Utilizing Disks for the Available Link Bandwidth Video Delivery Method (Englisch)
- Neue Suche nach: Ito, H.
- Neue Suche nach: Fukumura, T.
- Neue Suche nach: Ito, H.
- Neue Suche nach: Fukumura, T.
In:
Third International Conference on Information Technology and Applications (ICITA'05)
;
2
;
371-376
;
2005
-
ISBN:
- Aufsatz (Konferenz) / Elektronische Ressource
-
Titel:Utilizing Disks for the Available Link Bandwidth Video Delivery Method
-
Beteiligte:Ito, H. ( Autor:in ) / Fukumura, T. ( Autor:in )
-
Erschienen in:
-
Verlag:
- Neue Suche nach: IEEE
-
Erscheinungsdatum:01.01.2005
-
Format / Umfang:548734 byte
-
ISBN:
-
DOI:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Datenquelle:
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 3
-
"RoboPress" — An Automated Mobile Press for Manufacturing Concrete ProductsAdam, G. / Grant, E. / Lee, G. et al. | 2005
- 3 vol.1
-
Keynote 1: grid computing: opportunities for bioinformatics researchZomaya, A. et al. | 2005
- 4
-
Trust and reputation relationships in service-oriented environmentsChang, E. / Dillon, T.S. / Hussain, F.K. et al. | 2005
- 9
-
Local Path Planning Based on New Repulsive Potential Functions with Angle DistributionsDong Hun Kim, / Hyun-Woo Lee, / Seiichi Shin, / Suzuki, T. et al. | 2005
- 15
-
Digital inpainting - survey and multilayer image inpainting algorithmsShih, T.K. / Rong-Chi Chang, et al. | 2005
- 15
-
Virtual Repulsive Force in Competitive Multi-Robot TeleoperationChunying Zhao, / Jingtai Liu, / Yujuan Li, / Tao Chen, / Lei Sun, et al. | 2005
- 21
-
Algorithm for Robot Writing Using Character SegmentationYussof, S. / Anuar, A. / Fernandez, K. et al. | 2005
- 25
-
The Ant Algorithm for Solving Robot Path Planning ProblemGengqian Liu, / Tiejun Li, / Yuqing Peng, / Xiangdan Hou, et al. | 2005
- 25 vol.1
-
Keynote 4: can parallel software catch up with parallel hardware? Trends in automatic parallelizationMinyi Guo, et al. | 2005
- 28
-
Application of Two Synaptic Weight Neural Networks for Nonlinear ControlWenmin Cao, / Shoujue Wang, et al. | 2005
- 29
-
Conceptual modelling within the MAS-CommonKADS plus OPEN method engineering approachQuynh-Nhu Numi Tran, / Henderson-Sellers, B. / Debenham, J. / Gonzalez-Perez, C. et al. | 2005
- 35
-
Using Real-Time Traffic Pattern Detection for Dynamic Cache Size Tuning in Information RetrievalWu, R.S.L. / Wong, A.K.Y. / Dillon, T.S. et al. | 2005
- 35
-
A metamodel for the behavior trees modelling techniqueGonzalez-Perez, C. / Henderson-Sellers, B. / Dromey, G. et al. | 2005
- 40
-
Design and implementation of a model for business rules automationAli, S. / Soh, B. / Torabi, T. et al. | 2005
- 41
-
The Research and Design of Business Component Reuse in Enterprise Information System IntegrationYinzhang Guo, / Guoyou Zhang, / Lipin Xie, / Yubin Xu, et al. | 2005
- 45
-
Flexible Concurrency Control for Collaborative Office SystemsHaifeng Shen, / Suiping Zhou, / Chengzheng Sun, et al. | 2005
- 46
-
Using UML2.0 and GG for describing the dynamic of software architecturesKacem, M.H. / Jmaiel, M. / Kacem, A.H. / Drira, K. et al. | 2005
- 51
-
A Cost Effective Spacial Redundancy with Data-Path PartitioningMatsusaka, S. / Inoue, K. et al. | 2005
- 52
-
Applying machine learning using case-based reasoning (CBR) and rule-based reasoning (RBR) approaches to object-oriented application framework documentationJani, H.M. / Lee Sai Peck, et al. | 2005
- 57
-
Partition-Based Parallel PageRank AlgorithmRungsawang, A. / Manaskasemsak, B. et al. | 2005
- 58
-
Providing agent support for collaborative systems: using a domain oriented design methodHawryszkiewycz, I.T. et al. | 2005
- 63
-
Extending Metadata with Scenarios in Adaptive Distributed SystemYanni Wu, / Kuo Zhang, / Xiaoge Wang, / Jinlan Tian, et al. | 2005
- 64
-
PURPLE: a reflective middleware for pervasive computingZhang Kuo, / Wang Xiaoge, / Wu Yanni, / Zheng Zhenkun, et al. | 2005
- 69
-
Virtual Disk Reconfiguration with Performance Guarantees in Shared Storage EnvironmentYong Feng, / Yan-yuan Zhang, et al. | 2005
- 70
-
DREAM: a practical product line engineering using model driven architectureSoo Dong Kim, / Hyun Gi Min, / Jin Sun Her, / Soo Ho Chang, et al. | 2005
- 75
-
A Wallet-Size Cluster for H.264 EncodingLiang-Teh Lee, / Chia-Ying Tseng, / Kang-Yuan Liu, / Kuan-Ching Li, et al. | 2005
- 76
-
Royalty rate of business method patents for large scale software applicationsKaneda, S. / Senbo, T. / Fujimoto, K. et al. | 2005
- 81
-
E-DM: A QoS-Enabled Storage Service Schedule System in Shared Storage EnvironmentYong Feng, / Yan-yuan Zhang, et al. | 2005
- 82
-
A hybrid approach in the evaluation of usability for multimedia objects: case study of the media assets management platform for an advertainment production project toward Beijing Olympics 2008Pang, N.L.S. / Sanxing, C. / Schauder, D. / Klein, R.R. et al. | 2005
- 85
-
Sharing the Same Operation with a Large Number of Users Using P2PYamanoue, T. et al. | 2005
