The SCEAS System
Navigation Menu

Conferences in DBLP

Hawaii International Conference on System Sciences (HICSS) (hicss)
1998 (conf/hicss/1998-3)

  1. Fernando Alvarado, W. S. Mota
    The Role of Energy Imbalance Management on Power Market Stability. [Citation Graph (0, 0)][DBLP]
    HICSS (3), 1998, pp:4-8 [Conf]
  2. Richard E. Schuler
    The Dynamics of Market Power with Deregulated Electricity Generation Supplies. [Citation Graph (0, 0)][DBLP]
    HICSS (3), 1998, pp:9-14 [Conf]
  3. John C. Bernard, Warren Hall, Robert Either, Timothy Mount, William Schulze, Ray Zimmerman, David Gan, Carlos Murillo-Sánchez, Robert J. Thomas, Richard E. Schuler
    Experimental Results for Single Period Auctions. [Citation Graph (0, 0)][DBLP]
    HICSS (3), 1998, pp:15-23 [Conf]
  4. A. P. Sakis Meliopoulos, George J. Cokkinides, A. G. Bakirtzis
    Load-Frequency Control Service in a Deregulated Environment. [Citation Graph (0, 0)][DBLP]
    HICSS (3), 1998, pp:24-31 [Conf]
  5. Christopher L. DeMarco
    Design of Predatory Generation Control in Electric Power Systems. [Citation Graph (0, 0)][DBLP]
    HICSS (3), 1998, pp:32-38 [Conf]
  6. Koeunyi Bae, James S. Thorp
    An Importance Sampling Application: 179 Bus WSCC System under Voltage Based Hidden Failures and Relay Misoperations. [Citation Graph (0, 0)][DBLP]
    HICSS (3), 1998, pp:39-46 [Conf]
  7. Dennis Ray, Eileen Cashman
    Influence of Operational Risk Assessment on Bidding Strategies in Power Markets. [Citation Graph (0, 0)][DBLP]
    HICSS (3), 1998, pp:47- [Conf]
  8. Michael J. Denton, Stephen J. Rassenti, Vernon L. Smith
    Spot Market Mechanism Design and Competitivity Issues in Electric Power. [Citation Graph (0, 0)][DBLP]
    HICSS (3), 1998, pp:48-56 [Conf]
  9. Sarosh Talukdar
    Autonomous Cyber Agents: Rules for Collaboration and Concurrency. [Citation Graph (0, 0)][DBLP]
    HICSS (3), 1998, pp:57-61 [Conf]
  10. Jamie D. Weber, Thomas J. Overbye, Christopher L. DeMarco
    Inclusion of Price Dependent Load Models in the Optimal Power Flow. [Citation Graph (0, 0)][DBLP]
    HICSS (3), 1998, pp:62-70 [Conf]
  11. Chung-Li Tseng, Shmuel Oren, C. S. Cheng, C.-A. Li, Alva S. Svoboda, Raymond B. Johnson
    A Transmission-Constrained Unit Commitment Method. [Citation Graph (0, 0)][DBLP]
    HICSS (3), 1998, pp:71-80 [Conf]
  12. Carlos Murillo-Sánchez, Robert J. Thomas
    Thermal Unit Commitment Including Optimal AC Power Flow Constraints. [Citation Graph (0, 0)][DBLP]
    HICSS (3), 1998, pp:81-88 [Conf]
  13. Peter W. Sauer
    Alternatives for Calculating Transmission Reliability Margin (TRM) in Available Transfer Capability (ATC). [Citation Graph (0, 0)][DBLP]
    HICSS (3), 1998, pp:89-89 [Conf]
  14. Richard Tabors
    Reliability: Reality or the Power Engineers' Last Grasp. [Citation Graph (0, 0)][DBLP]
    HICSS (3), 1998, pp:90-95 [Conf]
  15. Jamie D. Weber, Thomas J. Overbye, Peter W. Sauer, Christopher L. DeMarco
    A Simulation Based Approach to Pricing Reactive Power. [Citation Graph (0, 0)][DBLP]
    HICSS (3), 1998, pp:96-103 [Conf]
  16. James A. Momoh, Jizhong Zhu
    A New Approach to VAr Pricing and Control in the Competitive Environment. [Citation Graph (0, 0)][DBLP]
    HICSS (3), 1998, pp:104-111 [Conf]
  17. Ziad Younes, Marija Ilic
