Protecting federated databases using a practical implementation of a formal RBAC policy (Englisch)
- Neue Suche nach: Barker, S.
- Neue Suche nach: Douglas, P.
- Neue Suche nach: Barker, S.
- Neue Suche nach: Douglas, P.
In:
International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004.
;
1
;
523-527 Vol.1
;
2004
-
ISBN:
- Aufsatz (Konferenz) / Elektronische Ressource
-
Titel:Protecting federated databases using a practical implementation of a formal RBAC policy
-
Beteiligte:Barker, S. ( Autor:in ) / Douglas, P. ( Autor:in )
-
Erschienen in:
-
Verlag:
- Neue Suche nach: IEEE
-
Erscheinungsdatum:01.01.2004
-
Format / Umfang:1368749 byte
-
ISBN:
-
DOI:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Datenquelle:
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 0_1
-
Proceedings. ITCC 2004. International Conference on Information Technology: Coding and Computing| 2004
- 0_3
-
Proceedings ITCC 2004 International Conference on Information Technology: Coding and Computing. Volume 1| 2004
- 0_4
-
Copyright page| 2004
- 0_5
-
Proceedings ITCC 2004 International Conference on Information Technology: Coding and Computing. Volume 1 - Table of Contents| 2004
- 0_5
-
Proceedings ITCC 2004 International Conference on Information Technology: Coding and Computing - Volume 2 - Table of Contents| 2004
- 0_17
-
General Chair's messageLatifi, Shahram et al. | 2004
- 0_18
-
Reviewers| 2004
- 2
-
Jigsaw-based secure data transfer over computer networksVasudevan, R.A. / Abraham, A. / Sanyal, S. / Agrawal, D.P. et al. | 2004
- 2
-
Performance evaluation of block-based motion estimation algorithms and distortion measuresSubramanya, S.R. / Patel, H. / Ersoy, I. et al. | 2004
- 7
-
Semi-fragile watermarking scheme for authentication of JPEG imagesChi Kin Ho, / Chang-Tsun Li, et al. | 2004
- 8
-
Geoblock: a LVQ-based framework for geographic image retrievalZhu, L. et al. | 2004
- 12
-
Mitigating the untrusted terminal problem using conditional signaturesBerta, I.Z. / Buttyan, L. / Vajda, I. et al. | 2004
- 13
-
Language Model-based Retieval for Farsi DocumentsTaghva, K. / Coombs, J. / Pareda, R. / Nartker, T. / IEEE et al. | 2003
- 13
-
Language model-based retrieval for Farsi documentsTaghva, K. / Coombs, J. / Pareda, R. / Nartker, T. et al. | 2004
- 17
-
Arcanum: a secure and efficient key exchange protocol for the InternetMian, A.S. / Masood, A. et al. | 2004
- 18
-
Summarizing inter-query learning in content-based image retrieval via incremental semantic clusteringGondra, I. / Heisterkamp, D.R. et al. | 2004
- 22
-
A security protocol for certified e-goods deliveryNenadic, A. / Ning Zhang, / Barton, S. et al. | 2004
- 23
-
A framework for trajectory based visual event retrievalErsoy, I. / Bunyak, F. / Subramanya, S.R. et al. | 2004
- 30
-
Enhancing anonymity via market competitionShouhuai Xu, / Nelson, W.R. / Sandhu, R. et al. | 2004
- 30
-
Detecting anomalies in high-performance parallel programsFlorez, G. / Liu, Z. / Bridges, S. / Vaughn, R. / Skjellum, A. et al. | 2004
- 35
-
A secure account-based mobile payment protocolKungpisdan, S. / Srinivasan, B. / Phu Dung Le, et al. | 2004
- 35
-
Grid workflow based on dynamic modeling and schedulingShaohua Zhang, / Ning Gu, / Saihan Li, et al. | 2004
- 40
-
Accountability logic for mobile payment protocolsKungpisdan, S. / Srinivasan, B. / Phu Dung Le, et al. | 2004
- 40
-
Extensible communication architecture for grid nodesMohamed, N. / Al-Jaroodi, J. / Jiang, H. et al. | 2004
- 45
-
Face recognition using interpolated Bezier curve based representationPal, S. / Biswas, P.K. / Abraham, A. et al. | 2004
- 45
-
Access policy specification for Web applicationsBarker, S. et al. | 2004
- 50
-
Run-time detection of buffer overflow attacks without explicit sensor data objectsChangwoo Pyo, / Byungchul Bae, / Taejin Kim, / Gyungho Lee, et al. | 2004
- 50
-
A Web/grid portal implementation of BioSimGrid: a biomolecular simulation databaseWu, B. / Dovey, M. / Ng, M.H. / Tai, K. / Murdock, S. / Jeffreys, P. / Cox, S. / Essex, J. / Sansom, M.S.P. et al. | 2004
- 56
-
Achieving distributed trusted servicesBamasak, O. / Zhang, N. et al. | 2004
- 56
-
A problem solving environment for remote sensing data processingAloisio, G. / Cafaro, M. / Epicoco, I. / Quarta, G. et al. | 2004
