


default search action
6th ITNG 2009: Las Vegas, Nevada, USA
- Shahram Latifi:

Sixth International Conference on Information Technology: New Generations, ITNG 2009, Las Vegas, Nevada, USA, 27-29 April 2009. IEEE Computer Society 2009, ISBN 978-0-7695-3596-8
Circuit & System Design
- Xiaomin Jin, Simeon Trieu, Fei Wang, Bei Zhang, Tao Dai, Xiangning Kang, Guoyi Zhang:

Design Simulation of Top ITO Gratings to Improve Light Transmission for Gallium Nitride LEDs. 1-4 - Fei Wang, Xiaolong Wu:

Non-volatile Memory Devices Based on Chalcogenide Materials. 5-9 - Masaya Yoshikawa, Hidekazu Terai:

Dedicated Hardware for Ant Colony Optimization Using Distributed Memory. 10-15 - Yu Zhang

, Binxing Fang:
A Novel Approach to Scan Detection on the Backbone. 16-21 - Xing Xie, Mengliang Liu, Leiguang Wang, Qianqin Qin:

A Remote Sensing Image Segmentation Method Based on Spectral and Texture Information Fusion. 22-27 - Liwen Huang, Jing Yang, Xiaolong Wu, Xiaoqian Hu:

A Novel Biological Recognition Method Based on Cranio-maxillo-facial Feature Information. 28-32 - Xuejun Zhao, Ruihu Li

, Yingjie Lei:
Classification of Quaternary [21s + 4, 3] Optimal Self-orthogonal Codes. 33-34 - Faruk Yildiz:

Low Power Ambient Energy Harvesting, Conversion, and Storage Circuits. 35-40 - Shaharuddin Salleh

, Nor Haniza Sarmin:
Dynamic Single-Row Routing Technique for Channel Assignments. 41-46 - Mahmoud Fawzy Wagdy, Brandon Casey Cabrales:

A Novel Flash Fast-Locking Digital Phase-Locked Loop. 47-52 - Jianping Quan, Guoqiang Bai:

A DPA-Resistant Digit-Parallel Modular Multiplier over GF (2m). 53-57 - Jianping Quan, Guoqiang Bai:

A New Method to Reduce the Side-Channel Leakage Caused by Unbalanced Capacitances of Differential Interconnections in Dual-Rail Logic Styles. 58-63 - Shruti Jain

, Pradeep K. Naik, D. S. Chauhan, Rohit Sharma:
Computational Modeling of Cell Survival/Death Using MATLAB Simulator. 64-68 - Pierre Mars, Dave McIntosh:

Using a Supercapacitor to Power Wireless Nodes from a Low Power Source such as a 3V Button Battery. 69-78 - Jing Yang, Yongquan Wang, Min He, Fei Wang, Xiaolong Wu:

A Novel EKF-GPS Algorithm for Bridge Deformation Monitoring System. 79-83 - Chao-Jang Hwang, Chih-Tung Lin, Shi-Jinn Horng:

Implementation of Different Function Units Using Flexible and Reconfigurable Architecture. 84-89 - Fadi El-Hassan

, Raymond Peterkin, Mohamed Abou-Gabal, Dan Ionescu:
A High-Performance Architecture of an XML Processor for SIP-Based Presence. 90-95 - Dawid Zydek, Henry Selvaraj:

Processor Allocation Problem for NoC-Based Chip Multiprocessors. 96-101 - Farhad Babak, Parviz Keshavarzi

:
A Novel DDFS Based on Trigonometric Approximation with a Scaling Block. 102-106
Information Systems & Internet Technology
- Lingfu Xie, Du Xu:

The Two-Level-Turn-Model Fault-Tolerant Routing Scheme in Tori with Convex and Concave Faults. 107-113 - Jae-Yoon Jung:

Generating Rule-Based Executable Process Models for Service Outsourcing. 114-118 - Glaucia Braga e Silva, Breno Lisi Romano, Henrique Fernandes de Campos, Ricardo Godoi Vieira, Adilson Marques da Cunha, Luiz Alberto Vieira Dias:

Integrating Amazonic Heterogeneous Hydrometeorological Databases. 119-124 - Ben W. Y. Kam, Thomas R. Dean:

Lessons Learned from a Survey of Web Applications Testing. 125-130 - Daniel Riesco, German Montejano, Narayan C. Debnath, Manuel Pérez Cota:

Formalizing the Management Automation with Workflow of Software Development Process Based on the SPEM Activities View. 131-136 - Robert Uzal, Narayan C. Debnath, Daniel Riesco, German Montejano:

Software Projects Finance Support: Preliminary Talks between Software Project Managers and Potential Investors. 137-142 - Fabio Augusto de Santana Silva, Maria del Rosario Girardi, Lucas Rêgo Drumond:

An Information Retrieval Model for the Semantic Web. 143-148 - G. Praveen Kumar, Anirban Sarkar, Narayan C. Debnath:

A New Algorithm for Frequent Itemset Generation in Non-Binary Search Space. 149-153 - Ian Stewart, Wenying Feng, Selim G. Akl:

A Further Improvement on a Genetic Algorithm. 154-159 - Jöran Beel

, Bela Gipp
:
Google Scholar's Ranking Algorithm: The Impact of Articles' Age (An Empirical Study). 160-164 - Mehdi Fasanghari

, Maryam MohamedPour, Mohammad Amin Mohamedpour:
A Novel Method Combining ORESTE, Fuzzy Set Theory, and TOPSIS Method for Ranking the Information and Communication Technology Research Centers of Iran. 165-170 - Sadeta Krijestorac, Jonathan Bagby:

Comparison of QOS Fixed and Limited Interleaved Polling with Cyclic Demand Proportionality Algorithms. 171-176
AI Applications
- Daniel Vladusic, Ales Cernivec, Bostjan Slivnik:

Improving Job Scheduling in GRID Environments with Use of Simple Machine Learning Methods. 177-182 - Cenk Çelik, Inci Sariçiçek

:
Tabu Search for Parallel Machine Scheduling with Job Splitting. 183-188 - Kota Tsubouchi

, Kazuo Hiekata
, Hiroyuki Yamato:
Scheduling Algorithm for On-Demand Bus System. 189-194
Software Engineering
- (Withdrawn) The Explore of the Law Role in Software Requirements Engineering. 195-198

- Cagatay Catal

, Ugur Sevim, Banu Diri:
Clustering and Metrics Thresholds Based Software Fault Prediction of Unlabeled Program Modules. 199-204 - Suzanna Schmeelk, Bill Mills, Robert E. Noonan:

Managing Post-Development Fault Removal. 205-210 - Boleslaw Mikolajczak, Abhishek Singh:

TransCPN - Software Tool for Transformation of Colored Petri Nets. 211-216 - Hakun Lee, Keiichi Kaneko

:
Two New Algorithms for Software Watermarking by Register Allocation and their Empirical Evaluation. 217-222 - Yoonsik Cheon, Carmen Avila, Steve Roach, Cuauhtemoc Munoz, Neith Estrada, Valeria Fierro, Jessica Romo:

An Aspect-Based Approach to Checking Design Constraints at Run-Time. 223-228 - John Huan Vu, Niklas Frojd, Clay Shenkel-Therolf, David S. Janzen:

Evaluating Test-Driven Development in an Industry-Sponsored Capstone Project. 229-234 - Brunil Dalila Romero Marino, Hisham M. Haddad:

Security Vulnerabilities and Mitigation Strategies for Application Development. 235-240 - Ziad Al-Sharif

, Clinton L. Jeffery:
An Agent-Oriented Source-Level Debugger on Top of a Monitoring Framework. 241-247 - Jianchao Han, Mohsen Beheshti, Kazimierz Kowalski, Joel Ortiz, Johnly Tomelden:

Component-Based Software Architecture Design for Network Intrusion Detection and Prevention System. 248-253 - Shalini Chandra

, Raees Ahmad Khan, Alka Agrawal:
Security Estimation Framework: Design Phase Perspective. 254-259 - Christopher M. Kanode, Hisham M. Haddad:

Software Engineering Challenges in Game Development. 260-265 - Pavle Guduric, Arno Puder, Rainer Todtenhoefer:

A Comparison between Relational and Operational QVT Mappings. 266-271 - Travis D. Breaux

, Calvin Powers:
Early Studies in Acquiring Evidentiary, Reusable Business Process Models for Legal Compliance. 272-277 - Mohammad Hamdaqa

, Abdelwahab Hamou-Lhadj
:
Citation Analysis: An Approach for Facilitating the Understanding and the Analysis of Regulatory Compliance Documents. 278-283 - Philippe Dugerdil, David Kony, Javier Belmonte:

An Eclipse Plugin for the Automated Reverse-Engineering of Software Programs. 284-289
Service-Oriented Computing & Applications
- Sedighe Moosavi, Mir Ali Seyyedi, Nasrollah Moghadam

:
A Method for Service Oriented Design. 290-295 - Sattanathan Subramanian:

Highly-Available Web Service Community. 296-301 - Luiz Olavo Bonino da Silva Santos

, Eduardo Goncalves da Silva, Luís Ferreira Pires
, Marten van Sinderen
:
Towards a Goal-Based Service Framework for Dynamic Service Discovery and Composition. 302-307 - Maqbool Hussain, Muhammad Afzal

, Hafiz Farooq Ahmad
, Naeem Khalid
, Arshad Ali
:
Healthcare Applications Interoperability through Implementation of HL7 Web Service Basic Profile. 308-313 - Shari S. C. Shang, Ya-Ling Wu, Oliver C. L. Hou:

An Analysis of Business Models of Web 2.0 Application. 314-319 - Chia-Hui Wei, Yeo-Hao Chin, Chun-Ta Li

:
A Secure Billing Protocol for Grid Computing. 320-325 - Wei-Lun Chang

, Yi-Ping Lo, Yu-Ting Hong:
A Heuristic Model of Network-Based Group Decision Making for E-Services. 326-331 - Odorico von Susani, Philippe Dugerdil:

Cross-Organizational Service Evolution Management. 332-337 - Fernando J. Maymi, Manuel Rodríguez-Martínez:

Obstacle Avoidance for Utility-Based Geocasting. 338-343
Information Security & Privacy
- Patrick Henry Engebretson, Joshua J. Pauli:

Leveraging Parent Mitigations and Threats for CAPEC-Driven Hierarchies. 344-349 - Bin Sun, Wang Chuan, Jiang Li, Legand L. Burge III:

A Multi-Signature Scheme Based on Two Difficult Mathematics Problems. 350-355 - Yuriy I. Izbenko, Vladyslav Kovtun

, Alexandr Kuznetsov
:
The Design of Boolean Functions by Modified Hill Climbing Method. 356-361 - Qiaoliang Li, Xiaoming Wang, Yingshu Li

, Yi Pan, Pingzhi Fan:
Construction of Anti-Collusion Codes Based on Cover-Free Families. 362-365 - Yiqun Xiong, Rangding Wang:

A Robust Audio Aggregate Zero-Watermark Algorithm. 366-370 - Huo-Chong Ling

, Swee-Huay Heng, Bok-Min Goi
:
Attacks on a Block Based SVD Watermarking Scheme. 371-375 - Se-Min Kim

, Zi-Qiang Cheng, Kee-Young Yoo:
A New Steganography Scheme Based on an Index-Color Image. 376-381 - Myong H. Kang, Amitabh Khashnobish:

A Peer-to-Peer Federated Authentication System. 382-387 - Jianqi Zhu, Yanheng Liu, Ke Yin, KeXin Yin:

A Novel Method-Based Software Watermarking Scheme. 388-392 - Andreas Ekelhart

, Thomas Neubauer, Stefan Fenz:
Automated Risk and Utility Management. 393-398 - Madasu Hanmandlu, H. M. Gupta, Neha Mittal

, Shantaram Vasikarla:
An Authentication System Based on Palmprint. 399-404 - Abdullah M. Alnajim, Malcolm Munro:

An Anti-Phishing Approach that Uses Training Intervention for Phishing Websites Detection. 405-410 - Sergio Castillo-Perez, Joaquín García-Alfaro

:
Evaluation of Two Privacy-Preserving Protocols for the DNS. 411-416 - Raylin Tso, Takeshi Okamoto, Eiji Okamoto:

Efficient Short Signatures from Pairing. 417-422 - Ping Yi, Tianhao Tong, Ning Liu, Yue Wu, Jianqing Ma:

Security in Wireless Mesh Networks: Challenges and Solutions. 423-428 - Manabu Hirano, Tomohiro Umeda, Takeshi Okuda, Eiji Kawai, Suguru Yamaguchi:

T-PIM: Trusted Password Input Method against Data Stealing Malware. 429-434 - Ryu Watanabe, Toshiaki Tanaka:

Federated Authentication Mechanism using Cellular Phone - Collaboration with OpenID. 435-442 - Hua Jiang, Xinxing Tan:

Bisimulations in the Boxed Safe Ambients with Password. 443-448 - Chun-Ta Li

, Min-Shiang Hwang, Yan-Chi Lai:
A Verifiable Electronic Voting Scheme over the Internet. 449-454 - Guido Marco Bertoni

, Luca Breveglieri
, Alessandro Cominola, Filippo Melzani
, Ruggero Susella:
Practical Power Analysis Attacks to RSA on a Large IP Portfolio SoC. 455-460 - Hongwei Tian, Weining Zhang:

Extending l-Diversity for Better Data Anonymization. 461-466 - Joel Ortiz, Johnly Tomelden, Mohsen Beheshti, Kazimierz Kowalski, Jianchao Han:

Component Based Information Network for Computer Security. 467-469 - Ch. Rupa

, P. S. Avadhani:
Message Encryption Scheme Using Cheating Text. 470-474 - Wei Jiang, Binxing Fang, Hongli Zhang, Zhihong Tian, Xin-fang Song:

Optimal Network Security Strengthening Using Attack-Defense Game Model. 475-480 - Hu Zhang, Shan-de Wei, Hongye Tan, Jia-heng Zheng:

Deception Detection Based on SVM for Chinese Text in CMC. 481-486 - Chandan Koner

, C. T. Bhunia, Ujjwal Maulik
:
An Efficient and Reliable Time Variant Three-Entity and Data Authentication of Remote User Using Smart card. 487-491 - Abdul Razzaq, Ali Hur, Nasir Haider, Hafiz Farooq Ahmad:

Multi-Layered Defense against Web Application Attacks. 492-497 - Sang-Ho Shin, Kee-Young Yoo:

An Efficient PRNG Based on the Hybrid between One- and Two-Dimensional Cellular Automata. 498-503 - Dongwan Shin

, Rodrigo Lopes, William R. Claycomb:
Authenticated Dictionary-Based Attribute Sharing in Federated Identity Management. 504-509
Networking & Wireless Communications
- Yenumula B. Reddy, Clifton Bullmaster:

Application of Game Theory for Cross-layer Design in Cognitive Wireless Networks. 510-515 - Beatriz Lorenzo

, Savo Glisic:
Reconfigurable Relaying Topology in Cognitive Multihop Wireless Networks with Nonuniform Temporal and Spatial Traffic Distribution. 516-523 - Fangyang Shen, Chunlei Liu, Jun Zhang:

A Distributed Coverage-Aware Sleep Scheduling Algorithm for Wireless Sensor Networks. 524-527 - (Withdrawn) Radiation Emission EMC Measurement in Real-Time. 528-533

- Shinhan Wee, Montserrat Ros

, Peter James Vial:
Mitagation against MAI in a Space Time Spreading Software Defined Radio Test Bed. 534-540 - Ning Liu, Jianhua Li, Ping Yi, Jianing Li, Yue Wu:

Outage Behavior of Multi-Antenna Multi-Relay Non-Regenerative Cooperative Networks. 541-545 - Wei Feng, Hamada Alshaer, Jaafar M. H. Elmirghani

:
Evaluation of Energy Consumption and Network Lifetime in Rectangular Ad-hoc Wireless Networks. 546-551 - Nikema Smith, Yenumula B. Reddy

, Nandigam Gajendar:
Cross-Layer Design Approach for Wireless Networks to Improve the Performance. 552-557 - Mostafa M. El-Said, Ira Woodring:

An Empirical Study for Protecting Passive RFID Systems against Cloning. 558-563 - Lun-Min Shih, Jimmy J. M. Tan:

Fault-Tolerant Maximal Local-Connectivity on the Bubble-Sort Graphs. 564-569 - Devishree Naidu

, Rakhi Tapadiya:
Implementation of Header Compression in 3GPP LTE. 570-574
Sensor Networks
- Eduardo Cañete

, Jaime Chen, Manuel Díaz
, Luis Llopis
, Bartolomé Rubio
:
A Service-Oriented Middleware for Wireless Sensor and Actor Networks. 575-580 - Mahmood R. Minhas, Sathish Gopalakrishnan, Victor C. M. Leung

:
An Online Multipath Routing Algorithm for Maximizing Lifetime in Wireless Sensor Networks. 581-586 - Masato Kamio, Keiichi Nakamura, Shinsuke Kobayashi, Noboru Koshizuka, Ken Sakamura:

Micro T-Kernel: A Low Power and Small Footprint RTOS for Networked Tiny Devices. 587-594 - Kohei Arai:

Estimation Method for Total Nitrogen and Fiber Contents in Tealeaves as well as Grow Index of Tealeaves and Tea Estate Monitoring with Network Cameras. 595-600 - Shafique Ahmad Chaudhry, Cormac J. Sreenan:

Supporting Stateless Address Autoconfiguration in IP-Based Wireless Sensor Networks. 601-606 - P. Papantoni-Kazakos, Anthony Burrell:

Performance Monitoring in Sensor Networks. 607-612 - Sattanathan Subramanian, Djamel Djenouri

, Guttorm Sindre
, Ilangko Balasingham:
CoP4V : Context-Based Protocol for Vehicle's Safety in Highways Using Wireless Sensor Networks. 613-618 - Amina Chaabane, Mohamed Jmaiel:

A Secure Content-Based Publish/Subscribe Middleware. 619-622
Mobile Computing & Networking
- Yong Shou Wu, Do Hyeon Lee, Jae-Il Jung:

Derivation and Analysis of Link/Route Maintenance Probability In Multi Hop Mobile Ad Hoc Networks. 623-627 - Sung-Hoon Park, Tae-Gyu Lee, Hyung-Seok Seo, Seok-Jin Kwon, Jong-Ho Han:

An Election Protocol in Mobile Ad Hoc Distributed Systems. 628-633 - Marjan Sterk, Mariano Agustin Cecowski Palacio:

Virtual Globe on the Android - Remote vs. Local Rendering. 634-639 - R. Gunasekaran, V. Rhymend Uthariaraj:

Prevention of Denial of Service Attacks and Performance Enhancement in Mobile Ad hoc Networks. 640-645 - Osamah S. Badarneh, Michel Kadoch

, Ahmed K. Elhakeem:
Supporting Video Multicast in Wireless Ad Hoc Networks Using Multiple Paths and Multiple Description Coding. 646-651 - Thi Vu Phu, Vu Anh Huynh, Timo Rolf Bretscheider:

Towards an In-Flight Infrared Peer-to-Peer Media Streaming Network. 652-656 - Yi Qi Gui, Gi Taek Kim, Hwang Kyu Choi:

Time-Based Cache Management for Video-on-Demand in P2P Environment. 657-662 - Markus Esch, Jean Botev

, Hermann Schloss, Ingo Scholtes
:
Performance Evaluation of GP3 - A Grid-Based Spatial Index Infrastructure. 663-670
Software Engineering Education
- Susan Loveland:

Using Open Source Tools to Prevent Write-Only Code. 671-677 - Andrew Mile Connor, Jim Buchan

, Krassie Petrova:
Bridging the Research-Practice Gap in Requirements Engineering through Effective Teaching and Peer Learning. 678-683 - Adam Dukovich, David S. Janzen:

Design Patterns Go to Hollywood: Teaching Patterns with Multimedia. 684-689 - Jeff Pittges, Joe D. Chase, Tracy L. Lewis:

Supporting Live Student Projects: Lessons Learned from the Small Project Support Center at Radford University. 696-701 - Yanxia Jia, Yonglei Tao:

Teaching Software Design Using a Case Study on Model Transformation. 702-706 - Gregory W. Hislop, Heidi J. C. Ellis:

Using Scaffolding to Improve Written Communication of Software Engineering Students. 707-712 - Jagadeesh Nandigam, Venkat N. Gudivada, Abdelwahab Hamou-Lhadj

, Yonglei Tao:
Interface-Based Object-Oriented Design with Mock Objects. 713-718 - Abdelwahab Hamou-Lhadj

, Abdelouahed Gherbi
, Jagadeesh Nandigam:
The Impact of the Model-Driven Approach to Software Engineering on Software Engineering Education. 719-724 - Venkat N. Gudivada, Jagadeesh Nandigam:

Corporate Compliance and its Implications to IT Professionals. 725-729 - B. M. Monjurul Alom, Frans A. Henskens

, Michael Richard Hannaford:
Deadlock Detection Views of Distributed Database. 730-737
Software Testing
- James D. McCaffrey:

Using the Multi-Attribute Global Inference of Quality (MAGIQ) Technique for Software Testing. 738-742 - Gary Fix:

The Design of an Automated Unit Test Code Generation System. 743-747 - Craig Merchant, Manuel Tellez, Jagannathan Venkatesan:

A Browser Agnostic Web Application UI Test Framework: Motivation, Architecture, and Design. 748-751 - Neill Thompson, Heather Munion, Dan Wenzel, Ric Ellsworth:

The Creation of a Software Testing Meta Framework; The Test Object Model. 752-757 - Soonho Kong, Nikolai Tillmann, Jonathan de Halleux:

Automated Testing of Environment-Dependent Programs - A Case Study of Modeling the File System for Pex. 758-762 - E. S. F. Najumudheen, Rajib Mall, Debasis Samanta:

A Dependence Graph-Based Test Coverage Analysis Technique for Object-Oriented Programs. 763-768 - Ed Triou, Zafar Abbas, Sravani Kothapalle:

Declarative Testing: A Paradigm for Testing Software Applications. 769-773 - David Harding:

The Architecture, Design, and Operation of a Virtual Network Hardware Emulation (VNHE) System. 774-778 - Adrian Bonar:

The Design of a System for Testing Database-Centric Software Applications Using Database Surrogates. 779-783 - Eun Ha Kim, Jong Chae Na, Seok Moon Ryoo:

Test Automation Framework for Implementing Continuous Integration. 784-789 - Kaarthik Sivashanmugam, Senthil Palanisamy:

Testing SQL Server Integration Services Runtime Engine Using Model and Mock Objects. 790-795 - Min Li, Jason Wang, Lamar Damata:

TAO Project: An Intuitive Application UI Test Toolset. 796-800 - Bruce Benton:

Model-Based Time and Cost Estimation in a Software Testing Environment. 801-806 - Zaid Altahat, Tzilla Elrad:

Detection and Verification of Semantic Interaction In AOSD. 807-812 - Haitham S. Hamza

:
A Framework for Identifying Reusable Software Components Using Formal Concept Analysis. 813-818 - Haitham S. Hamza

, Dina Darwish:
On the Discovery of Candidate Aspects in Software Requirements. 819-824 - Srinivasan Subha

:
A Modified Linear Scan Register Allocation Algorithm. 825-827 - Samer Nofal:

A O(log n) Signature-Based String Matching Algorithm. 828-830
High Performance Computing Architectures
- Yiyu Tan, Chihang Yau, Anthony S. Fong:

A Object Model for Java and Its Architectural Support. 831-836 - Makoto Ozone, Tatsuo Hiramatsu, Katsunori Hirase, Kazuhisa Iizuka:

Reconfigurable Processor LSI Based on ALU Array with Limitations of Connections of ALUs for Software Radio. 837-842 - Fangyang Shen, Xiao Qin

, Andrés O. Salazar
, Adam Manzanares, Kiranmai Bellam:
An Energy-Efficient Reliability Model for Parallel Disk Systems. 843-848 - Yoon Seok Yang, Jun Ho Bahn, Seung Eun Lee

, Nader Bagherzadeh
:
Parallel and Pipeline Processing for Block Cipher Algorithms on a Network-on-Chip. 849-854 - Ling Wang, Jianye Hao, Feixuan Wang:

Bus-Based and NoC Infrastructure Performance Emulation and Comparison. 855-858 - Peng Liu, Chunchang Xiang, Xiaohang Wang, Bingjie Xia, Yangfan Liu, Weidong Wang, Qingdong Yao:

A NoC Emulation/Verification Framework. 859-864 - Akira Hatanaka, Nader Bagherzadeh

:
Scheduling Techniques for Multi-Core Architectures. 865-870 - Ashwini Raina, Venkatesan Muthukumar:

Fuse-N: Framework for Unified Simulation Environment for Network-on-Chip. 871-876 - Ashwini Raina, Venkatesan Muthukumar:

Traffic Aware Scheduling Algorithm for Network on Chip. 877-882 - Jacques H. van Wyk

, Louis P. Linde:
Design of a CC-MC-CDMA System for Gigabit DSL (GDSL). 883-888 - Srinivasan Subha

:
An Algorithm for Buffer Cache Management. 889-893
E-Commerce
- Benjamin J. Ford, Haiping Xu, Christopher K. Bates, Sol M. Shatz:

Model-Based Specification of Flexible and Complex Bidding Strategies in Agent-Based Online Auctions. 894-900 - Jarrod Trevathan

, Alan McCabe, Wayne Read:
Online Payments Using Handwritten Signature Verification. 901-907 - Fei Dong, Sol M. Shatz, Haiping Xu:

Inference of Online Auction Shills Using Dempster-Shafer Theory. 908-914 - Ripan Shah, Jarrod Trevathan

, Wayne Read, Hossein Ghodosi:
A Proactive Approach to Preventing Phishing Attacks Using Pshark. 915-921 - Rodel Balingit

, Jarrod Trevathan
, Yong Jin Lee, Wayne Read:
A Software Tool for Collecting Data from Online Auctions. 922-927 - Rodel Balingit

, Jarrod Trevathan
, Wayne Read:
Analysing Bidding Trends in Online Auctions. 928-933 - Shwu-Min Horng

:
The Behavior and Preferences of Users on Web 2.0 Social Network Sites: An Empirical Study. 934-939 - Kevin Gary, Harry Koehnemann, John Blakley, Cheryl Goar, Holly Mann, Al Kagan:

A Case Study: Open Source Community and the Commercial Enterprise. 940-945 - Wang Bao, Zhang Ming Li, Jia Wei:

Research on Components and Measurement of Customer Value in Business to Customer Market. 946-951
Computer Information Technology Education
- Jameela Al-Jaroodi, Nader Mohamed:

A Flexible Notification System for Stocks Investors. 952-957 - Ya-Yueh Shih, Siao-Sian Huang:

Exploring the Critical Success Factors of Mobile Commerce via Qualitative Method- in Case of Insurance Industry. 958-962 - Herbert Schanker, Deborah Sturm, Sarah Zelikovitz:

The Science of Computing: Concepts and Current Technologies. 963-968 - Lu Yan:

Teaching Object-Oriented Programming with Games. 969-974 - Prem Uppulur, Maung Htay:

Experiences Using New Technologies in a Computer Organization Course. 975-980 - Jeff Pittges, Robert H. Phillips, Premchand Uppuluri:

Learning Outcomes for an Introductory Database Project. 981-986 - Nader Mohamed, Jameela Al-Jaroodi, Imad Jawhar:

Internet Information Retrieval for Enabling Student Projects. 987-992 - Elham Ziaei Pour, Alireza Taghizadeh, Farzad Bazazan, Farid Khoshalhan, Ayoub Mohammadian:

A Model for National E-readiness Assessment Based on System Approach. 993-998 - Hamid Mahmoodi

, Ali A. Jalali:
Virtual Age: Enabling Technologies and Trends. 999-1004
Middleware
- Christophe Huygens

, Wouter Joosen:
Federated and Shared Use of Sensor Networks through Security Middleware. 1005-1011 - Ralf Wagner, Bernhard Mitschang:

Uniform and Efficient Data Provisioning for SOA-Based Information Systems. 1012-1017 - Johnson Iyilade, Klaas Kabini, Matthew O. Adigun

:
MINDS: A Middleware Infrastructure for Distributed Services Provisioning. 1018-1023 - Yuri Morais Bezerra, Thaís Alves Burity Pereira, Glêdson Elias da Silveira:

A Systematic Review of Software Product Lines Applied to Mobile Middleware. 1024-1029 - Rajesh Ingle

, G. Sivakumar:
TGKAM: Adaptive Middleware Architecture for Secure Group Communication. 1030-1035 - Stephan Sommer, Christian Buckl

, Alois C. Knoll
:
Developing Service Oriented Sensor/Actuator Networks Using a Tailored Middleware. 1036-1041 - Libe Valentine Massawe

, Farhad Aghdasi, Johnson Kinyua
:
The Development of a Multi-Agent Based Middleware for RFID Asset Management System Using the PASSI Methodology. 1042-1048 - Alin Florindor Murarasu, Thomas Magedanz:

Mobile Middleware Solution for Automatic Reconfiguration of Applications. 1049-1055
Data Mining
- Mark S. Smith, Ray R. Hashemi, Leslie Sears:

Classification of Movies and Television Shows Using Motion. 1056-1060 - Cheng Hao Jin, Yongmi Lee, Gyoyong Sohn, Hi-Seok Kim, Keun Ho Ryu:

Design of Context Analysis System on USN Environment. 1061-1066 - Umer Rashid

, Iftikhar Azim Niaz, Muhammad Afzal Bhatti:
M3L: Architecture for Multimedia Information Retrieval. 1067-1072 - Kazem Taghva

, Kirankumar Jayakumar:
XML Based Implementation of a Bibliographic Database and Recursive Queries. 1073-1078 - Jawed I. A. Siddiqi, Babak Akhgar, Fazilatur Rahman, Sally Atkinson, Alberto Savoldelli, Stefano Arici, Paolo Bertele, Brian James, Mike Pinkerton:

Towards an Integrated Platform for Improving Hospital Risk Management. 1079-1084 - Hassan Reza, Emanuel S. Grant:

Toward Extending AADL-OSATE Toolset with Color Petri Nets (CPNs). 1085-1088 - Hassan Reza, Malvika Pimple, Varun Krishna, Jared Hildle:

A Safety Analysis Method Using Fault Tree Analysis and Petri Nets. 1089-1094
E-Learning
- Alan Clinton Shaw:

Extending the Pair Programming Pedagogy to Support Remote Collaborations in CS Education. 1095-1099 - Xinyu Zhang, Nianlong Luo, Cheng Sun:

The Knowledge Building of the Eco-Classroom. 1100-1103 - Huang Lanying, Hu Zhongya, Cheng Sun:

The Case Study Activities in a Web-Based Environment. 1104-1107 - Iván Martínez-Ortiz, José Luis Sierra, Baltasar Fernández-Manjón

:
Translating e-learning Flow-Oriented Activity Sequencing Descriptions into Rule-Based Designs. 1108-1113 - Kenneth E. Hoganson:

Distance-Learning and Converging Mobile Devices. 1114-1119 - Li-chu Sung:

Online Professional Development for K-12 Inservice Teachers from the Views of Online Learning Forum (OLF) Designers. 1120-1127 - Ahmad A. Kardan, Fakhroddin Noorbehbahani:

Using Learners' Annotations to Produce Feedbacks for Selecting and Editing Learning Contents in e-Learning Systems. 1128-1133 - Samad Kardan, Ahmad Kardan:

Towards a More Accurate Knowledge Level Estimation. 1134-1139 - Ahmad Kardan, Shima Zahmatkesh:

A Proposesd Ontology for Effective Searching of Sharable Content Objects Emphasizing on Learning Objectives. 1140-1145
Mobility & Resource Management
- Xin Wu, Arunita Jaekel, Ataul Bari, Alioune Ngom:

Optimized Hybrid Resource Allocation in Wireless Cellular Networks with and without Channel Reassignment. 1146-1151 - Jun Zheng

, Mengyu Qiao, Emma E. Regentova:
Multi-slot Channel Allocation for Priority Packet Transmission in the GPRS Network. 1152-1157 - Dongho Lim, Kwonhue Choi, Huaping Liu

:
Optimum Power Allocation for Distributed Antenna Systems with Large-scale Fading-only Feedback. 1158-1164 - Weiping He, Ing-Ray Chen:

DMAP-FR: Integrated Mobility and Service Management with Failure Recovery Support for Mobile IPv6 Systems. 1165-1170 - Vicente Casares Giner

, Pablo García-Escalle:
A Lookahead Strategy for Movement-Based Location Update in Wireless Cellular Networks. 1171-1177 - Minakshmi Roy, H. S. Jamadagni:

Performance Analysis of MQAM-OFDM Based WLAN in Presence of Zigbee Interference in AWGN and Rayleigh Fading Channel. 1178-1183 - Kandaraj Piamrat

, César Viho, Jean-Marie Bonnin, Adlen Ksentini:
Quality of Experience Measurements for Video Streaming over Wireless Networks. 1184-1189 - Kari Aho, Ilmari Repo, Timo Nihtilä, Tapani Ristaniemi:

Analysis of VoIP over HSDPA Performance with Discontinuous Reception Cycles. 1190-1194 - Jani Puttonen, Niko Kolehmainen, Tero Henttonen, Jorma Kaikkonen:

On Idle Mode Mobility State Detection in Evolved UTRAN. 1195-1200
Ambient-Assisted Living for Elderly People
- Hong Sun

, Vincenzo De Florio
, Ning Gui, Chris Blondia:
Promises and Challenges of Ambient Assisted Living Systems. 1201-1207 - Barbara Franz, Markus Lehner, Herwig Mayr, Margit Mayr:

e-Care . 1208-1213 - Werner Kurschl, Stefan Mitsch

, Johannes Schönböck:
Modeling Situation-Aware Ambient Assisted Living Systems for Eldercare. 1214-1219 - Suzanne Kieffer

, Jean-Yves Lionel Lawson, Benoît Macq:
User-Centered Design and Fast Prototyping of an Ambient Assisted Living System for Elderly People. 1220-1225 - Anh Dinh, Daniel Teng, Li Chen, Yang Shi, Carl McCrosky, Jenny Basran, Vanina Del Bello-Hass:

Implementation of a Physical Activity Monitoring System for the Elderly People with Built-in Vital Sign and Fall Detection. 1226-1231 - Juan-Pablo García-Vázquez

