The SCEAS System
Navigation Menu

Conferences in DBLP

Conference on Computer and Information Technology (IEEEcit)
2010 (conf/IEEEcit/2010)

  1. Texture Classification by Matching Co-occurrence Matrices on Statistical Manifolds. [Citation Graph (, )][DBLP]

  2. A Learning Automaton Based Approach for Data Fragments Allocation in Distributed Database Systems. [Citation Graph (, )][DBLP]

  3. Providing Context-awareness in the Smart Car Environment. [Citation Graph (, )][DBLP]

  4. Term Weighting Approaches for Mining Significant Locations from Personal Location Logs. [Citation Graph (, )][DBLP]

  5. Experience with Hardware-Software Codesign of Network Protocol Stacks Supporting Real-Time Inter-Task Communication. [Citation Graph (, )][DBLP]

  6. Dynamically Programmable Image Processor for Compact Vision Systems. [Citation Graph (, )][DBLP]

  7. Performance Comparison of IPv4 and IPv6 in Peer-Peer and Client Server Local Area Networks. [Citation Graph (, )][DBLP]

  8. Analysis of Software Rejuvenation in Clustered Computing System with Dependency Relation between Nodes. [Citation Graph (, )][DBLP]

  9. Distributed Memory Management Units Architecture for NoC-based CMPs. [Citation Graph (, )][DBLP]

  10. Homogeneous NoC-based FPGA: The Foundation for Virtual FPGA. [Citation Graph (, )][DBLP]

  11. Adaptive Algorithms for Efficient Content Management in Social Network Services. [Citation Graph (, )][DBLP]

  12. A Self-Adaptable Approach for Easing the Development of Grid-Oriented Services. [Citation Graph (, )][DBLP]

  13. A P2P REcommender System based on Gossip Overlays (PREGO). [Citation Graph (, )][DBLP]

  14. A Triggering and Scheduling Approach for ETL in a Real-time Data Warehouse. [Citation Graph (, )][DBLP]

  15. Improving the Efficiency of Scheduling and Placement in FPGA by Small-world Model Based Genetic Algorithm. [Citation Graph (, )][DBLP]

  16. Low Power Branch Predictor for Embedded Processors. [Citation Graph (, )][DBLP]

  17. Speeding up K-Means Algorithm by GPUs. [Citation Graph (, )][DBLP]

  18. Effects of Allocation Request Shape Changes on Performance in 2D Mesh-Connected Multicomputers. [Citation Graph (, )][DBLP]

  19. Optimizing Adaptive Synchronization in Parallel Simulators for Large-scale Parallel Systems and Applications. [Citation Graph (, )][DBLP]

  20. A Data Communication Scheduler for Stream Programs on CPU-GPU Platform. [Citation Graph (, )][DBLP]

  21. Collective Communication in Recursive Dual-Net: An Interconnection Network for High-Performance Parallel Computer Systems of the Next Generation. [Citation Graph (, )][DBLP]

  22. A Causal Model Method for Fault Diagnosis in Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  23. On-Chip Operating System Design for NoC-Based CMP. [Citation Graph (, )][DBLP]

  24. An Efficient Power-Aware Optimization for Task Scheduling on NoC-based Many-core System. [Citation Graph (, )][DBLP]

  25. TMemCanal: A VM-oblivious Dynamic Memory Optimization Scheme for Virtual Machines in Cloud Computing. [Citation Graph (, )][DBLP]

  26. A Multi-criteria Job Scheduling Framework for Large Computing Farms. [Citation Graph (, )][DBLP]

  27. Resource Pricing and Equilibrium Allocation Policy in Cloud Computing. [Citation Graph (, )][DBLP]

  28. An Efficient Data Mining Framework on Hadoop using Java Persistence API. [Citation Graph (, )][DBLP]

  29. Developing a Cloud Computing Charging Model for High-Performance Computing Resources. [Citation Graph (, )][DBLP]

  30. Distributed Bottleneck Node Detection in Wireless Sensor Network. [Citation Graph (, )][DBLP]

  31. Ad hoc Grid: An Adaptive and Self-Organizing Peer-to-Peer Computing Grid. [Citation Graph (, )][DBLP]

  32. Using the Software Process Improvement approach for Defining a Methodology for Embedded Systems Development using the CMMI-DEV v1.2. [Citation Graph (, )][DBLP]

  33. The Impact of Acceptance Tests on Analyzing Component-Based Systems Specifications: An Experimental Evaluation. [Citation Graph (, )][DBLP]

  34. Software Stage-Effort Estimation Based on Association Rule Mining and Fuzzy Set Theory. [Citation Graph (, )][DBLP]

  35. A Recognizer of Rational Trace Languages. [Citation Graph (, )][DBLP]

  36. A Framework for Distributed Management of Dynamic Self-adaptation in Heterogeneous Environments. [Citation Graph (, )][DBLP]

  37. A New Private Data Aggregation Scheme for Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  38. Ferry Route Design with Delay Bounds in Delay-Tolerant Networks. [Citation Graph (, )][DBLP]

  39. Fuzzy Location Service for Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]

  40. Analysis of Anomalies on a Virtualized Network Testbed. [Citation Graph (, )][DBLP]

  41. AOMDV with Sufficient Bandwidth Aware. [Citation Graph (, )][DBLP]

  42. Metadata-Based Adaptive Sampling for Energy-Efficient Collaborative Target Tracking in Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  43. QoS Algorithm for Localised Routing Based on Bandwidth as the Dominant Metric for Candidate Path Selection. [Citation Graph (, )][DBLP]

  44. Delta-Multiplexing: A Novel Technique to Improve VoIP Bandwidth Utilization between VoIP Gateways. [Citation Graph (, )][DBLP]

  45. Novel QoS-Aware Gateway Centralized Multi-hop Routing for Wireless Mesh Networks. [Citation Graph (, )][DBLP]

  46. Evaluation of QoS Parameters for Real-time Rich Media Applications Using a Test-bed Implementation. [Citation Graph (, )][DBLP]

  47. Server Placement for Peer-to-Peer Live Streaming Systems. [Citation Graph (, )][DBLP]

  48. A Sofrware Framework for Robust Packet Delivery in Wireless Multi-hop Networks. [Citation Graph (, )][DBLP]

  49. Enhanced Packet Buffering for DiffServ in Fast Handover Mobile IP. [Citation Graph (, )][DBLP]

  50. Active Analysis of BT with a Modified Azureus Client. [Citation Graph (, )][DBLP]

  51. Analyzing Performance for Complex Protocol using Validated CP-nets Models. [Citation Graph (, )][DBLP]

  52. Distributed Energy Balanced Clustering for Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  53. Impact of Peers' Similarity on Recommendations in P2P Systems. [Citation Graph (, )][DBLP]

  54. Dynamic Single Frequency Networks in Wireless Multihop Networks - Energy Aware Routing Algorithms with Performance Analysis. [Citation Graph (, )][DBLP]

  55. A Query based Formal Security Analysis Framework for Enterprise LAN. [Citation Graph (, )][DBLP]

  56. Distributed Adaptive Interference-Avoidance Multi-channel MAC Protocol for ZigBee Networks. [Citation Graph (, )][DBLP]

