Abstract is missing.
- Keynote Speech 1: Secure Information Sharing and Dissemination in the Context of Public SecurityNabil R. Adam. [doi]
- Keynote Speech 3: Discrete-Event Computer Simulation as a Paradigm of Scientific InvestigationsKrzysztof Pawlikowski. [doi]
- Keynote Speech 2: Routing Techniques in Wireless Sensor NetworksAbbas Jamalipour. [doi]
- Single Machine Total Weighted Tardiness Problem with Genetic AlgorithmsAntonio Ferrolho, Manuel M. Crisóstomo. 1-8 [doi]
- Intelligent Agents and Apache Cocoon for a CV Generation SystemEvelio J. González, Alberto F. Hamilton, Lorenzo Moreno, Juan A. Méndez, G. N. Marichal, Jose F. Sigut, Marta Sigut, Jonatán Felipe. 9-15 [doi]
- An Approach for Specification-based Test Case Generation for Web ServicesSamer Hanna, Malcolm Munro. 16-23 [doi]
- Construct Metadata Model based on Coupling Information to Increase the Testability of Component-based SoftwareLiangli Ma, Houxiang Wang, Yongjie Li. 24-31 [doi]
- A Reference Model of Grouped-Metadata Object and a Change Model based on it Appling for Component-based Software Integration TestingLiangli Ma, Houxiang Wang, Yongjie Li. 32-39 [doi]
- An Eclipse Plug-in: Dependency BrowserDapeng Liu, Shaochun Xu, Zhongyuan Liu. 40-46 [doi]
- A Component Model for Network Processor Based SystemHong Xiao, Di Wu. 47-50 [doi]
- Using Maintainability Based Risk Assessment and Severity Analysis in Prioritizing Corrective Maintenance TasksWalid Abdelmoez, Katerina Goseva-Popstojanova, Hany H. Ammar. 51-58 [doi]
- Towards Maintainable Architecture for Process Control ApplicationsIslam A. M. El-Maddah, Walid Abdelmoez, Hany H. Ammar. 59-66 [doi]
- A Meta-analysis Approach to Refactoring and XPSteve Counsell, Robert M. Hierons, George Loizou. 67-75 [doi]
- A Formal Approach for Functional and Structural Test Case Generation in Multi-Agent SystemsYacine Kissoum, Zaïdi Sahnoun. 76-83 [doi]
- Component based development of non-visual applications using braille-speech widgetsAmina Bouraoui. 84-91 [doi]
- Development of a Web Based Database-Centric Workflow Management System Using Rapid Prototyping ApproachZahra J. Muhsin, Ali H. El-Mousa, Ian Potts. 92-99 [doi]
- SERP: Scalable Efficient Reservation Protocol for the Future InternetM. Mtshali, G. E. Ojong, M. O. Adigun. 100-107 [doi]
- On Secure Consensus Information Fusion over Sensor NetworksMahdi Kefayati, Mohammad Sadegh Talebi, Hamid R. Rabiee, Babak Hossein Khalaj. 108-115 [doi]
- QoS Routing of VoIP using a Modified Widest-Shortest Routing AlgorithmAla F. Khalifeh, Ali H. El-Mousa. 116-123 [doi]
- A Multi-Agent Flexible Architecture for Autonomic Services and Network ManagementYazeed Al-Obaisat, Robin Braun. 124-131 [doi]
- A Multi-Agent Flexible Architecture for Autonomic Services and Network ManagementYazeed Al-Obasiat, Robin Braun. 132-138 [doi]
- Performance Analysis of Reflection Paths for Millimeter Wavelength SystemsZ. Mulhi-Eldeen, Miqdad Al-Nuaimi, Jürgen Richter, L. Ivrissimtzis. 139-145 [doi]
- An Adaptive Polling Scheme to Improve Voice Transmission over Wireless LANsAshraf D. Milhim, Yaw-Chung Chen. 146-152 [doi]
- Resource Sharing Systems: A Combinatorial Application to Pervasive ComputingAmgad Madkour, Sherif G. Aly. 153-157 [doi]
