The SCEAS System
Navigation Menu

Conferences in DBLP

ACM Symposium on Applied Computing (SAC) (sac)
2005 (conf/sac/2005)

  1. Bob Hutchinson
    The future of systematic information protection. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1- [Conf]
  2. Ramon E. Moore
    Order relations and rigor in computing. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:2- [Conf]
  3. Chih-Cheng Hung
    Editorial message: special track on artificial intelligence, computational logic and image analysis. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:3- [Conf]
  4. Grégory Valigiani, Raphael Biojout, Yannick Jamont, Evelyne Lutton, Claire Bourgeois-République, Pierre Collet
    Experimenting with a real-size man-hill to optimize pedagogical paths. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:4-8 [Conf]
  5. Marco Antonio Montes de Oca, Leonardo Garrido, José-Luis Aguirre
    An hybridization of an ant-based clustering algorithm with growing neural gas networks for classification tasks. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:9-13 [Conf]
  6. Kengo Katayama, Takahiro Koshiishi, Hiroyuki Narihisa
    Reinforcement learning agents with primary knowledge designed by analytic hierarchy process. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:14-21 [Conf]
  7. Shawn Martin, Alex Bäcker
    Estimating manifold dimension by inversion error. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:22-26 [Conf]
  8. Jie Zhou, Giovanni Pasteris
    Data driven approach to designing minimum hamming distance polychotomizer. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:27-31 [Conf]
  9. Huanjing Wang, Allen S. Parrish, Randy K. Smith, Susan V. Vrbsky
    Variable selection and ranking for analyzing automobile traffic accident data. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:32-37 [Conf]
  10. Gaurav Pandey, Himanshu Gupta, Pabitra Mitra
    Stochastic scheduling of active support vector learning algorithms. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:38-42 [Conf]
  11. Dongyong Yang, Jungan Chen
    The T-detectors maturation algorithm based on match range model. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:43-44 [Conf]
  12. Dongseob Jang, Sung Y. Shin, Charlie Y. Shim, C. C. Hung
    A comparison on information fusion methods for air target identification. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:45-46 [Conf]
  13. Huy Hoang To, Shonali Krishnaswamy, Bala Srinivasan
    Mobile agents for network management: when and when not! [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:47-53 [Conf]
  14. Sahin Albayrak, Stefan Wollny, Nicolas Varone, Andreas Lommatzsch, Dragan Milosevic
    Agent technology for personalized information filtering: the PIA-system. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:54-59 [Conf]
  15. Avelino F. Zorzo, Felipe Rech Meneguzzi
    An agent model for fault-tolerant systems. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:60-65 [Conf]
  16. Volker Roth, Ulrich Pinsdorf, Jan Peters
    A distributed content-based search engine based on mobile code. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:66-73 [Conf]
  17. David Hurt, Paul Tarau
    An empirical evaluation of communication effectiveness in autonomous reactive multiagent systems. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:74-78 [Conf]
  18. Hoong Chuin Lau, Hui Wang
    A multi-agent approach for solving optimization problems involving expensive resources. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:79-83 [Conf]
  19. Linli He, Thomas R. Ioerger
    Forming resource-sharing coalitions: a distributed resource allocation mechanism for self-interested agents in computational grids. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:84-91 [Conf]
  20. Mosaab Daoud, Qusay H. Mahmoud
    Reliability analysis of mobile agent-based systems. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:92-93 [Conf]
  21. Ludmil Mikhailov, Petco E. Tsvetinov
    Fuzzy approach to outsourcing of information technology services. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:94-98 [Conf]
  22. Mathew J. Palakal, Sven Rahmann, Birong Liao
    Editorial message: special track on bioinformatics. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:99- [Conf]
  23. Hsiao Ping Lee, Tzu Fang Sheu, Yin-Te Tsai
    Efficient discovery of unique signatures on whole-genome EST databases. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:100-104 [Conf]
  24. Shannon Hastings, Stephen Langella, Scott Oster, Tahsin M. Kurç, Tony Pan, Ümit V. Çatalyürek, Dan Janies, Joel H. Saltz
    Grid-based management of biomedical data using an XML-based distributed data management system. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:105-109 [Conf]
  25. Jake Yue Chen, John V. Carlis, Ning Gao
    A complex biological database querying method. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:110-114 [Conf]
  26. Eric A. Wernert, Jagannathan Lakshmipathy
    PViN: a scalable and flexible system for visualizing pedigree databases. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:115-122 [Conf]
  27. Imad Rahal, Dongmei Ren, Amal Perera, Hassan Najadat, William Perrizo, Riad Rahhal, Willy Valdivia Granda
    Incremental interactive mining of constrained association rules from biological annotation data with nominal features. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:123-127 [Conf]
  28. Andrei Oliveira da Silva, Osmar Norberto de Souza
    A framework for result handling in bioinformatics: an application to computer assisted drug design. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:128-132 [Conf]
  29. James R. Faeder, Michael L. Blinov, William S. Hlavacek
    Graphical rule-based representation of signal-transduction networks. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:133-140 [Conf]
  30. Niranjan Jayadevaprakash, Snehasis Mukhopadhyay, Mathew J. Palakal
    Generating association graphs of non-cooccurring text objects using transitive methods. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:141-145 [Conf]
  31. Yao-Ting Huang, Kun-Mao Chao, Ting Chen
    An approximation algorithm for haplotype inference by maximum parsimony. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:146-150 [Conf]
  32. Sebastian Böcker, Zsuzsanna Lipták
    Efficient mass decomposition. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:151-157 [Conf]
  33. Joc Cing Tay, Atul Jhavar
    CAFISS: a complex adaptive framework for immune system simulation. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:158-164 [Conf]
  34. Jacqueline Signorini, Patrick Greussay
    Object-oriented wound healing in the liver: a class-structured view of fibrogenesis and a glimpse of its evolution. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:165-171 [Conf]
  35. Min Hu, Qunsheng Peng
    Volume fractal dimensionality: a useful parameter for measuring the complexity of 3D protein spatial structures. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:172-176 [Conf]
  36. Rong Chen, Hesham H. Ali
    A new approach for gene prediction using comparative sequence analysis. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:177-184 [Conf]
  37. Paul Davidsson, Johan Hagelbäck, Kenny Svensson
    Comparing approaches to predict transmembrane domains in protein sequences. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:185-189 [Conf]
  38. Mehmet M. Dalkilic, Arijit Sengupta
    Design and evaluation of CATPA: curation and alignment tool for protein analysis. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:190-194 [Conf]
  39. Conrad Plake, Jörg Hakenberg, Ulf Leser
    Optimizing syntax patterns for discovering protein-protein interactions. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:195-201 [Conf]
