The SCEAS System
Navigation Menu

Conferences in DBLP

Computational Science and Its Applications (iccsa)
2007 (conf/iccsa/2007-3)

  1. Bo Hyun Kim, Sung Bum Park, Gyu-Bong Lee, So Young Chung
    Framework of Integrated System for the Innovation of Mold Manufacturing Through Process Integration and Collaboration. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:1-10 [Conf]
  2. Yong Ju Cho, Kwang Yeol Ryu, Seok Woo Lee
    A Study on Automated Design System for a Blow Mould. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:11-19 [Conf]
  3. Yong Ju Cho, Sung Hee Lee
    Development of an Evaluation System of the Informatization Level for the Mould Companies in Korea. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:20-32 [Conf]
  4. Chang Ho Lee, Yong Ju Cho
    Framework of a Collaboration-Based Engineering Service System for Mould Industry. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:33-44 [Conf]
  5. Mohamed Bouhdadi, Youssef Balouki, El maati Chabbar
    Meta-modelling Syntax and Semantics of Structural Concepts for Open Networked Enterprises. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:45-54 [Conf]
  6. Jay Walter Larson, Boyana Norris
    Component Specification for Parallel Coupling Infrastructure. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:55-68 [Conf]
  7. Lu Xu, Liguo Zhang, Yangzhou Chen
    Real-Time Navigation for a Mobile Robot Based on the Autonomous Behavior Agent. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:69-80 [Conf]
  8. Liangtie Dai, Wanwu Guo
    Concurrent Subsystem-Component Development Model (CSCDM) for Developing Adaptive E-Commerce Systems. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:81-91 [Conf]
  9. Chengying Mao
    A Quantitative Approach for Ranking Change Risk of Component-Based Software. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:92-103 [Conf]
  10. Rogelio N. Limón Cordero, Isidro Ramos Salavert
    Relating Software Architecture Views by Using MDA. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:104-114 [Conf]
  11. Mohammed Radi, Ali Mamat, Mustafa Mat Deris, Hamidah Ibrahim, Subramaniam Shamala
    Update Propagation Technique for Data Grid. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:115-127 [Conf]
  12. Mohd Shafry Mohd Rahim, Abdul Rashid Mohamed Shariff, Shattri Mansor, Ahmad Rodzi Mahmud, Daut Daman
    A Spatiotemporal Database Prototype for Managing Volumetric Surface Movement Data in Virtual GIS. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:128-139 [Conf]
  13. Ngot Phu Bui, SeungGwan Lee, TaeChoong Chung
    Query Distributed Ontology over Grid Environment. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:140-153 [Conf]
  14. Lilian Janin, Doug Edwards
    CSP Transactors for Asynchronous Transaction Level Modeling and IP Reuse. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:154-168 [Conf]
  15. Junghoon Lee, Mikyung Kang, Gyung-Leen Park, In-Hye Shin, Hanil Kim, Sang-Wook Kim
    A Robust Real-Time Message Scheduling Scheme Capable of Handling Channel Errors in Wireless Local Area Networks. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:169-178 [Conf]
  16. Junghoon Lee, Eui-young Kang, Gyung-Leen Park
    Design and Implementation of a Tour Planning System for Telematics Users. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:179-189 [Conf]
  17. Nipon Theera-Umpon
    Ionospheric F-Layer Critical Frequency Estimation from Digital Ionogram Analysis. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:190-200 [Conf]
  18. ByungRae Cha, Kyungjun Kim, Dongseob Lee
    Study of Digital License Search for Intellectual Property Rights of S/W Source Code. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:201-212 [Conf]
  19. Ilya Valuev, A. Deinega, A. Knizhnik, B. Potapkin
    Creating Numerically Efficient FDTD Simulations Using Generic C++ Programming. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:213-226 [Conf]
  20. Song Han, Vidyasagar Potdar, Elizabeth Chang
    Mutual Authentication Protocol for RFID Tags Based on Synchronized Secret Information with Monitor. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:227-238 [Conf]
