The SCEAS System
Navigation Menu

Conferences in DBLP

ACIS International Conference on Computer and Information Science (ACISicis)
2008 (conf/ACISicis/2008)


  1. Software Architectures for Task-Oriented Computing. [Citation Graph (, )][DBLP]


  2. Issues and Models of Security Oriented Systems. [Citation Graph (, )][DBLP]


  3. A Rate Control Protocol for High Speed Streaming Video. [Citation Graph (, )][DBLP]


  4. Collaboration between Security Devices toward improving Network Defense. [Citation Graph (, )][DBLP]


  5. Trust Mechanism in Distributed Access Control Model of P2P Networks. [Citation Graph (, )][DBLP]


  6. Convergence Analysis of Jacobi Iterative Method Using Logarithmic Number System. [Citation Graph (, )][DBLP]


  7. Effective RTL Method to Develop On-Line Self-Test Routine for the Processors Using the Wavelet Transform. [Citation Graph (, )][DBLP]


  8. Comparison between New Quantum Approaches for Finding the Minimum or the Maximum of an Unsorted Set of Integers. [Citation Graph (, )][DBLP]


  9. Evaluation on Quantum Computation and Classic Parallel Approaches for Finding Estimation of the Length of Shortest Path in a Weighted Graph. [Citation Graph (, )][DBLP]


  10. A Real-Time Interactive Visualization System for DNS Amplification Attack Challenges. [Citation Graph (, )][DBLP]


  11. Radix Plus Length Based Insert Sort. [Citation Graph (, )][DBLP]


  12. An Integer Linear Programming Approach for Dedicated Machine Constraint. [Citation Graph (, )][DBLP]


  13. Efficient Complex Event Processing over RFID Data Stream. [Citation Graph (, )][DBLP]


  14. Tabu Search Solution for Fuzzy Linear Programming. [Citation Graph (, )][DBLP]


  15. Temperature Control for the Thermal Cycling of Polymerase Chain Reaction. [Citation Graph (, )][DBLP]


  16. A Parallel Algorithm for Closed Cube Computation. [Citation Graph (, )][DBLP]


  17. An Efficient Structural Index for Graph-Structured Data. [Citation Graph (, )][DBLP]


  18. (t, lambda)-Uniqueness: Anonymity Management for Data Publication. [Citation Graph (, )][DBLP]


  19. Autonomic Computing in SQL Server. [Citation Graph (, )][DBLP]


  20. Cross-Channel Customer Mapping. [Citation Graph (, )][DBLP]


  21. DBPowder-mdl: Mapping Description Language between Applications and Databases. [Citation Graph (, )][DBLP]


  22. Dimensionality Reduction in Hyperbolic Data Spaces: Bounding Reconstructed-Information Loss. [Citation Graph (, )][DBLP]


  23. Entropy Based Clustering of Data Streams with Mixed Numeric and Categorical Values. [Citation Graph (, )][DBLP]


  24. Information Analysis for Enabling Optimal Utilization of Service Delivery Channels in Indian Banks. [Citation Graph (, )][DBLP]


  25. Privacy-Preserving Data Publishing Based on De-clustering. [Citation Graph (, )][DBLP]


  26. Schema Versioning in Multi-temporal XML Databases. [Citation Graph (, )][DBLP]


  27. Subspace Clustering of High Dimensional Data Streams. [Citation Graph (, )][DBLP]


  28. Synchronizer - A Web-Based Application to Enhance Capabilities of NEESCentral Web Portal. [Citation Graph (, )][DBLP]


  29. A Fast and Accurate Iris Recognition Method Using the Complex Inversion Map and 2DPCA. [Citation Graph (, )][DBLP]


  30. A Novel Image Text Extraction Method Based on K-Means Clustering. [Citation Graph (, )][DBLP]


  31. Attention Model Based SIFT Keypoints Filtration for Image Retrieval. [Citation Graph (, )][DBLP]


  32. Content-Based Classifying Traditional Chinese Calligraphic Images. [Citation Graph (, )][DBLP]


  33. Region-Based Image Fusion Approach Using Iterative Algorithm. [Citation Graph (, )][DBLP]


  34. Three Dimensional Face Recognition Using SVM Classifier. [Citation Graph (, )][DBLP]


  35. A Novel Detection Method of Filled Pause in Mandarin Spontaneous Speech. [Citation Graph (, )][DBLP]


  36. Research of English-Chinese Alignment at Word Granularity on Parallel Corpora. [Citation Graph (, )][DBLP]


  37. Objective Types for the Valuation of Secure Business Processes. [Citation Graph (, )][DBLP]


  38. On-Line Network Reachability Analysis Using Forward Information Base Emulation. [Citation Graph (, )][DBLP]


  39. Secure E-cheques for Joint Accounts with Collective Signing Using Forward-Secure Multi-signature Scheme. [Citation Graph (, )][DBLP]


  40. Verification of Unstructured Workflows via Propositional Logic. [Citation Graph (, )][DBLP]


  41. Agent Based Architecture for Secure Access from Multiple Hospitals. [Citation Graph (, )][DBLP]


  42. P2P Distributed Intrusion Detections by Using Mobile Agents. [Citation Graph (, )][DBLP]


  43. An Adaptive Index of XML for Frequent Branching Path Queries. [Citation Graph (, )][DBLP]


  44. Email Categorization Using (2+1)-Tier Classification Algorithms. [Citation Graph (, )][DBLP]


  45. Identity-Based Conference Key Distribution Scheme Using Sealed Lock. [Citation Graph (, )][DBLP]


  46. SIMPA: A SIP-Based Mobile Payment Architecture. [Citation Graph (, )][DBLP]


  47. A Document Clustering Method Based on One-Dimensional SOM. [Citation Graph (, )][DBLP]


  48. A Genetic Algorithm for Finding Minimal Multi-homogeneous Bézout Number. [Citation Graph (, )][DBLP]


  49. An Effective Data Classification Algorithm Based on the Decision Table Grid. [Citation Graph (, )][DBLP]


  50. An Extensive Empirical Study of Feature Selection for Text Categorization. [Citation Graph (, )][DBLP]


  51. An Improved Condensing Algorithm. [Citation Graph (, )][DBLP]


  52. Efficient Projection for Compressed Sensing. [Citation Graph (, )][DBLP]


  53. Ensemble Methods for Ontology Learning - An Empirical Experiment to Evaluate Combinations of Concept Acquisition Techniques. [Citation Graph (, )][DBLP]


  54. Low Dimensional Reproduction Strategy for Real-Coded Evolutionary Algorithms. [Citation Graph (, )][DBLP]


  55. Machine Learning Approach for Ontology Mapping Using Multiple Concept Similarity Measures. [Citation Graph (, )][DBLP]


  56. Optimizing Text Summarization Based on Fuzzy Logic. [Citation Graph (, )][DBLP]


  57. A Solution Framework on Fundamentals in Model Transformation. [Citation Graph (, )][DBLP]


  58. EESM for IEEE 802.16e: WiMaX. [Citation Graph (, )][DBLP]


  59. Lessons Learned from Implementing WS-Coordination and WS-AtomicTransaction. [Citation Graph (, )][DBLP]


  60. Observations on Liner Prediction Based Blind Source Extraction Algorithms. [Citation Graph (, )][DBLP]


  61. Research and Application of Information Granulation Based on Extension Method. [Citation Graph (, )][DBLP]


  62. Sensor Data Collection of the Single Location Surveillance Point System. [Citation Graph (, )][DBLP]


  63. A Novel Enterprise Mobile E-mail System Using the SyncML Protocol. [Citation Graph (, )][DBLP]


  64. Design and Implementation of Wireless Sensor Network for Ubiquitous Glass Houses. [Citation Graph (, )][DBLP]


  65. Distributed Detection in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  66. An Empirical Analysis of Intel Thread Checker for Detecting Races in OpenMP Programs. [Citation Graph (, )][DBLP]


  67. Execution Time Analysis of a Parallel Steiner Tree Algorithm on Server-Client Model of Computation. [Citation Graph (, )][DBLP]


  68. Exponential Integral Methods for Burgers Equation. [Citation Graph (, )][DBLP]


  69. Finite-State Modeling and Testing of Image Based Authentication System. [Citation Graph (, )][DBLP]


  70. Gauging the OpenSourceMark Benchmark in Measuring CPU Performance. [Citation Graph (, )][DBLP]


  71. Parallel Sorting on the Biswapped Network. [Citation Graph (, )][DBLP]


  72. Predicate Detection Modality and Semantics in Three Partially Synchronous Models. [Citation Graph (, )][DBLP]


  73. Control Network Programming Illustrated: Solving Problems with Inherent Graph-Like Representation. [Citation Graph (, )][DBLP]


