The SCEAS System
Navigation Menu

Conferences in DBLP

(icita)
2005 (conf/icita/2005)

  1. George K. Adam, Edward Grant, Gordon K. Lee
    "RoboPress" - An Automated Mobile Press for Manufacturing Concrete Products. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:3-8 [Conf]
  2. Albert Y. Zomaya
    Keynote 1: Grid Computing: Opportunities for Bioinformatics Research. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:3- [Conf]
  3. Elizabeth Chang, Tharam S. Dillon, Farookh Khadeer Hussain
    Keynote 2: Trust and Reputation Relationships in Service-Oriented Environments. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:4-14 [Conf]
  4. Dong Hun Kim, Hyun-Woo Lee, Seiichi Shin, Tomoharu Suzuki
    Local Path Planning Based on New Repulsive Potential Functions with Angle Distributions. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:9-14 [Conf]
  5. Timothy K. Shih, Rong-Chi Chang
    Keynote 3: Digital Inpainting - Survey and Multilayer Image Inpainting Algorithms. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:15-24 [Conf]
  6. Chunying Zhao, Jingtai Liu, Yujuan Li, Tao Chen, Lei Sun
    Virtual Repulsive Force in Competitive Multi-Robot Teleoperation. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:15-20 [Conf]
  7. Salman Yussof, Adzly Anuar, Karina Fernandez
    Algorithm for Robot Writing Using Character Segmentation. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:21-24 [Conf]
  8. Gengqian Liu, Tiejun Li, Yuqing Peng, Xiangdan Hou
    The Ant Algorithm for Solving Robot Path Planning Problem. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:25-27 [Conf]
  9. Minyi Guo
    Keynote 4: Can Parallel Software Catch up with Parallel Hardware? Trends in Automatic Parallelization. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:25- [Conf]
  10. Wenming Cao, Shoujue Wang
    Application of Two Synaptic Weight Neural Networks for Nonlinear Control. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:28-31 [Conf]
  11. Quynh-Nhu Numi Tran, Brian Henderson-Sellers, John K. Debenham, Cesar Gonzalez-Perez
    Conceptual Modelling within the MAS-CommonKADS Plus OPEN Method Engineering Approach. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:29-34 [Conf]
  12. Cesar Gonzalez-Perez, Brian Henderson-Sellers, R. Geoff Dromey
    A Metamodel for the Behavior Trees Modelling Technique. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:35-39 [Conf]
  13. Richard S. L. Wu, Allan K. Y. Wong, Tharam S. Dillon
    Using Real-Time Traffic Pattern Detection for Dynamic Cache Size Tuning in Information Retrieval. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:35-40 [Conf]
  14. Saqib Ali, Ben Soh, Torab Torabi
    Design and Implementation of a Model for Business Rules Automation. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:40-45 [Conf]
  15. Yinzhang Guo, Guoyou Zhang, Lipin Xie, Yubin Xu
    The Research and Design of Business Component Reuse in Enterprise Information System Integration. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:41-44 [Conf]
  16. Haifeng Shen, Suiping Zhou, Chengzheng Sun
    Flexible Concurrency Control for Collaborative Office Systems. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:45-50 [Conf]
  17. Mohamed Hadj Kacem, Mohamed Jmaiel, Ahmed Hadj Kacem, Khalil Drira
    Using UML2.0 and GG for Describing the Dynamic of Software Architectures. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:46-51 [Conf]
  18. Shigeharu Matsusaka, Koji Inoue
    A Cost Effective Spacial Redundancy with Data-Path Partitioning. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:51-56 [Conf]
  19. Hajar Mat Jani, Lee Sai Peck
    Applying Machine Learning Using Case-Based Reasoning (CBR) and Rule-Based Reasoning (RBR) Approaches to Object-Oriented Application Framework Documentation. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:52-57 [Conf]
  20. Arnon Rungsawang, Bundit Manaskasemsak
    Partition-Based Parallel PageRank Algorithm. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:57-62 [Conf]
  21. I. T. Hawryszkiewycz
    Providing Agent Support for Collaborative Systems: Using a Domain Oriented Design Method. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:58-63 [Conf]
  22. Yanni Wu, Kuo Zhang, Xiaoge Wang, Jinlan Tian
    Extending Metadata with Scenarios in Adaptive Distributed System. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:63-68 [Conf]
  23. Kuo Zhang, Xiaoge Wang, Yanni Wu, Zhenkun Zheng
    PURPLE: A Reflective Middleware for Pervasive Computing. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:64-69 [Conf]
  24. Yong Feng, Yan-yuan Zhang
    Virtual Disk Reconfiguration with Performance Guarantees in Shared Storage Environment. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:69-74 [Conf]
  25. Soo Dong Kim, Hyun Gi Min, Jin Sun Her, Soo Ho Chang
    DREAM: A Practical Product Line Engineering Using Model Driven Architecture. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:70-75 [Conf]
  26. Liang-Teh Lee, Chia-Ying Tseng, Kang-Yuan Liu, Kuan-Ching Li
    A Wallet-Size Cluster for H.264 Encoding. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:75-80 [Conf]
  27. Shigeo Kaneda, Takuya Senbo, Kazunori Fujimoto
    Royalty Rate of Business Method Patents for Large Scale Software Applications. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:76-81 [Conf]
  28. Yong Feng, Yan-yuan Zhang
    E-DM: A QoS-Enabled Storage Service Schedule System in Shared Storage Environment. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:81-84 [Conf]
  29. Natalie Lee-San Pang, Sanxing Cao, Don Schauder, Rody R. Klein
    A Hybrid Approach in the Evaluation of Usability for Multimedia Objects: Case Study of the Media Assets Management Platform for an Advertainment Production Project toward Beijing Olympics 2008. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:82-87 [Conf]
  30. Takashi Yamanoue
    Sharing the Same Operation with a Large Number of Users Using P2P. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:85-88 [Conf]
  31. Tseng-Chang Yen, Shang-Juh Kao
    XBMS - An Open XML Bibliography Management System. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:88-94 [Conf]
  32. Wenjian Liu, Gaoliang Peng
    An Internet-Enabled Setup Planning System. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:89-92 [Conf]
  33. Rui-yong Jia, Yan-yuan Zhang, Yong Feng
    GCSLight: A Light-Weight Group Communication Service for Metadata Server Cluster. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:93-96 [Conf]
  34. Zaobin Gan, Deng-Wen Wei, Jin-Long Zhang, Vijay Varadharajan
    Business-Process-Oriented Software Requirements Automatic Generator. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:95-98 [Conf]
  35. Yanping Chen, Zeng-zhi Li, Li Wang, Huaizhou Yang
    Service-Cloud Model of Composed Web Services. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:97-100 [Conf]
  36. Saqib Ali, Ben Soh, Torab Torabi
