|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
ICSEA 2006 & ICSNC 2006 PROGRAM Sunday, October 29
Monday, October 30
Tuesday, October 31
Wednesday, November 1
Thursday, November 2
Friday, November 3
DETAILED PROGRAM The current program is based on your original submissions, not the camera ready versions. Any changes to the title or authors is reflected on the CD and the IEEE Xplore Digital Library. If any change is needed on the posted program, please send an email request to cosmin@iaria.org
ICSEA1 Software Development I A Two-Year Software Engineering M.Sc. Degree designed under the Bologna Declaration Principles Metamodel Matching Specification Model for Avoiding Miss-detection of Feature Interactions A Toolkit for Design and Performance Analysis of Real-Time Component-Based Software Systems Increasing Software Engineering Efficiency Through Defect Tracking Integration ICSEA2 Software Development II Avoidance of Feature Interactions at Run-time Extracting Simulation Models from Complex Embedded Real-Time Systems Enforcing Interaction Properties in AOSD-Enabled Systems Enterprise Resource Planning Diffusion: Measuring the Impact of Network Exposure and Power Extending UML 2.0 for Enterprise Information System Engineering UbiNet: A Generic and Ubiquitous Service Provider Framework ICSEA 3 Software development/testing I An Empirical Study of Software Changes in Statoil ASA - Origin, Priority Level and Relation to Component Size Applicability of IEEE 1219 within Corrective Maintenance A Graph-search Based Approach to BPEL4WS Test Generation On the Assessment of the Mean Failure Frequency of Software in Late Testing ICSEA 4 Software development/testing II Using Model-Checkers for Mutation-Based Test-Case Generation, Coverage Analysis and Specification Analysis A Partition-based Approach for XPath Testing Evaluating behavior correctness of synchronous systems through time to service distribution analysis: tools required Estimating Software Quality with Datamining and Design Laws ICSEA 5 Software development/testing III Specification Based Regression Testing Using Explicit State Space Enumeration Assessing Impacts of Changes to Business Rules through Data Exploration DuoTracker: Tool Support for Software Defect Data Collection and Analysis A Combined Approach for Reachability Analysis ICSEA6 Advanced Software Mechanisms I A Model of Front-End Pre-Change Corrective Testing Towards an Identification Framework for Software Drifts: A Case Study SWS-ASE: Leveraging Web Service-based Software Engineering Programmable Ad hoc Networks A Framework for Reengineering Software Development Methods ICSEA7 Advanced Software Mechanisms II A Conceptual Framework for Business Process Engineering: A Case Study Efficient energy saving in Wireless Sensor Networks through hierarchical-based clustering Application of Computational Redundancy in Dangling Pointers Detection Testing a Network by Inferring Representative State Machines from Network Traces Application Driven Software Development ICSEA8 Advanced Software Mechanisms III An Approach to Domain Ontology-Based Software Component Retrieval Automatic generation of functional programs from CASL specifications Towards Rules and Laws for Software Factories and Evolvability: A Case-Driven Approach Defining Agile Software Quality Assurance Checking Data Integrity via the UML Class Diagram ICSEA9 Advanced Software Mechanisms IV Generating Proof Obligation to Verify Object-Z Specification Software Confederations - An Architecture for Agile Development in the Large Defining the Architectural Design of Frameworks through a Group of Subframeworks Created from Frozen and Hot Spots Modeling Multi-View Software Process with Object Petri Net Using RDL to Facilitate Customization of Variability Points ICSEA10 Advanced Software Mechanisms V Data Based Application Partitioning and Workload Balance in Distributed Environment Component-based Development Process and Component Lifecycle On Describing, Analyzing, and Executing Complex Behavior of Services in Service Oriented Computing A model of open source software style R&D on business Performance Model Interchange Format: Semantic Validation ICSEA11 Advanced Software Mechanisms VI An Architectural Modeling Approach with Symmetric Alignment of Multiple Concern Spaces Using Styles to Improve the Architectural Views Design Specification of Software Component Requirements Using the Trace Function Method Design and Implementation of Chronological Web Server for Web-based Applications ICSEA12 Open Source Evaluation Framework for Open Source Software Maintenance Exploring the Maintenance Process through the Defect Management in the Open Source Projects - Four Case Studies RaSOSS - Remote analysis System for Open Source Software Developing an Open Source Integrated Development Environment for a Mobile Device ICSEA13 Software performance The method, the tools and rationales for assessing dynamic memory efficiency in embedded real-time systems in practice Efficient Evaluation of CSAN Models by State Space Analysis Methods Modeling and Evaluation of Software Systems with Object Stochastic Activity Networks Performance of MPI parallel applications ICSEA14 Software Security Java Object Behavior Modeling and Visualization Analysing Countermeasures Against Privacy-Invasive Software SOA-aware Authorization Control A Class of Traceability Codes with an Efficient Tracing Algorithm A Remote IDS based on Multi-agent Systems, Web Services and MDA Template-Based Development of Fault-tolerant Embedded Software High Speed and Reliable Anti-Spam Filter ICSEA15 Special Applications New Scheme of Implementing Real-time Linux Architecture of a