default search action
AICCSA 2007: Amman, Jordan
- 2007 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2007), 13-16 May 2007, Amman, Jordan. IEEE Computer Society 2007, ISBN 1-4244-1030-4
- Nabil R. Adam:
Keynote Speech 1: Secure Information Sharing and Dissemination in the Context of Public Security. - Abbas Jamalipour:
Keynote Speech 2: Routing Techniques in Wireless Sensor Networks. - Krzysztof Pawlikowski:
Keynote Speech 3: Discrete-Event Computer Simulation as a Paradigm of Scientific Investigations. - António Ferrolho, Manuel M. Crisóstomo:
Single Machine Total Weighted Tardiness Problem with Genetic Algorithms. 1-8 - Evelio J. González, Alberto F. Hamilton, Lorenzo Moreno Ruiz, Juan A. Méndez, G. N. Marichal, José F. Sigut, Marta Sigut, Jonatán Felipe:
Intelligent Agents and Apache Cocoon for a CV Generation System. 9-15 - Samer Hanna, Malcolm Munro:
An Approach for Specification-based Test Case Generation for Web Services. 16-23 - Liangli Ma, Houxiang Wang, Yongjie Li:
Construct Metadata Model based on Coupling Information to Increase the Testability of Component-based Software. 24-31 - Liangli Ma, Houxiang Wang, Yongjie Li:
A Reference Model of Grouped-Metadata Object and a Change Model based on it Appling for Component-based Software Integration Testing. 32-39 - Dapeng Liu, Shaochun Xu, Zhongyuan Liu:
An Eclipse Plug-in: Dependency Browser. 40-46 - Hong Xiao, Di Wu:
A Component Model for Network Processor Based System. 47-50 - Walid Abdelmoez, Katerina Goseva-Popstojanova, Hany H. Ammar:
Using Maintainability Based Risk Assessment and Severity Analysis in Prioritizing Corrective Maintenance Tasks. 51-58 - Islam A. M. El-Maddah, Walid Abdelmoez, Hany H. Ammar:
Towards Maintainable Architecture for Process Control Applications. 59-66 - Steve Counsell, Robert M. Hierons, George Loizou:
A Meta-analysis Approach to Refactoring and XP. 67-75 - Yacine Kissoum, Zaïdi Sahnoun:
A Formal Approach for Functional and Structural Test Case Generation in Multi-Agent Systems. 76-83 - Amina Bouraoui:
Component based development of non-visual applications using braille-speech widgets. 84-91 - Zahra J. Muhsin, Ali Husein El-Mousa, Ian Potts:
Development of a Web Based Database-Centric Workflow Management System Using Rapid Prototyping Approach. 92-99 - Mxolisi Mtshali, G. E. Ojong, Matthew O. Adigun:
SERP: Scalable Efficient Reservation Protocol for the Future Internet. 100-107 - Mahdi Kefayati, Mohammad Sadegh Talebi, Hamid R. Rabiee, Babak Hossein Khalaj:
On Secure Consensus Information Fusion over Sensor Networks. 108-115 - Alá F. Khalifeh, Ali Husein El-Mousa:
QoS Routing of VoIP using a Modified Widest-Shortest Routing Algorithm. 116-123 - Yazeed Al-Obaisat, Robin Braun:
A Multi-Agent Flexible Architecture for Autonomic Services and Network Management. 124-131 - Yazeed Al-Obasiat, Robin Braun:
A Multi-Agent Flexible Architecture for Autonomic Services and Network Management. 132-138 - Z. Mulhi-Eldeen, Miqdad Al-Nuaimi, Jürgen Richter, Leonidas P. Ivrissimtzis:
Performance Analysis of Reflection Paths for Millimeter Wavelength Systems. 139-145 - Ashraf D. Milhim, Yaw-Chung Chen:
An Adaptive Polling Scheme to Improve Voice Transmission over Wireless LANs. 146-152 - Amgad Madkour, Sherif G. Aly:
Resource Sharing Systems: A Combinatorial Application to Pervasive Computing. 153-157 - Ahed Alshanyour, Ashraf S. Hasan Mahmoud, Tarek R. Sheltami, Salman AlQahtani:
Packet Reservation Multiple Access (PRMA) with Random Contention. 158-164 - Yue-Xiang Yang, Rui Wang, Yang Liu, Shang-zhen Li, Xiao-yong Zhou:
Solving P2P Traffic Identification Problems Via Optimized Support Vector Machines. 165-171 - Amor Lazzez, Noureddine Boudriga, Mohammad S. Obaidat, Sihem Guemara-ElFatmi:
A QoS-Oriented Protocol for Burst Admission Control in OBS Networks. 172-179 - Narjess Ayari, Denis Barbaron, Laurent Lefèvre, Pascale Primet:
Session awareness issues for next generation cluster based network load balancing frameworks. 180-186 - Basela S. Hasan, Mohammad A. Khamees, Ashraf S. Hasan Mahmoud:
A Heuristic Genetic Algorithm for the Single Source Shortest Path Problem. 187-194 - Mahmoud Taifour, Farid Naït-Abdesselam, David Simplot-Ryl:
RC-MAC: Reduced Collision MAC for Bandwidth Optimization in Wireless Local Area Networks. 195-202 - Haïdar Safa, Hassan Artail, Marcel Karam, Rawan Soudah, Samar Khayat:
New Scheduling Architecture for IEEE 802.16 Wireless Metropolitan Area Network. 203-210 - Nesrine Ouferhat, Abdelhamid Mellouk:
A QoS Scheduler Packets for Wireless Sensor Networks. 211-216 - Adil Jaffer, Muhammad Jaseemuddin, Mandana Jafarian, Hesham El-Sayed:
Event Boundary Detection Using Autonomous Agents in a Sensor Network. 217-224 - Veerendra Tippanagoudar, Imad Mahgoub, Ahmed Badi:
Implementation of the Sensor-MAC Protocol for the JiST/SWANS Simulator. 225-232 - Yassine Ramadhane Khlifi, Noureddine Boudriga, Mohammad S. Obaidat:
Congestion Avoidance Mechanism for Optical Label Switched Networks: A Dynamic QoS-based Approach. 233-240 - Saeed O. Al Mehairi, Hassan R. Barada, Mahmoud Al-Qutayri:
Integration of Technologies for Smart Home Application. 241-246 - Mohammad Reza Zoghi, Mohammad Hossein Kahaei:
Using Modified Conditional Second-Order Statistics in Blind Source Separation in Noisy Environment. 247-251 - Mohamed Hamdi, Ramzi Bellazreg, Noureddine Boudriga:
Doppler Effect on Location-Based Tracking in Mobile Sensor Networks. 252-257 - Ismat K. Maarouf, A. R. Naseer:
WSNodeRater - An Optimized Reputation System Framework for Security Aware Energy Efficient Geographic Routing in WSNs. 258-265 - Amor Lazzez, Noureddine Boudriga, Mohammad S. Obaidat:
A Novel Scheme for Traffic Monitoring in Optical Burst-Switched Networks. 266-273 - Zahy Abou-Atme, Nabeel Sulieman, Leila El-Aawar, Zaher Dawy:
A New Class of Services for Mobile Devices using Bluetooth Connectivity. 274-280 - Mohammad Ghaem Tajgardoon, Mohammad Hassan Tajgardoon:
The Performance Evaluation of a Local Transaction Service in support of Juxtaposed CORBA Components. 281-284 - Ali Al Mazari, Albert Y. Zomaya, Michael A. Charleston, Roger J. Garsia:
A Novel Algorithm for Adaptive and Neutral Evolutionary Patterns Associated with HIV Drug Resistance. 285-292 - Guoqing Dong, Weiqin Tong:
MA-GMA: A Mobile Agent-based Grid Monitor Architecture. 293-300 - Nabil Hasasneh, Ian M. Bell, Chris R. Jesshope:
High Level Modelling and Design For a Microthreaded Scheduler to Support Microgrids. 301-308 - Mohanned Momani, Jamil Faraj:
A Novel Algorithm to Extract Tri-Literal Arabic Roots. 309-315 - Fouad B. Chedid:
Knowledge Versus Information Contents. 316-323 - Mahdi Zargarnataj:
New Election Algorithm based on Assistant in Distributed Systems. 324-331 - Syed Zubair Ahmad, Muhammad Abdul Qadir:
Terminal Mobility Services in the Middleware Environment. 332-335 - Abdesslem Layeb, Abdel Hakim Deneche:
Multiple Sequence Alignment by Immune Artificial System. 336-342 - Sina Meraji, Abbas Nayebi, Hamid Sarbazi-Azad:
Simulation-Based Performance Evaluation of Deterministic Routing in Necklace Hypercubes. 343-350 - Ali Elghirani, Albert Y. Zomaya, Riky Subrata:
An Intelligent Replication Framework for Data Grids. 351-358 - Valery Sklyarov, Iouliia Skliarova:
Encoding Algorithms for Logic Synthesis. 359-366 - Faisal N. Abu-Khzam, Nagiza F. Samatova, Mohamad A. Rizk, Michael A. Langston:
The Maximum Common Subgraph Problem: Faster Solutions via Vertex Cover. 367-373 - Emad A. El-Sebakhy, Iputu Raharja, S. Adem, Yaman Khaeruzzaman:
Neuro-Fuzzy Systems Modeling Tools for Bacterial Growth. 374-380 - Rose Al Qasim, Taisir Eldos:
Population Sizing Scheme for Genetic Algorithm. 381-384 - Majid A. Al-Taee, Omar B. Khader, Nabeel A. Al-Saber:
Remote Monitoring of Vehicle Diagnostics and Location Using a Smart Box with Global Positioning System and General Packet Radio Service. 385-388 - Miao Liu, Hai-Feng Guo, Zhengxin Chen:
On Multi-Relational Data Mining for Foundation of Data Mining. 389-395 - Morteza Abbaszadeh Meinagh, Ayaz Isazadeh, Bager Zarei, Mehdi Zarei:
Database Replication: AvailAbility aind Consistency Astsrance via Stream Processing. 396-403 - Javad Safaei, Hamid Beigy:
Quine-McCluskey Classification. 404-411 - Ali-Asghar Safaei, Mehran Kamali, Mostafa Haghjoo, Kamyar Izadi:
Caching Intermediate Results for Multiple-Query Optimization. 412-415 - Malik Shahzad Kaleem Awan, Mian M. Awais:
Data Mining - Redefining the Boundaries. 416-423 - Russel Pears, Sangeetha Kutty:
FGC: An Efficient Constraint Based Frequent Set Miner. 424-431 - Hamad Alhammady:
Mining Streaming Emerging Patterns from Streaming Data. 432-436 - Hamad Alhammady:
Weighted Naive Bayesian Classifier. 437-441 - Mohamed T. Elhadi, Wojciech Ziarko:
Use of Rough Sets for the Identification and Analysis of Dependencies and Relationships in Biocontrol of Weeds. 442-449 - Kamyar Izadi, Fatemeh Asadi, Mostafa S. Haghjoo:
XPLC: A Novel Protocol for Concurrency Control in XML Databases. 450-453 - Lara Srour, Ayman I. Kayssi, Ali Chehab:
Personalized Web Page Ranking Using Trust and Similarity. 454-457 - Wasfi G. Al-Khatib, S. A. Shahab, Sabri A. Mahmoud:
Digital Library Framework for Arabic Manuscripts. 458-465 - Faycal Bensaali, Abbes Amira, Reza Sotudeh:
Floating-Point Matrix Product on FPGA. 466-473 - Mahnoush Rouholamini, Omid Kavehei, Amir-Pasha Mirbaha, Somaye Jafarali Jasbi, Keivan Navi:
A New Design for 7: 2 Compressors. 474-478 - Saeid Gorgin, Amir Kaivani:
Reversible Barrel Shifters. 479-483 - Michael Georg Grasser, Johannes Priebsch, Georg Hofer, Thomas Hodanek:
Simulation of a Secure CPU with SecureTag Technique to Defend Embedded Systems Against Buffer Overflow Attacks. 484-491 - Salah Merniz, Mohamed Benmohammed:
A Methodology for the Formal Verification of RISC Microprocessors A Functional Approach. 492-499 - Mohammad Hossein Neishaburi, Masoud Daneshtalab, Majid Nabi, Siamak Mohammadi:
System Level Voltage Scheduling Technique Using UML-RT Model. 500-505 - Matthias Grumer, Manuel Wendt, Christian Steger, Reinhold Weiss, Ulrich Neffe, Andreas Mühlberger:
Automated Software Power Optimization for Smart Card Systems with Focus on Peak Reduction. 506-512 - Sohaib Majzoub, Hassan B. Diab:
Mapping and Performance Analysis of Lookup Table Implementations on Reconfigurable Platform. 513-520 - M. Teresa Higuera-Toledano:
Towards an Extension of Real-Time Java Supporting Several Multimedia Applications. 521-527 - Mohammad Hossein Neishaburi, Masoud Daneshtalab, Mohammad Reza Kakoee, Saeed Safari:
Improving Robustness of Real-Time Operating Systems (RTOS) Services Related to Soft-Errors. 528-534 - M. Hosseinpour, M. N. Ranjbar, M. Mousavinejad:
Speech Unit Selection Based on Matching Pursuit. 535-538 - Iouliia Skliarova, Valery Sklyarov:
Software/Configware Implementation of Combinatorial Algorithms. 539-546 - Syed Misbahuddin, Nizar Al-Holou:
Improving Inter-processor Data Transfer Rates over Industrial Networks. 547-553 - Hadda Cherroun, Paul Feautrier:
An Exact Resource Constrained-Scheduler using Graph Coloring technique. 554-561 - Mohammad S. Sharawi, Oleksiy V. Korniyenko:
Software Defined Radios: A Software GPS Receiver Example. 562-565 - Nedal Al-Hanbali, Balqies Sadoun:
3D GIS Modeling of BAU: Planning Prospective and Implementation Aspects. 566-571 - Balqies Sadoun, Nedal Al-Hanbali:
Three Dimensional (3D) GIS Modeling for High Buildings and Applications. 572-577 - Balqies Sadoun, Omar Al-Bayari:
LBS and GIS Technology Combination and Applications. 578-583 - Gabriel Ibarra-Berastegi, Ana Elias, R. Arias, Astrid Barona:
Artificial Neural Networks vs Linear Regression in a Fluid Mechanics and Chemical Modelling Problem: Elimination of Hydrogen Sulphide in a Lab-Scale Biofilter. 584-587 - Adnan Al-Smadi:
AR Model Identification Using Higher Order Statistics. 588-591 - Maytham Safar, Mohammad Taha, Sami Habib:
Modeling the Communication Problem in Wireless Sensor Networks as a Vertex Cover. 592-598 - Alireza Khosravi, Aliakbar Jalali, Hamed Mojallali:
Robust Control Design for a Wind Turbine-Induction Generator Unit. 599-602 - Pejman Mowlaee, Mahdi Orooji, Mohammad Hossein Kahaei:
Removing the GSC Noise Reduction deficiencies in Reverberant Environments by Proposing Joint AEC-GSC algorithm. 603-610 - Sami Arayssi, Marc Akl, Sami Abou Saab, Zaher Dawy:
SiMBCN: An Interactive Simulation Tool for Multihop Based Cellular Networks. 611-618 - Maryam Fanaeepour, Leila Naghavian, Mohammad Abdollahi Azgomi:
Modeling and Evaluation of Call Centers with GSPN Models. 619-622 - Hind Castel, Lynda Mokdad, Nihal Pekergin:
Loss rates bounds in IP buffers by Markov chains aggregations. 623-630 - Salman AlQahtani, Ashraf S. Hasan Mahmoud, Ahed Alshanyour:
Performance Evaluation and Analytical Modeling of Novel Dynamic Call Admission Control Scheme for 3G and Beyond Cellular Wireless Networks. 631-638 - Kyumars Sheykh Esmaili, Hassan Abolhassani, Mahmood Neshati, Ehsan Behrangi, Asreen Rostami, Mojtaba Mohammadi Nasiri:
Mahak: A Test Collection for Evaluation of Farsi Information Retrieval Systems. 639-644 - Ahmad Estabraghy, Darren Dalcher:
A Controlled Experiment to Investigate the Effect of 'Process Patterns' on the Quality of Requirement Analysis. 645-649 - Muhammad T. Anan, Ghulam M. Chaudhry, Jihad Qaddour:
Performance Evaluation of an Ultra-Fast Pipeline Scheduler for Next-Generation Networks. 650-654 - Mostafa Shaad Zolpirani, Mohammad-Mahdi Bidmeshki, Seyed Ghassem Miremadi:
The Effect of Routing-Update Time on Network's Performability. 655-658 - Saida Ziane, Abdelhamid Mellouk:
A QoS Adaptive Multi-path Reinforcement Learning Routing Algorithm for MANET. 659-664 - Youness Aliyari Ghassabeh, Nosratallah Forghani, Mohamad Forouzanfar, Mohammad Teshnehlab:
MRI Fuzzy Segmentation of Brain Tissue Using IFCM Algorithm with Genetic Algorithm Optimization. 665-668 - Mehrtash Tafazzoli Harandi, Majid Nili Ahmadabadi, Babak Nadjar Araabi:
A Hierarchical Face Identification System Based on Facial Components. 669-675 - Ali E. Hameed, Majid A. Alwan:
Robustness-Conserved Partially Host-Adaptive Watermarking Using a Baseband-Spread Spectrum Coding Technique. 676-683 - Liquan Shen, Zhi Liu, Zhaoyang Zhang, Guozhong Wang:
A novel algorithm to fast mode decision with consideration about video texture in H.264. 684-687 - Alireza Ahmadyfard, Masoud S. Nosrati:
A Novel Approach for Fingerprint Singular Points Detection Using 2D-Wavelet. 688-691 - Mohammad Khansari, Hamid R. Rabiee, Majid Asadi, Mohammed Ghanbari:
Occlusion Handling for Object Tracking in Crowded Video Scenes Based on the Undecimated Wavelet Features. 692-699 - Zouhir Zemirli, Salima Khabet, M'hamed Mosteghanem:
An effective model of stressing in an Arabic Text To Speech System. 700-707 - Liquan Shen, Zhi Liu, Zhaoyang Zhang, Guozhong Wang:
Video nature considerations for multi-frame selection algorithm in H.264. 708-711 - Hasan R. Obeid, Rached N. Zantout:
License Processing: Recognizing Characters in License Plates. 712-716 - Meysam Torabi, Hassan Moradzadeh, Reza Vaziri, Reza Dehestani Ardekani, Emad Fatemizadeh:
Multiple Sclerosis Diagnosis Based on Analysis of Subbands of 2-D Wavelet Transform Applied on MR-images. 717-721 - ZhiPing Xu, Shiyong Zhang, YiPing Zhong:
Artificial Visual Cortical Responding Model in Image Semantic Processing. 722-725 - Alireza Aminlou, Maryam Homayouni, Mohammad Hossein Neishaburi, Siamak Mohammadi:
A Superior Low Complexity Rate Control Algorithm. 726-729 - Muhammad Sarfraz, Ahmad Ridha:
Content-based Image Retrieval using Multiple Shape Descriptors. 730-737 - Javed Ahmed Mahar, Mohammad Khalid Khan, Mumtaz Hussain Mahar:
Off-Line Signature Verification of Bank Cheque Having Different Background Colors. 738-745 - Bilal Al Momani, Sally I. McClean, Philip J. Morrow:
Incorporating Knowledge into Unsupervised Model-Based Clustering for Satellite Images. 746-753 - Mohamed Al Baloshi, Mohammed E. Al-Mualla:
A DCT-Based Watermarking Technique for Image Authentication. 754-760 - Ali Broumandnia, Jamshid Shanbehzadeh, M. Nourani:
Segmentation of Printed Farsi/Arabic Words. 761-766 - Ali Broumandnia, Jamshid Shanbehzadeh, M. Nourani:
Handwritten Farsi/Arabic Word Recognition. 767-771 - M. A. Suhail, Mohammad S. Obaidat:
Security Enhancement for Watermarking Technique Using Content based Image Segmentation. 772-780 - Tienfuan Kerh, J. S. Lai, David J. Gunaratnam, R. Saunders:
Neural Network Examination on Seismic Design Values in the Building Code of Taiwan. 781-785 - Man Sun Kim, HyungJeong Yang:
A Study of ECG Characteristics by Using Wavelet and Neural Networks. 786-790 - Yahya H. Zweiri, Lakmal D. Seneviratne:
Diesel Engine Indicated Torque Estimation Based on Artificial Neural Networks. 791-798 - Saeed Parsa, Morteza Damanafshan:
Seamless Secure Development of Systems: From Modeling to Enforcement of Access Control Policies. 799-806 - Hassan Takabi, Morteza Amini, Rasool Jalili:
Trust-Based User-Role Assignment in Role-Based Access Control. 807-814 - Mohsen Sharifi, Mohammad Zoroufi, Alireza Saberi:
How to Counter Control Flow Tampering Attacks. 815-818 - El-Sayed M. El-Alfy, Shokri Z. Selim:
On Optimal Firewall Rule Ordering. 819-824 - Amel Meddeb-Makhlouf, Mohamed Hamdi, Noureddine Boudriga:
Structuring a Multi-violation Detectors Database for an Efficient Intrusion Detection. 825-832 - Camille Gaspard, Batoul Haidar, Ayman I. Kayssi, Ali Chehab:
SmartSSL: Efficient Policy-Based Web Security. 833-839 - Nejla Essaddi, Mohamed Hamdi, Noureddine Boudriga:
Sensor Activity Scheduling for Efficient WSN-based Tracking. 840-847 - Mohamed Amine Bentaallah, Mimoun Malki:
WordNet based Cross-Language Text Categorization. 848-855 - Amar Balla:
An Educational Asynchronous Learning Environment. 856-859 - Taihua Li, Yuhui Qiu, Peng Yue, Guoxiang Zhong:
Exploiting Model of Personality and Emotion of Learning Companion Agent. 860-865 - Esma Aïmeur, Flavien Serge Mani Onana, Anita Saleman:
HELP: A Recommender System to Locate Expertise in Organizational Memories. 866-874 - Katerina Papanikolaou, Stephanos Mavromoustakos:
Developing Quality Games-based e-Learning Systems. 875-879 - Narayan C. Debnath, Ana Gabriela Garis, Daniel Riesco, German Montejano:
Defining OCL constraints for the Proxy Design Pattern Profile. 880-885 - Narayan C. Debnath, Aristides Dasso, Ana Funes, Robert Uzal, Jose Paganini:
E-government Services Offerings Evaluation Using Continuous Logic. 886-892 - Haïdar Safa, Hassan Artail, Marcel Karam, Hala Ollaic, Rasha Abdallah:
HAODV: a New Routing Protocol to Support Interoperability in Heterogeneous MANET. 893-900 - Marcel Karam, Haïdar Safa, Hassan Artail:
An Abstract Workflow-Based Framework for Testing Composed Web Services. 901-908 - Walter Dosch:
Formal Design of a Parameterized Synchronization Component for Asynchronous Communication Streams. 909-916 - Mohamed Boukhebouze, Rami Rifaieh, Aïcha-Nabila Benharkat, Youssef Amghar:
Benchmarking XML-Schema Matching Algorithms for Improving Automated Tuning. 917-925 - Ismail Ababneh:
A Performance Comparison of Contiguous Allocation Placement Schemes for 2D Mesh-connected Multicomputers. 926-933 - Saad Bani-Mohammad, Mohamed Ould-Khaoua, Ismail Ababneh, Lewis M. Mackenzie:
An Efficient Processor Allocation Strategy that Maintains a High Degree of Contiguity among Processors in 2D Mesh Connected Multicomputers. 934-941 - Proshanta Saha, Tarek A. El-Ghazawi:
Applications of Heterogeneous Computing in Hardware/Software Co-Scheduling. 942-949
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.