|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Sunday, May 13
Monday, May 14
Tuesday, May 15
Wednesday, May 16
Thursday, May 17
Friday, May 18
DETAILED PROGRAM AICT 2007 AICT 1 A Comparison of Three Programming Models for Telecom Service Composition Optimizing Bandwidth Allocation of Different Traffic Classes for
Traffic between an ISP and a Future Home Area Network On Anomalies in Annotation Systems Analysis of BGP Convergence Using SHLPN Model Analytical Modeling of the Influence of Connection Handoff on UMTS Traffic Characteristics AICT 2 / TELET Modeling of Systems with Overflow Multi-Rate Traffic Practical Security Testing of Telecommunications Software—A Case Study BPTraSha: A Novel Algorithm for Shaping Bursty Nature of Internet Traffic Stochastic Bounds for Loss Rates AICT 3 An Accurate Pulse-Level Timing Acquisition Scheme for UWB Signals The Google Muni WiFi Network—Can it Compete with Cellular Voice? Novel Two-Stage Synchronization for UWB System Implementation and Performance Evaluation of an Energy Constraint Routing Protocol for Mobile Ad Hoc Networks AICT 4 A New Optimization Approach for Energy Consumption within Wireless Sensor Networks Metaheuristics for Wireless Network Optimisation Network Complexity: Cross-Layer Models and Characteristics Advance Detection Techniques for beyond 3G Wireless AICT 5 Ontologies to support Call Control Policies Efficient Wavelet Packet Modulation for Wireless Communication Agent-Based Location Aware Services in Wireless Mobile Networks Periodical Mark Forcing Schemes for Hunting-Free Framer Design for Digital Transmission and Multiplexing AICT 6 Design and Implementation of a Monitoring System Based on IPFIX Protocol False-Path Reduction in Downlink WCDMA Channel Estimation by Threshold Algorithm Design and Performance of LDPC Codes for OFDM Based Aeronautical Communication Systems Use of Hilbert Transform Data encoding for spread spectrum communications AICT 7 / ELETE Model Driven LMS Platform Integration Federated Knowledge Spaces SFIDE: Challenges towards Synchronous Interaction in e-Learning E-Learning at the Faculty of Computer Science of Valencia: A Report e-learning Platform Offering As-in-Class e-lectures AICT 8 / ELETE Implementation of Distributed E-Learning System on Power Line Network An Overview of the Interpretations of Trust and Reputation Towards Security Analyses of an Identity Federation Protocol for Web Services in Convergent Networks Managing User Preferences for Personalization in a Pervasive Service Environment An e-Learning Framework Based on Semantic Weblogs AICT 9 / SAPIR Comparative Study of Path Loss Using Existing Models for
Digital Television Broadcasting for Summer Season in the North of Mauritius Ant-DSR: Cache Maintenance Based Routing Protocol for Mobile Ad-Hoc Networks Adjacent Channel Interference for DVB-T at UHF Bands in the South of Mauritius for Summer Season Improved PTS for PAPR Reduction in OFDM Systems Adaptive IEEE 802.11i Security for Energy-Security Optimization Queue Priority Based on Cross-Layer Collaboration for Motorway Mobile Ad Hoc Networks
ICIW 2007 ICIW 1 / P2PSA Exploiting Proximity in Cooperative Download of Large Files in Peer-to-Peer Networks Towards a Framework for Dynamic Verification of Peer-to-Peer Systems An Open Tracing System for P2P File Sharing Systems ICIW 2 / P2PSA Reputation Management Techniques in DHT-Based Peer-to-Peer Networks P2P Middleware for Extending the Reach, Scale and Functionality of Content Delivery Networks Towards Secure Mobile P2P Systems ICIW 3 / P2PSA New Topology Management Algorithms for Unstructured P2P Networks A Static Verification Framework for Secure Peer-to-Peer Applications A Software Architecture for the Provisioning of Mobile Services in Peer-to-Peer Environments A Node Selection Algorithm for Many-to-many Mappings in Peer-to-Peer Networks Two-Way/Hybrid Clusering Architecture for