The Community for Technology Leaders
Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, International Conference on & Self-Assembling Wireless Networks, International Workshop on (2006)
Las Vegas, Nevada
June 19, 2006 to June 20, 2006
ISBN: 0-7695-2611-X
TABLE OF CONTENTS
Introduction
Keynote Address
Session 1A: Software Architecture/Software Testing

Decision Table Based Analysis of Trading Models (Abstract)

Rajeshwar Prasad Srivastava , Towson University, 8000 York Road, Towson, MD 21252, USA
pp. 3-8

Transition from Requirements to Architecture: A Review and Future Perspective (Abstract)

Mahmood Moussavi , University of Calgary, Canada
Armin Eberlein , American University of Sharjah, United Arab Emirates
Matthias Galster , University of Calgary, Canada
pp. 9-16

A Three-Layer Model for Software Engineering Metrics (Abstract)

Bruce Maxim , University of Michigan-Dearborn
Kiumi Akingbehin , University of Michigan-Dearborn
pp. 17-20

An NFR-Based Framework for Establishing Traceability between Enterprise Architectures and System Architectures (Abstract)

Yeong-tae Song , Towson University, MD
Lawrence Chung , University of Texas at Dallas
Nary Subramanian , University of Texas at Tyler
pp. 21-28

Design Phase Analysis of Software Qualities Using Aspect-Oriented Programming (Abstract)

Jihyun Lee , ETRI, Korea
Daesung Park , LG-Nortel, Korea
Sungwon Kang , Communications University, Korea
pp. 29-34

Improvement of Object Serialization in Java Remote Method Invocation (Abstract)

Hei Ning Helen Ma , California State Polytechnic University, Pomona
Lan Yang , California State Polytechnic University, Pomona
pp. 35-42
Session 1B: Component-Based Software Engineering/Software Testing

Applying Dynamic Change Impact Analysis in Component-based Architecture Design (Abstract)

Jonathan I. Maletic , Kent State University, US
Tie Feng , Jilin University, China
pp. 43-48

From Stream Transformers to Moore State Transition Machines with Input and Output (Abstract)

Walter Dosch , University of Lubeck, Germany
Wuttipong Ruanthong , University of Lubeck, Germany
Annette Stumpel , University of Lubeck, Germany
pp. 65-72

Reducing Test Cost and Improving Documentation In TDD (Test Driven Development) (Abstract)

Atif Neuman Jamil , COMSATS Institute of Information Technology, Pakistan
Taha Karamat , COMSATS Institute of Information Technology, Pakistan
pp. 73-76

An Extension to Robustness Slicing Algorithm Based on Dynamic Array (Abstract)

Yancheng Wang , Southeast University Sipailou,Nanjing, China
Xufang Gong , Southeast University Sipailou,Nanjing, China
Bixin Li , Southeast University Sipailou,Nanjing, China
pp. 77-84
Session 2A: Data Mining

Text Classification by Combining Different Distance Functions withWeights (Abstract)

Naohiro Ishii , Aichi Institute of Technology, Japan
Kazunori Iwata , Aichi University, Japan
Takahiro Yamada , Aichi Institute of Technology, Japan
Kyohei Yamashita , Aichi Institute of Technology, Japan
pp. 85-90

Ontology-Based Knowledge Extraction-A Case Study of Software Development (Abstract)

Chan-Chine Chang , National Chiao-Tung University,Taiwan
Ruey-Shun Chen , National Chiao-Tung University,Taiwan
Isabel Chi , National Chiao-Tung University,Taiwan
pp. 91-96

A Distributed Flocking Approach for Information Stream Clustering Analysis (Abstract)

Xiaohui Cui , Oak Ridge National Laboratory, TN
Thomas E. Potok , Oak Ridge National Laboratory, TN
pp. 97-102

Identifying Critical Dependencies Using General Bayesian Network: An Application to Aviation Operation (Abstract)

Sung Woo Shin , Sungkyunkwan University, Seoul, Korea
Inwon Kang , Kyunghee University, Seoul, Korea
pp. 103-108

Network Intrusion Detection Through Genetic Feature Selection (Abstract)

