The 9th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, held in Phuket Thailand on August 6 - 8, 2008 is aimed at bringing together researchers and scientist, businessmen and entrepreneurs, teachers and students to discuss the numerous fields of computer science, and to share ideas and information in a meaningful way. This publication captures 20 of the conference's most promising papers, and we impatiently await the important contributions that we know these authors will bring to the field.
The 9th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, held in Phuket Thailand on August 6 - 8, 2008 is aimed at bringing together researchers and scientist, businessmen and entrepreneurs, teachers and students to discuss the numerous fields of computer science, and to share ideas and information in a meaningful way. This publication captures 20 of the conference's most promising papers, and we impatiently await the important contributions that we know these authors will bring to the field.
Stopping Criterion Selection for Efficient Semi-supervised Time Series Classification.- Enhancing the Blockage of Spam over Internet Telephony (SPIT) Using Adaptive PMG Algorithm.- Spatio-temporal Facial Expression Recognition Using Optical Flow and HMM.- An Approach for Anomaly Intrusion Detection Based on Causal Knowledge-Driven Diagnosis and Direction.- Challenges Relating to RFID Implementation within the Electronic Supply Chain Management - A Practical Approach.- Design and Implementation of Clustering File Backup Server Using File Fingerprint.- Aspect Oriented Testing Frameworks for Embedded Software.- Analysis on Malicious Peer's Behavior of the P2P Trust Resource Chain Model.- Information Technology Service Management: A Thailand Perspective.- A New Artificial Immune System for the Detection of Abnormal Behaviour.- Markov Chain Analysis of Genetic Algorithms Applied to Fitness Functions Perturbed by Multiple Sources of Additive Noise.- A Security Supervision System for Hybrid Networks.- Cost Minimization in Service Systems Using Particle Swarm Optimization.- MS2Web: Applying MDA and SOA to Web Services.- Security Analysis of One Verifiable Encryption Scheme.- Proactive Fault Management with Virtualization for Software Aging.- A Preemption Control Technique for System Energy Minimization of Weakly Hard Real-Time Systems.- Text Classification by Relearning and Ensemble Computation.- Analysis of Agents' Cooperation in RoboCupRescue Simulation.- A Data Mining Approach for Predicting Reliable Path for Congestion Free Routing Using Self-motivated Neural Network.- A Formal Specification of UML Class and State Diagrams.
Stopping Criterion Selection for Efficient Semi-supervised Time Series Classification.- Enhancing the Blockage of Spam over Internet Telephony (SPIT) Using Adaptive PMG Algorithm.- Spatio-temporal Facial Expression Recognition Using Optical Flow and HMM.- An Approach for Anomaly Intrusion Detection Based on Causal Knowledge-Driven Diagnosis and Direction.- Challenges Relating to RFID Implementation within the Electronic Supply Chain Management - A Practical Approach.- Design and Implementation of Clustering File Backup Server Using File Fingerprint.- Aspect Oriented Testing Frameworks for Embedded Software.- Analysis on Malicious Peer's Behavior of the P2P Trust Resource Chain Model.- Information Technology Service Management: A Thailand Perspective.- A New Artificial Immune System for the Detection of Abnormal Behaviour.- Markov Chain Analysis of Genetic Algorithms Applied to Fitness Functions Perturbed by Multiple Sources of Additive Noise.- A Security Supervision System for Hybrid Networks.- Cost Minimization in Service Systems Using Particle Swarm Optimization.- MS2Web: Applying MDA and SOA to Web Services.- Security Analysis of One Verifiable Encryption Scheme.- Proactive Fault Management with Virtualization for Software Aging.- A Preemption Control Technique for System Energy Minimization of Weakly Hard Real-Time Systems.- Text Classification by Relearning and Ensemble Computation.- Analysis of Agents' Cooperation in RoboCupRescue Simulation.- A Data Mining Approach for Predicting Reliable Path for Congestion Free Routing Using Self-motivated Neural Network.- A Formal Specification of UML Class and State Diagrams.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497