default search action
CISSE 2007: Bridgeport, CT, USA - SCSS, Volume 1
- Tarek M. Sobh:
Advances in Computer and Information Sciences and Engineering, Proceedings of the 2007 International Conference on Systems, Computing Sciences and Software Engineering (SCSS), part of the International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering (CISSE 2007), Bridgeport, CT, USA, December 3-12, 2007. Springer 2008, ISBN 978-1-4020-8740-0 - A. B. M. Mozzammel Hossain, Md. Saifuddin Faruk:
A New Technique for Unequal-Spaced Channel-Allocation Problem in WDM Transmission System. 1-4 - Abdelshakour A. Abuzneid, Moeen Uddin, Shaid Ali Naz, Omar Abuzaghleh:
An Algorithm to Remove Noise from Audio Signal by Noise Subtraction. 5-10 - Abdelwadood Moh'd. Mesleh:
Support Vector Machines based Arabic Language Text Classification System: Feature Selection Comparative Study. 11-16 - Abulfazl Yavari, Hamid Reza Pourreza:
Visual Attention in Foveated Images. 17-20 - Adalet N. Abiyev:
Frequency Insensitive Digital Sampler and Its Application to the Electronic Reactive Power Meter. 21-26 - Alejandro Regalado-Méndez, D. Tello-Delgado, H. O. García-Arriaga:
Non-Linear Control Applied to an Electrochemical Process to Remove Cr(VI) from Plating Wastewater. 27-32 - A. V. S. Rajan, S. Bavan, Geetha Abeysinghe:
Semantics for the Specification of Asynchronous Communicating Systems (SACS). 33-38 - Ana Karoline Araújo de Castro, Plácido Rogério Pinheiro, Gilberto George Conrado de Souza:
Application Multicriteria Decision Analysis on TV Digital. 39-44 - Andrew Burnett, Tom Dowling:
A Framework for the Development and Testing of Cryptographic Software. 45-50 - Ani Calinescu:
Transferable Lessons from Biological and Supply Chain Networks to Autonomic Computing. 51-56 - Anna Derezinska:
Experiences from an Empirical Study of Programs Code Coverage. 57-62 - Anne Nguyen, Xiang Shao:
A Secure and Efficient Micropayment System. 63-67 - Anu Gupta, Ravinder Kumar Singla:
An Empirical Investigation of Defect Management in Free/Open Source Software Projects. 68-73 - A. S. Bavan:
A Parallel Algorithm that Enumerates all the Cliques in an Undirected Graph. 74-78 - A. M. El-Menshawy, Hossam El Deen Mostafa Faheem, T. Al-Arif, Z. Taha:
Agent Based Framework for Worm Detection. 79-84 - Ayodeji Oludola Oluwatope, G. Adesola Aderounmu, E. R. Adagunodo, Olatunde O. Abiona, Francis Joseph Ogwu:
Available Bandwidth Based Congestion Avoidance Scheme for TCP: Modeling and Simulation. 85-89 - Ayssam Yehia Elkady, Sarwat N. Hanna, Galal A. Elkobrosy:
On the modeling and control of the Cartesian Parallel Manipulator. 90-96 - Behnaz Pourebrahimi, Sayyed Arash Ostadzadeh, Koen Bertels:
Resource Allocation in Market-based Grids Using a History-based Pricing Mechanism. 97-100 - Tracey Hughes, Cameron Hughes, Alina Lazar:
Epistemic Structured Representation for Legal Transcript Analysis. 101-107 - Chuanlei Zhang, Hemant Joshi, Srini Ramaswamy, Coskun Bayrak:
A Dynamic Approach to Software Bug Estimation. 108-113 - Deniss Kumlander:
Soft Biometrical Students Identification Method for e-Learning. 114-118 - Denivaldo Lopes, Bruno Abreu, Wesly Batista:
Innovation in Telemedicine: an Expert Medical Information System based on SOA, Expert Systems and Mobile Computing. 119-124 - Christos K. Georgiadis, Elias Pimenidis:
Service-Enabled Business Processes: Constructing Enterprise Applications - An Evaluation Framework. 125-130 - James Elliott Coleshill, Alexander Ferworn, Deborah Stacey:
Image Enhancement Using Frame Extraction Through Time. 131-135 - Evangelos Christakou, Neander Silva:
A Comparison of Software for Architectural Simulation of Natural Light. 136-141 - Farhad Mohamad Kazemi, Hamid Reza Pourreza, Reihaneh Moravejian, Ehsan Mohamad Kazemi:
Vehicle Recognition Using Curvelet Transform and Thresholding. 142-146 - Saeed Samadi, Farhad Mohamad Kazemi, Mohammad R. Akbarzadeh-Totonchi:
Vehicle Detection Using a Multi-agent Vision-based System. 147-152 - F. Abdoli, Mohsen Kahani:
Using Attacks Ontology in Distributed Intrusion Detection System. 153-158 - Feng-Long Huang, Shu-Yu Ke, Qiong-Wen Fan:
Predicting Effectively the Pronunciation of Chinese Polyphones by Extracting the Lexical Information. 159-165 - Francisca Márcia G. S. Gonçalves:
MiniDMAIC: An Approach for Causal Analysis and Resolution in Software Development Projects. 166-171 - Jeremy S. Daily, Nathan Singleton, Elizabeth Downing, Gavin Wylie Manes:
Light Vehicle Event Data Recorder Forensics. 172-177 - G. V. Abramov, A. E. Emelyanov, M. N. Ivliev:
Research of Network Control Systems with Competing Access to the Transfer Channel. 178-183 - Halûk Gümüskaya, M. V. Nural:
Service-Oriented Context-Awareness and Context-Aware Services. 184-189 - Hanh H. Pham:
Autonomous Classification via Self-Formation of Collections in AuInSys. 190-195 - Aksenti Grnarov, Bekim Cilku, Igor Mishkovski, Sonja Filiposka, Dimitar Trajanov:
Grid Computing Implementation in Ad Hoc Networks. 196-201 - Jalal Taghia, Jalil Taghia:
One-Channel Audio Source Separation of Convolutive Mixture. 202-206 - Jalel Rejeb, Mahalakshmi Srinivasan:
Extension of Aho-Corasick Algorithm to Detect Injection Attacks. 207-212 - Rosas Salazar Juan Manuel, Guzmán Ruiz Mariana, Valdes Marrero Manuel Alejandro:
Use of Computer Vision during the process of Quality Control in the classification of grain. 213-217 - Kamaljeet Sandhu:
Theoretical Perspectives for E-Services Acceptance Model. 218-223 - Kamaljeet Sandhu:
E-Services Acceptance Model (E-SAM). 224-229 - Kamaljeet Sandhu:
Factors for E-Services System Acceptance: A Multivariate Analysis. 230-235 - Kamaljeet Sandhu:
A Qualitative Approach to E-Services System Development. 236-241 - Byung-Heon Kang, Dong-Ho Lee, Chun-Pyo Hong:
Construction of Group Rules for VLSI Application. 242-244 - Karan Gupta, Anjali V. Kulkarni:
Implementation of an Automated Single Camera Object Tracking System Using Frame Differencing and Dynamic Template Matching. 245-250 - Vaddadi P. Chandu, Karandeep Singh, Ravi Baskaran:
A Model for Prevention of Software Piracy through Secure Distribution. 251-255 - G. N. Krishnamurthy, V. Ramaswamy, G. H. Leela, M. E. Ashalatha:
Performance Enhancement of CAST-128 Algorithm by modifying its function. 256-260 - Kshitij Gupta:
A Concatenative Synthesis Based Speech Synthesiser for Hindi. 261-264 - Lennart Strand:
Legibility on a Podcast: Color and typefaces. 265-267 - Linfeng Zhang, Erik McCullen, Lajos Rimai, K. Y. Simon Ng, Ratna Naik, Gregory Auner:
The sensing mechanism and the response simulation of the MIS hydrogen sensor. 268-272 - Lisa A. Best:
Visual Extrapolation of Linear and Nonlinear Trends: Does the Knowledge of Underlying Trend Type Affect Accuracy and Response Bias?. 273-278 - Mahmoud El Samad, Abdelkader Hameurlain, Franck Morvan:
Resource Discovery and Selection for Large Scale Query Optimization in a Grid Environment. 279-283 - Marcelo Fornazin, Danilo B. S. Netto, Marcos Antonio Cavenaghi, Aparecido Nilceu Marana:
Protecting Medical Images with Biometric Information. 284-289 - Marius Marcu, Dacian Tudor, Sebastian Fuicu:
Power Efficiency Profile Evaluation for Wireless Communication Applications. 290-294 - Martin Juhrisch, Werner Esswein:
Closing the Gap between Enterprise Models and Service-oriented Architectures. 295-299 - Vojtech Merunka, Martin Molhanec:
Object Normalization as Contribution to the area of Formal Methods of Object-Oriented Database Design. 300-304 - Bager Zarei, Mehdi Asadi, Saeed Nourizadeh, Shapour Jodi Begdillo:
A Novel Security Schema for Distributed File Systems. 305-310 - Micah Altman:
A Fingerprint Method for Scientific Data Verification. 311-316 - Gunnar Kurtz, Michael Geisser, Tobias Hildenbrand, Thomas Kude:
Mobile Technologies in Requirements Engineering. 317-322 - Mofakharul Islam, John Yearwood, Peter Vamplew:
Unsupervised Color Textured Image Segmentation Using Cluster Ensembles and MRF Model. 323-328 - Mohammad A. ALGhalayini, ElQasem AlNemah:
An Efficient Storage and Retrieval Technique for Documents Using Symantec Document Segmentation (SDS) Approach. 329-338 - Mohammad Shirali-Shahreza:
A New Persian/Arabic Text Steganography Using "La" Word. 339-342 - Mohammad Momani, Subhash Challa:
GTRSSN: Gaussian Trust and Reputation System for Sensor Networks. 343-347 - M. Hadi Zahedi, Mehdi Ghazizadeh, Mahmoud Naghibzadeh:
Fuzzy Round Robin CPU Scheduling (FRRCS) Algorithm. 348-353 - Mehdi Ghazizadeh, M. Hadi Zahedi, Mohsen Kahani, Behrouz Minaei-Bidgoli:
Fuzzy Expert System In Determining Hadith1 Validity. 354-359 - Nick Pilkington, Barry Irwin:
An Investigation into the Performance of General Sorting on Graphics Processing Units. 360-365 - Nita Sarang, Mukund A. Sanglikar:
An Analysis of Effort Variance in Software Maintenance Projects. 366-371 - Ognjen Kuljaca, Jyotirmay Gadewadikar, Kwabena Agyepong:
Design of Adaptive Neural Network Frequency Controller for Performance Improvement of an Isolated Thermal Power System. 372-377 - Panos Fitsilis:
Comparing PMBOK and Agile Project Management software development processes. 378-383 - Peter Nabende, Tom Wanyama:
An Expert System for Diagnosing Heavy-Duty Diesel Engine faults. 384-389 - Petr Chmelar, Radim Hernych, Daniel Kubicek:
Interactive Visualization of Data-Oriented XML Documents. 390-393 - Phillip G. Bradford, Alina Olteanu:
Issues in Simulation for Valuing Long-Term Forwards. 394-398 - Isabelle Tamanini, Thais Cristina Sampaio Machado, Marília Soares Mendes, Ana Lisse Carvalho, Elizabeth Furtado, Plácido Rogério Pinheiro:
A Model for Mobile Television Applications Based on Verbal Decision Analysis. 399-404 - Qihua Tan, Mads Thomassen, Kirsten M. Jochumsen, Ole Mogensen, Kaare Christensen, Torben Arvid Kruse:
Gene Selection for Predicting Survival Outcomes of Cancer Patients in Microarray Studies. 405-409 - Quratul-ain Mahesar, Asadullah Shah:
Securing XML Web Services by using a Proxy Web Service Model. 410-415 - Raddad Al King, Abdelkader Hameurlain, Franck Morvan:
O-Chord: A Method for Locating Relational Data Sources in a P2P Environment. 416-421 - Rahul Sarkar, Chrishnika de Almeida, Noureen Syed, Sheliza Jamal, Jeff Orchard:
Intuitive Interface for the Exploration of Volumetric Datasets. 422-427 - S. G. K. Murthy, M. V. Ramana Murthy, P. Ram Kumar:
New Trends in Cryptography by Quantum Concepts. 428-432 - Ranjana Singh, Rekha Singhal:
On Use of Operation Semantics for Parallel iSCSI Protocol. 433-440 - Riddhiman Ghosh, Mohamed Dekhil:
BlueCard: Mobile Device-Based Authentication and Profile Exchange. 441-446 - Pavan Kandepet, Roman W. Swiniarski:
Component Based Face Recognition System. 447-454 - S. Shervin Ostadzadeh, Fereidoon Shams Aliee, Sayyed Arash Ostadzadeh:
An MDA-Based Generic Framework to Address Various Aspects of Enterprise Architecture. 455-460 - Saeid Moslehpour, Chandrasekhar Puliroju, Christopher L. Spivey:
Simulating VHDL in PSpice Software. 461-466 - S. Sankar Sumanth, K. A. Narayanan Kutty:
VLSI Implementation of Discrete Wavelet Transform using Systolic Array Architecture. 467-472 - Serguei A. Mokhov:
Introducing MARF: a Modular Audio Recognition Framework and its Applications for Scientific and Software Engineering Research. 473-478 - Umar F. Khan, Shafqat Hameed, Tim Macintyre:
TCP/IP Over Bluetooth. 479-484 - Show-Shiow Tzeng, Hsin-Yi Lu:
Measurement-Based Admission Control for Non-Real-Time Services in Wireless Data Networks. 485-490 - Waled Alshabi, Srinivasan Ramaswamy, Mhamed Itmi, Habib Abdulrab:
A Cooperation Mechanism in Agent Organization. 491-496 - Steve Counsell, Stephen Swift, Robert M. Hierons:
A Test Taxonomy Applied to the Mechanics of Java Refactorings. 497-502 - Sudhir G. Akojwar, Rajendra M. Patrikar:
Classification Techniques with Cooperative Routing for Industrial Wireless Sensor Networks. 503-508 - Syed M. S. Islam, Mohammed Bennamoun, Robyn A. Owens, Rowan Davies:
Biometric Approaches of 2D-3D Ear and Face: A Survey. 509-514 - Syed Sajjad Rizvi, Syed N. Hyder, Aasia Riasat:
Performance Model for a Reconfigurable Coprocessor. 515-520 - Syed Sajjad Rizvi, Eslam M. Gebriel, Aasia Riasat:
RFID: A New Software Based Solution to Avoid Interference. 521-525 - Taner Arsan, Tuncay Saydam:
A Software Component Architecture for Adaptive and Predictive Rate Control of Video Streaming. 526-531 - Tirthankar Ghosh, Benjamin Pratt:
Routing Table Instability in Real-World Ad-Hoc Network Testbed. 532-535 - Trudy Sherman:
Quality Attributes for Embedded Systems. 536-539 - Toomas Kaevand, Andres Öpik, Ülo Lille:
A Mesoscale Simulation of the Morphology of the PEDT/PSS Complex in the Water Dispersion and Thin Film: the Use of the MesoDyn Simulation Code. 540-546 - P. Venkata Krishna, Ratika Khetrapal:
Developing Ontology-Based Framework Using Semantic Grid. 547-552 - Vinu V. Das:
A Tree Based Buyer-Seller Watermarking Protocol. 553-557 - Walid Atabany, Patrick Degenaar:
A Spatiotemporal Parallel Image Processing on FPGA for Augmented Vision System. 558-561 - W. A. Barrett:
Biometrics of Cut Tree Faces. 562-565 - Xuejun Liang:
A Survey of Hands-on Assignments and Projects in Undergraduate Computer Architecture Courses. 566-570 - Yenumula B. Reddy:
Predicting the Demand for Spectrum Allocation Through Auctions. 571-576 - Yusuf Altunel, Mehmet R. Tolun:
Component-Based Project Estimation Issues for Recursive Development. 577-581
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.