| 2005 | 2005 ACS / IEEE International Conference on Computer Systems and Applications (AICCSA 2005), January 3-6, 2005, Cairo, Egypt |
| 2005 | A QoS architecture integrating mobile Ad-Hoc and infrastructure networks. Sérgio Crisóstomo, Susana Sargento, Marek Natkaniec, Norbert Vicari |
| 2005 | A QoS distributed transport service. V. Basto, V. Freitas |
| 2005 | A XML format secure protocol - OpenSST. Xinhua Zhang, Chunyan Jiang, Wanjun Huang, Christoph Meinel |
| 2005 | A comparative study of specification methods for electronic commerce systems. Sylvanus A. Ehikioya, B. Ola |
| 2005 | A dynamic range resource reservation protocol for QoS support in wireless networks. Imad Jawhar, Jie Wu |
| 2005 | A dynamic resource scheduling scheme for CDMA2000 systems. Song Ci, Mohsen Guizani |
| 2005 | A fault tolerant topology control in wireless sensor networks. Yong Chen, S. H. Son |
| 2005 | A formal examination of roles and permissions in access control. Philippe Balbiani |
| 2005 | A formal model for mobile agent systems using Z. Hany Loulou, Ahmed Hadj Kacem, Mohamed Jmaiel |
| 2005 | A generic reference software architecture for load balancing over mirrored Web servers: NaSr case study. Rabih Bashroush, Ivor T. A. Spence, Peter Kilpatrick, T. John Brown |
| 2005 | A grid infrastructure for mixed bioinformatics data and text mining. Moustafa Ghanem, Alexandros Chortaras, Yike Guo, Anthony Rowe, Jon Ratcliffe |
| 2005 | A mediation framework for Web services in a peer-to-peer environment. Michael Mrissa, Chirine Ghedira, Djamal Benslimane, Zakaria Maamar, Jacques Fayolle |
| 2005 | A multipurpose multi-agent system based on a loosely coupled architecture to speedup the DTW algorithm for Arabic printed cursive OCR. Maher Khemakhem, Abdelfattah Belghith |
| 2005 | A new Internet meta-search engine and implementation. Jemal H. Abawajy, Meng-Jye Hu |
| 2005 | A new approach to manage roaming in IPv6. Octavio Ramirez Rojas, Jalel Ben-Othman, Safouane Sfar |
| 2005 | A novel approach for managing and reusing business rules in business architectures. Haitham S. Hamza, Mohamed E. Fayad |
| 2005 | A pragmatic approach for testing robustness on real-time component based systems. Abbas Tarhini, Antoine Rollet, Hacène Fouchal |
| 2005 | A robust watermarking algorithm for copyright protection. Raja' S. Alomari, Ahmed Al-Jaber |
| 2005 | A technique based on the OMG metamodel and OCL for the definition of object-oriented metrics applied to UML models. Narayan C. Debnath, Daniel Riesco, German Montejano, Robert Uzal, Lorena Baigorria, Aristides Dasso, Ana Funes |
| 2005 | A user modeling approach to improving estimation accuracy in location-tracking applications. Wegdan Abdelsalam, Yasser Ebrahim, Siu-Cheung Chau, Maher Ahmed |
| 2005 | Acyclic circuit partitioning for path delay fault emulation. Fatih Kocan, Mehmet Hadi Gunes |
| 2005 | Adaptive QoS-guarantee multiple access protocol in multimedia wireless network. Jing Liu, Jiandong Li, Guanghua Zhang |
| 2005 | Algorithms for selecting materialized views in a data warehouse. N. A. R. Yousri, Khalil M. Ahmed, Nagwa M. El-Makky |
| 2005 | An all-to-all broadcasting algorithm for faulty hypercubes. H. Masuyama, Etsuko Masuyama |
| 2005 | An efficient constraint planning algorithm for multidatabases. Praveen Madiraju, Rajshekhar Sunderraman |
| 2005 | An encryption algorithm based on alphabetic trees. S. M. Arafat |
| 2005 | An explicit modeling approach for wholes in the object-oriented development process. L. Pazzi, A. Malagoli |
| 2005 | An extensible framework for automatic negotiation in distributed online bargaining applications. A. Neho |
| 2005 | An implementation of reliable group communication based on the peer-to-peer network JXTA. Karsten Loesing, Guido Wirtz |
| 2005 | An infrastructure to help development with reuse. R. B. Hajri, Lamia Labed Jilani, Henda Hajjami Ben Ghézala |
