The SCEAS System
Navigation Menu

Conferences in DBLP

International Conference on Information Technology: New Generations (itng)
2007 (conf/itng/2007)

  1. Giovanni Agosta, Luca Breveglieri, Gerardo Pelosi, Martino Sykora
    Programming Highly Parallel Reconfigurable Architectures for Public-Key Cryptographic Applications. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:3-10 [Conf]
  2. Robert Ronan, Colm O'Eigeartaigh, Colin C. Murphy, Tim Kerins, Paulo S. L. M. Barreto
    A Reconfigurable Processor for the Cryptographic nT Pairing in Characteristic 3. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:11-16 [Conf]
  3. Nadia Nedjah, Luiza de Macedo Mourelle, Rodrigo Martins da Silva
    Efficient Hardware for Modular Exponentiation Using the Sliding-Window Method. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:17-24 [Conf]
  4. Wei Shen, Qing-An Zeng
    Two Novel Resource Management Schemes for Integrated Wireless Networks. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:25-30 [Conf]
  5. Muhammad Adeel, Ahmad Ali Iqbal
    TCP Congestion Window Optimization for CDMA2000 Packet Data Networks. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:31-35 [Conf]
  6. Y. B. Reddy, N. Gajendar, Portia Taylor, Damian Madden
    Computationally Efficient Resource Allocation in OFDM Systems: Genetic Algorithm Approach. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:36-41 [Conf]
  7. Abbas Nayebi, M. R. Rahimi, Hamid Sarbazi-Azad
    Analysis of Time-Based Random Waypoint Mobility Model for Wireless Mobile Networks. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:42-47 [Conf]
  8. Mika Watanabe, Hiroaki Higaki
    No-Beacon GEDIR: Location-Based Ad-Hoc Routing with Less Communication Overhead. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:48-55 [Conf]
  9. Ognjen Dobrijevic, Miran Mosmondor, Maja Matijasevic
    Design of a QoS Signaling API for Advanced Multimedia Applications in NGN. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:56-64 [Conf]
  10. Bing Wu, Xiaochun Yun, Xiang Cui
    Study on Worm Poisoning Technology. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:65-70 [Conf]
  11. Hussein Abdel-jaber, Mike Woodward, Fadi A. Thabtah, Mahmud Etbega
    A Discrete-time Queue Analytical Model based on Dynamic Random Early Drop. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:71-76 [Conf]
  12. Mehdi Salour, Xiao Su
    Dynamic Two-Layer Signature-Based IDS with Unequal Databases. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:77-82 [Conf]
  13. Osama Dandash, Yiling Wang, Phu Dung Le, Bala Srinivasan
    A new Dynamic Key Generation Scheme for Fraudulent Internet Payment Prevention. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:83-88 [Conf]
  14. Hai Vu, Neeraj Mittal, Subbarayan Venkatesan
    THIS: THreshold security for Information aggregation in Sensor networks. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:89-95 [Conf]
  15. H. R. Nagesh, K. Chandra Sekaran, Adarsh Rao Kordcal
    Proactive model for Mitigating Internet Denial-of-Service Attacks. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:96-101 [Conf]
  16. Wei Ren, Yoohwan Kim, Ju-Yeon Jo, Mei Yang, Yingtao Jiang
    IdSRF: ID-based Secure Routing Framework for Wireless Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:102-110 [Conf]
  17. Anura P. Jayasumana, Qi Han, Tissa H. Illangasekare
    Virtual Sensor Networks - A Resource Efficient Approach for Concurrent Applications. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:111-115 [Conf]
  18. Ashwini Raina, Venkatesan Muthukumar, Laxmi Gewali
    Cell-based Distributed Addressing Technique Using Clustered Backbone Approach. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:116-121 [Conf]
  19. Nikos Dimokas, Dimitrios Katsaros, Yannis Manolopoulos
    Node Clustering in Wireless Sensor Networks by Considering Structural Characteristics of the Network Graph. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:122-127 [Conf]
  20. Damayanti Datta, Sukhamay Kundu
    Reliable and Efficient Data Transfer in Wireless Sensor Networks via Out-of-Sequence Forwarding and Delayed Request for Missing Packets. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:128-133 [Conf]
  21. Manseok Yang, Sun Sup So, Steve Eun, Brian Kim, Jinchun Kim
    Sensos: A Sensor Node Operating System with a Device Management Scheme for Sensor Nodes. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:134-139 [Conf]
  22. Min Tun, Laxmi Gewali, Henry Selvaraj
    Interference Aware Routing in Sensor Network. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:140-146 [Conf]
  23. Sajid Hussain, Abdul Wasey Matin, Obidul Islam
    Genetic Algorithm for Energy Efficient Clusters in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:147-154 [Conf]