  40. Shu Ju Hsieh, Yun Sheng Chung, Chun-Yuan Lin, Chuan Yi Tang
    EXONSCAN: EXON prediction with Signal detection and Coding region AligNment in homologous sequences. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:202-203 [Conf]
  41. Baoying Wang, William Perrizo
    Tree-based clustering for gene expression data. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:204-205 [Conf]
  42. Raymond Wan, Hiroshi Mamitsuka, Kiyoko F. Aoki
    Cleaning microarray expression data using Markov random fields based on profile similarity. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:206-207 [Conf]
  43. Zubin Balsara, Steve Roach
    Prediction of inherited and genetic mutations using the software model checker SPIN. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:208-209 [Conf]
  44. Pankaj Kankar, Sougata Mukherjea
    Text-based summarization and visualization of gene clusters. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:210-211 [Conf]
  45. Chandan K. Reddy, Hsiao-Dong Chiang
    Finding saddle points using stability boundaries. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:212-213 [Conf]
  46. Valentin Masero
    Health care information systems. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:214-215 [Conf]
  47. Eduardo Fernández, Tami Sorgente
    An analysis of modeling flaws in HL7 and JAHIS. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:216-223 [Conf]
  48. David J. Power, Mark Slaymaker, Eugenia A. Politou, Andrew C. Simpson
    Protecting sensitive patient data via query modification. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:224-230 [Conf]
  49. Claire Bourgeois-République, Grégory Valigiani, Pierre Collet
    An interactive evolutionary algorithm for cochlear implant fitting: first results. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:231-235 [Conf]
  50. Stefan Jablonski, Rainer Lay, Christian Meiler, Sascha Müller, Wolfgang Hümmer
    Data logistics as a means of integration in healthcare applications. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:236-241 [Conf]
  51. Xiaodong Wu, John Abraham
    The intensity level reduction in radiation therapy. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:242-246 [Conf]
  52. Francisco J. Guerrero, Valentin Masero, Juan M. León-Rojas, José Moreno
    Multilure active contours. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:247-254 [Conf]
  53. Michela Antonelli, Beatrice Lazzerini, Francesco Marcelloni
    Segmentation and reconstruction of the lung volume in CT images. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:255-259 [Conf]
  54. Heng Huang, Li Shen, Fillia Makedon, Sheng Zhang, Mark Greenberg, Ling Gao, Justin D. Pearlman
    A clustering-based approach for prediction of cardiac resynchronization therapy. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:260-266 [Conf]
  55. Kaja Abbas, Armin R. Mikler, Robert Gatti
    Temporal analysis of infectious diseases: influenza. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:267-271 [Conf]
  56. Roozbeh Jafari, Foad Dabiri, Philip Brisk, Majid Sarrafzadeh
    Adaptive and fault tolerant medical vest for life-critical medical monitoring. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:272-279 [Conf]
  57. Giovanni Sartor, Jeremy V. Pitt, Alessandra Villecco
    Computer-aided law and advanced technologies. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:280-281 [Conf]
  58. Mindaugas Kiskis, Rimantas Petrauskas
    Compensating creativity in the digital world: reconciling technology and culture. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:282-286 [Conf]
  59. Slim Rekhis, Noureddine Boudriga
    A formal logic-based language and an automated verification tool for computer forensic investigation. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:287-291 [Conf]
  60. Ben Hachey, Claire Grover
    Sequence modelling for sentence classification in a legal summarisation system. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:292-296 [Conf]
  61. Alessandra Villecco Bettelli
    The employment of XML standards in electronic judicial proceedings. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:297-301 [Conf]
  62. Wei Ren, Hai Jin
    Honeynet based distributed adaptive network forensics and active real time investigation. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:302-303 [Conf]
  63. Giampaolo Bella, Peter Y. A. Ryan
    Special track on computer security. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:304-305 [Conf]
  64. Himanshu Khurana, Adam J. Slagell, Rafael Bonilla
    SELS: a secure e-mail list service. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:306-313 [Conf]
  65. Ginger Myles, Christian S. Collberg
    K-gram based software birthmarks. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:314-318 [Conf]
  66. Dev Anshul, Suman Roy
    A ZKP-based identification scheme for base nodes in wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:319-323 [Conf]
  67. Maurizio Adriano Strangio
    Efficient Diffie-Hellmann two-party key agreement protocols based on elliptic curves. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:324-331 [Conf]
  68. Karsten Sohr, Michael Drouineaud, Gail-Joon Ahn
    Formal specification of role-based security policies for clinical information systems. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:332-339 [Conf]
  69. Victoria Ungureanu
    Efficient support for enterprise delegation policies. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:340-345 [Conf]
  70. Prem Uppuluri, Uday Joshi, Arnab Ray
    Preventing race condition attacks on file-systems. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:346-353 [Conf]
  71. Li Yang, Raimund K. Ege, Huiqun Yu
    Mediation security specification and enforcement for heterogeneous databases. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:354-358 [Conf]
  72. Xinwen Zhang, Yingjiu Li, Divya Nalla
    An attribute-based access matrix model. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:359-363 [Conf]
  73. Stefano Bistarelli, Eric Monfroy, Barry O'Sullivan
    Editorial: special track on constraint solving and programming. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:364-365 [Conf]
  74. Farid Ajili, Robert Rodosek, Andrew Eremin
    A branch-price-and-propagate approach for optimizing IGP weight setting subject to unique shortest paths. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:366-370 [Conf]
  75. Yat Chiu Law, Jimmy Ho-Man Lee
    Breaking value symmetries in matrix models using channeling constraints. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:371-376 [Conf]
  76. Frédéric Goualard, Laurent Granvilliers
    Controlled propagation in continuous numerical constraint networks. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:377-382 [Conf]
  77. Wided Ouaja, Barry Richards
    Hybrid Lagrangian relaxation for bandwidth-constrained routing: knapsack decomposition. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:383-387 [Conf]
  78. Roman Barták, Hana Rudová
    Limited assignments: a new cutoff strategy for incomplete depth-first search. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:388-392 [Conf]
  79. Stefan S. Dantchev, Frank D. Valencia
    On the computational limits of infinite satisfaction. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:393-397 [Conf]
  80. Tony Lambert, Eric Monfroy, Frédéric Saubion
    Solving strategies using a hybridization model for local search and constraint propagation. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:398-403 [Conf]
  81. Sarah O'Connell, Barry O'Sullivan, Eugene C. Freuder
    Timid acquisition of constraint satisfaction problems. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:404-408 [Conf]