  74. An Effort-Based Approach to Measure Completeness of an Entity-Relationship Model. [Citation Graph (, )][DBLP]


  75. A Value-Added Predictive Defect Type Distribution Model Based on Project Characteristics. [Citation Graph (, )][DBLP]


  76. Monitoring Software Projects with Earned Value Analysis and Use Case Point. [Citation Graph (, )][DBLP]


  77. A Mechanical Approach for Deriving Algorithmic Programs. [Citation Graph (, )][DBLP]


  78. Engineering Education - A Great Challenge to Software Engineering. [Citation Graph (, )][DBLP]


  79. Generating Algorithms plus Loop Invariants by Formal Derivation. [Citation Graph (, )][DBLP]


  80. Manual Specific Testing and Quality Evaluation for Embedded Software. [Citation Graph (, )][DBLP]


  81. Mobile GUI Testing Tool based on Image Flow. [Citation Graph (, )][DBLP]


  82. On the Precision and Accuracy of Impact Analysis Techniques. [Citation Graph (, )][DBLP]


  83. Quantitative Process Improvement in XP Using Six Sigma Tools. [Citation Graph (, )][DBLP]


  84. Static Analysis of the Disassembly against Malicious Code Obfuscated with Conditional Jumps. [Citation Graph (, )][DBLP]


  85. Two-Dimensional Framework for Analyzing Variabilities in Software Product Lines. [Citation Graph (, )][DBLP]


  86. Reconstructing Control Flow in Modulo Scheduled Loops. [Citation Graph (, )][DBLP]


  87. Recovering Variable-Argument Functions from Binary Executables. [Citation Graph (, )][DBLP]


  88. A New Operational Framework for Benchmarking the SAN Products. [Citation Graph (, )][DBLP]


  89. A Strategic Test Process Improvement Approach Using an Ontological Description for MND-TMM. [Citation Graph (, )][DBLP]


  90. Enhancing Data Flow Testing of Classes through Design by Contract. [Citation Graph (, )][DBLP]


  91. Security Analysis and Implementation of JUIT—Image Based Authentication System Using Kerberos Protocol. [Citation Graph (, )][DBLP]


  92. The Utilization of User Sessions in Testing. [Citation Graph (, )][DBLP]


  93. Queuing Network Performance Model for Evaluation of CMP-Based VoIP SPS. [Citation Graph (, )][DBLP]


  94. Relevance-Feedback Image Retrieval Based on Multiple-Instance Learning. [Citation Graph (, )][DBLP]


  95. An Efficient Approach for QoS-Aware Service Selection Based on a Tree-Based Algorithm. [Citation Graph (, )][DBLP]


  96. Coordination Behavioral Structure: A Web Services Coordination Model in Dynamic Environment. [Citation Graph (, )][DBLP]


  97. Designing Fault Tolerant Web Services Using BPEL. [Citation Graph (, )][DBLP]


  98. Verification for Time Consistency of Web Service Flow. [Citation Graph (, )][DBLP]


  99. On the Dynamic Ant Colony Algorithm Optimization Based on Multi-pheromones. [Citation Graph (, )][DBLP]


  100. A New Negotiation Mechanism for Agent-Based Lecture Allocation Systems. [Citation Graph (, )][DBLP]


  101. RDF-Based Approach to Data Transform Composition. [Citation Graph (, )][DBLP]


  102. Building a Service-Oriented Ontology for Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  103. Research Process Support with Organizational Flow in e-Science. [Citation Graph (, )][DBLP]


  104. A Design on Collaborative-Cooperative Document Edit System Based on Cognitive Analyses. [Citation Graph (, )][DBLP]


  105. A New Approach on Interactive SOA Security Model Based on Automata. [Citation Graph (, )][DBLP]


  106. Mobile Mapping Service Using Scalable Vector Graphics on the Human Geographic. [Citation Graph (, )][DBLP]


  107. Analysis of E-bank Innovation in China Using a Hypercube Model. [Citation Graph (, )][DBLP]


  108. Developing Accessible Applications with User-Centered Architecture. [Citation Graph (, )][DBLP]


  109. Web Page Dependent Vision Based Segementation for Web Sites. [Citation Graph (, )][DBLP]


  110. Robust Routing. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002