- 62
-
Performance evaluation of data integrity mechanisms for mobile agentsGunupudi, V. / Tate, S.R. et al. | 2004
- 62
-
A demonstration of collaborative Web services and peer-to-peer gridsWang, M. / Fox, G. / Pallickara, S. et al. | 2004
- 68
-
On the matching of events in distributed brokering systemsPallickara, S. / Fox, G. et al. | 2004
- 70
-
Adaptive neuro-fuzzy intrusion detection systemsChavan, S. / Shah, K. / Dave, N. / Mukherjee, S. / Abraham, A. / Sanyal, S. et al. | 2004
- 75
-
Cryptographic protocol analysis using goal extractionEdmonds, J. / Papa, M. et al. | 2004
- 77
-
Performing security analysis of large scale power systems with a broker-based computational gridDi Santo, M. / Ranaldo, N. / Villacci, D. / Zimeo, E. et al. | 2004
- 81
-
ProtoMon: embedded monitors for cryptographic protocol intrusion detection and preventionJoglekar, S.P. / Tate, S.R. et al. | 2004
- 83
-
G-AQFS: grid computing exploitation for the management of air quality in presence of complex meteorological circulationsAloisio, G. / Cafaro, M. / Cesari, R. / Mangia, C. / Marra, G.P. / Miglietta, M. / Mirto, M. / Rizza, U. / Schipa, I. / Tanzarella, A. et al. | 2004
- 90
-
Web server attack categorization based on root causes and their locationsJeongseok Seo, / Han-Sung Kim, / Sanghyun Cho, / Sungdeok Cha, et al. | 2004
- 90
-
Integrating ontology and workflow in PROTEUS, a grid-based problem solving environment for bioinformaticsCannataro, M. / Comito, C. / Guzzo, A. / Veltri, P. et al. | 2004
- 95
-
Grid Job Builder - a workflow editor for computing gridsJung, C. / Einhoff, M. / Noll, S. / Schiffner, N. et al. | 2004
- 97
-
A fast pattern-match engine for network processor-based network intrusion detection systemRong-Tai Liu, / Nen-Fu Huang, / Chia-Nan Kao, / Chih-Hao Chen, / Chi-Chieh Chou, et al. | 2004
- 100
-
A cost-effective critical path approach for service priority optimization in the grid computing economyLin, M. / Lin, Z. et al. | 2004
- 100
-
The Cost-Effective Critical Path Approach for Service Priority Optimization in the Grid Computing EconomyLin, M. / Lin, Z. / IEEE et al. | 2003
- 102
-
A modified optical image reconstruction model with information feedbackChaoyang Zhang, / Yukong Zhang, et al. | 2004
- 105
-
OGSA-WebDB: an OGSA-based system for bringing Web databases into the gridPahlevi, S.M. / Kojima, I. et al. | 2004
- 107
-
Threshold and identity-based key management and authentication for wireless ad hoc networksHongmei Deng, / Mukherjee, A. / Agrawal, D.P. et al. | 2004
- 111
-
Effectiveness of advanced and authenticated packet marking scheme for traceback of denial of service attacksRizvi, B. / Fernandez-Gaucherand, E. et al. | 2004
- 112
-
An extensible framework for practical secure component composition in a ubiquitous computing environmentLlewellyn-Jones, D. / Merabti, M. / Qi Shi, / Askwith, B. et al. | 2004
- 116
-
Vulnerability scanning for buffer overflowAishwarya Iyer, / Liebrock, L.M. et al. | 2004
- 118
-
Disaster coverable PKI model based on Majority Trust principleTzvetkov, V. et al. | 2004
- 118
-
Distributed knowledge networks: towards a new paradigm for delivering knowledgeCuzzocrea, A. / Bellas, F. et al. | 2004
- 120
-
A novel relevance feedback method in content-based image retrievalBaice Li, / Senmiao Yuan, et al. | 2004
- 124
-
OntoTag's linguistic ontologies: improving semantic Web annotations for a better language understanding in machinesde Cea, G.A. / de Mon, I.A. / Gomez-Perez, A. / Pareja-Lora, A. et al. | 2004
- 124
-
Identity-based threshold signature scheme from the bilinear pairings (extended abstract)Joonsang Baek, / Yuliang Zheng, et al. | 2004
- 124
-
Identity-Based Threshold Signature Scheme from the Bilinear PairingsBaek, J. / Zheng, Y. / IEEE et al. | 2003
- 129
-
HORSE: an extension of an r-time signature scheme with fast signing and verificationNeumann, W.D. et al. | 2004
- 129
-
Bidding in P2P content distribution networks using the lightweight currency paradigmElrufaie, E. / Turner, D.A. et al. | 2004
- 131
-
Improving classification performance for heterogeneous cancer gene expression dataFung, B.Y.M. / Ng, V.T.Y. et al. | 2004
- 133
-
Monitoring the development process with EclipseSillitti, A. / Janes, A. / Succi, G. / Vernazza, T. et al. | 2004
