The Community for Technology Leaders
Information Technology: Coding and Computing, International Conference on (2004)
Las Vegas, Nevada
Apr. 5, 2004 to Apr. 7, 2004
ISBN: 0-7695-2108-8
TABLE OF CONTENTS

Reviewers (PDF)

pp. xix
SESSION TE I: Database Applications

Performance Evaluation of Block-Based Motion Estimation Algorithms and Distortion Measures (Abstract)

Ilker Ersoy , University of Missouri-Rolla
S. R. Subramanya , University of Missouri-Rolla
Hiral Patel , University of Missouri-Rolla
pp. 2

Geoblock: A LVQ-Based Framework for Geographic Image Retrieval (Abstract)

Lei Zhu , Armstrong Atlantic State University, Savannah, Georgia
pp. 8

Language Model-based Retieval for Farsi Documents (Abstract)

Jeffrey Coombs , University of Nevada, Las Vegas
Kazem Taghva , University of Nevada, Las Vegas
Tom Nartker , University of Nevada, Las Vegas
Ray Pareda , University of Nevada, Las Vegas
pp. 13

Summarizing Inter-Query Learning in Content-Based Image Retrieval via Incremental Semantic Clustering (Abstract)

Douglas R. Heisterkamp , Oklahoma State University, Stillwater
Iker Gondra , Oklahoma State University, Stillwater
pp. 18

A Framework for Trajectory Based Visual Event Retrieval (Abstract)

S.R. Subramanya , University of Missouri-Rolla
Ilker Ersoy , University of Missouri-Rolla
Filiz Bunyak , University of Missouri-Rolla
pp. 23
SESSION TE II: Distributed Grid System I

Detecting Anomalies in High-Performance Parallel Programs (Abstract)

Susan Bridges , Mississippi State University
Zhen Liu , Mississippi State University
German Florez , Mississippi State University
Rayford Vaughn , Mississippi State University
Anthony Skjellum , Mississippi State University
pp. 30

Grid Workflow Based on Dynamic Modeling and Scheduling (Abstract)

Saihan Li , Baoding Teachers College, China
Shaohua Zhang , Fudan University, China
Ning Gu , Fudan University, China
pp. 35

Extensible Communication Architecture for Grid Nodes (Abstract)

Nader Mohamed , University of Nebraska-Lincoln
Jameela Al-Jaroodi , University of Nebraska-Lincoln
Hong Jiang , University of Nebraska-Lincoln
pp. 40

Access Policy Specification for Web Applications (Abstract)

Steve Barker , King's College, London, UK
pp. 45

A Web / Grid Portal Implementation of BioSimGrid: A Biomolecular Simulation Database (Abstract)

Jonathan Essex , University of Southampton
Mark S. P. Sansom , University of Oxford
Stuart Murdock , University of Southampton
Matthew Dovey , University of Oxford
Paul Jeffreys , University of Oxford
Bing Wu , University of Oxford
Simon Cox , University of Southampton
Kaihsu Tai , University of Oxford
Muan Hong Ng , University of Southampton
pp. 50
SESSION TE III: Distributed Grid System II

A Problem Solving Environment for Remote Sensing Data Processing (Abstract)

Italo Epicoco , University of Lecce, Italy
Massimo Cafaro , University of Lecce, Italy
Gianvito Quarta , University of Lecce, Italy
Giovanni Aloisio , University of Lecce, Italy
pp. 56

A Demonstration of Collaborative Web Services and Peer-to-Peer Grids (Abstract)

Minjun Wang , Syracuse University; Indiana University
Geoffrey Fox , Indiana University
Shrideep Pallickara , Indiana University
pp. 62

Performing Security Analysis of Large Scale Power Systems with a Broker-based Computational Grid (Abstract)

N. Ranaldo , University of Sannio, Italy
D. Villacci , University of Sannio, Italy
E. Zimeo , University of Sannio, Italy
M. Di Santo , University of Sannio, Italy
pp. 77

G-AQFS: Grid Computing Exploitation for the Management of Air Quality in Presence of Complex Meteorological Circulations (Abstract)

R. Cesari , C.N.R, Section of Lecce, Italy
G. Aloisio , University of Lecce, Italy
U. Rizza , C.N.R, Section of Lecce, Italy
G. P. Marra , C.N.R, Section of Lecce, Italy
M. Cafaro , University of Lecce, Italy
C. Mangia , University of Lecce, Italy
A. Tanzarella , C.N.R, Section of Lecce, Italy
I. Schipa , C.N.R, Section of Lecce, Italy
M. Mirto , University of Lecce, Italy
M. Miglietta , C.N.R, Section of Lecce, Italy
pp. 83
SESSION TE IV: Distributed Grid System III

Integrating Ontology and Workflow in PROTEUS, a Grid-Based Problem Solving Environment for Bioinformatics (Abstract)

Mario Cannataro , Univ. of Catanzaro, Italy
Antonella Guzzo , Univ. of Calabria, Italy
Pierangelo Veltri , Univ. of Catanzaro, Italy
Carmela Comito , Univ. of Calabria, Italy
pp. 90

Grid Job Builder - A Workflow Editor for Computing Grids (Abstract)

