+ All Categories
Home > Documents > on Technology: Generations (ITNG 2012) · AutomatedSecurityAnalysisofDynamicWebApplications...

on Technology: Generations (ITNG 2012) · AutomatedSecurityAnalysisofDynamicWebApplications...

Date post: 18-Apr-2020
Category:
Upload: others
View: 2 times
Download: 0 times
Share this document with a friend
15
2012 Ninth International Conference on Information Technology: New Generations \ (ITNG 2012) Las Vegas, Nevada, USA 16-18 April 2012 4 IEEE IEEE Catalog Number: CFP1232A-PRT ISBN: 978-1-4673-0798-7
Transcript
Page 1: on Technology: Generations (ITNG 2012) · AutomatedSecurityAnalysisofDynamicWebApplications throughSymbolic CodeExecution 189 GiovanniAgosta,AhssandroBarenghi,AntonioParata, andGerardoPelosi

2012 Ninth International

Conference on Information

Technology: New Generations

\

(ITNG 2012)

Las Vegas, Nevada, USA

16-18 April 2012

4 IEEE IEEE Catalog Number: CFP1232A-PRT

ISBN: 978-1-4673-0798-7

Page 2: on Technology: Generations (ITNG 2012) · AutomatedSecurityAnalysisofDynamicWebApplications throughSymbolic CodeExecution 189 GiovanniAgosta,AhssandroBarenghi,AntonioParata, andGerardoPelosi

2012 Ninth International Conference on Information

Technology - New Generations

ITNG 2012

Table of Contents

Message from the General Chair xix

Conference Organizers xx

Reviewers xxi

Session: AI Applications

A Multi-Layer Approach for Failure Detection in a Manufacturing SystemBased on Automation Agents 1

WilfriedLepuschitz, Vaclav Jirkovsky, Petr Kadera, and Pavel Vrba

A Novel Violent Videos Classification Scheme Based on the Bag of Audio

Words Features 7

LeiLi

Session: Image and Audio Processing Applications

Region of Interest Localization of Cardiac Structure from Cine MRI Images 14

Marwa M.A. Hadhoud, Mohamed I. Eladawy, and Ahmed Farag

A Context Space Model for Detecting Anomalous Behaviour in Video

Surveillance 18

Arnold Wiliem, Vamsi Madasu, Wageeh Boles, and Prasad Yarlagadda

Image Recovery by Recursive Spline Smoothing and Application

to Recognition of Compound Structures 25

Alexandre Grebennikov

Wavelet Based Region Duplication Forgery Detection 30

Yang Wang, Kaitlyn Giirule, Jacqueline Wise, and Jim Zheng

Rank Level Integration of Face Based Biometrics 36

Amioy Kumar, Madasu Hanmandlu, and Shantaram Vasikarla

Probability-based Imputation Method for Fuzzy Cluster Analysis of Gene

Expression Microarray Data 42

Thanh Le, Tom Altman, andKatheleen J. Gardiner

v

Page 3: on Technology: Generations (ITNG 2012) · AutomatedSecurityAnalysisofDynamicWebApplications throughSymbolic CodeExecution 189 GiovanniAgosta,AhssandroBarenghi,AntonioParata, andGerardoPelosi

Session: Networking and Wireless Communications

Castalia Network Animator (CNA): A Visualization Tool for Castalia Wireless

Sensor Network Simulator 48

Adib Rastegarnia and Vahid Solonk

An Efficient Geo-aware Peer-to-Peer Resource Discovery and Sharing Scheme

in Vehicular Ad-hoc Networks 54

Yu-HongLee, Chyi-Ren Dow, Lii-Hni Huang, Ya-Chen Lin, Shiow-Fen Hwang,and Wei-Bin Lee

