Abstract is missing.
- Agent-Based Approach for Dynamic Ontology ManagementLi Li, Baolin Wu, Yun Yang. 1-7 [doi]
- A Novel Approach for Developing Autonomous and Collaborative AgentsNora Houari, Behrouz Homayoun Far. 8-15 [doi]
- The Effect of Alteration in Service Environments with Distributed Intelligent AgentsDragan Jevtic, Marijan Kunstic, Denis Ouzecki. 16-22 [doi]
- Managing Collaboration in a Multiagent SystemJohn K. Debenham, Simeon J. Simoff. 23-29 [doi]
- Learning Plans with Patterns of Actions in Bounded-Rational AgentsBudhitama Subagdja, Liz Sonenberg. 30-36 [doi]
- Roles of Agents in Data-Intensive Web SitesAli Ben Ammar, Abdelaziz Abdellatif, Henda Hajjami Ben Ghézala. 37-45 [doi]
- Probabilistic Reasoning Techniques for the Tactical Military DomainCatherine Howard, Markus Stumptner. 46-53 [doi]
- A Network Service Access Control Framework Based on Network Blocking AlgorithmJahwan Koo, Seong-Jin Ahn. 54-61 [doi]
- 3-D Building Reconstruction Using IKONOS Multispectral Stereo ImagesHong-Gyoo Sohn, Choung-Hwan Park, Joon Heo. 62-68 [doi]
- Heuristic Algorithm for Estimating Travel Speed in Traffic Signalized NetworksHyung Jin Kim, Bongsoo Son, Soobeom Lee, Sei-Chang Oh. 69-73 [doi]
- Home Network Observation System Using User s Activate Pattern and Multimedia StreamingKyung-Sang Sung, Dong Chun Lee, Hyun-Chul Kim, Hae-Seok Oh. 74-80 [doi]
- Determination of Optimal Locations for the Variable Message Signs by the Genetic AlgorithmJaimu Won, Sooil Lee, Soobeom Lee. 81-86 [doi]
- Estimation of the Optimal Number of Cluster-Heads in Sensor NetworkHyunsoo Kim, Seong W. Kim, Soobeom Lee, Bongsoo Son. 87-94 [doi]
- Development of Integrated Transit-Fare Card System in the Seoul Metropolitan AreaJeonghyun Kim, Seungpil Kang. 95-100 [doi]
- Efficient Migration Scheme Using Backward Recovery Algorithm for Mobile Agents in WLANDong Chun Lee. 101-106 [doi]
- Using Similarity Measure to Enhance the Robustness of Web Access Prediction ModelBen Niu, Simon C. K. Shiu. 107-111 [doi]
- Intelligent Financial News Digest SystemJames N. K. Liu, Honghua Dai, Lina Zhou. 112-120 [doi]
- An Incremental FP-Growth Web Content Mining and Its Application in Preference IdentificationXiaoshu Hang, James N. K. Liu, Yu Ren, Honghua Dai. 121-127 [doi]
- Similarity Retrieval from Time-Series Tropical Cyclone Observations Using a Neural Weighting Generator for Forecasting ModelingBo Feng, James N. K. Liu. 128-134 [doi]
- Web Access Path Prediction Using Fuzzy Case Based ReasoningSimon C. K. Shiu, Cody K. P. Wong. 135-140 [doi]
- Multiple Classifier System with Feature Grouping for Intrusion Detection: Mutual Information ApproachAki P. F. Chan, Wing W. Y. Ng, Daniel S. Yeung, Eric C. C. Tsang. 141-148 [doi]
- Design and Implement a Web News Retrieval SystemJames N. K. Liu, Weidong Luo, Edmond M. C. Chan. 149-156 [doi]
- An Ontology for Integrating Multimedia DatabasesChull Hwan Song, Young Hyun Koo, Seong-Joon Yoo, ByeongHo Choi. 157-162 [doi]
- Integrating Service Registries with OWL-S OntologiesKyong-Ha Lee, Kyu-Chul Lee, Dae-Wook Lee, Suk Ho Lee. 163-169 [doi]
- Data Integration Hub for a Hybrid Paper SearchJungkee Kim, Geoffrey Fox, Seong-Joon Yoo. 170-176 [doi]