  24. Guido Gehlen, Fahad Aijaz, Muhammad Sajjad, Bernhard Walke
    A Mobile Context Dissemination Middleware. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:155-160 [Conf]
  25. Jinsuo Zhang, Stacey Franklin Jones, Junling Wang, Sumi Helal
    DPQ: Using A Distributed Priority Queue to Improve Ad hoc TCP Performance. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:161-165 [Conf]
  26. Elaine Lawrence, Maria Bina, Gordana Culjak, Tarek El Kiki
    Wireless Community Networks: Public Assets for 21st Century Society. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:166-174 [Conf]
  27. Muhammad Saleem, Imran Touqir, Adil Masood Siddiqui
    Novel Edge Detection. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:175-180 [Conf]
  28. Sarang Joshi, S. K. Bodhe
    Time Complexity Analysis for Decoding VOP Content in MPEG-4 Presentations. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:181-182 [Conf]
  29. S. Rahul, J. Vignesh, S. Santhosh Kumar, M. Bharadwaj, N. Venkateswaran
    Comparison of Pyramidal and Packet Wavelet Coder for Image Compression Using Cellular Neural Network (CNN) with Thresholding and Quantization. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:183-184 [Conf]
  30. D. G. Khairnar, Shabbir N. Merchant, Uday B. Desai
    A Neural Solution for Signal Detection In Non-Gaussian Noise. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:185-189 [Conf]
  31. Premkumar Elangovan, Gaoyong Luo, Geoff Lawday
    Structurally Efficient Video Codec for Wireless Mobile Applications. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:190-195 [Conf]
  32. Hau T. Ngo, Vijayan K. Asari
    Design of a Low Power Multiply-Accumulator for 2D Convolution in Video Processing Applications. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:196-201 [Conf]
  33. Jinghua Zhang, Jinsheng Xu, Huiming Yu
    Octree-Based 3D Animation Compression with Motion Vector Sharing. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:202-207 [Conf]
  34. Madasu Hanmandlu, J. Grover, Vamsi Krishna Madasu, Shantaram Vasikarla
    Input Fuzzy Modeling for the Recognition of Handwritten Hindi Numerals. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:208-213 [Conf]
  35. Manoranjan Paul, M. Manzur Murshed
    Pattern based Residual Coding for H.264 Encoder. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:214-218 [Conf]
  36. Seema H. Jadhav, B. S. Tarle, L. M. Waghmare
    Polygonal Approximation of 2-D Binary Images. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:219-223 [Conf]
  37. Shuangteng Zhang, Yihong Lu
    Image Resolution Enhancement Using a Hopfield Neural Network. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:224-228 [Conf]
  38. Luc Gillibert, Alain Bretto
    Hypergraphs for Near-lossless Volumetric Compression. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:229-233 [Conf]
  39. Nileshsingh V. Thakur, O. G. Kakde
    Color Image Compression on Spiral Architecture using Optimized Domain Blocks in Fractal Coding. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:234-242 [Conf]
  40. Jay Kothari, Maxim Shevertalov, Edward Stehle, Spiros Mancoridis
    A Probabilistic Approach to Source Code Authorship Identification. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:243-248 [Conf]
  41. Seongwook Youn, Dennis McLeod
    Efficient Spam Email Filtering using Adaptive Ontology. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:249-254 [Conf]
  42. Dangeti Ravi Shankar, Akhil Kodali, Pradeep Beerla, D. V. S. Mohan Nimai
    Neural Networks in Cultivation. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:255-260 [Conf]
  43. Sampathkumar Veeraraghavan, Karthik Srinivasan
    Exploration of Autism Expert Systems. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:261-264 [Conf]
  44. Narongrit Waraporn
    Results of Real Time Simulation of Medical Knowledge Technology (MKT) System for Medical Diagnosis on Distributed Knowledge Nodes. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:265-270 [Conf]
  45. C. L. Connors, M. A. Malloy
    Practical Challenges Facing Communities of Interest in the Net-Centric Department of Defense. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:271-276 [Conf]
  46. Wen-Hui Chen, Wen-Shang Tseng
    A Novel Multi-agent Framework for the Design of Home Automation. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:277-281 [Conf]
  47. Marcus J. Huber
    Agent Autonomy: Social Integrity and Social Independence. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:282-290 [Conf]
  48. InHo Jang, SangKeun Lee
    Search Reverse Nearest Neighbor Query On Air. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:291-296 [Conf]
  49. Dejene Ejigu, Vasile-Marian Scuturici, Lionel Brunie
