default search action
43rd ACM Southeast Regional Conference 2005: Kennesaw, Georgia, USA - Volume 2
- Mário Guimarães:
Proceedings of the 43nd Annual Southeast Regional Conference, 2005, Kennesaw, Georgia, Alabama, USA, March 18-20, 2005, Volume 2. ACM 2005
Networking and mobile computing
- Shilpa Yogesh Tisgaonkar, Chih-Cheng Hung, Benny Bing:
Intelligent handoff management with interference control for next generation wireless systems. 1-6 - Ryan Barnard:
An evolving power saving model for monitoring sensor networks using cellular automata. 7-8 - Chunsheng Xin, Feng He:
Cross-layer path computation for dynamic traffic grooming: in mesh WDM optical networks. 9-13 - Radhika Jain:
Improving quality of service for streaming multimedia applications in ubiquitous mobile environment. 14-19 - Taskin Koçak, Hakan Terzioglu:
A packet processor for a learning-based routing protocol. 20-25 - Narsingh Deo, Aurel Cami:
A birth-death dynamic model of scale-free networks. 26-27 - Alexander B. Bordetsky, Boris Peltsverger, Svetlana Peltsverger, Roman B. Statnikov:
Multi-criteria approach in configuration of energy efficient sensor networks. 28-29 - Lei Chen, Chung-wei Lee:
Multi-level secure video streaming over SRTP. 30-35 - Hala ElAarag, Andrew Moedinger:
IFTP-W: a TCP-friendly protocol for multimedia applications over wireless networks. 36-40 - Narsingh Deo, Hemant Balakrishnan:
Bibliometric approach to community discovery. 41-42 - Stefen Howard, Jim Martin:
DOCSIS performance evaluation: piggybacking versus concatenation. 43-48 - Chris Otto, John P. Gober, Reggie W. McMurtrey, Aleksandar Milenkovic, Emil Jovanov:
An implementation of hierarchical signal processing on wireless sensor in TinyOS environment. 49-53 - Song Luo, Gerald A. Marin:
Simulating application level self-similar network traffic using hybrid heavy-tailed distributions. 54-58 - Paresh Dhakan, Ronaldo Menezes:
The role of social structures in mobile ad-hoc networks. 59-64 - Steven Bassi, Miguel A. Labrador:
Setting up a Web100-Dummynet testbed for research in transport layer protocols. 65-69 - Lei Zhu, Justin French, Christopher Oglesby:
UbiquitousSurvey: a framework supporting mobile field survey data collection and analysis. 70-74 - H. W. Go, P. Y. Chan, Y. Dong, Ai Fen Sui, Siu-Ming Yiu, Lucas Chi Kwong Hui, Victor O. K. Li:
Performance evaluation on CRL distribution using flooding in mobile ad hoc networks (MANETs). 75-80 - Natarajan Meghanathan, Andras Farago:
Power sensitive power control in ad networks. 81-86 - Donald J. Scott:
Relying on time synchronization for security in ad hoc networks. 87-91 - Yoshito Kanamori, Seong-Moo Yoo, Mohammad Al-Shurman:
A quantum no-key protocol for secure data communication. 92-93 - Shilpa Yogesh Tisgaonkar, Chih-Cheng Hung, Benny Bing:
Next generation wireless systems using Markov decision process model. 94-95 - Taskin Koçak:
An architecture for high-speed execution of upper layer (4-7) network protocols. 96-97 - Spyros Kontogiorgis, Richard W. Tibbs:
An efficient approximation to wait time in M/M/c queues with application to staffing planning. 98-102 - Mohammad Al-Shurman, Seong-Moo Yoo, Yoshito Kanamori:
Decreasing broadcast in route discovery using vectors in mobile ad hoc networks. 103-104 - Victor A. Clincy:
The SONET ring transport planning problem. 105-106 - Yuanyuan Ding, Guangbin Fan:
A variation of reporting center scheme. 107-111 - Saad Biaz, Richard O. Chapman, James Pate Williams:
RTP and TCP based MIDI over IP protocols. 112-117 - Vladimir Zanev, Rodney Clark:
Wireless course management system. 118-123 - Aisha Kigongo, Yenumula B. Reddy:
Using genetic algorithm to minimize the effect of interference for broadband wireless access network. 124-125 - Ayoob Khan, Dhaval M. Shah, Zhenyu Xu:
Sync-TCP in high-speed environments. 126-127 - Deepak Vembar, Zhidian Du:
AQM performance in multiple congested link networks. 128-129
Security
- Deepak S. Yavagal, Seok Won Lee, Gail-Joon Ahn, Robin A. Gandhi:
Common criteria requirements modeling and its uses for quality of information assurance (QoIA). 130-135 - Gary Stein, Bing Chen, Annie S. Wu, Kien A. Hua:
Decision tree classifier for network intrusion detection with GA-based feature selection. 136-141 - Dong Yu, Deborah A. Frincke:
Alert confidence fusion in intrusion detection systems with extended Dempster-Shafer theory. 142-147 - Bruce D. Caulkins, Joohan Lee, Morgan C. Wang:
A dynamic data mining technique for intrusion detection systems. 148-153 - Khaled F. Hussain, Naveen Addulla, Sharon Rajan, Ghada S. Moussa:
Preventing the capture of sensitive information. 154-159 - Saeed Rajput, Jihong Chen, Sam Hsu:
State based authentication. 160-165 - William McLeod Rivera:
A stochastic estimator/detector for mitigating denial of service attacks. 166-171 - Norman Pendegraft, Mark Rounds, Deborah A. Frincke:
A simulation model of IS security. 172-177 - Andy Ju An Wang:
Information security models and metrics. 178-184 - Wen-Jung Hsin, Lein Harn:
Simple certified e-check with a partial PKI solution. 185-190 - Larry Lee Reynolds Jr., Richard W. Tibbs, E. Joseph Derrick:
A GUI for intrusion detection and related experiences. 191-192 - Xin Xu, Weihua Song, Vir V. Phoha:
Early detection and propagation mitigation of worm programs. 193-194
Software design, languages and systems
- Rehab F. Abdel-Kader:
Resource-constrained loop scheduling in high-level synthesis. 195-200 - Daniel Howard:
A genetic programming formulation to evade proportional navigation. 201-206 - Liguo Yu, Srini Ramaswamy:
Categorization of common coupling in kernel based software. 207-210 - Hang Su, Qiaozhu Mei:
Template extraction from candidate template set generation: a structure and content approach. 211-216 - Zhengping Wu, Alfred C. Weaver:
Token-based dynamic trust establishment for web services. 217-222 - Turky N. Al-Otaiby, Mohsen AlSherif, Walter P. Bond:
Toward software requirements modularization using hierarchical clustering techniques. 223-228 - Mark Bidewell:
Software-based dynamic thermal management for Linux systems. 229-234 - Brian Ray, JingJiang He, Chia-Chu Chiang, Jim Melescue:
The print scraping system. 235-236 - Victoria Davis, Jeff Gray, Joel Jones:
Generative approaches for application tailoring of mobile devices. 237-241 - Theodore (Ted) Roberts, Hisham M. Haddad:
Application development for desktop and PDA-style devices: issues and lessons learned. 242-247 - Nadeem Abdul Hamid:
Certified memory management for proof-carrying code: a region-based type system and runtime library. 248-249 - Kam Fui Lau:
Real-time intelligent program stock trading. 250-255 - Lester O. Lobo, James D. Arthur:
Local and global analysis: complementary activities for increasing the effectiveness of requirements verification and validation. 256-261 - Kevin Marth:
Programming in the MPL-RM programming language. 262-268 - Luis E. Cuéllar:
Open source license alternatives for software applications: is it a solution to stop software piracy? 269-274 - Chia-Chu Chiang, Charles Wesley Ford:
Maintainability and reusability issues in CORBA-based systems. 275-280 - Jules White, Boris Kolpackov, Balachandran Natarajan, Douglas C. Schmidt:
Reducing application code complexity with vocabulary-specific XML language bindings. 281-287 - Lawrence Teo, Gail-Joon Ahn:
Supporting access control policies across multiple operating systems. 288-293 - Andrew R. Dalton, Cindy Norris:
An experimental evaluation of a distributed Java compiler. 294-299 - Jamie L. Smith, Shawn A. Bohner, D. Scott McCrickard:
Project management for the 21st century: supporting collaborative design through risk analysis. 300-305 - Anastasia Tircuit, Boumediene Belkhouche:
Object-oriented behavioral testing through trace generation. 306-310 - Hassan Pournaghshband, Chris S. Bullock:
The use of dynamic tracing for troubleshooting. 311-314 - Cong-Cong Xing, Boumediene Belkhouche:
The movable point problem and its resolution in object type graphs. 315-320 - Guangming Xing, Rajesekhar Dandolu, Andrew Ernest:
An excel based Semantic email system. 321-326 - Xiaochuan Yi, Krys J. Kochut:
JCPNet tool and automated analysis of distributed systems. 327-332 - Jon A. Preston, Sushil K. Prasad:
Exploring communication overheads and locking policies in a peer-to-peer synchronous collaborative editing system. 333-334 - Winard Britt:
Making digital tickets possible via the microsoft smartphone. 335-336 - Ufuoma Akoroda:
Population dynamics visualization system for management of airborne biochemical agents attacks. 337-338 - Jose Hughes:
An online bookstore using JSP technology. 339-340 - Andrei Erdoss:
Exploring the portability and extensibility of XML schema generated web applications. 341-342 - Stefan S. Dimov, Vikas Vyas, Mike Schardt, Abdullah Faruque, Susrutha Narla, Haihua Fu:
Customizing model-view-controller design pattern for Web controlled household appliances and devices. 343-344 - Sanmati S. Kamath:
A compression scheme for video conferencing. 345-346 - Stanislav Ustymenko:
Ontology-supported sharing and reuse of knowledge in diverse environments. 347-348 - Aaron Garrett, David Thornton:
A web-based programming environment for LEGO mindstorms robots. 349-350 - Thomas Tickle:
Visualization of an intelligent integrated health management system for rocket propulsion. 351-352 - Hang Wu:
Pure object-based domain model for enterprise systems. 353-354
Visualization, graphics, and image processing
- Hari B. Bidasaria:
Development of techniques for visualization of scalar and vector fields in an immersive environment (CAVE). 355-356 - Ufuoma Akoroda:
Population dynamics visualization system for management of airborne biochemical agents attacks. 357-358 - Justin Belcher, Raheel Aidrus, Ben Congleton, Doug Hall, Shahzad Hussain, Matthew Jablonski, Theresa Klunk, D. Scott McCrickard:
NotiFly: enhancing design through claims-based personas and knowledge reuse. 359-364 - Jonathan R. Hicks, Joseph A. Driscoll:
Evolution of artificial agents in a realistic virtual environment. 365-369 - Swapna Gupta, J. Scott Hawker, Randy K. Smith:
Acquiring and delivering lessons learned for NASA scientists and engineers: a dynamic approach. 370-375 - Jason Chong Lee, Christa M. Chewar, D. Scott McCrickard:
Image is everything: advancing HCI knowledge and interface design using the system image. 376-381 - Mark S. Schmalz:
On the convergence of image compression and object recognition. 382-387 - A. Elizabeth Seward, Bobby Bodenheimer:
Using nonlinear dimensionality reduction in 3D figure animation. 388-392 - Stephanie A. Smullen, Clinton W. Smullen III, Carlos M. Santa:
Interactive 3D terrain exploration and visualization. 393-396 - Brian L. Stuart:
Relative localization from image sequences. 397-401 - Lakshmi Prayaga:
Visual aids to create a knowledge base with reusable objects across disciplines. 402-403 - Chunguang Ken Cao, Timothy S. Newman:
A new framework for recovery of shape of the right ventricle from GBP SPECT images. 404-405 - Katja A. Rodgers:
Monitor color and repetition as factors in human-computer interaction. 406-407
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.