


Остановите войну!
for scientists:


default search action
4th ITNG 2007: Las Vegas, Nevada, USA
- Shahram Latifi:
Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2-4 April 2007, Las Vegas, Nevada, USA. IEEE Computer Society 2007, ISBN 978-0-7695-2776-5
Embedded Cryptographic Systems
- Giovanni Agosta
, Luca Breveglieri, Gerardo Pelosi
, Martino Sykora:
Programming Highly Parallel Reconfigurable Architectures for Public-Key Cryptographic Applications. 3-10 - Robert Ronan, Colm O'hEigeartaigh, Colin C. Murphy, Tim Kerins, Paulo S. L. M. Barreto:
A Reconfigurable Processor for the Cryptographic nT Pairing in Characteristic 3. 11-16 - Nadia Nedjah
, Luiza de Macedo Mourelle
, Rodrigo Martins da Silva:
Efficient Hardware for Modular Exponentiation Using the Sliding-Window Method. 17-24
Mobility & Resource Management in Wireless/Mobile Networks I
- Wei Shen, Qing-An Zeng:
Two Novel Resource Management Schemes for Integrated Wireless Networks. 25-30 - Muhammad Adeel, Ahmad Ali Iqbal:
TCP Congestion Window Optimization for CDMA2000 Packet Data Networks. 31-35 - Yenumula B. Reddy, Nandigam Gajendar, Portia Taylor, Damian Madden:
Computationally Efficient Resource Allocation in OFDM Systems: Genetic Algorithm Approach. 36-41 - Abbas Nayebi, M. R. Rahimi, Hamid Sarbazi-Azad:
Analysis of Time-Based Random Waypoint Mobility Model for Wireless Mobile Networks. 42-47 - Mika Watanabe, Hiroaki Higaki:
No-Beacon GEDIR: Location-Based Ad-Hoc Routing with Less Communication Overhead. 48-55 - Ognjen Dobrijevic, Miran Mosmondor, Maja Matijasevic
:
Design of a QoS Signaling API for Advanced Multimedia Applications in NGN. 56-64
Internet and Wireless Network Security
- Bing Wu, Xiao-chun Yun, Xiang Cui:
Study on Worm Poisoning Technology. 65-70 - Hussein Abdel-jaber, Michael E. Woodward, Fadi A. Thabtah, Mahmud Etbega:
A Discrete-time Queue Analytical Model based on Dynamic Random Early Drop. 71-76 - Mehdi Salour, Xiao Su:
Dynamic Two-Layer Signature-Based IDS with Unequal Databases. 77-82 - Osama Dandash, Yiling Wang, Phu Dung Le, Bala Srinivasan:
A new Dynamic Key Generation Scheme for Fraudulent Internet Payment Prevention. 83-88 - Hai Trong Vu, Neeraj Mittal, Subbarayan Venkatesan:
THIS: THreshold security for Information aggregation in Sensor networks. 89-95 - H. R. Nagesh, K. Chandra Sekaran, Adarsh Rao Kordcal:
Proactive model for Mitigating Internet Denial-of-Service Attacks. 96-101 - Wei Ren
, Yoohwan Kim, Ju-Yeon Jo, Mei Yang, Yingtao Jiang:
IdSRF: ID-based Secure Routing Framework for Wireless Ad-Hoc Networks. 102-110
Sensor Networks
- Anura P. Jayasumana, Qi Han, Tissa H. Illangasekare
:
Virtual Sensor Networks - A Resource Efficient Approach for Concurrent Applications. 111-115 - Ashwini Raina, Venkatesan Muthukumar, Laxmi P. Gewali:
Cell-based Distributed Addressing Technique Using Clustered Backbone Approach. 116-121 - Nikos Dimokas
, Dimitrios Katsaros, Yannis Manolopoulos:
Node Clustering in Wireless Sensor Networks by Considering Structural Characteristics of the Network Graph. 122-127 - Damayanti Datta, Sukhamay Kundu:
Reliable and Efficient Data Transfer in Wireless Sensor Networks via Out-of-Sequence Forwarding and Delayed Request for Missing Packets. 128-133 - Manseok Yang, Sun Sup So, Steve Eun, Brian Kim, Jinchun Kim:
Sensos: A Sensor Node Operating System with a Device Management Scheme for Sensor Nodes. 134-139 - Min Tun, Laxmi P. Gewali, Henry Selvaraj:
Interference Aware Routing in Sensor Network. 140-146 - Sajid Hussain, Abdul Wasey Matin, Obidul Islam:
Genetic Algorithm for Energy Efficient Clusters in Wireless Sensor Networks. 147-154
Mobile Enterprise
- Guido Gehlen, Fahad Aijaz, Muhammad Sajjad, Bernhard Walke:
A Mobile Context Dissemination Middleware. 155-160 - Jinsuo Zhang, Stacey Franklin Jones, Junling Wang, Sumi Helal
:
DPQ: Using A Distributed Priority Queue to Improve Ad hoc TCP Performance. 161-165 - Elaine Lawrence, Maria Bina, Gordana Culjak, Tarek El Kiki:
Wireless Community Networks: Public Assets for 21st Century Society. 166-174
New Trends in Image Processing
- Muhammad Saleem, Imran Touqir, Adil Masood Siddiqui:
Novel Edge Detection. 175-180 - Sarang C. Joshi, S. K. Bodhe:
Time Complexity Analysis for Decoding VOP Content in MPEG-4 Presentations. 181-182 - S. Rahul, J. Vignesh, S. Santhosh Kumar, M. Bharadwaj, N. Venkateswaran
:
Comparison of Pyramidal and Packet Wavelet Coder for Image Compression Using Cellular Neural Network (CNN) with Thresholding and Quantization. 183-184 - Dilip Gopichand Khairnar, Shabbir N. Merchant, Uday B. Desai:
A Neural Solution for Signal Detection In Non-Gaussian Noise. 185-189 - Premkumar Elangovan, Gaoyong Luo, Geoff Lawday:
Structurally Efficient Video Codec for Wireless Mobile Applications. 190-195 - Hau T. Ngo, Vijayan K. Asari:
Design of a Low Power Multiply-Accumulator for 2D Convolution in Video Processing Applications. 196-201 - Jinghua Zhang, Jinsheng Xu, Huiming Yu:
Octree-Based 3D Animation Compression with Motion Vector Sharing. 202-207 - Madasu Hanmandlu, Jyotsana Grover, Vamsi Krishna Madasu, Shantaram Vasikarla:
Input Fuzzy Modeling for the Recognition of Handwritten Hindi Numerals. 208-213 - Manoranjan Paul
, M. Manzur Murshed
:
Pattern based Residual Coding for H.264 Encoder. 214-218 - Seema H. Jadhav, Balasaheb Tarle
, Laxman M. Waghmare
:
Polygonal Approximation of 2-D Binary Images. 219-223 - Shuangteng Zhang, Yihong Lu:
Image Resolution Enhancement Using a Hopfield Neural Network. 224-228 - Luc Gillibert, Alain Bretto:
Hypergraphs for Near-lossless Volumetric Compression. 229-233 - Nileshsingh V. Thakur
, O. G. Kakde:
Color Image Compression on Spiral Architecture using Optimized Domain Blocks in Fractal Coding. 234-242
IT Applications
- Jay Kothari, Maxim Shevertalov, Edward Stehle, Spiros Mancoridis:
A Probabilistic Approach to Source Code Authorship Identification. 243-248 - Seongwook Youn, Dennis McLeod:
Efficient Spam Email Filtering using Adaptive Ontology. 249-254 - Dangeti Ravi Shankar, Akhil Kodali, Pradeep Beerla, D. V. S. Mohan Nimai:
Neural Networks in Cultivation. 255-260 - Sampathkumar Veeraraghavan, Karthik Srinivasan:
Exploration of Autism Expert Systems. 261-264 - Narongrit Waraporn:
Results of Real Time Simulation of Medical Knowledge Technology (MKT) System for Medical Diagnosis on Distributed Knowledge Nodes. 265-270 - C. L. Connors, M. A. Malloy:
Practical Challenges Facing Communities of Interest in the Net-Centric Department of Defense. 271-276 - Wen-Hui Chen, Wen-Shang Tseng:
A Novel Multi-agent Framework for the Design of Home Automation. 277-281 - Marcus J. Huber:
Agent Autonomy: Social Integrity and Social Independence. 282-290
Pervasive Computing
- InHo Jang, SangKeun Lee:
Search Reverse Nearest Neighbor Query On Air. 291-296 - Dejene Ejigu, Vasile-Marian Scuturici
, Lionel Brunie:
CoCA: A Collaborative Context-Aware Service Platform for Pervasive Computing. 297-302 - Sheikh Iqbal Ahamed, Munirul M. Haque, K. M. Ibrahim Asif:
S-MARKS: A Middleware Secure by Design for the Pervasive Computing Environment. 303-310
E-Learning, Education and Curriculum
- Janus S. Liang:
Education and Training for Troubleshooting in Automotive Chassis. 311-316 - Kazuo Hiekata
, Hiroyuki Yamato, Piroon Rojanakamolsan, Wataru Oishi:
Design Engineering Educational Framework Using ShareFast: A Semantic Web-Based E-Learning System. 317-322 - Kenneth E. Hoganson, David Lebron:
Lectures for Mobile Devices, Evaluating "iPod/PDA-casting" Technology and Pedagogy. 323-328 - Azita Bahrami:
An L-Tree Based Analysis of E-lessons. 329-334 - Samir N. Hamade:
Acquiring Information Technology Skills by Freshmen Students at Kuwait University: The Language Factor. 335-340 - Mohammad Eyadat, Dorothy M. Fisher:
Web Accessibility and Information Systems Curriculum. 341-346 - Oussama Kassem Zein, Yvon Kermarrec:
Description and composition of services for distant learning and research activities. 347-354
Data Mining
- Sudhanwa Kholgade, Jamie White, Hassan Reza:
Comparing the Specification of a Near-Real Time Commanding System Using Statecharts and AADL. 355-360 - Kazem Taghva, Pavankumar Bondugula, Darshana Gala:
Association Rule Discovery of Privacy Information. 361-365 - Hassan Reza, Sandeep Endapally, Emanuel S. Grant:
A Model-Based Approach for Testing GUI Using Hierarchical Predicate Transition Nets. 366-370 - Abdullah Uz Tansel, Susan P. Imberman:
Discovery of Association Rules in Temporal Databases. 371-376 - Chung-Hong Lee, Hsin-Chang Yang
:
Implementation of Unsupervised and Supervised Learning Systems for Multilingual Text Categorization. 377-382 - Mani Arun Kumar, Madan Gopal:
Binary Classification by SVM based neural Trees and Nonlinear SVMs. 383-387 - Mark Smith, Alireza Khotanzad:
Quality Metrics for Object-Based Data Mining Applications. 388-392 - Mehrdad Nojoumian, Timothy C. Lethbridge
:
Extracting Document Structure to Facilitate a Knowledge Base Creation for The UML Superstructure Specification. 393-400 - S. D. Samantaray:
A Data mining approach for resolving cases of Multiple Parsing in Machine Aided Translation of Indian Languages. 401-405 - Rabia Jafri
, Hamid R. Arabnia:
Analysis of Subspace-based Face Recognition Techniques under Changes in Imaging Factors. 406-413 - Ray R. Hashemi, Alexander A. Tyler, Christopher Childers, Arthur Chausmer:
Concordance Analysis of DEXA Data. 414-419 - Shafiq Ahmad
