The SCEAS System
Navigation Menu

Conferences in DBLP

(isict)
2003 (conf/isict/2003)

  1. Jinkeun Hong, Sunchun Park, Janghong Yoon, Jae-Young Koh, Daeho Kim
    Design of random noise generator using SW algorithm. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:9-14 [Conf]
  2. Neil Dunstan, Stephen Hodgson
    A processor array for computing wavelet energies. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:15-20 [Conf]
  3. Abdellah Kacha, Francis Grenez, P. De Doncker, Khier Benmahammed
    A wavelet-based approach for frequency estimation of interference signals in printed circuit boards. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:21-26 [Conf]
  4. John Fulcher
    The use of smart devices in eHealth. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:27-32 [Conf]
  5. P. Gómez, V. Nieto, R. Martínez, A. Alvarez, F. Rodríguez, V. Rodellar
    Detection of the mucosal wave in the speech signal for larynx pathology characterization. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:33-39 [Conf]
  6. John Fulcher, Russell Gluck, Marion Worthy, Kim Draisma, Wilma Vialle
    A neural network, speech-based approach to literacy. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:40-45 [Conf]
  7. Blaise W. Liffick
    Assistive technology in computer science. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:46-51 [Conf]
  8. Cestmir Stuka, Daniel Smutek
    Correlation of the entrance examination result and the study success at the Medical Faculty, Charles University Prague. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:52-57 [Conf]
  9. Martina Berankova, Petra Nevrivova
    Problems in operational and systems analysis educational process: solved by ICT application. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:58-63 [Conf]
  10. Ganka Petkova Kovacheva, Hidemitsu Ogawa
    Radial basis function classifier for fault diagnostics. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:64-69 [Conf]
  11. David Edelman
    Adapting support vector machine methods for horserace odds prediction. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:70-75 [Conf]
  12. Giuseppe Ascia, Vincenzo Catania, Maurizio Palesi, Antonio Parlato
    An evolutionary approach for reducing the energy in address buses. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:76-81 [Conf]
  13. Josef Scharinger
    Detecting watermarks at arbitrary image resolution. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:82-87 [Conf]
  14. Othman Khalifa
    Image data compression in wavelet transform domain using modified LBG algorithm. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:88-93 [Conf]
  15. Sang-Su Lee, Jong-Wook Han, Hyo-wook Bae
    The encryption method to share a secret binary image and its decryption system. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:94-99 [Conf]
  16. Daniel Smutek, Radim Sára, Petr Sucharda, Ludvík Tesar
    Different types of image texture features in ultrasound of patients with lymphocytic thyroiditis. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:100-102 [Conf]
  17. Markus Hofmann, Brendan Tierney
    The involvement of human resources in large scale data mining projects. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:103-109 [Conf]
  18. Abdualrraouf A. Elbibas, M. J. Ridley
    Using metadata for developing automated Web system interface. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:113-118 [Conf]
  19. B. John Oommen, Jing Chen
    A new histogram method for sparse attributes: the averaged rectangular attribute cardinality map. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:119-125 [Conf]
  20. Vahid Tabataba Vakili, Arash Aziminejad, Mohammad Reza Dehbozorgi
    A novel speed-sensitive bidirectional overflow and hand-down resource allocation strategy for hierarchical cellular networks. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:126-131 [Conf]
  21. Sakari Junnila, Jarkko Niittylahti
    Wireless technologies for data acquisition systems. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:132-137 [Conf]
  22. Yun Gong, Tadas Marcinkevicius
    Video transmission over a GSM wireless network. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:138-143 [Conf]
  23. Xuerong Yong
    Analyzing the codes that avoid specified differences by binary tree. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:144-149 [Conf]
  24. Klaus Knoche, Jäurgen Rinas, Karl-Dirk Kammeyer
    MAI-suppression with fractional T-equalizer for CDMA. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:150-155 [Conf]
  25. David Lewis, Declan O'Sullivan
    Adaptive systems for ubiquitous computing. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:156- [Conf]
  26. Robert O'Connor, Sven van der Meer
