The SCEAS System
Navigation Menu

Conferences in DBLP

International Symposium on Information Technology (itcc)
2004 (conf/itcc/2004-1)

  1. Rangarajan Vasudevan, Ajith Abraham, Sugata Sanyal, Dharma P. Agrawal
    Jigsaw-based Secure Data Transfer over Computer Networks. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:2-6 [Conf]
  2. Chi Kin Ho, Chang-Tsun Li
    Semi-Fragile Watermarking Scheme for Authentication of JPEG Images. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:7-11 [Conf]
  3. István Zsolt Berta, Levente Buttyán, István Vajda
    Mitigating the Untrusted Terminal Problem Using Conditional Signatures. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:12-16 [Conf]
  4. Ajmal S. Mian, Ashraf Masood
    Arcanum : A Secure and Efficient Key Exchange Protocol for the Internet. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:17-21 [Conf]
  5. Aleksandra Nenadic, Ning Zhang, Stephen Barton
    A Security Protocol for Certified E-Goods Delivery. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:22-0 [Conf]
  6. Shouhuai Xu, William Robert Nelson Jr., Ravi S. Sandhu
    Enhancing Anonymity via Market Competition. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:30-34 [Conf]
  7. Supakorn Kungpisdan, Bala Srinivasan, Phu Dung Le
    A Secure Account-Based Mobile Payment Protocol. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:35-39 [Conf]
  8. Supakorn Kungpisdan, Bala Srinivasan, Phu Dung Le
    Accountability Logic for Mobile Payment Protocols. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:40-44 [Conf]
  9. Sarbajit Pal, P. K. Biswas, Ajith Abraham
    Face Recognition Using Interpolated Bezier Curve Based Representation. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:45-49 [Conf]
  10. Changwoo Pyo, Byungchul Bae, Taejin Kim, Gyungho Lee
    Run-time Detection of Buffer Overflow Attacks without Explicit Sensor Data Objects. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:50-0 [Conf]
  11. Omaima Bamasak, Ning Zhang
    Achieving Distributed Trusted Services. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:56-61 [Conf]
  12. Vandana Gunupudi, Stephen R. Tate
    Performance Evaluation of Data Integrity Mechanisms for Mobile Agents. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:62-69 [Conf]
  13. Sampada Chavan, Khusbu Shah, Neha Dave, Sanghamitra Mukherjee, Ajith Abraham, Sugata Sanyal
    Adaptive Neuro-Fuzzy Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:70-74 [Conf]
  14. Janica Edmonds, Mauricio Papa
    Cryptographic Protocol Analysis using Goal Extraction. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:75-80 [Conf]
  15. Sachin P. Joglekar, Stephen R. Tate
    ProtoMon: Embedded Monitors for Cryptographic Protocol Intrusion Detection and Prevention. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:81-0 [Conf]
  16. Jeongseok Seo, Han-Sung Kim, Sanghyun Cho, Sung Deok Cha
    Web Server Attack Categorization based on Root Causes and Their Locations. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:90-96 [Conf]
  17. Rong-Tai Liu, Nen-Fu Huang, Chia-Nan Kao, Chih-Hao Chen, Chi-Chieh Chou
    A Fast Pattern-Match Engine for Network Processor-based Network Intrusion Detection System. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:97-101 [Conf]
  18. Chaoyang Zhang, Yukong Zhang
    A Modified Optical Image Reconstruction Model with Information Feedback. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:102-106 [Conf]
  19. Hongmei Deng, Anindo Mukherjee, Dharma P. Agrawal
    Threshold and Identity-based Key Management and Authentication for Wireless Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:107-111 [Conf]
  20. David Llewellyn-Jones, Madjid Merabti, Qi Shi, Bob Askwith
    An Extensible Framework for Practical Secure Component Composition in a Ubiquitous Computing Environment. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:112-117 [Conf]
  21. Alfredo Cuzzocrea, Fernando Bellas
    Distributed Knowledge Networks: Towards a New Paradigm for Delivering Knowledge. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:118-123 [Conf]
  22. Joonsang Baek, Yuliang Zheng
    Identity-Based Threshold Signature Scheme from the Bilinear Pairings. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:124-128 [Conf]
  23. William D. Neumann
    HORSE: An Extension of an r-Time Signature Scheme With Fast Signing and Verification. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:129-0 [Conf]
