Proceedings ITCC 2004 International Conference on Information Technology: Coding and Computing. Volume 1 - Table of Contents (English)
In:
International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004.
;
1
;
0_5-0_16
;
2004
-
ISBN:
- Conference paper / Electronic Resource
-
Title:Proceedings ITCC 2004 International Conference on Information Technology: Coding and Computing. Volume 1 - Table of Contents
-
Published in:
-
Publisher:
- New search for: IEEE
-
Publication date:2004-01-01
-
Size:1316738 byte
-
ISBN:
-
DOI:
-
Type of media:Conference paper
-
Type of material:Electronic Resource
-
Language:English
-
Source:
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 0_1
-
Proceedings. ITCC 2004. International Conference on Information Technology: Coding and Computing| 2004
- 0_3
-
Proceedings ITCC 2004 International Conference on Information Technology: Coding and Computing. Volume 1| 2004
- 0_4
-
Copyright page| 2004
- 0_5
-
Proceedings ITCC 2004 International Conference on Information Technology: Coding and Computing. Volume 1 - Table of Contents| 2004
- 0_5
-
Proceedings ITCC 2004 International Conference on Information Technology: Coding and Computing - Volume 2 - Table of Contents| 2004
- 0_17
-
General Chair's messageLatifi, Shahram et al. | 2004
- 0_18
-
Reviewers| 2004
- 2
-
Jigsaw-based secure data transfer over computer networksVasudevan, R.A. / Abraham, A. / Sanyal, S. / Agrawal, D.P. et al. | 2004
- 2
-
Performance evaluation of block-based motion estimation algorithms and distortion measuresSubramanya, S.R. / Patel, H. / Ersoy, I. et al. | 2004
- 7
-
Semi-fragile watermarking scheme for authentication of JPEG imagesChi Kin Ho, / Chang-Tsun Li, et al. | 2004
- 8
-
Geoblock: a LVQ-based framework for geographic image retrievalZhu, L. et al. | 2004
- 12
-
Mitigating the untrusted terminal problem using conditional signaturesBerta, I.Z. / Buttyan, L. / Vajda, I. et al. | 2004
- 13
-
Language model-based retrieval for Farsi documentsTaghva, K. / Coombs, J. / Pareda, R. / Nartker, T. et al. | 2004
- 13
-
Language Model-based Retieval for Farsi DocumentsTaghva, K. / Coombs, J. / Pareda, R. / Nartker, T. / IEEE et al. | 2003
- 17
-
Arcanum: a secure and efficient key exchange protocol for the InternetMian, A.S. / Masood, A. et al. | 2004
- 18
-
Summarizing inter-query learning in content-based image retrieval via incremental semantic clusteringGondra, I. / Heisterkamp, D.R. et al. | 2004
- 22
-
A security protocol for certified e-goods deliveryNenadic, A. / Ning Zhang, / Barton, S. et al. | 2004
- 23
-
A framework for trajectory based visual event retrievalErsoy, I. / Bunyak, F. / Subramanya, S.R. et al. | 2004
- 30
-
Enhancing anonymity via market competitionShouhuai Xu, / Nelson, W.R. / Sandhu, R. et al. | 2004
- 30
-
Detecting anomalies in high-performance parallel programsFlorez, G. / Liu, Z. / Bridges, S. / Vaughn, R. / Skjellum, A. et al. | 2004
- 35
-
Grid workflow based on dynamic modeling and schedulingShaohua Zhang, / Ning Gu, / Saihan Li, et al. | 2004
- 35
-
A secure account-based mobile payment protocolKungpisdan, S. / Srinivasan, B. / Phu Dung Le, et al. | 2004
- 40
-
Extensible communication architecture for grid nodesMohamed, N. / Al-Jaroodi, J. / Jiang, H. et al. | 2004
- 40
-
Accountability logic for mobile payment protocolsKungpisdan, S. / Srinivasan, B. / Phu Dung Le, et al. | 2004
- 45
-
Access policy specification for Web applicationsBarker, S. et al. | 2004
- 45
-
Face recognition using interpolated Bezier curve based representationPal, S. / Biswas, P.K. / Abraham, A. et al. | 2004
- 50
-
Run-time detection of buffer overflow attacks without explicit sensor data objectsChangwoo Pyo, / Byungchul Bae, / Taejin Kim, / Gyungho Lee, et al. | 2004
- 50
-
A Web/grid portal implementation of BioSimGrid: a biomolecular simulation databaseWu, B. / Dovey, M. / Ng, M.H. / Tai, K. / Murdock, S. / Jeffreys, P. / Cox, S. / Essex, J. / Sansom, M.S.P. et al. | 2004
- 56
-
Achieving distributed trusted servicesBamasak, O. / Zhang, N. et al. | 2004
- 56
-
A problem solving environment for remote sensing data processingAloisio, G. / Cafaro, M. / Epicoco, I. / Quarta, G. et al. | 2004
- 62
-
A demonstration of collaborative Web services and peer-to-peer gridsWang, M. / Fox, G. / Pallickara, S. et al. | 2004
- 62
-
Performance evaluation of data integrity mechanisms for mobile agentsGunupudi, V. / Tate, S.R. et al. | 2004
- 68
-
On the matching of events in distributed brokering systemsPallickara, S. / Fox, G. et al. | 2004
- 70
-
Adaptive neuro-fuzzy intrusion detection systemsChavan, S. / Shah, K. / Dave, N. / Mukherjee, S. / Abraham, A. / Sanyal, S. et al. | 2004
- 75
-
Cryptographic protocol analysis using goal extractionEdmonds, J. / Papa, M. et al. | 2004
- 77
-
Performing security analysis of large scale power systems with a broker-based computational gridDi Santo, M. / Ranaldo, N. / Villacci, D. / Zimeo, E. et al. | 2004
- 81
-
ProtoMon: embedded monitors for cryptographic protocol intrusion detection and preventionJoglekar, S.P. / Tate, S.R. et al. | 2004
- 83
-
G-AQFS: grid computing exploitation for the management of air quality in presence of complex meteorological circulationsAloisio, G. / Cafaro, M. / Cesari, R. / Mangia, C. / Marra, G.P. / Miglietta, M. / Mirto, M. / Rizza, U. / Schipa, I. / Tanzarella, A. et al. | 2004
- 90
-
Integrating ontology and workflow in PROTEUS, a grid-based problem solving environment for bioinformaticsCannataro, M. / Comito, C. / Guzzo, A. / Veltri, P. et al. | 2004
- 90
-
Web server attack categorization based on root causes and their locationsJeongseok Seo, / Han-Sung Kim, / Sanghyun Cho, / Sungdeok Cha, et al. | 2004
- 95
-
Grid Job Builder - a workflow editor for computing gridsJung, C. / Einhoff, M. / Noll, S. / Schiffner, N. et al. | 2004
- 97
-
A fast pattern-match engine for network processor-based network intrusion detection systemRong-Tai Liu, / Nen-Fu Huang, / Chia-Nan Kao, / Chih-Hao Chen, / Chi-Chieh Chou, et al. | 2004
- 100
-
The Cost-Effective Critical Path Approach for Service Priority Optimization in the Grid Computing EconomyLin, M. / Lin, Z. / IEEE et al. | 2003
- 100
-
A cost-effective critical path approach for service priority optimization in the grid computing economyLin, M. / Lin, Z. et al. | 2004
- 102
-
A modified optical image reconstruction model with information feedbackChaoyang Zhang, / Yukong Zhang, et al. | 2004
- 105
-
OGSA-WebDB: an OGSA-based system for bringing Web databases into the gridPahlevi, S.M. / Kojima, I. et al. | 2004
- 107
-
Threshold and identity-based key management and authentication for wireless ad hoc networksHongmei Deng, / Mukherjee, A. / Agrawal, D.P. et al. | 2004
- 111
-
Effectiveness of advanced and authenticated packet marking scheme for traceback of denial of service attacksRizvi, B. / Fernandez-Gaucherand, E. et al. | 2004
- 112
-
An extensible framework for practical secure component composition in a ubiquitous computing environmentLlewellyn-Jones, D. / Merabti, M. / Qi Shi, / Askwith, B. et al. | 2004
- 116
-
Vulnerability scanning for buffer overflowAishwarya Iyer, / Liebrock, L.M. et al. | 2004
- 118
-
Disaster coverable PKI model based on Majority Trust principleTzvetkov, V. et al. | 2004
- 118
-
Distributed knowledge networks: towards a new paradigm for delivering knowledgeCuzzocrea, A. / Bellas, F. et al. | 2004
- 120
-
A novel relevance feedback method in content-based image retrievalBaice Li, / Senmiao Yuan, et al. | 2004
- 124
-
OntoTag's linguistic ontologies: improving semantic Web annotations for a better language understanding in machinesde Cea, G.A. / de Mon, I.A. / Gomez-Perez, A. / Pareja-Lora, A. et al. | 2004
- 124
-
Identity-based threshold signature scheme from the bilinear pairings (extended abstract)Joonsang Baek, / Yuliang Zheng, et al. | 2004
- 124
-
Identity-Based Threshold Signature Scheme from the Bilinear PairingsBaek, J. / Zheng, Y. / IEEE et al. | 2003
- 129
-
HORSE: an extension of an r-time signature scheme with fast signing and verificationNeumann, W.D. et al. | 2004
- 129
-
Bidding in P2P content distribution networks using the lightweight currency paradigmElrufaie, E. / Turner, D.A. et al. | 2004
- 131
-
Improving classification performance for heterogeneous cancer gene expression dataFung, B.Y.M. / Ng, V.T.Y. et al. | 2004
- 133
-
Monitoring the development process with EclipseSillitti, A. / Janes, A. / Succi, G. / Vernazza, T. et al. | 2004
- 135
-