A UnicastMANET Routing Protocol to Simultaneously Minimize

the Stability-Hop Count Tradeoff and End-to-End Delay 60

Natarajan Meghanathan

MASID: Multi-Agent System for Intrusion Detection in MANET 65

Leila Mechtri, Fatiha Djemili Tolba, and Salim Ghanemi

Determining Coverage Area Using Voronoi Diagram Based on Local

Information for Wireless Mesh Networks 71

Go Hasegawa, Shoichi Takemori, Yoshiaki Taniguchi, andHirotaka Nakano

Spectrum Detection in Cognitive Networks by Minimizing Hidden Terminal

Problem 77

Yenumirfa B. Reddy

Finding Time and Buffer Preserving Routes in Gaussian Intermittent Networks 83

Omar Y. Tahboub and JavedI. Khan

An Open-Source Sandbox for Increasing the Accessibility of Functional

Programming to the Bioinformatics and Scientific Communities 89

Matthew Fenwick, Colbert Sesanker, Martin R, Schiller, Heidi JCEllis,

M. Lee Hinman, Jay Vyas, and MichaelR. Gryk

Planarization of Geographic Cluster-based Overlay Graphs in Realistic

Wireless Networks 95

Emi Mathews

Towards Transparent Anonymity for User-controlled Servers SupportingCollaborative Scenarios 102

Mohamed Bourimi, Marcel Henpel, Benedikt Westermann, Dogan Kesdogan,Marc Planagwna, Rafael Gimenez, Fatih Karatas, andPhilipp Schwarte

Recognising the Activities of Low Entropy Mobile People Using Wireless

Proximity Data 109

MuhammadAwais Azam, Jonathan Loo, Aboubaker Lasebae,

Sardar KashifAshrafKhan, and Waleed Ejaz

vi

Page 4: on Technology: Generations (ITNG 2012) · AutomatedSecurityAnalysisofDynamicWebApplications throughSymbolic CodeExecution 189 GiovanniAgosta,AhssandroBarenghi,AntonioParata, andGerardoPelosi

A Large Scale Evolutionary Analysis of the Internet Autonomous System

Network 115

Craig Stewart and Javed I. Khan

Session: Information Systems and Internet Technology

An Efficient Approach for Finding Near Duplicate Web Pages Using

Minimum Weight Overlapping Method 121

Shine N. Das, Midhun Mathew, andPramodK. Vijayaraghavan

Novel Cloud Service for Improving World Universities Ranking 127

Shu-Ming Hsieh, Suu-An Lo, Chiun-Chieh Hsu, and Wei-Chao Lin

Tree-based Search Algorithm for Web Service Composition in SaaS 132

Ching-Seh Wu andIbrahim Khoury

Aspect Algebra: The Operational Semantics for Aspect Oriented Software 139

Anirban Sarkar and Narayan C. Debnath

Semantic Web: A Topic Specific Search 145

Kishan Dharavath and Sri Khetwat Saritha

MEBPCM: A Method for Evaluating Business Process Conceptual Models. A

Study Case 149

Narayan Debnath, Carlos Salgado, Mario Peralta, Mario Beron, Daniel Riesco,

and German Montejano

A Mobile Data Analysis Framework for Environmental Health Decision

Support 155

Wan D. Bae, Shayma Alkobaisi, Sada Narayanappa, and Cheng C. Liu

A Design ofMutual Exclusion Protocol in Cellular Wireless Networks 162

Sung-Hoon Park and Seoun-Hyung Lee

Using Two-tier Bitwise Interest Oriented QRP Data Structure for High

Clustering through Interest Similarity in SWB P2P Systems 168

Tong-Ming Lim, YongLiang Choong, andAngela Lee Siew Hoong

The Use of Knowledge Management Systems to Support Knowledge Creation

and Sharing Activities among Employees -A Survey Based Study of IT

Shared Services Company 175

Angela Lee Siew Hoong and Tong-Ming Lim

A Constraint-Driven Business Object Model for Service-Based Business

Processes 182

Farhana H. Zulkernine, Piergiorgio Bertoli, Marco Pistore, Andreas Friesen,

Jens Lemcke, Bernhard Thimmel, and Otfried Von Geisau

vii

Page 5: on Technology: Generations (ITNG 2012) · AutomatedSecurityAnalysisofDynamicWebApplications throughSymbolic CodeExecution 189 GiovanniAgosta,AhssandroBarenghi,AntonioParata, andGerardoPelosi

