The SCEAS System
Navigation Menu

Conferences in DBLP

International Symposium on Information Technology (itcc)
2004 (conf/itcc/2004-2)

  1. S. R. Subramanya, Hiral Patel, Ilker Ersoy
    Performance Evaluation of Block-Based Motion Estimation Algorithms and Distortion Measures. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:2-7 [Conf]
  2. Lei Zhu
    Geoblock: A LVQ-Based Framework for Geographic Image Retrieval. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:8-12 [Conf]
  3. Kazem Taghva, Jeffrey S. Coombs, Ray Pareda, Thomas A. Nartker
    Language Model-based Retieval for Farsi Documents. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:13-17 [Conf]
  4. Iker Gondra, Douglas R. Heisterkamp
    Summarizing Inter-Query Learning in Content-Based Image Retrieval via Incremental Semantic Clustering. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:18-22 [Conf]
  5. Ilker Ersoy, Filiz Bunyak, S. R. Subramanya
    A Framework for Trajectory Based Visual Event Retrieval. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:23-0 [Conf]
  6. German Florez, Zhen Liu, Susan Bridges, Rayford B. Vaughn, Anthony Skjellum
    Detecting Anomalies in High-Performance Parallel Programs. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:30-34 [Conf]
  7. Shaohua Zhang, Ning Gu, Saihan Li
    Grid Workflow Based on Dynamic Modeling and Scheduling. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:35-39 [Conf]
  8. Nader Mohamed, Jameela Al-Jaroodi, Hong Jiang
    Extensible Communication Architecture for Grid Nodes. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:40-44 [Conf]
  9. Steve Barker
    Access Policy Specification for Web Applications. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:45-49 [Conf]
  10. Bing Wu, Matthew J. Dovey, Muan Hong Ng, Kaihsu Tai, Stuart E. Murdock, Paul Jeffreys, Simon J. Cox, Jonathan W. Essex, Mark S. P. Sansom
    A Web / Grid Portal Implementation of BioSimGrid: A Biomolecular Simulation Database. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:50-0 [Conf]
  11. Giovanni Aloisio, Massimo Cafaro, Italo Epicoco, Gianvito Quarta
    A Problem Solving Environment for Remote Sensing Data Processing. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:56-61 [Conf]
  12. Minjun Wang, Geoffrey Fox, Shrideep Pallickara
    A Demonstration of Collaborative Web Services and Peer-to-Peer Grids. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:62-67 [Conf]
  13. Shrideep Pallickara, Geoffrey Fox
    On the Matching of Events in Distributed Brokering Systems. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:68-76 [Conf]
  14. Michele Di Santo, Nadia Ranaldo, D. Villacci, Eugenio Zimeo
    Performing Security Analysis of Large Scale Power Systems with a Broker-based Computational Grid. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:77-82 [Conf]
  15. Giovanni Aloisio, Massimo Cafaro, R. Cesari, C. Mangia, Gian Paolo Marra, M. Miglietta, Maria Mirto, U. Rizza, I. Schipa, A. Tanzarella
    G-AQFS: Grid Computing Exploitation for the Management of Air Quality in Presence of Complex Meteorological Circulations. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:83-0 [Conf]
  16. Mario Cannataro, Carmela Comito, Antonella Guzzo, Pierangelo Veltri
    Integrating Ontology and Workflow in PROTEUS, a Grid-Based Problem Solving Environment for Bioinformatics. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:90-94 [Conf]
  17. Christoph Jung, Martin Einhoff, Stefan Noll, Norbert Schiffner
    Grid Job Builder - A Workflow Editor for Computing Grids. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:95-99 [Conf]
  18. Mei Lin, Zhangxi Lin
    A Cost-Effective Critical Path Approach for Service Priority Optimization in the Grid Computing Economy. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:100-104 [Conf]
  19. Said Mirza Pahlevi, Isao Kojima
    OGSA-WebDB: An OGSA-Based System for Bringing Web Databases into the Grid. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:105-0 [Conf]
  20. Bilal Rizvi, Emmanuel Fernández-Gaucherand
    Effectiveness of Advanced and Authenticated Packet Marking Scheme for Traceback of Denial of Service Attacks. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:111-115 [Conf]
  21. Aishwarya Iyer, Lorie M. Liebrock
    Vulnerability Scanning for Buffer Overflow. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:116-117 [Conf]
  22. Vesselin Tzvetkov
