The SCEAS System
Navigation Menu

Conferences in DBLP

ACS/IEEE International Conference on Computer Systems and Applications (aiccsa)
2008 (conf/aiccsa/2008)


  1. A multipattern matching algorithm using sampling and bit index. [Citation Graph (, )][DBLP]


  2. An evolutionary gait generator with online parameter adjustment for humanoid robots. [Citation Graph (, )][DBLP]


  3. Solving MEC model of haplotype reconstruction using information fusion, single greedy and parallel clustering approaches. [Citation Graph (, )][DBLP]


  4. Methodology for evaluating string matching algorithms on multiprocessor. [Citation Graph (, )][DBLP]


  5. RBT-I: A novel approach for solving the Multiple Sequence Alignment problem. [Citation Graph (, )][DBLP]


  6. A framework for predicting proteins 3D structures. [Citation Graph (, )][DBLP]


  7. Comparison of population based metaheuristics for feature selection: Application to microarray data classification. [Citation Graph (, )][DBLP]


  8. Transistor-level based defect tolerance for reliable nanoelectronics. [Citation Graph (, )][DBLP]


  9. Proposing an efficient method to estimate and reduce crosstalk after placement in VLSI circuits. [Citation Graph (, )][DBLP]


  10. A low power crosstalk-free bus encoding using genetic algorithm. [Citation Graph (, )][DBLP]


  11. A variable step-size FxLMS algorithm for feedforward active noise control systems based on a new online secondary path modelling technique. [Citation Graph (, )][DBLP]


