Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
ITNG
ITNG 2011
Generate Citations
Information Technology: New Generations, Third International Conference on
Apr. 11 2011 to Apr. 13 2011
Las Vegas, Nevada USA
ISBN: 978-0-7695-4367-3
Table of Contents
Papers
Using Cross-cultural Features in Web Design Patterns
Full-text access may be available. Sign in or learn about subscription options.
pp. 514-519
Papers
Title Page i
Freely available from IEEE.
pp. i
Papers
Title Page iii
Freely available from IEEE.
pp. iii
Papers
[Copyright notice]
Freely available from IEEE.
pp. iv
Papers
Table of contents
Freely available from IEEE.
pp. v-xix
Papers
Message from the Conference Chair
Freely available from IEEE.
pp. xix
Papers
Conference organization
Freely available from IEEE.
pp. xx-xxi
Papers
Reviewers
Freely available from IEEE.
pp. xxii
Papers
Development and Evaluation of a Large-Scale Agent-Based System for Information Literacy Education - Improving the Automatic Collection of Learning Results through Template Matching
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Keiichi Tanaka
,
Katsumi Wasaki
Papers
Using a Collaborative Programming Methodology to Incorporate Social Computing Projects into Introductory Computer Science Courses
Full-text access may be available. Sign in or learn about subscription options.
pp. 7-11
by
Alan Shaw
Papers
VectorForce: A Video Game Project
Full-text access may be available. Sign in or learn about subscription options.
pp. 12-17
by
Mark Chapman
,
David Turner
,
Arturo Concepcion
,
Aldo Lewis
Papers
An Approach to XML Tag Recommendation
Full-text access may be available. Sign in or learn about subscription options.
pp. 18-23
by
Sutheetutt Vacharaskunee
,
Sarun Intakosum
Papers
A Location-based Mobile Advertisement Publishing System for Vendors
Full-text access may be available. Sign in or learn about subscription options.
pp. 24-29
by
Chyi-Ren Dow
,
Yu-Hong Lee
,
Jeremy Liao
,
Hao-Wei Yang
,
Wei-Luen Koo
Papers
A Greedy Approach to Text Steganography Using Properties of Sentences
Full-text access may be available. Sign in or learn about subscription options.
pp. 30-35
by
S. Changder
,
N.C. Debnath
,
D. Ghosh
Papers
Predicting the Reliability of Software Systems Using Fuzzy Logic
Full-text access may be available. Sign in or learn about subscription options.
pp. 36-40
by
Sultan Aljahdali
,
Alaa F. Sheta
Papers
Evolutionary Prediction for Cumulative Failure Modeling: A Comparative Study
Full-text access may be available. Sign in or learn about subscription options.
pp. 41-47
by
Mohamed Benaddy
,
Sultan Aljahdali
,
Mohamed Wakrim
Papers
A Police Force Facing an e-Transparency Project
Full-text access may be available. Sign in or learn about subscription options.
pp. 48-53
by
Narayan Debnath
,
Roberto Uzal
,
German Montejano
,
Daniel Riesco
Papers
Algorithmic Design and Implementation of an Automated Testing Tool
Full-text access may be available. Sign in or learn about subscription options.
pp. 54-59
by
Jason Meek
,
Narayan Debnath
,
Ilhyun Lee
,
Haesun Lee
Papers
EnduRan: A Web Application for Managing Racing Events
Full-text access may be available. Sign in or learn about subscription options.
pp. 60-65
by
Jigarkumar Patel
,
Sergiu M. Dascalu
Papers
Putting Search in Context: Using Dynamically-Weighted Information Fusion to Improve Search Results
Full-text access may be available. Sign in or learn about subscription options.
pp. 66-71
by
Nicole Anderson
Papers
Interactive Visualization and Analysis of Hurricane Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 72-77
by
Andrew Cordar
,
Ahmed Abukmail
Papers
Non Bandwidth-intrusive Video Streaming over TCP
Full-text access may be available. Sign in or learn about subscription options.
pp. 78-83
by
Hiroyuki Hisamatsu
,
Go Hasegawa
,
Masayuki Murata
Papers
Schema-Based XML-to-SQL Query Translation Using Interval Encoding
Full-text access may be available. Sign in or learn about subscription options.
pp. 84-89
by
Mustafa Atay
,
Artem Chebotko
Papers
On the Ranking Strategy in Adword Auctions
Full-text access may be available. Sign in or learn about subscription options.
