


default search action
8th ITNG 2011: Las Vegas, Nevada, USA
- Shahram Latifi:

Eighth International Conference on Information Technology: New Generations, ITNG 2011, Las Vegas, Nevada, USA, 11-13 April 2011. IEEE Computer Society 2011, ISBN 978-0-7695-4367-3
Computer Information Technology Education
- Keiichi Tanaka, Katsumi Wasaki

:
Development and Evaluation of a Large-Scale Agent-Based System for Information Literacy Education - Improving the Automatic Collection of Learning Results through Template Matching. 1-6 - Alan Shaw:

Using a Collaborative Programming Methodology to Incorporate Social Computing Projects into Introductory Computer Science Courses. 7-11 - Mark Chapman, David A. Turner, Arturo I. Concepcion, Aldo Lewis:

VectorForce: A Video Game Project. 12-17
Information Systems and Internet Technology
- Sutheetutt Vacharaskunee, Sarun Intakosum

:
An Approach to XML Tag Recommendation. 18-23 - Chyi-Ren Dow, Yu-Hong Lee, Jeremy Liao, Hao-Wei Yang, Wei-Luen Koo:

A Location-based Mobile Advertisement Publishing System for Vendors. 24-29 - Suvamoy Changder, Narayan C. Debnath, Debidas Ghosh:

A Greedy Approach to Text Steganography Using Properties of Sentences. 30-35 - Sultan Aljahdali, Alaa F. Sheta

:
Predicting the Reliability of Software Systems Using Fuzzy Logic. 36-40 - Mohamed Benaddy

, Sultan Aljahdali, Mohamed Wakrim:
Evolutionary Prediction for Cumulative Failure Modeling: A Comparative Study. 41-47 - Narayan C. Debnath, Robert Uzal, German Montejano, Daniel Riesco:

A Police Force Facing an e-Transparency Project. 48-53 - Jason R. Meek, Narayan C. Debnath, Ilhyun Lee, Haesun K. Lee:

Algorithmic Design and Implementation of an Automated Testing Tool. 54-59 - Jigarkumar Patel, Sergiu M. Dascalu:

EnduRan: A Web Application for Managing Racing Events. 60-65 - Nicole Anderson:

Putting Search in Context: Using Dynamically-Weighted Information Fusion to Improve Search Results. 66-71 - Andrew Cordar, Ahmed Abukmail:

Interactive Visualization and Analysis of Hurricane Data. 72-77 - Hiroyuki Hisamatsu, Go Hasegawa

, Masayuki Murata
:
Non Bandwidth-intrusive Video Streaming over TCP. 78-83 - Mustafa Atay

, Artem Chebotko:
Schema-Based XML-to-SQL Query Translation Using Interval Encoding. 84-89 - Patrick Maillé

, Bruno Tuffin:
On the Ranking Strategy in Adword Auctions. 90-93
Networking and Wireless Communications
- Tabinda Salam, Muhammad Ali, Mah-Rukh Fida:

Seamless Proactive Vertical Handover Algorithm. 94-99 - Hussein ElAttar, Hussein Abdelaty, Salwa H. El-Ramly, Mohamed A. Aboul-Dahab:

PHY-MAC Cross Layer Issues for QoS Provisioning in Wireless Ad Hoc Networks. 100-105 - Mahnsuk Yoon, Keuchul Cho, Jilong Li, Jeongbae Yun, Minyoung Yoo, Youngil Kim, Qin Shu, Jangkyu Yun, Kijun Han:

AdaptiveScan: The Fast Layer-2 Handoff for WLAN. 106-111 - Erwing Ricardo Sanchez, Laura M. Murillo, Bartolomeo Montrucchio

, Maurizio Rebaudengo
:
An Adaptive Power-Aware Multi-hop Routing Algorithm for Wireless Sensor Networks. 112-116 - Kei Itoh, Hiroaki Higaki:

Location Estimation of Wireless Nodes with Preservation of Neighbor Relations in MANET. 117-124 - Omar Y. Tahboub, Javed I. Khan:

Forwarding on Froggers Networks: Principle of Data Flow Equilibrium. 125-130 - Young Jin Hong:

Vigorous Study on Pre-FFT Smart Antennas in OFDM. 131-134 - Sasan Mohammadi, Mostafa Tavassoli, Abolfazl Rajabi:

Authoritative Intelligent Perfect Parallel Parking Based on Fuzzy Logic Controller for Car-Type Mobile Robot. 135-138 - Mohamed Bourimi

, Gunnar Mau
, Sascha Steinmann, Dominik Klein, Steffen Templin, Dogan Kesdogan, Hanna Schramm-Klein
:
A Privacy-Respecting Indoor Localization Approach for Identifying Shopper Paths by Using End-Users Mobile Devices. 139-144
Software for Use: Challenges for the New Information Technology
- Silvana Roncagliolo, Virginica Rusu, Cristian Rusu, Gonzalo Tapia, Danae Hayvar, Dorian Gorgan:

Grid Computing Usability Heuristics in Practice. 145-150 - César A. Collazos

, Toni Granollers, Cristian Rusu:
A Survey of Human-Computer Interaction into the Computer Science Curricula in Iberoamerica. 151-156 - Arturo Nakasone, Siyu Tang, Mika Shigematsu, Berthold Heinecke, Shuji Fujimoto, Helmut Prendinger:

OpenBioSafetyLab: A Virtual World Based Biosafety Training Application for Medical Students. 157-162 - Hamilton A. Hernández, Helmuth Trefftz

:
WeSketch: A 3D Real Time Collaborative Virtual Environment that Improves the GUI Sketching Task. 163-168 - Theera Thepparat, Amnart Harnprasarnkit, Douanghatai Thippayawong, Veera Boonjing, Pisit Chanvarasuth:

A Virtualization Approach to Auto-Scaling Problem. 169-173
Software Engineering
- Arturo Chavoya

, Cuauhtémoc López Martín, Maria Elena Meda-Campaña
:
Applying Genetic Programming for Estimating Software Development Effort of Short-scale Projects. 174-179 - Jing-Chiou Liou, Gregory K. Egan, Jay K. Patel, Sujith Bhashyam:

A Sophisticated RFID Application on Multi-Factor Authentication. 180-185 - Xinyu Zhang, Haiyan Wu, Yiqian Lu:

The Exploration of the Component's Trustworthiness Measurement Method in the Data Processing Domain. 186-190 - Shailesh Tiwari

, K. K. Mishra
, Anoj Kumar, Arun Kumar Misra:
Spectrum-Based Fault Localization in Regression Testing. 191-195 - Plamen Petrov, Ugo A. Buy:

A Systemic Methodology for Software Architecture Analysis and Design. 196-200 - Haitham S. Hamza

, Dina Darwish:
A Domain Analysis Method for Evolvable Software Product Line Architectures. 201-205 - Jianchao Han, Hosung Kim, Mohsen Beheshti, Kazimierz Kowalski:

An Event-Driven Interactive Model of Information Resource Management. 206-211 - Nathan Nikotan, Jianchao Han, Mohsen Beheshti:

Software Project Scheduling Using a Multi-Agent System. 212-213 - Ahmed Khago, Ashok K. Singh, Laxmi P. Gewali:

Bayesian Estimation of the Normal Mean from Censored Samples. 214-220 - Yoonsik Cheon, Cesar Yeep, Melisa Vela:

CleanJava: A Formal Notation for Functional Program Verification. 221-226 - Hisham M. Haddad, Donald Eric Meredith:

Instituting Software Metrics in Small Organizations: A Practical Approach. 227-232 - Mohammed Q. Shatnawi

, Qusai Q. Abuein
:
A Digital Ecosystem-based Framework for Math-based Search System. 233-238 - Wajee Chookittikul, Janet L. Kourik, Peter E. Maher:

Reducing the Gap between Academia and Industry: The Case for Agile Methods in Thailand. 239-244 - Jonathan Engelsma, Hans Dulimarta:

8 Reasons Why You Should Use Mobile Platforms in Your CS Courses. 245-250 - Andrew J. McAllister:

The Case for Teaching Legacy Systems Modernization. 251-256 - Erik Wilde:

Open and Accessible Presentations. 257-262
Software Testing
- Xin Bai, Marco Sadeghi:

IT Module Based Test Automation Framework. 263-267 - Pekka Aho, Nadja Menz, Tomi Räty, Ina Schieferdecker

:
Automated Java GUI Modeling for Model-Based Testing Purposes. 268-273 - Etiene Lamas, Luiz Alberto Vieira Dias, Adilson Marques da Cunha:

Effectively Testing for a Software Product Line with OTM3 Organizational Testing Management Maturity Model. 274-279 - James D. McCaffrey, Adrian Bonar:

Testing a High Performance, Random Access Priority Queue: A Case Study. 280-285 - Gary Fix:

The Design of an Automated Test Code Generation System for SQL Stored Procedures. 286-290 - Alireza Ensan, Ebrahim Bagheri

