


default search action
ITCC 2005: Las Vegas, NV, USA
- International Symposium on Information Technology: Coding and Computing (ITCC 2005), Volume 1, 4-6 April 2005, Las Vegas, Nevada, USA. IEEE Computer Society 2005, ISBN 0-7695-2315-3

- General Chair's Message.

- Committees.

- Additional Referees.

Bioinformatics
- Andy Auyeung:

A New Phylogenetic Tree Model for Fuzzy Characters. 2-7 - Jiancong Luo, Ishfaq Ahmad, Munib Ahmed, Raymond A. Paul:

Parallel Multiple Sequence Alignment with Dynamic Scheduling. 8-13 - Naveen Kandiraju, Sumeet Dua, Steven A. Conrad:

Dihedral Angle based Dimensionality Reduction for Protein Structural Comparison. 14-19 - Rasiah Loganantharaj:

Recognizing Transcription Start Site (TSS) of Plant Promoters. 20-25 - Sumeet Dua, Naveen Kandiraju, Hilary W. Thompson:

Design and Implementation of a Unique Blood-Vessel Detection Algorithm towards Early Diagnosis of Diabetic Retinopathy. 26-31 - Ya Zhang, Hongyuan Zha, Chao-Hsien Chu:

A Time-Series Biclustering Algorithm for Revealing Co-Regulated Genes. 32-37
Data Coding and Compression
- Ahmed Muthana M. Nadhim, Jianhua He, Jiangtao Xi, Zongkai Yang:

An Adaptive Scalable Multiuser-OFDM System for Multimedia Transmission Over Fading Channels. 40-45 - Alain Bretto

, Luc Gillibert:
Hypergraph Lossless Image Compression. 46-50 - Ata Kabán:

A Scalable Generative Topographic Mapping for Sparse Data Sequences. 51-56 - Ebru Celikel:

Language Discrimination via PPM Model. 57-62 - Hong Zhao, Nirwan Ansari, Yun Q. Shi:

Layered MPEG Video Transmission over IP DiffServ. 63-67 - Jinghua Zhang, Charles B. Owen:

Hybrid Coding for Animated Polygonal Meshes: Combining Delta and Octree. 68-73 - Piyali Mandal, Ashish Thakral, Shekhar Verma

:
Watermark Based Digital Rights Management. 74-78 - Sudipta Mahapatra, Kuldeep Singh:

A Parallel Scheme for Implementing Multialphabet Arithmetic Coding in High-Speed Programmable Hardware. 79-84 - Shumin Tian, P. Karivaratha Rajan:

Multiple Description Coding Using Transforms and Data Fusion. 85-90 - Tao Tao, Amar Mukherjee:

Multiple-Pattern Matching For LZW Compressed Files. 91-96 - Wen Hu, Guoxin Zheng:

Orthogonal Hermite Pulses Used for UWB M-ary Communication. 97-101 - Xinrong Hu, Tianzhen Wang, Dehua Li:

A New Approach of Color Quantization Based On Ant Colony Clustering Algorithm. 102-108 - Yu Sun, Dongdong Li, Ishfaq Ahmad, Jiancong Luo:

A Rate Control Algorithm for Wireless Video Transmission Using Perceptual Tuning. 109-114
Data Mining
- Bruce D. Caulkins, Joohan Lee, Morgan C. Wang:

Packet- vs. Session-Based Modeling for Intrusion Detection Systems. 116-121 - Charles Wesley Ford, Chia-Chu Chiang, Hao Wu, Radhika R. Chilka, John R. Talburt:

Text Data Mining: A Case Study. 122-127 - Chung-Hong Lee, Hsin-Chang Yang:

A Classifier-based Text Mining Approach for Evaluating Semantic Relatedness Using Support Vector Machines. 128-133 - Dechang Chen, Dong Hua, Konstantinos Sirlantzis

, Xiaobin Ma:
On the Relation Between Dependence and Diversity in Multiple Classifier Systems. 134-139 - Hassan Reza, Emanuel S. Grant:

Quality-Oriented Software Architecture. 140-145 - Jeffrey Huang, Shijun Li:

Mining p53 Binding Sites Using Profile Hidden Markov Model. 146-151 - Kazem Taghva

, Rania Elkhoury, Jeffrey S. Coombs:
Arabic Stemming Without A Root Dictionary. 152-157 - Kazem Taghva

