default search action
IASSE 2005: Toronto, Canada
- Richard T. Hurley, Wenying Feng:
Proceedings of the ISCA 14th International Conference on Intelligent and Adaptive Systems and Software Engineering, July 20-22, 2005, Novotel Toronto Centre, Toronto, Canada. ISCA 2005, ISBN 1-880843-55-2
Intelligent and Adaptive Systems
- Fabiano K. T. Tiba, Miriam A. M. Capretz:
SIGMA: A Multi-Agent System Architecture for Monitoring and Diagnosis in Supervisory Systems. IASSE 2005: 1-6 - Dianxun Shuai, Rui Gong, Xing Wang, Wenlan Wang, Rongrong Liu:
Autonomic Computing Based on Generalized Particle Model. IASSE 2005: 7-12 - Hsiu-Jy Ho, Wei-Ming Lin:
Job Scheduling with Real-Time Optimal Control. IASSE 2005: 13-18 - Dianxun Shuai, Rongrong Liu, Wenlan Wang, Fangliang Xue:
Self-Organizing Clustering Based on Generalized Particle Model. IASSE 2005: 19-24 - Yuhui Qiu, Fang Wang:
Improving Particle Swarm Optimizer Using the Nonlinear Simplex Method at Late Stage. IASSE 2005: 25-30 - Walter Dosch:
History Abstractions of an Interactive Frequency Table. IASSE 2005: 31-39 - Tharwat E. Alhanafy, Tarek S. Sobh, Awad H. Khalil:
Neuro Fuzzy Techniques Using MATLAB/SIMULINK Applied to Real Process. IASSE 2005: 40-45 - Ching-Tang Hsieh, Yeh-Kuang Wu, Chia-Yi Chen:
People Tracking System with Lighting Effect Estimation in Open Environment. IASSE 2005: 46-50 - George Hamer, William Perrizo:
Creating Short Length Masks using Vertical Processing. IASSE 2005: 51-54 - Lu Yang, Biplab Kumer Sarker, Virendrakumar C. Bhavsar, Harold Boley:
A Weighted-Tree Simplicity Algorithm for Similarity Matching of Partial Product Descriptions. IASSE 2005: 55-60 - Toma I. Hentea, Donald L. Gray:
Prediction of Annual Inflation Rate using Neural Networks. IASSE 2005: 61-65 - David Bell, Simone A. Ludwig, Mark Lycett:
State Specialization in a Service Discovery Ontology: A Financial Services Business Grid. IASSE 2005: 66-71 - Amal Perera, Taufik Fuadi Abidin, Masum Serazi, George Hamer, William Perrizo:
Vertical Set Square Distance Based Clustering without Prior Knowledge of K. IASSE 2005: 72-77 - Eimad Eldin Abusham, David Ngo Chek Ling, Andrew Teoh Beng Jin:
Comparing the Performance of Principal Component Analysis and RBF Network for Face Recognition using Locally Linear Embedding. IASSE 2005: 78-82 - Amer Salman, Rula Salman, Chris Alexander:
The Seventeen Distinct Symmetrical Patterns Based on Biometrics used as Security Approach. IASSE 2005: 83-88 - Ray Bachnak, Carl Steidley, Alex Sadovski, Phillipe Tissot, Zack Bowles:
Intelligent and Adaptive Water Level Prediction in Texas Coastal Waters. IASSE 2005: 89-93 - Xiangrui Wang, Narendra S. Chaudhari:
Profile Based Alignment Learning System For Language Inference. IASSE 2005: 94-99 - Abdou Youssef:
Search of Mathematical Contents: Issues And Methods. IASSE 2005: 100-105 - Archana Kodaypak, Sivarama P. Dandamudi:
One-Timer and Non-One-Timer Characterization of Web Traffic. IASSE 2005: 106-111 - Lei Guo, Nicolas D. Georganas:
Extending Agent-Based Collaborative Virtual Environment to be HLA Compliant. IASSE 2005: 112-116 - Sukumar Kamalasadan, Adel A. Ghandakly:
Multiple Fuzzy Reference Model Adaptive Controller Algorithm for Aircraft Pitch-Rate Tracking. IASSE 2005: 117-122 - Sukumar Kamalasadan, Adel A. Ghandakly:
A Neural Network Parallel Adaptive Controller Algorithm for Fighter Aircraft Pitch Rate Control. IASSE 2005: 123-128 - Hamed El-Afandi, S. Hossein Hosseini, K. Vairavan:
IWAR Protocol: An Adaptive Routing Protocol for Wireless Ad Hoc Networks. IASSE 2005: 129-133 - Francesca Arcelli Fontana, Claudia Raibulet, Francesco Tisato, Luigi Ubezio:
Designing And Exploiting The Location Concept in a Reflective Architecture. IASSE 2005: 134-139
Software Engineering
- Andy M. Connor, Stephen G. MacDonell:
Stochastic Cost Estimation and Risk Analysis in Managing Software Projects. IASSE 2005: 140-144 - Ehat Ercanli, Necati Ercan Ozgencil, Murat Kahraman Gungor:
Automated Code Generation for Database Applications. IASSE 2005: 145-150 - Masum Serazi, Amal Perera, Taufik Fuadi Abidin, George Hamer, William Perrizo:
An Api for Transparent Distributed Vertical Data Mining. IASSE 2005: 151-156 - Kaninda Musumbu:
Automatic Cheching of the Security Systems' Topologies. IASSE 2005: 157-162 - Mariana Hentea:
Improving Intrusion Awareness with a Neural Network Classifier. IASSE 2005: 163-168 - George Hamer, William Perrizo:
Secure Steganography using the Most Significant Bits. IASSE 2005: 169-173 - Christina Catley, Dorina C. Petriu, Monique Frize:
A UML Framework for Web Services-Based Clinical Decision Support. IASSE 2005: 174-179 - Scott James Williamson, Chris Liu:
An Expert System for Web Site Navigation using Client Side Scripting. IASSE 2005: 180-184 - Dilip Kumar Limbu, Andy M. Connor, Stephen G. MacDonell:
A Framework for Contextual Information Retrieval from the WWW. IASSE 2005: 185-189 - Narayan C. Debnath, Maria Alejandra Barrera, Mark Burgin, Joshua Wilson, Joseph Cropper:
Java Autotester for the Triangle Function. IASSE 2005: 190-195 - Ahmed M. Salem, Kevin Leung:
A Practical Approach for Requirements Elicitation. IASSE 2005: 196-201 - Aristides Dasso, Narayan C. Debnath, Ana Funes, Daniel Riesco, German Montejano, Robert Uzal:
Testing as Specification in Agile Methods. IASSE 2005: 202-206 - Jean Vanderdonckt, Donatien Grolaux, Peter Van Roy, Quentin Limbourg, Benoît Macq, Benoît Michel:
A Design Space for Context-Sensitive User Interfaces. IASSE 2005: 207-214 - Craig Hourie, James W. Jury, Richard T. Hurley:
A Empirical Comparison of Monte Carlo Methods for Simulating Random Variants that follow Cubic Polynomial Based Mathematical Models. IASSE 2005: 215-220 - Walter Dosch, W. L. Yeung:
High-Level Design of a Ternary Asynchronous Multiplexer. IASSE 2005: 221-228 - Sunint Saini:
Inconsistencies of CK Metrics And Proposed Methods of Removal. IASSE 2005: 229-234 - Jeff A. Stuart, Sergiu M. Dascalu, Frederick C. Harris Jr.:
Towards a Unified Approach for Cross-Platform Software Development. IASSE 2005: 235-242 - Seyed Morteza Babamir, S. Jalili:
Dynamic Analysis of Object-Oriented Programs Using State Machines and ECA Rules. IASSE 2005: 243-248 - H. M. Habib, E. R. El-Zahar:
Hzhr: A Software Package Of Finite Difference MethodsFor Two-Point Boundary Value Problems. IASSE 2005: 249-254 - Wenying Feng, Zhenhua Zhang:
Sequence Algorithms for Boundary Value Analysis with Constrained Input Parameters. IASSE 2005: 255-160 - Ahmed M. Salem:
A Tool for Test Case Generation and Evaluation. IASSE 2005: 261-265 - Stephen G. MacDonell, Kyongho Min, Andy M. Connor:
Autonomous Requirements Specification Processing using Natural Language Processing. IASSE 2005: 266-270 - Inés Bayoudh Saâdi, Yassine Jamoussi, Henda Hajjami Ben Ghézala:
Flexibility in Satisfying Intentions in a Situational Context. IASSE 2005: 271-277 - Nayanamana Samarasinghe, Stéphane S. Somé:
Generating a Domain Model from a Use Case Model. IASSE 2005: 278-
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.