The SCEAS System
Navigation Menu

Conferences in DBLP

International Conference on Information Technology: New Generations (itng)
2008 (conf/itng/2008)


  1. Combinatorial Test Case Selection with Markovian Usage Models. [Citation Graph (, )][DBLP]


  2. Improving Pattern-Based LTL Formulas for Automata Model Checking. [Citation Graph (, )][DBLP]


  3. Performance Analysis of the OGSA-DAI 3.0 Software. [Citation Graph (, )][DBLP]


  4. Improving Model Driven Architecture with Requirements Models. [Citation Graph (, )][DBLP]


  5. A Feature Model of E-Government Systems Integrated with Formal Specifications. [Citation Graph (, )][DBLP]


  6. Towards Improving Visual-Facial Emotion Recognition through Use of Complementary Keyboard-Stroke Pattern Information. [Citation Graph (, )][DBLP]


  7. Execution Trace Visualization in a 3D Space. [Citation Graph (, )][DBLP]


  8. Tools for MDA Software Development: Evaluation Criteria and Set of Desirable Features. [Citation Graph (, )][DBLP]


  9. A Minimalist Visual Notation for Design Patterns and Antipatterns. [Citation Graph (, )][DBLP]


  10. Business Process Development in Semantically-Enriched Environment. [Citation Graph (, )][DBLP]


  11. Towards a Model Driven Autonomic Management System. [Citation Graph (, )][DBLP]


  12. Boundary Value Analysis Using Divide-and-Rule Approach. [Citation Graph (, )][DBLP]


  13. Test Generation with DHT Networks. [Citation Graph (, )][DBLP]


  14. Modeling Variability in Business Process Models Using UML. [Citation Graph (, )][DBLP]


  15. Streaming Dyadic Boolean Operations. [Citation Graph (, )][DBLP]


  16. Development of a New Software Product from a Classroom Project. [Citation Graph (, )][DBLP]


  17. Analysis of RSA over Gaussian Integers Algorithm. [Citation Graph (, )][DBLP]


  18. Protection and Recovery of Disk Encryption Key Using Smart Cards. [Citation Graph (, )][DBLP]


  19. A FPGA Coprocessor for the Cryptographic Tate Pairing over Fp. [Citation Graph (, )][DBLP]


  20. An Efficient Window-Based Countermeasure to Power Analysis of ECC Algorithms. [Citation Graph (, )][DBLP]


  21. An Efficient RSA Public Key Encryption Scheme. [Citation Graph (, )][DBLP]


  22. Resource Efficiency of Instruction Set Extensions for Elliptic Curve Cryptography. [Citation Graph (, )][DBLP]


  23. ULTRA GRIDSEC: Peer-to-Peer Computational Grid Middleware Security Using High Performance Symmetric Key Cryptography. [Citation Graph (, )][DBLP]


  24. Automating Contract Negotiation. [Citation Graph (, )][DBLP]


  25. A Framework for Agent-Based Trust Management in Online Auctions. [Citation Graph (, )][DBLP]


  26. A Multi-Issue Negotiation Mechanism for Bounded Rational Negotiators. [Citation Graph (, )][DBLP]


  27. Efficient Indexing and Storage Algorithm for Visual Databases. [Citation Graph (, )][DBLP]


  28. Fusion of Face and Gait for Automatic Human Recognition. [Citation Graph (, )][DBLP]


  29. Expert-Driven Knowledge Discovery. [Citation Graph (, )][DBLP]


  30. Feature Selection for Document Type Classification. [Citation Graph (, )][DBLP]


  31. A Model Based Testing Technique to Test Web Applications Using Statecharts. [Citation Graph (, )][DBLP]


  32. A Method to Test Component Off-the-Shelf (COTS) Used in Safety Critical Systems. [Citation Graph (, )][DBLP]


  33. Mining Medical Databases with Modified Gini Index Classification. [Citation Graph (, )][DBLP]


  34. Automated Diagnosis System to Support Colon Cancer Treatment: MATCH. [Citation Graph (, )][DBLP]


  35. Development of Context-Aware Systems to Support Human-Human Communication and Collaboration. [Citation Graph (, )][DBLP]