  82. Songshan Guo, Weixing Li, Andrew Lim, Fan Wang
    The shortest route cut and fill problem in linear topological structure. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:409-410 [Conf]
  83. Sascha Ossowski, Ronaldo Menezes
    Special track on coordination models, languages and applications. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:411-412 [Conf]
  84. Gian Pietro Picco, Davide Balzarotti, Paolo Costa
    LighTS: a lightweight, customizable tuple space supporting context-aware applications. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:413-419 [Conf]
  85. Alessandro Ricci, Mirko Viroli
    A timed extension of ReSpecT. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:420-427 [Conf]
  86. Rocco De Nicola, Diego Latella, Mieke Massink
    Formal modeling and quantitative analysis of KLAIM-based mobile systems. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:428-435 [Conf]
  87. Juan Guillen Scholten, Farhad Arbab, Frank S. de Boer, Marcello M. Bonsangue
    MoCha-pi, an exogenous coordination calculus based on mobile channels. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:436-442 [Conf]
  88. Giancarlo Fortino, Wilma Russo
    Multi-coordination of mobile agents: a model and a component-based architecture. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:443-450 [Conf]
  89. Juan Manuel Serrano, Sascha Ossowski
    A semantic framework for the recursive specification of interaction protocols. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:451-456 [Conf]
  90. Amine Tafat, Michèle Courant, Béat Hirsbrunner
    Implicit environment-based coordination in pervasive computing. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:457-461 [Conf]
  91. María-Victoria Belmonte, José-Luis Pérez-de-la-Cruz, Francisco Triguero Ruiz, Alberto Fernández
    Agent coordination for bus fleet management. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:462-466 [Conf]
  92. Ronaldo Menezes
    Self-organization and computer security: a case study in adaptive coordination. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:467-468 [Conf]
  93. Sang-Wook Kim, Byeong-Soo Jeong
    Performance bottleneck in time-series subsequence matching. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:469-473 [Conf]
  94. Miriam Baglioni, Barbara Furletti, Franco Turini
    DrC4.5: Improving C4.5 by means of prior knowledge. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:474-481 [Conf]
  95. Malik Agyemang, Ken Barker, Reda Alhajj
    Mining web content outliers using structure oriented weighting techniques and N-grams. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:482-487 [Conf]
  96. Mingjun Song, Sanguthevar Rajasekaran
    Finding frequent itemsets by transaction mapping. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:488-492 [Conf]
  97. Vandana Pursnani Janeja, Vijayalakshmi Atluri
    LS3: a Linear Semantic Scan Statistic technique for detecting anomalous windows. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:493-497 [Conf]
  98. Todd Ebert, Darin Goldstein
    A "Go With the Winners" approach to finding frequent patterns. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:498-502 [Conf]
  99. Giuseppe Carenini, Raymond T. Ng, Xiaodong Zhou, Ed Zwart
    Discovery and regeneration of hidden emails. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:503-510 [Conf]
  100. Tina Eliassi-Rad, Terence Critchlow
    A hybrid approach for multiresolution modeling of large-scale scientific data. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:511-518 [Conf]
  101. Gyesung Lee, Xindong Wu, Jinho Chon
    Rearranging data objects for efficient and stable clustering. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:519-523 [Conf]
  102. Yu Qian, Kang Zhang, Fang Qiu
    Spatial contextual noise removal for post classification smoothing of remotely sensed images. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:524-528 [Conf]
  103. Claudio Silvestri, Salvatore Orlando
    Distributed approximate mining of frequent patterns. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:529-536 [Conf]
  104. Fabrizio Angiulli, Stefano Basta, Clara Pizzuti
    Detection and prediction of distance-based outliers. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:537-542 [Conf]
  105. Yasuhiko Morimoto
    Optimized transitive association rule: mining significant stopover between events. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:543-544 [Conf]
  106. Carlos Ordonez
    A model for association rules based on clustering. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:545-546 [Conf]
  107. Mehmet M. Dalkilic, Arijit Sengupta
    Circle: design and implementation of a classifier based on circuit minimization. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:547-548 [Conf]
  108. Xiaowei Xu, Mutlu Mete, Nurcan Yuruk
    Mining concept associations for knowledge discovery in large textual databases. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:549-550 [Conf]
  109. Rajesh Natarajan, B. Shekar
    A relatedness-based data-driven approach to determination of interestingness of association rules. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:551-552 [Conf]
  110. Jesús S. Aguilar-Ruiz, S. Muthukrishnan
    Editorial message: special track on data streams. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:553-554 [Conf]
  111. Henrike Berthold, Sven Schmidt, Wolfgang Lehner, Claude-Joachim Hamann
    Integrated resource management for data stream systems. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:555-562 [Conf]
  112. Like Gao, Min Wang, Xiaoyang Sean Wang
    Quality-driven evaluation of trigger conditions on streaming time series. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:563-567 [Conf]
  113. Francisco J. Ferrer-Troyano, Jesús S. Aguilar-Ruiz, José Cristóbal Riquelme Santos
    Incremental rule learning based on example nearness from numerical data streams. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:568-572 [Conf]
  114. João Gama, Pedro Medas, Pedro Pereira Rodrigues
    Learning decision trees from dynamic data streams. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:573-577 [Conf]
  115. Christoph Heinz, Bernhard Seeger
    Wavelet density estimators over data streams. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:578-579 [Conf]
  116. Ramzi A. Haraty, Apostolos N. Papadopoulos, Junping Sun
    Editorial message: special track on database theory, technology, and applications. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:580- [Conf]
  117. Man-Soon Kim, Sang-Wook Kim, Miyoung Shin
    Optimization of subsequence matching under time warping in time-series databases. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:581-586 [Conf]
  118. Alejandro Pauly, Markus Schneider
    Identifying topological predicates for vague spatial objects. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:587-591 [Conf]
  119. Lavinia Egidi, Paolo Terenziani
    A flexible approach to user-defined symbolic granularities in temporal databases. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:592-597 [Conf]
  120. Filippo Furfaro, Giuseppe M. Mazzeo, Domenico Saccà, Cristina Sirangelo
    Hierarchical binary histograms for summarizing multi-dimensional data. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:598-603 [Conf]
  121. Caetano Traina Jr., Josiel Maimoni de Figueiredo, Agma J. M. Traina
    Image domain formalization for content-based image retrieval. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:604-609 [Conf]
  122. Dan C. Stefanescu, Alex Thomo, Lida Thomo
    Distributed evaluation of generalized path queries. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:610-616 [Conf]
