The SCEAS System
Navigation Menu

Conferences in DBLP

ACIS International Conference on Computer and Information Science (ACISicis)
2009 (conf/ACISicis/2009)


  1. A Metric-Based Multi-Agent System for Software Project Management. [Citation Graph (, )][DBLP]


  2. A Research of Cognitive Models for CGF in Tank Member. [Citation Graph (, )][DBLP]


  3. Distributed Feedback Mechanism for Just-In-Time Scheduling Problem. [Citation Graph (, )][DBLP]


  4. Modeling Instability in a New Framework of Interval Valued Process Algebra. [Citation Graph (, )][DBLP]


  5. A Heuristic Address Assignment Algorithm Based on Probability in a Network. [Citation Graph (, )][DBLP]


  6. A Method for Dynamic Software Updating in Real-Time Systems. [Citation Graph (, )][DBLP]


  7. A Multi-variable Algorithm for Placing Phi-nodes. [Citation Graph (, )][DBLP]


  8. Searching Algorithm with Granularity Changing and the GNSS Integer Ambiguity Estimation. [Citation Graph (, )][DBLP]


  9. Analysis and Design of an Improved R-learning. [Citation Graph (, )][DBLP]


  10. Effects of Suffix Repetition Rates of a String on the Performance of String Matching Algorithms. [Citation Graph (, )][DBLP]


  11. Improving and Extending SMR Technique for Solving Monotonic Problems. [Citation Graph (, )][DBLP]


  12. Maximizing the Accrued Utility of an Isochronal Soft Real-Time System Using Genetic Algorithms. [Citation Graph (, )][DBLP]


  13. Multi-objective Optimization of Power Control and Resource Allocation for Cognitive Wireless Networks. [Citation Graph (, )][DBLP]


  14. A Novel Parameter Learning Algorithm for a Self-constructing Fuzzy Neural Network Design. [Citation Graph (, )][DBLP]


  15. A Route Planning Optimization Model Based on Improved Ant Colony Algorithm. [Citation Graph (, )][DBLP]


  16. Adaptative Instructional Planning Using Workflow and Genetic Algorithms. [Citation Graph (, )][DBLP]


  17. On Color Texture Generating Based on Simplified KIII Model. [Citation Graph (, )][DBLP]


  18. Optimal Design of Cognitive Radio Wireless Parameters based on Non-dominated Neighbor Distribution Genetic Algorithm. [Citation Graph (, )][DBLP]


  19. Research of Knowledge-based Automatic Model Selection Strategy. [Citation Graph (, )][DBLP]


  20. Solving Global Unconstrained Optimization Problems by Symmetry-Breaking. [Citation Graph (, )][DBLP]


  21. A Novel Approach Based on PCNNs Template for Fingerprint Image Thinning. [Citation Graph (, )][DBLP]


  22. A Parallel Algorithm for Computer Simulation of Electrocardiogram Based on MPI. [Citation Graph (, )][DBLP]


  23. Entropy-based Criteria Dealing with the Ties Problem in Gene Selection. [Citation Graph (, )][DBLP]


  24. Exploring the Spatial Distribution of Bird Habitat with Cluster Analysis. [Citation Graph (, )][DBLP]


  25. Parallelizing the Protein Threading Problem in a Hybrid Peer-to-Peer Based High Performance Computing Platform. [Citation Graph (, )][DBLP]


  26. Protein Secondary Structure Prediction Using Large Margin Methods. [Citation Graph (, )][DBLP]


  27. A Max-plus Network Calculus. [Citation Graph (, )][DBLP]


  28. A New Suggestion for Data Clustering. [Citation Graph (, )][DBLP]


  29. A Novel NAT Traversal Mechanism in the Heterogeneous Environment. [Citation Graph (, )][DBLP]


  30. An Efficient Search Algorithm for REIK Overlay Network. [Citation Graph (, )][DBLP]


  31. Application of Security Ontology to Context-Aware Alert Analysis. [Citation Graph (, )][DBLP]


  32. Detection Probability Analysis of Cooperative Spectrum Sensing in Rayleigh Fading Channels. [Citation Graph (, )][DBLP]