| 2005 | An integrated environment for communicating UML statechart diagrams. Vitus S. W. Lam, Julian A. Padget |
| 2005 | An ontology-based multiagent approach to outbound intrusion detection. Salvador Mandujano, Arturo Galván, Juan Arturo Nolazco |
| 2005 | An optimal shared protection scheme for optical networks. Abdelilah Maach, Gregor von Bochmann, Hussein T. Mouftah |
| 2005 | An overview of geographic protocols in ad hoc and sensor networks. Karim Seada, Ahmed Helmy |
| 2005 | Analysing spatial-temporal data based on generic GIS. Ines Hamdi, Imed Riadh Farah, Mohmed B. Ahmed |
| 2005 | Architectural modelling to understand system evolution. Galal H. Galal-Edeen |
| 2005 | Architecture pattern for a generic explanation component. S. Jager, R. T. Mittermier |
| 2005 | Architectures for streaming data processing in sensor networks. Choong Hun Kim, Kyungseo Park, Jack Fu, Ramez Elmasri |
| 2005 | Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm. Ramzi A. Haraty, Hadi Otrok, Abdul Nasser El-Kassar |
| 2005 | Automated discovering concurrent models from data tables - an overview of algorithms. Krzysztof Pancerz, Zbigniew Suraj |
| 2005 | Automatic construction of multidimensional schema from OLAP requirements. Ahlem Nabli, Jamel Feki, Faïez Gargouri |
| 2005 | Automatic data management in architecture and engineering applications. Giovanni Aurino, Bruno Discepolo, Angelo Nutile, Giuliana Ramella |
| 2005 | Autonomous decentralized database system restructuring for achieving timeliness. Carlos Pérez Leguízamo, Dake Wang, Minoru Takaishi, Sotaro Kimura, Kinji Mori |
| 2005 | Autonomous resource management and control algorithms for distributed wireless sensor networks. Ashit Talukder, Rajankumar Bhatt, Lavanya Chandramouli, Syed Muhammad Ali, Rishi Pidva, S. Monacos |
| 2005 | Block clustering via the block GEM and two-way EM algorithms. Mohamed Nadif, Gérard Govaert |
| 2005 | COTS-based development process meta-modeling. Sihem Ben Sassi, Lamia Labed Jilani, Henda Hajjami Ben Ghézala |
| 2005 | Classification of radiological exams and organs by belief theory. Antoine Tarault, Jamal Atif, Xavier Ripoche, Patrick Bourdot, Angel Osorio |
| 2005 | Classifying file type of stream ciphers in depth using neural networks. James G. Dunham, Ming-Tan Sun, J. C. R. Tseng |
| 2005 | Component-based development of process control systems. Islam A. M. El-Maddah |
| 2005 | Consistent graph layout for weighted graphs. Dana Vrajitoru, Jason DeBoni |
| 2005 | Contextual classifier combination by Markov random fields-Bayes formalism and evolutionary programming. Application: image classification enhancement. Salim Chitroub |
| 2005 | Cooperative caching techniques for increasing the availability of MANET certificate authority services. Laith A. Al-Sulaiman, Hussein M. Abdel-Wahab |
| 2005 | Creation of an online e-learning community for intercultural learning: IntCultNet - A ladder of success. Kristi Lindh, Lijuan Marko Gashi, Irmeli Aro |
| 2005 | Current trends and challenges towards wireless Internet. Christos Basios, Manolis Solidakis |
| 2005 | Data broadcast classification. Ahmad S. Al-Mogren, Margaret H. Dunham |
| 2005 | Deploying multicommunicative and @prende projects at Anahuac del Sur University. O. D. Alcantara |
| 2005 | Design, implementation and testing of mobile agent protection mechanism for MANETS. K. E. A. Negm |
| 2005 | Determining all pairs edge connectivity of a 4-regular graph in O(|V|). Alex Fit-Florea, David W. Matula |
| 2005 | Dynamic activities on an agent-based workflow management system. Jian-Wei Wang, Chi-Cheng Li, Feng-Jian Wang |
| 2005 | ESPERANTO: a middleware platform to achieve interoperability in nomadic computing domains. Marcello Cinque, Domenico Cotroneo, Cristiano di Flora, Armando Migliaccio, Stefano Russo |
| 2005 | Efficient aggregation of delay-constrained data in wireless sensor networks. Kemal Akkaya, Mohamed F. Younis, Moustafa Youssef |
