default search action
11th ITNG 2014: Las Vegas, Nevada, USA
- Shahram Latifi:
11th International Conference on Information Technology: New Generations, ITNG 2014, Las Vegas, NV, USA, April 7-9, 2014. IEEE Computer Society 2014, ISBN 978-1-4799-3187-3
Model-Driven Data Science
- Luiz Felipe Simoes Hoffmann, Luiz Eduardo Guarino de Vasconcelos, Etiene Lamas, Adilson Marques da Cunha, Luiz Alberto Vieira Dias:
Applying Acceptance Test Driven Development to a Problem Based Learning Academic Real-Time System. 3-8 - Denis Ávila Montini, Danilo Battaglia, Gustavo Ravanhani Matuck, Adilson Marques da Cunha, Luiz Alberto Vieira Dias, Alessandra Avila Montini, Basit Shahzad:
A Chi-Square Methodology Applied in Deviations Control of Project Plan to Support the RIMAM Model. 9-14 - Denis Ávila Montini, Gustavo Ravanhani Matuck, Adilson Marques da Cunha, Luiz Alberto Vieira Dias, Massimo Jorge Isaac:
BPM Model of GQIMP for ISO 9001: 2008 Supported by CASE Tools. 15-20 - Daniel W. Yoas, Greg Simco:
Using Long-Term Prediction for Web Service Network Traffic Loads. 21-26 - André Sarkis, Luiz Alberto Vieira Dias:
A Set of Rules for Production of Design Models Compliant with Standards DO-178C and DO-331. 27-32 - Juliano de Almeida Monte-Mor, Adilson Marques da Cunha:
GALO: A Semantic Method for Software Configuration Management. 33-39 - Emanuel Mineda Carneiro, Adilson Marques da Cunha, Luiz Alberto Vieira Dias:
Adaptive Game AI Architecture with Player Modeling. 40-45 - Thamer A. Alrawashdeh, Mohammad I. Muhairat, Sokyna M. Alqatawneh:
A Quantitative Evaluation of ERP Systems Quality Model. 46-49
Information Systems and Internet Technology
- Chyi-Ren Dow, Yu-Hong Lee, Shr-Chen Wang, Shiow-Fen Hwang:
A Geo-Aware Location Based Taxi Carrying System. 53-58 - Sung-Hoon Park, Su-Chang Yoo, Jae-Yoeb Lee:
The Design of an Election Protocol in Wireless Cellular Networks. 59-65 - Roger B. Bradford, John Pozniak:
Combining Modern Machine Translation Software with LSI for Cross-Lingual Information Processing. 65-72 - Christopher Bischke, Narayan C. Debnath:
Hardware Solutions for Biofeedback and Game Interactions. 73-77 - Christopher Bischke, Narayan C. Debnath:
Biofeedback Implementation in a Video Game Environment. 78-83 - Aaron Bere:
Exploring Determinants for Mobile Learning User Acceptance and Use: An Application of UTAUT. 84-90 - Mario Peralta, Carlos Salgado, Lorena Baigorria, Daniel Riesco, German Montejano, Narayan C. Debnath, Jenny Hu:
Workflow Models: Management and Quality of Process in the Cloud. 91-96 - Yanru Guo, Dion Hoe-Lian Goh, Nor Aishah Binte Mohamed Rashid, Pyae Pyae Han, Shengbo Sun:
An Investigation of Twitter and Facebook Abandonment. 97-102 - Douglas Rodrigues, Arthur A. Chaves, Kalinka R. L. J. Castelo Branco, Rajiv Ramdhany, Geoff Coulson:
Knowledge Based Framework: A Case Study on Fast, Reliable, and Secure Web Services in UAVs. 103-108 - Adesanya A. Soyemi, Mohamad A. Saouli, Bhaskar R. Sinha:
Impact of Online Clinical Data Exchange on Patient Time Saving in Healthcare Delivery. 109-114 - Gustavo Ravanhani Matuck, Rodrigo Luiz de Oliveira, Tharcius Augusto Pivetta, Luiz Alberto Vieira Dias, Adilson Marques da Cunha:
Applying Agile Method on Academic Access and Fraud Control System. 115-120
Next Generation Information Technologies for Health and Care
- R. B. Dubey, Madasu Hanmandlu, Shantaram Vasikarla:
Features Selection in Mammograms Using Fuzzy Approach. 123-128 - John Paul Brogan, Christoph Thuemmler:
Specification for Generic Enablers as Software. 129-136 - Iyad Al Khatib, Gerardo Pelosi, Giovanni Agosta, Heikki Terio:
Security Integration in Medical Device Design: Extension of an Automated Bio-Medical Engineering Design Methodology. 137-142 - Thanh Le, Norbert Schuff:
A Probability-Based Approach for Multi-scale Image Feature Extraction. 143-148 - Pablo Lozada Yanez, Tomás Arredondo, Cristhy Jiménez:
Parameters Optimization in Entropic Segmentation Processes for the Analysis of Genetic Sequences. 149-154 - Kohei Arai:
Rescue System with Vital Sign, Location and Attitude Sensing Together with Traffic Condition, Readiness of Helper Monitoring in Particular for Disabled and Elderly Persons. 155-160
MB3: Networking and Wireless Communications
- Matthew Chan, Xiaowen Zhang:
Experiments for Leveled RFID Localization for Indoor Stationary Objects. 163-169 - Bong-seok Kim, Jin-hui Lee, Dae-hyeon Jeong, Kwonhue Choi:
Combining Successive ICI Cancellation to ICI Suppressed Alamouti Coded OFDM for Frequency Asynchronous Distributed Antenna Systems. 170-173 - Sahar Amini, Dong-jun Na, Kwonhue Choi:
Performance Comparison between Distributed Beamforming and Clustered Beamforming. 174-179 - Tuomas Kekkonen, Teemu Kanstrén, Kimmo Hätönen:
Towards Trusted Environment in Cloud Monitoring. 180-185 - Natarajan Meghanathan:
A Distributed Trust Evaluation Model for Wireless Mobile Sensor Networks. 186-191 - Sumanth Yenduri, Chabli Boler:
Resilient Multi Sink Networks Using Simplistic Hop Based Routing. 192-195 - Mohamed Hamdy Eldefrawy, Muhammad Khurram Khan, Hassan M. Elkamchouchi:
The Use of Two Authentication Factors to Enhance the Security of Mass Storage Devices. 196-200 - Fahim Gohar Awan, Noor M. Sheikh, A. Kiran:
Performance Evaluation of Beamforming for Macro Base Stations in a Femto-Cell Assisted Macro-Network. 201-206 - Fahd M. Al-Dosari:
Localized QoS Routing Based on Links Blocking Probability. 207-213 - Yuri Morais, Glêdson Elias:
Experimental Evaluation of a Multi-paradigm, Message-Oriented Mobile Middleware. 214-219 - Muhammad Adeel, Laurissa N. Tokarchuk, Muhammad Awais Azam, Sardar Kashif Ashraf Khan, M. A. Khalil:
Propagation Analysis of Malware Families in Mobile P2P Networks. 220-226
MDCBSE: Model-Driven, Component-Based Software Engineering
- Aneta Vulgarakis, Rizwin Shooja, Aurelien Monot, Jan Carlson, Moris Behnam:
Task Synthesis for Control Applications on Multicore Platforms. 229-234 - Vishal Dwivedi, David Garlan, Jürgen Pfeffer, Bradley R. Schmerl:
Model-Based Assistance for Making Time/Fidelity Trade-Offs in Component Compositions. 235-240
TA2: Software Engineering
- Helton Emanuel Reis Santana, Glauco de Figueiredo Carneiro:
A Decision Process to Migrate Legacy Systems to SOA. 243-248 - Leandro Guarino de Vasconcelos, Luiz Eduardo Guarino de Vasconcelos:
LSQ: An approach for Learning Software Development with Quality. 249-254 - Dalal Alrmuny:
A Comparative Study of Test Coverage-Based Software Reliability Growth Models. 255-259 - Daniela Quiñones, Cristian Rusu, Silvana Roncagliolo:
Redefining Usability Heuristics for Transactional Web Applications. 260-265 - Kim Nee Goh, Wei Kiat Chung:
RockTitan: A 3D Modelling Geological Software. 266-270
Security and Privacy in Next Generation Networks
- Shadi Al Awawdeh, Abdallah Tubaishat:
An Information Security Awareness Program to Address Common Security Concerns in IT Unit. 273-278 - Amjad Gawanmeh:
Automatic Verification of Security Policies in Firewalls with Dynamic Rule Sequence. 279-284 - Abdullah A. Albahdal, Fahad Alsolami, Fawaz E. Alsaadi:
Evaluation of Security Supporting Mechanisms in Cloud Storage. 285-292 - Abdullah A. Albahdal, Terrance E. Boult:
Problems and Promises of Using the Cloud and Biometrics. 293-300 - Geum-Dal Park, Dea-Su Kim, Kee-Young Yoo:
Lossless Codebook-Based Digital Watermarking Scheme with Authentication. 301-306 - Anteneh Girma, Moses Garuba, Rojini Goel:
Cloud Computing Vulnerability: DDoS as Its Main Security Threat, and Analysis of IDS as a Solution Model. 307-312
Software and Network Security and Privacy
- Fahad Alsolami, Terrance E. Boult:
CloudStash: Using Secret-Sharing Scheme to Secure Data, Not Keys, in Multi-clouds. 315-320 - Mohammed S. Khalil, Fajri Kurniawan:
License Plate Detection Method for Real-Time Video of Low-Cost Webcam Based on Hybrid SVM-Heuristic Approach. 321-326 - Vanessa N. Cooper, Hossain Shahriar, Hisham M. Haddad:
A Survey of Android Malware Characterisitics and Mitigation Techniques. 327-332 - Shay Gueron, Vlad Krasnov:
The Fragility of AES-GCM Authentication Algorithm. 333-337 - Shay Gueron, Vlad Krasnov:
Speeding up Counter Mode in Software and Hardware. 338-340 - Amritha Puliadi Premnath, Ju-Yeon Jo, Yoohwan Kim:
Application of NTRU Cryptographic Algorithm for SCADA Security. 341-346
Entity Resolution (ER) and Entity Information Management (EIM)
- Fumiko Kobayashi, John R. Talburt:
Decoupling Identity Resolution from the Maintenance of Identity Information. 349-354 - Pei Wang, Daniel L. Pullen, John R. Talburt, Ningning Wu:
Probabilistic Matching Compared to Deterministic Matching for Student Enrollment Records. 355-359
Visualization and Data Processing
- Sabah Al-Fedaghi, Altaf Alrashed:
Visualization of Execution of Programming Statements. 363-370 - Rodrigo Luiz Mendes Mota, Elcio Hideiti Shiguemori, Alexandre Carlos Brandão Ramos:
Application of Self-Organizing Maps at Change Detection in Amazon Forest. 371-376 - Sukhjit Singh Sehra, Jaiteg Singh, Hardeep Singh Rai:
A Systematic Study of OpenStreetMap Data Quality Assessment. 377-381 - Arleson Nunes Silva, Glauco de Figueiredo Carneiro, José Maria N. David:
Towards the Development of a Framework for Multiple View Interactive Environments. 382-387 - Ali Pour Yazdanpanah, Ajay K. Mandava, Emma E. Regentova, Venkatesan Muthukumar, George Bebis:
A CUDA Based Implementation of Locally-and Feature-Adaptive Diffusion Based Image Denoising Algorithm. 388-393
High Performance Computing Architectures
- Xiaohui Song, Hong Wang, Lingfeng Wang:
FPGA Implementation of a Support Vector Machine Based Classification System and Its Potential Application in Smart Grid. 397-402 - Fangyang Shen, Chunlei Liu, Bing Qi, Yanqing Ji, Daniel Caban:
Building Effective Scheduling Algorithms for Sensor Networks. 403-406 - Yanqing Ji, Fangyang Shen, John Tran:
A Multi-relational Association Mining Algorithm for Screening Suspected Adverse Drug Reactions. 407-412 - Amin Sahba, Yilin Zhang, Marcus Hays, Wei-Ming Lin:
A Real-Time Per-Thread IQ-Capping Technique for Simultaneous Multi-threading (SMT) Processors. 413-418 - Tekesha Athil, Richard Christian, Yenumula B. Reddy:
CUDA Memory Techniques for Matrix Multiplication on Quadro 4000. 419-425 - Vladimir Hahanov, Eugenia Litvinova, Wajeb Gharibi, Svetlana Chumachenko:
Cyber Physical System - iCloud Traffic Control. 426-429 - Vladimir Hahanov, Stanley Hyduke, Wajeb Gharibi, Eugenia Litvinova, Svetlana Chumachenko, Irina V. Hahanova:
Quantum Models and Method for Analysis and Testing Computing Systems. 430-434
Wavelets and Validated Numerics
- Stephen Lee Bishop, Suresh Rai:
Spatial Up-Conversion Using ADRC Stationary Wavelets. 437-442 - Amit Setia, Yucheng Liu, Aghalaya S. Vatsala:
The Solution of the Bagley-Torvik Equation by Using Second Kind Chebyshev Wavelet. 443-446 - Ryuji Ohura, Teruya Minamoto:
A Recoverable Visible Digital Image Watermarking Based on the Dyadic Lifting Scheme. 447-452 - Teruya Minamoto, Shinichi Habara:
Verified Computation to a Nonlinear Poisson Equation with Neumann Boundary Condition Derived from the Keller-Segel Model. 453-458 - Teruya Minamoto, Jumpei Yamaguchi:
A Blind Digital Image Watermarking Method Based on the Dyadic Wavelet Transform and Chaos Models. 459-464 - Amit Setia, Yucheng Liu, Aghalaya S. Vatsala:
Solution of Linear Fractional Fredholm Integro-Differential Equation by Using Second Kind Chebyshev Wavelet. 465-469
Data Mining
- Rinaldo Lima, Bernard Espinasse, Hilário Oliveira, Fred Freitas:
Ontology Population from the Web: An Inductive Logic Programming-Based Approach. 473-478 - Tanmoy Sarkar, Samik Basu, Johnny Wong:
iConSMutate: Concolic Testing of Database Applications Using Existing Database States Guided by SQL Mutants. 479-484 - Harmeet Kaur, Mali Abdollahian:
Analytical Study of Global Mobile Market: Forecasting and Substitution. 485-489 - Minsung Kang, Soojung Hur, Won-Kyo Jeong, Yongwan Park:
Map Building Based on Sensor Fusion for Autonomous Vehicle. 490-495 - Heather Brotherton, J. Eric Dietz:
Data Center Business Continuity Best Practice. 496-501 - Ankita Srivastava, M. P. Singh, Prabhat Kumar:
Supervised Semantic Analysis of Product Reviews Using Weighted k-NN Classifier. 502-507 - Ian Yocum, Hassan Reza, William Kemp, Joseph Rinehart, Brian Dennis:
Reverse Engineering of Legacy Agricultural Phenology Modeling System. 508-513 - Jeremy Straub, Hassan Reza:
The Use of the Blackboard Architecture for a Decision Making System for the Control of Craft with Various Actuator and Movement Capabilities. 514-519
Biometrics and Knowledge-Based Systems
- Lu Leng, Gang Liu, Ming Li, Muhammad Khurram Khan, Ali M. Al-Khouri:
Logical Conjunction of Triple-Perpendicular-Directional Translation Residual for Contactless Palmprint Preprocessing. 523-528 - Mohamed Alfateh Badawy, Nawal A. El-Fishawy, Osama A. Elshakankiry:
Using Patch Management Tools to Enhance the Signature Customization for IDS Based on Vulnerability Scanner. 529-533 - Mark Smith:
Recognition of Hand-Printed Characters on Mobile Devices. 534-538 - Mutlaq B. Alotaibi, Dimitrios I. Rigas:
Empirically Derived Guidelines for Multimodal Interaction in Knowledge-Based Environments. 539-544 - Hanan A. Al Mehairi, Kevin Binning:
Employee Oriented vs. Work Oriented Cultures and the Moderating Role of Education on Intention to Share Knowledge. 545-551 - Samir N. Hamade:
Information Technology Outsourcing and the Brain Drain: A Preliminary Investigation. 552-557
Potpourri
- Yanru Guo, Dion Hoe-Lian Goh:
"We Want to Hear Your Voice": Power Relations in Participatory Design. 561-566 - Lucélia de Souza, Maria Salete Marcon Gomes Vaz, Marcos Sfair Sunye:
Modular Development of Ontologies for Provenance in Detrending Time Series. 567-572 - Dustin Bessette:
Total Compensation and How it is Used in an Organization's Human Resources Strategy. 573-574 - Bing Qi, Fangyang Shen:
Performance Comparison of Partical Swarm Optimization Variant Models. 575-580 - Behnam Bahreman:
E-procurement in Iran Cement Industry Limitations and Benefits. 581-586 - Laxmi P. Gewali, Bishal Acharya:
Stability Aware Delaunay Refinement. 587-592 - Jaime Díaz, Cristian Rusu:
Ubiquitous Computer-Supported Collaborative Learning: A Literature Review. 593-598 - Faruk Bagci:
Towards Performance and Power Management of Cloud Servers. 599-604
Posters
- Koj Sambyo, Chandan Tilak Bhunia:
Application of Multi Level ATM in Reducing Latency in Clouds for Performance Improvement of Integrated Voice, Video and Data Services. 607 - Swarnendu Kumar Chakraborty, Rajat Subhra Goswami, Abhinandan Bhunia, Chandan Tilak Bhunia:
Method of Non Majority Decision Making in Aggressive Packet Combining Scheme. 608-609 - Ira Woodring, Mostafa M. El-Said:
An Economical Cluster Based System for Detecting Data Leakage from BYOD. 610-611 - Martin Goll, Shay Gueron:
Vectorization on ChaCha Stream Cipher. 612-615 - Tapan Kumar Jain, Davinder S. Saini, Sunil V. Bhooshan:
Increasing Lifetime of a Wireless Sensor Network Using Multiple Sinks. 616-619 - Jinyue Peng, Dongxing Jiang, Cong Liu, Yuan Jiang, Xinyu Zhang:
Knowledge Dimension Management: Bridge the Gulf between WAC and MOOC. 620-621 - Valdir da Costa Guerra, Eliezer Segeti, Fabiano Hino, Fabio Kfouri, Lineu Fernando Stege Mialaret, Luiz Alberto Vieira Dias, Adilson Marques da Cunha:
Interdisciplinarity and Agile Development: A Case Study on Graduate Courses. 622-623 - Humam Elagha:
The Use of Partial Least Squares Path Modeling in IT Governance Discipline. 624-626 - Freddy Paz, Freddy Asrael Paz, José Antonio Pow-Sang, Luis Collantes:
Usability Heuristics for Transactional Web Sites. 627-628 - Mozhdeh Sadighi:
Accounting System on Cloud: A Case Study. 629-632 - Sumeet Kaur Sehra, Jasneet Kaur, Yadwinder Singh Brar, Navdeep Kaur:
Analysis of Data Mining Techniques for Software Effort Estimation. 633-638 - Cassiano B. A. L. Monteiro, Luiz Alberto Vieira Dias, Adilson Marques da Cunha:
A Case Study on Pairwise Testing Application. 639-640 - Alan Shaw:
A System of Simple Sentence Parsing Rules to Produce "Answer Matching" Chatbots. 641-642 - Ahmad Althunibat, Thamer A. Alrawashdeh, Mohammad I. Muhairat:
The Acceptance of Using M-government Services in Jordan. 643-644 - Renan Cavichi de Freitas, Jefferson Andrade de Oliveira, Fabiano Yukio Alves Hino, Juvenal Silva Neto, Leonardo Miranda Vicente, Adilson Marques da Cunha, Luiz Alberto Vieira Dias:
Applying Interdisciplinarity and Agile Methods in the Development of an Embedded System. 645-646 - Joseph M. Woodside:
Virtual Health Management. 647-648 - Alessio Bucaioni, Saad Mubeen, John Lundbäck, Kurt-Lennart Lundbäck, Jukka Mäki-Turja, Mikael Sjödin:
From Modeling to Deployment of Component-Based Vehicular Distributed Real-Time Systems. 649-654 - Saad Mubeen, Jukka Mäki-Turja, Mikael Sjödin:
Towards Extraction of Interoperable Timing Models from Component-Based Vehicular Distributed Embedded Systems. 655-659 - Sihem Charaa, Noureddine Ellouze:
Multiscale Product Edge Detection in Different Colour Spaces. 660-664
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.