- 135
-
Modeling a grid-based problem solving environment for mobile devicesKurkovsky, S. / Bhagyavati, / Ray, A. / Yang, M. et al. | 2004
- 136
-
Recurrent exercises for introductory human computer interaction coursesTurban, R. et al. | 2004
- 138
-
An integrated neighborhood dependent approach for nonlinear enhancement of color imagesTao, L. / Vijayan Asari, et al. | 2004
- 140
-
Extendible range-based numbering scheme for XML documentXing, G. / Tseng, B. et al. | 2004
- 141
-
A new approach to learning algorithmsMudner, T. / Shakshuki, E. et al. | 2004
- 142
-
An extension of XQuery for moving objects over GMLChung, W. / Soon-Young Park, / Hae-Young Bae, et al. | 2004
- 146
-
Computer skills training to (middle-aged) adults: problems and programMartinez-Balleste, A. / Sebe, F. / Domingo-Ferrer, J. et al. | 2004
- 148
-
An evaluation of new and old similarity ranking algorithmsLynch, P. / Luan, X. / Prettyman, M. / Mericle, L. / Borkmann, E. / Schlaifer, J. et al. | 2004
- 150
-
Experiments on a secure compression algorithmCelikel, E. / Dalkilic, M.E. et al. | 2004
- 151
-
Dependency theory e-learning toolDouglas, P. / Barker, S. et al. | 2004
- 153
-
A GCD attack resistant CRTHACS for secure group communicationsZou, X. / Ramamurthy, B. / Magliveras, S.S. et al. | 2004
- 155
-
A distributed quadtree dictionary approach to multi-resolution compressionDooley, R. et al. | 2004
- 156
-
A Web-service oriented framework for building SCORM compatible learning management systemsChih-Ping Chu, / Ching-Pao Chang, / Chung-Wei Yeh, / Yu-Fang Yeh, et al. | 2004
- 157
-
Face detection technique based on rotation invariant wavelet featuresSatyanadh Gundimada, / Vijayan Asari, et al. | 2004
- 159
-
Integrating compression with watermarking on video sequencesGiannoula, A. / Hatzinakos, D. et al. | 2004
- 162
-
Fuzzy measures and integrals for evaluating strategiesNarukawa, Y. / Torra, V. et al. | 2004
- 164
-
Games and animation: collaborations between the arts and computer scienceParker, J.R. et al. | 2004
- 167
-
How to make e-cash with non-repudiation and anonymitySong, R. / Korba, L. et al. | 2004
- 169
-
Web-based mathematics education: MeML design and implementationWang, P.S. / Yi Zhou, / Xiao Zou, et al. | 2004
- 173
-
A workshop on advanced separation of concerns and aspect-oriented programmingDechow, D.R. et al. | 2004
- 176
-
IT security project: implementation of the Advanced Encryption Standard (AES) on a smart cardSchramm, K. / Paar, C. et al. | 2004
- 176
-
IT Security Project: Implementation of the Advanced Encyption Standard Algorithm AES on a Smart CardSchramm, K. / Paar, C. / IEEE et al. | 2003
- 178
-
Applied fieldbus knowledge for ICT engineersMarino, P. / Hernandez, H. / Dominguez, M.A. / Poza, F. / Machado, F. / Vazquez, F. et al. | 2004
- 181
-
An instructor's environment for automatic generation of problem sequencesAzalov, P. / Zlatarova, F. et al. | 2004
- 183
-
An approach to improving the quality of part-of-speech tagging of Chinese textYi-li Qian, / Jia-heng Zheng, et al. | 2004
- 186
-
The development of a philosophy for an applied Web programming curriculumCourte, J.E. et al. | 2004
- 188
-
Ensembles of partitions via data resamplingMinaei-Bidgoli, B. / Topchy, A. / Punch, W.F. et al. | 2004
- 192
-
Assessing distance learning student's performance: a natural language processing approach to analyzing class discussion messagesYi-fang Brook Wu, / Xin Chen, et al. | 2004
- 193
-
Choosing the initial set of exemplars when learning with an NGE-based systemFigueira, L.B. / do Carmo Nicoletti, M. et al. | 2004
- 197
-
Auxiliar: a case-based system to assist online coursesPiva, D. / de Freitas, R.L. / Miskulin, M.S. / Nakamiti, G.S. / Tobar, C.M. et al. | 2004
- 198
-
The effects of business rules on transactional association analysisHashemi, R.R. / Le Blanc, L.A. / Westgeest, B.J. et al. | 2004
- 202
-
Building an effective groupware systemRazek, M.A. / Frasson, C. / Kaltenbach, M. et al. | 2004
- 203
-
Information technologies for education & training in e-governmentRanjit Bose, et al. | 2004
- 207
-
A standard visual courseware authoring tool based on content packaging specificationYang Zongkai, / Zhao Gang, / Wu Di, / He Jianhua, et al. | 2004