, Russell Beckley, Mohammad Sadeh:
A Stemming Algorithm for the Farsi Language. 158-162 - M. Emre Celebi, Y. Alp Aslandogan, Paul R. Bergstresser:

Mining Biomedical Images with Density-Based Clustering. 163-168 - Mali Abdollahian, R. Foroughi:

Optimal Statistical Model for Forecasting Ozone. 169-173 - Mali Abdollahian, R. Foroughi:

Regression Analysis of Ozone Data. 174-178 - Mark Smith, Alireza Khotanzad:

XML Representation of Digital Videos for Visual Data Mining Applications. 179-183 - N. Churcharoenkrung, Yang Sok Kim, Byeong Ho Kang:

Dynamic Web Content Filtering based on User's Knowledge. 184-188 - Quoc-Nam Tran:

An Efficient Clustering Algorithm Using Graphical Techniques. 189-194 - Ray R. Hashemi, Joshua H. Early, Mahmood Bahar, Alexander A. Tyler, John F. Young:

A Signature-Based Liver Cancer Predictive System. 195-199 - Shakirah Mohd Taib, Soon-ja Yeom

, Byeong-Ho Kang:
Elimination of Redundant Information for Web Data Mining. 200-205 - Soon Myoung Chung, Murali Mangamuri:

Mining Association Rules from the Star Schema on a Parallel NCR Teradata Database System. 206-212 - Xin Jin, Bamshad Mobasher, Yanzan Zhou:

A Web Recommendation System Based on Maximum Entropy. 213-218
Database Technology
- Abel Matus-Castillejos, Ric Jentzsch:

A Time Series Data Management Framework. 220-225 - Ali Saman Tosun:

Design Theoretic Approach to Replicated Declustering. 226-231 - Ali Saman Tosun:

Constrained Declustering. 232-237 - Ira Rudowsky, Olga Kulyba, Mikhail Kunin, Dmitri Ogarodnikov, Theodore Raphan:

Managing a Relational Database with Intelligent Agents. 238-242 - Moses Garuba, Anteneh Girma:

Impact Of External Security Measures On Data Access Implementation With Online Database Management System. 243-248 - Navdeep Kaur, Rajwinder Singh, Anil Kumar Sarje, Manoj Misra:

Performance Evaluation of Secure Concurrency Control Algorithm for Multilevel Secure Distributed Database Systems. 249-254 - Oviliani Yenty Yuliana

, Suphamit Chittayasothorn:
XML Schema Re-Engineering Using a Conceptual Schema Approach. 255-260 - Soon Myoung Chung, Sheeya B. Jesurajaiah:

Schemaless XML Document Management in Object-Oriented Databases. 261-266
Distributed and Grid Systems
- Angelo Leto, Ezio Corso, Riccardo Murri, Alessio Terpin, Cristian Zoicas, Stefano Cozzini:

EGRID Project: Experience Report on the Implementation of a Grid Infrastructure for the Analysis of Financial Data. 268-273 - Chia-Chu Chiang:

Development of Concurrent Systems through Coordination. 274-279 - Dianxun Shuai, Xiang Feng, Rui Gong, Xing Wang:

A New Generalized Particle Approach to Allot Resources And Jobs for Grid Computing. 280-285 - Emmanuel Jeannot, Gerald Monard:

Computing Molecular Potential Energy Surface with DIET. 286-291 - Qianfei Fu, Shoubao Yang, Maosheng Li, Junmao Zhun:

Transaction Mechanism Design in Decentralized Computational Market. 292-297 - Giovanni Aloisio

, Massimo Cafaro, Dario Conte, Sandro Fiore
, Gian Paolo Marra, Gianvito Quarta:
A Grid-Enabled Web Map Server. 298-303 - Giovanni Aloisio

, Massimo Cafaro, Italo Epicoco, Daniele Lezzi
, Robert van Engelen:
The GSI Plug-in for gSOAP: Enhanced Security, Performance, and Reliability. 304-309 - Maosheng Li, Shoubao Yang, Qianfei Fu, Yang Jin:

Research on Grid Resource Reliability Model Based on Promise. 310-315 - Michele Di Santo, Nadia Ranaldo, Eugenio Zimeo:

Metacomputing through the Enactment of a BPEL4WS Workflow in a Grid Environment. 316-321 - Mario Cannataro, Pietro Hiram Guzzi, Tommaso Mazza

