


Остановите войну!
for scientists:


default search action
19th SAC 2004: Nicosia, Cyprus
- Hisham Haddad, Andrea Omicini, Roger L. Wainwright, Lorie M. Liebrock:
Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), Nicosia, Cyprus, March 14-17, 2004. ACM 2004, ISBN 1-58113-812-1
Keynote Address
- Gilad Bracha:
Keynote address: towards secure systems programming languages. 1-2
AI and Computational Logic and Image Analysis
- Chih-Cheng Hung, Agostinho C. Rosa, Stefano Bistarelli:
Editorial message: special track on artificial intelligence, computational logic and image analysis. 3-4 - Andreas Lanitis:
Person identification from heavily occluded face images. 5-9 - Raquel Ramos Pinho, João Manuel R. S. Tavares
:
Morphing of image represented objects using a physical methodology. 10-15 - Hiroshi Hosobe:
Hierarchical nonlinear constraint satisfaction. 16-20 - Yuichi Motai, Akio Kosaka:
Concatenate feature extraction for robust 3D elliptic object localization. 21-28 - Alexander Akimov, Pasi Fränti:
Symbol representation in map image compression. 29-34 - Dalila Boughaci, Habiba Drias:
Solving weighted Max-Sat optimization problems using a Taboo Scatter Search metaheuristic. 35-36
Agents, Interactions, Mobility, and Systems
- Henry Hexmoor, Marcin Paprzycki, Niranjan Suri:
Editorial message: special track on agents, interactions, mobility, and systems (AIMS). 37 - Paul Tarau, Elizabeth Figa:
Knowledge-based conversational agents and virtual storytelling. 39-44 - Xueguang Chen, Haigang Song:
Further extensions of FIPA Contract Net Protocol: threshold plus DoA. 45-51 - Dionisis D. Kehagias
, Andreas L. Symeonidis, Kyriakos C. Chatzidimitriou, Pericles A. Mitkas:
Information agents cooperating with heterogenous data sources for customer-order management. 52-57 - Felipe Rech Meneguzzi, Avelino F. Zorzo, Michael da Costa Móra:
Propositional planning in BDI agents. 58-63 - Yu Zhang, Richard A. Volz, Thomas R. Ioerger, John Yen:
A decision-theoretic approach for designing proactive communication in multi-agent teamwork. 64-71 - Marco Alberti, Davide Daolio, Paolo Torroni, Marco Gavanelli
, Evelina Lamma, Paola Mello:
Specification and verification of agent interaction protocols in a logic-based system. 72-78 - Patrick Vincent, Izhak Rubin:
A framework and analysis for cooperative search using UAV swarms. 79-86 - Marco M. Carvalho, Thomas B. Cowin, Niranjan Suri, Maggie R. Breedy, Kenneth M. Ford:
Using mobile agents as roaming security guards to test and improve security of hosts and networks. 87-93 - Larry Bunch, Maggie R. Breedy, Jeffrey M. Bradshaw
, Marco M. Carvalho, Niranjan Suri, Andrzej Uszok, Jack Hansen, Michal Pechoucek
, Vladimír Marík:
Software agents for process monitoring and notification. 94-100
Bioinformatics
- Warren T. Jones, Mathew J. Palakal, Jake Yue Chen:
Editorial message: special track on bioinformatics. 101 - Aditya Vailaya, Peter Bluvas, Robert Kincaid, Allan Kuchinsky, Michael L. Creech, Annette Adler:
An architecture for biological information extraction and representation. 103-110 - Francisco M. Couto
, Bruno Martins, Mário J. Silva:
Classifying biological articles using web resources. 111-115 - Jyotsna Kasturi, Raj Acharya:
Clustering of diverse genomic data using information fusion. 116-120 - Kamal Kumar
, Mathew J. Palakal, Snehasis Mukhopadhyay, Matthew J. Stephens, Huian Li:
BioMap: toward the development of a knowledge base of biomedical literature. 121-127 - Jiawu Feng, Paolo Emilio Barbano, Bud Mishra:
Time-frequency feature detection for time-course microarray data. 128-132 - Nadia Bolshakova, Francisco Azuaje, Padraig Cunningham
:
An integrated tool for microarray data clustering and cluster validity assessment. 133-137 - Osman Abul, Reda Alhajj, Faruk Polat, Ken Barker:
Finding differentially expressed genes: pattern generation using Q-values. 138-142 - AnYuan Guo:
A new framework for clustering algorithm evaluation in the domain of functional genomics. 143-146 - Alexandra M. Carvalho, Arlindo L. Oliveira, Ana T. Freitas, Marie-France Sagot:
A parallel algorithm for the extraction of structured motifs. 147-153 - Deborah K. Weisser, Judith Klein-Seetharaman:
Identification of fundamental building blocks in protein sequences using statistical association measures. 154-161 - Zhiping Wang, Mehmet M. Dalkilic, Sun Kim:
Guiding motif discovery by iterative pattern refinement. 162-166 - Robert Kincaid:
VistaClara: an interactive visualization for exploratory analysis of DNA microarrays. 167-174 - Daisuke Komura, Hiroshi Nakamura, Shuichi Tsutsumi, Hiroyuki Aburatani, Sigeo Ihara:
Multidimensional support vector machines for visualization of gene expression data. 175-179 - Hsiao Ping Lee, Yin-Te Tsai, Chuan Yi Tang:
A seriate coverage filtration approach for homology search. 180-184 - Kenneth Webb, Tony White:
Combining analysis and synthesis in a model of a biological cell. 185-190 - María A. Aviñó, Edward L. Green, Oscar Moreno:
Applications of finite fields to dynamical systems and reverse engineering problems. 191-196 - Alexandros Stamatakis, Thomas Ludwig, Harald Meier:
A fast program for maximum likelihood-based inference of large phylogenetic trees. 197-201 - Xiandong Meng, Vipin Chaudhary:
Bio-sequence analysis with cradle's 3SoCTM software scalable system on chip. 202-206 - Jacqueline Signorini, Patrick Greussay:
Object-oriented design for the specification of the blood clotting cascade: a class-structured view of bio-computing processes. 207-208 - Nan Jiang, Wendy Xinyu Wu, Ian Mitchell:
Protein threading with residue-environment matching by artificial neural networks. 209-210 - Paola Lecca
, Corrado Priami, Carlo Laudanna, Gabriela Constantin:
Predicting cell adhesion probability via the biochemical stochastic pi-calculus. 211-212
Computational Sciences
- Adrian Sandu:
Editorial message: special track on computational sciences. 213 - Dusko D. Dincov, Kevin A. Parrott:
Computational analysis of microwave heating patterns in resonant multimode cavities. 215-219 - H. Martin Bücker, Arno Rasch, Andreas Wolf:
A class of OpenMP applications involving nested parallelism. 220-224 - Mohammad Sohel Rahman, Mohammod Abul Kashem:
Degree restricted spanning trees of graphs. 225-228 - Paul van der Mark, Lex Wolters, Gerard Cats:
Using semi-lagrangian formulations with automatic code generation for environmental modeling. 229-234 - Chaitanya Belwal, Adrian Sandu, Emil M. Constantinescu
:
Adaptive resolution modeling of regional air quality. 235-239 - Valentin Masero:
New ICT applications in health care. 241-242 - Aristófanes C. Silva, Paulo Cezar Pinto Carvalho, Marcelo Gattass:
Diagnosis of lung nodule using Gini coefficient and skeletonization in computerized tomography images. 243-248 - Artur Przelaskowski:
Compression of mammograms for medical practice. 249-253 - Quming Zhou, Zhuojing Li, Jake K. Aggarwal:
Boundary extraction in thermal images by edge map. 254-258 - Jagbir S. Hooda, Erdogan Dogdu, Raj Sunderraman:
Health Level-7 compliant clinical patient records system. 259-263 - Mario Beyer, Klaus Kuhn, Christian Meiler, Stefan Jablonski, Richard Lenz:
Towards a flexible, process-oriented IT architecture for an integrated healthcare network. 264-271 - David J. Power, Eugenia A. Politou, Mark Slaymaker, Steve Harris, Andrew C. Simpson:
A relational approach to the capture of DICOM files for Grid-enabled medical imaging databases. 272-279 - Jesús S. Aguilar-Ruiz
, Raquel Costa, Federico Divina:
Knowledge discovery from doctor-patient relationship. 280-284 - Rainer Blaser, M. Schnabel, D. Mann, P. Jancke, Klaus Kuhn, Richard Lenz:
Potential prevention of medical errors in casualty surgery by using information technology. 285-290 - Jie Zhou, Liqun Li:
Regularized B-spline network and its application to heart arrhythmia classification. 291-295 - Claire Bourgeois-République, Jean-Jacques Chabrier, Pierre Collet:
Automatic fitting of cochlear implants with evolutionary algorithms. 296-300 - Traian Marius Truta, Farshad Fotouhi, Daniel C. Barth-Jones:
Disclosure risk measures for the sampling disclosure control method. 301-306 - José B. Pagador