Chi Hoon Lee , Sungkyunkwan University, Suwon, Korea
Jin Wook Chung , Sungkyunkwan University, Suwon, Korea
Sung Woo Shin , Sungkyunkwan University, Seoul, Korea
pp. 109-114

Using Data Mining Technology to improve Manufacturing Quality - A Case Study of LCD Driver IC Packaging Industry (Abstract)

Ruey-Shun Chen , National Chiao-Tung University,Taiwan
Chan-Chine Chang , National Chiao-Tung University,Taiwan
H.H. Chien , National Chiao-Tung University,Taiwan
Kun-Chieh Yeh , National Chiao-Tung University,Taiwan
pp. 115-119

Data Clustering of Tolerance Space in MATLAB (Abstract)

Chun-Hung Tzeng , Ball State University, Muncie, IN
Fu-Shing Sun , Ball State University, Muncie, IN
pp. 120-126
Session 2B: Parallel/Distributed Computing

Flexible Metadata Management for Block-level Storage System (Abstract)

Dan Feng , Huazhong University of Science and Technology, Hubei, China
Zhan Shi , Huazhong University of Science and Technology, Hubei, China
Jie Xiao , Huazhong University of Science and Technology, Hubei, China
Mengfei Cheng , Huazhong University of Science and Technology, Hubei, China
pp. 127-132

New Generalized Cellular Automata to a Class of Optimization Problems (Abstract)

Dianxun Shuai , East China University of Sci. and Tech., China
Qing Shuai , Huazhong University of Sci. and Tech., China
Liangjun Huang , East China University of Sci. and Tech., China
pp. 133-138

A Wireless Grid Service Platform Using SIP and Agents (Abstract)

Fang-Yie Leu , Tunghai University, Taiwan
Tai-Shiang Wang , Tunghai University, Taiwan
pp. 139-144

Minimizing Multicast Communication Latency in WAN-Based Environment (Abstract)

Natawut Nupairoj , Chulalongkorn University, Bangkok, Thailand
Kanchana Silawarawet , Chulalongkorn University, Bangkok, Thailand
pp. 145-150

Routing Problems in Incomplete Pancake Graphs (Abstract)

Keiichi Kaneko , Tokyo University of Agriculture and Technology, Japan
pp. 151-156
Session 3A: Computer Networks

Design Issues in a Bare PC Web Server (Abstract)

Alexander L. Wijesinha , Towson University, 7800 York Rd, MD
Gholam H. Khaksari , Towson University, 7800 York Rd, MD
Ramesh K. Karne , Towson University, 7800 York Rd, MD
Long He , Towson University, 7800 York Rd, MD
Sandeep Girumala , Towson University, 7800 York Rd, MD
pp. 165-170

The global fault-tolerance of interconnection networks (Abstract)

Calin D. Morosan , Concordia University, Montreal, Canada
Hovhannes A. Harutyunyan , Concordia University, Montreal, Canada
pp. 171-176

Offshore Outsourcing Bridge: Designing and Development A Model Applied Management Platform for Chinese Offshore Outsourcing (Abstract)

Li Shiying , Informedia Inc., Dalian,China
Luo Yi , Technological Research Institute, Dalian,China
pp. 177-183

MyTwigStack: A Holistic Twig Join Algorithm with Effective Path Merging Support (Abstract)

Dunren Che , Southern Illinois University, Carbondale, IL
pp. 184-189

A Software Tool for Network Traffic Analysis (Abstract)

F. Sun , Ball State University, IN
H. Tzeng , Ball State University, IN
pp. 190-196
Session 3B: Image/Signal Processing

Pupil and Iris Localization for Iris Recognition in Mobile Phones (Abstract)

Kang Ryoung Park , Sangmyung University,Seoul, Republic of Korea
Dae Woong Rhee , Sangmyung University,Seoul, Republic of Korea
Dal-ho Cho , Sangmyung University,Seoul, Republic of Korea
Yanggon Kim , Towson University, MD
Jonghoon Yang , Sangmyung University, Chungcheongnam-do, Republic of Korea
pp. 197-201

A Novel Generalized Particle Model for Lossless Data Compression (Abstract)

Dianxun Shuai , East China University of Sci. and Tech., China
Qing Shuai , Huazhong University of Sci. and Tech., China
pp. 202-207

