Default Cover Image

Intelligent Information and Database Systems, Asian Conference on

Apr. 1 2009 to Apr. 3 2009

Dong hoi, Quang binh, Vietnam

ISBN: 978-0-7695-3580-7

Table of Contents

Papers
Keynote speakersFull-text access may be available. Sign in or learn about subscription options.pp. xiv
Papers
Conference organizationFreely available from IEEE.pp. xv
Papers
[Copyright notice]Freely available from IEEE.pp. iv
Papers
Table of contentsFreely available from IEEE.pp. v-xi
list-reviewerFreely available from IEEE.pp. xviii-xviii
Papers
Title Page iFreely available from IEEE.pp. i
Papers
Title Page iiiFreely available from IEEE.pp. iii
Papers
PrefaceFreely available from IEEE.pp. xii-xiii
Papers
International Program CommitteeFreely available from IEEE.pp. xvi-xvii
Papers
Intelligent Distributed Intrusion Detection Systems of Computer Communication SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Papers
On Scheduling Problems with an Intelligent Use of the Learning EffectFull-text access may be available. Sign in or learn about subscription options.pp. 7-12
Papers
A Novel Algorithm for Mining High Utility ItemsetsFull-text access may be available. Sign in or learn about subscription options.pp. 13-17
Papers
Argument Based Machine Learning from Examples and TextFull-text access may be available. Sign in or learn about subscription options.pp. 18-23
Papers
A Structural Sampling Technique for Better Decision TreesFull-text access may be available. Sign in or learn about subscription options.pp. 24-27
Papers
Application of Transfer Regression to TCP Throughput PredictionFull-text access may be available. Sign in or learn about subscription options.pp. 28-33
Papers
Motif-Based Analysis of Social Position Influence on Interconnection Patterns in Complex Social NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 34-39
Papers
Deriving Conceptual Schema from XML DatabasesFull-text access may be available. Sign in or learn about subscription options.pp. 40-45
Papers
Mining Multilevel Association Rules on RFID DataFull-text access may be available. Sign in or learn about subscription options.pp. 46-50
Papers
A Novel Approach to Keyword Extraction for Contextual AdvertisingFull-text access may be available. Sign in or learn about subscription options.pp. 51-56
Papers
Applying Classification Problems via a Data Mining Approach Based on a Cerebellar Model Articulation ControllerFull-text access may be available. Sign in or learn about subscription options.pp. 61-66
Papers
Web Page Element Classification Based on Visual FeaturesFull-text access may be available. Sign in or learn about subscription options.pp. 67-72
Papers
Select-Response Grouping Proof for RFID TagsFull-text access may be available. Sign in or learn about subscription options.pp. 73-77
Papers
An Approach to Identity Theft Detection Using Social Network AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 78-81
Papers
Rough Set Based Clustering of the Self Organizing MapFull-text access may be available. Sign in or learn about subscription options.pp. 82-85
Papers
Feature Selection Using Euclidean Distance and Cosine Similarity for Intrusion Detection ModelFull-text access may be available. Sign in or learn about subscription options.pp. 86-91
Papers
Visualizing the Financial Situations and Trends via Chance DiscoveryFull-text access may be available. Sign in or learn about subscription options.pp. 92-97
Papers
Pulmonary Disease Census Aiding System Based on Medical Image GridFull-text access may be available. Sign in or learn about subscription options.pp. 98-103
Papers
Parallel Dimensionality Reduction Transformation for Time-Series DataFull-text access may be available. Sign in or learn about subscription options.pp. 104-108
Papers
Two-Stage License Plate Detection Using Gentle Adaboost and SIFT-SVMFull-text access may be available. Sign in or learn about subscription options.pp. 109-114
Papers
Rotational Invariant Wood Species Recognition through Wood Species VerificationFull-text access may be available. Sign in or learn about subscription options.pp. 115-120
Papers
From Checking Integrity Constraints to Temporal Abstraction for Clinical DatabasesFull-text access may be available. Sign in or learn about subscription options.pp. 121-126
Papers
Comparison of Different Recommendation Methods for an e-Commerce ApplicationFull-text access may be available. Sign in or learn about subscription options.pp. 127-131
Papers
Enhanced Content-Based Filtering Using Diverse Collaborative Prediction for Movie RecommendationFull-text access may be available. Sign in or learn about subscription options.pp. 132-137
Papers
