The Community for Technology Leaders
Information Technology: New Generations, Third International Conference on (2006)
Las Vegas, Nevada
Apr. 10, 2006 to Apr. 12, 2006
ISBN: 0-7695-2497-4
TABLE OF CONTENTS
Introduction

Reviewers (PDF)

pp. xvi
Introduction

Reviewers (PDF)

pp. xvi
Session MA1: IT Education

Six Sigma in Education: To Achieve Overall Excellence in the Field of Education (Abstract)

Varsha Hemant Patil , K. K. Wagh Institute of Engineering Education and Research, India
Manikrao L. Dhore , Vishwkarma Institute of Technology, India
Snehal M. Kamlapur , K. K. Wagh Institute of Engineering Education and Research, India
pp. 2-5

Hiring the IT Graduate: What?s in the Box? (Abstract)

Eydie Lawson , Rochester Institute of Technology
Barry Lunt , Brigham Young University
Reza Kamali , Purdue University Calumet
Han Reichgelt , Georgia Southern University
Jacob R. Miller , Pennsylvania College of Technology
Sandra Gorka , Pennsylvania College of Technology
Joseph J. Ekstrom , Brigham Young University
pp. 6-10

Implications of IT in Different Professions (Abstract)

Ann Johansson , University West, Sweden
Inger Bj?rkman , University West, Sweden
pp. 11-19
Session MA2: Software Engineering I

Decoupling Security Concerns in Web Services Using Aspects (Abstract)

G. Kouadri Most?faoui , Fribourg University, Switzerland
Z. Maamar , Zayed University, U.A.E
S. Sattanathan , National Institute of Technology, India
N. C. Narendra , IBM India Research Lab, India
pp. 20-27

An Agglomerative Clustering Methodology For Data Imputation (Abstract)

Sumanth Yenduri , University of Southern Mississippi
pp. 34-39

Cost Implications of Software Commonality and Reuse (Abstract)

Eugenio Capra , Politecnico di Milano
Chiara Francalanci , Politecnico di Milano
pp. 40-45

On OO Design Consistency in Iterative Development (Abstract)

Umesh Bellur , I.I.T. Bombay, India
V. Vallieswaran , I.I.T. Bombay, India
pp. 46-51

Reliable Deployment of Component-based Applications into Distributed Environments (Abstract)

Farhad Mavaddat , University of Waterloo, Canada
Abbas Heydarnoori , University of Waterloo, Canada
pp. 52-57

Modular Model of a Logic Circuit Using Object-Oriented Programming (Abstract)

Stefan Senczyna , Silesian University of Technology, Poland
pp. 58-65
Session MA3: Software Engineering II

A First Draft of RATF: A Method Combining Robustness Analysis and Technology Forecasting (Abstract)

G?ran Cal? , University West, Sweden
Andreas Boklund , University West, Sweden
Stefan Mankefors-Christiernin , University West, Sweden
pp. 72-77

Studying Software Implementations of Elliptic Curve Cryptography (Abstract)

Hai Yan , University of Connecticut
Zhijie Jerry Shi , University of Connecticut
pp. 78-83

Novel Approach for Remote Energy Meter Reading Using Mobile Agents (Abstract)

Vasile Lazarescu , Politehnica University of Bucharest
Radwan Tahboub , Politehnica University of Bucharest
pp. 84-89

RL-Agent That Learns in Collaborative Virtual Environment (Abstract)

Elhadi Shakshuki , Acadia University, Canada
Abdur Wasey Matin , Acadia University, Canada
pp. 90-95

On History-Sensitive Models of Interactive Stacks (Abstract)

Walter Dosch , University of Lubeck, Germany
pp. 96-103

New Algorithms For Random Access Text Compression (Abstract)

L. Robert , Government Arts College, India
R. Nadarajan , PSG College of Technology, India
pp. 104-111
Session MA4: Software Engineering III

Production and Maintenance of Content-Intensive Videogames: A Document-Oriented Approach (Abstract)