, Marcela D. Rodríguez
, Ángel G. Andrade
, Diana Saldaña-Jimenez, Fabian Mercado, Emanuelle Ruelas:
Ambient Information Systems for Supporting Ageing in Place. 1232-1237
Signal Processing Applications
- Xudong Ma:

Novel Blind Signal Classification Method Based on Data Compression. 1238-1243 - K. Raja Rajeswari, K. Murali Krishna, V. Jagan Naveen, A. Vamsidhar:

Performance Comparison of Wiener Filter and CLS Filter on 2D Signals. 1244-1249 - Paraskevi S. Lampropoulou, Dionisios N. Sotiropoulos, Aristomenis S. Lampropoulos

, George A. Tsihrintzis:
A Back End System for Digital Image Library Organization Based on Concept Learning. 1250-1255 - Djamel Addou, Sid-Ahmed Selouani, Malika Boudraa, Bachir Boudraa

:
Feature Combination Using Multiple Spectral Cues for Robust Speech Recognition in Mobile Communications. 1256-1261 - Buket D. Barkana:

Detection of the Parameters of Hypernasality. 1262-1264 - Jidong Yang, Buket D. Barkana:

The Acoustic Properties of Different Noise Sources. 1265-1268 - Babak Abbasi Bastami, Ebrahim Saberinia:

Optimal Transmission Time of Secondary User in an Overlay Cognitive Radio System. 1269-1274
New Trends in Image Processing
- Manbae Kim:

Post-processing of Multiview Images: Depth Scaling. 1275-1279 - Hau T. Ngo, Vijayan K. Asari:

Design of a Logarithmic Domain 2-D Convolver for Low Power Video Processing Applications. 1280-1285 - Shuangteng Zhang:

Side-Match Vector Quantizers Using Neural Network Based Variance Predictor for Image Coding. 1286-1289 - K. B. Jayanthi

, R. S. D. Wahida Banu:
Carotid Artery Boundary Extraction Using Segmentation Techniques: A Comparative Study. 1290-1295 - Mohammad Eyadat, Hedley Morris, Imad Muhi El-Ddin:

Barcode Watermarking. 1296-1300 - Madasu Hanmandlu, Om Prakash Verma, Pankaj Gangwar, Shantaram Vasikarla:

Fuzzy Edge and Corner Detector for Color Images. 1301-1306 - Nishchal K. Verma, Payal Gupta, Pooja Agrawal

, Madasu Hanmandlu, Shantaram Vasikarla, Yan Cui
:
Medical Image Segmentation Using Improved Mountain Clustering Approach. 1307-1312 - Guo-An Jian, Ting-Yu Huang, Jui-Chin Chu, Jiun-In Guo:

Optimization of VC-1/H.264/AVS Video Decoders on Embedded Processors. 1313-1318 - Mahdi Jampour

, Maryam Ashourzadeh, Mahdi Yaghobi, Issa Rashidfarokhi:
Compressing Images Using Fractal Characteristics by Estimating the Nearest Neighbor. 1319-1322
Web Technologies
- Rishav Chakravarti

, Xiannong Meng:
A Study of Color Histogram Based Image Retrieval. 1323-1328 - Dilip Kumar Limbu, Andrew M. Connor, Russel Pears, Stephen G. MacDonell:

Improving Web Search Using Contextual Retrieval. 1329-1334 - Daniel Beatty, Noé Lopez-Benitez:

Image Query Service Using Content Management Techniques. 1335-1340 - Chen-Ya Wang, Seng-cho Timothy Chou, Hsia-Ching Chang

:
Emotion and Motivation: Understanding User Behavior of Web 2.0 Application. 1341-1346 - Subhash Uppalapati, John Femiani, Anshuman Razdan, Kevin Gary:

3D VQI: 3D Visual Query Interface. 1347-1354 - Thi Nhu Quynh Kim, Khasfariyati Razikin, Dion Hoe-Lian Goh, Yin Leng Theng

, Quang Minh Nguyen, Ee-Peng Lim
, Aixin Sun
, Chew-Hung Chang
, Kalyani Chatterjea:
Exploring Hierarchically Organized Georeferenced Multimedia Annotations in the MobiTOP System. 1355-1360 - Sayed Nasir Khalifehsoltani, Ali Vahdani, Reza Moallemi:

Anatomy of a News Archive and Search Engine (Optimized for Persian Web). 1361-1366 - Isak Taksa, Jaime Muro Flomenbaum:

An Integrated Framework for Research on Cross-Cultural Information Retrieval. 1367-1372 - Madjid Khalilian

, Hassan Abolhassani
, Ali Alijamaat, Farsad Zamani Boroujeni:
PCI: Plants Classification & Identification Classification of Web Pages for Constructing Plants Web Directory. 1373-1377
Agile Methods, Tools & Best Practices
- Le-Ngoc Son, Bao Nguyen Le

:
Fixed Broadband Wireless Access for Wide Area Coverage and Last Mile Solutions. 1378-1383 - Mohammed Al-Maharmeh, Bhuvan Unhelkar:

Applying a Composite Process Framework (CPF) in Real Life Software Development Project. 1384-1389 - Mehdi Kessis, Claudia Roncancio

, Alexandre Lefebvre:
DASIMA: A Flexible Management Middleware in Multi-Scale Contexts. 1390-1396 - Claudio Gonçalves Bernardo, Denis Ávila Montini, Danilo Douradinho Fernandes

, Daniela America da Silva
, Luiz Alberto Vieira Dias, Adilson Marques da Cunha
:
Using GQM for Testing Design Patterns in Real-Time and Embedded Systems on a Software Production Line. 1397-1404 - Sara Shahzad:

Learning from Experience: The Analysis of an Extreme Programming Process. 1405-1410 - Junjin Mei:

An Approach for SQL Injection Vulnerability Detection. 1411-1414 - Jayakanth Srinivasan, Kristina Lundqvist:

Using Agile Methods in Software Product Development: A Case Study. 1415-1420
Domain and Product Line Engineering
- Gabriel de Souza Pereira Moreira, Denis Ávila Montini, Daniela America da Silva

, Felipe Rafael Motta Cardoso, Luiz Alberto Vieira Dias, Adilson Marques da Cunha:
Design Patterns Reuse for Real Time Embedded Software Development. 1421-1427 - Gabriel de Souza Pereira Moreira, Denis Ávila Montini, Danilo Douradinho Fernandes

, Felipe Rafael Motta Cardoso, Luiz Alberto Vieira Dias, Adilson Marques da Cunha:
Final Inspection for Design Pattern Homologation Using a Real Time Embedded Software in a Production Line. 1428-1435 - Denis Ávila Montini, Felipe Rafael Motta Cardoso, Francisco Supino Marcondes

, Paulo Marcelo Tasinaffo
, Luiz Alberto Vieira Dias, Adilson Marques da Cunha
:
Using GQM Hypothesis Restriction to Infer Bayesian Network Testing. 1436-1441 - Jialiang Wang, Hai Zhao, Peng Li, Zheng Liu, Jie Zhao, Wei Gao:

The Mechanism and Performance Comparison of Two Wireless Sensor Network Operating System Kernels. 1442-1446 - Francisco Supino Marcondes

, Danilo Douradinho Fernandes
, Denis Ávila Montini, Paulo Marcelo Tasinaffo
, Ítalo Santiago Vega, Luiz Alberto Vieira Dias:
Systematic and Formal Approach to get a Domain Specific Language. 1447-1450 - Joao Augusto de Pessoa, Luiz Alberto Vieira Dias, Adilson Marques da Cunha

:
A Desktop Environment for River Hazards Monitoring. 1451-1455
E-Health, E-Government, E-Services
- Berdakh Abibullaev

, Hee Don Seo:
Epileptic Seizures Detection Using Continuous Time Wavelet Based Artificial Neural Networks. 1456-1461 - Kamran Ahsan, Hanifa Shah, Paul Kingston:

The Role of Enterprise Architecture in Healthcare-IT. 1462-1467 - Mohsen Heydari, Mehran Jahed:

Prediction of Temperature Distribution and Volume of Lesion During HIFU Therapy. 1468-1473 - Mohammad Hjouj Btoush

, Jawed I. A. Siddiqi, Ja'far Alqatawna
, Babak Akhgar:
The State of Play in Jordanian E-government Services. 1474-1478 - Talles Brito Viana

, Hugo Imperiano Nobrega, Thiago Vinicius Freire de Araujo Ribeiro, Glêdson Elias da Silveira:
A Search Service for Software Components Based on a Semi-Structured Data Representation Model. 1479-1484 - Yunfeng Ma, Xiaomin Hu, Yonggang Huang, Tong Zhu, Lingling Fu:

The Research on the Environmental Assessment Automation System-C4ISRE Based on C4ISR Theory. 1485-1491 - An-Jim Long, Polun Chang:

The Use of Health Smart Card in Bridging Discontinuity of Care for Pregnant Woman. 1492-1497 - Samir N. Hamade:

Information and Communication Technology in Arab Countries: Problems and Solutions. 1498-1503
Social Computing & Technology
- Christian Menkens:

Towards a Context Aware Mobile Community Application Platform. 1504-1509 - Maria Chiara Caschera

, Fernando Ferri
, Patrizia Grifoni
, Tiziana Guzzo
:
Multidimensional Visualization System for Travel Social Networks. 1510-1516 - Mark Bilandzic, Daniel Filonik

, Michael Gross, Andreas Hackel, Herbert Mangesius, Helmut Krcmar:
A Mobile Application to Support Phatic Communication in the Hybrid Space. 1517-1521 - Mohan John Blooma

, Alton Yeow-Kuan Chua, Dion Hoe-Lian Goh, Chu Keong Lee:
A Trend Analysis of the Question Answering Domain. 1522-1527 - Zheng Liu, Hai Zhao, Peng Li, Jialiang Wang:

An Optimization Model for IO Jitter in Device-Level RTOS. 1528-1533 - Yanjun Zuo, Wen-Chen Hu, Timothy O'Keefe:

Trust Computing for Social Networking. 1534-1539 - Johannes Gambo, Savae Latu:

Giving Every Child a Sense of Belonging: Improving Birth Registration in Developing Countries. 1540-1545 - B. M. Monjurul Alom, Frans Henskens

, Michael Hannaford:
Querying Semistructured Data with Compression in Distributed Environments. 1546-1553 - Gabriella Kazai, Natasa Milic-Frayling:

Effects of Social Approval Votes on Search Performance. 1554-1559 - Yongping Hao, Jingyu Wang, Pengfei Zeng, Weiping Shao:

Planning and Realization of Collaborative Assembly. 1560-1564
Posters
- Wei-hai Huang, Yu-jie Dai, Xiao-xing Zhang, Ying-jie Lu:

An Oscillator Based on LDMOS Capacitor. 1565-1566 - Yanfang Yue, Rui-gang Zhang, Guang Yang, Guang-le Ge:

Application of COMERO Data Collecting in Quality Management System. 1567 - Zhanjun Li, Yongzhong Huang, Shaozhong Guo:

Using Pi-Calculus to Formalize Grid Workflow Parallel Computing Patterns. 1568-1571 - Mahdi Seify, Shahriar Bijani:

A Methodology for Mobile Network Security Risk Management. 1572-1573 - Zhengjun Cao, Olivier Markowitch:

Security Analysis of One Quantum Digital Signature Scheme. 1574-1576 - Kalavathi Alla, R. Siva Rama Prasad:

An Evolution of Hindi Text Steganography. 1577-1578 - Piyush Kumar Shukla

, Sanjay Silakari, Sarita Singh Bhadoriya:
Network Security Scheme for Wireless Sensor Networks using Efficient CSMA MAC Layer Protocol. 1579-1580 - Piyush Kumar Shukla

, Gouri Sankar Mishra
, Prashant G. Girdhar, Pradeep Rusia, Vivek Kapoor:
Implementation Comparison of Kerberos Passwords by RC-5 Encryption Type analysis with RC-4 Encryption. 1581-1582 - Piyush Kumar Shukla

, Kamlesh Kumar Gupta, Sanjay Silakari, A. S. Saxena:
An Ethical Way of Encrypt Data Transfer in Bluetooth Mobile Using Chaos Based Feedback Technique. 1583-1584 - Guoqiang Wu, Zhaowei Sun, Shunan Wu:

Research of Direct Spread Spectrum Communication System for Formation Micro-satellites. 1585-1587 - Sahil Chaudhary, Vijit Gupta, Vivek Kumar Dwivedi

:
Performance Comparison of BPSK in Rayleigh and AWGN Channel by Monte Carlo Simulation Method. 1588-1589 - Xinyu Zhang, Li Zheng, Cheng Sun:

The Research of the Component-Based Software Engineering. 1590-1591 - Rose Neena Tom:

Project Management Practitioner Empowerment Program: A Case Study. 1592-1594 - Amir Reza Yazdanshenas, Ramtin Khosravi:

Using Domain-Specific Languages to Describe the Development Viewpoint of Software Architectures. 1595-1596 - Mahin Jeyachandran, Kevin Gary:

WERCCS: A Client-side Workflow Enactment Service Using AJAX. 1597-1598 - Joseph D'Alessandro, Cynthia D. Tanner, Bonnie W. Morris, Tim Menzies:

Is Continuous Compliance Assurance Possible? 1599 - Juan Luo

, Haibo Luo, Renfa Li:
VL-MAC: Virtual Link Based Multi-channel MAC Scheme in WSN. 1600-1601 - Suresh Sankaranarayanan

:
Hierarchical Intelligent Agent Based Wireless Body Sensor Mesh Networks. 1602-1603 - Mohammad Al-Fares, Zhili Sun

, Haitham S. Cruickshank:
A Reliable Multi-hop Hierarchical Routing Protocol in Wireless Sensor Network (WSN). 1604-1605 - Hyun-Kuk Kim, Won-Hyuk Yang, Hyun-Bum Choi, Young-Chon Kim:

An Implementation of Central Optical Sensor Measurement/Observation System (COSMOS) with the Integrated FBG Sensor Control Device. 1606-1609 - Kang-Joong Seo, Jun-Cheol Jeon, Kee-Young Yoo:

A Reinforced Authentication Protocol for Anti-Counterfeiting and Privacy Protection. 1610-1611 - Fereidoun Ahourai, Mahmoud Tabandeh, Mehran Jahed, Saber Moradi

:
A Thermal-aware Shortest Hop Routing Algorithm for in vivo Biomedical Sensor Networks. 1612-1613 - Jalal Kawash:

Tutoring Tool for Formulating Database Queries with Complex Quantifiers. 1614-1615 - Manideep Chagarlamudi, Brajendra Panda, Yi Hu:

Insider Threat in Database Systems: Preventing Malicious Users' Activities in Databases. 1616-1620 - Peter Bach Andersen

, Bjarne Poulsen
, Chresten Traeholt
, Jacob Østergaard
:
Using Service Oriented Architecture in a Generic Virtual Power Plant. 1621-1622 - (Withdrawn) The Web-Based B2B Environment with Web Services. 1623-1624

- Xinyu Zhang, Nianlong Luo:

A Web Service System with Workflow Modeling and Scheduling. 1625-1626 - Wenzheng Li, Xiaoxia Hu:

Data Access and Semantic Integration Based on OGSA-DQP. 1627-1630 - M. B. Chandak, Rajiv V. Dharaskar

:
A Methodology to Extract Emotions and add Expressions in Speech Synthesis. 1631-1633 - Jesús Ubaldo Quevedo-Torrero:

Learning Theories in Computer Science Education. 1634-1635 - Francisco Supino Marcondes, Hamilton Jose Brumatto, Eloiza Helena Sonoda, Luiz Carlos Barboza, Jefferson Zannuto:

Problem on Software Engineering Learning: Domain Engineering. 1636 - Alireza Talebpour, Sona Bairamzadeh, Seyed Sabah Vajdi:

Extending the Technology Acceptance Model for Internet Banking: A Case Study of Iran. 1637-1638 - Mona Salehi, Abbas Keramati, Sina Elli:

A Proposal Framework for Investigating Website Success in the Context of E-banking: An Analytic Network Process (ANP) Approach. 1639 - Srinivasan Subha

:
Variable Block Size Architecture for Programs. 1640-1641 - Jareer Abdel-Qader, Roger Walker:

Modeling Real-Time Multi-Core Embedded System Using UML. 1642-1643 - Mehrdad Sharbaf

:
Quantum Cryptography: A New Generation of Information Technology Security System. 1644-1648 - Duksung Jang, Seungchan Choi, Taesoon Park:

Development of Collapse-Sensing Phone for Emergency Positioning System. 1649-1652 - Alejandro Aguirre, Marcela D. Rodríguez

, Ángel G. Andrade
:
A Pervasive System for Enabling Older Adults to Cope with Depression by Motivating them to Socialize. 1653-1654 - Jawad Hasan Yasin AlKhateeb, Jinchang Ren

, Jianmin Jiang, Stanley S. Ipson:
Unconstrained Arabic Handwritten Word Feature Extraction: A Comparative Study. 1655-1656 - Amitava Karmaker, Syed M. Rahman:

Outlier Detection in Spatial Databases Using Clustering Data Mining. 1657-1658 - Akram Hadizadeh Moghadam, Sona Bairamzadeh:

Extending the Technology Acceptance Model for E-learning: A Case Study of Iran. 1659-1660 - Le Anh Tuan, Yuan Luo:

Exchange Routing Information between New Neighbor Nodes to Improve AODV Performance. 1661-1662 - Afsaneh Rahbar, Mehran Mohsenzadeh

, Amir Masoud Rahmani
:
A New Data Communication Protocol for Distributed Mobile Databases in Mobile Ad Hoc Networks. 1663-1667 - Christopher Kosecki, Joseph S. Gomes:

A Hybrid Reconfiguration Algorithm for Fast Continuous Query Processing. 1668-1669 - Alicia Nicki Washington, Rotimi Iziduh:

Modeling of Military Networks Using Group Mobility Models. 1670-1671 - Syed M. Rahman, Amitava Karmaker:

Providing . 1672-1673 - Breno Lisi Romano, Glaucia Braga e Silva, Henrique Fernandes de Campos, Ricardo Godoi Vieira, Adilson Marques da Cunha

, Fábio Fagundes Silveira
, Alexandre Carlos Brandão Ramos
:
Software Testing for Web-Applications Non-Functional Requirements. 1674-1675 - Douglas Russell, David J. Power, Mark Slaymaker

, Ghita Kouadri Mostéfaoui, Xiaoqi Ma
, Andrew Simpson
:
On the Secure Sharing of Legacy Data. 1676-1679 - Claudia Mena, Cristian Rusu, Silvana Roncagliolo:

Modeling the Interaction with MoLIC. 1680 - Ricardo Godoi Vieira, Breno Lisi Romano, Glaucia Braga e Silva, Henrique Fernandes de Campos, Adilson Marques da Cunha

:
Using Best Practices of Software Engineering into a Real Time System Development. 1681 - Florence T. Balagtas-Fernandez, Heinrich Hussmann:

Applying Domain-Specific Modeling to Mobile Health Monitoring Applications. 1682-1683 - Bernd Bruegge, Maximilian Reiss, Jennifer Schiller:

Agile Principles in Academic Education: A Case Study. 1684-1686 - Peter E. Maher:

Weaving Agile Software Development Techniques into a Traditional Computer Science Curriculum. 1687-1688 - Cheng Sun, Xiaohua Wu, Xinyu Zhang:

Using a Tool to Generate a Web-Services Adapter. 1689-1690 - Chris Lüer, Jonathan Cummins:

Collaborative Web Search with WikiLinks. 1691-1692 - Milad Sabouri

, Ali A. Jalali:
Evaluating Web 2.0 Services Based on 7C Framework. 1693-1694 - Chun-Ta Li

, Min-Shiang Hwang:
Improving the Security of Non-PKI Methods for Public Key Distribution. 1695-1696 - Ou Yang, Jinping Ou:

Model Updating of Laboratorial Long-Span Cable-Stayed Bridge. 1697-1700 - Feng-Chen Li, Shi-zhu Tian, Yan-jun Li, Jin Wang:

Study on the Parameter Vibration of the Large-Span Cable-Stayed Bridges. 1701-1704 - Srinivasan Subha

:
An Algorithm for Secure Deletion in Flash Memories. 1705-1706 - Madhu Bhan, D. Evangelin Geetha, T. V. Suresh Kumar, K. Rajani Kanth:

Modeling of Object Oriented OLAP. 1707-1708 - Wensong Hu, Min Zhu, Zhuo Fang:

Reality of a New Control Sampling Module. 1709-1710 - Jesús Ubaldo Quevedo-Torrero:

Decidability and Constructivism. 1711-1714 - Srinivasan Subha

:
An Exclusive Cache Model. 1715-1716

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