    CoCA: A Collaborative Context-Aware Service Platform for Pervasive Computing. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:297-302 [Conf]
  50. Sheikh Iqbal Ahamed, Munirul M. Haque, K. M. Ibrahim Asif
    S-MARKS: A Middleware Secure by Design for the Pervasive Computing Environment. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:303-310 [Conf]
  51. Janus S. Liang
    Education and Training for Troubleshooting in Automotive Chassis. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:311-316 [Conf]
  52. Kazuo Hiekata, Hiroyuki Yamato, Piroon Rojanakamolsan, Wataru Oishi
    Design Engineering Educational Framework Using ShareFast: A Semantic Web-Based E-Learning System. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:317-322 [Conf]
  53. Kenneth Hoganson, David Lebron
    Lectures for Mobile Devices, Evaluating "iPod/PDA-casting" Technology and Pedagogy. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:323-328 [Conf]
  54. Azita Bahrami
    An L-Tree Based Analysis of E-lessons. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:329-334 [Conf]
  55. Samir N. Hamade
    Acquiring Information Technology Skills by Freshmen Students at Kuwait University: The Language Factor. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:335-340 [Conf]
  56. Mohammad Eyadat, Dorothy Fisher
    Web Accessibility and Information Systems Curriculum. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:341-346 [Conf]
  57. Oussama Kassem Zein, Yvon Kermarrec
    Description and composition of services for distant learning and research activities. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:347-354 [Conf]
  58. Sudhanwa Kholgade, Jamie White, Hassan Reza
    Comparing the Specification of a Near-Real Time Commanding System Using Statecharts and AADL. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:355-360 [Conf]
  59. Kazem Taghva, Pavankumar Bondugula, Darshana Gala
    Association Rule Discovery of Privacy Information. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:361-365 [Conf]
  60. Hassan Reza, Sandeep Endapally, Emanuel S. Grant
    A Model-Based Approach for Testing GUI Using Hierarchical Predicate Transition Nets. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:366-370 [Conf]
  61. Abdullah Uz Tansel, Susan P. Imberman
    Discovery of Association Rules in Temporal Databases. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:371-376 [Conf]
  62. Chung-Hong Lee, Hsin-Chang Yang
    Implementation of Unsupervised and Supervised Learning Systems for Multilingual Text Categorization. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:377-382 [Conf]
  63. M. Arun Kumar, M. Gopal
    Binary Classification by SVM based neural Trees and Nonlinear SVMs. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:383-387 [Conf]
  64. Mark Smith, Alireza Khotanzad
    Quality Metrics for Object-Based Data Mining Applications. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:388-392 [Conf]
  65. Mehrdad Nojoumian, Timothy C. Lethbridge
    Extracting Document Structure to Facilitate a Knowledge Base Creation for The UML Superstructure Specification. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:393-400 [Conf]
  66. S. D. Samantaray
    A Data mining approach for resolving cases of Multiple Parsing in Machine Aided Translation of Indian Languages. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:401-405 [Conf]
  67. Rabia Jafri, Hamid R. Arabnia
    Analysis of Subspace-based Face Recognition Techniques under Changes in Imaging Factors. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:406-413 [Conf]
  68. Ray R. Hashemi, Alexander A. Tyler, Christopher Childers, Arthur Chausmer
    Concordance Analysis of DEXA Data. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:414-419 [Conf]
  69. S. Ahmad, Mali Abdollahian, Panlop Zeephongsekul
    Process Capability for a Non-Normal Quality Characteristics Data. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:420-424 [Conf]
  70. S. Ahmad, Mali Abdollahian, Panlop Zeephongsekul
    Process Capability Analysis for Non-Normal Quality Characteristics Using Gamma Distribution. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:425-430 [Conf]
  71. Amy Neustein
    SEQUENCE PACKAGE ANALYSIS: A New Natural Language Understanding Method for Intelligent Mining of Recordings of Doctor-Patient Interviews and Health-Related Blogs. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:431-438 [Conf]
  72. Bernard J. Jansen, Amanda Spink, Bhuva Narayan
    Query Modifications Patterns During Web Searching. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:439-444 [Conf]
  73. Terrence A. Brooks, Brian P. Flaherty
    An Abandoned Web Page Finds its Audience. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:445-450 [Conf]
  74. Anya Kim, Amitabh Khashnobish, Myong Kang
