Conferences in DBLP
(isict) 2004 (conf/isict/2004)
Banjong Huongrat , Twittie Senivongse Cross-domain service change notification via trader federation. [Citation Graph (0, 0)][DBLP ] ISICT, 2004, pp:2-7 [Conf ] Arno Puder Extending desktop applications to the web. [Citation Graph (0, 0)][DBLP ] ISICT, 2004, pp:8-13 [Conf ] Heinz Kredel , Matthias Merz The design of the IPACS distributed software architecture. [Citation Graph (0, 0)][DBLP ] ISICT, 2004, pp:14-19 [Conf ] Markus Aleksy , Ralf Gitzel Value type-based smart proxies: a concept for adaptable distributed applications. [Citation Graph (0, 0)][DBLP ] ISICT, 2004, pp:20-25 [Conf ] Conor Gildea , Declan Barber Convergence technologies for sensor systems in the Next Generation networks (NGN). [Citation Graph (0, 0)][DBLP ] ISICT, 2004, pp:26-31 [Conf ] Deepak Mathur Traffic protection and restoration schemes in core routers/switches. [Citation Graph (0, 0)][DBLP ] ISICT, 2004, pp:32-37 [Conf ] Deepak Mathur SuperPipe: next generation of high speed trunks. [Citation Graph (0, 0)][DBLP ] ISICT, 2004, pp:38-43 [Conf ] Xue Bai , Ade G. Ola , Yinjing Cui , Fidelis Ikem A clustered tree method for implementing application level multicast. [Citation Graph (0, 0)][DBLP ] ISICT, 2004, pp:44-49 [Conf ] Gavin Byrne , Declan Barber Developing multiparty conferencing services for the NGN: towards a service creation framework. [Citation Graph (0, 0)][DBLP ] ISICT, 2004, pp:50-55 [Conf ] Hussein Ali , Mohammad Inayatullah , Shmuel Rotenstreich Resource allocation and QoS in mobile ad hoc networks. [Citation Graph (0, 0)][DBLP ] ISICT, 2004, pp:56-62 [Conf ] Ladda Preechaveerakul , Pattarasinee Bhattarakosol One name—many objects—one result: a possible solution for naming system. [Citation Graph (0, 0)][DBLP ] ISICT, 2004, pp:63-67 [Conf ] Lan Quan , Tai Rang Eom , Kyung-Geun Lee , Ju-wook Jang , Sang Yun Lee Retrieval schemes for scalable unstructured P2P system. [Citation Graph (0, 0)][DBLP ] ISICT, 2004, pp:68-73 [Conf ] Montree Bunruangses , Weerawat Poompatanapong , Pratheep Banyatnoparat , Bunjong Piyatamrong QoS multi-agent applied for Grid Service management. [Citation Graph (0, 0)][DBLP ] ISICT, 2004, pp:74-79 [Conf ] Th. Vergin , Thomas Kessler , Andreas Ahrens , Christoph Lange , Hans-Dietrich Melzer Packet arrivals in ethernet-based data networks. [Citation Graph (0, 0)][DBLP ] ISICT, 2004, pp:80-85 [Conf ] Vivek Chanana , Athula Ginige , San Murugesan Improving information retrieval effectiveness by assigning context to documents. [Citation Graph (0, 0)][DBLP ] ISICT, 2004, pp:86-91 [Conf ] David Byer , Colin Depradine Autonomous collaborative web agents. [Citation Graph (0, 0)][DBLP ] ISICT, 2004, pp:92-96 [Conf ] Shazia Akhtar , John Dunnion , Ronan G. Reilly A system for document markup and organisation. [Citation Graph (0, 0)][DBLP ] ISICT, 2004, pp:97-102 [Conf ] Cormac Flynn , John Dunnion Topic Detection in the news domain. [Citation Graph (0, 0)][DBLP ] ISICT, 2004, pp:103-108 [Conf ] John O'Donovan , John Dunnion Adaptive recommendation: putting the best foot forward. [Citation Graph (0, 0)][DBLP ] ISICT, 2004, pp:109-114 [Conf ] Svetlana Hensman , John Dunnion Automatically building conceptual graphs using VerbNet and WordNet. [Citation Graph (0, 0)][DBLP ] ISICT, 2004, pp:115-120 [Conf ] Alta van der Merwe , Johannes C. Cronjé The educational value chain as a modelling tool in re-engineering efforts. [Citation Graph (0, 0)][DBLP ] ISICT, 2004, pp:122-127 [Conf ] Leon Jololian , Jean-Claude Ngatchou , Remzi Seker A component integration meta-framework using smart adapters. [Citation Graph (0, 0)][DBLP ] ISICT, 2004, pp:128-133 [Conf ] Pratap Chillakanti Role-based information security: change management issues. [Citation Graph (0, 0)][DBLP ] ISICT, 2004, pp:134-139 [Conf ] A. Chris Bogen , David A. Dampier Knowledge discovery and experience modeling in computer forensics media