M1 / M2 / M3 / M4
8:15-9:15 / Invited
9:15-9:30
9:30-12:30 / SE1 / WSN1 / DT1 / DGS1
12:30-1:30
1:30-3:30 / SE2 / WSN2 / DCC1 / DGS2
3:30-4:00
4:00-6:20 / NTIP1 / WSN3 / DCC2 / WST
TUESDAY
T1 / T2 / T3 / T4 / T5
8:15-9:15 / Invited
9:30-12:30 / SE3 / WSN4 / NTIP2 / ECS1 / IAS1
1:30-3:30 / SE4 / WSN5 / PC1 / ECS2 / IAS2
4:00-6:00 / EGAME / IR / PC2 / ECS3 / ME
WEDNESDAY
W1 / W2 / W3 / W4
8:15-9:15 / DM1 / DGS3 / 7:55-9:15 / WGS1
9:30-12:30 / DM2 / IAS3 / ISNG1 / ITCCG + WGS2
1:30-3:30 / DM3 / ECOM1 / ISNG2 / EDU1
4:00-6:00 / BIO / ECOM2 / ISNG3 / EDU2
Track AreaBioinformatics (BIO)
PAPER SESSION NUMEBER1
69:-Parallel Multiple Sequence Alignment using Dynamic Scheduling
Jiancong Luo, Ishfaq Ahmad, Munib Ahmed
356:-Dihedral Angle based Dimensionality Reduction for Protein Structural Comparison
Naveen Kandiraju Sumeet Dua Steven A. Conrad
297:-Recognizing Transcription Start Site (TSS) of plant Promoters
Raja Loganantharaj
358:-Design and Implementation of a Unique Blood-vessel Detection Algorithm towards Early Diagnosis of Diabetic Retinopathy
Sumeet Dua Naveen Kandiraju Hilary W. Thompson
192:-A Time-Series Biclustering Algorithm for Revealing Co-regulated Genes
Xiang Ji & Ya Zhang
70:-A NEW PHYLOGENETIC TREE MODEL FOR FUZZY CHARACTERS
Andy Auyeung
Track AreaData Coding and Compression (DCC)
PAPER SESSION NUMEBER (DCC1)1
290:-LANGUAGE DISCRIMINATION VIA PPM MODEL
Ebru Celikel
525:-Layered MPEG video transmission over DifferServ
Hong Zhao
315:-Scalable Generative Topographic Mapping for Sparse Data Sequences
Ata Kaban
5:-Hypergraph Lossless Image Compression
Alain Bretto and Luc Gillibert
374:-An Adaptive Scalable Multiuser OFDM-based Technique for Multimedia Transmission over Fading Channels
Ahmed Muthana M. Nadhim*, Jiangtao Xi**, Zongkai Yang*
171:-Hybrid Coding for Animated Polygonal Meshes: Combining Delta and Octree
Jinghua Zhang Charles B. Owen
PAPER SESSION NUMEBER (DCC2)2
80:-Watermark based Digital Rights Management
Piyali Mandal,Ashish Thakral
223:-A parallel scheme for implementing multialphabet arithmetic coding in high-speed programmable hardware
S. Mahapatra and Kuldeep Singh
14:-Multiple Description Coding Using Transforms and Data Fusion
Shumin Tian and P.K. Rajan
230:-Multiple-Pattern Matching In LZW Compressed Files Using Aho-Corasick Algorithm
Tao Tao, Amar Mukherjee
485:-Orthogonal Hermite Pulses Used for Ultra Wideband M-ary Communication
Wen Hu and Guoxin Zheng
222:-Research On Color Quantization Based On Ant Colony Clustering Algorithm
Xinrong Hu,Dehua Li,Tianzhen Wang
173:-A Rate Control Algorithm for Wireless Video Transmission Using PID and Perceptual Tuning
Yu Sun, Dongdong Li, Jiancong Luo and Ishfaq Ahmad
Track AreaData Mining (DM)
PAPER SESSION NUMEBER (DM1)1
349:-Packet- vs. Session-Based Modeling for Intrusion Detection Systems
Bruce D. Caulkins, Joohan Lee, Morgan Wang
395:-Text Data Mining: A Case Study
Charles Wesley Ford, Chia-Chu Chiang, Hao Wu, Radhika R. Chilka, and *John R. Talburt
342:-A Classifier-based Text Mining Approach for Evaluating Semantic Relatedness Using Support Vector Machines
Chung-Hong Lee and Hsin-Chang Yang
PAPER SESSION NUMEBER (DM2)2
393:-On the relation between dependence and diversity in multiple classifier systems