    Disaster coverable PKI model based on Majority Trust principle. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:118-119 [Conf]
  23. Baice Li, Senmiao Yuan
    A Novel Relevance Feedback Method in Content-Based Image Retrieval. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:120-123 [Conf]
  24. Guadalupe Aguado de Cea, Asunción Gómez-Pérez, Inmaculada Álvarez de Mon y Rego, Antonio Pareja-Lora
    OntoTag's Linguistic Ontologies: Improving Semantic Web Annotations for a Better Language Understanding in Machines. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:124-128 [Conf]
  25. Elharith Elrufaie, David A. Turner
    Bidding in P2P Content Distribution Networks using the Lightweight Currency Paradigm. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:129-130 [Conf]
  26. Benny Y. M. Fung, Vincent T. Y. Ng
    Improving Classification Performance for Heterogeneous Cancer Gene Expression Data. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:131-132 [Conf]
  27. Alberto Sillitti, Andrea Janes, Giancarlo Succi, Tullio Vernazza
    Monitoring the Development Process with Eclipse. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:133-134 [Conf]
  28. Stanislav Kurkovsky, Bhagyavati, Arris Ray, Mei Yang
    Modeling a Grid-Based Problem Solving Environment for Mobile Devices. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:135-0 [Conf]
  29. Li Tao, Vijayan K. Asari
    An Integrated Neighborhood Dependent Approach for Nonlinear Enhancement of Color Images. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:138-139 [Conf]
  30. Guangming Xing, Bill Tseng
    Extendible Range-Based Numbering Scheme for XML Document. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:140-141 [Conf]
  31. Warnill Chung, Soon-Young Park, Hae-Young Bae
    An Extension of XQuery for Moving Objects over GML. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:142-147 [Conf]
  32. Paul Lynch, Xiaocheng Luan, Maureen Prettyman, Lee Mericle, Edward Borkmann, Jonathan Schlaifer
    An Evaluation of New and Old Similarity Ranking Algorithms. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:148-149 [Conf]
  33. Ebru Celikel, Mehmet Emin Dalkiliç
    Experiments on A Secure Compression Algorithm. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:150-152 [Conf]
  34. Xukai Zou, Byrav Ramamurthy, Spyros S. Magliveras
    A GCD attack resistant CRTHACS for secure group communications. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:153-154 [Conf]
  35. Rion Dooley
    A Distributed Quadtree Dictionary Approach to Multi-Resolution Compression. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:155-156 [Conf]
  36. Satyanadh Gundimada, Vijayan K. Asari
    Face Detection Technique Based on Rotation Invariant Wavelet Features. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:157-158 [Conf]
  37. Alexia Giannoula, Dimitrios Hatzinakos
    Integrating Compression with Watermarking on Video Sequences. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:159-0 [Conf]
  38. Yasuo Narukawa, Vicenç Torra
    Fuzzy Measures and Integrals for Evaluating Strategies. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:162-166 [Conf]
  39. Ronggong Song, Larry Korba
    How to Make E-cash with Non-Repudiation and Anonymity. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:167-172 [Conf]
  40. Douglas R. Dechow
    A Workshop on Advanced Separation of Concerns and Aspect-Oriented Programming. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:173-177 [Conf]
  41. Perfecto Mariño, Heriberto Hernández, Miguel Angel Domínguez, Francisco Poza, Fernando Machado, Fernando Vázquez
    Applied Fieldbus Knowledge for ICT Engineers. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:178-182 [Conf]
  42. Yi-li Qian, Jia-heng Zheng
    An Approach to Improving the Quality of Part-of-Speech Tagging of Chinese Text. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:183-187 [Conf]
  43. Behrouz Minaei-Bidgoli, Alexander P. Topchy, William F. Punch
    Ensembles of Partitions via Data Resampling. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:188-192 [Conf]
  44. Lucas Baggio Figueira, Maria do Carmo Nicoletti
    Choosing the Initial Set of Exemplars when Learning with an NGE-based System. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:193-197 [Conf]
  45. Ray R. Hashemi, Louis A. Le Blanc, Bart J. Westgeest
