


default search action
4th ITNG 2007: Las Vegas, Nevada, USA
- Shahram Latifi:

Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2-4 April 2007, Las Vegas, Nevada, USA. IEEE Computer Society 2007, ISBN 978-0-7695-2776-5
Embedded Cryptographic Systems
- Giovanni Agosta

, Luca Breveglieri
, Gerardo Pelosi
, Martino Sykora:
Programming Highly Parallel Reconfigurable Architectures for Public-Key Cryptographic Applications. 3-10 - Robert Ronan, Colm O'hEigeartaigh, Colin C. Murphy, Tim Kerins, Paulo S. L. M. Barreto:

A Reconfigurable Processor for the Cryptographic nT Pairing in Characteristic 3. 11-16 - Nadia Nedjah

, Luiza de Macedo Mourelle
, Rodrigo Martins da Silva:
Efficient Hardware for Modular Exponentiation Using the Sliding-Window Method. 17-24
Mobility & Resource Management in Wireless/Mobile Networks I
- Wei Shen, Qing-An Zeng:

Two Novel Resource Management Schemes for Integrated Wireless Networks. 25-30 - Muhammad Adeel, Ahmad Ali Iqbal:

TCP Congestion Window Optimization for CDMA2000 Packet Data Networks. 31-35 - Yenumula B. Reddy, Nandigam Gajendar, Portia Taylor, Damian Madden:

Computationally Efficient Resource Allocation in OFDM Systems: Genetic Algorithm Approach. 36-41 - Abbas Nayebi, M. R. Rahimi, Hamid Sarbazi-Azad:

Analysis of Time-Based Random Waypoint Mobility Model for Wireless Mobile Networks. 42-47 - Mika Watanabe, Hiroaki Higaki:

No-Beacon GEDIR: Location-Based Ad-Hoc Routing with Less Communication Overhead. 48-55 - Ognjen Dobrijevic, Miran Mosmondor, Maja Matijasevic

:
Design of a QoS Signaling API for Advanced Multimedia Applications in NGN. 56-64
Internet and Wireless Network Security
- Bing Wu, Xiao-chun Yun, Xiang Cui:

Study on Worm Poisoning Technology. 65-70 - Hussein Abdel-jaber

, Michael E. Woodward, Fadi A. Thabtah, Mahmud Etbega:
A Discrete-time Queue Analytical Model based on Dynamic Random Early Drop. 71-76 - Mehdi Salour, Xiao Su

:
Dynamic Two-Layer Signature-Based IDS with Unequal Databases. 77-82 - Osama Dandash, Yiling Wang, Phu Dung Le, Bala Srinivasan:

A new Dynamic Key Generation Scheme for Fraudulent Internet Payment Prevention. 83-88 - Hai Trong Vu, Neeraj Mittal, Subbarayan Venkatesan:

THIS: THreshold security for Information aggregation in Sensor networks. 89-95 - H. R. Nagesh, K. Chandra Sekaran, Adarsh Rao Kordcal:

Proactive model for Mitigating Internet Denial-of-Service Attacks. 96-101 - Wei Ren

, Yoohwan Kim, Ju-Yeon Jo, Mei Yang, Yingtao Jiang:
IdSRF: ID-based Secure Routing Framework for Wireless Ad-Hoc Networks. 102-110
Sensor Networks
- Anura P. Jayasumana, Qi Han, Tissa H. Illangasekare

:
Virtual Sensor Networks - A Resource Efficient Approach for Concurrent Applications. 111-115 - Ashwini Raina, Venkatesan Muthukumar, Laxmi P. Gewali:

Cell-based Distributed Addressing Technique Using Clustered Backbone Approach. 116-121 - Nikos Dimokas

, Dimitrios Katsaros, Yannis Manolopoulos:
Node Clustering in Wireless Sensor Networks by Considering Structural Characteristics of the Network Graph. 122-127 - Damayanti Datta, Sukhamay Kundu:

Reliable and Efficient Data Transfer in Wireless Sensor Networks via Out-of-Sequence Forwarding and Delayed Request for Missing Packets. 128-133 - Manseok Yang, Sun Sup So, Steve Eun, Brian Kim, Jinchun Kim:

Sensos: A Sensor Node Operating System with a Device Management Scheme for Sensor Nodes. 134-139 - Min Tun, Laxmi P. Gewali, Henry Selvaraj:

Interference Aware Routing in Sensor Network. 140-146 - Sajid Hussain, Abdul Wasey Matin, Obidul Islam:

Genetic Algorithm for Energy Efficient Clusters in Wireless Sensor Networks. 147-154
Mobile Enterprise
- Guido Gehlen, Fahad Aijaz, Muhammad Sajjad, Bernhard Walke:

A Mobile Context Dissemination Middleware. 155-160 - Jinsuo Zhang, Stacey Franklin Jones, Junling Wang, Sumi Helal

:
DPQ: Using A Distributed Priority Queue to Improve Ad hoc TCP Performance. 161-165 - Elaine Lawrence, Maria Bina, Gordana Culjak, Tarek El Kiki:

Wireless Community Networks: Public Assets for 21st Century Society. 166-174
New Trends in Image Processing
- Muhammad Saleem, Imran Touqir, Adil Masood Siddiqui:

Novel Edge Detection. 175-180 - Sarang C. Joshi, S. K. Bodhe:

Time Complexity Analysis for Decoding VOP Content in MPEG-4 Presentations. 181-182 - S. Rahul, J. Vignesh, S. Santhosh Kumar, M. Bharadwaj, N. Venkateswaran

:
Comparison of Pyramidal and Packet Wavelet Coder for Image Compression Using Cellular Neural Network (CNN) with Thresholding and Quantization. 183-184 - Dilip Gopichand Khairnar, Shabbir N. Merchant, Uday B. Desai:

A Neural Solution for Signal Detection In Non-Gaussian Noise. 185-189 - Premkumar Elangovan, Gaoyong Luo, Geoff Lawday:

Structurally Efficient Video Codec for Wireless Mobile Applications. 190-195 - Hau T. Ngo, Vijayan K. Asari:

Design of a Low Power Multiply-Accumulator for 2D Convolution in Video Processing Applications. 196-201 - Jinghua Zhang, Jinsheng Xu

, Huiming Yu:
Octree-Based 3D Animation Compression with Motion Vector Sharing. 202-207 - Madasu Hanmandlu, Jyotsana Grover, Vamsi Krishna Madasu

, Shantaram Vasikarla:
Input Fuzzy Modeling for the Recognition of Handwritten Hindi Numerals. 208-213 - Manoranjan Paul

, M. Manzur Murshed
:
Pattern based Residual Coding for H.264 Encoder. 214-218 - Seema H. Jadhav, Balasaheb Tarle

, Laxman M. Waghmare
:
Polygonal Approximation of 2-D Binary Images. 219-223 - Shuangteng Zhang, Yihong Lu:

Image Resolution Enhancement Using a Hopfield Neural Network. 224-228 - Luc Gillibert, Alain Bretto

:
Hypergraphs for Near-lossless Volumetric Compression. 229-233 - Nileshsingh V. Thakur

, O. G. Kakde:
Color Image Compression on Spiral Architecture using Optimized Domain Blocks in Fractal Coding. 234-242
IT Applications
- Jay Kothari, Maxim Shevertalov, Edward Stehle, Spiros Mancoridis:

A Probabilistic Approach to Source Code Authorship Identification. 243-248 - Seongwook Youn, Dennis McLeod:

Efficient Spam Email Filtering using Adaptive Ontology. 249-254 - Dangeti Ravi Shankar, Akhil Kodali, Pradeep Beerla, D. V. S. Mohan Nimai:

Neural Networks in Cultivation. 255-260 - Sampathkumar Veeraraghavan, Karthik Srinivasan:

Exploration of Autism Expert Systems. 261-264 - Narongrit Waraporn:

Results of Real Time Simulation of Medical Knowledge Technology (MKT) System for Medical Diagnosis on Distributed Knowledge Nodes. 265-270 - C. L. Connors, M. A. Malloy:

Practical Challenges Facing Communities of Interest in the Net-Centric Department of Defense. 271-276 - Wen-Hui Chen, Wen-Shang Tseng:

A Novel Multi-agent Framework for the Design of Home Automation. 277-281 - Marcus J. Huber:

Agent Autonomy: Social Integrity and Social Independence. 282-290
Pervasive Computing
- InHo Jang, SangKeun Lee:

Search Reverse Nearest Neighbor Query On Air. 291-296 - Dejene Ejigu, Vasile-Marian Scuturici

, Lionel Brunie:
CoCA: A Collaborative Context-Aware Service Platform for Pervasive Computing. 297-302 - Sheikh Iqbal Ahamed, Munirul M. Haque, K. M. Ibrahim Asif:

S-MARKS: A Middleware Secure by Design for the Pervasive Computing Environment. 303-310
E-Learning, Education and Curriculum
- Janus S. Liang:

Education and Training for Troubleshooting in Automotive Chassis. 311-316 - Kazuo Hiekata

, Hiroyuki Yamato, Piroon Rojanakamolsan, Wataru Oishi:
Design Engineering Educational Framework Using ShareFast: A Semantic Web-Based E-Learning System. 317-322 - Kenneth E. Hoganson, David Lebron:

Lectures for Mobile Devices, Evaluating "iPod/PDA-casting" Technology and Pedagogy. 323-328 - Azita Bahrami:

An L-Tree Based Analysis of E-lessons. 329-334 - Samir N. Hamade:

Acquiring Information Technology Skills by Freshmen Students at Kuwait University: The Language Factor. 335-340 - Mohammad Eyadat, Dorothy M. Fisher:

Web Accessibility and Information Systems Curriculum. 341-346 - Oussama Kassem Zein, Yvon Kermarrec:

Description and composition of services for distant learning and research activities. 347-354
Data Mining
- Sudhanwa Kholgade, Jamie White, Hassan Reza:

Comparing the Specification of a Near-Real Time Commanding System Using Statecharts and AADL. 355-360 - Kazem Taghva

, Pavankumar Bondugula, Darshana Gala:
Association Rule Discovery of Privacy Information. 361-365 - Hassan Reza, Sandeep Endapally, Emanuel S. Grant:

A Model-Based Approach for Testing GUI Using Hierarchical Predicate Transition Nets. 366-370 - Abdullah Uz Tansel, Susan P. Imberman:

Discovery of Association Rules in Temporal Databases. 371-376 - Chung-Hong Lee, Hsin-Chang Yang

:
Implementation of Unsupervised and Supervised Learning Systems for Multilingual Text Categorization. 377-382 - Mani Arun Kumar, Madan Gopal:

Binary Classification by SVM based neural Trees and Nonlinear SVMs. 383-387 - Mark Smith, Alireza Khotanzad:

Quality Metrics for Object-Based Data Mining Applications. 388-392 - Mehrdad Nojoumian, Timothy C. Lethbridge

:
Extracting Document Structure to Facilitate a Knowledge Base Creation for The UML Superstructure Specification. 393-400 - S. D. Samantaray:

A Data mining approach for resolving cases of Multiple Parsing in Machine Aided Translation of Indian Languages. 401-405 - Rabia Jafri

, Hamid R. Arabnia:
Analysis of Subspace-based Face Recognition Techniques under Changes in Imaging Factors. 406-413 - Ray R. Hashemi, Alexander A. Tyler, Christopher Childers, Arthur Chausmer:

Concordance Analysis of DEXA Data. 414-419 - Shafiq Ahmad

, Mali Abdollahian
, Panlop Zeephongsekul:
Process Capability for a Non-Normal Quality Characteristics Data. 420-424 - Shafiq Ahmad

, Mali Abdollahian
, Panlop Zeephongsekul:
Process Capability Analysis for Non-Normal Quality Characteristics Using Gamma Distribution. 425-430 - Amy Neustein:

SEQUENCE PACKAGE ANALYSIS: A New Natural Language Understanding Method for Intelligent Mining of Recordings of Doctor-Patient Interviews and Health-Related Blogs. 431-438
Web Technologies I
- Bernard J. Jansen

