The SCEAS System
Navigation Menu

Conferences in DBLP

ACS/IEEE International Conference on Computer Systems and Applications (aiccsa)
2005 (conf/aiccsa/2005)

  1. Yale N. Patt
    The microprocessor of the year 2014: do Pentium 4, Pentium M, and Power 5 provide any hints? [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:1- [Conf]
  2. Song Ci, Mohsen Guizani
    A dynamic resource scheduling scheme for CDMA2000 systems. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:7- [Conf]
  3. J. Park, Salim Sahni
    Maximum lifetime broadcasting in wireless networks. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:8- [Conf]
  4. Guangzhi Qu, Salim Hariri, Mazin S. Yousif
    Multivariate statistical analysis for network attacks detection. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:9- [Conf]
  5. Dana Vrajitoru, Jason DeBoni
    Consistent graph layout for weighted graphs. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:13- [Conf]
  6. Ahmed A. Belal, Amr Elmasry
    Finding maximum-cost minimum spanning trees. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:14- [Conf]
  7. Alex Fit-Florea, David W. Matula
    Determining all pairs edge connectivity of a 4-regular graph in O(|V|). [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:15- [Conf]
  8. Faisal N. Abu-Khzam, Michael A. Langston, W. Henry Suters
    Fast, effective vertex cover kernelization: a tale of two algorithms. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:16- [Conf]
  9. O. Escalante, T. Perez, Julio Solano, Ivan Stojmenovic
    RNG-based searching and broadcasting algorithms over Internet graphs and peer-to-peer computing systems. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:17- [Conf]
  10. H. Masuyama, E. Masuyama
    An all-to-all broadcasting algorithm for faulty hypercubes. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:18- [Conf]
  11. Ashit Talukder, Rajankumar Bhatt, L. Chandramouli, Syed Muhammad Ali, Rishi Pidva, S. Monacos
    Autonomous resource management and control algorithms for distributed wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:19- [Conf]
  12. Antoine Tarault, Jamal Atif, Xavier Ripoche, Patrick Bourdot, Angel Osorio
    Classification of radiological exams and organs by belief theory. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:20- [Conf]
  13. Mustapha Bourahla, Mohamed Benmohamed
    Efficient partition of state space for parallel reachability analysis. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:21- [Conf]
  14. Fatih Kocan, Mehmet Hadi Gunes
    Acyclic circuit partitioning for path delay fault emulation. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:22- [Conf]
  15. N. Emad, O. Hamdi-Larbi, Z. Mahjoub
    On sparse matrix-vector product optimization. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:23- [Conf]
  16. Octavian Paul Rotaru, Marian Dobre
    Reusability metrics for software components. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:24- [Conf]
  17. N. A. R. Yousri, Khalil M. Ahmed, Nagwa M. El-Makky
    Algorithms for selecting materialized views in a data warehouse. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:27- [Conf]
  18. Ahlem Nabli, Jamel Feki, Faïez Gargouri
    Automatic construction of multidimensional schema from OLAP requirements. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:28- [Conf]
  19. A. S. Sawires, Nagwa M. El-Makky, Khalil M. Ahmed
    Multilevel chunking of multidimensional arrays. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:29- [Conf]
  20. Adrian Tanasescu, Omar Boussaid, Fadila Bentayeb
    Preparing complex data for warehousing. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:30- [Conf]
  21. Xuanfu Wu, Zhengxin Chen
    Toward dynamic ensembles: the BAGA approach. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:31- [Conf]
  22. Mohamed Nadif, Gérard Govaert
    Block clustering via the block GEM and two-way EM algorithms. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:32- [Conf]
  23. Fadi A. Thabtah, Peter I. Cowling, Yonghong Peng
    MCAR: multi-class classification based on association rule. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:33- [Conf]
  24. A. Aslinger, S. H. Son
    Efficient replication control in distributed real-time databases. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:34- [Conf]
  25. Ahmad S. Al-Mogren, Margaret H. Dunham
    Data broadcast classification. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:35- [Conf]
  26. Praveen Madiraju, Rajshekhar Sunderraman
    An efficient constraint planning algorithm for multidatabases. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:36- [Conf]
  27. Vijay Kumar, Nitin Prabhu, Panos K. Chrysanthis
    HDC - hot data caching in mobile database systems. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:37- [Conf]
  28. A. M. Abdelbar