Modeling a grid-based problem solving environment for mobile devicesKurkovsky, S. / Bhagyavati, / Ray, A. / Yang, M. et al. | 2004
- 136
-
Recurrent exercises for introductory human computer interaction coursesTurban, R. et al. | 2004
- 138
-
An integrated neighborhood dependent approach for nonlinear enhancement of color imagesTao, L. / Vijayan Asari, et al. | 2004
- 140
-
Extendible range-based numbering scheme for XML documentXing, G. / Tseng, B. et al. | 2004
- 141
-
A new approach to learning algorithmsMudner, T. / Shakshuki, E. et al. | 2004
- 142
-
An extension of XQuery for moving objects over GMLChung, W. / Soon-Young Park, / Hae-Young Bae, et al. | 2004
- 146
-
Computer skills training to (middle-aged) adults: problems and programMartinez-Balleste, A. / Sebe, F. / Domingo-Ferrer, J. et al. | 2004
- 148
-
An evaluation of new and old similarity ranking algorithmsLynch, P. / Luan, X. / Prettyman, M. / Mericle, L. / Borkmann, E. / Schlaifer, J. et al. | 2004
- 150
-
Experiments on a secure compression algorithmCelikel, E. / Dalkilic, M.E. et al. | 2004
- 151
-
Dependency theory e-learning toolDouglas, P. / Barker, S. et al. | 2004
- 153
-
A GCD attack resistant CRTHACS for secure group communicationsZou, X. / Ramamurthy, B. / Magliveras, S.S. et al. | 2004
- 155
-
A distributed quadtree dictionary approach to multi-resolution compressionDooley, R. et al. | 2004
- 156
-
A Web-service oriented framework for building SCORM compatible learning management systemsChih-Ping Chu, / Ching-Pao Chang, / Chung-Wei Yeh, / Yu-Fang Yeh, et al. | 2004
- 157
-
Face detection technique based on rotation invariant wavelet featuresSatyanadh Gundimada, / Vijayan Asari, et al. | 2004
- 159
-
Integrating compression with watermarking on video sequencesGiannoula, A. / Hatzinakos, D. et al. | 2004
- 162
-
Fuzzy measures and integrals for evaluating strategiesNarukawa, Y. / Torra, V. et al. | 2004
- 164
-
Games and animation: collaborations between the arts and computer scienceParker, J.R. et al. | 2004
- 167
-
How to make e-cash with non-repudiation and anonymitySong, R. / Korba, L. et al. | 2004
- 169
-
Web-based mathematics education: MeML design and implementationWang, P.S. / Yi Zhou, / Xiao Zou, et al. | 2004
- 173
-
A workshop on advanced separation of concerns and aspect-oriented programmingDechow, D.R. et al. | 2004
- 176
-
IT security project: implementation of the Advanced Encryption Standard (AES) on a smart cardSchramm, K. / Paar, C. et al. | 2004
- 176
-
IT Security Project: Implementation of the Advanced Encyption Standard Algorithm AES on a Smart CardSchramm, K. / Paar, C. / IEEE et al. | 2003
- 178
-
Applied fieldbus knowledge for ICT engineersMarino, P. / Hernandez, H. / Dominguez, M.A. / Poza, F. / Machado, F. / Vazquez, F. et al. | 2004
- 181
-
An instructor's environment for automatic generation of problem sequencesAzalov, P. / Zlatarova, F. et al. | 2004
- 183
-
An approach to improving the quality of part-of-speech tagging of Chinese textYi-li Qian, / Jia-heng Zheng, et al. | 2004
- 186
-
The development of a philosophy for an applied Web programming curriculumCourte, J.E. et al. | 2004
- 188
-
Ensembles of partitions via data resamplingMinaei-Bidgoli, B. / Topchy, A. / Punch, W.F. et al. | 2004
- 192
-
Assessing distance learning student's performance: a natural language processing approach to analyzing class discussion messagesYi-fang Brook Wu, / Xin Chen, et al. | 2004
- 193
-
Choosing the initial set of exemplars when learning with an NGE-based systemFigueira, L.B. / do Carmo Nicoletti, M. et al. | 2004
- 197
-
Auxiliar: a case-based system to assist online coursesPiva, D. / de Freitas, R.L. / Miskulin, M.S. / Nakamiti, G.S. / Tobar, C.M. et al. | 2004
- 198
-
The effects of business rules on transactional association analysisHashemi, R.R. / Le Blanc, L.A. / Westgeest, B.J. et al. | 2004
- 202
-
Building an effective groupware systemRazek, M.A. / Frasson, C. / Kaltenbach, M. et al. | 2004
- 203
-
Information technologies for education & training in e-governmentRanjit Bose, et al. | 2004
- 207
-
A standard visual courseware authoring tool based on content packaging specificationYang Zongkai, / Zhao Gang, / Wu Di, / He Jianhua, et al. | 2004
- 208
-
