Default Cover Image

2001 International Conferences on Info-tech and Info-net. Proceedings

Oct. 29 2001 to Nov. 1 2001

Beijing, China

Volume:

Table of Contents

A method for indexing Web pages using Web botsFull-text access may be available. Sign in or learn about subscription options.pp. 1,2,3,4,5,6
Implementation of large-scale distributed information retrieval systemFull-text access may be available. Sign in or learn about subscription options.pp. 7,8,9,10,11,12,13,14,15,16,17
iTSum: one agent-based system for automated text summarizingFull-text access may be available. Sign in or learn about subscription options.pp. 18,19,20,21,22,23,24,25
Study and implementation of a semantic information query system based on ontologyFull-text access may be available. Sign in or learn about subscription options.pp. 26,27,28,29,30,31
Mining association rules of quantitative movement pattern in databasesFull-text access may be available. Sign in or learn about subscription options.pp. 32,33,34,35,36,37
Mining cases in the optimization of GSM networkFull-text access may be available. Sign in or learn about subscription options.pp. 38,39,40,41,42,43
An approach to generating summaries of time series data in the gas turbine domainFull-text access may be available. Sign in or learn about subscription options.pp. 44,45,46,47,48,49,50,51
Web mining based on Bayes latent semantic modelFull-text access may be available. Sign in or learn about subscription options.pp. 52,53,54,55,56,57
A clustering algorithm based on swarm intelligenceFull-text access may be available. Sign in or learn about subscription options.pp. 58,59,60,61,62,63,64,65,66
Knowledge discovery from supplier change control data for purchasing managementFull-text access may be available. Sign in or learn about subscription options.pp. 67,68,69,70,71,72
HGR: a new rule induction algorithm based on extension matricesFull-text access may be available. Sign in or learn about subscription options.pp. 73,74,75,76,77,78
A hybrid classification approachFull-text access may be available. Sign in or learn about subscription options.pp. 79,80,81,82,83
Mining the neural code of a guinea pig auditory cortexFull-text access may be available. Sign in or learn about subscription options.pp. 84,85,86,87,88,89
Knowledge-increasable model and its algorithmFull-text access may be available. Sign in or learn about subscription options.pp. 90,91,92,93,94
An approach of multi-hierarchy text classificationFull-text access may be available. Sign in or learn about subscription options.pp. 95,96,97,98,99,100
Fuzzy concept graph and application in Web document clusteringFull-text access may be available. Sign in or learn about subscription options.pp. 101,102,103,104,105,106
Text document clustering and the space of concept on text document automatically generatedFull-text access may be available. Sign in or learn about subscription options.pp. 107,108,109,110,111,112
A effective classified algorithm of support vector machine with multi-representative points based on nearest neighbor principleFull-text access may be available. Sign in or learn about subscription options.pp. 113,114,115,116,117,118,119
Key issues of accounting information quality management an Australian case studyFull-text access may be available. Sign in or learn about subscription options.pp. 120,121,122,123,124,125,126,127,128,129,130,131,132,133
Based-CR knowledge interconnection in National Knowledge InfrastructureFull-text access may be available. Sign in or learn about subscription options.pp. 134,135,136,137,138,139
GDILC: a grid-based density-isoline clustering algorithmFull-text access may be available. Sign in or learn about subscription options.pp. 140,141,142,143,144,145
A proposal of integrating data mining and on-line analytical processing in data warehouseFull-text access may be available. Sign in or learn about subscription options.pp. 146,147,148,149,150,151
A statistics based method of mining hierarchical word relationFull-text access may be available. Sign in or learn about subscription options.pp. 152,153,154,155,156
Association rule mining and its application in postal EMS serviceFull-text access may be available. Sign in or learn about subscription options.pp. 157,158,159,160,161
Agent based network computing: simplifying the development frameworkFull-text access may be available. Sign in or learn about subscription options.pp. 174,175,176,177,178
Checkpointing and process migration in network computing environmentFull-text access may be available. Sign in or learn about subscription options.pp. 179,180,181,182,183,184
A protocol switching algorithm for developing network management applicationFull-text access may be available. Sign in or learn about subscription options.pp. 185,186,187,188,189,190,191,192,193,194,195,196,197,198,199,200,201
A practical algorithm for exception event detection for the home video security surveillanceFull-text access may be available. Sign in or learn about subscription options.pp. 202,203,204,205,206,207,208
Context-aware application framework based on open service gatewayFull-text access may be available. Sign in or learn about subscription options.pp. 209,210,211,212,213
