dblp: ISCIS 2004 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches


19. ISCIS 2004: Antalya, Turkey

jump to- Invited Talk
- Artificial Intelligence and Machine Learning
- Computer Graphics and User Interfaces
- Computer Networks and Security
- Computer Vision and Image Processing
- Database Systems
- Modeling and Performance Evaluation
- Natural Language Processing
- Real-Time Control Applications
- Software Engineering and Programming Systems
- Theory of Computing

SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as

Cevdet Aykanat, Tugrul Dayar, Ibrahim Korpeoglu:
Computer and Information Sciences - ISCIS 2004, 19th International Symposium, Kemer-Antalya, Turkey, October 27-29, 2004. Proceedings. Lecture Notes in Computer Science 3280, Springer 2004, ISBN 3-540-23526-4
Invited Talk

Erol Gelenbe:
An Approach to Quality of Service. 1-10
Artificial Intelligence and Machine Learning

Seral Sahan, Halife Kodaz
, Salih Günes, Kemal Polat:
A New Classifier Based on Attribute Weighted Artificial Immune System (AWAIS). 11-20

Ebru Celikel, Mehmet Emin Dalkiliç:
Investigating the Effects of Recency and Size of Training Text on Author Recognition Problem. 21-30

Rasit Köker, Abdullah Ferikoglu:
Model Based Intelligent Control of a 3-Joint Robotic Manipulator: A Simulation Study Using Artificial Neural Networks. 31-40

Mehtap Kose, Adnan Acan:
Knowledge Incorporation into ACO-Based Autonomous Mobile Robot Navigation. 41-50

Nilgün Güler, Fikret S. Gürgen:
The Effects of Data Properties on Local, Piecewise, Global, Mixture of Experts, and Boundary-Optimized Classifiers for Medical Decision Making. 51-61

Tolga Aydin, H. Altay Güvenir:
Learning Interestingness of Streaming Classification Rules. 62-71

Burcin Bostan-Korpeoglu, Adnan Yazici
:
Using Fuzzy Petri Nets for Static Analysis of Rule-Bases. 72-81

Zerrin Isik
, Berrin A. Yanikoglu
, Osman Ugur Sezerman
:
Protein Structural Class Determination Using Support Vector Machines. 82-89
Computer Graphics and User Interfaces

Hsien-Hsi Hsieh, Wen-Kai Tai, Cheng-Chin Chiang, Mau-Tsuen Yang:
Flexible and Interactive Crack-Like Patterns Presentation on 3D Objects. 90-99

Wen-Kai Tai, Chih-Kang Hsu, Hsien-Hsi Hsieh:
An Occlusion Culling Approach Based on Exploiting Multiple Hardware-Accelerated Occlusion Queries for Dynamical Scenes. 100-109

Byeong-Seok Shin, Yu Sik Chae:
Acceleration of Perspective Volume Rendering Using Depth-Subsampl. 110-117

Koo-Joo Kwon, Byeong-Seok Shin:
An Efficient Camera Path Computation Using Image-Space Information in Virtual Endoscopy. 118-125

Yusuf Sahillioglu, Bülent Özgüç:
Hair Motion Simulation. 126-135

Ki-Uk Kyung, Heejin Choi, Dong-Soo Kwon, Seung-Woo Son:
Interactive Mouse Systems Providing Haptic Feedback During the Exploration in Virtual Environment. 136-146

Kemal Oflazer
, Yasin Yilmaz:
Developing Finite State NLP Systems with a Graphical Environment. 147-156
Computer Networks and Security

Turhan Tunali, Nükhet Özbek, Koray Anar, Aylin Kantarci:
Bandwidth-Aware Scaling for Internet Video Streaming. 157-166

Kwangsun Ko, Eun-kyung Cho, Taekeun Lee, Yong-hyeog Kang, Young Ik Eom:
The Abnormal Traffic Control Framework Based on QoS Mechanisms. 167-175

Hyeon-Ju Yoon, Eun-Ju Lee, Hyunku Jeong, Jin-Soo Kim:
Proximity-Based Overlay Routing for Service Discovery in Mobile Ad Hoc Networks. 176-186

Sejin Park, Sang-Hwa Chung, In-Su Yoon, In-Hyung Jung, So Myeong Lee, Ben Lee:
HVIA-GE: A Hardware Implementation of Virtual Interface Architecture Based on Gigabit Ethernet. 198-206