    A New Adaptive Business Model for E-Commerce. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:99-102 [Conf]
  37. Yiqiang Zheng, Heqing Guo, Wei Gao, Botong Xu
    Research on Load Balance of Multi Clusters Architecture Based on Business Components Partition. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:101-104 [Conf]
  38. HyonHee Koh, SangHwan Kung, Jaenyun Park
    The Method to Choose Architectural Approaches in the Software Architecture Design Phase. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:103-106 [Conf]
  39. J. Chen, Mark Lanthier, Melissa Macpherson, Doron Nussbaum
    Computing Tumour Coverage as a Result of Respiratory Motion during Radiotherapy Treatment. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:107-112 [Conf]
  40. Dirk Draheim, Christof Lutteroth, Gerald Weber
    Integrating Code Generators into the C# Language. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:107-110 [Conf]
  41. Zaobin Gan, Deng-Wen Wei, Vijay Varadharajan
    Evaluating the Performance and Scalability of Web Application Systems. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:111-114 [Conf]
  42. Carolyn McGregor, Bruce Kneale, Mark Tracy
    Bush Babies Broadband: On-Demand Virtual Neonatal Intensive Care Unit Support for Regional Australia. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:113-118 [Conf]
  43. I-Hsin Chou, Chin-Feng Fan, Yen-Chang Tzeng
    Conceptual Nuclear Decommissioning Knowledge Management System Design. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:115-118 [Conf]
  44. Anthony Van Donselaar, Lisa Twigg, David Tien
    Applying Information Technology to Produce Affordable IT Solutions for Small Business. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:119-123 [Conf]
  45. Jim Harkin, Michael J. Callaghan, T. Martin McGinnity, Liam P. Maguire
    Intelligent User-Support in Learning Environments for Remote Experimentation. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:119-124 [Conf]
  46. Hazleen Aris
    Compiler Development in Component-Oriented Software Development (COSD): Issues and Challenges. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:124-127 [Conf]
  47. Michael J. Callaghan, Jim Harkin, M. El-Gueddari, T. Martin McGinnity, Liam P. Maguire
    Client-Server Architecture for Collaborative Remote Experimentation. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:125-129 [Conf]
  48. Nicholas L. Carroll, Rafael A. Calvo
    Certified Assessment Artifacts for ePortfolios. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:130-135 [Conf]
  49. Cheung-Leung Lui, Tak-Chung Fu, Ting-Yee Cheung
    Agent-Based Network Intrusion Detection System Using Data Mining Approaches. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:131-136 [Conf]
  50. Satoshi Ichimura, Yutaka Matsushita
    Lightweight Desktop-Sharing System for Web Browsers. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:136-141 [Conf]
  51. Chi-Bin Cheng, Chu-Chai Henry Chan, Cheng-Chuan Lin
    Buyer-Supplier Negotiation by Fuzzy Logic Based Agents. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:137-142 [Conf]
  52. Ruth S. Raitman, Naomi Augar, Wanlei Zhou
    Employing Wikis for Online Collaboration in the E-Learning Environment: Case Study. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:142-146 [Conf]
  53. Hui Yang, Minjie Zhang
    Ontology-Based Resource Descriptions for Distributed Information Sources. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:143-148 [Conf]
  54. Kirsten Ellis
    Tools for Inclusive Play: Developing "Auslan for Kinder". [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:147-152 [Conf]
  55. Tak-Chung Fu, Fu-Lai Chung, Robert Wing Pong Luk, Chak-man Ng
    SBT-Forest, an Indexing Approach for Specialized Binary Tree. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:149-154 [Conf]
  56. Norihiro Fujii, Nobuhiko Koike
    A New Remote Laboratory for Hardware Experiment with Shared Resources and Service Management. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:153-158 [Conf]
  57. D. Foster, Vijay Varadharajan
    Security and Trust Enhanced Mobile Agent Based System Design. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:155-160 [Conf]
  58. Vladlena Benson, Lara A. Frumkin, Alan Murphy
    Designing Multimedia for Differences: e-Lecturer, e-Tutor, and e-Student Perspectives. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:159-164 [Conf]
  59. Yasuhiro Watanabe, Norihiro Abe, Kazuaki Tanaka, Hirokazu Taki, Tetsuya Yagi, Shoujie He
    Multimodal Communication System Allowing Man and Avatar to Use Voice and Beck. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:161-166 [Conf]
  60. Holger Kunz, Thorsten Schaaf, Jürgen Braun, Thomas Tolxdorff
    Framework for an IT-Supported Balanced Scorecard in Health Care. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:165-168 [Conf]
  61. Sam Chao, Yiping Li
    Multivariate Interdependent Discretization for Continuous Attribute. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:167-172 [Conf]
  62. S. M. F. D. Syed Mustapha, Norisma Idris, Rukaini Abdullah
    Embedding Information Retrieval and Nearest-Neighbour Algorithm into Automated Essay Grading System. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:169-172 [Conf]
  63. Kazunori Hino, Kazuo Terashima, Teruyuki Bunno, Takashi Yamanoue, Nobuyuki Hino
    Evaluation of Students' Performance in Online Seminars via Email with Mobile Phones. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:173-176 [Conf]
  64. Charlie K. Dagli, ShyamSundar Rajaram, Thomas S. Huang
    Combining Diversity-Based Active Learning with Discriminant Analysis in Image Retrieval. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:173-178 [Conf]
  65. Jian Yuan, Xin-Wen Xu, Chang-Jian Fu, Guo-hui Li
    Classify of Underwater Target Utilizing Audio Fingerprint. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:179-184 [Conf]
  66. Incheon Paik, Hiroyuki Akimoto
    Ontology Querying and Its Software Component for Design Support in Supply Chains. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:179-184 [Conf]
  67. Hirohito Oh'uchi, Takao Miura, Isamu Shioya
    Querying on News Stream by Using Random Projection. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:185-190 [Conf]
  68. M. N. Nguyen, Daming Shi, Chai Quek
    Self-Organizing Gaussian Fuzzy CMAC with Truth Value Restriction. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:185-190 [Conf]
  69. Brajesh Pande, Deepak Gupta, Dheeraj Sanghi, Sanjay Kumar Jain
    The Network Monitoring Tool - PickPacket. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:191-196 [Conf]
  70. Aaron Hector, V. Lakshmi Narasimhan
    A New Classification Scheme for Software Agents. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:191-196 [Conf]
  71. Zenon Chaczko, Sourendra Nath Sinha
    SAFE Model Approach to Construction of Intelligent Security Systems. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:197-202 [Conf]
