


default search action
21. ISCIS 2006: Istanbul, Turkey
- Albert Levi, Erkay Savas, Hüsnü Yenigün, Selim Balcisoy

, Yücel Saygin:
Computer and Information Sciences - ISCIS 2006, 21th International Symposium, Istanbul, Turkey, November 1-3, 2006, Proceedings. Lecture Notes in Computer Science 4263, Springer 2006, ISBN 3-540-47242-8
Invited Papers and Talks
- Erol Gelenbe:

Analysis of Automated Auctions. 1-12 - Daniel Thalmann, Patrick Salamin, Renaud Ott, Mario Gutiérrez, Frédéric Vexo:

Advanced Mixed Reality Technologies for Surveillance and Risk Prevention Applications. 13-23 - Manfred Broy:

Requirements Engineering as a Key to Holistic Software Quality. 24-34
Invited Talks
- Jacques G. Verly, Martin Kavec, Lara M. Vigneron, Christophe Phillips, Romain Boman

, Vincent Libertiaux, Jean-Philippe Ponthot, Serge Cescotto, Pierre Robe, Didier Martin, David Wikler, Marc Levivier, Jacques Brotchi:
Problems and Challenges of Image-Guided Neurosurgical Navigation and Intervention. 35 - Eric Badiqué:

Information and Communication Technologies in the EU's Seventh Framework Programme. 36
Algorithms and Theory
- Deniz Yuret, Michael de la Maza

:
The Greedy Prepend Algorithm for Decision List Induction. 37-46 - Fatih Gelgi, Melih Onus:

Heuristics for Minimum Brauer Chain Problem. 47-54 - Mehmet Bayram Yildirim

, Ekrem Duman
, Dilek Duman:
Dispatching Rules for Allocation of Component Types to Machines in the Automated Assembly of Printed Circuit Boards. 55-64 - Byung Tech Kim, Young Hoon Lee:

Heuristic Approach to Schedule Crew for a Regional Airline. 65-74 - Marcin Ciecholewski

, Krzysztof Debski:
Automatic Segmentation of the Liver in CT Images Using a Model of Approximate Contour. 75-84 - Erik Lilienblum, Bernd Michaelis:

Unambiguous 3D Measurements by a Multi-period Phase Shift Method. 85-94 - Demet Ayvaz, Haluk Topcuoglu

, Fikret S. Gürgen:
Hybrid Techniques for Dynamic Optimization Problems. 95-104 - Mohammad Abdullah-Al-Wadud

, Oksam Chae:
Minimizing the Search Space for Shape Retrieval Algorithms. 105-114 - Gürdal Ertek, Kemal Kilic:

Decision Support for Packing in Warehouses. 115-124 - Jong-Nam Kim, Tae-Kyung Ryu, Yongjae Jeong:

A Fast Partial Distortion Elimination Algorithm Using Selective Matching Scan. 125-133 - Aise Zülal Sevkli, Fatih Erdogan Sevilgen

:
Variable Neighborhood Search for the Orienteering Problem. 134-143
Bioinformatics
- Osman N. Yogurtçu

, Engin Erzin, Attila Gürsoy:
Extracting Gene Regulation Information from Microarray Time-Series Data Using Hidden Markov Models. 144-153 - Osman Abul

, Reda Alhajj, Faruk Polat:
Asymptotical Lower Limits on Required Number of Examples for Learning Boolean Networks. 154-164 - Galip Gürkan Yardimci, Alper Küçükural

, Yücel Saygin, Osman Ugur Sezerman
:
Modified Association Rule Mining Approach for the MHC-Peptide Binding Problem. 165-173 - Bekir Ergüner, Özgün Erdogan, Osman Ugur Sezerman

:
Prediction and Classification for GPCR Sequences Based on Ligand Specific Features. 174-181 - Abanish Singh, Nikola Stojanovic:

An Efficient Algorithm for the Identification of Repetitive Variable Motifs in the Regulatory Sequences of Co-expressed Genes. 182-191
Computational Intelligence
- Hak-Jin Kim, Wooju Kim

, Jongmyong Kim:
An Intelligent Shopping Agent for Optimal Purchasing Decision on the Semantic Web. 192-201 - Övünç Öztürk, Tugba Özacar, Murat Osman Ünalir, Ata Önal:

Adapting the Pyramid Technique for Indexing Ontological Data. 202-211 - Mehmet Fatih Amasyali, Mert Bal, Ugur Bugra Çelebi, Serkan Ekinci, U. Kasif Boyaci:

Comparison of Different Neural Networks Performances on Motorboat Datasets. 212-220 - In-Cheol Kim:

Dynamic Role Assignment for Multi-agent Cooperation. 221-229 - A. Cüneyd Tantug, Esref Adali, Kemal Oflazer

