The SCEAS System
Navigation Menu

Conferences in DBLP

Computer Applications in Industry and Engineering (caine)
2009 (conf/caine/2009)


  1. Visualization of Network Security Traffic using Hexagonal Self-Organizing Maps. [Citation Graph (, )][DBLP]


  2. Pandemic Virus Spreading Simulator. [Citation Graph (, )][DBLP]


  3. Self-Protection against Attacks in an Autonomic Computing Environment. [Citation Graph (, )][DBLP]


  4. A Space-Efficient Approach to Consistency Check of Firewall Rules. [Citation Graph (, )][DBLP]


  5. Quality of Security Service in a Virtual Private Network. [Citation Graph (, )][DBLP]


  6. Adaptive Fuzzy Inference for Edge Detection Using Compander Functions and Linear Fitness Function Transformations. [Citation Graph (, )][DBLP]


  7. 3D Scans of AS-Built Street Scenes in Taipei. [Citation Graph (, )][DBLP]


  8. Wavelet Based Regularized Deconvolution for Digital Images. [Citation Graph (, )][DBLP]


  9. Job Planning and Simulation in a Digital Factory Environment. [Citation Graph (, )][DBLP]


  10. Performance Analysis and Parallelization of Simulink Models. [Citation Graph (, )][DBLP]


  11. Speedup Techniques for Simulink Model Execution. [Citation Graph (, )][DBLP]


  12. D-RNA: Towards a DDoS Resistant Network Architecture using Social Network Analysis. [Citation Graph (, )][DBLP]


  13. Optimum Simulation of 2-Dimensional Torus Networks. [Citation Graph (, )][DBLP]


  14. Modeling of Hot Rolling Industrial Process Using Fuzzy Logic. [Citation Graph (, )][DBLP]


  15. Modeling An Adaptable Memory Controller. [Citation Graph (, )][DBLP]


  16. Multi-Level Power Management Policy for Multi-Core Chips. [Citation Graph (, )][DBLP]


  17. Fault Tolerance in Parallelizing Three-Dimensional Particle-In-Cell Plasma Simulation. [Citation Graph (, )][DBLP]


  18. Business Process Optimization by Workflow Analysis. [Citation Graph (, )][DBLP]


  19. Floorplan Optimization for Hierarchical VLSI Design. [Citation Graph (, )][DBLP]


  20. 2.5GHz Low Power CMOS Cross-Coupled VCO with High Linearity and Wide Tuning Range. [Citation Graph (, )][DBLP]


  21. Design of a Hierarchical Principal Component Analysis System for Field Intrusion Detection. [Citation Graph (, )][DBLP]


  22. FPGA-Based MPEG-4 Video Encoder SOPC Design with Performance Acceleration of Motion Estimation Block. [Citation Graph (, )][DBLP]


  23. Traffic Engineering in Static Routing Using Multiple Static Route Configuration Scheme. [Citation Graph (, )][DBLP]


  24. Using Ponder as a Standard Security Specification Language in Heterogeneous Networks. [Citation Graph (, )][DBLP]


  25. A Framework for Structured Search of Distributed Research Resources. [Citation Graph (, )][DBLP]


  26. Comparison of JSON and XML Data Interchange Formats: A Case Study. [Citation Graph (, )][DBLP]


  27. Sentiment Analysis of Surveys using both Numeric Ratings and Text Comments. [Citation Graph (, )][DBLP]


  28. Proposal of Predictive Coding Using Error Convergence-type Neuron Network System. [Citation Graph (, )][DBLP]


  29. Digital PreProcessing of Speech for Feature Identification. [Citation Graph (, )][DBLP]


  30. Software Estimating, Flexibility and Principled Negotiation. [Citation Graph (, )][DBLP]


  31. A Model for Learning Words in a Language by Crawling the Web. [Citation Graph (, )][DBLP]


  32. Parallel Quasi-Newton Optimization using Graphics Processing Units. [Citation Graph (, )][DBLP]


  33. Isolation as a Threat Reduction Strategy for Super-Systems. [Citation Graph (, )][DBLP]


  34. Mechanically Generating and Executing Test Cases -Preliminary Design and Implementation of a Tool. [Citation Graph (, )][DBLP]


  35. Constant Splitting of Instructions Applied to Embedded Systems for Code Compression. [Citation Graph (, )][DBLP]


  36. Clustering Customer Transactions: A Rough Set Based Approach. [Citation Graph (, )][DBLP]


  37. On Formalizing UML 2.0 Activities: Stream and Exception Parameters. [Citation Graph (, )][DBLP]


  38. In Silico White Blood Cell: A Synthetic Model of Leukocyte Rolling, Activation, and Adhesion During Inflammation. [Citation Graph (, )][DBLP]


  39. Build a Promoter Motif Database for System Biology Research. [Citation Graph (, )][DBLP]


  40. Computational Methods for Personal Healthcare. [Citation Graph (, )][DBLP]


  41. An Integrated DNA Support System for Crime Investigations: DNA Tracers. [Citation Graph (, )][DBLP]


  42. Double Secrecy: An Enhanced Cryptographic Approach for SCADA System Security. [Citation Graph (, )][DBLP]


  43. Data Broadcast Scheduling with Multiple Channels. [Citation Graph (, )][DBLP]


  44. Multi-channel Multiplexed Stand-alone Audio Data Acquisition System: The effect of settling time on acquisition accuracy. [Citation Graph (, )][DBLP]


  45. Communication Reduction Techniques for Application-Specific Traffic in Mesh Networks. [Citation Graph (, )][DBLP]


  46. Creating a Virtual Science Center -Virtual DUSEL (vDUSEL). [Citation Graph (, )][DBLP]


  47. Predicting Likelihood of Undergraduate Students graduating with Honors. [Citation Graph (, )][DBLP]


  48. Visualization Tools for Understanding a Complex Code from a Real Application. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002