default search action
19. CAINE 2006: Las Vegas, Nevada, USA
- Thomas Philip:
Proceedings of the ISCA 19th International Conference on Computer Applications in Industry and Engineering, CAINE 2006, November 13-15, 2006, Las Vegas, Nevada, USA. ISCA 2006, ISBN 978-1-880843-61-1
Image processing
- Eduardo Islas, Miguel Pérez, Benjamín Zayas-Pérez, Carlos Espinosa, Rita Beltran, Evelyn Vega:
Evaluation methodology for virtual reality software tools. CAINE 2006: 1-7 - M. Mohy Mahmoud, Amr Goneid, Suhair Amer:
Image compression of facial photographs based on BTC/TSVQ local processing. CAINE 2006: 8-13 - Rezwanur Rahman, Morshed U. Chowdhury, S. M. Raiyan Kabir, M. Rezwan Khan:
A novel method for person identification by comparing retinal patterns. CAINE 2006: 14-17 - Stephen Krebsbach, George Hamer:
Achieving near-optimal distortion reduction with invisible watermarking RSSI algorithms. CAINE 2006: 18-23 - Justin Molineaux, Jianhua Xuan, Ting Gong, Yitan Zhu, Eric P. Hoffman, Robert Clarke, Yue Joseph Wang:
ModVis: An information visualization tool for gene module discovery. CAINE 2006: 24-31 - Lingjia Gu, Shuxu Guo, Jin Duan, Wenbo Jing, Ruizhi Ren:
Research of the novel fast dynamic target detection method. CAINE 2006: 32-36
Sensor applications
- Mahmuda Naznin, Kendall E. Nygard:
Adaptive coverage in heterogeneous sensor network. CAINE 2006: 37-40 - Jens A. Hansen, Thomas D. Nielsen, Henrik Schiøler:
A COTS framework for sensor fusion using dynamic bayesian networks in livestock production. CAINE 2006: 41-47 - Kemal Taljanovic, Mehmed M. Kantardzic:
Computer-aided item selection for the cycle counting procedure. CAINE 2006: 48-53
High performance computing
- Marwan S. Sleiman, Lester Lipsky, Kishori M. Konwar:
Performance modeling of hierarchical memories. CAINE 2006: 54-59 - Ahmed M. Mohamed, S. A. Younies:
Modeling the dynamic load in distributed control systems (DCS). CAINE 2006: 60-65 - Angkul Kongmunvattana:
Task-migration support for parallel computing on shared virtual memory clusters. CAINE 2006: 66-71 - Frederick C. Harris Jr., Mark C. Ballew, Jason Baurick, James Frye, Lance Hutchinson, James Gonzalo King, Philip H. Goodman, Rich Drewes:
A novel parallel hardware and software solution for a large-scale biologically realistic cortical simulation. CAINE 2006: 72-77 - K. Mayfield, Ainsley Joseph, S. Black, H. Bui, Nelson L. Passos:
Scheduling multi-dimensional loops in a computer cluster. CAINE 2006: 78-82 - Ramzi A. Haraty, Lana Turk:
A comparative study of replacement algorithms used in the scalable asynchronous cache consistency scheme. CAINE 2006: 83-88
Data mining
- Hsine-Jen Tsai, Les L. Miller, Ming Hua, Rebecca Wemhoff, Sarah Nusser:
Combining spatial data from multiple data sources. CAINE 2006: 89-94 - George Hamer, Stephen Krebsbach:
Statistical steganography and steganalysis of database tables. CAINE 2006: 95-101 - Carl G. Looney:
Clustering via a kernel fuzzy connectivity matrix. CAINE 2006: 102-107 - Prabhat Kumar Mahanti, Dhirendra Kumar Swami, Mohammed Al-Fayoumi:
Classification rule extraction approach based on homogeneous training samples. CAINE 2006: 108-113 - Mehdi Owrang, Les L. Miller:
Knowledge discovery on multi-relations distributed databases. CAINE 2006: 114-119 - Xiaoming Ding, Liping Zhang, Yiqiang Lu, Ridong Jiang:
A feature recognition approach for mold machining. CAINE 2006: 120-125
AI applications
- Honoriu Valean, Liviu Miclea, Szilárd Enyedi:
Surveillance of a complex heterogeneous system using software agents - case study on a hydroelectric power plant chain. CAINE 2006: 126-131 - Mariana Hentea:
Enhancing information security risk management with data mining and fuzzy logic techniques. CAINE 2006: 132-139 - Donna L. Hudson, Maurice E. Cohen:
Application of soft solutions for signal analysis. CAINE 2006: 140-144 - Ahmed Kamel:
A telephone communication agent for agent/user interaction. CAINE 2006: 145-150 - Deok Hee Nam, Harpreet Singh, Susil K. Putatunda:
Material processing for ADI data using neuro fuzzy system. CAINE 2006: 151-156 - Ekkasit Tiamkaew, Jirakhom Ruttanavakul:
Efficiently evolving multiple robots using distributed genetic algorithms. CAINE 2006: 157-161
Software engineering
- Hamzeh K. Al Shaar, Ramzi A. Haraty:
A three poled model for web applications. CAINE 2006: 162-166 - Vic Grout, Stuart Cunningham:
Complexity issues in control software design: A practical perspective. CAINE 2006: 167-174 - Naeem Zafar Azeemi:
A multiobjective evolutionary approach for constrained joint source code optimization. CAINE 2006: 175-180 - Raed Shatnawi, Wei Li:
An empirical study of the boundary values of the object-oriented metrics. CAINE 2006: 181-186 - Jie Cao, Shashi S. Marikunte:
Simple factory design pattern by auto-registration and applications. CAINE 2006: 187-192 - Prabhat Kumar Mahanti, Rajnish Kumar, Vandana Bhattacherjee:
Measuring class cohesion: An empirical approach. CAINE 2006: 193-198
Modeling
- Jan Jakob Jessen, Henrik Schiøler:
ZoneLib: A simulink library for modeling zone divided climate dynamics. CAINE 2006: 199-204 - G. Arumaikkannu, M. Sreeramulu, S. Gowri:
Analysis of fused deposition modeling parts. CAINE 2006: 205-210 - Kongkiat Hirankerd, Pattarasinee Bhattarakosol:
Computer virus signature model for detection engine. CAINE 2006: 211-217
Computers in education
- Kyu Han Koh, Sundeep Gopalaswamy, Ananth Srirangarajan, Jingren Jin, Cheryl D. Seals:
Usability of agentsheets for creating educational simulation. CAINE 2006: 218-223 - Barrett M. Shiff:
Teaching programming with animated 3D scenes. CAINE 2006: 224-229 - P. Alcides Jr., Manoel R. Filho, Fábio V. Bezerra, Marcos A. Souza, Pebertli A. Barata, Messias A. Nascimento, Marcelo da Silva Hounsell:
A virtual reality system for hydroelectric generating unit maintenance training and understanding. CAINE 2006: 230-235
Computer networks
- Henrik Schiøler, Jan Jakob Jessen, Jens Dalsgaard Nielsen, Kim Guldstrand Larsen:
Introducing synchronisation in deterministic network models. CAINE 2006: 236-243 - Sandip C. Patel, James H. Graham, Patricia A. S. Ralston:
Security enhancement for SCADA communication protocols using augmented vulnerability trees. CAINE 2006: 244-251 - Vic Grout, Stuart Cunningham:
A constrained version of a clustering algorithm for switch placement and interconnection in large networks. CAINE 2006: 252-257 - Teck-Kuen Chua, David C. Pheanis:
Congestion detection and control with real-time streaming media. CAINE 2006: 258-263 - Ahmed H. Salem, Anup Kumar, Adel Said Elmaghraby:
A simulation of power management algorithm in wireless transmission to guarantee QoS. CAINE 2006: 264-270 - Jeffrey L. Hieb, James H. Graham:
Security-enhanced remote terminal units for SCADA networks. CAINE 2006: 271-276
Special session on software engineering
- Thomas Wisniewski, Wenying Feng:
A process modeling system aimed at large-scale collaborative design over networks. CAINE 2006: 277-282 - Narayan C. Debnath, Nripendra Rai, Haesun K. Lee, Ilhyun Lee:
Design and description of a tool towards a software engineering experiment. CAINE 2006: 283-288 - Narayan C. Debnath, Joyati C. Debnath, Mark Burgin, Joshua Wilson, Joseph Cropper:
An autotester for the modified commission function. CAINE 2006: 289-294 - Rekha Bhowmik:
OQL-based data mining query language. CAINE 2006: 295-300 - Thomas Wisniewski, Wenying Feng:
A new modeling notation for system design and workflow patterns. CAINE 2006: 301-306 - José Alfredo Sánchez López, Dionisio A. Suarez, Agustin Quintero:
Integration of multidisciplinary specialized applications using components. CAINE 2006: 307-311
Computer applications
- Y. Y. Su, Liang Y. Liu:
A case study of monitoring construction operations using automated position tracking system. CAINE 2006: 312-317 - Min-Hsuan Tsai, Liang Y. Liu, Feniosky Peña-Mora:
Designing of building black-boxes to support disaster rescue and recovery. CAINE 2006: 318-323 - Chia-Pin R. Liu:
Transistor-mapped binary decision diagram for CMOS circuits. CAINE 2006: 324-329
Neuro networks applications
- Masaya Yoshikawa, Hidekazu Terai:
Co-evolutionary robotics using two kinds of neural networks. CAINE 2006: 330-334 - In Soo Lee, Gordon K. Lee:
Fault detection and isolation using artificial neural networks. CAINE 2006: 335-340 - Kirthi L. Sreenivasan, Thomas Philip, Sunil K. Khijwania, Jagdish P. Singh:
Humidity estimation using neural network from sensor data. CAINE 2006: 341-345
Computer security
- Y. Chen, R. Vaughn, R. Ramkumar:
Security concerns with mobile IPv6. CAINE 2006: 346-351 - Wei Li:
A security engineering process for vulnerability assessment. CAINE 2006: 352-357 - Ramzi A. Haraty, Walid El Horr:
Securing wireless networks with enhanced WEP. CAINE 2006: 358-363 - Rui Jiang, Aiqun Hu, Xiaohui Yang:
Advanced remote password authentication and key agreement using smart card. CAINE 2006: 364-370
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.