  57. A Comparative Study on Iterative Methods Regarding Cross-Layer Optimization for OFDMA Systems. [Citation Graph (, )][DBLP]

  58. An Efficient Method to Set RBF Network Paramters Based on SOM Training. [Citation Graph (, )][DBLP]

  59. Fuzzy Expert System Based Intelligent Website Assessment System. [Citation Graph (, )][DBLP]

  60. Training Recurrent Neuro-Fuzzy System Using Two Novel Population-Based Algorithms for Temperature Forecasting. [Citation Graph (, )][DBLP]

  61. Intelligent Recognition of Gearbox Status by Wavelet Packet Decomposition. [Citation Graph (, )][DBLP]

  62. A Novel Neural Network-Based Approach for Multiple Instance Learning. [Citation Graph (, )][DBLP]

  63. The Logical Difference for Fuzzy Ontologies. [Citation Graph (, )][DBLP]

  64. Multiobjective Evolutionary Algorithms and a Combined Heuristic for Route Reconnection Applied to Multicast Flow Routing. [Citation Graph (, )][DBLP]

  65. A Model of Intelligent Controller for Hypothyroidism Treatment. [Citation Graph (, )][DBLP]

  66. Intelligent Modelling for Benign Tumour Growth with Cell-Cell and Cell-Matrix Adhesion and Movement. [Citation Graph (, )][DBLP]

  67. Moving Object Tracking Method Based on Adaptive On-line Clustering and Prediction-based Cross-correlation. [Citation Graph (, )][DBLP]

  68. Robust Detection of Corners and Corner-line Links in Images. [Citation Graph (, )][DBLP]

  69. Flame Recognition Algorithm Research under Complex Background. [Citation Graph (, )][DBLP]

  70. Accuracy Enhancement for License Plate Recognition. [Citation Graph (, )][DBLP]

  71. Moving Object Detection based on Clausius Entropy. [Citation Graph (, )][DBLP]

  72. Non-negative Matrix Factorization for Inferring Implicit Preference of Potential Customer. [Citation Graph (, )][DBLP]

  73. Voting Based Text Line Segmentation in Handwritten Document Images. [Citation Graph (, )][DBLP]

  74. Object Recognition using Full Pixel Matching. [Citation Graph (, )][DBLP]

  75. An Extraction Method of Moving Object Based on Visual Cognition Mechanism. [Citation Graph (, )][DBLP]

  76. Detecting the Orientation of N-gonal Cropped Sub-images and Its Application. [Citation Graph (, )][DBLP]

  77. A Photo Visualization System Considering Region of Interest. [Citation Graph (, )][DBLP]

  78. A Framework for Building Trust Based Communities in P2P Mobile Social Networks. [Citation Graph (, )][DBLP]

  79. High Speed NIDS using Dynamic Cluster and Comparator Logic. [Citation Graph (, )][DBLP]

  80. Concurrent Error Detection for Multiplicative Inversion of Advanced Encryption Standard. [Citation Graph (, )][DBLP]

  81. Quantifying Information Leakage for Fully Probabilistic Systems. [Citation Graph (, )][DBLP]

  82. A Secure Storage System Combining Secret Sharing Schemes and Byzantine Quorum Mechanisms. [Citation Graph (, )][DBLP]

  83. Selective and Early Threat Detection in Large Networked Systems. [Citation Graph (, )][DBLP]

  84. Enforcing Access Control to Web Databases. [Citation Graph (, )][DBLP]

  85. New GML Storage Schema Models for Spatial and Non-spatial Information. [Citation Graph (, )][DBLP]

  86. An Efficient Technique for Continuous K-Nearest Neighbor Query Processing on Moving Objects in a Road Network. [Citation Graph (, )][DBLP]

  87. F-KDB: An K-D-B Tree Implementation over Flash Memory. [Citation Graph (, )][DBLP]

  88. A Smart Filtering System for Newly Coined Profanities by Using Approximate String Alignment. [Citation Graph (, )][DBLP]

  89. Two Novel Semantics of Top-k Queries Processing in Uncertain Database. [Citation Graph (, )][DBLP]

  90. Robust Top-k Query Evaluation in Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  91. Failure Semantic of Neighbour Replication Grid Transaction Model. [Citation Graph (, )][DBLP]

  92. How to Apply the Skip List to the Management of a Massive Set of Replying Comments in Web Bulletins by Exploiting the Power-Law Distribution. [Citation Graph (, )][DBLP]

  93. iDARE: Proactive Data Replication Mechanism for P2P VoD System. [Citation Graph (, )][DBLP]

  94. Information Retrieval via Truncated Hilbert Space Expansions. [Citation Graph (, )][DBLP]

  95. Delivering Categorized News Items Using RSS Feeds and Web Services. [Citation Graph (, )][DBLP]

  96. Fuzzy Neural Networks to Detect Cardiovascular Diseases Hierarchically. [Citation Graph (, )][DBLP]

  97. A New Congestion Control Mechanism for WSNs. [Citation Graph (, )][DBLP]

  98. Maximal Weight Topology Discovery in Ad hoc Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  99. Error-Tolerant Coverage Control based on Bio-inspired Attractor Selection Model for Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  100. Pattern Recognition Comparative Analysis Applied to Fingerprint Indoor Mobile Sensors Localization. [Citation Graph (, )][DBLP]

  101. Concept and Prototype for a Real-Time Enabled Publish/Subscribe System. [Citation Graph (, )][DBLP]

  102. A Lifetime Extended Routing Protocol Based on Data Threshold in Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  103. Enhanced Fibonacci Backoff Algorithm for Mobile Ad-Hoc Network. [Citation Graph (, )][DBLP]

  104. Facilitating Mobile Communication with Annotated Messages. [Citation Graph (, )][DBLP]

  105. A SIP Signaling Retransmission Scheme for Efficient Mobile IPTV Service over 3G Wireless Networks. [Citation Graph (, )][DBLP]

  106. Effective Video Transport over WiMAX with Data Partitioning and Rateless Coding. [Citation Graph (, )][DBLP]

  107. Fastest-Vehicle Multi-hop Routing in Vehicular Ad hoc Networks. [Citation Graph (, )][DBLP]

  108. Discrete-Time Simulator for Wireless Mobile Agents. [Citation Graph (, )][DBLP]

  109. Collective Behaviour in a Square Lattice of Driven Duffing Resonators Coupled to van der Pol Oscillators. [Citation Graph (, )][DBLP]

