Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
ITNG
ITNG 2009
Generate Citations
Information Technology: New Generations, Third International Conference on
Apr. 27 2009 to Apr. 29 2009
Las Vegas, Nevada
ISBN: 978-0-7695-3596-8
Table of Contents
Papers
Citation Analysis: An Approach for Facilitating the Understanding and the Analysis of Regulatory Compliance Documents
Full-text access may be available. Sign in or learn about subscription options.
pp. 278-283
Conference information
Freely available from IEEE.
pp. xxviii-xxx
Papers
[Copyright notice]
Freely available from IEEE.
pp. iv
Papers
Table of contents
Freely available from IEEE.
pp. v-xxvii
Papers
Title Page i
Freely available from IEEE.
pp. i
Papers
Title Page iii
Freely available from IEEE.
pp. iii
Papers
Design Simulation of Top ITO Gratings to Improve Light Transmission for Gallium Nitride LEDs
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Xiaomin Jin
,
Simeon Trieu
,
Fei Wang
,
Bei Zhang
,
Tao Dai
,
Xiangning Kang
,
Guoyi Zhang
Papers
Non-volatile Memory Devices Based on Chalcogenide Materials
Full-text access may be available. Sign in or learn about subscription options.
pp. 5-9
by
Fei Wang
,
Xiaolong Wu
Papers
Dedicated Hardware for Ant Colony Optimization Using Distributed Memory
Full-text access may be available. Sign in or learn about subscription options.
pp. 10-15
by
Masaya Yoshikawa
,
Hidekazu Terai
Papers
A Novel Approach to Scan Detection on the Backbone
Full-text access may be available. Sign in or learn about subscription options.
pp. 16-21
by
Yu Zhang
,
Binxing Fang
Papers
A Remote Sensing Image Segmentation Method Based on Spectral and Texture Information Fusion
Full-text access may be available. Sign in or learn about subscription options.
pp. 22-27
by
Xing Xie
,
Mengliang Liu
,
Leiguang Wang
,
Qianqin Qin
Papers
A Novel Biological Recognition Method Based on Cranio-maxillo-facial Feature Information
Full-text access may be available. Sign in or learn about subscription options.
pp. 28-32
by
Liwen Huang
,
Jing Yang
,
Xiaolong Wu
,
Xiaoqian Hu
Papers
Classification of Quaternary [21s + 4,3] Optimal Self-orthogonal Codes
Full-text access may be available. Sign in or learn about subscription options.
pp. 33-34
by
Xuejun Zhao
,
Ruihu Li
,
Yingjie Lei
Papers
Low Power Ambient Energy Harvesting, Conversion, and Storage Circuits
Full-text access may be available. Sign in or learn about subscription options.
pp. 35-40
by
Faruk Yildiz
Papers
Dynamic Single-Row Routing Technique for Channel Assignments
Full-text access may be available. Sign in or learn about subscription options.
pp. 41-46
by
Shaharuddin Salleh
,
Nor Haniza Sarmin
Papers
A Novel Flash Fast-Locking Digital Phase-Locked Loop
Full-text access may be available. Sign in or learn about subscription options.
pp. 47-52
by
Mahmoud Fawzy Wagdy
,
Brandon Casey Cabrales
Papers
A DPA-Resistant Digit-Parallel Modular Multiplier over GF (2m)
Full-text access may be available. Sign in or learn about subscription options.
pp. 53-57
by
Jianping Quan
,
Guoqiang Bai
Papers
A New Method to Reduce the Side-Channel Leakage Caused by Unbalanced Capacitances of Differential Interconnections in Dual-Rail Logic Styles
Full-text access may be available. Sign in or learn about subscription options.
pp. 58-63
by
Jianping Quan
,
Guoqiang Bai
Papers
Computational Modeling of Cell Survival/ Death Using MATLAB Simulator
Full-text access may be available. Sign in or learn about subscription options.
