The SCEAS System
Navigation Menu

Conferences in DBLP

International Symposium on Information Technology (itcc)
2005 (conf/itcc/2005-2)

  1. Mayumi Kato, Chia-Tien Dan Lo
    Impact of Java Compressed Heap on Mobile/Wireless Communication. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:2-7 [Conf]
  2. Naoto Kimura, Shahram Latifi
    A Survey on Data Compression in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:8-13 [Conf]
  3. Mansoor Alam, Praveen Bethoju, Min Song
    Study of Traffic Engineering Capabilities of MPLS Networks. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:14-15 [Conf]
  4. Osama Dandash, Xianping Wu, Phu Dung Le
    Wireless Internet Payment System Using Smart Cards. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:16-21 [Conf]
  5. Henry Selvaraj, Pawel Tomaszewicz, Mariusz Rawski, Tadeusz Luba
    Efficient Application of Modern Logic Synthesis in FPGA-Based Designing of Information and Signal Processing Systems. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:22-27 [Conf]
  6. Matthew Nickerson
    History Calls: Delivering Automated Audio Tours to Visitors' Cell Phones. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:30-34 [Conf]
  7. Robert Steele, Khaled Khankan, Tharam S. Dillon
    Mobile Web Services Discovery and Invocation Through Auto-Generation of Abstract Multimodal Interface. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:35-41 [Conf]
  8. Robert Steele, Tharam S. Dillon, Parth Pandya, Yuri Ventsov
    XML-Based Mobile Agents. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:42-48 [Conf]
  9. Salima Hacini
    Using Dynamic Adaptability to Protect Mobile Agents Code. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:49-52 [Conf]
  10. Sojen Pradhan, Elaine Lawrence, Agnieszka Zmijewska
    Bluetooth as an Enabling Technology in Mobile Transactions. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:53-58 [Conf]
  11. Stanislav Kurkovsky
    Using Principles of Pervasive Computing to Design M-Commerce Applications. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:59-64 [Conf]
  12. Jeffrey Huang, Amit Jain, Shiaofen Fang, Edward P. Riley
    Using Facial Images to Diagnose Fetal Alcohol Syndrome (FAS). [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:66-71 [Conf]
  13. Ashfaqur Rahman, M. Manzur Murshed
    A Robust Optical Flow Estimation Algorithm for Temporal Textures. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:72-76 [Conf]
  14. Daniel Monegatto Santoro, Maria do Carmo Nicoletti
    Investigating a Wrapper Approach for Selecting Features Using Constructive Neural Networks. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:77-82 [Conf]
  15. Ernesto Gomez, Yasha Karant, Veysi Malkoc, Mahesh R. Neupane, Keith E. Schubert, Reinhard W. Schulte
    Orthogonal and Least-Squares Based Coordinate Transforms for Optical Alignment Verification in Radiosurgery. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:83-88 [Conf]
  16. François-Xavier Standaert, Frédéric Lefèbvre, Gaël Rouvroy, Benoit M. Macq, Jean-Jacques Quisquater, Jean-Didier Legat
    Practical Evaluation of a Radial Soft Hash Algorithm. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:89-94 [Conf]
  17. Ferdous Ahmed Sohel, Gour C. Karmakar, Laurence Dooley
    A Generic Shape Descriptor using Bezier Curves. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:95-100 [Conf]
  18. John See, Madasu Hanmandlu, Shantaram Vasikarla
    Fuzzy-based Parameterized Gaussian Edge Detector Using Global and Local Properties. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:101-106 [Conf]
  19. Khaled Hussain, Ghada S. Moussa
    Automatic Vehicle Classification System using Range Sensor. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:107-112 [Conf]
  20. Yongliang Liu, Xiaolin Yang, Hongxun Yao, Tiejun Huang, Wen Gao
    Watermark Detection Schemes with High Security. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:113-117 [Conf]
  21. Mohammed Ameer Ali, Laurence S. Dooley, Gour C. Karmakar
    Fuzzy Image Segmentation Combing Ring and Elliptic Shaped Clustering Algorithms. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:118-122 [Conf]
  22. M. Emre Celebi, Y. Alp Aslandogan, Paul R. Bergstresser
    Unsupervised Border Detection of Skin Lesion Images. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:123-128 [Conf]
  23. Mang Chen, Yuncai Liu
    Recognition and Extraction High Precision Digital Road Map. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:129-134 [Conf]
  24. Mohammad Eyadat, Imad Muhi
    Compression Standards Roles in Image Processing: Case Study. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:135-140 [Conf]
  25. N. Soontranon, Supavadee Aramvith, Thanarat H. Chalidabhongse
