Sold Out
Book Categories |
Jigsaw-based secure data transfer over computer networks | 2 | |
Semi-fragile watermarking scheme for authentication of JPEG images | 7 | |
Mitigating the untrusted terminal problem using conditional signatures | 12 | |
Arcanum : a secure and efficient key exchange protocol for the Internet | 17 | |
A security protocol for certified E-goods delivery | 22 | |
Enhancing anonymity via market competition | 30 | |
A secure account-based mobile payment protocol | 35 | |
Accountability logic for mobile payment protocols | 40 | |
Face recognition using interpolated Bezier curve based representation | 45 | |
Run-time detection of buffer overflow attacks without explicit sensor data objects | 50 | |
Achieving distributed trusted services | 56 | |
Performance evaluation of data integrity mechanisms for mobile agents | 62 | |
Adaptive neuro-fuzzy intrusion detection systems | 70 | |
Cryptographic protocol analysis using goal extraction | 75 | |
ProtoMon : embedded monitors for cryptographic protocol intrusion detection and prevention | 81 | |
Web server attack categorization based on root causes and their locations | 90 | |
A fast pattern-match engine for network processor-based network intrusion detection system | 97 | |
A modified optical image reconstruction model with information feedback | 102 | |
Threshold and identity-based key management and authentication for wireless ad hoc networks | 107 | |
An extensible framework for practical secure component composition in a ubiquitous computing environment | 112 | |
Distributed knowledge networks : towards a new paradigm for delivering knowledge | 118 | |
Identity-based threshold signature scheme from the bilinear pairings | 124 | |
HORSE : an extension of an r-time signature scheme with fast signing and verification | 129 | |
Recurrent exercises for introductory human computer interaction courses | 136 | |
A new approach to learning algorithms | 141 | |
Computer skills training to (middle-aged) adults : problems and program | 146 | |
Dependency theory E-learning tool | 151 | |
A Web-service oriented framework for building SCORM compatible learning management systems | 156 | |
Games and animation : collaborations between the arts and computer science | 164 | |
Web-based mathematics education : MeML design and implementation | 169 | |
IT security project : implementation of the advanced encyption standard algorithm AES on a smart card | 176 | |
An instructor's environment for automatic generation of problem sequences | 181 | |
The development of a philosophy for an applied Web programming curriculum | 186 | |
Assessing distance learning student's performance : a natural language processing approach to analyzing class discussion messages | 192 | |
Auxiliar : a case-based system to assist online courses | 197 | |
Building an effective groupware system | 202 | |
A standard visual courseware authoring tool based on content packaging specification | 207 | |
GAME : a generic automated marking environment for programming assessment | 212 | |
A novel approach for new E-commerce product positioning and to-go/not-to go with rapid prototype experience | 218 | |
Dynamic identification of correspondence assertions for electronic commerce data integration | 223 | |
A topology viewer for distributed brokering systems | 228 | |
The impacts of professions in systems development | 235 | |
Automatic estimation of stock market forecasting and generating the corresponding natural language expression | 241 | |
Special technique for optimizing teaching-learning process in CBT software | 246 | |
Extending the undergraduate computer science curriculum to include data mining | 251 | |
Extending the Wiki paradigm for use in the classroom | 255 | |
Information retrieval with principal components | 262 | |
Financial activity mining from online multilingual news | 267 | |
Enabling personalization recommendation with weightedFP for text information retrieval based on user-focus | 272 | |
The e-salesman system | 277 | |
From keywords to links : an automatic approach | 283 | |
Toward dialogues with documents : multibrowser | 287 | |
From paragraph networks to document networks | 295 | |
Refined extended preorder index with path information | 304 | |
Multitasking Web search on alta vista | 309 | |
Extracting new topic contents from hidden Web sites | 314 | |
Enhancing usability of flight and fare search functions for airline and travel Web sites | 320 | |
A hybrid classifier approach for Web retrieved documents classification | 326 | |
Web page fragmentation for personalized portal construction | 332 | |
TIN : an interactive image navigator providing ubiquitous access to distributed geo-spatial data | 337 | |
Exploring similarity among Web pages using the hyperlink structure | 344 | |
Anxiously seeking answers : how attitude affects search performance | 349 | |
XCpaqs : compression of XML document with Xpath query support | 354 | |
Matching techniques for resource discovery in distributed systems using heterogeneous ontology descriptions | 360 | |
Application service provision through the grid : business models and architectures | 367 | |
The GRelC library : a basic pillar in the grid relational catalog architecture | 372 | |
