Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
ICII
ICII 2001
Generate Citations
2001 International Conferences on Info-tech and Info-net. Proceedings
Oct. 29 2001 to Nov. 1 2001
Beijing, China
Volume:
1
2
3
4
5
6
Table of Contents
2001 International Conferences on Info-tech and Info-net Proceedings [front matter]
Freely available from IEEE.
pp. 0_1-8
A method for indexing Web pages using Web bots
Full-text access may be available. Sign in or learn about subscription options.
pp. 1,2,3,4,5,6
by
B.K. Szymanski
,
Ming-Shu Chung
Implementation of large-scale distributed information retrieval system
Full-text access may be available. Sign in or learn about subscription options.
pp. 7,8,9,10,11,12,13,14,15,16,17
by
Liang Sun
,
Gen Cai Chen
iTSum: one agent-based system for automated text summarizing
Full-text access may be available. Sign in or learn about subscription options.
pp. 18,19,20,21,22,23,24,25
by
Zhou Zhi
,
Hinny Kong Pe Hin
,
R. Kheng Leng Gay
,
Goh Wee Lin
,
Lee Shaur Yang
Study and implementation of a semantic information query system based on ontology
Full-text access may be available. Sign in or learn about subscription options.
pp. 26,27,28,29,30,31
by
Xu Zhenning
,
Zhang Weiming
,
Huang Kaige
,
Li Yong
,
Li You
,
Tang Daquan
Mining association rules of quantitative movement pattern in databases
Full-text access may be available. Sign in or learn about subscription options.
pp. 32,33,34,35,36,37
by
Yuan Xiao-jie
,
Kang Yi-nan
,
Wang Xiang-rui
,
Yu Chen-jie
Mining cases in the optimization of GSM network
Full-text access may be available. Sign in or learn about subscription options.
pp. 38,39,40,41,42,43
by
Wu Jing
,
Li Lin
An approach to generating summaries of time series data in the gas turbine domain
Full-text access may be available. Sign in or learn about subscription options.
pp. 44,45,46,47,48,49,50,51
by
Y. Yu
,
J. Hunter
,
E. Reiter
,
S. Sripada
Web mining based on Bayes latent semantic model
Full-text access may be available. Sign in or learn about subscription options.
pp. 52,53,54,55,56,57
by
Gong Xiujun
,
Shi Zhongzhi
A clustering algorithm based on swarm intelligence
Full-text access may be available. Sign in or learn about subscription options.
pp. 58,59,60,61,62,63,64,65,66
by
Wu bin
,
Shi Zhongzhi
Knowledge discovery from supplier change control data for purchasing management
Full-text access may be available. Sign in or learn about subscription options.
pp. 67,68,69,70,71,72
by
R.G. Davis
,
J. Si
HGR: a new rule induction algorithm based on extension matrices
Full-text access may be available. Sign in or learn about subscription options.
pp. 73,74,75,76,77,78
by
Weijun Chen
,
Fuzong Lin
,
Jianmin Li
,
Bo Zhang
A hybrid classification approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 79,80,81,82,83
by
Lu Shaoyi
,
Liu Fuyan
Mining the neural code of a guinea pig auditory cortex
Full-text access may be available. Sign in or learn about subscription options.
pp. 84,85,86,87,88,89
by
J. Si
,
R. Witte
,
Jing Hu
,
D.R. Kipke
Knowledge-increasable model and its algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 90,91,92,93,94
by
Qi Yingjian
,
Li Jianyu
,
Zhao Jiali
,
Luo Siwei
An approach of multi-hierarchy text classification
Full-text access may be available. Sign in or learn about subscription options.
pp. 95,96,97,98,99,100
by
Shaohui Liu
,
Mingkai Dong
,
Haijun Zhang
,
Rong Li
,
Zhongzhi Shi
Fuzzy concept graph and application in Web document clustering
Full-text access may be available. Sign in or learn about subscription options.
