The SCEAS System
Navigation Menu

Conferences in DBLP

Computational and Information Science (cis)
2007 (conf/cis/2007)


  1. DRM Interoperability. [Citation Graph (, )][DBLP]


  2. Modeling Network Security Services in Tactical Networks. [Citation Graph (, )][DBLP]


  3. Mining with Noise Knowledge: Error Aware Data Mining. [Citation Graph (, )][DBLP]


  4. Towards an Understanding of the Brain via Microscopic and Macroscopic Studies. [Citation Graph (, )][DBLP]


  5. Mixing Matrix Recovery of Underdetermined Source Separation Based on Sparse Representation. [Citation Graph (, )][DBLP]


  6. Region Assessment of Soil Erosion Based on Naive Bayes. [Citation Graph (, )][DBLP]


  7. A Bayesian Network Based Approach for Root-Cause-Analysis in Manufacturing Process. [Citation Graph (, )][DBLP]


  8. Step-Size Optimization EASI Algorithm for Blind Source Separation. [Citation Graph (, )][DBLP]


  9. Variable Step-Size Online Algorithm for Blind Separation Based on the Extended Infomax. [Citation Graph (, )][DBLP]


  10. A Novel Learning Method for ANFIS Using EM Algorithm and Emotional Learning. [Citation Graph (, )][DBLP]


  11. A Novel Method for Intelligence of Sensors Modeling. [Citation Graph (, )][DBLP]


  12. An Effective Feature-Weighting Model for Question Classification. [Citation Graph (, )][DBLP]


  13. P2P Traffic Identification Technique. [Citation Graph (, )][DBLP]


  14. Study on PIGA Test Method on Centrifuge. [Citation Graph (, )][DBLP]


  15. Parameters Selection for SVR Based on the SCEM-UA Algorithm and its Application on Monthly Runoff Prediction. [Citation Graph (, )][DBLP]


  16. Estimate and Track the PN Sequence of Weak DS-SS Signals. [Citation Graph (, )][DBLP]


  17. A Smoothing Support Vector Machine Based on Quarter Penalty Function. [Citation Graph (, )][DBLP]


  18. Fast Forecasting with Simplified Kernel Regression Machines. [Citation Graph (, )][DBLP]


  19. An Accelerated SMO-Type Online Learning Algorithm. [Citation Graph (, )][DBLP]


  20. An Improved MRF Based Unsupervised Change Detection Method. [Citation Graph (, )][DBLP]


  21. Intrinsic Dimensionality Estimation with Neighborhood Convex Hull. [Citation Graph (, )][DBLP]


  22. A Novel Evolutionary Algorithm for Function Optimization Using MEC. [Citation Graph (, )][DBLP]


  23. A New Tree Encoding for the Degree-Constrained Spanning Tree Problem. [Citation Graph (, )][DBLP]


  24. A Novel Hybrid Real-Valued Genetic Algorithm for Optimization Problems. [Citation Graph (, )][DBLP]


  25. Global Optimization Method Based on the Statistical Genetic Algorithm for Solving Nonlinear Bilevel Programming Problems. [Citation Graph (, )][DBLP]


  26. Prediction of MHC Class II Binding Peptides Using a Multi-Objective Evolutionary Algorithm. [Citation Graph (, )][DBLP]


  27. A New Evolutionary Algorithm for Constrained Optimization Problems. [Citation Graph (, )][DBLP]


  28. An Improved Genetic Algorithm for Optimal Operation of Cascaded Reservoirs. [Citation Graph (, )][DBLP]


  29. A Decision-Tree-Based Multi-objective Estimation of Distribution Algorithm. [Citation Graph (, )][DBLP]


  30. Performance Scalability of a Cooperative Coevolution Multiobjective Evolutionary Algorithm. [Citation Graph (, )][DBLP]


  31. Comparison between Particle Swarm Optimization, Differential Evolution and Multi-Parents Crossover. [Citation Graph (, )][DBLP]


