The SCEAS System
Navigation Menu

Conferences in DBLP

Computational Science and Its Applications (iccsa)
2004 (conf/iccsa/2004-4)

  1. Weidong Shen, Shulin Yang
    New Techniques in Designing Finite Difference Domain Decomposition Algorithm for the Heat Equation. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:1-10 [Conf]
  2. Ju-Hyun Lee, Sungkwon Kang, Hoo-Kyun Choi
    A Fast Construction Algorithm for the Incidence Matrices of a Class of Symmetric Balanced Incomplete Block Designs. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:11-19 [Conf]
  3. Tzu-Yi Chen
    ILUTP Mem: A Space-Efficient Incomplete LU Preconditioner. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:20-28 [Conf]
  4. Jin-Geol Kim, SangHo Choi, Ki heon Park
    Optimal Gait Control for a Biped Locomotion Using Genetic Algorithm. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:29-38 [Conf]
  5. Edward Puchala
    A Bayes Algorithm for the Multitask Pattern Recognition Problem - Direct and Decomposed Independent Approaches. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:39-45 [Conf]
  6. Hyung-Wook Yoon, Bo-Hyeong Lee, Tae-Jin Lee, Min Young Chung
    Energy Efficient Routing with Power Management to Increase Network Lifetime in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:46-55 [Conf]
  7. Moonseong Kim, Young-Cheol Bang, Hyunseung Choo
    New Parameter for Balancing Two Independent Measures in Routing Path. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:56-65 [Conf]
  8. Deok-Gyu Lee, Im-Yeong Lee
    A Study on Efficient Key Distribution and Renewal in Broadcast Encryption. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:66-76 [Conf]
  9. Joaquín Pérez, Rodolfo A. Pazos, Juan Frausto Solís, Guillermo Rodríguez, Laura Cruz, Graciela Mora, Héctor J. Fraire H.
    Self-Tuning Mechanism for Genetic Algorithms Parameters, an Application to Data-Object Allocation in the Web. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:77-86 [Conf]
  10. Nam-Yeun Kim, Kee-Young Yoo
    Digit-Serial AB2 Systolic Array for Division in GF(2m). [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:87-96 [Conf]
  11. Sangman Moh, Chansu Yu, Dongsoo Han
    Design and Experiment of a Communication-Aware Parallel Quicksort with Weighted Partition of Processors. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:97-105 [Conf]
  12. Soonhak Kwon, Chang Hoon Kim, Chun Pyo Hong
    A Linear Systolic Array for Multiplication in GF(2m) for High Speed Cryptographic Processors. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:106-116 [Conf]
  13. Li Chunlin, Zhengding Lu, Li Layuan
    Price Driven Market Mechanism for Computational Grid Resource Allocation. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:117-126 [Conf]
  14. Xinyu Yang, Ming Zeng, Zhao Rui, Yi Shi
    A Novel LMS Method for Real-Time Network Traffic Prediction. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:127-136 [Conf]
  15. Víctor Jesús Sosa Sosa, Juan Gabriel González Serna, Xochitl Landa Miguez, Francisco Verduzco Medina, Manuel A. Valdés Marrero
    Dynamic Configuration between Proxy Caches within an Intranet. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:137-146 [Conf]
  16. Tan Tien Ping, Gian Chand Sodhy, Chan Huah Yong, Fazilah Haron, Rajkumar Buyya
    A Market-Based Scheduler for JXTA-Based Peer-to-Peer Computing System. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:147-157 [Conf]
  17. Hyontai Sug
    Reducing on the Number of Testing Items in the Branches of Decision Trees. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:158-166 [Conf]
  18. Ki-Hyung Kim, Won-Seok Kang
    CORBA-Based, Multi-threaded Distributed Simulation of Hierarchical DEVS Models: Transforming Model Structure into a Non-hierarchical One. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:167-176 [Conf]
  19. Jesús Acosta-Elías, Ulises Pineda Rico, Jose Martin Luna-Rivera, Enrique Stevens-Navarro, Isaac Campos-Canton, Leandro Navarro-Moldes
    The Effects of Network Topology on Epidemic Algorithms. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:177-184 [Conf]
  20. Tae-Wan Ryu, Christoph F. Eick
    A Systematic Database Summary Generation Using the Distributed Query Discovery System. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:185-195 [Conf]
  21. Kyo-Min Ku, Kyeoung Ju Ha, Wi Hyun Yoo, Kee-Young Yoo
    Parallel Montgomery Multiplication and Squaring over GF(2m) Based on Cellular Automata. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:196-205 [Conf]
  22. Sung Baik, Jerzy W. Bala
    A Decision Tree Algorithm for Distributed Data Mining: Towards Network Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:206-212 [Conf]
  23. Sam Jin Jeong
    Maximizing Parallelism for Nested Loops with Non-uniform Dependences. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:213-222 [Conf]
  24. Magdalena Payeras-Capellà, Josep Lluís Ferrer-Gomila, Llorenç Huguet i Rotger
    Fair Exchange to Achieve Atomicity in Payments of High Amounts Using Electronic Cash. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:223-232 [Conf]
  25. ChaYoung Kim, JinHo Ahn, Chong-Sun Hwang
    Gossip Based Causal Order Broadcast Algorithm. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:233-242 [Conf]
  26. Chaohui Lu, Ping An, Zhaoyang Zhang
    Intermediate View Synthesis from Stereoscopic Videoconference Images. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:243-250 [Conf]
  27. Chang-Gyu Choi, Yongseok Chang, Jung Hyun Cho, Sung-Ho Kim
    Extract Shape from Clipart Image Using Modified Chain Code - Rectangle Representation. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:251-260 [Conf]
  28. Boguslaw Cyganek, Jan Borgosz
    Control Messaging Channel for Distributed Computer Systems. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:261-270 [Conf]
  29. Uk-Chul Choi, Yoon-Hee Choi, Dae-Chul Kim, Tae-Sun Choi
    Scene-Based Video Watermarking for Broadcasting Systems. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:271-280 [Conf]
  30. Byong-Won Hwang, Tae-Ha Kang, Tae-Seung Lee
    Distortion-Free of General Information with Edge Enhanced Error Diffusion Halftoning. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:281-290 [Conf]
  31. Tanzeem Muzaffar, Tae-Sun Choi
    Enhanced Video Coding with Error Resilience Based on Macroblock Data Manipulation. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:291-300 [Conf]
  32. Myung Eui Lee, Pyung Soo Kim
    Filtering of Colored Noise for Signal Enhancement. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:301-310 [Conf]
  33. Jihun Park, Sunghun Park, Jake K. Aggarwal
    Model-Based Human Motion Tracking and Behavior Recognition Using Hierarchical Finite State Automata. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:311-320 [Conf]
  34. Won-Hyuck Choi, Hye-jin Shim, Jung-Sun Kim
    Effective Digital Watermarking Algorithm by Contour Detection. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:321-328 [Conf]
  35. Kook-Yeol Yoo
    New Packetization Method for Error Resilient Video Communications. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:329-337 [Conf]
  36. Yoon-Hee Choi, Yeong Kyeong Seong, Joo-Young Kim, Tae-Sun Choi
    A Video Mosaicking Technique with Self Scene Segmentation for Video Indexing. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:338-347 [Conf]
  37. Kyung-Pyo Kang, Yoon-Hee Choi, Tae-Sun Choi
    Real-Time Video Watermarking for MPEG Streams. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:348-358 [Conf]
  38. Jong-Un Yang, Jeong-Hyun Cho, Sang-Hyun Bae, In-Ho Ra
    A TCP-Friendly Congestion Control Scheme Using Hybrid Approach for Reducing Transmission Delay of Real-Time Video Stream. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:359-368 [Conf]
  39. Jihun Park, Sunghun Park
    Object Boundary Edge Selection Using Level-of-Detail Canny Edges. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:369-378 [Conf]
  40. Monia Discepoli, Ivan Gerace
    Inverse Dithering through IMAP Estimation. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:379-388 [Conf]
  41. Fevzullah Temurtas, Ali Gulbag, Nejat Yumusak
    A Study on Neural Networks Using Taylor Series Expansion of Sigmoid Activation Function. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:389-397 [Conf]
  42. Fevzullah Temurtas, Cihat Tasaltin, Hasan Temurtas, Nejat Yumusak, Zafer Ziya Ozturk
    A Study on Neural Networks with Tapped Time Delays: Gas Concentration Estimation. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:398-405 [Conf]
  43. Mingli Song, Chun Chen, Jiajun Bu, Mingyu You
    Speech Emotion Recognition and Intensity Estimation. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:406-413 [Conf]
  44. Liran Shen, Xueyao Li, Huiqiang Wang, Rubo Zhang
    Speech Hiding Based on Auditory Wavelet. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:414-420 [Conf]
  45. Sung-kwan Je, Jae-Hyun Cho, Eui-Young Cha
    Automatic Selecting Coefficient for Semi-blind Watermarking. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:421-430 [Conf]
  46. Olga K. Rodionova, Alexey S. Rodionov, Hyunseung Choo
    Network Probabilistic Connectivity: Optimal Structures. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:431-440 [Conf]
  47. Myung-Sub Lee, Chang-Hyeon Park, Young-Ho Sohn
    Differentiated Web Service System through Kernel-Level Realtime Scheduling and Load Balancing. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:441-450 [Conf]
  48. Kwang-Jae Lee, Won-Hyuck Choi, Jung-Sun Kim
    Adaptive CBT/Anycast Routing Algorithm for Multimedia Traffic Overload. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:451-459 [Conf]
  49. SungKee Noh, YoungHa Hwang, Ki-Il Kim, Sang-Ha Kim
    Achieving Fair New Call CAC for Heterogeneous Services in Wireless Networks. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:460-470 [Conf]
  50. Zhiqiang Ma, Anthony Watson, Wanwu Guo
    Application of MCDF Operations in Digital Terrain Model Processing. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:471-478 [Conf]
  51. Kesaraporn Techapichetvanich, Amitava Datta
    Visual Mining of Market Basket Association Rules. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:479-488 [Conf]
  52. Sung Baik, Jerzy W. Bala, Sung Ahn
    Visualizing Predictive Models in Decision Tree Generation. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:489-495 [Conf]
  53. José Daniel García, Jesús Carretero, José María Pérez, Félix García
    A Model for Use Case Priorization Using Criticality Analysis. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:496-505 [Conf]
  54. Hugo Estrada, Oscar Pastor, Alicia Martínez, Jose Torres-Jimenez
    Using a Goal-Refinement Tree to Obtain and Refine Organizational Requirements. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:506-513 [Conf]
  55. Jan Broeckhove, Kurt Vanmechelen
    Using C++ Functors with Legacy C Libraries. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:514-523 [Conf]
  56. Hoon-Joon Kouh, Ki-Tae Kim, Sun-Moon Jo, Weon-Hee Yoo
    Debugging of Java Programs Using HDT with Program Slicing. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:524-533 [Conf]
  57. Olivia Graciela Fragoso Diaz, René Santaolaya Salgado, Isaac M. Vásquez Mendez, Manuel A. Valdés Marrero
    Frameworks as Web Services. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:534-542 [Conf]
  58. Olena Daly, David Taniar
    Exception Rules Mining Based on Negative Association Rules. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:543-552 [Conf]
  59. Juan Frausto Solís, Marco Antonio Cruz-Chavez
    A Reduced Codification for the Logical Representation of Job Shop Scheduling Problems. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:553-562 [Conf]
  60. Alfredo Milani, Valentina Poggioni
    Action Reasoning with Uncertain Resources. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:563-573 [Conf]
  61. Khin Mi Mi Aung, Jong Sou Park
    Software Rejuvenation Approach to Security Engineering. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:574-583 [Conf]
  62. Myung-Kyu Yi, Chong-Sun Hwang
    A Rollback Recovery Algorithm for Intrusion Tolerant Intrusion Detection System. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:584-593 [Conf]
  63. Byoung-Koo Kim, Ik-Kyun Kim, Ki-Young Kim, Jong-Soo Jang
    Design and Implementation of High-Performance Intrusion Detection System. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:594-602 [Conf]
  64. Eun-Kyung Ryu, Kee-Won Kim, Kee-Young Yoo
    An Authenticated Key Agreement Protocol Resistant to a Dictionary Attack. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:603-610 [Conf]
  65. Soon-Dong Kim, Man-Pyo Hong, Dong-Kyoo Kim
    A Study on Marking Bit Size for Path Identification Method: Deploying the Pi Filter at the End Host. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:611-616 [Conf]
