Default Cover Image

Proceedings. ISADS 2005. 2005 International Symposium on Autonomous Decentralized Systems

April 4 2005 to April 8 2005

Chengdu, Jiuzhaigou, China

Table of Contents

Steering Chair's messageFreely available from IEEE.pp. xviii
PC Co-chair's messageFreely available from IEEE.pp. xix
Research on service oriented simulation gridFull-text access may be available. Sign in or learn about subscription options.pp. 7,8,9,10,11,12,13,14
Situation-aware access control for service-oriented autonomous decentralized systemsFull-text access may be available. Sign in or learn about subscription options.pp. 17,18,19,20,21,22,23,24
Autonomous multi-agent-based data allocation technology in decentralized database systems for timelinessFull-text access may be available. Sign in or learn about subscription options.pp. 25,26,27,28,29,30,31,32
Considerations on transaction response time and configuration checking in autonomous decentralized DB (ADDS)Full-text access may be available. Sign in or learn about subscription options.pp. 33,34,35,36,37,38,39,40
Developing and assuring trustworthy Web servicesFull-text access may be available. Sign in or learn about subscription options.pp. 43,44,45,46,47,48,49,50
The analysis of communication architecture and control mode of wide area power systems controlFull-text access may be available. Sign in or learn about subscription options.pp. 59,60,61,62,63,64,65
Applying synthesized immune networks hypothesis to mobile robotsFull-text access may be available. Sign in or learn about subscription options.pp. 69,70,71,72,73
A reliable multicast protocol for mailbox-based mobile agent communicationsFull-text access may be available. Sign in or learn about subscription options.pp. 74,75,76,77,78,79,80,81
Basic building blocks for mobile service provisioningFull-text access may be available. Sign in or learn about subscription options.pp. 82,83,84,85,86,87,88,89
The study of cooperative behavior in predator-prey problem of multi-agent systemsFull-text access may be available. Sign in or learn about subscription options.pp. 90,91,92,93,94,95,96
Maximizing the route reliability of mobile agents in unreliable environmentsFull-text access may be available. Sign in or learn about subscription options.pp. 97,98,99,100,101,102,103,104
Cooperating objects for ubiquitous computingFreely available from IEEE.pp. 107-108
Assurance reconfiguration technology in decentralized database systems by an autonomous restructure mobile agentFull-text access may be available. Sign in or learn about subscription options.pp. 125,126,127,128,129,130,131,132
Autonomous video-on-demand system for heterogeneous quality levels to achieve high assuranceFull-text access may be available. Sign in or learn about subscription options.pp. 133,134,135,136,137,138,139,140
Autonomous decentralized service level management for real-time assuranceFull-text access may be available. Sign in or learn about subscription options.pp. 141,142,143,144,145,146,147,148
Effect of preventive rejuvenation in communication network system with burst arrivalFull-text access may be available. Sign in or learn about subscription options.pp. 151,152,153,154,155,156,157,158
Behavioral analysis of a fault-tolerant software system with rejuvenationFull-text access may be available. Sign in or learn about subscription options.pp. 159,160,161,162,163,164,165,166
Decentralized architecture for fault tolerant multi agent systemFull-text access may be available. Sign in or learn about subscription options.pp. 167-174
A novel method for authenticating mobile agents with one-way signature chainingFull-text access may be available. Sign in or learn about subscription options.pp. 187,188,189,190,191,192,193
Certificateless group inside signatureFull-text access may be available. Sign in or learn about subscription options.pp. 194,195,196,197,198,199,200
Multi-agent system for security auditing and worm containment in metropolitan area networksFull-text access may be available. Sign in or learn about subscription options.pp. 201,202,203,204,205,206,207
A digital certificate revocation status promulgation scheme based on square residueFull-text access may be available. Sign in or learn about subscription options.pp. 208,209,210,211
Autonomous decentralized high-speed processing technology and the application in an integrated IC card fixed-line and wireless systemFull-text access may be available. Sign in or learn about subscription options.pp. 215,216,217,218,219,220,221,222,223
The study of Maglev train diagnosis system based on ADS' ideasFull-text access may be available. Sign in or learn about subscription options.pp. 224,225,226,227,228,229
WNN-based NGN traffic predictionFull-text access may be available. Sign in or learn about subscription options.pp. 230,231,232,233,234
The simulation research for the ATO model based on fuzzy predictive controlFull-text access may be available. Sign in or learn about subscription options.pp. 235,236,237,238,239,240,241
Research on train group operation model in RITSFull-text access may be available. Sign in or learn about subscription options.pp. 242,243,244,245,246,247,248,249
Assurance technology for large transport operation control systemFull-text access may be available. Sign in or learn about subscription options.pp. 250,251,252,253,254,255,256,257,258
Dynamic transport services using flexible positioning of bus stationsFull-text access may be available. Sign in or learn about subscription options.pp. 259,260,261,262,263,264,265,266
