Conferences in DBLP
Hans Weghorn Employing the C2C Principle for Making the Use of Data Services on Mobile Phones More Attractive. [Citation Graph (0, 0)][DBLP ] ICETE (3), 2004, pp:3-7 [Conf ] Gianluigi Me , Giuseppe F. Italiano , Paolo Spagnoletti GSM and GPRS Performance of IPSEC Data Communication. [Citation Graph (0, 0)][DBLP ] ICETE (2), 2004, pp:3-11 [Conf ] Luminita Vasiu Biometric Recognition - Security and Privacy Concerns. [Citation Graph (0, 0)][DBLP ] ICETE (Invited Speakers), 2004, pp:3- [Conf ] Masayoshi Ejiri , Frank Birch Enabling Secure E-Business Based Telecommunications Management - A new Paradigm beyond TMN. [Citation Graph (0, 0)][DBLP ] ICETE (1), 2004, pp:3-9 [Conf ] Manu Malek E-Business Security and Information Assurance. [Citation Graph (0, 0)][DBLP ] ICETE (Invited Speakers), 2004, pp:5- [Conf ] Henry Tirri Fundamental Challenges of Next Generation Information Retrieval. [Citation Graph (0, 0)][DBLP ] ICETE (Invited Speakers), 2004, pp:7- [Conf ] Manel Abdelkader , Noureddine Boudriga SPUR: A Secured Protocol for UMTS Registration. [Citation Graph (0, 0)][DBLP ] ICETE (3), 2004, pp:8-16 [Conf ] Nirwan Ansari Toward Identifying the Attack Source by Deterministic Packet Marking. [Citation Graph (0, 0)][DBLP ] ICETE (Invited Speakers), 2004, pp:9- [Conf ] Andreia Malucelli , Ana Paula Rocha , Eugenio Oliveira B2B Transactions Enhanced with Ontology-Based Services. [Citation Graph (0, 0)][DBLP ] ICETE (1), 2004, pp:10-17 [Conf ] Deepak Pareek Integrating Wireless Technology into the Financial Market Model. [Citation Graph (0, 0)][DBLP ] ICETE (Invited Speakers), 2004, pp:11-13 [Conf ] Luciano Paschoal Gaspary , Ederson Canterle Performance Measurement of Transaction-Based Internet Applications through SNMP. [Citation Graph (0, 0)][DBLP ] ICETE (2), 2004, pp:12-19 [Conf ] Mohammed Atiquzzaman TraSH: A Transport Layer Handoff Protocol for Mobile Terrestrial and Space Networks. [Citation Graph (0, 0)][DBLP ] ICETE (Invited Speakers), 2004, pp:15- [Conf ] Nuno Cota , António Rodrigues A Dynamic System-Level Simulation Tool for UMTS FDD. [Citation Graph (0, 0)][DBLP ] ICETE (3), 2004, pp:17-23 [Conf ] Malamati D. Louta , Ioanna Roussaki , Lambros Pechlivanos An Efficient Negotiation Strategy in E-Commerce Context Based on Simple Ranking Mechanism. [Citation Graph (0, 0)][DBLP ] ICETE (1), 2004, pp:18-25 [Conf ] Manu Malek E-Business Security. [Citation Graph (0, 0)][DBLP ] ICETE (Invited Speakers), 2004, pp:19- [Conf ] Gaeil Ahn , Kiyoung Kim , Jongsoo Jang Fast and Strong Control of Congestion-Making Traffic. [Citation Graph (0, 0)][DBLP ] ICETE (2), 2004, pp:20-29 [Conf ] Ibrahim Haddad Wireless Carrier Grade Platforms: Characteristics and Ongoing Open Source Development. [Citation Graph (0, 0)][DBLP ] ICETE (Invited Speakers), 2004, pp:21- [Conf ] Mohammad S. Obaidat Fundamentals of Wireless Network Systems. [Citation Graph (0, 0)][DBLP ] ICETE (Invited Speakers), 2004, pp:23-24 [Conf ] Anthony Solon , Paul McKevitt , Kevin Curran A Bandwidth Determined Mobile Multimodal System. [Citation Graph (0, 0)][DBLP ] ICETE (3), 2004, pp:24-31 [Conf ] Alexander Clemm , Geng Lin Rethinking Manageability - Advances in the Management of IP Networks. [Citation Graph (0, 0)][DBLP ] ICETE (Invited Speakers), 2004, pp:25-26 [Conf ] Antonia Stefani , Dimitris Stavrinoudis , Michalis Xenos Experimental Based Tool Calibration Used for Assessing the Quality of E-Commerce Systems. [Citation Graph (0, 0)][DBLP ] ICETE (1), 2004, pp:26-32 [Conf ] Vangalur S. Alagar , Olga Ormandjieva Reliability Assessment of E-Commerce Applications. [Citation Graph (0, 0)][DBLP ] ICETE (2), 2004, pp:30-37 [Conf ] Nikolaos Koutsouris , George Koundourakis , Louisa Papadopoulou , Dimitris Kouis , Vera Stavroulaki , Nikolas Mitrou , Panagiotis Demestichas A Distributed System for the Integrated Management of Heterogeneous Wireless Networks. [Citation Graph (0, 0)][DBLP ] ICETE (3), 2004, pp:32-39 [Conf ] Simone Müller Vidal , Haroldo Stark Filho , Keiko Ono Fonseca , Alexandre de Almeida Prado Pohl Development of Open Code Application for Remote Measurements. [Citation Graph (0, 0)][DBLP ] ICETE (1), 2004, pp:33-38 [Conf ] Manuel Mendonça , Nuno Ferreira Neves Secure Application Updates on Point of Sale Devices. [Citation Graph (0, 0)][DBLP ] ICETE (2), 2004, pp:38-45 [Conf ] Luis Bernardo , Paulo Pinto A Decentralized Location Service - Applying P2P Technology for Picking Replicas on Replicated Services. [Citation Graph (0, 0)][DBLP ] ICETE (1), 2004, pp:39-47 [Conf ] Yair Toaff , Ariel J. Frank Web Traffic Acceleration over Cellular Networks by Using a Compressing Proxy Server. [Citation Graph (0, 0)][DBLP ] ICETE (3), 2004, pp:40-45 [Conf ] João Carlos Silva , Nuno Souto , António Rodrigues , Américo Correia , Francisco Cercas , Nuno Cota Performance of Enhanced-UMTS HSDPA Using Transmit Diversity and Power Control Schemes. [Citation Graph (0, 0)][DBLP ] ICETE (3), 2004, pp:46-51 [Conf ] Ben Soh , Daniel Bonello A New Reduction Method of Intrusion Detection False Alerts Using SNORT. [Citation Graph (0, 0)][DBLP ] ICETE (2), 2004, pp:46-53 [Conf ] Erik Wilde , Jacqueline Schwerzmann When Business Models Go Bad: The Music Industry's Future. [Citation Graph (0, 0)][DBLP ] ICETE (1), 2004, pp:48-54 [Conf ] Damian Green , Neville A. Stanton , Guy H. Walker , Paul M. Salmon Using Wireless Technology to Develop a Virtual Reality Command and Control Centre. [Citation Graph (0, 0)][DBLP ] ICETE (3), 2004, pp:52-59 [Conf ] Leonardo Lemes Fagundes , Luciano Paschoal Gaspary Network-Based Intrusion Detection Systems Evaluation Through a Short Term Experimental Script. [Citation Graph (0, 0)][DBLP ] ICETE (2), 2004, pp:54-60 [Conf ] Hans Weghorn Efficient Information Retrieval from Handheld Terminals with Wireless Digital Phone Interface - Personalized Information Access on Mobile Phones and PDAs. [Citation Graph (0, 0)][DBLP ] ICETE (1), 2004, pp:55-61 [Conf ] Perfecto Mariño , Fernando Machado , Santiago Otero , Fernando P. Fontán , Cristina Enjamio Wireless Networks Efficiency Study Based on Meteorological Data Measurements. [Citation Graph (0, 0)][DBLP ] ICETE (3), 2004, pp:60-66 [Conf ] Manu Malek , Fotios C. Harmantzis Data Mining Techniques for Security of Web Services. [Citation Graph (0, 0)][DBLP ] ICETE (2), 2004, pp:61-67 [Conf ] Hiroshi Igaki , Masahide Nakamura , Ken-ichi Matsumoto Design and Evaluation of the Home Network Systems Using the Service Oriented Architecture. [Citation Graph (0, 0)][DBLP ] ICETE (1), 2004, pp:62-69 [Conf ] Marko Porjazoski , Borislav Popovski Simulation Analysis of Packet Scheduling Algorithm for Voice, WWW and Video Streaming Services. [Citation Graph (0, 0)][DBLP ] ICETE (3), 2004, pp:67-73 [Conf ] Nikolaos Papamichail , Luminita Vasiu Towards an Alternative Way of Verifying Proxy Objects in JINI. [Citation Graph (0, 0)][DBLP ] ICETE (2), 2004, pp:68-75 [Conf ] Cristina Miyata , Tereza Cristina M. B. Carvalho , Stewart Russell , Akira Kawaguchi Wireless Telemedicine and Service Level Management Architecture Specification. [Citation Graph (0, 0)][DBLP ] ICETE (1), 2004, pp:70-78 [Conf ] Daniel Figueiredo , Pedro Matos , Nuno Cota , António Rodrigues Adjacent Channel Interference - Impact on the Capacity of WCDMA/FDD Networks. [Citation Graph (0, 0)][DBLP ] ICETE (3), 2004, pp:74-80 [Conf ] Andre Zuquete STACKFENCES: A Run-Time Approach for Detecting Stack Overflows. [Citation Graph (0, 0)][DBLP ] ICETE (2), 2004, pp:76-84 [Conf ] Ahmed Sameh Modeling Hybrid Multimedia N/W-Web Services Using Rapide ADL. [Citation Graph (0, 0)][DBLP ] ICETE (1), 2004, pp:79-87 [Conf ] Landaabalo Agba , Laure Freytag , Bernard Jecko Planning Tool for LMDS Coverage Using 3D Geographic Information System Data. [Citation Graph (0, 0)][DBLP ] ICETE (3), 2004, pp:81-86 [Conf ] Georgia Frantzeskou , Stefanos Gritzalis Source Code Authorship Analysis for Supporting the Cybercrime Investigation Process. [Citation Graph (0, 0)][DBLP ] ICETE (2), 2004, pp:85-92 [Conf ] Rui Lopes , Paulo Freixo , António Serrador Indoor Propagation Models and Radio Planning for WLANS. [Citation Graph (0, 0)][DBLP ] ICETE (3), 2004, pp:87-92 [Conf ] Thomas Hadig , Jörg Roth Accessing Location and Proximity Information in a Decentralized Environment. [Citation Graph (0, 0)][DBLP ] ICETE (1), 2004, pp:88-95 [Conf ] Ben Soh , Luke Sledziona Internet Security: Public-Key Infrastractures and Certification Systems. [Citation Graph (0, 0)][DBLP ] ICETE (2), 2004, pp:93-106 [Conf ] Yael Dux-Rosenberg , Ariel J. Frank Effects of Variable Bit Rate Vocoder on VoIP QoS. [Citation Graph (0, 0)][DBLP ] ICETE (3), 2004, pp:93-101 [Conf ] Simone Vasconçelos Silva , Daniel I. De Souza Jr. Evaluation of the Quality of the Interaction between Users and Custommade Software Products. [Citation Graph (0, 0)][DBLP ] ICETE (1), 2004, pp:96-102 [Conf ] Jacques Demerjian , Ahmed Serhrouchni , Mohammed Achemlal Certificate-Based Access Control and Authentication for DHCP. [Citation Graph (0, 0)][DBLP ] ICETE (2), 2004, pp:99-106 [Conf ] Norbert Jordan , Alexander Poropatich Fast Mobile IPv6 Approach for Wireless LAN Based Networks - Link-Layer Triggering Support for IEEE 802.11. [Citation Graph (0, 0)][DBLP ] ICETE (3), 2004, pp:102-108 [Conf ] Anthony W. Marsh , Anthony Atkins Customer Relationship Management in an Electronic Economy. [Citation Graph (0, 0)][DBLP ] ICETE (1), 2004, pp:103-110 [Conf ] Alan Marshall , Wenzhe Zhou A Policy-Based Architecture for Protecting 802.11 WLANS Against DDOS Attacks. [Citation Graph (0, 0)][DBLP ] ICETE (2), 2004, pp:107-112 [Conf ] Simon Shin , Tae-Kyun Park , Byeung-Cheol Kim , Yong-Ha Jeon , Dongwoo Kim CDMA2000 1X Capacity Decrease by Power Control Error in High Speed Train Environment. [Citation Graph (0, 0)][DBLP ] ICETE (3), 2004, pp:109-113 [Conf ] Noh-sam Park , Shin-Kyung Lee , Gil-Haeng Lee Policy-Based Service Level Agreement Management System. [Citation Graph (0, 0)][DBLP ] ICETE (1), 2004, pp:111-117 [Conf ] Zeeshan Furqan , Ratan K. Guha , Shahabuddin Muhammad A Heuristic State Space Search Model for Security Protocol Verification. [Citation Graph (0, 0)][DBLP ] ICETE (2), 2004, pp:113-118 [Conf ] Toshihiro Suzuki , Ken Igarashi , Hiroshi Kawakami , Akira Miura Care-of-Prefix Routing for Moving Networks in Mobile IP Network. [Citation Graph (0, 0)][DBLP ] ICETE (3), 2004, pp:114-120 [Conf ] John Strassner A Model Driven Architecture for Telecommunications Systems Using DEN-NG. [Citation Graph (0, 0)][DBLP ] ICETE (1), 2004, pp:118-128 [Conf ] Ping Yan , Moon Chuen Lee Towards an Adaptive Packet Marking Scheme for IP Traceback. [Citation Graph (0, 0)][DBLP ] ICETE (2), 2004, pp:119-126 [Conf ] Jukka Mäkelä , Timo Hämäläinen , Gábor Fekete , Jorma Narikka , Anna-Maija Virkki Mobility Support and Soft Handover Protocol for IP-Networks. [Citation Graph (0, 0)][DBLP ] ICETE (3), 2004, pp:121-126 [Conf ] Ari Viinikainen , Jyrki Joutsensalo , Mikko Pääkkönen , Timo Hämäläinen Packet Scheduling Algorithm with Weight Optimization. [Citation Graph (0, 0)][DBLP ] ICETE (2), 2004, pp:127-133 [Conf ] Paulo Pinto , Luis Bernardo , Pedro Sobral Service Integration Between Wireless Systems: A Core-Level Approach to Internetworking. [Citation Graph (0, 0)][DBLP ] ICETE (3), 2004, pp:127-134 [Conf ] Hua Ye , Wanlei Zhou Improving the Performance of Equalization and a Fast Start-Up Technique for Communication Systems. [Citation Graph (0, 0)][DBLP ] ICETE (1), 2004, pp:129-135 [Conf ] Jian Zhang , Timo Hämäläinen , Jyrki Joutsensalo Packet Scheduling for Maximizing Revenue in a Network Node. [Citation Graph (0, 0)][DBLP ] ICETE (2), 2004, pp:134-139 [Conf ] Eero Wallenius , Timo Hämäläinen , Timo Nihtilä , Jyrki Joutsensalo Providing QoS in 3G-WLAN Environment with RSVP and Diffserv. [Citation Graph (0, 0)][DBLP ] ICETE (3), 2004, pp:135-141 [Conf ] Dionisis X. Adamopoulos Integrating Requirements & Specifications in the Telecommunications Service Creation Process. [Citation Graph (0, 0)][DBLP ] ICETE (1), 2004, pp:136-143 [Conf ] A. K. Ramani , Sanjay Silakari , Pinaki A. Ghosh A Cost-Effective Iris Recognition System Using Linear Discriminant Analysis and Cross-Correlation Techniques. [Citation Graph (0, 0)][DBLP ] ICETE (2), 2004, pp:140-145 [Conf ] Bogdan Carbunar , Ioannis Ioannidis , Ananth Grama , Jan Vitek A Secure Crediting Protocol for Hybrid Cellular and Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP ] ICETE (3), 2004, pp:142-149 [Conf ] Erik Wilde Protecting Legacy Applications from Unicode. [Citation Graph (0, 0)][DBLP ] ICETE (1), 2004, pp:144-151 [Conf ] Eiji Nishiyama , Kenshi Kuwanami A Method of Identifying Transfer Function for Network by Use of Msequence Correlation. [Citation Graph (0, 0)][DBLP ] ICETE (2), 2004, pp:146-151 [Conf ] Sonia Furman , David E. Hammers , Mario Gerla The Effects of Interelement Spacing in Linear Arrays on Throughput Performance in Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] ICETE (3), 2004, pp:150-159 [Conf ] Richard S. L. Wu , Allan K. Y. Wong , Tharam S. Dillon E-MACSC: A Novel Dynamic Cache Tuning Technique to Maintain the Hit Ratio Prescribed by the User in Internet Applications. [Citation Graph (0, 0)][DBLP ] ICETE (1), 2004, pp:152-159 [Conf ] Mario Lemes Proença Jr. , Camiel Coppelmans , Mauricio Luis Bottoli , Leonardo de Souza Mendes Baseline to Help with Network Management. [Citation Graph (0, 0)][DBLP ] ICETE (2), 2004, pp:152-160 [Conf ] Maria Stella Iacobucci , Fabio Graziosia , Panfilo Ventresca Quality of Service Performances in Ad Hoc IEEE 802.11 Wireless LANs. [Citation Graph (0, 0)][DBLP ] ICETE (3), 2004, pp:160-165 [Conf ] Doug Dillon , Gurjit Singh Butalia , Pawan Kumar Joshi Secure Web Browsing over Long-Delay Broadband Networks - Recommendations for Web Browsers. [Citation Graph (0, 0)][DBLP ] ICETE (1), 2004, pp:160-168 [Conf ] Hiroshi Masuyama , Koji Watanabe New Non-Adaptive Distributed System-Level Diagnosis Methods for Computer Networks. [Citation Graph (0, 0)][DBLP ] ICETE (2), 2004, pp:161-168 [Conf ] Tang Min Keen , Tharek Abdul Rahman BER Performance Simulation in LOS Environment for Fixed Broadband Wireless Access System. [Citation Graph (0, 0)][DBLP ] ICETE (3), 2004, pp:166-171 [Conf ] Miguel Reis , Artur Romão , A. Eduardo Dias Practical Auditability in Trusted Messaging Systems. [Citation Graph (0, 0)][DBLP ] ICETE (2), 2004, pp:169-174 [Conf ] Leonilde Rocha Varela , Sílvio Carmo Silva , Joaquim Nunes Aparício Scheduling Decision-Making Using Web Service. [Citation Graph (0, 0)][DBLP ] ICETE (1), 2004, pp:169-176 [Conf ] Yuseung Jeong , Namgi Kim , Hyunsoo Yoon A Smart Handoff Procedure in 4G Networks. [Citation Graph (0, 0)][DBLP ] ICETE (3), 2004, pp:172-180 [Conf ] Ilhem Lengliz , Haifa Touati , Fehmi Sanàa , Farouk Kamoun , Medy Sanadidi Measurements of TCPW ABSE Fairness and Friendliness. [Citation Graph (0, 0)][DBLP ] ICETE (2), 2004, pp:175-182 [Conf ] Ashwani K. Ramani , Sanjay Silakar , Parul Saxena Efficient Proxy Server Caching Using Web Usage Mining Technique on Web Logs - for Improving Hit Rate and Response Time. [Citation Graph (0, 0)][DBLP ] ICETE (1), 2004, pp:177-182 [Conf ] Naveen K. Chilamkurti , Ben Soh , Sri Vijaya Gutala Performance Analysis of a Split-Layer Multicast Mechanism with H.26L Video Coding Scheme. [Citation Graph (0, 0)][DBLP ] ICETE (3), 2004, pp:181-186 [Conf ] Chyan Yang , Chia Chun Wu Gender Differences in Online Shoppers' Decision-Making Styles. [Citation Graph (0, 0)][DBLP ] ICETE (1), 2004, pp:183-190 [Conf ] N. Rajendran , K. Yugandhar , Ved Prakash Gulati , S. Albert Rabara MPLS Architecture for Service Provider. [Citation Graph (0, 0)][DBLP ] ICETE (2), 2004, pp:183-190 [Conf ] Jani Puttonen , Ari Viinikainen , Miska Sulander , Timo Hämäläinen An Analysis of the Flow-Based Fast Handover Method for Mobile IPv6 Network. [Citation Graph (0, 0)][DBLP ] ICETE (3), 2004, pp:187-190 [Conf ] Neelima Arora , R. K. Shyamasundar UGSP: Authentication Based Secure Protocol for Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP ] ICETE (3), 2004, pp:191-196 [Conf ] Julian Gantner , Andreas Geyer-Schulz , Anke Thede A Single Sign-On Protocol for Distributed Web Applications Based on standard Internet Mechanisms. [Citation Graph (0, 0)][DBLP ] ICETE (2), 2004, pp:191-198 [Conf ] Xabiel G. Pañeda , David Melendi , Ricardo Bonis , Manuel Vilas , Isabel Rodríguez , Roberto García FESORIA - An Integrated Tool for Performance and Content Analysis, SLA Evaluation, Management and Smart Presentation for Video-Ondemand Services. [Citation Graph (0, 0)][DBLP ] ICETE (1), 2004, pp:191-203 [Conf ] Xueshan Shan A Mobile Service Gateway for Mobile Access to Enterprise Data and Services. [Citation Graph (0, 0)][DBLP ] ICETE (3), 2004, pp:197-202 [Conf ] Hao Wang , Heqing Guo , Manshan Lin New Fair Payment Protocols. [Citation Graph (0, 0)][DBLP ] ICETE (1), 2004, pp:199-203 [Conf ] Akihito Okura , Hiroshi Kawakami , Takeshi Ihara , Akira Miura Robust QoS Control for IP-Based Cellular Networks. [Citation Graph (0, 0)][DBLP ] ICETE (2), 2004, pp:199-208 [Conf ] Yoshiro Imai , Daisuke Yamane , Shin'ichi Masuda , Takaaki Izumo , Hitoshi Inomo , Wataru Shiraki , Osamu Sadayuki A Distributed Monitoring System Utilizing Cellular Phone as GUI. [Citation Graph (0, 0)][DBLP ] ICETE (3), 2004, pp:203-208 [Conf ] Wenyu Qu , Hong Shen , John Sum Further Analysis on the Application of Mobile Agents in Network Routing. [Citation Graph (0, 0)][DBLP ] ICETE (1), 2004, pp:204-212 [Conf ] Kazuo Kamata , Takeaki Shionome , Hideo Yamamoto Mobile Videophones for Signed Language Communications. [Citation Graph (0, 0)][DBLP ] ICETE (3), 2004, pp:209-216 [Conf ] Valentina Casola , Raffaele Chianese , Nicola Mazzocca , Massimiliano Rak , Antonino Mazzeo A Policy-Based Design Methodology and Performance Evaluation Framework for a Secure VoIP Infrastructure. [Citation Graph (0, 0)][DBLP ] ICETE (2), 2004, pp:209-215 [Conf ] Nenad Stankovic Internet, Wireless and Legacy Integration - Architectural Framework for Testing. [Citation Graph (0, 0)][DBLP ] ICETE (1), 2004, pp:213-220 [Conf ] Son T. Vuong , Xiaojuan Cai , Ling Yun , Wing-Keong Woo On Vulnerability Testing of VoIP Software - The MEGACO/H.248 System as an Example. [Citation Graph (0, 0)][DBLP ] ICETE (2), 2004, pp:216-222 [Conf ] Itaru Kaneko , Artur Lugmayr , Seppo Kalli , Abdellatif Benjelloun Touimi , Jong-Nam Kim , Claudio Alberti , Sadigurschi Yona , Jaejoon Kim , Maria Teresa Andrade MPEG-21 in Broadcasting Role in the Digital Transition of Broadcasting. [Citation Graph (0, 0)][DBLP ] ICETE (3), 2004, pp:217-222 [Conf ] Roberto García , Víctor G. García , Xabiel G. Pañeda , David Melendi , Jesús Pérez Modelling Procedure to Increase the Efficiency in Fiber Broadband Access Networks - Aggregating Traffic Streams in a Cable Network. [Citation Graph (0, 0)][DBLP ] ICETE (1), 2004, pp:221-230 [Conf ] Peter Qi Qiu , Ostap Monkewich , Robert L. Probert SIP Vulnerabilities Testing in Session Establishment & User Registration. [Citation Graph (0, 0)][DBLP ] ICETE (2), 2004, pp:223-229 [Conf ] Letian Rong , Ian S. Burnett Application Level Session Hand-Off Management in a Ubiquitous Multimedia Environment. [Citation Graph (0, 0)][DBLP ] ICETE (3), 2004, pp:223-229 [Conf ] Jason Reid , Andrew Clark , Juan Manuel González Nieto , Jason Smith , Kapali Viswanathan Denial of Service Issues in Voice Over IP Networks. [Citation Graph (0, 0)][DBLP ] ICETE (2), 2004, pp:230-237 [Conf ] Dan Feng , Fang Wang , Yuhui Deng , Jiangling Zhang Remove Multimedia Server Bottleneck by Network Attached Disk Array with Heterogeneous Dual Channels. [Citation Graph (0, 0)][DBLP ] ICETE (3), 2004, pp:230-235 [Conf ] Y. Xiang , M. Lan , W. Zhou Special Session on Web Applications in the Industry and Effects on the Business Performance Web Services in Hotel Industry. [Citation Graph (0, 0)][DBLP ] ICETE (1), 2004, pp:231-240 [Conf ] Omar Abouabdalla , R. Sureswaran Interworking Between the RSW Control Criteria and SIP Standard. [Citation Graph (0, 0)][DBLP ] ICETE (3), 2004, pp:236-242 [Conf ] Kapil Singh , Son T. Vuong BLAZE: A Mobile Agent Paradigm for VoIP Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP ] ICETE (2), 2004, pp:238-245 [Conf ] Jun Lai , Ben Soh , Mao Lin Huang A New Word-Intersection Clustering Method for Information Filtering. [Citation Graph (0, 0)][DBLP ] ICETE (1), 2004, pp:241-244 [Conf ] Rabi W. Habash , Mohd Dani Baba , Mat Ikram Yusof , Muhammad Ibrahim , Borhanuddin Mohd Ali Performance Analysis Study of Multicast Traffic in Star-Based Local WDM Lightwave Networks. [Citation Graph (0, 0)][DBLP ] ICETE (3), 2004, pp:243-249 [Conf ] Despoina Palaka , Petros Daras , Kosmas Petridis , Michael G. Strintzis A Novel Peer-to-Peer Payment System. [Citation Graph (0, 0)][DBLP ] ICETE (1), 2004, pp:245-250 [Conf ] Yong Song , Victor C. M. Leung , Konstantin Beznosov Implementing Multiple Channels over SSL. [Citation Graph (0, 0)][DBLP ] ICETE (2), 2004, pp:246-256 [Conf ] Yan Bai , Mabo Robert Ito Loss Control Through the Combination of Buffer Management and Packet Scheduling. [Citation Graph (0, 0)][DBLP ] ICETE (3), 2004, pp:250-255 [Conf ] Julia Gross , Joachim Zeiss , Sandford Bessler A Run Time Environment Extension for Personalized Web Services. [Citation Graph (0, 0)][DBLP ] ICETE (1), 2004, pp:251-256 [Conf ] David Melendi , Xabiel G. Pañeda , Roberto García , Ricardo Bonis , Víctor G. García Deployment of Live-Video Services Based on Streaming Technology over an HFC Network. [Citation Graph (0, 0)][DBLP ] ICETE (3), 2004, pp:256-263 [Conf ] Vanyo G. Peychev , Jimmy C. Dubuisson , Vladimir T. Dimitrov , Zhechka A. Toteva Structured Documents Represented by Conceptual Graphs - A Simple Formalism for Presenting Structured Documents. [Citation Graph (0, 0)][DBLP ] ICETE (1), 2004, pp:257-262 [Conf ] Aashish Sharma , William Yurcik An E-Tax Internet Filing System Incorporating Security and Usability Best Practices - Prototype Implementation of the Best Practices Identified in Government and Commercial E-Tax Filing Websites in the USA for Tax Season of 2003. [Citation Graph (0, 0)][DBLP ] ICETE (2), 2004, pp:257-262 [Conf ] Dmitry Ponomarev , Vladimir Krylov Web Mapping of Real-World Things and its Applications - Product WEBID as a Driving Force for new Supply Chains. [Citation Graph (0, 0)][DBLP ] ICETE (1), 2004, pp:263-267 [Conf ] Toshihiro Tabata , Kouichi Sakurai Design of Intrusion Detection System at User Level with System-Call Interposing. [Citation Graph (0, 0)][DBLP ] ICETE (2), 2004, pp:263-268 [Conf ] Rui Marcelino , Vitor M. M. da Silva , Sérgio M. M. de Faria Fast Event Detection in MPEG Video. [Citation Graph (0, 0)][DBLP ] ICETE (3), 2004, pp:264-268 [Conf ] Bader Maktari , Naoufel Werghi , Zoheir Ezziane TM.AN: Commanding the Power of Collaborative Task Management. [Citation Graph (0, 0)][DBLP ] ICETE (1), 2004, pp:268-274 [Conf ] Jun Ki Kim , Ho Suk Lee Moving Objects Segmentation Using Boundary. [Citation Graph (0, 0)][DBLP ] ICETE (3), 2004, pp:269-277 [Conf ] Colin Pattinson , Kemal Hajdarevic Training Network Managers to Recognise Intrusion Attacks. [Citation Graph (0, 0)][DBLP ] ICETE (2), 2004, pp:269-274 [Conf ] Ulf T. Mattsson A Real-Time Intrusion Prevention System for Commercial Enterprise Databases. [Citation Graph (0, 0)][DBLP ] ICETE (2), 2004, pp:275-280 [Conf ] Hiroshi Yamada , Akira Kawaguchi A Method for the Performance Analysis of Integrated Application Services - Simulating the Execution of Integrated Application Services. [Citation Graph (0, 0)][DBLP ] ICETE (1), 2004, pp:275-280 [Conf ] Nuno Santos , Pedro A. Amado Assunção A Video Transcoding Scheme for E-Learning Multimedia Applications. [Citation Graph (0, 0)][DBLP ] ICETE (3), 2004, pp:278-283 [Conf ] Ben Soh , Aaron Joy Optimal Analysis of a Hybrid Authentication System: Web Security versus System Performance. [Citation Graph (0, 0)][DBLP ] ICETE (2), 2004, pp:281-286 [Conf ] Sam Makki , Ho Ling Hsing , Demetrios Kazakos Predictive Querying in Spatio-Temporal Environment. [Citation Graph (0, 0)][DBLP ] ICETE (1), 2004, pp:281-286 [Conf ] Yuan-Liang Tang , Chun-Hung Chen Image Authentication Using Hierarchical Semi-Fragile Watermarks. [Citation Graph (0, 0)][DBLP ] ICETE (3), 2004, pp:284-289 [Conf ] Yu Miyoshi , Tatsuyuki Kimura Detour Path Resource Management Methods for IP Service Operation. [Citation Graph (0, 0)][DBLP ] ICETE (2), 2004, pp:287-292 [Conf ] Jesús E. Villadangos , José Javier Astrain , Alberto Córdoba , Manuel Prieto Local vs Remote Information for Location Based Services. [Citation Graph (0, 0)][DBLP ] ICETE (1), 2004, pp:287-293 [Conf ] Andrés Garay Acevedo Audio Watermarking Quality Evaluation. [Citation Graph (0, 0)][DBLP ] ICETE (3), 2004, pp:290-300 [Conf ] José Javier Astrain , Jesús E. Villadangos , Alberto Córdoba , Manuel Prieto Face Recognition in Biometric Vending Machines. [Citation Graph (0, 0)][DBLP ] ICETE (2), 2004, pp:293-298 [Conf ] Dionisis X. Adamopoulos , Constantine A. Papandreou Service Creation Technologies in Open Programmable Networks. [Citation Graph (0, 0)][DBLP ] ICETE (1), 2004, pp:294-299 [Conf ] InSeon Yoo , Ulrich Ultes-Nitsche Towards Run-Time Protocol Anomaly Detection and Verification. [Citation Graph (0, 0)][DBLP ] ICETE (2), 2004, pp:299-304 [Conf ] Victor Santos , Edmundo Monteiro , Antonio Gomes Martins The Electricity Retail Market: Requeriments for an E-Business System. [Citation Graph (0, 0)][DBLP ] ICETE (1), 2004, pp:300-305 [Conf ] Pedro Cano , Markus Koppenberger , Sylvain Le Groux , Perfecto Herrera , Julien Ricard , Nicolas Wack Knowledge and Content-Based Audio Retrieval Using Wordnet. [Citation Graph (0, 0)][DBLP ] ICETE (3), 2004, pp:301-308 [Conf ] Ibrahim Hajjeh , Ahmed Serhrouchni Integrating a Signature Module in SSL/TLS. [Citation Graph (0, 0)][DBLP ] ICETE (2), 2004, pp:305-310 [Conf ] Andreas Iselt , Andreas Kirstädter , Rayane Chahine The Role of ASON and GMPLS for the Bandwidth Trading Market - Bandwidth Brokerage Under the Influence of Novel Control Plane Technologies. [Citation Graph (0, 0)][DBLP ] ICETE (1), 2004, pp:306-311 [Conf ] Grzegorz Pastuszak Hardware-Oriented Analysis of the Arithmetic Coding - Comparative Study of JPEG2000 and H.264/AVC Compression Standards. [Citation Graph (0, 0)][DBLP ] ICETE (3), 2004, pp:309-316 [Conf ] Francesco Palmieri An High Performance Traffic Engineering Model for All-Optical Networks - Evolutionary GMPLS Control Plane Services in All-Optical Cross-Connects. [Citation Graph (0, 0)][DBLP ] ICETE (2), 2004, pp:311-316 [Conf ] Yang Xiang , Wanlei Zhou , Morshed U. Chowdhury Toward Pervasive Computing in Restaurant. [Citation Graph (0, 0)][DBLP ] ICETE (1), 2004, pp:312-0 [Conf ] Bruno Carpentieri , James A. Storer , Giovanni Motta , Francesco Rizzo Compression of Hyperspectral Imagery. [Citation Graph (0, 0)][DBLP ] ICETE (3), 2004, pp:317-324 [Conf ] Hanane El Bakkalis E-Payment Security - Recommendations About the Use of a PKI for E-Payment Security. [Citation Graph (0, 0)][DBLP ] ICETE (2), 2004, pp:317-0 [Conf ] Antonio Buemi , Arcangelo Bruna , Filippo Vella , Alessandro Capra Bayer Pattern Compression by Prediction Errors Vector Quantization. [Citation Graph (0, 0)][DBLP ] ICETE (3), 2004, pp:325-330 [Conf ] João Tavares , Antonio Navarro 0002 Forward Error Correction for Video Coding. [Citation Graph (0, 0)][DBLP ] ICETE (3), 2004, pp:331-338 [Conf ] Xiaojun Qi , Yutao Han An Integrated Global and Fuzzy Regional Approach to Content-Based Image Retrieval. [Citation Graph (0, 0)][DBLP ] ICETE (3), 2004, pp:339-350 [Conf ] Constantino Garcia , Francisco J. Suárez Real-Time Audio Capture, Compression & Streaming Service on a PDA. [Citation Graph (0, 0)][DBLP ] ICETE (3), 2004, pp:345-350 [Conf ] Juan Manuel Górriz Sáez , Carlos García Puntonet , Rubén Martín-Clemente Improving ICA Algorithms Applied to Predicting Stock Returns. [Citation Graph (0, 0)][DBLP ] ICETE (3), 2004, pp:351-355 [Conf ] Eckhard Buescher Knowledge Based 3D-Modelling by Selforganised Learning Algorithms. [Citation Graph (0, 0)][DBLP ] ICETE (3), 2004, pp:356-362 [Conf ] Tudor Barbu Discrete Speech Recognition Using a Hausdorff Based Metric - An Automatic Word-Based Speech Recognition Approach. [Citation Graph (0, 0)][DBLP ] ICETE (3), 2004, pp:363-368 [Conf ] Pietro Camarda , Antonio De Gioia , Domenico Striccoli Online Smoothing of VBR Video Streams in Systems with Variable Available Bandwidth. [Citation Graph (0, 0)][DBLP ] ICETE (3), 2004, pp:369-374 [Conf ] Carlos Serrão , Joaquim Marques Digital Music Electronic Commerce - Addressing the Super Distribution Model. [Citation Graph (0, 0)][DBLP ] ICETE (3), 2004, pp:375-378 [Conf ] Joelson Tadeu Vendramin , Keiko Verônica Ono Fonseca An Enhanced Smoothing Scheme for MPEG Video Streams Transmission. [Citation Graph (0, 0)][DBLP ] ICETE (3), 2004, pp:379-384 [Conf ] Mustafa Sert , Buyurman Baykal An Approach to the Semantic Modeling of Audio Databases. [Citation Graph (0, 0)][DBLP ] ICETE (3), 2004, pp:385-392 [Conf ] Jiankun Hu , Konrad Eriksson A New Distributed Contention Control Protocol for the IEEE 802.11 MAC Layer - Project of ATCRC Application Programms. [Citation Graph (0, 0)][DBLP ] ICETE (3), 2004, pp:393-401 [Conf ] Francisco Delicado , Pedro Cuenca , Luis Orozco-Barbosa A QoS-Aware Resource Request Mechanism for Delay Sensitive Services Over TDMA/TDD Wireless Networks. [Citation Graph (0, 0)][DBLP ] ICETE (3), 2004, pp:402-409 [Conf ] Johan Garcia , Anna Brunstrom An Experimental Study on the Performance and Fairness of Loss Differentiation for TCP. [Citation Graph (0, 0)][DBLP ] ICETE (3), 2004, pp:410-419 [Conf ] Markku Kojo , Davide Astuti , Laila Daniel , Aki Nyrhinen , Kimmo E. E. Raatikainen Improving TCP Performance over Wireless WANs Using TCP/IP-Friendly Link Layer. [Citation Graph (0, 0)][DBLP ] ICETE (3), 2004, pp:420-429 [Conf ] Annika Wennström , Anna Brunstrom , Juan Rendón , Jan H. Gustafsson The Impact of Preemptive Priority in GPRS on TCP Performance: A Measurement Study. [Citation Graph (0, 0)][DBLP ] ICETE (3), 2004, pp:430-436 [Conf ] Haowei Bai , Mohammed Atiquzzaman , David J. Lilja Using ECN Marks to Improve TCP Performance over Lossy Links. [Citation Graph (0, 0)][DBLP ] ICETE (3), 2004, pp:437-445 [Conf ]