    The Effects of Business Rules on Transactional Association Analysis. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:198-202 [Conf]
  46. Ranjit Bose
    Information Technologies for Education & Training in E-Government. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:203-207 [Conf]
  47. Susanna Pirttikangas, Jukka Riekki, Juha Röning
    Routine Learning: Analyzing Your Whereabouts. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:208-0 [Conf]
  48. Daniel Mallett, James Elding, Mario A. Nascimento
    Information-Content Based Sentence Extraction for Text Summarization. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:214-218 [Conf]
  49. Rebecca Cathey, Steven M. Beitzel, Eric C. Jensen, Angelo J. Pilotto, David A. Grossman
    Measuring the Scalability of Relationally Mapped Semistructured Queries. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:219-223 [Conf]
  50. Nan Zhang 0005, Tao Tao, Ravi Vijaya Satya, Amar Mukherjee
    Modified LZW Algorithm for Efficient Compressed Text Retrieval. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:224-228 [Conf]
  51. Cher-Sheng Cheng, Jean Jyh-Jiun Shann, Chung-Ping Chung
    A Unique-Order Interpolative Code for Fast Querying and Space-Efficient Indexing in Information Retrieval Systems. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:229-235 [Conf]
  52. Yalçin Çebi, Gökhan Dalkiliç
    Turkish Word N-gram Analyzing Algorithms for a Large Scale Turkish Corpus - TurCo. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:236-240 [Conf]
  53. M. Emre Celebi, Y. Alp Aslandogan
    Content-Based Image Retrieval Incorporating Models of Human Perception. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:241-245 [Conf]
  54. J. R. Parker, Brad Behm
    Use of Multiple Algorithms in Image Content Searches. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:246-0 [Conf]
  55. Nilmini Wickramasinghe, Steve Goldberg
    How M=Ec2 in Healthcare. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:252-257 [Conf]
  56. Mohammad Mahfuzul Islam, M. Manzur Murshed, Laurence Dooley
    Enhanced Cell Visiting Probability for QoS Provisioning in Mobile Multimedia Communications. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:258-262 [Conf]
  57. Jordi Herrera-Joancomartí, Josep Prieto-Blázquez, Jordi Castellà-Roca
    A Secure Electronic Examination Protocol using Wireless Networks. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:263-268 [Conf]
  58. Elaine Lawrence, John Lawrence
    Threats to the Mobile Enterprise: Jurisprudence Analysis of Wardriving and Warchalking. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:269-274 [Conf]
  59. Manuel Rodríguez-Martínez, José F. Enseñat, Elfred Pagan, Juan G. Arzola, Maniel Sotomayor, Elliot Varga
    Registration and Discovery of Services in the NetTraveler Integration System for Mobile Devices. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:275-281 [Conf]
  60. Robert Steele, Yuri Ventsov, Sri Madhisetty, Laurie Benkovich
    A Two-tier Architecture for Automated Mobile Applications. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:282-0 [Conf]
  61. Li Shaozi, You Wenjian, Li Tangqiu, Chen Huowang
    Lexical-chain and It's Application in Text Filtering. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:288-292 [Conf]
  62. Haytham Alsharaf, Sylviane Cardey, Peter Greenfield, Yihui Shen
    Problems and Solutions in Machine Translation Involving Arabic, Chinese and French. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:293-297 [Conf]
  63. Mohamed Abdel Fattah, Fuji Ren, Shingo Kuroiwa
    Internet Archive as a Source of Bilingual Dictionary. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:298-302 [Conf]
  64. Steffen Werner, Matthias Wolff, Matthias Eichner, Rüdiger Hoffmann
    Integrating Speech Enabled Services in a web-based e-Learning Environment. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:303-307 [Conf]
  65. J. Makinen, J. Vainio
    Source Signal based Rate Adaptation for GSM AMR Speech Codec. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:308-313 [Conf]
  66. Yvette Yannick Mathieu
    Linguistic Knowledge and Automatic Semantic Representation of Emotions and Feelings. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:314-318 [Conf]
  67. Gökhan Dalkiliç, Yalçin Çebi
    Word Statistics of Turkish Language on a Large Scale Text Corpus - TurCo. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:319-0 [Conf]