- 208
-
Routine learning: analyzing your whereaboutsPirttikangas, S. / Riekki, J. / Roning, J. et al. | 2004
- 212
-
GAME: a Generic Automated Marking Environment for programming assessmentBlumenstein, M. / Green, S. / Nguyen, A. / Muthukkumarasamy, V. et al. | 2004
- 214
-
Information-content based sentence extraction for text summarizationMallett, D. / Elding, J. / Nascimento, M.A. et al. | 2004
- 218
-
A Novel Approach for New E-Commerce Product Positioning and To-Go/Not-To Go with Rapid Prototype ExperienceAhamed, S. / IEEE et al. | 2003
- 218
-
A novel approach for new e-commerce product positioning and to-go/not-to go with rapid prototyping experienceSheikh Iqbal Ahamed, et al. | 2004
- 219
-
Measuring the scalability of relationally mapped semistructured queriesCathey, R.J. / Beitzel, S.M. / Jensen, E.C. / Pilotto, A.J. / Grossman, D. et al. | 2004
- 219
-
Measuring the Scalability of Relationally Mapped Semistructual QueriesCathey, R. / Beitzel, S. / Jensen, E. / Pilotto, A. / Grossman, D. / IEEE et al. | 2003
- 223
-
Dynamic identification of correspondence assertions for electronic commerce data integrationAdiele, C. / Ehikioya, S.A. et al. | 2004
- 224
-
Modified LZW algorithm for efficient compressed text retrievalZhang, N. / Tao, T. / Ravi Vijaya Satya, / Amar Mukherjee, et al. | 2004
- 228
-
A topology viewer for distributed brokering systemsDharurkar, A. / Pallickara, S. / Fox, G. et al. | 2004
- 229
-
A unique-order interpolative code for fast querying and space-efficient indexing in information retrieval systemsCher-Sheng Cheng, / Jean Jyh-Jiun Shann, / Chung-Ping Chung, et al. | 2004
- 235
-
The impacts of professions in systems developmentJohansson, A. et al. | 2004
- 236
-
Turkish word n-gram analyzing algorithms for a large scale Turkish corpus - TurCoCebi, Y. / Dalkilic, G. et al. | 2004
- 241
-
Automatic estimation of stock market forecasting and generating the corresponding natural language expressionQiong Liu, / Xin Lu, / Ren, F. / Kuroiwa, S. et al. | 2004
- 241
-
Content-based image retrieval incorporating models of human perceptionCelebi, M.E. / Aslandogan, Y.A. et al. | 2004
- 246
-
Special technique for optimizing teaching-learning process in CBT softwareDharaskar, R. et al. | 2004
- 246
-
Use of multiple algorithms in image content searchesParker, J.R. / Behm, B. et al. | 2004
- 251
-
Extending the undergraduate computer science curriculum to include data miningGoharian, N. / Grossman, D. / Raju, N. et al. | 2004
- 252
-
How M=Ec/sup 2/ in healthcareWickramasinghe, N. / Goldberg, S. et al. | 2004
- 252
-
How M=Ec^2 in HealthcareWickramasinghe, N. / Goldberg, S. / IEEE et al. | 2003
- 255
-
Extending the wiki paradigm for use in the classroomChien-min Wang, / Turner, D. et al. | 2004
- 258
-
Enhanced cell visiting probability for QoS provisioning in mobile multimedia communicationsIslam, M.M. / Murshed, M. / Dooley, L.S. et al. | 2004
- 262
-
Information retrieval with principal componentsHoang, A. et al. | 2004
- 263
-
A secure electronic examination protocol using wireless networksHerrera-Joancomarti, J. / Prieto-Blazquez, J. / Castella-Roca, J. et al. | 2004
- 267
-
Financial activity mining from online multilingual newsPik-Shan Cheung, / Ruizhang Huang, / Wai Lam, et al. | 2004
- 268
-
Threats to the mobile enterprise: jurisprudence analysis of wardriving and warchalkingLawrence, E. / Lawrence, J. et al. | 2004
- 272
-
Enabling personalization recommendation with WeightedFP for text information retrieval based on user-focusZhenya Zhang, / Enhong Chen, / Jin Wang, / Xufa Wang, et al. | 2004
- 274
-
Registration and discovery of services in the NetTraveler integration system for mobile devicesRodriguez-Martinez, M. / Ensenat, J.F. / Pagan, E. / Arzola, J.G. / Sotomayor, M. / Vargas, E. et al. | 2004
- 277
-
The e-Salesman SystemTing, M.P. / Seth, V. / Gao, J. et al. | 2004
- 281
-
A two-tier architecture for automated mobile applicationsSteele, R. / Ventsov, Y. / Madhisetty, S. / Benkovich, L. et al. | 2004
- 283
-
From keywords to links: an automatic approachJihong Zeng, / Bloniarz, P.A. et al. | 2004
- 287
-
Toward dialogues with documents: MultiBrowserBerleant, D. / Jinghao Miao, / Zhong Gu, / Dongping Xu, et al. | 2004