pp. 64-68
by
Shruti Jain
,
P.K. Naik
,
D.S. Chauhan
,
Rohit Sharma
Papers
Using a Supercapacitor to Power Wireless Nodes from a Low Power Source such as a 3V Button Battery
Full-text access may be available. Sign in or learn about subscription options.
pp. 69-78
by
Pierre Mars
,
Dave McIntosh
Papers
A Novel EKF-GPS Algorithm for Bridge Deformation Monitoring System
Full-text access may be available. Sign in or learn about subscription options.
pp. 79-83
by
Jing Yang
,
Yongquan Wang
,
Min He
,
Fei Wang
,
Xiaolong Wu
Papers
Implementation of Different Function Units Using Flexible and Reconfigurable Architecture
Full-text access may be available. Sign in or learn about subscription options.
pp. 84-89
by
Chao-Jang Hwang
,
Chih-Tung Lin
,
Shi-Jinn Horng
A High-Performance Architecture of an XML Processor for SIP-Based Presence
Full-text access may be available. Sign in or learn about subscription options.
pp. 90-95
by
Fadi El-Hassan
,
Raymond Peterkin
,
Mohamed Abou-Gabal
,
Dan Ionescu
Papers
Processor Allocation Problem for NoC-Based Chip Multiprocessors
Full-text access may be available. Sign in or learn about subscription options.
pp. 96-101
by
Dawid Zydek
,
Henry Selvaraj
Notice of Violation of IEEE Publication Principles: The Explore of the Law Role in Software Requirements Engineering
Full-text access may be available. Sign in or learn about subscription options.
pp. 195-198
by
Xinhao Ji
Papers
A Novel DDFS Based on Trigonometric Approximation with a Scaling Block
Full-text access may be available. Sign in or learn about subscription options.
pp. 102-106
by
Farhad Babak
,
Parviz Keshavarzi
Papers
The Two-Level-Turn-Model Fault-Tolerant Routing Scheme in Tori with Convex and Concave Faults
Full-text access may be available. Sign in or learn about subscription options.
pp. 107-113
by
Lingfu Xie
,
Du Xu
Papers
Generating Rule-Based Executable Process Models for Service Outsourcing
Full-text access may be available. Sign in or learn about subscription options.
pp. 114-118
by
Jae-Yoon Jung
Papers
Integrating Amazonic Heterogeneous Hydrometeorological Databases
Full-text access may be available. Sign in or learn about subscription options.
pp. 119-124
by
Gláucia Braga e Silva
,
Breno Lisi Romano
,
Henrique Fernandes de Campos
,
Ricardo Godoi Vieira
,
Adilson Marques da Cunha
,
Luiz Alberto Vieira Dias
Papers
Lessons Learned from a Survey of Web Applications Testing
Full-text access may be available. Sign in or learn about subscription options.
pp. 125-130
by
Ben Kam
,
Thomas R. Dean
Papers
Formalizing the Management Automation with Workflow of Software Development Process Based on the SPEM Activities View
Full-text access may be available. Sign in or learn about subscription options.
pp. 131-136
by
Daniel Riesco
,
German Montejano
,
Narayan Debnath
,
Manuel Perez Cota
Papers
SOFTWARE PROJECTS FINANCE SUPPORT: Preliminary Talks between Software Project Managers and Potential Investors
Full-text access may be available. Sign in or learn about subscription options.
pp. 137-142
by
Roberto Uzal
,
Narayan Debnath
,
D. Riesco
,
German Montejano
Papers
An Information Retrieval Model for the Semantic Web
Full-text access may be available. Sign in or learn about subscription options.
pp. 143-148
by
Fabio Augusto de Santana Silva
,
Maria del Rosario Girardi
,
Lucas Rego Drumond
Papers
A New Algorithm for Frequent Itemset Generation in Non-Binary Search Space
Full-text access may be available. Sign in or learn about subscription options.
pp. 149-153
by
G. Praveen Kumar
,
Anirban Sarkar
,
Narayan C. Debnath
Papers
A Further Improvement on a Genetic Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 154-159
by
Ian Stewart
,
Wenying Feng
,
Selim Akl
Papers
Google Scholar's Ranking Algorithm: The Impact of Articles' Age (An Empirical Study)
Full-text access may be available. Sign in or learn about subscription options.
pp. 160-164
by
Jöran Beel
,
Bela Gipp
Papers
A Novel Method Combining ORESTE, Fuzzy Set Theory, and TOPSIS Method for Ranking the Information and Communication Technology Research Centers of Iran
Full-text access may be available. Sign in or learn about subscription options.
pp. 165-170
by
Mehdi Fasanghari
,
Maryam Mohamedpour
,
Mohammad Amin Mohamedpour
Papers
Comparison of QOS Fixed and Limited Interleaved Polling with Cyclic Demand Proportionality Algorithms
Full-text access may be available. Sign in or learn about subscription options.
pp. 171-176
by
Sadeta Krijestorac
,
Jonathan Bagby
A Comparison between Relational and Operational QVT Mappings
Full-text access may be available. Sign in or learn about subscription options.
pp. 266-271
by
Pavle Guduric
,
Arno Puder
,
Rainer Todtenhofer
Papers
Improving Job Scheduling in GRID Environments with Use of Simple Machine Learning Methods
Full-text access may be available. Sign in or learn about subscription options.
pp. 177-182
by
Daniel Vladušic
,
Aleš Cernivec
,
Boštjan Slivnik
Papers
Tabu Search for Parallel Machine Scheduling with Job Splitting
Full-text access may be available. Sign in or learn about subscription options.
pp. 183-188
by
Cenk Çelik
,
Inci Saricicek
Papers
Scheduling Algorithm for On-Demand Bus System
Full-text access may be available. Sign in or learn about subscription options.
pp. 189-194
by
Kota Tsubouchi
,
Kazuo Hiekata
,
Hiroyuki Yamato
Papers
The Explore of the Law Role in Software Requirements Engineering
Full-text access may be available. Sign in or learn about subscription options.
pp. 195-198
by
Xinhao Ji
Papers
Clustering and Metrics Thresholds Based Software Fault Prediction of Unlabeled Program Modules
Full-text access may be available. Sign in or learn about subscription options.
pp. 199-204
by
Cagatay Catal
,
Ugur Sevim
,
Banu Diri
Papers
Managing Post-Development Fault Removal
Full-text access may be available. Sign in or learn about subscription options.
pp. 205-210
by
Suzanna Schmeelk
,
Bill Mills
,
Robert Noonan
Papers
TransCPN - Software Tool for Transformation of Colored Petri Nets
Full-text access may be available. Sign in or learn about subscription options.
pp. 211-216
by
Boleslaw Mikolajczak
,
Abhishek Singh
Papers
Two New Algorithms for Software Watermarking by Register Allocation and their Empirical Evaluation
Full-text access may be available. Sign in or learn about subscription options.
pp. 217-222
by
Hakun Lee
,
Keiichi Kaneko
Papers
An Aspect-Based Approach to Checking Design Constraints at Run-Time
Full-text access may be available. Sign in or learn about subscription options.
pp. 223-228
by
Yoonsik Cheon
,
Carmen Avila
,
Steve Roach
,
Cuauhtemoc Munoz
,
Neith Estrada
,
Valeria Fierro
,
Jessica Romo
Papers
Evaluating Test-Driven Development in an Industry-Sponsored Capstone Project
Full-text access may be available. Sign in or learn about subscription options.
pp. 229-234
by
John Huan Vu
,
Niklas Frojd
,
Clay Shenkel-Therolf
,
David S. Janzen
Cross-Organizational Service Evolution Management
Full-text access may be available. Sign in or learn about subscription options.
pp. 332-337
by
Odorico von Susani
,
Philippe Dugerdil
Papers
Security Vulnerabilities and Mitigation Strategies for Application Development
Full-text access may be available. Sign in or learn about subscription options.