Routine learning: analyzing your whereaboutsPirttikangas, S. / Riekki, J. / Roning, J. et al. | 2004
- 212
-
GAME: a Generic Automated Marking Environment for programming assessmentBlumenstein, M. / Green, S. / Nguyen, A. / Muthukkumarasamy, V. et al. | 2004
- 214
-
Information-content based sentence extraction for text summarizationMallett, D. / Elding, J. / Nascimento, M.A. et al. | 2004
- 218
-
A novel approach for new e-commerce product positioning and to-go/not-to go with rapid prototyping experienceSheikh Iqbal Ahamed, et al. | 2004
- 218
-
A Novel Approach for New E-Commerce Product Positioning and To-Go/Not-To Go with Rapid Prototype ExperienceAhamed, S. / IEEE et al. | 2003
- 219
-
Measuring the Scalability of Relationally Mapped Semistructual QueriesCathey, R. / Beitzel, S. / Jensen, E. / Pilotto, A. / Grossman, D. / IEEE et al. | 2003
- 219
-
Measuring the scalability of relationally mapped semistructured queriesCathey, R.J. / Beitzel, S.M. / Jensen, E.C. / Pilotto, A.J. / Grossman, D. et al. | 2004
- 223
-
Dynamic identification of correspondence assertions for electronic commerce data integrationAdiele, C. / Ehikioya, S.A. et al. | 2004
- 224
-
Modified LZW algorithm for efficient compressed text retrievalZhang, N. / Tao, T. / Ravi Vijaya Satya, / Amar Mukherjee, et al. | 2004
- 228
-
A topology viewer for distributed brokering systemsDharurkar, A. / Pallickara, S. / Fox, G. et al. | 2004
- 229
-
A unique-order interpolative code for fast querying and space-efficient indexing in information retrieval systemsCher-Sheng Cheng, / Jean Jyh-Jiun Shann, / Chung-Ping Chung, et al. | 2004
- 235
-
The impacts of professions in systems developmentJohansson, A. et al. | 2004
- 236
-
Turkish word n-gram analyzing algorithms for a large scale Turkish corpus - TurCoCebi, Y. / Dalkilic, G. et al. | 2004
- 241
-
Content-based image retrieval incorporating models of human perceptionCelebi, M.E. / Aslandogan, Y.A. et al. | 2004
- 241
-
Automatic estimation of stock market forecasting and generating the corresponding natural language expressionQiong Liu, / Xin Lu, / Ren, F. / Kuroiwa, S. et al. | 2004
- 246
-
Use of multiple algorithms in image content searchesParker, J.R. / Behm, B. et al. | 2004
- 246
-
Special technique for optimizing teaching-learning process in CBT softwareDharaskar, R. et al. | 2004
- 251
-
Extending the undergraduate computer science curriculum to include data miningGoharian, N. / Grossman, D. / Raju, N. et al. | 2004
- 252
-
How M=Ec/sup 2/ in healthcareWickramasinghe, N. / Goldberg, S. et al. | 2004
- 252
-
How M=Ec^2 in HealthcareWickramasinghe, N. / Goldberg, S. / IEEE et al. | 2003
- 255
-
Extending the wiki paradigm for use in the classroomChien-min Wang, / Turner, D. et al. | 2004
- 258
-
Enhanced cell visiting probability for QoS provisioning in mobile multimedia communicationsIslam, M.M. / Murshed, M. / Dooley, L.S. et al. | 2004
- 262
-
Information retrieval with principal componentsHoang, A. et al. | 2004
- 263
-
A secure electronic examination protocol using wireless networksHerrera-Joancomarti, J. / Prieto-Blazquez, J. / Castella-Roca, J. et al. | 2004
- 267
-
Financial activity mining from online multilingual newsPik-Shan Cheung, / Ruizhang Huang, / Wai Lam, et al. | 2004
- 268
-
Threats to the mobile enterprise: jurisprudence analysis of wardriving and warchalkingLawrence, E. / Lawrence, J. et al. | 2004
- 272
-
Enabling personalization recommendation with WeightedFP for text information retrieval based on user-focusZhenya Zhang, / Enhong Chen, / Jin Wang, / Xufa Wang, et al. | 2004
- 274
-
Registration and discovery of services in the NetTraveler integration system for mobile devicesRodriguez-Martinez, M. / Ensenat, J.F. / Pagan, E. / Arzola, J.G. / Sotomayor, M. / Vargas, E. et al. | 2004
- 277
-
The e-Salesman SystemTing, M.P. / Seth, V. / Gao, J. et al. | 2004
- 281
-
A two-tier architecture for automated mobile applicationsSteele, R. / Ventsov, Y. / Madhisetty, S. / Benkovich, L. et al. | 2004
- 283
-
From keywords to links: an automatic approachJihong Zeng, / Bloniarz, P.A. et al. | 2004
- 287
-
Toward dialogues with documents: MultiBrowserBerleant, D. / Jinghao Miao, / Zhong Gu, / Dongping Xu, et al. | 2004
- 288
-
