The Community for Technology Leaders
Information Technology: New Generations, Third International Conference on (2006)
Las Vegas, Nevada
Apr. 10, 2006 to Apr. 12, 2006
ISBN: 0-7695-2497-4
TABLE OF CONTENTS
Introduction

Reviewers (PDF)

pp. xvi
Introduction

Reviewers (PDF)

pp. xvi
Session MA1: IT Education

Six Sigma in Education: To Achieve Overall Excellence in the Field of Education (Abstract)

Varsha Hemant Patil , K. K. Wagh Institute of Engineering Education and Research, India
Snehal M. Kamlapur , K. K. Wagh Institute of Engineering Education and Research, India
Manikrao L. Dhore , Vishwkarma Institute of Technology, India
pp. 2-5

Hiring the IT Graduate: What?s in the Box? (Abstract)

Jacob R. Miller , Pennsylvania College of Technology
Sandra Gorka , Pennsylvania College of Technology
Barry Lunt , Brigham Young University
Joseph J. Ekstrom , Brigham Young University
Eydie Lawson , Rochester Institute of Technology
Han Reichgelt , Georgia Southern University
Reza Kamali , Purdue University Calumet
pp. 6-10

Implications of IT in Different Professions (Abstract)

Inger Bj?rkman , University West, Sweden
Ann Johansson , University West, Sweden
pp. 11-19
Session MA2: Software Engineering I

Decoupling Security Concerns in Web Services Using Aspects (Abstract)

G. Kouadri Most?faoui , Fribourg University, Switzerland
Z. Maamar , Zayed University, U.A.E
N. C. Narendra , IBM India Research Lab, India
S. Sattanathan , National Institute of Technology, India
pp. 20-27

An Agglomerative Clustering Methodology For Data Imputation (Abstract)

Sumanth Yenduri , University of Southern Mississippi
pp. 34-39

Cost Implications of Software Commonality and Reuse (Abstract)

Eugenio Capra , Politecnico di Milano
Chiara Francalanci , Politecnico di Milano
pp. 40-45

On OO Design Consistency in Iterative Development (Abstract)

Umesh Bellur , I.I.T. Bombay, India
V. Vallieswaran , I.I.T. Bombay, India
pp. 46-51

Reliable Deployment of Component-based Applications into Distributed Environments (Abstract)

Abbas Heydarnoori , University of Waterloo, Canada
Farhad Mavaddat , University of Waterloo, Canada
pp. 52-57

Modular Model of a Logic Circuit Using Object-Oriented Programming (Abstract)

Stefan Senczyna , Silesian University of Technology, Poland
pp. 58-65
Session MA3: Software Engineering II

A First Draft of RATF: A Method Combining Robustness Analysis and Technology Forecasting (Abstract)

G?ran Cal? , University West, Sweden
Andreas Boklund , University West, Sweden
Stefan Mankefors-Christiernin , University West, Sweden
pp. 72-77

Studying Software Implementations of Elliptic Curve Cryptography (Abstract)

Hai Yan , University of Connecticut
Zhijie Jerry Shi , University of Connecticut
pp. 78-83

Novel Approach for Remote Energy Meter Reading Using Mobile Agents (Abstract)

Radwan Tahboub , Politehnica University of Bucharest
Vasile Lazarescu , Politehnica University of Bucharest
pp. 84-89

RL-Agent That Learns in Collaborative Virtual Environment (Abstract)

Elhadi Shakshuki , Acadia University, Canada
Abdur Wasey Matin , Acadia University, Canada
pp. 90-95

On History-Sensitive Models of Interactive Stacks (Abstract)

Walter Dosch , University of Lubeck, Germany
pp. 96-103

New Algorithms For Random Access Text Compression (Abstract)

L. Robert , Government Arts College, India
R. Nadarajan , PSG College of Technology, India
pp. 104-111
Session MA4: Software Engineering III

Production and Maintenance of Content-Intensive Videogames: A Document-Oriented Approach (Abstract)

