Wonder Club world wonders pyramid logo
×

ITCC 2004 Book

ITCC 2004
ITCC 2004, The 297 papers of this two-volume proceedings were first presented at the Fifth International Conference on Information Technology, held in April 2004 in Las Vegas, Nevada. The papers, which report on research by engineers worldwide, are grouped into seve, ITCC 2004 has a rating of 3 stars
   2 Ratings
X
ITCC 2004, The 297 papers of this two-volume proceedings were first presented at the Fifth International Conference on Information Technology, held in April 2004 in Las Vegas, Nevada. The papers, which report on research by engineers worldwide, are grouped into seve, ITCC 2004
3 out of 5 stars based on 2 reviews
5
0 %
4
0 %
3
100 %
2
0 %
1
0 %
Digital Copy
PDF format
1 available   for $99.99
Original Magazine
Physical Format

Sold Out

  • ITCC 2004
  • Written by author Pradip K. Srimani... [et al.]; sponsored by IEEE Computer Society Task Force on Information Technology for Business Applications
  • Published by Los Alamitos, CA : IEEE Computer Society ; c2004., 2004/03/31
  • The 297 papers of this two-volume proceedings were first presented at the Fifth International Conference on Information Technology, held in April 2004 in Las Vegas, Nevada. The papers, which report on research by engineers worldwide, are grouped into seve
Buy Digital  USD$99.99

WonderClub View Cart Button

WonderClub Add to Inventory Button
WonderClub Add to Wishlist Button
WonderClub Add to Collection Button

