


default search action
IRI 2007: Las Vegas, NV, USA
- Proceedings of the IEEE International Conference on Information Reuse and Integration, IRI 2007, 13-15 August 2007, Las Vegas, Nevada, USA. IEEE Systems, Man, and Cybernetics Society 2007

Heuristic Optimization and Search I
- Masaya Yoshikawa, Hidekazu Terai:

Architecture for high-speed Ant Colony Optimization. 1-5 - Xudong Lu, Jiancheng Wan, Jinkui Hou:

A Model Based Heuristic Design of Web User Interface. 6-11 - Herby Dallard, Sarah S. Lam, Sadan Kulturel-Konak:

Solving the Orienteering Problem Using Attractive and Repulsive Particle Swarm Optimization. 12-17 - Olivier Fourdrinoy, Éric Grégoire, Bertrand Mazure, Lakhdar Sais:

Reducing hard SAT instances to polynomial ones. 18-23
Component-Based Design and Reuse I
- Ryan Gerard, Robert R. Downs

, James J. Marshall, Robert E. Wolfe
:
The Software Reuse Working Group: A Case Study in Fostering Reuse. 24-29 - Semia Sonia Selmi, Naoufel Kraïem, Henda Hajjami Ben Ghézala

:
Toward Web oriented Situational Methods. 30-35 - Valery Sklyarov

, Iouliia Skliarova
:
Reuse Technique in Hardware Design. 36-41 - Qianhui Liang, Stuart Harvey Rubin:

Randomization in Searching for Composites of Software Components. 42-48
Information Reuse, Integration and Sharing in Collaborative Environments I
- Jérôme Kunegis, Sahin Albayrak:

Adapting Ratings in Memory-Based Collaborative Filtering using Linear Regression. 49-54 - Ming Wang, Shu Zhang:

Information Reuse and Integration In Object-Relational Database Development. 55-60 - Geoffrey C. Fox, Ahmet Fatih Mustacoglu

, Ahmet E. Topcu
, Aurel Cami:
SRG: A Digital Document-Enhanced Service Oriented Research Grid. 61-66 - Wang Xiaoqing, Guo Yong, Zheng Yanxing, Meilin Shi:

Non-Linear Precomputation For Optimal Data sources and Paths Searching. 67-72
Information Security and Privacy I
- Napoleon Paxton, Gail-Joon Ahn

, Bill Chu:
Towards Practical Framework for Collecting and Analyzing Network-Centric Attacks. 73-78 - Jiang Bian, Remzi Seker, Umit Topaloglu:

Off-the-Record Instant Messaging for Group Conversation. 79-84 - Huaqiang Wei, Jim Alves-Foss, Du Zhang, Deborah A. Frincke:

Rationality Validation of a Layered Decision Model for Network Defense. 85-90 - Rafiy Saleh, Dawn N. Jutla, Peter Bodorik

:
Management of Users' Privacy Preferences in Context. 91-97
Heuristic Optimization and Search II
- Radomír Perzina

:
Solving Multicriteria University Timetabling Problem by a Self-adaptive Genetic Algorithm with Minimal Perturbation. 98-103 - Kevin Gary, Bradley Szabo, Lavanya Vijayan, Braden Chapman, Jayavarshini Radhakrishnan, Aishwarya Sivaraman:

JMaPSS: Spreading Activation Search for the Semantic Web. 104-109 - Chang-Tien Lu

, Manu Shukla, Siri H. Subramanya, Yamin Wu:
Performance Evaluation of Desktop Search Engines. 110-115 - Hui Zhu, Xiaodong Zhuang, XiangZhong Meng:

Emergent Behavior of Ant Colony System in Digital Images for Acquiring Edge Information. 116-121
Component-Based Design and Reuse II
- Mohamed Taleb, Ahmed Seffah, Alain Abran

:
Patterns-Oriented Design Applied to Cross-Platform Web-based Interactive Systems. 122-127 - Jiancheng Wan, Xudong Lu, Lei Lu:

A Model of User Interface Design and Its Code Generation. 128-133 - Alexandre Alvaro, Eduardo Santana de Almeida, Silvio Romero de Lemos Meira:

Component Quality Assurance: Towards a Software Component Certification Process. 134-139 - Maryoly Ortega, Anna Grimán, María A. Pérez, Luis Eduardo Mendoza:

Reuse Strategy based on Quality Certification of Reusable Components. 140-145 - Mordechai Geva, Yair Wiseman:

Distributed Shared Memory Integration. 146-151
Information Reuse, Integration and Sharing in Collaborative Environments II
- Yuchul Jung

, Yoonjung Choi, Hugun Park, Wookhyun Shin, Sung-Hyon Myaeng:
Integrating Robot Task Scripts with a Cognitive Architecture for Cognitive Human-Robot Interactions. 152-157 - Siu Man Lui, Calvin Chun Yu:

Information Reuse among Government Websites in Asian Countries. 158-163 - Yi-Ting Liu, Hengrui Zhang, Tai-Wei Chen, Wei-Guang Teng:

Extending Web Search for Online Plagiarism Detection. 164-169 - Khalid Latif

, Edgar R. Weippl, A Min Tjoa
:
Question Driven Semantics Interpretation for Collaborative Knowledge Engineering and Ontology Reuse. 170-176
Information Security and Privacy II
- Olga Vybornova

, Benoît Macq:
Natural Language Watermarking and Robust Hashing Based on Presuppositional Analysis. 177-182 - Lu'ay A. Wahsheh, Jim Alves-Foss:

Using Policy Enforcement Graphs in a Separation-Based High Assurance Architecture. 183-189 - Hongli Luo, Mei-Ling Shyu:

Defense against Bandwidth Attacks with Traffic Resource Management. 190-195 - Yue Zhang, James B. D. Joshi:

ARBAC07: A Role-based Administration Model for RBAC with Hybrid Hierarchy. 196-202
Natural Language Understanding
- Min-Yuh Day

, Chorng-Shyong Ong, Wen-Lian Hsu:
Question Classification in English-Chinese Cross-Language Question Answering: An Integrated Genetic Algorithm and Machine Learning Approach. 203-208 - Alpa Jain, Silviu Cucerzan, Saliha Azzam:

Acronym-Expansion Recognition and Ranking on the Web. 209-214 - Chenda Nou, Wataru Kameyama:

Hybrid Approach for Khmer Unknown Word POS Guessing. 215-220
Knowledge Management and E-Government
- Alicia Iriberri, Gondy Leroy:

Natural Language Processing and e-Government: Extracting Reusable Crime Report Information. 221-226 - Jirapond Tadrat, Veera Boonjing, Puntip Pattaraintakorn:

A Framework for using Rough Sets and Formal Concept Analysis in Case Based Reasoning. 227-232 - Ying-Hsun Hung, Seng-cho Timothy Chou, Gwo-Hshiung Tzeng:

Knowledge Management Strategic Planning. 233-238
Manufacturing Systems & Business Process Engineering
- Chaoying Ma, Liz Bacon, Miltos Petridis, Gill Windall:

A Design Pattern for Integration of Business Process Management Systems. 239-244 - Madjid Fathi, Alexander Holland, Michael Abramovici, Manuel Neubach:

Advanced Condition Monitoring Services in Product Lifecycle Management. 245-250 - Thaddeus T. Shannon

, James McNames:
ICA Based Disturbance Specific Control Charts. 251-256
AI & Decision Support System
- Mehdi Sagheb-Tehrani:

Expert Systems Development: Towards Transparency of Design Process. 257-260 - Marcos Evandro Cintra

, Heloisa de Arruda Camargo
:
Fuzzy Rules Generation using Genetic Algorithms with Self-adaptive Selection. 261-266 - Massimiliano Albanese

, Andrea Pugliese
, V. S. Subrahmanian, Octavian Udrea:
MAGIC: A Multi-Activity Graph Index for Activity Detection. 267-272 - Hsin-Hsien Lee, Wei-Guang Teng:

Incorporating Multi-Criteria Ratings in Recommendation Systems. 273-278
Knowledge Acquisition and Management
- Ahmad El Sayed, Hakim Hacid, Djamel A. Zighed:

A New Context-Aware Measure for Semantic Distance Using a Taxonomy and a Text Corpus. 279-284 - Éric Grégoire:

Knowledge Refinement Through Revision. 285-290 - Alexander Korth, Till Plumbaum:

A Framework for Ubiquitous User Modeling. 291-297 - Sreelatha Vakil, Ching-Cheng Lee:

Highlight and Personal Annotation for Fast and Efficient Access to Web Page Content. 298-303
Automation, Integration and Reuse across Various Applications
- Jyh-Da Wei

, Tai-Yu Chen, Tsai-Yeh Tung, D. T. Lee:
A Visualization Tool to Construct the Reference-Based Relation Map for Group Knowledge of a Knowledge Portal. 304-310 - Jameela Al-Jaroodi, Nader Mohamed:

An Object-Oriented Approach for High Availability of Applications Integration. 311-316 - Cong Zhang, Amol Bakshi, Viktor K. Prasanna:

ModelML: a Markup Language for Automatic Model Synthesis. 317-322 - Ralf Wagner, Bernhard Mitschang:

A Methodology and Guide for Effective Reuse in Integration Architectures for Enterprise Applications. 323-328
Data Mining and Knowledge Discovery I
- Yu He, Xindong Wu, Xingquan Zhu

, Abdullah N. Arslan:
Mining Frequent Patterns with Wildcards from Biological Sequences. 329-334 - Martin Mehlitz, Christian Bauckhage

, Sahin Albayrak:
A Fast, Feature-based Cluster Algorithm for Information Retrieval. 335-341 - Sang Wan Lee

, Yong-Soo Kim, Zeungnam Bien:
Agglomerative Fuzzy Clustering based on Bayesian Interpretation. 342-347 - David G. Underhill, Luke McDowell, David J. Marchette, Jeffrey L. Solka:

Enhancing Text Analysis via Dimensionality Reduction. 348-353
Multimedia Systems
- Jun-Hyeong Do

, Zeungnam Bien:
Effective Cue Integration for Fast and Robust Face Detection in Videos. 354-359 - Qiming Luo, Taghi M. Khoshgoftaar:

An Empirical Study on Estimating Motions in Video Stabilization. 360-366 - Roumen Kountchev, Mariofanna G. Milanova, Vladimir Todorov, Roumiana Kountcheva:

Enhancement of the Visual Quality of Scanned Documents. 367-372 - Na Zhao, Shu-Ching Chen, Stuart Harvey Rubin:

Automated Multimedia Systems Training Using Association Rule Mining. 373-378
Service-Oriented Architecture
- Buhwan Jeong, Hyunbo Cho, Boonserm Kulvatunyou, Albert T. Jones:

A Multi-Criteria Web Services Composition Problem. 379-384 - Tiejian Luo, Jinliang Song, Su Chen, Yuzhu Liu, Yanxiang Xu, Cheng Du, Wei Liu:

A Services Oriented Framework for Integrated and Customizable Collaborative Environment. 385-393 - Xiaolin Hu, Bernard P. Zeigler, Moon Ho Hwang, Eddie Mak:

DEVS Systems-Theory Framework for Reusable Testing of I/O Behaviors in Service Oriented Architectures. 394-399 - Barry Demchak, Claudiu Farcas, Emilia Farcas

, Ingolf H. Krüger:
The Treasure Map for Rich Services. 400-405
Biomedical & Healthcare Systems
- Ying Jin, Matthew L. Tescher, Huaqin Xu:

Middleware Support to the Specification and Execution of Active Rules for Biological Database Constraint Management. 406-411 - Richard Tzong-Han Tsai

, Hong-Jie Dai, Hsi-Chuan Hung, Ryan T. K. Lin, Wen-Chi Chou
, Ying-Shan Su, Min-Yuh Day
, Wen-Lian Hsu:
BESearch: A Supervised Learning Approach to Search for Molecular Event Participants. 412-417 - Chris Mattmann, Vito Perrone, Sean C. Kelly, Daniel J. Crichton, Anthony Finkelstein, Nenad Medvidovic:

A Reference Framework for Requirements and Architecture in Biomedical Grid Systems. 418-422 - Wei-bang Chen, Chengcui Zhang:

MIA: An Effective and Robust Microarray Image Analysis System with Unstructured Information Management Architecture. 423-428
Data Mining and Knowledge Discovery II
- Sagi Dalyot

, Yerach Doytsher:
A New Concept for Dynamic Handling of Localized Georegistration Parameters between Two Geospatial Datasets. 429-435 - Roumen Kountchev

, Stuart Harvey Rubin, Mariofanna G. Milanova
, Vladimir Todorov:
Image Multi-Layer Search Based on Spectrum Pyramid. 436-440 - Michael A. El-Shayeb, Samhaa R. El-Beltagy, Ahmed Rafea

:
Comparative Analysis of Different Text Segmentation Algorithms on Arabic News Stories. 441-446 - Mahmood Hossain, Susan Bridges, Yong Wang, Julia E. Hodges:

Extracting Partitional Clusters from Heterogeneous Datasets using Mutual Entropy. 447-454
Reuse in Software Engineering
- Matthew Dinmore

, Anthony F. Norcio:
Literacy for the Masses: Integrating Software and Knowledge Reuse for End-User Developers Through Literate Programming. 455-460 - Marcilio Silva Oliveira, Eduardo Machado Gonçalves, Kleber Rogerio Bacili:

Automatic Identification of Reusable Software Development Assets: Methodology and Tool. 461-466 - Abdelkrim Amirat, Mourad Oussalah, Tahar Khammaci:

Towards an Approach for Building Reliable Architectures. 467-472
Soft Computing
- Chui Young Yoon, Keon-Myung Lee

:
An End-User Evaluation System based on Computing Competency and Complex Indicators. 480-485 - Stefan Berlik

, Madjid Fathi:
Differences of Structured Documents - Improving their Quality. 486-491 - Shu Lan, He Xiangzhi:

Rough Set Model with Double Universe of Discourse. 492-495 - Dong Qiu

, Lan Shu:
Rough Mappings. 496-501
Autonomous Agents in Web-based Systems + Sensory and Information Fusion
- Longzhuang Li, Yonghuai Liu, Abel Obregon, Matt Weatherston:

Visual Segmentation-Based Data Record Extraction from Web Documents. 502-507 - Nora Houari, Behrouz H. Far:

Agent-based Adaptive Information Systems: Integration of Operational Roles and Performance Indicators. 508-513 - Behrooz Sadeghi, Behzad Moshiri

:
Second-order EKF and Unscented Kalman Filter Fusion for Tracking Maneuvering Targets. 514-519 - Javad Rezaie, Behzad Moshiri

, Amir Rafati
, Babak Nadjar Araabi
:
A Modified LOLIMOT Algorithm for Nonlinear Estimation Fusion. 520-525 - Saïd Kharbouche, Michel Plu:

Combination of Face detection, Face Recognition and Gender Recognition using Evidence Theory. 526-531
Data Mining and Knowledge Discovery III
- Stephen Shervais, Martin Zwick:

Using Reconstructability Analysis for Input Variable Reduction: A Business Example. 532-537 - Stephen Ivie, Burdette Pixton, Christophe G. Giraud-Carrier:

Metric-Based Data Mining Model for Genealogical Record Linkage. 538-543 - Carl G. Looney:

Fuzzy Data Mining in Higher Dimensions for Data Analysis. 544-549 - Sanguk Noh:

Autonomous Situation Awareness Through Threat Data Integration. 550-555
Fuzzy and Neural Systems
- Mohammad Fazle Azeem, Ahmad Banakar:

Recurrent Sigmoid-Wavelet Neurons for Forecasting of Dynamic Systems. 556-562 - Mohammad Fazle Azeem, Asim Baig:

Design and Fabrication of Basic Building Blocks For Analog Implementation of Programmable Fuzzy Logic Controller. 563-569 - Sun Wook Kim, Hee Yong Youn, Sung Jin Choi, Nag Bum Sung:

GAPS: The Genetic Algorithm-based Path Selection Scheme for MPLS Network. 570-575 - Hyo Cheol Ahn, Hee Yong Youn, Kyu Yeong Jeon, Kyu Seol Lee:

Dynamic Load Balancing for Large-scale Distributed System with Intelligent Fuzzy Controller. 576-581
Unifying Data Models (UML, XML, etc.) and Ontologies
- Paolo Giusto, Sri Kanajan, Claudio Pinello, Max Chiodo:

A Conceptual Data Model for the Architecture Exploration of Automotive Distributed Embedded Architectures. 582-587 - Eliisa Jauhiainen, Annoen Hkaranta:

Aspects on XML Document Content Reuse in Organizaotins. 588-593 - Rajaa Saidi

, Mounia Fredj, Salma Mouline
, Agnès Front, Dominique Rieu:
Towards Managing Variability Across Business Component Development. 594-599 - Taher Naser, Keivan Kianmehr, Reda Alhajj, Mick J. Ridley:

Transforming Object-Oriented Databases into XML. 600-605
Structured/ Semi-structured Data
- Khaue Rezende Rodrigues, Ronaldo dos Santos Mello:

DIInCX: An Approach to Discovery of Implicit Integrity Constraints from XML Data. 606-611 - Erik Wilde:

Declarative Web 2.0. 612-617 - Moad Maghaydah, Mehmet A. Orgun

:
An Adaptive Labeling Method for Dynamic XML Documents. 618-623 - Atsuhiro Takasu, Kenro Aihara, Taizo Yamada:

A Smoothing Method for a Statistical String Similarity. 624-629
Software Engineering with Computational Intelligence & Machine Learning
- Jason Van Hulse, Taghi M. Khoshgoftaar:

Incomplete-Case Nearest Neighbor Imputation in Software Measurement Data. 630-637 - Wei Qu, Michael Jiang, Yuanyuan Jia:

Software Reuse Detection Using an Integrated Space-Logic Domain Model. 638-643 - Yi Liu, Taghi M. Khoshgoftaar, Jenq-Foung JF Yao:

Building a Novel GP-Based Software Quality Classifier Using Multiple Validation Datasets. 644-650 - Chris Seiffert, Taghi M. Khoshgoftaar, Jason Van Hulse, Andres Folleco:

An Empirical Study of the Classification Performance of Learners on Imbalanced and Noisy Software Quality Data. 651-658 - Zhan Li, Marek Z. Reformat

:
A practical method for the software fault-prediction. 659-666 - Daniel Rodríguez, Roberto Ruiz

, Juan Jose Cuadrado-Gallego, Jesús S. Aguilar-Ruiz
:
Detecting Fault Modules Applying Feature Selection to Classifiers. 667-672
Stable and Adaptable Software Architectures
- M. E. Fayad:

Performance Evaluation Engine. 673-678 - M. E. Fayad:

The Life cycle Pattern. 679-684 - M. E. Fayad:

The Accessibility Pattern. 685-690 - Rami Bahsoon:

Defining Dependable Dynamic Data-Driven Software Architectures. 691-694 - Anthony Jones, Dan Cornford

:
Defining the Fluid Framework. 695-700
Software Stability at Work
- M. E. Fayad, Somenath Das:

The Visualization Stable Analysis Pattern. 701-706 - M. E. Fayad, Somenath Das:

The Classification Stable Analysis Pattern. 707-712 - Torsten Bergander, Yan Luo, A. Ben Hamza

:
Software Defects Prediction using Operating Characteristic Curves. 713-718 - Chia-Chu Chiang:

Software Stability in Software Reengineering. 719-723 - Panuchart Bunyakiati, Anthony Finkelstein, David S. Rosenblum:

The Certification of Software Tools with respect to Software Standards. 724-729 - Shasha Wu:

Implementation Method for Business Objects in Software Stability Modeling. 730-733

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














