The SCEAS System
Navigation Menu

Conferences in DBLP

(fgit)
2009 (conf/fgit/2009)


  1. Computer Science: Where Is the Next Frontier? [Citation Graph (, )][DBLP]


  2. Video Forgery. [Citation Graph (, )][DBLP]


  3. Intelligent Data Granulation on Load: Improving Infobright's Knowledge Grid. [Citation Graph (, )][DBLP]


  4. Data Analysis Methods for Library Marketing. [Citation Graph (, )][DBLP]


  5. HMM Approach for Classifying Protein Structures. [Citation Graph (, )][DBLP]


  6. Investigation of Average Mutual Information for Species Separation Using GSOM. [Citation Graph (, )][DBLP]


  7. Speech Recognition System and Formant Based Analysis of Spoken Arabic Vowels. [Citation Graph (, )][DBLP]


  8. A Study on Mental Tasks Discriminative Power. [Citation Graph (, )][DBLP]


  9. A Straight Line-Based Distance Measure to Compute Photographic Compositional Dissimilarity. [Citation Graph (, )][DBLP]


  10. Data Gathering for Gesture Recognition Systems Based on Mono Color-, Stereo Color- and Thermal Cameras. [Citation Graph (, )][DBLP]


  11. Object Surface Reconstruction from One Camera System. [Citation Graph (, )][DBLP]


  12. The Study of Development Strategy for Bank Distribution Network through the Analysis of Inter-regional Financial Transaction Network. [Citation Graph (, )][DBLP]


  13. Global Synchronization Properties for Different Classes of Underlying Interconnection Graphs for Kuramoto Coupled Oscillators. [Citation Graph (, )][DBLP]


  14. Predicting the Performance of a GRID Environment: An Initial Effort to Increase Scheduling Efficiency. [Citation Graph (, )][DBLP]


  15. Towards an Integrated Vision across Inter-cooperative Grid Virtual Organizations. [Citation Graph (, )][DBLP]


  16. Effective GIS Mobile Query System. [Citation Graph (, )][DBLP]


  17. Modeling and Simulation of Tandem Tollbooth Operations with Max-Algebra Approach. [Citation Graph (, )][DBLP]


  18. Intrusion Detection Based on Back-Propagation Neural Network and Feature Selection Mechanism. [Citation Graph (, )][DBLP]


  19. Automatic Detection for JavaScript Obfuscation Attacks in Web Pages through String Pattern Analysis. [Citation Graph (, )][DBLP]


  20. Fragmentation Point Detection of JPEG Images at DHT Using Validator. [Citation Graph (, )][DBLP]


  21. Secure and Energy Efficient Key Management Scheme Using Authentication in Cluster Based Routing Protocol. [Citation Graph (, )][DBLP]


  22. Automatic Detection of Infinite Recursion in AspectJ Programs. [Citation Graph (, )][DBLP]


  23. A Hierarchical Test Model and Automated Test Framework for RTC. [Citation Graph (, )][DBLP]


  24. A Bi-objective Model Inspired Greedy Algorithm for Test Suite Minimization. [Citation Graph (, )][DBLP]


  25. Analysing Object Type Hierarchies to Identify Crosscutting Concerns. [Citation Graph (, )][DBLP]


  26. A Bayesian Inference Tool for NHPP-Based Software Reliability Assessment. [Citation Graph (, )][DBLP]


  27. AGILE Rate Control for IEEE 802.11 Networks. [Citation Graph (, )][DBLP]


  28. Low Density Parity Check Code for the Single Carrier Frequency Division Multiple Access. [Citation Graph (, )][DBLP]


  29. Dual Optimization of Dynamic Sensor Function Allocation and Effective Sensed Data Aggregation in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  30. Depth-Spatio-Temporal Joint Region-of-Interest Extraction and Tracking for 3D Video. [Citation Graph (, )][DBLP]


  31. Dynamic Routing Algorithm for Reliability and Energy Efficiency in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  32. QoS Multicast Routing Algorithms Based on Tabu Search with Hybrid Candidate List. [Citation Graph (, )][DBLP]


  33. A Lifetime Enhancing Node Deployment Strategy in WSN. [Citation Graph (, )][DBLP]


  34. Experimental Investigation of Three Machine Learning Algorithms for ITS Dataset. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002