    Towards an improved twin-page method for rapid transaction undo recovery. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:38- [Conf]
  29. A. M. Abdelbar, Plínio Roberto Souza Vilela, Mario Jino
    Mapping faults to failures in SQL manipulation commands. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:39- [Conf]
  30. Takahiro Hara, M. Nakadori, Wataru Uchida, Kazuhiko Maeda, Shojiro Nishio
    Update propagation based on tree structure in peer-to-peer networks. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:40- [Conf]
  31. Moustafa Ghanem, Alexandros Chortaras, Yike Guo, Anthony Rowe, Jon Ratcliffe
    A grid infrastructure for mixed bioinformatics data and text mining. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:41- [Conf]
  32. Krzysztof Pancerz, Zbigniew Suraj
    Automated discovering concurrent models from data tables - an overview of algorithms. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:43- [Conf]
  33. Sidi Mohamed Benslimane, Djamel Amar Bensaber, Mimoun Malki
    Towards a multi-representation ontology-based information systems mediation. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:44- [Conf]
  34. José Fernando Rodrigues Jr., Agma J. M. Traina, Caetano Traina Jr.
    Enhanced visual evaluation of feature extractors for image mining. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:45- [Conf]
  35. Mohamed A. Sharaf, Panos K. Chrysanthis, Alexandros Labrinidis
    Preemptive rate-based operator scheduling in a data stream management system. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:46- [Conf]
  36. A. A. Abdel-Aziz, Hussien Oakasha
    Mapping XML DTDs to relational schemas. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:47- [Conf]
  37. J. Mizher, Margaret H. Dunham, Lin Lu, Yongqiao Xiao
    Scalability of OAT. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:48- [Conf]
  38. M. E. El-Sharkawi, N. A. El-Hadi El Tazi
    LNV: relational database storage structure for XML documents. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:49- [Conf]
  39. N. Nasser, H. Hassanein
    Optimal multi-class guard channel admission policy under hard handoff constraints. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:53- [Conf]
  40. M. Bitam, H. Alla
    Performance evaluation of a TCP/IP transmission using hybrid Petri nets. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:54- [Conf]
  41. M. Tekala, R. Szabo
    Evaluation of scalable TCP. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:55- [Conf]
  42. Octavio Ramirez Rojas, Jalel Ben-Othman, S. Sfar
    A new approach to manage roaming in IPv6. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:56- [Conf]
  43. Yong Chen, S. H. Son
    A fault tolerant topology control in wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:57- [Conf]
  44. Song Ci, Hamid Sharif
    Performance comparison of Kalman filter based approaches for energy efficiency in wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:58- [Conf]
  45. Choong Hun Kim, Kyungseo Park, J. Fu, Ramez Elmasri
    Architectures for streaming data processing in sensor networks. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:59- [Conf]
  46. M. Sklira, Andreas S. Pomportsis
    On the design of hybrid prioritized multiple access protocols for bank data center LANs. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:60- [Conf]
  47. Jalel Ben-Othman, Hind Castel-Taleb, Lynda Mokdad
    Multi-services MAC protocol for wireless networks. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:61- [Conf]
  48. Karim Seada, Ahmed Helmy
    An overview of geographic protocols in ad hoc and sensor networks. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:62- [Conf]
  49. D. Benazzouz
    Performance of a shuffle exchange network using Markov chains. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:63- [Conf]
  50. Mahmoud H. Ismail, Mustafa M. Matalgah
    Performance evaluation of the uplink of WCDMA in the TDD mode for wireless Internet services. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:64- [Conf]
  51. Imad Jawhar, Jie Wu
    A dynamic range resource reservation protocol for QoS support in wireless networks. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:65- [Conf]
  52. Karima Maâlaoui, Abdelfattah Belghith, Jean-Marie Bonnin, M. Tezeghdanti
    Performance evaluation of QoS routing algorithms. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:66- [Conf]
  53. G. Nacira, A. Abdelaziz
    Secured net-banking by /spl theta/-Vigenere in Syverson's protocol. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:67- [Conf]
  54. N. Sadek, Alireza Khotanzad
    Multi-scale network traffic prediction using k-factor Gegenbauer ARMA and MLP models. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:68- [Conf]
  55. A. Zeid, S. Gurguis
