


Остановите войну!
for scientists:


default search action
AICCSA 2006: Dubai/Sharjah, UAE
- 2006 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2006), March 8-11, Dubai/Sharjah, UAE. IEEE Computer Society 2006, ISBN 1-4244-0211-5
- Ali Mili, Lan Wu, Frederick T. Sheldon, Mark Shereshevsky, Jules Desharnais:
Modeling Redundancy: Quantitative and Qualitative Models. 1-8 - Faiza Belala, A. Boucherit:
A Contribution to the Formal Checking of Multi-Agents Systems. 9-16 - Abdelli Abdelkrim, Nadjib Badache:
Synchronized Transitions Preemptive Time Petri Nets: A new model towards specifying multimedia requirements. 17-24 - Christof Squarr, Jens Bruhn, Guido Wirtz:
Adaptive Search in a Semi-Structured Peer-to-Peer System. 25-32 - Toufik Taibi, Fathi Taibi:
Formal Specification of Design Patterns and Their Instances. 33-36 - Li Huang, Muhammad Jaseemuddin, Hesham El-Sayed:
QoS Assurance of Handover TCP Flows in a DiffServ-enabled Mobile Wireless Access Network. 37-44 - Sonia Ben Rejeb, Zièd Choukair, Sami Tabbane:
QoS Management and Real Time Agreement Protocols for Resource Reservation for Multimedia Mobile Radio Network. 45-53 - Károly Farkas, Dirk Budke, Bernhard Plattner, Oliver Wellnitz, Lars C. Wolf:
QoS Extensions to Mobile Ad Hoc Routing Supporting Real-Time Applications. 54-61 - Tarek Bejaoui, Nidal Nasser, Véronique Vèque:
Enhanced Class-based Packet Scheduling Policy for QoS Provisioning in Multimedia Cellular Networks. 62-69 - Jalel Ben-Othman, Lynda Mokdad, Octavio Ramirez Rojas:
ATHOMIC: Architecture managing Tcp Handoff Over Mobile Ip Connections. 70-73 - A. J. Al-Khalili:
A CAD Tool for Scalable, Variable Architecture Floating-Point Adder Generator. 74-79 - Fekri Kharbash, Ghulam M. Chaudhry:
High-Speed Redundant Modulo 2n-1 Adder. 80-87 - Himanshu Thapliyal
, Neela Gopi, K. K. Pavan Kumar, M. B. Srinivas:
Low Power Hierarchical Multiplier and Carry Look-Ahead Architecture. 88-92 - Adnan Abdul-Aziz Gutub
, Mohammad K. Ibrahim, Ahmad Kayali:
Pipelining GF(P) Elliptic Curve Cryptography Computation. 93-99 - Himanshu Thapliyal
, M. B. Srinivas:
Novel Reversible Multiplier Architecture Using Reversible TSG Gate. 100-103 - Yasser Ganjisaffar, Kyumars Sheykh Esmaili, Mohammad Ghodsi, Hassan Abolhassani:
Parallel Online Ranking of Web Pages. 104-109 - Zikuan Liu, Jalal Almhana, Vartan Choulakian, Robert McGorman:
Internet Traffic Modeling Using Integer-Valued Time Series. 110-117 - Omar Ramadan, Oyku Akaydin:
Parallel Implementation of the PML Algorithm for Truncating Finite-Difference Time-Domain Grids. 118-122 - Fouad B. Chedid, Pauline G. Mouawad
:
On Compactly Encoding With Differential Compression. 123-129 - Muhammad Kashif, Tarek Helmy, Emad A. El-Sebakhy:
A Priority-Based MLFQ Scheduler for CPU Power Saving. 130-134 - Jahanzeb Ahmad, Usman Ali, Rashid Jalal Qureshi:
Fusion of Thermal and Visual Images for efficient Face Recognition using Gabor Filter. 135-139 - Iftikhar Ali, Usman Ali, Muhammad Imran Shahzad, Abdul Waheed Malik:
Face and Fingerprint biometrics Integration Model for Person Identification Using Gabor Filter. 140-143 - Qutaibah M. Malluhi, M. F. Malouhi:
Ragged-Edge Array Coding for Reliable and Efficient Storage Arrays. 144-150 - Saeed Abu-Nimeh, Suku Nair, Marco F. Marchetti:
An Experimental and Industrial Experience: Avoiding Denial of Service via Memory Profiling. 151-158 - Andrzej Sluzek, Phung Khoi Duy Minh:
Embedded Vision Module for Robot-soccer. 159-162 - Abbas Tarhini
, Hacène Fouchal
, Nashat Mansour:
Regression Testing Web Services-based Applications. 163-170 - Kyumars Sheykh Esmaili, Hassan Abolhassani:
A Categorization Scheme for Semantic Web Search Engines. 171-178 - Nanjangud C. Narendra, Srinivas Gundugola:
Automated Context-Aware Adaptation of Web Service Executions. 179-187 - Spyridon K. Gardikiotis, Nicos Malevris:
DaSIAn: A Tool for Estimating the Impact of Database Schema Modifications on Web Applications. 188-195 - Yannis Makripoulias, Christos Makris
, Yannis Panagis, Evangelos Sakkopoulos, Poulia Adamopoulou, Athanasios K. Tsakalidis:
Web Service discovery based on Quality of Service. 196-199 - Pejman Khadivi, Shadrokh Samavi, Hossein Saidi
:
Restricted Shortest Path Routing with Concave Costs. 200-207 - Hind Castel-Taleb, Lynda Mokdad, Nihal Pekergin:
Loss rates bounds for IP switches in MPLS networks. 208-214 - Mohammad Reza Hoseiny Farahabady, Farshad Safaei, Ahmad Khonsari, Mahmood Fathy:
On the Fault Patterns Properties in the Torus Networks. 215-220 - Bader Al-Manthari, Nidal Nasser, Hossam S. Hassanein:
Fair Channel Quality-Based Scheduling Scheme for HSDPA System. 221-227 - Omar Banimelhem, Anjali Agarwal, J. William Atwood:
A New MPLS-based Local Failure Recovery for Multicast Communication. 228-231 - Muhammad Taher Abuelma'atti, Abdullah Shwehneh:
A Reconfigurable Gaussian/Triangular Basis Functions Computation Circuit. 232-239 - Mahmoud Al-Qutayri
, Hassan R. Barada, Ahmed Al-Kindi:
Comparison of Multipliers Architectures through Emulation and Handle-C FPGA Implementation. 240-247 - Shuli Gao, Noureddine Chabini, Dhamin Al-Khalili, J. M. Pierre Langlois:
An Optimized Design Approach for Squaring Large Integers Using Embedded Hardwired Multipliers. 248-254 - Amina Y. Maarouf, Issam W. Damaj:
High Speed Hardware Implementation of a Heuristic 2D Rectangle Placement Algorithm. 255-261 - Hussam Al-Hertani, Dhamin Al-Khalili, Côme Rozon:
Accurate Total Static Leakage Current Estimation in Transistor Stacks. 262-265 - Ahmed Fadiel, Michael A. Langston, Xinxia Peng, Andy D. Perkins, Hugh S. Taylor, Ozge Tuncalp, D. Vitello, Paul H. Pevsner, Frederick Naftolin:
Computational Analysis of Mass Spectrometry Data Using Novel Combinatorial Methods. 266-273 - Mayada F. Abdul Halim, Abbas F. Abdul-Kader:
A New Recombination Scheme for Diploid Genetic Algorithms. 274-280 - Emad A. El-Sebakhy, Kanaan A. Faisal, Tarek Helmy, Farag Azzedin, A. Al-Suhaim:
Evaluation of Breast Cancer Tumor Classification with Unconstrained Functional Networks Classifier. 281-287 - Alireza Zolghadrasli
, Zahra Maghsoodzadeh:
Modification of Mammograms for Early Diagnosis of Breast Cancer Using Wavelet and Neural Networks. 288-295 - Saad Osman Abdalla Subair, Safaai Deris:
Protein Secondary Structure Reduction Methods Significantly Affect Prediction Accuracy. 296-299 - Saeed Abu-Nimeh, Suku Nair, Marco F. Marchetti:
Avoiding Denial of Service via Stress Testing. 300-307 - Omessaad Hamdi, Ammar Bouallegue, Sami Harari:
Hidden Field Equations Cryptosystem Performances. 308-311 - Steven T. Wolfe, Sheikh Iqbal Ahamed, Mohammad Zulkernine:
A Trust Framework for Pervasive Computing Environments. 312-319 - Farookh Khadeer Hussain, Elizabeth Chang
, Tharam S. Dillon:
Trust Ontology for Service-Oriented Environment. 320-325 - A. Kannammal, V. Ramachandran, N. Ch. S. N. Iyengar:
Secure Mobile Agent System for E-Business Applications. 326-329 - Stamatia Bibi, Grigorios Tsoumakas
, Ioannis Stamelos, Ioannis P. Vlahavas:
Software Defect Prediction Using Regression via Classification. 330-336 - Imen Loulou, Ahmed Hadj Kacem, Mohamed Jmaiel, Khalil Drira:
Compositional specification of event-based software architectural styles. 337-344 - Hassan Gomaa, Mazen Saleh
:
Software Product Line Engineering and Dynamic Customization of a Radio Frequency Management System. 345-352 - Muhammad Sibghatullah Siddiqui, Syed Jafar Hussain:
Comprehensive Software Development Model. 353-360 - Huáscar A. Sánchez, Mohamed E. Fayad:
The Branding Analysis Pattern. 361-364 - Abdulwahed M. Abbas, Edward P. K. Tsang, Ahmad H. Nasri:
DEPICT: A High-Level Formal Language For Modeling Constraint Satisfaction Problems. 365-368 - Ahmed Doha, Hossam S. Hassanein, Glen Takahara:
Performance Evaluation of Reservation Medium Access Control in IEEE 802.16 Networks. 369-374 - Salman A. AlQahtani, Uthman Baroudi
:
An Uplink Performance Evaluation for Roaming-Based Multi-Operator WCDMA Cellular Networks. 375-380 - Cheng Li, Ramachandran Venkatesan, Howard M. Heys:
Architecture and Performance Analysis of the Multicast Balanced Gamma Switch for Broadband Communications1. 381-388 - Mohamed G. El-Tarhuni:
Access Channel Performance in CDMA2000. 389-393 - Alireza Zolghadrasli
, Arif Hussain Baba, Sh. Golbahar Haghighi, Basharat Amin Shah:
Performance Evaluation in Cellular (CDMA) System Using Smart Antenna with Adaptive Sectoring Method. 394-397 - Mohammad A. Khan, Dingrong Shao:
System Performance Analysis of Synchronous Hybrid Direct Sequence-Slow Frequency Hopping Spread Spectrum Multiple Access Communications System Using Support Vector Machines. 398-401 - Walid Ibrahim
, Amr El-Chouemi, Hesham El-Sayed:
Novel Heuristic and Genetic Algorithms for the VLSI Test Coverage Problem. 402-408 - Fadi A. Aloul, Assim Sagahyroon, Bashar Al-Rawi:
Exciting Stuck-Open faults in CMOS Circuits Using ILP Techniques. 409-414 - Valeriu Beiu
, Jabulani Nyathi, Snorre Aunet, Mawahib H. Sulieman:
Femto Joule Switching for Nano Electronics. 415-423 - Mawahib H. Sulieman, Valeriu Beiu
:
Multiplexing Schemes in Single-Electron Technology. 424-428 - Hadi Shahriar Shahhoseini, Babak Hosseini Kazerouni:
Semi-Algorithmic Test Pattern Generation. 429-432 - Umar Iqbal Choudhry, JongWon Kim, Hong Kook Kim:
A Highly Adaptive Acoustic Echo Cancellation Solution for VoIP Conferencing Systems. 433-436 - Jiahong Wang, Yoshiaki Asanuma, Eiichiro Kodama, Toyoo Takata:
A Scalable Sequential Pattern Mining Algorithm. 437-444 - Murat Ali Bayir, Ismail H. Toroslu, Ahmet Cosar:
Performance Comparison of Pattern Discovery Methods on Web Log Data. 445-451 - Shariq Bashir
, Abdul Rauf Baig:
FastLMFI: An Efficient Approach for Local Maximal Patterns Propagation and Maximal Patterns Superset Checking. 452-459 - Faïza Najjar, Hassenet Slimani:
The N-tree: an Indexing Technique for Nearest-Neighbor Queries. 460-467 - Shane Emmons, Mudasser F. Wyne:
Multi-Channel Communication for Wireless Database. 468-471 - Munir Ahmad Al-Absi:
An Improved Current Mirror Cell. 472-474 - Raja Al-Jaljouli:
Formal Methods in the Enhancement of the Data Security Protocols of Mobile Agents. AICCSA 2006: 475-483 - Philippe Balbiani
, Fatima Harb, Ali Kaafarani:
Access control with prohibitions and obligations. 484-492 - Mohsen Bahramali, Hadi Shahriar Shahhoseini:
The Best Irreducible Pentanomials For A Mastrovito GF Multiplier. 493-499 - Omar Khadeer Hussain
, Elizabeth Chang
, Farookh Khadeer Hussain, Tharam S. Dillon, Ben Soh:
Predicting the Dynamic Nature of Risk. 500-507 - Farookh Khadeer Hussain, Elizabeth Chang
, Tharam S. Dillon:
Trust Relationships and Reputation Relationships for Service Oriented Environments. 508-510 - Tarik Ozkul:
Design of an Embedded Device for Surface Roughness Measurement. 511-514 - Adel Saadi
, Zaïdi Sahnoun:
Towards Intentional Agents to Manipulate Belief, Desire and Commitment Degrees. 515-520 - Radziah Mohamad
, Safaai Deris, Hany H. Ammar:
Agent Design Patterns Framework for MaSE/POAD Methodology. 521-528 - Demetrios Eliades, Andreas L. Symeonidis, Pericles A. Mitkas:
GeneCity: A Multi Agent Simulation Environment for Hereditary Diseases. 529-536 - Huoping Chen, Salim Hariri, Fahd Rasul:
An Innovative Self-Configuration Approach for Networked Systems and Applications. 537-544 - Haitham S. Hamza, Mohamed E. Fayad:
Stable Analysis Patterns. 545-548 - Turkmen Canli, Ajay Gupta
, Ashfaq A. Khokhar:
Power Efficient Algorithms for Computing Fast Fourier Transform over Wireless Sensor Networks. 549-556 - Akram Bin Sediq, Mohamed G. El-Tarhuni:
Power Allocation and Coding for Image Transmission over Wireless Channels. 557-564 - Prasad Raviraj, Hamid Sharif, Michael Hempel, Song Ci:
An Energy Efficient MAC Approach for Mobile Wireless Sensor Networks. 565-570 - Yu Yang, Hossam S. Hassanein, Afzal Mawji:
Efficient Service Discovery forWireless Mobile Ad Hoc Networks. 571-578 - Martin Waldburger, Burkhard Stiller:
Toward the Mobile Grid: Service Provisioning in a Mobile Dynamic Virtual Organization. 579-583 - Anuj Kumar, Vishnuprasad Nagadevara:
Development of Hybrid Classification Methodology for Mining Skewed Data Sets - A Case Study of Indian Customs Data. 584-591 - Muhammad Umer Arshad, Muhammad Naeem Ayyaz:
Mining N-most Interesting Itemsets using Support-Ordered Tries. 592-599 - Jiaxiong Pi, Yong Shi, Zhengxin Chen:
Evaluation of Cluster Analysis Algorithms Enhanced by Using R*-Trees. 600-607 - Jahangheer S. Shaik, Mohammed Yeasin:
Functionally Classifying Genes from Microarray Data Using Linear and Non-linear Data Projection. 608-615 - Abdul-Halim M. Jallad
, Tanya Vladimirova:
Distributed Computing for Formation Flying Missions. 616-620 - Asif Masood, Muhammad Sarfraz:
A Novel Corner Detector Approach using Sliding Rectangles. 621-626 - Ahmed Lehireche, Abdellatif Rahmoun:
Online Learning: Evolving in Real Time a neural net Controller of 3D-robot-arm. Track and Evolve. 627-632 - Amr Awadallah, Mendel Rosenblum:
The vMatrix: Equi-Ping Game Server Placement For Pre-Arranged First-Person-Shooter Multiplayer Matches. 633-640 - Farookh Khadeer Hussain, Elizabeth Chang
, Tharam S. Dillon:
Reputation Relationship and Its Inner Relationships for Service Oriented Environments. 641-646 - Chedly Ben Yahya:
An Automated System For Real Time Fault Localization in Optical Networks. 651-655 - M. Teresa Higuera-Toledano:
The Indeterministic Behavior of Scoped Memory in Real-Time Java. 656-664 - Abu Asaduzzaman, Imad Mahgoub
:
Cache Optimization for Embedded Systems Running H.264/AVC Video Decoder. 665-672 - Reza Iraji, Hamid Sarbazi-Azad:
A Probability-Based Instruction Combining Method for Scheduling in VLIW Processors. 673-679 - Issam W. Damaj, May Itani, Hassan B. Diab:
Serpent Cryptography on Static and Dynamic Reconfigurable Hardware. 680-684 - Martin Drozdz, Derrick G. Kourie, Bruce W. Watson, Andrew Boake:
Refactoring Tools and Complementary Techniques. 685-688 - Osama K. Alshara:
TOPER: A Tool Using Integrated Knowledge Reporting and Usability Methods. 689-696 - Hamdan Msheik, Alain Abran, Hamid Mcheick
, Dimitrios Touloumis, Adel Khelifi:
CoMet: A Tool Using CUMM to Measure Unused Component Members. 697-703 - Israr Pasha Shaik, Walid Abdelmoez, Rajesh Gunnalan, Ali Mili, Christopher P. Fuhrman, Mark Shereshevsky, A. Zeid, Hany H. Ammar:
Using Change Propagation Probabilities to Assess Quality Attributes of Software Architectures 1. 704-711 - Hui Wang, Hai Jin, Pingpeng Yuan, Liping Pang:
Session Management for Collaborative Applications in Interactive Grid. 712-715 - Muhammed Salamah:
An Adaptive Multi-Guard Channel Scheme for Multi-Class Traffic in Cellular Networks. 716-723 - Salman A. AlQahtani, Uthman Baroudi
:
An Uplink Admission Control for 3G and Beyond Roaming Based Multi-Operator Cellular Wireless Networks with Multi-Services. 724-729 - Syed Ismail Shah, Muhammad Naeem, Asrar U. H. Sheikh, Habibullah Jamal, Jamil Ahmad:
A Survey of Advances in Multi-User Detection in DS-CDMA. 730-737 - Salam A. Zummo
:
Throughput of ARQ Protocols Over Nakagami and MIMO Block Fading Channels. 738-743 - George Deprez, M. Padmaraj, Suku Nair:
Distributed fault management protocol for Heterogeneous Networks. 744-747 - Sanjay Tanwani, Ashwani Kumar Ramani:
An Object-Oriented Configurable Framework for Real-time Database Simulation Environment. 748-755 - Leïla Baccouche:
An Overview of MOA, a Multi-Class Overload Architecture for Real-time Database Systems: Framework and Algorithms. 756-763 - Omar H. Karam, Ahmad M. Hamad, Wedad H. Riad:
Classification Rules for Pre-Analysis Filtering of Web Transactions. 764-770 - Sidi Mohamed Benslimane, Mimoun Malki, Ahmed Lehireche:
Towards ontology-based semantic web from data-intensive web: A reverse engineering approach. 771-778 - Jihad Qaddour:
WAP and Push Technology Integrated into Mobile Commerce Applications. 779-785 - Bara'a Ali Attea
, Amina Dahim Aboud:
Evolutionary Colorization of Grayscale Images. 786-791 - Tamer Rabie:
Robust Color Video Denoising. 792-798 - A. Ajith, Naren Athmaraman:
Constructing Precise Geometric Models of Virtual Environunents using Image based View Synthesis. 799-805 - Vrinda Tokekar, Sanjiv Tokekar, Ashwani Kumar Ramani:
Study of Reneging Behavior in Batched Multimedia Service. 806-813