


default search action
2nd ISICT 2004: Las Vegas, Nevada, USA
- John Waldron:

Proceedings of the Intenational Symposium on Information and Communication Technologies, Las Vegas, Nevada, USA, June 16-18, 2004. ACM International Conference Proceeding Series 90, Trinity College Dublin 2004, ISBN 1-59593-170-8
Invited workshop on distributed objects research, experiences and applications
- Banjong Huongrat, Twittie Senivongse:

Cross-domain service change notification via trader federation. 2-7 - Arno Puder:

Extending desktop applications to the web. 8-13 - Heinz Kredel, Matthias Merz:

The design of the IPACS distributed software architecture. 14-19 - Markus Aleksy

, Ralf Gitzel:
Value type-based smart proxies: a concept for adaptable distributed applications. 20-25
Computer networks
- Conor Gildea, Declan Barber:

Convergence technologies for sensor systems in the Next Generation networks (NGN). 26-31 - Deepak Mathur:

Traffic protection and restoration schemes in core routers/switches. 32-37 - Deepak Mathur:

SuperPipe: next generation of high speed trunks. 38-43 - Xue Bai, Ade G. Ola, Yinjing Cui, Fidelis M. Ikem:

A clustered tree method for implementing application level multicast. 44-49 - Gavin Byrne, Declan Barber:

Developing multiparty conferencing services for the NGN: towards a service creation framework. 50-55 - Hussein Ali, Mohammad Inayatullah, Shmuel Rotenstreich:

Resource allocation and QoS in mobile ad hoc networks. 56-62 - Ladda Preechaveerakul, Pattarasinee Bhattarakosol:

One name - many objects - one result: a possible solution for naming system. 63-67 - Lan Quan, Tai Rang Eom, Kyung-Geun Lee, Ju-wook Jang, Sang Yun Lee:

Retrieval schemes for scalable unstructured P2P system. 68-73 - Montree Bunruangses, Weerawat Poompatanapong, Pratheep Banyatnoparat, Bunjong Piyatamrong:

QoS multi-agent applied for Grid Service management. 74-79 - Th. Vergin, Thomas Kessler, Andreas Ahrens, Christoph Lange, Hans-Dietrich Melzer:

Packet arrivals in ethernet-based data networks. 80-85
Information processing
- Vivek Chanana, Athula Ginige, San Murugesan:

Improving information retrieval effectiveness by assigning context to documents. 86-91 - David Byer, Colin Depradine:

Autonomous collaborative web agents. 92-96 - Shazia Akhtar, John Dunnion, Ronan G. Reilly:

A system for document markup and organisation. 97-102 - Cormac Flynn, John Dunnion:

Topic Detection in the news domain. 103-108 - John O'Donovan, John Dunnion:

Adaptive recommendation: putting the best foot forward. 109-114 - Svetlana Hensman, John Dunnion:

Automatically building conceptual graphs using VerbNet and WordNet. 115-120
Invited workshop on information technology and its applications: software development, disaster engineering, and education
- Alta van der Merwe, Johannes C. Cronjé:

The educational value chain as a modelling tool in re-engineering efforts. 122-127 - Leon Jololian, Jean-Claude Ngatchou, Remzi Seker:

A component integration meta-framework using smart adapters. 128-133 - Pratap Chillakanti:

Role-based information security: change management issues. 134-139 - A. Chris Bogen, David A. Dampier:

Knowledge discovery and experience modeling in computer forensics media analysis. 140-145 - Gary Cantrell, David A. Dampier:

Experiments in hiding data inside the file structure of common office documents: a stegonography application. 146-151
Information technology
- Amirrudin Kamsin:

Management of information technology: the study on strategy, planning and policies. 152-157 - Amirrudin Kamsin, Mas Idayu Md Sabri:

The collaborative system strategies. 158-165 - Wonjin Jung:

A review of research: an investigation of the impact of data quality on decision performance. 166-171 - Nicholas Zsifkov, Radu Campeanu:

Business rules domains and business rules modeling. 172-177 - Nils Schumacher:

A theoretical concept for XML-enabled global small business networks. 178-184 - Thomas H. Lenhard:

Multi-discipline-reengineering/redevelopment of IT-infrastructures. 185-189
Applications I
- Akihiro Chiyonobu, Toshinori Sato:

Investigating heterogeneous combination of functional units for a criticality-based low-power processor architecture. 190-195 - JunSeong Kim, JongSu Yi:

Performance sensitivity of SPEC CPU2000 over operating frequency. 196-201 - Chul Choi, Young Kwan Choi, Chang-Chun Park:

The image analysis system with Adaptive Component. 202-207 - Seung Soo Lee, Jeong-A Lee, Chang Choon Park:

A research of merging regions through isophotes analysis. 208-213 - Young Kwan Choi, Chul Choi, Chang-Chun Park:

Image retrieval using color component analysis. 214-219 - Dragos Trinca:

Meta-EAH: an adaptive encoder based on adaptive codes. Moving between adaptive mechanisms. 220-225 - Mayumi Kato, Chia-Tien Dan Lo:

Growing adaptation of computer science in Bioinfomatics. 226-231 - Ian Eccles, Meng Su:

Illustrating the curse of dimensionality numerically through different data distribution models. 232-237
Applications II
- Wei Li, Hang Chen, Qing-An Zeng, Dharma P. Agrawal:

Resource allocation for handoffs in integrated wireless cellular networks. 238-243 - Yafen Li, Wuu Yang, Ching-Wei Huang:

Preventing type flaw attacks on security protocols with a simplified tagging scheme. 244-249 - Chia-Chu Chiang:

High-level heterogeneous distributed parallel programming. 250-255 - Chia-Chu Chiang, Zhendong Chen:

A CORBA adapter to promote reusability of Java components. 256-261
Java technology
- Joel K. Hollingsworth, David J. Powell:

Explicitly and implicitly teaching Java best practices across the undergraduate curriculum. 262-267 - Pat Shuff, Michael Bolton:

Experiences in code migration from main applications to J2EE servers. 268-274 - Raymond Imhoff, Colin Depradine:

A Java framework for bio-analysis systems. 275-280 - Adrijan Bozinovski, Stevo Bozinovski:

N-queens pattern generation: an insight into space complexity of a backtracking algorithm. 281-286

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














