CAINE C

62 papers

YearTitle / Authors
2006A COTS framework for sensor fusion using dynamic bayesian networks in livestock production.
Jens A. Hansen, Thomas D. Nielsen, Henrik Schiøler
2006A case study of monitoring construction operations using automated position tracking system.
Y. Y. Su, Liang Y. Liu
2006A comparative study of replacement algorithms used in the scalable asynchronous cache consistency scheme.
Ramzi A. Haraty, Lana Turk
2006A constrained version of a clustering algorithm for switch placement and interconnection in large networks.
Vic Grout, Stuart Cunningham
2006A feature recognition approach for mold machining.
Xiaoming Ding, Liping Zhang, Yiqiang Lu, Ridong Jiang
2006A multiobjective evolutionary approach for constrained joint source code optimization.
Naeem Zafar Azeemi
2006A new modeling notation for system design and workflow patterns.
Thomas Wisniewski, Wenying Feng
2006A novel method for person identification by comparing retinal patterns.
Rezwanur Rahman, Morshed U. Chowdhury, S. M. Raiyan Kabir, M. Rezwan Khan
2006A novel parallel hardware and software solution for a large-scale biologically realistic cortical simulation.
Frederick C. Harris Jr., Mark C. Ballew, Jason Baurick, James Frye, Lance Hutchinson, James Gonzalo King, Philip H. Goodman, Rich Drewes
2006A process modeling system aimed at large-scale collaborative design over networks.
Thomas Wisniewski, Wenying Feng
2006A security engineering process for vulnerability assessment.
Wei Li
2006A simulation of power management algorithm in wireless transmission to guarantee QoS.
Ahmed H. Salem, Anup Kumar, Adel Said Elmaghraby
2006A telephone communication agent for agent/user interaction.
Ahmed Kamel
2006A three poled model for web applications.
Hamzeh K. Al Shaar, Ramzi A. Haraty
2006A virtual reality system for hydroelectric generating unit maintenance training and understanding.
P. Alcides Jr., Manoel R. Filho, Fábio V. Bezerra, Marcos A. Souza, Pebertli A. Barata, Messias A. Nascimento, Marcelo da Silva Hounsell
2006Achieving near-optimal distortion reduction with invisible watermarking RSSI algorithms.
Stephen Krebsbach, George Hamer
2006Adaptive coverage in heterogeneous sensor network.
Mahmuda Naznin, Kendall E. Nygard
2006Advanced remote password authentication and key agreement using smart card.
Rui Jiang, Aiqun Hu, Xiaohui Yang
2006An autotester for the modified commission function.
Narayan C. Debnath, Joyati C. Debnath, Mark Burgin, Joshua Wilson, Joseph Cropper
2006An empirical study of the boundary values of the object-oriented metrics.
Raed Shatnawi, Wei Li
2006Analysis of fused deposition modeling parts.
G. Arumaikkannu, M. Sreeramulu, S. Gowri
2006Application of soft solutions for signal analysis.
Donna L. Hudson, Maurice E. Cohen
2006Classification rule extraction approach based on homogeneous training samples.
Prabhat Kumar Mahanti, Dhirendra Kumar Swami, Mohammed Al-Fayoumi
2006Clustering via a kernel fuzzy connectivity matrix.
Carl G. Looney
2006Co-evolutionary robotics using two kinds of neural networks.
Masaya Yoshikawa, Hidekazu Terai
2006Combining spatial data from multiple data sources.
Hsine-Jen Tsai, Les L. Miller, Ming Hua, Rebecca Wemhoff, Sarah Nusser
2006Complexity issues in control software design: A practical perspective.
Vic Grout, Stuart Cunningham
2006Computer virus signature model for detection engine.
Kongkiat Hirankerd, Pattarasinee Bhattarakosol
2006Computer-aided item selection for the cycle counting procedure.
Kemal Taljanovic, Mehmed M. Kantardzic
2006Congestion detection and control with real-time streaming media.
Teck-Kuen Chua, David C. Pheanis
2006Design and description of a tool towards a software engineering experiment.
Narayan C. Debnath, Nripendra Rai, Haesun K. Lee, Ilhyun Lee
2006Designing of building black-boxes to support disaster rescue and recovery.
