The SCEAS System
Navigation Menu

Conferences in DBLP

(ichit)
2009 (conf/ichit/2009)


  1. A collective transaction processing scheme for mobile environment. [Citation Graph (, )][DBLP]


  2. A framework to support real-time features of intelligent service robots. [Citation Graph (, )][DBLP]


  3. A hardware implementation of AGC and synchronization for OFDM-based WLAN. [Citation Graph (, )][DBLP]


  4. A MAC protocol considering traffic load information for a cluster based wireless sensor network. [Citation Graph (, )][DBLP]


  5. A modified-FCM segmentation algorithm for brain MR images. [Citation Graph (, )][DBLP]


  6. A molecular docking system using CUDA. [Citation Graph (, )][DBLP]


  7. A multi-level elaborate least frequently/recently used buffer cache for flash storage systems. [Citation Graph (, )][DBLP]


  8. A new stereo matching algorithm for binocular vision. [Citation Graph (, )][DBLP]


  9. A novel genetic variable representation for dynamic optimization problems in evolutionary computation. [Citation Graph (, )][DBLP]


  10. A parallel motion estimation engine for H.264 encoding using the UMHexagonS algorithm. [Citation Graph (, )][DBLP]


  11. A partition-based centralized LEACH algorithm for wireless sensor networks using solar energy. [Citation Graph (, )][DBLP]


  12. A real-time hardware-software codesign technique of network protocols to provide QoS. [Citation Graph (, )][DBLP]


  13. A secure ubiquitous sensor network with Dragon. [Citation Graph (, )][DBLP]


  14. A statistical method for structure learning of Bayesian networks from data. [Citation Graph (, )][DBLP]


  15. A study of metadata design for e-Learning marketplace based on IPTV. [Citation Graph (, )][DBLP]


  16. A study on intrusion protection techniques against Linux kernel backdoor. [Citation Graph (, )][DBLP]


  17. A study on the BER performance of turbo coded T-DMB system. [Citation Graph (, )][DBLP]


  18. A study on the digital watermarking technique for JPEG 2000. [Citation Graph (, )][DBLP]


  19. A threat-based privacy preservation system in untrusted environment. [Citation Graph (, )][DBLP]


  20. A weighted-dissimilarity-based anomaly detection method for mobile networks. [Citation Graph (, )][DBLP]


  21. Actuation architecture for emotional robotic applications. [Citation Graph (, )][DBLP]


  22. Adaptive intra cluster routing for wireless sensor networks. [Citation Graph (, )][DBLP]


  23. Adaptive PSAM in SIMO systems with imperfect CSI in Rayleigh fading channels. [Citation Graph (, )][DBLP]


  24. Advanced narrow speech channeling algorithm for robot speech recognition. [Citation Graph (, )][DBLP]


  25. An application of host identity tags to DKIM for identifying signers. [Citation Graph (, )][DBLP]


  26. An approach to enhancing reusabilities in service development. [Citation Graph (, )][DBLP]


  27. An efficient algorithm for AS path inferring. [Citation Graph (, )][DBLP]


  28. An efficient design pattern algorithm for the environmental and hydrologic/hydraulic ubiquitous model developments. [Citation Graph (, )][DBLP]


  29. An energy-efficient skyline query processing method using priority-based bottom-up filtering. [Citation Graph (, )][DBLP]


  30. An implementation of the CQS supporting multimedia traffic. [Citation Graph (, )][DBLP]


  31. An improved camera identification method based on the texture complexity and the image restoration. [Citation Graph (, )][DBLP]


  32. Analysis of rhythms of EEG signals using orthogonal polynomial approximation. [Citation Graph (, )][DBLP]


  33. Application services based on location information in the SIP phone. [Citation Graph (, )][DBLP]


  34. Architecture of electronic surveillance of P2P based VoIP service. [Citation Graph (, )][DBLP]


  35. Automatic generation techniques of a resource monitor based on deployment diagram. [Citation Graph (, )][DBLP]


  36. Automatic motion creating from the posture template for the robot physical training system. [Citation Graph (, )][DBLP]


  37. Bridge transmission method of medical sensor node in u-healthcare services. [Citation Graph (, )][DBLP]


  38. Capability and limitation of financial time-series data prediction using symbol string quantization. [Citation Graph (, )][DBLP]


  39. CLARM routing: cross layer adhoc-routing based on reputation management in wireless multi-hop networks. [Citation Graph (, )][DBLP]


  40. Context awareness inference engine for location based applications. [Citation Graph (, )][DBLP]


  41. Context-aware robot navigation based on sensor association rules. [Citation Graph (, )][DBLP]


  42. Creating an autonomous dancing robot. [Citation Graph (, )][DBLP]


  43. Deriving hierarchically combined queueing Petri nets for performance prediction of distributed component system. [Citation Graph (, )][DBLP]


  44. Design and implementation of a distributed early warning system combined with intrusion detection system and honeypot. [Citation Graph (, )][DBLP]


  45. Design and implementation of a live-analysis digital forensic system. [Citation Graph (, )][DBLP]


  46. Design and implementation of page sharing scheme between guests in virtualization environments. [Citation Graph (, )][DBLP]


  47. Design for supporting the multimedia emergency VoIP using PSTN and IP network. [Citation Graph (, )][DBLP]


  48. Design of sensor web condition using SMSC. [Citation Graph (, )][DBLP]


  49. Distributed cluster head election algorithm using local energy estimation. [Citation Graph (, )][DBLP]


  50. ECU configuration framework based on AUTOSAR ECU configuration metamodel. [Citation Graph (, )][DBLP]


  51. Effective defect classification for flat display panel film images. [Citation Graph (, )][DBLP]


  52. Efficient execution of application applets based on persistent object caching in Java card system. [Citation Graph (, )][DBLP]


  53. Energy-efficient scheduling of a real-time task on DVFS-enabled multi-cores. [Citation Graph (, )][DBLP]


  54. Evolving fuzzy case-based reasoning in wholesaler's returning book forecasting. [Citation Graph (, )][DBLP]


  55. FMM: fusion media middleware for actual feeling service. [Citation Graph (, )][DBLP]


  56. Hardware-in-the-Loop simulation of UAV non-linear control system of mini-helicopter. [Citation Graph (, )][DBLP]


  57. Huffman coding algorithm for compression of sensor data in wireless sensor networks. [Citation Graph (, )][DBLP]


  58. Hybrid analysis of advantage and efficiency of China agriculture. [Citation Graph (, )][DBLP]


  59. Hybrid file system. [Citation Graph (, )][DBLP]


  60. Hybrid word sense disambiguation using language resources for transliteration of Arabic numerals in Korean. [Citation Graph (, )][DBLP]


  61. Implicit relationship deduction in one/more judgment templates. [Citation Graph (, )][DBLP]


  62. Improved authentication algorithm for UMTS. [Citation Graph (, )][DBLP]


  63. Incentive mechanism for service differentiation in P2P networks. [Citation Graph (, )][DBLP]


  64. Inter-service revisit analysis of three user groups using intra-day behavior in the mobile clickstream. [Citation Graph (, )][DBLP]


  65. Middleware-based distributed systems software process. [Citation Graph (, )][DBLP]


  66. Mining quantitative association rule of earthquake data. [Citation Graph (, )][DBLP]


  67. Modeling rule for analysis and design of e-learning content. [Citation Graph (, )][DBLP]


  68. Movement-aware alternative path routing protocol for vehicular multi-hop communications. [Citation Graph (, )][DBLP]


  69. NMF features for speech emotion recognition. [Citation Graph (, )][DBLP]


  70. On the design and implementation of a secure online password vault. [Citation Graph (, )][DBLP]


  71. Optimal RM scheduling for simply periodic tasks on uniform multiprocessors. [Citation Graph (, )][DBLP]


  72. Parallel implementation of mobile robotic self-localization. [Citation Graph (, )][DBLP]


  73. Patient information display system in hospital using RFID. [Citation Graph (, )][DBLP]


  74. Performability analysis method from reliability and availability. [Citation Graph (, )][DBLP]


  75. Research on load balancing mechanism based on handoff in heterogeneous network platform. [Citation Graph (, )][DBLP]


  76. Sampling scheme for better RBF network. [Citation Graph (, )][DBLP]


  77. Service discovery mechanism based on trustable DHT in MANET. [Citation Graph (, )][DBLP]


  78. Session management of relay-based overlay multicast for managed group applications. [Citation Graph (, )][DBLP]


  79. Smoke detection using boundary growing and moments. [Citation Graph (, )][DBLP]


  80. Study on service model for multimedia streaming and file hosting services using distributed overlay network. [Citation Graph (, )][DBLP]


  81. Terrain mapping and classification using neural networks. [Citation Graph (, )][DBLP]


  82. The integration of simulation modeling system for student experiment and modeling ability evaluation. [Citation Graph (, )][DBLP]


  83. The structure of the SDP using enablers in the IMS. [Citation Graph (, )][DBLP]


  84. The study on the user authentication protocol in GSM. [Citation Graph (, )][DBLP]


  85. Using w3af to achieve automated penetration testing by live DVD/live USB. [Citation Graph (, )][DBLP]


  86. Vehicular client roaming and location-based handoff through multiple WLAN APs in a container terminal. [Citation Graph (, )][DBLP]


  87. A 3D coordinate estimation by using reformed two IR LED markers and PSD camera. [Citation Graph (, )][DBLP]


  88. A 60Hz interference reduction using slope trace waves. [Citation Graph (, )][DBLP]


  89. A color-based clustering approach for web image search results. [Citation Graph (, )][DBLP]


  90. A context-aware service model using a multi-level prediction algorithm in smart home environments. [Citation Graph (, )][DBLP]


  91. A detection model based on statistical against DDoS attack. [Citation Graph (, )][DBLP]


  92. A genetic algorithm approach for a constrained employee scheduling problem as applied to employees at mall type shops. [Citation Graph (, )][DBLP]


  93. A high availability clustering and load balacing mechanism for information security infrastructure system. [Citation Graph (, )][DBLP]


  94. A semantic DRM contents in social-awareness using ontology. [Citation Graph (, )][DBLP]


  95. A study for semantics participation platform architecture using RDF/OWL. [Citation Graph (, )][DBLP]


  96. A study of intelligent earth work using the process simulation. [Citation Graph (, )][DBLP]


  97. A study on enhanced algorithms for detecting defects of glasses. [Citation Graph (, )][DBLP]


  98. A study on intelligent cyber university. [Citation Graph (, )][DBLP]


  99. APJava: an aspect-oriented parallel programming model in Java. [Citation Graph (, )][DBLP]


  100. Bio-inspired simulation tool for PERT. [Citation Graph (, )][DBLP]


  101. Biomedical signal compression based on basis pursuit. [Citation Graph (, )][DBLP]


  102. Coarse-grained reconfigurable architecture for multiple application domains: a case study. [Citation Graph (, )][DBLP]


  103. Combined ranking for multi-media web search engine. [Citation Graph (, )][DBLP]


  104. Comparing two methods for acquiring 3D data of motion capture system by using PSD camera and CCD camera. [Citation Graph (, )][DBLP]


  105. Design and development of a distributed real-time tele-operation model: supporting u-GIS integrated monitor system. [Citation Graph (, )][DBLP]


  106. Development and verification of the DRM standard protocol for media card. [Citation Graph (, )][DBLP]


  107. ECG signal compression using 2D wavelet foveation. [Citation Graph (, )][DBLP]


  108. Effective spelling correction in web queries and run-time DB construction. [Citation Graph (, )][DBLP]


  109. Enhanced next hop selection scheme for QoS support in multi-hop wireless networks. [Citation Graph (, )][DBLP]


  110. Evaluation of group communication quality over WiBro for ship building environment. [Citation Graph (, )][DBLP]


  111. Implementation of IEEE802.11a software defined receiver on chip multi-processor architecture using OpenMP. [Citation Graph (, )][DBLP]


  112. Improved remote user authentication scheme using bilinear pairings. [Citation Graph (, )][DBLP]


  113. Intelligent service reasoning model using data mining. [Citation Graph (, )][DBLP]


  114. Minimize the delay of parasitic capacitance and modeling in RLC circuit. [Citation Graph (, )][DBLP]


  115. Novel OFDM frame synchronization in multi-user environments. [Citation Graph (, )][DBLP]


  116. Optical wireless recharging model for wireless sensor nodes by using Corner Cube Retroreflectors (CCRs). [Citation Graph (, )][DBLP]


  117. Optimal green time calculation using artificial intelligence. [Citation Graph (, )][DBLP]


  118. Performance evaluation of on-chip interconnect IP using CBR traffic generator model. [Citation Graph (, )][DBLP]


  119. Privacy information protection in portable device. [Citation Graph (, )][DBLP]


  120. Robust timing jitter control method for network synchronization. [Citation Graph (, )][DBLP]


  121. Successive interference cancellation for cooperative communication systems. [Citation Graph (, )][DBLP]


  122. Ubiquitous environmental infra systems for the green city. [Citation Graph (, )][DBLP]


  123. Zone-based fairness control in multi-channel multi-rate high-speed networks. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002