Default Cover Image

2013 Tenth International Conference on Information Technology: New Generations (ITNG)

April 15 2013 to April 17 2013

Las Vegas, NV, USA

Table of Contents

Title Page iFreely available from IEEE.pp. i-i
Title Page iiiFreely available from IEEE.pp. iii-iii
[Copyright notice]Freely available from IEEE.pp. iv-iv
Table of ContentsFreely available from IEEE.pp. v-xiv
Welcome from the ITNG 2013 General ChairFreely available from IEEE.pp. xv-xv
Conference OrganizationFreely available from IEEE.pp. xvi-xvi
ReviewersFreely available from IEEE.pp. xvii-xvii
Reducing the Impact of Massive Multiplayer Online Games on the Internet Using SCTPFull-text access may be available. Sign in or learn about subscription options.pp. 8-13
SIP: A Simple Tool for Inspecting and Evaluating WSDL SpecificationsFull-text access may be available. Sign in or learn about subscription options.pp. 14-19
Blind Certificates for Secure Electronic VotingFull-text access may be available. Sign in or learn about subscription options.pp. 20-26
Web Portal Usability Tests for the Nevada Climate Change PortalFull-text access may be available. Sign in or learn about subscription options.pp. 39-45
Semi-automated Analysis Software for a Novel Biochemistry AssayFull-text access may be available. Sign in or learn about subscription options.pp. 46-52
Attack Scenario Prediction MethodologyFull-text access may be available. Sign in or learn about subscription options.pp. 53-59
A Comparative Evaluation of Web Services Description ApproachesFull-text access may be available. Sign in or learn about subscription options.pp. 60-64
Modeling a Facilities Management and Information System by UMLFull-text access may be available. Sign in or learn about subscription options.pp. 65-70
A Web-Enabled Approach for Generating Data ProcessorsFull-text access may be available. Sign in or learn about subscription options.pp. 71-76
A Boundary Value Analysis Tool - Design and DescriptionFull-text access may be available. Sign in or learn about subscription options.pp. 77-82
Mining Auto-generated Test Inputs for Test OracleFull-text access may be available. Sign in or learn about subscription options.pp. 89-94
One-Semester CS Capstone: A 40-60 Teaching ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 97-102
Gender Classification with Human Gait Based on Skeleton ModelFull-text access may be available. Sign in or learn about subscription options.pp. 113-118
Experimental Evaluation of Usability HeuristicsFull-text access may be available. Sign in or learn about subscription options.pp. 119-126
Evaluating the Usability of Interactive Digital Television ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 127-132
Assessing the Usability of University Websites in Saudi Arabia: A Heuristic Evaluation ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 138-142
Two Problems of Wavelet Packet TransformFull-text access may be available. Sign in or learn about subscription options.pp. 153-159
Parallelization of discrete stochastic arithmetic on multicore architecturesFull-text access may be available. Sign in or learn about subscription options.pp. 160-166
Digital Image Watermarking for Authentication Based on the Dyadic Wavelet Transform and Interval ArithmeticFull-text access may be available. Sign in or learn about subscription options.pp. 167-172
Some Remarks on the Optimal Error Estimates for the Finite Element Method on the L-Shaped DomainFull-text access may be available. Sign in or learn about subscription options.pp. 173-178
On the Performance of Apache Hadoop in a Tiny Private IaaS CloudFull-text access may be available. Sign in or learn about subscription options.pp. 189-195
Advanced Instruction Folding for an Object-oriented ProcessorFull-text access may be available. Sign in or learn about subscription options.pp. 196-199
Hardware Multi-processor Design for Highly-Demanding ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 200-205
Workload Based Optimization Model for Parallel Disk SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 206-209
An Area-Time Efficient Architecture for 16 x 16 Decimal MultiplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 210-216
A Novel Flash Fast-Locking Digital PLL: Verilog-AMS Modeling and SimulationsFull-text access may be available. Sign in or learn about subscription options.pp. 217-222
Automated Generation of Use Case Diagrams from Problem Frames Using Formal Concept AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 233-240
Parser Combinators: A Practical Application for Generating Parsers for NMR DataFull-text access may be available. Sign in or learn about subscription options.pp. 241-246
A Model-Driven Approach to the Automated Creation of ADF ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 247-253
Range Analyzer: An Automatic Tool for Arithmetic Overflow Detection in Model-Based DevelopmentFull-text access may be available. Sign in or learn about subscription options.pp. 254-259
On Combining Model-Based Analysis and TestingFull-text access may be available. Sign in or learn about subscription options.pp. 260-266
Rule-Based Generation of Mobile User InterfacesFull-text access may be available. Sign in or learn about subscription options.pp. 267-272
Alternative Representation of AspectsFull-text access may be available. Sign in or learn about subscription options.pp. 280-285
Learner Satisfaction of E-Learning in Workplace: Case of Oil Company in Middle EastFull-text access may be available. Sign in or learn about subscription options.pp. 294-298
Utilizing Technology in Education Environment: A Case StudyFull-text access may be available. Sign in or learn about subscription options.pp. 299-302