Automated Security Analysis ofDynamic Web Applications

through Symbolic Code Execution 189

Giovanni Agosta, Ahssandro Barenghi, Antonio Parata, and Gerardo Pelosi

New Hashing-Based Multiple String Pattern Matching Algorithms 195

Chouvalit Khancome and Veera Boonjing

Searching for the Optimal Proof Schedule in a Proof-Carrying Survivability

Paradigm - A Dynamic, Interactive Approach 201

Yanjun Zuo and John Babin

Session: Energy-Efficient Systems

An Empirical Study on the Impact of an Idle Limit in Distributed Systems 209

Karl Smith, Jeffrey Galloway, and Susan Vrbsky

HyBuM: Hybrid Energy Efficient Architecture for Mobile Storage Systems 214

Mais Nijim, YoungLee, andKiranmai Bellam

Piezoelectric Converter for Wind Energy Harvesting 221

Taufik Taufik, Jameson Thornton, and Dale Dolan

Harmonics and Dynamic Response of a Virtual Air Gap Variable Reactor 225

Dale S.L. Dolan, P. W. Lehn, and Taufik Taufik

An Empirical Study of Power Aware Load Balancing in Local Cloud

Architectures 232

Jeffrey Galloway, Karl Smith, andJeffrey Carver

Session: Software Testing

API Backward Compatibility Testing Using VSTS 237

James Gagnon, Corey Weathers, Marty Wiedmeyer, Phani Koppineedi,

Raghavender Anegouni, Steve Schon, andXinBai

Using Test Cases to Size Systems: A Case Study 242

Adam Schwartz

Using Reverse-Engineered Test-Based Models to Generate More Tests: Where

is the Sense in That? 247

Teemu Kanstren, Eric Piel, andHans-Gerhard Gross

A Hybrid System for Analyzing Very Large Graphs 253

James D. McCaffrey

Software Testing with Budget Constraints 258

Soumen Maity

A Comparative Evaluation of Unit Testing Techniques on a Mobile Platform 263

Selin Benli, Anthony Habash, Andy Herrmann, Tyler Loftis, and Devon Simmonds

viii

Page 6: on Technology: Generations (ITNG 2012) · AutomatedSecurityAnalysisofDynamicWebApplications throughSymbolic CodeExecution 189 GiovanniAgosta,AhssandroBarenghi,AntonioParata, andGerardoPelosi

Applying Test-First and Parallel Processing Techniques to ERP Data

Conversion 269

Talukdar S. Asgar, Mohammed Akour, and Tariq M. King

Session: Software Engineering

The Application of the Component-based Product Line in the Data ProcessingDomain 275

Xinyu Zhang and Rui Wang

Generator Flow: An XML Configurable Design Pattern Used in NoGAP 281

Per Karlstrom and Wenbiao Zhou

Protecting Intellectual Property by Certified Component Quality Descriptions 287

Henning Groenda

Loan System in Brazilian Financial Institution - A SOA Application 293

Claudio Gongalves Bernardo

System Development for Violence Mapping in a Social Network in Real Time 299

Claudio Goncalves Bernardo, William Bragagnollo Montini, Fernanda Naomi Yamato,

Gerson Pereira Domingues, and Felipe D 'Oliveira

An MDA-Based Approach for WS Composition Using UML Scenarios 306

Ayoub Sabraoui, Abdeslam Ennouaaiy, Ismail Khriss, and Mohammed El Kontbi

Challenges Faced While Simultaneously Implementing CMMI and Scrum: A

Case Study in the Tax Preparation Software Industry 314

James R. Miller andHisham M. Haddad

Incorporation of Aspects of Systems Security and Software Security in Senior

Capstone Projects 319

Natarajan Meghanathan, Hyunju Kim, and Loretta A. Moore

Developing a Smart Grids System as a PBL with Agile Method on Computer

Engineering Courses 325

Caio Henrique Coutinho, Johnny Cardoso Marques,

Sarasuaty Megume Hayashi Yelisetty, Samoel Mirachi,

Alexandre Lima Possebon Ribeiro, Marcelo Amaral da Silva,

Adilson Marques da Cunha, andLuiz Alberto Vieira Dias

Developing Rapidly Expandable Data-driven Software Systems Based

on Multitier Architecture: Examination of the Development of Modules

for Content Management Systems Used to Construct Web Portals and Virtual

Communities 331

Jumie Yuventi and Jose Cortes

ix

Page 7: on Technology: Generations (ITNG 2012) · AutomatedSecurityAnalysisofDynamicWebApplications throughSymbolic CodeExecution 189 GiovanniAgosta,AhssandroBarenghi,AntonioParata, andGerardoPelosi