Christoph Jung , Fraunhofer IGD, Darmstadt, Germany
Norbert Schiffner , Fraunhofer CRCG, RI, USA
Martin Einhoff , Fraunhofer IGD, Darmstadt, Germany
Stefan Noll , Fraunhofer IGD, Darmstadt, Germany
pp. 95

OGSA-WebDB: An OGSA-Based System for Bringing Web Databases into the Grid (Abstract)

Said Mirza Pahlevi , National Institute of Advanced Industrial Science and Technology (AIST), Japan
Isao Kojima , National Institute of Advanced Industrial Science and Technology (AIST), Japan
pp. 105
POSTER SESSION - I

Vulnerability Scanning for Buffer Overflow (PDF)

Aishwarya Iyer , New Mexico Tech, New Mexico
Lorie M. Liebrock , New Mexico Tech, New Mexico
pp. 116

A Novel Relevance Feedback Method in Content-Based Image Retrieval (Abstract)

Baice Li , Jilin University, Changchun, China
Senmiao Yuan , Jilin University, Changchun, China
pp. 120

Bidding in P2P Content Distribution Networks using the Lightweight Currency Paradigm (PDF)

David A. Turner , California State University, San Bernardino
Elharith Elrufaie , California State University, San Bernardino
pp. 129

Improving Classification Performance for Heterogeneous Cancer Gene Expression Data (PDF)

Benny Y. M. Fung , The Hong Kong Polytechnic University
Vincent T. Y. Ng , The Hong Kong Polytechnic University
pp. 131

Monitoring the Development Process with Eclipse (PDF)

Alberto Sillitti , Free University of Bozen
Andrea Janes , Free University of Bozen
Giancarlo Succi , Free University of Bozen
Tullio Vernazza , DIST - Universit? di Genova
pp. 133

Modeling a Grid-Based Problem Solving Environment for Mobile Devices (PDF)

Mei Yang , Columbus State University
Arris Ray , Columbus State University
Bhagyavati , Columbus State University
Stan Kurkovsky , Columbus State University
pp. 135
POSTER SESSION - II

An Integrated Neighborhood Dependent Approach for Nonlinear Enhancement of Color Images (PDF)

Li Tao , Old Dominion University, Norfolk, VA
Vijayan Asari , Old Dominion University, Norfolk, VA
pp. 138

Extendible Range-Based Numbering Scheme for XML Document (PDF)

Bill Tseng , Western Kentucky University, Bowling Green, KY
Guangming Xing , Western Kentucky University, Bowling Green, KY
pp. 140

An Extension of XQuery for Moving Objects over GML (Abstract)

Warnill Chung , University of Inha, Korea
Hae-Young Bae , University of Inha, Korea
Soon-Young Park , University of Inha, Korea
pp. 142

An Evaluation of New and Old Similarity Ranking Algorithms (PDF)

Edward Borkmann , U. S. National Library of Medicine
Maureen Prettyman , U. S. National Library of Medicine
Paul Lynch , U. S. National Library of Medicine
Xiaocheng Luan , U. S. National Library of Medicine
Jonathan Schlaifer , U. S. National Library of Medicine
Lee Mericle , U. S. National Library of Medicine
pp. 148

Experiments on A Secure Compression Algorithm (Abstract)

Ebru Celikel , Ege University International Computer Institute, Turkey
Mehmet Emin Dalkilic , Ege University International Computer Institute, Turkey
pp. 150

A GCD attack resistant CRTHACS for secure group communications (PDF)

Spyros S. Magliveras , Florida Atlantic University, Boca Raton
Byrav Ramamurthy , University of Nebraska-Lincoln
Xukai Zou , Purdue University - Indianapolis, IN
pp. 153

Face Detection Technique Based on Rotation Invariant Wavelet Features (PDF)

Satyanadh Gundimada , Old Dominion University, Norfolk, VA
Vijayan Asari , Old Dominion University, Norfolk, VA
pp. 157

Integrating Compression with Watermarking on Video Sequences (PDF)

D. Hatzinakos , University of Toronto, Ontario, Canada
A. Giannoula , University of Toronto, Ontario, Canada
pp. 159
Session WA I: Learning / Education

Fuzzy Measures and Integrals for Evaluating Strategies (Abstract)

Yasuo Narukawa , Toho Gakuen, Japan
Vicenc Torra , IIIA-CSIC, Spain
pp. 162

How to Make E-cash with Non-Repudiation and Anonymity (Abstract)

Ronggong Song , National Research Council of Canada
Larry Korba , National Research Council of Canada
pp. 167

Applied Fieldbus Knowledge for ICT Engineers (Abstract)

P. Mari? , DTE, University of Vigo, Galicia, Spain
M. A. Dom?nguez , DTE, University of Vigo, Galicia, Spain
F. V?zquez , DTE, University of Vigo, Galicia, Spain
F. Poza , DTE, University of Vigo, Galicia, Spain
H. Hern?ndez , DTE, University of Vigo, Galicia, Spain
F. Machado , DTE, University of Vigo, Galicia, Spain
pp. 178

An Approach to Improving the Quality of Part-of-Speech Tagging of Chinese Text (Abstract)

Jia-heng Zheng , Shanxi University, China
Yi-li Qian , Shanxi University, China
pp. 183

