The SCEAS System
Navigation Menu

Conferences in DBLP

Computers and Their Applications (cata)
2005 (conf/cata/2005)

  1. Shin-Jer Yang, William Chung-Kung Yen, Ting-Yuan Yang
    Routing Design and Performance Evaluation of X-ARC on the Semi-Cactus Workflow. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:1-6 [Conf]
  2. Jonathan W. Berry, Daniel Hrozencik, Shrisha Rao, Zhizhang Shen
    Finding Median Set of Tree Structures in Synchronous Distributed Systems. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:7-12 [Conf]
  3. Chung-Chih Li, Bo Sun
    Using Linear Congruential Generators for Cryptographic Purposes. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:13-19 [Conf]
  4. Stuart Cunningham
    Waveform Analysis for High-Quality Loop-Based Audio Distribution. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:19-25 [Conf]
  5. Bidyut Gupta, Shahram Rahimi, P. Naskar
    A New Non-Blocking Synchronous Checkpointing Scheme for Distributed Systems. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:26-31 [Conf]
  6. Dianxun Shuai, Xiang Feng
    A New Cellular Automata Approach to Prediction Coding. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:32-37 [Conf]
  7. Wenbin Luo
    Efficient Identification of Finite Mixture Models. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:38-43 [Conf]
  8. Alaa Amin, Reda A. Ammar, Swapna S. Gokhale
    Minimizing the Effect of Processing Power Fragmentation while Scheduling Real-time Task-graphs on a Cluster of Computers. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:44-49 [Conf]
  9. Jamiru Luttamaguzi, Michael J. Pelsmajer, Zhizhang Shen, Boting Yang
    Integer Programming Methods for Several Optimization Problems in Graph Theory. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:50-55 [Conf]
  10. Mohammad Sohel Rahman, Mohammad Kaykobad, Mohammad Saifur Rahman
    A New Sufficient Condition for the Existence of Hamiltonian Paths. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:56-59 [Conf]
  11. Taufik Abidin, Amal Perera, Masum Serazi, William Perrizo
    Vertical Set Square Distance: A Fast and Scalable Technique to Compute Total Variation in Large Datasets. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:60-65 [Conf]
  12. Walter Dosch, Merik Meriste
    High-Level Design of a Pull Protocol. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:66-73 [Conf]
  13. Jhewei Jiang, Yanliang Gu, Wen-Chi Hou, Chih-Fang Wang
    The Design of an Interactive Approach to Statistical Data Mining. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:74-79 [Conf]
  14. Chunxia Zhang, Shiyong Lu, Lily R. Liang
    MetaFinder: A Meta-Search Engine with an Open Architecture. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:80-89 [Conf]
  15. Rekha Bhowmik
    Association Rules Mining Algorithm. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:86-90 [Conf]
  16. John Jenq
    Clustering Using Self Organized Map on Rmesh. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:91-96 [Conf]
  17. Xiao Chen, Jian Shen
    Energy Reducing Broadcasting Algorithms in Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:97-102 [Conf]
  18. N. Shah, I. Zeid
    Level-Based Equalization of Cumulative Participation of Sensors for Load-Balanced Routing in Wireless Networked Sensors. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:103-108 [Conf]
  19. Aldridge Drane Wilder III, Vijayakumar Shanmugasundaram
    An Introduction to Intrusion Detection in the Wireless Environment. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:109-114 [Conf]
  20. Shakil Akhtar
    Effect of Fragmentation in WLAN Systems with Interference Problems. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:115-120 [Conf]
  21. Jiang Guo, Yuehong Liao, Behzad Parviz, Renée Hawk
    Integrating Active Agent Technology with Network Management. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:121-126 [Conf]
  22. Mansoor Alam, Praveen Bethoju, Min Song
    Simulation and Analysis of Traffic Engineering Capabilities of MPLS Networks Using Linux Test-Bed. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:127-132 [Conf]
  23. B. Tai-Chang Chen
    Shortest Path Problem with Multiple Constraints. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:133-138 [Conf]
  24. V. Doraiswamy, R. Jandhyala, B. Gupta
    A Note on Hierarchical Distance Vector Routing -- Free from the Count-to-Infinity Problem. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:139-144 [Conf]
  25. Saleem Abuleil
    Maintaining a Database for Events Mentioned in the Arabic Newspaper Text. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:145-149 [Conf]
  26. Beifang Yi, Frederick C. Harris Jr., Sergiu M. Dascalu
