|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
PRELIMINARY PROGRAM CTRQ 2008 // BIOTECHNO 2008 // ICDT 2008 // ICIMP 2008 CONFERENCE HOTEL Sunday, June 29
Monday, June 30
Tuesday, July 1
Wednesday, July 2
Thursday, July 3
Friday, July 4
DETAILED PROGRAM BIOTECHNO 1: Biocomputing I In-bed Patients Behaviour Monitoring System A Data Fusion Approach in Protein Homology Detection Identifying Disease Susceptible DNA Regions Using Underlying Odds Ratio Contour Analysis Fister-Panetta Upper Bound for Cancer Growth. Some Computational Remarks Failure Prediction Mechanisms in Cluster Systems BIOTECHNO 2: Biocomputing II Directional Invariance of Co-occurrence Matrices within the Liver ‘Blast Those Sequences’: A Gridified Framework for Bioinformatics Blast Using the A3pviGrid A New Modeling for Finding Optimal Weighted Distances Effects of Improper Spectral Delay on Speech Recognition with Cochlear Implants: A Simulation Study BIOTECHNO 3: Chemoinformatics In Silico Drug Screening Based on a Protein-Compound Affinity Matrix TVscreen: Trend Vector Virtual SCREENing of Large Commercial Compounds
Collections MMsINC®: A New Public Large-Scale Chemoinformatics Database System Concept of Associated Photodynamic Therapy with Porphyrin - Cis-Platin Drug
System and Applications on HeLa Cells New Chessboard (8×8) Representation of the Standard Genetic Code, and Its
Application for Representing Primary Structures of Proteins BIOTECHNO 4: Biocomputing III Combining Boundaries and Ratings from Multiple Observers for Predicting Lung Nodule Characteristics Network P2P for Exploring and Visualization of Proteomic Data: Possibility of Handling Data and Analysing Them under Different Perspectives sBGMM: A Stratified Beta-Gaussian Mixture Model for Clustering Genes with Multiple Data Sources Mathematical Description of Biological Structures and Mechanisms BIOTECHNO 5: Biomechanical devices Microdevice for Isolating Viable Circulating Tumor Cells Biosensing Based on Surface Plasmon Resonance of Gold Nanohole and Nanoring Arrays Fabricated by a Novel Nanosphere Lithography Technique Particle Transfer and Detection in a Microspheres Based Detoxification System UUTE Home Network for Wireless Health Monitoring BIOTECHNO 6: Bioinformatics I RN-Cluster: Discovering Coherent Biclusters Which is Robust to Noise Design of Microarray Probes for Detection of Mutations Next-Generation Collaboration Environments for Interactive Tele-medical Towards Better Outliers Detection for Gene Expression Datasets Exploiting Codon-Triplets Association for Genome Primary Structure Analysis BIOTECHNO 7: Bioinformatics II Studying the Evolution of Codon Context in Conserved Gene Sequences Grouping Levels of Exposure with Same Observable Effects before Class Prediction in Toxicogenomics A Microarray Information Database Analyzing Multivariate Calibration Techniques for Glucose Level Prediction in Non-invasive Human Tongue Spectra Solid as a ROC? A Discussion about Some Figures of Merit Used in the Validation CTRQ1: Computer communications I Security and Spatial Resolution Optimization for Cluster-Based Wireless Sensor Networks Cooperation Enforcement in Vehicular Networks An Improved Quorum Selection Algorithm Past, Present and Future of IP Telephony CTRQ2: Computer communications II Analytical Model for Performance Evaluation of Blocking Banyan Switches Supporting Double Priority Traffic HyTrace—Backbone-Assisted Path Discovery in Hybrid Networks Optimal Offline TCP Sender Buffer Management Strategy Design and Performance Evaluation of a State-Space Based AQM CTRQ3: QoS I Broadband Wireless Access (BWA) Implementation in NGN Network Neural Network Estimation of TCP Performance A Distributed Congestion Control Strategy for Differentiated-Services Network Analysis of the Relationship between QoS and SNR for an 802.11g WLAN CTRQ4: QoS II A New Endpoint Admission Control Algorithm in NGN with Improved Network Utilization QoS Mapping in TDMA Tree Based Clustered WSN between Accuracy, Density and Bandwidth Reservation Clash Handling to Optimize Bandwidth Utilization in MANETs Quality of Service Management in Heterogeneous Networks Web-Service Solution for Inter-domain QoS Negotiation ICDT1: Signal I A Frequency Domain FIR Filter Implementation Method for 3G Communication Systems 3-Dimensional MMSE Channel Estimation in Multi-antenna OFDM Systems Influence of Instruments Bandwidth in the Power Amplifier Linearization Process sinc^N