ITNG 2006 ADVANCE PROGRAM The International Conference on Information Technology: New Generations April 10- 12, 2006 The Orleans' Hotel & Casino, Las Vegas, Nevada, USA April 9, 2006 - SUNDAY 5:00pm - 8:30pm: REGISTRATION (Second Floor, Conference Section) April 10, 2006 - MONDAY 7:00am - 5:00pm: REGISTRATION (Second Floor, Conference Section) 7:00am - 8:00am: CONTINENTAL BREAKFAST 8:00am - 8:10am: Conference Opening Remarks by Shahram Latifi, ITNG Chair, University of Nevada, Las Vegas 8:10am - 9:00am: KEYNOTE by Dr. Michael Gach, Nevada Cancer Institute The Role of IT at the Nevada Cancer Institute 9:00am - 9:10am: BREAK PARALLEL SESSIONS: A SESSIONS ( Salon K) SESSION MA1: IT Education CHAIR: Jitender Kumar Chhabra, National Institute of Technology, India 9:10am - 10:10am 9:10-9:40 Hiring the IT Graduate: What's in the Box? Jacob R. Miller, Sandra Gorka, Barry Lunt, Joseph J. Ekstrom, Eydie Lawson, Han Reichgelt, Reza Kamali 9:40- 10:10 Implications of IT in Different Professions Inger Björkman, Ann Johansson 10:10-10:30: Coffee Break SESSION MA2: SOFTWARE ENGINEERING I CHAIR: Mohammad Eyadat, California State University 10:30am - 12:30pm 10:30-10:45 Decoupling Security Concerns in Web Services Using Aspects G. Kouadri Mostefaoui, Z. Maamar, N.C. Narendra and S. Sattanathan 10:45-11:00 Integrated Collections: Approach to Software Component Reuse Hisham Haddad 1 11:00-11:20 An Agglomerative Clustering Algorithm for Data Imputation Sumanth Yenduri 11:20-11:40 Cost implications of software commonality and reuse Eugenio Capra and Chiara Francalanci 11:40-12:00 On OO Design Consistency in Iterative Development Umesh Bellur, Vallieswaran V. 12:00-12:15 Reliable Deployment of Component-based Applications into Distributed Environments Abbas Heydar Noori, Farhad Mavaddat and Farhad Arbab 12:15-12:30 Modular Model of a Logic Circuit Using Object-Oriented Programming Stefan Senczyna 12:30-1:30 Lunch (On Your Own) SESSION MA3: SOFTWARE ENGINEERING II CHAIR: Dr. Chia-Chu Chiang, University of Arkansas at Little Rock Co-CHAIR: Dr. Laxmi Gewali, University of Nevada, Las Vegas 1:30pm - 3:30pm 1:30-1:45 A Language for Writing Formal Software Specifications: the Library Problem Revisited Chia-Chu Chiang 1:45-2:00 A First Draft of RATF: A Method Combining Robustness Analysis and Technology Forecasting Göran Calås, Andreas Boklund, Stefan Mankefors-Christiernin 2:00-2:15 Studying Software Implementations of Elliptic Curve Cryptography Hai Yan and Zhijie Jerry Shi 2:15-2:30 Novel Approach for Remote Energy Meter Reading Using Mobile Agents Radwan Tahboub,Vasile Lazarescu 2:30-2:50 RL-Agent - an Agent that Learns in Collaborative Virtual Environment Elhadi , Abdur Matin 2:50-3:10 On History-Sensitive Models of an Interactive Stack Walter Dosch 3:10-3:30 New Algorithms for Random Access Text Compression Robert.L., Nadarajan.R. 3:30-4:00: Coffee Break 2 SESSION MA4: SOFTWARE ENGINEERING III CHAIR: Elhadi Shakshuki, Acadia University 4:00pm – 6:20pm 4:00-4:20 Integrating Non-Functional Properties to Architecture Specification and Analysis Shifeng Zhang 4:20-4:40 Production and Maintenance of Content-Intensive Videogames: A Document Oriented Approach Iván Martínez-Ortiz, Pablo Moreno-Ger, José Luis Sierra, Baltasar FernándezManjón 4:40-5:00 Integrating