The Community for Technology Leaders
Information Technology: Coding and Computing, International Conference on (2004)
Las Vegas, Nevada
Apr. 5, 2004 to Apr. 7, 2004
ISBN: 0-7695-2108-8
TABLE OF CONTENTS

Reviewers (PDF)

pp. xviii
SESSION MA I: Information Assurance and Security I

Jigsaw-based Secure Data Transfer over Computer Networks (Abstract)

Rangarajan A. Vasudevan , Indian Institute of Technology
Sugata Sanyal , Tata Institute of Fundamental Research, India
Ajith Abraham , Oklahoma State University
Dharma P. Agrawal , University of Cincinnati, OH
pp. 2

Semi-Fragile Watermarking Scheme for Authentication of JPEG Images (Abstract)

Chang-Tsun Li , University of Warwick, Coventry, UK
Chi Kin Ho , University of Warwick, Coventry, UK
pp. 7

Mitigating the Untrusted Terminal Problem Using Conditional Signatures (Abstract)

Istv?n Zsolt Berta , Budapest University of Technology and Economics
Levente Butty? , Budapest University of Technology and Economics
Istv?n Vajda , Budapest University of Technology and Economics
pp. 12

Arcanum : A Secure and Efficient Key Exchange Protocol for the Internet (Abstract)

Ashraf Masood , National University of Sciences & Technology, Pakistan
Ajmal S. Mian , The University of Western Australia
pp. 17

A Security Protocol for Certified E-Goods Delivery (Abstract)

Aleksandra Nenadic , University of Manchester, UK
Stephen Barton , University of Manchester, UK
Ning Zhang , University of Manchester, UK
pp. 22
SESSION MA II: Information Assurance and Security II

Enhancing Anonymity via Market Competition (Abstract)

Ravi Sandhu , George Mason University and NSD Security
William Robert Nelson Jr. , University at Buffalo
Shouhuai Xu , University of Texas at San Antonio
pp. 30

A Secure Account-Based Mobile Payment Protocol (Abstract)

Phu Dung Le , Monash Univesity, Australia
Bala Srinivasan , Monash Univesity, Australia
Supakorn Kungpisdan , Monash Univesity, Australia
pp. 35

Accountability Logic for Mobile Payment Protocols (Abstract)

Bala Srinivasan , Monash Univesity, Australia
Supakorn Kungpisdan , Monash Univesity, Australia
Phu Dung Le , Monash Univesity, Australia
pp. 40

Face Recognition Using Interpolated Bezier Curve Based Representation (Abstract)

Ajith Abraham , Oklahoma State University, USA
P. K. Biswas , Indian Institute of Technology, Kharagpur, India
Sarbajit Pal , 1/AF Saltlake, Kolkata, India
pp. 45

Run-time Detection of Buffer Overflow Attacks without Explicit Sensor Data Objects (Abstract)

Gyungho Lee , University of Illinois at Chicago
Byungchul Bae , National Security Research Institute, Korea
Changwoo Pyo , Hongik University, Korea
Taejin Kim , University of Illinois at Chicago
pp. 50
SESSION MA III: Information Assurance and Security III

Achieving Distributed Trusted Services (Abstract)

O. Bamasak , University of Manchester, UK
N. Zhang , University of Manchester, UK
pp. 56

Performance Evaluation of Data Integrity Mechanisms for Mobile Agents (Abstract)

Vandana Gunupudi , University of North Texas
Stephen R. Tate , University of North Texas
pp. 62

Adaptive Neuro-Fuzzy Intrusion Detection Systems (Abstract)

Sugata Sanyal , Tata Institute of Fundamental Research, India
Sanghamitra Mukherjee , SNDT University, India
Neha Dave , SNDT University, India
Khusbu Shah , SNDT University, India
Sampada Chavan , SNDT University, India
Ajith Abraham , Oklahoma State University, USA
pp. 70

Cryptographic Protocol Analysis using Goal Extraction (Abstract)

Janica Edmonds , University of Tulsa
Mauricio Papa , University of Tulsa
pp. 75

ProtoMon: Embedded Monitors for Cryptographic Protocol Intrusion Detection and Prevention (Abstract)

Sachin P. Joglekar , University of North Texas, Denton
Stephen R. Tate , University of North Texas, Denton
pp. 81
SESSION MA IV: Information Assurance and Security IV

Web Server Attack Categorization based on Root Causes and Their Locations (Abstract)