Ensembles of Partitions via Data Resampling (Abstract)

Behrouz Minaei-Bidgoli , Michigan State University, East Lansing
Alexander Topchy , Michigan State University, East Lansing
William F. Punch , Michigan State University, East Lansing
pp. 188

The Effects of Business Rules on Transactional Association Analysis (Abstract)

Louis A. Le Blanc , Berry College, Mount Berry, GA
Bart J. Westgeest , Armstrong Atlantic State University, Savannah, GA
Ray R. Hashemi , Armstrong Atlantic State University, Savannah, GA
pp. 198

Information Technologies for Education & Training in E-Government (Abstract)

Ranjit Bose , University of New Mexico, Albuquerque
pp. 203

Routine Learning: Analyzing Your Whereabouts (Abstract)

Jukka Riekki , University of Oulu, Finland
Juha R?ning , University of Oulu, Finland
Susanna Pirttikangas , University of Oulu, Finland
pp. 208
Session WA II: Information Retrieval

Information-Content Based Sentence Extraction for Text Summarization (Abstract)

James Elding , Workers' Compensation Board, Alberta, Canada
Mario A. Nascimento , University of Alberta, Canada
Daniel Mallett , University of Alberta, Canada
pp. 214

Measuring the Scalability of Relationally Mapped Semistructured Queries (Abstract)

David Grossman , Illinois Institute of Technology, Chicago
Eric C. Jensen , Illinois Institute of Technology, Chicago
Rebecca J. Cathey , Illinois Institute of Technology, Chicago
Steven M. Beitzel , Illinois Institute of Technology, Chicago
Angelo J. Pilotto , Illinois Institute of Technology, Chicago
pp. 219

Modified LZW Algorithm for Efficient Compressed Text Retrieval (Abstract)

Nan Zhang , University of Central Florida
Ravi Vijaya Satya , University of Central Florida
Tao Tao , University of Central Florida
Amar Mukherjee , University of Central Florida
pp. 224

A Unique-Order Interpolative Code for Fast Querying and Space-Efficient Indexing in Information Retrieval Systems (Abstract)

Jean Jyh-Jiun Shann , National Chiao-Tung University, Hsinchu, Taiwan
Cher-Sheng Cheng , National Chiao-Tung University, Hsinchu, Taiwan
Chung-Ping Chung , National Chiao-Tung University, Hsinchu, Taiwan
pp. 229

Turkish Word N-gram Analyzing Algorithms for a Large Scale Turkish Corpus - TurCo (Abstract)

Yal?in ?ebi , Dokuz Eylul University, Turkey
G?khan Dalkili? , University of Central Florida
pp. 236

Content-Based Image Retrieval Incorporating Models of Human Perception (Abstract)

Y. Alp Aslandogan , University of Texas at Arlington
M. Emre Celebi , University of Texas at Arlington
pp. 241

Use of Multiple Algorithms in Image Content Searches (Abstract)

J. R. Parker , University of Calgary
Brad Behm , University of Calgary
pp. 246
Session WA III: Mobile Enterprise I

How M=Ec<sup>2</sup> in Healthcare (Abstract)

Steve Goldberg , INET International Inc., Canada
Nilmini Wickramasinghe , Cleveland State University, OH
pp. 252

Enhanced Cell Visiting Probability for QoS Provisioning in Mobile Multimedia Communications (Abstract)

Manzur Murshed , Monash University, Australia
Laurence S Dooley , Monash University, Australia
Mohammad Mahfuzul Islam , Monash University, Australia
pp. 258

A Secure Electronic Examination Protocol using Wireless Networks (Abstract)

Josep Prieto-Bl?zquez , Universitat Oberta de Catalunya, Barcelona
Jordi Castell?-Roca , Universitat Oberta de Catalunya, Barcelona
Jordi Herrera-Joancomart? , Universitat Oberta de Catalunya, Barcelona
pp. 263

Registration and Discovery of Services in the NetTraveler Integration System for Mobile Devices (Abstract)

Elliot Vargas , University of Puerto Rico, Mayag?
Maniel Sotomayor , University of Puerto Rico, Mayag?
Elfred Pagan , University of Puerto Rico, Mayag?
Manuel Rodr?guez-Mart?nez , University of Puerto Rico, Mayag?
Juan G. Arzola , University of Puerto Rico, Mayag?
Jos? F. Ense? , University of Puerto Rico, Mayag?
pp. 275

A Two-tier Architecture for Automated Mobile Applications (Abstract)

Laurie Benkovich , University of Technology, Sydney
Yuri Ventsov , University of Technology, Sydney
Sri Madhisetty , University of Technology, Sydney
Robert Steele , University of Technology, Sydney
pp. 282
SESSION WA IV: Language Understanding

Lexical-chain and It's Application in Text Filtering (Abstract)

Chen Huowang , National University of Defense Technology, Changsha, China
Li Shaozi , National University of Defense Technology, Changsha, China
You Wenjian , Xiamen University , Xiamen, China
Li Tangqiu , Xiamen University , Xiamen, China
pp. 288

Problems and Solutions in Machine Translation Involving Arabic, Chinese and French (Abstract)

Peter Greenfield , Universit? de Franche-Comt?
Yihui Shen , Universit? de Franche-Comt?
Sylviane Cardey , Universit? de Franche-Comt?
Haytham Alsharaf , Kuwait University
pp. 293

Internet Archive as a Source of Bilingual Dictionary (Abstract)

Mohamed Abdel Fattah , Tokushima University, Japan
Kuroiwa Shingo , Tokushima University, Japan
Fuji Ren , Tokushima University, Japan
pp. 298

Integrating Speech Enabled Services in a web-based e-Learning Environment (Abstract)

Steffen Werner , Dresden University of Technology, Germany
Matthias Eichner , Dresden University of Technology, Germany
Matthias Wolff , Dresden University of Technology, Germany
R?diger Hoffmann , Dresden University of Technology, Germany
pp. 303

Source Signal based Rate Adaptation for GSM AMR Speech Codec (Abstract)

J. Makinen , Nokia Research Center
J. Vainio , Nokia Research Center
pp. 308

Word Statistics of Turkish Language on a Large Scale Text Corpus - TurCo (Abstract)

G?khan Dalkili? , University of Central Florida, FL
Yal?in ?ebi , Dokuz Eylul University, Turkey
pp. 319
Session WB I: Potpourri I

Efficient Multicast E-Services Over APPCAST (Abstract)

V. Radha , Institute for Research and Development in Banking Technology, Hyderabad, India
Ved P. Gulati , Institute for Research and Development in Banking Technology, Hyderabad, India
Arun K Pujari , University of Hyderabad, Hyderabad, India
pp. 331

Ontology-based Web Crawler (Abstract)

Srinivasa Murthy , Pondicherry Engineering College, India
S. Ganesh , Pondicherry Engineering College, India
G. Aghila , Pondicherry Engineering College, India
V. Kalyan , Pondicherry Engineering College, India
M. Jayaraj , Pondicherry Engineering College, India
pp. 337

A Hybrid Number System And Its Application In FPGA-DSP Technology (PDF)

Reza. Hashemian , Northern Illinois University
Bipin Sreedharan , Northern Illinois University
pp. 342

Significance of Steganography on Data Security (Abstract)

Ajith Abraham , Oklahoma State University, USA
S Venkatraman , University of Madras, India
Marcin Paprzycki , Oklahoma State University, USA
pp. 347

Recognition and Identification of Form Document Layouts (Abstract)

Kai Luo , University of Nevada, Las Vegas
Kazem Taghva , University of Nevada, Las Vegas
Emma Regentova , University of Nevada, Las Vegas
Shahram Latifi , University of Nevada, Las Vegas
pp. 352

Evolutionary Time Scheduling (Abstract)

Nadia Nedjah , State University of Rio de Janeiro, Brazil
Luiza de Macedo Mourelle , State University of Rio de Janeiro, Brazil
pp. 357

Group Key Management utilizing Huffman and Petrick based approaches (Abstract)

Johnson Thomas , Oklahoma State University, Tulsa, OK
Senthamil Ilango , Novellus Systems, Sunnyvale, CA
pp. 362

3D Shape Acquisition using a combined SSD and Least Squares Correlation Approach (Abstract)

R?diger Dillmann , University of Karlsruhe, Germany
Pedram Azad , University of Karlsruhe, Germany
Tilo Gockel , University of Karlsruhe, Germany
pp. 367

Mining User Navigational Patterns in Dynamically Changing Environments (Abstract)

Ajumobi Udechukwu , University of Calgary, Canada
Ken Barker , University of Calgary, Canada
Reda Alhajj , University of Calgary, Canada
pp. 372
Session WB II: Wireless Ad Hoc Network

Ant Mobility Model Platform for Network Simulator (Abstract)

Yi-Wei Ting , Chaoyang University of Technology, Taiwan
Chou-Chen Yang , Chaoyang University of Technology, Taiwan
Shih-Hsuan Yen , Chaoyang University of Technology, Taiwan
Hsien-Chou Liao , Chaoyang University of Technology, Taiwan
pp. 380

Multiple Directional Antennas in Suburban Ad-Hoc Networks (Abstract)

Carlo Kopp , Monash University, Clayton, Australia
Ronald Pose , Monash University, Clayton, Australia
Muhammad Mahmudul Islam , Monash University, Clayton, Australia
pp. 385

Statistic-based Routing in Wireless Sensor Networks (Abstract)

Larry Hughes , Dalhousie University, Halifax, Canada
Xianhui Xie , Dalhousie University, Halifax, Canada
pp. 390

Collaborative Vision using Networked Sensors (Abstract)

Ram Dantu , University of North Texas, Denton, TX
Sachin P. Joglekar , University of North Texas, Denton, TX
pp. 395

Secure Multipath Communication in Mobile Ad hoc Networks (Abstract)

Tri Van Le , Florida State University
Mike Burmester , Florida State University
pp. 405

Accessing SMIL-based Dynamically Adaptable Multimedia Presentations from Mobile Devices (Abstract)

Marcin Lubonski , University of Technology, Sydney
Elaine Lawrence , University of Technology, Sydney
Yuri Ventsov , University of Technology, Sydney
Robert Steele , University of Technology, Sydney
pp. 410
Session WB III: Web / Database Applications

Extended DCEL Data Structure for Mobile Computing (Abstract)

Jianhong Li , University of Nevada, Las Vegas
Laxmi P. Gewali , University of Nevada, Las Vegas
Xiaojun Liang , University of Nevada, Las Vegas
pp. 416

An Object and XML Database Schemas Design Tool (Abstract)

Suphamit Chittayasothorn , King Mongkut's Institute of Technology, Ladkrabang
Narudol Chankuang , King Mongkut's Institute of Technology, Ladkrabang
pp. 421

Prefetching XML Data with Abstract Query Mining (Abstract)

Shiu Hin Wang , The Hong Kong Polytechnic University
Vincent T. Y. Ng , The Hong Kong Polytechnic University
Chan Chi Kong , The Hong Kong Polytechnic University
pp. 428

Distributed Knowledge Management for Autonomous Access Control in Computer Networks (Abstract)

Alexandr Seleznyov , University College London, UK
Stephen Hailes , University College London, UK
pp. 433

Software Security in Bangladesh with .NET Framework: A Roadmap (Abstract)

Mohammad Ashraful Alam , American International University - Bangladesh
pp. 438

Design Strategies to Improve Performance of GIS Web Services (Abstract)

Shengru Tu , University of New Orleans, LA
Venkata Mahadevan , University of New Orleans, LA
Eric Normand , University of New Orleans, LA
Kevin Shaw , Stennis Space Center, Mississippi
Jay Ratcliff , U.S. Army Corps of Engineers, New Orleans, LA
Maik Flanagin , University of New Orleans, LA
Ying Wu , University of New Orleans, LA
Mahdi Abdelguerfi , University of New Orleans, LA
pp. 444
SESSION WB IV: Data Mining II

KIP: A Keyphrase Identification Program with Learning Functions (Abstract)

Quanzhi Li , New Jersey Institute of Technology
Xin Chen , New Jersey Institute of Technology
Yi-fang Brook Wu , New Jersey Institute of Technology
Razvan Stefan Bot , New Jersey Institute of Technology
pp. 450

Applications of Data Mining in Retail Business (Abstract)

Syed Riaz Ahmed , North Georgia College & State University
pp. 455

Evidence Combination in Medical Data Mining (Abstract)

Gauri A. Mahajani , The University of Texas at Arlington
Y. Alp Aslandogan , The University of Texas at Arlington
Stan Taylor , The University of Texas Southwestern MedicalCenter
pp. 465

Building Decision Trees Using Functional Dependencies (Abstract)

Victor C. S. Lee , City University of Hong Kong
Kwok-Wa Lam , City University of Hong Kong
pp. 470

A New Framework for Uncertainty Sampling: Exploiting Uncertain and Positive-Certain Examples in Similarity-Based Text Classification (Abstract)

Kang H. Lee , University of Sydney, NSW, Australia
Byeong H. Kang , University of Tasmania, Hobart, Tasmania, Australia
pp. 474

Confidence on Approximate Query in Large Datasets (Abstract)

Hao Wu , University of Arkansas at Little Rock
John Talburt , Acxiom Corporation, Little Rock
Chia-Chu Chiang , University of Arkansas at Little Rock
Charles Wesley Ford , University of Arkansas at Little Rock
Radhika R. Chilka , University of Arkansas at Little Rock
pp. 480
Session WC I: Cryptographic Hardware I

High Performance FPGA based Elliptic Curve Cryptographic Co-Processor (Abstract)

Anwarul Hasan , University of Waterloo
Jonathan Lutz , University of Waterloo
pp. 486

A Parallel Architecture for Computing Scalar Multiplication on Hessian Elliptic Curves (Abstract)

Arturo D?az-P?rez , Centro de Investigaci?n y de Estudios Avanzados del IPN, M?xico
Francisco Rodr?guez-Henriquez , Centro de Investigaci?n y de Estudios Avanzados del IPN, M?xico
Nazar A. Saqib , Centro de Investigaci?n y de Estudios Avanzados del IPN, M?xico
pp. 493

Architectural Design Features of a Programmable High Throughput AES Coprocessor (Abstract)

Patrick Schaumont , University of California, Los Angeles
Alireza Hodjat , University of California, Los Angeles
Ingrid Verbauwhede , University of California, Los Angeles
pp. 498

Multi-Objective Evolutionary Hardware for RSA-Based Cryptosystems (Abstract)

Nadia Nedjah , State University of Rio de Janeiro, Brazil
Luiza de Macedo Mourelle , State University of Rio de Janeiro, Brazil
pp. 503

Efficient Cryptographic Hardware Using the Co-Design Methodology (Abstract)

Nadia Nedjah , State University of Rio de Janeiro, Brazil
Luiza de Macedo Mourelle , State University of Rio de Janeiro, Brazil
pp. 508

High Performance Arithmetic for special Hyperelliptic Curve Cryptosystems of Genus Two (Abstract)

Jan Pelzl , Ruhr-Universitaet Bochum, Germany
Christof Paar , Ruhr-Universitaet Bochum, Germany
Thomas Wollinger , Ruhr-Universitaet Bochum, Germany
pp. 513

Fast Modular Multiplication by Operand Changing (Abstract)

Viktor Bunimov , Technical University of Braunschweig, Germany
Manfred Schimmler , Technical University of Braunschweig, Germany
pp. 518

A Clock-less Implementation of the AES Resists to Power and Timing Attacks (Abstract)

David S. Br? , The University of Manchester, UK
An Yu , The University of Manchester, UK
pp. 525

Increasing Robustness of LSB Audio Steganography Using a Novel Embedding Method (Abstract)

Nedeljko Cvejic , University of Oulu, Finland
Tapio Sepp?nen , University of Oulu, Finland
pp. 533

Finding Optimum Parallel Coprocessor Design for Genus 2 Hyperelliptic Curve Cryptosystems (Abstract)

Thomas Wollinger , Ruhr-Universitaet Bochum, Germany
Luca Breveglieri , Politecnico di Milano, Italy
Guido Bertoni , Politecnico di Milano, Italy
Christof Paar , Ruhr-Universitaet Bochum, Germany
pp. 538
Session WC II: Cryptographic Hardware II

Power-Analysis Attack on an ASIC AES implementation (Abstract)

Siddika Berna ?rs , Katholieke Universiteit Leuven, Belgium
Bart Preneel , Katholieke Universiteit Leuven, Belgium
Frank G?rkaynak , Integrated Systems Laboratory ETH Zentrum, Switzerland
Elisabeth Oswald , Institute for Applied Information Processing and Communications (IAIK), Austria; A-SIT, Technologiebeobachtung, Austria
pp. 546

A Basis-Independent Algorithm to Design Fast Parallel Multipliers over GF(2<sup>m</sup>) (Abstract)

Michele Elia , Politecnico di Torino, Italy
Manuel Leone , Telecom Italia Lab, Italy
pp. 553

On the Importance of Protecting ∆ in SFLASH against Side Channel Attacks (Abstract)

Camille Vuillaume , Technische Universit?t Darmstadt, Germany
Tsuyoshi Takagi , Technische Universit?t Darmstadt, Germany
Katsuyuki Okeya , Hitachi, Ltd., Yokohama, Japan
pp. 560

On Permutation Operations in Cipher Design (Abstract)

Y. L. Yin , Princeton University, NJ
M.J.B. Robshaw , University of London, UK
Z. J. Shi , Princeton University, NJ
Ronald L. Rivest , CSAIL, Cambridge, MA
Ruby B. Lee , Princeton University, NJ
pp. 569

Streaming Encryption for a Secure Wavelength and Time Domain Hopped Optical Network (Abstract)

Ingrid Verbauwhede , University of California, Los Angeles
Alireza Hodjat , University of California, Los Angeles
Richard Wesel , University of California, Los Angeles
Jun Shi , University of California, Los Angeles
Herwin Chan , University of California, Los Angeles
pp. 578

Compact and Efficient Encryption/Decryption Module for FPGA Implementation of the AES Rijndael Very Well Suited for Small Embedded Applications (Abstract)

Fran?ois-Xavier Standaert , Universit? catholique de Louvain, Belgium
Jean-Jacques Quisquater , Universit? catholique de Louvain, Belgium
Jean-Didier Legat , Universit? catholique de Louvain, Belgium
Ga? Rouvroy , Universit? catholique de Louvain, Belgium
pp. 583

Area Efficient High Speed Elliptic Curve Cryptoprocessor for Random Curves (Abstract)

A. K. Daneshbeh , University of Waterloo, Canada
M. A. Hasan , University of Waterloo, Canada
pp. 588
Session WC III: Space Science Computation and IT Applications

Comparing Different Thresholding Algorithms for Segmenting Auroras (Abstract)

Glynn Germany , University of Alabama in Huntsville
Sara Graves , University of Alabama in Huntsville
Wladislaw Lyatsky , Alabama A&M University
John Rushing , University of Alabama in Huntsville
Matt He , University of Alabama in Huntsville
Arjun Tan , Alabama A&M University
Rahul Ramachandran , University of Alabama in Huntsville
Xiang Li , University of Alabama in Huntsville
Sunil Movva , University of Alabama in Huntsville
pp. 594

Exploiting Known Latitudinal Variations for Improved Limited-Angle Tomographic Reconstruction of the Plasmasphere (Abstract)

Naveen Santhanam , University of Alabama in Huntsville
Dennis L. Gallagher , NASA Marshall Space Flight Center
Timothy S. Newman , University of Alabama in Huntsville
pp. 602

Mapping Surface Materials on Mars from Mars Pathfinder Spectral Images with HYPEREYE (Abstract)

Philip Tracadas , Rice University, Houston, Texas
Erzs?bet Mer?nyi , Rice University, Houston, Texas
William H. Farrand , Space Science Institute, Boulder, Colorado
pp. 607

Lossless Encoding Based on Redistribution of Statistics (Abstract)

Artyom M. Grigoryan , The University of Texas at San Antonio
Serkan Dursun , The University of Texas at San Antonio
Emma E. Regentova , University of Nevada, Las Vegas
pp. 620

On the Design of Heterogeneous Applications for Distributed Coordination (Abstract)

Peiyi Tang , University of Arkansas at Little Rock
Chia-Chu Chiang , University of Arkansas at Little Rock
pp. 625
SESSION WC IV: Potpourri II

Digital Library Resources Description (Abstract)

