The SCEAS System
Navigation Menu

Conferences in DBLP

(icdim)
2008 (conf/icdim/2008)


  1. Using expert systems technology to increase agriculture production and water conservation. [Citation Graph (, )][DBLP]


  2. Reference architecture for enterprise batch processing of unformation. [Citation Graph (, )][DBLP]


  3. Hybrid differential evolution - Particle Swarm Optimization algorithm for solving global optimization problems. [Citation Graph (, )][DBLP]


  4. Reinforcement _recurrent fuzzy rule based system based on brain emotional learning structure to predict the complexity dynamic system. [Citation Graph (, )][DBLP]


  5. Follow-the-Trial-Fitter: Real-time dressing without undressing. [Citation Graph (, )][DBLP]


  6. Exploring the applicability of Web Architectural-Inducing Model (WA-IM) for Information Architecture in cultural context: A structural equation modeling approach. [Citation Graph (, )][DBLP]


  7. GGA-AAM: Novel heuristic method of gradient driven Genetic Algorithm for Active Appearance Models. [Citation Graph (, )][DBLP]


  8. Mobile education: Towards affective bi-modal interaction for adaptivity. [Citation Graph (, )][DBLP]


  9. A backup mechanism with concurrency control for multilevel secure distributed database systems. [Citation Graph (, )][DBLP]


  10. An evaluation of users' tips effectiveness for Phishing websites detection. [Citation Graph (, )][DBLP]


  11. Mobile agent based real time IP traceback. [Citation Graph (, )][DBLP]


  12. An authorization model for Web Services within SOA. [Citation Graph (, )][DBLP]


  13. A fine-grained time-constraint role-based access control using OCL. [Citation Graph (, )][DBLP]


  14. A holographic associative memory recommender system. [Citation Graph (, )][DBLP]


  15. Content-based RSS and broadcast news streams aggregation and retrieval. [Citation Graph (, )][DBLP]


  16. Bibliographic element extraction from scanned documents using conditional random fields. [Citation Graph (, )][DBLP]


  17. Unsupervised key-phrases extraction from scientific papers using domain and linguistic knowledge. [Citation Graph (, )][DBLP]


  18. A Quality-Aware Context-Based Access Control model for ubiquitous applications. [Citation Graph (, )][DBLP]


  19. Intelligent vertical handover decision model to improve QoS. [Citation Graph (, )][DBLP]


  20. Term selection patterns for formulating queries: a User study focused on term semantics. [Citation Graph (, )][DBLP]


  21. Classification of personal names with application to DBLP. [Citation Graph (, )][DBLP]


  22. A framework for transient objects in Digital Libraries. [Citation Graph (, )][DBLP]


  23. A geo-temporal Web gazetteer integrating data from multiple sources. [Citation Graph (, )][DBLP]


  24. Performance optimization over channel model for a Low Rate Wireless Personal Area Network. [Citation Graph (, )][DBLP]


  25. Peer-to-peer searching mechanisms for location-aware contents with time-dependent importance. [Citation Graph (, )][DBLP]


  26. Ubiquitous computing and android. [Citation Graph (, )][DBLP]


  27. MiRE: A Minimal Rule Engine for context-aware mobile devices. [Citation Graph (, )][DBLP]


  28. Integrating multimedia repositories into the PROBADO framework. [Citation Graph (, )][DBLP]


  29. RIPPNET: Efficient range indexing in peer-to-peer networks. [Citation Graph (, )][DBLP]


  30. Simultaneous multi-DAD (SDAD) in Mobile IPv6. [Citation Graph (, )][DBLP]


  31. Ubiquitous desktops with multi-factor authentication. [Citation Graph (, )][DBLP]


  32. Comparative study on Null Boundary and Periodic Boundary 3-neighborhood Multiple Attractor Cellular Automata for classification. [Citation Graph (, )][DBLP]


  33. Implementation of ER diagrams in the framework of a Periodic Table of Generic Visualization methods. [Citation Graph (, )][DBLP]


  34. Anomaly detection and visualization using Fisher Discriminant clustering of network entropy. [Citation Graph (, )][DBLP]


  35. Automatic selection of visually attractive pages for thumbnail display in document list view. [Citation Graph (, )][DBLP]


