The SCEAS System
Navigation Menu

Conferences in DBLP

Artificial Intelligence and Simulation (ais)
2004 (conf/ais/2004)

  1. Bernard P. Zeigler, Rajanikanth Jammalamadaka, Salil R. Akerkar
    Continuity and Change (Activity) Are Fundamentally Related in DEVS Simulation of Continuous Systems. [Citation Graph (0, 0)][DBLP]
    AIS, 2004, pp:1-13 [Conf]
  2. Norman Y. Foo, Pavlos Peppas
    Systems Theory: Melding the AI and Simulation Perspectives. [Citation Graph (0, 0)][DBLP]
    AIS, 2004, pp:14-23 [Conf]
  3. Kyungtae Lee, Kyu-Hong Shim, M. Edwin Sawan
    Unified Modeling for Singularly Perturbed Systems by Delta Operators: Pole Assignment Case. [Citation Graph (0, 0)][DBLP]
    AIS, 2004, pp:24-32 [Conf]
  4. Manabu Ichikawa, Hideki Tanuma, Yusuke Koyama, Hiroshi Deguchi
    A Disaster Relief Simulation Model of a Building Fire. [Citation Graph (0, 0)][DBLP]
    AIS, 2004, pp:33-41 [Conf]
  5. Ko Ishiyama, Shusuke Komuro, Hideki Tanuma, Yusuke Koyama, Hiroshi Deguchi
    Evaluation of Transaction Risks of Mean Variance Model Under Identical Variance of the Rate of Return - Simulation in Artificial Market. [Citation Graph (0, 0)][DBLP]
    AIS, 2004, pp:42-49 [Conf]
  6. Bobby D. Gerardo, Jaewan Lee, Inho Ra, Sangyong Byun
    Association Rule Discovery in Data Mining by Implementing Principal Component Analysis. [Citation Graph (0, 0)][DBLP]
    AIS, 2004, pp:50-60 [Conf]
  7. Sungwon Jung, Yongwon Seo, Chankwon Park, Jinwoo Park
    Reorder Decision System Based on the Concept of the Order Risk Using Neural Networks. [Citation Graph (0, 0)][DBLP]
    AIS, 2004, pp:61-70 [Conf]
  8. Mi Ra Yi, Tae Ho Cho
    Simulation Modeling with Hierarchical Planning: Application to a Metal Manufacturing System. [Citation Graph (0, 0)][DBLP]
    AIS, 2004, pp:71-80 [Conf]
  9. Hyung-Jong Kim
    Vulnerability Modeling and Simulation for DNS Intrusion Tolerance System Construction. [Citation Graph (0, 0)][DBLP]
    AIS, 2004, pp:81-89 [Conf]
  10. Hyung-Woo Lee, Taekyoung Kwon, Hyung-Jong Kim
    NS-2 Based IP Traceback Simulation Against Reflector Based DDoS Attack. [Citation Graph (0, 0)][DBLP]
    AIS, 2004, pp:90-99 [Conf]
  11. Hye Sun Park, Eun Yi Kim, Sang Su Jang, Hang Joon Kim
    Recognition of Human Action for Game System. [Citation Graph (0, 0)][DBLP]
    AIS, 2004, pp:100-108 [Conf]
  12. So-Hee Park, Jae-Hoon Nah, Kyo-Il Chung
    The Implementation of IPsec-Based Internet Security System in IPv4/IPv6 Network. [Citation Graph (0, 0)][DBLP]
    AIS, 2004, pp:109-116 [Conf]
  13. Fernando J. Barros
    Describing the HLA Using the DFSS Formalism. [Citation Graph (0, 0)][DBLP]
    AIS, 2004, pp:117-127 [Conf]
  14. Jae-Hyun Kim, Tag Gon Kim
    Proposal of High Level Architecture Extension. [Citation Graph (0, 0)][DBLP]
    AIS, 2004, pp:128-137 [Conf]
