The SCEAS System
Navigation Menu

Conferences in DBLP

International Conference on Information Technology: New Generations (itng)
2006 (conf/itng/2006)


  1. General Chair's Message. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:- [Conf]

  2. Reviewers. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:- [Conf]
  3. Varsha Hemant Patil, Snehal M. Kamlapur, Manikrao L. Dhore
    Six Sigma in Education: To Achieve Overall Excellence in the Field of Education. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:2-5 [Conf]
  4. Jacob R. Miller, Sandra Gorka, Barry M. Lunt, Joseph J. Ekstrom, Eydie Lawson, Han Reichgelt, Reza Kamali
    Hiring the IT Graduate: What's in the Box? [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:6-10 [Conf]
  5. Inger Björkman, Ann Johansson
    Implications of IT in Different Professions. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:11-19 [Conf]
  6. Ghita Kouadri Mostéfaoui, Zakaria Maamar, Nanjangud C. Narendra, Subramanian Sattanathan
    Decoupling Security Concerns in Web Services Using Aspects. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:20-27 [Conf]
  7. Hisham M. Haddad
    Integrated Collections: Approach to Software Component Reuse. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:28-33 [Conf]
  8. Sumanth Yenduri
    An Agglomerative Clustering Methodology For Data Imputation. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:34-39 [Conf]
  9. Eugenio Capra, Chiara Francalanci
    Cost Implications of Software Commonality and Reuse. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:40-45 [Conf]
  10. Umesh Bellur, V. Vallieswaran
    On OO Design Consistency in Iterative Development. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:46-51 [Conf]
  11. Abbas Heydarnoori, Farhad Mavaddat
    Reliable Deployment of Component-based Applications into Distributed Environments. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:52-57 [Conf]
  12. Stefan Senczyna
    Modular Model of a Logic Circuit Using Object-Oriented Programming. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:58-65 [Conf]
  13. Chia-Chu Chiang
    A Language for Writing Formal Software Specifications: The Library Problem Revisited. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:66-71 [Conf]
  14. Göran Calås, Andreas Boklund, Stefan Mankefors-Christiernin
    A First Draft of RATF: A Method Combining Robustness Analysis and Technology Forecasting. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:72-77 [Conf]
  15. Hai Yan, Zhijie Jerry Shi
    Studying Software Implementations of Elliptic Curve Cryptography. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:78-83 [Conf]
  16. Radwan Tahboub, Vasile Lazarescu
    Novel Approach for Remote Energy Meter Reading Using Mobile Agents. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:84-89 [Conf]
  17. Elhadi Shakshuki, Abdul Wasey Matin
    RL-Agent That Learns in Collaborative Virtual Environment. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:90-95 [Conf]
  18. Walter Dosch
    On History-Sensitive Models of Interactive Stacks. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:96-103 [Conf]
  19. L. Robert, R. Nadarajan
    New Algorithms For Random Access Text Compression. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:104-111 [Conf]
  20. Shifeng Zhang
    Integrating Non-Functional Properties to Architecture Specification and Analysis. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:112-117 [Conf]
  21. Iván Martínez-Ortiz, Pablo Moreno-Ger, José Luis Sierra, Baltasar Fernández-Manjón
    Production and Maintenance of Content-Intensive Videogames: A Document-Oriented Approach. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:118-123 [Conf]
  22. Tien Nhut Nguyen
    Integrating Change Management with Software Document Relationship Management. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:124-130 [Conf]
  23. Elhadi Shakshuki, Omkarnath Prabhu
    Agent Launch Pattern for Creating Agents. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:131-136 [Conf]
  24. Samir N. Hamade
    The Legal and Political Aspects of Software Piracy in the Arab World. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:137-142 [Conf]