Min-Hsuan Tsai, Liang Y. Liu, Feniosky Peña-Mora
2006Efficiently evolving multiple robots using distributed genetic algorithms.
Ekkasit Tiamkaew, Jirakhom Ruttanavakul
2006Enhancing information security risk management with data mining and fuzzy logic techniques.
Mariana Hentea
2006Evaluation methodology for virtual reality software tools.
Eduardo Islas, Miguel Pérez, Benjamín Zayas-Pérez, Carlos Espinosa, Rita Beltran, Evelyn Vega
2006Fault detection and isolation using artificial neural networks.
In Soo Lee, Gordon K. Lee
2006Humidity estimation using neural network from sensor data.
Kirthi L. Sreenivasan, Thomas Philip, Sunil K. Khijwania, Jagdish P. Singh
2006Image compression of facial photographs based on BTC/TSVQ local processing.
M. Mohy Mahmoud, Amr Goneid, Suhair Amer
2006Integration of multidisciplinary specialized applications using components.
José Alfredo Sánchez López, Dionisio A. Suarez, Agustin Quintero
2006Introducing synchronisation in deterministic network models.
Henrik Schiøler, Jan Jakob Jessen, Jens Dalsgaard Nielsen, Kim Guldstrand Larsen
2006Knowledge discovery on multi-relations distributed databases.
Mehdi Owrang, Les L. Miller
2006Material processing for ADI data using neuro fuzzy system.
Deok Hee Nam, Harpreet Singh, Susil K. Putatunda
2006Measuring class cohesion: An empirical approach.
Prabhat Kumar Mahanti, Rajnish Kumar, Vandana Bhattacherjee
2006ModVis: An information visualization tool for gene module discovery.
Justin Molineaux, Jianhua Xuan, Ting Gong, Yitan Zhu, Eric P. Hoffman, Robert Clarke, Yue Joseph Wang
2006Modeling the dynamic load in distributed control systems (DCS).
Ahmed M. Mohamed, S. A. Younies
2006OQL-based data mining query language.
Rekha Bhowmik
2006Performance modeling of hierarchical memories.
Marwan S. Sleiman, Lester Lipsky, Kishori M. Konwar
2006Proceedings of the ISCA 19th International Conference on Computer Applications in Industry and Engineering, CAINE 2006, November 13-15, 2006, Las Vegas, Nevada, USA
Thomas Philip
2006Research of the novel fast dynamic target detection method.
Lingjia Gu, Shuxu Guo, Jin Duan, Wenbo Jing, Ruizhi Ren
2006Scheduling multi-dimensional loops in a computer cluster.
K. Mayfield, Ainsley Joseph, S. Black, Hoang Bui, Nelson L. Passos
2006Securing wireless networks with enhanced WEP.
Ramzi A. Haraty, Walid El Horr
2006Security concerns with mobile IPv6.
Y. Chen, R. Vaughn, R. Ramkumar
2006Security enhancement for SCADA communication protocols using augmented vulnerability trees.
Sandip C. Patel, James H. Graham, Patricia A. S. Ralston
2006Security-enhanced remote terminal units for SCADA networks.
Jeffrey L. Hieb, James H. Graham
2006Simple factory design pattern by auto-registration and applications.
Jie Cao, Shashi S. Marikunte
2006Statistical steganography and steganalysis of database tables.
George Hamer, Stephen Krebsbach
2006Surveillance of a complex heterogeneous system using software agents - case study on a hydroelectric power plant chain.
Honoriu Valean, Liviu Miclea, Szilárd Enyedi
2006Task-migration support for parallel computing on shared virtual memory clusters.
Angkul Kongmunvattana
2006Teaching programming with animated 3D scenes.
Barrett M. Shiff
2006Transistor-mapped binary decision diagram for CMOS circuits.
Chia-Pin R. Liu
2006Usability of agentsheets for creating educational simulation.
Kyu Han Koh, Sundeep Gopalaswamy, Ananth Srirangarajan, Jingren Jin, Cheryl D. Seals
2006ZoneLib: A simulink library for modeling zone divided climate dynamics.
Jan Jakob Jessen, Henrik Schiøler