2009 Sixth International Conference on Information ...toc.proceedings.com/05531webtoc.pdf · 2009...

24
Proceedings of the 2009 Sixth International Conference on Information Technology: New Generations 27 - 29 April 2009 / Las Vegas, Nevada, USA Los Alamitos, California Washington Tokyo

Transcript of 2009 Sixth International Conference on Information ...toc.proceedings.com/05531webtoc.pdf · 2009...

Page 1: 2009 Sixth International Conference on Information ...toc.proceedings.com/05531webtoc.pdf · 2009 Sixth International Conference on Information Technology: New Generations 27 - 29

Proceedings of the

2009 Sixth International Conference on Information Technology: New Generations

27 - 29 April 2009 / Las Vegas, Nevada, USA

Los Alamitos, California

Washington • Tokyo

Page 2: 2009 Sixth International Conference on Information ...toc.proceedings.com/05531webtoc.pdf · 2009 Sixth International Conference on Information Technology: New Generations 27 - 29

2009 Sixth InternationalConference on Information

Technology: New Generations

ITNG 2009Table of Contents

Conference Information

CIRCUIT & SYSTEM DESIGN

Design Simulation of Top ITO Gratings to Improve Light Transmission

for Gallium Nitride LEDs ...........................................................................................................................................1

Xiaomin Jin, Simeon Trieu, Fei Wang, Bei Zhang, Tao Dai, Xiangning Kang,

and Guoyi Zhang

Non-volatile Memory Devices Based on Chalcogenide Materials ......................................................................5

Fei Wang and Xiaolong Wu

Dedicated Hardware for Ant Colony Optimization Using Distributed Memory .............................................10

Masaya Yoshikawa and Hidekazu Terai

A Novel Approach to Scan Detection on the Backbone ......................................................................................16

Yu Zhang and Binxing Fang

A Remote Sensing Image Segmentation Method Based on Spectral

and Texture Information Fusion ..............................................................................................................................22

Xing Xie, Mengliang Liu, Leiguang Wang, and Qianqin Qin

A Novel Biological Recognition Method Based on Cranio-maxillo-facial

Feature Information ...................................................................................................................................................28

Liwen Huang, Jing Yang, Xiaolong Wu, and Xiaoqian Hu

Classification of Quaternary [21s + 4,3] Optimal Self-orthogonal Codes ........................................................33

Xuejun Zhao, Ruihu Li, and Yingjie Lei

Low Power Ambient Energy Harvesting, Conversion, and Storage Circuits ...................................................35

Faruk Yildiz

Dynamic Single-Row Routing Technique for Channel Assignments ...............................................................41

Shaharuddin Salleh and Nor Haniza Sarmin

A Novel Flash Fast-Locking Digital Phase-Locked Loop ..................................................................................47

Mahmoud Fawzy Wagdy and Brandon Casey Cabrales

Page 3: 2009 Sixth International Conference on Information ...toc.proceedings.com/05531webtoc.pdf · 2009 Sixth International Conference on Information Technology: New Generations 27 - 29

A DPA-Resistant Digit-Parallel Modular Multiplier over GF (2m) ..................................................................53

Jianping Quan and Guoqiang Bai

A New Method to Reduce the Side-Channel Leakage Caused by Unbalanced

Capacitances of Differential Interconnections in Dual-Rail Logic Styles ........................................................58

Jianping Quan and Guoqiang Bai

Computational Modeling of Cell Survival/ Death Using MATLAB Simulator ..............................................64

Shruti Jain, P.K. Naik, D.S. Chauhan, and Rohit Sharma

Using a Supercapacitor to Power Wireless Nodes from a Low Power Source

such as a 3V Button Battery .....................................................................................................................................69

Pierre Mars and Dave McIntosh

A Novel EKF-GPS Algorithm for Bridge Deformation Monitoring System ...................................................79

Jing Yang, Yongquan Wang, Min He, Fei Wang, and Xiaolong Wu

Implementation of Different Function Units Using Flexible

and Reconfigurable Architecture .............................................................................................................................84

Chao-Jang Hwang, Chih-Tung Lin, and Shi-Jinn Horng

A High-Performance Architecture of an XML Processor for SIP-Based

Presence .......................................................................................................................................................................90

Fadi El-Hassan, Raymond Peterkin, Mohamed Abou-Gabal, and Dan Ionescu

Processor Allocation Problem for NoC-Based Chip Multiprocessors ...............................................................96

Dawid Zydek and Henry Selvaraj

A Novel DDFS Based on Trigonometric Approximation with a Scaling Block ...........................................102

Farhad Babak and Parviz Keshavarzi

INFORMATION SYSTEMS & INTERNET TECHNOLOGY

The Two-Level-Turn-Model Fault-Tolerant Routing Scheme in Tori

with Convex and Concave Faults ..........................................................................................................................107

Lingfu Xie and Du Xu

Generating Rule-Based Executable Process Models for Service Outsourcing ..............................................114

Jae-Yoon Jung

Integrating Amazonic Heterogeneous Hydrometeorological Databases .........................................................119

Gláucia Braga e Silva, Breno Lisi Romano, Henrique Fernandes de Campos,

Ricardo Godoi Vieira, Adilson Marques da Cunha, and Luiz Alberto Vieira Dias

Lessons Learned from a Survey of Web Applications Testing ........................................................................125

Ben Kam and Thomas R. Dean

Formalizing the Management Automation with Workflow of Software

Development Process Based on the SPEM Activities View .............................................................................131

Daniel Riesco, German Montejano, Narayan Debnath, and Manuel Perez Cota

SOFTWARE PROJECTS FINANCE SUPPORT: Preliminary Talks

between Software Project Managers and Potential Investors ...........................................................................137

Roberto Uzal, Narayan Debnath, D. Riesco, and German Montejano

vivi

Page 4: 2009 Sixth International Conference on Information ...toc.proceedings.com/05531webtoc.pdf · 2009 Sixth International Conference on Information Technology: New Generations 27 - 29

An Information Retrieval Model for the Semantic Web ...................................................................................143

Fabio Augusto de Santana Silva, Maria del Rosario Girardi, and Lucas Rego Drumond

A New Algorithm for Frequent Itemset Generation in Non-Binary Search

Space ..........................................................................................................................................................................149

G. Praveen Kumar, Anirban Sarkar, and Narayan C. Debnath

A Further Improvement on a Genetic Algorithm ...............................................................................................154

Ian Stewart, Wenying Feng, and Selim Akl

Google Scholar’s Ranking Algorithm: The Impact of Articles’ Age (An

Empirical Study) ......................................................................................................................................................160

Jöran Beel and Bela Gipp

A Novel Method Combining ORESTE, Fuzzy Set Theory, and TOPSIS

Method for Ranking the Information and Communication Technology

Research Centers of Iran .........................................................................................................................................165

Mehdi Fasanghari, Maryam Mohamedpour, and Mohammad Amin Mohamedpour

Comparison of QOS Fixed and Limited Interleaved Polling with Cyclic

Demand Proportionality Algorithms ....................................................................................................................171

Sadeta Krijestorac and Jonathan Bagby

AI APPLICATIONS

Improving Job Scheduling in GRID Environments with Use of Simple

Machine Learning Methods ...................................................................................................................................177

Daniel Vladušic, Aleš Cernivec, and Boštjan Slivnik

Tabu Search for Parallel Machine Scheduling with Job Splitting ....................................................................183

Cenk Çelik and Inci Saricicek

Scheduling Algorithm for On-Demand Bus System ..........................................................................................189

Kota Tsubouchi, Kazuo Hiekata, and Hiroyuki Yamato

SOFTWARE ENGINEERING

The Explore of the Law Role in Software Requirements Engineering ...........................................................195

Xinhao Ji

Clustering and Metrics Thresholds Based Software Fault Prediction

of Unlabeled Program Modules .............................................................................................................................199

Cagatay Catal, Ugur Sevim, and Banu Diri

Managing Post-Development Fault Removal .....................................................................................................205

Suzanna Schmeelk, Bill Mills, and Robert Noonan

TransCPN - Software Tool for Transformation of Colored Petri Nets ...........................................................211

Boleslaw Mikolajczak and Abhishek Singh

Two New Algorithms for Software Watermarking by Register Allocation

and their Empirical Evaluation ..............................................................................................................................217

Hakun Lee and Keiichi Kaneko

viivii

Page 5: 2009 Sixth International Conference on Information ...toc.proceedings.com/05531webtoc.pdf · 2009 Sixth International Conference on Information Technology: New Generations 27 - 29

An Aspect-Based Approach to Checking Design Constraints at Run-Time ..................................................223

Yoonsik Cheon, Carmen Avila, Steve Roach, Cuauhtemoc Munoz, Neith Estrada,

Valeria Fierro, and Jessica Romo

Evaluating Test-Driven Development in an Industry-Sponsored Capstone

Project ........................................................................................................................................................................229

John Huan Vu, Niklas Frojd, Clay Shenkel-Therolf, and David S. Janzen

Security Vulnerabilities and Mitigation Strategies for Application

Development .............................................................................................................................................................235

Brunil Dalila Romero Mariño and Hisham M. Haddad

An Agent-Oriented Source-Level Debugger on Top of a Monitoring

Framework ................................................................................................................................................................241

Ziad AL-Sharif and Clinton Jeffery

Component-Based Software Architecture Design for Network Intrusion

Detection and Prevention System .........................................................................................................................248

Jianchao Han, Mohsen Beheshti, Kazimierz Kowalski, Joel Ortiz, and Johnly Tomelden

Security Estimation Framework: Design Phase Perspective .............................................................................254

Shalini Chandra, Raees Ahmad Khan, and Alka Agrawal

Software Engineering Challenges in Game Development ................................................................................260

Christopher M. Kanode and Hisham M. Haddad

A Comparison between Relational and Operational QVT Mappings .............................................................266

Pavle Guduric, Arno Puder, and Rainer Todtenhoefer

Early Studies in Acquiring Evidentiary, Reusable Business Process Models

for Legal Compliance ..............................................................................................................................................272

Travis D. Breaux and Calvin Powers

Citation Analysis: An Approach for Facilitating the Understanding and

the Analysis of Regulatory Compliance Documents .........................................................................................278

Abdelwahab Hamou-Lhadj and Mohammad Hamdaqa

An Eclipse Plugin for the Automated Reverse-Engineering of Software

Programs ...................................................................................................................................................................284

Philippe Dugerdil, David Kony, and Javier Belmonte

SERVICE-ORIENTED COMPUTING & APPLICATIONS

A Method for Service Oriented Design ................................................................................................................290

Sedighe Moosavi, Mir Ali Seyyedi, and Nasrollah Moghadam

Highly-Available Web Service Community ........................................................................................................296

Sattanathan Subramanian

Towards a Goal-Based Service Framework for Dynamic Service Discovery

and Composition ......................................................................................................................................................302

Luiz Olavo Bonino da Silva Santos, Eduardo Goncalves da Silva, Luis Ferreira Pires,

and Marten van Sinderen

viiiviii

Page 6: 2009 Sixth International Conference on Information ...toc.proceedings.com/05531webtoc.pdf · 2009 Sixth International Conference on Information Technology: New Generations 27 - 29

Healthcare Applications Interoperability through Implementation of HL7 Web

Service Basic Profile ...............................................................................................................................................308

Maqbool Hussain, Muhammad Afzal, H. Farooq Ahmad, Naeem Khalid, and Arshad Ali

An Analysis of Business Models of Web 2.0 Application ................................................................................314

Shari S.C. Shang, Ya-Ling Wu, and Oliver C.L. Hou

A Secure Billing Protocol for Grid Computing ..................................................................................................320

Chia-Hui Wei, Yeo-Hao Chin, and Chun-Ta Li

A Heuristic Model of Network-Based Group Decision Making for E-Services ............................................326

Wei-Lun Chang, Yi-Ping Lo, and Yu-Ting Hong

Cross-Organizational Service Evolution Management ......................................................................................332

Odorico von Susani and Philippe Dugerdil

Obstacle Avoidance for Utility-Based Geocasting .............................................................................................338

Fernando J. Maymi and Manuel Rodriguez-Martinez

INFORMATION SECURITY & PRIVACY

Leveraging Parent Mitigations and Threats for CAPEC-Driven Hierarchies ................................................344

Patrick H. Engebretson and Joshua J. Pauli

A Multi-Signature Scheme Based on Two Difficult Mathematics Problems .................................................350

Bin Sun, Wang Chuan, Jiang Li, and Legand Burge

The Design of Boolean Functions by Modified Hill Climbing Method .........................................................356

Yuriy Izbenko, Vladislav Kovtun, and Alexandr Kuznetsov

Construction of Anti-Collusion Codes Based on Cover-Free Families ..........................................................362

Qiaoliang Li, Xiaoming Wang, Yingshu Li, Yi Pan, and Pingzhi Fan

A Robust Audio Aggregate Zero-Watermark Algorithm ..................................................................................366

Yiqun Xiong and Rangding Wang

Attacks on a Block Based SVD Watermarking Scheme ...................................................................................371

Huo-Chong Ling, Swee-Huay Heng, and Bok-Min Goi

A New Steganography Scheme Based on an Index-Color Image ....................................................................376

Se-Min Kim, Ziqiang Cheng, and Kee-Young Yoo

A Peer-to-Peer Federated Authentication System ..............................................................................................382

Myong Kang and Amitabh Khashnobish

A Novel Method-Based Software Watermarking Scheme ................................................................................388

Zhu Jianqi, Liu YanHeng, Yin Ke, and Yin KeXin

Automated Risk and Utility Management ...........................................................................................................393

Andreas Ekelhart, Thomas Neubauer, and Stefan Fenz

An Authentication System Based on Palmprint ..................................................................................................399

Hanmandlu Madasu, H.M.Gupta, Neha Mittal, and Shantaram Vasikarla

An Anti-Phishing Approach that Uses Training Intervention for Phishing

Websites Detection ..................................................................................................................................................405

Abdullah Alnajim and Malcolm Munro

Evaluation of Two Privacy-Preserving Protocols for the DNS ........................................................................411

Sergio Castillo-Perez and Joaquin Garcia-Alfaro

ixix

Page 7: 2009 Sixth International Conference on Information ...toc.proceedings.com/05531webtoc.pdf · 2009 Sixth International Conference on Information Technology: New Generations 27 - 29

Efficient Short Signatures from Pairing ...............................................................................................................417

Raylin Tso, Takeshi Okamoto, and Eiji Okamoto

Security in Wireless Mesh Networks: Challenges and Solutions ....................................................................423

Ping Yi, Tianhao Tong, Ning Liu, Yue Wu, and Jianqing Ma

T-PIM: Trusted Password Input Method against Data Stealing Malware ......................................................429

Manabu Hirano, Tomohiro Umeda, Takeshi Okuda, Eiji Kawai, and Suguru Yamaguchi

Federated Authentication Mechanism using Cellular Phone - Collaboration

with OpenID .............................................................................................................................................................435

Ryu Watanabe and Toshiaki Tanaka

Bisimulations in the Boxed Safe Ambients with Password ..............................................................................443

Jiang Hua and Tan Xinxing

A Verifiable Electronic Voting Scheme over the Internet ................................................................................449

Chun-Ta Li, Min-Shiang Hwang, and Yan-Chi Lai

Practical Power Analysis Attacks to RSA on a Large IP Portfolio SoC .........................................................455

Guido Marco Bertoni, Luca Breveglieri, Alessandro Cominola, Filippo Melzani,

and Ruggero Susella

Extending l-Diversity for Better Data Anonymization ......................................................................................461

Hongwei Tian and Weining Zhang

Component Based Information Network for Computer Security .....................................................................467

Joel Ortiz, Johnly Tomelden, Mohsen Beheshti, Kazimierz Kowalski, and Jianchao Han

