The Community for Technology Leaders
Computing in the Global Information Technology, International Multi-Conference on (2007)
Gosier, Guadaloupe
Mar. 4, 2007 to Mar. 9, 2007
ISBN: 0-7695-2798-1
TABLE OF CONTENTS
Introduction

Preface (PDF)

pp. x

Copyright (PDF)

pp. xi

Committees (PDF)

pp. xii
ICCGI1: Mobility/Wireless

An Architectural Model for Applications Based on Mobile Services (Abstract)

Luiz Gustavo L. Moura , Federal University of Rio de Janeiro, Brazil
Fabricio B. Goncalves , Federal University of Rio de Janeiro, Brazil
Izalmo P. Silva , Federal University of Rio de Janeiro, Brazil
Carlo E.T. Oliveira , Federal University of Rio de Janeiro, Brazil
pp. 2

Adaptive Autonomous Agent Models for Open Distributed Systems (Abstract)

Sebastien Leriche , IRIT-Universite Paul Sabatier, France
Jean-Paul Arcangeli , IRIT-Universite Paul Sabatier, France
pp. 4
ICCGI2: Test/Validation/Evaluation

Saying, "I Am Testing," is Enough to Improve the Product: An Empirical Study (Abstract)

Pierre N. Robillard , Ecole Polytechnique de Montreal, Canada
Tiego Francois-Brosseau , Ecole Polytechnique de Montreal, Canada
pp. 5

Main Features of the Web Programming Language OPScript (Abstract)

Vicente Arturo Romero Zaldivar , University of the Basque Country, Spain
Jon A. Elorriaga , University of the Basque Country, Spain
Mateo Jeronimo Lezcano Brito , University of Las Villas, Cuba
pp. 6

A Metric for Paraphrase Detection (Abstract)

Gael Dias , University of Beira Interior, Portugal
Joao Cordeiro , University of Beira Interior, Portugal
Pavel Brazdil , University of Porto, Portugal
pp. 7

RPB in Software Testing (Abstract)

Wei Hoo Chong , Motorola Multimedia Malaysia
pp. 8

Evaluation of a Learning Management System for Adaptivity Purposes (Abstract)

Costin Badica , University of Craiova, Romania
Elvira Popescu , Universite de Technologie de Compiegne, France; University of Craiova, Romania
Philippe Trigano , Universite de Technologie de Compiegne, France
pp. 9
ICCGI3: Networking

Optical CDMA; Optical Parallel Interference Cancellation Using the Lowest Threshold Value (Abstract)

A. Mohammed , Universiti Technologi PETRONAS, Malaysia
E.I. Babekir , Universiti Technologi PETRONAS, Malaysia
A.A. Aziz , Universiti Technologi PETRONAS, Malaysia
N. Elfadel , Universiti Technologi PETRONAS, Malaysia
N.M. Saad , Universiti Technologi PETRONAS, Malaysia
pp. 10

Analysis of Broadband Diffusion in OECD Countries (Abstract)

JunSeok Hwang , Seoul National University, Korea
Mohsen Gerami , Seoul National University, Korea
pp. 11

On the Behavior of LMS Adaptive Algorithm in MMSE Receivers for DS-CDMA Systems (Abstract)

Calin Vladeanu , University Politehnica of Bucharest, Romania
Constantin Paleologu , University Politehnica of Bucharest, Romania
pp. 12

Mapping Techniques for an Ontology Network (Abstract)

Antonio Pena , CRC Information Technologies, Spain
Jose Cremades , CRC Information Technologies, Spain
Carmen Costilla , Technical University of Madrid, Spain
Maria J. Rodriguez , CRC Information Technologies, Spain
pp. 13
ICCGI4: Data Base/Video

Database Replication with Availability and Consistency Guarantees through Failure-Handling (Abstract)