  25. Wang-chan Wong, Mohammad Eyadat, Shane Ng
    Degree of Freedom - Experience of Applying Software Framework. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:143-148 [Conf]
  26. W. M. Beynon, R. C. Boyatt, S. B. Russ
    Rethinking Programming. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:149-154 [Conf]
  27. Jitender Kumar Chhabra, K. K. Aggarwal
    Measurement of Intra-Class & Inter-Class Weakness for Object-Oriented Software. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:155-160 [Conf]
  28. Raed Shatnawi, Wei Li
    An Investigation of Bad Smells in Object-Oriented Design. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:161-165 [Conf]
  29. Maged Hamada Ibrahim
    Two-Party Private Vector Dominance: The All-Or-Nothing Deal. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:166-171 [Conf]
  30. Adam J. Elbirt, Christof Paar
    Efficient Implementation of Galois Field Fixed Field Constant Multiplication. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:172-177 [Conf]
  31. Kooroush Manochehri, Saadat Pourmozafari, Babak Sadeghian
    Efficient Methods in Converting to Modulo 2^n+1 and 2^n-1. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:178-185 [Conf]
  32. Guido Bertoni, Luca Breveglieri, Pasqualina Fragneto, Gerardo Pelosi
    Parallel Hardware Architectures for the Cryptographic Tate Pairing. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:186-191 [Conf]
  33. Robert Ronan, Colm O'Eigeartaigh, Colin C. Murphy, Michael Scott, Tim Kerins, William P. Marnane
    An Embedded Processor for a Pairing-Based Cryptosystem. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:192-197 [Conf]
  34. He Ge, Stephen R. Tate
    Efficient Authenticated Key-Exchange for Devices with a Trusted Manager. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:198-203 [Conf]
  35. Kris Tiri, Patrick Schaumont, Ingrid Verbauwhede
    Side-Channel Leakage Tolerant Architectures. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:204-209 [Conf]
  36. Nadia Nedjah, Luiza de Macedo Mourelle
    Four Hardware Implementations for the M-ary Modular Exponentiation. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:210-215 [Conf]
  37. Nadia Nedjah, Luiza de Macedo Mourelle, Marco Paulo Cardoso
    A Compact Piplined Hardware Implementation of the AES-128 Cipher. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:216-221 [Conf]
  38. Mei Yang, Mayauna McCullough, Yingtao Jiang, Jun Zheng
    K-Selector-Based Dispatching Algorithm for Clos-Network Switches. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:222-226 [Conf]
  39. Rama Sangireddy
    Instruction Format Based Selective Execution for Register Port Complexity Reduction in High-Performance Processors. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:227-232 [Conf]
  40. Erik S. Gough, Michael D. Kane
    Evaluating Parallel Computing Systems in Bioinformatics. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:233-238 [Conf]
  41. Yulu Yang, Yang Yu
    RDT Properties and Evaluations. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:239-244 [Conf]
  42. Jianfeng An, Xiaoya Fan, Shengbing Zhang, Danghui Wang, Yi Wang
    VMSIM: Virtual Machine Based a Full System Simulation Platform for Microprocessors' Functional Verification. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:245-249 [Conf]
  43. Hooman Parizi, Afshin Niktash, Amir Hosein Kamalizad, Nader Bagherzadeh
    A Reconfigurable Architecture for Wireless Communication Systems. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:250-255 [Conf]
  44. Fei Hu, Carter May, Xiaojun Cao
    Data Aggregation in Distributed Sensor Networks: Towards An Adaptive Timing Control. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:256-261 [Conf]
  45. Nahdia Tabassum, Quazi Ehsanul Kabir Mamun, Yoshiyori Urano
    COSEN: A Chain Oriented Sensor Network for Efficient Data Collection. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:262-267 [Conf]
  46. Laxmi Gewali, Khursheed Mohamad, Min Tun
    Interference Aware Dominating Set for Sensor Network. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:268-273 [Conf]
  47. Mathew M. Noel, Parag P. Joshi, Thomas C. Jannett