Iv?n Mart?nez-Ortiz , Centro de Estudios Superiores Felipe II, Aranjuez, Spain
Pablo Moreno-Ger , Universidad Complutense, Spain
Jos? Luis Sierra , Universidad Complutense, Spain
Baltasar Fern?ndez-Manj? , Universidad Complutense, Spain
pp. 118-123

Agent Launch Pattern for Creating Agents (Abstract)

Elhadi Shakshuki , Acadia University, Canada
Omkarnath Prabhu , Acadia University, Canada
pp. 131-136

Degree of Freedom ― Experience of Applying Software Framework (Abstract)

Wang-chan Wong , California State University, Dominguez Hills
Mohammad Eyadat , California State University, Dominguez Hills
Shane Ng , Hong Kong University
pp. 143-148

Rethinking Programming (Abstract)

W M Beynon , University of Warwick, UK
R C Boyatt , University of Warwick, UK
S B Russ , University of Warwick, UK
pp. 149-154

Measurement of Intra-Class & Inter-Class Weakness for Object-Oriented Software (Abstract)

Jitender Kumar Chhabra , National Institute of Technology, India
K.K. Aggarwal , National Institute of Technology, India
pp. 155-160

An Investigation of Bad Smells in Object-Oriented Design (Abstract)

Raed Shatnawi , The University of Alabama in Huntsvi
Wei Li , The University of Alabama in Huntsville
pp. 161-165
Session MB1: Embedded Cryptographic Systems I

Efficient Implementation of Galois Field Fixed Field Constant Multiplication (Abstract)

AJ Elbirt , University of Massachusetts Lowell
Christof Paar , Ruhr-Universitat Bochum, Germany
pp. 172-177

Efficient Methods in Converting to Modulo 2^n+1 and 2^n-1 (Abstract)

Kooroush Manochehri , Amirkabir University of Technology, Iran
Saadat Pourmozafari , Amirkabir University of Technology, Iran
Babak Sadeghian , Amirkabir University of Technology, Iran
pp. 178-185
Session MB2: Embedded Cryptographic Systems II

Parallel Hardware Architectures for the Cryptographic Tate Pairing (Abstract)

G. Bertoni , ST Microelectronics, Italy
L. Breveglieri , Politecnico di Milano, Italy
P. Fragneto , ST Microelectronics, Italy
G. Pelosi , Politecnico di Milano, Italy
pp. 186-191

An Embedded Processor for a Pairing-Based Cryptosystem (Abstract)

Robert Ronan , University College Cork, Ireland
Colm O hEigeartaigh , Dublin City University, Ireland
Colin Murphy , University College Cork, Ireland
Michael Scott , Dublin City University, Ireland
Tim Kerins , University College Cork, Ireland
W.P. Marnane , University College Cork, Ireland
pp. 192-197

Efficient Authenticated Key-Exchange for Devices with a Trusted Manager (Abstract)

He Ge , University of North Texas
Stephen R. Tate , University of North Texas
pp. 198-203

Side-Channel Leakage Tolerant Architectures (PDF)

Kris Tiri , UC Los Angeles
Patrick Schaumont , Virginia Tech
Ingrid Verbauwhede , K.U.Leuven, Belgium
pp. 204-209

Four Hardware Implementations for the M-ary Modular Exponentiation (Abstract)

Nadia Nedjah , State University of Rio de Janeiro
Luiza de Macedo Mourelle , State University of Rio de Janeiro
pp. 210-215

A Compact Piplined Hardware Implementation of the AES-128 Cipher (Abstract)

Nadia Nedjah , State University of Rio de Janeiro
Luiza de Macedo Mourelle , State University of Rio de Janeiro
Marco Paulo Cardoso , State University of Rio de Janeiro
pp. 216-221
Session MB3: High Performance Computer Architectures

K-Selector-Based Dispatching Algorithm for Clos-Network Switches (Abstract)

Mei Yang , University of Nevada Las Vegas
Mayauna McCullough , Fort Valley State University
Yingtao Jiang , University of Nevada Las Vegas
Jun Zheng , Queens College
pp. 222-226