  68. Maumita Bhattacharya
    An Informed Operator Approach to Tackle Diversity Constraints in Evolutionary Search. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:326-330 [Conf]
  69. V. Radha, Ved Prakash Gulati, Arun K. Pujari
    Efficient Multicast E-Services Over APPCAST. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:331-336 [Conf]
  70. S. Ganesh, M. Jayaraj, V. Kalyan, Srinivasa Murthy, G. Aghila
    Ontology-based Web Crawler. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:337-341 [Conf]
  71. Reza Hashemian, Bipin Sreedharan
    A Hybrid Number System And Its Application In FPGA-DSP Technology. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:342-346 [Conf]
  72. S. Venkatraman, Ajith Abraham, Marcin Paprzycki
    Significance of Steganography on Data Security. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:347-351 [Conf]
  73. Kai Luo, Shahram Latifi, Kazem Taghva, Emma Regentova
    Recognition and Identification of Form Document Layouts. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:352-356 [Conf]
  74. Nadia Nedjah, Luiza de Macedo Mourelle
    Evolutionary Time Scheduling. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:357-361 [Conf]
  75. Senthamil Ilango, Johnson Thomas
    Group Key Management utilizing Huffman and Petrick based approaches. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:362-366 [Conf]
  76. Pedram Azad, Tilo Gockel, Rüdiger Dillmann
    3D Shape Acquisition using a combined SSD and Least Squares Correlation Approach. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:367-371 [Conf]
  77. Ajumobi Udechukwu, Ken Barker, Reda Alhajj
    Mining User Navigational Patterns in Dynamically Changing Environments. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:372-0 [Conf]
  78. Hsien-Chou Liao, Yi-Wei Ting, Shih-Hsuan Yen, Chou Chen Yang
    Ant Mobility Model Platform for Network Simulator. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:380-384 [Conf]
  79. Muhammad Mahmudul Islam, Ronald Pose, Carlo Kopp
    Multiple Directional Antennas in Suburban Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:385-389 [Conf]
  80. Xianhui Xie, Larry Hughes
    Statistic-based Routing in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:390-394 [Conf]
  81. Ram Dantu, Sachin P. Joglekar
    Collaborative Vision using Networked Sensors. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:395-399 [Conf]
  82. L. Lanae Neild, Roy P. Pargas
    Investigating Peer-to-peer Systems for Resource Sharing within a Small Group of Nodes. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:400-404 [Conf]
  83. Mike Burmester, Tri Van Le
    Secure Multipath Communication in Mobile Ad hoc Networks. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:405-409 [Conf]
  84. Robert Steele, Marcin Lubonski, Yuri Ventsov, Elaine Lawrence
    Accessing SMIL-based Dynamically Adaptable Multimedia Presentations from Mobile Devices. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:410-0 [Conf]
  85. Jianhong Li, Xiaojun Liang, Laxmi Gewali
    Extended DCEL Data Structure for Mobile Computing. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:416-420 [Conf]
  86. Narudol Chankuang, Suphamit Chittayasothorn
    An Object and XML Database Schemas Design Tool. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:421-427 [Conf]
  87. Vincent T. Y. Ng, Chan Chi Kong, Shiu Hin Wang
    Prefetching XML Data with Abstract Query Mining. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:428-432 [Conf]
  88. Alexandr Seleznyov, Stephen Hailes
    Distributed Knowledge Management for Autonomous Access Control in Computer Networks. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:433-437 [Conf]
  89. Mohammad Ashraful Alam
    Software Security in Bangladesh with .NET Framework: A Roadmap. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:438-443 [Conf]
  90. Shengru Tu, Maik Flanagin, Ying Wu, Mahdi Abdelguerfi, Eric Normand, Venkata Mahadevan, Jay J. Ratcliff, Kevin Shaw
    Design Strategies to Improve Performance of GIS Web Services. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:444-0 [Conf]
  91. Yi-fang Brook Wu, Quanzhi Li, Razvan Stefan Bot, Xin Chen
    KIP: A Keyphrase Identification Program with Learning Functions. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:450-454 [Conf]
  92. Syed Riaz Ahmed
    Applications of Data Mining in Retail Business. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:455-459 [Conf]
  93. Abdullah Uz Tansel
    Integrity Constraints in Temporal Relational Databases. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:460-464 [Conf]
  94. Y. Alp Aslandogan, Gauri A. Mahajani, Stan Taylor
    Evidence Combination in Medical Data Mining. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:465-469 [Conf]
  95. Kwok-Wa Lam, Victor C. S. Lee
    Building Decision Trees Using Functional Dependencies. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:470-473 [Conf]
  96. Kang Hyuk Lee, Byeong Ho Kang
    A New Framework for Uncertainty Sampling: Exploiting Uncertain and Positive-Certain Examples in Similarity-Based Text Classification. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:474-479 [Conf]
  97. Charles Wesley Ford, Chia-Chu Chiang, Hao Wu, Radhika R. Chilka, John R. Talburt
    Confidence on Approximate Query in Large Datasets. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:480-0 [Conf]
  98. Jonathan Lutz, M. Anwarul Hasan
    High Performance FPGA based Elliptic Curve Cryptographic Co-Processor. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:486-492 [Conf]
  99. Nazar A. Saqib, Francisco Rodríguez-Henríquez, Arturo Díaz-Pérez
    A Parallel Architecture for Computing Scalar Multiplication on Hessian Elliptic Curves. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:493-497 [Conf]
  100. Alireza Hodjat, Patrick Schaumont, Ingrid Verbauwhede
    Architectural Design Features of a Programmable High Throughput AES Coprocessor. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:498-502 [Conf]
  101. Nadia Nedjah, Luiza de Macedo Mourelle
    Multi-Objective Evolutionary Hardware for RSA-Based Cryptosystems. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:503-507 [Conf]
  102. Luiza de Macedo Mourelle, Nadia Nedjah
    Efficient Cryptographic Hardware Using the Co-Design Methodology. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:508-512 [Conf]
  103. Jan Pelzl, Thomas J. Wollinger, Christof Paar
    High Performance Arithmetic for special Hyperelliptic Curve Cryptosystems of Genus Two. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:513-517 [Conf]
  104. Manfred Schimmler, Viktor Bunimov
    Fast Modular Multiplication by Operand Changing. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:518-524 [Conf]
  105. An Yu, David S. Brée
    A Clock-less Implementation of the AES Resists to Power and Timing Attacks. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:525-532 [Conf]
  106. Nedeljko Cvejic, Tapio Seppänen
    Increasing Robustness of LSB Audio Steganography Using a Novel Embedding Method. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:533-537 [Conf]
  107. Guido Bertoni, Luca Breveglieri, Thomas J. Wollinger, Christof Paar
    Finding Optimum Parallel Coprocessor Design for Genus 2 Hyperelliptic Curve Cryptosystems. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:538-0 [Conf]
  108. Siddika Berna Örs, Frank K. Gürkaynak, Elisabeth Oswald, Bart Preneel
    Power-Analysis Attack on an ASIC AES implementation. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:546-552 [Conf]
  109. Michele Elia, Manuel Leone
    A Basis-Independent Algorithm to Design Fast Parallel Multipliers over GF(2m). [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:553-559 [Conf]
  110. Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume
    On the Importance of Protecting Delta in SFLASH against Side Channel Attacks. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:560-568 [Conf]
  111. Ruby B. Lee, Zhijie Shi, Yiqun Lisa Yin, Ronald L. Rivest, Matthew J. B. Robshaw
    On Permutation Operations in Cipher Design. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:569-577 [Conf]
  112. Herwin Chan, Alireza Hodjat, Jun Shi, Richard D. Wesel, Ingrid Verbauwhede
    Streaming Encryption for a Secure Wavelength and Time Domain Hopped Optical Network. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:578-582 [Conf]
  113. Gaël Rouvroy, François-Xavier Standaert, Jean-Jacques Quisquater, Jean-Didier Legat
    Compact and Efficient Encryption/Decryption Module for FPGA Implementation of the AES Rijndael Very Well Suited for Small Embedded Applications. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:583-587 [Conf]
  114. Amir K. Daneshbeh, M. Anwarul Hasan
    Area Efficient High Speed Elliptic Curve Cryptoprocessor for Random Curves. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:588-0 [Conf]
  115. Xiang Li, Rahul Ramachandran, Matt He, Sunil Movva, John A. Rushing, Sara J. Graves, Wladislaw Lyatsky, Arjun Tan, Glynn Germany
    Comparing Different Thresholding Algorithms for Segmenting Auroras. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:594-601 [Conf]
  116. Naveen Santhanam, Timothy S. Newman, Dennis L. Gallagher
    Exploiting Known Latitudinal Variations for Improved Limited-Angle Tomographic Reconstruction of the Plasmasphere. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:602-606 [Conf]
  117. Erzsébet Merényi, William H. Farrand, Philip Tracadas
    Mapping Surface Materials on Mars from Mars Pathfinder Spectral Images with HYPEREYE. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:607-614 [Conf]
  118. Stamatios V. Kartalopoulos
    Factors Affecting the Signal Quality in Optical Data Transmission and Estimation Method for BER and SNR. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:615-619 [Conf]
  119. Artyom M. Grigoryan, Serkan Dursun, Emma Regentova
    Lossless Encoding Based on Redistribution of Statistics. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:620-624 [Conf]
  120. Chia-Chu Chiang, Peiyi Tang
    On the Design of Heterogeneous Applications for Distributed Coordination. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:625-0 [Conf]
  121. Chadia Moghrabi, Tang-Ho Lê, Jean Roy, Johanne Hachey
    Digital Library Resources Description. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:632-637 [Conf]
  122. Jahanshah Kabudian, Mohammad Reza Meybodi, Mohammad Mehdi Homayounpour
    Applying Continuous Action Reinforcement Learning Automata(CARLA) to Global Training of Hidden Markov Models. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:638-642 [Conf]
  123. Karla Felix Navarro
    Wearable, Wireless Brain Computer Interfaces In Augmented Reality Environments. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:643-647 [Conf]
  124. Phillip G. Bradford, Marcus Brown, Josh Perdue, Bonnie Self
    Towards Proactive Computer-System Forensics. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:648-652 [Conf]
  125. Farzin Ahmadianpour, M. Omair Ahmad
    A Novel Approach for Bi-directional Motion Estimation and Compensation. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:653-657 [Conf]
  126. Zhiwen Yu, Jianhua Gu, Xingshe Zhou, Zhiyi Yang
    Fuzzy Clustering for TV Program Classification. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:658-0 [Conf]
  127. Pornthep Navakitkanok, Supavadee Aramvith
    Improved Rate Control for Advanced Video Coding (AVC)Standard under Low Delay Constraint. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:664-668 [Conf]
  128. Mohan M. Trivedi, Kohsia S. Huang, Tarak Gandhi, Brett Hall, Kimberly Harlow
    Distributed Omni-Video Arrays and Digital Tele-Viewer for Customized Viewing, Event Detection and Notification. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:669-674 [Conf]
  129. Foued Derraz, Mohamed Beladgham, M'hamed Khelif
    Application of Active Contour Models in Medical Image Segmentation. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:675-681 [Conf]
  130. Cheruku Venkateswarlu, Sumanth Yenduri, S. Sitharama Iyengar
    Digital Analysis of Thermal Infrared Imagery using Temperature Mapping. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:682-688 [Conf]
  131. Abdullah Al Yusuf, M. Manzur Murshed, Laurence Dooley
    An HVS-based Motion Vector Composition Algorithm for Spatial Resolution Transcoding. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:689-693 [Conf]
  132. K. V. Ramana, S. Basha
    Neural Image Recognition System with Application to Tuberculosis Detection. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:694-698 [Conf]
  133. Xiao Su, Yi Shang
    Error Concealment of Transform Coded Images With Continuous QoS. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:699-703 [Conf]
  134. Jianyun Xu, Andrew H. Sung, Peipei Shi, Qingzhong Liu
    JPEG Compression Immune Steganography Using Wavelet Transform. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:704-708 [Conf]
  135. Narges Ahmidi, Reza Safabakhsh
    A Novel DCT-based Approach for Secure Color Image Watermarking. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:709-713 [Conf]
  136. Zhiguo Cheng, Yuncai Liu
    Efficient Technique for Ellipse Detection Using Restricted Randomized Hough Transform. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:714-0 [Conf]
  137. Jun Yao, Guihua Zeng
    Key Agreement and Identity Authentication Protocols for Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:720-724 [Conf]
  138. Jiageng Li, David Cordes
    Hybrid Greedy/multicasting Power-aware Routing Protocol in Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:725-729 [Conf]
  139. O. B. V. Ramanaiah, Hrushikesha Mohanty
    NICD: A Novel Indexless Wireless On-Demand Data Broadcast Algorithm. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:730-734 [Conf]
  140. Chit Htay Lwin, Hrushikesha Mohanty, R. K. Ghosh
    Causal Ordering in Event Notification Service Systems for Mobile Users. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:735-740 [Conf]
  141. Li Yongjian, Xue Rui
    Using SPIN to Model Cryptographic Protocols. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:741-745 [Conf]
  142. Sojen Pradhan, Elaine Lawrence, Stephen Newton, Johit Das
    Bluetooth Potential in the M-Enterprise: A Feasibility Study. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:746-751 [Conf]
  143. Valentina Casola, Massimiliano Rak, Rosa Preziosi, Luigi Troiano
    Security Level Evaluation: Policy and Fuzzy Techniques. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:752-0 [Conf]
  144. Antoni Martínez-Ballesté, Francesc Sebé, Josep Domingo-Ferrer
    Secure Large-Scale Bingo. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:758-762 [Conf]
  145. Marcel Fernandez, Miguel Soriano
    Efficient Recovery of Secrets. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:763-767 [Conf]
  146. Carlo Blundo, Stelvio Cimato
    A Platform for Secure E-Gambling. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:768-772 [Conf]
  147. Pino Caballero-Gil, Candelaria Hernández-Goya, Carlos Bruno-Castaneda
    A Game-Theoretic Model for Two-Party Cryptographic Protocols. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:773-777 [Conf]
  148. Jordi Castellà-Roca, Josep Domingo-Ferrer
    A Non-Repudiable Bitstring Commitment Scheme Based on a Public-Key Cryptosystem. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:778-780 [Conf]
  149. Jordi Castellà-Roca, Josep Domingo-Ferrer
    On the Security of an Efficient TTP-Free Mental Poker Protocol. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:781-0 [Conf]
  150. Maryam Tayefeh Mahmoudi, Kambiz Badie
    An Approach to On-line Text Generation for E-learning Purposes. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:786-789 [Conf]
  151. Jing Yang, Wook Chang, Won-Chul Bang, Eun-Seok Choi, Kyoung-Ho Kang, Sung-Jung Cho, Dong-Yoon Kim
    Analysis and Compensation of Errors in the Input Device Based on Inertial Sensors. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:790-796 [Conf]
  152. Tadahiko Kumamoto, Kimiko Ohta
    Evaluation and Comparison of Natural Language and Graphical User Interfaces in "Query-by-Impressions" Scenes. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:797-804 [Conf]
  153. Fanhuai Shi, Yuncai Liu
    Estimation of Camera Pose Using 2D to 3D Corner Correspondence. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:805-809 [Conf]
  154. Gail-Joon Ahn, Badrinath Mohan
    Secure Information Sharing Using Role-based Delegation. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:810-819 [Conf]
  155. Huayong Wang, Yiqi Dai
    An Information Search Interface with Soft Real-time Guarantee. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:820-0 [Conf]
  156. Ling Wang, Yingtao Jiang, Henry Selvaraj
    Synthesis Scheme for Low Power Designs with Multiple Supply Voltages by Heuristic Algorithms. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:829-833 [Conf]
  157. Ali Al-Timimi, D. Curtis Jamison
    Knowledge Discovery in a Microarray Data Warehouse. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:834-839 [Conf]
  158. Naveen Babu Anne, Utthaman Thirunavukkarasu, Shahram Latifi
    Three and Four-dimensional Parity-check Codes for Correction and Detection of Multiple Errors. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:840-845 [Conf]
  159. Daggu Venkateshwar Rao, Muthukumar Venkatesan
    An Efficient Reconfigurable Architecture and Implementation of Edge Detection Algorithm using Handle-C. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:846-0 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002