Beomjoon Kim, Jaesung Park, Yong-Hoon Choi:
Modeling TCP Loss Recovery Latency with the Number of Retransmissions. 207-216

Peter Buchholz, Andriy Panchenko:
A Two-Step EM Algorithm for MAP Fitting. 217-227

Oleg Gusak, Neal Oliver
, Khosrow Sohraby:
Performance Evaluation of the 802.16 Medium Access Control Layer. 228-237

Dominique Barth, Johanne Cohen, Lynda Gastal, Thierry Mautor, Stéphane Rousseau:
Fixed Size and Variable Size Packet Models in an Optical Ring Network: Complexity and Simulations. 238-246

Namik Sengezer, Ezhan Karasan
:
A Tabu Search Algorithm for Sparse Placement of Wavelength Converters in Optical Networks. 247-256

Jean-Michel Fourneau, David J. Nott:
Mixed Routing for ROMEO Optical Burst. 257-266

Muhammed Salamah, Evgueni Doukhnitch
, Deniz Devrim:
A Fast Hardware-Oriented Algorithm for Cellular Mobiles Positioning. 267-277

Albert Levi
, Erhan Çetintas, Murat Aydos
, Çetin Kaya Koç
, M. Ufuk Çaglayan:
Relay Attacks on Bluetooth Authentication and Solutions. 278-288

Sinan Isik, Mehmet Yunus Donmez, Cem Ersoy
:
Reliable Delivery of Popular Data Services in WIDE. 289-298

Cüneyt Bayilmis
, Ismail Erturk, Celal Ceken
:
Wireless Interworking Independent CAN Segments. 299-310

Kuo-Chung Chu, Frank Yeong-Sung Lin:
Real-Time Admission Control Supporting Prioritized Soft Handoff Calls in Cellular DS-CDMA Systems. 311-320

Jin-Ghoo Choi, Saewoong Bahk:
Voice Traffic Integration in Wireless Data Networks with Channel State Information. 321-330

Baris Özgül, Hakan Deliç:
Blind Collision Resolution Using Retransmission Diversity under Quasi-Static Fading Channels. 331-340

Zengwei Zheng, Zhaohui Wu, Huaizhong Lin, Kougen Zheng:
CRAM: An Energy Efficient Routing Algorithm for Wireless Sensor Networks. 341-350

Jongsub Moon, Taeshik Shon, Jung Taek Seo, Jongho Kim, Jungwoo Seo:
An Approach for Spam E-mail Detection with Support Vector Machine and n-Gram Indexing. 351-362

Ertan Onur, Cem Ersoy
, Hakan Deliç, Lale Akarun:
Finding Breach Paths Using the Watershed Segmentation Algorithm in Surveillance Wireless Sensor Networks. 363-372

Alisher Kholmatov, Berrin A. Yanikoglu
:
Biometric Authentication Using Online Signatures. 373-380
Computer Vision and Image Processing

B. Ugur Töreyin
, A. Enis Çetin, Anil Aksay, M. Bilgay Akhan:
Moving Region Detection in Compressed Video. 381-390

Ömer Önder Tola, Nafiz Arica, Fatos T. Yarman-Vural:
Shape Recognition with Generalized Beam Angle Statistics. 391-399

Ilkay Ulusoy, Ugur Halici
, Kemal Leblebicioglu
:
3D Cognitive Map Construction by Active Stereo Vision in a Virtual World. 400-409

Muharrem Mercimek, Kayhan Gulez:
3D Real Object Recognition on the Basis of Moment Invariants and Neural Networks. 410-419

Jun Zhang, Feng Xiong:
A Novel Watermarking for Image Security. 420-429

Önsen Toygar, Adnan Acan:
Boosting Face Recognition Speed with a Novel Divide-and-Conquer Approach. 430-439

Shiyan Hu
:
A New Document Watermarking Algorithm Based on Hybrid Multi-scale Ant Colony System. 440-448

Özge Can Özcanli, Fatos T. Yarman-Vural:
An Image Retrieval System Based on Region Classification. 449-458
Database Systems

Abdullah Uz Tansel:
Temporal Data Modeling and Integrity Constraints in Relational Databases. 459-469