Message Encryption Scheme Using Cheating Text ...........................................................................................470

Ch. Rupa and P.S. Avadhani

Optimal Network Security Strengthening Using Attack-Defense Game Model ...........................................475

Wei Jiang, Bin-xing Fang, Hong-li Zhang, Zhi-hong Tian, and Xin-fang Song

Deception Detection Based on SVM for Chinese Text in CMC ......................................................................481

Hu Zhang, Shan-de Wei, Hong-ye Tan, and Jia-heng Zheng

An Efficient and Reliable Time Variant Three-Entity and Data Authentication

of Remote User Using Smart card ........................................................................................................................487

C. Koner, C.T. Bhunia, and U. Maulik

Multi-Layered Defense against Web Application Attacks ................................................................................492

Abdul Razzaq, Ali Hur, Nasir Haider, and Farooq Ahmad

An Efficient PRNG Based on the Hybrid between One- and Two-Dimensional

Cellular Automata ....................................................................................................................................................498

Sang-Ho Shin and Kee-Young Yoo

Authenticated Dictionary-Based Attribute Sharing in Federated Identity

Management .............................................................................................................................................................504

Dongwan Shin, Rodrigo Lopes, and William Claycomb

xx

Page 8: 2009 Sixth International Conference on Information ...toc.proceedings.com/05531webtoc.pdf · 2009 Sixth International Conference on Information Technology: New Generations 27 - 29

NETWORKING & WIRELESS COMMUNICATIONS

Application of Game Theory for Cross-layer Design in Cognitive Wireless

Networks ...................................................................................................................................................................510

Y.B. Reddy and Cliff Bullmaster

Reconfigurable Relaying Topology in Cognitive Multihop Wireless Networks

with Nonuniform Temporal and Spatial Traffic Distribution ...........................................................................516

Beatriz Lorenzo and Savo Glisic

A Distributed Coverage-Aware Sleep Scheduling Algorithm for Wireless

Sensor Networks ......................................................................................................................................................524

Fangyang Shen, Chunlei Liu, and Jun Zhang

Radiation Emission EMC Measurement in Real-Time ......................................................................................528

Fahim G. Awan, Noor M. Sheikh, and Fawad Munir

Mitagation against MAI in a Space Time Spreading Software Defined Radio

Test Bed ....................................................................................................................................................................534

Shinhan Wee, Montse Ros, and Peter James Vial

Outage Behavior of Multi-Antenna Multi-Relay Non-Regenerative

Cooperative Networks .............................................................................................................................................541

Ning Liu, Jianhua Li, Ping Yi, Jianing Li, and Yue Wu

Evaluation of Energy Consumption and Network Lifetime in Rectangular

Ad-hoc Wireless Networks ....................................................................................................................................546

Wei Feng, Hamada Alshaer, and Jaafar M.H. Elmirghani

Cross-Layer Design Approach for Wireless Networks to Improve

the Performance .......................................................................................................................................................552

Nikema Smith, Yenumula B. Reddy, and Nandigam Gajendar

An Empirical Study for Protecting Passive RFID Systems against Cloning ..................................................558

Mostafa M. El-Said and Ira Woodring

Fault-Tolerant Maximal Local-Connectivity on the Bubble-Sort Graphs ......................................................564

Lun-Min Shih and Jimmy J.M. Tan

Implementation of Header Compression in 3GPP LTE ....................................................................................570

Devishree Naidu and Rakhi Tapadiya

SENSOR NETWORKS

A Service-Oriented Middleware for Wireless Sensor and Actor Networks ...................................................575

Eduardo Cañete, Jaime Chen, Manuel Díaz, Luis Llopis, and Bartolomé Rubio

An Online Multipath Routing Algorithm for Maximizing Lifetime in Wireless

Sensor Networks ......................................................................................................................................................581

Mahmood R. Minhas, Sathish Gopalakrishnan, and Victor C.M. Leung

Micro T-Kernel: A Low Power and Small Footprint RTOS for Networked

Tiny Devices .............................................................................................................................................................587

Masato Kamio, Keiichi Nakamura, Shinsuke Kobayashi, Noboru Koshizuka,

and Ken Sakamura

xixi

Page 9: 2009 Sixth International Conference on Information ...toc.proceedings.com/05531webtoc.pdf · 2009 Sixth International Conference on Information Technology: New Generations 27 - 29

Estimation Method for Total Nitrogen and Fiber Contents in Tealeaves as

well as Grow Index of Tealeaves and Tea Estate Monitoring with Network

Cameras .....................................................................................................................................................................595

Kohei Arai

Supporting Stateless Address Autoconfiguration in IP-Based Wireless Sensor

Networks ...................................................................................................................................................................601

Shafique Ahmad Chaudhry and Cormac J. Sreenan

Performance Monitoring in Sensor Networks .....................................................................................................607

P. Papantoni-Kazakos and A.T. Burrell

CoP4V : Context-Based Protocol for Vehicle’s Safety in Highways Using

Wireless Sensor Networks ......................................................................................................................................613

Sattanathan Subramanian, Djamel Djenouri, Guttorm Sindre, and Ilangko Balasingham

A Secure Content-Based Publish/Subscribe Middleware ..................................................................................619

Amina Chaabane and Mohamed Jmaiel

MOBILE COMPUTING & NETWORKING

Derivation and Analysis of Link/Route Maintenance Probability In Multi Hop

Mobile Ad Hoc Networks ......................................................................................................................................623

Yong Shou Wu, Do-hyeon Lee, and Jae-il Jung

An Election Protocol in Mobile Ad Hoc Distributed Systems .........................................................................628

Sung-Hoon Park, Tae-Gyu Lee, Hyung-Seok Seo, Seok-Jin Kwon, and Jong-Ho Han

Virtual Globe on the Android - Remote vs. Local Rendering ..........................................................................634

Marjan Sterk and Mariano Agustin Cecowski Palacio

Prevention of Denial of Service Attacks and Performance Enhancement

in Mobile Ad hoc Networks ...................................................................................................................................640

R. Gunasekaran and V. Rhymend Uthariaraj

Supporting Video Multicast in Wireless Ad Hoc Networks Using Multiple

Paths and Multiple Description Coding ...............................................................................................................646

Osamah S. Badarneh, Michel Kadoch, and Ahmed A. Elhakeem

Towards an In-Flight Infrared Peer-to-Peer Media Streaming Network .........................................................652

Thi Vu Phu, Vu Anh Huynh, and Timo Rolf Bretscheider

Time-Based Cache Management for Video-on-Demand in P2P Environment ..............................................657

Yi Qi Gui, Gi Taek Kim, and Hwang Kyu Choi

Performance Evaluation of GP3 - A Grid-Based Spatial Index Infrastructure ..............................................663

Markus Esch, Jean Botev, Hermann Schloss, and Ingo Scholtes

SOFTWARE ENGINEERING EDUCATION

Using Open Source Tools to Prevent Write-Only Code ....................................................................................671

Susan Loveland

Bridging the Research-Practice Gap in Requirements Engineering

through Effective Teaching and Peer Learning ...................................................................................................678

Andrew Mile Connor, Jim Buchan, and Krassie Petrova

xiixii

Page 10: 2009 Sixth International Conference on Information ...toc.proceedings.com/05531webtoc.pdf · 2009 Sixth International Conference on Information Technology: New Generations 27 - 29

Design Patterns Go to Hollywood: Teaching Patterns with Multimedia ........................................................684

Adam Dukovich and David S. Janzen

The Road We’ve Traveled: 12 Years of Undergraduate Software Engineering

at the Rochester Institute of Technology ..............................................................................................................690

J. Fernando Naveda, Michael J. Lutz, James R. Vallino, Thomas Reichlmayr,

and Stephanie A. Ludi

Supporting Live Student Projects: Lessons Learned from the Small Project

Support Center at Radford University ..................................................................................................................696