Korean Text Extraction by Local Color Quantization and K-means Clustering in Natural SceneFull-text access may be available. Sign in or learn about subscription options.pp. 138-143
Papers
Natural Language Watermarking by Morpheme SegmentationFull-text access may be available. Sign in or learn about subscription options.pp. 144-149
Papers
Improved Letter Weighting Feature Selection on Arabic Script Language IdentificationFull-text access may be available. Sign in or learn about subscription options.pp. 150-154
Papers
Toward a Framework for Evaluating Heterogeneous Architecture StylesFull-text access may be available. Sign in or learn about subscription options.pp. 155-160
Papers
A Similar Music Retrieval Scheme Based on Musical Mood VariationFull-text access may be available. Sign in or learn about subscription options.pp. 167-172
Papers
Agent-Based Generation of Personal ThesaurusFull-text access may be available. Sign in or learn about subscription options.pp. 179-182
Papers
Representing the Meaning of Symbols in Autonomous AgentsFull-text access may be available. Sign in or learn about subscription options.pp. 183-189
Papers
Checking the Consistency between UCM and PSM Using a Graph-Based MethodFull-text access may be available. Sign in or learn about subscription options.pp. 190-195
Papers
Processing Exact Results for Sliding Window Joins over Time-Sequence, Streaming Data Using a Disk ArchiveFull-text access may be available. Sign in or learn about subscription options.pp. 196-201
Quantitative Analysis of the Error Propagation Phenomenon in Distributed Information SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 202-207
Papers
Extensions to the Relational Paths Based Learning Approach RPBLFull-text access may be available. Sign in or learn about subscription options.pp. 214-219
Papers
Security Policy Integration Method for Information SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 220-225
Papers
A Fuzzy Classifier with Directed Initialization Adaptive Learning of Norm Inducing MatrixFull-text access may be available. Sign in or learn about subscription options.pp. 226-231
Papers
Fuzzy Classification of Incomplete Data with Adaptive VolumeFull-text access may be available. Sign in or learn about subscription options.pp. 232-237
Papers
Stability Analysis of Fuzzy Control for Nonlinear SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 238-242
Papers
Stability Analysis of Time-Delay Fuzzy Systems Using Fuzzy Lyapunov MethodFull-text access may be available. Sign in or learn about subscription options.pp. 243-248
Papers
Application to GA-Based Fuzzy Control for Nonlinear Systems with UncertaintyFull-text access may be available. Sign in or learn about subscription options.pp. 249-252
Papers
Exploration of Soft Computing Models for the Valuation of Residential Premises Using the KEEL ToolFull-text access may be available. Sign in or learn about subscription options.pp. 253-258
Papers
Using AI Approach to Solve an Integrated Three-Echelon Supply Chain Model with Strategic AlliancesFull-text access may be available. Sign in or learn about subscription options.pp. 259-264
Papers
Informed Simulated Annealing for Optimizing Dorm Room AssignmentsFull-text access may be available. Sign in or learn about subscription options.pp. 265-270
Papers
Knowledge Discovery Using a New Interpretable Simulated Annealing Based Fuzzy Classification SystemFull-text access may be available. Sign in or learn about subscription options.pp. 271-276
Papers
Proposed Nature Inspired Self-Organized Secure Autonomous Mechanism for WSNsFull-text access may be available. Sign in or learn about subscription options.pp. 277-282
Papers
New Multi-parent Recombination in Genetic Algorithm for Solving Bounded Diameter Minimum Spanning Tree ProblemFull-text access may be available. Sign in or learn about subscription options.pp. 283-288
Papers
Learning Membership Functions in Takagi-Sugeno Fuzzy Systems by Genetic AlgorithmsFull-text access may be available. Sign in or learn about subscription options.pp. 301-306
Papers
Supervising an Unsupervised Neural NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 307-312
Papers
Implicit Camera Calibration Using MultiLayer Perceptron Type Neural NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 313-317
Papers
ICA-Based Signal Reconstruction Scheme with Neural Network in Time Series ForecastingFull-text access may be available. Sign in or learn about subscription options.pp. 318-323
Papers
Black Box Modeling of Steam Distillation Essential Oil Extraction System Using NNARX StructureFull-text access may be available. Sign in or learn about subscription options.pp. 324-329