Algorithms of integrated student modeling in online virtual educational communityFull-text access may be available. Sign in or learn about subscription options.pp. 214-219 vol.3
Java translation scheme for consumer electronics home networksFull-text access may be available. Sign in or learn about subscription options.pp. 220,221,222,223,224,225
A novel video processing IC for progressive scan TVFull-text access may be available. Sign in or learn about subscription options.pp. 226,227,228,229,230
Ontology management in multi-agent system for knowledge logisticsFull-text access may be available. Sign in or learn about subscription options.pp. 231,232,233,234,235,236
Application of mobile agents in collecting the residual value from electronic accountsFull-text access may be available. Sign in or learn about subscription options.pp. 237,238,239,240
Dynamic modeling of multidimensional logic in multi-agent environmentFull-text access may be available. Sign in or learn about subscription options.pp. 241,242,243,244,245
A emotion development agent model based on OCC model and operant conditioningFull-text access may be available. Sign in or learn about subscription options.pp. 246,247,248,249,250
Computation migration based on mobile IP and intelligent agent techniquesFull-text access may be available. Sign in or learn about subscription options.pp. 251,252,253,254,255,256
Commitment mechanism in agent organizationFull-text access may be available. Sign in or learn about subscription options.pp. 257,258,259,260,261,262
The organizational structure in collaborative information gatheringFull-text access may be available. Sign in or learn about subscription options.pp. 263,264,265,266,267,268
Autonomous mental development for agentFull-text access may be available. Sign in or learn about subscription options.pp. 269,270,271,272,273
Learning based dynamic approach to job-shop schedulingFull-text access may be available. Sign in or learn about subscription options.pp. 274,275,276,277,278,279
Reinforcement learning approach to re-entrant manufacturing system schedulingFull-text access may be available. Sign in or learn about subscription options.pp. 280,281,282,283,284,285
Assemble-on-demand agentFull-text access may be available. Sign in or learn about subscription options.pp. 286,287,288,289,290,291
Group decision support system for agile virtual enterprise based on mobile agent technologyFull-text access may be available. Sign in or learn about subscription options.pp. 292,293,294,295,296,297
The design of a fast inverse module in AESFull-text access may be available. Sign in or learn about subscription options.pp. 298,299,300,301,302,303
Interaction templates for pervasive service chainsFull-text access may be available. Sign in or learn about subscription options.pp. 304,305,306,307,308,309
A chaotic masking system of network trafficFull-text access may be available. Sign in or learn about subscription options.pp. 310,311,312,313,314,315
Mobile ad hoc networking: an essential technology for pervasive computingFull-text access may be available. Sign in or learn about subscription options.pp. 316,317,318,319,320,321
Parallel computation of the time-frequency power spectrum: analysis and comparison to the bispectrumFull-text access may be available. Sign in or learn about subscription options.pp. 322,323,324,325,326,327
Parallel execution of an irregular algorithm depth first search (DFS) on heterogeneous clusters of workstationFull-text access may be available. Sign in or learn about subscription options.pp. 328,329,330,331,332
A fast error and erasure correction algorithm for a simple RS-RAIDFull-text access may be available. Sign in or learn about subscription options.pp. 333,334,335,336,337,338
RECOM: a reflective architecture of middlewareFull-text access may be available. Sign in or learn about subscription options.pp. 339,340,341,342,343,344
Coupling modes for concurrent active rulesFull-text access may be available. Sign in or learn about subscription options.pp. 345,346,347,348,349,350,351,352,353,354
Research on normalization design for complex object schemesFull-text access may be available. Sign in or learn about subscription options.pp. 355,356,357,358,359,360
On methodology of fuzzy pattern recognitionFull-text access may be available. Sign in or learn about subscription options.pp. 361,362,363,364,365,366
An efficient robust automatic speech recognition system based on the combination of speech enhancement and log-add HMM adaptationFull-text access may be available. Sign in or learn about subscription options.pp. 367,368,369,370,371
Image segmentation using watersheds guided by edge tracingFull-text access may be available. Sign in or learn about subscription options.pp. 372,373,374,375,376,377
Detecting adult image using multiple featuresFull-text access may be available. Sign in or learn about subscription options.pp. 378-383 vol.3
A wavelet based adaptive watermarking algorithmFull-text access may be available. Sign in or learn about subscription options.pp. 384,385,386,387,388,389
An intelligent imaging approach to the identification of forensic ballistics specimensFull-text access may be available. Sign in or learn about subscription options.pp. 390,391,392,393,394,395,396
