MONDAY
M1 / M2 / M3 / M4
8:15-9:15 / Invited
9:15-9:30
9:30-12:30 / SE1 / WSN1 / DT1 / DGS1
12:30-1:30
1:30-3:30 / SE2 / WSN2 / DCC1 / DGS2
3:30-4:00
4:00-6:20 / NTIP1 / WSN3 / DCC2 / WST
TUESDAY
T1 / T2 / T3 / T4 / T5
8:15-9:15 / Invited
9:30-12:30 / SE3 / WSN4 / NTIP2 / ECS1 / IAS1
1:30-3:30 / SE4 / WSN5 / PC1 / ECS2 / IAS2
4:00-6:00 / EGAME / IR / PC2 / ECS3 / ME
WEDNESDAY
W1 / W2 / W3 / W4
8:15-9:15 / DM1 / DGS3 / 7:55-9:15 / WGS1
9:30-12:30 / DM2 / IAS3 / ISNG1 / ITCCG + WGS2
1:30-3:30 / DM3 / ECOM1 / ISNG2 / EDU1
4:00-6:00 / BIO / ECOM2 / ISNG3 / EDU2

Track AreaBioinformatics (BIO)

PAPER SESSION NUMEBER1

69:-Parallel Multiple Sequence Alignment using Dynamic Scheduling

Jiancong Luo, Ishfaq Ahmad, Munib Ahmed

356:-Dihedral Angle based Dimensionality Reduction for Protein Structural Comparison

Naveen Kandiraju Sumeet Dua Steven A. Conrad

297:-Recognizing Transcription Start Site (TSS) of plant Promoters

Raja Loganantharaj

358:-Design and Implementation of a Unique Blood-vessel Detection Algorithm towards Early Diagnosis of Diabetic Retinopathy

Sumeet Dua Naveen Kandiraju Hilary W. Thompson

192:-A Time-Series Biclustering Algorithm for Revealing Co-regulated Genes

Xiang Ji & Ya Zhang

70:-A NEW PHYLOGENETIC TREE MODEL FOR FUZZY CHARACTERS

Andy Auyeung

Track AreaData Coding and Compression (DCC)

PAPER SESSION NUMEBER (DCC1)1

290:-LANGUAGE DISCRIMINATION VIA PPM MODEL

Ebru Celikel

525:-Layered MPEG video transmission over DifferServ

Hong Zhao

315:-Scalable Generative Topographic Mapping for Sparse Data Sequences

Ata Kaban

5:-Hypergraph Lossless Image Compression

Alain Bretto and Luc Gillibert

374:-An Adaptive Scalable Multiuser OFDM-based Technique for Multimedia Transmission over Fading Channels

Ahmed Muthana M. Nadhim*, Jiangtao Xi**, Zongkai Yang*

171:-Hybrid Coding for Animated Polygonal Meshes: Combining Delta and Octree

Jinghua Zhang Charles B. Owen

PAPER SESSION NUMEBER (DCC2)2

80:-Watermark based Digital Rights Management

Piyali Mandal,Ashish Thakral

223:-A parallel scheme for implementing multialphabet arithmetic coding in high-speed programmable hardware

S. Mahapatra and Kuldeep Singh

14:-Multiple Description Coding Using Transforms and Data Fusion

Shumin Tian and P.K. Rajan

230:-Multiple-Pattern Matching In LZW Compressed Files Using Aho-Corasick Algorithm

Tao Tao, Amar Mukherjee

485:-Orthogonal Hermite Pulses Used for Ultra Wideband M-ary Communication

Wen Hu and Guoxin Zheng

222:-Research On Color Quantization Based On Ant Colony Clustering Algorithm

Xinrong Hu,Dehua Li,Tianzhen Wang

173:-A Rate Control Algorithm for Wireless Video Transmission Using PID and Perceptual Tuning

Yu Sun, Dongdong Li, Jiancong Luo and Ishfaq Ahmad

Track AreaData Mining (DM)

PAPER SESSION NUMEBER (DM1)1

349:-Packet- vs. Session-Based Modeling for Intrusion Detection Systems

Bruce D. Caulkins, Joohan Lee, Morgan Wang

395:-Text Data Mining: A Case Study

Charles Wesley Ford, Chia-Chu Chiang, Hao Wu, Radhika R. Chilka, and *John R. Talburt

