![]()  
     | 
   ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
 
 ICSEA 2006 & ICSNC 2006 PROGRAM Sunday, October 29 
 Monday, October 30 
 Tuesday, October 31 
 Wednesday, November 1 
 Thursday, November 2 
 Friday, November 3 
 DETAILED PROGRAM The current program is based on your original submissions, not the camera ready versions. Any changes to the title or authors is reflected on the CD and the IEEE Xplore Digital Library. If any change is needed on the posted program, please send an email request to cosmin@iaria.org 
 ICSEA1 Software Development  I  A Two-Year Software  Engineering M.Sc. Degree designed under the Bologna Declaration Principles  Metamodel Matching  Specification Model  for Avoiding Miss-detection of Feature Interactions  A Toolkit for Design  and Performance Analysis of Real-Time Component-Based Software Systems  Increasing Software  Engineering Efficiency Through Defect Tracking Integration ICSEA2 Software Development  II  Avoidance of Feature  Interactions at Run-time  Extracting Simulation  Models from Complex Embedded Real-Time Systems  Enforcing Interaction  Properties in AOSD-Enabled Systems  Enterprise Resource Planning Diffusion: Measuring  the Impact of Network Exposure and Power  Extending UML 2.0 for  Enterprise  Information System Engineering UbiNet: A Generic and  Ubiquitous Service Provider Framework ICSEA 3 Software  development/testing I  An Empirical Study of  Software Changes in Statoil ASA - Origin, Priority Level and Relation to  Component Size  Applicability  of IEEE 1219 within Corrective Maintenance  A Graph-search Based  Approach to BPEL4WS Test Generation  On  the Assessment of the Mean Failure Frequency of Software in Late Testing ICSEA 4 Software  development/testing II  Using Model-Checkers  for Mutation-Based Test-Case Generation, Coverage Analysis and Specification  Analysis  A Partition-based  Approach for XPath Testing Evaluating behavior  correctness of synchronous systems through time to service distribution  analysis: tools required  Estimating Software  Quality with Datamining and Design Laws ICSEA 5 Software  development/testing III  Specification Based  Regression Testing Using Explicit State Space Enumeration  Assessing Impacts of  Changes to Business Rules through Data Exploration  DuoTracker: Tool  Support for Software Defect Data Collection and Analysis  A Combined Approach  for Reachability Analysis ICSEA6 Advanced  Software Mechanisms I  A Model of Front-End  Pre-Change Corrective Testing  Towards an  Identification Framework for Software Drifts: A Case Study  SWS-ASE: Leveraging  Web Service-based Software Engineering  Programmable Ad hoc  Networks  A Framework for  Reengineering Software Development Methods ICSEA7 Advanced  Software Mechanisms II  A Conceptual  Framework for Business Process Engineering: A Case Study  Efficient energy  saving in Wireless Sensor Networks through hierarchical-based clustering  Application of  Computational Redundancy in Dangling Pointers Detection  Testing a Network by  Inferring Representative State Machines from Network Traces  Application Driven  Software Development ICSEA8 Advanced  Software Mechanisms III  An Approach to Domain  Ontology-Based Software Component Retrieval  Automatic generation of  functional programs from CASL specifications  Towards Rules and  Laws for Software Factories and Evolvability: A Case-Driven Approach  Defining Agile  Software Quality Assurance  Checking Data  Integrity via the UML Class Diagram ICSEA9 Advanced  Software Mechanisms IV  Generating Proof  Obligation to Verify Object-Z Specification  Software  Confederations - An Architecture for Agile Development in the Large  Defining the  Architectural Design of Frameworks through a Group of Subframeworks Created  from Frozen and Hot Spots  Modeling Multi-View  Software Process with Object Petri Net  Using RDL to  Facilitate Customization of Variability