The SCEAS System
Navigation Menu

Conferences in DBLP

(isict)
2004 (conf/isict/2004)

  1. Banjong Huongrat, Twittie Senivongse
    Cross-domain service change notification via trader federation. [Citation Graph (0, 0)][DBLP]
    ISICT, 2004, pp:2-7 [Conf]
  2. Arno Puder
    Extending desktop applications to the web. [Citation Graph (0, 0)][DBLP]
    ISICT, 2004, pp:8-13 [Conf]
  3. Heinz Kredel, Matthias Merz
    The design of the IPACS distributed software architecture. [Citation Graph (0, 0)][DBLP]
    ISICT, 2004, pp:14-19 [Conf]
  4. Markus Aleksy, Ralf Gitzel
    Value type-based smart proxies: a concept for adaptable distributed applications. [Citation Graph (0, 0)][DBLP]
    ISICT, 2004, pp:20-25 [Conf]
  5. Conor Gildea, Declan Barber
    Convergence technologies for sensor systems in the Next Generation networks (NGN). [Citation Graph (0, 0)][DBLP]
    ISICT, 2004, pp:26-31 [Conf]
  6. Deepak Mathur
    Traffic protection and restoration schemes in core routers/switches. [Citation Graph (0, 0)][DBLP]
    ISICT, 2004, pp:32-37 [Conf]
  7. Deepak Mathur
    SuperPipe: next generation of high speed trunks. [Citation Graph (0, 0)][DBLP]
    ISICT, 2004, pp:38-43 [Conf]
  8. Xue Bai, Ade G. Ola, Yinjing Cui, Fidelis Ikem
    A clustered tree method for implementing application level multicast. [Citation Graph (0, 0)][DBLP]
    ISICT, 2004, pp:44-49 [Conf]
  9. Gavin Byrne, Declan Barber
    Developing multiparty conferencing services for the NGN: towards a service creation framework. [Citation Graph (0, 0)][DBLP]
    ISICT, 2004, pp:50-55 [Conf]
  10. Hussein Ali, Mohammad Inayatullah, Shmuel Rotenstreich
    Resource allocation and QoS in mobile ad hoc networks. [Citation Graph (0, 0)][DBLP]
    ISICT, 2004, pp:56-62 [Conf]
  11. Ladda Preechaveerakul, Pattarasinee Bhattarakosol
    One name—many objects—one result: a possible solution for naming system. [Citation Graph (0, 0)][DBLP]
    ISICT, 2004, pp:63-67 [Conf]
  12. Lan Quan, Tai Rang Eom, Kyung-Geun Lee, Ju-wook Jang, Sang Yun Lee
    Retrieval schemes for scalable unstructured P2P system. [Citation Graph (0, 0)][DBLP]
    ISICT, 2004, pp:68-73 [Conf]
  13. Montree Bunruangses, Weerawat Poompatanapong, Pratheep Banyatnoparat, Bunjong Piyatamrong
    QoS multi-agent applied for Grid Service management. [Citation Graph (0, 0)][DBLP]
    ISICT, 2004, pp:74-79 [Conf]
  14. Th. Vergin, Thomas Kessler, Andreas Ahrens, Christoph Lange, Hans-Dietrich Melzer
    Packet arrivals in ethernet-based data networks. [Citation Graph (0, 0)][DBLP]
    ISICT, 2004, pp:80-85 [Conf]
  15. Vivek Chanana, Athula Ginige, San Murugesan
    Improving information retrieval effectiveness by assigning context to documents. [Citation Graph (0, 0)][DBLP]
    ISICT, 2004, pp:86-91 [Conf]
  16. David Byer, Colin Depradine
    Autonomous collaborative web agents. [Citation Graph (0, 0)][DBLP]
    ISICT, 2004, pp:92-96 [Conf]
  17. Shazia Akhtar, John Dunnion, Ronan G. Reilly
    A system for document markup and organisation. [Citation Graph (0, 0)][DBLP]
    ISICT, 2004, pp:97-102 [Conf]
  18. Cormac Flynn, John Dunnion
    Topic Detection in the news domain. [Citation Graph (0, 0)][DBLP]
    ISICT, 2004, pp:103-108 [Conf]
  19. John O'Donovan, John Dunnion
    Adaptive recommendation: putting the best foot forward. [Citation Graph (0, 0)][DBLP]
    ISICT, 2004, pp:109-114 [Conf]
  20. Svetlana Hensman, John Dunnion
    Automatically building conceptual graphs using VerbNet and WordNet. [Citation Graph (0, 0)][DBLP]
    ISICT, 2004, pp:115-120 [Conf]
  21. Alta van der Merwe, Johannes C. Cronjé
    The educational value chain as a modelling tool in re-engineering efforts. [Citation Graph (0, 0)][DBLP]
    ISICT, 2004, pp:122-127 [Conf]
  22. Leon Jololian, Jean-Claude Ngatchou, Remzi Seker
    A component integration meta-framework using smart adapters. [Citation Graph (0, 0)][DBLP]
    ISICT, 2004, pp:128-133 [Conf]
  23. Pratap Chillakanti
    Role-based information security: change management issues. [Citation Graph (0, 0)][DBLP]
    ISICT, 2004, pp:134-139 [Conf]
  24. A. Chris Bogen, David A. Dampier
    Knowledge discovery and experience modeling in computer forensics media analysis. [Citation Graph (0, 0)][DBLP]