- 288
-
Lexical-Chain and Its Application in Text FiteringShaozi, L. / Wenjian, Y. / Tangqiu, L. / Huowang, C. / IEEE et al. | 2003
- 288
-
Lexical-chain and it's application in text filteringLi Shaozi, / You Wenjian, / Li Tangqiu, / Chen Huowang, et al. | 2004
- 293
-
Problems and solutions in machine translation involving Arabic, Chinese and FrenchAlsharaf, H. / Cardey, S. / Greenfield, P. / Shen, Y. et al. | 2004
- 295
-
From paragraph networks to document networksJinghao Miao, / Berleant, D. et al. | 2004
- 298
-
Internet archive as a source of bilingual dictionaryFattah, M.A. / Ren, F. / Shingo, K. et al. | 2004
- 303
-
Integrating speech enabled services in a Web-based e-learning environmentWerner, S. / Wolff, M. / Eichner, M. / Hoffmann, R. et al. | 2004
- 304
-
Refined extended preorder index with path informationGuangming Xing, / Dongli Zhang, et al. | 2004
- 308
-
Source signal based rate adaptation for GSM AMR speech codecMakinen, J. / Vainio, J. et al. | 2004
- 309
-
Multitasking Web search on Alta VistaSpink, A. / Minsoo Park, / Jansen, B.J. / Pedersen, J. et al. | 2004
- 314
-
Linguistic knowledge and automatic semantic representation of emotions and feelingsMathieu, Y.Y. et al. | 2004
- 314
-
Extracting new topic contents from hidden Web sitesMouri, T. / Kitagawa, H. et al. | 2004
- 319
-
Word statistics of Turkish language on a large scale text corpus - TurCoDalkilic, G. / Cebi, Y. et al. | 2004
- 320
-
Enhancing usability of flight and fare search functions for airline and travel Web sitesChariton, C. / Min-Hyung Choi, et al. | 2004
- 326
-
A hybrid classifier approach for Web retrieved documents classificationBot, R.S. / Yi-fang Brook Wu, / Xin Chen, / Quanzhi Li, et al. | 2004
- 326
-
An informed operator approach to tackle diversity constraints in evolutionary searchBhattacharya, M. et al. | 2004
- 331
-
Efficient multicast e-services over APPCASTRadha, V. / Gulati, V.P. / Pujari, A.K. et al. | 2004
- 332
-
Web page fragmentation for personalized portal constructionChristos, B. / Vaggelis, K. / Ioannis, M. et al. | 2004
- 337
-
TIN: an interactive image navigator providing ubiquitous access to distributed geo-spatial dataVelez, B. / Cabarcas, A. / Malave, L. et al. | 2004
- 337
-
Ontology-based Web crawlerGanesh, S. / Jayaraj, M. / Kalyan, V. / SrinivasaMurthy, / Aghila, G. et al. | 2004
- 342
-
A hybrid number system and its application in FPGA-DSP technologyReza, / Hashemian, / Sreedharan, B. et al. | 2004
- 344
-
Exploring similarity among Web pages using the hyperlink structureHuang, S.-H.S. / Molina-Rodriguez, C.H. / Quevedo-Torrero, J.U. / Fonseca-Lozada, M.F. et al. | 2004
- 347
-
Significance of steganography on data securityVenkatramanS, / Ajith Abraham, / Paprzycki, M. et al. | 2004
- 349
-
Anxiously seeking answers: how attitude affects search performanceLucas, W. / Topi, H. et al. | 2004
- 352
-
Recognition and identification of form document layoutsLuo, K. / Latifi, S. / Taghva, K. / Regentova, E. et al. | 2004
- 354
-
XCpaqs: compression of XML document with XPath query supportHongzhi Wang, / Jianzhong Li, / Jizhou Luo, / Zhenying He, et al. | 2004
- 357
-
Evolutionary time schedulingNedjah, N. / de Macedo Mourelle, L. et al. | 2004
- 360
-
Matching techniques for resource discovery in distributed systems using heterogeneous ontology descriptionsCastano, S. / Ferrara, A. / Montanelli, S. / Racca, G. et al. | 2004
- 362
-
Group key management utilizing Huffman and Petrick based approachesIlango, S. et al. | 2004
- 367
-
Application service provision through the grid: business models and architecturesVassiliadis, B. / Giotopoulos, K. / Votis, K. / Sioutas, S. / Bogonikolos, N. / Likothanassis, S. et al. | 2004
- 367
-
3D shape acquisition using a combined SSD and least squares correlation approachAzad, P. / Gockel, T. / Dillmann, R. et al. | 2004
- 372
-
The GRelC library: a basic pillar in the grid relational catalog architectureAloisio, G. / Cafaro, M. / Fiore, S. / Mirto, M. et al. | 2004
- 372
-
Mining user navigational patterns in dynamically changing environmentsUdechukwu, A. / Barker, K. / Alhajj, R. et al. | 2004
- 377
-
Content-addressable IBP - rationale, design and performanceCollins, R.L. / Plank, J.S. et al. | 2004
- 380
-