342:-A Classifier-based Text Mining Approach for Evaluating Semantic Relatedness Using Support Vector Machines

Chung-Hong Lee and Hsin-Chang Yang

PAPER SESSION NUMEBER (DM2)2

393:-On the relation between dependence and diversity in multiple classifier systems

Deechang Chen, Konstantinos Sirlantzis, Xiuzhen Cheng

215:-Quality-Oriented Software Architecture

Hassan Reza

384:-Mining p53 Binding Sites Using Profile Hidden Markov Model

Jeffrey Huang and Shijun Li

391:-An Arabic Root Extraction Stemmer

Kazem Taghva, Rania Elkhoury, Jeffry Coombs

390:-A Stemming Algorithm for Farsi Language

Kazem Taghva, Russel Beckly, Mohammad Sadeh

399:-Mining Biomedical Images with Density-based Clustering

M. Emre Celebi, Wenzhao Guo, and Y. Alp Aslandogan

PAPER SESSION NUMEBER (DM3)3

217:-Regression Analysis of Ozone Data

M.Abdollahian and R.Foroughi

388:-A Web Recommendation System Based on Maximum Entropy

Xin Jin, Bamshad Mobasher,Yanzan Zhou

205:-Mining Association Rules from the Star Schema on a Parallel NCR Teradata Database System.

Soon M. Chung and Murali Mangamuri

334:-Elimination of Redundant Information for Web Data Mining

Shakirah Mohd Taib, Soon-ja Yeom, Byeong-Ho Kang

354:-A Signature-Based Liver Cancer Predictive System

Ray R. Hashemi, Mahmood Bahar, Christopher Childers, Alexander A. Tyler, and John F. Young

387:-A Density-Based Clustering Algorithm Using Graphical Techniques

Quoc-Nam Tran

365:-XML Representation of Digital Videos for Visual Data Mining Applications

Mark Smith and Alireza Khotanzd

216:-Optimal Statistical Model for Forecasting Ozone

M.Abdollahian and R.Foroghi

320:-Dynamic Web Content Filtering based on User’s Knowledge

N. Churcharoenkrung, Y. S. Kim and B. H. Kang

Track AreaDatabase Technology

PAPER SESSION NUMEBER (DT1)1

48:-Schemaless XML Document Management in Object-Oriented Databases.

Soon M. Chung and Sheeya B. Jesurajaiah

126:-XML Schema Re-Engineering Using a Conceptual Schema Approach

Oviliani Yenty Yuliana, Suphamit Chittayasothorn

373:-Impact Of External Security Measures On Data Access Implementation With Online Database Management System

Moses Garuba and Anteneh Girma

301:-Performance Evaluation of Secure Concurrency Control Algorithm for Multilevel Secure Distributed Database Systems

Navdeep Kaur , A.K. Sarje, Manoj Misra

86:-Constrained Declustering

Ali Saman Tosun

113:-A Time Series Data Management Framework

Abel Matus-Castillejos and Ric Jentzsch

38:-Design Theoretic Approach to Replicated Declustering

Ali Saman Tosun

293:-Managing a Relational Database with Intelligent Agents

Ira Rudowsky, Olga Kulyba, Mikhail Kunin, Dmitri Ogarodnikov and Theodore Raphan

Track AreaDistributed and Grid Systems (DGS)

PAPER SESSION NUMEBER (DGS1)1

337:-EGRID Project: experience report on the implementation of a grid infrastructure for the analysis of financial data

Angelo Leto, Ezio Corso, Stefano Cozzini, Riccardo Murri, Alessio Terpin, Cristian Zoicas

16:-Development of Concurrent Systems through Coordination

Chia-Chu Chiang

211:-A New Generalized Particle Approach to Allot Resources And Jobs for Grid Computing

Dianxun Shuai, Xiang Feng

62:-Computing Molecular Potential Energy Surface with DIET

Emmanuel Jeannot and Gerald Monard

140:-Transaction Mechanism Design in Decentralized Computational Market

FU Qianfei,YANG Shoubao,LI Maosheng,ZHU Junmao

158:-A Grid-enabled Web Map Server

Giovanni Aloisio, Massimo Cafaro, Dario Conte, Sandro Fiore, Italo Epicoco, Gian Paolo Marra, Gianvito Quarta