, Mohsen Asadi, Dragan Gasevic
, Yevgen Biletskiy:
Goal-Oriented Test Case Selection and Prioritization for Product Line Feature Models. 291-298 - Kaarthik Sivashanmugam, Da Lin, Senthil Palanisamy:

Scenario Driven Testing. 299-303 - Janne Keränen, Tomi Räty, Petri Jurmu, Matti Mäki, Olli-Pekka Puolitaival:

Conformance Testing in Service-Oriented Interconnection Technologies in NoTA. 304-309 - Sagar Khandelwal, Kannan Subramanian, Rohit Garg:

Next Generation Cross Technology Test Data Solution for M&A. 310-314 - Daniel E. Burgner, Luay A. Wahsheh:

Security of Wireless Sensor Networks. 315-320 - Cong Sun

, Liyong Tang, Zhong Chen:
Enforcing Reactive Noninterference with Reachability Analysis. 321-326 - Mohamed Hamdy Eldefrawy, Khaled Alghathbar, Muhammad Khurram Khan

:
OTP-Based Two-Factor Authentication Using Mobile Phones. 327-331
Information Security and Privacy
- Y. V. Subba Rao

, S. S. Brahmananda Rao, N. Rukma Rekha
:
Secure Image Steganography Based on Randomized Sequence of Cipher Bits. 332-335 - Jim Luo, Myong H. Kang:

Application Lockbox for Mobile Device Security. 336-341 - Adesina S. Sodiya, S. A. Onashoga

, D. I. Adelani:
A Secure e-Voting Architecture. 342-347 - Ravi Mukkamala, Vikas G. Ashok:

Fuzzy-based Methods for Privacy-Preserving Data Mining. 348-353 - Shay Gueron

, Simon Johnson, Jesse Walker:
SHA-512/256. 354-358 - Fan Zhang, Zhijie Jerry Shi:

Differential and Correlation Power Analysis Attacks on HMAC-Whirlpool. 359-365 - N. Rukma Rekha

, Y. V. Subba Rao
, K. V. S. S. R. S. S. Sarma:
Enhanced Key Life in Online Authentication Systems Using Virtual Password. 366-369 - Hongbin Wang, Zhiyi Fang, Simon Fong, Yain-Whar Si

, Liyang Liu:
Experimental Research on DFA-Based MLML IDS Security Evaluation. 370-375 - V. Nagalakshmi, I. Ramesh Babu, P. S. Avadhani:

Modified Protocols for Internet Key Exchange (IKE) Using Public Encryption and Signature Keys. 376-381 - Shay Gueron

:
Quick Verification of RSA Signatures. 382-386 - Mah-Rukh Fida, Muhammad Ali, Awais Adnan, Ameer Shakayb Arsalaan

:
Region-Based Security Architecture for DTN. 387-392 - Mohammad Eyadat, Soren Larsen:

A New Heuristic Approach to Safeguarding Online Digital Data. 393-396 - S. A. Onashoga

, Adesina S. Sodiya:
A Confidential Electronic Result Transfer Using a Hybrid XML Security Scheme. 397-402 - Joshua J. Pauli, Patrick Henry Engebretson, Michael J. Ham, MarcCharles J. Zautke:

CookieMonster: Automated Session Hijacking Archival and Analysis. 403-407 - Joseph Chee, Ming Teo:

Improving Security in the IEEE 802.16 Standards. 408-412 - K. V. S. S. R. S. S. Sarma, G. Santhosh Krishna Kumar, P. S. Avadhani:

Threshold Cryptosystem Using Pell's Equation. 413-416
Human-Computer Interaction
- Kohei Arai, Ronny Mardiyanto

:
Eye Based HCI with Moving Keyboard for Reducing Fatigue Effects. 417-422 - Kohei Arai, Ronny Mardiyanto

:
Eye-based HCI with Full Specification of Mouse and Keyboard Using Pupil Knowledge in the Gaze Estimation. 423-428 - Llúcia Masip, Toni Granollers, Marta Oliva

:
A Heuristic Evaluation Experiment to Validate the New Set of Usability Heuristics. 429-434 - Arturo Reuschenbach, Miao Wang, Tinosch Ganjineh, Daniel Göhring

:
iDriver - Human Machine Interface for Autonomous Cars. 435-440 - Kohei Arai, Ronny Mardiyanto

:
Comparative Study on Blink Detection and Gaze Estimation Methods for HCI, in Particular, Gabor Filter Utilized Blink Detection Method. 441-446 - Sajad Shirali-Shahreza, Mohammad Shirali-Shahreza:

Multilingual Highlighting CAPTCHA. 447-452 - Cristhy Jiménez Granizo

, Pablo Lozada Yanez, Danilo Pastor Ramirez, Patricia Cordovez Machado:
Usability in E-government Sites. 453-458 - Hanmin Jung, Mikyoung Lee, Pyung Kim, Do-Wan Kim:

Study on the Visualization Elements of Web Information Services: Focused on Researcher Network and Graphic Chart. 459-463 - Muhammad Fakri Othman

, Wendy Keay-Bright:
Rotoscopy-Handwriting Prototype: Using Computer Animation Technique to Assist the Teaching of Handwriting for Children with Dyspraxia. 464-469
Signal Processing and Applications
- Manoj Banik, Md. Modasser Hossain, Aloke Kumar Saha

, Foyzul Hassan, Mohammed Rokibul Alam Kotwal, Mohammad Nurul Huda:
Phone Segmentation for Japanese Triphthong Using Neural Networks. 470-475 - Burak Uzkent, Buket D. Barkana:

Pitch-Range Based Feature Extraction for Audio Surveillance Systems. 476-480 - Eric Rives, Laurie L. Joiner

:
Bit Error Rate Locked Loops Using Log-likelihood Decoders. 481-484 - W. M. Utomo, A. Bakar, M. Ahmad, Taufik Taufik

, R. Heriansyah
:
Online Learning Neural Network Control of Buck-Boost Converter. 485-489
New Trends in Image Processing
- Mohammad Ali Azimi Kashani, Mohammadreza Ramezanpour Fini

:
Face Image Retrieval Using Genetic Algorithm and Bags of Pixels. 490-493 - R. B. Dubey, Madasu Hanmandlu, Shantaram Vasikarla:

Evaluation of Three Methods for MRI Brain Tumor Segmentation. 494-499 - Rolf T. Wigand, Dinah M. Mande, Jerry D. Wood:

Information Management and Tracking of Drugs in Supply Chains within the Pharmaceutical Industry. 500-507 - Loay Edwar George

, Eman A. Al-Hilo:
Speeding-up Fractal Color Image Compression Using Moments Features Based on Symmetry Predictor. 508-513 - César A. Collazos

, Rosa Gil
:
Using Cross-cultural Features in Web Design Patterns. 514-519 - Farrukh Sayeed, Madasu Hanmandlu, Abdul Quaiyum Ansari

, Shantaram Vasikarla:
Iris Recognition Using Segmental Euclidean Distances. 520-525 - Kameshwar Yadavalli, Alexander Khitun:

Electric Field Driven Magnetic Cellular Automata for Image Processing. 526-529 - Xudong Ma:

Large-Scale Clustering Based on Data Compression. 530-535 - Pooja Agrawal

, Nishchal K. Verma, Saurabh Agrawal, Shantaram Vasikarla:
Color Segmentation Using Improved Mountain Clustering Technique Version-2. 536-542
Data Mining
- Ray Pereda, Kazem Taghva

:
Fuzzy Information Extraction on OCR Text. 543-546 - Ali Rahmani, Mohamad Nagi, Mohammad Rifaie, Keivan Kianmehr, Mick J. Ridley, Reda Alhajj, Jon G. Rokne:

Employing Frequent Pattern Mining for Finding Correlations between Tables in Relational Databases. 547-552 - Cihan Varol

, John R. Talburt:
Pattern and Phonetic Based Street Name Misspelling Correction. 553-558 - M. Zubair Rafique, Zeeshan Shafi Khan

, Muhammad Khurram Khan
, Khaled Alghathbar:
Securing IP-Multimedia Subsystem (IMS) against Anomalous Message Exploits by Using Machine Learning Algorithms. 559-563 - Mark S. Smith, Ray R. Hashemi:

A Relevancy Classification System for Web Search Results in Mobile Devices. 564-567 - Hassan Reza, Scott D. Kerlin:

A Model-Based Testing Using Scenarios and Constraints-based Modular Petri Nets. 568-573 - David Luper, Caner Kazanci, John R. Schramski, Hamid R. Arabnia

:
Flow Decomposition in Complex Systems. 574-579 - Ray R. Hashemi, Azita Bahrami, Mark S. Smith, Simon Young:

Identification of Core, Semi-Core and Redundant Attributes of a Dataset. 580-584 - Muhammad Abulaish

:
Relation Characterization Using Ontological Concepts. 585-590 - Mohan John Blooma

, Alton Yeow-Kuan Chua, Dion Hoe-Lian Goh:
Quadripartite Graph-based Clustering of Questions. 591-596 - Shafiq Ahmad