  123. Renato Bueno, Agma J. M. Traina, Caetano Traina Jr.
    Accelerating approximate similarity queries using genetic algorithms. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:617-622 [Conf]
  124. Andreas Behrend
    Optimizing existential queries in stratifiable deductive databases. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:623-628 [Conf]
  125. Igor Wojnicki, Antoni Ligeza
    Jelly view: a technology for arbitrarily advanced queries within RDBMS. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:629-633 [Conf]
  126. Zhenyu Liu, Ka Cheung Sia, Junghoo Cho
    Cost-efficient processing of MIN/MAX queries over distributed sensors with uncertainty. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:634-641 [Conf]
  127. Luciano Baresi, Elisa Quintarelli
    Graph transformation to infer schemata from XML documents. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:642-646 [Conf]
  128. Nobutaka Suzuki
    Finding an optimum edit script between an XML document and a DTD. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:647-653 [Conf]
  129. Juan Raposo, Alberto Pan, Manuel Álvarez, Ángel Viña
    Automatic wrapper maintenance for semi-structured web sources using results from previous queries. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:654-659 [Conf]
  130. Yongjing Lin, Youtao Zhang, Quanzhong Li, Jun Yang
    Supporting efficient query processing on compressed XML files. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:660-665 [Conf]
  131. Sujatha R. Upadhyaya, P. Sreenivasa Kumar
    ERONTO: a tool for extracting ontologies from extended E/R diagrams. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:666-670 [Conf]
  132. Andrew J. Robinson, J. Wenny Rahayu, Susanna Herd, Tharam S. Dillon
    User-defined view automation of genomic databases. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:671-675 [Conf]
  133. Chris Giannella, Bassem Sayrafi
    An information theoretic histogram for single dimensional selectivity estimation. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:676-677 [Conf]
  134. Robert van Engelen, Nectarios Koziris, Madhusudhan Govindaraju, Kleanthis Psarris
    Editorial message: special track on distributed systems and grid computing. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:678-679 [Conf]
  135. Gurmeet Singh, Ewa Deelman, Gaurang Mehta, Karan Vahi, Mei-Hui Su, G. Bruce Berriman, John Good, Joseph C. Jacob, Daniel S. Katz, Albert Lazzarini, Kent Blackburn, Scott Koranda
    The Pegasus portal: web based grid computing. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:680-686 [Conf]
  136. Radu Prodan, Thomas Fahringer
    Dynamic scheduling of scientific workflow applications on the grid: a case study. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:687-694 [Conf]
  137. Rashedur M. Rahman, Ken Barker, Reda Alhajj
    Replica selection in grid environment: a data-mining approach. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:695-700 [Conf]
  138. Giovanni Aloisio, Massimo Cafaro, Sandro Fiore, Gianvito Quarta
    A grid-based architecture for earth observation data access. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:701-705 [Conf]
  139. Markus Aleksy, Axel Korthaus, Martin Schader
    Realizing the leasing concept in CORBA-based applications. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:706-712 [Conf]
  140. Zhichun Xiao, Wing Ning Li, John Jing-Fu Jenq
    On unit task linear-nonlinear two-cluster scheduling problem. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:713-717 [Conf]
  141. Francesco Quaglia, Paolo Romano
    Reliability in three-tier systems without application server coordination and persistent message queues. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:718-723 [Conf]
  142. Ricardo Neisse, Maria Janilce Bosquiroli Almeida, Lisandro Zambenedetti Granville, Liane Margarida Rockenbach Tarouco
    Policies translation for integrated management of grids and networks. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:724-729 [Conf]
  143. M. Monemizadeh, Hamid Sarbazi-Azad
    The necklace-hypercube: a well scalable hypercube-based interconnection network for multiprocessors. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:729-733 [Conf]
  144. M. Hoseiny Farahabady, Hamid Sarbazi-Azad
    The recursive transpose-connected cycles (RTCC) interconnection network for multiprocessors. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:734-738 [Conf]
  145. Marco Aurélio Spohn, J. J. Garcia-Luna-Aceves
    A solution for the location problem in arbitrary computer networks using generic dominating sets. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:739-743 [Conf]
  146. Wei Zheng, Sheng Zhang, Yi Ouyang, Fillia Makedon, James Ford
    Node clustering based on link delay in P2P networks. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:744-749 [Conf]
  147. Yanqing Ji, Hai Jiang, Vipin Chaudhary
    Adaptation point analysis for computation migration/checkpointing. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:750-751 [Conf]
  148. Rafael Dueire Lins
    Editorial message: special track on document engineering. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:752-753 [Conf]
  149. Vladimir Pervouchine, Graham Leedham, Konstantin Melikhov
    Handwritten character skeletonisation for forensic document analysis. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:754-758 [Conf]
  150. Daniel P. Lopresti
    Performance evaluation for text processing of noisy inputs. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:759-763 [Conf]
  151. Bruno Martins, Mário J. Silva
    Language identification in web pages. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:764-768 [Conf]
  152. Istvan Beszteri, Petri Vuorimaa
    An XForms based solution for adaptable documents editing. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:769-775 [Conf]
  153. Stefan Gruner, Stuart Naven
    Tool support for plagiarism detection in text documents. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:776-781 [Conf]
  154. Paul Tarau, Rada Mihalcea, Elizabeth Figa
    Semantic document engineering with WordNet and PageRank. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:782-786 [Conf]
  155. E. Rodney Canfield, Guangming Xing
    Approximate XML document matching. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:787-788 [Conf]
  156. Sviatoslav Braynov, Manuel Núñez, Peter R. Wurman
    Editorial message: special track on e-commerce technologies. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:789-790 [Conf]
  157. Huseyin Polat, Wenliang Du
    SVD-based collaborative filtering with privacy. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:791-795 [Conf]
  158. Ismael Rodríguez, Natalia López
    Implementing private Vickrey auctions. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:796-800 [Conf]
  159. Himanshu Khurana
    Scalable security and accounting services for content-based publish/subscribe systems. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:801-807 [Conf]
  160. Jiyong Zhang, Pearl Pu
    Effort and accuracy analysis of choice strategies for electronic product catalogs. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:808-814 [Conf]
  161. Gregorio Díaz, Kim Guldstrand Larsen, Juan José Pardo, Fernando Cuartero, Valentin Valero
    An approach to handle real time and probabilistic behaviors in e-commerce: validating the SET protocol. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:815-820 [Conf]
  162. Sheng Zhang, Fillia Makedon
    Privacy preserving learning in negotiation. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:821-825 [Conf]
  163. Jesús Arias-Fisteus, Luis Sánchez Fernández, Carlos Delgado Kloos
    Applying model checking to BPEL4WS business collaborations. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:826-830 [Conf]
  164. Mario Bravetti, Claudio Guidi, Roberto Lucchi, Gianluigi Zavattaro
    Supporting e-commerce systems formalization with choreography languages. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:831-835 [Conf]
  165. Alessio Bechini, François Bodin, Cosimo Antonio Prete
    Editorial message for the special track on embedded systems: applications, solutions, and techniques. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:836-837 [Conf]
  166. Jen-Wei Hsieh, Li-Pin Chang, Tei-Wei Kuo
    Efficient on-line identification of hot data for flash-memory management. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:838-842 [Conf]
