, Frances M. T. Brazier, Anja Oskamp. 55-61 [doi]
- Applying Differential Evolution to the Reporting Cells problemSónia M. Almeida-Luz, Miguel Ángel Vega Rodríguez, Juan Antonio Gómez Pulido, Juan Manuel Sánchez-Pérez. 65-71 [doi]
- Towards Word Sense Disambiguation of PolishDominik Bas, Bartosz Broda, Maciej Piasecki. 73-78 [doi]
- Usering. Education self-tuning-recommendations in the 8th level of ISO/OSI modelMiroslaw Bedzak. 79-82 [doi]
- Sense-based clustering of Polish nouns in the extraction of semantic relatednessBartosz Broda, Maciej Piasecki, Stan Szpakowicz. 83-89 [doi]
- An immune approach to classifying the high-dimensional datasetsAndrzej Chmielewski, Slawomir T. Wierzchon. 91-96 [doi]
- Application of clustering and association methods in data cleaningLukasz Ciszak. 97-103 [doi]
- A rule-based approach to robust granular planningSebastian Ernst, Antoni Ligeza. 105-111 [doi]
- Support vector machines with composite kernels for nonlinear systems identificationAmina El Gonnouni, Abdelouahid Lyhyaoui, Soufiane El Jelali, Manel Martínez-Ramón. 113-118 [doi]
- The expert system approach in development of loosely coupled software with use of Domain Specific LanguagePiotr Grobelny. 119-123 [doi]
- Coalition Formation in multi-agent systems - an evolutionary approachWojciech Gruszczyk, Halina Kwasnicka. 125-130 [doi]
- Applying emphasized soft targets for Gaussian Mixture Model based classificationSoufiane El Jelali, Abdelouahid Lyhyaoui, Aníbal R. Figueiras-Vidal. 131-136 [doi]
- Improving Naïve Bayes models of insurance risk by unsupervised classificationAnna Jurek, Danuta Zakrzewska. 137-144 [doi]
- On a class of defuzzification functionalsWitold Kosinski, Wieslaw Piasecki. 145-150 [doi]
- Assessing the properties of the World Health Organization s Quality of Life IndexTamar Kakiashvili, Waldemar W. Koczkodaj, Phyllis Montgomery, Kalpdrum Passi, Ryszard Tadeusiewicz. 151-154 [doi]
- Accuracy boosting induction of fuzzy rules with Artificial Immune SystemsAdam Kalina, Edward Mezyk, Olgierd Unold. 155-159 [doi]
- On classification tools for genetic algorithmsStefan Kotowski, Witold Kosinski, Zbigniew Michalewicz, Piotr Synak, Lukasz Brocki. 161-164 [doi]
- Evolution of strategy selection in games by means of natural selectionDaniel Laszlo Kovacs, Tadeusz Dobrowiecki. 165-172 [doi]
- Image similarity detection in large visual data basesJuliusz L. Kulikowski. 173-180 [doi]
- Automatic acquisition of wordnet relations by the morpho-syntactic patterns extracted from the corpora in PolishRoman Kurc, Maciej Piasecki. 181-188 [doi]
- Using UML state diagrams for visual modeling of business rulesKonrad Kulakowski, Grzegorz J. Nalepa. 189-194 [doi]
- Discovery of technical analysis patternsUrszula Markowska-Kaczmar, Maciej Dziedzic. 195-200 [doi]
- A hybrid Differential Evolution algorithm to solve a real-world Frequency Assignment problemMarisa da Silva Maximiano, Miguel A. Vega-Rodríguez, Juan Antonio Gómez Pulido, Juan Manuel Sánchez-Pérez. 201-205 [doi]
- Hierarchical rule design with HaDEs the HeKatE toolchainGrzegorz J. Nalepa, Igor Wojnicki. 207-214 [doi]
- On automation of brain CT image analysisMariusz Paradowski, Halina Kwasnicka, Martin Tabakov, Jacek Filarski, Marek J. Sasiadek. 215-220 [doi]
- Neuronal groups and interrelationsMichal Pryczek. 221-227 [doi]
- Semantic relevance measure between resources based on a graph structureSang Keun Rhee, Jihye Lee, Myon-Woong Park. 229-236 [doi]
- Exclusion rule-based systems - case studyMarcin Szpyrka. 237-242 [doi]
- Ontological matchmaking in a Duty Trip Support application in a virtual organizationMichal Szymczak, Grzegorz Frackowiak, Maria Ganzha, Marcin Paprzycki, Sang Keun Rhee, Jihye Lee, Young Tae Sohn, Jae Kwan Kim, Yo-Sub Han, Myon-Woong Park. 243-250 [doi]
- Computer-aided detecting of early strokes and its evaluation on the base of CT imagesElzbieta Hudyma, Grzegorz Terlikowski. 251-254 [doi]
- Merging Jacobi and Gauss-Seidel methods for solving Markov chains on computer clustersJaroslaw Bylina, Beata Bylina. 263-268 [doi]
- Influence of molecular models of water on computer simulations of water nanoflowsJanusz Bytnar, Anna Kucaba-Pietal, Zbigniew Walenta. 269-275 [doi]
- A spare shared-memory multifrontal solver in SCAD softwareSergey Fialko. 277-283 [doi]
- Testing Tesla architecture for scientific computing: The performance of matrix-vector productPawel Maciol, Krzysztof Banas. 285-291 [doi]
- Solving a kind of BVP for second-order ODEs using novel data formats for dense matricesPrzemyslaw Stpiczynski. 293-296 [doi]
- On the hidden discrete logarithm for some polynomial stream ciphersVasyl Ustimenko. 297-301 [doi]
- Empirically tuning LAPACK s blocking factor for increased performanceR. Clint Whaley. 303-310 [doi]
- The impact of corpus quality and type on topic based text segmentation evaluationAlexandre Labadié, Violaine Prince. 313-319 [doi]
- SemCAPTCHA - user-friendly alternative for OCR-based CAPTCHA systemsPawel Lupkowski, Mariusz Urbanski. 325-329 [doi]
- Arabic/English word translation disambiguation approach based on naive Bayesian classifierFarag Ahmed, Andreas Nürnberger. 331-338 [doi]
- Smarty-extendable framework for bilingual and multilingual comprehension assistantsTodor Arnaudov, Ruslan Mitkov. 339-344 [doi]
- SuperMatrix: a General tool for lexical semantic knowledge acquisitionBartosz Broda, Maciej Piasecki. 345-352 [doi]
- Definition extraction: Improving Balanced Random ForestsLukasz Degórski, Lukasz Kobylinski, Adam Przepiórkowski. 353-357 [doi]
- An application supporting language analysis within the framework of the phonetic grammarKrzysztof Dyczkowski, Norbert Kordek, Pawel Nowakowski, Krzysztof Stronski. 359-362 [doi]
- Set of active suffix chains and its role in development of the MT system for AzerbaijaniRauf Fatullayev, Ali M. Abbasov, Abulfat Fatullayev. 363-368 [doi]
- A new word sense similarity measure in wordnetAli Sebti, Ahmad Abdollahzadeh Barfroush. 369-373 [doi]
- A linguistic light approach to multilingualism in lexical layers for ontologiesAlexander Troussov, John Judge, Mikhail Sogrin, Amine Akrout, Brian Davis, Siegfried Handschuh. 375-379 [doi]
- Modeling the frequency of phrasal verbs with search enginesGrazyna Chamielec, Dawid Weiss. 381-388 [doi]
- On stimulus for citizens use of e-government servicesCene Bavec. 391-395 [doi]
- e-collaboration platform for the development of rural areas and enterprisesGrzegorz Kolaczek, Adam Turowiec, Dominik Kasprzak, Witold Holubowicz. 397-401 [doi]
- Corporate blogs - innovative communication tool or another internet hype? empirical research studyGrzegorz Mazurek. 403-406 [doi]
- An examination of factors affecting bidders choice in electronic auctionsCostantinos Rougeris, George S. Androulakis. 407-413 [doi]
- Integration of governmental services in semantically described processes in the Access-eGov systemMarek Skokan, Tomas Sabol, Marian Mach, Karol Furdík. 415-419 [doi]
- In search of values in internet shopping-method and preliminary researchJacek Wachowicz, Piotr Drygas. 429-432 [doi]
- V-commerce: The potential of virtual worlds in servicesUrszula Swierczynska-Kaczor. 433-436 [doi]
- Intermediate information layer. The use of the SKOS ontology to create information about e-resources provided by the public administrationWojciech Gorka, Michal Socha, Adam Piasecki, Jakub Ganko. 437-442 [doi]
- Security perception in e-commerce: Conflict between customer and organizational perspectivesMohanad Halaweh, Christine Fidler. 443-449 [doi]
- Unicore 6 as a platform for desktop gridJakub Jurkiewicz, Krzysztof Nowinski, Piotr Bala. 453-457 [doi]
- Load balancing in the SOAJA web service platformRichard Olejnik, Iyad Alshabani, Bernard Toursel, Eryk Laskowski, Marek Tudruj. 459-465 [doi]
- Parallel performance prediction for numerical codes in a multi-cluster environmentGiuseppe Romanazzi, Peter K. Jimack. 467-474 [doi]
- On the robustness of the soft state for task scheduling in large-scale distributed computing environmentHarumasa Tada, Makoto Imase, Masayuki Murata. 475-480 [doi]
- Similar neighborhood criterion for edge detection in noisy and noise-free imagesAli S. Awad, Hong Man. 483-486 [doi]