Lexical-chain and it's application in text filteringLi Shaozi, / You Wenjian, / Li Tangqiu, / Chen Huowang, et al. | 2004
- 288
-
Lexical-Chain and Its Application in Text FiteringShaozi, L. / Wenjian, Y. / Tangqiu, L. / Huowang, C. / IEEE et al. | 2003
- 293
-
Problems and solutions in machine translation involving Arabic, Chinese and FrenchAlsharaf, H. / Cardey, S. / Greenfield, P. / Shen, Y. et al. | 2004
- 295
-
From paragraph networks to document networksJinghao Miao, / Berleant, D. et al. | 2004
- 298
-
Internet archive as a source of bilingual dictionaryFattah, M.A. / Ren, F. / Shingo, K. et al. | 2004
- 303
-
Integrating speech enabled services in a Web-based e-learning environmentWerner, S. / Wolff, M. / Eichner, M. / Hoffmann, R. et al. | 2004
- 304
-
Refined extended preorder index with path informationGuangming Xing, / Dongli Zhang, et al. | 2004
- 308
-
Source signal based rate adaptation for GSM AMR speech codecMakinen, J. / Vainio, J. et al. | 2004
- 309
-
Multitasking Web search on Alta VistaSpink, A. / Minsoo Park, / Jansen, B.J. / Pedersen, J. et al. | 2004
- 314
-
Extracting new topic contents from hidden Web sitesMouri, T. / Kitagawa, H. et al. | 2004
- 314
-
Linguistic knowledge and automatic semantic representation of emotions and feelingsMathieu, Y.Y. et al. | 2004
- 319
-
Word statistics of Turkish language on a large scale text corpus - TurCoDalkilic, G. / Cebi, Y. et al. | 2004
- 320
-
Enhancing usability of flight and fare search functions for airline and travel Web sitesChariton, C. / Min-Hyung Choi, et al. | 2004
- 326
-
A hybrid classifier approach for Web retrieved documents classificationBot, R.S. / Yi-fang Brook Wu, / Xin Chen, / Quanzhi Li, et al. | 2004
- 326
-
An informed operator approach to tackle diversity constraints in evolutionary searchBhattacharya, M. et al. | 2004
- 331
-
Efficient multicast e-services over APPCASTRadha, V. / Gulati, V.P. / Pujari, A.K. et al. | 2004
- 332
-
Web page fragmentation for personalized portal constructionChristos, B. / Vaggelis, K. / Ioannis, M. et al. | 2004
- 337
-
Ontology-based Web crawlerGanesh, S. / Jayaraj, M. / Kalyan, V. / SrinivasaMurthy, / Aghila, G. et al. | 2004
- 337
-
TIN: an interactive image navigator providing ubiquitous access to distributed geo-spatial dataVelez, B. / Cabarcas, A. / Malave, L. et al. | 2004
- 342
-
A hybrid number system and its application in FPGA-DSP technologyReza, / Hashemian, / Sreedharan, B. et al. | 2004
- 344
-
Exploring similarity among Web pages using the hyperlink structureHuang, S.-H.S. / Molina-Rodriguez, C.H. / Quevedo-Torrero, J.U. / Fonseca-Lozada, M.F. et al. | 2004
- 347
-
Significance of steganography on data securityVenkatramanS, / Ajith Abraham, / Paprzycki, M. et al. | 2004
- 349
-
Anxiously seeking answers: how attitude affects search performanceLucas, W. / Topi, H. et al. | 2004
- 352
-
Recognition and identification of form document layoutsLuo, K. / Latifi, S. / Taghva, K. / Regentova, E. et al. | 2004
- 354
-
XCpaqs: compression of XML document with XPath query supportHongzhi Wang, / Jianzhong Li, / Jizhou Luo, / Zhenying He, et al. | 2004
- 357
-
Evolutionary time schedulingNedjah, N. / de Macedo Mourelle, L. et al. | 2004
- 360
-
Matching techniques for resource discovery in distributed systems using heterogeneous ontology descriptionsCastano, S. / Ferrara, A. / Montanelli, S. / Racca, G. et al. | 2004
- 362
-
Group key management utilizing Huffman and Petrick based approachesIlango, S. et al. | 2004
- 367
-
Application service provision through the grid: business models and architecturesVassiliadis, B. / Giotopoulos, K. / Votis, K. / Sioutas, S. / Bogonikolos, N. / Likothanassis, S. et al. | 2004
- 367
-
3D shape acquisition using a combined SSD and least squares correlation approachAzad, P. / Gockel, T. / Dillmann, R. et al. | 2004
- 372
-
The GRelC library: a basic pillar in the grid relational catalog architectureAloisio, G. / Cafaro, M. / Fiore, S. / Mirto, M. et al. | 2004
- 372
-
Mining user navigational patterns in dynamically changing environmentsUdechukwu, A. / Barker, K. / Alhajj, R. et al. | 2004
- 377
-
Content-addressable IBP - rationale, design and performanceCollins, R.L. / Plank, J.S. et al. | 2004
- 380
-