108:-The GSI plug-in for gSOAP: Enhanced Security, Performance, and Reliability

Giovanni Aloisio, Massimo Cafaro, Italo Epicoco, Daniele Lezzi and Robert van Engelen

81:-Research on Grid Resource Reliability Model Based on Promise

Li Maosheng

341:-METACOMPUTING THROUGH THE ENACTMENT OF A BPEL4WS WORKFLOW IN A GRID ENVIRONMENT

M. DI Santo, N. Ranaldo, E. Zimeo

PAPER SESSION NUMEBER (DGS2)2

236:-An approach for Service Description and a flexible way to discover services in Distributed Systems

Oussama Kassem Zein Yvon Kermarrec

166:-The BPEL Orchestrating Framework for Secured Grid Services

Pichet Amnuaykanjanasin and Natawut Nupairoj

76:-High Throughput Web Services for Life Sciences

Mine Altunay (North Carolina State University: ), Daniel Colonnese (IBM Portals: ),

352:-Algorithms and Databases in Bioinformatics: Towards a Proteomic Ontology

Mario Cannataro, Pietro Hiram Guzzi, Tommaso Mazza, Giuseppe Tradigo and Pierangelo Veltri

362:-Replica Placement in Data Grid:Considering Utility and Risk

Rashedur M. Rahman, Ken Barker, Reda Alhajj

210:-Grid-based Collaboration in Interactive Data Language Applications

Minjun Wang, Geoffrey Fox, Marlon Pierce

PAPER SESSION NUMEBER (DGS3)3

201:-An Analysis of Reliable Delivery Specifications for Web Services

Shrideep Pallickara, Geoffrey Fox and Sangmi Lee Pallickara

53:-Double Auction Protocols for Resource Allocation in Grids

Umesh Kant, Daniel Grosu

Track AreaE-Commerce

PAPER SESSION NUMEBER1

156:-A Characterization of Web Data Sources to Facilitate E-Commerce Transactions

Chima Adiele

17:-A Methodology for Evaluating Agent Toolkits

Elhadi Shakshuki

319:-Automatic Agent and Data Mining for e-Commerce

Charles C. Willow

29:-Customer Generated Electronic Cash

Arthur Hou, C Tan

522:-Exploring Price and Product Information Search in e-Market

Han, T.

PAPER SESSION NUMEBER2

282:-A Mobile Commerce Framework Based on Web Services Architecture

Jiann-Liang Chen, Wen-Ming Tseng, and Yau-Chung Chang

18:-The Interoperability between Different e-Business Specifications

Peng Liang, Keqing He, Bing Li, Jin Liu

264:-A Semantic Interoperability Extension Model to the ebXML Registry

Wudong Liu, Lulu He, Keqing He

182:-An Exchange Protocol for Alternative Currencies

Yiyao Hao, Daniel M. Havey and David A. Turner

72:-IPS - Secure Internet Payment System

Zoran Djuric

Track AreaEducation

PAPER SESSION NUMEBER1

189:-A Framework and Process for Curricular Integration and Innovation Using Project Based Interdisciplinary Teams

Frank P. Coyle Mitchell A. Thornton

174:-Online Example-Based Learning

Pavel Azalov

351:-An E-learning tool for Database Administration

Paul Douglas and Steve Barker

332:-An Integrated Course Based on Educational Games

Hye Sun Kim and Seong Baeg Kim

116:-Adaptation and Configuration – Support-Possibilities of Different Learner Types within Virtual Learning Environments – An

Experience Report

Imke Sassen Birgit Schwartz-Reinken University of Hamburg Institute of Information Systems Germany

331:-Constructing Different Learning Paths Through e-learning

Kyoung Mi Yang and Seong Baeg Kim

PAPER SESSION NUMEBER2

312:-Adaptive Book: Teaching and Learning Environment for Programming Education

Victor Adamchik and Ananda Gunawardena

421:-INTEGRATION OF DIGITAL RIGHTS MANAGEMENT INTO LEARNING CONTENT MANAGEMENT SYSTEM

Qingtang Liu, zongkai Yang

247:-Comparison of Information Technology Adoption Rates across Laggards, Innovators and Others

