The SCEAS System
Navigation Menu

Conferences in DBLP

Computers and Their Applications (cata)
2001 (conf/cata/2001)

  1. Y. Z. Wang, C. Sahay, D. Zhu
    Internet-based system for remote monitoring of manufacturing operations. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:1-4 [Conf]
  2. Jyhjong Lin, Yalei Chu, Huammi Tsao
    Analysis and design of web-based information systems with UML. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:5-8 [Conf]
  3. Shin-Jer Yang, William Chung-Kung Yen
    The technology and application of FEDI on the internet. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:9-14 [Conf]
  4. Xiaolin Dai, Carl G. Looney
    Rule-based image convolution for edge enhancement. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:15-17 [Conf]
  5. Rami Qahwaji, Roger Green
    Detecting objects in digital images. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:18-21 [Conf]
  6. Ching-Tang Hsieh, Feng-Jen Kuo
    People tracking algorithm using position correlation in discrete wavelet transform. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:22-24 [Conf]
  7. Ben Carlson, Carl Looney
    A new method of image interpolation. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:25-28 [Conf]
  8. Chester T. Trahan
    Programming patterns and structural reduction. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:29-34 [Conf]
  9. Hoon Oh
    Application of a heuristic search to the deadlock avoidance algorithm which achieves the high concurrency. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:35-39 [Conf]
  10. Bertrand Ibrahim, Honitriniela Randriamparany
    Execution semantics to integrate control flow and data flow. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:40-43 [Conf]
  11. Honitriniela Randriamparany, Bertrand Ibrahim
    Seamless integration of control flow and data flow. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:44-47 [Conf]
  12. William Mitchell
    Class assertions - an emerging factor in software engineering. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:48-52 [Conf]
  13. Thomas Philip, Ravi Konda
    A model to use software agents during software life cycle. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:53-56 [Conf]
  14. Leah Dawn Baker Cross, Mansour Zand
    Characteristics of object-oriented rearchitecture evaluation of methodologies. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:57-60 [Conf]
  15. M. Burgin
    Topological algorithms. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:61-64 [Conf]
  16. Fang-Chang Lin, Chien-Nan Kuo, Jyh-Fu Hwang
    A coordination-based cooperation environment for mobile agents. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:65-68 [Conf]
  17. Gehan Weerasinghe, Lester Lipsky
    A distributed fault-tolerant asynchronous algorithm for performing N tasks. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:69-73 [Conf]
  18. Jiman Hong, Sangsu Kim, Juwon Park, Taesoon Park, Heon Young Yeom, Yookun Cho
    An efficient checkpoint scheme based on memory profile and time series analysis. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:74-77 [Conf]
  19. Shivakant Mishra, Shengxiang Gui
    Statistical analysis of security violations in computer software. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:78-81 [Conf]
  20. Fatouh Ghareb, Ehab Y. Abdel Maksoud, Tahany A. Fergany, Reda A. Ammar
    Efficient complexity reduction approaches for hierarchical performance models. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:82-87 [Conf]
  21. H. Arafat Ali, Tahany A. Fergany, Reda A. Ammar
    Evaluating software's power consumption. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:88-93 [Conf]
  22. William I. Grosky, Peter L. Stanchev
    Object-oriented image database model. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:94-97 [Conf]
  23. Laurent Amanton, Bruno Sadeg, Samia Saad-Bouzefrane
    Disconnection tolerance in soft real-time mobile databases. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:98-101 [Conf]
  24. Ching-Ming Chao
    An approach to schema integration between object-oriented databases. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:102-107 [Conf]
  25. G. K. Webb
    Database cost-benefit analysis: The case of quality control for a computer manufacturer. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:108-112 [Conf]
  26. Shijun Qiu, Zhiyong Jia, Shuang Song, Shankaran Sitarama, Jialong Wu
    A scheme design expert system of dies. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:113-116 [Conf]
  27. Ehab Abdelhafiz, Adel Said Elmaghraby, Mohamed F. Hassan
    A tool set for computer implementation of cutting stock algorithms. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:117-120 [Conf]
  28. Charles Hand
    An improved autoassociative network for controlling autonomous robots. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:121-124 [Conf]
  29. José Luis Hamkalo, A. Djordjalian, Bruno Cernuschi-Frías
    A shared-way set associative architecture for on-chip caches. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:125-128 [Conf]
  30. David C. Pheanis, Jeffrey A. Tenney
    Data collection with vehicle-bus interface. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:129-132 [Conf]
  31. George G. Gorbatenko
    A proposal for a new data model and its implications on I/O architecture. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:133-139 [Conf]
  32. Jeffrey Espenschied, Eugene Lee, Ashok K. Goel
    Designing a GaAs-based floating-point multiplier. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:140-143 [Conf]
  33. B. Shen, George Q. Huang, X. C. Wang, K. L. Mak
    Key technology in hogging of blanks with large-scale sculptured surfaces. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:144-147 [Conf]
  34. Jerzy P. Szolomicki, Jeremi M. Sieczkowski
    Application of computer methods in structural masonry. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:148-151 [Conf]
  35. Stuart Wylie, Masoud Bagheri, Suresh Chandra
    Numerical solution for thermal buckling in flat plates with square central cutouts. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:152-156 [Conf]
  36. Srikanth Krishnamurthy, Ibrahim Zeid
    A framework to facilitate mobile data access in a manufacturing environment. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:157-160 [Conf]
  37. Shawki Areibi, Matt Thompson
    A new model for macrocell partitioning. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:161-165 [Conf]
  38. B. Gupta, S. K. Banerjee, Z. Wang
    An index-based checkpointing/recovery approach for distributed systems. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:166-170 [Conf]
  39. Haesun K. Lee, Ilhyun Lee, Martha Evens
    Mixed scheduling of periodic and soft aperiodic tasks with reduced context switches. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:171-174 [Conf]
  40. Wu Woan Kim, Hee-Sik Chun
    Dedicated bus system for the shared-memory multiprocessor. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:175-178 [Conf]
  41. Hyun-Chul Kim, Hyo-Cheol Kim, Kee-Young Yoo
    Exploitation of functional parallelism in hierarchical task graph using thread. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:179-182 [Conf]
  42. Dhigha Sekaran, L. L. Miller
    Developing a modern land records system. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:183-186 [Conf]
  43. Hiroki Kusumoto, Yoshiyasu Takefuji
    A clustering algorithm for spectral image processing using self-organizing maps. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:187-191 [Conf]
  44. Jong Young Kim, Martha W. Evens, Injoo Jeong, David Trace
    Generating concept-feature relationships for patient simulation using a textbook index. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:192-195 [Conf]
  45. Hyo-Cheol Kim, Jeung-Seop Kim, Hyun-Chul Kim, Kee-Young Yoo
    Cross-correlation property for the public watermarking. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:196-199 [Conf]
  46. Ching-Tang Hsieh, Yeh-Kuang Wu
    Image compression using layered JPEG-like image coder. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:200-203 [Conf]
  47. W. K. Kong, D. Zhang
    Eyelash detection model for accurate iris segmentation. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:204-207 [Conf]
  48. Souichi Oka, Yoshiyasu Takefuji
    The evaluation of new self-organization classification algorithms using magnetic resonance images. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:208-211 [Conf]
  49. Yutaka Kuramochi, Kazumasa Shinjo
    A method of dynamically recovering feature dimensions for content-based image retrieval. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:212-216 [Conf]
  50. Zhenyou Li, Carl G. Looney
    Pattern recognition comparisons with fuzzy clustering algorithms. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:217-220 [Conf]
  51. Ching-Tang Hsieh, Kuo-Ming Hung, Shi-Dong Hou
    Wavelet based moment invariants feature extraction for handwritten numerals recognition. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:221-224 [Conf]
  52. Rami Qahwaji, Roger Green
    Detecting faces in noisy images. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:225-228 [Conf]
  53. Shijun Qiu, Alice M. Agogino, Shuang Song, Jia-Long Wu, Shankaran Sitarama
    A fusion of bayesian and fuzzy analysis for print faults diagnosis. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:229-232 [Conf]
  54. Christos Anagnostopoulos, Ioannis Anagnostopoulos, Dimitrios D. Vergados, Eleftherios Kayafas, Vassilis Loumos, George I. Stassinopoulos
    A neural network and fuzzy logic system for face detection on RGB images. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:233-236 [Conf]
  55. Liang-Yi Hwang, Mei-Ling Chiang, Ruei-Chuan Chang
    System and method using dual packet filtering for wireless network communication. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:237-240 [Conf]
  56. Akira Funahashi, Michihiro Koibuchi, Akiya Jouraku, Hideharu Amano
    The impact of output selection function on adaptive routing. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:241-246 [Conf]
  57. Richard T. Hurley, Wenying Feng
    Performance results on scheduling algorithms for broadcast information delivery systems. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:247-250 [Conf]
  58. HyunCheul Shin, JongGoo Park
    Mobility scheme using dynamic circle location register in wireless communications. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:251-255 [Conf]
  59. Su Jeong Byun, Won Don Lee, Sung Y. Shin, Chih-Cheng Hung
    The performance comparison between backpropagation and extended incremental network model on speaker verification. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:256-259 [Conf]
  60. Daewon An, K. Wendy Tang, Petar M. Djuric
    Performance comparison of BNN and MPNN on proben1 database. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:260-263 [Conf]
  61. Abdel-Hamid El-Kassas, Tomasz J. Cholewo, Adel Said Elmaghraby
    Applications of neural networks in socio-economic modeling. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:264-267 [Conf]
  62. Ahmad Almonayyes, Hazem Raaft, Mohammed Almulla
    A learning mechanism to enhance the time efficiency of proving theorems. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:268-271 [Conf]
  63. Patrick Augé, Brigitte Rozoy, T. Maurin, Roger Reynaud, Kamel Bouchefra
    Simulation and verification of an embedded system. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:272-275 [Conf]
  64. Rong-Yuh Hwang, Ming-Hung Chiu
    The analysis and comparison for the software cache coherence schemes. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:276-279 [Conf]
  65. Chad Peyton, Hamdy S. Soliman
    Modeling technological limitations in all-optical networks. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:280-283 [Conf]
  66. Jungohn Yim, Gil Yong Kim, Young-Sung Son
    Cooperative caching framework of VOD using P2P technology. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:284-289 [Conf]
  67. Seong-Moo Yoo, Vladimir Zanev
    Maintaining maximal submeshes in torus-connected multi-computers. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:290-293 [Conf]
  68. Rex E. Gantenbein, Chang Oan Sung
    Integrating knowledge discovery and spatial data visualization for health care research. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:294-297 [Conf]
  69. Hussien H. Aly, Yousry Taha, Ashraf A. Amr
    Mining association rules. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:298-303 [Conf]
  70. Junping Sun
    Rule derivation from uncertain data. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:304-309 [Conf]
  71. Frederick Ferguson
    A computer aided design tool for the identification and linkage of safety-critical factors to their mitigating requirements. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:310-313 [Conf]
  72. Chengqi Zhang, Zili Zhang
    Approaches to implementing decision aggregation in multi-agent systems. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:314-317 [Conf]
  73. Chengqi Zhang, Zili Zhang
    Post-processing of multimedia information - concents, problems, and techniques. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:318-321 [Conf]
  74. Raj Sekhar Pamula
    Permutation routing and fault tolerance in omega plus networks. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:322-324 [Conf]
  75. William Chung-Kung Yen, Shin-Jer Yang
    The link-orientation problem on weighted networks. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:325-329 [Conf]
  76. Hamdy S. Soliman
    Emulation of task flow distributed system over TCP/IP. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:330-333 [Conf]
  77. Kazuma Wakabayashi, Kazumasa Oida, Shigeru Saito
    Performance evaluation of routing algorithms from the viewpoint of audio stream application users. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:334-337 [Conf]
  78. Sandy Shaw, C. Anthony Hunt
    A novel method for visualizing similarity in gene expression and other large datasets. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:338-341 [Conf]
  79. Donna L. Hudson, Maurice E. Cohen
    Consequential reasoning in knowledge-based systems. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:342-345 [Conf]
  80. Amina Qutub, Alex Lancaster, C. Anthony Hunt
    Therapeutic engineering: Models of individual variability in drug systems. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:346-349 [Conf]
  81. Maurice E. Cohen, Donna L. Hudson
    A hybrid system for diagnosis of dementia. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:350-353 [Conf]
  82. Scott E. Hudson
    Informatics techniques in bioinorganic chemistry. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:354-357 [Conf]
  83. Manuel Penaloza, Antonette M. Logar, Joseph Johnson, Michael Boucher
    A Java unit and integration testing tool. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:358-361 [Conf]
  84. Richard Li, Anthony S. Fong, H. W. Chun, C. H. Tam
    Dynamic memory allocation behavior in Java programs. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:362-365 [Conf]
  85. Jorge Toro, Jacob Furst, Karen Alkoby, Roymieco Carter, Juliet Christopher, Brock Craft, Mary Jo Davidson, Damien Hinkle, Brian Konie, Glenn Lancaster, Steve Luecking, Ashley Morris, John McDonald, Eric Sedgwick, Noriko Tomuro, Rosalee Wolfe
    A graphical environment for transcription of american sign language. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:366-369 [Conf]
  86. Narayan C. Debnath, Mohammad N. Islam, Roger Y. Lee, Hamid R. Abachi
    Generating test cases for a three variable function. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:370-373 [Conf]
  87. Saleem Abuleil, Martha Evens
    Extracting information about proper nouns from arabic newspaper text. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:374-378 [Conf]
  88. S. R. Subramanya
    A hybrid scheme for hierarchical coding of images. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:379-382 [Conf]
  89. David B. Bracewell, Niels da Vitoria Lobo, Mubarak Shah
    Human identification through body measurements. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:383-386 [Conf]
  90. Arafat Awajan
    Low-level natural language technique for arabic text processing. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:387-390 [Conf]
  91. King-Ip Lin, Ravikumar Kondadadi
    A word-based soft clustering algorithm for documents. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:391-394 [Conf]
  92. S. R. Subramanya
    A parallel algorithm for lossy DPCM coding of images. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:395-398 [Conf]
  93. Jungohn Yim, Gil Yong Kim, Young-Sung Son
    Media oriented video streaming flow control in Linux cluster server. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:399-404 [Conf]
  94. J. H. Andrian, C. A. Edmonds, K. Yen, J. P. Stephens
    Applications of adaptive segmentation and orthogonal expansion to non-stationary signal processing. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:405-408 [Conf]
  95. Athena Vakali, Constantina Stupa
    A QoS based disk subsystem. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:409-412 [Conf]
  96. Kang Yen, Ali Naqui, Jean Andrian
    Noise reduction in nonlinear time series using a library of wavelet bases. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:413-416 [Conf]
  97. Shawn Wang, Rex E. Gantenbein
    An enterprise e-tax solution. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:417-420 [Conf]
  98. Raja Kannappan, Vinu George, Thomas Philip
    Re-engineering web-based systems. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:421-424 [Conf]
  99. Jiang B. Liu
    Experiences in software development with different methodologies. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:425-428 [Conf]
  100. Freimut Bodendorf, Gabriele Saueressig
    Secure internet-based transactions for public services. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:429-432 [Conf]
  101. Wataru Matsumoto, Shingo Kashikawa, Takao Miura, Isamu Shioya
    Logical optimization for meta queries. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:433-436 [Conf]
  102. Haklin Kimm
    A distributed data distortion method for securing confidential data. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:437-440 [Conf]
  103. Djamal Benslimane
    Agent-based system for cooperative database. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:441-446 [Conf]
  104. Brajendra Panda, Rajesh Yalamanchili
    A model to detect multi-source information attacks. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:447-451 [Conf]
  105. Tsung-Chuan Huang, Slo-Li Chu
    A new analyzing approach for intelligent memory systems. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:452-457 [Conf]
  106. Hua Ma, Ashok K. Goel
    Simulation of GaAs MESFET devices using TCAD tools. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:458-461 [Conf]
  107. MoonSang Kwon, Yookun Cho
    A new kernel-level key management system for non-interactive processes. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:462-467 [Conf]
  108. Akiyoshi Wakatani
    Block allocation of large scale arrays in jukebox system. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:468-471 [Conf]
  109. J. Michael Meehan, David Ladiges
    Scaleable distributed apache www server. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:472-475 [Conf]
  110. B. Gupta, S. K. Banerjee, B. Liu
    A pseudo-synchronous rollforward recovery approach using basic checkpoints for distributed systems. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:476-480 [Conf]
  111. Mark Burgin, Damon Shing-Min Liu, Walter J. Karplus
    Branching computation for visualization in medical systems. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:481-484 [Conf]
  112. Behnam S. Arad, Hung-Ru Shih
    A pipelined processor suitable for a bus-based parallel architecture. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:485-488 [Conf]
  113. Daniela Marghitu, Jackson Lin, Jinghai Ma
    Improving the educational process by using IT solutions: Emphasizing pedagogy and technology. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:489-492 [Conf]
  114. Fengxiang Zhang, Rong Cheng
    The second generation CAI and Its research path. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:493-496 [Conf]
  115. Injoo Jeong, Martha W. Evens, Jong Young Kim
    Concept map based interactive intelligent tutoring system. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:497-500 [Conf]
  116. Wolfgang Kampichler, Karl M. Göschka
    End-to-end network performance measurement for voice transission feasibility. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:501-504 [Conf]
  117. Parimal Patel, Harish Maiya
    Implementation comparison of multicasting policies in an ATM switch. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:505-510 [Conf]
  118. Parimal Patel, Venkataramana Reddipalli
    Implementation of write relocatable coherency protocol in multiple processor architectures. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:511-516 [Conf]
  119. Charlie Yong-Sang Shim, Rex E. Gantenbein
    A methodology for developing a probabilistic security measure using a software reliability model. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:517-520 [Conf]
  120. Paniti Netinant, Constantinos Constantinides, Tzilla Elrad
    An aspect-oriented approach to supporting the design of system software. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:521-524 [Conf]
  121. Jaehyoun Kim, Sargon Hasso, C. Robert Carlson
    A design oriented approach to software maintenance. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:525-530 [Conf]
  122. Vladimir Zanev, Avram Eskenazi, Seong-Moo Yoo
    An approach to remote software project management and development. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:531-535 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002