


default search action
3rd ICIS 2010: Chengdu, China
- Yi Peng, Gang Kou, Franz I. S. Ko, Yong Zeng, Kae-Dal Kwack:

Proceedings of the 3rd International Conference on Information Sciences and Interaction Sciences (ICIS 2010), Chengdu, China, June 23-25, 2010. IEEE 2010, ISBN 978-1-4244-7386-1 - Guangzheng Li, Huimin Lu, Tao Wang:

Modeling knowledge logical organization with Intelligent Topic Map. 1-5 - Xing Zi Nan, Li Hai Tao:

Design of ship monitoring system based on WebGIS. 6-8 - Xiaoping Li, Xiaoxing Lv, Luyang Liu, Wenbo Mei:

DiffServ-aware MPLS traffic engineering. 9-12 - Xiaoping Li, Lin Zhang, Hongjian Dong, Jianqiang Xu:

Comparative study on wavelet transform and traditional image processing. 13-17 - Xiaoping Li, Xiaoxing Lv, Wenbo Mei, Hu Xu:

Algorithm for solving time table questions based on GA. 18-21 - Xiaoping Li, Xuelin Wu, Lihua Zhang, Zhenghong Wang:

Research on clustering algorithm used to choose the villa topographic. 22-25 - Xiaoping Li, Yinxiang Li, Shuaizong Wang, Xiaoxing Lv, Lin Zhang:

Research on the mobile wireless net based on the IPv6 protocol stack. 26-29 - Meng-Long Shih, Ke-Chung Peng, Pei-Wen Wang, Shu-Hua Hsiao, G-Lun Chung:

The linkage analysis among the cultural and creative industries. 30-35 - Kelvin C. K. Wong, William K. Cheung

:
Integrating information literacy into a university information technology course: Motivations and lessons learned. 36-39 - Judith Molka-Danielsen, Luisa Panichi, Mats Deutschmann

:
Reward models for active language learning in 3D virtual worlds. 40-45 - Hanbit Park, Minsoo Hahn:

Mix brush: An interactive digital painting tool with shaking interaction and color feedback. 46-49 - Bo Zhou, Chao Wu:

Social networking interoperability through extended FOAF vocabulary and service. 50-55 - Soumen Kanrar

, Mohammad Siraj
:
Optimize broadcast in wireless mesh network. 56-59 - Suzi Seroja Sarnin, Nani Fadzlina Naim

, Wan Norsyafizan W. Muhamad
:
Performance evaluation of phase shift keying modulation technique using BCH code, Cyclic code and Hamming code through AWGN channel model in communication system. 60-65 - Hajar Mat Jani:

Benefiting from online mental status examination system and mental health diagnostic system. 66-70 - Liao Shin, Pan Yi-Chen:

Professional abilities of the employees working in digital publishing industry. 71-76 - Ho Hui-Yi, Wang Luh-Wang, Tsai Hsiu-Chuan:

Consumers' behavioral intentions of using cross-media book for E-learning. 77-82 - Wang Luh-Wang, Ho Hui-Yi:

Study on the strategy of Taiwan's digital publishing industry. 83-88 - Rekh Ram Janghel, Anupam Shukla

, Ritu Tiwari
, Rahul Kala
:
Breast cancer diagnosis using Artificial Neural Network models. 89-94 - Min Zhou, Hui Gao, Yan Fu, Da-Cheng Nie:

The research on analyzing emotional tendency of sentence based on watershed algorithm. 95-98 - Xin Yue Yang, Zhen Liu, Yan Fu:

MapReduce as a programming model for association rules algorithm on Hadoop. 99-102 - Tomás Kincl

, Pavel Strach
:
Key concerns for website quality: Reflecting on user views. 103-108 - Ahmad Shabani, Rasul Saadat

:
Examining the citations received by DOAJ's journals from ISI Web of Science's articles (2003-2008). 109-113 - Lei Wang, Ruishan Sun:

Culture influences on implementation of HILAS systems. 114-117 - Chongchong Yu, Jia Zhang, Li Tan, Jinyan Wang:

Distortion data research of bridge structure health monitoring based on LS-SVM classification. 118-123 - Xiangyun Liao, Zhiyong Yuan, Weixin Si, Zhaoliang Duan, Cheng Liu:

Research on the key technologies of virtual acupuncture simulation based on JOGL. 124-126 - Liao Shin, Mengtsung Tai:

The research of vocational high school graphic communications major student's professional competencies in Taiwan. 127-132 - Anestis A. Toptsis:

Toward an Emotion Machine-based hybrid adaptive tutoring system. 133-137 - Mengtsung Tai, Rochelle Yi-Hsuan Yang, Shin Liao:

A study of color description and cognition. 138-141 - Qianwei Bian, Zhi-ping Hu, Yuanjun He, Hongming Cai:

Bling: A new sketch based 3D model search engine. 142-147 - Bei Hu, Wenhui Zhang, Rongzhi Liu:

Research about the entrepreneurial behavior "intermittent point" based on the entrepreneurial incubation chain: A theoretical analysis framework. 148-151 - Yan Wen, Minhuan Huang, Jinjing Zhao, Xiaohui Kuang:

Implicit detection of stealth software with a local-booted virtual machine. 152-157 - Jing-Song Cui, Lijing Wang, Jing-Ting Mei, Da Zhang, Xia Wang, Yang Peng, Wu-Zhou Zhang:

CAPTCHA design based on moving object recognition problem. 158-162 - Yonglin Wang, Yiyan Fan, Aijun Jiang:

Formal semantics analysis of data flow and control flow for web composition transactions. 163-168 - Xiaofeng Song, Min Tang, Deren Chen, Ruofeng Tong:

A two step method to recover occluded part of face. 169-173 - Zhao Lu:

ontoMATCH: A probabilistic architecture for ontology matching. 174-180 - Xiaoping Li, Kai Wu:

Global consistence technology of ARP resource in distributed system. 181-186 - Ligang Hou, Xinyi Wu, Wuchen Wu:

Neural network based power estimation on chip specification. 187-190 - Rui Yang, Baolin Sun, Zhuanhua Deng, Qifei Zhang:

An Energy Entropy-based power-conserving multicast routing of ad hoc networks. 191-195 - Meng Dong, Jian Yin, Xiu Yu:

Application of randomized algorithm in key frames extraction. 196-199 - Ben-Yu Liao, Pei-Wen Wang, Yi-Jing Su, Meng-Long Shih, Chaochang Chiu, Tain-Jung Chang:

Analysis of Internet word of mouth regarding Taiwan's resort hotels. 200-204 - Yun Ling, Zhenshan Luo, Yujia Ge:

Fault-tolerant scheduling algorithm for precedence constrained tasks in grid computing systems with communication efficiency. 205-210 - Haitao Jiang, Yun Xu, YuZhong Zhao, Guoliang Chen:

A heuristic algorithm for minimum-recombinant haplotyping in pedigrees: Implementation and parallelization. 211-219 - Hongjun Li, Changjie Tang, Shaojie Qiao:

A novel predictor for moving objects. 220-223 - Wei Lai, Xiaodi Huang

:
From graph data extraction to graph layout: Web information visualization. 224-229 - Soumen Kanrar

, Mohammad Siraj
:
Traffic analysis of clustering in the mobile domain. 230-233 - Jingtao Zhou, Haicheng Yang, Mingwei Wang, Rongxia Zhang, Tao Yue, Shusheng Zhang, Rong Mo:

A survey of semantic enterprise information integration. 234-239 - Jingtao Zhou, Rong Mo, Mingwei Wang, Rongxia Zhang, Min Shi, Haicheng Yang, Tao Yue:

SDDG: Semantic desktop data grid. 240-245 - Zhenchun Huang

, Shifeng Shang:
Design and implementation of SCO-GADL - A scientific computing oriented grid workflow. 246-250 - Suthasinee Kuptabut, Ponrudee Netisopakul:

Ontology directed semantic annotation process. 251-255 - Jiuchun Ren, Chongming Zhang, Weichao Huang, Dilin Mao:

Enhancement to E-Model on standard deviation of packet delay. 256-259 - Yu Sun, Tianwei Xu, Zhiping Li:

Translating default theories to normal default theories. 260-264 - Apitep Saekow, Choompol Boonmee:

Bridging the gaps in e-government interoperability implementation: Towards a realistic approach. 265-273 - Dianchuan Jin, Xuebin Chen, Shufen Zhang:

Research on key technologies for -based network information collaborative interaction. 274-279 - Xuebin Chen, Shufen Zhang, Dianchuan Jin:

The applications and research of RBAC in Network Collaborative Environment. 280-284 - Miao Song, Peter Grogono:

Deriving software engineering requirements specification for computer graphics simulation systems through a case study. 285-291 - Da-Cheng Nie, Yan Fu, Junlin Zhou, Yu Ke Fang, Hu Xia:

Time series analysis based on enhanced NLCS. 292-295 - Wenhua Zhou, Xiaolong Chen:

The application of CS5460A chip in the multi-channel power measurement and data communication. 296-299 - Sanghyuk Lee, Yiqi Wang, Jungll Song

:
Information quantification and management with fuzzy entropy and similarity measure. 300-305 - Lyn X. L. Wang, Clement H. C. Leung:

A model for predicting image search engine behaviour. 306-311 - Alireza Faed, Afsaneh Ashouri, Chen Wu:

The efficient bond among mobile commerce, CRM and E-loyalty to maximise the productivity of companies. 312-317 - Ji Gao, Shiping Ye

:
ACMFS: An abnormal circumstance-driven self-maintenance mechanism based on flexible scheduling. 318-323 - Sang Goo Kim, Dongweon Yoon, Sang Kyu Park, Zhengyuan Xu:

Performance analysis of the MIMO zero-forcing receiver over continuous flat fading channels. 324-327 - Jung-Hong Hong, Zeal Li-Tse Su:

Spatial ranking of remote sensing images by 1-D indicator: An integrated approach of extensibility and centrality. 328-334 - Hongru Xu, Jihong Guan, Fubao Zhu:

LRIR: A hybrid semantic Web services matching approach. 335-339 - Asefeh Asemi, Zahra Sadat Hosseini, Adeleh Asemi:

A survey on the library open source software in the University of Isfahan, Iran: Viewpoint of librarians. 340-345 - Nasrin Dastranj Mamaghani, Fariborz Mousavi Madani, Farshad Hakamizadeh, Masoumeh Sadeghi:

Proposed combined framework of SOA and RUP. 346-351 - Hyun-Seok Kim, Suk Seo, Jin-Young Choi

:
Security analysis of smart card based password authentication schemes. 352-356 - Jinming Liang, Xinhua Zhang:

Periodicity of Cohen-Grossberg-type fuzzy neural networks with time-varying delays and impulses. 357-362 - Ying Cheng, Guangyuan Liu

, Huiling Zhang:
The research of EMG signal in emotion recognition based on TS and SBS algorithm. 363-366 - Soungalo Traore, Renfa Li, Fanzi Zeng:

Evaluating and Improving Wireless Local Area Networks performance. 367-372 - Chung-Hsin Liu, Po-Cheng Teng:

The safety design of the laboratory monitoring system. 373-376 - Chung-Hsin Liu, Wu-Fan Hsu:

The study of H.26x frame through firewall security. 377-380 - Chung-Hsin Liu, Sheng-Shiang Chang:

The analysis on the effectiveness for the handoff of WLAN and ZigBee. 381-385 - Chung-Hsin Liu, Jian-Yun Lo:

The study for the RFID with bluetooth positioning system. 386-391 - Chung-Hsin Liu, Wen-Yan Zeng:

The study for the extension of Bluetooth Tree network. 392-397 - Jilin Gao, Guangzhou Zeng:

Research of mobile agent workflow path dynamic programming method based on social acquaintance network. 398-402 - Y. M. Wang, Y. Li, J. B. Zheng:

A camera calibration technique based on OpenCV. 403-406 - Yongquan Wang, Zhiqing Shao, Zhongqin Bi

:
Computing invariants of hybrid system using quantifier elimination. 407-410 - Mingwei An, Zongliang Guo, Jibin Li, Tao Zhou:

Visibility detection based on traffic camera imagery. 411-414 - Hui-Yu Huang, Chun-Nan Hsiao:

An image inpainting technique based on illumination variation and structure consistency. 415-420 - Chi-Yen Yin, Jiann-Min Yang:

A scientific assessment of home networking research trends. 421-425 - Wei Su, Guangzhou Zeng:

A RBAC model considering the user reliability in workflow system. 426-430 - Caihong Ding, Jiang Lin, Fenghai Du:

Segmentation of color image contour using fuzzy cluster analysis. 431-435 - Kuo-Cheng Liu:

Semi-fragile watermarking for color image authentication and recovery. 436-440 - Lin Lu, Pei-Qi Liu:

Stduy on an improved apriori algorithm and its application in supermarket. 441-443 - Yifei Zhang, Junlin Zhou, Yan Fu:

Spectral clustering algorithm based on adaptive neighbor distance sort order. 444-447 - Ping Hao:

Steam soft-sensing for dyeing process via FCM-based multiple models. 448-451 - Hong-Yi Yan, Ping Hao:

Internet medicine information monitoring system based on focused crawler. 452-456 - Cheng-Ru Wu, Che-Wei Chang, Chiu-Chin Chen

, Cheng-Chi Chung:
Practical collaborative design systems based on the expert diagnosis model. 457-459 - Che-Wei Chang, Cheng-Ru Wu, Chia-Chun Liao, Juo-Yi Sun, Ming-Yu Chou:

Developing a decision support tool to evaluate the collaborative technology of software contractor performance. 460-464 - Seongah Chin, Chung-Yeon Lee, Jaedong Lee:

Facial expression image mapping for brain-computer interface using El type classification. 465-469 - Chaturong Sriwiroj, Kittima Mekhabuncahkit:

Adoption information visualization and task analysis in R&D laboratory work process. 470-475 - Yu Liu, Liaoliao Zeng, Yongle Lu, Leilei Li, Yingjun Pan:

A system with adaptive weight allocation algorithm for accuracy improving. 476-479 - Clarence Goh Kok Leon, Belinda Chong Chiew Meng, Ramlee bin Kamaruddin, Muhammand Rajaei

:
Improved hole detection simulation using power spectral density for the implementation of cognitive radio. 480-484 - Chung-Hung Tsai:

Earthquake risk assessment information for tourism industry. 485-490 - Huiwen Zhang, Bao-Yan Gu, Maotao Zhou:

Measurement and evaluation of competitiveness of the industrial clusters of financial services based on fuzzy comprehensive evaluation. 492-497 - Xiubin Zhou, Mingwei Wang, Jingtao Zhou:

An ontology-based framework for semantic resolution in data exchange. 498-501 - Ke Pei, Gang Zhang, Zhongjie Zhang:

Analysis of SOA-based middleware service layers for polynary resources SoC. 502-507 - Mingwei Wang, Shan Li, Jingtao Zhou, Tao Yue:

Research on collaborative product development platform based on agent and ontology. 508-511 - Jianbao Chen, Yanping Xu, Jingjie Wang:

Empirical analysis of cross-section returns in chinese stock market. 512-517 - Kyoung-Yun Kim

, Keunho Choi, Jihoon Kim, Ohbyung Kwon:
Rule selection for knowledge-based product design. 518-524 - Chin Li Tseng:

3 As strategic factors indices of Loyalty-Based CRM: Alignment, affection, and adjustment. 525-530 - Toshihiko Yamakami:

Open source software adoption patterns and organizational transition stages for software vendors. 531-535 - Toshihiko Yamakami:

Cross-boundary software engineering: Implications of engineering paradigm shift. 536-540 - Toshihiko Yamakami:

Open intermediary analysis in mobile data services: Shift from closed to open intermediary services. 541-545 - Jung-Sook Kim:

Development of the intelligent dust chamber bag control system using Case-Based reasoning. 546-551 - Cheng Xi, Yaoguang Hu, Fenggong Gao, Yan Yan:

Multivariate quality control of plastic products based on principal component analysis. 552-557 - Xin Zheng, Minghai Ye, Mingdi Jia:

Study on designing modern auto service marketing mode based on value chain theory. 558-561 - Xin Yu, Minghai Ye, Xin Zheng:

The study on the cooperation strategy between auto manufacturer and dealers based on evolutionary games theory. 562-564 - Rui Zhang, Yukun Bao, Jinlong Zhang:

Forecasting erratic demand by support vector machines with ensemble empirical mode decomposition. 567-571 - Hau-Dong Tsui, Chong-Yen Lee, Ching-Bang Yao:

E-Gov.com: Outsourcing government. 572-576 - Hiroshi Ohtaka, Koichiro Oshika, Masashi Gotou, Tsutomu Yoshitani, Yoshiaki Fukazawa:

Verification of a dependability model of IT services associated with social and economic infrastructure. 577-582 - Xinrui Yu, Suoju He, Yuan Gao, Jiajian Yang, Lingdao Sha, Yidan Zhang, Zhaobo Ai:

Dynamic difficulty adjustment of game AI for video game Dead-End. 583-587 - Yi-Sheng Huang, Yen-Liang Pan

, Jenn-Huei Lin:
An improved deadlock prevention strategy for FMSs using theory of regions. 588-593 - Chih-Lun Wu, Han-Chou Lin, Jiann-Min Yang:

A productivity review study on TRA and TAM literature using bibliometric methodology. 594-600 - Yonsik Lee, Kwangwoo Nam:

The metatable of naming agent for the naming service of sensor network. 601-604 - Yonsik Lee, Jeongsu Lee:

The migration of mobile agent using the object replication. 605-609 - Li Jin, Tao Ku, Yunlong Zhu, Hai Shen:

Integrated optimization model for three-layer distribution network design and its solution algorithm. 610-615 - Yeqing Liao, Quan Liu:

Applying dual digital watermarking technology in digital rights management. 616-619 - Liang Guo, Jianhua Gong, Jun Sun, Xiangwang Wei:

Study on GIS architecture based on SO A and RIA. 620-625 - Saeed Rashtbar, Ayaz Isazadeh, Leyli Mohammad Khanly:

A new hybrid approach for multiprocessor system scheduling with genetic algorithm and tabu search (HGTS). 626-631 - Yongkui Man, Yushuang Zhao, Chunyuan Bian, Shuangquan Wang, Hongbin Zhao:

A kind of magnetic gear with high speed ratio. 632-634 - Yongkui Man, Chunyuan Bian, Hongbin Zhao, Changcheng Xu, Shuangyan Ren:

A kind of calligraphy robot. 635-638 - Te-Jen Su, Guan-Yu Chen, Jui-Chuan Cheng, Chia-Jung Yu:

Fuzzy PID controller design using synchronous bacterial foraging optimization. 639-642 - Y.-C. Lee, P.-S. You, Y.-C. Hsieh, Ta-Cheng Chen

:
An IA-PSO approach for the optimal design of multiple-type surveillance cameras. 643-647 - J. N. Sheen:

Information security investment decision by fuzzy economics. 648-653 - Liang Liu, Liwei Liu, Shiming Li, Bo Wang, Xiaoming Wang:

Evaluation of Wenchuan earthquake management plan and its effects: A case study on the East Turbine Corporation recovery and reconstruction plan. 654-659 - Xueyan Cao, Ke Jiang, Xiaolin Li, Shiming Li:

A fast disasters assessment algorithm with fuzzy, incomplete and noisy information. 660-665 - Yu Shi, Gang Kou, Youyuan Li, Guoxun Wang, Yi Peng, Yong Shi:

FMCDM: A fuzzy multi-criteria decision-making hybrid approach to evaluate the damage level of typhoon: Integration of fuzzy AHP and fuzzy TOPSIS. 666-671 - Gang Kou, Chunwei Lou, Guoxun Wang, Yi Peng, Yu Tang, Shiming Li:

A heterogeneous information integration framework for emergency management. 672-675 - Parviz Ghorbanzadeh

, Aytak Shaddeli, Roghieh Malekzadeh, Zoleikha Jahanbakhsh-Nagadeh
:
A survey of mobile database security threats and solutions for it. 676-682 - Varun P. Gopi

, V. Suresh Babu
, M. R. Baiju
:
Scaling issues in IDDG FinFET at small gate length. 683-687 - Hong Jiang, Jinghui Ma, Qiang Li, Yanchao Yang:

Research of end effects in Hilbert-Huang transform based on genetic algorithm and support vector machine. 688-693 - Yanchao Yang, Hong Jiang, Jinghui Ma:

Design of optimal engine for cognitive radio parameters based on the DUGA. 694-698 - Buyun Xu, Danny Hughes, Ka Lok Man:

Multi-network video streaming in a campus visit scenario. 699-703 - Kyeongsu Park, Youngsung Park, Seung-Mook Kang, Dongsoong Han:

The subdivision algorithm for korean traditional stone fence creator. 704-707 - Mengtsung Tai, Shin Liao, Rochelle Yi-Hsuan Yang:

Scanning and printing resolution. 708-710 - Xing Zhong, Yi Peng, Gang Kou:

A dynamic self-adoptive genetic algorithm for personal credit risk assessment. 711-716

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