Strategic Analysis Towards Deriving Competitive Advantage with the Use

ofFOSS: The Case of a South African University 335

Kehinde Dehinbo, Pieter Pretorins, and Johnson Dehinbo

Facilitating Agile Software Development with Lean Architecture in the DCI

Paradigm 343

Tomohiro Hayata, Jianchao Han, and Mohsen Beheshti

A Tool for Teaching Risk 349

Santosh Rajendran, Kevin Gary, and Harry Koehnemann

Session: Information Security and Privacy

Perceived Privacy 355

Sabah Al-Fedaghi

Data Outsourcing in Cloud Environments: A Privacy Preserving Approach 361

TJ.V.R.K.M.K. Sayi, R.K.N. SaiKrishna, R. Mukkamala, andP.K. Bamah

Connect with Your Friends and Share Private Information Safely 367

Arijit Ukil

Location Privacy for Vehicle-to-Grid Interaction through Battery Management 373

Mark Stegelmann and Dogan Kesdogan

CIDS: A Framework for Intrusion Detection in Cloud Systems 379

Hisham A. Kholidy and Fabrizio Baiardi

Security Analysis Concerning the Random Numbers of Threshold Ring

Signatures 386

Kaibin Huang and Raylin Tso

Data Hiding Techniques in Steganography Using Fibonacci and Catalan

Numbers 392

Nikolaos Aroukatos, Kostas Manes, Stelios Zimeras, andFotis Georgiakodis

CIDD: A Cloud Intrusion Detection Dataset for Cloud Computingand Masquerade Attacks 397

Hisham A. Kholidy andFabrizio Baiardi

When the Software Goes Beyond its Requirements - A Software Security

Perspective 403

Jing-Chioa Lion

Design and Implementation of an Open Network and Host-Based Intrusion

Detection Testbed with an Emphasis on Accuracy and Repeatability 409

Robert F. Erbacher and Michael J. Shevenell

Distributed Sensor Objects for Intrusion Detection Systems 417

Robert F. Erbacher and Steve Hutchinson

x

Page 8: on Technology: Generations (ITNG 2012) · AutomatedSecurityAnalysisofDynamicWebApplications throughSymbolic CodeExecution 189 GiovanniAgosta,AhssandroBarenghi,AntonioParata, andGerardoPelosi

A Reversible Secret Sharing Scheme Based on GF(2A8) 425

Dong-Hyun Kim, Gil-Je Lee, Min-Ho Park, and Kee-Yoimg Yoo

Session: Model-based Software Development

Using Model-Based Development as Software Low-Level Requirements

to Achieve Airborne Software Certification 431

Johnny Cardoso Marques, Sarasuaty Megume Hayashi Yelisetty,

Luiz Alberto Vieira Bias, and Adilson Marques da Cunha

Modeling Security Aspects in Distributed Real-Time Component-BasedEmbedded Systems 437

Mehrdad Saadatmand and Thomas Leveque

A Computational Teaching Approach through the Use of a Narrative

Technique and a Comic Strip 445

Mario Masayuki Takeda, Francisco Supino Marcondes, Italo Santiago Vega,

Elizabete B.M, Gara, and Luciano Gaspar

A Formal Control Model for Risks Management within Software Projects 452

Felipe Rafael Motta Cardoso, Paulo Marcelo Tasinaffo, Denis Avila Montini,

Danilo Douradinho Fernandes, Adilson Marques da Cunha, and Luiz Alberto Vieira Dias