, Giuseppe Tradigo, Pierangelo Veltri:
Algorithms and Databases in Bioinformatics: Towards a Proteomic Ontology. 322-328 - Mine Altunay, Daniel Colonnese, Chetna Warade:

High Throughput Web Services for Life Sciences. 329-334 - Minjun Wang, Geoffrey C. Fox, Marlon E. Pierce:

Grid-Based Collaboration in Interactive Data Language Applications. 335-341 - Oussama Kassem Zein, Yvon Kermarrec:

An Approach for Service Description and a Flexible Way to Discover Services in Distributed Systems. 342-347 - Pichet Amnuaykanjanasin, Natawut Nupairoj:

The BPEL Orchestrating Framework for Secured Grid Services. 348-353 - Rashedur M. Rahman, Ken Barker, Reda Alhajj:

Replica Placement in Data Grid: Considering Utility and Risk. 354-359 - Shrideep Pallickara, Geoffrey C. Fox, Sangmi Lee Pallickara:

An Analysis of Reliable Delivery Specifications for Web Services. 360-365 - Umesh Kant, Daniel Grosu:

Double Auction Protocols for Resource Allocation in Grids. 366-371
E-Commerce
- Xiaosong Hou, Chik How Tan:

A New Electronic Cash Model. 374-379 - Charles C. Willow:

Automatic Agent and Data Mining for e-Commerce. 380-384 - Chima Adiele:

A Characterization of Web Data Sources to Facilitate E-Commerce Transactions. 385-390 - Elhadi M. Shakshuki:

A Methodology for Evaluating Agent Toolkits. 391-396 - Taedong Han:

Exploring Price and Product Information Search Behavior in e-Market. 397-402 - Yao-Chung Chang, Jiann-Liang Chen, Wen-Ming Tseng:

A Mobile Commerce Framework Based on Web Services Architecture. 403-408 - Peng Liang, Keqing He, Bing Li, Jin Liu:

The Interoperability between Different e-Business Specifications. 409-413 - Wudong Liu, Lulu He, Jing Liu, Keqing He:

A Semantic Interoperability Extension Model to the ebXML Registry. 414-419 - Yiyao Hao, Daniel M. Havey, David A. Turner:

An Exchange Protocol for Alternative Currencies. 420-424 - Zoran Duric:

IPS - Secure Internet Payment System. 425-430
Education
- Frank P. Coyle, Mitchell A. Thornton:

A Framework and Process for Curricular Integration and Innovation Using Project Based Interdisciplinary Teams. 432-435 - Hye Sun Kim, Seong Baeg Kim:

An Integrated Course Based on Educational Games. 436-441 - Imke Sassen, Birgit Schwartz-Reinken:

Adaptation and Configuration - Support-Possibilities of Different Learner Types within Virtual Learning Environments - An Experience Report. 442-446 - Kyoung Mi Yang, Rockford J. Ross, Seong Baeg Kim:

Constructing Different Learning Paths Through e-Learning. 447-452 - Paul Douglas, Steve Barker:

An E-learning tool for Database Administration. 453-458 - Pavel Azalov:

Synthetic Exercises on the Web. 459-464 - Zongkai Yang, Qingtang Liu, Kun Yan, Wanting Deng, Jing Jin:

Integration of Digital Rights Management into Learning Content Management System. 465-469 - Rukmini Reddy Muduganti, Shravan Kumar Sogani, Henry Hexmoor:

Comparison of Information Technology Adoption Rates across Laggards, Innovators and Others. 470-475 - Shlomo Argamon, Nazli Goharian, David A. Grossman, Ophir Frieder, Nambury S. Raju:

A Specialization in Information and Knowledge Management Systems for the Undergraduate Computer Science Curriculum. 476-481 - Steve Barker, Paul Douglas:

An Intelligent Tutoring System for Program Semantics. 482-487 - Victor Adamchik, Ananda Gunawardena:

Adaptive Book: Teaching and Learning Environment for Programming Education. 488-492
E-Gaming
- Jordi Castellà-Roca

, Guillermo Navarro, Jose A. Ortega-Ruiz, Joaquín García
:
Digital Chips for an On-Line Casino. 494-499 - Joaquín García