Jos? Luis Sierra , Universidad Complutense, Spain
Pablo Moreno-Ger , Universidad Complutense, Spain
Baltasar Fern?ndez-Manj? , Universidad Complutense, Spain
Iv?n Mart?nez-Ortiz , Centro de Estudios Superiores Felipe II, Aranjuez, Spain
pp. 118-123

Agent Launch Pattern for Creating Agents (Abstract)

Elhadi Shakshuki , Acadia University, Canada
Omkarnath Prabhu , Acadia University, Canada
pp. 131-136

Degree of Freedom ― Experience of Applying Software Framework (Abstract)

Wang-chan Wong , California State University, Dominguez Hills
Shane Ng , Hong Kong University
Mohammad Eyadat , California State University, Dominguez Hills
pp. 143-148

Rethinking Programming (Abstract)

W M Beynon , University of Warwick, UK
R C Boyatt , University of Warwick, UK
S B Russ , University of Warwick, UK
pp. 149-154

Measurement of Intra-Class & Inter-Class Weakness for Object-Oriented Software (Abstract)

Jitender Kumar Chhabra , National Institute of Technology, India
K.K. Aggarwal , National Institute of Technology, India
pp. 155-160

An Investigation of Bad Smells in Object-Oriented Design (Abstract)

Wei Li , The University of Alabama in Huntsville
Raed Shatnawi , The University of Alabama in Huntsvi
pp. 161-165
Session MB1: Embedded Cryptographic Systems I

Efficient Implementation of Galois Field Fixed Field Constant Multiplication (Abstract)

Christof Paar , Ruhr-Universitat Bochum, Germany
AJ Elbirt , University of Massachusetts Lowell
pp. 172-177

Efficient Methods in Converting to Modulo 2^n+1 and 2^n-1 (Abstract)

Kooroush Manochehri , Amirkabir University of Technology, Iran
Saadat Pourmozafari , Amirkabir University of Technology, Iran
Babak Sadeghian , Amirkabir University of Technology, Iran
pp. 178-185
Session MB2: Embedded Cryptographic Systems II

Parallel Hardware Architectures for the Cryptographic Tate Pairing (Abstract)

G. Bertoni , ST Microelectronics, Italy
P. Fragneto , ST Microelectronics, Italy
G. Pelosi , Politecnico di Milano, Italy
L. Breveglieri , Politecnico di Milano, Italy
pp. 186-191

An Embedded Processor for a Pairing-Based Cryptosystem (Abstract)

Colin Murphy , University College Cork, Ireland
W.P. Marnane , University College Cork, Ireland
Robert Ronan , University College Cork, Ireland
Colm O hEigeartaigh , Dublin City University, Ireland
Tim Kerins , University College Cork, Ireland
Michael Scott , Dublin City University, Ireland
pp. 192-197

Efficient Authenticated Key-Exchange for Devices with a Trusted Manager (Abstract)

Stephen R. Tate , University of North Texas
He Ge , University of North Texas
pp. 198-203

Side-Channel Leakage Tolerant Architectures (PDF)

Ingrid Verbauwhede , K.U.Leuven, Belgium
Kris Tiri , UC Los Angeles
Patrick Schaumont , Virginia Tech
pp. 204-209

Four Hardware Implementations for the M-ary Modular Exponentiation (Abstract)

Luiza de Macedo Mourelle , State University of Rio de Janeiro
Nadia Nedjah , State University of Rio de Janeiro
pp. 210-215

A Compact Piplined Hardware Implementation of the AES-128 Cipher (Abstract)

Marco Paulo Cardoso , State University of Rio de Janeiro
Nadia Nedjah , State University of Rio de Janeiro
Luiza de Macedo Mourelle , State University of Rio de Janeiro
pp. 216-221
Session MB3: High Performance Computer Architectures

K-Selector-Based Dispatching Algorithm for Clos-Network Switches (Abstract)

Mayauna McCullough , Fort Valley State University
Yingtao Jiang , University of Nevada Las Vegas
Jun Zheng , Queens College
Mei Yang , University of Nevada Las Vegas
pp. 222-226

