default search action
17th SAC 2002: Madrid, Spain
- Gary B. Lamont, Hisham Haddad, George A. Papadopoulos, Brajendra Panda:
Proceedings of the 2002 ACM Symposium on Applied Computing (SAC), March 10-14, 2002, Madrid, Spain. ACM 2002, ISBN 1-58113-445-2
A.I. and computational logic
- Stefano Bistarelli, Thom W. Frühwirth, Michael Marte:
Soft constraint propagation and solving in CHRs. 1-5 - Grigoris Antoniou, M. Arief:
Executable declarative business rules and their use in electronic commerce. 6-10 - Manuel Alfonseca, Juan de Lara:
Simulating evolutionary agent communities with OOCSMP. 11-15 - Han-joon Kim, Sang-goo Lee:
An effective document clustering method using user-adaptable distance metrics. 16-20
Agents, interactions, mobility and systems
- Henry Hexmoor, Justin Tyrel Vaughn:
Computational adjustable autonomy for NASA Personal Satellite Assistants. 21-26 - Chang-Hyun Jo, Allen J. Arnold:
The Agent-based Programming Language: APL. 27-31 - Lorenzo Bettini, Rocco De Nicola, Michele Loreti:
Software update via mobile agent based programming. 32-36 - Jorge J. Gómez-Sanz, Juan Pavón, Francisco J. Garijo:
Meta-models for building multi-agent systems. 37-41 - Bengt Carlsson, K. Ingemar Jönsson:
Differences between the iterated prisoner's dilemma and the chicken game under noisy conditions. 42-48 - Susan Weissman Lauzac, Panos K. Chrysanthis:
Personalizing information gathering for mobile database clients. 49-56 - Iadine Chades, Bruno Scherrer, François Charpillet:
A heuristic approach for solving decentralized-POMDP: assessment on the pursuit problem. 57-62 - Jen-Hsiang Chen, Kuo-Ming Chao, Nick Godwin, Colin R. Reeves, Peter Smith:
An automated negotiation mechanism based on co-evolution and game theory. 63-67 - Hoang Pham Huy, Simone Sédillot:
Agent-based mobility add-in feature for Object Transaction Service (OTS). 68-75 - Hock Kim Tan, Luc Moreau:
Certificates for mobile code security. 76-81 - Lucas C. Ferreira, Ricardo Dahab:
Blinded-key signatures: securing private keys embedded in mobile agents. 82-86 - Abhishek Singh, Santosh Pande:
Compiler optimizations for Java aglets in distributed data intensive applications. 87-92 - Luc Moreau:
A fault-tolerant directory service for mobile agents based on forwarding pointers. 93-100 - Frances M. T. Brazier, Benno J. Overeinder, Maarten van Steen, Niek J. E. Wijngaards:
Agent factory: generative migration of mobile agents in heterogeneous environments. 101-106 - Laurent Magnin, Viet Thang Pham, Arnaud Dury, Nicolas Besson, Arnaud Thiefaine:
Our guest agents are welcome to your agent platforms. 107-114 - Walter Binder, Volker Roth:
Secure mobile agent systems using Java: where are we heading?. 115-119
Applications of spatial simulation of discrete entities
- William Maniatty, Boleslaw K. Szymanski:
Editorial message: special track on applications of spatial simulation of discrete entities. 120-121 - Christopher L. Barrett, Madhav V. Marathe, James P. Smith, S. S. Ravi:
A mobility and traffic generation framework for modeling and simulating ad hoc communication networks. 122-126 - Jacki P. Goldman, William J. Gullick, Dennis Bray, Colin G. Johnson:
Individual-based simulation of the clustering behaviour of epidermal growth factor receptors. 127-131 - György Korniss, Mark A. Novotny, A. K. Kolakowska, Hasan Guclu:
Statistical properties of the simulated time horizon in conservative parallel discrete-event simulations. 132-137 - Stephen G. Eubank:
Scalable, efficient epidemiological simulation. 139-145
Bioinformatics
- Warren T. Jones, Hasan M. Jamil:
Bioinformatics track. 146 - Guoying Liu, Ann E. Loraine, Ron Shigeta, Melissa S. Cline, Jill Cheng, Stephen A. Chervitz, David Kulp, Michael A. Siani-Rose:
NetAffx: affymetrix probeset annotations. 147-150 - Rhonda Harrison, Charles DeLisi:
A hypothesis driven approach to condition specific transcription factor binding site characterization in S.c.. 151-158 - Mathew J. Palakal, Snehasis Mukhopadhyay, Javed Mostafa:
An intelligent biological information management system. 159-163 - David Sankoff:
Short inversions and conserved gene clusters. 164-167 - Deendayal Dinakarpandian, Vijay Kumar:
BlOMIND-protein property prediction by property proximity profiles. 168-172 - Gianluca Della Vedova, Todd Wareham:
Optimal algorithms for local vertex quartet cleaning. 173-177
Computational science
- Duy Huynh:
Slide Edge Algorithm. 178-183 - H. Martin Bücker, Arno Rasch:
Efficient derivative computations in neutron scattering via interface contraction. 184-188 - J. Pleite, Emilio Olías, Andrés Barrado, Antonio Lázaro, J. Váquez:
A procedure to model the frequency response. 189-193
Computer security
- Giampaolo Bella, Ronaldo Menezes, James A. Whittaker:
Editorial Message: special track on computer security. 194-195 - Shouhuai Xu, Ravi S. Sandhu:
Authenticated multicast immune to denial-of-service attack. 196-200 - Christopher Krügel, Thomas Toth, Engin Kirda:
Service specific anomaly detection for network intrusion detection. 201-208 - Alexandr Seleznyov, Oleksiy Mazhelis:
Learning temporal patterns for anomaly intrusion detection. 209-213 - Chenghuai Lu, André L. M. dos Santos, Francisco R. Pimentel:
Implementation of fast RSA key generation on smart cards. 214-220 - Abhishek Singh, André L. M. dos Santos:
Grammar based off line generation of disposable credit card numbers. 221-228 - Roberto Barbuti, Cinzia Bernardeschi, Nicoletta De Francesco:
Checking security of Java bytecode by abstract interpretation. 229-236 - Larry A. Dunning, Sub Ramakrishnan:
Security status display and browser interframe communication. 237-241 - James A. Whittaker, Andres De Vivanco:
Neutralizing windows-based malicious mobile code. 242-246 - Giampaolo Bella:
Interactive simulation of security policies. 247-252 - Jan Steffan, Markus Schumacher:
Collaborative attack modeling. 253-259 - Herbert H. Thompson, James A. Whittaker, Florence E. Mottay:
Software security vulnerability testing in hostile environments. 260-264 - Matt Burnside, Dwaine E. Clarke, Todd Mills, Andrew Maywah, Srinivas Devadas, Ronald L. Rivest:
Proxy-based security protocols in networked mobile devices. 265-272 - Arslan Brömme, Marcel Kronberg, Oliver Ellenbeck, Oliver Kasch:
A conceptual framework for testing biometric algorithms within operating systems' authentication. 273-280 - Michele Boreale, Maria Grazia Buscemi:
Experimenting with STA, a tool for automatic analysis of security protocols. 281-285
Coordination models, languages and applications
- Andrea Omicini, Sascha Ossowski:
Editorial message: special track on coordination models, languages and applications. 286-287 - Sherief Abdallah, Nevin M. Darwish, Osman Hegazy:
Monitoring and synchronization for teamwork in GPGP. 288-293 - Paul Davidsson, Fredrik Wernstedt:
A multi-agent system architecture for coordination of just-in-time production and distribution. 294-299 - Elth Ogston, Stamatis Vassiliadis:
Unstructured agent matchmaking: experiments in timing and fuzzy matching. 300-305 - Anthony Karageorgos, Simon G. Thompson, Nikolay Mehandjiev:
Semi-automatic design of agent organisations. 306-313 - Neal Sample, Dorothea Beringer, Gio Wiederhold:
A comprehensive model for arbitrary result extraction. 314-321 - Guangxin Yang:
A uniform meta-model for modeling integrated cooperation. 322-328 - Jinlei Jiang, Guangxin Yang, Yan Wu, Meilin Shi:
CovaTM: a transaction model for cooperative applications. 329-335 - Paolo Ciancarini, Robert Tolksdorf, Franco Zambonelli:
Coordination middleware for XML-centric applications. 336-343 - Philipp Obreiter, Guntram Gräf:
Towards scalability in tuple spaces. 344-350 - Jozef Hooman, Jaco van de Pol:
Formal verification of replication on a distributed data space architecture. 351-358 - Nadia Busi, Gianluigi Zavattaro:
On the serializability of transactions in shared dataspaces with temporary data. 359-366 - Federico Bergenti, Alessandro Ricci:
Three approaches to the coordination of multiagent systems. 367-372 - Lorenzo Bettini, Michele Loreti, Rosario Pugliese:
An infrastructure language for open nets. 373-377 - José Antonio Pérez, Rafael Corchuelo, David Ruiz, Miguel Toro:
An enablement detection algorithm for open multiparty interactions. 378-384 - Ludger Fiege, Gero Mühl, Felix C. Gärtner:
A modular approach to build structured event-based systems. 385-392 - F. H. Carvalho, Ricardo Massa Ferreira Lima, Rafael Dueire Lins:
Coordinating functional processes with Haskell#. 393-400
Database and digital library technologies
- Ramzi A. Haraty, Mohammad Zubair:
Database and digital library technologies: track chairs message. 401 - Kjetil Nørvåg:
Temporal query operators in XML databases. 402-406 - Albrecht Schmidt, Martin L. Kersten:
Bulkloading and maintaining XML documents. 407-412 - Qiang Ding, Qin Ding, William Perrizo:
Decision tree classification of spatial data streams using Peano Count Trees. 413-417 - Jon Olav Hauglid, Roger Midtstraum:
SESAM: searching supported by analysis of metadata. 418-425 - Qin Ding, Maleq Khan, Amalendu Roy, William Perrizo:
The P-tree algebra. 426-431 - Fernando Ferri, Elaheh Pourabbas, Maurizio Rafanelli:
The syntactic and semantic correctness of pictorial configurations to query geographic databases by PQL. 432-437 - Sang-Wook Kim, Jeehee Yoon, Sanghyun Park, Tae-Hoon Kim:
Shape-based retrieval of similar subsequences in time-series databases. 438-445 - Brajendra Panda, Kazi Asharful Haque:
Extended data dependency approach: a robust way of rebuilding database. 446-452 - Maria Cláudia Cavalcanti, Marta Mattoso, Maria Luiza Machado Campos, François Llirbat, Eric Simon:
Sharing scientific models in environmental applications. 453-457 - Ramzi A. Haraty, Mazen Hamdoun:
Iterative querying in web-based database applications. 458-462 - Laura C. Rivero, Jorge Horacio Doorn, Viviana E. Ferraggine:
Elicitation and conversion of hidden objects and restrictions in a database schema. 463-469 - Zaher Aghbari, Kunihiko Kaneko, Akifumi Makinouchi:
Topological mapping: a dimensionality reduction method for efficient video search. 470-475 - M. Mercedes Martínez, Jean-Claude Derniame, Pablo de la Fuente:
A method for the dynamic generation of virtual versions of evolving documents. 476-482 - Jeffrey T. Clark, Brian M. Slator, Aaron Bergstrom, Francis Larson, Richard Frovarp, James E. Landrum, William Perrizo, William Jockheck:
DANA (Digital Archive Network for Anthropology): a model for digital archiving. 483-487 - Cláudio de Souza Baptista:
A geolibrary for multimedia data sets: design and implementation issues. 488-492 - Kurt Maly, Mohammad Zubair, Srikanth Balusani, A. Mathur, S. Sudeep, W. Wolters:
DL-COTF: an XML based digital library for U. S. Navy's operational test and evaluation force. 493-497
Declarative data mining
- José Luis Álvarez Macías, Jacinto Mata Vázquez, José Cristóbal Riquelme Santos:
Mining interesting regions using an evolutionary algorithm. 498-502 - Jae-Woo Chang, Du-Seok Jin:
A new cell-based clustering method for large, high-dimensional data in data mining applications. 503-507 - Ingolf Geist:
A framework for data mining and KDD. 508-513 - Hui Wang, Ivo Düntsch, Günther Gediga, Andrzej Skowron:
Hyperrelations in version space. 514-518
Electronics books for technical learning
- Monica Landoni, Ignacio Aedo:
Editorial message: special track on electronic books for teaching and learning. 519 - François Bry, Michael Kraus:
Advanced modeling and browsing of technical documents. 520-524 - Ruth Cobos, Xavier Alamán:
From collective knowledge to e-books. 525-529 - Ruth Wilson:
The "look and feel" of an ebook: considerations in interface design. 530-534 - Won-Sung Sohn, Seung-Kyu Ko, Yoon-Chul Choy, Kyong-Ho Lee, Sung-Hyuk Kim, Soon-Bum Lim:
Development of a standard format for eBooks. 535-540
Evolutionary computing and optimization
