Conferences in DBLP
Eduardo Islas , Miguel Pérez , Benjamín Zayas Pérez , Carlos Espinosa , Rita Beltran , Evelyn Vega Evaluation methodology for virtual reality software tools. [Citation Graph (0, 0)][DBLP ] CAINE, 2006, pp:1-7 [Conf ] M. Mohy Mahmoud , Amr Goneid , Suhair Amer Image compression of facial photographs based on BTC/TSVQ local processing. [Citation Graph (0, 0)][DBLP ] CAINE, 2006, pp:8-13 [Conf ] Rezwanur Rahman , Morshed U. Chowdhury , S. M. Raiyan Kabir , M. Rezwan Khan A novel method for person identification by comparing retinal patterns. [Citation Graph (0, 0)][DBLP ] CAINE, 2006, pp:14-17 [Conf ] Stephen Krebsbach , George Hamer Achieving near-optimal distortion reduction with invisible watermarking RSSI algorithms. [Citation Graph (0, 0)][DBLP ] CAINE, 2006, pp:18-23 [Conf ] Justin Molineaux , Jianhua Xuan , Ting Gong , Yitan Zhu , Eric Hoffman , Robert Clarke , Yue Wang ModVis: An information visualization tool for gene module discovery. [Citation Graph (0, 0)][DBLP ] CAINE, 2006, pp:24-31 [Conf ] Lingjia Gu , Shuxu Guo , Jin Duan , Wenbo Jing , Ruizhi Ren Research of the novel fast dynamic target detection method. [Citation Graph (0, 0)][DBLP ] CAINE, 2006, pp:32-36 [Conf ] Mahmuda Naznin , Kendall E. Nygard Adaptive coverage in heterogeneous sensor network. [Citation Graph (0, 0)][DBLP ] CAINE, 2006, pp:37-40 [Conf ] Jens A. Hansen , Thomas D. Nielsen , Henrik Schiøler A COTS framework for sensor fusion using dynamic bayesian networks in livestock production. [Citation Graph (0, 0)][DBLP ] CAINE, 2006, pp:41-47 [Conf ] Kemal Taljanovic , Mehmed M. Kantardzic Computer-aided item selection for the cycle counting procedure. [Citation Graph (0, 0)][DBLP ] CAINE, 2006, pp:48-53 [Conf ] Marwan S. Sleiman , Lester Lipsky , Kishori M. Konwar Performance modeling of hierarchical memories. [Citation Graph (0, 0)][DBLP ] CAINE, 2006, pp:54-59 [Conf ] Ahmed M. Mohamed , S. A. Younies Modeling the dynamic load in distributed control systems (DCS). [Citation Graph (0, 0)][DBLP ] CAINE, 2006, pp:60-65 [Conf ] Angkul Kongmunvattana Task-migration support for parallel computing on shared virtual memory clusters. [Citation Graph (0, 0)][DBLP ] CAINE, 2006, pp:66-71 [Conf ] Frederick C. Harris Jr. , Mark C. Ballew , Jason Baurick , James Frye , Lance Hutchinson , James G. King , Philip H. Goodman , Rich Drewes A novel parallel hardware and software solution for a large-scale biologically realistic cortical simulation. [Citation Graph (0, 0)][DBLP ] CAINE, 2006, pp:72-77 [Conf ] K. Mayfield , A. Joseph , S. Black , H. Bui , Nelson L. Passos Scheduling multi-dimensional loops in a computer cluster. [Citation Graph (0, 0)][DBLP ] CAINE, 2006, pp:78-82 [Conf ] Ramzi A. Haraty , Lana Turk A comparative study of replacement algorithms used in the scalable asynchronous cache consistency scheme. [Citation Graph (0, 0)][DBLP ] CAINE, 2006, pp:83-88 [Conf ] Hsine-Jen Tsai , Les L. Miller , Hua Ming , Rebecca Wemhoff , Sara Nusser Combining spatial data from multiple data sources. [Citation Graph (0, 0)][DBLP ] CAINE, 2006, pp:89-94 [Conf ] George Hamer , Stephen Krebsbach Statistical steganography and steganalysis of database tables. [Citation Graph (0, 0)][DBLP ] CAINE, 2006, pp:95-101 [Conf ] Carl G. Looney Clustering via a kernel fuzzy connectivity matrix. [Citation Graph (0, 0)][DBLP ] CAINE, 2006, pp:102-107 [Conf ] Prabhat Mahanti , D. K. Swami , Mohammed Al-Fayoumi Classification rule extraction approach based on homogeneous training samples. [Citation Graph (0, 0)][DBLP ] CAINE, 2006, pp:108-113 [Conf ] Mehdi Owrang , Les L. Miller