Default Cover Image

Information Technology: New Generations, Third International Conference on

Apr. 11 2011 to Apr. 13 2011

Las Vegas, Nevada USA

ISBN: 978-0-7695-4367-3

Table of Contents

Papers
Using Cross-cultural Features in Web Design PatternsFull-text access may be available. Sign in or learn about subscription options.pp. 514-519
Papers
Title Page iFreely available from IEEE.pp. i
Papers
Title Page iiiFreely available from IEEE.pp. iii
Papers
[Copyright notice]Freely available from IEEE.pp. iv
Papers
Table of contentsFreely available from IEEE.pp. v-xix
Papers
Message from the Conference ChairFreely available from IEEE.pp. xix
Papers
Conference organizationFreely available from IEEE.pp. xx-xxi
Papers
ReviewersFreely available from IEEE.pp. xxii
Papers
Using a Collaborative Programming Methodology to Incorporate Social Computing Projects into Introductory Computer Science CoursesFull-text access may be available. Sign in or learn about subscription options.pp. 7-11
Papers
VectorForce: A Video Game ProjectFull-text access may be available. Sign in or learn about subscription options.pp. 12-17
Papers
An Approach to XML Tag RecommendationFull-text access may be available. Sign in or learn about subscription options.pp. 18-23
Papers
A Location-based Mobile Advertisement Publishing System for VendorsFull-text access may be available. Sign in or learn about subscription options.pp. 24-29
Papers
A Greedy Approach to Text Steganography Using Properties of SentencesFull-text access may be available. Sign in or learn about subscription options.pp. 30-35
Papers
Predicting the Reliability of Software Systems Using Fuzzy LogicFull-text access may be available. Sign in or learn about subscription options.pp. 36-40
Papers
Evolutionary Prediction for Cumulative Failure Modeling: A Comparative StudyFull-text access may be available. Sign in or learn about subscription options.pp. 41-47
Papers
A Police Force Facing an e-Transparency ProjectFull-text access may be available. Sign in or learn about subscription options.pp. 48-53
Papers
Algorithmic Design and Implementation of an Automated Testing ToolFull-text access may be available. Sign in or learn about subscription options.pp. 54-59
Papers
EnduRan: A Web Application for Managing Racing EventsFull-text access may be available. Sign in or learn about subscription options.pp. 60-65
Papers
Putting Search in Context: Using Dynamically-Weighted Information Fusion to Improve Search ResultsFull-text access may be available. Sign in or learn about subscription options.pp. 66-71
Papers
Interactive Visualization and Analysis of Hurricane DataFull-text access may be available. Sign in or learn about subscription options.pp. 72-77
Papers
Non Bandwidth-intrusive Video Streaming over TCPFull-text access may be available. Sign in or learn about subscription options.pp. 78-83
Papers
Schema-Based XML-to-SQL Query Translation Using Interval EncodingFull-text access may be available. Sign in or learn about subscription options.pp. 84-89
Papers
On the Ranking Strategy in Adword AuctionsFull-text access may be available. Sign in or learn about subscription options.pp. 90-93
Papers
Seamless Proactive Vertical Handover AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 94-99
Papers
PHY-MAC Cross Layer Issues for QoS Provisioning in Wireless Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 100-105
Papers
AdaptiveScan: The Fast Layer-2 Handoff for WLANFull-text access may be available. Sign in or learn about subscription options.pp. 106-111
Papers
An Adaptive Power-Aware Multi-hop Routing Algorithm for Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 112-116
Papers
Location Estimation of Wireless Nodes with Preservation of Neighbor Relations in MANETFull-text access may be available. Sign in or learn about subscription options.pp. 117-124
Papers
Forwarding on Froggers Networks: Principle of Data Flow EquilibriumFull-text access may be available. Sign in or learn about subscription options.pp. 125-130
Papers
Vigorous Study on Pre-FFT Smart Antennas in OFDMFull-text access may be available. Sign in or learn about subscription options.pp. 131-134
Papers
Authoritative Intelligent Perfect Parallel Parking Based on Fuzzy Logic Controller for Car-Type Mobile RobotFull-text access may be available. Sign in or learn about subscription options.pp. 135-138
Papers
Grid Computing Usability Heuristics in PracticeFull-text access may be available. Sign in or learn about subscription options.pp. 145-150
Papers
A Survey of Human-Computer Interaction into the Computer Science Curricula in IberoamericaFull-text access may be available. Sign in or learn about subscription options.pp. 151-156
Papers
