Conferences in DBLP
Rangarajan Vasudevan , Ajith Abraham , Sugata Sanyal , Dharma P. Agrawal Jigsaw-based Secure Data Transfer over Computer Networks. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:2-6 [Conf ] Chi Kin Ho , Chang-Tsun Li Semi-Fragile Watermarking Scheme for Authentication of JPEG Images. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:7-11 [Conf ] István Zsolt Berta , Levente Buttyán , István Vajda Mitigating the Untrusted Terminal Problem Using Conditional Signatures. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:12-16 [Conf ] Ajmal S. Mian , Ashraf Masood Arcanum : A Secure and Efficient Key Exchange Protocol for the Internet. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:17-21 [Conf ] Aleksandra Nenadic , Ning Zhang , Stephen Barton A Security Protocol for Certified E-Goods Delivery. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:22-0 [Conf ] Shouhuai Xu , William Robert Nelson Jr. , Ravi S. Sandhu Enhancing Anonymity via Market Competition. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:30-34 [Conf ] Supakorn Kungpisdan , Bala Srinivasan , Phu Dung Le A Secure Account-Based Mobile Payment Protocol. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:35-39 [Conf ] Supakorn Kungpisdan , Bala Srinivasan , Phu Dung Le Accountability Logic for Mobile Payment Protocols. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:40-44 [Conf ] Sarbajit Pal , P. K. Biswas , Ajith Abraham Face Recognition Using Interpolated Bezier Curve Based Representation. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:45-49 [Conf ] Changwoo Pyo , Byungchul Bae , Taejin Kim , Gyungho Lee Run-time Detection of Buffer Overflow Attacks without Explicit Sensor Data Objects. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:50-0 [Conf ] Omaima Bamasak , Ning Zhang Achieving Distributed Trusted Services. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:56-61 [Conf ] Vandana Gunupudi , Stephen R. Tate Performance Evaluation of Data Integrity Mechanisms for Mobile Agents. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:62-69 [Conf ] Sampada Chavan , Khusbu Shah , Neha Dave , Sanghamitra Mukherjee , Ajith Abraham , Sugata Sanyal Adaptive Neuro-Fuzzy Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:70-74 [Conf ] Janica Edmonds , Mauricio Papa Cryptographic Protocol Analysis using Goal Extraction. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:75-80 [Conf ] Sachin P. Joglekar , Stephen R. Tate ProtoMon: Embedded Monitors for Cryptographic Protocol Intrusion Detection and Prevention. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:81-0 [Conf ] Jeongseok Seo , Han-Sung Kim , Sanghyun Cho , Sung Deok Cha Web Server Attack Categorization based on Root Causes and Their Locations. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:90-96 [Conf ] Rong-Tai Liu , Nen-Fu Huang , Chia-Nan Kao , Chih-Hao Chen , Chi-Chieh Chou A Fast Pattern-Match Engine for Network Processor-based Network Intrusion Detection System. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:97-101 [Conf ] Chaoyang Zhang , Yukong Zhang A Modified Optical Image Reconstruction Model with Information Feedback. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:102-106 [Conf ] Hongmei Deng , Anindo Mukherjee , Dharma P. Agrawal Threshold and Identity-based Key Management and Authentication for Wireless Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:107-111 [Conf ] David Llewellyn-Jones , Madjid Merabti , Qi Shi , Bob Askwith An Extensible Framework for Practical Secure Component Composition in a Ubiquitous Computing Environment. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:112-117 [Conf ] Alfredo Cuzzocrea , Fernando Bellas Distributed Knowledge Networks: Towards a New Paradigm for Delivering Knowledge. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:118-123 [Conf ] Joonsang Baek , Yuliang Zheng Identity-Based Threshold Signature Scheme from the Bilinear Pairings. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:124-128 [Conf ] William D. Neumann HORSE: An Extension of an r-Time Signature Scheme With Fast Signing and Verification. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:129-0 [Conf ] Renée Turban Recurrent Exercises for Introductory Human Computer Interaction Courses. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:136-140 [Conf ] Tomasz Müldner , Elhadi Shakshuki A New Approach to Learning Algorithms. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:141-145 [Conf ] Antoni Martínez-Ballesté , Francesc Sebé , Josep Domingo-Ferrer Computer Skills Training to (Middle-aged) Adults: Problems and Program. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:146-150 [Conf ] Paul Douglas , Steve Barker Dependency Theory E-Learning Tool. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:151-155 [Conf ] Chih-Ping Chu , Ching-Pao Chang , Chung-Wei Yeh , Yu-Fang Yeh A Web-Service Oriented Framework for building SCORM Compatible Learning Management Systems. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:156-0 [Conf ] J. R. Parker Games and Animation: Collaborations Between the Arts and Computer Science. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:164-168 [Conf ] Paul S. Wang , Yi Zhou , Xiao Zou Web-based Mathematics Education: MeML Design and Implementation. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:169-175 [Conf ] Kai Schramm , Christof Paar IT Security Project: Implementation of the Advanced Encryption Standard (AES) on a Smart Card. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:176-180 [Conf ] Pavel Azalov , Fani Zlatarova An Instructor's Environment for Automatic Generation of Problem Sequences. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:181-185 [Conf ] Jill E. Courte The Development of a Philosophy for an Applied Web Programming Curriculum. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:186-0 [Conf ] Yi-fang Brook Wu , Xin Chen Assessing Distance Learning Student's Performance: A Natural Language Processing Approach to Analyzing Class Discussion Messages. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:192-196 [Conf ] Dilermando Piva Jr. , Ricardo Luís de Freitas , Mauro Sérgio Miskulin , Gilberto Shigueo Nakamiti , Carlos Miguel Tobar Auxiliar: A Case-Based System to Assist Online Courses. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:197-201 [Conf ] Mohammed Abdel Razek , Claude Frasson , Marc Kaltenbach Building an Effective Groupware System. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:202-206 [Conf ] Zongkai Yang , Gang Zhao , Di Wu , Jianhua He A Standard Visual Courseware Authoring Tool Based on Content Packaging Specification. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:207-211 [Conf ] Michael Blumenstein , Steve Green , Ann Nguyen , Vallipuram Muthukkumarasamy GAME: A Generic Automated Marking Environment for Programming Assessment. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:212-0 [Conf ] Sheikh Iqbal Ahamed A Novel Approach for New E-commerce Product Positioning and to-go/not-to go with Rapid Prototyping Experience. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:218-222 [Conf ] Chima Adiele , Sylvanus A. Ehikioya Dynamic Identification of Correspondence Assertions for Electronic Commerce Data Integration. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:223-227 [Conf ] Amey Dharurkar , Shrideep Pallickara , Geoffrey Fox A Topology Viewer for Distributed Brokering Systems. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:228-234 [Conf ] Ann Johansson The Impacts of Professions in Systems Development. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:235-240 [Conf ] Qiong Liu , Xin Lu , Fuji Ren , Shingo Kuroiwa Automatic Estimation of Stock Market Forecasting and Generating the Corresponding Natural Language Expression. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:241-245 [Conf ] Rajiv Dharaskar Special Technique for Optimizing Teaching-Learning Process in CBT Software. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:246-250 [Conf ] Nazli Goharian , David A. Grossman , N. Raju Extending the Undergraduate Computer Science Curriculum to Include Data Mining. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:251-254 [Conf ] Chien-Min Wang , David Turner Extending the Wiki Paradigm for Use in the Classroom. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:255-0 [Conf ] Albert Hoang Information Retrieval with Principal Components. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:262-266 [Conf ] Pik-Shan Cheung , Ruizhang Huang , Wai Lam Financial Activity Mining from Online Multilingual News. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:267-271 [Conf ] Zhenya Zhang , Enhong Chen , Jin Wang , Xufa Wang Enabling Personalization Recommendation With WeightedFP for Text Information Retrieval Based on User-Focus. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:272-276 [Conf ] Magdalene P. Ting , Vishal Seth , Jerry Gao The e-Salesman System. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:277-282 [Conf ] Jihong Zeng , Peter A. Bloniarz From Keywords to Links: an Automatic Approach. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:283-286 [Conf ] Daniel Berleant , Jinghao Miao , Zhong Gu , Dongping Xu Toward Dialogues With Documents: MultiBrowser. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:287-294 [Conf ] Jinghao Miao , Daniel Berleant From Paragraph Networks to Document Networks. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:295-0 [Conf ] Guangming Xing , Dongli Zhang Refined Extended Preorder Index with Path Information. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:304-308 [Conf ] Amanda Spink , Minsoo Park , Bernard J. Jansen , Jan O. Pedersen Multitasking Web Search on Alta Vista. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:309-313 [Conf ] Takanori Mouri , Hiroyuki Kitagawa Extracting New Topic Contents from Hidden Web Sites. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:314-319 [Conf ] Craig Chariton , Min-Hyung Choi Enhancing Usability of Flight and Fare Search Functions for Airline and Travel Web Sites. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:320-325 [Conf ] Razvan Stefan Bot , Yi-fang Brook Wu , Xin Chen , Quanzhi Li A Hybrid Classifier Approach for Web Retrieved Documents Classification. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:326-0 [Conf ] Christos Bouras , Vaggelis Kapoulas , Ioannis Misedakis Web Page Fragmentation for Personalized Portal Construction. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:332-336 [Conf ] Bienvenido Vélez , Amaury Cabarcas , Lizvette Malavé TIN: An Interactive Image Navigator Providing Ubiquitous Access To Distributed Geo-Spatial Data. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:337-343 [Conf ] Shou-Hsuan Stephen Huang , Carlos Humberto Molina-Rodríguez , Jesús Ubaldo Quevedo-Torrero , Mario Francisco Fonseca-Lozada Exploring Similarity among Web Pages Using the Hyperlink Structure. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:344-348 [Conf ] Wendy T. Lucas , Heikki Topi Anxiously Seeking Answers: How Attitude Affects Search Performance. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:349-353 [Conf ] Hongzhi Wang , Jianzhong Li , Jizhou Luo , Zhenying He XCpaqs: Compression of XML Document with XPath Query Support. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:354-0 [Conf ] Silvana Castano , Alfio Ferrara , Stefano Montanelli , Gianpaolo Racca Matching Techniques for Resource Discovery in Distributed Systems Using Heterogeneous Ontology Descriptions. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:360-366 [Conf ] Bill Vassiliadis , Kostas Giotopoulos , Konstantinos Votis , Spyros Sioutas , Nikos Bogonikolos , Spiros Likothanassis Application Service Provision through the Grid: Business models and Architectures. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:367-371 [Conf ] Giovanni Aloisio , Massimo Cafaro , Sandro Fiore , Maria Mirto The GRelC Library: A Basic Pillar in the Grid Relational Catalog Architecture. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:372-376 [Conf ] Rebecca L. Collins , James S. Plank Content-Addressable IBP - Rationale, Design and Performance. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:377-281 [Conf ] Alexandra I. Cristea , Michael Verschoor The LAG Grammar for Authoring the Adaptive Web. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:382-288 [Conf ] Flavius Frasincar , Peter Barna , Geert-Jan Houben , Zoltán Fiala Adaptation and Reuse in Designing Web Information Systems. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:387-291 [Conf ] Fabrizio Silvestri , Ranieri Baraglia , Paolo Palmerini , Massimo Serranó On-line Generation of Suggestions for Web Users. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:392-397 [Conf ] Nick Golovin , Erhard Rahm Reinforcement Learning Architecture for Web Recommendations. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:398-0 [Conf ] Tarek Abbes , Adel Bouhoula , Michaël Rusinowitch Protocol Analysis in Intrusion Detection Using Decision Tree. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:404-408 [Conf ] Zili Shao , Chun Xue , Qingfeng Zhuge , Edwin Hsing-Mean Sha , Bin Xiao Security Protection and Checking in Embedded System Integration Against Buffer Overflow Attacks. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:409-413 [Conf ] Sriranjani Sitaraman , S. Venkatesan Low-Intrusive Consistent Disk Checkpointing: A Tool for Digital Forensics. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:414-418 [Conf ] Ram Dantu , João W. Cangussu , Arun Yelimeli Dynamic Control of Worm Propagation. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:419-423 [Conf ] Sheikh Iqbal Ahamed , Alex Pezewski , Al Pezewski Towards Framework Selection Criteria and Suitability for an Application Framework. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:424-0 [Conf ] K. Suzanne Barber , Jisun Park Robust Partner Selection Scheme for Information Quality Assurance despite Uncertainty in Open Multi-Agent Systems. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:430-434 [Conf ] Austin Gilbert , Ajith Abraham , Marcin Paprzycki A System for Ensuring Data Integrity in Grid Environments. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:435-439 [Conf ] Andrew H. Sung , Gopalakrishna Reddy Tadiparthi , Srinivas Mukkamala Defeating the Current Steganalysis Techniques (Robust Steganography). [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:440-444 [Conf ] Ram Dantu , Kall Loper , Prakash Kolan Risk Management using Behavior based Attack Graphs. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:445-449 [Conf ] Fahad T. Alotaiby , Jim X. Chen A Model for Team-based Access Control (TMAC 2004). [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:450-0 [Conf ] Mark Smith , Alireza Khotanzad An Object-Based Approach for Digital Video Retrieval. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:456-459 [Conf ] Fu-Shing Sun , Chun-Hung Tzeng A Mathematical Model of Similarity and Clustering. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:460-464 [Conf ] Soon Myoung Chung , Murali Mangamuri Mining Association Rules from Relations on a Parallel NCR Teradata Database System. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:465-470 [Conf ] Matteo Magnani , Danilo Montesi A New Reparation Method for Incomplete Data in the Context of Supervised Learning. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:471-475 [Conf ] Yang Sok Kim , Sung Sik Park , Edward Deards , Byeong Ho Kang Adaptive Web Document Classification with MCRDR. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:476-0 [Conf ] Frank Adelstein , Prasanth Alla , Rob Joyce , Golden G. Richard III Physically Locating Wireless Intruders. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:482-0 [Conf ] Joseph Fong , Hing Kwok Wong Replicate Relational and XML Databases for Internet Computing. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:492-496 [Conf ] D. S. Yadav , Rajeev Agrawal , D. S. Chauhan , R. C. Saraswat , Arun K. Majumdar Modeling Long Duration Transactions with Time Constraints in Active Database. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:497-501 [Conf ] Arthur C. S. Wong , Victor C. S. Lee , Kwok-Wa Lam Accessing Temporal Data Objects in Mobile Computing Environments. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:502-506 [Conf ] A. K. Sharma , A. Goswami , D. K. Gupta Fuzzy Inclusion Dependencies in Fuzzy Relational Databases. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:507-510 [Conf ] Bryan Hin Cheung Poon , Kwok-Wa Lam , Victor C. S. Lee Server-side Broadcast Transaction in Mobile Computing Environment. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:511-0 [Conf ] Luiz Camolesi Jr. Survivability and Applicability in Database Constraints: Temporal Boundary to Data Integrity Scenarios. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:518-522 [Conf ] Steve Barker , Paul Douglas Protecting Federated Databases Using A Practical Implementation of a Formal RBAC Policy. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:523-527 [Conf ] Jamal R. Alsabbagh , Vijay V. Raghavan A Model for Multiple-Query Processing Based upon Strong Factoring. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:528-533 [Conf ] Sheikh Iqbal Ahamed , Sanjay Vallecha Component-based Embedded Database for Mobile Embedded Systems. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:534-538 [Conf ] Eric Pardede , J. Wenny Rahayu , David Taniar Mapping Methods and Query for Aggregation and Association in Object-Relational Database using Collection. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:539-0 [Conf ] John Rothfork Community, Context, and Distance Education. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:546-550 [Conf ] Moses Garuba , Ronald Langrin , Legand L. Burge III A Constraint-Based Query Modification Engine for Retrofitting COTS DBMS's. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:551-556 [Conf ] Joseph Gill , Legand L. Burge III , Moses Garuba The Design and Implementation of the MESSENGER Trajectory Database. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:557-561 [Conf ] John T. Minor , Laxmi Gewali Pedagogical Issues in Programming Languages. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:562-565 [Conf ] Moses Garuba , Edward Appiah , Legand L. Burge III Performance Study of a MLS/DBMS Implemented as a Kernelized Architecture. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:566-0 [Conf ] Kentaro Sano , Chiaki Takagi , Ryusuke Egawa , Ken-ichi Suzuki , Tadao Nakamura A Systolic Memory Architecture for Fast Codebook Design based on MMPDCL Algorithm. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:572-578 [Conf ] Marjan Karkooti , Joseph R. Cavallaro Semi-Parallel Reconfigurable Architectures for Real-Time LDPC Decoding. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:579-585 [Conf ] Robert Steele , Yuri Ventsov , Tharam S. Dillon An Object-Oriented Database-based Architecture for Mobile Enterprise Applications. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:586-590 [Conf ] Hassan Reza , Emanuel S. Grant A Formal Approach to Software Architecture of Agent-Base Systems. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:591-0 [Conf ] Weiting Cai , Malek Adjouadi Minimization of Boundary Artifacts on Scalable Image Compression Using Symmetric-Extended Wavelet Transform. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:598-602 [Conf ] Mukesh A. Zaveri , Shabbir N. Merchant , Uday B. Desai Arbitrary Trajectories Tracking using Multiple Model Based Particle Filtering in Infrared Image Sequence. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:603-607 [Conf ] Nianjun Liu , Richard I. A. Davis , Brian C. Lovell , Peter J. Kootsookos Effect of Initial HMM Choices in Multiple Sequence Training for Gesture Recognition. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:608-613 [Conf ] Chunliang Gu , Baocai Yin , Yongli Hu , Shiquan Cheng Resampling Based Method for Pixel-wise Correspondence between 3D Faces. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:614-619 [Conf ] Xin Lu , Qiong Liu , Shunichiro Oe Recognizing Non-rigid Human Actions Using Joints Tracking in Space-time. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:620-0 [Conf ] EunSang Bak , Kayvan Najarian Robust Segmentation Using Parametric and Nonparametric Local Spatial Posteriors. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:626-630 [Conf ] Ming-Jung Seow , Rajkiran Gottumukkal , Deepthi Valaparla , Vijayan K. Asari A Robust Face Recognition System for Real Time Surveillance. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:631-635 [Conf ] Madasu Hanmandlu , Vamsi Krishna Madasu , Shantaram Vasikarla A Fuzzy Approach to Texture Segmentation. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:636-642 [Conf ] Li Shen , Fillia Makedon Spherical Parameterization for 3D Surface Analysis in Volumetric Images. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:643-649 [Conf ] Mohammad Eyadat Factors that Affect the Performance of the DCT-Block Based Image Watermarking Algorithms. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:650-0 [Conf ] Hau T. Ngo , Li Tao , Vijayan K. Asari Design of an Efficient Architecture for Real-time Image Enhancement Based on a Luma-Dependent Nonlinear Approach. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:656-660 [Conf ] B. Yegnanarayana , Anil Kumar Sao , B. V. K. Vijaya Kumar , Marios Savvides Determination of Pose Angle of Face using Dynamic Space Warping (DSW). [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:661-664 [Conf ] Madasu Hanmandlu , John See , Shantaram Vasikarla Fuzzy Edge Detector Using Entropy Optimization. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:665-670 [Conf ] Reza Safabakhsh , Shiva Zaboli , Arash Tabibiazar Digital Watermarking on Still Images Using Wavelet Transform. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:671-675 [Conf ] Ashfaqur Rahman , M. Manzur Murshed , Laurence Dooley Feature Weighting Methods for Abstract Features Applicable to Motion based Video Indexing. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:676-0 [Conf ] Vladimir Uskov , Alexander Uskov National Science Foundation Project on Advanced Online Education in Information Technology. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:682-686 [Conf ] Guang-Lei Song , Kang Zhang Visual XML Schemas Based on Reserved Graph Grammars. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:687-691 [Conf ] J. R. Parker , M. Baumback User Interface Augmentation: Vision and Sound. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:692-697 [Conf ] Xiang Zheng , Bing-Feng Zhou , Xi-Feng Fang , Jin-Wen Sun , Duan-Feng Si Combining the Product of Interactive Multimedia Creator with MPEG4 Technology. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:698-0 [Conf ] Michael Blumenstein Experience in Teaching Object-Oriented Concepts to First Year Students with Diverse Backgrounds. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:704-708 [Conf ] David Chiu Web-Based Mathematics Education with MathChat. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:709-717 [Conf ] Alexandra I. Cristea Adaptive Course Creation for All. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:718-722 [Conf ] Legand L. Burge III , Moses Garuba , Charita Brent Improving Retention of Minority Freshmen in Engineering by Applying the Six Sigma Methodology. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:723-728 [Conf ] Bruce I. Mills , Martha W. Evens , Reva Freedman Implementing Directed Lines of Reasoning in an Intelligent Tutoring System Using the Atlas Planning Environment. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:729-0 [Conf ] Hiroyuki Takizawa , Hiroaki Kobayashi A Fast Computation Scheme of Partial Distortion Entropy Updating. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:736-741 [Conf ] M. Nithish , C. Ramakrishna , J. Ramkumar , Priya Lakshmi Design and Evaluation of Intermediate Retransmission and Packet Loss Detection Schemes for MPEG4 Transmission. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:742-746 [Conf ] Somphop Chokchaitam , Prasit Teekaput Embedded Error Detection in Arithmetic Coding Using Markers. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:747-750 [Conf ] Shaohui Liu , Hongxun Yao , Wen Gao Steganalysis of Data Hiding Techniques in Wavelet Domain. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:751-754 [Conf ] John Istle , Pamela Mandelbaum , Emma Regentova Online Compression of ASCII Files. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:755-0 [Conf ] Chang N. Zhang , Honglan Zhong An Integrated Approach for Database Security and Fault Tolerance. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:762-766 [Conf ] Dragos Trinca Towards New Algorithms for Data Compression Using Adaptive Codes. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:767-771 [Conf ] Ravi Sankar Veerubhotla , Ashutosh Saxena , Ved Prakash Gulati , Arun K. Pujari On Gossip Codes and Traceability Schemes. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:772-777 [Conf ] Yan Chen , Zhiwei Qu , Zhenhua Zhang , Boon-Lock Yeo Data Redundancy and Compression Methods for a Disk-Based Network Backup System. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:778-785 [Conf ] Li Shen , Peizhong Lu , Xiangyang Luo , Yan Zou Equivalence of Punctured Convolutional Codes from Shift Equivalent Puncturing Patterns. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:786-0 [Conf ] K. Venkatesh , S. Aravind , R. Ganapath , T. Srinivasan A High Performance Parallel IP Lookup Technique Using Distibuted Memory Organization. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:792-797 [Conf ] Jeffrey E. Boyd , Maxwell Sayles , Luke Olsen , Paul Tarjan Content Description Servers for Networked Video Surveillance. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:798-803 [Conf ] Yuqing Mai , Radhika Upadrashta , Xiao Su J-Honeypot: A Java-Based Network Deception Tool with Monitoring and Intrusion Detection. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:804-808 [Conf ] Eugin Hyun , Kwang-Su Seong The Effective Buffer Architecture for Data Link Layer of PCI Express. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:809-0 [Conf ]