The SCEAS System
Navigation Menu

Conferences in DBLP

Computational Science and Its Applications (iccsa)
2006 (conf/iccsa/2006-4)

  1. Sang Yong Park, Hee Yong Youn
    Message Transport Interface for Efficient Communication Between Agent Framework and Event Service. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:1-10 [Conf]
  2. Eunhoe Kim, Jaeyoung Choi
    An Ontology-Based Context Model in a Smart Home. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:11-20 [Conf]
  3. Seungkeun Lee, Intae Kim, Kiwook Rim, Jeonghyun Lee
    Service Mobility Manager for OSGi Framework. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:21-29 [Conf]
  4. Joohyun Han, Yongyun Cho, Eunhoe Kim, Jaeyoung Choi
    A Ubiquitous Workflow Service Framework. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:30-39 [Conf]
  5. Kwangcheol Shin, Ajith Abraham, Sang-Yong Han
    Self Organizing Sensor Networks Using Intelligent Clustering. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:40-49 [Conf]
  6. Olivia Graciela Fragoso Diaz, René Santaolaya Salgado, Ismael Solís Moreno, Guillermo Rodríguez-Ortiz
    Searching and Selecting Web Services Using Case Based Reasoning. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:50-57 [Conf]
  7. Sang Hoon Chi, Tae Ho Cho
    Fuzzy Logic Based Propagation Limiting Method for Message Routing in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:58-67 [Conf]
  8. Backhyun Kim, Iksoo Kim
    Content Delivery with Spatial Caching Scheme in Mobile Wireless Networks. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:68-77 [Conf]
  9. Carla Teixeira Lopes, Gabriel David
    Higher Education Web Information System Usage Analysis with a Data Webhouse. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:78-87 [Conf]
  10. Fuyu Liu, Erdogan Dogdu
    A User Management System for Federated Databases Using Web Services. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:88-97 [Conf]
  11. Anders Magnus Andersen, Torab Torabi
    A Dynamic Evaluation Framework for Mobile Applications. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:98-107 [Conf]
  12. Juan Ignacio Vázquez, Diego López de Ipiña, Iñigo Sedano
    SOAM: An Environment Adaptation Model for the Pervasive Semantic Web. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:108-117 [Conf]
  13. Marios C. Angelides, Anastasis A. Sofokleous, Christos Schizas
    Implementing the MPEG-21 Adaptation Quality of Service in Dynamic Environments. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:118-127 [Conf]
  14. Kugsang Jeong, Deokjai Choi, Soo-Hyung Kim, Gueesang Lee
    A Middleware Architecture Determining Application Context Using Shared Ontology. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:128-137 [Conf]
  15. Evi Syukur, Seng Wai Loke
    Context-Aware Regulation of Context-Aware Mobile Services in Pervasive Computing Environments. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:138-147 [Conf]
  16. Cecilia Challiol, Gustavo Rossi, Silvia E. Gordillo, Valeria De Cristófolo
    Designing and Implementing Physical Hypermedia Applications. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:148-157 [Conf]
  17. Fernando Rosa Velardo, David de Frutos-Escrig, Olga Marroquín Alonso
    Replicated Ubiquitous Nets. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:158-168 [Conf]
  18. Joaquín Pérez, Maricela Bravo, Rodolfo A. Pazos, Gerardo Reyes Salgado, Juan Frausto Solís, Víctor Jesús Sosa Sosa, Máximo López
    Design of a Shared Ontology Used for Translating Negotiation Primitives. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:169-178 [Conf]
  19. Jun Lai, Ben Soh, Chai Fei
    A Web Page Ranking Method by Analyzing Hyperlink Structure and K-Elements. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:179-186 [Conf]
  20. Eung Ju Lee, Hee Yong Youn
    Efficient Scheduling by Incorporating Bin Packing with Limited and Weighted Round Robin for Bluetooth. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:187-196 [Conf]
  21. Dongwoo Lee, SeongHoon Lee, Yongjin Lee
    ECA Rule Component for Timely Collaboration of Web-Based Distributed Business Systems. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:197-206 [Conf]
