Scheduled System Maintenance:
On Wednesday, July 29th, IEEE Xplore will undergo scheduled maintenance from 7:00-9:00 AM ET (11:00-13:00 UTC). During this time there may be intermittent impact on performance. We apologize for any inconvenience.
By Topic

Information Technology: Coding and Computing [Computers and Communications], 2003. Proceedings. ITCC 2003. International Conference on

Date 28-30 April 2003

Filter Results

Displaying Results 1 - 25 of 133
  • Development of marking-support soft in task-given-type examination

    Publication Year: 2003 , Page(s): 76 - 80
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (421 KB) |  | HTML iconHTML  

    A task-given-type examination is a system of compiling questions for examinations. In this system, teachers show students some samples of examination questions beforehand, which in turn, teachers choose questions for a examination from these samples, and then give them to the students at the examination. It is very important to develop supportive software for marking, because this system requires ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Approaches to implementing and teaching human computer interaction

    Publication Year: 2003 , Page(s): 81 - 84
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (237 KB) |  | HTML iconHTML  

    Computer science education is built upon the fundamentals of problem solving. Our students are capable of solving problems and expressing their solutions in a concrete manner using a programming language. These skills are undoubtedly powerful. However, as the expansion of computer science-related contributions to the world continues, we need to incorporate HCI into our curriculum so that students ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Rate-based end-to-end congestion control of multimedia traffic in packet switched networks

    Publication Year: 2003 , Page(s): 342 - 346
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (950 KB) |  | HTML iconHTML  

    This paper proposes an explicit rate-based end-to-end congestion control mechanism to alleviate congestion of multimedia traffic in packet switched networks such as the Internet. The congestion is controlled by adjusting the transmission rates of the sources in response to the feedback information from destination such as the buffer occupancy, packet arrival rate and service rate at the outgoing l... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Streaming audio over Bluetooth ACL links

    Publication Year: 2003 , Page(s): 287 - 291
    Cited by:  Papers (3)  |  Patents (9)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (296 KB) |  | HTML iconHTML  

    This paper describes the Bluetooth radio technology as an enabling platform to wirelessly stream audio content from hotspots to small form factor mobile devices over short ranges. The paper has been derived from my Mphil thesis based on streaming voice over Internet protocol over Bluetooth links. One can imagine a scenario of a person with a Bluetooth enabled mobile telephone streaming Moving Pict... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computer Educational Datapath (CED): basic computer design for K-12 education

    Publication Year: 2003 , Page(s): 86 - 90
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (2668 KB)  

    Through the educational tools that we are developing, the building blocks of computer hardware can be explored by middle school and high school students. The main purpose of this educational tool is to initiate interest in digital hardware design through the demonstration of computer processor design. The Computer Educational Datapath (CED) allows the user to build and program a single-cycle datap... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Deblocking of DCT-compressed images using noise injection followed by image denoising

    Publication Year: 2003 , Page(s): 472 - 475
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (430 KB) |  | HTML iconHTML  

    A new approach is proposed to solve the blocking artifact problem that results from block transform-based image compression at very low bit-rates. In our approach, we attempt to recover the quantization noise for the transform coefficients by adding uniform random noise to them. This results in a decompressed image that is corrupted by noise of the AWGN type, rather than a blocky image. This recas... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A federated model for secure Web-based videoconferencing

    Publication Year: 2003 , Page(s): 396 - 400
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (237 KB) |  | HTML iconHTML  

    This paper describes efforts underway within Internet2 to create a secure federated IP based videoconferencing model. The objective is to create an environment that is user-friendly, ensures user privacy, and simplifies user management. This model makes use of the Session Initiation Protocol (SIP) as the underlying session establishment protocol. Since the session can (and most often will) be, bet... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wireless commerce: reducing technical and commercial barriers

    Publication Year: 2003 , Page(s): 292 - 296
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (313 KB)  

    Banks are the natural 'franchise' holder for marry payment instruments; however mobile network operators hold a franchise over services and capabilities delivered within their infrastructure environment. While there is bank-operator tension about 'ownership' of the customer in the above context, understanding the underlying causes of these tensions helps to identify a path for merging the capabili... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel feature-based robust audio watermarking for copyright protection

    Publication Year: 2003 , Page(s): 554 - 558
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (588 KB)  

    A novel public audio watermarking scheme based on the statistical feature manipulation in the wavelet domain combined with an error correction coding technique is proposed in this paper. The algorithm is shown to be rather robust against a variety of common signal processing manipulations and synchronization attacks including the very challenging random cropping and time scale modifications. The w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis and regeneration of hypermedia contents through Java and XML tools

    Publication Year: 2003 , Page(s): 449 - 453
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (2695 KB)  

    This paper presents a tool for the analysis and regeneration of Web contents, implemented through XML and Java. At the moment, the Web content delivery from server to clients is carried out without taking into account clients' characteristics. Heterogeneous and diverse characteristics, such as user's preferences, different capacities of the client's devices, different types of access, state of the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mining for profitable customers

    Publication Year: 2003 , Page(s): 640 - 644
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (483 KB)  

    Customers are not created equal. However, segmenting customers in terms of their profitability is still an underutilized approach in marketing nowadays. Many E-commerce sites still apply the same customer care to all customers without calculating whether the expected profit from a customer is greater than the marketing cost to her or not. In this paper, a decision theoretic approach to segmenting ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wavelet based feature reduction method for effective classification of hyperspectral data

    Publication Year: 2003 , Page(s): 483 - 487
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (616 KB)  

    As the number of remote sensing applications grows, more intensive is the demand in computationally effective and accurate procedures for spectral analyses. It is known that the computation cost increases with the number of features used for classification. For the maximum likelihood (ML) classifier, the increase is quadratic. Thus, the dimensionality of the initial data is to be reduced prior to ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cluster-weighted modeling as a basis for fuzzy modeling

    Publication Year: 2003 , Page(s): 627 - 634
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (406 KB) |  | HTML iconHTML  

    Cluster-weighted modeling (CWM) is emerging as a versatile tool for modeling dynamical systems. It is a mixture density estimator around local models. To be specific, the input regions together with output regions are treated to be Gaussian serving as local models. These models are linked by a linear or non-linear function involving the mixture of densities of local models. The present work shows ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Database design for dynamic online surveys

    Publication Year: 2003 , Page(s): 665 - 671
    Cited by:  Patents (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (804 KB)  

    This paper discusses the architecture and implementation of dynamic Web-based surveys with an emphasis on the recently completed Survey2001 project. Survey2001 was made available at the National Geographic Web site for several months starting October 2001 and could be taken in four different languages: English, German, Spanish and Italian. This paper discusses surveys and the advantages of Web-bas... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards end-to-end loss guarantees for streaming video in a multi-hop IP network

    Publication Year: 2003 , Page(s): 401 - 407
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (302 KB) |  | HTML iconHTML  

    Video streaming over IP networks requires end-to-end loss guarantees. In order to achieve the required end-to-end loss performance, new algorithms for the distribution of end-to-end loss requirements into local loss constraints, as well as provision of local loss assurance, are proposed. Much of recent research pays little attention to the problem of distributing end-to-end loss requirements to lo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new quality of service metric for hard/soft real-time applications

    Publication Year: 2003 , Page(s): 347 - 351
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (259 KB) |  | HTML iconHTML  

    Real-time applications often have mixed hard and soft deadlines, can be preempted subject to the cost of context switching or the restart of computation, and have various data dependency. The simple but widely used task completion ratio, as the quality of service (QoS) metric, does not capture these characteristics and can not reflect user perceived QoS well. In this paper, we propose a new quanti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experiments on local positioning with Bluetooth

    Publication Year: 2003 , Page(s): 297 - 303
    Cited by:  Papers (24)  |  Patents (4)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (319 KB) |  | HTML iconHTML  

    This paper presents the design and implementation of the Bluetooth local positioning application. Positioning is based on received power levels, which are converted to distance estimates according to a simple propagation model. The extended Kalman filter computes a 3D position estimate on the basis of distance estimates. With the used Bluetooth hardware, the mean absolute error of positioning was ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Methodologies for Web information system design

    Publication Year: 2003 , Page(s): 420 - 424
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (277 KB) |  | HTML iconHTML  

    The Web information space is rapidly growing in the size and the diversity of both its data and its audience. A consequence is that Web information systems (WIS) in many applications replace existing traditional (not Web based) information systems. Since the nature of WIS differs from the nature of traditional information systems there is a strong demand for design methodologies specifically orien... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A versatile and scalable digit-serial/parallel multiplier architecture for finite fields GF(2m)

    Publication Year: 2003 , Page(s): 692 - 700
    Cited by:  Papers (5)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (344 KB) |  | HTML iconHTML  

    We present an architecture for digit-serial multiplication in finite fields GF(2m) with applications to cryptography. The proposed design uses polynomial basis representation and interleaves multiplication steps with degree reduction steps. An M-bit multiplier works with arbitrary irreducible polynomials and can be used for any binary field of order 2m≤2M. We in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A family of image watermarking schemes based on lossy compression

    Publication Year: 2003 , Page(s): 559 - 563
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (289 KB) |  | HTML iconHTML  

    This paper describes a methodology for obtaining watermarking schemes using different compression algorithms in the mark embedding process. The compression methods enclose both spatial and transformed domains and both scalar and vector quantization. The result is a family of watermarking algorithms which are robust against different lossy image compression, filtering, cropping and row/column remov... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Networking in the new ICT curricula

    Publication Year: 2003 , Page(s): 20 - 24
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (254 KB) |  | HTML iconHTML  

    New guidelines for ICT curricula have recently appeared, both in Europe and the USA. New European guidelines are sponsored by the European Commission and are a consequence of the political mandate to implement the European Higher Education Area. In the USA, new guidelines proposed by ACM/IEEE are an update of previous guidelines by those institutions, basically motivated by technological change. T... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fast prefix code processing

    Publication Year: 2003 , Page(s): 206 - 211
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (289 KB) |  | HTML iconHTML  

    As large main memory becomes more and more available at reasonable prices, processing speed of large data sets becomes more important than reducing main memory usage of internal data structures which are small compared to the available main memory capacity. In this paper we describe the use of a finite state machine for fast processing of prefix codes that significantly improves decoding performan... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A search engine selection methodology

    Publication Year: 2003 , Page(s): 122 - 129
    Cited by:  Patents (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (865 KB)  

    Commercial search engines, especially meta-search engines, were designed to locate the information by querying multiple conventional search engines and integrating the partial results generated by each search engine. A few meta-search engines attempt to intelligently select the search engines that perform best for a particular query. The problem of finding the search engine that performs best for ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementation of EC payment system using the telephone number

    Publication Year: 2003 , Page(s): 304 - 308
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (491 KB)  

    This paper introduces the electronic commerce payment system-telephone number (ECPS-TN) with a deferred payment method that bills the price of merchandise in electronic commerce shopping mall based on business to customer (B2C) together with a telephone bill, and presents its configurations, functions, and performances. The ECPS-TN consists of a server and gateway system that presents the service ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Direct Huffman coding and decoding using the table of code-lengths

    Publication Year: 2003 , Page(s): 237 - 241
    Cited by:  Papers (3)  |  Patents (3)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (268 KB) |  | HTML iconHTML  

    A new Huffman coding and decoding technique is presented. There is no need to construct a full size Huffman table in this technique; instead, the symbols are encoded directly from the table of code-lengths. For decoding purposes a new Condensed Huffman Table (CHT) is also introduced. It is shown that by employing this technique both encoding and decoding operations become significantly faster, and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.