ISICT 2003: Dublin, Ireland
Proceedings of the 1st Intenational Symposium on Information and Communication Technologies, Dublin, Ireland, September 24-26, 2003. Trinity College Dublin 2003 ACM International Conference Proceeding Series 49
Signal processing
Jinkeun Hong, Sunchun Park, Janghong Yoon, Jae-Young Koh, Daeho Kim: Design of random noise generator using SW algorithm. 9-14
Abdellah Kacha, Francis Grenez, Philippe De Doncker, Khier Benmahammed: A wavelet-based approach for frequency estimation of interference signals in printed circuit boards. 21-26
Computer science in health and education
John Fulcher: The use of smart devices in eHealth. 27-32
Pedro Gómez Vilda, Victor Nieto Lluis, Rafael Martínez, Agustín Álvarez Marquina, F. Rodríguez, Victoria Rodellar: Detection of the mucosal wave in the speech signal for larynx pathology characterization. 33-39
John Fulcher, Russell Gluck, Marion Worthy, Kim Draisma, Wilma Vialle: A neural network, speech-based approach to literacy. 40-45
Blaise W. Liffick: Assistive technology in computer science. 46-51
Cestmir Stuka, Daniel Smutek: Correlation of the entrance examination result and the study success at the Medical Faculty, Charles University Prague. 52-57
Martina Berankova, Petra Nevrivova: Problems in operational and systems analysis educational process: solved by ICT application. 58-63
Machine learning and applications
Ganka Petkova Kovacheva, Hidemitsu Ogawa: Radial basis function classifier for fault diagnostics. 64-69
David Edelman: Adapting support vector machine methods for horserace odds prediction. 70-75
Giuseppe Ascia, Vincenzo Catania, Maurizio Palesi, Antonio Parlato: An evolutionary approach for reducing the energy in address buses. 76-81
Image processing
Josef Scharinger: Detecting watermarks at arbitrary image resolution. 82-87
Othman Khalifa: Image data compression in wavelet transform domain using modified LBG algorithm. 88-93
Sang-su Lee, Jong-wook Han, Hyo-wook Bae: The encryption method to share a secret binary image and its decryption system. 94-99
Daniel Smutek, Radim Sára, Petr Sucharda, Ludvík Tesar: Different types of image texture features in ultrasound of patients with lymphocytic thyroiditis. 100-102
Data mining and database technology
Markus Hofmann, Brendan Tierney: The involvement of human resources in large scale data mining projects. 103-109
Abdualrraouf A. Elbibas, Mick J. Ridley: Using metadata for developing automated Web system interface. 113-118
B. John Oommen, Jing Chen: A new histogram method for sparse attributes: the averaged rectangular attribute cardinality map. 119-125
Communication technology I - coding and wireless
Vahid Tabataba Vakili, Arash Aziminejad, Mohammad Reza Dehbozorgi: A novel speed-sensitive bidirectional overflow and hand-down resource allocation strategy for hierarchical cellular networks. 126-131

Xuerong Yong: Analyzing the codes that avoid specified differences by binary tree. 144-149
Klaus Knoche, Jürgen Rinas, Karl-Dirk Kammeyer: MAI-suppression with fractional T-equalizer for CDMA. 150-155
Invited workshop on adaptive systems for ubiquitous computing

Robert O'Connor, Sven van der Meer: Present and future organisational models for wireless networks. 157-162
Simon Dobson: Applications considered harmful for ambient systems. 163-168
Steffen Higel, Tony O'Donnell, Vincent Wade: Towards a natural interface to adaptive service composition. 169-174
Stephen Greene, Jason Finnegan: Usability of mobile devices and intelligently adapting to a user's needs. 175-180
Ken Murray, Rajiv Mathur, Dirk Pesch: Intelligent access and mobility management in heterogeneous wireless networks using policy. 181-186
John Paul O'Grady, Susan Rea, Sinead Cummins, Dirk Pesch, Rajiv Mathur: Dynamic configuration management for MANETs: an overview. 187-192
Paddy Nixon, Feng Wang, Sotirios Terzis: Programming structures for adaptive ambient systems. 193-198
Ruaidhri Power: Topic maps for context management. 199-204
Owen Conlan, Ruaidhri Power, Steffen Higel, Declan O'Sullivan, Keara Barrett: Next generation context aware adaptive services. 205-212
Pervasive computing and virtual reality

Hannah Slay, Bruce H. Thomas, Rudi Vernik: An interaction model for universal interaction and control in multi display environments. 220-225
James Auger, Jimmy Loizeau, Stefan Agamanolis: Iso-phone: a total submersion telephonic experience. 232-236
Francis Rousseaux, Alain Bonardi: New tools and practices for electronic music distribution. 242-248
Electronic document technology
Nobutaka Suzuki, Yorichiro Sato, Michiyoshi Hayase: On merging structured documents with move operation. 249-254
Arnold Neville Pears, Carl Erickson: Enriching online learning resources with "explanograms". 261-266
Invited workshop on conceptual information retrieval and clustering of documents
Davide Buscaldi, Giovanna Guerrini, Marco Mesiti, Paolo Rosso: Tag semantics for the retrieval of XML documents. 273-278
Daniel Jiménez, Edgardo Ferretti, Vicente Vidal, Paolo Rosso, Carlos F. Enguix: The influence of semantics in IR using LSI and K-means clustering techniques. 279-284
Antonio Ferrández Rodríguez, Julio Martínez, Jesús Peral: An entity-relation approach to information retrieval. 285-290

Gabriel Castillo, Gerardo Sierra, John McNaught: An improved algorithm for semantic clustering. 304-309
Martin Holub: A new approach to conceptual document indexing: building a hierarchical system of concepts based on document clusters. 310-315
Marco Mesiti, Elisa Bertino, Giovanna Guerrini: An abstraction-based approach to measuring the structural similarity between two unordered XML documents. 316-321
Invited workshop on network security and management

