default search action
2nd ISICT 2004: Las Vegas, Nevada, USA
- John Waldron:
Proceedings of the Intenational Symposium on Information and Communication Technologies, Las Vegas, Nevada, USA, June 16-18, 2004. ACM International Conference Proceeding Series 90, Trinity College Dublin 2004, ISBN 1-59593-170-8
Invited workshop on distributed objects research, experiences and applications
- Banjong Huongrat, Twittie Senivongse:
Cross-domain service change notification via trader federation. 2-7 - Arno Puder:
Extending desktop applications to the web. 8-13 - Heinz Kredel, Matthias Merz:
The design of the IPACS distributed software architecture. 14-19 - Markus Aleksy, Ralf Gitzel:
Value type-based smart proxies: a concept for adaptable distributed applications. 20-25
Computer networks
- Conor Gildea, Declan Barber:
Convergence technologies for sensor systems in the Next Generation networks (NGN). 26-31 - Deepak Mathur:
Traffic protection and restoration schemes in core routers/switches. 32-37 - Deepak Mathur:
SuperPipe: next generation of high speed trunks. 38-43 - Xue Bai, Ade G. Ola, Yinjing Cui, Fidelis M. Ikem:
A clustered tree method for implementing application level multicast. 44-49 - Gavin Byrne, Declan Barber:
Developing multiparty conferencing services for the NGN: towards a service creation framework. 50-55 - Hussein Ali, Mohammad Inayatullah, Shmuel Rotenstreich:
Resource allocation and QoS in mobile ad hoc networks. 56-62 - Ladda Preechaveerakul, Pattarasinee Bhattarakosol:
One name - many objects - one result: a possible solution for naming system. 63-67 - Lan Quan, Tai Rang Eom, Kyung-Geun Lee, Ju-wook Jang, Sang Yun Lee:
Retrieval schemes for scalable unstructured P2P system. 68-73 - Montree Bunruangses, Weerawat Poompatanapong, Pratheep Banyatnoparat, Bunjong Piyatamrong:
QoS multi-agent applied for Grid Service management. 74-79 - Th. Vergin, Thomas Kessler, Andreas Ahrens, Christoph Lange, Hans-Dietrich Melzer:
Packet arrivals in ethernet-based data networks. 80-85
Information processing
- Vivek Chanana, Athula Ginige, San Murugesan:
Improving information retrieval effectiveness by assigning context to documents. 86-91 - David Byer, Colin Depradine:
Autonomous collaborative web agents. 92-96 - Shazia Akhtar, John Dunnion, Ronan G. Reilly:
A system for document markup and organisation. 97-102 - Cormac Flynn, John Dunnion:
Topic Detection in the news domain. 103-108 - John O'Donovan, John Dunnion:
Adaptive recommendation: putting the best foot forward. 109-114 - Svetlana Hensman, John Dunnion:
Automatically building conceptual graphs using VerbNet and WordNet. 115-120
Invited workshop on information technology and its applications: software development, disaster engineering, and education
- Alta van der Merwe, Johannes C. Cronjé:
The educational value chain as a modelling tool in re-engineering efforts. 122-127 - Leon Jololian, Jean-Claude Ngatchou, Remzi Seker:
A component integration meta-framework using smart adapters. 128-133 - Pratap Chillakanti:
Role-based information security: change management issues. 134-139 - A. Chris Bogen, David A. Dampier:
Knowledge discovery and experience modeling in computer forensics media analysis. 140-145 - Gary Cantrell, David A. Dampier:
Experiments in hiding data inside the file structure of common office documents: a stegonography application. 146-151
Information technology
- Amirrudin Kamsin:
Management of information technology: the study on strategy, planning and policies. 152-157 - Amirrudin Kamsin, Mas Idayu Md Sabri:
The collaborative system strategies. 158-165 - Wonjin Jung:
A review of research: an investigation of the impact of data quality on decision performance. 166-171 - Nicholas Zsifkov, Radu Campeanu:
Business rules domains and business rules modeling. 172-177 - Nils Schumacher:
A theoretical concept for XML-enabled global small business networks. 178-184 - Thomas H. Lenhard:
Multi-discipline-reengineering/redevelopment of IT-infrastructures. 185-189
Applications I
- Akihiro Chiyonobu, Toshinori Sato:
Investigating heterogeneous combination of functional units for a criticality-based low-power processor architecture. 190-195 - JunSeong Kim, JongSu Yi:
Performance sensitivity of SPEC CPU2000 over operating frequency. 196-201 - Chul Choi, Young Kwan Choi, Chang-Chun Park:
The image analysis system with Adaptive Component. 202-207 - Seung Soo Lee, Jeong-A Lee, Chang Choon Park:
A research of merging regions through isophotes analysis. 208-213 - Young Kwan Choi, Chul Choi, Chang-Chun Park:
Image retrieval using color component analysis. 214-219 - Dragos Trinca:
Meta-EAH: an adaptive encoder based on adaptive codes. Moving between adaptive mechanisms. 220-225 - Mayumi Kato, Chia-Tien Dan Lo:
Growing adaptation of computer science in Bioinfomatics. 226-231 - Ian Eccles, Meng Su:
Illustrating the curse of dimensionality numerically through different data distribution models. 232-237
Applications II
- Wei Li, Hang Chen, Qing-An Zeng, Dharma P. Agrawal:
Resource allocation for handoffs in integrated wireless cellular networks. 238-243 - Yafen Li, Wuu Yang, Ching-Wei Huang:
Preventing type flaw attacks on security protocols with a simplified tagging scheme. 244-249 - Chia-Chu Chiang:
High-level heterogeneous distributed parallel programming. 250-255 - Chia-Chu Chiang, Zhendong Chen:
A CORBA adapter to promote reusability of Java components. 256-261
Java technology
- Joel K. Hollingsworth, David J. Powell:
Explicitly and implicitly teaching Java best practices across the undergraduate curriculum. 262-267 - Pat Shuff, Michael Bolton:
Experiences in code migration from main applications to J2EE servers. 268-274 - Raymond Imhoff, Colin Depradine:
A Java framework for bio-analysis systems. 275-280 - Adrijan Bozinovski, Stevo Bozinovski:
N-queens pattern generation: an insight into space complexity of a backtracking algorithm. 281-286
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.