


default search action
10th ITNG 2013: Las Vegas, Nevada, USA
- Shahram Latifi:

Tenth International Conference on Information Technology: New Generations, ITNG 2013, 15-17 April, 2013, Las Vegas, Nevada, USA. IEEE Computer Society 2013, ISBN 978-0-7695-4967-5
Information Systems and Internet Technology
- Chyi-Ren Dow, Chih-Yu Chueh, Yu-Hong Lee, Shiow-Fen Hwang:

A Tree-Based Web Service Indication Scheme for Service Tracking in Vehicular Ad-Hoc Networks. 3-7 - David Burgos-Amador, Jesus Martinez Cruz, Sergio Recio-Perez:

Reducing the Impact of Massive Multiplayer Online Games on the Internet Using SCTP. 8-13 - Mario Beron, German Montejano, Daniel Riesco, Pedro Rangel Henriques

, Narayan C. Debnath:
SIP: A Simple Tool for Inspecting and Evaluating WSDL Specifications. 14-19 - Víctor Mateu

, Francesc Sebé
, Magda Valls
:
Blind Certificates for Secure Electronic Voting. 20-26 - Fatih Karatas, Marcel Heupel, Mohamed Bourimi

, Dogan Kesdogan, Sophie Wrobel:
Considering Interdependent Protection Goals in Domain-Specific Contexts: The di.me Case Study. 27-32 - Sung-Hoon Park, Jea-Yep Lee, Su-Chang Yu:

Non-blocking Atomic Commitment Algorithm in Asynchronous Distributed Systems with Unreliable Failure Detectors. 33-38 - Ivan Gibbs, Sergiu M. Dascalu, Frederick C. Harris Jr.

:
Web Portal Usability Tests for the Nevada Climate Change Portal. 39-45 - Joseph M. Vesco, Frederick C. Harris Jr.

, Sergiu M. Dascalu, Del R. Jackson, Josh E. Baker:
Semi-automated Analysis Software for a Novel Biochemistry Assay. 46-52 - Seraj Fayyad

, Christoph Meinel:
Attack Scenario Prediction Methodology. 53-59 - Hajar Omrana, Ibrahim El Bitar

, Fatima-Zahra Belouadha
, Ounsa Roudiès
:
A Comparative Evaluation of Web Services Description Approaches. 60-64 - Leo Espinoza, Heldy Espinoza, Wenying Feng:

Modeling a Facilities Management and Information System by UML. 65-70 - Jigarkumar Patel, Sohei Okamoto, Sergiu M. Dascalu, Frederick C. Harris Jr.

:
A Web-Enabled Approach for Generating Data Processors. 71-76 - Narayan C. Debnath, Adam Kruger, Melinda Alexander:

A Boundary Value Analysis Tool - Design and Description. 77-82 - Sumedha Kodithuwakku, Lakmal Padmakumara, Ishara Premadasa, Shameera Rathnayaka, Vishaka Nanayakkara, Srinath Perera:

GajaNindu: A Distributed System Management Framework with User-Defined Management Logic. 83-88 - Weifeng Xu, Hanlin Wang, Tao Ding:

Mining Auto-generated Test Inputs for Test Oracle. 89-94
Software Engineering Education
- Hisham M. Haddad:

One-Semester CS Capstone: A 40-60 Teaching Approach. 97-102 - Marcelo Paiva Ramos, Gustavo Ravanhani Matuck, Ciro Fernandes Matrigrani, Samoel Mirachi, Eliezer Segeti, Marco Leite, Adilson Marques da Cunha

, Luiz Alberto Vieira Dias:
Applying Interdisciplinarity and Agile Methods in the Development of a Smart Grids System. 103-110
Human Computer Interaction (HCI) and Brain Machine Interface
- Kohei Arai, Rosa Andrie

:
Gender Classification with Human Gait Based on Skeleton Model. 113-118 - Freddy Paz

, Daniela Villanueva, Cristian Rusu, Silvana Roncagliolo, José Antonio Pow-Sang
:
Experimental Evaluation of Usability Heuristics. 119-126 - Andrés Solano, César A. Collazos

