17. SAC 2002:
Madrid,
Spain
Proceedings of the 2002 ACM Symposium on Applied Computing (SAC), March 10-14, 2002, Madrid, Spain.
ACM 2002 @proceedings{DBLP:conf/sac/2002,
title = {Proceedings of the 2002 ACM Symposium on Applied Computing (SAC),
March 10-14, 2002, Madrid, Spain},
publisher = {ACM},
year = {2002},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
A.I. and computational logic
Agents,
interactions,
mobility and systems
- Henry Hexmoor, Justin Tyrel Vaughn:
Computational adjustable autonomy for NASA Personal Satellite Assistants.
21-26
- Chang-Hyun Jo, Allen J. Arnold:
The Agent-based Programming Language: APL.
27-31
- Lorenzo Bettini, Rocco De Nicola, Michele Loreti:
Software update via mobile agent based programming.
32-36
- Jorge J. Gómez-Sanz, Juan Pavón, Francisco J. Garijo:
Meta-models for building multi-agent systems.
37-41
- Bengt Carlsson, K. Ingemar Jönsson:
Differences between the iterated prisoner's dilemma and the chicken game under noisy conditions.
42-48
- Susan Weissman Lauzac, Panos K. Chrysanthis:
Personalizing information gathering for mobile database clients.
49-56
- Iadine Chades, Bruno Scherrer, François Charpillet:
A heuristic approach for solving decentralized-POMDP: assessment on the pursuit problem.
57-62
- Jen-Hsiang Chen, Kuo-Ming Chao, Nick Godwin, Colin R. Reeves, Peter Smith:
An automated negotiation mechanism based on co-evolution and game theory.
63-67
- Hoang Pham Huy, Simone Sédillot:
Agent-based mobility add-in feature for Object Transaction Service (OTS).
68-75
- Hock Kim Tan, Luc Moreau:
Certificates for mobile code security.
76-81
- Lucas C. Ferreira, Ricardo Dahab:
Blinded-key signatures: securing private keys embedded in mobile agents.
82-86
- Abhishek Singh, Santosh Pande:
Compiler optimizations for Java aglets in distributed data intensive applications.
87-92
- Luc Moreau:
A fault-tolerant directory service for mobile agents based on forwarding pointers.
93-100
- Frances M. T. Brazier, Benno J. Overeinder, Maarten van Steen, Niek J. E. Wijngaards:
Agent factory: generative migration of mobile agents in heterogeneous environments.
101-106
- Laurent Magnin, Viet Thang Pham, Arnaud Dury, Nicolas Besson, Arnaud Thiefaine:
Our guest agents are welcome to your agent platforms.
107-114
- Walter Binder, Volker Roth:
Secure mobile agent systems using Java: where are we heading?.
115-119
Applications of spatial simulation of discrete entities
- William Maniatty, Boleslaw K. Szymanski:
Editorial message: special track on applications of spatial simulation of discrete entities.
120-121
- Christopher L. Barrett, Madhav V. Marathe, James P. Smith, S. S. Ravi:
A mobility and traffic generation framework for modeling and simulating ad hoc communication networks.
122-126
- Jacki P. Goldman, William J. Gullick, Dennis Bray, Colin G. Johnson:
Individual-based simulation of the clustering behaviour of epidermal growth factor receptors.
127-131
- G. Korniss, M. A. Novotny, A. K. Kolakowska, H. Guclu:
Statistical properties of the simulated time horizon in conservative parallel discrete-event simulations.
132-137
- Stephen Eubank:
Scalable, efficient epidemiological simulation.
139-145
Bioinformatics
- Warren T. Jones, Hasan M. Jamil:
Bioinformatics track.
146
- Guoying Liu, Ann E. Loraine, Ron Shigeta, Melissa S. Cline, Jill Cheng, Stephen A. Chervi, David Kulp, Michael A. Siani-Rose:
NetAffx: affymetrix probeset annotations.
147-150
- Rhonda Harrison, Charles DeLisi:
A hypothesis driven approach to condition specific transcription factor binding site characterization in S.c..
151-158
- Mathew J. Palakal, Snehasis Mukhopadhyay, Javed Mostafa:
An intelligent biological information management system.
159-163
- David Sankoff:
Short inversions and conserved gene clusters.
164-167
- Deendayal Dinakarpandian, Vijay Kumar:
BlOMIND-protein property prediction by property proximity profiles.
168-172
- Gianluca Della Vedova, Todd Wareham:
Optimal algorithms for local vertex quartet cleaning.
173-177
Computational science
Computer security
- Giampaolo Bella, Ronaldo Menezes, James A. Whittaker:
Editorial Message: special track on computer security.
194-195
- Shouhuai Xu, Ravi S. Sandhu:
Authenticated multicast immune to denial-of-service attack.
196-200
- Christopher Krügel, Thomas Toth, Engin Kirda:
Service specific anomaly detection for network intrusion detection.
201-208
- Alexandr Seleznyov, Oleksiy Mazhelis:
Learning temporal patterns for anomaly intrusion detection.
209-213
- Chenghuai Lu, André L. M. dos Santos, Francisco R. Pimentel:
Implementation of fast RSA key generation on smart cards.
214-220
- Abhishek Singh, André L. M. dos Santos:
Grammar based off line generation of disposable credit card numbers.
221-228
- Roberto Barbuti, Cinzia Bernardeschi, Nicoletta De Francesco:
Checking security of Java bytecode by abstract interpretation.
229-236
- Larry A. Dunning, Sub Ramakrishnan:
Security status display and browser interframe communication.
237-241
- James A. Whittaker, Andres De Vivanco:
Neutralizing windows-based malicious mobile code.
242-246
- Giampaolo Bella:
Interactive simulation of security policies.
247-252
- Jan Steffan, Markus Schumacher:
Collaborative attack modeling.
253-259
- Herbert H. Thompson, James A. Whittaker, Florence E. Mottay:
Software security vulnerability testing in hostile environments.
260-264
- Matt Burnside, Dwaine E. Clarke, Todd Mills, Andrew Maywah, Srinivas Devadas, Ronald L. Rivest:
Proxy-based security protocols in networked mobile devices.
265-272
- Arslan Brömme, Marcel Kronberg, Oliver Ellenbeck, Oliver Kasch:
A conceptual framework for testing biometric algorithms within operating systems' authentication.
273-280
- Michele Boreale, Maria Grazia Buscemi:
Experimenting with STA, a tool for automatic analysis of security protocols.
281-285
Coordination models,
languages and applications
- Andrea Omicini, Sascha Ossowski:
Editorial message: special track on coordination models, languages and applications.
286-287
- Sherief Abdallah, Nevin M. Darwish, Osman Hegazy:
Monitoring and synchronization for teamwork in GPGP.
288-293
- Paul Davidsson, Fredrik Wernstedt:
A multi-agent system architecture for coordination of just-in-time production and distribution.
294-299
- Elth Ogston, Stamatis Vassiliadis:
Unstructured agent matchmaking: experiments in timing and fuzzy matching.
300-305
- Anthony Karageorgos, Simon G. Thompson, Nikolay Mehandjiev:
Semi-automatic design of agent organisations.
306-313
- Neal Sample, Dorothea Beringer, Gio Wiederhold:
A comprehensive model for arbitrary result extraction.
314-321
- Guangxin Yang:
A uniform meta-model for modeling integrated cooperation.
322-328
- Jinlei Jiang, Guangxin Yang, Yan Wu, Meilin Shi:
CovaTM: a transaction model for cooperative applications.
329-335
- Paolo Ciancarini, Robert Tolksdorf, Franco Zambonelli:
Coordination middleware for XML-centric applications.
336-343
- Philipp Obreiter, Guntram Gräf:
Towards scalability in tuple spaces.
344-350
- Jozef Hooman, Jaco van de Pol:
Formal verification of replication on a distributed data space architecture.
351-358
- Nadia Busi, Gianluigi Zavattaro:
On the serializability of transactions in shared dataspaces with temporary data.
359-366
- Federico Bergenti, Alessandro Ricci:
Three approaches to the coordination of multiagent systems.
367-372
- Lorenzo Bettini, Michele Loreti, Rosario Pugliese:
An infrastructure language for open nets.
373-377
- José Antonio Pérez, Rafael Corchuelo, David Ruiz, Miguel Toro:
An enablement detection algorithm for open multiparty interactions.
378-384
- Ludger Fiege, Gero Mühl, Felix C. Gärtner:
A modular approach to build structured event-based systems.
385-392
- F. H. Carvalho, Ricardo Massa Ferreira Lima, Rafael Dueire Lins:
Coordinating functional processes with Haskell#.
393-400
Database and digital library technologies
- Ramzi A. Haraty, Mohammad Zubair:
Database and digital library technologies: track chairs message.