Jim Little, Michael de Ga, Tansel Özyer, Reda Alhajj:
Query Builder: A Natural Language Interface for Structured Databases. 470-479

Sahin Albayrak, Dragan Milosevic:
Situation-Aware Coordination in Multi-agent Filtering Framework. 480-492

Maciej Zakrzewicz, Mikolaj Morzy, Marek Wojciechowski
:
A Study on Answering a Data Mining Query Using a Materialized View. 493-502

Srinivas Aluru, Fatih Erdogan Sevilgen
:
Efficient Methods for Database Storage and Retrieval Using Space-Filling Curves. 503-512
Modeling and Performance Evaluation

Jane Hillston, Marina Ribaudo:
Modelling Mobility with PEPA Nets. 513-522

Stephen Gilmore, Leïla Kloul, Davide Piazza:
Modelling Role-Playing Games Using PEPA Nets. 523-532

JinHo Ahn:
Fault-Tolerant and Scalable Communication Mechanism for Mobile Agents. 533-542

Davide D'Aprile, Susanna Donatelli, Jeremy Sproston:
CSL Model Checking for the GreatSPN Tool. 543-552

Paolo Ballarini, Lorenzo Capra
, Giuliana Franceschinis:
Performance and Dependability Analysis of Fault-Tolerant Memory Mechanisms Using Stochastic Well-Formed Nets. 553-563

Salvatore Distefano, Daniele Paci, Antonio Puliafito, Marco Scarpa:
UML Design and Software Performance Modeling. 564-573

Kimmo Varpaaniemi:
Stubborn Sets for Priority Nets. 574-583

Andrea D'Ambrogio, Vittoria De Nitto Persone, Giuseppe Iazeolla:
Model-Driven Maintenance of QoS Characteristics in Heterogeneous Networks. 584-593

Novella Bartolini, Paolo Campegiani, Emiliano Casalicchio
, Salvatore Tucci:
A Performance Study of Context Transfer Protocol for QoS Support. 594-603

Luciano Lenzini, Linda Martorini, Enzo Mingozzi, Giovanni Stea:
A Methodology for Deriving Per-Flow End-to-End Delay Bounds in Sink-Tree DiffServ Domains with FIFO Multiplexing. 604-614

Katja Gilly, Carlos Juiz, Ramón Puigjaner, Salvador Alcaraz:
Performance Analysis of a Predictive and Adaptive Algorithm in Cluster-Based Network Servers with Resource Allocation. 615-626

Luciano Bononi
, Michele Bracuto, Gabriele D'Angelo, Lorenzo Donatiello:
ARTÌS: A Parallel and Distributed Simulation Middleware for Performance Evaluation. 627-637

Davide Pagnin, Marina Buzzi, Marco Conti, Enrico Gregori:
Comparison of Web Server Architectures: A Measurement Study. 638-647

Antonio Barili, Mariacarla Calzarossa
, Daniele Tessera
:
Modeling Dynamic Web Content. 648-656

Stefano Zanero:
Behavioral Intrusion Detection. 657-666

Erol Gelenbe, Varol Kaptan, Yu Wang:
Biological Metaphors for Agent Behavior. 667-675

Michael P. Evans, Richard Newman, Timothy A. Millea, Timothy Putnam, Andrew Walker
:
The Effects of Web Logs and the Semantic Web on Autonomous Web Agents. 676-687

Arzucan Özgür, Haluk Bingöl:
Social Network of Co-occurrence in News Articles. 688-695

Andrea D'Ambrogio, Daniele Gianni:
Using CORBA to Enhance HLA Interoperability in Distributed and Web-Based Simulation. 696-705

Alberto Coen-Porisini
, Ignazio Gallo, Antonella Zanzi:
Designing and Enacting Simulations Using Distributed Components. 706-717

Andrea Matta, Carlo A. Furia, Matteo Rossi:
Semi-formal and Formal Models Applied to Flexible Manufacturing Systems. 718-728

Rafaella Turri, M. Buscaglia, Giovanni Danese, Ivo De Lotto, Francesco Leporati:
New Computer Model of a Dipolar System with Hexagonal Geometry in Presence of an External Electric Field. 729-740
Natural Language Processing

F. Canan Pembe, A. C. Cem Say:
A Linguistically Motivated Information Retrieval System for Turkish. 741-750

Kemal Oflazer
, Pinar Donmez:
SmartReader: An NLP-Based Interactive Reading Application for Language Learning. 751-760