Jeff Pittges, Joe D. Chase, and Tracy Lewis

Teaching Software Design Using a Case Study on Model Transformation ...................................................702

Yanxia Jia and Yonglei Tao

Using Scaffolding to Improve Written Communication of Software

Engineering Students ..............................................................................................................................................707

Gregory W. Hislop and Heidi J.C. Ellis

Interface-Based Object-Oriented Design with Mock Objects ..........................................................................713

Jagadeesh Nandigam, Venkat N. Gudivada, Abdelwahab Hamou-Lhadj, and Yonglei Tao

The Impact of the Model-Driven Approach to Software Engineering

on Software Engineering Education .....................................................................................................................719

Abdelwahab Hamou-Lhadj, Abdelouahed Gherbi, and Jagadeesh Nandigam

Corporate Compliance and its Implications to IT Professionals ......................................................................725

Venkat N. Gudivada and Jagadeesh Nandigam

Deadlock Detection Views of Distributed Database ..........................................................................................730

B.M. Monjurul Alom, Frans Alexander Henskens, and Michael Richard Hannaford

SOFTWARE TESTING

Using the Multi-Attribute Global Inference of Quality (MAGIQ) Technique

for Software Testing ................................................................................................................................................738

James D. McCaffrey

The Design of an Automated Unit Test Code Generation System ...................................................................743

Gary Fix

A Browser Agnostic Web Application UI Test Framework: Motivation,

Architecture, and Design ........................................................................................................................................748

Craig Merchant, Manuel Tellez, and Jagannathan Venkatesan

The Creation of a Software Testing Meta Framework; The Test Object Model ...........................................752

Neill Thompson, Heather Munion, Dan Wenzel, and Ric Ellsworth

Automated Testing of Environment-Dependent Programs − A Case Study

of Modeling the File System for Pex ....................................................................................................................758

Soonho Kong, Nikolai Tillmann, and Jonathan de Halleux

A Dependence Graph-Based Test Coverage Analysis Technique

for Object-Oriented Programs ...............................................................................................................................763

E.S.F. Najumudheen, Rajib Mall, and Debasis Samanta

xiiixiii

Page 11: 2009 Sixth International Conference on Information ...toc.proceedings.com/05531webtoc.pdf · 2009 Sixth International Conference on Information Technology: New Generations 27 - 29

Declarative Testing: A Paradigm for Testing Software Applications .............................................................769

Ed Triou, Zafar Abbas, and Sravani Kothapalle

The Architecture, Design, and Operation of a Virtual Network Hardware

Emulation (VNHE) System ....................................................................................................................................774

David Harding

The Design of a System for Testing Database-Centric Software Applications

Using Database Surrogates .....................................................................................................................................779

Adrian Bonar

Test Automation Framework for Implementing Continuous Integration .......................................................784

Eun Ha Kim, Jong Chae Na, and Seok Moon Ryoo

Testing SQL Server Integration Services Runtime Engine Using Model

and Mock Objects ....................................................................................................................................................790

Kaarthik Sivashanmugam and Senthil Palanisamy

TAO Project: An Intuitive Application UI Test Toolset ...................................................................................796

Min Li, Jason Wang, and Lamar Damata

Model-Based Time and Cost Estimation in a Software Testing Environment ...............................................801

Bruce Benton

Detection and Verification of Semantic Interaction In AOSD .........................................................................807

Zaid Altahat and Tzilla Elrad

A Framework for Identifying Reusable Software Components Using Formal

Concept Analysis .....................................................................................................................................................813

Haitham S. Hamza

On the Discovery of Candidate Aspects in Software Requirements ...............................................................819

Haitham S. Hamza and Dina Darwish

A Modified Linear Scan Register Allocation Algorithm ...................................................................................825

S. Subha

A O(log n) Signature-Based String Matching Algorithm ..................................................................................828

Samer Nofal

HIGH PERFORMANCE COMPUTING ARCHITECTURES

A Object Model for Java and Its Architectural Support ....................................................................................831

Tan Yiyu, Yau Chihang, and Anthony S. Fong

Reconfigurable Processor LSI Based on ALU Array with Limitations

of Connections of ALUs for Software Radio ......................................................................................................837

Makoto Ozone, Tatsuo Hiramatsu, Katsunori Hirase, and Kazuhisa Iizuka

An Energy-Efficient Reliability Model for Parallel Disk Systems ..................................................................843

Fangyang Shen, Xiao Qin, Andres Salazar, Adam Manzanares, and Kiranmai Bellam

Parallel and Pipeline Processing for Block Cipher Algorithms on

a Network-on-Chip ..................................................................................................................................................849

Yoon Seok Yang, Jun Ho Bahn, Seung Eun Lee, and Nader Bagherzadeh

xivxiv

Page 12: 2009 Sixth International Conference on Information ...toc.proceedings.com/05531webtoc.pdf · 2009 Sixth International Conference on Information Technology: New Generations 27 - 29

Bus-Based and NoC Infrastructure Performance Emulation and Comparison ..............................................855

Ling Wang, Jianye Hao, and Feixuan Wang

A NoC Emulation/Verification Framework ........................................................................................................859

Peng Liu, Chunchang Xiang, Xiaohang Wang, Binjie Xia, Yangfan Liu, Weidong Wang,

and Qingdong Yao

Scheduling Techniques for Multi-Core Architectures .......................................................................................865

Akira Hatanaka and Nader Bagherzadeh

Fuse-N: Framework for Unified Simulation Environment

for Network-on-Chip ...............................................................................................................................................871

Ashwini Raina and Venkatesan Muthukumar

Traffic Aware Scheduling Algorithm for Network on Chip .............................................................................877

Ashwini Raina and Venkatesan Muthukumar

Design of a CC-MC-CDMA System for Gigabit DSL (GDSL) .......................................................................883

Jacques van Wyk and Louis Linde

An Algorithm for Buffer Cache Management ....................................................................................................889

S. Subha

E-COMMERCE

Model-Based Specification of Flexible and Complex Bidding Strategies

in Agent-Based Online Auctions ...........................................................................................................................894

Benjamin J. Ford, Haiping Xu, Christopher K. Bates, and Sol M. Shatz

Online Payments Using Handwritten Signature Verification ...........................................................................901

Jarrod Trevathan, Alan McCabe, and Wayne Read

Inference of Online Auction Shills Using Dempster-Shafer Theory ...............................................................908

Fei Dong, Sol M. Shatz, and Haiping Xu

A Proactive Approach to Preventing Phishing Attacks Using Pshark .............................................................915

Ripan Shah, Jarrod Trevathan, Wayne Read, and Hossein Ghodosi

A Software Tool for Collecting Data from Online Auctions ............................................................................922

Rodel Balingit, Jarrod Trevathan, Yong Jin Lee, and Wayne Read

Analysing Bidding Trends in Online Auctions ...................................................................................................928

Rodel Balingit, Jarrod Trevathan, and Wayne Read

The Behavior and Preferences of Users on Web 2.0 Social Network Sites: An

Empirical Study ........................................................................................................................................................934

Shwu-Min Horng

A Case Study: Open Source Community and the Commercial Enterprise .....................................................940

Kevin Gary, Harry Koehnemann, John Blakley, Cheryl Goar, Holly Mann, and Al Kagan

Research on Components and Measurement of Customer Value in Business

to Customer Market .................................................................................................................................................946

Wang Bao, Zhang Ming Li, and Jia Wei

xvxv

Page 13: 2009 Sixth International Conference on Information ...toc.proceedings.com/05531webtoc.pdf · 2009 Sixth International Conference on Information Technology: New Generations 27 - 29

COMPUTER INFORMATION TECHNOLOGY EDUCATION

A Flexible Notification System for Stocks Investors .........................................................................................952

Jameela Al-Jaroodi and Nader Mohamed

Exploring the Critical Success Factors of Mobile Commerce via Qualitative

Method- in Case of Insurance Industry ................................................................................................................958

Ya-Yueh Shih and Siao-Sian Huang

The Science of Computing: Concepts and Current Technologies ....................................................................963