- Effective Information Sharing Using Concept MappingKeonsoo Lee, Wonil Kim, Minkoo Kim. 177-183 [doi]
- Ontology Supported Semantic Simplification of Large Data Sets of Industrial Plant CAD Models for Design Review VisualizationJorge Posada, Carlos Toro, Stefan Wundrak, André Stork. 184-190 [doi]
- EISCO: Enterprise Information System Contextual Ontologies ProjectRami Rifaieh, Aïcha-Nabila Benharkat. 191-198 [doi]
- Mapping Fuzzy Concepts Between Fuzzy OntologiesBaowen Xu, Dazhou Kang, Jianjiang Lu, Yanhui Li, Jixiang Jiang. 199-205 [doi]
- Similarity Estimation of 3D Shapes Using Modal Strain EnergySoo-Mi Choi, Yong-Guk Kim. 206-212 [doi]
- 3D-Based Synthesis and 3D Reconstruction from Uncalibrated ImagesSang-Hoon Kim, Tae-eun Kim, Malrey Lee, Jong-Soo Choi. 213-218 [doi]
- 3-D Pose Tracking of the Car OccupantSang-Jun Kim, Yong-Guk Kim, Jeong-Eom Lee, Min-Soo Jang, Seok-Joo Lee, Gwi-Tae Park. 219-224 [doi]
- Face Recognition by Multiple Classifiers, a Divide-and-Conquer ApproachReza Ebrahimpour, Saeed Reza Ehteram, Ehsanollah Kabir. 225-232 [doi]
- Shape Comparison of the Hippocampus Using a Multiresolution Representation and ICP NormalizationJeong-Sik Kim, Yong-Guk Kim, Soo-Mi Choi, Myoung-Hee Kim. 233-239 [doi]
- A Fast Image Retrieval Using the Unification Search Method of Binary Classification and Dimensionality Condensation of Feature VectorsJungwon Cho, Seungdo Jeong, Byung-Uk Choi. 240-247 [doi]
- Semantic Supervised Clustering to Land Classification in Geo-ImagesMiguel Torres, Giovanni Guzmán, Rolando Quintero, Marco Moreno, Serguei Levachkine. 248-254 [doi]
- Towards an Intelligent Web Service for Ontology-Based Query-Answering DialoguesIn-Cheol Kim. 255-260 [doi]
- Using the Geographic Distance for Selecting the Nearest Agent in Intermediary-Based Access to Internet ResourcesLeszek Borzemski, Ziemowit Nowak. 261-267 [doi]
- Mining Internet Data Sets for Computational GridsLeszek Borzemski. 268-274 [doi]
- Towards Integration of Web Services into Agents for Biological Information ResourcesIn-Cheol Kim, Hoon Jin. 275-281 [doi]
- Learning Within the BDI Framework: An Empirical AnalysisToan Phung, Michael Winikoff, Lin Padgham. 282-288 [doi]
- How to Make Robot a Robust and Interactive CommunicatorYoshiyasu Ogasawara, Masashi Okamoto, Yukiko I. Nakano, Yong Xu, Toyoaki Nishida. 289-295 [doi]
- Analysis of Conversation Quanta for Conversational Knowledge CirculationKen Saito, Hidekazu Kubota, Yasuyuki Sumi, Toyoaki Nishida. 296-302 [doi]
- An Intelligent Approach of Packet Marking at Edge Router for IP TracebackDae Sun Kim, Choong Seon Hong, Yu Xiang. 303-309 [doi]
- A Covert Timing Channel-Free Optimistic Concurrency Control Scheme for Multilevel Secure Database Management SystemsSukhoon Kang, Yong-Rak Choi. 310-316 [doi]
- Secure Password Authentication for Keystroke DynamicsYeongGeun Choe, Soon-Ja Kim. 317-324 [doi]
- The Efficient Multipurpose Convertible Undeniable Signature SchemeSung-Hyun Yun, Hyung-Woo Lee. 325-331 [doi]
- A New Efficient Fingerprint-Based Remote User Authentication Scheme for Multimedia SystemsEun-Jun Yoon, Kee-Young Yoo. 332-338 [doi]
- A Study on the Correction of Gun Fire Error Using Neural NetworkYang Weon Lee, Heau-Jo Kang. 339-345 [doi]
