default search action
ITCC 2004: Las Vegas, NV, USA
- International Conference on Information Technology: Coding and Computing (ITCC'04), Volume 2, April 5-7, 2004, Las Vegas, Nevada, USA. IEEE Computer Society 2004
Database Applications
- S. R. Subramanya, Hiral Patel, Ilker Ersoy:
Performance Evaluation of Block-Based Motion Estimation Algorithms and Distortion Measures. 2-7 - Lei Zhu:
Geoblock: A LVQ-Based Framework for Geographic Image Retrieval. 8-12 - Kazem Taghva, Jeffrey S. Coombs, Ray Pereda, Thomas A. Nartker:
Language Model-based Retieval for Farsi Documents. 13-17 - Iker Gondra, Douglas R. Heisterkamp:
Summarizing Inter-Query Learning in Content-Based Image Retrieval via Incremental Semantic Clustering. 18-22 - Ilker Ersoy, Filiz Bunyak, S. R. Subramanya:
A Framework for Trajectory Based Visual Event Retrieval. 23-
Distributed Grid System I
- German Florez, Zhen Liu, Susan Bridges, Rayford B. Vaughn, Anthony Skjellum:
Detecting Anomalies in High-Performance Parallel Programs. 30-34 - Shaohua Zhang, Ning Gu, Saihan Li:
Grid Workflow Based on Dynamic Modeling and Scheduling. 35-39 - Nader Mohamed, Jameela Al-Jaroodi, Hong Jiang:
Extensible Communication Architecture for Grid Nodes. 40-44 - Steve Barker:
Access Policy Specification for Web Applications. 45-49 - Bing Wu, Matthew J. Dovey, Muan Hong Ng, Kaihsu Tai, Stuart E. Murdock, Paul Jeffreys, Simon J. Cox, Jonathan W. Essex, Mark S. P. Sansom:
A Web / Grid Portal Implementation of BioSimGrid: A Biomolecular Simulation Database. 50-
Distributed Grid System II
- Giovanni Aloisio, Massimo Cafaro, Italo Epicoco, Gianvito Quarta:
A Problem Solving Environment for Remote Sensing Data Processing. 56-61 - Minjun Wang, Geoffrey C. Fox, Shrideep Pallickara:
A Demonstration of Collaborative Web Services and Peer-to-Peer Grids. 62-67 - Shrideep Pallickara, Geoffrey C. Fox:
On the Matching of Events in Distributed Brokering Systems. 68-76 - Michele Di Santo, Nadia Ranaldo, Domenico Villacci, Eugenio Zimeo:
Performing Security Analysis of Large Scale Power Systems with a Broker-based Computational Grid. 77-82 - Giovanni Aloisio, Massimo Cafaro, Rita Cesari, Cristina Mangia, Gian Paolo Marra, Mario Marcello Miglietta, Maria Mirto, Umberto Rizza, Ilenia Schipa, Annalisa Tanzarella:
G-AQFS: Grid Computing Exploitation for the Management of Air Quality in Presence of Complex Meteorological Circulations. 83-
Distributed Grid System III
- Mario Cannataro, Carmela Comito, Antonella Guzzo, Pierangelo Veltri:
Integrating Ontology and Workflow in PROTEUS, a Grid-Based Problem Solving Environment for Bioinformatics. 90-94 - Christoph Jung, Martin Einhoff, Stefan Noll, Norbert Schiffner:
Grid Job Builder - A Workflow Editor for Computing Grids. 95-99 - Mei Lin, Zhangxi Lin:
A Cost-Effective Critical Path Approach for Service Priority Optimization in the Grid Computing Economy. 100-104 - Said Mirza Pahlevi, Isao Kojima:
OGSA-WebDB: An OGSA-Based System for Bringing Web Databases into the Grid. 105-
POSTER SESSION - I
- Bilal Rizvi, Emmanuel Fernández-Gaucherand:
Effectiveness of Advanced and Authenticated Packet Marking Scheme for Traceback of Denial of Service Attacks. 111-115 - Aishwarya Iyer, Lorie M. Liebrock:
Vulnerability Scanning for Buffer Overflow. 116-117 - Vesselin Tzvetkov:
Disaster coverable PKI model based on Majority Trust principle. 118-119 - Baice Li, Senmiao Yuan:
A Novel Relevance Feedback Method in Content-Based Image Retrieval. 120-123 - Guadalupe Aguado de Cea, Asunción Gómez-Pérez, Inmaculada Álvarez de Mon y Rego, Antonio Pareja-Lora:
OntoTag's Linguistic Ontologies: Improving Semantic Web Annotations for a Better Language Understanding in Machines. 124-128 - Elharith Elrufaie, David A. Turner:
Bidding in P2P Content Distribution Networks using the Lightweight Currency Paradigm. 129-130 - Benny Y. M. Fung, Vincent T. Y. Ng:
Improving Classification Performance for Heterogeneous Cancer Gene Expression Data. 131-132 - Alberto Sillitti, Andrea Janes, Giancarlo Succi, Tullio Vernazza:
Monitoring the Development Process with Eclipse. 133-134 - Stanislav Kurkovsky, Bhagyavati, Arris Ray, Mei Yang:
Modeling a Grid-Based Problem Solving Environment for Mobile Devices. 135-
POSTER SESSION - II
- Li Tao, Vijayan K. Asari:
An Integrated Neighborhood Dependent Approach for Nonlinear Enhancement of Color Images. 138-139 - Guangming Xing, Bill Tseng:
Extendible Range-Based Numbering Scheme for XML Document. 140-141 - Warnill Chung, Soon-Young Park, Hae-Young Bae:
An Extension of XQuery for Moving Objects over GML. 142-147 - Paul Lynch, Xiaocheng Luan, Maureen Prettyman, Lee Mericle, Edward Borkmann, Jonathan Schlaifer:
An Evaluation of New and Old Similarity Ranking Algorithms. 148-149 - Ebru Celikel, Mehmet Emin Dalkiliç:
Experiments on A Secure Compression Algorithm. 150-152 - Xukai Zou, Byrav Ramamurthy, Spyros S. Magliveras:
A GCD attack resistant CRTHACS for secure group communications. 153-154 - Rion Dooley:
A Distributed Quadtree Dictionary Approach to Multi-Resolution Compression. 155-156 - Satyanadh Gundimada, Vijayan K. Asari:
Face Detection Technique Based on Rotation Invariant Wavelet Features. 157-158 - Alexia Giannoula, Dimitrios Hatzinakos:
Integrating Compression with Watermarking on Video Sequences. 159-
Learning / Education
- Yasuo Narukawa, Vicenç Torra:
Fuzzy Measures and Integrals for Evaluating Strategies. 162-166 - Ronggong Song, Larry Korba:
How to Make E-cash with Non-Repudiation and Anonymity. 167-172 - Douglas R. Dechow:
A Workshop on Advanced Separation of Concerns and Aspect-Oriented Programming. 173-177 - Perfecto Mariño, Heriberto Hernández, Miguel Angel Domínguez, Francisco Poza, Fernando Machado, Fernando Vázquez:
Applied Fieldbus Knowledge for ICT Engineers. 178-182 - Yi-li Qian, Jia-heng Zheng:
An Approach to Improving the Quality of Part-of-Speech Tagging of Chinese Text. 183-187 - Behrouz Minaei-Bidgoli, Alexander P. Topchy, William F. Punch:
Ensembles of Partitions via Data Resampling. 188-192 - Lucas Baggio Figueira, Maria do Carmo Nicoletti:
Choosing the Initial Set of Exemplars when Learning with an NGE-based System. 193-197 - Ray R. Hashemi, Louis A. Le Blanc, Bart J. Westgeest:
The Effects of Business Rules on Transactional Association Analysis. 198-202 - Ranjit Bose:
Information Technologies for Education & Training in E-Government. 203-207 - Susanna Pirttikangas, Jukka Riekki, Juha Röning:
Routine Learning: Analyzing Your Whereabouts. 208-
Information Retrieval
- Daniel Mallett, James Elding, Mario A. Nascimento:
Information-Content Based Sentence Extraction for Text Summarization. 214-218 - Rebecca Cathey, Steven M. Beitzel, Eric C. Jensen, Angelo J. Pilotto, David A. Grossman:
Measuring the Scalability of Relationally Mapped Semistructured Queries. 219-223 - Nan Zhang, Tao Tao, Ravi Vijaya Satya, Amar Mukherjee:
Modified LZW Algorithm for Efficient Compressed Text Retrieval. 224-228 - Cher-Sheng Cheng, Jean Jyh-Jiun Shann, Chung-Ping Chung:
A Unique-Order Interpolative Code for Fast Querying and Space-Efficient Indexing in Information Retrieval Systems. 229-235 - Yalçin Çebi, Gökhan Dalkiliç:
Turkish Word N-gram Analyzing Algorithms for a Large Scale Turkish Corpus - TurCo. 236-240 - M. Emre Celebi, Y. Alp Aslandogan:
Content-Based Image Retrieval Incorporating Models of Human Perception. 241-245 - Jim R. Parker, Brad Behm:
Use of Multiple Algorithms in Image Content Searches. 246-
Mobile Enterprise I
- Nilmini Wickramasinghe, Steve Goldberg:
How M=Ec2 in Healthcare. 252-257 - Mohammad Mahfuzul Islam, M. Manzur Murshed, Laurence Dooley:
Enhanced Cell Visiting Probability for QoS Provisioning in Mobile Multimedia Communications. 258-262 - Jordi Herrera-Joancomartí, Josep Prieto-Blázquez, Jordi Castellà-Roca:
A Secure Electronic Examination Protocol using Wireless Networks. 263-268 - Elaine Lawrence, John Lawrence:
Threats to the Mobile Enterprise: Jurisprudence Analysis of Wardriving and Warchalking. 269-274 - Manuel Rodríguez-Martínez, José F. Enseñat, Elfred Pagan, Juan G. Arzola, Maniel Sotomayor, Elliot Varga:
Registration and Discovery of Services in the NetTraveler Integration System for Mobile Devices. 275-281 - Robert Steele, Yuri Ventsov, Sri Madhisetty, Laurie Benkovich:
A Two-tier Architecture for Automated Mobile Applications. 282-
Language Understanding
- Shaozi Li, Wenjian You, Tangqiu Li, Huowang Chen:
Lexical-chain and It's Application in Text Filtering. 288-292 - Haytham Alsharaf, Sylviane Cardey, Peter Greenfield, Yihui Shen:
Problems and Solutions in Machine Translation Involving Arabic, Chinese and French. 293-297 - Mohamed Abdel Fattah, Fuji Ren, Shingo Kuroiwa:
Internet Archive as a Source of Bilingual Dictionary. 298-302 - Steffen Werner, Matthias Wolff, Matthias Eichner, Rüdiger Hoffmann:
Integrating Speech Enabled Services in a web-based e-Learning Environment. 303-307 - Jari Mäkinen, Janne Vainio:
Source Signal based Rate Adaptation for GSM AMR Speech Codec. 308-313 - Yvette Yannick Mathieu:
Linguistic Knowledge and Automatic Semantic Representation of Emotions and Feelings. 314-318 - Gökhan Dalkiliç, Yalçin Çebi:
Word Statistics of Turkish Language on a Large Scale Text Corpus - TurCo. 319-
Potpourri I
- Maumita Bhattacharya:
An Informed Operator Approach to Tackle Diversity Constraints in Evolutionary Search. 326-330 - V. Radha, Ved Prakash Gulati, Arun K. Pujari:
Efficient Multicast E-Services Over APPCAST. 331-336 - Ganesh Subbiah, M. Jayaraj, V. Kalyan, Srinivasa Murthy, G. Aghila:
Ontology-based Web Crawler. 337-341 - Reza Hashemian, Bipin Sreedharan:
A Hybrid Number System And Its Application In FPGA-DSP Technology. 342-346 - S. Venkatraman, Ajith Abraham, Marcin Paprzycki:
Significance of Steganography on Data Security. 347-351 - Kai Luo, Shahram Latifi, Kazem Taghva, Emma E. Regentova:
Recognition and Identification of Form Document Layouts. 352-356 - Nadia Nedjah, Luiza de Macedo Mourelle:
Evolutionary Time Scheduling. 357-361 - Senthamil Ilango, Johnson Thomas:
Group Key Management utilizing Huffman and Petrick based approaches. 362-366 - Pedram Azad, Tilo Gockel, Rüdiger Dillmann:
3D Shape Acquisition using a combined SSD and Least Squares Correlation Approach. 367-371 - Ajumobi Udechukwu, Ken Barker, Reda Alhajj:
Mining User Navigational Patterns in Dynamically Changing Environments. 372-
Wireless Ad Hoc Network
- Hsien-Chou Liao, Yi-Wei Ting, Shih-Hsuan Yen, Chou Chen Yang:
Ant Mobility Model Platform for Network Simulator. 380-384 - Muhammad Mahmudul Islam, Ronald Pose, Carlo Kopp:
Multiple Directional Antennas in Suburban Ad-Hoc Networks. 385-389 - Xianhui Xie, Larry Hughes:
Statistic-based Routing in Wireless Sensor Networks. 390-394 - Ram Dantu, Sachin P. Joglekar:
Collaborative Vision using Networked Sensors. 395-399 - L. Lanae Neild, Roy P. Pargas:
Investigating Peer-to-peer Systems for Resource Sharing within a Small Group of Nodes. 400-404 - Mike Burmester, Tri Van Le:
Secure Multipath Communication in Mobile Ad hoc Networks. 405-409 - Robert Steele, Marcin Lubonski, Yuri Ventsov, Elaine Lawrence:
Accessing SMIL-based Dynamically Adaptable Multimedia Presentations from Mobile Devices. 410-
Web / Database Applications
- Jianhong Li, Xiaojun Liang, Laxmi P. Gewali:
Extended DCEL Data Structure for Mobile Computing. 416-420 - Narudol Chankuang, Suphamit Chittayasothorn:
An Object and XML Database Schemas Design Tool. 421-427 - Vincent T. Y. Ng, Chi-Kong Chan, Shiu Hin Wang:
Prefetching XML Data with Abstract Query Mining. 428-432 - Alexandr Seleznyov, Stephen Hailes:
Distributed Knowledge Management for Autonomous Access Control in Computer Networks. 433-437 - Muhammad Ashraful Alam:
Software Security in Bangladesh with .NET Framework: A Roadmap. 438-443 - Shengru Tu, Maik Flanagin, Ying Wu, Mahdi Abdelguerfi, Eric Normand, Venkata Mahadevan, Jay J. Ratcliff, Kevin Shaw:
Design Strategies to Improve Performance of GIS Web Services. 444-
Data Mining II
- Yi-fang Brook Wu, Quanzhi Li, Razvan Stefan Bot, Xin Chen:
KIP: A Keyphrase Identification Program with Learning Functions. 450-454 - Syed Riaz Ahmed:
Applications of Data Mining in Retail Business. 455-459 - Abdullah Uz Tansel:
Integrity Constraints in Temporal Relational Databases. 460-464 - Y. Alp Aslandogan, Gauri A. Mahajani, Stan Taylor:
Evidence Combination in Medical Data Mining. 465-469 - Kwok-Wa Lam, Victor C. S. Lee:
Building Decision Trees Using Functional Dependencies. 470-473 - Kang Hyuk Lee, Byeong Ho Kang:
A New Framework for Uncertainty Sampling: Exploiting Uncertain and Positive-Certain Examples in Similarity-Based Text Classification. 474-479 - Charles Wesley Ford, Chia-Chu Chiang, Hao Wu, Radhika R. Chilka, John R. Talburt:
Confidence on Approximate Query in Large Datasets. 480-
Cryptographic Hardware I
- Jonathan Lutz, M. Anwarul Hasan:
High Performance FPGA based Elliptic Curve Cryptographic Co-Processor. 486-492 - Nazar Abbas Saqib, Francisco Rodríguez-Henríquez, Arturo Díaz-Pérez:
A Parallel Architecture for Computing Scalar Multiplication on Hessian Elliptic Curves. 493-497 - Alireza Hodjat, Patrick Schaumont, Ingrid Verbauwhede:
Architectural Design Features of a Programmable High Throughput AES Coprocessor. 498-502 - Nadia Nedjah, Luiza de Macedo Mourelle:
Multi-Objective Evolutionary Hardware for RSA-Based Cryptosystems. 503-507 - Luiza de Macedo Mourelle, Nadia Nedjah:
Efficient Cryptographic Hardware Using the Co-Design Methodology. 508-512 - Jan Pelzl, Thomas J. Wollinger, Christof Paar:
High Performance Arithmetic for special Hyperelliptic Curve Cryptosystems of Genus Two. 513-517 - Manfred Schimmler, Viktor Bunimov:
Fast Modular Multiplication by Operand Changing. 518-524 - An Yu, David S. Brée:
A Clock-less Implementation of the AES Resists to Power and Timing Attacks. 525-532 - Nedeljko Cvejic, Tapio Seppänen:
Increasing Robustness of LSB Audio Steganography Using a Novel Embedding Method. 533-537 - Guido Bertoni, Luca Breveglieri, Thomas J. Wollinger, Christof Paar:
Finding Optimum Parallel Coprocessor Design for Genus 2 Hyperelliptic Curve Cryptosystems. 538-
Cryptographic Hardware II
- Siddika Berna Örs, Frank K. Gürkaynak, Elisabeth Oswald, Bart Preneel:
Power-Analysis Attack on an ASIC AES implementation. 546-552 - Michele Elia, Manuel Leone:
A Basis-Independent Algorithm to Design Fast Parallel Multipliers over GF(2m). 553-559 - Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume:
On the Importance of Protecting Delta in SFLASH against Side Channel Attacks. 560-568 - Ruby B. Lee, Zhijie Shi, Yiqun Lisa Yin, Ronald L. Rivest, Matthew J. B. Robshaw:
On Permutation Operations in Cipher Design. 569-577 - Herwin Chan, Alireza Hodjat, Jun Shi, Richard D. Wesel, Ingrid Verbauwhede:
Streaming Encryption for a Secure Wavelength and Time Domain Hopped Optical Network. 578-582 - Gaël Rouvroy, François-Xavier Standaert, Jean-Jacques Quisquater, Jean-Didier Legat:
Compact and Efficient Encryption/Decryption Module for FPGA Implementation of the AES Rijndael Very Well Suited for Small Embedded Applications. 583-587 - Amir K. Daneshbeh, M. Anwarul Hasan:
Area Efficient High Speed Elliptic Curve Cryptoprocessor for Random Curves. 588-
Space Science Computation and IT Applications
- Xiang Li, Rahul Ramachandran, Matt He, Sunil Movva, John A. Rushing, Sara J. Graves, Wladislaw Lyatsky, Arjun Tan, Glynn A. Germany:
Comparing Different Thresholding Algorithms for Segmenting Auroras. 594-601 - Naveen Santhanam, Timothy S. Newman, Dennis L. Gallagher:
Exploiting Known Latitudinal Variations for Improved Limited-Angle Tomographic Reconstruction of the Plasmasphere. 602-606 - Erzsébet Merényi, William H. Farrand, Philip Tracadas:
Mapping Surface Materials on Mars from Mars Pathfinder Spectral Images with HYPEREYE. 607-614