Kemal Oflazer
, Özlem Çetinoglu, Orhan Bilgin, Bilge Say:
A Preprocessor for Turkish Text Analysis. 761-770

Bekir Taner Dinçer, Bahar Karaoglan:
The Effect of Part-of-Speech Tagging on IR Performance for Turkish. 771-778

Raul Baños, Consolación Gil, Maria Dolores Gil Montoya, Julio Ortega:
A New Pareto-Based Algorithm for Multi-objective Graph Partitioning. 779-788

Aleksandar Trifunovic, William J. Knottenbelt:
Par kway 2.0: A Parallel Multilevel Hypergraph Partitioning Tool. 789-800

Berkant Barla Cambazoglu, Ata Turk, Cevdet Aykanat:
Data-Parallel Web Crawling Models. 801-809

Omar Ramadan, Oyku Akaydin, Muhammed Salamah, Abdullah Y. Oztopra:
Parallel Implementation of the Wave-Equation Finite-Difference Time-Domain Method Using the Message Passing Interface. 810-818

A. Cagatay Talay:
A Parallel Genetic Algorithm/Heuristic Based Hybrid Technique for Routing and Wavelength Assignment in WDM Networks. 819-826

Kavitha S. Golconda, Atakan Dogan
, Füsun Özgüner:
Static Mapping Heuristics for Tasks with Hard Deadlines in Real-Time Heterogeneous Systems. 827-836

Byurhan Hyusein, Joe Carthy:
An Advanced Server Ranking Algorithm for Distributed Retrieval Systems on the Internet. 837-844
Real-Time Control Applications

Giorgio C. Buttazzo, Mauro Marinoni, Giacomo Guidi:
Energy-Aware Strategies in Real-Time Systems for Autonomous Robots. 845-854

Dan Henriksson, Anton Cervin:
Multirate Feedback Control Using the TinyRealTime Kernel. 855-865

Michele Cirinei, Antonio Mancina, Davide Cantini, Paolo Gai, Luigi Palopoli:
An Educational Open Source Real-Time Kernel for Small Embedded Control Systems. 866-875

Luís Almeida
, Frederico Santos
, Tullio Facchinetti, Paulo Pedreiras, Valter Silva
, Luís Seabra Lopes
:
Coordinating Distributed Autonomous Agents with a Real-Time Database: The CAMBADA Project. 876-886
Software Engineering and Programming Systems

Insang Chung:
A Static Approach to Automated Test Data Generation in the Presence of Pointers. 887-896

Hyeon Soo Kim, Heung Seok Chae, Chul Hong Kim:
A Use-Case Based Component Identification Approach for Migrating Legacy Code into Distributed Environment. 897-906

Fevzi Belli, Baris Güldali:
Software Testing via Model Checking. 907-916

Daniel O. Bortolas, Avelino F. Zorzo
, Eduardo A. Bezerra, Flávio Moreira de Oliveira:
Mutation-Like Oriented Diversity for Dependability Improvement: A Distributed System Case Study. 917-926

Yunus Emre Selçuk, Nadia Erdogan
:
JAWIRO: Enhancing Java with Roles. 927-934

Stefan Tillich, Johann Großschädl:
A Survey of Public-Key Cryptography on J2ME-Enabled Mobile Devices. 935-944

Byeong-Mo Chang, Jong-Deok Choi:
Thread-Sensitive Points-to Analysis for Multithreaded Java Programs. 945-954
Theory of Computing

Pinar Yolum
:
Correctness Requirements for Multiagent Commitment Protocols. 955-965

Elton Ballhysa, A. C. Cem Say
:
Generating Equiprobable Superpositions of Arbitrary Sets for a New Generalization of the Deutsch-Jozsa Algorithm. 966-975

Baris Sertkaya
, Halit Oguztüzün
:
Proof of the Basic Theorem on Concept Lattices in Isabelle/HOL. 976-985

Ozan Kahramanogullari:
System BV without the Equalities for Unit. 986-995

Seyda Topaloglu
, Irem Ozkarahan:
Comparison of Different Variable and Value Order Strategies for the Optimum Solution of a Single Machine Scheduling Problem with Sequence-Dependent Setups. 996-1005

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:






