callback( { "result":{ "query":":facetid:toc:\"db/conf/sac/sac99.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"190.36" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"105", "@dc":"105", "@oc":"105", "@id":"43421956", "text":":facetid:toc:db/conf/sac/sac99.bht" } }, "hits":{ "@total":"105", "@computed":"105", "@sent":"105", "@first":"0", "hit":[{ "@score":"1", "@id":"6545821", "info":{"authors":{"author":[{"@pid":"48/1489","text":"Mahmoud Al-Omari"},{"@pid":"82/1320","text":"Mohammed Mahafzah"}]},"title":"Fault-Tolerant Routing in Hypercubes Using Masked Interval Routing Scheme.","venue":"SAC","pages":"481-485","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/Al-OmariM99","doi":"10.1145/298151.298424","ee":"https://doi.org/10.1145/298151.298424","url":"https://dblp.org/rec/conf/sac/Al-OmariM99"}, "url":"URL#6545821" }, { "@score":"1", "@id":"6545822", "info":{"authors":{"author":[{"@pid":"70/4584","text":"Mohammed Almulla"},{"@pid":"94/2997","text":"Tadeusz Szuba"}]},"title":"Toward a Computational Model of Collective Intelligence and its IQ Measure.","venue":"SAC","pages":"2-7","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/AlmullaS99","doi":"10.1145/298151.298162","ee":"https://doi.org/10.1145/298151.298162","url":"https://dblp.org/rec/conf/sac/AlmullaS99"}, "url":"URL#6545822" }, { "@score":"1", "@id":"6545823", "info":{"authors":{"author":[{"@pid":"a/MAncona","text":"Massimo Ancona"},{"@pid":"d/GDodero","text":"Gabriella Dodero"},{"@pid":"g/VittoriaGianuzzi","text":"Vittoria Gianuzzi"}]},"title":"Mobile Computing in Outdoor Environments (Extended Abstract).","venue":"SAC","pages":"413-415","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/AnconaDG99","doi":"10.1145/298151.298403","ee":"https://doi.org/10.1145/298151.298403","url":"https://dblp.org/rec/conf/sac/AnconaDG99"}, "url":"URL#6545823" }, { "@score":"1", "@id":"6545824", "info":{"authors":{"author":[{"@pid":"93/1578","text":"Tetsuo Araki"},{"@pid":"72/1164","text":"Satoru Ikehara"},{"@pid":"39/6500","text":"Yasunori Komatsu"}]},"title":"Detection and Correction of Mutually Interfered Erroneous Characters in Japanese Texts.","venue":"SAC","pages":"36-40","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/ArakiIK99","doi":"10.1145/298151.298178","ee":"https://doi.org/10.1145/298151.298178","url":"https://dblp.org/rec/conf/sac/ArakiIK99"}, "url":"URL#6545824" }, { "@score":"1", "@id":"6545825", "info":{"authors":{"author":[{"@pid":"36/4623","text":"Francesca Arcelli Fontana"},{"@pid":"54/3109","text":"Ferrante Formato"}]},"title":"Likelog: A Logic Programming Language for Flexible Data Retrieval.","venue":"SAC","pages":"260-267","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/ArcelliF99","doi":"10.1145/298151.298348","ee":"https://doi.org/10.1145/298151.298348","url":"https://dblp.org/rec/conf/sac/ArcelliF99"}, "url":"URL#6545825" }, { "@score":"1", "@id":"6545826", "info":{"authors":{"author":[{"@pid":"73/2111","text":"Sangman Bak"},{"@pid":"c/JACobb","text":"Jorge Arturo Cobb"}]},"title":"Randomized Distance-Vector Routing Protocol.","venue":"SAC","pages":"78-84","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/BakC99","doi":"10.1145/298151.298201","ee":"https://doi.org/10.1145/298151.298201","url":"https://dblp.org/rec/conf/sac/BakC99"}, "url":"URL#6545826" }, { "@score":"1", "@id":"6545827", "info":{"authors":{"author":[{"@pid":"70/1620","text":"Mostafa A. Bassiouni"},{"@pid":"42/2231","text":"Chun-Chin Fang"}]},"title":"Dynamic Channel Allocation for Linear Macrocellular Topology.","venue":"SAC","pages":"382-388","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/BassiouniF99","doi":"10.1145/298151.298391","ee":"https://doi.org/10.1145/298151.298391","url":"https://dblp.org/rec/conf/sac/BassiouniF99"}, "url":"URL#6545827" }, { "@score":"1", "@id":"6545828", "info":{"authors":{"author":[{"@pid":"36/5340","text":"Luí Bento"},{"@pid":"80/3546","text":"Luísa Pereira"},{"@pid":"r/AgostinhoCRosa","text":"Agostinho C. Rosa"}]},"title":"Mastermind by Evolutionary Algorithms.","venue":"SAC","pages":"307-311","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/BentoPR99","doi":"10.1145/298151.298360","ee":"https://doi.org/10.1145/298151.298360","url":"https://dblp.org/rec/conf/sac/BentoPR99"}, "url":"URL#6545828" }, { "@score":"1", "@id":"6545829", "info":{"authors":{"author":{"@pid":"b/DavidBinkley","text":"David W. Binkley"}},"title":"Computing Amorphous Program Slices Using Dependence Graphs.","venue":"SAC","pages":"519-525","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/Binkley99","doi":"10.1145/298151.298432","ee":"https://doi.org/10.1145/298151.298432","url":"https://dblp.org/rec/conf/sac/Binkley99"}, "url":"URL#6545829" }, { "@score":"1", "@id":"6545830", "info":{"authors":{"author":[{"@pid":"99/5652","text":"Marcello M. Bonsangue"},{"@pid":"k/JoostNKok","text":"Joost N. Kok"}]},"title":"Comparing Coordination Models Based on Shared Distributed Replicated Data.","venue":"SAC","pages":"156-165","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/BonsangueK99","doi":"10.1145/298151.298226","ee":"https://doi.org/10.1145/298151.298226","url":"https://dblp.org/rec/conf/sac/BonsangueK99"}, "url":"URL#6545830" }, { "@score":"1", "@id":"6545831", "info":{"authors":{"author":[{"@pid":"28/3198","text":"Noureddine Boudriga"},{"@pid":"01/4600","text":"O. Hassairi"},{"@pid":"91/2882","text":"Mohammad S. Obaidat"}]},"title":"Intelligent Services Integration in Mobile ATM Networks.","venue":"SAC","pages":"91-97","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/BoudrigaHO99","doi":"10.1145/298151.298209","ee":"https://doi.org/10.1145/298151.298209","url":"https://dblp.org/rec/conf/sac/BoudrigaHO99"}, "url":"URL#6545831" }, { "@score":"1", "@id":"6545832", "info":{"authors":{"author":[{"@pid":"99/4750","text":"Janez Brest"},{"@pid":"46/3960","text":"Viljem Zumer"},{"@pid":"32/963","text":"Milan Ojstersek"}]},"title":"Dynamic Scheduling on a PC Cluster.","venue":"SAC","pages":"496-500","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/BrestZO99","doi":"10.1145/298151.298428","ee":"https://doi.org/10.1145/298151.298428","url":"https://dblp.org/rec/conf/sac/BrestZO99"}, "url":"URL#6545832" }, { "@score":"1", "@id":"6545833", "info":{"authors":{"author":{"@pid":"79/5646","text":"Mirta Noemí Sataka Bugarin"}},"title":"Linear Quadratic Approximation for Solving a Model Economy Distorted by Progressive Taxation.","venue":"SAC","pages":"52-56","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/Bugarin99","doi":"10.1145/298151.298189","ee":"https://doi.org/10.1145/298151.298189","url":"https://dblp.org/rec/conf/sac/Bugarin99"}, "url":"URL#6545833" }, { "@score":"1", "@id":"6545834", "info":{"authors":{"author":[{"@pid":"74/2024","text":"James D. Callahan"},{"@pid":"45/677","text":"John M. Tyler"}]},"title":"Parallel Implementation of a Frontal Finite Element Solver on Multiple Platforms.","venue":"SAC","pages":"491-495","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/CallahanT99","doi":"10.1145/298151.298427","ee":"https://doi.org/10.1145/298151.298427","url":"https://dblp.org/rec/conf/sac/CallahanT99"}, "url":"URL#6545834" }, { "@score":"1", "@id":"6545835", "info":{"authors":{"author":[{"@pid":"01/1867","text":"Feng Cao"},{"@pid":"d/DingZhuDu","text":"Ding-Zhu Du"}]},"title":"Fault-Tolerant Routing and Multicasting in Butterfly Networks.","venue":"SAC","pages":"455-460","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/CaoD99","doi":"10.1145/298151.298420","ee":"https://doi.org/10.1145/298151.298420","url":"https://dblp.org/rec/conf/sac/CaoD99"}, "url":"URL#6545835" }, { "@score":"1", "@id":"6545836", "info":{"authors":{"author":[{"@pid":"05/3547","text":"Stephen Chi-fai Chan"},{"@pid":"66/4727","text":"Martin Wong"},{"@pid":"n/VTYNg","text":"Vincent Ng 0002"}]},"title":"Collaborative Solid Modeling on the WWW.","venue":"SAC","pages":"598-602","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/ChanWN99","doi":"10.1145/298151.298487","ee":"https://doi.org/10.1145/298151.298487","url":"https://dblp.org/rec/conf/sac/ChanWN99"}, "url":"URL#6545836" }, { "@score":"1", "@id":"6545837", "info":{"authors":{"author":[{"@pid":"09/3459","text":"Chia-Chu Chiang"},{"@pid":"45/914","text":"David Neubart"}]},"title":"Constructing Reusable Specifications Through Analogy.","venue":"SAC","pages":"586-592","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/ChiangN99","doi":"10.1145/298151.298481","ee":"https://doi.org/10.1145/298151.298481","url":"https://dblp.org/rec/conf/sac/ChiangN99"}, "url":"URL#6545837" }, { "@score":"1", "@id":"6545838", "info":{"authors":{"author":[{"@pid":"92/4743","text":"Kuan-Shiu Chiu"},{"@pid":"71/1275","text":"Andrew Hunter"}]},"title":"GA Design of Crisp-Fuzzy Logic Controllers.","venue":"SAC","pages":"238-242","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/ChiuH99","doi":"10.1145/298151.298337","ee":"https://doi.org/10.1145/298151.298337","url":"https://dblp.org/rec/conf/sac/ChiuH99"}, "url":"URL#6545838" }, { "@score":"1", "@id":"6545839", "info":{"authors":{"author":[{"@pid":"00/2822","text":"Anna Ciampolini"},{"@pid":"l/EvelinaLamma","text":"Evelina Lamma"},{"@pid":"m/PMello","text":"Paola Mello"},{"@pid":"19/4945","text":"Cesare Stefanelli"}]},"title":"Abductive Coordination for Logic Agents.","venue":"SAC","pages":"134-140","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/CiampoliniLMS99","doi":"10.1145/298151.298222","ee":"https://doi.org/10.1145/298151.298222","url":"https://dblp.org/rec/conf/sac/CiampoliniLMS99"}, "url":"URL#6545839" }, { "@score":"1", "@id":"6545840", "info":{"authors":{"author":[{"@pid":"42/3786","text":"Ferdinando Cicalese"},{"@pid":"61/351","text":"Antonio Di Nola"},{"@pid":"35/3222","text":"Vincenzo Loia"}]},"title":"A Fuzzy Evolutionary Framework for Adaptive Agents.","venue":"SAC","pages":"233-237","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/CicaleseNL99","doi":"10.1145/298151.298333","ee":"https://doi.org/10.1145/298151.298333","url":"https://dblp.org/rec/conf/sac/CicaleseNL99"}, "url":"URL#6545840" }, { "@score":"1", "@id":"6545841", "info":{"authors":{"author":[{"@pid":"80/457","text":"D. Scott Crane"},{"@pid":"83/516","text":"Roger L. Wainwright"},{"@pid":"79/1153","text":"Dale A. Schoenefeld"}]},"title":"Scheduling of Multi-Product Fungible Liquid Pipelines Using Genetic Algorithms.","venue":"SAC","pages":"280-285","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/CraneWS99","doi":"10.1145/298151.298352","ee":"https://doi.org/10.1145/298151.298352","url":"https://dblp.org/rec/conf/sac/CraneWS99"}, "url":"URL#6545841" }, { "@score":"1", "@id":"6545842", "info":{"authors":{"author":[{"@pid":"21/5205","text":"Marco Cremonini"},{"@pid":"o/AndreaOmicini","text":"Andrea Omicini"},{"@pid":"54/3140","text":"Franco Zambonelli"}]},"title":"Modelling Network Topology and Mobile Agent Interaction: An Integrated Framework.","venue":"SAC","pages":"410-412","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/CremoniniOZ99","doi":"10.1145/298151.298402","ee":"https://doi.org/10.1145/298151.298402","url":"https://dblp.org/rec/conf/sac/CremoniniOZ99"}, "url":"URL#6545842" }, { "@score":"1", "@id":"6545843", "info":{"authors":{"author":[{"@pid":"d/EDamiani","text":"Ernesto Damiani"},{"@pid":"60/88","text":"Rajiv Khosla"}]},"title":"A Human Centered Agent-Based Architecture for Electronic brokerage.","venue":"SAC","pages":"243-249","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/DamianiK99","doi":"10.1145/298151.298340","ee":"https://doi.org/10.1145/298151.298340","url":"https://dblp.org/rec/conf/sac/DamianiK99"}, "url":"URL#6545843" }, { "@score":"1", "@id":"6545844", "info":{"authors":{"author":[{"@pid":"85/5942","text":"Sanjoy Das"},{"@pid":"78/3017","text":"Betty A. Bowles"},{"@pid":"63/3839","text":"Chris R. Houghland"},{"@pid":"52/3521","text":"Steven J. Hunn"},{"@pid":"99/3536","text":"YunLong Zhang"}]},"title":"A Knowledge Based Model of Traffic Behavior in Freeways.","venue":"SAC","pages":"14-18","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/DasBHHZ99","doi":"10.1145/298151.298169","ee":"https://doi.org/10.1145/298151.298169","url":"https://dblp.org/rec/conf/sac/DasBHHZ99"}, "url":"URL#6545844" }, { "@score":"1", "@id":"6545845", "info":{"authors":{"author":[{"@pid":"21/7002","text":"Clifton Davis"},{"@pid":"e/CFEick","text":"Christoph F. Eick"}]},"title":"Emperor: Cheap Legal Secure Cryptography for the Web.","venue":"SAC","pages":"603-609","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/DavisE99","doi":"10.1145/298151.298489","ee":"https://doi.org/10.1145/298151.298489","url":"https://dblp.org/rec/conf/sac/DavisE99"}, "url":"URL#6545845" }, { "@score":"1", "@id":"6545846", "info":{"authors":{"author":[{"@pid":"97/1313","text":"Romeo A. Dumitrescu"},{"@pid":"29/5397","text":"Edgar F. A. Lederer"}]},"title":"Reliable and Efficient Matrix Processing with the Specification-Consistent Coordination