callback( { "result":{ "query":":facetid:toc:\"db/conf/wec/wec2005feb.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"186.61" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"64", "@dc":"64", "@oc":"64", "@id":"43431423", "text":":facetid:toc:db/conf/wec/wec2005feb.bht" } }, "hits":{ "@total":"64", "@computed":"64", "@sent":"64", "@first":"0", "hit":[{ "@score":"1", "@id":"5953347", "info":{"authors":{"author":[{"@pid":"55/3692","text":"Mustafa A. Abusalah"},{"@pid":"t/JohnTait","text":"John Tait"},{"@pid":"39/6868","text":"Michael P. Oakes"}]},"title":"Literature Review of Cross Language Information Retrieval.","venue":"WEC","pages":"175-177","year":"2005","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/wec/AbusalahTO05","url":"https://dblp.org/rec/conf/wec/AbusalahTO05"}, "url":"URL#5953347" }, { "@score":"1", "@id":"5953348", "info":{"authors":{"author":[{"@pid":"77/6526","text":"Olivier Adam"},{"@pid":"23/3949","text":"Maciej Lopatka"},{"@pid":"92/931","text":"Christophe Laplanche"},{"@pid":"98/6028","text":"Jean-François Motsch"}]},"title":"Sperm Whale Signal Analysis: Comparison Using the AutoRegressive Model and the Daubechies 15 Wavelets Transform.","venue":"WEC","pages":"188-195","year":"2005","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/wec/AdamLLM05","url":"https://dblp.org/rec/conf/wec/AdamLLM05"}, "url":"URL#5953348" }, { "@score":"1", "@id":"5953352", "info":{"authors":{"author":{"@pid":"49/3358","text":"Ahmed Al-Ani"}},"title":"Ant Colony Optimization for Feature Subset Selection.","venue":"WEC","pages":"35-38","year":"2005","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/wec/Al-Ani05","url":"https://dblp.org/rec/conf/wec/Al-Ani05"}, "url":"URL#5953352" }, { "@score":"1", "@id":"5953353", "info":{"authors":{"author":{"@pid":"16/3685","text":"Mothd Belal Al-Daoud"}},"title":"A New Algorithm for Cluster Initialization.","venue":"WEC","pages":"74-76","year":"2005","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/wec/Al-Daoud05","url":"https://dblp.org/rec/conf/wec/Al-Daoud05"}, "url":"URL#5953353" }, { "@score":"1", "@id":"5953360", "info":{"authors":{"author":[{"@pid":"15/4243","text":"Muhammad Almas Anjum"},{"@pid":"62/3939","text":"Muhammad Younus Javed"},{"@pid":"28/1807","text":"Abdul Basit"}]},"title":"Face Recognition Using Double Dimension Reduction.","venue":"WEC","pages":"43-46","year":"2005","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/wec/AnjumJB05","url":"https://dblp.org/rec/conf/wec/AnjumJB05"}, "url":"URL#5953360" }, { "@score":"1", "@id":"5953364", "info":{"authors":{"author":[{"@pid":"48/5673","text":"Taheri Asghar"},{"@pid":"70/3576","text":"Mohammad Reza Tarihi"},{"@pid":"23/6929","text":"Hassan Baghgar Bostan Abad"},{"@pid":"45/1598","text":"Hassan Bababeyk"}]},"title":"Fuzzy Hidden Markov Models for Speech Recognition on Based FEM Algorithm.","venue":"WEC","pages":"59-61","year":"2005","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/wec/AsgharTAB05","url":"https://dblp.org/rec/conf/wec/AsgharTAB05"}, "url":"URL#5953364" }, { "@score":"1", "@id":"5953368", "info":{"authors":{"author":[{"@pid":"43/5003","text":"Neeta Awasthy"},{"@pid":"243/2200","text":"Jai Prakash Saini"},{"@pid":"169/3593","text":"Digvijay Singh Chauhan"}]},"title":"Mfcc APplied Independent Component Analysis (MAPICA): A New Approach to Parametric Representation of Speech.","venue":"WEC","pages":"178-181","year":"2005","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/wec/AwasthyPC05","url":"https://dblp.org/rec/conf/wec/AwasthyPC05"}, "url":"URL#5953368" }, { "@score":"1", "@id":"5953369", "info":{"authors":{"author":[{"@pid":"14/5654","text":"Fadl Mutaher