The Community for Technology Leaders
Information Technology: New Generations, Third International Conference on (2007)
Las Vegas, Nevada, USA
Apr. 2, 2007 to Apr. 4, 2007
ISBN: 0-7695-2776-0
TABLE OF CONTENTS
Introduction

Reviewers (PDF)

pp. xx
Session MA1: Embedded Cryptographic Systems

Programming Highly Parallel Reconfigurable Architectures for Public-Key Cryptographic Applications (Abstract)

Gerardo Pelosi , Politecnico di Milano, Italy
Luca Breveglieri , Politecnico di Milano, Italy
Martino Sykora , Politecnico di Milano, Italy
Giovanni Agosta , Politecnico di Milano, Italy
pp. 3-10

A Reconfigurable Processor for the Cryptographic nT Pairing in Characteristic 3 (Abstract)

Colin Murphy , University College Cork, Ireland
Paulo S. L. M. Barretto , Universidade de Sao Paulo, Brazil
Tim Kerins , University College Cork, Ireland
Robert Ronan , University College Cork, Ireland
Colm O?hEigeartaigh , Dublin City University, Ireland
pp. 11-16

Efficient Hardware for Modular Exponentiation Using the Sliding-Window Method (Abstract)

Luiza de Macedo Mourelle , State University of Rio de Janeiro, Brazil
Nadia Nedjah , State University of Rio de Janeiro, Brazil
Rodrigo Martins da Silva , State University of Rio de Janeiro, Brazil
pp. 17-24
Session MA2: Mobility & Resource Management in Wireless/Mobile Networks I

Two Novel Resource Management Schemes for Integrated Wireless Networks (Abstract)

Wei Shen , University of Cincinnati
Qing-An Zeng , University of Cincinnati
pp. 25-30

TCP Congestion Window Optimization for CDMA2000 Packet Data Networks (Abstract)

Muhammad Adeel , National University of Sciences and Technology, Pakistan
Ahmad Ali Iqbal , National University of Sciences and Technology, Pakistan
pp. 31-35

Computationally Efficient Resource Allocation in OFDM Systems: Genetic Algorithm Approach (Abstract)

Damian Madden , Grambling State University, LA
Y.B. Reddy , Grambling State University, LA
Portia Taylor , Grambling State University, LA
N. Gajendar , Grambling State University, LA
pp. 36-41

Analysis of Time-Based Random Waypoint Mobility Model for Wireless Mobile Networks (Abstract)

H. Sarbazi Azad , Sharif University of Technology, Tehran, Iran
M. R. Rahimi , Sharif University of Technology, Tehran, Iran
A. Nayebi , Sharif University of Technology, Tehran, Iran
pp. 42-47

Design of a QoS Signaling API for Advanced Multimedia Applications in NGN (Abstract)

Ognjen Dobrijevic , University of Zagreb
Maja Matijasevic , University of Zagreb
Miran Mosmondor , Ericsson Nikola Tesla
pp. 56-64
Session MA3: Internet and Wireless Network Security

Study on Worm Poisoning Technology (Abstract)

Xiang Cui , CNCERT/CC P. R. China
Bing Wu , Harbin Institute of Technology P. R. China
Xiaochun Yun , Harbin Institute of Technology P. R. China
pp. 65-70

A Discrete-time Queue Analytical Model based on Dynamic Random Early Drop (Abstract)

Mike Woodward , University of Bradford, UK
Mahmud Etbega , University of Bradford, UK
Fadi Thabtah , Philadelphia University, Amman, Jordan
Hussein Abdel-jaber , University of Bradford, UK
pp. 71-76

Dynamic Two-Layer Signature-Based IDS with Unequal Databases (Abstract)

Mehdi Salour , San Jose State University
Xiao Su , San Jose State University
pp. 77-82

A new Dynamic Key Generation Scheme for Fraudulent Internet Payment Prevention (Abstract)

Yiling Wang , Monash University, Australia
Bala Srinivasan , Monash University, Australia
Phu Dung Le , Monash University, Australia
Osama Dandash , Monash University, Australia
pp. 83-88

THIS: THreshold security for Information aggregation in Sensor networks (Abstract)

Neeraj Mittal , University of Texas at Dallas
Hai Vu , University of Texas at Dallas
S. Venkatesan , University of Texas at Dallas
pp. 89-95

Proactive model for Mitigating Internet Denial-of-Service Attacks (Abstract)

K. Chandra Sekaran , National Institute of Technology Karnataka, Surathkal, Karnataka, INDIA
Adarsh Rao Kordcal , National Institute of Technology Karnataka, Surathkal, Karnataka, INDIA
H.R Nagesh , National Institute of Technology Karnataka, Surathkal, Karnataka, INDIA
pp. 96-101

IdSRF: ID-based Secure Routing Framework for Wireless Ad-Hoc Networks (Abstract)

Wei Ren , University of Nevada, Las Vegas, NV
Ju-Yeon Jo , University of Nevada, Las Vegas, NV
Yoohwan Kim , University of Nevada, Las Vegas, NV
Yingtao Jiang , University of Nevada, Las Vegas, NV
Mei Yang , University of Nevada, Las Vegas, NV
pp. 102-110
Session MA4: Sensor Networks

Virtual Sensor Networks - A Resource Efficient Approach for Concurrent Applications (Abstract)

Anura P. Jayasumana , Colorado State University
Qi Han , Colorado School of Mines
Tissa H. Illangasekare , Colorado School of Mines
pp. 111-115

Cell-based Distributed Addressing Technique Using Clustered Backbone Approach (Abstract)

Ashwini Raina , University of Nevada Las Vegas, USA
Laxmi Gewali , University of Nevada Las Vegas, USA
V. Muthukumar , University of Nevada Las Vegas, USA
pp. 116-121

Node Clustering in Wireless Sensor Networks by Considering Structural Characteristics of the Network Graph (Abstract)

Yannis Manolopoulos , Aristotle University, Thessaloniki, Greece
Nikos Dimokas , Aristotle University, Thessaloniki, Greece
Dimitrios Katsaros , University of Thessaly, Volos, Greece
pp. 122-127

Sensos: A Sensor Node Operating System with a Device Management Scheme for Sensor Nodes (Abstract)