Papers
A Weighted Evolving Fuzzy Neural Network for Electricity Demand ForecastingFull-text access may be available. Sign in or learn about subscription options.pp. 330-335
Papers
Short-Term Load Forecasting Using Support Vector Regression Based on Pattern-BaseFull-text access may be available. Sign in or learn about subscription options.pp. 336-340
Papers
Management of Wireless Local Area Networks by Artificial Neural Networks with Principal Components AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 341-345
Papers
Learning Radial Basis Function Model with Matching Score Quality for Person Authentication in Multimodal BiometricsFull-text access may be available. Sign in or learn about subscription options.pp. 346-350
Papers
An Agent-Based Workflow System for Assisting in IC DesignFull-text access may be available. Sign in or learn about subscription options.pp. 351-355
Papers
Towards Collaborative Spam Filtering Based on Collective IntelligenceFull-text access may be available. Sign in or learn about subscription options.pp. 356-361
Papers
Dynamic Packet Balancing Agent in MANETs Based on AOMDVFull-text access may be available. Sign in or learn about subscription options.pp. 362-367
Papers
Exploring the Use of Social Communications Technologies in Tasks and Its Performance in OrganizationsFull-text access may be available. Sign in or learn about subscription options.pp. 368-373
Papers
RAKER: Resource-Aware Knowledge Extraction aRchitecture on Mobile GridFull-text access may be available. Sign in or learn about subscription options.pp. 374-379
Papers
A Highly Robust Method for Face AuthenticationFull-text access may be available. Sign in or learn about subscription options.pp. 380-385
How to Maximize User Satisfaction Degree in Multi-service IP NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 471-476
Papers
Real-Time Human Recognition by Their WalkFull-text access may be available. Sign in or learn about subscription options.pp. 386-391
Papers
Student Modelling Based on OntologiesFull-text access may be available. Sign in or learn about subscription options.pp. 392-397
Papers
Controllability and Minimum Energy Control Problem of Infinite Dimensional Fractional Discrete-Time Systems with DelaysFull-text access may be available. Sign in or learn about subscription options.pp. 398-403
[Publisher's information]Freely available from IEEE.pp. 486-486
Papers
Adaptive Control Scheme for a Process with Incorrect AdjustmentFull-text access may be available. Sign in or learn about subscription options.pp. 404-409
Papers
Optimal Production Decisions for Deteriorating Items with Investment on Production ProcessesFull-text access may be available. Sign in or learn about subscription options.pp. 410-413
Papers
Improving Efficiency and Scalability of Service Network Graph by Re-routing Service RoutesFull-text access may be available. Sign in or learn about subscription options.pp. 414-419
Papers
A New Model to Short-Term Power Load Forecasting Combining Chaotic Time Series and SVMFull-text access may be available. Sign in or learn about subscription options.pp. 420-425
Papers
ABC Supporting QoS Unicast Routing Scheme with Particle Swarm OptimizationFull-text access may be available. Sign in or learn about subscription options.pp. 426-429
Papers
Comparison of Data-Searching Algorithms for a Real-Time Information-Delivery SystemFull-text access may be available. Sign in or learn about subscription options.pp. 430-435
Papers
A Proposal of Relaying Data in Aeronautical Communication for Oceanic Flight Routes Employing Mobile Ad-Hoc NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 436-441
Papers
Self Actor-Actor Connectivity Restoration in Wireless Sensor and Actor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 442-447
Papers
A Lightweight Application-Layer Signaling ProtocolFull-text access may be available. Sign in or learn about subscription options.pp. 448-452
Papers
CCBR: Chaining Case Based Reasoning in Context-Aware Smart HomeFull-text access may be available. Sign in or learn about subscription options.pp. 453-458
Papers
Scrutinizing Performance of Ad Hoc Routing Protocols on Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 459-464
Papers
Using Rough Set and Support Vector Machine for Network Intrusion Detection SystemFull-text access may be available. Sign in or learn about subscription options.pp. 465-470
Papers
Leader Election for Multi-channel Radio Networks - Dependent versus Independent TrialsFull-text access may be available. Sign in or learn about subscription options.pp. 477-482
Papers
Author IndexFreely available from IEEE.pp. 483-485
Showing 96 out of 96