Research in Computing Science

An open access research journal
on
Computer science and computer engineering

Issue 40 (2008)

 

Download complete issue 40 - Cover - Back cover - DBLP metadata

Front matter (pp. ii–v)

Table of Contents (pp. viii–ix)

1.

Ernesto Bautista-Thompson, Gustavo Verduzco-Reyes, Luis De la Cruz-De la Cruz

Dimer Patterns in Database of Viral Genomes: An Analysis with GHSOM (pp. 3–12; abstract)

2.

Elio Villasenor, Humberto Carrillo, Nieves Martinez de la Escalera, Valeria Millan

The use of Weighted Metric SOM Algorithm as a Visualization Tool for Demographic Studies (pp. 13–26; abstract)

3.

Alejandra Cervera, Antonio Neme, Omar Neme

Determinants of Export Performance: An Analysis using the SOM Algorithm (pp. 27–38; abstract)

4.

Alberto García Aguilar, José Carlos Méndez de la Torre, Leopoldo Trueba Vázquez

Construction of Autosimilar Electoral Units using Self-Organizing Maps (pp. 39–48; abstract)

5.

EMR Michel, G Reyes, JRG Pulido, MA Aréchiga

A Novel Approach to the Analysis of Volcanic-Domain Data using Self-Organizing Maps: A Preliminary Study on the Volcano of Colima (pp. 49–62; abstract)

6.

Bai Xiao, Peter M. Hall

Shape Decomposition for Graph Representation (pp. 63–72; abstract)

7.

Grigori Sidorov, Guoxing Zhao, Jizin Ma, Mittos Petridis

A Critical Examination of Node-Similarity Based Graph Matching Algorithms (pp. 73–82; abstract)

8.

David Suarez-Hernandez, Edgardo Felipe-Riverón

Thresholding Method based on the Hmax and Hmin Morphological Operators (pp. 83–94; abstract)

9.

Ernesto Cortés Pérez, Francisco Viveros Jiménez, Tomás Morales Acoltzi

3-D Fractal Characterization of Tumors from a Computer Tomography Scan (pp. 95–108; abstract)

10.

Hugo Terashima-Marín, Luis M. Fernández-Carrasco, Manuel Valenzuela-Rendón

Self-healing and Self-protecting Computing Systems: In the Search of Autonomic Computing (pp. 109–124; abstract)

11.

A. F. Martinez-Herrera, C. Vargas-Rosales, D. Torres-Román, P. Velarde-Alvarado

Entropy-Based Profiles for Intrusion Detection in LAN Traffic (pp. 125–130; abstract)

12.

Carlos Mex-Perera, Jose Zamora-Elizondo, Raúl Monroy

Intrusion Detection for Mobile Ad-Hoc Networks based on a Non-Negative Matrix Factorization Method (pp. 131–140; abstract)

Back matter (p. 145)