


default search action
ITCC 2004: Las Vegas, NV, USA
- International Conference on Information Technology: Coding and Computing (ITCC'04), Volume 2, April 5-7, 2004, Las Vegas, Nevada, USA. IEEE Computer Society 2004

Database Applications
- S. R. Subramanya, Hiral Patel, Ilker Ersoy

:
Performance Evaluation of Block-Based Motion Estimation Algorithms and Distortion Measures. 2-7 - Lei Zhu:

Geoblock: A LVQ-Based Framework for Geographic Image Retrieval. 8-12 - Kazem Taghva

, Jeffrey S. Coombs, Ray Pereda, Thomas A. Nartker:
Language Model-based Retieval for Farsi Documents. 13-17 - Iker Gondra, Douglas R. Heisterkamp:

Summarizing Inter-Query Learning in Content-Based Image Retrieval via Incremental Semantic Clustering. 18-22 - Ilker Ersoy

, Filiz Bunyak
, S. R. Subramanya:
A Framework for Trajectory Based Visual Event Retrieval. 23-
Distributed Grid System I
- German Florez, Zhen Liu, Susan Bridges, Rayford B. Vaughn, Anthony Skjellum:

Detecting Anomalies in High-Performance Parallel Programs. 30-34 - Shaohua Zhang, Ning Gu, Saihan Li:

Grid Workflow Based on Dynamic Modeling and Scheduling. 35-39 - Nader Mohamed, Jameela Al-Jaroodi, Hong Jiang:

Extensible Communication Architecture for Grid Nodes. 40-44 - Steve Barker:

Access Policy Specification for Web Applications. 45-49 - Bing Wu, Matthew J. Dovey, Muan Hong Ng, Kaihsu Tai, Stuart E. Murdock, Paul Jeffreys, Simon J. Cox, Jonathan W. Essex, Mark S. P. Sansom:

A Web / Grid Portal Implementation of BioSimGrid: A Biomolecular Simulation Database. 50-
Distributed Grid System II
- Giovanni Aloisio

, Massimo Cafaro
, Italo Epicoco
, Gianvito Quarta:
A Problem Solving Environment for Remote Sensing Data Processing. 56-61 - Minjun Wang, Geoffrey C. Fox, Shrideep Pallickara:

A Demonstration of Collaborative Web Services and Peer-to-Peer Grids. 62-67 - Shrideep Pallickara, Geoffrey C. Fox:

On the Matching of Events in Distributed Brokering Systems. 68-76 - Michele Di Santo, Nadia Ranaldo, Domenico Villacci

, Eugenio Zimeo:
Performing Security Analysis of Large Scale Power Systems with a Broker-based Computational Grid. 77-82 - Giovanni Aloisio

, Massimo Cafaro
, Rita Cesari
, Cristina Mangia, Gian Paolo Marra
, Mario Marcello Miglietta
, Maria Mirto, Umberto Rizza
, Ilenia Schipa, Annalisa Tanzarella:
G-AQFS: Grid Computing Exploitation for the Management of Air Quality in Presence of Complex Meteorological Circulations. 83-
Distributed Grid System III
- Mario Cannataro

, Carmela Comito
, Antonella Guzzo, Pierangelo Veltri
:
Integrating Ontology and Workflow in PROTEUS, a Grid-Based Problem Solving Environment for Bioinformatics. 90-94 - Christoph Jung, Martin Einhoff, Stefan Noll, Norbert Schiffner:

Grid Job Builder - A Workflow Editor for Computing Grids. 95-99 - Mei Lin

, Zhangxi Lin:
A Cost-Effective Critical Path Approach for Service Priority Optimization in the Grid Computing Economy. 100-104 - Said Mirza Pahlevi, Isao Kojima:

OGSA-WebDB: An OGSA-Based System for Bringing Web Databases into the Grid. 105-
POSTER SESSION - I
- Bilal Rizvi, Emmanuel Fernández-Gaucherand:

Effectiveness of Advanced and Authenticated Packet Marking Scheme for Traceback of Denial of Service Attacks. 111-115 - Aishwarya Iyer, Lorie M. Liebrock:

Vulnerability Scanning for Buffer Overflow. 116-117 - Vesselin Tzvetkov:

Disaster coverable PKI model based on Majority Trust principle. 118-119 - Baice Li, Senmiao Yuan:

A Novel Relevance Feedback Method in Content-Based Image Retrieval. 120-123 - Guadalupe Aguado de Cea, Asunción Gómez-Pérez