Evaluating Parallel Computing Systems in Bioinformatics (Abstract)

Michael D. Kane , Purdue University
Erik S. Gough , Purdue University
pp. 233-238

RDT Properties and Evaluations (Abstract)

Yang Yu , Nankai University, China
Yulu Yang , Nankai University, China
pp. 239-244

VMSIM: Virtual Machine Based a Full System Simulation Platform for Microprocessors? Functional Verification (Abstract)

Xiaoya Fan , Northwestern Polytechnical University, China
Yi Wang , Nanyang Technological University, Singapore
Danghui Wang , Northwestern Polytechnical University, China
Shengbing Zhang , Northwestern Polytechnical University, China
Jianfeng An , Northwestern Polytechnical University, China
pp. 245-249

A Reconfigurable Architecture for Wireless Communication Systems (Abstract)

Hooman Parizi , University of California, Irvine
Nader Bagherzadeh , University of California, Irvine
Afshin Niktash , University of California, Irvine
Amir Kamalizad , University of California, Irvine
pp. 250-255
Session MB4: Sensor Networks

COSEN: A Chain Oriented Sensor Network for Efficient Data Collection (Abstract)

Nahdia Tabassum , Waseda University, Japan
Yoshiyori Urano , Waseda University, Japan
Kabir Mamun , Waseda University, Japan
Quazi Ehsanul , Waseda University, Japan
pp. 262-267

Interference Aware Dominating Set for Sensor Network (Abstract)

Khursheed Mohamad , University of Nevada, Las Vegas
Min Tun , University of Nevada, Las Vegas
Laxmi Gewali , University of Nevada, Las Vegas
pp. 268-273

Improved Maximum Likelihood Estimation of Target Position in Wireless Sensor Networks using Particle Swarm Optimization (Abstract)

Thomas C. Jannett , The University of Alabama at Birmingham
Mathew M. Noel , The University of Alabama at Birmingham
Parag P. Joshi , The University of Alabama at Birmingham
pp. 274-279

Efficient RBS in Sensor Networks (Abstract)

Youngmi Kwon , Chungnam National University, South Korea
Hyojung Lee , Chungnam National University, South Korea
Wonpil Yu , Electronics and Telecommunications Research Institute, South Korea
pp. 279-284
Session TA1: Mobile Enterprise I

Mobile Terminated SMS Billing — Exploits and Security Analysis (Abstract)

Paul Coulton , Lancaster University
Philip Garner , Lancaster University
Reuben Edwards , Lancaster University
Ian Mullins , Lancaster University
pp. 294-299

SmartDOTS - A Framework for Efficient Data Synchronization on Mobile Devices (Abstract)

Rene Prokop , Upper Austrian University of Applied Sciences, Austria
Werner Kurschl , Upper Austrian University of Applied Sciences, Austria
Stefan Mitsch , Upper Austrian University of Applied Sciences, Austria
pp. 300-305
Session TA2: Mobile Enterprise II

Consumer Value Segments in Mobile Bill Paying (Abstract)

Tommi Laukkanen , University of Kuopio
Teuvo Kantanen , University of Kuopio
pp. 314-319

Government as a Mobile Enterprise: Real-time, Ubiquitous Government (Abstract)

Tarek El Kiki , University of Technology Sydney, Australia
Elaine Lawrence , University of Technology Sydney, Australia
pp. 320-327

SelectiveDES: A Distributed Event Service Add-On for Invocation-Based Middleware supporting Selective Multi-Channel Communication and Notification Delivery (Abstract)

Stefan Mitsch , Upper Austrian University of Applied Sciences, Austria
Werner Kurschl , Upper Austrian University of Applied Sciences, Austria
Rene Prokop , Upper Austrian University of Applied Sciences, Austria
pp. 328-333

Internet Mobility using SIP and MIP (Abstract)

Abdul Nasir , University of Peshawar, Pakistan
Mah-Rukh Mah-Rukh , University of Peshawar, Pakistan
pp. 334-339

