


default search action
3. ICITA 2005: Sydney, Australia
- Third International Conference on Information Technology and Applications (ICITA 2005), 4-7 July 2005, Sydney, Australia. IEEE Computer Society 2005, ISBN 0-7695-2316-1

Volume 2
Advanced Robotics
- George K. Adam

, Edward Grant, Gordon K. Lee:
"RoboPress" - An Automated Mobile Press for Manufacturing Concrete Products. 3-8 - Dong Hun Kim, Hyun-Woo Lee, Seiichi Shin, Tomoharu Suzuki:

Local Path Planning Based on New Repulsive Potential Functions with Angle Distributions. 9-14 - Chunying Zhao, Jingtai Liu, Yujuan Li, Tao Chen, Lei Sun:

Virtual Repulsive Force in Competitive Multi-Robot Teleoperation. 15-20 - Salman Yussof

, Adzly Anuar, Karina Fernandez:
Algorithm for Robot Writing Using Character Segmentation. 21-24 - Gengqian Liu, Tiejun Li, Yuqing Peng, Xiangdan Hou:

The Ant Algorithm for Solving Robot Path Planning Problem. 25-27 - Wenming Cao, Shoujue Wang:

Application of Two Synaptic Weight Neural Networks for Nonlinear Control. 28-31
Distributed and Parallel Computing
- Richard S. L. Wu, Allan K. Y. Wong, Tharam S. Dillon:

Using Real-Time Traffic Pattern Detection for Dynamic Cache Size Tuning in Information Retrieval. 35-40 - Yinzhang Guo, Guoyou Zhang, Lipin Xie, Yubin Xu:

The Research and Design of Business Component Reuse in Enterprise Information System Integration. 41-44 - Haifeng Shen, Suiping Zhou, Chengzheng Sun:

Flexible Concurrency Control for Collaborative Office Systems. 45-50 - Shigeharu Matsusaka, Koji Inoue:

A Cost Effective Spacial Redundancy with Data-Path Partitioning. 51-56 - Arnon Rungsawang, Bundit Manaskasemsak:

Partition-Based Parallel PageRank Algorithm. 57-62 - Yanni Wu, Kuo Zhang, Xiaoge Wang, Jinlan Tian:

Extending Metadata with Scenarios in Adaptive Distributed System. 63-68 - Yong Feng, Yan-yuan Zhang:

Virtual Disk Reconfiguration with Performance Guarantees in Shared Storage Environment. 69-74 - Liang-Teh Lee, Chia-Ying Tseng, Kang-Yuan Liu, Kuan-Ching Li:

A Wallet-Size Cluster for H.264 Encoding. 75-80 - Yong Feng, Yan-yuan Zhang:

E-DM: A QoS-Enabled Storage Service Schedule System in Shared Storage Environment. 81-84 - Takashi Yamanoue:

Sharing the Same Operation with a Large Number of Users Using P2P. 85-88 - Wenjian Liu, Gaoliang Peng:

An Internet-Enabled Setup Planning System. 89-92 - Rui-yong Jia, Yan-yuan Zhang, Yong Feng:

GCSLight: A Light-Weight Group Communication Service for Metadata Server Cluster. 93-96 - Yanping Chen, Zeng-zhi Li, Li Wang, Huaizhou Yang:

Service-Cloud Model of Composed Web Services. 97-100 - Yiqiang Zheng, Heqing Guo, Wei Gao, Botong Xu:

Research on Load Balance of Multi Clusters Architecture Based on Business Components Partition. 101-104
IT in Education and Health
- J. Chen, Mark Lanthier, Melissa Macpherson, Doron Nussbaum:

Computing Tumour Coverage as a Result of Respiratory Motion during Radiotherapy Treatment. 107-112 - Carolyn McGregor

, Bruce Kneale, Mark B. Tracy:
Bush Babies Broadband: On-Demand Virtual Neonatal Intensive Care Unit Support for Regional Australia. 113-118 - Jim Harkin

, Michael J. Callaghan
, T. Martin McGinnity
, Liam P. Maguire
:
Intelligent User-Support in Learning Environments for Remote Experimentation. 119-124 - Michael J. Callaghan

