RADON TRANSFORMATION AND PRINCIPAL COMPONENT ANALYSIS METHOD APPLIED IN POSTAL ADDRESS RECOGNITION TASK

Author(s): Mirosław Miciak
Volume: 7
Issue: 3
Year: 2010





DISCONTINUITY IN SVD EMBEDDING MAPPING USED FOR WATERMARKS

Author(s): Kazuo Ohzeki, | Yuki Seo, | Engyoku Gi
Volume: 7
Issue: 3
Year: 2010





A MULTIMEDIA DATABASE SERVER: IMPLEMENTATION AND FUNCTIONS

Author(s): Cosmin Stoica Spahiu
Volume: 7
Issue: 3
Year: 2010





THE SIMULATION OF THE IMPACT OF THE POLLUTION FACTORS ON THE PHYSICAL AND CHEMICAL PARAMETERS OF THE AIR QUALITY ALONG THE ROMANIAN COAST OF BLACK SEA USING NEURAL MODELS.

Author(s): Nicolae Tudoroiu, | Gabriela Neacsu, | Tiberiu Letia, | Nicolae Ilias, | Roxana-Elena Tudoroiu
Volume: 7
Issue: 3
Year: 2010





COLLUSION-RESISTANT FINGERPRINTS BASED ON REAL SUPERIMPOSED CODES

Author(s): Valery Korzhik, | Anton Ushmotkin, | Artem Razumov, | Guillermo Morales-Luna, | Irina Marakova-Begoc
Volume: 7
Issue: 3
Year: 2010





AN OBJECT ORIENTED GRAPH APPROACH FOR IMAGE REPRESENTATION AND QUERY BASED ON CONTENT

Author(s): Eugen Ganea, | Marius Brezovan
Volume: 7
Issue: 3
Year: 2010





EXPLOITING AUDIO-VISUAL CORRELATION BY MEANS OF GAZE TRACKING

Author(s): Bartosz Kunka, | Bozena Kostek
Volume: 7
Issue: 3
Year: 2010





STRUCTURE BASED FEATURE EXTRACTION IN BASKETBALL ZONE-DEFENSE STRATEGIES

Author(s): Aihua Zheng, | Jixin Ma, | Miltos Petridis, | Jin Tang, | Bin Luo
Volume: 7
Issue: 3
Year: 2010





CHARACTERIZING APPLICATION ATTENTIVENESS TO ITS USERS: A METHOD AND POSSIBLE USE CASES

Author(s): Milan Z. Bjelica, | Nikola Teslić
Volume: 7
Issue: 3
Year: 2010





HUMAN-COMPUTER INTERFACE BASED ON VISUAL LIP MOVEMENT AND GESTURE RECOGNITION

Author(s): Piotr Dalka, | Andrzej Czyzewski
Volume: 7
Issue: 3
Year: 2010





Mechanized Cultural Reasoning as a Tool to Assess Trust in Virtual Enterprises

Author(s): Jacques Calmet, | Pierre Maret | Marvin Schneider
Volume: 7
Issue: 2
Year: 2010





A Framework for Manual Ontology Engineering for Management of Learning Material Repository

Author(s): Plaban Kumar Bhowmick, | Devshri Roy, | Sudeshna Sarkar, | Anupam Basu
Volume: 7
Issue: 2
Year: 2010





Information Integration in Searchy: An Ontology and Web Services Based Approach

Author(s): David F. Barrero, | María D. R-Moreno
Volume: 7
Issue: 2
Year: 2010





Selecting Effective Expansion Terms for Better Information Retrieval

Author(s): Hazra Imran | Aditi Sharan
Volume: 7
Issue: 2
Year: 2010





Achieving Maturity: the State of Practice in Ontology Engineering in 2009.

Author(s): E. Simperl, | M. Mochol | T. . Bürger
Volume: 7
Issue: 1
Year: 2010





Ontology Based User Modeling for Personalized Information Access.

Author(s): P. K. Bhawmick, | S. Sarkar | . Basu
Volume: 7
Issue: 1
Year: 2010





Semantic Web Prefetching Scheme using Naïve Bayes Classifier.

Author(s): P. Venketesh, | R.. Venkatesan | L. Arunprakash
Volume: 7
Issue: 1
Year: 2010





Automatic Language Identification: An Alternative Unsupervised Approach Using a New Hybrid Algorithm.

Author(s): A. Amine, | Z. Elberrichi | M. Simonet
Volume: 7
Issue: 1
Year: 2010





Ontology Based Approach for Finding the Similarity Among Questions in a Distributed Question Bank Scenario.

Author(s): R. Ramesh | M. Sasikumar
Volume: 7
Issue: 1
Year: 2010





A method for creating entreprise architecture metamodels applied to systems modifiability.

Author(s): Robert Lagerstorm, | Ulrik Franke, | Pontus Johnson | Johan Ullberg
Volume: 6
Issue: 5
Year: 2009





Efficient skyline refinement using trade-offs respecting don’t care attributes.

Author(s): Christoph Lofi | Wolf-Tilo Balke
Volume: 6
Issue: 5
Year: 2009





Protecting agents from malicious hosts using TPM.

