callback( { "result":{ "query":":facetid:toc:\"db/conf/jcis/jcis2002.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"76.47" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"331", "@dc":"331", "@oc":"331", "@id":"43398633", "text":":facetid:toc:db/conf/jcis/jcis2002.bht" } }, "hits":{ "@total":"331", "@computed":"100", "@sent":"30", "@first":"0", "hit":[{ "@score":"1", "@id":"6293414", "info":{"authors":{"author":[{"@pid":"82/390","text":"Albert Akhriev"},{"@pid":"82/386","text":"Alexander Bonch-Osmolovsky"},{"@pid":"63/3192","text":"Alexander Prusakov"}]},"title":"Computation of Motion and Occlusion Relation of Objects from the Motion of Their Boundaries.","venue":"JCIS","pages":"789-792","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/jcis/AkhrievBP02","url":"https://dblp.org/rec/conf/jcis/AkhrievBP02"}, "url":"URL#6293414" }, { "@score":"1", "@id":"6293415", "info":{"authors":{"author":[{"@pid":"55/5867","text":"Buthainah Al-Kazemi"},{"@pid":"m/CKMohan","text":"Chilukuri K. Mohan"}]},"title":"Multi-phase Discrete Particle Swarm Optimization.","venue":"JCIS","pages":"622-625","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/jcis/Al-kazemiM02","url":"https://dblp.org/rec/conf/jcis/Al-kazemiM02"}, "url":"URL#6293415" }, { "@score":"1", "@id":"6293416", "info":{"authors":{"author":[{"@pid":"26/11078","text":"Mohd. Afshar Alam"},{"@pid":"44/5534","text":"Ahmad Sharfuddin"},{"@pid":"37/5852","text":"Ranjit Biswas"}]},"title":"On Intuitionistic Fuzzy Databases.","venue":"JCIS","pages":"92-96","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/jcis/AlamSB02","url":"https://dblp.org/rec/conf/jcis/AlamSB02"}, "url":"URL#6293416" }, { "@score":"1", "@id":"6293417", "info":{"authors":{"author":[{"@pid":"73/206","text":"Floortje Alkemade"},{"@pid":"l/JohannesALaPoutre","text":"Johannes A. La Poutré"}]},"title":"Boundedly Rational Agents Achieving Collusive Outcomes in the Cournot Game.","venue":"JCIS","pages":"1143-1146","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/jcis/AlkemadeP02","url":"https://dblp.org/rec/conf/jcis/AlkemadeP02"}, "url":"URL#6293417" }, { "@score":"1", "@id":"6293418", "info":{"authors":{"author":[{"@pid":"63/1542","text":"Fernando Álvarez"},{"@pid":"51/2418","text":"Néstor Carrasquero"},{"@pid":"97/2904","text":"Claudio Rocco"}]},"title":"Numerical Solution to a Stochastic Growth Model Based on Evolution of Radial Basis Networks.","venue":"JCIS","pages":"1089-1092","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/jcis/AlvarezCR02","url":"https://dblp.org/rec/conf/jcis/AlvarezCR02"}, "url":"URL#6293418" }, { "@score":"1", "@id":"6293419", "info":{"authors":{"author":[{"@pid":"90/6270","text":"Shin Ando"},{"@pid":"50/1656","text":"Erina Sakamoto"},{"@pid":"58/2239","text":"Hitoshi Iba"}]},"title":"Evolutionary Modeling and Inference by Genetic Network.","venue":"JCIS","pages":"1249-1256","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/jcis/AndoSI02","url":"https://dblp.org/rec/conf/jcis/AndoSI02"}, "url":"URL#6293419" }, { "@score":"1", "@id":"6293420", "info":{"authors":{"author":[{"@pid":"46/4512","text":"Carson M. Andorf"},{"@pid":"23/1962","text":"Drena Dobbs"},{"@pid":"h/VasantHonavar","text":"Vasant G. Honavar"}]},"title":"Discovering Protein Function Classification Rules from Reduced Alphabet