  167. Keun Soo Yim, Jihong Kim, Kern Koh
    A fast start-up technique for flash memory based computing systems. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:843-849 [Conf]
  168. Jan-Willem van de Waerdt, Gerrit A. Slavenburg, Jean-Paul van Itegem, Stamatis Vassiliadis
    Motion estimation performance of the TM3270 processor. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:850-856 [Conf]
  169. Shahrooz Feizabadi, Binoy Ravindran, E. Douglas Jensen
    MSA: a memory-aware utility accrual scheduling algorithm. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:857-862 [Conf]
  170. Sreejith K. Menon, Priti Shankar
    A code compression advisory tool for embedded processors. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:863-867 [Conf]
  171. Paul Griffin, Witawas Srisa-an, J. Morris Chang
    On designing a low-power garbage collector for java embedded devices: a case study. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:868-873 [Conf]
  172. Mourad Debbabi, Azzam Mourad, Nadia Tawbi
    Armed E-Bunny: a selective dynamic compiler for embedded Java virtual machine targeting ARM processors. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:874-878 [Conf]
  173. Flavius Gruian, Per Andersson, Krzysztof Kuchcinski, Martin Schoeberl
    Automatic generation of application-specific systems based on a micro-programmed Java core. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:879-884 [Conf]
  174. Christian Del Rosso
    Performance analysis framework for large software-intensive systems with a message passing paradigm. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:885-889 [Conf]
  175. Ning Weng, Tilman Wolf
    Profiling and mapping of parallel workloads on network processors. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:890-896 [Conf]
  176. Ya-Shu Chen, Li-Pin Chang, Tei-Wei Kuo, Aloysius K. Mok
    Real-time task scheduling anomaly: observations and prevention. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:897-898 [Conf]
  177. Roozbeh Jafari, Foad Dabiri, Bo-Kyung Choi, Majid Sarrafzadeh
    Efficient placement and routing in grid-based networks. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:899-900 [Conf]
  178. Ben H. H. Juurlink, Asadollah Shahbahrami, Stamatis Vassiliadis
    Avoiding data conversions in embedded media processors. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:901-902 [Conf]
  179. Shih-Hsi Liu, Barrett R. Bryant, Jeffrey G. Gray, Rajeev R. Raje, Andrew M. Olson, Mikhail Auguston
    Two-level assurance of QoS requirements for distributed real-time and embedded systems. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:903-904 [Conf]
  180. Bryant A. Julstrom
    Editorial message: special track on applications of evolutionary computation. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:905-906 [Conf]
  181. Daniel Delahaye, Sofiane Oussedik, Stephane Puechmorel
    Airspace congestion smoothing by multi-objective genetic algorithm. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:907-912 [Conf]
  182. Andrew Lim, Xingwen Zhang
    The container loading problem. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:913-917 [Conf]
  183. Na Tang, V. Rao Vemuri
    An artificial immune system approach to document clustering. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:918-922 [Conf]
  184. Ivan De Falco, Ernesto Tarantino, Antonio Della Cioppa, F. Gagliardi
    A new variable-length genome genetic algorithm for data clustering in semeiotics. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:923-927 [Conf]
  185. Ivan De Falco, Ernesto Tarantino, Antonio Della Cioppa, F. Gagliardi
    A novel grammar-based genetic programming approach to clustering. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:928-932 [Conf]
  186. Andrew Lim, Yi Zhu, Q. Lou, Brian Rodrigues
    Heuristic methods for graph coloring problems. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:933-939 [Conf]
  187. L. Zhang, Songshan Guo, Yunsong Zhu, Andrew Lim
    A tabu search algorithm for the safe transportation of hazardous materials. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:940-946 [Conf]
  188. Jeffrey S. Goettl, Alexander W. Brugh, Bryant A. Julstrom
    Call me e-mail: arranging the keyboard with a permutation-coded genetic algorithm. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:947-951 [Conf]
  189. Haiyu Hou, Gerry V. Dozier
    Immunity-based intrusion detection system design, vulnerability analysis, and GENERTIA's genetic arms race. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:952-956 [Conf]
  190. Ivan De Falco, Ernesto Tarantino, Antonio Della Cioppa, Alessandro Passaro
    Inductive inference of chaotic series by Genetic Programming: a Solomonoff-based approach. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:957-958 [Conf]
  191. Jesús S. Aguilar-Ruiz, Federico Divina
    Evolutionary computation for biclustering of gene expression. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:959-960 [Conf]
  192. Qusay H. Mahmoud, Zakaria Maamar
    Special track on handheld computing. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:961-962 [Conf]
  193. Timothy O'Sullivan, Richard Studdert
    Agent technology and reconfigurable computing for mobile devices. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:963-969 [Conf]
  194. Ankit Arora, Alexander Ferworn
    Pocket PC beacons: Wi-Fi based human tracking and following. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:970-974 [Conf]
  195. Carolyn R. Watters, Rui Zhang, Jack Duffy
    Comparing table views for small devices. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:975-980 [Conf]
  196. Mattia Monga, Angelo Scotto
    A generic serializer for mobile devices. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:981-985 [Conf]
  197. Eiko Yoneki, Jean Bacon
    Dynamic group communication in mobile peer-to-peer environments. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:986-992 [Conf]
  198. Abdelghani Bellaachia, Iehab Al Rassan
    Efficiency of prefix and non-prefix codes in string matching over compressed databases on handheld devices. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:993-997 [Conf]
  199. Jean-Charles Tournier, Jean-Philippe Babau, Vincent Olive
    An evaluation of Qinna, a component-based QoS architecture for embedded systems. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:998-1002 [Conf]
  200. Angela Carrillo Ramos, Jérôme Gensel, Marlène Villanova-Oliver, Hervé Martin
    PUMAS: a framework based on ubiquitous agents for accessing web information systems through mobile devices. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1003-1008 [Conf]
  201. Fabio Crestani, Gabriella Pasi
    Editorial message: special track on information access and retrieval. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1009-1010 [Conf]
  202. Mustapha Baziz, Mohand Boughanem, Nathalie Aussenac-Gilles, Claude Chrisment
    Semantic cores for representing documents in IR. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1011-1017 [Conf]
  203. Michel Beigbeder, Annabelle Mercier
    An information retrieval model using the fuzzy proximity degree of term occurences. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1018-1022 [Conf]
  204. Wai Gen Yee, Ophir Frieder
    On search in peer-to-peer file sharing systems. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1023-1030 [Conf]
  205. Masashi Inoue, Naonori Ueda
    Retrieving lightly annotated images using image similarities. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1031-1037 [Conf]
  206. Dmitriy Fradkin, Paul B. Kantor
    Methods for learning classifier combinations: no clear winner. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1038-1043 [Conf]
  207. Yan-Shi Dong, Ke-Song Han
    Text classification based on data partitioning and parameter varying ensembles. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1044-1048 [Conf]
  208. Hui Han, Eren Manavoglu, Hongyuan Zha, Kostas Tsioutsiouliklis, C. Lee Giles, Xiangmin Zhang
    Rule-based word clustering for document metadata extraction. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1049-1053 [Conf]
  209. Fan Li, Yiming Yang
    Using recursive classification to discover predictive features. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1054-1058 [Conf]
  210. Thomas Mandl, Christa Womser-Hacker
    The effect of named entities on effectiveness in cross-language information retrieval evaluation. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1059-1064 [Conf]