- Accurate localization in short distance based on computer vision for mobile sensorsKwansik Cho, Ha Yoon Song, Jun Park. 487-493 [doi]
- Character recognition using Radon Transformation and Principal Component Analysis in postal applicationsMiroslaw Miciak. 495-500 [doi]
- The quasi-one-way function and its applications to image watermarkingKazuo Ohzeki, Engyoku Gi. 501-508 [doi]
- Question generation for learning evaluationLiana Stanescu, Cosmin Stoica Spahiu, Anca Ion, A. Spahiu. 509-513 [doi]
- Correctness issues of UML class and state machine models in the C# code generation and execution frameworkAnna Derezinska, Romuald Pilitowski. 517-524 [doi]
- Designing new XML based multidimensional messaging interface for the new XWarehouse architectureAhmed Bahaa Farid, Ahmed Sharaf Aldin Ahmed, Y. Mostafa Helmy. 525-534 [doi]
- PAFSV: A process algebraic framework for SystemVerilogKa Lok Man. 535-542 [doi]
- Dealing with redundancies and dependencies in normalization of XML dataTadeusz Pankowski, Tomasz Pilka. 543-550 [doi]
- Separation of crosscutting concerns at the design level: An extension to the UML metamodelAdam Przybylek. 551-557 [doi]
- Distributed Internet systems modeling using TCPNsTomasz Rak, Slawomir Samolej. 559-566 [doi]
- Real time behavior of data in distributed embedded systemsTanguy Le Berre, Philippe Mauran, Gérard Padiou, Philippe Quéinnec. 569-575 [doi]
- CompactRIO embedded system in Power Quality AnalysisPetr Bilik, Ludvik Koval, Jiri Hajduk. 577-580 [doi]
- Real-time task reconfiguration support applied to an UAV-based surveillance systemAlécio Pedro Delazari Binotto, Edison Pignaton de Freitas, Carlos Eduardo Pereira, André Stork, Tony Larsson. 581-588 [doi]
- Real-time support in adaptable middleware for heterogeneous sensor networksEdison Pignaton de Freitas, Marco A. Wehrmeister, Carlos Eduardo Pereira, Tony Larsson. 593-600 [doi]
- Embedded Control Systems Design based on RT-DEVS and temporal analysis using UPPAALAngelo Furfaro, Libero Nigro. 601-608 [doi]
- Study of different load dependencies among shared redundant systemsJan Galdun, Jean-Marc Thiriet, Jan Ligus. 609-615 [doi]
- Runtime resource assurance and adaptation with Qinna framework: A case studyLaure Gonnord, Jean-Philippe Babau. 617-624 [doi]
- Real-time control teaching using LEGO® MINDSTORMS® NXT robotWojciech Grega, Adam Pilat. 625-628 [doi]
- A safety shell for UML-RT ProjectsRoman Gumzej, Wolfgang A. Halang. 629-632 [doi]
- An RSIC-SE2004 curriculum frameworkThomas B. Hilburn, Andrew J. Kornecki, Jean-Marc Thiriet, Wojciech Grega, Miroslav Svéda. 633-638 [doi]
- You can t get there from here! Problems and potential solutions in developing new classes of complex computer systemsMichael G. Hinchey, James L. Rash, Walter Truszkowski, Roy Sterritt, Christopher A. Rouff. 639-647 [doi]
- Minos - the design and implementation of an embedded real-time operating system with a perspective of fault toleranceThomas Kaegi-Trachsel, Jürg Gutknecht. 649-656 [doi]
- Simulator generation using an automaton based pipeline model for timing analysisRola Kassem, Mikaël Briday, Jean-Luc Béchennec, Yvon Trinquet, Guillaume Savaton. 657-664 [doi]
- Software certification for safety-critical systems: A status reportAndrew J. Kornecki, Janusz Zalewski. 665-672 [doi]
- Modeling real-time database concurrency control protocol two-phase-locking in UppaalMartin Kot. 673-678 [doi]
- Distributed scheduling for real-time railway traffic controlTiberiu Letia, Mihai Hulea, Radu Miron. 679-685 [doi]
- Wireless Sensor and Actuator Networks: Charecterization and case study for confined spaces healthcare applicationsDiego Martinez, Francisco Blanes, José E. Simó, Alfons Crespo. 687-693 [doi]
- Real-time service-oriented communication protocols on resource constrained devicesGuido Moritz, Steffen Prüter, Dirk Timmermann, Frank Golatowski. 695-701 [doi]
- Task jitter measurement under RTLinux and RTX operating systems, comparison of RTLinux and RTX operating environmentsPavel Moryc, Jindrich Cernohorský. 703-709 [doi]