Ba-Alwi"},{"@pid":"92/5402","text":"Kamal Kant Bharadwaj"}]},"title":"Discovery of Production Rules with Fuzzy Hierarchy.","venue":"WEC","pages":"77-80","year":"2005","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/wec/Ba-AlwiB05","url":"https://dblp.org/rec/conf/wec/Ba-AlwiB05"}, "url":"URL#5953369" }, { "@score":"1", "@id":"5953371", "info":{"authors":{"author":[{"@pid":"15/411","text":"Pablo Barrera"},{"@pid":"57/6888","text":"José María Cañas"},{"@pid":"74/5194","text":"Vicente Matellán"}]},"title":"Visual Object Tracking in 3D with Color Based Particle Filter.","venue":"WEC","pages":"200-203","year":"2005","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/wec/BarreraCM05","url":"https://dblp.org/rec/conf/wec/BarreraCM05"}, "url":"URL#5953371" }, { "@score":"1", "@id":"5953372", "info":{"authors":{"author":[{"@pid":"28/1807","text":"Abdul Basit"},{"@pid":"62/3939","text":"Muhammad Younus Javed"},{"@pid":"15/4243","text":"Muhammad Almas Anjum"}]},"title":"Efficient Iris Recognition Method for Human Identification.","venue":"WEC","pages":"24-26","year":"2005","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/wec/BasitJA05","url":"https://dblp.org/rec/conf/wec/BasitJA05"}, "url":"URL#5953372" }, { "@score":"1", "@id":"5953375", "info":{"authors":{"author":[{"@pid":"25/3860","text":"Ardhendu Behera"},{"@pid":"04/4239","text":"Denis Lalanne"},{"@pid":"18/2679","text":"Rolf Ingold"}]},"title":"Color and Layout-Based Identification of Documents Captured from Handheld Devices.","venue":"WEC","pages":"51-54","year":"2005","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/wec/BeheraLI05","url":"https://dblp.org/rec/conf/wec/BeheraLI05"}, "url":"URL#5953375" }, { "@score":"1", "@id":"5953376", "info":{"authors":{"author":[{"@pid":"79/1975","text":"Carlo Bellettini"},{"@pid":"82/4640","text":"Alessandro Marchetto 0001"},{"@pid":"47/31","text":"Andrea Trentini"}]},"title":"Validation of Reverse Engineered Web Application Models.","venue":"WEC","pages":"125-128","year":"2005","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/wec/BellettiniMT05","url":"https://dblp.org/rec/conf/wec/BellettiniMT05"}, "url":"URL#5953376" }, { "@score":"1", "@id":"5953377", "info":{"authors":{"author":[{"@pid":"79/1975","text":"Carlo Bellettini"},{"@pid":"82/4640","text":"Alessandro Marchetto 0001"},{"@pid":"47/31","text":"Andrea Trentini"}]},"title":"Multi-Dimensional Concerns Mining for Web Applications via Concept-Analysis.","venue":"WEC","pages":"129-132","year":"2005","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/wec/BellettiniMT05a","url":"https://dblp.org/rec/conf/wec/BellettiniMT05a"}, "url":"URL#5953377" }, { "@score":"1", "@id":"5953378", "info":{"authors":{"author":[{"@pid":"17/2814","text":"Mohammed Benbrahim"},{"@pid":"43/5022","text":"Adil Daoudi"},{"@pid":"15/6980","text":"Khalid Benjelloun"},{"@pid":"37/2910","text":"Aomar Ibenbrahim"}]},"title":"Discrimination of Seismic Signals Using Artificial Neural Networks.","venue":"WEC","pages":"4-7","year":"2005","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/wec/BenbrahimDBI05","url":"https://dblp.org/rec/conf/wec/BenbrahimDBI05"}, "url":"URL#5953378" }, { "@score":"1", "@id":"5953379", "info":{"authors":{"author":[{"@pid":"74/723","text":"Vasudha Bhatnagar"},{"@pid":"21/929","text":"Ahmed Sultan Al-Hegami"},{"@pid":"78/2996-1","text":"Naveen Kumar 0001"}]},"title":"A Hybrid Approach for Quantification of Novelty in Rule Discovery.","venue":"WEC","pages":"39-42","year":"2005","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/wec/BhatnagarAK05","url":"https://dblp.org/rec/conf/wec/BhatnagarAK05"}, "url":"URL#5953379" }, { "@score":"1", "@id":"5953384", "info":{"authors":{"author":[{"@pid":"20/4501","text":"Federico