Conferences in DBLP
General Chair's Message. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:- [Conf ] Reviewers. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:- [Conf ] Varsha Hemant Patil , Snehal M. Kamlapur , Manikrao L. Dhore Six Sigma in Education: To Achieve Overall Excellence in the Field of Education. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:2-5 [Conf ] Jacob R. Miller , Sandra Gorka , Barry M. Lunt , Joseph J. Ekstrom , Eydie Lawson , Han Reichgelt , Reza Kamali Hiring the IT Graduate: What's in the Box? [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:6-10 [Conf ] Inger Björkman , Ann Johansson Implications of IT in Different Professions. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:11-19 [Conf ] Ghita Kouadri Mostéfaoui , Zakaria Maamar , Nanjangud C. Narendra , Subramanian Sattanathan Decoupling Security Concerns in Web Services Using Aspects. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:20-27 [Conf ] Hisham M. Haddad Integrated Collections: Approach to Software Component Reuse. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:28-33 [Conf ] Sumanth Yenduri An Agglomerative Clustering Methodology For Data Imputation. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:34-39 [Conf ] Eugenio Capra , Chiara Francalanci Cost Implications of Software Commonality and Reuse. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:40-45 [Conf ] Umesh Bellur , V. Vallieswaran On OO Design Consistency in Iterative Development. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:46-51 [Conf ] Abbas Heydarnoori , Farhad Mavaddat Reliable Deployment of Component-based Applications into Distributed Environments. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:52-57 [Conf ] Stefan Senczyna Modular Model of a Logic Circuit Using Object-Oriented Programming. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:58-65 [Conf ] Chia-Chu Chiang A Language for Writing Formal Software Specifications: The Library Problem Revisited. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:66-71 [Conf ] Göran Calås , Andreas Boklund , Stefan Mankefors-Christiernin A First Draft of RATF: A Method Combining Robustness Analysis and Technology Forecasting. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:72-77 [Conf ] Hai Yan , Zhijie Jerry Shi Studying Software Implementations of Elliptic Curve Cryptography. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:78-83 [Conf ] Radwan Tahboub , Vasile Lazarescu Novel Approach for Remote Energy Meter Reading Using Mobile Agents. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:84-89 [Conf ] Elhadi Shakshuki , Abdul Wasey Matin RL-Agent That Learns in Collaborative Virtual Environment. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:90-95 [Conf ] Walter Dosch On History-Sensitive Models of Interactive Stacks. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:96-103 [Conf ] L. Robert , R. Nadarajan New Algorithms For Random Access Text Compression. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:104-111 [Conf ] Shifeng Zhang Integrating Non-Functional Properties to Architecture Specification and Analysis. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:112-117 [Conf ] Iván Martínez-Ortiz , Pablo Moreno-Ger , José Luis Sierra , Baltasar Fernández-Manjón Production and Maintenance of Content-Intensive Videogames: A Document-Oriented Approach. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:118-123 [Conf ] Tien Nhut Nguyen Integrating Change Management with Software Document Relationship Management. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:124-130 [Conf ] Elhadi Shakshuki , Omkarnath Prabhu Agent Launch Pattern for Creating Agents. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:131-136 [Conf ] Samir N. Hamade The Legal and Political Aspects of Software Piracy in the Arab World. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:137-142 [Conf ] Wang-chan Wong , Mohammad Eyadat , Shane Ng Degree of Freedom - Experience of Applying Software Framework. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:143-148 [Conf ] W. M. Beynon , R. C. Boyatt , S. B. Russ Rethinking Programming. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:149-154 [Conf ] Jitender Kumar Chhabra , K. K. Aggarwal Measurement of Intra-Class & Inter-Class Weakness for Object-Oriented Software. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:155-160 [Conf ] Raed Shatnawi , Wei Li An Investigation of Bad Smells in Object-Oriented Design. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:161-165 [Conf ] Maged Hamada Ibrahim Two-Party Private Vector Dominance: The All-Or-Nothing Deal. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:166-171 [Conf ] Adam J. Elbirt , Christof Paar Efficient Implementation of Galois Field Fixed Field Constant Multiplication. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:172-177 [Conf ] Kooroush Manochehri , Saadat Pourmozafari , Babak Sadeghian Efficient Methods in Converting to Modulo 2^n+1 and 2^n-1. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:178-185 [Conf ] Guido Bertoni , Luca Breveglieri , Pasqualina Fragneto , Gerardo Pelosi Parallel Hardware Architectures for the Cryptographic Tate Pairing. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:186-191 [Conf ] Robert Ronan , Colm O'Eigeartaigh , Colin C. Murphy , Michael Scott , Tim Kerins , William P. Marnane An Embedded Processor for a Pairing-Based Cryptosystem. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:192-197 [Conf ] He Ge , Stephen R. Tate Efficient Authenticated Key-Exchange for Devices with a Trusted Manager. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:198-203 [Conf ] Kris Tiri , Patrick Schaumont , Ingrid Verbauwhede Side-Channel Leakage Tolerant Architectures. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:204-209 [Conf ] Nadia Nedjah , Luiza de Macedo Mourelle Four Hardware Implementations for the M-ary Modular Exponentiation. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:210-215 [Conf ] Nadia Nedjah , Luiza de Macedo Mourelle , Marco Paulo Cardoso A Compact Piplined Hardware Implementation of the AES-128 Cipher. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:216-221 [Conf ] Mei Yang , Mayauna McCullough , Yingtao Jiang , Jun Zheng K-Selector-Based Dispatching Algorithm for Clos-Network Switches. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:222-226 [Conf ] Rama Sangireddy Instruction Format Based Selective Execution for Register Port Complexity Reduction in High-Performance Processors. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:227-232 [Conf ] Erik S. Gough , Michael D. Kane Evaluating Parallel Computing Systems in Bioinformatics. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:233-238 [Conf ] Yulu Yang , Yang Yu RDT Properties and Evaluations. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:239-244 [Conf ] Jianfeng An , Xiaoya Fan , Shengbing Zhang , Danghui Wang , Yi Wang VMSIM: Virtual Machine Based a Full System Simulation Platform for Microprocessors' Functional Verification. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:245-249 [Conf ] Hooman Parizi , Afshin Niktash , Amir Hosein Kamalizad , Nader Bagherzadeh A Reconfigurable Architecture for Wireless Communication Systems. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:250-255 [Conf ] Fei Hu , Carter May , Xiaojun Cao Data Aggregation in Distributed Sensor Networks: Towards An Adaptive Timing Control. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:256-261 [Conf ] Nahdia Tabassum , Quazi Ehsanul Kabir Mamun , Yoshiyori Urano COSEN: A Chain Oriented Sensor Network for Efficient Data Collection. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:262-267 [Conf ] Laxmi Gewali , Khursheed Mohamad , Min Tun Interference Aware Dominating Set for Sensor Network. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:268-273 [Conf ] Mathew M. Noel , Parag P. Joshi , Thomas C. Jannett Improved Maximum Likelihood Estimation of Target Position in Wireless Sensor Networks using Particle Swarm Optimization. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:274-279 [Conf ] Hyojung Lee , Wonpil Yu , Youngmi Kwon Efficient RBS in Sensor Networks. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:279-284 [Conf ] Vasu Jolly , Naoto Kimura , Shahram Latifi Reliable Multipath Information Dissemination via Label Forwarding in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:285-293 [Conf ] Philip Garner , Ian Mullins , Reuben Edwards , Paul Coulton Mobile Terminated SMS Billing - Exploits and Security Analysis. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:294-299 [Conf ] Werner Kurschl , Stefan Mitsch , Rene Prokop SmartDOTS - A Framework for Efficient Data Synchronization on Mobile Devices. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:300-305 [Conf ] Moushumi Sharmin , Shameem Ahmed , Sheikh Iqbal Ahamed MARKS (Middleware Adaptability for Resource Discovery, Knowledge Usability and Self-healing) for Mobile Devices of Pervasive Computing Environments. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:306-313 [Conf ] Tommi Laukkanen , Teuvo Kantanen Consumer Value Segments in Mobile Bill Paying. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:314-319 [Conf ] Tarek El Kiki , Elaine Lawrence Government as a Mobile Enterprise: Real-time, Ubiquitous Government. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:320-327 [Conf ] Werner Kurschl , Stefan Mitsch , Rene Prokop SelectiveDES: A Distributed Event Service Add-On for Invocation-Based Middleware supporting Selective Multi-Channel Communication and Notification Delivery. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:328-333 [Conf ] Abdul Nasir , Mah-Rukh Mah-Rukh Internet Mobility using SIP and MIP. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:334-339 [Conf ] Eunjung Lee , Jinsuk Baek , Shou-Hsuan Stephen Huang A Dynamic Mobility Management Scheme for VoIP Services. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:340-345 [Conf ] Natali Delic , Ana Vukasinovic Mobile Payment Solution - Symbiosis Between Banks, Application Service Providers and Mobile NetworkOperators. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:346-350 [Conf ] Jawed I. A. Siddiqi , Babak Akhgar , Mehrdad Naderi , Wolfgang Orth , Norbert Meyer , Miika Tuisku , Gregor Pipan , Mario López Gallego , José Alberto García , Maurizio Cecchi , Jean-Noel Colin Secure ICT Services for Mobile and Wireless Communications: A Federated Global Identity Management Framework. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:351-357 [Conf ] Isak Taksa , Amanda Spink Using the Web to Construct Taxonomy for a Heterogeneous Community of Practice. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:358-363 [Conf ] Michelle Cheatham , Mateen M. Rizki Feature and Prototype Evolution for Nearest Neighbor Classification of Web Documents. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:364-369 [Conf ] Amanda Spink , Bernard J. Jansen , Chris Blakely , Sherry Koshman Overlap Among Major Web Search Engines. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:370-374 [Conf ] Nadine Schmidt-Maenz , Martina Koch A General Classification of (Search) Queries and Terms. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:375-381 [Conf ] Gil Cheol Park , Seok Soo Kim , Gun Tae Bae , Yang Sok Kim , Byeong Ho Kang An Automated WSDL Generation and Enhanced SOAP Message Processing System for Mobile Web Services. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:382-387 [Conf ] Satoshi Niwa , Takuo Doi , Shinichi Honiden Web Page Recommender System based on Folksonomy Mining for ITNG '06 Submissions. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:388-393 [Conf ] Daqing He A Study of Self-Organizing Map in Interactive Relevance Feedback. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:394-401 [Conf ] Dhilak Damodaran , Rohit Singh , Phu Dung Le Group Key Management in Wireless Networks Using Session Keys. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:402-407 [Conf ] Hao Luo , Binxing Fang , Xiao-chun Yun Anomaly Detection in SMTP Traffic. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:408-413 [Conf ] Hwayoung Um , Edward J. Delp A Secure Group Key Management Scheme for Wireless Cellular Networks. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:414-419 [Conf ] Dima Novikov , Roman V. Yampolskiy , Leon Reznik Anomaly Detection Based Intrusion Detection. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:420-425 [Conf ] Marko Hassinen , Maija Marttila-Kontio , Mikko Saesmaa , Heli Tervo Secure Two-Way Transfer of Measurement Data. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:426-431 [Conf ] Yiling Wang , Dhilak Damodaran , Phu Dung Le Efficient Group Key Management in Wireless Networks. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:432-439 [Conf ] Mahdi Seify New Method for Risk Management in CRM Security Management. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:440-445 [Conf ] Ranjit Bose Intelligent Technologies for Managing Fraud and Identity Theft. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:446-451 [Conf ] Kazimierz Kowalski , Mohsen Beheshti Analysis of Log Files Intersections for Security Enhancement. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:452-457 [Conf ] Xianping Wu , Osama Dandash , Phu Dung Le The Design and Implementation of a Smartphone Payment System based on Limited-used Key Generation Scheme. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:458-463 [Conf ] Dragos Trinca Sequential and Parallel Cascaded Convolutional Encryption with Local Propagation: Toward Future Directions in Symmetric Cryptography. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:464-469 [Conf ] Yu Yu , Jussipekka Leiwo , Benjamin Premkumar A Study on the Security of Privacy Homomorphism. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:470-475 [Conf ] Wei Wu , Phu Dung Le An Efficient and Secure Code Sharing for Peer-to-Peer Communications. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:476-481 [Conf ] Shang-Lin Hsieh , Hsuan-Chieh Huang , I-Ju Tsai A Copyright Protection Scheme for Gray-Level Images Using Human Fingerprint. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:482-489 [Conf ] E. Udoh , J. Rhoades Mining Documents in a Small Enterprise Using WordStat. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:490-494 [Conf ] Arthi Anandhan , Senthil Dhandapani , Hassan Reza , Karthik Namasivayam Web Usability Testing - CARE Methodology. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:495-500 [Conf ] Yoon-Shik Tae , Jeong Woo Son , Mi-hwa Kong , Jun-Seok Lee , Seong-Bae Park , Sang-Jo Lee A Hybrid Approach to Error Reduction of Support Vector Machines in Document Classification. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:501-506 [Conf ] K. Vivek , M. Gopa , B. K. Panigrahi Knowledge Discovery in Power Quality Data Using Support Vector Machine and S-Transform. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:507-512 [Conf ] Panida Songram , Veera Boonjing , Sarun Intakosum Closed Multidimensional Sequential Pattern Mining. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:512-517 [Conf ] Chaoguang Men , Yunlong Zhao , Wenbin Yao A Two-Phase Time-based Consistent Checkpointing Strategy. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:518-523 [Conf ] Ziad Al-Sharif , Clinton Jeffery Adding High Level VoIP Facilities to the Unicon Language. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:524-529 [Conf ] Chi Hun Lee , Yi Qi Gui , In Bum Jung , Chang Yeol Choi , Hwang Kyu Choi A Peer to Peer Prefix Patching Scheme for VOD Servers. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:530-534 [Conf ] Teck-Kuen Chua , David C. Pheanis Bandwidth-Conserving Real-Time VoIP Teleconference System. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:535-540 [Conf ] K. Lakshmi , Saswati Mukherjee An Improved Feature Selection using Maximized Signal to Noise Ratio Technique for TC. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:541-546 [Conf ] Madasu Hanmandlu , Anuj K. Tiwari , Vamsi Krishna Madasu , Shantaram Vasikarla Mixed Noise Correction in Gray Images using Fuzzy Filters. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:547-553 [Conf ] Umar Farooq , Muhammad Saleem , Habibullah Jamal Parameterized FIR Filtering IP Cores for Reusable SoC Design. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:554-559 [Conf ] S. A. M. Rizvi , Pankaj Agarwal A New Bucket-Based A New Bucket-Based Algorithm for Finding LCS from two given Molecular Sequences. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:560-561 [Conf ] Parag P. Joshi , Thomas C. Jannett Performance-Guided Reconfiguration of Wireless Sensor Networks that Use Binary Data for Target Localization. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:562-565 [Conf ] Mohammad Al-Shurman , Seong-Moo Yoo Key Pre-Distribution Using MDS Codes in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:566-567 [Conf ] Kiarash Narimani , Gordon B. Agnew Key Management and Mutual Authentication for Multiple Field Records Smart Cards. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:568-569 [Conf ] Tianzhou Chen , Zhenjie He , Wei Hu Effectively implement AES for EFI/Tiano based on IA-32 Platform. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:570- [Conf ] Yi Wang , Jussipekka Leiwo , Thambipillai Srikanthan , Yu Yu FPGA based DPA-resistant Unified Architecture for Signcryption. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:571-572 [Conf ] Guido Bertoni , Luca Breveglieri , Matteo Venturi ECC Hardware Coprocessors for 8-bit Systems and Power Consumption Considerations. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:573-574 [Conf ] Tai-Chi Lee , Richard Zeien , Adam Roach , Patrick Robinson DES Decoding Using FPGA and Custom Instructions. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:575-577 [Conf ] Xiannong Meng A Comparative Study of Performance Measures for Information Retrieval Systems. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:578-579 [Conf ] Ssu-An Lo , Chong-Yen Lee , Chun-Chieh Hsu Automatically Classify Web Sites by Multimembership Bayesian Approach. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:580-583 [Conf ] Andrei Smirnov , Steven Rowan Express Risk Assessment through Web Access to Simulation Data. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:584-585 [Conf ] Mikyeong Moon , Youngbong Kim , Keunhyuk Yeom Contextual Events Framework in RFID System. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:586-587 [Conf ] Akio Sashima , Noriaki Izumi , Koichi Kurumatani , Yoshiyuki Kotani Dynamic Role Assignment Protocol for Pervasive Computing. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:588-589 [Conf ] Nathan Denny , Theodore El Hourani , Jaime Denny , Scott Bissmeyer , David Irby SpamCooker: A Method for Deterring Unsolicited Electronic Communications. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:590-591 [Conf ] E. Udoh , J. Hoover Storage of a Portal-Extracted Data in a Relational Database. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:592-594 [Conf ] Nikolay Manchev Parallel Algorithm for Run Length Encoding. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:595-596 [Conf ] Shilpa Ambarish , Mahmoud Fawzy Wagdy A Wide-Band Digital Phase-Locked Looop. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:597-598 [Conf ] Haripriya Janardhan , Mahmoud Fawzy Wagdy Design of a 1GHz Digital PLL Using 0.18\mu m CMOS Technology. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:599-600 [Conf ] Narongrit Waraporn , Syed V. Ahamed Intelligent Medical Search Engine by Knowledge Machine. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:601-605 [Conf ] Hisham Al-Mubaid , Ping Chen Biomedical Term Disambiguation: An Application to Gene-Protein Name Disambiguation. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:606-612 [Conf ] Heidi J. C. Ellis , Susan Fox-Erlich , Timothy O. Martyn , Michael R. Gryk Development of an Integrated Framework for Protein Structure Determinations: A Logical Data Model for NMR Data Analysis. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:613-618 [Conf ] Kyle D. Lutes , Ibrahim M. Baggili Diabetic e-Management System (DEMS). [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:619-624 [Conf ] Ray R. Hashemi , Alexander A. Tyler , Christopher Childers , Arthur Chausmer Similarity Analysis of Bone Mineral Density Measurements of Femur Sites Using Dendrogram. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:625-630 [Conf ] Li-wei Lehman , Steven Lerman A Decentralized Network Coordinate System for Robust Internet Distance. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:631-637 [Conf ] Yunlong Zhao , Chaoguang Men , Nianmin Yao Internet Accessing for IPv6 MANETs. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:638-645 [Conf ] Ruay-Shiung Chang , Jih-Sheng Chang Adaptable Replica Consistency Service for Data Grids. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:646-651 [Conf ] Ziga Turk , Matevz Dolenc , Etiel Petrinja The Role of Collaboration Grids in the Roadmaps of Networked Organizations. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:652-657 [Conf ] L. J. Wang , A. S. M. Sajeev , Lachana Inchaiwong A Formal Specification of Interaction Widgets Hierarchy Framework. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:658-664 [Conf ] Jordi Castellà-Roca , Josep Domingo-Ferrer , Francesc Sebé On the Security of a Repaired Mental Poker Protocol. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:664-668 [Conf ] Ron Coleman Boosting Blackjack Returns with Machine Learned Betting Criteria. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:669-673 [Conf ] Sang-Soo Kim , Jeon Woo Son , Mi-hwa Kong , Seong-Bae Park , Sang-Jo Lee Korean Text Chunk Identification Using Support Vector Machines. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:674-679 [Conf ] Bhushan Bauskar , Boleslaw Mikolajczak Abstract Node Method for Integration of Object Oriented Design with Colored Petri Nets. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:680-687 [Conf ] Saurabh Mukherjee , Shashikala Tapas Modeling and Simulation of Virtual Warfare Using Virtual Reality Paradigm. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:688-689 [Conf ] Yi Yu , Man Lo Kai , Anthony S. Fong A Performance Analysis of an Object-Oriented Processor. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:690-694 [Conf ] Kazem Taghva , Min Xu , Emma Regentova , Tom Nartker Utilizing XML Schema for Describing and Querying Still Image Databases. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:695-700 [Conf ] Seyyed Mohsen Hashemi , Mohammadreza Razzazi , Ali Bahrami ISRUP E-Service Framework for agile Enterprise Architecting. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:701-706 [Conf ] Pengyue J. Lin , Behrokh Samadi , Alan Cipolone , Daniel R. Jeske , Sean Cox , Carlos Rendón , Douglas Holt , Rui Xiao Development of a Synthetic Data Set Generator for Building and Testing Information Discovery Systems. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:707-712 [Conf ] Il-Woo Lee , Ho-Jin Park , Kwang-Roh Park , Sang-Ha Kim A Proposed Platform & Performance Estimation of Digital-Home Service Delivery/Management Systems. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:713-719 [Conf ] Yoohwan Kim , Ju-Yeon Jo , Kyunghee Kim Suh Baseline Profile Stability for Network Anomaly Detection. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:720-725 [Conf ] Basim Alhadidi Middleware as an Infrastructure for Network Applications. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:726-729 [Conf ] Tan Ee Xion , Hiew Pang Leang Traffic Congestion Controller in Multihop Communication Network. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:730-735 [Conf ] E. Earl Eiland , Lorie M. Liebrock Optimizing Network Data Transmission. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:735-741 [Conf ] Mahmoud Fawzy Wagdy , Srishti Vaishnava A Fast-Locking Digital Phase-Locked Loop. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:742-746 [Conf ] Alexander Khitun , Kang L. Wang Nano Logic Circuits with Spin Wave Bus. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:747-752 [Conf ]