Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
ITNG
ITNG 2013
Generate Citations
2013 Tenth International Conference on Information Technology: New Generations (ITNG)
April 15 2013 to April 17 2013
Las Vegas, NV, USA
Table of Contents
Title Page i
Freely available from IEEE.
pp. i-i
Title Page iii
Freely available from IEEE.
pp. iii-iii
[Copyright notice]
Freely available from IEEE.
pp. iv-iv
Table of Contents
Freely available from IEEE.
pp. v-xiv
Welcome from the ITNG 2013 General Chair
Freely available from IEEE.
pp. xv-xv
Conference Organization
Freely available from IEEE.
pp. xvi-xvi
Reviewers
Freely available from IEEE.
pp. xvii-xvii
A Tree-Based Web Service Indication Scheme for Service Tracking in Vehicular Ad-Hoc Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 3-7
by
Chyi-Ren Dow
,
Chih-Yu Chueh
,
Yu-Hong Lee
,
Shiow-Fen Hwang
Reducing the Impact of Massive Multiplayer Online Games on the Internet Using SCTP
Full-text access may be available. Sign in or learn about subscription options.
pp. 8-13
by
David Burgos-Amador
,
Jesus Martinez-Cruz
,
Sergio Recio-Perez
SIP: A Simple Tool for Inspecting and Evaluating WSDL Specifications
Full-text access may be available. Sign in or learn about subscription options.
pp. 14-19
by
Mario Beron
,
German Montejano
,
Daniel Riesco
,
Pedro R. Henriques
,
Narayan Debnath
Blind Certificates for Secure Electronic Voting
Full-text access may be available. Sign in or learn about subscription options.
pp. 20-26
by
Victor Mateu
,
Francesc Sebe
,
Magda Valls
Considering Interdependent Protection Goals in Domain-Specific Contexts: The di.me Case Study
Full-text access may be available. Sign in or learn about subscription options.
pp. 27-32
by
Fatih Karatas
,
Marcel Heupel
,
Mohamed Bourimi
,
Dogan Kesdogan
,
Sophie Wrobel
Non-blocking Atomic Commitment Algorithm in Asynchronous Distributed Systems with Unreliable Failure Detectors
Full-text access may be available. Sign in or learn about subscription options.
pp. 33-38
by
Sung-Hoon Park
,
Jea-Yep Lee
,
Su-Chang Yu
Web Portal Usability Tests for the Nevada Climate Change Portal
Full-text access may be available. Sign in or learn about subscription options.
pp. 39-45
by
Ivan Gibbs
,
Sergiu M. Dascalu
,
Frederick C. Harris
Semi-automated Analysis Software for a Novel Biochemistry Assay
Full-text access may be available. Sign in or learn about subscription options.
pp. 46-52
by
Joseph M. Vesco
,
Frederick C. Harris
,
Sergiu M. Dascalu
,
Del R. Jackson
,
Josh E. Baker
Attack Scenario Prediction Methodology
Full-text access may be available. Sign in or learn about subscription options.
pp. 53-59
by
Seraj Fayyad
,
Christoph Meinel
A Comparative Evaluation of Web Services Description Approaches
Full-text access may be available. Sign in or learn about subscription options.
pp. 60-64
by
Hajar Omrana
,
Ibrahim El Bitar
,
Fatima-Zahra Belouadha
,
Ounsa Roudies
Modeling a Facilities Management and Information System by UML
Full-text access may be available. Sign in or learn about subscription options.
pp. 65-70
by
Leo Espinoza
,
Heldy Espinoza
,
Wenying Feng
A Web-Enabled Approach for Generating Data Processors
Full-text access may be available. Sign in or learn about subscription options.
pp. 71-76
by
Jigarkumar Patel
,
Sohei Okamoto
,
Sergiu M. Dascalu
,
Frederick C. Harris
A Boundary Value Analysis Tool - Design and Description
Full-text access may be available. Sign in or learn about subscription options.
pp. 77-82
by
Narayan Debnath
,
Adam Kruger
,
Melinda Alexander
GajaNindu: A Distributed System Management Framework with User-Defined Management Logic
Full-text access may be available. Sign in or learn about subscription options.
pp. 83-88
by
Sumedha Kodithuwakku
,
Lakmal Padmakumara
,
Ishara Premadasa
,
Shameera Rathnayaka
,
Vishaka Nanayakkara
,
Srinath Perera
Mining Auto-generated Test Inputs for Test Oracle
Full-text access may be available. Sign in or learn about subscription options.
