Abstract is missing.
- The Myth of Computing s MaturityJohn Hansen.
- Reusing Information by Learning Models from Extreme Data SetsLarry Hill.
- Using ordered pairs to transcend the lilitations of knowledge representation with application to quantum logicPhil Catabrese.
- Evolutionary Computation: Information Discovery and Reuse in GamesDavid B. Fogel.
- An Object-Extracting Approach Based on Non-negative Matrix FactorizationDazhou Kang, Baowen Xu, Wenxian Zhang, Jianjiang Lu. 1-5
- Verification of Multiple Input/Multiple Output Business ProcessesCostin Badica, Chris Fox. 6-11
- SQL Statement Template: A Development Approach for Database-Driven ApplicationsOsama Mabrouk Khaled, Hoda Mohammed Hosny. 12-17
- Identifying Domain Patterns using Software StabilityAhmed M. Mahdy, Haitham S. Hamza, Mohamed E. Fayad, Marshall Cline. 18-23
- A Re-Engineering Approach for PLC Programs using Finite Automata and UMLGeorg Frey, Mohammed Bani Younis. 24-29
- Using Reengineering and Aspect-based Techniques to Retrieve Knowledge Embedded in Object-Oriented Legacy SystemVinicius Cardoso Garcia, Daniel Lucrédio, Antônio Francisco do Prado, Eduardo Santana de Almeida, Alexandre Alvaro. 30-35
- Sharing Core Knowledge in Networks with Node Assignment ApplicationsAhmed M. Mahdy, Mohamed E. Fayad. 36-41
- Developing Tools for Reverse Engineering in a Software Product-Line ArchitectureChia-Chu Chiang, Roger Y. Lee. 42-47
- RiSE Project: Towards a Robust Framework for Software ReuseEduardo Santana de Almeida, Alexandre Alvaro, Daniel Lucrédio, Vinicius Cardoso Garcia, Silvio Romero de Lemos Meira. 48-53
- AnyTransaction Stable Design PatternRam Goverdhana, Mohamed E. Fayad. 54-59
- Separation of Concerns in Software Architecture via a Multiviews DescriptionAbdelaziz Gacemi, Abdelhak Seriai, Mourad Chabane Oussalah. 60-65
- Extreme Harvesting: Test Driven Discovery and Reuse of Software ComponentsOliver Hummel, Colin Atkinson. 66-72
- Scenario Based Generative Component Adaptation in .NET FrameworkBeihu Wang, Xiaodong Liu, Jon M. Kerridge, Yang Li. 73-78
- Component Retrieval using Metric IndexingDaniel Lucrédio, Alan Gavioli, Antônio Francisco do Prado, Mauro Biajiz, Eduardo Santana de Almeida, Silvio Romero de Lemos Meira, Claudio Haruo Yamamoto. 79-84
- A Lightweight Multimedia Web Content Management SystemYong-gang Cao, Nuo Li, Mao-zhong Jin, Yu-qing Lan. 85-90
- Applied Knowledge Analytics for Military ExperimentationR. William Maule, Gordon Schacher, Shelley P. Gallup, Bryan McClain. 91-96
- Using XQuery to describe Mappings from Global Schemas to Local Data SourcesXiaobo Peng, Robert P. Brazile, Kathleen M. Swigger. 97-102
- WVFA: A Web Visualization Framework ArchitectureSantiago Eibe, Oscar Marbán. 103-108
- Multi-Level Filters for a Web-based E-Mail SystemYuanfu Ji, Du Zhang, Meiliu Lu. 109-114
- Context Learning Can Improve User InteractionSushil J. Louis, Anil Shankar. 115-120
- An Autotester for the Modified Nextdate Function Reusing a Test Case GeneratorNarayan C. Debnath, Wenying Feng, Mark Burgin, Joshua Wilson, Joseph Cropper. 121-126
- XML-Based Software Component Retrieval with Partial and Reference MatchingUpsorn Praphamontripong, Gongzhu Hu. 127-132
- Incorporating a Reuse Model to the RAISE Formal MethodDaniel Riesco, Laura Felice, Narayan C. Debnath, German Montejano. 133-138
