


default search action
9th SNPD 2008: Phuket, Thailand
- Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2008, In conjunction with Second International Workshop on Advanced Internet Technology and Applications, August 6-8, 2008, Phuket, Thailand. IEEE Computer Society 2008, ISBN 978-0-7695-3263-9

AITA Workshop Track
- Zonghua Liu, Guangqing Liu, Byungwook Lee:

An Efficient Key Distribution Method Applying to OMA DRM 2.0 with Device Identifier. 3-7 - Byungsung Lee, Junchul Chun, Peom Park:

Classification of Facial Expression Using SVM for Emotion Care Service System. 8-12 - Angela Song-Ie Noh, Woong Jae Lee, Jin Young Ye:

Comparison of the Mechanisms of the Zigbee's Indoor Localization Algorithm. 13-18 - Pauline Kongsuwan, Sangmun Shin, Myeonggil Choi:

Managing Quality Level for Developing Information Security System Adopting QFD. 19-24 - Kwon-Su Jeon, Jae-Woo Lee, Yung-Hwan Byun:

Multidisciplinary Design Approach Using Repetitive Response Surface Enhancement and Global Optimization. 25-28 - Steven P. Sweeney, Sehwan Yoo, Albert Chi, Frank Lin, Taikyeong Jeong, Sengphil Hong, Sam Fernald:

Neural Net Water Level Trend Prediction and Dynamic Water Level Sampling Frequency. 29-37
Algorithms Track
- Xiuqin Wang, Guangsheng Ma, Hao Wang:

A Novel Method for All Solutions SAT Problem. 41-45 - Lyamine Bouhafs, Amir Hajjam, Abderrafiaa Koukam

:
A Tabu Search and Ant Colony System Approach for the Capacitated Location-Routing Problem. 46-50 - Ke Liang, Xingshe Zhou, Kailong Zhang, Ruiqing Sheng:

An Adaptive Performance Management Method for Failure Detection. 51-56 - Mohamed Ali Feki, Sang Wan Lee

, Z. Zenn Bien, Mounir Mokhtari:
Combined Fuzzy State Q-learning Algorithm to Predict Context Aware User Activity under Uncertainty in Assistive Environment. 57-62 - Hakun Lee, Keiichi Kaneko

:
New Approaches for Software Watermarking by Register Allocation. 63-68 - Kiyoshi Sawada:

Placing a Liaison between Two Members of the Same Level in an Organization Structure of a Complete Binary Tree. 69-72 - Lei Zhang, Shixiong Xia, Zhanguo Xia, Yong Zhou:

Study on Ontology Partition Based on Ant Colony Algorithm. 73-78 - Geir Agnarsson, Raymond Greenlaw, Sanpawat Kantabutra

:
The Complexity of the Evolution of Graph Labelings. 79-84 - Sanpawat Kantabutra

, Pattama Longani:
The Complexity of the Grid Wireless Mobility Model. 85-90
Artificial Intelligence Track
- Yu-hua Guo, Ning Jing, Jun Li, Jun Wang:

A Comparison of Iterative Repair Strategies for Earth Observing Satellites Imaging Scheduling. 93-98 - Sarmad Sadik, M. Alade Rahman, Arshad Ali

, Hafiz Farooq Ahmad
, Hiroki Suguri:
A Formal Approach for Design of Agent Based Earthquake Management System (EMS). 99-104 - Jun Wu, Yo Seung Kim, Chi-Hwa Song, Won Don Lee:

A New Classifier to Deal with Incomplete Data. 105-110 - Guoxing Zhao, Jixin Ma

, Fuxing Shen, Miltos Petridis:
A Sound and Complete Reified Temporal Logic. 111-116 - Bin Zhang, Jun Yan, Wei Zhang:

Application of Multi-layer Feed-forward Neural Network in Fault Diagnosis Based on FBP Algorithm. 117-120 - Tshering, Somjit Arch-int:

Clustering ICT Indicators of Bhutan using Two Level HSOM Algorithm. 121-127 - Khairulmizam Samsudin

, Faisul Arif Ahmad
, Syamsiah Mashohor
, Norfadzilah Mohd Latif:
Comparison of Direct and Incremental Genetic Algorithm for Optimization of Ordinal Fuzzy Controllers. 128-134 - Takashi Mitsuishi, Takanori Terashima, Toshimichi Homma, Yasunari Shidama

:
Lipschitz Continuity of Approximate Reasoning. 135-140 - Xiao-shan Jin, Jun Li, Ning Jing:

On Relaxing and Steady State Genetic Methods for Satellite Imaging Scheduling. 141-146 - Fengyi Lin, Deron Liang, Shih-Jung Chiu:

The Study of a Financial Crisis Prediction Model based on XBRL. 147-153 - Zahra Abbasi, Mohammad Ali Abbasi:

Reinforcement Distribution in a Team of Cooperative Q-learning Agents. 154-160
Audio and Video Encoder/Decoder Technology Track
- Vu Thi Lan Huong, Byung-Jae Min, Dong-Chul Park, Dong-Min Woo:

A New Vocoder based on AMR 7.4kbit/s Mode in Speaker Dependent Coding System. 163-167
Collaborative Computing Track
- Rauf Malick, Usama Khanzada, Athar Abbas, Waheed Iqbal, Kamran Azim

:
AINAN: Collaborative Application for Protein Visualization & Analyses. 171-175
Communication Systems and Networks Track
- Chusit Pradabpet, K. Eupree, Sorawat Chivapreecha, Kobchai Dejhan:

A New PAPR Reduction Technique for OFDM-WLAN in 802.11a Systems. 179-184 - Jiazheng Wang, Xiuhua Fu:

A Two-Dimensionality Model for Providing End-to-End QoS CAC. 185-189 - Maryam Amiripour, Hamid Abachi:

Analytical Modeling of Task Scheduling for Master-Slave Super Hypercube Architecture. 190-194 - Taewan Gu, Jae-Bong Yoo, Chan-Young Park:

Consideration of User Preference on Internet-based Overlay Network. 195-200 - Junghoon Lee:

Design of a Network Coverage Analyzer for Roadside-to-Vehicle Telematics Networks. 201-205 - Jinxin He, Gaochao Xu, Xiaodong Fu, Zhiguo Zhou, Jianhua Jiang

:
LMCM: Layered Multiple Chaining Model for Authenticating Multicast Streams. 206-211 - Partha Bhattacharjee, Goutam Sanyal:

Mathematical Modelling for the Design of an Edge Router. 212-217 - Kamrul Hasan Talukder

, Koichi Harada:
Message Sequence Charts to Specify the Communicating Threads for Concurrent Discrete Wavelet Transform Based Image Compression and a Verification Analysis. 218-225 - A. R. Maghsoudlou, Roohollah Barzamini

, S. Soleimanpour, Javid Jouzdani
:
Neuro Fuzzy Model Predictive Control of AQM Networks Supporting TCP Flows. 226-230 - Lijie Ren, Zhongwen Guo, Renzhong Ma:

Prolonging Sensor Network Lifetime with Initial Energy Level Assignment. 231-236 - Bao-Xing Chen, Wenjun Xiao:

Routing in General Incomplete Star Interconnection Network. 237-240 - Peter Csaba Ölveczky:

Towards Formal Modeling and Analysis of Networks of Embedded Medical Devices in Real-Time Maude. 241-248
Component-Based Software Engineering Track
- Arno Puder, Sascha Häberling, Rainer Todtenhoefer:

An MDA Approach to Byte Code Level Cross-Compilation. 251-256 - Neunghoe Kim, Taek Lee, Dong-hyun Lee, Keun Lee, Hoh Peter In:

Customer Value-based HW/SW Partitioning Decision in Embedded Systems. 257-262 - Dayang N. A. Jawawi

, Safaai Deris, Rosbi Bin Mamat:
Early-Life Cycle Reuse Approach for Component-Based Software of Autonomous Mobile Robot System. 263-268 - Supasit Monpratarnchai, Tetsuo Tamai:

The Implementation and Execution Framework of a Role Model Based Language, EpsilonJ. 269-276
Cryptography and Network Security Track
- Yanyan Zhang:

A Multisecret Sharing Threshold Scheme. 279-284 - Dongmei Liu, Sihan Qing, Pengfei Li, ChunYang Yuan:

A Practical Certified E-Mail System with Temporal Authentication Based on Transparent TSS. 285-290 - Md. Nazrul Islam, Md. Monir Hossain Mia, Muhammad F. I. Chowdhury, Mohammad Abdul Matin

:
Effect of Security Increment to Symmetric Data Encryption through AES Methodology. 291-294 - Shangping Wang

, Pei Han, Yaling Zhang
, Xiaofeng Wang:
An Improved ID-based Restrictive Partially Blind Signature Scheme. 295-300 - M. Amir Moulavi, Jalal A. Nasiri

, Behnam Bahmani, Hossein Parvar, M. Sadeghizadeh, Mahmoud Naghibzadeh
:
DHA-KD: Dynamic Hierarchical Agent Based Key Distribution in Group Communication. 301-306 - Mansoor Ahmed Khan

, Ahmad Raza Cheema
, Aamir Hasan:
Improved Nonce Construction Scheme for AES CCMP to Evade Initial Counter Prediction. 307-311 - Mohd Fadzli Marhusin

, David Cornforth, Henry Larkin:
Malicious Code Detection Architecture Inspired by Human Immune System. 312-317 - Bao Ngoc Tran, Thuc Dinh Nguyen:

Modular Matrix Cipher and Its Application in Authentication Protocol. 318-323 - Yaling Zhang, Jing Zhang, Yikun Zhang:

Multi-signers Strong Designated Verifier Signature Scheme. 324-328 - Panupong Sornkhom, Yongyuth Permpoontanalarp:

Security Analysis of Micali's Fair Contract Signing Protocol by Using Coloured Petri Nets. 329-334 - Ayesha Altaf, M. Younus Javed, Attiq Ahmed:

Security Enhancements for Privacy and Key Management Protocol in IEEE 802.16e-2005. 335-339 - Juan Wang, Jingwei Zhang, Huanguo Zhang:

Type Flaw Attacks and Prevention in Security Protocols. 340-343 - Sheraz Naseer, Muhammad Younus, Attiq Ahmed:

Vulnerabilities Exposing IEEE 802.16e Networks to DoS Attacks: A Survey. 344-349 - Muzammil Khan, Attiq Ahmed, Ahmad Raza Cheema

:
Vulnerabilities of UMTS Access Domain Security Architecture. 350-355 - N. M. Thamrin

, Gunawan Witjaksono
, A. Nuruddin, M. S. Abdullah:
A Photonic-based Random Number Generator for Cryptographic Application. 356-361
Data Mining and Knowledge Discovery Track
- Yingxu Lai:

A Feature Selection for Malicious Detection. 365-370 - Gang Wang, Chenghong Zhang, Lihua Huang:

A Study of Classification Algorithm for Data Mining Based on Hybrid Intelligent Systems. 371-375 - Ying Gao, Dayou Liu, Chengmin Sun, He Liu:

A Two-Stage Clustering Algorithm for Multi-type Relational Data. 376-380 - Xiaoyan Shen, Bo Cheng, Junliang Chen, Xiangwu Meng:

An Effective Method for Chinese Related Queries Recommendation. 381-386 - Padej Phomasakha Na Sakolnakorn, Phayung Meesad

:
Decision Tree-Based Model for Automatic Assignment of IT Service Desk Outsourcing in Banking Business. 387-392 - Wenhui Ma, Guangping Xu

, Gang Wang, Jing Liu:
Detecting Semantic Mapping of Ontologies with Inference of Description Logic. 393-398 - Haifeng Li, Hong Chen:

Improve Frequent Closed Itemsets Mining over Data Stream with Bitmap. 399-404 - Haifeng Li, Zongjian Lu, Hong Chen:

Mining Approximate Closed Frequent Itemsets over Stream. 405-410 - Naijing Hu, Yuan Luo, Yingying Wang:

Adaptive Evolvement of Query Plan Based on Low Cost in Dynamic Grid Database. 411-415 - Shaohua Liu, Junsheng Yu, Yinglong Ma

, Xu Zhang, Xiaoming Liu, Hansheng Su:
Prioritizing Default Rules Embedded in Description Logic Knowledge Base. 416-421 - Phayung Meesad

, Tong Srikhacha:
Stock Price Time Series Prediction using Neuro-Fuzzy with Support Vector Guideline System. 422-427 - Phanarut Srichetta, Songsri Tangsripairoj:

Using Social Network Analysis to Better Understand the Dependencies in UML Use Cases Collection. 428-433 - Nattapon Harnsamut

, Juggapong Natwichai
, Bowonsak Seisungsittisunti
:
Privacy Preserving of Associative Classification and Heuristic Approach. 434-439 - Yi Sui, Fengjing Shao, Rencheng Sun, Jinlong Wang:

A Sequential Pattern Mining Algorithm Based on Improved FP-tree. 440-444
E-Commerce and its Applications Track
- D. Ganguly, Samit Chakraborty:

E Commerce - Forward and Reverse Auction - A Managerial Tool to Succeed over Business Competitiveness. 447-452 - Xia Zhanguo, Wang Ke, Wang Zhixiao:

Meta-heuristic Enabled MAS Optimization in Supply Chain Procurement. 453-458
Embedded Systems Track
- Ho Min Jung, Byung Ki Kim, Wan Yeon Lee, Young Woong Ko:

ICLS : Intelligent Cricket-based Location Tracking System Using Sensor Fusion. 461-466 - Bo Zhang:

Specifying and Verifying Timing Properties of a Time-triggered Protocol for In-vehicle Communication. 467-472
Image, Speech, and Signal Processing Track
- Pattana Bhuriyakorn, Proadpran Punyabukkana

, Atiwong Suchato:
A Genetic Algorithm-aided Hidden Markov Model Topology Estimation for Phoneme Recognition of Thai Continuous Speech. 475-480 - Ke Han, Xue-mei Jiang, Quan Feng, Xiu-chang Zhu:

A New Auto-Focusing Method Based on WBDCT for Many Object Situations. 481-484 - Ning Xu, Xi Shao, Zhen Yang:

A Novel Voice Morphing System Using Bi-GMM for High Quality Transformation. 485-489 - Samir Kumar Bandyopadhyay

, Debnath Bhattacharyya
, Debashis Ganguly, Swarnendu Mukherjee, Poulami Das:
A Secure Scheme for Image Transformation. 490-493 - Pravinkumar S. Revankar, Prabir Kumar Biswas, Sonali N. Deshpande:

Efficient Object Recognition Using Parametric Eigenspace under Influence of Noise and Occlusion. 494-500 - Duong Van Hieu

, Supot Nitsuwat:
Image Preprocessing and Trajectory Feature Extraction based on Hidden Markov Models for Sign Language Recognition. 501-506 - Madhu S. Nair

, M. Wilscy:
Modified Method for Denoising Color Images using Fuzzy Approach. 507-512 - Valliappan Raman

, Patrick Hang Hui Then:
Novelty towards Hybrid Segmentation of Coronary Artery in CT Cardiac Images. 513-516 - Yun Liu, Zhijie Gan, Yu Sun:

Static Hand Gesture Recognition and its Application based on Support Vector Machines. 517-521 - Chuanxu Wang, Zuoyong Li:

Face Detection Based on Skin Gaussian Model and KL Transform. 522-525 - Wang Chuan-xu, Li Xue:

Face Detection using BP Network Combined with Gabor Wavelet Transform. 526-529 - Zhang Xiang-guang:

A New Kind of Super-Resolution Reconstruction Algorithm Based on the ICM and the Constrained Cubic Spline Interpolation. 530-534 - Kyongil Yoon:

Background Subtraction Enhancement using Segmentation. 535-540
Information Assurance Track
- Hai Jin, Muzhou Xiong, Song Wu:

Information Value Evaluation Model for ILM. 543-548
Internet Technology Track
- Anucha Tungkatsathan, Pittaya Poompuang, Wichian Premchaiswadi:

SMILE Visualization with Flash Technologies. 551-556 - Somchai Chatvichienchai, Katsumi Tanaka:

Bring Precision and Access Control to Business Document Search. 557-562 - Arno Puder:

Byte Code Transformations using XSL Stylesheets. 563-568 - Sree Harsha Totakura, S. Venkata Nagendra, Rohit Indukuri, V. Vijayasherly:

COS: A Frame Work for Clustered off-line Search. 569-573 - M. N. Doja, Naveen Kumar:

Image Authentication Schemes against Key-Logger Spyware. 574-579 - Ye Liang, Hong Bao

, Hongzhe Liu
:
Information Flow based Ontology Mapping. 580-585 - Enrique Costa-Montenegro

, Juan C. Burguillo-Rial
, Pedro S. Rodríguez-Hernández
, Francisco J. González-Castaño
, Maria Curras-Parada, Patricia Gomez-Rana, Juan P. Rey-Souto:
Multi-Agent System Model of a BitTorrent Network. 586-591
Mobile/Wireless/Ad-hoc Networks Track
- Zongwu Ke, Layuan Li, Nianshen Chen:

A Crossover Game Routing Algorithm for Wireless Multimedia Sensor Networks. 595-599 - Xinbo Huang

, Qindong Sun:
Accuracy of an Icing On-line Monitoring System. 600-604 - Mikio Aoyama, Hiroshi Takeichi:

Adaptive Self-Organizing Overlay Network for Car-to-Car Communications. 605-610 - Seong-Yee Phang, Chee-Min Yeoh, Hoonjae Lee, Hyotaek Lim:

Multicasting Support for NEMO based on ODMRP. 611-616 - Dalju Lee, Jongmoon Baik:

QoS Protocol Verification using Petri-Net for Seamless Mobility in a Ubiquitous Environment: A Case Study. 617-622 - Fang Wang, Lisheng Ren, Guifa Teng:

The Upper Bound of Coverage on Fixed Energy Budget in Wireless Sensor Networks. 623-626 - Suwat Pattamavorakun, Wuttipol Wanarsup, Suwarin Pattamavorakun:

Omni-Directional Antenna for Wireless Access Point. 627-632
Natural Language Processing Track
- Azadeh Zamanifar

, Behrouz Minaei-Bidgoli
, Mohsen Sharifi
:
A New Hybrid Farsi Text Summarization Technique Based on Term Co-Occurrence and Conceptual Property of the Text. 635-639 - Yuzana, Khin Marlar Tun:

Collation Strategy Based on Heuristics Chart for Myanmar Language. 640-645
Neural Networks and Genetic Algorithms Track
- Xia Zhanguo, Wang Zhixiao, Wang Ke, Guan Hongjie:

A New Model of Mine Hoist Fault Diagnosis Based on the Rough Set Theory. 649-654 - Manop Phankokkruad

, Kuntpong Woraratpanya:
An Automated Decision System for Computer Adaptive Testing Using Genetic Algorithms. 655-660 - Subramanya G. Nayak

, C. Puttamadappa
, Akshata Kamath, B. Raja Sudeep, K. Kavitha:
Classification of Bio-Optical Signals using Soft Computing Tools. 661-663 - Abbas Sarraf Shirazi, Tahereh Seyedena:

Design of MLP using Evolutionary Strategy with Variable Length Chromosomes. 664-669 - Dong-Chul Park:

Equalization for a Wireless ATM Channel with a Recurrent Neural Network Pruned by Genetic Algorithm. 670-674
Operating Systems Track
- Guangjun Xie, Lu Qi, Feng Wang, Gang Wang, Xiaoguang Liu, Jing Liu:

ESnapII: A Writable Dependent Snapshot System with Shared Cache. 677-682
Parallel and Distributed Computing Track
- Leila Ismail

, Bruce Mills, Alain Hennebelle:
A Formal Model of Dynamic Resource Allocation in Grid Computing Environment. 685-693 - Pemjit Aphimaeteethomrong, Veera Muangsin

:
A Visualization Portal for a Tsunami Warning System on a Distributed Environment. 694-699 - Wei Li, Shanzhi Chen, Yaning Liu, Xin Li:

Aggregate Congestion Control for Peer-to-Peer File Sharing Applications. 700-705 - Jalal A. Nasiri

, M. Amir Moulavi, Sepideh Nazemi Gelyan, Hossein Deldari, Hadi Sadoghi Yazdi, A. Eshghi Shargh:
An Efficient Parallel Eye Detection Algorithm on Facial Color Images. 706-711 - Montri Wiboonrat

:
An Optimal Data Center Availability and Investment Trade-Offs. 712-719 - Maruf Ahmed, Sharif M. H. Chowdhury, Masud Hasan:

Fast Preemptive Task Scheduling Algorithm for Homogeneous and Heterogeneous Distributed Memory Systems. 720-725 - Zulkarnain Md Ali, Mohamed Othman, Mohd Rushdan Mohd Said, Md Nasir Sulaiman:

Implementation of Parallel Algorithms for LUC Cryptosystem. 726-731 - Jacek Blazewicz

, Marta Kasprzak
, Aleksandra Swiercz
, Marek Figlerowicz, Piotr Gawron, Darren Platt, Lukasz Szajkowski:
Parallel Implementation of the Novel Approach to Genome Assembly. 732-737
Service Oriented Computing Track
- Rujuan Liu, Changjun Hu, Chongchong Zhao:

Model Checking for Web Service Flow Based on Annotated OWL-S. 741-746 - Bo Cheng

, Xiaoyan Shen, Xiangwu Meng, Junliang Chen:
Web Services Communication Model in Telecom Domain. 747-752 - Reza Meimandi Parizi, Abdul Azim Abdul Ghani:

An Ensemble of Complexity Metrics for BPEL Web Processes. 753-758 - Chen-Liang Fang, Deron Liang, Fengyi Lin, Chien-Cheng Lin:

A Preliminary Study on Portable Interceptor Mechanism to SOAP. 759-764 - Natee Artaiam, Twittie Senivongse:

Enhancing Service-Side QoS Monitoring for Web Services. 765-770
Software Specification and Architecture Track
- Md Forhad Rabbi

, Khan Olid Bin Mannan:
A Review of Software Risk Management for Selection of Best Tools and Techniques. 773-778 - Durga Prasad Kakollu, B. D. Chaudhary:

A Z-Specification of Classification and Relationships between Usecases. 779-784 - Muhammad Rofi Imtihan, Mohd. Salihin Ngadiman, Habibollah Haron

:
An Alternative Model for ERP Maintenance Strategy. 785-793 - Inggriani Liem, Yohanes Nugroho:

An Application Generator Framelet. 794-799 - M. Ben Swarup, P. Seetha Ramaiah:

An Approach to Modeling Software Safety. 800-806 - Cyrille Artho, Watcharin Leungwattanakit, Masami Hagiya, Yoshinori Tanabe:

Architecture-aware Partial Order Reduction to Accelerate Model Checking of Networked Programs. 807-813 - P. Seetha Ramaiah, M. Ben Swarup, K. Raja Kumar:

Conceptual Modeling for Safety Critical Computer Systems. 814-819 - Kevin Li, Dwight Deugo

:
Eclipse Project and Resource Tracking Plug-in. 820-827 - Chengwan He, Zheng Li, Keqing He:

Identification and Extraction of Design Pattern Information in Java Program. 828-834 - Guan Hongjie, Meng Fan-rong, Xia Zhanguo:

Research on UML-based Modeling of Workflow Manage System. 835-839 - Jongmyung Choi

, Hyun-Joo Moon:
Software Engineering Issues in Developing a Context-aware Exhibition Guide System. 840-845 - Kyungeun Park, Yanggon Kim, Juno Chang, Dae Woong Rhee, Jinkyu Lee:

The Prototype of the Massive Events Streams Service Architecture and its Application. 846-851 - Cyrille Artho, Watcharin Leungwattanakit, Masami Hagiya, Yoshinori Tanabe:

Tools and Techniques for Model Checking Networked Programs. 852-857 - Siti Zaiton Mohd Hashim, Mardiyono

, Wan M. N. Wan-Kadir
, Nurulhaini Anuar:
Multi Readers Detection in Adaptive RFID Middleware. 858-863
Software Testing Track
- Supaporn Kansomkeat, Jeff Offutt, Aynur Abdurazik, Andrea Baldini:

A Comparative Evaluation of Tests Generated from Different UML Diagrams. 867-872 - Saeed Parsa

, Mojtaba Vahidi-Asl, Somaye Arabi Naree:
Finding Causes of Software Failure Using Ridge Regression and Association Rule Generation Methods. 873-878 - Philip Samuel, Anju Teresa Joseph:

Test Sequence Generation from UML Sequence Diagrams. 879-887 - Rachid Bouaziz, Ismail Berrada:

Testing Component-Based Real Time Systems. 888-894 - Pattara Leelaprute, Takafumi Matsuo, Tatsuhiro Tsuchiya

, Tohru Kikuno:
Detecting Feature Interactions in Home Appliance Networks. 895-903
Visual and Multimedia Computing Track
- Xiangbin Shi, Du Ling, Liu Fang, Li Bao-long, Xian-min Chen:

A Traffic Modeling Method for MMOG. 907-911 - Xiangbin Shi, Liu Fang, Du Ling, Bao Siqin, Xian-min Chen:

An Algorithm of Level of Detail Terrain. 912-916 - Xiangbin Shi, Wang Yue, Li Qiang, Du Ling, Liu Fang:

An Interest Management Mechanism Based on N-Tree. 917-922
Web-Based Applications Track
- Sungchae Lim, Joonseon Ahn:

A Hierarchical Cache Scheme for the Large-scale Web Search Engine. 925-930 - Nipat Jongsawat, Pittaya Poompuang, Wichian Premchaiswadi:

Dynamic Data Feed to Bayesian Network Model and SMILE Web Application. 931-936 - Sukanya Suwisuthikasem, Songsri Tangsripairoj:

E-Tax Invoice System Using Web Services Technology: A Case Study of the Revenue Department of Thailand. 937-942 - Chenghong Zhang, Songran Liu, Zhengchuan Xu, Zhuojun Gu, Xiaoling Wang:

Knowledge Representation and Query Process Based-on Semantic Web Technologies. 943-948 - Priyanka Tripathi, M. Kumar, Namita Shrivastava:

Ranking of Indian E-commerce Web-applications by Measuring Quality Factors. 949-954 - Fang Wang, Guifa Teng, Lisheng Ren, Jianbin Ma:

Research on Mechanism of Agricultural FAQ Retrieval Based on Ontology. 955-958 - Wuttipol Wanarsup, Suwarin Pattamavorakun, Suwat Pattamavorakun:

Intelligent Personalization Job Web Site. 959-964
Papers Presented at SNPD'07
- Junyuan Yang

, Fengqin Zhang, Xiaoyan Wang:
A Class of SIR Epidemic Model with Saturation Incidence and Age of Infection. 967-970 - Xiaoyue Wang, Zhen Hua, Rujiang Bai:

A Hybrid Text Classification Model based on Rough Sets and Genetic Algorithms. 971-977
Paper Presented at ICIS'08
- Belaid Saad, Francine Herrmann

, Yann Lanuel
, Thomas Tamisier:
Mixing Protocol based on the Cooperation and the Parallelism for the Distributed Environment. 981-986

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