Ant mobility model platform for network simulatorHsien-Chou Liao, / Yi-Wei Ting, / Shih-Hsuan Yen, / Chou-Chen Yang, et al. | 2004
- 382
-
The LAG grammar for authoring the adaptive WebCristea, A. / Verschoor, M. et al. | 2004
- 385
-
Multiple directional antennas in suburban ad-hoc networksIslam, M.M. / Pose, R. / Kopp, C. et al. | 2004
- 387
-
Adaptation and reuse in designing Web information systemsFrasincar, F. / Barna, P. / Houben, G.-J. / Fiala, Z. et al. | 2004
- 390
-
Statistic-based routing in wireless sensor networksXie, X. / Hughes, L. et al. | 2004
- 392
-
On-line generation of suggestions for Web usersSilvestri, F. / Baraglia, R. / Palmerini, P. / Serrano, M. et al. | 2004
- 395
-
Collaborative vision using networked sensorsRam Dantu, / Joglekar, S.P. et al. | 2004
- 398
-
Reinforcement learning architecture for Web recommendationsGolovin, N. / Rahm, E. et al. | 2004
- 400
-
Investigating peer-to-peer systems for resource sharing within a small group of nodesNeild, L.L. / Pargas, R.P. et al. | 2004
- 404
-
Protocol analysis in intrusion detection using decision treeAbbes, T. / Bouhoula, A. / Rusinowitch, M. et al. | 2004
- 405
-
Secure multipath communication in mobile ad hoc networksBurmester, M. / Van Le, T. et al. | 2004
- 409
-
Security protection and checking in embedded system integration against buffer overflow attacksZili Shao, / Chun Xue, / Qingfeng Zhuge, / Sha, E.H.-M. / Bin Xiao, et al. | 2004
- 410
-
Accessing SMIL-based dynamically adaptable multimedia presentations from mobile devicesSteele, R. / Lubonski, M. / Ventsov, V. / Lawrence, E. et al. | 2004
- 414
-
Low-intrusive consistent disk checkpointing: a tool for digital forensicsSitaraman, S. / Venkatesan, S. et al. | 2004
- 416
-
Extended DCEL data structure for mobile computingLi, J. / Liang, X. / Gewali, L.P. et al. | 2004
- 419
-
Dynamic control of worm propagationDantu, R. / Cangussu, J. / Yelimeli, A. et al. | 2004
- 421
-
An object and XML database schemas design toolChankuang, N. / Chittayasothorn, S. et al. | 2004
- 424
-
Towards framework selection criteria and suitability for an application frameworkAhamed, S.I. / Pezewski, Ale. / Pezewski, Al. et al. | 2004
- 428
-
Prefetching XML data with abstract query miningNg, V.T.Y. / Chan Chi Kong, / Shiu Hin Wang, et al. | 2004
- 430
-
Robust partner selection scheme for information quality assurance despite uncertainty in open multi-agent systemsBarber, K.S. / Park, J. et al. | 2004
- 433
-
Distributed knowledge management for autonomous access control in computer networksSeleznyov, A. / Hailes, S. et al. | 2004
- 435
-
A system for ensuring data integrity in grid environmentsGilbert, A. / Abraham, A. / Paprzycki, M. et al. | 2004
- 438
-
Software security in Bangladesh with .NET framework: a roadmapAlam, M.A. et al. | 2004
- 440
-
Defeating the current steganalysis techniques (robust steganography)Sung, A.H. / Tadiparthi, G.R. / Mukkamala, S. et al. | 2004
- 444
-
Design strategies to improve performance of GIS Web servicesTu, S. / Flanagin, M. / Wu, Y. / Abdelguerfi, M. / Normand, E. / Venkata Mahadevan, et al. | 2004
- 445
-
Risk management using behavior based attack graphsDantu, R. / Loper, K. / Kolan, P. et al. | 2004
- 450
-
A model for team-based access control (TMAC 2004)Alotaiby, F.T. / Chen, J.X. et al. | 2004
- 450
-
KIP: a keyphrase identification program with learning functionsWu, Y.B. / Li, Q. / Bot, R.S. / Chen, X. et al. | 2004
- 455
-
Applications of data mining in retail businessAhmed, S.R. et al. | 2004
- 456
-
An object-based approach for digital video retrievalSmith, M. / Khotanzad, A. et al. | 2004
- 460
-
A mathematical model of similarity and clusteringFu-Shing Sun, / Chun-Hung Tzeng, et al. | 2004
- 460
-
Integrity constraints in temporal relational databasesTansel, A.U. et al. | 2004
- 465
-
Evidence combination in medical data miningAslandogan, Y.A. / Mahajani, G.A. et al. | 2004
- 465
-
Mining association rules from relations on a parallel NCR teradata database systemChung, S.M. / Mangamuri, M. et al. | 2004
- 470
-
Building decision trees using functional dependenciesKwok-Wa Lam, / Lee, V.C.S. et al. | 2004
- 471
-
A new reparation method for incomplete data in the context of supervised learningMagnani, M. / Montesi, D. et al. | 2004
- 474
-