Model.","venue":"SAC","pages":"191-193","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/DumitrescuL99","doi":"10.1145/298151.298239","ee":"https://doi.org/10.1145/298151.298239","url":"https://dblp.org/rec/conf/sac/DumitrescuL99"}, "url":"URL#6545846" }, { "@score":"1", "@id":"6545847", "info":{"authors":{"author":[{"@pid":"21/2836","text":"Larry A. Dunning"},{"@pid":"66/4319","text":"Sub Ramakrishnan"}]},"title":"A Heuristic Cost Estimation Method for Optimizing Assignment of Tasks to Processors.","venue":"SAC","pages":"358-364","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/DunningR99","doi":"10.1145/298151.298384","ee":"https://doi.org/10.1145/298151.298384","url":"https://dblp.org/rec/conf/sac/DunningR99"}, "url":"URL#6545847" }, { "@score":"1", "@id":"6545848", "info":{"authors":{"author":[{"@pid":"77/3566","text":"John W. Fenwick"},{"@pid":"48/2769","text":"L. Jonathan Dowell"}]},"title":"Electrical Substation Service-Area Estimation Using Cellular Automata: An Initial Report.","venue":"SAC","pages":"560-565","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/FenwickD99","doi":"10.1145/298151.298474","ee":"https://doi.org/10.1145/298151.298474","url":"https://dblp.org/rec/conf/sac/FenwickD99"}, "url":"URL#6545848" }, { "@score":"1", "@id":"6545849", "info":{"authors":{"author":[{"@pid":"22/5774","text":"Carlos M. Fernandes 0001"},{"@pid":"26/63","text":"João Paulo Caldeira"},{"@pid":"55/3924","text":"Fernando Melicio"},{"@pid":"r/AgostinhoCRosa","text":"Agostinho C. Rosa"}]},"title":"High School Weekly Timetabling by Evolutionary Algorithms.","venue":"SAC","pages":"344-350","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/FernandesCMR99","doi":"10.1145/298151.298379","ee":"https://doi.org/10.1145/298151.298379","url":"https://dblp.org/rec/conf/sac/FernandesCMR99"}, "url":"URL#6545849" }, { "@score":"1", "@id":"6545850", "info":{"authors":{"author":[{"@pid":"09/1872","text":"Pamela K. Fink"},{"@pid":"14/5751","text":"L. Tandy Herren"}]},"title":"The Disease Progression Explorer: Risk Assessment Support in Chronic, Multifactorial Diseases.","venue":"SAC","pages":"46-51","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/FinkH99","doi":"10.1145/298151.298185","ee":"https://doi.org/10.1145/298151.298185","url":"https://dblp.org/rec/conf/sac/FinkH99"}, "url":"URL#6545850" }, { "@score":"1", "@id":"6545851", "info":{"authors":{"author":[{"@pid":"g/HWGellersen","text":"Hans-Werner Gellersen"},{"@pid":"97/4178","text":"Michael Beigl"},{"@pid":"s/AlbrechtSchmidt1","text":"Albrecht Schmidt 0001"}]},"title":"Environment-Mediated Mobile Computing.","venue":"SAC","pages":"416-418","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/GellersenBS99","doi":"10.1145/298151.298404","ee":"https://doi.org/10.1145/298151.298404","url":"https://dblp.org/rec/conf/sac/GellersenBS99"}, "url":"URL#6545851" }, { "@score":"1", "@id":"6545852", "info":{"authors":{"author":[{"@pid":"03/5458","text":"Prasad N. Golla"},{"@pid":"l/EricCLin","text":"Eric C. Lin"}]},"title":"A Dynamic Scheduling Logic for Exploiting Multiple Functional Units in Single Ship Multithreaded Architectures.","venue":"SAC","pages":"466-473","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/GollaL99","doi":"10.1145/298151.298422","ee":"https://doi.org/10.1145/298151.298422","url":"https://dblp.org/rec/conf/sac/GollaL99"}, "url":"URL#6545852" }, { "@score":"1", "@id":"6545853", "info":{"authors":{"author":{"@pid":"h/RamziAHaraty","text":"Ramzi A. Haraty"}},"title":"C2 Secure Database Management Systems - A Comparative Study.","venue":"SAC","pages":"216-220","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/Haraty99","doi":"10.1145/298151.298250","ee":"https://doi.org/10.1145/298151.298250","url":"https://dblp.org/rec/conf/sac/Haraty99"}, "url":"URL#6545853" }, { "@score":"1", "@id":"6545854", "info":{"authors":{"author":[{"@pid":"27/5788","text":"Aaron Harwood"},{"@pid":"74/3247-1","text":"Hong Shen 0001"}]},"title":"A Method of Trading Diameter for Reduced Degree to Construct Low Cost Interconnection Networks.","venue":"SAC","pages":"474-480","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/HarwoodS99","doi":"10.1145/298151.298423","ee":"https://doi.org/10.1145/298151.298423","url":"https://dblp.org/rec/conf/sac/HarwoodS99"}, "url":"URL#6545854" }, { "@score":"1", "@id":"6545855", "info":{"authors":{"author":{"@pid":"08/6573","text":"Thomas Haynes"}},"title":"Distributed Collective Adaptation Applied to Hard Combinatorial Optimization Problem.","venue":"SAC","pages":"339-343","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/Haynes99","doi":"10.1145/298151.298377","ee":"https://doi.org/10.1145/298151.298377","url":"https://dblp.org/rec/conf/sac/Haynes99"}, "url":"URL#6545855" }, { "@score":"1", "@id":"6545856", "info":{"authors":{"author":{"@pid":"08/6573","text":"Thomas Haynes"}},"title":"Distributing Collective Adaptation via Message Passing.","venue":"SAC","pages":"501-505","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/Haynes99a","doi":"10.1145/298151.298429","ee":"https://doi.org/10.1145/298151.298429","url":"https://dblp.org/rec/conf/sac/Haynes99a"}, "url":"URL#6545856" }, { "@score":"1", "@id":"6545857", "info":{"authors":{"author":[{"@pid":"82/6042","text":"Ana Carolina Hermann"},{"@pid":"g/LPGaspary","text":"Luciano Paschoal Gaspary"},{"@pid":"a/MariaJanilceBosquiroliAlmeida","text":"Maria Janilce B. Almeida"}]},"title":"Design and Execution of Adaptive Multimedia Applications in the Internet.","venue":"SAC","pages":"624-629","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/HermannGA99","doi":"10.1145/298151.298502","ee":"https://doi.org/10.1145/298151.298502","url":"https://dblp.org/rec/conf/sac/HermannGA99"}, "url":"URL#6545857" }, { "@score":"1", "@id":"6545858", "info":{"authors":{"author":[{"@pid":"84/800","text":"Dorota M. Huizinga"},{"@pid":"85/3679","text":"Christine Ames"}]},"title":"Mobile File System Support with Virtual Device Drivers.","venue":"SAC","pages":"373-381","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/HuizingaA99","doi":"10.1145/298151.298389","ee":"https://doi.org/10.1145/298151.298389","url":"https://dblp.org/rec/conf/sac/HuizingaA99"}, "url":"URL#6545858" }, { "@score":"1", "@id":"6545859", "info":{"authors":{"author":[{"@pid":"56/5854","text":"Randolph L. Jackson"},{"@pid":"53/2728","text":"Wayne Taylor"},{"@pid":"04/4669","text":"William Winn"}]},"title":"Peer Collaboration and Virtual Environments: A Preliminary Investigation of Multi-Participant Virtual Reality Applied in Science Education.","venue":"SAC","pages":"121-125","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/JacksonTW99","doi":"10.1145/298151.298219","ee":"https://doi.org/10.1145/298151.298219","url":"https://dblp.org/rec/conf/sac/JacksonTW99"}, "url":"URL#6545859" }, { "@score":"1", "@id":"6545860", "info":{"authors":{"author":[{"@pid":"98/1325","text":"Kjetil Jacobsen"},{"@pid":"11/5888","text":"Dag Johansen"}]},"title":"Ubiquitous Devices United: Enabling Distributed Computing Through Mobile Code.","venue":"SAC","pages":"399-404","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/JacobsenJ99","doi":"10.1145/298151.298395","ee":"https://doi.org/10.1145/298151.298395","url":"https://dblp.org/rec/conf/sac/JacobsenJ99"}, "url":"URL#6545860" }, { "@score":"1", "@id":"6545861", "info":{"authors":{"author":{"@pid":"01/6897","text":"John Jing-Fu Jenq"}},"title":"Parallel Polygon Scan Conversion on Hypercube Multiprocessors.","venue":"SAC","pages":"110-114","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/Jenq99","doi":"10.1145/298151.298215","ee":"https://doi.org/10.1145/298151.298215","url":"https://dblp.org/rec/conf/sac/Jenq99"}, "url":"URL#6545861" }, { "@score":"1", "@id":"6545862", "info":{"authors":{"author":[{"@pid":"40/4806","text":"Ricardo Jiménez-Peris"},{"@pid":"97/3041","text":"Marta Patiño-Martínez"},{"@pid":"22/4937","text":"Sergio Arévalo"}]},"title":"Multithreaded Rendezvous: A Design Pattern for Distributed Rendezvous.","venue":"SAC","pages":"571-579","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/Jimenez-PerisPA99","doi":"10.1145/298151.298472","ee":"https://doi.org/10.1145/298151.298472","url":"https://dblp.org/rec/conf/sac/Jimenez-PerisPA99"}, "url":"URL#6545862" }, { "@score":"1", "@id":"6545863", "info":{"authors":{"author":[{"@pid":"40/4806","text":"Ricardo Jiménez-Peris"},{"@pid":"97/3041","text":"Marta Patiño-Martínez"},{"@pid":"06/5855","text":"Jorge Pacios-Martínez"}]},"title":"VisMod: A Beginner-Friendly Programming Environment.","venue":"SAC","pages":"115-120","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/Jimenez-PerisPP99","doi":"10.1145/298151.298218","ee":"https://doi.org/10.1145/298151.298218","url":"https://dblp.org/rec/conf/sac/Jimenez-PerisPP99"}, "url":"URL#6545863" }, { "@score":"1", "@id":"6545864", "info":{"authors":{"author":[{"@pid":"98/4156","text":"Hai Jin 0001"},{"@pid":"85/276-1","text":"Kai Hwang 0001"}]},"title":"False Sharing Problems in Cluster-Based Disk Arrays.","venue":"SAC","pages":"461-465","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/JinH99","doi":"10.1145/298151.298421","ee":"https://doi.org/10.1145/298151.298421","url":"https://dblp.org/rec/conf/sac/JinH99"}, "url":"URL#6545864" }, { "@score":"1", "@id":"6545865", "info":{"authors":{"author":[{"@pid":"74/1297","text":"Chang-Hyun Jo"},{"@pid":"81/4252","text":"Jea Gi Son"},{"@pid":"76/3911","text":"Younwoo Kang"},{"@pid":"14/4509","text":"Phill Soo Lim"}]},"title":"The Distributed Programming Environment on the Internet.","venue":"SAC","pages":"85-90","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/JoSKL99","doi":"10.1145/298151.298206","ee":"https://doi.org/10.1145/298151.298206","url":"https://dblp.org/rec/conf/sac/JoSKL99"}, "url":"URL#6545865" }, { "@score":"1", "@id":"6545866", "info":{"authors":{"author":[{"@pid":"56/4313","text":"Michael Jones"},{"@pid":"12/1374","text":"Aaron H. Konstam"}]},"title":"The Use of Genetic Algorithms and Neural Networks to Investigate the Baldwin Effect.","venue":"SAC","pages":"275-279","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/JonesK99","doi":"10.1145/298151.298350","ee":"https://doi.org/10.1145/298151.298350","url":"https://dblp.org/rec/conf/sac/JonesK99"}, "url":"URL#6545866" }, { "@score":"1", "@id":"6545867", "info":{"authors":{"author":{"@pid":"j/BryantAJulstrom","text":"Bryant A. Julstrom"}},"title":"Coding TSP Tours as Permutations via an Insertion Heuristic.","venue":"SAC","pages":"297-301","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/Julstrom99","doi":"10.1145/298151.298356","ee":"https://doi.org/10.1145/298151.298356","url":"https://dblp.org/rec/conf/sac/Julstrom99"}, "url":"URL#6545867" }, { "@score":"1", "@id":"6545868", "info":{"authors":{"author":{"@pid":"35/1412","text":"Taisei Kaizoji"}},"title":"A Synergetic Approach to Speculative Price Volatility.","venue":"SAC","pages":"57-65","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/Kaizoji99","doi":"10.1145/298151.298191","ee":"https://doi.org/10.1145/298151.298191","url":"https://dblp.org/rec/conf/sac/Kaizoji99"}, "url":"URL#6545868" }, { "@score":"1", "@id":"6545869", "info":{"authors":{"author":[{"@pid":"24/1342","text":"Kengo Katayama"},{"@pid":"93/3660","text":"Hiroyuki Narihisa"}]},"title":"A New Iterated Local Search Algorithm Using Genetic Crossover for the Traveling Salesman Problem.","venue":"SAC","pages":"302-306","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/KatayamaN99","doi":"10.1145/298151.298359","ee":"https://doi.org/10.1145/298151.298359","url":"https://dblp.org/rec/conf/sac/KatayamaN99"}, "url":"URL#6545869" }, { "@score":"1", "@id":"6545870", "info":{"authors":{"author":[{"@pid":"61/343","text":"Matthew Kessler"},{"@pid":"08/6573","text":"Thomas Haynes"}]},"title":"Depth-Fair Crossover in Genetic Programming.","venue":"SAC","pages":"319-323","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/KesslerH99","doi":"10.1145/298151.298365","ee":"https://doi.org/10.1145/298151.298365","url":"https://dblp.org/rec/conf/sac/KesslerH99"}, "url":"URL#6545870" }, { "@score":"1", "@id":"6545871", "info":{"authors":{"author":[{"@pid":"95/3651","text":"Seyit Kocberber"},{"@pid":"c/FazliCan","text":"Fazli Can"}]},"title":"Compressed Multi-Framed Signature Files: An Index Structure for Fast Information Retrieval.","venue":"SAC","pages":"221-226","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/KocberberC99","doi":"10.1145/298151.298253","ee":"https://doi.org/10.1145/298151.298253","url":"https://dblp.org/rec/conf/sac/KocberberC99"}, "url":"URL#6545871" }, { "@score":"1", "@id":"6545872", "info":{"authors":{"author":{"@pid":"14/6712","text":"Malini Krishnamurthi"}},"title":"Integrating E-Mail in a Programming Class: Implications for Teaching Programming.","venue":"SAC","pages":"126-131","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/Krishnamurthi99","doi":"10.1145/298151.298220","ee":"https://doi.org/10.1145/298151.298220","url":"https://dblp.org/rec/conf/sac/Krishnamurthi99"}, "url":"URL#6545872" }, { "@score":"1", "@id":"6545873", "info":{"authors":{"author":{"@pid":"33/2534","text":"Michail G. Lagoudakis"}},"title":"An IDA Algorithm for Optimal Spare Allocation.","venue":"SAC","pages":"486-488","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/Lagoudakis99","doi":"10.1145/298151.298425","ee":"https://doi.org/10.1145/298151.298425","url":"https://dblp.org/rec/conf/sac/Lagoudakis99"}, "url":"URL#6545873" }, { "@score":"1", "@id":"6545874", "info":{"authors":{"author":[{"@pid":"75/1371","text":"Johannes Lauber"},{"@pid":"50/4233","text":"Christian Steger"},{"@pid":"83/6274","text":"Reinhold Weiss"}]},"title":"Applied Probabilistic AI for Online Diagnosis of a Safety-Critical System Based on a Quality Assurance Program.","venue":"SAC","pages":"25-30","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/LauberSW99","doi":"10.1145/298151.298172","ee":"https://doi.org/10.1145/298151.298172","url":"https://dblp.org/rec/conf/sac/LauberSW99"}, "url":"URL#6545874" }, { "@score":"1", "@id":"6545875", "info":{"authors":{"author":[{"@pid":"66/2755","text":"Gary T. Leavens"},{"@pid":"19/1176","text":"Tim Wahls"},{"@pid":"86/6821","text":"Albert L. Baker"}]},"title":"Formal Semantics for SA Style Data Flow Diagram Specification Languages.","venue":"SAC","pages":"526-532","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/LeavensWB99","doi":"10.1145/298151.298433","ee":"https://doi.org/10.1145/298151.298433","url":"https://dblp.org/rec/conf/sac/LeavensWB99"}, "url":"URL#6545875" }, { "@score":"1", "@id":"6545876", "info":{"authors":{"author":{"@pid":"45/6948","text":"In Lee"}},"title":"Artificial Intelligence Search Methods for Multi-Machine Two-Stage Scheduling.","venue":"SAC","pages":"31-35","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/Lee99","doi":"10.1145/298151.298174","ee":"https://doi.org/10.1145/298151.298174","url":"https://dblp.org/rec/conf/sac/Lee99"}, "url":"URL#6545876" }, { "@score":"1", "@id":"6545877", "info":{"authors":{"author":[{"@pid":"21/4384","text":"Congxiao Lu"},{"@pid":"10/5594","text":"David J. Russomanno"}]},"title":"KAT: A Knowledge Acquisition Tool for Acquiring Functional Knowledge Based Upon the No-Causality-In-Functional Principle.","venue":"SAC","pages":"8-13","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/LuR99","doi":"10.1145/298151.298166","ee":"https://doi.org/10.1145/298151.298166","url":"https://dblp.org/rec/conf/sac/LuR99"}, "url":"URL#6545877" }, { "@score":"1", "@id":"6545878", "info":{"authors":{"author":[{"@pid":"38/5554","text":"Robert E. Marmelstein"},{"@pid":"87/5411","text":"Gary B. Lamont"}]},"title":"A New Approach for Evolving Clusters.","venue":"SAC","pages":"268-274","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/MarmelsteinL99","doi":"10.1145/298151.298349","ee":"https://doi.org/10.1145/298151.298349","url":"https://dblp.org/rec/conf/sac/MarmelsteinL99"}, "url":"URL#6545878" }, { "@score":"1", "@id":"6545879", "info":{"authors":{"author":[{"@pid":"26/204","text":"Françoise Mocellin"},{"@pid":"08/5956","text":"Hervé Martin"}]},"title":"Modelling Behavioral Aspects of Multimedia Presentations Using an Active Object DBMS.","venue":"SAC","pages":"450-454","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/MocellinM99","doi":"10.1145/298151.298419","ee":"https://doi.org/10.1145/298151.298419","url":"https://dblp.org/rec/conf/sac/MocellinM99"}, "url":"URL#6545879" }, { "@score":"1", "@id":"6545880", "info":{"authors":{"author":{"@pid":"29/5834","text":"Éric Monfroy"}},"title":"Using "Weaker" Functions for Constraint Propagation Over Real Numbers.","venue":"SAC","pages":"553-559","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/Monfroy99","doi":"10.1145/298151.298473","ee":"https://doi.org/10.1145/298151.298473","url":"https://dblp.org/rec/conf/sac/Monfroy99"}, "url":"URL#6545880" }, { "@score":"1", "@id":"6545881", "info":{"authors":{"author":[{"@pid":"29/5834","text":"Éric Monfroy"},{"@pid":"10/3358","text":"Jean-Hugues Réty"}]},"title":"Chaotic Iteration for Distributed Constraint Propagation.","venue":"SAC","pages":"19-24","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/MonfroyR99","doi":"10.1145/298151.298170","ee":"https://doi.org/10.1145/298151.298170","url":"https://dblp.org/rec/conf/sac/MonfroyR99"}, "url":"URL#6545881" }, { "@score":"1", "@id":"6545882", "info":{"authors":{"author":[{"@pid":"23/3020","text":"Peter L. Mott"},{"@pid":"35/3261","text":"Stuart A. Roberts"}]},"title":"A Multi-Broker Architecture for Sharing Information Amongst Diverse User Communities.","venue":"SAC","pages":"194-196","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/MottR99","doi":"10.1145/298151.298241","ee":"https://doi.org/10.1145/298151.298241","url":"https://dblp.org/rec/conf/sac/MottR99"}, "url":"URL#6545882" }, { "@score":"1", "@id":"6545883", "info":{"authors":{"author":[{"@pid":"68/1567","text":"Nobuyuki Nezu"},{"@pid":"34/3372","text":"Huizhu Lu"}]},"title":"Modeling Deflection Networks: Design and Specification.","venue":"SAC","pages":"66-73","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/NezuL99","doi":"10.1145/298151.298195","ee":"https://doi.org/10.1145/298151.298195","url":"https://dblp.org/rec/conf/sac/NezuL99"}, "url":"URL#6545883" }, { "@score":"1", "@id":"6545884", "info":{"authors":{"author":[{"@pid":"29/2399","text":"Kazuhiro Ogata 0001"},{"@pid":"47/2175","text":"Shigenori Ioroi"},{"@pid":"f/KokichiFutatsugi","text":"Kokichi Futatsugi"}]},"title":"Optimizing Term Rewriting Using Discrimination Nets With Specialization.","venue":"SAC","pages":"511-518","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/OgataIF99","doi":"10.1145/298151.298431","ee":"https://doi.org/10.1145/298151.298431","url":"https://dblp.org/rec/conf/sac/OgataIF99"}, "url":"URL#6545884" }, { "@score":"1", "@id":"6545885", "info":{"authors":{"author":{"@pid":"o/AndreaOmicini","text":"Andrea Omicini"}},"title":"On the Semantics of Tuple-Based Coordination Models.","venue":"SAC","pages":"175-182","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/Omicini99","doi":"10.1145/298151.298229","ee":"https://doi.org/10.1145/298151.298229","url":"https://dblp.org/rec/conf/sac/Omicini99"}, "url":"URL#6545885" }, { "@score":"1", "@id":"6545886", "info":{"authors":{"author":[{"@pid":"o/AndreaOmicini","text":"Andrea Omicini"},{"@pid":"54/3140","text":"Franco Zambonelli"}]},"title":"Tuple Centres for the Coordination of Internet Agents.","venue":"SAC","pages":"183-190","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/OmiciniZ99","doi":"10.1145/298151.298231","ee":"https://doi.org/10.1145/298151.298231","url":"https://dblp.org/rec/conf/sac/OmiciniZ99"}, "url":"URL#6545886" }, { "@score":"1", "@id":"6545887", "info":{"authors":{"author":[{"@pid":"78/5738","text":"David A. Owens"},{"@pid":"32/6111","text":"Frederick T. Sheldon"}]},"title":"Tool-Based Approach to Distributed Database Design: Includes Web-Based Forms Design for Access to Academic Affairs Data.","venue":"SAC","pages":"227-231","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/OwensS99","doi":"10.1145/298151.298314","ee":"https://doi.org/10.1145/298151.298314","url":"https://dblp.org/rec/conf/sac/OwensS99"}, "url":"URL#6545887" }, { "@score":"1", "@id":"6545888", "info":{"authors":{"author":{"@pid":"p/GeorgeAngelosPapadopoulos","text":"George A. Papadopoulos"}},"title":"Special Track on Coordination Models, Languages and Applications.","venue":"SAC","pages":"132-133","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/Papadopoulos99","doi":"10.1145/298151.298221","ee":"https://doi.org/10.1145/298151.298221","url":"https://dblp.org/rec/conf/sac/Papadopoulos99"}, "url":"URL#6545888" }, { "@score":"1", "@id":"6545889", "info":{"authors":{"author":[{"@pid":"23/4796","text":"Satyadeep Patnaik"},{"@pid":"30/3350","text":"Marshall Meier"},{"@pid":"82/1916","text":"Brian Henderson"},{"@pid":"44/4990","text":"Joe Hickman"},{"@pid":"52/2112","text":"Brajendra Panda"}]},"title":"Improving the Performance of Lineage Tracing in Data Warehouse.","venue":"SAC","pages":"210-215","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/PatnaikMHHP99","doi":"10.1145/298151.298247","ee":"https://doi.org/10.1145/298151.298247","url":"https://dblp.org/rec/conf/sac/PatnaikMHHP99"}, "url":"URL#6545889" }, { "@score":"1", "@id":"6545890", "info":{"authors":{"author":[{"@pid":"28/5602","text":"Gerald N. Pitts"},{"@pid":"72/199","text":"Daniel Cornell"}]},"title":"Peripherality Based Level of Detail Switching as a Visualization Enhancement of High-Risk Simulations.","venue":"SAC","pages":"98-104","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/PittsC99","doi":"10.1145/298151.298211","ee":"https://doi.org/10.1145/298151.298211","url":"https://dblp.org/rec/conf/sac/PittsC99"}, "url":"URL#6545890" }, { "@score":"1", "@id":"6545891", "info":{"authors":{"author":[{"@pid":"18/4843","text":"Nuno M. Preguiça"},{"@pid":"06/2712","text":"José Legatheaux Martins"},{"@pid":"91/1611","text":"Henrique João L. Domingos"},{"@pid":"72/2584","text":"Jorge Paulo F. Simão"}]},"title":"Flexible Data Storage for Mobile Computing.","venue":"SAC","pages":"405-407","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/PreguicaMDS99","doi":"10.1145/298151.298397","ee":"https://doi.org/10.1145/298151.298397","url":"https://dblp.org/rec/conf/sac/PreguicaMDS99"}, "url":"URL#6545891" }, { "@score":"1", "@id":"6545892", "info":{"authors":{"author":[{"@pid":"40/5791","text":"Franz Puntigam"},{"@pid":"95/6173","text":"Christof Peter"}]},"title":"Changeable Interfaces and Promised Messages for Concurrent Components.","venue":"SAC","pages":"141-145","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/PuntigamP99","doi":"10.1145/298151.298223","ee":"https://doi.org/10.1145/298151.298223","url":"https://dblp.org/rec/conf/sac/PuntigamP99"}, "url":"URL#6545892" }, { "@score":"1", "@id":"6545893", "info":{"authors":{"author":[{"@pid":"26/6029","text":"Xiangzhen Qiao"},{"@pid":"92/2977","text":"Qitao Gan"},{"@pid":"16/5205","text":"Zhiyong Liu"},{"@pid":"81/2362","text":"Xiaotao Guo"},{"@pid":"l/XiaoboLi-1","text":"Xiaobo Li 0001"}]},"title":"Cache Optimization in Scientific Computations.","venue":"SAC","pages":"548-552","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/QiaoGLGL99","doi":"10.1145/298151.298436","ee":"https://doi.org/10.1145/298151.298436","url":"https://dblp.org/rec/conf/sac/QiaoGLGL99"}, "url":"URL#6545893" }, { "@score":"1", "@id":"6545894", "info":{"authors":{"author":{"@pid":"88/6934","text":"Günther R. Raidl"}},"title":"A Weight-Coded Genetic Algorithm for the Multiple Container Packing Problem.","venue":"SAC","pages":"291-296","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/Raidl99","doi":"10.1145/298151.298354","ee":"https://doi.org/10.1145/298151.298354","url":"https://dblp.org/rec/conf/sac/Raidl99"}, "url":"URL#6545894" }, { "@score":"1", "@id":"6545895", "info":{"authors":{"author":[{"@pid":"r/ThomasRauber","text":"Thomas Rauber"},{"@pid":"r/GudulaRunger","text":"Gudula Rünger"}]},"title":"A Coordination Language for Mixed Task and and Data Parallel Programs.","venue":"SAC","pages":"146-155","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/RauberR99","doi":"10.1145/298151.298224","ee":"https://doi.org/10.1145/298151.298224","url":"https://dblp.org/rec/conf/sac/RauberR99"}, "url":"URL#6545895" }, { "@score":"1", "@id":"6545896", "info":{"authors":{"author":[{"@pid":"r/ThomasRauber","text":"Thomas Rauber"},{"@pid":"r/GudulaRunger","text":"Gudula Rünger"}]},"title":"Matrix Computations Behind the Hierarchical Radiosity Method.","venue":"SAC","pages":"533-540","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/RauberR99a","doi":"10.1145/298151.298434","ee":"https://doi.org/10.1145/298151.298434","url":"https://dblp.org/rec/conf/sac/RauberR99a"}, "url":"URL#6545896" }, { "@score":"1", "@id":"6545897", "info":{"authors":{"author":{"@pid":"42/3939","text":"Wilson Rivera-Gallego"}},"title":"A Genetic Algorithm for Solving the Euclidean Distance Matrices Completion Problem.","venue":"SAC","pages":"286-290","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/Rivera-Gallego99","doi":"10.1145/298151.298353","ee":"https://doi.org/10.1145/298151.298353","url":"https://dblp.org/rec/conf/sac/Rivera-Gallego99"}, "url":"URL#6545897" }, { "@score":"1", "@id":"6545898", "info":{"authors":{"author":[{"@pid":"46/5418","text":"Nabil Rousan"},{"@pid":"70/5852","text":"Hani Abu-Salem"}]},"title":"Computation of Square Root of X.","venue":"SAC","pages":"74-77","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/RousanA99","doi":"10.1145/298151.298198","ee":"https://doi.org/10.1145/298151.298198","url":"https://dblp.org/rec/conf/sac/RousanA99"}, "url":"URL#6545898" }, { "@score":"1", "@id":"6545899", "info":{"authors":{"author":[{"@pid":"23/4477","text":"W. M. Row"},{"@pid":"49/2041","text":"Donald J. Morton"},{"@pid":"29/1590","text":"B. L. Adams"},{"@pid":"20/1358","text":"A. H. Wright"}]},"title":"Security