|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
PRELIMINARY PROGRAM ICSNC 2008 // ICSEA 2008 // I-CENTRIC 2008 // ENTISY 2008 Sliema Sunday, October 26
Monday, October 27
Tuesday, October 28
Wednesday, October 29
Thursday, October 30
Friday, October 31
DETAILED PROGRAM
ICSEA 2008 ICSEA 1: Applications Security Requirements Engineering Process for Software Product Lines: A Case
Study The Impact of Decision-Making on Information System Dependability High Performance Computing for the Simulation of Cardiac Electrophysiology The Evaluation of Reliability Based on the Software Architecture in Neural
Networks ICSEA 2: Design tools Automatic Elicitation of Network Service Specification Web Services for Software Development: The Case of a Web Service That
Composes Web Services Process for Contract Extraction Tool Support for the UML Automation Profile - For Domain-Specific Software
Development in Manufacturing A UML Based Methodology to Ease the Modeling of a Set of Related Systems ICSEA 3: Mechanisms I Analysis of a Distributed e-Voting System Architecture against Quality of Service
Requirements Reuse through Requirements Traceability An Object Memory Management Prototype Based on Mark and Sweep Algorithm
Using Separation of Concerns A Design Methodology of Systolic Architectures Based on a Petri Net Extension.
Application to a Stereovision Hardware/Software Processing Improvement Towards a Generic Approach for Model Composition ICSEA 4: Mechanisms II Can We Transform Requirements into Architecture? Application Development over Software-as-a-Service Platforms Development of the Tool for Generation of UML Class Diagram
from Two-Hemisphere Model Using OCR Template Generation and Transformation as Meta-Modeling
Supporting Process Experience with Model Sharing in Data Mining Environments ICSEA 5: Open Source Development of a Quality Assurance Framework for the Open Source
Development Model Inheritance, 'Warnings' and Potential Refactorings: An Empirical Study Practical Verification of an Embedded Beowulf Architecture Using Standard
Cluster Benchmarks Agent-Based Group Decision Making Industrial Application Development with Open Source Approach ICSEA 6: Deployment and Maintenance I Evaluating SLA Management Process Model within Four Companies A Benchmark for Embedded Software Processes Used by Special-Purpose
Machine Manufacturers Patients and Physicians Interface - Biotelemetric System Architecture DRESREM 2: An Analysis System for Multi-document Software Review Using
Reviewers' Eye Movements Standardization and Agile Business Processes ICSEA 7: Deployment and Maintenance II A Case Study on SW Product Line Architecture Evaluation: Experience in
the Consumer Electronics Domain Comparative Evaluation of Change Propagation Approaches towards Resilient
Software Evolution Analyzing Software Evolvability of an Industrial Automation Control System: A
Case Study The Impact of Test Driven Development on the Evolution of a Reusable
Framework of Components - An Industrial Case Study A Cross Platform Development Workflow for C/C++ Applications ICSEA 8: Software Testing Data Flow Testing of SQL-Based Active Database Applications Application of Clustering Methods for Analysing of TTCN-3 Test Data Quality A Tale of Two Daily Build Projects On the Effectiveness of Manual and Automatic Unit Test Generation ICSEA 9: Agile Software Techniques Using XP in Telecommunication Software Development Towards a Selection Model for Software Engineering Tools in Small and Medium
Enterprises (SMEs) Analyzing Work Productivity and Program Quality in Collaborative Programming Goal Sketching with Activity Diagrams An Iterative Meta-Lifecycle for Software Development, Evolution and Maintenance ICSEA 10: Software Economics, Adoption, & Education Using Actor Object Operations Structures to Understand Project Requirements
Complexities Interdisciplinary Project-Based Learning in Ergonomics for Software Engineers: A
Case Study An Innovative Approach to Teaching an Undergraduate Software Engineering
Course Do Software Intellectual Property Rights Affect the Performance of Firms? Case