Ant mobility model platform for network simulatorHsien-Chou Liao, / Yi-Wei Ting, / Shih-Hsuan Yen, / Chou-Chen Yang, et al. | 2004
- 382
-
The LAG grammar for authoring the adaptive WebCristea, A. / Verschoor, M. et al. | 2004
- 385
-
Multiple directional antennas in suburban ad-hoc networksIslam, M.M. / Pose, R. / Kopp, C. et al. | 2004
- 387
-
Adaptation and reuse in designing Web information systemsFrasincar, F. / Barna, P. / Houben, G.-J. / Fiala, Z. et al. | 2004
- 390
-
Statistic-based routing in wireless sensor networksXie, X. / Hughes, L. et al. | 2004
- 392
-
On-line generation of suggestions for Web usersSilvestri, F. / Baraglia, R. / Palmerini, P. / Serrano, M. et al. | 2004
- 395
-
Collaborative vision using networked sensorsRam Dantu, / Joglekar, S.P. et al. | 2004
- 398
-
Reinforcement learning architecture for Web recommendationsGolovin, N. / Rahm, E. et al. | 2004
- 400
-
Investigating peer-to-peer systems for resource sharing within a small group of nodesNeild, L.L. / Pargas, R.P. et al. | 2004
- 404
-
Protocol analysis in intrusion detection using decision treeAbbes, T. / Bouhoula, A. / Rusinowitch, M. et al. | 2004
- 405
-
Secure multipath communication in mobile ad hoc networksBurmester, M. / Van Le, T. et al. | 2004
- 409
-
Security protection and checking in embedded system integration against buffer overflow attacksZili Shao, / Chun Xue, / Qingfeng Zhuge, / Sha, E.H.-M. / Bin Xiao, et al. | 2004
- 410
-
Accessing SMIL-based dynamically adaptable multimedia presentations from mobile devicesSteele, R. / Lubonski, M. / Ventsov, V. / Lawrence, E. et al. | 2004
- 414
-
Low-intrusive consistent disk checkpointing: a tool for digital forensicsSitaraman, S. / Venkatesan, S. et al. | 2004
- 416
-
Extended DCEL data structure for mobile computingLi, J. / Liang, X. / Gewali, L.P. et al. | 2004
- 419
-
Dynamic control of worm propagationDantu, R. / Cangussu, J. / Yelimeli, A. et al. | 2004
- 421
-
An object and XML database schemas design toolChankuang, N. / Chittayasothorn, S. et al. | 2004
- 424
-
Towards framework selection criteria and suitability for an application frameworkAhamed, S.I. / Pezewski, Ale. / Pezewski, Al. et al. | 2004
- 428
-
Prefetching XML data with abstract query miningNg, V.T.Y. / Chan Chi Kong, / Shiu Hin Wang, et al. | 2004
- 430
-
Robust partner selection scheme for information quality assurance despite uncertainty in open multi-agent systemsBarber, K.S. / Park, J. et al. | 2004
- 433
-
Distributed knowledge management for autonomous access control in computer networksSeleznyov, A. / Hailes, S. et al. | 2004
- 435
-
A system for ensuring data integrity in grid environmentsGilbert, A. / Abraham, A. / Paprzycki, M. et al. | 2004
- 438
-
Software security in Bangladesh with .NET framework: a roadmapAlam, M.A. et al. | 2004
- 440
-
Defeating the current steganalysis techniques (robust steganography)Sung, A.H. / Tadiparthi, G.R. / Mukkamala, S. et al. | 2004
- 444
-
Design strategies to improve performance of GIS Web servicesTu, S. / Flanagin, M. / Wu, Y. / Abdelguerfi, M. / Normand, E. / Venkata Mahadevan, et al. | 2004
- 445
-
Risk management using behavior based attack graphsDantu, R. / Loper, K. / Kolan, P. et al. | 2004
- 450
-
KIP: a keyphrase identification program with learning functionsWu, Y.B. / Li, Q. / Bot, R.S. / Chen, X. et al. | 2004
- 450
-
A model for team-based access control (TMAC 2004)Alotaiby, F.T. / Chen, J.X. et al. | 2004
- 455
-
Applications of data mining in retail businessAhmed, S.R. et al. | 2004
- 456
-
An object-based approach for digital video retrievalSmith, M. / Khotanzad, A. et al. | 2004
- 460
-
A mathematical model of similarity and clusteringFu-Shing Sun, / Chun-Hung Tzeng, et al. | 2004
- 460
-
Integrity constraints in temporal relational databasesTansel, A.U. et al. | 2004
- 465
-
Mining association rules from relations on a parallel NCR teradata database systemChung, S.M. / Mangamuri, M. et al. | 2004
- 465
-
Evidence combination in medical data miningAslandogan, Y.A. / Mahajani, G.A. et al. | 2004
- 470
-
Building decision trees using functional dependenciesKwok-Wa Lam, / Lee, V.C.S. et al. | 2004
- 471
-
A new reparation method for incomplete data in the context of supervised learningMagnani, M. / Montesi, D. et al. | 2004