Change Management with Software Document Relationship Management Tien N. Nguyen 5:15-5:30 The Legal and political aspects of Software piracy in the Arab world Samir N. Hamade 5:30-5:45 Degree of Freedom - Experience of Applying Software Framework Wang Wong, Shane Ng 5:45-6:00 Measurement of Intra-Class & Inter-Class Weakness for Object-Oriented Software Jitender Kumar Chhabra K.K. Aggarwal B SESSIONS (Salon L) SESSION MB1: Embedded Cryptographic Systems I CHAIR: Zhijie Jerry Shi, University of Connecticut, USA 9:10am - 10:10am 9:10-9:30 A Private Vector Dominance Protocol without a Third Party Maged Hamada Ibrahim 9:30-9:50 Efficient Implementation of Galois Field Fixed Field Constant Multiplication AJ Elbirt and C Paar 9:50-10:10 Efficient Methods in Converting to Modulo 2n+1 and 2n-1 Kooroush Manochehri, Saadat Pourmozafari, Babak Sadeghian 10:10-10:30 Coffee Break 3 SESSION MB2: Embedded Cryptographic Systems II CHAIR: Adam Elbirt, UNIVERSITY OF MASSACHUSETTS - LOWELL, USA 10:30am - 12:30pm 10:30-11:00 Parallel Hardware Architectures for the Cryptographic Tate Pairing G. Bertoni and L. Breveglieri and P. Fragneto and G. Pelosi 11:00-11:30 An Embedded Processor for a Pairing-Based Cryptosystem Robert Ronan, Colm O hEigeartaigh, Colin Murphy, Michael Scott, Tim Kerins and W.P. Marnane 11:30-12:00 Efficient Authenticated Key-Exchange for Devices with a Trusted Manager He Ge and Stephen R. Tate 12:00-12:30 Side-Channel Leakage Tolerant Architectures Kris Tiri, Patrick Schaumont, Ingrid Verbauwhede 12:30 - 1:30 Lunch (On Your Own) SESSION MB3: High Performance Computer Architectures CHAIR: Dr. Rama Sangireddy, University of Texas, Dallas 1:30pm - 3:30pm 1:30-1:50 K-Selector-Based Dispatching Algorithm for Clos-Network Switches Mei Yang, Mayauna McCullough, Yingtao Jiang, and Jun Zheng 1:50-2:10 Instruction Format Based Selective Execution for Register Port Complexity Reduction in High-Performance Processors Rama Sangireddy 2:10-2:30 Evaluating Parallel Computing Systems in Bioinformatics Erik S. Gough and Michael D. Kane 2:30-2:50 RDT Properties and Evaluations Yulu Yang, Yang Yu 2:50-3:10 VMSIM: Virtual Machine Based a Full System Simulation Platform for Microprocessors' Functional Verification Jianfeng An, Xiaoya Fan, Shengbing Zhang and Danghui Wang 3:10-3:30 A Reconfigurable Architecture for Wireless Communication Systems Hooman Parizi, Afshin Niktash, Amir Kamalizad, Nader Bagherzadeh 3:30-4:00 : Coffee Break 4 SESSION MB4: SENSOR NETWORKS CHAIR: Zhijie Jerry Shi, University of Connecticut Co-CHAIR: Shweta Singh, Wipro Technologies,Bangalore,INDIA 3:50pm - 5:50pm 4:00-4:20 Data Aggregation in Distributed Sensor Networks: Towards An Adaptive Timing Control Fei Hu, Carter May, Xiaojun Cao 4:20-4:40 COSEN: A Chain Oriented Sensor Network for Efficient Data Collection Nahdia Tabassum, Quazi Ehsanul Kabir Mamun, Yoshiyori Urano 4:40-5:00 Interference Aware Dominating Set for Sensor Network Laxmi Gewali, Khursheed Mohamad, and Min Tun 5:00-5:20 Improved Maximum Likelihood Estimation of Target Position in Wireless Sensor Networks using Particle Swarm Optimization Mathew M. Noel, Parag P. Joshi and Thomas C. Jannett 5:20-5:40 Efficient RBS in Sensor Networks Hyojung Lee, Youngmi Kwon 5:40-6:00 Reliable Multipath Information Dissemination via