Herbert Schanker, Deborah Sturm, and Sarah Zelikovitz

Teaching Object-Oriented Programming with Games .......................................................................................969

Lu Yan

Experiences Using New Technologies in a Computer Organization Course .................................................975

Prem Uppulur and Maung Htay

Learning Outcomes for an Introductory Database Project ................................................................................981

Jeff Pittges, Robert H. Phillips, and Premchand Uppuluri

Internet Information Retrieval for Enabling Student Projects ..........................................................................987

Nader Mohamed, Jameela Al-Jaroodi, and Imad Jawhar

A Model for National E-readiness Assessment Based on System Approach .................................................993

Elham Ziaei Pour, Alireza Taghizadeh, Farzad Bazazan, Farid Khoshalhan,

and Ayoub Mohammadian

Virtual Age: Enabling Technologies and Trends ................................................................................................999

Hamid Mahmoodi and Ali A. Jalali

MIDDLEWARE

Federated and Shared Use of Sensor Networks through Security Middleware ...........................................1005

Christophe Huygens and Wouter Joosen

Uniform and Efficient Data Provisioning for SOA-Based Information Systems ........................................1012

Ralf Wagner and Bernhard Mitschang

MINDS: A Middleware Infrastructure for Distributed Services Provisioning ............................................1018

Johnson Iyilade, Klaas Kabini, and Matthew Adigun

A Systematic Review of Software Product Lines Applied to Mobile

Middleware .............................................................................................................................................................1024

Yuri Morais Bezerra, Thaís Alves Burity Pereira, and Glêdson Elias da Silveira

TGKAM: Adaptive Middleware Architecture for Secure Group

Communication ......................................................................................................................................................1030

Rajesh Ingle and G. Sivakumar

Developing Service Oriented Sensor/Actuator Networks Using a Tailored

Middleware .............................................................................................................................................................1036

Stephan Sommer, Christian Buckl, and Alois Knoll

The Development of a Multi-Agent Based Middleware for RFID Asset

Management System Using the PASSI Methodology .....................................................................................1042

Libe Valentine Massawe, Farhad Aghdasi, and Johnson Kinyua

xvixvi

Page 14: 2009 Sixth International Conference on Information ...toc.proceedings.com/05531webtoc.pdf · 2009 Sixth International Conference on Information Technology: New Generations 27 - 29

Mobile Middleware Solution for Automatic Reconfiguration of Applications ...........................................1049

Alin Florindor Murarasu and Thomas Magedanz

DATA MINING

Classification of Movies and Television Shows Using Motion .....................................................................1056

Mark Smith, Ray Hashemi, and Leslie Sears

Design of Context Analysis System on USN Environment ............................................................................1061

Cheng Hao Jin, Yongmi Lee, Gyoyong Sohn, Hi-Seok Kim, and Keun Ho Ryu

M3L: Architecture for Multimedia Information Retrieval ..............................................................................1067

Umer Rashid, Iftikhar Azim Niaz, and Muhammad Afzal Bhatti

XML Based Implementation of a Bibliographic Database and Recursive

Queries .....................................................................................................................................................................1073

Kazem Taghva and Kirankumar Jayakumar

Towards an Integrated Platform for Improving Hospital Risk Management ...............................................1079

Jawed Siddiqi, Babak Akhgar, Fazilatur Rahman, Sally Atkinson, Alberto Savoldelli,

Stefano Arici, Paolo Bertele, Brian James, and Mike Pinkerton

Toward Extending AADL-OSATE Toolset with Color Petri Nets (CPNs) .................................................1085

Hassan Reza and Emanuel S. Grant

A Safety Analysis Method Using Fault Tree Analysis and Petri Nets ..........................................................1089

Hassan Reza, Malvika Pimple, Varun Krishna, and Jared Hildle

E-LEARNING

Extending the Pair Programming Pedagogy to Support Remote Collaborations

in CS Education .....................................................................................................................................................1095

Alan Clinton Shaw

The Knowledge Building of the Eco-Classroom ..............................................................................................1100

Xinyu Zhang, NianLong Luo, and Cheng Sun

The Case Study Activities in a Web-Based Environment ...............................................................................1104

Huang Lanying, Hu Zhongya, and Cheng Sun

Translating e-learning Flow-Oriented Activity Sequencing Descriptions

into Rule-Based Designs ......................................................................................................................................1108

Iván Martínez-Ortiz, José Luis Sierra, and Baltasar Fernández-Manjón

Distance-Learning and Converging Mobile Devices .......................................................................................1114

Kenneth E. Hoganson

Online Professional Development for K-12 Inservice Teachers from the Views

of Online Learning Forum (OLF) Designers .....................................................................................................1120

Li-chu Sung

Using Learners’ Annotations to Produce Feedbacks for Selecting and Editing

Learning Contents in e-Learning Systems .........................................................................................................1128

Ahmad A. Kardan and Fakhroddin Noorbehbahani

Towards a More Accurate Knowledge Level Estimation ................................................................................1134

Samad Kardan and Ahmad Kardan

xviixvii

Page 15: 2009 Sixth International Conference on Information ...toc.proceedings.com/05531webtoc.pdf · 2009 Sixth International Conference on Information Technology: New Generations 27 - 29

A Proposesd Ontology for Effective Searching of Sharable Content Objects

Emphasizing on Learning Objectives .................................................................................................................1140

Ahmad Kardan and Shima Zahmatkesh

MOBILITY & RESOURCE MANAGEMENT

Optimized Hybrid Resource Allocation in Wireless Cellular Networks

with and without Channel Reassignment ...........................................................................................................1146

Xin Wu, Arunita Jaekel, Ataul Bari, and Alioune Ngom

Multi-slot Channel Allocation for Priority Packet Transmission in the GPRS

Network ...................................................................................................................................................................1152

Jun Zheng, Mengyu Qiao, and Emma Regentova

Optimum Power Allocation for Distributed Antenna Systems with Large-scale

Fading-only Feedback ...........................................................................................................................................1158

Dongho Lim, Kwonhue Choi, and Huaping Liu

DMAP-FR: Integrated Mobility and Service Management with Failure

Recovery Support for Mobile IPv6 Systems .....................................................................................................1165

Weiping He and Ing-Ray Chen

A Lookahead Strategy for Movement-Based Location Update in Wireless

Cellular Networks ..................................................................................................................................................1171

Vicente Casares-Giner and Pablo Garcia-Escalle

Performance Analysis of MQAM-OFDM Based WLAN in Presence of Zigbee

Interference in AWGN and Rayleigh Fading Channel ....................................................................................1178

Minakshmi Roy and Jamadagni H.S.

Quality of Experience Measurements for Video Streaming over Wireless

Networks .................................................................................................................................................................1184

Kandaraj Piamrat, Cesar Viho, Jean-Marie Bonnin, and Adlen Ksentini

Analysis of VoIP over HSDPA Performance with Discontinuous Reception

Cycles ......................................................................................................................................................................1190

Kari Aho, Ilmari Repo, Timo Nihtilä, and Tapani Ristaniemi

On Idle Mode Mobility State Detection in Evolved UTRAN ........................................................................1195

Jani Puttonen, Niko Kolehmainen, Tero Henttonen, and Jorma Kaikkonen

AMBIENT-ASSISTED LIVING FOR ELDERLY PEOPLE

Promises and Challenges of Ambient Assisted Living Systems ....................................................................1201

Hong Sun, Vincenzo De Florio, Ning Gui, and Chris Blondia

e-Care – IHE-Compliant Exchange of Patient Data to Enable Home & Mobile

Nursing Care of Elderly People within an e-Care Affinity Domain ..............................................................1208

Barbara Franz, Markus Lehner, Herwig Mayr, and Margit Mayr

Modeling Situation-Aware Ambient Assisted Living Systems for Eldercare ..............................................1214

Werner Kurschl, Stefan Mitsch, and Johannes Schönböck

xviiixviii

Page 16: 2009 Sixth International Conference on Information ...toc.proceedings.com/05531webtoc.pdf · 2009 Sixth International Conference on Information Technology: New Generations 27 - 29