Representations of Protein Sequences.","venue":"JCIS","pages":"1200-1206","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/jcis/AndorfDH02","url":"https://dblp.org/rec/conf/jcis/AndorfDH02"}, "url":"URL#6293420" }, { "@score":"1", "@id":"6293421", "info":{"authors":{"author":{"@pid":"19/160","text":"Ngamnij Arch-int"}},"title":"A Reference Architecture for Integrating Heterogeneous Information Sources using XML and Agent Model.","venue":"JCIS","pages":"235-239","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/jcis/Arch-int02","url":"https://dblp.org/rec/conf/jcis/Arch-int02"}, "url":"URL#6293421" }, { "@score":"1", "@id":"6293422", "info":{"authors":{"author":{"@pid":"98/4184","text":"Krassimir T. Atanassov"}},"title":"Open Problems in Intuitionistic Fuzzy Sets Theory.","venue":"JCIS","pages":"113-116","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/jcis/Atanassov02","url":"https://dblp.org/rec/conf/jcis/Atanassov02"}, "url":"URL#6293422" }, { "@score":"1", "@id":"6293423", "info":{"authors":{"author":[{"@pid":"17/2077","text":"Nicolas Audet"},{"@pid":"68/1564","text":"Toni Gravelle"},{"@pid":"62/5839","text":"Jing Yang"}]},"title":"Optimal Market Structure: Does One Shoe Fit All?","venue":"JCIS","pages":"1157-1161","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/jcis/AudetGY02","url":"https://dblp.org/rec/conf/jcis/AudetGY02"}, "url":"URL#6293423" }, { "@score":"1", "@id":"6293424", "info":{"authors":{"author":[{"@pid":"55/825","text":"Melanie Aurnhammer"},{"@pid":"t/KDTonnies","text":"Klaus D. Tönnies"},{"@pid":"72/5719","text":"Rafael Mayoral"}]},"title":"A Genetic Algorithm For Constrained Seismic Horizon Correlation.","venue":"JCIS","pages":"859-862","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/jcis/AurnhammerTM02","url":"https://dblp.org/rec/conf/jcis/AurnhammerTM02"}, "url":"URL#6293424" }, { "@score":"1", "@id":"6293425", "info":{"authors":{"author":[{"@pid":"64/958","text":"Kohei Awaya"},{"@pid":"17/1966","text":"Shoken Nasu"},{"@pid":"40/296","text":"Hiroshi Shigeno"},{"@pid":"12/1996","text":"Yutaka Matsushita"}]},"title":"Retrieval System for Patent Documents Using References.","venue":"JCIS","pages":"397-401","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/jcis/AwayaNSM02","url":"https://dblp.org/rec/conf/jcis/AwayaNSM02"}, "url":"URL#6293425" }, { "@score":"1", "@id":"6293426", "info":{"authors":{"author":{"@pid":"b/ThomasBack","text":"Thomas Bäck"}},"title":"Adaptive Business Intelligence Based on Evolution Strategies: Some Application Examples of Self-Adaptive Software.","venue":"JCIS","pages":"2-6","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/jcis/Back02","url":"https://dblp.org/rec/conf/jcis/Back02"}, "url":"URL#6293426" }, { "@score":"1", "@id":"6293427", "info":{"authors":{"author":[{"@pid":"b/ThomasBack","text":"Thomas Bäck"},{"@pid":"24/4169","text":"Daniel Vermeulen"},{"@pid":"e/AEEiben","text":"A. E. Eiben"}]},"title":"Effects of Tax and Evolution in an Artificial Society.","venue":"JCIS","pages":"1151-1156","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/jcis/BackVE02","url":"https://dblp.org/rec/conf/jcis/BackVE02"}, "url":"URL#6293427" }, { "@score":"1", "@id":"6293428", "info":{"authors":{"author":[{"@pid":"95/2637","text":"Kyungim Baek"},{"@pid":"78/5478","text":"Bruce