    Towards autonomic Web services. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:69- [Conf]
  56. Yinghong Fan, H. Hassanein, P. Martin
    Proactive control of distributed denial of service attacks with source router preferential dropping. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:70- [Conf]
  57. Abdelilah Maach, Gregor von Bochmann, H. T. Mouftah
    An optimal shared protection scheme for optical networks. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:71- [Conf]
  58. E. Y. Chen, A. Yonezawa
    Practical techniques for defending against DDoS attacks. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:72- [Conf]
  59. Bin Tang
    On multicast scheduling and routing in multistage Clos networks. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:73- [Conf]
  60. Emad Eldin Mohamed, Hussein M. Abdel-Wahab, I. Salama
    Multicast address management in the Internet: a study of the port blocking problem. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:74- [Conf]
  61. N. B. Alimakni, Abdelfattah Belghith
    Heterogeneous and dynamic multipoint service in ATM networks. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:75- [Conf]
  62. Faiza Tabbana, S. Tabbane, Mounir Frikha
    Fixed cellular network optimisation. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:76- [Conf]
  63. Christos Basios, Manolis Solidakis
    Current trends and challenges towards wireless Internet. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:77- [Conf]
  64. Jihad Qaddour, Raffique A. C. Barbour
    Evolution to 4G wireless: problems, solutions, and challenges. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:78- [Conf]
  65. Cuneyt Bayilmis, Ismail Erturk, Celal Ceken
    Extending CAN segments with IEEE 802.11 WLAN. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:79- [Conf]
  66. S. J. Habib
    Simulated analysis of server placement on network topology designs. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:80- [Conf]
  67. K. Wongrujira, Tim Hsin-Ting Hu, Aruna Seneviratne
    Incentive service model for P2P. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:81- [Conf]
  68. Karsten Loesing, Guido Wirtz
    An implementation of reliable group communication based on the peer-to-peer network JXTA. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:82- [Conf]
  69. M. Fathey, A. Fattah, A. El-Kadi, A. Zeid
    Towards an independent component model. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:83- [Conf]
  70. Abdelhamid S. Abdelhamid, Ahmed A. Belal
    Secure transmission of sensitive data using multiple channels. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:87- [Conf]
  71. Laith A. Al-Sulaiman, Hussein M. Abdel-Wahab
    Cooperative caching techniques for increasing the availability of MANET certificate authority services. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:88- [Conf]
  72. Xinhua Zhang, Chunyan Jiang, Wanjun Huang, Christoph Meinel
    A XML format secure protocol - OpenSST. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:89- [Conf]
  73. R. S. Al Omari, A. Al-Jaber
    A robust watermarking algorithm for copyright protection. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:90- [Conf]
  74. Ramzi A. Haraty, Hadi Otrok, A. Nasser Kassar
    Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:91- [Conf]
  75. S. M. Arafat
    An encryption algorithm based on alphabetic trees. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:92- [Conf]
  76. L. Paola García-Perera, J. Carlos Mex-Perera, Juan Arturo Nolazco-Flores
    Multi-speaker voice cryptographic key generation. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:93- [Conf]
  77. Salvador Mandujano, Arturo Galván, J. A. Nolazco
    An ontology-based multiagent approach to outbound intrusion detection. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:94- [Conf]
  78. S. Itani, Najwa Aaraj, D. Abdelahad, Ayman I. Kayssi
    Neighbor stranger discrimination: a new defense mechanism against Internet DDOS attacks. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:95- [Conf]
  79. Philippe Balbiani
    A formal examination of roles and permissions in access control. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:96- [Conf]
  80. J. G. Dunham, Ming-Tan Sun, J. C. R. Tseng
    Classifying file type of stream ciphers in depth using neural networks. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:97- [Conf]
  81. K. E. A. Negm
    Design, implementation and testing of mobile agent protection mechanism for MANETS. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:98- [Conf]
  82. Sami Beydeda
    Research in testing COTS components - built-in testing approaches. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:101- [Conf]
  83. Ines Hamdi, Imed Riadh Farah, Mohmed B. Ahmed
    Analysing spatial-temporal data based on generic GIS. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:102- [Conf]
