![]()  
     | 
   |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
 
 PRELIMINARY PROGRAM CTRQ 2008 // BIOTECHNO 2008 // ICDT 2008 // ICIMP 2008 CONFERENCE HOTEL Sunday, June 29 
 Monday, June 30 
 Tuesday, July 1 
 Wednesday, July 2 
 Thursday, July 3 
 Friday, July 4 
 DETAILED PROGRAM BIOTECHNO 1: Biocomputing  I In-bed Patients Behaviour Monitoring System A Data Fusion Approach in Protein Homology Detection Identifying Disease Susceptible DNA Regions Using Underlying Odds Ratio Contour Analysis Fister-Panetta Upper Bound for Cancer Growth. Some Computational Remarks Failure Prediction Mechanisms in Cluster Systems BIOTECHNO 2: Biocomputing  II  Directional Invariance of Co-occurrence Matrices within the Liver  ‘Blast Those Sequences’: A Gridified Framework for Bioinformatics Blast Using the A3pviGrid  A New Modeling for Finding Optimal Weighted Distances  Effects of Improper Spectral Delay on Speech Recognition with Cochlear Implants: A Simulation Study BIOTECHNO 3:  Chemoinformatics  In Silico Drug Screening Based on a Protein-Compound Affinity Matrix  TVscreen: Trend Vector Virtual SCREENing of Large Commercial Compounds 
       Collections  MMsINC®: A New Public Large-Scale Chemoinformatics Database System  Concept of Associated Photodynamic Therapy with Porphyrin - Cis-Platin Drug 
       System and Applications on HeLa Cells  New Chessboard (8×8) Representation of the Standard Genetic Code, and Its 
       Application for Representing Primary Structures of Proteins BIOTECHNO 4: Biocomputing  III  Combining Boundaries and Ratings from Multiple Observers for Predicting Lung Nodule Characteristics  Network P2P for Exploring and Visualization of Proteomic Data: Possibility of Handling Data and Analysing Them under Different Perspectives  sBGMM: A Stratified Beta-Gaussian Mixture Model for Clustering Genes with Multiple Data Sources  Mathematical Description of Biological Structures and Mechanisms BIOTECHNO 5:  Biomechanical devices  Microdevice for Isolating Viable Circulating Tumor Cells  Biosensing Based on Surface Plasmon Resonance of Gold Nanohole and Nanoring Arrays Fabricated by a Novel Nanosphere Lithography Technique  Particle Transfer and Detection in a Microspheres Based Detoxification System  UUTE Home Network for Wireless Health Monitoring BIOTECHNO 6:  Bioinformatics I  RN-Cluster: Discovering Coherent Biclusters Which is Robust to Noise  Design of Microarray Probes for Detection of Mutations  Next-Generation Collaboration Environments for Interactive Tele-medical  Towards Better Outliers Detection for Gene Expression Datasets  Exploiting Codon-Triplets Association for Genome Primary Structure Analysis BIOTECHNO 7:  Bioinformatics II  Studying the Evolution of Codon Context in Conserved Gene Sequences  Grouping Levels of Exposure with Same Observable Effects before Class Prediction in Toxicogenomics  A Microarray Information Database  Analyzing Multivariate Calibration Techniques for Glucose Level Prediction in Non-invasive Human Tongue Spectra Solid as a ROC? A Discussion about Some Figures of Merit Used in the Validation CTRQ1: Computer  communications I  Security and Spatial Resolution Optimization for Cluster-Based Wireless Sensor Networks  Cooperation Enforcement in Vehicular Networks  An Improved Quorum Selection Algorithm  Past, Present and Future of IP Telephony CTRQ2: Computer  communications II Analytical Model for Performance Evaluation of Blocking Banyan Switches Supporting Double Priority Traffic  HyTrace—Backbone-Assisted Path Discovery in Hybrid Networks  Optimal Offline TCP Sender Buffer Management Strategy Design and Performance Evaluation of a State-Space Based AQM CTRQ3: QoS I  Broadband Wireless Access (BWA) Implementation in NGN Network  Neural Network Estimation of TCP Performance  A Distributed Congestion Control Strategy for Differentiated-Services Network Analysis of the Relationship between QoS and SNR for an 802.11g WLAN CTRQ4: QoS II A New Endpoint Admission Control Algorithm in NGN with Improved Network Utilization  QoS Mapping in TDMA Tree Based Clustered WSN between Accuracy, Density and Bandwidth  Reservation Clash Handling to Optimize Bandwidth Utilization in MANETs  Quality of Service Management in Heterogeneous Networks Web-Service Solution for Inter-domain QoS Negotiation ICDT1: Signal I  A Frequency Domain FIR Filter Implementation Method for 3G Communication Systems  3-Dimensional MMSE Channel Estimation in Multi-antenna OFDM Systems  Influence of Instruments Bandwidth in the Power Amplifier Linearization Process  sinc^N FIR Filter Coefficients: Closed-Form Expressions and Recursive Relations  Carrier Phase Lock Loops Tested with Different Input Waves ICDT2: Signal II  Spectrum Estimation at the Output of a Nonlinear Power Amplifier with Multicarrier Signals  Is the Nyquist Rate Enough?  