The SCEAS System
Navigation Menu

Conferences in DBLP

Computers and Their Applications (cata)
2000 (conf/cata/2000)

  1. Yongfeng Huang, Sifa Zhang, Jiangling Zhang
    Acoustic echo cancellation for digital wireless network. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:1-4 [Conf]
  2. Sung Woo Chung, Seong Tae Jhang, Chu Shik Jhon
    Analysis of slotted ring network in real-time systems. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:5-8 [Conf]
  3. Shin-Jer Yang
    A distributed discipline for finding the efficient matching cores on weighted tree networks. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:9-14 [Conf]
  4. Aomar Osmani, François Lévy
    Simulating faults in telecommunication network: Reasoning about uncertain propagation of events. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:15-19 [Conf]
  5. John Moody
    Nomadic clinical information systems. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:20-23 [Conf]
  6. Richard Chbeir, Youssef Amghar, André Flory
    Image modeling for medical databases. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:24-28 [Conf]
  7. Kamal Ali, Isam Taha, Michael S. Jacobson
    PC based system for heart rate variability analysis. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:29-32 [Conf]
  8. Sharker Numan, Syed Mahbubur Rahman
    Health education through distance mode in developing countries - Bangladesh model. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:33-36 [Conf]
  9. Edson L. Horta, Sergio Takeo Kofuji
    Using reconfigurable logic to implement an active network. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:37-41 [Conf]
  10. Lee Man Kei, Xiaohua Jia
    Effects of handoff methods on reliable RPC in wireless networks. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:42-45 [Conf]
  11. Wonjae Choi, Hyunseung Choo, Seong-Moo Yoo
    Analytical approaches for modeling characterized MIN. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:46-49 [Conf]
  12. Charlie Svahnberg, Lars Lundberg, Mikael Roos
    A performance dimensioning guide for a large telecommunication system. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:50-55 [Conf]
  13. Z. Y. Wang, S. Iddamsetty
    Internet based manufacturing database. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:56-59 [Conf]
  14. Ching-Ming Chao
    Schema mapping in object-oriented multidatabase systems. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:60-63 [Conf]
  15. Bruno Sadeg, Samia Saad-Bouzefrane
    Relaxing correctness criteria in real-time DBMSs. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:64-67 [Conf]
  16. Les L. Miller, Ying Lu, Yeping Zhou, Ali R. Hurson
    A data warehouse based on materializing object-oriented views. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:68-71 [Conf]
  17. Rex E. Gantenbein, Thomas L. James, Garrace DeGroot, Harshi L. Allen, Sung Y. Shin
    Analyzing security in distributed collaborative systems. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:72-75 [Conf]
  18. Hakikur Rahman, Syed Mahbubur Rahman, Mohammad S. Alam
    Interactive multimedia technology for distance education in Bangladesh open university (BOU). [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:76-79 [Conf]
  19. Po-Jen Chuang
    An efficent new design of the optical ring network. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:80-83 [Conf]
  20. Changgui Chen, Wanlei Zhou
    An architecture for resolving networking partitioning. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:84-87 [Conf]
  21. Qinghua Zou, William Perrizo, Qin Ding
    Level ordered transaction scheduler (LOTS) for concurrency control. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:88-91 [Conf]
  22. H. Kordjani-Taibi
    Performances of client-server database management systems architecture. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:92-97 [Conf]
  23. Qinghua Zou, Qin Ding, William Perrizo
    Fast approach for association rule mining on remotely sensed imagery. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:98-101 [Conf]
  24. Muhammad Asadur Rahman, Martha Evens
    Categorization of proper names for inclusion in a lexical database. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:102-107 [Conf]
  25. Somkiat Kitjongthawonkul, Rajiv Khosla
    An information system ontology of task-based problem solving adapters, objects and agents with application to sales and marketing. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:108-111 [Conf]
  26. Sangjin Yoo, Youngtag Jang, Choong Kwon Lee
