


default search action
12th SNPD 2011: Sydney, Australia
- Morshed U. Chowdhury, Sid Ray, Roger Y. Lee:

12th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel & Distributed Computing, SNPD 2011, Sydney, Australia, July 6-8, 2011. IEEE Computer Society 2011, ISBN 978-1-4577-0896-1
Artificial Intelligence
- Irosh Fernando

, Frans Henskens
, Martin Cohen:
A Domain Specific Expert System Model for Diagnostic Consultation in Psychiatry. 3-6 - Sirajum Monira Sumi, Faisal Zaman, Hideo Hirose:

A Neural Network Ensemble Incorporated with Dynamic Variable Selection for Rainfall Forecast. 7-12 - Nan Li, Zhimin Zhang:

Abnormal Crowd Behavior Detection Using Topological Methods. 13-18 - Shobana Rajendran:

Image Retrieval Techniques, Analysis and Interpretation for Leukemia Data Sets. 19-23 - Subhasis Mukherjee, John Yearwood, Peter Vamplew

, Md. Shamsul Huda:
Reinforcement Learning Approach to AIBO Robot's Decision Making Process in Robosoccer's Goal Keeper Problem. 24-30
Communication Systems and Networks
- Zhongwei Zhang, Hong Zhou:

A MAC Layer Protocol Supporting the Application of WSNs in Medicine and Healthcare Domains. 33-37 - Hla Myint, Priyadarsi Nanda:

An Integrated Model Supporting Billing and QOS in the Internet. 38-44 - Andik Setyono

, Md. Jahangir Alam:
Performance Evaluation of the MMS Framework for Internet Applications. 45-50
Cryptography and Network Security
- Chin-Ling Chen, Yu-Fan Lin, Neng-Chung Wang

, Young-Long Chen:
An Improvement on Hsiang and Shih's Remote User Authentication Scheme Using Smart Cards. 53-57 - Subhasis Mukherjee, Maynul Hasan

, Belal Chowdhury, Morshed U. Chowdhury
:
Security of RFID Systems - A Hybrid Approach. 58-63 - Biplob R. Ray

, Md. Shamsul Huda, Morshed U. Chowdhury
:
Smart RFID Reader Protocol for Malware Detection. 64-69
Data Mining and Knowledge Discovery
- Ali Anaissi, Paul J. Kennedy

, Madhu Goyal
:
Feature Selection of Imbalanced Gene Expression Microarray Data. 73-78 - Nazar Zaki

, Piers Campbell, Stefan Wolfsheimer, Grégory Nuel:
Features Extraction Using Free Score of Words for Classifying Conotoxin Superfamily. 79-84
E-Commerce and Its Applications
- Ta-Ping Lu, Bang-Ning Hwang, Yu-Da Chang:

A Study of Key Success Factors for Supply Chain Management System in Semiconductor Industry. 87-92 - George M. Coles, William J. Smart:

Building Trust in Online Customers. 93-98
Image, Speech and Signal Processing
- Kamrul Hasan Talukder

, Koichi Harada:
Communication Among Multiple Threads in the Concurrent Wavelet Transformation for Image Compression. 101-106 - Ronghua Chen, Mary Fenghua She, Xiangping Sun, Lingxue Kong

, Yuchuan Wu:
Driver Recognition Based on Dynamic Handgrip Pattern on Steeling Wheel. 107-112
Internet Technology and Applications
- Huazhi Yang, Peifeng Li, Qiaoming Zhu, Lan Xu:

The Application Layer Protocol Identification Method Based on Semisupervised Learning. 115-120
Mobile/Wireless/Ad Hoc Networks
- Young-Long Chen, Neng-Chung Wang

, Chin-Ling Chen, Yu-Cheng Lin:
A Coverage Algorithm to Improve the Performance of PEGASIS in Wireless Sensor Networks. 123-127 - Neng-Chung Wang

, Young-Long Chen, Chin-Ling Chen, Ying-Shiou Chen:
A Dual-Tree-Based On-Demand Multicast Routing Protocol for Mobile Ad Hoc Networks. 128-132 - Mohammad Ali Jabraeil Jamali

, Hamid Entezari Shabestar:
A New Approach for a Fault Tolerant Mobile Agent System. 133-138 - Kamal Baastani Khajeh, Mohammad Ali Jabraeil Jamali

, Hadi Mikaili Manie:
ACDS: Adaptive Topology Construction for R-random Sensor Deployment in Wireless Sensor Networks. 139-144 - Mohammad Ali Jabraeil Jamali

, Adel Fathi, Javad Pashaei Barbin:
Reliable and Delay-Efficient Routing Algorithm in Wireless Sensor Networks. 145-149 - Jason T. Hambly, Tanveer A. Zia

:
Towards Detecting Extremely Low Frequency Fields Using a Wireless Sensor Network. 150-156
Natural Language Processing
- Peifeng Li, Qiaoming Zhu, Xiaoxu Zhu:

A Clustering and Ranking Based Approach for Multi-document Event Fusion. 159-165 - Peifeng Li, Qiaoming Zhu, Wei Zhang:

A Dependency Tree Based Approach for Sentence-Level Sentiment Classification. 166-171
Neural Networks and Genetic Algorithms
- Shinji Tamura, Teruhisa Hochin, Hiroki Nomiya

:
Generation Method of Concurrency Control Program by Using Genetic Programming. 175-180
Operating Systems
- Yuanchao Xu, Lin Du, Zhimin Zhang:

A Light-Weight Scheduler for Single-ISA Asymmetric Multi-core Processor Using Online Profiling. 183-188
Parallel and Distributed Computing
- Mohammad Ali Jabraeil Jamali

, Yalda Sani:
Adaptive Peer to Peer Resource Discovery in Grid Computing Based on Reinforcement Learning. 191-196 - Fan Xu

, Qiaoming Zhu, Peifeng Li:
Detecting Text Similarity over Chinese Research Papers Using MapReduce. 197-202
Service-Oriented Computing
- Chieko Matsuyama, Toyoshiro Nakashima, Naohiro Ishii:

Effect of Touch-Typing Practices in Computer Literacy and Evaluation of Its Continuity. 205-210
Software Engineering
- Osama Shata:

A Crash Undergraduate Course in Global Software Engineering. 213-218
Visual and Multimedia Computing
- Teruhisa Hochin, Yusuke Nakata, Hiroki Nomiya:

On the Harmony of Audiovisual Materials in Cross-Media Retrieval System Based on Impression. 221-226
Web-Based Applications
- Jahangir Dewan, Morshed U. Chowdhury

, Shak Hossain, Jessy Dewan:
A Framework for eLearning with Social Media Using DRM. 229-234

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














