The SCEAS System
Navigation Menu

Conferences in DBLP

ACIS International Conference on Computer and Information Science (ACISicis)
2005 (conf/ACISicis/2005)

  1. Walter Dosch
    Software Engineering - Components, Interfaces, Behaviors. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:- [Conf]

  2. Message from the Conference Chairs. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:- [Conf]

  3. Message from the Program Chairs. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:- [Conf]
  4. Hanmin Jung, HeeKwan Koo, Byeong-Hee Lee, Won-Kyung Sung
    Acquiring Dominant Compound Terms to Build Korean Domain Knowledge Bases. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:2-7 [Conf]
  5. Wonjae Lee, Hak-Young Kim
    Genetic Algorithm Implementation in Python. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:8-12 [Conf]
  6. Byung-Joo Kim, Il Kon Kim
    Kernel Based Intrusion Detection System. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:13-18 [Conf]
  7. Eun-Mi Kim, Bae-Ho Lee
    An Effective Real Time Update Rule for Improving Performances both the Classification and Regression Problems in Kernel Methods. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:19-24 [Conf]
  8. Murlikrishna Viswanathan, Young-Gyu Yang, Taeg Keun Whangbo, Nak-Bin Kim, B. Garner
    Knowledge-Based Compliance Management Systems - Methodology and Implementation. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:25-29 [Conf]
  9. Young-Kook Kim, Sun-Moon Jo, Weon-Hee Yoo
    Design of Translator for Stack-Based Codes from 3-Address Codes in CTOC. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:32-36 [Conf]
  10. Jun-Suk Oh, Ho-Jin Choi
    A Reflective Practice of Automated and Manual Code Reviews for a Studio Project. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:37-42 [Conf]
  11. Seong-Man Choi, Chang-Mog Lee, Cheol-Jung Yoo, Ok-Bae Chang
    Design and Implementation of UML Based Mobile Integrated Management System. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:43-48 [Conf]
  12. Dong-Wook Kim, Eun-Ji Lim, Gyu-Il Cha, Sung-In Jung
    Design and Implementation of Forced Unmount. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:49-53 [Conf]
  13. Haeng-Kon Kim, Roger Y. Lee, Hae Sool Yang
    Development of Embedded Software with Component Integration Based on ABCD Architectures. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:54-60 [Conf]
  14. Yuting Chen, Shaoying Liu, Fumiko Nagoya
    A Review Approach to Detecting Structural Consistency Violations in Programs. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:61-66 [Conf]
  15. Anour F. A. Dafa-Alla, Eun Hee Kim, Keun Ho Ryu, Yong Jun Heo
    PRBAC: An Extended Role Based Access Control for Privacy Preserving Data Mining. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:68-73 [Conf]
  16. Jeong-Mi Kim, JuHum Kwon, Doo-Kwon Baik
    RGSN Model for Database Integration. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:74-79 [Conf]
  17. Min-Jae Park, Kwang-Hoon Kim, Chang-Min Kim
    An Efficient Workcase Classification Method and Tool in Workflow Mining. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:80-85 [Conf]
  18. Wenyi Bi, Junping Sun
    Equivalence of Transforming Non-Linear DACG to Linear Concept Tree. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:86-91 [Conf]
  19. Jin Soo Noh, Kang Hyeon Rhee
    Palmprint Identification Algorithm Using Hu Invariant Moments and Otsu Binarization. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:94-99 [Conf]
  20. Jae-Ju Song, Bong-Jae Yi, Jin-Ho Shin, Ju-Young Kang, Jung-Il Lee, Seon-Ku Cho
    Natural Image Compression Based on Modified SPIHT. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:100-104 [Conf]
  21. Jae-Ju Song, Bong-Jae Yi, Jin-Ho Shin, Ju-Young Kang, Jung-Il Lee, Seon-Ku Cho
    A Development of the Automatic Digitizing System for Power Distribution Facility Images. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:105-110 [Conf]
  22. Jianjun Guo, Kui Dai, Yun Cheng, Zhiying Wang
    Research on Fast Block Participation Mode Selection Algorithm in H.264. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:111-113 [Conf]
  23. Jian Yang, Han Zhang, Mark Dencler, Chao Lu
    Comparison of Shape-Based and Stroke-Based Methods for Segmenting Handwritten Chinese Characters. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:114-119 [Conf]
  24. Dong Phil Kim, Jong-Shik Ha, Sang-Tae Kim, Seok Joo Koh
    Use of SCTP for IP Handover Support. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:122-126 [Conf]
  25. Jang-Sub Kim, Ho-Jin Shin, Dong Ryeol Shin
    Multiuser CDMA Parameters Estimation Using Sigma Point Particle Filter. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:127-132 [Conf]
  26. Sulyun Sung, Yuhwa Seo, Soonho Chu, Yongtae Shin
    MAMIP - Interoperation Mechanism of Ad Hoc Network and IP Network. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:133-138 [Conf]
  27. Baehyun Kim, Hoon Ko, Intae Ryoo
    A Study on Secure Group Transmission in Group Environment. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:139-143 [Conf]
  28. Ssang-Hee Seo, In-Yeup Kong
    A Performance Analysis Model of PC-Based Software Router Supporting IPv6-IPv4 Translation for Residential Gateway. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:144-150 [Conf]
  29. Younbok Lee, Ho-Jin Choi
    Experience of Combining Qualitative and Quantitative Analysis Methods for Evaluating Software Architecture. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:152-157 [Conf]
  30. Shu-Meei Ho, Berlin Wu
    On the Benefits of Industrial Network: A New Approach with Market Survey and Fuzzy Statistical Analysis. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:158-163 [Conf]
  31. In Hyeob Yu, Jin Ki Lee, Jong Min Ko, Sun Ic Kim
    A Method for Classification of Electricity Demands Using Load Profile Data. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:164-168 [Conf]
  32. Po-Chang Liu, Ming-Jyh Tsai, Deng-Jyi Chen
    A Generic Software Framework for the Software System Achitecture Design and Implementation of Handset Devices. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:169-174 [Conf]
  33. Maria Riaz, Saad Liaquat Kiani, Sungyoung Lee, Young-Koo Lee
    Incorporating Semantics-Based Search and Policy-Based Access Control Mechanism in Context Service Delivery. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:175-180 [Conf]
  34. Yeong-Tae Song, Sribara Narasimhadevara, Yanggon Kim
    Business Process Improvement Using ebXML. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:181-186 [Conf]
  35. Kyunghee Ji, Nammee Moon, Jaegon Kim
    Implementation on Event Notification Service over Multimedia Framework. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:188-193 [Conf]
  36. Sangok Kim, Kanghee Lee, Zhefan Jiang, Hyunchul Bae, Sangwook Kim
    Streaming Player Support Protocol Adaptation and Independent Operating System. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:194-197 [Conf]
  37. Youngkon Lee
    ebXML Test Framework on Dually Coupled Asynchronous MSH. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:198-203 [Conf]
  38. JooChul Lee, Hyoung-Jun Kim
    Implementation of Prefix Delegation Mechanism Using DHCPv6 Protocol. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:204-209 [Conf]
  39. Eunujung Lee, Tae-Hoon Kim
    Automatic Generation of XForms Code Using DTD. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:210-214 [Conf]
  40. David Chmielewski, Gongzhu Hu
    A Distributed Platform for Archiving and Retrieving RSS Feeds. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:215-220 [Conf]
  41. Eunujung Lee
    Multi-Granularity Locks for XML Repetitive. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:222-227 [Conf]
  42. Hyun Cheol Lee, Eun Seok Kim, Gi Taek Hur, Hee Young Choi
    Generation of 3D Facial Expressions Using 2D Facial Image. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:228-232 [Conf]
  43. Zhefan Jiang, Sangok Kim, Kanghee Lee, Hyunchul Bae, Sangwook Kim
    Security Service Framework for Home Network. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:233-238 [Conf]
  44. Kyu Min Lee, Kee-Hyun Choi, Seung-Phil Her, Dong Ryeol Shin
    Matchmaking Algorithms to Improve Dynamic Service Matching in Ubiquitous Environments. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:239-244 [Conf]
  45. Shao-Han Liu, Jzau-Sheng Lin, Zi-Sheng Lin
    A Shortest-Path Network Problem Using an Annealed Ant System Algorithm. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:245-250 [Conf]
  46. Anjum Shehzad, Hung Quoc Ngo, Sungyoung Lee, Young-Koo Lee
    A Comprehensive Middleware Architecture for Context-Aware Ubiquitous Computing Systems. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:251-256 [Conf]
  47. You-Hee Choi, Gyu-Sang Shin, Youngjong Yang, Changsoon Park
    An Approach to Extension of UML 2.0 for Representing Variabilities. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:258-261 [Conf]
  48. K. Gowthaman, K. Mustafa, R. A. Khan
    Reengineering Legacy Source Code to Model Driven Architecture. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:262-267 [Conf]
  49. Andy S. Y. Lai, A. J. Beaumont
    A Metalevel Component-Based Framework for Distributed Computing Applications. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:268-273 [Conf]
  50. Chong-wei Xu, Jose Hughes
