


default search action
3rd ITNG 2006: Las Vegas, Nevada, USA
- Third International Conference on Information Technology: New Generations (ITNG 2006), 10-12 April 2006, Las Vegas, Nevada, USA. IEEE Computer Society 2006, ISBN 0-7695-2497-4

Introduction
- General Chair's Message.

- Reviewers.

Session MA1: IT Education
- Varsha Hemant Patil

, Snehal M. Kamlapur, Manikrao L. Dhore
:
Six Sigma in Education: To Achieve Overall Excellence in the Field of Education. 2-5 - Jacob R. Miller, Sandra Gorka, Barry M. Lunt, Joseph J. Ekstrom, Eydie Lawson, Han Reichgelt

, Reza Kamali
:
Hiring the IT Graduate: What's in the Box? 6-10 - Inger Björkman, Ann Johansson:

Implications of IT in Different Professions. 11-19
Session MA2: Software Engineering I
- Ghita Kouadri Mostéfaoui, Zakaria Maamar, Nanjangud C. Narendra, Sattanathan Subramanian:

Decoupling Security Concerns in Web Services Using Aspects. 20-27 - Hisham M. Haddad:

Integrated Collections: Approach to Software Component Reuse. 28-33 - Sumanth Yenduri:

An Agglomerative Clustering Methodology For Data Imputation. 34-39 - Eugenio Capra, Chiara Francalanci:

Cost Implications of Software Commonality and Reuse. 40-45 - Umesh Bellur

, V. Vallieswaran:
On OO Design Consistency in Iterative Development. 46-51 - Abbas Heydarnoori

, Farhad Mavaddat:
Reliable Deployment of Component-based Applications into Distributed Environments. 52-57 - Stefan Senczyna:

Modular Model of a Logic Circuit Using Object-Oriented Programming. 58-65
Session MA3: Software Engineering II
- Chia-Chu Chiang:

A Language for Writing Formal Software Specifications: The Library Problem Revisited. 66-71 - Göran Calås, Andreas Boklund, Stefan Mankefors-Christiernin:

A First Draft of RATF: A Method Combining Robustness Analysis and Technology Forecasting. 72-77 - Hai Yan, Zhijie Jerry Shi:

Studying Software Implementations of Elliptic Curve Cryptography. 78-83 - Radwan Tahboub, Vasile Lazarescu:

Novel Approach for Remote Energy Meter Reading Using Mobile Agents. 84-89 - Elhadi M. Shakshuki

, Abdul Wasey Matin:
RL-Agent That Learns in Collaborative Virtual Environment. 90-95 - Walter Dosch:

On History-Sensitive Models of Interactive Stacks. 96-103 - L. Robert, R. Nadarajan:

New Algorithms For Random Access Text Compression. 104-111
Session MA4: Software Engineering III
- Shifeng Zhang:

Integrating Non-Functional Properties to Architecture Specification and Analysis. 112-117 - Iván Martínez-Ortiz, Pablo Moreno-Ger

, José Luis Sierra
, Baltasar Fernández-Manjón
:
Production and Maintenance of Content-Intensive Videogames: A Document-Oriented Approach. 118-123 - Tien Nhut Nguyen:

Integrating Change Management with Software Document Relationship Management. 124-130 - Elhadi M. Shakshuki

, Omkarnath Prabhu:
Agent Launch Pattern for Creating Agents. 131-136 - Samir N. Hamade:

The Legal and Political Aspects of Software Piracy in the Arab World. 137-142 - Wang-chan Wong, Mohammad Eyadat, Shane Ng:

Degree of Freedom - Experience of Applying Software Framework. 143-148 - Meurig Beynon, Russell Boyatt

, Steve B. Russ:
Rethinking Programming. 149-154 - Jitender Kumar Chhabra

, K. K. Aggarwal:
Measurement of Intra-Class & Inter-Class Weakness for Object-Oriented Software. 155-160 - Raed Shatnawi

, Wei Li:
An Investigation of Bad Smells in Object-Oriented Design. 161-165
Session MB1: Embedded Cryptographic Systems I
- Maged Hamada Ibrahim:

Two-Party Private Vector Dominance: The All-Or-Nothing Deal. 166-171 - Adam J. Elbirt, Christof Paar:

Efficient Implementation of Galois Field Fixed Field Constant Multiplication. 172-177 - Kooroush Manochehri, Saadat Pourmozafari, Babak Sadeghiyan:

Efficient Methods in Converting to Modulo 2^n+1 and 2^n-1. 178-185
Session MB2: Embedded Cryptographic Systems II
- Guido Bertoni

, Luca Breveglieri
, Pasqualina Fragneto, Gerardo Pelosi
:
Parallel Hardware Architectures for the Cryptographic Tate Pairing. 186-191 - Robert Ronan, Colm O'hEigeartaigh, Colin C. Murphy, Michael Scott, Tim Kerins, William P. Marnane

:
An Embedded Processor for a Pairing-Based Cryptosystem. 192-197 - He Ge, Stephen R. Tate:

Efficient Authenticated Key-Exchange for Devices with a Trusted Manager. 198-203 - Kris Tiri, Patrick Schaumont

, Ingrid Verbauwhede
:
Side-Channel Leakage Tolerant Architectures. 204-209 - Nadia Nedjah

, Luiza de Macedo Mourelle
:
Four Hardware Implementations for the M-ary Modular Exponentiation. 210-215 - Nadia Nedjah

, Luiza de Macedo Mourelle
, Marco Paulo Cardoso:
A Compact Piplined Hardware Implementation of the AES-128 Cipher. 216-221
Session MB3: High Performance Computer Architectures
- Mei Yang, Mayauna McCullough, Yingtao Jiang, Jun Zheng

:
K-Selector-Based Dispatching Algorithm for Clos-Network Switches. 222-226 - Rama Sangireddy:

Instruction Format Based Selective Execution for Register Port Complexity Reduction in High-Performance Processors. 227-232 - Erik S. Gough, Michael D. Kane:

Evaluating Parallel Computing Systems in Bioinformatics. 233-238 - Yulu Yang, Yang Yu:

RDT Properties and Evaluations. 239-244 - Jianfeng An, Xiaoya Fan, Shengbing Zhang, Danghui Wang, Yi Wang

:
VMSIM: Virtual Machine Based a Full System Simulation Platform for Microprocessors' Functional Verification. 245-249 - Hooman Parizi, Afshin Niktash, Amir Hosein Kamalizad, Nader Bagherzadeh

:
A Reconfigurable Architecture for Wireless Communication Systems. 250-255
Session MB4: Sensor Networks
- Fei Hu, Carter May, Xiaojun Cao

:
Data Aggregation in Distributed Sensor Networks: Towards An Adaptive Timing Control. 256-261 - Nahdia Tabassum, Quazi Ehsanul Kabir Mamun

, Yoshiyori Urano:
COSEN: A Chain Oriented Sensor Network for Efficient Data Collection. 262-267 - Laxmi P. Gewali, Khursheed Mohamad, Min Tun:

Interference Aware Dominating Set for Sensor Network. 268-273 - Mathew M. Noel

, Parag P. Joshi, Thomas C. Jannett:
Improved Maximum Likelihood Estimation of Target Position in Wireless Sensor Networks using Particle Swarm Optimization. 274-279 - Hyojung Lee, Wonpil Yu, Youngmi Kwon:

Efficient RBS in Sensor Networks. 279-284 - Vasu Jolly, Naoto Kimura, Shahram Latifi:

Reliable Multipath Information Dissemination via Label Forwarding in Wireless Sensor Networks. 285-293
Session TA1: Mobile Enterprise I
- Philip Garner, Ian Mullins, Reuben Edwards, Paul Coulton:

Mobile Terminated SMS Billing - Exploits and Security Analysis. 294-299 - Werner Kurschl, Stefan Mitsch

, Rene Prokop:
SmartDOTS - A Framework for Efficient Data Synchronization on Mobile Devices. 300-305 - Moushumi Sharmin, Shameem Ahmed, Sheikh Iqbal Ahamed:

MARKS (Middleware Adaptability for Resource Discovery, Knowledge Usability and Self-healing) for Mobile Devices of Pervasive Computing Environments. 306-313
Session TA2: Mobile Enterprise II
- Tommi Laukkanen

, Teuvo Kantanen:
Consumer Value Segments in Mobile Bill Paying. 314-319 - Tarek El Kiki, Elaine Lawrence:

Government as a Mobile Enterprise: Real-time, Ubiquitous Government. 320-327 - Werner Kurschl, Stefan Mitsch

, Rene Prokop:
SelectiveDES: A Distributed Event Service Add-On for Invocation-Based Middleware supporting Selective Multi-Channel Communication and Notification Delivery. 328-333 - Abdul Nasir, Mah-Rukh:

Internet Mobility using SIP and MIP. 334-339 - Eunjung Lee, Jinsuk Baek, Shou-Hsuan Stephen Huang:

A Dynamic Mobility Management Scheme for VoIP Services. 340-345 - Natali Delic, Ana Vukasinovic:

Mobile Payment Solution - Symbiosis Between Banks, Application Service Providers and Mobile NetworkOperators. 346-350 - Jawed I. A. Siddiqi, Babak Akhgar, Mehrdad Naderi, Wolfgang Orth, Norbert Meyer, Miika Tuisku, Gregor Pipan, Mario López Gallego, José Alberto García, Maurizio Cecchi, Jean-Noël Colin:

Secure ICT Services for Mobile and Wireless Communications: A Federated Global Identity Management Framework. 351-357
Session TA3: Web Technologies
- Isak Taksa, Amanda Spink:

Using the Web to Construct Taxonomy for a Heterogeneous Community of Practice. 358-363 - Michelle Cheatham, Mateen M. Rizki:

Feature and Prototype Evolution for Nearest Neighbor Classification of Web Documents. 364-369 - Amanda Spink, Bernard J. Jansen

, Chris Blakely, Sherry Koshman:
Overlap Among Major Web Search Engines. 370-374 - Nadine Schmidt-Maenz, Martina Koch:

A General Classification of (Search) Queries and Terms. 375-381 - Gil Cheol Park, Seoksoo Kim, Gun Tae Bae, Yang Sok Kim, Byeong Ho Kang:

An Automated WSDL Generation and Enhanced SOAP Message Processing System for Mobile Web Services. 382-387 - Satoshi Niwa, Takuo Doi, Shinichi Honiden:

Web Page Recommender System based on Folksonomy Mining for ITNG '06 Submissions. 388-393 - Daqing He

:
A Study of Self-Organizing Map in Interactive Relevance Feedback. 394-401
Session TA4: Internet and Wireless Security
- Dhilak Damodaran, Rohit Singh, Phu Dung Le:

Group Key Management in Wireless Networks Using Session Keys. 402-407 - Hao Luo, Binxing Fang, Xiao-chun Yun:

Anomaly Detection in SMTP Traffic. 408-413 - Hwa Young Um, Edward J. Delp

:
A Secure Group Key Management Scheme for Wireless Cellular Networks. 414-419 - Dima Novikov, Roman V. Yampolskiy, Leon Reznik

:
Anomaly Detection Based Intrusion Detection. 420-425 - Marko Hassinen, Maija Marttila-Kontio, Mikko Saesmaa, Heli Tervo:

Secure Two-Way Transfer of Measurement Data. 426-431 - Yiling Wang, Dhilak Damodaran, Phu Dung Le:

Efficient Group Key Management in Wireless Networks. 432-439
Session TB1: Information Security and Privacy I
- Mahdi Seify:

New Method for Risk Management in CRM Security Management. 440-445 - Ranjit Bose:

Intelligent Technologies for Managing Fraud and Identity Theft. 446-451 - Kazimierz Kowalski, Mohsen Beheshti:

Analysis of Log Files Intersections for Security Enhancement. 452-457
Session TB2: Information Security and Privacy II
- Xianping Wu, Osama Dandash, Phu Dung Le:

The Design and Implementation of a Smartphone Payment System based on Limited-used Key Generation Scheme. 458-463 - Dragos Trinca:

Sequential and Parallel Cascaded Convolutional Encryption with Local Propagation: Toward Future Directions in Symmetric Cryptography. 464-469 - Yu Yu, Jussipekka Leiwo, A. Benjamin Premkumar:

A Study on the Security of Privacy Homomorphism. 470-475 - Wei Wu, Phu Dung Le:

An Efficient and Secure Code Sharing for Peer-to-Peer Communications. 476-481 - Shang-Lin Hsieh, Hsuan-Chieh Huang, I-Ju Tsai:

A Copyright Protection Scheme for Gray-Level Images Using Human Fingerprint. 482-489
Session TB3: Data Mining and Checkpointing
- Emmanuel Udoh, Joshua Rhoades:

Mining Documents in a Small Enterprise Using WordStat. 490-494 - Arthi Anandhan, Senthil Dhandapani, Hassan Reza, Karthik Namasivayam:

Web Usability Testing - CARE Methodology. 495-500 - Yoon-Shik Tae, Jeong Woo Son, Mi-hwa Kong, Jun-Seok Lee, Seong-Bae Park, Sang-Jo Lee:

A Hybrid Approach to Error Reduction of Support Vector Machines in Document Classification. 501-506 - K. Vivek, M. Gopa, Bijaya Ketan Panigrahi:

Knowledge Discovery in Power Quality Data Using Support Vector Machine and S-Transform. 507-512 - Panida Songram, Veera Boonjing, Sarun Intakosum

:
Closed Multidimensional Sequential Pattern Mining. 512-517 - Chaoguang Men, Yunlong Zhao, Wenbin Yao:

A Two-Phase Time-based Consistent Checkpointing Strategy. 518-523
Session TB4: VoIP/Signal Processing
- Ziad Al-Sharif

, Clinton L. Jeffery:
Adding High Level VoIP Facilities to the Unicon Language. 524-529 - Chi Hun Lee, Yi Qi Gui, Inbum Jung, Changyeol Choi, Hwang Kyu Choi:

A Peer to Peer Prefix Patching Scheme for VOD Servers. 530-534 - Teck-Kuen Chua, David C. Pheanis:

Bandwidth-Conserving Real-Time VoIP Teleconference System. 535-540 - K. Lakshmi, Saswati Mukherjee:

An Improved Feature Selection using Maximized Signal to Noise Ratio Technique for TC. 541-546 - Madasu Hanmandlu, Anuj K. Tiwari, Vamsi Krishna Madasu, Shantaram Vasikarla:

Mixed Noise Correction in Gray Images using Fuzzy Filters. 547-553 - Umar Farooq, Muhammad Saleem, Habibullah Jamal:

Parameterized FIR Filtering IP Cores for Reusable SoC Design. 554-559
Session TC1: Posters
- Syed Afzal Murtaza Rizvi

, Pankaj Agarwal
:
A New Bucket-Based A New Bucket-Based Algorithm for Finding LCS from two given Molecular Sequences. 560-561 - Parag P. Joshi, Thomas C. Jannett:

Performance-Guided Reconfiguration of Wireless Sensor Networks that Use Binary Data for Target Localization. 562-565 - Mohammad Al-Shurman, Seong-Moo Yoo:

Key Pre-Distribution Using MDS Codes in Mobile Ad Hoc Networks. 566-567 - Kiarash Narimani, Gordon B. Agnew:

Key Management and Mutual Authentication for Multiple Field Records Smart Cards. 568-569 - Tianzhou Chen, Zhenjie He, Wei Hu:

Effectively implement AES for EFI/Tiano based on IA-32 Platform. 570 - Yi Wang

, Jussipekka Leiwo, Thambipillai Srikanthan, Yu Yu:
FPGA based DPA-resistant Unified Architecture for Signcryption. 571-572 - Guido Bertoni

, Luca Breveglieri
, Matteo Venturi:
ECC Hardware Coprocessors for 8-bit Systems and Power Consumption Considerations. 573-574 - Tai-Chi Lee, Richard Zeien, Adam Roach, Patrick Robinson:

DES Decoding Using FPGA and Custom Instructions. 575-577 - Xiannong Meng:

A Comparative Study of Performance Measures for Information Retrieval Systems. 578-579 - Ssu-An Lo, Chong-Yen Lee, Chiun-Chieh Hsu:

Automatically Classify Web Sites by Multimembership Bayesian Approach. 580-583
Session TC2: Posters
- Andrei Smirnov, Steven Rowan:

Express Risk Assessment through Web Access to Simulation Data. 584-585 - Mikyeong Moon, Youngbong Kim, Keunhyuk Yeom:

Contextual Events Framework in RFID System. 586-587 - Akio Sashima, Noriaki Izumi

, Koichi Kurumatani, Yoshiyuki Kotani:
Dynamic Role Assignment Protocol for Pervasive Computing. 588-589 - Nathan Denny, Theodore Elhourani, Jaime Denny, Scott Bissmeyer, David Irby:

SpamCooker: A Method for Deterring Unsolicited Electronic Communications. 590-591 - Emmanuell Udoh, J. Hoover:

Storage of a Portal-Extracted Data in a Relational Database. 592-594 - Nikolay Manchev

:
Parallel Algorithm for Run Length Encoding. 595-596 - Shilpa Ambarish, Mahmoud Fawzy Wagdy:

A Wide-Band Digital Phase-Locked Looop. 597-598 - Haripriya Janardhan, Mahmoud Fawzy Wagdy:

Design of a 1GHz Digital PLL Using 0.18\mu m CMOS Technology. 599-600 - Narongrit Waraporn, Syed V. Ahamed:

Intelligent Medical Search Engine by Knowledge Machine. 601-605
Session WA1: Bioinformatic/Internet
- Hisham Al-Mubaid

, Ping Chen:
Biomedical Term Disambiguation: An Application to Gene-Protein Name Disambiguation. 606-612 - Heidi J. C. Ellis, Susan Fox-Erlich, Timothy O. Martyn, Michael R. Gryk:

Development of an Integrated Framework for Protein Structure Determinations: A Logical Data Model for NMR Data Analysis. 613-618 - Kyle D. Lutes, Ibrahim M. Baggili

:
Diabetic e-Management System (DEMS). 619-624 - Ray R. Hashemi, Alexander A. Tyler, Christopher Childers, Arthur Chausmer:

Similarity Analysis of Bone Mineral Density Measurements of Femur Sites Using Dendrogram. 625-630 - Li-Wei H. Lehman, Steven Lerman:

A Decentralized Network Coordinate System for Robust Internet Distance. 631-637 - Yunlong Zhao, Chaoguang Men, Nianmin Yao

:
Internet Accessing for IPv6 MANETs. 638-645
Session WA2: Grid, Pervasive Computing/E-Gaming
- Ruay-Shiung Chang, Jih-Sheng Chang:

Adaptable Replica Consistency Service for Data Grids. 646-651 - Ziga Turk

, Matevz Dolenc, Etiel Petrinja:
The Role of Collaboration Grids in the Roadmaps of Networked Organizations. 652-657 - L. J. Wang, A. S. M. Sajeev, Lachana Inchaiwong:

A Formal Specification of Interaction Widgets Hierarchy Framework. 658-664 - Jordi Castellà-Roca

, Josep Domingo-Ferrer, Francesc Sebé
:
On the Security of a Repaired Mental Poker Protocol. 664-668 - Ron Coleman:

Boosting Blackjack Returns with Machine Learned Betting Criteria. 669-673 - Sang-Soo Kim, Jeong Woo Son, Mi-hwa Kong, Seong-Bae Park, Sang-Jo Lee:

Korean Text Chunk Identification Using Support Vector Machines. 674-679 - Bhushan Bauskar, Boleslaw Mikolajczak:

Abstract Node Method for Integration of Object Oriented Design with Colored Petri Nets. 680-687
Session WB1: Design, Performance Analysis and Modeling
- Saurabh Mukherjee, Shashikala Tapaswi:

Modeling and Simulation of Virtual Warfare Using Virtual Reality Paradigm. 688-689 - Yi Yu, Man Lo Kai, Anthony S. Fong:

A Performance Analysis of an Object-Oriented Processor. 690-694 - Kazem Taghva

, Min Xu, Emma E. Regentova, Thomas A. Nartker:
Utilizing XML Schema for Describing and Querying Still Image Databases. 695-700 - Seyyed Mohsen Hashemi

, Mohammadreza Razzazi, Ali Bahrami:
ISRUP E-Service Framework for agile Enterprise Architecting. 701-706 - Pengyue J. Lin, Behrokh Samadi, Alan Cipolone, Daniel R. Jeske, Sean Cox, Carlos Rendón, Douglas Holt, Rui Xiao:

Development of a Synthetic Data Set Generator for Building and Testing Information Discovery Systems. 707-712 - Il-Woo Lee, Ho-Jin Park, Kwang-Roh Park, Sang-Ha Kim

:
A Proposed Platform & Performance Estimation of Digital-Home Service Delivery/Management Systems. 713-719
Session WB2: Networks and Hardware
- Yoohwan Kim, Ju-Yeon Jo, Kyunghee Kim Suh:

Baseline Profile Stability for Network Anomaly Detection. 720-725 - Basim Alhadidi

:
Middleware as an Infrastructure for Network Applications. 726-729 - Tan Ee Xion, Hiew Pang Leang:

Traffic Congestion Controller in Multihop Communication Network. 730-735 - E. Earl Eiland, Lorie M. Liebrock:

Optimizing Network Data Transmission. 735-741 - Mahmoud Fawzy Wagdy, Srishti Vaishnava:

A Fast-Locking Digital Phase-Locked Loop. 742-746 - Alexander Khitun, Kang L. Wang:

Nano Logic Circuits with Spin Wave Bus. 747-752

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