Chadia Moghrabi , Universit? de Moncton
Tang-Ho L? , Universit? de Moncton
Johanne Hachey , Universit? de Moncton
Jean Roy , Universit? de Moncton
pp. 632

Applying Continuous Action Reinforcement Learning Automata(CARLA) to Global Training of Hidden Markov Models (Abstract)

Mohammad Mehdi Homayounpour , AmirKabir University of Technology (Tehran PolyTechnic), Tehran, Iran
Mohammad Reza Meybodi , AmirKabir University of Technology (Tehran PolyTechnic), Tehran, Iran
Jahanshah Kabudian , AmirKabir University of Technology (Tehran PolyTechnic), Tehran, Iran
pp. 638

Towards Proactive Computer-System Forensics (Abstract)

Bonnie Self , The University of Alabama, Tuscaloosa, AL
Josh Perdue , The University of Alabama, Tuscaloosa, AL
Phillip G. Bradford , The University of Alabama, Tuscaloosa, AL
Marcus Brown , The University of Alabama, Tuscaloosa, AL
pp. 648

Fuzzy Clustering for TV Program Classification (Abstract)

Zhou Xingshe , Northwestern Polytechnical University
Gu Jianhua , Northwestern Polytechnical University
Yu Zhiwen , Northwestern Polytechnical University
Yang Zhiyi , Northwestern Polytechnical University
pp. 658
Session WD I: IMAGE / VIDEO Processing

Improved Rate Control for Advanced Video Coding (AVC)Standard under Low Delay Constraint (Abstract)

Supavadee Aramvith , Chulalongkorn University, Bangkok, Thailand
Pornthep Navakitkanok , Chulalongkorn University, Bangkok, Thailand
pp. 664

Distributed Omni-Video Arrays and Digital Tele-Viewer for Customized Viewing, Event Detection and Notification (Abstract)

Kohsia S. Huang , University of California, San Diego
Kimberly Harlow , University of California, San Diego
Mohan M. Trivedi , University of California, San Diego
Brett Hall , University of California, San Diego
Tarak Gandhi , University of California, San Diego
pp. 669

Application of Active Contour Models in Medical Image Segmentation (Abstract)

M'hamed Khelif , Abou Bekr Belkaid University, Tlemcen
Foued Derraz , Abou Bekr Belkaid University, Tlemcen
Mohamed Beladgham , Abou Bekr Belkaid University, Tlemcen
pp. 675

Digital Analysis of Thermal Infrared Imagery using Temperature Mapping (Abstract)

Cheruku Venkateswarlu , Infosys Technologies Ltd., India
Sumanth Yenduri , Louisiana State University, Baton Rouge, USA
S. S. Iyengar , Louisiana State University, Baton Rouge, USA
pp. 682

An HVS-based Motion Vector Composition Algorithm for Spatial Resolution Transcoding (Abstract)

Abdullah A. Yusuf , Monash University, Victoria, Australia
Laurence S. Dooley , Monash University, Victoria, Australia
Manzur Murshed , Monash University, Victoria, Australia
pp. 689

Neural Image Recognition System with Application to Tuberculosis Detection (Abstract)

K. V. Ramana , JNTUCE, Kakinada, India
S. Basha , RVR&JC CE, Guntur, India
pp. 694

Error Concealment of Transform Coded Images With Continuous QoS (Abstract)

Yi Shang , University of Missouri-Columbia
Xiao Su , San Jose State University, CA
pp. 699

JPEG Compression Immune Steganography Using Wavelet Transform (Abstract)

Andrew H. Sung , New Mexico Tech
Qingzhong Liu , New Mexico Tech
Jianyun Xu , New Mexico Tech
Peipei Shi , New Mexico Tech
pp. 704

A Novel DCT-based Approach for Secure Color Image Watermarking (Abstract)

Reza Safabakhsh , Amirkabir University of Technology
Narges Ahmidi , Amirkabir University of Technology
pp. 709

Efficient Technique for Ellipse Detection Using Restricted Randomized Hough Transform (Abstract)

Zhiguo Cheng , Shanghai Jiaotong University, China
Yuncai Liu , Shanghai Jiaotong University, China
pp. 714
Session WD II: Mobile Enterprise II

Key Agreement and Identity Authentication Protocols for Ad Hoc Networks (Abstract)

Guihua Zeng , Shanghai Jiaotong University, China
Jun Yao , Shanghai Jiaotong University, China
pp. 720

Hybrid Greedy/multicasting Power-aware Routing Protocol in Ad Hoc Networks (Abstract)

David Cordes , University of Alabama, Tuscaloosa
Jiageng Li , University of Alabama, Tuscaloosa
pp. 725

NICD: A Novel Indexless Wireless On-Demand Data Broadcast Algorithm (Abstract)

O. B. V. Ramanaiah , University of Hyderabad, India
Hrushikesha Mohanty , University of Hyderabad, India
pp. 730

Causal Ordering in Event Notification Service Systems for Mobile Users (Abstract)

Chit Htay Lwin , University of Hyderabad, India
R. K. Ghosh , IIT, Kanpur, India
Hrushikesha Mohanty , University of Hyderabad, India
pp. 735

Using SPIN to Model Cryptographic Protocols (Abstract)

