[1]
S.I. Ahamed, S. Kim, C. Twining, and M. Crichton. An integrated approach to customize binary components. In Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Systems, volume 16, pages 689–694, 2004.
[2]
B.K. Alsberg, L. Kirkhus, T. Tangstad, and E. Anderssen. Data analysis of microarrays using SciCraft. In Knowledge Exploration in Life Science Informatics, pages 58–68. Springer Verlag, 2004. LNCS 3303.
[3]
Emory A. Anderson, Cynthia E. Irvine, and Roger R. Schell. Subversion as a threat in information warfare. Journal of Information Warfare, 2004.
[4]
Ruo Ando, Hideaki Miura, and Yoshiyasu Takefuji. File system driver filtering against metamorphic viral coding. WSEAS Transactions on Information Science and Applications, 4(1):1026–1034, October 2004.
[5]
(Author names in Chinese). Analyzing the attacks types on the cryptographic protocol. Computer Engineering and Applications, 40(1):16–19, 2004. In Chinese.
[6]
(Author names in Chinese). Symbolic model checking analysis for atomicity of Netbill protocol. Computer Engineering and Applications, 40(2):57–59, 2004. In Chinese.
[7]
Bouchalb Bahli and Younes Benslimane. An exploration of wireless computing risks: Development of a risk taxonomy. Information Management and Computer Security, 12(3):245–254, 2004. (doi:10.1108/09685220410542606)
[8]
Matthew Barrett and Clark Thomborson. Using NGSCB to mitigate existing software threats. In 2nd International Workshop on Certification and Security in Inter-Organizational E-Services (CSES 2004), August 2004.
[9]
A. Berglund, E. Berglund, A. Larsson, and M. Bang. Paper remote: An augmented television guide and remote control. Universal Access in the Information Society, 4(4):300–327, 2004. (doi:10.1007/s10209-004-0108-8)
[10]
S. Bistarelli, S.N. Foley, and B. O'Sullivan. Detecting and eliminating the cascade vulnerability problem from multilevel security networks using soft constraints. In Proceedings of the National Conference on Artificial Intelligence, pages 808–813, 2004.
[11]
Stefano Bistarelli, Simon N. Foley, and Barry O'Sullivan. Detecting and eliminating the cascade vulnerability problem using soft constraints. In Innovative Applications of Artificial Intelligence Conference (IAAI-04). AAAI Press, 2004.
[12]
Stefano Bistarelli, Simon N. Foley, and Barry O'Sullivan. Modeling and detecting the cascade vulnerability problem using soft constraints. In Proceedings of the 2004 ACM Symposium on Applied Computing, pages 383–390. ACM Press, 2004. (doi:10.1145/967900.967984)
[13]
Stephen Boyd and Angelos Keromytis. SQLrand: Preventing SQL injection attacks. In Markus Jakobsson, Moti Yung, and Jianying Zhou, editors, Applied Cryptography and Network Security, Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings, volume 3089 of Lecture Notes in Computer Science. Springer, 2004.
[14]
David D. Brandt, Kenwood Hall, Mark Burton Anderson, Craig D. Anderson, and George Bradford Collins. System and methodology providing automation security analysis, validation, and learning in an industrial controller environment. European Patent 1420317, 2004.
[15]
Silas S. Brown. Conversion of notations. Technical Report UCAM-CL-TR-591, University of Cambridge, Computer Laboratory, Optional 2004.
[16]
A.A. Bulgak and M.N. Shastri. Design optimization of fork and join open assembly systems via genetic algorithms. In IIE Annual Conference and Exhibition 2004, pages 675–681, 2004.
[17]
J. Bywater, M-L Bourguet, G. Kazai, M. Lalmas, and A. Pearmain. Scalable and personalised broadcast service. In EuroITV 2004 European Conference on Interactive Television, March 2004.
[18]
L. Catuogno and I. Visconti. An architecture for kernel-level verification of executables at run time. Computer Journal, 47(5):511–526, September 2004. (doi:10.1093/comjnl/47.5.511)
[19]
D. Chapman and L. Smalov. On information security guidelines for small/medium enterprises. In ICEIS 2004 - Proceedings of the Sixth International Conference on Enterprise Information Systems, pages 3–9, 2004.
[20]
Q. Chen, C. Zhang, and S. Zhang. Verifying the payment authorization in SET protocol. In Intelligent Data Engineering and Automated Learning, volume 2690, pages 914–918. Springer-Verlag, 2004. Lecture Notes in Computer Science 2690. (doi:10.1007/b11717)
[21]
D. Critchlow and N. Zhang. Revocation invocation for accountable anonymous pki certificate trees. In Proceedings — International Symposium on Computers and Communications, volume 1, pages 386–392, 2004.
[22]
Manuel José Damásio, Célia Quico, and André Ferreira. Interactive television usage and applications: the Portuguese case-study. Computers & Graphics, 28(2):139–148, April 2004. (doi:10.1016/j.cag.2003.12.001)
[23]
R. Davidson and S. Lambert. Applying the australian and new zealand risk management standard to information systems in SMEs. The Australian Journal of Information Systems, 12(1), 2004.
[24]
Michael Day and Gerard Clifton. DPC/PADI What's new in digital preservation, chapter The longevity of Web references. the Digital Preservation Coalition and the PADI (Preserving Access to Digital Information) gateway, February 2004. Online http://www.dpconline.org/graphics/whatsnew/issue7.html.
[25]
C. Distante, A. Leone, L. My, M. Rizzello, and P. Siciliano. A video compression algorithm based on matching pursuit integrated into a wireless embedded sensor node compliant with IEEE 1451.1 standard architecture. In M. H. Hamza, editor, Proceedings of the Second IASTED International Conference on Communication and Computer Networks, pages 479–484. IASTED, ACTA Press, November 2004.
[26]
John J. Dorak, Jr., Stephen B. Cagle, and Richard L. Spagna. Method and system for secure debugging of a secure software module. United States Patent 6,742,177, May 2004. Assignee: International Business Machines Corporation (Armonk, NY).
[27]
J. Du, J. Jiao, and X. Li. A security blueprint for e-business applications based on the three-tier architecture. In 2004 IEEE Conference on Cybernetics and Intelligent Systems, pages 878–883, 2004.
[28]
Fabiani E., Gouyen C., and Pottier B. Intermediate level components for reconfigurable platforms. In Computer Systems: Architectures, Modeling, and Simulation, pages 59–68. Springer Verlag, 2004. LNCS 3133. (doi:10.1007/b98714)
[29]
J. Edmonds and M. Papa. Cryptographic protocol analysis using goal extraction. In Proceedings of the ITCC'04 Information Technology: Coding and Computing, pages 75–80, April 2004. (doi:10.1109/ITCC.2004.1286429)
[30]
J. Edmonds and M. Papa. Cryptographic protocol analysis using goal extraction. In International Conference on Information Technology: Coding Computing, ITCC, pages 75–80, 2004.
[31]
Dave L. Edyburn. 2003 in review: A synthesis of the special education technology literature. Journal of Special Education Technology, 19(4):57–80, 2004.
[32]
Nadav Eiron, Kevin S. McCurley, and John A. Tomlin. Ranking the web frontier. In Proceedings of the 13th conference on World Wide Web, pages 309–318. ACM Press, 2004. (doi:10.1145/988672.988714)
[33]
Michael A. Epstein. Method and apparatus for confirming and revoking trust in a multi-level content distribution system. United States Patent 6,748,531, June 2004. Assignee: Koninklijke Philips Electronics N.V (Eindhoven, NL).
[34]
Naomi Falby, J.D. Fulp, Paul C. Clark, R. Scott Cote, Cynthia E. Irvine, George W. Dinolt, Timothy E. Levin, Matthew Rose, and Deborah Shifflett. Information assurance capacity building: A case study. In Proceedings of the Colloquium on Information Systems Security Education, pages 31–36, 2004.
[35]
M. Harville, R. Samadani, D. Tretter, D. Mukherjee, U. Gargi, and N. Chang. Mediabeads: An architecture for path-enhanced media applications. In 2004 IEEE International Conference on Multimedia and Expo (ICME), volume 1, pages 455–458, 2004.
[36]
Cynthia E. Irvine, Timothy E. Levin, Thuy D. Nguyen, and George W. Dinolt. The trusted computing exemplar project. In Proceedings of the 2004 IEEE Systems Man and Cybernetics Information Assurance Workshop, pages 109–115, June 2004.
[37]
R. Jiang, J.-H. Li, and L. Pan. Analysis of CCITT X.509 based on strand space model. Shanghai Jiaotong Daxue Xuebao/Journal of Shanghai Jiaotong University, 38(SUPPL. 2):169–173, 2004.
[38]
Kathryn R. Johnson, Eric J. Hester, Lisa M. Schilling, and Robert P. Dellavalle. Addressing internet reference loss. The Lancet, 363(9409):660–661, February 2004. (doi:10.1016/S0140-6736(04)15608-0)
[39]
J. Jones, C. Dunnavant, and T. Jay. A pattern language for language implementation. In The 11th Conference on Pattern Languages of Programs (PLoP2004), 2004.
[40]
Ajay K. Katangur, Yi Pan, and Martin D. Fraser. Simulated annealing routing and wavelength lower bound estimation on wavelength-division multiplexing optical multistage networks. Optical Engineering, 43(5):1080–1091, May 2004. (doi:10.1117/1.1690276)
[41]
Holger M. Kienle, Marin Litoiu, and Hausi A. Müller. Using components to build software engineering tools. In 4th International Workshop on Adoption-Centric Software Engineering: ACSE 2004, pages 36–42, May 2004.
[42]
Il Gon Kim. Formal Analysis and Automatic Code Generation of Security Protocols. PhD thesis, Dept. of Computer Science and Engineering, Korea University, 2004.
[43]
Wallace Koehler. A longitudinal study of web pages continued: a consideration of document persistence. Information Research, 9(2), January 2004. Paper no. 174.
[44]
Lap Chung Lam and Tzi cker Chiueh. Automatic extraction of accurate application-specific sandboxing policy. In International Symposium on Recent Advances in Intrusion Detection RAID 2004, pages 1–20. Eurécom Institute, Springer-Verlag, September 2004. Lecture Notes in Computer Science 3224. (doi:10.1007/b100714)
[45]
Matthias Lampe, Martin Strassner, and Elgar Fleisch. A ubiquitous computing environment for aircraft maintenance. In Proceedings of the 2004 ACM symposium on Applied computing, pages 1586–1592. ACM Press, 2004. (doi:10.1145/967900.968217)
[46]
Yibei Ling and Wai Chen. Measuring cache freshness by additive age. SIGOPS Operating Systems Review, 38(3):12–17, 2004. (doi:10.1145/1035834.1035836)
[47]
Seng Wai Loke and Arkady Zaslavsky. Integrated ambient services as enhancement to physical marketplaces. In Proc. 37th Hawaii Int. Conf. on System Sciences (HICSS-37), pages 4509–4516, January 2004.
[48]
J. Luo, W. Zhao, T. Qin, R.-K. Jiang, L. Zhang, and J.-S. Sun. Decomposition method for object-oriented systems based on iterative analysis of the directed weighted graph. Ruan Jian Xue Bao/Journal of Software, 15(9):1292–1300, 2004.
[49]
N. Matsuki. MZ-platform: A component switching and executing environment. Management Information Systems, 10:393–401, 2004.
[50]
S. Mauw, W.T. Wiersma, and T.A.C. Willemse. Language-driven system design. International Journal of Software Engineering and Knowledge Engineering, 14(6):625–663, 2004. (doi:10.1142/S0218194004001828)
[51]
Steve C McConnell. Code Complete : A Practical Handbook of Software Construction. Microsoft Press, Redmond, WA, second edition, 2004.
[52]
K. Moulinos, J. Iliadis, and V. Tsoumas. Towards secure sealing of privacy policies. Information Management and Computer Security, 12(4):351–361, June 2004.
[53]
Mor Naaman, Yee Jiun Song, Andreas Paepcke, and Hector Garcia-Molina. Automatic organization for digital photographs with geographic coordinates. In Proceedings of the 2004 joint ACM/IEEE conference on Digital libraries, pages 53–62. ACM Press, 2004. (doi:10.1145/996350.996366)
[54]
Gregory M. P. O'Hare, Stephen Keegan, and Michael J. O'Grady. Realising the ambient intelligence vision through the deployment of mobile, intentional agents. In Panos Markopoulos, Berry Eggen, Emile H. L. Aarts, and James L. Crowley, editors, Ambient Intelligence: Second European Symposium, EUSAI 2004, pages 339–350. Springer Verlag, November 2004. Lecture Notes in Computer Science 3295. (doi:10.1007/b102265)
[55]
E. Papaioannou, E. Borälv, A. Demiris, N. Johansson, and N. Ioannidis. User interface design for multi-platform interactive sports content broadcasting. In Proceedings of the ACM Advanced Visual Interfaces Conference, 2004.
[56]
C. Park and J. Kim. Efficient overlay network for P2P content sharing based on network identifier. In Advances in Multimedia Information Processing — PCM 2004, pages 373–380. Springer-Verlag, 2004. Lecture Notes in Computer Science 3332. (doi:0.1007/b104117)
[57]
Agapios Platis, Costas Lambrinoudakis, and Assimakis Leros. Public a probabilistic model for evaluating the operational cost of PKI-based financial transactions. In Sokratis K. Katsikas, Stefanos Gritzalis, and Javier Lopez, editors, Public Key Infrastructure: First European PKI Workshop: Research and Applications, EuroPKI 2004, pages 149–159. Springer-Verlag, June 2004. Lecture Notes in Computer Science 3093.
[58]
A. Prata, N. Guimaraes, and Kommers P. iTV enhanced system for generating multi-device personalized online learning environments. In Proceedings of the 4th AH2004 Workshop on Personalization in Future TV, 2004.
[59]
Michael Quantrill, Alan Chamberlain, and Roy Kalawsky. Accessible interface design for domestic pervasive environments: A preliminary investigation into the requirements of the visually impaired. In Christian Stary and Constantine Stephanides, editors, User-Centred Interaction Paradigms for Universal Access in the Information Society. Proceedings of the 8th ERCIM Workshop on User Interfaces for All. Springer-Verlag, June 2004. Lecture Notes in Computer Science.
[60]
V. Reich and D. Rosenthal. Preserving today's scientific record for tomorrow — LOCKSS marries age old concepts of librarianship with modern technology. British Medical Journal, 328(7431):61–62, January 2004.
[61]
Phillip Relf. Achieving software quality through source code readability. In QUALCON 2004: Quality — The Key to Organisational Prosperity. Australian Organisation for Quality, October 2004.
[62]
C. Roser, M. Nakano, and M. Tanaka. Economic optimization in manufacturing systems through optimal buffer allocation. In IFAC Multitrack Conference on Advanced Control Strategies for Social and Economic Systems, September 2004.
[63]
Rok Rupnik and Marjan Krisper. Context-aware mobile application model. Elektrotehniski Vestnik/Electrotechnical Review, 71(4):215–219, 2004.
[64]
Rok Rupnik and Marjan Krisper. Mobile applications: A new application model in information systems. In Mobile Information Systems: IFIP TC 8 Working Conference on Mobile Information Systems (MOBIS). Springer Verlag, 2004.
[65]
Peter Salus. The bookworm. ;login:, 29(3):60, April 2004.
[66]
L.M. Schilling, J.D. Wren, and R.P. Dellavalle. Bioinformatics leads charge by publishing more internet addresses in abstracts than any other journal. Bioinformatics, 20(17):2903–2903, November 2004. (doi:10.1093/bioinformatics/bth385)
[67]
Ray Schneider. Resource reviews: Software engineering processes. Software Quality Professional, 6(4):38–39, March 2004.
[68]
Carmine Sellitto. Web cit(ation)es in scholarly articles. In Proceedings of the 10th Australian World Wide Web (AusWeb) Conference: The Challenge of Integration as the Web Moves into its Second Decade, July 2004.
[69]
Carmine Sellitto. A study of missing web-cites in scholarly articles: towards an evaluation framework. Journal of Information Science, 30(6):484–495, 2004. (doi:10.1177/0165551504047822)
[70]
A.A.N. Shirehjini. A novel interaction metaphor for personal environment control: direct manipulation of physical environment based on 3D visualization. Computers and Graphics, 28(5):667–675, October 2004. (doi:10.1016/j.cag.2004.06.006)
[71]
Amol Shukla, Lily Li, Anand Subramanian, Paul A. S. Ward, and Tim Brecht. Evaluating the performance of user-space and kernel-space web servers. In Proceedings of 14th IBM Center for Advanced Studies Conference (CASCON). IBM, October 2004.
[72]
J. MacGregor Smith and F. R. B. Cruz. The buffer allocation problem for general finite buffer queueing networks. IIE Transactions on Design and Manufacturing, pages 343–365, 2004. (doi:10.1080/07408170590916986)
[73]
M. Steiner. Secure Group Key agreement. PhD thesis, Universitas Saraviensis, 2004.
[74]
Martin Strassner, Elgar Fleisch, and Matthias Lampe. Ubiquitous computing in der flugzeugwartung. In Multikonferenz Wirtschaftsinformatik — Mobile and Collaborative Business, Essen, Germany, March 2004.
[75]
J. Strüker and S. Sackmann. New forms of customer communication: Concepts and pilot projects. In In Proceedings of the Americas Conference on Information Systems (AMCIS '04), August 2004.
[76]
Ketty Tanizar. Alternatives to the gradient in optimal transfer line buffer allocation. Master's thesis, Massachusetts Institute of Technology, September 2004.
[77]
Jeffrey L. Taylor. C/C++ programmer's book review. C/C++ User's Journal, page 61, August 2004.
[78]
The FreeBSD Documentation Project. The FreeBSD Handbook. Walnut Creek, third edition, 2004.
[79]
Martin Tomko. Case study — assessing spatial distribution of web resources for navigation services. In 4th International Workshop on Web and Wireless Geographical Information Systems W2GIS04, 2004.
[80]
V. Ungureanu. Formal support for certificate management policies. Computers and Security, 23(4):300–311, 2004. (doi:10.1016/j.cose.2004.02.001)
[81]
Ana I. Vicente. La convergence de la sécurité informatique et la protection des données à caractère personnel: vers une nouvelle approche juridique. Lex Electronica, 9(1), 2004.
[82]
Christian Wege. Automated Support for Process Assessment in Test-Driven Development. PhD thesis, Eberhard-Karls-Universität Tübingen, 2004.
[83]
Jonathan D. Wren. 404 not found: the stability and persistence of URLs published in medline. Bioinformatics, 20(5):668–672, 2004. (doi:10.1093/bioinformatics/btg465)
[84]
T. Wu, B. Sui, D. Du, Z. Han, and F. Zhai. A model combining discrete event system simulation and genetic algorithm for buffer allocation in unreliable large production lines. Tsinghua Science and Technology, 9(3):363–368, June 2004.
[85]
X.Q. Xie, J. Tang, J.Z. Li, and K.H. Wang. A component retrieval method based on facet-weight self-learning. In Content Computing, pages 437–448. Springer Verlag, 2004. LNCS 3309.
[86]
T. Yamakami. A large-scale mobile internet analysis: Experimental observations on compact HTML sites. In 2004 Joint Conference of the 10th Asia-Pacific Conference on Communications and the 5th International Symposium on Multi-Dimensional Mobile Communications Proceedings, APCC/MDMC'04, volume 2, pages 903–907, 2004.
[87]
Yves Younan, Wouter Joosen, and Frank Piessens. Code injection in C and C++ : A survey of vulnerabilities and countermeasures. Report CW 386, Katholieke Universiteit Leuven, Department of Computer Science, Heberlee, Belgium, July 2004. Available online http://fort-knox.org/CW386.pdf.
[88]
Andy Zaidman and Serge Demeyer. Analyzing large event traces with the help of a coupling metrics. In Fifth International Workshop on Object-Oriented Reengineering, June 2004.
[89]
Andy Zaidman and Serge Demeyer. Managing trace data volume through a heuristical clustering process based on event execution frequency. In 8th European Conference on Software Maintenance and Reengineering (CSMR 2004), 24-26 March 2004, Tampere, Finland, Proceedings, pages 329–338. IEEE Computer Society, 2004.
[90]
W. Zhao, B. R. Bryant, R. R. Raje, M. Auguston, C. C. Burt, and A. M. Olson. Automated glue/wrapper code generation in integration of distributed and heterogeneous software components. In 8th IEEE International Enterprise Distributed Object Computing Conference (EDOC2004), pages 275–285, 2004. (doi:10.1109/EDOC.2004.1342524)
[1]
S.I. Ahamed, S. Kim, C. Twining, and M. Crichton. An integrated approach to customize binary components. In Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Systems, volume 16, pages 689–694, 2004.

[2]
B.K. Alsberg, L. Kirkhus, T. Tangstad, and E. Anderssen. Data analysis of microarrays using SciCraft. In Knowledge Exploration in Life Science Informatics, pages 58–68. Springer Verlag, 2004. LNCS 3303.

[3]
Emory A. Anderson, Cynthia E. Irvine, and Roger R. Schell. Subversion as a threat in information warfare. Journal of Information Warfare, 2004.

[4]
Ruo Ando, Hideaki Miura, and Yoshiyasu Takefuji. File system driver filtering against metamorphic viral coding. WSEAS Transactions on Information Science and Applications, 4(1):1026–1034, October 2004.

[5]
(Author names in Chinese). Analyzing the attacks types on the cryptographic protocol. Computer Engineering and Applications, 40(1):16–19, 2004. In Chinese.

[6]
(Author names in Chinese). Symbolic model checking analysis for atomicity of Netbill protocol. Computer Engineering and Applications, 40(2):57–59, 2004. In Chinese.

[7]
Bouchalb Bahli and Younes Benslimane. An exploration of wireless computing risks: Development of a risk taxonomy. Information Management and Computer Security, 12(3):245–254, 2004. (doi:10.1108/09685220410542606)

[8]
Matthew Barrett and Clark Thomborson. Using NGSCB to mitigate existing software threats. In 2nd International Workshop on Certification and Security in Inter-Organizational E-Services (CSES 2004), August 2004.

[9]
A. Berglund, E. Berglund, A. Larsson, and M. Bang. Paper remote: An augmented television guide and remote control. Universal Access in the Information Society, 4(4):300–327, 2004. (doi:10.1007/s10209-004-0108-8)

[10]
S. Bistarelli, S.N. Foley, and B. O'Sullivan. Detecting and eliminating the cascade vulnerability problem from multilevel security networks using soft constraints. In Proceedings of the National Conference on Artificial Intelligence, pages 808–813, 2004.

[11]
Stefano Bistarelli, Simon N. Foley, and Barry O'Sullivan. Detecting and eliminating the cascade vulnerability problem using soft constraints. In Innovative Applications of Artificial Intelligence Conference (IAAI-04). AAAI Press, 2004.

[12]
Stefano Bistarelli, Simon N. Foley, and Barry O'Sullivan. Modeling and detecting the cascade vulnerability problem using soft constraints. In Proceedings of the 2004 ACM Symposium on Applied Computing, pages 383–390. ACM Press, 2004. (doi:10.1145/967900.967984)

[13]
Stephen Boyd and Angelos Keromytis. SQLrand: Preventing SQL injection attacks. In Markus Jakobsson, Moti Yung, and Jianying Zhou, editors, Applied Cryptography and Network Security, Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings, volume 3089 of Lecture Notes in Computer Science. Springer, 2004.

[14]
David D. Brandt, Kenwood Hall, Mark Burton Anderson, Craig D. Anderson, and George Bradford Collins. System and methodology providing automation security analysis, validation, and learning in an industrial controller environment. European Patent 1420317, 2004.

[15]
Silas S. Brown. Conversion of notations. Technical Report UCAM-CL-TR-591, University of Cambridge, Computer Laboratory, Optional 2004.

[16]
A.A. Bulgak and M.N. Shastri. Design optimization of fork and join open assembly systems via genetic algorithms. In IIE Annual Conference and Exhibition 2004, pages 675–681, 2004.

[17]
J. Bywater, M-L Bourguet, G. Kazai, M. Lalmas, and A. Pearmain. Scalable and personalised broadcast service. In EuroITV 2004 European Conference on Interactive Television, March 2004.

[18]
L. Catuogno and I. Visconti. An architecture for kernel-level verification of executables at run time. Computer Journal, 47(5):511–526, September 2004. (doi:10.1093/comjnl/47.5.511)

[19]
D. Chapman and L. Smalov. On information security guidelines for small/medium enterprises. In ICEIS 2004 - Proceedings of the Sixth International Conference on Enterprise Information Systems, pages 3–9, 2004.

[20]
Q. Chen, C. Zhang, and S. Zhang. Verifying the payment authorization in SET protocol. In Intelligent Data Engineering and Automated Learning, volume 2690, pages 914–918. Springer-Verlag, 2004. Lecture Notes in Computer Science 2690. (doi:10.1007/b11717)

[21]
D. Critchlow and N. Zhang. Revocation invocation for accountable anonymous pki certificate trees. In Proceedings — International Symposium on Computers and Communications, volume 1, pages 386–392, 2004.

[22]
Manuel José Damásio, Célia Quico, and André Ferreira. Interactive television usage and applications: the Portuguese case-study. Computers & Graphics, 28(2):139–148, April 2004. (doi:10.1016/j.cag.2003.12.001)

[23]
R. Davidson and S. Lambert. Applying the australian and new zealand risk management standard to information systems in SMEs. The Australian Journal of Information Systems, 12(1), 2004.

[24]
Michael Day and Gerard Clifton. DPC/PADI What's new in digital preservation, chapter The longevity of Web references. the Digital Preservation Coalition and the PADI (Preserving Access to Digital Information) gateway, February 2004. Online http://www.dpconline.org/graphics/whatsnew/issue7.html.