- An Efficient Moving Object Extraction Algorithm for Video SurveillanceDa-Jinn Wang, Thou-Ho Chen, Yung-Chuen Chiou, Hung-Shiuan Liau. 346-352 [doi]
- An Experimental Comparison on Gabor Wavelet and Wavelet Frame Based Features for Image RetrievalYu-Long Qiao, Jeng-Shyang Pan, Sheng-He Sun. 353-358 [doi]
- Robust Video Retrieval Using Temporal MVMB MomentsDuan-Yu Chen, Hong-Yuan Mark Liao, Suh-Yin Lee. 359-365 [doi]
- Precise Segmentation Rendering for Medical Images Based on Maximum Entropy ProcessingTsair-Fwu Lee, Ming-Yuan Cho, Chin-Shiuh Shieh, Pei-Ju Chao, Huai-Yang Chang. 366-373 [doi]
- A Hardware Implementation for Fingerprint RetrievalYongwha Chung, Kichul Kim, Min Kim, Sung Bum Pan, Neungsoo Park. 374-380 [doi]
- Fast Video Retrieval via the Statistics of Motion Within the Regions-of-InterestJing-Fung Chen, Hong-Yuan Mark Liao, Chia-Wen Lin. 381-387 [doi]
- Information Theoretic Metrics in Shot Boundary DetectionWengang Cheng, De Xu, Yiwei Jiang, Congyan Lang. 388-394 [doi]
- Design of a Digital Forensics Image Mining SystemRoss Brown, Binh Pham, Olivier Y. de Vel. 395-404 [doi]
- Side-Match Predictive Vector QuantizationZhen Sun, Yue-Nan Li, Zhe-Ming Lu. 405-410 [doi]
- Improved Image Coding with Classified VQ and Side-Match VQHsiang-Cheh Huang, Kang K. Yen, Yu-Hsiu Huang, Jeng-Shyang Pan, Kuang-Chih Huang. 411-417 [doi]
- Fast Multiple Reference Frame Motion Estimation for H.264 Based on Qualified Frame Selection SchemeTien-Ying Kuo, Huang-Bin Chen. 418-424 [doi]
- Block Standstill and Homogeneity Based Fast Motion Estimation Algorithm for H.264 Video CodingFeng Pan, H. Men, Thinh M. Le. 425-432 [doi]
- Fast Rate-Distortion Optimization in H.264/AVC Video CodingFeng Pan, Kenny Choo, Thinh M. Le. 433-441 [doi]
- Improving Image Quality for JPEG CompressionChin-Chen Chang, Yung-Chen Chou, Jau-Ji Shen. 442-448 [doi]
- Low-Power MPEG-4 Motion Estimator Design for Deep Sub-Micron Multimedia SoCGyu-Sung Yeon, Chi-Hun Jun, Tae Jin Hwang, Seongsoo Lee, Jae-Kyung Wee. 449-455 [doi]
- Real-Time 3D Artistic Rendering SystemTong-Yee Lee, Shaur-Uei Yan, Yong-Nien Chen, Ming-Te Chi. 456-462 [doi]
- Index LOCO-I: A Hybrid Method of Data Hiding and Image CompressionWei-Soul Li, Wen-Shyong Hsieh, Ming-Hong Sun. 463-468 [doi]
- Feature-Constrained Texturing System for 3D ModelsTong-Yee Lee, Shaur-Uei Yan. 469-475 [doi]
- Dynamic Integrated Model for Distributed Multimedia SystemYa-Rong Hou, Zhang Xiong. 476-482 [doi]
- Joint Detection for a Bandwidth Efficient Modulation MethodZhonghui Mei, Lenan Wu, Shiyuan Zhang. 483-487 [doi]
- An Efficient and Divisible Payment Scheme for M-CommerceYong Zhao, Zhen Han, Jiqiang Liu, Zhigang Li. 488-496 [doi]
- Speech Authentication by Semi-fragile WatermarkingBin Yan, Zhe-Ming Lu, Sheng-He Sun, Jeng-Shyang Pan. 497-504 [doi]
- On Engineering Smart SystemsE. V. Krishnamurthy, V. Kris Murthy. 505-512 [doi]
- Distributed Web Integration with Multiagent Data MiningAyahiko Niimi, Hitomi Noji, Osamu Konishi. 513-519 [doi]
- Self-adjusting Programming Training Support System Using Genetic AlgorithmEiji Nunohiro, Kenneth J. Mackin, Masanori Ohshiro, Kazuko Yamasaki. 520-525 [doi]