    Improved Face and Hand Tracking for Sign Language Recognition. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:141-146 [Conf]
  26. Shilpa Agarwal, Shweta Madasu, Madasu Hanmandlu, Shantaram Vasikarla
    A Comparison of some Clustering Techniques via Color Segmentation. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:147-153 [Conf]
  27. Zhiguo Cheng, Yuncai Liu
    Removal of Interferential Curve from Text Image. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:154-159 [Conf]
  28. Brent Doeksen, Ajith Abraham, Johnson P. Thomas, Marcin Paprzycki
    Real Stock Trading Using Soft Computing Models. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:162-167 [Conf]
  29. Carlo Mastroianni, Domenico Talia, Oreste Verta
    A P2P Approach for Membership Management and Resource Discovery in Grids. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:168-174 [Conf]
  30. Li Chunlin, Li Layuan
    Pricing and Resource Allocation in Computational Grid with Utility Functions. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:175-180 [Conf]
  31. Dan Song, Wudong Liu, Yangfan He, Keqing He
    Ontology Application in Software Component Registry to Achieve Semantic Interoperability. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:181-186 [Conf]
  32. Diego Puppin, Fabrizio Silvestri, Domenico Laforenza
    Component Metadata Management and Publication for the Grid. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:187-192 [Conf]
  33. Christos Makris, Evangelos Sakkopoulos, Spyros Sioutas, University of Patras, Greece Peter Triantafillou, Athanasios K. Tsakalidis, Bill Vassiliadis
    NIPPERS: Network of InterPolated PeERS for Web Service Discovery. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:193-198 [Conf]
  34. Giovanni Aloisio, Massimo Cafaro, Sandro Fiore, Maria Mirto
    The Grid-DBMS: Towards Dynamic Data Management in Grid Environments. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:199-204 [Conf]
  35. Ragib Hasan, Zahid Anwar, William Yurcik, Larry Brumbaugh, Roy H. Campbell
    A Survey of Peer-to-Peer Storage Techniques for Distributed File Systems. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:205-213 [Conf]
  36. Shaohua Zhang, Yuwei Zong, Zhigang Ding, Jiamao Liu
    Workflow-Oriented Grid Service Composition and Scheduling. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:214-219 [Conf]
  37. Yun Huang, Shivajit Mohapatra, Nalini Venkatasubramanian
    An Energy-Efficient Middleware for Supporting Multimedia Services in Mobile Grid Environments. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:220-225 [Conf]
  38. Adam Harder, Lanlan Song, Yu Wang
    Towards an Indoor Location System Using RF Signal Strength in IEEE 802.11 Networks. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:228-233 [Conf]
  39. Girma Berhe, Lionel Brunie, Jean-Marc Pierson
    Distributed Content Adaptation for Pervasive Systems. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:234-241 [Conf]
  40. Heng Seng Cheng, Daqing Zhang, Joo Geok Tan
    Protection of Privacy in Pervasive Computing Environments. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:242-247 [Conf]
  41. Kay Connelly, Yong Liu, Dan Bulwinkle, Adam Miller, Ian Bobbitt
    A Toolkit for Automatically Constructing Outdoor Radio Maps. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:248-253 [Conf]
  42. Lei Zhu, Lei He, Alex Collier
    MAPIS: A Mobile Amphibian Population Information System. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:254-259 [Conf]
  43. M. Ziaur Rahman, Gour C. Karmakar, Laurence S. Dooley
    Passive Source Localization using Power Spectral Analysis and Decision Fusion in Wireless Distributed Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:260-264 [Conf]
  44. Mohammad Mahfuzul Islam, M. Manzur Murshed
    Min-Max Fairness Scheme for Resource Allocation in Cellular Multimedia Networks. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:265-270 [Conf]
  45. Moushumi Sharmin, Shameem Ahmed, Sheikh Iqbal Ahamed
    SAFE-RD (Secure, Adaptive, Fault Tolerant, and Efficient Resource Discovery) inPervasive Computing Environments. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:271-276 [Conf]
  46. Pradeep Kannadiga, Mohammad Zulkernine, Sheikh Iqbal Ahamed
    Towards an Intrusion Detection System for Pervasive Computing Environments. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:277-282 [Conf]
  47. Salahuddin A. Azad, M. Manzur Murshed
    Seamless Channel Transition for Popular Video Broadcasting. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:283-288 [Conf]
  48. Umesh Bellur, Nanjangud C. Narendra
    Towards Service Orientation in Pervasive Computing Systems. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:289-295 [Conf]
  49. Atsuto Kubo, Hironori Washizaki, Atsuhiro Takasu, Yoshiaki Fukazawa
    Analyzing Relations among Software Patterns based on Document Similarity. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:298-303 [Conf]
  50. Bhuwan Lodha, K. V. Dinesha, Pavan Kumar
    Need for Incorporating a RuleBased Conventional Object Oriented Systems. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:304-309 [Conf]
  51. Chia-Chu Chiang
    An Adapter to Promote Reusability of CORBA Components in COBOL. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:310-315 [Conf]
  52. Chia-Chu Chiang
    An Introduction to TUG: A Language for Writing Reusable Formal Program Specifications. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:316-321 [Conf]
  53. Christian Lange, Michel R. V. Chaudron
    Combining Metrics Data and the Structure of UML Models using GIS Visualization Approaches. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:322-326 [Conf]
  54. Demissie B. Aredo, Olaf Owe
    Model-Based Verification in the Development of Dependable Systems. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:327-334 [Conf]
  55. Elhadi Shakshuki, Ivan Tomek, Omkarnath Prabhu
    Client Software Agents in FCVW. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:335-340 [Conf]
  56. Ganesha S. R. Shanmuganathan, Kang Zhang, W. Eric Wong, Yu Qi
    Analyzing Message-Passing Programs through Visual Slicing. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:341-346 [Conf]
  57. Gregory A. Hall
    Using Unfamiliar Platforms in Software Engineering Projects. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:347-352 [Conf]
  58. Chengwan He, Keqing He, Fei He, Feng Yao, Jin Liu
    Using RoleOf Relationship in Design Pattern Instantiation. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:353-358 [Conf]
  59. Hironori Washizaki, Yoshiaki Fukazawa
    A Model-View Separation Architecture for GUI Application Components. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:359-364 [Conf]
  60. Igor Ivkovic, Kostas Kontogiannis
    Using Formal Concept Analysis to Establish Model Dependencies. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:365-372 [Conf]
  61. Jin Liu, Keqing He, Bing Li, Chengwan He, Liang Peng
    A Transformation Definition Metamodel for Model Transformation. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:373-378 [Conf]
  62. Jing Dong, Shanguo Chen, Jun-Jang Jeng
    Event-Based Blackboard Architecture for Multi-Agent Systems. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:379-384 [Conf]
  63. Jing Dong, Sheng Yang, Kang Zhang
    VisDP: A Web Service for Visualizing Design Patterns on Demand. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:385-391 [Conf]
  64. José Luis Sierra, Baltasar Fernández-Manjón, Alfredo Fernández-Valmayor, Antonio Navarro
    Document-Oriented Software Construction based on Domain-Specific Markup Languages. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:392-397 [Conf]
  65. Joshua J. Pauli, Dianxiang Xu
    Misuse Case-Based Design and Analysis of Secure Software Architecture. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:398-403 [Conf]
  66. John Michura, Miriam A. M. Capretz
    Metrics Suite for Class Complexity. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:404-409 [Conf]
  67. Mir Ali Seyyedi, Mohammad Teshnehlab, Fereidoon Shams
    Measuring Software Processes Performance based on the Fuzzy Multi Agent Measurements. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:410-415 [Conf]
  68. Mustafa H. Qureshi, Mansur H. Samadzadeh
    Determining the Complexity of XML Documents. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:416-421 [Conf]
  69. Nour Ali, Isidro Ramos, José A. Carsí
    A Conceptual Model for Distributed Aspect-Oriented Software Architectures. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:422-427 [Conf]
  70. Robert L. Baber, David Lorge Parnas, Sergiy A. Vilkomir, Paul Harrison, Tony O'Connor
    Disciplined Methods of Software Specification: A Case Study. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:428-437 [Conf]
  71. Han Shengju, Wang Ning, Yu Miao
    Research on Role-Network Model for E-Government Affairs. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:438-442 [Conf]
  72. Shifeng Zhang, Steve Goddard
    xSADL: An Architecture Description Language to Specify Component-Based Systems. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:443-448 [Conf]
  73. Siros Supavita, Taratip Suwannasart
    Testing Polymorphic Interactions in UML Sequence Diagrams. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:449-454 [Conf]
  74. Tien Nhut Nguyen, Ethan V. Munson, John Tang Boyland, Cheng Thao
    Structure-oriented Product Versioning. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:456-461 [Conf]
  75. Vincent Chang
    Design of Middleware Platform to Enhance Abilities of Application Systems Integration. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:461-466 [Conf]
  76. W. C. Wong, Eric Moy, Mohammad Eyadat
    A Software Development Support Portal (SDSP) Based on a Peer-to-Peer Platform - A Case Study. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:467-472 [Conf]
  77. Winai Wichaipanitch, Mansur H. Samadzadeh, Songsri Tangsripairoj
    Development and Evaluation of a Slicing-Based C++ Debugger. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:473-478 [Conf]
  78. Ying Qiao, Valdis Berzins, Luqi
    FCD: A Framework for Compositional Development in Open Embedded Systems. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:479-484 [Conf]
  79. Amanda Spink, Sherry Koshman, Minsoo Park, Chris Field, Bernard J. Jansen
    Multitasking Web Search on Vivisimo.com. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:486-490 [Conf]
  80. Isak Taksa
    Predicting the Cumulative Effect of Multiple Query Formulations. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:491-496 [Conf]
  81. João Ferreira, Alberto Rodrigues da Silva, José Delgado
    Web Services for Information Retrieval. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:497-502 [Conf]
  82. Milad Shokouhi, Pirooz Chubak, Zaynab Raeesy
    Enhancing Focused Crawling with Genetic Algorithms. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:503-508 [Conf]
  83. Rami N. Hasan, Mansur H. Samadzadeh
    A Study of Tunnel Vision and Rotation as Aspects of Web Site Visibility. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:509-514 [Conf]
  84. Ullas Gargi
    Information Navigation Profiles for Mediation and Adaptation. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:515-520 [Conf]
  85. Xiannong Meng, Ty Clark
    An Empirical User Rating of Popular Search Engines Using RankPower. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:521-525 [Conf]
  86. Fei Hu, Xiaojun Cao
    Security in Wireless Actor & Sensor Networks (WASN): Towards A Hierarchical Re-Keying Design. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:528-533 [Conf]
  87. Andrea Kulakov, Danco Davcev
    Tracking of Unusual Events in Wireless Sensor Networks Based on Artificial Neural-Networks Algorithms. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:534-539 [Conf]
  88. Brian Lehane, Linda Doyle, Donal O'Mahony
    Ad Hoc Key Management Infrastructure. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:540-545 [Conf]
  89. Bin Lu, Udo W. Pooch
    A Lightweight Authentication Protocol for Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:546-551 [Conf]
  90. Chen Zhuo, Hong Fan, Hong Liang
    A New Authentication and Key Exchange Protocol in WLAN. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:552-556 [Conf]
  91. Fei Hu, Xiaojun Cao, Carter May
    Optimized Scheduling for Data Aggregation in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:557-561 [Conf]
  92. Tarun Banka, Gagan Tandon, Anura P. Jayasumana
    Zonal Rumor Routing for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:562-567 [Conf]
  93. George C. Hadjichristofi, William Joseph Adams, Nathaniel J. Davis IV
    A Framework for Key Management in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:568-573 [Conf]
  94. Haoming Guo, Mei Yang, Xiaolong Wu, Yingtao Jiang, Shilong Ma, Guoshun Hao
    Autonomous and Dynamic Web Service Composition in Wireless Grids. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:574-579 [Conf]
  95. Laura Huei-jiun Ju, Izhak Rubin
    Performance Analysis of Mobile Backbone Topology Synthesis Algorithm for Wireless Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:580-585 [Conf]
  96. Jian Chen, Yong Guan, Udo W. Pooch
    Customizing a Geographical Routing Protocol for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:586-591 [Conf]
  97. Jin H. Zhao, Xiao Z. Yang, Hong W. Liu
    Load-balancing Strategy of Multi-gateway for Ad hoc Internet Connectivity. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:592-596 [Conf]
  98. John V. Harrison
    Enhancing Network Security By Preventing User-Initiated Malware Execution. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:597-602 [Conf]
  99. Jun Zheng, Emma Regentova
    An Improved Polling Scheme for Voice Support in IEEE 802.11 Wireless Network. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:603-608 [Conf]
  100. Li Layuan, Li Chunlin
    A QoS Multicast Routing Protocol for Mobile Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:609-614 [Conf]
  101. Xin Li, Zhenzhou Ji, Ming-Zeng Hu
    Stateful Inspection Firewall Session Table Processing. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:615-620 [Conf]
  102. Miao Ma
    Mitigating Denial of Service Attacks with Password Puzzles. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:621-626 [Conf]
  103. Michael R. Gosnell, Ryan Albarelli, Maggie Xiaoyan Cheng, Bruce M. McMillin
    Energy Balanced Broadcasting Through Delayed Intelligence. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:627-632 [Conf]
  104. Min Song, Scott Wigginton
    Frequency Hopping Pattern Detection in Wireless Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:633-638 [Conf]
  105. Muhammad Mahmudul Islam, Ronald Pose, Carlo Kopp
    MAC Layer Support for Real-Time Traffic in a SAHN. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:639-645 [Conf]
  106. Osama M. F. Abu-Sharkh, Ahmed H. Tewfik
    A TDMA Based Scheduling Scheme in 802.11b WLANs with Access Point. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:646-650 [Conf]
  107. P. Muppala, Johnson P. Thomas, Ajith Abraham
    QoS-Based Authentication Scheme for Ad Hoc Wireless Networks. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:651-656 [Conf]
  108. Ping Yi, Zhoulin Dai, YiPing Zhong, Shiyong Zhang
    Resisting Flooding Attacks in Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:657-662 [Conf]
  109. Ranjeet Kumar Patro, Balamurugan Mohan
    Mobile Agent Based TDMA Slot Assignment Algorithm for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:663-667 [Conf]
  110. S. Veeravalli, Laxmi Gewali, Muthukumar Venkatesan
    Construction of Power-Aware Diameter-Reduced Broadcast Trees. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:668-674 [Conf]
  111. Sheng-Tzong Cheng, Ming-Hung Tao, Mingzoo Wu
    Media Access Mechanisms for Integrated Services in Wireless Networks. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:675-680 [Conf]
  112. Sheng-Tzong Cheng, Mingzoo Wu
    Performance Evaluation of Ad-Hoc WLAN by M/G/1 Queueing Model. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:681-686 [Conf]
  113. Spyridon Vassilaras, Dimitrios Vogiatzis, Gregory S. Yovanof
    Misbehavior Detection in Clustered Ad-hoc Networks with Central Control. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:687-692 [Conf]
  114. Stamatios V. Kartalopoulos
    Hierarchical Encryption in WDM Optical Network Links. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:693-697 [Conf]
  115. Tarek H. Ahmed
    Simulation of Mobility and Routing in Ad Hoc Networks using Ant Colony Algorithms. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:698-703 [Conf]
  116. Turgay Korkmaz
    Verifying Physical Presence of Neighbors against Replay-based Attacks in Wireless Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:704-709 [Conf]
  117. Unghee Lee, Scott F. Midkiff, Jahng S. Park
    A Proactive Routing Protocol for Multi-Channel Wireless Ad-hoc Networks (DSDV-MC). [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:710-715 [Conf]
  118. Yahya Al-Harthi, Ahmed H. Tewfik, Mohamed-Slim Alouini
    Opportunistic Scheduling with Quantized Feedback in Wireless Networks. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:716-722 [Conf]
  119. Yang Yu, Mei Yang, Yulu Yang, Yingtao Jiang
    A RDT-Based Interconnection Network for Scalable Network-on-Chip Designs. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:723-728 [Conf]
  120. Yingtao Jiang, Mei Yang, Xiaolong Wu, Min Zhang
    Substream Selection in Wireless MIMO Systems for Complexity Reduction. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:729-733 [Conf]
  121. Yuan Fan, Xiao Su
    In-Memory Storage and Search System for Event Management in Network Security. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:734-739 [Conf]
  122. Zhi-Yan Cao, Zhenzhou Ji, Ming-Zeng Hu
    An Image Sensor Node for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:739-745 [Conf]
  123. Andy Auyeung, Ulrich Melcher
    Evaluations of Protein Sequence Alignments using Structural Information. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:748-749 [Conf]
  124. Youping Deng, Venkatachalam Chokalingam, Chaoyang Zhang
    Markov Chain Correlation Based Clustering of Gene Expression Data. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:750-755 [Conf]
  125. Cheng-Hsiung Hsieh
    A Zonal JPEG. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:756-757 [Conf]
  126. Ying Chen, Shoubao Yang, Leitao Guo, Pengzhan Liu, Kai Shen
    Design and Implementation of Dynamic-Role Based Access Control Framework in Grid Environment. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:758-759 [Conf]
  127. Leena Al-Hussaini, Andrew L. Wendelborn, Paul D. Coddington
    A Unified Grid Query Service for Grid Resource Brokers. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:760-761 [Conf]
  128. Shrideep Pallickara, Geoffrey Fox
    An Analysis of Notification Related Specifications for Web/Grid Applications. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:762-763 [Conf]
  129. Zhijie Guan, Vijay Velusamy
    GridDeploy: A Toolkit for Deploying Applications as Grid Services. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:764-765 [Conf]
  130. Dalila Boughaci, Habiba Drias
    An Agent-Based Approach using the ebXML Specifications for E-business. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:766-767 [Conf]
  131. Jinoos Hosseini
    Strategic Technology Planning for the E-Commerce Enabled Enterprise. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:768-769 [Conf]
  132. Elharith Elrufaie, David A. Turner
    A Wiki Paradigm for use in IT courses. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:770-771 [Conf]
  133. Qingtang Liu, Zongkai Yang, Kun Yan, Jing Jin, Wanting Deng
    Research on DRM-Enabled Learning Objects Model. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:772-773 [Conf]
  134. C. Vallve-Guionnet
    Finding Colluders in Card Games. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:774-775 [Conf]
  135. Atsushi Waseda, Masakazu Soshi, Atsuko Miyaji
    n-State Quantum Coin Flipping Protocol. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:776-777 [Conf]
  136. Yang Sun, Soon Cheol Park
    Generation of Non-Redundant Summary Based on Sum of Similarity. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:782-783 [Conf]
  137. John Tsiligaridis, Raj Acharya
    A Tree Based Data Mining Prediction Scheme for Wireless Cellular Network. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:784-786 [Conf]
  138. Dipnarayan Guha, Qonita Muhammad Shahab, Jun Kyun Choi
    Abstract State Machine Based Next Generation IPv6 Network Processor. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:787-788 [Conf]
  139. Guoshun Hao, Shilong Ma, Haoming Guo, Xiaolong Wu, Mei Yang, Yingtao Jiang
    Analyze Grid from the Perspective of a Computing System. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:789-790 [Conf]
  140. Sanjay P. Ahuja, Raquel Clark
    Comparison of Web Services Technologies from a Developer's Perspective. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:791-792 [Conf]
  141. Yang Jin, Shoubao Yang, Maosheng Li, Qianfei Fu
    An Autonomous Pricing Strategy toward Market Economy in Computational Grids. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:793-794 [Conf]
  142. Ziga Turk, Matevz Dolenc, Vlado Stankovski, Etiel Petrinja
    Semantic Grid - Interoperability Solution for Construction VO? [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:795-796 [Conf]
  143. Qun Ni, Morris Sloman
    An Ontology-enabled Service Oriented Architecture for Pervasive Computing. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:797-798 [Conf]
  144. Yaswanth Narvaneni, M. B. Srinivas
    Local Language Support for Handheld Devices. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:799-800 [Conf]
  145. Zhiwen Yu, Xingshe Zhou, Daqing Zhang, Artur Lugmayr, Zhiyong Yu
    A Ubiquitous Personalized Multimedia Service Model Based on FSM. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:801-802 [Conf]
  146. David A. Turner
    Web Page Caching in Java Web Applications. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:803- [Conf]
  147. Zu-Nien Lin, Hsun-Jen Hsu, Feng-Jian Wang
    Intention Scheduling for BDI Agent Systems. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:803- [Conf]
  148. Wei Liu, Keqing He, Wudong Liu
    Design and Realization of ebXML Registry Classification Model Based on Ontology. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:809-814 [Conf]
  149. Nasser Tadayon
    Neural Network Approach for Software Cost Estimation. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:815-818 [Conf]
  150. Petcharat Burapathana, Proadpran Pitsatorn, Boonchai Sowanwanichkul
    An Applying Aspect-Oriented Concept to Sequential Logic Design. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:819-820 [Conf]
  151. Peter J. Clarke, Junhua Ding, Brian A. Malloy
    A Tool to Map Testing Techniques to Classes. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:821-822 [Conf]
  152. Radwan Tahboub, Dan Lazarescu, Vasile Lazarescu
    Software Engineering and Database Web Management in Daleelcom Design. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:823-824 [Conf]
  153. Said Boukendour
    Estimating Software Cost Contingency Using Options Theory. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:825-828 [Conf]
  154. Constantine A. Murenin, Mohammad H. N. Tabrizi
    Development of Usable and Accessible Web-Portals Using W3C Standards. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:829-831 [Conf]
  155. Sen Çakir, Havva H. Basak
    Virtual Classroom for Interactive Synchronous Education. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:832-837 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002