    An Architecture for Web Services Authentication and Authorization in a Maritime Environment. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:451-456 [Conf]
  75. Juan A. Correa-Colon, Manuel Rodriguez-Martinez
    Design and Implementation of JSwitch: a Web-based Transaction Coordination Framework. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:457-462 [Conf]
  76. Ali Ghobadi, Masood Rahgozar
    A Virtual Catalog Generated from Web Pages of Vendors for Comparative Shopping. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:463-468 [Conf]
  77. Isak Taksa, Sarah Zelikovitz, Amanda Spink
    Using Web Search Logs to Identify Query Classification Terms. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:469-474 [Conf]
  78. Richard D. Holowczak, Isak Taksa, Ilan Levine
    Mining Web Logs to Improve WebGIS Application Response Times. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:475-480 [Conf]
  79. Yun-Ke Chang, Amanda Spink
    Multimedia Chinese Web Search Engines: A Survey. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:481-486 [Conf]
  80. Hanmin Jung, Seungwoo Lee, In-Su Kang, HeeKwan Koo, Won-Kyung Sung
    Construction of Semantic Web-based Knowledge Using Text Processing. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:487-492 [Conf]
  81. Gaël Dias, Bruno Conde
    Towards Web Browsing for Visually Impaired People. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:493-496 [Conf]
  82. Mahmood Houshmand, Mohammad Daneshvar Kakhki
    Presenting a Rule Based Loan Evaluation Expert System. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:497-502 [Conf]
  83. Marc Karam, Mohamed A. Zohdy
    Development of a Model-Based Dynamic Recurrent Neural Network for Modeling Nonlinear Systems. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:503-506 [Conf]
  84. Jamal Bentahar, John-Jules Ch. Meyer, Bernard Moulin
    Securing Agent-Oriented Systems: An Argumentation and Reputation-based Approach. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:507-515 [Conf]
  85. Farhad Mohamad Kazemi, Saeed Samadi, Hamid Reza Poorreza, Mohammad R. Akbarzadeh-Totonchi
    Vehicle Recognition Using Curvelet Transform and SVM. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:516-521 [Conf]
  86. C. Y. Ho, W. Y. Lo, Anthony S. Fong
    Memory Garbage Collection for an Object-Oriented Processor. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:522-527 [Conf]
  87. C. Y. Ho, K. F. Chong, C. H. Yau, Anthony S. Fong
    A Study of Dynamic Branch Predictors: Counter versus Perceptron. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:528-536 [Conf]
  88. A. R. Ali Ahmadi, Farzad Soltani, Majid Gheitasi
    An ICT Technical Reference Model for Iran Universities. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:537-542 [Conf]
  89. Muammer Zerenler
    Information Technology and Business Performance in Agile Manufacturing: An Empirical Study in Textile Industry. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:543-549 [Conf]
  90. Marcus J. Huber, Sanjeev Kumar, Sean A. Lisse, David McGee
    Authority, Deontics and Joint Intentions. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:550-555 [Conf]
  91. Christina N. Michael, Xiao Su
    Incorporating a New Hash Function in OpenPGP and SSL/TLS. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:556-561 [Conf]
  92. Elridge D'Mello, Jerzy Rozenblit
    Design For a Patient-Centric Medical Information System Using XML Web Services. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:562-567 [Conf]
  93. Sachin Singh, Uday Joshi, Prem Uppuluri
    Efficient and Lightweight File System for Desktop Grids. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:568-576 [Conf]
  94. Leon Sanders, Y. B. Reddy
    Detecting Blood Clots using Neural Networks. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:577-582 [Conf]
  95. Masaki Murata, Tomohiro Mitsumori, Kouichi Doi
    Overfitting in protein name recognition on biomedical literature and method of preventing it through use of transductive SVM. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:583-588 [Conf]
  96. Yasuhiro Kiuchi, Tomonobu Ozaki, Takenao Ohkawa
    Partial Geometric Hashing for Retrieving Similar Interaction Protein Using Profile. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:589-596 [Conf]
  97. Hisham M. Haddad, Mauricio Jose Ordoñez
    Enhanced Component Reuse with Atomic Domains: Application Scenarios. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:597-602 [Conf]
  98. Sajjan G. Shiva, Lubna Abou Shala
    Software Reuse: Research and Practice. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:603-609 [Conf]
  99. Chia-Chu Chiang
    Engineering Documents into XML File Formats. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:610-615 [Conf]
  100. Brian Demmings, Elhadi Shakshuki, Tomasz Müldner