- Packet Reservation Multiple Access (PRMA) with Random ContentionAhed Al-Shanyour, Ashraf S. Hasan Mahmoud, Tarek Sheltami, Salman AlQahtani. 158-164 [doi]
- Solving P2P Traffic Identification Problems Via Optimized Support Vector MachinesYue-xiang Yang, Rui Wang, Yang Liu, Shang-zhen Li, Xiao-yong Zhou. 165-171 [doi]
- A QoS-Oriented Protocol for Burst Admission Control in OBS NetworksAmor Lazzez, Noureddine Boudriga, Mohammad S. Obaidat, Sihem Guemara-ElFatmi. 172-179 [doi]
- Session awareness issues for next generation cluster based network load balancing frameworksNarjess Ayari, Denis Barbaron, Laurent Lefèvre, Pascale Primet. 180-186 [doi]
- A Heuristic Genetic Algorithm for the Single Source Shortest Path ProblemBasela S. Hasan, Mohammad A. Khamees, Ashraf S. Hasan Mahmoud. 187-194 [doi]
- RC-MAC: Reduced Collision MAC for Bandwidth Optimization in Wireless Local Area NetworksMahmoud Taifour, Farid Naït-Abdesselam, David Simplot-Ryl. 195-202 [doi]
- New Scheduling Architecture for IEEE 802.16 Wireless Metropolitan Area NetworkHaïdar Safa, Hassan Artail, Marcel Karam, Rawan Soudah, Samar Khayat. 203-210 [doi]
- A QoS Scheduler Packets for Wireless Sensor NetworksNesrine Ouferhat, Abdelhamid Mellouk. 211-216 [doi]
- Event Boundary Detection Using Autonomous Agents in a Sensor NetworkAdil Jaffer, Muhammad Jaseemuddin, Mandana Jafarian, Hesham El-Sayed. 217-224 [doi]
- Implementation of the Sensor-MAC Protocol for the JiST/SWANS SimulatorVeerendra Tippanagoudar, Imad Mahgoub, Ahmed Badi. 225-232 [doi]
- Congestion Avoidance Mechanism for Optical Label Switched Networks: A Dynamic QoS-based ApproachYassine Khlifi, Noureddine Boudriga, Mohammad S. Obaidat. 233-240 [doi]
- Integration of Technologies for Smart Home ApplicationSaeed O. Al Mehairi, Hassan Barada, Mahmoud Al-Qutayri. 241-246 [doi]
- Using Modified Conditional Second-Order Statistics in Blind Source Separation in Noisy EnvironmentM. R. Zoghi, M. Hossein Kahaei. 247-251 [doi]
- Doppler Effect on Location-Based Tracking in Mobile Sensor NetworksMohamed Hamdi, Ramzi Bellazreg, Noureddine Boudriga. 252-257 [doi]
- WSNodeRater - An Optimized Reputation System Framework for Security Aware Energy Efficient Geographic Routing in WSNsIsmat K. Maarouf, A. R. Naseer. 258-265 [doi]
- A Novel Scheme for Traffic Monitoring in Optical Burst-Switched NetworksAmor Lazzez, Noureddine Boudriga, Mohammad S. Obaidat. 266-273 [doi]
- A New Class of Services for Mobile Devices using Bluetooth ConnectivityZahy Abou-Atme, Nabeel Sulieman, Leila El-Aawar, Zaher Dawy. 274-280 [doi]
- The Performance Evaluation of a Local Transaction Service in support of Juxtaposed CORBA ComponentsMohammad Ghaem Tajgardoon, Mohammad Hassan Tajgardoon. 281-284 [doi]
- A Novel Algorithm for Adaptive and Neutral Evolutionary Patterns Associated with HIV Drug ResistanceAli Al Mazari, Albert Y. Zomaya, M. Charleston, R. J. Garsia. 285-292 [doi]
- MA-GMA: A Mobile Agent-based Grid Monitor ArchitectureGuoqing Dong, Weiqin Tong. 293-300 [doi]
- High Level Modelling and Design For a Microthreaded Scheduler to Support MicrogridsNabil Hasasneh, Ian Bell, Chris R. Jesshope. 301-308 [doi]
- A Novel Algorithm to Extract Tri-Literal Arabic RootsMohanned Momani, Jamil Faraj. 309-315 [doi]
- Knowledge Versus Information ContentsFouad B. Chedid. 316-323 [doi]
- New Election Algorithm based on Assistant in Distributed SystemsMahdi Zargarnataj. 324-331 [doi]
- Terminal Mobility Services in the Middleware EnvironmentSyed Zubair Ahmad, Muhammad Abdul Qadir. 332-335 [doi]
- Multiple Sequence Alignment by Immune Artificial SystemAbdesslem Layeb, Abdel Hakim Deneche. 336-342 [doi]
- Simulation-Based Performance Evaluation of Deterministic Routing in Necklace HypercubesSina Meraji, Abbas Nayebi, Hamid Sarbazi-Azad. 343-350 [doi]
- An Intelligent Replication Framework for Data GridsAli Elghirani, Albert Y. Zomaya, Riky Subrata. 351-358 [doi]
- Encoding Algorithms for Logic SynthesisValery Sklyarov, Iouliia Skliarova. 359-366 [doi]
- The Maximum Common Subgraph Problem: Faster Solutions via Vertex CoverFaisal N. Abu-Khzam, Nagiza F. Samatova, Mohamad A. Rizk, Michael A. Langston. 367-373 [doi]
- Neuro-Fuzzy Systems Modeling Tools for Bacterial GrowthEmad A. El-Sebakhy, I. Raharja, S. Adem, Y. Khaeruzzaman. 374-380 [doi]
- Population Sizing Scheme for Genetic AlgorithmRose Al Qasim, Taisir Eldos. 381-384 [doi]
- Remote Monitoring of Vehicle Diagnostics and Location Using a Smart Box with Global Positioning System and General Packet Radio ServiceMajid A. Al-Taee, Omar B. Khader, Nabeel A. Al-Saber. 385-388 [doi]
- On Multi-Relational Data Mining for Foundation of Data MiningMiao Liu, Hai-Feng Guo, Zhengxin Chen. 389-395 [doi]
- Database Replication: AvailAbility aind Consistency Astsrance via Stream ProcessingMorteza Abbaszadeh Meinagh, Ayaz Isazadeh, Bager Zarei, Mehdi Zarei. 396-403 [doi]
- Quine-McCluskey ClassificationJavad Safaei, Hamid Beigy. 404-411 [doi]
- Caching Intermediate Results for Multiple-Query OptimizationAli-Asghar Safaeei, Mehran Kamali, Mostafa Haghjoo, Kamyar Izadi. 412-415 [doi]
- Data Mining - Redefining the BoundariesMalik Shahzad Kaleem Awan, Mian M. Awais. 416-423 [doi]
- FGC: An Efficient Constraint Based Frequent Set MinerRussel Pears, Sangeetha Kutty. 424-431 [doi]
- Mining Streaming Emerging Patterns from Streaming DataHamad Alhammady. 432-436 [doi]
- Weighted Naive Bayesian ClassifierHamad Alhammady. 437-441 [doi]
- Use of Rough Sets for the Identification and Analysis of Dependencies and Relationships in Biocontrol of WeedsMohamed T. Elhadi, Wojciech Ziarko. 442-449 [doi]
- XPLC: A Novel Protocol for Concurrency Control in XML DatabasesKamyar Izadi, Fatemeh Asadi, Mostfa S. Haghjoo. 450-453 [doi]
- Personalized Web Page Ranking Using Trust and SimilarityLara Srour, Ayman I. Kayssi, Ali Chehab. 454-457 [doi]
- Digital Library Framework for Arabic ManuscriptsWasfi G. Al-Khatib, S. A. Shahab, Sabri A. Mahmoud. 458-465 [doi]
- Floating-Point Matrix Product on FPGAFaycal Bensaali, Abbes Amira, Reza Sotudeh. 466-473 [doi]
- A New Design for 7: 2 CompressorsMahnoush Rouholamini, Omid Kavehie, Amir-Pasha Mirbaha, Somaye Jafarali Jasbi, Keivan Navi. 474-478 [doi]
- Reversible Barrel ShiftersSaeid Gorgin, Amir Kaivani. 479-483 [doi]
- Simulation of a Secure CPU with SecureTag Technique to Defend Embedded Systems Against Buffer Overflow AttacksMichael Georg Grasser, Johannes Priebsch, Georg Hofer, Thomas Hodanek. 484-491 [doi]
- A Methodology for the Formal Verification of RISC Microprocessors A Functional ApproachSalah Merniz, Mohamed Benmohammed. 492-499 [doi]