  110. Self-organizing Load Balancing for Relay Based Cellular Networks. [Citation Graph (, )][DBLP]

  111. Towards Secure and Reliable Data Storage with Multi-coefficient Secret Sharing. [Citation Graph (, )][DBLP]

  112. A Model of Security Information Flow on Entities for Trust Computation. [Citation Graph (, )][DBLP]

  113. Toward a Target Function of an Information Security Management System. [Citation Graph (, )][DBLP]

  114. Trust Model for Open Resource Control Architecture. [Citation Graph (, )][DBLP]

  115. Are the Con Artists Back? A Preliminary Analysis of Modern Phone Frauds. [Citation Graph (, )][DBLP]

  116. A Privacy-Preserving Trust Model for VANETs. [Citation Graph (, )][DBLP]

  117. Linguistic Fuzzy Logic Enhancement of a Trust Mechanism for Distributed Networks. [Citation Graph (, )][DBLP]

  118. Enabling Use of Single Password over Multiple Servers in Two-Server Model. [Citation Graph (, )][DBLP]

  119. Virtual Security Kernel: A Component-Based OS Architecture for Self-Protection. [Citation Graph (, )][DBLP]

  120. Spyware Security Management via a Public Key Infrastructure for Client-Side Web Communicating Applications. [Citation Graph (, )][DBLP]

  121. A Secure User Interface for Web Applications Running Under an Untrusted Operating System. [Citation Graph (, )][DBLP]

  122. Efficient Encryption-Authentication of Shared Bus-Memory in SMP System. [Citation Graph (, )][DBLP]

  123. An Analytical Framework for Evaluating Survivability of SCADA Systems. [Citation Graph (, )][DBLP]

  124. An Authentication Framework for Wireless Sensor Networks using Identity-Based Signatures. [Citation Graph (, )][DBLP]

  125. Secure Secret Key Distribution and Storage in Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  126. Trust Management Scheme for Mobile Ad-Hoc Networks. [Citation Graph (, )][DBLP]

  127. Learning Autonomic Security Reconfiguration Policies. [Citation Graph (, )][DBLP]

  128. Reverse Tree-based Key Routing: Robust Data Aggregation in Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  129. Tin-Key: Effective Key-Establishment for Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  130. Efficient Sharing of Secure Cloud Storage Services. [Citation Graph (, )][DBLP]

  131. Designing Cloud Services Adhering to Government Privacy Laws. [Citation Graph (, )][DBLP]

  132. A Practical Approach to Improve the Data Privacy of Virtual Machines. [Citation Graph (, )][DBLP]

  133. Incorporating Trust in Network Virtualization. [Citation Graph (, )][DBLP]

  134. A Security Management Architecture for the Protection of Kernel Virtual Machines. [Citation Graph (, )][DBLP]

  135. MobiTrust: Trust Management System in Mobile Social Computing. [Citation Graph (, )][DBLP]

  136. Hiding Short Secret Messages based on Linguistic Steganography and Manual Annotation. [Citation Graph (, )][DBLP]

  137. Measuring the Security of Linguistic Steganography in Spanish based on Synonymous Paraphrasing with WSD. [Citation Graph (, )][DBLP]

  138. Bi-directional RPROB-based Location Anonymizer System for Location-Based Services. [Citation Graph (, )][DBLP]

  139. Using Game Theory to Reveal Vulnerability for Complex Networks. [Citation Graph (, )][DBLP]

  140. A Privacy Enhanced Data Aggregation Model. [Citation Graph (, )][DBLP]

  141. A Culture of Trust Threatens Security and Privacy in Qatar. [Citation Graph (, )][DBLP]

  142. Image Steganography and Chrominance Components. [Citation Graph (, )][DBLP]

  143. Distinguishing the Master to Defend DDoS Attack in Peer-to-Peer Networks. [Citation Graph (, )][DBLP]

  144. Augmented Attack Tree Modeling of Distributed Denial of Services and Tree Based Attack Detection Method. [Citation Graph (, )][DBLP]

  145. Simultaneous Analysis of Time and Space for Conflict Detection in Time-Based Firewall Policies. [Citation Graph (, )][DBLP]

  146. On Small Subgroup Non-confinement Attack. [Citation Graph (, )][DBLP]

  147. Compressing Attack Graphs Through Reference Encoding. [Citation Graph (, )][DBLP]

  148. Decentralized XACML Overlay Network. [Citation Graph (, )][DBLP]

  149. Cryptanalysis of the Bisectional MQ Equations System. [Citation Graph (, )][DBLP]

  150. Achieving High Efficiency in Membership Proof without Compromising or Weakening any Security Property. [Citation Graph (, )][DBLP]

  151. Fault Propagation Pattern Based DFA on Feistel Ciphers, with Application to Camellia. [Citation Graph (, )][DBLP]

  152. Offline Submission with RSA Time-Lock Puzzles. [Citation Graph (, )][DBLP]

  153. Attacks on an Efficient RFID Authentication Protocol. [Citation Graph (, )][DBLP]

  154. Think Before Your LFSRs Jump. [Citation Graph (, )][DBLP]

  155. Distinguishing Attack on Bivium. [Citation Graph (, )][DBLP]

  156. Security and Trust of Public Key Cryptography Options for HIP. [Citation Graph (, )][DBLP]

  157. CATRAC: Context-Aware Trust- and Role-Based Access Control for Composite Web Services. [Citation Graph (, )][DBLP]

  158. Enabling Privacy-preserving Credential-based Access Control with XACML and SAML. [Citation Graph (, )][DBLP]

  159. Security in Outsourced Storage: Efficiently Checking Integrity and Service Level Agreement Compliance. [Citation Graph (, )][DBLP]

  160. A Novel Dynamic ID-based Remote User Authentication and Access Control Scheme for Multi-server Environment. [Citation Graph (, )][DBLP]

  161. Recommending Access to Web Resources based on User's Profile and Traceability. [Citation Graph (, )][DBLP]

  162. Privacy-Aware Access Control and Authorization in Passive Network Monitoring Infrastructures. [Citation Graph (, )][DBLP]

  163. Efficiently Using a CUDA-enabled GPU as Shared Resource. [Citation Graph (, )][DBLP]

  164. Efficient Independent Component Analysis on a GPU. [Citation Graph (, )][DBLP]

  165. XMalloc: A Scalable Lock-free Dynamic Memory Allocator for Many-core Machines. [Citation Graph (, )][DBLP]

  166. Parallel Best Neighborhood Matching Algorithm Implementation on GPU Platform. [Citation Graph (, )][DBLP]

  167. Improving the Performance of the Sparse Matrix Vector Product with GPUs. [Citation Graph (, )][DBLP]

  168. Memory Saving Discrete Fourier Transform on GPUs. [Citation Graph (, )][DBLP]

  169. The GPU-based String Matching System in Advanced AC Algorithm. [Citation Graph (, )][DBLP]

  170. GPUMP: A Multiple-Precision Integer Library for GPUs. [Citation Graph (, )][DBLP]

  171. Accelerating Linpack Performance with Mixed Precision Algorithm on CPU+GPGPU Heterogeneous Cluster. [Citation Graph (, )][DBLP]

  172. Exploiting More Parallelism from Applications Having Generalized Reductions on GPU Architectures. [Citation Graph (, )][DBLP]