401
- Kjetil Nørvåg:
Temporal query operators in XML databases.
402-406
- Albrecht Schmidt, Martin L. Kersten:
Bulkloading and maintaining XML documents.
407-412
- Qiang Ding, Qin Ding, William Perrizo:
Decision tree classification of spatial data streams using Peano Count Trees.
413-417
- Jon Olav Hauglid, Roger Midtstraum:
SESAM: searching supported by analysis of metadata.
418-425
- Qin Ding, Maleq Khan, Amalendu Roy, William Perrizo:
The P-tree algebra.
426-431
- Fernando Ferri, Elaheh Pourabbas, Maurizio Rafanelli:
The syntactic and semantic correctness of pictorial configurations to query geographic databases by PQL.
432-437
- Sang-Wook Kim, Jeehee Yoon, Sanghyun Park, Tae-Hoon Kim:
Shape-based retrieval of similar subsequences in time-series databases.
438-445
- Brajendra Panda, Kazi Asharful Haque:
Extended data dependency approach: a robust way of rebuilding database.
446-452
- Maria Cláudia Cavalcanti, Marta Mattoso, Maria Luiza Machado Campos, François Llirbat, Eric Simon:
Sharing scientific models in environmental applications.
453-457
- Ramzi A. Haraty, Mazen Hamdoun:
Iterative querying in web-based database applications.
458-462
- Laura C. Rivero, Jorge Horacio Doorn, Viviana E. Ferraggine:
Elicitation and conversion of hidden objects and restrictions in a database schema.
463-469
- Zaher Aghbari, Kunihiko Kaneko, Akifumi Makinouchi:
Topological mapping: a dimensionality reduction method for efficient video search.
470-475
- M. Mercedes Martínez, Jean-Claude Derniame, Pablo de la Fuente:
A method for the dynamic generation of virtual versions of evolving documents.
476-482
- Jeffrey T. Clark, Brian M. Slator, Aaron Bergstrom, Francis Larson, Richard Frovarp, James E. Landrum, William Perrizo, William Jockheck:
DANA (Digital Archive Network for Anthropology): a model for digital archiving.
483-487
- Cláudio de Souza Baptista:
A geolibrary for multimedia data sets: design and implementation issues.
488-492
- Kurt Maly, Mohammad Zubair, S. Balusani, A. Mathur, S. Sudeep, W. Wolters:
DL-COTF: an XML based digital library for U. S. Navy's operational test and evaluation force.
493-497
Declarative data mining
Electronics books for technical learning
Evolutionary computing and optimization
- Roger L. Wainwright, Günther R. Raidl:
Evolutionary computation and optimization track: SAC 2002.
541
- Sergiy Butenko, Panos M. Pardalos, Ivan Sergienko, Vladimir Shylo, Petro Stetsyuk:
Finding maximum independent sets in graphs arising from coding theory.
542-546
- Bryant A. Julstrom, Günther R. Raidl:
Initialization is robust in evolutionary algorithms that encode spanning trees as sets of edges.
547-552
- Brad Dolin, Forrest H. Bennett III, Eleanor G. Rieffel:
Co-evolving an effective fitness sample: experiments in symbolic regression and distributed robot control.
553-559
- Haibing Li, Andrew Lim:
Local search with annealing-like restarts to solve the vehicle routing problem with time windows.
560-565
- George Nyauma Nyakoe, Makoto Ohki, Suichiro Tabuchi:
Acquisition of modulation pulses for a multi-robot system using genetic algorithm.
568-573
- Steve Hurley, Roger M. Whitaker:
An agent based approach to site selection for wireless networks.
574-577
- Nelishia Pillay:
Using genetic programming for the induction of novice procedural programming solution algorithms.
578-583
- Atila Neves, Osvaldo Brasão, Agostinho C. Rosa:
Learning the risk board game with classifier systems.
585-589
- Jacinto Mata Vázquez, José Luis Álvarez Macías, José Cristóbal Riquelme Santos:
An evolutionary algorithm to discover numeric association rules.
590-594
- David A. van Veldhuizen, Jesse B. Zydallis, Gary B. Lamont:
Issues in parallelizing multiobjective evolutionary algorithms for real world applications.
595-602
- Konstantinos E. Parsopoulos, Michael N. Vrahatis:
Particle swarm optimization method in multiobjective problems.
