The SCEAS System
Navigation Menu

Conferences in DBLP

Computer Applications in Industry and Engineering (caine)
2003 (conf/caine/2003)

  1. Christopher J. Hogger, Frank Kriwaczek, Mohd S. Ahmad
    A Flexible Constraint-Based Portal Architecture. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:1-6 [Conf]
  2. Guohua Liu, Qi He, Ziyang Chen, Ying Wang
    A Novel System for Publishing Relational Data in XML Based on ER-DTD Method. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:7-10 [Conf]
  3. Robert Matthews, Phil Kearns
    On-Line Rollback in Log-Structured File Systems. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:11-16 [Conf]
  4. Stephen Krebsbach, George Hamer, William Perrizo
    Watermarking Remotely Sensed Images (RSI) (Digital Image or Relational Data?). [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:17-21 [Conf]
  5. Ahmed H. Salem, Addagarla Kondala Rayudu, Anup Kumar, Adel Said Elmaghraby
    Image Processing Enhancement over WAP: An Enhancement of Transmitting Image over Mobile Devices Using WAP Architecture. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:22-27 [Conf]
  6. Clayton Crenshaw, Nelson L. Passos
    Message Hiding in Images. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:28-31 [Conf]
  7. Yongshen Ni, Ray Gamero, Hong Liu, John Y. Cheung
    Effects of Compression On Digital Phantom X-Ray Images. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:32-35 [Conf]
  8. Adiseshu K. Gelli, Joseph Nalluru, Eric Freeman, Nelson L. Passos
    A Brief Study of Cooperative Web Caching Protocols in Cellular Networks. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:36-39 [Conf]
  9. Gu Su Kim, Young Ik Eom
    Fault-tolerant MA Migration Scheme based on Encrypted Checkpoints. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:40-43 [Conf]
  10. In-suk Kim, Moon Jeong Kim, Young Ik Eom
    Mobile Agent Based Discovery Scheme in Pure P2P Environments. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:44-49 [Conf]
  11. Ahmad R. Sharafat, Mehdi Rasti, Ali Yazdian
    Neural Network Based Anomaly Detection in Computer Networks: A Novel Training Paradigm. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:50-53 [Conf]
  12. Paul Juell, Amal Perera, Kendall E. Nygard
    Genetic Algorithm to Improve a Solution for a General Assignment Problem. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:54-57 [Conf]
  13. Sukumar Kamalasadan, Adel A. Ghandakly, Khalid S. Al-Olimat
    A Fuzzy Logic Based Multiple Reference Model Adaptive Control. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:58-61 [Conf]
  14. V. V. Kluev
    OASIS: Text Search Using High-Speed Networks. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:62-67 [Conf]
  15. Richard T. Hurley, Wenying Feng, B. Y. Li
    Performance Benefits of Partitioning in a Web-Caching Environment. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:68-73 [Conf]
  16. Atul Sajjanhar, Hongen Lu
    Meaningful UDDI Web Services Description. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:74-77 [Conf]
  17. Jingpeng Tang, Victor Shi, Vijayakumar Shanmugasundaram
    Web-Based Parallel Computing System for Database Concurrency Control Simulation. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:78-82 [Conf]
  18. Guangyuan Sun, Huirong Fu
    Recent Advances on Intrusion Detection Techniques. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:83-86 [Conf]
  19. H. Y. Park, Jun-Cheol Jeon, Jai-Boo Oh, Kee-Yon Yoo
    An Efficient Multiplication Architecture using Montgomery Algorithm based on Programmable Cellular Automata. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:87-90 [Conf]
  20. Kee-Won Kim, Eun-Kyung Ryu, Hyung-Mok Lee, Kee-Young Yoo
    A New Authenticated Key Agreement Protocol. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:91-94 [Conf]
  21. Ibrahim S. Abdullah, Daniel A. Menascé
    A Unified Architecture for the Implementation of Security Protocols. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:95-100 [Conf]
  22. King Hong Cheung, Adams Wai-Kin Kong, Jane You, David Zhang
    An Integration of Principal Component Analysis and Self-Organizing Map for Effective Palmprint Retrieval. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:101-104 [Conf]
  23. Jane You, Adams Wai-Kin Kong, David Zhang, King Hong Cheung
    On Hierarchical Palmprint Coding with Multi-Features for Personal Identification in Large Databases. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:105-108 [Conf]
  24. Wenbin Luo
    Access Control Via Invertible Multilevel Scrambling. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:109-112 [Conf]
  25. Gregory Vert, James Arseneau, Sara Nasser
    Fuzzy Rules for Finger Print Verification using Ridge Extraction. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:113-116 [Conf]
  26. Hyungwoo Kang, Jaewoo Park, Gunwoo Nam, Sangseo Park, Jinseok Lee
    A New Intruder Traceback Mechanism based on System Process Structure. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:117-121 [Conf]
  27. Terry Griffin
    Analysis Tool for Honeypot Systems. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:122-125 [Conf]
  28. Parimal Patel, Chirag Parikh
    Design and Implementation of AES (Rijndael) Algorithm. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:126-130 [Conf]