Peer to Peer Systems ICIW 4 WordRank: A Method for Finding Search-Ad Keywords for Internet Merchants Applying Formal Methods to Compositionality Description of Web Service Intersection-Based Matchmaking for Semantic Web Service Discovery Web Service Composition Approaches: From Industrial Standards to Formal Methods An Adaptable Formal Model for Web Services Protocols ICIW 5 A Refined Goal Model for Semantic Web Services Architecture for Web Services Filtering and Clustering Semantic Web Services in Corporate Memories A Faceted Approach to Service Specification Constructing Web Service Flows with Reusable Aspects ICIW 6 Considering (De)Centralization in a Web Services World Web Deployed Interface for a Medical Knowledge Grid Using UML Diagrams to Model Real-Time Web Services Combining Web Services and Multi-Agent Technology to Increase Web Cooperative Capacities Towards Semantically-Enhanced Distributed Service Discovery ICIW 7 Analysis of Web Services Secure Conversation with Formal Methods A Formalism for Active and Informative Web Services Qos-Aware Automatic Composition of Web Services Using AI Planners Execution Time Analysis of Aspectized Web Services Investigating Semantic Web Services Execution Environments: A Comparison between WSMX and OWL-S Tools ICIW 8 Type-Based Static and Dynamic Website Verification ARWOPS: A Framework for Searching Workflow Patterns Candidate to be Reused Free Information Usage System on the Network Introducing DACS Scheme A Case Study on Integrating Extra-Functional Properties in Web Service Model-Driven Development Context-aware Web Services for Distributed Retrieval of Points of Interest ICIW 9 Optimization of XQuery Queries Including FOR Clauses Compositional Logical Semantics for Business Process Languages Synchronization Solutions for Decentralized Service Orchestrations A Test Bed for Web Services Protocols Factors Affecting e-Tailing Website Effectiveness: An Indian Perspective ICIW 10 Connecting Industrial Controllers to the Internet through Software Composition in Web Application Servers A New Security Scheme for Integration of Mobile Agents and Web Services Web-Based Application for Traffic Anomaly Detection Algorithm Warnings for Disjoint Knowledge Omission in Ontologies QoS Composition of Services for Data-Intensive Application ICIW 11 A Safe Regression Test Selection Technique for Web Services The Use of Watermark and Hash Function for the Authentication of Digital Images Mapped through the Use of the Wavelet Transform Quantifying Failure for Risk Based Decision Making in Digital Business Ecosystem Interactions The Impact of Number of Query Words on Image Search Engines Pyndorama, Integrating Web Learning System in a Single Application ICIW 12 Project Track and Trace Ontology Global Grid Paradigm—A Collaborative Approach to People, Resources and Services Using Distributed Technologies in the Asia-Pacific Region A Business Process Engine Based E-Government Platform E-Satisfaction—A Comprehensive Framework Optimizing the Wire Layout in Wireless Mesh Network ICIW 13 / ONLINE Research Library: A New Look of Academic Digital Libraries Achieving Collective Intelligence via Large-Scale On-line Argumentation How to Consider Requester’s Preferences to Enhance Web Service Discovery? Creating a Web-Based Collaboration Tool to Support Research Work An Evaluation of Popular Search Engines on Finding Turkish Documents ICIW 14 Collaborative Visualization of Large Scale Datasets Using Web Services Mapaci: A Real Time e-Health Application to Assist Throat Complaint Patients Network Distribution of Security Policies via Ant-like Foraging Behavior Point or Click? Evaluation of Two Input Modalities for Mobile Entertainment A Secure Web Service for Electricity Prepayment Vending in South Africa: A Case Study and Industry Specification |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Copyright (c) 2006, IARIA