default search action
1st ISICT 2003: Dublin, Ireland
- Proceedings of the 1st Intenational Symposium on Information and Communication Technologies, Dublin, Ireland, September 24-26, 2003. ACM International Conference Proceeding Series 49, Trinity College Dublin 2003
Signal processing
- Jinkeun Hong, Sunchun Park, Janghong Yoon, Jae-Young Koh, Daeho Kim:
Design of random noise generator using SW algorithm. 9-14 - Neil Dunstan, Stephen Hodgson:
A processor array for computing wavelet energies. 15-20 - Abdellah Kacha, Francis Grenez, Philippe De Doncker, Khier Benmahammed:
A wavelet-based approach for frequency estimation of interference signals in printed circuit boards. 21-26
Computer science in health and education
- John Fulcher:
The use of smart devices in eHealth. 27-32 - Pedro Gómez, Victor Nieto Lluis, Rafael Martínez, Agustín Álvarez Marquina, Francisco Jorge Rodríguez Dapena, Victoria Rodellar:
Detection of the mucosal wave in the speech signal for larynx pathology characterization. 33-39 - John Fulcher, Russell Gluck, Marion Worthy, Kim Draisma, Wilma Vialle:
A neural network, speech-based approach to literacy. 40-45 - Blaise W. Liffick:
Assistive technology in computer science. 46-51 - Cestmír Stuka, Daniel Smutek:
Correlation of the entrance examination result and the study success at the Medical Faculty, Charles University Prague. 52-57 - Martina Berankova, Petra Nevrivova:
Problems in operational and systems analysis educational process: solved by ICT application. 58-63
Machine learning and applications
- Ganka Petkova Kovacheva, Hidemitsu Ogawa:
Radial basis function classifier for fault diagnostics. 64-69 - David Edelman:
Adapting support vector machine methods for horserace odds prediction. 70-75 - Giuseppe Ascia, Vincenzo Catania, Maurizio Palesi, Antonio Parlato:
An evolutionary approach for reducing the energy in address buses. 76-81
Image processing
- Josef Scharinger:
Detecting watermarks at arbitrary image resolution. 82-87 - Othman O. Khalifa:
Image data compression in wavelet transform domain using modified LBG algorithm. 88-93 - Sang-Su Lee, Jong Wook Han, Hyo-wook Bae:
The encryption method to share a secret binary image and its decryption system. 94-99 - Daniel Smutek, Radim Sára, Petr Sucharda, Ludvík Tesar:
Different types of image texture features in ultrasound of patients with lymphocytic thyroiditis. 100-102
Data mining and database technology
- Markus Hofmann, Brendan Tierney:
The involvement of human resources in large scale data mining projects. 103-109 - Abdualrraouf A. Elbibas, Mick J. Ridley:
Using metadata for developing automated Web system interface. 113-118 - B. John Oommen, Jing Chen:
A new histogram method for sparse attributes: the averaged rectangular attribute cardinality map. 119-125
Communication technology I - coding and wireless
- Vahid Tabataba Vakili, Arash Aziminejad, Mohammad Reza Dehbozorgi:
A novel speed-sensitive bidirectional overflow and hand-down resource allocation strategy for hierarchical cellular networks. 126-131 - Sakari Junnila, Jarkko Niittylahti:
Wireless technologies for data acquisition systems. 132-137 - Yun Gong, Tadas Marcinkevicius:
Video transmission over a GSM wireless network. 138-143 - Xuerong Yong:
Analyzing the codes that avoid specified differences by binary tree. 144-149 - Klaus Knoche, Jürgen Rinas, Karl-Dirk Kammeyer:
MAI-suppression with fractional T-equalizer for CDMA. 150-155
Invited workshop on adaptive systems for ubiquitous computing
- David Lewis, Declan O'Sullivan:
Adaptive systems for ubiquitous computing. 156 - Robert O'Connor, Sven van der Meer:
Present and future organisational models for wireless networks. 157-162 - Simon Dobson:
Applications considered harmful for ambient systems. 163-168 - Steffen Higel, Tony O'Donnell, Vincent Wade:
Towards a natural interface to adaptive service composition. 169-174 - Stephen Greene, Jason Finnegan:
Usability of mobile devices and intelligently adapting to a user's needs. 175-180 - Ken Murray, Rajiv Mathur, Dirk Pesch:
Intelligent access and mobility management in heterogeneous wireless networks using policy. 181-186 - John Paul O'Grady, Susan Rea, Sinead Cummins, Dirk Pesch, Rajiv Mathur:
Dynamic configuration management for MANETs: an overview. 187-192 - Paddy Nixon, Feng Wang, Sotirios Terzis:
Programming structures for adaptive ambient systems. 193-198 - Ruaidhri Power:
Topic maps for context management. 199-204 - Owen Conlan, Ruaidhri Power, Steffen Higel, Declan O'Sullivan, Keara Barrett:
Next generation context aware adaptive services. 205-212
Pervasive computing and virtual reality
- Sven Buchholz, Thomas Buchholz:
Adaptive content networking. 213-219 - Hannah Slay, Bruce H. Thomas, Rudi Vernik:
An interaction model for universal interaction and control in multi display environments. 220-225 - Bruce H. Thomas, Wayne Piekarski:
Outdoor virtual reality. 226-231 - James Auger, Jimmy Loizeau, Stefan Agamanolis:
Iso-phone: a total submersion telephonic experience. 232-236 - J. Shi, I. A. Oraifige, F. R. Hall:
Adding haptic feedback to engineering simulation. 237-241 - Francis Rousseaux, Alain Bonardi:
New tools and practices for electronic music distribution. 242-248
Electronic document technology
- Nobutaka Suzuki, Yorichiro Sato, Michiyoshi Hayase:
On merging structured documents with move operation. 249-254 - Henryk Krawczyk, Bogdan Wiszniewski:
Digital document life cycle development. 255-260 - Arnold Neville Pears, Carl Erickson:
Enriching online learning resources with "explanograms". 261-266 - Ruey-Shun Chen, Shien-Chiang Yu:
Developing an XML framework for metadata system. 267-272
Invited workshop on conceptual information retrieval and clustering of documents
- Davide Buscaldi, Giovanna Guerrini, Marco Mesiti, Paolo Rosso:
Tag semantics for the retrieval of XML documents. 273-278 - Daniel Jiménez, Edgardo Ferretti, Vicente Vidal, Paolo Rosso, Carlos F. Enguix:
The influence of semantics in IR using LSI and K-means clustering techniques. 279-284 - Antonio Ferrández Rodríguez, Julio Martínez, Jesús Peral:
An entity-relation approach to information retrieval. 285-290 - Cormac O'Brien, Carl Vogel:
Spam filters: bayes vs. chi-squared; letters vs. words. 291-296 - Sofie Van Gijsel, Carl Vogel:
Inducing a cline from corpora of political manifestos. 297-303 - Gabriel Castillo, Gerardo Sierra, John McNaught:
An improved algorithm for semantic clustering. 304-309 - Martin Holub:
A new approach to conceptual document indexing: building a hierarchical system of concepts based on document clusters. 310-315 - Marco Mesiti, Elisa Bertino, Giovanna Guerrini:
An abstraction-based approach to measuring the structural similarity between two unordered XML documents. 316-321
Invited workshop on network security and management
- Tom Coffey, Reiner Dojen:
Analysis of a mobile communication security protocol. 322-328 - Tom Coffey, Reiner Dojen, Tomas Flanagan:
On the automated implementation of modal logics used to verify security protocols. 329-334 - Thomas Newe, Tom Coffey:
Security protocols for 2G and 3G wireless communications. 335-340
Security technology and applications
- Nol Premasathian, Somying Thainimit:
Structure free highway toll collection using non-repudiated tickets. 341-344 - Jae-Deok Lim, Joon-Suk Yu, Jeong-Nyeo Kim:
A study of the method of providing secure network channel among secure OSs. 345-350 - Tom Coffey, Puneet Saidha, Peter Burrows:
Analysing the security of a non-repudiation communication protocol with mandatory proof of receipt. 351-356 - Neville I. Williams:
E-business security issues for SMEs in a virtual hosting environment. 357-364 - Gustavo A. Santana Torrellas, Luis A. Villa Vargas:
Modelling a flexible network security systems using multi-agents systems: security assessment considerations. 365-371
Modelling and control
- Lyudmila Mihaylova, René K. Boel:
Hybrid stochastic framework for freeway traffic flow modelling. 372-377 - Theodore S. Stamoulakatos, Efstathios D. Sykas:
Signal pattern recognition, hidden markov modeling and traffic flow modeling filters applied in existing signaling of cellular networks for vehicle volume estimation. 378-384 - Pauline Sourdille, Aidan O'Dwyer:
A new modified Smith predictor design. 385-390 - Brita H. Hafskjold:
Anti-run-dry algorithm for optimal control of playoutbuffers. 391-398
Invited workshop on digital interaction
- Claudia Roda, Julie Thomas:
Digital interaction: introduction to the first international workshop. 399-402 - Jacqueline Brodie, James Evans, Laurence D. Brooks, Mark J. Perry:
Supporting human interaction through digital technology: theory and practice. 403-408 - Eva Jacobus, Brian R. Duffy:
The language of machines. 409-414 - Geert de Haan:
The design of I-mass as a tool for interacting with cultural heritage. 415-420 - Päivö Laine, Lic. Phil:
Explicitness and interactivity. 421-426 - Duska Rosenberg, Simon Foley, Stavros Kammas, Mirja Lievonen:
Interaction space theory: a framework for tool development. 427-432