    A Visualization Tool for Displaying Hand Gestures. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:150-155 [Conf]
  27. Pekka Pietikäinen, Juha Röning
    Communication Pattern Extraction: Visualizing Causal Relationships in Complex Systems. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:156-163 [Conf]
  28. Morshed U. Chowdhury
    Improved Learning Algorithm Performance Using Linear Kernel Transformation. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:164-167 [Conf]
  29. Toshinori Sato
    Exploiting Trivial Computation in Dependable Processors. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:168-173 [Conf]
  30. Ekkasit Tiamkaew, Angkul Kongmunvattana
    Techniques for Improving Branch Prediction Accuracy in YAGS Predictor. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:174-177 [Conf]
  31. Yipeng Liu, Dunren Che, Na Ren
    Efficient Prefix Computation Based on Mesh with 2-spacing Segmented Buses. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:178-183 [Conf]
  32. Jeffrey L. Hieb, James H. Graham
    Anomaly-Based Intrusion Monitoring Using a Dynamic Honeypot. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:184-189 [Conf]
  33. Mayumi Shimizu, Yasuaki Nakamura
    Neurosurgical Simulation System with Smooth Tactile Sensation. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:190-195 [Conf]
  34. Xutao Deng, Huimin Geng, Hesham H. Ali
    Predicting Yeast Gene Function Based on Hidden Markov Models. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:196-201 [Conf]
  35. Anthony J. Gervasi, John M. Weiss, Bernt Askildsen, Scott Thompson
    Advances In Human Target Detection Using Opaque Material Penetrating Radar Data. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:202-213 [Conf]
  36. Donna L. Hudson, Maurice E. Cohen, M. Kramer, A. Szeri, F. L. Chang
    Classification of Types of Dementia Using a Neural Network Model. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:208-213 [Conf]
  37. Carl Steidley, Alexey L. Sadovski, Kelly Torres Knott, Rafic Bachnak
    The Development of Rating Methods for Preference Ranking of Water Level Prediction Models. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:214-219 [Conf]
  38. Pedram Sadeghian, Mehmed M. Kantardzic, Oleksandr Lozitskiy, Walaa Sheta
    Route Recommendations: Navigation Assistance in Complex Virtual Environments. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:220-225 [Conf]
  39. B. D. Gaston, K. M. George, Nohpill Park
    An Approach to Protection Using a Non-Persistent Client-Side Page Proxy. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:226-231 [Conf]
  40. Brian Dellisanti, Larry A. Dunning, Sub Ramakrishnan
    A Secured Web Browser for E-Commerce Transactions. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:232-235 [Conf]
  41. Maxim Konovalov, Kirk Scott
    Bilingual Hypermedia Teaching Materials for Introductory Java. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:236-240 [Conf]
  42. Dehu Qi, Ravi Pulletikurty, Puneet Deepak
    ACAD: A Domain-specified Web Search Engine. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:241-246 [Conf]
  43. Reginald L. Walker
    Using Web Mining to Sample the Contents of an Information Ecosystem to Locate and Retrieve Web Pages. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:247-252 [Conf]
  44. Bruce Beyeler, David C. Pheanis
    Using GPS-Enabled Cell Phones for Traffic-Flow Data Collection. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:253-258 [Conf]
  45. Md. Mostofa Akbar, Eric G. Manning, Gholamali C. Shoja, Mohammad Sohel Rahman, Mohammad Kaykobad
    Optimal Server Selection for Content Routing. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:259-264 [Conf]
  46. Shivakant Mishra
    A Flexible and Intrusion Tolerant Voting Mechanism. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:265-270 [Conf]
  47. Syed M. Rahman, Akram Salah, Paul Juell
    A Practical Experience on Web Applications' Developing Environments. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:271-276 [Conf]
  48. Carl Steidley, Ravinder Rawat, Ray Bachnak, Gary Jeffress, Alexey L. Sadovski
    A Geographical Information System (GIS) Real-Time Web Portal for Monitoring of Marsh Habitats. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:277-281 [Conf]
  49. Marcel Levy, Sergiu M. Dascalu, Frederick C. Harris Jr.
    ARS VEHO: Augmented Reality System for VEHicle Operation. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:282-289 [Conf]
  50. Sin Ming Loo
    Optimizing Resource Utilization in System-on-a-Programmable-Chip with Location-Aware Genetic. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:290-295 [Conf]