Jinchun Kim , Kyungsung University, Korea
Steve Eun , Hannam University, Korea
Brian Kim , Kyungsung University, Korea
Manseok Yang , ETRI, Korea
Sun Sup So , Kongju University, Korea
pp. 134-139

Interference Aware Routing in Sensor Network (Abstract)

Min Tun , University of Nevada, Las Vegas
Henry Selvaraj , University of Nevada, Las Vegas
Laxmi Gewali , University of Nevada, Las Vegas
pp. 140-146

Genetic Algorithm for Energy Efficient Clusters in Wireless Sensor Networks (Abstract)

Obidul Islam , Acadia University, Nova Scotia, Canada
Abdul W. Matin , Acadia University, Nova Scotia, Canada
Sajid Hussain , Acadia University, Nova Scotia, Canada
pp. 147-154
Session MB1: Mobile Enterprise

A Mobile Context Dissemination Middleware (Abstract)

Fahad Aijaz , RWTH Aachen University
Muhammad Sajjad , RWTH Aachen University
Bernhard Walke , RWTH Aachen University
Guido Gehlen , RWTH Aachen University
pp. 155-160

DPQ: Using A Distributed Priority Queue to Improve Ad hoc TCP Performance (Abstract)

Sumi Helal , University of Florida
Jinsuo Zhang , Yahoo Corp.
Junling Wang , Univ of South Carolina
Stacey Franklin Jones , Benedict College Columbia, SC
pp. 161-165

Wireless Community Networks: Public Assets for 21st Century Society (Abstract)

Elaine Lawrence , University of Technology Sydney
Gordana Culjak , University of Technology Sydney
Tarek El-Kiki , University of Technology Sydney
Mary Bina , Athens University of Economics and Business
pp. 166-174
Session MB2: New Trends in Image Processing

Novel Edge Detection (Abstract)

Adil Masood Siddiqui , University of Engineering and Technology, Pakistan
Imran Touqir , University of Engineering and Technology, Pakistan
Muhammad Saleem , University of Engineering and Technology, Pakistan
pp. 175-180

Comparison of Pyramidal and Packet Wavelet Coder for Image Compression Using Cellular Neural Network (CNN) with Thresholding and Quantization (Abstract)

J. Vignesh , Final Year Undergraduate Students, Sri Venkateswara College of Engineering, India
N. Venkateswaran , Sri Venkateswara College of Engineering, India
M. Bharadwaj , Final Year Undergraduate Students, Sri Venkateswara College of Engineering, India
S. Santhosh Kumar , Final Year Undergraduate Students, Sri Venkateswara College of Engineering, India
S Rahul , Final Year Undergraduate Students, Sri Venkateswara College of Engineering, India
pp. 183-184

A Neural Solution for Signal Detection In Non-Gaussian Noise (Abstract)

S. N. Merchant , Indian Institute of Technology, Bombay
U. B. Desai , Indian Institute of Technology, Bombay
D. G. Khairnar , Indian Institute of Technology, Bombay
pp. 185-189

Structurally Efficient Video Codec for Wireless Mobile Applications (Abstract)

Gaoyong Luo , Buckinghamshire Chiterns University College
Premkumar Elangovan , Buckinghamshire Chiterns University College
Geoff Lawday , Buckinghamshire Chiterns University College
pp. 190-195

Design of a Low Power Multiply-Accumulator for 2D Convolution in Video Processing Applications (Abstract)

Vijayan K. Asari , Old Dominion University, Norfolk, VA
Hau T. Ngo , Old Dominion University, Norfolk, VA
pp. 196-201

Octree-Based 3D Animation Compression with Motion Vector Sharing (Abstract)

Huiming Yu , North Carolina A&T University Greensboro, NC, USA
Jinsheng Xu , North Carolina A&T University Greensboro, NC, USA
Jinghua Zhang , Wesleyan College Macon, GA, USA
pp. 202-207

Input Fuzzy Modeling for the Recognition of Handwritten Hindi Numerals (Abstract)

M. Hanmandlu , I.I.T. Delhi New Delhi, India
J. Grover , I.I.T. Delhi New Delhi, India
S. Vasikarla , American InterCon.Uni. Los Angeles, USA
V. K. Madasu , Qld.Univ. of Tech. Brisbane, Australia
pp. 208-213

Pattern based Residual Coding for H.264 Encoder (Abstract)

Manzur Murshed , Monash University, Churchill, Vic-3842, Australia
Manoranjan Paul , Monash University, Churchill, Vic-3842, Australia
pp. 214-218

Polygonal Approximation of 2-D Binary Images (Abstract)

Seema H. Jadhav , N.D.M.V.P.S?S College of Engineering, Gangapur Road, Nashik-422013
B.S. Tarle , N.D.M.V.P.S?S College of Engineering, Gangapur Road, Nashik-422013
L.M. Waghmare , S.G.G.S.College of Engineering & Tecnology, Vishupuri, Nanded
pp. 219-223

Image Resolution Enhancement Using a Hopfield Neural Network (Abstract)

Yihong Lu , Zhejiang University of Technology, Hangzhou, 310014, China
Shuangteng Zhang , Eastern Kentucky University
pp. 224-228

Hypergraphs for Near-lossless Volumetric Compression (Abstract)

Alain Bretto , Universite de Caen, GREYC UMR-6072, Cedex, France
Luc Gillibert , Universite de Caen, GREYC UMR-6072, Cedex, France
pp. 229-233

Color Image Compression on Spiral Architecture using Optimized Domain Blocks in Fractal Coding (Abstract)

Nileshsingh V. Thakur , S.R.K.N. Engineering College, Nagpur, India.
O. G. Kakde , V. National Institute of Tech., Nagpur, India.
pp. 234-242
Session MB4: IT Applications

A Probabilistic Approach to Source Code Authorship Identification (Abstract)

Jay Kothari , Drexel University
Maxim Shevertalov , Drexel University
Edward Stehle , Drexel University
Spiros Mancoridis , Drexel University
pp. 243-248

Efficient Spam Email Filtering using Adaptive Ontology (Abstract)

Seongwook Youn , University of Southern California
Dennis McLeod , University of Southern California
pp. 249-254

Neural Networks in Cultivation (Abstract)

Akhil Kodali , Infosys
D.V.S Mohan Nimai , ICFAI Hyderabad
Pradeep Beerla , Tata Consultancy Services
Dangeti Ravi Shankar , Tata Consultancy Services
pp. 255-260

Exploration of Autism Expert Systems (Abstract)

Karthik Srinivasan , Family Physician Chennai, India
Sampathkumar Veeraraghavan , Tata Consultancy Services Ltd
pp. 261-264

A Novel Multi-agent Framework for the Design of Home Automation (Abstract)

Wen-Hui Chen , National Taipei University of Technology Taipei, Taiwan
Wen-Shang Tseng , National Taipei University of Technology Taipei, Taiwan
pp. 277-281

Agent Autonomy: Social Integrity and Social Independence (Abstract)

Marcus J. Huber , Intelligent Reasoning Systems Oceanside, California
pp. 282-290
Session MC1: Pervasive Computing

Search Reverse Nearest Neighbor Query On Air (Abstract)

SangKeun Lee , Korea University, Seoul, South Korea
InHo Jang , Korea University, Seoul, South Korea
pp. 291-296

CoCA: A Collaborative Context-Aware Service Platform for Pervasive Computing (Abstract)

Dejene Ejigu , Laboratoire LIRIS-UMR-CNRS 5205, INSA de Lyon, Cedex, France
Marian Scuturici , Laboratoire LIRIS-UMR-CNRS 5205, INSA de Lyon, Cedex, France
Lionel Brunie , Laboratoire LIRIS-UMR-CNRS 5205, INSA de Lyon, Cedex, France
pp. 297-302

S-MARKS: A Middleware Secure by Design for the Pervasive Computing Environment (Abstract)

Munirul M Haque , Marquette University, Milwaukee, Wisconsin, USA
Sheikh I Ahamed , Marquette University, Milwaukee, Wisconsin, USA
K M Ibrahim Asif , Marquette University, Milwaukee, Wisconsin, USA
pp. 303-310
Session MC2: E-Learning, Education and Curriculum

Education and Training for Troubleshooting in Automotive Chassis (Abstract)

Janus S. Liang , Yung-Ta Institute of Technology and Commerce, Taiwan
pp. 311-316

Design Engineering Educational Framework Using ShareFast: A Semantic Web-Based E-Learning System (Abstract)

Piroon Rojanakamolsan , University of Tokyo
Wataru Oishi , University of Tokyo
Hiroyuki Yamato , University of Tokyo
Kazuo Hiekata , University of Tokyo
pp. 317-322

Lectures for Mobile Devices, Evaluating "iPod/PDA-casting" Technology and Pedagogy (Abstract)

David Lebron , Kennesaw State University
Kenneth Hoganson , Kennesaw State University
pp. 323-328

An L-Tree Based Analysis of E-lessons (Abstract)

Azita Bahrami , Armstrong Atlantic State University
pp. 329-334

Description and composition of services for distant learning and research activities (Abstract)

Yvon Kermarrec , ENST Bretagne, Dept. LUSSI, Cedex, France
Oussama Kassem Zein , ENST Bretagne, Dept. LUSSI, Cedex, France
pp. 347-354
Session MC3: Data Mining

Comparing the Specification of a Near-Real Time Commanding System Using Statecharts and AADL (Abstract)

Sudhanwa Kholgade , University of North Dakota
Hassan Reza , University of North Dakota
Jamie White , University of North Dakota
pp. 355-360

Association Rule Discovery of Privacy Information (Abstract)

Pavankumar Bondugula , University of Nevada, Las Vegas
Kazem Taghva , University of Nevada, Las Vegas
Darshana Gala , University of Nevada, Las Vegas
pp. 361-365

A Model-Based Approach for Testing GUI Using Hierarchical Predicate Transition Nets (Abstract)

Hassan Reza , University of North Dakota
Sandeep Endapally , University of North Dakota
Emanuel Grant , University of North Dakota
pp. 366-370

Discovery of Association Rules in Temporal Databases (Abstract)

Susan P. Imberman , College of Staten Island, NY
Abdullah Uz Tansel , Baruch College, NY
pp. 371-376

Implementation of Unsupervised and Supervised Learning Systems for Multilingual Text Categorization (Abstract)

Hsin-Chang Yang , National Kaohsiung University of Applied Sciences, Taiwan
Chung-Hong Lee , National Kaohsiung University of Applied Sciences, Taiwan
pp. 377-382

Binary Classification by SVM based neural Trees and Nonlinear SVMs (Abstract)

M.Arun Kumar , Indian Institute of Technology Delhi
M. Gopal , Indian Institute of Technology Delhi
pp. 383-387

Quality Metrics for Object-Based Data Mining Applications (Abstract)

Alireza Khotanzad , Southern Methodist University, Dallas, Texas
Mark Smith , Southern Methodist University, Dallas, Texas
pp. 388-392

Analysis of Subspace-based Face Recognition Techniques under Changes in Imaging Factors (Abstract)

Rabia Jafri , University of Georgia, Athens, GA, USA
Hamid R Arabnia , University of Georgia, Athens, GA, USA
pp. 406-413

Concordance Analysis of DEXA Data (Abstract)

Ray R. Hashemi , Armstrong Atlantic State University
Alexander A. Tyler , C/A Informatics, LLC.
Christopher Childers , Armstrong Atlantic State University
Arthur Chausmer , C/A Informatics, LLC.
pp. 414-419

Process Capability for a Non-Normal Quality Characteristics Data (Abstract)

M. Abdollahian , RMIT University, Melbourne, Australia
P. Zeephongsekul , RMIT University, Melbourne, Australia
S. Ahmad , RMIT University, Melbourne, Australia
pp. 420-424

Process Capability Analysis for Non-Normal Quality Characteristics Using Gamma Distribution (Abstract)

S. Ahmad , RMIT University, Melbourne, Australia
M. Abdollahian , RMIT University, Melbourne, Australia
P. Zeephongsekul , RMIT University, Melbourne, Australia
pp. 425-430
Session TA1: Web Technologies I

Query Modifications Patterns During Web Searching (Abstract)

Amanda Spink , Queensland University of Technology
Bhuva Narayan , Queensland University of Technology
Bernard J. Jansen , Pennsylvania State University
pp. 439-444

An Abandoned Web Page Finds its Audience (Abstract)

Brian P. Flaherty , University of Washington
Terrence A. Brooks , University of Washington
pp. 445-450

An Architecture for Web Services Authentication and Authorization in a Maritime Environment (Abstract)

Anya Kim , Naval Research Lab, Code 5542
Amit Khashnobish , Naval Research Lab, Code 5542
Myong Kang , Naval Research Lab, Code 5542
pp. 451-456

Design and Implementation of JSwitch: a Web-based Transaction Coordination Framework (Abstract)

Juan A. Correa-Colon , University of Puerto Rico, Mayaguez
Manuel Rodriguez-Martinez , University of Puerto Rico, Mayaguez
pp. 457-462

A Virtual Catalog Generated from Web Pages of Vendors for Comparative Shopping (Abstract)

Masood Rahgozar , Islamic Azad University, Science and Research Branch, Tehran, Iran
Ali Ghobadi , Islamic Azad University, Science and Research Branch, Tehran, Iran
pp. 463-468

Using Web Search Logs to Identify Query Classification Terms (Abstract)

Isak Taksa , City University of New York
Sarah Zelikovitz , City University of New York
Amanda Spink , Queensland University of Technology
pp. 469-474

Mining Web Logs to Improve WebGIS Application Response Times (Abstract)

Richard Holowczak , Baruch College, CUNY
Isak Taksa , Baruch College, CUNY
Ilan Levine , Mount Olive College
pp. 475-480

Multimedia Chinese Web Search Engines: A Survey (Abstract)

Amanda Spink , Queensland University of Technology
Yun-Ke Chang , Nanyang Technological University Singapore
pp. 481-486

Construction of Semantic Web-based Knowledge Using Text Processing (Abstract)

In-Su Kang , Information System Research Lab., KISTI
Hee-Kwan Koo , Information System Research Lab., KISTI
Hanmin Jung , Information System Research Lab., KISTI
Seung-Woo Lee , Information System Research Lab., KISTI
Won-Kyung Sung , Information System Research Lab., KISTI
pp. 487-492

Towards Web Browsing for Visually Impaired People (Abstract)

Bruno Conde , University of Beira Interior, Portugal
Gael Dias , University of Beira Interior, Portugal
pp. 493-496
Session TA3: Intelligent/Object-Oriented Computing,Information Systems

Presenting a Rule Based Loan Evaluation Expert System (Abstract)

Mohammad Daneshvar Kakhki , Sharif University of Technology, Tehran, Iran
Mahmood Houshmand , Sharif University of Technology, Tehran, Iran
pp. 497-502

Development of a Model-Based Dynamic Recurrent Neural Network for Modeling Nonlinear Systems (Abstract)

MARC KARAM , Tuskegee University
MOHAMED A. ZOHDY , Oakland University Rochester, Michigan, MI
pp. 503-506

Securing Agent-Oriented Systems: An Argumentation and Reputation-based Approach (Abstract)

Jamal Bentahar , Concordia University, Canada
John-Jules Ch. Meyer , Utrecht University
Bernard Moulin , Laval University
pp. 507-515

Vehicle Recognition Using Curvelet Transform and SVM (Abstract)

Farhad Mohamad Kazemi , Islamic Azad University
Mohamad-R. Akbarzadeh-T , Ferdowsi University, Iran
Hamid Reza Poorreza , Ferdowsi University, Iran
Saeed Samadi , Khorasan Science and Technology Park (KSTP), Iran
pp. 516-521

Memory Garbage Collection for an Object-Oriented Processor (Abstract)

W. Y. Lo , City University of Hong Kong
Anthony S. S. Fong , City University of Hong Kong
C. Y. Ho , City University of Hong Kong
pp. 522-527

A Study of Dynamic Branch Predictors: Counter versus Perceptron (Abstract)

C. Y. Ho , City University of Hong Kong
K. F. Chong , City University of Hong Kong
Anthony S. S. Fong , City University of Hong Kong
C. H. Yau , City University of Hong Kong
pp. 528-536
Session TA4: Potpourri

An ICT Technical Reference Model for Iran Universities (Abstract)

Majid Gheitasi , Islamic AZAD University
A. R .Ali Ahmadi , University of Science and Technology
Farzad Soltani , University of Science and Technology
pp. 537-542

Authority, Deontics and Joint Intentions (Abstract)

Sean A. Lisse , Soar Technologies Ann Arbor, MI
David McGee , Natural Interaction Systems
Sanjeev Kumar , Cisco Systems
Marcus J. Huber , Intelligent Reasoning Systems, Oceanside, CA
pp. 550-555

Incorporating a New Hash Function in OpenPGP and SSL/TLS (Abstract)

Christina N. Michael , San Jose State University
Xiao Su , San Jose State University
pp. 556-561

Design For a Patient-Centric Medical Information System Using XML Web Services (Abstract)

Jerzy Rozenblit , University of Arizona, Tucson, Arizona
Elridge D'Mello , University of Arizona, Tucson, Arizona
pp. 562-567

Efficient and Lightweight File System for Desktop Grids (Abstract)

Prem Uppuluri , Radford University, Radford, VA
Sachin Singh , University of Missouri Kansas City, MO
Uday Joshi , Network Appliances Ltd.
pp. 568-576
Session TB1: Bioinformatics

Detecting Blood Clots using Neural Networks (Abstract)

Y. B. Reddy , Grambling State University, Grambling
Leon Sanders , University of Pittsburgh, PA
pp. 577-582

Overfitting in protein name recognition on biomedical literature and method of preventing it through use of transductive SVM (Abstract)

Kouichi Doi , Nara Institute of Science and Technology
Masaki Murata , National Institute of Information and Communications Technology
Tomohiro Mitsumori , Nara Institute of Science and Technology
pp. 583-588
Session TB2: Software Engineering I

Enhanced Component Reuse with Atomic Domains: Application Scenarios (Abstract)

Mauricio Jose Ordo? , Kennesaw State University
Hisham M. Haddad , Kennesaw State University
pp. 597-602

