The SCEAS System
Navigation Menu

Conferences in DBLP

(interaction)
2009 (conf/interaction/2009)


  1. Learning and making sense of project phenomena in information systems education. [Citation Graph (, )][DBLP]


  2. A comparative study on structure of the motivation for information security by security incident experiences. [Citation Graph (, )][DBLP]


  3. A study of correlation between transitions and sound effects in a fairy tale movie. [Citation Graph (, )][DBLP]


  4. A survey on HCI considerations in the software development life cycle: from practitioner's perspective. [Citation Graph (, )][DBLP]


  5. Database design for global patient monitoring applications using WAP. [Citation Graph (, )][DBLP]


  6. Determinism in speech pitch relation to emotion. [Citation Graph (, )][DBLP]


  7. Measuring fish length from digital images (FiLeDI). [Citation Graph (, )][DBLP]


  8. Mobile technology for irrigation problems in rural India. [Citation Graph (, )][DBLP]


  9. Proportional fairness of call blocking probability. [Citation Graph (, )][DBLP]


  10. Relationship of blink, affect, and usability of graph reading tasks. [Citation Graph (, )][DBLP]


  11. Star economy in the user generated content: a new perspective for digital ecosystems. [Citation Graph (, )][DBLP]


  12. The deployment of PDA accessible clinical-log for medical education in PBL-approach. [Citation Graph (, )][DBLP]


  13. The design of aesthetic interaction: towards a graceful interaction framework. [Citation Graph (, )][DBLP]


  14. Turning keywords into URIs: simplified user interfaces for exploring linked data. [Citation Graph (, )][DBLP]


  15. VisionSynaptics: a system convert hand-writing and image symbol into computer symbol. [Citation Graph (, )][DBLP]


  16. Web-enabled user support services system in distance learning. [Citation Graph (, )][DBLP]


  17. A method to support multiple interfaces mobile nodes in PMIPv6 domain. [Citation Graph (, )][DBLP]


  18. A multiple bayes classification solution to word sense disambiguation. [Citation Graph (, )][DBLP]


  19. A multiuser diversity based time-frequency two dimensional adaptive resource allocation algorithm for WiMAX. [Citation Graph (, )][DBLP]


  20. An ambient intelligence architecture for extracting knowledge from distributed sensors. [Citation Graph (, )][DBLP]


  21. An analysis of new features for workflow system in the SaaS software. [Citation Graph (, )][DBLP]


  22. An improvement of secure authentication scheme with full anonymity for wireless communications. [Citation Graph (, )][DBLP]


  23. Approximation for minimum total dominating set. [Citation Graph (, )][DBLP]


  24. DTD2OWL: automatic transforming XML documents into OWL ontology. [Citation Graph (, )][DBLP]


  25. Efficient line buffer instruction cache scheme with prefetch. [Citation Graph (, )][DBLP]


  26. Image segmentation by automatic histogram thresholding. [Citation Graph (, )][DBLP]


  27. Interdisciplinary applications of mathematical modeling. [Citation Graph (, )][DBLP]


  28. Middleware in ubiquitous computing system with MedRec architecture. [Citation Graph (, )][DBLP]


  29. Multi-level visual secret sharing scheme with smooth-looking. [Citation Graph (, )][DBLP]


  30. Pattern-based planning system for complex environments. [Citation Graph (, )][DBLP]


  31. PhraseRank for document clustering: reweighting the weight of phrase. [Citation Graph (, )][DBLP]


  32. Predicting lattice constant of cubic perovskites using support vector regression. [Citation Graph (, )][DBLP]


  33. RoboEarth: connecting robots worldwide. [Citation Graph (, )][DBLP]


  34. Social networks identification and analysis using call detail records. [Citation Graph (, )][DBLP]


  35. Supervised learning algorithm for automatic adaption of situation templates using uncertain data. [Citation Graph (, )][DBLP]


  36. The effect of malicious peers in a gossip-based reputation system. [Citation Graph (, )][DBLP]


  37. Foundation-based mobile platform software engineering: implications to convergence to open source software. [Citation Graph (, )][DBLP]


