


default search action
11th ITNG 2014: Las Vegas, Nevada, USA
- Shahram Latifi:

11th International Conference on Information Technology: New Generations, ITNG 2014, Las Vegas, NV, USA, April 7-9, 2014. IEEE Computer Society 2014, ISBN 978-1-4799-3187-3
Model-Driven Data Science
- Luiz Felipe Simoes Hoffmann

, Luiz Eduardo Guarino de Vasconcelos, Etiene Lamas, Adilson Marques da Cunha
, Luiz Alberto Vieira Dias:
Applying Acceptance Test Driven Development to a Problem Based Learning Academic Real-Time System. 3-8 - Denis Ávila Montini, Danilo Battaglia, Gustavo Ravanhani Matuck, Adilson Marques da Cunha

, Luiz Alberto Vieira Dias, Alessandra Avila Montini, Basit Shahzad:
A Chi-Square Methodology Applied in Deviations Control of Project Plan to Support the RIMAM Model. 9-14 - Denis Ávila Montini, Gustavo Ravanhani Matuck, Adilson Marques da Cunha

, Luiz Alberto Vieira Dias, Massimo Jorge Isaac:
BPM Model of GQIMP for ISO 9001: 2008 Supported by CASE Tools. 15-20 - Daniel W. Yoas, Greg Simco:

Using Long-Term Prediction for Web Service Network Traffic Loads. 21-26 - André Sarkis, Luiz Alberto Vieira Dias:

A Set of Rules for Production of Design Models Compliant with Standards DO-178C and DO-331. 27-32 - Juliano de Almeida Monte-Mor, Adilson Marques da Cunha

:
GALO: A Semantic Method for Software Configuration Management. 33-39 - Emanuel Mineda Carneiro, Adilson Marques da Cunha

, Luiz Alberto Vieira Dias:
Adaptive Game AI Architecture with Player Modeling. 40-45 - Thamer A. Alrawashdeh, Mohammad I. Muhairat, Sokyna M. Alqatawneh:

A Quantitative Evaluation of ERP Systems Quality Model. 46-49
Information Systems and Internet Technology
- Chyi-Ren Dow, Yu-Hong Lee, Shr-Chen Wang, Shiow-Fen Hwang:

A Geo-Aware Location Based Taxi Carrying System. 53-58 - Sung-Hoon Park, Su-Chang Yoo, Jae-Yoeb Lee:

The Design of an Election Protocol in Wireless Cellular Networks. 59-65 - Roger B. Bradford, John Pozniak:

Combining Modern Machine Translation Software with LSI for Cross-Lingual Information Processing. 65-72 - Christopher Bischke, Narayan C. Debnath:

Hardware Solutions for Biofeedback and Game Interactions. 73-77 - Christopher Bischke, Narayan C. Debnath:

Biofeedback Implementation in a Video Game Environment. 78-83 - Aaron Bere:

Exploring Determinants for Mobile Learning User Acceptance and Use: An Application of UTAUT. 84-90 - Mario Peralta, Carlos Salgado, Lorena Baigorria, Daniel Riesco, German Montejano, Narayan C. Debnath, Jenny Hu:

Workflow Models: Management and Quality of Process in the Cloud. 91-96 - Yanru Guo, Dion Hoe-Lian Goh, Nor Aishah Binte Mohamed Rashid, Pyae Pyae Han, Shengbo Sun:

An Investigation of Twitter and Facebook Abandonment. 97-102 - Douglas Rodrigues, Arthur A. Chaves, Kalinka R. L. J. Castelo Branco

, Rajiv Ramdhany, Geoff Coulson:
Knowledge Based Framework: A Case Study on Fast, Reliable, and Secure Web Services in UAVs. 103-108 - Adesanya A. Soyemi, Mohamad A. Saouli, Bhaskar R. Sinha:

Impact of Online Clinical Data Exchange on Patient Time Saving in Healthcare Delivery. 109-114 - Gustavo Ravanhani Matuck, Rodrigo Luiz de Oliveira, Tharcius Augusto Pivetta, Luiz Alberto Vieira Dias, Adilson Marques da Cunha

:
Applying Agile Method on Academic Access and Fraud Control System. 115-120
Next Generation Information Technologies for Health and Care
- R. B. Dubey, Madasu Hanmandlu, Shantaram Vasikarla:

Features Selection in Mammograms Using Fuzzy Approach. 123-128 - John Paul Brogan, Christoph Thuemmler:

Specification for Generic Enablers as Software. 129-136 - Iyad Al Khatib, Gerardo Pelosi

, Giovanni Agosta
, Heikki Terio:
Security Integration in Medical Device Design: Extension of an Automated Bio-Medical Engineering Design Methodology. 137-142 - Thanh Le, Norbert Schuff:

A Probability-Based Approach for Multi-scale Image Feature Extraction. 143-148 - Pablo Lozada Yanez, Tomás Arredondo, Cristhy Jiménez

:
Parameters Optimization in Entropic Segmentation Processes for the Analysis of Genetic Sequences. 149-154 - Kohei Arai:

Rescue System with Vital Sign, Location and Attitude Sensing Together with Traffic Condition, Readiness of Helper Monitoring in Particular for Disabled and Elderly Persons. 155-160
MB3: Networking and Wireless Communications
- Matthew Chan, Xiaowen Zhang:

Experiments for Leveled RFID Localization for Indoor Stationary Objects. 163-169 - Bong-seok Kim, Jin-hui Lee, Dae-hyeon Jeong, Kwonhue Choi:

Combining Successive ICI Cancellation to ICI Suppressed Alamouti Coded OFDM for Frequency Asynchronous Distributed Antenna Systems. 170-173 - Sahar Amini, Dong-jun Na, Kwonhue Choi:

Performance Comparison between Distributed Beamforming and Clustered Beamforming. 174-179 - Tuomas Kekkonen, Teemu Kanstrén, Kimmo Hätönen:

Towards Trusted Environment in Cloud Monitoring. 180-185 - Natarajan Meghanathan

:
A Distributed Trust Evaluation Model for Wireless Mobile Sensor Networks. 186-191 - Sumanth Yenduri, Chabli Boler:

Resilient Multi Sink Networks Using Simplistic Hop Based Routing. 192-195 - Mohamed Hamdy Eldefrawy, Muhammad Khurram Khan

, Hassan M. Elkamchouchi:
The Use of Two Authentication Factors to Enhance the Security of Mass Storage Devices. 196-200 - Fahim Gohar Awan, Noor M. Sheikh, A. Kiran:

Performance Evaluation of Beamforming for Macro Base Stations in a Femto-Cell Assisted Macro-Network. 201-206 - Fahd M. Al-Dosari:

Localized QoS Routing Based on Links Blocking Probability. 207-213 - Yuri Morais, Glêdson Elias:

Experimental Evaluation of a Multi-paradigm, Message-Oriented Mobile Middleware. 214-219 - Muhammad Adeel, Laurissa N. Tokarchuk, Muhammad Awais Azam

, Sardar Kashif Ashraf Khan, M. A. Khalil:
Propagation Analysis of Malware Families in Mobile P2P Networks. 220-226
MDCBSE: Model-Driven, Component-Based Software Engineering
- Aneta Vulgarakis, Rizwin Shooja, Aurelien Monot, Jan Carlson

, Moris Behnam:
Task Synthesis for Control Applications on Multicore Platforms. 229-234 - Vishal Dwivedi, David Garlan, Jürgen Pfeffer, Bradley R. Schmerl:

Model-Based Assistance for Making Time/Fidelity Trade-Offs in Component Compositions. 235-240
TA2: Software Engineering
- Helton Emanuel Reis Santana, Glauco de Figueiredo Carneiro

:
A Decision Process to Migrate Legacy Systems to SOA. 243-248 - Leandro Guarino de Vasconcelos, Luiz Eduardo Guarino de Vasconcelos:

LSQ: An approach for Learning Software Development with Quality. 249-254 - Dalal Alrmuny:

A Comparative Study of Test Coverage-Based Software Reliability Growth Models. 255-259 - Daniela Quiñones

, Cristian Rusu, Silvana Roncagliolo:
Redefining Usability Heuristics for Transactional Web Applications. 260-265 - Kim Nee Goh, Wei Kiat Chung:

RockTitan: A 3D Modelling Geological Software. 266-270
Security and Privacy in Next Generation Networks
- Shadi Al Awawdeh, Abdallah Tubaishat:

An Information Security Awareness Program to Address Common Security Concerns in IT Unit. 273-278 - Amjad Gawanmeh

:
Automatic Verification of Security Policies in Firewalls with Dynamic Rule Sequence. 279-284 - Abdullah A. Albahdal, Fahad Alsolami, Fawaz E. Alsaadi:

Evaluation of Security Supporting Mechanisms in Cloud Storage. 285-292 - Abdullah A. Albahdal, Terrance E. Boult:

Problems and Promises of Using the Cloud and Biometrics. 293-300 - Geum-Dal Park, Dea-Su Kim, Kee-Young Yoo:

Lossless Codebook-Based Digital Watermarking Scheme with Authentication. 301-306 - Anteneh Girma, Moses Garuba, Rojini Goel:

Cloud Computing Vulnerability: DDoS as Its Main Security Threat, and Analysis of IDS as a Solution Model. 307-312
Software and Network Security and Privacy
- Fahad Alsolami, Terrance E. Boult:

CloudStash: Using Secret-Sharing Scheme to Secure Data, Not Keys, in Multi-clouds. 315-320 - Mohammed S. Khalil

, Fajri Kurniawan:
License Plate Detection Method for Real-Time Video of Low-Cost Webcam Based on Hybrid SVM-Heuristic Approach. 321-326 - Vanessa N. Cooper, Hossain Shahriar

, Hisham M. Haddad:
A Survey of Android Malware Characterisitics and Mitigation Techniques. 327-332 - Shay Gueron

, Vlad Krasnov:
The Fragility of AES-GCM Authentication Algorithm. 333-337 - Shay Gueron

, Vlad Krasnov:
Speeding up Counter Mode in Software and Hardware. 338-340 - Amritha Puliadi Premnath, Ju-Yeon Jo, Yoohwan Kim:

Application of NTRU Cryptographic Algorithm for SCADA Security. 341-346
Entity Resolution (ER) and Entity Information Management (EIM)
- Fumiko Kobayashi, John R. Talburt:

Decoupling Identity Resolution from the Maintenance of Identity Information. 349-354 - Pei Wang, Daniel L. Pullen, John R. Talburt, Ningning Wu:

Probabilistic Matching Compared to Deterministic Matching for Student Enrollment Records. 355-359
Visualization and Data Processing
- Sabah Al-Fedaghi

, Altaf Alrashed:
Visualization of Execution of Programming Statements. 363-370 - Rodrigo Luiz Mendes Mota, Elcio Hideiti Shiguemori

, Alexandre Carlos Brandão Ramos
:
Application of Self-Organizing Maps at Change Detection in Amazon Forest. 371-376 - Sukhjit Singh Sehra

, Jaiteg Singh
, Hardeep Singh Rai:
A Systematic Study of OpenStreetMap Data Quality Assessment. 377-381 - Arleson Nunes Silva, Glauco de Figueiredo Carneiro

, José Maria N. David
:
Towards the Development of a Framework for Multiple View Interactive Environments. 382-387 - Ali Pour Yazdanpanah, Ajay K. Mandava

, Emma E. Regentova, Venkatesan Muthukumar, George Bebis:
A CUDA Based Implementation of Locally-and Feature-Adaptive Diffusion Based Image Denoising Algorithm. 388-393
High Performance Computing Architectures
- Xiaohui Song, Hong Wang, Lingfeng Wang:

FPGA Implementation of a Support Vector Machine Based Classification System and Its Potential Application in Smart Grid. 397-402 - Fangyang Shen, Chunlei Liu, Bing Qi, Yanqing Ji, Daniel Caban:

Building Effective Scheduling Algorithms for Sensor Networks. 403-406 - Yanqing Ji, Fangyang Shen, John Tran:

A Multi-relational Association Mining Algorithm for Screening Suspected Adverse Drug Reactions. 407-412 - Amin Sahba, Yilin Zhang, Marcus Hays, Wei-Ming Lin:

A Real-Time Per-Thread IQ-Capping Technique for Simultaneous Multi-threading (SMT) Processors. 413-418 - Tekesha Athil, Richard Christian, Yenumula B. Reddy

:
CUDA Memory Techniques for Matrix Multiplication on Quadro 4000. 419-425 - Vladimir Hahanov