, Jim Harkin
, Mehdi El-Gueddari, T. Martin McGinnity
, Liam P. Maguire
:
Client-Server Architecture for Collaborative Remote Experimentation. 125-129 - Nicholas L. Carroll, Rafael A. Calvo

:
Certified Assessment Artifacts for ePortfolios. 130-135 - Satoshi Ichimura, Yutaka Matsushita:

Lightweight Desktop-Sharing System for Web Browsers. 136-141 - Ruth S. Raitman, Naomi Augar, Wanlei Zhou

:
Employing Wikis for Online Collaboration in the E-Learning Environment: Case Study. 142-146 - Kirsten Ellis

:
Tools for Inclusive Play: Developing "Auslan for Kinder". 147-152 - Norihiro Fujii, Nobuhiko Koike:

A New Remote Laboratory for Hardware Experiment with Shared Resources and Service Management. 153-158 - Vladlena Benson, Lara A. Frumkin

, Alan Murphy:
Designing Multimedia for Differences: e-Lecturer, e-Tutor, and e-Student Perspectives. 159-164 - Holger Kunz

, Thorsten Schaaf, Jürgen Braun, Thomas Tolxdorff:
Framework for an IT-Supported Balanced Scorecard in Health Care. 165-168 - S. M. F. D. Syed Mustapha

, Norisma Idris, Rukaini Abdullah:
Embedding Information Retrieval and Nearest-Neighbour Algorithm into Automated Essay Grading System. 169-172 - Kazunori Hino, Kazuo Terashima, Teruyuki Bunno, Takashi Yamanoue, Nobuyuki Hino:

Evaluation of Students' Performance in Online Seminars via Email with Mobile Phones. 173-176
IT in National Security
- Jian Yuan, Xin-Wen Xu, Chang-Jian Fu, Guo-Hui Li:

Classify of Underwater Target Utilizing Audio Fingerprint. 179-184 - Minh Nhut Nguyen, Daming Shi, Chai Quek:

Self-Organizing Gaussian Fuzzy CMAC with Truth Value Restriction. 185-190 - Brajesh Pande, Deepak Gupta, Dheeraj Sanghi, Sanjay Kumar Jain:

The Network Monitoring Tool - PickPacket. 191-196 - Zenon Chaczko, Sourendra Nath Sinha:

SAFE Model Approach to Construction of Intelligent Security Systems. 197-202 - Zenon Chaczko, Fady Ahmad:

Wireless Sensor Network Based System for Fire Endangered Areas. 203-207 - Johnson I. Agbinya

:
QoS Functions and Theorems for Moving Wireless Networks. 208-213 - John C. McEachen, John Zachary:

Real-Time Representation of Network Traffic Behavior for Enhanced Security. 214-219 - Frédéric Andrès, Motomu Naito:

Dynamic Topic Mapping Using Latent Semantic Indexing. 220-225 - Lei Niu, Lin Ni, Wei Lu, Yuan Miao:

A Method of Remote Sensing Image Retrieval Based on ROI. 226-229 - Leanne Ngo, Wanlei Zhou

:
The Multifaceted and Ever-Changing Directions of Information Security - Australia Get Ready! 230-233 - Qing Lu, Yongquan Yu:

The Research of Data Mining Based on Extension Sets. 234-237 - Chuen-Ching Wang, Yih-Chuan Lin, Shu-Chung Yi:

Satellite Interference Detection Using Real-Time Watermarking Technique for SMS. 238-241 - Norlaila Hussain, Oscar de Bruijn, Zainuddin Hassan:

Experimental Findings on Collaborative Interactions in a Co-Located Environment. 242-245
Mobile Computing and Communications
- Hu Liu, Yu hong Duan, Guang qing Xi, Li yun Luo:

A Novel OFDM Synchronization Algorithm. 249-254 - Yanping Lu, Weiling Wu:

Performance Analysis of Multiple Packets Combining Decoding in HARQ. 255-258 - Jin Kwan Kim, Sang-Woo Kim, Kee-Hoo Yoon, Heung-Gyoon Ryu:

Design of Binary Multi-code CDMA System with Constant Amplitude. 259-264 - Peter Hutterer, Mark T. Smith, John Ankcorn, Wayne Piekarski, Bruce H. Thomas

:
A Lightweight UI Software Infrastructure for Wrist-Based Displays: If Your Microwave Oven Could Talk to Your Watch, What Would It Say? 265-270 - Chiung-Ying Wang, Chi-Jen Wu

, Guan-Nan Chen, Ren-Hung Hwang:
p-MANET: Efficient Power Saving Protocol for Multi-Hop Mobile Ad Hoc Networks. 271-276 - Jeich Mar, Shang Weng Wang:

The MTCR Scheme for the Integrated Multiple Rate Mobile Data Networks. 277-282 - Hong-Yi Chang, Chang Wu Yu:

Constructing Long-Lived Scatternets in Bluetooth Networks. 283-288 - Jim Mee Ng, Yan Zhang:

A Mobility Model with Group Partitioning for Wireless Ad Hoc Networks. 289-294 - Kyungsoo Jeong, S. H. Kim, K. M. Chung, J. C. Kim, J. H. Yu, J. S. Lee, S. H. Seo:

Multipath Channel Models for Wireless Local and Metropolitan Area Networks. 295-298 - Kevin H. Lin, Seedahmed S. Mahmoud, Zahir M. Hussain

:
Adaptive Modulation with Space-Time Block Coding for MIMO-OFDM Systems. 299-304 - Ying-Hong Wang, Jenhui Chen, Chih-Feng Chao, Chien-Min Lee:

A Transparent Cache-Based Mechanism for Mobile Ad Hoc Networks. 305-310 - Jibin Wang, Jinkang Zhu:

A Novel Time and Frequency Synchronization Approach for OFDM Systems. 311-315 - Robert P. Biuk-Aghai

:
Performance Tuning in the MacauMap Mobile Map Application. 316-321 - Hao Jiang:

Using the LAS Space-Time Spreading Codes to Achieve High Spectral Efficiency. 322-325 - Yingshan Li, Ju-Hyun Kyung, Jong-Won Son, Heung-Gyoon Ryu:

PAPR Reduction in MC/DS CDMA System by DFT Spreading Codes. 326-329 - Sang-Woo Kim, Hun-Hee Lee, Chan-Ho Park, Rag Gyu Jung, Heung-Gyoon Ryu:

A PAPR Reduction Method Using the Correlation of Information in OFDM Communication System. 330-333 - Gennadi Oumanski, Peter Bertók

:
Wide Area Service Discovery and Adaptation for Mobile Clients in Networks with Ad Hoc Behaviour. 334-337 - Peng Liang, Chuan-gang Zhao, Weiling Wu:

Over-Saturated Wavelet Packet Multiple Access Communication and Its Multi-User Detection. 338-341 - Kwok-Wa Lam, C. S. Wong, William Leung:

Using Look-Ahead Protocol for Mobile Data Broadcast. 342-345 - Teruaki Kitasuka, Kenji Hisazumi

, Tsuneo Nakanishi, Akira Fukuda:
WiPS: Location and Motion Sensing Technique of IEEE 802.11 Devices. 346-349 - Benjamin A. Liew, Stevan M. Berber

, Gobindar S. Sandhu:
Performance of a Multiple Access Orthogonal Wavelet Division Multiplexing System. 350-353
Multimedia
- Bing Zhou, Shou-zhi Wei:

Use Symmetrical Color-Spatial Feature for Image Comparison. 357-360 - Yonggang Fu, Ruimin Shen, Liping Shen:

Robust Image Watermarking Scheme Based on Subsampling. 361-365 - Changseok Bae, Yuk Ying Chung, Xiaoming Chen, Pinghao Wang:

Error Detection and Copyrights Protection Scheme for MPEG-2 Based on Channel Coded Watermark Signal. 366-370 - Hideaki Ito, Teruo Fukumura:

Utilizing Disks for the Available Link Bandwidth Video Delivery Method. 371-376 - Richard Y. D. Xu, Jesse S. Jin, John G. Allen:

Stream-Based Interactive Video Language Authoring Using Correlated Audiovisual Watermarking. 377-380 - Tasso Athanasiadis, Kevin H. Lin, Zahir M. Hussain

:
Space-Time OFDM with Adaptive Beamforming for Wireless Multimedia Applications. 381-386 - Chen-Lung Chan, Shih-Yu Huang, Nien-Chen Lin, Jia-Shung Wang:

Performance Analysis of Caching Strategies for Proxy-Assisted VOD Services. 387-392 - Naveen K. Chilamkurti, Ben Soh:

Multimedia Multicast Using SPLIT and Layered FEC. 393-396 - Sanxing Cao, Xianglin Huang, Rui Lu, Zhanxin Yang:

Fuzzy-Based Mass Media Content Management Platform: Architecture and Application Model. 397-400 - Yung-Gi Wu, Je-Hung Liu:

Image Indexing in DCT Domain. 401-406 - Ghim Hwee Ong, Jun-Ping Ng:

Dynamic Markov Compression Using a Crossbar-Like Tree Initial Structure for Chinese Texts. 407-410 - Hung-Yi Lin, Po-Whei Huang:

Perfect KDB-Tree: A Compact KDB-Tree Structure for Indexing Multidimensional Data. 411-414 - Shogo Ozaki, Masateru Harao, Kouichi Hirata

:
Performance Analysis for Construction of a Performance Practice Support System. 415-418
Data and Network Security
- Ismail Ahmad, Hong Tat Ewe

:
A Model for Secure Knowledge Sharing. 421-425 - Eberhard Stickel:

A New Method for Exchanging Secret Keys. 426-430 - Yang Xiang, Wanlei Zhou:

A Defense System against DDoS Attacks by Large-Scale IP Traceback. 431-436 - Xiaoyan Yuan, Pengfei Shi:

Iris Feature Extraction Using 2D Phase Congruency. 437-441 - Gianluigi Me

, Maurizio Adriano Strangio:
EC-PAY: An Efficient and Secure ECC-Based Wireless Local Payment Scheme. 442-447 - Chang N. Zhang, Chunren Lai, Honglan Zhong:

An Efficient Authentication Scheme with Fault Tolerance for Database Systems. 448-453 - Weichi Yu, Dake He, Shixiong Zhu:

Study on NTRU Decryption Failures. 454-459 - Amitabh Saxena, Ben Soh:

Distributed Denial of Service Attacks and Anonymous Group Authentication on the Internet. 460-464 - BoonPing Lim, Md. Safi Uddin:

Statistical-Based SYN-Flooding Detection Using Programmable Network Processor. 465-470 - Satoshi Amamiya, Makoto Amamiya:

Rights Sensitive Information Sharing Space Based on Multi-Agent System. 471-476 - Justie Su-tzu Juan

, Chia-Li Huang:
Efficient Secret Sharing Schemes from Room Square. 477-481 - Md. Nurul Huda, Shigeki Yamada, Eiji Kamioka

:
Privacy Protection in Mobile Agent Based Service Domain. 482-487 - Shinichi Suzuki, Yasushi Shinjo, Toshio Hirotsu, Kozo Itano, Kazuhiko Kato:

Capability-Based Egress Network Access Control for Transferring Access Rights. 488-495 - Oge Marques, Pierre Baillargeon

:
A Multimedia Traffic Classification Scheme for Intrusion Detection Systems. 496-501 - Hao Wang

, Heqing Guo, Manshan Lin, Jianfei Yin:
A Fair Item-Item Exchange Protocol Satisfying Newly Introduced Requirements. 502-507 - Hiroki Hada, Keisuke Tanaka:

Security for Authenticated Key Exchange Based on Non-Malleability. 508-513 - Akihiro Mihara, Keisuke Tanaka:

Universal Designated-Verifier Signature with Aggregation. 514-519 - K. V. R. Ravi, Ramaswamy Palaniappan