- 474
-
A new framework for uncertainty sampling: exploiting uncertain and positive-certain examples in similarity-based text classificationLee, K.H. / Kang, B.H. et al. | 2004
- 476
-
Adaptive Web document classification with MCRDRYang Sok Kim, / Sung Sik Park, / Deards, E. / Byeong Ho Kang, et al. | 2004
- 480
-
Confidence on approximate query in large datasetsFord, C.W. / Chiang, C.-C. / Wu, H. / Chilka, R.R. / Talburt, J. et al. | 2004
- 482
-
Physically locating wireless intrudersAdelstein, F. / Alla, P. / Joyce, R. / Richard, G.G. et al. | 2004
- 486
-
High performance FPGA based elliptic curve cryptographic co-processorLutz, J. / Hasan, A. et al. | 2004
- 492
-
Replicate relational and XML databases for Internet computingFong, J. / Wong, H.K. et al. | 2004
- 493
-
A parallel architecture for computing scalar multiplication on Hessian elliptic curvesSaqib, N.A. / Rodriguez-Henriquez, F. / Diaz-Perez, A. et al. | 2004
- 497
-
Modeling Long Duration Transactions with Time Constraints in Active DatabaseYadav, D. / Agrawal, R. / Chauhan, D. / Sarswat, R. / Majumdar, A. / IEEE et al. | 2003
- 497
-
Modelling long duration transactions with time constraints in active databaseYadav, D.S. / Agrawal, R. / Chauhan, D.S. / Saraswat, R.C. / Majumdar, A.K. et al. | 2004
- 498
-
Architectural design features of a programmable high throughput AES coprocessorHodjat, A. / Schaumont, P. / Verbauwhede, I. et al. | 2004
- 502
-
Accessing temporal data objects in mobile computing environmentsWong, A.C.S. / Lee, V.C.S. / Kwok-Wa Lam, et al. | 2004
- 503
-
Multi-objective evolutionary hardware for RSA-based cryptosystemsNedjah, N. / de Macedo Mourelle, L. et al. | 2004
- 507
-
Fuzzy inclusion dependencies in fuzzy relational databasesSharma, A.K. / Goswami, A. / Gupta, D.K. et al. | 2004
- 508
-
Efficient cryptographic hardware using the co-design methodologyde Macedo Mourelle, L. / Nedjah, N. et al. | 2004
- 511
-
Server-side broadcast transaction in mobile computing environmentHin Cheung Poon, B. / Kwok-Wa Lam, / Lee, V.C.S. et al. | 2004
- 511
-
Server-Side Broadcast Transaction in Mobile Computing EnvironmentsPoon, B. / Lam, K.-W. / Lee, V. / IEEE et al. | 2003
- 513
-
High performance arithmetic for special hyperelliptic curve cryptosystems of genus twoPelzl, J. / Wollinger, T. / Paar, C. et al. | 2004
- 518
-
Fast modular multiplication by operand changingSchimmler, M. / Bunimov, V. et al. | 2004
- 518
-
Survivability and applicability in database constraints: temporal boundary to data integrity scenariosCamolesi, L. et al. | 2004
- 523
-
Protecting federated databases using a practical implementation of a formal RBAC policyBarker, S. / Douglas, P. et al. | 2004
- 525
-
A clock-less implementation of the AES resists to power and timing attacksYu, A. / Bree, D.S. et al. | 2004
- 528
-
A model for multiple-query processing based upon strong factoringAlsabbagh, J.R. / Raghavan, V.V. et al. | 2004
- 533
-
Increasing robustness of LSB audio steganography using a novel embedding methodCvejic, N. / Seppanen, T. et al. | 2004
- 534
-
Component-based embedded database for mobile embedded systemsAhamed, S.I. / Vallecha, S. et al. | 2004
- 538
-
Finding optimum parallel coprocessor design for genus 2 hyperelliptic curve cryptosystemsBertoni, G. / Breveglieri, L. / Wollinger, T. / Paar, C. et al. | 2004
- 539
-
Mapping methods and query for aggregation and association in object-relational database using collectionPardede, E. / Rahayu, J.W. / Taniar, D. et al. | 2004
- 546
-
Power-analysis attack on an ASIC AES implementationOrs, S.B. / Gurkaynak, F. / Oswald, E. / Preneel, B. et al. | 2004
- 546
-
Community, context, and distance educationRothfork, J. et al. | 2004
- 551
-
A constraint-based query modification engine for retrofitting COTS DBMS'sGaruba, M. / Langrin, R. / Burge, L. et al. | 2004
- 553
-
A Basis-Independent Algorithm to Design Fast Parallel Multipliers over GF(2^m)Elia, M. / Leone, M. / IEEE et al. | 2003
- 553
-
A basis-independent algorithm to design fast parallel multipliers over GF(2/sup m/)Elia, M. / Leone, M. et al. | 2004
- 557
-
The design and implementation of the MESSENGER trajectory databaseGill, J. / Burge, L. / Garuba, M. et al. | 2004
- 560
-
