default search action
10th ITNG 2013: Las Vegas, Nevada, USA
- Shahram Latifi:
Tenth International Conference on Information Technology: New Generations, ITNG 2013, 15-17 April, 2013, Las Vegas, Nevada, USA. IEEE Computer Society 2013, ISBN 978-0-7695-4967-5
Information Systems and Internet Technology
- Chyi-Ren Dow, Chih-Yu Chueh, Yu-Hong Lee, Shiow-Fen Hwang:
A Tree-Based Web Service Indication Scheme for Service Tracking in Vehicular Ad-Hoc Networks. 3-7 - David Burgos-Amador, Jesus Martinez Cruz, Sergio Recio-Perez:
Reducing the Impact of Massive Multiplayer Online Games on the Internet Using SCTP. 8-13 - Mario Beron, German Montejano, Daniel Riesco, Pedro Rangel Henriques, Narayan C. Debnath:
SIP: A Simple Tool for Inspecting and Evaluating WSDL Specifications. 14-19 - Víctor Mateu, Francesc Sebé, Magda Valls:
Blind Certificates for Secure Electronic Voting. 20-26 - Fatih Karatas, Marcel Heupel, Mohamed Bourimi, Dogan Kesdogan, Sophie Wrobel:
Considering Interdependent Protection Goals in Domain-Specific Contexts: The di.me Case Study. 27-32 - Sung-Hoon Park, Jea-Yep Lee, Su-Chang Yu:
Non-blocking Atomic Commitment Algorithm in Asynchronous Distributed Systems with Unreliable Failure Detectors. 33-38 - Ivan Gibbs, Sergiu M. Dascalu, Frederick C. Harris Jr.:
Web Portal Usability Tests for the Nevada Climate Change Portal. 39-45 - Joseph M. Vesco, Frederick C. Harris Jr., Sergiu M. Dascalu, Del R. Jackson, Josh E. Baker:
Semi-automated Analysis Software for a Novel Biochemistry Assay. 46-52 - Seraj Fayyad, Christoph Meinel:
Attack Scenario Prediction Methodology. 53-59 - Hajar Omrana, Ibrahim El Bitar, Fatima-Zahra Belouadha, Ounsa Roudiès:
A Comparative Evaluation of Web Services Description Approaches. 60-64 - Leo Espinoza, Heldy Espinoza, Wenying Feng:
Modeling a Facilities Management and Information System by UML. 65-70 - Jigarkumar Patel, Sohei Okamoto, Sergiu M. Dascalu, Frederick C. Harris Jr.:
A Web-Enabled Approach for Generating Data Processors. 71-76 - Narayan C. Debnath, Adam Kruger, Melinda Alexander:
A Boundary Value Analysis Tool - Design and Description. 77-82 - Sumedha Kodithuwakku, Lakmal Padmakumara, Ishara Premadasa, Shameera Rathnayaka, Vishaka Nanayakkara, Srinath Perera:
GajaNindu: A Distributed System Management Framework with User-Defined Management Logic. 83-88 - Weifeng Xu, Hanlin Wang, Tao Ding:
Mining Auto-generated Test Inputs for Test Oracle. 89-94
Software Engineering Education
- Hisham M. Haddad:
One-Semester CS Capstone: A 40-60 Teaching Approach. 97-102 - Marcelo Paiva Ramos, Gustavo Ravanhani Matuck, Ciro Fernandes Matrigrani, Samoel Mirachi, Eliezer Segeti, Marco Leite, Adilson Marques da Cunha, Luiz Alberto Vieira Dias:
Applying Interdisciplinarity and Agile Methods in the Development of a Smart Grids System. 103-110
Human Computer Interaction (HCI) and Brain Machine Interface
- Kohei Arai, Rosa Andrie:
Gender Classification with Human Gait Based on Skeleton Model. 113-118 - Freddy Paz, Daniela Villanueva, Cristian Rusu, Silvana Roncagliolo, José Antonio Pow-Sang:
Experimental Evaluation of Usability Heuristics. 119-126 - Andrés Solano, César A. Collazos, Cristian Rusu, Luis Merchán:
Evaluating the Usability of Interactive Digital Television Applications. 127-132 - Mauro Jiménez, Alejandra Jiménez, Pablo Lozada Yanez, Santiago Jiménez, Cristhy Jiménez Granizo:
Using a Wireless Sensors Network in the Sustainable Management of African Palm Oil Solid Waste. 133-137 - Mutlaq B. Alotaibi:
Assessing the Usability of University Websites in Saudi Arabia: A Heuristic Evaluation Approach. 138-142 - Kim Nee Goh, Yoke Yie Chen, F. W. Lai, Stephanie Cristal Daud, Ashok Sivaji, Shi-Tzuaan Soo:
A Comparison of Usability Testing Methods for an E-Commerce Website: A Case Study on a Malaysia Online Gift Shop. 143-150
Wavelets and Validated Numerics
- Makoto Kobayashi, Kazushi Nakano:
Two Problems of Wavelet Packet Transform. 153-159 - Fabienne Jézéquel, Jean Luc Lamotte, Olena Chubach:
Parallelization of discrete stochastic arithmetic on multicore architectures. 160-166 - Ryuji Ohura, Teruya Minamoto:
Digital Image Watermarking for Authentication Based on the Dyadic Wavelet Transform and Interval Arithmetic. 167-172 - Takehiko Kinoshita, Mitsuhiro T. Nakao:
Some Remarks on the Optimal Error Estimates for the Finite Element Method on the L-Shaped Domain. 173-178 - Ken'ichiro Tanaka:
A Sinc Method for an Eigenvalue Problem of a Differential Operator with Periodic Coefficients and Its Comparison with Hill's Method. 179-185
High Performance Computing Architectures
- Gabriel Loewen, Michael Galloway, Susan V. Vrbsky:
On the Performance of Apache Hadoop in a Tiny Private IaaS Cloud. 189-195 - Anthony S. Fong, Chihang Yau, Yijun Liu:
Advanced Instruction Folding for an Object-oriented Processor. 196-199 - Lech Józwiak, Yahya Jan:
Hardware Multi-processor Design for Highly-Demanding Applications. 200-205 - Fangyang Shen, Bing Qi:
Workload Based Optimization Model for Parallel Disk Systems. 206-209 - Ming Zhu, Yingtao Jiang:
An Area-Time Efficient Architecture for 16 x 16 Decimal Multiplications. 210-216 - Mahmoud Fawzy Wagdy, Sandesh Maraliga Jayaram:
A Novel Flash Fast-Locking Digital PLL: Verilog-AMS Modeling and Simulations. 217-222
Model-Based Software Development
- Federico Ciccozzi, Antonio Cicchetti, Mikael Sjödin:
Exploiting UML Semantic Variation Points to Generate Explicit Component Interconnections in Complex Systems. 225-232 - Amina A. Imam, Haitham S. Hamza, Riham Abdel-Moneim:
Automated Generation of Use Case Diagrams from Problem Frames Using Formal Concept Analysis. 233-240 - Matt Fenwick, Gerard Weatherby, Heidi J. C. Ellis, Michael R. Gryk:
Parser Combinators: A Practical Application for Generating Parsers for NMR Data. 241-246 - Mohammed Alodib:
A Model-Driven Approach to the Automated Creation of ADF Applications. 247-253 - Renato Matuzaki Honda, Luiz Alberto Vieira Dias:
Range Analyzer: An Automatic Tool for Arithmetic Overflow Detection in Model-Based Development. 254-259 - Mehrdad Saadatmand, Mikael Sjödin:
On Combining Model-Based Analysis and Testing. 260-266 - Andreas Schuler, Barbara Franz:
Rule-Based Generation of Mobile User Interfaces. 267-272 - Johnny Cardoso Marques, Sarasuaty Megume Hayashi Yelisetty, Adilson Marques da Cunha, Luiz Alberto Vieira Dias:
CARD-RM: A Reference Model for Airborne Software. 273-279 - Sabah Al-Fedaghi:
Alternative Representation of Aspects. 280-285
Computer Information Technology Education