An ideal run mode for mass transit based on ADSFull-text access may be available. Sign in or learn about subscription options.pp. 267,268,269,270,271,272,273,274
Autonomous decentralized resource allocation for tracking dynamic load changeFull-text access may be available. Sign in or learn about subscription options.pp. 277,278,279,280,281,282,283
A bidding strategy for advance resource reservation in sequential ascending auctionsFull-text access may be available. Sign in or learn about subscription options.pp. 284,285,286,287,288
A flexible hybrid communication model based messaging middlewareFull-text access may be available. Sign in or learn about subscription options.pp. 289,290,291,292,293,294
A new multicast routing protocol based on autonomous clustering in ad hoc networksFull-text access may be available. Sign in or learn about subscription options.pp. 297,298,299,300,301,302,303,304,305
Multisensor multitarget tracking methods based on particle filterFull-text access may be available. Sign in or learn about subscription options.pp. 306,307,308,309
Enabling context-aware group collaboration in MANETsFull-text access may be available. Sign in or learn about subscription options.pp. 310,311,312,313,314,315,316,317,318
An autonomous decentralized community overly network division and integration technology for achieving timelinessFull-text access may be available. Sign in or learn about subscription options.pp. 321,322,323,324,325,326,327
Autonomous cooperation technology for real-time marketing with high accuracy in autonomous decentralized community systemFull-text access may be available. Sign in or learn about subscription options.pp. 328,329,330,331,332,333,334,335
Service search technology in autonomous decentralized community system for timelinessFull-text access may be available. Sign in or learn about subscription options.pp. 336,337,338,339,340,341,342,343
Decentral control of a robot-swarmFull-text access may be available. Sign in or learn about subscription options.pp. 347,348,349,350,351
Research of double loop optical fiber self-cicatrized network based on Neuron3150Full-text access may be available. Sign in or learn about subscription options.pp. 352,353,354,355
v-SVM for transient stability assessment in power systemsFull-text access may be available. Sign in or learn about subscription options.pp. 356,357,358,359,360,361,362,363
An adaptive key-frame reference picture selection algorithm for video transmission via error prone networksFull-text access may be available. Sign in or learn about subscription options.pp. 367,368,369,370,371
Remote sensing image data fusion based on local deviation of wavelet packet transformFull-text access may be available. Sign in or learn about subscription options.pp. 372,373,374,375,376,377
Content-based color image retrieval via lifting schemeFull-text access may be available. Sign in or learn about subscription options.pp. 378,379,380,381,382,383
High-level representations of temporary traffic states using Hasse graph and temporal change map under a grid-based site modelFull-text access may be available. Sign in or learn about subscription options.pp. 387,388,389,390,391
An adaptive fuzzy logic controller with self-tuning scaling factors based on neural networksFull-text access may be available. Sign in or learn about subscription options.pp. 392,393,394,395,396
Creation, deployment, and execution of rule-based servicesFull-text access may be available. Sign in or learn about subscription options.pp. 397,398,399,400,401,402,403,404
ADPE: agent-based decentralized process engineFull-text access may be available. Sign in or learn about subscription options.pp. 405,406,407,408,409,410,411,412
The future of high-speed trainFreely available from IEEE.pp. 415-418
AOA: an autonomous-oriented architectureFull-text access may be available. Sign in or learn about subscription options.pp. 421,422,423,424,425,426
Adaptive algorithms for finding replacement services in autonomic distributed business processesFull-text access may be available. Sign in or learn about subscription options.pp. 427,428,429,430,431,432,433,434
Lightweight home network middleware supporting mobility managementFull-text access may be available. Sign in or learn about subscription options.pp. 435,436,437,438,439,440,441,442
Securing instance-level interactions in Web servicesFull-text access may be available. Sign in or learn about subscription options.pp. 443,444,445,446,447,448,449,450
Towards I-centric business communication toolsFull-text access may be available. Sign in or learn about subscription options.pp. 453,454,455,456,457,458,459,460
Situational reasoning - a practical OWL use caseFull-text access may be available. Sign in or learn about subscription options.pp. 461,462,463,464,465,466,467,468
Adaptivity for multimodal user interfaces in mobile situationsFull-text access may be available. Sign in or learn about subscription options.pp. 469,470,471,472
Personalised applications and services for a mobile userFull-text access may be available. Sign in or learn about subscription options.pp. 473,474,475,476,477,478,479
The Yaoyorozu project designing ubiquitous information society in 2010Full-text access may be available. Sign in or learn about subscription options.pp. 480,481,482,483,484,485