    AETA: Algorithm Explanation Teaching Agent. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:616-621 [Conf]
  101. Chang-Mog Lee, Jeong-Ok Kim, Ok-Bae Chang
    User Interface Prototype for User-Centered Interface Design. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:622-627 [Conf]
  102. YoungJoon Byun
    A Tool Support for Design and Validation of Communication Protocol using State Transition Diagrams. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:628-636 [Conf]
  103. Elhadi Shakshuki, Hsiang-Hwa Koo, Darcy G. Benoit
    Negotiation Strategies for Agent-based Meeting Scheduling System. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:637-642 [Conf]
  104. Carlos Eduardo de Barros Paes, Celso Massaki Hirata
    RUP Extension for the Development of Secure Systems. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:643-652 [Conf]
  105. Nirmal Gami, Boleslaw Mikolajczak
    Integration of Multilevel Security Features Into Loosely Coupled Inter-Organizational Workflows. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:653-657 [Conf]
  106. Mehdi EffatParvar, MohammadReza EffatParvar, Akbar Bemana, Mehdi Dehghan
    Determining a Central Controlling Processor with Fault Tolerant Method in Distributed System. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:658-663 [Conf]
  107. Hazem M. Bahig, Hatem M. Bahig
    Optimal Parallel Merging by Counting. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:664-669 [Conf]
  108. Cleber Mira, Joao Meidanis
    Sorting by Block-Interchanges and Signed Reversals. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:670-676 [Conf]
  109. Andre Oboler, Charles Twardy, David W. Albrecht
    Super Iterator A design pattern for Algorithm and Data structure collections. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:677-678 [Conf]
  110. Andre Oboler, Ian Sommerville
    Research Documentation Guidelines - Capturing knowledge, improving research. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:679-684 [Conf]
  111. Judith Ann Ouimet, Sermsak Buntha, Sergiu M. Dascalu
    SERT: Software Tool for Generating Student Engagement Reports. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:685-692 [Conf]
  112. Walter Dosch, Gongzhu Hu
    On Irregular Behaviours of Interactive Stacks. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:693-700 [Conf]
  113. V. Vallieswaran, Bernard Menezes
    ArchKriti : A Software Architecture Based Design and Evaluation Tool Suite. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:701-706 [Conf]
  114. Walter Dosch, Annette Stümpel
    High-Level Design of a Request Driven Sender Component. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:707-714 [Conf]
  115. Yongyan Zheng, Jiong Zhou, Paul Krause
    A Model Checking based Test Case Generation Framework forWeb Services. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:715-722 [Conf]
  116. Thomas Poonnen, Adly T. Fam
    A Novel VLSI Divide and Conquer Implementation of the Iterative Array Multiplier. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:723-728 [Conf]
  117. Guoqiang Yang, Mei Yang, Yulu Yang, Yingtao Jiang
    On the Physicl Layout of PRDT-Based NoCs. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:729-733 [Conf]
  118. Yaoting Jiao, Yulu Yang, Ming He, Mei Yang, Yingtao Jiang
    Multi-path Routing for Mesh/Torus-Based NoCs. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:734-742 [Conf]
  119. Sung-Seok Kang, Young-Sang Kim, Hyo-Sun Kim, Young Joong Lee, Ki Cheol Jang
    Location Based Security Architecture Based on Smart Client Model For Mobile Environment. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:743-746 [Conf]
  120. Haeryong Park, Hyun Kim, Kilsoo Chun, Jaeil Lee, Seongan Lim, Ikkwon Yie
    Untraceability of Group Signature Schemes based on Bilinear Mapping and Their Improvement. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:747-753 [Conf]
  121. Chik How Tan, Joseph Chee Ming Teo
    Protection AgainstWeb-based Password Phishing. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:754-759 [Conf]
  122. Linh Ngo, Amy W. Apon
    Using Shibboleth for Authorization and Authentication to the Subversion Version Control Repository System. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:760-765 [Conf]
  123. Jarrod Trevathan, Wayne Read
    A Simple Shill Bidding Agent. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:766-771 [Conf]
  124. Raylin Tso, Takeshi Okamoto, Eiji Okamoto
    An Improved Signcryption Scheme and Its Variation. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:772-778 [Conf]
  125. Rajni Goel, Moses Garuba, Anteneh Girma
    Research Directions in Quantum Cryptography. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:779-784 [Conf]
  126. Moses Garuba, Jiang Li, Legand L. Burge III
