


Остановите войну!
for scientists:


default search action
9th ITNG 2012: Las Vegas, Nevada, USA
- Shahram Latifi:
Ninth International Conference on Information Technology: New Generations, ITNG 2012, Las Vegas, Nevada, USA, 16-18 April, 2012. IEEE Computer Society 2012, ISBN 978-0-7695-4654-4 - Wilfried Lepuschitz, Václav Jirkovský, Petr Kadera, Pavel Vrba:
A Multi-Layer Approach for Failure Detection in a Manufacturing System Based on Automation Agents. 1-6 - (Withdrawn) A novel violent videos classification scheme based on the bag of audio words features [Document Suppressed in IEEE Xplore]. 7-13
- Marwa M. A. Hadhoud
, Mohamed I. Eladawy, Ahmed Farag Seddik:
Region of Interest Localization of Cardiac Structure from Cine MRI Images. 14-17 - Arnold Wiliem
, Vamsi Krishna Madasu, Wageeh W. Boles
, Prasad K. D. V. Yarlagadda
:
A Context Space Model for Detecting Anomalous Behaviour in Video Surveillance. 18-24 - Alexandre Ivánovich Grebénnikov:
Image Recovery by Recursive Spline Smoothing and Application to Recognition of Compound Structures. 25-29 - Yang Wang, Kaitlyn Gurule, Jacqueline Wise, Jun Zheng
:
Wavelet Based Region Duplication Forgery Detection. 30-35 - Amioy Kumar, Madasu Hanmandlu, Shantaram Vasikarla:
Rank Level Integration of Face Based Biometrics. 36-41 - Thanh Le, Tom Altman, Katheleen J. Gardiner:
Probability-based Imputation Method for Fuzzy Cluster Analysis of Gene Expression Microarray Data. 42-47 - Adib Rastegarnia, Vahid Solouk
:
Castalia Network Animator (CNA): A Visualization Tool for Castalia Wireless Sensor Network Simulator. 48-53 - Yu-Hong Lee, Chyi-Ren Dow, Lu-Hui Huang, Ya-Chen Lin, Shiow-Fen Hwang, Wei-Bin Lee:
An Efficient Geo-aware Peer-to-Peer Resource Discovery and Sharing Scheme in Vehicular Ad-hoc Networks. 54-59 - Natarajan Meghanathan
:
A Unicast MANET Routing Protocol to Simultaneously Minimize the Stability-Hop Count Tradeoff and End-to-End Delay. 60-64 - Leila Mechtri, Fatiha Djemili Tolba, Salim Ghanemi:
MASID: Multi-Agent System for Intrusion Detection in MANET. 65-70 - Go Hasegawa
, Shoichi Takemori, Yoshiaki Taniguchi
, Hirotaka Nakano:
Determining Coverage Area Using Voronoi Diagram Based on Local Information for Wireless Mesh Networks. 71-76 - Yenumula B. Reddy
:
Spectrum Detection in Cognitive Networks by Minimizing Hidden Terminal Problem. 77-82 - Omar Y. Tahboub, Javed I. Khan:
Finding Time and Buffer Preserving Routes in Gaussian Intermittent Networks. 83-88 - Matt Fenwick, Colbert Sesanker, Martin R. Schiller
, Heidi J. C. Ellis, Michael L. Hinman, Jay Vyas, Michael R. Gryk:
An Open-Source Sandbox for Increasing the Accessibility of Functional Programming to the Bioinformatics and Scientific Communities. 89-94 - Emi Mathews:
Planarization of Geographic Cluster-based Overlay Graphs in Realistic Wireless Networks. 95-101 - Mohamed Bourimi
, Marcel Heupel, Benedikt Westermann, Dogan Kesdogan, Marc Planagumà, Rafael Giménez, Fatih Karatas, Philipp Schwarte:
Towards Transparent Anonymity for User-controlled Servers Supporting Collaborative Scenarios. 102-108 - Muhammad Awais Azam
, Jonathan Loo, Aboubaker Lasebae, Sardar Kashif Ashraf Khan, Waleed Ejaz
:
Recognising the Activities of Low Entropy Mobile People Using Wireless Proximity Data. 109-114 - Craig Stewart, Javed I. Khan:
A Large Scale Evolutionary Analysis of the Internet Autonomous System Network. 115-120 - Shine N. Das, Midhun Mathew, Pramod K. Vijayaraghavan:
An Efficient Approach for Finding Near Duplicate Web Pages Using Minimum Weight Overlapping Method. 121-126 - Shu-Ming Hsieh, Ssu-An Lo, Chiun-Chieh Hsu, Wei-Chao Lin:
Novel Cloud Service for Improving World Universities Ranking. 127-131 - Ching-Seh Wu, Ibrahim Khoury:
Tree-based Search Algorithm for Web Service Composition in SaaS. 132-138 - Anirban Sarkar, Narayan C. Debnath:
Aspect Algebra: The Operational Semantics for Aspect Oriented Software. 139-144 - Kishan Dharavath
, Sri Khetwat Saritha
:
Semantic Web: A Topic Specific Search. 145-148 - Narayan C. Debnath, Carlos Salgado, Mario Peralta, Mario Beron, Daniel Riesco, German Montejano:
MEBPCM: A Method for Evaluating Business Process Conceptual Models. A Study Case. 149-154 - Wan D. Bae, Shayma Alkobaisi, Sada Narayanappa, Cheng C. Liu:
A Mobile Data Analysis Framework for Environmental Health Decision Support. 155-161 - Sung-Hoon Park, Seoun-Hyung Lee:
A Design of Mutual Exclusion Protocol in Cellular Wireless Networks. 162-167 - Tong Ming Lim, Yong Liang Choong, Angela Siew-Hoong Lee:
Using Two-tier Bitwise Interest Oriented QRP Data Structure for High Clustering through Interest Similarity in SWB P2P Systems. 168-174 - Angela Siew-Hoong Lee, Tong Ming Lim:
The Use of Knowledge Management Systems to Support Knowledge Creation and Sharing Activities among Employees - A Survey Based Study of IT Shared Services Company. 175-181 - Farhana H. Zulkernine, Piergiorgio Bertoli, Marco Pistore
, Andreas Friesen, Jens Lemcke, Bernhard Thimmel, Otfried von Geisau:
A Constraint-Driven Business Object Model for Service-Based Business Processes. 182-188 - Giovanni Agosta
, Alessandro Barenghi
, Antonio Parata, Gerardo Pelosi
:
Automated Security Analysis of Dynamic Web Applications through Symbolic Code Execution. 189-194 - Chouvalit Khancome, Veera Boonjing:
New Hashing-Based Multiple String Pattern Matching Algorithms. 195-200 - Yanjun Zuo, John Babin:
Searching for the Optimal Proof Schedule in a Proof-Carrying Survivability Paradigm - A Dynamic, Interactive Approach. 201-208 - Karl Smith, Jeffrey M. Galloway, Susan V. Vrbsky:
An Empirical Study on the Impact of an Idle Limit in Distributed Systems. 209-213 - Mais Nijim, Young Lee, Kiranmai Bellam:
HyBuM: Hybrid Energy Efficient Architecture for Mobile Storage Systems. 214-220 - Taufik Taufik
, Jameson Thornton, Dale Dolan:
Piezoelectric Converter for Wind Energy Harvesting. 221-224 - Dale Dolan, Peter W. Lehn:
Harmonics and Dynamic Response of a Virtual Air Gap Variable Reactor. 225-231 - Jeffrey M. Galloway, Karl Smith, Jeffrey C. Carver:
An Empirical Study of Power Aware Load Balancing in Local Cloud Architectures. 232-236 - James Gagnon, Corey Weathers, Marty Wiedmeyer, Phani Koppineedi, Raghavender Anegouni, Steve Schon, Xin Bai:
API Backward Compatibility Testing Using VSTS. 237-241 - Adam Schwartz:
Using Test Cases to Size Systems: A Case Study. 242-246 - Teemu Kanstrén, Éric Piel, Hans-Gerhard Gross:
Using Reverse-Engineered Test-Based Models to Generate More Tests: Where is the Sense in That? 247-252 - James D. McCaffrey:
A Hybrid System for Analyzing Very Large Graphs. 253-257 - Soumen Maity:
Software Testing with Budget Constraints. 258-262 - Selin Benli, Anthony Habash, Andy Herrmann, Tyler Loftis, Devon Simmonds:
A Comparative Evaluation of Unit Testing Techniques on a Mobile Platform. 263-268 - Talukdar S. Asgar, Mohammed Akour