- Execution Model for Non-Hierarchical Heterogeneous ModelingAimé Mokhoo Mbobi, Frédéric Boulanger, Mohamed Feredj. 139-144
- Approach for Domain-Polymorph Components DesignMohamed Feredj, Frédéric Boulanger, Aimé Mokhoo Mbobi. 145-150
- Experience Report on the Effect of Market Reposition on Product Line EvolutionRazvan T. Dumitrescu, Antonio J. Bailetti, Samuel Ajila. 151-156
- Using Traceability Mechanisms to Support Software Product Line EvolutionSamuel Ajila, Badara Ali Kaba. 157-162
- Selective Block Matching Algorithm for Video SystemMing-Jui Kuo, Chi-Cheng Ting, Jung-Hua Wang. 163-167
- A System for Distributed Image Acquisition, Content-Analysis and Similarity RetrievalIbrahim Noorzaie, Y. Alp Aslandogan, M. Emre Celebi. 168-173
- Reuse of a Geometric Model for Shape ApproximationJunta Doi, Wataru Sato, Yohei Miyamoto, Shingo Ando, Masaaki Yamanaka. 174-179
- Audio Watermarking Based On Inverse Difference DecompositionRoumen Kountchev, Mariofanna G. Milanova, Charles Ford, Stuart Harvey Rubin, Roumiana Kountcheva. 180-185
- Synchronization of Mobile XML Databases by Utilizing Deferred ViewsKevin Miller, Chris Gee, Ryan Inaba, Tansel Özyer, Anthony Lo, Reda Alhajj. 186-191
- Design and Implementation of a Web-Based Oil Delivery Remote Monitoring and Controlling SystemJun Chen, Yaqing Tu. 192-197
- Some Empirical Results on Two Spam Detection MethodsRyota Matsumoto, Du Zhang, Meiliu Lu. 198-203
- Hash-based Internet Traffic Load BalancingJu-Yeon Jo, Yoohwan Kim. 204-209
- Software Technological Roles, Usability, and ReusabilityMark Burgin, Haesun K. Lee, Narayan C. Debnath. 210-214
- From Graphical Representations to Formal Specifications and Return: Translation Algorithms in the HarmonySergiu Dascalu, Peter Hitchcock, Narayan C. Debnath, Andrew Klempau. 215-221
- A Practical Approach to Test Case Design for Module Based Web Applications and ReusabilityWenying Feng, Vivek Gupta, Narayan C. Debnath. 222-228
- ACE: Improving Search Engines via Automatic Concept ExtractionPaul M. Ramirez, Chris Mattmann. 229-234
- Visualizing Knowledge for Data Mining using Dimension Reduction MappingsIgnacio Díaz Blanco, Abel A. Cuadrado Vega, Alberto B. Diez González. 235-240
- A Genetic K-means Approaches for Automated Web Page ClassificationDehu Qi, Bo Sun. 241-246
- Affinity-Based Similarity Measure for Web Document ClusteringMei-Ling Shyu, Shu-Ching Chen, Min Chen, Stuart Harvey Rubin. 247-252
- Equivalent Individuals on the Semantic WebBaowen Xu, Dazhou Kang, Jianjiang Lu, Peng Wang, Yanhui Li. 253-258
- A Study of Coaching Assisted System using Learning Object Value ModelThanapol Wisuttikul, Choompol Boonmee. 259-264
- Business Process Reengineering Based on IDEF MethodsYan-ling Xiao, Fu-yuan Xu, Wen-bo Hu. 265-270
- Using Petri Nets to Verify Security Policies in Mandatory Access Control ModelYixin Jiang, Chuang Lin, Zhen Chen, Hao Yin. 271-276
- A Role-Based Access Control Model for Information MediationLi Yang, Raimund K. Ege, Onyeka Ezenwoye, Qasem Kharma. 277-282
- A Component-Based Design for a Simulated NetworkDavid Edelstein, Denise Edwards. 283-289
- Robustness Enhancement for Proximal Support Vector MachinesMeng Zhang II, Gaofeng Wang, Lihua Fu. 290-295
- Mining Real Estate Listings Using ORACLE Data Warehousing and Predictive RegressionWuri Wedyawati, Meiliu Lu. 296-301
- Knowledge Management: Impact of Knowledge Delivery Factors on Software Product Development EfficiencySamuel Ajila, Zheng Sun. 302-325
- Rule-Based Noise Detection for Software Measurement DataTaghi M. Khoshgoftaar, Naeem Seliya, Kehan Gao. 302-307
- On the Auto-Randomization of KnowledgeStuart Harvey Rubin. 308-313
- Knowledge-Based Systems for Biomedical Laboratory ApplicationsThomas Kern, Karin Breuer, Doris Siegl, Wolfgang Straßer. 314-319
- K-Support System: Knowledge Support for Disseminating and Sharing Task-relevant KnowledgeI-Chin Wu, Duen-Ren Liu, Kuen-Shieh Yang. 326-331
- Improvement of Visual Customer Relationship Management SystemTetsuo Hidaka, Tetsushi Morita, Tomohiko Nakamura, Morihide Oinuma, Yutaka Hirakawa. 332-337
- Designing Knowledge Management Systems: Reuse and Integration of Findings in Computer Supported Cooperative WorkKibum Kim, Deborah G. Tatar. 338-343
- Temporal vs. Spectral Approach to Feature Extraction from Prehensile EMG SignalsSijiang Du, Marko Vuskovic. 344-350
- Coordinating Human Operators and Computer Agents for Recovery-Oriented ComputingSreekanth K. Bhaskaran, Baback A. Izadi, Lisa Spainhower. 351-356
- A Data Mining Framework for Building A Web-Page Recommender SystemChoochart Haruechaiyasak, Mei-Ling Shyu, Shu-Ching Chen. 357-362
- Data Stream Mining Architecture for Network Intrusion DetectionNelson C. N. Chu, Adepele Williams, Reda Alhajj, Ken Barker. 363-368
- Generating Multiple Noise Elimination Filters with the Ensemble-Partitioning FilterTaghi M. Khoshgoftaar, Pierre Rebours. 369-375
- KDIST: A Development Environment for Knowledge Discovery SystemWu Zhenglong, Wang Ruijing, Fanlun Xiong. 376-381
- Cognitive Style as a Factor in the Effective Reuse of Knowledge Management SystemsFergal McGrath, Catherine Parkes. 382-387
- Consistency Maintenance in Ontological Knowledge UpdatingNwe Ni Tun, Satoshi Tojo. 388-393
- Toward An Integrated Human-Centered Knowledge-Based Collaborative Decision Making SystemSeung-yun Kim, Ashish Godbole, Ran Huang, Rohit Panchadhar, Waleed W. Smari. 394-401
- Structural Change Detection in Time Series Based on DP with Action CostHiromichi Kawano, Tetsuo Hattori, Ken Nishimatsu. 402-407
- Characters Recognition Using Vector Field and Linear Regression ModelTetsuya Izumi, Tetsuo Hattori, Hiroyuki Kitajima, Toshinori Yamasaki. 408-413
- Visualization of Design Knowledge Component Relationships to Facilitate ReuseShahtab Wahid, Jamie L. Smith, Brandon Berry, Christa M. Chewar, D. Scott McCrickard. 414-419
- Knowledge Management: Overcoming the Knowledge Acquisition BottleneckStuart Harvey Rubin, Wei Dai. 420-425
- MORSA : An Algorithm to Discover Association Rules in Image Data using Recurrent Items and Significant Rare ItemSang-Kee Suk, Im-Young Song, Kyung-Chang Kim. 426-432
- A STRUCTURE-ADAPTIVE PIECE-WISE LINEAR SEGMENTS REPRESENTATION FOR TIME SERIESWang Xiao-ye, Wang Zheng-ou. 433-437
- Mining Ordinal Patterns for Data CleaningYa-Bo Liu, Dayou Liu. 438-443
- Cooperative Agents Through BiddingDehu Qi, Ron Sun. 444-449
- Design and Implementation of Virtual Laboratories Using Wrapping and Agent TechniquesYi-Hsung Li, Chyi-Ren Dow, Fu-Wei Hsu, Cheng-Min Lin, Tsung-Chuan Huang. 450-455
- An Instant Messaging-based Multi-agent Coordination SystemSheng-Chang Chen, Chyi-Ren Dow, Tsung-Kai Yang, Jin-Yu Bai, Cheng-Min Lin. 456-461
- Design and Completion of Digital Certificate with Authorization Based on PKIZhengxian Gao, Zhongxue Li, Yaqing Tu. 462-466
- Applying Hidden Markov Models to Keystroke Pattern Analysis for Password VerificationWendy Chen, Weide Chang. 467-474
- Analysis of Payment Transaction Security in Mobile CommerceSeema Nambiar, Chang-Tien Lu, Lily R. Liang. 475-480
- Solution Reuse in Partial MAX-SAT ProblemMohamed El-bachir Menai. 481-486
- Model-based Testing and Monitoring for Hybrid Embedded SystemsLi Tan, Jesung Kim, Oleg Sokolsky, Insup Lee. 487-492
- Specification-based Testing with Linear Temporal LogicLi Tan, Oleg Sokolsky, Insup Lee. 493-498
- Furthest Fitting Cost: Time Series Similarity from Another AngleJia-Cheng Ye, Yin Tang, Hong Peng, Qi Lun Zheng, Sunan Ye. 499-503
- Association Rule Analysis for an Online Education SystemBehrouz Minaei-Bidgoli, Gerd Kortemeyer, William F. Punch. 504-509
- Managing Knowledge throughout the Software Development Cycle using the Cognitive Decision Aid Knowledge Acquisition Toolset (CDAKAT)Harry Funk, Christopher A. Miller, Peggy Wu, John Meisner. 510-515
- Decision Support Systems Design as Knowledge-based Tool IntegrationSophie Lepreux, Christophe Kolski, Mourad Abed. 516-521
- Fusing Legal KnowledgeÉric Grégoire. 522-529
- Supervised and Unsupervised Automatic Spelling Correction AlgorithmsSebastian van Delden, David B. Bracewell, Fernando Gomez. 530-535
- Chaotic Simulated Annealing Neural Network with Decaying Chaotic Noise and Its Application in Economic Load Dispatch of Power SystemsYa-lin Mao, Guo-zhong Zhang, Bin Zhu, Ming Zhou. 536-542
- Forecasting Global Internet Growth Using Fuzzy Regression, Genetic Algorithm and Neural NetworkKallol Kumar Bagchi, Somnath Mukhopadhyay. 543-548
- A Predictive Control Strategy Based on Fuzzy SystemHai-Rong Sun, Pu Han, Song-Ming Jiao. 549-552
- Decisionmaking with Fuzzy-Belief-State-Based ReasoningLily R. Liang, Carl G. Looney. 553-558
- A Liquid Nonlinear Acoustic Parameter B/A Measuring System Based on Information FusionLiangbing Liu, Yaqing Tu. 559-563
- An Approach to Text Classification Using Dimensionality Reduction and Combination of ClassifiersGaurav Jain, Abbasali Ginwala, Y. Alp Aslandogan. 564-569
- A Multi-Agent Approach for Dynamic Ontology Loading to Support Semantic Web ApplicationsBrooke Abrahams, G. Michael McGrath, Wei Dai. 570-575
- An Efficient Algorithm for Fuzzy Web-MiningRui Wu, Wansheng Tang, Ruiqing Zhao. 576-581
- Fuzzification of a Standard Ontology to Encourage ReuseDavid Parry. 582-587
- Discussion on interest spider s algorithm of search engineYajun Du, Yang Xu, Zhan-shen Li, Dong-mei Qi. 588-593
- Quantitative Analysis with IQAM for Business Decision SupportBinbin Lai. 594-599
- A Heuristic Approach for Best Sets of Actions Determination in Influence NetsSajjad Haider, Abbas K. Zaidi, Alexander H. Levis. 600-605
- Realization of a Bridge between High-Level Information Need and Sensor Management Using a Common DBNRobert Suzic, L. Ronnie M. Johansson. 606-611
- Scale Equalization Higher-order Neural NetworksJung-Hua Wang, Keng-Hsuan Wu, Fu-Chiang Chang. 612-617
- Blending Scheduling Based on Particle Swarm Optimization AlgorithmXiaoqiang Zhao, Gang Rong. 618-622
- Genetic Learning and Optimization of Fuzzy Sets in Fuzzy Rule-Based SystemMatheus G. Pires, Heloisa de Arruda Camargo. 623-628