A Dynamic Mobility Management Scheme for VoIP Services (Abstract)

Shou-Hsuan Stephen Huang , University of Houston
Eunjung Lee , University of Houston
Jinsuk Baek , Winston-Salem University
pp. 340-345

Secure ICT Services for Mobile and Wireless Communications: A Federated Global Identity Management Framework (Abstract)

J. Colin , Sun Microsystems (Belgium)
J. A. Garc? , Telef?nica I+D (Spain)
N. Meyer , Poznan Supercomputing & Networking Center (Poland)
W. Orth , Fraunhofer Institute for Secure Information Technology (Germany)
J. Siddiqi , Sheffield Hallam University (UK)
G. Pipan , XLAB (Slovenia)
M. Tuisku , University of Helsinki (Finland)
M. L?pez Gallego , Telef?nica I+D (Spain)
B. Akhgar , Sheffield Hallam University (UK)
M. Cecchi , Telecom Italia (Italy)
M. Naderi , Sheffield Hallam University (UK)
pp. 351-357
Session TA3: Web Technologies

Using the Web to Construct Taxonomy for a Heterogeneous Community of Practice (Abstract)

Isak Taksa , Baruch College, City University of New York
Amanda Spink , Queensland University of Technology
pp. 358-363

Feature and Prototype Evolution for Nearest Neighbor Classification of Web Documents (Abstract)

Mateen Rizki , Wright State University
Michelle Cheatham , Air Force Research Laboratory
pp. 364-369

Overlap Among Major Web Search Engines (Abstract)

Chris Blakely , Infospace, Inc.
Amanda Spink , Queensland University of Technology
Sherry Koshman , University of Pittsburgh
Bernard J. Jansen , The Pennsylvania State University
pp. 370-374

A General Classification of (Search) Queries and Terms (Abstract)

Martina Koch , University of Karlsruhe (TH), Germany
Nadine Schmidt-Maenz , University of Karlsruhe (TH), Germany
pp. 375-381

An Automated WSDL Generation and Enhanced SOAP Message Processing System for Mobile Web Services (Abstract)

Byeong Ho Kang , University of Tasmania, Australia
Gun Tae Bae , Hannam University, Korea
Seok Soo Kim , Hannam University, Korea
Gil Cheol Park , Hannam University, Korea
Yang Sok Kim , University of Tasmania, Australia
pp. 382-387

Web Page Recommender System based on Folksonomy Mining for ITNG ?06 Submissions (Abstract)

Satoshi Niwa , University of Tokyo
Shinichi Honiden , University of Tokyo
Takuo Doi , University of Tokyo
pp. 388-393
Session TA4: Internet and Wireless Security

Group Key Management in Wireless Networks Using Session Keys (Abstract)

Phu Dung Le , Monash University, Australia
Rohit Singh , Monash University, Australia
Dhilak Damodaran , Monash University, Australia
pp. 402-407

Anomaly Detection in SMTP Traffic (Abstract)

Xiaochun Yun , Harbin Institute of Technology
Hao Luo , Harbin Institute of Technology
Binxing Fang , Harbin Institute of Technology
pp. 408-413

A Secure Group Key Management Scheme for Wireless Cellular Networks (Abstract)

Hwayoung Um , Purdue University
Edward J. Delp , Purdue University
pp. 414-419

Anomaly Detection Based Intrusion Detection (Abstract)

Leon Reznik , Rochester Institute of Technology
Roman V. Yampolskiy , University at Buffalo
Dima Novikov , Rochester Institute of Technology
pp. 420-425

Secure Two-Way Transfer of Measurement Data (Abstract)

Marko Hassinen , University of Kuopio, Finland
Mikko Saesmaa , University of Kuopio, Finland
Maija Marttila-Kontio , University of Kuopio, Finland
Heli Tervo , University of Kuopio, Finland
pp. 426-431

Efficient Group Key Management in Wireless Networks (Abstract)

Dhilak Damodaran , Monash University
Yiling Wang , Monash University
Phu Dung Le , Monash University
pp. 432-439
Session TB1: Information Security and Privacy I