  12. High performance elliptic curve point operations with pipelined GF(2m) field multiplier. [Citation Graph (, )][DBLP]


  13. Hardware based algorithm for conflict diagnosis in SAT solver. [Citation Graph (, )][DBLP]


  14. Performance modeling of partially reconfigurable computing systems. [Citation Graph (, )][DBLP]


  15. A flash translation layer for huge-capacity flash memory storage systems. [Citation Graph (, )][DBLP]


  16. Intelligent heart disease prediction system using data mining techniques. [Citation Graph (, )][DBLP]


  17. DMPML Data Mining Preparation Markup Language. [Citation Graph (, )][DBLP]


  18. Enumeration of maximal clique for mining spatial co-location patterns. [Citation Graph (, )][DBLP]


  19. A methodology for discovering spatial co-location patterns. [Citation Graph (, )][DBLP]


  20. A cellular automata approach to detecting concept drift and dealing with noise. [Citation Graph (, )][DBLP]


  21. Rapid and robust ranking of text documents in a dynamically changing corpus. [Citation Graph (, )][DBLP]


  22. Concept-based clustering of textual documents using SOM. [Citation Graph (, )][DBLP]


  23. When serializability comes without cost. [Citation Graph (, )][DBLP]


  24. Mining fault tolerant frequent patterns using pattern growth approach. [Citation Graph (, )][DBLP]


  25. Practical inter-stock dependency indicators using time series and derivatives. [Citation Graph (, )][DBLP]


  26. Effects of dimensionality reduction techniques on time series similarity measurements. [Citation Graph (, )][DBLP]


  27. Using sensitivity of a bayesian network to discover interesting patterns. [Citation Graph (, )][DBLP]


  28. Detecting high-value individuals in covert networks: 7/7 London bombing case study. [Citation Graph (, )][DBLP]


  29. Providing QoS guarantees to multiple classes of traffic in wireless sensor networks. [Citation Graph (, )][DBLP]


  30. An energy efficient data reporting scheme for wireless sensor networks. [Citation Graph (, )][DBLP]


  31. Enhancing AODV routing protocol using mobility parameters in VANET. [Citation Graph (, )][DBLP]


  32. Measured delay distribution in a Wireless Mesh Network test-bed. [Citation Graph (, )][DBLP]


  33. An evolutionary node architecture and performance optimization. [Citation Graph (, )][DBLP]


  34. TCPBridge: A software approach to establish direct communications for NAT hosts. [Citation Graph (, )][DBLP]


  35. Towards scalable and reliable Grid Networks. [Citation Graph (, )][DBLP]


  36. Aspect-oriented formal specification for multimedia systems. [Citation Graph (, )][DBLP]


  37. Workflow scheduling in computational grids: Opportunistic vs. planned. [Citation Graph (, )][DBLP]


  38. Energy aware routing in high capacity overlays in wireless sensor networks. [Citation Graph (, )][DBLP]


  39. A new level based clustering scheme for wireless sensor networks. [Citation Graph (, )][DBLP]


  40. EEMR: An energy-efficient multi-hop routing protocol for wireless sensor networks. [Citation Graph (, )][DBLP]


  41. Energy assignment in wireless sensor networks with hierarchical cluster-based routing. [Citation Graph (, )][DBLP]


  42. Using input/output queues to increase LDPC decoder performance. [Citation Graph (, )][DBLP]


  43. Capacity analysis of MIMO system over Nakagami-m fading channels using Finite Mixture with Expectation Maximization algorithm. [Citation Graph (, )][DBLP]


  44. Impact of fading wireless channel on the performance of game theoretic power control algorithms for CDMA wireless data. [Citation Graph (, )][DBLP]


  45. Slow antenna selection and fast link adaptation MIMO systems. [Citation Graph (, )][DBLP]


  46. SLA-based dynamic resource management in wireless environments. [Citation Graph (, )][DBLP]


  47. Enhanced mobile node's reachability through anycasting for MIPv6 regional registrations. [Citation Graph (, )][DBLP]


  48. Self-localization based on improved subspace approach in wireless sensor network. [Citation Graph (, )][DBLP]


  49. Avoiding virtual link attacks in wireless ad hoc networks. [Citation Graph (, )][DBLP]


  50. Network provisioning over IP networks with call admission control schemes. [Citation Graph (, )][DBLP]


  51. Performance evaluation of TCP handoffs over mobile IP connections. [Citation Graph (, )][DBLP]


  52. Handover and class-based Call Admission Control policy for 4G-heterogeneous mobile networks. [Citation Graph (, )][DBLP]


  53. Processing-delay reduction during the vertical handoff decision in heterogeneous wireless systems. [Citation Graph (, )][DBLP]


  54. Wireless Fair Queuing algorithm for window-based Link Level Retransmission. [Citation Graph (, )][DBLP]


  55. On the performance of a simple packet rate estimator. [Citation Graph (, )][DBLP]


  56. A critical assessment for RINEX data from OS NET for GPS accuracy improvement. [Citation Graph (, )][DBLP]


  57. Voronoi path planning technique for recovering communication in UAVs. [Citation Graph (, )][DBLP]


  58. A scalable P2P model for optimizing application layer multicast. [Citation Graph (, )][DBLP]


  59. A dynamic weighted data replication strategy in data grids. [Citation Graph (, )][DBLP]


  60. Commodity resource pricing in dynamic computational grids. [Citation Graph (, )][DBLP]


  61. OTSX: An extended transaction service in support of FT-CORBA standard. [Citation Graph (, )][DBLP]


  62. Performance enhancement through hybrid replication and Genetic Algorithm co-scheduling in data grids. [Citation Graph (, )][DBLP]


  63. A new, efficient coordinated checkpointing protocol combined with selective sender-based message logging. [Citation Graph (, )][DBLP]


  64. Comparative performance evaluation of software-based fault-tolerant routing algorithms in adaptively-routed tori. [Citation Graph (, )][DBLP]


  65. Dynamic scheduling of periodic skippable tasks in an overloaded real-time system. [Citation Graph (, )][DBLP]


  66. Slack-based global multiprocessor scheduling of aperiodic tasks in parallel embedded real-time systems. [Citation Graph (, )][DBLP]


  67. Electing a leader in the local computation model using mobile agents. [Citation Graph (, )][DBLP]


  68. Mapping task graphs onto Network Processors using genetic algorithm. [Citation Graph (, )][DBLP]


  69. Real-time implementation of an efficient RLS algorithm based on IIR filter for acoustic echo cancellation. [Citation Graph (, )][DBLP]