Sungdeok Cha , KAIST and AITrc/IIRTRC/SPIC
Sanghyun Cho , KAIST and AITrc/IIRTRC/SPIC
Jeongseok Seo , KAIST and AITrc/IIRTRC/SPIC
Han-Sung Kim , KAIST and AITrc/IIRTRC/SPIC
pp. 90

A Fast Pattern-Match Engine for Network Processor-based Network Intrusion Detection System (Abstract)

Chih-Hao Chen , National Tsing Hua University, Taiwan
Chia-Nan Kao , National Tsing Hua University, Taiwan
Rong-Tai Liu , National Tsing Hua University, Taiwan
Nen-Fu Huang , National Tsing Hua University, Taiwan
Chi-Chieh Chou , National Tsing Hua University, Taiwan
pp. 97

A Modified Optical Image Reconstruction Model with Information Feedback (Abstract)

Yukong Zhang , Prairie View A&M University, TX
Chaoyang Zhang , The University of Southern Mississippi, Hattiesburg
pp. 102

Threshold and Identity-based Key Management and Authentication for Wireless Ad Hoc Networks (Abstract)

Hongmei Deng , University of Cincinnati, OH
Anindo Mukherjee , University of Cincinnati, OH
Dharma P. Agrawal , University of Cincinnati, OH
pp. 107

An Extensible Framework for Practical Secure Component Composition in a Ubiquitous Computing Environment (Abstract)

Madjid Merabti , Liverpool John Moores University
David Llewellyn-Jones , Liverpool John Moores University
Qi Shi , Liverpool John Moores University
Bob Askwith , Liverpool John Moores University
pp. 112

Distributed Knowledge Networks: Towards a New Paradigm for Delivering Knowledge (Abstract)

Alfredo Cuzzocrea , University of Calabria, Italy
Fernando Bellas , University of A Coru?a, Spain
pp. 118

Identity-Based Threshold Signature Scheme from the Bilinear Pairings (Abstract)

Yuliang Zheng , UNC Charlotte, USA
Joonsang Baek , Monash University, Australia
pp. 124

HORSE: An Extension of an r-Time Signature Scheme With Fast Signing and Verification (Abstract)

William D. Neumann , Sandia National Laboratories and the University of New Mexico
pp. 129
SESSION MB I: IT Education, Curriculum & Assessment I

A New Approach to Learning Algorithms (Abstract)

Elhadi Shakshuki , Acadia University, Wolfville, NS, Canada
Tomasz M?ldner , Acadia University, Wolfville, NS, Canada
pp. 141

Computer Skills Training to (Middle-aged) Adults: Problems and Program (Abstract)

Antoni Mart?nez-Ballest? , Universitat Rovira i Virgili, Spain
Josep Domingo-Ferrer , Universitat Rovira i Virgili, Spain
Francesc Seb? , Universitat Rovira i Virgili, Spain
pp. 146

Dependency Theory E-Learning Tool (Abstract)

Paul Douglas , University of Westminster, London, UK
Steve Barker , King's College, London, UK
pp. 151

A Web-Service Oriented Framework for building SCORM Compatible Learning Management Systems (Abstract)

Ching-Pao Chang , National Cheng-Kung University, Tainan, Taiwan
Chih-Ping Chu , National Cheng-Kung University, Tainan, Taiwan
Yu-Fang Yeh , National Tainan Teachers College
Chung-Wei Yeh , National Cheng-Kung University, Tainan, Taiwan
pp. 156
SESSION MB II: IT Education, Curriculum & Assessment II

Web-based Mathematics Education: MeML Design and Implementation (Abstract)

Xiao Zou , Kent State University, OH
Paul S. Wang , Kent State University, OH
Yi Zhou , Kent State University, OH
pp. 169

IT Security Project: Implementation of the Advanced Encryption Standard (AES) on a Smart Card (Abstract)

Kai Schramm , Ruhr University Bochum, Germany
Christof Paar , Ruhr University Bochum, Germany
pp. 176

An Instructor's Environment for Automatic Generation of Problem Sequences (Abstract)

Fani Zlatarova , Elizabethtown College, Elizabethtown, PA
Pavel Azalov , Penn State Hazleton, Hazleton, PA
pp. 181
SESSION MB III: IT Education, Curriculum & Assessment III

Auxiliar: A Case-Based System to Assist Online Courses (Abstract)

Ricardo Lu?s de Freitas , Paulista University
Dilermando Piva Jr. , AEI - Itapetininga
Gilberto Shigueo Nakamiti , Paulista University
Carlos Miguel Tobar , PUC - Campinas
Mauro S?rgio Miskulin , FEE - Unicamp
pp. 197

Building an Effective Groupware System (Abstract)

Claude Frasson , University of Montreal, Qubec, Canada
Mohammed A. Razek , University of Montreal, Qubec, Canada
Marc Kaltenbach , University of Montreal, Qubec, Canada
pp. 202

A Standard Visual Courseware Authoring Tool Based on Content Packaging Specification (Abstract)

Wu Di , Huazhong University of Science & Technology
Yang Zongkai , Huazhong University of Science & Technology
He Jianhua , Huazhong University of Science & Technology
Zhao Gang , Huazhong University of Science & Technology
pp. 207

GAME: A Generic Automated Marking Environment for Programming Assessment (Abstract)

Michael Blumenstein , Griffith University, Australia
Steve Green , Griffith University, Australia
Ann Nguyen , Griffith University, Australia
Vallipuram Muthukkumarasamy , Griffith University, Australia
pp. 212
SESSION MB IV: E-Commerce/Education

Dynamic Identification of Correspondence Assertions for Electronic Commerce Data Integration (Abstract)

Chima Adiele , University of Manitoba, Winnipeg MB, Canada
Sylvanus A. Ehikioya , University of Manitoba, Winnipeg MB, Canada
pp. 223

A Topology Viewer for Distributed Brokering Systems (Abstract)

Shrideep Pallickara , Indiana University
Geoffrey Fox , Indiana University
Amey Dharurkar , Indiana University
pp. 228

The Impacts of Professions in Systems Development (Abstract)

Ann Johansson , University of Trollh?ttan/Uddevalla
pp. 235

Automatic Estimation of Stock Market Forecasting and Generating the Corresponding Natural Language Expression (Abstract)

Xin Lu , University of Tokushima, Japan
Fuji Ren , University of Tokushima, Japan
Shingo Kuroiwa , University of Tokushima, Japan
Qiong Liu , University of Tokushima, Japan
pp. 241

Special Technique for Optimizing Teaching-Learning Process in CBT Software (Abstract)

Rajiv Dharaskar , MP Institute of Engineering & Technology, Gondia, India
pp. 246

Extending the Undergraduate Computer Science Curriculum to Include Data Mining (Abstract)

D. Grossman , Illinois Institute of Technology, Chicago
N. Goharian , Illinois Institute of Technology, Chicago
N. Raju , Illinois Institute of Technology, Chicago
pp. 251

Extending the Wiki Paradigm for Use in the Classroom (Abstract)

Chien-min Wang , California State University, San Bernardino
David Turner , California State University, San Bernardino
pp. 255
SESSION MC I: Web & IR Technologies I

Information Retrieval with Principal Components (Abstract)

Albert Hoang , George Washington University, DC
pp. 262

Financial Activity Mining from Online Multilingual News (Abstract)

Pik-Shan Cheung , The Chinese University of Hong Kong, Shatin
Ruizhang Huang , The Chinese University of Hong Kong, Shatin
Wai Lam , The Chinese University of Hong Kong, Shatin
pp. 267

Enabling Personalization Recommendation With WeightedFP for Text Information Retrieval Based on User-Focus (Abstract)

Jin Wang , University of Sci. and Tech. of China, Hefei China
Xufa Wang , University of Sci. and Tech. of China, Hefei China
Zhenya Zhang , University of Sci. and Tech. of China, Hefei China
Enhong Chen , University of Sci. and Tech. of China, Hefei China
pp. 272

The e-Salesman System (Abstract)

Vishal Seth , San Jose State University
Magdalene P. Ting , San Jose State University
Jerry Gao , San Jose State University
pp. 277

From Keywords to Links: an Automatic Approach (Abstract)

Jihong Zeng , New York Institute of Technology
Peter A. Bloniarz , University at Albany, SUNY
pp. 283

Toward Dialogues With Documents: MultiBrowser (Abstract)

Dongping Xu , Iowa State University, Ames
Daniel Berleant , Iowa State University, Ames
Zhong Gu , Iowa State University, Ames
Jinghao Miao , Iowa State University, Ames
pp. 287

From Paragraph Networks to Document Networks (Abstract)

Jinghao Miao , Iowa State University, Ames
Daniel Berleant , Iowa State University, Ames
pp. 295
SESSION MC II: Web & IR Technologies II

Refined Extended Preorder Index with Path Information (Abstract)

Guangming Xing , Western Kentucky University, Bowling Green
Dongli Zhang , University of Ottawa, Canada
pp. 304

Multitasking Web Search on Alta Vista (Abstract)

Bernard J. Jansen , The Pennsylvania State University
Jan Pedersen , Overture Web Search
Minsoo Park , University of Pittsburgh, PA
Amanda Spink , University of Pittsburgh, PA
pp. 309

Extracting New Topic Contents from Hidden Web Sites (Abstract)

Hiroyuki Kitagawa , University of Tsukuba, Japan
Takanori Mouri , University of Tsukuba, Japan
pp. 314

A Hybrid Classifier Approach for Web Retrieved Documents Classification (Abstract)

Razvan Stefan Bot , New Jersey Institute of Technology
Quanzhi Li , New Jersey Institute of Technology
Xin Chen , New Jersey Institute of Technology
Yi-fang Brook Wu , New Jersey Institute of Technology
pp. 326
SESSION MC III: Web & IR Technologies III

Web Page Fragmentation for Personalized Portal Construction (Abstract)

Bouras Christos , University of Patras, Greece
Kapoulas Vaggelis , University of Patras, Greece
Misedakis Ioannis , University of Patras, Greece
pp. 332

TIN: An Interactive Image Navigator Providing Ubiquitous Access To Distributed Geo-Spatial Data (Abstract)

Bienvenido V?lez , University of Puerto Rico, Mayag?ez Campus
Amaury Cabarcas , University of Puerto Rico, Mayag?ez Campus
Lizvette Malav? , University of Puerto Rico, Mayag?ez Campus
pp. 337

Exploring Similarity among Web Pages Using the Hyperlink Structure (Abstract)

Carlos Humberto Molina-Rodr?guez , Universidad Aut?noma de Guadalajara
Jes?s Ubaldo Quevedo-Torrero , University of Houston
Mario Francisco Fonseca-Lozada , Universidad Aut?noma de Guadalajara
Shou-Hsuan Stephen Huang , University of Houston
pp. 344

Anxiously Seeking Answers: How Attitude Affects Search Performance (Abstract)

Wendy Lucas , Bentley College, Waltham, MA
Heikki Topi , Bentley College, Waltham, MA
pp. 349

XCpaqs: Compression of XML Document with XPath Query Support (Abstract)

Jianzhong Li , Harbin Institute of Technology
Zhenying He , Harbin Institute of Technology
Jizhou Luo , Harbin Institute of Technology
Hongzhi Wang , Harbin Institute of Technology
pp. 354
SESSION MC IV: Modern Web and Grid Systems

Matching Techniques for Resource Discovery in Distributed Systems Using Heterogeneous Ontology Descriptions (Abstract)

A. Ferrara , Universit? degli Studi di Milano, Italy
S. Montanelli , Universit? degli Studi di Milano, Italy
S. Castano , Universit? degli Studi di Milano, Italy
G. Racca , Universit? degli Studi di Milano, Italy
pp. 360

Application Service Provision through the Grid: Business models and Architectures (Abstract)

S. Likothanassis , Univ. of Patras, Greece
B. Vassiliadis , Hellenic Open University, Patras, Greece
N. Bogonikolos , ZEUS Consulting/LogicDIS Group
S. Sioutas , Hellenic Open University, Patras, Greece
K. Giotopoulos , Univ. of Patras, Greece
K. Votis , Univ. of Patras, Greece
pp. 367

The GRelC Library: A Basic Pillar in the Grid Relational Catalog Architecture (Abstract)

Maria Mirto , University of Lecce, Italy
Sandro Fiore , University of Lecce, Italy
Massimo Cafaro , University of Lecce, Italy
Giovanni Aloisio , University of Lecce, Italy
pp. 372

Content-Addressable IBP - Rationale, Design and Performance (Abstract)

James S. Plank , University of Tennessee, Knoxville
Rebecca L. Collins , University of Tennessee, Knoxville
pp. 377

The LAG Grammar for Authoring the Adaptive Web (Abstract)

Michael Verschoor , Eindhoven University of Technology
Alexandra Cristea , Eindhoven University of Technology
pp. 382

Adaptation and Reuse in Designing Web Information Systems (Abstract)

Geert-Jan Houben , Eindhoven University of Technology
Zolt? Fiala , Dresden University of Technology
Flavius Frasincar , Eindhoven University of Technology
Peter Barna , Eindhoven University of Technology
pp. 387

On-line Generation of Suggestions for Web Users (Abstract)

Paolo Palmerini , Information Science and Technologies Institute (ISTI), Italy
Ranieri Baraglia , Information Science and Technologies Institute (ISTI), Italy
Fabrizio Silvestri , Information Science and Technologies Institute (ISTI), Italy
Massimo Serran? , Information Science and Technologies Institute (ISTI), Italy
pp. 392

Reinforcement Learning Architecture for Web Recommendations (Abstract)

Erhard Rahm , Univ. of Leipzig, Germany
Nick Golovin , Univ. of Leipzig, Germany
pp. 398
SESSION TA I: Information Assurance and Security V

Protocol Analysis in Intrusion Detection Using Decision Tree (Abstract)

Tarek Abbes , LORIA/INRIA-Lorraine, France
Micha?l Rusinowitch , LORIA/INRIA-Lorraine, France
Adel Bouhoula , SUP'COM, Tunisie
pp. 404

Security Protection and Checking in Embedded System Integration Against Buffer Overflow Attacks (Abstract)

Qingfeng Zhuge , University of Texas at Dallas
Edwin H.-M. Sha , University of Texas at Dallas
Bin Xiao , Hong Kong Polytechnic University
Chun Xue , University of Texas at Dallas
Zili Shao , University of Texas at Dallas
pp. 409

Low-Intrusive Consistent Disk Checkpointing: A Tool for Digital Forensics (Abstract)

S. Venkatesan , University of Texas at Dallas
Sriranjani Sitaraman , University of Texas at Dallas
pp. 414

Dynamic Control of Worm Propagation (Abstract)

Arun Yelimeli , University of North Texas
Jo?o Cangussu , University of Texas, Dallas
Ram Dantu , University of North Texas
pp. 419

Towards Framework Selection Criteria and Suitability for an Application Framework (Abstract)

Sheikh I. Ahamed , Marquette University, Milwaukee
Al Pezewski , Marquette University, Milwaukee
Alex Pezewski , Marquette University, Milwaukee
pp. 424
SESSION TA II: Information Assurance and Security VI

A System for Ensuring Data Integrity in Grid Environments (Abstract)

Ajith Abraham , Oklahoma State University, USA
Austin Gilbert , Oklahoma State University, USA
Marcin Paprzycki , Oklahoma State University, USA
pp. 435

Defeating the Current Steganalysis Techniques (Robust Steganography) (Abstract)

Gopalakrishna Reddy Tadiparthi , New Mexico Institute of Mining and Technology
Srinivas Mukkamala , New Mexico Institute of Mining and Technology
Andrew H. Sung , New Mexico Institute of Mining and Technology
pp. 440

Risk Management using Behavior based Attack Graphs (Abstract)

Ram Dantu , University of North Texas
Prakash Kolan , University of North Texas
Kall Loper , University of North Texas
pp. 445

A Model for Team-based Access Control (TMAC 2004) (Abstract)

Fahad T. Alotaiby , George Mason University
J. X. Chen , George Mason University
pp. 450
SESSION TA III: Data Mining I

An Object-Based Approach for Digital Video Retrieval (Abstract)

Mark Smith , University of Central Arkansas
Alireza Khotanzad , Southern Methodist University
pp. 456

A Mathematical Model of Similarity and Clustering (Abstract)

Chun-Hung Tzeng , Ball State University
Fu-Shing Sun , Ball State University
pp. 460

Mining Association Rules from Relations on a Parallel NCR Teradata Database System (Abstract)

Murali Mangamuri , Wright State University, Dayton, Ohio
Soon M. Chung , Wright State University, Dayton, Ohio
pp. 465

A New Reparation Method for Incomplete Data in the Context of Supervised Learning (Abstract)

Danilo Montesi , University of Camerino, Italy
Matteo Magnani , University of Bologna, Italy
pp. 471

Adaptive Web Document Classification with MCRDR (Abstract)

Yang Sok Kim , University of Tasmania, Hobart
Edward Deards , University of Tasmania, Hobart
Sung Sik Park , University of Tasmania, Hobart
Byeong Ho Kang , University of Tasmania, Hobart
pp. 476
SESSION TA IV: Special Session

Physically Locating Wireless Intruders (Abstract)

Golden G. Richard III , University of New Orleans
Rob Joyce , ATC-NY
Prasanth Alla , ATC-NY
pp. 482
SESSION TB I: Database Technology I

