Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
ISADS
ISADS 2005
Generate Citations
Proceedings. ISADS 2005. 2005 International Symposium on Autonomous Decentralized Systems
April 4 2005 to April 8 2005
Chengdu, Jiuzhaigou, China
Table of Contents
2005 International Symposium on Autonomous Decentralized Systems
Freely available from IEEE.
pp. iii-iii
Steering Chair's message
Freely available from IEEE.
pp. xviii
by
K. Mori
PC Co-chair's message
Freely available from IEEE.
pp. xix
by
Shen Zhiyun
,
R. Popescu-Zeletin
,
I-Ling Yen
Research on service oriented simulation grid
Full-text access may be available. Sign in or learn about subscription options.
pp. 7,8,9,10,11,12,13,14
by
Bo Hu Li
,
Xudong Chai
,
Yanqiang Di
,
Haiyan Yu
,
Zhihui Du
,
Xiaoyuan Peng
Situation-aware access control for service-oriented autonomous decentralized systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 17,18,19,20,21,22,23,24
by
S.S. Yau
,
Yisheng Yao
,
V. Banga
Autonomous multi-agent-based data allocation technology in decentralized database systems for timeliness
Full-text access may be available. Sign in or learn about subscription options.
pp. 25,26,27,28,29,30,31,32
by
M. Takaishi
,
C.P. Leguizamo
,
S. Kimura
,
R. Takanuki
Considerations on transaction response time and configuration checking in autonomous decentralized DB (ADDS)
Full-text access may be available. Sign in or learn about subscription options.
pp. 33,34,35,36,37,38,39,40
by
I. Kaji
,
K. Kano
Developing and assuring trustworthy Web services
Full-text access may be available. Sign in or learn about subscription options.
pp. 43,44,45,46,47,48,49,50
by
W.T. Tsai
,
X. Wei
,
Y. Chen
,
B. Xiao
,
R. Paul
,
H. Huang
Autonomous network-based information services integration for high response in multi-agent information service systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 51,52,53,54,55,56,57,58
by
Xiaodong Lu
,
I. Luque
,
M. Kanda
,
Yanqing Jiang
,
K. Moriyama
,
K. Mori
,
R. Takanuki
,
Y. Kuba
The analysis of communication architecture and control mode of wide area power systems control
Full-text access may be available. Sign in or learn about subscription options.
pp. 59,60,61,62,63,64,65
by
Tong Xiaoyang
,
Liao Guodong
,
Wang Xiaoru
,
Zhong Shan
Applying synthesized immune networks hypothesis to mobile robots
Full-text access may be available. Sign in or learn about subscription options.
pp. 69,70,71,72,73
by
Q.J. Duan
,
R.X. Wang
,
H.S. Feng
,
L.G. Wang
A reliable multicast protocol for mailbox-based mobile agent communications
Full-text access may be available. Sign in or learn about subscription options.
pp. 74,75,76,77,78,79,80,81
by
Jiannong Cao
,
Wei Xu
,
A.T.S. Chan
,
Jing Li
Basic building blocks for mobile service provisioning
Full-text access may be available. Sign in or learn about subscription options.
pp. 82,83,84,85,86,87,88,89
by
B. Mrohs
,
C. Rack
,
S. Steglich
The study of cooperative behavior in predator-prey problem of multi-agent systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 90,91,92,93,94,95,96
by
Duo Zhao
,
WeiDong Jin
Maximizing the route reliability of mobile agents in unreliable environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 97,98,99,100,101,102,103,104
by
M. Daoud
,
Q.H. Mahmoud
Cooperating objects for ubiquitous computing
Freely available from IEEE.
pp. 107-108
by
S. Steglich
MUSE: a vision of service and architecture for beyond 3G networks
Freely available from IEEE.
pp. 109-115
by
Zhang Ping
,
Ji Yang
,
Zhang Yongjing
,
Wang Xu
,
Hu Zheng
Socio-technical implications of the ubiquitous information systems
Freely available from IEEE.
pp. 116-117
by
M. Funabashi
,
K. Homma
,
T. Sasaki
An architectural approach for building platforms is still needed
Freely available from IEEE.
pp. 118-120
by
O. Drogehorn
,
K. David
Ubiquitous service - using RFID tag reader on a mobile terminal
Freely available from IEEE.
pp. 121-122
by
M. Ohashi
Assurance reconfiguration technology in decentralized database systems by an autonomous restructure mobile agent
Full-text access may be available. Sign in or learn about subscription options.