pp. 235-240
by
Brunil Dalila Romero Mariño
,
Hisham M. Haddad
Papers
An Agent-Oriented Source-Level Debugger on Top of a Monitoring Framework
Full-text access may be available. Sign in or learn about subscription options.
pp. 241-247
by
Ziad AL-Sharif
,
Clinton Jeffery
Papers
Component-Based Software Architecture Design for Network Intrusion Detection and Prevention System
Full-text access may be available. Sign in or learn about subscription options.
pp. 248-253
by
Jianchao Han
,
Mohsen Beheshti
,
Kazimierz Kowalski
,
Joel Ortiz
,
Johnly Tomelden
Papers
Security Estimation Framework: Design Phase Perspective
Full-text access may be available. Sign in or learn about subscription options.
pp. 254-259
by
Shalini Chandra
,
Raees Ahmad Khan
,
Alka Agrawal
Papers
Software Engineering Challenges in Game Development
Full-text access may be available. Sign in or learn about subscription options.
pp. 260-265
by
Christopher M. Kanode
,
Hisham M. Haddad
Papers
Early Studies in Acquiring Evidentiary, Reusable Business Process Models for Legal Compliance
Full-text access may be available. Sign in or learn about subscription options.
pp. 272-277
by
Travis D. Breaux
,
Calvin Powers
Papers
An Eclipse Plugin for the Automated Reverse-Engineering of Software Programs
Full-text access may be available. Sign in or learn about subscription options.
pp. 284-289
by
Philippe Dugerdil
,
David Kony
,
Javier Belmonte
Papers
A Method for Service Oriented Design
Full-text access may be available. Sign in or learn about subscription options.
pp. 290-295
by
Sedighe Moosavi
,
Mir Ali Seyyedi
,
Nasrollah Moghadam
A Novel Method-Based Software Watermarking Scheme
Full-text access may be available. Sign in or learn about subscription options.
pp. 388-392
by
Jian-qi Zhu
,
Yan-heng Liu
,
Ke-xin Yin
Papers
Highly-Available Web Service Community
Full-text access may be available. Sign in or learn about subscription options.
pp. 296-301
by
Sattanathan Subramanian
Papers
Towards a Goal-Based Service Framework for Dynamic Service Discovery and Composition
Full-text access may be available. Sign in or learn about subscription options.
pp. 302-307
by
Luiz Olavo Bonino da Silva Santos
,
Eduardo Goncalves da Silva
,
Luis Ferreira Pires
,
Marten van Sinderen
Papers
Healthcare Applications Interoperability through Implementation of HL7 Web Service Basic Profile
Full-text access may be available. Sign in or learn about subscription options.
pp. 308-313
by
Maqbool Hussain
,
Muhammad Afzal
,
H. Farooq Ahmad
,
Naeem Khalid
,
Arshad Ali
Papers
An Analysis of Business Models of Web 2.0 Application
Full-text access may be available. Sign in or learn about subscription options.
pp. 314-319
by
Shari S.C. Shang
,
Ya-Ling Wu
,
Oliver C.L. Hou
Papers
A Secure Billing Protocol for Grid Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 320-325
by
Chia-Hui Wei
,
Yeo-Hao Chin
,
Chun-Ta Li
Papers
A Heuristic Model of Network-Based Group Decision Making for E-Services
Full-text access may be available. Sign in or learn about subscription options.
pp. 326-331
by
Wei-Lun Chang
,
Yi-Ping Lo
,
Yu-Ting Hong
Papers
Obstacle Avoidance for Utility-Based Geocasting
Full-text access may be available. Sign in or learn about subscription options.
pp. 338-343
by
Fernando J. Maymi
,
Manuel Rodriguez-Martinez
T-PIM: Trusted Password Input Method against Data Stealing Malware
Full-text access may be available. Sign in or learn about subscription options.
