Default Cover Image

Information Technology: Coding and Computing, International Conference on

Apr. 5 2004 to Apr. 7 2004

Las Vegas, Nevada

ISBN: 0-7695-2108-8

Volume:

Table of Contents

ReviewersFreely available from IEEE.pp. 0_18-0_19
General Chair's MessageFreely available from IEEE.pp. xvii
ReviewersFreely available from IEEE.pp. xviii
SESSION MA I: Information Assurance and Security I
Jigsaw-based Secure Data Transfer over Computer NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 2
SESSION MA I: Information Assurance and Security I
Semi-Fragile Watermarking Scheme for Authentication of JPEG ImagesFull-text access may be available. Sign in or learn about subscription options.pp. 7
SESSION MA I: Information Assurance and Security I
Mitigating the Untrusted Terminal Problem Using Conditional SignaturesFull-text access may be available. Sign in or learn about subscription options.pp. 12
SESSION MA I: Information Assurance and Security I
Arcanum : A Secure and Efficient Key Exchange Protocol for the InternetFull-text access may be available. Sign in or learn about subscription options.pp. 17
SESSION MA I: Information Assurance and Security I
A Security Protocol for Certified E-Goods DeliveryFull-text access may be available. Sign in or learn about subscription options.pp. 22
SESSION MA II: Information Assurance and Security II
Enhancing Anonymity via Market CompetitionFull-text access may be available. Sign in or learn about subscription options.pp. 30
SESSION MA II: Information Assurance and Security II
A Secure Account-Based Mobile Payment ProtocolFull-text access may be available. Sign in or learn about subscription options.pp. 35
SESSION MA II: Information Assurance and Security II
Accountability Logic for Mobile Payment ProtocolsFull-text access may be available. Sign in or learn about subscription options.pp. 40
SESSION MA II: Information Assurance and Security II
Face Recognition Using Interpolated Bezier Curve Based RepresentationFull-text access may be available. Sign in or learn about subscription options.pp. 45
SESSION MA II: Information Assurance and Security II
Run-time Detection of Buffer Overflow Attacks without Explicit Sensor Data ObjectsFull-text access may be available. Sign in or learn about subscription options.pp. 50
SESSION MA III: Information Assurance and Security III
Achieving Distributed Trusted ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 56
SESSION MA III: Information Assurance and Security III
Performance Evaluation of Data Integrity Mechanisms for Mobile AgentsFull-text access may be available. Sign in or learn about subscription options.pp. 62
SESSION MA III: Information Assurance and Security III
Adaptive Neuro-Fuzzy Intrusion Detection SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 70
SESSION MA III: Information Assurance and Security III
Cryptographic Protocol Analysis using Goal ExtractionFull-text access may be available. Sign in or learn about subscription options.pp. 75
SESSION MA III: Information Assurance and Security III
ProtoMon: Embedded Monitors for Cryptographic Protocol Intrusion Detection and PreventionFull-text access may be available. Sign in or learn about subscription options.pp. 81
SESSION MA IV: Information Assurance and Security IV
Web Server Attack Categorization based on Root Causes and Their LocationsFull-text access may be available. Sign in or learn about subscription options.pp. 90
SESSION MA IV: Information Assurance and Security IV
A Fast Pattern-Match Engine for Network Processor-based Network Intrusion Detection SystemFull-text access may be available. Sign in or learn about subscription options.pp. 97
SESSION MA IV: Information Assurance and Security IV
A Modified Optical Image Reconstruction Model with Information FeedbackFull-text access may be available. Sign in or learn about subscription options.pp. 102
SESSION MA IV: Information Assurance and Security IV
Threshold and Identity-based Key Management and Authentication for Wireless Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 107
SESSION MA IV: Information Assurance and Security IV
An Extensible Framework for Practical Secure Component Composition in a Ubiquitous Computing EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 112
SESSION MA IV: Information Assurance and Security IV
Distributed Knowledge Networks: Towards a New Paradigm for Delivering KnowledgeFull-text access may be available. Sign in or learn about subscription options.pp. 118
SESSION MA IV: Information Assurance and Security IV
Identity-Based Threshold Signature Scheme from the Bilinear PairingsFull-text access may be available. Sign in or learn about subscription options.pp. 124