  38. An interactivity model of mobile interactive TV: a oneseg case for mobile glue. [Citation Graph (, )][DBLP]


  39. Double layered SOA test architecture based on BPA - simulation event. [Citation Graph (, )][DBLP]


  40. Intraorganizational power verified interactive genetic algorithms for the design of logistics network. [Citation Graph (, )][DBLP]


  41. Laying out the scope of developers' risk management responsibilities. [Citation Graph (, )][DBLP]


  42. Network response analyzer system for interactive lectures in classroom or distance learning. [Citation Graph (, )][DBLP]


  43. SLA management process model. [Citation Graph (, )][DBLP]


  44. Study on consumer demands and merchant participation motives of mobile payment services in China. [Citation Graph (, )][DBLP]


  45. PingPong-MAC: secure ubiquitous sensor network with authenticated encryption. [Citation Graph (, )][DBLP]


  46. A study on bio feedback based interactive work for expressing human cytochemism in real-time. [Citation Graph (, )][DBLP]


  47. A directed signature scheme and its application to group key initial distribution. [Citation Graph (, )][DBLP]


  48. A method for opinion mining of product reviews using association rules. [Citation Graph (, )][DBLP]


  49. An adaptive, memory-efficient and fast algorithm for Huffman decoding and its implementation. [Citation Graph (, )][DBLP]


  50. An extended version of scaled small gain condition. [Citation Graph (, )][DBLP]


  51. New link estimation for reliability in wireless sensor networks. [Citation Graph (, )][DBLP]


  52. Mining opinions from messenger. [Citation Graph (, )][DBLP]


  53. A novel fully-differential switched capacitor chopper stabilized cascade sigma-delta modulator for MEMS gyroscope. [Citation Graph (, )][DBLP]


  54. Network selection based on network service zone for macro mobility. [Citation Graph (, )][DBLP]


  55. A user study: the effects of mobile phone prototypes and task complexities on usability. [Citation Graph (, )][DBLP]


  56. Developing a computer system for health assessment. [Citation Graph (, )][DBLP]


  57. No-reference video quality assessment for MPEG-2 video streams using BP neural networks. [Citation Graph (, )][DBLP]


  58. Participatory design and evaluation of e-learning system for Korean language training. [Citation Graph (, )][DBLP]


  59. A weighted closeness-based trust combination model. [Citation Graph (, )][DBLP]


  60. Experiences in security testing for web-based applications. [Citation Graph (, )][DBLP]


  61. Ranking secure technologies in security provision financial transactions mobile commerce. [Citation Graph (, )][DBLP]


  62. Financial performance evaluation of China's listed steel companies from creditors' perspective. [Citation Graph (, )][DBLP]


  63. A novel spatial index for case based geographic retrieval. [Citation Graph (, )][DBLP]


  64. An effective solution for community identification. [Citation Graph (, )][DBLP]


  65. Digital watermarking for volume data based on 3D-DWT and 3D-DCT. [Citation Graph (, )][DBLP]


  66. QoS-aware service composition using NSGA-II1. [Citation Graph (, )][DBLP]


  67. SVDD regularized with area under the ROC. [Citation Graph (, )][DBLP]


  68. The research on the service marketing strategies and empirical based on the product value. [Citation Graph (, )][DBLP]


  69. The theory and empirical research of differentiation benefit positioning based on product value. [Citation Graph (, )][DBLP]


  70. The theory and empirical research of network marketing based on relational value. [Citation Graph (, )][DBLP]


  71. Information processing of the hull structure oriented to ship structure knowledge-type military specification. [Citation Graph (, )][DBLP]


  72. Ship structure knowledge-based military specification virtual test system's design. [Citation Graph (, )][DBLP]


  73. The analysis of DDoS attack for the video transmission. [Citation Graph (, )][DBLP]


  74. The effectiveness of the handheld devices based on mobiles learning. [Citation Graph (, )][DBLP]


  75. The study for the optimal routing of Bluetooth Piconet. [Citation Graph (, )][DBLP]


  76. The study of effectiveness for ad-hoc wireless network. [Citation Graph (, )][DBLP]


  77. The study of the wireless network DoS attack. [Citation Graph (, )][DBLP]


  78. The study of WSN routing. [Citation Graph (, )][DBLP]


  79. An efficient and effective image representation for region-based image retrieval. [Citation Graph (, )][DBLP]


  80. An efficient region-based image representation using Legendre color distribution moments. [Citation Graph (, )][DBLP]