  173. SBLOCK: A Framework for Efficient Stencil-Based PDE Solvers on Multi-core Platforms. [Citation Graph (, )][DBLP]

  174. Astrophysical Particle Simulations with Custom GPU Clusters. [Citation Graph (, )][DBLP]

  175. Massively Parallel Finite Element Simulator for Full-Chip STI Stress Analysis. [Citation Graph (, )][DBLP]

  176. CUDA-based Signed Distance Field Calculation for Adaptive Grids. [Citation Graph (, )][DBLP]

  177. Graphics Card Computing for Cosmology: Cholesky Factorization. [Citation Graph (, )][DBLP]

  178. GPU Accelerated VLSI Design Verification. [Citation Graph (, )][DBLP]

  179. Realtime Simulation of Burning Solids on GPU with CUDA. [Citation Graph (, )][DBLP]

  180. Tibetan Language Speech Recognition Model Based on Active Learning and Semi-Supervised Learning. [Citation Graph (, )][DBLP]

  181. Geomagnetic Precursor Z Component Diurnal Variation Phase Anomaly Recognition based on the Pattern Distance. [Citation Graph (, )][DBLP]

  182. Scaling the iHMM: Parallelization versus Hadoop. [Citation Graph (, )][DBLP]

  183. Stochastic Mirror Descent Algorithm for L1-Regularized Risk Minimizations. [Citation Graph (, )][DBLP]

  184. An Approach on Service Component Selection and Analysis of the Resulting System Reliability. [Citation Graph (, )][DBLP]

  185. MMPI: A Scalable Fault Tolerance Mechanism for MPI Large Scale Parallel Computing. [Citation Graph (, )][DBLP]

  186. Implementation of Non-Pipelined and Pipelined Data Encryption Standard (DES) Using Xilinx Virtex-6 FPGA Technology. [Citation Graph (, )][DBLP]

  187. Testing the Effectiveness of Dynamic Binding in Web Services. [Citation Graph (, )][DBLP]

  188. Realizing Network Enabled Capability Through Dependable Dynamic Systems Integration. [Citation Graph (, )][DBLP]

  189. A P2P e-Commerce Reputation Model Based on Fuzzy Logic. [Citation Graph (, )][DBLP]

  190. DT-Tree: A Semantic Representation of Scientific Papers. [Citation Graph (, )][DBLP]

  191. Noise Robustness Evaluation of Audio Features in Segment Search. [Citation Graph (, )][DBLP]

  192. Context-based Ontology Matching: Concept and Application Cases. [Citation Graph (, )][DBLP]

  193. CCA-Secure Type-based Proxy Re-encryption with Invisible Proxy. [Citation Graph (, )][DBLP]

  194. Classification of Closed Frequent Patterns Improved by Feature Space Transformation. [Citation Graph (, )][DBLP]

  195. Towards Garbage Collection Mechanism for RTSJ-Oriented Embedded Java Processor. [Citation Graph (, )][DBLP]

  196. Power Measurements and Analyses of Massive Object Storage System. [Citation Graph (, )][DBLP]

  197. Scalable and Parallel Implementation of a Financial Application on a GPU: With Focus on Out-of-Core Case. [Citation Graph (, )][DBLP]

  198. Information Security Risk Management Framework for the Cloud Computing Environments. [Citation Graph (, )][DBLP]

  199. Pervasive Service Computing: Visions and Challenges. [Citation Graph (, )][DBLP]

  200. Reasoning for Smart Space Application: Comparing Three Reasoning Engines CLIPS, Jess and Win-prolog. [Citation Graph (, )][DBLP]

  201. User Adaptive Recommendation Model by Using User Clustering based on Decision Tree. [Citation Graph (, )][DBLP]

  202. Co-Locating Virtual Machine Logging and Replay for Recording System Failures. [Citation Graph (, )][DBLP]

  203. Complementary Classification Techniques based Personalized Software Requirements Retrieval with Semantic Ontology and User Feedback. [Citation Graph (, )][DBLP]

  204. Assessing Object-Oriented Software Systems Based on Change Impact Simulation. [Citation Graph (, )][DBLP]

  205. Implementation of x86 Binary-to-C Translator by Using GNU Tools. [Citation Graph (, )][DBLP]

  206. A Tree Based Strategy for Test Data Generation and Cost Calculation for Uniform and Non-Uniform Parametric Values. [Citation Graph (, )][DBLP]

  207. Applying Feature Selection for Effective Classification of Microcalcification Clusters in Mammograms. [Citation Graph (, )][DBLP]

  208. Disparity Adjustment for Local Stereo Matching. [Citation Graph (, )][DBLP]

  209. A Rotate-based Best Neighborhood Matching Algorithm for High Definition Image Error Concealment. [Citation Graph (, )][DBLP]

  210. Local Hybrid Level-set Method for MRA Image Segmentation. [Citation Graph (, )][DBLP]

  211. Research on the Recognition Method of Bridge Target in SAR Image. [Citation Graph (, )][DBLP]

  212. Face Recognition using Layered Linear Discriminant Analysis and Small Subspace. [Citation Graph (, )][DBLP]

  213. Text Detection using Multilayer Separation in Real Scene Images. [Citation Graph (, )][DBLP]

  214. Awareness Program and AI based Tool to Reduce Risk of Phishing Attacks. [Citation Graph (, )][DBLP]

  215. Incremental Emerging Patterns Mining for Identifying Safe and Non-safe Power Load Lines. [Citation Graph (, )][DBLP]

  216. Methods of Pattern Extraction and Interval Prediction for Equipment Maintenance. [Citation Graph (, )][DBLP]

  217. Teachers' and Students' Attitudes Towards Traditional and Computer Assisted Blended Teaching and Learning Processes in Mechanical Engineering Subjects Area. [Citation Graph (, )][DBLP]

  218. Feature Selection of Gene Expression Data Using Regression Model. [Citation Graph (, )][DBLP]

  219. Conceptual Multi-Level Hierarchy for Evaluation and Classification. [Citation Graph (, )][DBLP]

  220. QoS Assessment over Multiple Attributes. [Citation Graph (, )][DBLP]

  221. The Effects of Network Density of a New Counter-based Broadcasting Scheme in Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]

  222. An Energy Efficient Clustering Scheme for Self-Organizing Distributed Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  223. Scalable Orchestration Strategy for Automatic Service Composition. [Citation Graph (, )][DBLP]

  224. Evaluation of Drowsiness During Driving using Electrocardiogram - A Driving Simulation Study. [Citation Graph (, )][DBLP]

  225. A SOA Based Approach to User-Oriented System Migration. [Citation Graph (, )][DBLP]

  226. Towards Exhibiting Ability of Service Communication Models. [Citation Graph (, )][DBLP]

  227. Experimenting Scheduling Policies with Continuation-based Services. [Citation Graph (, )][DBLP]

  228. Using Chemical Metaphor to Express Workflow and Service Orchestration. [Citation Graph (, )][DBLP]

  229. A Key Management Scheme for Multicast Based on Layer 2 Control. [Citation Graph (, )][DBLP]

  230. Selective and Heterogeneous SVM Ensemble for Demand Forecasting. [Citation Graph (, )][DBLP]

  231. Performance Comparison of Category 5e vs. Category 6 Cabling Systems for both IPv4 and IPv6 in Gigabit Ethernet. [Citation Graph (, )][DBLP]

  232. Adding Standards Based Job Submission to a Commodity Grid Broker. [Citation Graph (, )][DBLP]

  233. Semantic Service Discovery Exploiting Efficient Concept Match over Large Amount of Heterogeneous Ontologies. [Citation Graph (, )][DBLP]