SESSION MA IV: Information Assurance and Security IV
HORSE: An Extension of an r-Time Signature Scheme With Fast Signing and VerificationFull-text access may be available. Sign in or learn about subscription options.pp. 129
SESSION MB I: IT Education, Curriculum & Assessment I
Recurrent Exercises for Introductory Human Computer Interaction CoursesFull-text access may be available. Sign in or learn about subscription options.pp. 136
SESSION MB I: IT Education, Curriculum & Assessment I
A New Approach to Learning AlgorithmsFull-text access may be available. Sign in or learn about subscription options.pp. 141
SESSION MB I: IT Education, Curriculum & Assessment I
Computer Skills Training to (Middle-aged) Adults: Problems and ProgramFull-text access may be available. Sign in or learn about subscription options.pp. 146
SESSION MB I: IT Education, Curriculum & Assessment I
Dependency Theory E-Learning ToolFull-text access may be available. Sign in or learn about subscription options.pp. 151
SESSION MB I: IT Education, Curriculum & Assessment I
A Web-Service Oriented Framework for building SCORM Compatible Learning Management SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 156
SESSION MB II: IT Education, Curriculum & Assessment II
Games and Animation: Collaborations Between the Arts and Computer ScienceFull-text access may be available. Sign in or learn about subscription options.pp. 164
SESSION MB II: IT Education, Curriculum & Assessment II
Web-based Mathematics Education: MeML Design and ImplementationFull-text access may be available. Sign in or learn about subscription options.pp. 169
SESSION MB II: IT Education, Curriculum & Assessment II
IT Security Project: Implementation of the Advanced Encryption Standard (AES) on a Smart CardFull-text access may be available. Sign in or learn about subscription options.pp. 176
SESSION MB II: IT Education, Curriculum & Assessment II
An Instructor's Environment for Automatic Generation of Problem SequencesFull-text access may be available. Sign in or learn about subscription options.pp. 181
SESSION MB II: IT Education, Curriculum & Assessment II
The Development of a Philosophy for an Applied Web Programming CurriculumFull-text access may be available. Sign in or learn about subscription options.pp. 186
SESSION MB III: IT Education, Curriculum & Assessment III
Assessing Distance Learning Student's Performance: A Natural Language Processing Approach to Analyzing Class Discussion MessagesFull-text access may be available. Sign in or learn about subscription options.pp. 192
SESSION MB III: IT Education, Curriculum & Assessment III
Auxiliar: A Case-Based System to Assist Online CoursesFull-text access may be available. Sign in or learn about subscription options.pp. 197
SESSION MB III: IT Education, Curriculum & Assessment III
Building an Effective Groupware SystemFull-text access may be available. Sign in or learn about subscription options.pp. 202
SESSION MB III: IT Education, Curriculum & Assessment III
A Standard Visual Courseware Authoring Tool Based on Content Packaging SpecificationFull-text access may be available. Sign in or learn about subscription options.pp. 207
SESSION MB III: IT Education, Curriculum & Assessment III
GAME: A Generic Automated Marking Environment for Programming AssessmentFull-text access may be available. Sign in or learn about subscription options.pp. 212
SESSION MB IV: E-Commerce/Education
A Novel Approach for New E-commerce Product Positioning and to-go/not-to go with Rapid Prototyping ExperienceFull-text access may be available. Sign in or learn about subscription options.pp. 218
SESSION MB IV: E-Commerce/Education
Dynamic Identification of Correspondence Assertions for Electronic Commerce Data IntegrationFull-text access may be available. Sign in or learn about subscription options.pp. 223
SESSION MB IV: E-Commerce/Education
A Topology Viewer for Distributed Brokering SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 228
SESSION MB IV: E-Commerce/Education
The Impacts of Professions in Systems DevelopmentFull-text access may be available. Sign in or learn about subscription options.pp. 235
SESSION MB IV: E-Commerce/Education
Automatic Estimation of Stock Market Forecasting and Generating the Corresponding Natural Language ExpressionFull-text access may be available. Sign in or learn about subscription options.pp. 241
SESSION MB IV: E-Commerce/Education
Special Technique for Optimizing Teaching-Learning Process in CBT SoftwareFull-text access may be available. Sign in or learn about subscription options.pp. 246
SESSION MB IV: E-Commerce/Education
Extending the Undergraduate Computer Science Curriculum to Include Data MiningFull-text access may be available. Sign in or learn about subscription options.pp. 251