- System Level Voltage Scheduling Technique Using UML-RT ModelMohammad Hossein Neishaburi, Masoud Daneshtalab, Majid Nabi, Simak Mohammadi. 500-505 [doi]
- Automated Software Power Optimization for Smart Card Systems with Focus on Peak ReductionMatthias Grumer, Manuel Wendt, Christian Steger, Reinhold Weiss, Ulrich Neffe, Andreas Mühlberger. 506-512 [doi]
- Mapping and Performance Analysis of Lookup Table Implementations on Reconfigurable PlatformSohaib Majzoub, Hassan B. Diab. 513-520 [doi]
- Towards an Extension of Real-Time Java Supporting Several Multimedia ApplicationsM. Teresa Higuera-Toledano. 521-527 [doi]
- Improving Robustness of Real-Time Operating Systems (RTOS) Services Related to Soft-ErrorsMohammad Hossein Neishaburi, Masoud Daneshtalab, Mohammad Reza Kakoee, Saeed Safari. 528-534 [doi]
- Speech Unit Selection Based on Matching PursuitM. Hosseinpour, M. N. Ranjbar, M. Mousavinejad. 535-538 [doi]
- Software/Configware Implementation of Combinatorial AlgorithmsIouliia Skliarova, Valery Sklyarov. 539-546 [doi]
- Improving Inter-processor Data Transfer Rates over Industrial NetworksSyed Misbahuddin, Nizar Al-Holou. 547-553 [doi]
- An Exact Resource Constrained-Scheduler using Graph Coloring techniqueHadda Cherroun, Paul Feautrier. 554-561 [doi]
- Software Defined Radios: A Software GPS Receiver ExampleMohammad S. Sharawi, Oleksiy V. Korniyenko. 562-565 [doi]
- 3D GIS Modeling of BAU: Planning Prospective and Implementation AspectsNedal Al-Hanbali, Balqies Sadoun. 566-571 [doi]
- Three Dimensional (3D) GIS Modeling for High Buildings and ApplicationsBalqies Sadoun, Nedal Al-Hanbali. 572-577 [doi]
- LBS and GIS Technology Combination and ApplicationsBalqies Sadoun, Omar Al-Bayari. 578-583 [doi]
- Artificial Neural Networks vs Linear Regression in a Fluid Mechanics and Chemical Modelling Problem: Elimination of Hydrogen Sulphide in a Lab-Scale BiofilterGabriel Ibarra-Berastegi, Ana Elias, R. Arias, Astrid Barona. 584-587 [doi]
- AR Model Identification Using Higher Order StatisticsAdnan Al-Smadi. 588-591 [doi]
- Modeling the Communication Problem in Wireless Sensor Networks as a Vertex CoverMaytham Safar, Mohammad Taha, Sami Habib. 592-598 [doi]
- Robust Control Design for a Wind Turbine-Induction Generator UnitAlireza Khosravi, Aliakbar Jalali, Hamed Mojallali. 599-602 [doi]
- Removing the GSC Noise Reduction deficiencies in Reverberant Environments by Proposing Joint AEC-GSC algorithmPejman Mowlaee, Mahdi Orooji, Mohammad Hossein Kahaei. 603-610 [doi]
- SiMBCN: An Interactive Simulation Tool for Multihop Based Cellular NetworksSami Arayssi, Marc Akl, Sami Abou Saab, Zaher Dawy. 611-618 [doi]
- Modeling and Evaluation of Call Centers with GSPN ModelsMaryam Fanaeepour, Leila Naghavian, Mohammad Abdollahi Azgomi. 619-622 [doi]
- Loss rates bounds in IP buffers by Markov chains aggregationsHind Castel, Lynda Mokdad, Nihal Pekergin. 623-630 [doi]
- Performance Evaluation and Analytical Modeling of Novel Dynamic Call Admission Control Scheme for 3G and Beyond Cellular Wireless NetworksSalman AlQahtani, Ashraf S. Hasan Mahmoud, A. Alshanyour. 631-638 [doi]
- Mahak: A Test Collection for Evaluation of Farsi Information Retrieval SystemsKyumars Sheykh Esmaili, Hassan Abolhassani, Mahmood Neshati, Ehsan Behrangi, Asreen Rostami, Mojtaba Mohammadi Nasiri. 639-644 [doi]