DCE-MRI Segmentation and Motion Correction Based on Active Contour Model and Forward Mapping (Abstract)

Wenzhu Lu , Towson University, MD
Sheila Prindiville , National Institutes of Health
Chao Lu , Towson University, MD
Catherine Chow , National Institutes of Health
Jianhua Yao , National Institutes of Health
pp. 208-212

Target Classification and Pattern Recognition Using Micro-Doppler Radar Signatures (Abstract)

Wenxue Zhang , Towson University, 8000 York Road, Towson, MD
Chao Lu , Towson University, 8000 York Road, Towson, MD
Yinan Yang , Towson University, 8000 York Road, Towson, MD
Jiajin Lei , Towson University, 8000 York Road, Towson, MD
pp. 213-217

Face Recognition by Spatiotemporal ICA Using Facial Database Collected by AcSys FRS Discover System (Abstract)

Chao Lu , Towson University, Towson, MD
Jiajin Lei , Towson University, Towson, MD
pp. 218-224
Session 4A: SAWN 2006 Workshop-Invited Talks
Session 5A: Mobile Wireless

AFlexible Framework for Wireless-Based Intelligent Sensor with Reconfigurability , Dynamic adding ,and Web interface (Abstract)

Hung-Chieh Yu , National Taipei University of Technology, Taiwan
Shu-Ming Tseng , National Taipei University of Technology, Taiwan
pp. 231-236

An Effective Authentication Scheme in Mobile Ad Hoc Network (Abstract)

Yoonho Kim , Sangmyung University, Korea
Yanggon Kim , Towson University, MD
Kiho Shin , Sun Microsystems
pp. 249-252

A Graph Alorithm Based Approach to Recovery and Failover in Tactical Manets (Abstract)

Darryn Randle , Smart Innovative Solutions
Damian Watkins , Morgan State University
Craig Scott , Morgan State University
pp. 253-260
Session 5B: SAWN 2006 Workshop-Routing Protocols and Network Management

DEEPS: Deterministic Energy-Efficient Protocol for Sensor networks (Abstract)

Dumitru Brinza , Georgia State University, Atlanta, GA
Alexander Zelikovsky , Georgia State University, Atlanta, GA
pp. 261-266

Reliable Cost-based Data-centric Routing Protocol forWireless Sensor Networks (Abstract)

Paul Havinga , University of Twente
Jian Wu , University of Twente
pp. 267-272

Approximation Algorithm for Maximum Lifetime in Wireless Sensor Networks with Data Aggregation (Abstract)

Jeffrey Stanford , Illinois Institute of Technology
Sutep Tongngam , Illinois Institute of Technology
pp. 273-277

Cross-Layer Design and Optimization forWireless Sensor Networks (Abstract)

Tat L. Lim , Naval Postgraduate School, Monterey, CA
Weilian Su , Naval Postgraduate School, Monterey, CA
pp. 278-284

Maximum Lifetime of Sensor Networks with Adjustable Sensing Range (Abstract)

C. T. Vu , Georgia State University, Atlanta, GA
A. Dhawan , Georgia State University, Atlanta, GA
Y. Li , Georgia State University, Atlanta, GA
S. K. Prasad , Georgia State University, Atlanta, GA
A. Zelikovsky , Georgia State University, Atlanta, GA
pp. 285-289

Deployment Algorithms and In-Door Experimental Vehicles for Studying Mobile Wireless Sensor Networks (Abstract)

D.O. Popa , University of Texas at Arlington
M.F. Mysorewala , University of Texas at Arlington
F.L. Lewis , University of Texas at Arlington
V. Giordano , University of Texas at Arlington
pp. 290-298
Session 6A: Requirements Engineering/Natural Language Processing

A Novel Approach of Requirements Analysis for Agent Based System (Abstract)

Prabhat Ranjan , Motilal Nehru National Institute of Technology, India
A. K. Misra , Motilal Nehru National Institute of Technology, India
pp. 299-304

A Survey of Software Estimation Techniques and Project Planning Practices (Abstract)

Mehwish Nasir , National University of Sciences and Technology, Pakistan
pp. 305-310

A Dynamic and Self-study Language Model Oriented to Chinese Characters Input (Abstract)

Gu Ping , Technology of Soochow University, Suzhou, China
Li Pei-feng , Technology of Soochow University, Suzhou, China
Zhu Qiao-ming , Technology of Soochow University, Suzhou, China
pp. 311-318
Session 6B: SAWN 2006 Workshop-QoS and Security

A QoS-aware Mobility Management Mechanism (Abstract)

Maher Kaddoura , Architecture Technology Corporation Eden Prairie, MN, USA
pp. 319-323

Verifying and Fixing Password Authentication Protocol (Abstract)

Rachel McCrindle , The University of Reading, UK
Xiaochun Cheng , Beijing Normal University, P.R.China
Xiaoqi Ma , The University of Reading, UK
pp. 324-329

Data-Logging and Supervisory Control in Wireless Sensor Networks (Abstract)

Aditya N. Das , University of Texas at Arlington
Dan O. Popa , University of Texas at Arlington
Frank L. Lewis , University of Texas at Arlington
pp. 330-338
Session 7A: E-Learning/Web Technology

e- Oral: A Hypermedia Web Application for English Language Oral Exams within a Distance Education Environment (Abstract)

Laura Alba-Juez , Universidad Nacional de Educaci?n a Distancia (UNED), Madrid, SPAIN.
Beatriz Molina , Universidad Nacional de Educaci?n a Distancia (UNED), Madrid, SPAIN.
Ma Eugenia Lopez , Universidad Nacional de Educaci?n a Distancia (UNED), Madrid, SPAIN.
M?nica Aragon? , Universidad Nacional de Educaci?n a Distancia (UNED), Madrid, SPAIN.
pp. 343-348

Transitioning from e-Learning to m-Learning: Present Issues and Future Challenges (Abstract)

Goran Trajkovski , Towson University, USA
Tsvetozar Georgiev , University of Rousse,Bulgaria
Evgeniya Georgieva , University of Rousse,Bulgaria
pp. 349-353

A Web-based Cooperative Research Paper Edit System (Abstract)

Takayuki Fujimoto , Sonoda Women?s University, Japan
Tokuro Matsuo , Miyagi University, Japan
pp. 354-360

Using Tools in Teaching University Courses in Information Technology (Abstract)

Hasan Sayani , University of Maryland University College
Yulia Nemchinova , University of Maryland University College
pp. 361-367

Semantic Web Service Modeling using UML for e-business environment (Abstract)

Roger Lee , Central Michigan University, U.S.A
Yan Ha , Kyungin Women?s College, Korea
pp. 368-374

Asynchronous Callback in Web Services (Abstract)

Kai Qian , University Marietta, Georgia,USA
LiXin Tao , Pace University White Plains, New York, USA
Jigang Liu , Metropolitan State University St. Paul, Minnesota, USA
pp. 375-380
Session 7B: Information Assurance/Cryptography/Network Security

Preventing Attacks on Back-End Servers using Masquerading/Honeypots (Abstract)

Theodor Richardson , University of South Carolina, Columbia, SC
pp. 381-388

Genetic Algorithms for Hunting Snakes in Hypercubes: Fitness Function Analysis and Open Questions (Abstract)

Pedro A. Diaz-Gomez , University of Oklahoma, OK, USA
Dean F. Hougen , University of Oklahoma, OK, USA
pp. 389-394

Label-Based Access Control Policy Enforcement and Management (Abstract)

Munir Ahmad , University of Teesside, UK
Wei Zhou , University of Warwick, UK
Vinesh H. Raja , University of Warwick, UK
Christoph Meinel , University of Potsdam, Germany
pp. 395-400

Development of a Honeynet Laboratory: a Case Study (Abstract)

Michael O?Leary , Towson University
Shiva Azadegan , Towson University
Jay Lakhani , Towson University
pp. 401-406

A Role-based PMI Authentication Model and its Application (Abstract)

Liu Yueqin , Soochow University,China
Qian Peide , Soochow University,China
Zhu yanqin , Soochow University,China
pp. 407-412

GSM Security Issues and Challenges (Abstract)

Muhammad Amir , University of Engineering and Technology Peshawar Pakistan
S. Muhammad Siddique , University of Engineering and Technology Peshawar Pakistan
pp. 413-418
Author Index

Author Index (PDF)

pp. 419
88 ms
(Ver )