Deechang Chen, Konstantinos Sirlantzis, Xiuzhen Cheng
215:-Quality-Oriented Software Architecture
Hassan Reza
384:-Mining p53 Binding Sites Using Profile Hidden Markov Model
Jeffrey Huang and Shijun Li
391:-An Arabic Root Extraction Stemmer
Kazem Taghva, Rania Elkhoury, Jeffry Coombs
390:-A Stemming Algorithm for Farsi Language
Kazem Taghva, Russel Beckly, Mohammad Sadeh
399:-Mining Biomedical Images with Density-based Clustering
M. Emre Celebi, Wenzhao Guo, and Y. Alp Aslandogan
PAPER SESSION NUMEBER (DM3)3
217:-Regression Analysis of Ozone Data
M.Abdollahian and R.Foroughi
388:-A Web Recommendation System Based on Maximum Entropy
Xin Jin, Bamshad Mobasher,Yanzan Zhou
205:-Mining Association Rules from the Star Schema on a Parallel NCR Teradata Database System.
Soon M. Chung and Murali Mangamuri
334:-Elimination of Redundant Information for Web Data Mining
Shakirah Mohd Taib, Soon-ja Yeom, Byeong-Ho Kang
354:-A Signature-Based Liver Cancer Predictive System
Ray R. Hashemi, Mahmood Bahar, Christopher Childers, Alexander A. Tyler, and John F. Young
387:-A Density-Based Clustering Algorithm Using Graphical Techniques
Quoc-Nam Tran
365:-XML Representation of Digital Videos for Visual Data Mining Applications
Mark Smith and Alireza Khotanzd
216:-Optimal Statistical Model for Forecasting Ozone
M.Abdollahian and R.Foroghi
320:-Dynamic Web Content Filtering based on User’s Knowledge
N. Churcharoenkrung, Y. S. Kim and B. H. Kang
Track AreaDatabase Technology
PAPER SESSION NUMEBER (DT1)1
48:-Schemaless XML Document Management in Object-Oriented Databases.
Soon M. Chung and Sheeya B. Jesurajaiah
126:-XML Schema Re-Engineering Using a Conceptual Schema Approach
Oviliani Yenty Yuliana, Suphamit Chittayasothorn
373:-Impact Of External Security Measures On Data Access Implementation With Online Database Management System
Moses Garuba and Anteneh Girma
301:-Performance Evaluation of Secure Concurrency Control Algorithm for Multilevel Secure Distributed Database Systems
Navdeep Kaur , A.K. Sarje, Manoj Misra
86:-Constrained Declustering
Ali Saman Tosun
113:-A Time Series Data Management Framework
Abel Matus-Castillejos and Ric Jentzsch
38:-Design Theoretic Approach to Replicated Declustering
Ali Saman Tosun
293:-Managing a Relational Database with Intelligent Agents
Ira Rudowsky, Olga Kulyba, Mikhail Kunin, Dmitri Ogarodnikov and Theodore Raphan
Track AreaDistributed and Grid Systems (DGS)
PAPER SESSION NUMEBER (DGS1)1
337:-EGRID Project: experience report on the implementation of a grid infrastructure for the analysis of financial data
Angelo Leto, Ezio Corso, Stefano Cozzini, Riccardo Murri, Alessio Terpin, Cristian Zoicas
16:-Development of Concurrent Systems through Coordination
Chia-Chu Chiang
211:-A New Generalized Particle Approach to Allot Resources And Jobs for Grid Computing
Dianxun Shuai, Xiang Feng
62:-Computing Molecular Potential Energy Surface with DIET
Emmanuel Jeannot and Gerald Monard
140:-Transaction Mechanism Design in Decentralized Computational Market
FU Qianfei,YANG Shoubao,LI Maosheng,ZHU Junmao
158:-A Grid-enabled Web Map Server
Giovanni Aloisio, Massimo Cafaro, Dario Conte, Sandro Fiore, Italo Epicoco, Gian Paolo Marra, Gianvito Quarta
108:-The GSI plug-in for gSOAP: Enhanced Security, Performance, and Reliability