  15. Jong Sik Lee
    High Performance Modeling for Distributed Simulation. [Citation Graph (0, 0)][DBLP]
    AIS, 2004, pp:138-146 [Conf]
  16. Seung-Lyeol Cha, Thomas W. Green, Chong-Ho Lee, Cheong Youn
    The Hierarchical Federation Architecture for the Interoperability of ROK and US Simulations. [Citation Graph (0, 0)][DBLP]
    AIS, 2004, pp:147-156 [Conf]
  17. Suhn-beom Kwon, Kyung-shik Shin
    PPSS: CBR System for ERP Project Pre-planning. [Citation Graph (0, 0)][DBLP]
    AIS, 2004, pp:157-166 [Conf]
  18. Jong-Kun Lee
    A Scheduling Analysis in FMS Using the Transitive Matrix. [Citation Graph (0, 0)][DBLP]
    AIS, 2004, pp:167-178 [Conf]
  19. Jai Hyun Seu, Byung-Keun Song, Heung Shik Kim
    Simulation of Artificial Life Model in Game Space. [Citation Graph (0, 0)][DBLP]
    AIS, 2004, pp:179-187 [Conf]
  20. Seung-Hun Yoo, Tae-Dong Lee, Chang-Sung Jeong
    An Extensible Framework for Advanced Distributed Virtual Environment on Grid. [Citation Graph (0, 0)][DBLP]
    AIS, 2004, pp:188-197 [Conf]
  21. Kyoichi Kjima, Hisao Hirata
    Diffusion of Word-of-Mouth in Segmented Society: Agent-Based Simulation Approach. [Citation Graph (0, 0)][DBLP]
    AIS, 2004, pp:198-206 [Conf]
  22. Sun Park, Sang Ho Park, Ju-Hong Lee, Jung-sik Lee
    E-mail Classification Agent Using Category Generation and Dynamic Category Hierarchy. [Citation Graph (0, 0)][DBLP]
    AIS, 2004, pp:207-214 [Conf]
  23. Takahiro Kitakubo, Yusuke Koyama, Hiroshi Deguchi
    The Investigation of the Agent in the Artificial Market. [Citation Graph (0, 0)][DBLP]
    AIS, 2004, pp:215-223 [Conf]
  24. Hoon Jin, In-Cheol Kim
    Plan-Based Coordination of a Multi-agent System for Protein Structure Prediction. [Citation Graph (0, 0)][DBLP]
    AIS, 2004, pp:224-232 [Conf]
  25. Javier Ameghino, Gabriel A. Wainer
    Using Cell-DEVS for Modeling Complex Cell Spaces. [Citation Graph (0, 0)][DBLP]
    AIS, 2004, pp:233-242 [Conf]
  26. Moon Ho Hwang, Feng Lin
    State Minimization of SP-DEVS. [Citation Graph (0, 0)][DBLP]
    AIS, 2004, pp:243-252 [Conf]
  27. Sangjoon Park, Kwanjoong Kim
    DEVS Formalism: A Hierarchical Generation Scheme. [Citation Graph (0, 0)][DBLP]
    AIS, 2004, pp:253-261 [Conf]
  28. Naoki Konno, Kyoichi Kijima
    Does Rational Decision Making Always Lead to High Social Welfare?. [Citation Graph (0, 0)][DBLP]
    AIS, 2004, pp:262-269 [Conf]
  29. Sumit Ghosh
    Large-Scale Systems Design: A Revolutionary New Approach in Software Hardware Co-design. [Citation Graph (0, 0)][DBLP]
    AIS, 2004, pp:270-274 [Conf]
  30. Ki Jung Hong, Tag Gon Kim
    Timed I/O Test Sequences for Discrete Event Model Verification. [Citation Graph (0, 0)][DBLP]
    AIS, 2004, pp:275-284 [Conf]
  31. Liu Baohong, Kedi Huang