    Improved Maximum Likelihood Estimation of Target Position in Wireless Sensor Networks using Particle Swarm Optimization. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:274-279 [Conf]
  48. Hyojung Lee, Wonpil Yu, Youngmi Kwon
    Efficient RBS in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:279-284 [Conf]
  49. Vasu Jolly, Naoto Kimura, Shahram Latifi
    Reliable Multipath Information Dissemination via Label Forwarding in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:285-293 [Conf]
  50. Philip Garner, Ian Mullins, Reuben Edwards, Paul Coulton
    Mobile Terminated SMS Billing - Exploits and Security Analysis. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:294-299 [Conf]
  51. Werner Kurschl, Stefan Mitsch, Rene Prokop
    SmartDOTS - A Framework for Efficient Data Synchronization on Mobile Devices. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:300-305 [Conf]
  52. Moushumi Sharmin, Shameem Ahmed, Sheikh Iqbal Ahamed
    MARKS (Middleware Adaptability for Resource Discovery, Knowledge Usability and Self-healing) for Mobile Devices of Pervasive Computing Environments. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:306-313 [Conf]
  53. Tommi Laukkanen, Teuvo Kantanen
    Consumer Value Segments in Mobile Bill Paying. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:314-319 [Conf]
  54. Tarek El Kiki, Elaine Lawrence
    Government as a Mobile Enterprise: Real-time, Ubiquitous Government. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:320-327 [Conf]
  55. Werner Kurschl, Stefan Mitsch, Rene Prokop
    SelectiveDES: A Distributed Event Service Add-On for Invocation-Based Middleware supporting Selective Multi-Channel Communication and Notification Delivery. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:328-333 [Conf]
  56. Abdul Nasir, Mah-Rukh Mah-Rukh
    Internet Mobility using SIP and MIP. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:334-339 [Conf]
  57. Eunjung Lee, Jinsuk Baek, Shou-Hsuan Stephen Huang
    A Dynamic Mobility Management Scheme for VoIP Services. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:340-345 [Conf]
  58. Natali Delic, Ana Vukasinovic
    Mobile Payment Solution - Symbiosis Between Banks, Application Service Providers and Mobile NetworkOperators. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:346-350 [Conf]
  59. Jawed I. A. Siddiqi, Babak Akhgar, Mehrdad Naderi, Wolfgang Orth, Norbert Meyer, Miika Tuisku, Gregor Pipan, Mario López Gallego, José Alberto García, Maurizio Cecchi, Jean-Noel Colin
    Secure ICT Services for Mobile and Wireless Communications: A Federated Global Identity Management Framework. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:351-357 [Conf]
  60. Isak Taksa, Amanda Spink
    Using the Web to Construct Taxonomy for a Heterogeneous Community of Practice. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:358-363 [Conf]
  61. Michelle Cheatham, Mateen M. Rizki
    Feature and Prototype Evolution for Nearest Neighbor Classification of Web Documents. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:364-369 [Conf]
  62. Amanda Spink, Bernard J. Jansen, Chris Blakely, Sherry Koshman
    Overlap Among Major Web Search Engines. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:370-374 [Conf]
  63. Nadine Schmidt-Maenz, Martina Koch
    A General Classification of (Search) Queries and Terms. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:375-381 [Conf]
  64. Gil Cheol Park, Seok Soo Kim, Gun Tae Bae, Yang Sok Kim, Byeong Ho Kang
    An Automated WSDL Generation and Enhanced SOAP Message Processing System for Mobile Web Services. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:382-387 [Conf]
  65. Satoshi Niwa, Takuo Doi, Shinichi Honiden
    Web Page Recommender System based on Folksonomy Mining for ITNG '06 Submissions. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:388-393 [Conf]
  66. Daqing He
    A Study of Self-Organizing Map in Interactive Relevance Feedback. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:394-401 [Conf]
  67. Dhilak Damodaran, Rohit Singh, Phu Dung Le
    Group Key Management in Wireless Networks Using Session Keys. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:402-407 [Conf]
  68. Hao Luo, Binxing Fang, Xiao-chun Yun