    Generation Strategies for Gaming Transmission Constraints: Will the Deregulated Electric Power Market be an Oligopoly? [Citation Graph (0, 0)][DBLP]
    HICSS (3), 1998, pp:112-121 [Conf]
  18. Felix F. Wu, Chris Yeung, Ada Poon, Jerome Yen
    A Multi-Agent Approach to the Deregulation and Restructuring of Power Industry. [Citation Graph (0, 0)][DBLP]
    HICSS (3), 1998, pp:122-131 [Conf]
  19. Philip A. Fedora, Craig A. Kazin
    Implementing NEPOOL's Restructuring Proposal: The Installed Capacity Market. [Citation Graph (0, 0)][DBLP]
    HICSS (3), 1998, pp:132-137 [Conf]
  20. Ray Zimmerman, Robert J. Thomas, Deqiang Gan, Carlos Murillo-Sánchez
    An Internet-Based Platform for Testing Generation Scheduling Auctions. [Citation Graph (0, 0)][DBLP]
    HICSS (3), 1998, pp:138-0 [Conf]
  21. Alberto Broggi, Michael G. Hinchey, Alexander D. Stoyen
    Introduction to the Minitrack on Engineering Complex Computer Systems: Emerging Technologies Track. [Citation Graph (0, 0)][DBLP]
    HICSS (3), 1998, pp:148-149 [Conf]
  22. Catherine H. Gebotys, Robert J. Gebotys
    Complexities in DSP Software Compilation: Performance, Code Size Power, Retargetability. [Citation Graph (0, 0)][DBLP]
    HICSS (3), 1998, pp:150-156 [Conf]
  23. Arkady Kanevsky, Anthony Skjellum, Anna Rounbehler
    MPI/RT - An Emerging Standard for High-Performance Real-Time Systems. [Citation Graph (0, 0)][DBLP]
    HICSS (3), 1998, pp:157-166 [Conf]
  24. Lei Hu, Ian Gorton
    Performance Oriented Design Using HL. [Citation Graph (0, 0)][DBLP]
    HICSS (3), 1998, pp:167-176 [Conf]
  25. K. Brink, L. J. G. Bun, Jan van Katwijk, R. F. Lutje Spelberg, W. J. Toetenel
    Automatic Analysis of Embedded Systems Specified in Astral. [Citation Graph (0, 0)][DBLP]
    HICSS (3), 1998, pp:177-186 [Conf]
  26. Robert L. Glass, Iris Vessey
    Focusing on the Application Domain: Everyone Agrees It's Vital, but Who's Doing Anything about It? [Citation Graph (0, 0)][DBLP]
    HICSS (3), 1998, pp:187-196 [Conf]
  27. Dawn N. Jutla, Peter Bodorik
    Architectural Support for Synchronization of Threads Accessing Variable-Sized Units of Virtual Memory. [Citation Graph (0, 0)][DBLP]
    HICSS (3), 1998, pp:197-206 [Conf]
  28. Peter J. Andersen, Philip A. Wilsey
    A Comparison of Alternative Extensions for Data Modeling in VHDL. [Citation Graph (0, 0)][DBLP]
    HICSS (3), 1998, pp:207-215 [Conf]
  29. Zina Ben-Miled, José A. B. Fortes, Rudolf Eigenmann, Valerie E. Taylor
    On the Implementation of Broadcast, Scatter and Gather in a Heterogeneous Architecture. [Citation Graph (0, 0)][DBLP]
    HICSS (3), 1998, pp:216-225 [Conf]
  30. Michael L. Nelson
    A Software Control Architecture for Autonomous Vehicles. [Citation Graph (0, 0)][DBLP]
    HICSS (3), 1998, pp:226-232 [Conf]
  31. Michael D. Garris
    Intelligent System for Reading Handwriting on Forms. [Citation Graph (0, 0)][DBLP]
    HICSS (3), 1998, pp:233-242 [Conf]
  32. Giuliano Donzellini, Stefano Nervi, Domenico Ponta, Sergio Rossi, Stefano Rovetta
    Object Oriented ARM7 Coprocessor. [Citation Graph (0, 0)][DBLP]
    HICSS (3), 1998, pp:243-252 [Conf]
  33. Yu-Chee Tseng, San-Yuan Wang
    Near-Optimal Broadcast in All-Port Wormhole-Routed 3D Tori with Dimension-Ordered Routing. [Citation Graph (0, 0)][DBLP]
    HICSS (3), 1998, pp:253-262 [Conf]
  34. Hea-Sook Park, Sung-Jin Moon, Man-Sik Park, Boseob Kwon, Kwang-Suk Song
    The Design of Reliable Controller for Interprocessor Communication Network Using ATM Switch. [Citation Graph (0, 0)][DBLP]
    HICSS (3), 1998, pp:263-272 [Conf]
  35. Jochen H. Schiller, Georg Carle
    Semi-Automated Design of High-Performance Communication Subsystems. [Citation Graph (0, 0)][DBLP]
    HICSS (3), 1998, pp:273-282 [Conf]
  36. Monica Alderighi, Sergio D'Angelo, Giacomo R. Sechi, F. d'Ovidio
    Experimenting Genetic Algorithms for Training a Neural Network Prototype for Photon Event Identification. [Citation Graph (0, 0)][DBLP]
    HICSS (3), 1998, pp:283-291 [Conf]
  37. Stuart Meikle, Robert B. Yates
    Computer Vision Algorithms for Autonomous Mobile Robot Map Building and Path Planning. [Citation Graph (0, 0)][DBLP]
    HICSS (3), 1998, pp:292-0 [Conf]
  38. Deborah A. Frincke, Brent Auernheimer
    Techniques for Secure System Development. [Citation Graph (0, 0)][DBLP]
    HICSS (3), 1998, pp:304-306 [Conf]
  39. Jim Alves-Foss
    The Architecture of Secure Systems. [Citation Graph (0, 0)][DBLP]
    HICSS (3), 1998, pp:307-316 [Conf]
  40. Kim Potter Kihlstrom, Louise E. Moser, P. M. Melliar-Smith
    The SecureRing Protocols for Securing Group Communication. [Citation Graph (0, 0)][DBLP]
    HICSS (3), 1998, pp:317-326 [Conf]
  41. Paul E. Black, Phillip J. Windley
    Formal Verification of Secure Programs in the Presence of Side Effects. [Citation Graph (0, 0)][DBLP]
    HICSS (3), 1998, pp:327-0 [Conf]
  42. James D. Kiper, James E. Tomayko
    Techniques for Safety Critical Software Development. [Citation Graph (0, 0)][DBLP]
    HICSS (3), 1998, pp:336-337 [Conf]
  43. Mark Heckman, Karl N. Levitt
    Applying the Composition Principle to Verify a Hierarchy of Security Servers. [Citation Graph (0, 0)][DBLP]
    HICSS (3), 1998, pp:338-347 [Conf]
  44. Ann E. Kelley Sobel
    Formal Requirements Specification Analysis of Attitude Control of the International Space Station Alpha. [Citation Graph (0, 0)][DBLP]
    HICSS (3), 1998, pp:348-355 [Conf]
  45. John Penix, Perry Alexander
    Using Formal Specifications for Component Retrieval and Reuse. [Citation Graph (0, 0)][DBLP]
    HICSS (3), 1998, pp:356-0 [Conf]
  46. Eugene G. McGuire
    Software Process Improvement Minitrack Introduction. [Citation Graph (0, 0)][DBLP]
    HICSS (3), 1998, pp:368-369 [Conf]
  47. Thomas Lee Rodgers, Douglas R. Vogel, Titus Purdin, Bill Saints
    In Search of Theory and Tools to Support Code Inspections. [Citation Graph (0, 0)][DBLP]
    HICSS (3), 1998, pp:370-378 [Conf]
  48. Lasse Harjumaa, Ilkka Tervonen
    A WWW-Based Tool for Software Inspection. [Citation Graph (0, 0)][DBLP]
    HICSS (3), 1998, pp:379-388 [Conf]
  49. Shirley A. Becker
    A Proposed Learning Environment for Goal-Specific Improvements. [Citation Graph (0, 0)][DBLP]
    HICSS (3), 1998, pp:389-398 [Conf]
  50. Rick Gibson
    Software Process Modeling: Theory, Results and Commentary. [Citation Graph (0, 0)][DBLP]
    HICSS (3), 1998, pp:399-408 [Conf]
  51. Heeseok Lee, Jae Lee
    Analyzing Business Domain: A Methodology and Repository System. [Citation Graph (0, 0)][DBLP]
    HICSS (3), 1998, pp:409-419 [Conf]
  52. Christopher Landauer, Kirstie L. Bellman
    Wrappings for Software Development. [Citation Graph (0, 0)][DBLP]
    HICSS (3), 1998, pp:420-0 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002