Multilevel Graph Partitioning Scheme to Solve Traveling Salesman Problem 458

AtifAli Khan, Muhammad Umair Khan, andMuneeb Iqbal

Implementation of a Wavelength Division Multiplexing and Bidirectional

Optic Fiber Link iLab 464

Doreen Orishaba, RaymondBesiga, Arthur T.A., Sandy S.T. Togboa, Paul I. Musasizi,

and Cosmas Mwikirize

Session: Circuits & Systems

Behavior Modeling of Programmable Metallization Cell Using Verilog-A 466

Darshan Anandappa Dimplu andFei Wang

A Novel SAR Fast-Locking Digital PLL: SPICE Modeling and Simulations 472

Mahmoud Fawzy Wagdy and Robin Sur

Design and Simulation of Multiple-Input Single-Output DC-DC Converter 478

Taufik Taufik, Taffy Wong, Owen Jong, and Dale Dolan

xi

Page 9: on Technology: Generations (ITNG 2012) · AutomatedSecurityAnalysisofDynamicWebApplications throughSymbolic CodeExecution 189 GiovanniAgosta,AhssandroBarenghi,AntonioParata, andGerardoPelosi

Session: High Performance Computing Architectures

Design of a FPGA-based Timing Sharing Architecture for Sound Rendering

Applications484

Tan Yiyu, Yasushi Inoguchi, Yukinori Sato, Makoto Otani, Yukio Iwaya,

Hiroshi Matsiwka, and Takao Tsuchiya

A High Performance Agent-Based System for Reporting Suspected Adverse

Drug Reactions 490

Yanqing Ji, Fangyang Shen, and John Tran

Performance-Sensitivity-based Workload Tailoring for Effective Design

Exploration 496

Jie Luo, Yilin Zhang, Saarvaani Vadlamani, and Byeong Kil Lee

iBATD: ANew Routing Metric for Multi-radio Wireless Mesh Networks 502

Bing Qi, Fangyang Shen, and SyedRaza

A Performance Based QoS Aware Resource Brokering Framework for

the Grid 508

B. Asvija, K. Kalaiselvan, M. Ateet, R. Sridharan, andS.R. Krishnamurthy

A Hardware-Software Integrated Design for a High-Performance Java

Processor 516

Anthony S. Fong, C.H. Yau, and Yijim Liu

An IT-based System to Facilitate Architectural Design 522

Kamyar Ardekani andAmirreza Ardekani

Virtual Machine and Bytecode for Optimization on Heterogeneous Systems 528

Kerry A. SeitzJr. andMark C. Lewis

Loopback Virtual Channel Router Architecture for Network on Chip 534

Jaya Suseela and Venkatesan Muthukiimar

Session: Data Mining

Simulating Online Consumer Satisfaction Using Fuzzy Cognitive Mapping 540

Fahimeh Tabatabayi, BabakAkhgar, S.M.R. Nasserzadeh, and Simeon Yates

XML Querying Using Data Logic Structures and Primitives 548

Jesus Ubaldo Quevedo-Torrero and Geno Erickson

Watermarking XML Structures Using Multi-valued Dependencies 554

Jesus Ubaldo Quevedo-Torrero and Geno Erickson

Predicting Future Climate Using Algae Sedimentation 560

Jasdeep Natt, Ray Hashemi, Azita Bahrami, Mahmood Bahar, Nicholas Tyler,

and Jay Hodgson

xii

Page 10: on Technology: Generations (ITNG 2012) · AutomatedSecurityAnalysisofDynamicWebApplications throughSymbolic CodeExecution 189 GiovanniAgosta,AhssandroBarenghi,AntonioParata, andGerardoPelosi