    Comparative Analysis of Email Filtering Technologies. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:785-789 [Conf]
  127. Moses Garuba, Jiang Li
    Preventing parameterized vulnerability in Web based applications. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:790-793 [Conf]
  128. Rajni Goel, Moses Garuba, Chunmei Liu, Trang Nguyen
    The Security Threat Posed by Steganographic Content on the Internet. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:794-798 [Conf]
  129. Jarrod Trevathan, Wayne Read
    Detecting Collusive Shill Bidding. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:799-808 [Conf]
  130. Sahel Alouneh, Abdeslam En-Nouaary, Anjali Agarwal
    Securing MPLS Networks with Multi-path Routing. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:809-814 [Conf]
  131. Fengying Li, Qingshui Xue, Zhenfu Cao
    Crypanalysis of Kuo and Chen's Threshold Proxy Signature Scheme Based on the RSA. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:815-818 [Conf]
  132. Omer Mahmood
    Developing Web 2.0 Applications for Semantic Web of Trust. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:819-824 [Conf]
  133. Ji-Seon Lee, Jik Hyun Chang
    Semantically Secure Authenticated Encryption Scheme and the Same Scheme for Ad-hoc Group Called a Ring. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:825-830 [Conf]
  134. Roman V. Yampolskiy
    Secure Network Authentication with PassText. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:831-836 [Conf]
  135. Roman V. Yampolskiy
    Human Computer Interaction Based Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:837-842 [Conf]
  136. Chandrashekhar A. Dhote, M. S. Ali
    Materialized View Selection in Data Warehousing. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:843-847 [Conf]
  137. Dattatray V. Jadhav, Raghunath S. Holambe
    Multiresolution based Kernel Fisher Discriminant Model for Face Recognition. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:848-853 [Conf]
  138. Alicia Nicki Washington, Harry G. Perros
    Analysis of a Traffic-Groomed Optical Network with Alternate Routing. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:854-862 [Conf]
  139. Terry C. House
    Client/Server Access: Satellite-ATM Connectivity Using a Knowledge Management Approach. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:863-867 [Conf]
  140. Catherine H. Gebotys, B. A. White
    A Phase Substitution Technique for DEMA of Embedded Cryptographic Systems. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:868-869 [Conf]
  141. Fabio Dias Fagundez, Ricardo Niederberger Cabral, Gustavo Melim do Carmo
    Decoupling Relational Database from Object Oriented Layers. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:870-871 [Conf]
  142. Wei Hoo Chong
    iDENTM Smartphone Embedded Software Testing. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:872-873 [Conf]
  143. Sajid Hussain, Richard Peters, Obidul Islam
    A Quick and Energy Efficient Algorithm to Maximize Lifetime of Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:874-875 [Conf]
  144. Gopinath Balakrishnan, Mei Yang, Yingtao Jiang, Yoohwan Kim
    Performance Analysis of Error Control Codes for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:876-879 [Conf]
  145. Shinya Ito, Kenji Yoshigoe
    Exponentially Aggressive Preservation of Nearly Depleted Nodes for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:880-882 [Conf]
  146. Parag P. Joshi, Thomas C. Jannett
    Simulation of Localized Performance-Guided Reconfiguration of Distributed Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:883-884 [Conf]
  147. Mohammad Shirali-Shahreza
    Improving Mobile Banking Security Using Steganography. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:885-887 [Conf]
  148. Yi Qi Gui, Eysuk Jung, Young Choi, Hwang Kyu Choi
    An Efficient Periodic Broadcasting Scheme for Mobile Video-on-Demand System. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:888-889 [Conf]
  149. Toshihiko Yamakami
    Classification of Mobile Internet User Behaviors using Qualitative Transition Patterns. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:890-892 [Conf]
  150. Thomas Wollinger, Vladyslav Kovtun
    Fast explicit formulae for genus 2 hyperelliptic curves using projective coordinates. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:893-897 [Conf]
  151. Amir Khatibzadeh, Catherine H. Gebotys
    Enhanced Current-Balanced Logic (ECBL): An Area Efficient Solution to Secure Smart Cards against Differential Power Attack. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:898-899 [Conf]
  152. Fan Zhang
    Power Analysis Attacks on ECC Randomized Automata. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:900-901 [Conf]
