ISICT 2004: Las Vegas, Nevada, USA
John Waldron (Ed.): Proceedings of the Intenational Symposium on Information and Communication Technologies, Las Vegas, Nevada, USA, June 16-18, 2004. Trinity College Dublin 2004 ACM International Conference Proceeding Series 90 ISBN 1-59593-170-8
Invited workshop on distributed objects research, experiences and applications
Banjong Huongrat, Twittie Senivongse: Cross-domain service change notification via trader federation. 2-7
Arno Puder: Extending desktop applications to the web. 8-13
Markus Aleksy, Ralf Gitzel: Value type-based smart proxies: a concept for adaptable distributed applications. 20-25
Computer networks
Conor Gildea, Declan Barber: Convergence technologies for sensor systems in the Next Generation networks (NGN). 26-31
Deepak Mathur: Traffic protection and restoration schemes in core routers/switches. 32-37
Deepak Mathur: SuperPipe: next generation of high speed trunks. 38-43
Xue Bai, Ade G. Ola, Yinjing Cui, Fidelis Ikem: A clustered tree method for implementing application level multicast. 44-49
Gavin Byrne, Declan Barber: Developing multiparty conferencing services for the NGN: towards a service creation framework. 50-55
Hussein Ali, Mohammad Inayatullah, Shmuel Rotenstreich: Resource allocation and QoS in mobile ad hoc networks. 56-62
Ladda Preechaveerakul, Pattarasinee Bhattarakosol: One name—many objects—one result: a possible solution for naming system. 63-67
Lan Quan, Tai Rang Eom, Kyung-Geun Lee, Ju-wook Jang, Sang Yun Lee: Retrieval schemes for scalable unstructured P2P system. 68-73
Montree Bunruangses, Weerawat Poompatanapong, Pratheep Banyatnoparat, Bunjong Piyatamrong: QoS multi-agent applied for Grid Service management. 74-79
Th. Vergin, Thomas Kessler, Andreas Ahrens, Christoph Lange, Hans-Dietrich Melzer: Packet arrivals in ethernet-based data networks. 80-85
Information processing
Vivek Chanana, Athula Ginige, San Murugesan: Improving information retrieval effectiveness by assigning context to documents. 86-91



Svetlana Hensman, John Dunnion: Automatically building conceptual graphs using VerbNet and WordNet. 115-120
Invited workshop on information technology and its applications: software development, disaster engineering, and education
Alta van der Merwe, Johannes C. Cronjé: The educational value chain as a modelling tool in re-engineering efforts. 122-127
Leon Jololian, Jean-Claude Ngatchou, Remzi Seker: A component integration meta-framework using smart adapters. 128-133
Pratap Chillakanti: Role-based information security: change management issues. 134-139
A. Chris Bogen, David A. Dampier: Knowledge discovery and experience modeling in computer forensics media analysis. 140-145
Gary Cantrell, David A. Dampier: Experiments in hiding data inside the file structure of common office documents: a stegonography application. 146-151
Information technology
Amirrudin Kamsin: Management of information technology: the study on strategy, planning and policies. 152-157
Wonjin Jung: A review of research: an investigation of the impact of data quality on decision performance. 166-171
Nils Schumacher: A theoretical concept for XML-enabled global small business networks. 178-184
Thomas H. Lenhard: Multi-discipline-reengineering/redevelopment of IT-infrastructures. 185-189
Applications I
Akihiro Chiyonobu, Toshinori Sato: Investigating heterogeneous combination of functional units for a criticality-based low-power processor architecture. 190-195
Chul Choi, Young Kwan Choi, Chang-Chun Park: The image analysis system with Adaptive Component. 202-207
Seung Soo Lee, Jeong A. Lee, Chang Choon Park: A research of merging regions through isophotes analysis. 208-213
Young Kwan Choi, Chul Choi, Chang-Chun Park: Image retrieval using color component analysis. 214-219
Dragos Trinca: Meta-EAH: an adaptive encoder based on adaptive codes. Moving between adaptive mechanisms. 220-225
Ian Eccles, Meng Su: Illustrating the curse of dimensionality numerically through different data distribution models. 232-237
Applications II
Wei Li, Hang Chen, Qing-An Zeng, Dharma P. Agrawal: Resource allocation for handoffs in integrated wireless cellular networks. 238-243
Yafen Li, Wuu Yang, Ching-Wei Huang: Preventing type flaw attacks on security protocols with a simplified tagging scheme. 244-249
Chia-Chu Chiang: High-level heterogeneous distributed parallel programming. 250-255
Java technology
Joel K. Hollingsworth, David J. Powell: Explicitly and implicitly teaching Java best practices across the undergraduate curriculum. 262-267
Pat Shuff, Michael Bolton: Experiences in code migration from main applications to J2EE servers. 268-274
Adrijan Bozinovski, Stevo Bozinovski: N-queens pattern generation: an insight into space complexity of a backtracking algorithm. 281-286