Issues in Small Linux Networks.","venue":"SAC","pages":"506-510","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/RowMAW99","doi":"10.1145/298151.298430","ee":"https://doi.org/10.1145/298151.298430","url":"https://dblp.org/rec/conf/sac/RowMAW99"}, "url":"URL#6545899" }, { "@score":"1", "@id":"6545900", "info":{"authors":{"author":{"@pid":"73/275","text":"Andrew V. Royappa"}},"title":"Implementing Catalog Clearinghouses with XML and XSL.","venue":"SAC","pages":"616-621","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/Royappa99","doi":"10.1145/298151.298495","ee":"https://doi.org/10.1145/298151.298495","url":"https://dblp.org/rec/conf/sac/Royappa99"}, "url":"URL#6545900" }, { "@score":"1", "@id":"6545901", "info":{"authors":{"author":[{"@pid":"65/3498","text":"Alexey Rudenko"},{"@pid":"r/PLReiher","text":"Peter L. Reiher"},{"@pid":"62/6214","text":"Gerald J. Popek"},{"@pid":"44/5151","text":"Geoffrey H. Kuenning"}]},"title":"The Remote Processing Framework for Portable Computer Power Saving.","venue":"SAC","pages":"365-372","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/RudenkoRPK99","doi":"10.1145/298151.298385","ee":"https://doi.org/10.1145/298151.298385","url":"https://dblp.org/rec/conf/sac/RudenkoRPK99"}, "url":"URL#6545901" }, { "@score":"1", "@id":"6545902", "info":{"authors":{"author":[{"@pid":"19/1444","text":"James W. Ryder"},{"@pid":"93/4616","text":"Kanad Ghose"}]},"title":"Multi-Sensory Browser and Editor Model.","venue":"SAC","pages":"443-449","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/RyderG99","doi":"10.1145/298151.298418","ee":"https://doi.org/10.1145/298151.298418","url":"https://dblp.org/rec/conf/sac/RyderG99"}, "url":"URL#6545902" }, { "@score":"1", "@id":"6545903", "info":{"authors":{"author":{"@pid":"82/1900","text":"Chaman L. Sabharwal"}},"title":"An Implementation of Hybrid Approach to Indexing Image Databases.","venue":"SAC","pages":"421-426","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/Sabharwal99","doi":"10.1145/298151.298411","ee":"https://doi.org/10.1145/298151.298411","url":"https://dblp.org/rec/conf/sac/Sabharwal99"}, "url":"URL#6545903" }, { "@score":"1", "@id":"6545904", "info":{"authors":{"author":[{"@pid":"06/5069","text":"Akhil Sahai"},{"@pid":"32/3279","text":"Christine Morin"}]},"title":"Mobile Agents for Location Independent Computing.","venue":"SAC","pages":"408-409","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/SahaiM99","doi":"10.1145/298151.298400","ee":"https://doi.org/10.1145/298151.298400","url":"https://dblp.org/rec/conf/sac/SahaiM99"}, "url":"URL#6545904" }, { "@score":"1", "@id":"6545905", "info":{"authors":{"author":[{"@pid":"87/702","text":"Neal Sample"},{"@pid":"29/3584","text":"Carl Bartlett"},{"@pid":"57/5861","text":"Matthew Haines"}]},"title":"Mars: Runtime Support for Coordinated Applications.","venue":"SAC","pages":"166-174","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/SampleBH99","doi":"10.1145/298151.298227","ee":"https://doi.org/10.1145/298151.298227","url":"https://dblp.org/rec/conf/sac/SampleBH99"}, "url":"URL#6545905" }, { "@score":"1", "@id":"6545906", "info":{"authors":{"author":[{"@pid":"36/3030","text":"Amâncio Santos"},{"@pid":"12/3643","text":"António Dourado"}]},"title":"Constrained GA Applied to Production and Energy Management of a Pulp and Paper Mill.","venue":"SAC","pages":"324-332","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/SantosD99","doi":"10.1145/298151.298366","ee":"https://doi.org/10.1145/298151.298366","url":"https://dblp.org/rec/conf/sac/SantosD99"}, "url":"URL#6545906" }, { "@score":"1", "@id":"6545907", "info":{"authors":{"author":[{"@pid":"49/2563","text":"David A. Sauder"},{"@pid":"74/213","text":"Joshua Lubell"}]},"title":"The Express Web Server: A User Interface for Standards Development.","venue":"SAC","pages":"610-615","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/SauderL99","doi":"10.1145/298151.298493","ee":"https://doi.org/10.1145/298151.298493","url":"https://dblp.org/rec/conf/sac/SauderL99"}, "url":"URL#6545907" }, { "@score":"1", "@id":"6545908", "info":{"authors":{"author":[{"@pid":"s/MariaTeresaSegarra","text":"Maria-Teresa Segarra"},{"@pid":"49/2652","text":"Françoise André"}]},"title":"MFS: A Mobile File System Using Generic System Services.","venue":"SAC","pages":"419-420","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/SegarraA99","doi":"10.1145/298151.298409","ee":"https://doi.org/10.1145/298151.298409","url":"https://dblp.org/rec/conf/sac/SegarraA99"}, "url":"URL#6545908" }, { "@score":"1", "@id":"6545909", "info":{"authors":{"author":{"@pid":"06/3261","text":"Zhizhang Shen"}},"title":"Average Diameter and Its Estimation in Non-Linear Structures.","venue":"SAC","pages":"489-490","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/Shen99","doi":"10.1145/298151.298426","ee":"https://doi.org/10.1145/298151.298426","url":"https://dblp.org/rec/conf/sac/Shen99"}, "url":"URL#6545909" }, { "@score":"1", "@id":"6545910", "info":{"authors":{"author":[{"@pid":"72/5970","text":"Jeffrey H. Smith"},{"@pid":"55/6778","text":"William Heinrichs"}]},"title":"Organizational Alignment Through Information Technology: A Web-based Approach to Change.","venue":"SAC","pages":"566-570","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/SmithH99","doi":"10.1145/298151.298476","ee":"https://doi.org/10.1145/298151.298476","url":"https://dblp.org/rec/conf/sac/SmithH99"}, "url":"URL#6545910" }, { "@score":"1", "@id":"6545911", "info":{"authors":{"author":[{"@pid":"s/AngelaCSodan","text":"Angela C. Sodan"},{"@pid":"t/VicencTorra","text":"Vicenç Torra"}]},"title":"Hierarchical Fuzzy Configuration of Implementation Strategies.","venue":"SAC","pages":"250-259","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/SodanT99","doi":"10.1145/298151.298343","ee":"https://doi.org/10.1145/298151.298343","url":"https://dblp.org/rec/conf/sac/SodanT99"}, "url":"URL#6545911" }, { "@score":"1", "@id":"6545912", "info":{"authors":{"author":[{"@pid":"37/4491","text":"B. Sonah"},{"@pid":"04/5309","text":"Mabo Robert Ito"}]},"title":"Performance Evaluation of New Adaptive Object Replacement Techniques for VOD Systems.","venue":"SAC","pages":"437-442","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/SonahI99","doi":"10.1145/298151.298416","ee":"https://doi.org/10.1145/298151.298416","url":"https://dblp.org/rec/conf/sac/SonahI99"}, "url":"URL#6545912" }, { "@score":"1", "@id":"6545913", "info":{"authors":{"author":[{"@pid":"65/3551","text":"Martin Staudt 0001"},{"@pid":"66/6344","text":"René Soiron"},{"@pid":"q/ChristophQuix","text":"Christoph Quix"},{"@pid":"j/MatthiasJarke","text":"Matthias Jarke"}]},"title":"Query Optimization for Repository-Based Applications.","venue":"SAC","pages":"197-203","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/StaudtSQJ99","doi":"10.1145/298151.298243","ee":"https://doi.org/10.1145/298151.298243","url":"https://dblp.org/rec/conf/sac/StaudtSQJ99"}, "url":"URL#6545913" }, { "@score":"1", "@id":"6545914", "info":{"authors":{"author":[{"@pid":"82/4164","text":"Rui Tavares"},{"@pid":"65/5568","text":"António Teófilo"},{"@pid":"39/6329","text":"Paulo Silva"},{"@pid":"r/AgostinhoCRosa","text":"Agostinho C. Rosa"}]},"title":"Infected Genes Evolutionary Algorithm.","venue":"SAC","pages":"333-338","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/TavaresTSR99","doi":"10.1145/298151.298374","ee":"https://doi.org/10.1145/298151.298374","url":"https://dblp.org/rec/conf/sac/TavaresTSR99"}, "url":"URL#6545914" }, { "@score":"1", "@id":"6545915", "info":{"authors":{"author":{"@pid":"71/5731","text":"Pamela A. Taylor"}},"title":"Exon/Intron Discrimination Using the Finite Induction Pattern Matching Technique.","venue":"SAC","pages":"41-45","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/Taylor99","doi":"10.1145/298151.298183","ee":"https://doi.org/10.1145/298151.298183","url":"https://dblp.org/rec/conf/sac/Taylor99"}, "url":"URL#6545915" }, { "@score":"1", "@id":"6545916", "info":{"authors":{"author":{"@pid":"27/4119","text":"Nicholas Tran"}},"title":"Generating Photomosaics: An Empirical Study.","venue":"SAC","pages":"105-109","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/Tran99","doi":"10.1145/298151.298213","ee":"https://doi.org/10.1145/298151.298213","url":"https://dblp.org/rec/conf/sac/Tran99"}, "url":"URL#6545916" }, { "@score":"1", "@id":"6545917", "info":{"authors":{"author":{"@pid":"99/4647","text":"Ho Leung Tsoi"}},"title":"A Framework for Management Software Project Development.","venue":"SAC","pages":"593-597","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/Tsoi99","doi":"10.1145/298151.298486","ee":"https://doi.org/10.1145/298151.298486","url":"https://dblp.org/rec/conf/sac/Tsoi99"}, "url":"URL#6545917" }, { "@score":"1", "@id":"6545918", "info":{"authors":{"author":[{"@pid":"06/2374","text":"Ramachenga R. Valasareddi"},{"@pid":"c/DLCarver","text":"Doris L. Carver"}]},"title":"A Representation Model for Procedural Program Maintenance.","venue":"SAC","pages":"580-585","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/ValasareddiC99","doi":"10.1145/298151.298479","ee":"https://doi.org/10.1145/298151.298479","url":"https://dblp.org/rec/conf/sac/ValasareddiC99"}, "url":"URL#6545918" }, { "@score":"1", "@id":"6545919", "info":{"authors":{"author":[{"@pid":"75/2274","text":"David A. van Veldhuizen"},{"@pid":"87/5411","text":"Gary B. Lamont"}]},"title":"Multiobjective Evolutionary Algorithm Test Suites.","venue":"SAC","pages":"351-357","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/VeldhuizenL99","doi":"10.1145/298151.298382","ee":"https://doi.org/10.1145/298151.298382","url":"https://dblp.org/rec/conf/sac/VeldhuizenL99"}, "url":"URL#6545919" }, { "@score":"1", "@id":"6545920", "info":{"authors":{"author":[{"@pid":"87/1383","text":"Raju D. Venkataramana"},{"@pid":"r/NRanganathan","text":"N. Ranganathan"}]},"title":"A Learning Automata Based Framework for Task Assignment in Heterogeneous Computing Systems.","venue":"SAC","pages":"541-547","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/VenkataramanaR99","doi":"10.1145/298151.298435","ee":"https://doi.org/10.1145/298151.298435","url":"https://dblp.org/rec/conf/sac/VenkataramanaR99"}, "url":"URL#6545920" }, { "@score":"1", "@id":"6545921", "info":{"authors":{"author":[{"@pid":"77/5414","text":"Ryuji Wakizono"},{"@pid":"73/1068","text":"Toshikazu Kawamura"},{"@pid":"13/6536","text":"Takehiko Tsuchiya"},{"@pid":"05/1865","text":"Takahiro Hatanaka"},{"@pid":"16/67","text":"Tatsuji Tanaka"}]},"title":"Object-Oriented Database management System for Process Control Systems: Development and Evaluation.","venue":"SAC","pages":"204-209","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/WakizonoKTHT99","doi":"10.1145/298151.298245","ee":"https://doi.org/10.1145/298151.298245","url":"https://dblp.org/rec/conf/sac/WakizonoKTHT99"}, "url":"URL#6545921" }, { "@score":"1", "@id":"6545922", "info":{"authors":{"author":[{"@pid":"70/3472","text":"Gary D. Walborn"},{"@pid":"c/PKChrysanthis","text":"Panos K. Chrysanthis"}]},"title":"Transaction Processing in PRO-MOTION.","venue":"SAC","pages":"389-398","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/WalbornC99","doi":"10.1145/298151.298393","ee":"https://doi.org/10.1145/298151.298393","url":"https://dblp.org/rec/conf/sac/WalbornC99"}, "url":"URL#6545922" }, { "@score":"1", "@id":"6545923", "info":{"authors":{"author":[{"@pid":"w/KayCWiese","text":"Kay C. Wiese"},{"@pid":"29/6460","text":"Scott D. Goodwin"}]},"title":"Convergence Characteristics of Keep-Best Reproduction.","venue":"SAC","pages":"312-318","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/WieseG99","doi":"10.1145/298151.298363","ee":"https://doi.org/10.1145/298151.298363","url":"https://dblp.org/rec/conf/sac/WieseG99"}, "url":"URL#6545923" }, { "@score":"1", "@id":"6545924", "info":{"authors":{"author":[{"@pid":"w/UffeKockWiil","text":"Uffe Kock Wiil"},{"@pid":"n/PeterJNurnberg","text":"Peter J. Nürnberg"}]},"title":"Evolving Hypermedia Middleware Services: Lessons and Observations.","venue":"SAC","pages":"427-436","year":"1999","type":"Conference and Workshop Papers","access":"closed","key":"conf/sac/WillN99","doi":"10.1145/298151.298413","ee":"https://doi.org/10.1145/298151.298413","url":"https://dblp.org/rec/conf/sac/WillN99"}, "url":"URL#6545924" }, { "@score":"1", "@id":"6552845", "info":{"authors":{"author":[{"@pid":"b/BRBryant","text":"Barrett R. Bryant"},{"@pid":"87/5411","text":"Gary B. Lamont"},{"@pid":"h/HishamHaddad","text":"Hisham Haddad"},{"@pid":"170/0856","text":"Janice H. Carroll"}]},"title":"Proceedings of the 1999 ACM Symposium on Applied Computing, SAC'99, San Antonio, Texas, USA, February 28 - March 2, 1999","venue":"SAC","publisher":"ACM","year":"1999","type":"Editorship","key":"conf/sac/1999","doi":"10.1145/298151","ee":"https://doi.org/10.1145/298151","url":"https://dblp.org/rec/conf/sac/1999"}, "url":"URL#6552845" } ] } } } )