, Cristian Rusu, Luis Merchán
:
Evaluating the Usability of Interactive Digital Television Applications. 127-132 - Mauro Jiménez, Alejandra Jiménez, Pablo Lozada Yanez, Santiago Jiménez, Cristhy Jiménez Granizo

:
Using a Wireless Sensors Network in the Sustainable Management of African Palm Oil Solid Waste. 133-137 - Mutlaq B. Alotaibi

:
Assessing the Usability of University Websites in Saudi Arabia: A Heuristic Evaluation Approach. 138-142 - Kim Nee Goh, Yoke Yie Chen

, F. W. Lai, Stephanie Cristal Daud, Ashok Sivaji, Shi-Tzuaan Soo:
A Comparison of Usability Testing Methods for an E-Commerce Website: A Case Study on a Malaysia Online Gift Shop. 143-150
Wavelets and Validated Numerics
- Makoto Kobayashi, Kazushi Nakano:

Two Problems of Wavelet Packet Transform. 153-159 - Fabienne Jézéquel, Jean Luc Lamotte

, Olena Chubach:
Parallelization of discrete stochastic arithmetic on multicore architectures. 160-166 - Ryuji Ohura, Teruya Minamoto

:
Digital Image Watermarking for Authentication Based on the Dyadic Wavelet Transform and Interval Arithmetic. 167-172 - Takehiko Kinoshita, Mitsuhiro T. Nakao:

Some Remarks on the Optimal Error Estimates for the Finite Element Method on the L-Shaped Domain. 173-178 - Ken'ichiro Tanaka

:
A Sinc Method for an Eigenvalue Problem of a Differential Operator with Periodic Coefficients and Its Comparison with Hill's Method. 179-185
High Performance Computing Architectures
- Gabriel Loewen, Michael Galloway, Susan V. Vrbsky:

On the Performance of Apache Hadoop in a Tiny Private IaaS Cloud. 189-195 - Anthony S. Fong, Chihang Yau, Yijun Liu:

Advanced Instruction Folding for an Object-oriented Processor. 196-199 - Lech Józwiak, Yahya Jan:

Hardware Multi-processor Design for Highly-Demanding Applications. 200-205 - Fangyang Shen, Bing Qi:

Workload Based Optimization Model for Parallel Disk Systems. 206-209 - Ming Zhu, Yingtao Jiang:

An Area-Time Efficient Architecture for 16 x 16 Decimal Multiplications. 210-216 - Mahmoud Fawzy Wagdy, Sandesh Maraliga Jayaram:

A Novel Flash Fast-Locking Digital PLL: Verilog-AMS Modeling and Simulations. 217-222
Model-Based Software Development
- Federico Ciccozzi, Antonio Cicchetti

, Mikael Sjödin:
Exploiting UML Semantic Variation Points to Generate Explicit Component Interconnections in Complex Systems. 225-232 - Amina A. Imam, Haitham S. Hamza

, Riham Abdel-Moneim:
Automated Generation of Use Case Diagrams from Problem Frames Using Formal Concept Analysis. 233-240 - Matt Fenwick, Gerard Weatherby, Heidi J. C. Ellis, Michael R. Gryk:

Parser Combinators: A Practical Application for Generating Parsers for NMR Data. 241-246 - Mohammed Alodib:

A Model-Driven Approach to the Automated Creation of ADF Applications. 247-253 - Renato Matuzaki Honda, Luiz Alberto Vieira Dias:

Range Analyzer: An Automatic Tool for Arithmetic Overflow Detection in Model-Based Development. 254-259 - Mehrdad Saadatmand

, Mikael Sjödin:
On Combining Model-Based Analysis and Testing. 260-266 - Andreas Schuler

, Barbara Franz:
Rule-Based Generation of Mobile User Interfaces. 267-272 - Johnny Cardoso Marques, Sarasuaty Megume Hayashi Yelisetty, Adilson Marques da Cunha

, Luiz Alberto Vieira Dias:
CARD-RM: A Reference Model for Airborne Software. 273-279 - Sabah Al-Fedaghi

