default search action
3. ICITA 2005: Sydney, Australia
- Third International Conference on Information Technology and Applications (ICITA 2005), 4-7 July 2005, Sydney, Australia. IEEE Computer Society 2005, ISBN 0-7695-2316-1
Volume 2
Advanced Robotics
- George K. Adam, Edward Grant, Gordon K. Lee:
"RoboPress" - An Automated Mobile Press for Manufacturing Concrete Products. 3-8 - Dong Hun Kim, Hyun-Woo Lee, Seiichi Shin, Tomoharu Suzuki:
Local Path Planning Based on New Repulsive Potential Functions with Angle Distributions. 9-14 - Chunying Zhao, Jingtai Liu, Yujuan Li, Tao Chen, Lei Sun:
Virtual Repulsive Force in Competitive Multi-Robot Teleoperation. 15-20 - Salman Yussof, Adzly Anuar, Karina Fernandez:
Algorithm for Robot Writing Using Character Segmentation. 21-24 - Gengqian Liu, Tiejun Li, Yuqing Peng, Xiangdan Hou:
The Ant Algorithm for Solving Robot Path Planning Problem. 25-27 - Wenming Cao, Shoujue Wang:
Application of Two Synaptic Weight Neural Networks for Nonlinear Control. 28-31
Distributed and Parallel Computing
- Richard S. L. Wu, Allan K. Y. Wong, Tharam S. Dillon:
Using Real-Time Traffic Pattern Detection for Dynamic Cache Size Tuning in Information Retrieval. 35-40 - Yinzhang Guo, Guoyou Zhang, Lipin Xie, Yubin Xu:
The Research and Design of Business Component Reuse in Enterprise Information System Integration. 41-44 - Haifeng Shen, Suiping Zhou, Chengzheng Sun:
Flexible Concurrency Control for Collaborative Office Systems. 45-50 - Shigeharu Matsusaka, Koji Inoue:
A Cost Effective Spacial Redundancy with Data-Path Partitioning. 51-56 - Arnon Rungsawang, Bundit Manaskasemsak:
Partition-Based Parallel PageRank Algorithm. 57-62 - Yanni Wu, Kuo Zhang, Xiaoge Wang, Jinlan Tian:
Extending Metadata with Scenarios in Adaptive Distributed System. 63-68 - Yong Feng, Yan-yuan Zhang:
Virtual Disk Reconfiguration with Performance Guarantees in Shared Storage Environment. 69-74 - Liang-Teh Lee, Chia-Ying Tseng, Kang-Yuan Liu, Kuan-Ching Li:
A Wallet-Size Cluster for H.264 Encoding. 75-80 - Yong Feng, Yan-yuan Zhang:
E-DM: A QoS-Enabled Storage Service Schedule System in Shared Storage Environment. 81-84 - Takashi Yamanoue:
Sharing the Same Operation with a Large Number of Users Using P2P. 85-88 - Wenjian Liu, Gaoliang Peng:
An Internet-Enabled Setup Planning System. 89-92 - Rui-yong Jia, Yan-yuan Zhang, Yong Feng:
GCSLight: A Light-Weight Group Communication Service for Metadata Server Cluster. 93-96 - Yanping Chen, Zeng-zhi Li, Li Wang, Huaizhou Yang:
Service-Cloud Model of Composed Web Services. 97-100 - Yiqiang Zheng, Heqing Guo, Wei Gao, Botong Xu:
Research on Load Balance of Multi Clusters Architecture Based on Business Components Partition. 101-104
IT in Education and Health
- J. Chen, Mark Lanthier, Melissa Macpherson, Doron Nussbaum:
Computing Tumour Coverage as a Result of Respiratory Motion during Radiotherapy Treatment. 107-112 - Carolyn McGregor, Bruce Kneale, Mark B. Tracy:
Bush Babies Broadband: On-Demand Virtual Neonatal Intensive Care Unit Support for Regional Australia. 113-118 - Jim Harkin, Michael J. Callaghan, T. Martin McGinnity, Liam P. Maguire:
Intelligent User-Support in Learning Environments for Remote Experimentation. 119-124 - Michael J. Callaghan, Jim Harkin, Mehdi El-Gueddari, T. Martin McGinnity, Liam P. Maguire:
Client-Server Architecture for Collaborative Remote Experimentation. 125-129 - Nicholas L. Carroll, Rafael A. Calvo:
Certified Assessment Artifacts for ePortfolios. 130-135 - Satoshi Ichimura, Yutaka Matsushita:
Lightweight Desktop-Sharing System for Web Browsers. 136-141 - Ruth S. Raitman, Naomi Augar, Wanlei Zhou:
Employing Wikis for Online Collaboration in the E-Learning Environment: Case Study. 142-146 - Kirsten Ellis:
Tools for Inclusive Play: Developing "Auslan for Kinder". 147-152 - Norihiro Fujii, Nobuhiko Koike:
A New Remote Laboratory for Hardware Experiment with Shared Resources and Service Management. 153-158 - Vladlena Benson, Lara A. Frumkin, Alan Murphy:
Designing Multimedia for Differences: e-Lecturer, e-Tutor, and e-Student Perspectives. 159-164 - Holger Kunz, Thorsten Schaaf, Jürgen Braun, Thomas Tolxdorff:
Framework for an IT-Supported Balanced Scorecard in Health Care. 165-168 - S. M. F. D. Syed Mustapha, Norisma Idris, Rukaini Abdullah:
Embedding Information Retrieval and Nearest-Neighbour Algorithm into Automated Essay Grading System. 169-172 - Kazunori Hino, Kazuo Terashima, Teruyuki Bunno, Takashi Yamanoue, Nobuyuki Hino:
Evaluation of Students' Performance in Online Seminars via Email with Mobile Phones. 173-176
IT in National Security
- Jian Yuan, Xin-Wen Xu, Chang-Jian Fu, Guo-Hui Li:
Classify of Underwater Target Utilizing Audio Fingerprint. 179-184 - Minh Nhut Nguyen, Daming Shi, Chai Quek:
Self-Organizing Gaussian Fuzzy CMAC with Truth Value Restriction. 185-190 - Brajesh Pande, Deepak Gupta, Dheeraj Sanghi, Sanjay Kumar Jain:
The Network Monitoring Tool - PickPacket. 191-196 - Zenon Chaczko, Sourendra Nath Sinha:
SAFE Model Approach to Construction of Intelligent Security Systems. 197-202 - Zenon Chaczko, Fady Ahmad:
Wireless Sensor Network Based System for Fire Endangered Areas. 203-207 - Johnson I. Agbinya:
QoS Functions and Theorems for Moving Wireless Networks. 208-213 - John C. McEachen, John Zachary:
Real-Time Representation of Network Traffic Behavior for Enhanced Security. 214-219 - Frédéric Andrès, Motomu Naito:
Dynamic Topic Mapping Using Latent Semantic Indexing. 220-225 - Lei Niu, Lin Ni, Wei Lu, Yuan Miao:
A Method of Remote Sensing Image Retrieval Based on ROI. 226-229 - Leanne Ngo, Wanlei Zhou:
The Multifaceted and Ever-Changing Directions of Information Security - Australia Get Ready! 230-233 - Qing Lu, Yongquan Yu:
The Research of Data Mining Based on Extension Sets. 234-237 - Chuen-Ching Wang, Yih-Chuan Lin, Shu-Chung Yi:
Satellite Interference Detection Using Real-Time Watermarking Technique for SMS. 238-241 - Norlaila Hussain, Oscar de Bruijn, Zainuddin Hassan:
Experimental Findings on Collaborative Interactions in a Co-Located Environment. 242-245
Mobile Computing and Communications
- Hu Liu, Yu hong Duan, Guang qing Xi, Li yun Luo:
A Novel OFDM Synchronization Algorithm. 249-254 - Yanping Lu, Weiling Wu:
Performance Analysis of Multiple Packets Combining Decoding in HARQ. 255-258 - Jin Kwan Kim, Sang-Woo Kim, Kee-Hoo Yoon, Heung-Gyoon Ryu:
Design of Binary Multi-code CDMA System with Constant Amplitude. 259-264 - Peter Hutterer, Mark T. Smith, John Ankcorn, Wayne Piekarski, Bruce H. Thomas:
A Lightweight UI Software Infrastructure for Wrist-Based Displays: If Your Microwave Oven Could Talk to Your Watch, What Would It Say? 265-270 - Chiung-Ying Wang, Chi-Jen Wu, Guan-Nan Chen, Ren-Hung Hwang:
p-MANET: Efficient Power Saving Protocol for Multi-Hop Mobile Ad Hoc Networks. 271-276 - Jeich Mar, Shang Weng Wang:
The MTCR Scheme for the Integrated Multiple Rate Mobile Data Networks. 277-282 - Hong-Yi Chang, Chang Wu Yu:
Constructing Long-Lived Scatternets in Bluetooth Networks. 283-288 - Jim Mee Ng, Yan Zhang:
A Mobility Model with Group Partitioning for Wireless Ad Hoc Networks. 289-294 - Kyungsoo Jeong, S. H. Kim, K. M. Chung, J. C. Kim, J. H. Yu, J. S. Lee, S. H. Seo:
Multipath Channel Models for Wireless Local and Metropolitan Area Networks. 295-298 - Kevin H. Lin, Seedahmed S. Mahmoud, Zahir M. Hussain:
Adaptive Modulation with Space-Time Block Coding for MIMO-OFDM Systems. 299-304 - Ying-Hong Wang, Jenhui Chen, Chih-Feng Chao, Chien-Min Lee:
A Transparent Cache-Based Mechanism for Mobile Ad Hoc Networks. 305-310 - Jibin Wang, Jinkang Zhu:
A Novel Time and Frequency Synchronization Approach for OFDM Systems. 311-315 - Robert P. Biuk-Aghai:
Performance Tuning in the MacauMap Mobile Map Application. 316-321 - Hao Jiang:
Using the LAS Space-Time Spreading Codes to Achieve High Spectral Efficiency. 322-325 - Yingshan Li, Ju-Hyun Kyung, Jong-Won Son, Heung-Gyoon Ryu:
PAPR Reduction in MC/DS CDMA System by DFT Spreading Codes. 326-329 - Sang-Woo Kim, Hun-Hee Lee, Chan-Ho Park, Rag Gyu Jung, Heung-Gyoon Ryu:
A PAPR Reduction Method Using the Correlation of Information in OFDM Communication System. 330-333 - Gennadi Oumanski, Peter Bertók:
Wide Area Service Discovery and Adaptation for Mobile Clients in Networks with Ad Hoc Behaviour. 334-337 - Peng Liang, Chuan-gang Zhao, Weiling Wu:
Over-Saturated Wavelet Packet Multiple Access Communication and Its Multi-User Detection. 338-341 - Kwok-Wa Lam, C. S. Wong, William Leung:
Using Look-Ahead Protocol for Mobile Data Broadcast. 342-345 - Teruaki Kitasuka, Kenji Hisazumi, Tsuneo Nakanishi, Akira Fukuda:
WiPS: Location and Motion Sensing Technique of IEEE 802.11 Devices. 346-349 - Benjamin A. Liew, Stevan M. Berber, Gobindar S. Sandhu:
Performance of a Multiple Access Orthogonal Wavelet Division Multiplexing System. 350-353
Multimedia
- Bing Zhou, Shou-zhi Wei:
Use Symmetrical Color-Spatial Feature for Image Comparison. 357-360 - Yonggang Fu, Ruimin Shen, Liping Shen:
Robust Image Watermarking Scheme Based on Subsampling. 361-365 - Changseok Bae, Yuk Ying Chung, Xiaoming Chen, Pinghao Wang:
Error Detection and Copyrights Protection Scheme for MPEG-2 Based on Channel Coded Watermark Signal. 366-370 - Hideaki Ito, Teruo Fukumura:
Utilizing Disks for the Available Link Bandwidth Video Delivery Method. 371-376 - Richard Y. D. Xu, Jesse S. Jin, John G. Allen:
Stream-Based Interactive Video Language Authoring Using Correlated Audiovisual Watermarking. 377-380 - Tasso Athanasiadis, Kevin H. Lin, Zahir M. Hussain:
Space-Time OFDM with Adaptive Beamforming for Wireless Multimedia Applications. 381-386 - Chen-Lung Chan, Shih-Yu Huang, Nien-Chen Lin, Jia-Shung Wang:
Performance Analysis of Caching Strategies for Proxy-Assisted VOD Services. 387-392 - Naveen K. Chilamkurti, Ben Soh:
Multimedia Multicast Using SPLIT and Layered FEC. 393-396 - Sanxing Cao, Xianglin Huang, Rui Lu, Zhanxin Yang:
Fuzzy-Based Mass Media Content Management Platform: Architecture and Application Model. 397-400 - Yung-Gi Wu, Je-Hung Liu:
Image Indexing in DCT Domain. 401-406 - Ghim Hwee Ong, Jun-Ping Ng:
Dynamic Markov Compression Using a Crossbar-Like Tree Initial Structure for Chinese Texts. 407-410 - Hung-Yi Lin, Po-Whei Huang:
Perfect KDB-Tree: A Compact KDB-Tree Structure for Indexing Multidimensional Data. 411-414 - Shogo Ozaki, Masateru Harao, Kouichi Hirata:
Performance Analysis for Construction of a Performance Practice Support System. 415-418
Data and Network Security
- Ismail Ahmad, Hong Tat Ewe:
A Model for Secure Knowledge Sharing. 421-425 - Eberhard Stickel:
A New Method for Exchanging Secret Keys. 426-430 - Yang Xiang, Wanlei Zhou:
A Defense System against DDoS Attacks by Large-Scale IP Traceback. 431-436 - Xiaoyan Yuan, Pengfei Shi:
Iris Feature Extraction Using 2D Phase Congruency. 437-441 - Gianluigi Me, Maurizio Adriano Strangio:
EC-PAY: An Efficient and Secure ECC-Based Wireless Local Payment Scheme. 442-447 - Chang N. Zhang, Chunren Lai, Honglan Zhong:
An Efficient Authentication Scheme with Fault Tolerance for Database Systems. 448-453 - Weichi Yu, Dake He, Shixiong Zhu:
Study on NTRU Decryption Failures. 454-459 - Amitabh Saxena, Ben Soh:
Distributed Denial of Service Attacks and Anonymous Group Authentication on the Internet. 460-464 - BoonPing Lim, Md. Safi Uddin:
Statistical-Based SYN-Flooding Detection Using Programmable Network Processor. 465-470 - Satoshi Amamiya, Makoto Amamiya:
Rights Sensitive Information Sharing Space Based on Multi-Agent System. 471-476 - Justie Su-tzu Juan, Chia-Li Huang:
Efficient Secret Sharing Schemes from Room Square. 477-481 - Md. Nurul Huda, Shigeki Yamada, Eiji Kamioka:
Privacy Protection in Mobile Agent Based Service Domain. 482-487 - Shinichi Suzuki, Yasushi Shinjo, Toshio Hirotsu, Kozo Itano, Kazuhiko Kato:
Capability-Based Egress Network Access Control for Transferring Access Rights. 488-495 - Oge Marques, Pierre Baillargeon:
A Multimedia Traffic Classification Scheme for Intrusion Detection Systems. 496-501 - Hao Wang, Heqing Guo, Manshan Lin, Jianfei Yin:
A Fair Item-Item Exchange Protocol Satisfying Newly Introduced Requirements. 502-507 - Hiroki Hada, Keisuke Tanaka:
Security for Authenticated Key Exchange Based on Non-Malleability. 508-513 - Akihiro Mihara, Keisuke Tanaka:
Universal Designated-Verifier Signature with Aggregation. 514-519 - K. V. R. Ravi, Ramaswamy Palaniappan:
Recognising Individuals Using Their Brain Patterns. 520-523 - Haibo Yu, Chunzhao Jin, Haiyan Che:
A Description Logic for PKI Trust Domain Modeling. 524-528 - Tianbo Lu, Binxing Fang, Yuzhong Sun, Xueqi Cheng, Li Guo:
Building Scale-Free Overlay Mix Networks with Small-World Properties. 529-534 - Po-Jen Chuang, Tun-Hao Chao, Bo-Yi Li:
A Scalable Grouping Random Key Predistribution Scheme for Large Scale Distributed Sensor Networks. 535-540 - Prasan Kumar Sahoo, Jonathan Jen-Rong Chen, Ping-Tai Sun:
Efficient Security Mechanisms for the Distributed Wireless Sensor Networks. 541-546 - Jin Park, Jeong-Tae Hwang, Young-Chul Kim:
FPGA and ASIC Implementation of ECC Processor for Security on Medical Embedded System. 547-551 - Xuegang Lin, Miaoliang Zhu, Rongsheng Xu:
A Framework for Quantifying Information System Survivability. 552-555 - Yuqing Peng, Gengqian Liu, Tao Lin, Hengshan Geng:
Application of Rough Set Theory in Network Fault Diagnosis. 556-559 - Yong-Sork Her, Kenji Imamoto, Kouichi Sakurai:
Some Remarks on Security of Receipt-Free E-auction. 560-563 - Wu Liu, Jianping Wu, Hai-Xin Duan, Xing Li:
The Authorization Service in Dynamic Trust Domains. 564-567 - Prasit Teekaput, Somphop Chokchaitam:
Secure Embedded Error Detection Arithmetic Coding. 568-571 - Wuu Yang:
Uncovering Attacks on Security Protocols. 572-575 - Wen-Chung Kuo, Ming-Yang Chen:
A Modified (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem. 576-579 - Chun-Hua Chen, Chi-Min Lan, Gwoboa Horng:
Protecting Customer's Privacy in Querying Valuable Information Combined with E-Payment Scheme. 580-583 - Gobindar S. Sandhu, Stevan M. Berber:
Investigation on Operations of a Secure Communication System Based on the Chaotic Phase Shift Keying Scheme. 584-587
Signal Processing
- Stephen J. Searle:
Implementation of Velocity Filtering for Sequential Architectures. 591-596 - Yih-Chuan Lin, Zni-Kang Huang, Ri-Ting Pong, Chuen-Ching Wang:
A Robust Watermarking Scheme Combined with the FSVQ for Images. 597-602 - Marwa Chendeb, Mohamad Khalil, Jacques Duchêne:
New Approach for Detection Using Wavelet Coefficients. 603-607 - Ralf Klamma, Marc Spaniol, Matthias Jarke:
"Do You Know a Similar Project I Can Learn From?" Self-Monitoring of Communities of Practice in the Cultural Sciences. 608-613 - Zhang Zhong:
Background Noise Distribution after High-Resolution Processing in Ship-Borne Radar. 614-617 - Jianfeng Weng:
A Nonlinear Detection Scheme for Sinusoid in Additive Unknown Colored Gaussian Noise. 618-621 - Jun Xian, Yong He:
Improved Reconstruction Algorithm from Weighted Sampling Points in Shift-Invariant Signal Spaces. 622-625 - Jusak Jusak, Zahir M. Hussain:
Performance of Sinusoidally-Distributed Dithering for Signed-Error Constant Modulus Algorithm. 626-629 - Yuu-Seng Lau, Zahir M. Hussain:
A New Approach in Chaos Shift Keying for Secure Communication. 630-633 - Shaou-Gang Miaou, Shih-Tse Chen, Fu-Sheng Ke:
Capsule Endoscopy Image Coding Using Wavelet-Based Adaptive Vector Quantization without Codebook Training. 634-637
Telecommunication and Networking
- C. T. Bhunia:
Modified Packet Combining Using Error Forecasting Decoding to Control Error. 641-646 - Wilfred W. K. Lin, Allan K. Y. Wong, Tharam S. Dillon:
A Novel Traffic Independent NNC for Dynamic Buffer Tuning to Shorten the RTT of a TCP Channel. 647-652 - Li Yan, Bin Qiu:
An Intelligent Algorithm for Improving QoS in a Delay-Based End-to-End Congestion Avoidance Scheme. 653-658 - Eric C. K. Poh, Hong Tat Ewe:
IPv6 Packet Classification Based on Flow Label, Source and Destination Addresses. 659-664 - Sulaiman Syed Mohamed, Asaad A. Y. Malik Abusin, David Chieng:
Evaluation of IPv6 and Comparative Study with Different Operating Systems. 665-670 - Thierry Rakotoarivelo, Patrick Sénac, Aruna Seneviratne, Michel Diaz:
A Structured Peer-to-Peer Method to Discover QoS Enhanced Alternate Paths. 671-676 - Johnson I. Agbinya, Ha Dang Truong:
A Comparison of Ultra Wideband Signal Functions for Wireless Ad Hoc Networks. 677-682 - Joel Sing, Ben Soh:
A Critical Analysis of Multilayer IP Security Protocol. 683-688 - Joel Sing, Ben Soh:
On the Use of Snoop with Geostationary Satellite Links. 689-694 - Mohammad Mamunur Rashid, Sugang Xu, Yoshiaki Tanaka:
Limited Range Wavelength Converter Sharing in WDM Networks. 695-700 - Yuhuang Ye, Jun Chen:
The Algorithm of Repeat TPC Decoding. 701-703 - Jinpeng Huai, Jun Han:
An Enhanced Exact Procedure for the CMST Problem. 704-709 - Ha Trung Phan, Doan B. Hoang:
FICC-DiffServ: A New QoS Architecture Supporting Resources Discovery, Admission and Congestion Controls. 710-715 - John B. Stav, Hariklia Tsalapatas:
A European Knowledgebase Framework for Deployment of Real Time AV-Communication in Distance Teaching. 716-721 - Wing-Fai Poon, Kwok-Tung Lo, Jian Feng:
Performance Study for Streaming Layered Encoded Videos in Broadcast Environment. 722-727 - Kai Juan Wong, D. K. Arvind:
Specknets: New Challenges for Wireless Communication Protocols. 728-733 - Wei-Chang Yeh:
A New Sum-of-Disjoint-Products Technique to Determine Network Reliabilities with Known Minimal Paths. 734-738 - P. Koszek, Kumbesan Sandrasegaran:
Grid Architecture Storage - Utilising Grid Computing for Dynamic Data Storage. 739-742 - Wenbo Zhang, Hai Zhao, Xiaoying Wang, Zhenyu Yin, Ming Zhao:
An Efficient EWS for Non-PC Device. 743-746 - Li Wang, Zeng-zhi Li, Yanping Chen:
A Control Theoretic Analysis of Mixed TCP and UDP Traffic under RED Based on Nonlinear Dynamic Model. 747-750 - Koji Hashimoto, Yoshitaka Shibata:
Extendable Media Stream Mechanisms for Heterogeneous Communication Environments. 751-754 - Kenji Ohira, Youichi Koyama, Kenji Fujikawa, Yasuo Okabe:
Automatic Address Assignment for IPv6 End-to-End Multihoming Sites. 755-758 - Wu Liu, Hai-Xin Duan, Jianping Wu, Xing Li:
Improved Marking Model ERPPM Tracing Back to DDoS Attacker. 759-762
Internet and WWW
- I-Ping Hsieh, Shang-Juh Kao:
Managing the Co-Existing Network of IPv6 and IPv4 under Various Transition Mechanisms. 765-771 - Augustin Yu, Robert Steele:
An Overview of Research on Reverse Engineering XML Schemas into UML Diagrams. 772-777 - Juan Dai, Robert Steele:
UDDI Access Control. 778-783 - Hamid Jahankhani, Justus I. Ekeigwe:
Adaptation of the Balanced Scorecard Model to the IT Functions. 784-787
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.