


default search action
AICCSA 2007: Amman, Jordan
- 2007 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2007), 13-16 May 2007, Amman, Jordan. IEEE Computer Society 2007, ISBN 1-4244-1030-4

- Nabil R. Adam:

Keynote Speech 1: Secure Information Sharing and Dissemination in the Context of Public Security. - Abbas Jamalipour

:
Keynote Speech 2: Routing Techniques in Wireless Sensor Networks. - Krzysztof Pawlikowski:

Keynote Speech 3: Discrete-Event Computer Simulation as a Paradigm of Scientific Investigations. - António Ferrolho, Manuel M. Crisóstomo

:
Single Machine Total Weighted Tardiness Problem with Genetic Algorithms. 1-8 - Evelio J. González

, Alberto F. Hamilton
, Lorenzo Moreno Ruiz, Juan A. Méndez
, G. N. Marichal, José F. Sigut
, Marta Sigut, Jonatán Felipe
:
Intelligent Agents and Apache Cocoon for a CV Generation System. 9-15 - Samer Hanna, Malcolm Munro:

An Approach for Specification-based Test Case Generation for Web Services. 16-23 - Liangli Ma, Houxiang Wang, Yongjie Li:

Construct Metadata Model based on Coupling Information to Increase the Testability of Component-based Software. 24-31 - Liangli Ma, Houxiang Wang, Yongjie Li:

A Reference Model of Grouped-Metadata Object and a Change Model based on it Appling for Component-based Software Integration Testing. 32-39 - Dapeng Liu, Shaochun Xu, Zhongyuan Liu:

An Eclipse Plug-in: Dependency Browser. 40-46 - Hong Xiao, Di Wu:

A Component Model for Network Processor Based System. 47-50 - Walid Abdelmoez, Katerina Goseva-Popstojanova

, Hany H. Ammar:
Using Maintainability Based Risk Assessment and Severity Analysis in Prioritizing Corrective Maintenance Tasks. 51-58 - Islam A. M. El-Maddah, Walid Abdelmoez, Hany H. Ammar:

Towards Maintainable Architecture for Process Control Applications. 59-66 - Steve Counsell, Robert M. Hierons

, George Loizou:
A Meta-analysis Approach to Refactoring and XP. 67-75 - Yacine Kissoum

, Zaïdi Sahnoun:
A Formal Approach for Functional and Structural Test Case Generation in Multi-Agent Systems. 76-83 - Amina Bouraoui:

Component based development of non-visual applications using braille-speech widgets. 84-91 - Zahra J. Muhsin, Ali Husein El-Mousa, Ian Potts:

Development of a Web Based Database-Centric Workflow Management System Using Rapid Prototyping Approach. 92-99 - Mxolisi Mtshali, G. E. Ojong, Matthew O. Adigun

:
SERP: Scalable Efficient Reservation Protocol for the Future Internet. 100-107 - Mahdi Kefayati, Mohammad Sadegh Talebi, Hamid R. Rabiee

, Babak Hossein Khalaj:
On Secure Consensus Information Fusion over Sensor Networks. 108-115 - Alá F. Khalifeh

, Ali Husein El-Mousa:
QoS Routing of VoIP using a Modified Widest-Shortest Routing Algorithm. 116-123 - Yazeed Al-Obaisat, Robin Braun

:
A Multi-Agent Flexible Architecture for Autonomic Services and Network Management. 124-131 - Yazeed Al-Obasiat, Robin Braun

:
A Multi-Agent Flexible Architecture for Autonomic Services and Network Management. 132-138 - Z. Mulhi-Eldeen, Miqdad Al-Nuaimi, Jürgen Richter, Leonidas P. Ivrissimtzis:

Performance Analysis of Reflection Paths for Millimeter Wavelength Systems. 139-145 - Ashraf D. Milhim, Yaw-Chung Chen:

An Adaptive Polling Scheme to Improve Voice Transmission over Wireless LANs. 146-152 - Amgad Madkour, Sherif G. Aly

:
Resource Sharing Systems: A Combinatorial Application to Pervasive Computing. 153-157 - Ahed Alshanyour, Ashraf S. Hasan Mahmoud

