Conferences in DBLP
(interaction) 2009 (conf/interaction/2009)
Learning and making sense of project phenomena in information systems education. [Citation Graph (, )][DBLP ] A comparative study on structure of the motivation for information security by security incident experiences. [Citation Graph (, )][DBLP ] A study of correlation between transitions and sound effects in a fairy tale movie. [Citation Graph (, )][DBLP ] A survey on HCI considerations in the software development life cycle: from practitioner's perspective. [Citation Graph (, )][DBLP ] Database design for global patient monitoring applications using WAP. [Citation Graph (, )][DBLP ] Determinism in speech pitch relation to emotion. [Citation Graph (, )][DBLP ] Measuring fish length from digital images (FiLeDI). [Citation Graph (, )][DBLP ] Mobile technology for irrigation problems in rural India. [Citation Graph (, )][DBLP ] Proportional fairness of call blocking probability. [Citation Graph (, )][DBLP ] Relationship of blink, affect, and usability of graph reading tasks. [Citation Graph (, )][DBLP ] Star economy in the user generated content: a new perspective for digital ecosystems. [Citation Graph (, )][DBLP ] The deployment of PDA accessible clinical-log for medical education in PBL-approach. [Citation Graph (, )][DBLP ] The design of aesthetic interaction: towards a graceful interaction framework. [Citation Graph (, )][DBLP ] Turning keywords into URIs: simplified user interfaces for exploring linked data. [Citation Graph (, )][DBLP ] VisionSynaptics: a system convert hand-writing and image symbol into computer symbol. [Citation Graph (, )][DBLP ] Web-enabled user support services system in distance learning. [Citation Graph (, )][DBLP ] A method to support multiple interfaces mobile nodes in PMIPv6 domain. [Citation Graph (, )][DBLP ] A multiple bayes classification solution to word sense disambiguation. [Citation Graph (, )][DBLP ] A multiuser diversity based time-frequency two dimensional adaptive resource allocation algorithm for WiMAX. [Citation Graph (, )][DBLP ] An ambient intelligence architecture for extracting knowledge from distributed sensors. [Citation Graph (, )][DBLP ] An analysis of new features for workflow system in the SaaS software. [Citation Graph (, )][DBLP ] An improvement of secure authentication scheme with full anonymity for wireless communications. [Citation Graph (, )][DBLP ] Approximation for minimum total dominating set. [Citation Graph (, )][DBLP ] DTD2OWL: automatic transforming XML documents into OWL ontology. [Citation Graph (, )][DBLP ] Efficient line buffer instruction cache scheme with prefetch. [Citation Graph (, )][DBLP ] Image segmentation by automatic histogram thresholding. [Citation Graph (, )][DBLP ] Interdisciplinary applications of mathematical modeling. [Citation Graph (, )][DBLP ] Middleware in ubiquitous computing system with MedRec architecture. [Citation Graph (, )][DBLP ] Multi-level visual secret sharing scheme with smooth-looking. [Citation Graph (, )][DBLP ] Pattern-based planning system for complex environments. [Citation Graph (, )][DBLP ] PhraseRank for document clustering: reweighting the weight of phrase. [Citation Graph (, )][DBLP ] Predicting lattice constant of cubic perovskites using support vector regression. [Citation Graph (, )][DBLP ] RoboEarth: connecting robots worldwide. [Citation Graph (, )][DBLP ] Social networks identification and analysis using call detail records. [Citation Graph (, )][DBLP ] Supervised learning algorithm for automatic adaption of situation templates using uncertain data. [Citation Graph (, )][DBLP ] The effect of malicious peers in a gossip-based reputation system. [Citation Graph (, )][DBLP ] Foundation-based mobile platform software engineering: implications to convergence to open source software. [Citation Graph (, )][DBLP ] An interactivity model of mobile interactive TV: a oneseg case for mobile glue. [Citation Graph (, )][DBLP ] Double layered SOA test architecture based on BPA - simulation event. [Citation Graph (, )][DBLP ] Intraorganizational power verified interactive genetic algorithms for the design of logistics network. [Citation Graph (, )][DBLP ] Laying out the scope of developers' risk management responsibilities. [Citation Graph (, )][DBLP ] Network response analyzer system for interactive lectures in classroom or distance learning. [Citation Graph (, )][DBLP ] SLA management process model. [Citation Graph (, )][DBLP ] Study on consumer demands and merchant participation motives of mobile payment services in China. [Citation Graph (, )][DBLP ] PingPong-MAC: secure ubiquitous sensor network with authenticated encryption. [Citation Graph (, )][DBLP ] A study on bio feedback based interactive work for expressing human cytochemism in real-time. [Citation Graph (, )][DBLP ] A directed signature scheme and its application to group key initial distribution. [Citation Graph (, )][DBLP ] A method for opinion mining of product reviews using association rules. [Citation Graph (, )][DBLP ] An adaptive, memory-efficient and fast algorithm for Huffman decoding and its implementation. [Citation Graph (, )][DBLP ] An extended version of scaled small gain condition. [Citation Graph (, )][DBLP ] New link estimation for reliability in wireless sensor networks. [Citation Graph (, )][DBLP ] Mining opinions from messenger. [Citation Graph (, )][DBLP ] A novel fully-differential switched capacitor chopper stabilized cascade sigma-delta modulator for MEMS gyroscope. [Citation Graph (, )][DBLP ] Network selection based on network service zone for macro mobility. [Citation Graph (, )][DBLP ] A user study: the effects of mobile phone prototypes and task complexities on usability. [Citation Graph (, )][DBLP ] Developing a computer system for health assessment. [Citation Graph (, )][DBLP ] No-reference video quality assessment for MPEG-2 video streams using BP neural networks. [Citation Graph (, )][DBLP ] Participatory design and evaluation of e-learning system for Korean language training. [Citation Graph (, )][DBLP ] A weighted closeness-based trust combination model. [Citation Graph (, )][DBLP ] Experiences in security testing for web-based applications. [Citation Graph (, )][DBLP ] Ranking secure technologies in security provision financial transactions mobile commerce. [Citation Graph (, )][DBLP ] Financial performance evaluation of China's listed steel companies from creditors' perspective. [Citation Graph (, )][DBLP ] A novel spatial index for case based geographic retrieval. [Citation Graph (, )][DBLP ] An effective solution for community identification. [Citation Graph (, )][DBLP ] Digital watermarking for volume data based on 3D-DWT and 3D-DCT. [Citation Graph (, )][DBLP ] QoS-aware service composition using NSGA-II1 . [Citation Graph (, )][DBLP ] SVDD regularized with area under the ROC. [Citation Graph (, )][DBLP ] The research on the service marketing strategies and empirical based on the product value. [Citation Graph (, )][DBLP ] The theory and empirical research of differentiation benefit positioning based on product value. [Citation Graph (, )][DBLP ] The theory and empirical research of network marketing based on relational value. [Citation Graph (, )][DBLP ] Information processing of the hull structure oriented to ship structure knowledge-type military specification. [Citation Graph (, )][DBLP ] Ship structure knowledge-based military specification virtual test system's design. [Citation Graph (, )][DBLP ] The analysis of DDoS attack for the video transmission. [Citation Graph (, )][DBLP ] The effectiveness of the handheld devices based on mobiles learning. [Citation Graph (, )][DBLP ] The study for the optimal routing of Bluetooth Piconet. [Citation Graph (, )][DBLP ] The study of effectiveness for ad-hoc wireless network. [Citation Graph (, )][DBLP ] The study of the wireless network DoS attack. [Citation Graph (, )][DBLP ] The study of WSN routing. [Citation Graph (, )][DBLP ] An efficient and effective image representation for region-based image retrieval. [Citation Graph (, )][DBLP ] An efficient region-based