Conferences in DBLP
Fernando Alvarado , W. S. Mota The Role of Energy Imbalance Management on Power Market Stability. [Citation Graph (0, 0)][DBLP ] HICSS (3), 1998, pp:4-8 [Conf ] Richard E. Schuler The Dynamics of Market Power with Deregulated Electricity Generation Supplies. [Citation Graph (0, 0)][DBLP ] HICSS (3), 1998, pp:9-14 [Conf ] John C. Bernard , Warren Hall , Robert Either , Timothy Mount , William Schulze , Ray Zimmerman , David Gan , Carlos Murillo-Sánchez , Robert J. Thomas , Richard E. Schuler Experimental Results for Single Period Auctions. [Citation Graph (0, 0)][DBLP ] HICSS (3), 1998, pp:15-23 [Conf ] A. P. Sakis Meliopoulos , George J. Cokkinides , A. G. Bakirtzis Load-Frequency Control Service in a Deregulated Environment. [Citation Graph (0, 0)][DBLP ] HICSS (3), 1998, pp:24-31 [Conf ] Christopher L. DeMarco Design of Predatory Generation Control in Electric Power Systems. [Citation Graph (0, 0)][DBLP ] HICSS (3), 1998, pp:32-38 [Conf ] Koeunyi Bae , James S. Thorp An Importance Sampling Application: 179 Bus WSCC System under Voltage Based Hidden Failures and Relay Misoperations. [Citation Graph (0, 0)][DBLP ] HICSS (3), 1998, pp:39-46 [Conf ] Dennis Ray , Eileen Cashman Influence of Operational Risk Assessment on Bidding Strategies in Power Markets. [Citation Graph (0, 0)][DBLP ] HICSS (3), 1998, pp:47- [Conf ] Michael J. Denton , Stephen J. Rassenti , Vernon L. Smith Spot Market Mechanism Design and Competitivity Issues in Electric Power. [Citation Graph (0, 0)][DBLP ] HICSS (3), 1998, pp:48-56 [Conf ] Sarosh Talukdar Autonomous Cyber Agents: Rules for Collaboration and Concurrency. [Citation Graph (0, 0)][DBLP ] HICSS (3), 1998, pp:57-61 [Conf ] Jamie D. Weber , Thomas J. Overbye , Christopher L. DeMarco Inclusion of Price Dependent Load Models in the Optimal Power Flow. [Citation Graph (0, 0)][DBLP ] HICSS (3), 1998, pp:62-70 [Conf ] Chung-Li Tseng , Shmuel Oren , C. S. Cheng , C.-A. Li , Alva S. Svoboda , Raymond B. Johnson A Transmission-Constrained Unit Commitment Method. [Citation Graph (0, 0)][DBLP ] HICSS (3), 1998, pp:71-80 [Conf ] Carlos Murillo-Sánchez , Robert J. Thomas Thermal Unit Commitment Including Optimal AC Power Flow Constraints. [Citation Graph (0, 0)][DBLP ] HICSS (3), 1998, pp:81-88 [Conf ] Peter W. Sauer Alternatives for Calculating Transmission Reliability Margin (TRM) in Available Transfer Capability (ATC). [Citation Graph (0, 0)][DBLP ] HICSS (3), 1998, pp:89-89 [Conf ] Richard Tabors Reliability: Reality or the Power Engineers' Last Grasp. [Citation Graph (0, 0)][DBLP ] HICSS (3), 1998, pp:90-95 [Conf ] Jamie D. Weber , Thomas J. Overbye , Peter W. Sauer , Christopher L. DeMarco A Simulation Based Approach to Pricing Reactive Power. [Citation Graph (0, 0)][DBLP ] HICSS (3), 1998, pp:96-103 [Conf ] James A. Momoh , Jizhong Zhu A New Approach to VAr Pricing and Control in the Competitive Environment. [Citation Graph (0, 0)][DBLP ] HICSS (3), 1998, pp:104-111 [Conf ] Ziad Younes , Marija Ilic Generation Strategies for Gaming Transmission Constraints: Will the Deregulated Electric Power Market be an Oligopoly? [Citation