Deterministic and Random Phase Synchronizers  Clock Offset and Skew Estimation in Wireless Sensor Networks with Known Deterministic Delays and Exponential Nondeterministic Delays  Gradient Adaptive Lattice Algorithm Suitable for Fixed Point Implementation ICDT3: DATA &  TRACK  An Efficient Similarity Searching Scheme in Massive Databases  Speed Aware Modified Span for Wireless Mobile Ad Hoc Networks  Piecewise Complex Circular Approximation of the Inverse Characteristics of Power Amplifiers for Digital Predistortion Techniques  Location Privacy in Chain-Based Protocols for Location-Based Services ICDT4: DATA & SARP  Embedded Database Architecture for Multi-RAT Data Handling in Handheld Devices  Coarse-Grained Commands SOA  Successive Approximations-Based Algorithm for Independent Component Analysis ICDT5: Multimedia  I  An Adaptive Mechanism for End-to-End Multirate Multicast Congestion Control  Correlation-Based Cooperative User Scheduling in the Uplink of Cellular Systems  Impact of Fixed-Size Packet Creation Timer and Packet Format on the Performance of Slotted and Unslotted Bus-Based Optical MAN  An Infrastructure-Based Approach for Fast and Seamless Handover ICDT6: Multimedia  II  Receiver Coding Gain in DVB-H Terminals Using Application Layer FEC Codes  Use of Presence and Location Information for Situational Awareness  Performance of User Resource Allocation in Cellular System with Fixed Relay 
       Station  Frequency Allocation Scheme for Interference Avoidance in Cellular System with Fixed Relay  An Empirical Evaluation on Meta-Image Search Engines ICDT7: IPTV  CAPEX and OPEX Optimisation in Function of DVB-H Transmitter Power  Field Measurement and Data Analysis Method for DVB-H Mobile Devices  Service Discovery & Selection for Next Generation IPTV Environments ICDT8: Audio &  Visual  ON-OFF-2ON Traffic Model for Packetized Voice over Wireless Both-Way Transmission Media  Comparison of SIP and H.323 Protocols  Reference Frame Compression Using Embedded Reconstruction Patterns for H.264/AVC Decoder  An Overview of Image Compression Approaches  A Comparative Analysis of Noise Robust Speech Features Extracted from All-Pass Based Warping with MFCC in a Noisy Phoneme Recognition ICIMP1: MONIT I  Dynamic Verification and Control of Mobile Peer-to-Peer Systems  HIDDEN: Hausdorff Distance Based Intrusion Detection Approach DEdicated to Networks  Mouse Trapping: A Flow Data Reduction Method  Large-Scale Video Surveillance Systems: New Performance Parameters and Metrics ICIMP2: MONIT II  Impact of Traffic Mix and Packet Sampling on Anomaly Visibility  Traffic Anomaly Detection at Fine Time Scales with Bayes Nets  Towards a User-Centric Identity-Usage Monitoring System  VOC Based Key Quality Indicators for High-Speed Internet Service ICIMP3: RTSEC I  Specification-Based Denial-of-Service Detection for SIP Voice-over-IP Networks  Zombie Identification Port  Peer-to-Peer Networks Security ICIMP4: RTSEC II  A Threat-Aware Signature Based Intrusion-Detection Approach for Obtaining Network-Specific Useful Alarms  Towards Fast Detecting Intrusions: Using Key Attributes of Network Traffic  Cryptographic Authentication on the Communication from an 8051 Based Development Board over UDP  NIVSS: A Nearly Indestructible Video Surveillance System ICIMP5: SYDIA  An Empirical Study on Data Center System Failure Diagnosis  A Dangerousness-Based Investigation Model for Security Event Management  A Merge Method for Decentralized Discrete-Event Fault Diagnosis ICIMP6: RISK &  TRUST  A Holistic, Collaborative, Knowledge-Sharing Approach for Information Security Risk Management  Efficient Security Measurements and Metrics for Risk Assessment  An Access Service Scheme with Anonymity for Ubiquitous Computing Based on Mobile IPv6  Establishing a Secure Peer Identity Association Using IMS Architecture  A Near Real-Time System for Security Assurance Assessment ICIMP7: USSAF  An Evaluation of Major Image Search Engines on Various Query Topics  A Classification of Security Feedback Design Patterns for Interactive Web Applications  An Empirical Analysis of RS Steganalysis  Identity Management in Mobile Ubiquitous Environments  | 
   |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Copyright (c) 2006-2010, IARIA