Evaluating Parallel Computing Systems in Bioinformatics (Abstract)

Erik S. Gough , Purdue University
Michael D. Kane , Purdue University
pp. 233-238

RDT Properties and Evaluations (Abstract)

Yulu Yang , Nankai University, China
Yang Yu , Nankai University, China
pp. 239-244

VMSIM: Virtual Machine Based a Full System Simulation Platform for Microprocessors? Functional Verification (Abstract)

Jianfeng An , Northwestern Polytechnical University, China
Xiaoya Fan , Northwestern Polytechnical University, China
Shengbing Zhang , Northwestern Polytechnical University, China
Danghui Wang , Northwestern Polytechnical University, China
Yi Wang , Nanyang Technological University, Singapore
pp. 245-249

A Reconfigurable Architecture for Wireless Communication Systems (Abstract)

Hooman Parizi , University of California, Irvine
Afshin Niktash , University of California, Irvine
Amir Kamalizad , University of California, Irvine
Nader Bagherzadeh , University of California, Irvine
pp. 250-255
Session MB4: Sensor Networks

COSEN: A Chain Oriented Sensor Network for Efficient Data Collection (Abstract)

Nahdia Tabassum , Waseda University, Japan
Quazi Ehsanul , Waseda University, Japan
Kabir Mamun , Waseda University, Japan
Yoshiyori Urano , Waseda University, Japan
pp. 262-267

Interference Aware Dominating Set for Sensor Network (Abstract)

Laxmi Gewali , University of Nevada, Las Vegas
Khursheed Mohamad , University of Nevada, Las Vegas
Min Tun , University of Nevada, Las Vegas
pp. 268-273

Improved Maximum Likelihood Estimation of Target Position in Wireless Sensor Networks using Particle Swarm Optimization (Abstract)

Mathew M. Noel , The University of Alabama at Birmingham
Parag P. Joshi , The University of Alabama at Birmingham
Thomas C. Jannett , The University of Alabama at Birmingham
pp. 274-279

Efficient RBS in Sensor Networks (Abstract)

Hyojung Lee , Chungnam National University, South Korea
Wonpil Yu , Electronics and Telecommunications Research Institute, South Korea
Youngmi Kwon , Chungnam National University, South Korea
pp. 279-284
Session TA1: Mobile Enterprise I

Mobile Terminated SMS Billing — Exploits and Security Analysis (Abstract)

Philip Garner , Lancaster University
Ian Mullins , Lancaster University
Reuben Edwards , Lancaster University
Paul Coulton , Lancaster University
pp. 294-299

SmartDOTS - A Framework for Efficient Data Synchronization on Mobile Devices (Abstract)

Werner Kurschl , Upper Austrian University of Applied Sciences, Austria
Stefan Mitsch , Upper Austrian University of Applied Sciences, Austria
Rene Prokop , Upper Austrian University of Applied Sciences, Austria
pp. 300-305
Session TA2: Mobile Enterprise II

Consumer Value Segments in Mobile Bill Paying (Abstract)

Tommi Laukkanen , University of Kuopio
Teuvo Kantanen , University of Kuopio
pp. 314-319

Government as a Mobile Enterprise: Real-time, Ubiquitous Government (Abstract)

Tarek El Kiki , University of Technology Sydney, Australia
Elaine Lawrence , University of Technology Sydney, Australia
pp. 320-327

SelectiveDES: A Distributed Event Service Add-On for Invocation-Based Middleware supporting Selective Multi-Channel Communication and Notification Delivery (Abstract)

Werner Kurschl , Upper Austrian University of Applied Sciences, Austria
Stefan Mitsch , Upper Austrian University of Applied Sciences, Austria
Rene Prokop , Upper Austrian University of Applied Sciences, Austria
pp. 328-333

Internet Mobility using SIP and MIP (Abstract)

Abdul Nasir , University of Peshawar, Pakistan
Mah-Rukh Mah-Rukh , University of Peshawar, Pakistan
pp. 334-339