  24. Renée Turban
    Recurrent Exercises for Introductory Human Computer Interaction Courses. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:136-140 [Conf]
  25. Tomasz Müldner, Elhadi Shakshuki
    A New Approach to Learning Algorithms. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:141-145 [Conf]
  26. Antoni Martínez-Ballesté, Francesc Sebé, Josep Domingo-Ferrer
    Computer Skills Training to (Middle-aged) Adults: Problems and Program. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:146-150 [Conf]
  27. Paul Douglas, Steve Barker
    Dependency Theory E-Learning Tool. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:151-155 [Conf]
  28. Chih-Ping Chu, Ching-Pao Chang, Chung-Wei Yeh, Yu-Fang Yeh
    A Web-Service Oriented Framework for building SCORM Compatible Learning Management Systems. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:156-0 [Conf]
  29. J. R. Parker
    Games and Animation: Collaborations Between the Arts and Computer Science. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:164-168 [Conf]
  30. Paul S. Wang, Yi Zhou, Xiao Zou
    Web-based Mathematics Education: MeML Design and Implementation. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:169-175 [Conf]
  31. Kai Schramm, Christof Paar
    IT Security Project: Implementation of the Advanced Encryption Standard (AES) on a Smart Card. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:176-180 [Conf]
  32. Pavel Azalov, Fani Zlatarova
    An Instructor's Environment for Automatic Generation of Problem Sequences. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:181-185 [Conf]
  33. Jill E. Courte
    The Development of a Philosophy for an Applied Web Programming Curriculum. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:186-0 [Conf]
  34. Yi-fang Brook Wu, Xin Chen
    Assessing Distance Learning Student's Performance: A Natural Language Processing Approach to Analyzing Class Discussion Messages. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:192-196 [Conf]
  35. Dilermando Piva Jr., Ricardo Luís de Freitas, Mauro Sérgio Miskulin, Gilberto Shigueo Nakamiti, Carlos Miguel Tobar
    Auxiliar: A Case-Based System to Assist Online Courses. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:197-201 [Conf]
  36. Mohammed Abdel Razek, Claude Frasson, Marc Kaltenbach
    Building an Effective Groupware System. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:202-206 [Conf]
  37. Zongkai Yang, Gang Zhao, Di Wu, Jianhua He
    A Standard Visual Courseware Authoring Tool Based on Content Packaging Specification. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:207-211 [Conf]
  38. Michael Blumenstein, Steve Green, Ann Nguyen, Vallipuram Muthukkumarasamy
    GAME: A Generic Automated Marking Environment for Programming Assessment. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:212-0 [Conf]
  39. Sheikh Iqbal Ahamed
    A Novel Approach for New E-commerce Product Positioning and to-go/not-to go with Rapid Prototyping Experience. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:218-222 [Conf]
  40. Chima Adiele, Sylvanus A. Ehikioya
    Dynamic Identification of Correspondence Assertions for Electronic Commerce Data Integration. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:223-227 [Conf]
  41. Amey Dharurkar, Shrideep Pallickara, Geoffrey Fox
    A Topology Viewer for Distributed Brokering Systems. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:228-234 [Conf]
  42. Ann Johansson
    The Impacts of Professions in Systems Development. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:235-240 [Conf]
  43. Qiong Liu, Xin Lu, Fuji Ren, Shingo Kuroiwa
    Automatic Estimation of Stock Market Forecasting and Generating the Corresponding Natural Language Expression. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:241-245 [Conf]
  44. Rajiv Dharaskar
    Special Technique for Optimizing Teaching-Learning Process in CBT Software. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:246-250 [Conf]
  45. Nazli Goharian, David A. Grossman, N. Raju
    Extending the Undergraduate Computer Science Curriculum to Include Data Mining. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:251-254 [Conf]
  46. Chien-Min Wang, David Turner
    Extending the Wiki Paradigm for Use in the Classroom. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:255-0 [Conf]