Cabitza"},{"@pid":"67/3134","text":"Bernardo Dal Seno"}]},"title":"DJess - A Knowledge-Sharing Middleware to Deploy Distributed Inference Systems.","venue":"WEC","pages":"66-69","year":"2005","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/wec/CabitzaS05","url":"https://dblp.org/rec/conf/wec/CabitzaS05"}, "url":"URL#5953384" }, { "@score":"1", "@id":"5953388", "info":{"authors":{"author":[{"@pid":"51/4242","text":"Terrence Chen"},{"@pid":"h/ThomasSHuang","text":"Thomas S. Huang"}]},"title":"Region Based Hidden Markov Random Field Model for Brain MR Image Segmentation.","venue":"WEC","pages":"233-236","year":"2005","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/wec/ChenH05","url":"https://dblp.org/rec/conf/wec/ChenH05"}, "url":"URL#5953388" }, { "@score":"1", "@id":"5953397", "info":{"authors":{"author":[{"@pid":"43/5022","text":"Adil Daoudi"},{"@pid":"17/2814","text":"Mohammed Benbrahim"},{"@pid":"15/6980","text":"Khalid Benjelloun"}]},"title":"An Intelligent System to Classify Leaks in Water Distribution Pipes.","venue":"WEC","pages":"1-3","year":"2005","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/wec/DaoudiBB05","url":"https://dblp.org/rec/conf/wec/DaoudiBB05"}, "url":"URL#5953397" }, { "@score":"1", "@id":"5953398", "info":{"authors":{"author":[{"@pid":"56/4553","text":"A. P. Dhande"},{"@pid":"99/3343","text":"V. T. Ingole"}]},"title":"Design Of 3-Valued R-S & D Flip - Flops Based on Simple Ternary Gates.","venue":"WEC","pages":"62-65","year":"2005","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/wec/DhandeI05","url":"https://dblp.org/rec/conf/wec/DhandeI05"}, "url":"URL#5953398" }, { "@score":"1", "@id":"5953406", "info":{"authors":{"author":[{"@pid":"65/1204","text":"A. K. Abd El-Aleem"},{"@pid":"51/846","text":"Waiel F. Abd El-Wahed"},{"@pid":"05/1877","text":"Nabil A. Ismail"},{"@pid":"13/775","text":"Fawzy A. Torkey"}]},"title":"Efficiency Evaluation of E-Commerce Websites.","venue":"WEC","pages":"20-23","year":"2005","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/wec/El-AleemEIT05","url":"https://dblp.org/rec/conf/wec/El-AleemEIT05"}, "url":"URL#5953406" }, { "@score":"1", "@id":"5953407", "info":{"authors":{"author":[{"@pid":"13/371","text":"Hazem M. El-Bakry"},{"@pid":"51/1660","text":"Qiangfu Zhao"}]},"title":"Sub-Image Detection Using Fast Neural Processors and Image Decomposition.","venue":"WEC","pages":"85-88","year":"2005","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/wec/El-BakryZ05","url":"https://dblp.org/rec/conf/wec/El-BakryZ05"}, "url":"URL#5953407" }, { "@score":"1", "@id":"5953408", "info":{"authors":{"author":[{"@pid":"13/371","text":"Hazem M. El-Bakry"},{"@pid":"51/1660","text":"Qiangfu Zhao"}]},"title":"Fast Pattern Detection Using Neural Networks Realized in Frequency Domain.","venue":"WEC","pages":"89-92","year":"2005","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/wec/El-BakryZ05a","url":"https://dblp.org/rec/conf/wec/El-BakryZ05a"}, "url":"URL#5953408" }, { "@score":"1", "@id":"5953413", "info":{"authors":{"author":[{"@pid":"94/967","text":"Alberto Faro"},{"@pid":"88/738","text":"Daniela Giordano"},{"@pid":"09/3541","text":"Francesco Maiorana"}]},"title":"Discovering Complex Regularities by Adaptive Self Organizing Classification.","venue":"WEC","pages":"27-30","year":"2005","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/wec/FaroGM05","url":"https://dblp.org/rec/conf/wec/FaroGM05"}, "url":"URL#5953413" }, { "@score":"1", "@id":"5953414", "info":{"authors":{"author":[{"@pid":"94/967","text":"Alberto Faro"},{"@pid":"88/738","text":"Daniela Giordano"},{"@pid":"21/3751","text":"Manuela Pennisi"},{"@pid":"67/3770","text":"Giacomo Scarciofalo"},{"@pid":"32/5543","text":"Concetto Spampinato"},{"@pid":"66/5942","text":"Francesco Tramontana"}]},"title":"A Fuzzy System to Analyze SIVD Diseases Using the Transcranial Magnetic Stimulation.","venue":"WEC","pages":"31-34","year":"2005","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/wec/FaroGPSST05","url":"https://dblp.org/rec/conf/wec/FaroGPSST05"}, "url":"URL#5953414" }, { "@score":"1", "@id":"5953416", "info":{"authors":{"author":[{"@pid":"62/1075","text":"Leon Fu"},{"@pid":"84/3791","text":"Xiangyang Xue"}]},"title":"A New Spectral-Based Approach to Query-by-Humming for MP3 Songs Database.","venue":"WEC","pages":"117-120","year":"2005","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/wec/FuX05","url":"https://dblp.org/rec/conf/wec/FuX05"}, "url":"URL#5953416" }, { "@score":"1", "@id":"5953418", "info":{"authors":{"author":{"@pid":"48/1264","text":"Irina Georgescu"}},"title":"Similarity of Fuzzy Choice Functions.","venue":"WEC","pages":"93-96","year":"2005","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/wec/Georgescu05","url":"https://dblp.org/rec/conf/wec/Georgescu05"}, "url":"URL#5953418" }, { "@score":"1", "@id":"5953420", "info":{"authors":{"author":[{"@pid":"16/1974","text":"Vincent Girondel"},{"@pid":"b/LaurentBonnaud","text":"Laurent Bonnaud"},{"@pid":"44/6708","text":"Alice Caplier"},{"@pid":"r/MicheleRombaut","text":"Michèle Rombaut"}]},"title":"Belief Theory-Based Classifiers Comparison for Static Human Body Postures Recognition in Video.","venue":"WEC","pages":"237-240","year":"2005","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/wec/GirondelBCR05","url":"https://dblp.org/rec/conf/wec/GirondelBCR05"}, "url":"URL#5953420" }, { "@score":"1", "@id":"5953429", "info":{"authors":{"author":[{"@pid":"55/2228","text":"Wen-Xiang Gu"},{"@pid":"99/6360","text":"Zeng-yu Cai"},{"@pid":"14/5922","text":"Xin-mei Zhang"},{"@pid":"32/5773","text":"Gui-dong Jiang"}]},"title":"Creating or Destroying Objects Plan in the Graphplan Framework.","venue":"WEC","pages":"16-19","year":"2005","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/wec/GuCZJ05","url":"https://dblp.org/rec/conf/wec/GuCZJ05"}, "url":"URL#5953429" }, { "@score":"1", "@id":"5953432", "info":{"authors":{"author":[{"@pid":"66/6433","text":"Moez Ben Hadj Hamida"},{"@pid":"81/5328","text":"Yahya Slimani"}]},"title":"A Patricia-Tree Approach for Frequent Closed Itemsets.","venue":"WEC","pages":"253-256","year":"2005","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/wec/HamidaS05","url":"https://dblp.org/rec/conf/wec/HamidaS05"}, "url":"URL#5953432" }, { "@score":"1", "@id":"5953433", "info":{"authors":{"author":[{"@pid":"15/7549","text":"Sébastien Harasse"},{"@pid":"b/LaurentBonnaud","text":"Laurent Bonnaud"},{"@pid":"40/355","text":"Michel Desvignes"}]},"title":"People Counting in Transport Vehicles.","venue":"WEC","pages":"221-224","year":"2005","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/wec/HarasseBD05","url":"https://dblp.org/rec/conf/wec/HarasseBD05"}, "url":"URL#5953433" }, { "@score":"1", "@id":"5953436", "info":{"authors":{"author":{"@pid":"198/4457","text":"Khalil M. El Hindi"}},"title":"Using Interval Trees for Approximate Indexing of Instances.","venue":"WEC","pages":"113-116","year":"2005","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/wec/Hindi05","url":"https://dblp.org/rec/conf/wec/Hindi05"}, "url":"URL#5953436" }, { "@score":"1", "@id":"5953439", "info":{"authors":{"author":[{"@pid":"49/752","text":"Maryam Humayun"},{"@pid":"68/734","text":"Zafar I. Malik"},{"@pid":"25/5352-4","text":"Shaukat