  81. Automatic identification of covert channels inside Linux kernel based on source codes. [Citation Graph (, )][DBLP]


  82. Design and implementation of a tool for analyzing SELinux secure policy. [Citation Graph (, )][DBLP]


  83. A binary method for fast computation of inter and intra cluster similarities for combining multiple clusterings. [Citation Graph (, )][DBLP]


  84. A comparative study between computer programming languages for developing distributed systems in web environment. [Citation Graph (, )][DBLP]


  85. A maximum network lifetime QoS routing algorithm in MANETs. [Citation Graph (, )][DBLP]


  86. Achieving high efficient agreement with malicious faulty nodes on a cloud computing environment. [Citation Graph (, )][DBLP]


  87. Adaptation e-learning contents in mobile environment. [Citation Graph (, )][DBLP]


  88. An automated mechanism for organizing and retrieving core asset artifacts for product derivation in SPL. [Citation Graph (, )][DBLP]


  89. An empirical study of success factors on business-to-business e-marketplaces from buyers' and sellers' perspectives. [Citation Graph (, )][DBLP]


  90. Attribute summarization: a technique for wireless XML streaming. [Citation Graph (, )][DBLP]


  91. Averaging approach for distributed event detection in wireless sensor networks. [Citation Graph (, )][DBLP]


  92. Context-aware customization e-learning system with intelligent on-line examination mechanism. [Citation Graph (, )][DBLP]


  93. Designing a special purpose e-commerce website. [Citation Graph (, )][DBLP]


  94. Development and estimation of ubiquitous unconstrained BCG monitoring system using wireless sensor node. [Citation Graph (, )][DBLP]


  95. DPUid: distributed algorithm for proximity-based unique id in wireless sensor networks. [Citation Graph (, )][DBLP]


  96. EDARP: novel energy and distance-aware routing protocol in wireless sensor network. [Citation Graph (, )][DBLP]


  97. e-mail authentication system: a spam filtering for smart senders. [Citation Graph (, )][DBLP]


  98. An energy consumption technique for global healthcare monitoring applications. [Citation Graph (, )][DBLP]


  99. Handover support for converged inter-RAT networks. [Citation Graph (, )][DBLP]


  100. Hierarchical service-oriented routing of queries in wireless sensor networks. [Citation Graph (, )][DBLP]


  101. Identity-based secure protocol scheme for wireless sensor network. [Citation Graph (, )][DBLP]


  102. Intelligent agent based hospital search & appointment system. [Citation Graph (, )][DBLP]


  103. Legible+: integrated system for remote collaboration through document creation. [Citation Graph (, )][DBLP]


  104. MPCS: a secure Mobile Payment Consortia System for higher educational institutions. [Citation Graph (, )][DBLP]


  105. Multi-Level Secure Framework (MLSF) for composite web services. [Citation Graph (, )][DBLP]


  106. Optimization of continuous query processing for RFID sensor tag data stream. [Citation Graph (, )][DBLP]


  107. Personal mobile information system. [Citation Graph (, )][DBLP]


  108. Premature ventricular contractions, a typical extra-systole arrhythmia, lowers the scaling exponent: DFA as a beneficial biomedical computation. [Citation Graph (, )][DBLP]


  109. Relative navigation and situation awareness information distribution for GPS information deficient situations. [Citation Graph (, )][DBLP]


  110. Simulation and analysis of ad-hoc on-demand distance vector routing protocol. [Citation Graph (, )][DBLP]


  111. Smart buffer management for different start video broadcasting. [Citation Graph (, )][DBLP]


  112. Using syntactic and contextual information for sentiment polarity analysis. [Citation Graph (, )][DBLP]


  113. Wearable patch-type ECG using ubiquitous wireless sensor network for healthcare monitoring application. [Citation Graph (, )][DBLP]


  114. 6DMPP: small worlds in mobile peer-to-peer networks. [Citation Graph (, )][DBLP]


  115. A study on QoS issues for mobile ad-hoc networks. [Citation Graph (, )][DBLP]


  116. Architecting autonomic computing systems through Probabilistic Software Stability Model (PSSM). [Citation Graph (, )][DBLP]


