


default search action
Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing 2008
- Roger Y. Lee:

Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing. Studies in Computational Intelligence 149, Springer 2008, ISBN 978-3-540-70559-8 - Chotirat Ann Ratanamahatana, Dechawut Wanichsan:

Stopping Criterion Selection for Efficient Semi-supervised Time Series Classification. 1-14 - Jinyoung Ahn, Vijay Shyamasundar, Yeong-Tae Song:

Enhancing the Blockage of Spam over Internet Telephony (SPIT) Using Adaptive PMG Algorithm. 15-26 - Gihan Shin, Junchul Chun:

Spatio-temporal Facial Expression Recognition Using Optical Flow and HMM. 27-38 - Mahmoud Jazzar, Aman Jantan

:
An Approach for Anomaly Intrusion Detection Based on Causal Knowledge-Driven Diagnosis and Direction. 39-48 - Belal Chowdhury, Morshed U. Chowdhury

, Clare D'Souza:
Challenges Relating to RFID Implementation within the Electronic Supply Chain Management - A Practical Approach. 49-59 - Ho Min Sung, Wan Yeon Lee, Jin Kim, Young Woong Ko:

Design and Implementation of Clustering File Backup Server Using File Fingerprint. 61-73 - Haeng-Kon Kim:

Aspect Oriented Testing Frameworks for Embedded Software. 75-88 - Sinjae Lee, Shaojian Zhu, Yanggon Kim, Juno Chang:

Analysis on Malicious Peer's Behavior of the P2P Trust Resource Chain Model. 89-102 - Montri Lawkobkit:

Information Technology Service Management: A Thailand Perspective. 103-111 - Rachid El Meziane, Ilham Berrada, Ismail Kassou

:
A New Artificial Immune System for the Detection of Abnormal Behaviour. 113-122 - Takéhiko Nakama:

Markov Chain Analysis of Genetic Algorithms Applied to Fitness Functions Perturbed by Multiple Sources of Additive Noise. 123-136 - Françoise Sailhan, Julien Bourgeois

, Valérie Issarny:
A Security Supervision System for Hybrid Networks. 137-149 - Tad Gonsalves, Kiyoshi Itoh:

Cost Minimization in Service Systems Using Particle Swarm Optimization. 151-161 - Haeng-Kon Kim, Roger Y. Lee:

MS2Web: Applying MDA and SOA to Web Services. 163-180 - Lihua Liu, Zhengjun Cao:

Security Analysis of One Verifiable Encryption Scheme. 181-187 - Thandar Thein, Sung-Do Chi, Jong Sou Park:

Proactive Fault Management with Virtualization for Software Aging. 189-200 - Smriti Agrawal

, Rama Shankar Yadav, Ranvijay
:
A Preemption Control Technique for System Energy Minimization of Weakly Hard Real-Time Systems. 201-215 - Naohiro Ishii, Takahiro Yamada, Yongguang Bao:

Text Classification by Relearning and Ensemble Computation. 217-226 - Kazunori Iwata

, Nobuhiro Ito, Kuniyoshi Toda, Naohiro Ishii:
Analysis of Agents' Cooperation in RoboCupRescue Simulation. 227-236 - B. Chandra Mohan

, R. Sandeep, D. Sridharan:
A Data Mining Approach for Predicting Reliable Path for Congestion Free Routing Using Self-motivated Neural Network. 237-246 - Gongzhu Hu:

A Formal Specification of UML Class and State Diagrams. 247-257

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