    Present and future organisational models for wireless networks. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:157-162 [Conf]
  27. Simon Dobson
    Applications considered harmful for ambient systems. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:163-168 [Conf]
  28. Steffen Higel, Tony O'Donnell, Vincent Wade
    Towards a natural interface to adaptive service composition. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:169-174 [Conf]
  29. Stephen Greene, Jason Finnegan
    Usability of mobile devices and intelligently adapting to a user's needs. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:175-180 [Conf]
  30. Ken Murray, Rajiv Mathur, Dirk Pesch
    Intelligent access and mobility management in heterogeneous wireless networks using policy. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:181-186 [Conf]
  31. John Paul O'Grady, Susan Rea, Sinead Cummins, Dirk Pesch, Rajiv Mathur
    Dynamic configuration management for MANETs: an overview. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:187-192 [Conf]
  32. Paddy Nixon, Feng Wang, Sotirios Terzis
    Programming structures for adaptive ambient systems. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:193-198 [Conf]
  33. Ruaidhri Power
    Topic maps for context management. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:199-204 [Conf]
  34. Owen Conlan, Ruaidhri Power, Steffen Higel, Declan O'Sullivan, Keara Barrett
    Next generation context aware adaptive services. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:205-212 [Conf]
  35. Sven Buchholz, Thomas Buchholz
    Adaptive content networking. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:213-219 [Conf]
  36. Hannah Slay, Bruce H. Thomas, Rudi Vernik
    An interaction model for universal interaction and control in multi display environments. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:220-225 [Conf]
  37. Bruce H. Thomas, Wayne Piekarski
    Outdoor virtual reality. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:226-231 [Conf]
  38. James Auger, Jimmy Loizeau, Stefan Agamanolis
    Iso-phone: a total submersion telephonic experience. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:232-236 [Conf]
  39. J. Shi, I. A. Oraifige, F. R. Hall
    Adding haptic feedback to engineering simulation. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:237-241 [Conf]
  40. Francis Rousseaux, Alain Bonardi
    New tools and practices for electronic music distribution. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:242-248 [Conf]
  41. Nobutaka Suzuki, Yorichiro Sato, Michiyoshi Hayase
    On merging structured documents with move operation. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:249-254 [Conf]
  42. Henryk Krawczyk, Bogdan Wiszniewski
    Digital document life cycle development. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:255-260 [Conf]
  43. Arnold Neville Pears, Carl Erickson
    Enriching online learning resources with "explanograms". [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:261-266 [Conf]
  44. Ruey-Shun Chen, Shien-Chiang Yu
    Developing an XML framework for metadata system. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:267-272 [Conf]
  45. Davide Buscaldi, Giovanna Guerrini, Marco Mesiti, Paolo Rosso
    Tag semantics for the retrieval of XML documents. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:273-278 [Conf]
  46. Daniel Jiménez, Edgardo Ferretti, Vicente Vidal, Paolo Rosso, Carlos F. Enguix
    The influence of semantics in IR using LSI and K-means clustering techniques. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:279-284 [Conf]
  47. Antonio Ferrández Rodríguez, Julio Martínez, Jesús Peral
    An entity-relation approach to information retrieval. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:285-290 [Conf]
  48. Cormac O'Brien, Carl Vogel
    Spam filters: bayes vs. chi-squared; letters vs. words. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:291-296 [Conf]
  49. Sofie Van Gijsel, Carl Vogel
    Inducing a cline from corpora of political manifestos. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:297-303 [Conf]
  50. Gabriel Castillo, Gerardo Sierra, John McNaught
    An improved algorithm for semantic clustering. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:304-309 [Conf]
  51. Martin Holub
    A new approach to conceptual document indexing: building a hierarchical system of concepts based on document clusters. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:310-315 [Conf]
  52. Marco Mesiti, Elisa Bertino, Giovanna Guerrini
    An abstraction-based approach to measuring the structural similarity between two unordered XML documents. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:316-321 [Conf]
  53. Tom Coffey, Reiner Dojen