image representation using Legendre color distribution moments. [Citation Graph (, )][DBLP ] Automatic identification of covert channels inside Linux kernel based on source codes. [Citation Graph (, )][DBLP ] Design and implementation of a tool for analyzing SELinux secure policy. [Citation Graph (, )][DBLP ] A binary method for fast computation of inter and intra cluster similarities for combining multiple clusterings. [Citation Graph (, )][DBLP ] A comparative study between computer programming languages for developing distributed systems in web environment. [Citation Graph (, )][DBLP ] A maximum network lifetime QoS routing algorithm in MANETs. [Citation Graph (, )][DBLP ] Achieving high efficient agreement with malicious faulty nodes on a cloud computing environment. [Citation Graph (, )][DBLP ] Adaptation e-learning contents in mobile environment. [Citation Graph (, )][DBLP ] An automated mechanism for organizing and retrieving core asset artifacts for product derivation in SPL. [Citation Graph (, )][DBLP ] An empirical study of success factors on business-to-business e-marketplaces from buyers' and sellers' perspectives. [Citation Graph (, )][DBLP ] Attribute summarization: a technique for wireless XML streaming. [Citation Graph (, )][DBLP ] Averaging approach for distributed event detection in wireless sensor networks. [Citation Graph (, )][DBLP ] Context-aware customization e-learning system with intelligent on-line examination mechanism. [Citation Graph (, )][DBLP ] Designing a special purpose e-commerce website. [Citation Graph (, )][DBLP ] Development and estimation of ubiquitous unconstrained BCG monitoring system using wireless sensor node. [Citation Graph (, )][DBLP ] DPUid: distributed algorithm for proximity-based unique id in wireless sensor networks. [Citation Graph (, )][DBLP ] EDARP: novel energy and distance-aware routing protocol in wireless sensor network. [Citation Graph (, )][DBLP ] e-mail authentication system: a spam filtering for smart senders. [Citation Graph (, )][DBLP ] An energy consumption technique for global healthcare monitoring applications. [Citation Graph (, )][DBLP ] Handover support for converged inter-RAT networks. [Citation Graph (, )][DBLP ] Hierarchical service-oriented routing of queries in wireless sensor networks. [Citation Graph (, )][DBLP ] Identity-based secure protocol scheme for wireless sensor network. [Citation Graph (, )][DBLP ] Intelligent agent based hospital search & appointment system. [Citation Graph (, )][DBLP ] Legible+: integrated system for remote collaboration through document creation. [Citation Graph (, )][DBLP ] MPCS: a secure Mobile Payment Consortia System for higher educational institutions. [Citation Graph (, )][DBLP ] Multi-Level Secure Framework (MLSF) for composite web services. [Citation Graph (, )][DBLP ] Optimization of continuous query processing for RFID sensor tag data stream. [Citation Graph (, )][DBLP ] Personal mobile information system. [Citation Graph (, )][DBLP ] Premature ventricular contractions, a typical extra-systole arrhythmia, lowers the scaling exponent: DFA as a beneficial biomedical computation. [Citation Graph (, )][DBLP ] Relative navigation and situation awareness information distribution for GPS information deficient situations. [Citation Graph (, )][DBLP ] Simulation and analysis of ad-hoc on-demand distance vector routing protocol. [Citation Graph (, )][DBLP ] Smart buffer management for different start video broadcasting. [Citation Graph (, )][DBLP ] Using syntactic and contextual information for sentiment polarity analysis. [Citation Graph (, )][DBLP ] Wearable patch-type ECG using ubiquitous wireless sensor network for healthcare monitoring application. [Citation Graph (, )][DBLP ] 6DMPP: small worlds in mobile peer-to-peer networks. [Citation Graph (, )][DBLP ] A study on QoS issues for mobile ad-hoc networks. [Citation Graph (, )][DBLP ] Architecting autonomic computing systems through Probabilistic Software Stability Model (PSSM). [Citation Graph (, )][DBLP ] General criteria on building decision trees for data classification. [Citation Graph (, )][DBLP ] QoS implementation in a federated identities system. [Citation Graph (, )][DBLP ] Requirements for troubleshooting wi-fi network security through location technologies. [Citation Graph (, )][DBLP ] A framework for digital cosmetic system. [Citation Graph (, )][DBLP ] A grid infrastructure for online games. [Citation Graph (, )][DBLP ] A reward field model generation in Q-learning by dynamic programming. [Citation Graph (, )][DBLP ] Buffer and loss monitoring for the control of multimedia data streaming rate on mobile ad hoc networks. [Citation Graph (, )][DBLP ] Category specific SIFT descriptor and its combination with color information for content-based image retrieval. [Citation Graph (, )][DBLP ] Design of memory architecture for autonomous virtual characters using visual attention and quad-graph. [Citation Graph (, )][DBLP ] Weighted Finite Automata encoding over Thai language. [Citation Graph (, )][DBLP ] A wavelet based method for detecting and localizing epileptic neural spikes in EEG. [Citation Graph (, )][DBLP ] An empirical improvement of the accuracy of RBF networks. [Citation Graph (, )][DBLP ] An event detection algorithm in ECG with 60Hz interference and baseline wandering. [Citation Graph (, )][DBLP ] Applying complex system entropy cluster algorithm to mining principle of herbal combinations in traditional Chinese medicine. [Citation Graph (, )][DBLP ] Detecting mitochondria in fluorescence images. [Citation Graph (, )][DBLP ] Effects of discretization on determination of coronary artery disease using support vector machine. [Citation Graph (, )][DBLP ] EMG signal decomposition using wavelet transformation with respect to different wavelet and a comparative study. [Citation Graph (, )][DBLP ] Learning a prediction model for protein-protein recognition. [Citation Graph (, )][DBLP ] Mobile robot for personal exercise training in ubiquitous healthcare environment. [Citation Graph (, )][DBLP ] Ontology-based medical diagnostic knowledge structuring using case-based reasoning methodology. [Citation Graph (, )][DBLP ] Pervasive distributed volume rendering in a lightweight multi-agent platform. [Citation Graph (, )][DBLP ] Thyroid disease diagnosis using Artificial Immune Recognition System (AIRS). [Citation Graph (, )][DBLP ] A literature review for a 6-sigma perception of academic quality. [Citation Graph (, )][DBLP ] Cost effective software engineering using program slicing techniques. [Citation Graph (, )][DBLP ] Fault tree analysis in city lifeline system operations and management-theory and application. [Citation Graph (, )][DBLP ] A perspective of two-dimensional process integration customer relationship management driven business model. [Citation Graph (, )][DBLP ] A new robust forensic marking using peak position modulation for video. [Citation Graph (, )][DBLP ] An improved backprojection algorithm for spiral cone-beam CT with an improved ray traverse algorithm. [Citation Graph (, )][DBLP ] Knowledge-based approach for 3D skeleton extraction. [Citation Graph (, )][DBLP ] Malicious content filtering based on semantic features. [Citation Graph (, )][DBLP ] Mining association rules in tree structured XML data. [Citation Graph (, )][DBLP ] Recommender systems: incremental clustering on web log data. [Citation Graph (, )][DBLP ] A Localized Software-based approach for Fault-Tolerant Ethernet (LSFTE). [Citation Graph (, )][DBLP ] Decentralized Hybrid Wireless Mesh Protocol. [Citation Graph (, )][DBLP ] Design issues of integrated subway air quality management system base on particulate matter measurements. [Citation Graph (, )][DBLP ] Efficient implementation of hybrid automatic gain control algorithm for chirp spread spectrum. [Citation Graph (, )][DBLP ] Efficient service recommendation system for cloud computing market. [Citation Graph (, )][DBLP ] Multi-round scheduling for divisible loads on the heterogeneous cluster systems of multi-core computers. [Citation Graph (, )][DBLP ] Ontology based