- 88
-
XBMS - an open XML bibliography management systemTseng-Chang Yen, / Shang-Juh Kao, et al. | 2005
- 89
-
An Internet-Enabled Setup Planning SystemWenjian Liu, / Gaoliang Peng, et al. | 2005
- 93
-
GCSLight: A Light-Weight Group Communication Service for Metadata Server ClusterRuiyong Jia, / Yanyuan Zhang, / Yong Feng, et al. | 2005
- 95
-
Business-process-oriented software requirements automatic generatorZao-Bin Gan, / Deng-Wen Wei, / Jin-Long Zhang, / Varadharajan, V. et al. | 2005
- 97
-
Service-Cloud Model of Composed Web ServicesYanping Chen, / Zengzhi Li, / Li Wang, / Huaizhou Yang, et al. | 2005
- 99
-
A new adaptive business model for e-commerceAli, S. / Soh, B. / Torabi, T. et al. | 2005
- 101
-
Research on Load Balance of Multi Clusters Architecture Based on Business Components PartitionYiqiang Zheng, / Heqing Guo, / Wei Gao, / Botong Xu, et al. | 2005
- 103
-
The method to choose architectural approaches in the software architecture design phaseHyonHee Koh, / SangHwan Kung, / JaeNyun Park, et al. | 2005
- 107
-
Computing Tumour Coverage as a Result of Respiratory Motion during Radiotherapy TreatmentChen, J. / Lanthier, M. / MacPherson, M. / Nussbaum, D. et al. | 2005
- 107
-
Integrating code generators into the C# languageDraheim, D. / Lutteroth, C. / Weber, G. et al. | 2005
- 111
-
Evaluating the performance and scalability of Web application systemsZao-Bin Gan, / Deng-Wen Wei, / Varadharajan, V. et al. | 2005
- 113
-
Bush Babies Broadband: On-Demand Virtual Neonatal Intensive Care Unit Support for Regional AustraliaMcGregor, C. / Kneale, B. / Tracy, M. et al. | 2005
- 115
-
Conceptual nuclear decommissioning knowledge management system designI-Hsin Chou, / Chin-Feng Fan, / Yen-Chang Tzeng, et al. | 2005
- 119
-
Applying information technology to produce affordable IT solutions for small businessVan Donselaar, A. / Twigg, L. / Tien, D. et al. | 2005
- 119
-
Intelligent User-Support in Learning Environments for Remote ExperimentationHarkin, J. / Callaghan, M.J. / McGinnity, T.M. / Maguire, L.P. et al. | 2005
- 124
-
Compiler development in component-oriented software development (COSD): issues and challengesAris, H. et al. | 2005
- 125
-
Client-Server Architecture for Collaborative Remote ExperimentationCallaghan, M.J. / Harkin, J. / El Gueddari, M. / McGinnity, T.M. / Maguire, L.P. et al. | 2005
- 130
-
Certified Assessment Artifacts for ePortfoliosCarroll, N.L. / Calvo, R.A. et al. | 2005
- 131
-
Agent-based network intrusion detection system using data mining approachesCheung-Leung Lui, / Tak-Chung Fu, / Ting-Yee Cheung, et al. | 2005
- 136
-
Lightweight Desktop-Sharing System for Web BrowsersIchimura, S. / Matsushita, Y. et al. | 2005
- 137
-
Buyer-supplier negotiation by fuzzy logic based agentsChi-Bin Cheng, / Chan, C.-C.H. / Cheng-Chuan Lin, et al. | 2005
- 142
-
Employing Wikis for Online Collaboration in the E-Learning Environment: Case StudyRaitman, R. / Augar, N. / Wanlei Zhou, et al. | 2005
- 143
-
Ontology-based resource descriptions for distributed information sourcesHui Yang, / Minjie Zhang, et al. | 2005
- 147
-
Tools for Inclusive Play: Developing "Auslan for Kinder"Ellis, K. et al. | 2005
- 149
-
SBT-forest, an indexing approach for specialized binary treeTak-chung Fu, / Fu-lai Chung, / Robert Luk, / Chak-man Ng, et al. | 2005
- 153
-
A New Remote Laboratory for Hardware Experiment with Shared Resources and Service ManagementFujii, N. / Koike, N. et al. | 2005
- 155
-
Security and trust enhanced mobile agent based system designFoster, D. / Varadharajan, V. et al. | 2005
- 159
-
Designing Multimedia for Differences: e-Lecturer, e-Tutor, and e-Student PerspectivesBenson, V. / Frumkin, L. / Murphy, A. et al. | 2005
- 161
-
Multimodal communication system allowing man and avatar to use voice and beckWatanab, Y. / Abe, N. / Tanaka, K. / Taki, H. / Yagi, T. / He, S. et al. | 2005
- 165
-
Framework for an IT-Supported Balanced Scorecard in Health CareKunz, H. / Schaaf, T. / Braun, J. / Tolxdorff, T. et al. | 2005
- 167
-
Multivariate interdependent discretization for continuous attributeSam Chao, / Yiping Li, et al. | 2005
- 169
-
Embedding Information Retrieval and Nearest-Neighbour Algorithm into Automated Essay Grading SystemMustapha, S.M.F.DS. / Idris, N. / Abdullah, R. et al. | 2005
- 173
-
Combining diversity-based active learning with discriminant analysis in image retrievalDagli, C.K. / Rajaram, S. / Huang, T.S. et al. | 2005
- 173
-
Evaluation of Students’ Performance in Online Seminars via Email with Mobile PhonesHino, K. / Terashima, K. / Bunno, T. / Yamanoue, T. / Hino, N. et al. | 2005
- 179
-
Ontology querying and its software component for design support in supply chainsPaik, I. / Akimoto, H. et al. | 2005
- 179
-
Classify of Underwater Target Utilizing Audio FingerprintJian Yuan, / Xin-Wen Xu, / Chang-Jian Fu, / Guo-Hui Li, et al. | 2005
- 185
-
Querying on news stream by using random projectionHirohito Oh'uchi, / Takao Miura, / Isamu Shioya, et al. | 2005