A Dynamic Mobility Management Scheme for VoIP Services (Abstract)

Eunjung Lee , University of Houston
Jinsuk Baek , Winston-Salem University
Shou-Hsuan Stephen Huang , University of Houston
pp. 340-345

Secure ICT Services for Mobile and Wireless Communications: A Federated Global Identity Management Framework (Abstract)

J. Siddiqi , Sheffield Hallam University (UK)
B. Akhgar , Sheffield Hallam University (UK)
M. Naderi , Sheffield Hallam University (UK)
W. Orth , Fraunhofer Institute for Secure Information Technology (Germany)
N. Meyer , Poznan Supercomputing & Networking Center (Poland)
M. Tuisku , University of Helsinki (Finland)
G. Pipan , XLAB (Slovenia)
M. L?pez Gallego , Telef?nica I+D (Spain)
J. A. Garc? , Telef?nica I+D (Spain)
M. Cecchi , Telecom Italia (Italy)
J. Colin , Sun Microsystems (Belgium)
pp. 351-357
Session TA3: Web Technologies

Using the Web to Construct Taxonomy for a Heterogeneous Community of Practice (Abstract)

Isak Taksa , Baruch College, City University of New York
Amanda Spink , Queensland University of Technology
pp. 358-363

Feature and Prototype Evolution for Nearest Neighbor Classification of Web Documents (Abstract)

Michelle Cheatham , Air Force Research Laboratory
Mateen Rizki , Wright State University
pp. 364-369

Overlap Among Major Web Search Engines (Abstract)

Amanda Spink , Queensland University of Technology
Bernard J. Jansen , The Pennsylvania State University
Chris Blakely , Infospace, Inc.
Sherry Koshman , University of Pittsburgh
pp. 370-374

A General Classification of (Search) Queries and Terms (Abstract)

Nadine Schmidt-Maenz , University of Karlsruhe (TH), Germany
Martina Koch , University of Karlsruhe (TH), Germany
pp. 375-381

An Automated WSDL Generation and Enhanced SOAP Message Processing System for Mobile Web Services (Abstract)

Gil Cheol Park , Hannam University, Korea
Seok Soo Kim , Hannam University, Korea
Gun Tae Bae , Hannam University, Korea
Yang Sok Kim , University of Tasmania, Australia
Byeong Ho Kang , University of Tasmania, Australia
pp. 382-387

Web Page Recommender System based on Folksonomy Mining for ITNG ?06 Submissions (Abstract)

Satoshi Niwa , University of Tokyo
Takuo Doi , University of Tokyo
Shinichi Honiden , University of Tokyo
pp. 388-393
Session TA4: Internet and Wireless Security

Group Key Management in Wireless Networks Using Session Keys (Abstract)

Dhilak Damodaran , Monash University, Australia
Rohit Singh , Monash University, Australia
Phu Dung Le , Monash University, Australia
pp. 402-407

Anomaly Detection in SMTP Traffic (Abstract)

Hao Luo , Harbin Institute of Technology
Binxing Fang , Harbin Institute of Technology
Xiaochun Yun , Harbin Institute of Technology
pp. 408-413

A Secure Group Key Management Scheme for Wireless Cellular Networks (Abstract)

Hwayoung Um , Purdue University
Edward J. Delp , Purdue University
pp. 414-419

Anomaly Detection Based Intrusion Detection (Abstract)

Dima Novikov , Rochester Institute of Technology
Roman V. Yampolskiy , University at Buffalo
Leon Reznik , Rochester Institute of Technology
pp. 420-425

Secure Two-Way Transfer of Measurement Data (Abstract)

Marko Hassinen , University of Kuopio, Finland
Maija Marttila-Kontio , University of Kuopio, Finland
Mikko Saesmaa , University of Kuopio, Finland
Heli Tervo , University of Kuopio, Finland
pp. 426-431

Efficient Group Key Management in Wireless Networks (Abstract)

Yiling Wang , Monash University
Dhilak Damodaran , Monash University
Phu Dung Le , Monash University
pp. 432-439
Session TB1: Information Security and Privacy I

