- 2005
- Laurent Alamarguy, Rose Dieng-Kuntz, Catherine Faron-Zucker
:
Extraction of Lexico-Syntactic Information and Acquisition of Causality Schemas for Text Annotation. KES (3) 2005: 1180-1186 - Ali Ben Ammar, Abdelaziz Abdellatif, Henda Hajjami Ben Ghézala
:
Roles of Agents in Data-Intensive Web Sites. KES (3) 2005: 37-45 - Daisaku Arita, Rin-Ichiro Taniguchi:
Presentation of Human Action Information via Avatar: From the Viewpoint of Avatar-Based Communication. KES (3) 2005: 883-889 - Ken'ichi Asami:
Physiological Modeling and Simulation for Aerobic Circulation with Beat-by-Beat Hemodynamics. KES (3) 2005: 1204-1209 - Stefan Berlik, Bernd Reusch:
Directed Mutation Operators - An Overview. KES (3) 2005: 1151-1159 - Leszek Borzemski
:
Mining Internet Data Sets for Computational Grids. KES (3) 2005: 268-274 - Leszek Borzemski
, Ziemowit Nowak:
Using the Geographic Distance for Selecting the Nearest Agent in Intermediary-Based Access to Internet Resources. KES (3) 2005: 261-267 - Ross Brown, Binh Pham, Olivier Y. de Vel:
Design of a Digital Forensics Image Mining System. KES (3) 2005: 395-404 - Aki P. F. Chan, Wing W. Y. Ng, Daniel S. Yeung, Eric C. C. Tsang:
Multiple Classifier System with Feature Grouping for Intrusion Detection: Mutual Information Approach. KES (3) 2005: 141-148 - Rai Chan, Jun Takazawa, Junichi Hoshino:
Locomotion Control Technique for Immersive Conversation Environment. KES (3) 2005: 875-882 - Chin-Chen Chang, Yung-Chen Chou, Jau-Ji Shen:
Improving Image Quality for JPEG Compression. KES (3) 2005: 442-448 - Chin-Chen Chang, Chih-Yang Lin, Yu-Zheng Wang:
VQ Image Steganographic Method with High Embedding Capacity Using Multi-way Search Approach. KES (3) 2005: 1058-1064 - Chin-Chen Chang, Wen-Chuan Wu:
A Reversible Information Hiding Scheme Based on Vector Quantization. KES (3) 2005: 1101-1107 - Kwok-Wing Chau:
Intelligence-Based Educational Package on Fluid Mechanics. KES (3) 2005: 756-762 - Jun-Ming Chen, Gwo-Haur Hwang, Gwo-Jen Hwang, Carol H. C. Chu:
Analyzing Domain Expertise by Considering Variants of Knowledge in Multiple Time Scales. KES (3) 2005: 1324-1330 - Jie Chen, Hongxing He, Jiuyong Li, Huidong Jin
, Damien McAullay, Graham J. Williams, Ross Sparks, Chris Kelman
:
Representing Association Classification Rules Mined from Health Data. KES (3) 2005: 1225-1231 - Duan-Yu Chen, Hong-Yuan Mark Liao, Suh-Yin Lee:
Robust Video Retrieval Using Temporal MVMB Moments. KES (3) 2005: 359-365 - Jing-Fung Chen, Hong-Yuan Mark Liao, Chia-Wen Lin
:
Fast Video Retrieval via the Statistics of Motion Within the Regions-of-Interest. KES (3) 2005: 381-387 - Wengang Cheng, De Xu, Yiwei Jiang, Congyan Lang:
Information Theoretic Metrics in Shot Boundary Detection. KES (3) 2005: 388-394 - King Hong Cheung, Adams Wai-Kin Kong, David Zhang, Mohamed Kamel, Jane You, Ho-Wang Lam:
An Analysis on Accuracy of Cancelable Biometrics Based on BioHashing. KES (3) 2005: 1168-1172 - Jungwon Cho, Seungdo Jeong, Byung-Uk Choi:
A Fast Image Retrieval Using the Unification Search Method of Binary Classification and Dimensionality Condensation of Feature Vectors. KES (3) 2005: 240-247 - Jungwon Cho, Seungdo Jeong, Byung-Uk Choi:
News Video Retrieval Using Automatic Indexing of Korean Closed-Caption. KES (3) 2005: 694-703 - Jungwon Cho, Seungdo Jeong, Byung-Uk Choi:
Classification and Skimming of Articles for an Effective News Browsing. KES (3) 2005: 704-712 - Yeon-Jin Cho, Hyeoncheol Kim:
Rule Generation Using NN and GA for SARS-CoV Cleavage Site Prediction. KES (3) 2005: 785-791 - YeongGeun Choe, Soon-Ja Kim:
Secure Password Authentication for Keystroke Dynamics. KES (3) 2005: 317-324 - Yoo-Joo Choi, Soo-Mi Choi, Seon-Min Rhee, Myoung-Hee Kim:
Collaborative and Immersive Medical Education in a Virtual Workbench Environment. KES (3) 2005: 1210-1217 - Soo-Mi Choi, Yong-Guk Kim:
Similarity Estimation of 3D Shapes Using Modal Strain Energy. KES (3) 2005: 206-212 - Jaeseok Choi, TrungTinh Tran, Jungji Kwon, Sangsik Lee, Abdurrahim El-Keib:
The Air Pollution Constraints Considered Best Generation Mix Using Fuzzy Linear Programming. KES (3) 2005: 1129-1142 - Bong-Horng Chu, In-Kai Liao, Cheng-Seen Ho:
An Ontology-Supported Database Refurbishing Technique and Its Application in Mining GSM Trouble Shooting Rules. KES (3) 2005: 997-1004 - Yongwha Chung, Kichul Kim, Min Kim, Sung Bum Pan, Neungsoo Park:
A Hardware Implementation for Fingerprint Retrieval. KES (3) 2005: 374-380