| 2005 | Efficient partition of state space for parallel reachability analysis. Mustapha Bourahla, Mohamed Benmohamed |
| 2005 | Efficient replication control in distributed real-time databases. A. Aslinger, S. H. Son |
| 2005 | Enhanced visual evaluation of feature extractors for image mining. José Fernando Rodrigues Jr., Agma J. M. Traina, Caetano Traina Jr. |
| 2005 | Evaluation of scalable TCP. Mohamed Tekala, Róbert Szabó |
| 2005 | Evolution to 4G wireless: problems, solutions, and challenges. Jihad Qaddour, Raffique A. C. Barbour |
| 2005 | Extending CAN segments with IEEE 802.11 WLAN. Cüneyt Bayilmis, Ismail Erturk, Celal Ceken |
| 2005 | Fast, effective vertex cover kernelization: a tale of two algorithms. Faisal N. Abu-Khzam, Michael A. Langston, W. Henry Suters |
| 2005 | Finding maximum-cost minimum spanning trees. Ahmed A. Belal, Amr Elmasry |
| 2005 | Fixed cellular network optimisation. Faiza Tabbana, Sami Tabbane, Mounir Frikha |
| 2005 | HDC - hot data caching in mobile database systems. Vijay Kumar, Nitin Prabhu, Panos K. Chrysanthis |
| 2005 | Heterogeneous and dynamic multipoint service in ATM networks. N. B. Alimakni, Abdelfattah Belghith |
| 2005 | IMAC: an importance-level based adaptive CPU scheduling scheme for multimedia and non-real time applications. Hai Jin, Qionghua Hu, Xiaofei Liao, Hao Chen, Dafu Deng |
| 2005 | Improving thoughput and fairness of transport connections in IEEE 802.11 based wireless networks. Shahzad Malik, Muhammad Jaseemuddin, Govindan Ravindram, Hesham El-Sayed |
| 2005 | Incentive service model for P2P. Krit Wongrujira, Tim Hsin-ting Hu, Aruna Seneviratne |
| 2005 | Incorporating concepts for bioingormatics data modeling into EER models. Feng Ji, Ramez Elmasri, Yiming Zhang, B. Ritesh, Zoe Raja |
| 2005 | Integrating balanced scorecard domain formalization with underlying project plan formalization. German Montejano, Robert Uzal, Daniel Riesco, Aristides Dasso, Ana Funes, Mario Peralta, Carlos Salgado, Narayan C. Debnath |
| 2005 | Introducing a dedicated tool for facilitating a semi-structured approach to CMC messaging. Peter K. Oriogun |
| 2005 | Investigating computer-supported cooperative learning: Applications for flexible learning environments. Georgios A. Dafoulas, Lara A. Frumkin, Mike Mimirinis, Alan Murphy |
| 2005 | LNV: relational database storage structure for XML documents. Mohamed E. El-Sharkawi, N. A. El-Hadi El Tazi |
| 2005 | MCAR: multi-class classification based on association rule. Fadi A. Thabtah, Peter I. Cowling, Yonghong Peng |
| 2005 | Making efficient logging a common practice in software development. Osama Mabrouk Khaled, Hoda Mohammed Hosny |
| 2005 | Mapping XML DTDs to relational schemas. A. A. Abdel-Aziz, Hussien Oakasha |
| 2005 | Mapping faults to failures in SQL manipulation commands. Ashraf M. Abdelbar, Plínio Roberto Souza Vilela, Mário Jino |
| 2005 | Maximum lifetime broadcasting in wireless networks. Joongseok Park, Sartaj Sahni |
| 2005 | Memory estimation and allocation algorithms for MDVM system. Susmit Bagchi |
| 2005 | Multi-scale network traffic prediction using k-factor Gegenbauer ARMA and MLP models. Nayera M. Sadek, Alireza Khotanzad |
| 2005 | Multi-services MAC protocol for wireless networks. Jalel Ben-Othman, Hind Castel-Taleb, Lynda Mokdad |
| 2005 | Multi-speaker voice cryptographic key generation. L. Paola García-Perera, J. Carlos Mex-Perera, Juan Arturo Nolazco-Flores |
| 2005 | Multicast address management in the Internet: a study of the port blocking problem. Emad Eldin Mohamed, Hussein M. Abdel-Wahab, Ibrahim Salama |
| 2005 | Multilevel chunking of multidimensional arrays. A. S. Sawires, Nagwa M. El-Makky, Khalil M. Ahmed |
| 2005 | Multimodal communication and articulation in e-learning. Adel Elsayed, Roger Hartley, Yongqiang Qiu |
| 2005 | Multivariate statistical analysis for network attacks detection. Guangzhi Qu, Salim Hariri, Mazin S. Yousif |
| 2005 | Neighbor stranger discrimination: a new defense mechanism against Internet DDOS attacks. Sleiman Itani, Najwa Aaraj, Darine Abdelahad, Ayman I. Kayssi |
| 2005 | On multicast scheduling and routing in multistage Clos networks. Bin Tang |
| 2005 | On sparse matrix-vector product optimization. Nahid Emad, Olfa Hamdi-Larbi, Z. Mahjoub |
| 2005 | On specifying an environment of software agents and Web services. Zakaria Maamar, Soraya Kouadri Mostéfaoui |
| 2005 | On the automatic configuration of application-oriented operating systems. Gustavo Fortes Tondello, Antônio Augusto Fröhlich |
| 2005 | On the design of hybrid prioritized multiple access protocols for bank data center LANs. M. Sklira, Andreas S. Pomportsis |
| 2005 | On the integration of internet QoS paradigms and Ad-Hoc networks. Abd-Elhamid M. Taha, Hossam S. Hassanein, Hussein T. Mouftah |
| 2005 | Ontologies for semantic integration of multimedia e-learning services. Tanko Ishaya |
| 2005 | Optimal multi-class guard channel admission policy under hard handoff constraints. Nidal Nasser, Hossam S. Hassanein |
| 2005 | Performance analysis of locating files asynchronously in ad-hoc networks. Iman I. Elghandour, A. M. Hafez, Magdy H. Nagi, K. M. Nagi |
| 2005 | Performance comparison of Kalman filter based approaches for energy efficiency in wireless sensor networks. Song Ci, Hamid Sharif |
| 2005 | Performance evaluation of QoS routing algorithms. Karima Maâlaoui, Abdelfattah Belghith, Jean-Marie Bonnin, M. Tezeghdanti |
| 2005 | Performance evaluation of a TCP/IP transmission using hybrid Petri nets. Melha Bitam, Hassane Alla |
| 2005 | Performance evaluation of the uplink of WCDMA in the TDD mode for wireless Internet services. Mahmoud H. Ismail, Mustafa M. Matalgah |
| 2005 | Performance modeling and analysis of object oriented distributed software systems: A necessary step toward software performance stability. Reda A. Ammar, Amal Abdel-raouf, Tahany A. Fergany |
| 2005 | Performance of a shuffle exchange network using Markov chains. Djamel Benazzouz |
| 2005 | Planning stable software applications using goal driving requirements analysis. Islam A. M. El-Maddah |
| 2005 | Practical techniques for defending against DDoS attacks. Eric Y. Chen, Akinori Yonezawa |
| 2005 | Preemptive rate-based operator scheduling in a data stream management system. Mohamed A. Sharaf, Panos K. Chrysanthis, Alexandros Labrinidis |
| 2005 | Preparing complex data for warehousing. Adrian Tanasescu, Omar Boussaid, Fadila Bentayeb |
| 2005 | Privacy in E-learning: How to implement anonymity. Edgar R. Weippl, A Min Tjoa |
| 2005 | Proactive control of distributed denial of service attacks with source router preferential dropping. Yinghong Fan, Hossam S. Hassanein, Patrick Martin |
| 2005 | Proman, a computer supported collective Learning environment through the project based learning. A. Choura, Anis Samet, Adel M. Alimi |
| 2005 | Pseudo dynamic metrics [software metrics]. Rajesh Gunnalan, Mark Shereshevsky, Hany H. Ammar |
| 2005 | QoS scheduling components based on firm real-time requirements. Audrey Marchand, Maryline Silly-Chetto |
| 2005 | Quantifying software architectures: an analysis of change propagation probabilities. Walid Abdelmoez, Mark Shereshevsky, Rajesh Gunnalan, Hany H. Ammar, Bo Yu, S. Bogazzi, Mustafa Korkmaz, Ali Mili |
| 2005 | RNG-based searching and broadcasting algorithms over Internet graphs and peer-to-peer computing systems. Oscar Escalante, Tania Pérez, Julio Solano-González, Ivan Stojmenovic |
| 2005 | Recovery of temporal information from off-line Arabic handwritten. Abdelkarim Elbaati, Mohamed Adel Alimi, Moncef Charfi, Abdel Ennaji |
| 2005 | Research in testing COTS components - built-in testing approaches. Sami Beydeda |
| 2005 | Resource-based learning and teaching-concerns, conflicts, consensus, community. Elli Georgiadou, Stylianos Hatzipanagos, Eleni Berki |
| 2005 | Reusability metrics for software components. Octavian Paul Rotaru, Marian Dobre |
| 2005 | Reverse engineering of framework design using a meta-patterns-based approach. Nuno Flores, Ademar Aguiar |
| 2005 | Scalability of OAT. J. Mizher, Margaret H. Dunham, Lin Lu, Yongqiao Xiao |
| 2005 | Secure transmission of sensitive data using multiple channels. Abdelhamid S. Abdelhamid, Ahmed A. Belal |
| 2005 | Secured net-banking by θ-Vigenere in Syverson's protocol. G. Nacira, A. Abdelaziz |
| 2005 | Simulated analysis of server placement on network topology designs. Sami J. Habib |
| 2005 | Software product line engineering for Web services and UML. Hassan Gomaa, Mazen Saleh |
| 2005 | Software requirement risk assessment using UML. Kalaivani Appukkutty, Hany H. Ammar, K. G. Popstajanova |
| 2005 | Spoken information retrieval for multimedia databases. Luis R. Salgado-Garza, Juan Arturo Nolazco-Flores, P. D. Diaz-Lopez |
| 2005 | Stability of reusable learning objects. Imran A. Zualkernan |
| 2005 | Standardising learning object descriptors: Focus on education value. V. Venson, S. Ramalingam |
| 2005 | Studying semantic sharing problem within enterprise information systems. Rami Rifaieh, Aïcha-Nabila Benharkat |
| 2005 | Supporting quality of service in mobile Ad hoc networks. Jamal N. Al-Karaki, Ahmed E. Kamal |
| 2005 | Supporting several real-time applications on the Java platform. M. Teresa Higuera-Toledano |
| 2005 | TREX: a temporal reference extractor for Arabic texts. Ramzi A. Haraty, Samer A. Khatib |
| 2005 | Testing Web services. Reda Siblini, Nashat Mansour |
| 2005 | The EE-method, an evolutionary engineering developer tool: neural net character mapping. Ahmed Lehireche, Abdellatif Rahmoun |
| 2005 | The human genome project: software challenges and future directions. Nikola Stojanovic |
| 2005 | The integration of an emotional system in the intelligent system. Mohamed Ben Ammar, Mahmoud Neji, Adel M. Alimi |
| 2005 | The microprocessor of the year 2014: do Pentium 4, Pentium M, and Power 5 provide any hints? Yale N. Patt |
| 2005 | The role of standardization in eLOC development. Karel Kveton |
| 2005 | Toward dynamic ensembles: the BAGA approach. Xuanfu Wu, Zhengxin Chen |
| 2005 | Towards a formal methodology for developing multi-agent applications using temporal Z. Amira Regayeg, Ahmed Hadj Kacem, Mohamed Jmaiel |
| 2005 | Towards a multi-representation ontology-based information systems mediation. Sidi Mohamed Benslimane, Djamel Amar Bensaber, Mimoun Malki |
| 2005 | Towards a rigorous architectural reuse. Nadia Bouassida, Hanêne Ben-Abdallah, Faïez Gargouri, Abdelmajid Ben Hamadou |
| 2005 | Towards a standard approach for medical images segmentation. Walid Barhoumi, Ezzeddine Zagrouba |
| 2005 | Towards an improved twin-page method for rapid transaction undo recovery. Ashraf M. Abdelbar |
| 2005 | Towards an independent component model. Mohamed Fathey Abel Fattah, Amr El-Kadi, Amir Zeid |
| 2005 | Towards autonomic Web services. Amir Zeid, Sherif A. Gurguis |
| 2005 | Update propagation based on tree structure in peer-to-peer networks. Takahiro Hara, M. Nakadori, Wataru Uchida, Kazuhiko Maeda, Shojiro Nishio |
| 2005 | Usability tri-parametric artifacts: a knowledge reporting artifact for software development reusability. O. Al-Shara |
| 2005 | Using AUML to derive formal modeling agents interactions. Laid Kahloul, Kamel Barkaoui, Zaïdi Sahnoun |
| 2005 | Using GIS and knowledge-based system for agricultural land drainage planning. A. Adly, L. Fattouh, M. Moustafa, A. A. Elmoneim |
| 2005 | Watershed segmentation for carotid artery ultrasound images. Amr R. Abdel-Dayem, Mahmoud R. El-Sakka, Aaron Fenster |
| 2005 | WebCT - Evaluating the use of technology, lessons learnt from the American University in Cairo. Sherif Kamel |