Book Categories

Authors

Jigsaw-based secure data transfer over computer networks 2
Semi-fragile watermarking scheme for authentication of JPEG images 7
Mitigating the untrusted terminal problem using conditional signatures 12
Arcanum : a secure and efficient key exchange protocol for the Internet 17
A security protocol for certified E-goods delivery 22
Enhancing anonymity via market competition 30
A secure account-based mobile payment protocol 35
Accountability logic for mobile payment protocols 40
Face recognition using interpolated Bezier curve based representation 45
Run-time detection of buffer overflow attacks without explicit sensor data objects 50
Achieving distributed trusted services 56
Performance evaluation of data integrity mechanisms for mobile agents 62
Adaptive neuro-fuzzy intrusion detection systems 70
Cryptographic protocol analysis using goal extraction 75
ProtoMon : embedded monitors for cryptographic protocol intrusion detection and prevention 81
Web server attack categorization based on root causes and their locations 90
A fast pattern-match engine for network processor-based network intrusion detection system 97
A modified optical image reconstruction model with information feedback 102
Threshold and identity-based key management and authentication for wireless ad hoc networks 107
An extensible framework for practical secure component composition in a ubiquitous computing environment 112
Distributed knowledge networks : towards a new paradigm for delivering knowledge 118
Identity-based threshold signature scheme from the bilinear pairings 124
HORSE : an extension of an r-time signature scheme with fast signing and verification 129
Recurrent exercises for introductory human computer interaction courses 136
A new approach to learning algorithms 141
Computer skills training to (middle-aged) adults : problems and program 146
Dependency theory E-learning tool 151
A Web-service oriented framework for building SCORM compatible learning management systems 156
Games and animation : collaborations between the arts and computer science 164
Web-based mathematics education : MeML design and implementation 169
IT security project : implementation of the advanced encyption standard algorithm AES on a smart card 176
An instructor's environment for automatic generation of problem sequences 181
The development of a philosophy for an applied Web programming curriculum 186
Assessing distance learning student's performance : a natural language processing approach to analyzing class discussion messages 192
Auxiliar : a case-based system to assist online courses 197
Building an effective groupware system 202
A standard visual courseware authoring tool based on content packaging specification 207
GAME : a generic automated marking environment for programming assessment 212
A novel approach for new E-commerce product positioning and to-go/not-to go with rapid prototype experience 218
Dynamic identification of correspondence assertions for electronic commerce data integration 223
A topology viewer for distributed brokering systems 228
The impacts of professions in systems development 235
Automatic estimation of stock market forecasting and generating the corresponding natural language expression 241
Special technique for optimizing teaching-learning process in CBT software 246
Extending the undergraduate computer science curriculum to include data mining 251
Extending the Wiki paradigm for use in the classroom 255
Information retrieval with principal components 262
Financial activity mining from online multilingual news 267
Enabling personalization recommendation with weightedFP for text information retrieval based on user-focus 272
The e-salesman system 277
From keywords to links : an automatic approach 283
Toward dialogues with documents : multibrowser 287
From paragraph networks to document networks 295
Refined extended preorder index with path information 304
Multitasking Web search on alta vista 309
Extracting new topic contents from hidden Web sites 314
Enhancing usability of flight and fare search functions for airline and travel Web sites 320
A hybrid classifier approach for Web retrieved documents classification 326
Web page fragmentation for personalized portal construction 332
TIN : an interactive image navigator providing ubiquitous access to distributed geo-spatial data 337
Exploring similarity among Web pages using the hyperlink structure 344
Anxiously seeking answers : how attitude affects search performance 349
XCpaqs : compression of XML document with Xpath query support 354
Matching techniques for resource discovery in distributed systems using heterogeneous ontology descriptions 360
Application service provision through the grid : business models and architectures 367
The GRelC library : a basic pillar in the grid relational catalog architecture 372
Content-addressable IBP - rationale, design and performance 377
The LAG grammar for authoring the adaptive Web 382
Adaptation and reuse in designing Web information systems 387
On-line generation of suggestions for Web users 392
Reinforcement learning architecture for Web recommendations 398
Protocol analysis in intrusion detection using decision tree 404
Security protection and checking in embedded system integration against buffer overflow attacks 409
Low-intrusive consistent disk checkpointing : a tool for digital forensics 414
Dynamic control of worm propagation 419
Towards framework selection criteria and suitability for an application framework 424
Robust partner selection scheme for information quality assurance despite uncertainty in open multi-agent systems 430
A system for ensuring data integrity in grid environments 435
Defeating the current steganalysis techniques (robust steganography) 440
Risk management using behavior based attack graphs 445
A model for team-based access control (TMAC 2004) 450
An object-based approach for digital video retrieval 456
A mathematical model of similarity and clustering 460
Mining association rules from relations on a parallel NCR teradata database system 465
A new reparation method for incomplete data in the context of supervised learning 471
Adaptive Web document classification with MCRDR 476
Physically locating wireless intruders 482
Replicate relational and XML databases for Internet computing 492
Modeling long duration transactions with time constraints in active database 497
Accessing temporal data objects in mobile computing environments 502
Fuzzy inclusion dependencies in fuzzy relational databases 507
Server-side broadcast transaction in mobile computing environments 511
Survivability and applicability in database constraints : temporal boundary to data integrity scenarios 518
Protecting federated databases using a practical implementation of a formal RBAC policy 523
A model for multiple-query processing based upon strong factoring 528
Component based embedded database for mobile embedded systems 534
Mapping methods and query for aggregation and association in object-relational database using collection 539
Community, context, and distance education 546
A constraint-based query modification engine for retrofitting COTS DBMS's 551
The design and implementation of the MESSENGER trajectory database 557
Pedagogical issues in programming languages 562
Performance study of a MLS/DBMS implemented as a kernelized architecture 566
A systolic memory architecture for fast codebook design based on MMPDCL algorithm 572
Semi-parallel reconfigurable architectures for real-time LDPC decoding 579
An object-oriented database-based architecture for mobile enterprise applications 586
A formal approach to software architecture of agent-base systems 591
Minimization of boundary artifacts on scalable image compression using symmetric-extended wavelet transform 598
Arbitrary trajectories tracking using multiple model based particle filtering in infrared image sequence 603
Effect of initial HMM choices in multiple sequence training for gesture recognition 608
Resampling based method for pixel-wise correspondence between 3D faces 614
Recognizing non-rigid human actions using joints tracking in space-time 620
Robust segmentation using parametric and nonparametric local spatial posteriors 626
A robust face recognition system for real time surveillance 631
A fuzzy approach to texture segmentation 636
Spherical parameterization for 3D surface analysis in volumetric images 643
Factors that affect the performance of the DCT-block based image watermarking algorithms 650
Design of an efficient architecture for real-time image enhancement based on a Luma-dependent nonlinear approach 656
Determination of pose angle of face using dynamic space warping (DSW) 661
Fuzzy edge detector using entropy optimization 665
Digital watermarking on still images using wavelet transform 671
Feature weighting methods for abstract features applicable to motion based video indexing 676


Login

  |  

Complaints

  |  

Blog

  |  

Games

  |  

Digital Media

  |  

Souls

  |  

Obituary

  |  

Contact Us

  |  

FAQ

CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!!

X
WonderClub Home

This item is in your Wish List

ITCC 2004, The 297 papers of this two-volume proceedings were first presented at the Fifth International Conference on Information Technology, held in April 2004 in Las Vegas, Nevada. The papers, which report on research by engineers worldwide, are grouped into seve, ITCC 2004

X
WonderClub Home

This item is in your Collection

ITCC 2004, The 297 papers of this two-volume proceedings were first presented at the Fifth International Conference on Information Technology, held in April 2004 in Las Vegas, Nevada. The papers, which report on research by engineers worldwide, are grouped into seve, ITCC 2004

ITCC 2004

X
WonderClub Home

This Item is in Your Inventory

ITCC 2004, The 297 papers of this two-volume proceedings were first presented at the Fifth International Conference on Information Technology, held in April 2004 in Las Vegas, Nevada. The papers, which report on research by engineers worldwide, are grouped into seve, ITCC 2004

ITCC 2004

WonderClub Home

You must be logged in to review the products

E-mail address:

Password: