Conferences in DBLP
Mayumi Kato , Chia-Tien Dan Lo Impact of Java Compressed Heap on Mobile/Wireless Communication. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:2-7 [Conf ] Naoto Kimura , Shahram Latifi A Survey on Data Compression in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:8-13 [Conf ] Mansoor Alam , Praveen Bethoju , Min Song Study of Traffic Engineering Capabilities of MPLS Networks. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:14-15 [Conf ] Osama Dandash , Xianping Wu , Phu Dung Le Wireless Internet Payment System Using Smart Cards. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:16-21 [Conf ] Henry Selvaraj , Pawel Tomaszewicz , Mariusz Rawski , Tadeusz Luba Efficient Application of Modern Logic Synthesis in FPGA-Based Designing of Information and Signal Processing Systems. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:22-27 [Conf ] Matthew Nickerson History Calls: Delivering Automated Audio Tours to Visitors' Cell Phones. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:30-34 [Conf ] Robert Steele , Khaled Khankan , Tharam S. Dillon Mobile Web Services Discovery and Invocation Through Auto-Generation of Abstract Multimodal Interface. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:35-41 [Conf ] Robert Steele , Tharam S. Dillon , Parth Pandya , Yuri Ventsov XML-Based Mobile Agents. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:42-48 [Conf ] Salima Hacini Using Dynamic Adaptability to Protect Mobile Agents Code. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:49-52 [Conf ] Sojen Pradhan , Elaine Lawrence , Agnieszka Zmijewska Bluetooth as an Enabling Technology in Mobile Transactions. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:53-58 [Conf ] Stanislav Kurkovsky Using Principles of Pervasive Computing to Design M-Commerce Applications. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:59-64 [Conf ] Jeffrey Huang , Amit Jain , Shiaofen Fang , Edward P. Riley Using Facial Images to Diagnose Fetal Alcohol Syndrome (FAS). [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:66-71 [Conf ] Ashfaqur Rahman , M. Manzur Murshed A Robust Optical Flow Estimation Algorithm for Temporal Textures. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:72-76 [Conf ] Daniel Monegatto Santoro , Maria do Carmo Nicoletti Investigating a Wrapper Approach for Selecting Features Using Constructive Neural Networks. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:77-82 [Conf ] Ernesto Gomez , Yasha Karant , Veysi Malkoc , Mahesh R. Neupane , Keith E. Schubert , Reinhard W. Schulte Orthogonal and Least-Squares Based Coordinate Transforms for Optical Alignment Verification in Radiosurgery. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:83-88 [Conf ] François-Xavier Standaert , Frédéric Lefèbvre , Gaël Rouvroy , Benoit M. Macq , Jean-Jacques Quisquater , Jean-Didier Legat Practical Evaluation of a Radial Soft Hash Algorithm. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:89-94 [Conf ] Ferdous Ahmed Sohel , Gour C. Karmakar , Laurence Dooley A Generic Shape Descriptor using Bezier Curves. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:95-100 [Conf ] John See , Madasu Hanmandlu , Shantaram Vasikarla Fuzzy-based Parameterized Gaussian Edge Detector Using Global and Local Properties. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:101-106 [Conf ] Khaled Hussain , Ghada S. Moussa Automatic Vehicle Classification System using Range Sensor. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:107-112 [Conf ] Yongliang Liu , Xiaolin Yang , Hongxun Yao , Tiejun Huang , Wen Gao Watermark Detection Schemes with High Security. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:113-117 [Conf ] Mohammed Ameer Ali , Laurence S. Dooley , Gour C. Karmakar Fuzzy Image Segmentation Combing Ring and Elliptic Shaped Clustering Algorithms. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:118-122 [Conf ] M. Emre Celebi , Y. Alp Aslandogan , Paul R. Bergstresser Unsupervised Border Detection of Skin Lesion Images. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:123-128 [Conf ] Mang Chen , Yuncai Liu Recognition and Extraction High Precision Digital Road Map. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:129-134 [Conf ] Mohammad Eyadat , Imad Muhi Compression Standards Roles in Image Processing: Case Study. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:135-140 [Conf ] N. Soontranon , Supavadee Aramvith , Thanarat H. Chalidabhongse Improved Face and Hand Tracking for Sign Language Recognition. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:141-146 [Conf ] Shilpa Agarwal , Shweta Madasu , Madasu Hanmandlu , Shantaram Vasikarla A Comparison of some Clustering Techniques via Color Segmentation. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:147-153 [Conf ] Zhiguo Cheng , Yuncai Liu Removal of Interferential Curve from Text Image. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:154-159 [Conf ] Brent Doeksen , Ajith Abraham , Johnson P. Thomas , Marcin Paprzycki Real Stock Trading Using Soft Computing Models. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:162-167 [Conf ] Carlo Mastroianni , Domenico Talia , Oreste Verta A P2P Approach for Membership Management and Resource Discovery in Grids. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:168-174 [Conf ] Li Chunlin , Li Layuan Pricing and Resource Allocation in Computational Grid with Utility Functions. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:175-180 [Conf ] Dan Song , Wudong Liu , Yangfan He , Keqing He Ontology Application in Software Component Registry to Achieve Semantic Interoperability. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:181-186 [Conf ] Diego Puppin , Fabrizio Silvestri , Domenico Laforenza Component Metadata Management and Publication for the Grid. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:187-192 [Conf ] Christos Makris , Evangelos Sakkopoulos , Spyros Sioutas , University of Patras , Greece Peter Triantafillou , Athanasios K. Tsakalidis , Bill Vassiliadis NIPPERS: Network of InterPolated PeERS for Web Service Discovery. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:193-198 [Conf ] Giovanni Aloisio , Massimo Cafaro , Sandro Fiore , Maria Mirto The Grid-DBMS: Towards Dynamic Data Management in Grid Environments. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:199-204 [Conf ] Ragib Hasan , Zahid Anwar , William Yurcik , Larry Brumbaugh , Roy H. Campbell A Survey of Peer-to-Peer Storage Techniques for Distributed File Systems. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:205-213 [Conf ] Shaohua Zhang , Yuwei Zong , Zhigang Ding , Jiamao Liu Workflow-Oriented Grid Service Composition and Scheduling. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:214-219 [Conf ] Yun Huang , Shivajit Mohapatra , Nalini Venkatasubramanian An Energy-Efficient Middleware for Supporting Multimedia Services in Mobile Grid Environments. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:220-225 [Conf ] Adam Harder , Lanlan Song , Yu Wang Towards an Indoor Location System Using RF Signal Strength in IEEE 802.11 Networks. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:228-233 [Conf ] Girma Berhe , Lionel Brunie , Jean-Marc Pierson Distributed Content Adaptation for Pervasive Systems. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:234-241 [Conf ] Heng Seng Cheng , Daqing Zhang , Joo Geok Tan Protection of Privacy in Pervasive Computing Environments. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:242-247 [Conf ] Kay Connelly , Yong Liu , Dan Bulwinkle , Adam Miller , Ian Bobbitt A Toolkit for Automatically Constructing Outdoor Radio Maps. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:248-253 [Conf ] Lei Zhu , Lei He , Alex Collier MAPIS: A Mobile Amphibian Population Information System. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:254-259 [Conf ] M. Ziaur Rahman , Gour C. Karmakar , Laurence S. Dooley Passive Source Localization using Power Spectral Analysis and Decision Fusion in Wireless Distributed Sensor Networks. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:260-264 [Conf ] Mohammad Mahfuzul Islam , M. Manzur Murshed Min-Max Fairness Scheme for Resource Allocation in Cellular Multimedia Networks. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:265-270 [Conf ] Moushumi Sharmin , Shameem Ahmed , Sheikh Iqbal Ahamed SAFE-RD (Secure, Adaptive, Fault Tolerant, and Efficient Resource Discovery) inPervasive Computing Environments. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:271-276 [Conf ] Pradeep Kannadiga , Mohammad Zulkernine , Sheikh Iqbal Ahamed Towards an Intrusion Detection System for Pervasive Computing Environments. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:277-282 [Conf ] Salahuddin A. Azad , M. Manzur Murshed Seamless Channel Transition for Popular Video Broadcasting. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:283-288 [Conf ] Umesh Bellur , Nanjangud C. Narendra Towards Service Orientation in Pervasive Computing Systems. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:289-295 [Conf ] Atsuto Kubo , Hironori Washizaki , Atsuhiro Takasu , Yoshiaki Fukazawa Analyzing Relations among Software Patterns based on Document Similarity. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:298-303 [Conf ] Bhuwan Lodha , K. V. Dinesha , Pavan Kumar Need for Incorporating a RuleBased Conventional Object Oriented Systems. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:304-309 [Conf ] Chia-Chu Chiang An Adapter to Promote Reusability of CORBA Components in COBOL. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:310-315 [Conf ] Chia-Chu Chiang An Introduction to TUG: A Language for Writing Reusable Formal Program Specifications. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:316-321 [Conf ] Christian Lange , Michel R. V. Chaudron Combining Metrics Data and the Structure of UML Models using GIS Visualization Approaches. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:322-326 [Conf ] Demissie B. Aredo , Olaf Owe Model-Based Verification in the Development of Dependable Systems. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:327-334 [Conf ] Elhadi Shakshuki , Ivan Tomek , Omkarnath Prabhu Client Software Agents in FCVW. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:335-340 [Conf ] Ganesha S. R. Shanmuganathan , Kang Zhang , W. Eric Wong , Yu Qi Analyzing Message-Passing Programs through Visual Slicing. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:341-346 [Conf ] Gregory A. Hall Using Unfamiliar Platforms in Software Engineering Projects. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:347-352 [Conf ] Chengwan He , Keqing He , Fei He , Feng Yao , Jin Liu Using RoleOf Relationship in Design Pattern Instantiation. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:353-358 [Conf ] Hironori Washizaki , Yoshiaki Fukazawa A Model-View Separation Architecture for GUI Application Components. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:359-364 [Conf ] Igor Ivkovic , Kostas Kontogiannis Using Formal Concept Analysis to Establish Model Dependencies. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:365-372 [Conf ] Jin Liu , Keqing He , Bing Li , Chengwan He , Liang Peng A Transformation Definition Metamodel for Model Transformation. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:373-378 [Conf ] Jing Dong , Shanguo Chen , Jun-Jang Jeng Event-Based Blackboard Architecture for Multi-Agent Systems. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:379-384 [Conf ] Jing Dong , Sheng Yang , Kang Zhang VisDP: A Web Service for Visualizing Design Patterns on Demand. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:385-391 [Conf ] José Luis Sierra , Baltasar Fernández-Manjón , Alfredo Fernández-Valmayor , Antonio Navarro Document-Oriented Software Construction based on Domain-Specific Markup Languages. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:392-397 [Conf ] Joshua J. Pauli , Dianxiang Xu Misuse Case-Based Design and Analysis of Secure Software Architecture. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:398-403 [Conf ] John Michura , Miriam A. M. Capretz Metrics Suite for Class Complexity. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:404-409 [Conf ] Mir Ali Seyyedi , Mohammad Teshnehlab , Fereidoon Shams Measuring Software Processes Performance based on the Fuzzy Multi Agent Measurements. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:410-415 [Conf ] Mustafa H. Qureshi , Mansur H. Samadzadeh Determining the Complexity of XML Documents. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:416-421 [Conf ] Nour Ali , Isidro Ramos , José A. Carsí A Conceptual Model for Distributed Aspect-Oriented Software Architectures. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:422-427 [Conf ] Robert L. Baber , David Lorge Parnas , Sergiy A. Vilkomir , Paul Harrison , Tony O'Connor Disciplined Methods of Software Specification: A Case Study. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:428-437 [Conf ] Han Shengju , Wang Ning , Yu Miao Research on Role-Network Model for E-Government Affairs. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:438-442 [Conf ] Shifeng Zhang , Steve Goddard xSADL: An Architecture Description Language to Specify Component-Based Systems. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:443-448 [Conf ] Siros Supavita , Taratip Suwannasart Testing Polymorphic Interactions in UML Sequence Diagrams. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:449-454 [Conf ] Tien Nhut Nguyen , Ethan V. Munson , John Tang Boyland , Cheng Thao Structure-oriented Product Versioning. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:456-461 [Conf ] Vincent Chang Design of Middleware Platform to Enhance Abilities of Application Systems Integration. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:461-466 [Conf ] W. C. Wong , Eric Moy , Mohammad Eyadat A Software Development Support Portal (SDSP) Based on a Peer-to-Peer Platform - A Case Study. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:467-472 [Conf ] Winai Wichaipanitch , Mansur H. Samadzadeh , Songsri Tangsripairoj Development and Evaluation of a Slicing-Based C++ Debugger. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:473-478 [Conf ] Ying Qiao , Valdis Berzins , Luqi FCD: A Framework for Compositional Development in Open Embedded Systems. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:479-484 [Conf ] Amanda Spink , Sherry Koshman , Minsoo Park , Chris Field , Bernard J. Jansen Multitasking Web Search on Vivisimo.com. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:486-490 [Conf ] Isak Taksa Predicting the Cumulative Effect of Multiple Query Formulations. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:491-496 [Conf ] João Ferreira , Alberto Rodrigues da Silva , José Delgado Web Services for Information Retrieval. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:497-502 [Conf ] Milad Shokouhi , Pirooz Chubak , Zaynab Raeesy Enhancing Focused Crawling with Genetic Algorithms. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:503-508 [Conf ] Rami N. Hasan , Mansur H. Samadzadeh A Study of Tunnel Vision and Rotation as Aspects of Web Site Visibility. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:509-514 [Conf ] Ullas Gargi Information Navigation Profiles for Mediation and Adaptation. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:515-520 [Conf ] Xiannong Meng , Ty Clark An Empirical User Rating of Popular Search Engines Using RankPower. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:521-525 [Conf ] Fei Hu , Xiaojun Cao Security in Wireless Actor & Sensor Networks (WASN): Towards A Hierarchical Re-Keying Design. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:528-533 [Conf ] Andrea Kulakov , Danco Davcev Tracking of Unusual Events in Wireless Sensor Networks Based on Artificial Neural-Networks Algorithms. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:534-539 [Conf ] Brian Lehane , Linda Doyle , Donal O'Mahony Ad Hoc Key Management Infrastructure. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:540-545 [Conf ] Bin Lu , Udo W. Pooch A Lightweight Authentication Protocol for Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:546-551 [Conf ] Chen Zhuo , Hong Fan , Hong Liang A New Authentication and Key Exchange Protocol in WLAN. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:552-556 [Conf ] Fei Hu , Xiaojun Cao , Carter May Optimized Scheduling for Data Aggregation in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:557-561 [Conf ] Tarun Banka , Gagan Tandon , Anura P. Jayasumana Zonal Rumor Routing for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:562-567 [Conf ] George C. Hadjichristofi , William Joseph Adams , Nathaniel J. Davis IV A Framework for Key Management in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:568-573 [Conf ] Haoming Guo , Mei Yang , Xiaolong Wu , Yingtao Jiang , Shilong Ma , Guoshun Hao Autonomous and Dynamic Web Service Composition in Wireless Grids. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:574-579 [Conf ] Laura Huei-jiun Ju , Izhak Rubin Performance Analysis of Mobile Backbone Topology Synthesis Algorithm for Wireless Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:580-585 [Conf ] Jian Chen , Yong Guan , Udo W. Pooch Customizing a Geographical Routing Protocol for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:586-591 [Conf ] Jin H. Zhao , Xiao Z. Yang , Hong W. Liu Load-balancing Strategy of Multi-gateway for Ad hoc Internet Connectivity. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:592-596 [Conf ] John V. Harrison Enhancing Network Security By Preventing User-Initiated Malware Execution. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:597-602 [Conf ] Jun Zheng , Emma Regentova An Improved Polling Scheme for Voice Support in IEEE 802.11 Wireless Network. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:603-608 [Conf ] Li Layuan , Li Chunlin A QoS Multicast Routing Protocol for Mobile Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:609-614 [Conf ] Xin Li , Zhenzhou Ji , Ming-Zeng Hu Stateful Inspection Firewall Session Table Processing. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:615-620 [Conf ] Miao Ma Mitigating Denial of Service Attacks with Password Puzzles. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:621-626 [Conf ] Michael R. Gosnell , Ryan Albarelli , Maggie Xiaoyan Cheng , Bruce M. McMillin Energy Balanced Broadcasting Through Delayed Intelligence. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:627-632 [Conf ] Min Song , Scott Wigginton Frequency Hopping Pattern Detection in Wireless Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:633-638 [Conf ] Muhammad Mahmudul Islam , Ronald Pose , Carlo Kopp MAC Layer Support for Real-Time Traffic in a SAHN. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:639-645 [Conf ] Osama M. F. Abu-Sharkh , Ahmed H. Tewfik A TDMA Based Scheduling Scheme in 802.11b WLANs with Access Point. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:646-650 [Conf ] P. Muppala , Johnson P. Thomas , Ajith Abraham QoS-Based Authentication Scheme for Ad Hoc Wireless Networks. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:651-656 [Conf ] Ping Yi , Zhoulin Dai , YiPing Zhong , Shiyong Zhang Resisting Flooding Attacks in Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:657-662 [Conf ] Ranjeet Kumar Patro , Balamurugan Mohan Mobile Agent Based TDMA Slot Assignment Algorithm for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:663-667 [Conf ] S. Veeravalli , Laxmi Gewali , Muthukumar Venkatesan Construction of Power-Aware Diameter-Reduced Broadcast Trees. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:668-674 [Conf ] Sheng-Tzong Cheng , Ming-Hung Tao , Mingzoo Wu Media Access Mechanisms for Integrated Services in Wireless Networks. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:675-680 [Conf ] Sheng-Tzong Cheng , Mingzoo Wu Performance Evaluation of Ad-Hoc WLAN by M/G/1 Queueing Model. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:681-686 [Conf ] Spyridon Vassilaras , Dimitrios Vogiatzis , Gregory S. Yovanof Misbehavior Detection in Clustered Ad-hoc Networks with Central Control. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:687-692 [Conf ] Stamatios V. Kartalopoulos Hierarchical Encryption in WDM Optical Network Links. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:693-697 [Conf ] Tarek H. Ahmed Simulation of Mobility and Routing in Ad Hoc Networks using Ant Colony Algorithms. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:698-703 [Conf ] Turgay Korkmaz Verifying Physical Presence of Neighbors against Replay-based Attacks in Wireless Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:704-709 [Conf ] Unghee Lee , Scott F. Midkiff , Jahng S. Park A Proactive Routing Protocol for Multi-Channel Wireless Ad-hoc Networks (DSDV-MC). [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:710-715 [Conf ] Yahya Al-Harthi , Ahmed H. Tewfik , Mohamed-Slim Alouini Opportunistic Scheduling with Quantized Feedback in Wireless Networks. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:716-722 [Conf ] Yang Yu , Mei Yang , Yulu Yang , Yingtao Jiang A RDT-Based Interconnection Network for Scalable Network-on-Chip Designs. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:723-728 [Conf ] Yingtao Jiang , Mei Yang , Xiaolong Wu , Min Zhang Substream Selection in Wireless MIMO Systems for Complexity Reduction. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:729-733 [Conf ] Yuan Fan , Xiao Su In-Memory Storage and Search System for Event Management in Network Security. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:734-739 [Conf ] Zhi-Yan Cao , Zhenzhou Ji , Ming-Zeng Hu An Image Sensor Node for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:739-745 [Conf ] Andy Auyeung , Ulrich Melcher Evaluations of Protein Sequence Alignments using Structural Information. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:748-749 [Conf ] Youping Deng , Venkatachalam Chokalingam , Chaoyang Zhang Markov Chain Correlation Based Clustering of Gene Expression Data. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:750-755 [Conf ] Cheng-Hsiung Hsieh A Zonal JPEG. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:756-757 [Conf ] Ying Chen , Shoubao Yang , Leitao Guo , Pengzhan Liu , Kai Shen Design and Implementation of Dynamic-Role Based Access Control Framework in Grid Environment. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:758-759 [Conf ] Leena Al-Hussaini , Andrew L. Wendelborn , Paul D. Coddington A Unified Grid Query Service for Grid Resource Brokers. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:760-761 [Conf ] Shrideep Pallickara , Geoffrey Fox An Analysis of Notification Related Specifications for Web/Grid Applications. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:762-763 [Conf ] Zhijie Guan , Vijay Velusamy GridDeploy: A Toolkit for Deploying Applications as Grid Services. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:764-765 [Conf ] Dalila Boughaci , Habiba Drias An Agent-Based Approach using the ebXML Specifications for E-business. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:766-767 [Conf ] Jinoos Hosseini Strategic Technology Planning for the E-Commerce Enabled Enterprise. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:768-769 [Conf ] Elharith Elrufaie , David A. Turner A Wiki Paradigm for use in IT courses. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:770-771 [Conf ] Qingtang Liu , Zongkai Yang , Kun Yan , Jing Jin , Wanting Deng Research on DRM-Enabled Learning Objects Model. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:772-773 [Conf ] C. Vallve-Guionnet Finding Colluders in Card Games. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:774-775 [Conf ] Atsushi Waseda , Masakazu Soshi , Atsuko Miyaji n-State Quantum Coin Flipping Protocol. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:776-777 [Conf ] Yang Sun , Soon Cheol Park Generation of Non-Redundant Summary Based on Sum of Similarity. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:782-783 [Conf ] John Tsiligaridis , Raj Acharya A Tree Based Data Mining Prediction Scheme for Wireless Cellular Network. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:784-786 [Conf ] Dipnarayan Guha , Qonita Muhammad Shahab , Jun Kyun Choi Abstract State Machine Based Next Generation IPv6 Network Processor. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:787-788 [Conf ] Guoshun Hao , Shilong Ma , Haoming Guo , Xiaolong Wu , Mei Yang , Yingtao Jiang Analyze Grid from the Perspective of a Computing System. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:789-790 [Conf ] Sanjay P. Ahuja , Raquel Clark Comparison of Web Services Technologies from a Developer's Perspective. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:791-792 [Conf ] Yang Jin , Shoubao Yang , Maosheng Li , Qianfei Fu An Autonomous Pricing Strategy toward Market Economy in Computational Grids. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:793-794 [Conf ] Ziga Turk , Matevz Dolenc , Vlado Stankovski , Etiel Petrinja Semantic Grid - Interoperability Solution for Construction VO? [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:795-796 [Conf ] Qun Ni , Morris Sloman An Ontology-enabled Service Oriented Architecture for Pervasive Computing. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:797-798 [Conf ] Yaswanth Narvaneni , M. B. Srinivas Local Language Support for Handheld Devices. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:799-800 [Conf ] Zhiwen Yu , Xingshe Zhou , Daqing Zhang , Artur Lugmayr , Zhiyong Yu A Ubiquitous Personalized Multimedia Service Model Based on FSM. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:801-802 [Conf ] David A. Turner Web Page Caching in Java Web Applications. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:803- [Conf ] Zu-Nien Lin , Hsun-Jen Hsu , Feng-Jian Wang Intention Scheduling for BDI Agent Systems. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:803- [Conf ] Wei Liu , Keqing He , Wudong Liu Design and Realization of ebXML Registry Classification Model Based on Ontology. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:809-814 [Conf ] Nasser Tadayon Neural Network Approach for Software Cost Estimation. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:815-818 [Conf ] Petcharat Burapathana , Proadpran Pitsatorn , Boonchai Sowanwanichkul An Applying Aspect-Oriented Concept to Sequential Logic Design. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:819-820 [Conf ] Peter J. Clarke , Junhua Ding , Brian A. Malloy A Tool to Map Testing Techniques to Classes. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:821-822 [Conf ] Radwan Tahboub , Dan Lazarescu , Vasile Lazarescu Software Engineering and Database Web Management in Daleelcom Design. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:823-824 [Conf ] Said Boukendour Estimating Software Cost Contingency Using Options Theory. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:825-828 [Conf ] Constantine A. Murenin , Mohammad H. N. Tabrizi Development of Usable and Accessible Web-Portals Using W3C Standards. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:829-831 [Conf ] Sen Çakir , Havva H. Basak Virtual Classroom for Interactive Synchronous Education. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:832-837 [Conf ]