  84. Jemal H. Abawajy, M. J. Hu
    A new Internet meta-search engine and implementation. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:103- [Conf]
  85. Susmit Bagchi
    Memory estimation and allocation algorithms for MDVM system. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:104- [Conf]
  86. Wegdan Abdelsalam, Yasser Ebrahim, Siu-Cheung Chau, Maher Ahmed
    A user modeling approach to improving estimation accuracy in location-tracking applications. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:105- [Conf]
  87. Marcello Cinque, Domenico Cotroneo, Cristiano di Flora, Armando Migliaccio, Stefano Russo
    ESPERANTO: a middleware platform to achieve interoperability in nomadic computing domains. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:106- [Conf]
  88. A. Neho
    An extensible framework for automatic negotiation in distributed online bargaining applications. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:107- [Conf]
  89. Sylvanus A. Ehikioya, B. Ola
    A comparative study of specification methods for electronic commerce systems. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:108- [Conf]
  90. L. Kahloul, Kamel Barkaoui, Zaidi Sahnoun
    Using AUML to derive formal modeling agents interactions. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:109- [Conf]
  91. Hassan Gomaa, Mazen Saleh
    Software product line engineering for Web services and UML. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:110- [Conf]
  92. Vitus S. W. Lam, Julian A. Padget
    An integrated environment for communicating UML statechart diagrams. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:111- [Conf]
  93. Kalaivani Appukkutty, Hany H. Ammar, K. G. Popstajanova
    Software requirement risk assessment using UML. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:112- [Conf]
  94. Hany Loulou, Ahmed Hadj Kacem, Mohamed Jmaiel
    A formal model for mobile agent systems using Z. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:113- [Conf]
  95. German Montejano, Robert Uzal, Daniel Riesco, Aristides Dasso, Ana Funes, M. Peralta, C. Salgado, Narayan C. Debnath
    Integrating balanced scorecard domain formalization with underlying project plan formalization. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:114- [Conf]
  96. Rami Rifaieh, Aïcha-Nabila Benharkat
    Studying semantic sharing problem within enterprise information systems. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:115- [Conf]
  97. Sihem Ben Sassi, Lamia Labed Jilani, Henda Hajjami Ben Ghézala
    COTS-based development process meta-modeling. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:116- [Conf]
  98. Rajesh Gunnalan, Mark Shereshevsky, Hany H. Ammar
    Pseudo dynamic metrics [software metrics]. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:117- [Conf]
  99. Narayan C. Debnath, Daniel Riesco, German Montejano, Robert Uzal, L. Baigorria, Aristides Dasso, Ana Funes
    A technique based on the OMG metamodel and OCL for the definition of object-oriented metrics applied to UML models. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:118- [Conf]
  100. Hai Jin, Qionghua Hu, Xiaofei Liao, Hao Chen, Dafu Deng
    IMAC: an importance-level based adaptive CPU scheduling scheme for multimedia and non-real time applications. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:119- [Conf]
  101. Gustavo Fortes Tondello, Antônio Augusto Fröhlich
    On the automatic configuration of application-oriented operating systems. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:120- [Conf]
  102. M. Khemakhem, Abdelfattah Belghith
    A multipurpose multi-agent system based on a loosely coupled architecture to speedup the DTW algorithm for Arabic printed cursive OCR. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:121- [Conf]
  103. Jian-Wei Wang, Chi-Cheng Li, Feng-Jian Wang
    Dynamic activities on an agent-based workflow management system. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:122- [Conf]
  104. Amira Regayeg, Ahmed Hadj Kacem, Mohamed Jmaiel
    Towards a formal methodology for developing multi-agent applications using temporal Z. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:123- [Conf]
  105. Walid Abdelmoez, Mark Shereshevsky, Rajesh Gunnalan, Hany H. Ammar, Bo Yu, S. Bogazzi, M. Korkmaz, Ali Mili
    Quantifying software architectures: an analysis of change propagation probabilities. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:124- [Conf]
  106. L. Pazzi, A. Malagoli
    An explicit modeling approach for wholes in the object-oriented development process. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:125- [Conf]
  107. R. A. Haraty, S. A. Khatib
    TREX: a temporal reference extractor for Arabic texts. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:126- [Conf]
