Conferences in DBLP
Giovanni Agosta , Luca Breveglieri , Gerardo Pelosi , Martino Sykora Programming Highly Parallel Reconfigurable Architectures for Public-Key Cryptographic Applications. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:3-10 [Conf ] Robert Ronan , Colm O'Eigeartaigh , Colin C. Murphy , Tim Kerins , Paulo S. L. M. Barreto A Reconfigurable Processor for the Cryptographic nT Pairing in Characteristic 3. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:11-16 [Conf ] Nadia Nedjah , Luiza de Macedo Mourelle , Rodrigo Martins da Silva Efficient Hardware for Modular Exponentiation Using the Sliding-Window Method. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:17-24 [Conf ] Wei Shen , Qing-An Zeng Two Novel Resource Management Schemes for Integrated Wireless Networks. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:25-30 [Conf ] Muhammad Adeel , Ahmad Ali Iqbal TCP Congestion Window Optimization for CDMA2000 Packet Data Networks. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:31-35 [Conf ] Y. B. Reddy , N. Gajendar , Portia Taylor , Damian Madden Computationally Efficient Resource Allocation in OFDM Systems: Genetic Algorithm Approach. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:36-41 [Conf ] Abbas Nayebi , M. R. Rahimi , Hamid Sarbazi-Azad Analysis of Time-Based Random Waypoint Mobility Model for Wireless Mobile Networks. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:42-47 [Conf ] Mika Watanabe , Hiroaki Higaki No-Beacon GEDIR: Location-Based Ad-Hoc Routing with Less Communication Overhead. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:48-55 [Conf ] Ognjen Dobrijevic , Miran Mosmondor , Maja Matijasevic Design of a QoS Signaling API for Advanced Multimedia Applications in NGN. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:56-64 [Conf ] Bing Wu , Xiaochun Yun , Xiang Cui Study on Worm Poisoning Technology. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:65-70 [Conf ] Hussein Abdel-jaber , Mike Woodward , Fadi A. Thabtah , Mahmud Etbega A Discrete-time Queue Analytical Model based on Dynamic Random Early Drop. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:71-76 [Conf ] Mehdi Salour , Xiao Su Dynamic Two-Layer Signature-Based IDS with Unequal Databases. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:77-82 [Conf ] Osama Dandash , Yiling Wang , Phu Dung Le , Bala Srinivasan A new Dynamic Key Generation Scheme for Fraudulent Internet Payment Prevention. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:83-88 [Conf ] Hai Vu , Neeraj Mittal , Subbarayan Venkatesan THIS: THreshold security for Information aggregation in Sensor networks. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:89-95 [Conf ] H. R. Nagesh , K. Chandra Sekaran , Adarsh Rao Kordcal Proactive model for Mitigating Internet Denial-of-Service Attacks. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:96-101 [Conf ] Wei Ren , Yoohwan Kim , Ju-Yeon Jo , Mei Yang , Yingtao Jiang IdSRF: ID-based Secure Routing Framework for Wireless Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:102-110 [Conf ] Anura P. Jayasumana , Qi Han , Tissa H. Illangasekare Virtual Sensor Networks - A Resource Efficient Approach for Concurrent Applications. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:111-115 [Conf ] Ashwini Raina , Venkatesan Muthukumar , Laxmi Gewali Cell-based Distributed Addressing Technique Using Clustered Backbone Approach. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:116-121 [Conf ] Nikos Dimokas , Dimitrios Katsaros , Yannis Manolopoulos Node Clustering in Wireless Sensor Networks by Considering Structural Characteristics of the Network Graph. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:122-127 [Conf ] Damayanti Datta , Sukhamay Kundu Reliable and Efficient Data Transfer in Wireless Sensor Networks via Out-of-Sequence Forwarding and Delayed Request for Missing Packets. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:128-133 [Conf ] Manseok Yang , Sun Sup So , Steve Eun , Brian Kim , Jinchun Kim Sensos: A Sensor Node Operating System with a Device Management Scheme for Sensor Nodes. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:134-139 [Conf ] Min Tun , Laxmi Gewali , Henry Selvaraj Interference Aware Routing in Sensor Network. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:140-146 [Conf ] Sajid Hussain , Abdul Wasey Matin , Obidul Islam Genetic Algorithm for Energy Efficient Clusters in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:147-154 [Conf ] Guido Gehlen , Fahad Aijaz , Muhammad Sajjad , Bernhard Walke A Mobile Context Dissemination Middleware. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:155-160 [Conf ] Jinsuo Zhang , Stacey Franklin Jones , Junling Wang , Sumi Helal DPQ: Using A Distributed Priority Queue to Improve Ad hoc TCP Performance. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:161-165 [Conf ] Elaine Lawrence , Maria Bina , Gordana Culjak , Tarek El Kiki Wireless Community Networks: Public Assets for 21st Century Society. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:166-174 [Conf ] Muhammad Saleem , Imran Touqir , Adil Masood Siddiqui Novel Edge Detection. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:175-180 [Conf ] Sarang Joshi , S. K. Bodhe Time Complexity Analysis for Decoding VOP Content in MPEG-4 Presentations. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:181-182 [Conf ] S. Rahul , J. Vignesh , S. Santhosh Kumar , M. Bharadwaj , N. Venkateswaran Comparison of Pyramidal and Packet Wavelet Coder for Image Compression Using Cellular Neural Network (CNN) with Thresholding and Quantization. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:183-184 [Conf ] D. G. Khairnar , Shabbir N. Merchant , Uday B. Desai A Neural Solution for Signal Detection In Non-Gaussian Noise. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:185-189 [Conf ] Premkumar Elangovan , Gaoyong Luo , Geoff Lawday Structurally Efficient Video Codec for Wireless Mobile Applications. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:190-195 [Conf ] Hau T. Ngo , Vijayan K. Asari Design of a Low Power Multiply-Accumulator for 2D Convolution in Video Processing Applications. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:196-201 [Conf ] Jinghua Zhang , Jinsheng Xu , Huiming Yu Octree-Based 3D Animation Compression with Motion Vector Sharing. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:202-207 [Conf ] Madasu Hanmandlu , J. Grover , Vamsi Krishna Madasu , Shantaram Vasikarla Input Fuzzy Modeling for the Recognition of Handwritten Hindi Numerals. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:208-213 [Conf ] Manoranjan Paul , M. Manzur Murshed Pattern based Residual Coding for H.264 Encoder. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:214-218 [Conf ] Seema H. Jadhav , B. S. Tarle , L. M. Waghmare Polygonal Approximation of 2-D Binary Images. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:219-223 [Conf ] Shuangteng Zhang , Yihong Lu Image Resolution Enhancement Using a Hopfield Neural Network. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:224-228 [Conf ] Luc Gillibert , Alain Bretto Hypergraphs for Near-lossless Volumetric Compression. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:229-233 [Conf ] Nileshsingh V. Thakur , O. G. Kakde Color Image Compression on Spiral Architecture using Optimized Domain Blocks in Fractal Coding. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:234-242 [Conf ] Jay Kothari , Maxim Shevertalov , Edward Stehle , Spiros Mancoridis A Probabilistic Approach to Source Code Authorship Identification. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:243-248 [Conf ] Seongwook Youn , Dennis McLeod Efficient Spam Email Filtering using Adaptive Ontology. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:249-254 [Conf ] Dangeti Ravi Shankar , Akhil Kodali , Pradeep Beerla , D. V. S. Mohan Nimai Neural Networks in Cultivation. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:255-260 [Conf ] Sampathkumar Veeraraghavan , Karthik Srinivasan Exploration of Autism Expert Systems. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:261-264 [Conf ] Narongrit Waraporn Results of Real Time Simulation of Medical Knowledge Technology (MKT) System for Medical Diagnosis on Distributed Knowledge Nodes. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:265-270 [Conf ] C. L. Connors , M. A. Malloy Practical Challenges Facing Communities of Interest in the Net-Centric Department of Defense. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:271-276 [Conf ] Wen-Hui Chen , Wen-Shang Tseng A Novel Multi-agent Framework for the Design of Home Automation. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:277-281 [Conf ] Marcus J. Huber Agent Autonomy: Social Integrity and Social Independence. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:282-290 [Conf ] InHo Jang , SangKeun Lee Search Reverse Nearest Neighbor Query On Air. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:291-296 [Conf ] Dejene Ejigu , Vasile-Marian Scuturici , Lionel Brunie CoCA: A Collaborative Context-Aware Service Platform for Pervasive Computing. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:297-302 [Conf ] Sheikh Iqbal Ahamed , Munirul M. Haque , K. M. Ibrahim Asif S-MARKS: A Middleware Secure by Design for the Pervasive Computing Environment. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:303-310 [Conf ] Janus S. Liang Education and Training for Troubleshooting in Automotive Chassis. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:311-316 [Conf ] Kazuo Hiekata , Hiroyuki Yamato , Piroon Rojanakamolsan , Wataru Oishi Design Engineering Educational Framework Using ShareFast: A Semantic Web-Based E-Learning System. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:317-322 [Conf ] Kenneth Hoganson , David Lebron Lectures for Mobile Devices, Evaluating "iPod/PDA-casting" Technology and Pedagogy. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:323-328 [Conf ] Azita Bahrami An L-Tree Based Analysis of E-lessons. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:329-334 [Conf ] Samir N. Hamade Acquiring Information Technology Skills by Freshmen Students at Kuwait University: The Language Factor. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:335-340 [Conf ] Mohammad Eyadat , Dorothy Fisher Web Accessibility and Information Systems Curriculum. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:341-346 [Conf ] Oussama Kassem Zein , Yvon Kermarrec Description and composition of services for distant learning and research activities. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:347-354 [Conf ] Sudhanwa Kholgade , Jamie White , Hassan Reza Comparing the Specification of a Near-Real Time Commanding System Using Statecharts and AADL. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:355-360 [Conf ] Kazem Taghva , Pavankumar Bondugula , Darshana Gala Association Rule Discovery of Privacy Information. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:361-365 [Conf ] Hassan Reza , Sandeep Endapally , Emanuel S. Grant A Model-Based Approach for Testing GUI Using Hierarchical Predicate Transition Nets. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:366-370 [Conf ] Abdullah Uz Tansel , Susan P. Imberman Discovery of Association Rules in Temporal Databases. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:371-376 [Conf ] Chung-Hong Lee , Hsin-Chang Yang Implementation of Unsupervised and Supervised Learning Systems for Multilingual Text Categorization. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:377-382 [Conf ] M. Arun Kumar , M. Gopal Binary Classification by SVM based neural Trees and Nonlinear SVMs. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:383-387 [Conf ] Mark Smith , Alireza Khotanzad Quality Metrics for Object-Based Data Mining Applications. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:388-392 [Conf ] Mehrdad Nojoumian , Timothy C. Lethbridge Extracting Document Structure to Facilitate a Knowledge Base Creation for The UML Superstructure Specification. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:393-400 [Conf ] S. D. Samantaray A Data mining approach for resolving cases of Multiple Parsing in Machine Aided Translation of Indian Languages. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:401-405 [Conf ] Rabia Jafri , Hamid R. Arabnia Analysis of Subspace-based Face Recognition Techniques under Changes in Imaging Factors. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:406-413 [Conf ] Ray R. Hashemi , Alexander A. Tyler , Christopher Childers , Arthur Chausmer Concordance Analysis of DEXA Data. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:414-419 [Conf ] S. Ahmad , Mali Abdollahian , Panlop Zeephongsekul Process Capability for a Non-Normal Quality Characteristics Data. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:420-424 [Conf ] S. Ahmad , Mali Abdollahian , Panlop Zeephongsekul Process Capability Analysis for Non-Normal Quality Characteristics Using Gamma Distribution. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:425-430 [Conf ] Amy Neustein SEQUENCE PACKAGE ANALYSIS: A New Natural Language Understanding Method for Intelligent Mining of Recordings of Doctor-Patient Interviews and Health-Related Blogs. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:431-438 [Conf ] Bernard J. Jansen , Amanda Spink , Bhuva Narayan Query Modifications Patterns During Web Searching. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:439-444 [Conf ] Terrence A. Brooks , Brian P. Flaherty An Abandoned Web Page Finds its Audience. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:445-450 [Conf ] Anya Kim , Amitabh Khashnobish , Myong Kang An Architecture for Web Services Authentication and Authorization in a Maritime Environment. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:451-456 [Conf ] Juan A. Correa-Colon , Manuel Rodriguez-Martinez Design and Implementation of JSwitch: a Web-based Transaction Coordination Framework. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:457-462 [Conf ] Ali Ghobadi , Masood Rahgozar A Virtual Catalog Generated from Web Pages of Vendors for Comparative Shopping. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:463-468 [Conf ] Isak Taksa , Sarah Zelikovitz , Amanda Spink Using Web Search Logs to Identify Query Classification Terms. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:469-474 [Conf ] Richard D. Holowczak , Isak Taksa , Ilan Levine Mining Web Logs to Improve WebGIS Application Response Times. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:475-480 [Conf ] Yun-Ke Chang , Amanda Spink Multimedia Chinese Web Search Engines: A Survey. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:481-486 [Conf ] Hanmin Jung , Seungwoo Lee , In-Su Kang , HeeKwan Koo , Won-Kyung Sung Construction of Semantic Web-based Knowledge Using Text Processing. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:487-492 [Conf ] Gaël Dias , Bruno Conde Towards Web Browsing for Visually Impaired People. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:493-496 [Conf ] Mahmood Houshmand , Mohammad Daneshvar Kakhki Presenting a Rule Based Loan Evaluation Expert System. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:497-502 [Conf ] Marc Karam , Mohamed A. Zohdy Development of a Model-Based Dynamic Recurrent Neural Network for Modeling Nonlinear Systems. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:503-506 [Conf ] Jamal Bentahar , John-Jules Ch. Meyer , Bernard Moulin Securing Agent-Oriented Systems: An Argumentation and Reputation-based Approach. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:507-515 [Conf ] Farhad Mohamad Kazemi , Saeed Samadi , Hamid Reza Poorreza , Mohammad R. Akbarzadeh-Totonchi Vehicle Recognition Using Curvelet Transform and SVM. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:516-521 [Conf ] C. Y. Ho , W. Y. Lo , Anthony S. Fong Memory Garbage Collection for an Object-Oriented Processor. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:522-527 [Conf ] C. Y. Ho , K. F. Chong , C. H. Yau , Anthony S. Fong A Study of Dynamic Branch Predictors: Counter versus Perceptron. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:528-536 [Conf ] A. R. Ali Ahmadi , Farzad Soltani , Majid Gheitasi An ICT Technical Reference Model for Iran Universities. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:537-542 [Conf ] Muammer Zerenler Information Technology and Business Performance in Agile Manufacturing: An Empirical Study in Textile Industry. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:543-549 [Conf ] Marcus J. Huber , Sanjeev Kumar , Sean A. Lisse , David McGee Authority, Deontics and Joint Intentions. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:550-555 [Conf ] Christina N. Michael , Xiao Su Incorporating a New Hash Function in OpenPGP and SSL/TLS. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:556-561 [Conf ] Elridge D'Mello , Jerzy Rozenblit Design For a Patient-Centric Medical Information System Using XML Web Services. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:562-567 [Conf ] Sachin Singh , Uday Joshi , Prem Uppuluri Efficient and Lightweight File System for Desktop Grids. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:568-576 [Conf ] Leon Sanders , Y. B. Reddy Detecting Blood Clots using Neural Networks. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:577-582 [Conf ] Masaki Murata , Tomohiro Mitsumori , Kouichi Doi Overfitting in protein name recognition on biomedical literature and method of preventing it through use of transductive SVM. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:583-588 [Conf ] Yasuhiro Kiuchi , Tomonobu Ozaki , Takenao Ohkawa Partial Geometric Hashing for Retrieving Similar Interaction Protein Using Profile. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:589-596 [Conf ] Hisham M. Haddad , Mauricio Jose Ordoñez Enhanced Component Reuse with Atomic Domains: Application Scenarios. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:597-602 [Conf ] Sajjan G. Shiva , Lubna Abou Shala Software Reuse: Research and Practice. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:603-609 [Conf ] Chia-Chu Chiang Engineering Documents into XML File Formats. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:610-615 [Conf ] Brian Demmings , Elhadi Shakshuki , Tomasz Müldner AETA: Algorithm Explanation Teaching Agent. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:616-621 [Conf ] Chang-Mog Lee , Jeong-Ok Kim , Ok-Bae Chang User Interface Prototype for User-Centered Interface Design. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:622-627 [Conf ] YoungJoon Byun A Tool Support for Design and Validation of Communication Protocol using State Transition Diagrams. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:628-636 [Conf ] Elhadi Shakshuki , Hsiang-Hwa Koo , Darcy G. Benoit Negotiation Strategies for Agent-based Meeting Scheduling System. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:637-642 [Conf ] Carlos Eduardo de Barros Paes , Celso Massaki Hirata RUP Extension for the Development of Secure Systems. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:643-652 [Conf ] Nirmal Gami , Boleslaw Mikolajczak Integration of Multilevel Security Features Into Loosely Coupled Inter-Organizational Workflows. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:653-657 [Conf ] Mehdi EffatParvar , MohammadReza EffatParvar , Akbar Bemana , Mehdi Dehghan Determining a Central Controlling Processor with Fault Tolerant Method in Distributed System. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:658-663 [Conf ] Hazem M. Bahig , Hatem M. Bahig Optimal Parallel Merging by Counting. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:664-669 [Conf ] Cleber Mira , Joao Meidanis Sorting by Block-Interchanges and Signed Reversals. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:670-676 [Conf ] Andre Oboler , Charles Twardy , David W. Albrecht Super Iterator A design pattern for Algorithm and Data structure collections. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:677-678 [Conf ] Andre Oboler , Ian Sommerville Research Documentation Guidelines - Capturing knowledge, improving research. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:679-684 [Conf ] Judith Ann Ouimet , Sermsak Buntha , Sergiu M. Dascalu SERT: Software Tool for Generating Student Engagement Reports. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:685-692 [Conf ] Walter Dosch , Gongzhu Hu On Irregular Behaviours of Interactive Stacks. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:693-700 [Conf ] V. Vallieswaran , Bernard Menezes ArchKriti : A Software Architecture Based Design and Evaluation Tool Suite. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:701-706 [Conf ] Walter Dosch , Annette Stümpel High-Level Design of a Request Driven Sender Component. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:707-714 [Conf ] Yongyan Zheng , Jiong Zhou , Paul Krause A Model Checking based Test Case Generation Framework forWeb Services. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:715-722 [Conf ] Thomas Poonnen , Adly T. Fam A Novel VLSI Divide and Conquer Implementation of the Iterative Array Multiplier. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:723-728 [Conf ] Guoqiang Yang , Mei Yang , Yulu Yang , Yingtao Jiang On the Physicl Layout of PRDT-Based NoCs. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:729-733 [Conf ] Yaoting Jiao , Yulu Yang , Ming He , Mei Yang , Yingtao Jiang Multi-path Routing for Mesh/Torus-Based NoCs. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:734-742 [Conf ] Sung-Seok Kang , Young-Sang Kim , Hyo-Sun Kim , Young Joong Lee , Ki Cheol Jang Location Based Security Architecture Based on Smart Client Model For Mobile Environment. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:743-746 [Conf ] Haeryong Park , Hyun Kim , Kilsoo Chun , Jaeil Lee , Seongan Lim , Ikkwon Yie Untraceability of Group Signature Schemes based on Bilinear Mapping and Their Improvement. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:747-753 [Conf ] Chik How Tan , Joseph Chee Ming Teo Protection AgainstWeb-based Password Phishing. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:754-759 [Conf ] Linh Ngo , Amy W. Apon Using Shibboleth for Authorization and Authentication to the Subversion Version Control Repository System. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:760-765 [Conf ] Jarrod Trevathan , Wayne Read A Simple Shill Bidding Agent. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:766-771 [Conf ] Raylin Tso , Takeshi Okamoto , Eiji Okamoto An Improved Signcryption Scheme and Its Variation. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:772-778 [Conf ] Rajni Goel , Moses Garuba , Anteneh Girma Research Directions in Quantum Cryptography. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:779-784 [Conf ] Moses Garuba , Jiang Li , Legand L. Burge III Comparative Analysis of Email Filtering Technologies. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:785-789 [Conf ] Moses Garuba , Jiang Li Preventing parameterized vulnerability in Web based applications. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:790-793 [Conf ] Rajni Goel , Moses Garuba , Chunmei Liu , Trang Nguyen The Security Threat Posed by Steganographic Content on the Internet. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:794-798 [Conf ] Jarrod Trevathan , Wayne Read Detecting Collusive Shill Bidding. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:799-808 [Conf ] Sahel Alouneh , Abdeslam En-Nouaary , Anjali Agarwal Securing MPLS Networks with Multi-path Routing. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:809-814 [Conf ] Fengying Li , Qingshui Xue , Zhenfu Cao Crypanalysis of Kuo and Chen's Threshold Proxy Signature Scheme Based on the RSA. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:815-818 [Conf ] Omer Mahmood Developing Web 2.0 Applications for Semantic Web of Trust. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:819-824 [Conf ] Ji-Seon Lee , Jik Hyun Chang Semantically Secure Authenticated Encryption Scheme and the Same Scheme for Ad-hoc Group Called a Ring. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:825-830 [Conf ] Roman V. Yampolskiy Secure Network Authentication with PassText. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:831-836 [Conf ] Roman V. Yampolskiy Human Computer Interaction Based Intrusion Detection. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:837-842 [Conf ] Chandrashekhar A. Dhote , M. S. Ali Materialized View Selection in Data Warehousing. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:843-847 [Conf ] Dattatray V. Jadhav , Raghunath S. Holambe Multiresolution based Kernel Fisher Discriminant Model for Face Recognition. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:848-853 [Conf ] Alicia Nicki Washington , Harry G. Perros Analysis of a Traffic-Groomed Optical Network with Alternate Routing. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:854-862 [Conf ] Terry C. House Client/Server Access: Satellite-ATM Connectivity Using a Knowledge Management Approach. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:863-867 [Conf ] Catherine H. Gebotys , B. A. White A Phase Substitution Technique for DEMA of Embedded Cryptographic Systems. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:868-869 [Conf ] Fabio Dias Fagundez , Ricardo Niederberger Cabral , Gustavo Melim do Carmo Decoupling Relational Database from Object Oriented Layers. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:870-871 [Conf ] Wei Hoo Chong iDENTM Smartphone Embedded Software Testing. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:872-873 [Conf ] Sajid Hussain , Richard Peters , Obidul Islam A Quick and Energy Efficient Algorithm to Maximize Lifetime of Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:874-875 [Conf ] Gopinath Balakrishnan , Mei Yang , Yingtao Jiang , Yoohwan Kim Performance Analysis of Error Control Codes for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:876-879 [Conf ] Shinya Ito , Kenji Yoshigoe Exponentially Aggressive Preservation of Nearly Depleted Nodes for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:880-882 [Conf ] Parag P. Joshi , Thomas C. Jannett Simulation of Localized Performance-Guided Reconfiguration of Distributed Sensor Networks. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:883-884 [Conf ] Mohammad Shirali-Shahreza Improving Mobile Banking Security Using Steganography. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:885-887 [Conf ] Yi Qi Gui , Eysuk Jung , Young Choi , Hwang Kyu Choi An Efficient Periodic Broadcasting Scheme for Mobile Video-on-Demand System. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:888-889 [Conf ] Toshihiko Yamakami Classification of Mobile Internet User Behaviors using Qualitative Transition Patterns. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:890-892 [Conf ] Thomas Wollinger , Vladyslav Kovtun Fast explicit formulae for genus 2 hyperelliptic curves using projective coordinates. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:893-897 [Conf ] Amir Khatibzadeh , Catherine H. Gebotys Enhanced Current-Balanced Logic (ECBL): An Area Efficient Solution to Secure Smart Cards against Differential Power Attack. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:898-899 [Conf ] Fan Zhang Power Analysis Attacks on ECC Randomized Automata. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:900-901 [Conf ] Chima Adiele A Formal Interactivity Model for aWeb Community. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:902-903 [Conf ] Tien N. Nguyen A Novel Vector-based Keyword Extracting Tool. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:904-905 [Conf ] Emília de Menezes , Adilson Marques da Cunha Creating an Effective Infrastructure to Develop GIS. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:906-907 [Conf ] Allan Zhang , Sumi Helal SuperCache: A Mechanism to Minimize the Front End Latency. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:908-914 [Conf ] Alexander Khitun , M. Bao , JooYoung Lee , Kang L. Wang , D. W. Lee , S. Wang Cellular Nonlinear Network with Spin Wave Bus. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:915-919 [Conf ] Xinming Duan , Yulu Yang , Mei Yang , Lei Li , Yingtao Jiang Topology and Binary Routing Schemes of A PRDT-Based NoC. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:920-924 [Conf ] Geylani Kardas , Ebru Celikel A Smart Card Mediated Mobile Platform for Secure E-Mail Communication. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:925-928 [Conf ] D. Prabu , V. Vanamala , Sanjeeb Kumar Deka , R. Sridharan , B. B. Prahlada Rao , N. Mohanram Design and Implementation of a High Performance MPI for Large Scale Computing System. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:929-932 [Conf ] Alan McCabe , Jarrod Trevathan Pre-processing of On-line Signals in Noisy Environments. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:933-936 [Conf ] G. Tholkappia Arasu , V. Palanisamy NeuroFuzzy Agent Programming for Processing of EEG/ECG/EMG Waveforms. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:937-938 [Conf ] Farhad Mohamad Kazemi , Saeed Samadi , Hamid Reza Poorreza , Mohammad R. Akbarzadeh-Totonchi Vehicle Recognition Based on Fourier, Wavelet and Curvelet Transforms - a Comparative Study. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:939-940 [Conf ] Eui-Jong Jeong , Goo Yeon Lee Efficient Location Management Scheme using MLR considering Local Usages. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:941-942 [Conf ] Jinsuo Zhang , Stacey Franklin Jones uKey: A Unified Key Management and Authentication Automation Middleware For Heterogeneous System. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:943-944 [Conf ] Kun-Yo Liu , Tim Yao Design of a RFID Transponder for Application on Secutiry. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:945-946 [Conf ] Ralucca Gera On the Dominator Colorings in Bipartite Graphs. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:947-952 [Conf ] Jesús Ubaldo Quevedo-Torrero , Alma Delia Rodríguez-Bernal Goal Oriented Templates to Dynamically Assess Knowledge. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:953-954 [Conf ] Fengyuan Xu , Zhiyi Fang Individuation Learning Components in Intelligent Education Games. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:955-956 [Conf ] Avinash J. Agrawal , Manoj B. Chandak Mobile Interface for Domain Specific Machine Translation Using Short Messaging Service. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:957-958 [Conf ] Mazin AlHadidi Utilizing the Fuzzy Logic Model to Develop the Arab Management System Performance. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:959-960 [Conf ] Rashid Bin Muhammad A Distributed Geometric Routing Algorithm for Ad HocWireless Networks. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:961-963 [Conf ] Kang Sun , Xuezeng Pan , Jimin Wang , Lingdi Ping PAD: A Design Space Exploration Model For Reconfigurable Systems. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:964-965 [Conf ] Mohsen Beheshti , Richard A. Wasniowski Data Fusion Support for Intrusion Detection and Prevention. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:966- [Conf ] F. Sheeja Mary Erratic Cryptosystem for Elevated Message Security. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:967-969 [Conf ] SangKwon Moon , YongJoo Song , Keuntae Park , Daeyeon Park Mobility Aware Transmission Power Control in Mobile Ad-hoc Network. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:970- [Conf ] Ji-Seon Lee , Jik Hyun Chang Generating a Proxy Signature on a Confidential Message. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:971- [Conf ] Mojtaba Shakeri , Abolfazl Toroghi Haghighat , Mohammad K. Akbari Modeling and Evaluating the Scalability of Instruction Fetching in Superscalar Processors. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:972- [Conf ] Leila Beig , Atefeh Ghavamifar Proposing a Conceptual Model for Organizational Memory Constructs in Dynamic Virtual Organizations. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:973- [Conf ] Rabindra Ku. Jena , Gopal Ku. Sharma A Multi-Objective Evolutionary Algorithm Based Optimization Model for Network-on-Chip Synthesis. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:977-982 [Conf ] Muhammad Z. Hasan , Sotirios G. Ziavras Runtime Partial Reconfiguration for Embedded Vector Processors. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:983-988 [Conf ] Hongyan Yang , Sotirios G. Ziavras , Jie Hu FPGA-based Vector Processing for Matrix Operations. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:989-994 [Conf ] A. Byrne , Nicolas Meloni , Francis M. Crowe , William P. Marnane , Arnaud Tisserand , Emanuel M. Popovici SPA resistant Elliptic Curve Cryptosystem using Addition Chains. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:995-1000 [Conf ] Tony Benavides , Justin Treon , Weide Chang The Apparatus and Enabling of a Code Balanced System. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:1001-1007 [Conf ] Griselda Saldaña , Miguel Arias-Estrada Compact FPGA-based systolic array architecture suitable for vision systems. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:1008-1013 [Conf ] Mitchell Loeb , Alan L. Tharp Gray Code Chaining: A High Performance Hashing Algorithm for Limited Storage Applications. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:1014- [Conf ] Bijan Ansari , Huapeng Wu Efficient Finite Field Processor for GF(2^163) and its VLSI Implementation. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:1021-1026 [Conf ] Muhammad Ali , Michael Welzl , Sven Hessler A Fault tolerant mechanism for handling Permanent and Transient Failures in a Network on Chip. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:1027-1032 [Conf ] Jun Ho Bahn , Seung Eun Lee , Nader Bagherzadeh On Design and Analysis of a Feasible Network-on-Chip (NoC) Architecture. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:1033-1038 [Conf ] Woojin Park , Inho Kim , Kyungsoo Lim , Sinam Woo , Sunshin An Implementation and Performance Analysis of an IPv6 Multicast Forwarder for the IXP2400 Network Processor. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:1039-1044 [Conf ] Mohsen Soryani , Mohsen Sharifi , Mohammad Hossein Rezvani Performance Evaluation of Cache Memory Organizations in Embedded Systems. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:1045-1050 [Conf ] Jawed I. A. Siddiqi , Babak Akhgar , Nazaraf Shah , Fazilatur Rahman , Nahum Korda , Raphael Attias , Maria Teresa Andrade , Judy Dori , Boas Hashavia , Norbert Benamou A System for Semantically Enhanced, Multifaceted, Collaborative Access: Requirements and Architecture. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:1051-1056 [Conf ] Günter Knittel On the Design of a Parallel Link Using Rigid-Flex PCB Technology. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:1057-1062 [Conf ] Chandana Watagodakumbura , Henry Praluyanto Composite Burst Assembly and Lower Real-Time Class Utilization Threshold in Optical Burst Switching As Means of Overcoming Effects of Self-Similarity. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:1063-1070 [Conf ] Daniela Ferrero Some properties of superline digraphs. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:1073-1076 [Conf ] Sina Jafarpour , Mohammad Ghodsi , Keyvan Sadri , Zuheir Montazeri Computational Power of the Quantum Turing Automata. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:1077-1082 [Conf ] Ron Coleman Adaptive Pattern Movement for Mobile Games. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:1083-1088 [Conf ] Samee Ullah Khan , Munib Ahmed A Bottleneck Eliminating Approximate Algorithm for PON Layout. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:1089-1094 [Conf ] Yong Wang , Xiaochun Yun , Yifei Li Analyzing the Characteristics of Gnutella Overlays. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:1095-1100 [Conf ] Mohammad Fathian , Babak Amiri Investigation of Effective Factors on e-Readiness of Iranian Manufacturing SMEs. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:1101-1106 [Conf ] Yao-Hsin Chou , I-Ming Tsai , Chin-Shyurng Fahn , Shi-Jinn Horng , Sy-Yen Kuo Dependabilities in a High-performance Quantum Real-time Distributed System. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:1107-1112 [Conf ] Wei-Lun Chang , Soe-Tsyr Yuan Collaborative Pricing for e-Service Bundle Delivery: A Framework. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:1113-1118 [Conf ]