  72. Elise Langham, Seth Bullock
    Autonomous Concept Formation in Software Agents for Extending Ontologies. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:197-202 [Conf]
  73. H. C. W. Lau, G. T. S. Ho
    Decision Supporting Functionality in a Virtual Enterprise Network. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:203-208 [Conf]
  74. Zenon Chaczko, Fady Ahmad
    Wireless Sensor Network Based System for Fire Endangered Areas. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:203-207 [Conf]
  75. Johnson I. Agbinya
    QoS Functions and Theorems for Moving Wireless Networks. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:208-213 [Conf]
  76. Yi-ming Wu, Joan Lu, Shaowen Yao, Zhi-Jie Zheng
    Mechanism of Semantic Oriented Flexible Workflow. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:209-214 [Conf]
  77. John C. McEachen, John Zachary
    Real-Time Representation of Network Traffic Behavior for Enhanced Security. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:214-219 [Conf]
  78. Joan Lu, Umair Rahman, Shaowen Yao
    An Agent Related Implementation on the Web Information Retrieval System. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:215-220 [Conf]
  79. Frédéric Andrès, Motomu Naito
    Dynamic Topic Mapping Using Latent Semantic Indexing. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:220-225 [Conf]
  80. Juan P. Palacios, José Cremades, Carmen Costilla
    Towards a Web Digital Archive Ontological Unification. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:221-226 [Conf]
  81. Lei Niu, Lin Ni, Wei Lu, Miao Yuan
    A Method of Remote Sensing Image Retrieval Based on ROI. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:226-229 [Conf]
  82. Antonio Calleja, María José Rodríguez, Carmen Costilla, Raúl Fernández
    A Grid Semantic Approach for a Digital Archive Integrated Architecture. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:227-232 [Conf]
  83. Leanne Ngo, Wanlei Zhou
    The Multifaceted and Ever-Changing Directions of Information Security - Australia Get Ready! [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:230-233 [Conf]
  84. María del Mar Roldán García, Ismael Navas Delgado, José Francisco Aldana Montes
    A Design Methodology for Semantic Web Database-Based Systems. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:233-237 [Conf]
  85. Qing Lu, Yongquan Yu
    The Research of Data Mining Based on Extension Sets. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:234-237 [Conf]
  86. John Avery, John Yearwood
    A Formal Description of Ontology Change in OWL. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:238-243 [Conf]
  87. Chuen-Ching Wang, Yih-Chuan Lin, Shu-Chung Yi
    Satellite Interference Detection Using Real-Time Watermarking Technique for SMS. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:238-241 [Conf]
  88. Norlaila Hussain, Oscar de Bruijn, Zainuddin Hassan
    Experimental Findings on Collaborative Interactions in a Co-Located Environment. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:242-245 [Conf]
  89. José A. Royo, Eduardo Mena, Jorge Bernad, Arantza Illarramendi
    Searching the Web: From Keywords to Semantic Queries. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:244-249 [Conf]
  90. Hu Liu, Yu hong Duan, Guang qing Xi, Li yun Luo
    A Novel OFDM Synchronization Algorithm. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:249-254 [Conf]
  91. Xiaohong Li, Danjie Yang, Zhiyong Feng
    Design and Implementation of Negotiation Agent of Dynamic Supply Chain. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:250-255 [Conf]
  92. Yanping Lu, Weiling Wu
    Performance Analysis of Multiple Packets Combining Decoding in HARQ. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:255-258 [Conf]
  93. Mingxia Gao, Chunnian Liu, Furong Chen
    An Ontology Search Engine Based on Semantic Analysis. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:256-259 [Conf]
  94. Jin Kwan Kim, Sang-Woo Kim, Kee-Hoo Yoon, Heung-Gyoon Ryu
    Design of Binary Multi-code CDMA System with Constant Amplitude. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:259-264 [Conf]
  95. Xiangdan Hou, Junhua Gu, Xueqin Shen, Weili Yan
    Application of Data Mining in Fault Diagnosis Based on Ontology. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:260-263 [Conf]
  96. Kosuke Ono, Masateru Harao, Kouichi Hirata
    Multi-Agent Based Modeling and Simulation of Consensus Formations in Arguments. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:264-267 [Conf]
  97. Peter Hutterer, Mark T. Smith, John Ankcorn, Wayne Piekarski, Bruce H. Thomas
    A Lightweight UI Software Infrastructure for Wrist-Based Displays: If Your Microwave Oven Could Talk to Your Watch, What Would It Say? [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:265-270 [Conf]
  98. Chih-Yao Lo, Chen-Feng Wu
    The Survey and Expansion on Quantitative Methods to Conflict Resolution. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:268-271 [Conf]
  99. Chiung-Ying Wang, Chi-Jen Wu, Guan-Nan Chen, Ren-Hung Hwang
    p-MANET: Efficient Power Saving Protocol for Multi-Hop Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:271-276 [Conf]
  100. Weihua Li, Shixian Li
    Using Information-Flow Theory to Support Information Interoperability in the Grid. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:272-275 [Conf]
  101. Junjie Chen, Wei Liu
    A Framework for Intelligent Meta-search Engine Based on Agent. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:276-279 [Conf]
  102. Jeich Mar, Shang Weng Wang
    The MTCR Scheme for the Integrated Multiple Rate Mobile Data Networks. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:277-282 [Conf]
  103. Lamiaa Fattouh Ibrahim
    Using of Clustering Algorithm CWSP-PAM for Rural Network Planning. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:280-283 [Conf]
  104. Hong-Yi Chang, Chang Wu Yu
    Constructing Long-Lived Scatternets in Bluetooth Networks. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:283-288 [Conf]
  105. Hsiao-Fan Wang
    Pattern Discovery from Few Data. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:284-287 [Conf]
  106. Zenggui Ou
    A Study of the Time Effect during Data Processing. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:288-290 [Conf]
  107. Jim M. Ng, Yan Zhang
    A Mobility Model with Group Partitioning for Wireless Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:289-294 [Conf]
  108. Guangfan Shi, Guangming Yan, Jigang Li, Guanran Wang, Zeguo Cheng
    The Design and Implement of Virtual Instrument Based on Computing Technique and USB Platform. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:291-294 [Conf]
  109. Kyungsoo Jeong, S. H. Kim, K. M. Chung, J. C. Kim, J. H. Yu, J. S. Lee, S. H. Seo
    Multipath Channel Models for Wireless Local and Metropolitan Area Networks. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:295-298 [Conf]