  33. Fast Reroute upon Multi-homed Domains Link Failures. [Citation Graph (, )][DBLP]


  34. HPRP: Hierarchical Probabilistic Routing Protocol for Wireless Mesh Network. [Citation Graph (, )][DBLP]


  35. Improved DCCP Congestion Control for Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  36. Model-Driven Dependability Analysis of Virtualization Systems. [Citation Graph (, )][DBLP]


  37. Modeling of Hybrid-service in Broadband Wireless Communication System. [Citation Graph (, )][DBLP]


  38. New Smith Predictor and FRBF Neural Network Control for Networked Control Systems. [Citation Graph (, )][DBLP]


  39. Performance Analysis of Cognitive Radio Networks against Secondary User's Policies. [Citation Graph (, )][DBLP]


  40. Performance Analysis of IEEE 802.11 DCF in Multi-hop Ad Hoc Networks. [Citation Graph (, )][DBLP]


  41. Polynomial Time Construction Algorithm of BCNC for Network Coding in Cyclic Networks. [Citation Graph (, )][DBLP]


  42. Quality of Protection with Performance Analysis in IP Multimedia Subsystem. [Citation Graph (, )][DBLP]


  43. Research on Optimizing Embedding Space Dimension in Network Coordinate System. [Citation Graph (, )][DBLP]


  44. A Fault Tolerant Bufferless Optical Interconnection Network. [Citation Graph (, )][DBLP]


  45. A New Adaptive Flow Control for Mesh-based Network-on-Chip (NoC). [Citation Graph (, )][DBLP]


  46. Efficient Approximate Algorithm for Hardware/Software Partitioning. [Citation Graph (, )][DBLP]


  47. Efficient Heuristic Algorithm for Rapid Custom-Instruction Selection. [Citation Graph (, )][DBLP]


  48. Floating-point to Fixed-point Transformation Using Extreme Value Theory. [Citation Graph (, )][DBLP]


  49. Transaction Level Modeling for Early Verification on Embedded System Design. [Citation Graph (, )][DBLP]


  50. A New Anomaly Detection Method Based on Rough Set Reduction and HMM. [Citation Graph (, )][DBLP]


  51. High-Availability Decentralized Multi-Agent Key Recovery System. [Citation Graph (, )][DBLP]


  52. Lightweight Public Key Infrastructure and Service Relation Model for Designing a Trustworthy ONS. [Citation Graph (, )][DBLP]


  53. Object-oriented Case Representation and Its Application in IDS. [Citation Graph (, )][DBLP]


  54. Security Enhancing Compiler for Localization Schemes in Pervasive Sensor Networks. [Citation Graph (, )][DBLP]


  55. Strongly Unforgeable Signature Scheme without One-Time Key. [Citation Graph (, )][DBLP]


  56. Transmission Performance Simulation of Broadcast Encryption Schemes with Pay-TV System Implementation Consideration. [Citation Graph (, )][DBLP]


  57. Users' Behavior Character Analysis and Classification Approaches in Enterprise Networks. [Citation Graph (, )][DBLP]


  58. An Efficient Algorithm to Mine Unordered Trees. [Citation Graph (, )][DBLP]


  59. A General Framework: Combining Statistical Models and Network Structure for Deep Content Mining. [Citation Graph (, )][DBLP]