pp. 89-94
by
Weifeng Xu
,
Hanlin Wang
,
Tao Ding
One-Semester CS Capstone: A 40-60 Teaching Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 97-102
by
Hisham M. Haddad
Applying Interdisciplinarity and Agile Methods in the Development of a Smart Grids System
Full-text access may be available. Sign in or learn about subscription options.
pp. 103-110
by
Marcelo Paiva Ramos
,
Gustavo Ravanhani Matuck
,
Ciro Fernandes Matrigrani
,
Samoel Mirachi
,
Eliezer Segeti
,
Marco Leite
,
Adilson Marques Da Cunha
,
Luiz Alberto Vieira Dias
Gender Classification with Human Gait Based on Skeleton Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 113-118
by
Kohei Arai
,
Rosa Andrie
Experimental Evaluation of Usability Heuristics
Full-text access may be available. Sign in or learn about subscription options.
pp. 119-126
by
Freddy Paz
,
Daniela Villanueva
,
Cristian Rusu
,
Silvana Roncagliolo
,
Jose Antonio Pow-Sang
Evaluating the Usability of Interactive Digital Television Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 127-132
by
Andres Solano
,
Cesar Collazos
,
Cristian Rusu
,
Luis Merchan
Using a Wireless Sensors Network in the Sustainable Management of African Palm Oil Solid Waste
Full-text access may be available. Sign in or learn about subscription options.
pp. 133-137
by
Mauro Jimenez
,
Alejandra Jimenez
,
Pablo Lozada
,
Santiago Jimenez
,
Cristhy Jimenez
Assessing the Usability of University Websites in Saudi Arabia: A Heuristic Evaluation Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 138-142
by
Mutlaq B. Alotaibi
A Comparison of Usability Testing Methods for an E-Commerce Website: A Case Study on a Malaysia Online Gift Shop
Full-text access may be available. Sign in or learn about subscription options.
pp. 143-150
by
K.N. Goh
,
Y.Y. Chen
,
F.W. Lai
,
S.C. Daud
,
A. Sivaji
,
S.T. Soo
Two Problems of Wavelet Packet Transform
Full-text access may be available. Sign in or learn about subscription options.
pp. 153-159
by
Makoto Kobayashi
,
Kazushi Nakano
Parallelization of discrete stochastic arithmetic on multicore architectures
Full-text access may be available. Sign in or learn about subscription options.
pp. 160-166
by
F. Jezequel
,
J.-L. Lamotte
,
O. Chubach
Digital Image Watermarking for Authentication Based on the Dyadic Wavelet Transform and Interval Arithmetic
Full-text access may be available. Sign in or learn about subscription options.
pp. 167-172
by
Ryuji Ohura
,
Teruya Minamoto
Some Remarks on the Optimal Error Estimates for the Finite Element Method on the L-Shaped Domain
Full-text access may be available. Sign in or learn about subscription options.
pp. 173-178
by
Takehiko Kinoshita
,
Mitsuhiro T. Nakao
A Sinc Method for an Eigenvalue Problem of a Differential Operator with Periodic Coefficients and Its Comparison with Hill's Method
Full-text access may be available. Sign in or learn about subscription options.
pp. 179-185
by
Kenichiro Tanaka
On the Performance of Apache Hadoop in a Tiny Private IaaS Cloud
Full-text access may be available. Sign in or learn about subscription options.
pp. 189-195
by
Gabriel Loewen
,
Michael Galloway
,
Susan Vrbsky
Advanced Instruction Folding for an Object-oriented Processor
Full-text access may be available. Sign in or learn about subscription options.
pp. 196-199
by
Anthony S. Fong
,
C.H. Yau
,
Yijun Liu
Hardware Multi-processor Design for Highly-Demanding Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 200-205
by
Lech Jowiak
,
Yahya Jan
Workload Based Optimization Model for Parallel Disk Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 206-209
by
Fangyang Shen
,
Bing Qi
An Area-Time Efficient Architecture for 16 x 16 Decimal Multiplications
Full-text access may be available. Sign in or learn about subscription options.
pp. 210-216
by
Ming Zhu
,
Yingtao Jiang
A Novel Flash Fast-Locking Digital PLL: Verilog-AMS Modeling and Simulations
Full-text access may be available. Sign in or learn about subscription options.
pp. 217-222
by
Mahmoud Fawzy Wagdy
,
Sandesh Maraliga Jayaram
Exploiting UML Semantic Variation Points to Generate Explicit Component Interconnections in Complex Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 225-232
by
Federico Ciccozzi
,
Antonio Cicchetti
,
Mikael Sjodin
Automated Generation of Use Case Diagrams from Problem Frames Using Formal Concept Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 233-240
by
Amina A. Imam
,
Haitham S. Hamza
,
Riham Abdel Moneim
Parser Combinators: A Practical Application for Generating Parsers for NMR Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 241-246
by
Matthew Fenwick
,
Gerard Weatherby
,
Heidi JC Ellis
,
Michael R. Gryk
A Model-Driven Approach to the Automated Creation of ADF Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 247-253
by
Mohammed Alodib
Range Analyzer: An Automatic Tool for Arithmetic Overflow Detection in Model-Based Development
Full-text access may be available. Sign in or learn about subscription options.
pp. 254-259
by
Renato Matuzaki Honda
,
Luiz Alberto Vieira Dias
On Combining Model-Based Analysis and Testing
Full-text access may be available. Sign in or learn about subscription options.
pp. 260-266
by
Mehrdad Saadatmand
,
Mikael Sjodin
Rule-Based Generation of Mobile User Interfaces
Full-text access may be available. Sign in or learn about subscription options.
pp. 267-272
by
Andreas Schuler
,
Barbara Franz
CARD-RM: A Reference Model for Airborne Software
Full-text access may be available. Sign in or learn about subscription options.
pp. 273-279
by
Johnny Cardoso Marques
,
Sarasuaty Megume Hayashi Yelisetty
,
Adilson Marques Da Cunha
,
Luiz Alberto Vieira Dias
Alternative Representation of Aspects
Full-text access may be available. Sign in or learn about subscription options.
pp. 280-285
by
Sabah Al-Fedaghi
Computer Science and Interdisciplinarity: A Case Study on an Undergraduate Program
Full-text access may be available. Sign in or learn about subscription options.
pp. 289-293
by
Adriana Da Silva Jacinto
,
Tatiana Martins Almeri
,
Etiene Lamas
,
Luiz Alberto Vieira Dias
,
Adilson Marques Da Cunha
Learner Satisfaction of E-Learning in Workplace: Case of Oil Company in Middle East
Full-text access may be available. Sign in or learn about subscription options.
pp. 294-298
by
Muhammed Al-Qahtani
,
Mansour Al-Qahtani
,
Hatim Al-Misehal
Utilizing Technology in Education Environment: A Case Study
Full-text access may be available. Sign in or learn about subscription options.
pp. 299-302
by
Basit Shahzad
,
Esam Alwagait
Integration of Root Cause Analysis into a Model-Based Testing Process of a Mobile Switching Server
Full-text access may be available. Sign in or learn about subscription options.
pp. 305-309
by
Mikko Nieminen
,
Tomi Raty
,
Risto Teittinen
Random Cluster Sampling on X-Machines Test Cases
Full-text access may be available. Sign in or learn about subscription options.
pp. 310-316
by
Yasir Imtiaz Khan
,
Sadia Kausar
Encoding Test Requirements as Constraints for Test Suite Minimization
Full-text access may be available. Sign in or learn about subscription options.
pp. 317-322
by
Jose Campos
,
Rui Abreu
The Test Path Generation from State-Based Polymorphic Interaction Graph for Object-Oriented Software
Full-text access may be available. Sign in or learn about subscription options.
pp. 323-330
by
Ching-Seh Wu
,
Chi-Hsin Huang
,
Yen-Ting Lee
Validation of Model-Based Testing in Hardware in the Loop Platform
Full-text access may be available. Sign in or learn about subscription options.
pp. 331-336
by
Janne Keranen
,
Tomi Raty
SynConSMutate: Concolic Testing of Database Applications via Synthetic Data Guided by SQL Mutants
Full-text access may be available. Sign in or learn about subscription options.
pp. 337-342
by
Tanmoy Sarkar
,
Samik Basu
,
Johnny Wong
Towards Test Focus Selection for Integration Testing Using Method Level Software Metrics
Full-text access may be available. Sign in or learn about subscription options.
pp. 343-348
by
Shadi Banitaan
,
Mamdouh Alenezi
,
Kendall Nygard
,
Kenneth Magel
Applying Testing to Enhance Software Product Quality
Full-text access may be available. Sign in or learn about subscription options.
pp. 349-356
by
Etiene Lamas
,
Luiz Alberto Vieira Dias
,
Adilson Marques Da Cunha
Runtime Monitors to Detect and Prevent Union Query Based SQL Injection Attacks
Full-text access may be available. Sign in or learn about subscription options.
pp. 357-362
by
Ramya Dharam
,
Sajjan G. Shiva
Test Case Generation for Modified Code Using a Variant of Particle Swarm Optimization (PSO) Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 363-368
by
Shailesh Tiwari
,
K.K. Mishra
,
A.K. Misra
Automated Test Data Generation for Coupling Based Integration Testing of Object Oriented Programs Using Evolutionary Approaches
Full-text access may be available. Sign in or learn about subscription options.
pp. 369-374
by
Shaukat Ali Khan
,
Aamer Nadeem
Hybrid Usability Methodology: Integrating Heuristic Evaluation with Laboratory Testing across the Software Development Lifecycle
Full-text access may be available. Sign in or learn about subscription options.
pp. 375-383
by
Ashok Sivaji
,
Mohamed Redzuan Abdullah
,
Alan G. Downe
,
Wan Fatimah Wan Ahmad
Improving the Efficiency and Effectiveness of Penetration Test Automation
Full-text access may be available. Sign in or learn about subscription options.
pp. 387-391
by
Kevin P. Haubris
,
Joshua J. Pauli
Reversible Image Hiding Scheme for High Quality Based on Histogram Shifting
Full-text access may be available. Sign in or learn about subscription options.
pp. 392-397
by
Dae-Soo Kim
,
Gil-Je Lee
,
Kee-Young Yoo
Investigation of Static and Dynamic Android Anti-virus Strategies
Full-text access may be available. Sign in or learn about subscription options.
pp. 398-403
by
Yan Ma
,
Mehrdad Sepehri Sharbaf
WLAN Location Privacy: A Client Server Based Architecture
Full-text access may be available. Sign in or learn about subscription options.
pp. 404-410
by
Muhammad Junaid Khan
,
Haider Abbas
Security Concerns in Cloud Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 411-416
by
Issa M. Khalil
,
Abdallah Khreishah
,
Salah Bouktif
,
Azeem Ahmad
White Box AES Using Intel's New AES Instructions
Full-text access may be available. Sign in or learn about subscription options.
pp. 417-421
by
Shay Gueron
Look into My Eyes: A Survey of Biometric Security
Full-text access may be available. Sign in or learn about subscription options.
pp. 422-427
by
Alexander Eng
,
Luay A. Wahsheh
Characteristics of Social Network Fatigue
Full-text access may be available. Sign in or learn about subscription options.
pp. 431-438
by
Thara Ravindran
,
Alton Y.K. Chua
,
Dion Hoe-Lian Goh
Perception and Use of Social Networking Sites among Undergraduate Students in Kuwait
Full-text access may be available. Sign in or learn about subscription options.
pp. 439-444
by
Samir N. Hamade
User Participation in Social Networks: The Case of Balatarin, an Online Persian-Language Social Bookmarking System
Full-text access may be available. Sign in or learn about subscription options.
pp. 445-449
by
Asreen Rostami
The Role of Affect on the Acceptance of Web 2.0 as Organizational Knowledge Sharing Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 450-455
by
Angela Lee Siew Hoong
,
Tong-Ming Lim
,
Rasimah Aripin
Applying the Software-to-Data Paradigm in Next Generation E-Health Hybrid Clouds
Full-text access may be available. Sign in or learn about subscription options.
pp. 459-463
by
Christoph Thuemmler
,
Julius Mueller
,
Stefan Covaci
,
Thomas Magedanz
,
Stefano de Panfilis
,
Thomas Jell
,
Anastasius Gavras
Localized QoS Routing with End-to-End Delay Guarantees
Full-text access may be available. Sign in or learn about subscription options.
pp. 464-472
by
Fahd M. Aldosari
,
Fahad Alradady
Subjective Evaluation of Latency and Packet Loss in a Cloud-Based Game
Full-text access may be available. Sign in or learn about subscription options.
pp. 473-476
by
Victor Clincy
,
Brandon Wilgor
Path-Finding Algorithm for Ground Multiple Sensor Nodes Detection of Quad-rotor-typed UAV
Full-text access may be available. Sign in or learn about subscription options.
pp. 477-482
by
Hanshang Li
,
Ling Wang
,
Shuo Pang
,
Massood Towhidnejad
Flow Control Mechanism for Wireless Network-on-Chip
Full-text access may be available. Sign in or learn about subscription options.
pp. 483-488
by
Ling Wang
,
Zhen Wang
,
Yingtao Jiang
New Approach towards Generation of Automatic Variable Key to Achieve Perfect Security
Full-text access may be available. Sign in or learn about subscription options.