A new framework for uncertainty sampling: exploiting uncertain and positive-certain examples in similarity-based text classificationLee, K.H. / Kang, B.H. et al. | 2004
- 476
-
Adaptive Web document classification with MCRDRYang Sok Kim, / Sung Sik Park, / Deards, E. / Byeong Ho Kang, et al. | 2004
- 480
-
Confidence on approximate query in large datasetsFord, C.W. / Chiang, C.-C. / Wu, H. / Chilka, R.R. / Talburt, J. et al. | 2004
- 482
-
Physically locating wireless intrudersAdelstein, F. / Alla, P. / Joyce, R. / Richard, G.G. et al. | 2004
- 486
-
High performance FPGA based elliptic curve cryptographic co-processorLutz, J. / Hasan, A. et al. | 2004
- 492
-
Replicate relational and XML databases for Internet computingFong, J. / Wong, H.K. et al. | 2004
- 493
-
A parallel architecture for computing scalar multiplication on Hessian elliptic curvesSaqib, N.A. / Rodriguez-Henriquez, F. / Diaz-Perez, A. et al. | 2004
- 497
-
Modelling long duration transactions with time constraints in active databaseYadav, D.S. / Agrawal, R. / Chauhan, D.S. / Saraswat, R.C. / Majumdar, A.K. et al. | 2004
- 497
-
Modeling Long Duration Transactions with Time Constraints in Active DatabaseYadav, D. / Agrawal, R. / Chauhan, D. / Sarswat, R. / Majumdar, A. / IEEE et al. | 2003
- 498
-
Architectural design features of a programmable high throughput AES coprocessorHodjat, A. / Schaumont, P. / Verbauwhede, I. et al. | 2004
- 502
-
Accessing temporal data objects in mobile computing environmentsWong, A.C.S. / Lee, V.C.S. / Kwok-Wa Lam, et al. | 2004
- 503
-
Multi-objective evolutionary hardware for RSA-based cryptosystemsNedjah, N. / de Macedo Mourelle, L. et al. | 2004
- 507
-
Fuzzy inclusion dependencies in fuzzy relational databasesSharma, A.K. / Goswami, A. / Gupta, D.K. et al. | 2004
- 508
-
Efficient cryptographic hardware using the co-design methodologyde Macedo Mourelle, L. / Nedjah, N. et al. | 2004
- 511
-
Server-Side Broadcast Transaction in Mobile Computing EnvironmentsPoon, B. / Lam, K.-W. / Lee, V. / IEEE et al. | 2003
- 511
-
Server-side broadcast transaction in mobile computing environmentHin Cheung Poon, B. / Kwok-Wa Lam, / Lee, V.C.S. et al. | 2004
- 513
-
High performance arithmetic for special hyperelliptic curve cryptosystems of genus twoPelzl, J. / Wollinger, T. / Paar, C. et al. | 2004
- 518
-
Survivability and applicability in database constraints: temporal boundary to data integrity scenariosCamolesi, L. et al. | 2004
- 518
-
Fast modular multiplication by operand changingSchimmler, M. / Bunimov, V. et al. | 2004
- 523
-
Protecting federated databases using a practical implementation of a formal RBAC policyBarker, S. / Douglas, P. et al. | 2004
- 525
-
A clock-less implementation of the AES resists to power and timing attacksYu, A. / Bree, D.S. et al. | 2004
- 528
-
A model for multiple-query processing based upon strong factoringAlsabbagh, J.R. / Raghavan, V.V. et al. | 2004
- 533
-
Increasing robustness of LSB audio steganography using a novel embedding methodCvejic, N. / Seppanen, T. et al. | 2004
- 534
-
Component-based embedded database for mobile embedded systemsAhamed, S.I. / Vallecha, S. et al. | 2004
- 538
-
Finding optimum parallel coprocessor design for genus 2 hyperelliptic curve cryptosystemsBertoni, G. / Breveglieri, L. / Wollinger, T. / Paar, C. et al. | 2004
- 539
-
Mapping methods and query for aggregation and association in object-relational database using collectionPardede, E. / Rahayu, J.W. / Taniar, D. et al. | 2004
- 546
-
Community, context, and distance educationRothfork, J. et al. | 2004
- 546
-
Power-analysis attack on an ASIC AES implementationOrs, S.B. / Gurkaynak, F. / Oswald, E. / Preneel, B. et al. | 2004
- 551
-
A constraint-based query modification engine for retrofitting COTS DBMS'sGaruba, M. / Langrin, R. / Burge, L. et al. | 2004
- 553
-
A Basis-Independent Algorithm to Design Fast Parallel Multipliers over GF(2^m)Elia, M. / Leone, M. / IEEE et al. | 2003
- 553
-
A basis-independent algorithm to design fast parallel multipliers over GF(2/sup m/)Elia, M. / Leone, M. et al. | 2004
- 557
-
The design and implementation of the MESSENGER trajectory databaseGill, J. / Burge, L. / Garuba, M. et al. | 2004
- 560
-