603-607
- Fulvio Corno, Matteo Sonza Reorda, Giovanni Squillero:
An evolutionary algorithm for reducing integrated-circuit test application time.
608-612
Information access and retrieval
- Fabio Crestani, Gabriella Pasi:
Editorial message: special track on information access and retrieval systems.
613-614
- José María Gómez Hidalgo:
Evaluating cost-sensitive Unsolicited Bulk Email categorization.
615-620
- Andreas Becks, Christian Seeling, Ralf Minkenberg:
Benefits of document maps for text access in knowledge management: a comparative study.
621-626
- David L. Chan, Robert W. P. Luk, W. K. Mak, Hong Va Leong, Edward Kei Shiu Ho, Qin Lu:
Multiple related document summary and navigation using concept hierarchies for mobile clients.
627-632
- Simon O. Sweeney, Fabio Crestani, Anastasios Tombros:
Mobile delivery of news using hierarchical query-biased summaries.
634-639
- Mohand Boughanem, Mohamed Tmar:
Incremental adaptive filtering: profile learning and threshold calibration.
640-644
- Hideo Joho, Claire Coverson, Mark Sanderson, Micheline Hancock-Beaulieu:
Hierarchical presentation of expansion terms.
645-649
- Peter J. Brown, Gareth J. F. Jones:
Exploiting contextual change in context-aware retrieval.
650-656
- Holger Billhardt, Daniel Borrajo, Victor Maojo:
Using genetic algorithms to find suboptimal retrieval expert combinations.
657-662
- Evangelos Kotsakis:
Structured information retrieval in XML documents.
663-667
- Seung-Kyu Ko, Yoon-Chul Choy:
A structured documents retrieval method supporting attribute-based structure information.
668-674
- Gloria Bordogna, Gabriella Pasi:
Flexible querying of WEB documents.
675-680
- Satoshi Watanabe, Takao Miura:
Reordering B-tree files.
681-686
- Mario A. Nascimento, Vishal Chitkara:
Color-based image retrieval using binary signatures.
687-692
- Daniela Stan, Ishwar K. Sethi:
Color patterns for pictorial content description.
693-698
- Patrick Ruch:
Information retrieval and spelling correction: an inquiry into lexical disambiguation.
699-703
Inter disciplinary approaches to the design of dependable computer systems
- John E. Dobson, Cliff B. Jones, Rob Procter, Mark Rouncefield, Robin Williams:
Editorial message: special track on inter-disciplinary approaches to the design of dependable computer systems.
704-705
- Massimo Felici, Juliana Küster Filipe:
Limits in modelling evolving computer-based systems.
706-710
- Mark-Alexander Sujan, Antonio Rizzo, Alberto Pasquini:
Contradictions and critical issues during system evolution.
711-715
- Corin A. Gurr, Gillian Hardstone:
Modelling organisational practice in user requirements.
716-720
- Neil Pollock, James Cornford:
Fitting standard software to non-standard organisations.
721-725
- Luciana D'Adderio:
Configuring software, reconfiguring memories: the influence of integrated systems on knowledge storage, retrieval and reuse.
726-731
- Denis Besnard, Anthony T. Lawrie:
Lessons from industrial design for software engineering through constraints identification, solution space optimisation and reuse.
732-738
- Shamus P. Smith, Michael D. Harrison:
Augmenting descriptive scenario analysis for improvements in human reliability design.
739-743
- Salem Aljareh, B. Nick Rossiter:
A task-based security model to facilitate collaboration in trusted multi-agency networks.
744-749
Multimedia and visualization
- Chung-Ming Huang, Tz-Heng Hsu, Chi-Kuang Chang:
A proxy-based adaptive flow control scheme for media streaming.
750-754
- Sooyong Kang, Heon Young Yeom:
Smoothed fetching: bridging the data layout and transmission schemes in multimedia servers.
755-760
- Alfred Yu, Wael M. Badawy:
A mesh update requirement for hierarchical adaptive meshes in mesh-based motion tracking.
761-765
- Yongjian Fu, Jui-Che Teng, S. R. Subramanya:
Node splitting algorithms in tree-structured high-dimensional indexes for similarity search.
766-770
- Fernando Naharro-Berrocal, Cristóbal Pareja-Flores, Jaime Urquiza-Fuentes, J. Ángel Velázquez-Iturbide:
Approaches to comprehension-preserving graphical reduction of program visualizations.