  234. SRCP: Sensor Reliability and Congestion Control Protocol. [Citation Graph (, )][DBLP]

  235. A Novel Adaptive FEC Scheme Integrating Multi-Layer Functions. [Citation Graph (, )][DBLP]

  236. A Lossless Data Hiding based on Discrete Haar Wavelet Transform. [Citation Graph (, )][DBLP]

  237. Methods of Improving Communications by a Life-Like Animated Pedagogical Agent. [Citation Graph (, )][DBLP]

  238. Researching on Simulation of Traffic Accidents Scene by OpenGL. [Citation Graph (, )][DBLP]

  239. A Tracking Model for Enhancing Social Video Integration and Sharing. [Citation Graph (, )][DBLP]

  240. An Efficient Multi Recipient Signcryption Scheme Offering Non Repudiation. [Citation Graph (, )][DBLP]

  241. Modifed Re-sampling Based Particle Filter for Visual Tracking with MPH. [Citation Graph (, )][DBLP]

  242. Text Detection in Binarized Text Images of Korean Signboard by Stroke Width Feature. [Citation Graph (, )][DBLP]

  243. Exploiting Context in Location-Based Information Systems. [Citation Graph (, )][DBLP]

  244. Automatic Segmentation for Breast Skin-line. [Citation Graph (, )][DBLP]

  245. A Novel Two-Server Password Authentication Scheme with Provable Security. [Citation Graph (, )][DBLP]

  246. Improved Kerberos Security Protocol Evaluation using Modified BAN Logic. [Citation Graph (, )][DBLP]

  247. Static, Dynamic and Incremental MAC Combined Approach for Storage Integrity Protection. [Citation Graph (, )][DBLP]

  248. Information Flow Analysis of Web Service Net. [Citation Graph (, )][DBLP]

  249. Cluster-based Cooperative Back Propagation Network Approach for Intrusion Detection in MANET. [Citation Graph (, )][DBLP]

  250. TMN-tree: New Trajectory Index Structure for Moving Objects in Spatial Networks. [Citation Graph (, )][DBLP]

  251. Group-Based Prime Number Labeling Scheme for XML Data. [Citation Graph (, )][DBLP]

  252. An Information Extraction Method for Digitized Textbooks of Traditional Chinese Medicine. [Citation Graph (, )][DBLP]

  253. Using Significant Classification Rules to Analyze Korean Customers' Power Consumption Behavior: Incremental Tree Induction using Cascading-and-Sharing Method. [Citation Graph (, )][DBLP]

  254. Transitive Association Rule Discovery by Considering Strategic Importance. [Citation Graph (, )][DBLP]

  255. Algorithms for Data Retrieval from Online Social Network Graphs. [Citation Graph (, )][DBLP]

  256. Wearable Video Retrieval and Navigation System using GPS Data. [Citation Graph (, )][DBLP]

  257. Gait Symmetry Analysis Based on Affinity Propagation Clustering. [Citation Graph (, )][DBLP]

  258. Studying Filter Cache Bypassing on Embedded Systems. [Citation Graph (, )][DBLP]

  259. SEPL: Smart Evicted Page List Buffer for NAND Flash Storage System. [Citation Graph (, )][DBLP]

  260. CSDA: An Adaptive Data Storage Strategy for Predictive Branch Path on Multi-Core Architecture. [Citation Graph (, )][DBLP]

  261. Touchware: A Software based Implementation for High Resolution Multi-touch Applications. [Citation Graph (, )][DBLP]

  262. SAT: A Stream Architecture Template for Embedded Applications. [Citation Graph (, )][DBLP]

  263. Flexible Static Scheduling of Software with Logical Execution Time Constraints. [Citation Graph (, )][DBLP]

  264. Efficient PC-FPGA Communication over Gigabit Ethernet. [Citation Graph (, )][DBLP]

  265. Towards Free Task Overloading in Passive Replication Based Real-time Multiprocessors. [Citation Graph (, )][DBLP]

  266. Real-time Adaptation and Load Balancing Aware OS Services for Distributed Reconfigurable System on Chip. [Citation Graph (, )][DBLP]

  267. A Sufficient Condition for Rate Monotonic Schedulability Based on Response Time Analysis. [Citation Graph (, )][DBLP]

  268. Performance and Power Consumption Analysis of DVFS-Enabled H.264 Decoder on Heterogeneous Multi-Core Platform. [Citation Graph (, )][DBLP]

  269. Locality and Duplication-Aware Garbage Collection for Flash Memory-Based Virtual Memory Systems. [Citation Graph (, )][DBLP]

  270. Guaranteeing Optional Task Completions on (m, k)-Firm Real-Time Systems. [Citation Graph (, )][DBLP]

  271. Hybrid of Job Sequencing and DVFS for Peak Temperature Reduction with Nondeterministic Applications. [Citation Graph (, )][DBLP]

  272. A Bypass Optimization Method for Network on Chip. [Citation Graph (, )][DBLP]

  273. Adaptive Router Architecture for Optimising Quality of Service in Networks-on-Chip. [Citation Graph (, )][DBLP]

  274. Leakage Aware Scheduling on Maximum Temperature Minimization for Periodic Hard Real-Time Systems. [Citation Graph (, )][DBLP]

  275. Leakage-Aware Scheduling for Real-Time Systems with (m, k)-Constraints. [Citation Graph (, )][DBLP]

  276. Global Register Alias Table: Executing Sequential Program on Multi-Core. [Citation Graph (, )][DBLP]

  277. Combining Behavioural Real-time Software Modelling with the OSCI TLM-2.0 Communication Standard. [Citation Graph (, )][DBLP]

  278. Predicting Events for the Simulation of Hybrid Systems. [Citation Graph (, )][DBLP]

  279. Dynamic Workload Prediction for Soft Real-Time Applications. [Citation Graph (, )][DBLP]

  280. Dynamic Resource Provision in Multi-Channel P2P Live Streaming Systems. [Citation Graph (, )][DBLP]

  281. Timely Recovery from Task Failures in Non-preemptive, Deadline-driven Schedulers. [Citation Graph (, )][DBLP]

  282. Mixed-Criticality Real-Time Scheduling for Multicore Systems. [Citation Graph (, )][DBLP]

  283. R-BATCH: Task Partitioning for Fault-tolerant Multiprocessor Real-Time Systems. [Citation Graph (, )][DBLP]

  284. SESAM: An MPSoC Simulation Environment for Dynamic Application Processing. [Citation Graph (, )][DBLP]

  285. Model-Level Debugging of Embedded Real-Time Systems. [Citation Graph (, )][DBLP]

  286. Combining Target-independent Analysis with Dynamic Profiling to Build the Performance Model of a DSP. [Citation Graph (, )][DBLP]

  287. Introducing Hardware-in-Loop Concept to the Hardware/Software Co-design of Real-time Embedded Systems. [Citation Graph (, )][DBLP]