, Mali Abdollahian
, Babak Abbasi
:
Multivariate Performance Analysis Methods - A Comparison Study. 597-602 - Seyedeh Zahra Hosseinifard

, Babak Abbasi
, Mali Abdollahian
:
Performance Analysis in Non-normal Linear Profiles Using Gamma Distribution. 603-607 - Hassan Reza, Kris Zarns

:
Testing Relational Database Using SQLLint. 608-613 - Jae-Kul Lee, Hyun-Je Song, Seong-Bae Park:

Two-Step Sentence Extraction for Summarization of Meeting Minutes. 614-619
E-Learning
- Michael Kyesswa, Amru Mbajja, Arthur Tumusiime Asiimwe, Cosmas Mwikirize

, Paul Isaac Musasizi, Sandy Stevens Tickodri-Togboa, Andrew Katumba
, Julius Butime
:
An Online Digital Filters and Sound Effects Laboratory Utilizing NI SPEEDY 33 and LabVIEW DSP Module. 620-625 - Nadine Marcus

, Dror Ben-Naim, Michael Bain:
Instructional Support for Teachers and Guided Feedback for Students in an Adaptive eLearning Environment. 626-631 - Olutayo Boyinbode

, Antoine B. Bagula
:
An Adaptive and Personalized Ubiquitous Learning Middleware Support for Handicapped Learners. 632-637
Middleware and Networking Applications
- Jianfeng Qian, Jianwei Yin, Jinxiang Dong:

Parallel Matching Algorithms of Publish/Subscribe System. 638-643 - Qurban A. Memon

, Hend Alqamzi:
An Energy-Efficient Image Search Algorithm for Hybrid Delivery Model of Image Sensor Networks. 644-648 - Sami J. Habib, Paulvanna Nayaki Marimuthu:

Opportunistic Reclustering: An Approach to Improve the Network Performance. 649-654 - Jesus Martinez Cruz, Adrián Romero-Garcés

, Juan Pedro Bandera Rubio
, Antonio Bandera Rubio
:
Nerve: A Lightweight Middleware for Quality-of-service Networked Robotics. 655-660 - Shankar M. Banik, Zachary C. Aardahl:

M3DDVC: Multi-source Multicasting Using Multi-cores with Delay and Delay Variation Constraints on Overlay Networks. 661-666 - Víctor Manuel Álvarez García, María del Puerto Paule Ruíz

, Moises Riestra González, Juan Ramón Pérez-Pérez
:
Designing Case Studies for the Voice Interactive Classroom. 667-672 - Pedro Javier del Cid, Nelson Matthys, Christophe Huygens

, Sam Michiels
, Wouter Joosen, Danny Hughes:
Sensor Middleware to Support Diverse Data Qualities. 673-676 - Jinfu Wang, John Bigham, Jiayi Wu:

Enhance Resilience and QoS Awareness in Message Oriented Middleware for Mission Critical Applications. 677-682
Computer Architecture
- Bisrat Tafesse, Ashwini Raina, Jaya Suseela, Venkatesan Muthukumar:

Efficient Scheduling Algorithms for MpSoC Systems. 683-688 - Xinyu Guo, Hong Wang, Vijay Kumar Devabhaktuni:

Design of a FPGA-Based Parallel Architecture for BLAST Algorithm with Multi-hits Detection. 689-694 - Saketh Bharadwaja, Weiqing Sun, Mohammed Y. Niamat, Fangyang Shen:

Collabra: A Xen Hypervisor Based Collaborative Intrusion Detection System. 695-700 - Bing Qi, Fangyang Shen:

Propagation Models for Multi-hop Wireless Networks in Ns-2 Simulator. 701-706 - Lakshmi Deepika Bobbala, Byeong Kil Lee:

Hybrid-way Cache for Mobile Processors. 707-712 - Arzu Gosney, John H. Miller, Ian Gorton, Christopher S. Oehmen:

An Adaptive Middleware Framework for Optimal Scheduling on Large Scale Compute Clusters. 713-718 - Amir Ali Semnanian, Jeffrey Pham, Burkhard Englert, Xiaolong Wu:

Virtualization Technology and its Impact on Computer Hardware Architecture. 719-724
Model-based Software Development
- Kamrul Hasan Talukder

, Koichi Harada:
Modeling the Communications in the Multi-threaded System for Concurrent Wavelet Transform to Compress the Image. 725-730 - Synara Rosa Gomes dos Santos, Melis Mendes Silva, Juliana Cristina Ribeiro da Silva, Luiz Alberto Vieira Dias, Adilson Marques da Cunha:

Modeling and Analyzing Real-Time Embedded Software for a Data Collection System. 731-736 - Claudia Pereira, Liliana Martinez, Liliana Favre:

Recovering Use Case Diagrams from Object Oriented Code: An MDA-based Approach. 737-742 - Suzy Temate, Laurent Broto, Alain Tchana, Daniel Hagimont:

A High Level Approach for Generating Model's Graphical Editors. 743-749 - Fábio Levy Siqueira

, Paulo Sérgio Muniz Silva:
Mapping the WRSPM Model to Model-Driven Architecture Models. 750-753 - Jameleddine Hassine

:
Early Availability Requirements Modeling Using Use Case Maps. 754-759 - Saeed Parsa

, Mehdi Sakhaei-nia
:
A New Approach to Determine Number of Loop Iterations for WCET Analysis. 760-765 - Juliano de Almeida Monte-Mor, Elton Oliveira Ferreira

, Henrique Fernandes de Campos, Adilson Marques da Cunha, Luiz Alberto Vieira Dias:
Applying MDA Approach to Create Graphical User Interfaces. 766-771
Circuits
- Taufik Taufik

, Daniel Forbes, Dale Dolan, Ratna Ika Putri
:
Digital Control of Parallel-Connected DC-DC Converters. 772-776 - Mahmoud Fawzy Wagdy, Anurag Nannaka, Rajeev K. N. Channegowda:

A Novel Flash Fast-Locking Digital PLL: VHDL-AMS and Matlab/Simulink Modeling and Simulations. 777-784 - Saiyu Ren, Ray Siferd:

CMOS 1.6 GHz Bandwidth 12 Bit Time Interleaved Pipelined ADC. 785-790
AI Applications
- Antonio Mira Lopez, Douglas R. Heisterkamp:

Simulated Annealing Based Hierarchical Q-Routing: A Dynamic Routing Protocol. 791-796 - Manoj Banik, Md. Rashiduzzaman Rasel, Aloke Kumar Saha

, Foyzul Hassan, Mohammed Firoz Mridha
, Mohammad Nurul Huda:
Development of Analysis Rules for Bangla Part of Speech for Universal Networking Language. 797-802 - Jörg Lässig, Benjamin Satzger, Oliver Kramer:

Self-Stabilization in Hierarchically Structured Energy Markets. 803-809 - Ronald J. Nowling, Holger Mauch:

Priority Encoding Scheme for Solving Permutation and Constraint Problems with Genetic Algorithms and Simulated Annealing. 810-815 - Christopher A. Ballinger, David A. Turner, Arturo I. Concepcion:

Artificial Intelligence Design in a Multiplayer Online Role Playing Game. 816-821
Innovative E-Services
- Yunhee Kang:

Data Aggregation Scheme for a Mashup Based Internet Application. 822-827 - Wei-Lun Chang

, Yu Jyun Lin:
Using Fuzzy theory to Explore the Appropriateness of Customer-Oriented E-Service Cooperation. 828-832 - Yi-Wen Liao, Yi-Shun Wang, Tzung-I Tang, Yi-Wen Tian:

Investigating the Influence of the Landscape Preference of Blogs, User Satisfactory and Behavioral Intention. 833-838 - Aviv Segev, Jussi Kantola:

Patent Service Self-Organizing Maps. 839-844 - Shari S. C. Shang, Ya-Ling Wu:

An Analysis of Customer Contribution in a Bank. 845-850 - Yen-Hao Hsieh:

A System Dynamics Approach for Modeling Service Recovery. 851-858
Social Computing
- Christian Menkens, Julian Sussmann, Miriam Al-Ali, Emanuel Breitsameter, Jelena Frtunik, Tobias Nendel, Tobias Schneiderbauer:

EasyWheel - A Mobile Social Navigation and Support System for Wheelchair Users. 859-866 - Hsia-Ching Chang, Chen-Ya Wang:

No Cue, No Clue? Understanding Information Interaction in Social Bookmarking Services. 867-872 - Khasfariyati Razikin, Keng Tiong Tan, Dion Hoe-Lian Goh, Alton Yeow-Kuan Chua, Chei Sian Lee:

SPLASH: Perspectives on Mobile Socializing, Playing and Content Sharing. 873-878 - Jennifer Terrell:

Transmediated Magic: Sociality in Wizard Rock. 879-883 - Sang Su Lee, Tagyoung Chung, Dennis McLeod:

Dynamic Item Recommendation by Topic Modeling for Social Networks. 884-889 - Samir N. Hamade:

The Impact of Mobile Phones on the Life of Farmers in Lebanon. 890-895
Toward Next-Generation Self-Organizing Perspectives, Principles, and Patterns
- H. Van Dyke Parunak:

Swarming on Symbolic Structures: Guiding Self-Organizing Search with Domain Knowledge. 896-901 - Rick Dove:

Patterns of Self-Organizing Agile Security for Resilient Network Situational Awareness and Sensemaking. 902-908 - Kari J. Lippert, Robert A. Seger:

The Story Behind Network Defense. 909-913 - Rick A. Jones, Barry M. Horowitz:

System-Aware Cyber Security. 914-917 - Jereme N. Haack, Glenn A. Fink

, Wendy M. Maiden, A. David McKinnon
, Steven J. Templeton, Errin W. Fulp:
Ant-Based Cyber Security. 918-926 - Russell Cameron Thomas:

Formal Methods for Modeling Socio-technical Innovation between Adversaries. 927-936 - Ashish Malviya, Glenn A. Fink

, Landon Sego, Barbara Endicott-Popovsky:
Situational Awareness as a Measure of Performance in Cyber Security Collaborative Work. 937-942 - Jennifer L. Bayuk

:
Alternative Security Metrics. 943-946 - Len Troncale:

Can a Theory that Integrates the Natural Systems Sciences Help Systems Engineering of Defense against Security Threats? 947-952
Networks, Computing Theory, Algorithms
- Mohammad Hossein Rezvani

, Morteza Analoui
:
A Case for Multi-service Overlay Multicast Networks Based on Auction Mechanism. 953-958 - Javed I. Khan, Omar Y. Tahboub:

Peer-to-Peer Enterprise Data Backup over a Ren Cloud. 959-964 - Yasser Khan, John N. Randall

:
Wireless Embedded Control System for Atomically Precise Manufacturing. 965-969 - Laxmi P. Gewali, Reshma Koganti:

Detour Admitting Short Paths. 970-975 - Stefan D. Bruda:

Sublinear Space Real-Time Turing Machines Cannot Count. 976-978 - (Withdrawn) A Stable Election Protocol Based on an Unreliable Failure Detector in Distributed Systems. 979-984

- Kris Erodula, Christian Bach, Hassan Bajwa:

Use of Multi Threaded Asynchronous DNA Sequence Pattern Searching Tool to Identifying Zinc-Finger-Nuclease Binding Sites on the Human Genome. 985-991
Potpourri
- Wafaa Saber Hamed, Haitham S. Hamza

, Imane Aly Saroit:
Towards a Unified Trust Model for M-commerce Systems. 992-997 - Venkata N. Ramarekha Patchigolla, John A. Springer, Kyle Lutes:

Embedded Database Management Performance. 998-1001 - Jason Cornwell, Angkul Kongmunvattana:

Efficient System-Level Remote Checkpointing Technique for BLCR. 1002-1007 - Maher Hawash, Marek A. Perkowski, Steve Bleiler, John S. Caughman IV

, Amjad Hawash
:
Reversible Function Synthesis of Large Reversible Functions with No Ancillary Bits Using Covering Set Partitions. 1008-1013 - Heidi J. C. Ellis, Ronald J. Nowling, Jay Vyas, Timothy O. Martyn, Michael R. Gryk:

Iterative Development of an Application to Support Nuclear Magnetic Resonance Data Analysis of Proteins. 1014-1020 - Mahdi Jampour

, Mohsen Jampour, Maryam Ashourzadeh, Mahdi Yaghoobi:
A Fuzzy Expert System to Diagnose Diseases with Neurological Signs in Domestic Animal. 1021-1024
Posters
- Vasudevan Janarthanan, Abdelouahed Gherbi:

Architectures for Dependable Software Systems. 1025-1030 - Jiunn-Tzer Wang, Li-chu Sung:

A Needs Analysis on the Web-based EPSS with Instructional theory (IT) Embedded: An Additional Tool for Teacher Professional Development. 1031-1036 - Alireza Khosropour, Hossein Aghababa, Behjat Forouzandeh:

Quantum Division Circuit Based on Restoring Division Algorithm. 1037-1040 - Raouf Ajami, Anh Dinh:

Embedded Network Firewall on FPGA. 1041-1043 - Mehrdad Saadatmand

, Antonio Cicchetti
, Diarmuid Corcoran, Mikael Sjödin:
Toward a Tailored Modeling of Non-Functional Requirements for Telecommunication Systems. 1044-1045 - Melis Mendes Silva, Synara Rosa Gomes dos Santos, Juliana Cristina Ribeiro da Silva, Luiz Alberto Vieira Dias, Adilson Marques da Cunha:

Problem Based Learning a Practical Approach for Software Engineering Interdisciplinary Teaching. 1046-1047 - Kishan Dharavath

, Sri Khetwat Saritha
:
Organizing Extracted Data: Using Topic Maps. 1048-1049 - Andrew Wessels, Mike Purvis, Jahrain Jackson, Syed (Shawon) Rahman

:
Remote Data Visualization through WebSockets. 1050-1051 - Li Zhang:

A Feasibility Study on the Adoption of e-Learning for Middle School Teachers' Continuing Education in China. 1052-1053 - Kamrul Hasan Talukder

, Koichi Harada:
Enhancement of Discrete Wavelet Transform (DWT) for Image Transmission over Internet. 1054-1055 - Fausto A. Jacques

, Luis R. Corral
, Gerardo Rodriguez:
A Decision Support System for Hypertext-Based Teaching and Learning Systems. 1056-1057 - Vineeth Simon Arackal, B. Arunachalam, Payal Saluja

, B. B. Prahlada Rao
:
Co-existence of Cloud and Grid: A Case Study in Service Oriented Grid GARUDA. 1058-1059 - Xuesong (Sonya) Zhang, Bradley Dorn:

Agile Practices in a Small-Scale, Time-Intensive Web Development Project. 1060-1061 - Anirban Ghosh, Navarun Gupta:

Online Database for Kolkata Transport System. 1062-1063 - Weijie Chu, Weiping Li, Tong Mo, Zhonghai Wu:

A Context-Source Abstraction Layer for Context-aware Middleware. 1064-1065 - Andrew Wessels, Mike Purvis, Syed (Shawon) Rahman

:
Usability of Web Interfaces on Mobile Devices. 1066-1067 - Mansaf Alam

:
Access Specifiers Model for Data Security in Object Oriented Databases. 1068-1069 - Suresh V. Limkar, Rakesh Kumar Jha

, Shilpa Pimpalkar
, Santosh Darade:
Geo-Encryption - A New Direction to Secure Traditional SSL VPN. 1070-1071 - Jangkyu Yun, Byung-hwa Lee, Young-mi Baek, Junhyung Kim, Jihun Han, Seungyong Oh, Seonhwan Hwang, Kijun Han:

An Implementation of AODV Testbed with Multi-metrics. 1072-1073 - Abdelbaset S. Hamza

:
On the Impact of Network Parameters on the Efficiency of Spectrum Allocation in Cognitive Radio Networks. 1074-1075 - Azeem Ahmad, Magnus Goransson, Sushma Joseph Kolla, Aamir Shahzad, Muhammad Qummer Ul Arfeen, Zaki Arshad:

Requirements Development Life Cycle with Respect to Geographically Distributed Stakeholders: The "V" Model. 1076-1077 - Wajee Chookittikul, Kiattisak Kittitarworanon, Maytinee Sri-in, Aungsuda Ab-aim:

Building SCAAT-Industry Relationships via Disaster Recovery Planning. 1078-1079 - Sahar Naserzadeh, Mehrdad Jalali

:
Channel Estimation and Symbol Detection in AWGN Channel for New Structure of CDMA Signals. 1080-1081 - Xinyu Zhang, Li Zheng, Yiqian Lu:

The Exploration of the Core Asset Library in the Software Product Line. 1082-1083 - Sri Khetwat Saritha

, Kishan Dharavath
:
Domain and Keyword Specific Data Extraction from Invisible Web Databases. 1084-1085 - Heap-Yih Chong

, Rosli Mohamad Zin:
Transforming of Construction Contract Administration: Data Warehouse Modeling. 1086-1087 - Thara Ravindran, Alton Yeow-Kuan Chua, Dion Hoe-Lian Goh:

Whither Mobile Social Application Prototypes? Implications for Development and Research. 1088-1089 - Saurabh Agrawal, Nishchal K. Verma, Prateek Tamrakar, Pradip Sircar:

Content Based Color Image Classification using SVM. 1090-1094 - SatyendraNath Mandal, J. Pal Choudhury, Debasis Mazumdar, Dilip De, S. R. Bhadra Chaudhury:

Application of Neuro-Statistic Model on a Time Series Data. 1095-1096 - Carina S. González-González

, Victor Socas Guerra:
Using the Eye Tracking Technique to Evaluate Non-Linear Narratives. 1097-1098 - Jesús Ubaldo Quevedo-Torrero:

Attracting K12 Students with Standardized Outreach Activities. 1099-1100 - Ashish Mani, Chellapilla Patvardhan:

Some Investigations for Solving Constrained Optimization Problems using Adiabatic Quantum Computation. 1101-1102

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