[25]
C. Distante, A. Leone, L. My, M. Rizzello, and P. Siciliano. A video compression algorithm based on matching pursuit integrated into a wireless embedded sensor node compliant with IEEE 1451.1 standard architecture. In M. H. Hamza, editor, Proceedings of the Second IASTED International Conference on Communication and Computer Networks, pages 479–484. IASTED, ACTA Press, November 2004.

[26]
John J. Dorak, Jr., Stephen B. Cagle, and Richard L. Spagna. Method and system for secure debugging of a secure software module. United States Patent 6,742,177, May 2004. Assignee: International Business Machines Corporation (Armonk, NY).

[27]
J. Du, J. Jiao, and X. Li. A security blueprint for e-business applications based on the three-tier architecture. In 2004 IEEE Conference on Cybernetics and Intelligent Systems, pages 878–883, 2004.

[28]
Fabiani E., Gouyen C., and Pottier B. Intermediate level components for reconfigurable platforms. In Computer Systems: Architectures, Modeling, and Simulation, pages 59–68. Springer Verlag, 2004. LNCS 3133. (doi:10.1007/b98714)

[29]
J. Edmonds and M. Papa. Cryptographic protocol analysis using goal extraction. In International Conference on Information Technology: Coding Computing, ITCC, pages 75–80, 2004.

[30]
J. Edmonds and M. Papa. Cryptographic protocol analysis using goal extraction. In Proceedings of the ITCC'04 Information Technology: Coding and Computing, pages 75–80, April 2004. (doi:10.1109/ITCC.2004.1286429)

[31]
Dave L. Edyburn. 2003 in review: A synthesis of the special education technology literature. Journal of Special Education Technology, 19(4):57–80, 2004.

[32]
Nadav Eiron, Kevin S. McCurley, and John A. Tomlin. Ranking the web frontier. In Proceedings of the 13th conference on World Wide Web, pages 309–318. ACM Press, 2004. (doi:10.1145/988672.988714)

[33]
Michael A. Epstein. Method and apparatus for confirming and revoking trust in a multi-level content distribution system. United States Patent 6,748,531, June 2004. Assignee: Koninklijke Philips Electronics N.V (Eindhoven, NL).

[34]
Naomi Falby, J.D. Fulp, Paul C. Clark, R. Scott Cote, Cynthia E. Irvine, George W. Dinolt, Timothy E. Levin, Matthew Rose, and Deborah Shifflett. Information assurance capacity building: A case study. In Proceedings of the Colloquium on Information Systems Security Education, pages 31–36, 2004.

[35]
M. Harville, R. Samadani, D. Tretter, D. Mukherjee, U. Gargi, and N. Chang. Mediabeads: An architecture for path-enhanced media applications. In 2004 IEEE International Conference on Multimedia and Expo (ICME), volume 1, pages 455–458, 2004.

[36]
Cynthia E. Irvine, Timothy E. Levin, Thuy D. Nguyen, and George W. Dinolt. The trusted computing exemplar project. In Proceedings of the 2004 IEEE Systems Man and Cybernetics Information Assurance Workshop, pages 109–115, June 2004.

[37]
R. Jiang, J.-H. Li, and L. Pan. Analysis of CCITT X.509 based on strand space model. Shanghai Jiaotong Daxue Xuebao/Journal of Shanghai Jiaotong University, 38(SUPPL. 2):169–173, 2004.

[38]
Kathryn R. Johnson, Eric J. Hester, Lisa M. Schilling, and Robert P. Dellavalle. Addressing internet reference loss. The Lancet, 363(9409):660–661, February 2004. (doi:10.1016/S0140-6736(04)15608-0)

[39]
J. Jones, C. Dunnavant, and T. Jay. A pattern language for language implementation. In The 11th Conference on Pattern Languages of Programs (PLoP2004), 2004.

[40]
Ajay K. Katangur, Yi Pan, and Martin D. Fraser. Simulated annealing routing and wavelength lower bound estimation on wavelength-division multiplexing optical multistage networks. Optical Engineering, 43(5):1080–1091, May 2004. (doi:10.1117/1.1690276)

[41]
Holger M. Kienle, Marin Litoiu, and Hausi A. Müller. Using components to build software engineering tools. In 4th International Workshop on Adoption-Centric Software Engineering: ACSE 2004, pages 36–42, May 2004.

[42]
Il Gon Kim. Formal Analysis and Automatic Code Generation of Security Protocols. PhD thesis, Dept. of Computer Science and Engineering, Korea University, 2004.

[43]
Wallace Koehler. A longitudinal study of web pages continued: a consideration of document persistence. Information Research, 9(2), January 2004. Paper no. 174.

[44]
Lap Chung Lam and Tzi cker Chiueh. Automatic extraction of accurate application-specific sandboxing policy. In International Symposium on Recent Advances in Intrusion Detection RAID 2004, pages 1–20. Eurécom Institute, Springer-Verlag, September 2004. Lecture Notes in Computer Science 3224. (doi:10.1007/b100714)

[45]
Matthias Lampe, Martin Strassner, and Elgar Fleisch. A ubiquitous computing environment for aircraft maintenance. In Proceedings of the 2004 ACM symposium on Applied computing, pages 1586–1592. ACM Press, 2004. (doi:10.1145/967900.968217)

[46]
Yibei Ling and Wai Chen. Measuring cache freshness by additive age. SIGOPS Operating Systems Review, 38(3):12–17, 2004. (doi:10.1145/1035834.1035836)

[47]
Seng Wai Loke and Arkady Zaslavsky. Integrated ambient services as enhancement to physical marketplaces. In Proc. 37th Hawaii Int. Conf. on System Sciences (HICSS-37), pages 4509–4516, January 2004.

[48]
J. Luo, W. Zhao, T. Qin, R.-K. Jiang, L. Zhang, and J.-S. Sun. Decomposition method for object-oriented systems based on iterative analysis of the directed weighted graph. Ruan Jian Xue Bao/Journal of Software, 15(9):1292–1300, 2004.

[49]
N. Matsuki. MZ-platform: A component switching and executing environment. Management Information Systems, 10:393–401, 2004.

[50]
S. Mauw, W.T. Wiersma, and T.A.C. Willemse. Language-driven system design. International Journal of Software Engineering and Knowledge Engineering, 14(6):625–663, 2004. (doi:10.1142/S0218194004001828)

[51]
Steve C McConnell. Code Complete : A Practical Handbook of Software Construction. Microsoft Press, Redmond, WA, second edition, 2004.

[52]
K. Moulinos, J. Iliadis, and V. Tsoumas. Towards secure sealing of privacy policies. Information Management and Computer Security, 12(4):351–361, June 2004.

[53]
Mor Naaman, Yee Jiun Song, Andreas Paepcke, and Hector Garcia-Molina. Automatic organization for digital photographs with geographic coordinates. In Proceedings of the 2004 joint ACM/IEEE conference on Digital libraries, pages 53–62. ACM Press, 2004. (doi:10.1145/996350.996366)

[54]
Gregory M. P. O'Hare, Stephen Keegan, and Michael J. O'Grady. Realising the ambient intelligence vision through the deployment of mobile, intentional agents. In Panos Markopoulos, Berry Eggen, Emile H. L. Aarts, and James L. Crowley, editors, Ambient Intelligence: Second European Symposium, EUSAI 2004, pages 339–350. Springer Verlag, November 2004. Lecture Notes in Computer Science 3295. (doi:10.1007/b102265)

[55]
E. Papaioannou, E. Borälv, A. Demiris, N. Johansson, and N. Ioannidis. User interface design for multi-platform interactive sports content broadcasting. In Proceedings of the ACM Advanced Visual Interfaces Conference, 2004.

[56]
C. Park and J. Kim. Efficient overlay network for P2P content sharing based on network identifier. In Advances in Multimedia Information Processing — PCM 2004, pages 373–380. Springer-Verlag, 2004. Lecture Notes in Computer Science 3332. (doi:0.1007/b104117)

[57]
Agapios Platis, Costas Lambrinoudakis, and Assimakis Leros. Public a probabilistic model for evaluating the operational cost of PKI-based financial transactions. In Sokratis K. Katsikas, Stefanos Gritzalis, and Javier Lopez, editors, Public Key Infrastructure: First European PKI Workshop: Research and Applications, EuroPKI 2004, pages 149–159. Springer-Verlag, June 2004. Lecture Notes in Computer Science 3093.

[58]
A. Prata, N. Guimaraes, and Kommers P. iTV enhanced system for generating multi-device personalized online learning environments. In Proceedings of the 4th AH2004 Workshop on Personalization in Future TV, 2004.

[59]
Michael Quantrill, Alan Chamberlain, and Roy Kalawsky. Accessible interface design for domestic pervasive environments: A preliminary investigation into the requirements of the visually impaired. In Christian Stary and Constantine Stephanides, editors, User-Centred Interaction Paradigms for Universal Access in the Information Society. Proceedings of the 8th ERCIM Workshop on User Interfaces for All. Springer-Verlag, June 2004. Lecture Notes in Computer Science.

[60]
V. Reich and D. Rosenthal. Preserving today's scientific record for tomorrow — LOCKSS marries age old concepts of librarianship with modern technology. British Medical Journal, 328(7431):61–62, January 2004.

[61]
Phillip Relf. Achieving software quality through source code readability. In QUALCON 2004: Quality — The Key to Organisational Prosperity. Australian Organisation for Quality, October 2004.

[62]
C. Roser, M. Nakano, and M. Tanaka. Economic optimization in manufacturing systems through optimal buffer allocation. In IFAC Multitrack Conference on Advanced Control Strategies for Social and Economic Systems, September 2004.

[63]
Rok Rupnik and Marjan Krisper. Context-aware mobile application model. Elektrotehniski Vestnik/Electrotechnical Review, 71(4):215–219, 2004.

[64]
Rok Rupnik and Marjan Krisper. Mobile applications: A new application model in information systems. In Mobile Information Systems: IFIP TC 8 Working Conference on Mobile Information Systems (MOBIS). Springer Verlag, 2004.

[65]
Peter Salus. The bookworm. ;login:, 29(3):60, April 2004.

