default search action
21. ISCIS 2006: Istanbul, Turkey
- Albert Levi, Erkay Savas, Hüsnü Yenigün, Selim Balcisoy, Yücel Saygin:
Computer and Information Sciences - ISCIS 2006, 21th International Symposium, Istanbul, Turkey, November 1-3, 2006, Proceedings. Lecture Notes in Computer Science 4263, Springer 2006, ISBN 3-540-47242-8
Invited Papers and Talks
- Erol Gelenbe:
Analysis of Automated Auctions. 1-12 - Daniel Thalmann, Patrick Salamin, Renaud Ott, Mario Gutiérrez, Frédéric Vexo:
Advanced Mixed Reality Technologies for Surveillance and Risk Prevention Applications. 13-23 - Manfred Broy:
Requirements Engineering as a Key to Holistic Software Quality. 24-34
Invited Talks
- Jacques G. Verly, Martin Kavec, Lara M. Vigneron, Christophe Phillips, Romain Boman, Vincent Libertiaux, Jean-Philippe Ponthot, Serge Cescotto, Pierre Robe, Didier Martin, David Wikler, Marc Levivier, Jacques Brotchi:
Problems and Challenges of Image-Guided Neurosurgical Navigation and Intervention. 35 - Eric Badiqué:
Information and Communication Technologies in the EU's Seventh Framework Programme. 36
Algorithms and Theory
- Deniz Yuret, Michael de la Maza:
The Greedy Prepend Algorithm for Decision List Induction. 37-46 - Fatih Gelgi, Melih Onus:
Heuristics for Minimum Brauer Chain Problem. 47-54 - Mehmet Bayram Yildirim, Ekrem Duman, Dilek Duman:
Dispatching Rules for Allocation of Component Types to Machines in the Automated Assembly of Printed Circuit Boards. 55-64 - Byung Tech Kim, Young Hoon Lee:
Heuristic Approach to Schedule Crew for a Regional Airline. 65-74 - Marcin Ciecholewski, Krzysztof Debski:
Automatic Segmentation of the Liver in CT Images Using a Model of Approximate Contour. 75-84 - Erik Lilienblum, Bernd Michaelis:
Unambiguous 3D Measurements by a Multi-period Phase Shift Method. 85-94 - Demet Ayvaz, Haluk Topcuoglu, Fikret S. Gürgen:
Hybrid Techniques for Dynamic Optimization Problems. 95-104 - Mohammad Abdullah-Al-Wadud, Oksam Chae:
Minimizing the Search Space for Shape Retrieval Algorithms. 105-114 - Gürdal Ertek, Kemal Kilic:
Decision Support for Packing in Warehouses. 115-124 - Jong-Nam Kim, Tae-Kyung Ryu, Yongjae Jeong:
A Fast Partial Distortion Elimination Algorithm Using Selective Matching Scan. 125-133 - Aise Zülal Sevkli, Fatih Erdogan Sevilgen:
Variable Neighborhood Search for the Orienteering Problem. 134-143
Bioinformatics
- Osman N. Yogurtçu, Engin Erzin, Attila Gürsoy:
Extracting Gene Regulation Information from Microarray Time-Series Data Using Hidden Markov Models. 144-153 - Osman Abul, Reda Alhajj, Faruk Polat:
Asymptotical Lower Limits on Required Number of Examples for Learning Boolean Networks. 154-164 - Galip Gürkan Yardimci, Alper Küçükural, Yücel Saygin, Osman Ugur Sezerman:
Modified Association Rule Mining Approach for the MHC-Peptide Binding Problem. 165-173 - Bekir Ergüner, Özgün Erdogan, Osman Ugur Sezerman:
Prediction and Classification for GPCR Sequences Based on Ligand Specific Features. 174-181 - Abanish Singh, Nikola Stojanovic:
An Efficient Algorithm for the Identification of Repetitive Variable Motifs in the Regulatory Sequences of Co-expressed Genes. 182-191
Computational Intelligence
- Hak-Jin Kim, Wooju Kim, Jongmyong Kim:
An Intelligent Shopping Agent for Optimal Purchasing Decision on the Semantic Web. 192-201 - Övünç Öztürk, Tugba Özacar, Murat Osman Ünalir, Ata Önal:
Adapting the Pyramid Technique for Indexing Ontological Data. 202-211 - Mehmet Fatih Amasyali, Mert Bal, Ugur Bugra Çelebi, Serkan Ekinci, U. Kasif Boyaci:
Comparison of Different Neural Networks Performances on Motorboat Datasets. 212-220 - In-Cheol Kim:
Dynamic Role Assignment for Multi-agent Cooperation. 221-229 - A. Cüneyd Tantug, Esref Adali, Kemal Oflazer:
Lexical Ambiguity Resolution for Turkish in Direct Transfer Machine Translation Models. 230-238 - Emre Akbas, Fatos T. Yarman-Vural:
Design of a Feature Set for Face Recognition Problem. 239-247
Computer Architecture
- Yunhe Shi, Emre Özer, David Gregg:
Low-Cost Microarchitectural Techniques for Enhancing the Prediction of Return Addresses on High-Performance Trace Cache Processors. 248-257 - Jong Wook Kwak, Chu Shik Jhon:
Recovery Logics for Speculative Update Global and Local Branch History. 258-266 - Suleyman Tosun, Nazanin Mansouri, Mahmut T. Kandemir, Ozcan Ozturk:
An ILP Formulation for Task Scheduling on Heterogeneous Chip Multiprocessors. 267-276 - Mustafa Gök, Çaglar Yilmaz:
Hardware Designs for Local Alignment of Protein Sequences. 277-285 - María Elena Acevedo-Mosqueda, Cornelio Yáñez-Márquez, Itzamá López-Yáñez:
A New Model of BAM: Alpha-Beta Bidirectional Associative Memories. 286-295
Computer Graphics
- Sukhyun Lim, Byeong-Seok Shin:
PARM: Data Structure for Efficient Volume Ray Casting. 296-305 - Alpaslan Duysak:
Triangle Propagation for Mass-Spring Chain Algorithm. 306-315 - Hyun-Duk Chang, Byeong-Seok Shin:
Hardware Acceleration of Terrain Visualization Using ef-Buffers. 316-324 - Hakan Özdemir, Güngör Baser:
Computer Simulation of Woven Fabric Defects Based on Faulty Yarn Photographs. 325-333 - Sukhyun Lim, Byeong-Seok Shin:
Bidirectional Distancemap for Efficient Volume Ray Casting. 334-342 - Olcay Sertel, Cem Ünsalan:
Segmenting Free-Form 3D Objects by a Function Representation in Spherical Coordinates. 343-352 - Yi Li, Weidong Chen, Dongming Lu, Lei Zhao:
Applying Natural Neighbor Coordinates for Electromagnetic Tracker Calibration. 353-362 - Engin Deniz Diktas, Ali Vahit Sahiner:
Minkowski Sum Based Octree Generation for Triangular Meshes. 363-373 - Cristina Rebollo, Inmaculada Remolar, Miguel Chover, Jesús Gumbau:
Hardware-Oriented Visualisation of Trees. 374-383 - Ingu Kang, Young Ik Eom, JungHyun Han:
A Multi-resolution Technique for Real-time Animation of Large Crowds. 384-393 - Can Ozmen, Selim Balcisoy:
A Framework for Working with Digitized Cultural Heritage Artifacts. 394-400
Computer Networks
- Ke Xu, Jiangchuan Liu, Lizheng Fu, Chunyu Liu:
On the Stability of Application-Layer Multicast Tree. 401-412 - JongMin Jeong, Goo Yeon Lee, Sang-Jae Moon:
Extended Authentication Integrating Scheme for Beyond 3G Wireless Networks. 413-423 - Krzysztof Walkowiak:
A New Function for Optimization of Working Paths in Survivable MPLS Networks. 424-433 - Attila Altay Yavuz, Fatih Alagöz, Emin Anarim:
HIMUTSIS: Hierarchical Multi-tier Adaptive Ad-Hoc Network Security Protocol Based on Signcryption Type Key Exchange Schemes. 434-444 - Hai Jin, Minghu Zhang, Pengliu Tan:
Dual-Level Traffic Smoothing Technique over Switched Ethernet for Hard Real-Time Communication. 445-454 - Jung Ha Hong, Oleg Gusak, Neal Oliver, Khosrow Sohraby:
A Model of a Packet Aggregation System. 455-463 - Melike Erol, Tayfun Akgül, Sema F. Oktug, Süleyman Baykut:
On the Use of Principle Component Analysis for the Hurst Parameter Estimation of Long-Range Dependent Network Traffic. 464-473 - Süheyla Ikiz, Y. Murat Erten:
Throughput Analysis of UDP and VPN Traffic in 802.11g Networks. 474-482 - Burak Kantarci, Sema F. Oktug:
Path Loss Rate Driven Burst Assembly in OBS Networks. 483-492
Computer Vision
- M. Kemal Güllü, Oguzhan Urhan, Sarp Ertürk:
Pixel Domain Spatio-temporal Denoising for Archive Videos. 493-502 - Orhan Akbulut, Oguzhan Urhan, Sarp Ertürk:
Fast Sub-pixel Motion Estimation by Means of One-Bit Transform. 503-510 - Syng-Yup Ohn:
Neighborhood Decomposition of Convex Structuring Elements for Mathematical Morphology on Hexagonal Grid. 511-521 - Begüm Demir, Sarp Ertürk:
Block Motion Estimation Using Modified Two-Bit Transform. 522-531 - Fadi Dornaika, Angel Domingo Sappa:
3D Face Tracking Using Appearance Registration and Robust Iterative Closest Point Algorithm. 532-541 - Tatiana Evreinova, Grigori E. Evreinov, Roope Raisamo:
Video as Input: Spiral Search with the Sparse Angular Sampling. 542-552 - Erhan AliRiza Ince, Syed Amjad Ali:
An Adept Segmentation Algorithm and Its Application to the Extraction of Local Regions Containing Fiducial Points. 553-562 - Samy Ait-Aoudia, Fatima-Zohra Benhamida, Mohamed-Azzeddine Yousfi:
Lossless Compression of Volumetric Medical Data. 563-571 - Ali Iskurt, Sema Candemir, Yusuf Sinan Akgul:
Identification of Luminal and Medial Adventitial Borders in Intravascular Ultrasound Images Using Level Sets. 572-582
Data Mining
- Mikolaj Morzy:
Prediction of Moving Object Location Based on Frequent Trajectories. 583-592 - Gürdal Ertek, Ayhan Demiriz:
A Framework for Visualizing Association Mining Results. 593-602
Databases
- Konstantina Stoupa, Zisis Simeoforidis, Athena Vakali:
Credential-Based Policies Management in an Access Control Framework Protecting XML Resources. 603-612 - Yonglei Yao, Fangchun Yang, Sen Su:
Evaluating Proposals in Web Services Negotiation. 613-621 - Abdullah Uz Tansel, Canan Eren Atay:
Nested Bitemporal Relational Algebra. 622-633 - José Enrique Armendáriz-Iñigo, Francesc D. Muñoz-Escoí, Hendrik Decker, J. R. Juárez-Rodríguez, José Ramón González de Mendívil:
A Protocol for Reconciling Recovery and High-Availability in Replicated Databases. 634-644 - Özgür Yürekten, Kivanç Dinçer, Berk Akar, Müberra Sungur, Elif Kurtaran Özbudak:
Migrating a Hierarchical Legacy Database Application onto an XML-Based Service-Oriented Web Platform. 645-654
Embedded Systems
- Gürhan Küçük, Can Basaran:
Power-Aware Processors for Wireless Sensor Networks. 655-664 - Andaç T. Samiloglu, Veysel Gazi, A. Bugra Koku:
Effects of Asynchronism and Neighborhood Size on Clustering in Self-propelled Particle Systems. 665-676 - Hyojun Kim, Jihyun In, DongHoon Ham, SongHo Yoon, Dongkun Shin:
Virtual-ROM: A New Demand Paging Component for RTOS and NAND Flash Memory Based Mobile Devices. 677-686 - Ji Chan Maeng, Dongjin Na, Yongsoon Lee, Minsoo Ryu:
Model-Driven Development of RTOS-Based Embedded Software. 687-696
Information Retrieval
- Cemal Köse, Özcan Özyurt:
A Target Oriented Agent to Collect Specific Information in a Chat Medium. 697-706 - Ismail Sengör Altingövde, Fazli Can, Özgür Ulusoy:
Algorithms for Within-Cluster Searches Using Inverted Files. 707-716 - Berkant Barla Cambazoglu, Aytul Catal, Cevdet Aykanat:
Effect of Inverted Index Partitioning Schemes on Performance of Query Processing in Parallel Text Retrieval Systems. 717-725 - Vincenza Carchiolo, Michele Malgeri, Giuseppe Mangioni, Vincenzo Nicosia:
Exploiting Social Networks Dynamics for P2P Resource Organisation. 726-734 - Joan Josep Piles, José Luis Salazar, José Ruíz-Mas, José María Moreno-Jiménez:
Security Considerations in e-Cognocracy. 735-744
Mobile Computing
- Ping Wang, Yunze Cai, Jinjie Huang, Xiaoming Xu:
A Dynamic Service Range Management Strategy for Improving Mobile Multicast Protocol Performance. 745-754 - Yong-Bin Kang, Yusuf Pisan:
A Survey of Major Challenges and Future Directions for Next Generation Pervasive Computing. 755-764 - Tolga K. Çapin, Antonio Haro, Vidya Setlur, Stephen Wilkinson:
Camera-Based Virtual Environment Interaction on Mobile Devices. 765-773 - Wonik Choi, Jinseok Chae, Nam-Joong Kim, Mee Young Sung:
A Cost Model for an Adaptive Cell-Based Index Structure. 774-782 - Nam-koo Ha, Kijun Han:
Positioning Method for Outdoor Systems in Wireless Sensor Networks. 783-792
Parallel and Distributed Computing