pp. 125,126,127,128,129,130,131,132
by
C.P. Leguizamo
,
M. Takaishi
,
S. Kimura
,
K. Mori
Autonomous video-on-demand system for heterogeneous quality levels to achieve high assurance
Full-text access may be available. Sign in or learn about subscription options.
pp. 133,134,135,136,137,138,139,140
by
M. Kanda
,
M. Tasaka
,
Xiaodong Lu
,
I. Luque
,
Jiang Yanqing
,
K. Moriyama
,
R. Takanuki
,
Y. Kuba
Autonomous decentralized service level management for real-time assurance
Full-text access may be available. Sign in or learn about subscription options.
pp. 141,142,143,144,145,146,147,148
by
I. Luque
,
Xiaodong Lu
,
M. Kanda
,
L. Moriyama
,
Y. Kuba
,
R. Takanuki
Effect of preventive rejuvenation in communication network system with burst arrival
Full-text access may be available. Sign in or learn about subscription options.
pp. 151,152,153,154,155,156,157,158
by
H. Okamura
,
S. Miyahara
,
T. Dohi
Behavioral analysis of a fault-tolerant software system with rejuvenation
Full-text access may be available. Sign in or learn about subscription options.
pp. 159,160,161,162,163,164,165,166
by
K. Rinsaka
,
T. Dohi
Decentralized architecture for fault tolerant multi agent system
Full-text access may be available. Sign in or learn about subscription options.
pp. 167-174
by
Z.A. Khan
,
S. Shahid
,
H.F. Ahmad
,
A. Ali
,
H. Suguri
Importance of real-time distributed computing software building-blocks in realization of ubiquitous computing societies
Freely available from IEEE.
pp. 177-183
by
K.H. Kim
A novel method for authenticating mobile agents with one-way signature chaining
Full-text access may be available. Sign in or learn about subscription options.
pp. 187,188,189,190,191,192,193
by
A. Saxena
,
B. Soh
Certificateless group inside signature
Full-text access may be available. Sign in or learn about subscription options.
pp. 194,195,196,197,198,199,200
by
Chunbo Ma
,
Faliang Ao
,
Dake He
Multi-agent system for security auditing and worm containment in metropolitan area networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 201,202,203,204,205,206,207
by
Xiantai Gou
,
Weidong Jin
A digital certificate revocation status promulgation scheme based on square residue
Full-text access may be available. Sign in or learn about subscription options.
pp. 208,209,210,211
by
Chen Lin
,
Li Huan-zhou
,
Hu Yong
Autonomous decentralized high-speed processing technology and the application in an integrated IC card fixed-line and wireless system
Full-text access may be available. Sign in or learn about subscription options.
pp. 215,216,217,218,219,220,221,222,223
by
A. Shiibashi
The study of Maglev train diagnosis system based on ADS' ideas
Full-text access may be available. Sign in or learn about subscription options.
pp. 224,225,226,227,228,229
by
Liu Zhigang
,
He Zhengyou
,
Zhang Dabo
,
Zhang Yajun
WNN-based NGN traffic prediction
Full-text access may be available. Sign in or learn about subscription options.
pp. 230,231,232,233,234
by
Qigang Zhao
,
Xuming Fang
,
Qunzhan Li
,
Zhengyou He
The simulation research for the ATO model based on fuzzy predictive control
Full-text access may be available. Sign in or learn about subscription options.
pp. 235,236,237,238,239,240,241
by
Jinling Zhu
,
Xiaoyun Feng
,
Qing He
,
Jian Xiao
Research on train group operation model in RITS
Full-text access may be available. Sign in or learn about subscription options.
pp. 242,243,244,245,246,247,248,249
by
Yangdong Ye
,
Zundong Zhang
,
Limin Jia
,
Honghua Dai
Assurance technology for large transport operation control system
Full-text access may be available. Sign in or learn about subscription options.
pp. 250,251,252,253,254,255,256,257,258
by
K. Kera
,
M. Shoji
,
T. Igarashi
,
A. Ando
,
K. Mori
Dynamic transport services using flexible positioning of bus stations
Full-text access may be available. Sign in or learn about subscription options.
pp. 259,260,261,262,263,264,265,266
by
N. Mukai
,
T. Watanabe
An ideal run mode for mass transit based on ADS
Full-text access may be available. Sign in or learn about subscription options.
pp. 267,268,269,270,271,272,273,274
by
Qing He
,
Xiaoyun Feng
,
Jinling Zhu
,
Hongyun He
Autonomous decentralized resource allocation for tracking dynamic load change
Full-text access may be available. Sign in or learn about subscription options.