Integration of Root Cause Analysis into a Model-Based Testing Process of a Mobile Switching ServerFull-text access may be available. Sign in or learn about subscription options.pp. 305-309
Random Cluster Sampling on X-Machines Test CasesFull-text access may be available. Sign in or learn about subscription options.pp. 310-316
Encoding Test Requirements as Constraints for Test Suite MinimizationFull-text access may be available. Sign in or learn about subscription options.pp. 317-322
The Test Path Generation from State-Based Polymorphic Interaction Graph for Object-Oriented SoftwareFull-text access may be available. Sign in or learn about subscription options.pp. 323-330
Validation of Model-Based Testing in Hardware in the Loop PlatformFull-text access may be available. Sign in or learn about subscription options.pp. 331-336
SynConSMutate: Concolic Testing of Database Applications via Synthetic Data Guided by SQL MutantsFull-text access may be available. Sign in or learn about subscription options.pp. 337-342
Towards Test Focus Selection for Integration Testing Using Method Level Software MetricsFull-text access may be available. Sign in or learn about subscription options.pp. 343-348
Applying Testing to Enhance Software Product QualityFull-text access may be available. Sign in or learn about subscription options.pp. 349-356
Runtime Monitors to Detect and Prevent Union Query Based SQL Injection AttacksFull-text access may be available. Sign in or learn about subscription options.pp. 357-362
Test Case Generation for Modified Code Using a Variant of Particle Swarm Optimization (PSO) AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 363-368
Improving the Efficiency and Effectiveness of Penetration Test AutomationFull-text access may be available. Sign in or learn about subscription options.pp. 387-391
Reversible Image Hiding Scheme for High Quality Based on Histogram ShiftingFull-text access may be available. Sign in or learn about subscription options.pp. 392-397
Investigation of Static and Dynamic Android Anti-virus StrategiesFull-text access may be available. Sign in or learn about subscription options.pp. 398-403
WLAN Location Privacy: A Client Server Based ArchitectureFull-text access may be available. Sign in or learn about subscription options.pp. 404-410
Security Concerns in Cloud ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 411-416
White Box AES Using Intel's New AES InstructionsFull-text access may be available. Sign in or learn about subscription options.pp. 417-421
Look into My Eyes: A Survey of Biometric SecurityFull-text access may be available. Sign in or learn about subscription options.pp. 422-427
Characteristics of Social Network FatigueFull-text access may be available. Sign in or learn about subscription options.pp. 431-438
Perception and Use of Social Networking Sites among Undergraduate Students in KuwaitFull-text access may be available. Sign in or learn about subscription options.pp. 439-444
User Participation in Social Networks: The Case of Balatarin, an Online Persian-Language Social Bookmarking SystemFull-text access may be available. Sign in or learn about subscription options.pp. 445-449
The Role of Affect on the Acceptance of Web 2.0 as Organizational Knowledge Sharing SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 450-455
Localized QoS Routing with End-to-End Delay GuaranteesFull-text access may be available. Sign in or learn about subscription options.pp. 464-472
Subjective Evaluation of Latency and Packet Loss in a Cloud-Based GameFull-text access may be available. Sign in or learn about subscription options.pp. 473-476
Path-Finding Algorithm for Ground Multiple Sensor Nodes Detection of Quad-rotor-typed UAVFull-text access may be available. Sign in or learn about subscription options.pp. 477-482
Flow Control Mechanism for Wireless Network-on-ChipFull-text access may be available. Sign in or learn about subscription options.pp. 483-488
Wireless Broadband Measurement in CaliforniaFull-text access may be available. Sign in or learn about subscription options.pp. 505-509
Energy efficient information assured routing based on hybrid optimization algorithm for WSNsFull-text access may be available. Sign in or learn about subscription options.pp. 518-524
Modeling Cognitive Radio Networks for Efficient Data Transfer Using Cloud LinkFull-text access may be available. Sign in or learn about subscription options.pp. 525-530
Supporting of Mobility by Cooperation Nodes in the Wireless Sensor Network RoutingFull-text access may be available. Sign in or learn about subscription options.pp. 531-537
Breast Cancer Segmentation Using Bacterial Foraging AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 541-545
A Study on the Bootstrapping Architectures for Scalable Private Reappearing Overlay NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 552-557
PARNT: A Statistic based Approach to Extract Non-Taxonomic Relationships of Ontologies from TextFull-text access may be available. Sign in or learn about subscription options.pp. 561-566
The Impact of Body Mass Index on Low Birth WeightFull-text access may be available. Sign in or learn about subscription options.pp. 567-572
Similarity Search Problem Research on Multi-dimensional Data SetsFull-text access may be available. Sign in or learn about subscription options.pp. 573-577
Capability Analysis for Modulus of Elasticity and Modulus of RuptureFull-text access may be available. Sign in or learn about subscription options.pp. 578-583
Zinc-Protoporphyrin Metabolite Level Affected by Work Environment StressesFull-text access may be available. Sign in or learn about subscription options.pp. 584-589
Forecasting Wet Land Rice Production for Food SecurityFull-text access may be available. Sign in or learn about subscription options.pp. 602-607
Showing 100 out of 142