The SCEAS System
Navigation Menu

Conferences in DBLP

ACM Southeast Regional Conference (ACMse)
2005 (conf/ACMse/2005-2)

  1. Shilpa Yogesh Tisgaonkar, Chih-Cheng Hung, Benny Bing
    Intelligent handoff management with interference control for next generation wireless systems. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:1-6 [Conf]
  2. Ryan Barnard
    An evolving power saving model for monitoring sensor networks using cellular automata. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:7-8 [Conf]
  3. Chunsheng Xin, Feng He
    Cross-layer path computation for dynamic traffic grooming: in mesh WDM optical networks. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:9-13 [Conf]
  4. Radhika Jain
    Improving quality of service for streaming multimedia applications in ubiquitous mobile environment. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:14-19 [Conf]
  5. Taskin Koçak, Hakan Terzioglu
    A packet processor for a learning-based routing protocol. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:20-25 [Conf]
  6. Narsingh Deo, Aurel Cami
    A birth-death dynamic model of scale-free networks. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:26-27 [Conf]
  7. Alexander B. Bordetsky, Boris Peltsverger, Svetlana Peltsverger, Roman B. Statnikov
    Multi-criteria approach in configuration of energy efficient sensor networks. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:28-29 [Conf]
  8. Lei Chen, Chung-wei Lee
    Multi-level secure video streaming over SRTP. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:30-35 [Conf]
  9. Hala ElAarag, Andrew Moedinger
    IFTP-W: a TCP-friendly protocol for multimedia applications over wireless networks. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:36-40 [Conf]
  10. Narsingh Deo, Hemant Balakrishnan
    Bibliometric approach to community discovery. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:41-42 [Conf]
  11. Stefen Howard, Jim Martin
    DOCSIS performance evaluation: piggybacking versus concatenation. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:43-48 [Conf]
  12. Chris Otto, John P. Gober, Reggie W. McMurtrey, Aleksandar Milenkovic, Emil Jovanov
    An implementation of hierarchical signal processing on wireless sensor in TinyOS environment. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:49-53 [Conf]
  13. Song Luo, Gerald A. Marin
    Simulating application level self-similar network traffic using hybrid heavy-tailed distributions. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:54-58 [Conf]
  14. Paresh Dhakan, Ronaldo Menezes
    The role of social structures in mobile ad-hoc networks. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:59-64 [Conf]
  15. Steven Bassi, Miguel A. Labrador
    Setting up a Web100-Dummynet testbed for research in transport layer protocols. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:65-69 [Conf]
  16. Lei Zhu, Justin French, Christopher Oglesby
    UbiquitousSurvey: a framework supporting mobile field survey data collection and analysis. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:70-74 [Conf]
  17. H. W. Go, P. Y. Chan, Y. Dong, Ai Fen Sui, Siu-Ming Yiu, Lucas Chi Kwong Hui, Victor O. K. Li
    Performance evaluation on CRL distribution using flooding in mobile ad hoc networks (MANETs). [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:75-80 [Conf]
  18. Natarajan Meghanathan, Andras Farago
    Power sensitive power control in ad networks. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:81-86 [Conf]
  19. Donald J. Scott
    Relying on time synchronization for security in ad hoc networks. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:87-91 [Conf]
  20. Yoshito Kanamori, Seong-Moo Yoo, Mohammad Al-Shurman
    A quantum no-key protocol for secure data communication. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:92-93 [Conf]
  21. Shilpa Yogesh Tisgaonkar, Chih-Cheng Hung, Benny Bing
    Next generation wireless systems using Markov decision process model. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:94-95 [Conf]
  22. Taskin Koçak
    An architecture for high-speed execution of upper layer (4-7) network protocols. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:96-97 [Conf]
  23. Spyros Kontogiorgis, Richard W. Tibbs
    An efficient approximation to wait time in M/M/c queues with application to staffing planning. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:98-102 [Conf]
  24. Mohammad Al-Shurman, Seong-Moo Yoo, Yoshito Kanamori
    Decreasing broadcast in route discovery using vectors in mobile ad hoc networks. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:103-104 [Conf]
  25. Victor A. Clincy
    The SONET ring transport planning problem. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:105-106 [Conf]
  26. Yuanyuan Ding, Guangbin Fan
    A variation of reporting center scheme. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:107-111 [Conf]
  27. Saad Biaz, Richard O. Chapman, James Pate Williams
    RTP and TCP based MIDI over IP protocols. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:112-117 [Conf]
  28. Vladimir Zanev, Rodney Clark
    Wireless course management system. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:118-123 [Conf]
  29. Aisha Kigongo, Y. B. Reddy
    Using genetic algorithm to minimize the effect of interference for broadband wireless access network. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:124-125 [Conf]
  30. Ayoob Khan, Dhaval M. Shah, Zhenyu Xu
    Sync-TCP in high-speed environments. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:126-127 [Conf]
  31. Deepak Vembar, Zhidian Du
    AQM performance in multiple congested link networks. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:128-129 [Conf]
  32. Deepak S. Yavagal, Seok Won Lee, Gail-Joon Ahn, Robin A. Gandhi
    Common criteria requirements modeling and its uses for quality of information assurance (QoIA). [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:130-135 [Conf]
  33. Gary Stein, Bing Chen, Annie S. Wu, Kien A. Hua
    Decision tree classifier for network intrusion detection with GA-based feature selection. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:136-141 [Conf]
  34. Dong Yu, Deborah A. Frincke
    Alert confidence fusion in intrusion detection systems with extended Dempster-Shafer theory. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:142-147 [Conf]
  35. Bruce D. Caulkins, Joohan Lee, Morgan C. Wang
    A dynamic data mining technique for intrusion detection systems. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:148-153 [Conf]
  36. Khaled Hussain, Naveen Addulla, Sharon Rajan, Ghada Moussa
    Preventing the capture of sensitive information. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:154-159 [Conf]
  37. Saeed Rajput, Jihong Chen, Sam Hsu
    State based authentication. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:160-165 [Conf]
  38. William McLeod Rivera
    A stochastic estimator/detector for mitigating denial of service attacks. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:166-171 [Conf]
  39. Norman Pendegraft, Mark Rounds, Deborah A. Frincke
    A simulation model of IS security. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:172-177 [Conf]
  40. Andy Ju An Wang
    Information security models and metrics. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:178-184 [Conf]
  41. Wen-Jung Hsin, Lein Harn
    Simple certified e-check with a partial PKI solution. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:185-190 [Conf]
  42. Larry Lee Reynolds Jr., Richard W. Tibbs, E. Joseph Derrick
    A GUI for intrusion detection and related experiences. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:191-192 [Conf]
  43. Xin Xu, Weihua Song, Vir V. Phoha
    Early detection and propagation mitigation of worm programs. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:193-194 [Conf]
  44. Rehab F. Abdel-Kader
    Resource-constrained loop scheduling in high-level synthesis. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:195-200 [Conf]
  45. Daniel Howard
    A genetic programming formulation to evade proportional navigation. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:201-206 [Conf]
  46. Liguo Yu, Srini Ramaswamy
    Categorization of common coupling in kernel based software. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:207-210 [Conf]
  47. Hang Su, Qiaozhu Mei
    Template extraction from candidate template set generation: a structure and content approach. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:211-216 [Conf]
  48. Zhengping Wu, Alfred C. Weaver
    Token-based dynamic trust establishment for web services. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:217-222 [Conf]
  49. Turky N. Al-Otaiby, Mohsen AlSherif, Walter P. Bond
    Toward software requirements modularization using hierarchical clustering techniques. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:223-228 [Conf]
  50. Mark Bidewell
    Software-based dynamic thermal management for Linux systems. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:229-234 [Conf]
  51. Brian Ray, JingJiang He, Chia-Chu Chiang, Jim Melescue
    The print scraping system. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:235-236 [Conf]
  52. Victoria Davis, Jeff Gray, Joel Jones
    Generative approaches for application tailoring of mobile devices. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:237-241 [Conf]
  53. Theodore (Ted) Roberts, Hisham M. Haddad
    Application development for desktop and PDA-style devices: issues and lessons learned. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:242-247 [Conf]
  54. Nadeem Abdul Hamid
    Certified memory management for proof-carrying code: a region-based type system and runtime library. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:248-249 [Conf]
  55. Kam Fui Lau
    Real-time intelligent program stock trading. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:250-255 [Conf]
  56. Lester O. Lobo, James D. Arthur
    Local and global analysis: complementary activities for increasing the effectiveness of requirements verification and validation. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:256-261 [Conf]
  57. Kevin Marth
    Programming in the MPL-RM programming language. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:262-268 [Conf]
  58. Luis E. Cuéllar
    Open source license alternatives for software applications: is it a solution to stop software piracy? [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:269-274 [Conf]
  59. Chia-Chu Chiang, Charles Wesley Ford
    Maintainability and reusability issues in CORBA-based systems. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:275-280 [Conf]
  60. Jules White, Boris Kolpackov, Balachandran Natarajan, Douglas C. Schmidt
    Reducing application code complexity with vocabulary-specific XML language bindings. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:281-287 [Conf]
  61. Lawrence Teo, Gail-Joon Ahn
    Supporting access control policies across multiple operating systems. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:288-293 [Conf]
  62. Andrew R. Dalton, Cindy Norris
    An experimental evaluation of a distributed Java compiler. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:294-299 [Conf]
  63. Jamie L. Smith, Shawn A. Bohner, D. Scott McCrickard
    Project management for the 21st century: supporting collaborative design through risk analysis. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:300-305 [Conf]
  64. Anastasia Tircuit, B. Belkhouche
    Object-oriented behavioral testing through trace generation. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:306-310 [Conf]
  65. Hassan Pournaghshband, Chris S. Bullock
    The use of dynamic tracing for troubleshooting. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:311-314 [Conf]
  66. Cong-Cong Xing, Boumediene Belkhouche
    The movable point problem and its resolution in object type graphs. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:315-320 [Conf]
  67. Guangming Xing, Rajesekhar Dandolu, Andrew Ernest
    An excel based Semantic email system. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:321-326 [Conf]
  68. Xiaochuan Yi, Krys Kochut
    JCPNet tool and automated analysis of distributed systems. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:327-332 [Conf]
  69. Jon A. Preston, Sushil K. Prasad
    Exploring communication overheads and locking policies in a peer-to-peer synchronous collaborative editing system. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:333-334 [Conf]
  70. Winard Britt
    Making digital tickets possible via the microsoft smartphone. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:335-336 [Conf]
  71. Ufuoma Akoroda
    Population dynamics visualization system for management of airborne biochemical agents attacks. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:337-338 [Conf]
  72. Jose Hughes
    An online bookstore using JSP technology. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:339-340 [Conf]
  73. Andrei Erdoss
    Exploring the portability and extensibility of XML schema generated web applications. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:341-342 [Conf]
  74. Stefan Dimov, Vikas Vyas, Mike Schardt, Abdullah Faruque, Susrutha Narla, Haihua Fu
    Customizing model-view-controller design pattern for Web controlled household appliances and devices. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:343-344 [Conf]
  75. Sanmati Kamath
    A compression scheme for video conferencing. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:345-346 [Conf]
  76. Stanislav Ustymenko
    Ontology-supported sharing and reuse of knowledge in diverse environments. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:347-348 [Conf]
  77. Aaron Garrett, David Thornton
    A web-based programming environment for LEGO mindstorms robots. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:349-350 [Conf]
  78. Thomas Tickle
    Visualization of an intelligent integrated health management system for rocket propulsion. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:351-352 [Conf]
  79. Hang Wu
    Pure object-based domain model for enterprise systems. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:353-354 [Conf]
  80. Hari B. Bidasaria
    Development of techniques for visualization of scalar and vector fields in an immersive environment (CAVE). [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:355-356 [Conf]
  81. Ufuoma Akoroda
    Population dynamics visualization system for management of airborne biochemical agents attacks. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:357-358 [Conf]
  82. Justin Belcher, Raheel Aidrus, Ben Congleton, Doug Hall, Shahzad Hussain, Matthew Jablonski, Theresa Klunk, D. Scott McCrickard
    NotiFly: enhancing design through claims-based personas and knowledge reuse. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:359-364 [Conf]
  83. Jonathan R. Hicks, Joseph A. Driscoll
    Evolution of artificial agents in a realistic virtual environment. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:365-369 [Conf]
  84. Swapna Gupta, J. Scott Hawker, Randy K. Smith
    Acquiring and delivering lessons learned for NASA scientists and engineers: a dynamic approach. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:370-375 [Conf]
  85. Jason Chong Lee, Christa M. Chewar, D. Scott McCrickard
    Image is everything: advancing HCI knowledge and interface design using the system image. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:376-381 [Conf]
  86. Mark S. Schmalz
    On the convergence of image compression and object recognition. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:382-387 [Conf]
  87. A. Elizabeth Seward, Bobby Bodenheimer
    Using nonlinear dimensionality reduction in 3D figure animation. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:388-392 [Conf]
  88. Stephanie Smullen, Clinton W. Smullen III, Carlos M. Santa
    Interactive 3D terrain exploration and visualization. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:393-396 [Conf]
  89. Brian L. Stuart
    Relative localization from image sequences. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:397-401 [Conf]
  90. Lakshmi Prayaga
    Visual aids to create a knowledge base with reusable objects across disciplines. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:402-403 [Conf]
  91. Chunguang Ken Cao, Timothy S. Newman
    A new framework for recovery of shape of the right ventricle from GBP SPECT images. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:404-405 [Conf]
  92. Katja A. Rodgers
    Monitor color and repetition as factors in human-computer interaction. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:406-407 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002