Replicate Relational and XML Databases for Internet Computing (Abstract)

H. K. Wong , City University of Hong Kong, Hong Kong
Joseph Fong , City University of Hong Kong, Hong Kong
pp. 492

Modeling Long Duration Transactions with Time Constraints in Active Database (Abstract)

D. S. Yadav , U P Technical University, India
R. C. Saraswat , U P Technical University, India
D. S. Chauhan , U P Technical University, India
Rajeev Agrawal , Kettering University, Flint, Michigan, USA
A. K. Majumdar , Indian Institute of Technology, India
pp. 497

Accessing Temporal Data Objects in Mobile Computing Environments (Abstract)

Arthur C. S. Wong , City University of Hong Kong
Kwok-Wa Lam , City University of Hong Kong
Victor C. S. Lee , City University of Hong Kong
pp. 502

Fuzzy Inclusion Dependencies in Fuzzy Relational Databases (Abstract)

D. K. Gupta , I.I.T. Kharagpur, India
A. K. Sharma , I.I.T. Kharagpur, India
A. Goswami , I.I.T. Kharagpur, India
pp. 507

Server-side Broadcast Transaction in Mobile Computing Environment (Abstract)

Kwok-Wa Lam , City University of Hong Kong
Victor C. S. Lee , City University of Hong Kong
Bryan Hin Cheung Poon , City University of Hong Kong
pp. 511
SESSION TB II: Database Technology II

Protecting Federated Databases Using A Practical Implementation of a Formal RBAC Policy (Abstract)

Paul Douglas , University of Westminster, London, UK
Steve Barker , King's College, London, UK
pp. 523

A Model for Multiple-Query Processing Based upon Strong Factoring (Abstract)

Jamal R. Alsabbagh , Grand Valley State University, Allendale, MI
Vijay V. Raghavan , University of Louisiana - Lafayette
pp. 528
SESSION TB III: Database Technology III

Community, Context, and Distance Education (Abstract)

John Rothfork , Northern Arizona University
pp. 546

A Constraint-Based Query Modification Engine for Retrofitting COTS DBMS's (Abstract)

Legand Burge , Howard University, DC
Moses Garuba , Howard University, DC
Ronald Langrin , Howard University, DC
pp. 551

The Design and Implementation of the MESSENGER Trajectory Database (Abstract)

Joseph Gill , Howard University, Washington DC
Moses Garuba , Howard University, Washington DC
Legand Burge , Howard University, Washington DC
pp. 557

Pedagogical Issues in Programming Languages (Abstract)

Laxmi P. Gewali , University of Nevada, Las Vegas
John T. Minor , University of Nevada, Las Vegas
pp. 562

Performance Study of a MLS/DBMS Implemented as a Kernelized Architecture (Abstract)

Moses Garuba , Howard University, Washington, DC
Edward Appiah , Howard University, Washington, DC
Legand Burge III , Howard University, Washington, DC
pp. 566
SESSION TB IV: Architecture

A Systolic Memory Architecture for Fast Codebook Design based on MMPDCL Algorithm (Abstract)

Kentaro Sano , Tohoku University
Kenichi Suzuki , Tohoku University
Chiaki Takagi , Tohoku University
Tadao Nakamura , Tohoku University
Ryusuke Egawa , Tohoku University
pp. 572

Semi-Parallel Reconfigurable Architectures for Real-Time LDPC Decoding (Abstract)

Joseph R. Cavallaro , Rice University, Houston, TX
Marjan Karkooti , Rice University, Houston, TX
pp. 579

An Object-Oriented Database-based Architecture for Mobile Enterprise Applications (Abstract)

Tharam Dillon , University of Technology, Sydney
Robert Steele , University of Technology, Sydney
Yuri Ventsov , University of Technology, Sydney
pp. 586

A Formal Approach to Software Architecture of Agent-Base Systems (Abstract)

Hassan Reza , University of North Dakota, Grand Forks, ND
Emmanuel Grant , University of North Dakota, Grand Forks, ND
pp. 591
SESSION TC I: Image Processing I

Effect of Initial HMM Choices in Multiple Sequence Training for Gesture Recognition (Abstract)

Brian C. Lovell , The University of Queensland, Brisbane, Australia
Richard I. A. Davis , The University of Queensland, Brisbane, Australia
Nianjun Liu , The University of Queensland, Brisbane, Australia
Peter J. Kootsookos , The University of Queensland, Brisbane, Australia
pp. 608