  110. Aishah Abdul Razak, Ryoichi Komiya, Mohamad Izani Zainal Abidin
    Comparison between Fuzzy and NN Method for Speech Emotion Recognition. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:297-302 [Conf]
  111. Kevin H. Lin, Seedahmed S. Mahmoud, Zahir M. Hussain
    Adaptive Modulation with Space-Time Block Coding for MIMO-OFDM Systems. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:299-304 [Conf]
  112. Ben-Nian Wang, Yang Gao, Zhaoqian Chen, Jun-Yuan Xie, Shifu Chen
    LMRL: A Multi-Agent Reinforcement Learning Model and Algorithm. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:303-307 [Conf]
  113. Ying-Hong Wang, Jenhui Chen, Chih-Feng Chao, Chien-Min Lee
    A Transparent Cache-Based Mechanism for Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:305-310 [Conf]
  114. Xin-Yi Tsai, Yu-Ju Chen, Huang-Chu Huang, Shang-Jen Chuang, Rey-Chue Hwang
    Quantum NN vs. NN in Signal Recognition. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:308-312 [Conf]
  115. Jibin Wang, Jinkang Zhu
    A Novel Time and Frequency Synchronization Approach for OFDM Systems. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:311-315 [Conf]
  116. Rey-Chue Hwang, Yu-Ju Chen, Shang-Jen Chuang, Huang-Chu Huang, Wei-Der Chang
    Fast Learning Neural Network with Modified Neurons. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:313-318 [Conf]
  117. Robert P. Biuk-Aghai
    Performance Tuning in the MacauMap Mobile Map Application. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:316-321 [Conf]
  118. Yandong Wang, Kezheng Huang
    Development of Life Originated Artificial Designer System. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:319-324 [Conf]
  119. Hao Jiang
    Using the LAS Space-Time Spreading Codes to Achieve High Spectral Efficiency. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:322-325 [Conf]
  120. Wei-Long Ding, Fan-lun Xiong, Zhi-jun Cheng
    Study and Implementation of the Expert System for Greenhouse Tomato Planting. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:325-329 [Conf]
  121. Yingshan Li, Ju-Hyun Kyung, Jong-Won Son, Heung-Gyoon Ryu
    PAPR Reduction in MC/DS CDMA System by DFT Spreading Codes. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:326-329 [Conf]
  122. Lei Feng, Yong He, Qin Zhang
    Tractor-Implement Dynamic Trajectory Model for Automated Navigation Applications. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:330-335 [Conf]
  123. Sang-Woo Kim, Hun-Hee Lee, Chan-Ho Park, Rag Gyu Jung, Heung-Gyoon Ryu
    A PAPR Reduction Method Using the Correlation of Information in OFDM Communication System. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:330-333 [Conf]
  124. Gennadi Oumanski, Peter Bertók
    Wide Area Service Discovery and Adaptation for Mobile Clients in Networks with Ad Hoc Behaviour. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:334-337 [Conf]
  125. Shuxiang Xu, Ming Zhang
    Data Mining - An Adaptive Neural Network Model for Financial Analysis. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:336-340 [Conf]
  126. Peng Liang, Chuan-gang Zhao, Weiling Wu
    Over-Saturated Wavelet Packet Multiple Access Communication and Its Multi-User Detection. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:338-341 [Conf]
  127. Ruili Wang, Yiming Zeng
    Nonlinear Nearest-Neighbour Matching and Its Application in Legal Precedent Retrieval. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:341-346 [Conf]
  128. Kwok-Wa Lam, C. S. Wong, William Leung
    Using Look-Ahead Protocol for Mobile Data Broadcast. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:342-345 [Conf]
  129. Teruaki Kitasuka, Kenji Hisazumi, Tsuneo Nakanishi, Akira Fukuda
    WiPS: Location and Motion Sensing Technique of IEEE 802.11 Devices. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:346-349 [Conf]
  130. Tomaz Sef
    A Two Level Lexical Stress Assignment Model for Highly Inflected Slovenian Language. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:347-351 [Conf]
  131. Benjamin A. Liew, Stevan M. Berber, Gobindar S. Sandhu
    Performance of a Multiple Access Orthogonal Wavelet Division Multiplexing System. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:350-353 [Conf]
  132. Chaiyaporn Chirathamjaree
    The Use of Formal Grammars in Isolated Word Recognition. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:352-356 [Conf]
  133. Haiyan Song, Yong He
    Crop Nutrition Diagnosis Expert System Based on Artificial Neural Networks. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:357-362 [Conf]
  134. Bing Zhou, Shou-zhi Wei
    Use Symmetrical Color-Spatial Feature for Image Comparison. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:357-360 [Conf]
  135. Yonggang Fu, Ruimin Shen, Liping Shen
    Robust Image Watermarking Scheme Based on Subsampling. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:361-365 [Conf]
  136. Hsuan-Ming Feng
    Particle Swarm Optimization Learning Fuzzy Systems Design. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:363-366 [Conf]
  137. Changseok Bae, Yuk Ying Chung, Xiaoming Chen, PengHao Wang
    Error Detection and Copyrights Protection Scheme for MPEG-2 Based on Channel Coded Watermark Signal. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:366-370 [Conf]
  138. Chang Su, Changle Zhou
    Constraints for Automated Generating Chinese Metaphors. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:367-370 [Conf]
  139. Michael J. Callaghan, T. Martin McGinnity, Liam McDaid
    Evolving Task Specific Algorithms for Machine Vision Applications. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:371-374 [Conf]
  140. Hideaki Ito, Teruo Fukumura
    Utilizing Disks for the Available Link Bandwidth Video Delivery Method. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:371-376 [Conf]
  141. Juan Jose García Adeva, Rafael A. Calvo
    A Decomposition Scheme Based on Error-Correcting Output Codes for Ensembles of Text Categorisers. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:375-378 [Conf]
  142. Richard Y. D. Xu, Jesse S. Jin, John G. Allen
    Stream-Based Interactive Video Language Authoring Using Correlated Audiovisual Watermarking. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:377-380 [Conf]
  143. Weiming Liu, Xueping Zhao, Jingfang Xiao, Youlong Wu
    Automatic Vehicle Classification Instrument Based on Multiple Sensor Information Fusion. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:379-382 [Conf]
  144. Tasso Athanasiadis, Kevin H. Lin, Zahir M. Hussain
    Space-Time OFDM with Adaptive Beamforming for Wireless Multimedia Applications. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:381-386 [Conf]
  145. Catherine Howard, Markus Stumptner
    Probabilistic Reasoning Techniques for Situation Assessments. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:383-386 [Conf]