771-777
- Jess Y. S. Mak, Hong Va Leong, Alvin T. S. Chan:
Dynamic structuring of web information for access visualization.
778-784
- Andrzej Trembilski, Andreas Broßler:
Transparency for polygon based cloud rendering.
785-790
- José Martinez, Erwan Loisant:
Browsing image databases with Galois' lattices.
791-795
- Mingjun Zhang, Chaman L. Sabharwal:
An efficient implementation of parametric line and polygon clipping algorithm.
796-800
Neuro-fuzzy applications
Parallel and distributed systems and networking
- I. Garcés, Daniel Franco:
Analysis of Distributed Routing Balancing behavior.
817-824
- Alireza Shahrabi, Mohamed Ould-Khaoua, Lewis M. Mackenzie:
Communication delay in wormhole-routed torus networks.
825-829
- Jehad Al-Sadi, Khaled Day, Mohamed Ould-Khaoua:
Probability vectors: a new fault-tolerant routing algorithm for k-ary n-cubes.
830-834
- Hamid Sarbazi-Azad, Mohamed Ould-Khaoua:
A simple mathematical model of adaptive routing in wormhole k-ary n-cubes.
835-839
- Ahmed Yassin Al-Dubai, Mohamed Ould-Khaoua, Lewis M. Mackenzie:
Towards a scalable broadcast in wormhole-switched mesh networks.
840-844
- Hiroshi Fujimoto, Tadashi Nakano, Kaname Harumoto, Shojiro Nishio:
Response order rearrangement on a caching proxy for reducing WWW latency.
845-851
- Wooi-Ghee Wang, Takahiro Hara, Masahiko Tsukamoto, Shojiro Nishio:
AODV compatible routing with extensive use of cache information in ad-hoc networks.
852-859
- Jung-Sheng Fu, Gen-Huey Chen:
Cycle embedding in faulty hierarchical cubic networks.
860-864
- Chun-Hsi Huang:
Grid-enabled parallel divide-and-conquer: theory and practice.
865-869
- Eder N. Mathias, Celso M. da Costa, Fernando Luís Dotti, Felipe Martins Müller:
DEVOpT: a distributed architecture supporting heuristic and metaheuristic optimization methods.
870-875
- Georgios I. Goumas, Maria Athanasaki, Nectarios Koziris:
Automatic code generation for executing tiled nested loops onto parallel architectures.
876-881
- Heinz Stockinger, Andrew Hanushevsky:
HTTP redirection for replica catalogue lookups in data grids.
882-889
- Brian F. Cooper, Neal Sample, Moshe Shadmon:
A parallel index for semistructured data.
890-896
- Franck Morvan, Abdelkader Hameurlain:
Dynamic memory allocation strategies for parallel query execution.
897-901
- Dirk Thißen:
Load balancing for the management of service performance in open service markets: a customer-oriented approach.
902-906
- Juan Touriño, Jacobo Barro, Ramon Doallo, Víctor M. Gulías:
Performance analysis of MPI-I/O primitives on a PC cluster.
907-912
- Sunghyun Jee, Kannappan Palaniappan:
Performance evaluation for a compressed-VLIW processor.
913-917
- B. Anthony Kadrovach, Gary B. Lamont:
A particle swarm model for swarm-based networked sensor systems.
918-924
Programming languages and object technologies
- Chang-Hyun Jo, Rajeev R. Raje:
Editorial message: special track on the programming languages and object technologies.
925-926
- Robert Tolksdorf, Kai Knubben:
Programming distributed systems with the delegation-based object-oriented language dSelf.
927-931
- Beum-Seuk Lee, Barrett R. Bryant:
Automated conversion from requirements documentation to an object-oriented formal specification language.
932-936
- Ian Nunn, Dwight Deugo:
Automated assembly of software components based on XML-coded instructions.
937-942
- Enis Avdicausevic, Marjan Mernik, Mitja Lenic, Viljem Zumer:
Experimental aspect-oriented language - AspectCOOL.
943-947
- Claudia Leopold:
On optimal temporal locality of stencil codes.
948-952
- Kameswari V. Garigipati, Cindy Norris:
Evaluating the use of profiling by a region-based register allocator.
953-957
- João Coelho Garcia, Paulo Ferreira:
Concurrency control for distributed cooperative engineering applications.
958-963
- Nael B. Abu-Ghazaleh, Dhananjay S. Phatak:
Verification caching: towards efficient and secure mobile code execution environments.