, Tarek R. Sheltami
, Salman AlQahtani
:
Packet Reservation Multiple Access (PRMA) with Random Contention. 158-164 - Yue-Xiang Yang, Rui Wang

, Yang Liu, Shang-zhen Li, Xiao-yong Zhou:
Solving P2P Traffic Identification Problems Via Optimized Support Vector Machines. 165-171 - Amor Lazzez, Noureddine Boudriga, Mohammad S. Obaidat

, Sihem Guemara-ElFatmi:
A QoS-Oriented Protocol for Burst Admission Control in OBS Networks. 172-179 - Narjess Ayari, Denis Barbaron, Laurent Lefèvre, Pascale Primet:

Session awareness issues for next generation cluster based network load balancing frameworks. 180-186 - Basela S. Hasan, Mohammad A. Khamees, Ashraf S. Hasan Mahmoud

:
A Heuristic Genetic Algorithm for the Single Source Shortest Path Problem. 187-194 - Mahmoud Taifour, Farid Naït-Abdesselam, David Simplot-Ryl:

RC-MAC: Reduced Collision MAC for Bandwidth Optimization in Wireless Local Area Networks. 195-202 - Haïdar Safa, Hassan Artail, Marcel Karam, Rawan Soudah, Samar Khayat:

New Scheduling Architecture for IEEE 802.16 Wireless Metropolitan Area Network. 203-210 - Nesrine Ouferhat, Abdelhamid Mellouk:

A QoS Scheduler Packets for Wireless Sensor Networks. 211-216 - Adil Jaffer, Muhammad Jaseemuddin, Mandana Jafarian

, Hesham El-Sayed:
Event Boundary Detection Using Autonomous Agents in a Sensor Network. 217-224 - Veerendra Tippanagoudar, Imad Mahgoub

, Ahmed Badi:
Implementation of the Sensor-MAC Protocol for the JiST/SWANS Simulator. 225-232 - Yassine Ramadhane Khlifi, Noureddine Boudriga, Mohammad S. Obaidat

:
Congestion Avoidance Mechanism for Optical Label Switched Networks: A Dynamic QoS-based Approach. 233-240 - Saeed O. Al Mehairi, Hassan R. Barada

, Mahmoud Al-Qutayri:
Integration of Technologies for Smart Home Application. 241-246 - Mohammad Reza Zoghi, Mohammad Hossein Kahaei:

Using Modified Conditional Second-Order Statistics in Blind Source Separation in Noisy Environment. 247-251 - Mohamed Hamdi, Ramzi Bellazreg, Noureddine Boudriga:

Doppler Effect on Location-Based Tracking in Mobile Sensor Networks. 252-257 - Ismat K. Maarouf, A. R. Naseer:

WSNodeRater - An Optimized Reputation System Framework for Security Aware Energy Efficient Geographic Routing in WSNs. 258-265 - Amor Lazzez, Noureddine Boudriga, Mohammad S. Obaidat

:
A Novel Scheme for Traffic Monitoring in Optical Burst-Switched Networks. 266-273 - Zahy Abou-Atme, Nabeel Sulieman, Leila El-Aawar, Zaher Dawy:

A New Class of Services for Mobile Devices using Bluetooth Connectivity. 274-280 - Mohammad Ghaem Tajgardoon, Mohammad Hassan Tajgardoon:

The Performance Evaluation of a Local Transaction Service in support of Juxtaposed CORBA Components. 281-284 - Ali Al Mazari

, Albert Y. Zomaya
, Michael A. Charleston, Roger J. Garsia:
A Novel Algorithm for Adaptive and Neutral Evolutionary Patterns Associated with HIV Drug Resistance. 285-292 - Guoqing Dong, Weiqin Tong:

MA-GMA: A Mobile Agent-based Grid Monitor Architecture. 293-300 - Nabil Hasasneh, Ian M. Bell, Chris R. Jesshope:

High Level Modelling and Design For a Microthreaded Scheduler to Support Microgrids. 301-308 - Mohanned Momani, Jamil Faraj:

A Novel Algorithm to Extract Tri-Literal Arabic Roots. 309-315 - Fouad B. Chedid:

Knowledge Versus Information Contents. 316-323 - Mahdi Zargarnataj:

New Election Algorithm based on Assistant in Distributed Systems. 324-331 - Syed Zubair Ahmad, Muhammad Abdul Qadir

:
Terminal Mobility Services in the Middleware Environment. 332-335 - Abdesslem Layeb

, Abdel Hakim Deneche:
Multiple Sequence Alignment by Immune Artificial System. 336-342 - Sina Meraji, Abbas Nayebi, Hamid Sarbazi-Azad:

Simulation-Based Performance Evaluation of Deterministic Routing in Necklace Hypercubes. 343-350 - Ali Elghirani

, Albert Y. Zomaya
, Riky Subrata:
An Intelligent Replication Framework for Data Grids. 351-358 - Valery Sklyarov

, Iouliia Skliarova
:
Encoding Algorithms for Logic Synthesis. 359-366 - Faisal N. Abu-Khzam, Nagiza F. Samatova, Mohamad A. Rizk, Michael A. Langston:

The Maximum Common Subgraph Problem: Faster Solutions via Vertex Cover. 367-373 - Emad A. El-Sebakhy, Iputu Raharja, S. Adem, Yaman Khaeruzzaman:

Neuro-Fuzzy Systems Modeling Tools for Bacterial Growth. 374-380 - Rose Al Qasim, Taisir Eldos:

Population Sizing Scheme for Genetic Algorithm. 381-384 - Majid A. Al-Taee

, Omar B. Khader, Nabeel A. Al-Saber:
Remote Monitoring of Vehicle Diagnostics and Location Using a Smart Box with Global Positioning System and General Packet Radio Service. 385-388 - Miao Liu, Hai-Feng Guo, Zhengxin Chen:

On Multi-Relational Data Mining for Foundation of Data Mining. 389-395 - Morteza Abbaszadeh Meinagh, Ayaz Isazadeh, Bager Zarei

, Mehdi Zarei:
Database Replication: AvailAbility aind Consistency Astsrance via Stream Processing. 396-403 - Javad Safaei, Hamid Beigy

:
Quine-McCluskey Classification. 404-411 - Ali-Asghar Safaei, Mehran Kamali, Mostafa Haghjoo, Kamyar Izadi:

Caching Intermediate Results for Multiple-Query Optimization. 412-415 - Malik Shahzad Kaleem Awan, Mian M. Awais:

Data Mining - Redefining the Boundaries. 416-423 - Russel Pears, Sangeetha Kutty

:
FGC: An Efficient Constraint Based Frequent Set Miner. 424-431 - Hamad Alhammady:

Mining Streaming Emerging Patterns from Streaming Data. 432-436 - Hamad Alhammady:

Weighted Naive Bayesian Classifier. 437-441 - Mohamed T. Elhadi

, Wojciech Ziarko:
Use of Rough Sets for the Identification and Analysis of Dependencies and Relationships in Biocontrol of Weeds. 442-449 - Kamyar Izadi, Fatemeh Asadi, Mostafa S. Haghjoo:

XPLC: A Novel Protocol for Concurrency Control in XML Databases. 450-453 - Lara Srour, Ayman I. Kayssi, Ali Chehab

:
Personalized Web Page Ranking Using Trust and Similarity. 454-457 - Wasfi G. Al-Khatib

, S. A. Shahab, Sabri A. Mahmoud:
Digital Library Framework for Arabic Manuscripts. 458-465 - Faycal Bensaali

, Abbes Amira, Reza Sotudeh:
Floating-Point Matrix Product on FPGA. 466-473 - Mahnoush Rouholamini, Omid Kavehei

, Amir-Pasha Mirbaha, Somaye Jafarali Jasbi, Keivan Navi:
A New Design for 7: 2 Compressors. 474-478 - Saeid Gorgin

, Amir Kaivani:
Reversible Barrel Shifters. 479-483 - Michael Georg Grasser, Johannes Priebsch, Georg Hofer, Thomas Hodanek:

Simulation of a Secure CPU with SecureTag Technique to Defend Embedded Systems Against Buffer Overflow Attacks. 484-491 - Salah Merniz, Mohamed Benmohammed:

A Methodology for the Formal Verification of RISC Microprocessors A Functional Approach. 492-499 - Mohammad Hossein Neishaburi, Masoud Daneshtalab, Majid Nabi, Siamak Mohammadi

:
System Level Voltage Scheduling Technique Using UML-RT Model. 500-505 - Matthias Grumer, Manuel Wendt, Christian Steger

, Reinhold Weiss, Ulrich Neffe, Andreas Mühlberger:
Automated Software Power Optimization for Smart Card Systems with Focus on Peak Reduction. 506-512 - Sohaib Majzoub

, Hassan B. Diab:
Mapping and Performance Analysis of Lookup Table Implementations on Reconfigurable Platform. 513-520 - M. Teresa Higuera-Toledano:

Towards an Extension of Real-Time Java Supporting Several Multimedia Applications. 521-527 - Mohammad Hossein Neishaburi, Masoud Daneshtalab, Mohammad Reza Kakoee, Saeed Safari

:
Improving Robustness of Real-Time Operating Systems (RTOS) Services Related to Soft-Errors. 528-534 - M. Hosseinpour, M. N. Ranjbar, M. Mousavinejad:

Speech Unit Selection Based on Matching Pursuit. 535-538 - Iouliia Skliarova

, Valery Sklyarov
:
Software/Configware Implementation of Combinatorial Algorithms. 539-546 - Syed Misbahuddin, Nizar Al-Holou:

Improving Inter-processor Data Transfer Rates over Industrial Networks. 547-553 - Hadda Cherroun, Paul Feautrier:

An Exact Resource Constrained-Scheduler using Graph Coloring technique. 554-561 - Mohammad S. Sharawi

, Oleksiy V. Korniyenko:
Software Defined Radios: A Software GPS Receiver Example. 562-565 - Nedal Al-Hanbali, Balqies Sadoun:

3D GIS Modeling of BAU: Planning Prospective and Implementation Aspects. 566-571 - Balqies Sadoun, Nedal Al-Hanbali:

Three Dimensional (3D) GIS Modeling for High Buildings and Applications. 572-577 - Balqies Sadoun, Omar Al-Bayari

:
LBS and GIS Technology Combination and Applications. 578-583 - Gabriel Ibarra-Berastegi

, Ana Elias, R. Arias, Astrid Barona
:
Artificial Neural Networks vs Linear Regression in a Fluid Mechanics and Chemical Modelling Problem: Elimination of Hydrogen Sulphide in a Lab-Scale Biofilter. 584-587 - Adnan Al-Smadi:

AR Model Identification Using Higher Order Statistics. 588-591 - Maytham Safar, Mohammad Taha, Sami Habib:

Modeling the Communication Problem in Wireless Sensor Networks as a Vertex Cover. 592-598 - Alireza Khosravi, Aliakbar Jalali, Hamed Mojallali

:
Robust Control Design for a Wind Turbine-Induction Generator Unit. 599-602 - Pejman Mowlaee

, Mahdi Orooji
, Mohammad Hossein Kahaei:
Removing the GSC Noise Reduction deficiencies in Reverberant Environments by Proposing Joint AEC-GSC algorithm. 603-610 - Sami Arayssi, Marc Akl, Sami Abou Saab, Zaher Dawy:

SiMBCN: An Interactive Simulation Tool for Multihop Based Cellular Networks. 611-618 - Maryam Fanaeepour

, Leila Naghavian, Mohammad Abdollahi Azgomi
:
Modeling and Evaluation of Call Centers with GSPN Models. 619-622 - Hind Castel, Lynda Mokdad, Nihal Pekergin:

Loss rates bounds in IP buffers by Markov chains aggregations. 623-630 - Salman AlQahtani, Ashraf S. Hasan Mahmoud

, Ahed Alshanyour:
Performance Evaluation and Analytical Modeling of Novel Dynamic Call Admission Control Scheme for 3G and Beyond Cellular Wireless Networks. 631-638 - Kyumars Sheykh Esmaili, Hassan Abolhassani