    Anomaly Detection in SMTP Traffic. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:408-413 [Conf]
  69. Hwayoung Um, Edward J. Delp
    A Secure Group Key Management Scheme for Wireless Cellular Networks. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:414-419 [Conf]
  70. Dima Novikov, Roman V. Yampolskiy, Leon Reznik
    Anomaly Detection Based Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:420-425 [Conf]
  71. Marko Hassinen, Maija Marttila-Kontio, Mikko Saesmaa, Heli Tervo
    Secure Two-Way Transfer of Measurement Data. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:426-431 [Conf]
  72. Yiling Wang, Dhilak Damodaran, Phu Dung Le
    Efficient Group Key Management in Wireless Networks. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:432-439 [Conf]
  73. Mahdi Seify
    New Method for Risk Management in CRM Security Management. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:440-445 [Conf]
  74. Ranjit Bose
    Intelligent Technologies for Managing Fraud and Identity Theft. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:446-451 [Conf]
  75. Kazimierz Kowalski, Mohsen Beheshti
    Analysis of Log Files Intersections for Security Enhancement. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:452-457 [Conf]
  76. Xianping Wu, Osama Dandash, Phu Dung Le
    The Design and Implementation of a Smartphone Payment System based on Limited-used Key Generation Scheme. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:458-463 [Conf]
  77. Dragos Trinca
    Sequential and Parallel Cascaded Convolutional Encryption with Local Propagation: Toward Future Directions in Symmetric Cryptography. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:464-469 [Conf]
  78. Yu Yu, Jussipekka Leiwo, Benjamin Premkumar
    A Study on the Security of Privacy Homomorphism. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:470-475 [Conf]
  79. Wei Wu, Phu Dung Le
    An Efficient and Secure Code Sharing for Peer-to-Peer Communications. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:476-481 [Conf]
  80. Shang-Lin Hsieh, Hsuan-Chieh Huang, I-Ju Tsai
    A Copyright Protection Scheme for Gray-Level Images Using Human Fingerprint. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:482-489 [Conf]
  81. E. Udoh, J. Rhoades
    Mining Documents in a Small Enterprise Using WordStat. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:490-494 [Conf]
  82. Arthi Anandhan, Senthil Dhandapani, Hassan Reza, Karthik Namasivayam
    Web Usability Testing - CARE Methodology. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:495-500 [Conf]
  83. Yoon-Shik Tae, Jeong Woo Son, Mi-hwa Kong, Jun-Seok Lee, Seong-Bae Park, Sang-Jo Lee
    A Hybrid Approach to Error Reduction of Support Vector Machines in Document Classification. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:501-506 [Conf]
  84. K. Vivek, M. Gopa, B. K. Panigrahi
    Knowledge Discovery in Power Quality Data Using Support Vector Machine and S-Transform. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:507-512 [Conf]
  85. Panida Songram, Veera Boonjing, Sarun Intakosum
    Closed Multidimensional Sequential Pattern Mining. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:512-517 [Conf]
  86. Chaoguang Men, Yunlong Zhao, Wenbin Yao
    A Two-Phase Time-based Consistent Checkpointing Strategy. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:518-523 [Conf]
  87. Ziad Al-Sharif, Clinton Jeffery
    Adding High Level VoIP Facilities to the Unicon Language. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:524-529 [Conf]
  88. Chi Hun Lee, Yi Qi Gui, In Bum Jung, Chang Yeol Choi, Hwang Kyu Choi
    A Peer to Peer Prefix Patching Scheme for VOD Servers. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:530-534 [Conf]
  89. Teck-Kuen Chua, David C. Pheanis
    Bandwidth-Conserving Real-Time VoIP Teleconference System. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:535-540 [Conf]
  90. K. Lakshmi, Saswati Mukherjee
    An Improved Feature Selection using Maximized Signal to Noise Ratio Technique for TC. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:541-546 [Conf]
  91. Madasu Hanmandlu, Anuj K. Tiwari, Vamsi Krishna Madasu, Shantaram Vasikarla
    Mixed Noise Correction in Gray Images using Fuzzy Filters. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:547-553 [Conf]
  92. Umar Farooq, Muhammad Saleem, Habibullah Jamal
    Parameterized FIR Filtering IP Cores for Reusable SoC Design. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:554-559 [Conf]
  93. S. A. M. Rizvi, Pankaj Agarwal
    A New Bucket-Based A New Bucket-Based Algorithm for Finding LCS from two given Molecular Sequences. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:560-561 [Conf]
  94. Parag P. Joshi, Thomas C. Jannett
    Performance-Guided Reconfiguration of Wireless Sensor Networks that Use Binary Data for Target Localization. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:562-565 [Conf]
  95. Mohammad Al-Shurman, Seong-Moo Yoo
    Key Pre-Distribution Using MDS Codes in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:566-567 [Conf]
  96. Kiarash Narimani, Gordon B. Agnew
    Key Management and Mutual Authentication for Multiple Field Records Smart Cards. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:568-569 [Conf]
  97. Tianzhou Chen, Zhenjie He, Wei Hu
    Effectively implement AES for EFI/Tiano based on IA-32 Platform. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:570- [Conf]
  98. Yi Wang, Jussipekka Leiwo, Thambipillai Srikanthan, Yu Yu
    FPGA based DPA-resistant Unified Architecture for Signcryption. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:571-572 [Conf]
  99. Guido Bertoni, Luca Breveglieri, Matteo Venturi
    ECC Hardware Coprocessors for 8-bit Systems and Power Consumption Considerations. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:573-574 [Conf]
  100. Tai-Chi Lee, Richard Zeien, Adam Roach, Patrick Robinson
    DES Decoding Using FPGA and Custom Instructions. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:575-577 [Conf]
  101. Xiannong Meng
    A Comparative Study of Performance Measures for Information Retrieval Systems. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:578-579 [Conf]
  102. Ssu-An Lo, Chong-Yen Lee, Chun-Chieh Hsu
    Automatically Classify Web Sites by Multimembership Bayesian Approach. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:580-583 [Conf]
  103. Andrei Smirnov, Steven Rowan
    Express Risk Assessment through Web Access to Simulation Data. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:584-585 [Conf]
  104. Mikyeong Moon, Youngbong Kim, Keunhyuk Yeom
    Contextual Events Framework in RFID System. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:586-587 [Conf]
  105. Akio Sashima, Noriaki Izumi, Koichi Kurumatani, Yoshiyuki Kotani
    Dynamic Role Assignment Protocol for Pervasive Computing. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:588-589 [Conf]
  106. Nathan Denny, Theodore El Hourani, Jaime Denny, Scott Bissmeyer, David Irby
    SpamCooker: A Method for Deterring Unsolicited Electronic Communications. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:590-591 [Conf]
  107. E. Udoh, J. Hoover
    Storage of a Portal-Extracted Data in a Relational Database. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:592-594 [Conf]
  108. Nikolay Manchev
    Parallel Algorithm for Run Length Encoding. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:595-596 [Conf]
  109. Shilpa Ambarish, Mahmoud Fawzy Wagdy
    A Wide-Band Digital Phase-Locked Looop. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:597-598 [Conf]
  110. Haripriya Janardhan, Mahmoud Fawzy Wagdy
    Design of a 1GHz Digital PLL Using 0.18\mu m CMOS Technology. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:599-600 [Conf]
  111. Narongrit Waraporn, Syed V. Ahamed
    Intelligent Medical Search Engine by Knowledge Machine. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:601-605 [Conf]
  112. Hisham Al-Mubaid, Ping Chen
    Biomedical Term Disambiguation: An Application to Gene-Protein Name Disambiguation. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:606-612 [Conf]
  113. Heidi J. C. Ellis, Susan Fox-Erlich, Timothy O. Martyn, Michael R. Gryk
    Development of an Integrated Framework for Protein Structure Determinations: A Logical Data Model for NMR Data Analysis. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:613-618 [Conf]
  114. Kyle D. Lutes, Ibrahim M. Baggili
    Diabetic e-Management System (DEMS). [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:619-624 [Conf]
  115. Ray R. Hashemi, Alexander A. Tyler, Christopher Childers, Arthur Chausmer
    Similarity Analysis of Bone Mineral Density Measurements of Femur Sites Using Dendrogram. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:625-630 [Conf]
  116. Li-wei Lehman, Steven Lerman
    A Decentralized Network Coordinate System for Robust Internet Distance. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:631-637 [Conf]
  117. Yunlong Zhao, Chaoguang Men, Nianmin Yao
    Internet Accessing for IPv6 MANETs. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:638-645 [Conf]
  118. Ruay-Shiung Chang, Jih-Sheng Chang
    Adaptable Replica Consistency Service for Data Grids. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:646-651 [Conf]
  119. Ziga Turk, Matevz Dolenc, Etiel Petrinja
    The Role of Collaboration Grids in the Roadmaps of Networked Organizations. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:652-657 [Conf]
  120. L. J. Wang, A. S. M. Sajeev, Lachana Inchaiwong
    A Formal Specification of Interaction Widgets Hierarchy Framework. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:658-664 [Conf]
  121. Jordi Castellà-Roca, Josep Domingo-Ferrer, Francesc Sebé
    On the Security of a Repaired Mental Poker Protocol. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:664-668 [Conf]
  122. Ron Coleman
    Boosting Blackjack Returns with Machine Learned Betting Criteria. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:669-673 [Conf]
  123. Sang-Soo Kim, Jeon Woo Son, Mi-hwa Kong, Seong-Bae Park, Sang-Jo Lee
    Korean Text Chunk Identification Using Support Vector Machines. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:674-679 [Conf]
  124. Bhushan Bauskar, Boleslaw Mikolajczak
    Abstract Node Method for Integration of Object Oriented Design with Colored Petri Nets. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:680-687 [Conf]
  125. Saurabh Mukherjee, Shashikala Tapas
    Modeling and Simulation of Virtual Warfare Using Virtual Reality Paradigm. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:688-689 [Conf]
  126. Yi Yu, Man Lo Kai, Anthony S. Fong
    A Performance Analysis of an Object-Oriented Processor. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:690-694 [Conf]
  127. Kazem Taghva, Min Xu, Emma Regentova, Tom Nartker
    Utilizing XML Schema for Describing and Querying Still Image Databases. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:695-700 [Conf]
  128. Seyyed Mohsen Hashemi, Mohammadreza Razzazi, Ali Bahrami
    ISRUP E-Service Framework for agile Enterprise Architecting. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:701-706 [Conf]
  129. Pengyue J. Lin, Behrokh Samadi, Alan Cipolone, Daniel R. Jeske, Sean Cox, Carlos Rendón, Douglas Holt, Rui Xiao
    Development of a Synthetic Data Set Generator for Building and Testing Information Discovery Systems. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:707-712 [Conf]
  130. Il-Woo Lee, Ho-Jin Park, Kwang-Roh Park, Sang-Ha Kim
    A Proposed Platform & Performance Estimation of Digital-Home Service Delivery/Management Systems. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:713-719 [Conf]
  131. Yoohwan Kim, Ju-Yeon Jo, Kyunghee Kim Suh
    Baseline Profile Stability for Network Anomaly Detection. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:720-725 [Conf]
  132. Basim Alhadidi
    Middleware as an Infrastructure for Network Applications. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:726-729 [Conf]
  133. Tan Ee Xion, Hiew Pang Leang
    Traffic Congestion Controller in Multihop Communication Network. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:730-735 [Conf]
  134. E. Earl Eiland, Lorie M. Liebrock
    Optimizing Network Data Transmission. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:735-741 [Conf]
  135. Mahmoud Fawzy Wagdy, Srishti Vaishnava
    A Fast-Locking Digital Phase-Locked Loop. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:742-746 [Conf]
  136. Alexander Khitun, Kang L. Wang
    Nano Logic Circuits with Spin Wave Bus. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:747-752 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002