


Остановите войну!
for scientists:


default search action
5th ITNG 2008: Las Vegas, Nevada, USA
- Shahram Latifi:
Fifth International Conference on Information Technology: New Generations (ITNG 2008), 7-8 April 2008, Las Vegas, Nevada, USA. IEEE Computer Society 2008, ISBN 978-0-7695-3099-4 - Sergiy A. Vilkomir, W. Thomas Swain, Jesse H. Poore:
Combinatorial Test Case Selection with Markovian Usage Models. 3-8 - Salamah Salamah, Ann Q. Gates, Steve Roach:
Improving Pattern-Based LTL Formulas for Automata Model Checking. 9-14 - Kun Wang, Yuejian Xie, Sanli Li, Xiaoying Wang:
Performance Analysis of the OGSA-DAI 3.0 Software. 15-20 - Narayan C. Debnath, Maria Carmen Leonardi, María Virginia Mauco, German Montejano, Daniel Riesco:
Improving Model Driven Architecture with Requirements Models. 21-26 - Narayan C. Debnath, Laura Felice, German Montejano, Daniel Riesco:
A Feature Model of E-Government Systems Integrated with Formal Specifications. 27-31 - George A. Tsihrintzis, Maria Virvou, Efthymios Alepis, Ioanna-Ourania Stathopoulou:
Towards Improving Visual-Facial Emotion Recognition through Use of Complementary Keyboard-Stroke Pattern Information. 32-37 - Philippe Dugerdil, Sazzadul Alam:
Execution Trace Visualization in a 3D Space. 38-43 - Tihomir Calic, Sergiu Dascalu, Dwight D. Egbert:
Tools for MDA Software Development: Evaluation Criteria and Set of Desirable Features. 44-50 - Demis Ballis, Andrea Baruzzo, Marco Comini
:
A Minimalist Visual Notation for Design Patterns and Antipatterns. 51-56 - Iman Poernomo, Timur Umarov:
Business Process Development in Semantically-Enriched Environment. 57-62 - Laurent Broto, Daniel Hagimont, Estella Annoni, Benoît Combemale, Jean Paul Bahsoun:
Towards a Model Driven Autonomic Management System. 63-69 - Karan Vij, Wenying Feng:
Boundary Value Analysis Using Divide-and-Rule Approach. 70-75 - Harry Gros-Desormeaux, Hacène Fouchal
, Philippe Hunel:
Test Generation with DHT Networks. 76-81 - Maryam Razavian, Ramtin Khosravi:
Modeling Variability in Business Process Models Using UML. 82-87 - Walter Dosch, Annette Stümpel, Tõnu Tamme:
Streaming Dyadic Boolean Operations. 88-96 - Jeremy W. Pauli, Ty E. Lawrence, Brennon F. Brown:
Development of a New Software Product from a Classroom Project. 97-100 - Aleksey Koval, Boris S. Verkhovsky:
Analysis of RSA over Gaussian Integers Algorithm. 101-105 - Kazumasa Omote, Kazuhiko Kato:
Protection and Recovery of Disk Encryption Key Using Smart Cards. 106-111 - Alessandro Barenghi
, Guido Bertoni
, Luca Breveglieri, Gerardo Pelosi
:
A FPGA Coprocessor for the Cryptographic Tate Pairing over Fp. 112-119 - Fan Zhang, Zhijie Jerry Shi:
An Efficient Window-Based Countermeasure to Power Analysis of ECC Algorithms. 120-126 - Sattar J. Aboud, Mohammad Ahmed Al-Fayoumi, Mustafa Al-Fayoumi
, Haidar S. Jabbar:
An Efficient RSA Public Key Encryption Scheme. 127-130 - Christoph Puttmann, Jamshid Shokrollahi, Mario Porrmann
:
Resource Efficiency of Instruction Set Extensions for Elliptic Curve Cryptography. 131-136 - Mostafa-Sami M. Mostafa, Safia H. Deif, Hisham Abdel Elazeem Ismail Kholidy:
ULTRA GRIDSEC: Peer-to-Peer Computational Grid Middleware Security Using High Performance Symmetric Key Cryptography. 137-142 - John K. Debenham, Elaine Lawrence:
Automating Contract Negotiation. 143-148 - Haiping Xu, Sol M. Shatz, Christopher K. Bates:
A Framework for Agent-Based Trust Management in Online Auctions. 149-155 - Hamed Janzadeh, Ahmad Kardan:
A Multi-Issue Negotiation Mechanism for Bounded Rational Negotiators. 156-161 - Mark Smith, Alireza Khotanzad:
Efficient Indexing and Storage Algorithm for Visual Databases. 162-166 - Rabia Jafri
, Hamid R. Arabnia
:
Fusion of Face and Gait for Automatic Human Recognition. 167-173 - Tristan Ling
, Byeong Ho Kang
, David P. Johns
, Justin Walls
, Ivan Bindoff
:
Expert-Driven Knowledge Discovery. 174-178 - Kazem Taghva, Jason Vergara:
Feature Selection for Document Type Classification. 179-182 - Hassan Reza, Kirk Ogaard, Amarnath Malge:
A Model Based Testing Technique to Test Web Applications Using Statecharts. 183-188 - Hassan Reza, Steve Buettner, Varun Krishna:
A Method to Test Component Off-the-Shelf (COTS) Used in Safety Critical Systems. 189-194 - Quocnam Tran:
Mining Medical Databases with Modified Gini Index Classification. 195-200 - Jawed I. A. Siddiqi, Babak Akhgar, Alicja Gruzdz, Ghasem Zaefarian, Aleksandra Ihnatowicz:
Automated Diagnosis System to Support Colon Cancer Treatment: MATCH. 201-205 - Rahat Iqbal
, Kashif Iqbal, Nazaraf Shah
, Jawed I. A. Siddiqi, Anne E. James
:
Development of Context-Aware Systems to Support Human-Human Communication and Collaboration. 206-211 - Charilaos Tsivopoulos, Jawed I. A. Siddiqi, Babak Akhgar, Shahram Rahimi, Morvarid Bassir:
An Overlay Discovery Algorithm towards a Pure Distributed Communication System. 212-217 - Ryan Coombes, Jawed I. A. Siddiqi:
A Framework for IT as a Utility. 218-223 - Mohammad Hjouj Btoush
, Jawed I. A. Siddiqi, Babak Akhgar, Ziad Dawahdeh:
Observations on Compressing Text Files of Varying Length. 224-228 - Yufeng Guo, Qiong Li, Guangming Liu, Yusheng Cao, Lei Zhang:
A Distributed Shared Parallel IO System for HPC. 229-234 - Xuerong Feng, Chunlei Liu, Jun Kong:
Sorting on Partially Connected Mesh Networks. 235-240 - Salah Merniz, Mohamed Benmohammed:
A Scalable Proof Methodology for RISC Processor Designs: A Functional Approach. 241-246 - Anthony S. Fong, C. Y. Ho:
Global/Local Hashed Perceptron Branch Prediction. 247-252 - Yaoting Jiao, Mei Yang, Yingtao Jiang, Yulu Yang, Xiao-chun Yun:
Deadlock-Free Multi-Path Routing for Torus-Based NoCs. 253-258 - Shankar Neelkrishnan, Mei Yang, Yingtao Jiang, Lei Zhang, Yulu Yang, Enyue Lu, Xiao-chun Yun:
Design and Implementation of a Parameterized NoC Router and its Application to Build PRDT-Based NoCs. 259-264 - Shay Gueron
, Michael E. Kounavis:
A Technique for Accelerating Characteristic 2 Elliptic Curve Cryptography. 265-272 - Naoki Iwasaki, Katsumi Wasaki:
A Meta Hardware Description Language Melasy for Model-Checking Systems. 273-278 - Min He, Ming-Che Tsai, Xiaolong Wu, Fei Wang, Ramzi Nasr:
Hardware/Software Codesign - Pedagogy for the Industry. 279-284 - Jinkun Li, Bo Wang, Yongjian Li, Hao Fu:
The Confirmatory Research on Representative Method of Knowledge Work Process. 285-290 - Firat Kart, Louise E. Moser, P. Michael Melliar-Smith:
Collaborative Computing Using the Atom Publishing Protocol. 291-296 - S. Sampath, Ravi Iyer, K. S. Sridharan, Ravi Mukkamala, Sandhya Kapoor:
Secure Web-Based Sharing of Health Information Services Using Ad-Hoc Dynamic Coalitions. 297-302 - Tianyang Wang, Zhiyi Fang, Lianyu Zhao, Dan Zhao, Peng Xu, Jin Liu:
Implementation of Collaborative Control in Supply Chain Management by Using DA and Workflow Technology. 303-308 - Yun-Ke Chang, Miguel A. Morales Arroyo, Amanda Spink, Myat Thu Aung, Kyaw Thu, Ya Lwin, Zaw Win Htike:
Search Engines' Help Systems. 309-314 - Robert Goldberg, Isak Taksa, Amanda Spink:
Metasearch Engines and Information Retrieval: Computational Complexity of Ranking Multiple Search Results. 315-320 - Ali Ghobadi Tapeh
, Maseud Rahgozar
:
A Knowledge-Based Question Answering System for B2C eCommerce. 321-326 - Fahim Gohar Awan, Muhammad Fainan Hanif:
A Unified View of Information-Theoretic Aspects of Cognitive Radio. 327-331 - Chandan Tilak Bhunia:
Error Forecasting Schemes of Error Correction at Receiver. 332-336 - Jiang Hanping, Shang Lei:
Research and Design for Unify XML-Based Management System Framework. 337-340 - Yenumula B. Reddy, Nandigam Gajendar:
Hybrid Approach for Spectrum Bidding in Wireless Communications for Maximizing the Profit. 341-347 - R. Aparna, B. B. Amberker:
Authenticated Secure Group Communication using Broadcast Encryption Key Computation. 348-353 - Christos V. Samaras, Vassilis Tsaoussidis
:
On the Properties of Adaptive Additive Increase. 354-359 - Yenumula B. Reddy:
Detecting Primary Signals for Efficient Utilization of Spectrum Using Q-Learning. 360-365 - Shuping Liu, Jianwei Chen, Shushan Zhao, Fan Na:
Peer-to-Peer Application in Mobile Cellular Systems. 366-371 - Vittorio Ghini, Stefano Cacciaguerra
, Giorgia Lodi, Fabio Panzieri:
Enhancing Mobile E-Witness with Access Point Selection Policies. 372-377 - John W. Barron, Azzam I. Moustapha
, Rastko R. Selmic:
Real-Time Implementation of Fault Detection in Wireless Sensor Networks Using Neural Networks. 378-383 - Mark Wallis, Frans Henskens
, Michael Hannaford:
Application Based Meta Tagging of Network Connections. 384-389 - Mohsen Chegin
, Mahmood Fathy:
Optimized Routing Based on Mobility Prediction in Wireless Mobile Adhoc Networks for Urban Area. 390-395 - Ravinder Singh Joshi, Navdeep Kumar, Anju Sharma:
Setup Planning and Operation Sequencing Using Neural Network and Genetic Algorithm. 396-401 - Baiqiang Liu, Takeshi Tsuchiya, Kei'ichi Koyanagi:
Honeycomb: A Novel Approach for Construction of Stable ALM Overlay. 402-407 - Rashid Bin Muhammad
:
Transmitting Range Assignments Using Steiner Tree in Ad Hoc Wireless Networks. 408-413 - Serafettin Alpay, Inci Sariçiçek
:
Agent-Based Shop-Floor Control System in a Dynamic Environment. 414-419 - Maher Ragheb Aburrous, M. Alamgir Hossain, Fadi A. Thabtah, Keshav P. Dahal
:
Intelligent Quality Performance Assessment for E-Banking Security using Fuzzy Logic. 420-425 - Fadi A. Thabtah, Qazafi Mahmood, Lee McCluskey
:
Looking at the Class Associative Classification Training Algorithm. 426-431 - Hannu Mäyrä, Mauno Rönkkö:
Reverse Engineering Functional Classes: A Middleware Case Study. 432-437 - Sebastian Herold
, Andreas Rausch, Alexander Bösl, Jan Ebell, Christian Linsmeier
, Detlef Peters:
A Seamless Modeling Approach for Service-Oriented Information Systems. 438-446 - Chia-Chu Chiang, John R. Talburt, Ningning Wu, Elizabeth M. Pierce, Christopher Heien, Ebony Gulley, JaMia Moore:
A Case Study in Partial Parsing Unstructured Text. 447-452 - Mauricio Jose Ordoñez, Hisham M. Haddad:
The State of Metrics in Software Industry. 453-458 - Farzad Sanati, Jie Lu
:
Semantic Web for E-Government Service Delivery Integration. 459-464 - (Withdrawn) Managing Process Interaction in IS Development Projects. 465-470
- Samer Hanna, Malcolm Munro:
Fault-Based Web Services Testing. 471-476 - Jamal Bentahar, Babak Khosravifar:
Using Trustworthy and Referee Agents to Secure Multi-Agent Systems. 477-482 - Venkat N. Gudivada, Jagadeesh Nandigam, Jay N. Bhuyan:
A Conceptual Framework for Application Comprehension. 483-488 - Abdelwahab Hamou-Lhadj:
Measuring the Complexity of Traces Using Shannon Entropy. 489-494 - Saad Alharbi, Dimitrios I. Rigas:
Graphical Browsing of Email Data: An Empirical Investigation. 495-499 - Binh Viet Phan, Eric Pardede
:
Towards the Development of XML Benchmark for XML Updates. 500-505 - Sudharsan R. Iyengar:
Incorporating Product Development in CS Curriculum. 506-511 - Joseph M. Woodside:
HOMER: Home-Based Object-Relational Medical Electronic Record. 512-517 - Jaruek Chookittikul, Supphachai Busarathit, Wajee Chookittikul:
A Six Sigma Support Information System: Process Improvement at a Thai University. 518-523 - Janet L. Kourik, Peter E. Maher:
Establishing a Consistent Curriculum in a Distributed Campus Environment: Lessons Learned while Moving Towards Accreditation. 524-527 - Suthathip Suanmali:
Maple in Mathematics. 528-533 - Delin Tan, Shou-Hsuan Stephen Huang:
Integrating Direct3D Programming into Computer Science Curriculum. 534-538 - Jeff Pittges:
A Production Support Infrastructure for Live Student Projects. 539-544 - Manik Lal Das, V. Lakshmi Narasimhan:
Towards a Formal Verification of an Authentication Protocol Using Non-Monotonic Logic. 545-550 - Hui Zhao, Zhiyi Fang, Peng Xu, Lianyu Zhao, Jin Liu, Tianyang Wang:
An Improved Role-Based Workflow Access Control Model. 551-556 - Jiang Li, Moses Garuba:
Encryption as an Effective Tool in Reducing Wireless LAN Vulnerabilities. 557-562 - Jae-Gil Yu, Eun-Joon Yoon, Sang-Ho Shin, Kee-Young Yoo:
A New Image Steganography Based on 2k Correction and Edge-Detection. 563-568 - Se-Min Kim, Gil-Je Lee, Kee-Young Yoo:
Palette and Index Change Technique for Steganoraphy Based on an Indexcolor. 569-574 - Eun-Jun Yoon, Eun-Jung Lee, Kee-Young Yoo:
Cryptanalysis of Wang et al.'s Remote User Authentication Scheme Using Smart Cards. 575-580 - Yuseung Sohn, Hyun-Yi Moon, Seunglim Yong, Sang-Ho Lee:
Security Issues of Collaborative Review System. 581-586 - Moses Garuba, Jiang Li, Zhenqiang Yi:
Security in the New Era of Telecommunication: Threats, Risks and Controls of VoIP. 587-591 - Moses Garuba, Chunmei Liu, Duane Fraites:
Intrusion Techniques: Comparative Study of Network Intrusion Detection Systems. 592-598 - Yeonjung Kang, Haeryong Park, Kilsoo Chun, Junghwan Song:
A Digital Identity Management Service Model. 599-602 - Manik Lal Das, V. Lakshmi Narasimhan:
EARS: Efficient Entity Authentication in Remote Systems. 603-608 - Piyush Kumar Shukla
, Sanjay Silakari, Sarita Singh Bhadoria, Anuj Garg:
Multi-User FPGA - An Efficient Way of Managing Expensive FPGA Resources Using TCP/IP, Wi-Max/ Wi-Fi in a Secure Network Environment. 609-614 - Javed I. Khan, Kailas B. Bobade, Manas Hardas:
Personalized Negotiation Based on Individualization: Incorporating Personalization into Peer-to-Peer System. 615-621 - Brunil Romero, Marianella Villegas, Marina Meza:
Simon's Intelligence Phase for Security Risk Assessment in Web Applications. 622-627 - Moses Garuba, Chunmei Liu, Alicia Nicki Washington:
A Comparative Analysis of Anti-Malware Software, Patch Management, and Host-Based Firewalls in Preventing Malware Infections on Client Computers. 628-632 - Shanshan Li, Qun Wang:
DHPA: A New Distributed High Performance Architecture for Space Environment Modeling and Simulation. 633-638 - Emilia de Menezes Colonese:
Using Built-In Interoperability with Self-Adaptive Components for RTS. 639-644 - Francisco Supino Marcondes
, Emilia de Menezes Colonese, Ítalo Santiago Vega, Luiz Alberto Vieira Dias:
Proposing a Formal Method to Reduce RTS Logical Model Complexity. 645-650 - João Cadamuro Junior, Douglas Renaux:
Efficient Monitoring of Embedded Real-Time Systems. 651-656 - Wanessa Pereira Dias, Emilia Colonese:
Performance Analysis of Cache and Scratchpad Memory in an Embedded High Performance Processor. 657-661 - Sudharsan R. Iyengar:
Formulating Pseudo-Natural Language. 662-667 - Manish Kumar Jindal, Rajendra Kumar Sharma, Gurpreet Singh Lehal:
Structural Features for Recognizing Degraded Printed Gurmukhi Script. 668-673 - N. Deniz Alp, Çigdem Turhan
:
English to Turkish Example-Based Machine Translation with Synchronous SSTC. 674-679 - Bekir Taner Dinçer, Bahar Karaoglan, Tarik Kisla:
A Suffix Based Part-of-Speech Tagger for Turkish. 680-685 - Chee Wee Leong, Samer Hassan:
Exploiting Wikipedia for Directional Inferential Text Similarity. 686-691 - Shravya Nimmagadda, Amrita Basu, Matthew Eavenson, Jun Han, Maciej Janik, Rajesh Narra, Kishore Nimmagadda, Arpan Sharma, Krys J. Kochut, John A. Miller, William S. York:
GlycoVault: A Bioinformatics Infrastructure for Glycan Pathway Visualization, Analysis and Modeling. 692-697 - Pisit Chanvarasuth:
The Impact of Business Process Outsourcing on Firm Performance. 698-703 - Akadej Udomchaiporn, Veera Boonjing:
A Search-Free Intersection Algorithm. 704-708 - Jirapond Tadrat, Veera Boonjing:
An Experiment Study on Text Transformation for Compression Using Stoplists and Frequent Words. 709-713