


default search action
1st ISICT 2003: Dublin, Ireland
- Proceedings of the 1st Intenational Symposium on Information and Communication Technologies, Dublin, Ireland, September 24-26, 2003. ACM International Conference Proceeding Series 49, Trinity College Dublin 2003

Signal processing
- Jinkeun Hong, Sunchun Park, Janghong Yoon, Jae-Young Koh, Daeho Kim:

Design of random noise generator using SW algorithm. 9-14 - Neil Dunstan, Stephen Hodgson:

A processor array for computing wavelet energies. 15-20 - Abdellah Kacha, Francis Grenez, Philippe De Doncker, Khier Benmahammed:

A wavelet-based approach for frequency estimation of interference signals in printed circuit boards. 21-26
Computer science in health and education
- John Fulcher:

The use of smart devices in eHealth. 27-32 - Pedro Gómez, Victor Nieto Lluis, Rafael Martínez, Agustín Álvarez-Marquina, Francisco Jorge Rodríguez Dapena, Victoria Rodellar:

Detection of the mucosal wave in the speech signal for larynx pathology characterization. 33-39 - John Fulcher, Russell Gluck, Marion Worthy, Kim Draisma, Wilma Vialle:

A neural network, speech-based approach to literacy. 40-45 - Blaise W. Liffick:

Assistive technology in computer science. 46-51 - Cestmír Stuka, Daniel Smutek:

Correlation of the entrance examination result and the study success at the Medical Faculty, Charles University Prague. 52-57 - Martina Berankova, Petra Nevrivova:

Problems in operational and systems analysis educational process: solved by ICT application. 58-63
Machine learning and applications
- Ganka Petkova Kovacheva, Hidemitsu Ogawa:

Radial basis function classifier for fault diagnostics. 64-69 - David Edelman:

Adapting support vector machine methods for horserace odds prediction. 70-75 - Giuseppe Ascia, Vincenzo Catania, Maurizio Palesi, Antonio Parlato:

An evolutionary approach for reducing the energy in address buses. 76-81
Image processing
- Josef Scharinger:

Detecting watermarks at arbitrary image resolution. 82-87 - Othman O. Khalifa:

Image data compression in wavelet transform domain using modified LBG algorithm. 88-93 - Sang-Su Lee, Jong Wook Han, Hyo-wook Bae:

The encryption method to share a secret binary image and its decryption system. 94-99 - Daniel Smutek, Radim Sára, Petr Sucharda, Ludvík Tesar:

Different types of image texture features in ultrasound of patients with lymphocytic thyroiditis. 100-102
Data mining and database technology
- Markus Hofmann, Brendan Tierney:

The involvement of human resources in large scale data mining projects. 103-109 - Abdualrraouf A. Elbibas, Mick J. Ridley:

Using metadata for developing automated Web system interface. 113-118 - B. John Oommen, Jing Chen:

A new histogram method for sparse attributes: the averaged rectangular attribute cardinality map. 119-125
Communication technology I - coding and wireless
- Vahid Tabataba Vakili, Arash Aziminejad, Mohammad Reza Dehbozorgi:

A novel speed-sensitive bidirectional overflow and hand-down resource allocation strategy for hierarchical cellular networks. 126-131 - Sakari Junnila, Jarkko Niittylahti:

Wireless technologies for data acquisition systems. 132-137 - Yun Gong, Tadas Marcinkevicius:

Video transmission over a GSM wireless network. 138-143 - Xuerong Yong:

Analyzing the codes that avoid specified differences by binary tree. 144-149 - Klaus Knoche, Jürgen Rinas, Karl-Dirk Kammeyer:

MAI-suppression with fractional T-equalizer for CDMA. 150-155
Invited workshop on adaptive systems for ubiquitous computing
- David Lewis, Declan O'Sullivan:

Adaptive systems for ubiquitous computing. 156 - Robert O'Connor, Sven van der Meer:

Present and future organisational models for wireless networks. 157-162 - Simon Dobson:

Applications considered harmful for ambient systems. 163-168 - Steffen Higel, Tony O'Donnell, Vincent Wade:

Towards a natural interface to adaptive service composition. 169-174 - Stephen Greene, Jason Finnegan:

Usability of mobile devices and intelligently adapting to a user's needs. 175-180 - Ken Murray, Rajiv Mathur, Dirk Pesch:

Intelligent access and mobility management in heterogeneous wireless networks using policy. 181-186 - John Paul O'Grady, Susan Rea, Sinead Cummins, Dirk Pesch, Rajiv Mathur:

Dynamic configuration management for MANETs: an overview. 187-192 - Paddy Nixon, Feng Wang, Sotirios Terzis:

Programming structures for adaptive ambient systems. 193-198 - Ruaidhri Power:

Topic maps for context management. 199-204 - Owen Conlan, Ruaidhri Power, Steffen Higel, Declan O'Sullivan, Keara Barrett

:
Next generation context aware adaptive services. 205-212
Pervasive computing and virtual reality
- Sven Buchholz, Thomas Buchholz:

Adaptive content networking. 213-219 - Hannah Slay, Bruce H. Thomas, Rudi Vernik:

An interaction model for universal interaction and control in multi display environments. 220-225 - Bruce H. Thomas, Wayne Piekarski:

Outdoor virtual reality. 226-231 - James Auger, Jimmy Loizeau, Stefan Agamanolis:

Iso-phone: a total submersion telephonic experience. 232-236 - J. Shi, I. A. Oraifige, F. R. Hall:

Adding haptic feedback to engineering simulation. 237-241 - Francis Rousseaux, Alain Bonardi:

New tools and practices for electronic music distribution. 242-248
Electronic document technology
- Nobutaka Suzuki, Yorichiro Sato, Michiyoshi Hayase:

On merging structured documents with move operation. 249-254 - Henryk Krawczyk, Bogdan Wiszniewski:

Digital document life cycle development. 255-260 - Arnold Neville Pears, Carl Erickson:

Enriching online learning resources with "explanograms". 261-266 - Ruey-Shun Chen, Shien-Chiang Yu:

Developing an XML framework for metadata system. 267-272
Invited workshop on conceptual information retrieval and clustering of documents
- Davide Buscaldi, Giovanna Guerrini, Marco Mesiti, Paolo Rosso:

Tag semantics for the retrieval of XML documents. 273-278 - Daniel Jiménez, Edgardo Ferretti, Vicente Vidal, Paolo Rosso, Carlos F. Enguix:

The influence of semantics in IR using LSI and K-means clustering techniques. 279-284 - Antonio Ferrández Rodríguez, Julio Martínez, Jesús Peral:

An entity-relation approach to information retrieval. 285-290 - Cormac O'Brien, Carl Vogel:

Spam filters: bayes vs. chi-squared; letters vs. words. 291-296 - Sofie Van Gijsel, Carl Vogel:

Inducing a cline from corpora of political manifestos. 297-303 - Gabriel Castillo, Gerardo Sierra, John McNaught:

An improved algorithm for semantic clustering. 304-309 - Martin Holub:

A new approach to conceptual document indexing: building a hierarchical system of concepts based on document clusters. 310-315 - Marco Mesiti, Elisa Bertino, Giovanna Guerrini:

An abstraction-based approach to measuring the structural similarity between two unordered XML documents. 316-321
Invited workshop on network security and management
- Tom Coffey, Reiner Dojen:

Analysis of a mobile communication security protocol. 322-328 - Tom Coffey, Reiner Dojen, Tomas Flanagan:

On the automated implementation of modal logics used to verify security protocols. 329-334 - Thomas Newe, Tom Coffey:

Security protocols for 2G and 3G wireless communications. 335-340
Security technology and applications
- Nol Premasathian, Somying Thainimit:

Structure free highway toll collection using non-repudiated tickets. 341-344 - Jae-Deok Lim, Joon-Suk Yu, Jeong-Nyeo Kim:

A study of the method of providing secure network channel among secure OSs. 345-350 - Tom Coffey, Puneet Saidha, Peter Burrows:

Analysing the security of a non-repudiation communication protocol with mandatory proof of receipt. 351-356 - Neville I. Williams:

E-business security issues for SMEs in a virtual hosting environment. 357-364 - Gustavo A. Santana Torrellas, Luis A. Villa Vargas:

Modelling a flexible network security systems using multi-agents systems: security assessment considerations. 365-371
Modelling and control
- Lyudmila Mihaylova, René K. Boel:

Hybrid stochastic framework for freeway traffic flow modelling. 372-377 - Theodore S. Stamoulakatos, Efstathios D. Sykas:

Signal pattern recognition, hidden markov modeling and traffic flow modeling filters applied in existing signaling of cellular networks for vehicle volume estimation. 378-384 - Pauline Sourdille, Aidan O'Dwyer:

A new modified Smith predictor design. 385-390 - Brita H. Hafskjold:

Anti-run-dry algorithm for optimal control of playoutbuffers. 391-398
Invited workshop on digital interaction
- Claudia Roda, Julie Thomas:

Digital interaction: introduction to the first international workshop. 399-402 - Jacqueline Brodie, James Evans, Laurence D. Brooks, Mark J. Perry:

Supporting human interaction through digital technology: theory and practice. 403-408 - Eva Jacobus, Brian R. Duffy:

The language of machines. 409-414 - Geert de Haan:

The design of I-mass as a tool for interacting with cultural heritage. 415-420 - Päivö Laine, Lic. Phil:

Explicitness and interactivity. 421-426 - Duska Rosenberg, Simon Foley, Stavros Kammas, Mirja Lievonen:

Interaction space theory: a framework for tool development. 427-432
Human computer interaction
- Bryan Duggan, Mark Deegan:

Considerations in the usage of text to speech (TTS) in the creation of natural sounding voice enabled web systems. 433-438 - G. Somers, R. N. Whyte:

Hand posture matching for Irish Sign language interpretation. 439-444 - Derek P. Brock, James A. Ballas, Brian McClimens:

Perceptual issues for the use of 3D auditory displays in operational environments. 445-448
Software tools and programming languages
- Daniel C. M. May, Bent Bruun Kristensen, Palle Nowack:

Supporting complexity through (informational and physical) collaboration and modeling. 449-455 - Kumpon Farpinyo, Twittie Senivongse:

Designing and creating relational schemas with a CWM-based tool. 456-461 - Josef Pavlícek, Vojtech Merunka, Petra Nevrivova:

The development of the information systems. 462-467 - Anthony Sartini, John Waldron:

Dynamic profiling & comparison of Sun Microsystems' JDK1.3.1 versus the Kaffe VM APIs. 468-474
WWW applications
- Marko Niinimäki, Miika Tuisku, Matti Heikkurinen:

Designing for flexibility: separating user interface design from program logic and data. 475-480 - Chen Li, Claus Pahl:

Security in the Web Services Framework. 481-486 - Marian Ventuneac, Tom Coffey, Ioan Salomie:

A policy-based security framework for Web-enabled applications. 487-492 - Md. Asri Ngadi, Bernard S. Doherty:

Multi-users shared whiteboard under Web-multicast system. 493-498
Invited workshop on middleware interoperability of enterprise applications
- Ralf Gitzel, Markus Aleksy

:
MIEA 2003 workshop: message from the editors. 499 - Gilson Wilson, Ullas O. Tharakan:

Unified security framework. 500-505 - Paul Grace, Gordon S. Blair, Sam Samuel:

A marriage of Web services and reflective middleware to solve the problem of mobile client interoperability. 506-511 - Markus Aleksy

, Ralf Gitzel:
Relationship between the standard compliance of IDL-compilers and interoperability of CORBA-based applications. 512-517 - Stefan Kuhlins, Axel Korthaus:

A multithreaded Java framework for information extraction in the context of enterprise application integration. 518-523 - Cledson Akio Sakurai, Moacyr Martucci Junior:

An open system architecture for operation support system at telecommunications service providers. 524-529
Distributed systems
- Susumu Yamasaki, Mariko Sasakura:

An automated reasoning for diagnostic knowledge in a distributed environment. 530-535 - George Dimitoglou, Philippe Moore, Shmuel Rotenstreich:

Middleware for large distributed systems and organizations. 536-542 - Marko Niinimäki, Vesa Sivunen:

Applying grid security and virtual organization tools in distributed publication databases. 543-548 - Pavel Motuzenko:

Adaptive domain model: dealing with multiple attributes of self-managing distributed object systems. 549-554
Communication technology II - Internet, services, and architectures
- K. H. Tan, Mashkuri Yaacob, T. C. Ling, Keat Keong Phang:

IPv6 single-path and multi-path anycast routing protocols performance analysis. 555-560 - Pornpong Rompothong, Twittie Senivongse:

A query federation of UDDI registries. 561-566 - Meredith Lulling, John Vaughan:

An investigation of TCP throughput variation for SIP traffic. 567-572 - Istvan Matyasovszki, Colin Flanagan:

Forwarding treatment preservation of differentiated services behaviour aggregate flows across heterogenous network domains by employing the symbiotic packet processing architecture. 573-578 - Miguel A. Sánchez-Puebla, Jesús Carretero:

A new approach for distributed computing in avionics systems. 579-584 - J. Nazean, Jason Chan:

Software algorithms in intelligent employment agent. 585-589 - Siti Hafizah Ab Hamid, Tan Yoke Pei, Nazean Jomhari:

Object oriented analysis and UML design in the development of accommodation services system. 590-595
Invited workshop on object-oriented computing systems
- HISC architecture: an object-oriented computing system. 596

- Mok Pak Lun, Anthony S. Fong, Gary K. W. Hau:

Object-oriented processor requirements with instruction analysis of Java programs. 597-602 - Kaiman Lo, Pak Lun Mok, Wing Shing Yu, Anthony S. Fong:

Hardware support for user-access control on an object-oriented processor. 603-608 - Ryan W. S. Yu, Gary K. W. Hau, Anthony S. Fong:

Test bench for software development of object-oriented processor. 609-614 - Gary K. W. Hau, Anthony S. Fong, Mok Pak Lun:

Support of Java API for the jHISC system. 615-620

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