A. Draper"},{"@pid":"97/1091","text":"J. Ross Beveridge"},{"@pid":"10/3859","text":"Kai She"}]},"title":"PCA vs. ICA: A Comparison on the FERET Data Set.","venue":"JCIS","pages":"824-827","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/jcis/BaekDBS02","url":"https://dblp.org/rec/conf/jcis/BaekDBS02"}, "url":"URL#6293428" }, { "@score":"1", "@id":"6293429", "info":{"authors":{"author":[{"@pid":"49/269","text":"Hyunki Baik"},{"@pid":"24/346","text":"Myong-Soon Park"}]},"title":"FRD-FPRED: A Novel Re-Decode Based Error Compensation Method Using Fast Re-Decoding and Fast Prediction Algorithm.","venue":"JCIS","pages":"1013-1016","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/jcis/BaikP02","url":"https://dblp.org/rec/conf/jcis/BaikP02"}, "url":"URL#6293429" }, { "@score":"1", "@id":"6293430", "info":{"authors":{"author":[{"@pid":"37/1638","text":"J. Balasubramaniam 0001"},{"@pid":"95/3670","text":"C. Jagan Mohan Rao"}]},"title":"R-Implication Operators And Rule Detection in Mamdani-Type Fuzzy Systems.","venue":"JCIS","pages":"82-84","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/jcis/BalasubramaniamR02","url":"https://dblp.org/rec/conf/jcis/BalasubramaniamR02"}, "url":"URL#6293430" }, { "@score":"1", "@id":"6293431", "info":{"authors":{"author":{"@pid":"19/4905","text":"Joseph M. Barone"}},"title":"Representative Fuzzy Points From Colimits.","venue":"JCIS","pages":"56-59","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/jcis/Barone02","url":"https://dblp.org/rec/conf/jcis/Barone02"}, "url":"URL#6293431" }, { "@score":"1", "@id":"6293432", "info":{"authors":{"author":{"@pid":"56/5942","text":"Donald F. Beal"}},"title":"TD (mu): A Modificaiton of TD (lambda) That Enables a Program to Learn Weights for Good Play Even if It Observes Only Bad Play.","venue":"JCIS","pages":"473-476","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/jcis/Beal02","url":"https://dblp.org/rec/conf/jcis/Beal02"}, "url":"URL#6293432" }, { "@score":"1", "@id":"6293433", "info":{"authors":{"author":[{"@pid":"b/JABecerra","text":"José Antonio Becerra"},{"@pid":"56/1998","text":"José Santos Reyes"},{"@pid":"81/1902","text":"Richard J. Duro"}]},"title":"MA vs. GA in Low Population Evolutionary Processes with Mostly Flat Fitness Landscapes.","venue":"JCIS","pages":"626-630","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/jcis/BecerraRD02","url":"https://dblp.org/rec/conf/jcis/BecerraRD02"}, "url":"URL#6293433" }, { "@score":"1", "@id":"6293434", "info":{"authors":{"author":[{"@pid":"43/1029","text":"Mirza Mohd. Sufyan Beg"},{"@pid":"49/2239","text":"Nesar Ahmad"}]},"title":"Genetic Algorithm Based Rank Aggregation for the Web.","venue":"JCIS","pages":"329-333","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/jcis/BegA02","url":"https://dblp.org/rec/conf/jcis/BegA02"}, "url":"URL#6293434" }, { "@score":"1", "@id":"6293435", "info":{"authors":{"author":[{"@pid":"43/1029","text":"Mirza Mohd. Sufyan Beg"},{"@pid":"49/2239","text":"Nesar Ahmad"}]},"title":"Web Search by Feedback Learning.","venue":"JCIS","pages":"334-338","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/jcis/BegA02a","url":"https://dblp.org/rec/conf/jcis/BegA02a"}, "url":"URL#6293435" }, { "@score":"1", "@id":"6293436", "info":{"authors":{"author":[{"@pid":"43/1029","text":"Mirza Mohd. Sufyan Beg"},{"@pid":"21/3666","text":"C. P. Ravikumar"}]},"title":"Measuring the Quality of Web Search Results.","venue":"JCIS","pages":"324-328","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/jcis/BegR02","url":"https://dblp.org/rec/conf/jcis/BegR02"}, "url":"URL#6293436" }, { "@score":"1", "@id":"6293437", "info":{"authors":{"author":[{"@pid":"10/1256","text":"Hamid Beigy"},{"@pid":"61/4408","text":"Mohammad Reza Meybodi"}]},"title":"A New Distributed Learning Automata Based Algorithm For Solving Stochastic Shortest Path Problem.","venue":"JCIS","pages":"339-343","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/jcis/BeigyM02","url":"https://dblp.org/rec/conf/jcis/BeigyM02"}, "url":"URL#6293437" }, { "@score":"1", "@id":"6293438", "info":{"authors":{"author":[{"@pid":"10/1256","text":"Hamid Beigy"},{"@pid":"61/4408","text":"Mohammad Reza Meybodi"}]},"title":"A Learning Automata Based Graph Isomorphism Algorithm.","venue":"JCIS","pages":"344-348","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/jcis/BeigyM02a","url":"https://dblp.org/rec/conf/jcis/BeigyM02a"}, "url":"URL#6293438" }, { "@score":"1", "@id":"6293439", "info":{"authors":{"author":[{"@pid":"15/4042","text":"Francisco Bellas"},{"@pid":"b/JABecerra","text":"José Antonio Becerra"},{"@pid":"81/1902","text":"Richard J. Duro"}]},"title":"Sampled Fitness Functions in Complex Problems (Part 1): Influence of Short Term Memory Size.","venue":"JCIS","pages":"631-634","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/jcis/BellasBD02","url":"https://dblp.org/rec/conf/jcis/BellasBD02"}, "url":"URL#6293439" }, { "@score":"1", "@id":"6293440", "info":{"authors":{"author":[{"@pid":"15/4042","text":"Francisco Bellas"},{"@pid":"b/JABecerra","text":"José Antonio Becerra"},{"@pid":"81/1902","text":"Richard J. Duro"}]},"title":"Sampled Fitness Functions in Complex Problems (Part II): Critical Points and Constructing Short Term Memories.","venue":"JCIS","pages":"635-638","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/jcis/BellasBD02a","url":"https://dblp.org/rec/conf/jcis/BellasBD02a"}, "url":"URL#6293440" }, { "@score":"1", "@id":"6293441", "info":{"authors":{"author":[{"@pid":"b/RandallBerry","text":"Randall A. Berry"},{"@pid":"m/EytanModiano","text":"Eytan H. Modiano"}]},"title":"Switching and Traffic Grooming in WDM Networks.","venue":"JCIS","pages":"1340-1343","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/jcis/BerryM02","url":"https://dblp.org/rec/conf/jcis/BerryM02"}, "url":"URL#6293441" }, { "@score":"1", "@id":"6293442", "info":{"authors":{"author":[{"@pid":"76/1768","text":"Kiran R. Bhutani"},{"@pid":"71/2824","text":"Bilal Khan"}]},"title":"Minimizing Communication Costs in Hierarchical Multi-Agent Systems.","venue":"JCIS","pages":"1435-1442","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/jcis/BhutaniK02","url":"https://dblp.org/rec/conf/jcis/BhutaniK02"}, "url":"URL#6293442" }, { "@score":"1", "@id":"6293443", "info":{"authors":{"author":[{"@pid":"75/5386","text":"William Bialek"},{"@pid":"14/3336","text":"Jonathan Miller"}]},"title":"Estimating Entropy.","venue":"JCIS","pages":"1281-1282","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/jcis/BialekM02","url":"https://dblp.org/rec/conf/jcis/BialekM02"}, "url":"URL#6293443" } ] } } } )