  146. Chen-Lung Chan, Shih-Yu Huang, Nien-Chen Lin, Jia-Shung Wang
    Performance Analysis of Caching Strategies for Proxy-Assisted VOD Services. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:387-392 [Conf]
  147. Rhys Hill, Anton van den Hengel
    Experiences with Simulated Robot Soccer as a Teaching Tool. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:387-390 [Conf]
  148. Rui-Jun Zhang, Ding-Fang Chen, Yu Li
    A Fuzzy Expert System Based on Reconstructable Neural Network and Its Application. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:391-394 [Conf]
  149. Naveen K. Chilamkurti, Ben Soh
    Multimedia Multicast Using SPLIT and Layered FEC. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:393-396 [Conf]
  150. Yijing Ju, Yongquan Yu, Guangming Ju, Wen Cai
    Extension Set and Restricting Qualifications of Matter-Elements' Extension. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:395-398 [Conf]
  151. Sanxing Cao, Xianglin Huang, Rui Lu, Zhanxin Yang
    Fuzzy-Based Mass Media Content Management Platform: Architecture and Application Model. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:397-400 [Conf]
  152. Qinhua Zhu, Yongquan Yu, Wen Cai
    Extension Set and the Research of the Extension ADD Transformation. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:399-402 [Conf]
  153. Yung-Gi Wu, Je-Hung Liu
    Image Indexing in DCT Domain. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:401-406 [Conf]
  154. Heqing Chen, Yongquan Yu, Zhibin Chen
    Automatically Compute the Classical Filed of Matter-Element Model Based on Genetic Algorithms. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:403-406 [Conf]
  155. Ghim Hwee Ong, Jun-Ping Ng
    Dynamic Markov Compression Using a Crossbar-Like Tree Initial Structure for Chinese Texts. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:407-410 [Conf]
  156. Ying Huang, Yongquan Yu, Ling Zhang
    Extension Control Algorithm Using Extension Set in Control System. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:407-410 [Conf]
  157. Hung-Yi Lin, Po-Whei Huang
    Perfect KDB-Tree: A Compact KDB-Tree Structure for Indexing Multidimensional Data. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:411-414 [Conf]
  158. Yongquan Yu, Ying Huang, Minghui Wang
    The Related Matter-Elements in Extension Detecting and Application. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:411-414 [Conf]
  159. Shogo Ozaki, Masateru Harao, Kouichi Hirata
    Performance Analysis for Construction of a Performance Practice Support System. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:415-418 [Conf]
  160. Soodamani Ramalingam, Dmitri Iourinski
    Using Fuzzy Functions to Aggregate Usability Study Data: A Novel Approach. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:415-418 [Conf]
  161. Hsi-Cheng Chang, Chiun-Chieh Hsu
    Using Topic Keyword Clusters for Automatic Document Clustering. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:419-424 [Conf]
  162. Ismail Ahmad, Hong Tat Ewe
    A Model for Secure Knowledge Sharing. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:421-425 [Conf]
  163. Esyin Chew
    Mutually-Beneficial iE-E Seeker, a Web Intelligent Matching Using Multi-Dimensional Case-Based Reasoning. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:425-428 [Conf]
  164. Eberhard Stickel
    A New Method for Exchanging Secret Keys. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:426-430 [Conf]
  165. Dmitri Iourinski, Soodamani Ramalingam
    Using Dempster Shafer Theory to Aggregate Usability Study Data. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:429-434 [Conf]
  166. Yang Xiang, Wanlei Zhou
    A Defense System against DDoS Attacks by Large-Scale IP Traceback. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:431-436 [Conf]
  167. Wei Shi, Wanlei Zhou
    A Parallel Euler Approach for Large-Scale Biological Sequence Assembly. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:437-441 [Conf]
  168. Xiaoyan Yuan, Pengfei Shi
    Iris Feature Extraction Using 2D Phase Congruency. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:437-441 [Conf]
  169. Gianluigi Me, Maurizio Adriano Strangio
    EC-PAY: An Efficient and Secure ECC-Based Wireless Local Payment Scheme. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:442-447 [Conf]
  170. Aye Thanda, Pyke Tin, Koichiro Ochimizu
    Optimal Policy for a Class of Compartmental Models. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:442-446 [Conf]
  171. Weng-Long Chang, Michael (Shan-Hui) Ho, Minyi Guo, Xiaohong Jiang, Jingling Xue, Minglu Li
    Fast Parallel DNA-Based Algorithms for Molecular Computation: Determining a Prime Number. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:447-452 [Conf]
  172. Chang N. Zhang, Chunren Lai, Honglan Zhong
    An Efficient Authentication Scheme with Fault Tolerance for Database Systems. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:448-453 [Conf]
  173. Katerina Perdikuri, Athanasios K. Tsakalidis
    Motif Extraction from Biological Sequences: Trends and Contributions to Other Scientific Fields. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:453-458 [Conf]
  174. Weichi Yu, Dake He, Shixiong Zhu
    Study on NTRU Decryption Failures. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:454-459 [Conf]
  175. Yin-Fu Huang, Chia-Ming Wang
    Integration of Knowledge-Discovery and Artificial-Intelligence Approaches for Promoter Recognition in DNA Sequences. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:459-464 [Conf]
  176. Amitabh Saxena, Ben Soh
    Distributed Denial of Service Attacks and Anonymous Group Authentication on the Internet. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:460-464 [Conf]
  177. BoonPing Lim, Md. Safi Uddin
    Statistical-Based SYN-Flooding Detection Using Programmable Network Processor. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:465-470 [Conf]
  178. Amandeep S. Sidhu, Tharam S. Dillon, Elizabeth Chang, Baldev S. Sidhu
    Protein Ontology: Vocabulary for Protein Data. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:465-469 [Conf]
  179. P. Sharmila Kanna, Ramaswamy Palaniappan, K. V. R. Ravi
    Classification of Alcohol Abusers: An Intelligent Approach. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:470-474 [Conf]
  180. Satoshi Amamiya, Makoto Amamiya
    Rights Sensitive Information Sharing Space Based on Multi-Agent System. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:471-476 [Conf]
  181. Mansoor Raza, Iqbal Gondal, David G. Green, Ross L. Coppel
    Comparative Study of Multivariate Classification Methods Using Microarray Gene Expression Data for BRCA1/BRCA2 Cancer Tumors. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:475-480 [Conf]
  182. Justie Su-tzu Juan, Chia-Li Huang
    Efficient Secret Sharing Schemes from Room Square. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:477-481 [Conf]
  183. Huda Md. Nurul, Shigeki Yamada, Eiji Kamioka