Ali 0004"}]},"title":"PEIBM- Perceiving Emotions Using an Intelligent Behavioral Model.","venue":"WEC","pages":"133-136","year":"2005","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/wec/HumayunMA05","url":"https://dblp.org/rec/conf/wec/HumayunMA05"}, "url":"URL#5953439" }, { "@score":"1", "@id":"5953444", "info":{"authors":{"author":[{"@pid":"61/3075","text":"M. Jamali"},{"@pid":"06/6612","text":"Fattaneh Taghiyareh"}]},"title":"Generating Frequent Patterns Through Intersection Between Transactions.","venue":"WEC","pages":"164-166","year":"2005","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/wec/JamaliT05","url":"https://dblp.org/rec/conf/wec/JamaliT05"}, "url":"URL#5953444" }, { "@score":"1", "@id":"5953445", "info":{"authors":{"author":[{"@pid":"61/3075","text":"M. Jamali"},{"@pid":"06/6612","text":"Fattaneh Taghiyareh"},{"@pid":"65/248","text":"Masoud Rahgozar"}]},"title":"Fast Algorithm for Generating Association Rules with Encoding Databases Layout.","venue":"WEC","pages":"167-170","year":"2005","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/wec/JamaliTR05","url":"https://dblp.org/rec/conf/wec/JamaliTR05"}, "url":"URL#5953445" }, { "@score":"1", "@id":"5953449", "info":{"authors":{"author":[{"@pid":"12/5066","text":"Mehdi Salmani Jelodar"},{"@pid":"11/932","text":"Mohammad Javad Fadaeieslam"},{"@pid":"228/7394","text":"Nasser Mozayani"},{"@pid":"96/4508","text":"Mahlagha Fazeli"}]},"title":"A Persian OCR System Using Morphological Operators.","venue":"WEC","pages":"137-140","year":"2005","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/wec/JelodarFMF05","url":"https://dblp.org/rec/conf/wec/JelodarFMF05"}, "url":"URL#5953449" }, { "@score":"1", "@id":"5953452", "info":{"authors":{"author":[{"@pid":"94/3190","text":"Manish Kumar Jindal"},{"@pid":"l/GSLehal","text":"Gurpreet Singh Lehal"},{"@pid":"27/1197","text":"Rajendra Kumar Sharma"}]},"title":"A Study of Touching Characters in Degraded Gurmukhi Text.","venue":"WEC","pages":"121-124","year":"2005","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/wec/JindalLS05","url":"https://dblp.org/rec/conf/wec/JindalLS05"}, "url":"URL#5953452" }, { "@score":"1", "@id":"5953453", "info":{"authors":{"author":{"@pid":"39/8575","text":"Khalid A. Kaabneh"}},"title":"Indexing & Searching of Image Data in Multimedia Databases Using Axial Projection.","venue":"WEC","pages":"109-112","year":"2005","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/wec/Kaabneh05","url":"https://dblp.org/rec/conf/wec/Kaabneh05"}, "url":"URL#5953453" }, { "@score":"1", "@id":"5953458", "info":{"authors":{"author":[{"@pid":"04/1706","text":"Afnan Ullah Khan"},{"@pid":"15/2052","text":"Shahzad Khan"},{"@pid":"33/3341","text":"Waqar Mahmood"}]},"title":"MRST: A New Technique For Information Summarization.","venue":"WEC","pages":"249-252","year":"2005","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/wec/KhanKM05","url":"https://dblp.org/rec/conf/wec/KhanKM05"}, "url":"URL#5953458" }, { "@score":"1", "@id":"5953459", "info":{"authors":{"author":[{"@pid":"26/1789","text":"Mohammed Z. Khedher"},{"@pid":"92/5069","text":"Gheith A. Abandah"},{"@pid":"52/3986","text":"Ahmed M. Al-Khawaldeh"}]},"title":"Optimizing Feature Selection for Recognizing Handwritten Arabic Characters.","venue":"WEC","pages":"81-84","year":"2005","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/wec/KhedherAA05","url":"https://dblp.org/rec/conf/wec/KhedherAA05"}, "url":"URL#5953459" }, { "@score":"1", "@id":"5953460", "info":{"authors":{"author":[{"@pid":"59/1989","text":"Esmaile Khorram"},{"@pid":"70/4315","text":"S. M. Mirzababaei"}]},"title":"Finding an Optimized Discriminate