- A Controlled Experiment to Investigate the Effect of Process Patterns on the Quality of Requirement AnalysisAhmad Estabraghy, Darren Dalcher. 645-649 [doi]
- Performance Evaluation of an Ultra-Fast Pipeline Scheduler for Next-Generation NetworksMuhammad T. Anan, Ghulam Chaudhry, Jihad Qaddour. 650-654 [doi]
- The Effect of Routing-Update Time on Network s PerformabilityMostafa Shaad Zolpirani, Mohammad-Mahdi Bidmeshki, Seyed Ghassem Miremadi. 655-658 [doi]
- A QoS Adaptive Multi-path Reinforcement Learning Routing Algorithm for MANETSaida Ziane, Abdelhamid Mellouk. 659-664 [doi]
- MRI Fuzzy Segmentation of Brain Tissue Using IFCM Algorithm with Genetic Algorithm OptimizationYouness Aliyari Ghassabeh, Nosratallah Forghani, Mohamad Forouzanfar, Mohammad Teshnehlab. 665-668 [doi]
- A Hierarchical Face Identification System Based on Facial ComponentsMehrtash Tafazzoli Harandi, Majid Nili Ahmadabadi, Babak Nadjar Araabi. 669-675 [doi]
- Robustness-Conserved Partially Host-Adaptive Watermarking Using a Baseband-Spread Spectrum Coding TechniqueAli E. Hameed, Majid A. Alwan. 676-683 [doi]
- A novel algorithm to fast mode decision with consideration about video texture in H.264Liquan Shen, Zhi Liu, Zhaoyang Zhang, Guozhong Wang. 684-687 [doi]
- A Novel Approach for Fingerprint Singular Points Detection Using 2D-WaveletAlireza Ahmadyfard, Masoud S. Nosrati. 688-691 [doi]
- Occlusion Handling for Object Tracking in Crowded Video Scenes Based on the Undecimated Wavelet FeaturesMohammad Khansari, Hamid R. Rabiee, M. Asadi, M. Ghanbari. 692-699 [doi]
- An effective model of stressing in an Arabic Text To Speech SystemZouhir Zemirli, Salima Khabet, M hamed Mosteghanem. 700-707 [doi]
- Video nature considerations for multi-frame selection algorithm in H.264Liquan Shen, Zhi Liu, Zhaoyang Zhang, Guozhong Wang. 708-711 [doi]
- License Processing: Recognizing Characters in License PlatesHasan R. Obeid, Rached N. Zantout. 712-716 [doi]
- Multiple Sclerosis Diagnosis Based on Analysis of Subbands of 2-D Wavelet Transform Applied on MR-imagesMeysam Torabi, Hassan Moradzadeh, Reza Vaziri, Reza Dehestani Ardekani, Emad Fatemizadeh. 717-721 [doi]
- Artificial Visual Cortical Responding Model in Image Semantic ProcessingZhiPing Xu, Shiyong Zhang, YiPing Zhong. 722-725 [doi]
- A Superior Low Complexity Rate Control AlgorithmAlireza Aminlou, Maryam Homayouni, Mohammad Hossein Neishaburi, Siamak Mohammadi. 726-729 [doi]
- Content-based Image Retrieval using Multiple Shape DescriptorsMuhammad Sarfraz, A. Ridha. 730-737 [doi]
- Off-Line Signature Verification of Bank Cheque Having Different Background ColorsJaved Ahmed Mahar, Mohammad Khalid Khan, Mumtaz Hussain Mahar. 738-745 [doi]
- Incorporating Knowledge into Unsupervised Model-Based Clustering for Satellite ImagesBilal Al Momani, Sally I. McClean, Philip J. Morrow. 746-753 [doi]
- A DCT-Based Watermarking Technique for Image AuthenticationMohamed Al Baloshi, Mohammed E. Al-Mualla. 754-760 [doi]
- Segmentation of Printed Farsi/Arabic WordsAli Broumandnia, Jamshid Shanbehzadeh, M. Nourani. 761-766 [doi]
- Handwritten Farsi/Arabic Word RecognitionAli Broumandnia, Jamshid Shanbehzadeh, M. Nourani. 767-771 [doi]
- Security Enhancement for Watermarking Technique Using Content based Image SegmentationM. A. Suhail, Mohammad S. Obaidat. 772-780 [doi]