Study of South Korea ICSEA 11: Advances in Fundamentals I Daidalos II: Implementing a Scenario Driven Process A Persistent Object Store as Platform for Integrated Database Programming
and Querying Languages Model-Driven Development of Human Tasks for Workflows A Software Machine Analysis and Design Methodology Alternative/Exceptional Scenario Generation with Differential Scenario ICSEA 12: Advances in Fundamentals II Dynamic Software Architectures: Formally Modelling Structure and Behaviour
with Pi-ADL Exploring the Concept of Systems Theoretic Stability as a Starting Point for
a Unified Theory on Software Engineering Experiences on Analysis of Requirements Quality Model-Driven Language Engineering: The ASMETA Case Study Assurance-Driven Design ICSEA 13: Advances in Fundamentals III Enhanced Approaches in Defect Detection and Prevention Strategies in Small
and Medium Scale Industries Adapting Software Development Process towards the Model Driven Architecture Non-functional Requirements to Architectural Concerns: ML and NLP
at Crossroads A Comparative Evaluation of Using Genetic Programming for Predicting Fault
Count Data A Formal Definition of Complex Software ICSEA 14: Advances in Fundamentals IV System Design with Object Oriented Petri Nets Formalism Integrated Software Architecture Management and Validation A Component Model Family for Vehicular Embedded Systems A SysML Profile for Classical DEVS Simulators Advances in Software Design Methods for Concurrent, Real-Time and Distributed
Applications ICSEA 15: Advances in Fundamentals V Impact Analysis from Multiple Perspectives: Evaluation of Traceability Techniques An Approach to Addressing Entity Model Variability within Software Product Lines Stakeholder Identification Methods in Software Requirements: Empirical Findings
Derived from a Systematic Review Incremental Verification of Large ScaleWorkflows Based on Extended Correctness A Comparative Evaluation of State-of-the-Art Approaches for Web Service
Composition ICSEA 16: ENTISY Determinants of Advance Planning and Scheduling Systems Adoption E-Sales Diffusion in Europe: Quantitative Analysis and Modelling of First Adoption
and Assimilation Processes Simulating the ERP Diffusion Behavior in Industrial Networks MOFIS: New Conceptual Modeling Framework for Handling Value Adding
Networks Complexity An Exploratory Study of ERP Assimilation in Developing Countries: The Case
of Three Tunisian Companies
ICSNC 2008 ICSNC 1: WINET I Multi-user Frequency Pre-filtering Technique for MIMO SFBC MC-CDMA Systems Impacts of Transmission Range in Homogeneous Wireless Networks Design, Simulation and Implementation of a Channel Equalizer for DVB-T
On-channel Repeaters Fairness in a Static Wireless Network ICSNC 2: WINET II Intrusion Detection: A Survey Analysis of User Experience of Access Selection in Multi-operator Environments Modeling and Design of a Novel Backward-Wave Scanning-Beam Antenna Based
on Negative Refractive Index Material Structures Management Model for Wireless Broadband Networks Employing of Clustering Algorithm CWN-PAM in Mobile Network Planning ICSNC 3: HSNET I Survivability Quanti?cation of Real-Sized Networks Including End-to-End Delay
Distributions Routing and Performance Analysis of Double-Buffered Omega Networks
Supporting Multi-class Priority Traffic A Joint Coded Two-Step Interference Cancellation Technique for a Multiuser
MIMO-SC-FDE System Traffic Demand Derivation in IP-Based Multi Service Class Environment ICSNC 4: HSNET II Blind a Daptive Channel Shortening with a Generalized Lag-Hopping Algorithm
Which Employs Squared Auto-Correlation Minimization [GLHSAM] AURED - Autonomous Random Early Detection for TCP Congestion Control The Design and Implementation of Profile Management Module Including
Policy-Based Repository in the Customer Network Management System
for Corporate-Level Network Service Clients A Minimization Cost Heuristic Approach for Traffic Grooming in IP-over-WDM
Networks ICSNC 5: HSNET III Group Tone Spectrum Management Algorithm (GTSM) for VDSL2 Technology OFFH-CDMA Merged M-Sequence/Hyperbolic Code for Two Weights One Length
