Stop the war!
Остановите войну!
for scientists:
default search action
8th ITNG 2011: Las Vegas, Nevada, USA
- Shahram Latifi:
Eighth International Conference on Information Technology: New Generations, ITNG 2011, Las Vegas, Nevada, USA, 11-13 April 2011. IEEE Computer Society 2011, ISBN 978-0-7695-4367-3
Computer Information Technology Education
- Keiichi Tanaka, Katsumi Wasaki:
Development and Evaluation of a Large-Scale Agent-Based System for Information Literacy Education - Improving the Automatic Collection of Learning Results through Template Matching. 1-6 - Alan Shaw:
Using a Collaborative Programming Methodology to Incorporate Social Computing Projects into Introductory Computer Science Courses. 7-11 - Mark Chapman, David A. Turner, Arturo I. Concepcion, Aldo Lewis:
VectorForce: A Video Game Project. 12-17
Information Systems and Internet Technology
- Sutheetutt Vacharaskunee, Sarun Intakosum:
An Approach to XML Tag Recommendation. 18-23 - Chyi-Ren Dow, Yu-Hong Lee, Jeremy Liao, Hao-Wei Yang, Wei-Luen Koo:
A Location-based Mobile Advertisement Publishing System for Vendors. 24-29 - Suvamoy Changder, Narayan C. Debnath, Debidas Ghosh:
A Greedy Approach to Text Steganography Using Properties of Sentences. 30-35 - Sultan Aljahdali, Alaa F. Sheta:
Predicting the Reliability of Software Systems Using Fuzzy Logic. 36-40 - Mohamed Benaddy, Sultan Aljahdali, Mohamed Wakrim:
Evolutionary Prediction for Cumulative Failure Modeling: A Comparative Study. 41-47 - Narayan C. Debnath, Robert Uzal, German Montejano, Daniel Riesco:
A Police Force Facing an e-Transparency Project. 48-53 - Jason R. Meek, Narayan C. Debnath, Ilhyun Lee, Haesun K. Lee:
Algorithmic Design and Implementation of an Automated Testing Tool. 54-59 - Jigarkumar Patel, Sergiu M. Dascalu:
EnduRan: A Web Application for Managing Racing Events. 60-65 - Nicole Anderson:
Putting Search in Context: Using Dynamically-Weighted Information Fusion to Improve Search Results. 66-71 - Andrew Cordar, Ahmed Abukmail:
Interactive Visualization and Analysis of Hurricane Data. 72-77 - Hiroyuki Hisamatsu, Go Hasegawa, Masayuki Murata:
Non Bandwidth-intrusive Video Streaming over TCP. 78-83 - Mustafa Atay, Artem Chebotko:
Schema-Based XML-to-SQL Query Translation Using Interval Encoding. 84-89 - Patrick Maillé, Bruno Tuffin:
On the Ranking Strategy in Adword Auctions. 90-93
Networking and Wireless Communications
- Tabinda Salam, Muhammad Ali, Mah-Rukh Fida:
Seamless Proactive Vertical Handover Algorithm. 94-99 - Hussein ElAttar, Hussein Abdelaty, Salwa H. El-Ramly, Mohamed A. Aboul-Dahab:
PHY-MAC Cross Layer Issues for QoS Provisioning in Wireless Ad Hoc Networks. 100-105 - Mahnsuk Yoon, Keuchul Cho, Jilong Li, Jeongbae Yun, Minyoung Yoo, Youngil Kim, Qin Shu, Jangkyu Yun, Kijun Han:
AdaptiveScan: The Fast Layer-2 Handoff for WLAN. 106-111 - Erwing Ricardo Sanchez, Laura M. Murillo, Bartolomeo Montrucchio, Maurizio Rebaudengo:
An Adaptive Power-Aware Multi-hop Routing Algorithm for Wireless Sensor Networks. 112-116 - Kei Itoh, Hiroaki Higaki:
Location Estimation of Wireless Nodes with Preservation of Neighbor Relations in MANET. 117-124 - Omar Y. Tahboub, Javed I. Khan:
Forwarding on Froggers Networks: Principle of Data Flow Equilibrium. 125-130 - Young Jin Hong:
Vigorous Study on Pre-FFT Smart Antennas in OFDM. 131-134 - Sasan Mohammadi, Mostafa Tavassoli, Abolfazl Rajabi:
Authoritative Intelligent Perfect Parallel Parking Based on Fuzzy Logic Controller for Car-Type Mobile Robot. 135-138 - Mohamed Bourimi, Gunnar Mau, Sascha Steinmann, Dominik Klein, Steffen Templin, Dogan Kesdogan, Hanna Schramm-Klein:
A Privacy-Respecting Indoor Localization Approach for Identifying Shopper Paths by Using End-Users Mobile Devices. 139-144
Software for Use: Challenges for the New Information Technology
- Silvana Roncagliolo, Virginica Rusu, Cristian Rusu, Gonzalo Tapia, Danae Hayvar, Dorian Gorgan:
Grid Computing Usability Heuristics in Practice. 145-150 - César A. Collazos, Toni Granollers, Cristian Rusu:
A Survey of Human-Computer Interaction into the Computer Science Curricula in Iberoamerica. 151-156 - Arturo Nakasone, Siyu Tang, Mika Shigematsu, Berthold Heinecke, Shuji Fujimoto, Helmut Prendinger:
OpenBioSafetyLab: A Virtual World Based Biosafety Training Application for Medical Students. 157-162 - Hamilton A. Hernández, Helmuth Trefftz:
WeSketch: A 3D Real Time Collaborative Virtual Environment that Improves the GUI Sketching Task. 163-168 - Theera Thepparat, Amnart Harnprasarnkit, Douanghatai Thippayawong, Veera Boonjing, Pisit Chanvarasuth:
A Virtualization Approach to Auto-Scaling Problem. 169-173
Software Engineering
- Arturo Chavoya, Cuauhtémoc López Martín, Maria Elena Meda-Campaña:
Applying Genetic Programming for Estimating Software Development Effort of Short-scale Projects. 174-179 - Jing-Chiou Liou, Gregory K. Egan, Jay K. Patel, Sujith Bhashyam:
A Sophisticated RFID Application on Multi-Factor Authentication. 180-185 - Xinyu Zhang, Haiyan Wu, Yiqian Lu:
The Exploration of the Component's Trustworthiness Measurement Method in the Data Processing Domain. 186-190 - Shailesh Tiwari, K. K. Mishra, Anoj Kumar, Arun Kumar Misra:
Spectrum-Based Fault Localization in Regression Testing. 191-195 - Plamen Petrov, Ugo A. Buy:
A Systemic Methodology for Software Architecture Analysis and Design. 196-200 - Haitham S. Hamza, Dina Darwish:
A Domain Analysis Method for Evolvable Software Product Line Architectures. 201-205 - Jianchao Han, Hosung Kim, Mohsen Beheshti, Kazimierz Kowalski:
An Event-Driven Interactive Model of Information Resource Management. 206-211 - Nathan Nikotan, Jianchao Han, Mohsen Beheshti:
Software Project Scheduling Using a Multi-Agent System. 212-213 - Ahmed Khago, Ashok K. Singh, Laxmi P. Gewali:
Bayesian Estimation of the Normal Mean from Censored Samples. 214-220 - Yoonsik Cheon, Cesar Yeep, Melisa Vela:
CleanJava: A Formal Notation for Functional Program Verification. 221-226 - Hisham M. Haddad, Donald Eric Meredith:
Instituting Software Metrics in Small Organizations: A Practical Approach. 227-232 - Mohammed Q. Shatnawi, Qusai Q. Abuein:
A Digital Ecosystem-based Framework for Math-based Search System. 233-238 - Wajee Chookittikul, Janet L. Kourik, Peter E. Maher:
Reducing the Gap between Academia and Industry: The Case for Agile Methods in Thailand. 239-244 - Jonathan Engelsma, Hans Dulimarta:
8 Reasons Why You Should Use Mobile Platforms in Your CS Courses. 245-250 - Andrew J. McAllister:
The Case for Teaching Legacy Systems Modernization. 251-256 - Erik Wilde:
Open and Accessible Presentations. 257-262
Software Testing
- Xin Bai, Marco Sadeghi:
IT Module Based Test Automation Framework. 263-267 - Pekka Aho, Nadja Menz, Tomi Räty, Ina Schieferdecker:
Automated Java GUI Modeling for Model-Based Testing Purposes. 268-273 - Etiene Lamas, Luiz Alberto Vieira Dias, Adilson Marques da Cunha:
Effectively Testing for a Software Product Line with OTM3 Organizational Testing Management Maturity Model. 274-279 - James D. McCaffrey, Adrian Bonar:
Testing a High Performance, Random Access Priority Queue: A Case Study. 280-285 - Gary Fix:
The Design of an Automated Test Code Generation System for SQL Stored Procedures. 286-290 - Alireza Ensan, Ebrahim Bagheri, Mohsen Asadi, Dragan Gasevic, Yevgen Biletskiy:
Goal-Oriented Test Case Selection and Prioritization for Product Line Feature Models. 291-298 - Kaarthik Sivashanmugam, Da Lin, Senthil Palanisamy:
Scenario Driven Testing. 299-303 - Janne Keränen, Tomi Räty, Petri Jurmu, Matti Mäki, Olli-Pekka Puolitaival:
Conformance Testing in Service-Oriented Interconnection Technologies in NoTA. 304-309 - Sagar Khandelwal, Kannan Subramanian, Rohit Garg:
Next Generation Cross Technology Test Data Solution for M&A. 310-314 - Daniel E. Burgner, Luay A. Wahsheh:
Security of Wireless Sensor Networks. 315-320 - Cong Sun, Liyong Tang, Zhong Chen:
Enforcing Reactive Noninterference with Reachability Analysis. 321-326 - Mohamed Hamdy Eldefrawy, Khaled Alghathbar, Muhammad Khurram Khan:
OTP-Based Two-Factor Authentication Using Mobile Phones. 327-331
Information Security and Privacy
- Y. V. Subba Rao, S. S. Brahmananda Rao, N. Rukma Rekha:
Secure Image Steganography Based on Randomized Sequence of Cipher Bits. 332-335 - Jim Luo, Myong H. Kang:
Application Lockbox for Mobile Device Security. 336-341 - Adesina S. Sodiya, S. A. Onashoga, D. I. Adelani:
A Secure e-Voting Architecture. 342-347 - Ravi Mukkamala, Vikas G. Ashok:
Fuzzy-based Methods for Privacy-Preserving Data Mining. 348-353 - Shay Gueron, Simon Johnson, Jesse Walker:
SHA-512/256. 354-358 - Fan Zhang, Zhijie Jerry Shi:
Differential and Correlation Power Analysis Attacks on HMAC-Whirlpool. 359-365 - N. Rukma Rekha, Y. V. Subba Rao, K. V. S. S. R. S. S. Sarma:
Enhanced Key Life in Online Authentication Systems Using Virtual Password. 366-369 - Hongbin Wang, Zhiyi Fang, Simon Fong, Yain-Whar Si, Liyang Liu:
Experimental Research on DFA-Based MLML IDS Security Evaluation. 370-375 - V. Nagalakshmi, I. Ramesh Babu, P. S. Avadhani:
Modified Protocols for Internet Key Exchange (IKE) Using Public Encryption and Signature Keys. 376-381 - Shay Gueron:
Quick Verification of RSA Signatures. 382-386 - Mah-Rukh Fida, Muhammad Ali, Awais Adnan, Ameer Shakayb Arsalaan:
Region-Based Security Architecture for DTN. 387-392 - Mohammad Eyadat, Soren Larsen:
A New Heuristic Approach to Safeguarding Online Digital Data. 393-396 - S. A. Onashoga, Adesina S. Sodiya:
A Confidential Electronic Result Transfer Using a Hybrid XML Security Scheme. 397-402 - Joshua J. Pauli, Patrick Henry Engebretson, Michael J. Ham, MarcCharles J. Zautke:
CookieMonster: Automated Session Hijacking Archival and Analysis. 403-407 - Joseph Chee, Ming Teo:
Improving Security in the IEEE 802.16 Standards. 408-412 - K. V. S. S. R. S. S. Sarma, G. Santhosh Krishna Kumar, P. S. Avadhani:
Threshold Cryptosystem Using Pell's Equation. 413-416
Human-Computer Interaction
- Kohei Arai, Ronny Mardiyanto:
Eye Based HCI with Moving Keyboard for Reducing Fatigue Effects. 417-422 - Kohei Arai, Ronny Mardiyanto:
Eye-based HCI with Full Specification of Mouse and Keyboard Using Pupil Knowledge in the Gaze Estimation. 423-428 - Llúcia Masip, Toni Granollers, Marta Oliva:
A Heuristic Evaluation Experiment to Validate the New Set of Usability Heuristics. 429-434 - Arturo Reuschenbach, Miao Wang, Tinosch Ganjineh, Daniel Göhring:
iDriver - Human Machine Interface for Autonomous Cars. 435-440 - Kohei Arai, Ronny Mardiyanto:
Comparative Study on Blink Detection and Gaze Estimation Methods for HCI, in Particular, Gabor Filter Utilized Blink Detection Method. 441-446 - Sajad Shirali-Shahreza, Mohammad Shirali-Shahreza:
Multilingual Highlighting CAPTCHA. 447-452 - Cristhy Jiménez Granizo, Pablo Lozada Yanez, Danilo Pastor Ramirez, Patricia Cordovez Machado:
Usability in E-government Sites. 453-458 - Hanmin Jung, Mikyoung Lee, Pyung Kim, Do-Wan Kim:
Study on the Visualization Elements of Web Information Services: Focused on Researcher Network and Graphic Chart. 459-463 - Muhammad Fakri Othman, Wendy Keay-Bright:
Rotoscopy-Handwriting Prototype: Using Computer Animation Technique to Assist the Teaching of Handwriting for Children with Dyspraxia. 464-469
Signal Processing and Applications
- Manoj Banik, Md. Modasser Hossain, Aloke Kumar Saha, Foyzul Hassan, Mohammed Rokibul Alam Kotwal, Mohammad Nurul Huda:
Phone Segmentation for Japanese Triphthong Using Neural Networks. 470-475 - Burak Uzkent, Buket D. Barkana:
Pitch-Range Based Feature Extraction for Audio Surveillance Systems. 476-480 - Eric Rives, Laurie L. Joiner:
Bit Error Rate Locked Loops Using Log-likelihood Decoders. 481-484 - W. M. Utomo, A. Bakar, M. Ahmad, Taufik Taufik, R. Heriansyah:
Online Learning Neural Network Control of Buck-Boost Converter. 485-489
New Trends in Image Processing
- Mohammad Ali Azimi Kashani, Mohammadreza Ramezanpour Fini:
Face Image Retrieval Using Genetic Algorithm and Bags of Pixels. 490-493 - R. B. Dubey, Madasu Hanmandlu, Shantaram Vasikarla:
Evaluation of Three Methods for MRI Brain Tumor Segmentation. 494-499 - Rolf T. Wigand, Dinah M. Mande, Jerry D. Wood:
Information Management and Tracking of Drugs in Supply Chains within the Pharmaceutical Industry. 500-507 - Loay Edwar George, Eman A. Al-Hilo:
Speeding-up Fractal Color Image Compression Using Moments Features Based on Symmetry Predictor. 508-513 - César A. Collazos, Rosa Gil:
Using Cross-cultural Features in Web Design Patterns. 514-519 - Farrukh Sayeed, Madasu Hanmandlu, Abdul Quaiyum Ansari, Shantaram Vasikarla:
Iris Recognition Using Segmental Euclidean Distances. 520-525 - Kameshwar Yadavalli, Alexander Khitun:
Electric Field Driven Magnetic Cellular Automata for Image Processing. 526-529 - Xudong Ma:
Large-Scale Clustering Based on Data Compression. 530-535 - Pooja Agrawal, Nishchal K. Verma, Saurabh Agrawal, Shantaram Vasikarla:
Color Segmentation Using Improved Mountain Clustering Technique Version-2. 536-542
Data Mining
- Ray Pereda, Kazem Taghva:
Fuzzy Information Extraction on OCR Text. 543-546 - Ali Rahmani, Mohamad Nagi, Mohammad Rifaie, Keivan Kianmehr, Mick J. Ridley, Reda Alhajj, Jon G. Rokne:
Employing Frequent Pattern Mining for Finding Correlations between Tables in Relational Databases. 547-552 - Cihan Varol, John R. Talburt:
Pattern and Phonetic Based Street Name Misspelling Correction. 553-558 - M. Zubair Rafique, Zeeshan Shafi Khan, Muhammad Khurram Khan, Khaled Alghathbar:
Securing IP-Multimedia Subsystem (IMS) against Anomalous Message Exploits by Using Machine Learning Algorithms. 559-563 - Mark S. Smith, Ray R. Hashemi:
A Relevancy Classification System for Web Search Results in Mobile Devices. 564-567 - Hassan Reza, Scott D. Kerlin:
A Model-Based Testing Using Scenarios and Constraints-based Modular Petri Nets. 568-573 - David Luper, Caner Kazanci, John R. Schramski, Hamid R. Arabnia:
Flow Decomposition in Complex Systems. 574-579 - Ray R. Hashemi, Azita Bahrami, Mark S. Smith, Simon Young:
Identification of Core, Semi-Core and Redundant Attributes of a Dataset. 580-584 - Muhammad Abulaish:
Relation Characterization Using Ontological Concepts. 585-590 - Mohan John Blooma, Alton Yeow-Kuan Chua, Dion Hoe-Lian Goh:
Quadripartite Graph-based Clustering of Questions. 591-596 - Shafiq Ahmad, Mali Abdollahian, Babak Abbasi:
Multivariate Performance Analysis Methods - A Comparison Study. 597-602 - Seyedeh Zahra Hosseinifard, Babak Abbasi, Mali Abdollahian:
Performance Analysis in Non-normal Linear Profiles Using Gamma Distribution. 603-607 - Hassan Reza, Kris Zarns:
Testing Relational Database Using SQLLint. 608-613 - Jae-Kul Lee, Hyun-Je Song, Seong-Bae Park:
Two-Step Sentence Extraction for Summarization of Meeting Minutes. 614-619
E-Learning
- Michael Kyesswa, Amru Mbajja, Arthur Tumusiime Asiimwe, Cosmas Mwikirize, Paul Isaac Musasizi, Sandy Stevens Tickodri-Togboa, Andrew Katumba, Julius Butime:
An Online Digital Filters and Sound Effects Laboratory Utilizing NI SPEEDY 33 and LabVIEW DSP Module. 620-625 - Nadine Marcus, Dror Ben-Naim, Michael Bain:
Instructional Support for Teachers and Guided Feedback for Students in an Adaptive eLearning Environment. 626-631 - Olutayo Boyinbode, Antoine B. Bagula:
An Adaptive and Personalized Ubiquitous Learning Middleware Support for Handicapped Learners. 632-637
Middleware and Networking Applications
- Jianfeng Qian, Jianwei Yin, Jinxiang Dong:
Parallel Matching Algorithms of Publish/Subscribe System. 638-643 - Qurban A. Memon, Hend Alqamzi:
An Energy-Efficient Image Search Algorithm for Hybrid Delivery Model of Image Sensor Networks. 644-648 - Sami J. Habib, Paulvanna Nayaki Marimuthu:
Opportunistic Reclustering: An Approach to Improve the Network Performance. 649-654 - Jesus Martinez Cruz, Adrián Romero-Garcés, Juan Pedro Bandera Rubio, Antonio Bandera Rubio:
Nerve: A Lightweight Middleware for Quality-of-service Networked Robotics. 655-660 - Shankar M. Banik, Zachary C. Aardahl:
M3DDVC: Multi-source Multicasting Using Multi-cores with Delay and Delay Variation Constraints on Overlay Networks. 661-666 - Víctor Manuel Álvarez García, María del Puerto Paule Ruíz, Moises Riestra González, Juan Ramón Pérez-Pérez:
Designing Case Studies for the Voice Interactive Classroom. 667-672