default search action
5th ITNG 2008: Las Vegas, Nevada, USA
- Shahram Latifi:
Fifth International Conference on Information Technology: New Generations (ITNG 2008), 7-8 April 2008, Las Vegas, Nevada, USA. IEEE Computer Society 2008, ISBN 978-0-7695-3099-4 - Sergiy A. Vilkomir, W. Thomas Swain, Jesse H. Poore:
Combinatorial Test Case Selection with Markovian Usage Models. 3-8 - Salamah Salamah, Ann Q. Gates, Steve Roach:
Improving Pattern-Based LTL Formulas for Automata Model Checking. 9-14 - Kun Wang, Yuejian Xie, Sanli Li, Xiaoying Wang:
Performance Analysis of the OGSA-DAI 3.0 Software. 15-20 - Narayan C. Debnath, María Carmen Leonardi, María Virginia Mauco, German Montejano, Daniel Riesco:
Improving Model Driven Architecture with Requirements Models. 21-26 - Narayan C. Debnath, Laura Felice, German Montejano, Daniel Riesco:
A Feature Model of E-Government Systems Integrated with Formal Specifications. 27-31 - George A. Tsihrintzis, Maria Virvou, Efthymios Alepis, Ioanna-Ourania Stathopoulou:
Towards Improving Visual-Facial Emotion Recognition through Use of Complementary Keyboard-Stroke Pattern Information. 32-37 - Philippe Dugerdil, Sazzadul Alam:
Execution Trace Visualization in a 3D Space. 38-43 - Tihomir Calic, Sergiu Dascalu, Dwight D. Egbert:
Tools for MDA Software Development: Evaluation Criteria and Set of Desirable Features. 44-50 - Demis Ballis, Andrea Baruzzo, Marco Comini:
A Minimalist Visual Notation for Design Patterns and Antipatterns. 51-56 - Iman Poernomo, Timur Umarov:
Business Process Development in Semantically-Enriched Environment. 57-62 - Laurent Broto, Daniel Hagimont, Estella Annoni, Benoît Combemale, Jean Paul Bahsoun:
Towards a Model Driven Autonomic Management System. 63-69 - Karan Vij, Wenying Feng:
Boundary Value Analysis Using Divide-and-Rule Approach. 70-75 - Harry Gros-Desormeaux, Hacène Fouchal, Philippe Hunel:
Test Generation with DHT Networks. 76-81 - Maryam Razavian, Ramtin Khosravi:
Modeling Variability in Business Process Models Using UML. 82-87 - Walter Dosch, Annette Stümpel, Tõnu Tamme:
Streaming Dyadic Boolean Operations. 88-96 - Jeremy W. Pauli, Ty E. Lawrence, Brennon F. Brown:
Development of a New Software Product from a Classroom Project. 97-100 - Aleksey Koval, Boris S. Verkhovsky:
Analysis of RSA over Gaussian Integers Algorithm. 101-105 - Kazumasa Omote, Kazuhiko Kato:
Protection and Recovery of Disk Encryption Key Using Smart Cards. 106-111 - Alessandro Barenghi, Guido Bertoni, Luca Breveglieri, Gerardo Pelosi:
A FPGA Coprocessor for the Cryptographic Tate Pairing over Fp. 112-119 - Fan Zhang, Zhijie Jerry Shi:
An Efficient Window-Based Countermeasure to Power Analysis of ECC Algorithms. 120-126 - Sattar J. Aboud, Mohammad Ahmed Al-Fayoumi, Mustafa Al-Fayoumi, Haidar S. Jabbar:
An Efficient RSA Public Key Encryption Scheme. 127-130 - Christoph Puttmann, Jamshid Shokrollahi, Mario Porrmann:
Resource Efficiency of Instruction Set Extensions for Elliptic Curve Cryptography. 131-136 - Mostafa-Sami M. Mostafa, Safia H. Deif, Hisham Abdel Elazeem Ismail Kholidy:
ULTRA GRIDSEC: Peer-to-Peer Computational Grid Middleware Security Using High Performance Symmetric Key Cryptography. 137-142 - John K. Debenham, Elaine Lawrence:
Automating Contract Negotiation. 143-148 - Haiping Xu, Sol M. Shatz, Christopher K. Bates:
A Framework for Agent-Based Trust Management in Online Auctions. 149-155 - Hamed Janzadeh, Ahmad Kardan:
A Multi-Issue Negotiation Mechanism for Bounded Rational Negotiators. 156-161 - Mark Smith, Alireza Khotanzad:
Efficient Indexing and Storage Algorithm for Visual Databases. 162-166 - Rabia Jafri, Hamid R. Arabnia:
Fusion of Face and Gait for Automatic Human Recognition. 167-173 - Tristan Ling, Byeong Ho Kang, David P. Johns, Justin Walls, Ivan Bindoff:
Expert-Driven Knowledge Discovery. 174-178 - Kazem Taghva, Jason Vergara:
Feature Selection for Document Type Classification. 179-182 - Hassan Reza, Kirk Ogaard, Amarnath Malge:
A Model Based Testing Technique to Test Web Applications Using Statecharts. 183-188 - Hassan Reza, Steve Buettner, Varun Krishna:
A Method to Test Component Off-the-Shelf (COTS) Used in Safety Critical Systems. 189-194 - Quocnam Tran:
Mining Medical Databases with Modified Gini Index Classification. 195-200 - Jawed I. A. Siddiqi, Babak Akhgar, Alicja Gruzdz, Ghasem Zaefarian, Aleksandra Ihnatowicz:
Automated Diagnosis System to Support Colon Cancer Treatment: MATCH. 201-205 - Rahat Iqbal, Kashif Iqbal, Nazaraf Shah, Jawed I. A. Siddiqi, Anne E. James:
Development of Context-Aware Systems to Support Human-Human Communication and Collaboration. 206-211 - Charilaos Tsivopoulos, Jawed I. A. Siddiqi, Babak Akhgar, Shahram Rahimi, Morvarid Bassir:
An Overlay Discovery Algorithm towards a Pure Distributed Communication System. 212-217 - Ryan Coombes, Jawed I. A. Siddiqi:
A Framework for IT as a Utility. 218-223 - Mohammad Hjouj Btoush, Jawed I. A. Siddiqi, Babak Akhgar, Ziad Dawahdeh:
Observations on Compressing Text Files of Varying Length. 224-228 - Yufeng Guo, Qiong Li, Guangming Liu, Yusheng Cao, Lei Zhang:
A Distributed Shared Parallel IO System for HPC. 229-234 - Xuerong Feng, Chunlei Liu, Jun Kong:
Sorting on Partially Connected Mesh Networks. 235-240 - Salah Merniz, Mohamed Benmohammed:
A Scalable Proof Methodology for RISC Processor Designs: A Functional Approach. 241-246 - Anthony S. Fong, C. Y. Ho:
Global/Local Hashed Perceptron Branch Prediction. 247-252 - Yaoting Jiao, Mei Yang, Yingtao Jiang, Yulu Yang, Xiao-chun Yun:
Deadlock-Free Multi-Path Routing for Torus-Based NoCs. 253-258 - Shankar Neelkrishnan, Mei Yang, Yingtao Jiang, Lei Zhang, Yulu Yang, Enyue Lu, Xiao-chun Yun:
Design and Implementation of a Parameterized NoC Router and its Application to Build PRDT-Based NoCs. 259-264 - Shay Gueron, Michael E. Kounavis:
A Technique for Accelerating Characteristic 2 Elliptic Curve Cryptography. 265-272 - Naoki Iwasaki, Katsumi Wasaki:
A Meta Hardware Description Language Melasy for Model-Checking Systems. 273-278 - Min He, Ming-Che Tsai, Xiaolong Wu, Fei Wang, Ramzi Nasr:
Hardware/Software Codesign - Pedagogy for the Industry. 279-284 - Jinkun Li, Bo Wang, Yongjian Li, Hao Fu:
The Confirmatory Research on Representative Method of Knowledge Work Process. 285-290 - Firat Kart, Louise E. Moser, P. Michael Melliar-Smith:
Collaborative Computing Using the Atom Publishing Protocol. 291-296 - S. Sampath, Ravi Iyer, K. S. Sridharan, Ravi Mukkamala, Sandhya Kapoor:
Secure Web-Based Sharing of Health Information Services Using Ad-Hoc Dynamic Coalitions. 297-302 - Tianyang Wang, Zhiyi Fang, Lianyu Zhao, Dan Zhao, Peng Xu, Jin Liu:
Implementation of Collaborative Control in Supply Chain Management by Using DA and Workflow Technology. 303-308 - Yun-Ke Chang, Miguel A. Morales Arroyo, Amanda Spink, Myat Thu Aung, Kyaw Thu, Ya Lwin, Zaw Win Htike:
Search Engines' Help Systems. 309-314 - Robert Goldberg, Isak Taksa, Amanda Spink:
Metasearch Engines and Information Retrieval: Computational Complexity of Ranking Multiple Search Results. 315-320 - Ali Ghobadi Tapeh, Maseud Rahgozar:
A Knowledge-Based Question Answering System for B2C eCommerce. 321-326 - Fahim Gohar Awan, Muhammad Fainan Hanif:
A Unified View of Information-Theoretic Aspects of Cognitive Radio. 327-331 - Chandan Tilak Bhunia:
Error Forecasting Schemes of Error Correction at Receiver. 332-336 - Jiang Hanping, Shang Lei:
Research and Design for Unify XML-Based Management System Framework. 337-340 - Yenumula B. Reddy, Nandigam Gajendar:
Hybrid Approach for Spectrum Bidding in Wireless Communications for Maximizing the Profit. 341-347 - R. Aparna, B. B. Amberker:
Authenticated Secure Group Communication using Broadcast Encryption Key Computation. 348-353 - Christos V. Samaras, Vassilis Tsaoussidis:
On the Properties of Adaptive Additive Increase. 354-359 - Yenumula B. Reddy:
Detecting Primary Signals for Efficient Utilization of Spectrum Using Q-Learning. 360-365 - Shuping Liu, Jianwei Chen, Shushan Zhao, Fan Na:
Peer-to-Peer Application in Mobile Cellular Systems. 366-371 - Vittorio Ghini, Stefano Cacciaguerra, Giorgia Lodi, Fabio Panzieri:
Enhancing Mobile E-Witness with Access Point Selection Policies. 372-377 - John W. Barron, Azzam I. Moustapha, Rastko R. Selmic:
Real-Time Implementation of Fault Detection in Wireless Sensor Networks Using Neural Networks. 378-383 - Mark Wallis, Frans Henskens, Michael Hannaford:
Application Based Meta Tagging of Network Connections. 384-389 - Mohsen Chegin, Mahmood Fathy:
Optimized Routing Based on Mobility Prediction in Wireless Mobile Adhoc Networks for Urban Area. 390-395 - Ravinder Singh Joshi, Navdeep Kumar, Anju Sharma:
Setup Planning and Operation Sequencing Using Neural Network and Genetic Algorithm. 396-401 - Baiqiang Liu, Takeshi Tsuchiya, Kei'ichi Koyanagi:
Honeycomb: A Novel Approach for Construction of Stable ALM Overlay. 402-407 - Rashid Bin Muhammad:
Transmitting Range Assignments Using Steiner Tree in Ad Hoc Wireless Networks. 408-413 - Serafettin Alpay, Inci Sariçiçek:
Agent-Based Shop-Floor Control System in a Dynamic Environment. 414-419 - Maher Ragheb Aburrous, M. Alamgir Hossain, Fadi A. Thabtah, Keshav P. Dahal:
Intelligent Quality Performance Assessment for E-Banking Security using Fuzzy Logic. 420-425 - Fadi A. Thabtah, Qazafi Mahmood, Lee McCluskey:
Looking at the Class Associative Classification Training Algorithm. 426-431 - Hannu Mäyrä, Mauno Rönkkö:
Reverse Engineering Functional Classes: A Middleware Case Study. 432-437 - Sebastian Herold, Andreas Rausch, Alexander Bösl, Jan Ebell, Christian Linsmeier, Detlef Peters:
A Seamless Modeling Approach for Service-Oriented Information Systems. 438-446 - Chia-Chu Chiang, John R. Talburt, Ningning Wu, Elizabeth M. Pierce, Christopher Heien, Ebony Gulley, JaMia Moore:
A Case Study in Partial Parsing Unstructured Text. 447-452 - Mauricio Jose Ordoñez, Hisham M. Haddad:
The State of Metrics in Software Industry. 453-458 - Farzad Sanati, Jie Lu:
Semantic Web for E-Government Service Delivery Integration. 459-464 - (Withdrawn) Managing Process Interaction in IS Development Projects. 465-470
- Samer Hanna, Malcolm Munro:
Fault-Based Web Services Testing. 471-476 - Jamal Bentahar, Babak Khosravifar:
Using Trustworthy and Referee Agents to Secure Multi-Agent Systems. 477-482 - Venkat N. Gudivada, Jagadeesh Nandigam, Jay N. Bhuyan:
A Conceptual Framework for Application Comprehension. 483-488 - Abdelwahab Hamou-Lhadj:
Measuring the Complexity of Traces Using Shannon Entropy. 489-494 - Saad Alharbi, Dimitrios I. Rigas:
Graphical Browsing of Email Data: An Empirical Investigation. 495-499 - Binh Viet Phan, Eric Pardede:
Towards the Development of XML Benchmark for XML Updates. 500-505 - Sudharsan R. Iyengar:
Incorporating Product Development in CS Curriculum. 506-511 - Joseph M. Woodside:
HOMER: Home-Based Object-Relational Medical Electronic Record. 512-517 - Jaruek Chookittikul, Supphachai Busarathit, Wajee Chookittikul:
A Six Sigma Support Information System: Process Improvement at a Thai University. 518-523 - Janet L. Kourik, Peter E. Maher:
Establishing a Consistent Curriculum in a Distributed Campus Environment: Lessons Learned while Moving Towards Accreditation. 524-527 - Suthathip Suanmali:
Maple in Mathematics. 528-533 - Delin Tan, Shou-Hsuan Stephen Huang:
Integrating Direct3D Programming into Computer Science Curriculum. 534-538 - Jeff Pittges:
A Production Support Infrastructure for Live Student Projects. 539-544 - Manik Lal Das, V. Lakshmi Narasimhan:
Towards a Formal Verification of an Authentication Protocol Using Non-Monotonic Logic. 545-550 - Hui Zhao, Zhiyi Fang, Peng Xu, Lianyu Zhao, Jin Liu, Tianyang Wang:
An Improved Role-Based Workflow Access Control Model. 551-556 - Jiang Li, Moses Garuba:
Encryption as an Effective Tool in Reducing Wireless LAN Vulnerabilities. 557-562 - Jae-Gil Yu, Eun-Joon Yoon, Sang-Ho Shin, Kee-Young Yoo:
A New Image Steganography Based on 2k Correction and Edge-Detection. 563-568 - Se-Min Kim, Gil-Je Lee, Kee-Young Yoo:
Palette and Index Change Technique for Steganoraphy Based on an Indexcolor. 569-574 - Eun-Jun Yoon, Eun-Jung Lee, Kee-Young Yoo:
Cryptanalysis of Wang et al.'s Remote User Authentication Scheme Using Smart Cards. 575-580 - Yuseung Sohn, Hyun-Yi Moon, Seunglim Yong, Sang-Ho Lee:
Security Issues of Collaborative Review System. 581-586 - Moses Garuba, Jiang Li, Zhenqiang Yi:
Security in the New Era of Telecommunication: Threats, Risks and Controls of VoIP. 587-591 - Moses Garuba, Chunmei Liu, Duane Fraites:
Intrusion Techniques: Comparative Study of Network Intrusion Detection Systems. 592-598 - Yeonjung Kang, Haeryong Park, Kilsoo Chun, Junghwan Song:
A Digital Identity Management Service Model. 599-602 - Manik Lal Das, V. Lakshmi Narasimhan:
EARS: Efficient Entity Authentication in Remote Systems. 603-608 - Piyush Kumar Shukla, Sanjay Silakari, Sarita Singh Bhadoria, Anuj Garg:
Multi-User FPGA - An Efficient Way of Managing Expensive FPGA Resources Using TCP/IP, Wi-Max/ Wi-Fi in a Secure Network Environment. 609-614 - Javed I. Khan, Kailas B. Bobade, Manas Hardas:
Personalized Negotiation Based on Individualization: Incorporating Personalization into Peer-to-Peer System. 615-621 - Brunil Romero, Marianella Villegas, Marina Meza:
Simon's Intelligence Phase for Security Risk Assessment in Web Applications. 622-627 - Moses Garuba, Chunmei Liu, Alicia Nicki Washington:
A Comparative Analysis of Anti-Malware Software, Patch Management, and Host-Based Firewalls in Preventing Malware Infections on Client Computers. 628-632 - Shanshan Li, Qun Wang:
DHPA: A New Distributed High Performance Architecture for Space Environment Modeling and Simulation. 633-638 - Emilia de Menezes Colonese:
Using Built-In Interoperability with Self-Adaptive Components for RTS. 639-644 - Francisco Supino Marcondes, Emilia de Menezes Colonese, Ítalo Santiago Vega, Luiz Alberto Vieira Dias:
Proposing a Formal Method to Reduce RTS Logical Model Complexity. 645-650 - João Cadamuro Junior, Douglas Renaux:
Efficient Monitoring of Embedded Real-Time Systems. 651-656 - Wanessa Pereira Dias, Emilia Colonese:
Performance Analysis of Cache and Scratchpad Memory in an Embedded High Performance Processor. 657-661 - Sudharsan R. Iyengar:
Formulating Pseudo-Natural Language. 662-667 - Manish Kumar Jindal, Rajendra Kumar Sharma, Gurpreet Singh Lehal:
Structural Features for Recognizing Degraded Printed Gurmukhi Script. 668-673 - N. Deniz Alp, Çigdem Turhan:
English to Turkish Example-Based Machine Translation with Synchronous SSTC. 674-679 - Bekir Taner Dinçer, Bahar Karaoglan, Tarik Kisla:
A Suffix Based Part-of-Speech Tagger for Turkish. 680-685 - Chee Wee Leong, Samer Hassan:
Exploiting Wikipedia for Directional Inferential Text Similarity. 686-691 - Shravya Nimmagadda, Amrita Basu, Matthew Eavenson, Jun Han, Maciej Janik, Rajesh Narra, Kishore Nimmagadda, Arpan Sharma, Krys J. Kochut, John A. Miller, William S. York:
GlycoVault: A Bioinformatics Infrastructure for Glycan Pathway Visualization, Analysis and Modeling. 692-697 - Pisit Chanvarasuth:
The Impact of Business Process Outsourcing on Firm Performance. 698-703 - Akadej Udomchaiporn, Veera Boonjing:
A Search-Free Intersection Algorithm. 704-708 - Jirapond Tadrat, Veera Boonjing:
An Experiment Study on Text Transformation for Compression Using Stoplists and Frequent Words. 709-713 - Rachada Kongkachandra, Kosin Chamnongthai:
Abductive Reasoning for Keyword Recovering in Semantic-Based Keyword Extraction. 714-719 - Amjad Mehmood, Abdul Ghafoor, H. Farooq Ahmed, Zeeshan Iqbal:
Adaptive Transport Protocols in Multi Agent System. 720-725 - Werner Kurschl, Wolfgang Gottesheim, Stefan Mitsch, Rene Prokop, Johannes Schönböck, Wolfgang Beer:
A Two-Layered Deployment Scheme for Wireless Sensor Network based Location Tracking. 726-730 - Fan Zhang, Zhijie Jerry Shi, Bing Wang:
Chord-Based Key Establishment Schemes for Sensor Networks. 731-737 - Yen Yang Lim, Marco Messina, Frank Kargl, Leena Ganguli, Martin Fischer, Tommy Kwong-Kin Tsang:
SNMP-Proxy for Wireless Sensor Network. 738-743 - A. S. Poornima, B. B. Amberker:
A Secure Group Key Management Scheme for Sensor Networks. 744-748 - Sanghun Yun, Haengrae Cho, Xingcheng Liu:
Processing Ad-Hoc Queries in Wireless Sensor Networks. 749-754 - Hongyan Wang, Mei Yang, Yingtao Jiang, Shupeng Wang, Laxmi P. Gewali:
Overlapped Layers for Prolonging Network Lifetime in Multi-Hop Wireless Sensor Networks. 755-760 - Mahbod Ghelichi, Seied Kazem Jahanbakhsh, Esmaeil Sanaei:
RCCT: Robust Clustering with Cooperative Transmission for Energy Efficient Wireless Sensor Networks. 761-766 - Buket D. Barkana, Tamer Barkana:
A Vector Transform Application on a Coding Algorithm Based on the Polarity of Speech Signal. 767-771 - Deepak S. Deepawale, Rajesh Bachu, Buket D. Barkana:
Energy Estimation between Adjacent Formant Frequencies to Identify Speaker's Gender. 772-776 - Ibrahim Nasir, Ying Weng, Jianmin Jiang:
Novel Multiple Spatial Watermarking Technique in Color Images. 777-782 - Madasu Hanmandlu, Amioy Kumar, Vamsi Krishna Madasu, Prasad K. D. V. Yarlagadda:
Fusion of Hand Based Biometrics Using Particle Swarm Optimization. 783-788 - Madasu Hanmandlu, Davuluri Vineel, Vamsi Krishna Madasu, Shantaram Vasikarla:
Computer Aided Detection of Suspicious Masses and Micro-Calcifications. 789-794 - Imad Muhi El-Ddin, Hedley Morris, Mohammad Eyadat:
Watermarking: A New Approach. 795-800 - Ranga Raju Vatsavai, Shashi Shekhar, Thomas E. Burk, Budhendra L. Bhaduri:
*Miner: A Suit of Classifiers for Spatial, Temporal, Ancillary, and Remote Sensing Data Mining. 801-806 - Sajad Shirali-Shahreza, Mohammad Shirali-Shahreza:
A New Human Interactive Proofs System for Deaf Persons. 807-810 - Carolina López-Nicolás, Ángel Meroño-Cerdán:
Strategic KM, Innovation and Performance. 811-816 - Lei Zhang, Shixiong Xia, Shifei Ding, Yong Zhou, Qiulin Ding:
User Knowledge Requirement Model and its Hybrid Evolution Algorithm. 817-822 - Kota Tsubouchi, Kazuo Hiekata, Hiroyuki Yamato:
A Research on Predicting the Operation Function for the Workflow-Based Knowledge Management Software. 823-828 - Kazuo Hiekata, Hiroyuki Yamato, Wataru Oishi:
Knowledge Articulation Method Using Design Data History. 829-834 - Wei-Lun Chang:
An Ontology-Based Knowledge System for Supporting Position and Classification of Co-Branding Strategy. 835-840 - Joshua J. Pauli:
Incentive-Based Technology Start-Up Program for Undergraduate Students. 841-844 - Ann Svensson:
Instructional-Design Theories Applied on a Web-Based Learning Application. 845-850 - Wei Jia, Mingli Zhang:
Study on Customer Desired Value Change in a Business to Consumer Market. 851-856 - Yongping Hao, Pengfei Zeng, Weiping Shao:
Study of Multi-Agent Task Model Based on Product Structure Breakdown. 857-862 - Ageliki Tsioliaridou, Vassilis Tsaoussidis:
On the Properties of System-Wide Responsive Behavior. 863-868 - Irene Finocchi, Emanuele G. Fusco, Rossella Petreschi:
A Note on Algebraic Hypercube Colorings. 869-874 - Ning Zhang:
An Analysis Framework of Factors Influencing China Software and Information Service Offshore Outsourcing. 875-880 - Prem Uppuluri, Ajay Gupta:
Resource Usage Policy Specification for Managing Application Resources. 881-887 - Jianqiu Xu, Victor Teixeira de Almeida, Xiaolin Qin:
An Efficient Technique for Distance Computation in Road Networks. 888-893 - Saeid Rahati, Reihaneh Moravejian, Ehsan Mohamad Kazemi, Farhad Mohamad Kazemi:
Vehicle Recognition Using Contourlet Transform and SVM. 894-898 - P. Dhanapal Durai Dominic, Izzatdin Abdul Aziz, K. N. Goh:
A Decision Support System for Performance Appraisal. 899-903 - Thierry Vallée, Alain Bretto:
Hamiltonicity of Simplicial-Connected Graphs: An Algorithm Based on Clique Decomposition. 904-909 - Boris S. Verkhovsky:
Information Assurance and Secure Streaming Algorithm Based on Cubic Roots of Integers. 910-915 - Roman V. Yampolskiy:
Mimicry Attack on Strategy-Based Behavioral Biometric. 916-921 - Md. Maruf Monwar, Marina L. Gavrilova:
FES: A System for Combining Face, Ear and Signature Biometrics Using Rank Level Fusion. 922-927 - Adrian Kapczynski, Marcin Sobota:
Distributed Authentication Systems Enhanced by Quantum Protocols. 928-931 - Saeid Rahati, Reihaneh Moravejian, Farhad Mohamad Kazemi:
Gait Recognition Using Wavelet Transform. 932-936 - Xin Zhang, Changchun Gao, Wenwen Zheng:
Effects of Parameter Improvement Mechanisms for Intelligent E-Learning Systems. 937-942 - Azita A. Bahrami:
A Blocking Scheme for Identification of Components and Sub-Components of Semi-Structured E-Documents. 943-948 - Ali Shemshadi, Javad Soroor, Mohammad J. Tarokh:
An Innovative Framework for the New Generation of SCORM 2004 Conformant E-Learning Systems. 949-954 - Ahmad Kardan, Hamed Monkaresi:
Developing a Novel Framework for Effective Use of Implicit Feedback in Adaptive e-Learning. 955-960 - Ahmad A. Kardan, Nima Taghipour:
Decision Support Models for Personalized Course Composition with a Focus on Learning Styles. 961-966 - Mehdi Karami, Heidar Ali Shayanfar, Ali Ghobadi Tapeh, Siamak Bandari:
Learning Techniques to Train Neural Networks as a State Selector in Direct Power Control of DSTATCOM for Voltage Flicker Mitigation. 967-974 - Tarek El Kiki, Elaine Lawrence:
Mobile User Needs: Efficient Transactions. 975-981 - Stan Kurkovsky, David Strimple, Eric Nuzzi, Kerry Verdecchia:
Mobile Voice Access in Social Networking Systems. 982-987 - Edith Quispe Holgado, Manuel Rodríguez-Martínez, Edilberto García Rodríguez:
Optimization of WAMDAS: A Web Service-Based Wireless Alarm Monitoring and Data Acquisition System for Pharmaceutical Plants. 988-993 - Marco Messina, Yen Yang Lim, Elaine Lawrence, Don Martin, Frank Kargl:
Implementing and Validating an Environmental and Health Monitoring System. 994-999 - Kun Wang, Meng Wu, Subin Shen:
A Trust Evaluation Method for Node Cooperation in Mobile Ad Hoc Networks. 1000-1005 - Chengyong Liu, Layuan Li, Yang Xiang:
Research of Multi-Path Routing Protocol Based on Parallel Ant Colony Algorithm Optimization in Mobile Ad Hoc Networks. 1006-1010 - Tomi Räty, Lassi Lehikoinen, François Brémond:
Scalable Video Transmission for a Surveillance System. 1011-1016 - Ahmed Abukmail, Abdelsalam Helal:
A Near-Zero Run-Time Energy Overhead within a Computation Outsourcing Framework for Energy Management in Mobile Devices. 1017-1022 - Ron Coleman:
A Self-Healing Plug-in Parser for NMEA Streams. 1023-1027 - Vinay Rishiwal, Ashwani Kush, Shekhar Verma:
Stable and Energy Efficient Routing for Mobile Adhoc Networks. 1028-1033 - Kai-Zhong Jiang, Yuan-Qiong Wu, Zhao Lv, Junzhong Gu:
Research on Author's Semantic Similarity Based on Collaborative Network. 1034-1039 - Dieter Claeys, Koenraad Laevens, Joris Walraevens, Herwig Bruneel:
Delay in a Discrete-Time Queueing Model with Batch Arrivals and Batch Services. 1040-1045 - Jiang Li, Moses Garuba, Legand L. Burge III:
Multicast Using Static Trees. 1046-1052 - Laurence Hoflack, Stijn De Vuyst, Sabine Wittevrongel, Herwig Bruneel:
System Content and Packet Delay in Discrete-Time Queues with Session-Based Arrivals. 1053-1058 - Dieter Fiems, Stijn De Vuyst, Herwig Bruneel:
Flow Loss Characteristics in the Presence of Correlated Background Traffic. 1059-1064 - Hao Wang:
A Hierarchical Queueing Model for Streaming Video over Multi-Hop Wireless Networks. 1065-1070 - Rachod Patachaianand, Kumbesan Sandrasegaran:
System-Level Modeling and Simulation of Uplink WCDMA. 1071-1076 - Rotimi Iziduh, Lucky Adike, Alicia Nicki Washington:
Modeling Disruption Tolerant Networks with Random Geographical Barriers. 1077-1080 - Samir N. Hamade:
Internet Filtering and Censorship. 1081-1086 - Jun Ho Bahn, Jungsook Yang, Nader Bagherzadeh:
Parallel FFT Algorithms on Network-on-Chips. 1087-1093 - Roman Ostroumov, Kang L. Wang:
On Power Dissipation in Information Processing. 1094-1097 - Vladimir Kochergin, Z. Shi, R. Ostroumov, A. Kroetch, S. Buswell, Stephane Evoy, R. Heflin:
Programmable Logic Gates for Optical Processing. 1098-1100 - Nader Bagherzadeh, Masaru Matsuura:
Performance Impact of Task-to-Task Communication Protocol in Network-on-Chip. 1101-1106 - Alexander Khitun, Mingqiang Bao, Yina Wu, Ji-Young Kim, Augustin Hong, Ajey P. Jacob, Kosmas Galatsis, Kang L. Wang:
Spin Wave Logic Circuit on Silicon Platform. 1107-1110 - Avinash J. Agrawal:
Using Domain Specific Question Answering Technique for Automatic Railways Inquiry on Mobile Phone. 1111-1116 - Shi-Wei Gao, Lei Guo, Liang Chen, Yong Yu:
Adaptive Visual Tracking Using Particle Filter. 1117-1122 - Lech Józwiak, Alexander Douglas:
Hardware Synthesis for Reconfigurable Heterogeneous Pipelined Accelerators. 1123-1130 - Günter Knittel:
Pipelined Bus-Invert Coding for FPGAs Driving High-Speed DDR-Channels. 1131-1136 - Hui Chen, Zheng Li:
A Study of the Structure of Chinese Customer Satisfaction in a Web-Based Shopping Environment. 1137-1139 - Mah-Rukh:
Solutions to the WLAN and Bluetooth Interference. 1140-1141 - S. Subha:
A Node Allocation Algorithm for Parallel Applications. 1142-1143 - S. Subha:
Variable Block Size Architecture for Loops. 1144-1145 - Cliston Cole, Marc Karam, Heshmat Aglan:
Increasing Additive Noise Removal in Speech Processing Using Spectral Subtraction. 1146-1147 - Wei-Lun Chang:
CoLeP: An Agent-Based Collaborative System for Pervasive Learning. 1148-1149 - Ranjit Bose:
Applying Semantic Web Services to Web-Based IS and Applications. 1150-1155 - Joshua J. Pauli, Patrick Henry Engebretson:
Hierarchy-Driven Approach for Attack Patterns in Software Security Education. 1156-1157 - Jawad Hasan Yasin AlKhateeb, Jinchang Ren, Stanley S. Ipson, Jianmin Jiang:
Knowledge-Based Baseline Detection and Optimal Thresholding for Words Segmentation in Efficient Pre-Processing of Handwritten Arabic Text. 1158-1159 - Perfecto Mariño, Fernando Pérez-Fontán, Miguel Angel Domínguez, Santiago Otero:
Biological Research Based on Sensor Networks. 1160-1161 - Kun Wang, Meng Wu, Weifeng Lu, Pengrui Xia, Subin Shen:
A Novel Location-Aided Routing Algorithm for MANETs. 1162-1163 - Xiaotong Zhang, Lei Zhang, Jian Zhou:
A High Performance Strategy for Constructing Dynamic MIB. 1164-1167 - Joshua J. Pauli, Patrick Henry Engebretson:
Towards a Specification Prototype for Hierarchy-Driven Attack Patterns. 1168-1169 - Xiaoyuan Zhang, Guoqiang Han, Bin Li, Kun Zou, Wen Li:
An E-Government Platform Based on Multi-Tier Architecture. 1170-1172 - M. Sadique Ali, Anjali Mahajan, N. V. Choudhari:
Compiled Code Compression for Embedded Systems Using Evolutionary Computing. 1173-1174 - Demian Antony D'Mello, V. S. Ananthanarayana:
Quality Driven Web Service Selection and Ranking. 1175-1176 - George Tsaramirsis, Iman Poernomo:
Prototype Generation from Ontology Charts. 1177-1178 - Binsan Khadka, Boleslaw Mikolajczak:
Incorporating Object-Orientedness in Transformations from Live Sequence Charts to Colored Petri Nets. 1179-1183 - Arulalan M. Rajan, H. S. Jamadagni, Ashok Rao:
Novel Window Functions for Digital Filters. 1184-1185 - Mounir Kechid, Jean Frédéric Myoupo:
A Coarse Grain Multicomputer Algorithm Solving the Optimal Binary Search Tree Problem. 1186-1189 - Aleksey Koval, Boris S. Verkhovsky:
Cryptosystem Based on Extraction of Square Roots of Complex Integers. 1190-1191 - Ming-Jye Lee, Chi-Chang Chen, Chien-Ning Yeh:
Permutation Routing in All-Optical Multistage Clos Network. 1192-1193 - Alan McCabe, Jarrod Trevathan:
Artificial Intelligence in Sports Prediction. 1194-1197 - A. S. Poornima, B. B. Amberker:
Distributed Key Management Technique for Reliable Secure Group Communication. 1198-1199 - Yongbo Ma, Zhiyi Fang, Jin Liu, Tianyang Wang, Peng Xu, Lianyu Zhao:
A Content-Based Multimedia Retrieval System Base on MPEG-7 Metadata Schema. 1200-1201 - Zhijin Guan, Xiaolin Qin, Xinchun Cui:
Reversible Network Iterative Construct Method Based on the Cascade Operation. 1202-1205 - Paraskevi S. Lampropoulou, Aristomenis S. Lampropoulos, George A. Tsihrintzis:
Evaluation of a Middleware System for Accessing Digital Music Libraries in Mobile Services. 1206-1207 - Joris Walraevens, Dieter Fiems, Herwig Bruneel:
Analysis of the Transient Delay in a Discrete-Time Buffer with Batch Arrivals. 1208-1209 - Lei Yu, Xiaoyue Liu, Xin Chen:
Data Compression for Emitter Location Finding in Sensor Networks. 1210-1215 - Wei Zhu, Ningning Liu, Weifeng Shan, Guobin Fu:
Design of the Next Generation Military Network Management System Based on NETCONF. 1216-1219 - Sharmila S. Gaikwad:
Mobile Agents in Heterogeneous Database Environment for Emergency Healthcare System. 1220-1221 - Ratika Pradhan, Zangpo Gyalsten Bhutia, Mita Nasipuri, Mohan P. Pradhan:
Gradient and Principal Component Analysis Based Texture Recognition System: A Comparative Study. 1222-1223 - Lili Jiang, Jian Zhan, Lian Li, Changxian Shi, Ning An:
Utilizing User Behaviors with Semantic Metadata. 1224-1225 - Jivika Govil, Navkeerat Kaur, Harkeerat Kaur, Jivesh Govil:
Data/Information Lifecycle Management: A Solution for Taming Data Beast. 1226-1227 - Syed V. Ahamed, Galathara Kahanda:
Plastic Fiber Optic Simulations. 1228-1233 - Mohammad Shirali-Shahreza, Sajad Shirali-Shahreza:
Advanced Collage CAPTCHA. 1234-1235 - Weifeng Shan, Baohong Meng, Wei Zhu:
A New Congestion Control Algorithm Based on RBFNN. 1236-1239 - Kooroush Manochehri, Saadat Pourmozafari, Babak Sadeghiyan:
Very Fast Multi Operand Addition Method by Bitwise Subtraction. 1240-1241 - Joaquín García-Alfaro, Michel Barbeau, Evangelos Kranakis:
Security Threats on EPC Based RFID Systems. 1242-1244 - Hua Jiang, Xiang Li:
An Improved Algorithm for the Evaluation of Alternating Fixpoint Expressions in the mu-Calculus. 1245-1248 - S. Subha:
A Set Associative Cache Model with Energy Saving. 1249-1250 - Syed Sajjad Rizvi, Aasia Riasat, Khaled M. Elleithy:
Transformation Matrix System for Reducing the Computational Complexity of Wireless Multi-User Receivers for DS-CDMA Systems. 1251-1252 - Jung Ho Bae, KwangMin Lee, Heung Seok Chae:
Modularization of the UML Metamodel Using Model Slicing. 1253-1254 - Alvis Cheuk M. Fong, Andrew Simpson:
On Formal Description of Synchronization Requirements in Multimedia Systems. 1255-1256 - Kalliopi Tourtoglou, Maria Virvou:
User Modelling in a Collaborative Learning Environment for UML. 1257-1258 - Sarun Intakosum:
From Use Cases to Framelets for Building Application Frameworks. 1259-1260 - Han Wan, Xiaopeng Gao:
ArmSim: A Complete System Simulation Environment of the ARM Embedded System. 1261-1262 - Sandeep Singh Waraich:
Classification of Dynamic Load Balancing Strategies in a Network of Workstations. 1263-1265 - Sophal Chao, Yenumula B. Reddy:
Online Examination. 1266-1267 - Khaled Ghoneim, Jamal Bentahar:
An Adaptive Configuration for Agent-Based Supply Network. 1268-1271 - Azadeh Nematzadeh, Layla Pournajaf:
Privacy Concerns of Semantic Web. 1272-1273 - Hesham Abdel Slam Aly Elzouka:
FPGA Based Implementation of Robust Watermarking System. 1274-1278 - Richard A. Wasniowski:
Database Support for Discovering Patterns in Large Datasets Collected from Multiple Sensors. 1279-1280 - Rashid Bin Muhammad:
A Parallel Steiner Tree Construction on the Server-Client Model of Computation. 1281-1283 - Phaneeth K. R. Junga, Mohamed A. Abdelrahman, Clayton Thurmer, Wael A. Deabes:
Reliable Metal-Fill Monitoring System Using Wireless Sensor Networks. 1284-1285 - Mohammed Al-Maharmeh, Bhuvan Unhelkar:
Investigation into the Creation and Application of a Composite Application Software Development Process Framework (CASDPF). 1286 - Oldooz Hazrati Yadkoori, Seyed Mohammad Ahadi, Seyed Omid Sadjadi:
Kernel-Based Speaker Clustering for Rapid Speaker Adaptation. 1287-1289 - Joe Kutner, A. Louise Perkins, Sumanth Yenduri, Farnaz Zand, Joe Zhang:
AOP Maintains an Independent Coordinate System. 1290-1291 - Denis Silva Loubach, Diogo B. Ramos, Osamu Saotome, Adilson Marques da Cunha:
Comparing Source Codes Generated by CASE Tools with Hand Coded. 1292 - Janus S. Liang:
Network-Based EDM Learning Framework in Precision Manufacturing Engineering. 1293-1294 - Govindarajan Yamuna, D. Sivakumar:
Secured and Lossless Watermarking Technique for Patent Infringement. 1295-1296 - João Carlos Silva Nobre, Denis Silva Loubach, Emilia Colonese:
Developing an Aerospace System Software Using PBL and MDA. 1297-1298 - Fauser Gustavo Russo Neves, Osamu Saotome:
Comparison between Redundancy Techniques for Real Time Applications. 1299-1300 - Narjes Sharif Razavian, Fattaneh Taghiyareh:
Embedding a Corporate Blogging System in the CRM Solutions. 1301-1302 - Temitayo Olajide, Alicia Nicki Washington:
Epidemic Modeling of Military Networks Using Group and Entity Mobility Models. 1303-1304 - Nasreddine Aoumeur, Kamel Barkaoui, Gunter Saake:
Towards Maude-Tla based Foundation for Complex Concurrent Systems Specification and Certification. 1305-1307
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.