  36. A machine vision approach for jacket launching angle measurement. [Citation Graph (, )][DBLP]


  37. Analysis of machine learning techniques for context extraction. [Citation Graph (, )][DBLP]


  38. How the ExpLSA approach impacts the document classification tasks. [Citation Graph (, )][DBLP]


  39. Data collection system for link analysis. [Citation Graph (, )][DBLP]


  40. Algorithm of the longest commonly consecutive word for Plagiarism detection in text based document. [Citation Graph (, )][DBLP]


  41. A ranking algorithm for user-generated video contents based on social activities. [Citation Graph (, )][DBLP]


  42. Flexible Question Answering System for mobile devices. [Citation Graph (, )][DBLP]


  43. Grid-based Semantic Integration and dissemination of medical information. [Citation Graph (, )][DBLP]


  44. English sentence retrieval system based on dependency structure and its evaluation. [Citation Graph (, )][DBLP]


  45. DYONIPOS: Proactive support of knowledge workers. [Citation Graph (, )][DBLP]


  46. Managing tacit and explicit knowledge in organisational teams. [Citation Graph (, )][DBLP]


  47. Enhancing interoperability between enterprise planning applications: An architectural framework. [Citation Graph (, )][DBLP]


  48. Reshaping email relationships. [Citation Graph (, )][DBLP]


  49. A participant testing strategy for service orchestrations. [Citation Graph (, )][DBLP]


  50. Modeling vocabularies in the architectural domain. [Citation Graph (, )][DBLP]


  51. Bug reports retrieval using Self-organizing Map. [Citation Graph (, )][DBLP]


  52. Approximation algorithm using: Neighbors, history and errors (NHE). [Citation Graph (, )][DBLP]


  53. NIDS based on payload word frequencies and anomaly of transitions. [Citation Graph (, )][DBLP]


  54. A cross-layer framework for video streaming over wireless ad-hoc networks. [Citation Graph (, )][DBLP]


  55. Reliable data aggregation protocol for wireless sensor networks. [Citation Graph (, )][DBLP]


  56. Addressing the vulnerability of the 4-way handshake of 802.11i. [Citation Graph (, )][DBLP]


  57. A power efficient technique for multi-channel dissemination networks. [Citation Graph (, )][DBLP]


  58. Chain ontology based: A model for protecting personal information privacy. [Citation Graph (, )][DBLP]


  59. Description Ontologies. [Citation Graph (, )][DBLP]


  60. Query rewriting for lightweight information integration. [Citation Graph (, )][DBLP]


  61. The role of interoperability in eGovernment applications: An investigation of obstacles and implementation decisions. [Citation Graph (, )][DBLP]


  62. Legal cognitive decision processing towards a dynamic taxonomy. [Citation Graph (, )][DBLP]


  63. E-business and strategy management in Digital Information Management methodologies: An adaptive algorithmic approach. [Citation Graph (, )][DBLP]


  64. PROMETHEE-based recommender system for multi-sort recommendations in on-line stores. [Citation Graph (, )][DBLP]


  65. Electronic government paradigm. [Citation Graph (, )][DBLP]


  66. A framework for culture influence Virtual Learning Environments trust. [Citation Graph (, )][DBLP]


  67. Modeling interactivity in a B2B Web-based Community. [Citation Graph (, )][DBLP]


  68. Identification of influence factors in the information technology formation in United Arab Emirates. [Citation Graph (, )][DBLP]


  69. How to assess customer opinions beyond language barriers? [Citation Graph (, )][DBLP]


  70. Extracting community structure features for hypertext classification. [Citation Graph (, )][DBLP]


  71. Hierarchical segmentation of digital mammography by agents competition. [Citation Graph (, )][DBLP]


  72. Visualizing consumption in weighted hierarchies. [Citation Graph (, )][DBLP]


  73. Collaborative geospatial web services for multi-dimension remote sensing data. [Citation Graph (, )][DBLP]


  74. A model driven approach to the design and implementing of fault tolerant Service oriented Architectures. [Citation Graph (, )][DBLP]


  75. Towards an automatic real-time assessment of online discussions in Computer-Supported Collaborative Learning practices. [Citation Graph (, )][DBLP]