Points ICSEA10 Advanced  Software Mechanisms V  Data Based Application  Partitioning and Workload Balance in Distributed Environment  Component-based  Development Process and Component Lifecycle  On Describing,  Analyzing, and Executing Complex Behavior of Services in Service Oriented  Computing  A model of open  source software style R&D on business  Performance Model  Interchange Format: Semantic Validation ICSEA11 Advanced  Software Mechanisms VI  An Architectural  Modeling Approach with Symmetric Alignment of Multiple Concern Spaces  Using Styles to  Improve the Architectural Views Design  Specification of  Software Component Requirements Using the Trace Function Method  Design and  Implementation of Chronological Web Server for Web-based Applications ICSEA12 Open Source  Evaluation Framework  for Open Source Software Maintenance  Exploring the  Maintenance Process through the Defect Management in the Open Source Projects -  Four Case Studies  RaSOSS - Remote  analysis System for Open Source Software  Developing an Open  Source Integrated Development Environment for a Mobile  Device ICSEA13 Software  performance  The method, the tools  and rationales for assessing dynamic memory efficiency in embedded real-time  systems in practice  Efficient Evaluation  of CSAN Models by State Space Analysis Methods  Modeling and  Evaluation of Software Systems with Object Stochastic Activity Networks  Performance of MPI  parallel applications ICSEA14 Software  Security  Java Object Behavior  Modeling and Visualization  Analysing  Countermeasures Against Privacy-Invasive Software  SOA-aware Authorization  Control  A Class of  Traceability Codes with an Efficient Tracing Algorithm  A  Remote IDS based on Multi-agent Systems, Web Services and MDA  Template-Based  Development of Fault-tolerant Embedded Software High Speed and Reliable Anti-Spam Filter ICSEA15 Special  Applications   New Scheme of  Implementing Real-time Linux  Architecture of a  universal relation data source for web applications with advanced access  control and simplified migration  A Platform for the  Development of Spoken Dialog Systems  Reflection: Improving  research through knowledge transfer  Adaptive  Manufacturing: A real-time simulation-based control system ICSNC1 Mobility and Ad  Hoc  Energy Aware Topology  Management in Ad Hoc Wireless Networks  Hybrid Agents for  Power-Aware Intrusion Detection in Highly Mobile  Ad Hoc Networks  An Enhanced Gnutella  for Ad-Hoc Networks  A New EAAODV Routing  Protocol based on Mobile Agent  The Case of Multi-hop  Peer-to-Peer Implementation of Mobile Social  Applications  Mobile agent  communication scheme: an evolving canvas ICSNC2 High Speed  Building High-Performance,  Reconfigurable Bandwidth Controllers with Adaptive Clustering  Defending against  Distributed Denial of Service (DDoS) Attacks with Queue Traffic Differentiation  over Micro-MPLS-based Wireless Networks  A  Neuro-ForecastWater-Filling Scheme of Server Scheduling  A Two-Phase  Distributed Reconfiguration Algorithm for Node Failures in IP-Over-WDM Networks  Grooming of Multicast  Sessions in Sparse Splitting WDM Mesh Networks using Virtual Source Based Trees  Cost Benefit Study of  Sparse-Partial Wavelength Conversion Architectures ICSNC3 Multimedia  A new approach of  data hiding within speech based on Hash and Hilbert Transform  Active Service  Quality Management in ASEMA system  End-to-End  Differentiation of Congestion and Wireless Losses using a Fuzzy Arithmetic  based on Relative Entropy  On the Applicability  of Remote Rendering of Networked Virtual Environments on Mobile  Devices  Euler  Hadamard/DFT/DCT Polynomial for Wireless Signal Processing ICSNS4 Security I  ASASI: An Environment  for Addressing Software Application Security Issues  Towards Requirement  and Modeling Driven Security Evaluation  Privacy-Invasive  Software and Preventive Mechanisms  A Novel Voice Secrecy  Communication System ICSNC5 Security II   Verification of  Strict Integrity Policy via Petri Nets  Security Architecture  for Web-based Health Insurance Systems  Confessible Threshold  Ring Signatures  Kleptographic  Weaknessess in Benaloh-Tuinstra Protocol  Usage Control  Requirements in Mobile and Ubiquitous Computing Applications ICSNC6 Sensors I  Neural Wireless  Sensor Networks  A Locally Group Key  Management with Revocation and Self-healing Capability for Sensor Network  Application  Development in Vision-Enabled Wireless Sensor Networks  Topological Hole  Detection in Sensor Networks with Cooperative Neighbors  Probabilistic-Based  Energy Aware Routing for Network Lifetime and Source Level Fairness in Wireless  Sensor Networks ICSNC7  Education + Policies   E-Services for an  Electronic Education Market  Components for a  pervasive information dissemination architecture  Remote Screen  Recording and Playback  Jazz  Sebastian Bach: A GA System for Music Style Modification Forecasting Unstable Policy Enforcement  Beyond the Hype:  Policies for Military Network Operations  A Multi-Layer  Ubiquitous Middleware for Bijective Adaptation between Context and Activity in  a Mobile and  Collaborative learning ICSNC8 Sensors II  Security Issues in  Wireless Sensor Networks  MAC address  assignment in wireless sensor networks: a mixed strategy game approach  Maintaining Coverage  by Progressive Crystal-Lattice Permutation in Mobile  Wireless Sensor Networks  Distributed Event  Detection in Sensor Networks  Tracing and Managing  Hazardous Material in Sensor Networks ICSNC9 Wireless I  A Novel Blind SNR  Estimator Based on the Modified PASTd Algorithm for IF Signals  Accelerating VOD  Streaming with Adaptive Proxy-Assisted Scheduling, Caching and Patching  Localization with  Power Control in Wireless Sensor Networks  Wireless Broadband  Internet Access in Korea  Application  Programming Interface offering classification services to end-user applications ICSNC10 Wireless II  A Flexible Weight  Based Clustering for Ad hoc Networks  A New Communication  Architecture Based on the Spatial Information Field Model  XHTML encoding and  compression  A Multivariate  Adaptive Method for Detecting ARP Anomaly in Local Area Networks  A Novel Bargaining  Based Dynamic Spectrum Management Scheme in Reconfigurable Systems ICSNC11 Wireless III  Performance Analysis  of a Time-Threshold Based Bandwidth Allocation Scheme for Data Calls in  Cellular Networks  TCP Based Resource  Allocation Method for Base Station Diversity System  Experimental  Performance Evaluation of Mobile IPv6  Handovers over Wireless LAN  Performance  Evaluation of Dual Authentication Scheme in Mobile  IPv6 Networks  A ROD based Fuzzy  packet loss differentiating algorithm for TCP in the hybrid wired/wireless  network ICSNC12 Wireless IV  Dynamic Cell Coverage  Control for Power Saving in IEEE802.16 Mobile  Multihop Relay Systems  Performance Analysis  and Evaluation of Bluetooth Networks in Wireless Channel Environment  Middleware : An  Effort Towards Making Mobile Applications  Platform Independent  An Energy-Efficient  Redundant Node Tree Mechanism for Wireless Sensor Networks ICNSC13 Wireless V  A Novel Way  of Determining the Optimal Location of a Fragment in a DDBS: BGBR  Error correcting  codes from modified butson-hadamard matrix  Ternary codes from  modified hadamard matrices  Codes from  Generalized Hadamard Matrices ICSNC14 Wireless VI A Real-Time Study of  802.11b and 802.11g  System capacity in  OFDMA-based IEEE802.16  GPSenseCar -A  Collision Avoidance Support System Using Real-Time GPS Data in a Mobile Vehicular Network  Application  Programming Interface offering classification services to end-user applications Trust and Mobility-Based Clustering Algorithm for Secure Mobile Ad hoc   Networks  | 
   ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Copyright (c) 2006, IARIA