  51. Charles E. Hall Jr.
    A Real Time Linux System for Flight Testing Aircraft. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:296-301 [Conf]
  52. William A. Stapleton, Kenneth G. Ricks, David Jeff Jackson
    Implementation of an Embedded Systems Curriculum. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:302-307 [Conf]
  53. Charles E. Stroud, Srinivas M. Garimella, John Sunwoo
    On-Chip BIST-Based Diagnosis of Embedded Programmable Logic Cores in System-on-Chip Devices. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:308-313 [Conf]
  54. Chung-Seok (Andy) Seo, Abhijit Chatterjee, Timothy J. Drabik, Behnam S. Arad, Reena Patel
    Prototyping an Embedded Bus-Based Parallel System. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:314-319 [Conf]
  55. Behnam S. Arad, Sachin Rudrapatna
    A 32-bit Residue Arithmetic Unit for High Performance Embedded Systems. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:320-325 [Conf]
  56. Henrik Schiøler, Jan Jakob Jessen, Jens Dalsgaard, Kim Guldstrand Larsen
    Network Calculus for Real Time Analysis of Embedded Systems with Cyclic Task Dependencies. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:326-332 [Conf]
  57. Haritha Dasari, Chakravarthy Bhagvati, R. K. Jain
    Distance Measures in RGB and HSV Color Spaces. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:333-338 [Conf]
  58. Howard A. Sholl, Reda A. Ammar, Ian R. Greenshields
    Computer-Based, Real-Time, Ultrasonic Railroad Track Flaw Inspection. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:339-343 [Conf]
  59. David Jeff Jackson, Yu-Ling Ko
    An FPGA Implementation for Watershed-Based Image Segmentation. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:344-348 [Conf]
  60. David Jeff Jackson, Ching-Kuang Wang
    Implementation of Image Processing Algorithms for Region Identification on an FPGA. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:349-353 [Conf]
  61. James W. Fawcett, Murat K. Gungor, Arun V. Iyer, S. Kanat Bolazar
    Relationship Between Code Metrics and Change History. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:354-360 [Conf]
  62. Syed M. Rahman, Akram Salah
    Adopting Test-Driven Development in Web Applications' Developments. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:361-366 [Conf]
  63. Thomas Philip, Edward B. Allen
    Science of Design: Building Blocks and Current State of Instruction. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:367-372 [Conf]
  64. Amir Hekmatpour, James Coulter, Azadeh Salehi
    FoCuS: A Dynamic Regression Suite Generation Platform for Processor Functional Verification. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:373-378 [Conf]
  65. Lily D. Li, Wei Li, Russel J. Stonier, Xinghuo Yu
    Breaking the Constraints to a High Performance Metacomputing System: A System Approach. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:379-384 [Conf]
  66. Chi Hang Wong, Kin Hong Wong, Wai Man Szeto
    Automatic Lyrics Alignment on Popular Music. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:385-390 [Conf]
  67. B. D. Gaston, Ralph A. Grayson, K. M. George
    CGI Program Generation and Session-Based Authentication. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:391-396 [Conf]
  68. Tharwat E. Alhanafy, H. Tantawi, M. Refai, Tarek S. Sobh, Awad H. Khalil
    Hybrid Learning Rules for Identifying Spacecraft System. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:397-403 [Conf]
  69. Maryann Dorn, Zhewei Jiang, Wen-Chi Hou, Chih-Fang Wang
    An Empirical Study of Qualities of Association Rules from a Statistical View Point. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:404-409 [Conf]
  70. Mehdi Owrang, Les L. Miller, Li Fang
    Processing Multiple Relations in the Knowledge Discovery Process. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:410-416 [Conf]
  71. Dunren Che, Wen-Chi Hou, Michael Wainer, Ping Han
    Empirical Study of the GBC Approach for Mapping XML Data to Relations. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:417-422 [Conf]
  72. Gregory Vert, Rawan Alkhaldi, Sara Nasser
    An Architectural Model for Low Overhead Spatial Data Authentication and Distribution in a Peer To Peer Based Spatial Database Model. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:423-428 [Conf]
  73. Haesun K. Lee, Ilhyun Lee, Haklin Kimm
    Algorithm for Reducing the Complexity of Switching Time in Real-Time Multitask Environments. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:429-434 [Conf]
  74. Ana Gabriela Garis, Daniel Riesco, German Montejano, Narayan C. Debnath
    UML Profiles for Design Patterns. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:435-440 [Conf]
  75. Mark Burgin, Narayan C. Debnath
    Quality of Software That Does Not Exist. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:441-446 [Conf]
  76. M. R. Warsi, Narayan C. Debnath
    Properties Needed in Distribution Media to Counter Software Piracy. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:447-452 [Conf]
  77. Kirk Scott
    A Parallel Algorithm for Matrix Multiplication of Compressed Z Order Data Structures. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:453-458 [Conf]
  78. Bidyut Gupta, Anupam Thakre, D. Chhillar
    A Fast and Efficient Recovery Scheme for Distributed Programs. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:459-464 [Conf]
  79. L. H. Dong, C. H. Fan
    Internet-based Simulation and Optimization of Milling Process. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:465-469 [Conf]
  80. Chunbo Chu, Monica Brockmeyer
    Fast Online Predicate Detection Using Symbolic Model Checking. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:470-477 [Conf]
  81. Ping Tang, Supriya Bhat, Jay Kothari, Gordon K. Lee
    A Modified Evolutionary Algorithm Using a Heuristic Evaluation Function with Mutation Rate and Crossover Rate Tuning. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:478-483 [Conf]
  82. James H. Graham, Eric Kuhl, Jonathan Nida
    Agent-Based Architecture for Intelligent Semi-Autonomous Robots. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:484-487 [Conf]
  83. Deok Hee Nam, Harpreet Singh, Grant Gerhart
    Path Prediction for Moving Object using Enforced Fuzzy Clustering. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:488-493 [Conf]
  84. Jens Dalsgaard Nielsen, Kirsten Mølgaard Nielsen, Jan D. Bendtzen
    Design of the Embedded System and Data Communication for an Agricultural Autonomous Vehicle. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:494-0 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002