- Waste Incinerator Emission Prediction Using Probabilistically Optimal Ensemble of Multi-agentsDaisuke Yamaguchi, Kenneth J. Mackin, Eiichiro Tazaki. 526-532 [doi]
- Cooperative Control Based on Reaction-Diffusion Equation for Surveillance SystemAtsushi Yoshida, Katsuji Aoki, Shoichi Araki. 533-539 [doi]
- Comparison of the Effectiveness of Decimation and Automatically Defined FunctionsD. T. Nanduri, Victor Ciesielski. 540-546 [doi]
- Absolute Capacities for Higher Order Associative Memory of Sequential PatternsHiromi Miyajima, Noritaka Shigei. 547-553 [doi]
- Finding Hidden Hierarchy in Reinforcement LearningGeoff Poulton, Ying Guo, Wen Lu. 554-561 [doi]
- On-Line Reinforcement Learning Using Cascade Constructive Neural NetworksPeter Vamplew, Robert Ollington. 562-568 [doi]
- Node Exchange for Improvement of SOM LearningTsutomu Miyoshi. 569-574 [doi]
- Using Rough Set to Reduce SVM Classifier Complexity and Its Use in SARS Data SetHonghai Feng, Baoyan Liu, Yin Cheng, Ping Li, Bingru Yang, Yumei Chen. 575-580 [doi]
- A SVM Regression Based Approach to Filling in Missing ValuesHonghai Feng, Chen Guoshun, Yin Cheng, Bingru Yang, Yumei Chen. 581-587 [doi]
- Recognizing and Simulating Sketched Logic CircuitsMarcus Liwicki, Lars Knipping. 588-594 [doi]
- Automatic MLP Weight Regularization on Mineralization Prediction TasksAndrew Skabar. 595-601 [doi]
- Integrated Process Modeling for Dynamic B2B CollaborationJe Yeon Oh, Jae-Yoon Jung, Nam Wook Cho, Hoontae Kim, Suk-Ho Kang. 602-608 [doi]
- Assessment Methodology on Maturity Level of ISMSChoon Seong Leem, Sangkyun Kim, Hong Joo Lee. 609-615 [doi]
- CSFs for HCI in Ubiquitous Computing EnvironmentsHong Joo Lee, Sangkyun Kim, Choon Seong Leem. 616-620 [doi]
- Practical Design Recovery Techniques for Embedded Operating System on Complying with RTCA/DO-178B and ISO/IEC15408Minhyung Kim, Sangkyun Kim, Myungwhan Choi. 621-627 [doi]
- Information Privacy Engineering in ubiCompTae Joong Kim, In-Ho Kim, Sang-Won Lee. 628-634 [doi]
- Design and Implementation of Home Media Server for Personalized Broadcasting Service in Ubiquitous EnvironmentChang-ho Hong, Jong-Tae Lim, Chang Sohn, Ha-eun Nam. 635-641 [doi]
- A Distributed Approach to Musical CompositionMichael O. Jewell, Lee Middleton, Mark S. Nixon, Adam Prügel-Bennett, Sylvia C. Wong. 642-648 [doi]
- Efficient Mobility Management Using Dynamic Location Register in IMT-2000 NetworksIl-Sun Hwang, Gi Sung Yoo, Jin-Wook Chung. 649-654 [doi]
- SWSD: A P2P-Based System for Service Discovery from a Mobile TerminalDarije Ramljak, Maja Matijasevic. 655-661 [doi]
- An Efficient Eye Location Using Context-Aware Binarization MethodJo Nam Jung, Mi Young Nam, Phill-Kyu Rhee. 662-669 [doi]
- Design and Implementation of Context-Awareness Processor for Multiple Instructions in Mobile Internet EnvironmentSeungwon Na, Gu-Min Jeong. 670-676 [doi]
- Integrated Management of Multi-level Road Network and Transportation NetworksJun Feng, Yuelong Zhu, Naoto Mukai, Toyohide Watanabe. 677-683 [doi]
- Music Plagiarism Detection Using Melody DatabasesJeong-Il Park, Sang-Wook Kim, Miyoung Shin. 684-693 [doi]