Knowledge discovery on multi-relations distributed databases. [Citation Graph (0, 0)][DBLP ] CAINE, 2006, pp:114-119 [Conf ] Xiaoming Ding , Liping Zhang , Yiqiang Lu , Ridong Jiang A feature recognition approach for mold machining. [Citation Graph (0, 0)][DBLP ] CAINE, 2006, pp:120-125 [Conf ] Honoriu Valean , Liviu Miclea , Enyedi Szilárd Surveillance of a complex heterogeneous system using software agents - case study on a hydroelectric power plant chain. [Citation Graph (0, 0)][DBLP ] CAINE, 2006, pp:126-131 [Conf ] Mariana Hentea Enhancing information security risk management with data mining and fuzzy logic techniques. [Citation Graph (0, 0)][DBLP ] CAINE, 2006, pp:132-139 [Conf ] Donna L. Hudson , Maurice E. Cohen Application of soft solutions for signal analysis. [Citation Graph (0, 0)][DBLP ] CAINE, 2006, pp:140-144 [Conf ] Ahmed Kamel A telephone communication agent for agent/user interaction. [Citation Graph (0, 0)][DBLP ] CAINE, 2006, pp:145-150 [Conf ] Deok Hee Nam , Harpreet Singh , Susil K. Putatunda Material processing for ADI data using neuro fuzzy system. [Citation Graph (0, 0)][DBLP ] CAINE, 2006, pp:151-156 [Conf ] Ekkasit Tiamkaew , Jirakhom Ruttanavakul Efficiently evolving multiple robots using distributed genetic algorithms. [Citation Graph (0, 0)][DBLP ] CAINE, 2006, pp:157-161 [Conf ] Hamzeh K. Al Shaar , Ramzi A. Haraty A three poled model for web applications. [Citation Graph (0, 0)][DBLP ] CAINE, 2006, pp:162-166 [Conf ] Vic Grout , Stuart Cunningham Complexity issues in control software design: A practical perspective. [Citation Graph (0, 0)][DBLP ] CAINE, 2006, pp:167-174 [Conf ] N. Z. Azeemi A multiobjective evolutionary approach for constrained joint source code optimization. [Citation Graph (0, 0)][DBLP ] CAINE, 2006, pp:175-180 [Conf ] Raed Shatnawi , Wei Li An empirical study of the boundary values of the object-oriented metrics. [Citation Graph (0, 0)][DBLP ] CAINE, 2006, pp:181-186 [Conf ] Jie Cao , Shashi S. Marikunte Simple factory design pattern by auto-registration and applications. [Citation Graph (0, 0)][DBLP ] CAINE, 2006, pp:187-192 [Conf ] P. K. Mahanti , K. Rajnish , Vandana Bhattacherjee Measuring class cohesion: An empirical approach. [Citation Graph (0, 0)][DBLP ] CAINE, 2006, pp:193-198 [Conf ] Jan Jakob Jessen , Henrik Schiøler ZoneLib: A simulink library for modeling zone divided climate dynamics. [Citation Graph (0, 0)][DBLP ] CAINE, 2006, pp:199-204 [Conf ] G. Arumaikkannu , M. Sreeramulu , S. Gowri Analysis of fused deposition modeling parts. [Citation Graph (0, 0)][DBLP ] CAINE, 2006, pp:205-210 [Conf ] Kongkiat Hirankerd , Pattarasinee Bhattarakosol Computer virus signature model for detection engine. [Citation Graph (0, 0)][DBLP ] CAINE, 2006, pp:211-217 [Conf ] Kyu Han Koh , Sundeep Gopalaswamy , Ananth Srirangarajan , Jingren Jin , Cheryl D. Seals Usability of agentsheets for creating educational simulation. [Citation Graph (0, 0)][DBLP ] CAINE, 2006, pp:218-223 [Conf ] Barrett M. Shiff Teaching programming with animated 3D scenes. [Citation Graph (0, 0)][DBLP ] CAINE, 2006, pp:224-229 [Conf ] P. Alcides Jr. , Manoel R. Filho , Fábio V. Bezerra , Marcos A. Souza , Pebertli A. Barata , Messias A. Nascimento , Marcelo S. Hounsell A virtual reality system for hydroelectric generating unit maintenance training and understanding. [Citation Graph (0, 0)][DBLP ] CAINE, 2006, pp:230-235 [Conf ] Henrik Schiøler , Jan Jakob Jessen , Jens Dalsgaard , Kim Guldstrand Larsen Introducing synchronisation in deterministic network models. [Citation Graph (0, 0)][DBLP ] CAINE, 2006, pp:236-243 [Conf ] Sandip C. Patel , James H. Graham , Patricia A. S. Ralston Security enhancement for SCADA communication protocols using augmented vulnerability trees. [Citation Graph (0, 0)][DBLP ] CAINE, 2006, pp:244-251 [Conf ] Vic Grout , Stuart Cunningham A constrained version of a clustering algorithm for switch placement and interconnection in large networks. [Citation Graph (0, 0)][DBLP ] CAINE, 2006, pp:252-257 [Conf ] Teck-Kuen Chua , David C. Pheanis Congestion detection and control with real-time streaming media. [Citation Graph (0, 0)][DBLP ] CAINE, 2006, pp:258-263 [Conf ] Ahmed H. Salem , Anup Kumar , Adel Said Elmaghraby A simulation of power management algorithm in wireless transmission to guarantee QoS. [Citation Graph (0, 0)][DBLP ] CAINE, 2006, pp:264-270 [Conf ] Jeffrey L. Hieb , James H. Graham Security-enhanced remote terminal units for SCADA networks. [Citation Graph (0, 0)][DBLP ] CAINE, 2006, pp:271-276 [Conf ] Thomas Wisniewski , Wenying Feng A process modeling system aimed at large-scale collaborative design over networks. [Citation Graph (0, 0)][DBLP ] CAINE, 2006, pp:277-282 [Conf ] Narayan C. Debnath , Nripendra Rai , Haesun K. Lee , Ilhyun Lee Design and description of a tool towards a software engineering experiment. [Citation Graph (0, 0)][DBLP ] CAINE, 2006, pp:283-288 [Conf ] Narayan C. Debnath , Joyati Debnath , Mark Burgin , Joshua Wilson , Joseph Cropper An autotester for the modified commission function. [Citation Graph (0, 0)][DBLP ] CAINE, 2006, pp:289-294 [Conf ] Rekha Bhowmik OQL-based data mining query language. [Citation Graph (0, 0)][DBLP ] CAINE, 2006, pp:295-300 [Conf ] Thomas Wisniewski , Wenying Feng A new modeling notation for system design and workflow patterns. [Citation Graph (0, 0)][DBLP ] CAINE, 2006, pp:301-306 [Conf ] José Alfredo Sánchez López , Dionisio A. Suárez Cerda , Agustín Quintero Reyes Integration of multidisciplinary specialized applications using components. [Citation Graph (0, 0)][DBLP ] CAINE, 2006, pp:307-311 [Conf ] Y. Y. Su , Liang Y. Liu A case study of monitoring construction operations using automated position tracking system. [Citation Graph (0, 0)][DBLP ] CAINE, 2006, pp:312-317 [Conf ] Min-Hsuan Tsai , Liang Y. Liu , Feniosky Peña-Mora Designing of building black-boxes to support disaster rescue and recovery. [Citation Graph (0, 0)][DBLP ] CAINE, 2006, pp:318-323 [Conf ] Chia-Pin R. Liu Transistor-mapped binary decision diagram for CMOS circuits. [Citation Graph (0, 0)][DBLP ] CAINE, 2006, pp:324-329 [Conf ] Masaya Yoshikawa , Hidekazu Terai Co-evolutionary robotics using two kinds of neural networks. [Citation Graph (0, 0)][DBLP ] CAINE, 2006, pp:330-334 [Conf ] In Soo Lee , Gordon K. Lee Fault detection and isolation using artificial neural networks. [Citation Graph (0, 0)][DBLP ] CAINE, 2006, pp:335-340 [Conf ] Kirthi L. Sreenivasan , Thomas Philip , Sunil K. Khijwania , Jagdish P. Singh Humidity estimation using neural network from sensor data. [Citation Graph (0, 0)][DBLP ] CAINE, 2006, pp:341-345 [Conf ] Y. Chen , R. Vaughn , R. Ramkumar Security concerns with mobile IPv6. [Citation Graph (0, 0)][DBLP ] CAINE, 2006, pp:346-351 [Conf ] Wei Li A security engineering process for vulnerability assessment. [Citation Graph (0, 0)][DBLP ] CAINE, 2006, pp:352-357 [Conf ] Ramzi A. Haraty , Walid El Horr Securing wireless networks with enhanced WEP. [Citation Graph (0, 0)][DBLP ] CAINE, 2006, pp:358-363 [Conf ] Rui Jiang , Aiqun Hu , Xiaohui Yang Advanced remote password authentication and key agreement using smart card. [Citation Graph (0, 0)][DBLP ] CAINE, 2006, pp:364-370 [Conf ]