pp. 277,278,279,280,281,282,283
by
T. Masuishi
,
H. Kuriyama
,
Y. Ooki
,
K. Mori
A bidding strategy for advance resource reservation in sequential ascending auctions
Full-text access may be available. Sign in or learn about subscription options.
pp. 284,285,286,287,288
by
Zhixing Huang
,
Yuhui Qiu
A flexible hybrid communication model based messaging middleware
Full-text access may be available. Sign in or learn about subscription options.
pp. 289,290,291,292,293,294
by
Pan Huifang
,
Zhou Xingshe
,
Yang Zhiyi
,
Gu Jianhua
A new multicast routing protocol based on autonomous clustering in ad hoc networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 297,298,299,300,301,302,303,304,305
by
T. Ohta
,
T. Kawaguchi
,
Y. Kakuda
Multisensor multitarget tracking methods based on particle filter
Full-text access may be available. Sign in or learn about subscription options.
pp. 306,307,308,309
by
Xiong wei
,
Zhang jing-wei
,
He you
Enabling context-aware group collaboration in MANETs
Full-text access may be available. Sign in or learn about subscription options.
pp. 310,311,312,313,314,315,316,317,318
by
D. Bottazzi
,
A. Corradi
,
R. Montanari
An autonomous decentralized community overly network division and integration technology for achieving timeliness
Full-text access may be available. Sign in or learn about subscription options.
pp. 321,322,323,324,325,326,327
by
K. Ragab
,
K. Moriyama
,
H. Kuriyama
,
Y. Horikoshi
,
Y. Sugiyama
Autonomous cooperation technology for real-time marketing with high accuracy in autonomous decentralized community system
Full-text access may be available. Sign in or learn about subscription options.
pp. 328,329,330,331,332,333,334,335
by
Y. Horikoshi
,
N. Kaji
,
H. Kuriyama
,
Y. Sugiyama
Service search technology in autonomous decentralized community system for timeliness
Full-text access may be available. Sign in or learn about subscription options.
pp. 336,337,338,339,340,341,342,343
by
Y. Sugiyama
,
Y. Horikoshi
,
H. Kuriyama
,
K. Moriyama
Decentral control of a robot-swarm
Full-text access may be available. Sign in or learn about subscription options.
pp. 347,348,349,350,351
by
I. Dahm
,
M. Hebbel
,
M. Hulsbusch
,
J. Kerdels
,
W. Nistico
,
C. Schumann
,
M. Wachter
Research of double loop optical fiber self-cicatrized network based on Neuron3150
Full-text access may be available. Sign in or learn about subscription options.
pp. 352,353,354,355
by
Ren Wang
,
Deming Chen
,
Qingquan Qian
v-SVM for transient stability assessment in power systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 356,357,358,359,360,361,362,363
by
Xiaohong Wang
,
Sitao Wu
,
Qunzhan Li
,
Xiaoru Wang
An adaptive key-frame reference picture selection algorithm for video transmission via error prone networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 367,368,369,370,371
by
Tianwu Yang
,
Wei Huang
,
Qiang Peng
,
Changqian Zhu
Remote sensing image data fusion based on local deviation of wavelet packet transform
Full-text access may be available. Sign in or learn about subscription options.
pp. 372,373,374,375,376,377
by
Jin Wu
,
Honglin Huang
,
Jinwen Tian
,
Jian Liu
Content-based color image retrieval via lifting scheme
Full-text access may be available. Sign in or learn about subscription options.
pp. 378,379,380,381,382,383
by
Huihui Huang
,
Wei Huang
,
Zhigang Liu
,
Weirong Chen
,
Qingquan Qian
High-level representations of temporary traffic states using Hasse graph and temporal change map under a grid-based site model
Full-text access may be available. Sign in or learn about subscription options.
pp. 387,388,389,390,391
by
Xiaoming Yao
,
Qingquan Qian
An adaptive fuzzy logic controller with self-tuning scaling factors based on neural networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 392,393,394,395,396
by
Huiwen Deng
,
Yi Wang
Creation, deployment, and execution of rule-based services
Full-text access may be available. Sign in or learn about subscription options.
pp. 397,398,399,400,401,402,403,404
by
Ilja Radusch
,
S. Arbanowski
,
S. Steglich
,
R. Popescu-Zeletin
ADPE: agent-based decentralized process engine
Full-text access may be available. Sign in or learn about subscription options.
pp. 405,406,407,408,409,410,411,412
by
Shih-Chien Chou
The future of high-speed train
Freely available from IEEE.
pp. 415-418
by
Y. Ishida
AOA: an autonomous-oriented architecture
Full-text access may be available. Sign in or learn about subscription options.
