Conferences in DBLP
Y. Z. Wang , C. Sahay , D. Zhu Internet-based system for remote monitoring of manufacturing operations. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:1-4 [Conf ] Jyhjong Lin , Yalei Chu , Huammi Tsao Analysis and design of web-based information systems with UML. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:5-8 [Conf ] Shin-Jer Yang , William Chung-Kung Yen The technology and application of FEDI on the internet. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:9-14 [Conf ] Xiaolin Dai , Carl G. Looney Rule-based image convolution for edge enhancement. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:15-17 [Conf ] Rami Qahwaji , Roger Green Detecting objects in digital images. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:18-21 [Conf ] Ching-Tang Hsieh , Feng-Jen Kuo People tracking algorithm using position correlation in discrete wavelet transform. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:22-24 [Conf ] Ben Carlson , Carl Looney A new method of image interpolation. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:25-28 [Conf ] Chester T. Trahan Programming patterns and structural reduction. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:29-34 [Conf ] Hoon Oh Application of a heuristic search to the deadlock avoidance algorithm which achieves the high concurrency. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:35-39 [Conf ] Bertrand Ibrahim , Honitriniela Randriamparany Execution semantics to integrate control flow and data flow. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:40-43 [Conf ] Honitriniela Randriamparany , Bertrand Ibrahim Seamless integration of control flow and data flow. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:44-47 [Conf ] William Mitchell Class assertions - an emerging factor in software engineering. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:48-52 [Conf ] Thomas Philip , Ravi Konda A model to use software agents during software life cycle. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:53-56 [Conf ] Leah Dawn Baker Cross , Mansour Zand Characteristics of object-oriented rearchitecture evaluation of methodologies. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:57-60 [Conf ] M. Burgin Topological algorithms. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:61-64 [Conf ] Fang-Chang Lin , Chien-Nan Kuo , Jyh-Fu Hwang A coordination-based cooperation environment for mobile agents. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:65-68 [Conf ] Gehan Weerasinghe , Lester Lipsky A distributed fault-tolerant asynchronous algorithm for performing N tasks. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:69-73 [Conf ] Jiman Hong , Sangsu Kim , Juwon Park , Taesoon Park , Heon Young Yeom , Yookun Cho An efficient checkpoint scheme based on memory profile and time series analysis. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:74-77 [Conf ] Shivakant Mishra , Shengxiang Gui Statistical analysis of security violations in computer software. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:78-81 [Conf ] Fatouh Ghareb , Ehab Y. Abdel Maksoud , Tahany A. Fergany , Reda A. Ammar Efficient complexity reduction approaches for hierarchical performance models. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:82-87 [Conf ] H. Arafat Ali , Tahany A. Fergany , Reda A. Ammar Evaluating software's power consumption. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:88-93 [Conf ] William I. Grosky , Peter L. Stanchev Object-oriented image database model. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:94-97 [Conf ] Laurent Amanton , Bruno Sadeg , Samia Saad-Bouzefrane Disconnection tolerance in soft real-time mobile databases. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:98-101 [Conf ] Ching-Ming Chao An approach to schema integration between object-oriented databases. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:102-107 [Conf ] G. K. Webb Database cost-benefit analysis: The case of quality control for a computer manufacturer. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:108-112 [Conf ] Shijun Qiu , Zhiyong Jia , Shuang Song , Shankaran Sitarama , Jialong Wu A scheme design expert system of dies. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:113-116 [Conf ] Ehab Abdelhafiz , Adel Said Elmaghraby , Mohamed F. Hassan A tool set for computer implementation of cutting stock algorithms. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:117-120 [Conf ] Charles Hand An improved autoassociative network for controlling autonomous robots. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:121-124 [Conf ] José Luis Hamkalo , A. Djordjalian , Bruno Cernuschi-Frías A shared-way set associative architecture for on-chip caches. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:125-128 [Conf ] David C. Pheanis , Jeffrey A. Tenney Data collection with vehicle-bus interface. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:129-132 [Conf ] George G. Gorbatenko A proposal for a new data model and its implications on I/O architecture. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:133-139 [Conf ] Jeffrey Espenschied , Eugene Lee , Ashok K. Goel Designing a GaAs-based floating-point multiplier. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:140-143 [Conf ] B. Shen , George Q. Huang , X. C. Wang , K. L. Mak Key technology in hogging of blanks with large-scale sculptured surfaces. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:144-147 [Conf ] Jerzy P. Szolomicki , Jeremi M. Sieczkowski Application of computer methods in structural masonry. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:148-151 [Conf ] Stuart Wylie , Masoud Bagheri , Suresh Chandra Numerical solution for thermal buckling in flat plates with square central cutouts. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:152-156 [Conf ] Srikanth Krishnamurthy , Ibrahim Zeid A framework to facilitate mobile data access in a manufacturing environment. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:157-160 [Conf ] Shawki Areibi , Matt Thompson A new model for macrocell partitioning. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:161-165 [Conf ] B. Gupta , S. K. Banerjee , Z. Wang An index-based checkpointing/recovery approach for distributed systems. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:166-170 [Conf ] Haesun K. Lee , Ilhyun Lee , Martha Evens Mixed scheduling of periodic and soft aperiodic tasks with reduced context switches. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:171-174 [Conf ] Wu Woan Kim , Hee-Sik Chun Dedicated bus system for the shared-memory multiprocessor. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:175-178 [Conf ] Hyun-Chul Kim , Hyo-Cheol Kim , Kee-Young Yoo Exploitation of functional parallelism in hierarchical task graph using thread. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:179-182 [Conf ] Dhigha Sekaran , L. L. Miller Developing a modern land records system. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:183-186 [Conf ] Hiroki Kusumoto , Yoshiyasu Takefuji A clustering algorithm for spectral image processing using self-organizing maps. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:187-191 [Conf ] Jong Young Kim , Martha W. Evens , Injoo Jeong , David Trace Generating concept-feature relationships for patient simulation using a textbook index. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:192-195 [Conf ] Hyo-Cheol Kim , Jeung-Seop Kim , Hyun-Chul Kim , Kee-Young Yoo Cross-correlation property for the public watermarking. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:196-199 [Conf ] Ching-Tang Hsieh , Yeh-Kuang Wu Image compression using layered JPEG-like image coder. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:200-203 [Conf ] W. K. Kong , D. Zhang Eyelash detection model for accurate iris segmentation. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:204-207 [Conf ] Souichi Oka , Yoshiyasu Takefuji The evaluation of new self-organization classification algorithms using magnetic resonance images. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:208-211 [Conf ] Yutaka Kuramochi , Kazumasa Shinjo A method of dynamically recovering feature dimensions for content-based image retrieval. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:212-216 [Conf ] Zhenyou Li , Carl G. Looney Pattern recognition comparisons with fuzzy clustering algorithms. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:217-220 [Conf ] Ching-Tang Hsieh , Kuo-Ming Hung , Shi-Dong Hou Wavelet based moment invariants feature extraction for handwritten numerals recognition. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:221-224 [Conf ] Rami Qahwaji , Roger Green Detecting faces in noisy images. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:225-228 [Conf ] Shijun Qiu , Alice M. Agogino , Shuang Song , Jia-Long Wu , Shankaran Sitarama A fusion of bayesian and fuzzy analysis for print faults diagnosis. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:229-232 [Conf ] Christos Anagnostopoulos , Ioannis Anagnostopoulos , Dimitrios D. Vergados , Eleftherios Kayafas , Vassilis Loumos , George I. Stassinopoulos A neural network and fuzzy logic system for face detection on RGB images. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:233-236 [Conf ] Liang-Yi Hwang , Mei-Ling Chiang , Ruei-Chuan Chang System and method using dual packet filtering for wireless network communication. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:237-240 [Conf ] Akira Funahashi , Michihiro Koibuchi , Akiya Jouraku , Hideharu Amano The impact of output selection function on adaptive routing. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:241-246 [Conf ] Richard T. Hurley , Wenying Feng Performance results on scheduling algorithms for broadcast information delivery systems. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:247-250 [Conf ] HyunCheul Shin , JongGoo Park Mobility scheme using dynamic circle location register in wireless communications. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:251-255 [Conf ] Su Jeong Byun , Won Don Lee , Sung Y. Shin , Chih-Cheng Hung The performance comparison between backpropagation and extended incremental network model on speaker verification. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:256-259 [Conf ] Daewon An , K. Wendy Tang , Petar M. Djuric Performance comparison of BNN and MPNN on proben1 database. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:260-263 [Conf ] Abdel-Hamid El-Kassas , Tomasz J. Cholewo , Adel Said Elmaghraby Applications of neural networks in socio-economic modeling. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:264-267 [Conf ] Ahmad Almonayyes , Hazem Raaft , Mohammed Almulla A learning mechanism to enhance the time efficiency of proving theorems. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:268-271 [Conf ] Patrick Augé , Brigitte Rozoy , T. Maurin , Roger Reynaud , Kamel Bouchefra Simulation and verification of an embedded system. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:272-275 [Conf ] Rong-Yuh Hwang , Ming-Hung Chiu The analysis and comparison for the software cache coherence schemes. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:276-279 [Conf ] Chad Peyton , Hamdy S. Soliman Modeling technological limitations in all-optical networks. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:280-283 [Conf ] Jungohn Yim , Gil Yong Kim , Young-Sung Son Cooperative caching framework of VOD using P2P technology. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:284-289 [Conf ] Seong-Moo Yoo , Vladimir Zanev Maintaining maximal submeshes in torus-connected multi-computers. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:290-293 [Conf ] Rex E. Gantenbein , Chang Oan Sung Integrating knowledge discovery and spatial data visualization for health care research. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:294-297 [Conf ] Hussien H. Aly , Yousry Taha , Ashraf A. Amr Mining association rules. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:298-303 [Conf ] Junping Sun Rule derivation from uncertain data. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:304-309 [Conf ] Frederick Ferguson A computer aided design tool for the identification and linkage of safety-critical factors to their mitigating requirements. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:310-313 [Conf ] Chengqi Zhang , Zili Zhang Approaches to implementing decision aggregation in multi-agent systems. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:314-317 [Conf ] Chengqi Zhang , Zili Zhang Post-processing of multimedia information - concents, problems, and techniques. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:318-321 [Conf ] Raj Sekhar Pamula Permutation routing and fault tolerance in omega plus networks. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:322-324 [Conf ] William Chung-Kung Yen , Shin-Jer Yang The link-orientation problem on weighted networks. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:325-329 [Conf ] Hamdy S. Soliman Emulation of task flow distributed system over TCP/IP. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:330-333 [Conf ] Kazuma Wakabayashi , Kazumasa Oida , Shigeru Saito Performance evaluation of routing algorithms from the viewpoint of audio stream application users. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:334-337 [Conf ] Sandy Shaw , C. Anthony Hunt A novel method for visualizing similarity in gene expression and other large datasets. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:338-341 [Conf ] Donna L. Hudson , Maurice E. Cohen Consequential reasoning in knowledge-based systems. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:342-345 [Conf ] Amina Qutub , Alex Lancaster , C. Anthony Hunt Therapeutic engineering: Models of individual variability in drug systems. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:346-349 [Conf ] Maurice E. Cohen , Donna L. Hudson A hybrid system for diagnosis of dementia. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:350-353 [Conf ] Scott E. Hudson Informatics techniques in bioinorganic chemistry. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:354-357 [Conf ] Manuel Penaloza , Antonette M. Logar , Joseph Johnson , Michael Boucher A Java unit and integration testing tool. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:358-361 [Conf ] Richard Li , Anthony S. Fong , H. W. Chun , C. H. Tam Dynamic memory allocation behavior in Java programs. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:362-365 [Conf ] Jorge Toro , Jacob Furst , Karen Alkoby , Roymieco Carter , Juliet Christopher , Brock Craft , Mary Jo Davidson , Damien Hinkle , Brian Konie , Glenn Lancaster , Steve Luecking , Ashley Morris , John McDonald , Eric Sedgwick , Noriko Tomuro , Rosalee Wolfe A graphical environment for transcription of american sign language. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:366-369 [Conf ] Narayan C. Debnath , Mohammad N. Islam , Roger Y. Lee , Hamid R. Abachi Generating test cases for a three variable function. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:370-373 [Conf ] Saleem Abuleil , Martha Evens Extracting information about proper nouns from arabic newspaper text. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:374-378 [Conf ] S. R. Subramanya A hybrid scheme for hierarchical coding of images. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:379-382 [Conf ] David B. Bracewell , Niels da Vitoria Lobo , Mubarak Shah Human identification through body measurements. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:383-386 [Conf ] Arafat Awajan Low-level natural language technique for arabic text processing. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:387-390 [Conf ] King-Ip Lin , Ravikumar Kondadadi A word-based soft clustering algorithm for documents. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:391-394 [Conf ] S. R. Subramanya A parallel algorithm for lossy DPCM coding of images. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:395-398 [Conf ] Jungohn Yim , Gil Yong Kim , Young-Sung Son Media oriented video streaming flow control in Linux cluster server. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:399-404 [Conf ] J. H. Andrian , C. A. Edmonds , K. Yen , J. P. Stephens Applications of adaptive segmentation and orthogonal expansion to non-stationary signal processing. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:405-408 [Conf ] Athena Vakali , Constantina Stupa A QoS based disk subsystem. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:409-412 [Conf ] Kang Yen , Ali Naqui , Jean Andrian Noise reduction in nonlinear time series using a library of wavelet bases. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:413-416 [Conf ] Shawn Wang , Rex E. Gantenbein An enterprise e-tax solution. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:417-420 [Conf ] Raja Kannappan , Vinu George , Thomas Philip Re-engineering web-based systems. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:421-424 [Conf ] Jiang B. Liu Experiences in software development with different methodologies. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:425-428 [Conf ] Freimut Bodendorf , Gabriele Saueressig Secure internet-based transactions for public services. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:429-432 [Conf ] Wataru Matsumoto , Shingo Kashikawa , Takao Miura , Isamu Shioya Logical optimization for meta queries. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:433-436 [Conf ] Haklin Kimm A distributed data distortion method for securing confidential data. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:437-440 [Conf ] Djamal Benslimane Agent-based system for cooperative database. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:441-446 [Conf ] Brajendra Panda , Rajesh Yalamanchili A model to detect multi-source information attacks. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:447-451 [Conf ] Tsung-Chuan Huang , Slo-Li Chu A new analyzing approach for intelligent memory systems. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:452-457 [Conf ] Hua Ma , Ashok K. Goel Simulation of GaAs MESFET devices using TCAD tools. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:458-461 [Conf ] MoonSang Kwon , Yookun Cho A new kernel-level key management system for non-interactive processes. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:462-467 [Conf ] Akiyoshi Wakatani Block allocation of large scale arrays in jukebox system. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:468-471 [Conf ] J. Michael Meehan , David Ladiges Scaleable distributed apache www server. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:472-475 [Conf ] B. Gupta , S. K. Banerjee , B. Liu A pseudo-synchronous rollforward recovery approach using basic checkpoints for distributed systems. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:476-480 [Conf ] Mark Burgin , Damon Shing-Min Liu , Walter J. Karplus Branching computation for visualization in medical systems. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:481-484 [Conf ] Behnam S. Arad , Hung-Ru Shih A pipelined processor suitable for a bus-based parallel architecture. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:485-488 [Conf ] Daniela Marghitu , Jackson Lin , Jinghai Ma Improving the educational process by using IT solutions: Emphasizing pedagogy and technology. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:489-492 [Conf ] Fengxiang Zhang , Rong Cheng The second generation CAI and Its research path. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:493-496 [Conf ] Injoo Jeong , Martha W. Evens , Jong Young Kim Concept map based interactive intelligent tutoring system. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:497-500 [Conf ] Wolfgang Kampichler , Karl M. Göschka End-to-end network performance measurement for voice transission feasibility. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:501-504 [Conf ] Parimal Patel , Harish Maiya Implementation comparison of multicasting policies in an ATM switch. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:505-510 [Conf ] Parimal Patel , Venkataramana Reddipalli Implementation of write relocatable coherency protocol in multiple processor architectures. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:511-516 [Conf ] Charlie Yong-Sang Shim , Rex E. Gantenbein A methodology for developing a probabilistic security measure using a software reliability model. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:517-520 [Conf ] Paniti Netinant , Constantinos Constantinides , Tzilla Elrad An aspect-oriented approach to supporting the design of system software. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:521-524 [Conf ] Jaehyoun Kim , Sargon Hasso , C. Robert Carlson A design oriented approach to software maintenance. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:525-530 [Conf ] Vladimir Zanev , Avram Eskenazi , Seong-Moo Yoo An approach to remote software project management and development. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:531-535 [Conf ]