    Analysis of a mobile communication security protocol. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:322-328 [Conf]
  54. Tom Coffey, Reiner Dojen, Tomas Flanagan
    On the automated implementation of modal logics used to verify security protocols. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:329-334 [Conf]
  55. T. Newe, Tom Coffey
    Security protocols for 2G and 3G wireless communications. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:335-340 [Conf]
  56. Nol Premasathian, Somying Thainimit
    Structure free highway toll collection using non-repudiated tickets. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:341-344 [Conf]
  57. Jae-Deok Lim, Joon-Suk Yu, Jeong-Nyeo Kim
    A study of the method of providing secure network channel among secure OSs. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:345-350 [Conf]
  58. Tom Coffey, Puneet Saidha, Peter Burrows
    Analysing the security of a non-repudiation communication protocol with mandatory proof of receipt. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:351-356 [Conf]
  59. Neville I. Williams
    E-business security issues for SMEs in a virtual hosting environment. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:357-364 [Conf]
  60. Gustavo A. Santana Torrellas, Luis A. Villa Vargas
    Modelling a flexible network security systems using multi-agents systems: security assessment considerations. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:365-371 [Conf]
  61. Lyudmila Mihaylova, René Boel
    Hybrid stochastic framework for freeway traffic flow modelling. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:372-377 [Conf]
  62. Theodore S. Stamoulakatos, Efstathios D. Sykas
    Signal pattern recognition, hidden markov modeling and traffic flow modeling filters applied in existing signaling of cellular networks for vehicle volume estimation. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:378-384 [Conf]
  63. Pauline Sourdille, Aidan O'Dwyer
    A new modified Smith predictor design. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:385-390 [Conf]
  64. Brita H. Hafskjold
    Anti-run-dry algorithm for optimal control of playoutbuffers. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:391-398 [Conf]
  65. Claudia Roda, Julie Thomas
    Digital interaction: introduction to the first international workshop. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:399-402 [Conf]
  66. Jacqueline Brodie, James Evans, Laurence Brooks, Mark Perry
    Supporting human interaction through digital technology: theory and practice. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:403-408 [Conf]
  67. Eva Jacobus, Brian R. Duffy
    The language of machines. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:409-414 [Conf]
  68. Geert de Haan
    The design of I-mass as a tool for interacting with cultural heritage. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:415-420 [Conf]
  69. Päivö Laine, Lic. Phil
    Explicitness and interactivity. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:421-426 [Conf]
  70. Duska Rosenberg, Simon Foley, Stavros Kammas, Mirja Lievonen
    Interaction space theory: a framework for tool development. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:427-432 [Conf]
  71. Bryan Duggan, Mark Deegan
    Considerations in the usage of text to speech (TTS) in the creation of natural sounding voice enabled web systems. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:433-438 [Conf]
  72. G. Somers, R. N. Whyte
    Hand posture matching for Irish Sign language interpretation. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:439-444 [Conf]
  73. Derek Brock, James A. Ballas, Brian McClimens
    Perceptual issues for the use of 3D auditory displays in operational environments. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:445-448 [Conf]
  74. Daniel C. M. May, Bent Bruun Kristensen, Palle Nowack
    Supporting complexity through (informational and physical) collaboration and modeling. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:449-455 [Conf]
  75. Kumpon Farpinyo, Twittie Senivongse
    Designing and creating relational schemas with a CWM-based tool. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:456-461 [Conf]
  76. Josef Pavlicek, Vojtech Merunka, Petra Nevrivova
    The development of the information systems. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:462-467 [Conf]
  77. Anthony Sartini, John Waldron
    Dynamic profiling & comparison of Sun Microsystems' JDK1.3.1 versus the Kaffe VM APIs. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:468-474 [Conf]
  78. Marko Niinimäki, Miika Tuisku, Matti Heikkurinen
    Designing for flexibility: separating user interface design from program logic and data. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:475-480 [Conf]
