callback( { "result":{ "query":":facetid:toc:\"db/conf/sac/sac2003.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"189.35" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"217", "@dc":"217", "@oc":"217", "@id":"43421933", "text":":facetid:toc:db/conf/sac/sac2003.bht" } }, "hits":{ "@total":"217", "@computed":"217", "@sent":"217", "@first":"0", "hit":[{ "@score":"1", "@id":"6202734", "info":{"authors":{"author":[{"@pid":"a/WilMPvanderAalst","text":"Wil M. P. van der Aalst"},{"@pid":"k/AkhilKumar","text":"Akhil Kumar 0001"},{"@pid":"v/HMWVerbeek","text":"H. M. W. Verbeek"}]},"title":"Organizational Modeling in UML and XML in the Context of Workflow Systems.","venue":"SAC","pages":"603-608","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/AalstKV03","doi":"10.1145/952532.952652","ee":"https://doi.org/10.1145/952532.952652","url":"https://dblp.org/rec/conf/sac/AalstKV03"}, "url":"URL#6202734" }, { "@score":"1", "@id":"6202735", "info":{"authors":{"author":[{"@pid":"31/1129","text":"Olfa Abdellatif-Kaddour"},{"@pid":"83/366","text":"Pascale Thévenod-Fosse"},{"@pid":"37/723","text":"Hélène Waeselynck"}]},"title":"Property-Oriented Testing: A Strategy for Exploring Dangerous Scenarios.","venue":"SAC","pages":"1128-1134","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/Abdellatif-KaddourTW03","doi":"10.1145/952532.952752","ee":"https://doi.org/10.1145/952532.952752","url":"https://dblp.org/rec/conf/sac/Abdellatif-KaddourTW03"}, "url":"URL#6202735" }, { "@score":"1", "@id":"6202736", "info":{"authors":{"author":[{"@pid":"97/4112","text":"Joerg Abendroth"},{"@pid":"j/ChristianDamsgaardJensen","text":"Christian Damsgaard Jensen"}]},"title":"A Unified Security Framework for Networked Applications.","venue":"SAC","pages":"351-357","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/AbendrothJ03","doi":"10.1145/952532.952602","ee":"https://doi.org/10.1145/952532.952602","url":"https://dblp.org/rec/conf/sac/AbendrothJ03"}, "url":"URL#6202736" }, { "@score":"1", "@id":"6202737", "info":{"authors":{"author":[{"@pid":"97/5673","text":"Sandeep Adwankar"},{"@pid":"19/5116","text":"Venu Vasudevan"}]},"title":"Mobile Agent based Pervasive Systems Manager for Enterprise Network.","venue":"SAC","pages":"886-892","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/AdwankarV03","doi":"10.1145/952532.952707","ee":"https://doi.org/10.1145/952532.952707","url":"https://dblp.org/rec/conf/sac/AdwankarV03"}, "url":"URL#6202737" }, { "@score":"1", "@id":"6202738", "info":{"authors":{"author":[{"@pid":"a/GailJoonAhn","text":"Gail-Joon Ahn"},{"@pid":"56/635","text":"Badrinath Mohan"}]},"title":"Role-Based Authorization in Decentralized Health Care Environments.","venue":"SAC","pages":"251-256","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/AhnM03","doi":"10.1145/952532.952584","ee":"https://doi.org/10.1145/952532.952584","url":"https://dblp.org/rec/conf/sac/AhnM03"}, "url":"URL#6202738" }, { "@score":"1", "@id":"6202739", "info":{"authors":{"author":[{"@pid":"18/3204","text":"Rachid Anane"},{"@pid":"04/3029","text":"Richard John Anthony"}]},"title":"Implementation of a Proactive Load Sharing Scheme.","venue":"SAC","pages":"1038-1045","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/AnaneA03","doi":"10.1145/952532.952735","ee":"https://doi.org/10.1145/952532.952735","url":"https://dblp.org/rec/conf/sac/AnaneA03"}, "url":"URL#6202739" }, { "@score":"1", "@id":"6202740", "info":{"authors":{"author":[{"@pid":"a/KRApt","text":"Krzysztof R. Apt"},{"@pid":"04/1098","text":"Sebastian Brand"}]},"title":"Schedulers for Rule-Based Constraint Programming.","venue":"SAC","pages":"14-21","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/AptB03","doi":"10.1145/952532.952537","ee":"https://doi.org/10.1145/952532.952537","url":"https://dblp.org/rec/conf/sac/AptB03"}, "url":"URL#6202740" }, { "@score":"1", "@id":"6202741", "info":{"authors":{"author":[{"@pid":"a/JAssfalg","text":"Jürgen Assfalg"},{"@pid":"70/1173-1","text":"Marco Bertini 0001"},{"@pid":"91/764","text":"Carlo Colombo"},{"@pid":"b/AlbertoDelBimbo","text":"Alberto Del Bimbo"},{"@pid":"92/3552","text":"Walter Nunziati"}]},"title":"Automatic Interpretation of Soccer Video for Highlights Extraction and Annotation.","venue":"SAC","pages":"769-773","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/AssfalgBCBN03","doi":"10.1145/952532.952684","ee":"https://doi.org/10.1145/952532.952684","url":"https://dblp.org/rec/conf/sac/AssfalgBCBN03"}, "url":"URL#6202741" }, { "@score":"1", "@id":"6202742", "info":{"authors":{"author":[{"@pid":"a/MikhailJAtallah","text":"Mikhail J. Atallah"},{"@pid":"l/StefanoLonardi","text":"Stefano Lonardi"}]},"title":"Authentication of LZ-77 Compressed Data.","venue":"SAC","pages":"282-287","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/AtallahL03","doi":"10.1145/952532.952591","ee":"https://doi.org/10.1145/952532.952591","url":"https://dblp.org/rec/conf/sac/AtallahL03"}, "url":"URL#6202742" }, { "@score":"1", "@id":"6202743", "info":{"authors":{"author":[{"@pid":"a/VAtluri","text":"Vijayalakshmi Atluri"},{"@pid":"a/NRAdam","text":"Nabil R. Adam"},{"@pid":"10/1146","text":"Ahmed Gomaa"},{"@pid":"81/1859","text":"Igg Adiwijaya"}]},"title":"Self-Manifestation of Composite Multimedia Objects to Satisfy Security Constraints.","venue":"SAC","pages":"927-934","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/AtluriAGA03","doi":"10.1145/952532.952715","ee":"https://doi.org/10.1145/952532.952715","url":"https://dblp.org/rec/conf/sac/AtluriAGA03"}, "url":"URL#6202743" }, { "@score":"1", "@id":"6202744", "info":{"authors":{"author":[{"@pid":"07/2657","text":"Enrico Augurusa"},{"@pid":"12/5322","text":"Daniele Braga"},{"@pid":"73/1805","text":"Alessandro Campi"},{"@pid":"c/StefanoCeri","text":"Stefano Ceri"}]},"title":"Design and Implementation of a Graphical Interface to Xquery.","venue":"SAC","pages":"1163-1167","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/AugurusaBCC03","doi":"10.1145/952532.952759","ee":"https://doi.org/10.1145/952532.952759","url":"https://dblp.org/rec/conf/sac/AugurusaBCC03"}, "url":"URL#6202744" }, { "@score":"1", "@id":"6202745", "info":{"authors":{"author":[{"@pid":"67/2472","text":"Andy Auyeung"},{"@pid":"95/934","text":"Iker Gondra"},{"@pid":"81/2772","text":"H. K. Dai 0001"}]},"title":"Multi-Heuristic List Scheduling Genetic Algorithms for Task Scheduling.","venue":"SAC","pages":"721-724","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/AuyeungGD03","doi":"10.1145/952532.952673","ee":"https://doi.org/10.1145/952532.952673","url":"https://dblp.org/rec/conf/sac/AuyeungGD03"}, "url":"URL#6202745" }, { "@score":"1", "@id":"6202746", "info":{"authors":{"author":[{"@pid":"15/6880","text":"Henri Avancini"},{"@pid":"88/6222","text":"Alberto Lavelli"},{"@pid":"09/1824","text":"Bernardo Magnini"},{"@pid":"s/FabrizioSebastiani","text":"Fabrizio Sebastiani 0001"},{"@pid":"95/6659","text":"Roberto Zanoli"}]},"title":"Expanding Domain-Specific Lexicons by Term Categorization.","venue":"SAC","pages":"793-797","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/AvanciniLMSZ03","doi":"10.1145/952532.952690","ee":"https://doi.org/10.1145/952532.952690","url":"https://dblp.org/rec/conf/sac/AvanciniLMSZ03"}, "url":"URL#6202746" }, { "@score":"1", "@id":"6202747", "info":{"authors":{"author":[{"@pid":"13/5210","text":"Stefania Bandini"},{"@pid":"62/3822","text":"Sara Manzoni"},{"@pid":"19/1650","text":"Giuseppe Vizzari"}]},"title":"A Multi-Agent System for Remote Psychological Profiling with Role Playing Games Based Tests.","venue":"SAC","pages":"33-37","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/BandiniMV03","doi":"10.1145/952532.952542","ee":"https://doi.org/10.1145/952532.952542","url":"https://dblp.org/rec/conf/sac/BandiniMV03"}, "url":"URL#6202747" }, { "@score":"1", "@id":"6202748", "info":{"authors":{"author":[{"@pid":"b/DBarbara","text":"Daniel Barbará"},{"@pid":"59/871","text":"Yi Li"},{"@pid":"33/6524","text":"Jia-Ling Lin"},{"@pid":"j/SushilJajodia","text":"Sushil Jajodia"},{"@pid":"c/JuliaCouto","text":"Julia Couto 0001"}]},"title":"Bootstrapping a Data Mining Intrusion Detection System.","venue":"SAC","pages":"421-425","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/BarbaraLLJC03","doi":"10.1145/952532.952616","ee":"https://doi.org/10.1145/952532.952616","url":"https://dblp.org/rec/conf/sac/BarbaraLLJC03"}, "url":"URL#6202748" }, { "@score":"1", "@id":"6202749", "info":{"authors":{"author":[{"@pid":"59/3452","text":"Andrew Beatty"},{"@pid":"59/989","text":"Kevin Casey"},{"@pid":"g/DavidGregg","text":"David Gregg"},{"@pid":"n/ANisbet","text":"Andrew Nisbet"}]},"title":"An Optimized Java Interpreter for Connected Devices and Embedded Systems.","venue":"SAC","pages":"692-697","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/BeattyCGN03","doi":"10.1145/952532.952667","ee":"https://doi.org/10.1145/952532.952667","url":"https://dblp.org/rec/conf/sac/BeattyCGN03"}, "url":"URL#6202749" }, { "@score":"1", "@id":"6202750", "info":{"authors":{"author":[{"@pid":"36/4642","text":"Alessio Bechini"},{"@pid":"76/1399","text":"Cosimo Antonio Prete"}]},"title":"Embedded Systems Track Editorial.","venue":"SAC","pages":"659-660","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/BechiniP03","doi":"10.1145/952532.952661","ee":"https://doi.org/10.1145/952532.952661","url":"https://dblp.org/rec/conf/sac/BechiniP03"}, "url":"URL#6202750" }, { "@score":"1", "@id":"6202751", "info":{"authors":{"author":[{"@pid":"20/3078","text":"Steven M. Beitzel"},{"@pid":"69/6635","text":"Eric C. Jensen"},{"@pid":"14/3331","text":"Abdur Chowdhury"},{"@pid":"f/OphirFrieder","text":"Ophir Frieder"},{"@pid":"g/DavidAGrossman","text":"David A. Grossman"},{"@pid":"46/4886","text":"Nazli Goharian"}]},"title":"Disproving the Fusion Hypothesis: An Analysis of Data Fusion via Effective Information Retrieval Strategies.","venue":"SAC","pages":"823-827","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/BeitzelJCFGG03","doi":"10.1145/952532.952695","ee":"https://doi.org/10.1145/952532.952695","url":"https://dblp.org/rec/conf/sac/BeitzelJCFGG03"}, "url":"URL#6202751" }, { "@score":"1", "@id":"6202752", "info":{"authors":{"author":{"@pid":"93/3317","text":"Giampaolo Bella"}},"title":"Availability of Protocol Goals.","venue":"SAC","pages":"312-317","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/Bella03","doi":"10.1145/952532.952596","ee":"https://doi.org/10.1145/952532.952596","url":"https://dblp.org/rec/conf/sac/Bella03"}, "url":"URL#6202752" }, { "@score":"1", "@id":"6202753", "info":{"authors":{"author":[{"@pid":"93/3317","text":"Giampaolo Bella"},{"@pid":"10/6227","text":"Ronaldo Menezes"}]},"title":"Computer Security Track Editorial.","venue":"SAC","pages":"280-281","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/BellaM03","doi":"10.1145/952532.952590","ee":"https://doi.org/10.1145/952532.952590","url":"https://dblp.org/rec/conf/sac/BellaM03"}, "url":"URL#6202753" }, { "@score":"1", "@id":"6202754", "info":{"authors":{"author":[{"@pid":"91/5898","text":"Bernhard P. Bettig"},{"@pid":"32/1202","text":"C. Sandu"},{"@pid":"j/AnupamJoshi","text":"Anupam Joshi"},{"@pid":"99/261","text":"K. Birru"}]},"title":"Dynamic Solver Selection for an Internet Simulation Backbone.","venue":"SAC","pages":"153-160","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/BettigSJB03","doi":"10.1145/952532.952566","ee":"https://doi.org/10.1145/952532.952566","url":"https://dblp.org/rec/conf/sac/BettigSJB03"}, "url":"URL#6202754" }, { "@score":"1", "@id":"6202755", "info":{"authors":{"author":{"@pid":"b/MBrianBlake","text":"M. Brian Blake"}},"title":"An Architecture to Support Distributed Data Retrieval in Specialized Formats.","venue":"SAC","pages":"803-810","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/Blake03","doi":"10.1145/952532.952692","ee":"https://doi.org/10.1145/952532.952692","url":"https://dblp.org/rec/conf/sac/Blake03"}, "url":"URL#6202755" }, { "@score":"1", "@id":"6202756", "info":{"authors":{"author":[{"@pid":"b/PBodorik","text":"Peter Bodorik"},{"@pid":"25/5927","text":"Dawn N. Jutla"}]},"title":"Architecture for User-Controlled e-Privacy.","venue":"SAC","pages":"609-616","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/BodorikJ03","doi":"10.1145/952532.952653","ee":"https://doi.org/10.1145/952532.952653","url":"https://dblp.org/rec/conf/sac/BodorikJ03"}, "url":"URL#6202756" }, { "@score":"1", "@id":"6202757", "info":{"authors":{"author":[{"@pid":"b/EgonBorger","text":"Egon Börger"},{"@pid":"60/2903","text":"Elvinia Riccobene"},{"@pid":"54/5948","text":"Alessandra Cavarra"}]},"title":"Modeling the Meaning of Transitions from and to Concurrent States in UML State Machines.","venue":"SAC","pages":"1086-1091","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/BorgerRC03","doi":"10.1145/952532.952745","ee":"https://doi.org/10.1145/952532.952745","url":"https://dblp.org/rec/conf/sac/BorgerRC03"}, "url":"URL#6202757" }, { "@score":"1", "@id":"6202758", "info":{"authors":{"author":[{"@pid":"12/5322","text":"Daniele Braga"},{"@pid":"73/1805","text":"Alessandro Campi"},{"@pid":"c/StefanoCeri","text":"Stefano Ceri"},{"@pid":"k/MikaKlemettinen","text":"Mika Klemettinen"},{"@pid":"l/PierLucaLanzi","text":"Pier Luca Lanzi"}]},"title":"Discovering Interesting Information in XML Data with Association Rules.","venue":"SAC","pages":"450-454","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/BragaCCKL03","doi":"10.1145/952532.952621","ee":"https://doi.org/10.1145/952532.952621","url":"https://dblp.org/rec/conf/sac/BragaCCKL03"}, "url":"URL#6202758" }, { "@score":"1", "@id":"6202759", "info":{"authors":{"author":[{"@pid":"b/SviatoslavBraynov","text":"Sviatoslav B. Braynov"},{"@pid":"79/5768","text":"Peter R. Wurman"}]},"title":"Electronic Commerce Technologies Track Editorial.","venue":"SAC","pages":"580-581","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/BraynovW03","doi":"10.1145/952532.952648","ee":"https://doi.org/10.1145/952532.952648","url":"https://dblp.org/rec/conf/sac/BraynovW03"}, "url":"URL#6202759" }, { "@score":"1", "@id":"6202760", "info":{"authors":{"author":[{"@pid":"11/4932","text":"Frances M. T. Brazier"},{"@pid":"58/2232","text":"David G. A. Mobach"},{"@pid":"17/3496","text":"Benno J. Overeinder"},{"@pid":"32/4395","text":"Niek J. E. Wijngaards"}]},"title":"Managing Agent Life Cycles in Open Distributed Systems.","venue":"SAC","pages":"61-65","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/BrazierMOW03","doi":"10.1145/952532.952547","ee":"https://doi.org/10.1145/952532.952547","url":"https://dblp.org/rec/conf/sac/BrazierMOW03"}, "url":"URL#6202760" }, { "@score":"1", "@id":"6202761", "info":{"authors":{"author":[{"@pid":"07/983","text":"Marcus R. Breese"},{"@pid":"27/1221","text":"Matthew J. Stephens"},{"@pid":"47/6414","text":"Jeanette N. McClintick"},{"@pid":"01/2660","text":"Matthew W. Grow"},{"@pid":"95/107","text":"Howard J. Edenberg"}]},"title":"Labrat LIMS: An Extensible Framework for Developing Laboratory Information Management, Analysis, and Bioinformatics Solutions for Microarrays.","venue":"SAC","pages":"103-108","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/BreeseSMGE03","doi":"10.1145/952532.952556","ee":"https://doi.org/10.1145/952532.952556","url":"https://dblp.org/rec/conf/sac/BreeseSMGE03"}, "url":"URL#6202761" }, { "@score":"1", "@id":"6202762", "info":{"authors":{"author":[{"@pid":"20/6091","text":"Ciarán Bryce"},{"@pid":"17/2401","text":"Michael Pawlack"},{"@pid":"35/4021","text":"Karsten Tolle"},{"@pid":"09/4986","text":"Peter Werner"},{"@pid":"z/RZicari","text":"Roberto V. Zicari"}]},"title":"Agent-Based Services for Information Portals.","venue":"SAC","pages":"1191-1198","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/BrycePTWZ03","doi":"10.1145/952532.952764","ee":"https://doi.org/10.1145/952532.952764","url":"https://dblp.org/rec/conf/sac/BrycePTWZ03"}, "url":"URL#6202762" }, { "@score":"1", "@id":"6202763", "info":{"authors":{"author":[{"@pid":"88/5660","text":"H. Martin Bücker"},{"@pid":"34/940","text":"Bruno Lang"},{"@pid":"14/3469","text":"Arno Rasch"},{"@pid":"b/ChristianHBischof","text":"Christian H. Bischof"}]},"title":"Automatic Parallelism in Differentiation of Fourier Transforms.","venue":"SAC","pages":"148-152","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/BuckerLRB03","doi":"10.1145/952532.952565","ee":"https://doi.org/10.1145/952532.952565","url":"https://dblp.org/rec/conf/sac/BuckerLRB03"}, "url":"URL#6202763" }, { "@score":"1", "@id":"6202764", "info":{"authors":{"author":[{"@pid":"b/NadiaBusi","text":"Nadia Busi"},{"@pid":"37/5230","text":"Cristian Manfredini"},{"@pid":"m/AlbertoMontresor","text":"Alberto Montresor"},{"@pid":"32/1979","text":"Gianluigi Zavattaro"}]},"title":"PeerSpaces: Data-driven Coordination in Peer-to-Peer Networks.","venue":"SAC","pages":"380-386","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/BusiMMZ03","doi":"10.1145/952532.952608","ee":"https://doi.org/10.1145/952532.952608","url":"https://dblp.org/rec/conf/sac/BusiMMZ03"}, "url":"URL#6202764" }, { "@score":"1", "@id":"6202765", "info":{"authors":{"author":[{"@pid":"51/5960","text":"Giacomo Cabri"},{"@pid":"65/6372-2","text":"Luca Ferrari 0002"},{"@pid":"10/6872","text":"Letizia Leonardi"}]},"title":"Enabling Mobile Agents to Dynamically Assume Roles.","venue":"SAC","pages":"56-60","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/CabriFL03","doi":"10.1145/952532.952546","ee":"https://doi.org/10.1145/952532.952546","url":"https://dblp.org/rec/conf/sac/CabriFL03"}, "url":"URL#6202765" }, { "@score":"1", "@id":"6202766", "info":{"authors":{"author":[{"@pid":"39/4586","text":"Tolga Can"},{"@pid":"59/4472","text":"Yujun Wang"},{"@pid":"13/6125","text":"Yuan-Fang Wang"},{"@pid":"s/JWSu","text":"Jianwen Su"}]},"title":"FPV: Fast Protein Visualization Using Java 3D.","venue":"SAC","pages":"88-95","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/CanWWS03","doi":"10.1145/952532.952554","ee":"https://doi.org/10.1145/952532.952554","url":"https://dblp.org/rec/conf/sac/CanWWS03"}, "url":"URL#6202766" }, { "@score":"1", "@id":"6202767", "info":{"authors":{"author":[{"@pid":"84/378","text":"Alessio Carlini"},{"@pid":"79/666","text":"Giorgio C. Buttazzo"}]},"title":"An Efficient Time Representation for Real-Time Embedded Systems.","venue":"SAC","pages":"705-712","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/CarliniB03","doi":"10.1145/952532.952669","ee":"https://doi.org/10.1145/952532.952669","url":"https://dblp.org/rec/conf/sac/CarliniB03"}, "url":"URL#6202767" }, { "@score":"1", "@id":"6202768", "info":{"authors":{"author":[{"@pid":"c/SvenCasteleyn","text":"Sven Casteleyn"},{"@pid":"57/2745","text":"Olga De Troyer"},{"@pid":"40/5663","text":"Saar Brockmans"}]},"title":"Design Time Support for Adaptive Behavior in Web Sites.","venue":"SAC","pages":"1222-1228","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/CasteleynTB03","doi":"10.1145/952532.952769","ee":"https://doi.org/10.1145/952532.952769","url":"https://dblp.org/rec/conf/sac/CasteleynTB03"}, "url":"URL#6202768" }, { "@score":"1", "@id":"6202769", "info":{"authors":{"author":[{"@pid":"c/UmitVCatalyurek","text":"Ümit V. Çatalyürek"},{"@pid":"47/5126","text":"Mike Gray"},{"@pid":"26/6088","text":"Tahsin M. Kurç"},{"@pid":"s/JoelHSaltz","text":"Joel H. Saltz"},{"@pid":"73/5650","text":"Eric Stahlberg"},{"@pid":"f/RACFerreira","text":"Renato Ferreira 0001"}]},"title":"A Component-based Implementation of Multiple Sequence Alignment.","venue":"SAC","pages":"122-126","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/CatalyurekGKSSF03","doi":"10.1145/952532.952559","ee":"https://doi.org/10.1145/952532.952559","url":"https://dblp.org/rec/conf/sac/CatalyurekGKSSF03"}, "url":"URL#6202769" }, { "@score":"1", "@id":"6202770", "info":{"authors":{"author":[{"@pid":"70/1591","text":"Joseph A. Cazier"},{"@pid":"10/2378","text":"Benjamin B. M. Shao"},{"@pid":"62/5256","text":"Robert St. Louis"}]},"title":"Addressing E-Business Privacy Concerns: The Roles of Trust and Value Compatibility.","venue":"SAC","pages":"617-622","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/CazierSL03","doi":"10.1145/952532.952654","ee":"https://doi.org/10.1145/952532.952654","url":"https://dblp.org/rec/conf/sac/CazierSL03"}, "url":"URL#6202770" }, { "@score":"1", "@id":"6202771", "info":{"authors":{"author":{"@pid":"79/628","text":"Patricia B. Cerrito"}},"title":"Data Visualization Using Kernel Density Estimation to Examine Patterns of Physician Practice.","venue":"SAC","pages":"275-279","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/Cerrito03","doi":"10.1145/952532.952588","ee":"https://doi.org/10.1145/952532.952588","url":"https://dblp.org/rec/conf/sac/Cerrito03"}, "url":"URL#6202771" }, { "@score":"1", "@id":"6202772", "info":{"authors":{"author":[{"@pid":"c/SChakravarthy","text":"Sharma Chakravarthy"},{"@pid":"90/355","text":"Hongen Zhang"}]},"title":"Visualization of Association Rules Over Relational DBMSs.","venue":"SAC","pages":"922-926","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/ChakravarthyZ03","doi":"10.1145/952532.952714","ee":"https://doi.org/10.1145/952532.952714","url":"https://dblp.org/rec/conf/sac/ChakravarthyZ03"}, "url":"URL#6202772" }, { "@score":"1", "@id":"6202773", "info":{"authors":{"author":{"@pid":"42/10459","text":"Alvin T. S. Chan"}},"title":"Integrating Smart Card Access to Web-Based Medical Information System.","venue":"SAC","pages":"246-250","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/Chan03","doi":"10.1145/952532.952583","ee":"https://doi.org/10.1145/952532.952583","url":"https://dblp.org/rec/conf/sac/Chan03"}, "url":"URL#6202773" }, { "@score":"1", "@id":"6202774", "info":{"authors":{"author":[{"@pid":"42/10459","text":"Alvin T. S. Chan"},{"@pid":"l/HongVaLeong","text":"Hong Va Leong"},{"@pid":"82/5496","text":"Joseph Chan"},{"@pid":"85/2690","text":"Alan Hon"},{"@pid":"07/2480","text":"Larry Lau"},{"@pid":"80/2830","text":"Leo Li"}]},"title":"Bluepoint: A Bluetooth-based Architecture for Location-Positioning Services.","venue":"SAC","pages":"990-995","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/ChanLCHLL03","doi":"10.1145/952532.952727","ee":"https://doi.org/10.1145/952532.952727","url":"https://dblp.org/rec/conf/sac/ChanLCHLL03"}, "url":"URL#6202774" }, { "@score":"1", "@id":"6202775", "info":{"authors":{"author":[{"@pid":"70/1026","text":"Sharat Chandran"},{"@pid":"07/4945","text":"Naga Kiran"}]},"title":"Image Retrieval With Embedded Region Relationships.","venue":"SAC","pages":"760-764","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/ChandranK03","doi":"10.1145/952532.952682","ee":"https://doi.org/10.1145/952532.952682","url":"https://dblp.org/rec/conf/sac/ChandranK03"}, "url":"URL#6202775" }, { "@score":"1", "@id":"6202776", "info":{"authors":{"author":[{"@pid":"12/2019","text":"Jake Yue Chen"},{"@pid":"c/JohnVCarlis","text":"John V. Carlis"}]},"title":"Similar_Join: Extending DBMS with a Bio-specific Operator.","venue":"SAC","pages":"109-114","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/ChenC03","doi":"10.1145/952532.952557","ee":"https://doi.org/10.1145/952532.952557","url":"https://dblp.org/rec/conf/sac/ChenC03"}, "url":"URL#6202776" }, { "@score":"1", "@id":"6202777", "info":{"authors":{"author":[{"@pid":"32/4592","text":"Keke Chen"},{"@pid":"l/LingLiu","text":"Ling Liu 0001"}]},"title":"Cluster Rendering of Skewed Datasets via Visualization.","venue":"SAC","pages":"909-916","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/ChenL03","doi":"10.1145/952532.952712","ee":"https://doi.org/10.1145/952532.952712","url":"https://dblp.org/rec/conf/sac/ChenL03"}, "url":"URL#6202777" }, { "@score":"1", "@id":"6202778", "info":{"authors":{"author":[{"@pid":"95/3696","text":"Wei-Chou Chen"},{"@pid":"03/1520","text":"Ming-Chun Yang"},{"@pid":"67/4408","text":"Shian-Shyong Tseng"}]},"title":"The Bitmap-based Feature Selection Method.","venue":"SAC","pages":"465-469","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/ChenYT03","doi":"10.1145/952532.952624","ee":"https://doi.org/10.1145/952532.952624","url":"https://dblp.org/rec/conf/sac/ChenYT03"}, "url":"URL#6202778" }, { "@score":"1", "@id":"6202779", "info":{"authors":{"author":[{"@pid":"56/1927","text":"Elaine Cheong"},{"@pid":"87/2227","text":"Judith Liebman"},{"@pid":"03/2134-1","text":"Jie Liu 0001"},{"@pid":"z/FengZhao","text":"Feng Zhao 0001"}]},"title":"TinyGALS: A Programming Model for Event-Driven Embedded Systems.","venue":"SAC","pages":"698-704","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/CheongLLZ03","doi":"10.1145/952532.952668","ee":"https://doi.org/10.1145/952532.952668","url":"https://dblp.org/rec/conf/sac/CheongLLZ03"}, "url":"URL#6202779" }, { "@score":"1", "@id":"6202780", "info":{"authors":{"author":[{"@pid":"56/2929","text":"Joseph E. Coffland"},{"@pid":"p/AndyDPimentel","text":"Andy D. Pimentel"}]},"title":"A Software Framework for Efficient System-level Performance Evaluation of Embedded Systems.","venue":"SAC","pages":"666-671","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/CofflandP03","doi":"10.1145/952532.952663","ee":"https://doi.org/10.1145/952532.952663","url":"https://dblp.org/rec/conf/sac/CofflandP03"}, "url":"URL#6202780" }, { "@score":"1", "@id":"6202781", "info":{"authors":{"author":[{"@pid":"43/893","text":"Malcolm Cohen"},{"@pid":"n/UweNaumann","text":"Uwe Naumann"},{"@pid":"65/3561","text":"Jan Riehme"}]},"title":"Towards Differentiation-Enabled FORTRAN 95 Compiler Technology.","venue":"SAC","pages":"143-147","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/CohenNR03","doi":"10.1145/952532.952564","ee":"https://doi.org/10.1145/952532.952564","url":"https://dblp.org/rec/conf/sac/CohenNR03"}, "url":"URL#6202781" }, { "@score":"1", "@id":"6202782", "info":{"authors":{"author":[{"@pid":"59/3346","text":"Sara Comai"},{"@pid":"d/MarlonDumas","text":"Marlon Dumas"},{"@pid":"47/1654","text":"Maristella Matera"}]},"title":"Web Technologies and Applications Track Editorial.","venue":"SAC","pages":"1155-1156","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/ComaiDM03","doi":"10.1145/952532.952757","ee":"https://doi.org/10.1145/952532.952757","url":"https://dblp.org/rec/conf/sac/ComaiDM03"}, "url":"URL#6202782" }, { "@score":"1", "@id":"6202783", "info":{"authors":{"author":[{"@pid":"59/2777","text":"Fulvio Corno"},{"@pid":"96/3737","text":"Gianluca Cumani"},{"@pid":"r/MatteoSonzaReorda","text":"Matteo Sonza Reorda"},{"@pid":"80/276","text":"Giovanni Squillero"}]},"title":"Automatic Test Program Generation for Pipeline Processors.","venue":"SAC","pages":"736-740","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/CornoCRS03","doi":"10.1145/952532.952676","ee":"https://doi.org/10.1145/952532.952676","url":"https://dblp.org/rec/conf/sac/CornoCRS03"}, "url":"URL#6202783" }, { "@score":"1", "@id":"6202784", "info":{"authors":{"author":[{"@pid":"c/FabioCrestani","text":"Fabio Crestani"},{"@pid":"26/4672","text":"Gabriella Pasi"}]},"title":"Information Access and Retrieval Track Editorial.","venue":"SAC","pages":"782-783","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/CrestaniP03","doi":"10.1145/952532.952687","ee":"https://doi.org/10.1145/952532.952687","url":"https://dblp.org/rec/conf/sac/CrestaniP03"}, "url":"URL#6202784" }, { "@score":"1", "@id":"6202785", "info":{"authors":{"author":[{"@pid":"80/1045","text":"Amitava Datta"},{"@pid":"15/1921","text":"Subbiah Soundaralakshmi"}]},"title":"A Simple and Energy-Efficient Routing Protocol for Radio Networks.","venue":"SAC","pages":"1014-1018","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/DattaS03","doi":"10.1145/952532.952731","ee":"https://doi.org/10.1145/952532.952731","url":"https://dblp.org/rec/conf/sac/DattaS03"}, "url":"URL#6202785" }, { "@score":"1", "@id":"6202786", "info":{"authors":{"author":[{"@pid":"66/4336","text":"Jim Davies"},{"@pid":"39/6412","text":"Charles Crichton"},{"@pid":"54/5948","text":"Alessandra Cavarra"}]},"title":"A Method for the Automatic Generation of Test Suites from Object Models.","venue":"SAC","pages":"1104-1109","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/DaviesCC03","doi":"10.1145/952532.952748","ee":"https://doi.org/10.1145/952532.952748","url":"https://dblp.org/rec/conf/sac/DaviesCC03"}, "url":"URL#6202786" }, { "@score":"1", "@id":"6202787", "info":{"authors":{"author":[{"@pid":"16/6993","text":"Franca Debole"},{"@pid":"s/FabrizioSebastiani","text":"Fabrizio Sebastiani 0001"}]},"title":"Supervised Term Weighting for Automated Text Categorization.","venue":"SAC","pages":"784-788","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/DeboleS03","doi":"10.1145/952532.952688","ee":"https://doi.org/10.1145/952532.952688","url":"https://dblp.org/rec/conf/sac/DeboleS03"}, "url":"URL#6202787" }, { "@score":"1", "@id":"6202788", "info":{"authors":{"author":[{"@pid":"41/1063","text":"Annick Dhooge"},{"@pid":"13/712","text":"Willy Govaerts"},{"@pid":"30/851","text":"Yuri A. Kuznetsov"},{"@pid":"65/6352","text":"W. Mestrom"},{"@pid":"23/1454","text":"A. M. Riet"}]},"title":"Cl_matcont: A Continuation Toolbox in Matlab.","venue":"SAC","pages":"161-166","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/DhoogeGKMR03","doi":"10.1145/952532.952567","ee":"https://doi.org/10.1145/952532.952567","url":"https://dblp.org/rec/conf/sac/DhoogeGKMR03"}, "url":"URL#6202788" }, { "@score":"1", "@id":"6202789", "info":{"authors":{"author":{"@pid":"85/1692","text":"Jing Dong"}},"title":"Representing the Applications and Compositions of Design Patterns in UML.","venue":"SAC","pages":"1092-1098","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/Dong03","doi":"10.1145/952532.952746","ee":"https://doi.org/10.1145/952532.952746","url":"https://dblp.org/rec/conf/sac/Dong03"}, "url":"URL#6202789" }, { "@score":"1", "@id":"6202790", "info":{"authors":{"author":[{"@pid":"28/3107","text":"Zhong-Hui Duan"},{"@pid":"60/2794","text":"Robert Krasny"}]},"title":"A Treecode Algorithm for Computing Ewald Summation of Dipolar Systems.","venue":"SAC","pages":"172-177","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/DuanK03","doi":"10.1145/952532.952569","ee":"https://doi.org/10.1145/952532.952569","url":"https://dblp.org/rec/conf/sac/DuanK03"}, "url":"URL#6202790" }, { "@score":"1", "@id":"6202791", "info":{"authors":{"author":[{"@pid":"50/63","text":"Lavinia Egidi"},{"@pid":"32/6983","text":"Maurizio Melato"}]},"title":"Authentication and Access Delegation with User-Released Certificates.","venue":"SAC","pages":"288-293","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/EgidiM03","doi":"10.1145/952532.952592","ee":"https://doi.org/10.1145/952532.952592","url":"https://dblp.org/rec/conf/sac/EgidiM03"}, "url":"URL#6202791" }, { "@score":"1", "@id":"6202792", "info":{"authors":{"author":[{"@pid":"e/MarcEhrig","text":"Marc Ehrig"},{"@pid":"34/590","text":"Alexander Maedche"}]},"title":"Ontology-Focused Crawling of Web Documents.","venue":"SAC","pages":"1174-1178","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/EhrigM03","doi":"10.1145/952532.952761","ee":"https://doi.org/10.1145/952532.952761","url":"https://dblp.org/rec/conf/sac/EhrigM03"}, "url":"URL#6202792" }, { "@score":"1", "@id":"6202793", "info":{"authors":{"author":[{"@pid":"v/RobertAvanEngelen","text":"Robert van Engelen"},{"@pid":"21/3587","text":"Turgay Korkmaz"},{"@pid":"24/4627","text":"Nectarios Koziris"},{"@pid":"41/959","text":"Kleanthis Psarris"}]},"title":"Parallel and Distributed Systems and Networking Track Editorial.","venue":"SAC","pages":"983-984","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/EngelenKKP03","doi":"10.1145/952532.952725","ee":"https://doi.org/10.1145/952532.952725","url":"https://dblp.org/rec/conf/sac/EngelenKKP03"}, "url":"URL#6202793" }, { "@score":"1", "@id":"6202794", "info":{"authors":{"author":[{"@pid":"v/RobertAvanEngelen","text":"Robert van Engelen"},{"@pid":"83/6922","text":"David B. Whalley"},{"@pid":"78/713-1","text":"Xin Yuan 0001"}]},"title":"Validation of Code-Improving Transformations for Embedded Systems.","venue":"SAC","pages":"684-691","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/EngelenWY03","doi":"10.1145/952532.952666","ee":"https://doi.org/10.1145/952532.952666","url":"https://dblp.org/rec/conf/sac/EngelenWY03"}, "url":"URL#6202794" }, { "@score":"1", "@id":"6202795", "info":{"authors":{"author":[{"@pid":"57/661","text":"Brian Fenicle"},{"@pid":"19/1176","text":"Tim Wahls"}]},"title":"A Methodology to Provide and Use Interchangeable Services.","venue":"SAC","pages":"1140-1146","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/FenicleW03","doi":"10.1145/952532.952754","ee":"https://doi.org/10.1145/952532.952754","url":"https://dblp.org/rec/conf/sac/FenicleW03"}, "url":"URL#6202795" }, { "@score":"1", "@id":"6202796", "info":{"authors":{"author":[{"@pid":"91/4494-1","text":"Javier Fernández 0001"},{"@pid":"c/JCarretero","text":"Jesús Carretero 0001"},{"@pid":"c/FelixGarciaCarballeira","text":"Félix García 0002"},{"@pid":"83/5634","text":"José María Pérez"},{"@pid":"34/5911-1","text":"Alejandro Calderón 0001"}]},"title":"A New Cache Management Algorithm for Multimedia Storage Systems.","venue":"SAC","pages":"956-960","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/FernandezCGPC03","doi":"10.1145/952532.952719","ee":"https://doi.org/10.1145/952532.952719","url":"https://dblp.org/rec/conf/sac/FernandezCGPC03"}, "url":"URL#6202796" }, { "@score":"1", "@id":"6202797", "info":{"authors":{"author":[{"@pid":"48/4280","text":"Francisco J. Ferrer-Troyano"},{"@pid":"a/JesusSAguilarRuiz","text":"Jesús S. Aguilar-Ruiz"},{"@pid":"s/JCRiquelmeSantos","text":"José Cristóbal Riquelme Santos"}]},"title":"Prototype-based Mining of Numeric Data Streams.","venue":"SAC","pages":"480-484","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/Ferrer-TroyanoAS03","doi":"10.1145/952532.952627","ee":"https://doi.org/10.1145/952532.952627","url":"https://dblp.org/rec/conf/sac/Ferrer-TroyanoAS03"}, "url":"URL#6202797" }, { "@score":"1", "@id":"6202798", "info":{"authors":{"author":[{"@pid":"f/TorstenFink","text":"Torsten Fink"},{"@pid":"26/2064","text":"Karsten Otto"}]},"title":"An Extensible Architecture-based Framework for Coordination Languages.","venue":"SAC","pages":"402-406","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/FinkO03","doi":"10.1145/952532.952611","ee":"https://doi.org/10.1145/952532.952611","url":"https://dblp.org/rec/conf/sac/FinkO03"}, "url":"URL#6202798" }, { "@score":"1", "@id":"6202799", "info":{"authors":{"author":[{"@pid":"39/4073","text":"Nicoletta De Francesco"},{"@pid":"30/3349","text":"Marinella Petrocchi"}]},"title":"Authenticity in a Reliable Protocol for Mobile Computing.","venue":"SAC","pages":"318-324","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/FrancescoP03","doi":"10.1145/952532.952597","ee":"https://doi.org/10.1145/952532.952597","url":"https://dblp.org/rec/conf/sac/FrancescoP03"}, "url":"URL#6202799" }, { "@score":"1", "@id":"6202800", "info":{"authors":{"author":[{"@pid":"96/4064","text":"Enrico Frumento"},{"@pid":"67/5167","text":"Enrico Bianchin"},{"@pid":"95/4186","text":"Lorenzo Guerriero"}]},"title":"Echo-Cardiography on the Web: Design and Set-Up of a Virtual Community of Experts.","venue":"SAC","pages":"240-245","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/FrumentoBG03","doi":"10.1145/952532.952582","ee":"https://doi.org/10.1145/952532.952582","url":"https://dblp.org/rec/conf/sac/FrumentoBG03"}, "url":"URL#6202800" }, { "@score":"1", "@id":"6202801", "info":{"authors":{"author":[{"@pid":"61/3229","text":"Bin Fu"},{"@pid":"t/ZahirTari","text":"Zahir Tari"}]},"title":"A Dynamic Load Distribution Strategy for Systems Under High Task Variation and Heavy Traffic.","venue":"SAC","pages":"1031-1037","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/FuT03","doi":"10.1145/952532.952734","ee":"https://doi.org/10.1145/952532.952734","url":"https://dblp.org/rec/conf/sac/FuT03"}, "url":"URL#6202801" }, { "@score":"1", "@id":"6202802", "info":{"authors":{"author":[{"@pid":"f/BorkoFurht","text":"Borko Furht"},{"@pid":"10/3618","text":"Ken Gustafson"},{"@pid":"21/5751","text":"Hesong Huang"},{"@pid":"50/5802","text":"Oge Marques"}]},"title":"An Adaptive Three-Dimensional DCT Compression Based on Motion Analysis.","venue":"SAC","pages":"765-768","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/FurhtGHM03","doi":"10.1145/952532.952683","ee":"https://doi.org/10.1145/952532.952683","url":"https://dblp.org/rec/conf/sac/FurhtGHM03"}, "url":"URL#6202802" }, { "@score":"1", "@id":"6202803", "info":{"authors":{"author":[{"@pid":"f/BorkoFurht","text":"Borko Furht"},{"@pid":"50/5802","text":"Oge Marques"}]},"title":"Image and Video Databases Track Editorial.","venue":"SAC","pages":"759","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/FurhtM03","doi":"10.1145/952532.952681","ee":"https://doi.org/10.1145/952532.952681","url":"https://dblp.org/rec/conf/sac/FurhtM03"}, "url":"URL#6202803" }, { "@score":"1", "@id":"6202804", "info":{"authors":{"author":[{"@pid":"08/179","text":"Blaise Gassend"},{"@pid":"87/5989","text":"Dwaine E. Clarke"},{"@pid":"32/1399","text":"Marten van Dijk"},{"@pid":"14/3973","text":"Srinivas Devadas"}]},"title":"Delay-Based Circuit Authentication and Applications.","venue":"SAC","pages":"294-301","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/GassendCDD03","doi":"10.1145/952532.952593","ee":"https://doi.org/10.1145/952532.952593","url":"https://dblp.org/rec/conf/sac/GassendCDD03"}, "url":"URL#6202804" }, { "@score":"1", "@id":"6202805", "info":{"authors":{"author":{"@pid":"47/3697","text":"Kevin R. Gee"}},"title":"Using Latent Semantic Indexing to Filter Spam.","venue":"SAC","pages":"460-464","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/Gee03","doi":"10.1145/952532.952623","ee":"https://doi.org/10.1145/952532.952623","url":"https://dblp.org/rec/conf/sac/Gee03"}, "url":"URL#6202805" }, { "@score":"1", "@id":"6202806", "info":{"authors":{"author":[{"@pid":"91/4507","text":"Boby George"},{"@pid":"w/LaurieAWilliams","text":"Laurie A. Williams"}]},"title":"An Initial Investigation of Test Driven Development in Industry.","venue":"SAC","pages":"1135-1139","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/GeorgeW03","doi":"10.1145/952532.952753","ee":"https://doi.org/10.1145/952532.952753","url":"https://dblp.org/rec/conf/sac/GeorgeW03"}, "url":"URL#6202806" }, { "@score":"1", "@id":"6202807", "info":{"authors":{"author":[{"@pid":"63/1816","text":"Christos Georgousopoulos"},{"@pid":"r/OmerFRana","text":"Omer F. Rana"}]},"title":"Combining State and Model-based Approaches for Mobile Agent Load Balancing.","venue":"SAC","pages":"878-885","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/GeorgousopoulosR03","doi":"10.1145/952532.952706","ee":"https://doi.org/10.1145/952532.952706","url":"https://dblp.org/rec/conf/sac/GeorgousopoulosR03"}, "url":"URL#6202807" }, { "@score":"1", "@id":"6202808", "info":{"authors":{"author":[{"@pid":"31/1583","text":"Daniela Giorgetti"},{"@pid":"s/FabrizioSebastiani","text":"Fabrizio Sebastiani 0001"}]},"title":"Multiclass Text Categorization for Automated Survey Coding.","venue":"SAC","pages":"798-802","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/GiorgettiS03","doi":"10.1145/952532.952691","ee":"https://doi.org/10.1145/952532.952691","url":"https://dblp.org/rec/conf/sac/GiorgettiS03"}, "url":"URL#6202808" }, { "@score":"1", "@id":"6202809", "info":{"authors":{"author":[{"@pid":"27/4361","text":"Raúl Giráldez"},{"@pid":"a/JesusSAguilarRuiz","text":"Jesús S. Aguilar-Ruiz"},{"@pid":"s/JCRiquelmeSantos","text":"José Cristóbal Riquelme Santos"}]},"title":"An Efficient Data Structure for Decision Rules Discovery.","venue":"SAC","pages":"475-479","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/GiraldezAS03","doi":"10.1145/952532.952626","ee":"https://doi.org/10.1145/952532.952626","url":"https://dblp.org/rec/conf/sac/GiraldezAS03"}, "url":"URL#6202809" }, { "@score":"1", "@id":"6202810", "info":{"authors":{"author":[{"@pid":"92/5464","text":"R. A. Gonçalves"},{"@pid":"46/2874","text":"P. A. Moraes"},{"@pid":"61/4222","text":"João M. P. Cardoso"},{"@pid":"97/3033","text":"Denis F. Wolf"},{"@pid":"60/2372","text":"Marcio Merino Fernandes"},{"@pid":"46/3833","text":"Roseli A. Francelin Romero"},{"@pid":"76/5247","text":"Eduardo Marques"}]},"title":"ARCHITECT-R: A System for Reconfigurable Robots Design.","venue":"SAC","pages":"679-683","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/GoncalvesMCWFRM03","doi":"10.1145/952532.952665","ee":"https://doi.org/10.1145/952532.952665","url":"https://dblp.org/rec/conf/sac/GoncalvesMCWFRM03"}, "url":"URL#6202810" }, { "@score":"1", "@id":"6202811", "info":{"authors":{"author":[{"@pid":"95/934","text":"Iker Gondra"},{"@pid":"s/MansurHSamadzadeh","text":"Mansur H. Samadzadeh"}]},"title":"A Coarse-Grain Parallel Genetic Algorithm for Finding Ramsey Numbers.","venue":"SAC","pages":"2-8","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/GondraS03","doi":"10.1145/952532.952535","ee":"https://doi.org/10.1145/952532.952535","url":"https://dblp.org/rec/conf/sac/GondraS03"}, "url":"URL#6202811" }, { "@score":"1", "@id":"6202812", "info":{"authors":{"author":[{"@pid":"67/4449","text":"Wenzheng Gu"},{"@pid":"h/AHelal","text":"Abdelsalam Helal"}]},"title":"Extended Internet Caching Protocol: A Foundation for Building Ubiquitous Web Caching.","venue":"SAC","pages":"901-907","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/GuH03","doi":"10.1145/952532.952709","ee":"https://doi.org/10.1145/952532.952709","url":"https://dblp.org/rec/conf/sac/GuH03"}, "url":"URL#6202812" }, { "@score":"1", "@id":"6202813", "info":{"authors":{"author":{"@pid":"h/RamziAHaraty","text":"Ramzi A. Haraty"}},"title":"Database Technologies Track Editorial.","venue":"SAC","pages":"502","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/Haraty03","doi":"10.1145/952532.952632","ee":"https://doi.org/10.1145/952532.952632","url":"https://dblp.org/rec/conf/sac/Haraty03"}, "url":"URL#6202813" }, { "@score":"1", "@id":"6202814", "info":{"authors":{"author":[{"@pid":"67/2759","text":"Rita M. Hare"},{"@pid":"j/BryantAJulstrom","text":"Bryant A. Julstrom"}]},"title":"A Spanning Tree-Based Genetic Algorithm for Some Instances of the Rectilinear Steiner Problem with Obstacles.","venue":"SAC","pages":"725-729","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/HareJ03","doi":"10.1145/952532.952674","ee":"https://doi.org/10.1145/952532.952674","url":"https://dblp.org/rec/conf/sac/HareJ03"}, "url":"URL#6202814" }, { "@score":"1", "@id":"6202815", "info":{"authors":{"author":[{"@pid":"04/3810","text":"Sherri K. Harms"},{"@pid":"d/JitenderSDeogun","text":"Jitender S. Deogun"},{"@pid":"49/502","text":"Steve Goddard"}]},"title":"Building Knowledge Discovery into a Geo-spatial Decision Support System.","venue":"SAC","pages":"445-449","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/HarmsDG03","doi":"10.1145/952532.952620","ee":"https://doi.org/10.1145/952532.952620","url":"https://dblp.org/rec/conf/sac/HarmsDG03"}, "url":"URL#6202815" }, { "@score":"1", "@id":"6202816", "info":{"authors":{"author":[{"@pid":"49/6525","text":"Lewis Hassell"},{"@pid":"88/4334","text":"John H. Holmes"}]},"title":"Modeling the Workflow of Prescription Writing.","venue":"SAC","pages":"235-239","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/HassellH03","doi":"10.1145/952532.952581","ee":"https://doi.org/10.1145/952532.952581","url":"https://dblp.org/rec/conf/sac/HassellH03"}, "url":"URL#6202816" }, { "@score":"1", "@id":"6202817", "info":{"authors":{"author":[{"@pid":"04/580","text":"Henry Hexmoor"},{"@pid":"23/109","text":"Marcin Paprzycki"},{"@pid":"72/2035","text":"Niranjan Suri"}]},"title":"Agents, Interactions, Mobility and Systems Track Editorial.","venue":"SAC","pages":"27","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/HexmoorPS03","doi":"10.1145/952532.952540","ee":"https://doi.org/10.1145/952532.952540","url":"https://dblp.org/rec/conf/sac/HexmoorPS03"}, "url":"URL#6202817" }, { "@score":"1", "@id":"6202818", "info":{"authors":{"author":[{"@pid":"61/6175","text":"Chih-Lin Hu"},{"@pid":"c/MingSyanChen","text":"Ming-Syan Chen"}]},"title":"Adaptive Dissemination of Dynamic Information Services in an Extended Data Broadcast Environment.","venue":"SAC","pages":"855-859","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/HuC03","doi":"10.1145/952532.952702","ee":"https://doi.org/10.1145/952532.952702","url":"https://dblp.org/rec/conf/sac/HuC03"}, "url":"URL#6202818" }, { "@score":"1", "@id":"6202819", "info":{"authors":{"author":[{"@pid":"233/0688","text":"Kien A. Hua"},{"@pid":"74/2686","text":"Ning Jiang"},{"@pid":"49/1544","text":"Roy Villafane"},{"@pid":"67/4024","text":"Duc A. Tran"}]},"title":"ADMiRe: An Algebraic Approach to System Performance Analysis Using Data Mining Techniques.","venue":"SAC","pages":"490-496","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/HuaJVT03","doi":"10.1145/952532.952629","ee":"https://doi.org/10.1145/952532.952629","url":"https://dblp.org/rec/conf/sac/HuaJVT03"}, "url":"URL#6202819" }, { "@score":"1", "@id":"6202820", "info":{"authors":{"author":[{"@pid":"233/0688","text":"Kien A. Hua"},{"@pid":"67/4024","text":"Duc A. Tran"},{"@pid":"49/1544","text":"Roy Villafane"}]},"title":"Overlay Multicast for Video On Demand on the Internet.","venue":"SAC","pages":"935-942","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/HuaTV03","doi":"10.1145/952532.952716","ee":"https://doi.org/10.1145/952532.952716","url":"https://dblp.org/rec/conf/sac/HuaTV03"}, "url":"URL#6202820" }, { "@score":"1", "@id":"6202821", "info":{"authors":{"author":[{"@pid":"52/2437","text":"Jiun-Long Huang"},{"@pid":"c/MingSyanChen","text":"Ming-Syan Chen"}]},"title":"Broadcast Program Generation for Unordered Queries with Data Replication.","venue":"SAC","pages":"866-870","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/HuangC03","doi":"10.1145/952532.952704","ee":"https://doi.org/10.1145/952532.952704","url":"https://dblp.org/rec/conf/sac/HuangC03"}, "url":"URL#6202821" }, { "@score":"1", "@id":"6202822", "info":{"authors":{"author":[{"@pid":"75/6434-2","text":"Yan Huang 0002"},{"@pid":"x/HuiXiong","text":"Hui Xiong 0001"},{"@pid":"s/ShashiShekhar","text":"Shashi Shekhar"},{"@pid":"p/JianPei","text":"Jian Pei"}]},"title":"Mining Confident Colocation Rules without A Support Threshold.","venue":"SAC","pages":"497-501","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/HuangXSP03","doi":"10.1145/952532.952630","ee":"https://doi.org/10.1145/952532.952630","url":"https://dblp.org/rec/conf/sac/HuangXSP03"}, "url":"URL#6202822" }, { "@score":"1", "@id":"6202823", "info":{"authors":{"author":[{"@pid":"71/4625","text":"Chih-Cheng Hung"},{"@pid":"r/AgostinhoCRosa","text":"Agostinho C. Rosa"},{"@pid":"53/6380","text":"Stefano Bistarelli"}]},"title":"AI and Computational Science Track Editorial.","venue":"SAC","pages":"1","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/HungRB03","doi":"10.1145/952532.952534","ee":"https://doi.org/10.1145/952532.952534","url":"https://dblp.org/rec/conf/sac/HungRB03"}, "url":"URL#6202823" }, { "@score":"1", "@id":"6202824", "info":{"authors":{"author":{"@pid":"61/1469","text":"Matthew M. Huntbach"}},"title":"Features of the Concurrent Programming Language Aldwych.","venue":"SAC","pages":"1048-1054","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/Huntbach03","doi":"10.1145/952532.952738","ee":"https://doi.org/10.1145/952532.952738","url":"https://dblp.org/rec/conf/sac/Huntbach03"}, "url":"URL#6202824" }, { "@score":"1", "@id":"6202825", "info":{"authors":{"author":{"@pid":"j/HasanMJamil","text":"Hasan M. Jamil"}},"title":"Data Mining Track Editorial.","venue":"SAC","pages":"415","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/Jamil03","doi":"10.1145/952532.952614","ee":"https://doi.org/10.1145/952532.952614","url":"https://dblp.org/rec/conf/sac/Jamil03"}, "url":"URL#6202825" }, { "@score":"1", "@id":"6202826", "info":{"authors":{"author":[{"@pid":"03/4349","text":"Jun-Jang Jeng"},{"@pid":"01/5944","text":"Henry Chang"},{"@pid":"13/648","text":"Jen-Yao Chung"}]},"title":"COSAR: Commitment-Oriented "Sense and Respond" System for Microelectronic Manufacturing.","venue":"SAC","pages":"637-644","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/JengCC03","doi":"10.1145/952532.952657","ee":"https://doi.org/10.1145/952532.952657","url":"https://dblp.org/rec/conf/sac/JengCC03"}, "url":"URL#6202826" }, { "@score":"1", "@id":"6202827", "info":{"authors":{"author":[{"@pid":"93/467","text":"Lei Jia"},{"@pid":"30/2203","text":"Renqing Pei"},{"@pid":"38/6602","text":"Dingyu Pei"}]},"title":"Tough Constraint-Based Frequent Closed Itemsets Mining.","venue":"SAC","pages":"416-420","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/JiaPP03","doi":"10.1145/952532.952615","ee":"https://doi.org/10.1145/952532.952615","url":"https://dblp.org/rec/conf/sac/JiaPP03"}, "url":"URL#6202827" }, { "@score":"1", "@id":"6202828", "info":{"authors":{"author":[{"@pid":"74/1297","text":"Chang-Hyun Jo"},{"@pid":"96/717","text":"Rajeev R. Raje"}]},"title":"Programming Languages and Object Technologies Track Editorial.","venue":"SAC","pages":"1046-1047","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/JoR03","doi":"10.1145/952532.952737","ee":"https://doi.org/10.1145/952532.952737","url":"https://dblp.org/rec/conf/sac/JoR03"}, "url":"URL#6202828" }, { "@score":"1", "@id":"6202829", "info":{"authors":{"author":[{"@pid":"31/5528","text":"Warren T. Jones"},{"@pid":"06/420","text":"Mathew J. Palakal"}]},"title":"Bioinformatics Track Editorial.","venue":"SAC","pages":"66","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/JonesP03","doi":"10.1145/952532.952549","ee":"https://doi.org/10.1145/952532.952549","url":"https://dblp.org/rec/conf/sac/JonesP03"}, "url":"URL#6202829" }, { "@score":"1", "@id":"6202830", "info":{"authors":{"author":[{"@pid":"28/3012","text":"Omar H. Karam"},{"@pid":"51/1317","text":"Ahmad M. Hamad"},{"@pid":"253/7118","text":"Samy S. Ghoniemy"},{"@pid":"30/8742","text":"Sherine Rady"}]},"title":"Enhancement of Wavelet-Based Medical Image Retrieval Through Feature Evaluation Using an Information Gain Measure.","venue":"SAC","pages":"220-226","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/KaramHGR03","doi":"10.1145/952532.952579","ee":"https://doi.org/10.1145/952532.952579","url":"https://dblp.org/rec/conf/sac/KaramHGR03"}, "url":"URL#6202830" }, { "@score":"1", "@id":"6202831", "info":{"authors":{"author":[{"@pid":"48/4408","text":"Mathias Katzer"},{"@pid":"81/4845","text":"Franz Kummert"},{"@pid":"20/6444","text":"Gerhard Sagerer"}]},"title":"A Markov Random Field Model of Microarray Gridding.","venue":"SAC","pages":"72-77","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/KatzerKS03","doi":"10.1145/952532.952551","ee":"https://doi.org/10.1145/952532.952551","url":"https://dblp.org/rec/conf/sac/KatzerKS03"}, "url":"URL#6202831" }, { "@score":"1", "@id":"6202832", "info":{"authors":{"author":[{"@pid":"90/6024","text":"Melanie Kellar"},{"@pid":"82/1523","text":"Bonnie MacKay"},{"@pid":"60/2536","text":"Rui Zhang"},{"@pid":"w/CarolynRWatters","text":"Carolyn R. Watters"},{"@pid":"87/2296","text":"David Kaufman"},{"@pid":"59/6088","text":"Jonathan M. Borwein"}]},"title":"Architecture to Support Dynamic Composition of Math Lesson Plans.","venue":"SAC","pages":"569-574","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/KellarMZWKB03","doi":"10.1145/952532.952645","ee":"https://doi.org/10.1145/952532.952645","url":"https://dblp.org/rec/conf/sac/KellarMZWKB03"}, "url":"URL#6202832" }, { "@score":"1", "@id":"6202833", "info":{"authors":{"author":[{"@pid":"24/5800","text":"Su Myeon Kim"},{"@pid":"61/6547","text":"Kyungmin Cho"},{"@pid":"93/5092-1","text":"Inseok Hwang 0001"},{"@pid":"79/3003","text":"Seungwoo Kang"},{"@pid":"11/3029","text":"Heung-Kyu Lee"}]},"title":"CIGMA: aCtive inventory service in Global e-MArket Based on Efficient Catalog Management.","venue":"SAC","pages":"653-658","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/KimCHKL03","doi":"10.1145/952532.952659","ee":"https://doi.org/10.1145/952532.952659","url":"https://dblp.org/rec/conf/sac/KimCHKL03"}, "url":"URL#6202833" }, { "@score":"1", "@id":"6202834", "info":{"authors":{"author":[{"@pid":"13/1547","text":"Jaehoon Kim"},{"@pid":"95/2895","text":"Seog Park"}]},"title":"Xquery Speedup Using Replication in Mapping XML into Relations.","venue":"SAC","pages":"536-543","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/KimP03","doi":"10.1145/952532.952638","ee":"https://doi.org/10.1145/952532.952638","url":"https://dblp.org/rec/conf/sac/KimP03"}, "url":"URL#6202834" }, { "@score":"1", "@id":"6202835", "info":{"authors":{"author":[{"@pid":"74/6782","text":"Andrew Tae-Jun Kwon"},{"@pid":"h/HolgerHHoos","text":"Holger H. Hoos"},{"@pid":"n/RTNg","text":"Raymond T. Ng"}]},"title":"Inference of Transcriptional Regulation Relationships from Gene Expression Data.","venue":"SAC","pages":"135-140","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/KwonHN03","doi":"10.1145/952532.952561","ee":"https://doi.org/10.1145/952532.952561","url":"https://dblp.org/rec/conf/sac/KwonHN03"}, "url":"URL#6202835" }, { "@score":"1", "@id":"6202836", "info":{"authors":{"author":[{"@pid":"96/3444","text":"Kwong Yuen Lai"},{"@pid":"t/ZahirTari","text":"Zahir Tari"},{"@pid":"24/2352","text":"Peter Bertók"}]},"title":"Cost Efficient Broadcast Based Cache Invalidation for Mobile Environments.","venue":"SAC","pages":"871-877","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/LaiTB03","doi":"10.1145/952532.952705","ee":"https://doi.org/10.1145/952532.952705","url":"https://dblp.org/rec/conf/sac/LaiTB03"}, "url":"URL#6202836" }, { "@score":"1", "@id":"6202837", "info":{"authors":{"author":[{"@pid":"67/5797","text":"Monica Landoni"},{"@pid":"a/IgnacioAedo","text":"Ignacio Aedo"}]},"title":"Digital Contents in Education Track Editorial.","venue":"SAC","pages":"557","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/LandoniA03","doi":"10.1145/952532.952642","ee":"https://doi.org/10.1145/952532.952642","url":"https://dblp.org/rec/conf/sac/LandoniA03"}, "url":"URL#6202837" }, { "@score":"1", "@id":"6202838", "info":{"authors":{"author":[{"@pid":"08/3453","text":"Yann Landrin-Schweitzer"},{"@pid":"c/PierreCollet","text":"Pierre Collet"},{"@pid":"54/1051","text":"Thierry Prost"},{"@pid":"91/1995","text":"Evelyne Lutton"}]},"title":"Introducing Lateral Thinking in Search Engines with Interactive Evolutionary Algorithms.","venue":"SAC","pages":"214-219","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/Landrin-SchweitzerCPL03","doi":"10.1145/952532.952578","ee":"https://doi.org/10.1145/952532.952578","url":"https://dblp.org/rec/conf/sac/Landrin-SchweitzerCPL03"}, "url":"URL#6202838" }, { "@score":"1", "@id":"6202839", "info":{"authors":{"author":[{"@pid":"l/MonikaLanzenberger","text":"Monika Lanzenberger"},{"@pid":"48/4040","text":"Silvia Miksch"},{"@pid":"65/1433","text":"Susanne Ohmann"},{"@pid":"45/4375","text":"Christian Popow"}]},"title":"Applying Information Visualization Techniques to Capture and Explore the Course of Cognitive Behavioral Therapy.","venue":"SAC","pages":"268-274","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/LanzenbergerMOP03","doi":"10.1145/952532.952587","ee":"https://doi.org/10.1145/952532.952587","url":"https://dblp.org/rec/conf/sac/LanzenbergerMOP03"}, "url":"URL#6202839" }, { "@score":"1", "@id":"6202840", "info":{"authors":{"author":[{"@pid":"79/5832","text":"Chihan Lee"},{"@pid":"05/5435","text":"Ya-ting Lin"},{"@pid":"49/615","text":"Chuan Yi Tang"},{"@pid":"21/6099","text":"Yuh-Shyong Yang"}]},"title":"Identify Amino Acid Candidates Critical for Function of Rat Imidase by Cross-reference Voting in Imidase SuperFamily.","venue":"SAC","pages":"127-134","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/LeeLTY03","doi":"10.1145/952532.952560","ee":"https://doi.org/10.1145/952532.952560","url":"https://dblp.org/rec/conf/sac/LeeLTY03"}, "url":"URL#6202840" }, { "@score":"1", "@id":"6202841", "info":{"authors":{"author":[{"@pid":"07/2845","text":"Juan M. León-Rojas"},{"@pid":"52/4622","text":"Valentin Masero"},{"@pid":"95/4866","text":"Montaña Morales"}]},"title":"On the Fuzzy Bayesian Inference of Population Annoyance Level Caused by Noise Exposure.","venue":"SAC","pages":"227-234","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/Leon-RojasMM03","doi":"10.1145/952532.952580","ee":"https://doi.org/10.1145/952532.952580","url":"https://dblp.org/rec/conf/sac/Leon-RojasMM03"}, "url":"URL#6202841" }, { "@score":"1", "@id":"6202842", "info":{"authors":{"author":[{"@pid":"l/HongVaLeong","text":"Hong Va Leong"},{"@pid":"42/10459","text":"Alvin T. S. Chan"}]},"title":"Mobile Computing and Applications Track Editorial.","venue":"SAC","pages":"853-854","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/LeongC03","doi":"10.1145/952532.952701","ee":"https://doi.org/10.1145/952532.952701","url":"https://dblp.org/rec/conf/sac/LeongC03"}, "url":"URL#6202842" }, { "@score":"1", "@id":"6202843", "info":{"authors":{"author":[{"@pid":"l/QiLi","text":"Qi Li 0001"},{"@pid":"83/5007-1","text":"Chris Brown 0004"},{"@pid":"47/4773","text":"Chandra Kambhamettu"},{"@pid":"75/4601-1","text":"Tao Li 0001"},{"@pid":"81/4341","text":"Shenghuo Zhu"}]},"title":"A Framework of Individually-Focused Teleconferencing (IFT) via an Efficient 3D Reprojection Technique.","venue":"SAC","pages":"951-955","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/LiBKLZ03","doi":"10.1145/952532.952718","ee":"https://doi.org/10.1145/952532.952718","url":"https://dblp.org/rec/conf/sac/LiBKLZ03"}, "url":"URL#6202843" }, { "@score":"1", "@id":"6202844", "info":{"authors":{"author":[{"@pid":"14/3485","text":"Haibing Li"},{"@pid":"92/972","text":"Andrew Lim 0001"},{"@pid":"53/6823","text":"Brian Rodrigues"}]},"title":"A Hybrid AI Approach for Nurse Rostering Problem.","venue":"SAC","pages":"730-735","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/LiLR03","doi":"10.1145/952532.952675","ee":"https://doi.org/10.1145/952532.952675","url":"https://dblp.org/rec/conf/sac/LiLR03"}, "url":"URL#6202844" }, { "@score":"1", "@id":"6202845", "info":{"authors":{"author":[{"@pid":"75/4601-1","text":"Tao Li 0001"},{"@pid":"81/4341","text":"Shenghuo Zhu"},{"@pid":"l/QiLi","text":"Qi Li 0001"},{"@pid":"o/MitsunoriOgihara","text":"Mitsunori Ogihara"}]},"title":"Gene Functional Classification by Semisupervised Learning from Heterogeneous Data.","venue":"SAC","pages":"78-82","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/LiZLO03","doi":"10.1145/952532.952552","ee":"https://doi.org/10.1145/952532.952552","url":"https://dblp.org/rec/conf/sac/LiZLO03"}, "url":"URL#6202845" }, { "@score":"1", "@id":"6202846", "info":{"authors":{"author":[{"@pid":"75/4601-1","text":"Tao Li 0001"},{"@pid":"81/4341","text":"Shenghuo Zhu"},{"@pid":"o/MitsunoriOgihara","text":"Mitsunori Ogihara"}]},"title":"A New Distributed Data Mining Model Based on Similarity.","venue":"SAC","pages":"432-436","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/LiZO03","doi":"10.1145/952532.952618","ee":"https://doi.org/10.1145/952532.952618","url":"https://dblp.org/rec/conf/sac/LiZO03"}, "url":"URL#6202846" }, { "@score":"1", "@id":"6202847", "info":{"authors":{"author":[{"@pid":"92/972","text":"Andrew Lim 0001"},{"@pid":"53/6823","text":"Brian Rodrigues"},{"@pid":"76/893","text":"Lei Song"}]},"title":"Manpower Scheduling with Time Windows.","venue":"SAC","pages":"741-746","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/LimRS03","doi":"10.1145/952532.952677","ee":"https://doi.org/10.1145/952532.952677","url":"https://dblp.org/rec/conf/sac/LimRS03"}, "url":"URL#6202847" }, { "@score":"1", "@id":"6202848", "info":{"authors":{"author":{"@pid":"13/5658","text":"Jun-Lin Lin"}},"title":"Mining Maximal Frequent Intervals.","venue":"SAC","pages":"426-431","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/Lin03","doi":"10.1145/952532.952617","ee":"https://doi.org/10.1145/952532.952617","url":"https://dblp.org/rec/conf/sac/Lin03"}, "url":"URL#6202848" }, { "@score":"1", "@id":"6202849", "info":{"authors":{"author":[{"@pid":"87/4179","text":"Andrew Lomonosov"},{"@pid":"87/1542","text":"Meera Sitharam"},{"@pid":"p/KihongPark","text":"Kihong Park"}]},"title":"Stability vs. Optimality Tradeoff in Game Theoretic Mechanisms for QoS Provision.","venue":"SAC","pages":"28-32","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/LomonosovSP03","doi":"10.1145/952532.952541","ee":"https://doi.org/10.1145/952532.952541","url":"https://dblp.org/rec/conf/sac/LomonosovSP03"}, "url":"URL#6202849" }, { "@score":"1", "@id":"6202850", "info":{"authors":{"author":[{"@pid":"66/5710","text":"Natalia López"},{"@pid":"n/ManuelNunez","text":"Manuel Núñez 0001"},{"@pid":"41/4428","text":"Ismael Rodríguez"},{"@pid":"r/FernandoRubio","text":"Fernando Rubio 0001"}]},"title":"A Multi-Agent System for E-Barter Including Transaction and Shipping Costs.","venue":"SAC","pages":"587-594","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/LopezNRR03","doi":"10.1145/952532.952650","ee":"https://doi.org/10.1145/952532.952650","url":"https://dblp.org/rec/conf/sac/LopezNRR03"}, "url":"URL#6202850" }, { "@score":"1", "@id":"6202851", "info":{"authors":{"author":[{"@pid":"59/4969","text":"Qun Ma"},{"@pid":"27/2637","text":"Jesús A. Izaguirre"}]},"title":"Long Time Step Molecular Dynamics using Targeted Langevin Stabilization.","venue":"SAC","pages":"178-182","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/MaI03","doi":"10.1145/952532.952570","ee":"https://doi.org/10.1145/952532.952570","url":"https://dblp.org/rec/conf/sac/MaI03"}, "url":"URL#6202851" }, { "@score":"1", "@id":"6202852", "info":{"authors":{"author":[{"@pid":"59/4969","text":"Qun Ma"},{"@pid":"27/2637","text":"Jesús A. Izaguirre"},{"@pid":"55/3977","text":"Robert D. Skeel"}]},"title":"Nonlinear Instability in Multiple Time Stepping Molecular Dynamics.","venue":"SAC","pages":"167-171","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/MaIS03","doi":"10.1145/952532.952568","ee":"https://doi.org/10.1145/952532.952568","url":"https://dblp.org/rec/conf/sac/MaIS03"}, "url":"URL#6202852" }, { "@score":"1", "@id":"6202853", "info":{"authors":{"author":[{"@pid":"36/3077","text":"Susan L. Mabry"},{"@pid":"90/3487","text":"Troy Schneringer"},{"@pid":"77/5455","text":"Timothy Etters"},{"@pid":"34/2290","text":"Naomi Edwards"}]},"title":"Intelligent Agents for Patient Monitoring and Diagnostics.","venue":"SAC","pages":"257-262","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/MabrySEE03","doi":"10.1145/952532.952585","ee":"https://doi.org/10.1145/952532.952585","url":"https://dblp.org/rec/conf/sac/MabrySEE03"}, "url":"URL#6202853" }, { "@score":"1", "@id":"6202854", "info":{"authors":{"author":{"@pid":"25/1792","text":"Matthew V. Mahoney 0001"}},"title":"Network Traffic Anomaly Detection Based on Packet Bytes.","venue":"SAC","pages":"346-350","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/Mahoney03","doi":"10.1145/952532.952601","ee":"https://doi.org/10.1145/952532.952601","url":"https://dblp.org/rec/conf/sac/Mahoney03"}, "url":"URL#6202854" }, { "@score":"1", "@id":"6202855", "info":{"authors":{"author":[{"@pid":"m/GiuseppeManco-1","text":"Giuseppe Manco 0001"},{"@pid":"23/1461","text":"Riccardo Ortale"},{"@pid":"s/DomenicoSacca","text":"Domenico Saccà"}]},"title":"Similarity-Based Clustering of Web Transactions.","venue":"SAC","pages":"1212-1216","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/MancoOS03","doi":"10.1145/952532.952767","ee":"https://doi.org/10.1145/952532.952767","url":"https://dblp.org/rec/conf/sac/MancoOS03"}, "url":"URL#6202855" }, { "@score":"1", "@id":"6202856", "info":{"authors":{"author":[{"@pid":"71/6032","text":"Paul van der Mark"},{"@pid":"48/3204","text":"Lex Wolters"},{"@pid":"63/5031","text":"Gerard Cats"}]},"title":"Automatic Code Generation for a Convection Scheme.","venue":"SAC","pages":"1003-1008","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/MarkWC03","doi":"10.1145/952532.952729","ee":"https://doi.org/10.1145/952532.952729","url":"https://dblp.org/rec/conf/sac/MarkWC03"}, "url":"URL#6202856" }, { "@score":"1", "@id":"6202857", "info":{"authors":{"author":{"@pid":"52/4622","text":"Valentin Masero"}},"title":"Computer Applications in Health Care Track Editorial.","venue":"SAC","pages":"212-213","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/Masero03","doi":"10.1145/952532.952577","ee":"https://doi.org/10.1145/952532.952577","url":"https://dblp.org/rec/conf/sac/Masero03"}, "url":"URL#6202857" }, { "@score":"1", "@id":"6202858", "info":{"authors":{"author":[{"@pid":"55/6056","text":"Ana Cristina Vieira de Melo"},{"@pid":"00/3712","text":"Bruno Martins Moutinho"}]},"title":"On the Composition of Java Frameworks Control-flows.","venue":"SAC","pages":"1099-1103","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/MeloM03","doi":"10.1145/952532.952747","ee":"https://doi.org/10.1145/952532.952747","url":"https://dblp.org/rec/conf/sac/MeloM03"}, "url":"URL#6202858" }, { "@score":"1", "@id":"6202859", "info":{"authors":{"author":[{"@pid":"10/6227","text":"Ronaldo Menezes"},{"@pid":"t/RobertTolksdorf","text":"Robert Tolksdorf"}]},"title":"A New Approach to Scalable Linda-systems Based on Swarms.","venue":"SAC","pages":"375-379","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/MenezesT03","doi":"10.1145/952532.952607","ee":"https://doi.org/10.1145/952532.952607","url":"https://dblp.org/rec/conf/sac/MenezesT03"}, "url":"URL#6202859" }, { "@score":"1", "@id":"6202860", "info":{"authors":{"author":{"@pid":"m/RosaMeo","text":"Rosa Meo"}},"title":"Optimization of a Language for Data Mining.","venue":"SAC","pages":"437-444","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/Meo03","doi":"10.1145/952532.952619","ee":"https://doi.org/10.1145/952532.952619","url":"https://dblp.org/rec/conf/sac/Meo03"}, "url":"URL#6202860" }, { "@score":"1", "@id":"6202861", "info":{"authors":{"author":[{"@pid":"76/5882","text":"Marjan Mernik"},{"@pid":"78/673","text":"Goran Gerlic"},{"@pid":"46/3960","text":"Viljem Zumer"},{"@pid":"b/BRBryant","text":"Barrett R. Bryant"}]},"title":"Can a Parser be Generated from Examples?","venue":"SAC","pages":"1063-1067","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/MernikGZB03","doi":"10.1145/952532.952740","ee":"https://doi.org/10.1145/952532.952740","url":"https://dblp.org/rec/conf/sac/MernikGZB03"}, "url":"URL#6202861" }, { "@score":"1", "@id":"6202862", "info":{"authors":{"author":[{"@pid":"14/3350","text":"James R. Miller"},{"@pid":"38/5680","text":"Johannes J. Feddema"},{"@pid":"43/430","text":"Terry A. Slocum"},{"@pid":"57/4734","text":"Daniel C. Cliburn"}]},"title":"Modeling and Visualizing Uncertainty in a Global Water Balance Model.","venue":"SAC","pages":"972-978","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/MillerFSC03","doi":"10.1145/952532.952722","ee":"https://doi.org/10.1145/952532.952722","url":"https://dblp.org/rec/conf/sac/MillerFSC03"}, "url":"URL#6202862" }, { "@score":"1", "@id":"6202863", "info":{"authors":{"author":[{"@pid":"96/3727","text":"Geyong Min"},{"@pid":"02/3730","text":"Mohamed Ould-Khaoua"},{"@pid":"f/JohnDFerguson","text":"John D. Ferguson"}]},"title":"Performance Prediction of Wormhole Switching in Hypercubes with Bursty Traffic Pattern.","venue":"SAC","pages":"985-989","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/MinOF03","doi":"10.1145/952532.952726","ee":"https://doi.org/10.1145/952532.952726","url":"https://dblp.org/rec/conf/sac/MinOF03"}, "url":"URL#6202863" }, { "@score":"1", "@id":"6202864", "info":{"authors":{"author":[{"@pid":"91/5684","text":"Andrea Molinari"},{"@pid":"58/10793","text":"Ricardo A. Marques Pereira"},{"@pid":"26/4672","text":"Gabriella Pasi"}]},"title":"An Indexing Model of HTML Documents.","venue":"SAC","pages":"834-840","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/MolinariPP03","doi":"10.1145/952532.952697","ee":"https://doi.org/10.1145/952532.952697","url":"https://dblp.org/rec/conf/sac/MolinariPP03"}, "url":"URL#6202864" }, { "@score":"1", "@id":"6202865", "info":{"authors":{"author":[{"@pid":"29/5834","text":"Éric Monfroy"},{"@pid":"02/3606-1","text":"Carlos Castro 0001"}]},"title":"Basic Components for Constraint Solver Cooperations.","venue":"SAC","pages":"367-374","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/MonfroyC03","doi":"10.1145/952532.952606","ee":"https://doi.org/10.1145/952532.952606","url":"https://dblp.org/rec/conf/sac/MonfroyC03"}, "url":"URL#6202865" }, { "@score":"1", "@id":"6202866", "info":{"authors":{"author":[{"@pid":"m/HenryMuccini","text":"Henry Muccini"},{"@pid":"39/5638","text":"Fabio Mancinelli"}]},"title":"Eliciting Coordination Policies from Requirements.","venue":"SAC","pages":"387-393","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/MucciniM03","doi":"10.1145/952532.952609","ee":"https://doi.org/10.1145/952532.952609","url":"https://dblp.org/rec/conf/sac/MucciniM03"}, "url":"URL#6202866" }, { "@score":"1", "@id":"6202867", "info":{"authors":{"author":[{"@pid":"78/3523","text":"Shoichi Naganuma"},{"@pid":"18/6988","text":"Norio Tagawa"},{"@pid":"03/356","text":"Akihiro Minagawa"}]},"title":"Estimation of 3D Shape and Reflectance using Multiple Moire Images and Shading Model.","venue":"SAC","pages":"943-950","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/NaganumaTM03","doi":"10.1145/952532.952717","ee":"https://doi.org/10.1145/952532.952717","url":"https://dblp.org/rec/conf/sac/NaganumaTM03"}, "url":"URL#6202867" }, { "@score":"1", "@id":"6202868", "info":{"authors":{"author":[{"@pid":"96/981","text":"Mangala Gowri Nanda"},{"@pid":"56/1901","text":"Neeran M. Karnik"}]},"title":"Synchronization Analysis for Decentralizing Composite Web Services.","venue":"SAC","pages":"407-414","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/NandaK03","doi":"10.1145/952532.952612","ee":"https://doi.org/10.1145/952532.952612","url":"https://dblp.org/rec/conf/sac/NandaK03"}, "url":"URL#6202868" }, { "@score":"1", "@id":"6202869", "info":{"authors":{"author":[{"@pid":"96/981","text":"Mangala Gowri Nanda"},{"@pid":"r/SRamesh-1","text":"S. Ramesh 0001"}]},"title":"Pointer Analysis of Multithreaded Java Programs.","venue":"SAC","pages":"1068-1075","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/NandaR03","doi":"10.1145/952532.952741","ee":"https://doi.org/10.1145/952532.952741","url":"https://dblp.org/rec/conf/sac/NandaR03"}, "url":"URL#6202869" }, { "@score":"1", "@id":"6202870", "info":{"authors":{"author":[{"@pid":"60/6717","text":"Goran Nenadic"},{"@pid":"58/2734","text":"Irena Spasic"},{"@pid":"47/4142","text":"Sophia Ananiadou"}]},"title":"Terminology-driven Mining of Biomedical Literature.","venue":"SAC","pages":"83-87","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/NenadicSA03","doi":"10.1145/952532.952553","ee":"https://doi.org/10.1145/952532.952553","url":"https://dblp.org/rec/conf/sac/NenadicSA03"}, "url":"URL#6202870" }, { "@score":"1", "@id":"6202871", "info":{"authors":{"author":[{"@pid":"58/896","text":"Ani Nenkova"},{"@pid":"23/3518","text":"Amit Bagga"}]},"title":"Email Classification for Contact Centers.","venue":"SAC","pages":"789-792","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/NenkovaB03","doi":"10.1145/952532.952689","ee":"https://doi.org/10.1145/952532.952689","url":"https://dblp.org/rec/conf/sac/NenkovaB03"}, "url":"URL#6202871" }, { "@score":"1", "@id":"6202872", "info":{"authors":{"author":[{"@pid":"n/VTYNg","text":"Vincent Ng 0002"},{"@pid":"89/5117","text":"Narasimhaiah Gorla"},{"@pid":"71/12","text":"Dik Man Law"},{"@pid":"25/4172","text":"Chi-Kong Chan"}]},"title":"Applying Genetic Algorithms in Database Partitioning.","venue":"SAC","pages":"544-549","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/NgGLC03","doi":"10.1145/952532.952639","ee":"https://doi.org/10.1145/952532.952639","url":"https://dblp.org/rec/conf/sac/NgGLC03"}, "url":"URL#6202872" }, { "@score":"1", "@id":"6202873", "info":{"authors":{"author":[{"@pid":"00/5480","text":"See-Kiong Ng"},{"@pid":"16/1234-1","text":"Zhuo Zhang 0001"},{"@pid":"37/121","text":"Soon-Heng Tan"}]},"title":"Integrative Approach for Computationally Inferring Protein Domain Interactions.","venue":"SAC","pages":"115-121","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/NgZT03","doi":"10.1145/952532.952558","ee":"https://doi.org/10.1145/952532.952558","url":"https://dblp.org/rec/conf/sac/NgZT03"}, "url":"URL#6202873" }, { "@score":"1", "@id":"6202874", "info":{"authors":{"author":[{"@pid":"76/4635","text":"Elisabetta Di Nitto"},{"@pid":"g/CarloGhezzi","text":"Carlo Ghezzi"},{"@pid":"91/5874","text":"Paolo Selvini"}]},"title":"Using Agents for Multi-target Search on the Web.","venue":"SAC","pages":"828-833","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/NittoGS03","doi":"10.1145/952532.952696","ee":"https://doi.org/10.1145/952532.952696","url":"https://dblp.org/rec/conf/sac/NittoGS03"}, "url":"URL#6202874" }, { "@score":"1", "@id":"6202875", "info":{"authors":{"author":[{"@pid":"58/5192","text":"Tommaso Di Noia"},{"@pid":"s/EugenioDiSciascio","text":"Eugenio Di Sciascio"},{"@pid":"d/FrancescoMDonini","text":"Francesco M. Donini"},{"@pid":"03/3656","text":"Marina Mongiello"}]},"title":"Semantic Matchmaking in a P-2-P Electronic Marketplace.","venue":"SAC","pages":"582-586","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/NoiaSDM03","doi":"10.1145/952532.952649","ee":"https://doi.org/10.1145/952532.952649","url":"https://dblp.org/rec/conf/sac/NoiaSDM03"}, "url":"URL#6202875" }, { "@score":"1", "@id":"6202876", "info":{"authors":{"author":[{"@pid":"44/5378-1","text":"Jung-Hwan Oh 0001"},{"@pid":"50/3280","text":"Maruthi Thenneru"},{"@pid":"74/2686","text":"Ning Jiang"}]},"title":"Hierarchical Video Indexing Based on Changes of Camera and Object Motions.","venue":"SAC","pages":"917-921","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/OhTJ03","doi":"10.1145/952532.952713","ee":"https://doi.org/10.1145/952532.952713","url":"https://dblp.org/rec/conf/sac/OhTJ03"}, "url":"URL#6202876" }, { "@score":"1", "@id":"6202877", "info":{"authors":{"author":[{"@pid":"o/AndreaOmicini","text":"Andrea Omicini"},{"@pid":"o/SaschaOssowski","text":"Sascha Ossowski"}]},"title":"Coordination Models, Languages and Applications Track Editorial.","venue":"SAC","pages":"358-359","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/OmiciniO03","doi":"10.1145/952532.952604","ee":"https://doi.org/10.1145/952532.952604","url":"https://dblp.org/rec/conf/sac/OmiciniO03"}, "url":"URL#6202877" }, { "@score":"1", "@id":"6202878", "info":{"authors":{"author":[{"@pid":"o/MichaelOrtegaBinderberger","text":"Michael Ortega-Binderberger"},{"@pid":"c/KaushikChakrabarti","text":"Kaushik Chakrabarti"},{"@pid":"m/SharadMehrotra","text":"Sharad Mehrotra"}]},"title":"Efficient Evaluation of Relevance Feedback for Multidimensional All-pairs Retrieval.","venue":"SAC","pages":"847-852","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/Ortega-BinderbergeCM03","doi":"10.1145/952532.952699","ee":"https://doi.org/10.1145/952532.952699","url":"https://dblp.org/rec/conf/sac/Ortega-BinderbergeCM03"}, "url":"URL#6202878" }, { "@score":"1", "@id":"6202879", "info":{"authors":{"author":[{"@pid":"95/912","text":"Sreekanth Pannala"},{"@pid":"81/7021","text":"Eduardo F. D'Azevedo"},{"@pid":"55/1404","text":"Madhava Syamlal"},{"@pid":"22/3076","text":"Thomas O'Brien"}]},"title":"Hybrid (OpenMP and MPI) Parallelization of MFIX: A Multiphase CFD Code for Modeling Fluidized Beds.","venue":"SAC","pages":"199-206","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/PannalaDSO03","doi":"10.1145/952532.952574","ee":"https://doi.org/10.1145/952532.952574","url":"https://dblp.org/rec/conf/sac/PannalaDSO03"}, "url":"URL#6202879" }, { "@score":"1", "@id":"6202880", "info":{"authors":{"author":[{"@pid":"97/5334","text":"Henrique Paques"},{"@pid":"l/LingLiu","text":"Ling Liu 0001"},{"@pid":"p/CaltonPu","text":"Calton Pu"}]},"title":"Distributed Query Adaptation and Its Trade-offs.","venue":"SAC","pages":"528-535","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/PaquesLP03","doi":"10.1145/952532.952637","ee":"https://doi.org/10.1145/952532.952637","url":"https://dblp.org/rec/conf/sac/PaquesLP03"}, "url":"URL#6202880" }, { "@score":"1", "@id":"6202881", "info":{"authors":{"author":{"@pid":"23/502","text":"Amit M. Paradkar"}},"title":"Towards Model-Based Generation of Self-Priming and Self-Checking Conformance Tests for Interactive Systems.","venue":"SAC","pages":"1110-1117","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/Paradkar03","doi":"10.1145/952532.952749","ee":"https://doi.org/10.1145/952532.952749","url":"https://dblp.org/rec/conf/sac/Paradkar03"}, "url":"URL#6202881" }, { "@score":"1", "@id":"6202882", "info":{"authors":{"author":[{"@pid":"02/2574","text":"Valerio Pascucci"},{"@pid":"99/1414","text":"Daniel E. Laney"},{"@pid":"88/2413","text":"Ray J. Frank"},{"@pid":"24/4740","text":"F. Gygi"},{"@pid":"52/2897","text":"Giorgio Scorzelli"},{"@pid":"l/LarsLinsen","text":"Lars Linsen"},{"@pid":"75/4849","text":"Bernd Hamann"}]},"title":"Real-Time Monitoring of Large Scientific Simulations.","venue":"SAC","pages":"194-198","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/PascucciLFGSLH03","doi":"10.1145/952532.952573","ee":"https://doi.org/10.1145/952532.952573","url":"https://dblp.org/rec/conf/sac/PascucciLFGSLH03"}, "url":"URL#6202882" }, { "@score":"1", "@id":"6202883", "info":{"authors":{"author":[{"@pid":"79/2494","text":"Joaquín Peña"},{"@pid":"73/3776","text":"Rafael Corchuelo"},{"@pid":"91/6997","text":"José Luis Arjona"}]},"title":"A Top Down Approach for MAS Protocol Descriptions.","venue":"SAC","pages":"45-49","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/PenaCA03","doi":"10.1145/952532.952544","ee":"https://doi.org/10.1145/952532.952544","url":"https://dblp.org/rec/conf/sac/PenaCA03"}, "url":"URL#6202883" }, { "@score":"1", "@id":"6202884", "info":{"authors":{"author":[{"@pid":"p/WilliamPerrizo","text":"William Perrizo"},{"@pid":"240/6137-1","text":"Qin Ding 0001"},{"@pid":"28/278","text":"Anne Denton"},{"@pid":"68/5406","text":"Kirk Scott"},{"@pid":"04/3021","text":"Qiang Ding"},{"@pid":"84/7031","text":"Maleq Khan"}]},"title":"PINE - Podium Incremental Neighbor Evaluator for Classifying Spatial Data.","venue":"SAC","pages":"503-508","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/PerrizoDDSDK03","doi":"10.1145/952532.952633","ee":"https://doi.org/10.1145/952532.952633","url":"https://dblp.org/rec/conf/sac/PerrizoDDSDK03"}, "url":"URL#6202884" }, { "@score":"1", "@id":"6202885", "info":{"authors":{"author":[{"@pid":"32/726","text":"Yu Qian"},{"@pid":"29/177-1","text":"Kang Zhang 0001"}]},"title":"A Customizable Hybrid Approach to Data Clustering.","venue":"SAC","pages":"485-489","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/QianZ03","doi":"10.1145/952532.952628","ee":"https://doi.org/10.1145/952532.952628","url":"https://dblp.org/rec/conf/sac/QianZ03"}, "url":"URL#6202885" }, { "@score":"1", "@id":"6202886", "info":{"authors":{"author":[{"@pid":"72/5481","text":"Prahalad Ragothaman"},{"@pid":"52/2112","text":"Brajendra Panda"}]},"title":"Hybrid Log Segmentation for Assured Damage Assessment.","venue":"SAC","pages":"522-527","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/RagothamanP03","doi":"10.1145/952532.952636","ee":"https://doi.org/10.1145/952532.952636","url":"https://dblp.org/rec/conf/sac/RagothamanP03"}, "url":"URL#6202886" }, { "@score":"1", "@id":"6202887", "info":{"authors":{"author":[{"@pid":"88/6934","text":"Günther R. Raidl"},{"@pid":"j/BryantAJulstrom","text":"Bryant A. Julstrom"}]},"title":"Greedy Heuristics and an Evolutionary Algorithm for the Bounded-Diameter Minimum Spanning Tree Problem.","venue":"SAC","pages":"747-752","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/RaidlJ03","doi":"10.1145/952532.952678","ee":"https://doi.org/10.1145/952532.952678","url":"https://dblp.org/rec/conf/sac/RaidlJ03"}, "url":"URL#6202887" }, { "@score":"1", "@id":"6202888", "info":{"authors":{"author":[{"@pid":"66/5853","text":"Larry Raisanen"},{"@pid":"41/3683","text":"Roger M. Whitaker"}]},"title":"Multi-objective Optimization in the Area Coverage Problems for Cellular Communication Networks: Evaluation of an Elitist Evolutionary Strategy.","venue":"SAC","pages":"714-720","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/RaisanenW03","doi":"10.1145/952532.952672","ee":"https://doi.org/10.1145/952532.952672","url":"https://dblp.org/rec/conf/sac/RaisanenW03"}, "url":"URL#6202888" }, { "@score":"1", "@id":"6202889", "info":{"authors":{"author":[{"@pid":"10/1759","text":"Sanjay Raman"},{"@pid":"87/5989","text":"Dwaine E. Clarke"},{"@pid":"b/MatthewBurnside","text":"Matt Burnside"},{"@pid":"14/3973","text":"Srinivas Devadas"},{"@pid":"r/RonaldLRivest","text":"Ronald L. Rivest"}]},"title":"Access-Controlled Resource Discovery for Pervasive Networks.","venue":"SAC","pages":"338-345","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/RamanCBDR03","doi":"10.1145/952532.952600","ee":"https://doi.org/10.1145/952532.952600","url":"https://dblp.org/rec/conf/sac/RamanCBDR03"}, "url":"URL#6202889" }, { "@score":"1", "@id":"6202890", "info":{"authors":{"author":[{"@pid":"11/5484","text":"M. Elena Renda"},{"@pid":"s/UmbertoStraccia","text":"Umberto Straccia"}]},"title":"Web Metasearch: Rank vs. Score Based Rank Aggregation Methods.","venue":"SAC","pages":"841-846","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/RendaS03","doi":"10.1145/952532.952698","ee":"https://doi.org/10.1145/952532.952698","url":"https://dblp.org/rec/conf/sac/RendaS03"}, "url":"URL#6202890" }, { "@score":"1", "@id":"6202891", "info":{"authors":{"author":[{"@pid":"80/4981","text":"Carlos A. Reyes García"},{"@pid":"147/6393","text":"Elva Corona-Xelhuantzi"}]},"title":"Implementing Fuzzy Expert System for Intelligent Buildings.","venue":"SAC","pages":"9-13","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/Reyes-GarciaC03","doi":"10.1145/952532.952536","ee":"https://doi.org/10.1145/952532.952536","url":"https://dblp.org/rec/conf/sac/Reyes-GarciaC03"}, "url":"URL#6202891" }, { "@score":"1", "@id":"6202892", "info":{"authors":{"author":[{"@pid":"55/4141","text":"George Roussos"},{"@pid":"98/2855","text":"Panos Kourouthanasis"},{"@pid":"84/1202","text":"Eugene A. Gryazin"},{"@pid":"32/1041","text":"Mike Pryzbliski"},{"@pid":"30/5957","text":"George Kalpogiannis"},{"@pid":"79/6899","text":"George M. Giaglis"}]},"title":"Systems Architecture for Pervasive Retail.","venue":"SAC","pages":"631-636","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/RoussosKGPKG03","doi":"10.1145/952532.952656","ee":"https://doi.org/10.1145/952532.952656","url":"https://dblp.org/rec/conf/sac/RoussosKGPKG03"}, "url":"URL#6202892" }, { "@score":"1", "@id":"6202893", "info":{"authors":{"author":[{"@pid":"63/3279","text":"Edna Ruckhaus"},{"@pid":"92/654","text":"Maria-Esther Vidal"}]},"title":"WebSOGO: A Global Ontology for Describing Web Sources.","venue":"SAC","pages":"1199-1205","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/RuckhausV03","doi":"10.1145/952532.952765","ee":"https://doi.org/10.1145/952532.952765","url":"https://dblp.org/rec/conf/sac/RuckhausV03"}, "url":"URL#6202893" }, { "@score":"1", "@id":"6202894", "info":{"authors":{"author":[{"@pid":"31/6483","text":"Hildegard Rumetshofer"},{"@pid":"13/3374","text":"Wolfram Wöß"}]},"title":"An Approach for Adaptable Learning Systems with Respect to Psychological Aspects.","venue":"SAC","pages":"558-563","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/RumetshoferW03","doi":"10.1145/952532.952643","ee":"https://doi.org/10.1145/952532.952643","url":"https://dblp.org/rec/conf/sac/RumetshoferW03"}, "url":"URL#6202894" }, { "@score":"1", "@id":"6202895", "info":{"authors":{"author":[{"@pid":"82/1900","text":"Chaman L. Sabharwal"},{"@pid":"m/SanjayKumarMadria","text":"Sanjay Madria"}]},"title":"Message from multimedia and visualization track organizers.","venue":"SAC","pages":"908","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/SabharwalM03","doi":"10.1145/952532.952711","ee":"https://doi.org/10.1145/952532.952711","url":"https://dblp.org/rec/conf/sac/SabharwalM03"}, "url":"URL#6202895" }, { "@score":"1", "@id":"6202896", "info":{"authors":{"author":[{"@pid":"63/5564","text":"Fabio Salice"},{"@pid":"16/4949","text":"William Fornaciari"},{"@pid":"34/6955","text":"Luca Del Vecchio"},{"@pid":"60/280","text":"Luigi Pomante"}]},"title":"Partitioning of Embedded Applications onto Heterogeneous Multiprocessor Architectures.","venue":"SAC","pages":"661-665","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/SaliceFVP03","doi":"10.1145/952532.952662","ee":"https://doi.org/10.1145/952532.952662","url":"https://dblp.org/rec/conf/sac/SaliceFVP03"}, "url":"URL#6202896" }, { "@score":"1", "@id":"6202897", "info":{"authors":{"author":[{"@pid":"58/6037","text":"Lorenzo Salvemini"},{"@pid":"06/1101","text":"Mariagiovanna Sami"},{"@pid":"31/1913","text":"Donatella Sciuto"},{"@pid":"86/903","text":"Cristina Silvano"},{"@pid":"82/5784","text":"Vittorio Zaccaria"},{"@pid":"94/5137","text":"Roberto Zafalon"}]},"title":"A Methodology for the Efficient Architectural Exploration of Energy-Delay Trade-offs for Embedded Systems.","venue":"SAC","pages":"672-678","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/SalveminiSSSZZ03","doi":"10.1145/952532.952664","ee":"https://doi.org/10.1145/952532.952664","url":"https://dblp.org/rec/conf/sac/SalveminiSSSZZ03"}, "url":"URL#6202897" }, { "@score":"1", "@id":"6202898", "info":{"authors":{"author":{"@pid":"89/2975","text":"Adrian Sandu"}},"title":"Computational Sciences Track Editorial.","venue":"SAC","pages":"141-142","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/Sandu03","doi":"10.1145/952532.952563","ee":"https://doi.org/10.1145/952532.952563","url":"https://dblp.org/rec/conf/sac/Sandu03"}, "url":"URL#6202898" }, { "@score":"1", "@id":"6202899", "info":{"authors":{"author":[{"@pid":"89/2975","text":"Adrian Sandu"},{"@pid":"03/2144","text":"Christian T. Borden"}]},"title":"Discretizing Aerosol Dynamics with B-Splines.","venue":"SAC","pages":"189-193","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/SanduB03","doi":"10.1145/952532.952572","ee":"https://doi.org/10.1145/952532.952572","url":"https://dblp.org/rec/conf/sac/SanduB03"}, "url":"URL#6202899" }, { "@score":"1", "@id":"6202900", "info":{"authors":{"author":[{"@pid":"72/2315","text":"Hideki Sato"},{"@pid":"86/3844","text":"Masayoshi Aritsugi"}]},"title":"Accessee Controlled Type Selection for a Multiple-Type Object.","venue":"SAC","pages":"515-521","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/SatoA03","doi":"10.1145/952532.952635","ee":"https://doi.org/10.1145/952532.952635","url":"https://dblp.org/rec/conf/sac/SatoA03"}, "url":"URL#6202900" }, { "@score":"1", "@id":"6202901", "info":{"authors":{"author":[{"@pid":"84/2785","text":"Paul Scerri"},{"@pid":"30/2228","text":"Pragnesh Jay Modi"},{"@pid":"12/144","text":"Wei-Min Shen"},{"@pid":"67/2667","text":"Milind Tambe"}]},"title":"Are Multiagent Algorithms Relevant for Real Hardware? A Case Study of Distributed Constraint Algorithms.","venue":"SAC","pages":"38-44","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/ScerriMST03","doi":"10.1145/952532.952543","ee":"https://doi.org/10.1145/952532.952543","url":"https://dblp.org/rec/conf/sac/ScerriMST03"}, "url":"URL#6202901" }, { "@score":"1", "@id":"6202902", "info":{"authors":{"author":[{"@pid":"s/AlbrechtSchmidt2","text":"Albrecht Schmidt 0002"},{"@pid":"m/StefanManegold","text":"Stefan Manegold"},{"@pid":"k/MartinLKersten","text":"Martin L. Kersten"}]},"title":"Integrated Querying of XML Data in RDBMSs.","venue":"SAC","pages":"509-514","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/SchmidtMK03","doi":"10.1145/952532.952634","ee":"https://doi.org/10.1145/952532.952634","url":"https://dblp.org/rec/conf/sac/SchmidtMK03"}, "url":"URL#6202902" }, { "@score":"1", "@id":"6202903", "info":{"authors":{"author":[{"@pid":"84/383","text":"Athie L. Self"},{"@pid":"d/ScottADeLoach","text":"Scott A. DeLoach"}]},"title":"Designing and Specifying Mobility within the Multiagent Systems Engineering Methodology.","venue":"SAC","pages":"50-55","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/SelfD03","doi":"10.1145/952532.952545","ee":"https://doi.org/10.1145/952532.952545","url":"https://dblp.org/rec/conf/sac/SelfD03"}, "url":"URL#6202903" }, { "@score":"1", "@id":"6202904", "info":{"authors":{"author":[{"@pid":"11/6956","text":"Jacob Shapiro"},{"@pid":"t/IsakTaksa","text":"Isak Taksa"}]},"title":"Constructing Web Search Queries from the User's Information Need Expressed in a Natural Language.","venue":"SAC","pages":"1157-1162","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/ShapiroT03","doi":"10.1145/952532.952758","ee":"https://doi.org/10.1145/952532.952758","url":"https://dblp.org/rec/conf/sac/ShapiroT03"}, "url":"URL#6202904" }, { "@score":"1", "@id":"6202905", "info":{"authors":{"author":[{"@pid":"16/5661","text":"Sangeetha Shekar"},{"@pid":"54/2924","text":"Prashant Nair"},{"@pid":"h/AHelal","text":"Abdelsalam Helal"}]},"title":"iGrocer- A Ubiquitous and Pervasive Smart Grocery Shopping System.","venue":"SAC","pages":"645-652","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/ShekarNH03","doi":"10.1145/952532.952658","ee":"https://doi.org/10.1145/952532.952658","url":"https://dblp.org/rec/conf/sac/ShekarNH03"}, "url":"URL#6202905" }, { "@score":"1", "@id":"6202906", "info":{"authors":{"author":{"@pid":"06/3261","text":"Zhizhang Shen"}},"title":"An Alternative Routing Algorithm for the Pyramid Structures.","venue":"SAC","pages":"1009-1013","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/Shen03","doi":"10.1145/952532.952730","ee":"https://doi.org/10.1145/952532.952730","url":"https://dblp.org/rec/conf/sac/Shen03"}, "url":"URL#6202906" }, { "@score":"1", "@id":"6202907", "info":{"authors":{"author":{"@pid":"06/3261","text":"Zhizhang Shen"}},"title":"An Optimal Broadcasting Schema for Multidimensional Mesh Structures.","venue":"SAC","pages":"1019-1023","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/Shen03a","doi":"10.1145/952532.952732","ee":"https://doi.org/10.1145/952532.952732","url":"https://dblp.org/rec/conf/sac/Shen03a"}, "url":"URL#6202907" }, { "@score":"1", "@id":"6202908", "info":{"authors":{"author":[{"@pid":"57/6003","text":"Dongwan Shin"},{"@pid":"a/GailJoonAhn","text":"Gail-Joon Ahn"},{"@pid":"99/2794","text":"Sangrae Cho"},{"@pid":"97/6346","text":"Seunghun Jin"}]},"title":"A Role Administration System in Role-based Authorization Infrastructures - Design and Implementation.","venue":"SAC","pages":"325-330","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/ShinACJ03","doi":"10.1145/952532.952598","ee":"https://doi.org/10.1145/952532.952598","url":"https://dblp.org/rec/conf/sac/ShinACJ03"}, "url":"URL#6202908" }, { "@score":"1", "@id":"6202909", "info":{"authors":{"author":[{"@pid":"s/YasushiShinjo","text":"Yasushi Shinjo"},{"@pid":"82/2427","text":"Toshiyuki Kubo"},{"@pid":"p/CaltonPu","text":"Calton Pu"}]},"title":"Efficient Mediators through Dynamic Code Generation: a Method and an Experiment.","venue":"SAC","pages":"1147-1154","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/ShinjoKP03","doi":"10.1145/952532.952755","ee":"https://doi.org/10.1145/952532.952755","url":"https://dblp.org/rec/conf/sac/ShinjoKP03"}, "url":"URL#6202909" }, { "@score":"1", "@id":"6202910", "info":{"authors":{"author":[{"@pid":"21/5967","text":"Lidan Shou"},{"@pid":"181/2754","text":"Zhiyong Huang"},{"@pid":"t/KianLeeTan","text":"Kian-Lee Tan"}]},"title":"Supporting Real-time Visualization With The HDoV Tree.","venue":"SAC","pages":"966-971","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/ShouHT03","doi":"10.1145/952532.952721","ee":"https://doi.org/10.1145/952532.952721","url":"https://dblp.org/rec/conf/sac/ShouHT03"}, "url":"URL#6202910" }, { "@score":"1", "@id":"6202911", "info":{"authors":{"author":[{"@pid":"37/3034","text":"Yain-Whar Si"},{"@pid":"42/5258","text":"David Edmond"},{"@pid":"h/AHMterHofstede","text":"Arthur H. M. ter Hofstede"},{"@pid":"d/MarlonDumas","text":"Marlon Dumas"}]},"title":"A Model for the Configurable Composition and Synchronization of Complex Trading Activities.","venue":"SAC","pages":"595-602","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/SiEHD03","doi":"10.1145/952532.952651","ee":"https://doi.org/10.1145/952532.952651","url":"https://dblp.org/rec/conf/sac/SiEHD03"}, "url":"URL#6202911" }, { "@score":"1", "@id":"6202912", "info":{"authors":{"author":[{"@pid":"09/4913","text":"Mikhail Sogrine"},{"@pid":"16/6798","text":"Ahmed Patel"}]},"title":"Evaluating Database Selection Algorithms for Distributed Search.","venue":"SAC","pages":"817-822","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/SogrineP03","doi":"10.1145/952532.952694","ee":"https://doi.org/10.1145/952532.952694","url":"https://dblp.org/rec/conf/sac/SogrineP03"}, "url":"URL#6202912" }, { "@score":"1", "@id":"6202913", "info":{"authors":{"author":[{"@pid":"35/5649","text":"Hans De Sterck"},{"@pid":"30/4436","text":"Rob S. Markel"},{"@pid":"79/5614","text":"Thomas Pohl"},{"@pid":"75/2928","text":"Ulrich Rüde"}]},"title":"A Lightweight Java Taskspaces Framework for Scientific Computing on Computational Grids.","venue":"SAC","pages":"1024-1030","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/SterckMPR03","doi":"10.1145/952532.952733","ee":"https://doi.org/10.1145/952532.952733","url":"https://dblp.org/rec/conf/sac/SterckMPR03"}, "url":"URL#6202913" }, { "@score":"1", "@id":"6202914", "info":{"authors":{"author":{"@pid":"51/6836","text":"David Stevens"}},"title":"Terascale Simulation of Cumulus Convection on ASCI WHITE.","venue":"SAC","pages":"207-211","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/Stevens03","doi":"10.1145/952532.952575","ee":"https://doi.org/10.1145/952532.952575","url":"https://dblp.org/rec/conf/sac/Stevens03"}, "url":"URL#6202914" }, { "@score":"1", "@id":"6202915", "info":{"authors":{"author":[{"@pid":"56/819","text":"Akira Takeuchi"},{"@pid":"64/201","text":"Fumihiko Ino"},{"@pid":"61/4474","text":"Kenichi Hagihara"}]},"title":"An Improvement on Binary-Swap Compositing for Sort-Last Parallel Rendering.","venue":"SAC","pages":"996-1002","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/TakeuchiIH03","doi":"10.1145/952532.952728","ee":"https://doi.org/10.1145/952532.952728","url":"https://dblp.org/rec/conf/sac/TakeuchiIH03"}, "url":"URL#6202915" }, { "@score":"1", "@id":"6202916", "info":{"authors":{"author":[{"@pid":"t/ZahirTari","text":"Zahir Tari"},{"@pid":"60/6579","text":"Mark McKinlay"},{"@pid":"17/6656","text":"Manish Malhotra"}]},"title":"An XML-based Conversational Protocol for Web Services.","venue":"SAC","pages":"1179-1184","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/TariMM03","doi":"10.1145/952532.952762","ee":"https://doi.org/10.1145/952532.952762","url":"https://dblp.org/rec/conf/sac/TariMM03"}, "url":"URL#6202916" }, { "@score":"1", "@id":"6202917", "info":{"authors":{"author":[{"@pid":"51/1353","text":"Jorge Tavares"},{"@pid":"02/6793","text":"Francisco Baptista Pereira"},{"@pid":"25/3172","text":"Penousal Machado"},{"@pid":"c/ErnestoCosta","text":"Ernesto Costa"}]},"title":"On the Influence of GVR in Vehicle Routing.","venue":"SAC","pages":"753-758","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/TavaresPMC03","doi":"10.1145/952532.952679","ee":"https://doi.org/10.1145/952532.952679","url":"https://dblp.org/rec/conf/sac/TavaresPMC03"}, "url":"URL#6202917" }, { "@score":"1", "@id":"6202918", "info":{"authors":{"author":[{"@pid":"54/2568","text":"Herbert H. Thompson"},{"@pid":"09/3459","text":"Chia-Chu Chiang"},{"@pid":"99/6126","text":"Ibrahim K. El-Far"},{"@pid":"67/5283","text":"Stefan Gruner"},{"@pid":"86/1870","text":"Markus Montigel"},{"@pid":"w/JamesAWhittaker","text":"James A. Whittaker"}]},"title":"Software Engineering Track Editorial.","venue":"SAC","pages":"1076-1077","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/ThompsonCEGMW03","doi":"10.1145/952532.952743","ee":"https://doi.org/10.1145/952532.952743","url":"https://dblp.org/rec/conf/sac/ThompsonCEGMW03"}, "url":"URL#6202918" }, { "@score":"1", "@id":"6202919", "info":{"authors":{"author":[{"@pid":"65/4313","text":"Marc Torrens"},{"@pid":"16/703","text":"Patrick Hertzog"},{"@pid":"04/3608","text":"Loic Samson"},{"@pid":"f/BoiFaltings","text":"Boi Faltings"}]},"title":"reality: a Scalable Intelligent Travel Planner.","venue":"SAC","pages":"623-630","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/TorrensHSF03","doi":"10.1145/952532.952655","ee":"https://doi.org/10.1145/952532.952655","url":"https://dblp.org/rec/conf/sac/TorrensHSF03"}, "url":"URL#6202919" }, { "@score":"1", "@id":"6202920", "info":{"authors":{"author":{"@pid":"10/1711","text":"Issa Traoré"}},"title":"A Transition-based Strategy for Object-oriented Software Testing.","venue":"SAC","pages":"1055-1062","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/Traore03","doi":"10.1145/952532.952739","ee":"https://doi.org/10.1145/952532.952739","url":"https://dblp.org/rec/conf/sac/Traore03"}, "url":"URL#6202920" }, { "@score":"1", "@id":"6202921", "info":{"authors":{"author":[{"@pid":"10/1711","text":"Issa Traoré"},{"@pid":"25/2630","text":"Suraiya Khan"}]},"title":"A Protection Scheme for Collaborative Environments.","venue":"SAC","pages":"331-337","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/TraoreK03","doi":"10.1145/952532.952599","ee":"https://doi.org/10.1145/952532.952599","url":"https://dblp.org/rec/conf/sac/TraoreK03"}, "url":"URL#6202921" }, { "@score":"1", "@id":"6202922", "info":{"authors":{"author":[{"@pid":"10/1711","text":"Issa Traoré"},{"@pid":"a/DemissieBAredo","text":"Demissie B. Aredo"},{"@pid":"75/639","text":"Hong Ye"}]},"title":"An Integrated Framework for Formal Development of Open Distributed Systems.","venue":"SAC","pages":"1078-1085","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/TraoreYA03","doi":"10.1145/952532.952744","ee":"https://doi.org/10.1145/952532.952744","url":"https://dblp.org/rec/conf/sac/TraoreYA03"}, "url":"URL#6202922" }, { "@score":"1", "@id":"6202923", "info":{"authors":{"author":[{"@pid":"t/VincentSMTseng","text":"Shin-Mu Tseng"},{"@pid":"99/1412","text":"Ching-Fu Tsui"}]},"title":"An Efficient Method for Mining Associated Service Patterns in Mobile Web Environments.","venue":"SAC","pages":"455-459","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/TsengT03","doi":"10.1145/952532.952622","ee":"https://doi.org/10.1145/952532.952622","url":"https://dblp.org/rec/conf/sac/TsengT03"}, "url":"URL#6202923" }, { "@score":"1", "@id":"6202924", "info":{"authors":{"author":[{"@pid":"56/3990","text":"Dyan J. Tufts-Conrad"},{"@pid":"303/3845","text":"Nur Zincir-Heywood"},{"@pid":"22/1940","text":"David Zitner"}]},"title":"SOM - Feature Extraction from Patient Discharge Summaries.","venue":"SAC","pages":"263-267","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/Tufts-ConradZZ03","doi":"10.1145/952532.952586","ee":"https://doi.org/10.1145/952532.952586","url":"https://dblp.org/rec/conf/sac/Tufts-ConradZZ03"}, "url":"URL#6202924" }, { "@score":"1", "@id":"6202925", "info":{"authors":{"author":[{"@pid":"22/4437","text":"Francisco J. Valverde-Albacete"},{"@pid":"72/4314","text":"R. Pedraza-Jiménez"},{"@pid":"47/2396","text":"Jesús Cid-Sueiro"},{"@pid":"90/6067","text":"Paloma Díaz-Pérez"},{"@pid":"55/1371","text":"Ángel Navia-Vázquez"},{"@pid":"47/1600","text":"Harold Y. Molina-Bulla"}]},"title":"InterMediActor: an Environment for Instructional Content Design Based on Competences.","venue":"SAC","pages":"575-579","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/Valverde-AlbacetePCDNM03","doi":"10.1145/952532.952646","ee":"https://doi.org/10.1145/952532.952646","url":"https://dblp.org/rec/conf/sac/Valverde-AlbacetePCDNM03"}, "url":"URL#6202925" }, { "@score":"1", "@id":"6202926", "info":{"authors":{"author":[{"@pid":"v/LuisVeiga","text":"Luís Veiga"},{"@pid":"f/PauloJPFerreira","text":"Paulo Ferreira 0001"}]},"title":"RepWeb: Replicated Web with Referential Integrity.","venue":"SAC","pages":"1206-1211","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/VeigaF03","doi":"10.1145/952532.952766","ee":"https://doi.org/10.1145/952532.952766","url":"https://dblp.org/rec/conf/sac/VeigaF03"}, "url":"URL#6202926" }, { "@score":"1", "@id":"6202927", "info":{"authors":{"author":{"@pid":"v/MirkoViroli","text":"Mirko Viroli"}},"title":"Comparing Semantic Frameworks for Coordination: On the Conformance Issue for Coordination Media.","venue":"SAC","pages":"394-401","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/Viroli03","doi":"10.1145/952532.952610","ee":"https://doi.org/10.1145/952532.952610","url":"https://dblp.org/rec/conf/sac/Viroli03"}, "url":"URL#6202927" }, { "@score":"1", "@id":"6202928", "info":{"authors":{"author":[{"@pid":"59/5046","text":"Raphael Volz"},{"@pid":"99/49","text":"Daniel Oberle"},{"@pid":"s/RudiStuder","text":"Rudi Studer"},{"@pid":"s/SteffenStaab","text":"Steffen Staab"}]},"title":"Views for Light-weight Web Ontologies.","venue":"SAC","pages":"1168-1173","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/VolzOSS03","doi":"10.1145/952532.952760","ee":"https://doi.org/10.1145/952532.952760","url":"https://dblp.org/rec/conf/sac/VolzOSS03"}, "url":"URL#6202928" }, { "@score":"1", "@id":"6202929", "info":{"authors":{"author":[{"@pid":"05/4987","text":"Khanh Vu"},{"@pid":"233/0688","text":"Kien A. Hua"},{"@pid":"74/2686","text":"Ning Jiang"}]},"title":"Improving Image Retrieval Effectiveness in Query-by-Example Environment.","venue":"SAC","pages":"774-781","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/VuHJ03","doi":"10.1145/952532.952685","ee":"https://doi.org/10.1145/952532.952685","url":"https://dblp.org/rec/conf/sac/VuHJ03"}, "url":"URL#6202929" }, { "@score":"1", "@id":"6202930", "info":{"authors":{"author":[{"@pid":"61/1542","text":"Alessandro Vullo"},{"@pid":"73/32","text":"Paolo Frasconi"}]},"title":"A Recursive Connectionist Approach for Predicting Disulfide Connectivity in Proteins.","venue":"SAC","pages":"67-71","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/VulloF03","doi":"10.1145/952532.952550","ee":"https://doi.org/10.1145/952532.952550","url":"https://dblp.org/rec/conf/sac/VulloF03"}, "url":"URL#6202930" }, { "@score":"1", "@id":"6202931", "info":{"authors":{"author":{"@pid":"69/6329","text":"Michael S. Wainer"}},"title":"Interactive Computation and Visualization of Fetch Using Standard Computer Graphics Hardware.","venue":"SAC","pages":"961-965","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/Wainer03","doi":"10.1145/952532.952720","ee":"https://doi.org/10.1145/952532.952720","url":"https://dblp.org/rec/conf/sac/Wainer03"}, "url":"URL#6202931" }, { "@score":"1", "@id":"6202932", "info":{"authors":{"author":{"@pid":"83/516","text":"Roger L. Wainwright"}},"title":"Evolutionary Computing and Optimization Track Editorial.","venue":"SAC","pages":"713","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/Wainwright03","doi":"10.1145/952532.952671","ee":"https://doi.org/10.1145/952532.952671","url":"https://dblp.org/rec/conf/sac/Wainwright03"}, "url":"URL#6202932" }, { "@score":"1", "@id":"6202933", "info":{"authors":{"author":[{"@pid":"39/721-1","text":"Hui Wang 0001"},{"@pid":"b/DavidABell","text":"David A. Bell"},{"@pid":"95/3489","text":"Ivo Düntsch"}]},"title":"A Density Based Approach to Classification.","venue":"SAC","pages":"470-474","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/WangBD03","doi":"10.1145/952532.952625","ee":"https://doi.org/10.1145/952532.952625","url":"https://dblp.org/rec/conf/sac/WangBD03"}, "url":"URL#6202933" }, { "@score":"1", "@id":"6202934", "info":{"authors":{"author":{"@pid":"55/1672","text":"Elaine J. Weyuker"}},"title":"Using Operational Distributions to Judge Testing Progress.","venue":"SAC","pages":"1118-1122","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/Weyuker03","doi":"10.1145/952532.952750","ee":"https://doi.org/10.1145/952532.952750","url":"https://dblp.org/rec/conf/sac/Weyuker03"}, "url":"URL#6202934" }, { "@score":"1", "@id":"6202935", "info":{"authors":{"author":[{"@pid":"65/3552","text":"Ruth Wilson"},{"@pid":"67/5797","text":"Monica Landoni"}]},"title":"Evaluating the Usability of Portable Electronic Books.","venue":"SAC","pages":"564-568","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/WilsonL03","doi":"10.1145/952532.952644","ee":"https://doi.org/10.1145/952532.952644","url":"https://dblp.org/rec/conf/sac/WilsonL03"}, "url":"URL#6202935" }, { "@score":"1", "@id":"6202936", "info":{"authors":{"author":[{"@pid":"w/AndreasWombacher","text":"Andreas Wombacher"},{"@pid":"32/5329","text":"Bendick Mahleko"},{"@pid":"r/ThomasRisse","text":"Thomas Risse 0001"}]},"title":"Classification of Ad hoc Multi-lateral Collaborations Based on Local Workflow Models.","venue":"SAC","pages":"1185-1190","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/WombacherMR03","doi":"10.1145/952532.952763","ee":"https://doi.org/10.1145/952532.952763","url":"https://dblp.org/rec/conf/sac/WombacherMR03"}, "url":"URL#6202936" }, { "@score":"1", "@id":"6202937", "info":{"authors":{"author":[{"@pid":"w/ShengliWu","text":"Shengli Wu 0001"},{"@pid":"c/FabioCrestani","text":"Fabio Crestani"}]},"title":"Methods for Ranking Information Retrieval Systems Without Relevance Judgments.","venue":"SAC","pages":"811-816","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/WuC03","doi":"10.1145/952532.952693","ee":"https://doi.org/10.1145/952532.952693","url":"https://dblp.org/rec/conf/sac/WuC03"}, "url":"URL#6202937" }, { "@score":"1", "@id":"6202938", "info":{"authors":{"author":[{"@pid":"95/3747","text":"Yanli Xia"},{"@pid":"h/AHelal","text":"Abdelsalam Helal"}]},"title":"A Dynamic Data/Currency Protocol for Mobile Database Design and Reconfiguration.","venue":"SAC","pages":"550-556","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/XiaH03","doi":"10.1145/952532.952640","ee":"https://doi.org/10.1145/952532.952640","url":"https://dblp.org/rec/conf/sac/XiaH03"}, "url":"URL#6202938" }, { "@score":"1", "@id":"6202939", "info":{"authors":{"author":[{"@pid":"63/1145","text":"Yongqing Xiang"},{"@pid":"85/270","text":"Vanessa Yingling"},{"@pid":"05/4518","text":"Jonathan Silverberg"},{"@pid":"10/2306","text":"Theodore Raphan"},{"@pid":"44/3489","text":"Mitchell B. Schaffler"}]},"title":"Quantification of Trabecular Bone Mass and Orientation Using Gabor Wavelets.","venue":"SAC","pages":"183-188","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/XiangYSRS03","doi":"10.1145/952532.952571","ee":"https://doi.org/10.1145/952532.952571","url":"https://dblp.org/rec/conf/sac/XiangYSRS03"}, "url":"URL#6202939" }, { "@score":"1", "@id":"6202940", "info":{"authors":{"author":[{"@pid":"81/5760","text":"Wanhong Xu"},{"@pid":"44/4806","text":"Larkshmi Krishnamurthy"},{"@pid":"39/1171","text":"Murat Tasan"},{"@pid":"o/GultekinOzsoyoglu","text":"Gultekin Özsoyoglu"},{"@pid":"57/3216","text":"Joseph H. Nadeau"},{"@pid":"o/ZMeralOzsoyoglu","text":"Z. Meral Özsoyoglu"},{"@pid":"20/1066","text":"Greg Schaeffer"}]},"title":"Pathways Database System: An Integrated Set of Tools for Biological Pathways.","venue":"SAC","pages":"96-102","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/XuKTONOS03","doi":"10.1145/952532.952555","ee":"https://doi.org/10.1145/952532.952555","url":"https://dblp.org/rec/conf/sac/XuKTONOS03"}, "url":"URL#6202940" }, { "@score":"1", "@id":"6202941", "info":{"authors":{"author":[{"@pid":"15/637","text":"Shisong Yang"},{"@pid":"71/4625","text":"Chih-Cheng Hung"}]},"title":"Image Texture Classification Using Datagrams and Characteristic Views.","venue":"SAC","pages":"22-26","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/YangH03","doi":"10.1145/952532.952538","ee":"https://doi.org/10.1145/952532.952538","url":"https://dblp.org/rec/conf/sac/YangH03"}, "url":"URL#6202941" }, { "@score":"1", "@id":"6202942", "info":{"authors":{"author":[{"@pid":"91/6139","text":"Cungang Yang"},{"@pid":"z/ChangNianZhang","text":"Chang N. Zhang"}]},"title":"An Approach to Secure Information Flow on Object Oriented Role-based Access Control Model.","venue":"SAC","pages":"302-306","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/YangZ03","doi":"10.1145/952532.952594","ee":"https://doi.org/10.1145/952532.952594","url":"https://dblp.org/rec/conf/sac/YangZ03"}, "url":"URL#6202942" }, { "@score":"1", "@id":"6202943", "info":{"authors":{"author":[{"@pid":"07/4012","text":"Yuen-Tak Yu"},{"@pid":"44/730","text":"Sebastian P. Ng"},{"@pid":"67/1531","text":"Pak-Lok Poon"},{"@pid":"88/612","text":"Tsong Yueh Chen"}]},"title":"On the Use of the Classification-Tree Method by Beginning Software Testers.","venue":"SAC","pages":"1123-1127","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/YuNPC03","doi":"10.1145/952532.952751","ee":"https://doi.org/10.1145/952532.952751","url":"https://dblp.org/rec/conf/sac/YuNPC03"}, "url":"URL#6202943" }, { "@score":"1", "@id":"6202944", "info":{"authors":{"author":[{"@pid":"16/5410","text":"Jinsuo Zhang"},{"@pid":"h/AHelal","text":"Abdelsalam Helal"},{"@pid":"h/JoachimHammer","text":"Joachim Hammer"}]},"title":"UbiData: Ubiquitous Mobile File Service.","venue":"SAC","pages":"893-900","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/ZhangHH03","doi":"10.1145/952532.952708","ee":"https://doi.org/10.1145/952532.952708","url":"https://dblp.org/rec/conf/sac/ZhangHH03"}, "url":"URL#6202944" }, { "@score":"1", "@id":"6202945", "info":{"authors":{"author":[{"@pid":"15/4777-31","text":"Tao Zhang 0031"},{"@pid":"56/5834","text":"Xijian Ping"}]},"title":"A Fast and Effective Steganalytic Technique Against JSteg-like Algorithms.","venue":"SAC","pages":"307-311","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/ZhangP03","doi":"10.1145/952532.952595","ee":"https://doi.org/10.1145/952532.952595","url":"https://dblp.org/rec/conf/sac/ZhangP03"}, "url":"URL#6202945" }, { "@score":"1", "@id":"6202946", "info":{"authors":{"author":[{"@pid":"93/4303","text":"Baihua Zheng"},{"@pid":"14/716","text":"Wang-Chien Lee"},{"@pid":"l/DikLunLee","text":"Dik Lun Lee"}]},"title":"Selecting the Best Valid Scopes for Wireless Dissemination of Location-dependent Data.","venue":"SAC","pages":"860-865","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/ZhengLL03","doi":"10.1145/952532.952703","ee":"https://doi.org/10.1145/952532.952703","url":"https://dblp.org/rec/conf/sac/ZhengLL03"}, "url":"URL#6202946" }, { "@score":"1", "@id":"6202947", "info":{"authors":{"author":[{"@pid":"04/6569","text":"Xing Zhu"},{"@pid":"90/839","text":"Shen Huang"},{"@pid":"43/5685-1","text":"Yong Yu 0001"}]},"title":"Recognizing the Relations between Web Pages Using Artificial Neural Network.","venue":"SAC","pages":"1217-1221","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/ZhuHY03","doi":"10.1145/952532.952768","ee":"https://doi.org/10.1145/952532.952768","url":"https://dblp.org/rec/conf/sac/ZhuHY03"}, "url":"URL#6202947" }, { "@score":"1", "@id":"6202948", "info":{"authors":{"author":{"@pid":"79/1490","text":"Roger Zimmermann"}},"title":"Streaming of DivX AVI Movies.","venue":"SAC","pages":"979-982","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/Zimmermann03","doi":"10.1145/952532.952723","ee":"https://doi.org/10.1145/952532.952723","url":"https://dblp.org/rec/conf/sac/Zimmermann03"}, "url":"URL#6202948" }, { "@score":"1", "@id":"6202949", "info":{"authors":{"author":{"@pid":"79/2159","text":"Peter Zoeteweij"}},"title":"Coordination-Based Distributed Constraint Solving in DICE.","venue":"SAC","pages":"360-366","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/Zoeteweij03","doi":"10.1145/952532.952605","ee":"https://doi.org/10.1145/952532.952605","url":"https://dblp.org/rec/conf/sac/Zoeteweij03"}, "url":"URL#6202949" }, { "@score":"1", "@id":"6214975", "info":{"authors":{"author":[{"@pid":"87/5411","text":"Gary B. Lamont"},{"@pid":"h/HishamHaddad","text":"Hisham Haddad"},{"@pid":"p/GeorgeAngelosPapadopoulos","text":"George A. Papadopoulos"},{"@pid":"52/2112","text":"Brajendra Panda"}]},"title":"Proceedings of the 2003 ACM Symposium on Applied Computing (SAC), March 9-12, 2003, Melbourne, FL, USA","venue":"SAC","publisher":"ACM","year":"2003","type":"Editorship","key":"conf/sac/2003","doi":"10.1145/952532","ee":"https://doi.org/10.1145/952532","url":"https://dblp.org/rec/conf/sac/2003"}, "url":"URL#6214975" } ] } } } )