universal relation data source for web applications with advanced access control and simplified migration A Platform for the Development of Spoken Dialog Systems Reflection: Improving research through knowledge transfer Adaptive Manufacturing: A real-time simulation-based control system ICSNC1 Mobility and Ad Hoc Energy Aware Topology Management in Ad Hoc Wireless Networks Hybrid Agents for Power-Aware Intrusion Detection in Highly Mobile Ad Hoc Networks An Enhanced Gnutella for Ad-Hoc Networks A New EAAODV Routing Protocol based on Mobile Agent The Case of Multi-hop Peer-to-Peer Implementation of Mobile Social Applications Mobile agent communication scheme: an evolving canvas ICSNC2 High Speed Building High-Performance, Reconfigurable Bandwidth Controllers with Adaptive Clustering Defending against Distributed Denial of Service (DDoS) Attacks with Queue Traffic Differentiation over Micro-MPLS-based Wireless Networks A Neuro-ForecastWater-Filling Scheme of Server Scheduling A Two-Phase Distributed Reconfiguration Algorithm for Node Failures in IP-Over-WDM Networks Grooming of Multicast Sessions in Sparse Splitting WDM Mesh Networks using Virtual Source Based Trees Cost Benefit Study of Sparse-Partial Wavelength Conversion Architectures ICSNC3 Multimedia A new approach of data hiding within speech based on Hash and Hilbert Transform Active Service Quality Management in ASEMA system End-to-End Differentiation of Congestion and Wireless Losses using a Fuzzy Arithmetic based on Relative Entropy On the Applicability of Remote Rendering of Networked Virtual Environments on Mobile Devices Euler Hadamard/DFT/DCT Polynomial for Wireless Signal Processing ICSNS4 Security I ASASI: An Environment for Addressing Software Application Security Issues Towards Requirement and Modeling Driven Security Evaluation Privacy-Invasive Software and Preventive Mechanisms A Novel Voice Secrecy Communication System ICSNC5 Security II Verification of Strict Integrity Policy via Petri Nets Security Architecture for Web-based Health Insurance Systems Confessible Threshold Ring Signatures Kleptographic Weaknessess in Benaloh-Tuinstra Protocol Usage Control Requirements in Mobile and Ubiquitous Computing Applications ICSNC6 Sensors I Neural Wireless Sensor Networks A Locally Group Key Management with Revocation and Self-healing Capability for Sensor Network Application Development in Vision-Enabled Wireless Sensor Networks Topological Hole Detection in Sensor Networks with Cooperative Neighbors Probabilistic-Based Energy Aware Routing for Network Lifetime and Source Level Fairness in Wireless Sensor Networks ICSNC7 Education + Policies E-Services for an Electronic Education Market Components for a pervasive information dissemination architecture Remote Screen Recording and Playback Jazz Sebastian Bach: A GA System for Music Style Modification Forecasting Unstable Policy Enforcement Beyond the Hype: Policies for Military Network Operations A Multi-Layer Ubiquitous Middleware for Bijective Adaptation between Context and Activity in a Mobile and Collaborative learning ICSNC8 Sensors II Security Issues in Wireless Sensor Networks MAC address assignment in wireless sensor networks: a mixed strategy game approach Maintaining Coverage by Progressive Crystal-Lattice Permutation in Mobile Wireless Sensor Networks Distributed Event Detection in Sensor Networks Tracing and Managing Hazardous Material in Sensor Networks ICSNC9 Wireless I A Novel Blind SNR Estimator Based on the Modified PASTd Algorithm for IF Signals Accelerating VOD Streaming with Adaptive Proxy-Assisted Scheduling, Caching and Patching Localization with Power Control in Wireless Sensor Networks Wireless Broadband Internet Access in Korea Application Programming Interface offering classification services to end-user applications ICSNC10 Wireless II A Flexible Weight Based Clustering for Ad hoc Networks A New Communication Architecture Based on the Spatial Information Field Model XHTML encoding and compression A Multivariate Adaptive Method for Detecting ARP Anomaly in Local Area Networks A Novel Bargaining Based Dynamic Spectrum Management Scheme in Reconfigurable Systems ICSNC11 Wireless III Performance Analysis of a Time-Threshold Based Bandwidth Allocation Scheme for Data Calls in Cellular Networks TCP Based Resource Allocation Method for Base Station Diversity System Experimental Performance Evaluation of Mobile IPv6 Handovers over Wireless LAN Performance Evaluation of Dual Authentication Scheme in Mobile IPv6 Networks A ROD based Fuzzy packet loss differentiating algorithm for TCP in the hybrid wired/wireless network ICSNC12 Wireless IV Dynamic Cell Coverage Control for Power Saving in IEEE802.16 Mobile Multihop Relay Systems Performance Analysis and Evaluation of Bluetooth Networks in Wireless Channel Environment Middleware : An Effort Towards Making Mobile Applications Platform Independent An Energy-Efficient Redundant Node Tree Mechanism for Wireless Sensor Networks ICNSC13 Wireless V A Novel Way of Determining the Optimal Location of a Fragment in a DDBS: BGBR Error correcting codes from modified butson-hadamard matrix Ternary codes from modified hadamard matrices Codes from Generalized Hadamard Matrices ICSNC14 Wireless VI A Real-Time Study of 802.11b and 802.11g System capacity in OFDMA-based IEEE802.16 GPSenseCar -A Collision Avoidance Support System Using Real-Time GPS Data in a Mobile Vehicular Network Application Programming Interface offering classification services to end-user applications Trust and Mobility-Based Clustering Algorithm for Secure Mobile Ad hoc Networks |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Copyright (c) 2006, IARIA