default search action
9th SNPD 2008: Phuket, Thailand
- Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2008, In conjunction with Second International Workshop on Advanced Internet Technology and Applications, August 6-8, 2008, Phuket, Thailand. IEEE Computer Society 2008, ISBN 978-0-7695-3263-9
AITA Workshop Track
- Zonghua Liu, Guangqing Liu, Byungwook Lee:
An Efficient Key Distribution Method Applying to OMA DRM 2.0 with Device Identifier. 3-7 - Byungsung Lee, Junchul Chun, Peom Park:
Classification of Facial Expression Using SVM for Emotion Care Service System. 8-12 - Angela Song-Ie Noh, Woong Jae Lee, Jin Young Ye:
Comparison of the Mechanisms of the Zigbee's Indoor Localization Algorithm. 13-18 - Pauline Kongsuwan, Sangmun Shin, Myeonggil Choi:
Managing Quality Level for Developing Information Security System Adopting QFD. 19-24 - Kwon-Su Jeon, Jae-Woo Lee, Yung-Hwan Byun:
Multidisciplinary Design Approach Using Repetitive Response Surface Enhancement and Global Optimization. 25-28 - Steven P. Sweeney, Sehwan Yoo, Albert Chi, Frank Lin, Taikyeong Jeong, Sengphil Hong, Sam Fernald:
Neural Net Water Level Trend Prediction and Dynamic Water Level Sampling Frequency. 29-37
Algorithms Track
- Xiuqin Wang, Guangsheng Ma, Hao Wang:
A Novel Method for All Solutions SAT Problem. 41-45 - Lyamine Bouhafs, Amir Hajjam, Abderrafiaa Koukam:
A Tabu Search and Ant Colony System Approach for the Capacitated Location-Routing Problem. 46-50 - Ke Liang, Xingshe Zhou, Kailong Zhang, Ruiqing Sheng:
An Adaptive Performance Management Method for Failure Detection. 51-56 - Mohamed Ali Feki, Sang Wan Lee, Z. Zenn Bien, Mounir Mokhtari:
Combined Fuzzy State Q-learning Algorithm to Predict Context Aware User Activity under Uncertainty in Assistive Environment. 57-62 - Hakun Lee, Keiichi Kaneko:
New Approaches for Software Watermarking by Register Allocation. 63-68 - Kiyoshi Sawada:
Placing a Liaison between Two Members of the Same Level in an Organization Structure of a Complete Binary Tree. 69-72 - Lei Zhang, Shixiong Xia, Zhanguo Xia, Yong Zhou:
Study on Ontology Partition Based on Ant Colony Algorithm. 73-78 - Geir Agnarsson, Raymond Greenlaw, Sanpawat Kantabutra:
The Complexity of the Evolution of Graph Labelings. 79-84 - Sanpawat Kantabutra, Pattama Longani:
The Complexity of the Grid Wireless Mobility Model. 85-90
Artificial Intelligence Track
- Yu-hua Guo, Ning Jing, Jun Li, Jun Wang:
A Comparison of Iterative Repair Strategies for Earth Observing Satellites Imaging Scheduling. 93-98 - Sarmad Sadik, M. Alade Rahman, Arshad Ali, Hafiz Farooq Ahmad, Hiroki Suguri:
A Formal Approach for Design of Agent Based Earthquake Management System (EMS). 99-104 - Jun Wu, Yo Seung Kim, Chi-Hwa Song, Won Don Lee:
A New Classifier to Deal with Incomplete Data. 105-110 - Guoxing Zhao, Jixin Ma, Fuxing Shen, Miltos Petridis:
A Sound and Complete Reified Temporal Logic. 111-116 - Bin Zhang, Jun Yan, Wei Zhang:
Application of Multi-layer Feed-forward Neural Network in Fault Diagnosis Based on FBP Algorithm. 117-120 - Tshering, Somjit Arch-int:
Clustering ICT Indicators of Bhutan using Two Level HSOM Algorithm. 121-127 - Khairulmizam Samsudin, Faisul Arif Ahmad, Syamsiah Mashohor, Norfadzilah Mohd Latif:
Comparison of Direct and Incremental Genetic Algorithm for Optimization of Ordinal Fuzzy Controllers. 128-134 - Takashi Mitsuishi, Takanori Terashima, Toshimichi Homma, Yasunari Shidama:
Lipschitz Continuity of Approximate Reasoning. 135-140 - Xiao-shan Jin, Jun Li, Ning Jing:
On Relaxing and Steady State Genetic Methods for Satellite Imaging Scheduling. 141-146 - Fengyi Lin, Deron Liang, Shih-Jung Chiu:
The Study of a Financial Crisis Prediction Model based on XBRL. 147-153 - Zahra Abbasi, Mohammad Ali Abbasi:
Reinforcement Distribution in a Team of Cooperative Q-learning Agents. 154-160
Audio and Video Encoder/Decoder Technology Track
- Vu Thi Lan Huong, Byung-Jae Min, Dong-Chul Park, Dong-Min Woo:
A New Vocoder based on AMR 7.4kbit/s Mode in Speaker Dependent Coding System. 163-167
Collaborative Computing Track
- Rauf Malick, Usama Khanzada, Athar Abbas, Waheed Iqbal, Kamran Azim:
AINAN: Collaborative Application for Protein Visualization & Analyses. 171-175
Communication Systems and Networks Track
- Chusit Pradabpet, K. Eupree, Sorawat Chivapreecha, Kobchai Dejhan:
A New PAPR Reduction Technique for OFDM-WLAN in 802.11a Systems. 179-184 - Jiazheng Wang, Xiuhua Fu:
A Two-Dimensionality Model for Providing End-to-End QoS CAC. 185-189 - Maryam Amiripour, Hamid Abachi:
Analytical Modeling of Task Scheduling for Master-Slave Super Hypercube Architecture. 190-194 - Taewan Gu, Jae-Bong Yoo, Chan-Young Park:
Consideration of User Preference on Internet-based Overlay Network. 195-200 - Junghoon Lee:
Design of a Network Coverage Analyzer for Roadside-to-Vehicle Telematics Networks. 201-205 - Jinxin He, Gaochao Xu, Xiaodong Fu, Zhiguo Zhou, Jianhua Jiang:
LMCM: Layered Multiple Chaining Model for Authenticating Multicast Streams. 206-211 - Partha Bhattacharjee, Goutam Sanyal:
Mathematical Modelling for the Design of an Edge Router. 212-217 - Kamrul Hasan Talukder, Koichi Harada:
Message Sequence Charts to Specify the Communicating Threads for Concurrent Discrete Wavelet Transform Based Image Compression and a Verification Analysis. 218-225 - A. R. Maghsoudlou, Roohollah Barzamini, S. Soleimanpour, Javid Jouzdani:
Neuro Fuzzy Model Predictive Control of AQM Networks Supporting TCP Flows. 226-230 - Lijie Ren, Zhongwen Guo, Renzhong Ma:
Prolonging Sensor Network Lifetime with Initial Energy Level Assignment. 231-236 - Bao-Xing Chen, Wenjun Xiao:
Routing in General Incomplete Star Interconnection Network. 237-240 - Peter Csaba Ölveczky:
Towards Formal Modeling and Analysis of Networks of Embedded Medical Devices in Real-Time Maude. 241-248
Component-Based Software Engineering Track
- Arno Puder, Sascha Häberling, Rainer Todtenhoefer:
An MDA Approach to Byte Code Level Cross-Compilation. 251-256 - Neunghoe Kim, Taek Lee, Dong-hyun Lee, Keun Lee, Hoh Peter In:
Customer Value-based HW/SW Partitioning Decision in Embedded Systems. 257-262 - Dayang N. A. Jawawi, Safaai Deris, Rosbi Bin Mamat:
Early-Life Cycle Reuse Approach for Component-Based Software of Autonomous Mobile Robot System. 263-268 - Supasit Monpratarnchai, Tetsuo Tamai:
The Implementation and Execution Framework of a Role Model Based Language, EpsilonJ. 269-276
Cryptography and Network Security Track
- Yanyan Zhang:
A Multisecret Sharing Threshold Scheme. 279-284 - Dongmei Liu, Sihan Qing, Pengfei Li, ChunYang Yuan:
A Practical Certified E-Mail System with Temporal Authentication Based on Transparent TSS. 285-290 - Md. Nazrul Islam, Md. Monir Hossain Mia, Muhammad F. I. Chowdhury, Mohammad Abdul Matin:
Effect of Security Increment to Symmetric Data Encryption through AES Methodology. 291-294 - Shangping Wang, Pei Han, Yaling Zhang, Xiaofeng Wang:
An Improved ID-based Restrictive Partially Blind Signature Scheme. 295-300 - M. Amir Moulavi, Jalal A. Nasiri, Behnam Bahmani, Hossein Parvar, M. Sadeghizadeh, Mahmoud Naghibzadeh:
DHA-KD: Dynamic Hierarchical Agent Based Key Distribution in Group Communication. 301-306 - Mansoor Ahmed Khan, Ahmad Raza Cheema, Aamir Hasan:
Improved Nonce Construction Scheme for AES CCMP to Evade Initial Counter Prediction. 307-311 - Mohd Fadzli Marhusin, David Cornforth, Henry Larkin:
Malicious Code Detection Architecture Inspired by Human Immune System. 312-317 - Bao Ngoc Tran, Thuc Dinh Nguyen:
Modular Matrix Cipher and Its Application in Authentication Protocol. 318-323 - Yaling Zhang, Jing Zhang, Yikun Zhang:
Multi-signers Strong Designated Verifier Signature Scheme. 324-328 - Panupong Sornkhom, Yongyuth Permpoontanalarp:
Security Analysis of Micali's Fair Contract Signing Protocol by Using Coloured Petri Nets. 329-334 - Ayesha Altaf, M. Younus Javed, Attiq Ahmed:
Security Enhancements for Privacy and Key Management Protocol in IEEE 802.16e-2005. 335-339 - Juan Wang, Jingwei Zhang, Huanguo Zhang:
Type Flaw Attacks and Prevention in Security Protocols. 340-343 - Sheraz Naseer, Muhammad Younus, Attiq Ahmed:
Vulnerabilities Exposing IEEE 802.16e Networks to DoS Attacks: A Survey. 344-349 - Muzammil Khan, Attiq Ahmed, Ahmad Raza Cheema:
Vulnerabilities of UMTS Access Domain Security Architecture. 350-355 - N. M. Thamrin, Gunawan Witjaksono, A. Nuruddin, M. S. Abdullah:
A Photonic-based Random Number Generator for Cryptographic Application. 356-361
Data Mining and Knowledge Discovery Track
- Yingxu Lai:
A Feature Selection for Malicious Detection. 365-370 - Gang Wang, Chenghong Zhang, Lihua Huang:
A Study of Classification Algorithm for Data Mining Based on Hybrid Intelligent Systems. 371-375 - Ying Gao, Dayou Liu, Chengmin Sun, He Liu:
A Two-Stage Clustering Algorithm for Multi-type Relational Data. 376-380 - Xiaoyan Shen, Bo Cheng, Junliang Chen, Xiangwu Meng:
An Effective Method for Chinese Related Queries Recommendation. 381-386 - Padej Phomasakha Na Sakolnakorn, Phayung Meesad:
Decision Tree-Based Model for Automatic Assignment of IT Service Desk Outsourcing in Banking Business. 387-392 - Wenhui Ma, Guangping Xu, Gang Wang, Jing Liu:
Detecting Semantic Mapping of Ontologies with Inference of Description Logic. 393-398 - Haifeng Li, Hong Chen:
Improve Frequent Closed Itemsets Mining over Data Stream with Bitmap. 399-404 - Haifeng Li, Zongjian Lu, Hong Chen:
Mining Approximate Closed Frequent Itemsets over Stream. 405-410 - Naijing Hu, Yuan Luo, Yingying Wang:
Adaptive Evolvement of Query Plan Based on Low Cost in Dynamic Grid Database. 411-415 - Shaohua Liu, Junsheng Yu, Yinglong Ma, Xu Zhang, Xiaoming Liu, Hansheng Su:
Prioritizing Default Rules Embedded in Description Logic Knowledge Base. 416-421 - Phayung Meesad, Tong Srikhacha:
Stock Price Time Series Prediction using Neuro-Fuzzy with Support Vector Guideline System. 422-427 - Phanarut Srichetta, Songsri Tangsripairoj:
Using Social Network Analysis to Better Understand the Dependencies in UML Use Cases Collection. 428-433 - Nattapon Harnsamut, Juggapong Natwichai, Bowonsak Seisungsittisunti:
Privacy Preserving of Associative Classification and Heuristic Approach. 434-439 - Yi Sui, Fengjing Shao, Rencheng Sun, Jinlong Wang:
A Sequential Pattern Mining Algorithm Based on Improved FP-tree. 440-444
E-Commerce and its Applications Track
- D. Ganguly, Samit Chakraborty:
E Commerce - Forward and Reverse Auction - A Managerial Tool to Succeed over Business Competitiveness. 447-452 - Xia Zhanguo, Wang Ke, Wang Zhixiao:
Meta-heuristic Enabled MAS Optimization in Supply Chain Procurement. 453-458
Embedded Systems Track
- Ho Min Jung, Byung Ki Kim, Wan Yeon Lee, Young Woong Ko:
ICLS : Intelligent Cricket-based Location Tracking System Using Sensor Fusion. 461-466 - Bo Zhang:
Specifying and Verifying Timing Properties of a Time-triggered Protocol for In-vehicle Communication. 467-472
Image, Speech, and Signal Processing Track
- Pattana Bhuriyakorn, Proadpran Punyabukkana, Atiwong Suchato:
A Genetic Algorithm-aided Hidden Markov Model Topology Estimation for Phoneme Recognition of Thai Continuous Speech. 475-480 - Ke Han, Xue-mei Jiang, Quan Feng, Xiu-chang Zhu:
A New Auto-Focusing Method Based on WBDCT for Many Object Situations. 481-484 - Ning Xu, Xi Shao, Zhen Yang:
A Novel Voice Morphing System Using Bi-GMM for High Quality Transformation. 485-489 - Samir Kumar Bandyopadhyay, Debnath Bhattacharyya, Debashis Ganguly, Swarnendu Mukherjee, Poulami Das:
A Secure Scheme for Image Transformation. 490-493 - Pravinkumar S. Revankar, Prabir Kumar Biswas, Sonali N. Deshpande:
Efficient Object Recognition Using Parametric Eigenspace under Influence of Noise and Occlusion. 494-500 - Duong Van Hieu, Supot Nitsuwat:
Image Preprocessing and Trajectory Feature Extraction based on Hidden Markov Models for Sign Language Recognition. 501-506 - Madhu S. Nair, M. Wilscy:
Modified Method for Denoising Color Images using Fuzzy Approach. 507-512 - Valliappan Raman, Patrick Hang Hui Then:
Novelty towards Hybrid Segmentation of Coronary Artery in CT Cardiac Images. 513-516 - Yun Liu, Zhijie Gan, Yu Sun:
Static Hand Gesture Recognition and its Application based on Support Vector Machines. 517-521 - Chuanxu Wang, Zuoyong Li:
Face Detection Based on Skin Gaussian Model and KL Transform. 522-525 - Wang Chuan-xu, Li Xue:
Face Detection using BP Network Combined with Gabor Wavelet Transform. 526-529 - Zhang Xiang-guang:
A New Kind of Super-Resolution Reconstruction Algorithm Based on the ICM and the Constrained Cubic Spline Interpolation. 530-534 - Kyongil Yoon:
Background Subtraction Enhancement using Segmentation. 535-540
Information Assurance Track
- Hai Jin, Muzhou Xiong, Song Wu:
Information Value Evaluation Model for ILM. 543-548
Internet Technology Track
- Anucha Tungkatsathan, Pittaya Poompuang, Wichian Premchaiswadi:
SMILE Visualization with Flash Technologies. 551-556 - Somchai Chatvichienchai, Katsumi Tanaka:
Bring Precision and Access Control to Business Document Search. 557-562 - Arno Puder:
Byte Code Transformations using XSL Stylesheets. 563-568 - Sree Harsha Totakura, S. Venkata Nagendra, Rohit Indukuri, V. Vijayasherly:
COS: A Frame Work for Clustered off-line Search. 569-573 - M. N. Doja, Naveen Kumar:
Image Authentication Schemes against Key-Logger Spyware. 574-579 - Ye Liang, Hong Bao, Hongzhe Liu:
Information Flow based Ontology Mapping. 580-585 - Enrique Costa-Montenegro, Juan C. Burguillo-Rial, Pedro S. Rodríguez-Hernández, Francisco J. González-Castaño, Maria Curras-Parada, Patricia Gomez-Rana, Juan P. Rey-Souto:
Multi-Agent System Model of a BitTorrent Network. 586-591
Mobile/Wireless/Ad-hoc Networks Track
- Zongwu Ke, Layuan Li, Nianshen Chen:
A Crossover Game Routing Algorithm for Wireless Multimedia Sensor Networks. 595-599 - Xinbo Huang, Qindong Sun:
Accuracy of an Icing On-line Monitoring System. 600-604 - Mikio Aoyama, Hiroshi Takeichi:
Adaptive Self-Organizing Overlay Network for Car-to-Car Communications. 605-610 - Seong-Yee Phang, Chee-Min Yeoh, Hoonjae Lee, Hyotaek Lim:
Multicasting Support for NEMO based on ODMRP. 611-616 - Dalju Lee, Jongmoon Baik:
QoS Protocol Verification using Petri-Net for Seamless Mobility in a Ubiquitous Environment: A Case Study. 617-622 - Fang Wang, Lisheng Ren, Guifa Teng:
The Upper Bound of Coverage on Fixed Energy Budget in Wireless Sensor Networks. 623-626 - Suwat Pattamavorakun, Wuttipol Wanarsup, Suwarin Pattamavorakun:
Omni-Directional Antenna for Wireless Access Point. 627-632
Natural Language Processing Track
- Azadeh Zamanifar, Behrouz Minaei-Bidgoli, Mohsen Sharifi:
A New Hybrid Farsi Text Summarization Technique Based on Term Co-Occurrence and Conceptual Property of the Text. 635-639 - Yuzana, Khin Marlar Tun:
Collation Strategy Based on Heuristics Chart for Myanmar Language. 640-645
Neural Networks and Genetic Algorithms Track
- Xia Zhanguo, Wang Zhixiao, Wang Ke, Guan Hongjie:
A New Model of Mine Hoist Fault Diagnosis Based on the Rough Set Theory. 649-654 - Manop Phankokkruad, Kuntpong Woraratpanya:
An Automated Decision System for Computer Adaptive Testing Using Genetic Algorithms. 655-660 - G. Subramanya Nayak, C. Puttamadappa, Akshata Kamath, B. Raja Sudeep, K. Kavitha:
Classification of Bio-Optical Signals using Soft Computing Tools. 661-663 - Abbas Sarraf Shirazi, Tahereh Seyedena:
Design of MLP using Evolutionary Strategy with Variable Length Chromosomes. 664-669 - Dong-Chul Park:
Equalization for a Wireless ATM Channel with a Recurrent Neural Network Pruned by Genetic Algorithm. 670-674
Operating Systems Track
- Guangjun Xie, Lu Qi, Feng Wang, Gang Wang, Xiaoguang Liu, Jing Liu:
ESnapII: A Writable Dependent Snapshot System with Shared Cache. 677-682
Parallel and Distributed Computing Track
- Leila Ismail, Bruce Mills, Alain Hennebelle:
A Formal Model of Dynamic Resource Allocation in Grid Computing Environment. 685-693 - Pemjit Aphimaeteethomrong, Veera Muangsin:
A Visualization Portal for a Tsunami Warning System on a Distributed Environment. 694-699 - Wei Li, Shanzhi Chen, Yaning Liu, Xin Li:
Aggregate Congestion Control for Peer-to-Peer File Sharing Applications. 700-705 - Jalal A. Nasiri, M. Amir Moulavi, Sepideh Nazemi Gelyan, Hossein Deldari, Hadi Sadoghi Yazdi, A. Eshghi Shargh:
An Efficient Parallel Eye Detection Algorithm on Facial Color Images. 706-711 - Montri Wiboonrat:
An Optimal Data Center Availability and Investment Trade-Offs. 712-719 - Maruf Ahmed, Sharif M. H. Chowdhury, Masud Hasan:
Fast Preemptive Task Scheduling Algorithm for Homogeneous and Heterogeneous Distributed Memory Systems. 720-725 - Zulkarnain Md Ali, Mohamed Othman, Mohd Rushdan Mohd Said, Md Nasir Sulaiman:
Implementation of Parallel Algorithms for LUC Cryptosystem. 726-731 - Jacek Blazewicz, Marta Kasprzak, Aleksandra Swiercz, Marek Figlerowicz, Piotr Gawron, Darren Platt, Lukasz Szajkowski:
Parallel Implementation of the Novel Approach to Genome Assembly. 732-737
Service Oriented Computing Track
- Rujuan Liu, Changjun Hu, Chongchong Zhao:
Model Checking for Web Service Flow Based on Annotated OWL-S. 741-746 - Bo Cheng, Xiaoyan Shen, Xiangwu Meng, Junliang Chen:
Web Services Communication Model in Telecom Domain. 747-752 - Reza Meimandi Parizi, Abdul Azim Abdul Ghani:
An Ensemble of Complexity Metrics for BPEL Web Processes. 753-758 - Chen-Liang Fang, Deron Liang, Fengyi Lin, Chien-Cheng Lin:
A Preliminary Study on Portable Interceptor Mechanism to SOAP. 759-764 - Natee Artaiam, Twittie Senivongse:
Enhancing Service-Side QoS Monitoring for Web Services. 765-770
Software Specification and Architecture Track
- Md Forhad Rabbi, Khan Olid Bin Mannan:
A Review of Software Risk Management for Selection of Best Tools and Techniques. 773-778 - Durga Prasad Kakollu, B. D. Chaudhary:
A Z-Specification of Classification and Relationships between Usecases. 779-784 - Muhammad Rofi Imtihan, Mohd. Salihin Ngadiman, Habibollah Haron:
An Alternative Model for ERP Maintenance Strategy. 785-793 - Inggriani Liem, Yohanes Nugroho:
An Application Generator Framelet. 794-799 - M. Ben Swarup, P. Seetha Ramaiah:
An Approach to Modeling Software Safety. 800-806 - Cyrille Artho, Watcharin Leungwattanakit, Masami Hagiya, Yoshinori Tanabe:
Architecture-aware Partial Order Reduction to Accelerate Model Checking of Networked Programs. 807-813 - P. Seetha Ramaiah, M. Ben Swarup, K. Raja Kumar:
Conceptual Modeling for Safety Critical Computer Systems. 814-819 - Kevin Li, Dwight Deugo:
Eclipse Project and Resource Tracking Plug-in. 820-827 - Chengwan He, Zheng Li, Keqing He:
Identification and Extraction of Design Pattern Information in Java Program. 828-834 - Guan Hongjie, Meng Fan-rong, Xia Zhanguo:
Research on UML-based Modeling of Workflow Manage System. 835-839 - Jongmyung Choi, Hyun-Joo Moon:
Software Engineering Issues in Developing a Context-aware Exhibition Guide System. 840-845 - Kyungeun Park, Yanggon Kim, Juno Chang, Dae Woong Rhee, Jinkyu Lee:
The Prototype of the Massive Events Streams Service Architecture and its Application. 846-851 - Cyrille Artho, Watcharin Leungwattanakit, Masami Hagiya, Yoshinori Tanabe:
Tools and Techniques for Model Checking Networked Programs. 852-857 - Siti Zaiton Mohd Hashim, Mardiyono, Wan M. N. Wan-Kadir, Nurulhaini Anuar:
Multi Readers Detection in Adaptive RFID Middleware. 858-863
Software Testing Track
- Supaporn Kansomkeat, Jeff Offutt, Aynur Abdurazik, Andrea Baldini:
A Comparative Evaluation of Tests Generated from Different UML Diagrams. 867-872 - Saeed Parsa, Mojtaba Vahidi-Asl, Somaye Arabi Naree:
Finding Causes of Software Failure Using Ridge Regression and Association Rule Generation Methods. 873-878 - Philip Samuel, Anju Teresa Joseph:
Test Sequence Generation from UML Sequence Diagrams. 879-887 - Rachid Bouaziz, Ismail Berrada:
Testing Component-Based Real Time Systems. 888-894 - Pattara Leelaprute, Takafumi Matsuo, Tatsuhiro Tsuchiya, Tohru Kikuno:
Detecting Feature Interactions in Home Appliance Networks. 895-903
Visual and Multimedia Computing Track
- Xiangbin Shi, Du Ling, Liu Fang, Li Bao-long, Xian-min Chen:
A Traffic Modeling Method for MMOG. 907-911 - Xiangbin Shi, Liu Fang, Du Ling, Bao Siqin, Xian-min Chen:
An Algorithm of Level of Detail Terrain. 912-916 - Xiangbin Shi, Wang Yue, Li Qiang, Du Ling, Liu Fang:
An Interest Management Mechanism Based on N-Tree. 917-922
Web-Based Applications Track
- Sungchae Lim, Joonseon Ahn:
A Hierarchical Cache Scheme for the Large-scale Web Search Engine. 925-930 - Nipat Jongsawat, Pittaya Poompuang, Wichian Premchaiswadi:
Dynamic Data Feed to Bayesian Network Model and SMILE Web Application. 931-936 - Sukanya Suwisuthikasem, Songsri Tangsripairoj:
E-Tax Invoice System Using Web Services Technology: A Case Study of the Revenue Department of Thailand. 937-942 - Chenghong Zhang, Songran Liu, Zhengchuan Xu, Zhuojun Gu, Xiaoling Wang:
Knowledge Representation and Query Process Based-on Semantic Web Technologies. 943-948 - Priyanka Tripathi, M. Kumar, Namita Shrivastava:
Ranking of Indian E-commerce Web-applications by Measuring Quality Factors. 949-954 - Fang Wang, Guifa Teng, Lisheng Ren, Jianbin Ma:
Research on Mechanism of Agricultural FAQ Retrieval Based on Ontology. 955-958 - Wuttipol Wanarsup, Suwarin Pattamavorakun, Suwat Pattamavorakun:
Intelligent Personalization Job Web Site. 959-964
Papers Presented at SNPD'07
- Junyuan Yang, Fengqin Zhang, Xiaoyan Wang:
A Class of SIR Epidemic Model with Saturation Incidence and Age of Infection. 967-970 - Xiaoyue Wang, Zhen Hua, Rujiang Bai:
A Hybrid Text Classification Model based on Rough Sets and Genetic Algorithms. 971-977
Paper Presented at ICIS'08
- Belaid Saad, Francine Herrmann, Yann Lanuel, Thomas Tamisier:
Mixing Protocol based on the Cooperation and the Parallelism for the Distributed Environment. 981-986
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.