  117. General criteria on building decision trees for data classification. [Citation Graph (, )][DBLP]


  118. QoS implementation in a federated identities system. [Citation Graph (, )][DBLP]


  119. Requirements for troubleshooting wi-fi network security through location technologies. [Citation Graph (, )][DBLP]


  120. A framework for digital cosmetic system. [Citation Graph (, )][DBLP]


  121. A grid infrastructure for online games. [Citation Graph (, )][DBLP]


  122. A reward field model generation in Q-learning by dynamic programming. [Citation Graph (, )][DBLP]


  123. Buffer and loss monitoring for the control of multimedia data streaming rate on mobile ad hoc networks. [Citation Graph (, )][DBLP]


  124. Category specific SIFT descriptor and its combination with color information for content-based image retrieval. [Citation Graph (, )][DBLP]


  125. Design of memory architecture for autonomous virtual characters using visual attention and quad-graph. [Citation Graph (, )][DBLP]


  126. Weighted Finite Automata encoding over Thai language. [Citation Graph (, )][DBLP]


  127. A wavelet based method for detecting and localizing epileptic neural spikes in EEG. [Citation Graph (, )][DBLP]


  128. An empirical improvement of the accuracy of RBF networks. [Citation Graph (, )][DBLP]


  129. An event detection algorithm in ECG with 60Hz interference and baseline wandering. [Citation Graph (, )][DBLP]


  130. Applying complex system entropy cluster algorithm to mining principle of herbal combinations in traditional Chinese medicine. [Citation Graph (, )][DBLP]


  131. Detecting mitochondria in fluorescence images. [Citation Graph (, )][DBLP]


  132. Effects of discretization on determination of coronary artery disease using support vector machine. [Citation Graph (, )][DBLP]


  133. EMG signal decomposition using wavelet transformation with respect to different wavelet and a comparative study. [Citation Graph (, )][DBLP]


  134. Learning a prediction model for protein-protein recognition. [Citation Graph (, )][DBLP]


  135. Mobile robot for personal exercise training in ubiquitous healthcare environment. [Citation Graph (, )][DBLP]


  136. Ontology-based medical diagnostic knowledge structuring using case-based reasoning methodology. [Citation Graph (, )][DBLP]


  137. Pervasive distributed volume rendering in a lightweight multi-agent platform. [Citation Graph (, )][DBLP]


  138. Thyroid disease diagnosis using Artificial Immune Recognition System (AIRS). [Citation Graph (, )][DBLP]


  139. A literature review for a 6-sigma perception of academic quality. [Citation Graph (, )][DBLP]


  140. Cost effective software engineering using program slicing techniques. [Citation Graph (, )][DBLP]


  141. Fault tree analysis in city lifeline system operations and management-theory and application. [Citation Graph (, )][DBLP]


  142. A perspective of two-dimensional process integration customer relationship management driven business model. [Citation Graph (, )][DBLP]


  143. A new robust forensic marking using peak position modulation for video. [Citation Graph (, )][DBLP]


  144. An improved backprojection algorithm for spiral cone-beam CT with an improved ray traverse algorithm. [Citation Graph (, )][DBLP]


  145. Knowledge-based approach for 3D skeleton extraction. [Citation Graph (, )][DBLP]


  146. Malicious content filtering based on semantic features. [Citation Graph (, )][DBLP]


  147. Mining association rules in tree structured XML data. [Citation Graph (, )][DBLP]


  148. Recommender systems: incremental clustering on web log data. [Citation Graph (, )][DBLP]


  149. A Localized Software-based approach for Fault-Tolerant Ethernet (LSFTE). [Citation Graph (, )][DBLP]


  150. Decentralized Hybrid Wireless Mesh Protocol. [Citation Graph (, )][DBLP]


  151. Design issues of integrated subway air quality management system base on particulate matter measurements. [Citation Graph (, )][DBLP]


  152. Efficient implementation of hybrid automatic gain control algorithm for chirp spread spectrum. [Citation Graph (, )][DBLP]


  153. Efficient service recommendation system for cloud computing market. [Citation Graph (, )][DBLP]


  154. Multi-round scheduling for divisible loads on the heterogeneous cluster systems of multi-core computers. [Citation Graph (, )][DBLP]