WDM System Performance Modeling of Fault Tolerant Fully Adaptive Wormhole Switching 2-D
Meshes in Presence of Virtual Channels Performance Improvement of DSTBC Systems Using Decision Feedback
Approach A Simplified Deterministic Approach for Accurate Modeling of the Indoor Power
Line Channel ICSNC 6: SENET I A Novel Prioritized Control Scheme Using Random Access Period Control
for Wide Area Ubiquitous Wireless Networks An Algorithm for Selecting the Cluster Leader in a Partially Connected Sensor
Network A Survey of Available Tools for Developing Wireless Sensor Networks Differences in Robustness of Self-Organized Control and Centralized Control
in Sensor Networks Caused by Differences in Control Dependence ICSNC 7: SENET II Use of MPEG-21 for Security and Authentication in Biomedical Sensor Networks Automated Testing of WSN Applications Geminga: Service Discovery for Mobile Robotics Protecting the DNS Infrastructure of a Top Level Domain: Dynamic Firewalling
with Network Sensors ICNSC 8: SESYS HIP Tags Privacy Architecture A Mechanism for Federated Identification Services for Public Access Portals
Using Access-Cards GEMOM - Significant and Measurable Progress beyond the State of the Art Using Honeynodes along with Channel Surfing for Defense against Jamming
Attacks in Wireless Networks A High Availability Firewall Model Based on SCTP Protocol Risk Analysis Methodology for New Critical Information Infrastructure ICSNC 9: MCSYS Improvement of GPON MAC Protocol for IP TV Service A Simple Computer Design with Monitor Interface: Integrating Hardware
and Software in Early Research in Computer Science Performance Modelling and Evaluation of Handover Mechanism in IP Multimedia
Subsystems Integration of WiMAX Access Management and Control in a Multi-domain System
for Multimedia Distribution Social Networking Service Based on Peer-to-Peer Network ICSNC 10: POSYS Regulatory Models in Telecommunications Market in Bosnia and Herzegovina A New Preemption Algorithm Supporting Differentiated Services Aware Traffic
Engineering Automated Evaluation of Reusable Learning Objects via a Decision Support
System WS-Re2Policy: A Policy Language for Distributed SLA Monitoring
and Enforcement Implementation of Traffic Engineering in NGNs Using Hybrid Genetic Algorithms ICSNC 11: MHNET I Modified DMAC Clustering Algorithm for VANETs PMIPv6 Route Optimization Mechanism Using the Routing Table of MAG Performance Analysis of Route Optimization on Proxy Mobile IPv6 Network Coding for Detection and Defense of Sink Holes in Wireless
Reconfigurable Networks An Analysis of the Nanosatellites Launches between 2004 and 2007 Space Imaging Infrastructure Development of PUBSAT and NERVA Orbital
Vehicle ICSNC 12: MHNET II Ticket-Based Authentication Mechanism for Proxy Mobile IPv6 Environment Adaptive DSR Protocol with Cooperative Agents for Different Mobility and Traffic
Patterns Testing Methodology Using SDL for an On-demand Routing Protocol in MANET Improvement of TCP Performance in Ad Hoc Networks Using Cross Layer
Approach Wireless Routing Protocol Based on Trust Evaluation
I-CENTRIC 2008 I-CENTRIC 1: Advanced Applications A Fuzzy Logic Based Model for Representing and Evaluating Service Composition
Properties Long Term Management of Private Digital Assets Elder Care Architecture Remote Robot Training of Its Artificial Neural Network through GSM
Communication I-CENTRIC 2: Storage & Retrieval Semantic Policies for Service Access in Mobile Supported Sensor Networks Capturing User Contexts: Dynamic Profiling for Information Seeking Tasks Supports for Identity Management in Ambient Environments - The Hydra
Approach Gradual Adaption Model for Estimation of User Information Access Behavior I-CENTRIC 3: Monitoring Automatic Control of Students' Attendance in Classrooms Using RFID Gateways and Capacity in Ad Hoc Networks Some Problems & Methods for Remotely Controllable Automatic Home Security
Systems |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Copyright (c) 2006-2010, IARIA