  79. Chen Li, Claus Pahl
    Security in the Web Services Framework. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:481-486 [Conf]
  80. Marian Ventuneac, Tom Coffey, Ioan Salomie
    A policy-based security framework for Web-enabled applications. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:487-492 [Conf]
  81. M. A. Ngadi, Bernard S. Doherty
    Multi-users shared whiteboard under Web-multicast system. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:493-498 [Conf]
  82. Ralf Gitzel, Markus Aleksy
    MIEA 2003 workshop: message from the editors. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:499- [Conf]
  83. Gilson Wilson, Ullas O. Tharakan
    Unified security framework. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:500-505 [Conf]
  84. Paul Grace, Gordon S. Blair, Sam Samuel
    A marriage of Web services and reflective middleware to solve the problem of mobile client interoperability. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:506-511 [Conf]
  85. Markus Aleksy, Ralf Gitzel
    Relationship between the standard compliance of IDL-compilers and interoperability of CORBA-based applications. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:512-517 [Conf]
  86. Stefan Kuhlins, Axel Korthaus
    A multithreaded Java framework for information extraction in the context of enterprise application integration. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:518-523 [Conf]
  87. Cledson Akio Sakurai, Moacyr Martucci Junior
    An open system architecture for operation support system at telecommunications service providers. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:524-529 [Conf]
  88. Susumu Yamasaki, Mariko Sasakura
    An automated reasoning for diagnostic knowledge in a distributed environment. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:530-535 [Conf]
  89. George Dimitoglou, Philippe Moore, Shmuel Rotenstreich
    Middleware for large distributed systems and organizations. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:536-542 [Conf]
  90. Marko Niinimäki, Vesa Sivunen
    Applying grid security and virtual organization tools in distributed publication databases. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:543-548 [Conf]
  91. Pavel Motuzenko
    Adaptive domain model: dealing with multiple attributes of self-managing distributed object systems. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:549-554 [Conf]
  92. K. H. Tan, Mashkuri Yaacob, T. C. Ling, K. K. Phang
    IPv6 single-path and multi-path anycast routing protocols performance analysis. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:555-560 [Conf]
  93. Pornpong Rompothong, Twittie Senivongse
    A query federation of UDDI registries. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:561-566 [Conf]
  94. Meredith Lulling, John Vaughan
    An investigation of TCP throughput variation for SIP traffic. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:567-572 [Conf]
  95. Istvan Matyasovszki, Colin Flanagan
    Forwarding treatment preservation of differentiated services behaviour aggregate flows across heterogenous network domains by employing the symbiotic packet processing architecture. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:573-578 [Conf]
  96. Miguel A. Sánchez-Puebla, Jesús Carretero
    A new approach for distributed computing in avionics systems. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:579-584 [Conf]
  97. J. Nazean, Jason Chan
    Software algorithms in intelligent employment agent. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:585-589 [Conf]
  98. Siti Hafizah Ab Hamid, Tan Yoke Pei, Nazean Jomhari
    Object oriented analysis and UML design in the development of accommodation services system. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:590-595 [Conf]

  99. HISC architecture: an object-oriented computing system. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:596- [Conf]
  100. Mok Pak Lun, Anthony Fong, Gary K. W. Hau
    Object-oriented processor requirements with instruction analysis of Java programs. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:597-602 [Conf]
  101. K. M. Lo, P. L. Mok, W. S. Yu, Anthony S. Fong
    Hardware support for user-access control on an object-oriented processor. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:603-608 [Conf]
  102. Ryan W. S. Yu, Gary K. W. Hau, Anthony S. Fong
    Test bench for software development of object-oriented processor. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:609-614 [Conf]
  103. Gary K. W. Hau, Anthony Fong, Mok Pak Lun
    Support of Java API for the jHISC system. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:615-620 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002