


default search action
ITCC 2004: Las Vegas, NV, USA
- International Conference on Information Technology: Coding and Computing (ITCC'04), Volume 1, April 5-7, 2004, Las Vegas, Nevada, USA. IEEE Computer Society 2004, ISBN 0-7695-2108-8

Information Assurance and Security I
- Rangarajan Vasudevan, Ajith Abraham, Sugata Sanyal, Dharma P. Agrawal:

Jigsaw-based Secure Data Transfer over Computer Networks. 2-6 - Chi Kin Ho, Chang-Tsun Li:

Semi-Fragile Watermarking Scheme for Authentication of JPEG Images. 7-11 - István Zsolt Berta, Levente Buttyán, István Vajda:

Mitigating the Untrusted Terminal Problem Using Conditional Signatures. 12-16 - Ajmal S. Mian

, Ashraf Masood:
Arcanum : A Secure and Efficient Key Exchange Protocol for the Internet. 17-21 - Aleksandra Nenadic, Ning Zhang, Stephen K. Barton:

A Security Protocol for Certified E-Goods Delivery. 22-
Information Assurance and Security II
- Shouhuai Xu, William Robert Nelson Jr., Ravi S. Sandhu:

Enhancing Anonymity via Market Competition. 30-34 - Supakorn Kungpisdan, Bala Srinivasan, Phu Dung Le:

A Secure Account-Based Mobile Payment Protocol. 35-39 - Supakorn Kungpisdan, Bala Srinivasan, Phu Dung Le:

Accountability Logic for Mobile Payment Protocols. 40-44 - Sarbajit Pal, P. K. Biswas, Ajith Abraham:

Face Recognition Using Interpolated Bezier Curve Based Representation. 45-49 - Changwoo Pyo, Byungchul Bae, Taejin Kim, Gyungho Lee:

Run-time Detection of Buffer Overflow Attacks without Explicit Sensor Data Objects. 50-
Information Assurance and Security III
- Omaima Bamasak, Ning Zhang:

Achieving Distributed Trusted Services. 56-61 - Vandana Gunupudi, Stephen R. Tate:

Performance Evaluation of Data Integrity Mechanisms for Mobile Agents. 62-69 - Sampada Chavan, Khusbu Shah, Neha Dave, Sanghamitra Mukherjee, Ajith Abraham, Sugata Sanyal:

Adaptive Neuro-Fuzzy Intrusion Detection Systems. 70-74 - Janica Edmonds, Mauricio Papa

:
Cryptographic Protocol Analysis using Goal Extraction. 75-80 - Sachin P. Joglekar, Stephen R. Tate:

ProtoMon: Embedded Monitors for Cryptographic Protocol Intrusion Detection and Prevention. 81-
Information Assurance and Security IV
- Jeongseok Seo, Han-Sung Kim, Sanghyun Cho, Sung Deok Cha:

Web Server Attack Categorization based on Root Causes and Their Locations. 90-96 - Rong-Tai Liu, Nen-Fu Huang, Chia-Nan Kao, Chih-Hao Chen, Chi-Chieh Chou:

A Fast Pattern-Match Engine for Network Processor-based Network Intrusion Detection System. 97-101 - Chaoyang Zhang, Yukong Zhang:

A Modified Optical Image Reconstruction Model with Information Feedback. 102-106 - Hongmei Deng, Anindo Mukherjee, Dharma P. Agrawal:

Threshold and Identity-based Key Management and Authentication for Wireless Ad Hoc Networks. 107-111 - David Llewellyn-Jones, Madjid Merabti, Qi Shi, Bob Askwith:

An Extensible Framework for Practical Secure Component Composition in a Ubiquitous Computing Environment. 112-117 - Alfredo Cuzzocrea

, Fernando Bellas:
Distributed Knowledge Networks: Towards a New Paradigm for Delivering Knowledge. 118-123 - Joonsang Baek, Yuliang Zheng:

Identity-Based Threshold Signature Scheme from the Bilinear Pairings. 124-128 - William D. Neumann:

HORSE: An Extension of an r-Time Signature Scheme With Fast Signing and Verification. 129-
IT Education, Curriculum & Assessment I
- Renée Turban:

Recurrent Exercises for Introductory Human Computer Interaction Courses. 136-140 - Tomasz Müldner, Elhadi M. Shakshuki:

A New Approach to Learning Algorithms. 141-145 - Antoni Martínez-Ballesté

, Francesc Sebé
, Josep Domingo-Ferrer:
Computer Skills Training to (Middle-aged) Adults: Problems and Program. 146-150 - Paul Douglas, Steve Barker:

Dependency Theory E-Learning Tool. 151-155 - Chih-Ping Chu, Ching-Pao Chang, Chung-Wei Yeh, Yu-Fang Yeh:

A Web-Service Oriented Framework for building SCORM Compatible Learning Management Systems. 156-
IT Education, Curriculum & Assessment II
- J. R. Parker:

Games and Animation: Collaborations Between the Arts and Computer Science. 164-168 - Paul S. Wang, Yi Zhou, Xiao Zou:

Web-based Mathematics Education: MeML Design and Implementation. 169-175 - Kai Schramm, Christof Paar:

IT Security Project: Implementation of the Advanced Encryption Standard (AES) on a Smart Card. 176-180 - Pavel Azalov, Fani Zlatarova:

An Instructor's Environment for Automatic Generation of Problem Sequences. 181-185 - Jill E. Courte:

The Development of a Philosophy for an Applied Web Programming Curriculum. 186-
IT Education, Curriculum & Assessment III
- Yi-fang Brook Wu, Xin Chen:

Assessing Distance Learning Student's Performance: A Natural Language Processing Approach to Analyzing Class Discussion Messages. 192-196 - Dilermando Piva Jr., Ricardo Luís de Freitas, Mauro Sérgio Miskulin, Gilberto Shigueo Nakamiti, Carlos Miguel Tobar:

Auxiliar: A Case-Based System to Assist Online Courses. 197-201 - Mohammed Abdel Razek, Claude Frasson, Marc Kaltenbach:

Building an Effective Groupware System. 202-206 - Zongkai Yang, Gang Zhao, Di Wu, Jianhua He:

A Standard Visual Courseware Authoring Tool Based on Content Packaging Specification. 207-211 - Michael Blumenstein, Steve Green, Ann Nguyen, Vallipuram Muthukkumarasamy:

GAME: A Generic Automated Marking Environment for Programming Assessment. 212-
E-Commerce/Education
- Sheikh Iqbal Ahamed:

A Novel Approach for New E-commerce Product Positioning and to-go/not-to go with Rapid Prototyping Experience. 218-222 - Chima Adiele, Sylvanus A. Ehikioya

:
Dynamic Identification of Correspondence Assertions for Electronic Commerce Data Integration. 223-227 - Amey Dharurkar, Shrideep Pallickara, Geoffrey C. Fox:

A Topology Viewer for Distributed Brokering Systems. 228-234 - Ann Johansson:

The Impacts of Professions in Systems Development. 235-240 - Qiong Liu, Xin Lu, Fuji Ren, Shingo Kuroiwa:

Automatic Estimation of Stock Market Forecasting and Generating the Corresponding Natural Language Expression. 241-245 - Rajiv V. Dharaskar

:
Special Technique for Optimizing Teaching-Learning Process in CBT Software. 246-250 - Nazli Goharian, David A. Grossman, Nambury S. Raju:

Extending the Undergraduate Computer Science Curriculum to Include Data Mining. 251-254 - Chien-Min Wang, David Turner:

Extending the Wiki Paradigm for Use in the Classroom. 255-
Web & IR Technologies I
- Albert Hoang:

Information Retrieval with Principal Components. 262-266 - Pik-Shan Cheung, Ruizhang Huang, Wai Lam:

Financial Activity Mining from Online Multilingual News. 267-271 - Zhenya Zhang, Enhong Chen, Jin Wang, Xufa Wang:

Enabling Personalization Recommendation With WeightedFP for Text Information Retrieval Based on User-Focus. 272-276 - Magdalene P. Ting, Vishal Seth, Jerry Gao:

The e-Salesman System. 277-282 - Jihong Zeng, Peter A. Bloniarz:

From Keywords to Links: an Automatic Approach. 283-286 - Daniel Berleant, Jinghao Miao, Zhong Gu, Dongping Xu:

Toward Dialogues With Documents: MultiBrowser. 287-294 - Jinghao Miao, Daniel Berleant:

From Paragraph Networks to Document Networks. 295-
Web & IR Technologies II
- Guangming Xing, Dongli Zhang:

Refined Extended Preorder Index with Path Information. 304-308 - Amanda Spink, Minsoo Park, Bernard J. Jansen

, Jan O. Pedersen:
Multitasking Web Search on Alta Vista. 309-313 - Takanori Mouri, Hiroyuki Kitagawa

:
Extracting New Topic Contents from Hidden Web Sites. 314-319 - Craig Chariton, Min-Hyung Choi:

Enhancing Usability of Flight and Fare Search Functions for Airline and Travel Web Sites. 320-325 - Razvan Stefan Bot, Yi-fang Brook Wu, Xin Chen, Quanzhi Li:

A Hybrid Classifier Approach for Web Retrieved Documents Classification. 326-
Web & IR Technologies III
- Christos Bouras, Vaggelis Kapoulas

, Ioannis Misedakis:
Web Page Fragmentation for Personalized Portal Construction. 332-336 - Bienvenido Vélez, Amaury Cabarcas

, Lizvette Malavé:
TIN: An Interactive Image Navigator Providing Ubiquitous Access To Distributed Geo-Spatial Data. 337-343 - Shou-Hsuan Stephen Huang, Carlos Humberto Molina-Rodríguez, Jesús Ubaldo Quevedo-Torrero, Mario Francisco Fonseca-Lozada:

Exploring Similarity among Web Pages Using the Hyperlink Structure. 344-348 - Wendy T. Lucas, Heikki Topi

:
Anxiously Seeking Answers: How Attitude Affects Search Performance. 349-353 - Hongzhi Wang, Jianzhong Li, Jizhou Luo, Zhenying He:

XCpaqs: Compression of XML Document with XPath Query Support. 354-
Modern Web and Grid Systems
- Silvana Castano

, Alfio Ferrara
, Stefano Montanelli, Gianpaolo Racca:
Matching Techniques for Resource Discovery in Distributed Systems Using Heterogeneous Ontology Descriptions. 360-366 - Bill Vassiliadis, Kostas Giotopoulos, Konstantinos Votis, Spyros Sioutas, Nikos Bogonikolos, Spiros Likothanassis:

Application Service Provision through the Grid: Business models and Architectures. 367-371 - Giovanni Aloisio

, Massimo Cafaro
, Sandro Fiore
, Maria Mirto:
The GRelC Library: A Basic Pillar in the Grid Relational Catalog Architecture. 372-376 - Rebecca L. Collins, James S. Plank

:
Content-Addressable IBP - Rationale, Design and Performance. 377-281 - Alexandra I. Cristea

, Michael Verschoor:
The LAG Grammar for Authoring the Adaptive Web. 382-288 - Flavius Frasincar

, Peter Barna, Geert-Jan Houben, Zoltán Fiala:
Adaptation and Reuse in Designing Web Information Systems. 387-291 - Fabrizio Silvestri

, Ranieri Baraglia, Paolo Palmerini, Massimo Serranó:
On-line Generation of Suggestions for Web Users. 392-397 - Nick Golovin, Erhard Rahm

:
Reinforcement Learning Architecture for Web Recommendations. 398-
Information Assurance and Security V
- Tarek Abbes, Adel Bouhoula

, Michaël Rusinowitch:
Protocol Analysis in Intrusion Detection Using Decision Tree. 404-408 - Zili Shao, Chun Xue, Qingfeng Zhuge, Edwin Hsing-Mean Sha, Bin Xiao:

Security Protection and Checking in Embedded System Integration Against Buffer Overflow Attacks. 409-413 - Sriranjani Sitaraman

, Subbarayan Venkatesan:
Low-Intrusive Consistent Disk Checkpointing: A Tool for Digital Forensics. 414-418 - Ram Dantu, João W. Cangussu, Arun Yelimeli:

Dynamic Control of Worm Propagation. 419-423 - Sheikh Iqbal Ahamed, Alex Pezewski, Al Pezewski:

Towards Framework Selection Criteria and Suitability for an Application Framework. 424-
Information Assurance and Security VI
- K. Suzanne Barber, Jisun Park:

Robust Partner Selection Scheme for Information Quality Assurance despite Uncertainty in Open Multi-Agent Systems. 430-434 - Austin Gilbert, Ajith Abraham, Marcin Paprzycki

:
A System for Ensuring Data Integrity in Grid Environments. 435-439 - Andrew H. Sung, Gopalakrishna Reddy Tadiparthi, Srinivas Mukkamala:

Defeating the Current Steganalysis Techniques (Robust Steganography). 440-444 - Ram Dantu, Kall Loper, Prakash Kolan:

Risk Management using Behavior based Attack Graphs. 445-449 - Fahad T. Alotaiby, Jim X. Chen:

A Model for Team-based Access Control (TMAC 2004). 450-
Data Mining I
- Mark Smith, Alireza Khotanzad:

An Object-Based Approach for Digital Video Retrieval. 456-459 - Fu-Shing Sun, Chun-Hung Tzeng:

A Mathematical Model of Similarity and Clustering. 460-464 - Soon Myoung Chung, Murali Mangamuri:

Mining Association Rules from Relations on a Parallel NCR Teradata Database System. 465-470 - Matteo Magnani, Danilo Montesi

:
A New Reparation Method for Incomplete Data in the Context of Supervised Learning. 471-475 - Yang Sok Kim, Sung Sik Park, Edward Deards, Byeong Ho Kang:

Adaptive Web Document Classification with MCRDR. 476-
Special Session
- Frank Adelstein, Prasanth Alla, Robert A. Joyce, Golden G. Richard III

:
Physically Locating Wireless Intruders. 482-
Database Technology I
- Joseph Fong, Hing Kwok Wong:

Replicate Relational and XML Databases for Internet Computing. 492-496 - D. S. Yadav, Rajeev Agrawal, D. S. Chauhan, R. C. Saraswat, Arun K. Majumdar:

Modeling Long Duration Transactions with Time Constraints in Active Database. 497-501 - Arthur C. S. Wong, Victor C. S. Lee

, Kwok-Wa Lam:
Accessing Temporal Data Objects in Mobile Computing Environments. 502-506 - Awadhesh Kumar Sharma, A. Goswami, Dharmendra Kumar Gupta:

Fuzzy Inclusion Dependencies in Fuzzy Relational Databases. 507-510 - Bryan Hin Cheung Poon, Kwok-Wa Lam, Victor C. S. Lee:

Server-side Broadcast Transaction in Mobile Computing Environment. 511-
Database Technology II
- Luiz Camolesi Jr.

:
Survivability and Applicability in Database Constraints: Temporal Boundary to Data Integrity Scenarios. 518-522 - Steve Barker, Paul Douglas:

Protecting Federated Databases Using A Practical Implementation of a Formal RBAC Policy. 523-527 - Jamal R. Alsabbagh, Vijay V. Raghavan:

A Model for Multiple-Query Processing Based upon Strong Factoring. 528-533 - Sheikh Iqbal Ahamed, Sanjay Vallecha:

Component-based Embedded Database for Mobile Embedded Systems. 534-538 - Eric Pardede

, J. Wenny Rahayu, David Taniar:
Mapping Methods and Query for Aggregation and Association in Object-Relational Database using Collection. 539-
Database Technology III
- John Rothfork:

Community, Context, and Distance Education. 546-550 - Moses Garuba, Ronald Langrin, Legand L. Burge III:

A Constraint-Based Query Modification Engine for Retrofitting COTS DBMS's. 551-556 - Joseph Gill, Legand L. Burge III, Moses Garuba:

The Design and Implementation of the MESSENGER Trajectory Database. 557-561 - John T. Minor, Laxmi P. Gewali:

Pedagogical Issues in Programming Languages. 562-565 - Moses Garuba, Edward Appiah, Legand L. Burge III:

Performance Study of a MLS/DBMS Implemented as a Kernelized Architecture. 566-
Architecture
- Kentaro Sano, Chiaki Takagi, Ryusuke Egawa, Ken-ichi Suzuki, Tadao Nakamura:

A Systolic Memory Architecture for Fast Codebook Design based on MMPDCL Algorithm. 572-578 - Marjan Karkooti, Joseph R. Cavallaro

:
Semi-Parallel Reconfigurable Architectures for Real-Time LDPC Decoding. 579-585 - Robert Steele, Yuri Ventsov, Tharam S. Dillon:

An Object-Oriented Database-based Architecture for Mobile Enterprise Applications. 586-590 - Hassan Reza, Emanuel S. Grant:

A Formal Approach to Software Architecture of Agent-Base Systems. 591-
Image Processing I
- Weiting Cai, Malek Adjouadi

:
Minimization of Boundary Artifacts on Scalable Image Compression Using Symmetric-Extended Wavelet Transform. 598-602 - Mukesh A. Zaveri, Shabbir N. Merchant, Uday B. Desai:

Arbitrary Trajectories Tracking using Multiple Model Based Particle Filtering in Infrared Image Sequence. 603-607 - Nianjun Liu, Richard I. A. Davis, Brian C. Lovell

, Peter J. Kootsookos:
Effect of Initial HMM Choices in Multiple Sequence Training for Gesture Recognition. 608-613 - Chunliang Gu, Baocai Yin, Yongli Hu, Shiquan Cheng:

Resampling Based Method for Pixel-wise Correspondence between 3D Faces. 614-619 - Xin Lu, Qiong Liu, Shunichiro Oe:

Recognizing Non-rigid Human Actions Using Joints Tracking in Space-time. 620-
Image Processing II
- EunSang Bak

, Kayvan Najarian:
Robust Segmentation Using Parametric and Nonparametric Local Spatial Posteriors. 626-630 - Ming-Jung Seow, Rajkiran Gottumukkal, Deepthi Valaparla, Vijayan K. Asari:

A Robust Face Recognition System for Real Time Surveillance. 631-635 - Madasu Hanmandlu, Vamsi Krishna Madasu

, Shantaram Vasikarla:
A Fuzzy Approach to Texture Segmentation. 636-642 - Li Shen, Fillia Makedon:

Spherical Parameterization for 3D Surface Analysis in Volumetric Images. 643-649 - Mohammad Eyadat:

Factors that Affect the Performance of the DCT-Block Based Image Watermarking Algorithms. 650-
Image Processing III
- Hau T. Ngo, Li Tao, Vijayan K. Asari:

Design of an Efficient Architecture for Real-time Image Enhancement Based on a Luma-Dependent Nonlinear Approach. 656-660 - B. Yegnanarayana, Anil Kumar Sao, B. V. K. Vijaya Kumar

, Marios Savvides:
Determination of Pose Angle of Face using Dynamic Space Warping (DSW). 661-664 - Madasu Hanmandlu, John See

, Shantaram Vasikarla:
Fuzzy Edge Detector Using Entropy Optimization. 665-670 - Reza Safabakhsh

, Shiva Zaboli, Arash Tabibiazar:
Digital Watermarking on Still Images Using Wavelet Transform. 671-675 - Ashfaqur Rahman

, M. Manzur Murshed
, Laurence Dooley:
Feature Weighting Methods for Abstract Features Applicable to Motion based Video Indexing. 676-
Multimedia Applications
- Vladimir Uskov, Alexander Uskov:

National Science Foundation Project on Advanced Online Education in Information Technology. 682-686 - Guang-Lei Song, Kang Zhang:

Visual XML Schemas Based on Reserved Graph Grammars. 687-691 - Jim R. Parker, Mark R. Baumback:

User Interface Augmentation: Vision and Sound. 692-697 - Xiang Zheng, Bing-Feng Zhou, Xi-Feng Fang, Jin-Wen Sun, Duan-Feng Si:

Combining the Product of Interactive Multimedia Creator with MPEG4 Technology. 698-
IT Education, Curriculum & Assessment IV
- Michael Blumenstein:

Experience in Teaching Object-Oriented Concepts to First Year Students with Diverse Backgrounds. 704-708 - David Chiu:

Web-Based Mathematics Education with MathChat. 709-717 - Alexandra I. Cristea

:
Adaptive Course Creation for All. 718-722 - Legand L. Burge III, Moses Garuba, Charita Brent:

Improving Retention of Minority Freshmen in Engineering by Applying the Six Sigma Methodology. 723-728 - Bruce I. Mills, Martha W. Evens, Reva Freedman:

Implementing Directed Lines of Reasoning in an Intelligent Tutoring System Using the Atlas Planning Environment. 729-
Coding Applications
- Hiroyuki Takizawa

, Hiroaki Kobayashi:
A Fast Computation Scheme of Partial Distortion Entropy Updating. 736-741 - M. Nithish, C. Ramakrishna, J. Ramkumar, Priya Lakshmi:

Design and Evaluation of Intermediate Retransmission and Packet Loss Detection Schemes for MPEG4 Transmission. 742-746 - Somphop Chokchaitam, Prasit Teekaput:

Embedded Error Detection in Arithmetic Coding Using Markers. 747-750 - Shaohui Liu, Hongxun Yao, Wen Gao:

Steganalysis of Data Hiding Techniques in Wavelet Domain. 751-754 - John Istle, Pamela Mandelbaum, Emma E. Regentova:

Online Compression of ASCII Files. 755-
Coding /Fault Tolerance
- Chang N. Zhang, Honglan Zhong:

An Integrated Approach for Database Security and Fault Tolerance. 762-766 - Dragos Trinca:

Towards New Algorithms for Data Compression Using Adaptive Codes. 767-771 - Ravi Sankar Veerubhotla, Ashutosh Saxena

, Ved Prakash Gulati, Arun K. Pujari:
On Gossip Codes and Traceability Schemes. 772-777 - Yan Chen, Zhiwei Qu, Zhenhua Zhang, Boon-Lock Yeo:

Data Redundancy and Compression Methods for a Disk-Based Network Backup System. 778-785 - Shen Li, Peizhong Lu, Xiangyang Luo, Yan Zou:

Equivalence of Punctured Convolutional Codes from Shift Equivalent Puncturing Patterns. 786-
Internet and Applications
- K. Venkatesh, S. Aravind, R. Ganapath, T. Srinivasan:

A High Performance Parallel IP Lookup Technique Using Distibuted Memory Organization. 792-797 - Jeffrey E. Boyd, Maxwell Sayles, Luke Olsen, Paul Tarjan:

Content Description Servers for Networked Video Surveillance. 798-803 - Yuqing Mai, Radhika Upadrashta, Xiao Su:

J-Honeypot: A Java-Based Network Deception Tool with Monitoring and Intrusion Detection. 804-808 - Eugin Hyun, Kwang-Su Seong:

The Effective Buffer Architecture for Data Link Layer of PCI Express. 809-

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














