Abstract is missing.
- Reviewers [doi]
- General Chair s Message [doi]
- Six Sigma in Education: To Achieve Overall Excellence in the Field of EducationVarsha Hemant Patil, Snehal M. Kamlapur, Manikrao L. Dhore. 2-5 [doi]
- Hiring the IT Graduate: What s in the Box?Jacob R. Miller, Sandra Gorka, Barry M. Lunt, Joseph J. Ekstrom, Eydie Lawson, Han Reichgelt, Reza Kamali. 6-10 [doi]
- Implications of IT in Different ProfessionsInger Björkman, Ann Johansson. 11-19 [doi]
- Decoupling Security Concerns in Web Services Using AspectsGhita Kouadri Mostéfaoui, Zakaria Maamar, Nanjangud C. Narendra, Sattanathan Subramanian. 20-27 [doi]
- Integrated Collections: Approach to Software Component ReuseHisham M. Haddad. 28-33 [doi]
- An Agglomerative Clustering Methodology For Data ImputationSumanth Yenduri. 34-39 [doi]
- Cost Implications of Software Commonality and ReuseEugenio Capra, Chiara Francalanci. 40-45 [doi]
- On OO Design Consistency in Iterative DevelopmentUmesh Bellur, V. Vallieswaran. 46-51 [doi]
- Reliable Deployment of Component-based Applications into Distributed EnvironmentsAbbas Heydarnoori, Farhad Mavaddat. 52-57 [doi]
- Modular Model of a Logic Circuit Using Object-Oriented ProgrammingStefan Senczyna. 58-65 [doi]
- A Language for Writing Formal Software Specifications: The Library Problem RevisitedChia-Chu Chiang. 66-71 [doi]
- A First Draft of RATF: A Method Combining Robustness Analysis and Technology ForecastingGöran Calås, Andreas Boklund, Stefan Mankefors-Christiernin. 72-77 [doi]
- Studying Software Implementations of Elliptic Curve CryptographyHai Yan, Zhijie Jerry Shi. 78-83 [doi]
- Novel Approach for Remote Energy Meter Reading Using Mobile AgentsRadwan Tahboub, Vasile Lazarescu. 84-89 [doi]
- RL-Agent That Learns in Collaborative Virtual EnvironmentElhadi Shakshuki, Abdul Wasey Matin. 90-95 [doi]
- On History-Sensitive Models of Interactive StacksWalter Dosch. 96-103 [doi]
- New Algorithms For Random Access Text CompressionL. Robert, R. Nadarajan. 104-111 [doi]
- Integrating Non-Functional Properties to Architecture Specification and AnalysisShifeng Zhang. 112-117 [doi]
- Production and Maintenance of Content-Intensive Videogames: A Document-Oriented ApproachIván Martínez-Ortiz, Pablo Moreno-Ger, José Luis Sierra, Baltasar Fernández-Manjón. 118-123 [doi]
- Integrating Change Management with Software Document Relationship ManagementTien Nhut Nguyen. 124-130 [doi]
- Agent Launch Pattern for Creating AgentsElhadi Shakshuki, Omkarnath Prabhu. 131-136 [doi]
- The Legal and Political Aspects of Software Piracy in the Arab WorldSamir N. Hamade. 137-142 [doi]
- Degree of Freedom - Experience of Applying Software FrameworkWang-Chan Wong, Mohammad Eyadat, Shane Ng. 143-148 [doi]
- Rethinking ProgrammingW. M. Beynon, R. C. Boyatt, S. B. Russ. 149-154 [doi]
- Measurement of Intra-Class & Inter-Class Weakness for Object-Oriented SoftwareJitender Kumar Chhabra, K. K. Aggarwal. 155-160 [doi]
- An Investigation of Bad Smells in Object-Oriented DesignRaed Shatnawi, Wei Li. 161-165 [doi]
- Two-Party Private Vector Dominance: The All-Or-Nothing DealMaged Hamada Ibrahim. 166-171 [doi]
- Efficient Implementation of Galois Field Fixed Field Constant MultiplicationAdam J. Elbirt, Christof Paar. 172-177 [doi]
- Efficient Methods in Converting to Modulo 2^n+1 and 2^n-1Kooroush Manochehri, Saadat Pourmozafari, Babak Sadeghian. 178-185 [doi]
- Parallel Hardware Architectures for the Cryptographic Tate PairingGuido Bertoni, Luca Breveglieri, Pasqualina Fragneto, Gerardo Pelosi. 186-191 [doi]
- An Embedded Processor for a Pairing-Based CryptosystemRobert Ronan, Colm O Eigeartaigh, Colin C. Murphy, Michael Scott, Tim Kerins, William P. Marnane. 192-197 [doi]
- Efficient Authenticated Key-Exchange for Devices with a Trusted ManagerHe Ge, Stephen R. Tate. 198-203 [doi]
- Side-Channel Leakage Tolerant ArchitecturesKris Tiri, Patrick Schaumont, Ingrid Verbauwhede. 204-209 [doi]
- Four Hardware Implementations for the M-ary Modular ExponentiationNadia Nedjah, Luiza de Macedo Mourelle. 210-215 [doi]
- A Compact Piplined Hardware Implementation of the AES-128 CipherNadia Nedjah, Luiza de Macedo Mourelle, Marco Paulo Cardoso. 216-221 [doi]
- K-Selector-Based Dispatching Algorithm for Clos-Network SwitchesMei Yang, Mayauna McCullough, Yingtao Jiang, Jun Zheng. 222-226 [doi]
- Instruction Format Based Selective Execution for Register Port Complexity Reduction in High-Performance ProcessorsRama Sangireddy. 227-232 [doi]
- Evaluating Parallel Computing Systems in BioinformaticsErik S. Gough, Michael D. Kane. 233-238 [doi]
- RDT Properties and EvaluationsYulu Yang, Yang Yu. 239-244 [doi]
- VMSIM: Virtual Machine Based a Full System Simulation Platform for Microprocessors Functional VerificationJianfeng An, Xiaoya Fan, Shengbing Zhang, Danghui Wang, Yi Wang. 245-249 [doi]
- A Reconfigurable Architecture for Wireless Communication SystemsHooman Parizi, Afshin Niktash, Amir Hosein Kamalizad, Nader Bagherzadeh. 250-255 [doi]
- Data Aggregation in Distributed Sensor Networks: Towards An Adaptive Timing ControlFei Hu, Carter May, Xiaojun Cao. 256-261 [doi]
- COSEN: A Chain Oriented Sensor Network for Efficient Data CollectionNahdia Tabassum, Quazi Ehsanul Kabir Mamun, Yoshiyori Urano. 262-267 [doi]
- Interference Aware Dominating Set for Sensor NetworkLaxmi Gewali, Khursheed Mohamad, Min Tun. 268-273 [doi]
- Improved Maximum Likelihood Estimation of Target Position in Wireless Sensor Networks using Particle Swarm OptimizationMathew M. Noel, Parag P. Joshi, Thomas C. Jannett. 274-279 [doi]
- Efficient RBS in Sensor NetworksHyojung Lee, Wonpil Yu, Youngmi Kwon. 279-284 [doi]
- Reliable Multipath Information Dissemination via Label Forwarding in Wireless Sensor NetworksVasu Jolly, Naoto Kimura, Shahram Latifi. 285-293 [doi]
- Mobile Terminated SMS Billing - Exploits and Security AnalysisPhilip Garner, Ian Mullins, Reuben Edwards, Paul Coulton. 294-299 [doi]
- SmartDOTS - A Framework for Efficient Data Synchronization on Mobile DevicesWerner Kurschl, Stefan Mitsch, Rene Prokop. 300-305 [doi]
- MARKS (Middleware Adaptability for Resource Discovery, Knowledge Usability and Self-healing) for Mobile Devices of Pervasive Computing EnvironmentsMoushumi Sharmin, Shameem Ahmed, Sheikh Iqbal Ahamed. 306-313 [doi]
- Consumer Value Segments in Mobile Bill PayingTommi Laukkanen, Teuvo Kantanen. 314-319 [doi]
- Government as a Mobile Enterprise: Real-time, Ubiquitous GovernmentTarek El Kiki, Elaine Lawrence. 320-327 [doi]
- SelectiveDES: A Distributed Event Service Add-On for Invocation-Based Middleware supporting Selective Multi-Channel Communication and Notification DeliveryWerner Kurschl, Stefan Mitsch, Rene Prokop. 328-333 [doi]
- Internet Mobility using SIP and MIPAbdul Nasir, Mah-Rukh. 334-339 [doi]
- A Dynamic Mobility Management Scheme for VoIP ServicesEunjung Lee, Jinsuk Baek, Shou-Hsuan Stephen Huang. 340-345 [doi]
- Mobile Payment Solution - Symbiosis Between Banks, Application Service Providers and Mobile NetworkOperatorsNatali Delic, Ana Vukasinovic. 346-350 [doi]
- Secure ICT Services for Mobile and Wireless Communications: A Federated Global Identity Management FrameworkJawed I. A. Siddiqi, Babak Akhgar, Mehrdad Naderi, Wolfgang Orth, Norbert Meyer, Miika Tuisku, Gregor Pipan, Mario López Gallego, José Alberto García, Maurizio Cecchi, Jean-Noel Colin. 351-357 [doi]
- Using the Web to Construct Taxonomy for a Heterogeneous Community of PracticeIsak Taksa, Amanda Spink. 358-363 [doi]
- Feature and Prototype Evolution for Nearest Neighbor Classification of Web DocumentsMichelle Cheatham, Mateen M. Rizki. 364-369 [doi]
- Overlap Among Major Web Search EnginesAmanda Spink, Bernard J. Jansen, Chris Blakely, Sherry Koshman. 370-374 [doi]
- A General Classification of (Search) Queries and TermsNadine Schmidt-Maenz, Martina Koch. 375-381 [doi]
- An Automated WSDL Generation and Enhanced SOAP Message Processing System for Mobile Web ServicesGil Cheol Park, Seoksoo Kim, Gun Tae Bae, Yang Sok Kim, Byeong Ho Kang. 382-387 [doi]
- Web Page Recommender System based on Folksonomy Mining for ITNG 06 SubmissionsSatoshi Niwa, Takuo Doi, Shinichi Honiden. 388-393 [doi]
- A Study of Self-Organizing Map in Interactive Relevance FeedbackDaqing He. 394-401 [doi]
- Group Key Management in Wireless Networks Using Session KeysDhilak Damodaran, Rohit Singh, Phu Dung Le. 402-407 [doi]
- Anomaly Detection in SMTP TrafficHao Luo, Binxing Fang, Xiao-chun Yun. 408-413 [doi]
- A Secure Group Key Management Scheme for Wireless Cellular NetworksHwa Young Um, Edward J. Delp. 414-419 [doi]
- Anomaly Detection Based Intrusion DetectionDima Novikov, Roman V. Yampolskiy, Leon Reznik. 420-425 [doi]
- Secure Two-Way Transfer of Measurement DataMarko Hassinen, Maija Marttila-Kontio, Mikko Saesmaa, Heli Tervo. 426-431 [doi]
- Efficient Group Key Management in Wireless NetworksYiling Wang, Dhilak Damodaran, Phu Dung Le. 432-439 [doi]
- New Method for Risk Management in CRM Security ManagementMahdi Seify. 440-445 [doi]
- Intelligent Technologies for Managing Fraud and Identity TheftRanjit Bose. 446-451 [doi]
- Analysis of Log Files Intersections for Security EnhancementKazimierz Kowalski, Mohsen Beheshti. 452-457 [doi]
- The Design and Implementation of a Smartphone Payment System based on Limited-used Key Generation SchemeXianping Wu, Osama Dandash, Phu Dung Le. 458-463 [doi]
- Sequential and Parallel Cascaded Convolutional Encryption with Local Propagation: Toward Future Directions in Symmetric CryptographyDragos Trinca. 464-469 [doi]
- A Study on the Security of Privacy HomomorphismYu Yu, Jussipekka Leiwo, Benjamin Premkumar. 470-475 [doi]
- An Efficient and Secure Code Sharing for Peer-to-Peer CommunicationsWei Wu, Phu Dung Le. 476-481 [doi]
- A Copyright Protection Scheme for Gray-Level Images Using Human FingerprintShang-Lin Hsieh, Hsuan-Chieh Huang, I-Ju Tsai. 482-489 [doi]
- Mining Documents in a Small Enterprise Using WordStatE. Udoh, J. Rhoades. 490-494 [doi]
- Web Usability Testing - CARE MethodologyArthi Anandhan, Senthil Dhandapani, Hassan Reza, Karthik Namasivayam. 495-500 [doi]
- A Hybrid Approach to Error Reduction of Support Vector Machines in Document ClassificationYoon-Shik Tae, Jeong Woo Son, Mi-hwa Kong, Jun-Seok Lee, Seong-Bae Park, Sang-Jo Lee. 501-506 [doi]
- Knowledge Discovery in Power Quality Data Using Support Vector Machine and S-TransformK. Vivek, M. Gopa, B. K. Panigrahi. 507-512 [doi]
- Closed Multidimensional Sequential Pattern MiningPanida Songram, Veera Boonjing, Sarun Intakosum. 512-517 [doi]
- A Two-Phase Time-based Consistent Checkpointing StrategyChaoguang Men, Yunlong Zhao, Wenbin Yao. 518-523 [doi]
- Adding High Level VoIP Facilities to the Unicon LanguageZiad Al-Sharif, Clinton Jeffery. 524-529 [doi]
- A Peer to Peer Prefix Patching Scheme for VOD ServersChi Hun Lee, Yi Qi Gui, In Bum Jung, Chang Yeol Choi, Hwang Kyu Choi. 530-534 [doi]
- Bandwidth-Conserving Real-Time VoIP Teleconference SystemTeck-Kuen Chua, David C. Pheanis. 535-540 [doi]
- An Improved Feature Selection using Maximized Signal to Noise Ratio Technique for TCK. Lakshmi, Saswati Mukherjee. 541-546 [doi]
- Mixed Noise Correction in Gray Images using Fuzzy FiltersMadasu Hanmandlu, Anuj K. Tiwari, Vamsi Krishna Madasu, Shantaram Vasikarla. 547-553 [doi]
- Parameterized FIR Filtering IP Cores for Reusable SoC DesignUmar Farooq, Muhammad Saleem, Habibullah Jamal. 554-559 [doi]
- A New Bucket-Based A New Bucket-Based Algorithm for Finding LCS from two given Molecular SequencesS. A. M. Rizvi, Pankaj Agarwal. 560-561 [doi]
- Performance-Guided Reconfiguration of Wireless Sensor Networks that Use Binary Data for Target LocalizationParag P. Joshi, Thomas C. Jannett. 562-565 [doi]
- Key Pre-Distribution Using MDS Codes in Mobile Ad Hoc NetworksMohammad Al-Shurman, Seong-Moo Yoo. 566-567 [doi]
- Key Management and Mutual Authentication for Multiple Field Records Smart CardsKiarash Narimani, Gordon B. Agnew. 568-569 [doi]
- Effectively implement AES for EFI/Tiano based on IA-32 PlatformTianzhou Chen, Zhenjie He, Wei Hu. 570 [doi]
- FPGA based DPA-resistant Unified Architecture for SigncryptionYi Wang, Jussipekka Leiwo, Thambipillai Srikanthan, Yu Yu. 571-572 [doi]
- ECC Hardware Coprocessors for 8-bit Systems and Power Consumption ConsiderationsGuido Bertoni, Luca Breveglieri, Matteo Venturi. 573-574 [doi]
- DES Decoding Using FPGA and Custom InstructionsTai-Chi Lee, Richard Zeien, Adam Roach, Patrick Robinson. 575-577 [doi]
- A Comparative Study of Performance Measures for Information Retrieval SystemsXiannong Meng. 578-579 [doi]
- Automatically Classify Web Sites by Multimembership Bayesian ApproachSsu-An Lo, Chong-Yen Lee, Chun-Chieh Hsu. 580-583 [doi]
- Express Risk Assessment through Web Access to Simulation DataAndrei Smirnov, Steven Rowan. 584-585 [doi]
- Contextual Events Framework in RFID SystemMikyeong Moon, Youngbong Kim, Keunhyuk Yeom. 586-587 [doi]
- Dynamic Role Assignment Protocol for Pervasive ComputingAkio Sashima, Noriaki Izumi, Koichi Kurumatani, Yoshiyuki Kotani. 588-589 [doi]
- SpamCooker: A Method for Deterring Unsolicited Electronic CommunicationsNathan Denny, Theodore Elhourani, Jaime Denny, Scott Bissmeyer, David Irby. 590-591 [doi]
- Storage of a Portal-Extracted Data in a Relational DatabaseE. Udoh, J. Hoover. 592-594 [doi]
- Parallel Algorithm for Run Length EncodingNikolay Manchev. 595-596 [doi]
- A Wide-Band Digital Phase-Locked LooopShilpa Ambarish, Mahmoud Fawzy Wagdy. 597-598 [doi]
- Design of a 1GHz Digital PLL Using 0.18/mu m CMOS TechnologyHaripriya Janardhan, Mahmoud Fawzy Wagdy. 599-600 [doi]
- Intelligent Medical Search Engine by Knowledge MachineNarongrit Waraporn, Syed V. Ahamed. 601-605 [doi]
- Biomedical Term Disambiguation: An Application to Gene-Protein Name DisambiguationHisham Al-Mubaid, Ping Chen. 606-612 [doi]
- Development of an Integrated Framework for Protein Structure Determinations: A Logical Data Model for NMR Data AnalysisHeidi J. C. Ellis, Susan Fox-Erlich, Timothy O. Martyn, Michael R. Gryk. 613-618 [doi]
- Diabetic e-Management System (DEMS)Kyle D. Lutes, Ibrahim M. Baggili. 619-624 [doi]
- Similarity Analysis of Bone Mineral Density Measurements of Femur Sites Using DendrogramRay R. Hashemi, Alexander A. Tyler, Christopher Childers, Arthur Chausmer. 625-630 [doi]
- A Decentralized Network Coordinate System for Robust Internet DistanceLi-wei Lehman, Steven Lerman. 631-637 [doi]
- Internet Accessing for IPv6 MANETsYunlong Zhao, Chaoguang Men, Nianmin Yao. 638-645 [doi]
- Adaptable Replica Consistency Service for Data GridsRuay Shiung Chang, Jih-Sheng Chang. 646-651 [doi]
- The Role of Collaboration Grids in the Roadmaps of Networked OrganizationsZiga Turk, Matevz Dolenc, Etiel Petrinja. 652-657 [doi]
- A Formal Specification of Interaction Widgets Hierarchy FrameworkL. J. Wang, A. S. M. Sajeev, Lachana Inchaiwong. 658-664 [doi]
- On the Security of a Repaired Mental Poker ProtocolJordi Castellà-Roca, Josep Domingo-Ferrer, Francesc Sebé. 664-668 [doi]
- Boosting Blackjack Returns with Machine Learned Betting CriteriaRon Coleman. 669-673 [doi]
- Korean Text Chunk Identification Using Support Vector MachinesSang-Soo Kim, Jeong Woo Son, Mi-hwa Kong, Seong-Bae Park, Sang-Jo Lee. 674-679 [doi]
- Abstract Node Method for Integration of Object Oriented Design with Colored Petri NetsBhushan Bauskar, Boleslaw Mikolajczak. 680-687 [doi]
- Modeling and Simulation of Virtual Warfare Using Virtual Reality ParadigmSaurabh Mukherjee, Shashikala Tapas. 688-689 [doi]
- A Performance Analysis of an Object-Oriented ProcessorYi Yu, Man Lo Kai, Anthony S. Fong. 690-694 [doi]
- Utilizing XML Schema for Describing and Querying Still Image DatabasesKazem Taghva, Min Xu, Emma Regentova, Tom Nartker. 695-700 [doi]
- ISRUP E-Service Framework for agile Enterprise ArchitectingSeyyed Mohsen Hashemi, Mohammadreza Razzazi, Ali Bahrami. 701-706 [doi]
- Development of a Synthetic Data Set Generator for Building and Testing Information Discovery SystemsPengyue J. Lin, Behrokh Samadi, Alan Cipolone, Daniel R. Jeske, Sean Cox, Carlos Rendón, Douglas Holt, Rui Xiao. 707-712 [doi]
- A Proposed Platform & Performance Estimation of Digital-Home Service Delivery/Management SystemsIl-Woo Lee, Ho-Jin Park, Kwang-Roh Park, Sang-Ha Kim. 713-719 [doi]
- Baseline Profile Stability for Network Anomaly DetectionYoohwan Kim, Ju-Yeon Jo, Kyunghee Kim Suh. 720-725 [doi]
- Middleware as an Infrastructure for Network ApplicationsBasim Alhadidi. 726-729 [doi]
- Traffic Congestion Controller in Multihop Communication NetworkTan Ee Xion, Hiew Pang Leang. 730-735 [doi]
- Optimizing Network Data TransmissionE. Earl Eiland, Lorie M. Liebrock. 735-741 [doi]
- A Fast-Locking Digital Phase-Locked LoopMahmoud Fawzy Wagdy, Srishti Vaishnava. 742-746 [doi]
- Nano Logic Circuits with Spin Wave BusAlexander Khitun, Kang L. Wang. 747-752 [doi]