  211. Hui Han, Wei Xu, Hongyuan Zha, C. Lee Giles
    A hierarchical naive Bayes mixture model for name disambiguation in author citations. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1065-1069 [Conf]
  212. Ling Ma, Nazli Goharian
    Query length impact on misuse detection in information retrieval systems. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1070-1075 [Conf]
  213. Zhenyu Liu, Wesley W. Chu
    Knowledge-based query expansion to support scenario-specific retrieval of medical free text. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1076-1083 [Conf]
  214. Laali Elkhalifa, Raman Adaikkalavan, Sharma Chakravarthy
    InfoFilter: a system for expressive pattern specification and detection over text streams. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1084-1088 [Conf]
  215. Chunhua Cui, Hiroyuki Kitagawa
    Topic activation analysis for document streams based on document arrival rate and relevance. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1089-1095 [Conf]
  216. Hamid Tebri, Mohand Boughanem, Claude Chrisment
    Incremental profile learning based on a reinforcement method. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1096-1101 [Conf]
  217. Rickard Cöster, Martin Svensson
    Incremental collaborative filtering for mobile devices. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1102-1106 [Conf]
  218. Gloria Bordogna, Giuseppe Psaila
    Extending SQL with customizable soft selection conditions. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1107-1111 [Conf]
  219. Xuequn Shang, Kai-Uwe Sattler
    Depth-first frequent itemset mining in relational databases. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1112-1117 [Conf]
  220. Hong Va Leong, Alvin T. S. Chan
    Editorial message: special track on mobile computing and applications. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1118-1119 [Conf]
  221. Xing Gao, Ali R. Hurson
    Location dependent query proxy. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1120-1124 [Conf]
  222. Yuni Xia, Sunil Prabhakar, Shan Lei, Reynold Cheng, Rahul Shah
    Indexing continuously changing data with mean-variance tree. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1125-1132 [Conf]
  223. Tomoaki Kaneda, Youhei Tanaka, Tomoya Enokido, Makoto Takizawa
    Transactional agent model for fault-tolerant object systems. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1133-1138 [Conf]
  224. Takehiro Nakayama
    Alternative source coding model for mobile text communication. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1139-1145 [Conf]
  225. Djalel Chefrour
    Developing component based adaptive applications in mobile environments. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1146-1150 [Conf]
  226. Celso Maciel da Costa, Marcelo da Silva Strzykalski, Guy Bernard
    A reflective middleware architecture to support adaptive mobile applications. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1151-1154 [Conf]
  227. Flávia Coimbra Delicato, Paulo F. Pires, Luiz F. Rust da Costa Carmo, Luci Pirmez, José Ferreira de Rezende
    Reflective middleware for wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1155-1159 [Conf]
  228. Akimitsu Kanzaki, Takahiro Hara, Shojiro Nishio
    An adaptive TDMA slot assignment protocol in ad hoc sensor networks. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1160-1165 [Conf]
  229. Christopher L. Barrett, Stephan Eidenbenz, Lukas Kroc, Madhav V. Marathe, James P. Smith
    Probabilistic multi-path vs. deterministic single-path protocols for dynamic ad-hoc network scenarios. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1166-1173 [Conf]
  230. Takahiro Hara
    Location management of data items in mobile ad hoc networks. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1174-1175 [Conf]
  231. Guohui Li, Hongya Wang, Yunsheng Liu, Jixiong Chen
    Mobile real-time read-only transaction processing in data broadcast environments. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1176-1177 [Conf]
  232. Chaman L. Sabharwal
    MultiMedia and visualization track. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1178-1179 [Conf]
  233. Benjamin Bustos, Daniel A. Keim, Tobias Schreck
    A pivot-based index structure for combination of feature vectors. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1180-1184 [Conf]
  234. Maik Flanagin, Aurélien Grenotton, Jay J. Ratcliff, Mahdi Abdelguerfi, Kevin Shaw
    Automated terrain generation using LIDAR and waterbody survey data. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1185-1189 [Conf]
  235. June-Suh Cho, Joonsoo Choi
    Contour-based partial object recognition using symmetry in image databases. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1190-1194 [Conf]
  236. Nualsawat Hiransakolwong, Kien A. Hua, Soontharee Koompairojn, Khanh Vu, Sheau-Dong Lang
    An adaptive distance computation technique for image retrieval systems. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1195-1199 [Conf]
  237. Nathaniel Fout, Jian Huang, Zhaohua Ding
    Visualization of neuronal fiber connections from DT-MRI with global optimization. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1200-1206 [Conf]
  238. Ilmi Yoon, Sanghyuk Yoon, Neo Martinez, Rich Williams, Jennifer Dunne
    Interactive 3D visualization of highly connected ecological networks on the WWW. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1207-1212 [Conf]
  239. Byungwoo Kim, Jong P. Yoon
    Similarity measurement for aggregation of spatial objects. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1213-1217 [Conf]
  240. Fabio Jun Takada Chino, Marcos R. Vieira, Agma J. M. Traina, Caetano Traina Jr.
    MAMView: a visual tool for exploring and understanding metric access methods. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1218-1223 [Conf]
  241. Nathaniel Fout, Kwan-Liu Ma, James P. Ahrens
    Time-varying, multivariate volume data reduction. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1224-1230 [Conf]
  242. Jonathan McPherson, Kwan-Liu Ma, Michael Ogawa
    Discovering parametric clusters in social small-world graphs. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1231-1238 [Conf]
  243. Yu Qian, Kang Zhang
    The role of visualization in effective data cleaning. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1239-1243 [Conf]
  244. James R. Miller, Serhan Yengulalp, Patrick L. Sterner
    A framework for collaborative control of applications. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1244-1249 [Conf]
  245. Christopher P. Walker, Norbert Maerz, Michael G. Hilgers
    Surface reconstruction using shadow profilometry. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1250-1251 [Conf]
  246. Hiroshi Hosobe
    Solving linear and one-way constraints for web document layout. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1252-1253 [Conf]
  247. Leonard Brown
    Issues in augmenting image databases to improve processing content-based similarity searches. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1254-1255 [Conf]
  248. Davide Ancona, Rajeev R. Raje, Mirko Viroli
    Editorial message: special track on object oriented programming languages and systems. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1256-1257 [Conf]
  249. Lorenzo Bettini, Viviana Bono, Silvia Likavec
    Safe and flexible objects. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1258-1263 [Conf]
  250. Walter Cazzola, Antonio Cisternino, Diego Colombo
    [a]C#: C# with a customizable code annotation mechanism. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1264-1268 [Conf]
  251. Tetsuo Kamina, Tetsuo Tamai
    Selective method combination in mixin-based composition. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1269-1273 [Conf]
  252. Christian Heinlein
    Virtual namespace functions: an alternative to virtual member functions in C++ and advice in AspectC++. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1274-1281 [Conf]
  253. Bruno Cabral, Paulo Marques, Luís Moura Silva
    RAIL: code instrumentation for .NET. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1282-1287 [Conf]
  254. Shruti Gorappa, Raymond Klefstad
    Empirical evaluation of OpenCCM for Java-based distributed, real-time, and embedded systems. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1288-1292 [Conf]
  255. José M. Tribolet, Robert Winter, Artur Caetano
    Editorial message: special track on organizational engineering. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1293-1294 [Conf]