WeSketch: A 3D Real Time Collaborative Virtual Environment that Improves the GUI Sketching TaskFull-text access may be available. Sign in or learn about subscription options.pp. 163-168
Papers
A Virtualization Approach to Auto-Scaling ProblemFull-text access may be available. Sign in or learn about subscription options.pp. 169-173
Papers
Applying Genetic Programming for Estimating Software Development Effort of Short-scale ProjectsFull-text access may be available. Sign in or learn about subscription options.pp. 174-179
Papers
A Sophisticated RFID Application on Multi-Factor AuthenticationFull-text access may be available. Sign in or learn about subscription options.pp. 180-185
Papers
The Exploration of the Component's Trustworthiness Measurement Method in the Data Processing DomainFull-text access may be available. Sign in or learn about subscription options.pp. 186-190
Papers
Spectrum-Based Fault Localization in Regression TestingFull-text access may be available. Sign in or learn about subscription options.pp. 191-195
Papers
A Systemic Methodology for Software Architecture Analysis and DesignFull-text access may be available. Sign in or learn about subscription options.pp. 196-200
Papers
A Domain Analysis Method for Evolvable Software Product Line ArchitecturesFull-text access may be available. Sign in or learn about subscription options.pp. 201-205
Papers
An Event-Driven Interactive Model of Information Resource ManagementFull-text access may be available. Sign in or learn about subscription options.pp. 206-211
Papers
Software Project Scheduling Using a Multi-Agent SystemFull-text access may be available. Sign in or learn about subscription options.pp. 212-213
Papers
Bayesian Estimation of the Normal Mean from Censored SamplesFull-text access may be available. Sign in or learn about subscription options.pp. 214-220
Papers
CleanJava: A Formal Notation for Functional Program VerificationFull-text access may be available. Sign in or learn about subscription options.pp. 221-226
Papers
Instituting Software Metrics in Small Organizations: A Practical ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 227-232
Papers
A Digital Ecosystem-based Framework for Math-based Search SystemFull-text access may be available. Sign in or learn about subscription options.pp. 233-238
Papers
Reducing the Gap between Academia and Industry: The Case for Agile Methods in ThailandFull-text access may be available. Sign in or learn about subscription options.pp. 239-244
Papers
8 Reasons Why You Should Use Mobile Platforms in Your CS CoursesFull-text access may be available. Sign in or learn about subscription options.pp. 245-250
Papers
The Case for Teaching Legacy Systems ModernizationFull-text access may be available. Sign in or learn about subscription options.pp. 251-256
Papers
Open and Accessible PresentationsFull-text access may be available. Sign in or learn about subscription options.pp. 257-262
Papers
IT Module Based Test Automation FrameworkFull-text access may be available. Sign in or learn about subscription options.pp. 263-267
Papers
Automated Java GUI Modeling for Model-Based Testing PurposesFull-text access may be available. Sign in or learn about subscription options.pp. 268-273
Papers
Testing a High Performance, Random Access Priority Queue: A Case StudyFull-text access may be available. Sign in or learn about subscription options.pp. 280-285
Papers
The Design of an Automated Test Code Generation System for SQL Stored ProceduresFull-text access may be available. Sign in or learn about subscription options.pp. 286-290
Papers
Goal-Oriented Test Case Selection and Prioritization for Product Line Feature ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 291-298
Papers
Scenario Driven TestingFull-text access may be available. Sign in or learn about subscription options.pp. 299-303
Papers
Conformance Testing in Service-Oriented Interconnection Technologies in NoTAFull-text access may be available. Sign in or learn about subscription options.pp. 304-309
Papers
Next Generation Cross Technology Test Data Solution for MAFull-text access may be available. Sign in or learn about subscription options.pp. 310-314
Papers
Security of Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 315-320
Papers
Enforcing Reactive Noninterference with Reachability AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 321-326
Papers
OTP-Based Two-Factor Authentication Using Mobile PhonesFull-text access may be available. Sign in or learn about subscription options.pp. 327-331
Papers
Secure Image Steganography Based on Randomized Sequence of Cipher BitsFull-text access may be available. Sign in or learn about subscription options.pp. 332-335
Papers
Application Lockbox for Mobile Device SecurityFull-text access may be available. Sign in or learn about subscription options.pp. 336-341
Papers
A Secure e-Voting ArchitectureFull-text access may be available. Sign in or learn about subscription options.pp. 342-347
Papers
Fuzzy-based Methods for Privacy-Preserving Data MiningFull-text access may be available. Sign in or learn about subscription options.pp. 348-353
Papers
SHA-512/256Full-text access may be available. Sign in or learn about subscription options.pp. 354-358
Papers
Differential and Correlation Power Analysis Attacks on HMAC-WhirlpoolFull-text access may be available. Sign in or learn about subscription options.pp. 359-365
Papers
Enhanced Key Life in Online Authentication Systems Using Virtual PasswordFull-text access may be available. Sign in or learn about subscription options.pp. 366-369
Papers
Experimental Research on DFA-Based MLML IDS Security EvaluationFull-text access may be available. Sign in or learn about subscription options.pp. 370-375
Papers
Modified Protocols for Internet Key Exchange (IKE) Using Public Encryption and Signature KeysFull-text access may be available. Sign in or learn about subscription options.pp. 376-381
Papers
Quick Verification of RSA SignaturesFull-text access may be available. Sign in or learn about subscription options.pp. 382-386
Papers
Region-Based Security Architecture for DTNFull-text access may be available. Sign in or learn about subscription options.pp. 387-392
Papers
A New Heuristic Approach to Safeguarding Online Digital DataFull-text access may be available. Sign in or learn about subscription options.pp. 393-396
Papers
A Confidential Electronic Result Transfer Using a Hybrid XML Security SchemeFull-text access may be available. Sign in or learn about subscription options.pp. 397-402
Papers
CookieMonster: Automated Session Hijacking Archival and AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 403-407
Papers
Improving Security in the IEEE 802.16 StandardsFull-text access may be available. Sign in or learn about subscription options.pp. 408-412
Papers
Threshold Cryptosystem Using Pell's EquationFull-text access may be available. Sign in or learn about subscription options.pp. 413-416
Papers
Eye Based HCI with Moving Keyboard for Reducing Fatigue EffectsFull-text access may be available. Sign in or learn about subscription options.pp. 417-422
Papers
Eye-based HCI with Full Specification of Mouse and Keyboard Using Pupil Knowledge in the Gaze EstimationFull-text access may be available. Sign in or learn about subscription options.pp. 423-428
Papers
A Heuristic Evaluation Experiment to Validate the New Set of Usability HeuristicsFull-text access may be available. Sign in or learn about subscription options.pp. 429-434
Papers
iDriver - Human Machine Interface for Autonomous CarsFull-text access may be available. Sign in or learn about subscription options.pp. 435-440
Papers
Multilingual Highlighting CAPTCHAFull-text access may be available. Sign in or learn about subscription options.pp. 447-452
Papers
Usability in E-government SitesFull-text access may be available. Sign in or learn about subscription options.pp. 453-458
Papers
Study on the Visualization Elements of Web Information Services: Focused on Researcher Network and Graphic ChartFull-text access may be available. Sign in or learn about subscription options.pp. 459-463
Papers
Pitch-Range Based Feature Extraction for Audio Surveillance SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 476-480
Papers
Bit Error Rate Locked Loops Using Log-likelihood DecodersFull-text access may be available. Sign in or learn about subscription options.pp. 481-484
Papers
Online Learning Neural Network Control of Buck-Boost ConverterFull-text access may be available. Sign in or learn about subscription options.pp. 485-489
Papers
Face Image Retrieval Using Genetic Algorithm and Bags of PixelsFull-text access may be available. Sign in or learn about subscription options.pp. 490-493
Papers
Evaluation of Three Methods for MRI Brain Tumor SegmentationFull-text access may be available. Sign in or learn about subscription options.pp. 494-499
Papers
Information Management and Tracking of Drugs in Supply Chains within the Pharmaceutical IndustryFull-text access may be available. Sign in or learn about subscription options.pp. 500-507
Papers
Speeding-up Fractal Color Image Compression Using Moments Features Based on Symmetry PredictorFull-text access may be available. Sign in or learn about subscription options.pp. 508-513
Papers
Iris Recognition Using Segmental Euclidean DistancesFull-text access may be available. Sign in or learn about subscription options.pp. 520-525
Showing 100 out of 220