Conferences in DBLP
Yongfeng Huang , Sifa Zhang , Jiangling Zhang Acoustic echo cancellation for digital wireless network. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:1-4 [Conf ] Sung Woo Chung , Seong Tae Jhang , Chu Shik Jhon Analysis of slotted ring network in real-time systems. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:5-8 [Conf ] Shin-Jer Yang A distributed discipline for finding the efficient matching cores on weighted tree networks. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:9-14 [Conf ] Aomar Osmani , François Lévy Simulating faults in telecommunication network: Reasoning about uncertain propagation of events. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:15-19 [Conf ] John Moody Nomadic clinical information systems. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:20-23 [Conf ] Richard Chbeir , Youssef Amghar , André Flory Image modeling for medical databases. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:24-28 [Conf ] Kamal Ali , Isam Taha , Michael S. Jacobson PC based system for heart rate variability analysis. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:29-32 [Conf ] Sharker Numan , Syed Mahbubur Rahman Health education through distance mode in developing countries - Bangladesh model. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:33-36 [Conf ] Edson L. Horta , Sergio Takeo Kofuji Using reconfigurable logic to implement an active network. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:37-41 [Conf ] Lee Man Kei , Xiaohua Jia Effects of handoff methods on reliable RPC in wireless networks. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:42-45 [Conf ] Wonjae Choi , Hyunseung Choo , Seong-Moo Yoo Analytical approaches for modeling characterized MIN. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:46-49 [Conf ] Charlie Svahnberg , Lars Lundberg , Mikael Roos A performance dimensioning guide for a large telecommunication system. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:50-55 [Conf ] Z. Y. Wang , S. Iddamsetty Internet based manufacturing database. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:56-59 [Conf ] Ching-Ming Chao Schema mapping in object-oriented multidatabase systems. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:60-63 [Conf ] Bruno Sadeg , Samia Saad-Bouzefrane Relaxing correctness criteria in real-time DBMSs. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:64-67 [Conf ] Les L. Miller , Ying Lu , Yeping Zhou , Ali R. Hurson A data warehouse based on materializing object-oriented views. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:68-71 [Conf ] Rex E. Gantenbein , Thomas L. James , Garrace DeGroot , Harshi L. Allen , Sung Y. Shin Analyzing security in distributed collaborative systems. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:72-75 [Conf ] Hakikur Rahman , Syed Mahbubur Rahman , Mohammad S. Alam Interactive multimedia technology for distance education in Bangladesh open university (BOU). [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:76-79 [Conf ] Po-Jen Chuang An efficent new design of the optical ring network. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:80-83 [Conf ] Changgui Chen , Wanlei Zhou An architecture for resolving networking partitioning. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:84-87 [Conf ] Qinghua Zou , William Perrizo , Qin Ding Level ordered transaction scheduler (LOTS) for concurrency control. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:88-91 [Conf ] H. Kordjani-Taibi Performances of client-server database management systems architecture. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:92-97 [Conf ] Qinghua Zou , Qin Ding , William Perrizo Fast approach for association rule mining on remotely sensed imagery. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:98-101 [Conf ] Muhammad Asadur Rahman , Martha Evens Categorization of proper names for inclusion in a lexical database. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:102-107 [Conf ] Somkiat Kitjongthawonkul , Rajiv Khosla An information system ontology of task-based problem solving adapters, objects and agents with application to sales and marketing. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:108-111 [Conf ] Sangjin Yoo , Youngtag Jang , Choong Kwon Lee Groupware and knowledge management: An introduction. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:112-115 [Conf ] Tung-Xiung Wu Survey knowledge management systems: An environment for social sciences research. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:116-119 [Conf ] Oliver Hofmann , Freimut Bodendorf A framework for agent mediated electronic business. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:120-123 [Conf ] Aizhong Lin A multi-agent process management system. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:124-127 [Conf ] Junping Sun Goal-driven data partitioning for quantitative rule derivation. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:128-133 [Conf ] Naphtali Rishe , Alexander Vaschillo , Dmitry Vasilevsky , Artyom Shaposhnikov , Shu-Ching Chen The architecture for semantic data access to heterogeneous information sources. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:134-139 [Conf ] Zina Ben-Miled , Alexander Zaitsev , Omar Bukhres , Michael Bem , Robert Jones , Robert J. Oppelt Efficient data representation for a very large pharmaceutical data repository. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:140-145 [Conf ] S. R. Subramanya , Jui-Che Teng , Yongjian Fu Indexing and retrieval of images using multiple features. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:146-149 [Conf ] Ramzi A. Haraty , Roula C. Fany A PERF solution for distributed query optimization. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:150-153 [Conf ] M. L. Liu , Yajun Liu A prototype mobile-agent application. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:154-157 [Conf ] Anthony Chung , Howard E. Motteler , Deepinder P. Sidhu On undetected faults in homogeneous methods for protocol testing. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:158-164 [Conf ] Youngchul Kim , Jaehyoun Kim , C. Robert Carlson An adaptive use case design driven testing. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:165-168 [Conf ] David C. Pheanis , John A. Jackson DYNATEST: Dynamic software-testing system. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:169-172 [Conf ] Roger Y. Lee , Veronica Varela , Narayan C. Debnath Use of heuristics in rule based class modeling. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:173-176 [Conf ] Paul Darbyshire Estimating the saturation point of a multi-processor application using JAVA. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:177-180 [Conf ] Jingsen Zheng , Hesham H. Ali A genetic algorithm for channel routing in VLSI design. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:181-185 [Conf ] S. R. Subramanya , Rahul Simha , Bhagirath Narahari Study of link congestion during I/O transfers in 2-D meshes using wormhole routing. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:186-189 [Conf ] Wu Woan Kim , Sang-Dong Jang , Hee-Sik Chun Multiplier using RNS to binary converter for specific moduli (2k-1, 2k, 2k+1). [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:190-193 [Conf ] Hamid R. Abachi , Narayan C. Debnath Architectural design and performance analysis of a mobile multi-robot system based on a superhypercube multibus architecture. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:194-197 [Conf ] Morshed U. Chowdhury Evaluation of linear filters used with statistical inference for reducing blocking artifacts in video coded images. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:198-202 [Conf ] Philip P. Dang , Paul M. Chau Image encryption for multimedia applications. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:203-206 [Conf ] Maurice E. Cohen , Donna L. Hudson , Prakash C. Deedwania Time series pattern recognition using chaotic analysis. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:207-210 [Conf ] Michael Tran , Siddheswar Ray , Ronald Pose Neocognitron for rotated pattern recognition. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:211-214 [Conf ] Haklin Kimm Two dimensional maximal elements problem on a mesh with pipelined optical bus system. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:215-218 [Conf ] Ehab Y. Abdel Maksoud , Reda A. Ammar Partitioning communication processes for efficient execution of the fork-join structures. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:219-222 [Conf ] Andreas Hieke A Monte Carlo / FEM investigation on optimal cross-section of high speed ULSI interconnects with respect to RC-delay. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:223-227 [Conf ] Behnam S. Arad , Chien-Hsun Wang Design of a processing element for bus-based parallel computing. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:228-231 [Conf ] Kuitae Byun , Soon-Ok Park , Jaehyoun Kim , C. Robert Carlson Toward an extension of interaction diagrams. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:232-236 [Conf ] Jaehyoun Kim , Youngchul Kim , C. Robert Carlson A design unit based code generation technique for object-oriented software development. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:237-240 [Conf ] Narayan C. Debnath , Tamer Swidan , Roger Y. Lee , Hamid R. Abachi Design and implementation of a testing tool. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:241-244 [Conf ] Nouredine Melab , Laurent Deruelle , Mohammed Bouneffa Instrumentation-based profiling techniques. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:245-248 [Conf ] Manuel Penaloza , Ronald Welch , Rand Feind Feature set reduction using a fuzzy expert system. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:249-252 [Conf ] A. Sehad , Abdenour Hadid , H. Hocini , M. Djeddi , S. Ameur Face recognition using neural networks and eigenfaces. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:253-257 [Conf ] A. Sehad , H. Hocini , Abdenour Hadid , M. Djeddi , S. Ameur Face recognition under varying views. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:258-263 [Conf ] Donna L. Hudson , Maurice E. Cohen Use of meta knowledge in neural networks. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:264-267 [Conf ] Carl G. Looney A new approach to fuzzy clustering. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:268-273 [Conf ] Stefan D. Bruda , Selim G. Akl Towards a meaningful formal definition of real-time computations. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:274-279 [Conf ] Zhiying Zhou , Jie Zhang , Hao Wang The algorithms for dynamic scheduling. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:280-283 [Conf ] Walter W. Schilling Jr. , Mansoor Alam Performance simulation of the combination of prefetching and victim caching. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:284-287 [Conf ] M. Manzur Murshed , Richard P. Brent How promising is the k-constrained reconfigurable mesh? [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:288-291 [Conf ] Yuxiang Jiang , Bidyut Gupta Efficient recovery approach in distributed systems with hybrid checkpointing. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:292-297 [Conf ] Manman Gu , Lei Zeng , Zhihong Liang , Bidyut Gupta An efficient communication induced rollforward checkpointing and recover protocol for distributed systems. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:298-302 [Conf ] Jiman Hong , Heon Young Yeom , Yookun Cho , Taesoon Park Kckpt: An efficient checkpoint and recovery facility on unixware kernel. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:303-308 [Conf ] James H. Graham , Patricia A. S. Ralston Computer-based monitoring and fault diagnosis for chemical processes. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:309-312 [Conf ] Raj Sekhar Pamula Selecting a global checkpoint for error recovery. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:313-316 [Conf ] Chandana Lala , Brajendra Panda , Rumman Sobhan Storing transaction dependency graphs for damage appraisal following an information attack. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:317-321 [Conf ] Rasiah Loganantharaj Towards on optimal solution to a matching problem: Applying GA to solve stable marriage problem. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:322-325 [Conf ] Claude Duvallet , Bruno Sadeg , Alain Cardon How to build real-time multi-agent systems using anytime techniques. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:326-329 [Conf ] Neeraj Apt , Ibrahim Zeid An architecture for a Java-based controller of a CIM cell. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:330-333 [Conf ] Tomoe Niitani , Yasuaki Nakamura Virtual cataract operation system. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:334-337 [Conf ] Hasan Abbas , Martha Evens Domain knowledge base for an intelligent tutoring system: CIRCSIM-tutor. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:338-343 [Conf ] Longxiang Zhang , Lijue Liu , Rong Cheng An intelligent engineering network planner system. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:344-348 [Conf ] V. Shankararaman , Dimitrios Goulis , V. Ambrosiadou , B. Robinson , G. Shamtan Modelling a medical knowledge base for decision support. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:349-353 [Conf ] Nong Ye , Vuong Nguyen , George C. Runger Plan performance assessment under uncertainty for command and control. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:354-357 [Conf ] Venkata Atluri , Chih-Cheng Hung , Tommy Coleman Artificial Immune Systems for Soil Data Classification [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:358-360 [Conf ] Hoon Oh Adaptive EDF non-preemptive scheduling for periodic tasks in the hard real-time systems. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:361-367 [Conf ] Raafat S. Elfouly , Reda A. Ammar , Howard A. Sholl Prediction of inner and outer diameter flaws using ultrasonic pipe inspection system. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:368-372 [Conf ] June-Me Park , Carl G. Looney , Hui-Chuan Chen Fast connected component labeling algorithm using a divide and conquer technique. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:373-376 [Conf ] Walter Dosch , Annette Stümpel Merging ordered streams. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:377-382 [Conf ] Reginald L. Walker , Melody Y. Ivory , S. Asodia , L. Wright-Peg Study of search engine indexing and update mechanisms: Usability implications. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:383-388 [Conf ] Chow-Sing Lin , Xianhong Zeng , Min-You Wu , Wei Shu VoD on internet 2. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:389-392 [Conf ] Tarron W. T. Poon , Edward Chan Traffic management in wireless ATM network using a hierarchical neural-network based prediction algorithm. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:393-395 [Conf ] Mansoor Alam , Vinod Jeyachandran A fuzzy algorithm for ABR flow control in ATM networks. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:396-399 [Conf ] Dong Chun Lee , Sung Y. Shin Radiance simulation of multispectral remote sensor data for water resource applications. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:400-403 [Conf ] Dong Chun Lee , Jay H. Kwon , Keehwan Hong , Sung Y. Shin A conceptual framework for GIS-based vehicle monitoring system. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:404-407 [Conf ] Mehmed M. Kantardzic , Hazem M. Hamdan , Benjamin Djulbegovic , Adel Said Elmaghraby New diagnostic criteria for polycythemia rubra vera: Artificial neural network approach. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:408-411 [Conf ] D. J. Jackson , Russell L. Pimmel , Allen S. Parrish , Brandon Dixon , David Cordes , Richard B. Borie Logic design programming assignments in a first-year course. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:412-414 [Conf ] Naeem Al-Shamary , Francesco Crusca , Hamid Abachi Mixed-sensitivity H8 controller design for the lateral dynamics of a civil aircraft. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:415-417 [Conf ] Sayed Hassen , Francesco Crusca , Hamid Abachi Modelling systems for control studies - an overview. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:418-421 [Conf ] Rania A/Hamid El-Sayed , Ahmed Sameh Visual constraint programming environment for configuration problems. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:422-426 [Conf ] Jacob Furst , Karen Alkoby , André Berthiaume , Pattaraporn Chomwong , Mary Jo Davidson , Brian Konie , Glenn Lancaster , Steven L. Lytinen , John McDonald , Lopa Roychoudhuri , Jorge Toro , Noriko Tomuro , Rosalee Wolfe Database design and population for american sign language. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:427-430 [Conf ] Kaninda Musumbu Failure diagnosis of declarative programs based on abstract interpretation (extended abstract). [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:431-434 [Conf ] Kiumi Akingbehin Two applications of an hierarchical computer animation model. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:435-438 [Conf ] Tony Lindgren Anytime inductive logic programming. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:439-442 [Conf ] Walter Dosch , Sönke Magnussen Transformational derivation of a bytecode verifier. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:443-447 [Conf ]