The Community for Technology Leaders
Computer and Information Science, 5th IEEE/ACIS International Conference on (2006)
Honolulu, Hawaii
July 10, 2006 to July 12, 2006
ISBN: 0-7695-2613-6
TABLE OF CONTENTS
Introduction
Keynote Address
1A: Parallel and Distributed Computing and Systems

A Grid Scheduling Algorithm for Bag-of-Tasks Applications Using Multiple Queues with Duplication (Abstract)

Young Choon Lee , University of Sydney, Australia
Albert Y. Zomaya , University of Sydney, Australia
pp. 5-10

Model the MPI Performance for non-Contiguous Data (Abstract)

Thuy T. Le , San Jose State University
pp. 17-22

Optimized Algorithm for Computing Invariants of Ordinary Petri Nets (Abstract)

Chong-Fatt Law , Nanyang Technological University
Bah-Hwee Gwee , Nanyang Technological University
Joseph S. Chang , Nanyang Technological University
pp. 23-28

Radiative Heat Transfer Simulation Using Programmable Graphics Hardware (Abstract)

Hiroyuki Takizawa , Tohoku University, Japan
Noboru Yamada , Nagaoka University of Technology, Japan
Seigo Sakai , Yokohama National University
Hiroaki Kobayashi , Tohoku University, Japan
pp. 29-37
1B: Software Metrics and Project Management

An Empirical Study to Investigate Software Estimation Trend in Organizations Targeting CMMI^SM (Abstract)

Mehwish Nasir , National University of Sciences and Technology, Pakistan
H. Farooq Ahmad , Communication Technologies Omachi Aoba-ku Sendai, Japan
pp. 38-43

Decoupling Metrics for Services Composition (Abstract)

Kai Qian , Southern Polytechnic State University, Marietta, Georgia, USA
Jigang Liu , Metropolitan State University St. Paul, Minnesota, USA
Frank Tsui , Southern Polytechnic State University, Marietta, Georgia, USA
pp. 44-47

Improving Accuracy of Multiple Regression Analysis for Effort Prediction Model (Abstract)

Kazunori Iwata , Aichi University, Japan
Toyoshiro Nakashima , Sugiyama Jogakuen University, Japan
Yoshiyuki Anan , Quality Assurance Group, Omron Software Co., Ltd., Japan
Naohiro Ishii , Aichi Institute of Technology, Japan
pp. 48-55

An Approach to Analyzing the Windows and Linux Security Models (Abstract)

Xinyue Song , Central Michigan University, Mt Pleasant, MI
Michael Stinson , Central Michigan University, Mt Pleasant, MI
Roger Lee , Central Michigan University, Mt Pleasant, MI
Paul Albee , Central Michigan University, Mt Pleasant, MI
pp. 56-62
2A: Communication Systems and Networks

A Hierarchical Packet Scheduler for Differentiated Services in High-Speed Networks (Abstract)

Chin-Chi Wu , National Chung-Hsing University
Hsien-Ming Wu , National Chung-Hsing University
Chiou Moh , Nan-Kai Institute of Technology
Woei Lin , National Chung-Hsing University
pp. 63-68

Design of Customer-based AQM Routers to Achieve Fair Inter-server Bandwidth Allocation (Abstract)

Hsien-Ming Wu , National Chung-Hsing University, Taiwan
Chin-Chi Wu , National Chung-Hsing University, Nan Kai Institute of Technology, Taiwan
Woei Lin , National Chung-Hsing University, Taiwan
pp. 69-74

Reducing the Requirement in FEC Codes via Capillary Routing (Abstract)

Emin Gabrielyan , Switzernet S?rl and EPFL Lausanne, Switzerland
Roger D. Hersch , ?cole Polytechnique F?d?rale de Lausanne (EPFL), Switzerland
pp. 75-82

Security Gateway for Accessing IPv6 WLAN (Abstract)

Chih-Mou Shih , National Chung- Hsing University, Taiwan
Shang-Juh Kao , National Chung- Hsing University, Taiwan
pp. 83-88

Topology Discovery for Coexisting IPv6 and IPv4 Networks (Abstract)

I-Ping Hsieh , National Chung-Hsing University Taichung, Taiwan
Shang-Juh Kao , National Chung-Hsing University Taichung, Taiwan
pp. 89-95
2B: COMSAR Workshop I

A Distributed Topic Map Architecture for Enterprise Knowledge Management (Abstract)

Axel Korthaus , University of Mannheim
Stefan Henke , University of Mannheim
Markus Aleksy , University of Mannheim
Martin Schader , University of Mannheim
pp. 96-102

Mapping COSA Software Architecture Concepts into UML 2.0 (Abstract)

Tahar Khammaci , LINA FRE CNRS Universit? de Nantes, France
Adel Smeda , LINA FRE CNRS Universit? de Nantes, France
Mourad Oussalah , LINA FRE CNRS Universit? de Nantes, France
pp. 109-114

Multi-Agent Testing Architecture for Monitoring and Analyzing the Performance of Web Applications (Abstract)

Huiming Yu , North Carolina A&T State University
Jin Zhang , Andres Pearson Industries, Winston-Salem, NC
Jinsheng Xu , North Carolina A&T State University
pp. 115-120

Analyzing Security Interoperability during Component Integration (Abstract)

Ebenezer A. Oladimeji , Verizon Communications Irving, Texas
Lawrence Chung , University of Texas at Dallas
pp. 121-129
3A: Data Mining, Data Warehousing and Database

Fault Tolerant Non-trivial Repeating Pattern Discovering for Music Data (Abstract)

Yu-lung Lo , Chaoyang University of Technology
Chun-yu Chen , Chaoyang University of Technology
pp. 130-135

A Study for Forecasting Water Supply Demand in the Area-K Waterworks Service Area (Abstract)

Yukio MARUYAMA , Japan Biological Information Research Center, JBiC Tokyo
Hisashi YAMAMOTO , Tokyo Metropolitan University
pp. 136-141

Incorporating Heterogeneous XML Formats Using Relational Database (Abstract)

Sungchul Hong , CIS Department, Towson University
Yeong-Tae Song , CIS Department, Towson University
pp. 142-147

Text Classification by Combining Grouping, LSA and kNN (Abstract)

Naohiro Ishii , Aichi Institute of Technology
Tsuyoshi Murai , Aichi Institute of Technology
Takahiro Yamada , Aichi Institute of Technology
Yongguang Bao , Aichi Institute of Technology
pp. 148-154
3B: COMSAR Workshop II

Enhanced Facilitated Application Specification Techniques (eFAST) (Abstract)

Karim Dad , COMSATS Institute of Information Technology Abbottabad,NWFP Pakistan
Atif Neuman Jamil , COMSATS Institute of Information Technology Abbottabad,NWFP Pakistan
pp. 155-159

Representing Security Goals, Policies, and Objects (Abstract)

Ebenezer A. Oladimeji , Verizon Communications Irving, Texas
Sam Supakkul , University of Texas at Dallas
Lawrence Chung , University of Texas at Dallas
pp. 160-167

A Study on the Application of Six Sigma Tools to PSP/TSP for Process Improvement (Abstract)

Youngkyu Park , Information and Communications University, Korea
Hyuncheol Park , Information and Communications University, Korea
Hojin Choi , Information and Communications University, Korea
Jongmoon Baik , Information and Communications University, Korea
pp. 174-179

TUG: An Executable Specification Language (Abstract)

Chia-Chu Chiang , University of Arkansas at Little Rock, Arkansas
pp. 180-186
4A: Data Mining AND Information Management Systems

Measuring the Benefits of Summarizing Quantitative Information in Pervasive Computing Systems (Abstract)

Faraz Rasheed , Kyung Hee University, Suwon, Korea
Young-Koo Lee , Kyung Hee University, Suwon, Korea
Sungyoung Lee , Kyung Hee University, Suwon, Korea
pp. 187-192

An Extended Cellular Automata Model for Data Mining of Land Development Data (Abstract)

Gongzhu Hu , Central Michigan University, USA
Yichun Xie , Eastern Michigan University, USA
pp. 201-207
4B: Mobile/Wireless Computing and Internet Technology and Applications

K-Interleaving Rendezvous Overlay Network Construction Scheme (Abstract)

Khaled Ragab , Japan Science and Technology Agency, University of Tokyo
Yoshihiro Oyama , Japan Science and Technology Agency, University of Tokyo
Akinori Yonezawa , Japan Science and Technology Agency, University of Tokyo
pp. 208-213

Session Initiation Protocol (SIP) based Event Notification System Architecture for Telemedicine Applications (Abstract)

A. Sadat , Bangladesh Open University, Bangladesh
G. Sorwar , Southern Cross University, Australia
M. U. Chowdhury , Deakin University-Melbourne, Australia
pp. 214-218

Hoarding and prefetching for mobile databases (Abstract)

Mariano Cravo Teixeira Neto , Federal University of Pernambuco - UFPE, Brazil
Ana Carolina Salgado , Federal University of Pernambuco - UFPE, Brazil
pp. 219-224

Enhancing the Horizons of Mobile Computing with Mobile Agent Components (Abstract)

Gilda Pour , San Jose State University, Cisco
Nivedita Laad , San Jose State University, Cisco
pp. 225-230
5A: Software Engineering and Information Engineering I

A Method to Generate C# Code from MDA/PSM for Enterprise Architecture (Abstract)

Deuk Kyu Kum , Soongsil University, Seoul, Korea
Soo Dong Kim , Soongsil University, Seoul, Korea
pp. 238-243

Eliciting an Enhancive Maintenance Model in Three Organisations in Ghana (Abstract)

Mira Kajko-Mattsson , Stockholm University and Royal Institute of Technology
Michael Bosu , Stockholm University and Royal Institute of Technology
pp. 244-251

Searching Pareto Solutions of Bi-objective NVP System Design Problem with Breadth First Search Method (Abstract)

Hidemi Yamachi , Nippon Institute of Technology, Japan
Hisashi Yamamoto , Tokyo Metropolitan University, Japan
pp. 252-258

Project Automation: Case study on the NeOSS Project (Abstract)

Yong-kee Jeong , KT Network Technology Lab, Korea
Jun-Suk Oh , KT Network Technology Lab, Korea
Hyun-min Lim , KT Network Technology Lab, Korea
pp. 259-264

Raising Local Density for Object Reconstruction using Auxiliary Points (Abstract)

Bin-Shyan Jong , Chung Yuan Christian University, Taiwan
Pai-Feng Lee , Chung Yuan Christian University, Taiwan
Juin-Ling Tseng , Chung Yuan Christian University and Chin Min Institute of Technology, Taiwan
pp. 265-270

On History-Sensitive Models of Interactive Queues (Abstract)

Walter Dosch , University of Lubeck, Germany
Wuttipong Ruanthong , Chulalongkorn University, Bangkok, Thailand
pp. 271-279
5B: Information Management Systems and Management Information Systems and Technology Education and Training

Application Services Based on Personal Data Ontology (Abstract)

Yu-Chen Chen , National Chung-Hsing University Taichung, Taiwan
Shang-Juh Kao , National Chung-Hsing University Taichung, Taiwan
pp. 280-285

Content Validating the B2E Portal User Satisfaction Instrument (Abstract)

Dewi Rooslani Tojib , Monash University, Australia
Ly-Fie Sugianto , Monash University, Australia
pp. 286-291

New Network Management System with Communication Control of the Client (Abstract)

Kazuya Odagiri , Aichi Institute of Technology
Rihito Yaegashi , Toyota Technological Institute
Masaharu Tadauchi , Toyota Technological Institute
Naohiro Ishii , Aichi Institute of Technology
pp. 292-298

A Web- and Problem-Based Learning System in Artificial Intelligence (Abstract)

Victor R.L. Shen , National Formosa University, Taiwan
Tong-Ying Juang , National Taipei University, Taiwan
pp. 299-304

Enhancing Undergraduates? Capabilities of Practice and Innovation to Meet the Regional Needs (Abstract)

Zhu Yanqin , Soochow University, Suzhou, China
Yang Jiwen , Soochow University, Suzhou, China
Zhu Qiaoming , Soochow University, Suzhou, China
pp. 305-309
6A: Image Processing and Pattern Recognition Track

A New Approach to Persian/Arabic Text Steganography (Abstract)

M. Hassan Shirali-Shahreza , Yazd University Yazd, IRAN
Mohammad Shirali-Shahreza , Sharif University of Technology Tehran, IRAN
pp. 310-315

Collage Steganography (Abstract)

Mohammad Shirali-Shahreza , Sharif University of Technology Tehran, IRAN
Sajad Shirali-Shahreza , Sharif University of Technology Tehran, IRAN
pp. 316-321

Fast Polygonal Approximation Based on Genetic Algorithms (Abstract)

Yao-Hong Tsai , Hsuan Chuang University, Hsinchu 300, Taiwan
pp. 322-326

Image Features Extraction for Multimedia Database Content Description (Abstract)

Shu-Sheng Hao , Chung Cheng Institute of Technology,National Defense University
pp. 327-332

Irregular Patch for Image Synthesis (Abstract)

Changzhen Xiong , Sun Yat-sen University, Guangzhou,China
Jing Huang , Beijing Normal University, China
Dongxu Qi , Sun Yat-sen University, Guangzhou,China
Jiancheng Zou , North China University of Technology, Beijing, China
pp. 333-337

Gradient Non-Linearity Correction of MR Images for Functional Radiosurgery (Abstract)

Tom S. Lee , California State University, San Bernardino
Keith E. Schubert , California State University, San Bernardino
Reinhard W. Schulte , Loma Linda University Medical Center
pp. 338-344
7A: Computer Architecture and Software Testing and Tools

A New Computer Architecture Using a New Program Driving Method (Abstract)

Xiaobo Li , Changsha University of Science and Technology Changsha, Hunan, China
Xiangdong Cui , Changsha University of Science and Technology Changsha, Hunan, China
Xiaoqiang Ni , Changsha University of Science and Technology Changsha, Hunan, China
Chiyuan Ma , Changsha University of Science and Technology Changsha, Hunan, China
Jingfei Jiang , Changsha University of Science and Technology Changsha, Hunan, China
Huiping Zhou , Changsha University of Science and Technology Changsha, Hunan, China
Zhou Zhou , Changsha University of Science and Technology Changsha, Hunan, China
Ke Luo , Changsha University of Science and Technology Changsha, Hunan, China
Jiangsha Deng , Changsha University of Science and Technology Changsha, Hunan, China
pp. 345-349

Analysis and Performance Results of a fluid dynamics Application on MASA Stream Processor (Abstract)

Mei Wen , National University of Defense Technology
Nan Wu , National University of Defense Technology
Changqing Xun , National University of Defense Technology
Wei Wu , National University of Defense Technology
Chunyuan Zhang , National University of Defense Technology
pp. 350-354

Efficient BISR Techniques for Word-Oriented Embedded Memories with Hierarchical Redundancy (Abstract)

Shyue-Kung Lu , Fu Jen Catholic University, Taipei, Taiwan
Chun-Lin Yang , Fu Jen Catholic University, Taipei, Taiwan
Han-Wen Lin , Fu Jen Catholic University, Taipei, Taiwan
pp. 355-360

Performance of PGA (Programmable Graph Architecture) for Matrix Multiplications (Abstract)

Muling Peng , State University of NY at Stony Brook
Sreekanth Ramani , State University of NY at Stony Brook
K. Wendy Tang , State University of NY at Stony Brook
A. Yavuz Oruc , University of Maryland at College Park
pp. 361-367

Program Analysis and Testing of Database Applications (Abstract)

S. K. Gardikiotis , Athens University of Economics and Business
N. Malevris , Athens University of Economics and Business
pp. 368-373

Towards Destructive Software Testing (Abstract)

Kiumi Akingbehin , University of Michigan-Dearborn
pp. 374-377
8A: Software Engineering and Information Engineering II

Enabling Multiple Conferences in Recordable Virtual Collaboration (Abstract)

Meekyeong Kim , Sangmyung University, Seoul, Korea
Chuleui Hong , Sangmyung University, Seoul, Korea
Yeong-Tae Song , Towson University, Towson MD, U.S.A.
pp. 378-382

Software Source Code Correlation (Abstract)

Robert Zeidman , President, Zeidman Consulting, Cupertino, CA, USA
pp. 383-392

Writing Use-Case with a Minimal Set of Words (Abstract)

Takao Osaki , NEC Corporation, Japan
Atsushi Kobayashi , NEC Corporation, Japan
Takuo Kato , NEC Corporation, Japan
pp. 393-398

Mapping between Temporal Scripts of Animation Component and SMIL Document using UML Sequence Diagram (Abstract)

Yan Ha , Kyungin Women?s College, Korea
Roger Lee , Central Michigan University, U.S.A
pp. 399-404

Generating Java Skeletal Code with Design Contracts from Specifications in a Subset of Object Z (Abstract)

Sowmiya Ramkarthik , California State University Sacramento
Cui Zhang , California State University Sacramento
pp. 405-411
8B: Artificial Intelligence, Image and Signal Processing

Index Fund Optimization Using GA Based on Coefficients of Determination (Abstract)

Yukiko Orito , Ashikaga Institute of Technology, Japan
Jun Takano , Ashikaga Institute of Technology, Japan
Manabu Takeda , Tokyo Metropolitan University, Japan
Hisashi Yamamoto , Tokyo Metropolitan University, Japan
pp. 412-417

Acoustic Pressure Minimization Using H2 Control (Abstract)

Wen-Kung Tseng , Nan Kai Institute of Technology, Nantou, Taiwan
Shun-Cheng Lien , Nan Kai Institute of Technology, Nantou, Taiwan
pp. 418-423

Adaptive Sampling via Histogram Equalization using an Active Walker Model (Abstract)

Oladipo O. Fadiran , Clark Atlanta University, USA
Peter Molnar , Clark Atlanta University, USA
Lance M. Kaplan , U.S. Army Research Laboratory, Adelphi, MD
pp. 424-432
9A: Information Assurance

Information Relevance Management Model - A New Strategy in Information Security Management in the Outsourcing Industry (Abstract)

Dai Yulin , Dalian Municicipal People?s Government
Li Shiying , Informedia Electronic Co., Ltd., Dalian, China
Luo Yi , Technological Research Institute, Dalian, China
pp. 433-438

Research on the Intelligent Network Storage Platform for the Military Information Source (Abstract)

Lianxing Jia , Communications Command Academy
Zhifeng Chen , Communications Command Academy
Chenhui Li , Communications Command Academy
Feng Dan , Huazhong University of Science & Technology
pp. 439-443

Improving the Usability of a Virtual Assembly Environment with the Integration of Multi-sensory Feedback (Abstract)

Ying Zhang , University of Cambridge, UK
Adrian Travis , University of Cambridge, UK
Terrence Fernando , University of Salford, UK
Hannan Xiao , University of Hertfordshire, UK
pp. 444-451
9B: Intelligent Agent Technology and Agent Based Systems

Behavior Coordination Mechanism for Intelligent Home (Abstract)

Minkyoung Kim , Intelligent Robot Research Division, Korea
Hyun Kim , Intelligent Robot Research Division, Korea
pp. 452-457

Solving Distributed Mutual Exclusion using Cooperating Mobile Agents (Abstract)

F. Ahmad , SCS, Carleton University, Canada
N. Santoro , SCS, Carleton University, Canada
A. Nayak , SITE, University of Ottawa, Canada
N. Goel , Tecsis Corporation, Ottawa, ON K2E 7L5, Canada
A. Patnaik , Tecsis Corporation, Ottawa, ON K2E 7L5, Canada
A. Srivastava , Tecsis Corporation, Ottawa, ON K2E 7L5, Canada
pp. 458-463

Towards successful automated negotiations based on Neural Networks (Abstract)

Ioannis V. Papaioannou , National Technical University of Athens, Greece
Ioanna G. Roussaki , National Technical University of Athens, Greece
Miltiades E. Anagnostou , National Technical University of Athens, Greece
pp. 464-472
10A: Web Engineering and Applications Track

Browser Compatible XLink Processing (Abstract)

Tseng-Chang Yen , National Chung-Hsing University, Taiwan
Felix Hsu , National Chung-Hsing University, Taiwan
Shang-Juh Kao , National Chung-Hsing University, Taiwan
pp. 473-478

Integration of QoS Queuing Schedules to QoS Caching Schemes (Abstract)

YONG ZHANG , Trent University, Peterborough, ON Canada
WENYING FENG , Trent University, Peterborough, ON Canada
RICHARD HURLEY , Trent University, Peterborough, ON Canada
pp. 479-484

Web-Based System for Electronic Navigational Charts Using GML and SVG (Abstract)

Seung Chul Kam , Ohsung Co., Ltd.,Korea
Seong Dae Lee , Maritime University,Korea
Hyu Chan Park , Univ. of Queensland, Australia
Xiaofang Zhou , Univ. of Queensland, Australia
pp. 485-491
10B: Data Mining, Software Engineering, and Intelligent Agent Technology

Modeling the Network of Loyalty-Profit Chain In Chemical Industry (Abstract)

Carl Lee , Central Michigan University, Mt. Pleasant, MI
Tim Rey , Dow Chemical Company, Midland, MI
Olga Tabolina , Dow Chemical Company, Midland, MI
James Mentele , Central Michigan University Research Corporation, Mt. Pleasant, MI
Tim Pletcher , Central Michigan University Research Corporation, Mt. Pleasant, MI
pp. 492-499

Empirical Validation of Test-Driven Pair Programming in Game Development (Abstract)

Shaochun Xu , Algoma University College, Laurentian University,
Vaclav Rajlich , Wayne State University
pp. 500-505

Web-Based Intelligent Tutoring Systems in K-12 Settings (Abstract)

Kausalai Kay Wijekumar , Pennsylvania State Univesity, Monaca, PA
James Spielvogel , Pennsylvania State Univesity, University Park, PA
pp. 506-510
Author Index

Author Index (PDF)

pp. 511
78 ms
(Ver 3.3 (11022016))