Label Forwarding in Wireless Sensor Networks Vasu Jolly, Naoto Kimura, Shahram Latifi April 11, 2006 - Tuesday 7:00am - 5:00pm: REGISTRATION (Second Floor, Conference Section) 7:30am - 8:30am: CONTINENTAL BREAKFAST 8:00am -9:00am:KEYNOTE by Dr. Jacob Miller, Pennsylvania College of Technology Experiential Learning:Bringing Practical Experiences into the Classroom (Location: Salons K&L ) 9:00am - 9:10am: BREAK PARALLEL SESSIONS: A SESSIONS (Salon K) SESSION TA1: MOBILE ENTERPRISE I CHAIR: Elaine Lawrence, University of Technology, Australia Co-Chair: Simeon Yates, Sheffield Hallam University, UK 9:10am - 10:10am 9:10-9:30 Mobile Terminated SMS Billing – Exploits and Security Analysis Philip Garner, Ian Mullins, Reuben Edwards, Paul Coulton 9:30-9:50 SmartDOTS – A Framework for Efficient Data Synchronization on Mobile Devices Werner Kurschl, Stefan Mitsch, Rene Prokop 5 9:50-10:10 MARKS (Middleware Adaptability for Resource Discovery, Knowledge Usability and Self-healing) for Mobile Devices of Pervasive Computing Environments Moushumi Sharmin, Shameem Ahmed, and Sheikh I. Ahamed 10:10-10:30 Coffee Break SESSION TA2: MOBILE ENTERPRISE II CHAIR: Elaine Lawrence, University of Technology, Australia 10:30am-12:30pm 10:30-10:45 Consumer value segments in mobile bill paying Tommi Laukkanen and Teuvo Kantanen 10:45-11:00 Government as a Mobile Enterprise: Real-time, Ubiquitous Government Tarek El Kiki 11:00-11:15 SelectiveDES: A Distributed Event Service Add-On for Invocation-Based Middleware supporting Selective Multi-Channel Communication and Notification Delivery Werner Kurschl, Stefan Mitsch, Rene Prokop 11:15-11:30 Inter Domain Mobility using SIP and MIP Abdul Nasir, Mah-Rukh 11:30-11:50 A Dynamic Mobility Management Scheme for VoIP Services Eunjung Lee, Jinsuk Baek, and Shou-Hsuan Stephen Huang 11:50-12:10 Mobile Payment Solution – Symbiosis between banks, application service providers and mobile network operators Natali Deli, Ana Vukašinovi 12:10-12:30 12:30- 1:30 Towards Provisioning of Secure ICT Services for Mobile and Wireless Communications Jawed Siddiqi, Babak Akhgar, Mehrdad Nader, Wolfgang Orth, Norbert Meyer, Miika Tuisku, Gregor Pipan, Mario López Gallego, José Alberto García, Maurizio Cecchi and Jean-Noel Colin Lunch (On Your Own) SESSION TA3: WEB TECHNOLOGIES CHAIR: Amanda Spink, Queensland University of Technology, Australia 1:30pm - 3:30pm 1:30-1:45 Using the Web to Construct Taxonomy for a Heterogeneous Community of Practice Isak Taksa, Amanda Spink 1:45-2:00 Feature and Prototype Evolution for Nearest Neighbor Classification of Web Documents Michelle Cheatham and Mateen Rizki 6 2:00-2:15 Overlap Among Major Web Search Engines Amanda Spink, Bernard J. Jansen, Chris Blakely & Sherry Koshman 2:15-2:30 A General Classification of (Search) Queries and Terms Nadine Schmidt-Maenz and Martina Koch 2:30-3:50 An Automated WSDL Generation and Enhanced SOAP Message Processing System for Mobile Web Services Gil Cheol Park, Seok Soo Kim, Gun Tae Bae, Yang Sok Kim and Byeong Ho Kang 2:50-3:10 Web Page Recommender System based on Folksonomy Mining Satoshi Niwa, Takuo Doi, Shinichi Honiden 3:10-3:30 A Study of Self-Organizing Map in Interactive Relevance Feedback Daqing He 3:30-3:50 Coffee Break SESSION TA4: INTERNET AND WIRELESS SECURITY