New Method for Risk Management in CRM Security Management (Abstract)

Mahdi Seify , Sharif University of Technology, Iran
pp. 440-445

Analysis of Log Files Intersections for Security Enhancement (Abstract)

Kazimierz Kowalski, , California State University, Dominguez Hills
Mohsen Beheshti , California State University, Dominguez Hills
pp. 452-457
Session TB2: Information Security and Privacy II

The Design and Implementation of a Smartphone Payment System based on Limited-used Key Generation Scheme (Abstract)

Xianping Wu , Monash University, Australia
Osama Dandash , Monash University, Australia
Phu Dung Le , Monash University, Australia
pp. 458-463

A Study on the Security of Privacy Homomorphism (Abstract)

Yu Yu , Nanyang Technological University, Singapore
Jussipekka Leiwo , Nanyang Technological University, Singapore
Benjamin Premkumar , Nanyang Technological University, Singapore
pp. 470-475

An Efficient and Secure Code Sharing for Peer-to-Peer Communications (Abstract)

Wei Wu , Monash Univesity, Australia
Phu Dung Le , Monash University, Australia
pp. 476-481

A Copyright Protection Scheme for Gray-Level Images Using Human Fingerprint (Abstract)

Shang-Lin Hsieh , Tatung University, Taiwan
Hsuan-Chieh Huang , Tatung University, Taiwan
I-Ju Tsai , Tatung University, Taiwan
pp. 482-489
Session TB3: Data Mining and Checkpointing

Mining Documents in a Small Enterprise Using WordStat (Abstract)

E. Udoh , Indiana University - Purdue University
J. Rhoades , Indiana University - Purdue University
pp. 490-494

Web Usability Testing ― CARE Methodology (Abstract)

Arthi Anandhan , University of North Dakota
Senthil Dhandapani , University of North Dakota
Hassan Reza , University of North Dakota
Karthik Namasivayam , University of North Dakota
pp. 495-500

A Hybrid Approach to Error Reduction of Support Vector Machines in Document Classification (Abstract)

Yoon-Shik Tae , Kyungpook National University, Korea
Jeong woo Son , Kyungpook National University, Korea
Mi-hwa Kong , Kyungpook National University, Korea
Jun-Seok Lee , Kyungpook National University, Korea
Seong-Bae Park , Kyungpook National University, Korea
Sang-Jo Lee , Kyungpook National University, Korea
pp. 501-506

Knowledge Discovery in Power Quality Data Using Support Vector Machine and S-Transform (Abstract)

K. Vivek , Indian Institute of Technology Delhi, India
M. Gopa , Indian Institute of Technology Delhi, India
B.K. Panigrahi , Indian Institute of Technology Delhi, India
pp. 507-512

Closed Multidimensional Sequential Pattern Mining (Abstract)

Panida Songram , King Mongkut?s Institute of Technology, Thailand
Veera Boonjing , King Mongkut?s Institute of Technology, Thailand
Sarun Intakosum , King Mongkut?s Institute of Technology, Thailand
pp. 512-517

A Two-Phase Time-based Consistent Checkpointing Strategy (Abstract)

Men Chaoguang , Harbin Engineering University, China
Zhao Yunlong , Harbin Engineering University, China
Yao Wenbin , Harbin Engineering University, China
pp. 518-523
Session TB4: VoIP/Signal Processing

Adding High Level VoIP Facilities to the Unicon Language (Abstract)

Ziad Al-Sharif , New Mexico State University
Clinton Jeffery , New Mexico State University
pp. 524-529

A Peer to Peer Prefix Patching Scheme for VOD Servers (Abstract)

Chi Hun Lee , Kangwon National University, Korea
Yi Qi Gui, , Kangwon National University, Korea
In Bum Jung , Kangwon National University, Korea
Chang Yeol Choi , Kangwon National University
Hwang Kyu Choi , Kangwon National University, Korea
pp. 530-534

Bandwidth-Conserving Real-Time VoIP Teleconference System (Abstract)

Teck-Kuen Chua , Arizona State University
David C. Pheanis , Arizona State University
pp. 535-540

Mixed Noise Correction in Gray Images using Fuzzy Filters (Abstract)

M. Hanmandlu , I.I.T. Delhi, India
Anuj K. Tiwari , I.I.T. Delhi, India
Vamsi K. Madasu , School of ITEE, Australia
Shantaram Vasikarla , American InterCont. Univ., USA
pp. 547-553

Parameterized FIR Filtering IP Cores for Reusable SoC Design (Abstract)

Umar Farooq , University of Engineering & Technology, Pakistan
Muhammad Saleem , University of Engineering & Technology, Pakistan
Habibullah Jamal , University of Engineering & Technology, Pakistan
pp. 554-559
Session TC1: Posters

A New Bucket-Based A New Bucket-Based Algorithm for Finding LCS from two given Molecular Sequences (Abstract)

Dr. S.A.M. Rizvi , Jamia Millia Islamia University, India
Pankaj Agarwal , Jamia Millia Islamia University, India
pp. 560-561

Performance-Guided Reconfiguration of Wireless Sensor Networks that Use Binary Data for Target Localization (Abstract)

Parag P. Joshi , The University of Alabama at Birmingham
Thomas C. Jannett , The University of Alabama at Birmingham
pp. 562-565

Key Pre-Distribution Using MDS Codes in Mobile Ad Hoc Networks (Abstract)

Mohammad Al-Shurman , The University of Alabama in Huntsville
Seong-Moo Yoo , The University of Alabama in Huntsville
pp. 566-567

Key Management and Mutual Authentication for Multiple Field Records Smart Cards (Abstract)

Kiarash Narimani , University of Waterloo, Canada
Gordon B. Agnew , University of Waterloo, Canada
pp. 568-569

FPGA based DPA-resistant Unified Architecture for Signcryption (Abstract)

Yi Wang , Nanyang Technological University, Singapore
Jussipekka Leiwo , Nanyang Technological University, Singapore
Thambipillai Srikanthan , Nanyang Technological University, Singapore
Yu Yu , Nanyang Technological University, Singapore
pp. 571-572

ECC Hardware Coprocessors for 8-bit Systems and Power Consumption Considerations (Abstract)

Guido Bertoni , STMicroelectronics, Italy
Luca Breveglieri , Politecnico di Milano, Italy
Matteo Venturi , Politecnico di Milano, Italy
pp. 573-574

DES Decoding Using FPGA and Custom Instructions (Abstract)

Tai-Chi Lee , Saginaw Valley State University
Richard Zeien , Saginaw Valley State University
Adam Roach , Saginaw Valley State University
Patrick Robinson , Central Michigan University
pp. 575-577

Automatically Classify Web Sites by Multimembership Bayesian Approach (Abstract)

Ssu-An Lo , National Taiwan University of Science and Technology
Chong-Yen Lee , Chinese Culture University
Chun-Chieh Hsu , National Taiwan University of Science and Technology
pp. 580-583
Session TC2: Posters

Express Risk Assessment throughWeb Access to Simulation Data (Abstract)

Andrei Smirnov , West Virginia University
Steven Rowan , West Virginia University
pp. 584-585

Contextual Events Framework in RFID System (Abstract)

Mikyeong Moon , Pusan National University
Youngbong Kim , Pusan National University
Keunhyuk Yeom , Pusan National University
pp. 586-587

Dynamic Role Assignment Protocol for Pervasive Computing (Abstract)

Akio Sashima , National Institute of Advanced Industrial Science and Technology, Japan
Noriaki Izumi , National Institute of Advanced Industrial Science and Technology, Japan
Koichi Kurumatani , National Institute of Advanced Industrial Science and Technology, Japan
Yoshiyuki Kotani , Tokyo University of Agriculture and Technology, Japan
pp. 588-589

SpamCooker: A Method for Deterring Unsolicited Electronic Communications (Abstract)