, Tariq M. King:
Applying Test-First and Parallel Processing Techniques to ERP Data Conversion. 269-274 - Xinyu Zhang, Rui Wang:
The Application of the Component-based Product Line in the Data Processing Domain. 275-280 - Per Karlström, Wenbiao Zhou:
Generator Flow: An XML Configurable Design Pattern Used in NoGAP. 281-286 - Henning Groenda:
Protecting Intellectual Property by Certified Component Quality Descriptions. 287-292 - Claudio Gonçalves Bernardo:
Loan System in Brazilian Financial Institution - A SOA Application. 293-298 - Claudio Gonçalves Bernardo, William Bragagnollo Montini, Fernanda Naomi Yamato, Gerson Pereira Domingues, Felipe D'Oliveira:
System Development for Violence Mapping in a Social Network in Real Time. 299-305 - Ayoub Sabraoui, Abdeslam Ennouaary, Ismaïl Khriss, Mohammed El Koutbi:
An MDA-Based Approach for WS Composition Using UML Scenarios. 306-313 - James R. Miller, Hisham M. Haddad:
Challenges Faced While Simultaneously Implementing CMMI and Scrum: A Case Study in the Tax Preparation Software Industry. 314-318 - Natarajan Meghanathan
, Hyunju Kim, Loretta A. Moore:
Incorporation of Aspects of Systems Security and Software Security in Senior Capstone Projects. 319-324 - Caio Henrique Coutinho, Johnny Cardoso Marques, Sarasuaty Megume Hayashi Yelisetty, Samoel Mirachi, Alexandre Lima Possebon Ribeiro, Marcelo Amaral da Silva, Adilson Marques da Cunha, Luiz Alberto Vieira Dias:
Developing a Smart Grids System as a PBL with Agile Method on Computer Engineering Courses. 325-330 - Jumie Yuventi, José Cortés:
Developing Rapidly Expandable Data-driven Software Systems Based on Multitier Architecture: Examination of the Development of Modules for Content Management Systems Used to Construct Web Portals and Virtual Communities. 331-334 - Kehinde Dehinbo, Pieter Pretorius, Johnson Dehinbo:
Strategic Analysis Towards Deriving Competitive Advantage with the Use of FOSS: The Case of a South African University. 335-342 - Tomohiro Hayata, Jianchao Han, Mohsen Beheshti:
Facilitating Agile Software Development with Lean Architecture in the DCI Paradigm. 343-348 - Santosh Rajendran, Kevin Gary, Harry Koehnemann:
A Tool for Teaching Risk. 349-354 - Sabah Al-Fedaghi
:
Perceived Privacy. 355-360 - Tummalapalli J. V. R. K. M. K. Sayi, R. K. N. Sai Krishna, Ravi Mukkamala, Pallav K. Baruah:
Data Outsourcing in Cloud Environments: A Privacy Preserving Approach. 361-366 - Arijit Ukil
:
Connect with Your Friends and Share Private Information Safely. 367-372 - Mark Stegelmann, Dogan Kesdogan:
Location Privacy for Vehicle-to-Grid Interaction through Battery Management. 373-378 - Hisham A. Kholidy, Fabrizio Baiardi:
CIDS: A Framework for Intrusion Detection in Cloud Systems. 379-385 - Kaibin Huang, Raylin Tso:
Security Analysis Concerning the Random Numbers of Threshold Ring Signatures. 386-391 - Nikolaos Aroukatos, Kostas Manes, Stelios Zimeras, Fotis Georgiakodis:
Data Hiding Techniques in Steganography Using Fibonacci and Catalan Numbers. 392-396 - Hisham A. Kholidy, Fabrizio Baiardi:
CIDD: A Cloud Intrusion Detection Dataset for Cloud Computing and Masquerade Attacks. 397-402 - Jing-Chiou Liou:
When the Software Goes Beyond its Requirements - A Software Security Perspective. 403-408 - Michael J. Shevenell, Robert F. Erbacher:
Design and Implementation of an Open Network and Host-Based Intrusion Detection Testbed with an Emphasis on Accuracy and Repeatability. 409-416 - Robert F. Erbacher, Steve E. Hutchinson:
Distributed Sensor Objects for Intrusion Detection Systems. 417-424 - Dong-Hyun Kim, Gil-Je Lee, Min-Ho Park, Kee-Young Yoo:
A Reversible Secret Sharing Scheme Based on GF(2^8). 425-430 - Johnny Cardoso Marques, Sarasuaty Megume Hayashi Yelisetty, Luiz Alberto Vieira Dias, Adilson Marques da Cunha:
Using Model-Based Development as Software Low-Level Requirements to Achieve Airborne Software Certification. 431-436 - Mehrdad Saadatmand
, Thomas Leveque:
Modeling Security Aspects in Distributed Real-Time Component-Based Embedded Systems. 437-444 - Mario Masayuki Takeda, Francisco Supino Marcondes
, Ítalo Santiago Vega, Elizabete Briani Macedo Gara, Luciano Gaspar:
A Computational Teaching Approach through the Use of a Narrative Technique and a Comic Strip. 445-451 - Felipe Rafael Motta Cardoso, Paulo Marcelo Tasinaffo
, Denis Ávila Montini, Danilo Douradinho Fernandes
, Adilson Marques da Cunha, Luiz Alberto Vieira Dias:
A Formal Control Model for Risks Management within Software Projects. 452-457 - Rana Atif Ali Khan
, Muhammad Umair Khan, Muneeb Iqbal:
Multilevel Graph Partitioning Scheme to Solve Traveling Salesman Problem. 458-463 - Doreen Orishaba, Raymond Besiga, Arthur Tumusiime Asiimwe, Sandy Stevens Tickodri-Togboa, Paul Isaac Musasizi, Cosmas Mwikirize
:
Implementation of a Wavelength Division Multiplexing and Bidirectional Optic Fiber Link iLab. 464-465 - Darshan A. Dimplu, Fei Wang:
Behavior Modeling of Programmable Metallization Cell Using Verilog-A. 466-471 - Mahmoud Fawzy Wagdy, Robin Sur:
A Novel SAR Fast-Locking Digital PLL: SPICE Modeling and Simulations. 472-477 - Taufik Taufik
, Taffy Wong, Owen Jong, Dale Dolan:
Design and Simulation of Multiple-Input Single-Output DC-DC Converter. 478-483 - Tan Yiyu, Yasushi Inoguchi, Yukinori Sato
, Yukio Iwaya, Hiroshi Matsuoka, Makoto Otani, Takao Tsuchiya:
Design of a FPGA-based Timing Sharing Architecture for Sound Rendering Applications. 484-489 - Yanqing Ji, Fangyang Shen, John Tran:
A High Performance Agent-Based System for Reporting Suspected Adverse Drug Reactions. 490-495 - Jie Luo, Yilin Zhang, Saarvaani Vadlamani, Byeong Kil Lee:
Performance-Sensitivity-based Workload Tailoring for Effective Design Exploration. 496-501 - Bing Qi, Fangyang Shen, Syed Raza:
iBATD: A New Routing Metric for Multi-radio Wireless Mesh Networks. 502-507 - B. Asvija, K. Kalaiselvan, M. Ateet, R. Sridharan, S. R. Krishnamurthy:
A Performance Based QoS Aware Resource Brokering Framework for the Grid. 508-515 - Anthony S. Fong, Chihang Yau, Yijun Liu:
A Hardware-Software Integrated Design for a High-Performance Java Processor. 516-521 - Kamyar Ardekani, Amirreza Ardekani
:
An IT-based System to Facilitate Architectural Design. 522-527 - Kerry A. Seitz
, Mark C. Lewis:
Virtual Machine and Bytecode for Optimization on Heterogeneous Systems. 528-533 - Jaya Suseela, Venkatesan Muthukumar:
Loopback Virtual Channel Router Architecture for Network on Chip. 534-539 - F. Tabatabayi, Babak Akhgar, S. M. R. Nasserzadeh, Simeon J. Yates
:
Simulating Online Consumer Satisfaction Using Fuzzy Cognitive Mapping. 540-547 - Jesús Ubaldo Quevedo-Torrero, Geno Erickson:
XML Querying Using Data Logic Structures and Primitives. 548-553 - Jesús Ubaldo Quevedo-Torrero, Geno Erickson:
Watermarking XML Structures Using Multi-valued Dependencies. 554-559 - Jasdeep Natt, Ray R. Hashemi, Azita Bahrami, Mahmood Bahar, Nicholas Tyler, Jay Hodgson:
Predicting Future Climate Using Algae Sedimentation. 560-565 - Hassan Reza, Narayana Mazumder:
A Secure Software Architecture for Mobile Computing. 566-571 - Hassan Reza, Liang Cheng:
Context-Based Testing of COTs Using Petri Nets. 572-577 - Jack O. Shelton, Hamid R. Arabnia:
Brain Imaging for Diagnosis of Schizophrenia: Challenges, Successes and a Research Road Map. 578-583 - Yas Abbas Alsultanny
:
Successful Forecasting for Knowledge Discovery by Statistical Methods. 584-588 - Kazem Taghva:
The Building of a Large Government Digital Library. 589-593 - Samir N. Hamade:
Student Perceptions of Learning Management Systems in a University Environment: Yahoo Groups vs Blackboard. 594-599 - Premchand Uppuluri, Jeff Pittges:
A Comprehensive Undergraduate Application Security Project. 600-607 - John T. Minor, Laxmi P. Gewali:
Useful Compiler Directives for Teaching Programming. 608-611 - Eugene Chamorro, Jianchao Han, Mohsen Beheshti:
The Design and Implementation of an Antivirus Software Advising System. 612-617 - Kohei Arai:
Data Hiding Method Based on Dyadic Wavelet Transformation Improving Invisibility of Secret Images on Circulation Images by Means of Run-Length Coding with Permutation Matrix Based on Random Number. 618-622 - Teruya Minamoto
, Ryuji Ohura:
A Non-blind Digital Image Watermarking Method Based on the Dual-tree Complex Discrete Wavelet Transform and Interval Arithmetic. 623-628 - Zhong Zhang, Hiroshi Toda, Takashi Imamura, Tetsuo Miyake:
A New Variable-Band Filter Design Method for the Discrete Wavelet Transform. 629-634 - Maqsood Mahmud
, Muhammad Waqar, Abdulrahman Abdulkarim Mirza, Abdul Hanan Bin Abdullah:
Efficient Securing of Iris Image Template by Using Grayscale Level Incremented/Decremented Method. 635-639 - Teruya Minamoto
, Yuji Ogata, Masahiro Sawai:
Visualization of Digital Audio Watermarking Based on the Dyadic Wavelet Transform. 640-645 - Aras Dargazany, Mircea Nicolescu:
Human Body Parts Tracking Using Torso Tracking: Applications to Activity Recognition. 646-651 - Xinyu Zhang, Xiangyu Zhang, Yuhao Luo:
Who-Works-With-Whom (WWWW): Web-based Directed Work Relationship Network for Maximizing Organizational Efficiency in Enterprises. 652-655 - Kohei Arai, Rosa Andrie
:
Gait Recognition Method Based on Wavelet Transformation and its Evaluation with Chinese Academy of Sciences (CASIA) Gait Database as a Human Gait Recognition Dataset. 656-661 - Rodolfo Inostroza, Cristian Rusu, Silvana Roncagliolo, Cristhy Jiménez
, Virginica Rusu:
Usability Heuristics for Touchscreen-based Mobile Devices. 662-667 - Mohammed Rokibul Alam Kotwal, Tasneem Halim, Md. Mehedi Hassan Almaji, Imtiaz Hossain, Mohammad Nurul Huda:
Extraction of Local Features for Tri-Phone Based Bangla ASR. 668-673 - Yun-Ke Chang, Mark J. Chavez, Miguel A. Morales Arroyo, Jaime Jimenez-Guzman:
An Active Cinema Experience: A Study on User Expectation and Perceived Gratifications of a Real-time Animated Film System. 674-679 - Alejandra Jiménez, Santiago Jiménez, Pablo Lozada Yanez, Cristhy Jiménez
:
Wireless Sensors Network in the Efficient Management of Greenhouse Crops. 680-685 - S. Kami Makki, Charles Williams:
Development of Dynamic Vocalization Customer Service Software for Multiple Languages for Telephone Environment. 686-689