  70. Far-field continuous speech recognition system based on speaker Localization and sub-band Beamforming. [Citation Graph (, )][DBLP]


  71. A model order based sinusoid representation for audio signals. [Citation Graph (, )][DBLP]


  72. A new robust adaptive beamformer for enhancing speech corrupted with colored noise. [Citation Graph (, )][DBLP]


  73. A new approach for iris localization in iris recognition systems. [Citation Graph (, )][DBLP]


  74. Cooperative criminal face recognition in distributed web environment. [Citation Graph (, )][DBLP]


  75. Fingerprint verification based on core point neighbourhoods minutiae. [Citation Graph (, )][DBLP]


  76. Personal authentication based on iris texture analysis. [Citation Graph (, )][DBLP]


  77. A fuzzy similarity approach for automated spam filtering. [Citation Graph (, )][DBLP]


  78. An agent-based clustering algorithm using potential fields. [Citation Graph (, )][DBLP]


  79. A fuzzy clustering algorithm for finding arbitrary shaped clusters. [Citation Graph (, )][DBLP]


  80. Supervised texture classification using several features extraction techniques based on ANN and SVM. [Citation Graph (, )][DBLP]


  81. Semantic-based image retrieval: A fuzzy modeling approach. [Citation Graph (, )][DBLP]


  82. Writer identification using edge-based directional probability distribution features for arabic words. [Citation Graph (, )][DBLP]


  83. Redundant watermarking using wavelet packets. [Citation Graph (, )][DBLP]


  84. A video-based image processing system for the automatic implementation of the eye involuntary reflexes measurements involved in the Drug Recognition Expert (DRE). [Citation Graph (, )][DBLP]


  85. Numeral recognition using curvelet transform. [Citation Graph (, )][DBLP]


  86. ALSD: An algorithm for noise erasure and structural information recovery for surfaces with structural discontinuities. [Citation Graph (, )][DBLP]


  87. A similarity-window based background estimation approach. [Citation Graph (, )][DBLP]


  88. Active contours initialization for ultrasound carotid artery images. [Citation Graph (, )][DBLP]


  89. Core point detection using improved segmentation and orientation. [Citation Graph (, )][DBLP]


  90. Privacy preserving ID3 using Gini Index over horizontally partitioned data. [Citation Graph (, )][DBLP]


  91. Formal digital license language with OTS/CafeOBJ method. [Citation Graph (, )][DBLP]


  92. A novel flow-sensitive type and effect analysis for securing C code. [Citation Graph (, )][DBLP]


  93. Privacy and the market for private data: A negotiation model to capitalize on private data. [Citation Graph (, )][DBLP]


  94. Extracting Kerberos passwords through RC4-HMAC encryption type analysis. [Citation Graph (, )][DBLP]


  95. Optimizing Fuzzy K-means for network anomaly detection using PSO. [Citation Graph (, )][DBLP]


  96. A new RSA vulnerability using continued fractions. [Citation Graph (, )][DBLP]


  97. Managing access and flow control requirements in distributed workflows. [Citation Graph (, )][DBLP]


  98. Performance analysis of identity management in the Session Initiation Protocol (SIP). [Citation Graph (, )][DBLP]


  99. PerformTrust: Trust model integrated past and current performance in P2P file sharing systems. [Citation Graph (, )][DBLP]


  100. Efficient computation of state space over approximation of preemptive real time systems. [Citation Graph (, )][DBLP]


