The SCEAS System
Navigation Menu

Conferences in DBLP

Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (snpd)
2007 (conf/snpd/2007)


  1. Communication Optimization Algorithms based on Extend Data Flow Graph. [Citation Graph (, )][DBLP]


  2. Research on Threshold Denoising of FCGA. [Citation Graph (, )][DBLP]


  3. Lifetime Optimized Methods of Correlated Data Gathering on Sensor Networks. [Citation Graph (, )][DBLP]


  4. Study on distributing pattern of shared data in CC-NUMA system. [Citation Graph (, )][DBLP]


  5. Study on Heuristic Algorithm for Dynamic Scheduling Problem of Earth Observing Satellites. [Citation Graph (, )][DBLP]


  6. A (t, n)-threshold verified multi-secret sharing scheme based on ECDLP. [Citation Graph (, )][DBLP]


  7. Coverage-preserving Data Gathering in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  8. Leveraging Single-user OpenOffice Suite for Collaboration by Transparent Adaptation. [Citation Graph (, )][DBLP]


  9. A Novel Algorithm for Load Balancing in Distributed Systems. [Citation Graph (, )][DBLP]


  10. A Replication and Cache based Distributed Metadata Management System for Data Grid. [Citation Graph (, )][DBLP]


  11. Tasks Allocation for Real-Time Applications in Heterogeneous Sensor Networks for Energy Minimization. [Citation Graph (, )][DBLP]


  12. Distributed and Integrated and and Collaborative Research Environment (DiCore): An Architectural Design. [Citation Graph (, )][DBLP]


  13. Optimization Framework for Distributed Clustering Scheme in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  14. New Synchronization Scheme Between Audio and Video. [Citation Graph (, )][DBLP]


  15. Integrating Agents and Web Services into Cooperative Design Platform of Vehicles Headlight. [Citation Graph (, )][DBLP]


  16. A New Scheme for Off-line Signature Verification Using DWT and Fuzzy Net. [Citation Graph (, )][DBLP]


  17. A service-based Workflow Model for Virtual Enterprise. [Citation Graph (, )][DBLP]


  18. An Approach To QoS-Driven Knowledge Engine For Spatial Problem Collaborative Processing. [Citation Graph (, )][DBLP]


  19. A New Kind of Hybrid Filter Based on the Peak-and-Valley Filter and PCNN. [Citation Graph (, )][DBLP]


  20. An Approach for Web Services Composition based on QoS and Discrete Particle Swarm Optimization. [Citation Graph (, )][DBLP]


  21. Trusted Code Remote Execution through Trusted Computing and Virtualization. [Citation Graph (, )][DBLP]


  22. Slices Mining Based on Singular Value. [Citation Graph (, )][DBLP]


  23. A Web service discovery algorithm based on dynamic composition. [Citation Graph (, )][DBLP]


  24. Parzen Windows Estimation Using Laplace Kernel: A Novel Parametric Analysis with Information Content. [Citation Graph (, )][DBLP]


  25. Research of Real-time Forecast Technology in Fault of Missile Guidance System Based on Grey Model and Data Fusion. [Citation Graph (, )][DBLP]


  26. Fuzzy Integrative Performance Evaluation for Supply Chain System. [Citation Graph (, )][DBLP]


  27. Comparison of Adaptive Receivers for DS-CDMA Systems. [Citation Graph (, )][DBLP]


  28. Concept Hierarchies Generation for Classification using Fuzzy Formal Concept Analysis. [Citation Graph (, )][DBLP]


  29. A Novel Method for Moving Object Detection in Foggy Day. [Citation Graph (, )][DBLP]


  30. A Shared-Path-Protection Based Heuristic Algorithm for the Capacity Placement Problem in Mesh Networks. [Citation Graph (, )][DBLP]


  31. The Intelligent Damage Assessment and Intelligent Reconfiguration System of Ship Diesel System. [Citation Graph (, )][DBLP]


  32. The Wavelet-based Contourlet Transform for Image Fusion. [Citation Graph (, )][DBLP]


  33. A Mixed Shared and Multi Paths Protection Scheme with SRLG Constraints. [Citation Graph (, )][DBLP]


  34. Periodic solution for a class of higher-dimension impulsive functional differential equations with parameter. [Citation Graph (, )][DBLP]


  35. Multilevel Minimum Cross Entropy Threshold Selection Based on Quantum Particle Swarm Optimization. [Citation Graph (, )][DBLP]


  36. Traffic measurement Mechanisms for high precision Internet Applications. [Citation Graph (, )][DBLP]


  37. A new mechanical algorithm for solving system of Volterra integral equation. [Citation Graph (, )][DBLP]


  38. A New Model of Printer Color Management Based on Legendre Neural Network. [Citation Graph (, )][DBLP]


  39. Dual-tree Complex Wavelets Transforms for Image Denoising. [Citation Graph (, )][DBLP]


  40. Classification for a class of second order singular equations on time scales. [Citation Graph (, )][DBLP]


  41. Application of the Rough Set to Image Median Denoising. [Citation Graph (, )][DBLP]


  42. A Cheating Detection Mechanism based on Fuzzy Reputation Management of P2P MMOGs. [Citation Graph (, )][DBLP]


  43. Positive Solutions for Quasilinear Second Order Differential Equation. [Citation Graph (, )][DBLP]


  44. A Novel Algorithm for Detecting Air Holes in Steel Pipe Welding Based on Hopfield Neural Network. [Citation Graph (, )][DBLP]


  45. Research on Adaptive Error Concealment for Video Transmission over packet-lossy channel. [Citation Graph (, )][DBLP]


  46. Research on Matching between User Queries and Web Pages Based on BAM. [Citation Graph (, )][DBLP]


  47. Design of a High-speed FPGA-based 32-bit Floating-point FFT Processor. [Citation Graph (, )][DBLP]


  48. Data Fusion based on RBF Neural Network for Error Compensation in Resistance Strain Gauge Force Transducers. [Citation Graph (, )][DBLP]


  49. A Novel Approach to Commercial Detection in News Video. [Citation Graph (, )][DBLP]


  50. Research on the RAW Dependency in Floating-point FFT Processors. [Citation Graph (, )][DBLP]


  51. Automatic Audio Classification and Speaker Identification for Video Content Analysis. [Citation Graph (, )][DBLP]


  52. Automatic Keyphrase Extraction from Chinese Books. [Citation Graph (, )][DBLP]


  53. Research on Data Encryption Technology Based on Chaos Theory. [Citation Graph (, )][DBLP]


  54. Identifying Code for Directed Graph. [Citation Graph (, )][DBLP]


  55. The Application of Fuzzy Neural Network in the Iatrical Monitor. [Citation Graph (, )][DBLP]


  56. A proxy blind signature scheme based on elliptic curve with proxy revocation. [Citation Graph (, )][DBLP]


  57. Examination of Processing Load in Applying DACS Scheme to Practical Network. [Citation Graph (, )][DBLP]


  58. Using Trust Metric to Detect Malicious Behaviors in WSNs. [Citation Graph (, )][DBLP]


  59. A Proactive Secure Multisecret Sharing Threshold Scheme. [Citation Graph (, )][DBLP]


  60. Hop-Distance Algorithm for Self-Localization of Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  61. MAC Performance and Improvement in Mobile Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  62. A Strong RSA Signature Scheme and Its Application. [Citation Graph (, )][DBLP]


  63. Internet Applications Usage Accounting Based on Flow. [Citation Graph (, )][DBLP]


  64. The Upper Bound of The Number of Nodes On Fixed Energy Budget in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  65. Key management based on elliptic curve Paillier scheme in ad hoc networks. [Citation Graph (, )][DBLP]


  66. The Research on the Construct Technology of the Test System Based on the Network. [Citation Graph (, )][DBLP]


  67. Agent-based Trust Model in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  68. Risk Evaluation for Host System Based on Theory of Evidence. [Citation Graph (, )][DBLP]