pp. 421,422,423,424,425,426
by
G. Pujolle
,
Hakima Chaouchi
Adaptive algorithms for finding replacement services in autonomic distributed business processes
Full-text access may be available. Sign in or learn about subscription options.
pp. 427,428,429,430,431,432,433,434
by
Tao Yu
,
Kwei-Jay Lin
Lightweight home network middleware supporting mobility management
Full-text access may be available. Sign in or learn about subscription options.
pp. 435,436,437,438,439,440,441,442
by
Hojae Hyun
,
Kwangman Koh
,
Sunyoung Han
,
Moon Hae Kim
,
Chun-Hyon Chang
Securing instance-level interactions in Web services
Full-text access may be available. Sign in or learn about subscription options.
pp. 443,444,445,446,447,448,449,450
by
Dacheng Zhang
,
Jie Xu
Towards I-centric business communication tools
Full-text access may be available. Sign in or learn about subscription options.
pp. 453,454,455,456,457,458,459,460
by
C. Rack
,
T. Bauer
,
C. Weckerle
,
S. Steglich
,
S. Arbanowski
,
Taro Nakao
,
Tadaaki Arimura
,
Tatsuya Nakamura
,
Shigetoshi Yokoyama
Situational reasoning - a practical OWL use case
Full-text access may be available. Sign in or learn about subscription options.
pp. 461,462,463,464,465,466,467,468
by
M. Luther
,
B. Mrohs
,
M. Wagner
,
S. Steglich
,
W. Kellerer
Adaptivity for multimodal user interfaces in mobile situations
Full-text access may be available. Sign in or learn about subscription options.
pp. 469,470,471,472
by
R. Kernchen
,
K. Mossner
,
R. Tafazolli
Personalised applications and services for a mobile user
Full-text access may be available. Sign in or learn about subscription options.
pp. 473,474,475,476,477,478,479
by
O. Drogehorn
,
B. Wust
,
K. David
The Yaoyorozu project designing ubiquitous information society in 2010
Full-text access may be available. Sign in or learn about subscription options.
pp. 480,481,482,483,484,485
by
Matohisa Funabashi
,
Koichi Homma
,
Toshiro Sasaki
Efficient switch schedulers with random decisions
Full-text access may be available. Sign in or learn about subscription options.
pp. 489,490,491,492,493,494
by
D. Serpanos
Learning desirable actions in two-player two-action games
Full-text access may be available. Sign in or learn about subscription options.
pp. 495,496,497,498,499,500
by
K. Moriyama
Application of support vector machines to nonlinear system identification
Full-text access may be available. Sign in or learn about subscription options.
pp. 501,502,503,504,505,506,507
by
Haina Rong
,
Gexiang Zhang
,
Cuifang Zhang
Fast algorithm for line rasterization by using slope 1
Full-text access may be available. Sign in or learn about subscription options.
pp. 508,509,510,511,512
by
Hua Zhang
,
Changqian Zhu
,
Jun Yang
A novel forward search strategy to automatically harmonize intensification and diversification in tabu search
Full-text access may be available. Sign in or learn about subscription options.
pp. 513,514,515,516,517,518,519
by
KaiYou Lei
,
Fang Wang
,
Yuhui Qiu
,
Guangyuan Liu
,
Yi He
On fast switching related to PFTS nodes
Full-text access may be available. Sign in or learn about subscription options.
pp. 520,521,522,523,524
by
Dengyuan Xu
,
Wenjie Liu
,
Congcai Yi
Distributed grid resource registry meta-service: design and implementation
Full-text access may be available. Sign in or learn about subscription options.
pp. 531,532,533,534,535
by
ZhenChun Huang
,
Bin Du
,
Lei Gu
,
Chuan He
,
SanLi Li
A study on primary path switching strategy of SCTP
Full-text access may be available. Sign in or learn about subscription options.
pp. 536,537,538,539,540,541
by
J. Funasaka
,
K. Ishida
,
H. Obata
,
Y. Jutori
A QoS-enable failure detection framework for J2EE application server
Full-text access may be available. Sign in or learn about subscription options.
pp. 542,543,544,545,546
by
Ning-jiang Chen
,
Jun Wei
,
Bo Yang
,
Jin-ling Wang
,
Tao Huang
An immune-based model for Web data mining
Full-text access may be available. Sign in or learn about subscription options.
pp. 547,548,549,550,551
by
Wang Feng
,
Xuwei Li
,
Zhu Hong
Web services-based collaborative and cooperative computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 552,553,554,555,556
by
W.T. Tsai
,
Z. Cao
,
Y. Chen
,
R. Paul
Re-integrating of architecture/component oriented general model of sub-domain
Full-text access may be available. Sign in or learn about subscription options.