    Privacy Protection in Mobile Agent Based Service Domain. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:482-487 [Conf]
  184. Donn Morrison, Ruili Wang, Liyanage C. De Silva, W. L. Xu
    Real-Time Spoken Affect Classification and Its Application in Call-Centres. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:483-487 [Conf]
  185. Paul Andrew Watters, Antonio Araujo, Armin Hezart, Sonali Naik
    Accessibility Solutions for Visually Impaired Users of Web Discussion Boards. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:488-493 [Conf]
  186. Shinichi Suzuki, Yasushi Shinjo, Toshio Hirotsu, Kozo Itano, Kazuhiko Kato
    Capability-Based Egress Network Access Control for Transferring Access Rights. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:488-495 [Conf]
  187. Tarashankar Rudra, David Tien, Terry Bossomaier
    Spoken Communication with Computer Game Characters. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:494-497 [Conf]
  188. Oge Marques, Pierre Baillargeon
    A Multimedia Traffic Classification Scheme for Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:496-501 [Conf]
  189. Awtar Koonar, Paul Delannoy, Dave Denault
    Building a Road Weather Information Network for Integrating Data from Heterogeneous Sources. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:501-507 [Conf]
  190. Hao Wang, Heqing Guo, Manshan Lin, Jianfei Yin
    A Fair Item-Item Exchange Protocol Satisfying Newly Introduced Requirements. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:502-507 [Conf]
  191. Eythimios Dimopoulos, Athanasios Panousis, Evangelos Sakkopoulos, Athanasios K. Tsakalidis
    WiFiAdmin: An Intelligent Web-Based Management Environment for Wireless Networks. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:508-513 [Conf]
  192. Hiroki Hada, Keisuke Tanaka
    Security for Authenticated Key Exchange Based on Non-Malleability. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:508-513 [Conf]
  193. Andrea Andrenucci, Eriks Sneiders
    Automated Question Answering: Review of the Main Approaches. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:514-519 [Conf]
  194. Akihiro Mihara, Keisuke Tanaka
    Universal Designated-Verifier Signature with Aggregation. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:514-519 [Conf]
  195. K. V. R. Ravi, Ramaswamy Palaniappan
    Recognising Individuals Using Their Brain Patterns. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:520-523 [Conf]
  196. Robbie De Sutter, Sam Lerouge, Davy De Schrijver, Rik Van de Walle
    Enhancing RSS Feeds: Eliminating Overhead through Binary Encoding. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:520-525 [Conf]
  197. Haibo Yu, Chunzhao Jin, Haiyan Che
    A Description Logic for PKI Trust Domain Modeling. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:524-528 [Conf]
  198. Yong He, Haihong Yu, Zhengjun Qiu
    Study on Farm Information Acquisition by Using Wireless Remote Methods and Treatment Systems. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:526-530 [Conf]
  199. Tianbo Lu, Binxing Fang, Yuzhong Sun, Xueqi Cheng, Li Guo
    Building Scale-Free Overlay Mix Networks with Small-World Properties. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:529-534 [Conf]
  200. S. M. Yong, H. T. Ewe
    Robust Routing Table Design for IPv6 Lookup. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:531-536 [Conf]
  201. Po-Jen Chuang, Tun-Hao Chao, Bo-Yi Li
    A Scalable Grouping Random Key Predistribution Scheme for Large Scale Distributed Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:535-540 [Conf]
  202. Ching-Fang Hsu, Te-Lung Liu, Fang-Sheng Lin
    On Dynamic Routing and Wavelength Assignment in Multi-granular All-Optical Networks. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:537-542 [Conf]
  203. Prasan Kumar Sahoo, Jonathan Jen-Rong Chen, Ping-Tai Sun
    Efficient Security Mechanisms for the Distributed Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:541-546 [Conf]
  204. Jeng-Wei Lin, Li-Ming Tseng, Jan-Ming Ho, Feipei Lai
    A Web Redirection Service for Variant Chinese Domain Name Resolution. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:543-548 [Conf]
  205. Jin Park, Jeong-Tae Hwang, Young-Chul Kim
    FPGA and ASIC Implementation of ECC Processor for Security on Medical Embedded System. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:547-551 [Conf]
  206. Teck-Kuen Chua, David C. Pheanis
    Incomplete Test Vectors Fail to Detect Obscure VoIP Software Errors. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:549-554 [Conf]
  207. Xuegang Lin, Miaoliang Zhu, Rongsheng Xu
    A Framework for Quantifying Information System Survivability. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:552-555 [Conf]
  208. Eishi Ibe, Hideaki Kameyama, Yasuo Yahagi, Hironaru Yamaguchi
    Single Event Effects as a Reliability Issue of IT Infrastructure. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:555-560 [Conf]
  209. Yuqing Peng, Gengqian Liu, Tao Lin, Hengshan Geng
    Application of Rough Set Theory in Network Fault Diagnosis. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:556-559 [Conf]
  210. Yong-Sork Her, Kenji Imamoto, Kouichi Sakurai
    Some Remarks on Security of Receipt-Free E-auction. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:560-563 [Conf]
  211. Chia-Chun Tsai, Jan-Ou Wu, Chung-Chieh Kuo, Trong-Yen Lee, Wen-Ta Lee
    Zero-Skew Driven for RLC Clock Tree Construction in SoC. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:561-566 [Conf]
  212. Wu Liu, Jian-Ping Wu, Hai-Xin Duan, Xing Li
    The Authorization Service in Dynamic Trust Domains. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:564-567 [Conf]
  213. Li Wang, Xueli Yu
    Research on Knowledge Communication of Dynamic Virtual Communities Based on Ontology. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:567-572 [Conf]
  214. Prasit Teekaput, Somphop Chokchaitam
    Secure Embedded Error Detection Arithmetic Coding. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:568-571 [Conf]
  215. Wuu Yang
    Uncovering Attacks on Security Protocols. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:572-575 [Conf]
  216. Jun Lai, Ben Soh
    Personalized Web Search Results with Profile Comparisons. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:573-576 [Conf]
  217. Wen-Chung Kuo, Ming-Yang Chen
    A Modified (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:576-579 [Conf]
  218. Minghui Wang, Yongquan Yu, Bi Zeng
    Ship Steering System Based on Fuzzy Control Using Real-Time Tuning Algorithm. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:577-580 [Conf]
  219. Chun-Hua Chen, Chi-Min Lan, Gwoboa Horng
    Protecting Customer's Privacy in Querying Valuable Information Combined with E-Payment Scheme. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:580-583 [Conf]
  220. Eugin Hyun, Kwang-Su Seong
