default search action
AICCSA 2008: Doha, Qatar
- The 6th ACS/IEEE International Conference on Computer Systems and Applications, AICCSA 2008, Doha, Qatar, March 31 - April 4, 2008. IEEE Computer Society 2008, ISBN 978-1-4244-1967-8
- Jinhui Chen, Zhongfu Ye, Min Tang:
A multipattern matching algorithm using sampling and bit index. 1-8 - Amin Zamiri, Amir Farzad, Ehsan Saboori, Modjtaba Rouhani, Mahmoud Naghibzadeh:
An evolutionary gait generator with online parameter adjustment for humanoid robots. 9-14 - Ehsan Asgarian, M-Hossein Moeinzadeh, Sara Sharifian-R, Amir Najafi-Ardabili, Amin Ramezani, Jafar Habibi, Javad Mohammadzadeh:
Solving MEC model of haplotype reconstruction using information fusion, single greedy and parallel clustering approaches. 15-19 - Benfano Soewito, Ning Weng:
Methodology for evaluating string matching algorithms on multiprocessor. 20-27 - Javid Taheri, Albert Y. Zomaya, Bing Bing Zhou:
RBT-I: A novel approach for solving the Multiple Sequence Alignment problem. 28-36 - Rehab M. Duwairi, Amal Kassawneh:
A framework for predicting proteins 3D structures. 37-44 - El-Ghazali Talbi, Laetitia Jourdan, José García-Nieto, Enrique Alba:
Comparison of population based metaheuristics for feature selection: Application to microarray data classification. 45-52 - Aiman H. El-Maleh, Bashir M. Al-Hashimi, Aissa Melouki:
Transistor-level based defect tolerance for reliable nanoelectronics. 53-60 - Arash Mehdizadeh, Morteza Saheb Zamani:
Proposing an efficient method to estimate and reduce crosstalk after placement in VLSI circuits. 61-68 - Truong Quang Vinh, Young-Chul Kim:
A low power crosstalk-free bus encoding using genetic algorithm. 69-73 - Pooya Davari, Hamid Hassanpour:
A variable step-size FxLMS algorithm for feedforward active noise control systems based on a new online secondary path modelling technique. 74-81 - Turki F. Al-Somani, Alaaeldin Amin:
High performance elliptic curve point operations with pipelined GF(2m) field multiplier. 82-88 - Mona Safar, Mohamed Shalan, M. Watheq El-Kharashi, Ashraf Salem:
Hardware based algorithm for conflict diagnosis in SAT solver. 89-93 - Foad Lotfifar, Hadi Shahriar Shahhoseini:
Performance modeling of partially reconfigurable computing systems. 94-99 - Chin-Hsien Wu:
A flash translation layer for huge-capacity flash memory storage systems. 100-107 - Sellappan Palaniappan, Rafiah Awang:
Intelligent heart disease prediction system using data mining techniques. 108-115 - Paulo M. Goncalves, Adrian L. Arnaud, Roberto Souto Maior de Barros:
DMPML Data Mining Preparation Markup Language. 116-125 - Ghazi Al-Naymat:
Enumeration of maximal clique for mining spatial co-location patterns. 126-133 - Fadi K. Deeb, Ludovít Niepel:
A methodology for discovering spatial co-location patterns. 134-141 - Majid Pourkashani, Mohammad Reza Kangavari:
A cellular automata approach to detecting concept drift and dealing with noise. 142-148 - Byung-Hoon Park, Nagiza F. Samatova, Rajesh Munavalli, Ramya Krishnamurthy, Houssain Kettani, Al Geist:
Rapid and robust ranking of text documents in a dynamically changing corpus. 149-155 - Abdelmalek Amine, Zakaria Elberrichi, Ladjel Bellatreche, Michel Simonet, Mimoun Malki:
Concept-based clustering of textual documents using SOM. 156-163 - Mohammad Alomari, Michael J. Cahill, Alan D. Fekete, Uwe Röhm:
When serializability comes without cost. 164-171 - Shariq Bashir, Zahid Halim, Abdul Rauf Baig:
Mining fault tolerant frequent patterns using pattern growth approach. 172-179 - Abhi Dattasharma, Praveen Kumar Tripathi:
Practical inter-stock dependency indicators using time series and derivatives. 180-187 - Ghazi Al-Naymat, Javid Taheri:
Effects of dimensionality reduction techniques on time series similarity measurements. 188-195 - Rana Malhas, Zaher Al Aghbari:
Using sensitivity of a bayesian network to discover interesting patterns. 196-205 - (Withdrawn) Detecting high-value individuals in covert networks: 7/7 London bombing case study. 206-215
- Mohammed Y. Aalsalem, Javid Taheri, Mohsin Iftikhar, Albert Y. Zomaya:
Providing QoS guarantees to multiple classes of traffic in wireless sensor networks. 216-222 - Farzad Tashtarian, Mohsen Tolou Honary, Majid Mazinani, A. T. Haghighat, Jalil Chitizadeh:
An energy efficient data reporting scheme for wireless sensor networks. 223-228 - Omid Abedi, Mahmood Fathy, Jamshid Taghiloo:
Enhancing AODV routing protocol using mobility parameters in VANET. 229-235 - Najah A. Abu Ali, Essa Ekram, Ali Eljasmy, Khaled Shuaib:
Measured delay distribution in a Wireless Mesh Network test-bed. 236-240 - Tao Liu, Depei Qian, Yongxiang Huang, Ying He, Rui Wang:
An evolutionary node architecture and performance optimization. 241-246 - Sanmin Liu, Hai Jin, Xiaofei Liao, Hong Yao, Deze Zeng:
TCPBridge: A software approach to establish direct communications for NAT hosts. 247-252 - Osama Abu-Rahmeh, Princy Johnson:
Towards scalable and reliable Grid Networks. 253-259 - Lichen Zhang, Lihua Wang:
Aspect-oriented formal specification for multimedia systems. 260-267 - Abdul Aziz, Hesham El-Rewini:
Workflow scheduling in computational grids: Opportunistic vs. planned. 268-275 - Shariful Hasan Shaikot, Venkatesh Sarangan:
Energy aware routing in high capacity overlays in wireless sensor networks. 276-283 - Farzad Tashtarian, Mohsen Tolou Honary, Majid Mazinani, A. T. Haghighat, Jalil Chitizadeh:
A new level based clustering scheme for wireless sensor networks. 284-290 - Jiguo Yu, Wenjun Liu, Jingjing Song, Baoxiang Cao:
EEMR: An energy-efficient multi-hop routing protocol for wireless sensor networks. 291-298 - S. Ali, A. Fakoorian, Mohsen Tolou Honary, Hassan Taheri:
Energy assignment in wireless sensor networks with hierarchical cluster-based routing. 299-303 - Esa Alghonaim, Aiman El-Maleh, Mohamed Adnan Landolsi:
Using input/output queues to increase LDPC decoder performance. 304-308 - Ibrahim Y. Abualhaol, Mustafa M. Matalgah:
Capacity analysis of MIMO system over Nakagami-m fading channels using Finite Mixture with Expectation Maximization algorithm. 309-316 - Mohammad Hayajneh, Chaouki T. Abdallah, Walid Ibrahim:
Impact of fading wireless channel on the performance of game theoretic power control algorithms for CDMA wireless data. 317-324 - Kyu-Sung Hwang, Young-Chai Ko, Mohamed-Slim Alouini, Wooyong Lee:
Slow antenna selection and fast link adaptation MIMO systems. 325-332 - Badis Tebbani, Issam Aib, Guy Pujolle:
SLA-based dynamic resource management in wireless environments. 333-340 - Ayman Abdel-Hamid, Lobna Eslim, Yasser Y. Hanafy:
Enhanced mobile node's reachability through anycasting for MIPv6 regional registrations. 341-348 - Hongbo Liu, Wei Zhang:
Self-localization based on improved subspace approach in wireless sensor network. 349-354 - Soufiene Djahel, Farid Naït-Abdesselam:
Avoiding virtual link attacks in wireless ad hoc networks. 355-360 - Sanaa Sharafeddine, Zaher Dawy, Amjad Beainy:
Network provisioning over IP networks with call admission control schemes. 361-365 - Jalel Ben-Othman, Farid Naït-Abdesselam, Lynda Mokdad, Octavio Ramirez Rojas:
Performance evaluation of TCP handoffs over mobile IP connections. 366-372 - Tarek Bejaoui, Nidal Nasser:
Handover and class-based Call Admission Control policy for 4G-heterogeneous mobile networks. 373-380 - Rami Tawil, Jacques Demerjian, Guy Pujolle, Oscar Salazar Gaitán:
Processing-delay reduction during the vertical handoff decision in heterogeneous wireless systems. 381-385 - Abdul-Rahman Elshafei, Uthman Baroudi:
Wireless Fair Queuing algorithm for window-based Link Level Retransmission. 386-391 - Khaled Salah, F. Haidari:
On the performance of a simple packet rate estimator. 392-395 - Mohammad Al Nabhan, Suleiman Al Masri, Wamadeva Balachandran, Ziad Hunaiti:
A critical assessment for RINEX data from OS NET for GPS accuracy improvement. 396-402 - Omar M. Hammouri, Mustafa M. Matalgah:
Voronoi path planning technique for recovering communication in UAVs. 403-406 - Mourad Amad, Ahmed Meddahi:
A scalable P2P model for optimizing application layer multicast. 407-413 - Ruay-Shiung Chang, Hui-Ping Chang, Yun-Ting Wang:
A dynamic weighted data replication strategy in data grids. 414-421 - Khalid Abdelkader, Jan Broeckhove, Kurt Vanmechelen:
Commodity resource pricing in dynamic computational grids. 422-429 - Hadi Salimi, Mohsen Sharifi:
OTSX: An extended transaction service in support of FT-CORBA standard. 430-435 - Ali Elghirani, Riky Subrata, Albert Y. Zomaya, Ali Al Mazari:
Performance enhancement through hybrid replication and Genetic Algorithm co-scheduling in data grids. 436-443 - Ch. D. V. Subba Rao, M. M. Naidu:
A new, efficient coordinated checkpointing protocol combined with selective sender-based message logging. 444-447 - Farshad Safaei, Ahmad Khonsari, Amirhossein Shantia:
Comparative performance evaluation of software-based fault-tolerant routing algorithms in adaptively-routed tori. 448-455 - Audrey Marchand, Maryline Silly-Chetto:
Dynamic scheduling of periodic skippable tasks in an overloaded real-time system. 456-464 - Lars Lundberg, Håkan Lennerstad:
Slack-based global multiprocessor scheduling of aperiodic tasks in parallel embedded real-time systems. 465-472 - Med Amine Haddar, Ahmed Hadj Kacem, Yves Métivier, Mohamed Mosbah, Mohamed Jmaiel:
Electing a leader in the local computation model using mobile agents. 473-480 - Ning Weng, Nandeesh Kumar, Satish Dechu, Benfano Soewito:
Mapping task graphs onto Network Processors using genetic algorithm. 481-488 - Jafar Ramadhan Mohammed:
Real-time implementation of an efficient RLS algorithm based on IIR filter for acoustic echo cancellation. 489-494 - Afsaneh Asaei, Mohammad Javad Taghizadeh, Hossein Sameti:
Far-field continuous speech recognition system based on speaker Localization and sub-band Beamforming. 495-500 - Pejman Mowlaee Begzade Mahale, Mahsa Rashidi, Abolghasem Sayadiyan:
A model order based sinusoid representation for audio signals. 501-507 - Jafar Ramadhan Mohammed:
A new robust adaptive beamformer for enhancing speech corrupted with colored noise. 508-515 - Nakissa Barzegar, Mohammad Shahram Moin:
A new approach for iris localization in iris recognition systems. 516-523 - Hamid Tabatabaee Yazdi, Amin Milani Fard, Mohammad R. Akbarzadeh-Totonchi:
Cooperative criminal face recognition in distributed web environment. 524-529 - Farid Benhammadi, Kadda Bey-Beghdad, Hamid Hentous:
Fingerprint verification based on core point neighbourhoods minutiae. 530-536 - Farid Benhammadi, Nassima Kihal:
Personal authentication based on iris texture analysis. 537-543 - El-Sayed M. El-Alfy, Fares S. Al-Qunaieer:
A fuzzy similarity approach for automated spam filtering. 544-550 - Mahdieh Soleymani Baghshah, Saeed Bagheri Shouraki, Caro Lucas:
An agent-based clustering algorithm using potential fields. 551-558 - Mahdieh Soleymani Baghshah, Saeed Bagheri Shouraki:
A fuzzy clustering algorithm for finding arbitrary shaped clusters. 559-566 - Mohammed Waleed Ashour, Mahmoud F. Hussin, Khaled Mohammed Mahar:
Supervised texture classification using several features extraction techniques based on ANN and SVM. 567-574 - Abolfazl Lakdashti, Mohammad Shahram Moin, Kambiz Badie:
Semantic-based image retrieval: A fuzzy modeling approach. 575-581 - Somaya Al-Máadeed, Eman Mohammed, Dori Al Kassis:
Writer identification using edge-based directional probability distribution features for arabic words. 582-590 - Mohammad Reza Soheili:
Redundant watermarking using wavelet packets. 591-598 - François Meunier, David Laperrière:
A video-based image processing system for the automatic implementation of the eye involuntary reflexes measurements involved in the Drug Recognition Expert (DRE). 599-605 - Farhad Mohamad Kazemi, Jalaleddin Izadian, Reihaneh Moravejian, Ehsan Mohamad Kazemi:
Numeral recognition using curvelet transform. 606-612 - Abheek Saha, Seema Garg:
ALSD: An algorithm for noise erasure and structural information recovery for surfaces with structural discontinuities. 613-622 - Ehsan Shahrian, Hossein Karshenas, Mahmood Fathy:
A similarity-window based background estimation approach. 623-628 - Sherif G. Moursi, Mahmoud R. El-Sakka:
Active contours initialization for ultrasound carotid artery images. 629-636 - M. Usman Akram, Anam Tariq, Sarwat Nasir, Assia Khanam:
Core point detection using improved segmentation and orientation. 637-644 - Saeed Samet, Ali Miri:
Privacy preserving ID3 using Gini Index over horizontally partitioned data. 645-651 - Jianwen Xiang, Dines Bjørner, Kokichi Futatsugi:
Formal digital license language with OTS/CafeOBJ method. 652-660 - Syrine Tlili, Mourad Debbabi:
A novel flow-sensitive type and effect analysis for securing C code. 661-668 - Abdulsalam Yassine, Shervin Shirmohammadi:
Privacy and the market for private data: A negotiation model to capitalize on private data. 669-678 - Ahmed Alazzawe, Anis Nawaz, Duminda Wijesekera:
Extracting Kerberos passwords through RC4-HMAC encryption type analysis. 679-685 - Roya Ensafi, Soheila Dehghanzadeh, Mohammad R. Akbarzadeh-Totonchi:
Optimizing Fuzzy K-means for network anomaly detection using PSO. 686-693 - Dieaa I. Nassr, Hatem M. Bahig, Ashraf Bhery, Sameh S. Daoud:
A new RSA vulnerability using continued fractions. 694-701 - Samiha Ayed, Nora Cuppens-Boulahia, Frédéric Cuppens:
Managing access and flow control requirements in distributed workflows. 702-710 - Yacine Rebahi, Jordi Jaen Pallares, Tuan Minh Nguyen, Sven Ehlert, Gergely Kovacs, Dorgham Sisalem:
Performance analysis of identity management in the Session Initiation Protocol (SIP). 711-717 - Jianming Fu, Huijun Xiong, Zhou Li, Huanguo Zhang:
PerformTrust: Trust model integrated past and current performance in P2P file sharing systems. 718-725 - Abdelli Abdelkrim, Dahbia Yahiatene:
Efficient computation of state space over approximation of preemptive real time systems. 726-733 - Noureddine Adjir, Pierre de Saqui-Sannes, Mustapha Kamel Rahmouni:
Test of preemptive real-time systems. 734-742 - Chafia Bouanaka, Faiza Belala:
Towards a mobile architecture description language. 743-748 - Hossein Keramati, Seyed-Hassan Mirian-Hosseinabadi:
Integrating software development security activities with agile methodologies. 749-754 - Jens Bruhn, Christian Niklaus, Thomas Vogel, Guido Wirtz:
Comprehensive support for management of enterprise applications. 755-762 - Khaled M. Khan:
Assessing quality of web based systems. 763-769 - Zakaria Maamar, Djamal Benslimane:
Exceptions in a Web services environment. 770-777 - Emad Ghosheh, Sue Black, Jihad Qaddour:
Design metrics for web application maintainability measurement. 778-784 - Yacine Kissoum, Zaïdi Sahnoun:
A Recursive Colored Petri Nets semantics for AUML as base of test case generation. 785-792 - Youcef Hammal:
A modular state exploration and compatibility checking of UML dynamic diagrams. 793-800 - Maryam Razavian, Ramtin Khosravi:
Modeling variability in the component and connector view of architecture using UML. 801-809 - Soraya Kouadri Mostéfaoui:
A context model based on UML and XML schema representations. 810-814 - Moutaz Saleh Mustafa, Zulaiha Ali Othman:
Efficient Hierarchical Diff-EDF schedulability for QoS packet networks. 815-819 - G. Balasubramanian, Saswat Chakrabarti:
Modelling information generation in event-driven sensor networks. 820-823 - Amer M. Magableh, Mustafa M. Matalgah:
Error rate performance for coherent modulation techniques with switched and examine diversity combining over Weibull fading channels. 824-829 - Gilbert Sawma, Issam Aib, Kablan Barbar, Guy Pujolle:
A Recursive Load Balancing technique for VoIP-dedicated WLANs. 830-833 - Louis Rompre, Ismaïl Biskri, François Meunier:
Text classification: A preferred tool for audio file classification. 834-839 - Mohsen Sharifi, Seyed Hossein Siadati:
A phishing sites blacklist generator. 840-843 - Mohammad Hassan Shirali-Shahreza, Mohammad Shirali-Shahreza:
Steganography in SMS by Sudoku puzzle. 844-847 - Yacine Rebahi, Muhammad Sher, Thomas Magedanz:
Detecting flooding attacks against IP Multimedia Subsystem (IMS) networks. 848-851 - M. Hadi Mashinchi, Siti Mariyam Hj. Shamsuddin:
A connectionist system approach for learning logic programs. 852-855 - Xing Fang, Dong Wang, Shuming Chen:
SPVA: A novel digital signal processor architecture for Software Defined Radio. 856-859 - Turki F. Al-Somani, Alaaeldin Amin:
An efficient high performance scalar multiplication method with resistance against timing attacks. 860-865 - Zohreh Seyyedsalehi, Ali Motie Nasrabadi, Vahid Abootalebi:
Committee machines and quadratic B-spline wavelet for the P300 speller paradigm. 866-869 - Mahmoud F. Hussin, Ibrahim El Rube, Mohamed S. Kamel:
Enhanced document clustering using fusion of multiscale wavelet decomposition. 870-874 - Fatma Ayari, Ali T. Alouani, Mekki Ksouri:
Wavelets: An efficient tool for lung sounds analysis. 875-878 - Walid Elloumi, Mohamed Chakroun, Moncef Charfi, Mohamed Adel Alimi:
Compression of the images of ancient Arab manuscript documents based on segmentation. 879-883 - Uvais Qidwai, Mohammed Maqbool:
On hybrid-fuzzy classifier design: An empirical modeling scenario for corrosion detection in gas pipelines. 884-890 - Majid A. Al-Taee, Mohammed Al-Rawi, Fadi M. Al-Ghawanmeh:
Time-frequency analysis of the Arabian flute (Nay) tone applied to automatic music transcription. 891-894 - Thierry Antoine-Santoni, Jean François Santucci, Emmanuelle de Gentili, Bernadette Costa:
DEVS-WSN : A discrete event approach for Wireless Sensor Network simulation. 895-898 - Hamid Mcheick, Hafedh Mili, Eric Dallaire, Rakan Mcheik:
Delegation model for object-oriented systems. 899-902 - Hamid Bagheri, Vajih Montaghami, Gholamreza Safi, Seyed-Hassan Mirian-Hosseinabadi:
An evaluation method for aspectual modeling of distributed software architectures. 903-908 - Wadha K. Lebda, Noura Fetais, Suad Al Hussaini, Sahar smail, Qutaibah M. Malluhi:
Intelligent virtual archiving for accessing news article repositories. 909-912 - David L. Duke, Charles E. Thorpe, Mazahir Mahmoud, Mahmoud Zirie:
Intelligent Diabetes Assistant: Using machine learning to help manage diabetes. 913-914 - Hassiba Nemmour, Youcef Chibani:
New technique in the use of tangent vectors for a robust handwritten digit recognition. 915-916 - Nuria Gómez Blas, Luis F. Mingo, Juan Castellanos:
Networks of evolutionary processors with a self-organizing learning. 917-918 - Sharifah Mumtazah Syed Ahmad, Asma Shakil, Abdul Rahim Ahmad, Mustafa Agil Muhamad Balbed, Rina Bt. Md. Anwar:
SIGMA - A Malaysian signatures' database. 919-920 - Xin Zhao, Myung-Eun Lee, Soo-Hyung Kim:
Improved image segmentation method based on optimized threshold using Genetic Algorithm. 921-922 - Somaya Al-Máadeed, Amat-AlAleem Al-Kurbi, Amal Al-Muslih, Reem Al-Qahtani, Haend Al Kubisi:
Writer identification of Arabic handwriting documents using grapheme features. 923-924 - Hani Mahdi, Sally S. Attia:
MASCE: A Multi-Agent System for Collaborative E-Learning. 925-926 - Mohamed Fezari, Hamza Attoui, Mouldi Bedda:
Arabic spotted words recognition system based on HMM approach to control a didactic manipulator. 927-928 - Somaya Al-Máadeed, Fatima Amire, Sara Khalily Hamza, Wadha Al-lebda:
Forensic handwritten document management system. 929-930 - Qasim M. Chaudhari, Erchin Serpedin:
Estimation of clock parameters and performance benchmarks for synchronization in Wireless Sensor Networks. 931-932 - Soraya Kouadri Mostéfaoui:
Suitability of context models for service-oriented environments. 933-934 - Noora AlNaimi, Nuha Barhoum, Abeer Nasser, Alia Swidan, Qutaibah M. Malluhi:
A system for automatic gathering and intelligent analyses of Doha traffic data. 935-936 - Myung-Eun Lee, Soo-Hyung Kim, Wan Hyun Cho, Xin Zhao:
Segmentation of medical image based on mean shift and deterministic annealing EM algorithm. 937-938 - Fatiha Bouabache, Thomas Hérault, Gilles Fedak, Franck Cappello:
Hierarchical replication techniques to ensure checkpoint storage reliability in grid environment. 939-940 - Mohamed S. Hassan, Taha Landolsi, Mohamed G. El-Tarhuni:
A fair scheduling algorithm for video transmission over wireless packet networks. 941-942 - Foued Melakessou, Ulrich Sorger, Zdzislaw Suchanecki:
How can path diversity help transmission protocols in the achievement of a better connection QOS? 943-944 - Jihad M. Alja'am, Haya Alsuwaidi, Noor Alkuwari, Hamda Aldosari:
Tutorials-based system to assist Qatari children with special needs. 945-946 - Nikos Zotos, Georgios Xilouris, Evangelos Pallis, Anastasios Kourtis:
An MPLS-DiffServ experimental core network infrastructure for E2E QoS content delivery. 947-951 - Evangelos K. Markakis, Anargyros Sideris, Evangelos Pallis, Vassilios Zacharopoulos:
Differentiated services provision in a converged DVB/IP networking environment. 952-957 - Nader Mbarek, Francine Krief, Daniel Négru:
SLNP usage for QoS negotiation in heterogeneous environments. 958-963 - Mamadou Sidibé, Ahmed Mehaoua:
QoS monitoring framework for end-to-end service management in wired and wireless networks. 964-968 - Christian Timmerer, Víctor H. Ortega, José María González Calabozo, Alberto León:
Measuring quality of experience for MPEG-21-based cross-layer multimedia content adaptation. 969-974 - Mubashar Mushtaq, Toufik Ahmed:
P2P-based mobile IPTV: Challenges and opportunities. 975-980 - Beilu Shao, Marco Mattavelli, Maria Teresa Andrade, Samuel Keller, Giorgiana Ciobanu, Pedro Carvalho:
Multimedia terminal architecture: An inter-operable approach. 981-986 - Amir Djouama, Marwen Abdennebi, Samir Tohmé:
Optimizing resources utilization in heterogeneous wireless networks. 987-992 - Ismail Djama, Toufik Ahmed, Daniel Négru:
Adaptive cross-layer fragmentation for QoS-based wireless IPTV services. 993-998 - Bader Al-Manthari, Najah A. Abu Ali, Nidal Nasser, Hossam S. Hassanein:
Frame-level dynamic bandwidth provisioning for QoS-enabled broadband wireless networks. 999-1004 - Reza GhasemAghaei, Abu Saleh Md. Mahfujur Rahman, Md. Abdur Rahman, Wail Gueaieb:
Ant colony-based many-to-one sensory data routing in Wireless Sensor Networks. 1005-1010 - Mubashar Mushtaq, Toufik Ahmed:
Multimedia caching integration for efficient content delivery over heterogeneous networks. 1011-1012 - Artur Lugmayr:
The ENTHRONE 2 metadata management tool (MATool) (WISE 2008 MATool demonstration). 1013-1018 - Olimpiu Negru:
End-to-End QoS through integrated management of content, networks and terminals: The ENTHRONE project. 1019-1020 - Michel Houtermans, Mufeed Al-Ghumgham, Tino Vande Capelle:
Improve industrial process plant safety & availability via reliability engineering. 1021-1026 - Heinz Gall:
Functional safety IEC 61508 / IEC 61511 the impact to certification and the user. 1027-1031 - Michael Short:
Development guidelines for dependable real-time embedded systems. 1032-1039 - Hans-Dieter Wacker, Josef Börcsök, Hartmut Hillmer:
Redundant optical data transmission using semiconductor lasers. 1040-1045 - Josef Börcsök, Ali Hayek, Muhammad Umar:
Implementation of a 1oo2-RISC-architecture on FPGA for safety systems. 1046-1051 - Josef Börcsök, Peter Holub:
Different approaches for probability of common cause failure on demand calculations for safety integrity systems. 1052-1057 - Michael H. Schwarz, Huiyun Sheng, Oleksandr Sheleh, Josef Börcsök:
Matlab® / Simulink® generated source code for safety related systems. 1058-1063 - Azzedine Boukerche, Anis Zarrad, Regina Borges de Araujo:
A heterogeneous network architecture based Gnutella for mobile emergency preparedness applications. 1064-1069 - Eliamani Sedoyeka, Ziad Hunaiti, Mohammad Al Nabhan, Wamadeva Balachandran:
WiMAX Mesh networks for underserved areas. 1070-1075 - Fatma Bouabdallah, Nizar Bouabdallah, Raouf Boutaba:
Analysis of the latency-lifetime tradeoff in wireless sensor networks. 1076-1081 - Issam Elarbaoui, Hazem H. Refai:
Enhancement of IEEE 802.11 DCF backoff algorithm under heavy traffic. 1082-1087 - Samuel Cheng, Lina Stankovic, Vladimir Stankovic, Hazem H. Refai:
Cumulative intelligence gathering for smart vehicles. 1088-1093 - André Herms, Georg Lukas:
Preventing admission failures of bandwidth reservation in wireless mesh networks. 1094-1099 - Sonia Waharte, Brent Ishibashi, Raouf Boutaba, Djamal-Eddine Meddour:
Performance study of wireless mesh networks routing metrics. 1100-1106 - Mohammed Nadhmi Miladi, Mohamed Hadj Kacem, Achraf Boukhris, Mohamed Jmaiel, Khalil Drira:
A UML rule-based approach for describing and checking dynamic software architectures. 1107-1114
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.