  288. A Model Checking Approach for Multi-core Time Partitions Design. [Citation Graph (, )][DBLP]

  289. Superblock-Based Source Code Optimizations for WCET Reduction. [Citation Graph (, )][DBLP]

  290. Coverage and Profiling for Real-Time Tiny Kernels. [Citation Graph (, )][DBLP]

  291. Timing Analysis and Optimization of FlexRay Dynamic Segment. [Citation Graph (, )][DBLP]

  292. Towards a Generic Design Space Exploration Framework. [Citation Graph (, )][DBLP]

  293. Reorganizing Data Blocks in Flash Memory by Program Translation. [Citation Graph (, )][DBLP]

  294. Response Time Analysis of the Abort-and-Restart Model under Symmetric Multiprocessing. [Citation Graph (, )][DBLP]

  295. Achieving Scalable Privacy Preserving Data Aggregation for Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  296. Virtual Machine for Software Defined Radio: Evaluating the Software VM Approach. [Citation Graph (, )][DBLP]

  297. Real-time Non-invasive Detection of Timing-constraint Violations in Time-triggered Embedded Systems. [Citation Graph (, )][DBLP]

  298. Dynamic Priority Assignment Scheme for Contract-Based Resource Management. [Citation Graph (, )][DBLP]

  299. An Algorithm of Micromouse Maze Solving. [Citation Graph (, )][DBLP]

  300. The Research on Teaching Method of Basics Course of Computer based on Cluster Analysis. [Citation Graph (, )][DBLP]

  301. Study on the Industry Oriented Education for Computing of Ireland and Its Application. [Citation Graph (, )][DBLP]

  302. Teaching Practice of Project-based VB Programming. [Citation Graph (, )][DBLP]

  303. Research on J2EE Teaching Based on Mainstream Open Source Frameworks. [Citation Graph (, )][DBLP]

  304. Research and Reformation of Online Practice Oriented Teaching in Programming Foundation Course. [Citation Graph (, )][DBLP]

  305. Construction of Role-Switch Model in College Information Technology Experiment Course. [Citation Graph (, )][DBLP]

  306. Applying Role-Switch Model in College Information Technology Course. [Citation Graph (, )][DBLP]

  307. Research and Practice on Constructing the Course of Programming Language. [Citation Graph (, )][DBLP]

  308. A Software Architecture for Adapating Virtual Reality Content to Mobile Devices. [Citation Graph (, )][DBLP]

  309. Design and Implementation of Smartphone's Efficient E-mail Client Software. [Citation Graph (, )][DBLP]

  310. Mobile Payment based on RFID-SIM Card. [Citation Graph (, )][DBLP]

  311. xFace: A Lightweight Web Application Engine on Multiple Mobile Platforms. [Citation Graph (, )][DBLP]

  312. Research on Mobile Web Applications End to End Technology. [Citation Graph (, )][DBLP]

  313. Decompression Method for Massive Compressed Files in Mobile Rich Media Applications. [Citation Graph (, )][DBLP]

  314. Component-based Mobile Web Application of Cross-platform. [Citation Graph (, )][DBLP]

  315. Research on Mobile Web Application Phone Simulator. [Citation Graph (, )][DBLP]

  316. The Coal Mining Safety Equipment's Intelligent Monitoring and Management of Being based on the Web-environment. [Citation Graph (, )][DBLP]

  317. A Learning Spectrum Hole Prediction Model for Cognitive Radio Systems. [Citation Graph (, )][DBLP]

  318. CFCSS without Aliasing for SPARC Architecture. [Citation Graph (, )][DBLP]

  319. Research on Case Learning System for Engineering Subject - Software Engineering as an Example. [Citation Graph (, )][DBLP]

  320. Industry/University Collaboration: An Effective Way to Conduct Engineering Education Towards Undergraduates. [Citation Graph (, )][DBLP]

  321. Applying Two New Methods to the Teaching of Computer Architecture. [Citation Graph (, )][DBLP]

  322. Technical Research of Streaming Media Video Course Development Platform. [Citation Graph (, )][DBLP]

  323. Discussion on the Teaching Reform of Single-chip Computer Base on Mode CDIO at Vocational College. [Citation Graph (, )][DBLP]

  324. Study on Evaluation Method of Practical Teaching: A Practical Teaching Test Analysis. [Citation Graph (, )][DBLP]

  325. Improvement of the Optimal Hamilton Circuit for Undirected Complete Graph. [Citation Graph (, )][DBLP]

  326. Non-recursive Algorithm of Tower of Hanoi Problem. [Citation Graph (, )][DBLP]

  327. Optimized Application and Practice of A* Algorithm in Game Map Path-Finding. [Citation Graph (, )][DBLP]

  328. Remainder Sign Analysis in Fixed-point Division. [Citation Graph (, )][DBLP]

  329. The Strategy of Advancing Mobile Web Application's Layout and Drawing. [Citation Graph (, )][DBLP]

  330. Caching Strategy on Mobile Rich Media Engine. [Citation Graph (, )][DBLP]

  331. Porting Mobile Web Application Engine to the Android Platform. [Citation Graph (, )][DBLP]

  332. The Development of Online Innovative Education Program in Our University. [Citation Graph (, )][DBLP]

  333. Research and Practice of Experimental Teaching System for OPhone Technology Courses. [Citation Graph (, )][DBLP]

  334. Exploration on Cultivating OPhone Technology Talents in Universities. [Citation Graph (, )][DBLP]

  335. Micromouse Competition Training Method Based on 3D Simulation Platform. [Citation Graph (, )][DBLP]

  336. Smartphone Software Development Course Design Based on Android. [Citation Graph (, )][DBLP]

  337. ISTS: An Integrated Simulation Training System for Education in Police College. [Citation Graph (, )][DBLP]

  338. Promoting Multi-Core Education via Special Training and Workshop Program. [Citation Graph (, )][DBLP]

  339. Application of Concept Maps-based Anchored Instruction in Programming Course. [Citation Graph (, )][DBLP]

  340. Reform and Practice in the Course ???The Principle of Computer Organization???. [Citation Graph (, )][DBLP]

  341. Reform and Practice of Programming Teaching Based on Applied Ability Building. [Citation Graph (, )][DBLP]

  342. Design of Teaching System for Computer Network Application Learning. [Citation Graph (, )][DBLP]

  343. Centralized Project-Based Teaching Approach in Database Application Development Training. [Citation Graph (, )][DBLP]

  344. The Curriculum Reform of Database System Principle Based on Paperless Examination Platform. [Citation Graph (, )][DBLP]

  345. Research on Key Technologies of Building Home Control Based on the Wireless Network. [Citation Graph (, )][DBLP]

  346. An Innovative Course about Network Storage and System Virtualization Technologies in PKU. [Citation Graph (, )][DBLP]

  347. Research on PID Control Algorithm of BP Network based on Two Axis Digital Control Turntable. [Citation Graph (, )][DBLP]

  348. The Research and Application of ???PBL Didactics??? in the Computer Network Technology Course. [Citation Graph (, )][DBLP]

