EvolutionaryDesign of an Artificial Evolutionary Fuzzy Immune System for Computer Network Security [Volume 3, Issue 3, 2005]
Exploration-exploitation balanceA Study on the Role of Exploration in Multiagent Reinforcement Learning Considering Task Type [Volume 3, Issue 3, 2005]
F
FarsDatPerformance Improvement of Speaker Identification in Noisy Conditions [Volume 3, Issue 3, 2005]
Feature ExtractionFingerprint Classification Based on Spectral Features [Volume 3, Issue 2, 2005]
Filter BanksSubband Beamforming of Miniature Microphone Arrays for Audio Applications* [Volume 3, Issue 2, 2005]
FuzzyDesign of an Artificial Evolutionary Fuzzy Immune System for Computer Network Security [Volume 3, Issue 3, 2005]
G
Gaussian Mixture ModelSpeed and Accuracy Improvement in Open Set Speaker Identification [Volume 3, Issue 1, 2005]
I
Image SegmentationImage Segmentation Combining Edge and Texture Information [Volume 3, Issue 1, 2005]
IndexingA New Method for Color Image Indexing Based on Compression and Mathematical Morphology [Volume 3, Issue 3, 2005]
Interconnect networksPerformance Analysis of Fully Adaptive Routing Algorithms in Wormhole-Switched Interconnect Networks ∗ [Volume 3, Issue 2, 2005]
InternetPerformance Improvement of Speaker Identification in Noisy Conditions [Volume 3, Issue 3, 2005]
L
Layered ArchitectureA New Architecture for Multi Agent System in Rescue Simulation Environment [Volume 3, Issue 2, 2005]
M
Machine TranslationUsing a Tree-Adjoining Grammar in Translating English into Persian [Volume 3, Issue 1, 2005]
Massively parallel computersPerformance Analysis of Fully Adaptive Routing Algorithms in Wormhole-Switched Interconnect Networks ∗ [Volume 3, Issue 2, 2005]
Mathematical MorphologyA New Method for Color Image Indexing Based on Compression and Mathematical Morphology [Volume 3, Issue 3, 2005]
Message latencyPerformance Analysis of Fully Adaptive Routing Algorithms in Wormhole-Switched Interconnect Networks ∗ [Volume 3, Issue 2, 2005]
Microphone ArraySubband Beamforming of Miniature Microphone Arrays for Audio Applications* [Volume 3, Issue 2, 2005]
Model CheckingAn Efficient Model Checking Algorithm for a Fragment of μ-Calculus [Volume 3, Issue 3, 2005]
Multiagent SystemFlexibility in Negotiation Systems: An Argumentation-based Approach [Volume 3, Issue 2, 2005]
Natural Language ProcessingUsing a Tree-Adjoining Grammar in Translating English into Persian [Volume 3, Issue 1, 2005]
NegotiationFlexibility in Negotiation Systems: An Argumentation-based Approach [Volume 3, Issue 2, 2005]
Network SecurityDesign of an Artificial Evolutionary Fuzzy Immune System for Computer Network Security [Volume 3, Issue 3, 2005]
NLPCA neural networkImprovement of Speech Recognition Using Combination of Lexical Knowledge with Feature Parameters [Volume 3, Issue 3, 2005]
P
Performance EvaluationPerformance Analysis of Fully Adaptive Routing Algorithms in Wormhole-Switched Interconnect Networks ∗ [Volume 3, Issue 2, 2005]
PlacementA Similarity-Based Framework for Integrated Temporal Partitioning and Physical Design of Reconfigurable Computing Systems [Volume 3, Issue 3, 2005]