The SCEAS System
Navigation Menu

Conferences in DBLP

(sede)
2009 (conf/sede/2009)


  1. Deletion Techniques for the ND-tree in Non-ordered Discrete Data Spaces. [Citation Graph (, )][DBLP]


  2. The Electronic Medical Record: A Temporal Multimedia Database. [Citation Graph (, )][DBLP]


  3. Using Shape Patterns for Clustering Unstructured Text Documents. [Citation Graph (, )][DBLP]


  4. Natural-Inspired Data Clustering: A Hybridization between Ant Clustering and Particle Swarm Optimization. [Citation Graph (, )][DBLP]


  5. Gene Function Prediction. [Citation Graph (, )][DBLP]


  6. Military Route Planning in Battle Field Simulations for a Multi-Agent System. [Citation Graph (, )][DBLP]


  7. BCI++: A New Framework for Brain Computer Interface Application. [Citation Graph (, )][DBLP]


  8. Denotational Semantics for Social Communication among Agents. [Citation Graph (, )][DBLP]


  9. Using Mapping Relations for XML Schema Mediation. [Citation Graph (, )][DBLP]


  10. Processing Schema-Optimized XPath Filters by Deterministic Automata. [Citation Graph (, )][DBLP]


  11. An Application for Tree Detection Using Satellite Imagery and Vegetation Data. [Citation Graph (, )][DBLP]


  12. Software Development Aspects of a Mobile Food Ordering System. [Citation Graph (, )][DBLP]


  13. Student's Aid: A Touchscreen Device. [Citation Graph (, )][DBLP]


  14. WiELD-CAVE: Wireless Ergonomic Lightweight Device for use in the CAVE. [Citation Graph (, )][DBLP]


  15. Towards a Change Propagation Process in Software Architecture. [Citation Graph (, )][DBLP]


  16. A Hybrid Heuristic Approach To Optimize Rule-Based Software Quality Estimation Models. [Citation Graph (, )][DBLP]


  17. Rearchitecting Meta-modeling Foundation: A Formal Approach. [Citation Graph (, )][DBLP]


  18. A Survey on Model Driven Software Development. [Citation Graph (, )][DBLP]


  19. Modeling and Verification of Dynamic Behavior in UML Models: A Graph Transformation Approach. [Citation Graph (, )][DBLP]


  20. Supporting Tool Reuse with Model Transformation. [Citation Graph (, )][DBLP]


  21. Composite Service MetaModel. [Citation Graph (, )][DBLP]


  22. Test Suites Effectiveness from Sequence Diagrams and Function Call Trees. [Citation Graph (, )][DBLP]


  23. Data Warehouse Development Using MDA and 2TUP. [Citation Graph (, )][DBLP]


  24. SQL-Guard Design Pattern. [Citation Graph (, )][DBLP]


  25. Experimental Study on Item-based P-Tree Collaborative Filtering Algorithm for Netflix. [Citation Graph (, )][DBLP]


  26. An Improved Wave Planning Technique For Material-To-Man Order Picking Operation. [Citation Graph (, )][DBLP]


  27. Robustness Testing on Composed Timed Systems. [Citation Graph (, )][DBLP]


  28. A Strategy to Derive RSL Specification from Feature Models. [Citation Graph (, )][DBLP]


  29. Management Automation Specified by SPEM Work Breakdown Element using Workflow Technology. [Citation Graph (, )][DBLP]


  30. Specifying Requirements for Real-Time Systems. [Citation Graph (, )][DBLP]


  31. Adoption of Technology Acceptance Model (TAM) to Electronic Commerce: A Statistical Meta-Analysis Approach. [Citation Graph (, )][DBLP]


  32. Combination of a MANET Data Communication Protocol with a Service Discovery Protocol for Mobile Ad Hoc Networks in a Framework. [Citation Graph (, )][DBLP]


  33. New Techniques and Algorithms for Text Steganography through Hindi Text. [Citation Graph (, )][DBLP]


  34. Security Requirements Engineering: The Mobile Phones Context. [Citation Graph (, )][DBLP]


  35. Checking for Liskov Substitution Principle Compliance in Java Programs. [Citation Graph (, )][DBLP]


  36. Towards a Framework for Automated Random Testing of Aspect-Oriented Programs. [Citation Graph (, )][DBLP]


  37. A Metaheuristic to Solve a Traveling Salesman Problem. [Citation Graph (, )][DBLP]


  38. Optimizing Network Deployment of Formally-Specified Distributed Systems. [Citation Graph (, )][DBLP]


  39. (m, k)-frame: A Method to Control the Quality of Service in Distributed Multimedia Systems. [Citation Graph (, )][DBLP]


  40. Internal Corporative Security: Protocols Preventing Leakage of Sensitive Information and Assuring Authorized Network Traffic in the Domain of Gaussian Integers. [Citation Graph (, )][DBLP]


  41. Evolutionary Nearest Neighbour Classification Framework. [Citation Graph (, )][DBLP]


  42. The Universality of Nearest Neighbor Sets in Classification and Prediction. [Citation Graph (, )][DBLP]


  43. An Empirical Study of the Effectiveness of Partial Antirandom Testing. [Citation Graph (, )][DBLP]


  44. A Machine Learning Approach for Watermarking in Dithered Halftone Images. [Citation Graph (, )][DBLP]


  45. A Lip Segmentation Using New Threshold Method Towards An Automatic Speech Recognition System. [Citation Graph (, )][DBLP]


  46. Speech Emotion Profiiling for Inter and Intra-Cultural Assessment. [Citation Graph (, )][DBLP]


  47. Facial Image Aging Synthesis Based on the Log-Gabor Wavelet. [Citation Graph (, )][DBLP]


  48. Face Recognition Based Presentation Checking System. [Citation Graph (, )][DBLP]


  49. EEG Signals for Emotion Recognition. [Citation Graph (, )][DBLP]


  50. PSO accelerated 3D face angle searching system for face recognition. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002