New Method for Risk Management in CRM Security Management (Abstract)

Mahdi Seify , Sharif University of Technology, Iran
pp. 440-445

Analysis of Log Files Intersections for Security Enhancement (Abstract)

Mohsen Beheshti , California State University, Dominguez Hills
Kazimierz Kowalski, , California State University, Dominguez Hills
pp. 452-457
Session TB2: Information Security and Privacy II

The Design and Implementation of a Smartphone Payment System based on Limited-used Key Generation Scheme (Abstract)

Phu Dung Le , Monash University, Australia
Xianping Wu , Monash University, Australia
Osama Dandash , Monash University, Australia
pp. 458-463

A Study on the Security of Privacy Homomorphism (Abstract)

Jussipekka Leiwo , Nanyang Technological University, Singapore
Benjamin Premkumar , Nanyang Technological University, Singapore
Yu Yu , Nanyang Technological University, Singapore
pp. 470-475

An Efficient and Secure Code Sharing for Peer-to-Peer Communications (Abstract)

Phu Dung Le , Monash University, Australia
Wei Wu , Monash Univesity, Australia
pp. 476-481

A Copyright Protection Scheme for Gray-Level Images Using Human Fingerprint (Abstract)

I-Ju Tsai , Tatung University, Taiwan
Shang-Lin Hsieh , Tatung University, Taiwan
Hsuan-Chieh Huang , Tatung University, Taiwan
pp. 482-489
Session TB3: Data Mining and Checkpointing

Mining Documents in a Small Enterprise Using WordStat (Abstract)

J. Rhoades , Indiana University - Purdue University
E. Udoh , Indiana University - Purdue University
pp. 490-494

Web Usability Testing ― CARE Methodology (Abstract)

Arthi Anandhan , University of North Dakota
Karthik Namasivayam , University of North Dakota
Hassan Reza , University of North Dakota
Senthil Dhandapani , University of North Dakota
pp. 495-500

A Hybrid Approach to Error Reduction of Support Vector Machines in Document Classification (Abstract)

Mi-hwa Kong , Kyungpook National University, Korea
Seong-Bae Park , Kyungpook National University, Korea
Jeong woo Son , Kyungpook National University, Korea
Yoon-Shik Tae , Kyungpook National University, Korea
Jun-Seok Lee , Kyungpook National University, Korea
Sang-Jo Lee , Kyungpook National University, Korea
pp. 501-506

Knowledge Discovery in Power Quality Data Using Support Vector Machine and S-Transform (Abstract)

M. Gopa , Indian Institute of Technology Delhi, India
B.K. Panigrahi , Indian Institute of Technology Delhi, India
K. Vivek , Indian Institute of Technology Delhi, India
pp. 507-512

Closed Multidimensional Sequential Pattern Mining (Abstract)

Veera Boonjing , King Mongkut?s Institute of Technology, Thailand
Panida Songram , King Mongkut?s Institute of Technology, Thailand
Sarun Intakosum , King Mongkut?s Institute of Technology, Thailand
pp. 512-517

A Two-Phase Time-based Consistent Checkpointing Strategy (Abstract)

Men Chaoguang , Harbin Engineering University, China
Yao Wenbin , Harbin Engineering University, China
Zhao Yunlong , Harbin Engineering University, China
pp. 518-523
Session TB4: VoIP/Signal Processing

Adding High Level VoIP Facilities to the Unicon Language (Abstract)

Ziad Al-Sharif , New Mexico State University
Clinton Jeffery , New Mexico State University
pp. 524-529

A Peer to Peer Prefix Patching Scheme for VOD Servers (Abstract)

Chi Hun Lee , Kangwon National University, Korea
Yi Qi Gui, , Kangwon National University, Korea
Hwang Kyu Choi , Kangwon National University, Korea
Chang Yeol Choi , Kangwon National University
In Bum Jung , Kangwon National University, Korea
pp. 530-534

Bandwidth-Conserving Real-Time VoIP Teleconference System (Abstract)