- News Video Retrieval Using Automatic Indexing of Korean Closed-CaptionJungwon Cho, Seungdo Jeong, Byung-Uk Choi. 694-703 [doi]
- Classification and Skimming of Articles for an Effective News BrowsingJungwon Cho, Seungdo Jeong, Byung-Uk Choi. 704-712 [doi]
- Intelligent Tutoring System with 300-Certification Program Based on WIPIYoungseok Lee, Jungwon Cho, Byung-Uk Choi. 713-720 [doi]
- ECA Rule Based Timely Collaboration Among Businesses in B2B e-CommerceDongwoo Lee, SeongHoon Lee, YongWon Kim. 721-727 [doi]
- The Searching Methods of Mobile Agents in Telemedicine System EnvironmentsHyunCheol Jeong, Inseob Song. 728-734 [doi]
- Knowledge-Based RDF Specification for Ubiquitous Healthcare ServicesJi Hong Kim, Byung-Hyun Ha, Wookey Lee, Cheol Young Kim, Wonchang Hur, Suk-Ho Kang. 735-741 [doi]
- A Time Judgement System Based on an Association MechanismSeiji Tsuchiya, Hirokazu Watabe, Tsukasa Kawaoka. 742-748 [doi]
- Response-Driven Web-Based Assessment SystemSylvia B. Encheva, Sharil Tumin. 749-755 [doi]
- Intelligence-Based Educational Package on Fluid MechanicsKwok-Wing Chau. 756-762 [doi]
- Generalized Composite Motif DiscoveryGeir Kjetil Sandve, Finn Drabløs. 763-769 [doi]
- Protein Motif Discovery with Linear Genetic ProgrammingRolv Seehuus. 770-776 [doi]
- Bayesian Validation of Fuzzy Clustering for Analysis of Yeast Cell Cycle DataKyung-Joong Kim, Si-Ho Yoo, Sung-Bae Cho. 777-784 [doi]
- Rule Generation Using NN and GA for SARS-CoV Cleavage Site PredictionYeon-Jin Cho, Hyeoncheol Kim. 785-791 [doi]
- A Hybrid Approach to Combine HMM and SVM Methods for the Prediction of the Transmembrane Spanning RegionMin Kyung Kim, Chull Hwan Song, Seong-Joon Yoo, Sang Ho Lee, Hyun Seok Park. 792-798 [doi]
- Agents in Bio-inspired ComputationsV. Kris Murthy. 799-805 [doi]
- Altruistic Punishment, Social Structure and the Enforcement of Social NormsDavid Newth. 806-812 [doi]
- WISDOM-II: A Network Centric Model for WarfareAng Yang, Hussein A. Abbass, Ruhul A. Sarker. 813-819 [doi]
- Adaptation on the CommonsRichard M. Kim, Simon M. Kaplan. 820-826 [doi]
- The Emergence of Order in Random Walk Resource Discovery ProtocolsRicky Robinson, Jadwiga Indulska. 827-833 [doi]
- Supporting Adaptive Learning with High Level Timed Petri NetsShang Gao, Zili Zhang, Jason Wells, Igor Hawryszkiewycz. 834-840 [doi]
- Exploring the Effective Search Context for the User in an Interactive and Adaptive WaySupratip Ghose, Jason J. Jung, GeunSik Jo. 841-847 [doi]
- Generating CG Movies Based on a Cognitive Model of Shot TransitionKazunori Okamoto, Yukiko I. Nakano, Masashi Okamoto, Hung-Hsuan Huang, Toyoaki Nishida. 848-854 [doi]
- Analyzing Concerns of People Using Weblog Articles and Natural PhenomenaToshihiro Murayama, Tomohiro Fukuhara, Toyoaki Nishida. 855-860 [doi]
- Sustainable Memory System Using Global and Conical SpacesHidekazu Kubota, Satoshi Nomura, Yasuyuki Sumi, Toyoaki Nishida. 861-867 [doi]
- Entrainment of Rate of Utterances in Speech Dialogs Between Users and an Auto Response SystemTakanori Komatsu, Koji Morikawa. 868-874 [doi]
- Locomotion Control Technique for Immersive Conversation EnvironmentRai Chan, Jun Takazawa, Junichi Hoshino. 875-882 [doi]