  155. Ontology based schema matching and mapping approach for structured databases. [Citation Graph (, )][DBLP]


  156. Performance modeling of slotted MACA-BI MAC protocol for mobile ad hoc networks. [Citation Graph (, )][DBLP]


  157. Performance of Phase-Silence-Shift-Keying for additive white Gaussian noise and fading channels. [Citation Graph (, )][DBLP]


  158. R-ECS: reliable elastic computing services for building virtual computing environment. [Citation Graph (, )][DBLP]


  159. The performance of IPv4 and IPv6 using UDP on IEEE 802.11n WLANs with WPA2 security. [Citation Graph (, )][DBLP]


  160. Using zone-disjoint multi-path routing algorithm for video transmission over ad-hoc networks. [Citation Graph (, )][DBLP]


  161. A formal approach for specification and verification of fault injection process. [Citation Graph (, )][DBLP]


  162. A highly effective model for security protection against eavesdropping exploits. [Citation Graph (, )][DBLP]


  163. A new fault cryptanalysis on montgomery ladder exponentiation algorithm. [Citation Graph (, )][DBLP]


  164. A study of traceability of CDMA-based fingerprinting scheme. [Citation Graph (, )][DBLP]


  165. Access to culture and information through library: a perspective on Chinese copyright law reformation. [Citation Graph (, )][DBLP]


  166. Collect and broadcast news in security. [Citation Graph (, )][DBLP]


  167. Design and simulation of a modified perturbed digital chaotic signal generator for secure data communication. [Citation Graph (, )][DBLP]


  168. Development of digital watermarking technology to protect cadastral map information. [Citation Graph (, )][DBLP]


  169. Dynamic policy model for target based intrusion detection system. [Citation Graph (, )][DBLP]


  170. Relationship between weight of plaintext and successful attacks in knapsack cryptosystems. [Citation Graph (, )][DBLP]


  171. SEAODV: secure efficient AODV routing protocol for MANETs networks. [Citation Graph (, )][DBLP]


  172. Watermarking schema using an artificial immune system in spatial domain. [Citation Graph (, )][DBLP]


  173. Web service description for mobile phone virus. [Citation Graph (, )][DBLP]


  174. A smart automatic thumbnail cropping based on attention driven regions of interest extraction. [Citation Graph (, )][DBLP]


  175. Application of intelligent agents for mobile tutoring. [Citation Graph (, )][DBLP]


  176. Automation technique of software internationalization and localization based on lexical analysis. [Citation Graph (, )][DBLP]


  177. Contrast enhanced dynamic time warping distance for time series shape averaging classification. [Citation Graph (, )][DBLP]


  178. Converting PDF to HTML approach based on text detection. [Citation Graph (, )][DBLP]


  179. From the bricks to the clicks: knowledge management in e-government. [Citation Graph (, )][DBLP]


  180. Making links between goal and tasks to retrieve information from web browsing histories. [Citation Graph (, )][DBLP]


  181. Reinforcement learning coordination with combined heuristics in multi-agent environment for university timetabling. [Citation Graph (, )][DBLP]


