The SCEAS System
Navigation Menu

Conferences in DBLP

Computational Science and Its Applications (iccsa)
2006 (conf/iccsa/2006-3)

  1. Shoichi Morimoto, Daisuke Horie, Jingde Cheng
    A Security Requirement Management Database Based on ISO/IEC 15408. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:1-10 [Conf]
  2. A. Sermet Anagun
    Development of Committee Neural Network for Computer Access Security System. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:11-20 [Conf]
  3. Byeongchang Kim, Gary Geunbae Lee
    C-TOBI-Based Pitch Accent Prediction Using Maximum-Entropy Model. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:21-30 [Conf]
  4. Eung Soo Kim, Min Sung Kim
    Design and Fabrication of Security and Home Automation System. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:31-37 [Conf]
  5. Byung kwan Lee, Seung Hae Yang, Dong-Hyuck Kwon, Dai-Youn Kim
    PGNIDS(Pattern-Graph Based Network Intrusion Detection System) Design. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:38-47 [Conf]
  6. ManKi Ahn, Hoon Jae Lee
    Experiments and Hardware Countermeasures on Power Analysis Attacks. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:48-53 [Conf]
  7. In-Jung Kim, Yoon Jung Chung, YoungGyo Lee, Eul-Gyu Im, Dongho Won
    Information System Modeling for Analysis of Propagation Effects and Levels of Damage. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:54-63 [Conf]
  8. Youngrag Kim, JaeYoun Jung, Seunghwan Lee, Chonggun Kim
    A Belt-Zone Method for Decreasing Control Messages in Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:64-72 [Conf]
  9. SeongKwon Cheon, DongXue Jin, Chonggun Kim
    A VLSM Address Management Method for Variable IP Subnetting. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:73-83 [Conf]
  10. Haeng-Kon Kim, Sang-Yong Byun
    SDSEM: Software Development Success Evolution Model. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:84-92 [Conf]
  11. Mary Wu, Sangjoon Jung, Seunghwan Lee, Chonggun Kim
    A Robust Routing Protocol by a Substitute Local Path in Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:93-103 [Conf]
  12. Hae Geun Kim
    Power Efficient Wireless LAN Using 16-State Trellis-Coded Modulation for Infrared Communications. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:104-114 [Conf]
  13. Kyung-Hoon Jung, Seok-Cheol Lee, Hyun-Suk Hwang, Chang Soo Kim
    The Design and Implementation of Real-Time Environment Monitoring Systems Based on Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:115-124 [Conf]
  14. Hyun-Suk Hwang, Kyoo-Seok Park, Chang Soo Kim
    Ontology-Based Information Search in the Real World Using Web Services. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:125-133 [Conf]
  15. Tae Young Byun, Min-Su Kim, Sungho Hwang, Sung-eok Jeon
    An Active Node Set Maintenance Scheme for Distributed Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:134-143 [Conf]
  16. Subong Yi, Bobby D. Gerardo, Young-Seok Lee, Jaewan Lee
    Intelligent Information Search Mechanism Using Filtering and NFC Based on Multi-agents in the Distributed Environment. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:144-153 [Conf]
  17. Misun Kim, Minsoo Kim, Jae-Hyun Seo
    Network Anomaly Behavior Detection Using an Adaptive Multiplex Detector. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:154-162 [Conf]
  18. Haeng-Kon Kim
    Applying Product Line to the Embedded Systems. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:163-171 [Conf]
  19. Kwang-Baek Kim, Byung-Kwan Lee, Soon-Ho Kim
    Enhanced Fuzzy Single Layer Learning Algorithm Using Automatic Tuning of Threshold. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:172-177 [Conf]
  20. Romeo Mark A. Mateo, Jaewan Lee, Hyunho Yang
    Optimization of Location Management in the Distributed Location-Based Services Using Collaborative Agents. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:178-187 [Conf]
  21. Hyung-Su Jeon, Hye-Min Noh, Cheol-Jung Yoo, Ok-Bae Chang
    Design of H.264/AVC-Based Software Decoder for Mobile Phone. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:188-197 [Conf]
  22. Haeng-Kon Kim, Youn-Ky Chung
    Transforming a Legacy System into Components. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:198-205 [Conf]
  23. Injoo Jang, Hyeong Seon Yoo
    Pseudorandom Number Generator Using Optimal Normal Basis. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:206-212 [Conf]
  24. Wenbo Shi, Hyeong Seon Yoo
    Efficient Nonce-Based Authentication Scheme Using Token-Update. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:213-221 [Conf]
  25. Seong-Man Choi, Cheol-Jung Yoo, Ok-Bae Chang
    An Efficient Management of Network Traffic Performance Using Framework-Based Performance Management Tool. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:222-233 [Conf]
  26. Sangjoon Jung, Chonggun Kim, Younky Chung