  47. Albert Hoang
    Information Retrieval with Principal Components. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:262-266 [Conf]
  48. Pik-Shan Cheung, Ruizhang Huang, Wai Lam
    Financial Activity Mining from Online Multilingual News. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:267-271 [Conf]
  49. Zhenya Zhang, Enhong Chen, Jin Wang, Xufa Wang
    Enabling Personalization Recommendation With WeightedFP for Text Information Retrieval Based on User-Focus. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:272-276 [Conf]
  50. Magdalene P. Ting, Vishal Seth, Jerry Gao
    The e-Salesman System. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:277-282 [Conf]
  51. Jihong Zeng, Peter A. Bloniarz
    From Keywords to Links: an Automatic Approach. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:283-286 [Conf]
  52. Daniel Berleant, Jinghao Miao, Zhong Gu, Dongping Xu
    Toward Dialogues With Documents: MultiBrowser. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:287-294 [Conf]
  53. Jinghao Miao, Daniel Berleant
    From Paragraph Networks to Document Networks. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:295-0 [Conf]
  54. Guangming Xing, Dongli Zhang
    Refined Extended Preorder Index with Path Information. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:304-308 [Conf]
  55. Amanda Spink, Minsoo Park, Bernard J. Jansen, Jan O. Pedersen
    Multitasking Web Search on Alta Vista. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:309-313 [Conf]
  56. Takanori Mouri, Hiroyuki Kitagawa
    Extracting New Topic Contents from Hidden Web Sites. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:314-319 [Conf]
  57. Craig Chariton, Min-Hyung Choi
    Enhancing Usability of Flight and Fare Search Functions for Airline and Travel Web Sites. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:320-325 [Conf]
  58. Razvan Stefan Bot, Yi-fang Brook Wu, Xin Chen, Quanzhi Li
    A Hybrid Classifier Approach for Web Retrieved Documents Classification. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:326-0 [Conf]
  59. Christos Bouras, Vaggelis Kapoulas, Ioannis Misedakis
    Web Page Fragmentation for Personalized Portal Construction. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:332-336 [Conf]
  60. Bienvenido Vélez, Amaury Cabarcas, Lizvette Malavé
    TIN: An Interactive Image Navigator Providing Ubiquitous Access To Distributed Geo-Spatial Data. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:337-343 [Conf]
  61. Shou-Hsuan Stephen Huang, Carlos Humberto Molina-Rodríguez, Jesús Ubaldo Quevedo-Torrero, Mario Francisco Fonseca-Lozada
    Exploring Similarity among Web Pages Using the Hyperlink Structure. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:344-348 [Conf]
  62. Wendy T. Lucas, Heikki Topi
    Anxiously Seeking Answers: How Attitude Affects Search Performance. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:349-353 [Conf]
  63. Hongzhi Wang, Jianzhong Li, Jizhou Luo, Zhenying He
    XCpaqs: Compression of XML Document with XPath Query Support. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:354-0 [Conf]
  64. Silvana Castano, Alfio Ferrara, Stefano Montanelli, Gianpaolo Racca
    Matching Techniques for Resource Discovery in Distributed Systems Using Heterogeneous Ontology Descriptions. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:360-366 [Conf]
  65. Bill Vassiliadis, Kostas Giotopoulos, Konstantinos Votis, Spyros Sioutas, Nikos Bogonikolos, Spiros Likothanassis
    Application Service Provision through the Grid: Business models and Architectures. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:367-371 [Conf]
  66. Giovanni Aloisio, Massimo Cafaro, Sandro Fiore, Maria Mirto
    The GRelC Library: A Basic Pillar in the Grid Relational Catalog Architecture. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:372-376 [Conf]
  67. Rebecca L. Collins, James S. Plank
    Content-Addressable IBP - Rationale, Design and Performance. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:377-281 [Conf]
  68. Alexandra I. Cristea, Michael Verschoor
    The LAG Grammar for Authoring the Adaptive Web. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:382-288 [Conf]
  69. Flavius Frasincar, Peter Barna, Geert-Jan Houben, Zoltán Fiala
    Adaptation and Reuse in Designing Web Information Systems. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:387-291 [Conf]
