default search action
6th ITNG 2009: Las Vegas, Nevada, USA
- Shahram Latifi:
Sixth International Conference on Information Technology: New Generations, ITNG 2009, Las Vegas, Nevada, USA, 27-29 April 2009. IEEE Computer Society 2009, ISBN 978-0-7695-3596-8
Circuit & System Design
- Xiaomin Jin, Simeon Trieu, Fei Wang, Bei Zhang, Tao Dai, Xiangning Kang, Guoyi Zhang:
Design Simulation of Top ITO Gratings to Improve Light Transmission for Gallium Nitride LEDs. 1-4 - Fei Wang, Xiaolong Wu:
Non-volatile Memory Devices Based on Chalcogenide Materials. 5-9 - Masaya Yoshikawa, Hidekazu Terai:
Dedicated Hardware for Ant Colony Optimization Using Distributed Memory. 10-15 - Yu Zhang, Binxing Fang:
A Novel Approach to Scan Detection on the Backbone. 16-21 - Xing Xie, Mengliang Liu, Leiguang Wang, Qianqin Qin:
A Remote Sensing Image Segmentation Method Based on Spectral and Texture Information Fusion. 22-27 - Liwen Huang, Jing Yang, Xiaolong Wu, Xiaoqian Hu:
A Novel Biological Recognition Method Based on Cranio-maxillo-facial Feature Information. 28-32 - Xuejun Zhao, Ruihu Li, Yingjie Lei:
Classification of Quaternary [21s + 4, 3] Optimal Self-orthogonal Codes. 33-34 - Faruk Yildiz:
Low Power Ambient Energy Harvesting, Conversion, and Storage Circuits. 35-40 - Shaharuddin Salleh, Nor Haniza Sarmin:
Dynamic Single-Row Routing Technique for Channel Assignments. 41-46 - Mahmoud Fawzy Wagdy, Brandon Casey Cabrales:
A Novel Flash Fast-Locking Digital Phase-Locked Loop. 47-52 - Jianping Quan, Guoqiang Bai:
A DPA-Resistant Digit-Parallel Modular Multiplier over GF (2m). 53-57 - Jianping Quan, Guoqiang Bai:
A New Method to Reduce the Side-Channel Leakage Caused by Unbalanced Capacitances of Differential Interconnections in Dual-Rail Logic Styles. 58-63 - Shruti Jain, Pradeep K. Naik, D. S. Chauhan, Rohit Sharma:
Computational Modeling of Cell Survival/Death Using MATLAB Simulator. 64-68 - Pierre Mars, Dave McIntosh:
Using a Supercapacitor to Power Wireless Nodes from a Low Power Source such as a 3V Button Battery. 69-78 - Jing Yang, Yongquan Wang, Min He, Fei Wang, Xiaolong Wu:
A Novel EKF-GPS Algorithm for Bridge Deformation Monitoring System. 79-83 - Chao-Jang Hwang, Chih-Tung Lin, Shi-Jinn Horng:
Implementation of Different Function Units Using Flexible and Reconfigurable Architecture. 84-89 - Fadi El-Hassan, Raymond Peterkin, Mohamed Abou-Gabal, Dan Ionescu:
A High-Performance Architecture of an XML Processor for SIP-Based Presence. 90-95 - Dawid Zydek, Henry Selvaraj:
Processor Allocation Problem for NoC-Based Chip Multiprocessors. 96-101 - Farhad Babak, Parviz Keshavarzi:
A Novel DDFS Based on Trigonometric Approximation with a Scaling Block. 102-106
Information Systems & Internet Technology
- Lingfu Xie, Du Xu:
The Two-Level-Turn-Model Fault-Tolerant Routing Scheme in Tori with Convex and Concave Faults. 107-113 - Jae-Yoon Jung:
Generating Rule-Based Executable Process Models for Service Outsourcing. 114-118 - Glaucia Braga e Silva, Breno Lisi Romano, Henrique Fernandes de Campos, Ricardo Godoi Vieira, Adilson Marques da Cunha, Luiz Alberto Vieira Dias:
Integrating Amazonic Heterogeneous Hydrometeorological Databases. 119-124 - Ben W. Y. Kam, Thomas R. Dean:
Lessons Learned from a Survey of Web Applications Testing. 125-130 - Daniel Riesco, German Montejano, Narayan C. Debnath, Manuel Pérez Cota:
Formalizing the Management Automation with Workflow of Software Development Process Based on the SPEM Activities View. 131-136 - Robert Uzal, Narayan C. Debnath, Daniel Riesco, German Montejano:
Software Projects Finance Support: Preliminary Talks between Software Project Managers and Potential Investors. 137-142 - Fabio Augusto de Santana Silva, Maria del Rosario Girardi, Lucas Rêgo Drumond:
An Information Retrieval Model for the Semantic Web. 143-148 - G. Praveen Kumar, Anirban Sarkar, Narayan C. Debnath:
A New Algorithm for Frequent Itemset Generation in Non-Binary Search Space. 149-153 - Ian Stewart, Wenying Feng, Selim G. Akl:
A Further Improvement on a Genetic Algorithm. 154-159 - Jöran Beel, Bela Gipp:
Google Scholar's Ranking Algorithm: The Impact of Articles' Age (An Empirical Study). 160-164 - Mehdi Fasanghari, Maryam MohamedPour, Mohammad Amin Mohamedpour:
A Novel Method Combining ORESTE, Fuzzy Set Theory, and TOPSIS Method for Ranking the Information and Communication Technology Research Centers of Iran. 165-170 - Sadeta Krijestorac, Jonathan Bagby:
Comparison of QOS Fixed and Limited Interleaved Polling with Cyclic Demand Proportionality Algorithms. 171-176
AI Applications
- Daniel Vladusic, Ales Cernivec, Bostjan Slivnik:
Improving Job Scheduling in GRID Environments with Use of Simple Machine Learning Methods. 177-182 - Cenk Çelik, Inci Sariçiçek:
Tabu Search for Parallel Machine Scheduling with Job Splitting. 183-188 - Kota Tsubouchi, Kazuo Hiekata, Hiroyuki Yamato:
Scheduling Algorithm for On-Demand Bus System. 189-194
Software Engineering
- (Withdrawn) The Explore of the Law Role in Software Requirements Engineering. 195-198
- Cagatay Catal, Ugur Sevim, Banu Diri:
Clustering and Metrics Thresholds Based Software Fault Prediction of Unlabeled Program Modules. 199-204 - Suzanna Schmeelk, Bill Mills, Robert E. Noonan:
Managing Post-Development Fault Removal. 205-210 - Boleslaw Mikolajczak, Abhishek Singh:
TransCPN - Software Tool for Transformation of Colored Petri Nets. 211-216 - Hakun Lee, Keiichi Kaneko:
Two New Algorithms for Software Watermarking by Register Allocation and their Empirical Evaluation. 217-222 - Yoonsik Cheon, Carmen Avila, Steve Roach, Cuauhtemoc Munoz, Neith Estrada, Valeria Fierro, Jessica Romo:
An Aspect-Based Approach to Checking Design Constraints at Run-Time. 223-228 - John Huan Vu, Niklas Frojd, Clay Shenkel-Therolf, David S. Janzen:
Evaluating Test-Driven Development in an Industry-Sponsored Capstone Project. 229-234 - Brunil Dalila Romero Marino, Hisham M. Haddad:
Security Vulnerabilities and Mitigation Strategies for Application Development. 235-240 - Ziad Al-Sharif, Clinton L. Jeffery:
An Agent-Oriented Source-Level Debugger on Top of a Monitoring Framework. 241-247 - Jianchao Han, Mohsen Beheshti, Kazimierz Kowalski, Joel Ortiz, Johnly Tomelden:
Component-Based Software Architecture Design for Network Intrusion Detection and Prevention System. 248-253 - Shalini Chandra, Raees Ahmad Khan, Alka Agrawal:
Security Estimation Framework: Design Phase Perspective. 254-259 - Christopher M. Kanode, Hisham M. Haddad:
Software Engineering Challenges in Game Development. 260-265 - Pavle Guduric, Arno Puder, Rainer Todtenhoefer:
A Comparison between Relational and Operational QVT Mappings. 266-271 - Travis D. Breaux, Calvin Powers:
Early Studies in Acquiring Evidentiary, Reusable Business Process Models for Legal Compliance. 272-277 - Mohammad Hamdaqa, Abdelwahab Hamou-Lhadj:
Citation Analysis: An Approach for Facilitating the Understanding and the Analysis of Regulatory Compliance Documents. 278-283 - Philippe Dugerdil, David Kony, Javier Belmonte:
An Eclipse Plugin for the Automated Reverse-Engineering of Software Programs. 284-289
Service-Oriented Computing & Applications
- Sedighe Moosavi, Mir Ali Seyyedi, Nasrollah Moghadam:
A Method for Service Oriented Design. 290-295 - Sattanathan Subramanian:
Highly-Available Web Service Community. 296-301 - Luiz Olavo Bonino da Silva Santos, Eduardo Goncalves da Silva, Luís Ferreira Pires, Marten van Sinderen:
Towards a Goal-Based Service Framework for Dynamic Service Discovery and Composition. 302-307 - Maqbool Hussain, Muhammad Afzal, Hafiz Farooq Ahmad, Naeem Khalid, Arshad Ali:
Healthcare Applications Interoperability through Implementation of HL7 Web Service Basic Profile. 308-313 - Shari S. C. Shang, Ya-Ling Wu, Oliver C. L. Hou:
An Analysis of Business Models of Web 2.0 Application. 314-319 - Chia-Hui Wei, Yeo-Hao Chin, Chun-Ta Li:
A Secure Billing Protocol for Grid Computing. 320-325 - Wei-Lun Chang, Yi-Ping Lo, Yu-Ting Hong:
A Heuristic Model of Network-Based Group Decision Making for E-Services. 326-331 - Odorico von Susani, Philippe Dugerdil:
Cross-Organizational Service Evolution Management. 332-337 - Fernando J. Maymi, Manuel Rodríguez-Martínez:
Obstacle Avoidance for Utility-Based Geocasting. 338-343
Information Security & Privacy
- Patrick Henry Engebretson, Joshua J. Pauli:
Leveraging Parent Mitigations and Threats for CAPEC-Driven Hierarchies. 344-349 - Bin Sun, Wang Chuan, Jiang Li, Legand L. Burge III:
A Multi-Signature Scheme Based on Two Difficult Mathematics Problems. 350-355 - Yuriy I. Izbenko, Vladyslav Kovtun, Alexandr Kuznetsov:
The Design of Boolean Functions by Modified Hill Climbing Method. 356-361 - Qiaoliang Li, Xiaoming Wang, Yingshu Li, Yi Pan, Pingzhi Fan:
Construction of Anti-Collusion Codes Based on Cover-Free Families. 362-365 - Yiqun Xiong, Rangding Wang:
A Robust Audio Aggregate Zero-Watermark Algorithm. 366-370 - Huo-Chong Ling, Swee-Huay Heng, Bok-Min Goi:
Attacks on a Block Based SVD Watermarking Scheme. 371-375 - Se-Min Kim, Zi-Qiang Cheng, Kee-Young Yoo:
A New Steganography Scheme Based on an Index-Color Image. 376-381 - Myong H. Kang, Amitabh Khashnobish:
A Peer-to-Peer Federated Authentication System. 382-387 - Jianqi Zhu, Yanheng Liu, Ke Yin, KeXin Yin:
A Novel Method-Based Software Watermarking Scheme. 388-392 - Andreas Ekelhart, Thomas Neubauer, Stefan Fenz:
Automated Risk and Utility Management. 393-398 - Madasu Hanmandlu, H. M. Gupta, Neha Mittal, Shantaram Vasikarla:
An Authentication System Based on Palmprint. 399-404 - Abdullah M. Alnajim, Malcolm Munro:
An Anti-Phishing Approach that Uses Training Intervention for Phishing Websites Detection. 405-410 - Sergio Castillo-Perez, Joaquín García-Alfaro:
Evaluation of Two Privacy-Preserving Protocols for the DNS. 411-416 - Raylin Tso, Takeshi Okamoto, Eiji Okamoto:
Efficient Short Signatures from Pairing. 417-422 - Ping Yi, Tianhao Tong, Ning Liu, Yue Wu, Jianqing Ma:
Security in Wireless Mesh Networks: Challenges and Solutions. 423-428 - Manabu Hirano, Tomohiro Umeda, Takeshi Okuda, Eiji Kawai, Suguru Yamaguchi:
T-PIM: Trusted Password Input Method against Data Stealing Malware. 429-434 - Ryu Watanabe, Toshiaki Tanaka:
Federated Authentication Mechanism using Cellular Phone - Collaboration with OpenID. 435-442 - Hua Jiang, Xinxing Tan:
Bisimulations in the Boxed Safe Ambients with Password. 443-448 - Chun-Ta Li, Min-Shiang Hwang, Yan-Chi Lai:
A Verifiable Electronic Voting Scheme over the Internet. 449-454 - Guido Marco Bertoni, Luca Breveglieri, Alessandro Cominola, Filippo Melzani, Ruggero Susella:
Practical Power Analysis Attacks to RSA on a Large IP Portfolio SoC. 455-460 - Hongwei Tian, Weining Zhang:
Extending l-Diversity for Better Data Anonymization. 461-466 - Joel Ortiz, Johnly Tomelden, Mohsen Beheshti, Kazimierz Kowalski, Jianchao Han:
Component Based Information Network for Computer Security. 467-469 - Ch. Rupa, P. S. Avadhani:
Message Encryption Scheme Using Cheating Text. 470-474 - Wei Jiang, Binxing Fang, Hongli Zhang, Zhihong Tian, Xin-fang Song:
Optimal Network Security Strengthening Using Attack-Defense Game Model. 475-480 - Hu Zhang, Shan-de Wei, Hongye Tan, Jia-heng Zheng:
Deception Detection Based on SVM for Chinese Text in CMC. 481-486 - Chandan Koner, C. T. Bhunia, Ujjwal Maulik:
An Efficient and Reliable Time Variant Three-Entity and Data Authentication of Remote User Using Smart card. 487-491 - Abdul Razzaq, Ali Hur, Nasir Haider, Hafiz Farooq Ahmad:
Multi-Layered Defense against Web Application Attacks. 492-497 - Sang-Ho Shin, Kee-Young Yoo:
An Efficient PRNG Based on the Hybrid between One- and Two-Dimensional Cellular Automata. 498-503 - Dongwan Shin, Rodrigo Lopes, William R. Claycomb:
Authenticated Dictionary-Based Attribute Sharing in Federated Identity Management. 504-509
Networking & Wireless Communications
- Yenumula B. Reddy, Clifton Bullmaster:
Application of Game Theory for Cross-layer Design in Cognitive Wireless Networks. 510-515 - Beatriz Lorenzo, Savo Glisic:
Reconfigurable Relaying Topology in Cognitive Multihop Wireless Networks with Nonuniform Temporal and Spatial Traffic Distribution. 516-523 - Fangyang Shen, Chunlei Liu, Jun Zhang:
A Distributed Coverage-Aware Sleep Scheduling Algorithm for Wireless Sensor Networks. 524-527 - (Withdrawn) Radiation Emission EMC Measurement in Real-Time. 528-533
- Shinhan Wee, Montserrat Ros, Peter James Vial:
Mitagation against MAI in a Space Time Spreading Software Defined Radio Test Bed. 534-540 - Ning Liu, Jianhua Li, Ping Yi, Jianing Li, Yue Wu:
Outage Behavior of Multi-Antenna Multi-Relay Non-Regenerative Cooperative Networks. 541-545 - Wei Feng, Hamada Alshaer, Jaafar M. H. Elmirghani:
Evaluation of Energy Consumption and Network Lifetime in Rectangular Ad-hoc Wireless Networks. 546-551 - Nikema Smith, Yenumula B. Reddy, Nandigam Gajendar:
Cross-Layer Design Approach for Wireless Networks to Improve the Performance. 552-557 - Mostafa M. El-Said, Ira Woodring:
An Empirical Study for Protecting Passive RFID Systems against Cloning. 558-563 - Lun-Min Shih, Jimmy J. M. Tan:
Fault-Tolerant Maximal Local-Connectivity on the Bubble-Sort Graphs. 564-569 - Devishree Naidu, Rakhi Tapadiya:
Implementation of Header Compression in 3GPP LTE. 570-574
Sensor Networks
- Eduardo Cañete, Jaime Chen, Manuel Díaz, Luis Llopis, Bartolomé Rubio:
A Service-Oriented Middleware for Wireless Sensor and Actor Networks. 575-580 - Mahmood R. Minhas, Sathish Gopalakrishnan, Victor C. M. Leung:
An Online Multipath Routing Algorithm for Maximizing Lifetime in Wireless Sensor Networks. 581-586 - Masato Kamio, Keiichi Nakamura, Shinsuke Kobayashi, Noboru Koshizuka, Ken Sakamura:
Micro T-Kernel: A Low Power and Small Footprint RTOS for Networked Tiny Devices. 587-594 - Kohei Arai:
Estimation Method for Total Nitrogen and Fiber Contents in Tealeaves as well as Grow Index of Tealeaves and Tea Estate Monitoring with Network Cameras. 595-600 - Shafique Ahmad Chaudhry, Cormac J. Sreenan:
Supporting Stateless Address Autoconfiguration in IP-Based Wireless Sensor Networks. 601-606 - P. Papantoni-Kazakos, Anthony Burrell:
Performance Monitoring in Sensor Networks. 607-612 - Sattanathan Subramanian, Djamel Djenouri, Guttorm Sindre, Ilangko Balasingham:
CoP4V : Context-Based Protocol for Vehicle's Safety in Highways Using Wireless Sensor Networks. 613-618 - Amina Chaabane, Mohamed Jmaiel:
A Secure Content-Based Publish/Subscribe Middleware. 619-622
Mobile Computing & Networking
- Yong Shou Wu, Do Hyeon Lee, Jae-Il Jung:
Derivation and Analysis of Link/Route Maintenance Probability In Multi Hop Mobile Ad Hoc Networks. 623-627 - Sung-Hoon Park, Tae-Gyu Lee, Hyung-Seok Seo, Seok-Jin Kwon, Jong-Ho Han:
An Election Protocol in Mobile Ad Hoc Distributed Systems. 628-633 - Marjan Sterk, Mariano Agustin Cecowski Palacio:
Virtual Globe on the Android - Remote vs. Local Rendering. 634-639 - R. Gunasekaran, V. Rhymend Uthariaraj:
Prevention of Denial of Service Attacks and Performance Enhancement in Mobile Ad hoc Networks. 640-645 - Osamah S. Badarneh, Michel Kadoch, Ahmed K. Elhakeem:
Supporting Video Multicast in Wireless Ad Hoc Networks Using Multiple Paths and Multiple Description Coding. 646-651 - Thi Vu Phu, Vu Anh Huynh, Timo Rolf Bretscheider:
Towards an In-Flight Infrared Peer-to-Peer Media Streaming Network. 652-656 - Yi Qi Gui, Gi Taek Kim, Hwang Kyu Choi:
Time-Based Cache Management for Video-on-Demand in P2P Environment. 657-662 - Markus Esch, Jean Botev, Hermann Schloss, Ingo Scholtes:
Performance Evaluation of GP3 - A Grid-Based Spatial Index Infrastructure. 663-670
Software Engineering Education
- Susan Loveland:
Using Open Source Tools to Prevent Write-Only Code. 671-677 - Andrew Mile Connor, Jim Buchan, Krassie Petrova:
Bridging the Research-Practice Gap in Requirements Engineering through Effective Teaching and Peer Learning. 678-683