Efficient switch schedulers with random decisionsFull-text access may be available. Sign in or learn about subscription options.pp. 489,490,491,492,493,494
Learning desirable actions in two-player two-action gamesFull-text access may be available. Sign in or learn about subscription options.pp. 495,496,497,498,499,500
Application of support vector machines to nonlinear system identificationFull-text access may be available. Sign in or learn about subscription options.pp. 501,502,503,504,505,506,507
Fast algorithm for line rasterization by using slope 1Full-text access may be available. Sign in or learn about subscription options.pp. 508,509,510,511,512
A novel forward search strategy to automatically harmonize intensification and diversification in tabu searchFull-text access may be available. Sign in or learn about subscription options.pp. 513,514,515,516,517,518,519
On fast switching related to PFTS nodesFull-text access may be available. Sign in or learn about subscription options.pp. 520,521,522,523,524
Distributed grid resource registry meta-service: design and implementationFull-text access may be available. Sign in or learn about subscription options.pp. 531,532,533,534,535
A study on primary path switching strategy of SCTPFull-text access may be available. Sign in or learn about subscription options.pp. 536,537,538,539,540,541
A QoS-enable failure detection framework for J2EE application serverFull-text access may be available. Sign in or learn about subscription options.pp. 542,543,544,545,546
An immune-based model for Web data miningFull-text access may be available. Sign in or learn about subscription options.pp. 547,548,549,550,551
Web services-based collaborative and cooperative computingFull-text access may be available. Sign in or learn about subscription options.pp. 552,553,554,555,556
Re-integrating of architecture/component oriented general model of sub-domainFull-text access may be available. Sign in or learn about subscription options.pp. 557,558,559,560,561
A multiagent-based path rerouting method in MPLS networksFull-text access may be available. Sign in or learn about subscription options.pp. 562,563,564,565
Lattice model based on a new information security functionFull-text access may be available. Sign in or learn about subscription options.pp. 566,567,568,569
The design and analysis of an electronic evidence and non-repudiation protocolFull-text access may be available. Sign in or learn about subscription options.pp. 570,571,572,573
An empirical study on customers' acceptance of Web storesFull-text access may be available. Sign in or learn about subscription options.pp. 574,575,576,577,578,579
Anomaly detection of privileged program based on fuzzy segmentsFull-text access may be available. Sign in or learn about subscription options.pp. 580,581,582,583,584
Blending Web services and agents for mobile usersFull-text access may be available. Sign in or learn about subscription options.pp. 585,586,587,588,589,590
HADS-humanized autonomous decentralized systemsFull-text access may be available. Sign in or learn about subscription options.pp. 593,594,595,596,597,598
The revolution of train control system in JapanFull-text access may be available. Sign in or learn about subscription options.pp. 599,600,601,602,603,604,605,606
Autonomous decentralized organization model and coordination control of SoftMan CrowdFull-text access may be available. Sign in or learn about subscription options.pp. 607,608,609,610,611
Intelligent autonomous decentralized enterprise resource planning (IADERP)Full-text access may be available. Sign in or learn about subscription options.pp. 612,613,614,615
Research on the architecture of ERP system based on intelligent autonomous decentralized systemFull-text access may be available. Sign in or learn about subscription options.pp. 616,617,618,619
IIPP and CIT based intelligent autonomous QA systemFull-text access may be available. Sign in or learn about subscription options.pp. 620,621,622,623
Autonomous node reallocation for achieving load balance under changing users' preferenceFull-text access may be available. Sign in or learn about subscription options.pp. 624,625,626,627,628,629
Digital gas fields produce real time scheduling based on intelligent autonomous decentralized systemFull-text access may be available. Sign in or learn about subscription options.pp. 630,631,632,633,634,635
Study on enterprise application integrated model based on IADSFull-text access may be available. Sign in or learn about subscription options.pp. 636,637,638,639,640
The study on model and architecture of SoftMan group based on intelligent autonomous decentralized systemsFull-text access may be available. Sign in or learn about subscription options.pp. 641,642,643,644,645,646
An improved autonomous clustering scheme for highly mobile large ad hoc networksFull-text access may be available. Sign in or learn about subscription options.pp. 655,656,657,658,659,660
Achieving power-law placement in wireless sensor networksFull-text access may be available. Sign in or learn about subscription options.pp. 661,662,663,664,665,666
A dynamic index allocation scheme for peer-to-peer networksFull-text access may be available. Sign in or learn about subscription options.pp. 667,668,669,670,671,672
Ad hoc unidirectional routing protocol based on relay control of route requestsFull-text access may be available. Sign in or learn about subscription options.pp. 675,676,677,678,679,680
Showing 100 out of 109