  69. A Hybrid and Efficient Scheme of Multicast Source Authentication. [Citation Graph (, )][DBLP]


  70. Research of technology on making Linux interrupts tasked. [Citation Graph (, )][DBLP]


  71. An Attitude-adaptation Negotiation Strategy in Electronic Market Environments. [Citation Graph (, )][DBLP]


  72. New Key Insulated Signature Scheme : Mitigate the Damage of Key Exposure in Mobile Agents. [Citation Graph (, )][DBLP]


  73. An Immune Middleware for Embedded System. [Citation Graph (, )][DBLP]


  74. Web Marine Spatial Information Service Based on Electronic Nautical Charts. [Citation Graph (, )][DBLP]


  75. Identity-Based cryptography for Grid. [Citation Graph (, )][DBLP]


  76. Study on Modular Design-based Reconfigurable Embedded Network Numerical Control. [Citation Graph (, )][DBLP]


  77. The Design and Implementation of XML-based Workflow Engine. [Citation Graph (, )][DBLP]


  78. A note on homogeneous bent functions. [Citation Graph (, )][DBLP]


  79. Applications of On-chip Trace on Debugging Embedded Processor. [Citation Graph (, )][DBLP]


  80. Wide-w-NAF Method for Scalar Multiplication on Köblitz Curves. [Citation Graph (, )][DBLP]


  81. HIDE - A Web-based Hydrological Integrated Data Environment. [Citation Graph (, )][DBLP]


  82. A class of SIR epidemic model with saturation incidence and age of infection. [Citation Graph (, )][DBLP]


  83. Non-functional Attributes Modeling in Software Architecture. [Citation Graph (, )][DBLP]


  84. An Energy Efficient Query Procesing Algorithm Based on Relevant Node Selection for Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  85. Profitless delays for permanence in a pure-delayed nonautomous Lotka-Volterra competitive system with infinite delays and discrete delays. [Citation Graph (, )][DBLP]


  86. Asymptotic Weighted Periodic Oscillations for Dynamic Systems Caused by Impulse and Time Delay. [Citation Graph (, )][DBLP]


  87. An Architecture for Software Systems with time constraints. [Citation Graph (, )][DBLP]


  88. Delay-Minimum Energy-Aware Routing Protocol (DERP) for Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  89. Existence of Three Solutions for a Fourth-order Two-point Boundary Value Problem. [Citation Graph (, )][DBLP]


  90. Agent-oriented Petri Net based Modeling of Dynamic Behavior for Wide-area Backup Protection. [Citation Graph (, )][DBLP]


  91. Energy-Efficient Multi-Path Routing with Short Latency and Low Overhead for Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  92. A Camera Calibration Strategy in The Video-based Traffic Information Detection. [Citation Graph (, )][DBLP]


  93. A Component-based Framework for Embedded Digital Instrumentation Software with Design Patterns. [Citation Graph (, )][DBLP]


  94. Design of Robust Observer for the Switched Discrete-Time Linear System with Time Delays. [Citation Graph (, )][DBLP]


  95. Localized Flooding Backbone Construction for Location Privacy in Sensor Networks. [Citation Graph (, )][DBLP]


  96. What Affects Decoding Complexity of Distributed Video Codec Based on Turbo Code. [Citation Graph (, )][DBLP]


  97. Research on Logical Function Blocks in ForCES-Based Routers. [Citation Graph (, )][DBLP]


  98. A Real-time Vision-based Vehicle Tracking and Traffic Surveillance. [Citation Graph (, )][DBLP]


  99. Machine-Vision-Based Measurement of BGA Connector Solder Balls. [Citation Graph (, )][DBLP]


  100. A New Inner Congestion Control Mechanism in Terabit Routers. [Citation Graph (, )][DBLP]


  101. Probabilistic Logic Operator based on Zero-order N/T-Norms Complete Clusters. [Citation Graph (, )][DBLP]


  102. A Method for Blind Detection of OFDM Signal Based on Power Spectrum Reprocessing. [Citation Graph (, )][DBLP]


  103. DynaNP - A Coarse-grain Dataflow Network Processor Architecture with Dynamic Configurable Processing Path. [Citation Graph (, )][DBLP]


  104. Improved Particle Swarm Optimization for Realistic Portfolio Selection. [Citation Graph (, )][DBLP]


  105. Study on Statistics Iterative Thresholding Segmentation Based on Aviation Image. [Citation Graph (, )][DBLP]


  106. Two Certificateless Aggregate Signatures From Bilinear Maps. [Citation Graph (, )][DBLP]


  107. Improved Image Coding Algorithm Based on Embedded Zerotree. [Citation Graph (, )][DBLP]


  108. An Improved Anisotropic Diffusion PDE for Noise Removal. [Citation Graph (, )][DBLP]


  109. Biswapped Networks and Their Topological Properties. [Citation Graph (, )][DBLP]


  110. Publicly Verifiable Secret Sharing with Enrollment Ability. [Citation Graph (, )][DBLP]


  111. A New Face Recognition Method Based on 2DWPCA. [Citation Graph (, )][DBLP]


  112. A Scalable Search Algorithm on Unstructured P2P Networks. [Citation Graph (, )][DBLP]


  113. Multi-view Face Detection Based on the Enhanced AdaBoost Using Walsh Features. [Citation Graph (, )][DBLP]


  114. Forward-Secure Traceable Ring Signature. [Citation Graph (, )][DBLP]


  115. Modeling Cooperative Problem Solving Process with Extended Alternating-time Temporal Logic. [Citation Graph (, )][DBLP]


  116. An Efficient ID-Based Restrictive Partially Blind Signature Scheme. [Citation Graph (, )][DBLP]


  117. Segmentation of Touching Characters in Mathematical Expressions Using Contour Feature Technique. [Citation Graph (, )][DBLP]


  118. Geometric Design of Developable Bezier and B-spline Parametric Surfaces. [Citation Graph (, )][DBLP]


  119. Voice Conversion Using Canonical Correlation Analysis Based on Gaussian Mixture Model. [Citation Graph (, )][DBLP]


  120. Matrix Multiplication on the Biswapped-Mesh Network. [Citation Graph (, )][DBLP]


  121. Integrated Multi-Agent and Semantic P2P Grid Resource Discovery Model. [Citation Graph (, )][DBLP]


  122. The Design and Optimization of H.264 Encoder Based on the Nexperia Platform. [Citation Graph (, )][DBLP]


  123. Offset Approximation Algorithm for Subdivision Surfaces. [Citation Graph (, )][DBLP]


  124. IR Image Based Eye Gaze Estimation. [Citation Graph (, )][DBLP]


  125. An algorithm of job shop rolling scheduling based on singular rough sets. [Citation Graph (, )][DBLP]


  126. The Research and Application of Fuzzy Immune PID Control in the Load Control System of Tube Mill. [Citation Graph (, )][DBLP]