- 185
-
Self-Organizing Gaussian Fuzzy CMAC with Truth Value RestrictionNguyen, M.N. / Shi, D. / Quek, C. et al. | 2005
- 191
-
The Network Monitoring Tool — PickPacketPande, B. / Gupta, D. / Sanghi, D. / Jain, S.K. et al. | 2005
- 191
-
A new classification scheme for software agentsHector, A. / Narasimhan, V.L. et al. | 2005
- 197
-
Autonomous concept formation in software agents for extending ontologiesLangham, E. / Bullock, S. et al. | 2005
- 197
-
SAFE Model Approach to Construction of Intelligent Security SystemsChaczko, Z. / Sinha, S.N. et al. | 2005
- 203
-
Wireless Sensor Network Based System for Fire Endangered AreasChaczko, Z. / Ahmad, F. et al. | 2005
- 203
-
Decision supporting functionality in a virtual enterprise networkLau, H.C.W. / Ho, G.T.S. et al. | 2005
- 208
-
QoS Functions and Theorems for Moving Wireless NetworksAgbinya, J.I. et al. | 2005
- 209
-
Mechanism of semantic oriented flexible workflowWu Yi-ming, / Lu, J. / Yao Shao-wen, / Zheng Zhi-jie, et al. | 2005
- 214
-
Real-Time Representation of Network Traffic Behavior for Enhanced SecurityMcEachen, J.C. / Zachary, J.M. et al. | 2005
- 215
-
An agent related implementation on the Web information retrieval systemLu, J. / Rahman, U. / Shaowen Yao, et al. | 2005
- 220
-
Dynamic Topic Mapping Using Latent Semantic IndexingAndres, F. / Naito, M. et al. | 2005
- 221
-
Towards a Web digital archive ontological unificationPalacios, J.P. / Cremades, J. / Costilla, C. et al. | 2005
- 226
-
A Method of Remote Sensing Image Retrieval Based on ROILei Niu, / Lin Ni, / Wei Lu, / Miao Yuan, et al. | 2005
- 227
-
A grid semantic approach for a digital archive integrated architectureCalleja, A. / Rodriguez, M.J. / Costilla, C. / Fernandez, R. et al. | 2005
- 230
-
The Multifaceted and Ever-Changing Directions of Information Security — Australia Get Ready!Ngo, L. / Wanlei Zhou, et al. | 2005
- 233
-
A design methodology for semantic Web database-based systemsRoldan-Garcia, M.M. / Navas-Delgado, I. / Aldana-Montes, J.F. et al. | 2005
- 234
-
The Research of Data Mining Based on Extension SetsQing Lu, / Yongquan Yu, et al. | 2005
- 238
-
Satellite Interference Detection Using Real-Time Watermarking Technique for SMSChuen-Ching Wang, / Yih-Chuan Lin, / Shu-Chung Yi, et al. | 2005
- 238
-
A formal description of ontology change in OWLAvery, J. / Yearwood, J. et al. | 2005
- 242
-
Experimental Findings on Collaborative Interactions in a Co-Located EnvironmentHussain, N. / deBruijn, O. / Hassan, Z. et al. | 2005
- 244
-
Searching the Web: from keywords to semantic queriesRoyo, J.A. / Mena, E. / Bernad, J. / Illarramendi, A. et al. | 2005
- 249
-
A Novel OFDM Synchronization AlgorithmHu Liu, / Yu hong Duan, / Guang qing Xi, / Li yun Luo, et al. | 2005
- 250
-
Design and implementation of negotiation agent of dynamic supply chainLi Xiaohong, / Yang Danjie, / Feng Zhiyong, et al. | 2005
- 255
-
Performance Analysis of Multiple Packets Combining Decoding in HARQYanping Lu, / Weiling Wu, et al. | 2005
- 256
-
An ontology search engine based on semantic analysisMingxia Gao, / Chunnian Liu, / Furong Chen, et al. | 2005
- 259
-
Design of Binary Multi-code CDMA System with Constant AmplitudeJin Kwan Kim, / Sang-Woo Kim, / Kee-Hoo Yoon, / Heung-Gyoon Ryu, et al. | 2005
- 260
-
Application of data mining in fault diagnosis based on ontologyXiangdan Hou, / Junhua Gu, / Xueqin Shen, / Weili Yan Hebei, et al. | 2005
- 264
-
Multi-agent based modeling and simulation of consensus formations in argumentsOno, K. / Harao, M. / Hirata, K. et al. | 2005
- 265
-
A Lightweight UI Software Infrastructure for Wrist-Based Displays: If Your Microwave Oven Could Talk to Your Watch, What Would It Say?Hutterer, P. / Smith, M.T. / Ankcorn, J. / Piekarski, W. / Thomas, B.H. et al. | 2005
- 268
-
The survey and expansion on quantitative methods to conflict resolutionChih-Yao Lo, / Chen-Feng Wu, et al. | 2005
- 271
-
p-MANET: Efficient Power Saving Protocol for Multi-Hop Mobile Ad Hoc NetworksChiung-Ying Wang, / Chi-Jen Wu, / Guan Nan Chen, / Ren-Hung Hwang, et al. | 2005
- 272
-
Using information-flow theory to support information interoperability in the gridLi Weihua, / Li Shixian, et al. | 2005
- 276
-
A framework for intelligent meta-search engine based on agentJunjie Chen, / Wei Liu, et al. | 2005
- 277
-
The MTCR Scheme for the Integrated Multiple Rate Mobile Data NetworksJeich Mar, / Shang Weng Wang, et al. | 2005
- 280
-
Using of clustering algorithm CWSP-PAM for rural network planningLamiaa Fattouh Ibrahim, et al. | 2005
- 283
-
Constructing Long-Lived Scatternets in Bluetooth NetworksHong-Yi Chang, / Chang Wu Yu, et al. | 2005
- 284
-
Pattern discovery from few dataHsiao-Fan Wang, et al. | 2005
- 288
-
A study of the time effect during data processingZenggui Ou, et al. | 2005
- 289
-
A Mobility Model with Group Partitioning for Wireless Ad Hoc NetworksNg, J.M. / Yan Zhang, et al. | 2005