    A Prediction Method of Network Traffic Using Time Series Models. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:234-243 [Conf]
  27. Youngchul Bae, Malrey Lee, Thomas M. Gatton
    An Obstacle Avoidence Method for Chaotic Robots Using Angular Degree Limitions. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:244-250 [Conf]
  28. Chang-Sun Shin, Dong-In Ahn, Hyun Yoe, Su-Chong Joo
    Intersection Simulation System Based on Traffic Flow Control Framework. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:251-260 [Conf]
  29. Byung kwan Lee, Chang-Min Kim, Dae-won Shin, Seung Hae Yang
    A HIICA(Highly-Improved Intra CA) Design for M-Commerce. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:261-268 [Conf]
  30. HoonJae Lee
    Highly Reliable Synchronous Stream Cipher System for Link Encryption. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:269-278 [Conf]
  31. Kwang-Baek Kim, Hwang-Kyu Yang, Sang-Ho Ahn
    Recognition of Concrete Surface Cracks Using ART2-Based Radial Basis Function Neural Network. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:279-286 [Conf]
  32. Oh-Hyung Kang, Ji-Hyun Lee, Yang-Won Rhee
    Hybrid Image Mosaic Construction Using the Hierarchical Method. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:287-297 [Conf]
  33. Dalia Khader
    Public Key Encryption with Keyword Search Based on K-Resilient IBE. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:298-308 [Conf]
  34. Jin Li, Yuen-Yan Chan, Yanming Wang
    A Generic Construction of Secure Signatures Without Random Oracles. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:309-317 [Conf]
  35. David Galindo
    A Separation Between Selective and Full-Identity Security Notions for Identity-Based Encryption. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:318-326 [Conf]
  36. He Ge, Stephen R. Tate
    Traceable Signature: Better Efficiency and Beyond. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:327-337 [Conf]
  37. Marc Joye, Hung-Mei Lin
    On the TYS Signature Scheme. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:338-344 [Conf]
  38. Qianhong Wu, Willy Susilo, Yi Mu, Fangguo Zhang
    Efficient Partially Blind Signatures with Provable Security. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:345-354 [Conf]
  39. Jens-Matthias Bohli
    A Framework for Robust Group Key Agreement. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:355-364 [Conf]
  40. Yuen-Yan Chan, Jin Li
    BGN Authentication and Its Extension to Convey Message Commitments. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:365-374 [Conf]
  41. Dong-Guk Han, Tsuyoshi Takagi, Howon Kim, Kyoil Chung
    New Security Problem in RFID Systems "Tag Killing". [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:375-384 [Conf]
  42. Hyungwoo Kang, Kibom Kim, Soon Jwa Hong, Dong Hoon Lee
    A Model for Security Vulnerability Pattern. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:385-394 [Conf]
  43. Kaouthar Blibech, Alban Gabillon
    A New Timestamping Scheme Based on Skip Lists. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:395-405 [Conf]
  44. Hsien-Chu Wu, Chuan-Po Yeh, Chwei-Shyong Tsai
    A Semi-fragile Watermarking Scheme Based on SVD and VQ Techniques. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:406-415 [Conf]
  45. Khoongming Khoo, Swee-Huay Heng
    New Constructions of Universal Hash Functions Based on Function Sums. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:416-425 [Conf]
  46. Martin Stanek
    Analysis of Fast Blockcipher-Based Hash Functions. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:426-435 [Conf]
  47. Sourav Mukhopadhyay, Palash Sarkar
    Application of LFSRs for Parallel Sequence Generation in Cryptologic Algorithms. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:436-445 [Conf]
  48. Changhoon Lee, Jongsung Kim, Jaechul Sung, Seokhie Hong, Sangjin Lee
    Provable Security for an RC6-like Structure and a MISTY-FO-like Structure Against Differential Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:446-455 [Conf]
  49. Ignacio Algredo-Badillo, Claudia Feregrino Uribe, René Cumplido
    Design and Implementation of an FPGA-Based 1.452-Gbps Non-pipelined AES Architecture. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:456-465 [Conf]
  50. Jiqiang Lu
    Security Weaknesses in Two Proxy Signature Schemes. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:466-475 [Conf]
  51. Byung Ryong Kim, Ki-Chang Kim
    A Proposal of Extension of FMS-Based Mechanism to Find Attack Paths. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:476-485 [Conf]
  52. Hyung-Jin Lim, Dong-Young Lee, Tai-Myoung Chung
    Comparative Analysis of IPv6 VPN Transition in NEMO Environments. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:486-496 [Conf]
  53. Namhi Kang, Younghan Kim