  60. Application of Gray Level Variation Statistic in Gastroscopic Image Retrieval. [Citation Graph (, )][DBLP]


  61. Challenges for Sentence Level Opinion Detection in Blogs. [Citation Graph (, )][DBLP]


  62. Extracting Relations from Chinese Web Documents Using Kernel Methods. [Citation Graph (, )][DBLP]


  63. Feature Selection Algorithm Based on Association Rules Mining Method. [Citation Graph (, )][DBLP]


  64. Feature-Based Data Stream Clustering. [Citation Graph (, )][DBLP]


  65. Hidden Topic Analysis Based Formal Framework for Finding Experts in Metadata Corpus. [Citation Graph (, )][DBLP]


  66. Identifying Structures with Informative Dimensions in Streams. [Citation Graph (, )][DBLP]


  67. Incremental Naïve Bayesian Spam Mail Filtering and Variant Incremental Training. [Citation Graph (, )][DBLP]


  68. Integrating Search and Sharing: User-Centric Collaborative Information Seeking. [Citation Graph (, )][DBLP]


  69. MVGL Analyser for Multi-classifier Based Spam Filtering System. [Citation Graph (, )][DBLP]


  70. PLSA-Based Query Expansion. [Citation Graph (, )][DBLP]


  71. Radius-Distance Based Semi-Supervised Algorithm. [Citation Graph (, )][DBLP]


  72. Study on Hydrology Time Series Prediction Based on Wavelet-neural Networks. [Citation Graph (, )][DBLP]


  73. Temporal Pattern Recognition in Video Clips Detection. [Citation Graph (, )][DBLP]


  74. Using Hoarding to Increase Availability in Shared File Systems. [Citation Graph (, )][DBLP]


  75. Weight Balanced Linear Programming SVM on Skewed Distribution and its Evaluation. [Citation Graph (, )][DBLP]


  76. Autonomic Success in Database Management Systems. [Citation Graph (, )][DBLP]


  77. Autonomicity in Universal Database DB2. [Citation Graph (, )][DBLP]


  78. Cluster Based Partition for Multi-dimensional Range Query in DAS Model. [Citation Graph (, )][DBLP]


  79. Efficient Processing of XML Twig Queries with All Predicates. [Citation Graph (, )][DBLP]


  80. Exhaustive Greedy Algorithm for Optimizing Intermediate Result Sizes of Join Queries. [Citation Graph (, )][DBLP]


  81. On the Soundness Property for SQL Queries of Fine-grained Access Control in DBMSs. [Citation Graph (, )][DBLP]


  82. Querying Heterogeneous Relational Database using SPARQL. [Citation Graph (, )][DBLP]


  83. A Model-Driven Approach for Generating Business Processes and Process Interaction Semantics. [Citation Graph (, )][DBLP]


  84. A Novel Fault-tolerant Particle Swarm Optimization Scheduler for Scheduling Independent Task in Grid Computing Environment. [Citation Graph (, )][DBLP]


  85. A Novel Trust Model Based on Bayesian Network for Service-Oriented Grid. [Citation Graph (, )][DBLP]


  86. Algorithms for Scheduling Distributed Tasks of Ordered Communication on a Realistic Model of Heterogeneous Grids. [Citation Graph (, )][DBLP]


  87. Enabling Grid Interoperability by Extending HPC-driven Job Management with an Open Standard Information Model. [Citation Graph (, )][DBLP]


  88. Scientific Workflow Model for Provenance Analysis Based on Many-sorted High-Level Nets. [Citation Graph (, )][DBLP]


  89. Triplet Based Multi-core Interconnection Network and its Computational Efficiency. [Citation Graph (, )][DBLP]


  90. Bayesian Inference on QGARCH Model Using the Adaptive Construction Scheme. [Citation Graph (, )][DBLP]


  91. Comparing the Feature Selection Using the Distributed Non-overlap Area Measurement Method with Principal Component Analysis. [Citation Graph (, )][DBLP]


  92. ERP Systems Development: Enhancing Organization's Strategic Control through Monitoring Agents. [Citation Graph (, )][DBLP]


  93. Model Concept to Determine the Optimal Maturity of IT Service Management Processes. [Citation Graph (, )][DBLP]


  94. On the Singularity of Valuating IT Security Investments. [Citation Graph (, )][DBLP]


  95. A Max Modular Support Vector Machine and Its Variations for Pattern Classification. [Citation Graph (, )][DBLP]


  96. A Method for Removing the Impulse in Image Processing. [Citation Graph (, )][DBLP]


  97. A Motion Attention Model Based Rate Control Algorithm for H.264/AVC. [Citation Graph (, )][DBLP]


  98. A Noise Insensitive Cluster Validity Measure for Pattern Classification. [Citation Graph (, )][DBLP]


  99. An Image Encryption Algorithm Based on N-Dimension Affine Transformation. [Citation Graph (, )][DBLP]


  100. Border Detection and Cancer Propagation on Spectral Bands of Malignant Melanoma Using Six Sigma Threshold. [Citation Graph (, )][DBLP]


