Sign in
ICITA (2)
2005
2005
2005
Keyphrases
Publications
2005
Jun Xian
,
Yong He
Improved Reconstruction Algorithm from Weighted Sampling Points in Shift-Invariant Signal Spaces.
ICITA (2)
(2005)
Kevin H. Lin
,
Seedahmed S. Mahmoud
,
Zahir M. Hussain
Adaptive Modulation with Space-Time Block Coding for MIMO-OFDM Systems.
ICITA (2)
(2005)
Augustin Yu
,
Robert Steele
An Overview of Research on Reverse Engineering XML Schemas into UML Diagrams.
ICITA (2)
(2005)
Minh Nhut Nguyen
,
Daming Shi
,
Chai Quek
Self-Organizing Gaussian Fuzzy CMAC with Truth Value Restriction.
ICITA (2)
(2005)
Kenji Ohira
,
Youichi Koyama
,
Kenji Fujikawa
,
Yasuo Okabe
Automatic Address Assignment for IPv6 End-to-End Multihoming Sites.
ICITA (2)
(2005)
Ghim Hwee Ong
,
Jun-Ping Ng
Dynamic Markov Compression Using a Crossbar-Like Tree Initial Structure for Chinese Texts.
ICITA (2)
(2005)
Li Wang
,
Zeng-zhi Li
,
Yanping Chen
A Control Theoretic Analysis of Mixed TCP and UDP Traffic under RED Based on Nonlinear Dynamic Model.
ICITA (2)
(2005)
Lei Niu
,
Lin Ni
,
Wei Lu
,
Yuan Miao
A Method of Remote Sensing Image Retrieval Based on ROI.
ICITA (2)
(2005)
Stephen J. Searle
Implementation of Velocity Filtering for Sequential Architectures.
ICITA (2)
(2005)
Ralf Klamma
,
Marc Spaniol
,
Matthias Jarke
"Do You Know a Similar Project I Can Learn From?" Self-Monitoring of Communities of Practice in the Cultural Sciences.
ICITA (2)
(2005)
Chunying Zhao
,
Jingtai Liu
,
Yujuan Li
,
Tao Chen
,
Lei Sun
Virtual Repulsive Force in Competitive Multi-Robot Teleoperation.
ICITA (2)
(2005)
Yanni Wu
,
Kuo Zhang
,
Xiaoge Wang
,
Jinlan Tian
Extending Metadata with Scenarios in Adaptive Distributed System.
ICITA (2)
(2005)
Gianluigi Me
,
Maurizio Adriano Strangio
EC-PAY: An Efficient and Secure ECC-Based Wireless Local Payment Scheme.
ICITA (2)
(2005)
Norihiro Fujii
,
Nobuhiko Koike
A New Remote Laboratory for Hardware Experiment with Shared Resources and Service Management.
ICITA (2)
(2005)
Hideaki Ito
,
Teruo Fukumura
Utilizing Disks for the Available Link Bandwidth Video Delivery Method.
ICITA (2)
(2005)
Justie Su-tzu Juan
,
Chia-Li Huang
Efficient Secret Sharing Schemes from Room Square.
ICITA (2)
(2005)
Jim Mee Ng
,
Yan Zhang
A Mobility Model with Group Partitioning for Wireless Ad Hoc Networks.
ICITA (2)
(2005)
Jusak Jusak
,
Zahir M. Hussain
Performance of Sinusoidally-Distributed Dithering for Signed-Error Constant Modulus Algorithm.
ICITA (2)
(2005)
Satoshi Amamiya
,
Makoto Amamiya
Rights Sensitive Information Sharing Space Based on Multi-Agent System.
ICITA (2)
(2005)
Yingshan Li
,
Ju-Hyun Kyung
,
Jong-Won Son
,
Heung-Gyoon Ryu
PAPR Reduction in MC/DS CDMA System by DFT Spreading Codes.
ICITA (2)
(2005)
Yuu-Seng Lau
,
Zahir M. Hussain
A New Approach in Chaos Shift Keying for Secure Communication.
ICITA (2)
(2005)
Ismail Ahmad
,
Hong Tat Ewe
A Model for Secure Knowledge Sharing.
ICITA (2)
(2005)
Jian Yuan
,
Xin-Wen Xu
,
Chang-Jian Fu
,
Guo-Hui Li
Classify of Underwater Target Utilizing Audio Fingerprint.
ICITA (2)
(2005)
Hamid Jahankhani
,
Justus I. Ekeigwe
Adaptation of the Balanced Scorecard Model to the IT Functions.