, Inmaculada Álvarez de Mon y Rego, Antonio Pareja-Lora
:
OntoTag's Linguistic Ontologies: Improving Semantic Web Annotations for a Better Language Understanding in Machines. 124-128 - Elharith Elrufaie, David A. Turner:

Bidding in P2P Content Distribution Networks using the Lightweight Currency Paradigm. 129-130 - Benny Y. M. Fung, Vincent T. Y. Ng

:
Improving Classification Performance for Heterogeneous Cancer Gene Expression Data. 131-132 - Alberto Sillitti, Andrea Janes

, Giancarlo Succi
, Tullio Vernazza:
Monitoring the Development Process with Eclipse. 133-134 - Stanislav Kurkovsky

, Bhagyavati, Arris Ray, Mei Yang:
Modeling a Grid-Based Problem Solving Environment for Mobile Devices. 135-
POSTER SESSION - II
- Li Tao, Vijayan K. Asari:

An Integrated Neighborhood Dependent Approach for Nonlinear Enhancement of Color Images. 138-139 - Guangming Xing, Bill Tseng:

Extendible Range-Based Numbering Scheme for XML Document. 140-141 - Warnill Chung, Soon-Young Park, Hae-Young Bae:

An Extension of XQuery for Moving Objects over GML. 142-147 - Paul Lynch, Xiaocheng Luan, Maureen Prettyman, Lee Mericle, Edward Borkmann, Jonathan Schlaifer:

An Evaluation of New and Old Similarity Ranking Algorithms. 148-149 - Ebru Celikel, Mehmet Emin Dalkiliç:

Experiments on A Secure Compression Algorithm. 150-152 - Xukai Zou, Byrav Ramamurthy

, Spyros S. Magliveras:
A GCD attack resistant CRTHACS for secure group communications. 153-154 - Rion Dooley

:
A Distributed Quadtree Dictionary Approach to Multi-Resolution Compression. 155-156 - Satyanadh Gundimada, Vijayan K. Asari:

Face Detection Technique Based on Rotation Invariant Wavelet Features. 157-158 - Alexia Giannoula, Dimitrios Hatzinakos:

Integrating Compression with Watermarking on Video Sequences. 159-
Learning / Education
- Yasuo Narukawa

, Vicenç Torra
:
Fuzzy Measures and Integrals for Evaluating Strategies. 162-166 - Ronggong Song, Larry Korba:

How to Make E-cash with Non-Repudiation and Anonymity. 167-172 - Douglas R. Dechow:

A Workshop on Advanced Separation of Concerns and Aspect-Oriented Programming. 173-177 - Perfecto Mariño, Heriberto Hernández, Miguel Angel Domínguez, Francisco Poza

, Fernando Machado
, Fernando Vázquez:
Applied Fieldbus Knowledge for ICT Engineers. 178-182 - Yi-li Qian, Jia-heng Zheng:

An Approach to Improving the Quality of Part-of-Speech Tagging of Chinese Text. 183-187 - Behrouz Minaei-Bidgoli, Alexander P. Topchy, William F. Punch:

Ensembles of Partitions via Data Resampling. 188-192 - Lucas Baggio Figueira, Maria do Carmo Nicoletti:

Choosing the Initial Set of Exemplars when Learning with an NGE-based System. 193-197 - Ray R. Hashemi, Louis A. Le Blanc, Bart J. Westgeest:

The Effects of Business Rules on Transactional Association Analysis. 198-202 - Ranjit Bose:

Information Technologies for Education & Training in E-Government. 203-207 - Susanna Pirttikangas

, Jukka Riekki
, Juha Röning:
Routine Learning: Analyzing Your Whereabouts. 208-
Information Retrieval
- Daniel Mallett, James Elding, Mario A. Nascimento:

Information-Content Based Sentence Extraction for Text Summarization. 214-218 - Rebecca Cathey, Steven M. Beitzel, Eric C. Jensen, Angelo J. Pilotto, David A. Grossman:

Measuring the Scalability of Relationally Mapped Semistructured Queries. 219-223 - Nan Zhang, Tao Tao, Ravi Vijaya Satya, Amar Mukherjee:

Modified LZW Algorithm for Efficient Compressed Text Retrieval. 224-228 - Cher-Sheng Cheng, Jean Jyh-Jiun Shann, Chung-Ping Chung:

A Unique-Order Interpolative Code for Fast Querying and Space-Efficient Indexing in Information Retrieval Systems. 229-235 - Yalçin Çebi, Gökhan Dalkiliç

:
Turkish Word N-gram Analyzing Algorithms for a Large Scale Turkish Corpus - TurCo. 236-240 - M. Emre Celebi, Y. Alp Aslandogan:

Content-Based Image Retrieval Incorporating Models of Human Perception. 241-245 - Jim R. Parker, Brad Behm:

Use of Multiple Algorithms in Image Content Searches. 246-
Mobile Enterprise I
- Nilmini Wickramasinghe

, Steve Goldberg:
How M=Ec2 in Healthcare. 252-257 - Mohammad Mahfuzul Islam, M. Manzur Murshed

, Laurence Dooley:
Enhanced Cell Visiting Probability for QoS Provisioning in Mobile Multimedia Communications. 258-262 - Jordi Herrera-Joancomartí

, Josep Prieto-Blázquez
, Jordi Castellà-Roca
:
A Secure Electronic Examination Protocol using Wireless Networks. 263-268 - Elaine Lawrence, John Lawrence:

Threats to the Mobile Enterprise: Jurisprudence Analysis of Wardriving and Warchalking. 269-274 - Manuel Rodríguez-Martínez, José F. Enseñat, Elfred Pagan, Juan G. Arzola, Maniel Sotomayor, Elliot Varga:

Registration and Discovery of Services in the NetTraveler Integration System for Mobile Devices. 275-281 - Robert Steele, Yuri Ventsov, Sri Madhisetty, Laurie Benkovich:

A Two-tier Architecture for Automated Mobile Applications. 282-
Language Understanding
- Shaozi Li, Wenjian You, Tangqiu Li, Huowang Chen:

Lexical-chain and It's Application in Text Filtering. 288-292 - Haytham Alsharaf, Sylviane Cardey, Peter Greenfield, Yihui Shen:

Problems and Solutions in Machine Translation Involving Arabic, Chinese and French. 293-297 - Mohamed Abdel Fattah, Fuji Ren, Shingo Kuroiwa:

Internet Archive as a Source of Bilingual Dictionary. 298-302 - Steffen Werner, Matthias Wolff, Matthias Eichner, Rüdiger Hoffmann:

Integrating Speech Enabled Services in a web-based e-Learning Environment. 303-307 - Jari Mäkinen, Janne Vainio:

Source Signal based Rate Adaptation for GSM AMR Speech Codec. 308-313 - Yvette Yannick Mathieu:

Linguistic Knowledge and Automatic Semantic Representation of Emotions and Feelings. 314-318 - Gökhan Dalkiliç

, Yalçin Çebi:
Word Statistics of Turkish Language on a Large Scale Text Corpus - TurCo. 319-
Potpourri I
- Maumita Bhattacharya

:
An Informed Operator Approach to Tackle Diversity Constraints in Evolutionary Search. 326-330 - V. Radha, Ved Prakash Gulati, Arun K. Pujari:

Efficient Multicast E-Services Over APPCAST. 331-336 - Ganesh Subbiah, M. Jayaraj, V. Kalyan, Srinivasa Murthy, G. Aghila:

Ontology-based Web Crawler. 337-341 - Reza Hashemian, Bipin Sreedharan:

A Hybrid Number System And Its Application In FPGA-DSP Technology. 342-346 - S. Venkatraman, Ajith Abraham, Marcin Paprzycki

:
Significance of Steganography on Data Security. 347-351 - Kai Luo, Shahram Latifi, Kazem Taghva

, Emma E. Regentova:
Recognition and Identification of Form Document Layouts. 352-356 - Nadia Nedjah

, Luiza de Macedo Mourelle
:
Evolutionary Time Scheduling. 357-361 - Senthamil Ilango, Johnson Thomas:

Group Key Management utilizing Huffman and Petrick based approaches. 362-366 - Pedram Azad, Tilo Gockel, Rüdiger Dillmann:

3D Shape Acquisition using a combined SSD and Least Squares Correlation Approach. 367-371 - Ajumobi Udechukwu, Ken Barker, Reda Alhajj:

Mining User Navigational Patterns in Dynamically Changing Environments. 372-
Wireless Ad Hoc Network
- Hsien-Chou Liao, Yi-Wei Ting, Shih-Hsuan Yen, Chou Chen Yang:

Ant Mobility Model Platform for Network Simulator. 380-384 - Muhammad Mahmudul Islam, Ronald Pose, Carlo Kopp:

Multiple Directional Antennas in Suburban Ad-Hoc Networks. 385-389 - Xianhui Xie, Larry Hughes:

Statistic-based Routing in Wireless Sensor Networks. 390-394 - Ram Dantu, Sachin P. Joglekar:

Collaborative Vision using Networked Sensors. 395-399 - L. Lanae Neild, Roy P. Pargas:

Investigating Peer-to-peer Systems for Resource Sharing within a Small Group of Nodes. 400-404 - Mike Burmester, Tri Van Le:

Secure Multipath Communication in Mobile Ad hoc Networks. 405-409 - Robert Steele, Marcin Lubonski, Yuri Ventsov, Elaine Lawrence:

Accessing SMIL-based Dynamically Adaptable Multimedia Presentations from Mobile Devices. 410-
Web / Database Applications
- Jianhong Li, Xiaojun Liang, Laxmi P. Gewali:

Extended DCEL Data Structure for Mobile Computing. 416-420 - Narudol Chankuang, Suphamit Chittayasothorn:

An Object and XML Database Schemas Design Tool. 421-427 - Vincent T. Y. Ng

, Chi-Kong Chan, Shiu Hin Wang:
Prefetching XML Data with Abstract Query Mining. 428-432 - Alexandr Seleznyov, Stephen Hailes:

Distributed Knowledge Management for Autonomous Access Control in Computer Networks. 433-437 - Muhammad Ashraful Alam:

Software Security in Bangladesh with .NET Framework: A Roadmap. 438-443 - Shengru Tu, Maik Flanagin, Ying Wu, Mahdi Abdelguerfi, Eric Normand, Venkata Mahadevan, Jay J. Ratcliff, Kevin Shaw:

Design Strategies to Improve Performance of GIS Web Services. 444-
Data Mining II
- Yi-fang Brook Wu, Quanzhi Li, Razvan Stefan Bot, Xin Chen:

KIP: A Keyphrase Identification Program with Learning Functions. 450-454 - Syed Riaz Ahmed:

Applications of Data Mining in Retail Business. 455-459 - Abdullah Uz Tansel:

Integrity Constraints in Temporal Relational Databases. 460-464 - Y. Alp Aslandogan, Gauri A. Mahajani, Stan Taylor:

Evidence Combination in Medical Data Mining. 465-469 - Kwok-Wa Lam, Victor C. S. Lee:

Building Decision Trees Using Functional Dependencies. 470-473 - Kang Hyuk Lee, Byeong Ho Kang:

A New Framework for Uncertainty Sampling: Exploiting Uncertain and Positive-Certain Examples in Similarity-Based Text Classification. 474-479 - Charles Wesley Ford, Chia-Chu Chiang, Hao Wu, Radhika R. Chilka, John R. Talburt:

Confidence on Approximate Query in Large Datasets. 480-
Cryptographic Hardware I
- Jonathan Lutz, M. Anwarul Hasan:

High Performance FPGA based Elliptic Curve Cryptographic Co-Processor. 486-492 - Nazar Abbas Saqib

, Francisco Rodríguez-Henríquez, Arturo Díaz-Pérez:
A Parallel Architecture for Computing Scalar Multiplication on Hessian Elliptic Curves. 493-497 - Alireza Hodjat, Patrick Schaumont

, Ingrid Verbauwhede
:
Architectural Design Features of a Programmable High Throughput AES Coprocessor. 498-502 - Nadia Nedjah

, Luiza de Macedo Mourelle
:
Multi-Objective Evolutionary Hardware for RSA-Based Cryptosystems. 503-507 - Luiza de Macedo Mourelle

, Nadia Nedjah
:
Efficient Cryptographic Hardware Using the Co-Design Methodology. 508-512 - Jan Pelzl, Thomas J. Wollinger, Christof Paar:

High Performance Arithmetic for special Hyperelliptic Curve Cryptosystems of Genus Two. 513-517 - Manfred Schimmler, Viktor Bunimov:

Fast Modular Multiplication by Operand Changing. 518-524 - An Yu, David S. Brée:

A Clock-less Implementation of the AES Resists to Power and Timing Attacks. 525-532 - Nedeljko Cvejic, Tapio Seppänen:

Increasing Robustness of LSB Audio Steganography Using a Novel Embedding Method. 533-537 - Guido Bertoni