  256. Christian Braun, Felix Wortmann, Martin Hafner, Robert Winter
    Method construction - a core approach to organizational engineering. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1295-1299 [Conf]
  257. Steven J. Bleistein, Karl Cox, June M. Verner
    Strategic alignment in requirements analysis for organizational IT: an integrated approach. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1300-1307 [Conf]
  258. Artur Caetano, António Rito Silva, José M. Tribolet
    Using roles and business objects to model and understand business processes. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1308-1313 [Conf]
  259. Simona Colucci, Tommaso Di Noia, Eugenio Di Sciascio, Francesco M. Donini, Giacomo Piscitelli, Stefano Coppi
    Knowledge based approach to semantic composition of teams in an organization. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1314-1319 [Conf]
  260. Roel Wieringa, Jaap Gordijn
    Value-oriented design of service coordination processes: correctness and trust. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1320-1327 [Conf]
  261. Andreas Schaad, Pascal Spadone, Helmut Weichsel
    A case study of separation of duty properties in the context of the Austrian "eLaw" process. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1328-1332 [Conf]
  262. Joachim Schelp, Alexander Schwinn
    Extending the business engineering framework for application integration purposes. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1333-1337 [Conf]
  263. Lerina Aversano, Thierry Bodhuin, Maria Tortorella
    Assessment and impact analysis for aligning business processes and software systems. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1338-1343 [Conf]
  264. Carla Marques Pereira, Pedro Sousa
    Enterprise architecture: business and IT alignment. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1344-1345 [Conf]
  265. Walter Cazzola, Sonia Pini, Massimo Ancona
    AOP for software evolution: a design oriented approach. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1346-1350 [Conf]
  266. Frederic Ogel, Gaël Thomas, Bertil Folliot
    Supporting efficient dynamic aspects through reflection and dynamic compilation. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1351-1356 [Conf]
  267. Francisco Heron de Carvalho Junior, Rafael Dueire Lins
    The # model: separation of concerns for reconciling modularity, abstraction and efficiency in distributed parallel programming. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1357-1364 [Conf]
  268. Xiaoqing Wu, Suman Roychoudhury, Barrett R. Bryant, Jeffrey G. Gray, Marjan Mernik
    A two-dimensional separation of concerns for compiler construction. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1365-1369 [Conf]
  269. Hui Wu, Jeffrey G. Gray, Suman Roychoudhury, Marjan Mernik
    Weaving a debugging aspect into domain-specific language grammars. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1370-1374 [Conf]
  270. Marco Milazzo, Giuseppe Pappalardo, Emiliano Tramontana, Giuseppe Ursino
    Handling run-time updates in distributed applications. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1375-1380 [Conf]
  271. Antonella Di Stefano, Marco Fargetta, Giuseppe Pappalardo, Emiliano Tramontana
    Metrics for evaluating concern separation and composition. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1381-1382 [Conf]
  272. Chang-Hyun Jo, Marjan Mernik, Barrett R. Bryant
    Editorial: programming languages track. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1383-1384 [Conf]
  273. Burak Emir
    Compiling regular patterns to sequential machines. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1385-1389 [Conf]
  274. Giovanni Rimassa, Mirko Viroli
    Understanding access restriction of variant parametric types and Java wildcards. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1390-1397 [Conf]
  275. Thomas Cleenewerck, Theo D'Hondt
    Disentangling the implementation of local-to-global transformations in a rewrite rule transformation system. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1398-1403 [Conf]
  276. Lunjin Lu
    Use of correctness assertions in declarative diagnosis. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1404-1408 [Conf]
  277. Rémi Forax, Étienne Duris, Gilles Roussel
    Reflection-based implementation of Java extensions: the double-dispatch use-case. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1409-1413 [Conf]
  278. Hai-Feng Guo, Bharat Jayaraman
    Mode-directed preferences for logic programs. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1414-1418 [Conf]
  279. Qian Wang, Gopal Gupta
    Rapidly prototyping implementation infrastructure of domain specific languages: a semantics-based approach. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1419-1426 [Conf]
  280. Paul Tarau
    Agent oriented logic programming in Jinni 2004. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1427-1428 [Conf]
  281. Martine Ceberio, Vladik Kreinovich, Michel Rueher
    Editorial: track reliable computations and their applications. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1429-1430 [Conf]
  282. Ramon E. Moore
    Order relations and rigor in computing. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1431-1433 [Conf]
  283. Frédéric Goualard
    On considering an interval constraint solving algorithm as a free-steering nonlinear Gauss-Seidel procedure. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1434-1438 [Conf]
  284. Gilles Chabert, Gilles Trombettoni, Bertrand Neveu
    Box-set consistency for interval-based constraint problems. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1439-1443 [Conf]
  285. Qiang Duan, Chenyi Hu, Han-Chieh Wei
    Enhancing network intrusion detection systems with interval methods. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1444-1448 [Conf]
  286. Olga Kosheleva, Vladik Kreinovich, Günter Mayer, Hung T. Nguyen
    Computing the cube of an interval matrix is NP-Hard. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1449-1453 [Conf]
  287. Stefan Gruner, Alessandra Cavarra, Sung Shin
    Editorial message: special track on software engineering: methods, practices, and tools. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1454-1455 [Conf]
  288. Áine Mitchell, James F. Power
    Using object-level run-time metrics to study coupling between objects. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1456-1462 [Conf]
  289. Kai-Yuan Cai, T. Y. Chen, Yong-Chao Li, Wei-Yi Ning, Y. T. Yu
    Adaptive testing of software components. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1463-1469 [Conf]
  290. M. Brian Blake, Kevin Cleary, Sohan Ranjan, Luis Ibáñez, Kevin Gary
    Use case-driven component specification: a medical applications perspective to product line development. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1470-1477 [Conf]
  291. Gerardo Canfora, Aniello Cimitile, Félix García, Mario Piattini, Corrado Aaron Visaggio
    Confirming the influence of educational background in pair-design knowledge through experiments. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1478-1484 [Conf]
  292. W. Eric Wong, Yu Qi, Kendra Cooper
    Source code-based software risk assessing. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1485-1490 [Conf]
  293. Axel Anders Kvale, Jingyue Li, Reidar Conradi
    A case study on building COTS-based system using aspect-oriented programming. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1491-1498 [Conf]
  294. Matthew J. Rummel, Gregory M. Kapfhammer, Andrew Thall
    Towards the prioritization of regression test suites with data flow information. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1499-1504 [Conf]
  295. Ed Mancebo, Anneliese Amschler Andrews
    A strategy for selecting multiple components. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1505-1510 [Conf]
  296. Pradeep Varma, Ashok Anand, Donald P. Pazel, Beth Tibbitts
    NextGen eXtreme porting: structured by automation. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1511-1517 [Conf]
  297. Richard F. Paige, Howard Chivers, John A. McDermid, Zoë R. Stephenson
    High-integrity extreme programming. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1518-1523 [Conf]
  298. YoungJoon Byun, Beverly A. Sanders
    A pattern-based development methodology for communication protocols. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1524-1528 [Conf]
  299. Xinpei Zhao, Keith Chan, Mingshu Li