- 291
-
The design and implement of virtual instrument based on computing technique and USB platformShi Guangfan, / Yan Guangming, / Li Jigang, / Wang Guanran, / Cheng Zeguo, et al. | 2005
- 295
-
Multipath Channel Models for Wireless Local and Metropolitan Area NetworksKyungsoo Jeong, / Kim, S.H. / Chung, K.M. / Kim, J.C. / Yu, J.H. / Lee, J.S. / Seo, S.H. et al. | 2005
- 297
-
Comparison between fuzzy and NN method for speech emotion recognitionRazak, A.A. / Komiya, R. / Izani, M. / Abidin, Z. et al. | 2005
- 299
-
Adaptive Modulation with Space-Time Block Coding for MIMO-OFDM SystemsLin, K.H. / Mahmoud, S.S. / Hussain, Z.M. et al. | 2005
- 303
-
LMRL: a multi-agent reinforcement learning model and algorithmBen-Nian Wang, / Yang Gao, / Zhao-Qian Chen, / Jun-Yuan Xie, / Shi-Fu Chen, et al. | 2005
- 305
-
A Transparent Cache-Based Mechanism for Mobile Ad Hoc NetworksYing-Hong Wang, / Jenhui Chen, / Chih-Feng Chao, / Chien-Min Lee, et al. | 2005
- 308
-
Quantum NN vs. NN in signal recognitionXin-Yi Tsai, / Yu-Ju Chen, / Huang-Chu Huang, / Shang-Jen Chuang, / Rey-Chue Hwang, et al. | 2005
- 311
-
A Novel Time and Frequency Synchronization Approach for OFDM SystemsJibin Wang, / Jinkang Zhu, et al. | 2005
- 313
-
Fast learning neural network with modified neuronsRey-Chue Hwang, / Yu-Ju Chen, / Shang-Jen Chuang, / Huang-Chu Huang, / Wei-Der Chang, et al. | 2005
- 316
-
Performance Tuning in the MacauMap Mobile Map ApplicationBiuk-Aghai, R.P. et al. | 2005
- 319
-
Development of Life Originated Artificial Designer systemWang Yandong, / Huang Kezheng, et al. | 2005
- 322
-
Using the LAS Space-Time Spreading Codes to Achieve High Spectral EfficiencyHao Jiang, et al. | 2005
- 325
-
Study and implementation of the expert system for greenhouse tomato plantingDing Wei-long, / Xiong Fan-lun, / Cheng Zhi-jun, et al. | 2005
- 326
-
PAPR Reduction in MC/DS CDMA System by DFT Spreading CodesYingshan Li, / Ju-Hyun Kyung, / Jong-Won Son, / Heung-Gyoon Ryu, et al. | 2005
- 330
-
Tractor-implement dynamic trajectory model for automated navigation applicationsLei Feng, / Yong He, / Qin Zhang, et al. | 2005
- 330
-
A PAPR Reduction Method Using the Correlation of Information in OFDM Communication SystemSang-Woo Kim, / Hun-Hee Lee, / Chan-Ho Park, / Rag Gyu Jung, / Heung-Gyoon Ryu, et al. | 2005
- 334
-
Wide Area Service Discovery and Adaptation for Mobile Clients in Networks with Ad Hoc BehaviourOumanski, G. / Bertok, P. et al. | 2005
- 336
-
Data mining - an adaptive neural network model for financial analysisShuxiang Xu, / Ming Zhang, et al. | 2005
- 338
-
Over-Saturated Wavelet Packet Multiple Access Communication and Its Multi-User DetectionPeng Liang, / Chuan-gang Zhao, / Weiling Wu, et al. | 2005
- 341
-
Nonlinear nearest-neighbour matching and its application in legal precedent retrievalRuili Wang, / Yiming Zeng, et al. | 2005
- 342
-
Using Look-Ahead Protocol for Mobile Data BroadcastKwok-wa Lam, / Wong, C.S. / Leung, W. et al. | 2005
- 346
-
WiPS: Location and Motion Sensing Technique of IEEE 802.11 DevicesKitasuka, T. / Hisazumi, K. / Nakanishi, T. / Fukuda, A. et al. | 2005
- 347
-
A two level lexical stress assignment model for highly inflected Slovenian languageSef, T. et al. | 2005
- 350
-
Performance of a Multiple Access Orthogonal Wavelet Division Multiplexing SystemLiew, B.A. / Berber, S.M. / Sandhu, G.S. et al. | 2005
- 352
-
The use of formal grammars in isolated word recognitionChirathamjaree, C. et al. | 2005
- 357
-
Crop nutrition diagnosis expert system based on artificial neural networksHaiyan Song, / Yong He, et al. | 2005
- 357
-
Use Symmetrical Color-Spatial Feature for Image ComparisonBing Zhou, / Shou-zhi Wei, et al. | 2005
- 361
-
Robust Image Watermarking Scheme Based on SubsamplingYonggang Fu, / Ruimin Shen, / Liping Shen, et al. | 2005
- 363
-
Particle swarm optimization learning fuzzy systems designHsuan-Ming Feng, et al. | 2005
- 366
-
Error Detection and Copyrights Protection Scheme for MPEG-2 Based on Channel Coded Watermark SignalChangseok Bae, / Yuk Ying Chung, / Xiao Ming Chen, / Peng Hao Wang, et al. | 2005
- 367
-
Constraints for automated generating Chinese metaphorsChang Su, / Changle Zhou, et al. | 2005
- 371
-
Utilizing Disks for the Available Link Bandwidth Video Delivery MethodIto, H. / Fukumura, T. et al. | 2005
- 371
-
Evolving task specific algorithms for machine vision applicationsCallaghan, M.J. / McGinnity, T.M. / McDaid, L. et al. | 2005
- 375
-
A decomposition scheme based on error-correcting output codes for ensembles of text categorizersAdeva, J.J.G. / Calvo, R.A. et al. | 2005
- 377
-
Stream-Based Interactive Video Language Authoring Using Correlated Audiovisual WatermarkingXu, R.Y.D. / Jin, J.S. / Allen, J.G. et al. | 2005
- 379
-
Automatic vehicle classification instrument based on multiple sensor information fusionWeiming Liu, / Xueping Zhao, / Jingfang Xiao, / Youlong Wu, et al. | 2005
- 381
-