Software Reuse: Research and Practice (Abstract)

Sajjan G. Shiva , University of Memphis
Lubna Abou Shala , University of Memphis
pp. 603-609

Engineering Documents into XML File Formats (Abstract)

Chia-Chu Chiang , University of Arkansas at Little Rock
pp. 610-615

AETA: Algorithm Explanation Teaching Agent (Abstract)

Tomasz Muldner , Acadia University
Elhadi Shakshuki , Acadia University
Brian Demmings , Acadia University
pp. 616-621

User Interface Prototype for User-Centered Interface Design (Abstract)

Chang-Mog Lee , Chonbuk National University
Jeong-Ok Kim , Chonbuk National University
Ok-Bae Chang , Chonbuk National University
pp. 622-627
Session TB3: Software Engineering II & Algorithms

Negotiation Strategies for Agent-based Meeting Scheduling System (Abstract)

Hsiang-Hwa Koo , Acadia University
Elhadi Shakshuki , Acadia University
Darcy Benoit , Acadia University
pp. 637-642

RUP Extension for the Development of Secure Systems (Abstract)

Carlos Eduardo de Barros Paes , Pontif?cia Universidade Cat?lica de S?o Paulo, Brazil
Celso Massaki Hirata , Instituto Tecnol?gico de Aeron?utica, Brazil
pp. 643-652

Determining a Central Controlling Processor with Fault Tolerant Method in Distributed System (Abstract)

Mehdi EffatParvar , Islamic Azad University of Ardebil, Ardebil, Iran
Akbar Bemana , Islamic Azad University of Hashtroud, Iran
MohammadReza Effatparvar , Islamic Azad University of Qazvin, Iran
Mehdi Dehghan , Amir Kabir University, Tehran, Iran
pp. 658-663

Optimal Parallel Merging by Counting (Abstract)

Hatem M. Bahig , Ain Shams University, Cairo, Egypt
Hazem M. Bahig , Ain Shams University, Cairo, Egypt
pp. 664-669

Sorting by Block-Interchanges and Signed Reversals (Abstract)

Cleber Mira , University of Campinas, Brazil
Joao Meidanis , Scylla Bioinformatics
pp. 670-676
Session TB4: Software Specification and Modeling-Techniques, Tools and Applications

Super Iterator A design pattern for Algorithm and Data structure collections (Abstract)

Andre Oboler , Lancaster University, UK
Charles Twardy , Information Extraction & Transport Inc.
David Albrecht , Monash University, Melbourne, Australia
pp. 677-678

Research Documentation Guidelines - Capturing knowledge, improving research (Abstract)

Ian Sommerville , St Andrews University St Andrews, UK
Andre Oboler , Lancaster University, UK
pp. 679-684

SERT: Software Tool for Generating Student Engagement Reports (Abstract)

Judith Ann Ouimet , University of Nevada, Reno
Sermsak Buntha , University of Nevada, Reno
Sergiu Dascalu , University of Nevada, Reno
pp. 685-692

On Irregular Behaviours of Interactive Stacks (Abstract)

Gongzhu Hu , Central Michigan Univ., Mt. Pleasant, USA
Walter Dosch , University of Lubeck, L?ubeck, Germany
pp. 693-700

ArchKriti : A Software Architecture Based Design and Evaluation Tool Suite (Abstract)

V. Vallieswaran , K.R. School of Information Technology I.I.T. Bombay, India
Bernard Menezes , K.R. School of Information Technology I.I.T. Bombay, India
pp. 701-706

High-Level Design of a Request Driven Sender Component (Abstract)

Annette Stumpel , University of Lubeck, Lubeck, Germany
Walter Dosch , University of Lubeck, Lubeck, Germany
pp. 707-714

A Model Checking based Test Case Generation Framework forWeb Services (Abstract)

Jiong Zhou , University of Surrey
Yongyan Zheng , University of Surrey
Paul Krause , University of Surrey
pp. 715-722
Session TC1: High Performance Computing Architectures

A Novel VLSI Divide and Conquer Implementation of the Iterative Array Multiplier (Abstract)

Adly T. Fam , State University of New York at Buffalo, NY
Thomas Poonnen , Panavision Imaging, LLC, Homer, NY 13077, USA
pp. 723-728

On the Physicl Layout of PRDT-Based NoCs (Abstract)

Mei Yang , UNLV
Yulu Yang , Nankai University, Tianjin, 300071, China
Guoqiang Yang , Nankai University, Tianjin, 300071, China
pp. 729-733

Multi-path Routing for Mesh/Torus-Based NoCs (Abstract)

Mei Yang , University of Nevada, Las Vegas, USA
Yingtao Jiang , University of Nevada, Las Vegas, USA
Yaoting Jiao , Nankai University, China
Yulu Yang , Nankai University, China
Ming He , Nankai University, China
pp. 734-742
Session TC2: Information Security and Privacy

Location Based Security Architecture Based on Smart Client Model For Mobile Environment (Abstract)

Sung-Seok Kang , Samsung Electronics-Semiconductor Business, Korea
Ki-Cheol Jang , Samsung Electronics-Semiconductor Business, Korea
Young-Sang Kim , Samsung Electronics-Semiconductor Business, Korea
Young-Joong Lee , Samsung Electronics-Semiconductor Business, Korea
Hyo-Sun Kim , Samsung Electronics-Semiconductor Business, Korea
pp. 743-746

Untraceability of Group Signature Schemes based on Bilinear Mapping and Their Improvement (Abstract)

Jaeil Lee , Korea Information Security Agency
Kilsoo Chun , Korea Information Security Agency
Hyun Kim , Korea Information Security Agency
Ikkwon Yie , Inha University
Haeryong Park , Korea Information Security Agency
Seongan Lim , Inha University
pp. 747-753

Protection AgainstWeb-based Password Phishing (Abstract)

Joseph Chee Ming Teo , Nanyang Technological University, Singapore
Chik How Tan , Gjovik University College, Norway
pp. 754-759

A Simple Shill Bidding Agent (Abstract)

Jarrod Trevathan , James Cook University
Wayne Read , James Cook University
pp. 766-771

An Improved Signcryption Scheme and Its Variation (Abstract)

