Conferences in DBLP
(isict) 2003 (conf/isict/2003)
Jinkeun Hong , Sunchun Park , Janghong Yoon , Jae-Young Koh , Daeho Kim Design of random noise generator using SW algorithm. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:9-14 [Conf ] Neil Dunstan , Stephen Hodgson A processor array for computing wavelet energies. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:15-20 [Conf ] Abdellah Kacha , Francis Grenez , P. De Doncker , Khier Benmahammed A wavelet-based approach for frequency estimation of interference signals in printed circuit boards. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:21-26 [Conf ] John Fulcher The use of smart devices in eHealth. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:27-32 [Conf ] P. Gómez , V. Nieto , R. Martínez , A. Alvarez , F. Rodríguez , V. Rodellar Detection of the mucosal wave in the speech signal for larynx pathology characterization. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:33-39 [Conf ] John Fulcher , Russell Gluck , Marion Worthy , Kim Draisma , Wilma Vialle A neural network, speech-based approach to literacy. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:40-45 [Conf ] Blaise W. Liffick Assistive technology in computer science. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:46-51 [Conf ] Cestmir Stuka , Daniel Smutek Correlation of the entrance examination result and the study success at the Medical Faculty, Charles University Prague. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:52-57 [Conf ] Martina Berankova , Petra Nevrivova Problems in operational and systems analysis educational process: solved by ICT application. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:58-63 [Conf ] Ganka Petkova Kovacheva , Hidemitsu Ogawa Radial basis function classifier for fault diagnostics. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:64-69 [Conf ] David Edelman Adapting support vector machine methods for horserace odds prediction. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:70-75 [Conf ] Giuseppe Ascia , Vincenzo Catania , Maurizio Palesi , Antonio Parlato An evolutionary approach for reducing the energy in address buses. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:76-81 [Conf ] Josef Scharinger Detecting watermarks at arbitrary image resolution. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:82-87 [Conf ] Othman Khalifa Image data compression in wavelet transform domain using modified LBG algorithm. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:88-93 [Conf ] Sang-Su Lee , Jong-Wook Han , Hyo-wook Bae The encryption method to share a secret binary image and its decryption system. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:94-99 [Conf ] Daniel Smutek , Radim Sára , Petr Sucharda , Ludvík Tesar Different types of image texture features in ultrasound of patients with lymphocytic thyroiditis. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:100-102 [Conf ] Markus Hofmann , Brendan Tierney The involvement of human resources in large scale data mining projects. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:103-109 [Conf ] Abdualrraouf A. Elbibas , M. J. Ridley Using metadata for developing automated Web system interface. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:113-118 [Conf ] B. John Oommen , Jing Chen A new histogram method for sparse attributes: the averaged rectangular attribute cardinality map. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:119-125 [Conf ] Vahid Tabataba Vakili , Arash Aziminejad , Mohammad Reza Dehbozorgi A novel speed-sensitive bidirectional overflow and hand-down resource allocation strategy for hierarchical cellular networks. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:126-131 [Conf ] Sakari Junnila , Jarkko Niittylahti Wireless technologies for data acquisition systems. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:132-137 [Conf ] Yun Gong , Tadas Marcinkevicius Video transmission over a GSM wireless network. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:138-143 [Conf ] Xuerong Yong Analyzing the codes that avoid specified differences by binary tree. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:144-149 [Conf ] Klaus Knoche , Jäurgen Rinas , Karl-Dirk Kammeyer MAI-suppression with fractional T-equalizer for CDMA. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:150-155 [Conf ] David Lewis , Declan O'Sullivan Adaptive systems for ubiquitous computing. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:156- [Conf ] Robert O'Connor , Sven van der Meer Present and future organisational models for wireless networks. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:157-162 [Conf ] Simon Dobson Applications considered harmful for ambient systems. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:163-168 [Conf ] Steffen Higel , Tony O'Donnell , Vincent Wade Towards a natural interface to adaptive service composition. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:169-174 [Conf ] Stephen Greene , Jason Finnegan Usability of mobile devices and intelligently adapting to a user's needs. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:175-180 [Conf ] Ken Murray , Rajiv Mathur , Dirk Pesch Intelligent access and mobility management in heterogeneous wireless networks using policy. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:181-186 [Conf ] John Paul O'Grady , Susan Rea , Sinead Cummins , Dirk Pesch , Rajiv Mathur Dynamic configuration management for MANETs: an overview. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:187-192 [Conf ] Paddy Nixon , Feng Wang , Sotirios Terzis Programming structures for adaptive ambient systems. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:193-198 [Conf ] Ruaidhri Power Topic maps for context management. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:199-204 [Conf ] Owen Conlan , Ruaidhri Power , Steffen Higel , Declan O'Sullivan , Keara Barrett Next generation context aware adaptive services. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:205-212 [Conf ] Sven Buchholz , Thomas Buchholz Adaptive content networking. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:213-219 [Conf ] Hannah Slay , Bruce H. Thomas , Rudi Vernik An interaction model for universal interaction and control in multi display environments. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:220-225 [Conf ] Bruce H. Thomas , Wayne Piekarski Outdoor virtual reality. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:226-231 [Conf ] James Auger , Jimmy Loizeau , Stefan Agamanolis Iso-phone: a total submersion telephonic experience. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:232-236 [Conf ] J. Shi , I. A. Oraifige , F. R. Hall Adding haptic feedback to engineering simulation. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:237-241 [Conf ] Francis Rousseaux , Alain Bonardi New tools and practices for electronic music distribution. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:242-248 [Conf ] Nobutaka Suzuki , Yorichiro Sato , Michiyoshi Hayase On merging structured documents with move operation. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:249-254 [Conf ] Henryk Krawczyk , Bogdan Wiszniewski Digital document life cycle development. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:255-260 [Conf ] Arnold Neville Pears , Carl Erickson Enriching online learning resources with "explanograms". [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:261-266 [Conf ] Ruey-Shun Chen , Shien-Chiang Yu Developing an XML framework for metadata system. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:267-272 [Conf ] Davide Buscaldi , Giovanna Guerrini , Marco Mesiti , Paolo Rosso Tag semantics for the retrieval of XML documents. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:273-278 [Conf ] Daniel Jiménez , Edgardo Ferretti , Vicente Vidal , Paolo Rosso , Carlos F. Enguix The influence of semantics in IR using LSI and K-means clustering techniques. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:279-284 [Conf ] Antonio Ferrández Rodríguez , Julio Martínez , Jesús Peral An entity-relation approach to information retrieval. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:285-290 [Conf ] Cormac O'Brien , Carl Vogel Spam filters: bayes vs. chi-squared; letters vs. words. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:291-296 [Conf ] Sofie Van Gijsel , Carl Vogel Inducing a cline from corpora of political manifestos. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:297-303 [Conf ] Gabriel Castillo , Gerardo Sierra , John McNaught An improved algorithm for semantic clustering. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:304-309 [Conf ] Martin Holub A new approach to conceptual document indexing: building a hierarchical system of concepts based on document clusters. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:310-315 [Conf ] Marco Mesiti , Elisa Bertino , Giovanna Guerrini An abstraction-based approach to measuring the structural similarity between two unordered XML documents. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:316-321 [Conf ] Tom Coffey , Reiner Dojen Analysis of a mobile communication security protocol. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:322-328 [Conf ] Tom Coffey , Reiner Dojen , Tomas Flanagan On the automated implementation of modal logics used to verify security protocols. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:329-334 [Conf ] T. Newe , Tom Coffey Security protocols for 2G and 3G wireless communications. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:335-340 [Conf ] Nol Premasathian , Somying Thainimit Structure free highway toll collection using non-repudiated tickets. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:341-344 [Conf ] Jae-Deok Lim , Joon-Suk Yu , Jeong-Nyeo Kim A study of the method of providing secure network channel among secure OSs. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:345-350 [Conf ] Tom Coffey , Puneet Saidha , Peter Burrows Analysing the security of a non-repudiation communication protocol with mandatory proof of receipt. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:351-356 [Conf ] Neville I. Williams E-business security issues for SMEs in a virtual hosting environment. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:357-364 [Conf ] Gustavo A. Santana Torrellas , Luis A. Villa Vargas Modelling a flexible network security systems using multi-agents systems: security assessment considerations. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:365-371 [Conf ] Lyudmila Mihaylova , René Boel Hybrid stochastic framework for freeway traffic flow modelling. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:372-377 [Conf ] Theodore S. Stamoulakatos , Efstathios D. Sykas Signal pattern recognition, hidden markov modeling and traffic flow modeling filters applied in existing signaling of cellular networks for vehicle volume estimation. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:378-384 [Conf ] Pauline Sourdille , Aidan O'Dwyer A new modified Smith predictor design. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:385-390 [Conf ] Brita H. Hafskjold Anti-run-dry algorithm for optimal control of playoutbuffers. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:391-398 [Conf ] Claudia Roda , Julie Thomas Digital interaction: introduction to the first international workshop. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:399-402 [Conf ] Jacqueline Brodie , James Evans , Laurence Brooks , Mark Perry Supporting human interaction through digital technology: theory and practice. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:403-408 [Conf ] Eva Jacobus , Brian R. Duffy The language of machines. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:409-414 [Conf ] Geert de Haan The design of I-mass as a tool for interacting with cultural heritage. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:415-420 [Conf ] Päivö Laine , Lic. Phil Explicitness and interactivity. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:421-426 [Conf ] Duska Rosenberg , Simon Foley , Stavros Kammas , Mirja Lievonen Interaction space theory: a framework for tool development. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:427-432 [Conf ] Bryan Duggan , Mark Deegan Considerations in the usage of text to speech (TTS) in the creation of natural sounding voice enabled web systems. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:433-438 [Conf ] G. Somers , R. N. Whyte Hand posture matching for Irish Sign language interpretation. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:439-444 [Conf ] Derek Brock , James A. Ballas , Brian McClimens Perceptual issues for the use of 3D auditory displays in operational environments. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:445-448 [Conf ] Daniel C. M. May , Bent Bruun Kristensen , Palle Nowack Supporting complexity through (informational and physical) collaboration and modeling. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:449-455 [Conf ] Kumpon Farpinyo , Twittie Senivongse Designing and creating relational schemas with a CWM-based tool. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:456-461 [Conf ] Josef Pavlicek , Vojtech Merunka , Petra Nevrivova The development of the information systems. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:462-467 [Conf ] Anthony Sartini , John Waldron Dynamic profiling & comparison of Sun Microsystems' JDK1.3.1 versus the Kaffe VM APIs. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:468-474 [Conf ] Marko Niinimäki , Miika Tuisku , Matti Heikkurinen Designing for flexibility: separating user interface design from program logic and data. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:475-480 [Conf ] Chen Li , Claus Pahl Security in the Web Services Framework. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:481-486 [Conf ] Marian Ventuneac , Tom Coffey , Ioan Salomie A policy-based security framework for Web-enabled applications. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:487-492 [Conf ] M. A. Ngadi , Bernard S. Doherty Multi-users shared whiteboard under Web-multicast system. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:493-498 [Conf ] Ralf Gitzel , Markus Aleksy MIEA 2003 workshop: message from the editors. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:499- [Conf ] Gilson Wilson , Ullas O. Tharakan Unified security framework. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:500-505 [Conf ] Paul Grace , Gordon S. Blair , Sam Samuel A marriage of Web services and reflective middleware to solve the problem of mobile client interoperability. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:506-511 [Conf ] Markus Aleksy , Ralf Gitzel Relationship between the standard compliance of IDL-compilers and interoperability of CORBA-based applications. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:512-517 [Conf ] Stefan Kuhlins , Axel Korthaus A multithreaded Java framework for information extraction in the context of enterprise application integration. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:518-523 [Conf ] Cledson Akio Sakurai , Moacyr Martucci Junior An open system architecture for operation support system at telecommunications service providers. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:524-529 [Conf ] Susumu Yamasaki , Mariko Sasakura An automated reasoning for diagnostic knowledge in a distributed environment. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:530-535 [Conf ] George Dimitoglou , Philippe Moore , Shmuel Rotenstreich Middleware for large distributed systems and organizations. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:536-542 [Conf ] Marko Niinimäki , Vesa Sivunen Applying grid security and virtual organization tools in distributed publication databases. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:543-548 [Conf ] Pavel Motuzenko Adaptive domain model: dealing with multiple attributes of self-managing distributed object systems. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:549-554 [Conf ] K. H. Tan , Mashkuri Yaacob , T. C. Ling , K. K. Phang IPv6 single-path and multi-path anycast routing protocols performance analysis. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:555-560 [Conf ] Pornpong Rompothong , Twittie Senivongse A query federation of UDDI registries. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:561-566 [Conf ] Meredith Lulling , John Vaughan An investigation of TCP throughput variation for SIP traffic. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:567-572 [Conf ] Istvan Matyasovszki , Colin Flanagan Forwarding treatment preservation of differentiated services behaviour aggregate flows across heterogenous network domains by employing the symbiotic packet processing architecture. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:573-578 [Conf ] Miguel A. Sánchez-Puebla , Jesús Carretero A new approach for distributed computing in avionics systems. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:579-584 [Conf ] J. Nazean , Jason Chan Software algorithms in intelligent employment agent. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:585-589 [Conf ] Siti Hafizah Ab Hamid , Tan Yoke Pei , Nazean Jomhari Object oriented analysis and UML design in the development of accommodation services system. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:590-595 [Conf ] HISC architecture: an object-oriented computing system. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:596- [Conf ] Mok Pak Lun , Anthony Fong , Gary K. W. Hau Object-oriented processor requirements with instruction analysis of Java programs. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:597-602 [Conf ] K. M. Lo , P. L. Mok , W. S. Yu , Anthony S. Fong Hardware support for user-access control on an object-oriented processor. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:603-608 [Conf ] Ryan W. S. Yu , Gary K. W. Hau , Anthony S. Fong Test bench for software development of object-oriented processor. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:609-614 [Conf ] Gary K. W. Hau , Anthony Fong , Mok Pak Lun Support of Java API for the jHISC system. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:615-620 [Conf ]