  76. A framework for caching relevant data items for checking integrity constraints of mobile database. [Citation Graph (, )][DBLP]


  77. Efficient distributed information management in smart spaces. [Citation Graph (, )][DBLP]


  78. A robust cooperation approach for mobile multimedia adhoc networks. [Citation Graph (, )][DBLP]


  79. A new sufficient condition for 1-coverage to imply connectivity. [Citation Graph (, )][DBLP]


  80. A genetic algorithm for logical topic text segmentation. [Citation Graph (, )][DBLP]


  81. Towards the development of an automatic readability measurements for arabic language. [Citation Graph (, )][DBLP]


  82. Testing concept indexing in crosslingual medical text classification. [Citation Graph (, )][DBLP]


  83. Use of text syntactical structures in detection of document duplicates. [Citation Graph (, )][DBLP]


  84. A new technique for detecting similar documents based on term co-occurrence and conceptual property of the text. [Citation Graph (, )][DBLP]


  85. Morphological analysis of Bangla words for Universal Networking Language. [Citation Graph (, )][DBLP]


  86. A comparison of collation algorithm for Myanmar language. [Citation Graph (, )][DBLP]


  87. Sentence compression by structural conversion of parse tree. [Citation Graph (, )][DBLP]


  88. Robust recognition of complex entities in text exploiting enterprise data and NLP-techniques. [Citation Graph (, )][DBLP]


  89. Time signatures - an implementation of Keystroke and click patterns for practical and secure authentication. [Citation Graph (, )][DBLP]


  90. Securing information content using new encryption method and Steganography. [Citation Graph (, )][DBLP]


  91. The importance of biometric sensor continuous secure monitoring. [Citation Graph (, )][DBLP]


  92. Integrity assurance of mobile agents through public-key encryption and watermarking. [Citation Graph (, )][DBLP]


  93. A NetFlow based internet-worm detecting system in large network. [Citation Graph (, )][DBLP]


  94. Runtime middleware for the generation of adaptive user interfaces on resource-constrained devices. [Citation Graph (, )][DBLP]


  95. A framework for RESTful object exchange through schematized XML (unRESTricted). [Citation Graph (, )][DBLP]


  96. Fine-grained access control in hybrid relational-XML database. [Citation Graph (, )][DBLP]


  97. CXQU: A compact XML storage for efficient query and update processing. [Citation Graph (, )][DBLP]


  98. Enabling smooth integration between HL7 CDA and medical guidelines on the web with an initial focus on women's health in general practice. [Citation Graph (, )][DBLP]


  99. Sieving publishing communities in DBLP. [Citation Graph (, )][DBLP]


  100. A fast approximate algorithm for large-scale Latent Semantic Indexing. [Citation Graph (, )][DBLP]


  101. Two pattern classifiers for interval data based on binary regression models. [Citation Graph (, )][DBLP]


  102. Learning classifiers without negative examples: A reduction approach. [Citation Graph (, )][DBLP]


  103. Semantic cache schema for query processing in mobile databases. [Citation Graph (, )][DBLP]


  104. Statistical shape based multispectral image retrieval extracting Power Spectrum Vectors. [Citation Graph (, )][DBLP]


  105. A cross-layer quality driven approach in Web service selection. [Citation Graph (, )][DBLP]


  106. A storage scheme for multidimensional data alleviating dimension dependency. [Citation Graph (, )][DBLP]


  107. Management of context-aware preferences in multidimensional databases. [Citation Graph (, )][DBLP]


  108. Visual SBVR. [Citation Graph (, )][DBLP]


  109. Adapted relation structure algorithm for Word Sense Disambiguation. [Citation Graph (, )][DBLP]


  110. Process-oriented method usage for examining the knowledge mining process. [Citation Graph (, )][DBLP]


  111. Knowledge management practices in higher education institutes: A different approach. [Citation Graph (, )][DBLP]


  112. Performance analysis of an insider threat mitigation model. [Citation Graph (, )][DBLP]


  113. Using the augmented vector space model to support the knowledge worker in document filtering. [Citation Graph (, )][DBLP]


  114. Adaptive mean shift-based image segmentation using multiple instance learning. [Citation Graph (, )][DBLP]


  115. The softphone security. [Citation Graph (, )][DBLP]


  116. Real-time detection of sport in MPEG-2 sequences using high-level AV-descriptors and SVM. [Citation Graph (, )][DBLP]