  182. Temporal-spatial association analysis of ocean salinity and temperature variations. [Citation Graph (, )][DBLP]


  183. The approximation of interval Bezier curves by a fuzzy rule-based system. [Citation Graph (, )][DBLP]


  184. A study of interface design for widgets in web services through usability evaluation. [Citation Graph (, )][DBLP]


  185. Usability evaluation for history educational games. [Citation Graph (, )][DBLP]


  186. A proposal for secure vehicular communications. [Citation Graph (, )][DBLP]


  187. LBS system using online map in 3G networks environment. [Citation Graph (, )][DBLP]


  188. An approach to combining ActiveX with MATLAB in power electronics education. [Citation Graph (, )][DBLP]


  189. Research on cloud storage architecture and key technologies. [Citation Graph (, )][DBLP]


  190. Practical RFID + sensor convergence toward context-aware X-reality. [Citation Graph (, )][DBLP]


  191. TCP portscan detection based on single packet flows and entropy. [Citation Graph (, )][DBLP]


  192. Virtual shared network for WBANs communication with different RF channel. [Citation Graph (, )][DBLP]


  193. Improvement of Jeju National Museum service using mobile RFID. [Citation Graph (, )][DBLP]


  194. A new dots homogenization algorithm in digital screening technology. [Citation Graph (, )][DBLP]


  195. A perceptive viewpoint controller for the Free-Viewpoint TV. [Citation Graph (, )][DBLP]


  196. Development of integrated e-parcel management system with GSM network. [Citation Graph (, )][DBLP]


  197. Dynamic Electronic Design Automation concept, benefit and framework. [Citation Graph (, )][DBLP]


  198. A harmonized media service middleware using the emotional knowledge. [Citation Graph (, )][DBLP]


  199. Content-based music genre classification using timbral feature vectors and support vector machine. [Citation Graph (, )][DBLP]


  200. Disk I/O based load balancing in VOD system. [Citation Graph (, )][DBLP]


  201. Improved block truncation coding using low cost approach for color image compression. [Citation Graph (, )][DBLP]


  202. Manipulation of virtual objects in marker-less AR system by fingertip tracking and hand gesture recognition. [Citation Graph (, )][DBLP]


  203. Realistic rendering system using the measured BRDFs. [Citation Graph (, )][DBLP]


  204. BioProber2.0: a unified biomedical workbench with mining and probing literatures. [Citation Graph (, )][DBLP]


  205. A method for analysis linear correlation for multi-sensor of bridge monitoring system. [Citation Graph (, )][DBLP]


  206. Content based mammography images retrieval using Ripley's K function. [Citation Graph (, )][DBLP]


  207. Parallel implementation of a financial application on a GPU. [Citation Graph (, )][DBLP]


  208. Lock management in blue whale file system. [Citation Graph (, )][DBLP]


  209. Modified phase silence shift keying with phase offset for WBAN systems. [Citation Graph (, )][DBLP]


  210. Sliding-window caching algorithm for streaming media server. [Citation Graph (, )][DBLP]


  211. Vertical handover between LTE and wireless LAN systems based on common resource management (CRRM) and generic link layer (GLL). [Citation Graph (, )][DBLP]


  212. Design and implementation of SIP-aware DDoS attack detection system. [Citation Graph (, )][DBLP]


  213. A bionic gait programming algorithm for hexapod robot. [Citation Graph (, )][DBLP]


  214. A concept in error correction of text editors: case study Thai-English set. [Citation Graph (, )][DBLP]


  215. Analysis of effect of highway ITS incident management system. [Citation Graph (, )][DBLP]


  216. Automatic focusing attention for a stereo pair of image sequence. [Citation Graph (, )][DBLP]


  217. Automatic number plate detection for Korean vehicles. [Citation Graph (, )][DBLP]


  218. Before and after evaluation of highway ITS based infrastructure project. [Citation Graph (, )][DBLP]


  219. Spatio-temporal mining for power load forecasting in GIS-AMR load analysis model. [Citation Graph (, )][DBLP]


  220. A new palm vein matching method based on ICP algorithm. [Citation Graph (, )][DBLP]


  221. A next generation smart energy technology. [Citation Graph (, )][DBLP]


  222. Complex event processing model for distributed RFID network. [Citation Graph (, )][DBLP]


  223. Non-model self-learning control of nonlinear system. [Citation Graph (, )][DBLP]


  224. On some properties of covering based approximations of classifications of sets. [Citation Graph (, )][DBLP]


  225. ILemo: a web platform to integrate personal data and services. [Citation Graph (, )][DBLP]


  226. Adaptive control of response in a rotor with loose foundation. [Citation Graph (, )][DBLP]


  227. A neural network based model for VoIP speech quality prediction. [Citation Graph (, )][DBLP]


  228. The usage of coarse wordage: a study of the mob rule on China's internet. [Citation Graph (, )][DBLP]


  229. Vision-based two hand detection and tracking. [Citation Graph (, )][DBLP]


  230. A survey of prediction models for breast cancer survivability. [Citation Graph (, )][DBLP]


  231. Characteristics of firms with effective internal control: evidence from Chinese companies. [Citation Graph (, )][DBLP]


