


default search action
43rd ACM Southeast Regional Conference 2005: Kennesaw, Georgia, USA - Volume 2
- Mário Guimarães:

Proceedings of the 43nd Annual Southeast Regional Conference, 2005, Kennesaw, Georgia, Alabama, USA, March 18-20, 2005, Volume 2. ACM 2005
Networking and mobile computing
- Shilpa Yogesh Tisgaonkar, Chih-Cheng Hung, Benny Bing:

Intelligent handoff management with interference control for next generation wireless systems. 1-6 - Ryan Barnard:

An evolving power saving model for monitoring sensor networks using cellular automata. 7-8 - Chunsheng Xin, Feng He:

Cross-layer path computation for dynamic traffic grooming: in mesh WDM optical networks. 9-13 - Radhika Jain:

Improving quality of service for streaming multimedia applications in ubiquitous mobile environment. 14-19 - Taskin Koçak

, Hakan Terzioglu:
A packet processor for a learning-based routing protocol. 20-25 - Narsingh Deo, Aurel Cami:

A birth-death dynamic model of scale-free networks. 26-27 - Alexander B. Bordetsky, Boris Peltsverger, Svetlana Peltsverger, Roman B. Statnikov:

Multi-criteria approach in configuration of energy efficient sensor networks. 28-29 - Lei Chen, Chung-wei Lee:

Multi-level secure video streaming over SRTP. 30-35 - Hala ElAarag, Andrew Moedinger:

IFTP-W: a TCP-friendly protocol for multimedia applications over wireless networks. 36-40 - Narsingh Deo, Hemant Balakrishnan:

Bibliometric approach to community discovery. 41-42 - Stefen Howard, Jim Martin:

DOCSIS performance evaluation: piggybacking versus concatenation. 43-48 - Chris Otto, John P. Gober, Reggie W. McMurtrey, Aleksandar Milenkovic

, Emil Jovanov
:
An implementation of hierarchical signal processing on wireless sensor in TinyOS environment. 49-53 - Song Luo, Gerald A. Marin:

Simulating application level self-similar network traffic using hybrid heavy-tailed distributions. 54-58 - Paresh Dhakan, Ronaldo Menezes

:
The role of social structures in mobile ad-hoc networks. 59-64 - Steven Bassi, Miguel A. Labrador:

Setting up a Web100-Dummynet testbed for research in transport layer protocols. 65-69 - Lei Zhu, Justin French, Christopher Oglesby:

UbiquitousSurvey: a framework supporting mobile field survey data collection and analysis. 70-74 - H. W. Go, P. Y. Chan, Y. Dong, Ai Fen Sui, Siu-Ming Yiu, Lucas Chi Kwong Hui, Victor O. K. Li:

Performance evaluation on CRL distribution using flooding in mobile ad hoc networks (MANETs). 75-80 - Natarajan Meghanathan

, Andras Farago:
Power sensitive power control in ad networks. 81-86 - Donald J. Scott:

Relying on time synchronization for security in ad hoc networks. 87-91 - Yoshito Kanamori, Seong-Moo Yoo, Mohammad Al-Shurman:

A quantum no-key protocol for secure data communication. 92-93 - Shilpa Yogesh Tisgaonkar, Chih-Cheng Hung, Benny Bing:

Next generation wireless systems using Markov decision process model. 94-95 - Taskin Koçak

:
An architecture for high-speed execution of upper layer (4-7) network protocols. 96-97 - Spyros Kontogiorgis, Richard W. Tibbs:

An efficient approximation to wait time in M/M/c queues with application to staffing planning. 98-102 - Mohammad Al-Shurman, Seong-Moo Yoo, Yoshito Kanamori:

Decreasing broadcast in route discovery using vectors in mobile ad hoc networks. 103-104 - Victor A. Clincy:

The SONET ring transport planning problem. 105-106 - Yuanyuan Ding, Guangbin Fan:

A variation of reporting center scheme. 107-111 - Saad Biaz, Richard Oliver Chapman, James Pate Williams:

RTP and TCP based MIDI over IP protocols. 112-117 - Vladimir Zanev, Rodney Clark:

Wireless course management system. 118-123 - Aisha Kigongo, Yenumula B. Reddy:

Using genetic algorithm to minimize the effect of interference for broadband wireless access network. 124-125 - Ayoob Khan, Dhaval M. Shah, Zhenyu Xu:

Sync-TCP in high-speed environments. 126-127 - Deepak Vembar, Zhidian Du:

AQM performance in multiple congested link networks. 128-129
Security
- Deepak S. Yavagal, Seok Won Lee, Gail-Joon Ahn

, Robin A. Gandhi:
Common criteria requirements modeling and its uses for quality of information assurance (QoIA). 130-135 - Gary Stein, Bing Chen, Annie S. Wu, Kien A. Hua:

Decision tree classifier for network intrusion detection with GA-based feature selection. 136-141 - Dong Yu, Deborah A. Frincke:

Alert confidence fusion in intrusion detection systems with extended Dempster-Shafer theory. 142-147 - Bruce D. Caulkins, Joohan Lee, Morgan C. Wang:

A dynamic data mining technique for intrusion detection systems. 148-153 - Khaled F. Hussain

, Naveen Addulla, Sharon Rajan, Ghada S. Moussa
:
Preventing the capture of sensitive information. 154-159 - Saeed Rajput, Jihong Chen, Sam Hsu:

State based authentication. 160-165 - William McLeod Rivera:

A stochastic estimator/detector for mitigating denial of service attacks. 166-171 - Norman Pendegraft, Mark Rounds, Deborah A. Frincke:

A simulation model of IS security. 172-177 - Andy Ju An Wang:

Information security models and metrics. 178-184 - Wen-Jung Hsin, Lein Harn:

Simple certified e-check with a partial PKI solution. 185-190 - Larry Lee Reynolds Jr., Richard W. Tibbs, E. Joseph Derrick:

A GUI for intrusion detection and related experiences. 191-192 - Xin Xu, Weihua Song, Vir V. Phoha:

Early detection and propagation mitigation of worm programs. 193-194
Software design, languages and systems
- Rehab F. Abdel-Kader

:
Resource-constrained loop scheduling in high-level synthesis. 195-200 - Daniel Howard:

A genetic programming formulation to evade proportional navigation. 201-206 - Liguo Yu, Srini Ramaswamy:

Categorization of common coupling in kernel based software. 207-210 - Hang Su, Qiaozhu Mei:

Template extraction from candidate template set generation: a structure and content approach. 211-216 - Zhengping Wu, Alfred C. Weaver

:
Token-based dynamic trust establishment for web services. 217-222 - Turky N. Al-Otaiby, Mohsen AlSherif, Walter P. Bond:

Toward software requirements modularization using hierarchical clustering techniques. 223-228 - Mark Bidewell:

Software-based dynamic thermal management for Linux systems. 229-234 - Brian Ray, JingJiang He, Chia-Chu Chiang, Jim Melescue:

The print scraping system. 235-236 - Victoria Davis, Jeff Gray

, Joel Jones:
Generative approaches for application tailoring of mobile devices. 237-241 - Theodore (Ted) Roberts, Hisham M. Haddad:

Application development for desktop and PDA-style devices: issues and lessons learned. 242-247 - Nadeem Abdul Hamid

:
Certified memory management for proof-carrying code: a region-based type system and runtime library. 248-249 - Kam Fui Lau:

Real-time intelligent program stock trading. 250-255 - Lester O. Lobo, James D. Arthur:

Local and global analysis: complementary activities for increasing the effectiveness of requirements verification and validation. 256-261 - Kevin Marth:

Programming in the MPL-RM programming language. 262-268 - Luis E. Cuéllar:

Open source license alternatives for software applications: is it a solution to stop software piracy? 269-274 - Chia-Chu Chiang, Charles Wesley Ford:

Maintainability and reusability issues in CORBA-based systems. 275-280 - Jules White, Boris Kolpackov, Balachandran Natarajan, Douglas C. Schmidt:

Reducing application code complexity with vocabulary-specific XML language bindings. 281-287 - Lawrence Teo, Gail-Joon Ahn

:
Supporting access control policies across multiple operating systems. 288-293 - Andrew R. Dalton, Cindy Norris

:
An experimental evaluation of a distributed Java compiler. 294-299 - Jamie L. Smith, Shawn A. Bohner, D. Scott McCrickard:

Project management for the 21st century: supporting collaborative design through risk analysis. 300-305 - Anastasia Tircuit, Boumediene Belkhouche

:
Object-oriented behavioral testing through trace generation. 306-310 - Hassan Pournaghshband, Chris S. Bullock:

The use of dynamic tracing for troubleshooting. 311-314 - Cong-Cong Xing, Boumediene Belkhouche

:
The movable point problem and its resolution in object type graphs. 315-320 - Guangming Xing, Rajesekhar Dandolu, Andrew Ernest:

An excel based Semantic email system. 321-326 - Xiaochuan Yi, Krys J. Kochut:

JCPNet tool and automated analysis of distributed systems. 327-332 - Jon A. Preston, Sushil K. Prasad

:
Exploring communication overheads and locking policies in a peer-to-peer synchronous collaborative editing system. 333-334 - Winard Britt:

Making digital tickets possible via the microsoft smartphone. 335-336 - Ufuoma Akoroda:

Population dynamics visualization system for management of airborne biochemical agents attacks. 337-338 - Jose Hughes:

An online bookstore using JSP technology. 339-340 - Andrei Erdoss:

Exploring the portability and extensibility of XML schema generated web applications. 341-342 - Stefan S. Dimov

, Vikas Vyas, Mike Schardt, Abdullah Faruque, Susrutha Narla, Haihua Fu:
Customizing model-view-controller design pattern for Web controlled household appliances and devices. 343-344 - Sanmati S. Kamath:

A compression scheme for video conferencing. 345-346 - Stanislav Ustymenko

:
Ontology-supported sharing and reuse of knowledge in diverse environments. 347-348 - Aaron Garrett, David Thornton:

A web-based programming environment for LEGO mindstorms robots. 349-350 - Thomas Tickle:

Visualization of an intelligent integrated health management system for rocket propulsion. 351-352 - Hang Wu:

Pure object-based domain model for enterprise systems. 353-354
Visualization, graphics, and image processing
- Hari B. Bidasaria:

Development of techniques for visualization of scalar and vector fields in an immersive environment (CAVE). 355-356 - Ufuoma Akoroda:

Population dynamics visualization system for management of airborne biochemical agents attacks. 357-358 - Justin Belcher, Raheel Aidrus, Ben Congleton, Doug Hall, Shahzad Hussain, Matthew Jablonski, Theresa Klunk, D. Scott McCrickard:

NotiFly: enhancing design through claims-based personas and knowledge reuse. 359-364 - Jonathan R. Hicks, Joseph A. Driscoll:

Evolution of artificial agents in a realistic virtual environment. 365-369 - Swapna Gupta, J. Scott Hawker, Randy K. Smith:

Acquiring and delivering lessons learned for NASA scientists and engineers: a dynamic approach. 370-375 - Jason Chong Lee, Christa M. Chewar

, D. Scott McCrickard:
Image is everything: advancing HCI knowledge and interface design using the system image. 376-381 - Mark S. Schmalz:

On the convergence of image compression and object recognition. 382-387 - A. Elizabeth Seward, Bobby Bodenheimer:

Using nonlinear dimensionality reduction in 3D figure animation. 388-392 - Stephanie A. Smullen, Clinton W. Smullen III, Carlos M. Santa:

Interactive 3D terrain exploration and visualization. 393-396 - Brian L. Stuart

:
Relative localization from image sequences. 397-401 - Lakshmi Prayaga:

Visual aids to create a knowledge base with reusable objects across disciplines. 402-403 - Chunguang Ken Cao, Timothy S. Newman:

A new framework for recovery of shape of the right ventricle from GBP SPECT images. 404-405 - Katja A. Rodgers:

Monitor color and repetition as factors in human-computer interaction. 406-407

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