schema matching and mapping approach for structured databases. [Citation Graph (, )][DBLP ] Performance modeling of slotted MACA-BI MAC protocol for mobile ad hoc networks. [Citation Graph (, )][DBLP ] Performance of Phase-Silence-Shift-Keying for additive white Gaussian noise and fading channels. [Citation Graph (, )][DBLP ] R-ECS: reliable elastic computing services for building virtual computing environment. [Citation Graph (, )][DBLP ] The performance of IPv4 and IPv6 using UDP on IEEE 802.11n WLANs with WPA2 security. [Citation Graph (, )][DBLP ] Using zone-disjoint multi-path routing algorithm for video transmission over ad-hoc networks. [Citation Graph (, )][DBLP ] A formal approach for specification and verification of fault injection process. [Citation Graph (, )][DBLP ] A highly effective model for security protection against eavesdropping exploits. [Citation Graph (, )][DBLP ] A new fault cryptanalysis on montgomery ladder exponentiation algorithm. [Citation Graph (, )][DBLP ] A study of traceability of CDMA-based fingerprinting scheme. [Citation Graph (, )][DBLP ] Access to culture and information through library: a perspective on Chinese copyright law reformation. [Citation Graph (, )][DBLP ] Collect and broadcast news in security. [Citation Graph (, )][DBLP ] Design and simulation of a modified perturbed digital chaotic signal generator for secure data communication. [Citation Graph (, )][DBLP ] Development of digital watermarking technology to protect cadastral map information. [Citation Graph (, )][DBLP ] Dynamic policy model for target based intrusion detection system. [Citation Graph (, )][DBLP ] Relationship between weight of plaintext and successful attacks in knapsack cryptosystems. [Citation Graph (, )][DBLP ] SEAODV: secure efficient AODV routing protocol for MANETs networks. [Citation Graph (, )][DBLP ] Watermarking schema using an artificial immune system in spatial domain. [Citation Graph (, )][DBLP ] Web service description for mobile phone virus. [Citation Graph (, )][DBLP ] A smart automatic thumbnail cropping based on attention driven regions of interest extraction. [Citation Graph (, )][DBLP ] Application of intelligent agents for mobile tutoring. [Citation Graph (, )][DBLP ] Automation technique of software internationalization and localization based on lexical analysis. [Citation Graph (, )][DBLP ] Contrast enhanced dynamic time warping distance for time series shape averaging classification. [Citation Graph (, )][DBLP ] Converting PDF to HTML approach based on text detection. [Citation Graph (, )][DBLP ] From the bricks to the clicks: knowledge management in e-government. [Citation Graph (, )][DBLP ] Making links between goal and tasks to retrieve information from web browsing histories. [Citation Graph (, )][DBLP ] Reinforcement learning coordination with combined heuristics in multi-agent environment for university timetabling. [Citation Graph (, )][DBLP ] Temporal-spatial association analysis of ocean salinity and temperature variations. [Citation Graph (, )][DBLP ] The approximation of interval Bezier curves by a fuzzy rule-based system. [Citation Graph (, )][DBLP ] A study of interface design for widgets in web services through usability evaluation. [Citation Graph (, )][DBLP ] Usability evaluation for history educational games. [Citation Graph (, )][DBLP ] A proposal for secure vehicular communications. [Citation Graph (, )][DBLP ] LBS system using online map in 3G networks environment. [Citation Graph (, )][DBLP ] An approach to combining ActiveX with MATLAB in power electronics education. [Citation Graph (, )][DBLP ] Research on cloud storage architecture and key technologies. [Citation Graph (, )][DBLP ] Practical RFID + sensor convergence toward context-aware X-reality. [Citation Graph (, )][DBLP ] TCP portscan detection based on single packet flows and entropy. [Citation Graph (, )][DBLP ] Virtual shared network for WBANs communication with different RF channel. [Citation Graph (, )][DBLP ] Improvement of Jeju National Museum service using mobile