  153. Chima Adiele
    A Formal Interactivity Model for aWeb Community. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:902-903 [Conf]
  154. Tien N. Nguyen
    A Novel Vector-based Keyword Extracting Tool. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:904-905 [Conf]
  155. Emília de Menezes, Adilson Marques da Cunha
    Creating an Effective Infrastructure to Develop GIS. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:906-907 [Conf]
  156. Allan Zhang, Sumi Helal
    SuperCache: A Mechanism to Minimize the Front End Latency. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:908-914 [Conf]
  157. Alexander Khitun, M. Bao, JooYoung Lee, Kang L. Wang, D. W. Lee, S. Wang
    Cellular Nonlinear Network with Spin Wave Bus. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:915-919 [Conf]
  158. Xinming Duan, Yulu Yang, Mei Yang, Lei Li, Yingtao Jiang
    Topology and Binary Routing Schemes of A PRDT-Based NoC. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:920-924 [Conf]
  159. Geylani Kardas, Ebru Celikel
    A Smart Card Mediated Mobile Platform for Secure E-Mail Communication. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:925-928 [Conf]
  160. D. Prabu, V. Vanamala, Sanjeeb Kumar Deka, R. Sridharan, B. B. Prahlada Rao, N. Mohanram
    Design and Implementation of a High Performance MPI for Large Scale Computing System. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:929-932 [Conf]
  161. Alan McCabe, Jarrod Trevathan
    Pre-processing of On-line Signals in Noisy Environments. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:933-936 [Conf]
  162. G. Tholkappia Arasu, V. Palanisamy
    NeuroFuzzy Agent Programming for Processing of EEG/ECG/EMG Waveforms. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:937-938 [Conf]
  163. Farhad Mohamad Kazemi, Saeed Samadi, Hamid Reza Poorreza, Mohammad R. Akbarzadeh-Totonchi
    Vehicle Recognition Based on Fourier, Wavelet and Curvelet Transforms - a Comparative Study. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:939-940 [Conf]
  164. Eui-Jong Jeong, Goo Yeon Lee
    Efficient Location Management Scheme using MLR considering Local Usages. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:941-942 [Conf]
  165. Jinsuo Zhang, Stacey Franklin Jones
    uKey: A Unified Key Management and Authentication Automation Middleware For Heterogeneous System. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:943-944 [Conf]
  166. Kun-Yo Liu, Tim Yao
    Design of a RFID Transponder for Application on Secutiry. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:945-946 [Conf]
  167. Ralucca Gera
    On the Dominator Colorings in Bipartite Graphs. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:947-952 [Conf]
  168. Jesús Ubaldo Quevedo-Torrero, Alma Delia Rodríguez-Bernal
    Goal Oriented Templates to Dynamically Assess Knowledge. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:953-954 [Conf]
  169. Fengyuan Xu, Zhiyi Fang
    Individuation Learning Components in Intelligent Education Games. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:955-956 [Conf]
  170. Avinash J. Agrawal, Manoj B. Chandak
    Mobile Interface for Domain Specific Machine Translation Using Short Messaging Service. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:957-958 [Conf]
  171. Mazin AlHadidi
    Utilizing the Fuzzy Logic Model to Develop the Arab Management System Performance. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:959-960 [Conf]
  172. Rashid Bin Muhammad
    A Distributed Geometric Routing Algorithm for Ad HocWireless Networks. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:961-963 [Conf]
  173. Kang Sun, Xuezeng Pan, Jimin Wang, Lingdi Ping
    PAD: A Design Space Exploration Model For Reconfigurable Systems. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:964-965 [Conf]
  174. Mohsen Beheshti, Richard A. Wasniowski
    Data Fusion Support for Intrusion Detection and Prevention. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:966- [Conf]
  175. F. Sheeja Mary
    Erratic Cryptosystem for Elevated Message Security. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:967-969 [Conf]
  176. SangKwon Moon, YongJoo Song, Keuntae Park, Daeyeon Park
    Mobility Aware Transmission Power Control in Mobile Ad-hoc Network. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:970- [Conf]
  177. Ji-Seon Lee, Jik Hyun Chang
    Generating a Proxy Signature on a Confidential Message. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:971- [Conf]
  178. Mojtaba Shakeri, Abolfazl Toroghi Haghighat, Mohammad K. Akbari
    Modeling and Evaluating the Scalability of Instruction Fetching in Superscalar Processors. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:972- [Conf]
  179. Leila Beig, Atefeh Ghavamifar