    Design and Verification for PCI Express Controller. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:581-586 [Conf]
  221. Gobindar S. Sandhu, Stevan M. Berber
    Investigation on Operations of a Secure Communication System Based on the Chaotic Phase Shift Keying Scheme. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:584-587 [Conf]
  222. Vinod Rajan, Yul Chu
    A Study for Packet Buffer Algorithms for a Protocol Processor. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:587-590 [Conf]
  223. Po-Hao Chang, Chi-Yi Liao, Jun-Ren Chen
    Receiver Design for OCDMA Users in a Hybrid OCDMA/WDMA System. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:591-594 [Conf]
  224. Stephen J. Searle
    Implementation of Velocity Filtering for Sequential Architectures. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:591-596 [Conf]
  225. Hock-Woo Tan, Keok-Kee Lee, Leng-Phuan Tay
    Algorithms for Intelligent Turret Assembly System. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:595-598 [Conf]
  226. Yih-Chuan Lin, Zni-Kang Huang, Ri-Ting Pong, Chuen-Ching Wang
    A Robust Watermarking Scheme Combined with the FSVQ for Images. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:597-602 [Conf]
  227. Wen-Tzeng Huang, Chun-Ta Chen, Yen-Sheng Chen, Chin-Hsing Chen
    A Compression Layer for NAND Type Flash Memory Systems. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:599-604 [Conf]
  228. Marwa Chendeb, Mohamad Khalil, Jacques Duchêne
    New Approach for Detection Using Wavelet Coefficients. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:603-607 [Conf]
  229. Ying Zhu, Saeid Belkasim
    A 3D Reconstruction Algorithm Based on 3D Deformable Atlas. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:607-612 [Conf]
  230. Ralf Klamma, Marc Spaniol, Matthias Jarke
    "Do You Know a Similar Project I Can Learn From?" Self-Monitoring of Communities of Practice in the Cultural Sciences. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:608-613 [Conf]
  231. Xia Jun Jun, Ni Lin, Y. Miao
    A New Digital Implementation of Ridgelet Transform for Images of Dyadic Length. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:613-616 [Conf]
  232. Zhang Zhong
    Background Noise Distribution after High-Resolution Processing in Ship-Borne Radar. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:614-617 [Conf]
  233. Mong-Shu Lee
    Image Deblurring via Smoothness-Switching on Hölder Spaces. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:617-622 [Conf]
  234. Jianfeng Weng
    A Nonlinear Detection Scheme for Sinusoid in Additive Unknown Colored Gaussian Noise. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:618-621 [Conf]
  235. Jun Xian, Yong He
    Improved Reconstruction Algorithm from Weighted Sampling Points in Shift-Invariant Signal Spaces. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:622-625 [Conf]
  236. Ibrahim Al-Bahadly, Hassane Darhmaoui
    Automatic Colour Detection for Car Repainting. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:623-628 [Conf]
  237. Jusak Jusak, Zahir M. Hussain
    Performance of Sinusoidally-Distributed Dithering for Signed-Error Constant Modulus Algorithm. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:626-629 [Conf]
  238. Mirco Pieper, Anton Kummert
    Elimination of Exposure Artifacts in Predicted Images by Means of an Adaptive Circular Median Filter. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:629-633 [Conf]
  239. Yuu-Seng Lau, Zahir M. Hussain
    A New Approach in Chaos Shift Keying for Secure Communication. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:630-633 [Conf]
  240. Dan Liu, Xiangjian He
    Models of the Sea Mixed Waves in Navigating Radar Simulator. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:634-637 [Conf]
  241. Shaou-Gang Miaou, Shih-Tse Chen, Fu-Sheng Ke
    Capsule Endoscopy Image Coding Using Wavelet-Based Adaptive Vector Quantization without Codebook Training. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:634-637 [Conf]
  242. Conrad Sanderson, Fabien Cardinaux, Samy Bengio
    On Accuracy/Robustness/Complexity Trade-Offs in Face Verification. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:638-643 [Conf]
  243. C. T. Bhunia
    Modified Packet Combining Using Error Forecasting Decoding to Control Error. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:641-646 [Conf]
  244. Paul Morrison, Ju Jia Zou
    An Effective Skeletonization Method Based on Adaptive Selection of Contour Points. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:644-649 [Conf]
  245. Wilfred W. K. Lin, Allan K. Y. Wong, Tharam S. Dillon
    A Novel Traffic Independent NNC for Dynamic Buffer Tuning to Shorten the RTT of a TCP Channel. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:647-652 [Conf]
  246. Conrad Sanderson, Marc Saban, Yongsheng Gao
    On Local Features for GMM Based Face Verification. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:650-655 [Conf]
  247. Li Yan, Bin Qiu
    An Intelligent Algorithm for Improving QoS in a Delay-Based End-to-End Congestion Avoidance Scheme. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:653-658 [Conf]
  248. Suhuai Luo, Jesse S. Jin
    Recent Progresses on Cerebral Vasculature Segmentation for 3D Quantification and Visualization of MRA. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:656-661 [Conf]
  249. Eric C. K. Poh, Hong Tat Ewe
    IPv6 Packet Classification Based on Flow Label, Source and Destination Addresses. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:659-664 [Conf]
  250. Peng Zhang, Lin Ni
    WDFB Contourlet and Shearing Invariant for Image Denoising. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:662-667 [Conf]
  251. Sulaiman Syed Mohamed, Asaad A. Y. Malik Abusin, David Chieng
    Evaluation of IPv6 and Comparative Study with Different Operating Systems. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:665-670 [Conf]
  252. Hatice Gunes, Massimo Piccardi
    Automatic Visual Recognition of Face and Body Action Units. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:668-673 [Conf]
  253. Thierry Rakotoarivelo, Patrick Sénac, Aruna Seneviratne, Michel Diaz
    A Structured Peer-to-Peer Method to Discover QoS Enhanced Alternate Paths. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:671-676 [Conf]
  254. Golam Sorwar
    Adaptive-Centre Candidate Decimation Distance-Dependent Thresholding Search for Motion Estimation. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:674-679 [Conf]
  255. Johnson I. Agbinya, Ha Dang Truong
    A Comparison of Ultra Wideband Signal Functions for Wireless Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:677-682 [Conf]
  256. Hiroki Takahashi, Masayuki Nakajima
    Region Graph Based Text Extraction from Outdoor Images. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:680-685 [Conf]
  257. Joel Sing, Ben Soh
    A Critical Analysis of Multilayer IP Security Protocol. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:683-688 [Conf]