, Mahmood Neshati, Ehsan Behrangi
, Asreen Rostami, Mojtaba Mohammadi Nasiri:
Mahak: A Test Collection for Evaluation of Farsi Information Retrieval Systems. 639-644 - Ahmad Estabraghy, Darren Dalcher

:
A Controlled Experiment to Investigate the Effect of 'Process Patterns' on the Quality of Requirement Analysis. 645-649 - Muhammad T. Anan, Ghulam M. Chaudhry, Jihad Qaddour:

Performance Evaluation of an Ultra-Fast Pipeline Scheduler for Next-Generation Networks. 650-654 - Mostafa Shaad Zolpirani, Mohammad-Mahdi Bidmeshki, Seyed Ghassem Miremadi:

The Effect of Routing-Update Time on Network's Performability. 655-658 - Saida Ziane, Abdelhamid Mellouk:

A QoS Adaptive Multi-path Reinforcement Learning Routing Algorithm for MANET. 659-664 - Youness Aliyari Ghassabeh, Nosratallah Forghani, Mohamad Forouzanfar

, Mohammad Teshnehlab:
MRI Fuzzy Segmentation of Brain Tissue Using IFCM Algorithm with Genetic Algorithm Optimization. 665-668 - Mehrtash Tafazzoli Harandi

, Majid Nili Ahmadabadi, Babak Nadjar Araabi
:
A Hierarchical Face Identification System Based on Facial Components. 669-675 - Ali E. Hameed

, Majid A. Alwan:
Robustness-Conserved Partially Host-Adaptive Watermarking Using a Baseband-Spread Spectrum Coding Technique. 676-683 - Liquan Shen, Zhi Liu

, Zhaoyang Zhang, Guozhong Wang:
A novel algorithm to fast mode decision with consideration about video texture in H.264. 684-687 - Alireza Ahmadyfard, Masoud S. Nosrati:

A Novel Approach for Fingerprint Singular Points Detection Using 2D-Wavelet. 688-691 - Mohammad Khansari, Hamid R. Rabiee

, Majid Asadi, Mohammed Ghanbari:
Occlusion Handling for Object Tracking in Crowded Video Scenes Based on the Undecimated Wavelet Features. 692-699 - Zouhir Zemirli, Salima Khabet, M'hamed Mosteghanem:

An effective model of stressing in an Arabic Text To Speech System. 700-707 - Liquan Shen, Zhi Liu

, Zhaoyang Zhang, Guozhong Wang:
Video nature considerations for multi-frame selection algorithm in H.264. 708-711 - Hasan R. Obeid, Rached N. Zantout

:
License Processing: Recognizing Characters in License Plates. 712-716 - Meysam Torabi, Hassan Moradzadeh, Reza Vaziri, Reza Dehestani Ardekani, Emad Fatemizadeh:

Multiple Sclerosis Diagnosis Based on Analysis of Subbands of 2-D Wavelet Transform Applied on MR-images. 717-721 - ZhiPing Xu, Shiyong Zhang, YiPing Zhong:

Artificial Visual Cortical Responding Model in Image Semantic Processing. 722-725 - Alireza Aminlou, Maryam Homayouni, Mohammad Hossein Neishaburi, Siamak Mohammadi

:
A Superior Low Complexity Rate Control Algorithm. 726-729 - Muhammad Sarfraz, Ahmad Ridha

:
Content-based Image Retrieval using Multiple Shape Descriptors. 730-737 - Javed Ahmed Mahar, Mohammad Khalid Khan, Mumtaz Hussain Mahar:

Off-Line Signature Verification of Bank Cheque Having Different Background Colors. 738-745 - Bilal Al Momani, Sally I. McClean

, Philip J. Morrow:
Incorporating Knowledge into Unsupervised Model-Based Clustering for Satellite Images. 746-753 - Mohamed Al Baloshi, Mohammed E. Al-Mualla

:
A DCT-Based Watermarking Technique for Image Authentication. 754-760 - Ali Broumandnia

, Jamshid Shanbehzadeh, M. Nourani:
Segmentation of Printed Farsi/Arabic Words. 761-766 - Ali Broumandnia

, Jamshid Shanbehzadeh, M. Nourani:
Handwritten Farsi/Arabic Word Recognition. 767-771 - M. A. Suhail, Mohammad S. Obaidat

:
Security Enhancement for Watermarking Technique Using Content based Image Segmentation. 772-780 - Tienfuan Kerh, J. S. Lai, David J. Gunaratnam, R. Saunders:

Neural Network Examination on Seismic Design Values in the Building Code of Taiwan. 781-785 - Man Sun Kim, HyungJeong Yang:

A Study of ECG Characteristics by Using Wavelet and Neural Networks. 786-790 - Yahya H. Zweiri

, Lakmal D. Seneviratne
:
Diesel Engine Indicated Torque Estimation Based on Artificial Neural Networks. 791-798 - Saeed Parsa

, Morteza Damanafshan:
Seamless Secure Development of Systems: From Modeling to Enforcement of Access Control Policies. 799-806 - Hassan Takabi, Morteza Amini

, Rasool Jalili:
Trust-Based User-Role Assignment in Role-Based Access Control. 807-814 - Mohsen Sharifi

, Mohammad Zoroufi, Alireza Saberi:
How to Counter Control Flow Tampering Attacks. 815-818 - El-Sayed M. El-Alfy

, Shokri Z. Selim
:
On Optimal Firewall Rule Ordering. 819-824 - Amel Meddeb-Makhlouf

, Mohamed Hamdi, Noureddine Boudriga:
Structuring a Multi-violation Detectors Database for an Efficient Intrusion Detection. 825-832 - Camille Gaspard, Batoul Haidar, Ayman I. Kayssi, Ali Chehab

:
SmartSSL: Efficient Policy-Based Web Security. 833-839 - Nejla Essaddi

, Mohamed Hamdi, Noureddine Boudriga:
Sensor Activity Scheduling for Efficient WSN-based Tracking. 840-847 - Mohamed Amine Bentaallah, Mimoun Malki

:
WordNet based Cross-Language Text Categorization. 848-855 - Amar Balla

:
An Educational Asynchronous Learning Environment. 856-859 - Taihua Li, Yuhui Qiu, Peng Yue, Guoxiang Zhong:

Exploiting Model of Personality and Emotion of Learning Companion Agent. 860-865 - Esma Aïmeur, Flavien Serge Mani Onana, Anita Saleman:

HELP: A Recommender System to Locate Expertise in Organizational Memories. 866-874 - Katerina Papanikolaou, Stephanos Mavromoustakos:

Developing Quality Games-based e-Learning Systems. 875-879 - Narayan C. Debnath, Ana Gabriela Garis, Daniel Riesco, German Montejano:

Defining OCL constraints for the Proxy Design Pattern Profile. 880-885 - Narayan C. Debnath, Aristides Dasso, Ana Funes, Robert Uzal, Jose Paganini:

E-government Services Offerings Evaluation Using Continuous Logic. 886-892 - Haïdar Safa, Hassan Artail, Marcel Karam, Hala Ollaic, Rasha Abdallah:

HAODV: a New Routing Protocol to Support Interoperability in Heterogeneous MANET. 893-900 - Marcel Karam, Haïdar Safa, Hassan Artail:

An Abstract Workflow-Based Framework for Testing Composed Web Services. 901-908 - Walter Dosch:

Formal Design of a Parameterized Synchronization Component for Asynchronous Communication Streams. 909-916 - Mohamed Boukhebouze, Rami Rifaieh, Aïcha-Nabila Benharkat, Youssef Amghar

:
Benchmarking XML-Schema Matching Algorithms for Improving Automated Tuning. 917-925 - Ismail Ababneh:

A Performance Comparison of Contiguous Allocation Placement Schemes for 2D Mesh-connected Multicomputers. 926-933 - Saad Bani-Mohammad, Mohamed Ould-Khaoua, Ismail Ababneh, Lewis M. Mackenzie:

An Efficient Processor Allocation Strategy that Maintains a High Degree of Contiguity among Processors in 2D Mesh Connected Multicomputers. 934-941 - Proshanta Saha, Tarek A. El-Ghazawi:

Applications of Heterogeneous Computing in Hardware/Software Co-Scheduling. 942-949

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