Giovanni Aloisio, Massimo Cafaro, Italo Epicoco, Daniele Lezzi and Robert van Engelen
81:-Research on Grid Resource Reliability Model Based on Promise
Li Maosheng
341:-METACOMPUTING THROUGH THE ENACTMENT OF A BPEL4WS WORKFLOW IN A GRID ENVIRONMENT
M. DI Santo, N. Ranaldo, E. Zimeo
PAPER SESSION NUMEBER (DGS2)2
236:-An approach for Service Description and a flexible way to discover services in Distributed Systems
Oussama Kassem Zein Yvon Kermarrec
166:-The BPEL Orchestrating Framework for Secured Grid Services
Pichet Amnuaykanjanasin and Natawut Nupairoj
76:-High Throughput Web Services for Life Sciences
Mine Altunay (North Carolina State University: ), Daniel Colonnese (IBM Portals: ),
352:-Algorithms and Databases in Bioinformatics: Towards a Proteomic Ontology
Mario Cannataro, Pietro Hiram Guzzi, Tommaso Mazza, Giuseppe Tradigo and Pierangelo Veltri
362:-Replica Placement in Data Grid:Considering Utility and Risk
Rashedur M. Rahman, Ken Barker, Reda Alhajj
210:-Grid-based Collaboration in Interactive Data Language Applications
Minjun Wang, Geoffrey Fox, Marlon Pierce
PAPER SESSION NUMEBER (DGS3)3
201:-An Analysis of Reliable Delivery Specifications for Web Services
Shrideep Pallickara, Geoffrey Fox and Sangmi Lee Pallickara
53:-Double Auction Protocols for Resource Allocation in Grids
Umesh Kant, Daniel Grosu
Track AreaE-Commerce
PAPER SESSION NUMEBER1
156:-A Characterization of Web Data Sources to Facilitate E-Commerce Transactions
Chima Adiele
17:-A Methodology for Evaluating Agent Toolkits
Elhadi Shakshuki
319:-Automatic Agent and Data Mining for e-Commerce
Charles C. Willow
29:-Customer Generated Electronic Cash
Arthur Hou, C Tan
522:-Exploring Price and Product Information Search in e-Market
Han, T.
PAPER SESSION NUMEBER2
282:-A Mobile Commerce Framework Based on Web Services Architecture
Jiann-Liang Chen, Wen-Ming Tseng, and Yau-Chung Chang
18:-The Interoperability between Different e-Business Specifications
Peng Liang, Keqing He, Bing Li, Jin Liu
264:-A Semantic Interoperability Extension Model to the ebXML Registry
Wudong Liu, Lulu He, Keqing He
182:-An Exchange Protocol for Alternative Currencies
Yiyao Hao, Daniel M. Havey and David A. Turner
72:-IPS - Secure Internet Payment System
Zoran Djuric
Track AreaEducation
PAPER SESSION NUMEBER1
189:-A Framework and Process for Curricular Integration and Innovation Using Project Based Interdisciplinary Teams
Frank P. Coyle Mitchell A. Thornton
174:-Online Example-Based Learning
Pavel Azalov
351:-An E-learning tool for Database Administration
Paul Douglas and Steve Barker
332:-An Integrated Course Based on Educational Games
Hye Sun Kim and Seong Baeg Kim
116:-Adaptation and Configuration – Support-Possibilities of Different Learner Types within Virtual Learning Environments – An
Experience Report
Imke Sassen Birgit Schwartz-Reinken University of Hamburg Institute of Information Systems Germany
331:-Constructing Different Learning Paths Through e-learning
Kyoung Mi Yang and Seong Baeg Kim
PAPER SESSION NUMEBER2
312:-Adaptive Book: Teaching and Learning Environment for Programming Education
Victor Adamchik and Ananda Gunawardena
421:-INTEGRATION OF DIGITAL RIGHTS MANAGEMENT INTO LEARNING CONTENT MANAGEMENT SYSTEM
Qingtang Liu, zongkai Yang
247:-Comparison of Information Technology Adoption Rates across Laggards, Innovators and Others
Rukmini Reddy Muduganti, Shravan Kumar Sogani Henry Hexmoor
493:-A Specialization in Information and Knowledge Management Systems for the Undergraduate Computer Science Curriculum
S. ARGAMON, N. GOHARIAN, D. GROSSMAN, O. FRIEDER
348:-An Intelligent Tutoring System for Program Semantics
Steve Barker and Paul Douglas
Track AreaE-Gaming
PAPER SESSION NUMEBER1
404:-Online Gaming Cheating and Security Issue
Ying-Chieh Chen, Patrick S. Chen, George Yee, Ronggong Song, Larry Korba
134:-Single-Parameter Blackjack Betting Systems Inspired by Scatter Search
Ron Coleman
406:-Dealing Cards in Poker Games
Phillipe Golle
170:-Digital chips for an on-line casino
J. Castellà-Roca, G. Navarro, J.A. Ortega-Ruiz, J. Garcia-Alfaro
143:-Protecting on-line casinos against fraudulent player drop-out
J. Garcia, F. Autrel, J.Borrell, J. Castellà-Roca, F. Cuppens, and G. Navarro
Track AreaEmbedded Cryptographic Systems
PAPER SESSION NUMEBER1
147:-Quadrinomial Modular Arithmetic using Modifed Polynomial Basis
Christophe Negre
96:-FPGA Implementations of the ICEBERG Block Cipher
F.-X. Standaert, G. Piret, G. Rouvroy, J.-J. Quisquater
410:-"On the Multiplicative Inversion over GF(2^m)"
Francisco Rodrıguez-Henrıquez, Nazar A. Saqib, and Nareli Cruz-Cortes
99:-On the Masking Countermeasure and Higher-Order Power Analysis Attacks
F.-X.Standaert, E. Peeters, J.-J.Quisquater
314:-Fast Parallel Table Lookups to Accelerate Symmetric-Key Cryptography
A. Murat Fiskiran, Ruby B. Lee
370:-A Scalable and High Performance Elliptic Curve Processor with Resistance to Timing Attacks
Alireza Hodjat, David Hwang, Ingrid Verbauwhede
357:-ASIC-Hardware-Focused Comparison for Hash Functions MD5, RIPEMD-160, and SHS
Akashi Satoh, Tadanobu Inoue
90:-A Countermeasure for EM Attack of a Wireless PDA
C.H.Gebotys, C.Tiu, X.Chen
68:-A Scalable Dual Mode Arithmetic Unit for Public Key Cryptosystems
Francis Crowe, Alan Daly and William Marnane
PAPER SESSION NUMEBER2
114:-Verifiable Threshold Sharing of a Large Secret Safe Prime
Maged H. Ibrahim
161:-ASIC Implementation of a Unified Hardware Architecture for Non-Key Based Cryptographic Hash Primitives
Ganesh T S, T S B Sudarshan
144:-AES Power Attack Based on Induced Cache Miss and Countermeasure
Guido Bertoni, Vittorio Zaccaria, Luca Breveglieri, Matteo Monchiero, Gianluca Palermo
26:-XScale Hardware Acceleration on Cryptographic Algorithms for IPSec Applications
Hung-Chin Chang, Chun-Chin Chen, and Chih-Feng Lin
330:-Modified Radix-2 Montgomery Modular Multiplication to Make It Faster and Simpler
Kooroush Manochehri, Saadat Pourmozafari
305:-Reconfigurable Hardware for Addition Chains Based Modular Exponentiation
Luiza de Macedo Mourelle, Nadia Nedjah
PAPER SESSION NUMEBER3
309:-Inversion-Free Arithmetic on Genus 3 Hyperelliptic Curves and Its Implementations
Xinxin Fan, Thomas Wollinger and Yumin Wang
339:-Improved Routing-Based Linear Algebra for the Number Field Sieve
Willi Geiselmann, Hubert Köpfer, Rainer Steinwandt, and Eran Tromer
203:-Short Proxy Signature using Pairing and Its Application
Takeshi Okamoto, Atsuo Inomata and Eiji Okamoto
343:-A parallelized design for an Elliptic Curve Cryptosystem Coprocessor