Graph (0, 0)][DBLP ] HICSS (3), 1998, pp:112-121 [Conf ] Felix F. Wu , Chris Yeung , Ada Poon , Jerome Yen A Multi-Agent Approach to the Deregulation and Restructuring of Power Industry. [Citation Graph (0, 0)][DBLP ] HICSS (3), 1998, pp:122-131 [Conf ] Philip A. Fedora , Craig A. Kazin Implementing NEPOOL's Restructuring Proposal: The Installed Capacity Market. [Citation Graph (0, 0)][DBLP ] HICSS (3), 1998, pp:132-137 [Conf ] Ray Zimmerman , Robert J. Thomas , Deqiang Gan , Carlos Murillo-Sánchez An Internet-Based Platform for Testing Generation Scheduling Auctions. [Citation Graph (0, 0)][DBLP ] HICSS (3), 1998, pp:138-0 [Conf ] Alberto Broggi , Michael G. Hinchey , Alexander D. Stoyen Introduction to the Minitrack on Engineering Complex Computer Systems: Emerging Technologies Track. [Citation Graph (0, 0)][DBLP ] HICSS (3), 1998, pp:148-149 [Conf ] Catherine H. Gebotys , Robert J. Gebotys Complexities in DSP Software Compilation: Performance, Code Size Power, Retargetability. [Citation Graph (0, 0)][DBLP ] HICSS (3), 1998, pp:150-156 [Conf ] Arkady Kanevsky , Anthony Skjellum , Anna Rounbehler MPI/RT - An Emerging Standard for High-Performance Real-Time Systems. [Citation Graph (0, 0)][DBLP ] HICSS (3), 1998, pp:157-166 [Conf ] Lei Hu , Ian Gorton Performance Oriented Design Using HL. [Citation Graph (0, 0)][DBLP ] HICSS (3), 1998, pp:167-176 [Conf ] K. Brink , L. J. G. Bun , Jan van Katwijk , R. F. Lutje Spelberg , W. J. Toetenel Automatic Analysis of Embedded Systems Specified in Astral. [Citation Graph (0, 0)][DBLP ] HICSS (3), 1998, pp:177-186 [Conf ] Robert L. Glass , Iris Vessey Focusing on the Application Domain: Everyone Agrees It's Vital, but Who's Doing Anything about It? [Citation Graph (0, 0)][DBLP ] HICSS (3), 1998, pp:187-196 [Conf ] Dawn N. Jutla , Peter Bodorik Architectural Support for Synchronization of Threads Accessing Variable-Sized Units of Virtual Memory. [Citation Graph (0, 0)][DBLP ] HICSS (3), 1998, pp:197-206 [Conf ] Peter J. Andersen , Philip A. Wilsey A Comparison of Alternative Extensions for Data Modeling in VHDL. [Citation Graph (0, 0)][DBLP ] HICSS (3), 1998, pp:207-215 [Conf ] Zina Ben-Miled , José A. B. Fortes , Rudolf Eigenmann , Valerie E. Taylor On the Implementation of Broadcast, Scatter and Gather in a Heterogeneous Architecture. [Citation Graph (0, 0)][DBLP ] HICSS (3), 1998, pp:216-225 [Conf ] Michael L. Nelson A Software Control Architecture for Autonomous Vehicles. [Citation Graph (0, 0)][DBLP ] HICSS (3), 1998, pp:226-232 [Conf ] Michael D. Garris Intelligent System for Reading Handwriting on Forms. [Citation Graph (0, 0)][DBLP ] HICSS (3), 1998, pp:233-242 [Conf ] Giuliano Donzellini , Stefano Nervi , Domenico Ponta , Sergio Rossi , Stefano Rovetta Object Oriented ARM7 Coprocessor. [Citation Graph (0, 0)][DBLP ] HICSS (3), 1998, pp:243-252 [Conf ] Yu-Chee Tseng , San-Yuan Wang Near-Optimal Broadcast in All-Port Wormhole-Routed 3D Tori with Dimension-Ordered Routing. [Citation Graph (0, 0)][DBLP ] HICSS (3), 1998, pp:253-262 [Conf ] Hea-Sook Park , Sung-Jin Moon , Man-Sik Park , Boseob Kwon , Kwang-Suk Song The Design of Reliable Controller for Interprocessor Communication Network Using ATM Switch. [Citation Graph (0, 0)][DBLP ] HICSS (3), 1998, pp:263-272 [Conf ] Jochen H. Schiller , Georg Carle Semi-Automated Design of High-Performance Communication Subsystems. [Citation Graph (0, 0)][DBLP ] HICSS (3), 1998, pp:273-282 [Conf ] Monica Alderighi , Sergio D'Angelo , Giacomo R. Sechi , F. d'Ovidio Experimenting Genetic Algorithms for Training a Neural Network Prototype for Photon Event Identification. [Citation Graph (0, 0)][DBLP ] HICSS (3), 1998, pp:283-291 [Conf ] Stuart Meikle , Robert B. Yates Computer Vision Algorithms for Autonomous Mobile Robot Map Building and Path Planning. [Citation Graph (0, 0)][DBLP ] HICSS (3), 1998, pp:292-0 [Conf ] Deborah A. Frincke , Brent Auernheimer Techniques for Secure System Development. [Citation Graph (0, 0)][DBLP ] HICSS (3), 1998, pp:304-306 [Conf ] Jim Alves-Foss The Architecture of Secure Systems. [Citation Graph (0, 0)][DBLP ] HICSS (3), 1998, pp:307-316 [Conf ] Kim Potter Kihlstrom , Louise E. Moser , P. M. Melliar-Smith The SecureRing Protocols for Securing Group Communication. [Citation Graph (0, 0)][DBLP ] HICSS (3), 1998, pp:317-326 [Conf ] Paul E. Black , Phillip J. Windley Formal Verification of Secure Programs in the Presence of Side Effects. [Citation Graph (0, 0)][DBLP ] HICSS (3), 1998, pp:327-0 [Conf ] James D. Kiper , James E. Tomayko Techniques for Safety Critical Software Development. [Citation Graph (0, 0)][DBLP ] HICSS (3), 1998, pp:336-337 [Conf ] Mark Heckman , Karl N. Levitt Applying the Composition Principle to Verify a Hierarchy of Security Servers. [Citation Graph (0, 0)][DBLP ] HICSS (3), 1998, pp:338-347 [Conf ] Ann E. Kelley Sobel Formal Requirements Specification Analysis of Attitude Control of the International Space Station Alpha. [Citation Graph (0, 0)][DBLP ] HICSS (3), 1998, pp:348-355 [Conf ] John Penix , Perry Alexander Using Formal Specifications for Component Retrieval and Reuse. [Citation Graph (0, 0)][DBLP ] HICSS (3), 1998, pp:356-0 [Conf ] Eugene G. McGuire Software Process Improvement Minitrack Introduction. [Citation Graph (0, 0)][DBLP ] HICSS (3), 1998, pp:368-369 [Conf ] Thomas Lee Rodgers , Douglas R. Vogel , Titus Purdin , Bill Saints In Search of Theory and Tools to Support Code Inspections. [Citation Graph (0, 0)][DBLP ] HICSS (3), 1998, pp:370-378 [Conf ] Lasse Harjumaa , Ilkka Tervonen A WWW-Based Tool for Software Inspection. [Citation Graph (0, 0)][DBLP ] HICSS (3), 1998, pp:379-388 [Conf ] Shirley A. Becker A Proposed Learning Environment for Goal-Specific Improvements. [Citation Graph (0, 0)][DBLP ] HICSS (3), 1998, pp:389-398 [Conf ] Rick Gibson Software Process Modeling: Theory, Results and Commentary. [Citation Graph (0, 0)][DBLP ] HICSS (3), 1998, pp:399-408 [Conf ] Heeseok Lee , Jae Lee Analyzing Business Domain: A Methodology and Repository System. [Citation Graph (0, 0)][DBLP ] HICSS (3), 1998, pp:409-419 [Conf ] Christopher Landauer , Kirstie L. Bellman Wrappings for Software Development. [Citation Graph (0, 0)][DBLP ] HICSS (3), 1998, pp:420-0 [Conf ]