Takeshi Okamoto , University of Tsukuba
Raylin Tso , University of Tsukuba
Eiji Okamoto , University of Tsukuba
pp. 772-778

Research Directions in Quantum Cryptography (Abstract)

Rajni Goel , Howard University
Moses Garuba , Howard University
Anteneh Girma , Howard University
pp. 779-784

Comparative Analysis of Email Filtering Technologies (Abstract)

Jiang Li , Howard University
Moses Garuba , Howard University
Legand Burge , Howard University
pp. 785-789

Preventing parameterized vulnerability in Web based applications (Abstract)

Jiang Li , Howard University
Moses Garuba , Howard University
pp. 790-793

The Security Threat Posed by Steganographic Content on the Internet (Abstract)

Moses Garuba , Howard University
Trang Nguyen , Howard University
Rajni Goel , Howard University
Chunmei Liu , Howard University
pp. 794-798

Detecting Collusive Shill Bidding (Abstract)

Jarrod Trevathan , James Cook University
Wayne Read , James Cook University
pp. 799-808

Securing MPLS Networks with Multi-path Routing (Abstract)

Sahel Alouneh , Concordia University, Canada
Anjali Agarwal , Concordia University, Canada
Abdeslam En-Nouaary , Concordia University, Canada
pp. 809-814

Crypanalysis of Kuo and Chen?s Threshold Proxy Signature Scheme Based on the RSA (Abstract)

Zhenfu Cao , Shanghai Jiao Tong University, Shanghai, 200231, China
Fengying Li , Shanghai Jiao Tong University, Shanghai, 200231, China
Qingshui Xue , Shanghai Jiao Tong University, Shanghai, 200231, China
pp. 815-818

Developing Web 2.0 Applications for Semantic Web of Trust (Abstract)

Omer Mahmood , Charles Darwin University, Darwin
pp. 819-824

Semantically Secure Authenticated Encryption Scheme and the Same Scheme for Ad-hoc Group Called a Ring (Abstract)

Jik Hyun Chang , Sogang University, Seoul, Korea
Ji-Seon Lee , Sogang University, Seoul, Korea
pp. 825-830

Secure Network Authentication with PassText (Abstract)

Roman V. Yampolskiy , Center for Unified Biometrics and Sensors and IGERT in GIS University at Buffalo
pp. 831-836

Human Computer Interaction Based Intrusion Detection (Abstract)

Roman V. Yampolskiy , Center for Unified Biometrics and Sensors and IGERT in GIS
pp. 837-842

Materialized View Selection in Data Warehousing (Abstract)

Chandrashekhar A. Dhote , P. R. M. Institute of Technology & Research, Badnera, Amravati, India.
M. S. ALi , P. R. M. Institute of Technology & Research, Badnera, Amravati, India.
pp. 843-847

Multiresolution based Kernel Fisher Discriminant Model for Face Recognition (Abstract)

Raghunath S. Holambe , SGGSIE&T, Nanded, India
Dattatray V. Jadhav , Vishwakarma Institute of Technology, Pune, India
pp. 848-853

Analysis of a Traffic-Groomed Optical Network with Alternate Routing (Abstract)

Harry G. Perros , North Carolina State University
Alicia Nicki Washington , Howard University
pp. 854-862
Session TD1- Posters

A Phase Substitution Technique for DEMA of Embedded Cryptographic Systems (Abstract)

C.H. Gebotys , University of Waterloo, Ontario, Canada
B.A. White , University of Waterloo, Ontario, Canada
pp. 868-869

Decoupling Relational Database from Object Oriented Layers (Abstract)

Fabio Dias Fagundez , Chemtech, a Siemens Company
Ricardo Niederberger Cabral , Chemtech, a Siemens Company
Gustavo Melim do Carmo , Chemtech, a Siemens Company
pp. 870-871

iDENTM Smartphone Embedded Software Testing (Abstract)

Wei Hoo Chong , Global Software Group, Motorola Multimedia Malaysia
pp. 872-873

Performance Analysis of Error Control Codes for Wireless Sensor Networks (Abstract)

Yingtao Jiang , University of Nevada, Las Vegas, NV
Mei Yang , University of Nevada, Las Vegas, NV
Gopinath Balakrishnan , Texas Instruments Inc., Dallas
Yoohwan Kim , University of Nevada, Las Vegas, NV
pp. 876-879

Exponentially Aggressive Preservation of Nearly Depleted Nodes for Wireless Sensor Networks (Abstract)

Kenji Yoshigoe , University of Arkansas at Little Rock
Shinya Ito , University of Arkansas at Little Rock
pp. 880-882

Simulation of Localized Performance-Guided Reconfiguration of Distributed Sensor Networks (Abstract)

Thomas C. Jannett , University of Alabama at Birmingham
Parag P. Joshi , University of Alabama at Birmingham
pp. 883-884

Improving Mobile Banking Security Using Steganography (Abstract)

Mohammad Shirali-Shahreza , Sharif University of Technology Tehran, IRAN
pp. 885-887

An Efficient Periodic Broadcasting Scheme for Mobile Video-on-Demand System (Abstract)

Eysuk Jung , Kangwon National University
Yi Qi Gui , Kangwon National University
Young Choi , Kangwon National University
Hwang Kyu Choi , Kangwon National University
pp. 888-889

Fast explicit formulae for genus 2 hyperelliptic curves using projective coordinates (Abstract)

Thomas Wollinger , Escrypt - embedded security GmbH
Vladyslav Kovtun , Kharkiv Air Force University
pp. 893-897

Enhanced Current-Balanced Logic (ECBL): An Area Efficient Solution to Secure Smart Cards against Differential Power Attack (Abstract)

Amir Khatibzadeh , University of Waterloo, Waterloo, Canada
Catherine Gebotys , University of Waterloo, Waterloo, Canada
pp. 898-899

Power Analysis Attacks on ECC Randomized Automata (Abstract)

Fan Zhang , University of Connecticut
University of Connecticut , University of Connecticut
pp. 900-901

A Formal Interactivity Model for aWeb Community (Abstract)

Chima Adiele , University of Lethbridge
pp. 902-903

A Novel Vector-based Keyword Extracting Tool (Abstract)

