The SCEAS System
Navigation Menu

Conferences in DBLP

Computer Applications in Industry and Engineering (caine)
2006 (conf/caine/2006)

  1. Eduardo Islas, Miguel Pérez, Benjamín Zayas Pérez, Carlos Espinosa, Rita Beltran, Evelyn Vega
    Evaluation methodology for virtual reality software tools. [Citation Graph (0, 0)][DBLP]
    CAINE, 2006, pp:1-7 [Conf]
  2. M. Mohy Mahmoud, Amr Goneid, Suhair Amer
    Image compression of facial photographs based on BTC/TSVQ local processing. [Citation Graph (0, 0)][DBLP]
    CAINE, 2006, pp:8-13 [Conf]
  3. Rezwanur Rahman, Morshed U. Chowdhury, S. M. Raiyan Kabir, M. Rezwan Khan
    A novel method for person identification by comparing retinal patterns. [Citation Graph (0, 0)][DBLP]
    CAINE, 2006, pp:14-17 [Conf]
  4. Stephen Krebsbach, George Hamer
    Achieving near-optimal distortion reduction with invisible watermarking RSSI algorithms. [Citation Graph (0, 0)][DBLP]
    CAINE, 2006, pp:18-23 [Conf]
  5. Justin Molineaux, Jianhua Xuan, Ting Gong, Yitan Zhu, Eric Hoffman, Robert Clarke, Yue Wang
    ModVis: An information visualization tool for gene module discovery. [Citation Graph (0, 0)][DBLP]
    CAINE, 2006, pp:24-31 [Conf]
  6. Lingjia Gu, Shuxu Guo, Jin Duan, Wenbo Jing, Ruizhi Ren
    Research of the novel fast dynamic target detection method. [Citation Graph (0, 0)][DBLP]
    CAINE, 2006, pp:32-36 [Conf]
  7. Mahmuda Naznin, Kendall E. Nygard
    Adaptive coverage in heterogeneous sensor network. [Citation Graph (0, 0)][DBLP]
    CAINE, 2006, pp:37-40 [Conf]
  8. Jens A. Hansen, Thomas D. Nielsen, Henrik Schiøler
    A COTS framework for sensor fusion using dynamic bayesian networks in livestock production. [Citation Graph (0, 0)][DBLP]
    CAINE, 2006, pp:41-47 [Conf]
  9. Kemal Taljanovic, Mehmed M. Kantardzic
    Computer-aided item selection for the cycle counting procedure. [Citation Graph (0, 0)][DBLP]
    CAINE, 2006, pp:48-53 [Conf]
  10. Marwan S. Sleiman, Lester Lipsky, Kishori M. Konwar
    Performance modeling of hierarchical memories. [Citation Graph (0, 0)][DBLP]
    CAINE, 2006, pp:54-59 [Conf]
  11. Ahmed M. Mohamed, S. A. Younies
    Modeling the dynamic load in distributed control systems (DCS). [Citation Graph (0, 0)][DBLP]
    CAINE, 2006, pp:60-65 [Conf]
  12. Angkul Kongmunvattana
    Task-migration support for parallel computing on shared virtual memory clusters. [Citation Graph (0, 0)][DBLP]
    CAINE, 2006, pp:66-71 [Conf]
  13. Frederick C. Harris Jr., Mark C. Ballew, Jason Baurick, James Frye, Lance Hutchinson, James G. King, Philip H. Goodman, Rich Drewes
    A novel parallel hardware and software solution for a large-scale biologically realistic cortical simulation. [Citation Graph (0, 0)][DBLP]
    CAINE, 2006, pp:72-77 [Conf]
  14. K. Mayfield, A. Joseph, S. Black, H. Bui, Nelson L. Passos
    Scheduling multi-dimensional loops in a computer cluster. [Citation Graph (0, 0)][DBLP]
    CAINE, 2006, pp:78-82 [Conf]
  15. Ramzi A. Haraty, Lana Turk
    A comparative study of replacement algorithms used in the scalable asynchronous cache consistency scheme. [Citation Graph (0, 0)][DBLP]
    CAINE, 2006, pp:83-88 [Conf]
  16. Hsine-Jen Tsai, Les L. Miller, Hua Ming, Rebecca Wemhoff, Sara Nusser
    Combining spatial data from multiple data sources. [Citation Graph (0, 0)][DBLP]
    CAINE, 2006, pp:89-94 [Conf]
  17. George Hamer, Stephen Krebsbach
    Statistical steganography and steganalysis of database tables. [Citation Graph (0, 0)][DBLP]
    CAINE, 2006, pp:95-101 [Conf]
  18. Carl G. Looney
    Clustering via a kernel fuzzy connectivity matrix. [Citation Graph (0, 0)][DBLP]
    CAINE, 2006, pp:102-107 [Conf]
  19. Prabhat Mahanti, D. K. Swami, Mohammed Al-Fayoumi
    Classification rule extraction approach based on homogeneous training samples. [Citation Graph (0, 0)][DBLP]
    CAINE, 2006, pp:108-113 [Conf]
  20. Mehdi Owrang, Les L. Miller
    Knowledge discovery on multi-relations distributed databases. [Citation Graph (0, 0)][DBLP]
    CAINE, 2006, pp:114-119 [Conf]
  21. Xiaoming Ding, Liping Zhang, Yiqiang Lu, Ridong Jiang
    A feature recognition approach for mold machining. [Citation Graph (0, 0)][DBLP]
    CAINE, 2006, pp:120-125 [Conf]
  22. Honoriu Valean, Liviu Miclea, Enyedi Szilárd
    Surveillance of a complex heterogeneous system using software agents - case study on a hydroelectric power plant chain. [Citation Graph (0, 0)][DBLP]
    CAINE, 2006, pp:126-131 [Conf]
  23. Mariana Hentea
    Enhancing information security risk management with data mining and fuzzy logic techniques. [Citation Graph (0, 0)][DBLP]
    CAINE, 2006, pp:132-139 [Conf]
  24. Donna L. Hudson, Maurice E. Cohen
    Application of soft solutions for signal analysis. [Citation Graph (0, 0)][DBLP]
    CAINE, 2006, pp:140-144 [Conf]
  25. Ahmed Kamel
    A telephone communication agent for agent/user interaction. [Citation Graph (0, 0)][DBLP]
    CAINE, 2006, pp:145-150 [Conf]
  26. Deok Hee Nam, Harpreet Singh, Susil K. Putatunda
    Material processing for ADI data using neuro fuzzy system. [Citation Graph (0, 0)][DBLP]
    CAINE, 2006, pp:151-156 [Conf]
  27. Ekkasit Tiamkaew, Jirakhom Ruttanavakul
    Efficiently evolving multiple robots using distributed genetic algorithms. [Citation Graph (0, 0)][DBLP]
    CAINE, 2006, pp:157-161 [Conf]
  28. Hamzeh K. Al Shaar, Ramzi A. Haraty
    A three poled model for web applications. [Citation Graph (0, 0)][DBLP]
    CAINE, 2006, pp:162-166 [Conf]
  29. Vic Grout, Stuart Cunningham
    Complexity issues in control software design: A practical perspective. [Citation Graph (0, 0)][DBLP]
    CAINE, 2006, pp:167-174 [Conf]
  30. N. Z. Azeemi
    A multiobjective evolutionary approach for constrained joint source code optimization. [Citation Graph (0, 0)][DBLP]
    CAINE, 2006, pp:175-180 [Conf]
  31. Raed Shatnawi, Wei Li
    An empirical study of the boundary values of the object-oriented metrics. [Citation Graph (0, 0)][DBLP]
    CAINE, 2006, pp:181-186 [Conf]
  32. Jie Cao, Shashi S. Marikunte
    Simple factory design pattern by auto-registration and applications. [Citation Graph (0, 0)][DBLP]
    CAINE, 2006, pp:187-192 [Conf]
  33. P. K. Mahanti, K. Rajnish, Vandana Bhattacherjee
    Measuring class cohesion: An empirical approach. [Citation Graph (0, 0)][DBLP]
    CAINE, 2006, pp:193-198 [Conf]
  34. Jan Jakob Jessen, Henrik Schiøler
    ZoneLib: A simulink library for modeling zone divided climate dynamics. [Citation Graph (0, 0)][DBLP]
    CAINE, 2006, pp:199-204 [Conf]
  35. G. Arumaikkannu, M. Sreeramulu, S. Gowri
    Analysis of fused deposition modeling parts. [Citation Graph (0, 0)][DBLP]
    CAINE, 2006, pp:205-210 [Conf]
  36. Kongkiat Hirankerd, Pattarasinee Bhattarakosol
    Computer virus signature model for detection engine. [Citation Graph (0, 0)][DBLP]
    CAINE, 2006, pp:211-217 [Conf]
  37. Kyu Han Koh, Sundeep Gopalaswamy, Ananth Srirangarajan, Jingren Jin, Cheryl D. Seals
    Usability of agentsheets for creating educational simulation. [Citation Graph (0, 0)][DBLP]
    CAINE, 2006, pp:218-223 [Conf]
  38. Barrett M. Shiff
    Teaching programming with animated 3D scenes. [Citation Graph (0, 0)][DBLP]
    CAINE, 2006, pp:224-229 [Conf]
  39. P. Alcides Jr., Manoel R. Filho, Fábio V. Bezerra, Marcos A. Souza, Pebertli A. Barata, Messias A. Nascimento, Marcelo S. Hounsell
    A virtual reality system for hydroelectric generating unit maintenance training and understanding. [Citation Graph (0, 0)][DBLP]
    CAINE, 2006, pp:230-235 [Conf]
  40. Henrik Schiøler, Jan Jakob Jessen, Jens Dalsgaard, Kim Guldstrand Larsen
    Introducing synchronisation in deterministic network models. [Citation Graph (0, 0)][DBLP]
    CAINE, 2006, pp:236-243 [Conf]
  41. Sandip C. Patel, James H. Graham, Patricia A. S. Ralston
    Security enhancement for SCADA communication protocols using augmented vulnerability trees. [Citation Graph (0, 0)][DBLP]
    CAINE, 2006, pp:244-251 [Conf]
  42. Vic Grout, Stuart Cunningham
    A constrained version of a clustering algorithm for switch placement and interconnection in large networks. [Citation Graph (0, 0)][DBLP]
    CAINE, 2006, pp:252-257 [Conf]
  43. Teck-Kuen Chua, David C. Pheanis
    Congestion detection and control with real-time streaming media. [Citation Graph (0, 0)][DBLP]
    CAINE, 2006, pp:258-263 [Conf]
  44. Ahmed H. Salem, Anup Kumar, Adel Said Elmaghraby
    A simulation of power management algorithm in wireless transmission to guarantee QoS. [Citation Graph (0, 0)][DBLP]
    CAINE, 2006, pp:264-270 [Conf]
  45. Jeffrey L. Hieb, James H. Graham
    Security-enhanced remote terminal units for SCADA networks. [Citation Graph (0, 0)][DBLP]
    CAINE, 2006, pp:271-276 [Conf]
  46. Thomas Wisniewski, Wenying Feng
    A process modeling system aimed at large-scale collaborative design over networks. [Citation Graph (0, 0)][DBLP]
    CAINE, 2006, pp:277-282 [Conf]
  47. Narayan C. Debnath, Nripendra Rai, Haesun K. Lee, Ilhyun Lee
    Design and description of a tool towards a software engineering experiment. [Citation Graph (0, 0)][DBLP]
    CAINE, 2006, pp:283-288 [Conf]
  48. Narayan C. Debnath, Joyati Debnath, Mark Burgin, Joshua Wilson, Joseph Cropper
    An autotester for the modified commission function. [Citation Graph (0, 0)][DBLP]
    CAINE, 2006, pp:289-294 [Conf]
  49. Rekha Bhowmik
    OQL-based data mining query language. [Citation Graph (0, 0)][DBLP]
    CAINE, 2006, pp:295-300 [Conf]
  50. Thomas Wisniewski, Wenying Feng
    A new modeling notation for system design and workflow patterns. [Citation Graph (0, 0)][DBLP]
    CAINE, 2006, pp:301-306 [Conf]
  51. José Alfredo Sánchez López, Dionisio A. Suárez Cerda, Agustín Quintero Reyes
    Integration of multidisciplinary specialized applications using components. [Citation Graph (0, 0)][DBLP]
    CAINE, 2006, pp:307-311 [Conf]
  52. Y. Y. Su, Liang Y. Liu
    A case study of monitoring construction operations using automated position tracking system. [Citation Graph (0, 0)][DBLP]
    CAINE, 2006, pp:312-317 [Conf]
  53. Min-Hsuan Tsai, Liang Y. Liu, Feniosky Peña-Mora
    Designing of building black-boxes to support disaster rescue and recovery. [Citation Graph (0, 0)][DBLP]
    CAINE, 2006, pp:318-323 [Conf]
  54. Chia-Pin R. Liu
    Transistor-mapped binary decision diagram for CMOS circuits. [Citation Graph (0, 0)][DBLP]
    CAINE, 2006, pp:324-329 [Conf]
  55. Masaya Yoshikawa, Hidekazu Terai
    Co-evolutionary robotics using two kinds of neural networks. [Citation Graph (0, 0)][DBLP]
    CAINE, 2006, pp:330-334 [Conf]
  56. In Soo Lee, Gordon K. Lee
    Fault detection and isolation using artificial neural networks. [Citation Graph (0, 0)][DBLP]
    CAINE, 2006, pp:335-340 [Conf]
  57. Kirthi L. Sreenivasan, Thomas Philip, Sunil K. Khijwania, Jagdish P. Singh
    Humidity estimation using neural network from sensor data. [Citation Graph (0, 0)][DBLP]
    CAINE, 2006, pp:341-345 [Conf]
  58. Y. Chen, R. Vaughn, R. Ramkumar
    Security concerns with mobile IPv6. [Citation Graph (0, 0)][DBLP]
    CAINE, 2006, pp:346-351 [Conf]
  59. Wei Li
    A security engineering process for vulnerability assessment. [Citation Graph (0, 0)][DBLP]
    CAINE, 2006, pp:352-357 [Conf]
  60. Ramzi A. Haraty, Walid El Horr
    Securing wireless networks with enhanced WEP. [Citation Graph (0, 0)][DBLP]
    CAINE, 2006, pp:358-363 [Conf]
  61. Rui Jiang, Aiqun Hu, Xiaohui Yang
    Advanced remote password authentication and key agreement using smart card. [Citation Graph (0, 0)][DBLP]
    CAINE, 2006, pp:364-370 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002