  22. D. Xuan Le, J. Wenny Rahayu, Eric Pardede
    Dynamic Approach for Integrating Web Data Warehouses. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:207-216 [Conf]
  23. Saqib Ali, Torab Torabi, Hassan Ali
    Location Aware Business Process Deployment. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:217-225 [Conf]
  24. Youngbong Kim, Mikyeong Moon, Keunhyuk Yeom
    A Framework for Rapid Development of RFID Applications. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:226-235 [Conf]
  25. Jong Hyuk Park, Sangjin Lee, Byoung-Soo Koh
    A Flexible DRM System Considering Ubiquitous Environment. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:236-244 [Conf]
  26. Jong Hyuk Park, Jungsuk Song, Sangjin Lee, Byoung-Soo Koh, In-Hwa Hong
    User Centric Intelligent IPMPS in Ubi-Home. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:245-254 [Conf]
  27. Hangbae Chang, Kyung-kyu Kim, Hosin Lee, Jungduk Kim
    The Design and Development of a Secure Keystroke System for u Business. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:255-261 [Conf]
  28. Jianhong Zhang, Tao Wei, Jianyu Zhang, Wei Zou
    Linkability of a Blind Signature Scheme and Its Improved Scheme. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:262-270 [Conf]
  29. Minseong Ju, Seoksoo Kim, Yeong-Deok Kim, Sukhoon Kang
    A Noble Structural Model for e-Learning Services in Ubiquitous Environment. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:271-278 [Conf]
  30. Wonjoon Choi, Byeong-hee Roh
    Backward Channel Protection Method for RFID Security Schemes Based on Tree-Walking Algorithms. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:279-287 [Conf]
  31. Bo-Hee Lee, Kyu-Tae Seo, Jung-Shik Kong, Jin-Geol Kim
    Design of the Configurable Clothes Using Mobile Actuator-Sensor Network. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:288-295 [Conf]
  32. Jia Zhai, Chang Mok Park, Gi-Nam Wang
    Hash-Based RFID Security Protocol Using Randomly Key-Changed Identification Procedure. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:296-305 [Conf]
  33. Oh-Heum Kwon, Ha-Joo Song
    Counting-Based Distance Estimations and Localizations in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:306-315 [Conf]
  34. Jeong Su Park, Su-Mi Lee, Eun Young Choi, Dong Hoon Lee
    Self Re-encryption Protocol Providing Strong Privacy for Low Cost RFID System. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:316-325 [Conf]
  35. Deok-Gyu Lee, Seo-Il Kang, Dae-Hee Seo, Im-Yeong Lee
    Authentication for Single/Multi Domain in Ubiquitous Computing Using Attribute Certification. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:326-335 [Conf]
  36. Ilsun You
    Improving the CGA-OMIPv6 Protocol for Low-Power Mobile Nodes. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:336-343 [Conf]
  37. Gwanghoon Kim, Soyeon Hwang, Deokgyu Lee
    Tracking Illegal System Access in a Ubiquitous Environment - Proposal for ATS, a Traceback System Using STOP. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:344-351 [Conf]
  38. Bo Zhou, Qi Shi, Madjid Merabti
    Real-Time Intrusion Detection in Ubiquitous Networks with a String-Based Approach. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:352-359 [Conf]
  39. Jin-Bum Hwang, Jong-Wook Han
    A Security Model for Home Networks with Authority Delegation. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:360-369 [Conf]
  40. Deok-Gyu Lee, Jang-Su Park, Im-Yeong Lee, Yong-Seok Park, Jung-Chul Ahn
    An Efficient Key Distribution for Ubiquitous Environment in Ad-Hoc Network Using Broadcast Encryption. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:370-379 [Conf]
  41. JiHyung Lim, DaeHun Nyang, Jeonil Kang, Kyunghee Lee, Hyotaek Lim
    Distributed Certificate Authority Under the GRID-Location Aided Routing Protocol. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:380-387 [Conf]
  42. Sangjin Kim, Taewook Ahn, Heekuck Oh
    An Efficient Hierarchical Group Key Management Protocol for a Ubiquitous Computing Environment. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:388-395 [Conf]
  43. Wen-Shenq Juang
    Efficient User Authentication and Key Agreement in Ubiquitous Computing. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:396-405 [Conf]
  44. Yuen-Yan Chan, Sebastian Fleissner, Joseph K. Liu, Jin Li
    Single Sign-On and Key Establishment for Ubiquitous Smart Environments. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:406-415 [Conf]
  45. Ilsun You, Eun-Sun Jung
    A Light Weight Authentication Protocol for Digital Home Networks. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:416-423 [Conf]
  46. Chee-Seng Leong, Bok-Min Goi
    Smart Home Microcontroller: Telephone Interfacing. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:424-431 [Conf]
  47. Soo-Jin Park, Young-Shin Park, Yong-Rak Choi, Sukhoon Kang
    SPAD: A Session Pattern Anomaly Detector for Pre-alerting Intrusions in Home Network. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:432-439 [Conf]
  48. Hayoung Oh, Jiyoung Lim, Kijoon Chae, Jungchan Nah
    Home Gateway with Automated Real-Time Intrusion Detection for Secure Home Networks. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:440-447 [Conf]
  49. Chul-Yong Uhm, Su-Nam Kim, Kyeong-Hoon Jung, Dong Wook Kang, Ki-Doo Kim
    The Performance Analysis of UWB System for the HD Multimedia Communication in a Home Network. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:448-455 [Conf]
  50. Juryon Paik, Hee Yong Youn, Ung-Mo Kim
    Extraction of Implicit Context Information in Ubiquitous Computing Environments. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:456-465 [Conf]
  51. Jae Yeol Lee, Gue Won Rhee, Hyun Kim, Kang-Woo Lee, Young-Ho Suh, Kwangsoo Kim
    Convergence of Context-Awareness and Augmented Reality for Ubiquitous Services and Immersive Interactions. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:466-474 [Conf]
  52. Eung-Nam Ko
    An Adaptive Fault Tolerance System for Ubiquitous Computing Environments: AFTS. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:475-482 [Conf]
  53. Kyu Lee, Hyung-Jun Kim, Ho-Jin Shin, Dong Ryeol Shin
    Design and Implementation of Middleware for Context-Aware Service Discovery in Ubiquitous Computing Environments. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:483-490 [Conf]
  54. SeongHoon Lee, Dongwoo Lee, Donghee Shim, Dongyoung Cho, Wankwon Lee
    A Dynamic Channel Allocation Mechanism in Cellular Mobile Networks for Ubiquitous Environments Based on Time Constraints. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:491-498 [Conf]
  55. Sangho Yi, Hong Min, Junyoung Heo, Boncheol Gu, Yookun Cho, Jiman Hong, Jinwon Kim, Kwangyong Lee, Seungmin Park
    Performance Analysis of Task Schedulers in Operating Systems for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:499-508 [Conf]
  56. Kee-Young Shin, Jin Won Kim, Ilgon Park, Pyeong Soo Mah
    Wireless Sensor Networks: A Scalable Time Synchronization. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:509-518 [Conf]
  57. Hyung Su Lee, Kyung Tae Kim, Hee Yong Youn
    A New Cluster Head Selection Scheme for Long Lifetime of Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:519-528 [Conf]
  58. Pengliu Tan, Hai Jin, Minghu Zhang
    Two-Dimensional Priority Scheduling Scheme for Open Real-Time Systems. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:529-538 [Conf]
  59. Feng Xia, Youxian Sun
    An Enhanced Dynamic Voltage Scaling Scheme for Energy-Efficient Embedded Real-Time Control Systems. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:539-548 [Conf]
  60. Geunyoung Park, Boncheol Gu, Junyoung Heo, Sangho Yi, Jungkyu Han, Jaemin Park, Hong Min, Xuefeng Piao, Yookun Cho, Chang-Won Park, Ha Joong Chung, Bongkyu Lee, Sangjun Lee
    Adaptive Load Balancing Mechanism for Server Cluster. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:549-557 [Conf]
  61. Junghoon Lee, Mikyung Kang, Eui-young Kang, Gyung-Leen Park, Hanil Kim, Cheolmin Kim, Seongbaeg Kim, Jiman Hong
    Design and Performance Analysis of a Message Scheduling Scheme for WLAN-Based Cluster Computing. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:558-566 [Conf]
  62. SungSuk Kim, Chang Choi, Junho Choi, PanKoo Kim, Hanil Kim
    A Method for Efficient Malicious Code Detection Based on Conceptual Similarity. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:567-576 [Conf]
  63. MoonJoon Kim, JeongMin Lee, WonGi Hong, Hoon Chang
    A Minimized Test Pattern Generation Method for Ground Bounce Effect and Delay Fault Detection. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:577-583 [Conf]
  64. Mun-Kyu Lee, Howon Kim, Dowon Hong, Kyoil Chung
    Efficient Exponentiation in GF(pm) Using the Frobenius Map. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:584-593 [Conf]
  65. DoHyung Han, JeongWoo Jwa, Hanil Kim
    A Dual-Channel MAC Protocol Using Directional Antennas in Location Aware Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:594-602 [Conf]
  66. Hyukjun Oh, Heejune Ahn, Jiman Hong
    A Power-Efficient Design Employing an Extreme Condition Detector for Embedded Systems. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:603-611 [Conf]
  67. Ki-Young Kim, Seung-Yong Kim, Seok-Yoon Kim
    An Efficient Delay Metric on RC Interconnects Under Saturated Ramp Inputs. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:612-621 [Conf]
  68. Seong-Won Lee, Neungsoo Park, Jean-Luc Gaudiot
    Low Power Microprocessor Design for Embedded Systems. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:622-630 [Conf]
  69. Jong Wook Kwak, Seong Tae Jhang, Chu Shik Jhon
    History Length Adjustable gshare Predictor for High-Performance Embedded Processor. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:631-638 [Conf]
  70. Sangkyun Kim, Hong Joo Lee
    Security Engineering Methodology Based on Problem Solving Theory. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:639-648 [Conf]
  71. Guiyi Wei, Jun Yu, Yun Ling, Jun Liu
    Design and Implementation of an Ontology Algorithm for Web Documents Classification. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:649-658 [Conf]
  72. Kyung Cheol Choi, Gun Ho Lee
    Automatic Test Approach of Web Application for Security (AutoInspect). [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:659-668 [Conf]
  73. Min Chan Kim, Sung Jo Kim
    A Scenario-Based User-Oriented Integrated Architecture for Supporting Interoperability Among Heterogeneous Home Network Middlewares. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:669-678 [Conf]
  74. Jeong-Mi Lim, Chang-Seop Park
    Session Key Agreement Protocol for End-to-End Security in MANET. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:679-686 [Conf]
  75. Yongsik Kim, Taesoo Lim, Dongsoo Kim, Cheol Jung, Honggee Jin
    Process-Oriented DFM System for Ubiquitous Devices. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:687-696 [Conf]
  76. Yong Gu Ji, Chiwoo Park, Minsoo Kim
    A Study on the Application of BPM Systems for Implementation of RosettaNet Based e-Logistics. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:697-706 [Conf]
  77. Hangbae Chang, Jungduk Kim, Sungjun Lim
    Information Security Management System for SMB in Ubiquitous Computing. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:707-715 [Conf]
  78. Hong Joo Lee, Choon Seong Leem, Sangkyun Kim
    A Study on the Development of Usability Evaluation Framework (Focusing on Digital TV). [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:716-725 [Conf]
  79. Rogelio N. Limón Cordero, Isidro Ramos Salavert, José Torres Jiménez
    Designing Aspectual Architecture Views in Aspect-Oriented Software Development. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:726-735 [Conf]
  80. Hyun Gi Min, Soo Dong Kim
    Process and Techniques to Generate Components in MDA/CB-PIM for Automation. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:736-745 [Conf]
  81. Yucong Duan, Xiaolan Fu, Qingwu Hu, Yuqing Gu
    An Ontology Definition Framework for Model Driven Development. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:746-755 [Conf]
  82. Xiaoqin Xie, Kaiyun Chen
    An AHP-Based Evaluation Model for Service Composition. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:756-766 [Conf]
  83. Ha-Yong Lee, Hae Sool Yang, Suk-hyung Hwang
    Construction of Quality Test and Certification System for Package Software. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:767-776 [Conf]
  84. Yoon Jung Chung, In-Jung Kim, Chulsoo Lee, Eul-Gyu Im, Dongho Won
    Design of an On-Line Intrusion Forecast System with a Weather Forecasting Model. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:777-786 [Conf]
  85. Daerae Cho, Changmin Kim, Moonwon Choo, Suk-Ho Kang, Wookey Lee
    Goal Programming Approach to Compose the Web Service Quality of Service. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:787-797 [Conf]
  86. Chang-Sun Shin, Chung-Sub Lee, Su-Chong Joo
    Healthcare Home Service System Based on Distributed Object Group Framework. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:798-807 [Conf]
  87. Byungdo Choi, Chonggun Kim
    A Learning Attitude Evaluation System for Learning Concentration on Distance Education. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:808-817 [Conf]
  88. Mary Wu, Chonggun Kim
    A Calculation Method for Direction Based Handover Rate in Cell Based Mobile Networks. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:818-827 [Conf]
  89. Wan-Kyoo Choi, Sung-Joo Lee, Il-Yong Chung, Yong-Geun Bae
    The Classification of the Software Quality by Employing the Tolerence Class. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:828-834 [Conf]
  90. Jea-Youn Park, Gui-Jung Kim, Young-Jae Song
    Components Searching System Using Component Identifiers and Request Specifics. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:835-843 [Conf]
  91. Haeng-Kon Kim
    Software Architecture Generation on UML. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:844-852 [Conf]
  92. Chang-Won Jeong, Dong-Seok Kim, Geon-Yeob Lee, Su-Chong Joo
    Distributed Programming Developing Tool Based on Distributed Object Group Framework. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:853-863 [Conf]
  93. Young-Jun Seo, Young-Jae Song
    A Study on Automatic Code Generation Tool from Design Patterns Based on the XMI. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:864-872 [Conf]
  94. Ki-Won Song, Haeng Kon Kim, Kyung-Whan Lee
    Design of Opportunity Tree for Organization's Process Strategy Decision-Making Based on SPICE Assessment Experience. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:873-882 [Conf]
  95. Mi-Og Park, Dea-Woo Park
    SUALPPA Scheme: Enhanced Solution for User Authentication in the GSM System. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:883-892 [Conf]
  96. Hye-Min Noh, Sa-Kyun Jeong, Cheol-Jung Yoo, Ok-Bae Chang, Eun Mi Kim, Jong-Ryeol Choi
    Design of Mobile Video Player Based on the WIPI Platform. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:893-898 [Conf]
  97. Bobby D. Gerardo, Jaewan Lee, Su-Chong Joo
    Discovering Patterns Based on Fuzzy Logic Theory. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:899-908 [Conf]
  98. Sun-Myung Hwang, Hee-Gyun Yeom
    Metrics Design for Software Process Assessment Based on ISO/IEC 15504. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:909-916 [Conf]
  99. Kilsup Lee, Sung Jong Lee
    A Quantitative Evaluation Model Using the ISO/IEC 9126 Quality Model in the Component Based Development Process. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:917-926 [Conf]
  100. Haeng-Kon Kim, Eun-Ju Park
    Component Specification Model for the Web Services. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:927-936 [Conf]
  101. Suk-hyung Hwang, Hong-Gee Kim, Myeng-Ki Kim, Sung-Hee Choi, Hae Sool Yang
    A Data-Driven Approach to Constructing an Ontological Concept Hierarchy Based on the Formal Concept Analysis. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:937-946 [Conf]
  102. Malrey Lee, Eun-Kwan Kang, Thomas M. Gatton
    Web-Document Filtering Using Concept Graph. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:947-954 [Conf]
  103. Seong-Man Choi, Cheol-Jung Yoo, Ok-Bae Chang
    Development of Integrated DAO Pattern Applying Iterator Pattern. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:955-965 [Conf]
  104. Misook Choi, Seojeong Lee
    A Coupling Metric Applying the Characteristics of Components. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:966-975 [Conf]
  105. Haeng-Kon Kim, Hae Sool Yang
    Software Process Improvement Environment. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:976-984 [Conf]
  106. Eun Sook Cho, So Yeon Min, Chul Jin Kim
    A Design Technique of CBD Meta-model Based on Graph Theory. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:985-993 [Conf]
  107. J. H. Lee, Dan Lee
    Description Technique for Component Composition Focusing on Black-Box View. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:994-1002 [Conf]
  108. Kwang Moon Cho
    XML Security Model for Secure Information Exchange in E-Commerce. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:1003-1011 [Conf]
  109. Chang-Mog Lee
    Design and Implementation of B2Bi Collaboration Workflow Tool Based on J2EE. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:1012-1021 [Conf]
  110. Sangjoon Jung, Mary Wu, Youngsuk Jung, Chonggun Kim
    Traffic-Predicting A Routing Algorithm Using Time Series Models. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:1022-1031 [Conf]
  111. Gu-Beom Jeong, Guk-Boh Kim
    A Study on Software Architecture Evaluation. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:1032-1041 [Conf]
  112. Jungkyu Kwon, Mokdong Chung
    RFID-Based ALE Application Framework Using Context-Based Security Service. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:1042-1051 [Conf]
  113. Hye-Jung Jung, Won-Tae Jung, Hae Sool Yang
    A Study on the Standard of Software Quality Testing. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:1052-1059 [Conf]
  114. Kyong-Cheol Ko, Oh-Hyung Kang, Chang-Woo Lee, Ki-Hong Park, Yang-Won Rhee
    Scene Change Detection Using the Weighted Chi-Test and Automatic Threshold Decision Algorithm. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:1060-1069 [Conf]
  115. Eun-ser Lee, Sang Ho Lee
    Design Opportunity Tree for Schedule Management and Evaluation by COQUALMO. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:1070-1080 [Conf]
  116. TaeHoon Lee, Gihwon Kwon, Hyuksoo Han
    CTL Model Checking for Boolean Program. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:1081-1089 [Conf]
  117. Yincui Hu, Yong Xue, Guoyin Cai, Chaolin Wu, Jianping Guo, Ying Luo, Wei Wan, Lei Zheng
    Grid Service Implementation of Aerosol Optical Thickness Retrieval over Land from MODIS. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:1090-1097 [Conf]
  118. M. Hinarejos, Jordi Forné
    Revocation Scheme for PMI Based Upon the Tracing of Certificates Chains. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:1098-1106 [Conf]
  119. Kuan-Ching Li, Chiou-Nan Chen, Chia-Hsien Wen, Ching-Wen Yang, Joung-Liang Lan
    Nailfold Capillary Microscopy High-Resolution Image Analysis Framework for Connective Tissue Disease Diagnosis Using Grid Computing Technology. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:1107-1115 [Conf]
  120. Sangdong Jang, Wu Woon Kim
    EFH: An Edge-Based Fast Handover for Mobile IPv6 in IEEE 802.11b WLAN. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:1116-1125 [Conf]
  121. Yong-Il Jang, Ho Seok Kim, Soon-Young Park, Jae-dong Lee, Hae-Young Bae
    An Extendible Hashing Based Recovery Method in a Shared-Nothing Spatial Database Cluster. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:1126-1135 [Conf]
  122. José Daniel García, Jesús Carretero, Félix García, Javier Fernández, Alejandro Calderón, David E. Singh
    A Quantitative Justification to Partial Replication of Web Contents. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:1136-1145 [Conf]
  123. Backhyun Kim, Iksoo Kim
    Content Distribution Strategy Using Web-Cached Multicast Technique. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:1146-1155 [Conf]
  124. Dongmahn Seo, Joahyoung Lee, Yoon Kim, Changyeol Choi, Hwangkyu Choi, Inbum Jung
    Load Distribution Strategies in Cluster-Based Transcoding Servers for Mobile Clients. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:1156-1165 [Conf]
  125. Jerzy Brzezinski, Anna Kobusinska
    Safety of Recovery Protocol Preserving MW Session Guarantee in Mobile Systems. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:1166-1174 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002