  36. An Overlay Discovery Algorithm towards a Pure Distributed Communication System. [Citation Graph (, )][DBLP]


  37. A Framework for IT as a Utility. [Citation Graph (, )][DBLP]


  38. Observations on Compressing Text Files of Varying Length. [Citation Graph (, )][DBLP]


  39. A Distributed Shared Parallel IO System for HPC. [Citation Graph (, )][DBLP]


  40. Sorting on Partially Connected Mesh Networks. [Citation Graph (, )][DBLP]


  41. A Scalable Proof Methodology for RISC Processor Designs: A Functional Approach. [Citation Graph (, )][DBLP]


  42. Global/Local Hashed Perceptron Branch Prediction. [Citation Graph (, )][DBLP]


  43. Deadlock-Free Multi-Path Routing for Torus-Based NoCs. [Citation Graph (, )][DBLP]


  44. Design and Implementation of a Parameterized NoC Router and its Application to Build PRDT-Based NoCs. [Citation Graph (, )][DBLP]


  45. A Technique for Accelerating Characteristic 2 Elliptic Curve Cryptography. [Citation Graph (, )][DBLP]


  46. A Meta Hardware Description Language Melasy for Model-Checking Systems. [Citation Graph (, )][DBLP]


  47. Hardware/Software Codesign — Pedagogy for the Industry. [Citation Graph (, )][DBLP]


  48. The Confirmatory Research on Representative Method of Knowledge Work Process. [Citation Graph (, )][DBLP]


  49. Collaborative Computing Using the Atom Publishing Protocol. [Citation Graph (, )][DBLP]


  50. Secure Web-Based Sharing of Health Information Services Using Ad-Hoc Dynamic Coalitions. [Citation Graph (, )][DBLP]


  51. Implementation of Collaborative Control in Supply Chain Management by Using DA and Workflow Technology. [Citation Graph (, )][DBLP]


  52. Search Engines' Help Systems. [Citation Graph (, )][DBLP]


  53. Metasearch Engines and Information Retrieval: Computational Complexity of Ranking Multiple Search Results. [Citation Graph (, )][DBLP]


  54. A Knowledge-Based Question Answering System for B2C eCommerce. [Citation Graph (, )][DBLP]


  55. A Unified View of Information-Theoretic Aspects of Cognitive Radio. [Citation Graph (, )][DBLP]


  56. Error Forecasting Schemes of Error Correction at Receiver. [Citation Graph (, )][DBLP]


  57. Research and Design for Unify XML-Based Management System Framework. [Citation Graph (, )][DBLP]


  58. Hybrid Approach for Spectrum Bidding in Wireless Communications for Maximizing the Profit. [Citation Graph (, )][DBLP]


  59. Authenticated Secure Group Communication using Broadcast Encryption Key Computation. [Citation Graph (, )][DBLP]


  60. On the Properties of Adaptive Additive Increase. [Citation Graph (, )][DBLP]


  61. Detecting Primary Signals for Efficient Utilization of Spectrum Using Q-Learning. [Citation Graph (, )][DBLP]


  62. Peer-to-Peer Application in Mobile Cellular Systems. [Citation Graph (, )][DBLP]


  63. Enhancing Mobile E-Witness with Access Point Selection Policies. [Citation Graph (, )][DBLP]


  64. Real-Time Implementation of Fault Detection in Wireless Sensor Networks Using Neural Networks. [Citation Graph (, )][DBLP]


  65. Application Based Meta Tagging of Network Connections. [Citation Graph (, )][DBLP]


  66. Optimized Routing Based on Mobility Prediction in Wireless Mobile Adhoc Networks for Urban Area. [Citation Graph (, )][DBLP]