  21. Pantelis Georgiadis, Dionisis Cavouras, Ioannis Kalatzis, Antonis Daskalakis, George C. Kagadis, Koralia Sifaki, Menelaos Malamas, George Nikiforidis, Ekaterini Solomou
    Non-linear Least Squares Features Transformation for Improving the Performance of Probabilistic Neural Networks in Classifying Human Brain Tumors on MRI. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:239-247 [Conf]
  22. Moutaz Saleh, Zulaiha Ali Othman
    Adaptive Scheduling for Real-Time Network Traffic Using Agent-Based Simulation. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:248-261 [Conf]
  23. David G. Rosado, Carlos Gutiérrez, Eduardo Fernández-Medina, Mario Piattini
    Defining Security Architectural Patterns Based on Viewpoints. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:262-272 [Conf]
  24. Min-Shiang Hwang, Shiang-Feng Tzeng, Chun-Ta Li
    A New Nonrepudiable Threshold Proxy Signature Scheme with Valid Delegation Period. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:273-284 [Conf]
  25. Hartmut Schwandt
    Two-Stage Interval Krawczyk-Schwarz Methods with Applications to Nonlinear Parabolic PDE. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:285-297 [Conf]
  26. Jumat Sulaiman, Mohamed Othman, Mohammad Khatim Hasan
    Red-Black EDG SOR Iterative Method Using Triangle Element Approximation for 2D Poisson Equations. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:298-308 [Conf]
  27. Muhammet Fikret Ercan, Yu-Fai Fung
    Performance of Particle Swarm Optimization in Scheduling Hybrid Flow-Shops with Multiprocessor Tasks. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:309-318 [Conf]
  28. Krzysztof Walkowiak
    Branch-and-Bound Algorithm for Anycast Flow Assignment in Connection-Oriented Networks. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:319-329 [Conf]
  29. Michal Przewozniczek, Krzysztof Walkowiak
    Quasi-hierarchical Evolutionary Algorithm for Flow Optimization in Survivable MPLS Networks. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:330-342 [Conf]
  30. Przemyslaw Ryba, Andrzej Kasprzak
    An Exact Algorithm for the Minimal Cost Gateways Location, Capacity and Flow Assignment Problem in Two-Level Hierarchical Wide Area Networks. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:343-352 [Conf]
  31. Ying Zhang, Gen Li, Xuejun Yang
    Implementing and Optimizing a Data-Intensive Hydrodynamics Application on the Stream Processor. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:353-366 [Conf]
  32. Farshad Safaei, Mahmood Fathy, Ahmad Khonsari, N. Talebanfard
    On Disconnection Node Failure and Stochastic Static Resilience of P2P Communication Networks. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:367-378 [Conf]
  33. David Semé, Sidney Youlou
    An Efficient Sequence Alignment Algorithm on a LARPBS. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:379-387 [Conf]
  34. Omar Ramadan
    An Effective Unconditionally Stable Algorithm for Dispersive Finite Difference Time Domain Simulations. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:388-397 [Conf]
  35. Mohammad S. Talebi, Fahimeh Jafari, Ahmad Khonsari, Mohammad Hossien Yaghmae
    A Novel Congestion Control Scheme for Elastic Flows in Network-on-Chip Based on Sum-Rate Optimization. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:398-409 [Conf]
  36. Maged Marghany, Mazlan Hashim, Arthur P. Cracknell
    3D Bathymetry Reconstruction from Airborne Topsar Polarized Data. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:410-420 [Conf]
  37. Omar Ramadan
    A Parallel FDTD Algorithm for the Solution of Maxwell's Equations with Nearly PML Absorbing Boundary Conditions. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:421-430 [Conf]
  38. Shih-Lin Lin, Pi-Cheng Tung
    Application of Modified ICA to Secure Communications in Chaotic Systems. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:431-444 [Conf]
  39. Mihai Mitrea, O. Dumitru, Françoise J. Prêteux, Adriana Vlad
    Zero Memory Information Sources Approximating to Video Watermarking Attacks. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:445-459 [Conf]
  40. Adriana Vlad, Adrian Luca, Bogdan Badea
    On Statistical Independence in the Logistic Map: A Guide to Design New Chaotic Sequences Useful in Cryptography. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:460-474 [Conf]
  41. Günter Bärwolff
    FVM- and FEM-Solution of Elliptical Boundary Value Problems in Different Coordinate Systems. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:475-485 [Conf]
  42. Murali Subramaniyam, Sangho Park, Sung-il Choi, Seokho Jang, Joon-Yub Song
    Digital Simulation for Micro Assembly Arranged at Rectangular Pattern in Micro Factory. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:486-494 [Conf]
  43. A. Amiri, M. Fathy, M. Amintoosi, H. Sadoghi
    A New Quantized Input RLS, QI-RLS, Algorithm. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:495-506 [Conf]
  44. Yaohang Li, Michael Mascagni, Andrey Gorin
    Decentralized Replica Exchange Parallel Tempering: An Efficient Implementation of Parallel Tempering Using MPI and SPRNG. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:507-519 [Conf]
  45. Yen Hung Chen, Gwo-Liang Liao, Chuan Yi Tang
    Approximation Algorithms for 2-Source Minimum Routing Cost k -Tree Problems. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:520-533 [Conf]
  46. Alexey S. Rodionov, Olga K. Rodionova, Hyunseung Choo
    On the Expected Value of a Number of Disconnected Pairs of Nodes in Unreliable Network. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:534-543 [Conf]
  47. Amparo Fúster-Sabater, Pino Caballero-Gil
    Linearization of Stream Ciphers by Means of Concatenated Automata. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:544-554 [Conf]
  48. Antonis Daskalakis, Dionisis Cavouras, Panagiotis Bougioukos, Spiros Kostopoulos, Pantelis Georgiadis, Ioannis Kalatzis, George C. Kagadis, George Nikiforidis
    Effective Quantification of Gene Expression Levels in Microarray Images Using a Spot-Adaptive Compound Clustering-Enhancement-Segmentation Scheme. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:555-565 [Conf]
  49. Panagiotis Bougioukos, Dionisis Cavouras, Antonis Daskalakis, Ioannis Kalatzis, George Nikiforidis, Anastasios Bezerianos
    Biomarker Selection, Employing an Iterative Peak Selection Method, and Prostate Spectra Characterization for Identifying Biomarkers Related to Prostate Cancer. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:566-574 [Conf]
  50. Manuel Aguilar R., Héctor J. Fraire H., Laura Cruz Reyes, Juan Javier González Barbosa, Graciela Mora Guadalupe Castilla V., Claudia Gómez Santillán
    Classic Cryptanalysis Applied to Exons and Introns Prediction. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:575-584 [Conf]
  51. Dong Hoi Kim, Saangyong Uhmn, Young-Woong Ko, Sung Won Cho, Jae Youn Cheong, Jin Kim
    Chronic Hepatitis and Cirrhosis Classification Using SNP Data, Decision Tree and Decision Rule. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:585-596 [Conf]
  52. Slobodan Petrovic, Amparo Fúster-Sabater
    Reconstruction of Suboptimal Paths in the Constrained Edit Distance Array with Application in Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:597-610 [Conf]
  53. Masri Ayob, Ariff Md. Ab. Malik, Salwani Abdullah, Abdul Razak Hamdan, Graham Kendall, Rong Qu
    Solving a Practical Examination Timetabling Problem: A Case Study. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:611-624 [Conf]
  54. Ying-Chin Ho, Hui-Ming Wee, Hsiao Ching Chen
    A Geometric Design of Zone-Picking in a Distribution Warehouse. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:625-636 [Conf]
  55. Jin Myoung Kim, Tae Ho Cho
    Routing Path Generation for Reliable Transmission in Sensor Networks Using GA with Fuzzy Logic Based Fitness Function. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:637-648 [Conf]
  56. Jianmin Zhang, ShengYu Shen, Sikun Li
    A Heuristic Local Search Algorithm for Unsatisfiable Cores Extraction. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:649-659 [Conf]
  57. Burcu Yildiz, Silvia Miksch
    ontoX - A Method for Ontology-Driven Information Extraction. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:660-673 [Conf]
  58. Joaquín Pérez Ortega, Rodolfo A. Pazos Rangel, Laura Cruz Reyes, Gerardo Reyes Salgado, Rosy Basave T., Héctor J. Fraire H.
    Improving the Efficiency and Efficacy of the K-means Clustering Algorithm Through a New Convergence Condition. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:674-682 [Conf]
  59. Raymond Chiong
    Modelling Agent Strategies in Simulated Market Using Iterated Prisoner's Dilemma. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:683-696 [Conf]
  60. Marco Antonio Cruz-Chavez, Rafael Rivera-López
    A Local Search Algorithm for a SAT Representation of Scheduling Problems. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:697-709 [Conf]
  61. José Santa, Andrés Muñoz, Antonio F. Gómez-Skarmeta
    A Context-Aware Solution for Personalized En-route Information Through a P2P Agent-Based Architecture. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:710-723 [Conf]
  62. Kevin Chai, Vidyasagar Potdar, Elizabeth Chang
    A Survey of Revenue Models for Current Generation Social Software's Systems. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:724-738 [Conf]
  63. Jongmyung Choi
    Context-Driven Requirements Analysis. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:739-748 [Conf]
  64. Eric Pardede, J. Wenny Rahayu, David Taniar, Ramanpreet Kaur Aujla
    Performance Analysis of Child/Descendant Queries in an XML-Enabled Database. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:749-762 [Conf]
  65. Rohaya Latip, Hamidah Ibrahim, Mohamed Othman, Md Nasir Sulaiman, Azizol Abdullah
    Diagonal Data Replication in Grid Environment. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:763-773 [Conf]
  66. A. R. Appadu, M. Z. Dauhoo, S. D. D. V. Rughooputh
    Efficient Shock-Capturing Numerical Schemes Using the Approach of Minimised Integrated Square Difference Error for Hyperbolic Conservation Laws. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:774-789 [Conf]
  67. Tae Eun Kim, Chin Hyun Chung, Jin Ok Kim
    Improvement on Real-Time Face Recognition Algorithm Using Representation of Face and Priority Order Matching. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:790-797 [Conf]
  68. Zelmar Echegoyen, Alicia D'Anjou, Manuel Graña
    Modeling a Legged Robot for Visual Servoing. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:798-810 [Conf]
  69. Jorge Ropero, Ariel Gómez, Carlos León, Alejandro Carrasco
    Information Extraction in a Set of Knowledge Using a Fuzzy Logic Based Intelligent Agent. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:811-820 [Conf]
  70. Yanmin Luo, Hanxiong Chen, Kazutaka Furuse, Nobuo Ohbo
    Efficient Methods in Finding Aggregate Nearest Neighbor by Projection-Based Filtering. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:821-833 [Conf]
  71. Jong-ki Kim, Kisoeb Park, Moonseong Kim
    On Multicast Routing Based on Route Optimization in Network Mobility. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:834-843 [Conf]
  72. Hun-Soon Lee, Seung-Il Jin
    An Effective XML-Based Sensor Data Stream Processing Middleware for Ubiquitous Service. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:844-857 [Conf]
  73. Ca Van Phan, Kikyung Baek, Jeong Geun Kim
    Opportunistic Transmission for Wireless Sensor Networks Under Delay Constraints. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:858-871 [Conf]
  74. Péter Kacsuk, Zoltan Farkas, Gabor Hermann
    Workflow-Level Parameter Study Support for Production Grids. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:872-885 [Conf]
  75. Jeonil Kang, DaeHun Nyang, Abedelaziz Mohaisen, Young-Geun Choi, KoonSoon Kim
    Certificate Issuing Using Proxy and Threshold Signatures in Self-initialized Ad Hoc Network. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:886-899 [Conf]
  76. Min-Jae Park, Kwang-Hoon Kim
    XWELL: A XML-Based Workflow Event Logging Mechanism and Language for Workflow Mining Systems. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:900-909 [Conf]
  77. Jae-Kang Won, Kwang-Hoon Kim
    Workcase-Oriented Workflow Enactment Components for Very Large Scale Workflows. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:910-919 [Conf]
  78. Hyung-Jin Ahn, Kwang-Hoon Kim
    A Workcase-Based Distributed Workflow Architecture and Its Implementation Using Enterprize Java Beans Framework. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:920-928 [Conf]
  79. Junghwa Chae
    Building Web Application Fragments Using Presentation Framework. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:929-940 [Conf]
  80. Siham Tabik, Luis F. Romero, Ester M. Garzón, Inmaculada García, J. I. Ramos
    Three-Dimensional Bursting Simulation on Two Parallel Systems. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:941-949 [Conf]
  81. Myung-Sun Baek, Sang-Tea Kim, Young-Hwan You, Hyoung-Kyu Song