- Omid Bushehrian, Saeed Parsa:
Formal Description of a Runtime Infrastructure for Automatic Distribution of Programs. 793-802 - Su-Hong Min, Dong-Sub Cho:
Super-Peer Selection Based Framework Using Dynamic Capacity and Similarity. 803-812 - Aleksandar Trifunovic, William J. Knottenbelt:
A General Graph Model for Representing Exact Communication Volume in Parallel Sparse Matrix-Vector Multiplication. 813-824 - Jerzy Brzezinski, Anna Kobusinska, Jacek Kobusinski:
Safety of Rollback-Recovery Protocol Maintaining WFR Session Guarantee. 825-833 - Oyku Akaydin, Omar Ramadan:
3-D Parallel Implementation of the Wave-Equation PML Algorithm Using Distributed System. 834-843 - Dan Li, Jianping Wu, Yong Cui, Jiangchuan Liu, Ke Xu:
Trustworthy Distributed Algorithm Design to Defend Distance Cheating in Link-Weighted ALM. 844-853 - Andrea D'Ambrogio, Daniele Gianni, Giuseppe Iazeolla:
jEQN a Java-Based Language for the Distributed Simulation of Queueing Networks. 854-865 - Öznur Özkasap, Emine Sule Yazici, Selda Küçükçifçi, Mine Çaglar:
Exact Performance Measures for Peer-to-Peer Epidemic Information Diffusion. 866-876 - Amirhasan Amintabar, Alexander Kostin, Ljudmila Ilushechkina:
A Leader Election Protocol for Timed Asynchronous Distributed Systems. 877-886
Performance Evaluation
- Jean-Michel Fourneau, Franck Quessette:
Computing the Steady-State Distribution of G-networks with Synchronized Partial Flushing. 887-896 - Nalan Gülpinar, Peter G. Harrison, Berç Rustem:
Worst-Case Analysis of Router Networks with Rival Queueing Models. 897-907
Security and Cryptography
- Zhongxue Yang, Adem Karahoca:
An Anomaly Intrusion Detection Approach Using Cellular Neural Networks. 908-917 - Imran Erguler, Emin Anarim:
A Lookup Table Model for Time-Memory Trade-Off Attacks on Binary Additive Stream Ciphers. 918-923 - Attila Altay Yavuz, Emin Anarim, Fatih Alagöz:
Improved Merkle Cryptosystem (IMC). 924-934 - Kamer Kaya, Ali Aydin Selçuk, Zahir Tezcan:
Threshold Cryptography Based on Asmuth-Bloom Secret Sharing. 935-942 - Hüseyin Acan, Kamer Kaya, Ali Aydin Selçuk:
Capture Resilient ElGamal Signature Protocols. 943-951 - Chul Sur, Jong-Phil Yang, Kyung Hyune Rhee:
A New Efficient Protocol for Authentication and Certificate Status Management in Personal Area Networks. 952-962 - Amir Akhavan, Hadi Mahmodi, Afshin Akhshani:
A New Image Encryption Algorithm Based on One-Dimensional Polynomial Chaotic Maps. 963-971 - Feiyu Lei, Wen Chen, Kefei Chen:
A Non-committing Encryption Scheme Based on Quadratic Residue. 972-980 - Alisher Kholmatov, Berrin A. Yanikoglu:
Biometric Cryptosystem Using Online Signatures. 981-990 - Selçuk Baktir, Berk Sunar:
Finite Field Polynomial Multiplication in the Frequency Domain with Application to Elliptic Curve Cryptography. 991-1001 - Yumin Yuan:
A Threshold Proxy Signature Scheme with Nonrepudiation and Anonymity. 1002-1010 - Candelaria Hernández-Goya, Amparo Fúster-Sabater:
Deterministic Analysis of Balancedness in Symmetric Cryptography. 1011-1020
Software Engineering
- Guy-Vincent Jourdan, Panitee Ritthiruangdech, Hasan Ural:
Test Suite Reduction Based on Dependence Analysis. 1021-1030 - Pierre Flener:
Realism in Project-Based Software Engineering Courses: Rewards, Risks, and Recommendations. 1031-1039 - Evgeniya Khusnitdinova, A. C. Cem Say:
Problems of Adiabatic Quantum Program Design. 1040-1049 - Sanjay Misra:
Modified Cognitive Complexity Measure. 1050-1059 - Nida Gökçe, Mubariz Eminov, Fevzi Belli:
Coverage-Based, Prioritized Testing Using Neural Network Clustering. 1060-1071 - Cengiz Togay, Ali H. Dogru:
Component Oriented Design Based on Axiomatic Design Theory and COSEML. 1072-1079
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.