  101. Efficient Video Watermarking Using Motion Estimation Approach. [Citation Graph (, )][DBLP]


  102. Dynamic Background Modeling for Foreground Segmentation. [Citation Graph (, )][DBLP]


  103. Fingerprint Skeleton Extraction Based on Improved Principal Curve. [Citation Graph (, )][DBLP]


  104. Salient Object Extraction Based on Region Saliency Ratio. [Citation Graph (, )][DBLP]


  105. Selecting Relevant EEG Signal Locations for Personal Identification Problem Using ICA and Neural Network. [Citation Graph (, )][DBLP]


  106. Technique of Large-scale Image Set Construction Based on Web Image Searching Engine. [Citation Graph (, )][DBLP]


  107. Three-Dimensional Reconstruction Using Enhanced Shape from Stereo Technique. [Citation Graph (, )][DBLP]


  108. A General Attack against Several Group Signatures. [Citation Graph (, )][DBLP]


  109. A Hybrid Branch-and-Bound Strategy for Hardware/Software Partitioning. [Citation Graph (, )][DBLP]


  110. A Note on the Upper Bound of Dimension of Bivariate Spline Space over Triangulation. [Citation Graph (, )][DBLP]


  111. An Efficient Fusion Algorithm on Conflicting Evidence. [Citation Graph (, )][DBLP]


  112. Dynamic Routing Strategies Based on Local Topological Information of Scale-free Network. [Citation Graph (, )][DBLP]


  113. Facial Metrical and Caricature-Pattern-Based Learning in Neural Network System for Face Recognition. [Citation Graph (, )][DBLP]


  114. Performance Analysis of Generalized Well-formed Workflow. [Citation Graph (, )][DBLP]


  115. Research on Numerical Module Identification Approaches. [Citation Graph (, )][DBLP]


  116. The Game Analysis of Price Competition on Different Rationality. [Citation Graph (, )][DBLP]


  117. Animating the Brush-writing Process of Chinese Calligraphy Characters. [Citation Graph (, )][DBLP]


  118. Rule-Based Publish-Subscribe Mechanism for Real-time Applications. [Citation Graph (, )][DBLP]


  119. Spatial Navigation with Consistency Maintenance System. [Citation Graph (, )][DBLP]


  120. Study of Intelligent Control System for Ship Autopilot Design. [Citation Graph (, )][DBLP]


  121. Symbolic Reachability Computation of a Class of Nonlinear Systems. [Citation Graph (, )][DBLP]


  122. A Common Acquaintance Immunization Strategy for Complex Network. [Citation Graph (, )][DBLP]


  123. Autogeneration of Database Applications from XML Metadata for Web-Based Data Entry. [Citation Graph (, )][DBLP]


  124. BackupIT: An Intrusion-Tolerant Cooperative Backup System. [Citation Graph (, )][DBLP]


  125. Bloggers' Social Presence Framing and Blog Visitors' Responses. [Citation Graph (, )][DBLP]


  126. Building the Semantic Relations-Based Web Services Registry through Services Mining. [Citation Graph (, )][DBLP]


  127. Research on Fault-tolerant Mechanism of Integrating Water-Domain Oriented Computing Resources. [Citation Graph (, )][DBLP]


  128. Monitoring End-to-End Quality of Service in a Video Streaming System. [Citation Graph (, )][DBLP]


  129. The Design and Realization of Unicode Based Minorities Character Online Processing System. [Citation Graph (, )][DBLP]


  130. A MAC Protocol for Cooperative Wireless Networks. [Citation Graph (, )][DBLP]


  131. An Efficient Replica Location Method in Hierarchical P2P Networks. [Citation Graph (, )][DBLP]


  132. An Energy Efficient MAC Protocol for WSNs. [Citation Graph (, )][DBLP]


  133. An Energy-Efficient Data Gathering Protocol for Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  134. Cross-Layer Service Discovery Using Multi-Path for Wireless Environments. [Citation Graph (, )][DBLP]


