Search Results - "ITRE 2005. 3rd International Conference on Information Technology: Research and Education, 2005"

Refine Results
  1. 1

    Project based learning as a pedagogical tool for embedded system education by Roy Chaoming Hsu, Wen-Chung Liu

    “…In this paper, a project-based learning strategy is proposed as a pedagogical tool for embedded system education targeting for undergraduate engineering…”
    Get full text
    Conference Proceeding
  2. 2

    A conceptual model with empirical verification for constructing non-profit organization Web sites by Yu-Teng Jang, Shuchih Ernest Chang

    “…A module-based Web site design model containing various functions was proposed with corresponding guidelines and suggestions, for non-profit organizations…”
    Get full text
    Conference Proceeding
  3. 3

    Notice of Violation of IEEE Publication Principles: Efficient query routing in peer-to-peer networks by Gatani, L., Lo Re, G., Noto, L.

    “…In peer-to-peer (P2P) networks, efficient and scalable data retrieval represents a key problem. Unstructured P2P networks avoid the limitations of centralized…”
    Get full text
    Conference Proceeding
  4. 4

    A self-regulated learning system with scaffolding support for self-regulated e/m-learning by Kuei-Ping Shih, Chih-Yung Chang, Hung-Chang Chen, Sheng-Shih Wang

    “…The paper proposes a self-regulated learning system with scaffold support for self-regulated e/m-learning. With the support of the self-regulated system, the…”
    Get full text
    Conference Proceeding
  5. 5

    Mining Web logs for a personalized recommender system by Puntheeranurak, S., Tsuji, H.

    “…As the Web rapidly grows, however, the number of matching pages increases at a tremendous rate when users use the search engine for finding some information…”
    Get full text
    Conference Proceeding
  6. 6

    Robust image hashing based on SPIHT by Shih-Hsuan Yang, Chin-Feng Chen

    “…Media hashing is an important resolving skill of copyright infringement. In this paper, a novel robust image hashing scheme is proposed. The set partitioning…”
    Get full text
    Conference Proceeding
  7. 7

    Structure learning of Bayesian networks using a semantic genetic algorithm-based approach by Shetty, S., Song, M.

    “…A Bayesian network model is a popular technique for data mining due to its intuitive interpretation. This paper presents a semantic genetic algorithm (SGA) to…”
    Get full text
    Conference Proceeding
  8. 8

    Intelligent intra-field interpolation for motion compensated deinterlacing by Yu-Cheng Fan, Hung-Shih Lin, Hen-Wai Tsao, Ching-Chih Kuo

    “…This paper proposes a novel intelligent intra-field interpolation for motion compensated deinterlacing. This method combines the advantage of cubic curve…”
    Get full text
    Conference Proceeding
  9. 9

    Directed geographical traceback by Gao, Z., Ansari, N.

    “…In this paper, a new mechanism for IP traceback based on the geographic information rather than the traditional IP address information is proposed. The…”
    Get full text
    Conference Proceeding
  10. 10

    A practical voting system for small-scale election by Chun-Hua Chen

    “…Voting is common in our daily life, from electing president to electing committee; we need to set up a complete electronic voting scheme suitable for all kinds…”
    Get full text
    Conference Proceeding
  11. 11

    IT-graduate abilities: performance gap as an input for curriculum improvement by Jamaludin, Z., Mutalib, A.A.

    “…This paper reports one of the initiatives done by the Faculty of Information Technology, Universiti Utara Malaysia in its efforts to improve the IT curriculum…”
    Get full text
    Conference Proceeding
  12. 12

    Ontology-based information retrieval and extraction by Chen-Yu Lee, Von-Wun Soo

    “…Using domain knowledge and semantics to conduct effective information retrieval (IR) is one of the major challenges in IR. In this paper we introduce a…”
    Get full text
    Conference Proceeding
  13. 13
  14. 14

    Greetings from the General Chair by Wen-Tsuen Chen

    “…Presents the welcome message from the conference proceedings…”
    Get full text
    Conference Proceeding
  15. 15

    A token-based h-out of-k distributed mutual exclusion algorithm for mobile ad hoc networks by Cheng-Zen Yang

    “…Distributed mutual exclusion is a challenging problem in mobile ad hoc networks (MANETs). Due to the dynamic characteristics of MANETs, only a few algorithms…”
    Get full text
    Conference Proceeding
  16. 16

    An FP-split method for fast association rules mining by Chin-Feng Lee, Tsung-Hsien Shen

    “…Recently, most of the studies on association rules mining focused on improving the efficiency of frequent itemsets generation. To our best knowledge, the…”
    Get full text
    Conference Proceeding
  17. 17

    Optimal transrating via DCT coefficients modification and dropping by Benyaminovich, S., Hadar, O., Kaminsky, E.

    “…Coefficient dropping is a common tool for video transrating in order to adapt it to various network bandwidth constraints. Several recent works propose…”
    Get full text
    Conference Proceeding
  18. 18

    Reliable image matching via modified Hausdorff distance with normalized gradient consistency measure by Chyuan-Huei Thomas Yang, Shang-Hong Lai, Long-Wen Chang

    “…Reliable image matching is important to many problems in computer vision, image processing and pattern recognition. Hausdorff distance and many of its…”
    Get full text
    Conference Proceeding
  19. 19

    Context discovery in sensor networks by Chia-Hsing Hou, Hung-Chang Hsiao, Chung-Ta King, Chun-Nan Lu

    “…Context discovery refers loosely to the operations of extraction, aggregation, storage and deduction of environmental information. Such information can be…”
    Get full text
    Conference Proceeding
  20. 20

    Soft computing approach to steganalysis of LSB embedding in digital images by Benton, R., Chu, H.

    “…Steganography methods embed hidden data in digital images to provide a means of secret communication. Steganalysis methods detect such embedded data based on…”
    Get full text
    Conference Proceeding