Conferences in DBLP
Yale N. Patt The microprocessor of the year 2014: do Pentium 4, Pentium M, and Power 5 provide any hints? [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:1- [Conf ] Song Ci , Mohsen Guizani A dynamic resource scheduling scheme for CDMA2000 systems. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:7- [Conf ] J. Park , Salim Sahni Maximum lifetime broadcasting in wireless networks. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:8- [Conf ] Guangzhi Qu , Salim Hariri , Mazin S. Yousif Multivariate statistical analysis for network attacks detection. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:9- [Conf ] Dana Vrajitoru , Jason DeBoni Consistent graph layout for weighted graphs. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:13- [Conf ] Ahmed A. Belal , Amr Elmasry Finding maximum-cost minimum spanning trees. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:14- [Conf ] Alex Fit-Florea , David W. Matula Determining all pairs edge connectivity of a 4-regular graph in O(|V|). [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:15- [Conf ] Faisal N. Abu-Khzam , Michael A. Langston , W. Henry Suters Fast, effective vertex cover kernelization: a tale of two algorithms. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:16- [Conf ] O. Escalante , T. Perez , Julio Solano , Ivan Stojmenovic RNG-based searching and broadcasting algorithms over Internet graphs and peer-to-peer computing systems. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:17- [Conf ] H. Masuyama , E. Masuyama An all-to-all broadcasting algorithm for faulty hypercubes. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:18- [Conf ] Ashit Talukder , Rajankumar Bhatt , L. Chandramouli , Syed Muhammad Ali , Rishi Pidva , S. Monacos Autonomous resource management and control algorithms for distributed wireless sensor networks. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:19- [Conf ] Antoine Tarault , Jamal Atif , Xavier Ripoche , Patrick Bourdot , Angel Osorio Classification of radiological exams and organs by belief theory. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:20- [Conf ] Mustapha Bourahla , Mohamed Benmohamed Efficient partition of state space for parallel reachability analysis. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:21- [Conf ] Fatih Kocan , Mehmet Hadi Gunes Acyclic circuit partitioning for path delay fault emulation. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:22- [Conf ] N. Emad , O. Hamdi-Larbi , Z. Mahjoub On sparse matrix-vector product optimization. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:23- [Conf ] Octavian Paul Rotaru , Marian Dobre Reusability metrics for software components. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:24- [Conf ] N. A. R. Yousri , Khalil M. Ahmed , Nagwa M. El-Makky Algorithms for selecting materialized views in a data warehouse. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:27- [Conf ] Ahlem Nabli , Jamel Feki , Faïez Gargouri Automatic construction of multidimensional schema from OLAP requirements. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:28- [Conf ] A. S. Sawires , Nagwa M. El-Makky , Khalil M. Ahmed Multilevel chunking of multidimensional arrays. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:29- [Conf ] Adrian Tanasescu , Omar Boussaid , Fadila Bentayeb Preparing complex data for warehousing. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:30- [Conf ] Xuanfu Wu , Zhengxin Chen Toward dynamic ensembles: the BAGA approach. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:31- [Conf ] Mohamed Nadif , Gérard Govaert Block clustering via the block GEM and two-way EM algorithms. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:32- [Conf ] Fadi A. Thabtah , Peter I. Cowling , Yonghong Peng MCAR: multi-class classification based on association rule. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:33- [Conf ] A. Aslinger , S. H. Son Efficient replication control in distributed real-time databases. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:34- [Conf ] Ahmad S. Al-Mogren , Margaret H. Dunham Data broadcast classification. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:35- [Conf ] Praveen Madiraju , Rajshekhar Sunderraman An efficient constraint planning algorithm for multidatabases. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:36- [Conf ] Vijay Kumar , Nitin Prabhu , Panos K. Chrysanthis HDC - hot data caching in mobile database systems. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:37- [Conf ] A. M. Abdelbar Towards an improved twin-page method for rapid transaction undo recovery. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:38- [Conf ] A. M. Abdelbar , Plínio Roberto Souza Vilela , Mario Jino Mapping faults to failures in SQL manipulation commands. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:39- [Conf ] Takahiro Hara , M. Nakadori , Wataru Uchida , Kazuhiko Maeda , Shojiro Nishio Update propagation based on tree structure in peer-to-peer networks. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:40- [Conf ] Moustafa Ghanem , Alexandros Chortaras , Yike Guo , Anthony Rowe , Jon Ratcliffe A grid infrastructure for mixed bioinformatics data and text mining. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:41- [Conf ] Krzysztof Pancerz , Zbigniew Suraj Automated discovering concurrent models from data tables - an overview of algorithms. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:43- [Conf ] Sidi Mohamed Benslimane , Djamel Amar Bensaber , Mimoun Malki Towards a multi-representation ontology-based information systems mediation. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:44- [Conf ] José Fernando Rodrigues Jr. , Agma J. M. Traina , Caetano Traina Jr. Enhanced visual evaluation of feature extractors for image mining. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:45- [Conf ] Mohamed A. Sharaf , Panos K. Chrysanthis , Alexandros Labrinidis Preemptive rate-based operator scheduling in a data stream management system. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:46- [Conf ] A. A. Abdel-Aziz , Hussien Oakasha Mapping XML DTDs to relational schemas. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:47- [Conf ] J. Mizher , Margaret H. Dunham , Lin Lu , Yongqiao Xiao Scalability of OAT. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:48- [Conf ] M. E. El-Sharkawi , N. A. El-Hadi El Tazi LNV: relational database storage structure for XML documents. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:49- [Conf ] N. Nasser , H. Hassanein Optimal multi-class guard channel admission policy under hard handoff constraints. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:53- [Conf ] M. Bitam , H. Alla Performance evaluation of a TCP/IP transmission using hybrid Petri nets. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:54- [Conf ] M. Tekala , R. Szabo Evaluation of scalable TCP. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:55- [Conf ] Octavio Ramirez Rojas , Jalel Ben-Othman , S. Sfar A new approach to manage roaming in IPv6. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:56- [Conf ] Yong Chen , S. H. Son A fault tolerant topology control in wireless sensor networks. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:57- [Conf ] Song Ci , Hamid Sharif Performance comparison of Kalman filter based approaches for energy efficiency in wireless sensor networks. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:58- [Conf ] Choong Hun Kim , Kyungseo Park , J. Fu , Ramez Elmasri Architectures for streaming data processing in sensor networks. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:59- [Conf ] M. Sklira , Andreas S. Pomportsis On the design of hybrid prioritized multiple access protocols for bank data center LANs. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:60- [Conf ] Jalel Ben-Othman , Hind Castel-Taleb , Lynda Mokdad Multi-services MAC protocol for wireless networks. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:61- [Conf ] Karim Seada , Ahmed Helmy An overview of geographic protocols in ad hoc and sensor networks. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:62- [Conf ] D. Benazzouz Performance of a shuffle exchange network using Markov chains. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:63- [Conf ] Mahmoud H. Ismail , Mustafa M. Matalgah Performance evaluation of the uplink of WCDMA in the TDD mode for wireless Internet services. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:64- [Conf ] Imad Jawhar , Jie Wu A dynamic range resource reservation protocol for QoS support in wireless networks. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:65- [Conf ] Karima Maâlaoui , Abdelfattah Belghith , Jean-Marie Bonnin , M. Tezeghdanti Performance evaluation of QoS routing algorithms. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:66- [Conf ] G. Nacira , A. Abdelaziz Secured net-banking by /spl theta/-Vigenere in Syverson's protocol. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:67- [Conf ] N. Sadek , Alireza Khotanzad Multi-scale network traffic prediction using k-factor Gegenbauer ARMA and MLP models. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:68- [Conf ] A. Zeid , S. Gurguis Towards autonomic Web services. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:69- [Conf ] Yinghong Fan , H. Hassanein , P. Martin Proactive control of distributed denial of service attacks with source router preferential dropping. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:70- [Conf ] Abdelilah Maach , Gregor von Bochmann , H. T. Mouftah An optimal shared protection scheme for optical networks. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:71- [Conf ] E. Y. Chen , A. Yonezawa Practical techniques for defending against DDoS attacks. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:72- [Conf ] Bin Tang On multicast scheduling and routing in multistage Clos networks. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:73- [Conf ] Emad Eldin Mohamed , Hussein M. Abdel-Wahab , I. Salama Multicast address management in the Internet: a study of the port blocking problem. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:74- [Conf ] N. B. Alimakni , Abdelfattah Belghith Heterogeneous and dynamic multipoint service in ATM networks. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:75- [Conf ] Faiza Tabbana , S. Tabbane , Mounir Frikha Fixed cellular network optimisation. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:76- [Conf ] Christos Basios , Manolis Solidakis Current trends and challenges towards wireless Internet. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:77- [Conf ] Jihad Qaddour , Raffique A. C. Barbour Evolution to 4G wireless: problems, solutions, and challenges. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:78- [Conf ] Cuneyt Bayilmis , Ismail Erturk , Celal Ceken Extending CAN segments with IEEE 802.11 WLAN. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:79- [Conf ] S. J. Habib Simulated analysis of server placement on network topology designs. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:80- [Conf ] K. Wongrujira , Tim Hsin-Ting Hu , Aruna Seneviratne Incentive service model for P2P. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:81- [Conf ] Karsten Loesing , Guido Wirtz An implementation of reliable group communication based on the peer-to-peer network JXTA. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:82- [Conf ] M. Fathey , A. Fattah , A. El-Kadi , A. Zeid Towards an independent component model. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:83- [Conf ] Abdelhamid S. Abdelhamid , Ahmed A. Belal Secure transmission of sensitive data using multiple channels. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:87- [Conf ] Laith A. Al-Sulaiman , Hussein M. Abdel-Wahab Cooperative caching techniques for increasing the availability of MANET certificate authority services. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:88- [Conf ] Xinhua Zhang , Chunyan Jiang , Wanjun Huang , Christoph Meinel A XML format secure protocol - OpenSST. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:89- [Conf ] R. S. Al Omari , A. Al-Jaber A robust watermarking algorithm for copyright protection. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:90- [Conf ] Ramzi A. Haraty , Hadi Otrok , A. Nasser Kassar Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:91- [Conf ] S. M. Arafat An encryption algorithm based on alphabetic trees. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:92- [Conf ] L. Paola García-Perera , J. Carlos Mex-Perera , Juan Arturo Nolazco-Flores Multi-speaker voice cryptographic key generation. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:93- [Conf ] Salvador Mandujano , Arturo Galván , J. A. Nolazco An ontology-based multiagent approach to outbound intrusion detection. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:94- [Conf ] S. Itani , Najwa Aaraj , D. Abdelahad , Ayman I. Kayssi Neighbor stranger discrimination: a new defense mechanism against Internet DDOS attacks. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:95- [Conf ] Philippe Balbiani A formal examination of roles and permissions in access control. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:96- [Conf ] J. G. Dunham , Ming-Tan Sun , J. C. R. Tseng Classifying file type of stream ciphers in depth using neural networks. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:97- [Conf ] K. E. A. Negm Design, implementation and testing of mobile agent protection mechanism for MANETS. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:98- [Conf ] Sami Beydeda Research in testing COTS components - built-in testing approaches. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:101- [Conf ] Ines Hamdi , Imed Riadh Farah , Mohmed B. Ahmed Analysing spatial-temporal data based on generic GIS. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:102- [Conf ] Jemal H. Abawajy , M. J. Hu A new Internet meta-search engine and implementation. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:103- [Conf ] Susmit Bagchi Memory estimation and allocation algorithms for MDVM system. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:104- [Conf ] Wegdan Abdelsalam , Yasser Ebrahim , Siu-Cheung Chau , Maher Ahmed A user modeling approach to improving estimation accuracy in location-tracking applications. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:105- [Conf ] Marcello Cinque , Domenico Cotroneo , Cristiano di Flora , Armando Migliaccio , Stefano Russo ESPERANTO: a middleware platform to achieve interoperability in nomadic computing domains. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:106- [Conf ] A. Neho An extensible framework for automatic negotiation in distributed online bargaining applications. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:107- [Conf ] Sylvanus A. Ehikioya , B. Ola A comparative study of specification methods for electronic commerce systems. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:108- [Conf ] L. Kahloul , Kamel Barkaoui , Zaidi Sahnoun Using AUML to derive formal modeling agents interactions. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:109- [Conf ] Hassan Gomaa , Mazen Saleh Software product line engineering for Web services and UML. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:110- [Conf ] Vitus S. W. Lam , Julian A. Padget An integrated environment for communicating UML statechart diagrams. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:111- [Conf ] Kalaivani Appukkutty , Hany H. Ammar , K. G. Popstajanova Software requirement risk assessment using UML. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:112- [Conf ] Hany Loulou , Ahmed Hadj Kacem , Mohamed Jmaiel A formal model for mobile agent systems using Z. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:113- [Conf ] German Montejano , Robert Uzal , Daniel Riesco , Aristides Dasso , Ana Funes , M. Peralta , C. Salgado , Narayan C. Debnath Integrating balanced scorecard domain formalization with underlying project plan formalization. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:114- [Conf ] Rami Rifaieh , Aïcha-Nabila Benharkat Studying semantic sharing problem within enterprise information systems. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:115- [Conf ] Sihem Ben Sassi , Lamia Labed Jilani , Henda Hajjami Ben Ghézala COTS-based development process meta-modeling. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:116- [Conf ] Rajesh Gunnalan , Mark Shereshevsky , Hany H. Ammar Pseudo dynamic metrics [software metrics]. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:117- [Conf ] Narayan C. Debnath , Daniel Riesco , German Montejano , Robert Uzal , L. Baigorria , Aristides Dasso , Ana Funes A technique based on the OMG metamodel and OCL for the definition of object-oriented metrics applied to UML models. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:118- [Conf ] Hai Jin , Qionghua Hu , Xiaofei Liao , Hao Chen , Dafu Deng IMAC: an importance-level based adaptive CPU scheduling scheme for multimedia and non-real time applications. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:119- [Conf ] Gustavo Fortes Tondello , Antônio Augusto Fröhlich On the automatic configuration of application-oriented operating systems. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:120- [Conf ] M. Khemakhem , Abdelfattah Belghith A multipurpose multi-agent system based on a loosely coupled architecture to speedup the DTW algorithm for Arabic printed cursive OCR. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:121- [Conf ] Jian-Wei Wang , Chi-Cheng Li , Feng-Jian Wang Dynamic activities on an agent-based workflow management system. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:122- [Conf ] Amira Regayeg , Ahmed Hadj Kacem , Mohamed Jmaiel Towards a formal methodology for developing multi-agent applications using temporal Z. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:123- [Conf ] Walid Abdelmoez , Mark Shereshevsky , Rajesh Gunnalan , Hany H. Ammar , Bo Yu , S. Bogazzi , M. Korkmaz , Ali Mili Quantifying software architectures: an analysis of change propagation probabilities. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:124- [Conf ] L. Pazzi , A. Malagoli An explicit modeling approach for wholes in the object-oriented development process. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:125- [Conf ] R. A. Haraty , S. A. Khatib TREX: a temporal reference extractor for Arabic texts. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:126- [Conf ] A. El Baati , Adel M. Alimi , M. Charfi , Abdel Ennaji Recovery of temporal information from off-line Arabic handwritten. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:127- [Conf ] Nikola Stojanovic The human genome project: software challenges and future directions. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:128- [Conf ] Salim Chitroub Contextual classifier combination by Markov random fields-Bayes formalism and evolutionary programming. Application: image classification enhancement. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:129- [Conf ] W. Barhoumi , E. Zagrouba Towards a standard approach for medical images segmentation. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:130- [Conf ] Amr R. Abdel-Dayem , Mahmoud R. El-Sakka , Aaron Fenster Watershed segmentation for carotid artery ultrasound images. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:131- [Conf ] Rabih Bashroush , Ivor T. A. Spence , Peter Kilpatrick , T. John Brown A generic reference software architecture for load balancing over mirrored Web servers: NaSr case study. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:132- [Conf ] Michael Mrissa , Chirine Ghedira , Djamal Benslimane , Zakaria Maamar , Jacques Fayolle A mediation framework for Web services in a peer-to-peer environment. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:133- [Conf ] Zakaria Maamar , Soraya Kouadri Mostéfaoui On specifying an environment of software agents and Web services. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:134- [Conf ] R. Siblini , N. Mansour Testing Web services. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:135- [Conf ] O. Al-Shara Usability tri-parametric artifacts: a knowledge reporting artifact for software development reusability. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:136- [Conf ] A. Lehireche , A. Rahmoun The EE-method, an evolutionary engineering developer tool: neural net character mapping. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:137- [Conf ] Nadia Bouassida , Hanêne Ben-Abdallah , Faïez Gargouri , Abdelmajid Ben Hamadou Towards a rigorous architectural reuse. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:138- [Conf ] R. B. Hajri , Lamia Labed Jilani , Henda Hajjami Ben Ghézala An infrastructure to help development with reuse. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:139- [Conf ] Islam A. M. El-Maddah Component-based development of process control systems. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:140- [Conf ] Audrey Marchand , Maryline Silly-Chetto QoS scheduling components based on firm real-time requirements. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:141- [Conf ] M. Teresa Higuera-Toledano Supporting several real-time applications on the Java platform. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:142- [Conf ] Abbas Tarhini , Antoine Rollet , Hacène Fouchal A pragmatic approach for testing robustness on real-time component based systems. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:143- [Conf ] A. Adly , L. Fattouh , M. Moustafa , A. A. Elmoneim Using GIS and knowledge-based system for agricultural land drainage planning. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:144- [Conf ] Mohamed Ben Ammar , Mahmoud Neji , Adel M. Alimi The integration of an emotional system in the intelligent system. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:145- [Conf ] Luis R. Salgado-Garza , Juan Arturo Nolazco-Flores , P. D. Diaz-Lopez Spoken information retrieval for multimedia databases. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:146- [Conf ] G. Aurino , B. Discepolo , A. Nutile , G. Ramella Automatic data management in architecture and engineering applications. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:147- [Conf ] Carlos Perez Leguizamo , Dake Wang , M. Takaishi , S. Kimura , Kinji Mori Autonomous decentralized database system restructuring for achieving timeliness. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:148- [Conf ] I. I. Elghandour , A. M. Hafez , M. H. Nagi , K. M. Nagi Performance analysis of locating files asynchronously in ad-hoc networks. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:149- [Conf ] Feng Ji , Ramez Elmasri , Yiming Zhang , B. Ritesh , Zoe Raja Incorporating concepts for bioingormatics data modeling into EER models. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:189-192 [Conf ] Adel Elsayed , Roger Hartley , Yongqiang Qiu Multimodal communication and articulation in e-learning. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:829-833 [Conf ] A. Choura , A. Samet , Adel M. Alimi Proman, a computer supported collective Learning environment through the project based learning. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:834-839 [Conf ] Edgar R. Weippl , A. Min Tjoa Privacy in E-learning: How to implement anonymity. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:840-846 [Conf ] Georgios A. Dafoulas , Lara A. Frumkin , Mike Mimirinis , Alan Murphy Investigating computer-supported cooperative learning: Applications for flexible learning environments. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:847-852 [Conf ] K. Kveton The role of standardization in eLOC development. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:853-856 [Conf ] K. Lindh , L. M. Gashi , I. Aro Creation of an online e-learning community for intercultural learning: IntCultNet - A ladder of success. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:857-862 [Conf ] O. D. Alcantara Deploying multicommunicative and @prende projects at Anahuac del Sur University. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:863-868 [Conf ] P. K. Oriogun Introducing a dedicated tool for facilitating a semi-structured approach to CMC messaging. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:869-877 [Conf ] Elli Georgiadou , Stylianos Hatzipanagos , Eleni Berki Resource-based learning and teaching-concerns, conflicts, consensus, community. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:878-882 [Conf ] T. Ishaya Ontologies for semantic integration of multimedia e-learning services. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:883-888 [Conf ] V. Venson , S. Ramalingam Standardising learning object descriptors: Focus on education value. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:889-892 [Conf ] S. Kamel WebCT - Evaluating the use of technology, lessons learnt from the American University in Cairo. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:893-896 [Conf ] Sérgio Crisóstomo , Susana Sargento , Marke Natkaniec , Norbert Vicari A QoS architecture integrating mobile Ad-Hoc and infrastructure networks. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:897-903 [Conf ] Kemal Akkaya , Mohamed F. Younis , Moustafa Youssef Efficient aggregation of delay-constrained data in wireless sensor networks. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:904-909 [Conf ] S. Malik , Muhammad Jaseemuddin , G. Ravindram , Hesham El-Sayed Improving thoughput and fairness of transport connections in IEEE 802.11 based wireless networks. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:910-915 [Conf ] Jing Liu , Jiandong Li , Guanghua Zhang Adaptive QoS-guarantee multiple access protocol in multimedia wireless network. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:916-920 [Conf ] V. Basto , V. Freitas A QoS distributed transport service. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:921-926 [Conf ] Jamal N. Al-Karaki , Ahmed E. Kamal Supporting quality of service in mobile Ad hoc networks. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:927-934 [Conf ] A. M. Taha , Hossam S. Hassanein , H. T. Mouftah On the integration of internet QoS paradigms and Ad-Hoc networks. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:935-940 [Conf ] N. Flores , A. Aguiar Reverse engineering of framework design using a meta-patterns-based approach. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:941-946 [Conf ] Imran A. Zualkernan Stability of reusable learning objects. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:947-949 [Conf ] Reda A. Ammar , Amal Abdel-raouf , Tahany A. Fergany Performance modeling and analysis of object oriented distributed software systems: A necessary step toward software performance stability. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:950-953 [Conf ] Islam A. M. El-Maddah Planning stable software applications using goal driving requirements analysis. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:954-958 [Conf ] Galal H. Galal-Edeen Architectural modelling to understand system evolution. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:959-964 [Conf ] S. Jager , R. T. Mittermier Architecture pattern for a generic explanation component. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:965-968 [Conf ] Osama Mabrouk Khaled , Hoda Mohammed Hosny Making efficient logging a common practice in software development. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:969-972 [Conf ] Haitham S. Hamza , Mohamed E. Fayad A novel approach for managing and reusing business rules in business architectures. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:973-978 [Conf ]