  135. Degradation of MIMO UWB-IR Transceiver in Poisson Models. [Citation Graph (, )][DBLP]


  136. Genetic Algorithm Based Length Reduction of a Mobile BS Path in WSNs. [Citation Graph (, )][DBLP]


  137. Implementation of Geocast Enhanced AODV-UU in Linux Testbed. [Citation Graph (, )][DBLP]


  138. New Delay Optimum Quasi-Othogonal Space-Time Block Codes with Full Spatial Diversity. [Citation Graph (, )][DBLP]


  139. Novel Protocol and Its Implementation QKD in Wi-Fi Networks. [Citation Graph (, )][DBLP]


  140. ODMRP-LR: ODMRP with Link Failure Detection and Local Recovery Mechanism. [Citation Graph (, )][DBLP]


  141. Packet Loss Pattern and Parametric Video Quality Model for IPTV. [Citation Graph (, )][DBLP]


  142. Reducing Web Latency in Mobile Network. [Citation Graph (, )][DBLP]


  143. Throughput Analysis of Wireless Multi-hop Chain Networks. [Citation Graph (, )][DBLP]


  144. Transaction of Service Composition in Pervasive Computing and Its Correctness Analysis Based on ASM. [Citation Graph (, )][DBLP]


  145. Ubiquitous Services for Senior Citizens - Living Process Detection and Middleware. [Citation Graph (, )][DBLP]


  146. ZD-AOMDV: A New Routing Algorithm for Mobile Ad-Hoc Networks. [Citation Graph (, )][DBLP]


  147. An Eliminating Causal Ambiguity Approach to Reactive Systems. [Citation Graph (, )][DBLP]


  148. Detecting Race Conditions in One-Sided Communication of MPI Programs. [Citation Graph (, )][DBLP]


  149. Fair Slack-Reclamation for Scheduling Periodic Tasks. [Citation Graph (, )][DBLP]


  150. Implementation of Recurrence Calculation on a Heterogeneous Multicore Processor. [Citation Graph (, )][DBLP]


  151. LAOVM: Lightweight Application-Oriented Virtual Machine for Thread Migration. [Citation Graph (, )][DBLP]


  152. A Framework to Support Interoperability among Web Service Registries. [Citation Graph (, )][DBLP]


  153. A New Model of Software Life Cycle Processes for Consistent Design, Development, Management, and Maintenance of Secure Information Systems. [Citation Graph (, )][DBLP]


  154. A QoS-oriented Optimization Model for Web Service Group. [Citation Graph (, )][DBLP]


  155. A Simple Method for Filtering Image Spam. [Citation Graph (, )][DBLP]


  156. An Empirical Performance Metrics Measurement and Analysis of Software Platforms for Implementation of Web Services. [Citation Graph (, )][DBLP]


  157. Current Practice, Problems and Factors in COSD Application - A Component Users Perspective. [Citation Graph (, )][DBLP]


  158. Automatic Construction of Complete Abstraction by Abstract Interpretation. [Citation Graph (, )][DBLP]


  159. Detecting Design Patterns Using Source Code of Before Applying Design Patterns. [Citation Graph (, )][DBLP]


  160. Effectiveness of Stakeholder Identification Methods in Requirements Elicitation: Experimental Results Derived from a Methodical Review. [Citation Graph (, )][DBLP]


  161. MUPRET: An Ontology-Driven Traceability Tool for Multiperspective Requirements Artifacts. [Citation Graph (, )][DBLP]


  162. MuTT: A Multi-Threaded Tracer for Java Programs. [Citation Graph (, )][DBLP]


  163. Reliability Analysis of Component Software Based on Testing Data Transformation. [Citation Graph (, )][DBLP]


  164. Research on Test Suite Reduction Using Attribute Relevance Analysis. [Citation Graph (, )][DBLP]


  165. Risky Module Estimation in Safety-Critical Software. [Citation Graph (, )][DBLP]


  166. Service Discovery and Substitution According to Inheritance of Behavior with Invariant Analysis. [Citation Graph (, )][DBLP]


  167. Simplifying Buffer Overflow Detection Using Site-Safe Expressions. [Citation Graph (, )][DBLP]


  168. Software Development Process Monitoring Based on Nominal Transformation. [Citation Graph (, )][DBLP]


  169. Software Reliability Assurance Using a Framework in Weapon System Development: A Case Study. [Citation Graph (, )][DBLP]