analysis. [Citation Graph (0, 0)][DBLP ] ISICT, 2004, pp:140-145 [Conf ] Gary Cantrell , David D. Dampier Experiments in hiding data inside the file structure of common office documents: a stegonography application. [Citation Graph (0, 0)][DBLP ] ISICT, 2004, pp:146-151 [Conf ] Amirrudin Kamsin Management of information technology: the study on strategy, planning and policies. [Citation Graph (0, 0)][DBLP ] ISICT, 2004, pp:152-157 [Conf ] Amirrudin Kamsin , Mas Idayu Md Sabri The collaborative system strategies. [Citation Graph (0, 0)][DBLP ] ISICT, 2004, pp:158-165 [Conf ] Wonjin Jung A review of research: an investigation of the impact of data quality on decision performance. [Citation Graph (0, 0)][DBLP ] ISICT, 2004, pp:166-171 [Conf ] Nicholas Zsifkov , Radu Campeanu Business rules domains and business rules modeling. [Citation Graph (0, 0)][DBLP ] ISICT, 2004, pp:172-177 [Conf ] Nils Schumacher A theoretical concept for XML-enabled global small business networks. [Citation Graph (0, 0)][DBLP ] ISICT, 2004, pp:178-184 [Conf ] Thomas H. Lenhard Multi-discipline-reengineering/redevelopment of IT-infrastructures. [Citation Graph (0, 0)][DBLP ] ISICT, 2004, pp:185-189 [Conf ] Akihiro Chiyonobu , Toshinori Sato Investigating heterogeneous combination of functional units for a criticality-based low-power processor architecture. [Citation Graph (0, 0)][DBLP ] ISICT, 2004, pp:190-195 [Conf ] JunSeong Kim , JongSu Yi Performance sensitivity of SPEC CPU2000 over operating frequency. [Citation Graph (0, 0)][DBLP ] ISICT, 2004, pp:196-201 [Conf ] Chul Choi , Young Kwan Choi , Chang-Chun Park The image analysis system with Adaptive Component. [Citation Graph (0, 0)][DBLP ] ISICT, 2004, pp:202-207 [Conf ] Seung Soo Lee , Jeong A. Lee , Chang Choon Park A research of merging regions through isophotes analysis. [Citation Graph (0, 0)][DBLP ] ISICT, 2004, pp:208-213 [Conf ] Young Kwan Choi , Chul Choi , Chang-Chun Park Image retrieval using color component analysis. [Citation Graph (0, 0)][DBLP ] ISICT, 2004, pp:214-219 [Conf ] Dragos Trinca Meta-EAH: an adaptive encoder based on adaptive codes. Moving between adaptive mechanisms. [Citation Graph (0, 0)][DBLP ] ISICT, 2004, pp:220-225 [Conf ] Mayumi Kato , Chia-Tien Dan Lo Growing adaptation of computer science in Bioinfomatics. [Citation Graph (0, 0)][DBLP ] ISICT, 2004, pp:226-231 [Conf ] Ian Eccles , Meng Su Illustrating the curse of dimensionality numerically through different data distribution models. [Citation Graph (0, 0)][DBLP ] ISICT, 2004, pp:232-237 [Conf ] Wei Li , Hang Chen , Qing-An Zeng , Dharma P. Agrawal Resource allocation for handoffs in integrated wireless cellular networks. [Citation Graph (0, 0)][DBLP ] ISICT, 2004, pp:238-243 [Conf ] Yafen Li , Wuu Yang , Ching-Wei Huang Preventing type flaw attacks on security protocols with a simplified tagging scheme. [Citation Graph (0, 0)][DBLP ] ISICT, 2004, pp:244-249 [Conf ] Chia-Chu Chiang High-level heterogeneous distributed parallel programming. [Citation Graph (0, 0)][DBLP ] ISICT, 2004, pp:250-255 [Conf ] Chia-Chu Chiang , Zhendong Chen A CORBA adapter to promote reusability of Java components. [Citation Graph (0, 0)][DBLP ] ISICT, 2004, pp:256-261 [Conf ] Joel K. Hollingsworth , David J. Powell Explicitly and implicitly teaching Java best practices across the undergraduate curriculum. [Citation Graph (0, 0)][DBLP ] ISICT, 2004, pp:262-267 [Conf ] Pat Shuff , Michael Bolton Experiences in code migration from main applications to J2EE servers. [Citation Graph (0, 0)][DBLP ] ISICT, 2004, pp:268-274 [Conf ] Raymond Imhoff , Colin Depradine A Java framework for bio-analysis systems. [Citation Graph (0, 0)][DBLP ] ISICT, 2004, pp:275-280 [Conf ] Adrijan Bozinovski , Stevo Bozinovski N-queens pattern generation: an insight into space complexity of a backtracking algorithm. [Citation Graph (0, 0)][DBLP ] ISICT, 2004, pp:281-286 [Conf ]