- Roger L. Wainwright, Günther R. Raidl:
Evolutionary computation and optimization track: SAC 2002. 541 - Sergiy Butenko, Panos M. Pardalos, Ivan Sergienko, Vladimir Shylo, Petro Stetsyuk:
Finding maximum independent sets in graphs arising from coding theory. 542-546 - Bryant A. Julstrom, Günther R. Raidl:
Initialization is robust in evolutionary algorithms that encode spanning trees as sets of edges. 547-552 - Brad Dolin, Forrest H. Bennett III, Eleanor Gilbert Rieffel:
Co-evolving an effective fitness sample: experiments in symbolic regression and distributed robot control. 553-559 - Haibing Li, Andrew Lim:
Local search with annealing-like restarts to solve the vehicle routing problem with time windows. 560-565 - George Nyauma Nyakoe, Makoto Ohki, Suichiro Tabuchi:
Acquisition of modulation pulses for a multi-robot system using genetic algorithm. 568-573 - Steve Hurley, Roger M. Whitaker:
An agent based approach to site selection for wireless networks. 574-577 - Nelishia Pillay:
Using genetic programming for the induction of novice procedural programming solution algorithms. 578-583 - Atila Neves, Osvaldo Brasão, Agostinho C. Rosa:
Learning the risk board game with classifier systems. 585-589 - Jacinto Mata Vázquez, José Luis Álvarez Macías, José Cristóbal Riquelme Santos:
An evolutionary algorithm to discover numeric association rules. 590-594 - David A. van Veldhuizen, Jesse B. Zydallis, Gary B. Lamont:
Issues in parallelizing multiobjective evolutionary algorithms for real world applications. 595-602 - Konstantinos E. Parsopoulos, Michael N. Vrahatis:
Particle swarm optimization method in multiobjective problems. 603-607 - Fulvio Corno, Matteo Sonza Reorda, Giovanni Squillero:
An evolutionary algorithm for reducing integrated-circuit test application time. 608-612
Information access and retrieval
- Fabio Crestani, Gabriella Pasi:
Editorial message: special track on information access and retrieval systems. 613-614 - José María Gómez Hidalgo:
Evaluating cost-sensitive Unsolicited Bulk Email categorization. 615-620 - Andreas Becks, Christian Seeling, Ralf Minkenberg:
Benefits of document maps for text access in knowledge management: a comparative study. 621-626 - David L. Chan, Robert W. P. Luk, W. K. Mak, Hong Va Leong, Edward Kei Shiu Ho, Qin Lu:
Multiple related document summary and navigation using concept hierarchies for mobile clients. 627-632 - Simon O. Sweeney, Fabio Crestani, Anastasios Tombros:
Mobile delivery of news using hierarchical query-biased summaries. 634-639 - Mohand Boughanem, Mohamed Tmar:
Incremental adaptive filtering: profile learning and threshold calibration. 640-644 - Hideo Joho, Claire Coverson, Mark Sanderson, Micheline Hancock-Beaulieu:
Hierarchical presentation of expansion terms. 645-649 - Peter J. Brown, Gareth J. F. Jones:
Exploiting contextual change in context-aware retrieval. 650-656 - Holger Billhardt, Daniel Borrajo, Victor Maojo:
Using genetic algorithms to find suboptimal retrieval expert combinations. 657-662 - Evangelos Kotsakis:
Structured information retrieval in XML documents. 663-667 - Seung-Kyu Ko, Yoon-Chul Choy:
A structured documents retrieval method supporting attribute-based structure information. 668-674 - Gloria Bordogna, Gabriella Pasi:
Flexible querying of WEB documents. 675-680 - Satoshi Watanabe, Takao Miura:
Reordering B-tree files. 681-686 - Mario A. Nascimento, Vishal Chitkara:
Color-based image retrieval using binary signatures. 687-692 - Daniela Stan, Ishwar K. Sethi:
Color patterns for pictorial content description. 693-698 - Patrick Ruch:
Information retrieval and spelling correction: an inquiry into lexical disambiguation. 699-703
Inter disciplinary approaches to the design of dependable computer systems
- John E. Dobson, Cliff B. Jones, Rob Procter, Mark Rouncefield, Robin Williams:
Editorial message: special track on inter-disciplinary approaches to the design of dependable computer systems. 704-705