Bagher Zareie , Azad University, Iran
Morteza Abbaszadeh Meinagh , Azad University, Iran
Ayaz Isazadeh , Tabriz University, Iran
Mehdi Ayar , Azad University, Iran
Fariborz Mahmoudi , Islamic Azad University, Iran
pp. 14

From Standard Definition to High Definition Migration in Current Digital Video Broadcasting (Abstract)

Vit Novotny , Brno University of Technology, Czech Republic
Kamil Bodecek , Brno University of Technology, Czech Republic
pp. 15

Distributed Data Storage with Strong Offline Access Support (Abstract)

Ludek Matyska , Masaryk University, Czech Republic
Lukas Hejtmanek , Masaryk University, Czech Republic
pp. 16

Theatrical Place in a 3D CVE: An Online Performance of Plato's Allegory of the Cave in a Distributed 3D CVE (Abstract)

Stephen Viller , Queensland University, Australia
Theodor G. Wyeld , Queensland University, Australia
Ekaterina Prasolova-Forland , Norwegian University of Science and Technology, Norway
pp. 17
ICCGI5: Algorithms I

A Heuristic Map-Matching Algorithm by Using Vector-Based Recognition (Abstract)

Weifeng Lv , Beihang University, China
Dongdong Wu , Beihang University, China
Tongyu Zhu , Beihang University, China
Xin Gao , Beihang University, China
pp. 18

Weighted Information Retrieval Algorithms for Onsite Object Service (Abstract)

Ping Cai , East China Normal University, China
Liang He , East China Normal University, China
pp. 19

Grid Enablement of Applications Using Application Dependency Graph (Abstract)

Preethy Iyer , Satyam Computer Services Limited, India
Srividya Gopalan , Satyam Computer Services Limited, India
Aparna Nagargadde , Satyam Computer Services Limited, India
V. Sridhar , Satyam Computer Services Limited, India
pp. 20

On the Complexity of Decontaminating an Hexagonal Mesh Network (Abstract)

Lisa Xiuli Song , Carleton University, Canada
Paola Flocchini , University of Ottawa, Canada
Nicola Santoro , Carleton University, Canada
pp. 21

Parallel Algebraic Approach of BCH Coding in VHDL (Abstract)

Gabriel M. Almeida , Catholic University (PUCRS), Brasil
Luis Vitorio Cargnini , Instituto de Pesquisas Cientificas e Tecnologicas, Brasil
Eduardo A. Bezerra , Catholic University (PUCRS), Brasil
Rubem Dutra Ribeiro Fagundes , Instituto de Pesquisas Cientificas e Tecnologicas, Brasil
pp. 22
ICCGI6: Algorithms II

Research and Implementation of Design Pattern-Oriented Model Transformation (Abstract)

Dian-Xi Shi , National University of Defense Technology, China
Huai-Min Wang , National University of Defense Technology, China
Xue-Bin Wang , National University of Defense Technology, China
Quan-Yuan Wu , National University of Defense Technology, China
pp. 24

Mining Negative and Positive Influence Rules Using Kullback-Leibler Divergence (Abstract)

Sylvie Guillaume , Universite Blaise Pascal, France
Leila Nemmiche Alachaher , Universite Blaise Pascal, France
pp. 25

Optical CDMA Serial Interference Cancellation: First Cancellation Stage (Abstract)

E.I. Babekir , Universiti Teknologi PETRONAS, Malaysia
A. Mohammed , Universiti Teknologi PETRONAS, Malaysia
N.M. Saad , Universiti Teknologi PETRONAS, Malaysia
A.A. Aziz , Universiti Teknologi PETRONAS, Malaysia
N. Elfadel , Universiti Teknologi PETRONAS, Malaysia
pp. 26

Weakest Preconditions for Applied \pi-Calculus (Abstract)

David Sinclair , Dublin City University, Ireland
Decai Jiao , Dublin City University, Ireland
pp. 27
ICCGI7: Security/Protection I

A Hardware-Based Software Protection Systems--Analysis of Security Dongles with Memory (Abstract)

A. Liber , Wroclaw University of Technology, Poland
I.J. Jozwiak , Wroclaw University of Technology, Poland
K. Marczak , Wroclaw University of Technology, Poland
pp. 28

New Malicious Agents and SK Virii (Abstract)

Nikolaos Alexandris , University of Piraeus, Greece
Constantinos Patsakis , University of Piraeus, Greece
pp. 29

An Empirical Model for Quantifying Security Based on Services (Abstract)

Nikos Alexandris , University of Piraeus, Greece
Emmanouil Serrelis , University of Piraeus, Greece
pp. 30

A Pattern Language for Identity Management (Abstract)

Eduardo B. Fernandez , Florida Atlantic University, USA
Maria M. Larrondo-Petrie , Florida Atlantic University, USA
Nelly Delessy , Florida Atlantic University, USA
pp. 31

Passive Worm Propagation Modeling and Analysis (Abstract)

Hanxun Zhou , Northeastern University, China
Hong Zhao , Northeastern University, China
Yingyou Wen , Northeastern University, China
pp. 32

Security Patterns for Voice over IP Networks (Abstract)

Maria M. Larrondo-Petrie , Florida Atlantic University, USA
Juan C. Pelaez , Florida Atlantic University, USA
Eduardo B. Fernandez , Florida Atlantic University, USA
pp. 33
ICCGI8: Security/Protection II

An Alternative Solution Initiative to Problematic of Computer Science Security of Virus and Malware with Experimentation of Firewalls and Antivirus (Abstract)

Jorge Alberto Ruiz-Vanoye , Universidad Autonoma del Estado de Morelos, Mexico
Ocotlan Diaz-Parra , Universidad Autonoma del Estado de Morelos, Mexico
Juan Carlos Olivares-Rojas , Instituto Tecnologico de Morelia, Mexico
Jorge Omar Ceyca Castro , Universidad Politecnica del Estado de Morelos, Mexico
Alejandro Fuentes Penna , Universidad Politecnica del Estado de Morelos, Mexico
pp. 34

A Perceptron Based Classifier for Detecting Malicious Route Floods in Wireless Mesh Networks (Abstract)

Dharma P. Agrawal , University of Cincinnati, USA
Anindo Mukherjee , University of Cincinnati, USA
Raj Bhatnagar , University of Cincinnati, USA
Lakshmi Santhanam , University of Cincinnati, USA
pp. 35

Identity Information Management in the Network Environment (Abstract)

Yanan Zhang , Beijing University of Technology, China
Jingsha He , Beijing University of Technology, China
pp. 36

Unsupervised Anomaly Detection in Network Traffic by Means of Robust PCA (Abstract)

Roland Kwitt , Salzburg Research, Austria
Ulrich Hofmann , University of Applied Sciences, Austria
pp. 37

The Concept of Complex Events as Suitable Means for Biometric System Implementation (Abstract)

Kornelije Rabuzin , University of Zagreb, Croatia/Hrvatska
Markus Schatten , University of Zagreb, Croatia/Hrvatska
Miroslav Baca , University of Zagreb, Croatia/Hrvatska
pp. 38
ICCGI9: Services

Self-Optimization of a DHT-Based Discovery Science (Abstract)

Jaka Mocnik , XLab d.o.o., Slovenia
Piotr Karwaczynski , Wroclaw University of Technology, Poland
pp. 39

Secure Grid Information Service System (Abstract)

Fan Min , University of Electronic Science and Technology of China
Chunlan Fang , University of Electronic Science and Technology of China
Hongbin Cai , University of Electronic Science and Technology of China
Qihe Liu , University of Electronic Science and Technology of China
pp. 40

A Fully Distributed Mechanism for Locating Mobile Agents (Abstract)

Ming Xie , University of Ottawa, Canada
Paola Flocchini , University of Ottawa, Canada
pp. 41

A User-Centric Model for Supporting Web Services (Abstract)