Tien N. Nguyen , Iowa State University
pp. 904-905

Creating an Effective Infrastructure to Develop GIS (Abstract)

Em?lia de Menezes , Brazilian Aeronautics Institute of Technology - ITA
Adilson Marques da Cunha , Brazilian Aeronautics Institute of Technology - ITA
pp. 906-907

SuperCache: A Mechanism to Minimize the Front End Latency (Abstract)

Sumi Helal , University of Florida
Allan Zhang , Yahoo! Corp
pp. 908-914

Cellular Nonlinear Network with Spin Wave Bus (Abstract)

S. Wang , Stanford University
M. Bao , University of California at Los Angeles, Los Angeles, California
D.W. Lee , Stanford University
K. L. Wang , University of California at Los Angeles, Los Angeles, California
J-Y. Lee , University of California at Los Angeles, Los Angeles, California
A. Khitun , University of California at Los Angeles, Los Angeles, California
pp. 915-919

Topology and Binary Routing Schemes of A PRDT-Based NoC (Abstract)

Lei Li , Hebei University of Technology, Tianjin, 300071, China
Xinming Duan , Nankai University, Tianjin, 300071, China
Mei Yang , University of Nevada, Las Vegas, NV
Yulu Yang , Nankai University, Tianjin, 300071, China
Yingtao Jiang , University of Nevada, Las Vegas, NV
pp. 920-924

A Smart Card Mediated Mobile Platform for Secure E-Mail Communication (Abstract)

Geylani Kardas , Ege University International Computer, Turkey
Ebru Celikel , University of Texas at Dallas, Richardson
pp. 925-928
Session TD2-Posters

Design and Implementation of a High Performance MPI for Large Scale Computing System (Abstract)

R. Sridharan , Centre for Development of Advanced Computing (C-DAC), Bangalore, INDIA
N Mohanram , Centre for Development of Advanced Computing (C-DAC), Bangalore, INDIA
D. Prabu , Centre for Development of Advanced Computing (C-DAC), Bangalore, INDIA
Sanjeeb Kumar Deka , Centre for Development of Advanced Computing (C-DAC), Bangalore, INDIA
V. Vanamala , Centre for Development of Advanced Computing (C-DAC), Bangalore, INDIA
Rao BB Prahlada , Centre for Development of Advanced Computing (C-DAC), Bangalore, INDIA
pp. 929-932

Pre-processing of On-line Signals in Noisy Environments (Abstract)

Jarrod Trevathan , James Cook University
Alan McCabe , Fern Computer Services Ltd.
pp. 933-936

NeuroFuzzy Agent Programming for Processing of EEG/ECG/EMG Waveforms (Abstract)

G. Tholkappia Arasu , Jayam College of Engineering & Technology, Dharmapuri, Tamil Nadu, INDIA.
V. Palanisamy , Principal, Government College of Technology, Coimbatore, Tamil Nadu, INDIA.
pp. 937-938

Vehicle Recognition Based on Fourier, Wavelet and Curvelet Transforms - a Comparative Study (Abstract)

Saeed Samadi , Khorasan Science and Technology Park (KSTP) Mashad ,IRAN
Farhad Mohamad Kazemi , Islamic Azad University
Mohamad-R. Akbarzadeh-T , Ferdowsi University
Hamid Reza Poorreza , Ferdowsi University
pp. 939-940

Efficient Location Management Scheme using MLR considering Local Usages (Abstract)

Goo-Yeon Lee , Kangwon National University
Eui-Jong Jeong , Kangwon National University
pp. 941-942

Design of a RFID Transponder for Application on Secutiry (Abstract)

Kun-Yo Liu , University of Texas at El Paso, El Paso, TX
Tim Yao , University of Texas at El Paso, El Paso, TX
pp. 945-946

On the Dominator Colorings in Bipartite Graphs (Abstract)

Ralucca Gera , Naval Postgraduate School
pp. 947-952

Goal Oriented Templates to Dynamically Assess Knowledge (Abstract)

Jes?s Ubaldo Quevedo-Torrero , University of Wisconsin-Parkside
Alma Delia Rodr?guez-Bernal , Universidad Aut?noma de Guadalajara, Mexico
pp. 953-954

Individuation Learning Components in Intelligent Education Games (Abstract)

Fengyuan Xu , Jilin University, Changchun
Zhiyi Fang , Jilin University, Changchun
pp. 955-956

Mobile Interface for Domain Specific Machine Translation Using Short Messaging Service (Abstract)

Avinash J. Agrawal , CSE, R.K.N.E.C.,Nagpur(INDIA)
Manoj B. Chandak , CSE, R.K.N.E.C.,Nagpur(INDIA)
pp. 957-958

A Distributed Geometric Routing Algorithm for Ad HocWireless Networks (Abstract)

Rashid Bin Muhammad , Kent State University, Kent, OH, USA
pp. 961-963

PAD: A Design Space Exploration Model For Reconfigurable Systems (Abstract)

Kang Sun , Zhejiang University
Jimin Wang , Zhejiang University
Xuezeng Pan , Zhejiang University
Lingdi Ping , Zhejiang University
pp. 964-965

Data Fusion Support for Intrusion Detection and Prevention (PDF)

Richard A. Wasniowski , California State University Dominguez Hills
Mohsen Beheshti , California State University Dominguez Hills
pp. 966

Erratic Cryptosystem for Elevated Message Security (Abstract)

F.Sheeja Mary , National Engineering College, Kovilpatti, India
pp. 967-969

Mobility Aware Transmission Power Control in Mobile Ad-hoc Network (PDF)

YongJoo Song , Korea Advanced Institute of Science and Technology
Keuntae Park , Korea Advanced Institute of Science and Technology
SangKwon Moon , Korea Advanced Institute of Science and Technology
Daeyeon Park , Korea Advanced Institute of Science and Technology
pp. 970

Generating a Proxy Signature on a Confidential Message (PDF)

Ji-Seon Lee , Sogang University, Seoul, Korea
Jik Hyun Chang , Sogang University, Seoul, Korea
pp. 971

Modeling and Evaluating the Scalability of Instruction Fetching in Superscalar Processors (PDF)