A Secure Software Architecture for Mobile Computing 566

Hassan Reza andNarayana Mazumder

Context-Based Testing of COTs Using Petri Nets 572

Hassan Reza and Liang Cheng

Brain Imaging for Diagnosis of Schizophrenia: Challenges, Successes and

a Research Road Map 578

Jack O. Shelton andHamid R. Arabnia

Successful Forecasting for Knowledge Discovery by Statistical Methods 584

Yas Alsitltanny

The Building of a Large Government Digital Library 589

Kazem Taghva

Session: Computer Information Technology Education

Student Perceptions of Learning Management Systems in a University

Environment: Yahoo Groups vs Blackboard 594

Samir N. Hamade

A Comprehensive Undergraduate Application Security Project 600

Prem Uppuhiri andJeffPittges

Useful Compiler Directives for Teaching Programming 608

John T. Minor andLaxmi P. Gewali

The Design and Implementation of an Antivirus Software Advising System 612

Eugene Chamorro, Jianchao Han, and Mohsen Beheshti

Session: Data Hiding

Data Hiding Method Based on Dyadic Wavelet Transformation Improving

Invisibility of Secret Images on Circulation Images by Means of Run-Length

Coding with Permutation Matrix Based on Random Number 618

Kohei Arai

A Non-blind Digital Image Watermarking Method Based on the Dual-tree

Complex Discrete Wavelet Transform and Interval Arithmetic 623

Teruya Minamoto and Ryuji Ohura

A New Variable-Band Filter Design Method for the Discrete Wavelet

Transform 629

Zhong Zhang, Hiroshi Toda, Takashi Imamura, and Tetsuo Miyake

Efficient Securing of Iris Image Template by Using Grayscale Level

Incremented/Decremented Method 635

Maqsood Mahmud, Mohammad Waqar, Abdulrahman Abdulkarim Mirza,

andAbdul Hanan Bin Abdullah

xiii

Page 11: on Technology: Generations (ITNG 2012) · AutomatedSecurityAnalysisofDynamicWebApplications throughSymbolic CodeExecution 189 GiovanniAgosta,AhssandroBarenghi,AntonioParata, andGerardoPelosi

Visualization of Digital Audio Watermarking Based on the Dyadic Wavelet

Transform 640

Teruya Minamoto, Yitji Ogata, and Masahiro Sawai

Session: Human-Computer Interaction

Human Body Parts Tracking Using Torso Tracking: Applications to Activity

Recognition 646

Aras Dargazany andMircea Nicolescu

Who-Works-With-Whom (WWWW): Web-based Directed Work Relationship

Network for Maximizing Organizational Efficiency in Enterprises 652

Xinyit Zhang, Xiangyu Zhang, andLn Ynhao

Gait Recognition Method Based on Wavelet Transformation and its Evaluation

with Chinese Academy of Sciences (CASIA) Gait Database as a Human Gait

Recognition Dataset 656

Kohei Aral and Rosa Andrie

Usability Heuristics for Touchscreen-based Mobile Devices 662

Rodolfo Inostroza, Cristian Rush, Silvana Roncagliolo, Cristhy Jimenez,

and Virginica Rush

Extraction of Local Features for Tri-Phone Based Bangla ASR 668

MohammedRokibid Alam Kotwal, Tasneem Halim, Md. Mehedi Hassan Almaji,

Imtiaz Hossain, andMohammad Nurul Hilda

An Active Cinema Experience: A Study on User Expectation and Perceived

Gratifications of a Real-time Animated Film System 674

Yun-Ke Chang, Mark Chavez, MiguelA, Morales-Arroyo, and Jaime Jimenez

Wireless Sensors Network in the Efficient Management of Greenhouse Crops 680

Alejandro Jimenez, Santiago Jimenez, Pablo Lozada, and Cristhy Jimenez

Development of Dynamic Vocalization Customer Service Software

for Multiple Languages for Telephone Environment 686

S, Kami Makki and Charles Williams

Defining Virtual Worlds Usability Heuristics 690

Roberto Muhoz and Virginia Chalegre

Developing a Touchscreen-based Domotic Tool for Users with Motor

Disabilities 696

Juan Pablo Cofre, Gabriel Moraga, Cristian Rush, Ivan Mercado, Rodolfo Inostroza,

and Cristhy Jimenez

xiv

Page 12: on Technology: Generations (ITNG 2012) · AutomatedSecurityAnalysisofDynamicWebApplications throughSymbolic CodeExecution 189 GiovanniAgosta,AhssandroBarenghi,AntonioParata, andGerardoPelosi