On the Importance of Protecting Delta in SFLASH against Side Channel AttacksOkeya, K. / Takagi, T. / Vuillaume, C. / IEEE et al. | 2003
- 560
-
On the importance of protecting /spl Delta/ in SFLASH against side channel attacksOkeya, K. / Takagi, T. / Vuillaume, C. et al. | 2004
- 562
-
Pedagogical issues in programming languagesMinor, J.T. / Gewali, L.P. et al. | 2004
- 566
-
Performance study of a MLS/DBMS implemented as a kernelized architectureGaruba, M. / Appiah, E. / Burge, L. et al. | 2004
- 569
-
On permutation operations in cipher designLee, R.B. / Shi, Z.J. / Yin, Y.L. / Rivest, R.L. / Robshaw, M.J.B. et al. | 2004
- 572
-
A systolic memory architecture for fast codebook design based on MMPDCL algorithmSano, K. / Takagi, C. / Egawa, R. / Suzuki, K. / Nakamura, T. et al. | 2004
- 578
-
Streaming encryption for a secure wavelength and time domain hopped optical networkChan, H. / Hodjat, A. / Shi, J. / Wesel, R. / Verbauwhede, I. et al. | 2004
- 579
-
Semi-parallel reconfigurable architectures for real-time LDPC decodingKarkooti, M. / Cavallaro, J.R. et al. | 2004
- 583
-
Compact and efficient encryption/decryption module for FPGA implementation of the AES Rijndael very well suited for small embedded applicationsRouvroy, G. / Standaert, F.-X. / Quisquater, J.-J. / Legat, J.-D. et al. | 2004
- 586
-
An object-oriented database-based architecture for mobile enterprise applicationsSteele, R. / Ventsov, Y. / Dillon, T. et al. | 2004
- 588
-
Area efficient high speed elliptic curve cryptoprocessor for random curvesDaneshbeh, A.K. / Hasan, M.A. et al. | 2004
- 591
-
A formal approach to software architecture of agent-base systemsReza, H. / Grant, E. et al. | 2004
- 594
-
Comparing different thresholding algorithms for segmenting aurorasLi, X. / Ramachandran, R. / He, M. / Sunil Movva, / Rushing, J. / Graves, S. / Lyatsky, W. / Arjun Tan, / Germany, G. et al. | 2004
- 598
-
Minimization of boundary artifacts on scalable image compression using symmetric-extended wavelet transformCai, W. / Adjouadi, M. et al. | 2004
- 602
-
Exploiting known latitudinal variations for improved limited-angle tomographic reconstruction of the plasmasphereNaveen Santhanam, / Newman, T.S. / Gallagher, D.L. et al. | 2004
- 603
-
Arbitrary trajectories tracking using multiple model based particle filtering in infrared image sequenceZaveri, M.A. / Merchant, S.N. / Desai, U.B. et al. | 2004
- 607
-
Mapping surface materials on Mars from Mars Pathfinder spectral images with HYPEREYEMerenyi, E. / Farrand, W.H. / Tracadas, P. et al. | 2004
- 608
-
Effect of initial HMM choices in multiple sequence training for gesture recognitionLiu, N. / Davis, R.I.A. / Lovell, B.C. / Kootsookos, P.J. et al. | 2004
- 614
-
Resampling based method for pixel-wise correspondence between 3D facesChunliang Gu, / Baocai Yin, / Yongli Hu, / Shiquan Cheng, et al. | 2004
- 615
-
Factors affecting the signal quality in optical data transmission and estimation method for BER and SNRKartalopoulos, S.V. et al. | 2004
- 620
-
Recognizing non-rigid human actions using joints tracking in space-timeXin Lu, / Qiong Liu, / Oe, S. et al. | 2004
- 620
-
Lossless encoding based on redistribution of statisticsGrigoryan, A.M. / Dursun, S. / Regentova, E.E. et al. | 2004
- 625
-
On the design of heterogeneous applications for distributed coordinationChia-Chu Chiang, / Tang, P. et al. | 2004
- 626
-
Robust segmentation using parametric and nonparametric local spatial posteriorsBak, E.S. / van Najarian, K. et al. | 2004
- 631
-
A robust face recognition system for real time surveillanceSeow, M.J. / Gottumukkal, R. / Valaparla, D. / Asari, K.V. et al. | 2004
- 632
-
Digital library resources descriptionMoghrabi, C. / Le, T.-H. / Roy, J. / Hachey, J. et al. | 2004
- 636
-
A fuzzy approach to texture segmentationHanmandlu, M. / Madasu, V.K. / Vasikarla, S. et al. | 2004
- 638
-
Applying continuous action reinforcement learning automata(CARLA) to global training of hidden Markov modelsKabudian, J. / Meybodi, M.R. / Homayounpour, M.M. et al. | 2004
- 643
-
Spherical parameterization for 3D surface analysis in volumetric imagesLi Shen, / Makedon, F. et al. | 2004
- 643
-
Wearable, wireless brain computer interfaces in augmented reality environmentsNavarro, K.F. et al. | 2004