Rukmini Reddy Muduganti, Shravan Kumar Sogani Henry Hexmoor

493:-A Specialization in Information and Knowledge Management Systems for the Undergraduate Computer Science Curriculum

S. ARGAMON, N. GOHARIAN, D. GROSSMAN, O. FRIEDER

348:-An Intelligent Tutoring System for Program Semantics

Steve Barker and Paul Douglas

Track AreaE-Gaming

PAPER SESSION NUMEBER1

404:-Online Gaming Cheating and Security Issue

Ying-Chieh Chen, Patrick S. Chen, George Yee, Ronggong Song, Larry Korba

134:-Single-Parameter Blackjack Betting Systems Inspired by Scatter Search

Ron Coleman

406:-Dealing Cards in Poker Games

Phillipe Golle

170:-Digital chips for an on-line casino

J. Castellà-Roca, G. Navarro, J.A. Ortega-Ruiz, J. Garcia-Alfaro

143:-Protecting on-line casinos against fraudulent player drop-out

J. Garcia, F. Autrel, J.Borrell, J. Castellà-Roca, F. Cuppens, and G. Navarro

Track AreaEmbedded Cryptographic Systems

PAPER SESSION NUMEBER1

147:-Quadrinomial Modular Arithmetic using Modifed Polynomial Basis

Christophe Negre

96:-FPGA Implementations of the ICEBERG Block Cipher

F.-X. Standaert, G. Piret, G. Rouvroy, J.-J. Quisquater

410:-"On the Multiplicative Inversion over GF(2^m)"

Francisco Rodrıguez-Henrıquez, Nazar A. Saqib, and Nareli Cruz-Cortes

99:-On the Masking Countermeasure and Higher-Order Power Analysis Attacks

F.-X.Standaert, E. Peeters, J.-J.Quisquater

314:-Fast Parallel Table Lookups to Accelerate Symmetric-Key Cryptography

A. Murat Fiskiran, Ruby B. Lee

370:-A Scalable and High Performance Elliptic Curve Processor with Resistance to Timing Attacks

Alireza Hodjat, David Hwang, Ingrid Verbauwhede

357:-ASIC-Hardware-Focused Comparison for Hash Functions MD5, RIPEMD-160, and SHS

Akashi Satoh, Tadanobu Inoue

90:-A Countermeasure for EM Attack of a Wireless PDA

C.H.Gebotys, C.Tiu, X.Chen

68:-A Scalable Dual Mode Arithmetic Unit for Public Key Cryptosystems

Francis Crowe, Alan Daly and William Marnane

PAPER SESSION NUMEBER2

114:-Verifiable Threshold Sharing of a Large Secret Safe Prime

Maged H. Ibrahim

161:-ASIC Implementation of a Unified Hardware Architecture for Non-Key Based Cryptographic Hash Primitives

Ganesh T S, T S B Sudarshan

144:-AES Power Attack Based on Induced Cache Miss and Countermeasure

Guido Bertoni, Vittorio Zaccaria, Luca Breveglieri, Matteo Monchiero, Gianluca Palermo

26:-XScale Hardware Acceleration on Cryptographic Algorithms for IPSec Applications

Hung-Chin Chang, Chun-Chin Chen, and Chih-Feng Lin

330:-Modified Radix-2 Montgomery Modular Multiplication to Make It Faster and Simpler

Kooroush Manochehri, Saadat Pourmozafari

305:-Reconfigurable Hardware for Addition Chains Based Modular Exponentiation

Luiza de Macedo Mourelle, Nadia Nedjah

PAPER SESSION NUMEBER3

309:-Inversion-Free Arithmetic on Genus 3 Hyperelliptic Curves and Its Implementations