  349. Implementation of Virtual Machine Monitor for ARM Architecture. [Citation Graph (, )][DBLP]

  350. Virtual I/O Based on ScratchPad Memory for Embedded System. [Citation Graph (, )][DBLP]

  351. A Virtual Timing Device for Program Performance Analysis. [Citation Graph (, )][DBLP]

  352. Cache Effects of Virtual Machine Placement on Multi-Core Processors. [Citation Graph (, )][DBLP]

  353. I/O Virtualization Architecture for Security. [Citation Graph (, )][DBLP]

  354. Detecting and Analyzing VM-exits. [Citation Graph (, )][DBLP]

  355. Data Hiding in Virtual Machine Disk Images. [Citation Graph (, )][DBLP]

  356. A Dynamic Binary Translation Framework Based on Page Fault Mechanism in Linux Kernel. [Citation Graph (, )][DBLP]

  357. Sorena: New on Chip Network Topology Featuring Efficient Mapping and Simple Deadlock Free Routing Algorithm. [Citation Graph (, )][DBLP]

  358. Augmenting NoC with Naming Service for Slot-based Reconfigurable Devices on Chip. [Citation Graph (, )][DBLP]

  359. Sparse Matrix-Vector Multiplication Based on Network-on-Chip in FPGA. [Citation Graph (, )][DBLP]

  360. A New Specification-based Test Data Generation Strategy for OSEK OS. [Citation Graph (, )][DBLP]

  361. Project-Oriented Laboratory with Cross Platform Software Programming for Embedded System Education. [Citation Graph (, )][DBLP]

  362. PUF-based Encryption Processor for the RFID Systems. [Citation Graph (, )][DBLP]

  363. Design and Implementation of a Heterogeneous High-performance Computing Framework using Dynamic and Partial Reconfigurable FPGAs. [Citation Graph (, )][DBLP]

  364. A Rectangle-Intersection Algorithm with Limited Resource Requirements. [Citation Graph (, )][DBLP]

  365. Towards a Cyber-Physical Architecture for Industrial Systems via Real-Time Java Technology. [Citation Graph (, )][DBLP]

  366. A Time-Triggered Communication Protocol for CAN-based Networks with a Fault-Tolerant Star Topology. [Citation Graph (, )][DBLP]

  367. Scheduling Approach for Static Segment using Hybrid Genetic Algorithm in FlexRay Systems. [Citation Graph (, )][DBLP]

  368. Interpretation of AADL Behavior Annex into Synchronous Formalism Using SSA. [Citation Graph (, )][DBLP]

  369. Integer Promotion Elimination on Abstract Syntax Tree. [Citation Graph (, )][DBLP]

  370. Separating Functional and Dependability Requirements of Embedded Systems. [Citation Graph (, )][DBLP]

  371. Towards Estimating Physical Properties of Embedded Systems using Software Quality Metrics. [Citation Graph (, )][DBLP]

  372. FPGA-based Implementation of Efficient Sample Rate Conversion for Software Defined Radios. [Citation Graph (, )][DBLP]

  373. Implementing Medical CT Algorithms on Stand-alone FPGA Based Systems Using an Efficient Workflow with SysGen and Simulink. [Citation Graph (, )][DBLP]

  374. Tour-Guide: Providing Location-Based Tourist Information on Mobile Phones. [Citation Graph (, )][DBLP]

  375. A Pervasive Temporal Error Concealment Algorithm for H.264/AVC Decoder. [Citation Graph (, )][DBLP]

  376. An Extensible Hash Function Construction Based on Embedded Chaos Maps. [Citation Graph (, )][DBLP]

  377. Embedded Implementation of a SIP Server Gateway with Forward Error Correction to a Mobile Network. [Citation Graph (, )][DBLP]

  378. Android on Mobile Devices: An Energy Perspective. [Citation Graph (, )][DBLP]

  379. The Embedded Application of Wireless Short-distance Communication Technology in Vehicle Diagnosis Process. [Citation Graph (, )][DBLP]

  380. Low Effort Evaluation of Real-Time and Reliability Requirements for Embedded Systems. [Citation Graph (, )][DBLP]

  381. A Novel Power Tuning Anchors Localization Algorithm for Mobile Wireless Sensor Nodes. [Citation Graph (, )][DBLP]

  382. Private and Secure Service Discovery Using Incrementally Progressive Exposure and Random Match. [Citation Graph (, )][DBLP]

  383. EBDA: An Effective Bottom-up Discretization Algorithm for Continuous Attributes. [Citation Graph (, )][DBLP]

  384. A New Sensitive Data Aggregation Scheme for Protecting Integrity in Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  385. Robust H.264/AVC Video Transmission using Data Partitioning and Unequal Loss Protection. [Citation Graph (, )][DBLP]

  386. Dynamic Load Balancing in Parallel KD-Tree k-Means. [Citation Graph (, )][DBLP]

  387. System Design of a Super-Peer Network for Content-Based Image Retrieval. [Citation Graph (, )][DBLP]

  388. A Hierachical VoIP System Based on Peer-to-Peer SIP: A Manageable Approach. [Citation Graph (, )][DBLP]

  389. A Rental-Based Approach in a Cluster or a Grid Environment. [Citation Graph (, )][DBLP]

  390. A Novel Approach for Finding Candidate Locations for Online FPGA Placement. [Citation Graph (, )][DBLP]

  391. Network Main Memory Architecture for NoC-Based Chips. [Citation Graph (, )][DBLP]

  392. A Framework for Sharing Heterogeneous Grid Resources in a Campus Environment. [Citation Graph (, )][DBLP]

  393. Understanding Resource Provisioning for [Citation Graph (, )][DBLP]

  394. An Extended SNMP-based Management of Digital Convergence Devices. [Citation Graph (, )][DBLP]

  395. Collusion Detection and Prevention with FIRE+ Trust and Reputation Model. [Citation Graph (, )][DBLP]

  396. On the Study of Radio Resource Allocation of Heterogeneous Services with Soft QoS Traffics in OFDMA-based Wireless Networks. [Citation Graph (, )][DBLP]

  397. Queue Analysis of Finite Buffer for Self-Similar Traffic in Three-node Cooperative Relay Wireless Networks. [Citation Graph (, )][DBLP]

  398. Bargaining Game and Cross-layer Design Based Optimization Strategy in Wireless Multi-hop Network. [Citation Graph (, )][DBLP]

  399. Research on Performance Estimation Model of Distributed Network Simulation Based on PDNS Conservative Synchronization Mechanism in Complex Environment. [Citation Graph (, )][DBLP]

  400. Investigation of PHY, MAC and APP Layers for Adaptive and Cross-Layer Optimization in IEEE802.11 WLAN. [Citation Graph (, )][DBLP]

  401. An Efficient VoD Scheme Providing Service Continuity for Mobile IPTV in Heterogeneous Networks. [Citation Graph (, )][DBLP]

  402. Multi-Phase Correlator-based Realistic Clock Synchronization for Wireless Networks on IEEE 802.15.4. [Citation Graph (, )][DBLP]

  403. Implementation of a PTP Bridge to Extend IEEE 1588 to Zigbee Networks. [Citation Graph (, )][DBLP]

  404. P2P-TV Service and User Characterization. [Citation Graph (, )][DBLP]

  405. A Novel Routing Algorithm for Achieving Static Fault-Tolerance in 2-D Meshes. [Citation Graph (, )][DBLP]

  406. SAFE: A Secure Area of Interests Filter for P2P-based MMOGs. [Citation Graph (, )][DBLP]

  407. Implementation and Performance for Lawful Intercept of VoIP Calls based on SIP Session Border Controller. [Citation Graph (, )][DBLP]