- Presentation of Human Action Information via Avatar: From the Viewpoint of Avatar-Based CommunicationDaisaku Arita, Rin-ichiro Taniguchi. 883-889 [doi]
- Analysis and Synthesis of Help-Desk ResponsesYuval Marom, Ingrid Zukerman. 890-897 [doi]
- A Talking Robot and Its Singing Skill AcquisitionMitsuhiro Nakamura, Hideyuki Sawada. 898-907 [doi]
- Development of a New Vocal Cords Based on Human Biological Structures for Talking RobotKotaro Fukui, Kazufumi Nishikawa, Shunsuke Ikeo, Eiji Shintaku, Kentaro Takada, Hideaki Takanobu, Masaaki Honda, Atsuo Takanishi. 908-914 [doi]
- An Adaptive Model for Phonetic String SearchRuibin Gong, Tony Kai Yun Chan. 915-921 [doi]
- Ontology Modeling and Storage System for Robot Context UnderstandingEric Wang, Yong Se Kim, Hak Soo Kim, Jin Hyun Son, Sanghoon Lee, Il Hong Suh. 922-929 [doi]
- Intelligent Two-Way Speech Communication System Between the Technological Device and the OperatorMaciej Majewski, Wojciech Kacalak. 930-936 [doi]
- Activity-Object Bayesian Networks for Detecting Occluded Objects in Uncertain Indoor EnvironmentYoun-Suk Song, Sung-Bae Cho, Il Hong Suh. 937-944 [doi]
- Design of a Simultaneous Mobile Robot Localization and Spatial Context Recognition SystemSeungdo Jeong, Jonglyul Chung, Sanghoon Lee, Il Hong Suh, Byung-Uk Choi. 945-952 [doi]
- Mining Temporal Data: A Coal-Fired Boiler Case StudyAndrew Kusiak, Alex Burns. 953-958 [doi]
- Mining Classification Rules Using Evolutionary Multi-objective AlgorithmsKalyanaraman Kaesava Kshetrapalapuram, Michael Kirley. 959-965 [doi]
- On Pruning and Tuning Rules for Associative ClassifiersOsmar R. Zaïane, Maria-Luiza Antonie. 966-973 [doi]
- Using Artificial Neural Network Ensembles to Extract Data Content from Noisy DataSzymon K. Szukalski, Robert Cox, Patricia S. Crowther. 974-980 [doi]
- Identification of a Motor with Multiple Nonlinearities by Improved Genetic AlgorithmJung-Shik Kong, Jin-Geol Kim. 981-987 [doi]
- Program Simplification in Genetic Programming for Object ClassificationMengjie Zhang, Yun Zhang, William D. Smart. 988-996 [doi]
- An Ontology-Supported Database Refurbishing Technique and Its Application in Mining GSM Trouble Shooting RulesBong-Horng Chu, In-Kai Liao, Cheng-Seen Ho. 997-1004 [doi]
- Develop Secure Database System with Security Extended ER ModelXin Liu, Zhen Han, Jiqiang Liu, Chang-xiang Shen. 1005-1010 [doi]
- An Inference Detection Algorithm Based on Related Tuples MiningBinge Cui, Da-xin Liu. 1011-1017 [doi]
- A Preliminary Design for a Privacy-Friendly Free P2P Media File Distribution SystemRon G. van Schyndel. 1018-1024 [doi]
- Analysis of Parity Assignment Steganography in Palette ImagesXinpeng Zhang, Shuozhong Wang. 1025-1031 [doi]
- A New Steganography Scheme in the Domain of Side-Match Vector QuantizationChin-Shiuh Shieh, Chao-Chin Chang, Shu-Chuan Chu, Jui-Fang Chang. 1032-1038 [doi]
- Method of Hiding Information in Agglutinative Language Documents Using Adjustment to New Line PositionsOsamu Takizawa, Kyoko Makino, Tsutomu Matsumoto, Hiroshi Nakagawa, Ichiro Murase. 1039-1048 [doi]
- Hiding Biometric Data for Secure TransmissionYongwha Chung, Daesung Moon, Kiyoung Moon, Sung Bum Pan. 1049-1057 [doi]