  67. Setup Planning and Operation Sequencing Using Neural Network and Genetic Algorithm. [Citation Graph (, )][DBLP]


  68. Honeycomb: A Novel Approach for Construction of Stable ALM Overlay. [Citation Graph (, )][DBLP]


  69. Transmitting Range Assignments Using Steiner Tree in Ad Hoc Wireless Networks. [Citation Graph (, )][DBLP]


  70. Agent-Based Shop-Floor Control System in a Dynamic Environment. [Citation Graph (, )][DBLP]


  71. Intelligent Quality Performance Assessment for E-Banking Security using Fuzzy Logic. [Citation Graph (, )][DBLP]


  72. Looking at the Class Associative Classification Training Algorithm. [Citation Graph (, )][DBLP]


  73. Reverse Engineering Functional Classes: A Middleware Case Study. [Citation Graph (, )][DBLP]


  74. A Seamless Modeling Approach for Service-Oriented Information Systems. [Citation Graph (, )][DBLP]


  75. A Case Study in Partial Parsing Unstructured Text. [Citation Graph (, )][DBLP]


  76. The State of Metrics in Software Industry. [Citation Graph (, )][DBLP]


  77. Semantic Web for E-Government Service Delivery Integration. [Citation Graph (, )][DBLP]


  78. Managing Process Interaction in IS Development Projects. [Citation Graph (, )][DBLP]


  79. Fault-Based Web Services Testing. [Citation Graph (, )][DBLP]


  80. Using Trustworthy and Referee Agents to Secure Multi-Agent Systems. [Citation Graph (, )][DBLP]


  81. A Conceptual Framework for Application Comprehension. [Citation Graph (, )][DBLP]


  82. Measuring the Complexity of Traces Using Shannon Entropy. [Citation Graph (, )][DBLP]


  83. Graphical Browsing of Email Data: An Empirical Investigation. [Citation Graph (, )][DBLP]


  84. Towards the Development of XML Benchmark for XML Updates. [Citation Graph (, )][DBLP]


  85. Incorporating Product Development in CS Curriculum. [Citation Graph (, )][DBLP]


  86. HOMER: Home-Based Object-Relational Medical Electronic Record. [Citation Graph (, )][DBLP]


  87. A Six Sigma Support Information System: Process Improvement at a Thai University. [Citation Graph (, )][DBLP]


  88. Establishing a Consistent Curriculum in a Distributed Campus Environment: Lessons Learned while Moving Towards Accreditation. [Citation Graph (, )][DBLP]


  89. Maple in Mathematics. [Citation Graph (, )][DBLP]


  90. Integrating Direct3D Programming into Computer Science Curriculum. [Citation Graph (, )][DBLP]


  91. A Production Support Infrastructure for Live Student Projects. [Citation Graph (, )][DBLP]


  92. Towards a Formal Verification of an Authentication Protocol Using Non-Monotonic Logic. [Citation Graph (, )][DBLP]


  93. An Improved Role-Based Workflow Access Control Model. [Citation Graph (, )][DBLP]


  94. Encryption as an Effective Tool in Reducing Wireless LAN Vulnerabilities. [Citation Graph (, )][DBLP]


  95. A New Image Steganography Based on 2k Correction and Edge-Detection. [Citation Graph (, )][DBLP]


  96. Palette and Index Change Technique for Steganoraphy Based on an Indexcolor. [Citation Graph (, )][DBLP]


  97. Cryptanalysis of Wang et al.'s Remote User Authentication Scheme Using Smart Cards. [Citation Graph (, )][DBLP]


  98. Security Issues of Collaborative Review System. [Citation Graph (, )][DBLP]


  99. Security in the New Era of Telecommunication: Threats, Risks and Controls of VoIP. [Citation Graph (, )][DBLP]


  100. Intrusion Techniques: Comparative Study of Network Intrusion Detection Systems. [Citation Graph (, )][DBLP]


  101. A Digital Identity Management Service Model. [Citation Graph (, )][DBLP]


  102. EARS: Efficient Entity Authentication in Remote Systems. [Citation Graph (, )][DBLP]


  103. Multi-User FPGA — An Efficient Way of Managing Expensive FPGA Resources Using TCP/IP, Wi-Max/ Wi-Fi in a Secure Network Environment. [Citation Graph (, )][DBLP]


  104. Personalized Negotiation Based on Individualization: Incorporating Personalization into Peer-to-Peer System. [Citation Graph (, )][DBLP]


  105. Simon's Intelligence Phase for Security Risk Assessment in Web Applications. [Citation Graph (, )][DBLP]


  106. A Comparative Analysis of Anti-Malware Software, Patch Management, and Host-Based Firewalls in Preventing Malware Infections on Client Computers. [Citation Graph (, )][DBLP]


  107. DHPA: A New Distributed High Performance Architecture for Space Environment Modeling and Simulation. [Citation Graph (, )][DBLP]


  108. Using Built-In Interoperability with Self-Adaptive Components for RTS. [Citation Graph (, )][DBLP]


  109. Proposing a Formal Method to Reduce RTS Logical Model Complexity. [Citation Graph (, )][DBLP]


  110. Efficient Monitoring of Embedded Real-Time Systems. [Citation Graph (, )][DBLP]


  111. Performance Analysis of Cache and Scratchpad Memory in an Embedded High Performance Processor. [Citation Graph (, )][DBLP]