  32. PSO Algorithm Based Online Self-Tuning of PID Controller. [Citation Graph (, )][DBLP]


  33. A Self-Adaptive Particle Swarm Optimization Algorithm with Individual Coefficients Adjustment. [Citation Graph (, )][DBLP]


  34. A GA Based Combinatorial Auction Algorithm for Multi-Robot Cooperative Hunting. [Citation Graph (, )][DBLP]


  35. An Adaptive Parameter Control Strategy for Ant Colony Optimization. [Citation Graph (, )][DBLP]


  36. A Multi-Focus Image Fusion Algorithm with DT-CWT. [Citation Graph (, )][DBLP]


  37. A Fuzzy Fusion in Multitarget Tracking with Multisensor. [Citation Graph (, )][DBLP]


  38. An Algorithm for Extracting Referential Integrity Relations Using Similarity during RDB-to-XML Translation. [Citation Graph (, )][DBLP]


  39. Research on Algorithm of Web Classification Based on EP and FFSS. [Citation Graph (, )][DBLP]


  40. Discovery of Direct and Indirect Association Patterns in Large Transaction Databases. [Citation Graph (, )][DBLP]


  41. Associative Classification Using SVM-Based Discretization. [Citation Graph (, )][DBLP]


  42. An Efficient Graph-Based Multi-Relational Data Mining Algorithm. [Citation Graph (, )][DBLP]


  43. Analysis on Time-lagged Gene Clusters in Time Series Gene Expression Data. [Citation Graph (, )][DBLP]


  44. A Novel Local Features-Based Approach for Clustering Microarray Data. [Citation Graph (, )][DBLP]


  45. Improved Variable Precision Rough Set Model and its Application to Distance Learning. [Citation Graph (, )][DBLP]


  46. A New Attribute Reduction Algorithm in Continuous Information Systems. [Citation Graph (, )][DBLP]


  47. Realization of a New Association Rule Mining Algorithm. [Citation Graph (, )][DBLP]


  48. A Study on the Method of Attribute Reduction Based on Rough Set under Fuzzy Equivalent Relation. [Citation Graph (, )][DBLP]


  49. Mining Maximally Common Substructures from XML Trees with Lists-Based Pattern-Growth Method. [Citation Graph (, )][DBLP]


  50. The Algorithm of Objective Association Rules Mining Based on Binary. [Citation Graph (, )][DBLP]


  51. Fuzzy Factor in Switching Regression Models. [Citation Graph (, )][DBLP]


  52. Personalized Web Search Using User Profile. [Citation Graph (, )][DBLP]


  53. Mining Temporal Web Interesting Patterns. [Citation Graph (, )][DBLP]


  54. Frequent Closed Informative Itemset Mining. [Citation Graph (, )][DBLP]


  55. Data Extraction from Deep Web Pages. [Citation Graph (, )][DBLP]


  56. Web pages Classification Using Domain Ontology and Clustering. [Citation Graph (, )][DBLP]


  57. A Multi-Agent Based Autonomic Management Architecture for Large-Scale Server Clusters. [Citation Graph (, )][DBLP]


  58. Quantum Varying Deficit Round Robin Scheduling Over Priority Queues. [Citation Graph (, )][DBLP]


  59. iRBO: Intelligent Role-Based Object for Object-Based Storage Device. [Citation Graph (, )][DBLP]


  60. L-Chord: Routing Model for Chord Based on Layer-Dividing. [Citation Graph (, )][DBLP]


  61. Implementation and Performance Evaluation of an Adaptable Failure Detector for Distributed System. [Citation Graph (, )][DBLP]