:
Recognising Individuals Using Their Brain Patterns. 520-523 - Haibo Yu, Chunzhao Jin, Haiyan Che:

A Description Logic for PKI Trust Domain Modeling. 524-528 - Tianbo Lu, Binxing Fang, Yuzhong Sun, Xueqi Cheng, Li Guo:

Building Scale-Free Overlay Mix Networks with Small-World Properties. 529-534 - Po-Jen Chuang, Tun-Hao Chao, Bo-Yi Li:

A Scalable Grouping Random Key Predistribution Scheme for Large Scale Distributed Sensor Networks. 535-540 - Prasan Kumar Sahoo, Jonathan Jen-Rong Chen, Ping-Tai Sun:

Efficient Security Mechanisms for the Distributed Wireless Sensor Networks. 541-546 - Jin Park, Jeong-Tae Hwang, Young-Chul Kim:

FPGA and ASIC Implementation of ECC Processor for Security on Medical Embedded System. 547-551 - Xuegang Lin, Miaoliang Zhu, Rongsheng Xu:

A Framework for Quantifying Information System Survivability. 552-555 - Yuqing Peng, Gengqian Liu, Tao Lin, Hengshan Geng:

Application of Rough Set Theory in Network Fault Diagnosis. 556-559 - Yong-Sork Her, Kenji Imamoto, Kouichi Sakurai:

Some Remarks on Security of Receipt-Free E-auction. 560-563 - Wu Liu, Jianping Wu, Hai-Xin Duan, Xing Li:

The Authorization Service in Dynamic Trust Domains. 564-567 - Prasit Teekaput, Somphop Chokchaitam:

Secure Embedded Error Detection Arithmetic Coding. 568-571 - Wuu Yang:

Uncovering Attacks on Security Protocols. 572-575 - Wen-Chung Kuo, Ming-Yang Chen:

A Modified (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem. 576-579 - Chun-Hua Chen, Chi-Min Lan, Gwoboa Horng:

Protecting Customer's Privacy in Querying Valuable Information Combined with E-Payment Scheme. 580-583 - Gobindar S. Sandhu, Stevan M. Berber

:
Investigation on Operations of a Secure Communication System Based on the Chaotic Phase Shift Keying Scheme. 584-587
Signal Processing
- Stephen J. Searle:

Implementation of Velocity Filtering for Sequential Architectures. 591-596 - Yih-Chuan Lin, Zni-Kang Huang, Ri-Ting Pong, Chuen-Ching Wang:

A Robust Watermarking Scheme Combined with the FSVQ for Images. 597-602 - Marwa Chendeb

, Mohamad Khalil
, Jacques Duchêne:
New Approach for Detection Using Wavelet Coefficients. 603-607 - Ralf Klamma

, Marc Spaniol
, Matthias Jarke:
"Do You Know a Similar Project I Can Learn From?" Self-Monitoring of Communities of Practice in the Cultural Sciences. 608-613 - Zhang Zhong:

Background Noise Distribution after High-Resolution Processing in Ship-Borne Radar. 614-617 - Jianfeng Weng:

A Nonlinear Detection Scheme for Sinusoid in Additive Unknown Colored Gaussian Noise. 618-621 - Jun Xian, Yong He:

Improved Reconstruction Algorithm from Weighted Sampling Points in Shift-Invariant Signal Spaces. 622-625 - Jusak Jusak

, Zahir M. Hussain
:
Performance of Sinusoidally-Distributed Dithering for Signed-Error Constant Modulus Algorithm. 626-629 - Yuu-Seng Lau, Zahir M. Hussain

:
A New Approach in Chaos Shift Keying for Secure Communication. 630-633 - Shaou-Gang Miaou, Shih-Tse Chen, Fu-Sheng Ke:

Capsule Endoscopy Image Coding Using Wavelet-Based Adaptive Vector Quantization without Codebook Training. 634-637
Telecommunication and Networking
- C. T. Bhunia:

Modified Packet Combining Using Error Forecasting Decoding to Control Error. 641-646 - Wilfred W. K. Lin, Allan K. Y. Wong, Tharam S. Dillon:

A Novel Traffic Independent NNC for Dynamic Buffer Tuning to Shorten the RTT of a TCP Channel. 647-652 - Li Yan, Bin Qiu:

An Intelligent Algorithm for Improving QoS in a Delay-Based End-to-End Congestion Avoidance Scheme. 653-658 - Eric C. K. Poh, Hong Tat Ewe

:
IPv6 Packet Classification Based on Flow Label, Source and Destination Addresses. 659-664 - Sulaiman Syed Mohamed

, Asaad A. Y. Malik Abusin, David Chieng
:
Evaluation of IPv6 and Comparative Study with Different Operating Systems. 665-670 - Thierry Rakotoarivelo, Patrick Sénac, Aruna Seneviratne

, Michel Diaz:
A Structured Peer-to-Peer Method to Discover QoS Enhanced Alternate Paths. 671-676 - Johnson I. Agbinya

, Ha Dang Truong:
A Comparison of Ultra Wideband Signal Functions for Wireless Ad Hoc Networks. 677-682 - Joel Sing, Ben Soh:

A Critical Analysis of Multilayer IP Security Protocol. 683-688 - Joel Sing, Ben Soh:

On the Use of Snoop with Geostationary Satellite Links. 689-694 - Mohammad Mamunur Rashid, Sugang Xu, Yoshiaki Tanaka:

Limited Range Wavelength Converter Sharing in WDM Networks. 695-700 - Yuhuang Ye, Jun Chen:

The Algorithm of Repeat TPC Decoding. 701-703 - Jinpeng Huai, Jun Han:

An Enhanced Exact Procedure for the CMST Problem. 704-709 - Ha Trung Phan, Doan B. Hoang:

FICC-DiffServ: A New QoS Architecture Supporting Resources Discovery, Admission and Congestion Controls. 710-715 - John B. Stav, Hariklia Tsalapatas:

A European Knowledgebase Framework for Deployment of Real Time AV-Communication in Distance Teaching. 716-721 - Wing-Fai Poon, Kwok-Tung Lo, Jian Feng:

Performance Study for Streaming Layered Encoded Videos in Broadcast Environment. 722-727 - Kai Juan Wong, D. K. Arvind:

Specknets: New Challenges for Wireless Communication Protocols. 728-733 - Wei-Chang Yeh:

A New Sum-of-Disjoint-Products Technique to Determine Network Reliabilities with Known Minimal Paths. 734-738 - P. Koszek, Kumbesan Sandrasegaran

:
Grid Architecture Storage - Utilising Grid Computing for Dynamic Data Storage. 739-742 - Wenbo Zhang, Hai Zhao, Xiaoying Wang, Zhenyu Yin, Ming Zhao:

An Efficient EWS for Non-PC Device. 743-746 - Li Wang, Zeng-zhi Li, Yanping Chen:

A Control Theoretic Analysis of Mixed TCP and UDP Traffic under RED Based on Nonlinear Dynamic Model. 747-750 - Koji Hashimoto, Yoshitaka Shibata:

Extendable Media Stream Mechanisms for Heterogeneous Communication Environments. 751-754 - Kenji Ohira

, Youichi Koyama, Kenji Fujikawa, Yasuo Okabe:
Automatic Address Assignment for IPv6 End-to-End Multihoming Sites. 755-758 - Wu Liu, Hai-Xin Duan, Jianping Wu, Xing Li:

Improved Marking Model ERPPM Tracing Back to DDoS Attacker. 759-762
Internet and WWW
- I-Ping Hsieh, Shang-Juh Kao:

Managing the Co-Existing Network of IPv6 and IPv4 under Various Transition Mechanisms. 765-771 - Augustin Yu, Robert Steele:

An Overview of Research on Reverse Engineering XML Schemas into UML Diagrams. 772-777 - Juan Dai, Robert Steele:

UDDI Access Control. 778-783 - Hamid Jahankhani, Justus I. Ekeigwe:

Adaptation of the Balanced Scorecard Model to the IT Functions. 784-787

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