    Applying agent technology to software process modeling and process-centered software engineering environment. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1529-1533 [Conf]
  300. Andrea Trentini, Daniela Micucci
    Plan validation via petri nets in the real-time performers Java framework. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1534-1538 [Conf]
  301. Songsri Tangsripairoj, Mansur H. Samadzadeh
    Organizing and visualizing software repositories using the growing hierarchical self-organizing map. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1539-1545 [Conf]
  302. Ninh-Thuan Truong, Jeanine Souquières
    Verification of behavioural elements of UML models using B. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1546-1552 [Conf]
  303. Fei Cao, Barrett R. Bryant, Wei Zhao, Carol C. Burt, Rajeev R. Raje, Andrew M. Olson, Mikhail Auguston
    Marshaling and unmarshaling models using the entity-relationship model. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1553-1557 [Conf]
  304. Junyoung Heo, Sangho Yi, Yookun Cho, Jiman Hong, Sung Y. Shin
    Space-efficient page-level incremental checkpointing. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1558-1562 [Conf]
  305. Tiago Stein D'Agostini, Antônio Augusto Fröhlich
    Bridging AOP to SMP: turning GCC into a metalanguage preprocessor. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1563-1564 [Conf]
  306. Stephen Doxsee, William B. Gardner
    Synthesis of C++ software for automated teller from CSPm specifications. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1565-1566 [Conf]
  307. Li Yang, Raimund K. Ege, Huiqun Yu
    Mediation framework modeling and verification by SAM. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1567-1568 [Conf]
  308. Jean-Marc Seigneur, Christian Damsgaard Jensen
    Editorial message special track on trust, recommendations, evidence and other collaboration know-how (TRECK). [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1569- [Conf]
  309. Michael Kinateder, Ralf Terdic, Kurt Rothermel
    Strong pseudonymous communication for peer-to-peer reputation systems. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1570-1576 [Conf]
  310. Seamus Moloney
    Simulation of a distributed recommendation system for pervasive networks. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1577-1581 [Conf]
  311. Yanjun Zuo, Brajendra Panda
    Component based trust management in the context of a virtual organization. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1582-1588 [Conf]
  312. Paolo Avesani, Paolo Massa, Roberto Tiella
    A trust-enhanced recommender system application: Moleskiing. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1589-1593 [Conf]
  313. Kemal Bicakci, Bruno Crispo, Andrew S. Tanenbaum
    How to incorporate revocation status information into the trust metrics for public-key certification. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1594-1598 [Conf]
  314. George Roussos, George Samaras
    Editorial message: special track on ubiquitous computing. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1599- [Conf]
  315. Yanna Vogiazou, Marc Eisenstadt, Martin Dzbor, Jirí Komzák
    From buddyspace to CitiTag: large-scale symbolic presence for community building and spontaneous play. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1600-1606 [Conf]
  316. Thorsten Staake, Frédéric Thiesse, Elgar Fleisch
    Extending the EPC network: the potential of RFID in anti-counterfeiting. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1607-1612 [Conf]
  317. Kaori Fujinami, Tatsuo Nakajima
    Towards system software for physical space applications. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1613-1620 [Conf]
  318. Kartik Vishwanath, Arvind Gautam, Yugyung Lee
    Intelligent file management in ubiquitous environments. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1621-1625 [Conf]
  319. Tope Omitola
    Declarative control of the future home environment. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1626-1627 [Conf]
  320. Cristina Cachero, Sara Comai, Maristella Matera
    Editorial message: special track on web technologies and applications. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1628-1629 [Conf]
  321. Xia Sun, Qinghua Zheng
    An approach to acquire semantic relationships between terms. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1630-1633 [Conf]
  322. Lawrence H. Reeve, Hyoil Han
    Survey of semantic annotation platforms. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1634-1638 [Conf]
  323. Dario Bonino, Fulvio Corno, Federico Pescarmona
    Automatic learning of text-to-concept mappings exploiting WordNet-like lexical networks. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1639-1644 [Conf]
  324. François Bry, Paula-Lavinia Patranjan
    Reactivity on the web: paradigms and applications of the language XChange. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1645-1649 [Conf]
  325. Yi-Hsuan Lu, Yoojin Hong, Jinesh Varia, Dongwon Lee
    Pollock: automatic generation of virtual web services from web sites. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1650-1655 [Conf]
  326. Zakaria Maamar, Djamal Benslimane, Chirine Ghedira, Qusay H. Mahmoud, Hamdi Yahyaoui
    Tuple spaces for self-coordination of web services. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1656-1660 [Conf]
  327. Laura Bocchi, Paolo Ciancarini, Rocco Moretti, Valentina Presutti, Davide Rossi
    An OWL-S based approach to express grid services coordination. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1661-1667 [Conf]
  328. Manuele Kirsch-Pinheiro, Marlène Villanova-Oliver, Jérôme Gensel, Hervé Martin
    Context-aware filtering for collaborative web systems: adapting the awareness information to the user's context. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1668-1673 [Conf]
  329. Luciano Baresi, Sebastiano Colazzo, Luca Mainetti
    First experiences on constraining consistency and adaptivity of W2000 models. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1674-1678 [Conf]
  330. Yuming Zhou, Baowen Xu
    Measuring structural complexity for class diagrams: an information theory approach. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1679-1683 [Conf]
  331. Richard Atterer
    Where web engineering tool support ends: building usable websites. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1684-1688 [Conf]
  332. Luca Balzerani, Davide Di Ruscio, Alfonso Pierantonio, Guglielmo De Angelis
    A product line architecture for web applications. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1689-1693 [Conf]
  333. Carlo Bellettini, Alessandro Marchetto, Andrea Trentini
    TestUml: user-metrics driven web applications testing. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1694-1698 [Conf]
  334. Giuliano Casale
    Combining queueing networks and web usage mining techniques for web performance analysis. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1699-1703 [Conf]
  335. Nabor C. Mendonça, José Airton F. Silva
    An empirical evaluation of client-side server selection policies for accessing replicated web services. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1704-1708 [Conf]
  336. Raffaella Grieco, Delfina Malandrino, Vittorio Scarano
    SEcS: scalable edge-computing services. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1709-1713 [Conf]
  337. Lule Ahmedi
    Making XPath reach for the web-wide links. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1714-1721 [Conf]
  338. Sandip Debnath, Prasenjit Mitra, C. Lee Giles
    Automatic extraction of informative blocks from webpages. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1722-1726 [Conf]
  339. Raman Adaikkalavan, Sharma Chakravarthy
    SmartGate: a smart push-pull approach to support role-based security in web gateways. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1727-1731 [Conf]
  340. Hao Jin, Curtis E. Dyreson
    Sanitizing using metadata in MetaXQuery. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1732-1736 [Conf]
  341. Ronaldo Luna, William T. Lawrence, John M. Sullivan, Richard Hall, Michael G. Hilgers, Matt Buechler
    Learning system to introduce GIS to civil engineers. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1737-1738 [Conf]
  342. Abdelkarim Erradi, Piyush Maheshwari
    wsBus: a framework for reliable web services interactions. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1739-1740 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002