:
Alternative Representation of Aspects. 280-285
Computer Information Technology Education
- Adriana da Silva Jacinto

, Tatiana Martins Almeri, Etiene Lamas, Luiz Alberto Vieira Dias, Adilson Marques da Cunha
:
Computer Science and Interdisciplinarity: A Case Study on an Undergraduate Program. 289-293 - Muhammed Al-Qahtani, Mansour Al-Qahtani, Hatim Al-Misehal:

Learner Satisfaction of E-Learning in Workplace: Case of Oil Company in Middle East. 294-298 - Basit Shahzad, Esam Alwagait:

Utilizing Technology in Education Environment: A Case Study. 299-302
Software Testing
- Mikko Nieminen, Tomi Räty, Risto Teittinen:

Integration of Root Cause Analysis into a Model-Based Testing Process of a Mobile Switching Server. 305-309 - Yasir Imtiaz Khan

, Sadia Kausar:
Random Cluster Sampling on X-Machines Test Cases. 310-316 - José Campos

, Rui Abreu
:
Encoding Test Requirements as Constraints for Test Suite Minimization. 317-322 - Ching-Seh Wu, Chi-Hsin Huang, Yen-Ting Lee:

The Test Path Generation from State-Based Polymorphic Interaction Graph for Object-Oriented Software. 323-330 - Janne Keränen, Tomi Räty:

Validation of Model-Based Testing in Hardware in the Loop Platform. 331-336 - Tanmoy Sarkar, Samik Basu, Johnny Wong:

SynConSMutate: Concolic Testing of Database Applications via Synthetic Data Guided by SQL Mutants. 337-342 - Shadi Banitaan, Mamdouh Alenezi

, Kendall E. Nygard, Kenneth Magel:
Towards Test Focus Selection for Integration Testing Using Method Level Software Metrics. 343-348 - Etiene Lamas, Luiz Alberto Vieira Dias, Adilson Marques da Cunha

:
Applying Testing to Enhance Software Product Quality. 349-356 - Ramya Dharam, Sajjan G. Shiva:

Runtime Monitors to Detect and Prevent Union Query Based SQL Injection Attacks. 357-362 - Shailesh Tiwari

, K. K. Mishra
, Arun Kumar Misra:
Test Case Generation for Modified Code Using a Variant of Particle Swarm Optimization (PSO) Algorithm. 363-368 - Shaukat Ali Khan, Aamer Nadeem

:
Automated Test Data Generation for Coupling Based Integration Testing of Object Oriented Programs Using Evolutionary Approaches. 369-374 - Ashok Sivaji, Mohamed Redzuan Abdullah, Alan G. Downe, Wan Fatimah Wan Ahmad:

Hybrid Usability Methodology: Integrating Heuristic Evaluation with Laboratory Testing across the Software Development Lifecycle. 375-383
Information Security and Privacy
- Kevin P. Haubris, Joshua J. Pauli:

Improving the Efficiency and Effectiveness of Penetration Test Automation. 387-391 - Dae-Soo Kim, Gil-Je Lee, Kee-Young Yoo:

Reversible Image Hiding Scheme for High Quality Based on Histogram Shifting. 392-397 - Yan Ma, Mehrdad Sepehri Sharbaf:

Investigation of Static and Dynamic Android Anti-virus Strategies. 398-403 - Muhammad Junaid Khan, Haider Abbas

:
WLAN Location Privacy: A Client Server Based Architecture. 404-410 - Issa M. Khalil

, Abdallah Khreishah
, Salah Bouktif, Azeem Ahmad:
Security Concerns in Cloud Computing. 411-416 - Shay Gueron

:
White Box AES Using Intel's New AES Instructions. 417-421 - Alexander Eng, Luay A. Wahsheh:

Look into My Eyes: A Survey of Biometric Security. 422-427
Social Networking Applications and Knowledge Management
- Thara Ravindran, Alton Yeow-Kuan Chua, Dion Hoe-Lian Goh:

Characteristics of Social Network Fatigue. 431-438 - Samir N. Hamade:

Perception and Use of Social Networking Sites among Undergraduate Students in Kuwait. 439-444 - Asreen Rostami:

User Participation in Social Networks: The Case of Balatarin, an Online Persian-Language Social Bookmarking System. 445-449 - Angela Siew-Hoong Lee, Tong Ming Lim, Rasimah Aripin:

The Role of Affect on the Acceptance of Web 2.0 as Organizational Knowledge Sharing Systems. 450-455
Networking and Wireless Communications
- Christoph Thuemmler, Julius Mueller, Stefan Covaci, Thomas Magedanz, Stefano De Panfilis, Thomas Jell, Armin Schneider

, Anastasius Gavras
:
Applying the Software-to-Data Paradigm in Next Generation E-Health Hybrid Clouds. 459-463 - Fahd M. Aldosari, Fahad Alradady:

Localized QoS Routing with End-to-End Delay Guarantees. 464-472 - Victor Clincy, Brandon Wilgor:

Subjective Evaluation of Latency and Packet Loss in a Cloud-Based Game. 473-476 - Hanshang Li, Ling Wang, Shuo Pang, Massood Towhidnejad:

Path-Finding Algorithm for Ground Multiple Sensor Nodes Detection of Quad-rotor-typed UAV. 477-482 - Ling Wang, Zhen Wang, Yingtao Jiang:

Flow Control Mechanism for Wireless Network-on-Chip. 483-488 - Rajat Subhra Goswami, Swarnendu Kumar Chakraborty, Abhinandan Bhunia, Chandan Tilak Bhunia:

New Approach towards Generation of Automatic Variable Key to Achieve Perfect Security. 489-491 - Natarajan Meghanathan

, Philip Mumford:
A Benchmarking Algorithm to Determine Maximum Stability Data Gathering Trees for Wireless Mobile Sensor Networks. 492-497 - Philipp Schwarte, Mohamed Bourimi

, Marcel Heupel, Dogan Kesdogan, Rafael Giménez, Sophie Wrobel, Simon Thiel:
Multilaterally Secure Communication Anonymity in Decentralized Social Networking. 498-504 - Youngjoon Byun, Sathya Narayanan, Stephanie Mott, Ken Biba, Jason Schwenkler, Robert Osborn, Michael Morris:

Wireless Broadband Measurement in California. 505-509 - Denis Ávila Montini, Gustavo Ravanhani Matuck, Adilson Marques da Cunha

, Luiz Alberto Vieira Dias, Alexandre Lima Possebon Ribeiro, Alessandra Avila Montini:
A Sampling Diagnostics Model for Neural System Training Optimization. 510-517 - Kashif Saleem

, Norsheila Fisal:
Energy efficient information assured routing based on hybrid optimization algorithm for WSNs. 518-524 - Yenumula B. Reddy, Stephen Ellis:

Modeling Cognitive Radio Networks for Efficient Data Transfer Using Cloud Link. 525-530 - Miresmaeil Mirnabibaboli, Mher Markosyan, Hassa Hejr:

Supporting of Mobility by Cooperation Nodes in the Wireless Sensor Network Routing. 531-537
Peer to Peer Technologies
- R. B. Dubey, Sujata Bhatia, Madasu Hanmandlu, Shantaram Vasikarla:

Breast Cancer Segmentation Using Bacterial Foraging Algorithm. 541-545 - Müge Fesci-Sayit, Yagiz Kaymak, Kemal Deniz Teket, Cihat Cetinkaya

, Sercan Demirci, Geylani Kardas
:
Parent Selection via Reinforcement Learning in Mesh-Based P2P Video Streaming. 546-551 - Chin Teck Min, Tong Ming Lim, Andreas Mauthe:

A Study on the Bootstrapping Architectures for Scalable Private Reappearing Overlay Network. 552-557
Data Mining
- Ivo Serra, Rosario Girardi, Paulo Novais

:
PARNT: A Statistic based Approach to Extract Non-Taxonomic Relationships of Ontologies from Text. 561-566 - Mali Abdollahian

:
The Impact of Body Mass Index on Low Birth Weight. 567-572 - Yong Shi, Brian Graham:

Similarity Search Problem Research on Multi-dimensional Data Sets. 573-577 - Mali Abdollahian

:
Capability Analysis for Modulus of Elasticity and Modulus of Rupture. 578-583 - Ray R. Hashemi, Mahmood Bahar, Azita Bahrami, Nicholas Tyler, Matthew Antonelli:

Zinc-Protoporphyrin Metabolite Level Affected by Work Environment Stresses. 584-589 - Habib Ullah Khan

, Shafiq Ahmad
, Mali Abdollahian
:
Supply Chain Technology Acceptance, Adoption, and Possible Challenges: A Case Study of Service Organizations of Saudi Arabia. 590-595 - Salyer B. Reed, Tyson R. C. Reed, Sergiu M. Dascalu:

Coupling Recursive Hyperspheric Classification with Linear Discriminant Analysis for Improved Results. 596-601 - Mali Abdollahian

, L. Lasmini:
Forecasting Wet Land Rice Production for Food Security. 602-607 - Yinle Zhou, John R. Talburt, Eric D. Nelson:

User-Defined Inverted Index in Boolean, Rule-Based Entity Resolution Systems. 608-612 - Carla Gomes de Faria, Rosario Girardi, Paulo Novais

:
Analysing the Problem and Main Approaches for Ontology Population. 613-618 - Luis Eduardo Santos, Rosario Girardi, Paulo Novais

:
A Case Study on the Construction of Application Ontologies. 619-624
Software Security
- Hossain Shahriar

, Hisham M. Haddad:
Rule-Based Source Level Patching of Buffer Overflow Vulnerabilities. 627-632 - Michelle Ruse, Samik Basu:

Detecting Cross-Site Scripting Vulnerability Using Concolic Testing. 633-638 - Csilla Farkas, Sidney Valentine:

Software Safety and Security for Programmable Logic Controllers. 639 - Alessandro Barenghi

, Gerardo Pelosi
, Fabio Pozzi:
Drop-In Control Flow Hijacking Prevention through Dynamic Library Interception. 640-647 - Michael Terrell, Natarajan Meghanathan

:
Setting Up of a Cloud Cyber Infrastructure Using Xen Hypervisor. 648-652 - Masaya Yoshikawa, Toshiya Asai:

Platform for Verification of Electromagnetic Analysis Attacks against Cryptographic Circuits. 653-658
Potpourri
- Cagatay Catal

, Muratcan Atalay:
A Systematic Mapping Study on Architectural Analysis. 661-664 - Khasfariyati Razikin, Dion Hoe-Lian Goh, Chei Sian Lee:

A User-centric Approach towards Understanding the Influences of Social Tags Choices for Academic Papers. 665-670 - Sang Hun Park, Dong Ho Shin, Bang-Young Kim, Myoung Young Lee, Heung Ki Baik, Dong Heon Lee, Jeong-Hwan Seo, Chul-Gyu Song:

Real-time, High-resolution Diagnosis for Osteoarthritis in the Rat Using Common-Path Fourier-Domain Optical Coherence Tomography. 671-673 - Joyce M. S. França, Caio Augusto R. Dos Santos

, Kênia Santos de Oliveira, Michel dos Santos Soares:
An Empirical Evaluation of Refactoring Crosscutting Concerns into Aspects Using Software Metrics. 674-679 - Kênia Santos de Oliveira, Joyce M. S. França, Michel S. Soares:

Extensions of SysML for Modeling an Aspect Oriented Software Architecture with Multiple Views. 680-685 - Laxmi P. Gewali, Umang Amatya:

Node Filtering and Face Routing for Sensor Network. 686-691 - Pyung Soo Kim

, Mun-Suck Jang, Eung Hyuk Lee:
An IEEE 802.21 MIH Functionality Assisted Proxy Mobile IPv6 for Reducing Handover Latency and Signaling Cost. 692-695 - Chouvalit Khancome, Veera Boonjing, Pisit Chanvarasuth:

A Two-Hashing Table Multiple String Pattern Matching Algorithm. 696-701 - Hanan A. Al Mehairi:

Empowering Knowledge Sharing Behaviours through Means Oriented vs. Goal Oriented Cultures: The Impact of Organizational Culture on Knowledge Sharing. 702-705 - Butta Singh

, Gurmej Singh:
Evaluation of Multiscale Entropy based HRV for Ectopic Beats. 706-711 - Indu Saini

, Dilbag Singh
, Arun Khosla
:
Delineation of ECG Wave Components Using K-Nearest Neighbor (KNN) Algorithm: ECG Wave Delineation Using KNN. 712-717
Posters
- Denis Ávila Montini, Paulo Marcelo Tasinaffo

, Luiz Alberto Vieira Dias, Alvaro Augusto Neto, Adilson Marques da Cunha
, Alessandra Avila Montini:
A Meta-algorithm for Planning Optimization in a software Production Line. 721-726 - Saif Rahman, Yiruo He, Huapeng Wu:

Public-Key Based Efficient Key Distribution in Bluetooth. 727-728 - Swarnendu Kumar Chakraborty, Rajat Subhra Goswami, Abhinandan Bhunia, Chandan Tilak Bhunia:

Two New Modified Schemes of Aggressive Packet Combining Schemes in Achieving Better Throughput. 729-730 - Haitham S. Hamza

, Amr Kamel, Khaled Mohamed Shams:
Software Effort Estimation Using Artificial Neural Networks: A Survey of the Current Practices. 731-733 - Strauss Cunha Carvalho

, Felipe Rafael Motta Cardoso, Adilson Marques da Cunha
, Luiz Paulo Zanetti:
A Comparative Research between SCRUM and RUP Using Real Time Embedded Software Development. 734-735 - Adriana da Silva Jacinto

, Etiene Lamas, Luiz Alberto Vieira Dias, Adilson Marques da Cunha
, Tatiana Martins Almeri:
Interdisciplinarity in Computer Science: A Case Study on Graduate Courses. 736-737 - Susan P. Imberman, Sarah Zelikovitz, Irene Ludwig:

An Ophthalmologist's Tool for Predicting Deterioration in Patients with Accommodative Esotropia. 738-742 - Alexandre Ivánovich Grebénnikov:

3D Visualization of Space Distribution of Electrical Characteristics in Compound Structures Reconstructed by General Ray Method. 743-744 - Ling-Yao Huang, Wei-Lun Chang

:
A Two-Step Approach for Mining Service Cooperation. 745-746 - Alan Shaw:

Teaching Students to Design and Implement Social Networks Using MVC as a Capstone Experience. 747-748 - Jon Inouye:

Analysis of Classical and Quantum Resources for the Quantum Linear Systems Algorithm. 749-753 - B. John Osteen, Suresh Ramanan, Karthik Jeganathan:

Optimizing the Cost of Software Quality - A Path to Delivery Excellence. 754-756 - Behnam Bahreman:

Investigating Benefits and Limitations of E-Procurement in B2B Automakers Companies in Iran. 757-758 - Qian Wang, Chun Yu, Naijia Liu:

An Approach to Heterogeneous Database Migration. 759-760 - Naohiro Fukuda, Tamotu Kinoshita, Takayuki Kubo:

On the Finite Element Method with Riesz Bases and Its Applications to Some Partial Differential Equations. 761-766 - Hamdi Alagha:

Examining the Relationship between IT Governance Domains, Maturity, Mechanisms, and Performance: An Empirical Study toward a Conceptual Framework. 767-772 - M. Kondala Rao, K. V. S. S. R. S. S. Sarma, P. S. Avadhani:

A Model on Dynamic Threshold Multi-Secret Sharing Scheme using Pell's Equation with Jacobi Symbol. 773-776 - Ibraheem Alolyan:

Linear Programming with Fuzzy Objective Function. 777-778 - Vicky M.-H. Lim, Tong-Ming Lim, Siew Fan Wong:

Text-to-Onto Miner: A Concept Driven and Interval Controlled Ontology Builder. 779-780 - Venkat N. Gudivada, Rajeev Agrawal, Chunbo Chu:

Online Teaching and Learning Strategies for Programming-intensive Courses. 781-782

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