    Groupware and knowledge management: An introduction. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:112-115 [Conf]
  27. Tung-Xiung Wu
    Survey knowledge management systems: An environment for social sciences research. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:116-119 [Conf]
  28. Oliver Hofmann, Freimut Bodendorf
    A framework for agent mediated electronic business. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:120-123 [Conf]
  29. Aizhong Lin
    A multi-agent process management system. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:124-127 [Conf]
  30. Junping Sun
    Goal-driven data partitioning for quantitative rule derivation. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:128-133 [Conf]
  31. Naphtali Rishe, Alexander Vaschillo, Dmitry Vasilevsky, Artyom Shaposhnikov, Shu-Ching Chen
    The architecture for semantic data access to heterogeneous information sources. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:134-139 [Conf]
  32. Zina Ben-Miled, Alexander Zaitsev, Omar Bukhres, Michael Bem, Robert Jones, Robert J. Oppelt
    Efficient data representation for a very large pharmaceutical data repository. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:140-145 [Conf]
  33. S. R. Subramanya, Jui-Che Teng, Yongjian Fu
    Indexing and retrieval of images using multiple features. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:146-149 [Conf]
  34. Ramzi A. Haraty, Roula C. Fany
    A PERF solution for distributed query optimization. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:150-153 [Conf]
  35. M. L. Liu, Yajun Liu
    A prototype mobile-agent application. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:154-157 [Conf]
  36. Anthony Chung, Howard E. Motteler, Deepinder P. Sidhu
    On undetected faults in homogeneous methods for protocol testing. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:158-164 [Conf]
  37. Youngchul Kim, Jaehyoun Kim, C. Robert Carlson
    An adaptive use case design driven testing. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:165-168 [Conf]
  38. David C. Pheanis, John A. Jackson
    DYNATEST: Dynamic software-testing system. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:169-172 [Conf]
  39. Roger Y. Lee, Veronica Varela, Narayan C. Debnath
    Use of heuristics in rule based class modeling. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:173-176 [Conf]
  40. Paul Darbyshire
    Estimating the saturation point of a multi-processor application using JAVA. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:177-180 [Conf]
  41. Jingsen Zheng, Hesham H. Ali
    A genetic algorithm for channel routing in VLSI design. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:181-185 [Conf]
  42. S. R. Subramanya, Rahul Simha, Bhagirath Narahari
    Study of link congestion during I/O transfers in 2-D meshes using wormhole routing. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:186-189 [Conf]
  43. Wu Woan Kim, Sang-Dong Jang, Hee-Sik Chun
    Multiplier using RNS to binary converter for specific moduli (2k-1, 2k, 2k+1). [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:190-193 [Conf]
  44. Hamid R. Abachi, Narayan C. Debnath
    Architectural design and performance analysis of a mobile multi-robot system based on a superhypercube multibus architecture. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:194-197 [Conf]
  45. Morshed U. Chowdhury
    Evaluation of linear filters used with statistical inference for reducing blocking artifacts in video coded images. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:198-202 [Conf]
  46. Philip P. Dang, Paul M. Chau
    Image encryption for multimedia applications. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:203-206 [Conf]
  47. Maurice E. Cohen, Donna L. Hudson, Prakash C. Deedwania
    Time series pattern recognition using chaotic analysis. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:207-210 [Conf]
  48. Michael Tran, Siddheswar Ray, Ronald Pose
    Neocognitron for rotated pattern recognition. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:211-214 [Conf]
  49. Haklin Kimm
    Two dimensional maximal elements problem on a mesh with pipelined optical bus system. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:215-218 [Conf]
  50. Ehab Y. Abdel Maksoud, Reda A. Ammar
    Partitioning communication processes for efficient execution of the fork-join structures. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:219-222 [Conf]
  51. Andreas Hieke
    A Monte Carlo / FEM investigation on optimal cross-section of high speed ULSI interconnects with respect to RC-delay. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:223-227 [Conf]