  258. Ma Yang, Graham Leedham, Colin Higgins, Swe Myo Htwe
    On-Line Recognition of Pitman Shorthand for Fast Mobile Text Entry. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:686-691 [Conf]
  259. Joel Sing, Ben Soh
    On the Use of Snoop with Geostationary Satellite Links. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:689-694 [Conf]
  260. John G. Allen, Richard Y. D. Xu, Jesse S. Jin
    Mean Shift Object Tracking for a SIMD Computer. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:692-697 [Conf]
  261. Mohammad Mamunur Rashid, Sugang Xu, Yoshiaki Tanaka
    Limited Range Wavelength Converter Sharing in WDM Networks. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:695-700 [Conf]
  262. Suneeta Agarwal, Vikas Kumar
    Online Character Recognition. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:698-703 [Conf]
  263. Yuhuang Ye, Jun Chen
    The Algorithm of Repeat TPC Decoding. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:701-703 [Conf]
  264. Jinpeng Huai, Jun Han
    An Enhanced Exact Procedure for the CMST Problem. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:704-709 [Conf]
  265. Chih-Hong Kao, Hon-Son Don
    Skew Detection of Document Images Using Line Structural Information. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:704-715 [Conf]
  266. Chin-Hao Hsu, Zhih-Wei Chen, Cheng-Chin Chiang
    Region-Based Color Correction of Images. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:710-715 [Conf]
  267. Ha Trung Phan, Doan B. Hoang
    FICC-DiffServ: A New QoS Architecture Supporting Resources Discovery, Admission and Congestion Controls. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:710-715 [Conf]
  268. John B. Stav, Hariklia Tsalapatas
    A European Knowledgebase Framework for Deployment of Real Time AV-Communication in Distance Teaching. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:716-721 [Conf]
  269. Lih-Yang Wang, Ching-Hui Lai, Kuan-Ren Pan
    Quad-Tree-Based Image Shape Coding with Block Compensation. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:716-719 [Conf]
  270. Da Deng, Jianhua Zhang
    Combining Multiple Precision-Boosted Classifiers for Indoor-Outdoor Scene Classification. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:720-725 [Conf]
  271. Wing-Fai Poon, Kwok-Tung Lo, Jian Feng
    Performance Study for Streaming Layered Encoded Videos in Broadcast Environment. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:722-727 [Conf]
  272. Phil Sheridan, David M. Alexander, Kelly S. Nunn-Clark
    Fast Fourier Transform in the Spiral Honeycomb Image Algebra. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:726-731 [Conf]
  273. Kai-Juan Wong, D. K. Arvind
    Specknets: New Challenges for Wireless Communication Protocols. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:728-733 [Conf]
  274. Wenjing Jia, Huaifeng Zhang, Xiangjian He
    Mean Shift for Accurate Number Plate Detection. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:732-737 [Conf]
  275. Wei-Chang Yeh
    A New Sum-of-Disjoint-Products Technique to Determine Network Reliabilities with Known Minimal Paths. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:734-738 [Conf]
  276. Fang Li, Maylor K. H. Leung, Chuan Liu
    Fingerprint Alignment Using Ring Model. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:738-743 [Conf]
  277. P. Koszek, K. Sandrasegaran
    Grid Architecture Storage - Utilising Grid Computing for Dynamic Data Storage. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:739-742 [Conf]
  278. Wenbo Zhang, Hai Zhao, Xiaoying Wang, Zhenyu Yin, Ming Zhao
    An Efficient EWS for Non-PC Device. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:743-746 [Conf]
  279. Ziqiang Feng, David Tien
    Enhancement of Semantics in CBIR. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:744-745 [Conf]
  280. Paul Andrew Watters, Frances Martin, H. Steffen Stripf
    Visual Steganalysis of LSB-Encoded Natural Images. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:746-751 [Conf]
  281. Li Wang, Zeng-zhi Li, Yanping Chen
    A Control Theoretic Analysis of Mixed TCP and UDP Traffic under RED Based on Nonlinear Dynamic Model. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:747-750 [Conf]
  282. Koji Hashimoto, Yoshitaka Shibata
    Extendable Media Stream Mechanisms for Heterogeneous Communication Environments. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:751-754 [Conf]
  283. Sagarmay Deb
    Experiments on Emergence Index in Content-Based Image Retrieval. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:752-755 [Conf]
  284. Kenji Ohira, Youichi Koyama, Kenji Fujikawa, Yasuo Okabe
    Automatic Address Assignment for IPv6 End-to-End Multihoming Sites. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:755-758 [Conf]
  285. Erjun Zhao, Dan Liu
    Fractal Image Compression Methods: A Review. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:756-759 [Conf]
  286. Wu Liu, Hai-Xin Duan, Jian-Ping Wu, Xing Li
    Improved Marking Model ERPPM Tracing Back to DDoS Attacker. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:759-762 [Conf]
  287. Jing Li, Quan Pan, Tao Yang, Stan Z. Li
    Automated Feature Points Management for Video Mosaic Construction. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:760-763 [Conf]
  288. Wei Lai, Donggang Yu, Jiro Tanaka, Cai Fei
    Using Image Contour Recognition in GIS Navigation. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:764-767 [Conf]
  289. I-Ping Hsieh, Shang-Juh Kao
    Managing the Co-Existing Network of IPv6 and IPv4 under Various Transition Mechanisms. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:765-771 [Conf]
  290. Katsuhiko Ueda, Ken'ichi Matsuo
    Automatic Seal Imprint Verification System for Bankcheck Processing. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:768-771 [Conf]
  291. Mathew Shearer, Ju Jia Zou
    Detection of Dominant Points Based on Noise Suppression and Error Minimisation. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:772-775 [Conf]
  292. Augustin Yu, Robert Steele
    An Overview of Research on Reverse Engineering XML Schemas into UML Diagrams. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:772-777 [Conf]
  293. Shengke Wang, Zhiyan Wang, Dehua Zhou
    An Efficient Image Compression Scheme for Air Tickets Storage. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:776-779 [Conf]
  294. Juan Dai, Robert Steele
    UDDI Access Control. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:778-783 [Conf]
  295. Vooi Voon Yap, Richard Comley
    A Hybrid Wavelet-Based Compression System. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:780-783 [Conf]
  296. Hamid Jahankhani, Justus I. Ekeigwe
    Adaptation of the Balanced Scorecard Model to the IT Functions. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:784-787 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002