[66]
L.M. Schilling, J.D. Wren, and R.P. Dellavalle. Bioinformatics leads charge by publishing more internet addresses in abstracts than any other journal. Bioinformatics, 20(17):2903–2903, November 2004. (doi:10.1093/bioinformatics/bth385)

[67]
Ray Schneider. Resource reviews: Software engineering processes. Software Quality Professional, 6(4):38–39, March 2004.

[68]
Carmine Sellitto. A study of missing web-cites in scholarly articles: towards an evaluation framework. Journal of Information Science, 30(6):484–495, 2004. (doi:10.1177/0165551504047822)

[69]
Carmine Sellitto. Web cit(ation)es in scholarly articles. In Proceedings of the 10th Australian World Wide Web (AusWeb) Conference: The Challenge of Integration as the Web Moves into its Second Decade, July 2004.

[70]
A.A.N. Shirehjini. A novel interaction metaphor for personal environment control: direct manipulation of physical environment based on 3D visualization. Computers and Graphics, 28(5):667–675, October 2004. (doi:10.1016/j.cag.2004.06.006)

[71]
Amol Shukla, Lily Li, Anand Subramanian, Paul A. S. Ward, and Tim Brecht. Evaluating the performance of user-space and kernel-space web servers. In Proceedings of 14th IBM Center for Advanced Studies Conference (CASCON). IBM, October 2004.

[72]
J. MacGregor Smith and F. R. B. Cruz. The buffer allocation problem for general finite buffer queueing networks. IIE Transactions on Design and Manufacturing, pages 343–365, 2004. (doi:10.1080/07408170590916986)

[73]
M. Steiner. Secure Group Key agreement. PhD thesis, Universitas Saraviensis, 2004.

[74]
Martin Strassner, Elgar Fleisch, and Matthias Lampe. Ubiquitous computing in der flugzeugwartung. In Multikonferenz Wirtschaftsinformatik — Mobile and Collaborative Business, Essen, Germany, March 2004.

[75]
J. Strüker and S. Sackmann. New forms of customer communication: Concepts and pilot projects. In In Proceedings of the Americas Conference on Information Systems (AMCIS '04), August 2004.

[76]
Ketty Tanizar. Alternatives to the gradient in optimal transfer line buffer allocation. Master's thesis, Massachusetts Institute of Technology, September 2004.

[77]
Jeffrey L. Taylor. C/C++ programmer's book review. C/C++ User's Journal, page 61, August 2004.

[78]
The FreeBSD Documentation Project. The FreeBSD Handbook. Walnut Creek, third edition, 2004.

[79]
Martin Tomko. Case study — assessing spatial distribution of web resources for navigation services. In 4th International Workshop on Web and Wireless Geographical Information Systems W2GIS04, 2004.

[80]
V. Ungureanu. Formal support for certificate management policies. Computers and Security, 23(4):300–311, 2004. (doi:10.1016/j.cose.2004.02.001)

[81]
Ana I. Vicente. La convergence de la sécurité informatique et la protection des données à caractère personnel: vers une nouvelle approche juridique. Lex Electronica, 9(1), 2004.

[82]
Christian Wege. Automated Support for Process Assessment in Test-Driven Development. PhD thesis, Eberhard-Karls-Universität Tübingen, 2004.

[83]
Jonathan D. Wren. 404 not found: the stability and persistence of URLs published in medline. Bioinformatics, 20(5):668–672, 2004. (doi:10.1093/bioinformatics/btg465)

[84]
T. Wu, B. Sui, D. Du, Z. Han, and F. Zhai. A model combining discrete event system simulation and genetic algorithm for buffer allocation in unreliable large production lines. Tsinghua Science and Technology, 9(3):363–368, June 2004.

[85]
X.Q. Xie, J. Tang, J.Z. Li, and K.H. Wang. A component retrieval method based on facet-weight self-learning. In Content Computing, pages 437–448. Springer Verlag, 2004. LNCS 3309.

[86]
T. Yamakami. A large-scale mobile internet analysis: Experimental observations on compact HTML sites. In 2004 Joint Conference of the 10th Asia-Pacific Conference on Communications and the 5th International Symposium on Multi-Dimensional Mobile Communications Proceedings, APCC/MDMC'04, volume 2, pages 903–907, 2004.

[87]
Yves Younan, Wouter Joosen, and Frank Piessens. Code injection in C and C++ : A survey of vulnerabilities and countermeasures. Report CW 386, Katholieke Universiteit Leuven, Department of Computer Science, Heberlee, Belgium, July 2004. Available online http://fort-knox.org/CW386.pdf.

[88]
Andy Zaidman and Serge Demeyer. Analyzing large event traces with the help of a coupling metrics. In Fifth International Workshop on Object-Oriented Reengineering, June 2004.

[89]
Andy Zaidman and Serge Demeyer. Managing trace data volume through a heuristical clustering process based on event execution frequency. In 8th European Conference on Software Maintenance and Reengineering (CSMR 2004), 24-26 March 2004, Tampere, Finland, Proceedings, pages 329–338. IEEE Computer Society, 2004.

[90]
W. Zhao, B. R. Bryant, R. R. Raje, M. Auguston, C. C. Burt, and A. M. Olson. Automated glue/wrapper code generation in integration of distributed and heterogeneous software components. In 8th IEEE International Enterprise Distributed Object Computing Conference (EDOC2004), pages 275–285, 2004. (doi:10.1109/EDOC.2004.1342524)