- VQ Image Steganographic Method with High Embedding Capacity Using Multi-way Search ApproachChin-Chen Chang, Chih-Yang Lin, Yu-Zheng Wang. 1058-1064 [doi]
- Securing Mobile Agents Control Flow Using Opaque PredicatesAnirban Majumdar, Clark D. Thomborson. 1065-1071 [doi]
- A Verifiable Fingerprint Vault SchemeQiong Li, Xiamu Niu, Zhifang Wang, Yuhua Jiao, Sheng-He Sun. 1072-1078 [doi]
- The Research on Information Hiding Based on Command Sequence of FTP ProtocolXin-guang Zou, Qiong Li, Sheng-He Sun, Xiamu Niu. 1079-1085 [doi]
- Data Hiding in a Hologram by Modified Digital Halftoning TechniquesHsi-Chun Wang, Wei-Chiang Wang. 1086-1092 [doi]
- A Secure Steganographic Scheme in Binary ImageYunbiao Guo, Daimao Lin, Xiamu Niu, Lan Hu, Linna Zhou. 1093-1100 [doi]
- A Reversible Information Hiding Scheme Based on Vector QuantizationChin-Chen Chang, Wen-Chuan Wu. 1101-1107 [doi]
- Zero-Based Code Modulation Technique for Digital Video FingerprintingIn Koo Kang, Hae-Yeoun Lee, Won-Young Yoo, Heung-Kyu Lee. 1108-1114 [doi]
- Studies on Method for Measuring Human FeelingsTaki Kanda. 1115-1121 [doi]
- Data Mining Method from Text DatabaseMasahiro Kawano, Junzo Watada, Takayuki Kawaura. 1122-1128 [doi]
- The Air Pollution Constraints Considered Best Generation Mix Using Fuzzy Linear ProgrammingJaeseok Choi, TrungTinh Tran, Jungji Kwon, Sangsik Lee, Abdurrahim El-keib. 1129-1142 [doi]
- Ranking Functions, Perceptrons, and Associated ProbabilitiesBernd-Jürgen Falkowski. 1143-1150 [doi]
- Directed Mutation Operators - An OverviewStefan Berlik, Bernd Reusch. 1151-1159 [doi]
- A General Fuzzy Min Max Neural Network with Compensatory Neuron ArchitectureAbhijeet V. Nandedkar, Prabir K. Biswas. 1160-1167 [doi]
- An Analysis on Accuracy of Cancelable Biometrics Based on BioHashingKing Hong Cheung, Adams Wai-Kin Kong, David Zhang, Mohamed Kamel, Jane You, Ho-Wang Lam. 1168-1172 [doi]
- Condition Monitoring Capability Developed Through a Knowledge Transfer Partnership Between a Small Company and a UniversityRobert J. Howlett, Gary Dawe, Terry Nowell. 1173-1179 [doi]
- Extraction of Lexico-Syntactic Information and Acquisition of Causality Schemas for Text AnnotationLaurent Alamarguy, Rose Dieng-Kuntz, Catherine Faron-Zucker. 1180-1186 [doi]
- An Approach to Automatic Text Production in Electronic Medical Record SystemsTorbjørn Nordgård, Martin Thorsen Ranang, Jostein Ven. 1187-1194 [doi]
- gProt: Annotating Protein Interactions Using Google and Gene OntologyRune Sætre, Amund Tveit, Martin Thorsen Ranang, Tonje Strommen Steigedal, Liv Thommesen, Kamilla Stunes, Astrid Lægreid. 1195-1203 [doi]
- Physiological Modeling and Simulation for Aerobic Circulation with Beat-by-Beat HemodynamicsKen ichi Asami. 1204-1209 [doi]
- Collaborative and Immersive Medical Education in a Virtual Workbench EnvironmentYoo-Joo Choi, Soo-Mi Choi, Seon-Min Rhee, Myoung-Hee Kim. 1210-1217 [doi]
- Extraction of Risk Factors by Multi-agent Voting Model Using Automatically Defined GroupsAkira Hara, Takumi Ichimura, Tetsuyuki Takahama, Yoshinori Isomichi. 1218-1224 [doi]
- Representing Association Classification Rules Mined from Health DataJie Chen, Hongxing He, Jiuyong Li, Huidong Jin, Damien McAullay, Graham J. Williams, Ross Sparks, Chris Kelman. 1225-1231 [doi]