Stefano Turcato, Fabio Sozzani, Luca Breveglieri, Guido Bertoni
303:-Pareto-Optimal Hardware for Substitution Boxes
Nadia Nedjah, Luiza de Macedo Mourelle
323:-The Montgomery Exponent and Its Applications
Shay Gueron and Or zuk
Track AreaInformation Assurance and Security
PAPER SESSION NUMEBER1
22:-Clarifying Obfuscation: {Improving the Security of White-Box DES
Hamilton E. Link and William D. Neumann
103:-Intrusion Detection System to Detect Variant Attacks Using Learning Algorithms with Automatic Generation of Training Data
Akira Yamada, Yutaka Miyake, Keisuke Takemori, Toshiaki Tanaka
32:-Application of Loop Reduction to Learning Program Behaviors for Anomaly Detection
Jidong Long,Daniel G. Schwartz, Sara Stoecklin, Mahesh K. Patel
383:-No-capture hardware feature for securing sensitive information
Khaled Hussain, Sharon Rajan, and Naveen Addulla
109:-Secure Group Communication with Multiplicative One-way Functions
Heeyoul Kim, Seong-min Hong, H. Yoon, J.W. Cho
304:-An Aspect-Oriented Approach to Mobile Agent Access Control
Dianxiang Xu and Vivek
51:-StackOFFence: A Technique for Defending Against Buffer Overflow Attacks
B. B. Madan, S. Phoha and K. S. Trivedi
34:-Conversion and Proxy Functions for Symmetric Key Ciphers
Debra L. Cook and Angelos D. Keromytis
118:-An Efficient Secure Key Issuing Protocol in ID-Based Cryptosystems
G. Raju, G. M. Choudary, M. L. Das, Ashutosh Saxena, Ved P. Gulati
PAPER SESSION NUMEBER2
345:-Formalisation and implementation of access control models
Mathieu Jaume and Charles Morisset
476:-QoS-based Authentication Scheme for Ad Hoc Wireless Networks
P Muppala, Johnson Thomas, Ajith Abraham
385:-Byteprints: A Tool to Gather Digital Evidence
Sriranjani Sitaraman, Srinivasan Krishnamurthy and S. Venkatesan
102:-A Secure and Efficient Voter-Controlled Anonymous Election Scheme
Thomas E. Carroll, Daniel Grosu
371:-Security Design and Evaluation in a VoIP Secure Infrastracture: A Policy Based Approach
Valentina Casola, Massimiliano Rak, Antonino Mazzeo, Nicola Mazzoccca
338:-The N/R One Time Password System
Vipul Goyal, Ajith Abraham, Sugata Sanyal and Sang Yong Han
PAPER SESSION NUMEBER3
372:-Effective Steganalysis Based on Statistical Moments of Effective Steganalysis Based on Statistical Moments of Wavelet
Characteristic Function
Yun Q. Shi, Guorong Xuan, Chengyun Yang, Jianjiong Gao, Zhenping Zhang, Peiqi Chai,Dekun Zou, Chunhua Chen, Wen
175:-Dynamic learning of automata incorporating call stack information for anomaly detection
Zhen Liu and Susan M. Bridges Department of Computer Science and Engineering Mississippi State University {zliu,
58:-Securely Utilizing External Computing Power
Yu Yu, Leiwo Jussipekka, Benjamin Premkumar
52:-A Dynamic Method for Handling the Inference Problem in Multilevel Databases
X. Chen and R. Wei
129:-Efficient TTP-free Mental Poker Protocols
Weiliang Zhao and Vijay Varadharajan
125:-CompChall: Addressing Password Guessing Attacks
Vipul Goyal, Virendra Kumar, Mayank Singh, Ajith Abraham and Sugata Sanyal
54:-ID-Based One Round Authenticated Group Key Agreement Protocol with Bilinear Pairings
Yijuan Shi Gongliang Chen Jianhua Li
92:-Efficient Array & Pointer Bound Checking Against Buffer Overflow Attacks via Hardware/Software