Function for Internet Application Recognition.","venue":"WEC","pages":"160-163","year":"2005","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/wec/KhorramM05","url":"https://dblp.org/rec/conf/wec/KhorramM05"}, "url":"URL#5953460" }, { "@score":"1", "@id":"5953461", "info":{"authors":{"author":[{"@pid":"61/1931","text":"Seo Young Kim"},{"@pid":"41/1947","text":"Tai Myong Choi"}]},"title":"Fuzzy Types Clustering for Microarray Data.","venue":"WEC","pages":"12-15","year":"2005","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/wec/KimC05","url":"https://dblp.org/rec/conf/wec/KimC05"}, "url":"URL#5953461" }, { "@score":"1", "@id":"5953462", "info":{"authors":{"author":[{"@pid":"43/5220","text":"Jin-Hong Kim"},{"@pid":"16/3590-1","text":"Eun-Seok Lee 0001"}]},"title":"A Study of User XQuery Method for Personalization Recommendation in Semantic Web.","venue":"WEC","pages":"225-228","year":"2005","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/wec/KimL05","url":"https://dblp.org/rec/conf/wec/KimL05"}, "url":"URL#5953462" }, { "@score":"1", "@id":"5953463", "info":{"authors":{"author":[{"@pid":"61/1931","text":"Seo Young Kim"},{"@pid":"85/4031","text":"Jae Won Lee"},{"@pid":"21/6706","text":"Jong Sung Bae"}]},"title":"Iterative Clustering Algorithm for Analyzing Temporal Patterns of Gene Expression.","venue":"WEC","pages":"8-11","year":"2005","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/wec/KimLB05","url":"https://dblp.org/rec/conf/wec/KimLB05"}, "url":"URL#5953463" }, { "@score":"1", "@id":"5953483", "info":{"authors":{"author":[{"@pid":"59/6744","text":"Olli Luoma"},{"@pid":"95/3128","text":"Johannes Tuikkala"},{"@pid":"n/OlliNevalainen","text":"Olli Nevalainen"}]},"title":"Accelerating GLA with an M-Tree.","venue":"WEC","pages":"196-199","year":"2005","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/wec/LuomaTN05","url":"https://dblp.org/rec/conf/wec/LuomaTN05"}, "url":"URL#5953483" }, { "@score":"1", "@id":"5953487", "info":{"authors":{"author":[{"@pid":"67/2305","text":"Dipankaj G. Medhi"},{"@pid":"56/5139","text":"Juri Dakua"}]},"title":"MovieReco: A Recommendation System.","venue":"WEC","pages":"70-73","year":"2005","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/wec/MedhiD05","url":"https://dblp.org/rec/conf/wec/MedhiD05"}, "url":"URL#5953487" }, { "@score":"1", "@id":"5953488", "info":{"authors":{"author":[{"@pid":"35/4970","text":"Pierre-Alain Moëllic"},{"@pid":"85/1417","text":"Patrick Hède"},{"@pid":"46/968","text":"Gregory Grefenstette"},{"@pid":"54/5399","text":"Christophe Millet"}]},"title":"Evaluating Content Based Image Retrieval Techniques with the One Million Images CLIC TestBed.","venue":"WEC","pages":"171-174","year":"2005","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/wec/MoellicHGM05","url":"https://dblp.org/rec/conf/wec/MoellicHGM05"}, "url":"URL#5953488" }, { "@score":"1", "@id":"5953490", "info":{"authors":{"author":[{"@pid":"59/2424","text":"Mehran Mohsenzadeh"},{"@pid":"74/2235","text":"Fereidoon Shams"},{"@pid":"55/2328","text":"Mohammad Teshnehlab"}]},"title":"Comparison of Schema Matching Systems.","venue":"WEC","pages":"141-147","year":"2005","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/wec/MohsenzadehST05","url":"https://dblp.org/rec/conf/wec/MohsenzadehST05"}, "url":"URL#5953490" }, { "@score":"1", "@id":"5953491", "info":{"authors":{"author":[{"@pid":"59/2424","text":"Mehran Mohsenzadeh"},{"@pid":"74/2235","text":"Fereidoon Shams"},{"@pid":"55/2328","text":"Mohammad Teshnehlab"}]},"title":"LOWL: Logic and OWL, an