RFID. [Citation Graph (, )][DBLP ] A new dots homogenization algorithm in digital screening technology. [Citation Graph (, )][DBLP ] A perceptive viewpoint controller for the Free-Viewpoint TV. [Citation Graph (, )][DBLP ] Development of integrated e-parcel management system with GSM network. [Citation Graph (, )][DBLP ] Dynamic Electronic Design Automation concept, benefit and framework. [Citation Graph (, )][DBLP ] A harmonized media service middleware using the emotional knowledge. [Citation Graph (, )][DBLP ] Content-based music genre classification using timbral feature vectors and support vector machine. [Citation Graph (, )][DBLP ] Disk I/O based load balancing in VOD system. [Citation Graph (, )][DBLP ] Improved block truncation coding using low cost approach for color image compression. [Citation Graph (, )][DBLP ] Manipulation of virtual objects in marker-less AR system by fingertip tracking and hand gesture recognition. [Citation Graph (, )][DBLP ] Realistic rendering system using the measured BRDFs. [Citation Graph (, )][DBLP ] BioProber2.0: a unified biomedical workbench with mining and probing literatures. [Citation Graph (, )][DBLP ] A method for analysis linear correlation for multi-sensor of bridge monitoring system. [Citation Graph (, )][DBLP ] Content based mammography images retrieval using Ripley's K function. [Citation Graph (, )][DBLP ] Parallel implementation of a financial application on a GPU. [Citation Graph (, )][DBLP ] Lock management in blue whale file system. [Citation Graph (, )][DBLP ] Modified phase silence shift keying with phase offset for WBAN systems. [Citation Graph (, )][DBLP ] Sliding-window caching algorithm for streaming media server. [Citation Graph (, )][DBLP ] Vertical handover between LTE and wireless LAN systems based on common resource management (CRRM) and generic link layer (GLL). [Citation Graph (, )][DBLP ] Design and implementation of SIP-aware DDoS attack detection system. [Citation Graph (, )][DBLP ] A bionic gait programming algorithm for hexapod robot. [Citation Graph (, )][DBLP ] A concept in error correction of text editors: case study Thai-English set. [Citation Graph (, )][DBLP ] Analysis of effect of highway ITS incident management system. [Citation Graph (, )][DBLP ] Automatic focusing attention for a stereo pair of image sequence. [Citation Graph (, )][DBLP ] Automatic number plate detection for Korean vehicles. [Citation Graph (, )][DBLP ] Before and after evaluation of highway ITS based infrastructure project. [Citation Graph (, )][DBLP ] Spatio-temporal mining for power load forecasting in GIS-AMR load analysis model. [Citation Graph (, )][DBLP ] A new palm vein matching method based on ICP algorithm. [Citation Graph (, )][DBLP ] A next generation smart energy technology. [Citation Graph (, )][DBLP ] Complex event processing model for distributed RFID network. [Citation Graph (, )][DBLP ] Non-model self-learning control of nonlinear system. [Citation Graph (, )][DBLP ] On some properties of covering based approximations of classifications of sets. [Citation Graph (, )][DBLP ] ILemo: a web platform to integrate personal data and services. [Citation Graph (, )][DBLP ] Adaptive control of response in a rotor with loose foundation. [Citation Graph (, )][DBLP ] A neural network based model for VoIP speech quality prediction. [Citation Graph (, )][DBLP ] The usage of coarse wordage: a study of the mob rule on China's internet. [Citation Graph (, )][DBLP ] Vision-based two hand detection and tracking. [Citation Graph (, )][DBLP ] A survey of prediction models for breast cancer survivability. [Citation Graph (, )][DBLP ] Characteristics of firms with effective internal control: evidence from Chinese companies. [Citation Graph (, )][DBLP ] Research of computer simulation system based on SOA. [Citation Graph (, )][DBLP ] Research of mainframe CICS application integration using CICS SCA. [Citation Graph (, )][DBLP ] A stereo algorithm using edge-based orthogonal dynamic programming. [Citation Graph (, )][DBLP ] An objective and automatic