Proceedings of the
2009 Sixth International Conference on Information Technology: New Generations
27 - 29 April 2009 / Las Vegas, Nevada, USA
Los Alamitos, California
Washington • Tokyo
2009 Sixth InternationalConference on Information
Technology: New Generations
ITNG 2009Table of Contents
Conference Information
CIRCUIT & SYSTEM DESIGN
Design Simulation of Top ITO Gratings to Improve Light Transmission
for Gallium Nitride LEDs ...........................................................................................................................................1
Xiaomin Jin, Simeon Trieu, Fei Wang, Bei Zhang, Tao Dai, Xiangning Kang,
and Guoyi Zhang
Non-volatile Memory Devices Based on Chalcogenide Materials ......................................................................5
Fei Wang and Xiaolong Wu
Dedicated Hardware for Ant Colony Optimization Using Distributed Memory .............................................10
Masaya Yoshikawa and Hidekazu Terai
A Novel Approach to Scan Detection on the Backbone ......................................................................................16
Yu Zhang and Binxing Fang
A Remote Sensing Image Segmentation Method Based on Spectral
and Texture Information Fusion ..............................................................................................................................22
Xing Xie, Mengliang Liu, Leiguang Wang, and Qianqin Qin
A Novel Biological Recognition Method Based on Cranio-maxillo-facial
Feature Information ...................................................................................................................................................28
Liwen Huang, Jing Yang, Xiaolong Wu, and Xiaoqian Hu
Classification of Quaternary [21s + 4,3] Optimal Self-orthogonal Codes ........................................................33
Xuejun Zhao, Ruihu Li, and Yingjie Lei
Low Power Ambient Energy Harvesting, Conversion, and Storage Circuits ...................................................35
Faruk Yildiz
Dynamic Single-Row Routing Technique for Channel Assignments ...............................................................41
Shaharuddin Salleh and Nor Haniza Sarmin
A Novel Flash Fast-Locking Digital Phase-Locked Loop ..................................................................................47
Mahmoud Fawzy Wagdy and Brandon Casey Cabrales
A DPA-Resistant Digit-Parallel Modular Multiplier over GF (2m) ..................................................................53
Jianping Quan and Guoqiang Bai
A New Method to Reduce the Side-Channel Leakage Caused by Unbalanced
Capacitances of Differential Interconnections in Dual-Rail Logic Styles ........................................................58
Jianping Quan and Guoqiang Bai
Computational Modeling of Cell Survival/ Death Using MATLAB Simulator ..............................................64
Shruti Jain, P.K. Naik, D.S. Chauhan, and Rohit Sharma
Using a Supercapacitor to Power Wireless Nodes from a Low Power Source
such as a 3V Button Battery .....................................................................................................................................69
Pierre Mars and Dave McIntosh
A Novel EKF-GPS Algorithm for Bridge Deformation Monitoring System ...................................................79
Jing Yang, Yongquan Wang, Min He, Fei Wang, and Xiaolong Wu
Implementation of Different Function Units Using Flexible
and Reconfigurable Architecture .............................................................................................................................84
Chao-Jang Hwang, Chih-Tung Lin, and Shi-Jinn Horng
A High-Performance Architecture of an XML Processor for SIP-Based
Presence .......................................................................................................................................................................90
Fadi El-Hassan, Raymond Peterkin, Mohamed Abou-Gabal, and Dan Ionescu
Processor Allocation Problem for NoC-Based Chip Multiprocessors ...............................................................96
Dawid Zydek and Henry Selvaraj
A Novel DDFS Based on Trigonometric Approximation with a Scaling Block ...........................................102
Farhad Babak and Parviz Keshavarzi
INFORMATION SYSTEMS & INTERNET TECHNOLOGY
The Two-Level-Turn-Model Fault-Tolerant Routing Scheme in Tori
with Convex and Concave Faults ..........................................................................................................................107
Lingfu Xie and Du Xu
Generating Rule-Based Executable Process Models for Service Outsourcing ..............................................114
Jae-Yoon Jung
Integrating Amazonic Heterogeneous Hydrometeorological Databases .........................................................119
Gláucia Braga e Silva, Breno Lisi Romano, Henrique Fernandes de Campos,
Ricardo Godoi Vieira, Adilson Marques da Cunha, and Luiz Alberto Vieira Dias
Lessons Learned from a Survey of Web Applications Testing ........................................................................125
Ben Kam and Thomas R. Dean
Formalizing the Management Automation with Workflow of Software
Development Process Based on the SPEM Activities View .............................................................................131
Daniel Riesco, German Montejano, Narayan Debnath, and Manuel Perez Cota
SOFTWARE PROJECTS FINANCE SUPPORT: Preliminary Talks
between Software Project Managers and Potential Investors ...........................................................................137
Roberto Uzal, Narayan Debnath, D. Riesco, and German Montejano
vivi
An Information Retrieval Model for the Semantic Web ...................................................................................143
Fabio Augusto de Santana Silva, Maria del Rosario Girardi, and Lucas Rego Drumond
A New Algorithm for Frequent Itemset Generation in Non-Binary Search
Space ..........................................................................................................................................................................149
G. Praveen Kumar, Anirban Sarkar, and Narayan C. Debnath
A Further Improvement on a Genetic Algorithm ...............................................................................................154
Ian Stewart, Wenying Feng, and Selim Akl
Google Scholar’s Ranking Algorithm: The Impact of Articles’ Age (An
Empirical Study) ......................................................................................................................................................160
Jöran Beel and Bela Gipp
A Novel Method Combining ORESTE, Fuzzy Set Theory, and TOPSIS
Method for Ranking the Information and Communication Technology
Research Centers of Iran .........................................................................................................................................165
Mehdi Fasanghari, Maryam Mohamedpour, and Mohammad Amin Mohamedpour
Comparison of QOS Fixed and Limited Interleaved Polling with Cyclic
Demand Proportionality Algorithms ....................................................................................................................171
Sadeta Krijestorac and Jonathan Bagby
AI APPLICATIONS
Improving Job Scheduling in GRID Environments with Use of Simple
Machine Learning Methods ...................................................................................................................................177
Daniel Vladušic, Aleš Cernivec, and Boštjan Slivnik
Tabu Search for Parallel Machine Scheduling with Job Splitting ....................................................................183
Cenk Çelik and Inci Saricicek
Scheduling Algorithm for On-Demand Bus System ..........................................................................................189
Kota Tsubouchi, Kazuo Hiekata, and Hiroyuki Yamato
SOFTWARE ENGINEERING
The Explore of the Law Role in Software Requirements Engineering ...........................................................195
Xinhao Ji
Clustering and Metrics Thresholds Based Software Fault Prediction
of Unlabeled Program Modules .............................................................................................................................199
Cagatay Catal, Ugur Sevim, and Banu Diri
Managing Post-Development Fault Removal .....................................................................................................205
Suzanna Schmeelk, Bill Mills, and Robert Noonan
TransCPN - Software Tool for Transformation of Colored Petri Nets ...........................................................211
Boleslaw Mikolajczak and Abhishek Singh
Two New Algorithms for Software Watermarking by Register Allocation
and their Empirical Evaluation ..............................................................................................................................217
Hakun Lee and Keiichi Kaneko
viivii
An Aspect-Based Approach to Checking Design Constraints at Run-Time ..................................................223
Yoonsik Cheon, Carmen Avila, Steve Roach, Cuauhtemoc Munoz, Neith Estrada,
Valeria Fierro, and Jessica Romo
Evaluating Test-Driven Development in an Industry-Sponsored Capstone
Project ........................................................................................................................................................................229
John Huan Vu, Niklas Frojd, Clay Shenkel-Therolf, and David S. Janzen
Security Vulnerabilities and Mitigation Strategies for Application
Development .............................................................................................................................................................235
Brunil Dalila Romero Mariño and Hisham M. Haddad
An Agent-Oriented Source-Level Debugger on Top of a Monitoring
Framework ................................................................................................................................................................241
Ziad AL-Sharif and Clinton Jeffery
Component-Based Software Architecture Design for Network Intrusion
Detection and Prevention System .........................................................................................................................248
Jianchao Han, Mohsen Beheshti, Kazimierz Kowalski, Joel Ortiz, and Johnly Tomelden
Security Estimation Framework: Design Phase Perspective .............................................................................254
Shalini Chandra, Raees Ahmad Khan, and Alka Agrawal
Software Engineering Challenges in Game Development ................................................................................260
Christopher M. Kanode and Hisham M. Haddad
A Comparison between Relational and Operational QVT Mappings .............................................................266
Pavle Guduric, Arno Puder, and Rainer Todtenhoefer
Early Studies in Acquiring Evidentiary, Reusable Business Process Models
for Legal Compliance ..............................................................................................................................................272
Travis D. Breaux and Calvin Powers
Citation Analysis: An Approach for Facilitating the Understanding and
the Analysis of Regulatory Compliance Documents .........................................................................................278
Abdelwahab Hamou-Lhadj and Mohammad Hamdaqa
An Eclipse Plugin for the Automated Reverse-Engineering of Software
Programs ...................................................................................................................................................................284
Philippe Dugerdil, David Kony, and Javier Belmonte
SERVICE-ORIENTED COMPUTING & APPLICATIONS
A Method for Service Oriented Design ................................................................................................................290
Sedighe Moosavi, Mir Ali Seyyedi, and Nasrollah Moghadam
Highly-Available Web Service Community ........................................................................................................296
Sattanathan Subramanian
Towards a Goal-Based Service Framework for Dynamic Service Discovery
and Composition ......................................................................................................................................................302
Luiz Olavo Bonino da Silva Santos, Eduardo Goncalves da Silva, Luis Ferreira Pires,
and Marten van Sinderen
viiiviii
Healthcare Applications Interoperability through Implementation of HL7 Web
Service Basic Profile ...............................................................................................................................................308
Maqbool Hussain, Muhammad Afzal, H. Farooq Ahmad, Naeem Khalid, and Arshad Ali
An Analysis of Business Models of Web 2.0 Application ................................................................................314
Shari S.C. Shang, Ya-Ling Wu, and Oliver C.L. Hou
A Secure Billing Protocol for Grid Computing ..................................................................................................320
Chia-Hui Wei, Yeo-Hao Chin, and Chun-Ta Li
A Heuristic Model of Network-Based Group Decision Making for E-Services ............................................326
Wei-Lun Chang, Yi-Ping Lo, and Yu-Ting Hong
Cross-Organizational Service Evolution Management ......................................................................................332
Odorico von Susani and Philippe Dugerdil
Obstacle Avoidance for Utility-Based Geocasting .............................................................................................338
Fernando J. Maymi and Manuel Rodriguez-Martinez
INFORMATION SECURITY & PRIVACY
Leveraging Parent Mitigations and Threats for CAPEC-Driven Hierarchies ................................................344
Patrick H. Engebretson and Joshua J. Pauli
A Multi-Signature Scheme Based on Two Difficult Mathematics Problems .................................................350
Bin Sun, Wang Chuan, Jiang Li, and Legand Burge
The Design of Boolean Functions by Modified Hill Climbing Method .........................................................356
Yuriy Izbenko, Vladislav Kovtun, and Alexandr Kuznetsov
Construction of Anti-Collusion Codes Based on Cover-Free Families ..........................................................362
Qiaoliang Li, Xiaoming Wang, Yingshu Li, Yi Pan, and Pingzhi Fan
A Robust Audio Aggregate Zero-Watermark Algorithm ..................................................................................366
Yiqun Xiong and Rangding Wang
Attacks on a Block Based SVD Watermarking Scheme ...................................................................................371
Huo-Chong Ling, Swee-Huay Heng, and Bok-Min Goi
A New Steganography Scheme Based on an Index-Color Image ....................................................................376
Se-Min Kim, Ziqiang Cheng, and Kee-Young Yoo
A Peer-to-Peer Federated Authentication System ..............................................................................................382
Myong Kang and Amitabh Khashnobish
A Novel Method-Based Software Watermarking Scheme ................................................................................388
Zhu Jianqi, Liu YanHeng, Yin Ke, and Yin KeXin
Automated Risk and Utility Management ...........................................................................................................393
Andreas Ekelhart, Thomas Neubauer, and Stefan Fenz
An Authentication System Based on Palmprint ..................................................................................................399
Hanmandlu Madasu, H.M.Gupta, Neha Mittal, and Shantaram Vasikarla
An Anti-Phishing Approach that Uses Training Intervention for Phishing
Websites Detection ..................................................................................................................................................405
Abdullah Alnajim and Malcolm Munro
Evaluation of Two Privacy-Preserving Protocols for the DNS ........................................................................411
Sergio Castillo-Perez and Joaquin Garcia-Alfaro
ixix
Efficient Short Signatures from Pairing ...............................................................................................................417
Raylin Tso, Takeshi Okamoto, and Eiji Okamoto
Security in Wireless Mesh Networks: Challenges and Solutions ....................................................................423
Ping Yi, Tianhao Tong, Ning Liu, Yue Wu, and Jianqing Ma
T-PIM: Trusted Password Input Method against Data Stealing Malware ......................................................429
Manabu Hirano, Tomohiro Umeda, Takeshi Okuda, Eiji Kawai, and Suguru Yamaguchi
Federated Authentication Mechanism using Cellular Phone - Collaboration
with OpenID .............................................................................................................................................................435
Ryu Watanabe and Toshiaki Tanaka
Bisimulations in the Boxed Safe Ambients with Password ..............................................................................443
Jiang Hua and Tan Xinxing
A Verifiable Electronic Voting Scheme over the Internet ................................................................................449
Chun-Ta Li, Min-Shiang Hwang, and Yan-Chi Lai
Practical Power Analysis Attacks to RSA on a Large IP Portfolio SoC .........................................................455
Guido Marco Bertoni, Luca Breveglieri, Alessandro Cominola, Filippo Melzani,
and Ruggero Susella
Extending l-Diversity for Better Data Anonymization ......................................................................................461
Hongwei Tian and Weining Zhang
Component Based Information Network for Computer Security .....................................................................467
Joel Ortiz, Johnly Tomelden, Mohsen Beheshti, Kazimierz Kowalski, and Jianchao Han
Message Encryption Scheme Using Cheating Text ...........................................................................................470
Ch. Rupa and P.S. Avadhani
Optimal Network Security Strengthening Using Attack-Defense Game Model ...........................................475
Wei Jiang, Bin-xing Fang, Hong-li Zhang, Zhi-hong Tian, and Xin-fang Song
Deception Detection Based on SVM for Chinese Text in CMC ......................................................................481
Hu Zhang, Shan-de Wei, Hong-ye Tan, and Jia-heng Zheng
An Efficient and Reliable Time Variant Three-Entity and Data Authentication
of Remote User Using Smart card ........................................................................................................................487
C. Koner, C.T. Bhunia, and U. Maulik
Multi-Layered Defense against Web Application Attacks ................................................................................492
Abdul Razzaq, Ali Hur, Nasir Haider, and Farooq Ahmad
An Efficient PRNG Based on the Hybrid between One- and Two-Dimensional
Cellular Automata ....................................................................................................................................................498
Sang-Ho Shin and Kee-Young Yoo
Authenticated Dictionary-Based Attribute Sharing in Federated Identity
Management .............................................................................................................................................................504
Dongwan Shin, Rodrigo Lopes, and William Claycomb
xx
NETWORKING & WIRELESS COMMUNICATIONS
Application of Game Theory for Cross-layer Design in Cognitive Wireless
Networks ...................................................................................................................................................................510
Y.B. Reddy and Cliff Bullmaster
Reconfigurable Relaying Topology in Cognitive Multihop Wireless Networks
with Nonuniform Temporal and Spatial Traffic Distribution ...........................................................................516
Beatriz Lorenzo and Savo Glisic
A Distributed Coverage-Aware Sleep Scheduling Algorithm for Wireless
Sensor Networks ......................................................................................................................................................524
Fangyang Shen, Chunlei Liu, and Jun Zhang
Radiation Emission EMC Measurement in Real-Time ......................................................................................528
Fahim G. Awan, Noor M. Sheikh, and Fawad Munir
Mitagation against MAI in a Space Time Spreading Software Defined Radio
Test Bed ....................................................................................................................................................................534
Shinhan Wee, Montse Ros, and Peter James Vial
Outage Behavior of Multi-Antenna Multi-Relay Non-Regenerative
Cooperative Networks .............................................................................................................................................541
Ning Liu, Jianhua Li, Ping Yi, Jianing Li, and Yue Wu
Evaluation of Energy Consumption and Network Lifetime in Rectangular
Ad-hoc Wireless Networks ....................................................................................................................................546
Wei Feng, Hamada Alshaer, and Jaafar M.H. Elmirghani
Cross-Layer Design Approach for Wireless Networks to Improve
the Performance .......................................................................................................................................................552
Nikema Smith, Yenumula B. Reddy, and Nandigam Gajendar
An Empirical Study for Protecting Passive RFID Systems against Cloning ..................................................558
Mostafa M. El-Said and Ira Woodring
Fault-Tolerant Maximal Local-Connectivity on the Bubble-Sort Graphs ......................................................564
Lun-Min Shih and Jimmy J.M. Tan
Implementation of Header Compression in 3GPP LTE ....................................................................................570
Devishree Naidu and Rakhi Tapadiya
SENSOR NETWORKS
A Service-Oriented Middleware for Wireless Sensor and Actor Networks ...................................................575
Eduardo Cañete, Jaime Chen, Manuel Díaz, Luis Llopis, and Bartolomé Rubio
An Online Multipath Routing Algorithm for Maximizing Lifetime in Wireless
Sensor Networks ......................................................................................................................................................581
Mahmood R. Minhas, Sathish Gopalakrishnan, and Victor C.M. Leung
Micro T-Kernel: A Low Power and Small Footprint RTOS for Networked
Tiny Devices .............................................................................................................................................................587
Masato Kamio, Keiichi Nakamura, Shinsuke Kobayashi, Noboru Koshizuka,
and Ken Sakamura
xixi
Estimation Method for Total Nitrogen and Fiber Contents in Tealeaves as
well as Grow Index of Tealeaves and Tea Estate Monitoring with Network
Cameras .....................................................................................................................................................................595
Kohei Arai
Supporting Stateless Address Autoconfiguration in IP-Based Wireless Sensor
Networks ...................................................................................................................................................................601
Shafique Ahmad Chaudhry and Cormac J. Sreenan
Performance Monitoring in Sensor Networks .....................................................................................................607
P. Papantoni-Kazakos and A.T. Burrell
CoP4V : Context-Based Protocol for Vehicle’s Safety in Highways Using
Wireless Sensor Networks ......................................................................................................................................613
Sattanathan Subramanian, Djamel Djenouri, Guttorm Sindre, and Ilangko Balasingham
A Secure Content-Based Publish/Subscribe Middleware ..................................................................................619
Amina Chaabane and Mohamed Jmaiel
MOBILE COMPUTING & NETWORKING
Derivation and Analysis of Link/Route Maintenance Probability In Multi Hop
Mobile Ad Hoc Networks ......................................................................................................................................623
Yong Shou Wu, Do-hyeon Lee, and Jae-il Jung
An Election Protocol in Mobile Ad Hoc Distributed Systems .........................................................................628
Sung-Hoon Park, Tae-Gyu Lee, Hyung-Seok Seo, Seok-Jin Kwon, and Jong-Ho Han
Virtual Globe on the Android - Remote vs. Local Rendering ..........................................................................634
Marjan Sterk and Mariano Agustin Cecowski Palacio
Prevention of Denial of Service Attacks and Performance Enhancement
in Mobile Ad hoc Networks ...................................................................................................................................640
R. Gunasekaran and V. Rhymend Uthariaraj
Supporting Video Multicast in Wireless Ad Hoc Networks Using Multiple
Paths and Multiple Description Coding ...............................................................................................................646
Osamah S. Badarneh, Michel Kadoch, and Ahmed A. Elhakeem
Towards an In-Flight Infrared Peer-to-Peer Media Streaming Network .........................................................652
Thi Vu Phu, Vu Anh Huynh, and Timo Rolf Bretscheider
Time-Based Cache Management for Video-on-Demand in P2P Environment ..............................................657
Yi Qi Gui, Gi Taek Kim, and Hwang Kyu Choi
Performance Evaluation of GP3 - A Grid-Based Spatial Index Infrastructure ..............................................663
Markus Esch, Jean Botev, Hermann Schloss, and Ingo Scholtes
SOFTWARE ENGINEERING EDUCATION
Using Open Source Tools to Prevent Write-Only Code ....................................................................................671
Susan Loveland
Bridging the Research-Practice Gap in Requirements Engineering
through Effective Teaching and Peer Learning ...................................................................................................678
Andrew Mile Connor, Jim Buchan, and Krassie Petrova
xiixii
Design Patterns Go to Hollywood: Teaching Patterns with Multimedia ........................................................684
Adam Dukovich and David S. Janzen
The Road We’ve Traveled: 12 Years of Undergraduate Software Engineering
at the Rochester Institute of Technology ..............................................................................................................690
J. Fernando Naveda, Michael J. Lutz, James R. Vallino, Thomas Reichlmayr,
and Stephanie A. Ludi
Supporting Live Student Projects: Lessons Learned from the Small Project
Support Center at Radford University ..................................................................................................................696
Jeff Pittges, Joe D. Chase, and Tracy Lewis
Teaching Software Design Using a Case Study on Model Transformation ...................................................702
Yanxia Jia and Yonglei Tao
Using Scaffolding to Improve Written Communication of Software
Engineering Students ..............................................................................................................................................707
Gregory W. Hislop and Heidi J.C. Ellis
Interface-Based Object-Oriented Design with Mock Objects ..........................................................................713
Jagadeesh Nandigam, Venkat N. Gudivada, Abdelwahab Hamou-Lhadj, and Yonglei Tao
The Impact of the Model-Driven Approach to Software Engineering
on Software Engineering Education .....................................................................................................................719
Abdelwahab Hamou-Lhadj, Abdelouahed Gherbi, and Jagadeesh Nandigam
Corporate Compliance and its Implications to IT Professionals ......................................................................725
Venkat N. Gudivada and Jagadeesh Nandigam
Deadlock Detection Views of Distributed Database ..........................................................................................730
B.M. Monjurul Alom, Frans Alexander Henskens, and Michael Richard Hannaford
SOFTWARE TESTING
Using the Multi-Attribute Global Inference of Quality (MAGIQ) Technique
for Software Testing ................................................................................................................................................738
James D. McCaffrey
The Design of an Automated Unit Test Code Generation System ...................................................................743
Gary Fix
A Browser Agnostic Web Application UI Test Framework: Motivation,
Architecture, and Design ........................................................................................................................................748
Craig Merchant, Manuel Tellez, and Jagannathan Venkatesan
The Creation of a Software Testing Meta Framework; The Test Object Model ...........................................752
Neill Thompson, Heather Munion, Dan Wenzel, and Ric Ellsworth
Automated Testing of Environment-Dependent Programs − A Case Study
of Modeling the File System for Pex ....................................................................................................................758
Soonho Kong, Nikolai Tillmann, and Jonathan de Halleux
A Dependence Graph-Based Test Coverage Analysis Technique
for Object-Oriented Programs ...............................................................................................................................763
E.S.F. Najumudheen, Rajib Mall, and Debasis Samanta
xiiixiii
Declarative Testing: A Paradigm for Testing Software Applications .............................................................769
Ed Triou, Zafar Abbas, and Sravani Kothapalle
The Architecture, Design, and Operation of a Virtual Network Hardware
Emulation (VNHE) System ....................................................................................................................................774
David Harding
The Design of a System for Testing Database-Centric Software Applications
Using Database Surrogates .....................................................................................................................................779
Adrian Bonar
Test Automation Framework for Implementing Continuous Integration .......................................................784
Eun Ha Kim, Jong Chae Na, and Seok Moon Ryoo
Testing SQL Server Integration Services Runtime Engine Using Model
and Mock Objects ....................................................................................................................................................790
Kaarthik Sivashanmugam and Senthil Palanisamy
TAO Project: An Intuitive Application UI Test Toolset ...................................................................................796
Min Li, Jason Wang, and Lamar Damata
Model-Based Time and Cost Estimation in a Software Testing Environment ...............................................801
Bruce Benton
Detection and Verification of Semantic Interaction In AOSD .........................................................................807
Zaid Altahat and Tzilla Elrad
A Framework for Identifying Reusable Software Components Using Formal
Concept Analysis .....................................................................................................................................................813
Haitham S. Hamza
On the Discovery of Candidate Aspects in Software Requirements ...............................................................819
Haitham S. Hamza and Dina Darwish
A Modified Linear Scan Register Allocation Algorithm ...................................................................................825
S. Subha
A O(log n) Signature-Based String Matching Algorithm ..................................................................................828
Samer Nofal
HIGH PERFORMANCE COMPUTING ARCHITECTURES
A Object Model for Java and Its Architectural Support ....................................................................................831
Tan Yiyu, Yau Chihang, and Anthony S. Fong
Reconfigurable Processor LSI Based on ALU Array with Limitations
of Connections of ALUs for Software Radio ......................................................................................................837
Makoto Ozone, Tatsuo Hiramatsu, Katsunori Hirase, and Kazuhisa Iizuka
An Energy-Efficient Reliability Model for Parallel Disk Systems ..................................................................843
Fangyang Shen, Xiao Qin, Andres Salazar, Adam Manzanares, and Kiranmai Bellam
Parallel and Pipeline Processing for Block Cipher Algorithms on
a Network-on-Chip ..................................................................................................................................................849
Yoon Seok Yang, Jun Ho Bahn, Seung Eun Lee, and Nader Bagherzadeh
xivxiv
Bus-Based and NoC Infrastructure Performance Emulation and Comparison ..............................................855
Ling Wang, Jianye Hao, and Feixuan Wang
A NoC Emulation/Verification Framework ........................................................................................................859
Peng Liu, Chunchang Xiang, Xiaohang Wang, Binjie Xia, Yangfan Liu, Weidong Wang,
and Qingdong Yao
Scheduling Techniques for Multi-Core Architectures .......................................................................................865
Akira Hatanaka and Nader Bagherzadeh
Fuse-N: Framework for Unified Simulation Environment
for Network-on-Chip ...............................................................................................................................................871
Ashwini Raina and Venkatesan Muthukumar
Traffic Aware Scheduling Algorithm for Network on Chip .............................................................................877
Ashwini Raina and Venkatesan Muthukumar
Design of a CC-MC-CDMA System for Gigabit DSL (GDSL) .......................................................................883
Jacques van Wyk and Louis Linde
An Algorithm for Buffer Cache Management ....................................................................................................889
S. Subha
E-COMMERCE
Model-Based Specification of Flexible and Complex Bidding Strategies
in Agent-Based Online Auctions ...........................................................................................................................894
Benjamin J. Ford, Haiping Xu, Christopher K. Bates, and Sol M. Shatz
Online Payments Using Handwritten Signature Verification ...........................................................................901
Jarrod Trevathan, Alan McCabe, and Wayne Read
Inference of Online Auction Shills Using Dempster-Shafer Theory ...............................................................908
Fei Dong, Sol M. Shatz, and Haiping Xu
A Proactive Approach to Preventing Phishing Attacks Using Pshark .............................................................915
Ripan Shah, Jarrod Trevathan, Wayne Read, and Hossein Ghodosi
A Software Tool for Collecting Data from Online Auctions ............................................................................922
Rodel Balingit, Jarrod Trevathan, Yong Jin Lee, and Wayne Read
Analysing Bidding Trends in Online Auctions ...................................................................................................928
Rodel Balingit, Jarrod Trevathan, and Wayne Read
The Behavior and Preferences of Users on Web 2.0 Social Network Sites: An
Empirical Study ........................................................................................................................................................934
Shwu-Min Horng
A Case Study: Open Source Community and the Commercial Enterprise .....................................................940
Kevin Gary, Harry Koehnemann, John Blakley, Cheryl Goar, Holly Mann, and Al Kagan
Research on Components and Measurement of Customer Value in Business
to Customer Market .................................................................................................................................................946
Wang Bao, Zhang Ming Li, and Jia Wei
xvxv
COMPUTER INFORMATION TECHNOLOGY EDUCATION
A Flexible Notification System for Stocks Investors .........................................................................................952
Jameela Al-Jaroodi and Nader Mohamed
Exploring the Critical Success Factors of Mobile Commerce via Qualitative
Method- in Case of Insurance Industry ................................................................................................................958
Ya-Yueh Shih and Siao-Sian Huang
The Science of Computing: Concepts and Current Technologies ....................................................................963
Herbert Schanker, Deborah Sturm, and Sarah Zelikovitz
Teaching Object-Oriented Programming with Games .......................................................................................969
Lu Yan
Experiences Using New Technologies in a Computer Organization Course .................................................975
Prem Uppulur and Maung Htay
Learning Outcomes for an Introductory Database Project ................................................................................981
Jeff Pittges, Robert H. Phillips, and Premchand Uppuluri
Internet Information Retrieval for Enabling Student Projects ..........................................................................987
Nader Mohamed, Jameela Al-Jaroodi, and Imad Jawhar
A Model for National E-readiness Assessment Based on System Approach .................................................993
Elham Ziaei Pour, Alireza Taghizadeh, Farzad Bazazan, Farid Khoshalhan,
and Ayoub Mohammadian
Virtual Age: Enabling Technologies and Trends ................................................................................................999
Hamid Mahmoodi and Ali A. Jalali
MIDDLEWARE
Federated and Shared Use of Sensor Networks through Security Middleware ...........................................1005
Christophe Huygens and Wouter Joosen
Uniform and Efficient Data Provisioning for SOA-Based Information Systems ........................................1012
Ralf Wagner and Bernhard Mitschang
MINDS: A Middleware Infrastructure for Distributed Services Provisioning ............................................1018
Johnson Iyilade, Klaas Kabini, and Matthew Adigun
A Systematic Review of Software Product Lines Applied to Mobile
Middleware .............................................................................................................................................................1024
Yuri Morais Bezerra, Thaís Alves Burity Pereira, and Glêdson Elias da Silveira
TGKAM: Adaptive Middleware Architecture for Secure Group
Communication ......................................................................................................................................................1030
Rajesh Ingle and G. Sivakumar
Developing Service Oriented Sensor/Actuator Networks Using a Tailored
Middleware .............................................................................................................................................................1036
Stephan Sommer, Christian Buckl, and Alois Knoll
The Development of a Multi-Agent Based Middleware for RFID Asset
Management System Using the PASSI Methodology .....................................................................................1042
Libe Valentine Massawe, Farhad Aghdasi, and Johnson Kinyua
xvixvi
Mobile Middleware Solution for Automatic Reconfiguration of Applications ...........................................1049
Alin Florindor Murarasu and Thomas Magedanz
DATA MINING
Classification of Movies and Television Shows Using Motion .....................................................................1056
Mark Smith, Ray Hashemi, and Leslie Sears
Design of Context Analysis System on USN Environment ............................................................................1061
Cheng Hao Jin, Yongmi Lee, Gyoyong Sohn, Hi-Seok Kim, and Keun Ho Ryu
M3L: Architecture for Multimedia Information Retrieval ..............................................................................1067
Umer Rashid, Iftikhar Azim Niaz, and Muhammad Afzal Bhatti
XML Based Implementation of a Bibliographic Database and Recursive
Queries .....................................................................................................................................................................1073
Kazem Taghva and Kirankumar Jayakumar
Towards an Integrated Platform for Improving Hospital Risk Management ...............................................1079
Jawed Siddiqi, Babak Akhgar, Fazilatur Rahman, Sally Atkinson, Alberto Savoldelli,
Stefano Arici, Paolo Bertele, Brian James, and Mike Pinkerton
Toward Extending AADL-OSATE Toolset with Color Petri Nets (CPNs) .................................................1085
Hassan Reza and Emanuel S. Grant
A Safety Analysis Method Using Fault Tree Analysis and Petri Nets ..........................................................1089
Hassan Reza, Malvika Pimple, Varun Krishna, and Jared Hildle
E-LEARNING
Extending the Pair Programming Pedagogy to Support Remote Collaborations
in CS Education .....................................................................................................................................................1095
Alan Clinton Shaw
The Knowledge Building of the Eco-Classroom ..............................................................................................1100
Xinyu Zhang, NianLong Luo, and Cheng Sun
The Case Study Activities in a Web-Based Environment ...............................................................................1104
Huang Lanying, Hu Zhongya, and Cheng Sun
Translating e-learning Flow-Oriented Activity Sequencing Descriptions
into Rule-Based Designs ......................................................................................................................................1108
Iván Martínez-Ortiz, José Luis Sierra, and Baltasar Fernández-Manjón
Distance-Learning and Converging Mobile Devices .......................................................................................1114
Kenneth E. Hoganson
Online Professional Development for K-12 Inservice Teachers from the Views
of Online Learning Forum (OLF) Designers .....................................................................................................1120
Li-chu Sung
Using Learners’ Annotations to Produce Feedbacks for Selecting and Editing
Learning Contents in e-Learning Systems .........................................................................................................1128
Ahmad A. Kardan and Fakhroddin Noorbehbahani
Towards a More Accurate Knowledge Level Estimation ................................................................................1134
Samad Kardan and Ahmad Kardan
xviixvii
A Proposesd Ontology for Effective Searching of Sharable Content Objects
Emphasizing on Learning Objectives .................................................................................................................1140
Ahmad Kardan and Shima Zahmatkesh
MOBILITY & RESOURCE MANAGEMENT
Optimized Hybrid Resource Allocation in Wireless Cellular Networks
with and without Channel Reassignment ...........................................................................................................1146
Xin Wu, Arunita Jaekel, Ataul Bari, and Alioune Ngom
Multi-slot Channel Allocation for Priority Packet Transmission in the GPRS
Network ...................................................................................................................................................................1152
Jun Zheng, Mengyu Qiao, and Emma Regentova
Optimum Power Allocation for Distributed Antenna Systems with Large-scale
Fading-only Feedback ...........................................................................................................................................1158
Dongho Lim, Kwonhue Choi, and Huaping Liu
DMAP-FR: Integrated Mobility and Service Management with Failure
Recovery Support for Mobile IPv6 Systems .....................................................................................................1165
Weiping He and Ing-Ray Chen
A Lookahead Strategy for Movement-Based Location Update in Wireless
Cellular Networks ..................................................................................................................................................1171
Vicente Casares-Giner and Pablo Garcia-Escalle
Performance Analysis of MQAM-OFDM Based WLAN in Presence of Zigbee
Interference in AWGN and Rayleigh Fading Channel ....................................................................................1178
Minakshmi Roy and Jamadagni H.S.
Quality of Experience Measurements for Video Streaming over Wireless
Networks .................................................................................................................................................................1184
Kandaraj Piamrat, Cesar Viho, Jean-Marie Bonnin, and Adlen Ksentini
Analysis of VoIP over HSDPA Performance with Discontinuous Reception
Cycles ......................................................................................................................................................................1190
Kari Aho, Ilmari Repo, Timo Nihtilä, and Tapani Ristaniemi
On Idle Mode Mobility State Detection in Evolved UTRAN ........................................................................1195
Jani Puttonen, Niko Kolehmainen, Tero Henttonen, and Jorma Kaikkonen
AMBIENT-ASSISTED LIVING FOR ELDERLY PEOPLE
Promises and Challenges of Ambient Assisted Living Systems ....................................................................1201
Hong Sun, Vincenzo De Florio, Ning Gui, and Chris Blondia
e-Care – IHE-Compliant Exchange of Patient Data to Enable Home & Mobile
Nursing Care of Elderly People within an e-Care Affinity Domain ..............................................................1208
Barbara Franz, Markus Lehner, Herwig Mayr, and Margit Mayr
Modeling Situation-Aware Ambient Assisted Living Systems for Eldercare ..............................................1214
Werner Kurschl, Stefan Mitsch, and Johannes Schönböck
xviiixviii
User-Centered Design and Fast Prototyping of an Ambient Assisted Living
System for Elderly People ....................................................................................................................................1220
Suzanne Kieffer, Jean-Yves Lionel Lawson, and Benoît Macq
Implementation of a Physical Activity Monitoring System for the Elderly
People with Built-in Vital Sign and Fall Detection ..........................................................................................1226
Anh Dinh, Daniel Teng, Li Chen, Yang Shi, Carl McCrosky, Jenny Basran,
and Vanina Del Bello-Hass
Ambient Information Systems for Supporting Ageing in Place .....................................................................1232
Juan P. García-Vázquez, Marcela D. Rodríguez, Angel G. Andrade, Diana Saldaña,
Fabian Mercado, and Emanuelle Ruelas
SIGNAL PROCESSING APPLICATIONS
Novel Blind Signal Classification Method Based on Data Compression .....................................................1238
Xudong Ma
Performance Comparison of Wiener Filter and CLS Filter on 2D Signals ..................................................1244
K. Raja Rajeswari, K. Murali Krishna, V. Jagan Naveen, and A. Vamsidhar
A Back End System for Digital Image Library Organization Based on Concept
Learning ..................................................................................................................................................................1250
Paraskevi S. Lampropoulou, Dionysios N. Sotiropoulos, Aristomenis S. Lampropoulos,
and George A. Tsihrintzis
Feature Combination Using Multiple Spectral Cues for Robust Speech
Recognition in Mobile Communications ...........................................................................................................1256
Djamel Addou, Sid-Ahmed Selouani, Malika Boudraa, and Bachir Boudraa
Detection of the Parameters of Hypernasality ...................................................................................................1262
Buket D. Barkana
The Acoustic Properties of Different Noise Sources .......................................................................................1265
Jidong Yang and Buket D. Barkana
Optimal Transmission Time of Secondary User in an Overlay Cognitive Radio
System .....................................................................................................................................................................1269
Babak Abbasi Bastami and Ebrahim Saberinia
NEW TRENDS IN IMAGE PROCESSING
Post-processing of Multiview Images: Depth Scaling .....................................................................................1275
Manbae Kim
Design of a Logarithmic Domain 2-D Convolver for Low Power Video
Processing Applications ........................................................................................................................................1280
Hau T. Ngo and Vijayan K. Asari
Side-Match Vector Quantizers Using Neural Network Based Variance
Predictor for Image Coding ..................................................................................................................................1286
Shuangteng Zhang
xixxix
Carotid Artery Boundary Extraction Using Segmentation Techniques: A
Comparative Study ................................................................................................................................................1290
Zayanthi K.B. and Wahida Banu R.S.D.
Barcode Watermarking .........................................................................................................................................1296
Mohammad Eyadat, Hedley Morris, and Imad Muhi El-Ddin
Fuzzy Edge and Corner Detector for Color Images .........................................................................................1301
Hanmandlu Madasu, O.P. Verma, Pankaj Gangwar, and Shantaram Vasikarla
Medical Image Segmentation Using Improved Mountain Clustering Approach .........................................1307
Nishchal K. Verma, Payal Gupta, Pooja Agrawal, M. Hanmandlu,
Shantaram Vasikarla, and Yan Cui
Optimization of VC-1/H.264/AVS Video Decoders on Embedded Processors ..........................................1313
Guo-An Jian, Ting-Yu Huang, Jui-Chin Chu, and Jiun-In Guo
Compressing Images Using Fractal Characteristics by Estimating the Nearest
Neighbor ..................................................................................................................................................................1319
Mahdi Jampour, Maryam Ashourzadeh, Mahdi Yaghobi, and Issa Rashidfarokhi
WEB TECHNOLOGIES
A Study of Color Histogram Based Image Retrieval .......................................................................................1323
Rishav Chakravarti and Xiannong Meng
Improving Web Search Using Contextual Retrieval ........................................................................................1329
Dilip K. Limbu, Andrew M. Connor, Russel Pears, and Stephen G. MacDonell
Image Query Service Using Content Management Techniques .....................................................................1335
Dan Beatty and Noe Lopez-Benitez
Emotion and Motivation: Understanding User Behavior of Web 2.0
Application .............................................................................................................................................................1341
Chen-Ya Wang, Seng-cho T. Chou, and Hsia-Ching Chang
3D VQI: 3D Visual Query Interface ...................................................................................................................1347
Subhash Uppalapati, John C. Femiani, Anshuman Razdan, and Kevin Gary
Exploring Hierarchically Organized Georeferenced Multimedia Annotations
in the MobiTOP System .......................................................................................................................................1355
Thi Nhu Quynh Kim, Khasfariyati Razikin, Dion Hoe-Lian Goh, Yin Leng Theng,
Quang Minh Nguyen, Ee-Peng Lim, Aixin Sun, Chew Hung Chang, and Kalyani Chatterjea
Anatomy of a News Archive and Search Engine (Optimized for Persian Web) .........................................1361
Sayed Nasir Khalifehsoltani, Ali Vahdani, and Reza Moallemi
An Integrated Framework for Research on Cross-Cultural Information
Retrieval ..................................................................................................................................................................1367
Isak Taksa and Jaime Muro Flomenbaum
PCI: Plants Classification & Identification Classification of Web Pages
for Constructing Plants Web Directory ..............................................................................................................1373
Madjid Khalilian, Hassan Abolhassani, Ali Alijamaat, and Farsad Zamani Boroujeni
xxxx
AGILE METHODS, TOOLS & BEST PRACTICES
Fixed Broadband Wireless Access for Wide Area Coverage and Last Mile
Solutions ..................................................................................................................................................................1378
Son Le-Ngoc and Bao Nguyen Le
Applying a Composite Process Framework (CPF) in Real Life Software
Development Project .............................................................................................................................................1384
Mohammed Al-Maharmeh and Bhuvan Unhelkar
DASIMA: A Flexible Management Middleware in Multi-Scale Contexts ..................................................1390
Mehdi Kessis, Claudia Roncancio, and Alexandre Lefebvre
Using GQM for Testing Design Patterns in Real-Time and Embedded Systems
on a Software Production Line ............................................................................................................................1397
Claudio Goncalves Bernardo, Denis Avila Montini, Danilo Douradinho Fernandes,
Daniela América da Silva, Luiz Alberto Vieira Dias, and Adilson Marques da Cunha
Learning from Experience: The Analysis of an Extreme Programming Process ........................................1405
Sara Shahzad
An Approach for SQL Injection Vulnerability Detection ...............................................................................1411
Mei Junjin
Using Agile Methods in Software Product Development: A Case Study .....................................................1415
Jayakanth Srinivasan and Kristina Lundqvist
DOMAIN AND PRODUCT LINE ENGINEERING
Design Patterns Reuse for Real Time Embedded Software Development ...................................................1421
Gabriel de Souza Pereira Moreira, Denis Ávila Montini, Daniela América da Silva,
Felipe Rafael Motta Cardoso, Luiz Alberto Vieira Dias, and Adilson Marques da Cunha
Final Inspection for Design Pattern Homologation Using a Real Time
Embedded Software in a Production Line .........................................................................................................1428
Gabriel de Souza Pereira Moreira, Denis Ávila Montini,
Danilo Douradinho Fernandes, Felipe Rafael Motta Cardoso,
Luiz Alberto Vieira Dias, and Adilson Marques da Cunha
Using GQM Hypothesis Restriction to Infer Bayesian Network Testing .....................................................1436
Denis Ávila Montini, Felipe Rafael Motta Cardoso, Francisco Supino Marcondes,
Paulo Marcelo Tasinaffo, Luiz Alberto Vieira Dias, and Adilson Marques da Cunha
The Mechanism and Performance Comparison of Two Wireless Sensor
Network Operating System Kernels ...................................................................................................................1442
Jialiang Wang, Hai Zhao, Peng Li, Zheng Liu, Jie Zhao, and Wei Gao
Systematic and Formal Approach to get a Domain Specific Language ........................................................1447
Francisco Supino Marcondes, Danilo Douradinho Fernandes, Denis Ávila Motini,
Paulo Marcelo Tasinaffo, Italo Santiago Vega, and Luiz Alberto Vieira Dias
A Desktop Environment for River Hazards Monitoring .................................................................................1451
João Augusto de Pessôa, Luiz Alberto Vieria Dias, and Adilson Marques da Cunha
xxixxi
E-HEALTH, E-GOVERNMENT, E-SERVICES
Epileptic Seizures Detection Using Continuous Time Wavelet Based Artificial
Neural Networks ....................................................................................................................................................1456
Abibullaev Berdakh and Seo Hee Don
The Role of Enterprise Architecture in Healthcare-IT .....................................................................................1462
Kamran Ahsan, Hanifa Shah, and Paul Kingston
Prediction of Temperature Distribution and Volume of Lesion During HIFU
Therapy ....................................................................................................................................................................1468
Mohsen Heydari and Mehran Jahed
The State of Play in Jordanian E-government Services ...................................................................................1474
Mohammad Hjouj Btoush, Jawed Siddiqi, Ja’far Alqatawna, and Babak Akhgar
A Search Service for Software Components Based on a Semi-Structured Data
Representation Model ...........................................................................................................................................1479
Talles Brito Viana, Hugo Imperiano Nóbrega,
Thiago Vinícius Freire de Araújo Ribeiro, and Glêdson Elias da Silveira
The Research on the Environmental Assessment Automation System-C4ISRE
Based on C4ISR Theory .......................................................................................................................................1485
Ma Yunfeng, Hu Xiaomin, Huang Yonggang, Zhu Tong, and Fu Lingling
The Use of Health Smart Card in Bridging Discontinuity of Care for Pregnant
Woman ....................................................................................................................................................................1492
An-Jim Long and Polun Chang
Information and Communication Technology in Arab Countries: Problems
and Solutions ..........................................................................................................................................................1498
Samir N. Hamade
SOCIAL COMPUTING & TECHNOLOGY
Towards a Context Aware Mobile Community Application Platform ..........................................................1504
Christian Menkens
Multidimensional Visualization System for Travel Social Networks ...........................................................1510
Maria Chiara Caschera, Fernando Ferri, Patrizia Grifoni, and Tiziana Guzzo
A Mobile Application to Support Phatic Communication in the Hybrid Space ..........................................1517
Mark Bilandzic, Daniel Filonik, Michael Gross, Andreas Hackel, Herbert Mangesius,
and Helmut Krcmar
A Trend Analysis of the Question Answering Domain ...................................................................................1522
Mohan John Blooma, Alton Yeow Kuan Chua, Dion Hoe-Lian Goh, and Lee Chu Keong
An Optimization Model for IO Jitter in Device-Level RTOS ........................................................................1528
Zheng Liu, Hai Zhao, Peng Li, and Jialiang Wang
Trust Computing for Social Networking ............................................................................................................1534
Yanjun Zuo, Wen-chen Hu, and Timothy O’Keefe
xxiixxii
Giving Every Child a Sense of Belonging: Improving Birth Registration
in Developing Countries .......................................................................................................................................1540
Johannes Gambo and Savae Latu
Querying Semistructured Data with Compression in Distributed Environments ........................................1546
B.M. Monjurul Alom, Frans Henskens, and Michael Hannaford
Effects of Social Approval Votes on Search Performance ..............................................................................1554
Gabriella Kazai and Natasa Milic-Frayling
Planning and Realization of Collaborative Assembly ......................................................................................1560
Hao Yongping, Wang Jingyu, Zeng Pengfei, and Shao Weiping
POSTERS
An Oscillator Based on LDMOS Capacitor ......................................................................................................1565
Huang Wei-hai, Dai Yu-jie, Zhang Xiao-xing, and Lü Ying-jie
Application of COMERO Data Collecting in Quality Management System ...............................................1567
Yue Yan-fang, Zhang Rui-gang, Yang Guang, and Ge Guang-le
Using Pi-Calculus to Formalize Grid Workflow Parallel Computing Patterns ............................................1568
Li Zhan-jun, Huang Yong-zhong, and Guo Shao-zhong
A Methodology for Mobile Network Security Risk Management .................................................................1572
Mahdi Seify and Shahriar Bijani
Security Analysis of One Quantum Digital Signature Scheme ......................................................................1574
Zhengjun Cao and Olivier Markowitch
An Evolution of Hindi Text Steganography ......................................................................................................1577
Kalavathi Alla and R. Siva Rama Prasad
Network Security Scheme for Wireless Sensor Networks using Efficient
CSMA MAC Layer Protocol ...............................................................................................................................1579
Piyush Kumar Shukla, Sanjay Silakari, and Sarita Singh Bhadoriya
Implementation Comparison of Kerberos Passwords by RC-5 Encryption
Type Analysis with RC-4 Encryption ...............................................................................................................1581
Piyush K. Shukla, G.S. Mishra, Prashant G. Girdhar, Pradeep Rusia, and Vivek Kapoor
An Ethical Way of Encrypt Data Transfer in Bluetooth Mobile Using Chaos
Based Feedback Technique ..................................................................................................................................1583
Piyush Kumar Shukla, Kamlesh Gupta, Sanjay Silakari, and A.S. Saxena
Research of Direct Spread Spectrum Communication System for Formation
Micro-satellites .......................................................................................................................................................1585
Guoqiang Wu, Sun Zhaowei, and Shunan Wu
Performance Comparison of BPSK in Rayleigh and AWGN Channel
by Monte Carlo Simulation Method ...................................................................................................................1588
Sahil Chaudhary, Vijit Gupta, and Vivek Kumar Dwivedi
The Research of the Component-Based Software Engineering ......................................................................1590
Xinyu Zhang, Li Zheng, and Cheng Sun
xxiiixxiii
Project Management Practitioner Empowerment Program: A Case Study ..................................................1592
Rose Neena Tom
Using Domain-Specific Languages to Describe the Development Viewpoint
of Software Architectures .....................................................................................................................................1595
Amir Reza Yazdanshenas and Ramtin Khosravi
WERCCS: A Client-side Workflow Enactment Service Using AJAX .........................................................1597
Mahin Jeyachandran and Kevin Gary
Is Continuous Compliance Assurance Possible? ..............................................................................................1599
Joseph M. D’Alessandro, Cynthia D. Tanner, Bonnie W. Morris, and Tim Menzies
VL-MAC: Virtual Link Based Multi-channel MAC Scheme in WSN .........................................................1600
Luo Juan, Luo Hai-Bo, and Li Ren-Fa
Hierarchical Intelligent Agent Based Wireless Body Sensor Mesh Networks ............................................1602
Suresh Sankaranarayanan
A Reliable Multi-hop Hierarchical Routing Protocol in Wireless Sensor
Network (WSN) .....................................................................................................................................................1604
Mohammad Al-Fares, Zhili Sun, and Haitham Cruickshank
An Implementation of Central Optical Sensor Measurement/Observation
System (COSMOS) with the Integrated FBG Sensor Control Device ..........................................................1606
Hyun-Kuk Kim, Won-Hyuk Yang, Hyun-Bum Choi, and Young-Chon Kim
A Reinforced Authentication Protocol for Anti-Counterfeiting and Privacy
Protection ................................................................................................................................................................1610
Kang-Joong Seo, Jun-Cheol Jeon, and Kee-Young Yoo
A Thermal-aware Shortest Hop Routing Algorithm for in vivo Biomedical
Sensor Networks ....................................................................................................................................................1612
Fereidoun Ahourai, Mahmoud Tabandeh, Mehran Jahed, and Saber Moradi
Tutoring Tool for Formulating Database Queries with Complex Quantifiers .............................................1614
Jalal Kawash
Insider Threat in Database Systems: Preventing Malicious Users’ Activities
in Databases ............................................................................................................................................................1616
Manideep Chagarlamudi, Brajendra Panda, and Yi Hu
Using Service Oriented Architecture in a Generic Virtual Power Plant .......................................................1621
Peter Bach Andersen, Bjarne Poulsen, Chresten Træholt, and Jacob Østergaard
The Web-Based B2B Environment with Web Services ..................................................................................1623
Xinyu Zhang, Wei Tang, and Cheng Sun
A Web Service System with Workflow Modeling and Scheduling ...............................................................1625
Xinyu Zhang and Nian Long Luo
Data Access and Semantic Integration Based on OGSA-DQP ......................................................................1627
Wenzheng Li and Xiaoxia Hu
A Methodology to Extract Emotions and add Expressions in Speech Synthesis ........................................1631
M.B. Chandak and Rajiv Dharaskar
xxivxxiv
Learning Theories in Computer Science Education .........................................................................................1634
Jesús Ubaldo Quevedo-Torrero
Problem on Software Engineering Learning: Domain Engineering ..............................................................1636
Francisco Supino Marcondes, Hamilton José Brumatto, Eloiza Helena Sonoda,
Luiz Carlos Barboza, and Jefferson Zannuto
Extending the Technology Acceptance Model for Internet Banking: A Case
Study of Iran ...........................................................................................................................................................1637
Alireza Talebpour, Sona Bairamzadeh, and Seyed Sabah Vajdi
A Proposal Framework for Investigating Website Success in the Context
of E-banking: An Analytic Network Process (ANP) Approach .....................................................................1639
Mona Salehi, Abbas Keramati, and Sina Elli
Variable Block Size Architecture for Programs ................................................................................................1640
S. Subha
Modeling Real-Time Multi-Core Embedded System Using UML ................................................................1642
Jareer Abdel-Qader and Roger Walker
Quantum Cryptography: A New Generation of Information Technology
Security System ......................................................................................................................................................1644
Mehrdad S. Sharbaf
Development of Collapse-Sensing Phone for Emergency Positioning System ...........................................1649
Duksung Jang, Seungchan Choi, and Taesoon Park
A Pervasive System for Enabling Older Adults to Cope with Depression
by Motivating them to Socialize ..........................................................................................................................1653
Alejandro Aguirre, Marcela D. Rodriguez, and Angel G. Andrade
Unconstrained Arabic Handwritten Word Feature Extraction: A Comparative
Study ........................................................................................................................................................................1655
Jawad H. AlKhateeb, Jinchang Ren, Jianmin Jiang, and Stan S. Ipson
Outlier Detection in Spatial Databases Using Clustering Data Mining ........................................................1657
Amitava Karmaker and Syed Rahman
Extending the Technology Acceptance Model for E-learning: A Case Study
of Iran ......................................................................................................................................................................1659
Akram Hadizadeh Moghadam and Sona Bairamzadeh
Exchange Routing Information between New Neighbor Nodes to Improve
AODV Performance ..............................................................................................................................................1661
Le Anh Tuan and Yuan Luo
A New Data Communication Protocol for Distributed Mobile Databases
in Mobile Ad Hoc Networks ................................................................................................................................1663
Afsaneh Rahbar, Mehran Mohsenzadeh, and Amir Masoud Rahmani
A Hybrid Reconfiguration Algorithm for Fast Continuous Query Processing ............................................1668
Christopher Kosecki and Joseph Gomes
Modeling of Military Networks Using Group Mobility Models ....................................................................1670
Alicia Nicki Washington and Rotimi Iziduh
xxvxxv
Providing “Second Chance” to Students and Improving Retention ...............................................................1672
Syed M. Rahman and Amitava Karmaker
Software Testing for Web-Applications Non-Functional Requirements ......................................................1674
Breno Lisi Romano, Gláucia Braga e Silva, Henrique Fernandes de Campos,
Ricardo Godoi Vieira, Adilson Marques da Cunha, Fábio Fagundes Silveira,
and Alexandre Carlos Brandão Ramos
On the Secure Sharing of Legacy Data ..............................................................................................................1676
Douglas Russell, David Power, Mark Slaymaker, Ghita Kouadri Mostefaoui,
Xiaoqi Ma, and Andrew Simpson
Modeling the Interaction with MoLIC ...............................................................................................................1680
Claudia Mena, Cristian Rusu, and Silvana Roncagliolo
Using Best Practices of Software Engineering into a Real Time System
Development ...........................................................................................................................................................1681
Ricardo Godoi Vieira, Breno Lisi Romano, Gláucia Braga e Silva,
Henrique Fernandes de Campos, and Adilson Marques da Cunha
Applying Domain-Specific Modeling to Mobile Health Monitoring
Applications ............................................................................................................................................................1682
Florence Balagtas-Fernandez and Heinrich Hussmann
Agile Principles in Academic Education: A Case Study .................................................................................1684
Bernd Bruegge, Maximilian Reiss, and Jennifer Schiller
Weaving Agile Software Development Techniques into a Traditional
Computer Science Curriculum ............................................................................................................................1687
Peter Maher
Using a Tool to Generate a Web-Services Adapter ..........................................................................................1689
Cheng Sun, Xiaohua Wu, and Xinyu Zhang
Collaborative Web Search with WikiLinks .......................................................................................................1691
Chris Lüer and Jonathan Cummins
Evaluating Web 2.0 Services Based on 7C Framework ..................................................................................1693
Milad Sabouri and Ali A. Jalali
Improving the Security of Non-PKI Methods for Public Key Distribution ..................................................1695
Chun-Ta Li and Min-Shiang Hwang
Model Updating of Laboratorial Long-Span Cable-Stayed Bridge ...............................................................1697
Ou Yang and Jinping Ou
Study on the Parameter Vibration of the Large-Span Cable-Stayed Bridges ...............................................1701
Li Feng-chen, Tian Shi-zhu, Li Yan-jun, and Wang Jin
An Algorithm for Secure Deletion in Flash Memories ....................................................................................1705
S. Subha
Modeling of Object Oriented OLAP ..................................................................................................................1707
Madhu Bhan, D.E. Geetha, T.V. Suresh Kumar, and K. Rajanikanth
Reality of a New Control Sampling Module .....................................................................................................1709
Wensong Hu, Min Zhu, and Zhuo Fang
xxvixxvi
Decidability and Constructivism .........................................................................................................................1711
Jesús Ubaldo Quevedo-Torrero
An Exclusive Cache Model ..................................................................................................................................1715
S. Subha
Author Index
xxviixxvii
Top Related