  108. A. El Baati, Adel M. Alimi, M. Charfi, Abdel Ennaji
    Recovery of temporal information from off-line Arabic handwritten. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:127- [Conf]
  109. Nikola Stojanovic
    The human genome project: software challenges and future directions. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:128- [Conf]
  110. Salim Chitroub
    Contextual classifier combination by Markov random fields-Bayes formalism and evolutionary programming. Application: image classification enhancement. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:129- [Conf]
  111. W. Barhoumi, E. Zagrouba
    Towards a standard approach for medical images segmentation. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:130- [Conf]
  112. Amr R. Abdel-Dayem, Mahmoud R. El-Sakka, Aaron Fenster
    Watershed segmentation for carotid artery ultrasound images. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:131- [Conf]
  113. Rabih Bashroush, Ivor T. A. Spence, Peter Kilpatrick, T. John Brown
    A generic reference software architecture for load balancing over mirrored Web servers: NaSr case study. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:132- [Conf]
  114. Michael Mrissa, Chirine Ghedira, Djamal Benslimane, Zakaria Maamar, Jacques Fayolle
    A mediation framework for Web services in a peer-to-peer environment. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:133- [Conf]
  115. Zakaria Maamar, Soraya Kouadri Mostéfaoui
    On specifying an environment of software agents and Web services. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:134- [Conf]
  116. R. Siblini, N. Mansour
    Testing Web services. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:135- [Conf]
  117. O. Al-Shara
    Usability tri-parametric artifacts: a knowledge reporting artifact for software development reusability. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:136- [Conf]
  118. A. Lehireche, A. Rahmoun
    The EE-method, an evolutionary engineering developer tool: neural net character mapping. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:137- [Conf]
  119. Nadia Bouassida, Hanêne Ben-Abdallah, Faïez Gargouri, Abdelmajid Ben Hamadou
    Towards a rigorous architectural reuse. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:138- [Conf]
  120. R. B. Hajri, Lamia Labed Jilani, Henda Hajjami Ben Ghézala
    An infrastructure to help development with reuse. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:139- [Conf]
  121. Islam A. M. El-Maddah
    Component-based development of process control systems. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:140- [Conf]
  122. Audrey Marchand, Maryline Silly-Chetto
    QoS scheduling components based on firm real-time requirements. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:141- [Conf]
  123. M. Teresa Higuera-Toledano
    Supporting several real-time applications on the Java platform. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:142- [Conf]
  124. Abbas Tarhini, Antoine Rollet, Hacène Fouchal
    A pragmatic approach for testing robustness on real-time component based systems. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:143- [Conf]
  125. A. Adly, L. Fattouh, M. Moustafa, A. A. Elmoneim
    Using GIS and knowledge-based system for agricultural land drainage planning. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:144- [Conf]
  126. Mohamed Ben Ammar, Mahmoud Neji, Adel M. Alimi
    The integration of an emotional system in the intelligent system. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:145- [Conf]
  127. Luis R. Salgado-Garza, Juan Arturo Nolazco-Flores, P. D. Diaz-Lopez
    Spoken information retrieval for multimedia databases. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:146- [Conf]
  128. G. Aurino, B. Discepolo, A. Nutile, G. Ramella
    Automatic data management in architecture and engineering applications. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:147- [Conf]
  129. Carlos Perez Leguizamo, Dake Wang, M. Takaishi, S. Kimura, Kinji Mori
    Autonomous decentralized database system restructuring for achieving timeliness. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:148- [Conf]
  130. I. I. Elghandour, A. M. Hafez, M. H. Nagi, K. M. Nagi
    Performance analysis of locating files asynchronously in ad-hoc networks. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:149- [Conf]
  131. Feng Ji, Ramez Elmasri, Yiming Zhang, B. Ritesh, Zoe Raja
    Incorporating concepts for bioingormatics data modeling into EER models. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:189-192 [Conf]
  132. Adel Elsayed, Roger Hartley, Yongqiang Qiu
    Multimodal communication and articulation in e-learning. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:829-833 [Conf]
  133. A. Choura, A. Samet, Adel M. Alimi