feedback model for QoS evaluation. [Citation Graph (, )][DBLP ] Parallel integration model. [Citation Graph (, )][DBLP ] Metamorphic malware detection technology based on aggregating emerging patterns. [Citation Graph (, )][DBLP ] Neural network approach for intrusion detection. [Citation Graph (, )][DBLP ] A taxonomy of security attacks on the advanced encryption standard. [Citation Graph (, )][DBLP ] BinText steganography based on Markov state transferring probability. [Citation Graph (, )][DBLP ] Mathematical morphology filters applied to an image skeletonization method to generation of topological maps. [Citation Graph (, )][DBLP ] Robotic path planning using multi neuron heuristic search. [Citation Graph (, )][DBLP ] An image denoising method by using hybrid fractal-wavelet coding. [Citation Graph (, )][DBLP ] Digital campus information portal content organization based on "information architecture". [Citation Graph (, )][DBLP ] Multi-channel video-based parallel fire detection acceleration method using multi-cores. [Citation Graph (, )][DBLP ] Multifeature biometric system based on EEG signals. [Citation Graph (, )][DBLP ] Ontology: the historical review and literature productivity analysis using bibliometric methodology from 1956 to 2008. [Citation Graph (, )][DBLP ] A study on the productivity review for management of technology using bibliometric methodology. [Citation Graph (, )][DBLP ] Trigonometric polynomial uniform B-spline surface with shape parameter. [Citation Graph (, )][DBLP ] Approximation algorithm and scheme for RNA structure prediction. [Citation Graph (, )][DBLP ] The study on the relationship between inflammatory factors and cardiac function based on chronic myocardial ischemia (syndrome of blood stasis model). [Citation Graph (, )][DBLP ] Adapting and adjusting test process reflecting characteristics of embedded software and industrial properties based on referential models. [Citation Graph (, )][DBLP ] Anatomic model on web customer satisfaction based on customer behavior. [Citation Graph (, )][DBLP ] A template-based isomap algorithm for real-time removal of ocular artifacts from EEG signals. [Citation Graph (, )][DBLP ] Annotating WSDL by CIDOC CRM. [Citation Graph (, )][DBLP ] Feature extraction and reconstruction of particles reinforced metal matrix composite microstructure. [Citation Graph (, )][DBLP ] Design of variable pitch controller for large wind turbine. [Citation Graph (, )][DBLP ] A secure cryptosystem from palm vein biometrics. [Citation Graph (, )][DBLP ] Modifying Erlang B table based upon data mining. [Citation Graph (, )][DBLP ] Designing an electronic medical records system using design patterns. [Citation Graph (, )][DBLP ] Employing PRBAC for privacy preserving data publishing. [Citation Graph (, )][DBLP ] A research analysis on the concept of converging technology and converging types of information technology. [Citation Graph (, )][DBLP ] Coverage preserved optimal routing protocol for improving the quality of service in wireless sensor networks. [Citation Graph (, )][DBLP ] Mobile based digital contents conversion service implementation. [Citation Graph (, )][DBLP ] A pi/4-shifted differential 8PSSK modulation for high data rate WBAN system. [Citation Graph (, )][DBLP ] Critical success factors for event driven service oriented architecture. [Citation Graph (, )][DBLP ] Study on consumer demands and merchant participation motives of mobile payment services in China. [Citation Graph (, )][DBLP ] Distributed requirement elicitation and negotiation based on the hall for workshop of meta-synthetic engineering. [Citation Graph (, )][DBLP ] Comparative Analysis of ANN trained with Back Propagation and Genetic Algorithm for Implementation of Exclusive-OR Problem. [Citation Graph (, )][DBLP ] Design and Proposal of a Next Generation Digital Cable Broadcasting Service-Based System Using Cloud Storage Computing Environments. [Citation Graph (, )][DBLP ] Cryptanalysis on 2 Dimensional Subset-sum Public Key Cryptosystem. [Citation Graph (, )][DBLP ]