    ISICT, 2004, pp:140-145 [Conf]
  25. Gary Cantrell, David D. Dampier
    Experiments in hiding data inside the file structure of common office documents: a stegonography application. [Citation Graph (0, 0)][DBLP]
    ISICT, 2004, pp:146-151 [Conf]
  26. Amirrudin Kamsin
    Management of information technology: the study on strategy, planning and policies. [Citation Graph (0, 0)][DBLP]
    ISICT, 2004, pp:152-157 [Conf]
  27. Amirrudin Kamsin, Mas Idayu Md Sabri
    The collaborative system strategies. [Citation Graph (0, 0)][DBLP]
    ISICT, 2004, pp:158-165 [Conf]
  28. Wonjin Jung
    A review of research: an investigation of the impact of data quality on decision performance. [Citation Graph (0, 0)][DBLP]
    ISICT, 2004, pp:166-171 [Conf]
  29. Nicholas Zsifkov, Radu Campeanu
    Business rules domains and business rules modeling. [Citation Graph (0, 0)][DBLP]
    ISICT, 2004, pp:172-177 [Conf]
  30. Nils Schumacher
    A theoretical concept for XML-enabled global small business networks. [Citation Graph (0, 0)][DBLP]
    ISICT, 2004, pp:178-184 [Conf]
  31. Thomas H. Lenhard
    Multi-discipline-reengineering/redevelopment of IT-infrastructures. [Citation Graph (0, 0)][DBLP]
    ISICT, 2004, pp:185-189 [Conf]
  32. Akihiro Chiyonobu, Toshinori Sato
    Investigating heterogeneous combination of functional units for a criticality-based low-power processor architecture. [Citation Graph (0, 0)][DBLP]
    ISICT, 2004, pp:190-195 [Conf]
  33. JunSeong Kim, JongSu Yi
    Performance sensitivity of SPEC CPU2000 over operating frequency. [Citation Graph (0, 0)][DBLP]
    ISICT, 2004, pp:196-201 [Conf]
  34. Chul Choi, Young Kwan Choi, Chang-Chun Park
    The image analysis system with Adaptive Component. [Citation Graph (0, 0)][DBLP]
    ISICT, 2004, pp:202-207 [Conf]
  35. Seung Soo Lee, Jeong A. Lee, Chang Choon Park
    A research of merging regions through isophotes analysis. [Citation Graph (0, 0)][DBLP]
    ISICT, 2004, pp:208-213 [Conf]
  36. Young Kwan Choi, Chul Choi, Chang-Chun Park
    Image retrieval using color component analysis. [Citation Graph (0, 0)][DBLP]
    ISICT, 2004, pp:214-219 [Conf]
  37. Dragos Trinca
    Meta-EAH: an adaptive encoder based on adaptive codes. Moving between adaptive mechanisms. [Citation Graph (0, 0)][DBLP]
    ISICT, 2004, pp:220-225 [Conf]
  38. Mayumi Kato, Chia-Tien Dan Lo
    Growing adaptation of computer science in Bioinfomatics. [Citation Graph (0, 0)][DBLP]
    ISICT, 2004, pp:226-231 [Conf]
  39. Ian Eccles, Meng Su
    Illustrating the curse of dimensionality numerically through different data distribution models. [Citation Graph (0, 0)][DBLP]
    ISICT, 2004, pp:232-237 [Conf]
  40. Wei Li, Hang Chen, Qing-An Zeng, Dharma P. Agrawal
    Resource allocation for handoffs in integrated wireless cellular networks. [Citation Graph (0, 0)][DBLP]
    ISICT, 2004, pp:238-243 [Conf]
  41. Yafen Li, Wuu Yang, Ching-Wei Huang
    Preventing type flaw attacks on security protocols with a simplified tagging scheme. [Citation Graph (0, 0)][DBLP]
    ISICT, 2004, pp:244-249 [Conf]
  42. Chia-Chu Chiang
    High-level heterogeneous distributed parallel programming. [Citation Graph (0, 0)][DBLP]
    ISICT, 2004, pp:250-255 [Conf]
  43. Chia-Chu Chiang, Zhendong Chen
    A CORBA adapter to promote reusability of Java components. [Citation Graph (0, 0)][DBLP]
    ISICT, 2004, pp:256-261 [Conf]
  44. Joel K. Hollingsworth, David J. Powell
    Explicitly and implicitly teaching Java best practices across the undergraduate curriculum. [Citation Graph (0, 0)][DBLP]
    ISICT, 2004, pp:262-267 [Conf]
  45. Pat Shuff, Michael Bolton
    Experiences in code migration from main applications to J2EE servers. [Citation Graph (0, 0)][DBLP]
    ISICT, 2004, pp:268-274 [Conf]
  46. Raymond Imhoff, Colin Depradine
    A Java framework for bio-analysis systems. [Citation Graph (0, 0)][DBLP]
    ISICT, 2004, pp:275-280 [Conf]
  47. Adrijan Bozinovski, Stevo Bozinovski
    N-queens pattern generation: an insight into space complexity of a backtracking algorithm. [Citation Graph (0, 0)][DBLP]
    ISICT, 2004, pp:281-286 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002