Default Cover Image

Proceedings. Third International Conference on Information Technology: New Generation

April 10 2006 to April 12 2006

Las Vegas, NV

Table of Contents

Session TC1: Posters
Effectively implement AES for EFI/Tiano based on IA-32 PlatformFull-text access may be available. Sign in or learn about subscription options.pp. 570
Introduction
General Chair's messageFreely available from IEEE.pp. xv
Third International Conference on Information Technology: New Generations - tocFreely available from IEEE.pp. v,vi,vii,viii,ix,x,xi,xii,xiii,xiv
Introduction
ReviewersFreely available from IEEE.pp. xvi
Session MA1: IT Education
Six Sigma in Education: To Achieve Overall Excellence in the Field of EducationFull-text access may be available. Sign in or learn about subscription options.pp. 2-5
Session MA1: IT Education
Hiring the IT Graduate: What?s in the Box?Full-text access may be available. Sign in or learn about subscription options.pp. 6-10
Session MA1: IT Education
Implications of IT in Different ProfessionsFull-text access may be available. Sign in or learn about subscription options.pp. 11-19
Session MA2: Software Engineering I
Decoupling Security Concerns in Web Services Using AspectsFull-text access may be available. Sign in or learn about subscription options.pp. 20-27
Session MA2: Software Engineering I
Integrated Collections: Approach to Software Component ReuseFull-text access may be available. Sign in or learn about subscription options.pp. 28-33
Session MA2: Software Engineering I
An Agglomerative Clustering Methodology For Data ImputationFull-text access may be available. Sign in or learn about subscription options.pp. 34-39
Session MA2: Software Engineering I
Cost Implications of Software Commonality and ReuseFull-text access may be available. Sign in or learn about subscription options.pp. 40-45
Session MA2: Software Engineering I
On OO Design Consistency in Iterative DevelopmentFull-text access may be available. Sign in or learn about subscription options.pp. 46-51
Session MA2: Software Engineering I
Reliable Deployment of Component-based Applications into Distributed EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 52-57
Session MA2: Software Engineering I
Modular Model of a Logic Circuit Using Object-Oriented ProgrammingFull-text access may be available. Sign in or learn about subscription options.pp. 58-65
Session MA3: Software Engineering II
A Language for Writing Formal Software Specifications: The Library Problem RevisitedFull-text access may be available. Sign in or learn about subscription options.pp. 66-71
Session MA3: Software Engineering II
A First Draft of RATF: A Method Combining Robustness Analysis and Technology ForecastingFull-text access may be available. Sign in or learn about subscription options.pp. 72-77
Session MA3: Software Engineering II
Studying Software Implementations of Elliptic Curve CryptographyFull-text access may be available. Sign in or learn about subscription options.pp. 78-83
Session MA3: Software Engineering II
Novel Approach for Remote Energy Meter Reading Using Mobile AgentsFull-text access may be available. Sign in or learn about subscription options.pp. 84-89
Session MA3: Software Engineering II
RL-Agent That Learns in Collaborative Virtual EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 90-95
Session MA3: Software Engineering II
On History-Sensitive Models of Interactive StacksFull-text access may be available. Sign in or learn about subscription options.pp. 96-103
Session MA3: Software Engineering II
New Algorithms For Random Access Text CompressionFull-text access may be available. Sign in or learn about subscription options.pp. 104-111
Session MA4: Software Engineering III
Integrating Non-Functional Properties to Architecture Specification and AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 112-117
Session MA4: Software Engineering III
Production and Maintenance of Content-Intensive Videogames: A Document-Oriented ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 118-123
Session MA4: Software Engineering III
Integrating Change Management with Software Document Relationship ManagementFull-text access may be available. Sign in or learn about subscription options.pp. 124-130
Session MA4: Software Engineering III
Agent Launch Pattern for Creating AgentsFull-text access may be available. Sign in or learn about subscription options.pp. 131-136
Session MA4: Software Engineering III
The Legal and Political Aspects of Software Piracy in the Arab WorldFull-text access may be available. Sign in or learn about subscription options.pp. 137-142