- Neural Network Examination on Seismic Design Values in the Building Code of TaiwanTienfuan Kerh, J. S. Lai, D. Gunaratnam, R. Saunders. 781-785 [doi]
- A Study of ECG Characteristics by Using Wavelet and Neural NetworksMan-Sun Kim, HyungJeong Yang. 786-790 [doi]
- Diesel Engine Indicated Torque Estimation Based on Artificial Neural NetworksYahya H. Zweiri, Lakmal D. Seneviratne. 791-798 [doi]
- Seamless Secure Development of Systems: From Modeling to Enforcement of Access Control PoliciesSaeed Parsa, Morteza Damanafshan. 799-806 [doi]
- Trust-Based User-Role Assignment in Role-Based Access ControlHassan Takabi, Morteza Amini, Rasool Jalili. 807-814 [doi]
- How to Counter Control Flow Tampering AttacksMohsen Sharifi, Mohammad Zoroufi, Alireza Saberi. 815-818 [doi]
- On Optimal Firewall Rule OrderingEl-Sayed M. El-Alfy, Shokri Z. Selim. 819-824 [doi]
- Structuring a Multi-violation Detectors Database for an Efficient Intrusion DetectionAmel Meddeb-Makhlouf, Mohamed Hamdi, Noureddine Boudriga. 825-832 [doi]
- SmartSSL: Efficient Policy-Based Web SecurityCamille Gaspard, Batoul Haidar, Ayman I. Kayssi, Ali Chehab. 833-839 [doi]
- Sensor Activity Scheduling for Efficient WSN-based TrackingNejla Essaddi, Mohamed Hamdi, Noureddine Boudriga. 840-847 [doi]
- WordNet based Cross-Language Text CategorizationMohamed Amine Bentaallah, Mimoun Malki. 848-855 [doi]
- An Educational Asynchronous Learning EnvironmentAmar Balla. 856-859 [doi]
- Exploiting Model of Personality and Emotion of Learning Companion AgentTaihua Li, Yuhui Qiu, Peng Yue, Guoxiang Zhong. 860-865 [doi]
- HELP: A Recommender System to Locate Expertise in Organizational MemoriesEsma Aïmeur, Flavien Serge Mani Onana, Anita Saleman. 866-874 [doi]
- Developing Quality Games-based e-Learning SystemsKaterina Papanikolaou, Stephanos Mavromoustakos. 875-879 [doi]
- Defining OCL constraints for the Proxy Design Pattern ProfileNarayan C. Debnath, Ana Gabriela Garis, Daniel Riesco, German Montejano. 880-885 [doi]
- E-government Services Offerings Evaluation Using Continuous LogicNarayan C. Debnath, Aristides Dasso, Ana Funes, Robert Uzal, Jose Paganini. 886-892 [doi]
- HAODV: a New Routing Protocol to Support Interoperability in Heterogeneous MANETHaïdar Safa, Hassan Artail, Marcel Karam, Hala Ollaic, Rasha Abdallah. 893-900 [doi]
- An Abstract Workflow-Based Framework for Testing Composed Web ServicesMarcel Karam, Haïdar Safa, Hassan Artail. 901-908 [doi]
- Formal Design of a Parameterized Synchronization Component for Asynchronous Communication StreamsWalter Dosch. 909-916 [doi]
- Benchmarking XML-Schema Matching Algorithms for Improving Automated TuningMohamed Boukhebouze, Rami Rifaieh, Aïcha-Nabila Benharkat, Youssef Amghar. 917-925 [doi]
- A Performance Comparison of Contiguous Allocation Placement Schemes for 2D Mesh-connected MulticomputersIsmail Ababneh. 926-933 [doi]
- An Efficient Processor Allocation Strategy that Maintains a High Degree of Contiguity among Processors in 2D Mesh Connected MulticomputersSaad Bani-Mohammad, Mohamed Ould-Khaoua, Ismail Ababneh, Lewis M. Mackenzie. 934-941 [doi]
- Applications of Heterogeneous Computing in Hardware/Software Co-SchedulingProshanta Saha, Tarek A. El-Ghazawi. 942-949 [doi]