CAINE C

49 papers

YearTitle / Authors
20092.5GHz Low Power CMOS Cross-Coupled VCO with High Linearity and Wide Tuning Range.
Lu Wang, Prasanta Ghosh
20093D Scans of AS-Built Street Scenes in Taipei.
Naai-Jung Shih, Chia-Yu Lee, Shih-Wei Jhan, Yong-Fong Jhao, Guan-Syun Wang
2009A Framework for Structured Search of Distributed Research Resources.
Anthony W. Wallace, Rex E. Gantenbein
2009A Model for Learning Words in a Language by Crawling the Web.
Jeffrey J. Thomson, Rex E. Gantenbein
2009A Space-Efficient Approach to Consistency Check of Firewall Rules.
Wei Li
2009Adaptive Fuzzy Inference for Edge Detection Using Compander Functions and Linear Fitness Function Transformations.
Gordon K. Lee, Edward Grant
2009An Integrated DNA Support System for Crime Investigations: DNA Tracers.
Noor Maizura Mohamad Noor, Razif bin Baital Latif
2009Build a Promoter Motif Database for System Biology Research.
Carlos Cortes, Yi Lu
2009Business Process Optimization by Workflow Analysis.
Ahmad H. Shraideh, Hervé G. Camus, Pascal G. M. Yim
2009Clustering Customer Transactions: A Rough Set Based Approach.
Arunava Saha, Darsana Das, Dipanjan Karmakar, Dilip Dubey, Anirban Sarkar, Narayan C. Debnath
2009Communication Reduction Techniques for Application-Specific Traffic in Mesh Networks.
David R. Surma
2009Comparison of JSON and XML Data Interchange Formats: A Case Study.
Nurzhan Nurseitov, Michael Paulson, Randall Reynolds, Clemente Izurieta
2009Computational Methods for Personal Healthcare.
Donna L. Hudson, Maurice E. Cohen
2009Constant Splitting of Instructions Applied to Embedded Systems for Code Compression.
M. M. F. Bari, Narayan C. Debnath
2009Creating a Virtual Science Center -Virtual DUSEL (vDUSEL).
Stephen Krebsbach, Steve Graham, Judy Vondruska, George Hamer
2009D-RNA: Towards a DDoS Resistant Network Architecture using Social Network Analysis.
Mohammad Iftekhar Husain, Ramalingam Sridhar
2009Data Broadcast Scheduling with Multiple Channels.
Ziping Liu, Bidyut Gupta
2009Design of a Hierarchical Principal Component Analysis System for Field Intrusion Detection.
Aleksey Y. Ashikhmin, James H. Graham, Ahmed H. Desoky, Benjamin Arazi
2009Digital PreProcessing of Speech for Feature Identification.
Reva Freedman, Adam Scovel, Lichuan Liu
2009Double Secrecy: An Enhanced Cryptographic Approach for SCADA System Security.
Waleed H. El-said, James H. Graham
2009FPGA-Based MPEG-4 Video Encoder SOPC Design with Performance Acceleration of Motion Estimation Block.
Seemantini Majgaonkar, Omar S. Elkeelany
2009Fault Tolerance in Parallelizing Three-Dimensional Particle-In-Cell Plasma Simulation.
Abdelmageed Elsadek Abdelrazek
2009Floorplan Optimization for Hierarchical VLSI Design.
Chia-Pin R. Liu
2009In Silico White Blood Cell: A Synthetic Model of Leukocyte Rolling, Activation, and Adhesion During Inflammation.
Jonathan Tang, C. Anthony Hunt
2009Isolation as a Threat Reduction Strategy for Super-Systems.
Robert G. Eyer, Ramesh K. Karne, Alexander L. Wijesinha
2009Job Planning and Simulation in a Digital Factory Environment.
Helge Hemmer, Thorsten Kisner, Sebastian Meiser, Wolfgang Kühn
2009Mechanically Generating and Executing Test Cases -Preliminary Design and Implementation of a Tool.
M. M. F. Bari, Narayan C. Debnath, Ilhyun Lee, Haesun K. Lee
2009Modeling An Adaptable Memory Controller.
Gary Thorpe, Nagi N. Mekhiel
2009Modeling of Hot Rolling Industrial Process Using Fuzzy Logic.
Alaa F. Sheta, Ertan Öznergiz, M. A. Abdelrahman, Robert Babuska
2009Multi-Level Power Management Policy for Multi-Core Chips.
Wael Kdouh, Hesham El-Rewini
2009Multi-channel Multiplexed Stand-alone Audio Data Acquisition System: The effect of settling time on acquisition accuracy.
Mohammed A. S. Abdallah, Omar S. Elkeelany
2009On Formalizing UML 2.0 Activities: Stream and Exception Parameters.
Sabine Boufenara, Faiza Belala, Narayan C. Debnath
2009Optimum Simulation of 2-Dimensional Torus Networks.
Chang-Shyh Peng, Daisy F. Sang
2009Pandemic Virus Spreading Simulator.
Adina Morariu, Honoriu Valean, Camelia Avram
2009Parallel Quasi-Newton Optimization using Graphics Processing Units.
Kreshna Gopal, Liuxia Wang, Steven Washington
2009Performance Analysis and Parallelization of Simulink Models.
Joshua D. Tyson, Ryan A. Kellar, Johnothan S. Corley, Kenneth G. Ricks, David Jeff Jackson
2009Predicting Likelihood of Undergraduate Students graduating with Honors.
Jonathan M. Graham, Janice Smith, Cheryl V. Hinds
2009Proceedings of the ISCA 22nd International Conference on Computer Applications in Industry and Engineering, CAINE 2009, November 4-6, 2009, Hilton San Francisco Fisherman's Wharf, San Francisco, California, USA
Dunren Che
2009Proposal of Predictive Coding Using Error Convergence-type Neuron Network System.
Shunsuke Kobayakawa, Hirokazu Yokoi
2009Quality of Security Service in a Virtual Private Network.
Yan Bai, Angkul Kongmunvattana, Soujanya Kantubukta
2009Self-Protection against Attacks in an Autonomic Computing Environment.
Guangzhi Qu, Osamah A. Rawashdeh, Salim Hariri
2009Sentiment Analysis of Surveys using both Numeric Ratings and Text Comments.
Gongzhu Hu
2009Software Estimating, Flexibility and Principled Negotiation.
Kalman C. Toth
2009Speedup Techniques for Simulink Model Execution.
Ryan A. Kellar, Joshua D. Tyson, Johnothan S. Corley, Kenneth G. Ricks, David Jeff Jackson
2009Traffic Engineering in Static Routing Using Multiple Static Route Configuration Scheme.
Hartinder Singh Johal
2009Using Ponder as a Standard Security Specification Language in Heterogeneous Networks.
Raouf Alomainy, Wei Li
2009Visualization Tools for Understanding a Complex Code from a Real Application.
Fernanda Campos, Estban Cortazar, Yadran Eterovic, Leonardo Ramirez, Cristian Tejos, Pablo Irarrazaval
2009Visualization of Network Security Traffic using Hexagonal Self-Organizing Maps.
Chet Langin, Dunren Che, Michael S. Wainer, Shahram Rahimi
2009Wavelet Based Regularized Deconvolution for Digital Images.
Pradeep Kumar Jaswal, Devinder Pathania, Sandeep Kumar Singla, Jatinder Singh Tathgir