    PAR Reduction Scheme for Efficient Detection of Side Information in OFDM-BLAST System. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:950-957 [Conf]
  82. Min Seok Jie, Eun Jong Mo, Kang Woong Lee
    Fuzzy PI Controller for Turbojet Engine of Unmanned Aircraft. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:958-967 [Conf]
  83. SooCheol Lee, Daesub Yoon, Oh-Cheon Kwon, Eenjun Hwang
    Implementation of QoS-Aware Dynamic Multimedia Content Adaptation System. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:968-977 [Conf]
  84. Jung-Soo Han, Gui-Jung Kim
    Experience of Efficient Data Transformation Solution for PCB Product Automation. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:978-986 [Conf]
  85. Jung-Soo Han
    Performance Evaluation for Component Retrieval. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:987-996 [Conf]
  86. Gui-Jung Kim, Jung-Soo Han
    The Clustering Algorithm of Design Pattern Using Object-Oriented Relationship. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:997-1006 [Conf]
  87. Wookey Lee, Seungkil Lim, Taesoo Lim
    Modeling Parametric Web Arc Weight Measurement. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:1007-1016 [Conf]
  88. Jeong Geun Kim, Woo Jin Shin, Ji Ho Yoo
    Performance Analysis of EPC Class-1 Generation-2 RFID Anti-collision Protocol. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:1017-1026 [Conf]
  89. Mohamed Ali Aloulou, Christian Artigues
    Worst-Case Evaluation of Flexible Solutions in Disjunctive Scheduling Problems. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:1027-1036 [Conf]
  90. Tiancheng Li, Ian Robinson
    The Search for a Good Lattice Augmentation Sequence in Three Dimensions. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:1037-1045 [Conf]
  91. Hyun-Ho Kang, Brian M. Kurkoski, Kazuhiko Yamaguchi, Kingo Kobayashi
    Tracing Illegal Users of Video: Reconsideration of Tree-Specific and Endbuyer-Specific Methods. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:1046-1055 [Conf]
  92. Zhang Jiawan, Gao Yang, Sun Jizhou, Jin Zhou
    Rendering of Translucent Objects Based Upon PRT Techniques. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:1056-1065 [Conf]
  93. Hengfu Yang, Xingming Sun, Bin Wang, Zheng Qin
    An Image-Adaptive Semi-fragile Watermarking for Image Authentication and Tamper Detection. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:1066-1075 [Conf]
  94. Keon-Jun Park, Sung-Kwun Oh, Hyun-Ki Kim, Witold Pedrycz, Seong-Whan Jang
    Identification of Fuzzy Set-Based Fuzzy Systems by Means of Data Granulation and Genetic Optimization. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:1076-1085 [Conf]
  95. Dalia Khader
    Public Key Encryption with Keyword Search Based on K-Resilient IBE. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:1086-1095 [Conf]
  96. Qianhong Wu, Willy Susilo, Yi Mu, Fangguo Zhang
    Efficient Partially Blind Signatures with Provable Security. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:1096-1105 [Conf]
  97. Jianqin Wang, Yong Xue, Yincui Hu, Chaolin Wu, Jianping Guo, Lei Zheng, Ying Luo, Ruizhi Sun, Guangli Liu, YunLing Liu
    Study on Grid-Based Special Remotely Sensed Data Processing Node. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:1106-1113 [Conf]
  98. Ashot Gevorkyan, Gabriel G. Balint-Kurti, Alexander V. Bogdanov, Gunnar Nyman
    Novel Algorithms for Quantum Simulation of 3 D Atom-Diatom Reactive Scattering. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:1114-1123 [Conf]
  99. Todd J. Kosloff, Brian A. Barsky
    An Algorithm for Rendering Generalized Depth of Field Effects Based on Simulated Heat Diffusion. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:1124-1140 [Conf]
  100. Daesung Moon, Sungju Lee, Seunghwan Jung, Yongwha Chung, Miae Park, Okyeon Yi
    Fingerprint Template Protection Using Fuzzy Vault. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:1141-1151 [Conf]
  101. Yumin Chen, Jianya Gong, Chenchen wu
    Design and Application of Optimal Path Service System on Multi-level Road Network. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:1152-1164 [Conf]
  102. Jae-Woo Chang, Rabindra Bista, Young-Chang Kim, Yong-Ki Kim
    Spatio-temporal Similarity Measure Algorithm for Moving Objects on Spatial Networks. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:1165-1178 [Conf]
  103. Mi Young Choi, Hyung-Il Choi
    Efficient Text Detection in Color Images by Eliminating Reflectance Component. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:1179-1186 [Conf]
  104. Moon Jeong Kim, Dong Hoon Lee, Young Ik Eom
    Enhanced Non-disjoint Multi-path Source Routing Protocol for Wireless Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:1187-1196 [Conf]
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002