2008 Second Asia International Conference on Modelling & Simulation (AMS)

13-15 May 2008

Filter Results

Displaying Results 1 - 25 of 200
  • [Front cover]

    Publication Year: 2008, Page(s): C1
    Request permission for commercial reuse | |PDF file iconPDF (186 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2008, Page(s): i
    Request permission for commercial reuse | |PDF file iconPDF (18 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2008, Page(s): iii
    Request permission for commercial reuse | |PDF file iconPDF (51 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2008, Page(s): iv
    Request permission for commercial reuse | |PDF file iconPDF (50 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2008, Page(s):v - xiv
    Request permission for commercial reuse | |PDF file iconPDF (192 KB)
    Freely Available from IEEE
  • Welcome Message from the Chairs

    Publication Year: 2008, Page(s): xv
    Request permission for commercial reuse | |PDF file iconPDF (185 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference organization

    Publication Year: 2008, Page(s):xvi - xvii
    Request permission for commercial reuse | |PDF file iconPDF (151 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2008, Page(s): xviii
    Request permission for commercial reuse | |PDF file iconPDF (149 KB)
    Freely Available from IEEE
  • Technical Sponsors

    Publication Year: 2008, Page(s): xix
    Request permission for commercial reuse | |PDF file iconPDF (124 KB)
    Freely Available from IEEE
  • Chance Discovery and Chance Creation: A Data-Visualization Approach to Value Sensitive Innovation

    Publication Year: 2008, Page(s):xx - xxi
    Request permission for commercial reuse | |PDF file iconPDF (180 KB) | HTML iconHTML
    Freely Available from IEEE
  • Simulators are the Key for Large-Scale Instrumentation and Control System Refurbishment Projects

    Publication Year: 2008, Page(s):xxii - xxiii
    Cited by:  Papers (1)
    Request permission for commercial reuse | |PDF file iconPDF (195 KB)
    Freely Available from IEEE
  • Robotics: The New Emerging Applications

    Publication Year: 2008, Page(s): xxiv
    Request permission for commercial reuse | |PDF file iconPDF (161 KB)
    Freely Available from IEEE
  • Modeling and Simulation in Geotechnical Engineering for Interactive Design and Analysis with Finite Element Methods

    Publication Year: 2008, Page(s): xxv
    Request permission for commercial reuse | |PDF file iconPDF (135 KB) | HTML iconHTML
    Freely Available from IEEE
  • Modeling and Cost Simulation of Stand-Alone Solar and Biomass Energy

    Publication Year: 2008, Page(s):1 - 6
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1523 KB) | HTML iconHTML

    This paper concerns on modeling of stand alone biomass and solar energy system in Sarawak. Sarawak state needs to develop a number of small power generations in remote areas using stand alone system. Stand alone power systems are of special interest combined with renewable energy design in areas not connected to the capital electric grid. The ultimate goal of this project is to obtain a reliable a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ASRTS: An Agent-Based Simulator for Real-Time Schedulers

    Publication Year: 2008, Page(s):7 - 12
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (306 KB) | HTML iconHTML

    In response to the complexity of communication networks, simulation was and remains the only way to evaluate network performance. Unfortunately, traditional simulation methods are not adapted to all networks such as networks with quality of service and networks with dynamic aspect. To overcome this limitation, a new method to simulate dynamic networks based on multi-agents simulation had been prop... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Select Reliable Strategy in Multi-Agent Systems Using Fuzzy Logic-Based Fusion

    Publication Year: 2008, Page(s):13 - 17
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (268 KB) | HTML iconHTML

    In this paper we implemented a fully knowledge base approach for determine the attack/defense strategies of a team of soccer robots as a multi agent system which are playing two cooperative and non-cooperative games in a battle field simultaneously. First two teams play in non-cooperative game and find their equilibrium point and payoff then all players in a team tries reaching to this position. A... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Discrete-Event System Simulation for Information Quality Assurance

    Publication Year: 2008, Page(s):18 - 23
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (428 KB) | HTML iconHTML