pp. 90-93
by
Patrick Maillé
,
Bruno Tuffin
Papers
Seamless Proactive Vertical Handover Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 94-99
by
Tabinda Salam
,
Muhammad Ali
,
Mah-Rukh Fida
Papers
PHY-MAC Cross Layer Issues for QoS Provisioning in Wireless Ad Hoc Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 100-105
by
Hussein ELAttar
,
Hussein Abdelaty
,
Salwa H. ElRamly
,
Mohamed A. Aboul-Dahab
Papers
AdaptiveScan: The Fast Layer-2 Handoff for WLAN
Full-text access may be available. Sign in or learn about subscription options.
pp. 106-111
by
Mahnsuk Yoon
,
Keuchul Cho
,
Jilong Li
,
Jeongbae Yun
,
Minyoung Yoo
,
Youngil Kim
,
Qin Shu
,
JangKyu Yun
,
Kijun Han
Papers
An Adaptive Power-Aware Multi-hop Routing Algorithm for Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 112-116
by
Erwing R. Sanchez
,
Laura M. Murillo
,
Bartolomeo Montrucchio
,
Maurizio Rebaudengo
Papers
Location Estimation of Wireless Nodes with Preservation of Neighbor Relations in MANET
Full-text access may be available. Sign in or learn about subscription options.
pp. 117-124
by
Kei Itoh
,
Hiroaki Higaki
Papers
Forwarding on Froggers Networks: Principle of Data Flow Equilibrium
Full-text access may be available. Sign in or learn about subscription options.
pp. 125-130
by
Omar Y. Tahboub
,
Javed I. Khan
Papers
Vigorous Study on Pre-FFT Smart Antennas in OFDM
Full-text access may be available. Sign in or learn about subscription options.
pp. 131-134
by
Young Jin Hong
Papers
Authoritative Intelligent Perfect Parallel Parking Based on Fuzzy Logic Controller for Car-Type Mobile Robot
Full-text access may be available. Sign in or learn about subscription options.
pp. 135-138
by
Sasan Mohammadi
,
Mostafa Tavassoli
,
Abolfazl Rajabi
Papers
A Privacy-Respecting Indoor Localization Approach for Identifying Shopper Paths by Using End-Users Mobile Devices
Full-text access may be available. Sign in or learn about subscription options.
pp. 139-144
by
Mohamed Bourimi
,
Gunnar Mau
,
Sascha Steinmann
,
Dominik Klein
,
Steffen Templin
,
Dogan Kesdogan
,
Hanna Schramm-Klein
Papers
Grid Computing Usability Heuristics in Practice
Full-text access may be available. Sign in or learn about subscription options.
pp. 145-150
by
Silvana Roncagliolo
,
Virginica Rusu
,
Cristian Rusu
,
Gonzalo Tapia
,
Danae Hayvar
,
Dorian Gorgan
Papers
A Survey of Human-Computer Interaction into the Computer Science Curricula in Iberoamerica
Full-text access may be available. Sign in or learn about subscription options.
pp. 151-156
by
César Collazos
,
Toni Granollers
,
Cristian Rusu
Papers
OpenBioSafetyLab: A Virtual World Based Biosafety Training Application for Medical Students
Full-text access may be available. Sign in or learn about subscription options.
pp. 157-162
by
Arturo Nakasone
,
Siyu Tang
,
Mika Shigematsu
,
Berthold Heinecke
,
Shuji Fujimoto
,
Helmut Prendinger
Papers
WeSketch: A 3D Real Time Collaborative Virtual Environment that Improves the GUI Sketching Task
Full-text access may be available. Sign in or learn about subscription options.
pp. 163-168
by
Hamilton A. Hernández
,
Helmuth Trefftz
Papers
A Virtualization Approach to Auto-Scaling Problem
Full-text access may be available. Sign in or learn about subscription options.
pp. 169-173
by
Theera Thepparat
,
Amnart Harnprasarnkit
,
Douanghatai Thippayawong
,
Veera Boonjing
,
Pisit Chanvarasuth
Papers
Applying Genetic Programming for Estimating Software Development Effort of Short-scale Projects
Full-text access may be available. Sign in or learn about subscription options.
pp. 174-179
by
Arturo Chavoya
,
Cuauhtemoc Lopez-Martin
,
M.E. Meda-Campa
Papers
A Sophisticated RFID Application on Multi-Factor Authentication
Full-text access may be available. Sign in or learn about subscription options.
pp. 180-185
by
Jing-Chiou Liou
,
Gregory Egan
,
Jay K. Patel
,
Sujith Bhashyam
Papers
The Exploration of the Component's Trustworthiness Measurement Method in the Data Processing Domain
Full-text access may be available. Sign in or learn about subscription options.
pp. 186-190
by
Xinyu Zhang
,
Haiyan Wu
,
Yiqian Lu
Papers
Spectrum-Based Fault Localization in Regression Testing
Full-text access may be available. Sign in or learn about subscription options.
pp. 191-195
by
Shailesh Tiwari
,
K.K. Mishra
,
Anoj Kumar
,
A.K. Misra
Papers
A Systemic Methodology for Software Architecture Analysis and Design
Full-text access may be available. Sign in or learn about subscription options.
pp. 196-200
by
Plamen Petrov
,
Ugo Buy
Papers
A Domain Analysis Method for Evolvable Software Product Line Architectures
Full-text access may be available. Sign in or learn about subscription options.
pp. 201-205
by
Haitham S. Hamza
,
Dina Darwish
Papers
An Event-Driven Interactive Model of Information Resource Management
Full-text access may be available. Sign in or learn about subscription options.
pp. 206-211
by
Jianchao Han
,
Hosung Kim
,
Mohsen Beheshti
,
Kazimierz Kowalski
Papers
Software Project Scheduling Using a Multi-Agent System
Full-text access may be available. Sign in or learn about subscription options.
pp. 212-213
by
Nathan Nikotan
,
Jianchao Han
,
Mohsen Beheshti
Papers
Bayesian Estimation of the Normal Mean from Censored Samples
Full-text access may be available. Sign in or learn about subscription options.
pp. 214-220
by
Ahmed Khago
,
Ashok K. Singh
,
Laxmi P. Gewali
Papers
CleanJava: A Formal Notation for Functional Program Verification
Full-text access may be available. Sign in or learn about subscription options.
pp. 221-226
by
Yoonsik Cheon
,
Cesar Yeep
,
Melisa Vela
Papers
Instituting Software Metrics in Small Organizations: A Practical Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 227-232
by
Hisham M. Haddad
,
Donald Eric Meredith
Papers
A Digital Ecosystem-based Framework for Math-based Search System
Full-text access may be available. Sign in or learn about subscription options.
pp. 233-238
by
Mohammed Q. Shatnawi
,
Qusai Q. Abuein
Papers
Reducing the Gap between Academia and Industry: The Case for Agile Methods in Thailand
Full-text access may be available. Sign in or learn about subscription options.
pp. 239-244
by
Wajee Chookittikul
,
Janet L. Kourik
,
Peter E. Maher
Papers
8 Reasons Why You Should Use Mobile Platforms in Your CS Courses
Full-text access may be available. Sign in or learn about subscription options.
pp. 245-250
by
Jonathan Engelsma
,
Hans Dulimarta
Papers
The Case for Teaching Legacy Systems Modernization
Full-text access may be available. Sign in or learn about subscription options.
pp. 251-256
by
Andrew J. McAllister
Papers
Open and Accessible Presentations
Full-text access may be available. Sign in or learn about subscription options.
pp. 257-262
by
Erik Wilde
Papers
IT Module Based Test Automation Framework
Full-text access may be available. Sign in or learn about subscription options.
pp. 263-267
by
Xin Bai
,
Marco Sadeghi
Papers
Automated Java GUI Modeling for Model-Based Testing Purposes
Full-text access may be available. Sign in or learn about subscription options.
pp. 268-273
by
Pekka Aho
,
Nadja Menz
,
Tomi Räty
,
Ina Schieferdecker
Papers
Effectively Testing for a Software Product Line with OTM3 Organizational Testing Management Maturity Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 274-279
by
Etiene Lamas
,
Luiz Alberto Vieira Dias
,
Adilson Marques da Cunha
Papers
Testing a High Performance, Random Access Priority Queue: A Case Study
Full-text access may be available. Sign in or learn about subscription options.
pp. 280-285
by
James D. McCaffrey
,
Adrian Bonar
Papers
The Design of an Automated Test Code Generation System for SQL Stored Procedures
Full-text access may be available. Sign in or learn about subscription options.
pp. 286-290
by
Gary Fix
Papers
Goal-Oriented Test Case Selection and Prioritization for Product Line Feature Models
Full-text access may be available. Sign in or learn about subscription options.
pp. 291-298
by
Alireza Ensan
,
Ebrahim Bagheri
,
Mohsen Asadi
,
Dragan Gasevic
,
Yevgen Biletskiy
Papers
Scenario Driven Testing
Full-text access may be available. Sign in or learn about subscription options.
pp. 299-303
by
Kaarthik Sivashanmugam
,
Da Lin
,
Senthil Palanisamy
Papers
Conformance Testing in Service-Oriented Interconnection Technologies in NoTA
Full-text access may be available. Sign in or learn about subscription options.