pp. 489-491
by
Rajat Subhra Goswami
,
Swarnendu Kumar Chakraborty
,
Abhinandan Bhunia
,
C.T. Bhunia
A Benchmarking Algorithm to Determine Maximum Stability Data Gathering Trees for Wireless Mobile Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 492-497
by
Natarajan Meghanathan
,
Philip D. Mumford
Multilaterally Secure Communication Anonymity in Decentralized Social Networking
Full-text access may be available. Sign in or learn about subscription options.
pp. 498-504
by
Philipp Schwarte
,
Mohamed Bourimi
,
Marcel Heupel
,
Dogan Kesdogan
,
Rafael Gimenez
,
Sophie Wrobel
,
Simon Thiel
Wireless Broadband Measurement in California
Full-text access may be available. Sign in or learn about subscription options.
pp. 505-509
by
Youngjoon Byun
,
Sathya Narayanan
,
Stephanie Mott
,
Ken Biba
,
Jason Schwenkler
,
Robert Osborn
,
Michael Morris
A Sampling Diagnostics Model for Neural System Training Optimization
Full-text access may be available. Sign in or learn about subscription options.
pp. 510-517
by
Denis Avila Montini
,
Gustavo Ravanhani Matuck
,
Adilson Marques Da Cunha
,
Luiz Alberto Vieira Dias
,
Alexandre Lima Possebon Ribeiro
,
Alessandra Avila Montini
Energy efficient information assured routing based on hybrid optimization algorithm for WSNs
Full-text access may be available. Sign in or learn about subscription options.
pp. 518-524
by
Kashif Saleem
,
Norsheila Fisal
Modeling Cognitive Radio Networks for Efficient Data Transfer Using Cloud Link
Full-text access may be available. Sign in or learn about subscription options.
pp. 525-530
by
Yenumula B. Reddy
,
Stephen Ellis
Supporting of Mobility by Cooperation Nodes in the Wireless Sensor Network Routing
Full-text access may be available. Sign in or learn about subscription options.
pp. 531-537
by
Miresmaeil Mirnabibaboli
,
Mher Markosyan
,
Hassa Hejr
Breast Cancer Segmentation Using Bacterial Foraging Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 541-545
by
R.B. Dubey
,
Sujata Bhatia
,
M. Hanmandlu
,
Shantaram Vasikarla
Parent Selection via Reinforcement Learning in Mesh-Based P2P Video Streaming
Full-text access may be available. Sign in or learn about subscription options.
pp. 546-551
by
Muge Fesci Sayit
,
Yagiz Kaymak
,
Kemal Deniz Teket
,
Cihat Cetinkaya
,
Sercan Demirci
,
Geylani Kardas
A Study on the Bootstrapping Architectures for Scalable Private Reappearing Overlay Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 552-557
by
Chin Teck Min
,
Tong Ming Lim
,
Mauthe Andreas
PARNT: A Statistic based Approach to Extract Non-Taxonomic Relationships of Ontologies from Text
Full-text access may be available. Sign in or learn about subscription options.
pp. 561-566
by
Ivo Serra
,
Rosario Girardi
,
Paulo Novais
The Impact of Body Mass Index on Low Birth Weight
Full-text access may be available. Sign in or learn about subscription options.
pp. 567-572
by
M. Abdollahian
Similarity Search Problem Research on Multi-dimensional Data Sets
Full-text access may be available. Sign in or learn about subscription options.
pp. 573-577
by
Yong Shi
,
Brian Graham
Capability Analysis for Modulus of Elasticity and Modulus of Rupture
Full-text access may be available. Sign in or learn about subscription options.
pp. 578-583
by
M. Abdollahian
Zinc-Protoporphyrin Metabolite Level Affected by Work Environment Stresses
Full-text access may be available. Sign in or learn about subscription options.
pp. 584-589
by
Ray R. Hashemi
,
Mahmood Bahar
,
Azita Bahrami
,
Nicholas R. Tyler
,
Matthew Antonelli
Supply Chain Technology Acceptance, Adoption, and Possible Challenges: A Case Study of Service Organizations of Saudi Arabia
Full-text access may be available. Sign in or learn about subscription options.
pp. 590-595
by
Habib Ullah Khan
,
Shafiq Ahmad
,
Mali Abdollahian
Coupling Recursive Hyperspheric Classification with Linear Discriminant Analysis for Improved Results
Full-text access may be available. Sign in or learn about subscription options.
pp. 596-601
by
Salyer B. Reed
,
Tyson R.C. Reed
,
Sergiu M. Dascalu
Forecasting Wet Land Rice Production for Food Security
Full-text access may be available. Sign in or learn about subscription options.
pp. 602-607
by
M. Abdollahian
,
L. Lasmini
Showing 100 out of 142
Load More
Load All