, Eugenia Litvinova
, Wajeb Gharibi, Svetlana Chumachenko
:
Cyber Physical System - iCloud Traffic Control. 426-429 - Vladimir Hahanov

, Stanley Hyduke, Wajeb Gharibi, Eugenia Litvinova
, Svetlana Chumachenko
, Irina V. Hahanova
:
Quantum Models and Method for Analysis and Testing Computing Systems. 430-434
Wavelets and Validated Numerics
- Stephen Lee Bishop, Suresh Rai:

Spatial Up-Conversion Using ADRC Stationary Wavelets. 437-442 - Amit Setia

, Yucheng Liu, Aghalaya S. Vatsala:
The Solution of the Bagley-Torvik Equation by Using Second Kind Chebyshev Wavelet. 443-446 - Ryuji Ohura, Teruya Minamoto

:
A Recoverable Visible Digital Image Watermarking Based on the Dyadic Lifting Scheme. 447-452 - Teruya Minamoto

, Shinichi Habara:
Verified Computation to a Nonlinear Poisson Equation with Neumann Boundary Condition Derived from the Keller-Segel Model. 453-458 - Teruya Minamoto

, Jumpei Yamaguchi:
A Blind Digital Image Watermarking Method Based on the Dyadic Wavelet Transform and Chaos Models. 459-464 - Amit Setia

, Yucheng Liu, Aghalaya S. Vatsala:
Solution of Linear Fractional Fredholm Integro-Differential Equation by Using Second Kind Chebyshev Wavelet. 465-469
Data Mining
- Rinaldo Lima, Bernard Espinasse, Hilário Oliveira, Fred Freitas:

Ontology Population from the Web: An Inductive Logic Programming-Based Approach. 473-478 - Tanmoy Sarkar, Samik Basu, Johnny Wong:

iConSMutate: Concolic Testing of Database Applications Using Existing Database States Guided by SQL Mutants. 479-484 - Harmeet Kaur, Mali Abdollahian

:
Analytical Study of Global Mobile Market: Forecasting and Substitution. 485-489 - Minsung Kang, Soojung Hur, Won-Kyo Jeong, Yongwan Park:

Map Building Based on Sensor Fusion for Autonomous Vehicle. 490-495 - Heather Brotherton, J. Eric Dietz:

Data Center Business Continuity Best Practice. 496-501 - Ankita Srivastava, M. P. Singh, Prabhat Kumar:

Supervised Semantic Analysis of Product Reviews Using Weighted k-NN Classifier. 502-507 - Ian Yocum, Hassan Reza, William Kemp, Joseph Rinehart, Brian Dennis:

Reverse Engineering of Legacy Agricultural Phenology Modeling System. 508-513 - Jeremy Straub

, Hassan Reza:
The Use of the Blackboard Architecture for a Decision Making System for the Control of Craft with Various Actuator and Movement Capabilities. 514-519
Biometrics and Knowledge-Based Systems
- Lu Leng, Gang Liu, Ming Li, Muhammad Khurram Khan

, Ali M. Al-Khouri:
Logical Conjunction of Triple-Perpendicular-Directional Translation Residual for Contactless Palmprint Preprocessing. 523-528 - Mohamed Alfateh Badawy, Nawal A. El-Fishawy

, Osama A. Elshakankiry:
Using Patch Management Tools to Enhance the Signature Customization for IDS Based on Vulnerability Scanner. 529-533 - Mark Smith:

Recognition of Hand-Printed Characters on Mobile Devices. 534-538 - Mutlaq B. Alotaibi

, Dimitrios I. Rigas:
Empirically Derived Guidelines for Multimodal Interaction in Knowledge-Based Environments. 539-544 - Hanan A. Al Mehairi, Kevin Binning:

Employee Oriented vs. Work Oriented Cultures and the Moderating Role of Education on Intention to Share Knowledge. 545-551 - Samir N. Hamade:

Information Technology Outsourcing and the Brain Drain: A Preliminary Investigation. 552-557
Potpourri
- Yanru Guo, Dion Hoe-Lian Goh:

"We Want to Hear Your Voice": Power Relations in Participatory Design. 561-566 - Lucélia de Souza, Maria Salete Marcon Gomes Vaz, Marcos Sfair Sunye:

Modular Development of Ontologies for Provenance in Detrending Time Series. 567-572 - Dustin Bessette

:
Total Compensation and How it is Used in an Organization's Human Resources Strategy. 573-574 - Bing Qi, Fangyang Shen:

Performance Comparison of Partical Swarm Optimization Variant Models. 575-580 - Behnam Bahreman:

E-procurement in Iran Cement Industry Limitations and Benefits. 581-586 - Laxmi P. Gewali, Bishal Acharya:

Stability Aware Delaunay Refinement. 587-592 - Jaime Díaz

, Cristian Rusu:
Ubiquitous Computer-Supported Collaborative Learning: A Literature Review. 593-598 - Faruk Bagci:

Towards Performance and Power Management of Cloud Servers. 599-604
Posters
- Koj Sambyo, Chandan Tilak Bhunia:

Application of Multi Level ATM in Reducing Latency in Clouds for Performance Improvement of Integrated Voice, Video and Data Services. 607 - Swarnendu Kumar Chakraborty, Rajat Subhra Goswami, Abhinandan Bhunia, Chandan Tilak Bhunia:

Method of Non Majority Decision Making in Aggressive Packet Combining Scheme. 608-609 - Ira Woodring, Mostafa M. El-Said:

An Economical Cluster Based System for Detecting Data Leakage from BYOD. 610-611 - Martin Goll, Shay Gueron

:
Vectorization on ChaCha Stream Cipher. 612-615 - Tapan Kumar Jain, Davinder S. Saini, Sunil V. Bhooshan:

Increasing Lifetime of a Wireless Sensor Network Using Multiple Sinks. 616-619 - Jinyue Peng, Dongxing Jiang, Cong Liu, Yuan Jiang, Xinyu Zhang:

Knowledge Dimension Management: Bridge the Gulf between WAC and MOOC. 620-621 - Valdir da Costa Guerra, Eliezer Segeti, Fabiano Hino, Fabio Kfouri, Lineu Fernando Stege Mialaret, Luiz Alberto Vieira Dias, Adilson Marques da Cunha

:
Interdisciplinarity and Agile Development: A Case Study on Graduate Courses. 622-623 - Humam Elagha:

The Use of Partial Least Squares Path Modeling in IT Governance Discipline. 624-626 - Freddy Paz

, Freddy Asrael Paz, José Antonio Pow-Sang
, Luis Collantes:
Usability Heuristics for Transactional Web Sites. 627-628 - Mozhdeh Sadighi

:
Accounting System on Cloud: A Case Study. 629-632 - Sumeet Kaur Sehra

, Jasneet Kaur
, Yadwinder Singh Brar
, Navdeep Kaur
:
Analysis of Data Mining Techniques for Software Effort Estimation. 633-638 - Cassiano B. A. L. Monteiro, Luiz Alberto Vieira Dias, Adilson Marques da Cunha

:
A Case Study on Pairwise Testing Application. 639-640 - Alan Shaw:

A System of Simple Sentence Parsing Rules to Produce "Answer Matching" Chatbots. 641-642 - Ahmad Althunibat

, Thamer A. Alrawashdeh, Mohammad I. Muhairat:
The Acceptance of Using M-government Services in Jordan. 643-644 - Renan Cavichi de Freitas, Jefferson Andrade de Oliveira, Fabiano Yukio Alves Hino, Juvenal Silva Neto, Leonardo Miranda Vicente, Adilson Marques da Cunha

, Luiz Alberto Vieira Dias:
Applying Interdisciplinarity and Agile Methods in the Development of an Embedded System. 645-646 - Joseph M. Woodside:

Virtual Health Management. 647-648 - Alessio Bucaioni, Saad Mubeen, John Lundbäck, Kurt-Lennart Lundbäck, Jukka Mäki-Turja, Mikael Sjödin:

From Modeling to Deployment of Component-Based Vehicular Distributed Real-Time Systems. 649-654 - Saad Mubeen, Jukka Mäki-Turja, Mikael Sjödin:

Towards Extraction of Interoperable Timing Models from Component-Based Vehicular Distributed Embedded Systems. 655-659 - Sihem Charaa, Noureddine Ellouze:

Multiscale Product Edge Detection in Different Colour Spaces. 660-664

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