  117. Identifying bioentity recognition errors of rule-based text-mining systems. [Citation Graph (, )][DBLP]


  118. MAW: A new effective and efficient knowledge Meta-model for Audiovisual Works. [Citation Graph (, )][DBLP]


  119. Availability measurement in peer to peer network management systems. [Citation Graph (, )][DBLP]


  120. A load balancing replica placement strategy in Data Grid. [Citation Graph (, )][DBLP]


  121. Matching multiple elements in grid databases: A practical approach. [Citation Graph (, )][DBLP]


  122. DVM based Dynamic VPN Architecture for Group Working and Orchestrated Distributed Computing. [Citation Graph (, )][DBLP]


  123. Geo-information quality assurance in disaster management. [Citation Graph (, )][DBLP]


  124. Population-variance and explorative power of Harmony Search: An analysis. [Citation Graph (, )][DBLP]


  125. Browsing service registries using the Atom Interface: An application in e-Government. [Citation Graph (, )][DBLP]


  126. MyLegislative information service: Closing the gap between the citizens and the democracy. [Citation Graph (, )][DBLP]


  127. Introducing the need for a domain model in Public Service Provision (PSP) eGovernment Systems. [Citation Graph (, )][DBLP]


  128. Semantic Interoperability Middleware - Cases and applications in Electronic Government. [Citation Graph (, )][DBLP]


  129. Evaluating parliamentary e-participation. [Citation Graph (, )][DBLP]


  130. Towards e-Government: The security SOA approach of the University of Murcia. [Citation Graph (, )][DBLP]


  131. An empirical study of e-Government formulation in Kingdom of Saudi Arabia & United Arab Emirates. [Citation Graph (, )][DBLP]


  132. Privacy in context: Privacy issues in Ubiquitous Computing applications. [Citation Graph (, )][DBLP]


  133. The management of online credit card data using the Payment Card Industry Data Security Standard. [Citation Graph (, )][DBLP]


  134. Email reply prediction: Unsupervised leaning approach. [Citation Graph (, )][DBLP]


  135. An analytical framework for country level E-strategy assessment. [Citation Graph (, )][DBLP]


  136. Context-aware user model for personalized services. [Citation Graph (, )][DBLP]


  137. Context-awareness and model driven engineering: Illustration by an E-commerce application scenario. [Citation Graph (, )][DBLP]


  138. A generic context model with autonomic features. [Citation Graph (, )][DBLP]


  139. Mobile Ontology-based Reasoning and Feedback (MORF) Health Monitoring System. [Citation Graph (, )][DBLP]


  140. A hierarchical model-based system for discovering atypical behavior. [Citation Graph (, )][DBLP]


  141. Smart heating systems: Optimizing heating systems by kinetic-awareness. [Citation Graph (, )][DBLP]


  142. Context management for response to traffic accident in smart environment. [Citation Graph (, )][DBLP]


  143. Acceptance, usability and usefulness of WebLab-Deusto from students point of view. [Citation Graph (, )][DBLP]


  144. Design, implementation and use of a remote network lab as an aid to support teaching computer network. [Citation Graph (, )][DBLP]


  145. Design and test of Application-Specific Integrated Circuits by use of mobile clients. [Citation Graph (, )][DBLP]


  146. Reusability in practice for Remote Laboratories. [Citation Graph (, )][DBLP]


  147. Remote controlled flying robot platform. [Citation Graph (, )][DBLP]


  148. Combating digital document forgery using new secure information hiding algorithm. [Citation Graph (, )][DBLP]


  149. Preservation metadata - a framework for 3D data based on the Semantic Web. [Citation Graph (, )][DBLP]


  150. The X.509 certificate quality. [Citation Graph (, )][DBLP]


  151. A data model for versioned XML documents using XQuery. [Citation Graph (, )][DBLP]


  152. A survey in semantic web technologies-inspired focused crawlers. [Citation Graph (, )][DBLP]


  153. An empirical analysis on progress of technology fusion. [Citation Graph (, )][DBLP]


  154. Dynamic detection and administration of materialized views based on the Query Graph Model. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002