  127. ICA based Noise Subtraction for Linear System Identification in Additive Noisy Output. [Citation Graph (, )][DBLP]


  128. Research on the Knowledge-based Decision Support System for the Safety of Rockets. [Citation Graph (, )][DBLP]


  129. State-based Time-Series Analysis and Prediction. [Citation Graph (, )][DBLP]


  130. A Topology Set Method for Vectorization. [Citation Graph (, )][DBLP]


  131. A Hibrid Model for Computational Morphology Application. [Citation Graph (, )][DBLP]


  132. Data Mining Prediction of Shovel Cable Service Lifespan. [Citation Graph (, )][DBLP]


  133. Fast Correlation Tracking Method based on Circular Projection. [Citation Graph (, )][DBLP]


  134. Power Consumption Forecast by Combining Neural Networks with Immune Algorithm. [Citation Graph (, )][DBLP]


  135. Rough Set Approach for Processing Information Table. [Citation Graph (, )][DBLP]


  136. LQRD: An Improved ECN Algorithm. [Citation Graph (, )][DBLP]


  137. Arithmetic Computing Based Chinese Automatic Parsing Method. [Citation Graph (, )][DBLP]


  138. An Novel Association Rule Mining Based Missing Nominal Data Imputation Method. [Citation Graph (, )][DBLP]


  139. Overlay Network Testing by OpenDHT. [Citation Graph (, )][DBLP]


  140. Prediction of R in Sinter Process based on Grey Neural Network Algebra. [Citation Graph (, )][DBLP]


  141. A Sufficient and Necessary Condition for the Absolute Consistency of XML DTDs. [Citation Graph (, )][DBLP]


  142. Learning Bayesian Network structure from distributed homogeneous data. [Citation Graph (, )][DBLP]


  143. Research on Ant Colony Neural Network PID Controller and Application. [Citation Graph (, )][DBLP]


  144. Filter Design Based on the Theory of the Generalized Morphological Filter with Omnidirectional Structuring Element. [Citation Graph (, )][DBLP]


  145. D-S Theory-based Trust Model FIRE+ in Multi-agent Systems. [Citation Graph (, )][DBLP]


  146. Design and Implementation of Wireless Computational Grid based on JavaSpace. [Citation Graph (, )][DBLP]


  147. Image Segmentation with Multi-Scale GVF Snake Model Based on B-Spline Wavelet. [Citation Graph (, )][DBLP]


  148. A Policy Language for Adaptive Web Services Security Framework. [Citation Graph (, )][DBLP]


  149. ACKDs: An Authenticated Combinatorial Key Distribution Scheme for Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  150. Group Delay Based Approach for Frequency Estimation in Complex Noises. [Citation Graph (, )][DBLP]


  151. An Adaptive Stable Link Selection Algorithm for Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]


  152. Distributed Key Establishment Scheme in Wireless Sensor Network. [Citation Graph (, )][DBLP]


  153. Robust Algorithm of Vehicle Classification Application. [Citation Graph (, )][DBLP]


  154. Detecting Compromised Nodes in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  155. Key-Insulated Group Signature Scheme with Verifier-Local Revocation. [Citation Graph (, )][DBLP]


  156. Application and Analysis of Time Domain Cross Correlation for Traffic Flow Speed Measurement. [Citation Graph (, )][DBLP]


  157. Secure Routing Protocol based Trust for Ad Hoc Networks. [Citation Graph (, )][DBLP]


  158. Security Analysis of wrNAF and SPA Resistant Scalar Multiplication. [Citation Graph (, )][DBLP]


  159. Improvements on MB-layer Rate Control Scheme for H.264 video Using complexity estimation. [Citation Graph (, )][DBLP]


  160. Novel Scheme based on Ping-pong Effect for Predictive Fast Handovers for Mobile IPv6. [Citation Graph (, )][DBLP]


  161. Cryptanalysis and Improvement of a Certificateless Proxy Signature Scheme from Bilinear Pairings. [Citation Graph (, )][DBLP]


  162. Improving Blind Equalization Algorithm for Wireless Communication Systems. [Citation Graph (, )][DBLP]


  163. Optimal Cluster-Cluster Design for Sensor Network with Guaranteed Capacity and Fault Tolerance. [Citation Graph (, )][DBLP]


  164. Edge Detection of Images based on Fuzzy Cellular Automata. [Citation Graph (, )][DBLP]


  165. An Efficient ID-Based Partially Blind Signature Scheme. [Citation Graph (, )][DBLP]


  166. A Distributed Trust-based Reputation Model in P2P System. [Citation Graph (, )][DBLP]


  167. Motion Vector Data Decoding Using Spatial-Temporal Source Redundancy. [Citation Graph (, )][DBLP]


  168. A Fuzzy Clustering Method Based on Domain Knowledge. [Citation Graph (, )][DBLP]


  169. KZCAN: A Kautz based content-addressable network. [Citation Graph (, )][DBLP]


  170. An Feasible Key Management Scheme in Ad Hoc Network. [Citation Graph (, )][DBLP]


  171. XML Query Recommendation Based On Association Rules. [Citation Graph (, )][DBLP]


  172. Study and Implementation of a Improved Group Key Protocol for Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]


  173. Study On Non-FIFO Arc in Time-Dependent Networks. [Citation Graph (, )][DBLP]


  174. An IA-Based Classification Rule Mining Algorithm. [Citation Graph (, )][DBLP]


  175. Hybrid Ontology Integration for Distributed System. [Citation Graph (, )][DBLP]


  176. Research on an Integrated Network Management System. [Citation Graph (, )][DBLP]


  177. Secure Routing for Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]


  178. Applying Multiple Classifier Systems to SoftMan's Perception System. [Citation Graph (, )][DBLP]


  179. The Computer Bracket Pressure Monitor System of Fully Mechanized Coalface in Coal Mine Based On CAN Bus. [Citation Graph (, )][DBLP]


  180. Adaptive Backoff Algorithm based on Network Congestion in Multi-hop Wireless Ad hoc Networks. [Citation Graph (, )][DBLP]


  181. OBSI: Object Based Storage System for Massive Image Databases. [Citation Graph (, )][DBLP]


  182. A Framework for Reliability Computation of the IP Network. [Citation Graph (, )][DBLP]


  183. Scatternet Formation Algorithm in Multi-hop Environment based on Bionics. [Citation Graph (, )][DBLP]


  184. Optimizing Network Configurations Based on Potential Profit Loss. [Citation Graph (, )][DBLP]


  185. Numerical Solution of A Type of Nonlinear Parabolic Equations. [Citation Graph (, )][DBLP]


  186. Multi-path-based Distributed TCP Caching for Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  187. A Reputation System with Privacy and Incentive. [Citation Graph (, )][DBLP]


  188. Positive solutions of m-points conjugate boundary value problems. [Citation Graph (, )][DBLP]


  189. Rough Neural Network Modeling Through Supervised G-K Fuzzy Clustering. [Citation Graph (, )][DBLP]


  190. Existence of Nonoscillatory Solution for Second Order Nonlinear Neutral Delay Differential Equation. [Citation Graph (, )][DBLP]


  191. The Research of ID Strategy Based on Antigen Presenting Principle and its Adaptability. [Citation Graph (, )][DBLP]


  192. Chinese Question Classification Based on Ensemble Learning. [Citation Graph (, )][DBLP]


  193. Two dimensional pattern formation of prey-predator system. [Citation Graph (, )][DBLP]


  194. An Improved Identity-based Fault-tolerant Conference Key Distribution Scheme. [Citation Graph (, )][DBLP]


  195. Quantum network based on multiparty quantum secret sharing. [Citation Graph (, )][DBLP]


  196. A Parsing Model Based on Ordered Tree Inclusion Matching. [Citation Graph (, )][DBLP]


  197. Description of Key Performance Index States based on Cloud Theory and the Weighted Mean method for Multi-sensor. [Citation Graph (, )][DBLP]


  198. Quantum Information Security Protocols and Quantum Coding Theory. [Citation Graph (, )][DBLP]


  199. Study on Prediction of Prosodic Phrase Boundaries in Chinese TTS. [Citation Graph (, )][DBLP]


  200. A half face recognition scheme. [Citation Graph (, )][DBLP]


  201. P2P Trust Model: The Resource Chain Model. [Citation Graph (, )][DBLP]


  202. Algorithm for Tracking of Fast Motion Objects with Adaptive Mean Shift. [Citation Graph (, )][DBLP]


  203. Artificial Immunity-Based Feature Extraction for Spam Detection. [Citation Graph (, )][DBLP]


  204. Network Protocols Analyzing by an Environmental Bisimulation Method. [Citation Graph (, )][DBLP]


  205. A Fractal Watermarking Scheme for Image in DWT Domain. [Citation Graph (, )][DBLP]


  206. Semantic Approach to Visualization Service Discovery. [Citation Graph (, )][DBLP]


  207. A Rapid Grouping Aggregation Algorithm Based on the Multi-Dimension Hierarchical Encoding. [Citation Graph (, )][DBLP]


  208. New Texture Features Based on Wavelet Transform Coinciding with Human Visual Perception. [Citation Graph (, )][DBLP]


  209. A Resource Allocation Model with Cost-Performance Ratio in Data Grid. [Citation Graph (, )][DBLP]


  210. Getting Fuzzy Control Query Table by Data Mining. [Citation Graph (, )][DBLP]


  211. An Algorithm for SAR Image Embedded Compression Based on Wavelet Transform. [Citation Graph (, )][DBLP]


  212. An Efficient Hybrid P2P Incentive Scheme. [Citation Graph (, )][DBLP]


  213. An Effective Method To Improve kNN Text Classifier. [Citation Graph (, )][DBLP]


  214. Coal Thickness Prediction Based on Support Vector Machine Regression. [Citation Graph (, )][DBLP]


  215. Image with Less Information Watermarking Algorithm Based on DWT. [Citation Graph (, )][DBLP]


  216. BDA information management and decision support based on DW. [Citation Graph (, )][DBLP]


  217. A Novel SVM Decision Tree and its application to Face Detection. [Citation Graph (, )][DBLP]


  218. Battle Damage Assessment based on Bayesian Network. [Citation Graph (, )][DBLP]


  219. A Content Protection Scheme for H.264-based Video Sequence. [Citation Graph (, )][DBLP]


  220. Intelligent Cultural Advisor System: an interactive on-line culture guidebook. [Citation Graph (, )][DBLP]


  221. Infrared Point Target Detection and Tracking Based on DSP. [Citation Graph (, )][DBLP]


  222. Emotion classification of mandarin speech based on TEO nonlinear features. [Citation Graph (, )][DBLP]


  223. Intelligent Window Based on Embedded System. [Citation Graph (, )][DBLP]


  224. Research on Technologies of Spatial Configuration Information Retrieval. [Citation Graph (, )][DBLP]


  225. Stochastic Network Fluid Modeling with Probabilistic Wavelet System. [Citation Graph (, )][DBLP]


  226. Dependable distributed embedded system assessment platform design. [Citation Graph (, )][DBLP]


  227. A Multi-object Motion-tracking Method for Video Surveillance. [Citation Graph (, )][DBLP]


  228. A Novel Approach to Detect the Presence of LSB Steganographic Messages. [Citation Graph (, )][DBLP]


  229. Oscillation Criteria of Second-Order Delay Dynamic Equations on Time Scales. [Citation Graph (, )][DBLP]


  230. Application of Embedded System in Construction Machinery. [Citation Graph (, )][DBLP]


  231. Multiple Positive Solutions for Second Order m-Point Boundary Value Problems. [Citation Graph (, )][DBLP]


  232. A Web Services Based Email Extension for Remote Monitoring of Embedded Systems. [Citation Graph (, )][DBLP]


  233. Existence of Positive Solutions for Boundary Value Problems on a Measure Chain with a Parameter. [Citation Graph (, )][DBLP]


  234. LATEX The existence of positive solutions for multi-point BVPs with dependence on the first order derivative. [Citation Graph (, )][DBLP]


  235. Optimal Guaranteed Cost Control for a Class of Uncertain Systems with both State and Input Delays via Delta Operator Approach. [Citation Graph (, )][DBLP]


  236. Mining User's Interest from Reading Behavior in E-learning System. [Citation Graph (, )][DBLP]


  237. Clever Uses of Matrices for Neutral Delay Difference Systems. [Citation Graph (, )][DBLP]


  238. A model for Tuberculosis with Various Latent Periods. [Citation Graph (, )][DBLP]


  239. An Approach to Build Accessible Grid Service. [Citation Graph (, )][DBLP]


  240. Robust Stability of Uncertain Cellular Neural Networks with Time-Varying Delays. [Citation Graph (, )][DBLP]


  241. Multi-Connection Mechanism of Mobile Agent in Grid. [Citation Graph (, )][DBLP]


  242. A Log-Sigmoid lagrangisn neutral network for solving nonlinear programming. [Citation Graph (, )][DBLP]


  243. A Research for Quality Preservation Methodology for SOA Environment. [Citation Graph (, )][DBLP]


  244. Using Trust and Reputation Information to Choose Both Request Responders and Servers in Peer-to-Peer Networks. [Citation Graph (, )][DBLP]


  245. An Ontology Framework for EC Automated Negotiation Protocol. [Citation Graph (, )][DBLP]


  246. Study on Classification Algorithm of Multi-subject Text. [Citation Graph (, )][DBLP]


  247. Communication Optimization on Automatic Program Parallelization. [Citation Graph (, )][DBLP]


  248. The Application of Neuro-Fuzzy Decision Tree in Optimal Selection of Teconological Innovation Projects. [Citation Graph (, )][DBLP]


  249. Survey of Public Key Digital Watermarking Systems. [Citation Graph (, )][DBLP]


  250. A New Clustering Algorithm Based on Token Ring. [Citation Graph (, )][DBLP]


  251. The Evaluation Study of Knowledge Management Performance Based on Grey-AHP Method. [Citation Graph (, )][DBLP]


  252. An Automatic Target Detection Post-Processing Algorithm Based on Swarm Intelligence. [Citation Graph (, )][DBLP]


  253. A Two-phase Flight Data Feature Selection Method Using both Filter and Wrapper. [Citation Graph (, )][DBLP]


  254. Evaluation Model of Customer Satisfaction of B2C E-Commerce Based on Combination of Linguistic Variables and Fuzzy Triangular Numbers. [Citation Graph (, )][DBLP]


  255. Application of Multi-Agent for Collaborative Product Design Engineering. [Citation Graph (, )][DBLP]


  256. Feature Extraction by Foley-Sammon Transform with Kernels. [Citation Graph (, )][DBLP]


  257. The application of particle swarm optimizaton algorithm in training forward neural network. [Citation Graph (, )][DBLP]


  258. an Improved Adaptive Genetic Algorithm in Optimization of Partner Selection. [Citation Graph (, )][DBLP]


  259. Processing Global Nearest Neighbor Query. [Citation Graph (, )][DBLP]


  260. Studies on CAD System with Artificial Intelligence. [Citation Graph (, )][DBLP]


  261. An Ant Colony System Hybridized with Randomized Algorithm for TSP. [Citation Graph (, )][DBLP]


  262. Signature of quantum message using quantum fingerprint and stabilizer code. [Citation Graph (, )][DBLP]


  263. Research on Detecting Method of Submarine Oil Pipelines Corrosion Degree Based on Chaos Genetic Algorithm Neural Network. [Citation Graph (, )][DBLP]


  264. A New Optimization Engine for the LSF Vector Quantization. [Citation Graph (, )][DBLP]


  265. Perfect Concurrent Signature Protocol. [Citation Graph (, )][DBLP]


  266. Low Dimensional Simplex Evolution --- A Hybrid Heuristic for Global Optimization. [Citation Graph (, )][DBLP]


  267. Solving Timetabling Problem Using Genetic and Heuristic Algorithms. [Citation Graph (, )][DBLP]


  268. ID-based threshold signature and mediated signature schemes. [Citation Graph (, )][DBLP]


  269. An Enhancement Dynamic Contract Net Protocol. [Citation Graph (, )][DBLP]


  270. stability analysis of timing acquisition methods with multi-hypothesis in indoor UWB multipath and MAI channel. [Citation Graph (, )][DBLP]


  271. An Encryption solution in Digital Trunking System. [Citation Graph (, )][DBLP]


  272. Study on The Property of Training Samples and Learning Space with Genetic Algorithms. [Citation Graph (, )][DBLP]


  273. A Practical Digital Watermarking Protocol Based On PKI-CA. [Citation Graph (, )][DBLP]


  274. An Innovative Restoration Algorithm with Prioritized Preemption Enabled. [Citation Graph (, )][DBLP]


  275. Research on Lossless Image Compression Algorithms Using Fermat Number Transform. [Citation Graph (, )][DBLP]


  276. Research of Asynchronous Communication Messaging Model Based on Time Decoupling in Distributed Object-Oriented Middleware. [Citation Graph (, )][DBLP]


  277. Congestion Control Model Based on Hop-by-hop Feedback for Active Networks. [Citation Graph (, )][DBLP]


  278. Maximum Variance Image Segmentation Based on Improved Genetic Algorithm. [Citation Graph (, )][DBLP]


  279. Research on Ontology-based Representation and Retrieval of Components. [Citation Graph (, )][DBLP]


  280. Two multi-constrained multicast QoS routing algorithm. [Citation Graph (, )][DBLP]


  281. Distortion Analysis in Scalable Image Compression Scheme based on efficient Codebook selection. [Citation Graph (, )][DBLP]


  282. Component-based approach to develop integrated diagnostic platform. [Citation Graph (, )][DBLP]


  283. Anti-periodic boundary value problem for impulsive differential equations with delay. [Citation Graph (, )][DBLP]


  284. Fusion of ICA Spatial and Temporal and Localized Features for Face Recognition. [Citation Graph (, )][DBLP]


  285. The SIS epidemic model with impulsive effects. [Citation Graph (, )][DBLP]


  286. Domain-Analysis in Software Reuse - Application in Warehouse Management. [Citation Graph (, )][DBLP]


  287. Local And Global Features Extracting and Fusion For microbial Recognition. [Citation Graph (, )][DBLP]


  288. Global Stability of a tuberculosis model with vertical transsmission. [Citation Graph (, )][DBLP]


  289. A service-oriented methodology supporting automatic synthesis and verification of component behavior model. [Citation Graph (, )][DBLP]


  290. Distributed Parallel Algorithm For Nonlinear Optimization Without Derivatives. [Citation Graph (, )][DBLP]


  291. Oscillations of a class of second-order nonlinear delay differential equations with variable sign coefficients. [Citation Graph (, )][DBLP]


  292. Selection of the Order of Autoregressive Models for Host Load Prediction in Grid. [Citation Graph (, )][DBLP]


  293. Add Semantic Role to Dependency Structure Language Model for Topic Detection and Tracking. [Citation Graph (, )][DBLP]


  294. Research on Mobile IP Routing of Space Network that Based on IP over CCSDS. [Citation Graph (, )][DBLP]


  295. Mobile-Agent-Based Information-Driven Multiresolution Algorithm for target tracking in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  296. An Integrated Prefetching and Caching Strategy for Mobile Web Caching System. [Citation Graph (, )][DBLP]


  297. A method to construct dynamic S-box based on chaotic map. [Citation Graph (, )][DBLP]


  298. Energy-Efficient Power Control Game for Cognitive Radio Systems. [Citation Graph (, )][DBLP]


  299. Threats Analysis and Prevention for Grid and Web Service Security. [Citation Graph (, )][DBLP]


  300. A Fault-Tolerant Mutual Exclusion Resource Reservation Protocol for Clustered Mobile Ad hoc Networks. [Citation Graph (, )][DBLP]


  301. A New Algorithm for Weighted Proportional Fairness Based Spectrum Allocation of Cognitive Radios. [Citation Graph (, )][DBLP]


  302. A Framework for Revocation of Proxy Certificates in a Grid. [Citation Graph (, )][DBLP]


  303. Time Synchronization with Extended Clock Model for Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  304. Research on User Applying Mode for Video Conference System. [Citation Graph (, )][DBLP]


  305. User Interface Design Model. [Citation Graph (, )][DBLP]


  306. Analysis of communication traffic characteristics of two-hop-relay cellular system in the dead spots. [Citation Graph (, )][DBLP]


  307. Voice Conversion Adopting SOLAFS. [Citation Graph (, )][DBLP]


  308. Xregion: A structure-based approach to Storing XML Data in Relational Databases. [Citation Graph (, )][DBLP]


  309. LSMR: a Label Switching Multipath Routing protocol for Ad Hoc Networks. [Citation Graph (, )][DBLP]


  310. An RBF Network Based Beamformer for MIMO Wireless Communication Systems. [Citation Graph (, )][DBLP]


  311. A Numerical Prediction Product FNN Prediction Model Based on Condition Number and Analog Deviation. [Citation Graph (, )][DBLP]


  312. The existence of periodic solutions for a class impulsive differential equations. [Citation Graph (, )][DBLP]


  313. Lossless Compression of Hyperspectral Imagery Using Integer Principal Component Transform and 3-D Tarp Coder. [Citation Graph (, )][DBLP]


  314. Test Cases Generation from UML Activity Diagrams. [Citation Graph (, )][DBLP]


  315. The Study of Compost Quality Evaluation Modeling Method Based on Fuzzy Neural Network for Sewage Treatment. [Citation Graph (, )][DBLP]


  316. Segmentation and Recognition of Mallow Cells Image Based on Wavelet and Genetic Cluster. [Citation Graph (, )][DBLP]


  317. Nash Equilibrium stability of rent-sinking competition and its game analysis. [Citation Graph (, )][DBLP]


  318. Multi-issue Negotiation Research based on Niched Co-evolutionary Genetic Algorithm. [Citation Graph (, )][DBLP]


  319. A Nonparametric Approach to Pricing Convertible Bond via Neural Network. [Citation Graph (, )][DBLP]


  320. Classification and Existence of Non-oscillatory Solutions for Two-Dimensional Neutral Difference System. [Citation Graph (, )][DBLP]


  321. A Modified SOFM Segmentation Method in Reverse Engineering. [Citation Graph (, )][DBLP]


  322. A Hybrid Multi-objective Evolutionary Algorithm and Its Application in Component-based Product Design. [Citation Graph (, )][DBLP]


  323. An Optimized Breaking Index for the Boussinesq-Type Numerical Model. [Citation Graph (, )][DBLP]


  324. Automatic Text Summarization Based on Lexical Chains and Structural Features. [Citation Graph (, )][DBLP]


  325. Genetic algorithm-based study on flow allocation in a multicommodity stochastic-flow network with unreliable nodes. [Citation Graph (, )][DBLP]


  326. Validity Test of the Eigenfunction Expansion Method in the Transient Wave Propagation Simulation. [Citation Graph (, )][DBLP]


  327. Hybrid Application On Job-Shop Scheduling by Genetic Algorithm and MAS Spring-Net. [Citation Graph (, )][DBLP]


  328. A New Hybrid Genetic Algorithm for the Stochastic Loader Problem. [Citation Graph (, )][DBLP]


  329. SAT-based Bounded Model Checking for SE-LTL. [Citation Graph (, )][DBLP]


  330. Parallel analysis of polymorphic viral code using automated deduction system. [Citation Graph (, )][DBLP]


  331. A Query Expansion Method Based On Semantic Element. [Citation Graph (, )][DBLP]


  332. Research and Application of Software-reuse. [Citation Graph (, )][DBLP]


  333. Research on Risk Control Model of Cooperatively Technical Innovation based on Wavelet and Nerve Network. [Citation Graph (, )][DBLP]


  334. A Double Level Granularity for Multimedia on Demand System. [Citation Graph (, )][DBLP]


  335. The differences of COTS-based project stakeholders. [Citation Graph (, )][DBLP]


  336. Chaotic Time Series Prediction Based on Radial Basis Function Network. [Citation Graph (, )][DBLP]


  337. Adaptive Replication Based Security Aware and Fault Tolerant Job Scheduling for Grids. [Citation Graph (, )][DBLP]


  338. A Unified-Index Based Distributed Specification for Heterogeneous Components Management. [Citation Graph (, )][DBLP]