  101. Test of preemptive real-time systems. [Citation Graph (, )][DBLP]


  102. Towards a mobile architecture description language. [Citation Graph (, )][DBLP]


  103. Integrating software development security activities with agile methodologies. [Citation Graph (, )][DBLP]


  104. Comprehensive support for management of enterprise applications. [Citation Graph (, )][DBLP]


  105. Assessing quality of web based systems. [Citation Graph (, )][DBLP]


  106. Exceptions in a Web services environment. [Citation Graph (, )][DBLP]


  107. Design metrics for web application maintainability measurement. [Citation Graph (, )][DBLP]


  108. A Recursive Colored Petri Nets semantics for AUML as base of test case generation. [Citation Graph (, )][DBLP]


  109. A modular state exploration and compatibility checking of UML dynamic diagrams. [Citation Graph (, )][DBLP]


  110. Modeling variability in the component and connector view of architecture using UML. [Citation Graph (, )][DBLP]


  111. A context model based on UML and XML schema representations. [Citation Graph (, )][DBLP]


  112. Efficient Hierarchical Diff-EDF schedulability for QoS packet networks. [Citation Graph (, )][DBLP]


  113. Modelling information generation in event-driven sensor networks. [Citation Graph (, )][DBLP]


  114. Error rate performance for coherent modulation techniques with switched and examine diversity combining over Weibull fading channels. [Citation Graph (, )][DBLP]


  115. A Recursive Load Balancing technique for VoIP-dedicated WLANs. [Citation Graph (, )][DBLP]


  116. Text classification: A preferred tool for audio file classification. [Citation Graph (, )][DBLP]


  117. A phishing sites blacklist generator. [Citation Graph (, )][DBLP]


  118. Steganography in SMS by Sudoku puzzle. [Citation Graph (, )][DBLP]


  119. Detecting flooding attacks against IP Multimedia Subsystem (IMS) networks. [Citation Graph (, )][DBLP]


  120. A connectionist system approach for learning logic programs. [Citation Graph (, )][DBLP]


  121. SPVA: A novel digital signal processor architecture for Software Defined Radio. [Citation Graph (, )][DBLP]


  122. An efficient high performance scalar multiplication method with resistance against timing attacks. [Citation Graph (, )][DBLP]


  123. Committee machines and quadratic B-spline wavelet for the P300 speller paradigm. [Citation Graph (, )][DBLP]


  124. Enhanced document clustering using fusion of multiscale wavelet decomposition. [Citation Graph (, )][DBLP]


  125. Wavelets: An efficient tool for lung sounds analysis. [Citation Graph (, )][DBLP]


  126. Compression of the images of ancient Arab manuscript documents based on segmentation. [Citation Graph (, )][DBLP]


  127. On hybrid-fuzzy classifier design: An empirical modeling scenario for corrosion detection in gas pipelines. [Citation Graph (, )][DBLP]


  128. Time-frequency analysis of the Arabian flute (Nay) tone applied to automatic music transcription. [Citation Graph (, )][DBLP]


  129. DEVS-WSN : A discrete event approach for Wireless Sensor Network simulation. [Citation Graph (, )][DBLP]


  130. Delegation model for object-oriented systems. [Citation Graph (, )][DBLP]


  131. An evaluation method for aspectual modeling of distributed software architectures. [Citation Graph (, )][DBLP]


  132. Intelligent virtual archiving for accessing news article repositories. [Citation Graph (, )][DBLP]


  133. Intelligent Diabetes Assistant: Using machine learning to help manage diabetes. [Citation Graph (, )][DBLP]


  134. New technique in the use of tangent vectors for a robust handwritten digit recognition. [Citation Graph (, )][DBLP]


  135. Networks of evolutionary processors with a self-organizing learning. [Citation Graph (, )][DBLP]


  136. SIGMA - A Malaysian signatures' database. [Citation Graph (, )][DBLP]


  137. Improved image segmentation method based on optimized threshold using Genetic Algorithm. [Citation Graph (, )][DBLP]


  138. Writer identification of Arabic handwriting documents using grapheme features. [Citation Graph (, )][DBLP]


  139. MASCE: A Multi-Agent System for Collaborative E-Learning. [Citation Graph (, )][DBLP]


  140. Arabic spotted words recognition system based on HMM approach to control a didactic manipulator. [Citation Graph (, )][DBLP]


  141. Forensic handwritten document management system. [Citation Graph (, )][DBLP]


  142. Estimation of clock parameters and performance benchmarks for synchronization in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  143. Suitability of context models for service-oriented environments. [Citation Graph (, )][DBLP]