  70. Fabrizio Silvestri, Ranieri Baraglia, Paolo Palmerini, Massimo Serranó
    On-line Generation of Suggestions for Web Users. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:392-397 [Conf]
  71. Nick Golovin, Erhard Rahm
    Reinforcement Learning Architecture for Web Recommendations. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:398-0 [Conf]
  72. Tarek Abbes, Adel Bouhoula, Michaël Rusinowitch
    Protocol Analysis in Intrusion Detection Using Decision Tree. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:404-408 [Conf]
  73. Zili Shao, Chun Xue, Qingfeng Zhuge, Edwin Hsing-Mean Sha, Bin Xiao
    Security Protection and Checking in Embedded System Integration Against Buffer Overflow Attacks. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:409-413 [Conf]
  74. Sriranjani Sitaraman, S. Venkatesan
    Low-Intrusive Consistent Disk Checkpointing: A Tool for Digital Forensics. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:414-418 [Conf]
  75. Ram Dantu, João W. Cangussu, Arun Yelimeli
    Dynamic Control of Worm Propagation. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:419-423 [Conf]
  76. Sheikh Iqbal Ahamed, Alex Pezewski, Al Pezewski
    Towards Framework Selection Criteria and Suitability for an Application Framework. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:424-0 [Conf]
  77. K. Suzanne Barber, Jisun Park
    Robust Partner Selection Scheme for Information Quality Assurance despite Uncertainty in Open Multi-Agent Systems. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:430-434 [Conf]
  78. Austin Gilbert, Ajith Abraham, Marcin Paprzycki
    A System for Ensuring Data Integrity in Grid Environments. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:435-439 [Conf]
  79. Andrew H. Sung, Gopalakrishna Reddy Tadiparthi, Srinivas Mukkamala
    Defeating the Current Steganalysis Techniques (Robust Steganography). [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:440-444 [Conf]
  80. Ram Dantu, Kall Loper, Prakash Kolan
    Risk Management using Behavior based Attack Graphs. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:445-449 [Conf]
  81. Fahad T. Alotaiby, Jim X. Chen
    A Model for Team-based Access Control (TMAC 2004). [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:450-0 [Conf]
  82. Mark Smith, Alireza Khotanzad
    An Object-Based Approach for Digital Video Retrieval. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:456-459 [Conf]
  83. Fu-Shing Sun, Chun-Hung Tzeng
    A Mathematical Model of Similarity and Clustering. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:460-464 [Conf]
  84. Soon Myoung Chung, Murali Mangamuri
    Mining Association Rules from Relations on a Parallel NCR Teradata Database System. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:465-470 [Conf]
  85. Matteo Magnani, Danilo Montesi
    A New Reparation Method for Incomplete Data in the Context of Supervised Learning. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:471-475 [Conf]
  86. Yang Sok Kim, Sung Sik Park, Edward Deards, Byeong Ho Kang
    Adaptive Web Document Classification with MCRDR. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:476-0 [Conf]
  87. Frank Adelstein, Prasanth Alla, Rob Joyce, Golden G. Richard III
    Physically Locating Wireless Intruders. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:482-0 [Conf]
  88. Joseph Fong, Hing Kwok Wong
    Replicate Relational and XML Databases for Internet Computing. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:492-496 [Conf]
  89. D. S. Yadav, Rajeev Agrawal, D. S. Chauhan, R. C. Saraswat, Arun K. Majumdar
    Modeling Long Duration Transactions with Time Constraints in Active Database. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:497-501 [Conf]
  90. Arthur C. S. Wong, Victor C. S. Lee, Kwok-Wa Lam
    Accessing Temporal Data Objects in Mobile Computing Environments. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:502-506 [Conf]
  91. A. K. Sharma, A. Goswami, D. K. Gupta
    Fuzzy Inclusion Dependencies in Fuzzy Relational Databases. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:507-510 [Conf]
  92. Bryan Hin Cheung Poon, Kwok-Wa Lam, Victor C. S. Lee
    Server-side Broadcast Transaction in Mobile Computing Environment. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:511-0 [Conf]