Teck-Kuen Chua , Arizona State University
David C. Pheanis , Arizona State University
pp. 535-540

Mixed Noise Correction in Gray Images using Fuzzy Filters (Abstract)

M. Hanmandlu , I.I.T. Delhi, India
Anuj K. Tiwari , I.I.T. Delhi, India
Vamsi K. Madasu , School of ITEE, Australia
Shantaram Vasikarla , American InterCont. Univ., USA
pp. 547-553

Parameterized FIR Filtering IP Cores for Reusable SoC Design (Abstract)

Habibullah Jamal , University of Engineering & Technology, Pakistan
Muhammad Saleem , University of Engineering & Technology, Pakistan
Umar Farooq , University of Engineering & Technology, Pakistan
pp. 554-559
Session TC1: Posters

A New Bucket-Based A New Bucket-Based Algorithm for Finding LCS from two given Molecular Sequences (Abstract)

Pankaj Agarwal , Jamia Millia Islamia University, India
Dr. S.A.M. Rizvi , Jamia Millia Islamia University, India
pp. 560-561

Performance-Guided Reconfiguration of Wireless Sensor Networks that Use Binary Data for Target Localization (Abstract)

Parag P. Joshi , The University of Alabama at Birmingham
Thomas C. Jannett , The University of Alabama at Birmingham
pp. 562-565

Key Pre-Distribution Using MDS Codes in Mobile Ad Hoc Networks (Abstract)

Seong-Moo Yoo , The University of Alabama in Huntsville
Mohammad Al-Shurman , The University of Alabama in Huntsville
pp. 566-567

Key Management and Mutual Authentication for Multiple Field Records Smart Cards (Abstract)

Kiarash Narimani , University of Waterloo, Canada
Gordon B. Agnew , University of Waterloo, Canada
pp. 568-569

FPGA based DPA-resistant Unified Architecture for Signcryption (Abstract)

Yi Wang , Nanyang Technological University, Singapore
Jussipekka Leiwo , Nanyang Technological University, Singapore
Yu Yu , Nanyang Technological University, Singapore
Thambipillai Srikanthan , Nanyang Technological University, Singapore
pp. 571-572

ECC Hardware Coprocessors for 8-bit Systems and Power Consumption Considerations (Abstract)

Luca Breveglieri , Politecnico di Milano, Italy
Guido Bertoni , STMicroelectronics, Italy
Matteo Venturi , Politecnico di Milano, Italy
pp. 573-574

DES Decoding Using FPGA and Custom Instructions (Abstract)

Tai-Chi Lee , Saginaw Valley State University
Richard Zeien , Saginaw Valley State University
Patrick Robinson , Central Michigan University
Adam Roach , Saginaw Valley State University
pp. 575-577

Automatically Classify Web Sites by Multimembership Bayesian Approach (Abstract)

Chong-Yen Lee , Chinese Culture University
Chun-Chieh Hsu , National Taiwan University of Science and Technology
Ssu-An Lo , National Taiwan University of Science and Technology
pp. 580-583
Session TC2: Posters

Express Risk Assessment throughWeb Access to Simulation Data (Abstract)

Steven Rowan , West Virginia University
Andrei Smirnov , West Virginia University
pp. 584-585

Contextual Events Framework in RFID System (Abstract)

Keunhyuk Yeom , Pusan National University
Mikyeong Moon , Pusan National University
Youngbong Kim , Pusan National University
pp. 586-587

Dynamic Role Assignment Protocol for Pervasive Computing (Abstract)

Koichi Kurumatani , National Institute of Advanced Industrial Science and Technology, Japan
Noriaki Izumi , National Institute of Advanced Industrial Science and Technology, Japan
Yoshiyuki Kotani , Tokyo University of Agriculture and Technology, Japan
Akio Sashima , National Institute of Advanced Industrial Science and Technology, Japan
pp. 588-589

SpamCooker: A Method for Deterring Unsolicited Electronic Communications (Abstract)