, Amanda Spink, Bhuva Narayan
:
Query Modifications Patterns During Web Searching. 439-444 - Terrence A. Brooks, Brian P. Flaherty

:
An Abandoned Web Page Finds its Audience. 445-450 - Anya Kim, Amitabh Khashnobish, Myong H. Kang:

An Architecture for Web Services Authentication and Authorization in a Maritime Environment. 451-456 - Juan A. Correa-Colon, Manuel Rodríguez-Martínez:

Design and Implementation of JSwitch: a Web-based Transaction Coordination Framework. 457-462 - Ali Ghobadi Tapeh

, Masood Rahgozar
:
A Virtual Catalog Generated from Web Pages of Vendors for Comparative Shopping. 463-468 - Isak Taksa, Sarah Zelikovitz, Amanda Spink:

Using Web Search Logs to Identify Query Classification Terms. 469-474 - Richard D. Holowczak, Isak Taksa, Ilan Levine:

Mining Web Logs to Improve WebGIS Application Response Times. 475-480 - Yun-Ke Chang, Amanda Spink:

Multimedia Chinese Web Search Engines: A Survey. 481-486 - Hanmin Jung, Seungwoo Lee, In-Su Kang, HeeKwan Koo, Won-Kyung Sung:

Construction of Semantic Web-based Knowledge Using Text Processing. 487-492 - Gaël Dias, Bruno Conde:

Towards Web Browsing for Visually Impaired People. 493-496
Intelligent/Object-Oriented Computing, Information Systems
- Mahmood Houshmand, Mohammad Daneshvar Kakhki:

Presenting a Rule Based Loan Evaluation Expert System. 497-502 - Marc Karam, Mohamed A. Zohdy:

Development of a Model-Based Dynamic Recurrent Neural Network for Modeling Nonlinear Systems. 503-506 - Jamal Bentahar

, John-Jules Ch. Meyer, Bernard Moulin:
Securing Agent-Oriented Systems: An Argumentation and Reputation-based Approach. 507-515 - Farhad Mohamad Kazemi, Saeed Samadi, Hamid Reza Pourreza

, Mohammad R. Akbarzadeh-Totonchi:
Vehicle Recognition Using Curvelet Transform and SVM. 516-521 - C. Y. Ho, W. Y. Lo, Anthony S. Fong:

Memory Garbage Collection for an Object-Oriented Processor. 522-527 - C. Y. Ho, K. F. Chong, Chihang Yau, Anthony Shi-Sheung Fong:

A Study of Dynamic Branch Predictors: Counter versus Perceptron. 528-536
Potpourri
- A. R. Ali Ahmadi, Farzad Soltani, Majid Gheitasi:

An ICT Technical Reference Model for Iran Universities. 537-542 - Muammer Zerenler:

Information Technology and Business Performance in Agile Manufacturing: An Empirical Study in Textile Industry. 543-549 - Marcus J. Huber, Sanjeev Kumar, Sean A. Lisse, David McGee:

Authority, Deontics and Joint Intentions. 550-555 - Christina N. Michael, Xiao Su

:
Incorporating a New Hash Function in OpenPGP and SSL/TLS. 556-561 - Elridge D'Mello, Jerzy W. Rozenblit:

Design For a Patient-Centric Medical Information System Using XML Web Services. 562-567 - Sachin Singh, Uday Joshi, Prem Uppuluri:

Efficient and Lightweight File System for Desktop Grids. 568-576
Bioinformatics
- Leon Sanders, Yenumula B. Reddy:

Detecting Blood Clots using Neural Networks. 577-582 - Masaki Murata, Tomohiro Mitsumori, Kouichi Doi:

Overfitting in protein name recognition on biomedical literature and method of preventing it through use of transductive SVM. 583-588 - Yasuhiro Kiuchi, Tomonobu Ozaki, Takenao Ohkawa:

Partial Geometric Hashing for Retrieving Similar Interaction Protein Using Profile. 589-596
Software Engineering I
- Hisham M. Haddad, Mauricio Jose Ordoñez:

Enhanced Component Reuse with Atomic Domains: Application Scenarios. 597-602 - Sajjan G. Shiva, Lubna Abou Shala:

Software Reuse: Research and Practice. 603-609 - Chia-Chu Chiang:

Engineering Documents into XML File Formats. 610-615 - Brian Demmings, Elhadi M. Shakshuki

, Tomasz Müldner:
AETA: Algorithm Explanation Teaching Agent. 616-621 - Chang-Mog Lee, Jeong-Ok Kim, Ok-Bae Chang:

User Interface Prototype for User-Centered Interface Design. 622-627 - YoungJoon Byun:

A Tool Support for Design and Validation of Communication Protocol using State Transition Diagrams. 628-636
Software Engineering II & Algorithms
- Elhadi M. Shakshuki

, Hsiang-Hwa Koo, Darcy G. Benoit:
Negotiation Strategies for Agent-based Meeting Scheduling System. 637-642 - Carlos Eduardo de Barros Paes, Celso Massaki Hirata

:
RUP Extension for the Development of Secure Systems. 643-652 - Nirmal Gami, Boleslaw Mikolajczak:

Integration of Multilevel Security Features Into Loosely Coupled Inter-Organizational Workflows. 653-657 - Mehdi EffatParvar

, MohammadReza EffatParvar, Akbar Bemana, Mehdi Dehghan
:
Determining a Central Controlling Processor with Fault Tolerant Method in Distributed System. 658-663 - Hazem M. Bahig, Hatem M. Bahig:

Optimal Parallel Merging by Counting. 664-669 - Cleber V. G. Mira, Joao Meidanis:

Sorting by Block-Interchanges and Signed Reversals. 670-676
Software Specification and Modeling-Techniques, Tools and Applications
- Andre Oboler

, Charles Twardy, David W. Albrecht
:
Super Iterator A design pattern for Algorithm and Data structure collections. 677-678 - Andre Oboler

, Ian Sommerville:
Research Documentation Guidelines - Capturing knowledge, improving research. 679-684 - Judith Ann Ouimet, Sermsak Buntha, Sergiu M. Dascalu:

SERT: Software Tool for Generating Student Engagement Reports. 685-692 - Walter Dosch, Gongzhu Hu:

On Irregular Behaviours of Interactive Stacks. 693-700 - V. Vallieswaran, Bernard Menezes:

ArchKriti : A Software Architecture Based Design and Evaluation Tool Suite. 701-706 - Walter Dosch, Annette Stümpel:

High-Level Design of a Request Driven Sender Component. 707-714 - Yongyan Zheng, Jiong Zhou, Paul Krause:

A Model Checking based Test Case Generation Framework forWeb Services. 715-722
High Performance Computing Architectures
- Thomas Poonnen, Adly T. Fam:

A Novel VLSI Divide and Conquer Implementation of the Iterative Array Multiplier. 723-728 - Guoqiang Yang, Mei Yang, Yulu Yang, Yingtao Jiang:

On the Physicl Layout of PRDT-Based NoCs. 729-733 - Yaoting Jiao, Yulu Yang, Ming He, Mei Yang, Yingtao Jiang:

Multi-path Routing for Mesh/Torus-Based NoCs. 734-742
Information Security and Privacy
- Sung-Seok Kang, Young-Sang Kim, Hyo-Sun Kim, Young Joong Lee, Ki Cheol Jang:

Location Based Security Architecture Based on Smart Client Model For Mobile Environment. 743-746 - Haeryong Park, Hyun Kim, Kilsoo Chun, Jaeil Lee, Seongan Lim, Ikkwon Yie:

Untraceability of Group Signature Schemes based on Bilinear Mapping and Their Improvement. 747-753 - Chik How Tan, Joseph Chee Ming Teo:

Protection AgainstWeb-based Password Phishing. 754-759 - Linh Ngo, Amy W. Apon:

Using Shibboleth for Authorization and Authentication to the Subversion Version Control Repository System. 760-765 - Jarrod Trevathan