  93. Luiz Camolesi Jr.
    Survivability and Applicability in Database Constraints: Temporal Boundary to Data Integrity Scenarios. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:518-522 [Conf]
  94. Steve Barker, Paul Douglas
    Protecting Federated Databases Using A Practical Implementation of a Formal RBAC Policy. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:523-527 [Conf]
  95. Jamal R. Alsabbagh, Vijay V. Raghavan
    A Model for Multiple-Query Processing Based upon Strong Factoring. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:528-533 [Conf]
  96. Sheikh Iqbal Ahamed, Sanjay Vallecha
    Component-based Embedded Database for Mobile Embedded Systems. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:534-538 [Conf]
  97. Eric Pardede, J. Wenny Rahayu, David Taniar
    Mapping Methods and Query for Aggregation and Association in Object-Relational Database using Collection. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:539-0 [Conf]
  98. John Rothfork
    Community, Context, and Distance Education. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:546-550 [Conf]
  99. Moses Garuba, Ronald Langrin, Legand L. Burge III
    A Constraint-Based Query Modification Engine for Retrofitting COTS DBMS's. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:551-556 [Conf]
  100. Joseph Gill, Legand L. Burge III, Moses Garuba
    The Design and Implementation of the MESSENGER Trajectory Database. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:557-561 [Conf]
  101. John T. Minor, Laxmi Gewali
    Pedagogical Issues in Programming Languages. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:562-565 [Conf]
  102. Moses Garuba, Edward Appiah, Legand L. Burge III
    Performance Study of a MLS/DBMS Implemented as a Kernelized Architecture. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:566-0 [Conf]
  103. Kentaro Sano, Chiaki Takagi, Ryusuke Egawa, Ken-ichi Suzuki, Tadao Nakamura
    A Systolic Memory Architecture for Fast Codebook Design based on MMPDCL Algorithm. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:572-578 [Conf]
  104. Marjan Karkooti, Joseph R. Cavallaro
    Semi-Parallel Reconfigurable Architectures for Real-Time LDPC Decoding. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:579-585 [Conf]
  105. Robert Steele, Yuri Ventsov, Tharam S. Dillon
    An Object-Oriented Database-based Architecture for Mobile Enterprise Applications. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:586-590 [Conf]
  106. Hassan Reza, Emanuel S. Grant
    A Formal Approach to Software Architecture of Agent-Base Systems. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:591-0 [Conf]
  107. Weiting Cai, Malek Adjouadi
    Minimization of Boundary Artifacts on Scalable Image Compression Using Symmetric-Extended Wavelet Transform. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:598-602 [Conf]
  108. Mukesh A. Zaveri, Shabbir N. Merchant, Uday B. Desai
    Arbitrary Trajectories Tracking using Multiple Model Based Particle Filtering in Infrared Image Sequence. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:603-607 [Conf]
  109. Nianjun Liu, Richard I. A. Davis, Brian C. Lovell, Peter J. Kootsookos
    Effect of Initial HMM Choices in Multiple Sequence Training for Gesture Recognition. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:608-613 [Conf]
  110. Chunliang Gu, Baocai Yin, Yongli Hu, Shiquan Cheng
    Resampling Based Method for Pixel-wise Correspondence between 3D Faces. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:614-619 [Conf]
  111. Xin Lu, Qiong Liu, Shunichiro Oe
    Recognizing Non-rigid Human Actions Using Joints Tracking in Space-time. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:620-0 [Conf]
  112. EunSang Bak, Kayvan Najarian
    Robust Segmentation Using Parametric and Nonparametric Local Spatial Posteriors. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:626-630 [Conf]
  113. Ming-Jung Seow, Rajkiran Gottumukkal, Deepthi Valaparla, Vijayan K. Asari
    A Robust Face Recognition System for Real Time Surveillance. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:631-635 [Conf]
  114. Madasu Hanmandlu, Vamsi Krishna Madasu, Shantaram Vasikarla
    A Fuzzy Approach to Texture Segmentation. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:636-642 [Conf]
  115. Li Shen, Fillia Makedon
    Spherical Parameterization for 3D Surface Analysis in Volumetric Images. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:643-649 [Conf]
  116. Mohammad Eyadat
    Factors that Affect the Performance of the DCT-Block Based Image Watermarking Algorithms. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:650-0 [Conf]
  117. Hau T. Ngo, Li Tao, Vijayan K. Asari
    Design of an Efficient Architecture for Real-time Image Enhancement Based on a Luma-Dependent Nonlinear Approach. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:656-660 [Conf]
  118. B. Yegnanarayana, Anil Kumar Sao, B. V. K. Vijaya Kumar, Marios Savvides
