The SCEAS System
Navigation Menu

Conferences in DBLP

Int. Conf. on E-Business and Telecommunication Networks (icete)
2004 (conf/icete/2004)

  1. Hans Weghorn
    Employing the C2C Principle for Making the Use of Data Services on Mobile Phones More Attractive. [Citation Graph (0, 0)][DBLP]
    ICETE (3), 2004, pp:3-7 [Conf]
  2. Gianluigi Me, Giuseppe F. Italiano, Paolo Spagnoletti
    GSM and GPRS Performance of IPSEC Data Communication. [Citation Graph (0, 0)][DBLP]
    ICETE (2), 2004, pp:3-11 [Conf]
  3. Luminita Vasiu
    Biometric Recognition - Security and Privacy Concerns. [Citation Graph (0, 0)][DBLP]
    ICETE (Invited Speakers), 2004, pp:3- [Conf]
  4. Masayoshi Ejiri, Frank Birch
    Enabling Secure E-Business Based Telecommunications Management - A new Paradigm beyond TMN. [Citation Graph (0, 0)][DBLP]
    ICETE (1), 2004, pp:3-9 [Conf]
  5. Manu Malek
    E-Business Security and Information Assurance. [Citation Graph (0, 0)][DBLP]
    ICETE (Invited Speakers), 2004, pp:5- [Conf]
  6. Henry Tirri
    Fundamental Challenges of Next Generation Information Retrieval. [Citation Graph (0, 0)][DBLP]
    ICETE (Invited Speakers), 2004, pp:7- [Conf]
  7. Manel Abdelkader, Noureddine Boudriga
    SPUR: A Secured Protocol for UMTS Registration. [Citation Graph (0, 0)][DBLP]
    ICETE (3), 2004, pp:8-16 [Conf]
  8. Nirwan Ansari
    Toward Identifying the Attack Source by Deterministic Packet Marking. [Citation Graph (0, 0)][DBLP]
    ICETE (Invited Speakers), 2004, pp:9- [Conf]
  9. Andreia Malucelli, Ana Paula Rocha, Eugenio Oliveira
    B2B Transactions Enhanced with Ontology-Based Services. [Citation Graph (0, 0)][DBLP]
    ICETE (1), 2004, pp:10-17 [Conf]
  10. Deepak Pareek
    Integrating Wireless Technology into the Financial Market Model. [Citation Graph (0, 0)][DBLP]
    ICETE (Invited Speakers), 2004, pp:11-13 [Conf]
  11. Luciano Paschoal Gaspary, Ederson Canterle
    Performance Measurement of Transaction-Based Internet Applications through SNMP. [Citation Graph (0, 0)][DBLP]
    ICETE (2), 2004, pp:12-19 [Conf]
  12. Mohammed Atiquzzaman
    TraSH: A Transport Layer Handoff Protocol for Mobile Terrestrial and Space Networks. [Citation Graph (0, 0)][DBLP]
    ICETE (Invited Speakers), 2004, pp:15- [Conf]
  13. Nuno Cota, António Rodrigues
    A Dynamic System-Level Simulation Tool for UMTS FDD. [Citation Graph (0, 0)][DBLP]
    ICETE (3), 2004, pp:17-23 [Conf]
  14. Malamati D. Louta, Ioanna Roussaki, Lambros Pechlivanos
    An Efficient Negotiation Strategy in E-Commerce Context Based on Simple Ranking Mechanism. [Citation Graph (0, 0)][DBLP]
    ICETE (1), 2004, pp:18-25 [Conf]
  15. Manu Malek
    E-Business Security. [Citation Graph (0, 0)][DBLP]
    ICETE (Invited Speakers), 2004, pp:19- [Conf]
  16. Gaeil Ahn, Kiyoung Kim, Jongsoo Jang
    Fast and Strong Control of Congestion-Making Traffic. [Citation Graph (0, 0)][DBLP]
    ICETE (2), 2004, pp:20-29 [Conf]
  17. Ibrahim Haddad
    Wireless Carrier Grade Platforms: Characteristics and Ongoing Open Source Development. [Citation Graph (0, 0)][DBLP]
    ICETE (Invited Speakers), 2004, pp:21- [Conf]
  18. Mohammad S. Obaidat
    Fundamentals of Wireless Network Systems. [Citation Graph (0, 0)][DBLP]
    ICETE (Invited Speakers), 2004, pp:23-24 [Conf]
  19. Anthony Solon, Paul McKevitt, Kevin Curran
    A Bandwidth Determined Mobile Multimodal System. [Citation Graph (0, 0)][DBLP]
    ICETE (3), 2004, pp:24-31 [Conf]
  20. Alexander Clemm, Geng Lin
    Rethinking Manageability - Advances in the Management of IP Networks. [Citation Graph (0, 0)][DBLP]
    ICETE (Invited Speakers), 2004, pp:25-26 [Conf]
  21. Antonia Stefani, Dimitris Stavrinoudis, Michalis Xenos
    Experimental Based Tool Calibration Used for Assessing the Quality of E-Commerce Systems. [Citation Graph (0, 0)][DBLP]
    ICETE (1), 2004, pp:26-32 [Conf]
  22. Vangalur S. Alagar, Olga Ormandjieva
    Reliability Assessment of E-Commerce Applications. [Citation Graph (0, 0)][DBLP]
    ICETE (2), 2004, pp:30-37 [Conf]
  23. Nikolaos Koutsouris, George Koundourakis, Louisa Papadopoulou, Dimitris Kouis, Vera Stavroulaki, Nikolas Mitrou, Panagiotis Demestichas
    A Distributed System for the Integrated Management of Heterogeneous Wireless Networks. [Citation Graph (0, 0)][DBLP]
    ICETE (3), 2004, pp:32-39 [Conf]
  24. Simone Müller Vidal, Haroldo Stark Filho, Keiko Ono Fonseca, Alexandre de Almeida Prado Pohl
    Development of Open Code Application for Remote Measurements. [Citation Graph (0, 0)][DBLP]
    ICETE (1), 2004, pp:33-38 [Conf]
  25. Manuel Mendonça, Nuno Ferreira Neves
    Secure Application Updates on Point of Sale Devices. [Citation Graph (0, 0)][DBLP]
    ICETE (2), 2004, pp:38-45 [Conf]
  26. Luis Bernardo, Paulo Pinto
    A Decentralized Location Service - Applying P2P Technology for Picking Replicas on Replicated Services. [Citation Graph (0, 0)][DBLP]
    ICETE (1), 2004, pp:39-47 [Conf]
  27. Yair Toaff, Ariel J. Frank
    Web Traffic Acceleration over Cellular Networks by Using a Compressing Proxy Server. [Citation Graph (0, 0)][DBLP]
    ICETE (3), 2004, pp:40-45 [Conf]
  28. João Carlos Silva, Nuno Souto, António Rodrigues, Américo Correia, Francisco Cercas, Nuno Cota
    Performance of Enhanced-UMTS HSDPA Using Transmit Diversity and Power Control Schemes. [Citation Graph (0, 0)][DBLP]
    ICETE (3), 2004, pp:46-51 [Conf]
  29. Ben Soh, Daniel Bonello
    A New Reduction Method of Intrusion Detection False Alerts Using SNORT. [Citation Graph (0, 0)][DBLP]
    ICETE (2), 2004, pp:46-53 [Conf]
  30. Erik Wilde, Jacqueline Schwerzmann
    When Business Models Go Bad: The Music Industry's Future. [Citation Graph (0, 0)][DBLP]
    ICETE (1), 2004, pp:48-54 [Conf]
  31. Damian Green, Neville A. Stanton, Guy H. Walker, Paul M. Salmon
    Using Wireless Technology to Develop a Virtual Reality Command and Control Centre. [Citation Graph (0, 0)][DBLP]
    ICETE (3), 2004, pp:52-59 [Conf]
  32. Leonardo Lemes Fagundes, Luciano Paschoal Gaspary
    Network-Based Intrusion Detection Systems Evaluation Through a Short Term Experimental Script. [Citation Graph (0, 0)][DBLP]
    ICETE (2), 2004, pp:54-60 [Conf]
  33. Hans Weghorn
    Efficient Information Retrieval from Handheld Terminals with Wireless Digital Phone Interface - Personalized Information Access on Mobile Phones and PDAs. [Citation Graph (0, 0)][DBLP]
    ICETE (1), 2004, pp:55-61 [Conf]
  34. Perfecto Mariño, Fernando Machado, Santiago Otero, Fernando P. Fontán, Cristina Enjamio
    Wireless Networks Efficiency Study Based on Meteorological Data Measurements. [Citation Graph (0, 0)][DBLP]
    ICETE (3), 2004, pp:60-66 [Conf]
  35. Manu Malek, Fotios C. Harmantzis
    Data Mining Techniques for Security of Web Services. [Citation Graph (0, 0)][DBLP]
    ICETE (2), 2004, pp:61-67 [Conf]
  36. Hiroshi Igaki, Masahide Nakamura, Ken-ichi Matsumoto
    Design and Evaluation of the Home Network Systems Using the Service Oriented Architecture. [Citation Graph (0, 0)][DBLP]
    ICETE (1), 2004, pp:62-69 [Conf]
  37. Marko Porjazoski, Borislav Popovski
    Simulation Analysis of Packet Scheduling Algorithm for Voice, WWW and Video Streaming Services. [Citation Graph (0, 0)][DBLP]
    ICETE (3), 2004, pp:67-73 [Conf]
  38. Nikolaos Papamichail, Luminita Vasiu
    Towards an Alternative Way of Verifying Proxy Objects in JINI. [Citation Graph (0, 0)][DBLP]
    ICETE (2), 2004, pp:68-75 [Conf]
  39. Cristina Miyata, Tereza Cristina M. B. Carvalho, Stewart Russell, Akira Kawaguchi
    Wireless Telemedicine and Service Level Management Architecture Specification. [Citation Graph (0, 0)][DBLP]
    ICETE (1), 2004, pp:70-78 [Conf]
  40. Daniel Figueiredo, Pedro Matos, Nuno Cota, António Rodrigues
    Adjacent Channel Interference - Impact on the Capacity of WCDMA/FDD Networks. [Citation Graph (0, 0)][DBLP]
    ICETE (3), 2004, pp:74-80 [Conf]
  41. Andre Zuquete
    STACKFENCES: A Run-Time Approach for Detecting Stack Overflows. [Citation Graph (0, 0)][DBLP]
    ICETE (2), 2004, pp:76-84 [Conf]
  42. Ahmed Sameh
    Modeling Hybrid Multimedia N/W-Web Services Using Rapide ADL. [Citation Graph (0, 0)][DBLP]
    ICETE (1), 2004, pp:79-87 [Conf]
  43. Landaabalo Agba, Laure Freytag, Bernard Jecko
    Planning Tool for LMDS Coverage Using 3D Geographic Information System Data. [Citation Graph (0, 0)][DBLP]
    ICETE (3), 2004, pp:81-86 [Conf]
  44. Georgia Frantzeskou, Stefanos Gritzalis
    Source Code Authorship Analysis for Supporting the Cybercrime Investigation Process. [Citation Graph (0, 0)][DBLP]
    ICETE (2), 2004, pp:85-92 [Conf]
  45. Rui Lopes, Paulo Freixo, António Serrador
    Indoor Propagation Models and Radio Planning for WLANS. [Citation Graph (0, 0)][DBLP]
    ICETE (3), 2004, pp:87-92 [Conf]
  46. Thomas Hadig, Jörg Roth
    Accessing Location and Proximity Information in a Decentralized Environment. [Citation Graph (0, 0)][DBLP]
    ICETE (1), 2004, pp:88-95 [Conf]
  47. Ben Soh, Luke Sledziona
    Internet Security: Public-Key Infrastractures and Certification Systems. [Citation Graph (0, 0)][DBLP]
    ICETE (2), 2004, pp:93-106 [Conf]
  48. Yael Dux-Rosenberg, Ariel J. Frank
    Effects of Variable Bit Rate Vocoder on VoIP QoS. [Citation Graph (0, 0)][DBLP]
    ICETE (3), 2004, pp:93-101 [Conf]
  49. Simone Vasconçelos Silva, Daniel I. De Souza Jr.
    Evaluation of the Quality of the Interaction between Users and Custommade Software Products. [Citation Graph (0, 0)][DBLP]
    ICETE (1), 2004, pp:96-102 [Conf]
  50. Jacques Demerjian, Ahmed Serhrouchni, Mohammed Achemlal
    Certificate-Based Access Control and Authentication for DHCP. [Citation Graph (0, 0)][DBLP]
    ICETE (2), 2004, pp:99-106 [Conf]
  51. Norbert Jordan, Alexander Poropatich
    Fast Mobile IPv6 Approach for Wireless LAN Based Networks - Link-Layer Triggering Support for IEEE 802.11. [Citation Graph (0, 0)][DBLP]
    ICETE (3), 2004, pp:102-108 [Conf]
  52. Anthony W. Marsh, Anthony Atkins
    Customer Relationship Management in an Electronic Economy. [Citation Graph (0, 0)][DBLP]
    ICETE (1), 2004, pp:103-110 [Conf]
  53. Alan Marshall, Wenzhe Zhou
    A Policy-Based Architecture for Protecting 802.11 WLANS Against DDOS Attacks. [Citation Graph (0, 0)][DBLP]
    ICETE (2), 2004, pp:107-112 [Conf]
  54. Simon Shin, Tae-Kyun Park, Byeung-Cheol Kim, Yong-Ha Jeon, Dongwoo Kim
    CDMA2000 1X Capacity Decrease by Power Control Error in High Speed Train Environment. [Citation Graph (0, 0)][DBLP]
    ICETE (3), 2004, pp:109-113 [Conf]
  55. Noh-sam Park, Shin-Kyung Lee, Gil-Haeng Lee
    Policy-Based Service Level Agreement Management System. [Citation Graph (0, 0)][DBLP]
    ICETE (1), 2004, pp:111-117 [Conf]
  56. Zeeshan Furqan, Ratan K. Guha, Shahabuddin Muhammad
    A Heuristic State Space Search Model for Security Protocol Verification. [Citation Graph (0, 0)][DBLP]
    ICETE (2), 2004, pp:113-118 [Conf]
  57. Toshihiro Suzuki, Ken Igarashi, Hiroshi Kawakami, Akira Miura
    Care-of-Prefix Routing for Moving Networks in Mobile IP Network. [Citation Graph (0, 0)][DBLP]
    ICETE (3), 2004, pp:114-120 [Conf]
  58. John Strassner
    A Model Driven Architecture for Telecommunications Systems Using DEN-NG. [Citation Graph (0, 0)][DBLP]
    ICETE (1), 2004, pp:118-128 [Conf]
  59. Ping Yan, Moon Chuen Lee
    Towards an Adaptive Packet Marking Scheme for IP Traceback. [Citation Graph (0, 0)][DBLP]
    ICETE (2), 2004, pp:119-126 [Conf]
  60. Jukka Mäkelä, Timo Hämäläinen, Gábor Fekete, Jorma Narikka, Anna-Maija Virkki
    Mobility Support and Soft Handover Protocol for IP-Networks. [Citation Graph (0, 0)][DBLP]
    ICETE (3), 2004, pp:121-126 [Conf]
  61. Ari Viinikainen, Jyrki Joutsensalo, Mikko Pääkkönen, Timo Hämäläinen
    Packet Scheduling Algorithm with Weight Optimization. [Citation Graph (0, 0)][DBLP]
    ICETE (2), 2004, pp:127-133 [Conf]
  62. Paulo Pinto, Luis Bernardo, Pedro Sobral
    Service Integration Between Wireless Systems: A Core-Level Approach to Internetworking. [Citation Graph (0, 0)][DBLP]
    ICETE (3), 2004, pp:127-134 [Conf]
  63. Hua Ye, Wanlei Zhou
    Improving the Performance of Equalization and a Fast Start-Up Technique for Communication Systems. [Citation Graph (0, 0)][DBLP]
    ICETE (1), 2004, pp:129-135 [Conf]
  64. Jian Zhang, Timo Hämäläinen, Jyrki Joutsensalo
    Packet Scheduling for Maximizing Revenue in a Network Node. [Citation Graph (0, 0)][DBLP]
    ICETE (2), 2004, pp:134-139 [Conf]
  65. Eero Wallenius, Timo Hämäläinen, Timo Nihtilä, Jyrki Joutsensalo
    Providing QoS in 3G-WLAN Environment with RSVP and Diffserv. [Citation Graph (0, 0)][DBLP]
    ICETE (3), 2004, pp:135-141 [Conf]
  66. Dionisis X. Adamopoulos
    Integrating Requirements & Specifications in the Telecommunications Service Creation Process. [Citation Graph (0, 0)][DBLP]
    ICETE (1), 2004, pp:136-143 [Conf]
  67. A. K. Ramani, Sanjay Silakari, Pinaki A. Ghosh
    A Cost-Effective Iris Recognition System Using Linear Discriminant Analysis and Cross-Correlation Techniques. [Citation Graph (0, 0)][DBLP]
    ICETE (2), 2004, pp:140-145 [Conf]
  68. Bogdan Carbunar, Ioannis Ioannidis, Ananth Grama, Jan Vitek
    A Secure Crediting Protocol for Hybrid Cellular and Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICETE (3), 2004, pp:142-149 [Conf]
  69. Erik Wilde
    Protecting Legacy Applications from Unicode. [Citation Graph (0, 0)][DBLP]
    ICETE (1), 2004, pp:144-151 [Conf]
  70. Eiji Nishiyama, Kenshi Kuwanami
    A Method of Identifying Transfer Function for Network by Use of Msequence Correlation. [Citation Graph (0, 0)][DBLP]
    ICETE (2), 2004, pp:146-151 [Conf]
  71. Sonia Furman, David E. Hammers, Mario Gerla
    The Effects of Interelement Spacing in Linear Arrays on Throughput Performance in Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICETE (3), 2004, pp:150-159 [Conf]
  72. Richard S. L. Wu, Allan K. Y. Wong, Tharam S. Dillon
    E-MACSC: A Novel Dynamic Cache Tuning Technique to Maintain the Hit Ratio Prescribed by the User in Internet Applications. [Citation Graph (0, 0)][DBLP]
    ICETE (1), 2004, pp:152-159 [Conf]
  73. Mario Lemes Proença Jr., Camiel Coppelmans, Mauricio Luis Bottoli, Leonardo de Souza Mendes
    Baseline to Help with Network Management. [Citation Graph (0, 0)][DBLP]
    ICETE (2), 2004, pp:152-160 [Conf]
  74. Maria Stella Iacobucci, Fabio Graziosia, Panfilo Ventresca
    Quality of Service Performances in Ad Hoc IEEE 802.11 Wireless LANs. [Citation Graph (0, 0)][DBLP]
    ICETE (3), 2004, pp:160-165 [Conf]
  75. Doug Dillon, Gurjit Singh Butalia, Pawan Kumar Joshi
    Secure Web Browsing over Long-Delay Broadband Networks - Recommendations for Web Browsers. [Citation Graph (0, 0)][DBLP]
    ICETE (1), 2004, pp:160-168 [Conf]
  76. Hiroshi Masuyama, Koji Watanabe
    New Non-Adaptive Distributed System-Level Diagnosis Methods for Computer Networks. [Citation Graph (0, 0)][DBLP]
    ICETE (2), 2004, pp:161-168 [Conf]
  77. Tang Min Keen, Tharek Abdul Rahman
    BER Performance Simulation in LOS Environment for Fixed Broadband Wireless Access System. [Citation Graph (0, 0)][DBLP]
    ICETE (3), 2004, pp:166-171 [Conf]
  78. Miguel Reis, Artur Romão, A. Eduardo Dias
    Practical Auditability in Trusted Messaging Systems. [Citation Graph (0, 0)][DBLP]
    ICETE (2), 2004, pp:169-174 [Conf]
  79. Leonilde Rocha Varela, Sílvio Carmo Silva, Joaquim Nunes Aparício
    Scheduling Decision-Making Using Web Service. [Citation Graph (0, 0)][DBLP]
    ICETE (1), 2004, pp:169-176 [Conf]
  80. Yuseung Jeong, Namgi Kim, Hyunsoo Yoon
    A Smart Handoff Procedure in 4G Networks. [Citation Graph (0, 0)][DBLP]
    ICETE (3), 2004, pp:172-180 [Conf]
  81. Ilhem Lengliz, Haifa Touati, Fehmi Sanàa, Farouk Kamoun, Medy Sanadidi
    Measurements of TCPW ABSE Fairness and Friendliness. [Citation Graph (0, 0)][DBLP]
    ICETE (2), 2004, pp:175-182 [Conf]
  82. Ashwani K. Ramani, Sanjay Silakar, Parul Saxena
    Efficient Proxy Server Caching Using Web Usage Mining Technique on Web Logs - for Improving Hit Rate and Response Time. [Citation Graph (0, 0)][DBLP]
    ICETE (1), 2004, pp:177-182 [Conf]
  83. Naveen K. Chilamkurti, Ben Soh, Sri Vijaya Gutala
    Performance Analysis of a Split-Layer Multicast Mechanism with H.26L Video Coding Scheme. [Citation Graph (0, 0)][DBLP]
    ICETE (3), 2004, pp:181-186 [Conf]
  84. Chyan Yang, Chia Chun Wu
    Gender Differences in Online Shoppers' Decision-Making Styles. [Citation Graph (0, 0)][DBLP]
    ICETE (1), 2004, pp:183-190 [Conf]
  85. N. Rajendran, K. Yugandhar, Ved Prakash Gulati, S. Albert Rabara
    MPLS Architecture for Service Provider. [Citation Graph (0, 0)][DBLP]
    ICETE (2), 2004, pp:183-190 [Conf]
  86. Jani Puttonen, Ari Viinikainen, Miska Sulander, Timo Hämäläinen
    An Analysis of the Flow-Based Fast Handover Method for Mobile IPv6 Network. [Citation Graph (0, 0)][DBLP]
    ICETE (3), 2004, pp:187-190 [Conf]
  87. Neelima Arora, R. K. Shyamasundar
    UGSP: Authentication Based Secure Protocol for Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICETE (3), 2004, pp:191-196 [Conf]
  88. Julian Gantner, Andreas Geyer-Schulz, Anke Thede
    A Single Sign-On Protocol for Distributed Web Applications Based on standard Internet Mechanisms. [Citation Graph (0, 0)][DBLP]
    ICETE (2), 2004, pp:191-198 [Conf]
  89. Xabiel G. Pañeda, David Melendi, Ricardo Bonis, Manuel Vilas, Isabel Rodríguez, Roberto García
    FESORIA - An Integrated Tool for Performance and Content Analysis, SLA Evaluation, Management and Smart Presentation for Video-Ondemand Services. [Citation Graph (0, 0)][DBLP]
    ICETE (1), 2004, pp:191-203 [Conf]
  90. Xueshan Shan
    A Mobile Service Gateway for Mobile Access to Enterprise Data and Services. [Citation Graph (0, 0)][DBLP]
    ICETE (3), 2004, pp:197-202 [Conf]
  91. Hao Wang, Heqing Guo, Manshan Lin
    New Fair Payment Protocols. [Citation Graph (0, 0)][DBLP]
    ICETE (1), 2004, pp:199-203 [Conf]
  92. Akihito Okura, Hiroshi Kawakami, Takeshi Ihara, Akira Miura
    Robust QoS Control for IP-Based Cellular Networks. [Citation Graph (0, 0)][DBLP]
    ICETE (2), 2004, pp:199-208 [Conf]
  93. Yoshiro Imai, Daisuke Yamane, Shin'ichi Masuda, Takaaki Izumo, Hitoshi Inomo, Wataru Shiraki, Osamu Sadayuki
    A Distributed Monitoring System Utilizing Cellular Phone as GUI. [Citation Graph (0, 0)][DBLP]
    ICETE (3), 2004, pp:203-208 [Conf]
  94. Wenyu Qu, Hong Shen, John Sum
    Further Analysis on the Application of Mobile Agents in Network Routing. [Citation Graph (0, 0)][DBLP]
    ICETE (1), 2004, pp:204-212 [Conf]
  95. Kazuo Kamata, Takeaki Shionome, Hideo Yamamoto
    Mobile Videophones for Signed Language Communications. [Citation Graph (0, 0)][DBLP]
    ICETE (3), 2004, pp:209-216 [Conf]
  96. Valentina Casola, Raffaele Chianese, Nicola Mazzocca, Massimiliano Rak, Antonino Mazzeo
    A Policy-Based Design Methodology and Performance Evaluation Framework for a Secure VoIP Infrastructure. [Citation Graph (0, 0)][DBLP]
    ICETE (2), 2004, pp:209-215 [Conf]
  97. Nenad Stankovic
    Internet, Wireless and Legacy Integration - Architectural Framework for Testing. [Citation Graph (0, 0)][DBLP]
    ICETE (1), 2004, pp:213-220 [Conf]
  98. Son T. Vuong, Xiaojuan Cai, Ling Yun, Wing-Keong Woo
    On Vulnerability Testing of VoIP Software - The MEGACO/H.248 System as an Example. [Citation Graph (0, 0)][DBLP]
    ICETE (2), 2004, pp:216-222 [Conf]
  99. Itaru Kaneko, Artur Lugmayr, Seppo Kalli, Abdellatif Benjelloun Touimi, Jong-Nam Kim, Claudio Alberti, Sadigurschi Yona, Jaejoon Kim, Maria Teresa Andrade
    MPEG-21 in Broadcasting Role in the Digital Transition of Broadcasting. [Citation Graph (0, 0)][DBLP]
    ICETE (3), 2004, pp:217-222 [Conf]
  100. Roberto García, Víctor G. García, Xabiel G. Pañeda, David Melendi, Jesús Pérez
    Modelling Procedure to Increase the Efficiency in Fiber Broadband Access Networks - Aggregating Traffic Streams in a Cable Network. [Citation Graph (0, 0)][DBLP]
    ICETE (1), 2004, pp:221-230 [Conf]
  101. Peter Qi Qiu, Ostap Monkewich, Robert L. Probert
    SIP Vulnerabilities Testing in Session Establishment & User Registration. [Citation Graph (0, 0)][DBLP]
    ICETE (2), 2004, pp:223-229 [Conf]
  102. Letian Rong, Ian S. Burnett
    Application Level Session Hand-Off Management in a Ubiquitous Multimedia Environment. [Citation Graph (0, 0)][DBLP]
    ICETE (3), 2004, pp:223-229 [Conf]
  103. Jason Reid, Andrew Clark, Juan Manuel González Nieto, Jason Smith, Kapali Viswanathan
    Denial of Service Issues in Voice Over IP Networks. [Citation Graph (0, 0)][DBLP]
    ICETE (2), 2004, pp:230-237 [Conf]
  104. Dan Feng, Fang Wang, Yuhui Deng, Jiangling Zhang
    Remove Multimedia Server Bottleneck by Network Attached Disk Array with Heterogeneous Dual Channels. [Citation Graph (0, 0)][DBLP]
    ICETE (3), 2004, pp:230-235 [Conf]
  105. Y. Xiang, M. Lan, W. Zhou
    Special Session on Web Applications in the Industry and Effects on the Business Performance Web Services in Hotel Industry. [Citation Graph (0, 0)][DBLP]
    ICETE (1), 2004, pp:231-240 [Conf]
  106. Omar Abouabdalla, R. Sureswaran
    Interworking Between the RSW Control Criteria and SIP Standard. [Citation Graph (0, 0)][DBLP]
    ICETE (3), 2004, pp:236-242 [Conf]
  107. Kapil Singh, Son T. Vuong
    BLAZE: A Mobile Agent Paradigm for VoIP Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP]
    ICETE (2), 2004, pp:238-245 [Conf]
  108. Jun Lai, Ben Soh, Mao Lin Huang
    A New Word-Intersection Clustering Method for Information Filtering. [Citation Graph (0, 0)][DBLP]
    ICETE (1), 2004, pp:241-244 [Conf]
  109. Rabi W. Habash, Mohd Dani Baba, Mat Ikram Yusof, Muhammad Ibrahim, Borhanuddin Mohd Ali
    Performance Analysis Study of Multicast Traffic in Star-Based Local WDM Lightwave Networks. [Citation Graph (0, 0)][DBLP]
    ICETE (3), 2004, pp:243-249 [Conf]
  110. Despoina Palaka, Petros Daras, Kosmas Petridis, Michael G. Strintzis
    A Novel Peer-to-Peer Payment System. [Citation Graph (0, 0)][DBLP]
    ICETE (1), 2004, pp:245-250 [Conf]
  111. Yong Song, Victor C. M. Leung, Konstantin Beznosov
    Implementing Multiple Channels over SSL. [Citation Graph (0, 0)][DBLP]
    ICETE (2), 2004, pp:246-256 [Conf]
  112. Yan Bai, Mabo Robert Ito
    Loss Control Through the Combination of Buffer Management and Packet Scheduling. [Citation Graph (0, 0)][DBLP]
    ICETE (3), 2004, pp:250-255 [Conf]
  113. Julia Gross, Joachim Zeiss, Sandford Bessler
    A Run Time Environment Extension for Personalized Web Services. [Citation Graph (0, 0)][DBLP]
    ICETE (1), 2004, pp:251-256 [Conf]
  114. David Melendi, Xabiel G. Pañeda, Roberto García, Ricardo Bonis, Víctor G. García
    Deployment of Live-Video Services Based on Streaming Technology over an HFC Network. [Citation Graph (0, 0)][DBLP]
    ICETE (3), 2004, pp:256-263 [Conf]
  115. Vanyo G. Peychev, Jimmy C. Dubuisson, Vladimir T. Dimitrov, Zhechka A. Toteva
    Structured Documents Represented by Conceptual Graphs - A Simple Formalism for Presenting Structured Documents. [Citation Graph (0, 0)][DBLP]
    ICETE (1), 2004, pp:257-262 [Conf]
  116. Aashish Sharma, William Yurcik
    An E-Tax Internet Filing System Incorporating Security and Usability Best Practices - Prototype Implementation of the Best Practices Identified in Government and Commercial E-Tax Filing Websites in the USA for Tax Season of 2003. [Citation Graph (0, 0)][DBLP]
    ICETE (2), 2004, pp:257-262 [Conf]
  117. Dmitry Ponomarev, Vladimir Krylov
    Web Mapping of Real-World Things and its Applications - Product WEBID as a Driving Force for new Supply Chains. [Citation Graph (0, 0)][DBLP]
    ICETE (1), 2004, pp:263-267 [Conf]
  118. Toshihiro Tabata, Kouichi Sakurai
    Design of Intrusion Detection System at User Level with System-Call Interposing. [Citation Graph (0, 0)][DBLP]
    ICETE (2), 2004, pp:263-268 [Conf]
  119. Rui Marcelino, Vitor M. M. da Silva, Sérgio M. M. de Faria
    Fast Event Detection in MPEG Video. [Citation Graph (0, 0)][DBLP]
    ICETE (3), 2004, pp:264-268 [Conf]
  120. Bader Maktari, Naoufel Werghi, Zoheir Ezziane
    TM.AN: Commanding the Power of Collaborative Task Management. [Citation Graph (0, 0)][DBLP]
    ICETE (1), 2004, pp:268-274 [Conf]
  121. Jun Ki Kim, Ho Suk Lee
    Moving Objects Segmentation Using Boundary. [Citation Graph (0, 0)][DBLP]
    ICETE (3), 2004, pp:269-277 [Conf]
  122. Colin Pattinson, Kemal Hajdarevic
    Training Network Managers to Recognise Intrusion Attacks. [Citation Graph (0, 0)][DBLP]
    ICETE (2), 2004, pp:269-274 [Conf]
  123. Ulf T. Mattsson
    A Real-Time Intrusion Prevention System for Commercial Enterprise Databases. [Citation Graph (0, 0)][DBLP]
    ICETE (2), 2004, pp:275-280 [Conf]
  124. Hiroshi Yamada, Akira Kawaguchi
    A Method for the Performance Analysis of Integrated Application Services - Simulating the Execution of Integrated Application Services. [Citation Graph (0, 0)][DBLP]
    ICETE (1), 2004, pp:275-280 [Conf]
  125. Nuno Santos, Pedro A. Amado Assunção
    A Video Transcoding Scheme for E-Learning Multimedia Applications. [Citation Graph (0, 0)][DBLP]
    ICETE (3), 2004, pp:278-283 [Conf]
  126. Ben Soh, Aaron Joy
    Optimal Analysis of a Hybrid Authentication System: Web Security versus System Performance. [Citation Graph (0, 0)][DBLP]
    ICETE (2), 2004, pp:281-286 [Conf]
  127. Sam Makki, Ho Ling Hsing, Demetrios Kazakos
    Predictive Querying in Spatio-Temporal Environment. [Citation Graph (0, 0)][DBLP]
    ICETE (1), 2004, pp:281-286 [Conf]
  128. Yuan-Liang Tang, Chun-Hung Chen
    Image Authentication Using Hierarchical Semi-Fragile Watermarks. [Citation Graph (0, 0)][DBLP]
    ICETE (3), 2004, pp:284-289 [Conf]
  129. Yu Miyoshi, Tatsuyuki Kimura
    Detour Path Resource Management Methods for IP Service Operation. [Citation Graph (0, 0)][DBLP]
    ICETE (2), 2004, pp:287-292 [Conf]
  130. Jesús E. Villadangos, José Javier Astrain, Alberto Córdoba, Manuel Prieto
    Local vs Remote Information for Location Based Services. [Citation Graph (0, 0)][DBLP]
    ICETE (1), 2004, pp:287-293 [Conf]
  131. Andrés Garay Acevedo
    Audio Watermarking Quality Evaluation. [Citation Graph (0, 0)][DBLP]
    ICETE (3), 2004, pp:290-300 [Conf]
  132. José Javier Astrain, Jesús E. Villadangos, Alberto Córdoba, Manuel Prieto
    Face Recognition in Biometric Vending Machines. [Citation Graph (0, 0)][DBLP]
    ICETE (2), 2004, pp:293-298 [Conf]
  133. Dionisis X. Adamopoulos, Constantine A. Papandreou
    Service Creation Technologies in Open Programmable Networks. [Citation Graph (0, 0)][DBLP]
    ICETE (1), 2004, pp:294-299 [Conf]
  134. InSeon Yoo, Ulrich Ultes-Nitsche
    Towards Run-Time Protocol Anomaly Detection and Verification. [Citation Graph (0, 0)][DBLP]
    ICETE (2), 2004, pp:299-304 [Conf]
  135. Victor Santos, Edmundo Monteiro, Antonio Gomes Martins
    The Electricity Retail Market: Requeriments for an E-Business System. [Citation Graph (0, 0)][DBLP]
    ICETE (1), 2004, pp:300-305 [Conf]
  136. Pedro Cano, Markus Koppenberger, Sylvain Le Groux, Perfecto Herrera, Julien Ricard, Nicolas Wack
    Knowledge and Content-Based Audio Retrieval Using Wordnet. [Citation Graph (0, 0)][DBLP]
    ICETE (3), 2004, pp:301-308 [Conf]
  137. Ibrahim Hajjeh, Ahmed Serhrouchni
    Integrating a Signature Module in SSL/TLS. [Citation Graph (0, 0)][DBLP]
    ICETE (2), 2004, pp:305-310 [Conf]
  138. Andreas Iselt, Andreas Kirstädter, Rayane Chahine
    The Role of ASON and GMPLS for the Bandwidth Trading Market - Bandwidth Brokerage Under the Influence of Novel Control Plane Technologies. [Citation Graph (0, 0)][DBLP]
    ICETE (1), 2004, pp:306-311 [Conf]
  139. Grzegorz Pastuszak
    Hardware-Oriented Analysis of the Arithmetic Coding - Comparative Study of JPEG2000 and H.264/AVC Compression Standards. [Citation Graph (0, 0)][DBLP]
    ICETE (3), 2004, pp:309-316 [Conf]
  140. Francesco Palmieri
    An High Performance Traffic Engineering Model for All-Optical Networks - Evolutionary GMPLS Control Plane Services in All-Optical Cross-Connects. [Citation Graph (0, 0)][DBLP]
    ICETE (2), 2004, pp:311-316 [Conf]
  141. Yang Xiang, Wanlei Zhou, Morshed U. Chowdhury
    Toward Pervasive Computing in Restaurant. [Citation Graph (0, 0)][DBLP]
    ICETE (1), 2004, pp:312-0 [Conf]
  142. Bruno Carpentieri, James A. Storer, Giovanni Motta, Francesco Rizzo
    Compression of Hyperspectral Imagery. [Citation Graph (0, 0)][DBLP]
    ICETE (3), 2004, pp:317-324 [Conf]
  143. Hanane El Bakkalis
    E-Payment Security - Recommendations About the Use of a PKI for E-Payment Security. [Citation Graph (0, 0)][DBLP]
    ICETE (2), 2004, pp:317-0 [Conf]
  144. Antonio Buemi, Arcangelo Bruna, Filippo Vella, Alessandro Capra
    Bayer Pattern Compression by Prediction Errors Vector Quantization. [Citation Graph (0, 0)][DBLP]
    ICETE (3), 2004, pp:325-330 [Conf]
  145. João Tavares, Antonio Navarro 0002
    Forward Error Correction for Video Coding. [Citation Graph (0, 0)][DBLP]
    ICETE (3), 2004, pp:331-338 [Conf]
  146. Xiaojun Qi, Yutao Han
    An Integrated Global and Fuzzy Regional Approach to Content-Based Image Retrieval. [Citation Graph (0, 0)][DBLP]
    ICETE (3), 2004, pp:339-350 [Conf]
  147. Constantino Garcia, Francisco J. Suárez
    Real-Time Audio Capture, Compression & Streaming Service on a PDA. [Citation Graph (0, 0)][DBLP]
    ICETE (3), 2004, pp:345-350 [Conf]
  148. Juan Manuel Górriz Sáez, Carlos García Puntonet, Rubén Martín-Clemente
    Improving ICA Algorithms Applied to Predicting Stock Returns. [Citation Graph (0, 0)][DBLP]
    ICETE (3), 2004, pp:351-355 [Conf]
  149. Eckhard Buescher
    Knowledge Based 3D-Modelling by Selforganised Learning Algorithms. [Citation Graph (0, 0)][DBLP]
    ICETE (3), 2004, pp:356-362 [Conf]
  150. Tudor Barbu
    Discrete Speech Recognition Using a Hausdorff Based Metric - An Automatic Word-Based Speech Recognition Approach. [Citation Graph (0, 0)][DBLP]
    ICETE (3), 2004, pp:363-368 [Conf]
  151. Pietro Camarda, Antonio De Gioia, Domenico Striccoli
    Online Smoothing of VBR Video Streams in Systems with Variable Available Bandwidth. [Citation Graph (0, 0)][DBLP]
    ICETE (3), 2004, pp:369-374 [Conf]
  152. Carlos Serrão, Joaquim Marques
    Digital Music Electronic Commerce - Addressing the Super Distribution Model. [Citation Graph (0, 0)][DBLP]
    ICETE (3), 2004, pp:375-378 [Conf]
  153. Joelson Tadeu Vendramin, Keiko Verônica Ono Fonseca
    An Enhanced Smoothing Scheme for MPEG Video Streams Transmission. [Citation Graph (0, 0)][DBLP]
    ICETE (3), 2004, pp:379-384 [Conf]
  154. Mustafa Sert, Buyurman Baykal
    An Approach to the Semantic Modeling of Audio Databases. [Citation Graph (0, 0)][DBLP]
    ICETE (3), 2004, pp:385-392 [Conf]
  155. Jiankun Hu, Konrad Eriksson
    A New Distributed Contention Control Protocol for the IEEE 802.11 MAC Layer - Project of ATCRC Application Programms. [Citation Graph (0, 0)][DBLP]
    ICETE (3), 2004, pp:393-401 [Conf]
  156. Francisco Delicado, Pedro Cuenca, Luis Orozco-Barbosa
    A QoS-Aware Resource Request Mechanism for Delay Sensitive Services Over TDMA/TDD Wireless Networks. [Citation Graph (0, 0)][DBLP]
    ICETE (3), 2004, pp:402-409 [Conf]
  157. Johan Garcia, Anna Brunstrom
    An Experimental Study on the Performance and Fairness of Loss Differentiation for TCP. [Citation Graph (0, 0)][DBLP]
    ICETE (3), 2004, pp:410-419 [Conf]
  158. Markku Kojo, Davide Astuti, Laila Daniel, Aki Nyrhinen, Kimmo E. E. Raatikainen
    Improving TCP Performance over Wireless WANs Using TCP/IP-Friendly Link Layer. [Citation Graph (0, 0)][DBLP]
    ICETE (3), 2004, pp:420-429 [Conf]
  159. Annika Wennström, Anna Brunstrom, Juan Rendón, Jan H. Gustafsson
    The Impact of Preemptive Priority in GPRS on TCP Performance: A Measurement Study. [Citation Graph (0, 0)][DBLP]
    ICETE (3), 2004, pp:430-436 [Conf]
  160. Haowei Bai, Mohammed Atiquzzaman, David J. Lilja
    Using ECN Marks to Improve TCP Performance over Lossy Links. [Citation Graph (0, 0)][DBLP]
    ICETE (3), 2004, pp:437-445 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002