  62. An Adaptive Join Strategy in Distributed Data Stream Management System. [Citation Graph (, )][DBLP]


  63. Topic-Oriented Search Model Based on Multi-Agent. [Citation Graph (, )][DBLP]


  64. A Formal Open Framework Based on Agent for Testing Web Applications. [Citation Graph (, )][DBLP]


  65. A Recognition Approach for Adversarial Planning Based on Complete Goal Graph. [Citation Graph (, )][DBLP]


  66. A Quantifiable Trust Model for Multi-agent System Based on Equal Relations. [Citation Graph (, )][DBLP]


  67. A Multi-Agent and PSO Based Simulation for Human Behavior in Emergency Evacuation. [Citation Graph (, )][DBLP]


  68. Theoretical Investigation on Post-Processed LDA for Face and Palmprint Recognition. [Citation Graph (, )][DBLP]


  69. New Parallel Models for Face Recognition. [Citation Graph (, )][DBLP]


  70. A Multi-Pattern Matching Algorithm on Multi-Language Mixed Texts for Content-Based Network Information Audit. [Citation Graph (, )][DBLP]


  71. Face Detection from Greyscale Images Using Details from Categorized Wavelet Coefficients as Features for a Dynamic Counterpropagation Network. [Citation Graph (, )][DBLP]


  72. An Improved Competitive and Cooperative Learning Approach for Data Clustering. [Citation Graph (, )][DBLP]


  73. Shape Modification of B-Spline Curve with Geometric Constraints. [Citation Graph (, )][DBLP]


  74. A New Anisotropic Diffusion Equation with Adaptive Fidelity Term. [Citation Graph (, )][DBLP]


  75. An Effective Approach towards Contour-Shape Retrieval. [Citation Graph (, )][DBLP]


  76. A Fast and Robust People Counting Method in Video Surveillance. [Citation Graph (, )][DBLP]


  77. A Hard Decision Error Correction Scheme for Corrupted Arithmetic Codes. [Citation Graph (, )][DBLP]


  78. Level Set Method for License Plate Localization Technology. [Citation Graph (, )][DBLP]


  79. A New MRF Framework with Dual Adaptive Contexts for Image Segmentation. [Citation Graph (, )][DBLP]


  80. Human Body Segmentation in the Presence of Occlusion. [Citation Graph (, )][DBLP]


  81. An Effective Approach to Content-Based 3D Model Retrieval and Classification. [Citation Graph (, )][DBLP]


  82. 3D Feature Extraction of Head based on Target Region Matching. [Citation Graph (, )][DBLP]


  83. Extraction of Semantic Keyframes Based on Visual Attention and Affective Models. [Citation Graph (, )][DBLP]


  84. A Color and Texture Feature Based Approach to License Plate Location. [Citation Graph (, )][DBLP]


  85. Salience-Based Evaluation Strategy for Image Annotation. [Citation Graph (, )][DBLP]


  86. Study on Conversion Method of Color Space under a Big Color Gamut. [Citation Graph (, )][DBLP]


  87. Image Restoration Using Gaussian Particle Filters. [Citation Graph (, )][DBLP]


  88. Spectral Correspondence Using Local Similarity Analysis. [Citation Graph (, )][DBLP]


  89. A Combined Feature for Fingerprint Recognition. [Citation Graph (, )][DBLP]


  90. Face Recognition Using Topology Preserving Nonnegative Matrix Factorization. [Citation Graph (, )][DBLP]


  91. 2D-NPP: An Extension of Neighborhood Preserving Projection. [Citation Graph (, )][DBLP]


  92. Laser Printer Fuzzy Identification Based on Correlative Specific Area of Character Image. [Citation Graph (, )][DBLP]


  93. Improved Facial Feature Points Calibration Algorithm Based on ASM. [Citation Graph (, )][DBLP]


  94. A Constrained Genetic Algorithm for Efficient Dimensionality Reduction for Pattern Classification. [Citation Graph (, )][DBLP]


  95. Pruning Neighborhood Graph for Geodesic Distance Based Semi-Supervised Classification. [Citation Graph (, )][DBLP]


  96. Traffic Signs Detection and Recognition by Improved RBFNN. [Citation Graph (, )][DBLP]


  97. Extracting Digital Fingerprints from Chinese Documents. [Citation Graph (, )][DBLP]


  98. A Model for Fitting the Yield Curve Based on a Continuous Penalty Function. [Citation Graph (, )][DBLP]


  99. Case-Based Reasoning Combined with Information Entropy and Principal Component Analysis for Short-Term Load Forecasting. [Citation Graph (, )][DBLP]