Session: Social Computing

Health Intelligence Model for Evaluation of Social Media Outcomes 702

Joseph M. Woodside

User-centric Trust-based Recommendation 707

Simon Meyffret, Lionel Medini, and Frederique Laforest

Do Videowikis on the Web Support Better (Constructivist) Learning in

the Basics of Information Systems Science? 714

Pekka Makkonen

A Survey and Typology of Human Computation Games 720

Ei Pa Pa Pe-Than, Dion Hoe-Lian Goh, and Chei Sian Lee

Sharing in Social News Websites: Examining the Influence of News Attributes

and News Sharers 726

Long Ma, Chei Sian Lee, and Dion Hoe-Lian Goh

Performance Evaluation of a Countering Method to Social BookmarkingPollution Based on Degree of Bookmark Similarity 732

Hiroyuki Hisamatsu and Takahiro Hatanaka

Scalable Link Prediction in Social Networks Based on Local GraphCharacteristics 738

Alexis Papadimitriou, Panagiotis Symeonidis, and Yannis Manoloponlos

Cultural Impact on e-service Use in Saudi Arabia: Results from Focus Groups 744

MajidAldraehim, Sylvia L. Edwards, and Jason Watson

Development and Implementation of a Chat Bot in a Social Network 751

Salto Martinez Rodrigo and Jacques Garcia Fausto Abraham

An Empirical Study on Forecasting Using Decomposed Arrival Data of

an Enterprise Computing System 756

Linh Bao Ngo, Amy Apon, and Doug Hoffman

Session: Potpourri

An Investigation Into Feature Selection for Oncological Survival Prediction 764

Dmitry Stninkin, Brian Mac Namee, and John D, Kelleher

Quantum Blind Computation with Teleportation-based Computation 769

Nai-Hui Chia, Chia-Himg Chien, Wei-Ho Chung, and Sy-Yen Kno

Semantic Information Modeling for Emerging Applications in Smart Grid 775

Qanzhi Zhou, Sreedhar Natarajan, Yogesh Simmhan, and Viktor Prasanna

An Architecture for Mining and Visualization of U.S. Higher Educational Data 783

Linh Ngo, Vijay Dantuhiri, Michael Stealey, Stan Ahalt, andAmy Apon

xv

Page 13: on Technology: Generations (ITNG 2012) · AutomatedSecurityAnalysisofDynamicWebApplications throughSymbolic CodeExecution 189 GiovanniAgosta,AhssandroBarenghi,AntonioParata, andGerardoPelosi

Business Escalation Management: A Case Study - Resolution of a Business

Relationship Deterrent 790

K.S. Pradeep Kumar andRose Neena Tom

Fostering the User Interface Acceptance in Customer Relationship

Management: A Multimedia-aided Approach 796

Mutlaq B. Alotaibi and Dimitrios I. Rigas

Selection of Suitable Evaluation Function Based on Win/Draw Parameter

in Othello 802

Basit Shahzad, Lolowah R. Alssum, and YousefAl-Ohali

Session: Posters

Network Management System for Quantum Key Distribution 807

Piya Techateerawat

A Scheduling Algorithm for Downloading Data from RSU Using Multicast

Technique 809

Sana Sahebgharani and MohammadShahverdy

Software Security: The Dangerous Afterthought 815

Curtis StewardJr., LuayA. Wahsheh, Aftab Ahmad, Jonathan M. Graham,

Cheryl V. Hinds, Aurelia T. Williams, and Sandra J. DeLoatch

Exploring Model-Based Design 819

Devon Simmonds, Mark Lanter, Lyle Scott HI, Ashley Young, Selin Benli,

andAndy Herrmann

Speeding Up Big-Numbers Squaring 821

Shay Gueron and Vlad Krasnov

Speeding Up SHA-1, SHA-256 and SHA-512 on the 2nd Generation Intel®

Core Processors 824

Shay Gueron

Retargetable Netlists Generation and Structural Synthesis Based on a Meta

Hardware Description Language: Melasy+ 827

Sho Nishida andKatsumi Wasaki

Knowledge Services and Knowledge Building in E-learning 831

Xinyu Zhang, Lu Yuhao, and Zhaohui Liang

The Exploration of the E-Learning Standard Test System 833

Xinyu Zhang, Qian Wang, and Yiqian Lu

Rule-based Management of Large Unorganized Data Sets 835

Daniel D. Beatty andNoe Lopez-Benitez

xvi

Page 14: on Technology: Generations (ITNG 2012) · AutomatedSecurityAnalysisofDynamicWebApplications throughSymbolic CodeExecution 189 GiovanniAgosta,AhssandroBarenghi,AntonioParata, andGerardoPelosi