    A Formal Description Specification for Multi-resolution Modeling (MRM) Based on DEVS Formalism. [Citation Graph (0, 0)][DBLP]
    AIS, 2004, pp:285-294 [Conf]
  32. Jonghwa Choi, Soonyong Choi, Dongkyoo Shin, Dongil Shin
    Research and Implementation of the Context-Aware Middleware Based on Neural Network. [Citation Graph (0, 0)][DBLP]
    AIS, 2004, pp:295-303 [Conf]
  33. Ho-Joon Park, Chang-Hoon Lee
    An Efficient Real-Time Middleware Scheduling Algorithm for Periodic Real-Time Tasks. [Citation Graph (0, 0)][DBLP]
    AIS, 2004, pp:304-312 [Conf]
  34. Ki-Hyung Kim, Sang-Ryoul Han
    Mapping Cooperating GRID Applications by Affinity for Resource Characteristics. [Citation Graph (0, 0)][DBLP]
    AIS, 2004, pp:313-322 [Conf]
  35. Won Young Lee, Hee Suk Seo, Tae Ho Cho
    Modeling of Policy-Based Network with SVDB. [Citation Graph (0, 0)][DBLP]
    AIS, 2004, pp:323-332 [Conf]
  36. Sungjun Lim, Haengrae Cho
    Timestamp Based Concurrency Control in Broadcast Disks Environment. [Citation Graph (0, 0)][DBLP]
    AIS, 2004, pp:333-341 [Conf]
  37. Soo-Hyun Park, Soo Young Shin, Gyoo Gun Lim
    Active Information Based RRK Routing for Mobile Ad Hoc Network. [Citation Graph (0, 0)][DBLP]
    AIS, 2004, pp:342-350 [Conf]
  38. Heejung Chang, Kangsun Lee
    Applying Web Services and Design Patterns to Modeling and Simulating Real-World Systems. [Citation Graph (0, 0)][DBLP]
    AIS, 2004, pp:351-359 [Conf]
  39. Jeong-Oog Lee, Myeong-Cheol Ko, Hyun-Kyu Kang
    Ontology Based Integration of Web Databases by Utilizing Web Interfaces. [Citation Graph (0, 0)][DBLP]
    AIS, 2004, pp:360-369 [Conf]
  40. Ki-Hyung Kim, Won-Seok Kang
    A Web Services-Based Distributed Simulation Architecture for Hierarchical DEVS Models. [Citation Graph (0, 0)][DBLP]
    AIS, 2004, pp:370-379 [Conf]
  41. Jong-Keun Lee, Min-Woo Lee, Jang-Se Lee, Sung-Do Chi, Syng-Yup Ohn
    Automated Cyber-attack Scenario Generation Using the Symbolic Simulation. [Citation Graph (0, 0)][DBLP]
    AIS, 2004, pp:380-389 [Conf]
  42. Yun Bae Kim, Heesang Lee, Hoo-Gon Choi
    A Discrete Event Simulation Study for Incoming Call Centers of a Telecommunication Service Company. [Citation Graph (0, 0)][DBLP]
    AIS, 2004, pp:390-399 [Conf]
  43. Sugjoon Yoon, Jaechun No, Jon Ahn
    Requirements Analysis and a Design of Computational Environment for HSE (Human-Sensibility Ergonomics) Simulator. [Citation Graph (0, 0)][DBLP]
    AIS, 2004, pp:400-408 [Conf]
  44. Kyoung-jae Kim, Hyunchul Ahn
    Using a Clustering Genetic Algorithm to Support Customer Segmentation for Personalized Recommender Systems. [Citation Graph (0, 0)][DBLP]
    AIS, 2004, pp:409-415 [Conf]
  45. Norman Y. Foo, Pavlos Peppas
    System Properties of Action Theories. [Citation Graph (0, 0)][DBLP]
    AIS, 2004, pp:416-427 [Conf]
  46. Sung Hoon Jung, Kwang-Hyun Cho