  100. MPIDA: A Sensor Network Topology Inference Algorithm. [Citation Graph (, )][DBLP]


  101. Exploring the Relationships between Personal Characteristics, Aims, and Reasons of Learning in Further Education by Associating Rule Mining. [Citation Graph (, )][DBLP]


  102. Image Retrieval with Simple Invariant Features Based Hierarchical Uniform Segmentation. [Citation Graph (, )][DBLP]


  103. A New Topic Influence Model Research in Online Community. [Citation Graph (, )][DBLP]


  104. Study of Immune PID Adaptive Controller and Its Applications in Thermal Control System. [Citation Graph (, )][DBLP]


  105. A Fuzzy Clustering Algorithm Based on Artificial Immune Principles. [Citation Graph (, )][DBLP]


  106. Construct a Real-time Selective Neural Group Network Controller for Internet-Based Teleoperation System. [Citation Graph (, )][DBLP]


  107. Neurodynamic Analysis for Symmetric Schur Decomposition Problems. [Citation Graph (, )][DBLP]


  108. Fuzzy Control System Based on Wavelet Analysis. [Citation Graph (, )][DBLP]


  109. Some Geometric Aggregation Operators Based on Interval-Valued Intuitionistic Fuzzy Sets and their Application to Group Decision Making. [Citation Graph (, )][DBLP]


  110. Fuzzy Distribution Games with Minimum Risk Criteria. [Citation Graph (, )][DBLP]


  111. Bounds on the Value of Fuzzy Solution to Fuzzy Programming Problem. [Citation Graph (, )][DBLP]


  112. On Fuzzy Modulator for the PMSM Step Motion Control. [Citation Graph (, )][DBLP]


  113. Fuzzy Random Portfolio Selection Problem. [Citation Graph (, )][DBLP]


  114. A Fuzzy Model of Interval speed Continuous Petri Nets. [Citation Graph (, )][DBLP]


  115. Selection of Delay Time Window and Delay Time in Phase Space Reconstruction. [Citation Graph (, )][DBLP]


  116. A Novel Architecture for the Computation of the 2D-DWT. [Citation Graph (, )][DBLP]


  117. Order Holon Modeling Method Based on Time Petri-Nets and its Solution with Particle Swarm Optimization. [Citation Graph (, )][DBLP]


  118. Research on Improving Training Speed of LMBP Algorithm and its Simulation in Application. [Citation Graph (, )][DBLP]


  119. A Dish Parallel BP for Traffic Flow Forecasting. [Citation Graph (, )][DBLP]


  120. An Improved Neural Network Model for Graduate Education Evaluation. [Citation Graph (, )][DBLP]


  121. Supervised FCNN Classification for Garment Seams. [Citation Graph (, )][DBLP]


  122. Simulation of T-S Fuzzy Neural Network to UASB Reactor Shocked by Toxic Loading. [Citation Graph (, )][DBLP]


  123. The Off-Line and On-Line Fuzzy Backstepping Controllers for Rotary Inverted Pendulum System. [Citation Graph (, )][DBLP]