Human computer interaction
- Bryan Duggan, Mark Deegan:
Considerations in the usage of text to speech (TTS) in the creation of natural sounding voice enabled web systems. 433-438 - G. Somers, R. N. Whyte:
Hand posture matching for Irish Sign language interpretation. 439-444 - Derek P. Brock, James A. Ballas, Brian McClimens:
Perceptual issues for the use of 3D auditory displays in operational environments. 445-448
Software tools and programming languages
- Daniel C. M. May, Bent Bruun Kristensen, Palle Nowack:
Supporting complexity through (informational and physical) collaboration and modeling. 449-455 - Kumpon Farpinyo, Twittie Senivongse:
Designing and creating relational schemas with a CWM-based tool. 456-461 - Josef Pavlícek, Vojtech Merunka, Petra Nevrivova:
The development of the information systems. 462-467 - Anthony Sartini, John Waldron:
Dynamic profiling & comparison of Sun Microsystems' JDK1.3.1 versus the Kaffe VM APIs. 468-474
WWW applications
- Marko Niinimäki, Miika Tuisku, Matti Heikkurinen:
Designing for flexibility: separating user interface design from program logic and data. 475-480 - Chen Li, Claus Pahl:
Security in the Web Services Framework. 481-486 - Marian Ventuneac, Tom Coffey, Ioan Salomie:
A policy-based security framework for Web-enabled applications. 487-492 - Md. Asri Ngadi, Bernard S. Doherty:
Multi-users shared whiteboard under Web-multicast system. 493-498
Invited workshop on middleware interoperability of enterprise applications
- Ralf Gitzel, Markus Aleksy:
MIEA 2003 workshop: message from the editors. 499 - Gilson Wilson, Ullas O. Tharakan:
Unified security framework. 500-505 - Paul Grace, Gordon S. Blair, Sam Samuel:
A marriage of Web services and reflective middleware to solve the problem of mobile client interoperability. 506-511 - Markus Aleksy, Ralf Gitzel:
Relationship between the standard compliance of IDL-compilers and interoperability of CORBA-based applications. 512-517 - Stefan Kuhlins, Axel Korthaus:
A multithreaded Java framework for information extraction in the context of enterprise application integration. 518-523 - Cledson Akio Sakurai, Moacyr Martucci Junior:
An open system architecture for operation support system at telecommunications service providers. 524-529
Distributed systems
- Susumu Yamasaki, Mariko Sasakura:
An automated reasoning for diagnostic knowledge in a distributed environment. 530-535 - George Dimitoglou, Philippe Moore, Shmuel Rotenstreich:
Middleware for large distributed systems and organizations. 536-542 - Marko Niinimäki, Vesa Sivunen:
Applying grid security and virtual organization tools in distributed publication databases. 543-548 - Pavel Motuzenko:
Adaptive domain model: dealing with multiple attributes of self-managing distributed object systems. 549-554
Communication technology II - Internet, services, and architectures
- K. H. Tan, Mashkuri Yaacob, T. C. Ling, Keat Keong Phang:
IPv6 single-path and multi-path anycast routing protocols performance analysis. 555-560 - Pornpong Rompothong, Twittie Senivongse:
A query federation of UDDI registries. 561-566 - Meredith Lulling, John Vaughan:
An investigation of TCP throughput variation for SIP traffic. 567-572 - Istvan Matyasovszki, Colin Flanagan:
Forwarding treatment preservation of differentiated services behaviour aggregate flows across heterogenous network domains by employing the symbiotic packet processing architecture. 573-578 - Miguel A. Sánchez-Puebla, Jesús Carretero:
A new approach for distributed computing in avionics systems. 579-584 - J. Nazean, Jason Chan:
Software algorithms in intelligent employment agent. 585-589 - Siti Hafizah Ab Hamid, Tan Yoke Pei, Nazean Jomhari:
Object oriented analysis and UML design in the development of accommodation services system. 590-595
Invited workshop on object-oriented computing systems
- HISC architecture: an object-oriented computing system. 596
- Mok Pak Lun, Anthony S. Fong, Gary K. W. Hau:
Object-oriented processor requirements with instruction analysis of Java programs. 597-602 - Kaiman Lo, Pak Lun Mok, Wing Shing Yu, Anthony S. Fong:
Hardware support for user-access control on an object-oriented processor. 603-608 - Ryan W. S. Yu, Gary K. W. Hau, Anthony S. Fong:
Test bench for software development of object-oriented processor. 609-614 - Gary K. W. Hau, Anthony S. Fong, Mok Pak Lun:
Support of Java API for the jHISC system. 615-620
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.