default search action
ITCC 2005: Las Vegas, NV, USA
- International Symposium on Information Technology: Coding and Computing (ITCC 2005), Volume 1, 4-6 April 2005, Las Vegas, Nevada, USA. IEEE Computer Society 2005, ISBN 0-7695-2315-3
- General Chair's Message.
- Committees.
- Additional Referees.
Bioinformatics
- Andy Auyeung:
A New Phylogenetic Tree Model for Fuzzy Characters. 2-7 - Jiancong Luo, Ishfaq Ahmad, Munib Ahmed, Raymond A. Paul:
Parallel Multiple Sequence Alignment with Dynamic Scheduling. 8-13 - Naveen Kandiraju, Sumeet Dua, Steven A. Conrad:
Dihedral Angle based Dimensionality Reduction for Protein Structural Comparison. 14-19 - Rasiah Loganantharaj:
Recognizing Transcription Start Site (TSS) of Plant Promoters. 20-25 - Sumeet Dua, Naveen Kandiraju, Hilary W. Thompson:
Design and Implementation of a Unique Blood-Vessel Detection Algorithm towards Early Diagnosis of Diabetic Retinopathy. 26-31 - Ya Zhang, Hongyuan Zha, Chao-Hsien Chu:
A Time-Series Biclustering Algorithm for Revealing Co-Regulated Genes. 32-37
Data Coding and Compression
- Ahmed Muthana M. Nadhim, Jianhua He, Jiangtao Xi, Zongkai Yang:
An Adaptive Scalable Multiuser-OFDM System for Multimedia Transmission Over Fading Channels. 40-45 - Alain Bretto, Luc Gillibert:
Hypergraph Lossless Image Compression. 46-50 - Ata Kabán:
A Scalable Generative Topographic Mapping for Sparse Data Sequences. 51-56 - Ebru Celikel:
Language Discrimination via PPM Model. 57-62 - Hong Zhao, Nirwan Ansari, Yun Q. Shi:
Layered MPEG Video Transmission over IP DiffServ. 63-67 - Jinghua Zhang, Charles B. Owen:
Hybrid Coding for Animated Polygonal Meshes: Combining Delta and Octree. 68-73 - Piyali Mandal, Ashish Thakral, Shekhar Verma:
Watermark Based Digital Rights Management. 74-78 - Sudipta Mahapatra, Kuldeep Singh:
A Parallel Scheme for Implementing Multialphabet Arithmetic Coding in High-Speed Programmable Hardware. 79-84 - Shumin Tian, P. Karivaratha Rajan:
Multiple Description Coding Using Transforms and Data Fusion. 85-90 - Tao Tao, Amar Mukherjee:
Multiple-Pattern Matching For LZW Compressed Files. 91-96 - Wen Hu, Guoxin Zheng:
Orthogonal Hermite Pulses Used for UWB M-ary Communication. 97-101 - Xinrong Hu, Tianzhen Wang, Dehua Li:
A New Approach of Color Quantization Based On Ant Colony Clustering Algorithm. 102-108 - Yu Sun, Dongdong Li, Ishfaq Ahmad, Jiancong Luo:
A Rate Control Algorithm for Wireless Video Transmission Using Perceptual Tuning. 109-114
Data Mining
- Bruce D. Caulkins, Joohan Lee, Morgan C. Wang:
Packet- vs. Session-Based Modeling for Intrusion Detection Systems. 116-121 - Charles Wesley Ford, Chia-Chu Chiang, Hao Wu, Radhika R. Chilka, John R. Talburt:
Text Data Mining: A Case Study. 122-127 - Chung-Hong Lee, Hsin-Chang Yang:
A Classifier-based Text Mining Approach for Evaluating Semantic Relatedness Using Support Vector Machines. 128-133 - Dechang Chen, Dong Hua, Konstantinos Sirlantzis, Xiaobin Ma:
On the Relation Between Dependence and Diversity in Multiple Classifier Systems. 134-139 - Hassan Reza, Emanuel S. Grant:
Quality-Oriented Software Architecture. 140-145 - Jeffrey Huang, Shijun Li:
Mining p53 Binding Sites Using Profile Hidden Markov Model. 146-151 - Kazem Taghva, Rania Elkhoury, Jeffrey S. Coombs:
Arabic Stemming Without A Root Dictionary. 152-157 - Kazem Taghva, Russell Beckley, Mohammad Sadeh:
A Stemming Algorithm for the Farsi Language. 158-162 - M. Emre Celebi, Y. Alp Aslandogan, Paul R. Bergstresser:
Mining Biomedical Images with Density-Based Clustering. 163-168 - Mali Abdollahian, R. Foroughi:
Optimal Statistical Model for Forecasting Ozone. 169-173 - Mali Abdollahian, R. Foroughi:
Regression Analysis of Ozone Data. 174-178 - Mark Smith, Alireza Khotanzad:
XML Representation of Digital Videos for Visual Data Mining Applications. 179-183 - N. Churcharoenkrung, Yang Sok Kim, Byeong Ho Kang:
Dynamic Web Content Filtering based on User's Knowledge. 184-188 - Quoc-Nam Tran:
An Efficient Clustering Algorithm Using Graphical Techniques. 189-194 - Ray R. Hashemi, Joshua H. Early, Mahmood Bahar, Alexander A. Tyler, John F. Young:
A Signature-Based Liver Cancer Predictive System. 195-199 - Shakirah Mohd Taib, Soon-ja Yeom, Byeong-Ho Kang:
Elimination of Redundant Information for Web Data Mining. 200-205 - Soon Myoung Chung, Murali Mangamuri:
Mining Association Rules from the Star Schema on a Parallel NCR Teradata Database System. 206-212 - Xin Jin, Bamshad Mobasher, Yanzan Zhou:
A Web Recommendation System Based on Maximum Entropy. 213-218
Database Technology
- Abel Matus-Castillejos, Ric Jentzsch:
A Time Series Data Management Framework. 220-225 - Ali Saman Tosun:
Design Theoretic Approach to Replicated Declustering. 226-231 - Ali Saman Tosun:
Constrained Declustering. 232-237 - Ira Rudowsky, Olga Kulyba, Mikhail Kunin, Dmitri Ogarodnikov, Theodore Raphan:
Managing a Relational Database with Intelligent Agents. 238-242 - Moses Garuba, Anteneh Girma:
Impact Of External Security Measures On Data Access Implementation With Online Database Management System. 243-248 - Navdeep Kaur, Rajwinder Singh, Anil Kumar Sarje, Manoj Misra:
Performance Evaluation of Secure Concurrency Control Algorithm for Multilevel Secure Distributed Database Systems. 249-254 - Oviliani Yenty Yuliana, Suphamit Chittayasothorn:
XML Schema Re-Engineering Using a Conceptual Schema Approach. 255-260 - Soon Myoung Chung, Sheeya B. Jesurajaiah:
Schemaless XML Document Management in Object-Oriented Databases. 261-266
Distributed and Grid Systems
- Angelo Leto, Ezio Corso, Riccardo Murri, Alessio Terpin, Cristian Zoicas, Stefano Cozzini:
EGRID Project: Experience Report on the Implementation of a Grid Infrastructure for the Analysis of Financial Data. 268-273 - Chia-Chu Chiang:
Development of Concurrent Systems through Coordination. 274-279 - Dianxun Shuai, Xiang Feng, Rui Gong, Xing Wang:
A New Generalized Particle Approach to Allot Resources And Jobs for Grid Computing. 280-285 - Emmanuel Jeannot, Gerald Monard:
Computing Molecular Potential Energy Surface with DIET. 286-291 - Qianfei Fu, Shoubao Yang, Maosheng Li, Junmao Zhun:
Transaction Mechanism Design in Decentralized Computational Market. 292-297 - Giovanni Aloisio, Massimo Cafaro, Dario Conte, Sandro Fiore, Gian Paolo Marra, Gianvito Quarta:
A Grid-Enabled Web Map Server. 298-303 - Giovanni Aloisio, Massimo Cafaro, Italo Epicoco, Daniele Lezzi, Robert van Engelen:
The GSI Plug-in for gSOAP: Enhanced Security, Performance, and Reliability. 304-309 - Maosheng Li, Shoubao Yang, Qianfei Fu, Yang Jin:
Research on Grid Resource Reliability Model Based on Promise. 310-315 - Michele Di Santo, Nadia Ranaldo, Eugenio Zimeo:
Metacomputing through the Enactment of a BPEL4WS Workflow in a Grid Environment. 316-321 - Mario Cannataro, Pietro Hiram Guzzi, Tommaso Mazza, Giuseppe Tradigo, Pierangelo Veltri:
Algorithms and Databases in Bioinformatics: Towards a Proteomic Ontology. 322-328 - Mine Altunay, Daniel Colonnese, Chetna Warade:
High Throughput Web Services for Life Sciences. 329-334 - Minjun Wang, Geoffrey C. Fox, Marlon E. Pierce:
Grid-Based Collaboration in Interactive Data Language Applications. 335-341 - Oussama Kassem Zein, Yvon Kermarrec:
An Approach for Service Description and a Flexible Way to Discover Services in Distributed Systems. 342-347 - Pichet Amnuaykanjanasin, Natawut Nupairoj:
The BPEL Orchestrating Framework for Secured Grid Services. 348-353 - Rashedur M. Rahman, Ken Barker, Reda Alhajj:
Replica Placement in Data Grid: Considering Utility and Risk. 354-359 - Shrideep Pallickara, Geoffrey C. Fox, Sangmi Lee Pallickara:
An Analysis of Reliable Delivery Specifications for Web Services. 360-365 - Umesh Kant, Daniel Grosu:
Double Auction Protocols for Resource Allocation in Grids. 366-371
E-Commerce
- Xiaosong Hou, Chik How Tan:
A New Electronic Cash Model. 374-379 - Charles C. Willow:
Automatic Agent and Data Mining for e-Commerce. 380-384 - Chima Adiele:
A Characterization of Web Data Sources to Facilitate E-Commerce Transactions. 385-390 - Elhadi M. Shakshuki:
A Methodology for Evaluating Agent Toolkits. 391-396 - Taedong Han:
Exploring Price and Product Information Search Behavior in e-Market. 397-402 - Yao-Chung Chang, Jiann-Liang Chen, Wen-Ming Tseng:
A Mobile Commerce Framework Based on Web Services Architecture. 403-408 - Peng Liang, Keqing He, Bing Li, Jin Liu:
The Interoperability between Different e-Business Specifications. 409-413 - Wudong Liu, Lulu He, Jing Liu, Keqing He:
A Semantic Interoperability Extension Model to the ebXML Registry. 414-419 - Yiyao Hao, Daniel M. Havey, David A. Turner:
An Exchange Protocol for Alternative Currencies. 420-424 - Zoran Duric:
IPS - Secure Internet Payment System. 425-430
Education
- Frank P. Coyle, Mitchell A. Thornton:
A Framework and Process for Curricular Integration and Innovation Using Project Based Interdisciplinary Teams. 432-435 - Hye Sun Kim, Seong Baeg Kim:
An Integrated Course Based on Educational Games. 436-441 - Imke Sassen, Birgit Schwartz-Reinken:
Adaptation and Configuration - Support-Possibilities of Different Learner Types within Virtual Learning Environments - An Experience Report. 442-446 - Kyoung Mi Yang, Rockford J. Ross, Seong Baeg Kim:
Constructing Different Learning Paths Through e-Learning. 447-452 - Paul Douglas, Steve Barker:
An E-learning tool for Database Administration. 453-458 - Pavel Azalov:
Synthetic Exercises on the Web. 459-464 - Zongkai Yang, Qingtang Liu, Kun Yan, Wanting Deng, Jing Jin:
Integration of Digital Rights Management into Learning Content Management System. 465-469 - Rukmini Reddy Muduganti, Shravan Kumar Sogani, Henry Hexmoor:
Comparison of Information Technology Adoption Rates across Laggards, Innovators and Others. 470-475 - Shlomo Argamon, Nazli Goharian, David A. Grossman, Ophir Frieder, Nambury S. Raju:
A Specialization in Information and Knowledge Management Systems for the Undergraduate Computer Science Curriculum. 476-481 - Steve Barker, Paul Douglas:
An Intelligent Tutoring System for Program Semantics. 482-487 - Victor Adamchik, Ananda Gunawardena:
Adaptive Book: Teaching and Learning Environment for Programming Education. 488-492
E-Gaming
- Jordi Castellà-Roca, Guillermo Navarro, Jose A. Ortega-Ruiz, Joaquín García:
Digital Chips for an On-Line Casino. 494-499 - Joaquín García, Frédéric Cuppens, Fabien Autrel, Jordi Castellà-Roca, Joan Borrell, Guillermo Navarro, Jose A. Ortega-Ruiz:
Protecting On-Line Casinos against Fraudulent Player Drop-Out. 500-505 - Philippe Golle:
Dealing Cards in Poker Games. 506-511 - Ron Coleman:
Single-Parameter Blackjack Betting Systems Inspired by Scatter Search. 512-517 - Ying-Chieh Chen, Jing-Jang Hwang, Ronggong Song, George Yee, Larry Korba:
Online Gaming Cheating and Security Issue. 518-523
Embedded Cryptographic Systems
- A. Murat Fiskiran, Ruby B. Lee:
Fast Parallel Table Lookups to Accelerate Symmetric-Key Cryptography. 526-531 - Akashi Satoh, Tadanobu Inoue:
ASIC-Hardware-Focused Comparison for Hash Functions MD5, RIPEMD-160, and SHS. 532-537 - Alireza Hodjat, David Hwang, Ingrid Verbauwhede:
A Scalable and High Performance Elliptic Curve Processor with Resistance to Timing Attacks. 538-543 - Catherine H. Gebotys, C. C. Tiu, X. Chen:
A Countermeasure for EM Attack of a Wireless PDA. 544-549 - Christophe Nègre:
Quadrinomial Modular Arithmetic using Modified Polynomial Basis. 550-555 - François-Xavier Standaert, Gilles Piret, Gaël Rouvroy, Jean-Jacques Quisquater:
FPGA Implementations of the ICEBERG Block Cipher. 556-561 - François-Xavier Standaert, Eric Peeters, Jean-Jacques Quisquater:
On the Masking Countermeasure and Higher-Order Power Analysis Attacks. 562-567 - Francis M. Crowe, Alan Daly, William P. Marnane:
A Scalable Dual Mode Arithmetic Unit for Public Key Cryptosystems. 568-573 - Francisco Rodríguez-Henríquez, Nazar Abbas Saqib, Nareli Cruz Cortés:
A Fast Implementation of Multiplicative Inversion Over GF(2m). 574-579 - T. S. Ganesh, T. S. B. Sudarshan:
ASIC Implementation of a Unified Hardware Architecture for Non-Key Based Cryptographic Hash Primitives. 580-585 - Guido Bertoni, Vittorio Zaccaria, Luca Breveglieri, Matteo Monchiero, Gianluca Palermo:
AES Power Attack Based on Induced Cache Miss and Countermeasure. 586-591 - Hung-Ching Chang, Chun-Chin Chen, Chih-Feng Lin:
XScale Hardware Acceleration on Cryptographic Algorithms for IPSec Applications. 592-597 - Kooroush Manochehri, Saadat Pourmozafari:
Modified Radix-2 Montgomery Modular Multiplication to Make It Faster and Simpler. 598-602 - Luiza de Macedo Mourelle, Nadia Nedjah:
Reconfigurable Hardware for Addition Chains Based Modular Exponentiation. 603-607 - Maged Hamada Ibrahim:
Verifiable Threshold Sharing of a Large Secret Safe-Prime. 608-613 - Nadia Nedjah, Luiza de Macedo Mourelle:
Pareto-Optimal Hardware for Substitution Boxes. 614-619 - Shay Gueron, Or Zuk:
Applications of The Montgomery Exponent. 620-625 - Fabio Sozzani, Guido Bertoni, Stefano Turcato, Luca Breveglieri:
A Parallelized Design for an Elliptic Curve Cryptosystem Coprocessor. 626-630 - Takeshi Okamoto, Atsuo Inomata, Eiji Okamoto:
A Proposal of Short Proxy Signature using Pairing. 631-635 - Willi Geiselmann, Hubert Köpfer, Rainer Steinwandt, Eran Tromer:
Improved Routing-Based Linear Algebra for the Number Field Sieve. 636-641 - Xinxin Fan, Thomas J. Wollinger, Yumin Wang:
Inversion-Free Arithmetic on Genus 3 Hyperelliptic Curves and Its Implementations. 642-647
Information Assurance and Security
- Akira Yamada, Yutaka Miyake, Keisuke Takemori, Toshiaki Tanaka:
Intrusion Detection System to Detect Variant Attacks Using Learning Algorithms with Automatic Generation of Training Data. 650-655 - Bharat B. Madan, Shashi Phoha, Kishor S. Trivedi:
StackOFFence: A Technique for Defending Against Buffer Overflow Attacks. 656-661 - Debra L. Cook, Angelos D. Keromytis:
Conversion and Proxy Functions for Symmetric Key Ciphers. 662-667 - Dianxiang Xu, Vivek Goel:
An Aspect-Oriented Approach to Mobile Agent Access Control. 668-673 - Raju Gangishetti, M. Choudary Gorantla, Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati:
An Efficient Secure Key Issuing Protocol in ID-Based Cryptosystems. 674-678 - Hamilton E. Link, William D. Neumann:
Clarifying Obfuscation: Improving the Security of White-Box DES. 679-684 - Heeyoul Kim, Seong-Min Hong, Hyunsoo Yoon, Jung Wan Cho:
Secure Group Communication with Multiplicative One-way Functions. 685-690 - Jidong Long, Daniel G. Schwartz, Sara Stoecklin, Mahesh K. Patel:
Application of Loop Reduction to Learning Program Behaviors for Anomaly Detection. 691-696 - Khaled F. Hussain, Sharon Rajan, Naveen Addulla, Ghada S. Moussa:
No-Capture Hardware Feature for Securing Sensitive Information. 697-702 - Mathieu Jaume, Charles Morisset:
Formalisation and implementation of Access control models. 703-708 - P. Muppala, Johnson P. Thomas, Ajith Abraham:
QoS-Based Authentication Scheme for Ad Hoc Wireless Networks. 709-714 - Sriranjani Sitaraman, Srinivasan Krishnamurthy, Subbarayan Venkatesan:
Byteprints: A Tool to Gather Digital Evidence. 715-720 - Thomas E. Carroll, Daniel Grosu:
A Secure and Efficient Voter-Controlled Anonymous Election Scheme. 721-726 - Valentina Casola, Massimiliano Rak, Antonino Mazzeo, Nicola Mazzocca:
Security Design and Evaluation in a VoIP Secure Infrastracture: A Policy Based Approach. 727-732 - Vipul Goyal, Ajith Abraham, Sugata Sanyal, Sang-Yong Han:
The N/R One Time Password System. 733-738 - Vipul Goyal, Virendra Kumar, Mayank Singh, Ajith Abraham, Sugata Sanyal:
CompChall: Addressing Password Guessing Attacks. 739-744 - Weiliang Zhao, Vijay Varadharajan:
Efficient TTP-Free Mental Poker Protocols. 745-750 - Xue Ying Chen, Ruizhong Wei:
A Dynamic Method for Handling the Inference Problem in Multilevel Secure Databases. 751-756 - Yijuan Shi, Gongliang Chen, Jianhua Li:
ID-Based One Round Authenticated Group Key Agreement Protocol with Bilinear Pairings. 757-761 - Yu Yu, Jussipekka Leiwo, A. Benjamin Premkumar:
Securely Utilizing External Computing Power. 762-767 - Yun Q. Shi, Guorong Xuan, Chengyun Yang, Jianjiong Gao, Zhenping Zhang, Peiqi Chai, Dekun Zou, Chunhua Chen, Wen Chen:
Effective Steganalysis Based on Statistical Moments of Wavelet Characteristic Function. 768-773 - Zhen Liu, Susan M. Bridges:
Dynamic Learning of Automata from the Call Stack Log for Anomaly Detection. 774-779 - Zili Shao, Chun Xue, Qingfeng Zhuge, Edwin Hsing-Mean Sha, Bin Xiao:
Efficient Array & Pointer Bound Checking Against Buffer Overflow Attacks via Hardware/Software. 780-785
Information Retrieval
- M. Emre Celebi, Y. Alp Aslandogan:
A Comparative Study of Three Moment-Based Shape Descriptors. 788-793 - Rifat Ozcan, Y. Alp Aslandogan:
Concept-Based Information Access. 794-799 - Sourav Sengupta, Bernard J. Jansen:
Designing a Value Based Niche Search Engine Using Evolutionary Strategies. 800-805 - Jun-feng Song, Weiming Zhang, Weidong Xiao:
A Mathematical Investigation on Retrieval Performance Evaluation Measures of Information Retrieval Algorithm. 806-810
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.