default search action
6th ITNG 2009: Las Vegas, Nevada, USA
- Shahram Latifi:
Sixth International Conference on Information Technology: New Generations, ITNG 2009, Las Vegas, Nevada, USA, 27-29 April 2009. IEEE Computer Society 2009, ISBN 978-0-7695-3596-8
Circuit & System Design
- Xiaomin Jin, Simeon Trieu, Fei Wang, Bei Zhang, Tao Dai, Xiangning Kang, Guoyi Zhang:
Design Simulation of Top ITO Gratings to Improve Light Transmission for Gallium Nitride LEDs. 1-4 - Fei Wang, Xiaolong Wu:
Non-volatile Memory Devices Based on Chalcogenide Materials. 5-9 - Masaya Yoshikawa, Hidekazu Terai:
Dedicated Hardware for Ant Colony Optimization Using Distributed Memory. 10-15 - Yu Zhang, Binxing Fang:
A Novel Approach to Scan Detection on the Backbone. 16-21 - Xing Xie, Mengliang Liu, Leiguang Wang, Qianqin Qin:
A Remote Sensing Image Segmentation Method Based on Spectral and Texture Information Fusion. 22-27 - Liwen Huang, Jing Yang, Xiaolong Wu, Xiaoqian Hu:
A Novel Biological Recognition Method Based on Cranio-maxillo-facial Feature Information. 28-32 - Xuejun Zhao, Ruihu Li, Yingjie Lei:
Classification of Quaternary [21s + 4, 3] Optimal Self-orthogonal Codes. 33-34 - Faruk Yildiz:
Low Power Ambient Energy Harvesting, Conversion, and Storage Circuits. 35-40 - Shaharuddin Salleh, Nor Haniza Sarmin:
Dynamic Single-Row Routing Technique for Channel Assignments. 41-46 - Mahmoud Fawzy Wagdy, Brandon Casey Cabrales:
A Novel Flash Fast-Locking Digital Phase-Locked Loop. 47-52 - Jianping Quan, Guoqiang Bai:
A DPA-Resistant Digit-Parallel Modular Multiplier over GF (2m). 53-57 - Jianping Quan, Guoqiang Bai:
A New Method to Reduce the Side-Channel Leakage Caused by Unbalanced Capacitances of Differential Interconnections in Dual-Rail Logic Styles. 58-63 - Shruti Jain, Pradeep K. Naik, D. S. Chauhan, Rohit Sharma:
Computational Modeling of Cell Survival/Death Using MATLAB Simulator. 64-68 - Pierre Mars, Dave McIntosh:
Using a Supercapacitor to Power Wireless Nodes from a Low Power Source such as a 3V Button Battery. 69-78 - Jing Yang, Yongquan Wang, Min He, Fei Wang, Xiaolong Wu:
A Novel EKF-GPS Algorithm for Bridge Deformation Monitoring System. 79-83 - Chao-Jang Hwang, Chih-Tung Lin, Shi-Jinn Horng:
Implementation of Different Function Units Using Flexible and Reconfigurable Architecture. 84-89 - Fadi El-Hassan, Raymond Peterkin, Mohamed Abou-Gabal, Dan Ionescu:
A High-Performance Architecture of an XML Processor for SIP-Based Presence. 90-95 - Dawid Zydek, Henry Selvaraj:
Processor Allocation Problem for NoC-Based Chip Multiprocessors. 96-101 - Farhad Babak, Parviz Keshavarzi:
A Novel DDFS Based on Trigonometric Approximation with a Scaling Block. 102-106
Information Systems & Internet Technology
- Lingfu Xie, Du Xu:
The Two-Level-Turn-Model Fault-Tolerant Routing Scheme in Tori with Convex and Concave Faults. 107-113 - Jae-Yoon Jung:
Generating Rule-Based Executable Process Models for Service Outsourcing. 114-118 - Glaucia Braga e Silva, Breno Lisi Romano, Henrique Fernandes de Campos, Ricardo Godoi Vieira, Adilson Marques da Cunha, Luiz Alberto Vieira Dias:
Integrating Amazonic Heterogeneous Hydrometeorological Databases. 119-124 - Ben W. Y. Kam, Thomas R. Dean:
Lessons Learned from a Survey of Web Applications Testing. 125-130 - Daniel Riesco, German Montejano, Narayan C. Debnath, Manuel Pérez Cota:
Formalizing the Management Automation with Workflow of Software Development Process Based on the SPEM Activities View. 131-136 - Robert Uzal, Narayan C. Debnath, Daniel Riesco, German Montejano:
Software Projects Finance Support: Preliminary Talks between Software Project Managers and Potential Investors. 137-142 - Fabio Augusto de Santana Silva, Maria del Rosario Girardi, Lucas Rêgo Drumond:
An Information Retrieval Model for the Semantic Web. 143-148 - G. Praveen Kumar, Anirban Sarkar, Narayan C. Debnath:
A New Algorithm for Frequent Itemset Generation in Non-Binary Search Space. 149-153 - Ian Stewart, Wenying Feng, Selim G. Akl:
A Further Improvement on a Genetic Algorithm. 154-159 - Jöran Beel, Bela Gipp:
Google Scholar's Ranking Algorithm: The Impact of Articles' Age (An Empirical Study). 160-164 - Mehdi Fasanghari, Maryam MohamedPour, Mohammad Amin Mohamedpour:
A Novel Method Combining ORESTE, Fuzzy Set Theory, and TOPSIS Method for Ranking the Information and Communication Technology Research Centers of Iran. 165-170 - Sadeta Krijestorac, Jonathan Bagby:
Comparison of QOS Fixed and Limited Interleaved Polling with Cyclic Demand Proportionality Algorithms. 171-176
AI Applications
- Daniel Vladusic, Ales Cernivec, Bostjan Slivnik:
Improving Job Scheduling in GRID Environments with Use of Simple Machine Learning Methods. 177-182 - Cenk Çelik, Inci Sariçiçek:
Tabu Search for Parallel Machine Scheduling with Job Splitting. 183-188 - Kota Tsubouchi, Kazuo Hiekata, Hiroyuki Yamato:
Scheduling Algorithm for On-Demand Bus System. 189-194
Software Engineering
- (Withdrawn) The Explore of the Law Role in Software Requirements Engineering. 195-198
- Cagatay Catal, Ugur Sevim, Banu Diri:
Clustering and Metrics Thresholds Based Software Fault Prediction of Unlabeled Program Modules. 199-204 - Suzanna Schmeelk, Bill Mills, Robert E. Noonan:
Managing Post-Development Fault Removal. 205-210 - Boleslaw Mikolajczak, Abhishek Singh:
TransCPN - Software Tool for Transformation of Colored Petri Nets. 211-216 - Hakun Lee, Keiichi Kaneko:
Two New Algorithms for Software Watermarking by Register Allocation and their Empirical Evaluation. 217-222 - Yoonsik Cheon, Carmen Avila, Steve Roach, Cuauhtemoc Munoz, Neith Estrada, Valeria Fierro, Jessica Romo:
An Aspect-Based Approach to Checking Design Constraints at Run-Time. 223-228 - John Huan Vu, Niklas Frojd, Clay Shenkel-Therolf, David S. Janzen:
Evaluating Test-Driven Development in an Industry-Sponsored Capstone Project. 229-234 - Brunil Dalila Romero Marino, Hisham M. Haddad:
Security Vulnerabilities and Mitigation Strategies for Application Development. 235-240 - Ziad Al-Sharif, Clinton L. Jeffery:
An Agent-Oriented Source-Level Debugger on Top of a Monitoring Framework. 241-247 - Jianchao Han, Mohsen Beheshti, Kazimierz Kowalski, Joel Ortiz, Johnly Tomelden:
Component-Based Software Architecture Design for Network Intrusion Detection and Prevention System. 248-253 - Shalini Chandra, Raees Ahmad Khan, Alka Agrawal:
Security Estimation Framework: Design Phase Perspective. 254-259 - Christopher M. Kanode, Hisham M. Haddad:
Software Engineering Challenges in Game Development. 260-265 - Pavle Guduric, Arno Puder, Rainer Todtenhoefer:
A Comparison between Relational and Operational QVT Mappings. 266-271 - Travis D. Breaux, Calvin Powers:
Early Studies in Acquiring Evidentiary, Reusable Business Process Models for Legal Compliance. 272-277 - Mohammad Hamdaqa, Abdelwahab Hamou-Lhadj:
Citation Analysis: An Approach for Facilitating the Understanding and the Analysis of Regulatory Compliance Documents. 278-283 - Philippe Dugerdil, David Kony, Javier Belmonte:
An Eclipse Plugin for the Automated Reverse-Engineering of Software Programs. 284-289
Service-Oriented Computing & Applications
- Sedighe Moosavi, Mir Ali Seyyedi, Nasrollah Moghadam:
A Method for Service Oriented Design. 290-295 - Sattanathan Subramanian:
Highly-Available Web Service Community. 296-301 - Luiz Olavo Bonino da Silva Santos, Eduardo Goncalves da Silva, Luís Ferreira Pires, Marten van Sinderen:
Towards a Goal-Based Service Framework for Dynamic Service Discovery and Composition. 302-307 - Maqbool Hussain, Muhammad Afzal, Hafiz Farooq Ahmad, Naeem Khalid, Arshad Ali:
Healthcare Applications Interoperability through Implementation of HL7 Web Service Basic Profile. 308-313 - Shari S. C. Shang, Ya-Ling Wu, Oliver C. L. Hou:
An Analysis of Business Models of Web 2.0 Application. 314-319 - Chia-Hui Wei, Yeo-Hao Chin, Chun-Ta Li:
A Secure Billing Protocol for Grid Computing. 320-325 - Wei-Lun Chang, Yi-Ping Lo, Yu-Ting Hong:
A Heuristic Model of Network-Based Group Decision Making for E-Services. 326-331 - Odorico von Susani, Philippe Dugerdil:
Cross-Organizational Service Evolution Management. 332-337 - Fernando J. Maymi, Manuel Rodríguez-Martínez:
Obstacle Avoidance for Utility-Based Geocasting. 338-343
Information Security & Privacy
- Patrick Henry Engebretson, Joshua J. Pauli:
Leveraging Parent Mitigations and Threats for CAPEC-Driven Hierarchies. 344-349 - Bin Sun, Wang Chuan, Jiang Li, Legand L. Burge III:
A Multi-Signature Scheme Based on Two Difficult Mathematics Problems. 350-355 - Yuriy I. Izbenko, Vladyslav Kovtun, Alexandr Kuznetsov:
The Design of Boolean Functions by Modified Hill Climbing Method. 356-361 - Qiaoliang Li, Xiaoming Wang, Yingshu Li, Yi Pan, Pingzhi Fan:
Construction of Anti-Collusion Codes Based on Cover-Free Families. 362-365 - Yiqun Xiong, Rangding Wang:
A Robust Audio Aggregate Zero-Watermark Algorithm. 366-370 - Huo-Chong Ling, Swee-Huay Heng, Bok-Min Goi:
Attacks on a Block Based SVD Watermarking Scheme. 371-375 - Se-Min Kim, Zi-Qiang Cheng, Kee-Young Yoo:
A New Steganography Scheme Based on an Index-Color Image. 376-381 - Myong H. Kang, Amitabh Khashnobish:
A Peer-to-Peer Federated Authentication System. 382-387 - Jianqi Zhu, Yanheng Liu, Ke Yin, KeXin Yin:
A Novel Method-Based Software Watermarking Scheme. 388-392 - Andreas Ekelhart, Thomas Neubauer, Stefan Fenz:
Automated Risk and Utility Management. 393-398 - Madasu Hanmandlu, H. M. Gupta, Neha Mittal, Shantaram Vasikarla:
An Authentication System Based on Palmprint. 399-404 - Abdullah M. Alnajim, Malcolm Munro:
An Anti-Phishing Approach that Uses Training Intervention for Phishing Websites Detection. 405-410 - Sergio Castillo-Perez, Joaquín García-Alfaro:
Evaluation of Two Privacy-Preserving Protocols for the DNS. 411-416 - Raylin Tso, Takeshi Okamoto, Eiji Okamoto:
Efficient Short Signatures from Pairing. 417-422 - Ping Yi, Tianhao Tong, Ning Liu, Yue Wu, Jianqing Ma:
Security in Wireless Mesh Networks: Challenges and Solutions. 423-428 - Manabu Hirano, Tomohiro Umeda, Takeshi Okuda, Eiji Kawai, Suguru Yamaguchi:
T-PIM: Trusted Password Input Method against Data Stealing Malware. 429-434 - Ryu Watanabe, Toshiaki Tanaka:
Federated Authentication Mechanism using Cellular Phone - Collaboration with OpenID. 435-442 - Hua Jiang, Xinxing Tan:
Bisimulations in the Boxed Safe Ambients with Password. 443-448 - Chun-Ta Li, Min-Shiang Hwang, Yan-Chi Lai:
A Verifiable Electronic Voting Scheme over the Internet. 449-454 - Guido Marco Bertoni, Luca Breveglieri, Alessandro Cominola, Filippo Melzani, Ruggero Susella:
Practical Power Analysis Attacks to RSA on a Large IP Portfolio SoC. 455-460 - Hongwei Tian, Weining Zhang:
Extending l-Diversity for Better Data Anonymization. 461-466 - Joel Ortiz, Johnly Tomelden, Mohsen Beheshti, Kazimierz Kowalski, Jianchao Han:
Component Based Information Network for Computer Security. 467-469 - Ch. Rupa, P. S. Avadhani:
Message Encryption Scheme Using Cheating Text. 470-474 - Wei Jiang, Binxing Fang, Hongli Zhang, Zhihong Tian, Xin-fang Song:
Optimal Network Security Strengthening Using Attack-Defense Game Model. 475-480 - Hu Zhang, Shan-de Wei, Hongye Tan, Jia-heng Zheng:
Deception Detection Based on SVM for Chinese Text in CMC. 481-486 - Chandan Koner, C. T. Bhunia, Ujjwal Maulik:
An Efficient and Reliable Time Variant Three-Entity and Data Authentication of Remote User Using Smart card. 487-491 - Abdul Razzaq, Ali Hur, Nasir Haider, Hafiz Farooq Ahmad:
Multi-Layered Defense against Web Application Attacks. 492-497 - Sang-Ho Shin, Kee-Young Yoo:
An Efficient PRNG Based on the Hybrid between One- and Two-Dimensional Cellular Automata. 498-503 - Dongwan Shin, Rodrigo Lopes, William R. Claycomb:
Authenticated Dictionary-Based Attribute Sharing in Federated Identity Management. 504-509
Networking & Wireless Communications
- Yenumula B. Reddy, Clifton Bullmaster:
Application of Game Theory for Cross-layer Design in Cognitive Wireless Networks. 510-515 - Beatriz Lorenzo, Savo Glisic:
Reconfigurable Relaying Topology in Cognitive Multihop Wireless Networks with Nonuniform Temporal and Spatial Traffic Distribution. 516-523 - Fangyang Shen, Chunlei Liu, Jun Zhang:
A Distributed Coverage-Aware Sleep Scheduling Algorithm for Wireless Sensor Networks. 524-527 - (Withdrawn) Radiation Emission EMC Measurement in Real-Time. 528-533
- Shinhan Wee, Montserrat Ros, Peter James Vial:
Mitagation against MAI in a Space Time Spreading Software Defined Radio Test Bed. 534-540 - Ning Liu, Jianhua Li, Ping Yi, Jianing Li, Yue Wu:
Outage Behavior of Multi-Antenna Multi-Relay Non-Regenerative Cooperative Networks. 541-545 - Wei Feng, Hamada Alshaer, Jaafar M. H. Elmirghani:
Evaluation of Energy Consumption and Network Lifetime in Rectangular Ad-hoc Wireless Networks. 546-551 - Nikema Smith, Yenumula B. Reddy, Nandigam Gajendar:
Cross-Layer Design Approach for Wireless Networks to Improve the Performance. 552-557 - Mostafa M. El-Said, Ira Woodring:
An Empirical Study for Protecting Passive RFID Systems against Cloning. 558-563 - Lun-Min Shih, Jimmy J. M. Tan:
Fault-Tolerant Maximal Local-Connectivity on the Bubble-Sort Graphs. 564-569 - Devishree Naidu, Rakhi Tapadiya:
Implementation of Header Compression in 3GPP LTE. 570-574
Sensor Networks
- Eduardo Cañete, Jaime Chen, Manuel Díaz, Luis Llopis, Bartolomé Rubio:
A Service-Oriented Middleware for Wireless Sensor and Actor Networks. 575-580 - Mahmood R. Minhas, Sathish Gopalakrishnan, Victor C. M. Leung:
An Online Multipath Routing Algorithm for Maximizing Lifetime in Wireless Sensor Networks. 581-586 - Masato Kamio, Keiichi Nakamura, Shinsuke Kobayashi, Noboru Koshizuka, Ken Sakamura:
Micro T-Kernel: A Low Power and Small Footprint RTOS for Networked Tiny Devices. 587-594 - Kohei Arai:
Estimation Method for Total Nitrogen and Fiber Contents in Tealeaves as well as Grow Index of Tealeaves and Tea Estate Monitoring with Network Cameras. 595-600 - Shafique Ahmad Chaudhry, Cormac J. Sreenan:
Supporting Stateless Address Autoconfiguration in IP-Based Wireless Sensor Networks. 601-606 - P. Papantoni-Kazakos, Anthony Burrell:
Performance Monitoring in Sensor Networks. 607-612 - Sattanathan Subramanian, Djamel Djenouri, Guttorm Sindre, Ilangko Balasingham:
CoP4V : Context-Based Protocol for Vehicle's Safety in Highways Using Wireless Sensor Networks. 613-618 - Amina Chaabane, Mohamed Jmaiel:
A Secure Content-Based Publish/Subscribe Middleware. 619-622
Mobile Computing & Networking
- Yong Shou Wu, Do Hyeon Lee, Jae-Il Jung:
Derivation and Analysis of Link/Route Maintenance Probability In Multi Hop Mobile Ad Hoc Networks. 623-627 - Sung-Hoon Park, Tae-Gyu Lee, Hyung-Seok Seo, Seok-Jin Kwon, Jong-Ho Han:
An Election Protocol in Mobile Ad Hoc Distributed Systems. 628-633 - Marjan Sterk, Mariano Agustin Cecowski Palacio:
Virtual Globe on the Android - Remote vs. Local Rendering. 634-639 - R. Gunasekaran, V. Rhymend Uthariaraj:
Prevention of Denial of Service Attacks and Performance Enhancement in Mobile Ad hoc Networks. 640-645 - Osamah S. Badarneh, Michel Kadoch, Ahmed K. Elhakeem:
Supporting Video Multicast in Wireless Ad Hoc Networks Using Multiple Paths and Multiple Description Coding. 646-651 - Thi Vu Phu, Vu Anh Huynh, Timo Rolf Bretscheider:
Towards an In-Flight Infrared Peer-to-Peer Media Streaming Network. 652-656 - Yi Qi Gui, Gi Taek Kim, Hwang Kyu Choi:
Time-Based Cache Management for Video-on-Demand in P2P Environment. 657-662 - Markus Esch, Jean Botev, Hermann Schloss, Ingo Scholtes:
Performance Evaluation of GP3 - A Grid-Based Spatial Index Infrastructure. 663-670
Software Engineering Education
- Susan Loveland:
Using Open Source Tools to Prevent Write-Only Code. 671-677 - Andrew Mile Connor, Jim Buchan, Krassie Petrova:
Bridging the Research-Practice Gap in Requirements Engineering through Effective Teaching and Peer Learning. 678-683 - Adam Dukovich, David S. Janzen:
Design Patterns Go to Hollywood: Teaching Patterns with Multimedia. 684-689 - Jeff Pittges, Joe D. Chase, Tracy L. Lewis:
Supporting Live Student Projects: Lessons Learned from the Small Project Support Center at Radford University. 696-701 - Yanxia Jia, Yonglei Tao:
Teaching Software Design Using a Case Study on Model Transformation. 702-706 - Gregory W. Hislop, Heidi J. C. Ellis:
Using Scaffolding to Improve Written Communication of Software Engineering Students. 707-712 - Jagadeesh Nandigam, Venkat N. Gudivada, Abdelwahab Hamou-Lhadj, Yonglei Tao:
Interface-Based Object-Oriented Design with Mock Objects. 713-718 - Abdelwahab Hamou-Lhadj, Abdelouahed Gherbi, Jagadeesh Nandigam:
The Impact of the Model-Driven Approach to Software Engineering on Software Engineering Education. 719-724 - Venkat N. Gudivada, Jagadeesh Nandigam:
Corporate Compliance and its Implications to IT Professionals. 725-729 - B. M. Monjurul Alom, Frans A. Henskens, Michael Richard Hannaford:
Deadlock Detection Views of Distributed Database. 730-737
Software Testing
- James D. McCaffrey:
Using the Multi-Attribute Global Inference of Quality (MAGIQ) Technique for Software Testing. 738-742 - Gary Fix:
The Design of an Automated Unit Test Code Generation System. 743-747 - Craig Merchant, Manuel Tellez, Jagannathan Venkatesan:
A Browser Agnostic Web Application UI Test Framework: Motivation, Architecture, and Design. 748-751 - Neill Thompson, Heather Munion, Dan Wenzel, Ric Ellsworth:
The Creation of a Software Testing Meta Framework; The Test Object Model. 752-757 - Soonho Kong, Nikolai Tillmann, Jonathan de Halleux:
Automated Testing of Environment-Dependent Programs - A Case Study of Modeling the File System for Pex. 758-762 - E. S. F. Najumudheen, Rajib Mall, Debasis Samanta:
A Dependence Graph-Based Test Coverage Analysis Technique for Object-Oriented Programs. 763-768 - Ed Triou, Zafar Abbas, Sravani Kothapalle:
Declarative Testing: A Paradigm for Testing Software Applications. 769-773 - David Harding:
The Architecture, Design, and Operation of a Virtual Network Hardware Emulation (VNHE) System. 774-778 - Adrian Bonar:
The Design of a System for Testing Database-Centric Software Applications Using Database Surrogates. 779-783 - Eun Ha Kim, Jong Chae Na, Seok Moon Ryoo:
Test Automation Framework for Implementing Continuous Integration. 784-789 - Kaarthik Sivashanmugam, Senthil Palanisamy:
Testing SQL Server Integration Services Runtime Engine Using Model and Mock Objects. 790-795 - Min Li, Jason Wang, Lamar Damata:
TAO Project: An Intuitive Application UI Test Toolset. 796-800 - Bruce Benton:
Model-Based Time and Cost Estimation in a Software Testing Environment. 801-806 - Zaid Altahat, Tzilla Elrad:
Detection and Verification of Semantic Interaction In AOSD. 807-812 - Haitham S. Hamza:
A Framework for Identifying Reusable Software Components Using Formal Concept Analysis. 813-818 - Haitham S. Hamza, Dina Darwish:
On the Discovery of Candidate Aspects in Software Requirements. 819-824 - S. Subha:
A Modified Linear Scan Register Allocation Algorithm. 825-827 - Samer Nofal:
A O(log n) Signature-Based String Matching Algorithm. 828-830
High Performance Computing Architectures
- Yiyu Tan, Chihang Yau, Anthony S. Fong:
A Object Model for Java and Its Architectural Support. 831-836 - Makoto Ozone, Tatsuo Hiramatsu, Katsunori Hirase, Kazuhisa Iizuka:
Reconfigurable Processor LSI Based on ALU Array with Limitations of Connections of ALUs for Software Radio. 837-842 - Fangyang Shen, Xiao Qin, Andrés O. Salazar, Adam Manzanares, Kiranmai Bellam:
An Energy-Efficient Reliability Model for Parallel Disk Systems. 843-848 - Yoon Seok Yang, Jun Ho Bahn, Seung Eun Lee, Nader Bagherzadeh:
Parallel and Pipeline Processing for Block Cipher Algorithms on a Network-on-Chip. 849-854 - Ling Wang, Jianye Hao, Feixuan Wang:
Bus-Based and NoC Infrastructure Performance Emulation and Comparison. 855-858 - Peng Liu, Chunchang Xiang, Xiaohang Wang, Bingjie Xia, Yangfan Liu, Weidong Wang, Qingdong Yao:
A NoC Emulation/Verification Framework. 859-864 - Akira Hatanaka, Nader Bagherzadeh:
Scheduling Techniques for Multi-Core Architectures. 865-870 - Ashwini Raina, Venkatesan Muthukumar:
Fuse-N: Framework for Unified Simulation Environment for Network-on-Chip. 871-876 - Ashwini Raina, Venkatesan Muthukumar:
Traffic Aware Scheduling Algorithm for Network on Chip. 877-882 - Jacques H. van Wyk, Louis P. Linde:
Design of a CC-MC-CDMA System for Gigabit DSL (GDSL). 883-888 - S. Subha:
An Algorithm for Buffer Cache Management. 889-893
E-Commerce
- Benjamin J. Ford, Haiping Xu, Christopher K. Bates, Sol M. Shatz:
Model-Based Specification of Flexible and Complex Bidding Strategies in Agent-Based Online Auctions. 894-900 - Jarrod Trevathan, Alan McCabe, Wayne Read:
Online Payments Using Handwritten Signature Verification. 901-907 - Fei Dong, Sol M. Shatz, Haiping Xu:
Inference of Online Auction Shills Using Dempster-Shafer Theory. 908-914 - Ripan Shah, Jarrod Trevathan, Wayne Read, Hossein Ghodosi:
A Proactive Approach to Preventing Phishing Attacks Using Pshark. 915-921 - Rodel Balingit, Jarrod Trevathan, Yong Jin Lee, Wayne Read:
A Software Tool for Collecting Data from Online Auctions. 922-927 - Rodel Balingit, Jarrod Trevathan, Wayne Read:
Analysing Bidding Trends in Online Auctions. 928-933 - Shwu-Min Horng:
The Behavior and Preferences of Users on Web 2.0 Social Network Sites: An Empirical Study. 934-939 - Kevin Gary, Harry Koehnemann, John Blakley, Cheryl Goar, Holly Mann, Al Kagan:
A Case Study: Open Source Community and the Commercial Enterprise. 940-945 - Wang Bao, Zhang Ming Li, Jia Wei:
Research on Components and Measurement of Customer Value in Business to Customer Market. 946-951
Computer Information Technology Education
- Jameela Al-Jaroodi, Nader Mohamed:
A Flexible Notification System for Stocks Investors. 952-957 - Ya-Yueh Shih, Siao-Sian Huang:
Exploring the Critical Success Factors of Mobile Commerce via Qualitative Method- in Case of Insurance Industry. 958-962 - Herbert Schanker, Deborah Sturm, Sarah Zelikovitz:
The Science of Computing: Concepts and Current Technologies. 963-968 - Lu Yan:
Teaching Object-Oriented Programming with Games. 969-974 - Prem Uppulur, Maung Htay:
Experiences Using New Technologies in a Computer Organization Course. 975-980 - Jeff Pittges, Robert H. Phillips, Premchand Uppuluri:
Learning Outcomes for an Introductory Database Project. 981-986 - Nader Mohamed, Jameela Al-Jaroodi, Imad Jawhar:
Internet Information Retrieval for Enabling Student Projects. 987-992 - Elham Ziaei Pour, Alireza Taghizadeh, Farzad Bazazan, Farid Khoshalhan, Ayoub Mohammadian:
A Model for National E-readiness Assessment Based on System Approach. 993-998 - Hamid Mahmoodi, Ali A. Jalali:
Virtual Age: Enabling Technologies and Trends. 999-1004
Middleware
- Christophe Huygens, Wouter Joosen:
Federated and Shared Use of Sensor Networks through Security Middleware. 1005-1011 - Ralf Wagner, Bernhard Mitschang:
Uniform and Efficient Data Provisioning for SOA-Based Information Systems. 1012-1017 - Johnson Iyilade, Klaas Kabini, Matthew O. Adigun:
MINDS: A Middleware Infrastructure for Distributed Services Provisioning. 1018-1023 - Yuri Morais Bezerra, Thaís Alves Burity Pereira, Glêdson Elias da Silveira:
A Systematic Review of Software Product Lines Applied to Mobile Middleware. 1024-1029 - Rajesh Ingle, G. Sivakumar:
TGKAM: Adaptive Middleware Architecture for Secure Group Communication. 1030-1035 - Stephan Sommer, Christian Buckl, Alois C. Knoll:
Developing Service Oriented Sensor/Actuator Networks Using a Tailored Middleware. 1036-1041 - Libe Valentine Massawe, Farhad Aghdasi, Johnson Kinyua:
The Development of a Multi-Agent Based Middleware for RFID Asset Management System Using the PASSI Methodology. 1042-1048 - Alin Florindor Murarasu, Thomas Magedanz:
Mobile Middleware Solution for Automatic Reconfiguration of Applications. 1049-1055
Data Mining
- Mark S. Smith, Ray R. Hashemi, Leslie Sears:
Classification of Movies and Television Shows Using Motion. 1056-1060 - Cheng Hao Jin, Yongmi Lee, Gyoyong Sohn, Hi-Seok Kim, Keun Ho Ryu:
Design of Context Analysis System on USN Environment. 1061-1066 - Umer Rashid, Iftikhar Azim Niaz, Muhammad Afzal Bhatti:
M3L: Architecture for Multimedia Information Retrieval. 1067-1072 - Kazem Taghva, Kirankumar Jayakumar:
XML Based Implementation of a Bibliographic Database and Recursive Queries. 1073-1078 - Jawed I. A. Siddiqi, Babak Akhgar, Fazilatur Rahman, Sally Atkinson, Alberto Savoldelli, Stefano Arici, Paolo Bertele, Brian James, Mike Pinkerton:
Towards an Integrated Platform for Improving Hospital Risk Management. 1079-1084 - Hassan Reza, Emanuel S. Grant:
Toward Extending AADL-OSATE Toolset with Color Petri Nets (CPNs). 1085-1088 - Hassan Reza, Malvika Pimple, Varun Krishna, Jared Hildle:
A Safety Analysis Method Using Fault Tree Analysis and Petri Nets. 1089-1094
E-Learning
- Alan Clinton Shaw:
Extending the Pair Programming Pedagogy to Support Remote Collaborations in CS Education. 1095-1099 - Xinyu Zhang, Nianlong Luo, Cheng Sun:
The Knowledge Building of the Eco-Classroom. 1100-1103 - Huang Lanying, Hu Zhongya, Cheng Sun:
The Case Study Activities in a Web-Based Environment. 1104-1107 - Iván Martínez-Ortiz, José Luis Sierra, Baltasar Fernández-Manjón:
Translating e-learning Flow-Oriented Activity Sequencing Descriptions into Rule-Based Designs. 1108-1113 - Kenneth E. Hoganson:
Distance-Learning and Converging Mobile Devices. 1114-1119 - Li-chu Sung:
Online Professional Development for K-12 Inservice Teachers from the Views of Online Learning Forum (OLF) Designers. 1120-1127 - Ahmad A. Kardan, Fakhroddin Noorbehbahani:
Using Learners' Annotations to Produce Feedbacks for Selecting and Editing Learning Contents in e-Learning Systems. 1128-1133 - Samad Kardan, Ahmad Kardan:
Towards a More Accurate Knowledge Level Estimation. 1134-1139 - Ahmad Kardan, Shima Zahmatkesh:
A Proposesd Ontology for Effective Searching of Sharable Content Objects Emphasizing on Learning Objectives. 1140-1145
Mobility & Resource Management
- Xin Wu, Arunita Jaekel, Ataul Bari, Alioune Ngom:
Optimized Hybrid Resource Allocation in Wireless Cellular Networks with and without Channel Reassignment. 1146-1151 - Jun Zheng, Mengyu Qiao, Emma E. Regentova:
Multi-slot Channel Allocation for Priority Packet Transmission in the GPRS Network. 1152-1157 - Dongho Lim, Kwonhue Choi, Huaping Liu:
Optimum Power Allocation for Distributed Antenna Systems with Large-scale Fading-only Feedback. 1158-1164 - Weiping He, Ing-Ray Chen:
DMAP-FR: Integrated Mobility and Service Management with Failure Recovery Support for Mobile IPv6 Systems. 1165-1170 - Vicente Casares Giner, Pablo García-Escalle:
A Lookahead Strategy for Movement-Based Location Update in Wireless Cellular Networks. 1171-1177 - Minakshmi Roy, H. S. Jamadagni:
Performance Analysis of MQAM-OFDM Based WLAN in Presence of Zigbee Interference in AWGN and Rayleigh Fading Channel. 1178-1183 - Kandaraj Piamrat, César Viho, Jean-Marie Bonnin, Adlen Ksentini:
Quality of Experience Measurements for Video Streaming over Wireless Networks. 1184-1189 - Kari Aho, Ilmari Repo, Timo Nihtilä, Tapani Ristaniemi:
Analysis of VoIP over HSDPA Performance with Discontinuous Reception Cycles. 1190-1194 - Jani Puttonen, Niko Kolehmainen, Tero Henttonen, Jorma Kaikkonen:
On Idle Mode Mobility State Detection in Evolved UTRAN. 1195-1200
Ambient-Assisted Living for Elderly People
- Hong Sun, Vincenzo De Florio, Ning Gui, Chris Blondia:
Promises and Challenges of Ambient Assisted Living Systems. 1201-1207 - Barbara Franz, Markus Lehner, Herwig Mayr, Margit Mayr:
e-Care . 1208-1213 - Werner Kurschl, Stefan Mitsch, Johannes Schönböck:
Modeling Situation-Aware Ambient Assisted Living Systems for Eldercare. 1214-1219 - Suzanne Kieffer, Jean-Yves Lionel Lawson, Benoît Macq:
User-Centered Design and Fast Prototyping of an Ambient Assisted Living System for Elderly People. 1220-1225 - Anh Dinh, Daniel Teng, Li Chen, Yang Shi, Carl McCrosky, Jenny Basran, Vanina Del Bello-Hass:
Implementation of a Physical Activity Monitoring System for the Elderly People with Built-in Vital Sign and Fall Detection. 1226-1231 - Juan-Pablo García-Vázquez, Marcela D. Rodríguez, Ángel G. Andrade, Diana Saldaña-Jimenez, Fabian Mercado, Emanuelle Ruelas:
Ambient Information Systems for Supporting Ageing in Place. 1232-1237
Signal Processing Applications
- Xudong Ma:
Novel Blind Signal Classification Method Based on Data Compression. 1238-1243 - K. Raja Rajeswari, K. Murali Krishna, V. Jagan Naveen, A. Vamsidhar:
Performance Comparison of Wiener Filter and CLS Filter on 2D Signals. 1244-1249 - Paraskevi S. Lampropoulou, Dionisios N. Sotiropoulos, Aristomenis S. Lampropoulos, George A. Tsihrintzis:
A Back End System for Digital Image Library Organization Based on Concept Learning. 1250-1255 - Djamel Addou, Sid-Ahmed Selouani, Malika Boudraa, Bachir Boudraa:
Feature Combination Using Multiple Spectral Cues for Robust Speech Recognition in Mobile Communications. 1256-1261 - Buket D. Barkana:
Detection of the Parameters of Hypernasality. 1262-1264 - Jidong Yang, Buket D. Barkana:
The Acoustic Properties of Different Noise Sources. 1265-1268 - Babak Abbasi Bastami, Ebrahim Saberinia:
Optimal Transmission Time of Secondary User in an Overlay Cognitive Radio System. 1269-1274
New Trends in Image Processing
- Manbae Kim:
Post-processing of Multiview Images: Depth Scaling. 1275-1279 - Hau T. Ngo, Vijayan K. Asari:
Design of a Logarithmic Domain 2-D Convolver for Low Power Video Processing Applications. 1280-1285 - Shuangteng Zhang:
Side-Match Vector Quantizers Using Neural Network Based Variance Predictor for Image Coding. 1286-1289 - K. B. Jayanthi, R. S. D. Wahida Banu:
Carotid Artery Boundary Extraction Using Segmentation Techniques: A Comparative Study. 1290-1295 - Mohammad Eyadat, Hedley Morris, Imad Muhi El-Ddin:
Barcode Watermarking. 1296-1300 - Madasu Hanmandlu, Om Prakash Verma, Pankaj Gangwar, Shantaram Vasikarla:
Fuzzy Edge and Corner Detector for Color Images. 1301-1306 - Nishchal K. Verma, Payal Gupta, Pooja Agrawal, Madasu Hanmandlu, Shantaram Vasikarla, Yan Cui:
Medical Image Segmentation Using Improved Mountain Clustering Approach. 1307-1312 - Guo-An Jian, Ting-Yu Huang, Jui-Chin Chu, Jiun-In Guo:
Optimization of VC-1/H.264/AVS Video Decoders on Embedded Processors. 1313-1318 - Mahdi Jampour, Maryam Ashourzadeh, Mahdi Yaghobi, Issa Rashidfarokhi:
Compressing Images Using Fractal Characteristics by Estimating the Nearest Neighbor. 1319-1322
Web Technologies
- Rishav Chakravarti, Xiannong Meng:
A Study of Color Histogram Based Image Retrieval. 1323-1328 - Dilip Kumar Limbu, Andrew M. Connor, Russel Pears, Stephen G. MacDonell:
Improving Web Search Using Contextual Retrieval. 1329-1334 - Daniel Beatty, Noé Lopez-Benitez:
Image Query Service Using Content Management Techniques. 1335-1340 - Chen-Ya Wang, Seng-cho Timothy Chou, Hsia-Ching Chang:
Emotion and Motivation: Understanding User Behavior of Web 2.0 Application. 1341-1346 - Subhash Uppalapati, John Femiani, Anshuman Razdan, Kevin Gary:
3D VQI: 3D Visual Query Interface. 1347-1354 - Thi Nhu Quynh Kim, Khasfariyati Razikin, Dion Hoe-Lian Goh, Yin Leng Theng, Quang Minh Nguyen, Ee-Peng Lim, Aixin Sun, Chew-Hung Chang, Kalyani Chatterjea:
Exploring Hierarchically Organized Georeferenced Multimedia Annotations in the MobiTOP System. 1355-1360 - Sayed Nasir Khalifehsoltani, Ali Vahdani, Reza Moallemi:
Anatomy of a News Archive and Search Engine (Optimized for Persian Web). 1361-1366 - Isak Taksa, Jaime Muro Flomenbaum:
An Integrated Framework for Research on Cross-Cultural Information Retrieval. 1367-1372 - Madjid Khalilian, Hassan Abolhassani, Ali Alijamaat, Farsad Zamani Boroujeni:
PCI: Plants Classification & Identification Classification of Web Pages for Constructing Plants Web Directory. 1373-1377
Agile Methods, Tools & Best Practices
- Le-Ngoc Son, Bao Nguyen Le:
Fixed Broadband Wireless Access for Wide Area Coverage and Last Mile Solutions. 1378-1383 - Mohammed Al-Maharmeh, Bhuvan Unhelkar:
Applying a Composite Process Framework (CPF) in Real Life Software Development Project. 1384-1389 - Mehdi Kessis, Claudia Roncancio, Alexandre Lefebvre:
DASIMA: A Flexible Management Middleware in Multi-Scale Contexts. 1390-1396 - Claudio Gonçalves Bernardo, Denis Ávila Montini, Danilo Douradinho Fernandes, Daniela America da Silva, Luiz Alberto Vieira Dias, Adilson Marques da Cunha:
Using GQM for Testing Design Patterns in Real-Time and Embedded Systems on a Software Production Line. 1397-1404 - Sara Shahzad:
Learning from Experience: The Analysis of an Extreme Programming Process. 1405-1410 - Junjin Mei:
An Approach for SQL Injection Vulnerability Detection. 1411-1414 - Jayakanth Srinivasan, Kristina Lundqvist:
Using Agile Methods in Software Product Development: A Case Study. 1415-1420
Domain and Product Line Engineering
- Gabriel de Souza Pereira Moreira, Denis Ávila Montini, Daniela America da Silva, Felipe Rafael Motta Cardoso, Luiz Alberto Vieira Dias, Adilson Marques da Cunha:
Design Patterns Reuse for Real Time Embedded Software Development. 1421-1427 - Gabriel de Souza Pereira Moreira, Denis Ávila Montini, Danilo Douradinho Fernandes, Felipe Rafael Motta Cardoso, Luiz Alberto Vieira Dias, Adilson Marques da Cunha:
Final Inspection for Design Pattern Homologation Using a Real Time Embedded Software in a Production Line. 1428-1435 - Denis Ávila Montini, Felipe Rafael Motta Cardoso, Francisco Supino Marcondes, Paulo Marcelo Tasinaffo, Luiz Alberto Vieira Dias, Adilson Marques da Cunha:
Using GQM Hypothesis Restriction to Infer Bayesian Network Testing. 1436-1441 - Jialiang Wang, Hai Zhao, Peng Li, Zheng Liu, Jie Zhao, Wei Gao:
The Mechanism and Performance Comparison of Two Wireless Sensor Network Operating System Kernels. 1442-1446 - Francisco Supino Marcondes, Danilo Douradinho Fernandes, Denis Ávila Montini, Paulo Marcelo Tasinaffo, Ítalo Santiago Vega, Luiz Alberto Vieira Dias:
Systematic and Formal Approach to get a Domain Specific Language. 1447-1450 - Joao Augusto de Pessoa, Luiz Alberto Vieira Dias, Adilson Marques da Cunha:
A Desktop Environment for River Hazards Monitoring. 1451-1455
E-Health, E-Government, E-Services
- Berdakh Abibullaev, Hee Don Seo:
Epileptic Seizures Detection Using Continuous Time Wavelet Based Artificial Neural Networks. 1456-1461 - Kamran Ahsan, Hanifa Shah, Paul Kingston:
The Role of Enterprise Architecture in Healthcare-IT. 1462-1467 - Mohsen Heydari, Mehran Jahed:
Prediction of Temperature Distribution and Volume of Lesion During HIFU Therapy. 1468-1473 - Mohammad Hjouj Btoush, Jawed I. A. Siddiqi, Ja'far Alqatawna, Babak Akhgar:
The State of Play in Jordanian E-government Services. 1474-1478 - Talles Brito Viana, Hugo Imperiano Nobrega, Thiago Vinicius Freire de Araujo Ribeiro, Glêdson Elias da Silveira:
A Search Service for Software Components Based on a Semi-Structured Data Representation Model. 1479-1484 - Yunfeng Ma, Xiaomin Hu, Yonggang Huang, Tong Zhu, Lingling Fu:
The Research on the Environmental Assessment Automation System-C4ISRE Based on C4ISR Theory. 1485-1491 - An-Jim Long, Polun Chang:
The Use of Health Smart Card in Bridging Discontinuity of Care for Pregnant Woman. 1492-1497 - Samir N. Hamade:
Information and Communication Technology in Arab Countries: Problems and Solutions. 1498-1503
Social Computing & Technology
- Christian Menkens:
Towards a Context Aware Mobile Community Application Platform. 1504-1509 - Maria Chiara Caschera, Fernando Ferri, Patrizia Grifoni, Tiziana Guzzo:
Multidimensional Visualization System for Travel Social Networks. 1510-1516 - Mark Bilandzic, Daniel Filonik, Michael Gross, Andreas Hackel, Herbert Mangesius, Helmut Krcmar:
A Mobile Application to Support Phatic Communication in the Hybrid Space. 1517-1521 - Mohan John Blooma, Alton Yeow-Kuan Chua, Dion Hoe-Lian Goh, Chu Keong Lee:
A Trend Analysis of the Question Answering Domain. 1522-1527 - Zheng Liu, Hai Zhao, Peng Li, Jialiang Wang:
An Optimization Model for IO Jitter in Device-Level RTOS. 1528-1533 - Yanjun Zuo, Wen-Chen Hu, Timothy O'Keefe:
Trust Computing for Social Networking. 1534-1539 - Johannes Gambo, Savae Latu:
Giving Every Child a Sense of Belonging: Improving Birth Registration in Developing Countries. 1540-1545 - B. M. Monjurul Alom, Frans Henskens, Michael Hannaford:
Querying Semistructured Data with Compression in Distributed Environments. 1546-1553 - Gabriella Kazai, Natasa Milic-Frayling:
Effects of Social Approval Votes on Search Performance. 1554-1559 - Yongping Hao, Jingyu Wang, Pengfei Zeng, Weiping Shao:
Planning and Realization of Collaborative Assembly. 1560-1564
Posters
- Wei-hai Huang, Yu-jie Dai, Xiao-xing Zhang, Ying-jie Lu:
An Oscillator Based on LDMOS Capacitor. 1565-1566 - Yanfang Yue, Rui-gang Zhang, Guang Yang, Guang-le Ge:
Application of COMERO Data Collecting in Quality Management System. 1567 - Zhanjun Li, Yongzhong Huang, Shaozhong Guo:
Using Pi-Calculus to Formalize Grid Workflow Parallel Computing Patterns. 1568-1571 - Mahdi Seify, Shahriar Bijani:
A Methodology for Mobile Network Security Risk Management. 1572-1573 - Zhengjun Cao, Olivier Markowitch:
Security Analysis of One Quantum Digital Signature Scheme. 1574-1576 - Kalavathi Alla, R. Siva Rama Prasad:
An Evolution of Hindi Text Steganography. 1577-1578 - Piyush Kumar Shukla, Sanjay Silakari, Sarita Singh Bhadoriya:
Network Security Scheme for Wireless Sensor Networks using Efficient CSMA MAC Layer Protocol. 1579-1580 - Piyush Kumar Shukla, G. S. Mishra, Prashant G. Girdhar, Pradeep Rusia, Vivek Kapoor:
Implementation Comparison of Kerberos Passwords by RC-5 Encryption Type analysis with RC-4 Encryption. 1581-1582 - Piyush Kumar Shukla, Kamlesh Kumar Gupta, Sanjay Silakari, A. S. Saxena:
An Ethical Way of Encrypt Data Transfer in Bluetooth Mobile Using Chaos Based Feedback Technique. 1583-1584 - Guoqiang Wu, Zhaowei Sun, Shunan Wu:
Research of Direct Spread Spectrum Communication System for Formation Micro-satellites. 1585-1587 - Sahil Chaudhary, Vijit Gupta, Vivek Kumar Dwivedi:
Performance Comparison of BPSK in Rayleigh and AWGN Channel by Monte Carlo Simulation Method. 1588-1589 - Xinyu Zhang, Li Zheng, Cheng Sun:
The Research of the Component-Based Software Engineering. 1590-1591 - Rose Neena Tom:
Project Management Practitioner Empowerment Program: A Case Study. 1592-1594 - Amir Reza Yazdanshenas, Ramtin Khosravi:
Using Domain-Specific Languages to Describe the Development Viewpoint of Software Architectures. 1595-1596 - Mahin Jeyachandran, Kevin Gary:
WERCCS: A Client-side Workflow Enactment Service Using AJAX. 1597-1598 - Joseph D'Alessandro, Cynthia D. Tanner, Bonnie W. Morris, Tim Menzies:
Is Continuous Compliance Assurance Possible? 1599 - Juan Luo, Haibo Luo, Renfa Li:
VL-MAC: Virtual Link Based Multi-channel MAC Scheme in WSN. 1600-1601 - Suresh Sankaranarayanan:
Hierarchical Intelligent Agent Based Wireless Body Sensor Mesh Networks. 1602-1603 - Mohammad Al-Fares, Zhili Sun, Haitham S. Cruickshank:
A Reliable Multi-hop Hierarchical Routing Protocol in Wireless Sensor Network (WSN). 1604-1605 - Hyun-Kuk Kim, Won-Hyuk Yang, Hyun-Bum Choi, Young-Chon Kim:
An Implementation of Central Optical Sensor Measurement/Observation System (COSMOS) with the Integrated FBG Sensor Control Device. 1606-1609 - Kang-Joong Seo, Jun-Cheol Jeon, Kee-Young Yoo:
A Reinforced Authentication Protocol for Anti-Counterfeiting and Privacy Protection. 1610-1611 - Fereidoun Ahourai, Mahmoud Tabandeh, Mehran Jahed, Saber Moradi:
A Thermal-aware Shortest Hop Routing Algorithm for in vivo Biomedical Sensor Networks. 1612-1613 - Jalal Kawash:
Tutoring Tool for Formulating Database Queries with Complex Quantifiers. 1614-1615 - Manideep Chagarlamudi, Brajendra Panda, Yi Hu:
Insider Threat in Database Systems: Preventing Malicious Users' Activities in Databases. 1616-1620 - Peter Bach Andersen, Bjarne Poulsen, Chresten Traeholt, Jacob Østergaard:
Using Service Oriented Architecture in a Generic Virtual Power Plant. 1621-1622 - (Withdrawn) The Web-Based B2B Environment with Web Services. 1623-1624
- Xinyu Zhang, Nianlong Luo:
A Web Service System with Workflow Modeling and Scheduling. 1625-1626 - Wenzheng Li, Xiaoxia Hu:
Data Access and Semantic Integration Based on OGSA-DQP. 1627-1630 - M. B. Chandak, Rajiv V. Dharaskar:
A Methodology to Extract Emotions and add Expressions in Speech Synthesis. 1631-1633 - Jesús Ubaldo Quevedo-Torrero:
Learning Theories in Computer Science Education. 1634-1635 - Francisco Supino Marcondes, Hamilton Jose Brumatto, Eloiza Helena Sonoda, Luiz Carlos Barboza, Jefferson Zannuto:
Problem on Software Engineering Learning: Domain Engineering. 1636 - Alireza Talebpour, Sona Bairamzadeh, Seyed Sabah Vajdi:
Extending the Technology Acceptance Model for Internet Banking: A Case Study of Iran. 1637-1638 - Mona Salehi, Abbas Keramati, Sina Elli:
A Proposal Framework for Investigating Website Success in the Context of E-banking: An Analytic Network Process (ANP) Approach. 1639 - S. Subha:
Variable Block Size Architecture for Programs. 1640-1641 - Jareer Abdel-Qader, Roger Walker:
Modeling Real-Time Multi-Core Embedded System Using UML. 1642-1643 - Mehrdad Sharbaf:
Quantum Cryptography: A New Generation of Information Technology Security System. 1644-1648 - Duksung Jang, Seungchan Choi, Taesoon Park:
Development of Collapse-Sensing Phone for Emergency Positioning System. 1649-1652 - Alejandro Aguirre, Marcela D. Rodríguez, Ángel G. Andrade:
A Pervasive System for Enabling Older Adults to Cope with Depression by Motivating them to Socialize. 1653-1654 - Jawad Hasan Yasin AlKhateeb, Jinchang Ren, Jianmin Jiang, Stanley S. Ipson:
Unconstrained Arabic Handwritten Word Feature Extraction: A Comparative Study. 1655-1656 - Amitava Karmaker, Syed M. Rahman:
Outlier Detection in Spatial Databases Using Clustering Data Mining. 1657-1658 - Akram Hadizadeh Moghadam, Sona Bairamzadeh:
Extending the Technology Acceptance Model for E-learning: A Case Study of Iran. 1659-1660 - Le Anh Tuan, Yuan Luo:
Exchange Routing Information between New Neighbor Nodes to Improve AODV Performance. 1661-1662 - Afsaneh Rahbar, Mehran Mohsenzadeh, Amir Masoud Rahmani:
A New Data Communication Protocol for Distributed Mobile Databases in Mobile Ad Hoc Networks. 1663-1667 - Christopher Kosecki, Joseph S. Gomes:
A Hybrid Reconfiguration Algorithm for Fast Continuous Query Processing. 1668-1669 - Alicia Nicki Washington, Rotimi Iziduh:
Modeling of Military Networks Using Group Mobility Models. 1670-1671 - Syed M. Rahman, Amitava Karmaker:
Providing . 1672-1673 - Breno Lisi Romano, Glaucia Braga e Silva, Henrique Fernandes de Campos, Ricardo Godoi Vieira, Adilson Marques da Cunha, Fábio Fagundes Silveira, Alexandre Carlos Brandão Ramos:
Software Testing for Web-Applications Non-Functional Requirements. 1674-1675 - Douglas Russell, David J. Power, Mark Slaymaker, Ghita Kouadri Mostéfaoui, Xiaoqi Ma, Andrew Simpson:
On the Secure Sharing of Legacy Data. 1676-1679 - Claudia Mena, Cristian Rusu, Silvana Roncagliolo:
Modeling the Interaction with MoLIC. 1680 - Ricardo Godoi Vieira, Breno Lisi Romano, Glaucia Braga e Silva, Henrique Fernandes de Campos, Adilson Marques da Cunha:
Using Best Practices of Software Engineering into a Real Time System Development. 1681 - Florence T. Balagtas-Fernandez, Heinrich Hussmann:
Applying Domain-Specific Modeling to Mobile Health Monitoring Applications. 1682-1683 - Bernd Bruegge, Maximilian Reiss, Jennifer Schiller:
Agile Principles in Academic Education: A Case Study. 1684-1686 - Peter E. Maher:
Weaving Agile Software Development Techniques into a Traditional Computer Science Curriculum. 1687-1688 - Cheng Sun, Xiaohua Wu, Xinyu Zhang:
Using a Tool to Generate a Web-Services Adapter. 1689-1690 - Chris Lüer, Jonathan Cummins:
Collaborative Web Search with WikiLinks. 1691-1692 - Milad Sabouri, Ali A. Jalali:
Evaluating Web 2.0 Services Based on 7C Framework. 1693-1694 - Chun-Ta Li, Min-Shiang Hwang:
Improving the Security of Non-PKI Methods for Public Key Distribution. 1695-1696 - Ou Yang, Jinping Ou:
Model Updating of Laboratorial Long-Span Cable-Stayed Bridge. 1697-1700 - Feng-chen Li, Shi-zhu Tian, Yan-jun Li, Jin Wang:
Study on the Parameter Vibration of the Large-Span Cable-Stayed Bridges. 1701-1704 - S. Subha:
An Algorithm for Secure Deletion in Flash Memories. 1705-1706 - Madhu Bhan, D. Evangelin Geetha, T. V. Suresh Kumar, K. Rajani Kanth:
Modeling of Object Oriented OLAP. 1707-1708 - Wensong Hu, Min Zhu, Zhuo Fang:
Reality of a New Control Sampling Module. 1709-1710 - Jesús Ubaldo Quevedo-Torrero:
Decidability and Constructivism. 1711-1714 - S. Subha:
An Exclusive Cache Model. 1715-1716
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.