On the Importance of Protecting Delta in SFLASH against Side Channel AttacksOkeya, K. / Takagi, T. / Vuillaume, C. / IEEE et al. | 2003
- 560
-
On the importance of protecting /spl Delta/ in SFLASH against side channel attacksOkeya, K. / Takagi, T. / Vuillaume, C. et al. | 2004
- 562
-
Pedagogical issues in programming languagesMinor, J.T. / Gewali, L.P. et al. | 2004
- 566
-
Performance study of a MLS/DBMS implemented as a kernelized architectureGaruba, M. / Appiah, E. / Burge, L. et al. | 2004
- 569
-
On permutation operations in cipher designLee, R.B. / Shi, Z.J. / Yin, Y.L. / Rivest, R.L. / Robshaw, M.J.B. et al. | 2004
- 572
-
A systolic memory architecture for fast codebook design based on MMPDCL algorithmSano, K. / Takagi, C. / Egawa, R. / Suzuki, K. / Nakamura, T. et al. | 2004
- 578
-
Streaming encryption for a secure wavelength and time domain hopped optical networkChan, H. / Hodjat, A. / Shi, J. / Wesel, R. / Verbauwhede, I. et al. | 2004
- 579
-
Semi-parallel reconfigurable architectures for real-time LDPC decodingKarkooti, M. / Cavallaro, J.R. et al. | 2004
- 583
-
Compact and efficient encryption/decryption module for FPGA implementation of the AES Rijndael very well suited for small embedded applicationsRouvroy, G. / Standaert, F.-X. / Quisquater, J.-J. / Legat, J.-D. et al. | 2004
- 586
-
An object-oriented database-based architecture for mobile enterprise applicationsSteele, R. / Ventsov, Y. / Dillon, T. et al. | 2004
- 588
-
Area efficient high speed elliptic curve cryptoprocessor for random curvesDaneshbeh, A.K. / Hasan, M.A. et al. | 2004
- 591
-
A formal approach to software architecture of agent-base systemsReza, H. / Grant, E. et al. | 2004
- 594
-
Comparing different thresholding algorithms for segmenting aurorasLi, X. / Ramachandran, R. / He, M. / Sunil Movva, / Rushing, J. / Graves, S. / Lyatsky, W. / Arjun Tan, / Germany, G. et al. | 2004
- 598
-
Minimization of boundary artifacts on scalable image compression using symmetric-extended wavelet transformCai, W. / Adjouadi, M. et al. | 2004
- 602
-
Exploiting known latitudinal variations for improved limited-angle tomographic reconstruction of the plasmasphereNaveen Santhanam, / Newman, T.S. / Gallagher, D.L. et al. | 2004
- 603
-
Arbitrary trajectories tracking using multiple model based particle filtering in infrared image sequenceZaveri, M.A. / Merchant, S.N. / Desai, U.B. et al. | 2004
- 607
-
Mapping surface materials on Mars from Mars Pathfinder spectral images with HYPEREYEMerenyi, E. / Farrand, W.H. / Tracadas, P. et al. | 2004
- 608
-
Effect of initial HMM choices in multiple sequence training for gesture recognitionLiu, N. / Davis, R.I.A. / Lovell, B.C. / Kootsookos, P.J. et al. | 2004
- 614
-
Resampling based method for pixel-wise correspondence between 3D facesChunliang Gu, / Baocai Yin, / Yongli Hu, / Shiquan Cheng, et al. | 2004
- 615
-
Factors affecting the signal quality in optical data transmission and estimation method for BER and SNRKartalopoulos, S.V. et al. | 2004
- 620
-
Recognizing non-rigid human actions using joints tracking in space-timeXin Lu, / Qiong Liu, / Oe, S. et al. | 2004
- 620
-
Lossless encoding based on redistribution of statisticsGrigoryan, A.M. / Dursun, S. / Regentova, E.E. et al. | 2004
- 625
-
On the design of heterogeneous applications for distributed coordinationChia-Chu Chiang, / Tang, P. et al. | 2004
- 626
-
Robust segmentation using parametric and nonparametric local spatial posteriorsBak, E.S. / van Najarian, K. et al. | 2004
- 631
-
A robust face recognition system for real time surveillanceSeow, M.J. / Gottumukkal, R. / Valaparla, D. / Asari, K.V. et al. | 2004
- 632
-
Digital library resources descriptionMoghrabi, C. / Le, T.-H. / Roy, J. / Hachey, J. et al. | 2004
- 636
-
A fuzzy approach to texture segmentationHanmandlu, M. / Madasu, V.K. / Vasikarla, S. et al. | 2004
- 638
-
Applying continuous action reinforcement learning automata(CARLA) to global training of hidden Markov modelsKabudian, J. / Meybodi, M.R. / Homayounpour, M.M. et al. | 2004
- 643
-
Spherical parameterization for 3D surface analysis in volumetric imagesLi Shen, / Makedon, F. et al. | 2004
- 643
-
Wearable, wireless brain computer interfaces in augmented reality environmentsNavarro, K.F. et al. | 2004