SESSION MB IV: E-Commerce/Education
Extending the Wiki Paradigm for Use in the ClassroomFull-text access may be available. Sign in or learn about subscription options.pp. 255
SESSION MC I: Web & IR Technologies I
Information Retrieval with Principal ComponentsFull-text access may be available. Sign in or learn about subscription options.pp. 262
SESSION MC I: Web & IR Technologies I
Financial Activity Mining from Online Multilingual NewsFull-text access may be available. Sign in or learn about subscription options.pp. 267
SESSION MC I: Web & IR Technologies I
Enabling Personalization Recommendation With WeightedFP for Text Information Retrieval Based on User-FocusFull-text access may be available. Sign in or learn about subscription options.pp. 272
SESSION MC I: Web & IR Technologies I
The e-Salesman SystemFull-text access may be available. Sign in or learn about subscription options.pp. 277
SESSION MC I: Web & IR Technologies I
From Keywords to Links: an Automatic ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 283
SESSION MC I: Web & IR Technologies I
Toward Dialogues With Documents: MultiBrowserFull-text access may be available. Sign in or learn about subscription options.pp. 287
SESSION MC I: Web & IR Technologies I
From Paragraph Networks to Document NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 295
SESSION MC II: Web & IR Technologies II
Refined Extended Preorder Index with Path InformationFull-text access may be available. Sign in or learn about subscription options.pp. 304
SESSION MC II: Web & IR Technologies II
Multitasking Web Search on Alta VistaFull-text access may be available. Sign in or learn about subscription options.pp. 309
SESSION MC II: Web & IR Technologies II
Extracting New Topic Contents from Hidden Web SitesFull-text access may be available. Sign in or learn about subscription options.pp. 314
SESSION MC II: Web & IR Technologies II
Enhancing Usability of Flight and Fare Search Functions for Airline and Travel Web SitesFull-text access may be available. Sign in or learn about subscription options.pp. 320
SESSION MC II: Web & IR Technologies II
A Hybrid Classifier Approach for Web Retrieved Documents ClassificationFull-text access may be available. Sign in or learn about subscription options.pp. 326
SESSION MC III: Web & IR Technologies III
Web Page Fragmentation for Personalized Portal ConstructionFull-text access may be available. Sign in or learn about subscription options.pp. 332
SESSION MC III: Web & IR Technologies III
TIN: An Interactive Image Navigator Providing Ubiquitous Access To Distributed Geo-Spatial DataFull-text access may be available. Sign in or learn about subscription options.pp. 337
SESSION MC III: Web & IR Technologies III
Exploring Similarity among Web Pages Using the Hyperlink StructureFull-text access may be available. Sign in or learn about subscription options.pp. 344
SESSION MC III: Web & IR Technologies III
Anxiously Seeking Answers: How Attitude Affects Search PerformanceFull-text access may be available. Sign in or learn about subscription options.pp. 349
SESSION MC III: Web & IR Technologies III
XCpaqs: Compression of XML Document with XPath Query SupportFull-text access may be available. Sign in or learn about subscription options.pp. 354
SESSION MC IV: Modern Web and Grid Systems
Matching Techniques for Resource Discovery in Distributed Systems Using Heterogeneous Ontology DescriptionsFull-text access may be available. Sign in or learn about subscription options.pp. 360
SESSION MC IV: Modern Web and Grid Systems
Application Service Provision through the Grid: Business models and ArchitecturesFull-text access may be available. Sign in or learn about subscription options.pp. 367
SESSION MC IV: Modern Web and Grid Systems
The GRelC Library: A Basic Pillar in the Grid Relational Catalog ArchitectureFull-text access may be available. Sign in or learn about subscription options.pp. 372
SESSION MC IV: Modern Web and Grid Systems
Content-Addressable IBP - Rationale, Design and PerformanceFull-text access may be available. Sign in or learn about subscription options.pp. 377
SESSION MC IV: Modern Web and Grid Systems
The LAG Grammar for Authoring the Adaptive WebFull-text access may be available. Sign in or learn about subscription options.pp. 382
SESSION MC IV: Modern Web and Grid Systems
Adaptation and Reuse in Designing Web Information SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 387
SESSION MC IV: Modern Web and Grid Systems
On-line Generation of Suggestions for Web UsersFull-text access may be available. Sign in or learn about subscription options.pp. 392