Resampling Based Method for Pixel-wise Correspondence between 3D Faces (Abstract)

Baocai Yin , Beijing University of Technology, China
Yongli Hu , Beijing University of Technology, China
Chunliang Gu , Beijing University of Technology, China
Shiquan Cheng , Beijing University of Technology, China
pp. 614

Recognizing Non-rigid Human Actions Using Joints Tracking in Space-time (Abstract)

Xin Lu , University of Tokushima, Japan
Shunichiro Oe , University of Tokushima, Japan
Qiong Liu , University of Tokushima, Japan
pp. 620
SESSION TC II: Image Processing II

Robust Segmentation Using Parametric and Nonparametric Local Spatial Posteriors (Abstract)

Kayvan Najarian , University of North Carolina at Charlotte
EunSang Bak , University of North Carolina at Charlotte
pp. 626

A Robust Face Recognition System for Real Time Surveillance (Abstract)

D. Valaparla , Old Dominion University, Norfolk, VA
M. J. Seow , Old Dominion University, Norfolk, VA
K. V. Asari , Old Dominion University, Norfolk, VA
R. Gottumukkal , Old Dominion University, Norfolk, VA
pp. 631

A Fuzzy Approach to Texture Segmentation (Abstract)

Shantaram Vasikarla , American InterContinental University, Los Angeles, CA
Madasu Hanmandlu , I.I.T. Delhi, India
Vamsi Krishna Madasu , University of Queensland, Australia
pp. 636

Spherical Parameterization for 3D Surface Analysis in Volumetric Images (Abstract)

Li Shen , Dartmouth College, Hanover, NH
Fillia Makedon , Dartmouth College, Hanover, NH
pp. 643
SESSION TC III: Image Processing III

Design of an Efficient Architecture for Real-time Image Enhancement Based on a Luma-Dependent Nonlinear Approach (Abstract)

Li Tao , Old Dominion University, Norfolk, VA
Vijayan Asari , Old Dominion University, Norfolk, VA
Hau Ngo , Old Dominion University, Norfolk, VA
pp. 656

Determination of Pose Angle of Face using Dynamic Space Warping (DSW) (Abstract)

B. Yegnanarayana , IIT Madras, India
Anil Kumar sao , IIT Madras, India
Marios Savvides , Carnegie Mellon University, PA
B. V. K. Vijaya Kumar , Carnegie Mellon University, PA
pp. 661

Fuzzy Edge Detector Using Entropy Optimization (Abstract)

Shantaram Vasikarla , American InterContinental University, Los Angeles, CA
John See , Multimedia University, Malaysia
Madasu Hanmandlu , Engineering I.I.T. Delhi, India
pp. 665

Digital Watermarking on Still Images Using Wavelet Transform (Abstract)

Arash Tabibiazar , Amirkabir University of Technology (Tehran Polytechnic)
Shiva Zaboli , Amirkabir University of Technology (Tehran Polytechnic)
Reza Safabakhsh , Amirkabir University of Technology (Tehran Polytechnic)
pp. 671

Feature Weighting Methods for Abstract Features Applicable to Motion based Video Indexing (Abstract)

Manzur Murshed , Monash University, Australia
Ashfaqur Rahman , Monash University, Australia
Laurence S. Dooley , Monash University, Australia
pp. 676
SESSION TC IV: Multimedia Applications

National Science Foundation Project on Advanced Online Education in Information Technology (Abstract)

Vladimir Uskov , Bradley University, Peoria, IL
Alexander Uskov , Bradley University, Peoria, IL
pp. 682

Visual XML Schemas Based on Reserved Graph Grammars (Abstract)

Kang Zhang , University of Texas at Dallas
Guanglei Song , University of Texas at Dallas
pp. 687

User Interface Augmentation: Vision and Sound (Abstract)

M. Baumback , University of Calgary
J. R. Parker , University of Calgary
pp. 692

Combining the Product of Interactive Multimedia Creator with MPEG4 Technology (Abstract)

Si Duan-Feng , Peking University, China
Sun Jin-Wen , Peking University, China; Neusoft Co., Ltd, China
Zheng Xiang , Peking University, China; Wuhan Broadcasting & Television Bureau, China
Zhou Bing-Feng , Peking University, China
Fang Xi-Feng , Peking University, China
pp. 698
SESSION TD I: IT Education, Curriculum & Assessment IV

Web-Based Mathematics Education with MathChat (Abstract)