, Luca Breveglieri
, Thomas J. Wollinger, Christof Paar:
Finding Optimum Parallel Coprocessor Design for Genus 2 Hyperelliptic Curve Cryptosystems. 538-
Cryptographic Hardware II
- Siddika Berna Örs

, Frank K. Gürkaynak, Elisabeth Oswald, Bart Preneel:
Power-Analysis Attack on an ASIC AES implementation. 546-552 - Michele Elia, Manuel Leone

:
A Basis-Independent Algorithm to Design Fast Parallel Multipliers over GF(2m). 553-559 - Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume:

On the Importance of Protecting Delta in SFLASH against Side Channel Attacks. 560-568 - Ruby B. Lee, Zhijie Shi, Yiqun Lisa Yin, Ronald L. Rivest, Matthew J. B. Robshaw:

On Permutation Operations in Cipher Design. 569-577 - Herwin Chan, Alireza Hodjat, Jun Shi, Richard D. Wesel, Ingrid Verbauwhede

:
Streaming Encryption for a Secure Wavelength and Time Domain Hopped Optical Network. 578-582 - Gaël Rouvroy, François-Xavier Standaert

, Jean-Jacques Quisquater, Jean-Didier Legat:
Compact and Efficient Encryption/Decryption Module for FPGA Implementation of the AES Rijndael Very Well Suited for Small Embedded Applications. 583-587 - Amir K. Daneshbeh, M. Anwarul Hasan:

Area Efficient High Speed Elliptic Curve Cryptoprocessor for Random Curves. 588-
Space Science Computation and IT Applications
- Xiang Li, Rahul Ramachandran

, Matt He, Sunil Movva, John A. Rushing, Sara J. Graves, Wladislaw Lyatsky, Arjun Tan, Glynn A. Germany:
Comparing Different Thresholding Algorithms for Segmenting Auroras. 594-601 - Naveen Santhanam, Timothy S. Newman, Dennis L. Gallagher:

Exploiting Known Latitudinal Variations for Improved Limited-Angle Tomographic Reconstruction of the Plasmasphere. 602-606 - Erzsébet Merényi, William H. Farrand, Philip Tracadas:

Mapping Surface Materials on Mars from Mars Pathfinder Spectral Images with HYPEREYE. 607-614 - Stamatios V. Kartalopoulos:

Factors Affecting the Signal Quality in Optical Data Transmission and Estimation Method for BER and SNR. 615-619 - Artyom M. Grigoryan, Serkan Dursun, Emma E. Regentova:

Lossless Encoding Based on Redistribution of Statistics. 620-624 - Chia-Chu Chiang, Peiyi Tang:

On the Design of Heterogeneous Applications for Distributed Coordination. 625-
Potpourri II
- Chadia Moghrabi, Tang-Ho Lê, Jean Roy, Johanne Hachey:

Digital Library Resources Description. 632-637 - Jahanshah Kabudian, Mohammad Reza Meybodi, Mohammad Mehdi Homayounpour:

Applying Continuous Action Reinforcement Learning Automata(CARLA) to Global Training of Hidden Markov Models. 638-642 - Phillip G. Bradford, Marcus Brown, Josh Perdue, Bonnie Self:

Towards Proactive Computer-System Forensics. 648-652 - Farzin Ahmadianpour, M. Omair Ahmad:

A Novel Approach for Bi-directional Motion Estimation and Compensation. 653-657 - Zhiwen Yu, Jianhua Gu, Xingshe Zhou, Zhiyi Yang:

Fuzzy Clustering for TV Program Classification. 658-
IMAGE / VIDEO Processing
- Mohan M. Trivedi, Kohsia S. Huang, Tarak Gandhi, Brett Hall, Kimberly Harlow:

Distributed Omni-Video Arrays and Digital Tele-Viewer for Customized Viewing, Event Detection and Notification. 669-674 - Foued Derraz, Mohamed Beladgham, M'hamed Khelif:

Application of Active Contour Models in Medical Image Segmentation. 675-681 - Cheruku Venkateswarlu, Sumanth Yenduri, S. Sitharama Iyengar

:
Digital Analysis of Thermal Infrared Imagery using Temperature Mapping. 682-688 - Abdullah Al Yusuf, M. Manzur Murshed

, Laurence Dooley:
An HVS-based Motion Vector Composition Algorithm for Spatial Resolution Transcoding. 689-693 - K. V. Ramana, S. Khader Basha:

Neural Image Recognition System with Application to Tuberculosis Detection. 694-698 - Xiao Su

, Yi Shang:
Error Concealment of Transform Coded Images With Continuous QoS. 699-703 - Jianyun Xu, Andrew H. Sung, Peipei Shi, Qingzhong Liu

:
JPEG Compression Immune Steganography Using Wavelet Transform. 704-708 - Narges Ahmidi, Reza Safabakhsh

:
A Novel DCT-based Approach for Secure Color Image Watermarking. 709-713 - Zhiguo Cheng, Yuncai Liu:

Efficient Technique for Ellipse Detection Using Restricted Randomized Hough Transform. 714-
Mobile Enterprise II
- Jun Yao, Guihua Zeng:

Key Agreement and Identity Authentication Protocols for Ad Hoc Networks. 720-724 - Jiageng Li, David Cordes:

Hybrid Greedy/multicasting Power-aware Routing Protocol in Ad Hoc Networks. 725-729 - O. B. V. Ramanaiah, Hrushikesha Mohanty:

NICD: A Novel Indexless Wireless On-Demand Data Broadcast Algorithm. 730-734 - Chit Htay Lwin, Hrushikesha Mohanty, R. K. Ghosh:

Causal Ordering in Event Notification Service Systems for Mobile Users. 735-740 - Yongjian Li, Rui Xue:

Using SPIN to Model Cryptographic Protocols. 741-745 - Sojen Pradhan, Elaine Lawrence, Stephen Newton, Johit Das:

Bluetooth Potential in the M-Enterprise: A Feasibility Study. 746-751 - Valentina Casola

, Massimiliano Rak
, Rosa Preziosi, Luigi Troiano
:
Security Level Evaluation: Policy and Fuzzy Techniques. 752-
E Gaming
- Antoni Martínez-Ballesté

, Francesc Sebé
, Josep Domingo-Ferrer:
Secure Large-Scale Bingo. 758-762 - Marcel Fernandez, Miguel Soriano

:
Efficient Recovery of Secrets. 763-767 - Carlo Blundo

, Stelvio Cimato
:
A Platform for Secure E-Gambling. 768-772 - Pino Caballero-Gil

, Candelaria Hernández-Goya
, Carlos Bruno-Castañeda:
A Game-Theoretic Model for Two-Party Cryptographic Protocols. 773-777 - Jordi Castellà-Roca

, Josep Domingo-Ferrer:
A Non-Repudiable Bitstring Commitment Scheme Based on a Public-Key Cryptosystem. 778-780 - Jordi Castellà-Roca

, Josep Domingo-Ferrer:
On the Security of an Efficient TTP-Free Mental Poker Protocol. 781-
Applications
- Maryam Tayefeh Mahmoudi, Kambiz Badie:

An Approach to On-line Text Generation for E-learning Purposes. 786-789 - Jing Yang, Wook Chang, Won-Chul Bang, Eun-Seok Choi, Kyoung-Ho Kang, Sung-Jung Cho, Dong-Yoon Kim:

Analysis and Compensation of Errors in the Input Device Based on Inertial Sensors. 790-796 - Tadahiko Kumamoto, Kimiko Ohta:

Evaluation and Comparison of Natural Language and Graphical User Interfaces in "Query-by-Impressions" Scenes. 797-804 - Fanhuai Shi, Yuncai Liu:

Estimation of Camera Pose Using 2D to 3D Corner Correspondence. 805-809 - Gail-Joon Ahn

, Badrinath Mohan:
Secure Information Sharing Using Role-based Delegation. 810-819 - Huayong Wang, Yiqi Dai:

An Information Search Interface with Soft Real-time Guarantee. 820-
New Session
- Ling Wang, Yingtao Jiang, Henry Selvaraj:

Synthesis Scheme for Low Power Designs with Multiple Supply Voltages by Heuristic Algorithms. 829-833 - Ali Al-Timimi, D. Curtis Jamison:

Knowledge Discovery in a Microarray Data Warehouse. 834-839 - Naveen Babu Anne, Utthaman Thirunavukkarasu, Shahram Latifi:

Three and Four-dimensional Parity-check Codes for Correction and Detection of Multiple Errors. 840-845 - Daggu Venkateshwar Rao, Muthukumar Venkatesan:

An Efficient Reconfigurable Architecture and Implementation of Edge Detection Algorithm using Handle-C. 846-

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