Nathan Denny , Southwestern Cybernetics Group
Theodore El Hourani , Southwestern Cybernetics Group
Jaime Denny , Southwestern Cybernetics Group
Scott Bissmeyer , Southwestern Cybernetics Group
David Irby , Southwestern Cybernetics Group
pp. 590-591

Storage of a Portal-Extracted Data in a Relational Database (Abstract)

E. Udoh , Indiana University - Purdue University
J. Hoover , Indiana University - Purdue University
pp. 592-594

Parallel Algorithm for Run Length Encoding (Abstract)

Nikolay Manchev , University of Plovdiv
pp. 595-596

A Wide-Band Digital Phase-Locked Looop (Abstract)

Shilpa Ambarish , California State University, Long Beach
Mahmoud Fawzy Wagdy , California State University, Long Beach
pp. 597-598

Design of a 1GHz Digital PLL Using 0.18\mu m CMOS Technology (Abstract)

Haripriya Janardhan , California State University, Long Beach
Mahmoud Fawzy Wagdy , California State University, Long Beach
pp. 599-600

Intelligent Medical Search Engine by Knowledge Machine (Abstract)

Narongrit Waraporn , The Graduate Center, CUNY
Syed V. Ahamed , The College of Staten Island, CUNY
pp. 601-605
Session WA1: Bioinformatic/Internet

Biomedical Term Disambiguation: An Application to Gene-Protein Name Disambiguation (Abstract)

Hisham Al-Mubaid , University of Houston - Clear Lake
Ping Chen , University of Houston - Downtown
pp. 606-612

Development of an Integrated Framework for Protein Structure Determinations: A Logical Data Model for NMR Data Analysis (Abstract)

Heidi J.C. Ellis , Trinity College
Susan Fox-Erlich , University of Connecticut Health Center
Timothy O. Martyn , Rensselaer at Hartford
Michael R. Gryk , University of Connecticut Health Center
pp. 613-618

Diabetic e-Management System (DEMS) (Abstract)

Kyle D. Lutes , Karen Chang, School of Nursing
Ibrahim M. Baggili , Purdue University
pp. 619-624

Similarity Analysis of Bone Mineral Density Measurements of Femur Sites Using Dendrogram (Abstract)

Ray R. Hashemi , Armstrong Atlantic State University
Alexander A. Tyler , University College Cork, Ireland
Chris Childers , Armstrong Atlantic State University
Arthur Chausmer , Moanalua Medical Center
pp. 625-630

A Decentralized Network Coordinate System for Robust Internet Distance (Abstract)

Li-wei Lehman , Massachusetts Institute of Technology
Steven Lerman , Massachusetts Institute of Technology
pp. 631-637

Internet Accessing for IPv6 MANETs (Abstract)

Zhao Yunlong , Harbin Engineering University
Men Chaoguang , Harbin Engineering University
Yao Nianmin , Harbin Engineering University
pp. 638-645
Session WA2: Grid, Pervasive Computing/E-Gaming

Adaptable Replica Consistency Service for Data Grids (Abstract)

Ruay-Shiung Chang , National Dong Hwa University, Taiwan
Jih-Sheng Chang , National Dong Hwa University, Taiwan
pp. 646-651

The Role of Collaboration Grids in the Roadmaps of Networked Organizations (Abstract)

Dr. Ziga Turk , University of Ljubljana, Slovenia
Dr. Matevz Dolenc , University of Ljubljana, Slovenia
Etiel Petrinja , University of Ljubljana, Slovenia
pp. 652-657

A Formal Specification of Interaction Widgets Hierarchy Framework (Abstract)

L.J. Wang , University of New England, Australia
A.S.M. Sajeev , University of New England, Australia
L. Inchaiwong , University of New England, Australia
pp. 658-664

On the Security of a Repaired Mental Poker Protocol (Abstract)

Jordi Castella-Roca , Rovira i Virgili University of Tarragona
Josep Domingo-Ferrer , Rovira i Virgili University of Tarragona
Francesc Sebe , Rovira i Virgili University of Tarragona
pp. 664-668

Korean Text Chunk Identification Using Support Vector Machines (Abstract)

Sang-Soo Kim , Kyungpook National University, Korea
Jeon woo Son , Kyungpook National University, Korea
Mi-hwa Kong , Kyungpook National University, Korea
Seong-Bae Park , Kyungpook National University, Korea
Sang-Jo Lee , Kyungpook National University, Korea
pp. 674-679

Abstract Node Method for Integration of Object Oriented Design with Colored Petri Nets (Abstract)

Bhushan E. Bauskar , University of Massachusetts Dartmouth
Boleslaw Mikolajczak , University of Massachusetts Dartmouth
pp. 680-687
Session WB1: Design, Performance Analysis and Modeling

Modeling and Simulation of Virtual Warfare Using Virtual Reality Paradigm (Abstract)

Saurabh Mukherjee , Prestige Institute of Management, India
Shashikala Tapas , Madhav Institute of Technology and Science, India
pp. 688-689

A Performance Analysis of an Object-Oriented Processor (Abstract)

YiYu, Tan , City University of Hong Kong
Man Lo Kai , City University of Hong Kong
Anthony S. Fong , City University of Hong Kong
pp. 690-694

Utilizing XML Schema for Describing and Querying Still Image Databases (Abstract)

Kazem Taghva , Information Science Research Institute
Min Xu , 1Information Science Research Institute
Emma Regentova , University of Nevada, Las Vegas
Tom Nartker , University of Nevada, Las Vegas
pp. 695-700

ISRUP E-Service Framework for agile Enterprise Architecting (Abstract)

Seyyed Mohsen Hashemi , Azad University
Mohammadreza Razzazi , AmirKabir University of Technology
Ali Bahrami , Medico System Inc.
pp. 701-706

Development of a Synthetic Data Set Generator for Building and Testing Information Discovery Systems (Abstract)

Pengyue J. Lin , University of California, Riverside
Behrokh Samadi , Lucent Technologies
Alan Cipolone , Bell Laboratories
Daniel R. Jeske , University of California, Riverside
Sean Cox , University of California, Riverside
Carlos Rend? , University of California, Riverside
Douglas Holt , University of California, Riverside
Rui Xiao , University of California, Riverside
pp. 707-712

A Proposed Platform & Performance Estimation of Digital-Home Service Delivery/Management Systems (Abstract)

I1-Woo Lee , Electronics and Telecommunications Research Institute, Korea
Ho-Jin Park , Electronics and Telecommunications Research Institute, Korea
Kwang-Roh Park , Electronics and Telecommunications Research Institute, Korea
Sang-Ha Kim , Chung-Nam National University, Korea
pp. 713-719
Session WB2: Networks and Hardware

Baseline Profile Stability for Network Anomaly Detection (Abstract)

Yoohwan Kim , Univ. of Nevada, Las Vegas
Ju-Yeon Jo , California State University, Sacramento
Kyunghee Kim Suh , American Institutes for Research
pp. 720-725

Middleware as an Infrastructure for Network Applications (Abstract)

Basim Alhadidi , Albalqa Applied University, Jordan
pp. 726-729

Traffic Congestion Controller in Multihop Communication Network (Abstract)

Tan Ee Xion , University College Sedaya International (UCSI)
Hiew Pang Leang , British Telecommunications (BT)
pp. 730-735

Optimizing Network Data Transmission (Abstract)

E. Earl Eiland , New Mexico Institute of Mining and Technology
Lorie M. Liebrock , New Mexico Institute of Mining and Technology
pp. 735-741

A Fast-Locking Digital Phase-Locked Loop (Abstract)

Mahmoud Fawzy Wagdy , California State University, Long Beach
Srishti Vaishnava , California State University, Long Beach
pp. 742-746

Nano Logic Circuits with Spin Wave Bus (Abstract)

Alexander Khitun , University of California at Los Angeles
Kang L. Wang , University of California at Los Angeles
pp. 747-752
Author Index

Author Index (PDF)

pp. 753
94 ms
(Ver 3.3 (11022016))