Space-Time OFDM with Adaptive Beamforming for Wireless Multimedia ApplicationsAthanasiadis, T. / Lin, K.H. / Hussain, Z.M. et al. | 2005
- 383
-
Probabilistic reasoning techniques for situation assessmentsHoward, C. / Stumptner, M. et al. | 2005
- 387
-
Experiences with simulated robot soccer as a teaching toolHill, R. / van den Hengel, A. et al. | 2005
- 387
-
Performance Analysis of Caching Strategies for Proxy-Assisted VOD ServicesChen-Lung Chan, / Shih-Yu Huang, / Nien-Chen Lin, / Jia-Shung Wang, et al. | 2005
- 391
-
A fuzzy expert system based on reconstructable neural network and its applicationRui-Jun Zhang, / Ding-Fang Chen, / Yu Li, et al. | 2005
- 393
-
Multimedia Multicast Using SPLIT and Layered FECChilamkurti, N.K. / Soh, B. et al. | 2005
- 395
-
Extension set and restricting qualifications of matter-elements' extensionJu Yijing, / Yu Yongquan, / Ju Guangming, / Cai Wen, et al. | 2005
- 397
-
Fuzzy-Based Mass Media Content Management Platform: Architecture and Application ModelSanxing Cao, / Xianglin Huang, / Rui Lu, / Zhanxin Yang, et al. | 2005
- 399
-
Extension set and the research of the extension ADD transformationZhu Qinhua, / Yu Yongquan, / Cai Wen, et al. | 2005
- 401
-
Image Indexing in DCT DomainYung-Gi Wu, / Je-Hung Liu, et al. | 2005
- 403
-
Automatically compute the classical field of matter-element model based on genetic algorithmsChen Heqing, / Yu Yongquan, / Chen Zhibin, et al. | 2005
- 407
-
Extension control algorithm using extension set in control systemHuang Ying, / Yu Yongquan, / Zhang Ling, et al. | 2005
- 407
-
Dynamic Markov Compression Using a Crossbar-Like Tree Initial Structure for Chinese TextsGhim-Hwee Ong, / Jun-Ping Ng, et al. | 2005
- 411
-
The related matter-elements in extension detecting and applicationYu Yongquan, / Huang Ying, / Wang Minghui, et al. | 2005
- 411
-
Perfect KDB-Tree: A Compact KDB-Tree Structure for Indexing Multidimensional DataHung-Yi Lin, / Po-Whei Huang, et al. | 2005
- 415
-
Performance Analysis for Construction of a Performance Practice Support SystemOzaki, S. / Harao, M. / Hirata, K. et al. | 2005
- 415
-
Using fuzzy functions to aggregate usability study data: a novel approachRamalingam, S. / Iourinski, D. et al. | 2005
- 419
-
Using topic keyword clusters for automatic document clusteringHsi-Cheng Chang, / Chiun-Chieh Hsu, et al. | 2005
- 421
-
A Model for Secure Knowledge SharingAhmad, I. / Hong Tat Ewe, et al. | 2005
- 425
-
Mutually-beneficial iE-E Seeker, a Web intelligent matching using multi-dimensional case-based reasoningChew Esyin, et al. | 2005
- 426
-
A New Method for Exchanging Secret KeysStickel, E. et al. | 2005
- 429
-
Using Dempster Shafer theory to aggregate usability study dataIourinski, D. / Ramalingam, S. et al. | 2005
- 431
-
A Defense System against DDoS Attacks by Large-Scale IP TracebackYang Xiang, / Wanlei Zhou, et al. | 2005
- 437
-
Iris Feature Extraction Using 2D Phase CongruencyXiaoyan Yuan, / Pengfei Shi, et al. | 2005
- 437
-
A parallel Euler approach for large-scale biological sequence assemblyWei Shi, / Wanlei Zhou, et al. | 2005
- 442
-
EC-PAY: An Efficient and Secure ECC-Based Wireless Local Payment SchemeMe, G. / Strangio, M.A. et al. | 2005
- 442
-
Optimal policy for a class of compartmental modelsThanda, A. / Tin, P. / Ochimizu, K. et al. | 2005
- 447
-
Fast parallel DNA-based algorithms for molecular computation: determining a prime numberWeng-Long Chang, / Ho, M. / Minyi Guo, / Xiaohong Jiang, / Jingling Xue, / Minglu Li, et al. | 2005
- 448
-
An Efficient Authentication Scheme with Fault Tolerance for Database SystemsZhang, C.N. / Chunren Lai, / Honglan Zhong, et al. | 2005
- 453
-
Motif extraction from biological sequences: trends and contributions to other scientific fieldsPerdikuri, K. / Tsakalidis, A. et al. | 2005
- 454
-
Study on NTRU Decryption FailuresWeichi Yu, / He, D. / Shixiong Zhu, et al. | 2005
- 459
-
Integration of knowledge-discovery and artificial-intelligence approaches for promoter recognition in DNA sequencesYin-Fu Huang, / Chia-Ming Wang, et al. | 2005
- 460
-
Distributed Denial of Service Attacks and Anonymous Group Authentication on the InternetSaxena, A. / Soh, B. et al. | 2005
- 465
-
Statistical-Based SYN-Flooding Detection Using Programmable Network ProcessorBoonPing Lim, / Uddin, Md.S. et al. | 2005
- 465
-
Protein ontology: vocabulary for protein dataSidhu, A.S. / Dillon, T.S. / Chang, E. / Sidhu, B.S. et al. | 2005
- 470
-
Classification of alcohol abusers: an intelligent approachKanna, P.S. / Palaniappan, R. / Ravi, K.V.R. et al. | 2005
- 471
-
Rights Sensitive Information Sharing Space Based on Multi-Agent SystemAmamiya, S. / Amamiya, M. et al. | 2005
- 475
-
Comparative study of multivariate classification methods using microarray gene expression data for BRCA1/BRCA2 cancer tumorsRaza, M. / Gondal, I. / Green, D. / Coppel, R.L. et al. | 2005
- 477
-
Efficient Secret Sharing Schemes from Room SquareJuan, J.S.-T. / Chia-Li Huang, et al. | 2005