pp. 429-434
by
Manabu Hirano
,
Tomohiro Umeda
,
Takeshi Okuda
,
Eiji Kawai
,
Suguru Yamaguchi
Papers
Leveraging Parent Mitigations and Threats for CAPEC-Driven Hierarchies
Full-text access may be available. Sign in or learn about subscription options.
pp. 344-349
by
Patrick H. Engebretson
,
Joshua J. Pauli
Papers
A Multi-Signature Scheme Based on Two Difficult Mathematics Problems
Full-text access may be available. Sign in or learn about subscription options.
pp. 350-355
by
Bin Sun
,
Wang Chuan
,
Jiang Li
,
Legand Burge
Papers
The Design of Boolean Functions by Modified Hill Climbing Method
Full-text access may be available. Sign in or learn about subscription options.
pp. 356-361
by
Yuriy Izbenko
,
Vladislav Kovtun
,
Alexandr Kuznetsov
Papers
Construction of Anti-Collusion Codes Based on Cover-Free Families
Full-text access may be available. Sign in or learn about subscription options.
pp. 362-365
by
Qiaoliang Li
,
Xiaoming Wang
,
Yingshu Li
,
Yi Pan
,
Pingzhi Fan
Papers
A Robust Audio Aggregate Zero-Watermark Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 366-370
by
Yiqun Xiong
,
Rangding Wang
Papers
Attacks on a Block Based SVD Watermarking Scheme
Full-text access may be available. Sign in or learn about subscription options.
pp. 371-375
by
Huo-Chong Ling
,
Swee-Huay Heng
,
Bok-Min Goi
Papers
A New Steganography Scheme Based on an Index-Color Image
Full-text access may be available. Sign in or learn about subscription options.
pp. 376-381
by
Se-Min Kim
,
Ziqiang Cheng
,
Kee-Young Yoo
Papers
A Peer-to-Peer Federated Authentication System
Full-text access may be available. Sign in or learn about subscription options.
pp. 382-387
by
Myong Kang
,
Amitabh Khashnobish
Papers
Automated Risk and Utility Management
Full-text access may be available. Sign in or learn about subscription options.
pp. 393-398
by
Andreas Ekelhart
,
Thomas Neubauer
,
Stefan Fenz
Papers
An Authentication System Based on Palmprint
Full-text access may be available. Sign in or learn about subscription options.
pp. 399-404
by
Hanmandlu Madasu
,
H.M.Gupta
,
Neha Mittal
,
Shantaram Vasikarla
Papers
An Anti-Phishing Approach that Uses Training Intervention for Phishing Websites Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 405-410
by
Abdullah Alnajim
,
Malcolm Munro
Papers
Evaluation of Two Privacy-Preserving Protocols for the DNS
Full-text access may be available. Sign in or learn about subscription options.
pp. 411-416
by
Sergio Castillo-Perez
,
Joaquin Garcia-Alfaro
Papers
Efficient Short Signatures from Pairing
Full-text access may be available. Sign in or learn about subscription options.
pp. 417-422
by
Raylin Tso
,
Takeshi Okamoto
,
Eiji Okamoto
Papers
Security in Wireless Mesh Networks: Challenges and Solutions
Full-text access may be available. Sign in or learn about subscription options.
pp. 423-428
by
Ping Yi
,
Tianhao Tong
,
Ning Liu
,
Yue Wu
,
Jianqing Ma
Notice of Violation of IEEE Publication Principles: Radiation Emission EMC Measurement in Real-Time
Full-text access may be available. Sign in or learn about subscription options.
pp. 528-533
by
Fahim G. Awan
,
Noor M. Sheikh
,
Fawad Munir
Papers
Federated Authentication Mechanism using Cellular Phone - Collaboration with OpenID
Full-text access may be available. Sign in or learn about subscription options.
pp. 435-442
by
Ryu Watanabe
,
Toshiaki Tanaka
Papers
Bisimulations in the Boxed Safe Ambients with Password
Full-text access may be available. Sign in or learn about subscription options.