  66. Sung-Woon Lee, Woo-Hun Kim, Hyun-Sung Kim, Kee-Young Yoo
    Efficient Password-Based Authenticated Key Agreement Protocol. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:617-626 [Conf]
  67. Sung-Keun Song, Hee Yong Youn, Chang-Won Park
    A Two-Public Key Scheme Omitting Collision Problem in Digital Signature. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:627-636 [Conf]
  68. Sung Jin Choi, Hee Yong Youn
    A Novel Data Encryption and Distribution Approach for High Security and Availability Using LU Decomposition. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:637-646 [Conf]
  69. Youngjoo Cho, ChangKyun Chi, Ilyong Chung
    An Efficient Conference Key Distribution System Based on Symmetric Balanced Incomplete Block Design. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:647-654 [Conf]
  70. Kee-Young Yoo, Eun-Kyung Ryu, Jae-Yuel Im
    Multiparty Key Agreement Protocol with Cheater Identification Based on Shamir Secret Sharing. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:655-664 [Conf]
  71. Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo
    Security of Shen et al.'s Timestamp-Based Password Authentication Scheme. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:665-671 [Conf]
  72. Kee-Won Kim, Eun-Kyung Ryu, Kee-Young Yoo
    ID-Based Authenticated Multiple-Key Agreement Protocol from Pairings. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:672-680 [Conf]
  73. Jin S. Yang, Young J. Han, Dong-Soo Kim, Beom H. Chang, Tai-Myung Chung, Jung C. Na
    A Fine-Grained Taxonomy of Security Vulnerability in Active Network Environments. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:681-688 [Conf]
  74. Seung-Hyun Seo, Sang-Ho Lee
    A Secure and Flexible Multi-signcryption Scheme. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:689-697 [Conf]
  75. IkSu Park, Seung Bae Park, ByeongKyun Oh
    User Authentication Protocol Based on Human Memorable Password and Using RSA. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:698-707 [Conf]
  76. Heeran Lim, Manpyo Hong
    Effective Packet Marking Approach to Defend against DDoS Attack. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:708-716 [Conf]
  77. Tai-Hoon Kim, Haeng-Kon Kim
    A Relationship between Security Engineering and Security Evaluation. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:717-724 [Conf]
  78. Hae-ki Lee, Jae-sun Shim, Seung Lee, Jong-bu Kim
    A Relationship of Configuration Management Requirements between KISEC and ISO/IEC 15408. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:725-734 [Conf]
  79. Seung-Shik Kang
    Term-Specific Language Modeling Approach to Text Categorization. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:735-742 [Conf]
  80. Won-Sung Sohn, Teuk-Seob Song, Jae-Kyung Kim, Yoon-Chul Choy, Kyong-Ho Lee, Sung-Bong Yang, Francis Neelamkavil
    Context-Based Proofreading of Structured Documents. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:743-753 [Conf]
  81. Jeong-Hoon Shin, Kwang-Seok Hong, Sung-Kyun Eom
    Implementation of New CTI Service Platform Using Voice XML. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:754-762 [Conf]
  82. Min Jin, Byung-Joo Shin
    Storing Together the Structural Information of XML Documents in Relational Databases. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:763-771 [Conf]
  83. Won-Sung Sohn, Myeong-Cheol Ko, Hak-Keun Kim, Soon-Bum Lim, Yoon-Chul Choy
    Annotation Repositioning Methods in the XML Documents: Context-Based Approach. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:772-782 [Conf]
  84. Alicia Martínez, Oscar Pastor, Hugo Estrada
    Isolating and Specifying the Relevant Information of an Organizational Model: A Process Oriented Towards Information System Generation. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:783-790 [Conf]
  85. Ho Joon Kim, Tae-Wan Ryu, Thai T. Nguyen, Joon Shik Lim, Sudhir Gupta
    A Weighted Fuzzy Min-Max Neural Network for Pattern Classification and Feature Extraction. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:791-798 [Conf]
  86. Yongsu Park, Yookun Cho
    The eSAIDA Stream Authentication Scheme. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:799-807 [Conf]
  87. René Santaolaya Salgado, Olivia Graciela Fragoso Diaz, Manuel A. Valdés Marrero, Isaac M. Vásquez Mendez, Sheila L. Delfín Lara
    An Object-Oriented Metric to Measure the Degree of Dependency Due to Unused Interfaces. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:808-817 [Conf]
  88. Eun-Ju Ha, Byeong-Soo Yun
    End-to-End QoS Management for VoIP Using DiffServ. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:818-827 [Conf]
  89. Dae Jong Lee, Keun Chang Kwak, Jun Oh Min, Myung-Geun Chun
    Multi-modal Biometrics System Using Face and Signature. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:828-837 [Conf]
  90. SooCheol Lee, Eenjun Hwang, YangKyoo Lee
    Using 3D Spatial Relationships for Image Retrieval by XML Annotation. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:838-848 [Conf]
  91. Byung-Joo Shin, Min Jin
    Association Inlining for Mapping XML DTDs to Relational Tables. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:849-858 [Conf]
  92. Seungmin Rho, SooCheol Lee, Eenjun Hwang, YangKyoo Lee
    XCRAB: A Content and Annotation-Based Multimedia Indexing and Retrieval System. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:859-868 [Conf]
  93. Jeong Min Shim, Seok Il Song, Young Soo Min, Jae Soo Yoo
    An Efficient Cache Conscious Multi-dimensional Index Structure. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:869-876 [Conf]
  94. Muhammad Bilal Ahmad, Min Hyuk Chang, Seung-Jin Park, Jong-An Park, Tae-Sun Choi
    Tracking of Moving Objects Using Morphological Segmentation, Statistical Moments, and Radon Transform. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:877-886 [Conf]
  95. Fernando Pardo, Jose Antonio Boluda, Esther de Ves
    Feature Extraction and Correlation for Time-to-Impact Segmentation Using Log-Polar Images. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:887-895 [Conf]
  96. Dong Joong Kang, Jong-Eun Ha, In-Mo Ahn
    Object Mark Segmentation Algorithm Using Dynamic Programming for Poor Quality Images in Automated Inspection Process. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:896-905 [Conf]
  97. Tae-Jung Lho, Dong Joong Kang, Jong-Eun Ha
    A Line-Based Pose Estimation Algorithm for 3-D Polyhedral Object Recognition. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:906-914 [Conf]
  98. Jong-Eun Ha, Dong Joong Kang
    Initialization Method for the Self-Calibration Using Minimal Two Images. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:915-923 [Conf]
  99. Hyoun-Joo Go, Keun Chang Kwak, Sung-Suk Kim, Myung-Geun Chun
    Face Recognition for Expressive Face Images. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:924-932 [Conf]
  100. Eugene Demidenko
    Kolmogorov-Smirnov Test for Image Comparison. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:933-939 [Conf]
  101. Sung Kwan Kang, Muhammad Bilal Ahmad, Jong-Hun Chun, Pan-Koo Kim, Jong-An Park
    Modified Radius-Vector Function for Shape Contour Description. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:940-947 [Conf]
  102. Seung-Jin Park, Muhammad Bilal Ahmad, Seung-Hak Rhee, Seung Jo Han, Jong-An Park
    Image Corner Detection Using Radon Transform. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:948-955 [Conf]
  103. Yinghua Lu, Wanwu Guo
    Analytical Comparison of Conventional and MCDF Operations in Image Processing. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:956-963 [Conf]
  104. Jin Ok Kim, Jin-Soo Kim, Young Ro Seo, Bum Ro Lee, Chin Hyun Chung, Key Seo Lee, Wha Young Yim, Sang Hyo Lee
    On Extraction of Facial Features from Color Images. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:964-973 [Conf]
  105. Dohyeon Kim, Beongku An
    An Architecture for Mobility Management in Mobile Computing Networks. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:974-982 [Conf]
  106. Jongwoo Chae, Ghita Kouadri Mostéfaoui, Mokdong Chung
    An Adaptive Security Model for Heterogeneous Networks Using MAUT and Simple Heuristics. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:983-993 [Conf]
  107. Hae-Joung Lee, Kyu-Yeop Song, Won-Ho So, Jing Zhang, Debasish Datta, Biswanath Mukherjee, Young-Chon Kim
    A Hybrid Restoration Scheme Based on Threshold Reaction Time in Optical Burst-Switched Networks. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:994-1004 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002