, José Moreno, Valentin Masero
, Juan M. León-Rojas:
Active contour on the basis of inertia. 307-308 - Torsten O. Paulussen, Anja Zöller, Armin Heinzl, Lars Braubach, Alexander Pokahr, Winfried Lamersdorf:
Patient scheduling under uncertainty. 309-310
Computer Networks
- Vana Kalogeraki, Turgay Korkmaz, Kamil Saraç:
Editorial message: special track on computer networks. 311-312 - Irfan Awan, Muhammad Younas:
Analytical modelling of priority commit protocol for reliable Web applications. 313-317 - Yannis Mitsos, Fotis Andritsopoulos, Dimitrios Kagklis:
A study for provisioning of QoS web-based services to the end-user. 318-321 - Boaz Carmeli, Gidon Gershinsky, Avi Harpaz, Nir Naaman, Haim Nelken, Julian Satran, Pnina Vortman:
High throughput reliable message dissemination. 322-327 - Wanida Putthividhya, Minh Tran, Wallapak Tavanapong, Johnny S. Wong:
Core selection with end-to-end QoS support. 328-333 - Ovidiu Daescu, Raja Jothi, Balaji Raghavachari, Kamil Saraç:
Optimal placement of NAK-suppressing agents for reliable multicast: a partial deployment case. 334-338 - Steve Uhlig, Olivier Bonaventure, Vincent Magnin, Chris Rapier, Luca Deri:
Implications of the topological properties of Internet traffic on traffic engineering. 339-346 - Geyong Min, Mohamed Ould-Khaoua, Irfan-Ullah Awan, Demetres D. Kouvatsos:
Communication delay in hypercubic networks with LRD traffic. 347-351 - Damien Galand, Olivier Marcé:
A functional architecture for self-aware routers. 352-356 - Ayman I. Kayssi, Ali El-Haj-Mahmoud:
EmuNET: a real-time network emulator. 357-362 - Dimitrios Kagklis, Nicolas Liampotis
, Christos Tsakiris:
A framework for implicit and explicit service activation based on Service Level Specification. 363-368 - Josephine Antoniou
, Vasos Vassiliou, Andreas Pitsillides, George Hadjipollas, N. Jacovides:
A discrete event based simulation environment for enhanced UMTS 3rd generation networks. 369-370 - Vladimir Vukadinovic, Ljiljana Trajkovic:
RED with Dynamic Thresholds for improved fairness. 371-372
Computer Security
- Giampaolo Bella, Peter Y. A. Ryan:
Editoral message: special track on computer security. 373-374 - Michael Backes, Günter Karjoth, Walid Bagga, Matthias Schunter:
Efficient comparison of enterprise privacy policies. 375-382 - Stefano Bistarelli
, Simon N. Foley, Barry O'Sullivan:
Modeling and detecting the cascade vulnerability problem using soft constraints. 383-390 - Aleksandra Nenadic, Ning Zhang, Stephen K. Barton:
Fair certified e-mail delivery. 391-396 - Lavinia Egidi, Giovanni Porcelli:
Anonymity and certification: e-mail, a case study. 397-403 - Xinyuan Wang:
The loop fallacy and serialization in tracing intrusion connections through stepping stones. 404-411 - Stefano Zanero, Sergio M. Savaresi:
Unsupervised learning techniques for an intrusion detection system. 412-419 - Nahla Ben Amor, Salem Benferhat, Zied Elouedi:
Naive Bayes vs decision trees in intrusion detection systems. 420-424 - Ulrich Waldmann, Dirk Scheuermann, Claudia Eckert:
Protected transmission of biometric user authentication data for oncard-matching. 425-430 - Roberto Barbuti, Stefano Cataudella:
Java bytecode verification on Java cards. 431-438 - Christos Siaterlis, Basil S. Maglaris:
Towards multisensor data fusion for DoS detection. 439-446
Coordination Models, Languages and Applications
- Sascha Ossowski, Ronaldo Menezes
:
Editoral message: special track on coordination models, languages and applications. 447-448 - Andrea Omicini
, Alessandro Ricci
, Mirko Viroli, Giovanni Rimassa:
Integrating objective & subjective coordination in multi-agent systems. 449-455 - Nico Janssens, Elke Steegmans, Tom Holvoet, Pierre Verbaeten:
An agent design method promoting separation between computation and coordination. 456-461 - Antonella Di Stefano, Corrado Santoro, Giuseppe Pappalardo, Emiliano Tramontana:
Enforcing agent communication laws by means of a reflective framework. 462-468 - María-Victoria Belmonte
, Ricardo Conejo, José-Luis Pérez-de-la-Cruz, Francisco Triguero Ruiz:
A robust deception-free coalition formation model. 469-473 - Maxime Morge, Philippe Beaune:
A Negotiation Support System based on a Multi-agent System: specificity and preference relations on arguments. 474-478 - Marco Mamei, Franco Zambonelli:
Self-maintained distributed tuples for field-based coordination in dynamic networks. 479-486 - Roberto Lucchi, Gianluigi Zavattaro:
WSSecSpaces: a secure data-driven coordination service for Web Services applications. 487-491 - Theophilos A. Limniotes, George A. Papadopoulos, Farhad Arbab:
Web Services: separation of concerns: computation coordination communication. 492-497 - Jacques Wainer, Fábio de Lima Bezerra, Paulo Barthelmess:
Tucupi: a flexible workflow system based on overridable constraints. 498-502 - Davide Rossi:
Orchestrating document-based workflows with X-Folders. 503-507 - Rafael Ramírez, Andrew E. Santosa:
Concurrent and distributed programming using constraint logic programs. 508-509 - XinJun Mao, Gang Wu, Huaimin Wang:
Cooperation models for service oriented multi-agent system. 510-511
Data Mining
- Hasan M. Jamil, Rosa Meo:
Editorial message: special track on data mining. 513-514 - Paolo Palmerini, Salvatore Orlando, Raffaele Perego
:
Statistical properties of transactional databases. 515-519 - Tomás Karban, Jan Rauch, Milan Simunek:
SDS-rules and association rules. 520-524 - Alexandr A. Savinov:
Mining dependence rules by finding largest itemset support quota. 525-529 - Bart Goethals
:
Memory issues in frequent itemset mining. 530-534 - Cyrille Masson, Céline Robardet, Jean-François Boulicaut:
Optimizing subset queries: a step towards SQL-based inductive databases for itemsets. 535-539 - Salvatore Orlando, Raffaele Perego
, Claudio Silvestri:
A new algorithm for gap constrained sequence mining. 540-547 - Juan José Rodríguez, Carlos J. Alonso
:
Interval and dynamic time warping-based decision trees. 548-552 - Elena Baralis, Silvia Chiusano, Paolo Garza:
On support thresholds in associative classification. 553-558 - Marzena Kryszkiewicz:
Reducing borders of k-disjunction free representations of frequent patterns. 559-563 - Ulrich Rückert, Stefan Kramer:
Frequent free tree discovery in graph data. 564-570 - Yu Qian, Kang Zhang:
GraphZip: a fast and automatic compression method for spatial data clustering. 571-575 - Nabil R. Adam, Vandana Pursnani Janeja, Vijayalakshmi Atluri
:
Neighborhood based detection of anomalies in high dimensional spatio-temporal sensor datasets. 576-583 - Chris H. Q. Ding, Xiaofeng He:
K-nearest-neighbor consistency in data clustering: incorporating local information into global optimization. 584-589 - Malik Agyemang, Ken Barker, Reda Alhajj:
Framework for mining web content outliers. 590-594 - Hongwei Qi, Jue Wang:
A model for mining outliers from complex data sets. 595-599 - Fabrizio Silvestri, Raffaele Perego
, Salvatore Orlando:
Assigning document identifiers to enhance compressibility of Web Search Engines indexes. 600-605 - Shigeaki Sakurai, Akihiro Suyama:
Rule discovery from textual data based on key phrase patterns. 606-612 - Imad Rahal, William Perrizo:
An optimized approach for KNN text categorization using P-trees. 613-617 - Xuequn Shang, Kai-Uwe Sattler, Ingolf Geist:
SQL based frequent pattern mining without candidate generation. 618-619 - Jianzhong Chen, Mary Shapcott, Sally I. McClean, Kenneth Adamson:
Hierarchical model-based clustering of relational data with aggregates. 620-621 - Yi Lu, Shiyong Lu, Farshad Fotouhi, Youping Deng
, Susan J. Brown:
FGKA: a Fast Genetic K-means Clustering Algorithm. 622-623
Data Streams
- Jesús S. Aguilar-Ruiz
, Paul R. Cohen:
Editorial message: special track on data streams. 625 - Dan Olteanu, Tim Furche, François Bry:
An efficient single-pass query evaluator for XML data streams. 627-631 - João Gama
, Pedro Medas, Ricardo Rocha:
Forest trees for on-line data. 632-636 - Mehmed M. Kantardzic, Pedram Sadeghian, Chun Shen:
The time diversification monitoring of a stock portfolio: an approach based on the fractal dimension. 637-641 - Ole-Christoffer Granmo:
Parallel hypothesis driven video content analysis. 642-648