- 482
-
Privacy Protection in Mobile Agent Based Service DomainHuda, Md.N. / Yamada, S. / Kamioka, E. et al. | 2005
- 483
-
Real-time spoken affect classification and its application in call-centresMorrison, D. / Ruili Wang, / De Silva, L.C. / Xu, W.L. et al. | 2005
- 488
-
Capability-Based Egress Network Access Control for Transferring Access RightsSuzuki, S. / Shinjo, Y. / Hirotsu, T. / Itano, K. / Kato, K. et al. | 2005
- 488
-
Accessibility solutions for visually impaired users of Web discussion boardsWalters, P.A. / Araujo, A. / Hezart, A. / Naik, S. et al. | 2005
- 494
-
Spoken communication with computer game charactersRudra, T. / Tien, D. / Bossomaier, T. et al. | 2005
- 496
-
A Multimedia Traffic Classification Scheme for Intrusion Detection SystemsMarques, O. / Baillargeon, P. et al. | 2005
- 501
-
Building a road weather information network for integrating data from heterogeneous sourcesKoonar, A. / Eng, P. / Delannoy, P. / Denault, D. et al. | 2005
- 502
-
A Fair Item-Item Exchange Protocol Satisfying Newly Introduced RequirementsHao Wang, / Heqing Guo, / Manshan Lin, / Jianfei Yin, et al. | 2005
- 508
-
WiFiAdmin: an intelligent Web-based management environment for wireless networksDimopoulos, E. / Panousis, A. / Sakkopoulos, E. / Tsakalidis, A. et al. | 2005
- 508
-
Security for Authenticated Key Exchange Based on Non-MalleabilityHada, H. / Tanaka, K. et al. | 2005
- 514
-
Universal Designated-Verifier Signature with AggregationMihara, A. / Tanaka, K. et al. | 2005
- 514
-
Automated question answering: review of the main approachesAndrenucci, A. / Sneiders, E. et al. | 2005
- 520
-
Recognising Individuals Using Their Brain PatternsRavi, K.V.R. / Palaniappan, R. et al. | 2005
- 520
-
Enhancing RSS feeds: eliminating overhead through binary encodingDe Sutter, R. / Lerouge, S. / De Schrijver, D. / Van de Walle, R. et al. | 2005
- 524
-
A Description Logic for PKI Trust Domain ModelingHaibo Yu, / Chunzhao Jin, / Haiyan Che, et al. | 2005
- 526
-
Study on farm information acquisition by using wireless remote methods and treatment systemsYong He, / Haihong Yu, / Zhengjun Qiu, et al. | 2005
- 529
-
Building scale-free overlay mix networks with small-world propertiesTianbo Lu, / Binxing Fang, / Yuzhong Sun, / Xueqi Cheng, et al. | 2005
- 531
-
Robust routing table design for IPv6 lookupYong, S.M. / Ewe, H.T. et al. | 2005
- 535
-
A scalable grouping random key predistribution scheme for large scale distributed sensor networksPo-Jen Chuang, / Tun-Hao Chao, / Bo-Yi Li, et al. | 2005
- 537
-
On dynamic routing and wavelength assignment in multi-granular all-optical networksChing-Fang Hsu, / Te-Lung Liu, / Fang-Sheng Lin, et al. | 2005
- 541
-
Efficient security mechanisms for the distributed wireless sensor networksPrasan Kumar Sahoo, / Jonathan Jen-Rong Chen, / Ping-Tai Sun, et al. | 2005
- 543
-
A Web redirection service for variant Chinese domain name resolutionJeng-Wei Lin, / Li-Ming Tseng, / Jan-Ming Ho, / Feipei Lai, et al. | 2005
- 547
-
FPGA and ASIC Implementation of ECC processor for security on medical embedded systemJin Park, / Jeong-Tae Hwang, / Young-Chul Kim, et al. | 2005
- 549
-
Incomplete test vectors fail to detect obscure VoIP software errorsTeck-Kuen Chua, / Pheanis, D.C. et al. | 2005
- 552
-
A framework for quantifying information system survivabilityXuegang Lin, / Miaoliang Zhu, / Rongsheng Xu, et al. | 2005
- 555
-
Single event effects as a reliability issue of IT infrastructureIbe, E. / Kameyama, H. / Yahagi, Y. / Yamaguchi, H. et al. | 2005
- 556
-
Application of rough set theory in network fault diagnosisYuqing Peng, / Gengqian Liu, / Tao Lin, / Hengshan Geng, et al. | 2005
- 560
-
Some remarks on security of receipt-free e-auctionHer, Y.-S. / Imamoto, K. / Sakurai, K. et al. | 2005
- 561
-
Zero-skew driven for RLC clock tree construction in SoCChia-Chun Tsai, / Jan-Ou Wu, / Ghung-Chieh Kuo, / Trong-Yen Lee, / Wen-Ta Lee, et al. | 2005
- 564
-
The authorization service in dynamic trust domainsWu Liu, / Jian-Ping Wu, / Hai-Xin Duan, / Xing Li, et al. | 2005
- 567
-
Research on knowledge communication of dynamic virtual communities based on ontologyLi Wang, / XueLi Yu, et al. | 2005
- 568
-
Secure embedded error detection arithmetic codingTeekaput, P. / Chokchaitam, S. et al. | 2005
- 572
-
Uncovering attacks on security protocolsWuu Yang, et al. | 2005
- 573
-
Personalized Web search results with profile comparisonsLai, J. / Soh, B. et al. | 2005
- 576
-
A modified (t, n) threshold proxy signature scheme based on the RSA cryptosystemWen-Chung Kuo, / Ming-Yang Chen, et al. | 2005
- 577
-
Ship steering system based on fuzzy control using real-time tuning algorithmWang Minghui, / Yu Yongquan, / Zeng Bi, et al. | 2005
- 580
-
Protecting Customer’s Privacy in Querying Valuable Information Combined with E-Payment SchemeChun-Hua Chen, / Chi-Min Lan, / Gwoboa Horng, et al. | 2005
- 581
-
Design and verification for PCI Express controllerEugin Hyun, / Kwang-Su Seong, et al. | 2005
- 584
-
Investigation on operations of a secure communication system based on the chaotic phase shift keying schemeSandhu, G.S. / Berber, S.M. et al. | 2005
- 587
-
A study for packet buffer algorithms for a protocol processorRajan, V. / Chu, Y. et al. | 2005
- 591
-
Implementation of velocity filtering for sequential architecturesSearle, S.J. et al. | 2005
- 591
-
Receiver design for OCDMA users in a hybrid OCDMA/WDMA systemPo-Hao Chang, / Chi-Yi Liao, / Jun-Ren Chen, et al. | 2005
- 595
-
Algorithms for intelligent turret assembly systemTan Hock-Woo, / Lee Keok-Kee, / Tay Leng-Phuan, et al. | 2005
- 597
-
A robust watermarking scheme combined with the FSVQ for imagesYih-Chuan Lin, / Zni-Kang Huang, / Ri-Ting Pong, / Chuen-Ching Wang, et al. | 2005
- 599
-
A compression layer for NAND type flash memory systemsWen-Tzeng Huang, / Chun-Ta Chen, / Yen-Sheng Chen, / Chin-Hsing Chen, et al. | 2005
- 603
-
New approach for detection using wavelet coefficientsChendeb, M. / Khalil, M. / Duchene, J. et al. | 2005
- 607
-
A 3D reconstruction algorithm based on 3D deformable atlasYing Zhu, / Belkasim, S. et al. | 2005
- 608
-
"Do you know a similar project I can learn from?" Self-monitoring of communities of practice in the cultural sciencesKlamma, R. / Spaniol, M. / Jarke, M. et al. | 2005
- 613
-
A new digital implementation of ridgelet transform for images of dyadic lengthXia Jun Jun, / Ni Lin, / Miao, Y. et al. | 2005
- 614
-
Background noise distribution after high-resolution processing in ship-borne radarZhang Zhong, et al. | 2005
- 617
-
Image deblurring via smoothness-switching on Holder spacesMong-Shu Lee, et al. | 2005
- 618
-
A nonlinear detection scheme for sinusoid in additive unknown colored Gaussian noiseJianfeng Weng, et al. | 2005
- 622
-
Improved reconstruction algorithm from weighted sampling points in shift-invariant signal spacesJun Xian, / Yong He, et al. | 2005
- 623
-
Automatic colour detection for car repaintingAl-Bahadly, I. / Darhmaoui, H. et al. | 2005
- 626
-
Performance of sinusoidally-distributed dithering for signed-error constant modulus algorithmJusak, J. / Hussain, Z.M. et al. | 2005
- 629
-
Elimination of exposure artifacts in predicted images by means of an adaptive circular median filterPieper, M. / Kummert, A. et al. | 2005
- 630
-
A new approach in chaos shift keying for secure communicationLau, Y.-S. / Hussain, Z.M. et al. | 2005
- 634
-
Capsule Endoscopy Image Coding Using Wavelet-Based Adaptive Vector Quantization without Codebook TrainingMiaou, S.-G. / Shih-Tse Chen, / Fu-Sheng Ke, et al. | 2005
- 638
-
On accuracy/robustness/complexity trade-offs in face verificationSanderson, C. / Cardinaux, F. / Bengio, S. et al. | 2005
- 641
-
Modified packet combining using error forecasting decoding to control errorBhunia, C.T. et al. | 2005
- 644
-
An effective skeletonization method based on adaptive selection of contour pointsMorrison, P. / Ju Jia Zou, et al. | 2005
- 647
-
A novel traffic independent NNC for dynamic buffer tuning to shorten the RTT of a TCP channelLin, W.W.K. / Wong, A.K.Y. / Dillon, T.S. et al. | 2005
- 650
-
On local features for GMM based face verificationSanderson, C. / Saban, M. / Yongsheng Gao, et al. | 2005
- 653
-
An intelligent algorithm for improving QOS in a delay-based end-to-end congestion avoidance schemeYan, L. / Qiu, B. et al. | 2005
- 656
-
Recent progresses on cerebral vasculature segmentation for 3D quantification and visualization of MRASuhuai Luo, / Jin, J.S. et al. | 2005
- 659
-
IPv6 packet classification based on flow label, source and destination addressesPoh, E.C.K. / Ewe, H.T. et al. | 2005
- 662
-
WDFB contourlet and shearing invariant for image denoisingZhang Peng, / Ni Lin, et al. | 2005
- 665
-
Evaluation of IPv6 and comparative study with different operating systemsMohamed, S.S. / Abusin, A.Y.M. / Chieng, D. et al. | 2005
- 668
-
Automatic visual recognition of face and body action unitsGunes, H. / Piccardi, M. et al. | 2005
- 671
-
A structured peer-to-peer method to discover QoS enhanced alternate pathsRakotoarivelo, T. / Senac, P. / Seneviratne, A. / Diaz, M. et al. | 2005
- 674
-
Adaptive-centre candidate decimation distance-dependent thresholding search for motion estimationSorwar, G. et al. | 2005
- 677
-
A comparison of ultra wideband signal functions for wireless ad hoc networksAgbinya, J.I. / Truong, H.D. et al. | 2005
- 680
-
Region graph based text extraction from outdoor imagesHiroki Takahashi, / Masayuki Nakajima, et al. | 2005
- 683
-
A critical analysis of multilayer IP security protocolSing, J. / Soh, B. et al. | 2005
- 686
-
On-line recognition of Pitman shorthand for fast mobile text entryMa Yang, / Leedham, G. / Higgins, C. / Swe Myo Htwe, et al. | 2005
- 689
-
On the use of Snoop with geostationary satellite linksSing, J. / Soh, B. et al. | 2005
- 692
-
Mean shift object tracking for a SIMD computerAllen, J.G. / Xu, R.Y.D. / Jin, J.S. et al. | 2005