- Leximancer Concept Mapping of Patient Case StudiesMarcus Watson, Andrew Smith, Scott Watter. 1232-1238 [doi]
- Barrier to Transition from Paper-Based to Computer-Based Patient Record: Analysis of Paper-Based Patient RecordsMachi Suka, Katsumi Yoshida. 1239-1245 [doi]
- Preprocessing for Extracting Information from Medical Record to Add XML TagsYoshiaki Kurosawa, Akira Hara, Machi Suka, Takumi Ichimura. 1246-1252 [doi]
- A Scheduling Method of Data Transmission in the Internet Communication by Recurrent Neural NetworkNorio Ozaki, Takumi Ichimura. 1253-1259 [doi]
- Health Support Intelligent System for Diabetic Patient by Mobile PhoneTakumi Ichimura, Machi Suka, Akihiro Sugihara, Kazunari Harada. 1260-1265 [doi]
- Proposal of Food Intake Measuring System in Medical Use and Its Discussion of Practical CapabilityYoshihiro Saeki, Fumiaki Takeda. 1266-1273 [doi]
- Simple Web Mail System That Makes the Best Use of the Senior Citizens Social ExperienceKiichirou Sasaki, Yurie Iribe, Masato Goto, Mamoru Endo, Takami Yasuda, Shigeki Yokoi. 1274-1280 [doi]
- Evaluating Navigation History ComparisonKoichi Ota, Akihiro Kashihara. 1281-1287 [doi]
- A Visualization System for Organizing and Sharing Research InformationYouzou Miyadera, Naohiro Hayashi, Shoichi Nakamura, Setsuo Yokoyama. 1288-1295 [doi]
- The Learning System of Shinshu University Graduate School of Science and Technology on the InternetHisayoshi Kunimune, Masaaki Niimura, Katsumi Wasaki, Yasushi Fuwa, Yasunari Shidama, Yatsuka Nakamura. 1296-1302 [doi]
- Automatic Generation of Answers Using Solution Network for Mathematical ExercisesTomoko Kojiri, Sachiyo Hosono, Toyohide Watanabe. 1303-1309 [doi]
- Assisting Construction of Meta-cognitive Competence by Scaffolding Discovery of Plans in Problem-SolvingKohji Itoh, Eisuke Mihara, Kenji Hasegawa, Masahiro Fujii, Makoto Itami. 1310-1316 [doi]
- Knowledge Level Design Support for SCORM2004-Conformed Learning Contents - Ontological Consideration on Platforms for Intelligent Educational SystemsMitsuru Ikeda, Yusuke Hayashi. 1317-1323 [doi]
- Analyzing Domain Expertise by Considering Variants of Knowledge in Multiple Time ScalesJun-Ming Chen, Gwo-Haur Hwang, Gwo-Jen Hwang, Carol H. C. Chu. 1324-1330 [doi]
- A New Algorithm to Discover Page-Action Rules on WebHeng-Li Yang, Qing-Fung Lin. 1331-1337 [doi]
- Efficient Remining of Generalized Association Rules Under Multiple Minimum Support RefinementMing-Cheng Tseng, Wen-Yang Lin, Rong Jeng. 1338-1344 [doi]
- Mining Association Rules from Distorted Data for Privacy PreservationPeng Zhang, Yunhai Tong, Shiwei Tang, Dongqing Yang. 1345-1351 [doi]
- Mining Linguistic Mobility Patterns for Wireless NetworksTzung-Pei Hong, Cheng-Ming Huang, Shi-Jinn Horng. 1352-1358 [doi]
- Individualized Product Design by Evolutionary AlgorithmsMaik Maurer, Udo Lindemann. 1359-1365 [doi]
- Fuzzy Similarity Measure and Fractional Image Query for Large Scale Protein 2D Gel ElectrophoresisDaw-Tung Lin, Juin-Lin Kuo, En-Chung Lin, San-Yuan Huang. 1366-1372 [doi]
- Building the Fuzzy Control System Based on the Pilot KnowledgeMichal Lower, Dariusz Król, Boguslaw Szlachetko. 1373-1379 [doi]