Default Cover Image

2007 6th International Conference on Computer Information Systems and Industrial Management Applications

June 28 2007 to June 30 2007

Minneapolis, MN

Table of Contents

Introduction
ForewordFreely available from IEEE.
Introduction
CISIM 2007 Steering Committee Chair's MessageFreely available from IEEE.pp. xii
Introduction
CISIM 2007 OrganizationFreely available from IEEE.pp. xiii-xiv
Introduction
Plenary AbstractsFull-text access may be available. Sign in or learn about subscription options.pp. xv
Keynote Papers
Should Normal Distribution be Normal? The Student's T AlternativeFull-text access may be available. Sign in or learn about subscription options.pp. 3-8
Keynote Papers
GUI Patterns and Web SemanticsFull-text access may be available. Sign in or learn about subscription options.pp. 14-19
Keynote Papers
Finding a Needle in a Haystack: From Baldwin Effect to Quantum ComputationFull-text access may be available. Sign in or learn about subscription options.pp. 20-25
Keynote Papers
Iris Image RecognitionFull-text access may be available. Sign in or learn about subscription options.pp. 26-30
Histogram-Based Dimensionality Reduction of Term Vector SpaceFull-text access may be available. Sign in or learn about subscription options.pp. 103-108
Keynote Papers
Toward Higher Level Intelligent SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 31-36
Keynote Papers
Introduction of Humatronics--Towards Integration of Web Intelligence and RoboticsFull-text access may be available. Sign in or learn about subscription options.pp. 37-44
Intelligent Computing and Frameworks
Location Prediction Methods with Markovian Approach and Extended Random Walk ModelFull-text access may be available. Sign in or learn about subscription options.pp. 53-58
Intelligent Computing and Frameworks
Architecture of a Predictive Maintenance FrameworkFull-text access may be available. Sign in or learn about subscription options.pp. 59-64
Intelligent Computing and Frameworks
The Theoretical Framework of the Optimization of Public Transport TravelFull-text access may be available. Sign in or learn about subscription options.pp. 65-70
Intelligent Computing and Frameworks
Estimation of the Average Time of Computations of Probabilistic Algorithms with Continuous Time ParameterFull-text access may be available. Sign in or learn about subscription options.pp. 71-76
Intelligent Computing and Frameworks
UBMSS (Understanding Based Managing Support Systems) as an Example of the Application of Cognitive Analysis in Data AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 77-80
Intelligent Computing and Frameworks
Interpretation of Probabilistic Algorithmic Logic in Nondeterministic Algorithmic LogicFull-text access may be available. Sign in or learn about subscription options.pp. 81-86
Intelligent Computing and Frameworks
On Toeplitz Matrices Minimal Eigenvalues in Moving Object DescriptionFull-text access may be available. Sign in or learn about subscription options.pp. 87-92
AIS for Trend Change DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 161-165
Intelligent Computing and Frameworks
Some Criteria of Making Decisions in Pedestrian Evacuation AlgorithmsFull-text access may be available. Sign in or learn about subscription options.pp. 93-96
Intelligent Computing and Frameworks
Universally Composable Key-Evolving SignatureFull-text access may be available. Sign in or learn about subscription options.pp. 97-102
Intelligent Computing and Frameworks
Bearing's Behavior Modeling for Mechanical Defects' Detection and DiagnosisFull-text access may be available. Sign in or learn about subscription options.pp. 109-114
Intelligent Computing and Frameworks
Hybrid Intelligent Diagnosis SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 115-120
Intelligent Computing and Frameworks
Finite Difference Runoff Modelling Using "Voronoi Buckets"Full-text access may be available. Sign in or learn about subscription options.pp. 121-124
Intelligent Computing and Frameworks
Atomic Operators for Construction and Manipulation of the Augmented Quad-EdgeFull-text access may be available. Sign in or learn about subscription options.pp. 125-128
Intelligent Computing and Frameworks
Application of the Kinetic Voronoi Diagram to the Real-Time Navigation of Marine VesselsFull-text access may be available. Sign in or learn about subscription options.pp. 129-134
Intelligent Computing and Frameworks
A Grouping Aggregation Algorithm Based on the Dimension Hierarchical Encoding in Data WarehouseFull-text access may be available. Sign in or learn about subscription options.pp. 135-142
Nature Inspired Computing and Problem Solving
B-Cell Algorithm as a Parallel Approach to Optimization of Moving Peaks Benchmark TasksFull-text access may be available. Sign in or learn about subscription options.pp. 143-148
Nature Inspired Computing and Problem Solving
Ants and Multiple Knapsack ProblemFull-text access may be available. Sign in or learn about subscription options.pp. 149-154
Nature Inspired Computing and Problem Solving
Simple Method of Increasing the Coverage of Nonself Region for Negative Selection AlgorithmsFull-text access may be available. Sign in or learn about subscription options.pp. 155-160
Nature Inspired Computing and Problem Solving
A Particle Swarm Optimization Algorithm for Neighbor Selection in Peer-to-Peer NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 166-172
Digital Communication and Information Management
Wireless Sensor Network for Intravenous Dripping SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 173-178
Digital Communication and Information Management
IDSX: A Cluster Based Collaborative Intrusion Detection Algorithm for Mobile Ad-Hoc NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 179-184
Digital Communication and Information Management
ORRP: Optimal Reactive Routing Protocol for Mobile Ad-Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 185-190
Digital Communication and Information Management
Enhanced Mobility Management Modelling FrameworkFull-text access may be available. Sign in or learn about subscription options.pp. 191-196
Digital Communication and Information Management
Spread Spectrum Signals Classification Based on the Wigner-Ville Distribution and Neural Network Probability Density Function EstimationFull-text access may be available. Sign in or learn about subscription options.pp. 197-202