  29. Gregory Vert, B. Yuan, N. Cole
    A Visual Algebra for Detecting Port Attacks on Computer Systems. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:131-135 [Conf]
  30. Mohammad S. Haqudf, Kendall E. Nygard
    Agent-Aided Executive Project Control. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:136-138 [Conf]
  31. Nathan Huff, Ahmed Kamel, Kendall E. Nygard
    An Agent Based Framework for Modeling UAV's. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:139-144 [Conf]
  32. Doug Schesvold, Jingpeng Tang, Benzir Md Ahmed, Karl Altenburg, Kendall E. Nygard
    POMDP Planning for High Level UAV Decisions: Search vs. Strike. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:145-148 [Conf]
  33. Bhagyavati
    Agent-based Fault Management in Cellular Networks. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:149-152 [Conf]
  34. Nicole Harlow, Thomas Puch, Kamal Dahbur
    Data Mining Strategies From Network Intrusion Detection as Applied to Identifying High-Risk Containers. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:153-158 [Conf]
  35. S. R. Subramanya, Morshed U. Chowdhury, Thao Pham, Sanjay Shankar
    A Scheme for Content Based Retrieval of Music Data in MIDI Format. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:159-162 [Conf]
  36. Jim Gasvoda, Qin Ding
    A Genetic Algorithm for Clustering on Very Large Data Sets. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:163-167 [Conf]
  37. Baoying Wang, Fei Pan, Yue Cui, William Perrizo
    Efficient Quantitative Frequent Pattern Mining Using Predicate Trees. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:168-171 [Conf]
  38. Yaakov HaCohen-Kerner, Eylon Malin, Itschack Chasson
    Summarization of Jewish Law Articles in Hebrew. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:172-177 [Conf]
  39. Hisham Al-Mubaid, Mohammad S. Siddiqui
    Automatic Text Categorization with Learning Logic. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:178-183 [Conf]
  40. Richard T. Hurley, Wenying Feng, B. Y. Li
    Partitioning in Distributed and Hierarchical Web-Caching Architectures: A Performance Comparison. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:184-188 [Conf]
  41. Saleh H. Al-Sharaeh, J. Montgomery
    Interactive Virtual Reality Visualization for a Three-Dimensional Earth's Ionosphere Simulation Problem. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:189-192 [Conf]
  42. Zhi Liu, Mei Lai, Neng Qian
    Partner Selection Modeling in a Virtual Enterprise. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:193-196 [Conf]
  43. Morshed U. Chowdhury, Yiqing Tu, Thao Pham
    A Simulation Model for Video Traffic Performance via ATM over TCP/IP. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:197-202 [Conf]
  44. Amal Abdel-raouf, Reda A. Ammar, Howard A. Sholl, Tahany A. Fergany
    Performance-Based Modeling for Object-Oriented Software. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:203-207 [Conf]
  45. Naai-Jung Shih, Hsin-Hung Chen
    Displacement Monitoring at Building Construction Site. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:208-210 [Conf]
  46. N. I. Giannoccaro, Mongkorn Klingajay
    Parametric Estimation of Autonomous Threaded Fastenings Operation based on Non-linear Least Square Method. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:211-215 [Conf]
  47. Nicolas Pernet, Yves Sorel
    Optimized Implementation of Distributed Real-Time Embedded Systems Mixing Control and Data Processing. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:216-220 [Conf]
  48. Huirong Fu, Liren Zhang
    Video Segmentation for Transporting Pre-Stored Video across Networks. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:221-224 [Conf]
  49. Jeffrey Dobbelaere, Phil Kearns, Jean Mayo
    The Advantages of Real Time in TORA. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:225-229 [Conf]
  50. Min Song, Sachin Shetty, Weiying Zhu
    Evolutionary Programming in a Distributed Packet Scheduling Architecture. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:230-233 [Conf]
  51. Mansoor Alam, Min Song, Amit Deshmukh
    A Scalable MPLS Multicast Solution for Dense Mode Multicast Networks. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:234-237 [Conf]
  52. Donna L. Hudson, Maurice E. Cohen
    Analysis of Consequences in a Computer-Assisted Model for Diagnosis and Management of Dementia. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:238-241 [Conf]
  53. Maurice E. Cohen, Donna L. Hudson
    Modeling Complexity in Dementia Diagnosis. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:242-245 [Conf]
  54. Sung Y. Shin, Charlie Y. Shim, Xiaohng Chen, Chang Oan Sung
    A Web-Based Approach for Myofascial Pain Syndrome Monitoring System in the Home. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:246-249 [Conf]
  55. Rex E. Gantenbein, Chang Oan Sung
    Task Scheduling in Distributed Data Mining for Medical Applications. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:250-253 [Conf]
  56. Sung Y. Shin, Chan G. Yoo, Kwan-Jong Yoo
    Design and Performance Analysis of Communication Module for Linux Clustering VOD Server. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:254-257 [Conf]
  57. K. F. Hulme, F. C. Mendel, K. P. Chugh