  339. Study of Ontology-based Semantic Matching of Model Function. [Citation Graph (, )][DBLP]


  340. Numerical Simulation of A Difference Scheme Applied in Image Processing Based on Four-Order PDEs. [Citation Graph (, )][DBLP]


  341. Self-Adaptive PD Control of Robot Manipulator. [Citation Graph (, )][DBLP]


  342. Multi-device User Interface Development with Composition-oriented User Interface Design Patterns. [Citation Graph (, )][DBLP]


  343. Recognizing Humans Based on Gait Moment Image. [Citation Graph (, )][DBLP]


  344. A Novel Strategy of Coalition Evolvement Based on Interest. [Citation Graph (, )][DBLP]


  345. A Phase Unwrapping Algorithm for 3D Reconstruction. [Citation Graph (, )][DBLP]


  346. A hybrid metaheuristic ACO-GA with an Application in Sports Competition Scheduling. [Citation Graph (, )][DBLP]


  347. A Tristate Filter for Image Denoising Processing. [Citation Graph (, )][DBLP]


  348. Particle Swarm Optimization with Adaptive Parameters. [Citation Graph (, )][DBLP]


  349. GA in Optimized Control of Central Air-conditioning System Based on ANN Simulation. [Citation Graph (, )][DBLP]


  350. A Study about the Mapping of Process- Processor based on Petri Nets. [Citation Graph (, )][DBLP]


  351. Multifractal and R/S Analysis of Protein Structure. [Citation Graph (, )][DBLP]


  352. Model for Parallel Verification of Programs. [Citation Graph (, )][DBLP]


  353. Quality assessment of beef based of computer vision and electronic nose. [Citation Graph (, )][DBLP]


  354. A Task Scheduling Algorithm of Single Processor Parallel Test System. [Citation Graph (, )][DBLP]


  355. A Survey of Reasoning in Parallelization. [Citation Graph (, )][DBLP]


  356. Double Unmanned Air Vehicle’s Path Planning for Scout via Cross-Entropy Method. [Citation Graph (, )][DBLP]


  357. Research of multi-factors heuristics tasks scheduling model and its algorithms in grid environment. [Citation Graph (, )][DBLP]


  358. Non-interactive Designated Confirmer Signature with Specific Verifier. [Citation Graph (, )][DBLP]


  359. A PACA-Based Multicast Routing Algorithm. [Citation Graph (, )][DBLP]


  360. A Formal Approach to Specifying Architecture Aspects and Their Weaving logic. [Citation Graph (, )][DBLP]


  361. DYFARS: Boosting Reliability in Fault-tolerant Heterogeneous Systems Through Dynamic Scheduling. [Citation Graph (, )][DBLP]


  362. Protocol Engineering Principles for Cryptographic Protocols Design. [Citation Graph (, )][DBLP]


  363. A Cluster-Based and Routing Balanced P2P Lookup Protocol. [Citation Graph (, )][DBLP]


  364. A Lightweight value-based Software Architecture Evaluation. [Citation Graph (, )][DBLP]


  365. A provably secure ID-based mediated signcryption scheme. [Citation Graph (, )][DBLP]


  366. Mapping Software Design Changes to Source Code Changes. [Citation Graph (, )][DBLP]


  367. On Path-length and Routing-tag Algorithm for Hybrid Irregular Multi-stage Interconnection Networks. [Citation Graph (, )][DBLP]


  368. A Business Modeled Approach for Trust Management in P2P Networks. [Citation Graph (, )][DBLP]


  369. The Management and Validation of Business Rules in Telecom Operator’ Settlement and Apportion System. [Citation Graph (, )][DBLP]


  370. Multiple Moving Prey Pursuit Algorithm Based on the Changeable Alliance. [Citation Graph (, )][DBLP]


  371. A PSO-Based Web Document Classification Algorithm. [Citation Graph (, )][DBLP]


  372. A Scable Peer-to-Peer Overlay for Applications with Time Constraints. [Citation Graph (, )][DBLP]


  373. Towards Quantitative Evaluation of UML based Software Architecture. [Citation Graph (, )][DBLP]


  374. Data Mining based on Clonal Selection Wavelet Network. [Citation Graph (, )][DBLP]


  375. The research of local area storage grid system. [Citation Graph (, )][DBLP]


  376. An Improved Semantic Smoothing Model for Model-Based Document Clustering. [Citation Graph (, )][DBLP]


  377. Formalization of Architecture-Centric Model Mapping Using Category Theory. [Citation Graph (, )][DBLP]


  378. A New Double scheduling DBA Algorithm for next generation access network. [Citation Graph (, )][DBLP]


  379. Modeling and Practice on Component Based Software Design - a Case Study. [Citation Graph (, )][DBLP]


  380. A Quick Algorithm for Computing Core Based on the Positive Region. [Citation Graph (, )][DBLP]


  381. Organization technology of Mobile Peer-to-peer Network Based on Mobile Unit. [Citation Graph (, )][DBLP]


  382. A Dynamic Reconfigurable Adaptive Software Architecture for Federate in HLA-based simulation. [Citation Graph (, )][DBLP]


  383. Finding Frequent Items in Data Streams using ESBF. [Citation Graph (, )][DBLP]


  384. Extended Mobility Management Challenges over Cellular Networks combined with Cognitive Radio by using Multi-hop Network. [Citation Graph (, )][DBLP]


  385. Survivable and Efficient Clustered Keying In Wiresless Sensor Networks. [Citation Graph (, )][DBLP]


  386. Automatic Performance Evaluation Of Palm Recognition. [Citation Graph (, )][DBLP]


  387. A Policy-Based Energy Efficient Clustering Scheme for Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  388. Toward a Formalization of UML2.0 Metamodel using Z Specifications. [Citation Graph (, )][DBLP]


  389. Knowledge-based system to define context in commercial applications. [Citation Graph (, )][DBLP]


  390. An Adaptive Counter Propagation Network. [Citation Graph (, )][DBLP]


  391. A Traceability Link Model for the Unified Process. [Citation Graph (, )][DBLP]


  392. A Dyeing Color Matching Method Combining RBF Neural Networks with Genetic Algorithms. [Citation Graph (, )][DBLP]


  393. On Testing Multi-threaded Java Programs. [Citation Graph (, )][DBLP]


  394. Hierarchical Junction Trees as the Secondary Structure for Inference in Bayesian Networks. [Citation Graph (, )][DBLP]


  395. Software Program Cohesion Notion Apply to Evaluating Product Process Assignment. [Citation Graph (, )][DBLP]


  396. Aerodynamic Parameter Fitting Based on Robust Least Squares Support Vector Machines. [Citation Graph (, )][DBLP]


  397. Assessment on Fault-tolerance Performance Using Neural Network Model Based on Ant Colony Optimization Algorithm for Fault Diagnosis in Distribution Systems of Electric Power Systems. [Citation Graph (, )][DBLP]


  398. Noisy Speech Recognition Based on Speech Enhancement. [Citation Graph (, )][DBLP]


  399. Image Fusion Based on Wavelet Transform. [Citation Graph (, )][DBLP]


  400. Analysis of Sidelobe Elevation for Polyphase Complementary Codes through the Non-ideal System. [Citation Graph (, )][DBLP]


  401. Efficient Partially Blind Signature from LFSR. [Citation Graph (, )][DBLP]


  402. Research on RAIM Algorithm under the Assumption of Simultaneous Multiple Satellites Failure. [Citation Graph (, )][DBLP]


  403. HVS-based imperceptibility measure of watermark in watermarked color image. [Citation Graph (, )][DBLP]


  404. An Approach to Convert Any Threshold Signature into a Threshold Group Signature. [Citation Graph (, )][DBLP]


  405. Subframe Interpolation Optimized Coding of LSF Parameters. [Citation Graph (, )][DBLP]


  406. A Study of Secure Multi-party Ranking Problem. [Citation Graph (, )][DBLP]


  407. Detecting Arithmetic of Passenger’s Location Based on Image Processing. [Citation Graph (, )][DBLP]


  408. Region-based Image Fusion Using Energy Estimation. [Citation Graph (, )][DBLP]


  409. Speeding up Fractal Image Compression Based on Local Extreme Points. [Citation Graph (, )][DBLP]


  410. A Survey on Failure Prediction of Large-Scale Server Clusters. [Citation Graph (, )][DBLP]


  411. A Hierarchical Segmentation Algorithm Based on Mumford and Shah Model. [Citation Graph (, )][DBLP]


  412. A Combining Approach for Chinese Word Segmentation. [Citation Graph (, )][DBLP]


  413. Alert Verification Based on Attack Classification in Collaborative Intrusion Detection. [Citation Graph (, )][DBLP]


  414. A Synchronous Detection of the Road Boundary and Lane Marking for Intelligent Vehicles. [Citation Graph (, )][DBLP]


  415. Performance Evaluation of TriBA - A Novel Scalable Architecture. [Citation Graph (, )][DBLP]


  416. A Hybrid Parallel Algorithm for Complex Decision Problem Optimization. [Citation Graph (, )][DBLP]


  417. An Event Correlation Synchronization Algorithm for MMOG. [Citation Graph (, )][DBLP]


  418. Research on RTOS-Integrated TMR for Fault Tolerant Systems. [Citation Graph (, )][DBLP]


  419. Eliminating Redundant Communication of Code Generation for Distributed Memory Machines. [Citation Graph (, )][DBLP]


  420. One Solution for Accurate Collision Detection in Virtual Assembly Environment. [Citation Graph (, )][DBLP]


  421. Bitmap Filtering: An Efficient Speedup Method for XML Structural Matching. [Citation Graph (, )][DBLP]


  422. Equivalence of the Oscillation of Two Coupled Difference Systems. [Citation Graph (, )][DBLP]


  423. Reducing the Dimensionality of Feature Vectors for Texture Image Retrieval Based on Wavelet Decomposition. [Citation Graph (, )][DBLP]


  424. On the Higher Order Difference Equation xn+1 = (xn-k+1)/(-1+xnxn-1...xn-k+1). [Citation Graph (, )][DBLP]


  425. A Modified Model for Private Data Security Facing E-commerce. [Citation Graph (, )][DBLP]


  426. Combining Color and Texture and Region with Objects of User's Interest for Content-Based Image Retrieval. [Citation Graph (, )][DBLP]


  427. Approach toward a flexible semantic E-business in Web Service Community. [Citation Graph (, )][DBLP]


  428. Peirodic Growing of Two Populations Intergrowth System. [Citation Graph (, )][DBLP]


  429. Positive solutions of m-point boundary value problems for second order differential equations with an advanced argument. [Citation Graph (, )][DBLP]


  430. Parallel Particle Swarm Optimization for Attribute Reduction. [Citation Graph (, )][DBLP]


  431. Ontology-Based Semantic Integration Method for Domain-Specific Scientific Data. [Citation Graph (, )][DBLP]


  432. Analysis of Source Codes by Beginners in Programming Education. [Citation Graph (, )][DBLP]


  433. Multidimensional Fuzzy Interpolative Reasoning Method Based on $\lambda$-Width Similarity. [Citation Graph (, )][DBLP]


  434. A Learner Model for Learning-by-Example Context. [Citation Graph (, )][DBLP]


  435. SOSRA: Sewice-Oriented Semantic Representation Architecture. [Citation Graph (, )][DBLP]


  436. Tailoring Software Evolution Process. [Citation Graph (, )][DBLP]


  437. Research on Building Polygon Map Generalization Algorithm. [Citation Graph (, )][DBLP]


  438. Research on Visualization Techniques for Web Usability Analysis. [Citation Graph (, )][DBLP]


  439. Research of Information Fusion Evaluation Methodology Based on Dominance relation. [Citation Graph (, )][DBLP]


  440. Video Transmission over Ad Hoc Networks Using Multiple Description Coding and Clustering-based Multiple Paths. [Citation Graph (, )][DBLP]


  441. Image Denoising Based on MORF and Minimization Total Variation. [Citation Graph (, )][DBLP]


  442. A Design for an Online RSS Reader Based On AJAX. [Citation Graph (, )][DBLP]


  443. Improvement of PageRank for Focused Crawler. [Citation Graph (, )][DBLP]


  444. Rotation Invariant Image Classification based on MPEG-7 Homogeneous Texture Descriptor. [Citation Graph (, )][DBLP]


  445. An Off-Line Divisible E-Cash Scheme Based on Smart Card. [Citation Graph (, )][DBLP]


  446. Generalized Association Rule Mining Algorithms based on Data Cube. [Citation Graph (, )][DBLP]


  447. Research on Topology Discovery for IPv6 Network. [Citation Graph (, )][DBLP]


  448. Information Usage System by Static Portal Page. [Citation Graph (, )][DBLP]


  449. Advances of Research in Fuzzy Integral for Classifiers’ fusion. [Citation Graph (, )][DBLP]


  450. Design of Multimedia Conference Control System based on SIP. [Citation Graph (, )][DBLP]


  451. Study and Application of Web-based Data Mining in E-Business. [Citation Graph (, )][DBLP]


  452. Improved BSS Based Schemes for Active Steganalysis. [Citation Graph (, )][DBLP]


  453. An Efficient K-means Clustering Algorithm Based on Influence Factors. [Citation Graph (, )][DBLP]


  454. Credit based Fairness Control in Wireless Sensor Network. [Citation Graph (, )][DBLP]


  455. A Vision-Based Road Surveillance System Using Improved Background Subtraction and Region Growing Approach. [Citation Graph (, )][DBLP]


  456. Research on Distributed E-Commerce System Architecture. [Citation Graph (, )][DBLP]


  457. Variable Step Size Technique for Adaptive Blind Decorrelation. [Citation Graph (, )][DBLP]


  458. An Efficient Clustering-Based Method for Data Gathering and Compressing in Sensor Networks. [Citation Graph (, )][DBLP]


  459. A Policy-Based Framework for Designing Strategies for Service Negotiation. [Citation Graph (, )][DBLP]


  460. Speech Enhancement Employing Modified a Priori SNR Estimation. [Citation Graph (, )][DBLP]


  461. Throughput Performance of Marine STDMA Ad-hoc Network. [Citation Graph (, )][DBLP]


  462. An XML-based Representation for Generic Bill of Materials (GBOM). [Citation Graph (, )][DBLP]


  463. A Kalman Smoothing Algorithm for Speech Enhancement Based on the Properties of Vocal Tract Varying Slowly. [Citation Graph (, )][DBLP]


  464. A QoS Multicast Routing Algorithm for Wireless Mesh Networks. [Citation Graph (, )][DBLP]


  465. Job-attention Replica Replacement Strategy. [Citation Graph (, )][DBLP]


  466. Modeling Web Service Choreography and Orchestration with Colored Petri Nets. [Citation Graph (, )][DBLP]


  467. Space-Time Codes Based On Bit Interleaved Quasi-Super-Orthogonal Designs. [Citation Graph (, )][DBLP]


  468. A P2P Architecture for Large-scale VoD Service. [Citation Graph (, )][DBLP]


  469. Segmentation of color images using multi-FART network. [Citation Graph (, )][DBLP]


  470. A New Supervised Clustering Algorithm for Data Set with Mixed Attributes. [Citation Graph (, )][DBLP]


  471. Exploiting Heterogeneity of Nodes to Enhance Search Performance in Large-Scale Peer-to-Peer Network. [Citation Graph (, )][DBLP]


  472. A Lloyd-Max-based Non-Uniform Quantization Scheme for Distributed Video Coding. [Citation Graph (, )][DBLP]


  473. Evaluation of High-tech Program Based on Rough Set Theory. [Citation Graph (, )][DBLP]


  474. Building personalized recommendation system in E-Commerce using association rule-based mining and classification. [Citation Graph (, )][DBLP]


  475. Region-based Image Fusion by Using Region Priorities. [Citation Graph (, )][DBLP]


  476. A software architecture for real-time embedded systems based on pre-run-time scheduling. [Citation Graph (, )][DBLP]


  477. Improved Approach of Seed Point Selection in RPCCL Algorithm for Aerial Remote Sensing Hyper-spectral Data Clustering with Data Dimensionality Reduction. [Citation Graph (, )][DBLP]


  478. The relation of CMM and software lifecycle model. [Citation Graph (, )][DBLP]


  479. A New Type of Proxy Ring Signature Scheme with Revocable Anonymity. [Citation Graph (, )][DBLP]


  480. Ring Blind Signature Scheme. [Citation Graph (, )][DBLP]


  481. New Software Quality Metrics for Object-Oriented Programs. [Citation Graph (, )][DBLP]


  482. Attack scenario construction with a new sequential mining technique. [Citation Graph (, )][DBLP]


  483. Address Fragment-Compact Garbage Collection Algorithm. [Citation Graph (, )][DBLP]


  484. Design and implementation of a personal firewall Based on NDIS Intermediate Drivers. [Citation Graph (, )][DBLP]


  485. A Formal Testing Framework for UML Statecharts. [Citation Graph (, )][DBLP]


  486. Efficient Identity-based Signature Scheme with Partial Message Recovery. [Citation Graph (, )][DBLP]


  487. Fuzzy Many-Valued Context Analysis Based on Formal Description. [Citation Graph (, )][DBLP]


  488. Knowledge Interconnection Based on Binary Semantic Relation Analysis. [Citation Graph (, )][DBLP]


  489. A New Orientation for Multi-Class SVM. [Citation Graph (, )][DBLP]


  490. A Hierarchical Clustering Based on Overlap Similarity Measure. [Citation Graph (, )][DBLP]


  491. OnRipple: A Distributed Overlay Framework for Targeted Immunization in Large-Scale Networks. [Citation Graph (, )][DBLP]


  492. A Virus Immunization Model Based on Communities in Large Scale Networks. [Citation Graph (, )][DBLP]


  493. Security Analysis and Improvement of a ($t, n$) Threshold Proxy Signature Scheme. [Citation Graph (, )][DBLP]


  494. Efficient Modular Exponentiation with Three-Moduli (2n 1, 2n+3). [Citation Graph (, )][DBLP]


  495. A Mixed Fast Particle Filter. [Citation Graph (, )][DBLP]


  496. Experiment of Phase Unwrapping algorithm in Interferometric Synthetic Aperture Sonar. [Citation Graph (, )][DBLP]


  497. A New Data Protecting Scheme Based on TPM. [Citation Graph (, )][DBLP]


  498. On the Encryption of Image Decompression with User's Identity. [Citation Graph (, )][DBLP]


  499. Towards Semi-Automatic Generation of Provably Correct Algorithmic Programs. [Citation Graph (, )][DBLP]


  500. Distributed Secure Information Sharing Model for E-Government in China. [Citation Graph (, )][DBLP]


  501. QoS Performance Analysis in Deployment of DiffServ Aware MPLS Traffic Engineering. [Citation Graph (, )][DBLP]


  502. Statistical Modeling and Correlation Analysis of End-to-End Delay in Wide Area Networks. [Citation Graph (, )][DBLP]


  503. Data Burst Statistics and Performance Analysis of Optical Burst Switching Networks with Self-Similar Traffic. [Citation Graph (, )][DBLP]


  504. Research on XML United-Signature Technology and Its Implementation. [Citation Graph (, )][DBLP]


  505. Experimentation of Interferometric Synthetic Aperture Sonar. [Citation Graph (, )][DBLP]


  506. A Robust 3D Model Watermarking Scheme Based on Feature Recognition. [Citation Graph (, )][DBLP]


  507. Trustable Ad Hoc Networks of Agent Societies. [Citation Graph (, )][DBLP]


  508. Clustering Ensemble based on the K-NN Algorithm. [Citation Graph (, )][DBLP]


  509. An Improved Attribute Reduction Algorithm Based on Rough Set. [Citation Graph (, )][DBLP]


  510. Mining of Reuse Patterns in CDMA Network Optimization. [Citation Graph (, )][DBLP]


  511. A Connection Degree-Based Rough Set Model and its Application to Knowledge Reduction. [Citation Graph (, )][DBLP]


  512. Incorporating a PMF-Based Injury Model into a Multi-Agent Representation of Crowd Behavior. [Citation Graph (, )][DBLP]


  513. SINS/GPS Integrated Navigation for AUV with RBF-Neural Network. [Citation Graph (, )][DBLP]


  514. An Adaptive Probability Access Mechanism for Wireless Sensor Network. [Citation Graph (, )][DBLP]


  515. A Mesh-Based QoS Aware Multicast Routing Protocol. [Citation Graph (, )][DBLP]


  516. An Improved Estimation Algorithm for User Vertical Protection Level. [Citation Graph (, )][DBLP]


  517. Solutions of fractional differential equations with constant coefficients. [Citation Graph (, )][DBLP]


  518. Numerical Stability of Delay Integro-Differential Equations under Resolvent Conditions. [Citation Graph (, )][DBLP]


  519. Matrix Method for Principal Normal Form of Propositional Formula. [Citation Graph (, )][DBLP]


  520. Application of Concurrent Subspace Design to Shape Design of Automatic Underwater Vehicle*. [Citation Graph (, )][DBLP]


  521. Modeling electronic institutions with extended colored Petri net. [Citation Graph (, )][DBLP]


  522. OR-ATP: An Operation Refinement Approach As a Process of Automatic Theorem Proving. [Citation Graph (, )][DBLP]


  523. Culture-Centered Design: Cultural Factors in Interface Usability and Usability tests. [Citation Graph (, )][DBLP]


  524. A Collaborative Retrieval System--Full Text Base and Database. [Citation Graph (, )][DBLP]


  525. Efficient XML query using Relational Data Model. [Citation Graph (, )][DBLP]


  526. Two Symmetrical Decomposition Methods for Structure-complex Petri Net and Their Applications. [Citation Graph (, )][DBLP]


  527. A Dynamic and Interactive Diagnosing and Testing Method for Development of Digital TV Receiver System. [Citation Graph (, )][DBLP]


  528. Documents Distribution Strategy Based on Queuing Model and Chaotic Searching Algorithm in Web Server Cluster. [Citation Graph (, )][DBLP]


  529. Concept Index for Document Retrieval with Peer-to-Peer Network. [Citation Graph (, )][DBLP]


  530. Automated Test Data Generation Algorithm Based On Reversed Binary Tree. [Citation Graph (, )][DBLP]


  531. Prioritized Constraints with Data Sampling Scores for Automatic Test Data Generation. [Citation Graph (, )][DBLP]


  532. Performance Modeling and Evaluation of e-commerce Systems Using UML 2.0. [Citation Graph (, )][DBLP]


  533. Security Analysis for Internet Banking Models. [Citation Graph (, )][DBLP]


  534. A Yellow Page Information Retrieval System Based on Sorted Duality Interrelevant Successive Tree and Industry Ontology. [Citation Graph (, )][DBLP]


  535. The Architecture of CAR Component Web Service. [Citation Graph (, )][DBLP]


  536. Study on the E-Government Information Sources Exchange Based on Directory Service. [Citation Graph (, )][DBLP]


  537. XSS application worms: New Internet infestation and optimized protective measures. [Citation Graph (, )][DBLP]


  538. Automatic attack plan recognition from intrusion alerts. [Citation Graph (, )][DBLP]


  539. A New Threshold Group Signature Scheme Based on Discrete Logarithm Problem . [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002