| 2006 | A COTS framework for sensor fusion using dynamic bayesian networks in livestock production. Jens A. Hansen, Thomas D. Nielsen, Henrik Schiøler |
| 2006 | A case study of monitoring construction operations using automated position tracking system. Y. Y. Su, Liang Y. Liu |
| 2006 | A comparative study of replacement algorithms used in the scalable asynchronous cache consistency scheme. Ramzi A. Haraty, Lana Turk |
| 2006 | A constrained version of a clustering algorithm for switch placement and interconnection in large networks. Vic Grout, Stuart Cunningham |
| 2006 | A feature recognition approach for mold machining. Xiaoming Ding, Liping Zhang, Yiqiang Lu, Ridong Jiang |
| 2006 | A multiobjective evolutionary approach for constrained joint source code optimization. Naeem Zafar Azeemi |
| 2006 | A new modeling notation for system design and workflow patterns. Thomas Wisniewski, Wenying Feng |
| 2006 | A novel method for person identification by comparing retinal patterns. Rezwanur Rahman, Morshed U. Chowdhury, S. M. Raiyan Kabir, M. Rezwan Khan |
| 2006 | A novel parallel hardware and software solution for a large-scale biologically realistic cortical simulation. Frederick C. Harris Jr., Mark C. Ballew, Jason Baurick, James Frye, Lance Hutchinson, James Gonzalo King, Philip H. Goodman, Rich Drewes |
| 2006 | A process modeling system aimed at large-scale collaborative design over networks. Thomas Wisniewski, Wenying Feng |
| 2006 | A security engineering process for vulnerability assessment. Wei Li |
| 2006 | A simulation of power management algorithm in wireless transmission to guarantee QoS. Ahmed H. Salem, Anup Kumar, Adel Said Elmaghraby |
| 2006 | A telephone communication agent for agent/user interaction. Ahmed Kamel |
| 2006 | A three poled model for web applications. Hamzeh K. Al Shaar, Ramzi A. Haraty |
| 2006 | A virtual reality system for hydroelectric generating unit maintenance training and understanding. P. Alcides Jr., Manoel R. Filho, Fábio V. Bezerra, Marcos A. Souza, Pebertli A. Barata, Messias A. Nascimento, Marcelo da Silva Hounsell |
| 2006 | Achieving near-optimal distortion reduction with invisible watermarking RSSI algorithms. Stephen Krebsbach, George Hamer |
| 2006 | Adaptive coverage in heterogeneous sensor network. Mahmuda Naznin, Kendall E. Nygard |
| 2006 | Advanced remote password authentication and key agreement using smart card. Rui Jiang, Aiqun Hu, Xiaohui Yang |
| 2006 | An autotester for the modified commission function. Narayan C. Debnath, Joyati C. Debnath, Mark Burgin, Joshua Wilson, Joseph Cropper |
| 2006 | An empirical study of the boundary values of the object-oriented metrics. Raed Shatnawi, Wei Li |
| 2006 | Analysis of fused deposition modeling parts. G. Arumaikkannu, M. Sreeramulu, S. Gowri |
| 2006 | Application of soft solutions for signal analysis. Donna L. Hudson, Maurice E. Cohen |
| 2006 | Classification rule extraction approach based on homogeneous training samples. Prabhat Kumar Mahanti, Dhirendra Kumar Swami, Mohammed Al-Fayoumi |
| 2006 | Clustering via a kernel fuzzy connectivity matrix. Carl G. Looney |
| 2006 | Co-evolutionary robotics using two kinds of neural networks. Masaya Yoshikawa, Hidekazu Terai |
| 2006 | Combining spatial data from multiple data sources. Hsine-Jen Tsai, Les L. Miller, Ming Hua, Rebecca Wemhoff, Sarah Nusser |
| 2006 | Complexity issues in control software design: A practical perspective. Vic Grout, Stuart Cunningham |
| 2006 | Computer virus signature model for detection engine. Kongkiat Hirankerd, Pattarasinee Bhattarakosol |
| 2006 | Computer-aided item selection for the cycle counting procedure. Kemal Taljanovic, Mehmed M. Kantardzic |
| 2006 | Congestion detection and control with real-time streaming media. Teck-Kuen Chua, David C. Pheanis |
| 2006 | Design and description of a tool towards a software engineering experiment. Narayan C. Debnath, Nripendra Rai, Haesun K. Lee, Ilhyun Lee |
| 2006 | Designing of building black-boxes to support disaster rescue and recovery. Min-Hsuan Tsai, Liang Y. Liu, Feniosky Peña-Mora |
| 2006 | Efficiently evolving multiple robots using distributed genetic algorithms. Ekkasit Tiamkaew, Jirakhom Ruttanavakul |
| 2006 | Enhancing information security risk management with data mining and fuzzy logic techniques. Mariana Hentea |
| 2006 | Evaluation methodology for virtual reality software tools. Eduardo Islas, Miguel Pérez, Benjamín Zayas-Pérez, Carlos Espinosa, Rita Beltran, Evelyn Vega |
| 2006 | Fault detection and isolation using artificial neural networks. In Soo Lee, Gordon K. Lee |
| 2006 | Humidity estimation using neural network from sensor data. Kirthi L. Sreenivasan, Thomas Philip, Sunil K. Khijwania, Jagdish P. Singh |
| 2006 | Image compression of facial photographs based on BTC/TSVQ local processing. M. Mohy Mahmoud, Amr Goneid, Suhair Amer |
| 2006 | Integration of multidisciplinary specialized applications using components. José Alfredo Sánchez López, Dionisio A. Suarez, Agustin Quintero |
| 2006 | Introducing synchronisation in deterministic network models. Henrik Schiøler, Jan Jakob Jessen, Jens Dalsgaard Nielsen, Kim Guldstrand Larsen |
| 2006 | Knowledge discovery on multi-relations distributed databases. Mehdi Owrang, Les L. Miller |
| 2006 | Material processing for ADI data using neuro fuzzy system. Deok Hee Nam, Harpreet Singh, Susil K. Putatunda |
| 2006 | Measuring class cohesion: An empirical approach. Prabhat Kumar Mahanti, Rajnish Kumar, Vandana Bhattacherjee |
| 2006 | ModVis: An information visualization tool for gene module discovery. Justin Molineaux, Jianhua Xuan, Ting Gong, Yitan Zhu, Eric P. Hoffman, Robert Clarke, Yue Joseph Wang |
| 2006 | Modeling the dynamic load in distributed control systems (DCS). Ahmed M. Mohamed, S. A. Younies |
| 2006 | OQL-based data mining query language. Rekha Bhowmik |
| 2006 | Performance modeling of hierarchical memories. Marwan S. Sleiman, Lester Lipsky, Kishori M. Konwar |
| 2006 | Proceedings of the ISCA 19th International Conference on Computer Applications in Industry and Engineering, CAINE 2006, November 13-15, 2006, Las Vegas, Nevada, USA Thomas Philip |
| 2006 | Research of the novel fast dynamic target detection method. Lingjia Gu, Shuxu Guo, Jin Duan, Wenbo Jing, Ruizhi Ren |
| 2006 | Scheduling multi-dimensional loops in a computer cluster. K. Mayfield, Ainsley Joseph, S. Black, Hoang Bui, Nelson L. Passos |
| 2006 | Securing wireless networks with enhanced WEP. Ramzi A. Haraty, Walid El Horr |
| 2006 | Security concerns with mobile IPv6. Y. Chen, R. Vaughn, R. Ramkumar |
| 2006 | Security enhancement for SCADA communication protocols using augmented vulnerability trees. Sandip C. Patel, James H. Graham, Patricia A. S. Ralston |
| 2006 | Security-enhanced remote terminal units for SCADA networks. Jeffrey L. Hieb, James H. Graham |
| 2006 | Simple factory design pattern by auto-registration and applications. Jie Cao, Shashi S. Marikunte |
| 2006 | Statistical steganography and steganalysis of database tables. George Hamer, Stephen Krebsbach |
| 2006 | Surveillance of a complex heterogeneous system using software agents - case study on a hydroelectric power plant chain. Honoriu Valean, Liviu Miclea, Szilárd Enyedi |
| 2006 | Task-migration support for parallel computing on shared virtual memory clusters. Angkul Kongmunvattana |
| 2006 | Teaching programming with animated 3D scenes. Barrett M. Shiff |
| 2006 | Transistor-mapped binary decision diagram for CMOS circuits. Chia-Pin R. Liu |
| 2006 | Usability of agentsheets for creating educational simulation. Kyu Han Koh, Sundeep Gopalaswamy, Ananth Srirangarajan, Jingren Jin, Cheryl D. Seals |
| 2006 | ZoneLib: A simulink library for modeling zone divided climate dynamics. Jan Jakob Jessen, Henrik Schiøler |