- Multilevel localization for Mobile Sensor Network platformsJae Young Park, Ha Yoon Song. 711-718 [doi]
- A component-based approach to verification of embedded control systems using TLA:::+:::Ondrej Rysavy, Jaroslav Ráb. 719-725 [doi]
- Algorithm for real time faces detection in 3D spaceRauf Kh. Sadykhov, Denis V. Lamovsky. 727-732 [doi]
- Reliability of malfunction toleranceIgor Schagaev. 733-737 [doi]
- Rapid control prototyping with Scilab/Scicos/RTAI for PC-based ARM-based platformsGrzegorz Skiba, Tomasz Zabinski, Andrzej Bozek. 739-744 [doi]
- Development of a flight control system for an ultralight airplaneVilém Srovnal, Jirí Kotzian. 745-750 [doi]
- Towards Self-Managing Real-Time SystemRoy Sterritt, Mike Hinchey. 751-756 [doi]
- IEC structured text programming of a small Distributed Control SystemDariusz Rzonca, Jan Sadolewski, Andrzej Stec, Zbigniew Swider, Bartosz Trybus, Leszek Trybus. 757-760 [doi]
- Web-based laboratories: How does that affect pedagogy? Thoughts for a panel discussionJanusz Zalewski. 761-762 [doi]
- Improving energy-efficient real-time scheduling by exploiting code instrumentationThorsten Zitterell, Christoph Scholl. 763-771 [doi]
- A Context-Risk-Aware Access Control model for Ubiquitous environmentsAli Ahmed, Ning Zhang. 775-782 [doi]
- User behaviour based phishing websites detectionXun Dong, John A. Clark, Jeremy L. Jacob. 783-790 [doi]
- A new worm propagation threat in BitTorrent: Modeling and analysisSinan Hatahet, Abdelmadjid Bouabdallah, Yacine Challal. 791-798 [doi]
- Information system security compliance to FISMA standard: A quantitative measureElaine Hulitt, Rayford B. Vaughn. 799-806 [doi]
- Analysis of different architectures of neural networks for application in Intrusion Detection SystemsPrzemyslaw Kukielka, Zbigniew Kotulski. 807-811 [doi]
- A semantic framework for privacy-aware access controlGeorgios V. Lioudakis, Nikolaos L. Dellas, Eleftherios Koutsoloukas, Georgia M. Kapitsaki, Dimitra I. Kaklamani, Iakovos S. Venieris. 813-820 [doi]
- Access control models in heterogeneous information systems: From conception to exploitationAneta Poniszewska-Maranda. 821-826 [doi]
- A Semantic aware Access Control model with real time constraints on history of accessesAli Noorollahi Ravari, Morteza Amini, Rasool Jalili. 827-836 [doi]
- Network-level properties of modern anonymity systemsMarta Rybczynska. 837-843 [doi]
- Performance evaluation of a machine learning algorithm for early application identificationGiacomo Verticale, Paolo Giacomazzi. 845-849 [doi]
- Supporting wireless application development via virtual executionNicholas M. Boers, Pawel Gburzynski, Ioanis Nikolaidis, Wladek Olesinski. 853-860 [doi]
- Wireless ad hoc networks: Where security, real-time and lifetime meetZdravko Karakehayov. 861-868 [doi]
- A method of mobile base station placement for High Altitude Platform based network with geographical clustering of mobile ground nodesHa Yoon Song. 869-876 [doi]
- Energy efficient percolation-driven flood routing for large-scale sensor networksGergely Vakulya, Gyula Simony. 877-883 [doi]
- Ant colony system approach for protein foldingStefka Fidanova, Ivan Lirkov. 887-891 [doi]
- Estimating time series future optima using a steepest descent methodology as a backtrackerEleni G. Lisgara, George S. Androulakis. 893-898 [doi]
- On a class of periodic scheduling problems: Models, lower bounds and heuristicsPhilippe Michelon, Dominique Quadri, Marcos Negreiros. 899-906 [doi]
- Visualizing multi-dimensional pareto-optimal fronts with a 3D virtual reality systemElina Madetoja, Henri Ruotsalainen, Veli-Matti Mönkkönen, Jari Hämäläinen, Kalyanmoy Deb. 907-913 [doi]
- Communication network design using Particle Swarm OptimizationChryssa A. Papagianni, Kostas Papadopoulos, Christos A. Pappas, Nikolaos D. Tselikas, Dimitra I. Kaklamani, Iakovos S. Venieris. 915-920 [doi]
- Two stages optimization problem: New variant of Bin Packing Problem for decision makingAhmad H. Shraideh, Hervé G. Camus, Pascal G. M. Yim. 921-925 [doi]
- Adaptive differential evolution and exponential crossoverJosef Tvrdík. 927-931 [doi]