pp. 557,558,559,560,561
by
LiYu-cai
,
Wang Ling
A multiagent-based path rerouting method in MPLS networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 562,563,564,565
by
S. Inoue
,
N. Ueno
,
M. Amamiya
,
Y. Kakuda
Lattice model based on a new information security function
Full-text access may be available. Sign in or learn about subscription options.
pp. 566,567,568,569
by
Yihe Liu
,
Xuwei LI
The design and analysis of an electronic evidence and non-repudiation protocol
Full-text access may be available. Sign in or learn about subscription options.
pp. 570,571,572,573
by
Ding Yuan
,
Tao Guo
,
Fan Pingzhi
An empirical study on customers' acceptance of Web stores
Full-text access may be available. Sign in or learn about subscription options.
pp. 574,575,576,577,578,579
by
Zheng Yang
,
Xiaoli Tan
,
Yu Mao
,
Jimo Liu
Anomaly detection of privileged program based on fuzzy segments
Full-text access may be available. Sign in or learn about subscription options.
pp. 580,581,582,583,584
by
Peng Xinguang
,
Zhang Zhirong
,
Wang Zheng
Blending Web services and agents for mobile users
Full-text access may be available. Sign in or learn about subscription options.
pp. 585,586,587,588,589,590
by
W. Zahreddine
,
Q.H. Mahmoud
HADS-humanized autonomous decentralized systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 593,594,595,596,597,598
by
Tu Xuyan
,
Zeng Guangping
,
Tangtao
The revolution of train control system in Japan
Full-text access may be available. Sign in or learn about subscription options.
pp. 599,600,601,602,603,604,605,606
by
M. Matsumo
Autonomous decentralized organization model and coordination control of SoftMan Crowd
Full-text access may be available. Sign in or learn about subscription options.
pp. 607,608,609,610,611
by
Zeng Guangping
,
Lu Qingling
,
Zhang Shumin
,
Chen Ming
,
Tu Xuyan
Intelligent autonomous decentralized enterprise resource planning (IADERP)
Full-text access may be available. Sign in or learn about subscription options.
pp. 612,613,614,615
by
Wang Anhua
,
Tu Xuyan
Research on the architecture of ERP system based on intelligent autonomous decentralized system
Full-text access may be available. Sign in or learn about subscription options.
pp. 616,617,618,619
by
Ye Bin
,
Ma Zhong-gui
,
Tu Xu-yan
IIPP and CIT based intelligent autonomous QA system
Full-text access may be available. Sign in or learn about subscription options.
pp. 620,621,622,623
by
Wang Cong
,
Guo Yahui
,
Liu Jianyi
Autonomous node reallocation for achieving load balance under changing users' preference
Full-text access may be available. Sign in or learn about subscription options.
pp. 624,625,626,627,628,629
by
Yanqing Jiang
,
Xiaodong Lu
,
Ivan Luque
,
M. Kanda
,
K. Moriyama
,
R. Takanuki
,
Y. Kuba
Digital gas fields produce real time scheduling based on intelligent autonomous decentralized system
Full-text access may be available. Sign in or learn about subscription options.
pp. 630,631,632,633,634,635
by
Hongbo Wang
,
Guangping Zeng
,
Xuyan Tu
,
Zongjie Wang
Study on enterprise application integrated model based on IADS
Full-text access may be available. Sign in or learn about subscription options.
pp. 636,637,638,639,640
by
Zhang wei
,
Pang jie
,
Zhang fusheng
,
Tu xuyanu
The study on model and architecture of SoftMan group based on intelligent autonomous decentralized systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 641,642,643,644,645,646
by
Zhonggui Ma
,
Bin Ye
,
Xiaojuan Ban
,
Guangping Zeng
,
Xuyan Tu
An improved autonomous clustering scheme for highly mobile large ad hoc networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 655,656,657,658,659,660
by
T. Ohta
,
N. Murakami
,
R. Oda
,
Y. Kakuda
Achieving power-law placement in wireless sensor networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 661,662,663,664,665,666
by
M. Ishizuka
,
M. Aida
A dynamic index allocation scheme for peer-to-peer networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 667,668,669,670,671,672
by
T. Ohta
,
Y. Masuda
,
K. Mitsukawa
,
Y. Kakuda
,
A. Ito
Ad hoc unidirectional routing protocol based on relay control of route requests
Full-text access may be available. Sign in or learn about subscription options.
pp. 675,676,677,678,679,680
by
H. Morino
,
T. Miyoshi
,
M. Ogawa
Showing 100 out of 109
Load More
Load All