David Chiu , Kent State University, OH
pp. 709

Adaptive Course Creation for All (Abstract)

Alexandra Cristea , Eindhoven University of Technology
pp. 718

Improving Retention of Minority Freshmen in Engineering by Applying the Six Sigma Methodology (Abstract)

Charita Brent , Howard University, Washington, DC
Legand Burge III , Howard University, Washington, DC
Moses Garuba , Howard University, Washington, DC
pp. 723

Implementing Directed Lines of Reasoning in an Intelligent Tutoring System Using the Atlas Planning Environment (PDF)

Martha Evens , Illinois Institute of Tech, Chicago, IL
Bruce Mills , College of the Southwest, Hobbs, NM
Reva Freedman , Northern Illinois Univ., DeKalb, IL
pp. 729
SESSION TD II: Coding Applications

Design and Evaluation of Intermediate Retransmission and Packet Loss Detection Schemes for MPEG4 Transmission (Abstract)

Priya Lakshmi , CEG, Anna University, Chennai, India
J. Ramkumar , CEG, Anna University, Chennai, India
C. Ramakrishna , CEG, Anna University, Chennai, India
M. Nithish , CEG, Anna University, Chennai, India
pp. 742

Embedded Error Detection in Arithmetic Coding Using Markers (Abstract)

Somphop Chokchaitam , Department of Electrical Engineering Chulalongkorn University, Thailand
Prasit Teekaput , Department of Electrical Engineering Chulalongkorn University, Thailand
pp. 747

Steganalysis of Data Hiding Techniques in Wavelet Domain (Abstract)

Wen Gao , Harbin Institute of Technology, China
Hongxun Yao , Harbin Institute of Technology, China
Shaohui Liu , Harbin Institute of Technology, China
pp. 751

Online Compression of ASCII Files (Abstract)

John Istle , University of Nevada Las Vegas
Pamela Mandelbaum , University of Nevada Las Vegas
Emma Regentova , University of Nevada Las Vegas
pp. 755
SESSION TD III: Coding /Fault Tolerance

An Integrated Approach for Database Security and Fault Tolerance (Abstract)

Honglan Zhong , University of Regina, Canada
Chang N. Zhang , University of Regina, Canada
pp. 762

On Gossip Codes and Traceability Schemes (Abstract)

Arun K. Pujari , University of Hyderabad, India
Ashutosh Saxena , Institute for Development and Research in Banking Technology, India
Ved P. Gulati , Institute for Development and Research in Banking Technology, India
Ravi S. Veerubhotla , Institute for Development and Research in Banking Technology, India
pp. 772

Data Redundancy and Compression Methods for a Disk-Based Network Backup System (Abstract)

Yan Chen , Shanghai JiaoTong University
Boon-Lock Yeo , Intel China Software Center
Zhiwei Qu , Shanghai JiaoTong University
Zhenhua Zhang , ZheJiang University
pp. 778

Equivalence of Punctured Convolutional Codes from Shift Equivalent Puncturing Patterns (Abstract)

Li Shen , Information and Engineering University, China
Yan Zou , Fudan University, China
Peizhong Lu , Fudan University, China
Xiangyang Luo , Information and Engineering University, China
pp. 786
SESSION TD IV: Internet and Applications

A High Performance Parallel IP Lookup Technique Using Distibuted Memory Organization (Abstract)

T. Srinivasan , Sri Venkatesawara College of Engineering, India
K. Venkatesh , Sri Venkatesawara College of Engineering, India
S. Aravind , Sri Venkatesawara College of Engineering, India
R. Ganapath , Sri Venkatesawara College of Engineering, India
pp. 792

Content Description Servers for Networked Video Surveillance (Abstract)

Maxwell Sayles , University of Calgary
Paul Tarjan , University of Calgary
Jeffrey E. Boyd , University of Calgary
Luke Olsen , University of Calgary
pp. 798

J-Honeypot: A Java-Based Network Deception Tool with Monitoring and Intrusion Detection (Abstract)

Radhika Upadrashta , San Jose State University
Xiao Su , San Jose State University
Yuqing Mai , San Jose State University
pp. 804

The Effective Buffer Architecture for Data Link Layer of PCI Express (Abstract)

Kwang-Su Seong , Yeungnam University, Korea
Eugin Hyun , Yeungnam University, Korea
pp. 809

Author Index (PDF)

pp. 815
91 ms
(Ver 3.1 (10032016))