User-Centered Design and Fast Prototyping of an Ambient Assisted Living

System for Elderly People ....................................................................................................................................1220

Suzanne Kieffer, Jean-Yves Lionel Lawson, and Benoît Macq

Implementation of a Physical Activity Monitoring System for the Elderly

People with Built-in Vital Sign and Fall Detection ..........................................................................................1226

Anh Dinh, Daniel Teng, Li Chen, Yang Shi, Carl McCrosky, Jenny Basran,

and Vanina Del Bello-Hass

Ambient Information Systems for Supporting Ageing in Place .....................................................................1232

Juan P. García-Vázquez, Marcela D. Rodríguez, Angel G. Andrade, Diana Saldaña,

Fabian Mercado, and Emanuelle Ruelas

SIGNAL PROCESSING APPLICATIONS

Novel Blind Signal Classification Method Based on Data Compression .....................................................1238

Xudong Ma

Performance Comparison of Wiener Filter and CLS Filter on 2D Signals ..................................................1244

K. Raja Rajeswari, K. Murali Krishna, V. Jagan Naveen, and A. Vamsidhar

A Back End System for Digital Image Library Organization Based on Concept

Learning ..................................................................................................................................................................1250

Paraskevi S. Lampropoulou, Dionysios N. Sotiropoulos, Aristomenis S. Lampropoulos,

and George A. Tsihrintzis

Feature Combination Using Multiple Spectral Cues for Robust Speech

Recognition in Mobile Communications ...........................................................................................................1256

Djamel Addou, Sid-Ahmed Selouani, Malika Boudraa, and Bachir Boudraa

Detection of the Parameters of Hypernasality ...................................................................................................1262

Buket D. Barkana

The Acoustic Properties of Different Noise Sources .......................................................................................1265

Jidong Yang and Buket D. Barkana

Optimal Transmission Time of Secondary User in an Overlay Cognitive Radio

System .....................................................................................................................................................................1269

Babak Abbasi Bastami and Ebrahim Saberinia

NEW TRENDS IN IMAGE PROCESSING

Post-processing of Multiview Images: Depth Scaling .....................................................................................1275

Manbae Kim

Design of a Logarithmic Domain 2-D Convolver for Low Power Video

Processing Applications ........................................................................................................................................1280

Hau T. Ngo and Vijayan K. Asari

Side-Match Vector Quantizers Using Neural Network Based Variance

Predictor for Image Coding ..................................................................................................................................1286

Shuangteng Zhang

xixxix

Page 17: 2009 Sixth International Conference on Information ...toc.proceedings.com/05531webtoc.pdf · 2009 Sixth International Conference on Information Technology: New Generations 27 - 29

Carotid Artery Boundary Extraction Using Segmentation Techniques: A

Comparative Study ................................................................................................................................................1290

Zayanthi K.B. and Wahida Banu R.S.D.

Barcode Watermarking .........................................................................................................................................1296

Mohammad Eyadat, Hedley Morris, and Imad Muhi El-Ddin

Fuzzy Edge and Corner Detector for Color Images .........................................................................................1301

Hanmandlu Madasu, O.P. Verma, Pankaj Gangwar, and Shantaram Vasikarla

Medical Image Segmentation Using Improved Mountain Clustering Approach .........................................1307

Nishchal K. Verma, Payal Gupta, Pooja Agrawal, M. Hanmandlu,

Shantaram Vasikarla, and Yan Cui

Optimization of VC-1/H.264/AVS Video Decoders on Embedded Processors ..........................................1313

Guo-An Jian, Ting-Yu Huang, Jui-Chin Chu, and Jiun-In Guo

Compressing Images Using Fractal Characteristics by Estimating the Nearest

Neighbor ..................................................................................................................................................................1319

Mahdi Jampour, Maryam Ashourzadeh, Mahdi Yaghobi, and Issa Rashidfarokhi

WEB TECHNOLOGIES

A Study of Color Histogram Based Image Retrieval .......................................................................................1323

Rishav Chakravarti and Xiannong Meng

Improving Web Search Using Contextual Retrieval ........................................................................................1329

Dilip K. Limbu, Andrew M. Connor, Russel Pears, and Stephen G. MacDonell

Image Query Service Using Content Management Techniques .....................................................................1335

Dan Beatty and Noe Lopez-Benitez

Emotion and Motivation: Understanding User Behavior of Web 2.0

Application .............................................................................................................................................................1341

Chen-Ya Wang, Seng-cho T. Chou, and Hsia-Ching Chang

3D VQI: 3D Visual Query Interface ...................................................................................................................1347

Subhash Uppalapati, John C. Femiani, Anshuman Razdan, and Kevin Gary

Exploring Hierarchically Organized Georeferenced Multimedia Annotations

in the MobiTOP System .......................................................................................................................................1355

Thi Nhu Quynh Kim, Khasfariyati Razikin, Dion Hoe-Lian Goh, Yin Leng Theng,

Quang Minh Nguyen, Ee-Peng Lim, Aixin Sun, Chew Hung Chang, and Kalyani Chatterjea

Anatomy of a News Archive and Search Engine (Optimized for Persian Web) .........................................1361

Sayed Nasir Khalifehsoltani, Ali Vahdani, and Reza Moallemi

An Integrated Framework for Research on Cross-Cultural Information

Retrieval ..................................................................................................................................................................1367

Isak Taksa and Jaime Muro Flomenbaum

PCI: Plants Classification & Identification Classification of Web Pages

for Constructing Plants Web Directory ..............................................................................................................1373

Madjid Khalilian, Hassan Abolhassani, Ali Alijamaat, and Farsad Zamani Boroujeni

xxxx

Page 18: 2009 Sixth International Conference on Information ...toc.proceedings.com/05531webtoc.pdf · 2009 Sixth International Conference on Information Technology: New Generations 27 - 29

AGILE METHODS, TOOLS & BEST PRACTICES

Fixed Broadband Wireless Access for Wide Area Coverage and Last Mile

Solutions ..................................................................................................................................................................1378

Son Le-Ngoc and Bao Nguyen Le

Applying a Composite Process Framework (CPF) in Real Life Software

Development Project .............................................................................................................................................1384

Mohammed Al-Maharmeh and Bhuvan Unhelkar

DASIMA: A Flexible Management Middleware in Multi-Scale Contexts ..................................................1390

Mehdi Kessis, Claudia Roncancio, and Alexandre Lefebvre

Using GQM for Testing Design Patterns in Real-Time and Embedded Systems

on a Software Production Line ............................................................................................................................1397

Claudio Goncalves Bernardo, Denis Avila Montini, Danilo Douradinho Fernandes,

Daniela América da Silva, Luiz Alberto Vieira Dias, and Adilson Marques da Cunha

Learning from Experience: The Analysis of an Extreme Programming Process ........................................1405

Sara Shahzad

An Approach for SQL Injection Vulnerability Detection ...............................................................................1411

Mei Junjin

Using Agile Methods in Software Product Development: A Case Study .....................................................1415

Jayakanth Srinivasan and Kristina Lundqvist

DOMAIN AND PRODUCT LINE ENGINEERING

Design Patterns Reuse for Real Time Embedded Software Development ...................................................1421

Gabriel de Souza Pereira Moreira, Denis Ávila Montini, Daniela América da Silva,

Felipe Rafael Motta Cardoso, Luiz Alberto Vieira Dias, and Adilson Marques da Cunha

Final Inspection for Design Pattern Homologation Using a Real Time

Embedded Software in a Production Line .........................................................................................................1428

Gabriel de Souza Pereira Moreira, Denis Ávila Montini,

Danilo Douradinho Fernandes, Felipe Rafael Motta Cardoso,

Luiz Alberto Vieira Dias, and Adilson Marques da Cunha

Using GQM Hypothesis Restriction to Infer Bayesian Network Testing .....................................................1436