  124. Dynamic System Modeling with Multilayer Recurrent Fuzzy Neural Network. [Citation Graph (, )][DBLP]


  125. Study of an Adaptive Immune Detection Algorithm for Anomaly Detection. [Citation Graph (, )][DBLP]


  126. A Method of Fine-Grained Authorization and Access Control for ASP Pages. [Citation Graph (, )][DBLP]


  127. The Research and Application of Resource Dissemination Based on Credibility and UCON. [Citation Graph (, )][DBLP]


  128. A Flexible Subscription Model for Broadcasted Digital Contents. [Citation Graph (, )][DBLP]


  129. A Biometric Verification System Addressing Privacy Concerns. [Citation Graph (, )][DBLP]


  130. A New Forward-Secure Threshold Signature Scheme Based on Schnorr Cryptosystem. [Citation Graph (, )][DBLP]


  131. A Novel Trust Community Based on Direct Certifying for Pervasive Computing Systems. [Citation Graph (, )][DBLP]


  132. Audio-Visual Recognition System with Intra-Modal Fusion. [Citation Graph (, )][DBLP]


  133. An Efficient Credential-Based Scheme for Cross-Domain File Sharing. [Citation Graph (, )][DBLP]


  134. An Effective Genetic Algorithm for Self-Inverse S-Boxes. [Citation Graph (, )][DBLP]


  135. Design of an Instruction for Fast and Efficient S-Box Implementation. [Citation Graph (, )][DBLP]


  136. Pairing-Based Proxy Signature Scheme with Proxy Signer?s Privacy Protection. [Citation Graph (, )][DBLP]


  137. An Improved Key Agreement Protocol Based on Key Association Set for Dynamic Peer Group. [Citation Graph (, )][DBLP]


  138. Efficient Zaps and Signatures of Knowledge. [Citation Graph (, )][DBLP]


  139. Game-Based Analysis of Multi-Party Non-Repudiation Protocols. [Citation Graph (, )][DBLP]


  140. Forward Security for an Efficient Password-Based Authenticated Key Exchange. [Citation Graph (, )][DBLP]


  141. A Note on Shacham and Waters Ring Signatures. [Citation Graph (, )][DBLP]


  142. Generalized Synchronization Theorem for Undirectional Discrete Systems with Application in Encryption Scheme. [Citation Graph (, )][DBLP]


  143. A Provable Secure Key Management Program for Wireless Sensor Network. [Citation Graph (, )][DBLP]


  144. A Single Key MAC Based on Hash127. [Citation Graph (, )][DBLP]


  145. To Solve the High Degree Congruence. [Citation Graph (, )][DBLP]


  146. Improvement on a Generalized Scheme of Proxy Signature Based on Elliptic Curves. [Citation Graph (, )][DBLP]


  147. A Robust Estimator for Evaluating Internet Worm Infection Rate. [Citation Graph (, )][DBLP]


  148. A Typical Set Method of Intrusion Detection Technology Base on Computer Audit Data. [Citation Graph (, )][DBLP]


  149. A Context-Based Analysis of Intrusion Detection for Policy Violation. [Citation Graph (, )][DBLP]


  150. DDoS Attack Detection Based on RLT Features. [Citation Graph (, )][DBLP]


  151. Scenario Discovery Using Abstracted Correlation Graph. [Citation Graph (, )][DBLP]


  152. A Parameter Selection Approach for Mixtures of Kernels Using Immune Evolutionary Algorithm and its Application to IDSs. [Citation Graph (, )][DBLP]


  153. A Hybrid Approach for Real-Time Network Intrusion Detection Systems. [Citation Graph (, )][DBLP]


  154. Research on the Resilience of Key Management in Sensor Networks. [Citation Graph (, )][DBLP]


  155. A New Centralized Group Key Distribution and Revocation in Sensor Network. [Citation Graph (, )][DBLP]


  156. An Efficient Identity-Based Short Signature Scheme from Bilinear Pairings. [Citation Graph (, )][DBLP]


  157. A Tight Security Reduction Identity-Based Signature Scheme. [Citation Graph (, )][DBLP]


  158. Security Assurance for Dynamic Role Mapping in a Multi-Domain Environment. [Citation Graph (, )][DBLP]


  159. Toward Assessing Vulnerability and Risk of Sensor Networks under Node Compromise. [Citation Graph (, )][DBLP]


  160. A Security Model for Networked Manufacturing System. [Citation Graph (, )][DBLP]


  161. An Email Geographic Path-Based Technique for Spam Filtering. [Citation Graph (, )][DBLP]


  162. An Improved DAD Check Scheme MLD-Based in FHMIPv6. [Citation Graph (, )][DBLP]


  163. An Efficient Survivability Hierarchy Analysis Model for Networked Information System. [Citation Graph (, )][DBLP]


  164. Testing Approach of Component Security Based on Fault Injection. [Citation Graph (, )][DBLP]


  165. A Novel Approach to Network Security Situation Awareness Based on Multi-Perspective Analysis. [Citation Graph (, )][DBLP]