CHAIR: CHAIR: Yoohwan Kim, University of Nevada, Las Vegas CO-CHAIR: 3:50pm - 5:50pm 3:50-4:10 Group Key Management in Wireless Networks Using Session Keys Dhilak Damodaran, Rohit Singh, Phu Dung Le 4:10-4:30 Anomaly Detection in SMTP Traffic Hao Luo, Binxing Fang, Xiaochun Yun 4:30-4:50 A Secure Group Key Management Scheme in Wireless Cellular Systems Hwayoung Um and Edward J. Delp 4:50-5:10 Anomaly Detection Based Intrusion Detection Dima Novikov, Roman V. Yampolskiy 5:10-5:30 Secure Two-Way Transfer of Measurement Data Marko Hassinen, Maija Marttila-Kontio, Mikko Saesmaa, Heli Tervo 5:30-5:50 Efficient Group Key Management in Wireless Networks YilingWang, Dhilak Damodaran, and Phu Dung Le 6:00pm-6:30pm Award Ceremony (Salon K) 6:45pm-7:30pm CASH BAR (Location: Toulouse Ballroom) 6:45pm-7:30pm CONFERENCE RECEPTION & DINNER (Location: Toulouse Ballroom) 7 B SESSIONS (Salon L) SESSION TB1: INFORMATION SECURITY AND PRIVACY I CHAIR: Samir N. Hamade, Kuwait University 9:10am - 10:10am 9:10-9:30 9:30-9:50 9:50-10:10 10:10-10:30 (Location: Meeting Room ) New Method For Risk Management in CRM Security Management Mahdi Seify Intelligent Technologies for Managing Fraud and Identity Theft Ranjit Bose Analysis of Log Files Intersections for Security Enhancement Kazimierz Kowalski Mohsen Beheshti Coffee Break SESSION TB2: INFORMATION SECURITY AND PRIVACY II CHAIR: Adam Elbirt, University of Massachusetts, Lowell 10:30am-12:30pm 10:30-10:50 The Design and Implementation of a Smartphone Payment System based on Limited-used Key Generation Scheme Xianping Wu, Osama Dandash, and Phu Dung Le 10:50-11:10 Sequential and Parallel Cascaded Convolutional Encryption with Local Propagation: Toward Future Directions in Symmetric Cryptography Dragos Trinca 11:10-11:30 A Study on the Security of Privacy Homomorphism Yu Yu, Jussipekka Leiwo, Benjamin Premkumar 11:30-11:50 An Efficient and Secure Code Sharing for Peer-to-Peer Communications Wei WU and Phu Dung Le 11:50-12:10 A Copyright Protection Scheme for Gray-Level Images Using Human Fingerprint Images as Watermarks Shang-Lin Hsieh, Hsuan-Chieh Huang, and I-Ju Tsai 12:10-12:30 OPEN 12:30- 1:30 Lunch (On Your Own) 8 SESSION TB3: DATA MINING & CHECKPOINTING CHAIR: Emmanuel Udoh, Indiana University, Purdue University, Fort Wayne CO-CHAIR: TBA 1:30pm - 3:30pm 1:30-1:50 1:50-2:10 Mining Documents in a Small Enterprise Using WordStat Emmanuel Udoh and Joshua Rhoades Web usability testing – CARE methodology Arthi Anandhan, Senthil Dhandapani, Hassan Reza, Karthik Namasivayam 2:10-2:30 A Hybrid Approach to Error Reduction of Support Vector Machines in Document Classification Jun-Seok Lee, Yoon-Shik Tae, Mihwa Kong, Seong-Bae Park, Sang-Jo Lee 2:30-2:50 Knowledge Discovery in Power Quality data using Support Vector Machine and S-Transform K. Vivek, M. Gopal, B.K. Panigrahi 2:50-3:10 Closed Multidimensional Sequential Pattern Mining Panida Songram, Veera Boonjing 3:10-3:30 A Two-Phase Time-based Consistent Checkpointing Strategy Men Chaoguang,Zhao Yunlong,Yao Wenbin 3:30-3:50 Coffee Break SESSION TB4: VoIP/SIGNAL PROCESSING CHAIR: David Pheanis, Arizona State University CO-CHAIR: TBA 3:50pm - 5:30pm 3:50-4:10 Adding High Level VoIP Facilities to the Unicon Ziad Al-Sharif and Clinton Jeffery 4:10-4:30 