Default Cover Image

Information Technology: New Generations, Third International Conference on

Apr. 27 2009 to Apr. 29 2009

Las Vegas, Nevada

ISBN: 978-0-7695-3596-8

Table of Contents

Papers
Citation Analysis: An Approach for Facilitating the Understanding and the Analysis of Regulatory Compliance DocumentsFull-text access may be available. Sign in or learn about subscription options.pp. 278-283
Conference informationFreely available from IEEE.pp. xxviii-xxx
Papers
[Copyright notice]Freely available from IEEE.pp. iv
Papers
Table of contentsFreely available from IEEE.pp. v-xxvii
Papers
Title Page iFreely available from IEEE.pp. i
Papers
Title Page iiiFreely available from IEEE.pp. iii
Papers
Non-volatile Memory Devices Based on Chalcogenide MaterialsFull-text access may be available. Sign in or learn about subscription options.pp. 5-9
Papers
Dedicated Hardware for Ant Colony Optimization Using Distributed MemoryFull-text access may be available. Sign in or learn about subscription options.pp. 10-15
Papers
A Novel Approach to Scan Detection on the BackboneFull-text access may be available. Sign in or learn about subscription options.pp. 16-21
Papers
A Remote Sensing Image Segmentation Method Based on Spectral and Texture Information FusionFull-text access may be available. Sign in or learn about subscription options.pp. 22-27
Papers
A Novel Biological Recognition Method Based on Cranio-maxillo-facial Feature InformationFull-text access may be available. Sign in or learn about subscription options.pp. 28-32
Papers
Classification of Quaternary [21s + 4,3] Optimal Self-orthogonal CodesFull-text access may be available. Sign in or learn about subscription options.pp. 33-34
Papers
Low Power Ambient Energy Harvesting, Conversion, and Storage CircuitsFull-text access may be available. Sign in or learn about subscription options.pp. 35-40
Papers
Dynamic Single-Row Routing Technique for Channel AssignmentsFull-text access may be available. Sign in or learn about subscription options.pp. 41-46
Papers
A Novel Flash Fast-Locking Digital Phase-Locked LoopFull-text access may be available. Sign in or learn about subscription options.pp. 47-52
Papers
A DPA-Resistant Digit-Parallel Modular Multiplier over GF (2m)Full-text access may be available. Sign in or learn about subscription options.pp. 53-57
Papers
Computational Modeling of Cell Survival/ Death Using MATLAB SimulatorFull-text access may be available. Sign in or learn about subscription options.pp. 64-68
Papers
Using a Supercapacitor to Power Wireless Nodes from a Low Power Source such as a 3V Button BatteryFull-text access may be available. Sign in or learn about subscription options.pp. 69-78
Papers
A Novel EKF-GPS Algorithm for Bridge Deformation Monitoring SystemFull-text access may be available. Sign in or learn about subscription options.pp. 79-83
Papers
Implementation of Different Function Units Using Flexible and Reconfigurable ArchitectureFull-text access may be available. Sign in or learn about subscription options.pp. 84-89
A High-Performance Architecture of an XML Processor for SIP-Based PresenceFull-text access may be available. Sign in or learn about subscription options.pp. 90-95
Papers
Processor Allocation Problem for NoC-Based Chip MultiprocessorsFull-text access may be available. Sign in or learn about subscription options.pp. 96-101
Notice of Violation of IEEE Publication Principles: The Explore of the Law Role in Software Requirements EngineeringFull-text access may be available. Sign in or learn about subscription options.pp. 195-198
Papers
A Novel DDFS Based on Trigonometric Approximation with a Scaling BlockFull-text access may be available. Sign in or learn about subscription options.pp. 102-106
Papers
The Two-Level-Turn-Model Fault-Tolerant Routing Scheme in Tori with Convex and Concave FaultsFull-text access may be available. Sign in or learn about subscription options.pp. 107-113
Papers
Generating Rule-Based Executable Process Models for Service OutsourcingFull-text access may be available. Sign in or learn about subscription options.pp. 114-118
Papers
Lessons Learned from a Survey of Web Applications TestingFull-text access may be available. Sign in or learn about subscription options.pp. 125-130
Papers
An Information Retrieval Model for the Semantic WebFull-text access may be available. Sign in or learn about subscription options.pp. 143-148
Papers
A New Algorithm for Frequent Itemset Generation in Non-Binary Search SpaceFull-text access may be available. Sign in or learn about subscription options.pp. 149-153
Papers
A Further Improvement on a Genetic AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 154-159
Papers
Google Scholar's Ranking Algorithm: The Impact of Articles' Age (An Empirical Study)Full-text access may be available. Sign in or learn about subscription options.pp. 160-164
Papers
Comparison of QOS Fixed and Limited Interleaved Polling with Cyclic Demand Proportionality AlgorithmsFull-text access may be available. Sign in or learn about subscription options.pp. 171-176
A Comparison between Relational and Operational QVT MappingsFull-text access may be available. Sign in or learn about subscription options.pp. 266-271
Papers
Improving Job Scheduling in GRID Environments with Use of Simple Machine Learning MethodsFull-text access may be available. Sign in or learn about subscription options.pp. 177-182
Papers
Tabu Search for Parallel Machine Scheduling with Job SplittingFull-text access may be available. Sign in or learn about subscription options.pp. 183-188
Papers
Scheduling Algorithm for On-Demand Bus SystemFull-text access may be available. Sign in or learn about subscription options.pp. 189-194
Papers
The Explore of the Law Role in Software Requirements EngineeringFull-text access may be available. Sign in or learn about subscription options.pp. 195-198
Papers
Clustering and Metrics Thresholds Based Software Fault Prediction of Unlabeled Program ModulesFull-text access may be available. Sign in or learn about subscription options.pp. 199-204
Papers
Managing Post-Development Fault RemovalFull-text access may be available. Sign in or learn about subscription options.pp. 205-210
Papers
TransCPN - Software Tool for Transformation of Colored Petri NetsFull-text access may be available. Sign in or learn about subscription options.pp. 211-216
Papers
Two New Algorithms for Software Watermarking by Register Allocation and their Empirical EvaluationFull-text access may be available. Sign in or learn about subscription options.pp. 217-222
Papers
An Aspect-Based Approach to Checking Design Constraints at Run-TimeFull-text access may be available. Sign in or learn about subscription options.pp. 223-228
Papers
Evaluating Test-Driven Development in an Industry-Sponsored Capstone ProjectFull-text access may be available. Sign in or learn about subscription options.pp. 229-234
Cross-Organizational Service Evolution ManagementFull-text access may be available. Sign in or learn about subscription options.pp. 332-337
Papers
Security Vulnerabilities and Mitigation Strategies for Application DevelopmentFull-text access may be available. Sign in or learn about subscription options.pp. 235-240
Papers
An Agent-Oriented Source-Level Debugger on Top of a Monitoring FrameworkFull-text access may be available. Sign in or learn about subscription options.pp. 241-247
Papers
Security Estimation Framework: Design Phase PerspectiveFull-text access may be available. Sign in or learn about subscription options.pp. 254-259
Papers
Software Engineering Challenges in Game DevelopmentFull-text access may be available. Sign in or learn about subscription options.pp. 260-265
Papers
Early Studies in Acquiring Evidentiary, Reusable Business Process Models for Legal ComplianceFull-text access may be available. Sign in or learn about subscription options.pp. 272-277
Papers
An Eclipse Plugin for the Automated Reverse-Engineering of Software ProgramsFull-text access may be available. Sign in or learn about subscription options.pp. 284-289
Papers
A Method for Service Oriented DesignFull-text access may be available. Sign in or learn about subscription options.pp. 290-295
A Novel Method-Based Software Watermarking SchemeFull-text access may be available. Sign in or learn about subscription options.pp. 388-392
Papers
Highly-Available Web Service CommunityFull-text access may be available. Sign in or learn about subscription options.pp. 296-301
Papers
Healthcare Applications Interoperability through Implementation of HL7 Web Service Basic ProfileFull-text access may be available. Sign in or learn about subscription options.pp. 308-313
Papers
An Analysis of Business Models of Web 2.0 ApplicationFull-text access may be available. Sign in or learn about subscription options.pp. 314-319
Papers
A Secure Billing Protocol for Grid ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 320-325
Papers
A Heuristic Model of Network-Based Group Decision Making for E-ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 326-331
Papers
Obstacle Avoidance for Utility-Based GeocastingFull-text access may be available. Sign in or learn about subscription options.pp. 338-343
T-PIM: Trusted Password Input Method against Data Stealing MalwareFull-text access may be available. Sign in or learn about subscription options.pp. 429-434
Papers
Leveraging Parent Mitigations and Threats for CAPEC-Driven HierarchiesFull-text access may be available. Sign in or learn about subscription options.pp. 344-349
Papers
A Multi-Signature Scheme Based on Two Difficult Mathematics ProblemsFull-text access may be available. Sign in or learn about subscription options.pp. 350-355
Papers
The Design of Boolean Functions by Modified Hill Climbing MethodFull-text access may be available. Sign in or learn about subscription options.pp. 356-361
Papers
Construction of Anti-Collusion Codes Based on Cover-Free FamiliesFull-text access may be available. Sign in or learn about subscription options.pp. 362-365
Papers
A Robust Audio Aggregate Zero-Watermark AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 366-370
Papers
Attacks on a Block Based SVD Watermarking SchemeFull-text access may be available. Sign in or learn about subscription options.pp. 371-375
Papers
A New Steganography Scheme Based on an Index-Color ImageFull-text access may be available. Sign in or learn about subscription options.pp. 376-381
Papers
A Peer-to-Peer Federated Authentication SystemFull-text access may be available. Sign in or learn about subscription options.pp. 382-387
Papers
Automated Risk and Utility ManagementFull-text access may be available. Sign in or learn about subscription options.pp. 393-398
Papers
An Authentication System Based on PalmprintFull-text access may be available. Sign in or learn about subscription options.pp. 399-404
Papers
An Anti-Phishing Approach that Uses Training Intervention for Phishing Websites DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 405-410
Papers
Evaluation of Two Privacy-Preserving Protocols for the DNSFull-text access may be available. Sign in or learn about subscription options.pp. 411-416
Papers
Efficient Short Signatures from PairingFull-text access may be available. Sign in or learn about subscription options.pp. 417-422
Papers
Security in Wireless Mesh Networks: Challenges and SolutionsFull-text access may be available. Sign in or learn about subscription options.pp. 423-428
Notice of Violation of IEEE Publication Principles: Radiation Emission EMC Measurement in Real-TimeFull-text access may be available. Sign in or learn about subscription options.pp. 528-533
Papers
Federated Authentication Mechanism using Cellular Phone - Collaboration with OpenIDFull-text access may be available. Sign in or learn about subscription options.pp. 435-442
Papers
Bisimulations in the Boxed Safe Ambients with PasswordFull-text access may be available. Sign in or learn about subscription options.pp. 443-448
Papers
A Verifiable Electronic Voting Scheme over the InternetFull-text access may be available. Sign in or learn about subscription options.pp. 449-454
Papers
Practical Power Analysis Attacks to RSA on a Large IP Portfolio SoCFull-text access may be available. Sign in or learn about subscription options.pp. 455-460
Papers
Extending l-Diversity for Better Data AnonymizationFull-text access may be available. Sign in or learn about subscription options.pp. 461-466
Papers
Component Based Information Network for Computer SecurityFull-text access may be available. Sign in or learn about subscription options.pp. 467-469
Papers
Message Encryption Scheme Using Cheating TextFull-text access may be available. Sign in or learn about subscription options.pp. 470-474
Papers
Optimal Network Security Strengthening Using Attack-Defense Game ModelFull-text access may be available. Sign in or learn about subscription options.pp. 475-480
A Service-Oriented Middleware for Wireless Sensor and Actor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 575-580
Papers
Deception Detection Based on SVM for Chinese Text in CMCFull-text access may be available. Sign in or learn about subscription options.pp. 481-486
Papers
An Efficient and Reliable Time Variant Three-Entity and Data Authentication of Remote User Using Smart cardFull-text access may be available. Sign in or learn about subscription options.pp. 487-491
Papers
Multi-Layered Defense against Web Application AttacksFull-text access may be available. Sign in or learn about subscription options.pp. 492-497
Papers
An Efficient PRNG Based on the Hybrid between One- and Two-Dimensional Cellular AutomataFull-text access may be available. Sign in or learn about subscription options.pp. 498-503
Papers
Authenticated Dictionary-Based Attribute Sharing in Federated Identity ManagementFull-text access may be available. Sign in or learn about subscription options.pp. 504-509
Papers
Application of Game Theory for Cross-layer Design in Cognitive Wireless NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 510-515
Papers
A Distributed Coverage-Aware Sleep Scheduling Algorithm for Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 524-527
Papers
Radiation Emission EMC Measurement in Real-TimeFull-text access may be available. Sign in or learn about subscription options.pp. 528-533
Showing 100 out of 342