  408. Prediction Model for Tiered Accuracy Requirements in Large-scale Object Tracking Sensor Networks. [Citation Graph (, )][DBLP]

  409. Cross-layer Design for Multiuser OFDMA Systems with Cooperative Game and MMPP Queuing Considerations. [Citation Graph (, )][DBLP]

  410. Performance Analysis of Secondary Users in Dynamic Spectrum Access under Interference Temperature Constraints. [Citation Graph (, )][DBLP]

  411. A New Link Lifetime Prediction Method for Greedy and Contention-based Routing in Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]

  412. Fair Early Drop: An Active Queue Management Scheme for the Control of Unresponsive Flows. [Citation Graph (, )][DBLP]

  413. A New Approach in Improving Operational Efficiency of Wireless Response System. [Citation Graph (, )][DBLP]

  414. Performance of Structure Based Multicast Routing Protocols in Wireless Ad hoc Networks. [Citation Graph (, )][DBLP]

  415. Impacts of Inaccurate Information on Resource Allocation for Multi-Core Embedded Systems. [Citation Graph (, )][DBLP]

  416. On Post-Generation Data Operations in Secure Distributed Storage Systems with Internal Padding. [Citation Graph (, )][DBLP]

  417. Distributed Lock Manager for Distributed File System in Shared-Disk Environment. [Citation Graph (, )][DBLP]

  418. An Asymmetric Data Conversion Scheme based on Binary Tags. [Citation Graph (, )][DBLP]

  419. A Synthesized Data Mining Algorithm Based on Clustering and Decision Tree. [Citation Graph (, )][DBLP]

  420. Hybrid OpenCL: Connecting Different OpenCL Implementations over Network. [Citation Graph (, )][DBLP]

  421. SAMR: A Self-adaptive MapReduce Scheduling Algorithm in Heterogeneous Environment. [Citation Graph (, )][DBLP]

  422. A Framework for Performance Evaluation of Large-scale Interactive Distributed Virtual Environments. [Citation Graph (, )][DBLP]

  423. Service Level Agreements in a Rental-based System. [Citation Graph (, )][DBLP]

  424. Distributed On-Chip Operating System for Network on Chip. [Citation Graph (, )][DBLP]

  425. Dynamic Reconfigurable Networks in NoC for I/O Supported Parallel Applications. [Citation Graph (, )][DBLP]

  426. Predictive and Dynamic Resource Allocation for Enterprise Applications. [Citation Graph (, )][DBLP]

  427. Spectrum Usage Prediction Based on High-order Markov Model for Cognitive Radio Networks. [Citation Graph (, )][DBLP]

  428. Synchronization in Wireless Local Area Networks for Practical MIMO OFDM systems. [Citation Graph (, )][DBLP]

  429. Impact of Scatterer Density on the Performances of Double-Scattering MIMO Channels. [Citation Graph (, )][DBLP]

  430. Minimum Node Degree and Connectivity of Two-dimensional MANETs under Random Waypoint Mobility Model. [Citation Graph (, )][DBLP]

  431. Semantic Video Adaptation using a Preprocessing Method for Mobile Environment. [Citation Graph (, )][DBLP]

  432. An Efficient Collaborative Traceback Scheme Based on Packet Digests Logging. [Citation Graph (, )][DBLP]

  433. An Efficient Group Signature Scheme in Ferry-Based Delay-Tolerant Networks. [Citation Graph (, )][DBLP]

  434. The Research of Component-Based Dependable Software Development. [Citation Graph (, )][DBLP]

  435. Mix-zones Deployment for Location Privacy Preservation in Vehicular Communications. [Citation Graph (, )][DBLP]

  436. Privacy-preserving Data Aggregation Based on the P-function Set in Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  437. A Distributed Query Protocol for Continuous Privacy Preserving in Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  438. Towards Detecting the Interaction Vulnerabilities in Large Distributed System. [Citation Graph (, )][DBLP]

  439. Analyzing and Correlating Security Events Using State Machine. [Citation Graph (, )][DBLP]

  440. Reliable Hybrid Service Discovery Protocol in Mobile Ad-Hoc Grid. [Citation Graph (, )][DBLP]

  441. Query-based Energy-aware Protocol for Real-time Routing in Wireless Sensor Network. [Citation Graph (, )][DBLP]

  442. Model Checking of a Target Tracking Protocol for Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  443. Context-awareness in Battlefield using Ubiquitous Computing: Network Centric Warfare. [Citation Graph (, )][DBLP]

  444. An Extensible Sensor based Inferencing Framework for Context Aware Applications. [Citation Graph (, )][DBLP]

  445. Efficient Localized Detection of Erroneous Nodes (ELDEN). [Citation Graph (, )][DBLP]

  446. Tessellating Cell Shapes for Geographical Clustering. [Citation Graph (, )][DBLP]

  447. A Reconfigurable Processor Architecture Combining Multi-core and Reconfigurable Processing Unit. [Citation Graph (, )][DBLP]

  448. Tree-Based Task Scheduling Model and Dynamic Load-Balancing Algorithm for P2P Computing. [Citation Graph (, )][DBLP]

  449. Evaluating the Performance and Accuracy Impact of Trace Generation to the BigSim Emulator. [Citation Graph (, )][DBLP]

  450. A Study on XML and Ontology-based Web Data Integration. [Citation Graph (, )][DBLP]

  451. iLife: A Novel Mobile Social Network Services on Mobile Phones. [Citation Graph (, )][DBLP]

  452. Consistency Aware Dead Reckoning Threshold Tuning with Server Assistance in Client-Server-Based DVEs. [Citation Graph (, )][DBLP]

  453. Comparative Performance Evaluation of Non-Contiguous Allocation Algorithms in 2D Mesh-Connected Multicomputers. [Citation Graph (, )][DBLP]

  454. Minimization Algorithm of Unate Logic Functions. [Citation Graph (, )][DBLP]

  455. cCell: A S2S Compiler with Profiling Support for the Cell BE Architecture. [Citation Graph (, )][DBLP]

  456. Cross Comparison on C Compilers' Reliability Impact on UNIX Based Fedora OS. [Citation Graph (, )][DBLP]

  457. Toward an Automatic Load Balanced Distribution Model in Conjugate Gradient Method for One-Dimensional One-Phase Oil Reservoir Simulation. [Citation Graph (, )][DBLP]

  458. A Federated Broker Architecture for Large Scale Context Dissemination. [Citation Graph (, )][DBLP]

  459. User Centred Mobile Aided Learning System: Student Response System (SRS). [Citation Graph (, )][DBLP]

  460. A Scalable, Bidirectional-Based Search Strategy to Generate Attack Graphs. [Citation Graph (, )][DBLP]

  461. An Efficient Search Mechanism in Unstructured P2P Networks Based on Semantic Group. [Citation Graph (, )][DBLP]

System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002