    Realizing the Open-Closed Principle. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:274-279 [Conf]
  51. Chunkyun Youn
    Performance Improvement of Cluster System by Server Status Information. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:282-287 [Conf]
  52. Kwang-Hoon Kim, Hyung-Jin Ahn, Chang-Min Kim
    Performance Estimations of Clustered Workflow Architectures. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:288-293 [Conf]
  53. Duc Kien Nguyen, Ivan Lavallée, Marc Bui, Quoc Trung Ha
    A General Scalable Parallelizing of Strassen's Algorithm for Matrix Multiplication on Distributed Memory Computers. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:294-299 [Conf]
  54. Liqiang He, Zhiyong Liu
    An Effective Cache Overlapping Storage Structure for SMT Processors. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:300-305 [Conf]
  55. So-Young Kim, Ho-Jin Choi
    An Evaluation of Process Performance for a Small-Team Project - A Case Study. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:308-313 [Conf]
  56. Jung-Hee Jo, Ho-Jin Choi
    A Reflective Case Study of Software Process Improvement for a Small-Scale Project. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:314-319 [Conf]
  57. Shiva Azadegan, Vanessa McKenna
    Use of Honeynets in Computer Security Education. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:320-325 [Conf]
  58. Kwang-Hoon Kim, Hyuk-Jae Yoo, Hak-Sung Kim
    A Process-Driven e-Learning Content Organization Model. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:328-333 [Conf]
  59. Tai-Jong Kim, Min-Cheol Kim, Gyung-Leen Park
    On Employing Ontology to e-Learning. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:334-339 [Conf]
  60. Nazmul Haque, Morshed U. Chowdhury, Syed Mahbubur Rahman
    Impact of Image Organizations on Multimedia Document Retrieval. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:340-343 [Conf]
  61. Chui Young Yoon
    Measuring Personal Information Competency for Organizational Computing. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:344-349 [Conf]
  62. Sun-Moon Jo, Young-Kook Kim, Hoon-Joon Kouh, Weon-Hee Yoo
    Access Control Model for Secure XML Documents. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:352-357 [Conf]
  63. Yi-Jen Mon
    Intelligent Airbag Deployment Algorithm Design and Implemented by DSP Chip. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:358-363 [Conf]
  64. Seung-Heon Lee, Jin-Woo Choi, Nam-Kwan Hong, Murlikrishna Viswanathan, Young-Kyu Yang
    Development of Incident Detection Model Using Neuro-Fuzzy Algorithm. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:364-368 [Conf]
  65. Hyunjung Park, Jeehyong Lee
    A Framework of Context-Awareness for Ubiquitous Computing Middlewares. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:369-374 [Conf]
  66. JungHee Seo, HungBog Park
    Data Protection of Multimedia Contents Using Scalable Digital Watermarking. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:376-380 [Conf]
  67. Rey-Long Liu
    Mining for Context Recognition in Document Filtering and Classification. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:381-386 [Conf]
  68. Young-Ran Lee, Sang-Young Cho, Jeong-Bae Lee
    The Design of a Virtual Prototyping Based on ARMulator. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:387-390 [Conf]
  69. Keyhoon Ko, Bo Hyun Kim, Byoung Kyu Choi
    Use of Image Processing to Collect the Time Data of NC Machining. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:392-396 [Conf]
  70. Chin-Su Ko, Ki-Young Kim, Rim-Wo Hwang, YoungSeop Kim, Sang-Bum Rhee
    Robust Audio Watermarking in Wavelet Domain Using Pseudorandom Sequences. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:397-401 [Conf]
  71. Ok Keun Shin
    A Vector-Quantizer Based Method of Speaker Normalization. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:402-407 [Conf]
  72. Min-Jen Tsai, Hsiao-Ying Hung
    Wavelet Transform Based Digital Watermarking for Image Authentication. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:408-411 [Conf]
  73. Yong-Ju Lee, Ok-Gee Min, Hag-Young Kim
    Performance Evaluation Technique of the RTSP Based Streaming Server. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:414-417 [Conf]
  74. Hoon-Joon Kouh, Sun-Moon Jo, Weon-Hee Yoo
    Design of HDTS System for Locating Logical Errors in Java Programs. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:418-423 [Conf]
  75. YeongSeok Lee, JungHyun Bae, Seokkoo Shin
    Development of Quality Evaluation Metrics for BPM (Business Process Management) System. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:424-429 [Conf]