Xinxin Fan, Thomas Wollinger and Yumin Wang

339:-Improved Routing-Based Linear Algebra for the Number Field Sieve

Willi Geiselmann, Hubert Köpfer, Rainer Steinwandt, and Eran Tromer

203:-Short Proxy Signature using Pairing and Its Application

Takeshi Okamoto, Atsuo Inomata and Eiji Okamoto

343:-A parallelized design for an Elliptic Curve Cryptosystem Coprocessor

Stefano Turcato, Fabio Sozzani, Luca Breveglieri, Guido Bertoni

303:-Pareto-Optimal Hardware for Substitution Boxes

Nadia Nedjah, Luiza de Macedo Mourelle

323:-The Montgomery Exponent and Its Applications

Shay Gueron and Or zuk

Track AreaInformation Assurance and Security

PAPER SESSION NUMEBER1

22:-Clarifying Obfuscation: {Improving the Security of White-Box DES

Hamilton E. Link and William D. Neumann

103:-Intrusion Detection System to Detect Variant Attacks Using Learning Algorithms with Automatic Generation of Training Data

Akira Yamada, Yutaka Miyake, Keisuke Takemori, Toshiaki Tanaka

32:-Application of Loop Reduction to Learning Program Behaviors for Anomaly Detection

Jidong Long,Daniel G. Schwartz, Sara Stoecklin, Mahesh K. Patel

383:-No-capture hardware feature for securing sensitive information

Khaled Hussain, Sharon Rajan, and Naveen Addulla

109:-Secure Group Communication with Multiplicative One-way Functions

Heeyoul Kim, Seong-min Hong, H. Yoon, J.W. Cho

304:-An Aspect-Oriented Approach to Mobile Agent Access Control

Dianxiang Xu and Vivek

51:-StackOFFence: A Technique for Defending Against Buffer Overflow Attacks

B. B. Madan, S. Phoha and K. S. Trivedi

34:-Conversion and Proxy Functions for Symmetric Key Ciphers

Debra L. Cook and Angelos D. Keromytis

118:-An Efficient Secure Key Issuing Protocol in ID-Based Cryptosystems

G. Raju, G. M. Choudary, M. L. Das, Ashutosh Saxena, Ved P. Gulati

PAPER SESSION NUMEBER2

345:-Formalisation and implementation of access control models

Mathieu Jaume and Charles Morisset

476:-QoS-based Authentication Scheme for Ad Hoc Wireless Networks

P Muppala, Johnson Thomas, Ajith Abraham

385:-Byteprints: A Tool to Gather Digital Evidence

Sriranjani Sitaraman, Srinivasan Krishnamurthy and S. Venkatesan

102:-A Secure and Efficient Voter-Controlled Anonymous Election Scheme

Thomas E. Carroll, Daniel Grosu

371:-Security Design and Evaluation in a VoIP Secure Infrastracture: A Policy Based Approach

Valentina Casola, Massimiliano Rak, Antonino Mazzeo, Nicola Mazzoccca

338:-The N/R One Time Password System

Vipul Goyal, Ajith Abraham, Sugata Sanyal and Sang Yong Han

PAPER SESSION NUMEBER3

372:-Effective Steganalysis Based on Statistical Moments of Effective Steganalysis Based on Statistical Moments of Wavelet

Characteristic Function

Yun Q. Shi, Guorong Xuan, Chengyun Yang, Jianjiong Gao, Zhenping Zhang, Peiqi Chai,Dekun Zou, Chunhua Chen, Wen

175:-Dynamic learning of automata incorporating call stack information for anomaly detection

Zhen Liu and Susan M. Bridges Department of Computer Science and Engineering Mississippi State University {zliu,

58:-Securely Utilizing External Computing Power

Yu Yu, Leiwo Jussipekka, Benjamin Premkumar

52:-A Dynamic Method for Handling the Inference Problem in Multilevel Databases

X. Chen and R. Wei

129:-Efficient TTP-free Mental Poker Protocols

Weiliang Zhao and Vijay Varadharajan

125:-CompChall: Addressing Password Guessing Attacks

Vipul Goyal, Virendra Kumar, Mayank Singh, Ajith Abraham and Sugata Sanyal

54:-ID-Based One Round Authenticated Group Key Agreement Protocol with Bilinear Pairings

Yijuan Shi Gongliang Chen Jianhua Li

92:-Efficient Array & Pointer Bound Checking Against Buffer Overflow Attacks via Hardware/Software

