default search action
3rd ITNG 2006: Las Vegas, Nevada, USA
- Third International Conference on Information Technology: New Generations (ITNG 2006), 10-12 April 2006, Las Vegas, Nevada, USA. IEEE Computer Society 2006, ISBN 0-7695-2497-4
Introduction
- General Chair's Message.
- Reviewers.
Session MA1: IT Education
- Varsha Hemant Patil, Snehal M. Kamlapur, Manikrao L. Dhore:
Six Sigma in Education: To Achieve Overall Excellence in the Field of Education. 2-5 - Jacob R. Miller, Sandra Gorka, Barry M. Lunt, Joseph J. Ekstrom, Eydie Lawson, Han Reichgelt, Reza Kamali:
Hiring the IT Graduate: What's in the Box? 6-10 - Inger Björkman, Ann Johansson:
Implications of IT in Different Professions. 11-19
Session MA2: Software Engineering I
- Ghita Kouadri Mostéfaoui, Zakaria Maamar, Nanjangud C. Narendra, Sattanathan Subramanian:
Decoupling Security Concerns in Web Services Using Aspects. 20-27 - Hisham M. Haddad:
Integrated Collections: Approach to Software Component Reuse. 28-33 - Sumanth Yenduri:
An Agglomerative Clustering Methodology For Data Imputation. 34-39 - Eugenio Capra, Chiara Francalanci:
Cost Implications of Software Commonality and Reuse. 40-45 - Umesh Bellur, V. Vallieswaran:
On OO Design Consistency in Iterative Development. 46-51 - Abbas Heydarnoori, Farhad Mavaddat:
Reliable Deployment of Component-based Applications into Distributed Environments. 52-57 - Stefan Senczyna:
Modular Model of a Logic Circuit Using Object-Oriented Programming. 58-65
Session MA3: Software Engineering II
- Chia-Chu Chiang:
A Language for Writing Formal Software Specifications: The Library Problem Revisited. 66-71 - Göran Calås, Andreas Boklund, Stefan Mankefors-Christiernin:
A First Draft of RATF: A Method Combining Robustness Analysis and Technology Forecasting. 72-77 - Hai Yan, Zhijie Jerry Shi:
Studying Software Implementations of Elliptic Curve Cryptography. 78-83 - Radwan Tahboub, Vasile Lazarescu:
Novel Approach for Remote Energy Meter Reading Using Mobile Agents. 84-89 - Elhadi M. Shakshuki, Abdul Wasey Matin:
RL-Agent That Learns in Collaborative Virtual Environment. 90-95 - Walter Dosch:
On History-Sensitive Models of Interactive Stacks. 96-103 - L. Robert, R. Nadarajan:
New Algorithms For Random Access Text Compression. 104-111
Session MA4: Software Engineering III
- Shifeng Zhang:
Integrating Non-Functional Properties to Architecture Specification and Analysis. 112-117 - Iván Martínez-Ortiz, Pablo Moreno-Ger, José Luis Sierra, Baltasar Fernández-Manjón:
Production and Maintenance of Content-Intensive Videogames: A Document-Oriented Approach. 118-123 - Tien Nhut Nguyen:
Integrating Change Management with Software Document Relationship Management. 124-130 - Elhadi M. Shakshuki, Omkarnath Prabhu:
Agent Launch Pattern for Creating Agents. 131-136 - Samir N. Hamade:
The Legal and Political Aspects of Software Piracy in the Arab World. 137-142 - Wang-chan Wong, Mohammad Eyadat, Shane Ng:
Degree of Freedom - Experience of Applying Software Framework. 143-148 - Meurig Beynon, Russell Boyatt, Steve B. Russ:
Rethinking Programming. 149-154 - Jitender Kumar Chhabra, K. K. Aggarwal:
Measurement of Intra-Class & Inter-Class Weakness for Object-Oriented Software. 155-160 - Raed Shatnawi, Wei Li:
An Investigation of Bad Smells in Object-Oriented Design. 161-165
Session MB1: Embedded Cryptographic Systems I
- Maged Hamada Ibrahim:
Two-Party Private Vector Dominance: The All-Or-Nothing Deal. 166-171 - Adam J. Elbirt, Christof Paar:
Efficient Implementation of Galois Field Fixed Field Constant Multiplication. 172-177 - Kooroush Manochehri, Saadat Pourmozafari, Babak Sadeghiyan:
Efficient Methods in Converting to Modulo 2^n+1 and 2^n-1. 178-185
Session MB2: Embedded Cryptographic Systems II
- Guido Bertoni, Luca Breveglieri, Pasqualina Fragneto, Gerardo Pelosi:
Parallel Hardware Architectures for the Cryptographic Tate Pairing. 186-191 - Robert Ronan, Colm O'hEigeartaigh, Colin C. Murphy, Michael Scott, Tim Kerins, William P. Marnane:
An Embedded Processor for a Pairing-Based Cryptosystem. 192-197 - He Ge, Stephen R. Tate:
Efficient Authenticated Key-Exchange for Devices with a Trusted Manager. 198-203 - Kris Tiri, Patrick Schaumont, Ingrid Verbauwhede:
Side-Channel Leakage Tolerant Architectures. 204-209 - Nadia Nedjah, Luiza de Macedo Mourelle:
Four Hardware Implementations for the M-ary Modular Exponentiation. 210-215 - Nadia Nedjah, Luiza de Macedo Mourelle, Marco Paulo Cardoso:
A Compact Piplined Hardware Implementation of the AES-128 Cipher. 216-221
Session MB3: High Performance Computer Architectures
- Mei Yang, Mayauna McCullough, Yingtao Jiang, Jun Zheng:
K-Selector-Based Dispatching Algorithm for Clos-Network Switches. 222-226 - Rama Sangireddy:
Instruction Format Based Selective Execution for Register Port Complexity Reduction in High-Performance Processors. 227-232 - Erik S. Gough, Michael D. Kane:
Evaluating Parallel Computing Systems in Bioinformatics. 233-238 - Yulu Yang, Yang Yu:
RDT Properties and Evaluations. 239-244 - Jianfeng An, Xiaoya Fan, Shengbing Zhang, Danghui Wang, Yi Wang:
VMSIM: Virtual Machine Based a Full System Simulation Platform for Microprocessors' Functional Verification. 245-249 - Hooman Parizi, Afshin Niktash, Amir Hosein Kamalizad, Nader Bagherzadeh:
A Reconfigurable Architecture for Wireless Communication Systems. 250-255
Session MB4: Sensor Networks
- Fei Hu, Carter May, Xiaojun Cao:
Data Aggregation in Distributed Sensor Networks: Towards An Adaptive Timing Control. 256-261 - Nahdia Tabassum, Quazi Ehsanul Kabir Mamun, Yoshiyori Urano:
COSEN: A Chain Oriented Sensor Network for Efficient Data Collection. 262-267 - Laxmi P. Gewali, Khursheed Mohamad, Min Tun:
Interference Aware Dominating Set for Sensor Network. 268-273 - Mathew M. Noel, Parag P. Joshi, Thomas C. Jannett:
Improved Maximum Likelihood Estimation of Target Position in Wireless Sensor Networks using Particle Swarm Optimization. 274-279 - Hyojung Lee, Wonpil Yu, Youngmi Kwon:
Efficient RBS in Sensor Networks. 279-284 - Vasu Jolly, Naoto Kimura, Shahram Latifi:
Reliable Multipath Information Dissemination via Label Forwarding in Wireless Sensor Networks. 285-293
Session TA1: Mobile Enterprise I
- Philip Garner, Ian Mullins, Reuben Edwards, Paul Coulton:
Mobile Terminated SMS Billing - Exploits and Security Analysis. 294-299 - Werner Kurschl, Stefan Mitsch, Rene Prokop:
SmartDOTS - A Framework for Efficient Data Synchronization on Mobile Devices. 300-305 - Moushumi Sharmin, Shameem Ahmed, Sheikh Iqbal Ahamed:
MARKS (Middleware Adaptability for Resource Discovery, Knowledge Usability and Self-healing) for Mobile Devices of Pervasive Computing Environments. 306-313
Session TA2: Mobile Enterprise II
- Tommi Laukkanen, Teuvo Kantanen:
Consumer Value Segments in Mobile Bill Paying. 314-319 - Tarek El Kiki, Elaine Lawrence:
Government as a Mobile Enterprise: Real-time, Ubiquitous Government. 320-327 - Werner Kurschl, Stefan Mitsch, Rene Prokop:
SelectiveDES: A Distributed Event Service Add-On for Invocation-Based Middleware supporting Selective Multi-Channel Communication and Notification Delivery. 328-333 - Abdul Nasir, Mah-Rukh:
Internet Mobility using SIP and MIP. 334-339 - Eunjung Lee, Jinsuk Baek, Shou-Hsuan Stephen Huang:
A Dynamic Mobility Management Scheme for VoIP Services. 340-345 - Natali Delic, Ana Vukasinovic:
Mobile Payment Solution - Symbiosis Between Banks, Application Service Providers and Mobile NetworkOperators. 346-350 - Jawed I. A. Siddiqi, Babak Akhgar, Mehrdad Naderi, Wolfgang Orth, Norbert Meyer, Miika Tuisku, Gregor Pipan, Mario López Gallego, José Alberto García, Maurizio Cecchi, Jean-Noël Colin:
Secure ICT Services for Mobile and Wireless Communications: A Federated Global Identity Management Framework. 351-357
Session TA3: Web Technologies
- Isak Taksa, Amanda Spink:
Using the Web to Construct Taxonomy for a Heterogeneous Community of Practice. 358-363 - Michelle Cheatham, Mateen M. Rizki:
Feature and Prototype Evolution for Nearest Neighbor Classification of Web Documents. 364-369 - Amanda Spink, Bernard J. Jansen, Chris Blakely, Sherry Koshman:
Overlap Among Major Web Search Engines. 370-374 - Nadine Schmidt-Maenz, Martina Koch:
A General Classification of (Search) Queries and Terms. 375-381 - Gil Cheol Park, Seoksoo Kim, Gun Tae Bae, Yang Sok Kim, Byeong Ho Kang:
An Automated WSDL Generation and Enhanced SOAP Message Processing System for Mobile Web Services. 382-387 - Satoshi Niwa, Takuo Doi, Shinichi Honiden:
Web Page Recommender System based on Folksonomy Mining for ITNG '06 Submissions. 388-393 - Daqing He:
A Study of Self-Organizing Map in Interactive Relevance Feedback. 394-401
Session TA4: Internet and Wireless Security
- Dhilak Damodaran, Rohit Singh, Phu Dung Le:
Group Key Management in Wireless Networks Using Session Keys. 402-407 - Hao Luo, Binxing Fang, Xiao-chun Yun:
Anomaly Detection in SMTP Traffic. 408-413 - Hwa Young Um, Edward J. Delp:
A Secure Group Key Management Scheme for Wireless Cellular Networks. 414-419 - Dima Novikov, Roman V. Yampolskiy, Leon Reznik:
Anomaly Detection Based Intrusion Detection. 420-425 - Marko Hassinen, Maija Marttila-Kontio, Mikko Saesmaa, Heli Tervo:
Secure Two-Way Transfer of Measurement Data. 426-431 - Yiling Wang, Dhilak Damodaran, Phu Dung Le:
Efficient Group Key Management in Wireless Networks. 432-439
Session TB1: Information Security and Privacy I
- Mahdi Seify:
New Method for Risk Management in CRM Security Management. 440-445 - Ranjit Bose:
Intelligent Technologies for Managing Fraud and Identity Theft. 446-451 - Kazimierz Kowalski, Mohsen Beheshti:
Analysis of Log Files Intersections for Security Enhancement. 452-457
Session TB2: Information Security and Privacy II
- Xianping Wu, Osama Dandash, Phu Dung Le:
The Design and Implementation of a Smartphone Payment System based on Limited-used Key Generation Scheme. 458-463 - Dragos Trinca:
Sequential and Parallel Cascaded Convolutional Encryption with Local Propagation: Toward Future Directions in Symmetric Cryptography. 464-469 - Yu Yu, Jussipekka Leiwo, A. Benjamin Premkumar:
A Study on the Security of Privacy Homomorphism. 470-475 - Wei Wu, Phu Dung Le:
An Efficient and Secure Code Sharing for Peer-to-Peer Communications. 476-481 - Shang-Lin Hsieh, Hsuan-Chieh Huang, I-Ju Tsai:
A Copyright Protection Scheme for Gray-Level Images Using Human Fingerprint. 482-489
Session TB3: Data Mining and Checkpointing
- Emmanuel Udoh, Joshua Rhoades:
Mining Documents in a Small Enterprise Using WordStat. 490-494 - Arthi Anandhan, Senthil Dhandapani, Hassan Reza, Karthik Namasivayam:
Web Usability Testing - CARE Methodology. 495-500 - Yoon-Shik Tae, Jeong Woo Son, Mi-hwa Kong, Jun-Seok Lee, Seong-Bae Park, Sang-Jo Lee:
A Hybrid Approach to Error Reduction of Support Vector Machines in Document Classification. 501-506 - K. Vivek, M. Gopa, Bijaya Ketan Panigrahi:
Knowledge Discovery in Power Quality Data Using Support Vector Machine and S-Transform. 507-512 - Panida Songram, Veera Boonjing, Sarun Intakosum:
Closed Multidimensional Sequential Pattern Mining. 512-517 - Chaoguang Men, Yunlong Zhao, Wenbin Yao:
A Two-Phase Time-based Consistent Checkpointing Strategy. 518-523
Session TB4: VoIP/Signal Processing
- Ziad Al-Sharif, Clinton L. Jeffery:
Adding High Level VoIP Facilities to the Unicon Language. 524-529 - Chi Hun Lee, Yi Qi Gui, Inbum Jung, Changyeol Choi, Hwang Kyu Choi:
A Peer to Peer Prefix Patching Scheme for VOD Servers. 530-534 - Teck-Kuen Chua, David C. Pheanis:
Bandwidth-Conserving Real-Time VoIP Teleconference System. 535-540 - K. Lakshmi, Saswati Mukherjee:
An Improved Feature Selection using Maximized Signal to Noise Ratio Technique for TC. 541-546 - Madasu Hanmandlu, Anuj K. Tiwari, Vamsi Krishna Madasu, Shantaram Vasikarla:
Mixed Noise Correction in Gray Images using Fuzzy Filters. 547-553 - Umar Farooq, Muhammad Saleem, Habibullah Jamal:
Parameterized FIR Filtering IP Cores for Reusable SoC Design. 554-559
Session TC1: Posters
- Syed Afzal Murtaza Rizvi, Pankaj Agarwal:
A New Bucket-Based A New Bucket-Based Algorithm for Finding LCS from two given Molecular Sequences. 560-561 - Parag P. Joshi, Thomas C. Jannett:
Performance-Guided Reconfiguration of Wireless Sensor Networks that Use Binary Data for Target Localization. 562-565 - Mohammad Al-Shurman, Seong-Moo Yoo:
Key Pre-Distribution Using MDS Codes in Mobile Ad Hoc Networks. 566-567 - Kiarash Narimani, Gordon B. Agnew:
Key Management and Mutual Authentication for Multiple Field Records Smart Cards. 568-569 - Tianzhou Chen, Zhenjie He, Wei Hu:
Effectively implement AES for EFI/Tiano based on IA-32 Platform. 570 - Yi Wang, Jussipekka Leiwo, Thambipillai Srikanthan, Yu Yu:
FPGA based DPA-resistant Unified Architecture for Signcryption. 571-572 - Guido Bertoni, Luca Breveglieri, Matteo Venturi:
ECC Hardware Coprocessors for 8-bit Systems and Power Consumption Considerations. 573-574 - Tai-Chi Lee, Richard Zeien, Adam Roach, Patrick Robinson:
DES Decoding Using FPGA and Custom Instructions. 575-577 - Xiannong Meng:
A Comparative Study of Performance Measures for Information Retrieval Systems. 578-579 - Ssu-An Lo, Chong-Yen Lee, Chiun-Chieh Hsu:
Automatically Classify Web Sites by Multimembership Bayesian Approach. 580-583
Session TC2: Posters
- Andrei Smirnov, Steven Rowan:
Express Risk Assessment through Web Access to Simulation Data. 584-585 - Mikyeong Moon, Youngbong Kim, Keunhyuk Yeom:
Contextual Events Framework in RFID System. 586-587 - Akio Sashima, Noriaki Izumi, Koichi Kurumatani, Yoshiyuki Kotani:
Dynamic Role Assignment Protocol for Pervasive Computing. 588-589 - Nathan Denny, Theodore Elhourani, Jaime Denny, Scott Bissmeyer, David Irby:
SpamCooker: A Method for Deterring Unsolicited Electronic Communications. 590-591 - Emmanuell Udoh, J. Hoover:
Storage of a Portal-Extracted Data in a Relational Database. 592-594 - Nikolay Manchev:
Parallel Algorithm for Run Length Encoding. 595-596 - Shilpa Ambarish, Mahmoud Fawzy Wagdy:
A Wide-Band Digital Phase-Locked Looop. 597-598 - Haripriya Janardhan, Mahmoud Fawzy Wagdy:
Design of a 1GHz Digital PLL Using 0.18\mu m CMOS Technology. 599-600 - Narongrit Waraporn, Syed V. Ahamed:
Intelligent Medical Search Engine by Knowledge Machine. 601-605
Session WA1: Bioinformatic/Internet
- Hisham Al-Mubaid, Ping Chen:
Biomedical Term Disambiguation: An Application to Gene-Protein Name Disambiguation. 606-612 - Heidi J. C. Ellis, Susan Fox-Erlich, Timothy O. Martyn, Michael R. Gryk:
Development of an Integrated Framework for Protein Structure Determinations: A Logical Data Model for NMR Data Analysis. 613-618 - Kyle D. Lutes, Ibrahim M. Baggili:
Diabetic e-Management System (DEMS). 619-624 - Ray R. Hashemi, Alexander A. Tyler, Christopher Childers, Arthur Chausmer:
Similarity Analysis of Bone Mineral Density Measurements of Femur Sites Using Dendrogram. 625-630 - Li-Wei H. Lehman, Steven Lerman:
A Decentralized Network Coordinate System for Robust Internet Distance. 631-637 - Yunlong Zhao, Chaoguang Men, Nianmin Yao:
Internet Accessing for IPv6 MANETs. 638-645
Session WA2: Grid, Pervasive Computing/E-Gaming
- Ruay-Shiung Chang, Jih-Sheng Chang:
Adaptable Replica Consistency Service for Data Grids. 646-651 - Ziga Turk, Matevz Dolenc, Etiel Petrinja:
The Role of Collaboration Grids in the Roadmaps of Networked Organizations. 652-657 - L. J. Wang, A. S. M. Sajeev, Lachana Inchaiwong:
A Formal Specification of Interaction Widgets Hierarchy Framework. 658-664 - Jordi Castellà-Roca, Josep Domingo-Ferrer, Francesc Sebé:
On the Security of a Repaired Mental Poker Protocol. 664-668 - Ron Coleman:
Boosting Blackjack Returns with Machine Learned Betting Criteria. 669-673 - Sang-Soo Kim, Jeong Woo Son, Mi-hwa Kong, Seong-Bae Park, Sang-Jo Lee:
Korean Text Chunk Identification Using Support Vector Machines. 674-679 - Bhushan Bauskar, Boleslaw Mikolajczak:
Abstract Node Method for Integration of Object Oriented Design with Colored Petri Nets. 680-687
Session WB1: Design, Performance Analysis and Modeling
- Saurabh Mukherjee, Shashikala Tapaswi:
Modeling and Simulation of Virtual Warfare Using Virtual Reality Paradigm. 688-689 - Yi Yu, Man Lo Kai, Anthony S. Fong:
A Performance Analysis of an Object-Oriented Processor. 690-694 - Kazem Taghva, Min Xu, Emma E. Regentova, Thomas A. Nartker:
Utilizing XML Schema for Describing and Querying Still Image Databases. 695-700 - Seyyed Mohsen Hashemi, Mohammadreza Razzazi, Ali Bahrami:
ISRUP E-Service Framework for agile Enterprise Architecting. 701-706 - Pengyue J. Lin, Behrokh Samadi, Alan Cipolone, Daniel R. Jeske, Sean Cox, Carlos Rendón, Douglas Holt, Rui Xiao:
Development of a Synthetic Data Set Generator for Building and Testing Information Discovery Systems. 707-712 - Il-Woo Lee, Ho-Jin Park, Kwang-Roh Park, Sang-Ha Kim:
A Proposed Platform & Performance Estimation of Digital-Home Service Delivery/Management Systems. 713-719
Session WB2: Networks and Hardware
- Yoohwan Kim, Ju-Yeon Jo, Kyunghee Kim Suh:
Baseline Profile Stability for Network Anomaly Detection. 720-725 - Basim Alhadidi:
Middleware as an Infrastructure for Network Applications. 726-729 - Tan Ee Xion, Hiew Pang Leang:
Traffic Congestion Controller in Multihop Communication Network. 730-735 - E. Earl Eiland, Lorie M. Liebrock:
Optimizing Network Data Transmission. 735-741 - Mahmoud Fawzy Wagdy, Srishti Vaishnava:
A Fast-Locking Digital Phase-Locked Loop. 742-746 - Alexander Khitun, Kang L. Wang:
Nano Logic Circuits with Spin Wave Bus. 747-752
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.