Jingsha He , Beijing University of Technology, China
Jingna Li , Beijing University of Technology, China
pp. 42

Information Management for Dynamic Networks (Abstract)

Eleanor Hepworth , Roke Manor Research Ltd, UK
Alex Galis , University College London, UK
Ramon Aguero , University of Cantabria, Spain
Kostas Pentikousis , VTT Technical Research Centre of Finland
Raffaele Giaffreda , British Telecommunications plc, U.K.
pp. 43

A Strategy-Based Model for E-Government Planning (Abstract)

Kolsoom Abbasi Shahkooh , Iran Telecommunication Research Center, Iran
Ali Abdollahi , Iran Telecommunication Research Center, Iran
pp. 45
MOC1

On Stubborn Graph Sandwich Problems (Abstract)

Simone Dantas , Universidade Federal Fluminense, Brazil
Luerbio Faria , Universidade do Estado do Rio de Janeiro, Brazil
pp. 46

Scoop: A Complete Methodology for Cooperative Systems Modeling and Analysis (Abstract)

Christophe Lang , Universite de Franche-Comte, France
Herve Guyennet , Universite de Franche-Comte, France
Noureddine Zerhouni , Laboratoire d'automatique de Besanon, France
David Saint-Voirin , Universite de Franche-Comte, France
pp. 47

Distributed Routing Algorithms in all Optical Multi-Rings Topology Networks (Abstract)

Stephane Rousseau , Laboratoire Informatique de Versailles PRiSM, UVSQ, France
Lynda Gastal , Universite Paris, France
pp. 48
IPv6TD1

Is Current 6to4 Relay Deployment Adequate? (Abstract)

David Malone , Hamilton Institute, Ireland
Monica Domingues , Foundation for National Scientific Computing (FCCN), Portugal
Carlos Friacas , Foundation for National Scientific Computing (FCCN), Portugal
pp. 49

IPv6 Field Trial over Regular ADSL Access (Abstract)

Alain Baudot , CORE/CPN, France Telecom R&D Division, France
Pierre Levis , CORE/CPN, France Telecom R&D Division, France
pp. 50

Performance Evaluation of SIPv6 Transitioning (Abstract)

Slobodanka Tomic , ftw., Austria
Martin Petraschek , ftw., Austria
Michael Hirschbichler , Vienna University of Technology, Austria
Thomas Hoeher , ftw., Austria
pp. 51

An Improved Fast Handover Algorithm Based on HMIPv6 (Abstract)

Yu Yong , Lanzhou University of Technology, China
Che Rong , Xi'an Institute for Communication, China
Sun Wei , Lanzhou University of Technology, China
Song Jian , Lanzhou University of Technology, China
Zhang Bao-jie , Lanzhou University of Technology, China; Xi'an Institute for Communication, China
pp. 52
IPv6TD2

Integrating Voice over IP Services in IPv4 and IPv6 Networks (Abstract)

Lambros Lambrinos , Cyprus University of Technology, Cyprus
Peter Kirstein , University College London, UK
pp. 54

Typical DoS/DDoS Threats under IPv6 (Abstract)

Ting Ma , Xi'an Jiaotong University, China
Yi Shi , Xi'an Jiaotong University, China
Xinyu Yang , Xi'an Jiaotong University, China
pp. 55

E-Bicycle Demonstration on the Tour De France (Abstract)

Romain Kuntz , University of Tokyo, Japan
Manabu Tsukada , Keio University, Japan
Nicolas Montavont , GET/ENST, France
Amine Dhraief , GET/ENST, France
pp. 56

Monitoring the Neighbor Discovery Protocol (Abstract)

Frederic Beck , LORIA-INRIA, France
Isabelle Chrisment , LORIA-INRIA, France
Thibault Cholez , LORIA-INRIA, France
Olivier Festor , LORIA-INRIA, France
pp. 57
Author Index

Author Index (PDF)

pp. 58
102 ms
(Ver 3.1 (10032016))