Bandwidth-ConservingReal-TimeVoIPTeleconferenceSystem Teck-KuenChua and DavidC.Pheanis 4:30-4:50 An Improved Feature Selection using Maximized Signal to Noise Ratio Technique for TC K. Lakshmi, Saswati Mukherjee 4:50-5:10 Mixed Noise Correction in Gray Images using Fuzzy Filters M. Hanmandlu, Anuj K. Tiwari, Vamsi K. Madasu and Shantaram Vasikarla 5:10-5:30 Parameterized FIR Filtering IP Cores for reusable SoC Design Umar Farooq, Muhammad Saleem, and Habibullah Jamal 6:00pm-6:30pm Award Ceremony (Location: Salon K) 6:45pm-7:30pm CASH BAR (Location: Toulouse Ballroom) 9 6:45pm-7:30pm CONFERENCE RECEPTION & DINNER (Location: Toulouse Ballroom) SESSION TC1 – POSTERS 9:30Am -11:30am (Location: Hallway ) A New Bucket Based Algorithm for Finding the LCS from Two Molecular Sequences Sam Rizvi, Jamia Millia, Pankaj Agarwal Performance-Guided Reconfiguration of Wireless Sensor Networks that Use Binary Data for Target Localization Parag P. Joshi, Thomas C. Jannett Key Pre-Distribution Using MDS Codes in Mobile Ad Hoc Networks Mohammad Al-Shurman and Seong-Moo yoo Key Management and Mutual Authentication for Multiple Field Records Smart Cards Kiarash Narimani Gordon B. Agnew Effectively implement AES for EFI/Tiano based on IA-32 Platform Chen, Tianzhou; He, Zhenjie; Hu, Wei FPGA based DPA-resistant Unified Architecture for Signcryption Yi Wang, Jussipekka Leiwo and Thambipillai Srikanthan ECC Hardware Coprocessors for 8-bit Systems and Power Consumption Considerations G. Bertoni - STMicroelectornics L. Breveglieri - Politecnico di Milano M. Venturi - Politecnico di Milano DES Decoding Using FPGA and Custom Instructions Tai-Chi Lee, Patrick Robinson, Richard Zeien, and Adom Roach A Comparative Study of Performance Measures for Information Retrieval Systems Xiannong Meng Automatically Classify Web Site by Multimembership Bayesian Approach Ssu-An Lo, Chong-Yen Lee, and Chun-Chieh Hsu SESSION TC2 – POSTERS 1:30pm - 3:30pm (Location: Hallway ) Express Risk Assessment through Web Access to Simulation Data Andrei Smirnov, Steven Rowan Contextual Events Framework in RFID System Mikyeong Moon, Youngbong Kim, Keunhyuk Yeom Dynamic Role Assignment Protocol for Pervasive Computing Akio Sashima, Noriaki Izumi, Koichi Kurumatani, Yoshiyuki Kotani SpamCooker: A Method for Deterring Unsolicited Electronic Communication Nathan Denny, Theodore Elhourani, Jaime Denny, Scott Bissmeyer, David Irby Storage of a Portal-Extracted Data in a Relational Database 10 Emmanuel Udoh and Jason Hoover Parallel algorithm for run length encoding Nikolay Manchev A Wide-band Digital Phase Locked Loop Shilpa Ambarish, Mahmoud Fawzy Wagdy Design of a 1GHz Digital PLL Using 0.18µm CMOS Technology Shilpa Ambarish, Mahmoud Fawzy Wagdy Intelligent Medical Search Engine by Knowledge Machine Narongrit Waraporn, Syed V. Ahamed An Investigation of Bad Smells in Object-Oriented Design Raed Shatnawi and Wei Li April 12, 2006 - Wednesday 7:00am-12:00pm: REGISTRATION (Second Floor, Conference Section) 7:30am - 8:30am: CONTINENTAL BREAKFAST PARALLEL SESSIONS: A SESSIONS (Salon L) SESSION WA1: BIOMETRIC/INTERNET CHAIR: Hisham Al-Mubaid, University of Houston, Clear Lake 8:00am -10:00am 8:00- 8:20 Biomedical Term Disambiguation: An Application to Gene-Protein Name Disambiguation Hisham Al-Mubaid and Ping Chen 8:20- 