default search action
AIS 2004: Jeju Island, Korea
- Tag Gon Kim:
Artificial Intelligence and Simulation, 13th International Conference on AI, Simulation, and Planning in High Autonomy Systems, AIS 2004, Jeju Island, Korea, October 4-6, 2004, Revised Selected Papers. Lecture Notes in Computer Science 3397, Springer 2005, ISBN 3-540-24476-X
Keynotes
- Bernard P. Zeigler, Rajanikanth Jammalamadaka, Salil R. Akerkar:
Continuity and Change (Activity) Are Fundamentally Related in DEVS Simulation of Continuous Systems. 1-13 - Norman Y. Foo, Pavlos Peppas:
Systems Theory: Melding the AI and Simulation Perspectives. 14-23
Modeling and Simulation Methodologies I
- Kyungtae Lee, Kyu-Hong Shim, M. Edwin Sawan:
Unified Modeling for Singularly Perturbed Systems by Delta Operators: Pole Assignment Case. 24-32 - Manabu Ichikawa, Hideki Tanuma, Yusuke Koyama, Hiroshi Deguchi:
A Disaster Relief Simulation Model of a Building Fire. 33-41 - Ko Ishiyama, Shusuke Komuro, Hideki Tanuma, Yusuke Koyama, Hiroshi Deguchi:
Evaluation of Transaction Risks of Mean Variance Model Under Identical Variance of the Rate of Return - Simulation in Artificial Market. 42-49
Intelligent Control
- Bobby D. Gerardo, Jaewan Lee, In-ho Ra, Sang-Yong Byun:
Association Rule Discovery in Data Mining by Implementing Principal Component Analysis. 50-60 - Sungwon Jung, Yongwon Seo, Chankwon Park, Jinwoo Park:
Reorder Decision System Based on the Concept of the Order Risk Using Neural Networks. 61-70 - Mi Ra Yi, Tae Ho Cho:
Simulation Modeling with Hierarchical Planning: Application to a Metal Manufacturing System. 71-80
Computer and Network Security I
- Hyung-Jong Kim:
Vulnerability Modeling and Simulation for DNS Intrusion Tolerance System Construction. 81-89 - Hyung-Woo Lee, Taekyoung Kwon, Hyung-Jong Kim:
NS-2 Based IP Traceback Simulation Against Reflector Based DDoS Attack. 90-99 - Hye Sun Park, Eun Yi Kim, Sang Su Jang, Hang Joon Kim:
Recognition of Human Action for Game System. 100-108 - So-Hee Park, Jaehoon Nah, Kyo-Il Chung:
The Implementation of IPsec-Based Internet Security System in IPv4/IPv6 Network. 109-116
HLA and Simulator Interoperation
- Fernando J. Barros:
Describing the HLA Using the DFSS Formalism. 117-127 - Jae-Hyun Kim, Tag Gon Kim:
Proposal of High Level Architecture Extension. 128-137 - Jong Sik Lee:
High Performance Modeling for Distributed Simulation. 138-146 - Seung-Lyeol Cha, Thomas W. Green, Chong-Ho Lee, Cheong Youn:
The Hierarchical Federation Architecture for the Interoperability of ROK and US Simulations. 147-156
Manufacturing
- Suhn-beom Kwon, Kyung-shik Shin:
PPSS: CBR System for ERP Project Pre-planning. 157-166 - Jong-Kun Lee:
A Scheduling Analysis in FMS Using the Transitive Matrix. 167-178 - Jai Hyun Seu, Byung-Keun Song, Heung Shik Kim:
Simulation of Artificial Life Model in Game Space. 179-187 - Seung-Hun Yoo, Tae-Dong Lee, Chang-Sung Jeong:
An Extensible Framework for Advanced Distributed Virtual Environment on Grid. 188-197
Agent-Based Modeling
- Kyoichi Kijima, Hisao Hirata:
Diffusion of Word-of-Mouth in Segmented Society: Agent-Based Simulation Approach. 198-206 - Sun Park, Sang Ho Park, Ju-Hong Lee, Jung-sik Lee:
E-mail Classification Agent Using Category Generation and Dynamic Category Hierarchy. 207-214 - Takahiro Kitakubo, Yusuke Koyama, Hiroshi Deguchi:
The Investigation of the Agent in the Artificial Market. 215-223 - Hoon Jin, In-Cheol Kim:
Plan-Based Coordination of a Multi-agent System for Protein Structure Prediction. 224-232
DEVS Modeling and Simulation
- Javier Ameghino, Gabriel A. Wainer:
Using Cell-DEVS for Modeling Complex Cell Spaces. 233-242 - Moon Ho Hwang, Feng Lin:
State Minimization of SP-DEVS. 243-252 - Sangjoon Park, Kwanjoong Kim:
DEVS Formalism: A Hierarchical Generation Scheme. 253-261
Modeling and Simulation Methodologies II
- Naoki Konno, Kyoichi Kijima:
Does Rational Decision Making Always Lead to High Social Welfare?. 262-269 - Sumit Ghosh:
Large-Scale Systems Design: A Revolutionary New Approach in Software Hardware Co-design. 270-274 - Ki Jung Hong, Tag Gon Kim:
Timed I/O Test Sequences for Discrete Event Model Verification. 275-284
Parallel and Distributed Modeling and Simulation I
- Baohong Liu, Kedi Huang:
A Formal Description Specification for Multi-resolution Modeling (MRM) Based on DEVS Formalism. 285-294 - Jonghwa Choi, Soonyong Choi, Dongkyoo Shin, Dongil Shin:
Research and Implementation of the Context-Aware Middleware Based on Neural Network. 295-303 - Ho-Joon Park, Chang-Hoon Lee:
An Efficient Real-Time Middleware Scheduling Algorithm for Periodic Real-Time Tasks. 304-312 - Ki-Hyung Kim, Sang-Ryoul Han:
Mapping Cooperating GRID Applications by Affinity for Resource Characteristics. 313-322
Mobile Computer Network
- Won Young Lee, Hee Suk Seo, Tae Ho Cho:
Modeling of Policy-Based Network with SVDB. 323-332 - Sungjun Lim, Haengrae Cho:
Timestamp Based Concurrency Control in Broadcast Disks Environment. 333-341 - Soo-Hyun Park, Soo Young Shin, Gyoo Gun Lim:
Active Information Based RRK Routing for Mobile Ad Hoc Network. 342-350
Web-Based Simulation, Natural System
- Heejung Chang, Kangsun Lee:
Applying Web Services and Design Patterns to Modeling and Simulating Real-World Systems. 351-359 - Jeong-Oog Lee, Myeong-Cheol Ko, Hyun-Kyu Kang:
Ontology Based Integration of Web Databases by Utilizing Web Interfaces. 360-369 - Ki-Hyung Kim, Won-Seok Kang:
A Web Services-Based Distributed Simulation Architecture for Hierarchical DEVS Models. 370-379
Modeling and Simulation Environments
- Jong-Keun Lee, Min-Woo Lee, Jang-Se Lee, Sung-Do Chi, Syng-Yup Ohn:
Automated Cyber-attack Scenario Generation Using the Symbolic Simulation. 380-389 - Yun Bae Kim, Heesang Lee, Hoo-Gon Choi:
A Discrete Event Simulation Study for Incoming Call Centers of a Telecommunication Service Company. 390-399 - Sugjoon Yoon, Jaechun No, Jon Ahn:
Requirements Analysis and a Design of Computational Environment for HSE (Human-Sensibility Ergonomics) Simulator. 400-408
AI and Simulation
- Kyoung-Jae Kim, Hyunchul Ahn:
Using a Clustering Genetic Algorithm to Support Customer Segmentation for Personalized Recommender Systems. 409-415 - Norman Y. Foo, Pavlos Peppas:
System Properties of Action Theories. 416-427 - Sung Hoon Jung, Kwang-Hyun Cho:
Identification of Gene Interaction Networks Based on Evolutionary Computation. 428-439
Component-Based Modeling
- Miyoung Shin, Amrit L. Goel:
Modeling Software Component Criticality Using a Machine Learning Approach. 440-448 - Byungsun Ko, Jainyun Park:
Component Architecture Redesigning Approach Using Component Metrics. 449-459 - Chul Jin Kim, Eun Sook Cho:
A Workflow Variability Design Technique for Dynamic Component Integration. 460-469
Watermarking, Semantic
- JuHum Kwon, Chang-Joo Moon, Soo-Hyun Park, Doo-Kwon Baik:
Measuring Semantic Similarity Based on Weighting Attributes of Edge Counting. 470-480 - Ki-Ryong Kwon, Seong Geun Kwon, Suk Hwan Lee:
3D Watermarking Shape Recognition System Using Normal Vector Distribution Modelling. 481-489 - Ho Seok Moon, Myung Ho Sohn, Dong-Sik Jang:
DWT-Based Image Watermarking for Copyright Protection. 490-497 - Sungshik Koh, Chung Hwa Kim:
Cropping, Rotation and Scaling Invariant LBX Interleaved Voice-in-Image Watermarking. 498-507
Parallel and Distributed Modeling and Simulation II
- SangHak Lee, Tae-Choong Chung:
Data Aggregation for Wireless Sensor Networks Using Self-organizing Map. 508-517 - Sangho Lee, KyungOh Ohn, Haengrae Cho:
Feasibility and Performance Study of a Shared Disks Cluster for Real-Time Processing. 518-527 - Eunmi Choi, Dugki Min:
A Web Cluster Simulator for Performance Analysis of the ALBM Cluster System. 528-537 - Gu Su Kim, Kyoung-in Kim, Young Ik Eom:
Dynamic Load Balancing Scheme Based on Resource Reservation for Migration of Agent in the Pure P2P Network Environment. 538-546
Visualization, Graphics and Animation I
- Kee-Koo Kwon, Man-Seok Yang, Jin-Suk Ma, Sung-Ho Im, Dong-Sun Lim:
Application of Feedforward Neural Network for the Deblocking of Low Bit Rate Coded Images. 547-555 - Min-Suk Jung, Jonghoon Eom, Sang-Ryul Ryu, Sung-Ho Kim:
A Dynamic Bandwidth Allocation Algorithm with Supporting QoS for EPON. 556-564 - Jae-Kyung Kim, Won-Sung Sohn, Beom-Joon Cho, Soon-Bum Lim, Yoon-Chul Choy:
A Layered Scripting Language Technique for Avatar Behavior Representation and Control. 565-573 - Minho Park, Paul A. Fishwick:
An Integrated Environment Blending Dynamic and Geometry Models. 574-584
Computer and Network Security II
- Jang-Se Lee, Jung-Rae Jung, Jong Sou Park, Sung-Do Chi:
Linux-Based System Modelling for Cyber-attack Simulation. 585-596 - Siheung Kim, Seong-Jin Ahn, Jinwook Chung, Ilsung Hwang, Sunghe Kim Minki No, Seungchung Sin:
A Rule Based Approach to Network Fault and Security Diagnosis with Agent Collaboration. 597-606 - Jong Sou Park, Khin Mi Mi Aung:
Transient Time Analysis of Network Security Survivability Using DEVS. 607-616 - Taekyong Nam, Ho Gyun Lee, Chi Yoon Jeong, Chimoon Han:
A Harmful Content Protection in Peer-to-Peer Networks. 617-626
Business Modeling
- Jae-Woo Lee:
Security Agent Model Using Interactive Authentication Database. 627-634 - Ryo Sato:
Discrete-Event Semantics for Tools for Business Process Modeling in Web-Service Era. 635-644 - Dugki Min, Eunmi Choi:
An Architecture Modelling of a Workflow Management System. 645-654 - Jae-Woo Lee:
Client Authentication Model Using Duplicated Authentication Server Systems. 655-662
Visualization, Graphics and Animation II
- Donghoon Lee, Byoung-Hyun Ju, Kyungsook Han:
Dynamic Visualization of Signal Transduction Pathways from Database Information. 663-672 - Min Hong, Anis Karimpour-Fard, Steve Russell, Lawrence Hunter:
Integrated Term Weighting, Visualization, and User Interface Development for Bioinformation Retrieval. 673-682 - Hyun-Kyu Kang, Jeong-Oog Lee, Heung Seok Jeon, Myeong-Cheol Ko, Doo-Hyun Kim, Ryumduck Oh, Wonseog Kang:
CONDOCS: A Concept-Based Document Categorization System Using Concept-Probability Vector with Thesaurus. 683-691
DEVS Modeling and Simulation
- Mamadou D. Seck, Claudia S. Frydman, Norbert Giambiasi:
Using DEVS for Modeling and Simulation of Human Behaviour. 692-698 - Maâmar El-Amine Hamri, Norbert Giambiasi, Claudia S. Frydman:
Simulation Semantics for Min-Max DEVS Models. 699-708
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.