Acoustic Signature Based Intelligent Health Monitoring ofAir Compressorswith Selected Features 839

NishchalK. Verma, Tarun Maini, andAl Salour

An Activity Pattern Based Wireless Intrusion Detection System 846

NurAl Hasan Haldar, MuhammadAbulaish, and Syed Asim Pasha

An Exploratory Study of the Users' Behavior on Social Network Sites 848

Shwu-Min Horng

Using Chatbots to Teach Socially Intelligent Computing Principlesin Introductory Computer Science Courses 850

Alan Shaw

Can You See Me Now? Design SEO-friendly Classroom Blogs for Reaching

Valuable Public 852

Xuesong (Sonya) Zhang

Evaluating Students Online Discussion Performance by Using Social Network

Analysis 854

Peng He

Social Engine Web Store: Create Your Web Store and Publish It on Your

Social Network 856

Thiago Catoto Dias, Andre Luiz de Soma Fatala, andArnaldo de Moraes Pereira

Using Social Networks to Improve the Performance of a Service Desk 860

Joel Mana Gongalves andRejane Pereira da Silva Gonqalves

Proposed Model for Social and Collaborative Social Network ofPositive

Reinforcement: Positive Reinforcement Online Social Network: PRSN 861

Habib M. Fardoun, Daniyal M. Algazzawi, Sebastian R. Lopez,

and Jose Antonio Gallud Lazarro

How Can Social Networks Help Us Measure Trust Online? 865

Wei-Lun Chang and Arleen N. Diaz

Automatic Coverage Evaluation for a Medical Expert System 867

AhmadEyadat andIzzat Alsmadi

Annotating Resources in Sequence Diagrams for Testing Web Security 873

WeifengXu, Lin Deng, and Qing Zheng

Serious Video Games: Games for Education and Health 875

Vasudevan Janarthanan

Innovations in Art and Production: Sound, Modeling and Animation 879

Vasudevan Janarthanan

Link Encryption to Counteract with Rouge Social Network Crawlers 883

Sri Khetwat Saritha andKishan Dharavath

xvii

Page 15: on Technology: Generations (ITNG 2012) · AutomatedSecurityAnalysisofDynamicWebApplications throughSymbolic CodeExecution 189 GiovanniAgosta,AhssandroBarenghi,AntonioParata, andGerardoPelosi

A Survey of Requirement Engineering Interactions in Telecommunication

Systems 885

AhmadB. Alnafoosi

Excessive Use of the Internet and Gender: The Case for University Students

in Jordan 886

YousefAhmedEyadat

ROI Detection Using Spatial Kernel Based Filter for Steam Generator Tube

Inspection in Eddy Current Nondestructive Evaluation 892

Jaejoon Kim and Lalita Udpa

Relationship between State Machine and Dynamic Behavior: Coherence

among Events and Messages 893

Jose Gongalves Batista da Luz and Michele Puretachi de Barros

Community Environmental Monitoring Mode Based on Wireless Sensor

Network 894

Chimming Li, Shuanning Zheng, Xiaodan Sit, QingLi, and Quanyi Qiu

Utilization of Urban Form Information for Extracting Commuting Travel

Carbon Emission on Urban Road Network 895

Quanyi Qiu, Yang Zhao, Lei Chen, and Yuan Quan

Packet Reversed Packet Combining Scheme: A Thorough Analysis 896

Chandan T. Bhunia andAbhinandan Bhunia

Biological Cells as Storage Devices 897

Ralph M. DeFrangesco

Author Index 899

xviii


Recommended