Extension.","venue":"WEC","pages":"148-152","year":"2005","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/wec/MohsenzadehST05a","url":"https://dblp.org/rec/conf/wec/MohsenzadehST05a"}, "url":"URL#5953491" }, { "@score":"1", "@id":"5953492", "info":{"authors":{"author":[{"@pid":"59/2424","text":"Mehran Mohsenzadeh"},{"@pid":"74/2235","text":"Fereidoon Shams"},{"@pid":"55/2328","text":"Mohammad Teshnehlab"}]},"title":"A New Approach for Merging Ontologies.","venue":"WEC","pages":"153-159","year":"2005","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/wec/MohsenzadehST05b","url":"https://dblp.org/rec/conf/wec/MohsenzadehST05b"}, "url":"URL#5953492" }, { "@score":"1", "@id":"5953494", "info":{"authors":{"author":{"@pid":"38/5476","text":"Seyed R. Mousavi"}},"title":"Induction of Expressive Rules Using the Binary Coding Method.","venue":"WEC","pages":"229-232","year":"2005","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/wec/Mousavi05","url":"https://dblp.org/rec/conf/wec/Mousavi05"}, "url":"URL#5953494" }, { "@score":"1", "@id":"5953509", "info":{"authors":{"author":[{"@pid":"75/832","text":"A. Pashayev"},{"@pid":"26/5702","text":"D. Askerov"},{"@pid":"42/1765","text":"R. Sadiqov"},{"@pid":"27/1866","text":"A. Samedov"},{"@pid":"02/5691","text":"Cemal Ardil"}]},"title":"New Technologies for Modeling of Gas Turbine Cooled Blades.","venue":"WEC","pages":"182-187","year":"2005","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/wec/PashayevASSA05","url":"https://dblp.org/rec/conf/wec/PashayevASSA05"}, "url":"URL#5953509" }, { "@score":"1", "@id":"5953514", "info":{"authors":{"author":[{"@pid":"36/5911","text":"Paul Prior"},{"@pid":"25/1449","text":"Frank Keenan"}]},"title":"Requirements Management in a Distributed Agile Environment.","venue":"WEC","pages":"204-207","year":"2005","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/wec/PriorK05","url":"https://dblp.org/rec/conf/wec/PriorK05"}, "url":"URL#5953514" }, { "@score":"1", "@id":"5953524", "info":{"authors":{"author":[{"@pid":"66/308","text":"Mehmet Sagbas"},{"@pid":"62/5712","text":"Kemal M. Fidanboylu"},{"@pid":"64/5306","text":"M. Can Bayram"}]},"title":"Triple-Input Single-Output Voltage-Mode Multifunction Filter Using Only two Current Conveyors.","venue":"WEC","pages":"105-108","year":"2005","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/wec/SagbasFB05","url":"https://dblp.org/rec/conf/wec/SagbasFB05"}, "url":"URL#5953524" }, { "@score":"1", "@id":"5953525", "info":{"authors":{"author":{"@pid":"33/1473","text":"Jamaludin Sallim"}},"title":"Requirements Engineering for Enterprise Applications Development: Seven Challenges in Higher Education Environment.","venue":"WEC","pages":"101-104","year":"2005","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/wec/Sallim05","url":"https://dblp.org/rec/conf/wec/Sallim05"}, "url":"URL#5953525" }, { "@score":"1", "@id":"5953527", "info":{"authors":{"author":[{"@pid":"s/VahidSalmani","text":"Vahid Salmani"},{"@pid":"n/MahmoudNaghibzadeh","text":"Mahmoud Naghibzadeh"},{"@pid":"21/107","text":"Farid Seifi"},{"@pid":"03/5465","text":"Amirhossein Taherinia"}]},"title":"A Two-Phase Mechanism for Agent's Action Selection in Soccer Simulation.","venue":"WEC","pages":"217-220","year":"2005","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/wec/SalmaniNST05","url":"https://dblp.org/rec/conf/wec/SalmaniNST05"}, "url":"URL#5953527" }, { "@score":"1", "@id":"5953532", "info":{"authors":{"author":[{"@pid":"41/6623","text":"Mir Ali Seyyedi"},{"@pid":"74/2235","text":"Fereidoon Shams"},{"@pid":"55/2328","text":"Mohammad Teshnehlab"}]},"title":"A New Method F, for Measuring Software Processes within Software Capability Maturity Model Based on the Fuzzy Multi-Agent