|
Keynote and Plenary Lectures |
|
|
|
The Future of Intelligent Ubiquitous Computing Systems |
|
|
1 | (3) |
|
|
Who Is Responsible for Security and Privacy in the Cloud? |
|
|
4 | (1) |
|
|
The Optimizing Web: Leveraging Agent Technology for Sustainability |
|
|
5 | (4) |
|
|
Scalable Detection of Cyber Attacks |
|
|
9 | (10) |
|
|
|
|
|
An Effective Research of Emotion |
|
|
19 | (3) |
|
|
|
|
Regularization of Large Scale Total Least Squares Problems |
|
|
22 | (16) |
|
|
|
Networking and Its Applications |
|
|
|
Reliability Estimation of Delay Tolerant QoS Mobile Agent System in MANET |
|
|
38 | (10) |
|
|
|
Network Event Correlation and Semantic Reasoning for Federated Networks Protection System |
|
|
48 | (7) |
|
|
|
VAMI - A Novel Architecture for Vehicular Ambient Intelligent System |
|
|
55 | (10) |
|
|
|
A Cost Efficient Multicast Routing and Wavelength Assignment in WDM Mesh Network |
|
|
65 | (9) |
|
|
|
|
|
|
Combination of Decision Support System (DSS) for Remote Healthcare Monitoring Using a Multi-agent Approach |
|
|
74 | (11) |
|
|
|
|
MABHIDS: A New Mobile Agent Based Black Hole Intrusion Detection System |
|
|
85 | (10) |
|
|
|
Agent Based Approach for Radio Resource Optimization for Cellular Networks |
|
|
95 | (10) |
|
|
|
|
|
|
|
Influence of Database Quality on the Results of Keystroke Dynamics Algorithms |
|
|
105 | (8) |
|
|
|
A New Algorithm for Speech and Gender Recognition on the Basis of Voiced Parts of Speech |
|
|
113 | (8) |
|
|
|
Fast Feature Extractors for Palmprint Biometrics |
|
|
121 | (7) |
|
|
|
Pattern Recognition and Image Processing |
|
|
|
Handwritten Signature Recognition with Adaptive Selection of Behavioral Features |
|
|
128 | (9) |
|
|
|
Robust Algorithm for Fingerprint Identification with a Simple Image Descriptor |
|
|
137 | (8) |
|
|
|
A Method for Unsupervised Detection of the Boundary of Coarticulated Units from Isolated Speech Using Recurrence Plot |
|
|
145 | (7) |
|
|
|
|
Czech Text Segmentation Using Voting Experts and Its Comparison with Menzerath-Altmann Law |
|
|
152 | (9) |
|
|
|
|
|
On Creation of Reference Image for Quantitative Evaluation of Image Thresholding Method |
|
|
161 | (9) |
|
|
|
|
Medical Aid for Automatic Detection of Malaria |
|
|
170 | (9) |
|
|
|
|
|
|
|
Measuring Leanness and Agility Status of Iranian Food Industries Supply Chains Using Data Envelopment Analysis |
|
|
179 | (13) |
|
|
KPIs from Web Agents for Policies' Impact Analysis and Products' Brand Assessment |
|
|
192 | (10) |
|
|
|
Stochastic Local Search Approaches in Solving the Nurse Scheduling Problem |
|
|
202 | (10) |
|
|
|
Algorithmic Applications and Data Management |
|
|
|
GA Based Denoising of Impulses (GADI) |
|
|
212 | (9) |
|
|
|
Handling Write Lock Assignment in Cloud Computing Environment |
|
|
221 | (10) |
|
|
|
The Design of Active Feedback Controllers for the Generalized Projective Synchronization of Hyperchaotic Qi and Hyperchaotic Lorenz Systems |
|
|
231 | (8) |
|
Sundarapandian Vaidyanathan |
|
|
|
Parallel Hybrid SOM Learning on High Dimensional Sparse Data |
|
|
239 | (8) |
|
|
|
|
|
|
Operational Algebra for a Graph Based Semantic Web Data Model |
|
|
247 | (10) |
|
|
|
A Survey on the Semi-Structured Data Models |
|
|
257 | (10) |
|
|
|
Information and Network Security |
|
|
|
Observation-Based Fine Grained Access Control for XML Documents |
|
|
267 | (10) |
|
|
|
Controlled Access over Documents for Concepts Having Multiple Parents in a Digital Library Ontology |
|
|
277 | (9) |
|
|
|
Secret Image Sharing with Embedded Session Key |
|
|
286 | (9) |
|
|
|
|
|
|
Command and Block Profiles for Legitimate Users of a Computer Network |
|
|
295 | (10) |
|
|
Songs Authentication through Embedding a Self Generated Secure Hidden Signal (SAHS) |
|
|
305 | (9) |
|
|
|
Secure Money Transaction in NFC Enabled Mobile Wallet Using Session Based Alternative Cryptographic Techniques |
|
|
314 | (11) |
|
|
Author Index |
|
325 | |