Conferences in DBLP
S. R. Subramanya , Hiral Patel , Ilker Ersoy Performance Evaluation of Block-Based Motion Estimation Algorithms and Distortion Measures. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:2-7 [Conf ] Lei Zhu Geoblock: A LVQ-Based Framework for Geographic Image Retrieval. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:8-12 [Conf ] Kazem Taghva , Jeffrey S. Coombs , Ray Pareda , Thomas A. Nartker Language Model-based Retieval for Farsi Documents. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:13-17 [Conf ] Iker Gondra , Douglas R. Heisterkamp Summarizing Inter-Query Learning in Content-Based Image Retrieval via Incremental Semantic Clustering. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:18-22 [Conf ] Ilker Ersoy , Filiz Bunyak , S. R. Subramanya A Framework for Trajectory Based Visual Event Retrieval. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:23-0 [Conf ] German Florez , Zhen Liu , Susan Bridges , Rayford B. Vaughn , Anthony Skjellum Detecting Anomalies in High-Performance Parallel Programs. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:30-34 [Conf ] Shaohua Zhang , Ning Gu , Saihan Li Grid Workflow Based on Dynamic Modeling and Scheduling. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:35-39 [Conf ] Nader Mohamed , Jameela Al-Jaroodi , Hong Jiang Extensible Communication Architecture for Grid Nodes. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:40-44 [Conf ] Steve Barker Access Policy Specification for Web Applications. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:45-49 [Conf ] Bing Wu , Matthew J. Dovey , Muan Hong Ng , Kaihsu Tai , Stuart E. Murdock , Paul Jeffreys , Simon J. Cox , Jonathan W. Essex , Mark S. P. Sansom A Web / Grid Portal Implementation of BioSimGrid: A Biomolecular Simulation Database. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:50-0 [Conf ] Giovanni Aloisio , Massimo Cafaro , Italo Epicoco , Gianvito Quarta A Problem Solving Environment for Remote Sensing Data Processing. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:56-61 [Conf ] Minjun Wang , Geoffrey Fox , Shrideep Pallickara A Demonstration of Collaborative Web Services and Peer-to-Peer Grids. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:62-67 [Conf ] Shrideep Pallickara , Geoffrey Fox On the Matching of Events in Distributed Brokering Systems. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:68-76 [Conf ] Michele Di Santo , Nadia Ranaldo , D. Villacci , Eugenio Zimeo Performing Security Analysis of Large Scale Power Systems with a Broker-based Computational Grid. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:77-82 [Conf ] Giovanni Aloisio , Massimo Cafaro , R. Cesari , C. Mangia , Gian Paolo Marra , M. Miglietta , Maria Mirto , U. Rizza , I. Schipa , A. Tanzarella G-AQFS: Grid Computing Exploitation for the Management of Air Quality in Presence of Complex Meteorological Circulations. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:83-0 [Conf ] Mario Cannataro , Carmela Comito , Antonella Guzzo , Pierangelo Veltri Integrating Ontology and Workflow in PROTEUS, a Grid-Based Problem Solving Environment for Bioinformatics. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:90-94 [Conf ] Christoph Jung , Martin Einhoff , Stefan Noll , Norbert Schiffner Grid Job Builder - A Workflow Editor for Computing Grids. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:95-99 [Conf ] Mei Lin , Zhangxi Lin A Cost-Effective Critical Path Approach for Service Priority Optimization in the Grid Computing Economy. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:100-104 [Conf ] Said Mirza Pahlevi , Isao Kojima OGSA-WebDB: An OGSA-Based System for Bringing Web Databases into the Grid. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:105-0 [Conf ] Bilal Rizvi , Emmanuel Fernández-Gaucherand Effectiveness of Advanced and Authenticated Packet Marking Scheme for Traceback of Denial of Service Attacks. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:111-115 [Conf ] Aishwarya Iyer , Lorie M. Liebrock Vulnerability Scanning for Buffer Overflow. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:116-117 [Conf ] Vesselin Tzvetkov Disaster coverable PKI model based on Majority Trust principle. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:118-119 [Conf ] Baice Li , Senmiao Yuan A Novel Relevance Feedback Method in Content-Based Image Retrieval. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:120-123 [Conf ] Guadalupe Aguado de Cea , Asunción Gómez-Pérez , Inmaculada Álvarez de Mon y Rego , Antonio Pareja-Lora OntoTag's Linguistic Ontologies: Improving Semantic Web Annotations for a Better Language Understanding in Machines. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:124-128 [Conf ] Elharith Elrufaie , David A. Turner Bidding in P2P Content Distribution Networks using the Lightweight Currency Paradigm. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:129-130 [Conf ] Benny Y. M. Fung , Vincent T. Y. Ng Improving Classification Performance for Heterogeneous Cancer Gene Expression Data. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:131-132 [Conf ] Alberto Sillitti , Andrea Janes , Giancarlo Succi , Tullio Vernazza Monitoring the Development Process with Eclipse. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:133-134 [Conf ] Stanislav Kurkovsky , Bhagyavati , Arris Ray , Mei Yang Modeling a Grid-Based Problem Solving Environment for Mobile Devices. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:135-0 [Conf ] Li Tao , Vijayan K. Asari An Integrated Neighborhood Dependent Approach for Nonlinear Enhancement of Color Images. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:138-139 [Conf ] Guangming Xing , Bill Tseng Extendible Range-Based Numbering Scheme for XML Document. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:140-141 [Conf ] Warnill Chung , Soon-Young Park , Hae-Young Bae An Extension of XQuery for Moving Objects over GML. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:142-147 [Conf ] Paul Lynch , Xiaocheng Luan , Maureen Prettyman , Lee Mericle , Edward Borkmann , Jonathan Schlaifer An Evaluation of New and Old Similarity Ranking Algorithms. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:148-149 [Conf ] Ebru Celikel , Mehmet Emin Dalkiliç Experiments on A Secure Compression Algorithm. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:150-152 [Conf ] Xukai Zou , Byrav Ramamurthy , Spyros S. Magliveras A GCD attack resistant CRTHACS for secure group communications. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:153-154 [Conf ] Rion Dooley A Distributed Quadtree Dictionary Approach to Multi-Resolution Compression. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:155-156 [Conf ] Satyanadh Gundimada , Vijayan K. Asari Face Detection Technique Based on Rotation Invariant Wavelet Features. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:157-158 [Conf ] Alexia Giannoula , Dimitrios Hatzinakos Integrating Compression with Watermarking on Video Sequences. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:159-0 [Conf ] Yasuo Narukawa , Vicenç Torra Fuzzy Measures and Integrals for Evaluating Strategies. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:162-166 [Conf ] Ronggong Song , Larry Korba How to Make E-cash with Non-Repudiation and Anonymity. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:167-172 [Conf ] Douglas R. Dechow A Workshop on Advanced Separation of Concerns and Aspect-Oriented Programming. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:173-177 [Conf ] Perfecto Mariño , Heriberto Hernández , Miguel Angel Domínguez , Francisco Poza , Fernando Machado , Fernando Vázquez Applied Fieldbus Knowledge for ICT Engineers. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:178-182 [Conf ] Yi-li Qian , Jia-heng Zheng An Approach to Improving the Quality of Part-of-Speech Tagging of Chinese Text. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:183-187 [Conf ] Behrouz Minaei-Bidgoli , Alexander P. Topchy , William F. Punch Ensembles of Partitions via Data Resampling. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:188-192 [Conf ] Lucas Baggio Figueira , Maria do Carmo Nicoletti Choosing the Initial Set of Exemplars when Learning with an NGE-based System. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:193-197 [Conf ] Ray R. Hashemi , Louis A. Le Blanc , Bart J. Westgeest The Effects of Business Rules on Transactional Association Analysis. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:198-202 [Conf ] Ranjit Bose Information Technologies for Education & Training in E-Government. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:203-207 [Conf ] Susanna Pirttikangas , Jukka Riekki , Juha Röning Routine Learning: Analyzing Your Whereabouts. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:208-0 [Conf ] Daniel Mallett , James Elding , Mario A. Nascimento Information-Content Based Sentence Extraction for Text Summarization. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:214-218 [Conf ] Rebecca Cathey , Steven M. Beitzel , Eric C. Jensen , Angelo J. Pilotto , David A. Grossman Measuring the Scalability of Relationally Mapped Semistructured Queries. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:219-223 [Conf ] Nan Zhang 0005 , Tao Tao , Ravi Vijaya Satya , Amar Mukherjee Modified LZW Algorithm for Efficient Compressed Text Retrieval. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:224-228 [Conf ] Cher-Sheng Cheng , Jean Jyh-Jiun Shann , Chung-Ping Chung A Unique-Order Interpolative Code for Fast Querying and Space-Efficient Indexing in Information Retrieval Systems. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:229-235 [Conf ] Yalçin Çebi , Gökhan Dalkiliç Turkish Word N-gram Analyzing Algorithms for a Large Scale Turkish Corpus - TurCo. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:236-240 [Conf ] M. Emre Celebi , Y. Alp Aslandogan Content-Based Image Retrieval Incorporating Models of Human Perception. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:241-245 [Conf ] J. R. Parker , Brad Behm Use of Multiple Algorithms in Image Content Searches. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:246-0 [Conf ] Nilmini Wickramasinghe , Steve Goldberg How M=Ec2 in Healthcare. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:252-257 [Conf ] Mohammad Mahfuzul Islam , M. Manzur Murshed , Laurence Dooley Enhanced Cell Visiting Probability for QoS Provisioning in Mobile Multimedia Communications. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:258-262 [Conf ] Jordi Herrera-Joancomartí , Josep Prieto-Blázquez , Jordi Castellà-Roca A Secure Electronic Examination Protocol using Wireless Networks. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:263-268 [Conf ] Elaine Lawrence , John Lawrence Threats to the Mobile Enterprise: Jurisprudence Analysis of Wardriving and Warchalking. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:269-274 [Conf ] Manuel Rodríguez-Martínez , José F. Enseñat , Elfred Pagan , Juan G. Arzola , Maniel Sotomayor , Elliot Varga Registration and Discovery of Services in the NetTraveler Integration System for Mobile Devices. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:275-281 [Conf ] Robert Steele , Yuri Ventsov , Sri Madhisetty , Laurie Benkovich A Two-tier Architecture for Automated Mobile Applications. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:282-0 [Conf ] Li Shaozi , You Wenjian , Li Tangqiu , Chen Huowang Lexical-chain and It's Application in Text Filtering. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:288-292 [Conf ] Haytham Alsharaf , Sylviane Cardey , Peter Greenfield , Yihui Shen Problems and Solutions in Machine Translation Involving Arabic, Chinese and French. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:293-297 [Conf ] Mohamed Abdel Fattah , Fuji Ren , Shingo Kuroiwa Internet Archive as a Source of Bilingual Dictionary. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:298-302 [Conf ] Steffen Werner , Matthias Wolff , Matthias Eichner , Rüdiger Hoffmann Integrating Speech Enabled Services in a web-based e-Learning Environment. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:303-307 [Conf ] J. Makinen , J. Vainio Source Signal based Rate Adaptation for GSM AMR Speech Codec. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:308-313 [Conf ] Yvette Yannick Mathieu Linguistic Knowledge and Automatic Semantic Representation of Emotions and Feelings. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:314-318 [Conf ] Gökhan Dalkiliç , Yalçin Çebi Word Statistics of Turkish Language on a Large Scale Text Corpus - TurCo. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:319-0 [Conf ] Maumita Bhattacharya An Informed Operator Approach to Tackle Diversity Constraints in Evolutionary Search. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:326-330 [Conf ] V. Radha , Ved Prakash Gulati , Arun K. Pujari Efficient Multicast E-Services Over APPCAST. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:331-336 [Conf ] S. Ganesh , M. Jayaraj , V. Kalyan , Srinivasa Murthy , G. Aghila Ontology-based Web Crawler. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:337-341 [Conf ] Reza Hashemian , Bipin Sreedharan A Hybrid Number System And Its Application In FPGA-DSP Technology. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:342-346 [Conf ] S. Venkatraman , Ajith Abraham , Marcin Paprzycki Significance of Steganography on Data Security. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:347-351 [Conf ] Kai Luo , Shahram Latifi , Kazem Taghva , Emma Regentova Recognition and Identification of Form Document Layouts. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:352-356 [Conf ] Nadia Nedjah , Luiza de Macedo Mourelle Evolutionary Time Scheduling. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:357-361 [Conf ] Senthamil Ilango , Johnson Thomas Group Key Management utilizing Huffman and Petrick based approaches. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:362-366 [Conf ] Pedram Azad , Tilo Gockel , Rüdiger Dillmann 3D Shape Acquisition using a combined SSD and Least Squares Correlation Approach. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:367-371 [Conf ] Ajumobi Udechukwu , Ken Barker , Reda Alhajj Mining User Navigational Patterns in Dynamically Changing Environments. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:372-0 [Conf ] Hsien-Chou Liao , Yi-Wei Ting , Shih-Hsuan Yen , Chou Chen Yang Ant Mobility Model Platform for Network Simulator. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:380-384 [Conf ] Muhammad Mahmudul Islam , Ronald Pose , Carlo Kopp Multiple Directional Antennas in Suburban Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:385-389 [Conf ] Xianhui Xie , Larry Hughes Statistic-based Routing in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:390-394 [Conf ] Ram Dantu , Sachin P. Joglekar Collaborative Vision using Networked Sensors. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:395-399 [Conf ] L. Lanae Neild , Roy P. Pargas Investigating Peer-to-peer Systems for Resource Sharing within a Small Group of Nodes. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:400-404 [Conf ] Mike Burmester , Tri Van Le Secure Multipath Communication in Mobile Ad hoc Networks. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:405-409 [Conf ] Robert Steele , Marcin Lubonski , Yuri Ventsov , Elaine Lawrence Accessing SMIL-based Dynamically Adaptable Multimedia Presentations from Mobile Devices. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:410-0 [Conf ] Jianhong Li , Xiaojun Liang , Laxmi Gewali Extended DCEL Data Structure for Mobile Computing. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:416-420 [Conf ] Narudol Chankuang , Suphamit Chittayasothorn An Object and XML Database Schemas Design Tool. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:421-427 [Conf ] Vincent T. Y. Ng , Chan Chi Kong , Shiu Hin Wang Prefetching XML Data with Abstract Query Mining. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:428-432 [Conf ] Alexandr Seleznyov , Stephen Hailes Distributed Knowledge Management for Autonomous Access Control in Computer Networks. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:433-437 [Conf ] Mohammad Ashraful Alam Software Security in Bangladesh with .NET Framework: A Roadmap. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:438-443 [Conf ] Shengru Tu , Maik Flanagin , Ying Wu , Mahdi Abdelguerfi , Eric Normand , Venkata Mahadevan , Jay J. Ratcliff , Kevin Shaw Design Strategies to Improve Performance of GIS Web Services. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:444-0 [Conf ] Yi-fang Brook Wu , Quanzhi Li , Razvan Stefan Bot , Xin Chen KIP: A Keyphrase Identification Program with Learning Functions. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:450-454 [Conf ] Syed Riaz Ahmed Applications of Data Mining in Retail Business. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:455-459 [Conf ] Abdullah Uz Tansel Integrity Constraints in Temporal Relational Databases. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:460-464 [Conf ] Y. Alp Aslandogan , Gauri A. Mahajani , Stan Taylor Evidence Combination in Medical Data Mining. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:465-469 [Conf ] Kwok-Wa Lam , Victor C. S. Lee Building Decision Trees Using Functional Dependencies. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:470-473 [Conf ] Kang Hyuk Lee , Byeong Ho Kang A New Framework for Uncertainty Sampling: Exploiting Uncertain and Positive-Certain Examples in Similarity-Based Text Classification. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:474-479 [Conf ] Charles Wesley Ford , Chia-Chu Chiang , Hao Wu , Radhika R. Chilka , John R. Talburt Confidence on Approximate Query in Large Datasets. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:480-0 [Conf ] Jonathan Lutz , M. Anwarul Hasan High Performance FPGA based Elliptic Curve Cryptographic Co-Processor. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:486-492 [Conf ] Nazar A. Saqib , Francisco Rodríguez-Henríquez , Arturo Díaz-Pérez A Parallel Architecture for Computing Scalar Multiplication on Hessian Elliptic Curves. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:493-497 [Conf ] Alireza Hodjat , Patrick Schaumont , Ingrid Verbauwhede Architectural Design Features of a Programmable High Throughput AES Coprocessor. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:498-502 [Conf ] Nadia Nedjah , Luiza de Macedo Mourelle Multi-Objective Evolutionary Hardware for RSA-Based Cryptosystems. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:503-507 [Conf ] Luiza de Macedo Mourelle , Nadia Nedjah Efficient Cryptographic Hardware Using the Co-Design Methodology. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:508-512 [Conf ] Jan Pelzl , Thomas J. Wollinger , Christof Paar High Performance Arithmetic for special Hyperelliptic Curve Cryptosystems of Genus Two. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:513-517 [Conf ] Manfred Schimmler , Viktor Bunimov Fast Modular Multiplication by Operand Changing. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:518-524 [Conf ] An Yu , David S. Brée A Clock-less Implementation of the AES Resists to Power and Timing Attacks. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:525-532 [Conf ] Nedeljko Cvejic , Tapio Seppänen Increasing Robustness of LSB Audio Steganography Using a Novel Embedding Method. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:533-537 [Conf ] Guido Bertoni , Luca Breveglieri , Thomas J. Wollinger , Christof Paar Finding Optimum Parallel Coprocessor Design for Genus 2 Hyperelliptic Curve Cryptosystems. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:538-0 [Conf ] Siddika Berna Örs , Frank K. Gürkaynak , Elisabeth Oswald , Bart Preneel Power-Analysis Attack on an ASIC AES implementation. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:546-552 [Conf ] Michele Elia , Manuel Leone A Basis-Independent Algorithm to Design Fast Parallel Multipliers over GF(2m). [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:553-559 [Conf ] Katsuyuki Okeya , Tsuyoshi Takagi , Camille Vuillaume On the Importance of Protecting Delta in SFLASH against Side Channel Attacks. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:560-568 [Conf ] Ruby B. Lee , Zhijie Shi , Yiqun Lisa Yin , Ronald L. Rivest , Matthew J. B. Robshaw On Permutation Operations in Cipher Design. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:569-577 [Conf ] Herwin Chan , Alireza Hodjat , Jun Shi , Richard D. Wesel , Ingrid Verbauwhede Streaming Encryption for a Secure Wavelength and Time Domain Hopped Optical Network. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:578-582 [Conf ] Gaël Rouvroy , François-Xavier Standaert , Jean-Jacques Quisquater , Jean-Didier Legat Compact and Efficient Encryption/Decryption Module for FPGA Implementation of the AES Rijndael Very Well Suited for Small Embedded Applications. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:583-587 [Conf ] Amir K. Daneshbeh , M. Anwarul Hasan Area Efficient High Speed Elliptic Curve Cryptoprocessor for Random Curves. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:588-0 [Conf ] Xiang Li , Rahul Ramachandran , Matt He , Sunil Movva , John A. Rushing , Sara J. Graves , Wladislaw Lyatsky , Arjun Tan , Glynn Germany Comparing Different Thresholding Algorithms for Segmenting Auroras. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:594-601 [Conf ] Naveen Santhanam , Timothy S. Newman , Dennis L. Gallagher Exploiting Known Latitudinal Variations for Improved Limited-Angle Tomographic Reconstruction of the Plasmasphere. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:602-606 [Conf ] Erzsébet Merényi , William H. Farrand , Philip Tracadas Mapping Surface Materials on Mars from Mars Pathfinder Spectral Images with HYPEREYE. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:607-614 [Conf ] Stamatios V. Kartalopoulos Factors Affecting the Signal Quality in Optical Data Transmission and Estimation Method for BER and SNR. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:615-619 [Conf ] Artyom M. Grigoryan , Serkan Dursun , Emma Regentova Lossless Encoding Based on Redistribution of Statistics. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:620-624 [Conf ] Chia-Chu Chiang , Peiyi Tang On the Design of Heterogeneous Applications for Distributed Coordination. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:625-0 [Conf ] Chadia Moghrabi , Tang-Ho Lê , Jean Roy , Johanne Hachey Digital Library Resources Description. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:632-637 [Conf ] Jahanshah Kabudian , Mohammad Reza Meybodi , Mohammad Mehdi Homayounpour Applying Continuous Action Reinforcement Learning Automata(CARLA) to Global Training of Hidden Markov Models. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:638-642 [Conf ] Karla Felix Navarro Wearable, Wireless Brain Computer Interfaces In Augmented Reality Environments. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:643-647 [Conf ] Phillip G. Bradford , Marcus Brown , Josh Perdue , Bonnie Self Towards Proactive Computer-System Forensics. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:648-652 [Conf ] Farzin Ahmadianpour , M. Omair Ahmad A Novel Approach for Bi-directional Motion Estimation and Compensation. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:653-657 [Conf ] Zhiwen Yu , Jianhua Gu , Xingshe Zhou , Zhiyi Yang Fuzzy Clustering for TV Program Classification. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:658-0 [Conf ] Pornthep Navakitkanok , Supavadee Aramvith Improved Rate Control for Advanced Video Coding (AVC)Standard under Low Delay Constraint. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:664-668 [Conf ] Mohan M. Trivedi , Kohsia S. Huang , Tarak Gandhi , Brett Hall , Kimberly Harlow Distributed Omni-Video Arrays and Digital Tele-Viewer for Customized Viewing, Event Detection and Notification. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:669-674 [Conf ] Foued Derraz , Mohamed Beladgham , M'hamed Khelif Application of Active Contour Models in Medical Image Segmentation. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:675-681 [Conf ] Cheruku Venkateswarlu , Sumanth Yenduri , S. Sitharama Iyengar Digital Analysis of Thermal Infrared Imagery using Temperature Mapping. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:682-688 [Conf ] Abdullah Al Yusuf , M. Manzur Murshed , Laurence Dooley An HVS-based Motion Vector Composition Algorithm for Spatial Resolution Transcoding. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:689-693 [Conf ] K. V. Ramana , S. Basha Neural Image Recognition System with Application to Tuberculosis Detection. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:694-698 [Conf ] Xiao Su , Yi Shang Error Concealment of Transform Coded Images With Continuous QoS. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:699-703 [Conf ] Jianyun Xu , Andrew H. Sung , Peipei Shi , Qingzhong Liu JPEG Compression Immune Steganography Using Wavelet Transform. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:704-708 [Conf ] Narges Ahmidi , Reza Safabakhsh A Novel DCT-based Approach for Secure Color Image Watermarking. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:709-713 [Conf ] Zhiguo Cheng , Yuncai Liu Efficient Technique for Ellipse Detection Using Restricted Randomized Hough Transform. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:714-0 [Conf ] Jun Yao , Guihua Zeng Key Agreement and Identity Authentication Protocols for Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:720-724 [Conf ] Jiageng Li , David Cordes Hybrid Greedy/multicasting Power-aware Routing Protocol in Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:725-729 [Conf ] O. B. V. Ramanaiah , Hrushikesha Mohanty NICD: A Novel Indexless Wireless On-Demand Data Broadcast Algorithm. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:730-734 [Conf ] Chit Htay Lwin , Hrushikesha Mohanty , R. K. Ghosh Causal Ordering in Event Notification Service Systems for Mobile Users. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:735-740 [Conf ] Li Yongjian , Xue Rui Using SPIN to Model Cryptographic Protocols. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:741-745 [Conf ] Sojen Pradhan , Elaine Lawrence , Stephen Newton , Johit Das Bluetooth Potential in the M-Enterprise: A Feasibility Study. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:746-751 [Conf ] Valentina Casola , Massimiliano Rak , Rosa Preziosi , Luigi Troiano Security Level Evaluation: Policy and Fuzzy Techniques. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:752-0 [Conf ] Antoni Martínez-Ballesté , Francesc Sebé , Josep Domingo-Ferrer Secure Large-Scale Bingo. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:758-762 [Conf ] Marcel Fernandez , Miguel Soriano Efficient Recovery of Secrets. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:763-767 [Conf ] Carlo Blundo , Stelvio Cimato A Platform for Secure E-Gambling. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:768-772 [Conf ] Pino Caballero-Gil , Candelaria Hernández-Goya , Carlos Bruno-Castaneda A Game-Theoretic Model for Two-Party Cryptographic Protocols. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:773-777 [Conf ] Jordi Castellà-Roca , Josep Domingo-Ferrer A Non-Repudiable Bitstring Commitment Scheme Based on a Public-Key Cryptosystem. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:778-780 [Conf ] Jordi Castellà-Roca , Josep Domingo-Ferrer On the Security of an Efficient TTP-Free Mental Poker Protocol. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:781-0 [Conf ] Maryam Tayefeh Mahmoudi , Kambiz Badie An Approach to On-line Text Generation for E-learning Purposes. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:786-789 [Conf ] Jing Yang , Wook Chang , Won-Chul Bang , Eun-Seok Choi , Kyoung-Ho Kang , Sung-Jung Cho , Dong-Yoon Kim Analysis and Compensation of Errors in the Input Device Based on Inertial Sensors. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:790-796 [Conf ] Tadahiko Kumamoto , Kimiko Ohta Evaluation and Comparison of Natural Language and Graphical User Interfaces in "Query-by-Impressions" Scenes. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:797-804 [Conf ] Fanhuai Shi , Yuncai Liu Estimation of Camera Pose Using 2D to 3D Corner Correspondence. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:805-809 [Conf ] Gail-Joon Ahn , Badrinath Mohan Secure Information Sharing Using Role-based Delegation. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:810-819 [Conf ] Huayong Wang , Yiqi Dai An Information Search Interface with Soft Real-time Guarantee. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:820-0 [Conf ] Ling Wang , Yingtao Jiang , Henry Selvaraj Synthesis Scheme for Low Power Designs with Multiple Supply Voltages by Heuristic Algorithms. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:829-833 [Conf ] Ali Al-Timimi , D. Curtis Jamison Knowledge Discovery in a Microarray Data Warehouse. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:834-839 [Conf ] Naveen Babu Anne , Utthaman Thirunavukkarasu , Shahram Latifi Three and Four-dimensional Parity-check Codes for Correction and Detection of Multiple Errors. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:840-845 [Conf ] Daggu Venkateshwar Rao , Muthukumar Venkatesan An Efficient Reconfigurable Architecture and Implementation of Edge Detection Algorithm using Handle-C. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:846-0 [Conf ]