Measurements.","venue":"WEC","pages":"257-262","year":"2005","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/wec/SeyyediST05","url":"https://dblp.org/rec/conf/wec/SeyyediST05"}, "url":"URL#5953532" }, { "@score":"1", "@id":"5953533", "info":{"authors":{"author":[{"@pid":"20/1307","text":"Arsalan Ali Shah"},{"@pid":"68/734","text":"Zafar I. Malik"},{"@pid":"25/5352-4","text":"Shaukat Ali 0004"}]},"title":"PP-FSM: Peer to Peer File Share for Multimedia.","venue":"WEC","pages":"55-58","year":"2005","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/wec/ShahMA05","url":"https://dblp.org/rec/conf/wec/ShahMA05"}, "url":"URL#5953533" }, { "@score":"1", "@id":"5953535", "info":{"authors":{"author":[{"@pid":"91/893","text":"Mohammad Reza Ayatollahzadeh Shirazi"},{"@pid":"69/6386","text":"Pooya Jaferian"},{"@pid":"91/1565","text":"Golnaz Elahi"},{"@pid":"b/HamidrezaBaghi","text":"Hamidreza Baghi"},{"@pid":"70/6229","text":"Babak Sadeghian"}]},"title":"RUPSec: An Extension on RUP for Developing Secure Systems - Requirements Discipline.","venue":"WEC","pages":"208-212","year":"2005","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/wec/ShiraziJEBS05","url":"https://dblp.org/rec/conf/wec/ShiraziJEBS05"}, "url":"URL#5953535" }, { "@score":"1", "@id":"5953555", "info":{"authors":{"author":[{"@pid":"51/6856","text":"Tong Wang"},{"@pid":"09/3419","text":"Pi-lian He"}]},"title":"Web Log Mining by an Improved AprioriAll Algorithm.","venue":"WEC","pages":"97-100","year":"2005","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/wec/WangH05","url":"https://dblp.org/rec/conf/wec/WangH05"}, "url":"URL#5953555" }, { "@score":"1", "@id":"5953566", "info":{"authors":{"author":[{"@pid":"85/4216","text":"Rana Yousef"},{"@pid":"198/4457","text":"Khalil M. El Hindi"}]},"title":"Locating Center Points for Radial Basis Function Networks Using Instance Reduction Techniques.","venue":"WEC","pages":"213-216","year":"2005","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/wec/YousefH05","url":"https://dblp.org/rec/conf/wec/YousefH05"}, "url":"URL#5953566" }, { "@score":"1", "@id":"5953569", "info":{"authors":{"author":{"@pid":"72/3227","text":"Armin Zeinali"}},"title":"Interpolative Fuzzy Inferences Using Least Square Principle.","venue":"WEC","pages":"245-248","year":"2005","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/wec/Zeinali05","url":"https://dblp.org/rec/conf/wec/Zeinali05"}, "url":"URL#5953569" }, { "@score":"1", "@id":"5953573", "info":{"authors":{"author":[{"@pid":"z/AnnaVZhdanova","text":"Anna V. Zhdanova"},{"@pid":"00/95","text":"Uwe Keller"}]},"title":"Choosing an Ontology Language.","venue":"WEC","pages":"47-50","year":"2005","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/wec/ZhdanovaK05","url":"https://dblp.org/rec/conf/wec/ZhdanovaK05"}, "url":"URL#5953573" }, { "@score":"1", "@id":"5953574", "info":{"authors":{"author":[{"@pid":"51/5736","text":"Danian Zheng"},{"@pid":"18/4231","text":"Jiaxin Wang"},{"@pid":"35/5457","text":"Yannan Zhao"},{"@pid":"97/3666","text":"Z. H. Yang"}]},"title":"An Iterative Algorithm for KLDA Classifier.","venue":"WEC","pages":"241-244","year":"2005","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/wec/ZhengWZY05","url":"https://dblp.org/rec/conf/wec/ZhengWZY05"}, "url":"URL#5953574" }, { "@score":"1", "@id":"5960023", "info":{"authors":{"author":{"@pid":"02/5691","text":"Cemal Ardil"}},"title":"The Second World Enformatika Conference, WEC'05, February 25-27, 2005, Istanbul, Turkey, CDROM","venue":"WEC","publisher":"Enformatika, Çanakkale, Turkey","year":"2005","type":"Editorship","access":"unavailable","key":"conf/wec/2005feb","url":"https://dblp.org/rec/conf/wec/2005feb"}, "url":"URL#5960023" } ] } } } )