Digital Communication and Information Management
An Adaptive Data Broadcasting Model in Mobile Information SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 203-208
Digital Communication and Information Management
Towards a Pervasive Mobile Multimedia ExperienceFull-text access may be available. Sign in or learn about subscription options.pp. 209-212
Digital Communication and Information Management
Mobile Agent-Based Digital Rights Management SchemeFull-text access may be available. Sign in or learn about subscription options.pp. 213-218
Digital Communication and Information Management
On Frequency Synchronization of e-Learning Web System UsersFull-text access may be available. Sign in or learn about subscription options.pp. 219-224
Digital Communication and Information Management
Deniable File System--Application of Deniable Storage to Protection of Private KeysFull-text access may be available. Sign in or learn about subscription options.pp. 225-229
Digital Communication and Information Management
VCOP--The System of Visual Communication with Computers for Paralyzed UsersFull-text access may be available. Sign in or learn about subscription options.pp. 230-238
Image Processing, Recognition, and Biometrics
Face Recognition Using Kernel PCA and Hierarchical RBF NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 239-244
Image Processing, Recognition, and Biometrics
ICA Based on KPCA and Hybrid Flexible Neural Tree to Face RecognitionFull-text access may be available. Sign in or learn about subscription options.pp. 245-250
Image Processing, Recognition, and Biometrics
Fuzzy Data in Local Optimal Strategy of Multistage RecognitionFull-text access may be available. Sign in or learn about subscription options.pp. 251-254
Image Processing, Recognition, and Biometrics
Semi-Automatic Segmentation of Fibrous Liver TissueFull-text access may be available. Sign in or learn about subscription options.pp. 255-260
Image Processing, Recognition, and Biometrics
Image Feature Extraction Methods for Ear Biometrics--A SurveyFull-text access may be available. Sign in or learn about subscription options.pp. 261-265
Image Processing, Recognition, and Biometrics
Capillaroscopy Image Analysis as an Automatic Image Annotation ProblemFull-text access may be available. Sign in or learn about subscription options.pp. 266-271
Image Processing, Recognition, and Biometrics
Image Analysis by Methods of Dimension ReductionFull-text access may be available. Sign in or learn about subscription options.pp. 272-277
Image Processing, Recognition, and Biometrics
Images Reconstruction with Use of a Genetic AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 278-281
Image Processing, Recognition, and Biometrics
The Compact Three Stages Method of the Signature RecognitionFull-text access may be available. Sign in or learn about subscription options.pp. 282-287
Image Processing, Recognition, and Biometrics
Modified Word Recognition System--New PerformanceFull-text access may be available. Sign in or learn about subscription options.pp. 288-293
Image Processing, Recognition, and Biometrics
Bandelet Union Optimal Matrix Norms Constructing Lossless WatermarkingFull-text access may be available. Sign in or learn about subscription options.pp. 294-298
Image Processing, Recognition, and Biometrics
Standard and Genetic k-means Clustering Techniques in Image SegmentationFull-text access may be available. Sign in or learn about subscription options.pp. 299-304
Image Processing, Recognition, and Biometrics
Using Wavelet Transform, DPCM and Adaptive Run-length Coding to Compress ImagesFull-text access may be available. Sign in or learn about subscription options.pp. 305-309
Image Processing, Recognition, and Biometrics
Nonlinear and Frequency Analysis of the Weather in BialystokFull-text access may be available. Sign in or learn about subscription options.pp. 310-315
Image Processing, Recognition, and Biometrics
Semi-Supervised Handwritten Word Segmentation Using Character Samples Similarity Maximization and Evolutionary AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 316-321
Image Processing, Recognition, and Biometrics
Mathematical Morphology Based ECG Feature Extraction for the Purpose of Heartbeat ClassificationFull-text access may be available. Sign in or learn about subscription options.pp. 322-327
Image Processing, Recognition, and Biometrics
Using Shaded Views in 3D Multiview Representation of Monotonous PolyhedronFull-text access may be available. Sign in or learn about subscription options.pp. 328-336
Computer System Engineering
Obfuscation as Intellectual Rights Protection in VHDL LanguageFull-text access may be available. Sign in or learn about subscription options.pp. 337-340
Computer System Engineering
Address Sequences Generation for Multiple Run Memory TestingFull-text access may be available. Sign in or learn about subscription options.pp. 341-344
Computer System Engineering
FSM State Assignment Methods for Low-Power DesignFull-text access may be available. Sign in or learn about subscription options.pp. 345-350
Industrial Management
Managing Information on Industrial Automation ProjectsFull-text access may be available. Sign in or learn about subscription options.pp. 351-356
Industrial Management
Organizational Knowledge MeasurementFull-text access may be available. Sign in or learn about subscription options.pp. 357-363
Industrial Management
Support of Decision Making by Business Intelligence ToolsFull-text access may be available. Sign in or learn about subscription options.pp. 364-368
Industrial Management
A Study on the Importance of Biometric Technique Selection in the Protection of Company ResourcesFull-text access may be available. Sign in or learn about subscription options.pp. 369-374
Industrial Management
Cooperation of Enterprises in the Area of Innovative ActivityFull-text access may be available. Sign in or learn about subscription options.pp. 375-379
Industrial Management
Adapting Price Negotiations to an E-commerce System ScenarioFull-text access may be available. Sign in or learn about subscription options.pp. 380-386
Author Index
Author IndexFreely available from IEEE.pp. 387
Showing 74 out of 74