:
Lexical Ambiguity Resolution for Turkish in Direct Transfer Machine Translation Models. 230-238 - Emre Akbas, Fatos T. Yarman-Vural:

Design of a Feature Set for Face Recognition Problem. 239-247
Computer Architecture
- Yunhe Shi, Emre Özer, David Gregg:

Low-Cost Microarchitectural Techniques for Enhancing the Prediction of Return Addresses on High-Performance Trace Cache Processors. 248-257 - Jong Wook Kwak, Chu Shik Jhon:

Recovery Logics for Speculative Update Global and Local Branch History. 258-266 - Suleyman Tosun, Nazanin Mansouri, Mahmut T. Kandemir, Ozcan Ozturk:

An ILP Formulation for Task Scheduling on Heterogeneous Chip Multiprocessors. 267-276 - Mustafa Gök

, Çaglar Yilmaz:
Hardware Designs for Local Alignment of Protein Sequences. 277-285 - María Elena Acevedo-Mosqueda, Cornelio Yáñez-Márquez, Itzamá López-Yáñez

:
A New Model of BAM: Alpha-Beta Bidirectional Associative Memories. 286-295
Computer Graphics
- Sukhyun Lim, Byeong-Seok Shin:

PARM: Data Structure for Efficient Volume Ray Casting. 296-305 - Alpaslan Duysak:

Triangle Propagation for Mass-Spring Chain Algorithm. 306-315 - Hyun-Duk Chang, Byeong-Seok Shin:

Hardware Acceleration of Terrain Visualization Using ef-Buffers. 316-324 - Hakan Özdemir, Güngör Baser:

Computer Simulation of Woven Fabric Defects Based on Faulty Yarn Photographs. 325-333 - Sukhyun Lim, Byeong-Seok Shin:

Bidirectional Distancemap for Efficient Volume Ray Casting. 334-342 - Olcay Sertel, Cem Ünsalan:

Segmenting Free-Form 3D Objects by a Function Representation in Spherical Coordinates. 343-352 - Yi Li, Weidong Chen, Dongming Lu, Lei Zhao:

Applying Natural Neighbor Coordinates for Electromagnetic Tracker Calibration. 353-362 - Engin Deniz Diktas, Ali Vahit Sahiner:

Minkowski Sum Based Octree Generation for Triangular Meshes. 363-373 - Cristina Rebollo

, Inmaculada Remolar, Miguel Chover
, Jesús Gumbau:
Hardware-Oriented Visualisation of Trees. 374-383 - Ingu Kang, Young Ik Eom, JungHyun Han:

A Multi-resolution Technique for Real-time Animation of Large Crowds. 384-393 - Can Ozmen, Selim Balcisoy

:
A Framework for Working with Digitized Cultural Heritage Artifacts. 394-400
Computer Networks
- Ke Xu, Jiangchuan Liu, Lizheng Fu, Chunyu Liu:

On the Stability of Application-Layer Multicast Tree. 401-412 - JongMin Jeong, Goo Yeon Lee, Sang-Jae Moon:

Extended Authentication Integrating Scheme for Beyond 3G Wireless Networks. 413-423 - Krzysztof Walkowiak

:
A New Function for Optimization of Working Paths in Survivable MPLS Networks. 424-433 - Attila Altay Yavuz, Fatih Alagöz, Emin Anarim:

HIMUTSIS: Hierarchical Multi-tier Adaptive Ad-Hoc Network Security Protocol Based on Signcryption Type Key Exchange Schemes. 434-444 - Hai Jin, Minghu Zhang, Pengliu Tan:

Dual-Level Traffic Smoothing Technique over Switched Ethernet for Hard Real-Time Communication. 445-454 - Jung Ha Hong, Oleg Gusak, Neal Oliver, Khosrow Sohraby:

A Model of a Packet Aggregation System. 455-463 - Melike Erol, Tayfun Akgül

, Sema F. Oktug
, Süleyman Baykut:
On the Use of Principle Component Analysis for the Hurst Parameter Estimation of Long-Range Dependent Network Traffic. 464-473 - Süheyla Ikiz, Y. Murat Erten:

Throughput Analysis of UDP and VPN Traffic in 802.11g Networks. 474-482 - Burak Kantarci, Sema F. Oktug

:
Path Loss Rate Driven Burst Assembly in OBS Networks. 483-492
Computer Vision
- M. Kemal Güllü, Oguzhan Urhan

, Sarp Ertürk:
Pixel Domain Spatio-temporal Denoising for Archive Videos. 493-502 - Orhan Akbulut, Oguzhan Urhan

, Sarp Ertürk:
Fast Sub-pixel Motion Estimation by Means of One-Bit Transform. 503-510 - Syng-Yup Ohn:

Neighborhood Decomposition of Convex Structuring Elements for Mathematical Morphology on Hexagonal Grid. 511-521 - Begüm Demir, Sarp Ertürk:

Block Motion Estimation Using Modified Two-Bit Transform. 522-531 - Fadi Dornaika, Angel Domingo Sappa:

3D Face Tracking Using Appearance Registration and Robust Iterative Closest Point Algorithm. 532-541 - Tatiana Evreinova

, Grigori E. Evreinov, Roope Raisamo
:
Video as Input: Spiral Search with the Sparse Angular Sampling. 542-552 - Erhan AliRiza Ince

, Syed Amjad Ali
:
An Adept Segmentation Algorithm and Its Application to the Extraction of Local Regions Containing Fiducial Points. 553-562 - Samy Ait-Aoudia, Fatima-Zohra Benhamida

, Mohamed-Azzeddine Yousfi:
Lossless Compression of Volumetric Medical Data. 563-571 - Ali Iskurt, Sema Candemir

, Yusuf Sinan Akgul
:
Identification of Luminal and Medial Adventitial Borders in Intravascular Ultrasound Images Using Level Sets. 572-582
Data Mining
- Mikolaj Morzy:

Prediction of Moving Object Location Based on Frequent Trajectories. 583-592 - Gürdal Ertek, Ayhan Demiriz

:
A Framework for Visualizing Association Mining Results. 593-602
Databases
- Konstantina Stoupa, Zisis Simeoforidis, Athena Vakali:

Credential-Based Policies Management in an Access Control Framework Protecting XML Resources. 603-612 - Yonglei Yao, Fangchun Yang, Sen Su:

Evaluating Proposals in Web Services Negotiation. 613-621 - Abdullah Uz Tansel, Canan Eren Atay:

Nested Bitemporal Relational Algebra. 622-633 - José Enrique Armendáriz-Iñigo, Francesc D. Muñoz-Escoí

, Hendrik Decker, J. R. Juárez-Rodríguez
, José Ramón González de Mendívil:
A Protocol for Reconciling Recovery and High-Availability in Replicated Databases. 634-644 - Özgür Yürekten

, Kivanç Dinçer, Berk Akar, Müberra Sungur, Elif Kurtaran Özbudak:
Migrating a Hierarchical Legacy Database Application onto an XML-Based Service-Oriented Web Platform. 645-654
Embedded Systems
- Gürhan Küçük, Can Basaran:

Power-Aware Processors for Wireless Sensor Networks. 655-664 - Andaç T. Samiloglu

, Veysel Gazi, A. Bugra Koku:
Effects of Asynchronism and Neighborhood Size on Clustering in Self-propelled Particle Systems. 665-676 - Hyojun Kim, Jihyun In, DongHoon Ham, SongHo Yoon, Dongkun Shin:

Virtual-ROM: A New Demand Paging Component for RTOS and NAND Flash Memory Based Mobile Devices. 677-686 - Ji Chan Maeng, Dongjin Na, Yongsoon Lee, Minsoo Ryu:

Model-Driven Development of RTOS-Based Embedded Software. 687-696
Information Retrieval
- Cemal Köse, Özcan Özyurt

:
A Target Oriented Agent to Collect Specific Information in a Chat Medium. 697-706 - Ismail Sengör Altingövde

, Fazli Can, Özgür Ulusoy
:
Algorithms for Within-Cluster Searches Using Inverted Files. 707-716 - Berkant Barla Cambazoglu, Aytul Catal, Cevdet Aykanat:

Effect of Inverted Index Partitioning Schemes on Performance of Query Processing in Parallel Text Retrieval Systems. 717-725 - Vincenza Carchiolo

, Michele Malgeri, Giuseppe Mangioni, Vincenzo Nicosia:
Exploiting Social Networks Dynamics for P2P Resource Organisation. 726-734 - Joan Josep Piles, José Luis Salazar, José Ruíz-Mas, José María Moreno-Jiménez:

Security Considerations in e-Cognocracy. 735-744
Mobile Computing
- Ping Wang, Yunze Cai, Jinjie Huang, Xiaoming Xu:

A Dynamic Service Range Management Strategy for Improving Mobile Multicast Protocol Performance. 745-754 - Yong-Bin Kang, Yusuf Pisan:

A Survey of Major Challenges and Future Directions for Next Generation Pervasive Computing. 755-764 - Tolga K. Çapin, Antonio Haro, Vidya Setlur, Stephen Wilkinson:

Camera-Based Virtual Environment Interaction on Mobile Devices. 765-773 - Wonik Choi, Jinseok Chae, Nam-Joong Kim, Mee Young Sung:

A Cost Model for an Adaptive Cell-Based Index Structure. 774-782 - Nam-koo Ha, Kijun Han:

Positioning Method for Outdoor Systems in Wireless Sensor Networks. 783-792
Parallel and Distributed Computing
- Omid Bushehrian, Saeed Parsa

:
Formal Description of a Runtime Infrastructure for Automatic Distribution of Programs. 793-802 - Su-Hong Min, Dong-Sub Cho:

Super-Peer Selection Based Framework Using Dynamic Capacity and Similarity. 803-812 - Aleksandar Trifunovic, William J. Knottenbelt:

A General Graph Model for Representing Exact Communication Volume in Parallel Sparse Matrix-Vector Multiplication. 813-824 - Jerzy Brzezinski

, Anna Kobusinska
, Jacek Kobusinski:
Safety of Rollback-Recovery Protocol Maintaining WFR Session Guarantee. 825-833 - Oyku Akaydin, Omar Ramadan:

3-D Parallel Implementation of the Wave-Equation PML Algorithm Using Distributed System. 834-843 - Dan Li, Jianping Wu, Yong Cui, Jiangchuan Liu, Ke Xu:

Trustworthy Distributed Algorithm Design to Defend Distance Cheating in Link-Weighted ALM. 844-853 - Andrea D'Ambrogio, Daniele Gianni, Giuseppe Iazeolla:

jEQN a Java-Based Language for the Distributed Simulation of Queueing Networks. 854-865 - Öznur Özkasap

, Emine Sule Yazici
, Selda Küçükçifçi, Mine Çaglar
:
Exact Performance Measures for Peer-to-Peer Epidemic Information Diffusion. 866-876 - Amirhasan Amintabar, Alexander Kostin, Ljudmila Ilushechkina:

A Leader Election Protocol for Timed Asynchronous Distributed Systems. 877-886
Performance Evaluation
- Jean-Michel Fourneau, Franck Quessette:

Computing the Steady-State Distribution of G-networks with Synchronized Partial Flushing. 887-896 - Nalan Gülpinar, Peter G. Harrison, Berç Rustem:

Worst-Case Analysis of Router Networks with Rival Queueing Models. 897-907
Security and Cryptography
- Zhongxue Yang, Adem Karahoca:

An Anomaly Intrusion Detection Approach Using Cellular Neural Networks. 908-917 - Imran Erguler, Emin Anarim

:
A Lookup Table Model for Time-Memory Trade-Off Attacks on Binary Additive Stream Ciphers. 918-923 - Attila Altay Yavuz

, Emin Anarim
, Fatih Alagöz:
Improved Merkle Cryptosystem (IMC). 924-934 - Kamer Kaya, Ali Aydin Selçuk

, Zahir Tezcan:
Threshold Cryptography Based on Asmuth-Bloom Secret Sharing. 935-942 - Hüseyin Acan, Kamer Kaya, Ali Aydin Selçuk

:
Capture Resilient ElGamal Signature Protocols. 943-951 - Chul Sur, Jong-Phil Yang, Kyung Hyune Rhee:

A New Efficient Protocol for Authentication and Certificate Status Management in Personal Area Networks. 952-962 - Amir Akhavan

, Hadi Mahmodi
, Afshin Akhshani
:
A New Image Encryption Algorithm Based on One-Dimensional Polynomial Chaotic Maps. 963-971 - Feiyu Lei, Wen Chen, Kefei Chen:

A Non-committing Encryption Scheme Based on Quadratic Residue. 972-980 - Alisher Kholmatov, Berrin A. Yanikoglu

:
Biometric Cryptosystem Using Online Signatures. 981-990 - Selçuk Baktir

, Berk Sunar:
Finite Field Polynomial Multiplication in the Frequency Domain with Application to Elliptic Curve Cryptography. 991-1001 - Yumin Yuan:

A Threshold Proxy Signature Scheme with Nonrepudiation and Anonymity. 1002-1010 - Candelaria Hernández-Goya, Amparo Fúster-Sabater:

Deterministic Analysis of Balancedness in Symmetric Cryptography. 1011-1020
Software Engineering
- Guy-Vincent Jourdan, Panitee Ritthiruangdech, Hasan Ural:

Test Suite Reduction Based on Dependence Analysis. 1021-1030 - Pierre Flener:

Realism in Project-Based Software Engineering Courses: Rewards, Risks, and Recommendations. 1031-1039 - Evgeniya Khusnitdinova, A. C. Cem Say

:
Problems of Adiabatic Quantum Program Design. 1040-1049 - Sanjay Misra

:
Modified Cognitive Complexity Measure. 1050-1059 - Nida Gökçe, Mubariz Eminov, Fevzi Belli:

Coverage-Based, Prioritized Testing Using Neural Network Clustering. 1060-1071 - Cengiz Togay, Ali H. Dogru:

Component Oriented Design Based on Axiomatic Design Theory and COSEML. 1072-1079

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