  166. A Quantitative Evaluation Model for Network Security. [Citation Graph (, )][DBLP]


  167. A Period-Finding Method for Shor?s Algorithm. [Citation Graph (, )][DBLP]


  168. Hidden-ID Authentication Scheme and its SVO-Logic Based Formal Analysis. [Citation Graph (, )][DBLP]


  169. Research of Software Reliability Based on Synthetic Architecture. [Citation Graph (, )][DBLP]


  170. An EMAIL Based Automated Trust Negotiation Model. [Citation Graph (, )][DBLP]


  171. An Artificial Intelligence Based Approach for Risk Management Using Attack Graph. [Citation Graph (, )][DBLP]


  172. Game Theory Based Optimization of Security Configuration. [Citation Graph (, )][DBLP]


  173. Adaptive Trust Management in MANET. [Citation Graph (, )][DBLP]


  174. A New Provably Secure Authentication and Key Agreement Mechanism for SIP Using Certificateless Public-Key Cryptography. [Citation Graph (, )][DBLP]


  175. A Model of Hierarchical Key Assignment Scheme with CRT. [Citation Graph (, )][DBLP]


  176. A Game Theoretic Method for Decision and Analysis of the Optimal Active Defense Strategy. [Citation Graph (, )][DBLP]


  177. Handling Information Release and Erasure in Multi-Threaded Programs. [Citation Graph (, )][DBLP]


  178. A Quantitative Security Model of IMS System. [Citation Graph (, )][DBLP]


  179. An Efficient Authentication Strategy for Reprogramming of Sensor Networks. [Citation Graph (, )][DBLP]


  180. Protecting XML Databases against Ontology-Based Inference Attack. [Citation Graph (, )][DBLP]


  181. Image Encryption Algorithm of Double Scrambling Based on ASCII Code of Matrix Element. [Citation Graph (, )][DBLP]


  182. SEA: Secure Encrypted-Data Aggregation in Mobile Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  183. Multi-Perspective Quantization Model for Cyberspace Security Situation Awareness. [Citation Graph (, )][DBLP]


  184. Reinforcing Business Leaders? Role in Striving for Information Security. [Citation Graph (, )][DBLP]


  185. Secure and Flexible Digital Rights Management in a Pervasive Usage Mode. [Citation Graph (, )][DBLP]


  186. Controlled Secret Leakage. [Citation Graph (, )][DBLP]


  187. A New Method Considering Creditability Degree and Connection of Buyers and Sellers in E-Broker System. [Citation Graph (, )][DBLP]


  188. Modified Original Smart Cards and Smart Card Clone Countermeasures. [Citation Graph (, )][DBLP]


  189. Design of a New Selective Video Encryption Scheme Based on H.264. [Citation Graph (, )][DBLP]


  190. CMS System of DRM Technology Base that Use Web Contents Certification Code. [Citation Graph (, )][DBLP]


  191. A Context-Aware Trust Establishment and Mapping Framework for Web Applications. [Citation Graph (, )][DBLP]


  192. A Digital Fingerprint Coding Based on Turbo Codes. [Citation Graph (, )][DBLP]


  193. A Stream Cipher Engine for Ad-Hoc Security. [Citation Graph (, )][DBLP]


  194. Secure Hop-Count Based Localization in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  195. A Scheme for Protecting Mobile Agents Based on Combining Obfuscated Control Flow and Time Checking Technology. [Citation Graph (, )][DBLP]


