The SCEAS System
Navigation Menu

Conferences in DBLP

Computers and Their Applications (cata)
2008 (conf/cata/2008)


  1. Incremental Learning Using Partly Labeled Data. [Citation Graph (, )][DBLP]


  2. Supporting Knowledge Management Within Process and Group Settings Using Visual Topic Maps. [Citation Graph (, )][DBLP]


  3. Silicon Prediction Models for Blast Furnace. [Citation Graph (, )][DBLP]


  4. Intelligent Computer-Aided Control in Flexible Manufacturing System. [Citation Graph (, )][DBLP]


  5. Usage of the HMM-Based Speech Synthesis for Intelligent Arabic Voice. [Citation Graph (, )][DBLP]


  6. Implementation of a Pairwise Sequence Alignment Algorithm on a Distributed Java Environment. [Citation Graph (, )][DBLP]


  7. Using Formal Concept Analysis for Flexible Querying Optimization. [Citation Graph (, )][DBLP]


  8. A Practical Method to Implement Asynchronous Iterative Algorithms on MPI and a Case Study for Asynchronous Self-Organizing Maps. [Citation Graph (, )][DBLP]


  9. Optimal Statistical Artificial Neural Networks for Arabic Character Recognition. [Citation Graph (, )][DBLP]


  10. On the Selection of the Fitness Function Heuristics and Prediction Parameters for an Adaptive Neural Network Fuzzy Inference Controller. [Citation Graph (, )][DBLP]


  11. Investigation of Random Forest Performance with Cancer Microarray Data. [Citation Graph (, )][DBLP]


  12. Toward an Intelligent Data and Visualization Desk for Endovascular Surgery. [Citation Graph (, )][DBLP]


  13. Intelligent Model for Avian Influenza Virus Spreading. [Citation Graph (, )][DBLP]


  14. Motion Vector Search Modified to Reduce Encoding Time in H.264 and VC-1. [Citation Graph (, )][DBLP]


  15. Radio Spectrum Management - An International Perspective. [Citation Graph (, )][DBLP]


  16. Fast H.264 Video Codec Standard. [Citation Graph (, )][DBLP]


  17. Architecture-specific Implementation of Haar-based MAD Denoising. [Citation Graph (, )][DBLP]


  18. A Data Stream Clustering Algorithm Using Discrete Cosine Transform. [Citation Graph (, )][DBLP]


  19. Time/Performance Tradeoffs in Hard Real-Time Denoising of US Signals. [Citation Graph (, )][DBLP]


  20. A Graph-Based Course Recommender System. [Citation Graph (, )][DBLP]


  21. A Novel Platform of Text Relatedness Evaluation for Plagiarism Detection. [Citation Graph (, )][DBLP]


  22. Fast Implementation of VC-1 Video Codec Standard. [Citation Graph (, )][DBLP]


  23. Formal Automated Transformation of SDL Specifications to Estelle Specifications. [Citation Graph (, )][DBLP]


  24. Reliability of Computer Communication Networks Using Binary Decision Diagrams. [Citation Graph (, )][DBLP]


  25. Architecture-based Performance and Reliability Analysis of Concurrent Applications with Hyperexponential Component Execution Times. [Citation Graph (, )][DBLP]


  26. L58ow FM: A Robust Non-Blocking Low Frequency Messaging Checkpoint for Parallel/Grid Applications. [Citation Graph (, )][DBLP]


  27. Hierarchical Template Matching For Real-Time Symbol Detection. [Citation Graph (, )][DBLP]


  28. Distributed Localization in Sensor Networks Using Self-Organizing Maps. [Citation Graph (, )][DBLP]


  29. Modified DTTL for 16QAM Symbol Recovery of DOCSIS 2.0 Standards. [Citation Graph (, )][DBLP]


  30. A Text Processing System for Mining Association Rules. [Citation Graph (, )][DBLP]


  31. Transformational Design of a Fault Tolerant Sequential Memory Component. [Citation Graph (, )][DBLP]


  32. A Synchronous/Asynchronous Multi-Master Replication Method. [Citation Graph (, )][DBLP]


  33. Improving the Accuracy of Support Vector Machines. [Citation Graph (, )][DBLP]


  34. Testing: Organization and Evaluation. [Citation Graph (, )][DBLP]


  35. The Value of Material-Orientation in the Separation of Concerns. [Citation Graph (, )][DBLP]


  36. Factors Affecting the Quality of Software Development Process. [Citation Graph (, )][DBLP]


  37. A Perspective on Security Risk Management of SCADA Control Systems. [Citation Graph (, )][DBLP]


  38. Anatomy and a Framework of Mobile Games. [Citation Graph (, )][DBLP]


  39. MVC-Based Requirements-Aware Design for Web Applications. [Citation Graph (, )][DBLP]


  40. A Method for Detecting Windows Rootkits. [Citation Graph (, )][DBLP]


  41. Online Recruitment - An Intelligent Approach. [Citation Graph (, )][DBLP]


  42. Collaboration of Software Engineering Courses to Enhance Students' Learning Experience. [Citation Graph (, )][DBLP]


  43. An Agent Based Framework for Peer to Peer Distributed Computing. [Citation Graph (, )][DBLP]


  44. Graph Coloring for Enforcing Password Identification against Brute Force Attacks. [Citation Graph (, )][DBLP]


  45. An Ontological Model for Assessing Security Risk Impact in SCADA Systems. [Citation Graph (, )][DBLP]


  46. A Behavioral Simulator for PCI-Express Transaction Layer. [Citation Graph (, )][DBLP]


  47. An Interactive Computer Design in Multisim. [Citation Graph (, )][DBLP]


  48. Interaction-Based Mechanisms to Model Hierarchical Architectures. [Citation Graph (, )][DBLP]


  49. Automated Calibration of Automotive Test Instrumentation. [Citation Graph (, )][DBLP]


  50. An Advanced Fault Data/Information Presentation in Power Systems. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002