, Mali Abdollahian
, Panlop Zeephongsekul:
Process Capability for a Non-Normal Quality Characteristics Data. 420-424 - Shafiq Ahmad
, Mali Abdollahian
, Panlop Zeephongsekul:
Process Capability Analysis for Non-Normal Quality Characteristics Using Gamma Distribution. 425-430 - Amy Neustein:
SEQUENCE PACKAGE ANALYSIS: A New Natural Language Understanding Method for Intelligent Mining of Recordings of Doctor-Patient Interviews and Health-Related Blogs. 431-438
Web Technologies I
- Bernard J. Jansen
, Amanda Spink, Bhuva Narayan
:
Query Modifications Patterns During Web Searching. 439-444 - Terrence A. Brooks, Brian P. Flaherty:
An Abandoned Web Page Finds its Audience. 445-450 - Anya Kim, Amitabh Khashnobish, Myong H. Kang:
An Architecture for Web Services Authentication and Authorization in a Maritime Environment. 451-456 - Juan A. Correa-Colon, Manuel Rodríguez-Martínez:
Design and Implementation of JSwitch: a Web-based Transaction Coordination Framework. 457-462 - Ali Ghobadi Tapeh
, Masood Rahgozar
:
A Virtual Catalog Generated from Web Pages of Vendors for Comparative Shopping. 463-468 - Isak Taksa, Sarah Zelikovitz, Amanda Spink:
Using Web Search Logs to Identify Query Classification Terms. 469-474 - Richard D. Holowczak, Isak Taksa, Ilan Levine:
Mining Web Logs to Improve WebGIS Application Response Times. 475-480 - Yun-Ke Chang, Amanda Spink:
Multimedia Chinese Web Search Engines: A Survey. 481-486 - Hanmin Jung, Seungwoo Lee, In-Su Kang, HeeKwan Koo, Won-Kyung Sung:
Construction of Semantic Web-based Knowledge Using Text Processing. 487-492 - Gaël Dias, Bruno Conde:
Towards Web Browsing for Visually Impaired People. 493-496
Intelligent/Object-Oriented Computing, Information Systems
- Mahmood Houshmand, Mohammad Daneshvar Kakhki:
Presenting a Rule Based Loan Evaluation Expert System. 497-502 - Marc Karam, Mohamed A. Zohdy:
Development of a Model-Based Dynamic Recurrent Neural Network for Modeling Nonlinear Systems. 503-506 - Jamal Bentahar, John-Jules Ch. Meyer, Bernard Moulin:
Securing Agent-Oriented Systems: An Argumentation and Reputation-based Approach. 507-515 - Farhad Mohamad Kazemi, Saeed Samadi, Hamid Reza Pourreza
, Mohammad R. Akbarzadeh-Totonchi:
Vehicle Recognition Using Curvelet Transform and SVM. 516-521 - C. Y. Ho, W. Y. Lo, Anthony S. Fong:
Memory Garbage Collection for an Object-Oriented Processor. 522-527 - C. Y. Ho, K. F. Chong, Chihang Yau, Anthony Shi-Sheung Fong:
A Study of Dynamic Branch Predictors: Counter versus Perceptron. 528-536
Potpourri
- A. R. Ali Ahmadi, Farzad Soltani, Majid Gheitasi:
An ICT Technical Reference Model for Iran Universities. 537-542 - Muammer Zerenler:
Information Technology and Business Performance in Agile Manufacturing: An Empirical Study in Textile Industry. 543-549 - Marcus J. Huber, Sanjeev Kumar, Sean A. Lisse, David McGee:
Authority, Deontics and Joint Intentions. 550-555 - Christina N. Michael, Xiao Su:
Incorporating a New Hash Function in OpenPGP and SSL/TLS. 556-561 - Elridge D'Mello, Jerzy W. Rozenblit:
Design For a Patient-Centric Medical Information System Using XML Web Services. 562-567 - Sachin Singh, Uday Joshi, Prem Uppuluri:
Efficient and Lightweight File System for Desktop Grids. 568-576
Bioinformatics
- Leon Sanders, Yenumula B. Reddy:
Detecting Blood Clots using Neural Networks. 577-582 - Masaki Murata, Tomohiro Mitsumori, Kouichi Doi:
Overfitting in protein name recognition on biomedical literature and method of preventing it through use of transductive SVM. 583-588 - Yasuhiro Kiuchi, Tomonobu Ozaki, Takenao Ohkawa:
Partial Geometric Hashing for Retrieving Similar Interaction Protein Using Profile. 589-596
Software Engineering I
- Hisham M. Haddad, Mauricio Jose Ordoñez:
Enhanced Component Reuse with Atomic Domains: Application Scenarios. 597-602 - Sajjan G. Shiva, Lubna Abou Shala:
Software Reuse: Research and Practice. 603-609 - Chia-Chu Chiang:
Engineering Documents into XML File Formats. 610-615 - Brian Demmings, Elhadi M. Shakshuki
, Tomasz Müldner:
AETA: Algorithm Explanation Teaching Agent. 616-621 - Chang-Mog Lee, Jeong-Ok Kim, Ok-Bae Chang:
User Interface Prototype for User-Centered Interface Design. 622-627 - YoungJoon Byun:
A Tool Support for Design and Validation of Communication Protocol using State Transition Diagrams. 628-636
Software Engineering II & Algorithms
- Elhadi M. Shakshuki
, Hsiang-Hwa Koo, Darcy G. Benoit:
Negotiation Strategies for Agent-based Meeting Scheduling System. 637-642 - Carlos Eduardo de Barros Paes, Celso Massaki Hirata
:
RUP Extension for the Development of Secure Systems. 643-652 - Nirmal Gami, Boleslaw Mikolajczak:
Integration of Multilevel Security Features Into Loosely Coupled Inter-Organizational Workflows. 653-657 - Mehdi EffatParvar
, MohammadReza EffatParvar, Akbar Bemana, Mehdi Dehghan
:
Determining a Central Controlling Processor with Fault Tolerant Method in Distributed System. 658-663 - Hazem M. Bahig, Hatem M. Bahig:
Optimal Parallel Merging by Counting. 664-669 - Cleber V. G. Mira, Joao Meidanis:
Sorting by Block-Interchanges and Signed Reversals. 670-676
Software Specification and Modeling-Techniques, Tools and Applications
- Andre Oboler
, Charles Twardy, David W. Albrecht
:
Super Iterator A design pattern for Algorithm and Data structure collections. 677-678 - Andre Oboler
, Ian Sommerville:
Research Documentation Guidelines - Capturing knowledge, improving research. 679-684 - Judith Ann Ouimet, Sermsak Buntha, Sergiu M. Dascalu:
SERT: Software Tool for Generating Student Engagement Reports. 685-692 - Walter Dosch, Gongzhu Hu:
On Irregular Behaviours of Interactive Stacks. 693-700 - V. Vallieswaran, Bernard Menezes:
ArchKriti : A Software Architecture Based Design and Evaluation Tool Suite. 701-706 - Walter Dosch, Annette Stümpel:
High-Level Design of a Request Driven Sender Component. 707-714 - Yongyan Zheng, Jiong Zhou, Paul Krause:
A Model Checking based Test Case Generation Framework forWeb Services. 715-722
High Performance Computing Architectures
- Thomas Poonnen, Adly T. Fam:
A Novel VLSI Divide and Conquer Implementation of the Iterative Array Multiplier. 723-728 - Guoqiang Yang, Mei Yang, Yulu Yang, Yingtao Jiang:
On the Physicl Layout of PRDT-Based NoCs. 729-733