Session MA4: Software Engineering III
Degree of Freedom ― Experience of Applying Software FrameworkFull-text access may be available. Sign in or learn about subscription options.pp. 143-148
Session MA4: Software Engineering III
Rethinking ProgrammingFull-text access may be available. Sign in or learn about subscription options.pp. 149-154
Session MA4: Software Engineering III
Measurement of Intra-Class & Inter-Class Weakness for Object-Oriented SoftwareFull-text access may be available. Sign in or learn about subscription options.pp. 155-160
Session MA4: Software Engineering III
An Investigation of Bad Smells in Object-Oriented DesignFull-text access may be available. Sign in or learn about subscription options.pp. 161-165
Session MB1: Embedded Cryptographic Systems I
Two-Party Private Vector Dominance: The All-Or-Nothing DealFull-text access may be available. Sign in or learn about subscription options.pp. 166-171
Session MB1: Embedded Cryptographic Systems I
Efficient Implementation of Galois Field Fixed Field Constant MultiplicationFull-text access may be available. Sign in or learn about subscription options.pp. 172-177
Session MB1: Embedded Cryptographic Systems I
Efficient Methods in Converting to Modulo 2^n+1 and 2^n-1Full-text access may be available. Sign in or learn about subscription options.pp. 178-185
Session MB2: Embedded Cryptographic Systems II
Parallel Hardware Architectures for the Cryptographic Tate PairingFull-text access may be available. Sign in or learn about subscription options.pp. 186-191
Session MB2: Embedded Cryptographic Systems II
An Embedded Processor for a Pairing-Based CryptosystemFull-text access may be available. Sign in or learn about subscription options.pp. 192-197
Session MB2: Embedded Cryptographic Systems II
Efficient Authenticated Key-Exchange for Devices with a Trusted ManagerFull-text access may be available. Sign in or learn about subscription options.pp. 198-203
Session MB2: Embedded Cryptographic Systems II
Side-Channel Leakage Tolerant ArchitecturesFull-text access may be available. Sign in or learn about subscription options.pp. 204-209
Session MB2: Embedded Cryptographic Systems II
Four Hardware Implementations for the M-ary Modular ExponentiationFull-text access may be available. Sign in or learn about subscription options.pp. 210-215
Session MB2: Embedded Cryptographic Systems II
A Compact Piplined Hardware Implementation of the AES-128 CipherFull-text access may be available. Sign in or learn about subscription options.pp. 216-221
Session MB3: High Performance Computer Architectures
K-Selector-Based Dispatching Algorithm for Clos-Network SwitchesFull-text access may be available. Sign in or learn about subscription options.pp. 222-226
Session MB3: High Performance Computer Architectures
Instruction Format Based Selective Execution for Register Port Complexity Reduction in High-Performance ProcessorsFull-text access may be available. Sign in or learn about subscription options.pp. 227-232
Session MB3: High Performance Computer Architectures
Evaluating Parallel Computing Systems in BioinformaticsFull-text access may be available. Sign in or learn about subscription options.pp. 233-238
Session MB3: High Performance Computer Architectures
RDT Properties and EvaluationsFull-text access may be available. Sign in or learn about subscription options.pp. 239-244
Session MB3: High Performance Computer Architectures
A Reconfigurable Architecture for Wireless Communication SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 250-255
Session MB4: Sensor Networks
Data Aggregation in Distributed Sensor Networks: Towards An Adaptive Timing ControlFull-text access may be available. Sign in or learn about subscription options.pp. 256-261
Session MB4: Sensor Networks
COSEN: A Chain Oriented Sensor Network for Efficient Data CollectionFull-text access may be available. Sign in or learn about subscription options.pp. 262-267
Session MB4: Sensor Networks
Interference Aware Dominating Set for Sensor NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 268-273
Session MB4: Sensor Networks
Improved Maximum Likelihood Estimation of Target Position in Wireless Sensor Networks using Particle Swarm OptimizationFull-text access may be available. Sign in or learn about subscription options.pp. 274-279
Session MB4: Sensor Networks
Efficient RBS in Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 279-284
Session MB4: Sensor Networks
Reliable Multipath Information Dissemination via Label Forwarding in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 285-293