Content-addressable IBP - rationale, design and performance | 377 | |
The LAG grammar for authoring the adaptive Web | 382 | |
Adaptation and reuse in designing Web information systems | 387 | |
On-line generation of suggestions for Web users | 392 | |
Reinforcement learning architecture for Web recommendations | 398 | |
Protocol analysis in intrusion detection using decision tree | 404 | |
Security protection and checking in embedded system integration against buffer overflow attacks | 409 | |
Low-intrusive consistent disk checkpointing : a tool for digital forensics | 414 | |
Dynamic control of worm propagation | 419 | |
Towards framework selection criteria and suitability for an application framework | 424 | |
Robust partner selection scheme for information quality assurance despite uncertainty in open multi-agent systems | 430 | |
A system for ensuring data integrity in grid environments | 435 | |
Defeating the current steganalysis techniques (robust steganography) | 440 | |
Risk management using behavior based attack graphs | 445 | |
A model for team-based access control (TMAC 2004) | 450 | |
An object-based approach for digital video retrieval | 456 | |
A mathematical model of similarity and clustering | 460 | |
Mining association rules from relations on a parallel NCR teradata database system | 465 | |
A new reparation method for incomplete data in the context of supervised learning | 471 | |
Adaptive Web document classification with MCRDR | 476 | |
Physically locating wireless intruders | 482 | |
Replicate relational and XML databases for Internet computing | 492 | |
Modeling long duration transactions with time constraints in active database | 497 | |
Accessing temporal data objects in mobile computing environments | 502 | |
Fuzzy inclusion dependencies in fuzzy relational databases | 507 | |
Server-side broadcast transaction in mobile computing environments | 511 | |
Survivability and applicability in database constraints : temporal boundary to data integrity scenarios | 518 | |
Protecting federated databases using a practical implementation of a formal RBAC policy | 523 | |
A model for multiple-query processing based upon strong factoring | 528 | |
Component based embedded database for mobile embedded systems | 534 | |
Mapping methods and query for aggregation and association in object-relational database using collection | 539 | |
Community, context, and distance education | 546 | |
A constraint-based query modification engine for retrofitting COTS DBMS's | 551 | |
The design and implementation of the MESSENGER trajectory database | 557 | |
Pedagogical issues in programming languages | 562 | |
Performance study of a MLS/DBMS implemented as a kernelized architecture | 566 | |
A systolic memory architecture for fast codebook design based on MMPDCL algorithm | 572 | |
Semi-parallel reconfigurable architectures for real-time LDPC decoding | 579 | |
An object-oriented database-based architecture for mobile enterprise applications | 586 | |
A formal approach to software architecture of agent-base systems | 591 | |
Minimization of boundary artifacts on scalable image compression using symmetric-extended wavelet transform | 598 | |
Arbitrary trajectories tracking using multiple model based particle filtering in infrared image sequence | 603 | |
Effect of initial HMM choices in multiple sequence training for gesture recognition | 608 | |
Resampling based method for pixel-wise correspondence between 3D faces | 614 | |
Recognizing non-rigid human actions using joints tracking in space-time | 620 | |
Robust segmentation using parametric and nonparametric local spatial posteriors | 626 | |
A robust face recognition system for real time surveillance | 631 | |
A fuzzy approach to texture segmentation | 636 | |
Spherical parameterization for 3D surface analysis in volumetric images | 643 | |
Factors that affect the performance of the DCT-block based image watermarking algorithms | 650 | |
Design of an efficient architecture for real-time image enhancement based on a Luma-dependent nonlinear approach | 656 | |
Determination of pose angle of face using dynamic space warping (DSW) | 661 | |
Fuzzy edge detector using entropy optimization | 665 | |
Digital watermarking on still images using wavelet transform | 671 | |
Feature weighting methods for abstract features applicable to motion based video indexing | 676 |
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionITCC 2004
X
This Item is in Your InventoryITCC 2004
X
You must be logged in to review the productsX
X
X
Add ITCC 2004, The 297 papers of this two-volume proceedings were first presented at the Fifth International Conference on Information Technology, held in April 2004 in Las Vegas, Nevada. The papers, which report on research by engineers worldwide, are grouped into seve, ITCC 2004 to the inventory that you are selling on WonderClubX
X
Add ITCC 2004, The 297 papers of this two-volume proceedings were first presented at the Fifth International Conference on Information Technology, held in April 2004 in Las Vegas, Nevada. The papers, which report on research by engineers worldwide, are grouped into seve, ITCC 2004 to your collection on WonderClub |