Sciweavers

KES
2005
Springer
13 years 9 months ago
Using Recommendation to Improve Negotiations in Agent-Based Systems
: In this paper we present research works on non-intuitive and low-efficient negotiations between agents in agent based system. We find recommendation techniques as a suitable meth...
Mateusz Lenar, Janusz Sobecki
KES
2005
Springer
13 years 9 months ago
Comparison of Feature Extraction Techniques for Watermark Synchronization
Abstract. This paper evaluates feature extraction techniques in aspect of watermark synchronization. Most watermarking algorithms suffer from geometric distortion attacks that desy...
Hae-Yeoun Lee, Heung-Kyu Lee, Junseok Lee
KES
2005
Springer
13 years 9 months ago
Sustainable Memory System Using Global and Conical Spaces
: We present a concept and implementation of a computational support for spatial memory management and describe its temporal evolution. Our essential idea is to use an immersible g...
Hidekazu Kubota, Satoshi Nomura, Yasuyuki Sumi, To...
KES
2005
Springer
13 years 9 months ago
Fuzzy Logic and Neuro-fuzzy Modelling of Diesel Spray Penetration
: The aim of this study was to demonstrate the effectiveness of an adaptive neuro-fuzzy inference system (ANFIS) for the prediction of diesel spray penetration length in the cylind...
Shaun H. Lee, Robert J. Howlett, Simon D. Walters,...
KES
2005
Springer
13 years 9 months ago
Reconfigurable Power-Aware Scalable Booth Multiplier
Abstract. An energy-efficient power-aware design is highly desirable for digital signal processing functions that encounter a wide diversity of operating scenarios in battery-power...
Hanho Lee
KES
2005
Springer
13 years 9 months ago
A Network Service Access Control Framework Based on Network Blocking Algorithm
Abstract. Currently, the major focus on the network security is securing individual components as well as preventing unauthorized access to network service. In this paper, we propo...
Jahwan Koo, Seong-Jin Ahn
KES
2005
Springer
13 years 9 months ago
Adaptation on the Commons
Richard M. Kim, Simon M. Kaplan
KES
2005
Springer
13 years 9 months ago
An Intelligent Approach of Packet Marking at Edge Router for IP Traceback
Abstract. With the help of real source identity in packets, network security system can intelligently protect and counteract the attacks. Packet marking is an important method of s...
Dae Sun Kim, Choong Seon Hong, Yu Xiang