pp. 101,102,103,104,105,106
by
Chen An
,
Chen Ning
,
Weijia Jia
,
Sanding Luo
Text document clustering and the space of concept on text document automatically generated
Full-text access may be available. Sign in or learn about subscription options.
pp. 107,108,109,110,111,112
by
Fu Weipeng
,
Wu Bin
,
He Qing
,
Shi Zhongzhi
A effective classified algorithm of support vector machine with multi-representative points based on nearest neighbor principle
Full-text access may be available. Sign in or learn about subscription options.
pp. 113,114,115,116,117,118,119
by
Li Rong
,
Ye Shiwei
,
Shi Zhongzhi
Key issues of accounting information quality management an Australian case study
Full-text access may be available. Sign in or learn about subscription options.
pp. 120,121,122,123,124,125,126,127,128,129,130,131,132,133
by
Hongjiang Xu
Based-CR knowledge interconnection in National Knowledge Infrastructure
Full-text access may be available. Sign in or learn about subscription options.
pp. 134,135,136,137,138,139
by
Lei Yuxia
,
Cao Cungen
,
Sui Yuefei
GDILC: a grid-based density-isoline clustering algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 140,141,142,143,144,145
by
Zhao Yanchang
,
Song Junde
A proposal of integrating data mining and on-line analytical processing in data warehouse
Full-text access may be available. Sign in or learn about subscription options.
pp. 146,147,148,149,150,151
by
Z. Liu
,
M. Guo
A statistics based method of mining hierarchical word relation
Full-text access may be available. Sign in or learn about subscription options.
pp. 152,153,154,155,156
by
Hu Xiao
,
Wu Qinyi
,
Zhong Yixin
Association rule mining and its application in postal EMS service
Full-text access may be available. Sign in or learn about subscription options.
pp. 157,158,159,160,161
by
Duan Yun Feng
,
Li Jian Wei
,
Song Jun De
,
Shu Hua Ying
Agent based network computing: simplifying the development framework
Full-text access may be available. Sign in or learn about subscription options.
pp. 174,175,176,177,178
by
C. Linn
Checkpointing and process migration in network computing environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 179,180,181,182,183,184
by
Yi Zhang
,
Jianping Hu
A protocol switching algorithm for developing network management application
Full-text access may be available. Sign in or learn about subscription options.
pp. 185,186,187,188,189,190,191,192,193,194,195,196,197,198,199,200,201
by
Hyeok Chan Kwon
,
Nah Jae Hoon
,
Sung Won Sohn
,
Heung-Hwna Kim
,
Kwan Jong Yoo
A practical algorithm for exception event detection for the home video security surveillance
Full-text access may be available. Sign in or learn about subscription options.
pp. 202,203,204,205,206,207,208
by
Zhou Bing
,
Gu Yunhong
,
Li Bo
,
Zhang Guangwei
,
Tian Tian
Context-aware application framework based on open service gateway
Full-text access may be available. Sign in or learn about subscription options.
pp. 209,210,211,212,213
by
Joong-Han Kim
,
Sung-Su Yae
,
R.S. Ramakrishna
Algorithms of integrated student modeling in online virtual educational community
Full-text access may be available. Sign in or learn about subscription options.
pp. 214-219 vol.3
by
Yonghong Tian
,
Tiejun Huang
,
Wen Gao
Java translation scheme for consumer electronics home networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 220,221,222,223,224,225
by
S. Haruna
,
K. Taki
,
G. Leichsenring
,
T. Kanamaru
,
N. Tominaga
A novel video processing IC for progressive scan TV
Full-text access may be available. Sign in or learn about subscription options.
pp. 226,227,228,229,230
by
Zhang Guanglie
,
Zheng Nanning
,
Wu Yong
Ontology management in multi-agent system for knowledge logistics
Full-text access may be available. Sign in or learn about subscription options.
pp. 231,232,233,234,235,236
by
A. Smirnov
,
M. Pashkin
,
N. Chilov
,
T. Levashova
Application of mobile agents in collecting the residual value from electronic accounts
Full-text access may be available. Sign in or learn about subscription options.
pp. 237,238,239,240
by
Say Wei Foo
,
Wen Jie
Dynamic modeling of multidimensional logic in multi-agent environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 241,242,243,244,245
by
Liu Feng
A emotion development agent model based on OCC model and operant conditioning
Full-text access may be available. Sign in or learn about subscription options.
pp. 246,247,248,249,250
by
Chengwei Yao
,
Gencai Chen
Computation migration based on mobile IP and intelligent agent techniques
Full-text access may be available. Sign in or learn about subscription options.
pp. 251,252,253,254,255,256
by
Runtong Zhang
,
Dongmei Zhang
,
Zhigang Kan
,
Jian Ma
Commitment mechanism in agent organization
Full-text access may be available. Sign in or learn about subscription options.
pp. 257,258,259,260,261,262
by
Zhang Wei
,
Xu Jinhui
,
Shi Chunyi
The organizational structure in collaborative information gathering
Full-text access may be available. Sign in or learn about subscription options.
pp. 263,264,265,266,267,268
by
Liu Yi
,
Lu Zeng-Xiang
,
Li Yan-Da
Autonomous mental development for agent
Full-text access may be available. Sign in or learn about subscription options.
pp. 269,270,271,272,273
by
Jinhua Zheng
,
Zhongzhi Shi
Learning based dynamic approach to job-shop scheduling
Full-text access may be available. Sign in or learn about subscription options.
pp. 274,275,276,277,278,279
by
Liang Wei
,
Yu Haibin
Reinforcement learning approach to re-entrant manufacturing system scheduling
Full-text access may be available. Sign in or learn about subscription options.
pp. 280,281,282,283,284,285
by
Chang-chun Liu
,
Hui-yu Jin
,
Yu Tian
,
Hai-bin Yu
Assemble-on-demand agent
Full-text access may be available. Sign in or learn about subscription options.
pp. 286,287,288,289,290,291
by
Xiaobin Huang
,
Qi Li
,
Shaoyan Wu
Group decision support system for agile virtual enterprise based on mobile agent technology
Full-text access may be available. Sign in or learn about subscription options.
pp. 292,293,294,295,296,297
by
Sha Lei
,
Xie Wei
,
Xu Xiaofei
,
Zhan Dechen
The design of a fast inverse module in AES
Full-text access may be available. Sign in or learn about subscription options.
pp. 298,299,300,301,302,303
by
M.H. Jing
,
Y.H. Chen
,
Y.T. Chang
,
C.H. Hsu
Interaction templates for pervasive service chains
Full-text access may be available. Sign in or learn about subscription options.
pp. 304,305,306,307,308,309
by
M. Samulowitz
,
Ying Lin
A chaotic masking system of network traffic
Full-text access may be available. Sign in or learn about subscription options.
pp. 310,311,312,313,314,315
by
Ming Li
,
Weijia Jia
,
Wei Zhao
Mobile ad hoc networking: an essential technology for pervasive computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 316,317,318,319,320,321
by
Jun-Zhao Sun
Parallel computation of the time-frequency power spectrum: analysis and comparison to the bispectrum
Full-text access may be available. Sign in or learn about subscription options.
pp. 322,323,324,325,326,327
by
K.N. Le
,
G.K. Egan
,
K.P. Dabke
Parallel execution of an irregular algorithm depth first search (DFS) on heterogeneous clusters of workstation
Full-text access may be available. Sign in or learn about subscription options.
pp. 328,329,330,331,332
by
M.A.M. Ibrahim
,
L. Xinda
,
J.M. Rwakarambi
A fast error and erasure correction algorithm for a simple RS-RAID
Full-text access may be available. Sign in or learn about subscription options.
pp. 333,334,335,336,337,338
by
M.H. Jing
,
Y.H. Chen
,
J.E. Liao
RECOM: a reflective architecture of middleware
Full-text access may be available. Sign in or learn about subscription options.
pp. 339,340,341,342,343,344
by
Yang Sizhong
,
Liu Jinde
,
Luo Zhigang
Coupling modes for concurrent active rules
Full-text access may be available. Sign in or learn about subscription options.
pp. 345,346,347,348,349,350,351,352,353,354
by
Xu ChangXing
,
Liu YunSheng
,
Xu guiping
Research on normalization design for complex object schemes
Full-text access may be available. Sign in or learn about subscription options.
pp. 355,356,357,358,359,360
by
Wu Yonghui
On methodology of fuzzy pattern recognition
Full-text access may be available. Sign in or learn about subscription options.
pp. 361,362,363,364,365,366
by
Yao Min
An efficient robust automatic speech recognition system based on the combination of speech enhancement and log-add HMM adaptation
Full-text access may be available. Sign in or learn about subscription options.
pp. 367,368,369,370,371
by
Ding Pei
,
Cao Zhigang
Image segmentation using watersheds guided by edge tracing
Full-text access may be available. Sign in or learn about subscription options.
pp. 372,373,374,375,376,377
by
Lei Ma
,
J. Si
,
G.P. Abousleman
Detecting adult image using multiple features
Full-text access may be available. Sign in or learn about subscription options.
pp. 378-383 vol.3
by
Feng Jiao
,
Wen Gao
,
Lijuan Duan
,
Guoqin Cui
A wavelet based adaptive watermarking algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 384,385,386,387,388,389
by
Shao Ya-fei
,
Wu Guo-wei
,
Lin Xing-gang
An intelligent imaging approach to the identification of forensic ballistics specimens
Full-text access may be available. Sign in or learn about subscription options.
pp. 390,391,392,393,394,395,396
by
C.L. Smith
Utterance verification for spontaneous Mandarin speech keyword spotting
Full-text access may be available. Sign in or learn about subscription options.
pp. 397,398,399,400,401
by
Liu Xin
,
BingXi Wang
Text-independent speaker recognition using support vector machine
Full-text access may be available. Sign in or learn about subscription options.
pp. 402,403,404,405,406,407
by
Hou Fenglei
,
Wang Bingxi
Design of nonlinear filter for echocardiographic images on wavelet-based method
Full-text access may be available. Sign in or learn about subscription options.
pp. 408,409,410,411,412,413
by
Su Cheol Kang
,
Seung Hong Hong
Multi-scale Bayesian face recognition by using anti-symmetrical biorthogonal wavelets
Full-text access may be available. Sign in or learn about subscription options.
pp. 414,415,416,417,418,419,420
by
Jinye Peng
,
Yu Bianzhang
Image similarity measurement using max weighted bipartite matching
Full-text access may be available. Sign in or learn about subscription options.
pp. 421,422,423,424,425,426
by
Hualin Wan
,
Hong Hu
,
Zhongzhi Shi
Image featuring for retrieval of multimedia documents
Full-text access may be available. Sign in or learn about subscription options.
pp. 427,428,429,430,431,432
by
N. Haque
,
M.U. Chowdhury
Displaying IFS attractor based on fixed point
Full-text access may be available. Sign in or learn about subscription options.
pp. 433,434,435,436,437
by
Zhang Yi-Shun
,
Yang Yang
Multiple candidate characters in the post-processing for off-line handwritten Chinese character recognition
Full-text access may be available. Sign in or learn about subscription options.
pp. 438,439,440,441,442,443
by
Li Yuanxiang
,
Ding Xiaoqing
Illumination compensation and feedback of illumination feature in face detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 444-449 vol.3
by
Hong Liu
,
Wen Gao
,
Jun Miao
,
Debin Zhao
,
Gang Deng
,
Jintao Li
Knowledge based pipeline network peeling off recognition method of maps
Full-text access may be available. Sign in or learn about subscription options.
pp. 450,451,452,453,454,455
by
Liu Tongyu
,
Gu Shusheng
Face recognition: a facial action reconstruction and ICA representation approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 456,457,458,459,460,461
by
Zhao Jiali
,
Wen Jinwei
,
Luo Siwei
Learning programs for decision and control
Full-text access may be available. Sign in or learn about subscription options.
pp. 462,463,464,465,466,467
by
J. Si
,
R. Enns
,
Yu-tsung Wang
Condition monitoring of power transformers with neural networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 468,469,470,471,472
by
Zhi-Hua Zhou
,
Zhao-Qian Chen
,
Shi-Fu Chen
To improve the training time of BP neural networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 473,474,475,476,477,478,479
by
Chien-Cheng Yu
,
Yun-Ching Tang
Knowledge-increasable artificial neural network and natural gradient algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 480,481,482,483,484,485
by
Yaping Huang
,
Siwei Luo
,
Jianyu Li
On decision-boundary-based approaches for structure selection of multilayered neural nets
Full-text access may be available. Sign in or learn about subscription options.
pp. 486,487,488,489,490
by
D. Chen
,
P. Burrell
Neural network modeling study of one dimension gray problem GNNM (1, 1)
Full-text access may be available. Sign in or learn about subscription options.
pp. 491,492,493,494,495,496,497
by
Huazhu Song
,
Bo Han
Channel equalization using complex-valued recurrent neural network
Full-text access may be available. Sign in or learn about subscription options.
pp. 498,499,500,501,502,503
by
Xiaoqiu Wang
,
Hua Lin
,
Jianming Lu
,
T. Yahagi
Automatic edge and target extraction base on pulse-couple neuron networks wavelet theory (PCNNW)
Full-text access may be available. Sign in or learn about subscription options.
pp. 504,505,506,507,508,509
by
K. Berthe
,
Yang Yang
Artificial neural network applications on remotely sensed imagery
Full-text access may be available. Sign in or learn about subscription options.
pp. 510,511,512,513,514,515
by
K. Das
,
Qin Ding
,
W. Perrizo
A novel neural network learning method for dynamically tuning regularization coefficient
Full-text access may be available. Sign in or learn about subscription options.
pp. 516,517,518,519,520,521,522
by
Wu Yan
,
Zhang Liming
An intelligent forex monitoring system
Full-text access may be available. Sign in or learn about subscription options.
pp. 523,524,525,526,527,528
by
A. Abraham
,
M.U. Chowdhury
A simple procedure in back-propagation training
Full-text access may be available. Sign in or learn about subscription options.
pp. 529,530,531,532,533,534,535
by
Chien-Cheng Yu
,
Bin-Da Liu
Noise analysis in camera calibration
Full-text access may be available. Sign in or learn about subscription options.
pp. 536,537,538,539,540,541,542
by
Li Yunhao
,
Zhang Maojun
,
Yang Bin
,
Wu Lingda
A method for hand tracking and motion recognizing in Chinese sign language
Full-text access may be available. Sign in or learn about subscription options.
pp. 543,544,545,546,547,548,549
by
Zou Wei
,
Yuan Kui
,
Liu Jindong
,
Luo Bencheng
A novel face segmentation algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 550,551,552,553,554,555,556
by
Wei Fang
,
Li Pengfei
Face recognition method based on virtual sample
Full-text access may be available. Sign in or learn about subscription options.
pp. 557,558,559,560,561,562
by
Wen Jin-wei
,
Zhao Jia-li
,
Luo Si-wei
,
Huang Hua
Tropical cyclone center location with digital image process
Full-text access may be available. Sign in or learn about subscription options.
pp. 563,564,565,566,567
by
Wang Yanyan
,
Wang Han
,
Chen Hong
,
Sun Wei-Chi
Author index
Freely available from IEEE.
pp. i,ii
Location management schemes for wireless networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 162,163,164,165,166,167
by
S. Zhou
,
U. Szewcow
,
M. Fry
Interval arithmetic CEN for call admission control in ATM networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 168,169,170,171,172,173
by
Kyunghee Lee
Showing 92 out of 92