Nathan Denny , Southwestern Cybernetics Group
Theodore El Hourani , Southwestern Cybernetics Group
Scott Bissmeyer , Southwestern Cybernetics Group
David Irby , Southwestern Cybernetics Group
Jaime Denny , Southwestern Cybernetics Group
pp. 590-591

Storage of a Portal-Extracted Data in a Relational Database (Abstract)

E. Udoh , Indiana University - Purdue University
J. Hoover , Indiana University - Purdue University
pp. 592-594

Parallel Algorithm for Run Length Encoding (Abstract)

Nikolay Manchev , University of Plovdiv
pp. 595-596

A Wide-Band Digital Phase-Locked Looop (Abstract)

Shilpa Ambarish , California State University, Long Beach
Mahmoud Fawzy Wagdy , California State University, Long Beach
pp. 597-598

Design of a 1GHz Digital PLL Using 0.18\mu m CMOS Technology (Abstract)

Mahmoud Fawzy Wagdy , California State University, Long Beach
Haripriya Janardhan , California State University, Long Beach
pp. 599-600

Intelligent Medical Search Engine by Knowledge Machine (Abstract)

Syed V. Ahamed , The College of Staten Island, CUNY
Narongrit Waraporn , The Graduate Center, CUNY
pp. 601-605
Session WA1: Bioinformatic/Internet

Biomedical Term Disambiguation: An Application to Gene-Protein Name Disambiguation (Abstract)

Ping Chen , University of Houston - Downtown
Hisham Al-Mubaid , University of Houston - Clear Lake
pp. 606-612

Development of an Integrated Framework for Protein Structure Determinations: A Logical Data Model for NMR Data Analysis (Abstract)

Susan Fox-Erlich , University of Connecticut Health Center
Michael R. Gryk , University of Connecticut Health Center
Heidi J.C. Ellis , Trinity College
Timothy O. Martyn , Rensselaer at Hartford
pp. 613-618

Diabetic e-Management System (DEMS) (Abstract)

Kyle D. Lutes , Karen Chang, School of Nursing
Ibrahim M. Baggili , Purdue University
pp. 619-624

Similarity Analysis of Bone Mineral Density Measurements of Femur Sites Using Dendrogram (Abstract)

Arthur Chausmer , Moanalua Medical Center
Ray R. Hashemi , Armstrong Atlantic State University
Chris Childers , Armstrong Atlantic State University
Alexander A. Tyler , University College Cork, Ireland
pp. 625-630

A Decentralized Network Coordinate System for Robust Internet Distance (Abstract)

Li-wei Lehman , Massachusetts Institute of Technology
Steven Lerman , Massachusetts Institute of Technology
pp. 631-637

Internet Accessing for IPv6 MANETs (Abstract)

Men Chaoguang , Harbin Engineering University
Zhao Yunlong , Harbin Engineering University
Yao Nianmin , Harbin Engineering University
pp. 638-645
Session WA2: Grid, Pervasive Computing/E-Gaming

Adaptable Replica Consistency Service for Data Grids (Abstract)

Jih-Sheng Chang , National Dong Hwa University, Taiwan
Ruay-Shiung Chang , National Dong Hwa University, Taiwan
pp. 646-651

The Role of Collaboration Grids in the Roadmaps of Networked Organizations (Abstract)

Dr. Ziga Turk , University of Ljubljana, Slovenia
Etiel Petrinja , University of Ljubljana, Slovenia
Dr. Matevz Dolenc , University of Ljubljana, Slovenia
pp. 652-657

A Formal Specification of Interaction Widgets Hierarchy Framework (Abstract)

A.S.M. Sajeev , University of New England, Australia
L.J. Wang , University of New England, Australia
L. Inchaiwong , University of New England, Australia
pp. 658-664

On the Security of a Repaired Mental Poker Protocol (Abstract)

Francesc Sebe , Rovira i Virgili University of Tarragona
Josep Domingo-Ferrer , Rovira i Virgili University of Tarragona
Jordi Castella-Roca , Rovira i Virgili University of Tarragona
pp. 664-668

