Conferences in DBLP
Shoichi Morimoto , Daisuke Horie , Jingde Cheng A Security Requirement Management Database Based on ISO/IEC 15408. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:1-10 [Conf ] A. Sermet Anagun Development of Committee Neural Network for Computer Access Security System. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:11-20 [Conf ] Byeongchang Kim , Gary Geunbae Lee C-TOBI-Based Pitch Accent Prediction Using Maximum-Entropy Model. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:21-30 [Conf ] Eung Soo Kim , Min Sung Kim Design and Fabrication of Security and Home Automation System. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:31-37 [Conf ] Byung kwan Lee , Seung Hae Yang , Dong-Hyuck Kwon , Dai-Youn Kim PGNIDS(Pattern-Graph Based Network Intrusion Detection System) Design. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:38-47 [Conf ] ManKi Ahn , Hoon Jae Lee Experiments and Hardware Countermeasures on Power Analysis Attacks. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:48-53 [Conf ] In-Jung Kim , Yoon Jung Chung , YoungGyo Lee , Eul-Gyu Im , Dongho Won Information System Modeling for Analysis of Propagation Effects and Levels of Damage. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:54-63 [Conf ] Youngrag Kim , JaeYoun Jung , Seunghwan Lee , Chonggun Kim A Belt-Zone Method for Decreasing Control Messages in Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:64-72 [Conf ] SeongKwon Cheon , DongXue Jin , Chonggun Kim A VLSM Address Management Method for Variable IP Subnetting. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:73-83 [Conf ] Haeng-Kon Kim , Sang-Yong Byun SDSEM: Software Development Success Evolution Model. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:84-92 [Conf ] Mary Wu , Sangjoon Jung , Seunghwan Lee , Chonggun Kim A Robust Routing Protocol by a Substitute Local Path in Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:93-103 [Conf ] Hae Geun Kim Power Efficient Wireless LAN Using 16-State Trellis-Coded Modulation for Infrared Communications. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:104-114 [Conf ] Kyung-Hoon Jung , Seok-Cheol Lee , Hyun-Suk Hwang , Chang Soo Kim The Design and Implementation of Real-Time Environment Monitoring Systems Based on Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:115-124 [Conf ] Hyun-Suk Hwang , Kyoo-Seok Park , Chang Soo Kim Ontology-Based Information Search in the Real World Using Web Services. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:125-133 [Conf ] Tae Young Byun , Min-Su Kim , Sungho Hwang , Sung-eok Jeon An Active Node Set Maintenance Scheme for Distributed Sensor Networks. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:134-143 [Conf ] Subong Yi , Bobby D. Gerardo , Young-Seok Lee , Jaewan Lee Intelligent Information Search Mechanism Using Filtering and NFC Based on Multi-agents in the Distributed Environment. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:144-153 [Conf ] Misun Kim , Minsoo Kim , Jae-Hyun Seo Network Anomaly Behavior Detection Using an Adaptive Multiplex Detector. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:154-162 [Conf ] Haeng-Kon Kim Applying Product Line to the Embedded Systems. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:163-171 [Conf ] Kwang-Baek Kim , Byung-Kwan Lee , Soon-Ho Kim Enhanced Fuzzy Single Layer Learning Algorithm Using Automatic Tuning of Threshold. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:172-177 [Conf ] Romeo Mark A. Mateo , Jaewan Lee , Hyunho Yang Optimization of Location Management in the Distributed Location-Based Services Using Collaborative Agents. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:178-187 [Conf ] Hyung-Su Jeon , Hye-Min Noh , Cheol-Jung Yoo , Ok-Bae Chang Design of H.264/AVC-Based Software Decoder for Mobile Phone. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:188-197 [Conf ] Haeng-Kon Kim , Youn-Ky Chung Transforming a Legacy System into Components. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:198-205 [Conf ] Injoo Jang , Hyeong Seon Yoo Pseudorandom Number Generator Using Optimal Normal Basis. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:206-212 [Conf ] Wenbo Shi , Hyeong Seon Yoo Efficient Nonce-Based Authentication Scheme Using Token-Update. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:213-221 [Conf ] Seong-Man Choi , Cheol-Jung Yoo , Ok-Bae Chang An Efficient Management of Network Traffic Performance Using Framework-Based Performance Management Tool. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:222-233 [Conf ] Sangjoon Jung , Chonggun Kim , Younky Chung A Prediction Method of Network Traffic Using Time Series Models. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:234-243 [Conf ] Youngchul Bae , Malrey Lee , Thomas M. Gatton An Obstacle Avoidence Method for Chaotic Robots Using Angular Degree Limitions. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:244-250 [Conf ] Chang-Sun Shin , Dong-In Ahn , Hyun Yoe , Su-Chong Joo Intersection Simulation System Based on Traffic Flow Control Framework. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:251-260 [Conf ] Byung kwan Lee , Chang-Min Kim , Dae-won Shin , Seung Hae Yang A HIICA(Highly-Improved Intra CA) Design for M-Commerce. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:261-268 [Conf ] HoonJae Lee Highly Reliable Synchronous Stream Cipher System for Link Encryption. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:269-278 [Conf ] Kwang-Baek Kim , Hwang-Kyu Yang , Sang-Ho Ahn Recognition of Concrete Surface Cracks Using ART2-Based Radial Basis Function Neural Network. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:279-286 [Conf ] Oh-Hyung Kang , Ji-Hyun Lee , Yang-Won Rhee Hybrid Image Mosaic Construction Using the Hierarchical Method. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:287-297 [Conf ] Dalia Khader Public Key Encryption with Keyword Search Based on K-Resilient IBE. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:298-308 [Conf ] Jin Li , Yuen-Yan Chan , Yanming Wang A Generic Construction of Secure Signatures Without Random Oracles. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:309-317 [Conf ] David Galindo A Separation Between Selective and Full-Identity Security Notions for Identity-Based Encryption. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:318-326 [Conf ] He Ge , Stephen R. Tate Traceable Signature: Better Efficiency and Beyond. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:327-337 [Conf ] Marc Joye , Hung-Mei Lin On the TYS Signature Scheme. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:338-344 [Conf ] Qianhong Wu , Willy Susilo , Yi Mu , Fangguo Zhang Efficient Partially Blind Signatures with Provable Security. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:345-354 [Conf ] Jens-Matthias Bohli A Framework for Robust Group Key Agreement. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:355-364 [Conf ] Yuen-Yan Chan , Jin Li BGN Authentication and Its Extension to Convey Message Commitments. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:365-374 [Conf ] Dong-Guk Han , Tsuyoshi Takagi , Howon Kim , Kyoil Chung New Security Problem in RFID Systems "Tag Killing". [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:375-384 [Conf ] Hyungwoo Kang , Kibom Kim , Soon Jwa Hong , Dong Hoon Lee A Model for Security Vulnerability Pattern. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:385-394 [Conf ] Kaouthar Blibech , Alban Gabillon A New Timestamping Scheme Based on Skip Lists. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:395-405 [Conf ] Hsien-Chu Wu , Chuan-Po Yeh , Chwei-Shyong Tsai A Semi-fragile Watermarking Scheme Based on SVD and VQ Techniques. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:406-415 [Conf ] Khoongming Khoo , Swee-Huay Heng New Constructions of Universal Hash Functions Based on Function Sums. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:416-425 [Conf ] Martin Stanek Analysis of Fast Blockcipher-Based Hash Functions. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:426-435 [Conf ] Sourav Mukhopadhyay , Palash Sarkar Application of LFSRs for Parallel Sequence Generation in Cryptologic Algorithms. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:436-445 [Conf ] Changhoon Lee , Jongsung Kim , Jaechul Sung , Seokhie Hong , Sangjin Lee Provable Security for an RC6-like Structure and a MISTY-FO-like Structure Against Differential Cryptanalysis. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:446-455 [Conf ] Ignacio Algredo-Badillo , Claudia Feregrino Uribe , René Cumplido Design and Implementation of an FPGA-Based 1.452-Gbps Non-pipelined AES Architecture. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:456-465 [Conf ] Jiqiang Lu Security Weaknesses in Two Proxy Signature Schemes. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:466-475 [Conf ] Byung Ryong Kim , Ki-Chang Kim A Proposal of Extension of FMS-Based Mechanism to Find Attack Paths. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:476-485 [Conf ] Hyung-Jin Lim , Dong-Young Lee , Tai-Myoung Chung Comparative Analysis of IPv6 VPN Transition in NEMO Environments. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:486-496 [Conf ] Namhi Kang , Younghan Kim A Short-Lived Key Selection Approach to Authenticate Data Origin of Multimedia Stream. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:497-506 [Conf ] Yuen-Yan Chan Weakest Link Attack on Single Sign-On and Its Case in SAML V2.0 Web SSO. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:507-516 [Conf ] Youngsook Lee , Junghyun Nam , Dongho Won An Inter-domain Key Agreement Protocol Using Weak Passwords. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:517-526 [Conf ] Josep Pegueroles , Marcel Fernandez , Francisco Rico-Novella , Miguel Soriano A Practical Solution for Distribution Rights Protection in Multicast Environments. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:527-536 [Conf ] Francesco Palmieri , Ugo Fiore Audit-Based Access Control in Nomadic Wireless Environments. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:537-545 [Conf ] Morteza Bagherpour , Siamak Noori , S. Jafar Sadjadi Cost - Time Trade Off Models Application to Crashing Flow Shop Scheduling Problems. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:546-553 [Conf ] Liliana Capacho , Rafael Pastor The ASALB Problem with Processing Alternatives Involving Different Tasks: Definition, Formalization and Resolution. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:554-563 [Conf ] Kap Hwan Kim , Jong-Sool Lee Satisfying Constraints for Locating Export Containers in Port Container Terminals. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:564-573 [Conf ] Seyed J. Sadjadi , Mohsen Ziaee A Price Discrimination Modeling Using Geometric Programming. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:574-580 [Conf ] Byounghak Yang Hybrid Evolutionary Algorithms for the Rectilinear Steiner Tree Problem Using Fitness Estimation. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:581-589 [Conf ] Seung-Hyun Son , Jae-Yearn Kim Data Reduction for Instance-Based Learning Using Entropy-Based Partitioning. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:590-599 [Conf ] Jeong Hun Lee , Il Kyeong Moon Coordinated Inventory Models with Compensation Policy in a Three Level Supply Chain. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:600-609 [Conf ] Shu-Hsing Chung , Chun-Ying Huang , Amy H. I. Lee Using Constraint Satisfaction Approach to Solve the Capacity Allocation Problem for Photolithography Area. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:610-620 [Conf ] Mario Vanhoucke Scheduling an R&D Project with Quality-Dependent Time Slots. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:621-630 [Conf ] Yen Hung Chen , Chuan Yi Tang The Bottleneck Tree Alignment Problems. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:631-637 [Conf ] Gerrit Färber , Anna M. Coves Moreno Performance Study of a Genetic Algorithm for Sequencing in Mixed Model Non-permutation Flowshops Using Constrained Buffers. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:638-648 [Conf ] Chung-Hsing Yeh , Yu-Hern Chang Optimizing Relative Weights of Alternatives with Fuzzy Comparative Judgment. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:649-658 [Conf ] Guoli Liu , Lixin Tang Model and Solution for the Multilevel Production-Inventory System Before Ironmaking in Shanghai Baoshan Iron and Steel Complex. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:659-667 [Conf ] Kung-Jeng Wang , Wen-Hai Chih , Ken Hwang A Coordination Algorithm for Deciding Order-Up-To Level of a Serial Supply Chain in an Uncertain Environment. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:668-677 [Conf ] A. S. Anagun , T. Sarac Optimization of Performance of Genetic Algorithm for 0-1 Knapsack Problems Using Taguchi Method. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:678-687 [Conf ] Andrew Lim , Hong Ma , Zhaowei Miao Truck Dock Assignment Problem with Time Windows and Capacity Constraint in Transshipment Network Through Crossdocks. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:688-697 [Conf ] In-Jae Jeong An Entropy Based Group Setup Strategy for PCB Assembly. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:698-707 [Conf ] Sandra Duni Eksioglu , Mingzhou Jin Cross-Facility Production and Transportation Planning Problem with Perishable Inventory. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:708-717 [Conf ] Ho Woo Lee , Se Won Lee , Won Ju Seo , Sahng Hoon Cheon , Jongwoo Jeon A Unified Framework for the Analysis of M/G/1 Queue Controlled by Workload. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:718-727 [Conf ] Sang-Il Kim , Hyun-Seon Choi , Dong-Ho Lee Tabu Search Heuristics for Parallel Machine Scheduling with Sequence-Dependent Setup and Ready Times. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:728-737 [Conf ] Cédric Bentz The Maximum Integer Multiterminal Flow Problem. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:738-747 [Conf ] Mingzhou Jin , Kai Liu , Burak Eksioglu Routing with Early Ordering for Just-In-Time Manufacturing Systems. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:748-756 [Conf ] Eugenio Mijangos A Variant of the Constant Step Rule for Approximate Subgradient Methods over Nonlinear Networks. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:757-766 [Conf ] Soo-Tae Kwon On the Optimal Buffer Allocation of an FMS with Finite In-Process Buffers. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:767-776 [Conf ] Wanmo Kang , Kyungsik Lee Optimization Problems in the Simulation of Multifactor Portfolio Credit Risk. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:777-784 [Conf ] Byung-Cheon Choi , Sung-Pil Hong Two-Server Network Disconnection Problem. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:785-792 [Conf ] Vladimir G. Deineko , Alexandre Tiskin One-Sided Monge TSP Is NP-Hard. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:793-801 [Conf ] Wlodzimierz Ogryczak , Tomasz Sliwinski On Direct Methods for Lexicographic Min-Max Optimization. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:802-811 [Conf ] Alex Y. D. Siem , Dick den Hertog , Aswin L. Hoffmann Multivariate Convex Approximation and Least-Norm Convex Data-Smoothing. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:812-821 [Conf ] Guillermo Gallego , Woonghee Tim Huh , Wanmo Kang , Robert Phillips Linear Convergence of Tatônnement in a Bertrand Oligopoly. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:822-831 [Conf ] Hak-Soo Mok , Chang-Hyo Han , Chan-Hyoung Lim , John-Hee Hong , Jong-Rae Cho Design for Using Purpose of Assembly-Group. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:832-840 [Conf ] Manuel L. Esquível A Conditional Gaussian Martingale Algorithm for Global Optimization. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:841-851 [Conf ] Hyunsoo Kim , Hee Yong Youn Finding the Number of Clusters Minimizing Energy Consumption of Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:852-861 [Conf ] Hui-Ming Wee , Chun-Jen Chung A Two-Echelon Deteriorating Production-Inventory Newsboy Model with Imperfect Production Process. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:862-874 [Conf ] Jin Ho Lee , Young Hoon Lee , Yun Ho Lee Mathematical Modeling and Tabu Search Heuristic for the Traveling Tournament Problem. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:875-884 [Conf ] Hui-Ming Wee , Jonas C. P. Yu , Kung-Jeng Wang An Integrated Production-Inventory Model for Deteriorating Items with Imperfect Quality and Shortage Backordering Considerations. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:885-897 [Conf ] Jong-Sub Lee , Maing-Kyu Kang A Clustering Algorithm Using the Ordered Weight Sum of Self-Organizing Feature Maps. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:898-907 [Conf ] Panos Parpas , Berç Rustem Global Optimization of the Scenario Generation and Portfolio Selection Problems. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:908-917 [Conf ] E. Ertugrul Karsak A Generalized Fuzzy Optimization Framework for R&D Project Selection Using Real Options Valuation. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:918-927 [Conf ] Seungwoo Kwon , Kyungdo Park , Chulung Lee , Sung-Shick Kim , Hak-Jin Kim , Zhong Liang Supply Chain Network Design and Transshipment Hub Location for Third Party Logistics Providers. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:928-933 [Conf ] S. He , Q. H. Wu , J. R. Saunders A Group Search Optimizer for Neural Network Training. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:934-943 [Conf ] Kuo-Hwa Chang , Huifen Chen , Ching-Fen Lin Application of Two-Stage Stochastic Linear Program for Portfolio Selection Problem. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:944-953 [Conf ] Sulyun Sung , Yuhwa Seo , Yongtae Shin Hierarchical Clustering Algorithm Based on Mobility in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:954-963 [Conf ] Miguel Gutiérrez , Alfonso Durán , Pedro Cocho An Alternative Approach to the Standard Enterprise Resource Planning Life Cycle: Enterprise Reference Metamodeling. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:964-973 [Conf ] Jiang Guo , Yuehong Liao , Raj Pamula Static Analysis Based Software Architecture Recovery. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:974-983 [Conf ] Angelica Caro , Coral Calero , Ismael Caballero , Mario Piattini A First Approach to a Data Quality Model for Web Portals. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:984-993 [Conf ] Hak-Soo Mok , Jong-Rae Cho , Kwang-Sup Moon Design for Environment-Friendly Product. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:994-1003 [Conf ] Thomas J. Wollinger , Guido Bertoni , Luca Breveglieri , Christof Paar Performance of HECC Coprocessors Using Inversion-Free Formulae. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:1004-1012 [Conf ] Carlos Villarrubia , Eduardo Fernández-Medina , Mario Piattini Metrics of Password Management Policy. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:1013-1023 [Conf ] Rodolfo Villarroel , Emilio Soler , Eduardo Fernández-Medina , Juan Trujillo , Mario Piattini Using UML Packages for Designing Secure Data Warehouses. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:1024-1034 [Conf ] Pino Caballero-Gil , Amparo Fúster-Sabater Practical Attack on the Shrinking Generator. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:1035-1043 [Conf ] Daniel Mellado , Eduardo Fernández-Medina , Mario Piattini A Comparative Study of Proposals for Establishing Security Requirements for the Development of Secure Information Systems. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:1044-1053 [Conf ] Kisoeb Park , Moonseong Kim , Seki Kim Stochastic Simulation Method for the Term Structure Models with Jump. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:1054-1063 [Conf ] Yu Xia The Ellipsoidal l p Norm Obnoxious Facility Location Problem. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:1064-1072 [Conf ] J. Samuel Baixauli , Susana Alvarez On the Performance of Recovery Rate Modeling. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:1073-1080 [Conf ] Michael Lazzareschi , Tzu-Yi Chen Using Performance Profiles to Evaluate Preconditioners for Iterative Methods. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:1081-1089 [Conf ] Moonseong Kim , Young-Cheol Bang , Hyunseung Choo Multicast omega -Trees Based on Statistical Analysis. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:1090-1099 [Conf ] Przemyslaw Ryba , Andrzej Kasprzak The Gateways Location and Topology Assignment Problem in Hierarchical Wide Area Networks: Algorithms and Computational Results. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:1100-1109 [Conf ] Gye Hang Hong , Sung Ho Ha Developing an Intelligent Supplier Chain System Collaborating with Customer Relationship Management. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:1110-1118 [Conf ] Marcin Markowski , Andrzej Kasprzak The Three-Criteria Servers Replication and Topology Assignment Problem in Wide Area Networks. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:1119-1128 [Conf ] Moonseong Kim , Young-Cheol Bang , Jong S. Yang , Hyunseung Choo An Efficient Multicast Tree with Delay and Delay Variation Constraints. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:1129-1136 [Conf ] Inbok Lee , Raphaël Clifford , Sung-Ryul Kim Algorithms on Extended (delta , gamma )-Matching. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:1137-1142 [Conf ] Ana Isabel González , Alicia D'Anjou , M. Teresa García-Sebastian , Manuel Graña SOM and Neural Gas as Graduated Nonconvexity Algorithms. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:1143-1152 [Conf ] James R. Gattiker , Earl Lawrence , David Higdon Analysis of Multi-domain Complex Simulation Studies. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:1153-1162 [Conf ] Dong Joong Kang , Jong-Eun Ha , Tae-Jung Lho A Fast Method for Detecting Moving Vehicles Using Plane Constraint of Geometric Invariance. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:1163-1171 [Conf ] Jaechoon Chon , Hyongsuk Kim Robust Fault Matched Optical Flow Detection Using 2D Histogram. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:1172-1179 [Conf ] Mohammadreza Noruzi , Mansour Vafadoost , M. Shahram Moin Iris Recognition: Localization, Segmentation and Feature Extraction Based on Gabor Transform. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:1180-1189 [Conf ] Eun Mi Kim , Cherl Soo Pahk , Jong Gu Lee Optimal Edge Detection Using Perfect Sharpening of Ramp Edges. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:1190-1199 [Conf ] Eun Yi Kim , Sin Kuk Kang Eye Tracking Using Neural Network and Mean-Shift. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:1200-1209 [Conf ] Marek Kurzynski , Edward Puchala The Optimal Feature Extraction Procedure for Statistical Pattern Recognition. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:1210-1215 [Conf ] Murat Ekinci A New Approach for Human Identification Using Gait Recognition. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:1216-1225 [Conf ]