SESSION MC IV: Modern Web and Grid Systems
Reinforcement Learning Architecture for Web RecommendationsFull-text access may be available. Sign in or learn about subscription options.pp. 398
SESSION TA I: Information Assurance and Security V
Protocol Analysis in Intrusion Detection Using Decision TreeFull-text access may be available. Sign in or learn about subscription options.pp. 404
SESSION TA I: Information Assurance and Security V
Security Protection and Checking in Embedded System Integration Against Buffer Overflow AttacksFull-text access may be available. Sign in or learn about subscription options.pp. 409
SESSION TA I: Information Assurance and Security V
Low-Intrusive Consistent Disk Checkpointing: A Tool for Digital ForensicsFull-text access may be available. Sign in or learn about subscription options.pp. 414
SESSION TA I: Information Assurance and Security V
Dynamic Control of Worm PropagationFull-text access may be available. Sign in or learn about subscription options.pp. 419
SESSION TA I: Information Assurance and Security V
Towards Framework Selection Criteria and Suitability for an Application FrameworkFull-text access may be available. Sign in or learn about subscription options.pp. 424
SESSION TA II: Information Assurance and Security VI
Robust Partner Selection Scheme for Information Quality Assurance despite Uncertainty in Open Multi-Agent SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 430
SESSION TA II: Information Assurance and Security VI
A System for Ensuring Data Integrity in Grid EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 435
SESSION TA II: Information Assurance and Security VI
Defeating the Current Steganalysis Techniques (Robust Steganography)Full-text access may be available. Sign in or learn about subscription options.pp. 440
SESSION TA II: Information Assurance and Security VI
Risk Management using Behavior based Attack GraphsFull-text access may be available. Sign in or learn about subscription options.pp. 445
SESSION TA II: Information Assurance and Security VI
A Model for Team-based Access Control (TMAC 2004)Full-text access may be available. Sign in or learn about subscription options.pp. 450
SESSION TA III: Data Mining I
An Object-Based Approach for Digital Video RetrievalFull-text access may be available. Sign in or learn about subscription options.pp. 456
SESSION TA III: Data Mining I
A Mathematical Model of Similarity and ClusteringFull-text access may be available. Sign in or learn about subscription options.pp. 460
SESSION TA III: Data Mining I
Mining Association Rules from Relations on a Parallel NCR Teradata Database SystemFull-text access may be available. Sign in or learn about subscription options.pp. 465
SESSION TA III: Data Mining I
A New Reparation Method for Incomplete Data in the Context of Supervised LearningFull-text access may be available. Sign in or learn about subscription options.pp. 471
SESSION TA III: Data Mining I
Adaptive Web Document Classification with MCRDRFull-text access may be available. Sign in or learn about subscription options.pp. 476
SESSION TA IV: Special Session
Physically Locating Wireless IntrudersFull-text access may be available. Sign in or learn about subscription options.pp. 482
SESSION TB I: Database Technology I
Replicate Relational and XML Databases for Internet ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 492
SESSION TB I: Database Technology I
Modeling Long Duration Transactions with Time Constraints in Active DatabaseFull-text access may be available. Sign in or learn about subscription options.pp. 497
SESSION TB I: Database Technology I
Accessing Temporal Data Objects in Mobile Computing EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 502
SESSION TB I: Database Technology I
Fuzzy Inclusion Dependencies in Fuzzy Relational DatabasesFull-text access may be available. Sign in or learn about subscription options.pp. 507
SESSION TB I: Database Technology I
Server-side Broadcast Transaction in Mobile Computing EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 511
SESSION TB II: Database Technology II
Survivability and Applicability in Database Constraints: Temporal Boundary to Data Integrity ScenariosFull-text access may be available. Sign in or learn about subscription options.pp. 518
SESSION TB II: Database Technology II
Protecting Federated Databases Using A Practical Implementation of a Formal RBAC PolicyFull-text access may be available. Sign in or learn about subscription options.pp. 523
SESSION TB II: Database Technology II
A Model for Multiple-Query Processing Based upon Strong FactoringFull-text access may be available. Sign in or learn about subscription options.pp. 528
Showing 100 out of 150