964-968
Software engineering:
theory,
application and practice
- David C. Rine, James F. Power, J. Paul Gibson:
ACM SAC2002 software engineering: theory and applications (SETA) track description.
969-970
- Hisham Haddad, Herbert Tesser:
Reusable subsystems: domain-based approach.
971-975
- Paul Young, Valdis Berzins, Jun Ge, Luqi:
Using an object oriented model for resolving representational differences between heterogeneous systems.
976-983
- Assem El-Ansary:
Behavioral Pattern Analysis: towards a new representation of systems requirements based on actions and events.
984-991
- Mahmoud O. Elish, David C. Rine, Joel E. Foreman:
Evaluating collaborative software in supporting organizational learning with Bayesian Networks.
992-996
- Fatma Dandashi:
A method for assessing the reusability of object-oriented code using a validated set of automated measurements.
997-1003
- Seok Won Lee:
Proxy Viewpoints Model-based Requirements engineering.
1004-1008
- Jan Jürjens:
A UML statecharts semantics with message-passing.
1009-1013
- Sergiu Dascalu, Peter Hitchcock:
An approach to integrating semi-formal and formal notations in software specification.
1014-1020
- María-del-Mar Gallardo, Jesús Martínez, Pedro Merino, Estefanía Rosales:
Using XML to implement abstraction for Model Checking.
1021-1025
- Jan Jürjens:
Using UMLsec and goal trees for secure systems development.
1026-1030
- Derek Lawson, Gerry Coleman:
Investigating software measures to improve product reliability.
1031-1035
- Rory O'Connor, Gerry Coleman:
Strategies for personal process improvement a comparison.
1036-1040
Standardization in IT
Virtual reality,
digital media,
and computer games
- Daniel Ballin, Ruth Aylett, Marc Cavazza:
Editorial message: special track on virtual reality, digital media, and computer games.
1058-1059
- Taku Komura, Atsushi Kuroda, Yoshihisa Shinagawa:
NiceMeetVR: facing professional baseball pitchers in the virtual batting cage.
1060-1065
- Marco Roccetti, Vittorio Ghini, Paola Salomoni, Alessandro Gambetti, Davide Melandri, Mirko Piaggesi, Daniela Salsi:
The structuring of a wireless internet application for a music-on-demand service on UMST devices.
1066-1073
- Kikuo Asai, Noritaka Osawa, Yuji Y. Sugimoto, Yoshiaki Tanaka:
Viewpoint motion control by body position in immersive projection display.
1074-1079
- Marc Cavazza, Fred Charles, Steven J. Mead:
Emergent situations in interactive storytelling.
1080-1085
Web and e-business application
- Sara Comai, Letizia Tanca:
Editorial message: special track on web and E-business applications.
1086-1087
- Sabrina De Capitani di Vimercati:
An authorization model for temporal XML documents.
1088-1093
- Petri Vuorimaa, Teemu Ropponen, Niklas von Knorring, Mikko Honkala:
A Java based XML browser for consumer devices.
1094-1099
- Ljiljana Stojanovic, Nenad Stojanovic, Raphael Volz:
Migrating data-intensive web sites into the Semantic Web.
1100-1107
- Valter Crescenzi, Giansalvatore Mecca, Paolo Merialdo:
Wrapping-oriented classification of web pages.
1108-1112
- Uwe Zdun:
Dynamically generating web application fragments from page templates.
1113-1120
- Volker Turau:
A framework for automatic generation of web-based data entry applications based on XML.
1121-1126
- Danilo Ardagna, Chiara Francalanci:
A cost-oriented methodology for the design of web based IT architectures.
1127-1133
- Mon-Yen Luo, Chu-Sing Yang, Chun-Wei Tseng:
Content management on server farm with layer-7 routing.
1134-1139
- Tadashi Nakano, Kaname Harumoto, Shinji Shimojo, Shojiro Nishio:
User adaptive content delivery mechanism on the world wide web.
1140-1146
- Min Wang, Xiaoyang Sean Wang:
Optimizing relational store for e-catalog queries: a data mining approach.
1147-1152
- Shonali Krishnaswamy, Seng Wai Loke, Arkady B. Zaslavsky:
Application run time estimation: a quality of service metric for web-based data mining services.
1153-1159
- Victoria Ungureanu:
An agreement centric access control mechanism for business to business e-commerce.
1160-1164
Copyright © Fri Mar 12 17:20:36 2010
by Michael Ley (ley@uni-trier.de)