Session TA1: Mobile Enterprise I
Mobile Terminated SMS Billing — Exploits and Security AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 294-299
Session TA1: Mobile Enterprise I
SmartDOTS - A Framework for Efficient Data Synchronization on Mobile DevicesFull-text access may be available. Sign in or learn about subscription options.pp. 300-305
Session TA1: Mobile Enterprise I
MARKS (Middleware Adaptability for Resource Discovery, Knowledge Usability and Self-healing) for Mobile Devices of Pervasive Computing EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 306-313
Session TA2: Mobile Enterprise II
Consumer Value Segments in Mobile Bill PayingFull-text access may be available. Sign in or learn about subscription options.pp. 314-319
Session TA2: Mobile Enterprise II
Government as a Mobile Enterprise: Real-time, Ubiquitous GovernmentFull-text access may be available. Sign in or learn about subscription options.pp. 320-327
Session TA2: Mobile Enterprise II
SelectiveDES: A Distributed Event Service Add-On for Invocation-Based Middleware supporting Selective Multi-Channel Communication and Notification DeliveryFull-text access may be available. Sign in or learn about subscription options.pp. 328-333
Session TA2: Mobile Enterprise II
Internet Mobility using SIP and MIPFull-text access may be available. Sign in or learn about subscription options.pp. 334-339
Session TA2: Mobile Enterprise II
A Dynamic Mobility Management Scheme for VoIP ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 340-345
Session TA2: Mobile Enterprise II
Mobile Payment Solution — Symbiosis Between Banks, Application Service Providers and Mobile NetworkOperatorsFull-text access may be available. Sign in or learn about subscription options.pp. 346-350
Session TA2: Mobile Enterprise II
Secure ICT Services for Mobile and Wireless Communications: A Federated Global Identity Management FrameworkFull-text access may be available. Sign in or learn about subscription options.pp. 351-357
Session TA3: Web Technologies
Using the Web to Construct Taxonomy for a Heterogeneous Community of PracticeFull-text access may be available. Sign in or learn about subscription options.pp. 358-363
Session TA3: Web Technologies
Feature and Prototype Evolution for Nearest Neighbor Classification of Web DocumentsFull-text access may be available. Sign in or learn about subscription options.pp. 364-369
Session TA3: Web Technologies
Overlap Among Major Web Search EnginesFull-text access may be available. Sign in or learn about subscription options.pp. 370-374
Session TA3: Web Technologies
A General Classification of (Search) Queries and TermsFull-text access may be available. Sign in or learn about subscription options.pp. 375-381
Session TA3: Web Technologies
An Automated WSDL Generation and Enhanced SOAP Message Processing System for Mobile Web ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 382-387
Session TA3: Web Technologies
Web Page Recommender System based on Folksonomy Mining for ITNG ?06 SubmissionsFull-text access may be available. Sign in or learn about subscription options.pp. 388-393
Session TA3: Web Technologies
A Study of Self-Organizing Map in Interactive Relevance FeedbackFull-text access may be available. Sign in or learn about subscription options.pp. 394-401
Session TA4: Internet and Wireless Security
Group Key Management in Wireless Networks Using Session KeysFull-text access may be available. Sign in or learn about subscription options.pp. 402-407
Session TA4: Internet and Wireless Security
Anomaly Detection in SMTP TrafficFull-text access may be available. Sign in or learn about subscription options.pp. 408-413
Session TA4: Internet and Wireless Security
A Secure Group Key Management Scheme for Wireless Cellular NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 414-419
Session TA4: Internet and Wireless Security
Anomaly Detection Based Intrusion DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 420-425
Session TA4: Internet and Wireless Security
Secure Two-Way Transfer of Measurement DataFull-text access may be available. Sign in or learn about subscription options.pp. 426-431
Session TA4: Internet and Wireless Security
Efficient Group Key Management in Wireless NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 432-439
Session TB1: Information Security and Privacy I
New Method for Risk Management in CRM Security ManagementFull-text access may be available. Sign in or learn about subscription options.pp. 440-445
Session TB1: Information Security and Privacy I