  52. Behnam S. Arad, Chien-Hsun Wang
    Design of a processing element for bus-based parallel computing. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:228-231 [Conf]
  53. Kuitae Byun, Soon-Ok Park, Jaehyoun Kim, C. Robert Carlson
    Toward an extension of interaction diagrams. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:232-236 [Conf]
  54. Jaehyoun Kim, Youngchul Kim, C. Robert Carlson
    A design unit based code generation technique for object-oriented software development. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:237-240 [Conf]
  55. Narayan C. Debnath, Tamer Swidan, Roger Y. Lee, Hamid R. Abachi
    Design and implementation of a testing tool. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:241-244 [Conf]
  56. Nouredine Melab, Laurent Deruelle, Mohammed Bouneffa
    Instrumentation-based profiling techniques. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:245-248 [Conf]
  57. Manuel Penaloza, Ronald Welch, Rand Feind
    Feature set reduction using a fuzzy expert system. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:249-252 [Conf]
  58. A. Sehad, Abdenour Hadid, H. Hocini, M. Djeddi, S. Ameur
    Face recognition using neural networks and eigenfaces. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:253-257 [Conf]
  59. A. Sehad, H. Hocini, Abdenour Hadid, M. Djeddi, S. Ameur
    Face recognition under varying views. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:258-263 [Conf]
  60. Donna L. Hudson, Maurice E. Cohen
    Use of meta knowledge in neural networks. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:264-267 [Conf]
  61. Carl G. Looney
    A new approach to fuzzy clustering. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:268-273 [Conf]
  62. Stefan D. Bruda, Selim G. Akl
    Towards a meaningful formal definition of real-time computations. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:274-279 [Conf]
  63. Zhiying Zhou, Jie Zhang, Hao Wang
    The algorithms for dynamic scheduling. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:280-283 [Conf]
  64. Walter W. Schilling Jr., Mansoor Alam
    Performance simulation of the combination of prefetching and victim caching. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:284-287 [Conf]
  65. M. Manzur Murshed, Richard P. Brent
    How promising is the k-constrained reconfigurable mesh? [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:288-291 [Conf]
  66. Yuxiang Jiang, Bidyut Gupta
    Efficient recovery approach in distributed systems with hybrid checkpointing. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:292-297 [Conf]
  67. Manman Gu, Lei Zeng, Zhihong Liang, Bidyut Gupta
    An efficient communication induced rollforward checkpointing and recover protocol for distributed systems. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:298-302 [Conf]
  68. Jiman Hong, Heon Young Yeom, Yookun Cho, Taesoon Park
    Kckpt: An efficient checkpoint and recovery facility on unixware kernel. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:303-308 [Conf]
  69. James H. Graham, Patricia A. S. Ralston
    Computer-based monitoring and fault diagnosis for chemical processes. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:309-312 [Conf]
  70. Raj Sekhar Pamula
    Selecting a global checkpoint for error recovery. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:313-316 [Conf]
  71. Chandana Lala, Brajendra Panda, Rumman Sobhan
    Storing transaction dependency graphs for damage appraisal following an information attack. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:317-321 [Conf]
  72. Rasiah Loganantharaj
    Towards on optimal solution to a matching problem: Applying GA to solve stable marriage problem. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:322-325 [Conf]
  73. Claude Duvallet, Bruno Sadeg, Alain Cardon
    How to build real-time multi-agent systems using anytime techniques. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:326-329 [Conf]
  74. Neeraj Apt, Ibrahim Zeid
    An architecture for a Java-based controller of a CIM cell. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:330-333 [Conf]
  75. Tomoe Niitani, Yasuaki Nakamura
    Virtual cataract operation system. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:334-337 [Conf]
  76. Hasan Abbas, Martha Evens
    Domain knowledge base for an intelligent tutoring system: CIRCSIM-tutor. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:338-343 [Conf]
  77. Longxiang Zhang, Lijue Liu, Rong Cheng