    Determination of Pose Angle of Face using Dynamic Space Warping (DSW). [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:661-664 [Conf]
  119. Madasu Hanmandlu, John See, Shantaram Vasikarla
    Fuzzy Edge Detector Using Entropy Optimization. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:665-670 [Conf]
  120. Reza Safabakhsh, Shiva Zaboli, Arash Tabibiazar
    Digital Watermarking on Still Images Using Wavelet Transform. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:671-675 [Conf]
  121. Ashfaqur Rahman, M. Manzur Murshed, Laurence Dooley
    Feature Weighting Methods for Abstract Features Applicable to Motion based Video Indexing. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:676-0 [Conf]
  122. Vladimir Uskov, Alexander Uskov
    National Science Foundation Project on Advanced Online Education in Information Technology. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:682-686 [Conf]
  123. Guang-Lei Song, Kang Zhang
    Visual XML Schemas Based on Reserved Graph Grammars. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:687-691 [Conf]
  124. J. R. Parker, M. Baumback
    User Interface Augmentation: Vision and Sound. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:692-697 [Conf]
  125. Xiang Zheng, Bing-Feng Zhou, Xi-Feng Fang, Jin-Wen Sun, Duan-Feng Si
    Combining the Product of Interactive Multimedia Creator with MPEG4 Technology. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:698-0 [Conf]
  126. Michael Blumenstein
    Experience in Teaching Object-Oriented Concepts to First Year Students with Diverse Backgrounds. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:704-708 [Conf]
  127. David Chiu
    Web-Based Mathematics Education with MathChat. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:709-717 [Conf]
  128. Alexandra I. Cristea
    Adaptive Course Creation for All. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:718-722 [Conf]
  129. Legand L. Burge III, Moses Garuba, Charita Brent
    Improving Retention of Minority Freshmen in Engineering by Applying the Six Sigma Methodology. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:723-728 [Conf]
  130. Bruce I. Mills, Martha W. Evens, Reva Freedman
    Implementing Directed Lines of Reasoning in an Intelligent Tutoring System Using the Atlas Planning Environment. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:729-0 [Conf]
  131. Hiroyuki Takizawa, Hiroaki Kobayashi
    A Fast Computation Scheme of Partial Distortion Entropy Updating. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:736-741 [Conf]
  132. M. Nithish, C. Ramakrishna, J. Ramkumar, Priya Lakshmi
    Design and Evaluation of Intermediate Retransmission and Packet Loss Detection Schemes for MPEG4 Transmission. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:742-746 [Conf]
  133. Somphop Chokchaitam, Prasit Teekaput
    Embedded Error Detection in Arithmetic Coding Using Markers. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:747-750 [Conf]
  134. Shaohui Liu, Hongxun Yao, Wen Gao
    Steganalysis of Data Hiding Techniques in Wavelet Domain. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:751-754 [Conf]
  135. John Istle, Pamela Mandelbaum, Emma Regentova
    Online Compression of ASCII Files. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:755-0 [Conf]
  136. Chang N. Zhang, Honglan Zhong
    An Integrated Approach for Database Security and Fault Tolerance. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:762-766 [Conf]
  137. Dragos Trinca
    Towards New Algorithms for Data Compression Using Adaptive Codes. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:767-771 [Conf]
  138. Ravi Sankar Veerubhotla, Ashutosh Saxena, Ved Prakash Gulati, Arun K. Pujari
    On Gossip Codes and Traceability Schemes. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:772-777 [Conf]
  139. Yan Chen, Zhiwei Qu, Zhenhua Zhang, Boon-Lock Yeo
    Data Redundancy and Compression Methods for a Disk-Based Network Backup System. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:778-785 [Conf]
  140. Li Shen, Peizhong Lu, Xiangyang Luo, Yan Zou
    Equivalence of Punctured Convolutional Codes from Shift Equivalent Puncturing Patterns. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:786-0 [Conf]
  141. K. Venkatesh, S. Aravind, R. Ganapath, T. Srinivasan
    A High Performance Parallel IP Lookup Technique Using Distibuted Memory Organization. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:792-797 [Conf]
  142. Jeffrey E. Boyd, Maxwell Sayles, Luke Olsen, Paul Tarjan
    Content Description Servers for Networked Video Surveillance. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:798-803 [Conf]
  143. Yuqing Mai, Radhika Upadrashta, Xiao Su
    J-Honeypot: A Java-Based Network Deception Tool with Monitoring and Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:804-808 [Conf]
  144. Eugin Hyun, Kwang-Su Seong
    The Effective Buffer Architecture for Data Link Layer of PCI Express. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:809-0 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002