Zili Shao, Chun Xue, Qingfeng Zhuge, Edwin H.-M. Sha, Bin Xiao
Track AreaInformation Retrieval
PAPER SESSION NUMEBER1
15:-A Mathematical Investigation on Retrieval Performance Evaluation Measures of Information Retrieval Algorithm
Song Jun-feng, Zhang Wei-ming, Xiao Wei-dong
193:-A Comparative Study of Three Moment-Based Shape Descriptors
M. Emre Celebi and Y. Alp Aslandogan
380:-Neural Network Approach for Software Cost Estimation
Rifat Ozcan Y. Alp Aslandogan
429:-Designing a Value Based Search Engine using Evolutionary Strategies
Sengupta , Jansen
Track AreaITCC general
PAPER SESSION NUMEBER1
524:-ROM-Based FSM Implementation in FPGA Devices
Tadeusz Luba
526:-Wireless Internet Payment System Using Smart Cards
Osama Dandash
359:-Impact of Java Compressed Heap on Mobile/Wireless Communication
Mayumi KATO Chia-Tien Dan Lo
523:-A Survey on Data Compression in Wireless Sensor Networks
Naoto Kimura, Shahram Latifi
Track AreaMobile Enterprise
PAPER SESSION NUMEBER1
364:-Using Principles of Pervasive Computing to Design M-commerce Applications
Stan Kurkovsky
366:-History Calls: Delivering Automated Audio Tours to Visitors’ Cell Phone
Matthew Nickerson
270:-Mobile Web Services Discovery and Invocation Through Auto-Generation of Abstract Multimodal Interface
Robert Steele, Khaled Khankan, Tharam Dillon
260:-XML-based Mobile Agents
Robert Steele, Tharam Dillon, Parth Pandya
138:-Using Dynamic Adaptability to Protect Mobile Agent Code
Salima Hacini
361:-Bluetooth as an Enabling Technology in Mobile Transactions
Sojen Pradhan, Elaine Lawrence and Agnieszka Zmijewska
Track AreaNew Trends in Image Processing
PAPER SESSION NUMEBER1
500:-Using Facial Images to Diagnose Fetal Alcohol Syndrome (FAS)
Amit Jain, Jeffrey Huang and Shiaofen Fang
65:-Investigating a Wrapper Approach for Selecting Features Using Constructive Neural Networks
Daniel M. Santoro, Maria do C. Nicoletti
509:-Orthogonal and Least-Squares Based Coordinate Transforms for Optical Alignment Verification in Radiosurgery
Ernesto Gomez, Yasha Karant, Veysi Malkoc, Mahesh R. Neupane, Keith E. Schubert and Reinhard W. Schulte
227:-PRACTICAL EVALUATION OF A RADIAL SOFT HASH ALGORITHM
F.-X. Standaert, F. Lefebvre, G. Rouvroy, B. Macq, J.-J. Quisquater, J.-D. Legat.
451:-A Generic Shape Descriptor using Bezier Curves
Ferdous Ahmed Sohel, Gour C. Karmakar, Laurence S. Dooley
454:-Fuzzy-based Parameterized Gaussian Edge Detector Using Global and Local Properties
John See, Madasu Hanmandlu, and Shantaram Vasikarla
456:-A ROBUST OPTICAL FLOW ESTIMATION ALGORITHM FOR TEMPORAL TEXTURES
Ashfaqur Rahman and Manzur Murshed
PAPER SESSION NUMEBER2
146:-Watermark Detection Schemes with High Security
Liu Yongliang
310:-Remove Interferential Curve from Text Image
Zhiguo Cheng, Mang Chen, Yuncai Liu
501:-A Comparison of some Clustering Techniques via Color Segmentation
Shilpa Agarwal, Shweta Madasu, Madasu Hanmandlu, and Shantaram Vasikarla
507:-IMPROVED FACE AND HAND TRACKING FOR SIGN LANGUAGE RECOGNITION
N. Soontranon, S. Aramvith and T.H. Chalidabhongse
516:-Compression Standards role in Image Processing
Mohammad Eyadat
307:-Recognition and Extraction High Precision Digital Road Map
Mang Chen, Yuncai Liu
450:-FUZZY IMAGE SEGMENTATION COMBING RING AND ELLIPTIC SHAPED CLUSTERING ALGORITHMS