Denis Ávila Montini, Felipe Rafael Motta Cardoso, Francisco Supino Marcondes,

Paulo Marcelo Tasinaffo, Luiz Alberto Vieira Dias, and Adilson Marques da Cunha

The Mechanism and Performance Comparison of Two Wireless Sensor

Network Operating System Kernels ...................................................................................................................1442

Jialiang Wang, Hai Zhao, Peng Li, Zheng Liu, Jie Zhao, and Wei Gao

Systematic and Formal Approach to get a Domain Specific Language ........................................................1447

Francisco Supino Marcondes, Danilo Douradinho Fernandes, Denis Ávila Motini,

Paulo Marcelo Tasinaffo, Italo Santiago Vega, and Luiz Alberto Vieira Dias

A Desktop Environment for River Hazards Monitoring .................................................................................1451

João Augusto de Pessôa, Luiz Alberto Vieria Dias, and Adilson Marques da Cunha

xxixxi

Page 19: 2009 Sixth International Conference on Information ...toc.proceedings.com/05531webtoc.pdf · 2009 Sixth International Conference on Information Technology: New Generations 27 - 29

E-HEALTH, E-GOVERNMENT, E-SERVICES

Epileptic Seizures Detection Using Continuous Time Wavelet Based Artificial

Neural Networks ....................................................................................................................................................1456

Abibullaev Berdakh and Seo Hee Don

The Role of Enterprise Architecture in Healthcare-IT .....................................................................................1462

Kamran Ahsan, Hanifa Shah, and Paul Kingston

Prediction of Temperature Distribution and Volume of Lesion During HIFU

Therapy ....................................................................................................................................................................1468

Mohsen Heydari and Mehran Jahed

The State of Play in Jordanian E-government Services ...................................................................................1474

Mohammad Hjouj Btoush, Jawed Siddiqi, Ja’far Alqatawna, and Babak Akhgar

A Search Service for Software Components Based on a Semi-Structured Data

Representation Model ...........................................................................................................................................1479

Talles Brito Viana, Hugo Imperiano Nóbrega,

Thiago Vinícius Freire de Araújo Ribeiro, and Glêdson Elias da Silveira

The Research on the Environmental Assessment Automation System-C4ISRE

Based on C4ISR Theory .......................................................................................................................................1485

Ma Yunfeng, Hu Xiaomin, Huang Yonggang, Zhu Tong, and Fu Lingling

The Use of Health Smart Card in Bridging Discontinuity of Care for Pregnant

Woman ....................................................................................................................................................................1492

An-Jim Long and Polun Chang

Information and Communication Technology in Arab Countries: Problems

and Solutions ..........................................................................................................................................................1498

Samir N. Hamade

SOCIAL COMPUTING & TECHNOLOGY

Towards a Context Aware Mobile Community Application Platform ..........................................................1504

Christian Menkens

Multidimensional Visualization System for Travel Social Networks ...........................................................1510

Maria Chiara Caschera, Fernando Ferri, Patrizia Grifoni, and Tiziana Guzzo

A Mobile Application to Support Phatic Communication in the Hybrid Space ..........................................1517

Mark Bilandzic, Daniel Filonik, Michael Gross, Andreas Hackel, Herbert Mangesius,

and Helmut Krcmar

A Trend Analysis of the Question Answering Domain ...................................................................................1522

Mohan John Blooma, Alton Yeow Kuan Chua, Dion Hoe-Lian Goh, and Lee Chu Keong

An Optimization Model for IO Jitter in Device-Level RTOS ........................................................................1528

Zheng Liu, Hai Zhao, Peng Li, and Jialiang Wang

Trust Computing for Social Networking ............................................................................................................1534

Yanjun Zuo, Wen-chen Hu, and Timothy O’Keefe

xxiixxii

Page 20: 2009 Sixth International Conference on Information ...toc.proceedings.com/05531webtoc.pdf · 2009 Sixth International Conference on Information Technology: New Generations 27 - 29

Giving Every Child a Sense of Belonging: Improving Birth Registration

in Developing Countries .......................................................................................................................................1540

Johannes Gambo and Savae Latu

Querying Semistructured Data with Compression in Distributed Environments ........................................1546

B.M. Monjurul Alom, Frans Henskens, and Michael Hannaford

Effects of Social Approval Votes on Search Performance ..............................................................................1554

Gabriella Kazai and Natasa Milic-Frayling

Planning and Realization of Collaborative Assembly ......................................................................................1560

Hao Yongping, Wang Jingyu, Zeng Pengfei, and Shao Weiping

POSTERS

An Oscillator Based on LDMOS Capacitor ......................................................................................................1565

Huang Wei-hai, Dai Yu-jie, Zhang Xiao-xing, and Lü Ying-jie

Application of COMERO Data Collecting in Quality Management System ...............................................1567

Yue Yan-fang, Zhang Rui-gang, Yang Guang, and Ge Guang-le

Using Pi-Calculus to Formalize Grid Workflow Parallel Computing Patterns ............................................1568

Li Zhan-jun, Huang Yong-zhong, and Guo Shao-zhong

A Methodology for Mobile Network Security Risk Management .................................................................1572

Mahdi Seify and Shahriar Bijani

Security Analysis of One Quantum Digital Signature Scheme ......................................................................1574

Zhengjun Cao and Olivier Markowitch

An Evolution of Hindi Text Steganography ......................................................................................................1577

Kalavathi Alla and R. Siva Rama Prasad

Network Security Scheme for Wireless Sensor Networks using Efficient

CSMA MAC Layer Protocol ...............................................................................................................................1579

Piyush Kumar Shukla, Sanjay Silakari, and Sarita Singh Bhadoriya

Implementation Comparison of Kerberos Passwords by RC-5 Encryption

Type Analysis with RC-4 Encryption ...............................................................................................................1581

Piyush K. Shukla, G.S. Mishra, Prashant G. Girdhar, Pradeep Rusia, and Vivek Kapoor

An Ethical Way of Encrypt Data Transfer in Bluetooth Mobile Using Chaos

Based Feedback Technique ..................................................................................................................................1583

Piyush Kumar Shukla, Kamlesh Gupta, Sanjay Silakari, and A.S. Saxena

Research of Direct Spread Spectrum Communication System for Formation

Micro-satellites .......................................................................................................................................................1585

Guoqiang Wu, Sun Zhaowei, and Shunan Wu

Performance Comparison of BPSK in Rayleigh and AWGN Channel

by Monte Carlo Simulation Method ...................................................................................................................1588

Sahil Chaudhary, Vijit Gupta, and Vivek Kumar Dwivedi

The Research of the Component-Based Software Engineering ......................................................................1590

Xinyu Zhang, Li Zheng, and Cheng Sun

xxiiixxiii

Page 21: 2009 Sixth International Conference on Information ...toc.proceedings.com/05531webtoc.pdf · 2009 Sixth International Conference on Information Technology: New Generations 27 - 29

Project Management Practitioner Empowerment Program: A Case Study ..................................................1592

Rose Neena Tom

Using Domain-Specific Languages to Describe the Development Viewpoint

of Software Architectures .....................................................................................................................................1595

Amir Reza Yazdanshenas and Ramtin Khosravi

WERCCS: A Client-side Workflow Enactment Service Using AJAX .........................................................1597

Mahin Jeyachandran and Kevin Gary

Is Continuous Compliance Assurance Possible? ..............................................................................................1599

Joseph M. D’Alessandro, Cynthia D. Tanner, Bonnie W. Morris, and Tim Menzies

VL-MAC: Virtual Link Based Multi-channel MAC Scheme in WSN .........................................................1600

Luo Juan, Luo Hai-Bo, and Li Ren-Fa

Hierarchical Intelligent Agent Based Wireless Body Sensor Mesh Networks ............................................1602

Suresh Sankaranarayanan

A Reliable Multi-hop Hierarchical Routing Protocol in Wireless Sensor

Network (WSN) .....................................................................................................................................................1604

