default search action
8th ITNG 2011: Las Vegas, Nevada, USA
- Shahram Latifi:
Eighth International Conference on Information Technology: New Generations, ITNG 2011, Las Vegas, Nevada, USA, 11-13 April 2011. IEEE Computer Society 2011, ISBN 978-0-7695-4367-3
Computer Information Technology Education
- Keiichi Tanaka, Katsumi Wasaki:
Development and Evaluation of a Large-Scale Agent-Based System for Information Literacy Education - Improving the Automatic Collection of Learning Results through Template Matching. 1-6 - Alan Shaw:
Using a Collaborative Programming Methodology to Incorporate Social Computing Projects into Introductory Computer Science Courses. 7-11 - Mark Chapman, David A. Turner, Arturo I. Concepcion, Aldo Lewis:
VectorForce: A Video Game Project. 12-17
Information Systems and Internet Technology
- Sutheetutt Vacharaskunee, Sarun Intakosum:
An Approach to XML Tag Recommendation. 18-23 - Chyi-Ren Dow, Yu-Hong Lee, Jeremy Liao, Hao-Wei Yang, Wei-Luen Koo:
A Location-based Mobile Advertisement Publishing System for Vendors. 24-29 - Suvamoy Changder, Narayan C. Debnath, Debidas Ghosh:
A Greedy Approach to Text Steganography Using Properties of Sentences. 30-35 - Sultan Aljahdali, Alaa F. Sheta:
Predicting the Reliability of Software Systems Using Fuzzy Logic. 36-40 - Mohamed Benaddy, Sultan Aljahdali, Mohamed Wakrim:
Evolutionary Prediction for Cumulative Failure Modeling: A Comparative Study. 41-47 - Narayan C. Debnath, Robert Uzal, German Montejano, Daniel Riesco:
A Police Force Facing an e-Transparency Project. 48-53 - Jason R. Meek, Narayan C. Debnath, Ilhyun Lee, Haesun K. Lee:
Algorithmic Design and Implementation of an Automated Testing Tool. 54-59 - Jigarkumar Patel, Sergiu M. Dascalu:
EnduRan: A Web Application for Managing Racing Events. 60-65 - Nicole Anderson:
Putting Search in Context: Using Dynamically-Weighted Information Fusion to Improve Search Results. 66-71 - Andrew Cordar, Ahmed Abukmail:
Interactive Visualization and Analysis of Hurricane Data. 72-77 - Hiroyuki Hisamatsu, Go Hasegawa, Masayuki Murata:
Non Bandwidth-intrusive Video Streaming over TCP. 78-83 - Mustafa Atay, Artem Chebotko:
Schema-Based XML-to-SQL Query Translation Using Interval Encoding. 84-89 - Patrick Maillé, Bruno Tuffin:
On the Ranking Strategy in Adword Auctions. 90-93
Networking and Wireless Communications
- Tabinda Salam, Muhammad Ali, Mah-Rukh Fida:
Seamless Proactive Vertical Handover Algorithm. 94-99 - Hussein ElAttar, Hussein Abdelaty, Salwa H. El-Ramly, Mohamed A. Aboul-Dahab:
PHY-MAC Cross Layer Issues for QoS Provisioning in Wireless Ad Hoc Networks. 100-105 - Mahnsuk Yoon, Keuchul Cho, Jilong Li, Jeongbae Yun, Minyoung Yoo, Youngil Kim, Qin Shu, Jangkyu Yun, Kijun Han:
AdaptiveScan: The Fast Layer-2 Handoff for WLAN. 106-111 - Erwing Ricardo Sanchez, Laura M. Murillo, Bartolomeo Montrucchio, Maurizio Rebaudengo:
An Adaptive Power-Aware Multi-hop Routing Algorithm for Wireless Sensor Networks. 112-116 - Kei Itoh, Hiroaki Higaki:
Location Estimation of Wireless Nodes with Preservation of Neighbor Relations in MANET. 117-124 - Omar Y. Tahboub, Javed I. Khan:
Forwarding on Froggers Networks: Principle of Data Flow Equilibrium. 125-130 - Young Jin Hong:
Vigorous Study on Pre-FFT Smart Antennas in OFDM. 131-134 - Sasan Mohammadi, Mostafa Tavassoli, Abolfazl Rajabi:
Authoritative Intelligent Perfect Parallel Parking Based on Fuzzy Logic Controller for Car-Type Mobile Robot. 135-138 - Mohamed Bourimi, Gunnar Mau, Sascha Steinmann, Dominik Klein, Steffen Templin, Dogan Kesdogan, Hanna Schramm-Klein:
A Privacy-Respecting Indoor Localization Approach for Identifying Shopper Paths by Using End-Users Mobile Devices. 139-144
Software for Use: Challenges for the New Information Technology
- Silvana Roncagliolo, Virginica Rusu, Cristian Rusu, Gonzalo Tapia, Danae Hayvar, Dorian Gorgan:
Grid Computing Usability Heuristics in Practice. 145-150 - César A. Collazos, Toni Granollers, Cristian Rusu:
A Survey of Human-Computer Interaction into the Computer Science Curricula in Iberoamerica. 151-156 - Arturo Nakasone, Siyu Tang, Mika Shigematsu, Berthold Heinecke, Shuji Fujimoto, Helmut Prendinger:
OpenBioSafetyLab: A Virtual World Based Biosafety Training Application for Medical Students. 157-162 - Hamilton A. Hernández, Helmuth Trefftz:
WeSketch: A 3D Real Time Collaborative Virtual Environment that Improves the GUI Sketching Task. 163-168 - Theera Thepparat, Amnart Harnprasarnkit, Douanghatai Thippayawong, Veera Boonjing, Pisit Chanvarasuth:
A Virtualization Approach to Auto-Scaling Problem. 169-173
Software Engineering
- Arturo Chavoya, Cuauhtémoc López Martín, Maria Elena Meda-Campaña:
Applying Genetic Programming for Estimating Software Development Effort of Short-scale Projects. 174-179 - Jing-Chiou Liou, Gregory K. Egan, Jay K. Patel, Sujith Bhashyam:
A Sophisticated RFID Application on Multi-Factor Authentication. 180-185 - Xinyu Zhang, Haiyan Wu, Yiqian Lu:
The Exploration of the Component's Trustworthiness Measurement Method in the Data Processing Domain. 186-190 - Shailesh Tiwari, K. K. Mishra, Anoj Kumar, Arun Kumar Misra:
Spectrum-Based Fault Localization in Regression Testing. 191-195 - Plamen Petrov, Ugo A. Buy:
A Systemic Methodology for Software Architecture Analysis and Design. 196-200 - Haitham S. Hamza, Dina Darwish:
A Domain Analysis Method for Evolvable Software Product Line Architectures. 201-205 - Jianchao Han, Hosung Kim, Mohsen Beheshti, Kazimierz Kowalski:
An Event-Driven Interactive Model of Information Resource Management. 206-211 - Nathan Nikotan, Jianchao Han, Mohsen Beheshti:
Software Project Scheduling Using a Multi-Agent System. 212-213 - Ahmed Khago, Ashok K. Singh, Laxmi P. Gewali:
Bayesian Estimation of the Normal Mean from Censored Samples. 214-220 - Yoonsik Cheon, Cesar Yeep, Melisa Vela:
CleanJava: A Formal Notation for Functional Program Verification. 221-226 - Hisham M. Haddad, Donald Eric Meredith:
Instituting Software Metrics in Small Organizations: A Practical Approach. 227-232 - Mohammed Q. Shatnawi, Qusai Q. Abuein:
A Digital Ecosystem-based Framework for Math-based Search System. 233-238 - Wajee Chookittikul, Janet L. Kourik, Peter E. Maher:
Reducing the Gap between Academia and Industry: The Case for Agile Methods in Thailand. 239-244 - Jonathan Engelsma, Hans Dulimarta:
8 Reasons Why You Should Use Mobile Platforms in Your CS Courses. 245-250 - Andrew J. McAllister:
The Case for Teaching Legacy Systems Modernization. 251-256 - Erik Wilde:
Open and Accessible Presentations. 257-262
Software Testing
- Xin Bai, Marco Sadeghi:
IT Module Based Test Automation Framework. 263-267 - Pekka Aho, Nadja Menz, Tomi Räty, Ina Schieferdecker:
Automated Java GUI Modeling for Model-Based Testing Purposes. 268-273 - Etiene Lamas, Luiz Alberto Vieira Dias, Adilson Marques da Cunha:
Effectively Testing for a Software Product Line with OTM3 Organizational Testing Management Maturity Model. 274-279 - James D. McCaffrey, Adrian Bonar:
Testing a High Performance, Random Access Priority Queue: A Case Study. 280-285 - Gary Fix:
The Design of an Automated Test Code Generation System for SQL Stored Procedures. 286-290 - Alireza Ensan, Ebrahim Bagheri, Mohsen Asadi, Dragan Gasevic, Yevgen Biletskiy:
Goal-Oriented Test Case Selection and Prioritization for Product Line Feature Models. 291-298 - Kaarthik Sivashanmugam, Da Lin, Senthil Palanisamy:
Scenario Driven Testing. 299-303 - Janne Keränen, Tomi Räty, Petri Jurmu, Matti Mäki, Olli-Pekka Puolitaival:
Conformance Testing in Service-Oriented Interconnection Technologies in NoTA. 304-309 - Sagar Khandelwal, Kannan Subramanian, Rohit Garg:
Next Generation Cross Technology Test Data Solution for M&A. 310-314 - Daniel E. Burgner, Luay A. Wahsheh:
Security of Wireless Sensor Networks. 315-320 - Cong Sun, Liyong Tang, Zhong Chen:
Enforcing Reactive Noninterference with Reachability Analysis. 321-326 - Mohamed Hamdy Eldefrawy, Khaled Alghathbar, Muhammad Khurram Khan:
OTP-Based Two-Factor Authentication Using Mobile Phones. 327-331
Information Security and Privacy
- Y. V. Subba Rao, S. S. Brahmananda Rao, N. Rukma Rekha:
Secure Image Steganography Based on Randomized Sequence of Cipher Bits. 332-335 - Jim Luo, Myong H. Kang:
Application Lockbox for Mobile Device Security. 336-341 - Adesina S. Sodiya, S. A. Onashoga, D. I. Adelani:
A Secure e-Voting Architecture. 342-347 - Ravi Mukkamala, Vikas G. Ashok:
Fuzzy-based Methods for Privacy-Preserving Data Mining. 348-353 - Shay Gueron, Simon Johnson, Jesse Walker:
SHA-512/256. 354-358 - Fan Zhang, Zhijie Jerry Shi:
Differential and Correlation Power Analysis Attacks on HMAC-Whirlpool. 359-365 - N. Rukma Rekha, Y. V. Subba Rao, K. V. S. S. R. S. S. Sarma:
Enhanced Key Life in Online Authentication Systems Using Virtual Password. 366-369 - Hongbin Wang, Zhiyi Fang, Simon Fong, Yain-Whar Si, Liyang Liu:
Experimental Research on DFA-Based MLML IDS Security Evaluation. 370-375 - V. Nagalakshmi, I. Ramesh Babu, P. S. Avadhani:
Modified Protocols for Internet Key Exchange (IKE) Using Public Encryption and Signature Keys. 376-381 - Shay Gueron:
Quick Verification of RSA Signatures. 382-386 - Mah-Rukh Fida, Muhammad Ali, Awais Adnan, Ameer Shakayb Arsalaan:
Region-Based Security Architecture for DTN. 387-392 - Mohammad Eyadat, Soren Larsen:
A New Heuristic Approach to Safeguarding Online Digital Data. 393-396 - S. A. Onashoga, Adesina S. Sodiya:
A Confidential Electronic Result Transfer Using a Hybrid XML Security Scheme. 397-402 - Joshua J. Pauli, Patrick Henry Engebretson, Michael J. Ham, MarcCharles J. Zautke:
CookieMonster: Automated Session Hijacking Archival and Analysis. 403-407 - Joseph Chee, Ming Teo:
Improving Security in the IEEE 802.16 Standards. 408-412 - K. V. S. S. R. S. S. Sarma, G. Santhosh Krishna Kumar, P. S. Avadhani:
Threshold Cryptosystem Using Pell's Equation. 413-416
Human-Computer Interaction
- Kohei Arai, Ronny Mardiyanto:
Eye Based HCI with Moving Keyboard for Reducing Fatigue Effects. 417-422 - Kohei Arai, Ronny Mardiyanto:
Eye-based HCI with Full Specification of Mouse and Keyboard Using Pupil Knowledge in the Gaze Estimation. 423-428 - Llúcia Masip, Toni Granollers, Marta Oliva:
A Heuristic Evaluation Experiment to Validate the New Set of Usability Heuristics. 429-434 - Arturo Reuschenbach, Miao Wang, Tinosch Ganjineh, Daniel Göhring:
iDriver - Human Machine Interface for Autonomous Cars. 435-440 - Kohei Arai, Ronny Mardiyanto:
Comparative Study on Blink Detection and Gaze Estimation Methods for HCI, in Particular, Gabor Filter Utilized Blink Detection Method. 441-446 - Sajad Shirali-Shahreza, Mohammad Shirali-Shahreza:
Multilingual Highlighting CAPTCHA. 447-452 - Cristhy Jiménez Granizo, Pablo Lozada Yanez, Danilo Pastor Ramirez, Patricia Cordovez Machado:
Usability in E-government Sites. 453-458 - Hanmin Jung, Mikyoung Lee, Pyung Kim, Do-Wan Kim:
Study on the Visualization Elements of Web Information Services: Focused on Researcher Network and Graphic Chart. 459-463 - Muhammad Fakri Othman, Wendy Keay-Bright:
Rotoscopy-Handwriting Prototype: Using Computer Animation Technique to Assist the Teaching of Handwriting for Children with Dyspraxia. 464-469
Signal Processing and Applications
- Manoj Banik, Md. Modasser Hossain, Aloke Kumar Saha, Foyzul Hassan, Mohammed Rokibul Alam Kotwal, Mohammad Nurul Huda:
Phone Segmentation for Japanese Triphthong Using Neural Networks. 470-475 - Burak Uzkent, Buket D. Barkana:
Pitch-Range Based Feature Extraction for Audio Surveillance Systems. 476-480 - Eric Rives, Laurie L. Joiner:
Bit Error Rate Locked Loops Using Log-likelihood Decoders. 481-484 - W. M. Utomo, A. Bakar, M. Ahmad, Taufik Taufik, R. Heriansyah:
Online Learning Neural Network Control of Buck-Boost Converter. 485-489
New Trends in Image Processing
- Mohammad Ali Azimi Kashani, Mohammadreza Ramezanpour Fini:
Face Image Retrieval Using Genetic Algorithm and Bags of Pixels. 490-493 - R. B. Dubey, Madasu Hanmandlu, Shantaram Vasikarla:
Evaluation of Three Methods for MRI Brain Tumor Segmentation. 494-499 - Rolf T. Wigand, Dinah M. Mande, Jerry D. Wood:
Information Management and Tracking of Drugs in Supply Chains within the Pharmaceutical Industry. 500-507 - Loay Edwar George, Eman A. Al-Hilo:
Speeding-up Fractal Color Image Compression Using Moments Features Based on Symmetry Predictor. 508-513 - César A. Collazos, Rosa Gil:
Using Cross-cultural Features in Web Design Patterns. 514-519 - Farrukh Sayeed, Madasu Hanmandlu, Abdul Quaiyum Ansari, Shantaram Vasikarla:
Iris Recognition Using Segmental Euclidean Distances. 520-525 - Kameshwar Yadavalli, Alexander Khitun:
Electric Field Driven Magnetic Cellular Automata for Image Processing. 526-529 - Xudong Ma:
Large-Scale Clustering Based on Data Compression. 530-535 - Pooja Agrawal, Nishchal K. Verma, Saurabh Agrawal, Shantaram Vasikarla:
Color Segmentation Using Improved Mountain Clustering Technique Version-2. 536-542
Data Mining
- Ray Pereda, Kazem Taghva:
Fuzzy Information Extraction on OCR Text. 543-546 - Ali Rahmani, Mohamad Nagi, Mohammad Rifaie, Keivan Kianmehr, Mick J. Ridley, Reda Alhajj, Jon G. Rokne:
Employing Frequent Pattern Mining for Finding Correlations between Tables in Relational Databases. 547-552 - Cihan Varol, John R. Talburt:
Pattern and Phonetic Based Street Name Misspelling Correction. 553-558 - M. Zubair Rafique, Zeeshan Shafi Khan, Muhammad Khurram Khan, Khaled Alghathbar:
Securing IP-Multimedia Subsystem (IMS) against Anomalous Message Exploits by Using Machine Learning Algorithms. 559-563 - Mark S. Smith, Ray R. Hashemi:
A Relevancy Classification System for Web Search Results in Mobile Devices. 564-567 - Hassan Reza, Scott D. Kerlin:
A Model-Based Testing Using Scenarios and Constraints-based Modular Petri Nets. 568-573 - David Luper, Caner Kazanci, John R. Schramski, Hamid R. Arabnia:
Flow Decomposition in Complex Systems. 574-579 - Ray R. Hashemi, Azita Bahrami, Mark S. Smith, Simon Young:
Identification of Core, Semi-Core and Redundant Attributes of a Dataset. 580-584 - Muhammad Abulaish:
Relation Characterization Using Ontological Concepts. 585-590 - Mohan John Blooma, Alton Yeow-Kuan Chua, Dion Hoe-Lian Goh:
Quadripartite Graph-based Clustering of Questions. 591-596 - Shafiq Ahmad, Mali Abdollahian, Babak Abbasi:
Multivariate Performance Analysis Methods - A Comparison Study. 597-602 - Seyedeh Zahra Hosseinifard, Babak Abbasi, Mali Abdollahian:
Performance Analysis in Non-normal Linear Profiles Using Gamma Distribution. 603-607 - Hassan Reza, Kris Zarns:
Testing Relational Database Using SQLLint. 608-613 - Jae-Kul Lee, Hyun-Je Song, Seong-Bae Park:
Two-Step Sentence Extraction for Summarization of Meeting Minutes. 614-619
E-Learning
- Michael Kyesswa, Amru Mbajja, Arthur Tumusiime Asiimwe, Cosmas Mwikirize, Paul Isaac Musasizi, Sandy Stevens Tickodri-Togboa, Andrew Katumba, Julius Butime:
An Online Digital Filters and Sound Effects Laboratory Utilizing NI SPEEDY 33 and LabVIEW DSP Module. 620-625 - Nadine Marcus, Dror Ben-Naim, Michael Bain:
Instructional Support for Teachers and Guided Feedback for Students in an Adaptive eLearning Environment. 626-631 - Olutayo Boyinbode, Antoine B. Bagula:
An Adaptive and Personalized Ubiquitous Learning Middleware Support for Handicapped Learners. 632-637
Middleware and Networking Applications
- Jianfeng Qian, Jianwei Yin, Jinxiang Dong:
Parallel Matching Algorithms of Publish/Subscribe System. 638-643 - Qurban A. Memon, Hend Alqamzi:
An Energy-Efficient Image Search Algorithm for Hybrid Delivery Model of Image Sensor Networks. 644-648 - Sami J. Habib, Paulvanna Nayaki Marimuthu:
Opportunistic Reclustering: An Approach to Improve the Network Performance. 649-654 - Jesus Martinez Cruz, Adrián Romero-Garcés, Juan Pedro Bandera Rubio, Antonio Bandera Rubio:
Nerve: A Lightweight Middleware for Quality-of-service Networked Robotics. 655-660 - Shankar M. Banik, Zachary C. Aardahl:
M3DDVC: Multi-source Multicasting Using Multi-cores with Delay and Delay Variation Constraints on Overlay Networks. 661-666 - Víctor Manuel Álvarez García, María del Puerto Paule Ruíz, Moises Riestra González, Juan Ramón Pérez-Pérez:
Designing Case Studies for the Voice Interactive Classroom. 667-672 - Pedro Javier del Cid, Nelson Matthys, Christophe Huygens, Sam Michiels, Wouter Joosen, Danny Hughes:
Sensor Middleware to Support Diverse Data Qualities. 673-676 - Jinfu Wang, John Bigham, Jiayi Wu:
Enhance Resilience and QoS Awareness in Message Oriented Middleware for Mission Critical Applications. 677-682
Computer Architecture
- Bisrat Tafesse, Ashwini Raina, Jaya Suseela, Venkatesan Muthukumar:
Efficient Scheduling Algorithms for MpSoC Systems. 683-688 - Xinyu Guo, Hong Wang, Vijay Kumar Devabhaktuni:
Design of a FPGA-Based Parallel Architecture for BLAST Algorithm with Multi-hits Detection. 689-694 - Saketh Bharadwaja, Weiqing Sun, Mohammed Y. Niamat, Fangyang Shen:
Collabra: A Xen Hypervisor Based Collaborative Intrusion Detection System. 695-700 - Bing Qi, Fangyang Shen:
Propagation Models for Multi-hop Wireless Networks in Ns-2 Simulator. 701-706 - Lakshmi Deepika Bobbala, Byeong Kil Lee:
Hybrid-way Cache for Mobile Processors. 707-712 - Arzu Gosney, John H. Miller, Ian Gorton, Christopher S. Oehmen:
An Adaptive Middleware Framework for Optimal Scheduling on Large Scale Compute Clusters. 713-718 - Amir Ali Semnanian, Jeffrey Pham, Burkhard Englert, Xiaolong Wu:
Virtualization Technology and its Impact on Computer Hardware Architecture. 719-724
Model-based Software Development
- Kamrul Hasan Talukder, Koichi Harada:
Modeling the Communications in the Multi-threaded System for Concurrent Wavelet Transform to Compress the Image. 725-730 - Synara Rosa Gomes dos Santos, Melis Mendes Silva, Juliana Cristina Ribeiro da Silva, Luiz Alberto Vieira Dias, Adilson Marques da Cunha:
Modeling and Analyzing Real-Time Embedded Software for a Data Collection System. 731-736 - Claudia Pereira, Liliana Martinez, Liliana Favre:
Recovering Use Case Diagrams from Object Oriented Code: An MDA-based Approach. 737-742 - Suzy Temate, Laurent Broto, Alain Tchana, Daniel Hagimont:
A High Level Approach for Generating Model's Graphical Editors. 743-749 - Fábio Levy Siqueira, Paulo Sérgio Muniz Silva:
Mapping the WRSPM Model to Model-Driven Architecture Models. 750-753 - Jameleddine Hassine:
Early Availability Requirements Modeling Using Use Case Maps. 754-759 - Saeed Parsa, Mehdi Sakhaei-nia:
A New Approach to Determine Number of Loop Iterations for WCET Analysis. 760-765 - Juliano de Almeida Monte-Mor, Elton Oliveira Ferreira, Henrique Fernandes de Campos, Adilson Marques da Cunha, Luiz Alberto Vieira Dias:
Applying MDA Approach to Create Graphical User Interfaces. 766-771
Circuits
- Taufik Taufik, Daniel Forbes, Dale Dolan, Ratna Ika Putri:
Digital Control of Parallel-Connected DC-DC Converters. 772-776 - Mahmoud Fawzy Wagdy, Anurag Nannaka, Rajeev K. N. Channegowda:
A Novel Flash Fast-Locking Digital PLL: VHDL-AMS and Matlab/Simulink Modeling and Simulations. 777-784 - Saiyu Ren, Ray Siferd:
CMOS 1.6 GHz Bandwidth 12 Bit Time Interleaved Pipelined ADC. 785-790
AI Applications
- Antonio Mira Lopez, Douglas R. Heisterkamp:
Simulated Annealing Based Hierarchical Q-Routing: A Dynamic Routing Protocol. 791-796 - Manoj Banik, Md. Rashiduzzaman Rasel, Aloke Kumar Saha, Foyzul Hassan, Mohammed Firoz Mridha, Mohammad Nurul Huda:
Development of Analysis Rules for Bangla Part of Speech for Universal Networking Language. 797-802 - Jörg Lässig, Benjamin Satzger, Oliver Kramer:
Self-Stabilization in Hierarchically Structured Energy Markets. 803-809 - Ronald J. Nowling, Holger Mauch:
Priority Encoding Scheme for Solving Permutation and Constraint Problems with Genetic Algorithms and Simulated Annealing. 810-815 - Christopher A. Ballinger, David A. Turner, Arturo I. Concepcion:
Artificial Intelligence Design in a Multiplayer Online Role Playing Game. 816-821
Innovative E-Services
- Yunhee Kang:
Data Aggregation Scheme for a Mashup Based Internet Application. 822-827 - Wei-Lun Chang, Yu Jyun Lin:
Using Fuzzy theory to Explore the Appropriateness of Customer-Oriented E-Service Cooperation. 828-832 - Yi-Wen Liao, Yi-Shun Wang, Tzung-I Tang, Yi-Wen Tian:
Investigating the Influence of the Landscape Preference of Blogs, User Satisfactory and Behavioral Intention. 833-838 - Aviv Segev, Jussi Kantola:
Patent Service Self-Organizing Maps. 839-844 - Shari S. C. Shang, Ya-Ling Wu:
An Analysis of Customer Contribution in a Bank. 845-850 - Yen-Hao Hsieh:
A System Dynamics Approach for Modeling Service Recovery. 851-858
Social Computing
- Christian Menkens, Julian Sussmann, Miriam Al-Ali, Emanuel Breitsameter, Jelena Frtunik, Tobias Nendel, Tobias Schneiderbauer:
EasyWheel - A Mobile Social Navigation and Support System for Wheelchair Users. 859-866 - Hsia-Ching Chang, Chen-Ya Wang:
No Cue, No Clue? Understanding Information Interaction in Social Bookmarking Services. 867-872 - Khasfariyati Razikin, Keng Tiong Tan, Dion Hoe-Lian Goh, Alton Yeow-Kuan Chua, Chei Sian Lee:
SPLASH: Perspectives on Mobile Socializing, Playing and Content Sharing. 873-878 - Jennifer Terrell:
Transmediated Magic: Sociality in Wizard Rock. 879-883 - Sang Su Lee, Tagyoung Chung, Dennis McLeod:
Dynamic Item Recommendation by Topic Modeling for Social Networks. 884-889 - Samir N. Hamade:
The Impact of Mobile Phones on the Life of Farmers in Lebanon. 890-895
Toward Next-Generation Self-Organizing Perspectives, Principles, and Patterns
- H. Van Dyke Parunak:
Swarming on Symbolic Structures: Guiding Self-Organizing Search with Domain Knowledge. 896-901 - Rick Dove:
Patterns of Self-Organizing Agile Security for Resilient Network Situational Awareness and Sensemaking. 902-908 - Kari J. Lippert, Robert A. Seger:
The Story Behind Network Defense. 909-913 - Rick A. Jones, Barry M. Horowitz:
System-Aware Cyber Security. 914-917 - Jereme N. Haack, Glenn A. Fink, Wendy M. Maiden, A. David McKinnon, Steven J. Templeton, Errin W. Fulp:
Ant-Based Cyber Security. 918-926 - Russell Cameron Thomas:
Formal Methods for Modeling Socio-technical Innovation between Adversaries. 927-936 - Ashish Malviya, Glenn A. Fink, Landon Sego, Barbara Endicott-Popovsky:
Situational Awareness as a Measure of Performance in Cyber Security Collaborative Work. 937-942 - Jennifer L. Bayuk:
Alternative Security Metrics. 943-946 - Len Troncale:
Can a Theory that Integrates the Natural Systems Sciences Help Systems Engineering of Defense against Security Threats? 947-952
Networks, Computing Theory, Algorithms
- Mohammad Hossein Rezvani, Morteza Analoui:
A Case for Multi-service Overlay Multicast Networks Based on Auction Mechanism. 953-958 - Javed I. Khan, Omar Y. Tahboub:
Peer-to-Peer Enterprise Data Backup over a Ren Cloud. 959-964 - Yasser Khan, John N. Randall:
Wireless Embedded Control System for Atomically Precise Manufacturing. 965-969 - Laxmi P. Gewali, Reshma Koganti:
Detour Admitting Short Paths. 970-975 - Stefan D. Bruda:
Sublinear Space Real-Time Turing Machines Cannot Count. 976-978 - (Withdrawn) A Stable Election Protocol Based on an Unreliable Failure Detector in Distributed Systems. 979-984
- Kris Erodula, Christian Bach, Hassan Bajwa:
Use of Multi Threaded Asynchronous DNA Sequence Pattern Searching Tool to Identifying Zinc-Finger-Nuclease Binding Sites on the Human Genome. 985-991
Potpourri
- Wafaa Saber Hamed, Haitham S. Hamza, Imane Aly Saroit:
Towards a Unified Trust Model for M-commerce Systems. 992-997 - Venkata N. Ramarekha Patchigolla, John A. Springer, Kyle Lutes:
Embedded Database Management Performance. 998-1001 - Jason Cornwell, Angkul Kongmunvattana:
Efficient System-Level Remote Checkpointing Technique for BLCR. 1002-1007 - Maher Hawash, Marek A. Perkowski, Steve Bleiler, John S. Caughman IV, Amjad Hawash:
Reversible Function Synthesis of Large Reversible Functions with No Ancillary Bits Using Covering Set Partitions. 1008-1013 - Heidi J. C. Ellis, Ronald J. Nowling, Jay Vyas, Timothy O. Martyn, Michael R. Gryk:
Iterative Development of an Application to Support Nuclear Magnetic Resonance Data Analysis of Proteins. 1014-1020 - Mahdi Jampour, Mohsen Jampour, Maryam Ashourzadeh, Mahdi Yaghoobi:
A Fuzzy Expert System to Diagnose Diseases with Neurological Signs in Domestic Animal. 1021-1024
Posters
- Vasudevan Janarthanan, Abdelouahed Gherbi:
Architectures for Dependable Software Systems. 1025-1030 - Jiunn-Tzer Wang, Li-chu Sung:
A Needs Analysis on the Web-based EPSS with Instructional theory (IT) Embedded: An Additional Tool for Teacher Professional Development. 1031-1036 - Alireza Khosropour, Hossein Aghababa, Behjat Forouzandeh:
Quantum Division Circuit Based on Restoring Division Algorithm. 1037-1040 - Raouf Ajami, Anh Dinh:
Embedded Network Firewall on FPGA. 1041-1043 - Mehrdad Saadatmand, Antonio Cicchetti, Diarmuid Corcoran, Mikael Sjödin:
Toward a Tailored Modeling of Non-Functional Requirements for Telecommunication Systems. 1044-1045 - Melis Mendes Silva, Synara Rosa Gomes dos Santos, Juliana Cristina Ribeiro da Silva, Luiz Alberto Vieira Dias, Adilson Marques da Cunha:
Problem Based Learning a Practical Approach for Software Engineering Interdisciplinary Teaching. 1046-1047 - Kishan Dharavath, Sri Khetwat Saritha:
Organizing Extracted Data: Using Topic Maps. 1048-1049 - Andrew Wessels, Mike Purvis, Jahrain Jackson, Syed (Shawon) Rahman:
Remote Data Visualization through WebSockets. 1050-1051 - Li Zhang:
A Feasibility Study on the Adoption of e-Learning for Middle School Teachers' Continuing Education in China. 1052-1053 - Kamrul Hasan Talukder, Koichi Harada:
Enhancement of Discrete Wavelet Transform (DWT) for Image Transmission over Internet. 1054-1055 - Fausto A. Jacques, Luis R. Corral, Gerardo Rodriguez:
A Decision Support System for Hypertext-Based Teaching and Learning Systems. 1056-1057 - Vineeth Simon Arackal, B. Arunachalam, Payal Saluja, B. B. Prahlada Rao:
Co-existence of Cloud and Grid: A Case Study in Service Oriented Grid GARUDA. 1058-1059 - Xuesong (Sonya) Zhang, Bradley Dorn:
Agile Practices in a Small-Scale, Time-Intensive Web Development Project. 1060-1061 - Anirban Ghosh, Navarun Gupta:
Online Database for Kolkata Transport System. 1062-1063 - Weijie Chu, Weiping Li, Tong Mo, Zhonghai Wu:
A Context-Source Abstraction Layer for Context-aware Middleware. 1064-1065 - Andrew Wessels, Mike Purvis, Syed (Shawon) Rahman:
Usability of Web Interfaces on Mobile Devices. 1066-1067 - Mansaf Alam:
Access Specifiers Model for Data Security in Object Oriented Databases. 1068-1069 - Suresh V. Limkar, Rakesh Kumar Jha, Shilpa Pimpalkar, Santosh Darade:
Geo-Encryption - A New Direction to Secure Traditional SSL VPN. 1070-1071 - Jangkyu Yun, Byung-hwa Lee, Young-mi Baek, Junhyung Kim, Jihun Han, Seungyong Oh, Seonhwan Hwang, Kijun Han:
An Implementation of AODV Testbed with Multi-metrics. 1072-1073 - Abdelbaset S. Hamza:
On the Impact of Network Parameters on the Efficiency of Spectrum Allocation in Cognitive Radio Networks. 1074-1075 - Azeem Ahmad, Magnus Goransson, Sushma Joseph Kolla, Aamir Shahzad, Muhammad Qummer Ul Arfeen, Zaki Arshad:
Requirements Development Life Cycle with Respect to Geographically Distributed Stakeholders: The "V" Model. 1076-1077 - Wajee Chookittikul, Kiattisak Kittitarworanon, Maytinee Sri-in, Aungsuda Ab-aim:
Building SCAAT-Industry Relationships via Disaster Recovery Planning. 1078-1079 - Sahar Naserzadeh, Mehrdad Jalali:
Channel Estimation and Symbol Detection in AWGN Channel for New Structure of CDMA Signals. 1080-1081 - Xinyu Zhang, Li Zheng, Yiqian Lu:
The Exploration of the Core Asset Library in the Software Product Line. 1082-1083 - Sri Khetwat Saritha, Kishan Dharavath:
Domain and Keyword Specific Data Extraction from Invisible Web Databases. 1084-1085 - Heap-Yih Chong, Rosli Mohamad Zin:
Transforming of Construction Contract Administration: Data Warehouse Modeling. 1086-1087 - Thara Ravindran, Alton Yeow-Kuan Chua, Dion Hoe-Lian Goh:
Whither Mobile Social Application Prototypes? Implications for Development and Research. 1088-1089 - Saurabh Agrawal, Nishchal K. Verma, Prateek Tamrakar, Pradip Sircar:
Content Based Color Image Classification using SVM. 1090-1094 - SatyendraNath Mandal, J. Pal Choudhury, Debasis Mazumdar, Dilip De, S. R. Bhadra Chaudhury:
Application of Neuro-Statistic Model on a Time Series Data. 1095-1096 - Carina S. González-González, Victor Socas Guerra:
Using the Eye Tracking Technique to Evaluate Non-Linear Narratives. 1097-1098 - Jesús Ubaldo Quevedo-Torrero:
Attracting K12 Students with Standardized Outreach Activities. 1099-1100 - Ashish Mani, Chellapilla Patvardhan:
Some Investigations for Solving Constrained Optimization Problems using Adiabatic Quantum Computation. 1101-1102
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.