pp. 304-309
by
Janne Keranen
,
Tomi Raty
,
Petri Jurmu
,
Matti Maki
,
Olli-Pekka Puolitaival
Papers
Next Generation Cross Technology Test Data Solution for MA
Full-text access may be available. Sign in or learn about subscription options.
pp. 310-314
by
Sagar Khandelwal
,
Kannan Subramanian
,
Rohit Garg
Papers
Security of Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 315-320
by
Daniel E. Burgner
,
Luay A. Wahsheh
Papers
Enforcing Reactive Noninterference with Reachability Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 321-326
by
Cong Sun
,
Liyong Tang
,
Zhong Chen
Papers
OTP-Based Two-Factor Authentication Using Mobile Phones
Full-text access may be available. Sign in or learn about subscription options.
pp. 327-331
by
Mohamed Hamdy Eldefrawy
,
Khaled Alghathbar
,
Muhammad Khurram Khan
Papers
Secure Image Steganography Based on Randomized Sequence of Cipher Bits
Full-text access may be available. Sign in or learn about subscription options.
pp. 332-335
by
Y.V. Subba Rao
,
S.S. Brahmananda Rao
,
N. Rukma Rekha
Papers
Application Lockbox for Mobile Device Security
Full-text access may be available. Sign in or learn about subscription options.
pp. 336-341
by
Jim Luo
,
Myong Kang
Papers
A Secure e-Voting Architecture
Full-text access may be available. Sign in or learn about subscription options.
pp. 342-347
by
A.S. Sodiya
,
S.A. Onashoga
,
D.I. Adelani
Papers
Fuzzy-based Methods for Privacy-Preserving Data Mining
Full-text access may be available. Sign in or learn about subscription options.
pp. 348-353
by
R. Mukkamala
,
V.G. Ashok
Papers
SHA-512/256
Full-text access may be available. Sign in or learn about subscription options.
pp. 354-358
by
Shay Gueron
,
Simon Johnson
,
Jesse Walker
Papers
Differential and Correlation Power Analysis Attacks on HMAC-Whirlpool
Full-text access may be available. Sign in or learn about subscription options.
pp. 359-365
by
Fan Zhang
,
Zhijie Jerry Shi
Papers
Enhanced Key Life in Online Authentication Systems Using Virtual Password
Full-text access may be available. Sign in or learn about subscription options.
pp. 366-369
by
N. Rukma Rekha
,
Y.V. Subba Rao
,
K.V.S.S.R.S.S. Sarma
Papers
Experimental Research on DFA-Based MLML IDS Security Evaluation
Full-text access may be available. Sign in or learn about subscription options.
pp. 370-375
by
Hongbin Wang
,
Zhiyi Fang
,
Simon Fong
,
Yain-Whar Si
,
Liyang Liu
Papers
Modified Protocols for Internet Key Exchange (IKE) Using Public Encryption and Signature Keys
Full-text access may be available. Sign in or learn about subscription options.
pp. 376-381
by
V. Nagalakshmi
,
I. Ramesh Babu
,
P.S. Avadhani
Papers
Quick Verification of RSA Signatures
Full-text access may be available. Sign in or learn about subscription options.
pp. 382-386
by
Shay Gueron
Papers
Region-Based Security Architecture for DTN
Full-text access may be available. Sign in or learn about subscription options.
pp. 387-392
by
Mah-Rukh Fida
,
Muhammad Ali
,
Awais Adnan
,
Ameer Shakayb Arsalaan
Papers
A New Heuristic Approach to Safeguarding Online Digital Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 393-396
by
Mohammad Eyadat
,
Soren Larsen
Papers
A Confidential Electronic Result Transfer Using a Hybrid XML Security Scheme
Full-text access may be available. Sign in or learn about subscription options.
pp. 397-402
by
S.A. Onashoga
,
A.S. Sodiya
Papers
CookieMonster: Automated Session Hijacking Archival and Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 403-407
by
Joshua J. Pauli
,
Patrick H. Engebretson
,
Michael J. Ham
,
MarcCharles J. Zautke
Papers
Improving Security in the IEEE 802.16 Standards
Full-text access may be available. Sign in or learn about subscription options.
pp. 408-412
by
Joseph Chee
,
Ming Teo
Papers
Threshold Cryptosystem Using Pell's Equation
Full-text access may be available. Sign in or learn about subscription options.
pp. 413-416
by
K.V.S.S.R.S.S. Sarma
,
G. Santhosh Krishna Kumar
,
P.S. Avadhani
Papers
Eye Based HCI with Moving Keyboard for Reducing Fatigue Effects
Full-text access may be available. Sign in or learn about subscription options.
pp. 417-422
by
Kohei Arai
,
Ronny Mardiyanto
Papers
Eye-based HCI with Full Specification of Mouse and Keyboard Using Pupil Knowledge in the Gaze Estimation
Full-text access may be available. Sign in or learn about subscription options.
pp. 423-428
by
Kohei Arai
,
Ronny Mardiyanto
Papers
A Heuristic Evaluation Experiment to Validate the New Set of Usability Heuristics
Full-text access may be available. Sign in or learn about subscription options.
pp. 429-434
by
Llucia Masip
,
Toni Granollers
,
Marta Oliva
Papers
iDriver - Human Machine Interface for Autonomous Cars
Full-text access may be available. Sign in or learn about subscription options.
pp. 435-440
by
Arturo Reuschenbach
,
Miao Wang
,
Tinosch Ganjineh
,
Daniel Gohring
Papers
Comparative Study on Blink Detection and Gaze Estimation Methods for HCI, in Particular, Gabor Filter Utilized Blink Detection Method
Full-text access may be available. Sign in or learn about subscription options.
pp. 441-446
by
Kohei Arai
,
Ronny Mardiyanto
Papers
Multilingual Highlighting CAPTCHA
Full-text access may be available. Sign in or learn about subscription options.
pp. 447-452
by
Sajad Shirali-Shahreza
,
Mohammad Shirali-Shahreza
Papers
Usability in E-government Sites
Full-text access may be available. Sign in or learn about subscription options.
pp. 453-458
by
Cristhy Jimenez Granizo
,
Pablo Lozada Yanez
,
Danilo Pastor Ramirez
,
Patricia Cordovez Machado
Papers
Study on the Visualization Elements of Web Information Services: Focused on Researcher Network and Graphic Chart
Full-text access may be available. Sign in or learn about subscription options.
pp. 459-463
by
Hanmin Jung
,
Mikyoung Lee
,
Pyung Kim
,
DoWan Kim
Papers
Rotoscopy-Handwriting Prototype: Using Computer Animation Technique to Assist the Teaching of Handwriting for Children with Dyspraxia
Full-text access may be available. Sign in or learn about subscription options.
pp. 464-469
by
Muhammad Fakri Othman
,
Wendy Keay-Bright
Papers
Phone Segmentation for Japanese Triphthong Using Neural Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 470-475
by
Manoj Banik
,
Md. Modasser Hossain
,
Aloke Kumar Saha
,
Foyzul Hassan
,
Mohammed Rokibul Alam Kotwal
,
Mohammad Nurul Huda
Papers
Pitch-Range Based Feature Extraction for Audio Surveillance Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 476-480
by
Burak Uzkent
,
Buket D. Barkana
Papers
Bit Error Rate Locked Loops Using Log-likelihood Decoders
Full-text access may be available. Sign in or learn about subscription options.
pp. 481-484
by
Eric Rives
,
Laurie Joiner
Papers
Online Learning Neural Network Control of Buck-Boost Converter
Full-text access may be available. Sign in or learn about subscription options.
pp. 485-489
by
W.M. Utomo
,
A. Bakar
,
M. Ahmad
,
T. Taufik
,
R. Heriansyah
Papers
Face Image Retrieval Using Genetic Algorithm and Bags of Pixels
Full-text access may be available. Sign in or learn about subscription options.
pp. 490-493
by
Mohammad Ali Azimi Kashani
,
Mohammad Reza Ramezanpour Fini
Papers
Evaluation of Three Methods for MRI Brain Tumor Segmentation
Full-text access may be available. Sign in or learn about subscription options.
pp. 494-499
by
R.B. Dubey
,
M. Hanmandlu
,
Shantaram Vasikarla
Papers
Information Management and Tracking of Drugs in Supply Chains within the Pharmaceutical Industry
Full-text access may be available. Sign in or learn about subscription options.
pp. 500-507
by
Rolf T. Wigand
,
Dinah M. Mande
,
Jerry D. Wood
Papers
Speeding-up Fractal Color Image Compression Using Moments Features Based on Symmetry Predictor
Full-text access may be available. Sign in or learn about subscription options.
pp. 508-513
by
Loay E. George
,
Eman A. Al-Hilo
Papers
Iris Recognition Using Segmental Euclidean Distances
Full-text access may be available. Sign in or learn about subscription options.
pp. 520-525
by
Farrukh Sayeed
,
M. Hanmandlu
,
A.Q. Ansari
,
Shantaram Vasikarla
Showing 100 out of 220
Load More
Load All