- 695
-
Limited range wavelength converter sharing in WDM networksRashid, M.M. / Xu, S. / Tanaka, Y. et al. | 2005
- 698
-
Online character recognitionAgarwal, S. / Kumar, V. et al. | 2005
- 701
-
The algorithm of repeat TPC decodingYuhuang Ye, / Jun Chen, et al. | 2005
- 704
-
An enhanced exact procedure for the CMST problemJinpeng Huai, / Jun Han, et al. | 2005
- 704
-
Skew detection of document images using line structural informationChih-Hong Kao, / Hon-Son Don, et al. | 2005
- 710
-
Region-Based Color Correction of ImagesHsu, Chin-hao / Chen, Zhih-wei / Chiang, Cheng-chin et al. | 2005
- 710
-
FICC-DiffServ: A New QoS Architecture Supporting Resources Discovery, Admission and Congestion ControlsHa Trung Phan, / Hoang, D.B. et al. | 2005
- 716
-
A European knowledgebase framework for deployment of real time AV-communication in distance teachingStav, J.B. / Tsalapatas, H. et al. | 2005
- 716
-
Quad-tree-based image shape coding with block compensationLih-Yang Wang, / Ching-Hui Lai, / Kuan-Ren Pan, et al. | 2005
- 720
-
Combining multiple precision-boosted classifiers for indoor-outdoor scene classificationDa Deng, / Jianhua Zhang, et al. | 2005
- 722
-
Performance study for streaming layered encoded videos in broadcast environmentWing-Fai Poon, / Kwok-Tung Lo, / Jian Feng, et al. | 2005
- 726
-
Fast Fourier transform in the spiral honeycomb image algebraSheridan, P. / Alexander, D.M. / Nunn-Clark, K.S. et al. | 2005
- 728
-
Specknets: new challenges for wireless communication protocolsWong, K.J. / Arvind, D.K. et al. | 2005
- 732
-
Mean shift for accurate number plate detectionWenjing Jia, / Huaifeng Zhang, / Xiangjian He, et al. | 2005
- 734
-
A new sum-of-disjoint-products technique to determine network reliabilities with known minimal pathsWei-Chang Yeh, et al. | 2005
- 738
-
Fingerprint alignment using ring modelFang Li, / Leung, M.K.H. / Chuan Liu, et al. | 2005
- 739
-
Grid architecture storage - utilising grid computing for dynamic data storageKoszek, P. / Sandrasegaran, K. et al. | 2005
- 743
-
An efficient EWS for non-PC deviceWenbo Zhang, / Hai Zhao, / Xiaoying Wang, / Zhenyu Yin, / Ming Zhao, et al. | 2005
- 744
-
Enhancement of semantics in CBIRZiqiang Feng, / Tien, D. et al. | 2005
- 746
-
Visual steganalysis of LSB-encoded natural imagesWatters, P.A. / Martin, F. / Stripf, S.H. et al. | 2005
- 747
-
A control theoretic analysis of mixed TCP and UDP traffic under RED based on nonlinear dynamic modelWang Li, / Li Zeng-zhi, / Chen Yan-ping, et al. | 2005
- 751
-
Extendable media stream mechanisms for heterogeneous communication environmentsHashimoto, K. / Shibata, Y. et al. | 2005
- 752
-
Experiments on emergence index in content-based image retrievalDeb, S. et al. | 2005
- 755
-
Automatic address assignment for IPv6 end-to-end multihoming sitesOhira, K. / Koyama, Y. / Fujikawa, K. / Okabe, Y. et al. | 2005
- 756
-
Fractal image compression methods: a reviewZhao, E. / Liu, D. et al. | 2005
- 759
-
Improved marking model ERPPM tracing back to DDoS attackerWu Liu, / Hai-Xin Duan, / Jian-Ping Wu, / Xing Li, et al. | 2005
- 760
-
Automated feature points management for video mosaic constructionJing Li, / Quan Pan, / Tao Yang, / Li, S.Z. et al. | 2005
- 764
-
Using image contour recognition in GIS navigationWei Lai, / Donggang Yu, / Tanaka, J. / Cai Fei, et al. | 2005
- 765
-
Managing the co-existing network of IPv6 and IPv4 under various transition mechanismsI-Ping Hsieh, / Shang-Juh Kao, et al. | 2005
- 768
-
Automatic seal imprint verification system for bank check processingUeda, K. / Matsuo, K. et al. | 2005
- 772
-
Detection of dominant points based on noise suppression and error minimisationShearer, M. / Ju Jia Zou, et al. | 2005
- 772
-
An overview of research on reverse engineering XML schemas into UML diagramsYu, A. / Steele, R. et al. | 2005
- 776
-
An efficient image compression scheme for air tickets storageWang Shengke, / Wang Zhiyan, / Zhou Dehua, et al. | 2005
- 778
-
UDDI access controlDai, J. / Steele, R. et al. | 2005
- 780
-
A hybrid wavelet-based compression systemYap, V.V. / Comley, R. et al. | 2005
- 784
-
Adaptation of the balanced scorecard model to the IT functionsJahankhani, H. / Ekeigwe, J.I. et al. | 2005
- 785
-
Author index| 2005
- c1
-
Third International Conference on Information Technology and Applications - Cover| 2005
- i
-
Third International Conference on Information Technology and Applications - Title Page| 2005
- iv
-
Third International Conference on Information Technology and Applications - Copyright Page| 2005
- v
-
Third International Conference on Information Technology and Applications - Table of Contents| 2005
- xxi
-
Message from the Chairs| 2005
- xxii
-
Program Committee| 2005
- xxiv
-
Additional reviewers| 2005
- xxv
-
Organizing Committee| 2005
- xxvi
-
Sponsors| 2005
-
Proceedings. Third International Conference on Information Technology and Applications| 2005