    Identification of Gene Interaction Networks Based on Evolutionary Computation. [Citation Graph (0, 0)][DBLP]
    AIS, 2004, pp:428-439 [Conf]
  47. Miyoung Shin, Amrit L. Goel
    Modeling Software Component Criticality Using a Machine Learning Approach. [Citation Graph (0, 0)][DBLP]
    AIS, 2004, pp:440-448 [Conf]
  48. Byungsun Ko, Jainyun Park
    Component Architecture Redesigning Approach Using Component Metrics. [Citation Graph (0, 0)][DBLP]
    AIS, 2004, pp:449-459 [Conf]
  49. Chul Jin Kim, Eun Sook Cho
    A Workflow Variability Design Technique for Dynamic Component Integration. [Citation Graph (0, 0)][DBLP]
    AIS, 2004, pp:460-469 [Conf]
  50. JuHum Kwon, Chang-Joo Moon, Soo-Hyun Park, Doo-Kwon Baik
    Measuring Semantic Similarity Based on Weighting Attributes of Edge Counting. [Citation Graph (0, 0)][DBLP]
    AIS, 2004, pp:470-480 [Conf]
  51. Ki-Ryong Kwon, Seong Geun Kwon, Suk Hwan Lee
    3D Watermarking Shape Recognition System Using Normal Vector Distribution Modelling. [Citation Graph (0, 0)][DBLP]
    AIS, 2004, pp:481-489 [Conf]
  52. Ho Seok Moon, Myung Ho Sohn, Dong-Sik Jang
    DWT-Based Image Watermarking for Copyright Protection. [Citation Graph (0, 0)][DBLP]
    AIS, 2004, pp:490-497 [Conf]
  53. Sungshik Koh, Chung Hwa Kim
    Cropping, Rotation and Scaling Invariant LBX Interleaved Voice-in-Image Watermarking. [Citation Graph (0, 0)][DBLP]
    AIS, 2004, pp:498-507 [Conf]
  54. SangHak Lee, Tae-Choong Chung
    Data Aggregation for Wireless Sensor Networks Using Self-organizing Map. [Citation Graph (0, 0)][DBLP]
    AIS, 2004, pp:508-517 [Conf]
  55. Sangho Lee, KyungOh Ohn, Haengrae Cho
    Feasibility and Performance Study of a Shared Disks Cluster for Real-Time Processing. [Citation Graph (0, 0)][DBLP]
    AIS, 2004, pp:518-527 [Conf]
  56. Eunmi Choi, Dugki Min
    A Web Cluster Simulator for Performance Analysis of the ALBM Cluster System. [Citation Graph (0, 0)][DBLP]
    AIS, 2004, pp:528-537 [Conf]
  57. Gu Su Kim, Kyoung-in Kim, Young Ik Eom
    Dynamic Load Balancing Scheme Based on Resource Reservation for Migration of Agent in the Pure P2P Network Environment. [Citation Graph (0, 0)][DBLP]
    AIS, 2004, pp:538-546 [Conf]
  58. Kee-Koo Kwon, Man-Seok Yang, Jin-Suk Ma, Sung-Ho Im, Dong-Sun Lim
    Application of Feedforward Neural Network for the Deblocking of Low Bit Rate Coded Images. [Citation Graph (0, 0)][DBLP]
    AIS, 2004, pp:547-555 [Conf]
  59. Min-Suk Jung, Jonghoon Eom, Sang-Ryul Ryu, Sung-Ho Kim
    A Dynamic Bandwidth Allocation Algorithm with Supporting QoS for EPON. [Citation Graph (0, 0)][DBLP]
    AIS, 2004, pp:556-564 [Conf]
  60. Jae-Kyung Kim, Won-Sung Sohn, Beom-Joon Cho, Soon-Bum Lim, Yoon-Chul Choy
    A Layered Scripting Language Technique for Avatar Behavior Representation and Control. [Citation Graph (0, 0)][DBLP]