Xue Rui , The State Key Laboratory of Information Security, Beijing
Li Yongjian , Chinese Academy of Sciences, Beijing
pp. 741

Bluetooth Potential in the M-Enterprise: A Feasibility Study (Abstract)

Johit Das , University of Technology, Sydney
Elaine Lawrence , University of Technology, Sydney
Sojen Pradhan , University of Technology, Sydney
Stephen Newton , eStratgies.com
pp. 746

Security Level Evaluation: Policy and Fuzzy Techniques (Abstract)

Luigi Troiano , University of Sannio, Italy
Valentina Casola , Second University of Naples, Italy
Rosa Preziosi , University of Sannio, Italy
Massimiliano Rak , Second University of Naples, Italy
pp. 752
Session WD III: E Gaming

Secure Large-Scale Bingo (Abstract)

Antoni Mart?nez-Ballest? , Universitat Rovira i Virgili, Catalonia
Josep Domingo-Ferrer , Universitat Rovira i Virgili, Catalonia
Francesc Seb? , Universitat Rovira i Virgili, Catalonia
pp. 758

Efficient Recovery of Secrets (Abstract)

Marcel Fernandez , Universitat Polit?cnica de Catalunya, Spain
Miguel Soriano , Universitat Polit?cnica de Catalunya, Spain
pp. 763

A Platform for Secure E-Gambling (Abstract)

Carlo Blundo , Universit? di Salerno, Italy
Stelvio Cimato , Universit? di Salerno, Italy
pp. 768

A Game-Theoretic Model for Two-Party Cryptographic Protocols (Abstract)

P. Caballero-Gil , University of La Laguna, Spain
C. Bruno-Casta?eda , University of La Laguna, Spain
C. Hern?ndez-Goya , University of La Laguna, Spain
pp. 773

A Non-Repudiable Bitstring Commitment Scheme Based on a Public-Key Cryptosystem (Abstract)

Jordi Castell?-Roca , Universitat Rovira i Virgili, Catalonia
Josep Domingo-Ferrer , Universitat Rovira i Virgili, Catalonia
pp. 778

On the Security of an Efficient TTP-Free Mental Poker Protocol (Abstract)

Josep Domingo-Ferrer , Universitat Rovira i Virgili, Spain
Jordi Castell?-Roca , Universitat Rovira i Virgili, Spain
pp. 781
SESSION WD IV: Applications

An Approach to On-line Text Generation for E-learning Purposes (Abstract)

Maryam Tayefeh Mahmoudi , Iran Telecom Research Center
Kambiz Badie , Iran Telecom Research Center
pp. 786

Analysis and Compensation of Errors in the Input Device Based on Inertial Sensors (Abstract)

Sung-Jung Cho , Samsung Advanced Institute of Technology, South Korea
Dong-Yoon Kim , Samsung Advanced Institute of Technology, South Korea
Won-Chul Bang , Samsung Advanced Institute of Technology, South Korea
Wook Chang , Samsung Advanced Institute of Technology, South Korea
Eun-Seok Choi , Samsung Advanced Institute of Technology, South Korea
Jing Yang , Samsung Advanced Institute of Technology, South Korea
Kyoung-Ho Kang , Samsung Advanced Institute of Technology, South Korea
pp. 790

Evaluation and Comparison of Natural Language and Graphical User Interfaces in "Query-by-Impressions" Scenes (Abstract)

Tadahiko Kumamoto , National Institute of Information and Communications Technology, Japan
Kimiko Ohta , National Institute of Information and Communications Technology, Japan
pp. 797

Estimation of Camera Pose Using 2D to 3D Corner Correspondence (Abstract)

Yuncai Liu , Shanghai Jiao Tong University
Fanhuai Shi , Shanghai Jiao Tong University
pp. 805

Secure Information Sharing Using Role-based Delegation (Abstract)

Gail-Joon Ahn , University of North Carolina at Charlotte
Badrinath Mohan , University of North Carolina at Charlotte
pp. 810

Baghdad Method for Calculating Multiplicative Inverse (Abstract)

Sattar J. Aboud , Applied Science University (A.S.U.)
pp. 816

An Information Search Interface with Soft Real-time Guarantee (Abstract)

Dai Yiqi , Tsinghua University, Beijing, China
Wang Huayong , Tsinghua University, Beijing, China
pp. 820
SESSION WD V: New Session

Synthesis Scheme for Low Power Designs with Multiple Supply Voltages by Heuristic Algorithms (Abstract)

Yingtao Jiang , University of Nevada, Las Vegas
Henry Selvaraj , University of Nevada, Las Vegas
Ling Wang , University of Nevada, Las Vegas
pp. 829

Knowledge Discovery in a Microarray Data Warehouse (Abstract)

Ali Al-Timimi , George Mason University, Fairfax, VA
D. Curtis Jamison , George Mason University, Fairfax, VA
pp. 834

Three and Four-dimensional Parity-check Codes for Correction and Detection of Multiple Errors (Abstract)

Utthaman Thirunavukkarasu , University of Nevada-Las Vegas
Shahram Latifi , University of Nevada-Las Vegas
Naveen Babu Anne , University of Nevada-Las Vegas
pp. 840

Author Index (PDF)

pp. 851
99 ms
(Ver )