    Proposing a Conceptual Model for Organizational Memory Constructs in Dynamic Virtual Organizations. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:973- [Conf]
  180. Rabindra Ku. Jena, Gopal Ku. Sharma
    A Multi-Objective Evolutionary Algorithm Based Optimization Model for Network-on-Chip Synthesis. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:977-982 [Conf]
  181. Muhammad Z. Hasan, Sotirios G. Ziavras
    Runtime Partial Reconfiguration for Embedded Vector Processors. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:983-988 [Conf]
  182. Hongyan Yang, Sotirios G. Ziavras, Jie Hu
    FPGA-based Vector Processing for Matrix Operations. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:989-994 [Conf]
  183. A. Byrne, Nicolas Meloni, Francis M. Crowe, William P. Marnane, Arnaud Tisserand, Emanuel M. Popovici
    SPA resistant Elliptic Curve Cryptosystem using Addition Chains. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:995-1000 [Conf]
  184. Tony Benavides, Justin Treon, Weide Chang
    The Apparatus and Enabling of a Code Balanced System. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:1001-1007 [Conf]
  185. Griselda Saldaña, Miguel Arias-Estrada
    Compact FPGA-based systolic array architecture suitable for vision systems. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:1008-1013 [Conf]
  186. Mitchell Loeb, Alan L. Tharp
    Gray Code Chaining: A High Performance Hashing Algorithm for Limited Storage Applications. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:1014- [Conf]
  187. Bijan Ansari, Huapeng Wu
    Efficient Finite Field Processor for GF(2^163) and its VLSI Implementation. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:1021-1026 [Conf]
  188. Muhammad Ali, Michael Welzl, Sven Hessler
    A Fault tolerant mechanism for handling Permanent and Transient Failures in a Network on Chip. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:1027-1032 [Conf]
  189. Jun Ho Bahn, Seung Eun Lee, Nader Bagherzadeh
    On Design and Analysis of a Feasible Network-on-Chip (NoC) Architecture. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:1033-1038 [Conf]
  190. Woojin Park, Inho Kim, Kyungsoo Lim, Sinam Woo, Sunshin An
    Implementation and Performance Analysis of an IPv6 Multicast Forwarder for the IXP2400 Network Processor. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:1039-1044 [Conf]
  191. Mohsen Soryani, Mohsen Sharifi, Mohammad Hossein Rezvani
    Performance Evaluation of Cache Memory Organizations in Embedded Systems. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:1045-1050 [Conf]
  192. Jawed I. A. Siddiqi, Babak Akhgar, Nazaraf Shah, Fazilatur Rahman, Nahum Korda, Raphael Attias, Maria Teresa Andrade, Judy Dori, Boas Hashavia, Norbert Benamou
    A System for Semantically Enhanced, Multifaceted, Collaborative Access: Requirements and Architecture. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:1051-1056 [Conf]
  193. Günter Knittel
    On the Design of a Parallel Link Using Rigid-Flex PCB Technology. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:1057-1062 [Conf]
  194. Chandana Watagodakumbura, Henry Praluyanto
    Composite Burst Assembly and Lower Real-Time Class Utilization Threshold in Optical Burst Switching As Means of Overcoming Effects of Self-Similarity. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:1063-1070 [Conf]
  195. Daniela Ferrero
    Some properties of superline digraphs. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:1073-1076 [Conf]
  196. Sina Jafarpour, Mohammad Ghodsi, Keyvan Sadri, Zuheir Montazeri
    Computational Power of the Quantum Turing Automata. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:1077-1082 [Conf]
  197. Ron Coleman
    Adaptive Pattern Movement for Mobile Games. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:1083-1088 [Conf]
  198. Samee Ullah Khan, Munib Ahmed
    A Bottleneck Eliminating Approximate Algorithm for PON Layout. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:1089-1094 [Conf]
  199. Yong Wang, Xiaochun Yun, Yifei Li
    Analyzing the Characteristics of Gnutella Overlays. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:1095-1100 [Conf]
  200. Mohammad Fathian, Babak Amiri
    Investigation of Effective Factors on e-Readiness of Iranian Manufacturing SMEs. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:1101-1106 [Conf]
  201. Yao-Hsin Chou, I-Ming Tsai, Chin-Shyurng Fahn, Shi-Jinn Horng, Sy-Yen Kuo
    Dependabilities in a High-performance Quantum Real-time Distributed System. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:1107-1112 [Conf]
  202. Wei-Lun Chang, Soe-Tsyr Yuan
    Collaborative Pricing for e-Service Bundle Delivery: A Framework. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:1113-1118 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002