Tom Coffey, Reiner Dojen, Tomas Flanagan: On the automated implementation of modal logics used to verify security protocols. 329-334
Security technology and applications
Nol Premasathian, Somying Thainimit: Structure free highway toll collection using non-repudiated tickets. 341-344
Jae-Deok Lim, Joon-Suk Yu, Jeong-Nyeo Kim: A study of the method of providing secure network channel among secure OSs. 345-350
Tom Coffey, Puneet Saidha, Peter Burrows: Analysing the security of a non-repudiation communication protocol with mandatory proof of receipt. 351-356
Neville I. Williams: E-business security issues for SMEs in a virtual hosting environment. 357-364
Gustavo A. Santana Torrellas, Luis A. Villa Vargas: Modelling a flexible network security systems using multi-agents systems: security assessment considerations. 365-371
Modelling and control
Lyudmila Mihaylova, René K. Boel: Hybrid stochastic framework for freeway traffic flow modelling. 372-377
Theodore S. Stamoulakatos, Efstathios D. Sykas: Signal pattern recognition, hidden markov modeling and traffic flow modeling filters applied in existing signaling of cellular networks for vehicle volume estimation. 378-384
Brita H. Hafskjold: Anti-run-dry algorithm for optimal control of playoutbuffers. 391-398
Invited workshop on digital interaction
Claudia Roda, Julie Thomas: Digital interaction: introduction to the first international workshop. 399-402
Jacqueline Brodie, James Evans, Laurence Brooks, Mark Perry: Supporting human interaction through digital technology: theory and practice. 403-408
Geert de Haan: The design of I-mass as a tool for interacting with cultural heritage. 415-420
Duska Rosenberg, Simon Foley, Stavros Kammas, Mirja Lievonen: Interaction space theory: a framework for tool development. 427-432
Human computer interaction
Bryan Duggan, Mark Deegan: Considerations in the usage of text to speech (TTS) in the creation of natural sounding voice enabled web systems. 433-438
Derek P. Brock, James A. Ballas, Brian McClimens: Perceptual issues for the use of 3D auditory displays in operational environments. 445-448
Software tools and programming languages
Daniel C. M. May, Bent Bruun Kristensen, Palle Nowack: Supporting complexity through (informational and physical) collaboration and modeling. 449-455
Kumpon Farpinyo, Twittie Senivongse: Designing and creating relational schemas with a CWM-based tool. 456-461
Josef Pavlicek, Vojtech Merunka, Petra Nevrivova: The development of the information systems. 462-467
Anthony Sartini, John Waldron: Dynamic profiling & comparison of Sun Microsystems' JDK1.3.1 versus the Kaffe VM APIs. 468-474
WWW applications
Marko Niinimäki, Miika Tuisku, Matti Heikkurinen: Designing for flexibility: separating user interface design from program logic and data. 475-480
Marian Ventuneac, Tom Coffey, Ioan Salomie: A policy-based security framework for Web-enabled applications. 487-492
Md. Asri Ngadi, Bernard S. Doherty: Multi-users shared whiteboard under Web-multicast system. 493-498
Invited workshop on middleware interoperability of enterprise applications


Paul Grace, Gordon S. Blair, Sam Samuel: A marriage of Web services and reflective middleware to solve the problem of mobile client interoperability. 506-511
Markus Aleksy, Ralf Gitzel: Relationship between the standard compliance of IDL-compilers and interoperability of CORBA-based applications. 512-517
Stefan Kuhlins, Axel Korthaus: A multithreaded Java framework for information extraction in the context of enterprise application integration. 518-523
Cledson Akio Sakurai, Moacyr Martucci Junior: An open system architecture for operation support system at telecommunications service providers. 524-529
Distributed systems
Susumu Yamasaki, Mariko Sasakura: An automated reasoning for diagnostic knowledge in a distributed environment. 530-535
George Dimitoglou, Philippe Moore, Shmuel Rotenstreich: Middleware for large distributed systems and organizations. 536-542
Marko Niinimäki, Vesa Sivunen: Applying grid security and virtual organization tools in distributed publication databases. 543-548
Pavel Motuzenko: Adaptive domain model: dealing with multiple attributes of self-managing distributed object systems. 549-554
Communication technology II - Internet, services, and architectures
K. H. Tan, Mashkuri Yaacob, T. C. Ling, K. K. Phang: IPv6 single-path and multi-path anycast routing protocols performance analysis. 555-560
Meredith Lulling, John Vaughan: An investigation of TCP throughput variation for SIP traffic. 567-572
Istvan Matyasovszki, Colin Flanagan: Forwarding treatment preservation of differentiated services behaviour aggregate flows across heterogenous network domains by employing the symbiotic packet processing architecture. 573-578
Miguel A. Sánchez-Puebla, Jesús Carretero: A new approach for distributed computing in avionics systems. 579-584
Siti Hafizah Ab Hamid, Tan Yoke Pei, Nazean Jomhari: Object oriented analysis and UML design in the development of accommodation services system. 590-595
Invited workshop on object-oriented computing systems
HISC architecture: an object-oriented computing system. 596
Mok Pak Lun, Anthony Fong, Gary K. W. Hau: Object-oriented processor requirements with instruction analysis of Java programs. 597-602
Kaiman Lo, Pak Lun Mok, Wing Shing Yu, Anthony S. Fong: Hardware support for user-access control on an object-oriented processor. 603-608
Ryan W. S. Yu, Gary K. W. Hau, Anthony S. Fong: Test bench for software development of object-oriented processor. 609-614