  76. Ho-Yeon Ryu, Byeong-Kil Sohn, Jae-Heung Park
    Mock Objects Framework for TDD in the Network Environment. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:430-434 [Conf]
  77. Nak Woon Sung
    HW/SW Codesigned Implementation of IEEE 802.16 TDMA MAC for the Subscriber Station. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:436-440 [Conf]
  78. Tang Tao, Shigeaki Tagashira, Satoshi Fujita
    LQ-Routing Protocol for Mobile Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:441-446 [Conf]
  79. Sang-Bum Han, Heyi-Sook Suh, Keun-Ho Lee, Chong-Sun Hwang
    Efficient Mobility Management for Multimedia Service in Wireless IP Networks. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:447-452 [Conf]
  80. Hwang-Cheng Wang, Jia-Chi Lin, Shiang-Ren Yang, Ping Chang, Jun-Yan Chen, Yu-Ren Guo
    Proactive Health Care Underpinned by Embedded and Mobile Technologies. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:453-460 [Conf]
  81. Jyh-Jong Tsay, Chen-Yang Shih, Bo-Liang Wu
    AuToCrawler: An Integrated System for Automatic Topical Crawler. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:462-467 [Conf]
  82. Ashok K. Harikumar, Roger Y. Lee, Hae Sool Yang, Haeng-Kon Kim, Byeongdo Kang
    A Model for Application Integration Using Web Services. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:468-475 [Conf]
  83. Deuk-Su Han, Myung-Jae Lee, Kang-Soo You, Euee S. Jang, Hoon-Sung Kwak
    Rank-Based Image Transformation for Entropy Coding Efficiently. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:478-482 [Conf]
  84. P. Nirmal Kumar, S. Suresh, J. Raja Paul Perinbam
    Digital Image Filter Design Using Evolvable Hardware. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:483-488 [Conf]
  85. Wen-Chien Yen, Shen-Chuan Tai
    DCT-Based Image Compression Using Wavelet-Based Algorithm with Efficient Deblocking Filter. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:489-494 [Conf]
  86. Xiao-Yong Wei, Dan Xu, Chong-Wah Ngo
    Multibiometrics Based on Palmprint and Handgeometry. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:495-500 [Conf]
  87. Hee-Young Lim, Young-Gab Kim, Chang-Joo Moon, Doo-Kwon Baik
    Bundle Authentication and Authorization Using XML Security in the OSGi Service Platform. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:502-507 [Conf]
  88. Tai-Yeon Ku, Dong-Hwan Park, Kyeong-Deok Moon
    Device-Independent Markup Language. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:508-512 [Conf]
  89. Saad Liaquat Kiani, Maria Riaz, Sungyoung Lee, Young-Koo Lee
    Context Awareness in Large Scale Ubiquitous Environments with a Service Oriented Distributed Middleware Approach. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:513-518 [Conf]
  90. Gang Xu, Wei Xu, Tao Huang
    Extending OBDD Graphs for Composite Event Matching in Content-Based Pub/Sub Systems. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:519-525 [Conf]
  91. Jaehyun Kim, Woojin Han, Woohyuk Choi, Yunil Hwang, Taehwan Kim, Joowook Jang, Jaeyong Um, JunChae Lim
    Performance Analysis on Mobility of Ad-Hoc Network for Inter-Vehicle Communication. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:528-533 [Conf]
  92. Geonlyang Kim, Jinoh Kim, Jungchan Na
    Design and Implementation of Policy Decision Point in Policy-Based Network. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:534-538 [Conf]
  93. Songtao Lin, Junliang Chen
    Semantic Web Enabled VHE for 3rd Generation Telecommunications. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:539-544 [Conf]
  94. Jinyong Jo, Woojin Seok, JaiSeung Kwak, Okhwan Byeon
    Design and Implementation of QoS Measurement and Network Diagnosing Framework for IP Multicast in Advanced Collaborative Environment. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:545-550 [Conf]
  95. Hyotaek Lim, Vinay Kumar Singh
    Design of Healthcare System for Disabled Person Using Eye Blinking. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:551-555 [Conf]
  96. Binod Vaidya, Jongwoo Kim, Jae-Young Pyun, Jong-An Park, Seung Jo Han
    Performance Analysis of Audio Streaming in Secure Wireless Access Network. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:556-561 [Conf]
  97. Anthony Chung, Tao Huang
    Two Approaches for the Improvement in Testability of Communication Protocols. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:562-565 [Conf]
  98. Jooyoen Lee, Junghak Kim, Shinho Kim, Changku Lim, Jaeil Jung
    Enhanced Distributed Streaming System Based on RTP/RTSP in Resurgent Ability. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:568-572 [Conf]
  99. Hee Yong Yoo, Hee Jin Yoo
    Visualizing Hierarchical Information Using a New Focus+Context Method. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:573-576 [Conf]
  100. Dan Song, Haitao Liu, Miyoung Cho, PanKoo Kim
    Video Event Understanding through Building Knowledge Domain. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:577-582 [Conf]
  101. Bin Shyan Jong, Wen Hao Yang, Juin-Ling Tseng, Tsong Wuu Lin
    An Efficient Connectivity Compression for Triangular Meshes. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:583-588 [Conf]
  102. Choon Seo Park, Jung Keun Kim, Su-Jung Mun, Yu-Hyeon Bak, Hag-Young Kim
    The Design and Implementation of Asset Management System on the NGIS. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:589-592 [Conf]
  103. Dong-Hwan Park, Tai-Yeon Ku, Kyeong-Deok Moon
    Data Broadcasting Software Architecture supporting Real-Time Caching and Monitoring in Interactive TV. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:593-597 [Conf]
  104. Ki-Jung Lee, Taeg Keun Whangbo, Young-Kyu Yang
    Oriental Color Ink Rendering for Landscape. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:598-602 [Conf]
  105. Insu Jeong, Hyunjun Choi, Joongsoo Ma
    Study on Address Allocation in Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:604-609 [Conf]
  106. Sulyun Sung, Soonho Chu, Yongtae Shin
    An Effective Multicast Communication Based on Locality in Mobile IPv6 Networks. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:610-615 [Conf]
  107. Kyung-Soo Jang, Jang-Sub Kim, Ho-Jin Shin, Dong Ryeol Shin
    A Novel Vertical Handoff Strategy for Integrated IEEE802.11 WLAN/CDMA Networks. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:616-621 [Conf]
  108. Jin-Ho Shin, Bong-Jae Yi, Jae-Ju Song, Ju-Young Kang, Jung-Il Lee, Seon-Ku Cho
    A Development of the Mobile Computing System for Repair and Patrol of Electric Power Facilities. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:622-627 [Conf]
  109. Jenn-Wei Lin, Ming-Feng Yang
    Dependable Public Wireless LANs without Hardware Support. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:628-633 [Conf]
  110. Wei-Lun Jeng, Tung-Shih Su, Wen-Shyong Hsieh
    Using Code Division Technique to Improve the Performance of Ad Hoc Wireless Network. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:634-639 [Conf]
  111. JinHo Ahn, ChaYoung Kim
    Enhancing Transparency and Adaptability of Dynamically Changing Execution Environments for Mobile Agents. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:642-646 [Conf]
  112. Hyung-Jun Kim, Kyu Min Lee, Kee-Hyun Choi, Dong Ryeol Shin
    Service Discovery Using FIPA-Compliant AP to Support Scalability in Ubiquitous Environments. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:647-652 [Conf]
  113. Cho-Chin Lin, Hao-Yun Yin
    Bounds on the Multi-Client Incremental Computing. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:653-658 [Conf]
  114. Hoon Jin, In-Cheol Kim
    Integration Service for Biological Information Resources Using Agent Service to Web Service Gateway. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:659-663 [Conf]
  115. S. Poonphon, Yong-Soo Kim, Chulsoo Lee, R. Sadananda
    Interactions and Cooperation between Machines as a Society of Agents. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:664-669 [Conf]
  116. Syed Shariyar Murtaza, Choong Seon Hong
    A Conceptual Architecture for the Uniform Identification of Objects. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:670-675 [Conf]
  117. Binh An Truong, Young-Koo Lee, Sungyoung Lee
    Modeling Uncertainty in Context-Aware Computing. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:676-681 [Conf]
  118. J. Park, D. Hwang
    Protein Knowledge Extension Based on Web Database. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:682-687 [Conf]
  119. YoungHa Hwang, SungKee Noh
    A Call Admission Control Scheme for Heterogeneous Service Considering Fairness in Wireless Networks. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:688-692 [Conf]
  120. Jeang-Kuo Chen
    Concurrency Control of Spatial Join on Spatial Database. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:693-697 [Conf]
  121. Tsai-Pin Chu, Fan Wu, Shih-Wen Chiang
    Mining Frequent Pattern Using Item-Transformation Method. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:698-706 [Conf]
  122. Ying-Fa Huang, Jyh-Horng Wen
    An Adaptive Full Parallel Interference Canceller with Imperfect Channel Estimation for CDMA Systems. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:707-712 [Conf]
  123. Kiumi Akingbehin
    Taguchi-Based Metrics for Software Quality. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:713-716 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002