default search action
CISSE 2008: Bridgeport, CT, USA - SCSS, Volume 1
- Tarek M. Sobh:
Innovations and Advances in Computer Sciences and Engineering, Volume I of the proceedings of the 2008 International Conference on Systems, Computing Sciences and Software Engineering (SCSS), part of the International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering, CISSE 2008, Bridgeport, Connecticut, USA. Springer 2010, ISBN 978-90-481-3657-5 - Lucie Nohacova, Karel Nohac:
Possibilities of Computer Simulation in Power Engineering and Environmental Engineering. 1-5 - Nguyen Dinh Thuan:
Mining Time Pattern Association Rules in Temporal Database. 7-11 - Dawod Kseibat, Ali Mansour, Osei Adjei:
Domain-Based Intelligent Tutoring System. 13-17 - Zeeshan-ul-hassan Usmani, Fawzi Abdulkhaliq Alghamdi, Amina Tariq, Talal Naveed Puri:
I Know What You Did This Summer - Users' Behavior on Internet. 19-24 - Zeeshan-ul-hassan Usmani, Fawzi Abdulkhaliq Alghamdi, Amina Tariq, Talal Naveed Puri:
Relative Ranking - A Biased Rating. 25-29 - Chompu Nuangjamnong, Stanislaw P. Maj, D. Veal:
Resource Redundancy - A Staffing Factor using SFIA. 31-35 - Y. C. Phung, Somnuk Phon-Amnuaisuk, R. Komiya:
Integrating Text Mining and Genetic Algorithm for Subject Selection. 37-41 - G. S. Bagale, Naik Sawankumar, A. J. Deshmukh, R. Y. Patil:
"Design, Development & Implementation of E-Learning Tools". 43-48 - Jaroslav Tupy, Ivan Zelinka:
Search for equilibrium state flight. 49-54 - Salvador Bueno, M. Dolores Gallego:
Evaluating acceptance of OSS-ERP based on user perceptions. 55-60 - Ahmed Abdel Hamid, Mahmoud Ahmed, Yehia K. Helmy:
Enhanced Progressive Vector Data Transmission For Mobile Geographic Information Systems (MGIS). 61-66 - Yi Hu, Brajendra Panda:
Mining Inter-transaction Data Dependencies for Database Intrusion Detection. 67-72 - Amit K. Beeputh, M. Razvi Doomun, Padaruth Dookee:
Energy-Security Adaptation Scheme of Block Cipher Mode of Operations. 73-78 - Zsolt Tibor Kosztyán, Tibor Csizmadia, Csaba Hegedüs, Zoltán Kovács:
Treating measurement uncertainty in complete conformity control system. 79-84 - Shukor Sanim Bin Mohd Fauzi, Nuraminah R., Mohd Hairul Nizam Md. Nasir:
Software Process Improvement Models Implementation in Malaysia. 85-90 - Carlos André Reis Pinheiro, Markus Helfert:
Neural Network and Social Network to enhance the customer loyalty process. 91-96 - Aubrey Jaffer, Mike Plusch, Robert Nilsson:
Using B-trees to Implement Water: a Portable, High Performance, High-Level Language. 97-100 - Sunil Kumar Kopparapu:
Voice Based Self Help System: User Experience Vs Accuracy. 101-105 - Amal Ahmed Abd-Ellatif Yousef:
Using GIS to produce Vulnerability Maps of Non-Gauged Watersheds area. 107-112 - Hamdi A. Al-Jamimi, Sabri A. Mahmoud:
Arabic Character Recognition Using Gabor Filters. 113-118 - Sushil Chandra, Ahsan Zaigam Rizvi:
Entropy, Autocorrelation and Fourier analysis of HIV-1 Genome. 119-121 - Kevin McCarty, Milos Manic, Sergiu-Dan Stan:
Contextual Data Rule Generation For Autonomous Vehicle Control. 123-128 - Atif Farid Mohammad:
A New Perspective in Scientific Software Development. 129-134 - Atif Farid Mohammad, Dustin E. R. Freeman:
Supply Chain Requirements Engineering: A Simulated Reality Check. 135-140 - Atif Farid Mohammad:
A Path from a Legacy System to GUI System. 141-146 - Jian-Bo Chen:
Features Based Approach to Identify the P2P File Sharing. 147-151 - Andreas Lanitis, Georgios Stylianou:
Evaluating the Performance of 3D Face Reconstruction Algorithms. 153-158 - Morteza Sargolzaei Javan, Farahnaz Mohanna, Sepide Aghajani:
Multi Dimensional and Flexible Model for Databases. 159-164 - Kuderna-Iulian Benta, Marcel Cremene, Nicoleta Ramona Giba, Ulises Xolocotzin Eligio, Anca Rarau:
Secondary Emotions Deduction from Context. 165-170 - Ahmad Sofian Shminan, Iskandar Sarkawi, Mohd Kamal Othman, Mardhiah Hayati Rahim:
Empowering Traditional Mentoring Matching Mechanism Selection Using Agent-Based System. 171-178 - Liang Xia, Yongjian Yang, Yong Wang:
A Method of Evaluating Authentication Mechanisms. 179-184 - Ioannis Calemis, Achilles Kameas, Christos Goumopoulos, Erik Berg:
ASTRA: An Awareness Connectivity Platform for Designing Pervasive Awareness Applications. 185-190 - Alessandra Esposito, Luciano Tarricone, Laura Vallone:
Extending OWL-S to nested services: an application to optimum wireless network planning. 191-195 - Mirza Mahmood Baig, Ansar Ahmad Khan:
A Formal Technique for Reducing Software Testing Time Complexity. 197-201 - Tamer F. Mabrouk, Mohamed M. El-Sherbiny, Shawkat K. Guirguis, Ayman Y. Shawky:
A Multi-Agent Role-Based System for Business Intelligence. 203-208 - Fernando Alonso, José L. Fuertes, Ángel Lucas González, Loïc Martínez:
LERUS: A User Interface Specification Language. 209-214 - A. Arnoldi, A. Invernizzi, Raffaele Ponzini, Emiliano Votta, Enrico G. Caiani, Alberto Redaelli:
Mitral Valve Models Reconstructor: a Python based GUI software in a HPC environment for patient-specific FEM structural analysis. 215-219 - S. S. V. N. Sharma, P. Shirisha:
An Intelligible Representation Method For Software Reusable Components. 221-225 - Jonathan White:
Creating Personally Identifiable Honeytokens. 227-232 - M. Dolores Gallego, Salvador Bueno:
The role of user experience on FOSS acceptance. 233-236 - József Berke:
Using Spectral Fractal Dimension in Image Classification. 237-241 - Zili Chen, Jonathan J. Webster, Ian C. Chow:
A Novel Method to Compute English Verbs' Metaphor Making Potential in SUMO. 243-247 - Anatolii F. Kleimenov, Sergei I. Osipov, Dmitry R. Kuvshinov:
A Numerical Construction Algorithm of Nash and Stackelberg Solution for Two-person Non-zero Sum Linear Positional Differential Games. 249-254 - Kresimir Nenadic, Marina Pesut, Franjo Jovic, Ninoslav Slavek:
Computer Simulation of Differential Digital Holography. 255-258 - Cecilia Maurente, Ernesto Ocampo Edye, Silvia Herrera Delgado, Daniel Rodríguez-García:
Evaluation of Case Based Reasoning for Clinical Decision Support Systems applied to Acute Meningitis Diagnose. 259-264 - Alexei Y. Muravitsky:
Information Systems via Epistemic States. 265-271 - Carla Ilane Moreira Bezerra, Ciro Carneiro Coelho, Carlo Giovano S. Pires, Adriano Bessa Albuquerque:
Practical Application of Performance Models to Predict the Productivity of Projects. 273-277 - Adriano Bessa Albuquerque, Ana Regina Rocha:
An Approach to Evaluate and Improve the Organizational Processes Assets: the First Experience of Use. 279-284 - Francisca Márcia G. S. Gonçalves, Adriano Bessa Albuquerque, Daniele de Oliveira Farias, Plácido Rogério Pinheiro:
A Multiple Criteria Approach to Analysis and Resolution of the Causes of Problems on Software Organizations. 285-290 - Francisco José Barreto Nunes, Adriano Bessa Albuquerque:
A Secure Software Development Supported by Knowledge Management. 291-296 - Sarin Kizhakkepurayil, Oh Jeon-Yeoul, Young Lee:
Mobile Application for Healthcare System - Location Based. 297-302 - Saeid Abrishami, Mohsen Kahani:
A General Framework for Testing Web-Based Applications. 303-306 - Ghulam Rasool, Ilka Philippow:
Integrated Reverse Engineering Process Model. 307-311 - Faheem Sohail, Farooq Zubairi, Nabeel Sabir, Nazir Ahmad Zafar:
Achieving Consistency and Reusability in Presentation Layer Design using Formal Methods and Design Patterns. 313-318 - Biju Issac:
First Level Text Prediction using Data Mining and Letter Matching in IEEE 802.11 Mobile Devices. 319-324 - Juan Francisco García Navarro, Roberto Therón, Francisco J. García-Fernández:
Visualization of Large Software Projects by using Advanced Techniques. 325-330 - M. Mehdi S. Haghighi, M. Hadi Zahedi, Mehdi Ghazizadeh:
A multi level priority clustering GA based approach for solving heterogeneous Vehicle Routing Problem (PCGVRP). 331-335 - Farhana Faruqe, Mumit Khan:
BWN - A Software Platform for Developing Bengali WordNet. 337-342 - Yevgeniy V. Bodyanskiy, Sergiy Popov, Mykola Titov:
Robust Learning Algorithm for Networks of Neuro-Fuzzy Units. 343-346 - Solange Alcântara Araújo, Adriano Bessa Albuquerque, Arnaldo Dias Belchior, Nabor Chagas Mendonça:
An Experience of Use of an Approach to Construct Measurement Repositories in Software Organizations. 347-352 - Hawaf Abdalhakim, Mohamed Abdelfattah:
A Visualization-based Intelligent Decision Support System Conceptual Model. 353-358 - A. Kowal, Adam Piórkowski, Tomasz Danek, Anna Pieta:
Analysis of selected component technologies efficiency for parallel and distributed seismic wave field modeling. 359-362 - Yaohui Bai:
Modified Locally Linear Embedding based on Neighborhood Radius. 363-367 - Gavin Wylie Manes:
A Digital Forensics Primer. 369-372 - Abdelsalam M. Maatuk, Muhammad Akhtar Ali, B. Nick Rossiter:
Semantic Enrichment: The First Phase of Relational Database Migration. 373-378 - Amaury T. Brasil Filho, Plácido Rogério Pinheiro, André L. V. Coelho:
The Impact of the Prototype Selection on a Multicriteria Decision Aid Classification Algorithm. 379-382 - Md. Abdul Based:
Information Handling in Security Solution Decisions. 383-388 - Young Lee, Jeong Yang, Kai H. Chang:
Identifying Connected Classes for Software Reuse and Maintenance. 389-393 - Marianella Aveledo, Agustín De la Rosa, Ana María Moreno:
Usability Design Recommendations: A First Advance. 395-400 - Naipeng Ding, Cui Wang, Guangming Jia:
The Status Quo of 3G Application in China. 401-406 - Facundo E. Cancelo, Pablo Cababie, Daniela López De Luise, Gabriel Barrera:
A new approach for critical resources allocation. 407-411 - Mindaugas Snipas, Eimutis Valakevicius:
Numerical-Analytic Model of Multi-Class, Multi-Server Queue with Nonpreemptive Priorities. 413-415 - Igor Aguilar Alonso, José Carrillo Verdún, Edmundo Tovar Caro:
Project Prioritization as a Key Element in IT Strategic Demand Management. 417-422 - Tomas Sochor:
Greylisting method analysis in real SMTP server environment - Case-study. 423-427 - Sajad Shirali-Shahreza, Mohammad Shirali-Shahreza:
Using Formal Methods in Component Based Software Development. 429-432 - Petra Maresová, Martina Hedvicaková:
Costs and Benefits in Knowledge Management in Czech Enterprises. 433-437 - Lambrini Seremeti, Achilles Kameas:
Ontology-based representation of activity spheres in ubiquitous computing spaces. 439-443 - Valeriy Cherkashyn, Roumen Kountchev, Dong-Chen He:
Image Decomposition on the basis of an Inverse Pyramid with 3-layer Neural Networks. 445-450 - A. M. Paracha, Frantisek Franek:
Testing Grammars For Top-Down Parsers. 451-456 - Victoria Christy Sathya Rajasekar, Young Lee, Barbara Schreur:
Accessing Web Based Multimedia Contents for the Visually Challenged: Combined Tree Structure and XML Metadata. 457-462 - Olaf Thiele:
M-Business and Organizational behavior. 463-466 - Elarbi Badidi, Mohamed Adel Serhani, Larbi Esmahi:
A Policy-based Framework for QoS Management in Service Oriented Environments. 467-472 - F. Abdoli, N. Meibody, R. Bazoubandi:
An Attacks Ontology for computer and networks attack. 473-476 - Owen Foley, Markus Helfert:
Information Quality and Accessibility. 477-481 - Sven Kaffille, Guido Wirtz:
Engineering Autonomous Trust-Management Requirements for Software Agents: Requirements and Concepts. 483-489 - José L. Fuertes, Aurora Pérez:
Evaluation of Semantic Actions in Predictive Non-Recursive Parsing. 491-496 - Peter Nabende, Jörg Tiedemann, John Nerbonne:
Pair Hidden Markov Model for Named Entity Matching. 497-502 - Zeeshan-ul-hassan Usmani, Eyosias Yoseph Imana, Daniel Kirk:
Escaping Death - Geometrical Recommendations for High Value Targets. 503-508 - Matthew Whitehead, Larry S. Yaeger:
Sentiment Mining Using Ensemble Classification Models. 509-514 - Mandhapati P. Raju:
Parallelization of Finite Element Navier-Stokes codes using MUMPS Solver. 515-518 - Thomas Nitsche:
Shapely Functions and Data Structure Preserving Computations. 519-525 - Michael W. Frandsen, Susanne Z. Riehemann, Kristin Precoda:
IraqComm and FlexTrans: A Speech Translation System and Flexible Framework. 527-532 - Byung-Wan Jo, Jung-Hoon Park, Kwang-won Yoon, Heoun Kim, Ji-Sun Choi:
Development of Ubiquitous Median Strip Total System in the Road. 533-537 - Miao Song, Peter Grogono:
An LOD Control Interface for an OpenGL-based Softbody Simulation Framework. 539-543 - Byung-Wan Jo, Kwang-won Yoon, Seok-Won Kang, Jung-Hoon Park, Heoun Kim:
Laboratory performance test of overload vehicles regu-lation system on Ubiquitous road. 545-550 - Byung-Wan Jo, Heoun Kim, Jung-Hoon Park, Kwang-won Yoon, Seok-Won Kang, Seong-hee Han:
Design of bridge health monitoring system on Wireless Sensor Network. 551-554 - Chin Teck Min, Tong Ming Lim:
Totally Sender- And File-Order Recovery Technique For Reliable Multicasting Solutions Using Heartbeat. 555-559 - Longy O. Anyanwu, Jared Keengwe, Gladys A. Arome:
Anonymity Leakage Reduction in Network Latency. 561-565 - R. William Maule, Shelley P. Gallup:
Enterprise 2.0 Collaboration for Collective Knowledge and Intelligence Applications. 567-572 - R. William Maule, Shelley P. Gallup, Jack J. Jensen:
Knowledge Engineering Experimentation Management System for Collaboration. 573-578 - Paola C. Ferrari, Neander Furtado Silva, Ecilamar Maciel Lima:
Building Information Modeling and Interoperability with Environmental Simulation Systems. 579-583
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.