Korean Text Chunk Identification Using Support Vector Machines (Abstract)

Seong-Bae Park , Kyungpook National University, Korea
Jeon woo Son , Kyungpook National University, Korea
Sang-Soo Kim , Kyungpook National University, Korea
Mi-hwa Kong , Kyungpook National University, Korea
Sang-Jo Lee , Kyungpook National University, Korea
pp. 674-679

Abstract Node Method for Integration of Object Oriented Design with Colored Petri Nets (Abstract)

Boleslaw Mikolajczak , University of Massachusetts Dartmouth
Bhushan E. Bauskar , University of Massachusetts Dartmouth
pp. 680-687
Session WB1: Design, Performance Analysis and Modeling

Modeling and Simulation of Virtual Warfare Using Virtual Reality Paradigm (Abstract)

Shashikala Tapas , Madhav Institute of Technology and Science, India
Saurabh Mukherjee , Prestige Institute of Management, India
pp. 688-689

A Performance Analysis of an Object-Oriented Processor (Abstract)

Man Lo Kai , City University of Hong Kong
Anthony S. Fong , City University of Hong Kong
YiYu, Tan , City University of Hong Kong
pp. 690-694

Utilizing XML Schema for Describing and Querying Still Image Databases (Abstract)

Kazem Taghva , Information Science Research Institute
Emma Regentova , University of Nevada, Las Vegas
Min Xu , 1Information Science Research Institute
Tom Nartker , University of Nevada, Las Vegas
pp. 695-700

ISRUP E-Service Framework for agile Enterprise Architecting (Abstract)

Seyyed Mohsen Hashemi , Azad University
Ali Bahrami , Medico System Inc.
Mohammadreza Razzazi , AmirKabir University of Technology
pp. 701-706

Development of a Synthetic Data Set Generator for Building and Testing Information Discovery Systems (Abstract)

Behrokh Samadi , Lucent Technologies
Alan Cipolone , Bell Laboratories
Pengyue J. Lin , University of California, Riverside
Rui Xiao , University of California, Riverside
Daniel R. Jeske , University of California, Riverside
Douglas Holt , University of California, Riverside
Carlos Rend? , University of California, Riverside
Sean Cox , University of California, Riverside
pp. 707-712

A Proposed Platform & Performance Estimation of Digital-Home Service Delivery/Management Systems (Abstract)

Ho-Jin Park , Electronics and Telecommunications Research Institute, Korea
Sang-Ha Kim , Chung-Nam National University, Korea
I1-Woo Lee , Electronics and Telecommunications Research Institute, Korea
Kwang-Roh Park , Electronics and Telecommunications Research Institute, Korea
pp. 713-719
Session WB2: Networks and Hardware

Baseline Profile Stability for Network Anomaly Detection (Abstract)

Ju-Yeon Jo , California State University, Sacramento
Kyunghee Kim Suh , American Institutes for Research
Yoohwan Kim , Univ. of Nevada, Las Vegas
pp. 720-725

Middleware as an Infrastructure for Network Applications (Abstract)

Basim Alhadidi , Albalqa Applied University, Jordan
pp. 726-729

Traffic Congestion Controller in Multihop Communication Network (Abstract)

Hiew Pang Leang , British Telecommunications (BT)
Tan Ee Xion , University College Sedaya International (UCSI)
pp. 730-735

Optimizing Network Data Transmission (Abstract)

E. Earl Eiland , New Mexico Institute of Mining and Technology
Lorie M. Liebrock , New Mexico Institute of Mining and Technology
pp. 735-741

A Fast-Locking Digital Phase-Locked Loop (Abstract)

Srishti Vaishnava , California State University, Long Beach
Mahmoud Fawzy Wagdy , California State University, Long Beach
pp. 742-746

Nano Logic Circuits with Spin Wave Bus (Abstract)

Alexander Khitun , University of California at Los Angeles
Kang L. Wang , University of California at Los Angeles
pp. 747-752
Author Index

Author Index (PDF)

pp. 753
106 ms
(Ver )