Sciweavers

ISMIS
2009
Springer
14 years 6 months ago
An OWL Ontology for Fuzzy OWL 2
Fernando Bobillo, Umberto Straccia
ISICA
2009
Springer
14 years 6 months ago
Cellular PSO: A PSO for Dynamic Environments
Ali B. Hashemi, Mohammad Reza Meybodi
ISICA
2009
Springer
14 years 6 months ago
Detecting Network Anomalies Using CUSUM and EM Clustering
Abstract. Intrusion detection has been extensively studied in the last two decades. However, most existing intrusion detection techniques detect limited number of attack types and ...
Wei Lu, Hengjian Tong
IEAAIE
2009
Springer
14 years 6 months ago
A Model for Criminal Decision Making Based on Hypothetical Reasoning about the Future
This paper presents an agent-based model for decision making, which integrates personal biological and psychological aspects with rational utility-based reasoning. The model takes ...
Tibor Bosse, Charlotte Gerritsen
IEAAIE
2009
Springer
14 years 6 months ago
Using Genetic Process Mining Technology to Construct a Time-Interval Process Model
Nowadays, some process information is represented by a process model. To understand process executed in many activities, process mining technologies are now extensively studied to...
Chieh-Yuan Tsai, I-Ching Chen
IEAAIE
2009
Springer
14 years 6 months ago
Measuring Naturalness during Close Encounters Using Physiological Signal Processing
Many researchers in the HRI and ECA domains try to build robots and agents that exhibit human-like behavior in real-world close encounter situations. One major requirement for comp...
Yasser F. O. Mohammad, Toyoaki Nishida
IEAAIE
2009
Springer
14 years 6 months ago
An Efficient Algorithm for Maintaining Frequent Closed Itemsets over Data Stream
Data mining refers to the process of revealing unknown and potentially useful information from a large database. Frequent itemsets mining is one of the foundational problems in dat...
Show-Jane Yen, Yue-Shi Lee, Cheng-Wei Wu, Chin-Lin...
IEAAIE
2009
Springer
14 years 6 months ago
Spatial Exact Match Query Based on the NA-Tree Approach in P2P Systems
In this paper, we propose to apply an NA-tree in the Chord system to encode spatial region data in the data key part used in the hash function to data search. That is, we combine t...
Ye-In Chang, Chen-Chang Wu, Ching-I Wang
IEAAIE
2009
Springer
14 years 6 months ago
A Virtual Human Agent Model with Behaviour Based on Feeling Exhaustion
A computational agent model for monitoring and control of a virtual human agent’s resources and exhaustion is presented. It models a physically grounded intelligent decision maki...
Jan Treur
IEAAIE
2009
Springer
14 years 6 months ago
An Agent Model of Temporal Dynamics in Relapse and Recurrence in Depression
Abstract Unipolar depression is a mental disorder characterized by a persistent low mood and loss of awareness or contentment in usual activities [1]. Despite the modern era of pha...
Azizi Ab Aziz, Michel C. A. Klein, Jan Treur