  144. A system for automatic gathering and intelligent analyses of Doha traffic data. [Citation Graph (, )][DBLP]


  145. Segmentation of medical image based on mean shift and deterministic annealing EM algorithm. [Citation Graph (, )][DBLP]


  146. Hierarchical replication techniques to ensure checkpoint storage reliability in grid environment. [Citation Graph (, )][DBLP]


  147. A fair scheduling algorithm for video transmission over wireless packet networks. [Citation Graph (, )][DBLP]


  148. How can path diversity help transmission protocols in the achievement of a better connection QOS? [Citation Graph (, )][DBLP]


  149. Tutorials-based system to assist Qatari children with special needs. [Citation Graph (, )][DBLP]


  150. An MPLS-DiffServ experimental core network infrastructure for E2E QoS content delivery. [Citation Graph (, )][DBLP]


  151. Differentiated services provision in a converged DVB/IP networking environment. [Citation Graph (, )][DBLP]


  152. SLNP usage for QoS negotiation in heterogeneous environments. [Citation Graph (, )][DBLP]


  153. QoS monitoring framework for end-to-end service management in wired and wireless networks. [Citation Graph (, )][DBLP]


  154. Measuring quality of experience for MPEG-21-based cross-layer multimedia content adaptation. [Citation Graph (, )][DBLP]


  155. P2P-based mobile IPTV: Challenges and opportunities. [Citation Graph (, )][DBLP]


  156. Multimedia terminal architecture: An inter-operable approach. [Citation Graph (, )][DBLP]


  157. Optimizing resources utilization in heterogeneous wireless networks. [Citation Graph (, )][DBLP]


  158. Adaptive cross-layer fragmentation for QoS-based wireless IPTV services. [Citation Graph (, )][DBLP]


  159. Frame-level dynamic bandwidth provisioning for QoS-enabled broadband wireless networks. [Citation Graph (, )][DBLP]


  160. Ant colony-based many-to-one sensory data routing in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  161. Multimedia caching integration for efficient content delivery over heterogeneous networks. [Citation Graph (, )][DBLP]


  162. The ENTHRONE 2 metadata management tool (MATool) (WISE 2008 MATool demonstration). [Citation Graph (, )][DBLP]


  163. End-to-End QoS through integrated management of content, networks and terminals: The ENTHRONE project. [Citation Graph (, )][DBLP]


  164. Improve industrial process plant safety & availability via reliability engineering. [Citation Graph (, )][DBLP]


  165. Functional safety IEC 61508 / IEC 61511 the impact to certification and the user. [Citation Graph (, )][DBLP]


  166. Development guidelines for dependable real-time embedded systems. [Citation Graph (, )][DBLP]


  167. Redundant optical data transmission using semiconductor lasers. [Citation Graph (, )][DBLP]


  168. Implementation of a 1oo2-RISC-architecture on FPGA for safety systems. [Citation Graph (, )][DBLP]


  169. Different approaches for probability of common cause failure on demand calculations for safety integrity systems. [Citation Graph (, )][DBLP]


  170. Matlab® / Simulink® generated source code for safety related systems. [Citation Graph (, )][DBLP]


  171. A heterogeneous network architecture based Gnutella for mobile emergency preparedness applications. [Citation Graph (, )][DBLP]


  172. WiMAX Mesh networks for underserved areas. [Citation Graph (, )][DBLP]


  173. Analysis of the latency-lifetime tradeoff in wireless sensor networks. [Citation Graph (, )][DBLP]


  174. Enhancement of IEEE 802.11 DCF backoff algorithm under heavy traffic. [Citation Graph (, )][DBLP]


  175. Cumulative intelligence gathering for smart vehicles. [Citation Graph (, )][DBLP]


  176. Preventing admission failures of bandwidth reservation in wireless mesh networks. [Citation Graph (, )][DBLP]


  177. Performance study of wireless mesh networks routing metrics. [Citation Graph (, )][DBLP]


  178. A UML rule-based approach for describing and checking dynamic software architectures. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002