Intelligent Technologies for Managing Fraud and Identity TheftFull-text access may be available. Sign in or learn about subscription options.pp. 446-451
Session TB1: Information Security and Privacy I
Analysis of Log Files Intersections for Security EnhancementFull-text access may be available. Sign in or learn about subscription options.pp. 452-457
Session TB2: Information Security and Privacy II
The Design and Implementation of a Smartphone Payment System based on Limited-used Key Generation SchemeFull-text access may be available. Sign in or learn about subscription options.pp. 458-463
Session TB2: Information Security and Privacy II
Sequential and Parallel Cascaded Convolutional Encryption with Local Propagation: Toward Future Directions in Symmetric CryptographyFull-text access may be available. Sign in or learn about subscription options.pp. 464-469
Session TB2: Information Security and Privacy II
A Study on the Security of Privacy HomomorphismFull-text access may be available. Sign in or learn about subscription options.pp. 470-475
Session TB2: Information Security and Privacy II
An Efficient and Secure Code Sharing for Peer-to-Peer CommunicationsFull-text access may be available. Sign in or learn about subscription options.pp. 476-481
Session TB2: Information Security and Privacy II
A Copyright Protection Scheme for Gray-Level Images Using Human FingerprintFull-text access may be available. Sign in or learn about subscription options.pp. 482-489
Session TB3: Data Mining and Checkpointing
Mining Documents in a Small Enterprise Using WordStatFull-text access may be available. Sign in or learn about subscription options.pp. 490-494
Session TB3: Data Mining and Checkpointing
Web Usability Testing ― CARE MethodologyFull-text access may be available. Sign in or learn about subscription options.pp. 495-500
Session TB3: Data Mining and Checkpointing
A Hybrid Approach to Error Reduction of Support Vector Machines in Document ClassificationFull-text access may be available. Sign in or learn about subscription options.pp. 501-506
Session TB3: Data Mining and Checkpointing
Knowledge Discovery in Power Quality Data Using Support Vector Machine and S-TransformFull-text access may be available. Sign in or learn about subscription options.pp. 507-512
Session TB3: Data Mining and Checkpointing
Closed Multidimensional Sequential Pattern MiningFull-text access may be available. Sign in or learn about subscription options.pp. 512-517
Session TB3: Data Mining and Checkpointing
A Two-Phase Time-based Consistent Checkpointing StrategyFull-text access may be available. Sign in or learn about subscription options.pp. 518-523
Session TB4: VoIP/Signal Processing
Adding High Level VoIP Facilities to the Unicon LanguageFull-text access may be available. Sign in or learn about subscription options.pp. 524-529
Session TB4: VoIP/Signal Processing
A Peer to Peer Prefix Patching Scheme for VOD ServersFull-text access may be available. Sign in or learn about subscription options.pp. 530-534
Session TB4: VoIP/Signal Processing
Bandwidth-Conserving Real-Time VoIP Teleconference SystemFull-text access may be available. Sign in or learn about subscription options.pp. 535-540
Session TB4: VoIP/Signal Processing
An Improved Feature Selection using Maximized Signal to Noise Ratio Technique for TCFull-text access may be available. Sign in or learn about subscription options.pp. 541-546
Session TB4: VoIP/Signal Processing
Mixed Noise Correction in Gray Images using Fuzzy FiltersFull-text access may be available. Sign in or learn about subscription options.pp. 547-553
Session TB4: VoIP/Signal Processing
Parameterized FIR Filtering IP Cores for Reusable SoC DesignFull-text access may be available. Sign in or learn about subscription options.pp. 554-559
Session TC1: Posters
A New Bucket-Based A New Bucket-Based Algorithm for Finding LCS from two given Molecular SequencesFull-text access may be available. Sign in or learn about subscription options.pp. 560-561
Session TC1: Posters
Performance-Guided Reconfiguration of Wireless Sensor Networks that Use Binary Data for Target LocalizationFull-text access may be available. Sign in or learn about subscription options.pp. 562-565
Session TC1: Posters
Key Pre-Distribution Using MDS Codes in Mobile Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 566-567
Session TC1: Posters
Key Management and Mutual Authentication for Multiple Field Records Smart CardsFull-text access may be available. Sign in or learn about subscription options.pp. 568-569
Showing 100 out of 140