The SCEAS System
Navigation Menu

Conferences in DBLP

(saicsit)
2007 (conf/saicsit/2007)


  1. Peepholes with no strings attached: using image processing as input in camera-phones. [Citation Graph (, )][DBLP]


  2. A probabilistic movement model for shortest path formation in virtual ant-like agents. [Citation Graph (, )][DBLP]


  3. Constraint-based conversion of fiction text to a time-based graphical representation. [Citation Graph (, )][DBLP]


  4. Utilizing fuzzy logic and neural networks for effective, preventative intrusion detection in a wireless environment. [Citation Graph (, )][DBLP]


  5. A model to assess the benefit value of knowledge management in an IT service provider environment. [Citation Graph (, )][DBLP]


  6. Simulating adversarial interactions between intruders and system administrators using OODA-RR. [Citation Graph (, )][DBLP]


  7. Assessment of a framework to compare software development methodologies. [Citation Graph (, )][DBLP]


  8. Supporting CS1 with a program beacon recognition tool. [Citation Graph (, )][DBLP]


  9. Design principles for a virtual multiprocessor. [Citation Graph (, )][DBLP]


  10. Evolving pushdown automata. [Citation Graph (, )][DBLP]


  11. Dynamic role allocation for small search engine clusters. [Citation Graph (, )][DBLP]


  12. Providing a holistic perspective to evaluating e-service quality in web-based systems: a multi-stakeholder approach. [Citation Graph (, )][DBLP]


  13. Agile software development: a contemporary philosophical perspective. [Citation Graph (, )][DBLP]


  14. A hybrid approach to automatic programming for the object-oriented programming paradigm. [Citation Graph (, )][DBLP]


  15. Identity and access management for the distribution of social grants in South Africa. [Citation Graph (, )][DBLP]


  16. A comparative study of two usability evaluation methods using a web-based e-learning application. [Citation Graph (, )][DBLP]


  17. An ontology-based, multi-modal platform for the inclusion of marginalized rural communities into the knowledge society. [Citation Graph (, )][DBLP]


  18. Modelling the factors that influence mobile phone adoption. [Citation Graph (, )][DBLP]


  19. Criteria used in selecting effective requirements elicitation procedures. [Citation Graph (, )][DBLP]


  20. Generic process model structures: towards a standard notation for abstract representations. [Citation Graph (, )][DBLP]


  21. SQL's revoke with a view on privacy. [Citation Graph (, )][DBLP]


  22. KernTune: self-tuning Linux kernel performance using support vector machines. [Citation Graph (, )][DBLP]


  23. Examining the influence of demographic factors on internet users' information privacy concerns. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002