  196. Identity-Based Key Issuing Protocol for Ad Hoc Networks. [Citation Graph (, )][DBLP]


  197. A New Statistical Hitting Set Attack on Anonymity Protocols. [Citation Graph (, )][DBLP]


  198. Research on Video Watermarking Scheme Based on Chaos, DWT and JND Model. [Citation Graph (, )][DBLP]


  199. Robust Watermark Model Based on Subliminal Channel. [Citation Graph (, )][DBLP]


  200. Two-Dimensional Wavelet Filters for Watermarking. [Citation Graph (, )][DBLP]


  201. Analysis on the Sensitivity Attack to Watermarking Schemes with Patchwork Detection Boundaries. [Citation Graph (, )][DBLP]


  202. A Blind Video Watermarking Algorithm Based on 3D Wavelet Transform. [Citation Graph (, )][DBLP]


  203. Adaptive Encrypted Information Hiding Scheme for Images. [Citation Graph (, )][DBLP]


  204. Using Chain Graphical Model to Analyze the Efficacy of a Chinese Medicine. [Citation Graph (, )][DBLP]


  205. Gene Selection Using Neighborhood Rough Set from Gene Expression Profiles. [Citation Graph (, )][DBLP]


  206. An Improved Algorithm for Iris Location. [Citation Graph (, )][DBLP]


  207. Dynamical Behavior of Three-Order Cellular Neural Network with Application in Image Secure Communication. [Citation Graph (, )][DBLP]


  208. Generalized Synchronization Theorem for Non-Autonomous Differential Equation with Application in Encryption Scheme. [Citation Graph (, )][DBLP]


  209. The Representation of Chinese Semantic Knowledge and its Application in the Document Copy Detection. [Citation Graph (, )][DBLP]


  210. Defaults Assessment of Mortgage Loan with Rough Set and SVM. [Citation Graph (, )][DBLP]


  211. Optimistic Design of Jetty Road Height Based on Genetic Algorithms. [Citation Graph (, )][DBLP]


  212. Calculation and Analysis of Double-Fed VSCF Induction Generator Operating Performance. [Citation Graph (, )][DBLP]


  213. Research on Refining Mesh of Ship Hatch Corner Based on Transition Element. [Citation Graph (, )][DBLP]


  214. Speech Tagging Based Improvement of the RSS Polymerization News. [Citation Graph (, )][DBLP]


  215. Low-Complexity Line-Based Motion Estimation Algorithm. [Citation Graph (, )][DBLP]


  216. A Particle Swarm Optimization for Resource-Constrained Multi-Project Scheduling Problem. [Citation Graph (, )][DBLP]


  217. A Data Engine for Controller Area Network. [Citation Graph (, )][DBLP]


  218. A Supply Chain Network Design Model for Deteriorating Items. [Citation Graph (, )][DBLP]


  219. The Study of Compost Quality Evaluation Modeling Method Based on Wavelet Neural Network for Sewage Treatment. [Citation Graph (, )][DBLP]


  220. Structural Analysis of Printed Mathematical Expression. [Citation Graph (, )][DBLP]


  221. System Level Assertion-Based Verification Environment for PCI/PCI-X and PCI-Express. [Citation Graph (, )][DBLP]


  222. Design of Automatic Database Schema Generator Based on XML Schema. [Citation Graph (, )][DBLP]


  223. Application of Least Squares-Support Vector Machine for Measurement of Soluble Solids Content of Rice Vinegars Using Vis/NIR Spectroscopy. [Citation Graph (, )][DBLP]


  224. Test Case Automate Generation from UML Sequence Diagram and OCL Expression. [Citation Graph (, )][DBLP]


  225. A Novel Cluster-Based Routing Algorithm in Ad Hoc Networks. [Citation Graph (, )][DBLP]


  226. Estimation of System Power Consumption on Mobile Computing Devices. [Citation Graph (, )][DBLP]


  227. Cluster-Based System-Level Fault Diagnosis in Hierarchical Ad-Hoc Networks. [Citation Graph (, )][DBLP]


  228. An Energy Efficient Directed Diffusion Routing Protocol. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002