FIR Filter Coefficients: Closed-Form Expressions and Recursive Relations Carrier Phase Lock Loops Tested with Different Input Waves ICDT2: Signal II Spectrum Estimation at the Output of a Nonlinear Power Amplifier with Multicarrier Signals Is the Nyquist Rate Enough? Deterministic and Random Phase Synchronizers Clock Offset and Skew Estimation in Wireless Sensor Networks with Known Deterministic Delays and Exponential Nondeterministic Delays Gradient Adaptive Lattice Algorithm Suitable for Fixed Point Implementation ICDT3: DATA & TRACK An Efficient Similarity Searching Scheme in Massive Databases Speed Aware Modified Span for Wireless Mobile Ad Hoc Networks Piecewise Complex Circular Approximation of the Inverse Characteristics of Power Amplifiers for Digital Predistortion Techniques Location Privacy in Chain-Based Protocols for Location-Based Services ICDT4: DATA & SARP Embedded Database Architecture for Multi-RAT Data Handling in Handheld Devices Coarse-Grained Commands SOA Successive Approximations-Based Algorithm for Independent Component Analysis ICDT5: Multimedia I An Adaptive Mechanism for End-to-End Multirate Multicast Congestion Control Correlation-Based Cooperative User Scheduling in the Uplink of Cellular Systems Impact of Fixed-Size Packet Creation Timer and Packet Format on the Performance of Slotted and Unslotted Bus-Based Optical MAN An Infrastructure-Based Approach for Fast and Seamless Handover ICDT6: Multimedia II Receiver Coding Gain in DVB-H Terminals Using Application Layer FEC Codes Use of Presence and Location Information for Situational Awareness Performance of User Resource Allocation in Cellular System with Fixed Relay
Station Frequency Allocation Scheme for Interference Avoidance in Cellular System with Fixed Relay An Empirical Evaluation on Meta-Image Search Engines ICDT7: IPTV CAPEX and OPEX Optimisation in Function of DVB-H Transmitter Power Field Measurement and Data Analysis Method for DVB-H Mobile Devices Service Discovery & Selection for Next Generation IPTV Environments ICDT8: Audio & Visual ON-OFF-2ON Traffic Model for Packetized Voice over Wireless Both-Way Transmission Media Comparison of SIP and H.323 Protocols Reference Frame Compression Using Embedded Reconstruction Patterns for H.264/AVC Decoder An Overview of Image Compression Approaches A Comparative Analysis of Noise Robust Speech Features Extracted from All-Pass Based Warping with MFCC in a Noisy Phoneme Recognition ICIMP1: MONIT I Dynamic Verification and Control of Mobile Peer-to-Peer Systems HIDDEN: Hausdorff Distance Based Intrusion Detection Approach DEdicated to Networks Mouse Trapping: A Flow Data Reduction Method Large-Scale Video Surveillance Systems: New Performance Parameters and Metrics ICIMP2: MONIT II Impact of Traffic Mix and Packet Sampling on Anomaly Visibility Traffic Anomaly Detection at Fine Time Scales with Bayes Nets Towards a User-Centric Identity-Usage Monitoring System VOC Based Key Quality Indicators for High-Speed Internet Service ICIMP3: RTSEC I Specification-Based Denial-of-Service Detection for SIP Voice-over-IP Networks Zombie Identification Port Peer-to-Peer Networks Security ICIMP4: RTSEC II A Threat-Aware Signature Based Intrusion-Detection Approach for Obtaining Network-Specific Useful Alarms Towards Fast Detecting Intrusions: Using Key Attributes of Network Traffic Cryptographic Authentication on the Communication from an 8051 Based Development Board over UDP NIVSS: A Nearly Indestructible Video Surveillance System ICIMP5: SYDIA An Empirical Study on Data Center System Failure Diagnosis A Dangerousness-Based Investigation Model for Security Event Management A Merge Method for Decentralized Discrete-Event Fault Diagnosis ICIMP6: RISK & TRUST A Holistic, Collaborative, Knowledge-Sharing Approach for Information Security Risk Management Efficient Security Measurements and Metrics for Risk Assessment An Access Service Scheme with Anonymity for Ubiquitous Computing Based on Mobile IPv6 Establishing a Secure Peer Identity Association Using IMS Architecture A Near Real-Time System for Security Assurance Assessment ICIMP7: USSAF An Evaluation of Major Image Search Engines on Various Query Topics A Classification of Security Feedback Design Patterns for Interactive Web Applications An Empirical Analysis of RS Steganalysis Identity Management in Mobile Ubiquitous Environments |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Copyright (c) 2006-2010, IARIA