    A Short-Lived Key Selection Approach to Authenticate Data Origin of Multimedia Stream. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:497-506 [Conf]
  54. Yuen-Yan Chan
    Weakest Link Attack on Single Sign-On and Its Case in SAML V2.0 Web SSO. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:507-516 [Conf]
  55. Youngsook Lee, Junghyun Nam, Dongho Won
    An Inter-domain Key Agreement Protocol Using Weak Passwords. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:517-526 [Conf]
  56. Josep Pegueroles, Marcel Fernandez, Francisco Rico-Novella, Miguel Soriano
    A Practical Solution for Distribution Rights Protection in Multicast Environments. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:527-536 [Conf]
  57. Francesco Palmieri, Ugo Fiore
    Audit-Based Access Control in Nomadic Wireless Environments. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:537-545 [Conf]
  58. Morteza Bagherpour, Siamak Noori, S. Jafar Sadjadi
    Cost - Time Trade Off Models Application to Crashing Flow Shop Scheduling Problems. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:546-553 [Conf]
  59. Liliana Capacho, Rafael Pastor
    The ASALB Problem with Processing Alternatives Involving Different Tasks: Definition, Formalization and Resolution. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:554-563 [Conf]
  60. Kap Hwan Kim, Jong-Sool Lee
    Satisfying Constraints for Locating Export Containers in Port Container Terminals. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:564-573 [Conf]
  61. Seyed J. Sadjadi, Mohsen Ziaee
    A Price Discrimination Modeling Using Geometric Programming. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:574-580 [Conf]
  62. Byounghak Yang
    Hybrid Evolutionary Algorithms for the Rectilinear Steiner Tree Problem Using Fitness Estimation. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:581-589 [Conf]
  63. Seung-Hyun Son, Jae-Yearn Kim
    Data Reduction for Instance-Based Learning Using Entropy-Based Partitioning. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:590-599 [Conf]
  64. Jeong Hun Lee, Il Kyeong Moon
    Coordinated Inventory Models with Compensation Policy in a Three Level Supply Chain. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:600-609 [Conf]
  65. Shu-Hsing Chung, Chun-Ying Huang, Amy H. I. Lee
    Using Constraint Satisfaction Approach to Solve the Capacity Allocation Problem for Photolithography Area. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:610-620 [Conf]
  66. Mario Vanhoucke
    Scheduling an R&D Project with Quality-Dependent Time Slots. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:621-630 [Conf]
  67. Yen Hung Chen, Chuan Yi Tang
    The Bottleneck Tree Alignment Problems. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:631-637 [Conf]
  68. Gerrit Färber, Anna M. Coves Moreno
    Performance Study of a Genetic Algorithm for Sequencing in Mixed Model Non-permutation Flowshops Using Constrained Buffers. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:638-648 [Conf]
  69. Chung-Hsing Yeh, Yu-Hern Chang
    Optimizing Relative Weights of Alternatives with Fuzzy Comparative Judgment. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:649-658 [Conf]
  70. Guoli Liu, Lixin Tang
    Model and Solution for the Multilevel Production-Inventory System Before Ironmaking in Shanghai Baoshan Iron and Steel Complex. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:659-667 [Conf]
  71. Kung-Jeng Wang, Wen-Hai Chih, Ken Hwang
    A Coordination Algorithm for Deciding Order-Up-To Level of a Serial Supply Chain in an Uncertain Environment. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:668-677 [Conf]
  72. A. S. Anagun, T. Sarac
    Optimization of Performance of Genetic Algorithm for 0-1 Knapsack Problems Using Taguchi Method. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:678-687 [Conf]
  73. Andrew Lim, Hong Ma, Zhaowei Miao
    Truck Dock Assignment Problem with Time Windows and Capacity Constraint in Transshipment Network Through Crossdocks. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:688-697 [Conf]
  74. In-Jae Jeong
    An Entropy Based Group Setup Strategy for PCB Assembly. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:698-707 [Conf]
  75. Sandra Duni Eksioglu, Mingzhou Jin
    Cross-Facility Production and Transportation Planning Problem with Perishable Inventory. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:708-717 [Conf]
  76. Ho Woo Lee, Se Won Lee, Won Ju Seo, Sahng Hoon Cheon, Jongwoo Jeon
    A Unified Framework for the Analysis of M/G/1 Queue Controlled by Workload. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:718-727 [Conf]
  77. Sang-Il Kim, Hyun-Seon Choi, Dong-Ho Lee
    Tabu Search Heuristics for Parallel Machine Scheduling with Sequence-Dependent Setup and Ready Times. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:728-737 [Conf]
  78. Cédric Bentz