Utterance verification for spontaneous Mandarin speech keyword spottingFull-text access may be available. Sign in or learn about subscription options.pp. 397,398,399,400,401
Text-independent speaker recognition using support vector machineFull-text access may be available. Sign in or learn about subscription options.pp. 402,403,404,405,406,407
Design of nonlinear filter for echocardiographic images on wavelet-based methodFull-text access may be available. Sign in or learn about subscription options.pp. 408,409,410,411,412,413
Multi-scale Bayesian face recognition by using anti-symmetrical biorthogonal waveletsFull-text access may be available. Sign in or learn about subscription options.pp. 414,415,416,417,418,419,420
Image similarity measurement using max weighted bipartite matchingFull-text access may be available. Sign in or learn about subscription options.pp. 421,422,423,424,425,426
Image featuring for retrieval of multimedia documentsFull-text access may be available. Sign in or learn about subscription options.pp. 427,428,429,430,431,432
Displaying IFS attractor based on fixed pointFull-text access may be available. Sign in or learn about subscription options.pp. 433,434,435,436,437
Multiple candidate characters in the post-processing for off-line handwritten Chinese character recognitionFull-text access may be available. Sign in or learn about subscription options.pp. 438,439,440,441,442,443
Illumination compensation and feedback of illumination feature in face detectionFull-text access may be available. Sign in or learn about subscription options.pp. 444-449 vol.3
Knowledge based pipeline network peeling off recognition method of mapsFull-text access may be available. Sign in or learn about subscription options.pp. 450,451,452,453,454,455
Face recognition: a facial action reconstruction and ICA representation approachFull-text access may be available. Sign in or learn about subscription options.pp. 456,457,458,459,460,461
Learning programs for decision and controlFull-text access may be available. Sign in or learn about subscription options.pp. 462,463,464,465,466,467
Condition monitoring of power transformers with neural networksFull-text access may be available. Sign in or learn about subscription options.pp. 468,469,470,471,472
To improve the training time of BP neural networksFull-text access may be available. Sign in or learn about subscription options.pp. 473,474,475,476,477,478,479
Knowledge-increasable artificial neural network and natural gradient algorithmFull-text access may be available. Sign in or learn about subscription options.pp. 480,481,482,483,484,485
On decision-boundary-based approaches for structure selection of multilayered neural netsFull-text access may be available. Sign in or learn about subscription options.pp. 486,487,488,489,490
Neural network modeling study of one dimension gray problem GNNM (1, 1)Full-text access may be available. Sign in or learn about subscription options.pp. 491,492,493,494,495,496,497
Channel equalization using complex-valued recurrent neural networkFull-text access may be available. Sign in or learn about subscription options.pp. 498,499,500,501,502,503
Automatic edge and target extraction base on pulse-couple neuron networks wavelet theory (PCNNW)Full-text access may be available. Sign in or learn about subscription options.pp. 504,505,506,507,508,509
Artificial neural network applications on remotely sensed imageryFull-text access may be available. Sign in or learn about subscription options.pp. 510,511,512,513,514,515
A novel neural network learning method for dynamically tuning regularization coefficientFull-text access may be available. Sign in or learn about subscription options.pp. 516,517,518,519,520,521,522
An intelligent forex monitoring systemFull-text access may be available. Sign in or learn about subscription options.pp. 523,524,525,526,527,528
A simple procedure in back-propagation trainingFull-text access may be available. Sign in or learn about subscription options.pp. 529,530,531,532,533,534,535
Noise analysis in camera calibrationFull-text access may be available. Sign in or learn about subscription options.pp. 536,537,538,539,540,541,542
A method for hand tracking and motion recognizing in Chinese sign languageFull-text access may be available. Sign in or learn about subscription options.pp. 543,544,545,546,547,548,549
A novel face segmentation algorithmFull-text access may be available. Sign in or learn about subscription options.pp. 550,551,552,553,554,555,556
Face recognition method based on virtual sampleFull-text access may be available. Sign in or learn about subscription options.pp. 557,558,559,560,561,562
Tropical cyclone center location with digital image processFull-text access may be available. Sign in or learn about subscription options.pp. 563,564,565,566,567
Author indexFreely available from IEEE.pp. i,ii
Location management schemes for wireless networksFull-text access may be available. Sign in or learn about subscription options.pp. 162,163,164,165,166,167
Interval arithmetic CEN for call admission control in ATM networksFull-text access may be available. Sign in or learn about subscription options.pp. 168,169,170,171,172,173
Showing 92 out of 92