  112. Formulating Pseudo-Natural Language. [Citation Graph (, )][DBLP]


  113. Structural Features for Recognizing Degraded Printed Gurmukhi Script. [Citation Graph (, )][DBLP]


  114. English to Turkish Example-Based Machine Translation with Synchronous SSTC. [Citation Graph (, )][DBLP]


  115. A Suffix Based Part-of-Speech Tagger for Turkish. [Citation Graph (, )][DBLP]


  116. Exploiting Wikipedia for Directional Inferential Text Similarity. [Citation Graph (, )][DBLP]


  117. GlycoVault: A Bioinformatics Infrastructure for Glycan Pathway Visualization, Analysis and Modeling. [Citation Graph (, )][DBLP]


  118. The Impact of Business Process Outsourcing on Firm Performance. [Citation Graph (, )][DBLP]


  119. A Search-Free Intersection Algorithm. [Citation Graph (, )][DBLP]


  120. An Experiment Study on Text Transformation for Compression Using Stoplists and Frequent Words. [Citation Graph (, )][DBLP]


  121. Abductive Reasoning for Keyword Recovering in Semantic-Based Keyword Extraction. [Citation Graph (, )][DBLP]


  122. Adaptive Transport Protocols in Multi Agent System. [Citation Graph (, )][DBLP]


  123. A Two-Layered Deployment Scheme for Wireless Sensor Network based Location Tracking. [Citation Graph (, )][DBLP]


  124. Chord-Based Key Establishment Schemes for Sensor Networks. [Citation Graph (, )][DBLP]


  125. SNMP—Proxy for Wireless Sensor Network. [Citation Graph (, )][DBLP]


  126. A Secure Group Key Management Scheme for Sensor Networks. [Citation Graph (, )][DBLP]


  127. Processing Ad-Hoc Queries in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  128. Overlapped Layers for Prolonging Network Lifetime in Multi-Hop Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  129. RCCT: Robust Clustering with Cooperative Transmission for Energy Efficient Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  130. A Vector Transform Application on a Coding Algorithm Based on the Polarity of Speech Signal. [Citation Graph (, )][DBLP]


  131. Energy Estimation between Adjacent Formant Frequencies to Identify Speaker's Gender. [Citation Graph (, )][DBLP]


  132. Novel Multiple Spatial Watermarking Technique in Color Images. [Citation Graph (, )][DBLP]


  133. Fusion of Hand Based Biometrics Using Particle Swarm Optimization. [Citation Graph (, )][DBLP]


  134. Computer Aided Detection of Suspicious Masses and Micro-Calcifications. [Citation Graph (, )][DBLP]


  135. Watermarking: A New Approach. [Citation Graph (, )][DBLP]


  136. *Miner: A Suit of Classifiers for Spatial, Temporal, Ancillary, and Remote Sensing Data Mining. [Citation Graph (, )][DBLP]


  137. A New Human Interactive Proofs System for Deaf Persons. [Citation Graph (, )][DBLP]


  138. Strategic KM, Innovation and Performance. [Citation Graph (, )][DBLP]


  139. User Knowledge Requirement Model and its Hybrid Evolution Algorithm. [Citation Graph (, )][DBLP]


  140. A Research on Predicting the Operation Function for the Workflow-Based Knowledge Management Software. [Citation Graph (, )][DBLP]


  141. Knowledge Articulation Method Using Design Data History. [Citation Graph (, )][DBLP]


  142. An Ontology-Based Knowledge System for Supporting Position and Classification of Co-Branding Strategy. [Citation Graph (, )][DBLP]


  143. Incentive-Based Technology Start-Up Program for Undergraduate Students. [Citation Graph (, )][DBLP]


  144. Instructional-Design Theories Applied on a Web-Based Learning Application. [Citation Graph (, )][DBLP]


  145. Study on Customer Desired Value Change in a Business to Consumer Market. [Citation Graph (, )][DBLP]


  146. Study of Multi-Agent Task Model Based on Product Structure Breakdown. [Citation Graph (, )][DBLP]


  147. On the Properties of System-Wide Responsive Behavior. [Citation Graph (, )][DBLP]


  148. A Note on Algebraic Hypercube Colorings. [Citation Graph (, )][DBLP]


  149. An Analysis Framework of Factors Influencing China Software and Information Service Offshore Outsourcing. [Citation Graph (, )][DBLP]


  150. Resource Usage Policy Specification for Managing Application Resources. [Citation Graph (, )][DBLP]


  151. An Efficient Technique for Distance Computation in Road Networks. [Citation Graph (, )][DBLP]


  152. Vehicle Recognition Using Contourlet Transform and SVM. [Citation Graph (, )][DBLP]


  153. A Decision Support System for Performance Appraisal. [Citation Graph (, )][DBLP]


  154. Hamiltonicity of Simplicial-Connected Graphs: An Algorithm Based on Clique Decomposition. [Citation Graph (, )][DBLP]


  155. Information Assurance and Secure Streaming Algorithm Based on Cubic Roots of Integers. [Citation Graph (, )][DBLP]


  156. Mimicry Attack on Strategy-Based Behavioral Biometric. [Citation Graph (, )][DBLP]


  157. FES: A System for Combining Face, Ear and Signature Biometrics Using Rank Level Fusion. [Citation Graph (, )][DBLP]


  158. Distributed Authentication Systems Enhanced by Quantum Protocols. [Citation Graph (, )][DBLP]


  159. Gait Recognition Using Wavelet Transform. [Citation Graph (, )][DBLP]


  160. Effects of Parameter Improvement Mechanisms for Intelligent E-Learning Systems. [Citation Graph (, )][DBLP]


  161. A Blocking Scheme for Identification of Components and Sub-Components of Semi-Structured E-Documents. [Citation Graph (, )][DBLP]


  162. An Innovative Framework for the New Generation of SCORM 2004 Conformant E-Learning Systems. [Citation Graph (, )][DBLP]


  163. Developing a Novel Framework for Effective Use of Implicit Feedback in Adaptive e-Learning. [Citation Graph (, )][DBLP]


  164. Decision Support Models for Personalized Course Composition with a Focus on Learning Styles. [Citation Graph (, )][DBLP]


  165. Learning Techniques to Train Neural Networks as a State Selector in Direct Power Control of DSTATCOM for Voltage Flicker Mitigation. [Citation Graph (, )][DBLP]


  166. Mobile User Needs: Efficient Transactions. [Citation Graph (, )][DBLP]


  167. Mobile Voice Access in Social Networking Systems. [Citation Graph (, )][DBLP]


  168. Optimization of WAMDAS: A Web Service-Based Wireless Alarm Monitoring and Data Acquisition System for Pharmaceutical Plants. [Citation Graph (, )][DBLP]


  169. Implementing and Validating an Environmental and Health Monitoring System. [Citation Graph (, )][DBLP]


  170. A Trust Evaluation Method for Node Cooperation in Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]


  171. Research of Multi-Path Routing Protocol Based on Parallel Ant Colony Algorithm Optimization in Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]


  172. Scalable Video Transmission for a Surveillance System. [Citation Graph (, )][DBLP]


  173. A Near-Zero Run-Time Energy Overhead within a Computation Outsourcing Framework for Energy Management in Mobile Devices. [Citation Graph (, )][DBLP]


  174. A Self-Healing Plug-in Parser for NMEA Streams. [Citation Graph (, )][DBLP]


  175. Stable and Energy Efficient Routing for Mobile Adhoc Networks. [Citation Graph (, )][DBLP]


  176. Research on Author’s Semantic Similarity Based on Collaborative Network. [Citation Graph (, )][DBLP]


  177. Delay in a Discrete-Time Queueing Model with Batch Arrivals and Batch Services. [Citation Graph (, )][DBLP]


  178. Multicast Using Static Trees. [Citation Graph (, )][DBLP]


  179. System Content and Packet Delay in Discrete-Time Queues with Session-Based Arrivals. [Citation Graph (, )][DBLP]


  180. Flow Loss Characteristics in the Presence of Correlated Background Traffic. [Citation Graph (, )][DBLP]


  181. A Hierarchical Queueing Model for Streaming Video over Multi-Hop Wireless Networks. [Citation Graph (, )][DBLP]


  182. System-Level Modeling and Simulation of Uplink WCDMA. [Citation Graph (, )][DBLP]


  183. Modeling Disruption Tolerant Networks with Random Geographical Barriers. [Citation Graph (, )][DBLP]


  184. Internet Filtering and Censorship. [Citation Graph (, )][DBLP]


  185. Parallel FFT Algorithms on Network-on-Chips. [Citation Graph (, )][DBLP]


  186. On Power Dissipation in Information Processing. [Citation Graph (, )][DBLP]


  187. Programmable Logic Gates for Optical Processing. [Citation Graph (, )][DBLP]


  188. Performance Impact of Task-to-Task Communication Protocol in Network-on-Chip. [Citation Graph (, )][DBLP]


  189. Spin Wave Logic Circuit on Silicon Platform. [Citation Graph (, )][DBLP]


  190. Using Domain Specific Question Answering Technique for Automatic Railways Inquiry on Mobile Phone. [Citation Graph (, )][DBLP]


  191. Adaptive Visual Tracking Using Particle Filter. [Citation Graph (, )][DBLP]


  192. Hardware Synthesis for Reconfigurable Heterogeneous Pipelined Accelerators. [Citation Graph (, )][DBLP]


  193. Pipelined Bus-Invert Coding for FPGAs Driving High-Speed DDR-Channels. [Citation Graph (, )][DBLP]


  194. A Study of the Structure of Chinese Customer Satisfaction in a Web-Based Shopping Environment. [Citation Graph (, )][DBLP]


  195. Solutions to the WLAN and Bluetooth Interference. [Citation Graph (, )][DBLP]


  196. A Node Allocation Algorithm for Parallel Applications. [Citation Graph (, )][DBLP]


  197. Variable Block Size Architecture for Loops. [Citation Graph (, )][DBLP]


  198. Increasing Additive Noise Removal in Speech Processing Using Spectral Subtraction. [Citation Graph (, )][DBLP]


  199. CoLeP: An Agent-Based Collaborative System for Pervasive Learning. [Citation Graph (, )][DBLP]


  200. Applying Semantic Web Services to Web-Based IS and Applications. [Citation Graph (, )][DBLP]


  201. Hierarchy-Driven Approach for Attack Patterns in Software Security Education. [Citation Graph (, )][DBLP]


  202. Knowledge-Based Baseline Detection and Optimal Thresholding for Words Segmentation in Efficient Pre-Processing of Handwritten Arabic Text. [Citation Graph (, )][DBLP]


  203. Biological Research Based on Sensor Networks. [Citation Graph (, )][DBLP]


  204. A Novel Location-Aided Routing Algorithm for MANETs. [Citation Graph (, )][DBLP]


  205. A High Performance Strategy for Constructing Dynamic MIB. [Citation Graph (, )][DBLP]


  206. Towards a Specification Prototype for Hierarchy-Driven Attack Patterns. [Citation Graph (, )][DBLP]


  207. An E-Government Platform Based on Multi-Tier Architecture. [Citation Graph (, )][DBLP]


  208. Compiled Code Compression for Embedded Systems Using Evolutionary Computing. [Citation Graph (, )][DBLP]


  209. Quality Driven Web Service Selection and Ranking. [Citation Graph (, )][DBLP]


  210. Prototype Generation from Ontology Charts. [Citation Graph (, )][DBLP]


  211. Incorporating Object-Orientedness in Transformations from Live Sequence Charts to Colored Petri Nets. [Citation Graph (, )][DBLP]


  212. Novel Window Functions for Digital Filters. [Citation Graph (, )][DBLP]


  213. A Coarse Grain Multicomputer Algorithm Solving the Optimal Binary Search Tree Problem. [Citation Graph (, )][DBLP]


  214. Cryptosystem Based on Extraction of Square Roots of Complex Integers. [Citation Graph (, )][DBLP]


  215. Permutation Routing in All-Optical Multistage Clos Network. [Citation Graph (, )][DBLP]


  216. Artificial Intelligence in Sports Prediction. [Citation Graph (, )][DBLP]


  217. Distributed Key Management Technique for Reliable Secure Group Communication. [Citation Graph (, )][DBLP]


  218. A Content-Based Multimedia Retrieval System Base on MPEG-7 Metadata Schema. [Citation Graph (, )][DBLP]


  219. Reversible Network Iterative Construct Method Based on the Cascade Operation. [Citation Graph (, )][DBLP]


  220. Evaluation of a Middleware System for Accessing Digital Music Libraries in Mobile Services. [Citation Graph (, )][DBLP]