    The Maximum Integer Multiterminal Flow Problem. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:738-747 [Conf]
  79. Mingzhou Jin, Kai Liu, Burak Eksioglu
    Routing with Early Ordering for Just-In-Time Manufacturing Systems. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:748-756 [Conf]
  80. Eugenio Mijangos
    A Variant of the Constant Step Rule for Approximate Subgradient Methods over Nonlinear Networks. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:757-766 [Conf]
  81. Soo-Tae Kwon
    On the Optimal Buffer Allocation of an FMS with Finite In-Process Buffers. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:767-776 [Conf]
  82. Wanmo Kang, Kyungsik Lee
    Optimization Problems in the Simulation of Multifactor Portfolio Credit Risk. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:777-784 [Conf]
  83. Byung-Cheon Choi, Sung-Pil Hong
    Two-Server Network Disconnection Problem. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:785-792 [Conf]
  84. Vladimir G. Deineko, Alexandre Tiskin
    One-Sided Monge TSP Is NP-Hard. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:793-801 [Conf]
  85. Wlodzimierz Ogryczak, Tomasz Sliwinski
    On Direct Methods for Lexicographic Min-Max Optimization. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:802-811 [Conf]
  86. Alex Y. D. Siem, Dick den Hertog, Aswin L. Hoffmann
    Multivariate Convex Approximation and Least-Norm Convex Data-Smoothing. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:812-821 [Conf]
  87. Guillermo Gallego, Woonghee Tim Huh, Wanmo Kang, Robert Phillips
    Linear Convergence of Tatônnement in a Bertrand Oligopoly. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:822-831 [Conf]
  88. Hak-Soo Mok, Chang-Hyo Han, Chan-Hyoung Lim, John-Hee Hong, Jong-Rae Cho
    Design for Using Purpose of Assembly-Group. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:832-840 [Conf]
  89. Manuel L. Esquível
    A Conditional Gaussian Martingale Algorithm for Global Optimization. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:841-851 [Conf]
  90. Hyunsoo Kim, Hee Yong Youn
    Finding the Number of Clusters Minimizing Energy Consumption of Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:852-861 [Conf]
  91. Hui-Ming Wee, Chun-Jen Chung
    A Two-Echelon Deteriorating Production-Inventory Newsboy Model with Imperfect Production Process. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:862-874 [Conf]
  92. Jin Ho Lee, Young Hoon Lee, Yun Ho Lee
    Mathematical Modeling and Tabu Search Heuristic for the Traveling Tournament Problem. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:875-884 [Conf]
  93. Hui-Ming Wee, Jonas C. P. Yu, Kung-Jeng Wang
    An Integrated Production-Inventory Model for Deteriorating Items with Imperfect Quality and Shortage Backordering Considerations. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:885-897 [Conf]
  94. Jong-Sub Lee, Maing-Kyu Kang
    A Clustering Algorithm Using the Ordered Weight Sum of Self-Organizing Feature Maps. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:898-907 [Conf]
  95. Panos Parpas, Berç Rustem
    Global Optimization of the Scenario Generation and Portfolio Selection Problems. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:908-917 [Conf]
  96. E. Ertugrul Karsak
    A Generalized Fuzzy Optimization Framework for R&D Project Selection Using Real Options Valuation. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:918-927 [Conf]
  97. Seungwoo Kwon, Kyungdo Park, Chulung Lee, Sung-Shick Kim, Hak-Jin Kim, Zhong Liang
    Supply Chain Network Design and Transshipment Hub Location for Third Party Logistics Providers. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:928-933 [Conf]
  98. S. He, Q. H. Wu, J. R. Saunders
    A Group Search Optimizer for Neural Network Training. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:934-943 [Conf]
  99. Kuo-Hwa Chang, Huifen Chen, Ching-Fen Lin
    Application of Two-Stage Stochastic Linear Program for Portfolio Selection Problem. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:944-953 [Conf]
  100. Sulyun Sung, Yuhwa Seo, Yongtae Shin
    Hierarchical Clustering Algorithm Based on Mobility in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:954-963 [Conf]
  101. Miguel Gutiérrez, Alfonso Durán, Pedro Cocho
    An Alternative Approach to the Standard Enterprise Resource Planning Life Cycle: Enterprise Reference Metamodeling. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:964-973 [Conf]
  102. Jiang Guo, Yuehong Liao, Raj Pamula
    Static Analysis Based Software Architecture Recovery. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:974-983 [Conf]
  103. Angelica Caro, Coral Calero, Ismael Caballero, Mario Piattini
    A First Approach to a Data Quality Model for Web Portals. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:984-993 [Conf]