    AIS, 2004, pp:565-573 [Conf]
  61. Minho Park, Paul A. Fishwick
    An Integrated Environment Blending Dynamic and Geometry Models. [Citation Graph (0, 0)][DBLP]
    AIS, 2004, pp:574-584 [Conf]
  62. Jang-Se Lee, Jung-Rae Jung, Jong Sou Park, Sung-Do Chi
    Linux-Based System Modelling for Cyber-attack Simulation. [Citation Graph (0, 0)][DBLP]
    AIS, 2004, pp:585-596 [Conf]
  63. Siheung Kim, Seong-Jin Ahn, Jinwok Chung, Ilsung Hwang, Sunghe Kim Minki No, Seungchung Sin
    A Rule Based Approach to Network Fault and Security Diagnosis with Agent Collaboration. [Citation Graph (0, 0)][DBLP]
    AIS, 2004, pp:597-606 [Conf]
  64. Jong Sou Park, Khin Mi Mi Aung
    Transient Time Analysis of Network Security Survivability Using DEVS. [Citation Graph (0, 0)][DBLP]
    AIS, 2004, pp:607-616 [Conf]
  65. Taekyong Nam, Ho Gyun Lee, Chi-Yoon Jeong, Chimoon Han
    A Harmful Content Protection in Peer-to-Peer Networks. [Citation Graph (0, 0)][DBLP]
    AIS, 2004, pp:617-626 [Conf]
  66. Jae-Woo Lee
    Security Agent Model Using Interactive Authentication Database. [Citation Graph (0, 0)][DBLP]
    AIS, 2004, pp:627-634 [Conf]
  67. Ryo Sato
    Discrete-Event Semantics for Tools for Business Process Modeling in Web-Service Era. [Citation Graph (0, 0)][DBLP]
    AIS, 2004, pp:635-644 [Conf]
  68. Dugki Min, Eunmi Choi
    An Architecture Modelling of a Workflow Management System. [Citation Graph (0, 0)][DBLP]
    AIS, 2004, pp:645-654 [Conf]
  69. Jae-Woo Lee
    Client Authentication Model Using Duplicated Authentication Server Systems. [Citation Graph (0, 0)][DBLP]
    AIS, 2004, pp:655-662 [Conf]
  70. Donghoon Lee, Byoung-Hyun Ju, Kyungsook Han
    Dynamic Visualization of Signal Transduction Pathways from Database Information. [Citation Graph (0, 0)][DBLP]
    AIS, 2004, pp:663-672 [Conf]
  71. Min Hong, Anis Kairmpour-fard, Steve Russell, Lawrence Hunter
    Integrated Term Weighting, Visualization, and User Interface Development for Bioinformation Retrieval. [Citation Graph (0, 0)][DBLP]
    AIS, 2004, pp:673-682 [Conf]
  72. Hyun-Kyu Kang, Jeong-Oog Lee, Heung Seok Jeon, Myeong-Cheol Ko, Doo-Hyun Kim, Ryum-Duck Oh, Wonseog Kang
    CONDOCS: A Concept-Based Document Categorization System Using Concept-Probability Vector with Thesaurus. [Citation Graph (0, 0)][DBLP]
    AIS, 2004, pp:683-691 [Conf]
  73. Mamadou Seck, Claudia S. Frydman, Norbert Giambiasi
    Using DEVS for Modeling and Simulation of Human Behaviour. [Citation Graph (0, 0)][DBLP]
    AIS, 2004, pp:692-698 [Conf]
  74. Maâmar El-Amine Hamri, Norbert Giambiasi, Claudia S. Frydman
    Simulation Semantics for Min-Max DEVS Models. [Citation Graph (0, 0)][DBLP]
    AIS, 2004, pp:699-708 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002