  221. Analysis of the Transient Delay in a Discrete-Time Buffer with Batch Arrivals. [Citation Graph (, )][DBLP]


  222. Data Compression for Emitter Location Finding in Sensor Networks. [Citation Graph (, )][DBLP]


  223. Design of the Next Generation Military Network Management System Based on NETCONF. [Citation Graph (, )][DBLP]


  224. Mobile Agents in Heterogeneous Database Environment for Emergency Healthcare System. [Citation Graph (, )][DBLP]


  225. Gradient and Principal Component Analysis Based Texture Recognition System: A Comparative Study. [Citation Graph (, )][DBLP]


  226. Utilizing User Behaviors with Semantic Metadata. [Citation Graph (, )][DBLP]


  227. Data/Information Lifecycle Management: A Solution for Taming Data Beast. [Citation Graph (, )][DBLP]


  228. Plastic Fiber Optic Simulations. [Citation Graph (, )][DBLP]


  229. Advanced Collage CAPTCHA. [Citation Graph (, )][DBLP]


  230. A New Congestion Control Algorithm Based on RBFNN. [Citation Graph (, )][DBLP]


  231. Very Fast Multi Operand Addition Method by Bitwise Subtraction. [Citation Graph (, )][DBLP]


  232. Security Threats on EPC Based RFID Systems. [Citation Graph (, )][DBLP]


  233. An Improved Algorithm for the Evaluation of Alternating Fixpoint Expressions in the mu-Calculus. [Citation Graph (, )][DBLP]


  234. A Set Associative Cache Model with Energy Saving. [Citation Graph (, )][DBLP]


  235. Transformation Matrix System for Reducing the Computational Complexity of Wireless Multi-User Receivers for DS-CDMA Systems. [Citation Graph (, )][DBLP]


  236. Modularization of the UML Metamodel Using Model Slicing. [Citation Graph (, )][DBLP]


  237. On Formal Description of Synchronization Requirements in Multimedia Systems. [Citation Graph (, )][DBLP]


  238. User Modelling in a Collaborative Learning Environment for UML. [Citation Graph (, )][DBLP]


  239. From Use Cases to Framelets for Building Application Frameworks. [Citation Graph (, )][DBLP]


  240. ArmSim: A Complete System Simulation Environment of the ARM Embedded System. [Citation Graph (, )][DBLP]


  241. Classification of Dynamic Load Balancing Strategies in a Network of Workstations. [Citation Graph (, )][DBLP]


  242. Online Examination. [Citation Graph (, )][DBLP]


  243. An Adaptive Configuration for Agent-Based Supply Network. [Citation Graph (, )][DBLP]


  244. Privacy Concerns of Semantic Web. [Citation Graph (, )][DBLP]


  245. FPGA Based Implementation of Robust Watermarking System. [Citation Graph (, )][DBLP]


  246. Database Support for Discovering Patterns in Large Datasets Collected from Multiple Sensors. [Citation Graph (, )][DBLP]


  247. A Parallel Steiner Tree Construction on the Server-Client Model of Computation. [Citation Graph (, )][DBLP]


  248. Reliable Metal-Fill Monitoring System Using Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  249. Investigation into the Creation and Application of a Composite Application Software Development Process Framework (CASDPF). [Citation Graph (, )][DBLP]


  250. Kernel-Based Speaker Clustering for Rapid Speaker Adaptation. [Citation Graph (, )][DBLP]


  251. AOP Maintains an Independent Coordinate System. [Citation Graph (, )][DBLP]


  252. Comparing Source Codes Generated by CASE Tools with Hand Coded. [Citation Graph (, )][DBLP]


  253. Network-Based EDM Learning Framework in Precision Manufacturing Engineering. [Citation Graph (, )][DBLP]


  254. Secured and Lossless Watermarking Technique for Patent Infringement. [Citation Graph (, )][DBLP]


  255. Developing an Aerospace System Software Using PBL and MDA. [Citation Graph (, )][DBLP]


  256. Comparison between Redundancy Techniques for Real Time Applications. [Citation Graph (, )][DBLP]


  257. Embedding a Corporate Blogging System in the CRM Solutions. [Citation Graph (, )][DBLP]


  258. Epidemic Modeling of Military Networks Using Group and Entity Mobility Models. [Citation Graph (, )][DBLP]


  259. Towards Maude-Tla based Foundation for Complex Concurrent Systems Specification and Certification. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002