Zili Shao, Chun Xue, Qingfeng Zhuge, Edwin H.-M. Sha, Bin Xiao

Track AreaInformation Retrieval

PAPER SESSION NUMEBER1

15:-A Mathematical Investigation on Retrieval Performance Evaluation Measures of Information Retrieval Algorithm

Song Jun-feng, Zhang Wei-ming, Xiao Wei-dong

193:-A Comparative Study of Three Moment-Based Shape Descriptors

M. Emre Celebi and Y. Alp Aslandogan

380:-Neural Network Approach for Software Cost Estimation

Rifat Ozcan Y. Alp Aslandogan

429:-Designing a Value Based Search Engine using Evolutionary Strategies

Sengupta , Jansen

Track AreaITCC general

PAPER SESSION NUMEBER1

524:-ROM-Based FSM Implementation in FPGA Devices

Tadeusz Luba

526:-Wireless Internet Payment System Using Smart Cards

Osama Dandash

359:-Impact of Java Compressed Heap on Mobile/Wireless Communication

Mayumi KATO Chia-Tien Dan Lo

523:-A Survey on Data Compression in Wireless Sensor Networks

Naoto Kimura, Shahram Latifi

Track AreaMobile Enterprise

PAPER SESSION NUMEBER1

364:-Using Principles of Pervasive Computing to Design M-commerce Applications

Stan Kurkovsky

366:-History Calls: Delivering Automated Audio Tours to Visitors’ Cell Phone

Matthew Nickerson

270:-Mobile Web Services Discovery and Invocation Through Auto-Generation of Abstract Multimodal Interface

Robert Steele, Khaled Khankan, Tharam Dillon

260:-XML-based Mobile Agents

Robert Steele, Tharam Dillon, Parth Pandya

138:-Using Dynamic Adaptability to Protect Mobile Agent Code

Salima Hacini

361:-Bluetooth as an Enabling Technology in Mobile Transactions

Sojen Pradhan, Elaine Lawrence and Agnieszka Zmijewska

Track AreaNew Trends in Image Processing

PAPER SESSION NUMEBER1

500:-Using Facial Images to Diagnose Fetal Alcohol Syndrome (FAS)

Amit Jain, Jeffrey Huang and Shiaofen Fang

65:-Investigating a Wrapper Approach for Selecting Features Using Constructive Neural Networks

Daniel M. Santoro, Maria do C. Nicoletti

509:-Orthogonal and Least-Squares Based Coordinate Transforms for Optical Alignment Verification in Radiosurgery

Ernesto Gomez, Yasha Karant, Veysi Malkoc, Mahesh R. Neupane, Keith E. Schubert and Reinhard W. Schulte

227:-PRACTICAL EVALUATION OF A RADIAL SOFT HASH ALGORITHM

F.-X. Standaert, F. Lefebvre, G. Rouvroy, B. Macq, J.-J. Quisquater, J.-D. Legat.

451:-A Generic Shape Descriptor using Bezier Curves

Ferdous Ahmed Sohel, Gour C. Karmakar, Laurence S. Dooley

454:-Fuzzy-based Parameterized Gaussian Edge Detector Using Global and Local Properties

John See, Madasu Hanmandlu, and Shantaram Vasikarla

456:-A ROBUST OPTICAL FLOW ESTIMATION ALGORITHM FOR TEMPORAL TEXTURES

Ashfaqur Rahman and Manzur Murshed

PAPER SESSION NUMEBER2

146:-Watermark Detection Schemes with High Security

Liu Yongliang

310:-Remove Interferential Curve from Text Image

Zhiguo Cheng, Mang Chen, Yuncai Liu

501:-A Comparison of some Clustering Techniques via Color Segmentation

Shilpa Agarwal, Shweta Madasu, Madasu Hanmandlu, and Shantaram Vasikarla

507:-IMPROVED FACE AND HAND TRACKING FOR SIGN LANGUAGE RECOGNITION

N. Soontranon, S. Aramvith and T.H. Chalidabhongse

516:-Compression Standards role in Image Processing

Mohammad Eyadat

307:-Recognition and Extraction High Precision Digital Road Map

Mang Chen, Yuncai Liu

450:-FUZZY IMAGE SEGMENTATION COMBING RING AND ELLIPTIC SHAPED CLUSTERING ALGORITHMS