8:45 Development of an Integrated Framework for Protein Structure Determinations: A Logical Data Model for NMR Data Analysis Heidi J. C. Ellis, Susan Fox-Erlich, Timothy O. Martyn, Michael R. Gryk 8:45- 9:10 Diabetic e-Management System (DEMS) Kyle D. Lutes, Karen Chang, Ibrahim M. Baggili 9:10- 9:35 Similarity Analysis of Bone Mineral Density Measurements of Femur Sites Using Dendrogram Ray R, Hashemi, Alexander A. Tyler, Chris Childers, and Arthur Chausmer 9:35-10:00 Internet Accessing for IPv6 MANETs Yunlong Zhao, Chaoguang Men, and Zhenguo Gao 10:00-10:30 Coffee Break 11 SESSION WA2: GRID, PERVASIVE COMPUTING/E-GAMING CHAIR: Reuben Edwards, Lancaster University 10:30am -12:30pm 10:30-10:45 10:45-11:00 Adaptable Replica Consistency Service for Data Grids Ruay-Shiung Chang and Jih-Sheng Chang The Role of Collaboration Grids in the Roadmaps of Networked Organizations Žiga Turk 11:00-11:15 A Formal Specification of Interaction Widgets Hierarchy Framework L.J. Wang, A.S.M. Sajeev, L. Inchaiwong 11:15-11:30 On the Security of a Repaired Mental Poker Protocol Jordi Castellà-Roca, Josep Domingo-Ferrer and Francesc Sebé 11:30-11:50 Boosting Blackjack Returns with Machine Learned Betting Criteria Ron Coleman 11:50-12:10 Korean Text Chunk Identification using Support Vector Machines Sang-Soo Kim, Jeong-woo Son, Mi-hwa Kong, Seong-Bae Park, Sang-Jo Lee 12:10-12:30 Abstract Node Method for Integration of Object Oriented Design with Colored Petri Nets Bhushan E. Bauskar, Boleslaw Mikolajczak Conference Conclusion B SESSIONS (Salon K) SESSION WB1: DESIGN, PERFORMANCE ANALYSIS AND MODELING CHAIR: Mohsen Beheshti, California State University 8:00am -10:00am 8:00- 8:20 8:20- 8:40 Modeling and Simulation of Virtual warfare using virtual reality paradigm Saurabh Mukherjee NO SHOW A Performance Analysis of an Object-Oriented Processor YiYu Tan, K.M. Lo and Anthony S. Fong 8:40- 9:00 Utilizing XML Schema for Describing and Querying Still Image Databases Kazem Taghva, Min Xu, Emma Regentova, Tom Nartker 9:00- 9:20 ISRUP E-Service Framework for agile Enterprise Architecting Seyyed Mohsen Hashemi, Mohammad Reza Razzazi, Ali Bahrami 9:20- 9:40 Development of a Synthetic Data Set Generator for Building and Testing Information Discovery Systems Pengyue J. Lin, Behrokh Samadi, Daniel R. Jeske, Alan Cipilone, Sean Cox, 12 9:40-10:00 Carlos Rendon, Douglas Holt, Rui Xiao A Proposed Platform & Performance Estimation of Digital-Home Service Delivery/Management Systems Woo Lee, Ho-Jin Park, Kwang-Roh Park, Sang-Ha Kim 10:00-10:30 Coffee Break SESSION WB2: NETWORKS & HARDWARE CHAIR: Shantaram Vasikarla, American InterContinental University 10:30am -12:30pm 10:30-10:50 Baseline Profile Stability for Network Anomaly Detection Yoohwan Kim, Ju-Yeon Jo, Kyounghee Kim 10:50-11:10 Middleware as an Infrastructure for Network Applications Basim Alhadidi 11:10-11:30 Traffic Congestion Controller In Multihop Communication Network Tan Ee Xion, Hiew Pang Leang 11:30-11:50 Optimizing Network Data Transmission E. Earl Eiland Lorie Liebrock 11:50-12:10 A Fast-Locking Digital Phase-Locked Loop Mahmoud Fawzy Wagdy, Srishti Vaishnava 12:10-12:30 Nano Logic Circuits with Spin Wave Bus Alexander Khitun and Kang L. Wang Conference Conclusion END OF SCHEDULE………………………………………………………………….. 13