    The objective of this paper is to propose an intelligent information quality assurance (IQA) system using configurable event-driven process chain (C-EPC) simulation based analysis, which is capable to monitor network status, evaluate IQ, generate assuring strategies, and apply it to the network. To do this, we have employed the C-EPC formalism concept based on the advanced modeling and simulation ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modelling Database Security through Agent-Based Simulation

    Publication Year: 2008, Page(s):24 - 28
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (230 KB) | HTML iconHTML

    This paper presents an implementation on modelling the database security using agent-based simulation (ABS). While ABS has been widely used for social simulations since the 1990s, not many previous studies have tried simulating scenarios in more technical domains and it is the main objective of this work to fill in the gap. We develop a database security simulation program that includes permission... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RDF Repository of Experts Based on Context Oriented Automatic Annotation Framework

    Publication Year: 2008, Page(s):29 - 34
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (397 KB) | HTML iconHTML

    Semantic Web applications use domain Ontology together with Web pages annotated with machine- understandable metadata related to the Ontology. Current Semantic Web applications often rely on the participation of individuals to annotate their documents or create a special page to describe the information and semantics needed. The annotation process has limited the success of such systems. We, at Su... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Semantics Based Computational Resource Broker for Grid

    Publication Year: 2008, Page(s):35 - 40
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (294 KB) | HTML iconHTML

    Grid technology enables large scale aggregation of computational and other resources for sharing across organizational boundaries. Resource broker, the gateway to a managed set of computing elements, handles the job submission on behalf of the user. In this paper we present the design and development of computational resource broker for grid using semantic resource description and matching techniq... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • O2DSS: A Framework for Ontology-Based Decision Support Systems in Pervasive Computing Environment

    Publication Year: 2008, Page(s):41 - 45
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (272 KB) | HTML iconHTML

    Applications in pervasive computing environment exploit information about the context of use, such as the location, tasks and preferences of the user, in order to adapt their behavior in response to changing operating environments and user requirements. Utilizing context with aid of ontology in data and model, decision support systems can provide better and more desirable support to their users. T... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Relevant Portion of an Ontology: Defining a System of ED Rules Using a Part-Whole Relationship

    Publication Year: 2008, Page(s):46 - 51
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (286 KB) | HTML iconHTML

    This paper defines rules for an ontology server that enables the selection of the relevant portion of an ontology based on the notion of existence dependency (ED). We examine the ED on the part-whole relation represented in a unified modeling language (UML) and discuss its importance as a modeling primitive for the systems such as OWL (ontology Web language) and UML for ontology definition meta-mo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards a Model for Inferring Trust in Heterogeneous Social Networks

    Publication Year: 2008, Page(s):52 - 58
    Cited by:  Papers (3)  |  Patents (8)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (3642 KB) | HTML iconHTML

    People usually use trust and reputation to cope with uncertainty which exists in the nature and routines. The existing approaches for inferring trust rely on homogeneous relations. In other words, trust is just inferred by a homogeneous relation. In this paper, we present a new model for inferring trust using heterogeneous social networks; we use relation extraction to make a trust relation from t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Efficiency Security Model of Routing Protocol in Wireless Sensor Networks

    Publication Year: 2008, Page(s):59 - 64
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (282 KB) | HTML iconHTML

    Routing security is one of the most important considerations in Wireless Sensor Networks (WSNs). Currently, more and more people pay attention to this issue. But most of the secure protocols must use public key and symmetric cryptographies which induce heavy load to nodes in the whole routing stage. In this paper, we propose an Efficiency Security Model of Routing (ESMR). In routing stage, ESMR on... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Notice of Violation of IEEE Publication Principles
    Promoting B2B Integration with Semantic Web Service Technologies

    Publication Year: 2008, Page(s):65 - 70
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (321 KB) | HTML iconHTML

    Notice of Violation of IEEE Publication PrinciplesPromoting B2B Integration with Semantic Web Service Technologiesby Seyyed Ali Rokni Dezfouli, Jafar Habibi, Soheil Hassas Yeganehin the Proceedings of the Second Asia International Conference on Modelling and Simulation, May 2008, pp. 65-70After careful and considered review of the content and authorship of this paper by a d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.