  104. Hak-Soo Mok, Jong-Rae Cho, Kwang-Sup Moon
    Design for Environment-Friendly Product. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:994-1003 [Conf]
  105. Thomas J. Wollinger, Guido Bertoni, Luca Breveglieri, Christof Paar
    Performance of HECC Coprocessors Using Inversion-Free Formulae. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:1004-1012 [Conf]
  106. Carlos Villarrubia, Eduardo Fernández-Medina, Mario Piattini
    Metrics of Password Management Policy. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:1013-1023 [Conf]
  107. Rodolfo Villarroel, Emilio Soler, Eduardo Fernández-Medina, Juan Trujillo, Mario Piattini
    Using UML Packages for Designing Secure Data Warehouses. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:1024-1034 [Conf]
  108. Pino Caballero-Gil, Amparo Fúster-Sabater
    Practical Attack on the Shrinking Generator. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:1035-1043 [Conf]
  109. Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini
    A Comparative Study of Proposals for Establishing Security Requirements for the Development of Secure Information Systems. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:1044-1053 [Conf]
  110. Kisoeb Park, Moonseong Kim, Seki Kim
    Stochastic Simulation Method for the Term Structure Models with Jump. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:1054-1063 [Conf]
  111. Yu Xia
    The Ellipsoidal lp Norm Obnoxious Facility Location Problem. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:1064-1072 [Conf]
  112. J. Samuel Baixauli, Susana Alvarez
    On the Performance of Recovery Rate Modeling. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:1073-1080 [Conf]
  113. Michael Lazzareschi, Tzu-Yi Chen
    Using Performance Profiles to Evaluate Preconditioners for Iterative Methods. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:1081-1089 [Conf]
  114. Moonseong Kim, Young-Cheol Bang, Hyunseung Choo
    Multicast omega-Trees Based on Statistical Analysis. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:1090-1099 [Conf]
  115. Przemyslaw Ryba, Andrzej Kasprzak
    The Gateways Location and Topology Assignment Problem in Hierarchical Wide Area Networks: Algorithms and Computational Results. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:1100-1109 [Conf]
  116. Gye Hang Hong, Sung Ho Ha
    Developing an Intelligent Supplier Chain System Collaborating with Customer Relationship Management. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:1110-1118 [Conf]
  117. Marcin Markowski, Andrzej Kasprzak
    The Three-Criteria Servers Replication and Topology Assignment Problem in Wide Area Networks. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:1119-1128 [Conf]
  118. Moonseong Kim, Young-Cheol Bang, Jong S. Yang, Hyunseung Choo
    An Efficient Multicast Tree with Delay and Delay Variation Constraints. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:1129-1136 [Conf]
  119. Inbok Lee, Raphaël Clifford, Sung-Ryul Kim
    Algorithms on Extended (delta, gamma)-Matching. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:1137-1142 [Conf]
  120. Ana Isabel González, Alicia D'Anjou, M. Teresa García-Sebastian, Manuel Graña
    SOM and Neural Gas as Graduated Nonconvexity Algorithms. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:1143-1152 [Conf]
  121. James R. Gattiker, Earl Lawrence, David Higdon
    Analysis of Multi-domain Complex Simulation Studies. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:1153-1162 [Conf]
  122. Dong Joong Kang, Jong-Eun Ha, Tae-Jung Lho
    A Fast Method for Detecting Moving Vehicles Using Plane Constraint of Geometric Invariance. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:1163-1171 [Conf]
  123. Jaechoon Chon, Hyongsuk Kim
    Robust Fault Matched Optical Flow Detection Using 2D Histogram. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:1172-1179 [Conf]
  124. Mohammadreza Noruzi, Mansour Vafadoost, M. Shahram Moin
    Iris Recognition: Localization, Segmentation and Feature Extraction Based on Gabor Transform. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:1180-1189 [Conf]
  125. Eun Mi Kim, Cherl Soo Pahk, Jong Gu Lee
    Optimal Edge Detection Using Perfect Sharpening of Ramp Edges. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:1190-1199 [Conf]
  126. Eun Yi Kim, Sin Kuk Kang
    Eye Tracking Using Neural Network and Mean-Shift. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:1200-1209 [Conf]
  127. Marek Kurzynski, Edward Puchala
    The Optimal Feature Extraction Procedure for Statistical Pattern Recognition. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:1210-1215 [Conf]
  128. Murat Ekinci
    A New Approach for Human Identification Using Gait Recognition. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:1216-1225 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002