Author(s): Antonio Muñoz, | Antonio Maña | Daniel Serrano
Volume: 6
Issue: 5
Year: 2009





3MSF: A framework to select mobile office devices.

Author(s): Carlos Cares | Xavier Franch
Volume: 6
Issue: 5
Year: 2009





Integration of domain-specific modelling languages and UML through UML profile extension mechanism.

Author(s): Giovanni Giachetti, B | eatriz Marin | Oscar Pastor
Volume: 6
Issue: 5
Year: 2009





A pattern-based method for building requirements documents in call-for-tender processes.

Author(s): Samuel Renault, | Oscar Mendez-Bonilla, | Xavier Franch, | Carme Quer
Volume: 6
Issue: 5
Year: 2009





e3alignment: Exploring inter-organizational alignment in net worked value constellations.

Author(s): Vincent Pijpers, | Jaap Gordijn | Hans Akkermans
Volume: 6
Issue: 5
Year: 2009





DESIGN OF RECONFIGURABLE IMAGE ENCRYPTION PROCESSOR USING 2-D CELLULAR AUTOMATA GENERATOR.

Author(s): Machhout Mohsen | Guitouni Zied | Zeghid Medien | Tourki Rached
Volume: 6
Issue: 4
Year: 2009





DYNAMIC RECONFIGURATION OF WIRELESS SENSOR NETWORKS.

Author(s): Koustubh Kulkarni | Sudip Sanyal | Hameed Al-Qaheri | Sugata Sanyal
Volume: 6
Issue: 4
Year: 2009





THE FEATURE ORIENTED REUSE METHOD WITH BUSINESS COMPONENT SEMANTICS.

Author(s): Marcel Fouda Ndjodo | Amougou Ngoumou
Volume: 6
Issue: 4
Year: 2009





A METHODOLOGY FOR COMPARING SERVICE POLICIES USING A TRUST MODEL.

Author(s): Henry Hexmoor
Volume: 6
Issue: 4
Year: 2009





A Fault Management and Monitoring Mechanism for Secure Medical Sensor Network.

Author(s): Hayoung Oh, | Inshil Doh, | Kijoon Chae
Volume: 6
Issue: 3
Year: 2009





Mobile Node Authentication Protocol for Proxy Mobile.

Author(s): Jungwook Song, | Sunyoung Han
Volume: 6
Issue: 3
Year: 2009





Novel Authentication & Authorization Management for Sensitive Information Privacy Protection Using Dynamic Key Based Group Key Management.

Author(s): Xianping Wu, | Huy Hoang Ngo, | Phu Dung Le, | Balasubramaniam Srinivasan
Volume: 6
Issue: 3
Year: 2009





A More Secure MFE Multivariate Public Key Encryption Scheme

Author(s): Xin Wang, | Feng Feng, | Xinmei Wang, | Qi Wang
Volume: 6
Issue: 3
Year: 2009





Editorial: Network Security and Applications

Author(s): Natarajan Meghanathan | Dhinaharan Nagamalai
Volume: 6
Issue: 3
Year: 2009





A Forensic Logging System Based on a Secure OS.

Author(s): Ilkyeun Ra, | Tae-Kyou Park
Volume: 6
Issue: 3
Year: 2009





Attack Classification Based on Data Mining Technique and Its Application for Reliable Medical Sensor Communication.

Author(s): Hayoung Oh, | Inshil Doh, | Kijoon Chae
Volume: 6
Issue: 3
Year: 2009





Improvement of Carrier Sorting Rate of Letter in Postal Logistics.

Author(s): Boo-Hyung Lee, | Jeong-Hyun Park
Volume: 6
Issue: 3
Year: 2009





The RP-Index and the CP-Index for Evaluating the Productivity of Researchers and their Communities

Author(s): Jörn Altmann, | Alireza Abbasi | Junseok Hwang
Volume: 6
Issue: 2
Year: 2009





Context-Awareness, The Missing Block of Social Networking

Author(s): Adrien Joly, | Pierre Maret | Johann Daigremont
Volume: 6
Issue: 2
Year: 2009





Agent-Based Knowledge Communities

Author(s): Pierre Maret | Jacques Calmet
Volume: 6
Issue: 2
Year: 2009





Mobile Virtual Communities for Telemedicine: Research Challenges and Opportunities

Author(s): B.J.F. van Beijnum, | P. Pawar, | C.B. Dulawan | H.J. Hermens
Volume: 6
Issue: 2
Year: 2009





Editorial: Networking Mobile Virtual Knowledge

Author(s): Jacques Calmet | Pierre Maret
Volume: 6
Issue: 2
Year: 2009





Dynamic Evacuation Architecture using Context-Aware Policy Management

Author(s): Ulrich Hofmann, | Armin Veichtlbauer | Ilka Miloucheva
Volume: 6
Issue: 2
Year: 2009





Trust and Privacy: Informal Ways to Assess Risk on Opportunistic Exchanges

Author(s): Müller Robertro Pereira Gonçalves, | Edson Dos Santos Moreira | Luciana Andréia Fondazzi Martimiano
Volume: 6
Issue: 2
Year: 2009