    Proman, a computer supported collective Learning environment through the project based learning. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:834-839 [Conf]
  134. Edgar R. Weippl, A. Min Tjoa
    Privacy in E-learning: How to implement anonymity. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:840-846 [Conf]
  135. Georgios A. Dafoulas, Lara A. Frumkin, Mike Mimirinis, Alan Murphy
    Investigating computer-supported cooperative learning: Applications for flexible learning environments. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:847-852 [Conf]
  136. K. Kveton
    The role of standardization in eLOC development. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:853-856 [Conf]
  137. K. Lindh, L. M. Gashi, I. Aro
    Creation of an online e-learning community for intercultural learning: IntCultNet - A ladder of success. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:857-862 [Conf]
  138. O. D. Alcantara
    Deploying multicommunicative and @prende projects at Anahuac del Sur University. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:863-868 [Conf]
  139. P. K. Oriogun
    Introducing a dedicated tool for facilitating a semi-structured approach to CMC messaging. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:869-877 [Conf]
  140. Elli Georgiadou, Stylianos Hatzipanagos, Eleni Berki
    Resource-based learning and teaching-concerns, conflicts, consensus, community. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:878-882 [Conf]
  141. T. Ishaya
    Ontologies for semantic integration of multimedia e-learning services. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:883-888 [Conf]
  142. V. Venson, S. Ramalingam
    Standardising learning object descriptors: Focus on education value. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:889-892 [Conf]
  143. S. Kamel
    WebCT - Evaluating the use of technology, lessons learnt from the American University in Cairo. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:893-896 [Conf]
  144. Sérgio Crisóstomo, Susana Sargento, Marke Natkaniec, Norbert Vicari
    A QoS architecture integrating mobile Ad-Hoc and infrastructure networks. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:897-903 [Conf]
  145. Kemal Akkaya, Mohamed F. Younis, Moustafa Youssef
    Efficient aggregation of delay-constrained data in wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:904-909 [Conf]
  146. S. Malik, Muhammad Jaseemuddin, G. Ravindram, Hesham El-Sayed
    Improving thoughput and fairness of transport connections in IEEE 802.11 based wireless networks. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:910-915 [Conf]
  147. Jing Liu, Jiandong Li, Guanghua Zhang
    Adaptive QoS-guarantee multiple access protocol in multimedia wireless network. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:916-920 [Conf]
  148. V. Basto, V. Freitas
    A QoS distributed transport service. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:921-926 [Conf]
  149. Jamal N. Al-Karaki, Ahmed E. Kamal
    Supporting quality of service in mobile Ad hoc networks. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:927-934 [Conf]
  150. A. M. Taha, Hossam S. Hassanein, H. T. Mouftah
    On the integration of internet QoS paradigms and Ad-Hoc networks. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:935-940 [Conf]
  151. N. Flores, A. Aguiar
    Reverse engineering of framework design using a meta-patterns-based approach. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:941-946 [Conf]
  152. Imran A. Zualkernan
    Stability of reusable learning objects. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:947-949 [Conf]
  153. Reda A. Ammar, Amal Abdel-raouf, Tahany A. Fergany
    Performance modeling and analysis of object oriented distributed software systems: A necessary step toward software performance stability. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:950-953 [Conf]
  154. Islam A. M. El-Maddah
    Planning stable software applications using goal driving requirements analysis. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:954-958 [Conf]
  155. Galal H. Galal-Edeen
    Architectural modelling to understand system evolution. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:959-964 [Conf]
  156. S. Jager, R. T. Mittermier
    Architecture pattern for a generic explanation component. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:965-968 [Conf]
  157. Osama Mabrouk Khaled, Hoda Mohammed Hosny
    Making efficient logging a common practice in software development. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:969-972 [Conf]
  158. Haitham S. Hamza, Mohamed E. Fayad
    A novel approach for managing and reusing business rules in business architectures. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:973-978 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002