  170. Study on the Automatic Test Framework Based on Three-tier Data Driven Mechanism. [Citation Graph (, )][DBLP]


  171. Development Based on MDA, of Ubiquitous Applications Domain Product Lines. [Citation Graph (, )][DBLP]


  172. A Systematic Framework for Grammar Testing. [Citation Graph (, )][DBLP]


  173. Validating Requirements Model of a B2B System. [Citation Graph (, )][DBLP]


  174. Model Checking Service Component Composition by SPIN. [Citation Graph (, )][DBLP]


  175. Model Checking UML Activity Diagrams in FDR. [Citation Graph (, )][DBLP]


  176. On the Capability Compliance of Annotated Process Model. [Citation Graph (, )][DBLP]


  177. A Coverage-Driven Constraint Random-Based Functional Verification Method of Pipeline Unit. [Citation Graph (, )][DBLP]


  178. A Study of Matrix Data on Reading and Writing Method in Simulation. [Citation Graph (, )][DBLP]


  179. A 5-Parameter Bundle Adjustment Method for Image Mosaic. [Citation Graph (, )][DBLP]


  180. A Framework for Real-time Local Free-Form Deformation. [Citation Graph (, )][DBLP]


  181. A General 3D Campus Navigator System. [Citation Graph (, )][DBLP]


  182. A Logical and Graphical Operation of a Graph-Based Data Model. [Citation Graph (, )][DBLP]


  183. A Novel Rate Control Scheme for H.264/AVC Based on Scene Change. [Citation Graph (, )][DBLP]


  184. Adding SVC Spatial Scalability to Existing H.264/AVC Video. [Citation Graph (, )][DBLP]


  185. Dealing with Telephone Fraud Using CAPTCHA. [Citation Graph (, )][DBLP]


  186. Depth Adaptive Video Stitching. [Citation Graph (, )][DBLP]


  187. Efficient Estimation of Multiple Illuminant Directions Using C-means Clustering and Self-correction for Augmented Reality. [Citation Graph (, )][DBLP]


  188. Image Inpainting Algorithm Based on Successive Elimination. [Citation Graph (, )][DBLP]


  189. Point Matching Estimation for Moving Object Tracking Based on Kalman Filter. [Citation Graph (, )][DBLP]


  190. SaViT: Technique for Visualization of Digital Home Safety. [Citation Graph (, )][DBLP]


  191. Shot Boundary Detection and Keyframe Extraction Based on Scale Invariant Feature Transform. [Citation Graph (, )][DBLP]


  192. Texture Retrieval by Scale and Rotation Invariant Directional Empirical Mode Decomposition. [Citation Graph (, )][DBLP]


  193. A SAM-Based Evolution Model of Ontological User Model. [Citation Graph (, )][DBLP]


  194. A Web Service Adapter with Contract-Oriented Methodology. [Citation Graph (, )][DBLP]


  195. A Web Service Composition Method Based on Interface Matching. [Citation Graph (, )][DBLP]


  196. Analyzing Reliability of Time Constrained Service Composition. [Citation Graph (, )][DBLP]


  197. Measuring User Prestige and Interaction Preference on Social Network Site. [Citation Graph (, )][DBLP]


  198. M-Filter: Semantic XML Data Filtering System for Multiple Queries. [Citation Graph (, )][DBLP]


  199. Monitoring BPEL-Based Web Service Composition Using AOP. [Citation Graph (, )][DBLP]


  200. Multi-Tier Security Feature Modeling for Service-Oriented Application Integration. [Citation Graph (, )][DBLP]


  201. A Heuristic QoS-Aware Service Selection Approach to Web Service Composition. [Citation Graph (, )][DBLP]


  202. Performance of Web Caching in High Density Mobile Networks. [Citation Graph (, )][DBLP]


  203. Understanding the Search Interfaces of the Deep Web Based on Domain Model. [Citation Graph (, )][DBLP]


  204. User-interface Design of Web Application Using Object-Z. [Citation Graph (, )][DBLP]


  205. Validating XML Constraints Using Automata. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002