, Wayne Read:
A Simple Shill Bidding Agent. 766-771 - Raylin Tso, Takeshi Okamoto, Eiji Okamoto:

An Improved Signcryption Scheme and Its Variation. 772-778 - Rajni Goel, Moses Garuba, Anteneh Girma:

Research Directions in Quantum Cryptography. 779-784 - Moses Garuba, Jiang Li, Legand L. Burge III:

Comparative Analysis of Email Filtering Technologies. 785-789 - Moses Garuba, Jiang Li:

Preventing parameterized vulnerability in Web based applications. 790-793 - Rajni Goel, Moses Garuba, Chunmei Liu, Trang Nguyen:

The Security Threat Posed by Steganographic Content on the Internet. 794-798 - Jarrod Trevathan

, Wayne Read:
Detecting Collusive Shill Bidding. 799-808 - Sahel Alouneh

, Abdeslam En-Nouaary, Anjali Agarwal:
Securing MPLS Networks with Multi-path Routing. 809-814 - Fengying Li, Qingshui Xue, Zhenfu Cao:

Crypanalysis of Kuo and Chen's Threshold Proxy Signature Scheme Based on the RSA. 815-818 - Omer Mahmood:

Developing Web 2.0 Applications for Semantic Web of Trust. 819-824 - Ji-Seon Lee, Jik Hyun Chang:

Semantically Secure Authenticated Encryption Scheme and the Same Scheme for Ad-hoc Group Called a Ring. 825-830 - Roman V. Yampolskiy:

Secure Network Authentication with PassText. 831-836 - Roman V. Yampolskiy:

Human Computer Interaction Based Intrusion Detection. 837-842 - Chandrashekhar A. Dhote, M. S. Ali:

Materialized View Selection in Data Warehousing. 843-847 - Dattatray V. Jadhav, Raghunath S. Holambe:

Multiresolution based Kernel Fisher Discriminant Model for Face Recognition. 848-853 - Alicia Nicki Washington, Harry G. Perros:

Analysis of a Traffic-Groomed Optical Network with Alternate Routing. 854-862
Posters
- Terry C. House:

Client/Server Access: Satellite-ATM Connectivity Using a Knowledge Management Approach. 863-867 - Catherine H. Gebotys, Brian A. White:

A Phase Substitution Technique for DEMA of Embedded Cryptographic Systems. 868-869 - Fabio Dias Fagundez, Ricardo Niederberger Cabral, Gustavo Melim do Carmo:

Decoupling Relational Database from Object Oriented Layers. 870-871 - Wei Hoo Chong:

iDENTM Smartphone Embedded Software Testing. 872-873 - Sajid Hussain, Richard Peters, Obidul Islam:

A Quick and Energy Efficient Algorithm to Maximize Lifetime of Wireless Sensor Networks. 874-875 - Gopinath Balakrishnan, Mei Yang, Yingtao Jiang, Yoohwan Kim:

Performance Analysis of Error Control Codes for Wireless Sensor Networks. 876-879 - Shinya Ito, Kenji Yoshigoe:

Exponentially Aggressive Preservation of Nearly Depleted Nodes for Wireless Sensor Networks. 880-882 - Parag P. Joshi, Thomas C. Jannett:

Simulation of Localized Performance-Guided Reconfiguration of Distributed Sensor Networks. 883-884 - Mohammad Shirali-Shahreza:

Improving Mobile Banking Security Using Steganography. 885-887 - Yi Qi Gui, Eysuk Jung, Young Choi, Hwang Kyu Choi:

An Efficient Periodic Broadcasting Scheme for Mobile Video-on-Demand System. 888-889 - Toshihiko Yamakami:

Classification of Mobile Internet User Behaviors using Qualitative Transition Patterns. 890-892 - Thomas J. Wollinger, Vladyslav Kovtun

:
Fast explicit formulae for genus 2 hyperelliptic curves using projective coordinates. 893-897 - Amir Khatib Zadeh, Catherine H. Gebotys:

Enhanced Current-Balanced Logic (ECBL): An Area Efficient Solution to Secure Smart Cards against Differential Power Attack. 898-899 - Fan Zhang:

Power Analysis Attacks on ECC Randomized Automata. 900-901 - Chima Adiele:

A Formal Interactivity Model for aWeb Community. 902-903 - Tien N. Nguyen:

A Novel Vector-based Keyword Extracting Tool. 904-905 - Emília de Menezes, Adilson Marques da Cunha:

Creating an Effective Infrastructure to Develop GIS. 906-907 - Allan Zhang, Sumi Helal

:
SuperCache: A Mechanism to Minimize the Front End Latency. 908-914 - Alexander Khitun, Mingqiang Bao, Jooyoung Lee, Kang L. Wang, D. W. Lee, S. Wang:

Cellular Nonlinear Network with Spin Wave Bus. 915-919 - Xinming Duan, Yulu Yang, Mei Yang, Lei Li, Yingtao Jiang:

Topology and Binary Routing Schemes of A PRDT-Based NoC. 920-924 - Geylani Kardas

, Ebru Celikel:
A Smart Card Mediated Mobile Platform for Secure E-Mail Communication. 925-928 - D. Prabu, V. Vanamala, Sanjeeb Kumar Deka, R. Sridharan, B. B. Prahlada Rao

, N. Mohanram:
Design and Implementation of a High Performance MPI for Large Scale Computing System. 929-932 - Alan McCabe, Jarrod Trevathan

:
Pre-processing of On-line Signals in Noisy Environments. 933-936 - G. Tholkappia Arasu, V. Palanisamy:

NeuroFuzzy Agent Programming for Processing of EEG/ECG/EMG Waveforms. 937-938 - Farhad Mohamad Kazemi, Saeed Samadi, Hamid Reza Pourreza

, Mohammad R. Akbarzadeh-Totonchi:
Vehicle Recognition Based on Fourier, Wavelet and Curvelet Transforms - a Comparative Study. 939-940 - Eui-Jong Jeong, Goo Yeon Lee:

Efficient Location Management Scheme using MLR considering Local Usages. 941-942 - Jinsuo Zhang, Stacey Franklin Jones:

uKey: A Unified Key Management and Authentication Automation Middleware For Heterogeneous System. 943-944 - Kun-Yo Liu, Tim Yao:

Design of a RFID Transponder for Application on Secutiry. 945-946 - Ralucca Gera

:
On the Dominator Colorings in Bipartite Graphs. 947-952 - Jesús Ubaldo Quevedo-Torrero, Alma Delia Rodríguez-Bernal:

Goal Oriented Templates to Dynamically Assess Knowledge. 953-954 - Fengyuan Xu, Zhiyi Fang:

Individuation Learning Components in Intelligent Education Games. 955-956 - Avinash J. Agrawal, Manoj B. Chandak

:
Mobile Interface for Domain Specific Machine Translation Using Short Messaging Service. 957-958 - Mazin AlHadidi:

Utilizing the Fuzzy Logic Model to Develop the Arab Management System Performance. 959-960 - Rashid Bin Muhammad

:
A Distributed Geometric Routing Algorithm for Ad HocWireless Networks. 961-963 - Kang Sun, Xuezeng Pan, Jimin Wang, Lingdi Ping:

PAD: A Design Space Exploration Model For Reconfigurable Systems. 964-965 - Mohsen Beheshti, Richard A. Wasniowski:

Data Fusion Support for Intrusion Detection and Prevention. 966 - F. Sheeja Mary

:
Erratic Cryptosystem for Elevated Message Security. 967-969 - SangKwon Moon, YongJoo Song, Keuntae Park, Daeyeon Park:

Mobility Aware Transmission Power Control in Mobile Ad-hoc Network. 970 - Ji-Seon Lee, Jik Hyun Chang:

Generating a Proxy Signature on a Confidential Message. 971 - Mojtaba Shakeri, Abolfazl Toroghi Haghighat, Mohammad K. Akbari:

Modeling and Evaluating the Scalability of Instruction Fetching in Superscalar Processors. 972 - Leila Beig, Atefeh Ghavamifar:

Proposing a Conceptual Model for Organizational Memory Constructs in Dynamic Virtual Organizations. 973
Embedded Systems and Reconfigurable Architectures
- Rabindra Ku Jena, Gopal Ku Sharma:

A Multi-Objective Evolutionary Algorithm Based Optimization Model for Network-on-Chip Synthesis. 977-982 - Muhammad Z. Hasan, Sotirios G. Ziavras

:
Runtime Partial Reconfiguration for Embedded Vector Processors. 983-988 - Hongyan Yang, Sotirios G. Ziavras

, Jie S. Hu:
FPGA-based Vector Processing for Matrix Operations. 989-994 - Andrew Byrne, Nicolas Méloni, Francis M. Crowe, William P. Marnane

, Arnaud Tisserand, Emanuel M. Popovici:
SPA resistant Elliptic Curve Cryptosystem using Addition Chains. 995-1000 - Griselda Saldaña

, Miguel Arias-Estrada:
Compact FPGA-based systolic array architecture suitable for vision systems. 1008-1013 - Mitchell Loeb, Alan L. Tharp:

Gray Code Chaining: A High Performance Hashing Algorithm for Limited Storage Applications. 1014 - Bijan Ansari, Huapeng Wu:

Efficient Finite Field Processor for GF(2^163) and its VLSI Implementation. 1021-1026 - Muhammad Ali, Michael Welzl

, Sven Hessler:
A Fault tolerant mechanism for handling Permanent and Transient Failures in a Network on Chip. 1027-1032 - Jun Ho Bahn, Seung Eun Lee

, Nader Bagherzadeh
:
On Design and Analysis of a Feasible Network-on-Chip (NoC) Architecture. 1033-1038 - Woojin Park, Inho Kim, Kyungsoo Lim, Sinam Woo, Sunshin An:

Implementation and Performance Analysis of an IPv6 Multicast Forwarder for the IXP2400 Network Processor. 1039-1044 - Mohsen Soryani

, Mohsen Sharifi
, Mohammad Hossein Rezvani
:
Performance Evaluation of Cache Memory Organizations in Embedded Systems. 1045-1050 - Jawed I. A. Siddiqi, Babak Akhgar, Nazaraf Shah

, Fazilatur Rahman, Nahum Korda, Raphael Attias, Maria Teresa Andrade, Yehudit Judy Dori, Boas Hashavia, Norbert Benamou:
A System for Semantically Enhanced, Multifaceted, Collaborative Access: Requirements and Architecture. 1051-1056 - Günter Knittel:

On the Design of a Parallel Link Using Rigid-Flex PCB Technology. 1057-1062 - Chandana Watagodakumbura, Henry Praluyanto:

Composite Burst Assembly and Lower Real-Time Class Utilization Threshold in Optical Burst Switching As Means of Overcoming Effects of Self-Similarity. 1063-1070
Potpourri
- Daniela Ferrero

:
Some properties of superline digraphs. 1073-1076 - Sina Jafarpour, Mohammad Ghodsi, Keyvan Sadri, Zuheir Montazeri:

Computational Power of the Quantum Turing Automata. 1077-1082 - Ron Coleman:

Adaptive Pattern Movement for Mobile Games. 1083-1088 - Samee Ullah Khan

, Munib Ahmed:
A Bottleneck Eliminating Approximate Algorithm for PON Layout. 1089-1094 - Yong Wang, Xiao-chun Yun, Yifei Li:

Analyzing the Characteristics of Gnutella Overlays. 1095-1100 - Mohammad Fathian, Babak Amiri:

Investigation of Effective Factors on e-Readiness of Iranian Manufacturing SMEs. 1101-1106 - Yao-Hsin Chou, I-Ming Tsai, Chin-Shyurng Fahn, Shi-Jinn Horng, Sy-Yen Kuo

:
Dependabilities in a High-performance Quantum Real-time Distributed System. 1107-1112 - Wei-Lun Chang

, Soe-Tsyr Yuan:
Collaborative Pricing for e-Service Bundle Delivery: A Framework. 1113-1118

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