pp. 443-448
by
Jiang Hua
,
Tan Xinxing
Papers
A Verifiable Electronic Voting Scheme over the Internet
Full-text access may be available. Sign in or learn about subscription options.
pp. 449-454
by
Chun-Ta Li
,
Min-Shiang Hwang
,
Yan-Chi Lai
Papers
Practical Power Analysis Attacks to RSA on a Large IP Portfolio SoC
Full-text access may be available. Sign in or learn about subscription options.
pp. 455-460
by
Guido Marco Bertoni
,
Luca Breveglieri
,
Alessandro Cominola
,
Filippo Melzani
,
Ruggero Susella
Papers
Extending l-Diversity for Better Data Anonymization
Full-text access may be available. Sign in or learn about subscription options.
pp. 461-466
by
Hongwei Tian
,
Weining Zhang
Papers
Component Based Information Network for Computer Security
Full-text access may be available. Sign in or learn about subscription options.
pp. 467-469
by
Joel Ortiz
,
Johnly Tomelden
,
Mohsen Beheshti
,
Kazimierz Kowalski
,
Jianchao Han
Papers
Message Encryption Scheme Using Cheating Text
Full-text access may be available. Sign in or learn about subscription options.
pp. 470-474
by
Ch. Rupa
,
P.S. Avadhani
Papers
Optimal Network Security Strengthening Using Attack-Defense Game Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 475-480
by
Wei Jiang
,
Bin-xing Fang
,
Hong-li Zhang
,
Zhi-hong Tian
,
Xin-fang Song
A Service-Oriented Middleware for Wireless Sensor and Actor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 575-580
by
Eduardo Cañete
,
Jaime Chen
,
Manuel Díaz
,
Luis Llopis
,
Bartolomé Rubio
Papers
Deception Detection Based on SVM for Chinese Text in CMC
Full-text access may be available. Sign in or learn about subscription options.
pp. 481-486
by
Hu Zhang
,
Shan-de Wei
,
Hong-ye Tan
,
Jia-heng Zheng
Papers
An Efficient and Reliable Time Variant Three-Entity and Data Authentication of Remote User Using Smart card
Full-text access may be available. Sign in or learn about subscription options.
pp. 487-491
by
C. Koner
,
C.T. Bhunia
,
U. Maulik
Papers
Multi-Layered Defense against Web Application Attacks
Full-text access may be available. Sign in or learn about subscription options.
pp. 492-497
by
Abdul Razzaq
,
Ali Hur
,
Nasir Haider
,
Farooq Ahmad
Papers
An Efficient PRNG Based on the Hybrid between One- and Two-Dimensional Cellular Automata
Full-text access may be available. Sign in or learn about subscription options.
pp. 498-503
by
Sang-Ho Shin
,
Kee-Young Yoo
Papers
Authenticated Dictionary-Based Attribute Sharing in Federated Identity Management
Full-text access may be available. Sign in or learn about subscription options.
pp. 504-509
by
Dongwan Shin
,
Rodrigo Lopes
,
William Claycomb
Papers
Application of Game Theory for Cross-layer Design in Cognitive Wireless Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 510-515
by
Y.B. Reddy
,
Cliff Bullmaster
Papers
Reconfigurable Relaying Topology in Cognitive Multihop Wireless Networks with Nonuniform Temporal and Spatial Traffic Distribution
Full-text access may be available. Sign in or learn about subscription options.
pp. 516-523
by
Beatriz Lorenzo
,
Savo Glisic
Papers
A Distributed Coverage-Aware Sleep Scheduling Algorithm for Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 524-527
by
Fangyang Shen
,
Chunlei Liu
,
Jun Zhang
Papers
Radiation Emission EMC Measurement in Real-Time
Full-text access may be available. Sign in or learn about subscription options.
pp. 528-533
by
Fahim G. Awan
,
Noor M. Sheikh
,
Fawad Munir
Showing 100 out of 342
Load More
Load All