Mojtaba Shakeri , Islamic Azad University of Qazvin, Amirkabir University of Technology
Abolfazl Toroghi Haghighat , Islamic Azad University of Qazvin, Amirkabir University of Technology
Mohammad K. Akbari , Islamic Azad University of Qazvin, Amirkabir University of Technology
pp. 972
Session WA1: Embedded Systems and Reconfigurable Architectures

A Multi-Objective Evolutionary Algorithm Based Optimization Model for Network-on-Chip Synthesis (Abstract)

Rabindra Ku. Jena , Institute of Management Technology, Nagpur, India.
Gopal Ku. Sharma , ABV-Indian Institute of Information Technology & Management, Gwalior, India
pp. 977-982

Runtime Partial Reconfiguration for Embedded Vector Processors (Abstract)

Muhammad Z. Hasan , New Jersey Institute of Technology
Sotirios G. Ziavras , New Jersey Institute of Technology
pp. 983-988

FPGA-based Vector Processing for Matrix Operations (Abstract)

Hongyan Yang , New Jersey Institute of Technology
Sotirios G. Ziavras , New Jersey Institute of Technology
Jie Hu , New Jersey Institute of Technology
pp. 989-994

SPA resistant Elliptic Curve Cryptosystem using Addition Chains (Abstract)

W.P. Marnane , University College Cork
N. Meloni , LIRMM, CNRS - Univ. Montpellier
A. Tisserand , LIRMM, CNRS - Univ. Montpellier 2
A. Byrne , University College Cork
F. Crowe , University College Cork
E.M. Popovici , University College Cork
pp. 995-1000

The Apparatus and Enabling of a Code Balanced System (Abstract)

Justin Treon , California State University, Sacramento
Weide Chang , California State University, Sacramento
Tony Benavides , California State University, Sacramento
pp. 1001-1007

Compact FPGA-based systolic array architecture suitable for vision systems (Abstract)

Griselda Salda? , National Institute for Astrophysics, Optics and Electronics (INAOE) Puebla. Mexico
Miguel Arias-Estrada , National Institute for Astrophysics, Optics and Electronics (INAOE) Puebla. Mexico
pp. 1008-1013

Efficient Finite Field Processor for GF(2^163) and its VLSI Implementation (Abstract)

Huapeng Wu , University of Windsor
Bijan Ansari , University of Waterloo
pp. 1021-1026

A Fault tolerant mechanism for handling Permanent and Transient Failures in a Network on Chip (Abstract)

Michael Welzl , University of Innsbruck, Austria
Sven Hessler , University of Innsbruck, Austria
Muhammad Ali , University of Innsbruck, Austria
pp. 1027-1032

On Design and Analysis of a Feasible Network-on-Chip (NoC) Architecture (Abstract)

Nader Bagherzadeh , University of California, Irvine - Irvine, CA
Seung Eun Lee , University of California, Irvine - Irvine, CA
Jun Ho Bahn , University of California, Irvine - Irvine, CA
pp. 1033-1038

Implementation and Performance Analysis of an IPv6 Multicast Forwarder for the IXP2400 Network Processor (Abstract)

Sinam Woo , Korea University
Inho Kim , Korea University
Sunshin An , Korea University
Kyungsoo Lim , Korea University
Woojin Park , Korea University
pp. 1039-1044

Performance Evaluation of Cache Memory Organizations in Embedded Systems (Abstract)

Mohsen Soryani , Iran University of Science and Technology, Tehran, Iran
Mohammad Hossein Rezvani , Iran University of Science and Technology, Tehran, Iran
Mohsen Sharifi , Iran University of Science and Technology, Tehran, Iran
pp. 1045-1050

A System for Semantically Enhanced, Multifaceted, Collaborative Access: Requirements and Architecture (Abstract)

Boas Hashavia , IDEA Information Systems (Israel)
Norbert Benamou , ORT France
Fazilatur Rahman , Sheffield Hallam University, Sheffield UK
Maria Teresa Andrade , INESC, Portugal
Raphael Attias , ORT France
Babak Akhghar , Sheffield Hallam University, Sheffield UK
Judy Dori , Technion - Israel Institute of Technology (Israel)
Nahum Korda , Straight Technology (UK)
Jawed Siddiqi , Sheffield Hallam University, Sheffield UK
Nazaraf Shah , Sheffield Hallam University, Sheffield UK
pp. 1051-1056

On the Design of a Parallel Link Using Rigid-Flex PCB Technology (Abstract)

G. Knittel , WSI/GRIS, T?bingen University, Germany
pp. 1057-1062
Session WA4: Potpourri

Some properties of superline digraphs (Abstract)

Daniela Ferrero , Texas State University San Marcos, TX
pp. 1073-1076

Adaptive Pattern Movement for Mobile Games (Abstract)

Ron Coleman , Marist College
pp. 1083-1088

A Bottleneck Eliminating Approximate Algorithm for PON Layout (Abstract)

Munib Ahmed , University of Texas
Samee Ullah Khan , University of Texas
pp. 1089-1094

Analyzing the Characteristics of Gnutella Overlays (Abstract)

Xiaochun Yun , Institute of Technology Harbin China
Yifei Li , Sichuan University Chengdu China
Yong Wang , Technology the Chinese Academy of Sciences Beijing China
pp. 1095-1100

Investigation of Effective Factors on e-Readiness of Iranian Manufacturing SMEs (Abstract)

Babak Amiri , Iran University of Science and Technology
Mohammad Fathian , Iran University of Science and Technology
pp. 1101-1106

Dependabilities in a High-performance Quantum Real-time Distributed System (Abstract)

Shi-Jinn Horng , National Taiwan University of Science and Technology
Sy-Yen Kuo , National Taiwan University
Yao-Hsin Chou , National Taiwan University of Science and Technology
Chin-Shyurng Fahn , National Taiwan University of Science and Technology
I-Ming Tsai , National Taiwan University
pp. 1107-1112

Collaborative Pricing for e-Service Bundle Delivery: A Framework (Abstract)

Soe-Tysr Yuan , National Chengchi University, Taiwan
Wei-Lun Chang , National Chengchi University, Taiwan
pp. 1113-1118
Author Index

Author Index (PDF)

pp. 1119
86 ms
(Ver 3.3 (11022016))