Mohammad Al-Fares, Zhili Sun, and Haitham Cruickshank

An Implementation of Central Optical Sensor Measurement/Observation

System (COSMOS) with the Integrated FBG Sensor Control Device ..........................................................1606

Hyun-Kuk Kim, Won-Hyuk Yang, Hyun-Bum Choi, and Young-Chon Kim

A Reinforced Authentication Protocol for Anti-Counterfeiting and Privacy

Protection ................................................................................................................................................................1610

Kang-Joong Seo, Jun-Cheol Jeon, and Kee-Young Yoo

A Thermal-aware Shortest Hop Routing Algorithm for in vivo Biomedical

Sensor Networks ....................................................................................................................................................1612

Fereidoun Ahourai, Mahmoud Tabandeh, Mehran Jahed, and Saber Moradi

Tutoring Tool for Formulating Database Queries with Complex Quantifiers .............................................1614

Jalal Kawash

Insider Threat in Database Systems: Preventing Malicious Users’ Activities

in Databases ............................................................................................................................................................1616

Manideep Chagarlamudi, Brajendra Panda, and Yi Hu

Using Service Oriented Architecture in a Generic Virtual Power Plant .......................................................1621

Peter Bach Andersen, Bjarne Poulsen, Chresten Træholt, and Jacob Østergaard

The Web-Based B2B Environment with Web Services ..................................................................................1623

Xinyu Zhang, Wei Tang, and Cheng Sun

A Web Service System with Workflow Modeling and Scheduling ...............................................................1625

Xinyu Zhang and Nian Long Luo

Data Access and Semantic Integration Based on OGSA-DQP ......................................................................1627

Wenzheng Li and Xiaoxia Hu

A Methodology to Extract Emotions and add Expressions in Speech Synthesis ........................................1631

M.B. Chandak and Rajiv Dharaskar

xxivxxiv

Page 22: 2009 Sixth International Conference on Information ...toc.proceedings.com/05531webtoc.pdf · 2009 Sixth International Conference on Information Technology: New Generations 27 - 29

Learning Theories in Computer Science Education .........................................................................................1634

Jesús Ubaldo Quevedo-Torrero

Problem on Software Engineering Learning: Domain Engineering ..............................................................1636

Francisco Supino Marcondes, Hamilton José Brumatto, Eloiza Helena Sonoda,

Luiz Carlos Barboza, and Jefferson Zannuto

Extending the Technology Acceptance Model for Internet Banking: A Case

Study of Iran ...........................................................................................................................................................1637

Alireza Talebpour, Sona Bairamzadeh, and Seyed Sabah Vajdi

A Proposal Framework for Investigating Website Success in the Context

of E-banking: An Analytic Network Process (ANP) Approach .....................................................................1639

Mona Salehi, Abbas Keramati, and Sina Elli

Variable Block Size Architecture for Programs ................................................................................................1640

S. Subha

Modeling Real-Time Multi-Core Embedded System Using UML ................................................................1642

Jareer Abdel-Qader and Roger Walker

Quantum Cryptography: A New Generation of Information Technology

Security System ......................................................................................................................................................1644

Mehrdad S. Sharbaf

Development of Collapse-Sensing Phone for Emergency Positioning System ...........................................1649

Duksung Jang, Seungchan Choi, and Taesoon Park

A Pervasive System for Enabling Older Adults to Cope with Depression

by Motivating them to Socialize ..........................................................................................................................1653

Alejandro Aguirre, Marcela D. Rodriguez, and Angel G. Andrade

Unconstrained Arabic Handwritten Word Feature Extraction: A Comparative

Study ........................................................................................................................................................................1655

Jawad H. AlKhateeb, Jinchang Ren, Jianmin Jiang, and Stan S. Ipson

Outlier Detection in Spatial Databases Using Clustering Data Mining ........................................................1657

Amitava Karmaker and Syed Rahman

Extending the Technology Acceptance Model for E-learning: A Case Study

of Iran ......................................................................................................................................................................1659

Akram Hadizadeh Moghadam and Sona Bairamzadeh

Exchange Routing Information between New Neighbor Nodes to Improve

AODV Performance ..............................................................................................................................................1661

Le Anh Tuan and Yuan Luo

A New Data Communication Protocol for Distributed Mobile Databases

in Mobile Ad Hoc Networks ................................................................................................................................1663

Afsaneh Rahbar, Mehran Mohsenzadeh, and Amir Masoud Rahmani

A Hybrid Reconfiguration Algorithm for Fast Continuous Query Processing ............................................1668

Christopher Kosecki and Joseph Gomes

Modeling of Military Networks Using Group Mobility Models ....................................................................1670

Alicia Nicki Washington and Rotimi Iziduh

xxvxxv

Page 23: 2009 Sixth International Conference on Information ...toc.proceedings.com/05531webtoc.pdf · 2009 Sixth International Conference on Information Technology: New Generations 27 - 29

Providing “Second Chance” to Students and Improving Retention ...............................................................1672

Syed M. Rahman and Amitava Karmaker

Software Testing for Web-Applications Non-Functional Requirements ......................................................1674

Breno Lisi Romano, Gláucia Braga e Silva, Henrique Fernandes de Campos,

Ricardo Godoi Vieira, Adilson Marques da Cunha, Fábio Fagundes Silveira,

and Alexandre Carlos Brandão Ramos

On the Secure Sharing of Legacy Data ..............................................................................................................1676

Douglas Russell, David Power, Mark Slaymaker, Ghita Kouadri Mostefaoui,

Xiaoqi Ma, and Andrew Simpson

Modeling the Interaction with MoLIC ...............................................................................................................1680

Claudia Mena, Cristian Rusu, and Silvana Roncagliolo

Using Best Practices of Software Engineering into a Real Time System

Development ...........................................................................................................................................................1681

Ricardo Godoi Vieira, Breno Lisi Romano, Gláucia Braga e Silva,

Henrique Fernandes de Campos, and Adilson Marques da Cunha

Applying Domain-Specific Modeling to Mobile Health Monitoring

Applications ............................................................................................................................................................1682

Florence Balagtas-Fernandez and Heinrich Hussmann

Agile Principles in Academic Education: A Case Study .................................................................................1684

Bernd Bruegge, Maximilian Reiss, and Jennifer Schiller

Weaving Agile Software Development Techniques into a Traditional

Computer Science Curriculum ............................................................................................................................1687

Peter Maher

Using a Tool to Generate a Web-Services Adapter ..........................................................................................1689

Cheng Sun, Xiaohua Wu, and Xinyu Zhang

Collaborative Web Search with WikiLinks .......................................................................................................1691

Chris Lüer and Jonathan Cummins

Evaluating Web 2.0 Services Based on 7C Framework ..................................................................................1693

Milad Sabouri and Ali A. Jalali

Improving the Security of Non-PKI Methods for Public Key Distribution ..................................................1695

Chun-Ta Li and Min-Shiang Hwang

Model Updating of Laboratorial Long-Span Cable-Stayed Bridge ...............................................................1697

Ou Yang and Jinping Ou

Study on the Parameter Vibration of the Large-Span Cable-Stayed Bridges ...............................................1701

Li Feng-chen, Tian Shi-zhu, Li Yan-jun, and Wang Jin

An Algorithm for Secure Deletion in Flash Memories ....................................................................................1705

S. Subha

Modeling of Object Oriented OLAP ..................................................................................................................1707

Madhu Bhan, D.E. Geetha, T.V. Suresh Kumar, and K. Rajanikanth

Reality of a New Control Sampling Module .....................................................................................................1709

Wensong Hu, Min Zhu, and Zhuo Fang

xxvixxvi

Page 24: 2009 Sixth International Conference on Information ...toc.proceedings.com/05531webtoc.pdf · 2009 Sixth International Conference on Information Technology: New Generations 27 - 29

Decidability and Constructivism .........................................................................................................................1711

Jesús Ubaldo Quevedo-Torrero

An Exclusive Cache Model ..................................................................................................................................1715

S. Subha

Author Index

xxviixxvii