ICITA (2)
(2005)
Prasan Kumar Sahoo
,
Jonathan Jen-Rong Chen
,
Ping-Tai Sun
Efficient Security Mechanisms for the Distributed Wireless Sensor Networks.
ICITA (2)
(2005)
Joel Sing
,
Ben Soh
On the Use of Snoop with Geostationary Satellite Links.
ICITA (2)
(2005)
Robert P. Biuk-Aghai
Performance Tuning in the MacauMap Mobile Map Application.
ICITA (2)
(2005)
BoonPing Lim
,
Md. Safi Uddin
Statistical-Based SYN-Flooding Detection Using Programmable Network Processor.
ICITA (2)
(2005)
Yuqing Peng
,
Gengqian Liu
,
Tao Lin
,
Hengshan Geng
Application of Rough Set Theory in Network Fault Diagnosis.
ICITA (2)
(2005)
Takashi Yamanoue
Sharing the Same Operation with a Large Number of Users Using P2P.
ICITA (2)
(2005)
Wenjian Liu
,
Gaoliang Peng
An Internet-Enabled Setup Planning System.
ICITA (2)
(2005)
Wu Liu
,
Jianping Wu
,
Hai-Xin Duan
,
Xing Li
The Authorization Service in Dynamic Trust Domains.
ICITA (2)
(2005)
K. V. R. Ravi
,
Ramaswamy Palaniappan
Recognising Individuals Using Their Brain Patterns.
ICITA (2)
(2005)
Hao Jiang
Using the LAS Space-Time Spreading Codes to Achieve High Spectral Efficiency.
ICITA (2)
(2005)
Wenming Cao
,
Shoujue Wang
Application of Two Synaptic Weight Neural Networks for Nonlinear Control.
ICITA (2)
(2005)
Eric C. K. Poh
,
Hong Tat Ewe
IPv6 Packet Classification Based on Flow Label, Source and Destination Addresses.
ICITA (2)
(2005)
Ruth S. Raitman
,
Naomi Augar
,
Wanlei Zhou
Employing Wikis for Online Collaboration in the E-Learning Environment: Case Study.
ICITA (2)
(2005)
Frédéric Andrès
,
Motomu Naito
Dynamic Topic Mapping Using Latent Semantic Indexing.
ICITA (2)
(2005)
Yinzhang Guo
,
Guoyou Zhang
,
Lipin Xie
,
Yubin Xu
The Research and Design of Business Component Reuse in Enterprise Information System Integration.
ICITA (2)
(2005)
Gennadi Oumanski
,
Peter Bertók
Wide Area Service Discovery and Adaptation for Mobile Clients in Networks with Ad Hoc Behaviour.
ICITA (2)
(2005)
Tianbo Lu
,
Binxing Fang
,
Yuzhong Sun
,
Xueqi Cheng
,
Li Guo
Building Scale-Free Overlay Mix Networks with Small-World Properties.
ICITA (2)
(2005)
Vladlena Benson
,
Lara A. Frumkin
,
Alan Murphy
Designing Multimedia for Differences: e-Lecturer, e-Tutor, and e-Student Perspectives.
ICITA (2)
(2005)
Oge Marques
,
Pierre Baillargeon
A Multimedia Traffic Classification Scheme for Intrusion Detection Systems.
ICITA (2)
(2005)
Haifeng Shen
,
Suiping Zhou
,
Chengzheng Sun
Flexible Concurrency Control for Collaborative Office Systems.
ICITA (2)
(2005)
Chun-Hua Chen
,
Chi-Min Lan
,
Gwoboa Horng
Protecting Customer's Privacy in Querying Valuable Information Combined with E-Payment Scheme.
ICITA (2)
(2005)
Yanping Chen
,
Zeng-zhi Li
,
Li Wang
,
Huaizhou Yang
Service-Cloud Model of Composed Web Services.
ICITA (2)
(2005)
C. T. Bhunia
Modified Packet Combining Using Error Forecasting Decoding to Control Error.
ICITA (2)
(2005)
Hong-Yi Chang
,
Chang Wu Yu
Constructing Long-Lived Scatternets in Bluetooth Networks.
ICITA (2)
(2005)
Chen-Lung Chan
,
Shih-Yu Huang
,
Nien-Chen Lin
,
Jia-Shung Wang
Performance Analysis of Caching Strategies for Proxy-Assisted VOD Services.
ICITA (2)
(2005)
Sulaiman Syed Mohamed
,
Asaad A. Y. Malik Abusin
,
David Chieng
Evaluation of IPv6 and Comparative Study with Different Operating Systems.
ICITA (2)
(2005)