, Frédéric Cuppens, Fabien Autrel, Jordi Castellà-Roca
, Joan Borrell, Guillermo Navarro, Jose A. Ortega-Ruiz:
Protecting On-Line Casinos against Fraudulent Player Drop-Out. 500-505 - Philippe Golle:

Dealing Cards in Poker Games. 506-511 - Ron Coleman:

Single-Parameter Blackjack Betting Systems Inspired by Scatter Search. 512-517 - Ying-Chieh Chen, Jing-Jang Hwang, Ronggong Song, George Yee, Larry Korba:

Online Gaming Cheating and Security Issue. 518-523
Embedded Cryptographic Systems
- A. Murat Fiskiran, Ruby B. Lee:

Fast Parallel Table Lookups to Accelerate Symmetric-Key Cryptography. 526-531 - Akashi Satoh, Tadanobu Inoue:

ASIC-Hardware-Focused Comparison for Hash Functions MD5, RIPEMD-160, and SHS. 532-537 - Alireza Hodjat, David Hwang, Ingrid Verbauwhede

:
A Scalable and High Performance Elliptic Curve Processor with Resistance to Timing Attacks. 538-543 - Catherine H. Gebotys, C. C. Tiu, X. Chen:

A Countermeasure for EM Attack of a Wireless PDA. 544-549 - Christophe Nègre:

Quadrinomial Modular Arithmetic using Modified Polynomial Basis. 550-555 - François-Xavier Standaert

, Gilles Piret, Gaël Rouvroy, Jean-Jacques Quisquater:
FPGA Implementations of the ICEBERG Block Cipher. 556-561 - François-Xavier Standaert

, Eric Peeters, Jean-Jacques Quisquater:
On the Masking Countermeasure and Higher-Order Power Analysis Attacks. 562-567 - Francis M. Crowe, Alan Daly, William P. Marnane:

A Scalable Dual Mode Arithmetic Unit for Public Key Cryptosystems. 568-573 - Francisco Rodríguez-Henríquez, Nazar Abbas Saqib, Nareli Cruz Cortés:

A Fast Implementation of Multiplicative Inversion Over GF(2m). 574-579 - T. S. Ganesh, T. S. B. Sudarshan:

ASIC Implementation of a Unified Hardware Architecture for Non-Key Based Cryptographic Hash Primitives. 580-585 - Guido Bertoni

, Vittorio Zaccaria, Luca Breveglieri
, Matteo Monchiero, Gianluca Palermo:
AES Power Attack Based on Induced Cache Miss and Countermeasure. 586-591 - Hung-Ching Chang, Chun-Chin Chen, Chih-Feng Lin:

XScale Hardware Acceleration on Cryptographic Algorithms for IPSec Applications. 592-597 - Kooroush Manochehri, Saadat Pourmozafari:

Modified Radix-2 Montgomery Modular Multiplication to Make It Faster and Simpler. 598-602 - Luiza de Macedo Mourelle

, Nadia Nedjah:
Reconfigurable Hardware for Addition Chains Based Modular Exponentiation. 603-607 - Maged Hamada Ibrahim:

Verifiable Threshold Sharing of a Large Secret Safe-Prime. 608-613 - Nadia Nedjah, Luiza de Macedo Mourelle

:
Pareto-Optimal Hardware for Substitution Boxes. 614-619 - Shay Gueron, Or Zuk:

Applications of The Montgomery Exponent. 620-625 - Fabio Sozzani, Guido Bertoni

, Stefano Turcato, Luca Breveglieri
:
A Parallelized Design for an Elliptic Curve Cryptosystem Coprocessor. 626-630 - Takeshi Okamoto, Atsuo Inomata, Eiji Okamoto:

A Proposal of Short Proxy Signature using Pairing. 631-635 - Willi Geiselmann, Hubert Köpfer, Rainer Steinwandt, Eran Tromer:

Improved Routing-Based Linear Algebra for the Number Field Sieve. 636-641 - Xinxin Fan, Thomas J. Wollinger, Yumin Wang:

Inversion-Free Arithmetic on Genus 3 Hyperelliptic Curves and Its Implementations. 642-647
Information Assurance and Security
- Akira Yamada

, Yutaka Miyake, Keisuke Takemori, Toshiaki Tanaka:
Intrusion Detection System to Detect Variant Attacks Using Learning Algorithms with Automatic Generation of Training Data. 650-655 - Bharat B. Madan, Shashi Phoha, Kishor S. Trivedi:

StackOFFence: A Technique for Defending Against Buffer Overflow Attacks. 656-661 - Debra L. Cook, Angelos D. Keromytis:

Conversion and Proxy Functions for Symmetric Key Ciphers. 662-667 - Dianxiang Xu, Vivek Goel:

An Aspect-Oriented Approach to Mobile Agent Access Control. 668-673 - Raju Gangishetti, M. Choudary Gorantla, Manik Lal Das, Ashutosh Saxena

, Ved Prakash Gulati:
An Efficient Secure Key Issuing Protocol in ID-Based Cryptosystems. 674-678 - Hamilton E. Link, William D. Neumann:

Clarifying Obfuscation: Improving the Security of White-Box DES. 679-684 - Heeyoul Kim, Seong-Min Hong, Hyunsoo Yoon, Jung Wan Cho:

Secure Group Communication with Multiplicative One-way Functions. 685-690 - Jidong Long, Daniel G. Schwartz, Sara Stoecklin, Mahesh K. Patel:

Application of Loop Reduction to Learning Program Behaviors for Anomaly Detection. 691-696 - Khaled F. Hussain

, Sharon Rajan, Naveen Addulla, Ghada S. Moussa
:
No-Capture Hardware Feature for Securing Sensitive Information. 697-702 - Mathieu Jaume, Charles Morisset:

Formalisation and implementation of Access control models. 703-708 - P. Muppala, Johnson P. Thomas, Ajith Abraham:

QoS-Based Authentication Scheme for Ad Hoc Wireless Networks. 709-714 - Sriranjani Sitaraman

, Srinivasan Krishnamurthy, Subbarayan Venkatesan:
Byteprints: A Tool to Gather Digital Evidence. 715-720 - Thomas E. Carroll

, Daniel Grosu:
A Secure and Efficient Voter-Controlled Anonymous Election Scheme. 721-726 - Valentina Casola

, Massimiliano Rak
, Antonino Mazzeo, Nicola Mazzocca:
Security Design and Evaluation in a VoIP Secure Infrastracture: A Policy Based Approach. 727-732 - Vipul Goyal, Ajith Abraham, Sugata Sanyal, Sang-Yong Han:

The N/R One Time Password System. 733-738 - Vipul Goyal, Virendra Kumar

, Mayank Singh, Ajith Abraham, Sugata Sanyal:
CompChall: Addressing Password Guessing Attacks. 739-744 - Weiliang Zhao, Vijay Varadharajan:

Efficient TTP-Free Mental Poker Protocols. 745-750 - Xue Ying Chen, Ruizhong Wei:

A Dynamic Method for Handling the Inference Problem in Multilevel Secure Databases. 751-756 - Yijuan Shi, Gongliang Chen, Jianhua Li:

ID-Based One Round Authenticated Group Key Agreement Protocol with Bilinear Pairings. 757-761 - Yu Yu, Jussipekka Leiwo, A. Benjamin Premkumar:

Securely Utilizing External Computing Power. 762-767 - Yun Q. Shi, Guorong Xuan, Chengyun Yang, Jianjiong Gao, Zhenping Zhang, Peiqi Chai, Dekun Zou, Chunhua Chen, Wen Chen:

Effective Steganalysis Based on Statistical Moments of Wavelet Characteristic Function. 768-773 - Zhen Liu, Susan M. Bridges:

Dynamic Learning of Automata from the Call Stack Log for Anomaly Detection. 774-779 - Zili Shao, Chun Xue, Qingfeng Zhuge, Edwin Hsing-Mean Sha, Bin Xiao

:
Efficient Array & Pointer Bound Checking Against Buffer Overflow Attacks via Hardware/Software. 780-785
Information Retrieval
- M. Emre Celebi, Y. Alp Aslandogan:

A Comparative Study of Three Moment-Based Shape Descriptors. 788-793 - Rifat Ozcan, Y. Alp Aslandogan:

Concept-Based Information Access. 794-799 - Sourav Sengupta, Bernard J. Jansen

:
Designing a Value Based Niche Search Engine Using Evolutionary Strategies. 800-805 - Jun-feng Song, Weiming Zhang, Weidong Xiao:

A Mathematical Investigation on Retrieval Performance Evaluation Measures of Information Retrieval Algorithm. 806-810

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