    An intelligent engineering network planner system. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:344-348 [Conf]
  78. V. Shankararaman, Dimitrios Goulis, V. Ambrosiadou, B. Robinson, G. Shamtan
    Modelling a medical knowledge base for decision support. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:349-353 [Conf]
  79. Nong Ye, Vuong Nguyen, George C. Runger
    Plan performance assessment under uncertainty for command and control. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:354-357 [Conf]
  80. Venkata Atluri, Chih-Cheng Hung, Tommy Coleman
    Artificial Immune Systems for Soil Data Classification [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:358-360 [Conf]
  81. Hoon Oh
    Adaptive EDF non-preemptive scheduling for periodic tasks in the hard real-time systems. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:361-367 [Conf]
  82. Raafat S. Elfouly, Reda A. Ammar, Howard A. Sholl
    Prediction of inner and outer diameter flaws using ultrasonic pipe inspection system. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:368-372 [Conf]
  83. June-Me Park, Carl G. Looney, Hui-Chuan Chen
    Fast connected component labeling algorithm using a divide and conquer technique. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:373-376 [Conf]
  84. Walter Dosch, Annette Stümpel
    Merging ordered streams. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:377-382 [Conf]
  85. Reginald L. Walker, Melody Y. Ivory, S. Asodia, L. Wright-Peg
    Study of search engine indexing and update mechanisms: Usability implications. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:383-388 [Conf]
  86. Chow-Sing Lin, Xianhong Zeng, Min-You Wu, Wei Shu
    VoD on internet 2. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:389-392 [Conf]
  87. Tarron W. T. Poon, Edward Chan
    Traffic management in wireless ATM network using a hierarchical neural-network based prediction algorithm. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:393-395 [Conf]
  88. Mansoor Alam, Vinod Jeyachandran
    A fuzzy algorithm for ABR flow control in ATM networks. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:396-399 [Conf]
  89. Dong Chun Lee, Sung Y. Shin
    Radiance simulation of multispectral remote sensor data for water resource applications. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:400-403 [Conf]
  90. Dong Chun Lee, Jay H. Kwon, Keehwan Hong, Sung Y. Shin
    A conceptual framework for GIS-based vehicle monitoring system. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:404-407 [Conf]
  91. Mehmed M. Kantardzic, Hazem M. Hamdan, Benjamin Djulbegovic, Adel Said Elmaghraby
    New diagnostic criteria for polycythemia rubra vera: Artificial neural network approach. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:408-411 [Conf]
  92. D. J. Jackson, Russell L. Pimmel, Allen S. Parrish, Brandon Dixon, David Cordes, Richard B. Borie
    Logic design programming assignments in a first-year course. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:412-414 [Conf]
  93. Naeem Al-Shamary, Francesco Crusca, Hamid Abachi
    Mixed-sensitivity H8 controller design for the lateral dynamics of a civil aircraft. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:415-417 [Conf]
  94. Sayed Hassen, Francesco Crusca, Hamid Abachi
    Modelling systems for control studies - an overview. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:418-421 [Conf]
  95. Rania A/Hamid El-Sayed, Ahmed Sameh
    Visual constraint programming environment for configuration problems. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:422-426 [Conf]
  96. Jacob Furst, Karen Alkoby, André Berthiaume, Pattaraporn Chomwong, Mary Jo Davidson, Brian Konie, Glenn Lancaster, Steven L. Lytinen, John McDonald, Lopa Roychoudhuri, Jorge Toro, Noriko Tomuro, Rosalee Wolfe
    Database design and population for american sign language. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:427-430 [Conf]
  97. Kaninda Musumbu
    Failure diagnosis of declarative programs based on abstract interpretation (extended abstract). [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:431-434 [Conf]
  98. Kiumi Akingbehin
    Two applications of an hierarchical computer animation model. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:435-438 [Conf]
  99. Tony Lindgren
    Anytime inductive logic programming. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:439-442 [Conf]
  100. Walter Dosch, Sönke Magnussen
    Transformational derivation of a bytecode verifier. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:443-447 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002