- Adriana da Silva Jacinto, Tatiana Martins Almeri, Etiene Lamas, Luiz Alberto Vieira Dias, Adilson Marques da Cunha:
Computer Science and Interdisciplinarity: A Case Study on an Undergraduate Program. 289-293 - Muhammed Al-Qahtani, Mansour Al-Qahtani, Hatim Al-Misehal:
Learner Satisfaction of E-Learning in Workplace: Case of Oil Company in Middle East. 294-298 - Basit Shahzad, Esam Alwagait:
Utilizing Technology in Education Environment: A Case Study. 299-302
Software Testing
- Mikko Nieminen, Tomi Räty, Risto Teittinen:
Integration of Root Cause Analysis into a Model-Based Testing Process of a Mobile Switching Server. 305-309 - Yasir Imtiaz Khan, Sadia Kausar:
Random Cluster Sampling on X-Machines Test Cases. 310-316 - José Campos, Rui Abreu:
Encoding Test Requirements as Constraints for Test Suite Minimization. 317-322 - Ching-Seh Wu, Chi-Hsin Huang, Yen-Ting Lee:
The Test Path Generation from State-Based Polymorphic Interaction Graph for Object-Oriented Software. 323-330 - Janne Keränen, Tomi Räty:
Validation of Model-Based Testing in Hardware in the Loop Platform. 331-336 - Tanmoy Sarkar, Samik Basu, Johnny Wong:
SynConSMutate: Concolic Testing of Database Applications via Synthetic Data Guided by SQL Mutants. 337-342 - Shadi Banitaan, Mamdouh Alenezi, Kendall E. Nygard, Kenneth Magel:
Towards Test Focus Selection for Integration Testing Using Method Level Software Metrics. 343-348 - Etiene Lamas, Luiz Alberto Vieira Dias, Adilson Marques da Cunha:
Applying Testing to Enhance Software Product Quality. 349-356 - Ramya Dharam, Sajjan G. Shiva:
Runtime Monitors to Detect and Prevent Union Query Based SQL Injection Attacks. 357-362 - Shailesh Tiwari, K. K. Mishra, Arun Kumar Misra:
Test Case Generation for Modified Code Using a Variant of Particle Swarm Optimization (PSO) Algorithm. 363-368 - Shaukat Ali Khan, Aamer Nadeem:
Automated Test Data Generation for Coupling Based Integration Testing of Object Oriented Programs Using Evolutionary Approaches. 369-374 - Ashok Sivaji, Mohamed Redzuan Abdullah, Alan G. Downe, Wan Fatimah Wan Ahmad:
Hybrid Usability Methodology: Integrating Heuristic Evaluation with Laboratory Testing across the Software Development Lifecycle. 375-383
Information Security and Privacy
- Kevin P. Haubris, Joshua J. Pauli:
Improving the Efficiency and Effectiveness of Penetration Test Automation. 387-391 - Dae-Soo Kim, Gil-Je Lee, Kee-Young Yoo:
Reversible Image Hiding Scheme for High Quality Based on Histogram Shifting. 392-397 - Yan Ma, Mehrdad Sepehri Sharbaf:
Investigation of Static and Dynamic Android Anti-virus Strategies. 398-403 - Muhammad Junaid Khan, Haider Abbas:
WLAN Location Privacy: A Client Server Based Architecture. 404-410 - Issa M. Khalil, Abdallah Khreishah, Salah Bouktif, Azeem Ahmad:
Security Concerns in Cloud Computing. 411-416 - Shay Gueron:
White Box AES Using Intel's New AES Instructions. 417-421 - Alexander Eng, Luay A. Wahsheh:
Look into My Eyes: A Survey of Biometric Security. 422-427
Social Networking Applications and Knowledge Management
- Thara Ravindran, Alton Yeow-Kuan Chua, Dion Hoe-Lian Goh:
Characteristics of Social Network Fatigue. 431-438 - Samir N. Hamade:
Perception and Use of Social Networking Sites among Undergraduate Students in Kuwait. 439-444 - Asreen Rostami:
User Participation in Social Networks: The Case of Balatarin, an Online Persian-Language Social Bookmarking System. 445-449 - Angela Siew-Hoong Lee, Tong Ming Lim, Rasimah Aripin:
The Role of Affect on the Acceptance of Web 2.0 as Organizational Knowledge Sharing Systems. 450-455
Networking and Wireless Communications
- Christoph Thuemmler, Julius Mueller, Stefan Covaci, Thomas Magedanz, Stefano De Panfilis, Thomas Jell, Armin Schneider, Anastasius Gavras:
Applying the Software-to-Data Paradigm in Next Generation E-Health Hybrid Clouds. 459-463 - Fahd M. Aldosari, Fahad Alradady:
Localized QoS Routing with End-to-End Delay Guarantees. 464-472 - Victor Clincy, Brandon Wilgor:
Subjective Evaluation of Latency and Packet Loss in a Cloud-Based Game. 473-476 - Hanshang Li, Ling Wang, Shuo Pang, Massood Towhidnejad:
Path-Finding Algorithm for Ground Multiple Sensor Nodes Detection of Quad-rotor-typed UAV. 477-482 - Ling Wang, Zhen Wang, Yingtao Jiang:
Flow Control Mechanism for Wireless Network-on-Chip. 483-488 - Rajat Subhra Goswami, Swarnendu Kumar Chakraborty, Abhinandan Bhunia, Chandan Tilak Bhunia:
New Approach towards Generation of Automatic Variable Key to Achieve Perfect Security. 489-491 - Natarajan Meghanathan, Philip Mumford:
A Benchmarking Algorithm to Determine Maximum Stability Data Gathering Trees for Wireless Mobile Sensor Networks. 492-497 - Philipp Schwarte, Mohamed Bourimi, Marcel Heupel, Dogan Kesdogan, Rafael Giménez, Sophie Wrobel, Simon Thiel:
Multilaterally Secure Communication Anonymity in Decentralized Social Networking. 498-504 - Youngjoon Byun, Sathya Narayanan, Stephanie Mott, Ken Biba, Jason Schwenkler, Robert Osborn, Michael Morris:
Wireless Broadband Measurement in California. 505-509 - Denis Ávila Montini, Gustavo Ravanhani Matuck, Adilson Marques da Cunha, Luiz Alberto Vieira Dias, Alexandre Lima Possebon Ribeiro, Alessandra Avila Montini:
A Sampling Diagnostics Model for Neural System Training Optimization. 510-517 - Kashif Saleem, Norsheila Fisal:
Energy efficient information assured routing based on hybrid optimization algorithm for WSNs. 518-524 - Yenumula B. Reddy, Stephen Ellis:
Modeling Cognitive Radio Networks for Efficient Data Transfer Using Cloud Link. 525-530 - Miresmaeil Mirnabibaboli, Mher Markosyan, Hassa Hejr:
Supporting of Mobility by Cooperation Nodes in the Wireless Sensor Network Routing. 531-537
Peer to Peer Technologies
- R. B. Dubey, Sujata Bhatia, Madasu Hanmandlu, Shantaram Vasikarla:
Breast Cancer Segmentation Using Bacterial Foraging Algorithm. 541-545 - Müge Fesci-Sayit, Yagiz Kaymak, Kemal Deniz Teket, Cihat Cetinkaya, Sercan Demirci, Geylani Kardas:
Parent Selection via Reinforcement Learning in Mesh-Based P2P Video Streaming. 546-551 - Chin Teck Min, Tong Ming Lim, Andreas Mauthe:
A Study on the Bootstrapping Architectures for Scalable Private Reappearing Overlay Network. 552-557
Data Mining
- Ivo Serra, Rosario Girardi, Paulo Novais:
PARNT: A Statistic based Approach to Extract Non-Taxonomic Relationships of Ontologies from Text. 561-566 - Mali Abdollahian:
The Impact of Body Mass Index on Low Birth Weight. 567-572 - Yong Shi, Brian Graham:
Similarity Search Problem Research on Multi-dimensional Data Sets. 573-577 - Mali Abdollahian:
Capability Analysis for Modulus of Elasticity and Modulus of Rupture. 578-583 - Ray R. Hashemi, Mahmood Bahar, Azita Bahrami, Nicholas Tyler, Matthew Antonelli:
Zinc-Protoporphyrin Metabolite Level Affected by Work Environment Stresses. 584-589 - Habib Ullah Khan, Shafiq Ahmad, Mali Abdollahian:
Supply Chain Technology Acceptance, Adoption, and Possible Challenges: A Case Study of Service Organizations of Saudi Arabia. 590-595 - Salyer B. Reed, Tyson R. C. Reed, Sergiu M. Dascalu:
Coupling Recursive Hyperspheric Classification with Linear Discriminant Analysis for Improved Results. 596-601 - Mali Abdollahian, L. Lasmini:
Forecasting Wet Land Rice Production for Food Security. 602-607 - Yinle Zhou, John R. Talburt, Eric D. Nelson:
User-Defined Inverted Index in Boolean, Rule-Based Entity Resolution Systems. 608-612 - Carla Gomes de Faria, Rosario Girardi, Paulo Novais:
Analysing the Problem and Main Approaches for Ontology Population. 613-618 - Luis Eduardo Santos, Rosario Girardi, Paulo Novais:
A Case Study on the Construction of Application Ontologies. 619-624
Software Security
- Hossain Shahriar, Hisham M. Haddad:
Rule-Based Source Level Patching of Buffer Overflow Vulnerabilities. 627-632 - Michelle Ruse, Samik Basu:
Detecting Cross-Site Scripting Vulnerability Using Concolic Testing. 633-638 - Csilla Farkas, Sidney Valentine:
Software Safety and Security for Programmable Logic Controllers. 639 - Alessandro Barenghi, Gerardo Pelosi, Fabio Pozzi:
Drop-In Control Flow Hijacking Prevention through Dynamic Library Interception. 640-647 - Michael Terrell, Natarajan Meghanathan:
Setting Up of a Cloud Cyber Infrastructure Using Xen Hypervisor. 648-652 - Masaya Yoshikawa, Toshiya Asai:
Platform for Verification of Electromagnetic Analysis Attacks against Cryptographic Circuits. 653-658
Potpourri
- Cagatay Catal, Muratcan Atalay:
A Systematic Mapping Study on Architectural Analysis. 661-664 - Khasfariyati Razikin, Dion Hoe-Lian Goh, Chei Sian Lee:
A User-centric Approach towards Understanding the Influences of Social Tags Choices for Academic Papers. 665-670 - Sang Hun Park, Dong Ho Shin, Bang-Young Kim, Myoung Young Lee, Heung Ki Baik, Dong Heon Lee, Jeong-Hwan Seo, Chul-Gyu Song:
Real-time, High-resolution Diagnosis for Osteoarthritis in the Rat Using Common-Path Fourier-Domain Optical Coherence Tomography. 671-673 - Joyce M. S. França, Caio Augusto R. Dos Santos, Kênia Santos de Oliveira, Michel dos Santos Soares:
An Empirical Evaluation of Refactoring Crosscutting Concerns into Aspects Using Software Metrics. 674-679 - Kênia Santos de Oliveira, Joyce M. S. França, Michel S. Soares:
Extensions of SysML for Modeling an Aspect Oriented Software Architecture with Multiple Views. 680-685 - Laxmi P. Gewali, Umang Amatya:
Node Filtering and Face Routing for Sensor Network. 686-691 - Pyung Soo Kim, Mun-Suck Jang, Eung Hyuk Lee:
An IEEE 802.21 MIH Functionality Assisted Proxy Mobile IPv6 for Reducing Handover Latency and Signaling Cost. 692-695 - Chouvalit Khancome, Veera Boonjing, Pisit Chanvarasuth:
A Two-Hashing Table Multiple String Pattern Matching Algorithm. 696-701 - Hanan A. Al Mehairi:
Empowering Knowledge Sharing Behaviours through Means Oriented vs. Goal Oriented Cultures: The Impact of Organizational Culture on Knowledge Sharing. 702-705 - Butta Singh, Gurmej Singh:
Evaluation of Multiscale Entropy based HRV for Ectopic Beats. 706-711 - Indu Saini, Dilbag Singh, Arun Khosla:
Delineation of ECG Wave Components Using K-Nearest Neighbor (KNN) Algorithm: ECG Wave Delineation Using KNN. 712-717
Posters
- Denis Ávila Montini, Paulo Marcelo Tasinaffo, Luiz Alberto Vieira Dias, Alvaro Augusto Neto, Adilson Marques da Cunha, Alessandra Avila Montini:
A Meta-algorithm for Planning Optimization in a software Production Line. 721-726 - Saif Rahman, Yiruo He, Huapeng Wu:
Public-Key Based Efficient Key Distribution in Bluetooth. 727-728 - Swarnendu Kumar Chakraborty, Rajat Subhra Goswami, Abhinandan Bhunia, Chandan Tilak Bhunia:
Two New Modified Schemes of Aggressive Packet Combining Schemes in Achieving Better Throughput. 729-730 - Haitham S. Hamza, Amr Kamel, Khaled Mohamed Shams:
Software Effort Estimation Using Artificial Neural Networks: A Survey of the Current Practices. 731-733 - Strauss Cunha Carvalho, Felipe Rafael Motta Cardoso, Adilson Marques da Cunha, Luiz Paulo Zanetti:
A Comparative Research between SCRUM and RUP Using Real Time Embedded Software Development. 734-735 - Adriana da Silva Jacinto, Etiene Lamas, Luiz Alberto Vieira Dias, Adilson Marques da Cunha, Tatiana Martins Almeri:
Interdisciplinarity in Computer Science: A Case Study on Graduate Courses. 736-737 - Susan P. Imberman, Sarah Zelikovitz, Irene Ludwig:
An Ophthalmologist's Tool for Predicting Deterioration in Patients with Accommodative Esotropia. 738-742 - Alexandre Ivánovich Grebénnikov:
3D Visualization of Space Distribution of Electrical Characteristics in Compound Structures Reconstructed by General Ray Method. 743-744 - Ling-Yao Huang, Wei-Lun Chang:
A Two-Step Approach for Mining Service Cooperation. 745-746 - Alan Shaw:
Teaching Students to Design and Implement Social Networks Using MVC as a Capstone Experience. 747-748 - Jon Inouye:
Analysis of Classical and Quantum Resources for the Quantum Linear Systems Algorithm. 749-753 - B. John Osteen, Suresh Ramanan, Karthik Jeganathan:
Optimizing the Cost of Software Quality - A Path to Delivery Excellence. 754-756 - Behnam Bahreman:
Investigating Benefits and Limitations of E-Procurement in B2B Automakers Companies in Iran. 757-758 - Qian Wang, Chun Yu, Naijia Liu:
An Approach to Heterogeneous Database Migration. 759-760 - Naohiro Fukuda, Tamotu Kinoshita, Takayuki Kubo:
On the Finite Element Method with Riesz Bases and Its Applications to Some Partial Differential Equations. 761-766 - Hamdi Alagha:
Examining the Relationship between IT Governance Domains, Maturity, Mechanisms, and Performance: An Empirical Study toward a Conceptual Framework. 767-772 - M. Kondala Rao, K. V. S. S. R. S. S. Sarma, P. S. Avadhani:
A Model on Dynamic Threshold Multi-Secret Sharing Scheme using Pell's Equation with Jacobi Symbol. 773-776 - Ibraheem Alolyan:
Linear Programming with Fuzzy Objective Function. 777-778 - Vicky M.-H. Lim, Tong-Ming Lim, Siew Fan Wong:
Text-to-Onto Miner: A Concept Driven and Interval Controlled Ontology Builder. 779-780 - Venkat N. Gudivada, Rajeev Agrawal, Chunbo Chu:
Online Teaching and Learning Strategies for Programming-intensive Courses. 781-782
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.