  232. Research of computer simulation system based on SOA. [Citation Graph (, )][DBLP]


  233. Research of mainframe CICS application integration using CICS SCA. [Citation Graph (, )][DBLP]


  234. A stereo algorithm using edge-based orthogonal dynamic programming. [Citation Graph (, )][DBLP]


  235. An objective and automatic feedback model for QoS evaluation. [Citation Graph (, )][DBLP]


  236. Parallel integration model. [Citation Graph (, )][DBLP]


  237. Metamorphic malware detection technology based on aggregating emerging patterns. [Citation Graph (, )][DBLP]


  238. Neural network approach for intrusion detection. [Citation Graph (, )][DBLP]


  239. A taxonomy of security attacks on the advanced encryption standard. [Citation Graph (, )][DBLP]


  240. BinText steganography based on Markov state transferring probability. [Citation Graph (, )][DBLP]


  241. Mathematical morphology filters applied to an image skeletonization method to generation of topological maps. [Citation Graph (, )][DBLP]


  242. Robotic path planning using multi neuron heuristic search. [Citation Graph (, )][DBLP]


  243. An image denoising method by using hybrid fractal-wavelet coding. [Citation Graph (, )][DBLP]


  244. Digital campus information portal content organization based on "information architecture". [Citation Graph (, )][DBLP]


  245. Multi-channel video-based parallel fire detection acceleration method using multi-cores. [Citation Graph (, )][DBLP]


  246. Multifeature biometric system based on EEG signals. [Citation Graph (, )][DBLP]


  247. Ontology: the historical review and literature productivity analysis using bibliometric methodology from 1956 to 2008. [Citation Graph (, )][DBLP]


  248. A study on the productivity review for management of technology using bibliometric methodology. [Citation Graph (, )][DBLP]


  249. Trigonometric polynomial uniform B-spline surface with shape parameter. [Citation Graph (, )][DBLP]


  250. Approximation algorithm and scheme for RNA structure prediction. [Citation Graph (, )][DBLP]


  251. The study on the relationship between inflammatory factors and cardiac function based on chronic myocardial ischemia (syndrome of blood stasis model). [Citation Graph (, )][DBLP]


  252. Adapting and adjusting test process reflecting characteristics of embedded software and industrial properties based on referential models. [Citation Graph (, )][DBLP]


  253. Anatomic model on web customer satisfaction based on customer behavior. [Citation Graph (, )][DBLP]


  254. A template-based isomap algorithm for real-time removal of ocular artifacts from EEG signals. [Citation Graph (, )][DBLP]


  255. Annotating WSDL by CIDOC CRM. [Citation Graph (, )][DBLP]


  256. Feature extraction and reconstruction of particles reinforced metal matrix composite microstructure. [Citation Graph (, )][DBLP]


  257. Design of variable pitch controller for large wind turbine. [Citation Graph (, )][DBLP]


  258. A secure cryptosystem from palm vein biometrics. [Citation Graph (, )][DBLP]


  259. Modifying Erlang B table based upon data mining. [Citation Graph (, )][DBLP]


  260. Designing an electronic medical records system using design patterns. [Citation Graph (, )][DBLP]


  261. Employing PRBAC for privacy preserving data publishing. [Citation Graph (, )][DBLP]


  262. A research analysis on the concept of converging technology and converging types of information technology. [Citation Graph (, )][DBLP]


  263. Coverage preserved optimal routing protocol for improving the quality of service in wireless sensor networks. [Citation Graph (, )][DBLP]


  264. Mobile based digital contents conversion service implementation. [Citation Graph (, )][DBLP]


  265. A pi/4-shifted differential 8PSSK modulation for high data rate WBAN system. [Citation Graph (, )][DBLP]


  266. Critical success factors for event driven service oriented architecture. [Citation Graph (, )][DBLP]


  267. Study on consumer demands and merchant participation motives of mobile payment services in China. [Citation Graph (, )][DBLP]


  268. Distributed requirement elicitation and negotiation based on the hall for workshop of meta-synthetic engineering. [Citation Graph (, )][DBLP]


  269. Comparative Analysis of ANN trained with Back Propagation and Genetic Algorithm for Implementation of Exclusive-OR Problem. [Citation Graph (, )][DBLP]


  270. Design and Proposal of a Next Generation Digital Cable Broadcasting Service-Based System Using Cloud Storage Computing Environments. [Citation Graph (, )][DBLP]


  271. Cryptanalysis on 2 Dimensional Subset-sum Public Key Cryptosystem. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002