    Development of a Computational Toolkit for Biomechanical Analysis and Simulation: The Vertebrate Analyzer. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:258-263 [Conf]
  58. Ray Gamero, Yongshen Ni, Yuan Chen, Hong Liu, John Y. Cheung
    Effects of Digital Watermarking On Digital Images. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:264-267 [Conf]
  59. Feng-Jiann Shiao, Jong-Jiann Shieh
    An Issue Logic for Superscalar Microprocessors. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:268-271 [Conf]
  60. Haixia Wang, Chengde Han
    Direct Alignment Algorithm for High-Speed Floating-Point Adder Design. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:272-275 [Conf]
  61. Clemente Izurieta
    Semi Greedy Algorithm for Finding Connectivity in Microchip Physical Layouts. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:276-281 [Conf]
  62. Asami Tanino, Toshinori Sato
    Simplifying High-Frequency Microprocessor Design via Timing Constraint Speculation. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:282-287 [Conf]
  63. Ahmad Almunayyes
    A New Predictive Dynamic Reservation Strategy for Cellular Networks Using Explanation Patterns. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:288-291 [Conf]
  64. Fei Pan, Baoying Wang, Dongmei Ren, Xin Hu, William Perrizo
    Efficient Proximal Support Vector Machine for Spatial Data. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:292-297 [Conf]
  65. Pratap Ramamurthy, Jai Vasanth
    VLSI Implementation of Genetic Algorithm. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:298-301 [Conf]
  66. Narayan C. Debnath, M. Peralta, C. Salgado, Ana Funes, Aristides Dasso, Daniel Riesco, German Montejano, Robert Uzal
    Web Programming Language Evaluation using LSP. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:302-305 [Conf]
  67. Haesun K. Lee, Ilhyun Lee, Narayan C. Debnath
    Object-Oriented Approach of Bounded Predictable (BP) Task Scheduler. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:306-309 [Conf]
  68. Luiz H. R. Sucupira, Lívia C. F. Araújo, Miguel Gustavo Lizárraga, Lee Luan Ling
    Evaluating Biometric Software Packages using a Practioners Methodology. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:310-313 [Conf]
  69. Mark Burgin, Narayan C. Debnath
    Hardship of Program Utilization and User-Friendly Software. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:314-317 [Conf]
  70. Sarah Davis, Donald R. Schwartz
    An Application to Match Campus Visitors with Student Tour Guides. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:318-321 [Conf]
  71. Stefan Mitterdorfer, Egon Teiniker, Christian Kreiner, Reinhold Weiss, Zsolt Kovács
    XMI based Model Linking. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:322-325 [Conf]
  72. Jia Lu
    An Optimal Fuzzy Logic Controller Design for Precision Intelligent Tracking System. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:326- [Conf]
  73. Hatem Fawzi Halaoui
    Survey and Models of Spatio-Temporal Databases. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:327- [Conf]
  74. Ming-Chen Chung, Chun-Yuan Yu, Chen-Chih Yang, Chen-Ming Lin
    Embedded Home Gateway Systems in WAP Phone Control. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:328- [Conf]
  75. George Hamer, Daniel Steinwand
    Extending the Beowulf Cluster to the Desktop. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:329- [Conf]
  76. Guo-hua Liu, Ying Zhang, Zi-Jun Chen, Zi-Yang Chen
    Improvement to CNN Query. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:330- [Conf]
  77. Zi-Yang Chen, Zhao-Hong Ma, Ying Wa, Guo-hua Liu
    Quantitative Association Rules Mining Methods with Privacy-Preserving. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:331- [Conf]
  78. Albrecht M. Fritzsche
    Integrating optimization into a Scenario of Conflict Management. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:332- [Conf]
  79. Eric Freeman, Katia Passos, Cerise Wuthrich, Catherine Stringfellow
    Hidden Challenges on Web Application Design. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:333- [Conf]
  80. Choon Ki Ahn, Soo Hee Han, Wook Hyun Kwon
    An Equation Based Approach to the Implementation of Generalized PDE Solver in CEMTool. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:334- [Conf]
  81. B. K. Das
    Design of State of the Art Video Tracker for Test Range Applications. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:335- [Conf]
  82. Yaakov HaCohen-Kerner
    Applying the Perceptron Rule for Extraction of Keywords from Abstracts. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:336- [Conf]
  83. Vijayakumar Shanmugasundaram
    Importance of Scientific Visualization Course in Curriculum. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:337- [Conf]
  84. Steve Arnold, Cathy Osterhout, Chul Yim, Sergiu M. Dascalu
    Software Specification of a Web-Based Fitness Tracking Application. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:338- [Conf]
  85. Gregory Vert, Aparna Phadnis, Rajasekhar Yakkali, Xin Yu
    Towards an Automated Adaptive Content Delivery Training System. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:339- [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002