By Topic

Third International Conference on Information Technology: New Generations (ITNG'06)

Date 10-12 April 2006

Filter Results

Displaying Results 1 - 25 of 141
  • Third International Conference on Information Technology: New Generations - cover

    Publication Year: 2006, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (37 KB)
    Freely Available from IEEE
  • Third International Conference on Information Technology: New Generations - title

    Publication Year: 2006, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (47 KB)
    Freely Available from IEEE
  • Third International Conference on Information Technology: New Generations - copyright

    Publication Year: 2006, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (54 KB)
    Freely Available from IEEE
  • Third International Conference on Information Technology: New Generations - toc

    Publication Year: 2006, Page(s):v - xiv
    Request permission for commercial reuse | PDF file iconPDF (77 KB)
    Freely Available from IEEE
  • General Chair's message

    Publication Year: 2006, Page(s): xv
    Request permission for commercial reuse | PDF file iconPDF (85 KB) | HTML iconHTML
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2006, Page(s): xvi
    Request permission for commercial reuse | PDF file iconPDF (24 KB)
    Freely Available from IEEE
  • Six Sigma in Education: To Achieve Overall Excellence in the Field of Education

    Publication Year: 2006, Page(s):2 - 5
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (153 KB) | HTML iconHTML

    The purpose of this paper is to explore the fundamentals of six sigma and its use in education. Six sigma is a set of methodologies used by businesses to achieve extremely low failure rates in any process. Similarly it can be used to achieve overall excellence in the field of education. Six sigma is a unified approach to process excellence. The strategy that has to be applied in today's educationa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hiring the IT Graduate: What's in the Box?

    Publication Year: 2006, Page(s):6 - 10
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (166 KB) | HTML iconHTML

    An effort has recently concluded for developing recommended information technology (IT) curricula and accreditation standards. This paper addresses what industry can expect from graduates of programs utilizing these guidelines. It addresses the knowledge, skills and abilities, as well as the philosophy, of graduates of IT bachelor degree programs. It also provides industry with methods by which th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implications of IT in Different Professions

    Publication Year: 2006, Page(s):11 - 19
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (190 KB) | HTML iconHTML

    Development of information systems and IT are continuously ongoing in almost every company and organisation. More and more IT development is performed in organisations characterised by professional work. Two studies are performed to point out two types of professions. One study is carried out at an airbase within the Swedish Air Force and one study is done in a health care organisation in Sweden. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Decoupling Security Concerns in Web Services Using Aspects

    Publication Year: 2006, Page(s):20 - 27
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (288 KB) | HTML iconHTML

    This paper discusses the aspect-oriented framework for Web services (AoF4WS) that supports on-demand context-sensitive security in Web services. Flexible security schemes are needed in many Web services applications where authentication, authorization, etc., can no longer be used in their current form. Security mechanisms are to be customized to the continuously changing requirements of Web servic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integrated Collections: Approach to Software Component Reuse

    Publication Year: 2006, Page(s):28 - 33
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (176 KB) | HTML iconHTML

    Software reuse has yet to offer well-defined methodologies and mature technologies for developing applications with reuse. Implementing a successful reuse initiative to realize the perceived benefits of reuse requires initial investment that makes the cost of reuse prohibitive for many organizations. The most common form of reusable assets is source code. In some estimates, domain-specific compone... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Agglomerative Clustering Methodology For Data Imputation

    Publication Year: 2006, Page(s):34 - 39
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (189 KB) | HTML iconHTML

    The prediction of accurate effort estimates from software project data sets still remains to be a challenging problem. Major amounts of data are frequently found missing in these data sets that are utilized to build effort/cost/time prediction models. Current techniques used in the industry ignore all the missing data and provide estimates based on the remaining complete information. Thus, the ver... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cost Implications of Software Commonality and Reuse

    Publication Year: 2006, Page(s):40 - 45
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (212 KB) | HTML iconHTML

    Commonality of requirements and reuse of code are two properties of software systems which can potentially reduce development and maintenance costs. This paper provides a possible definition for commonality and reuse and analyzes their impact on maintenance and replacement cost estimations based on the software engineering literature. Eventually, research questions are formulated to guide the empi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On OO Design Consistency in Iterative Development

    Publication Year: 2006, Page(s):46 - 51
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (203 KB) | HTML iconHTML

    In agile software development practices, the system evolves iteratively but does so in a manner consistent with its design rationale. Evolution often begins with last known design representation because it provides a high level view of the system that is easy to understand. However, the impact of a design change is poorly understood in terms of it's effect on consistency of design. In fact, design... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reliable Deployment of Component-based Applications into Distributed Environments

    Publication Year: 2006, Page(s):52 - 57
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (333 KB) | HTML iconHTML

    Software deployment process is a sequence of related activities for installing an already developed application into its target environment, and bringing it into an executing state. For complex component-based applications that should be deployed into a large distributed environment, several deployment configurations are typically possible. These deployment configurations can have significant impa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modular Model of a Logic Circuit Using Object-Oriented Programming

    Publication Year: 2006, Page(s):58 - 65
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (174 KB) | HTML iconHTML

    This paper presents a case study on a logic circuit model using object-oriented programming. For this purpose a modular model is used, which maps the structure of a logic circuit. Model is created as a set of C++ objects. A module in the logic circuit structure has the corresponding object in the model. The C++ objects also implement an event-driven algorithm of simulation View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Language for Writing Formal Software Specifications: The Library Problem Revisited

    Publication Year: 2006, Page(s):66 - 71
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (188 KB) | HTML iconHTML

    The quality of software depends mainly on the effectiveness of the software development paradigm. Existing software development paradigms are not flexible and practical enough for developing a system that needs the mix of existing paradigms used in the production of that system. This paper presents a formal specification language, called TUG, to support a system to be developed through an integrat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A First Draft of RATF: A Method Combining Robustness Analysis and Technology Forecasting

    Publication Year: 2006, Page(s):72 - 77
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (205 KB) | HTML iconHTML

    This paper is based on an extensive study performed on a large software suite for over a decade. From the experiences derived from this study we created a first draft of a method combining an extended robustness analysis (RA) method with the future oriented method of technology forecasting (TF). In this method TF provides information about the systems future evolution to the RA which then generate... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Studying Software Implementations of Elliptic Curve Cryptography

    Publication Year: 2006, Page(s):78 - 83
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (202 KB) | HTML iconHTML

    Elliptic curve cryptography (ECC) provides a similar level of security to conventional integer-based public-key algorithms, but with much shorter keys. ECC over binary field is of special interest because the operations in binary field are thought more space and time efficient. However, the software implementations of ECC over binary field are still slow, especially on low-end processors that are ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Novel Approach for Remote Energy Meter Reading Using Mobile Agents

    Publication Year: 2006, Page(s):84 - 89
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (284 KB) | HTML iconHTML

    Power or energy meter systems can be incorporated with embedded controllers such as micro Web-servers with Ethernet port to transmit the reader data over the Internet. Such data can be then fed and integrated into existing energy management systems located at power companies and organizations. The problem of efficiently collecting data from a large number of distributed embedded Web-servers in the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RL-Agent That Learns in Collaborative Virtual Environment

    Publication Year: 2006, Page(s):90 - 95
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (298 KB) | HTML iconHTML

    Today, collaborative virtual environments consider intelligent software agents as essential part of the environment. In these environments, there is a need of agents that have the ability to learn user actions, which are gained from the experience of interactions with the users. This learning capability will predict the future actions of the user and provide better solutions to them. Collaborative... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On History-Sensitive Models of Interactive Stacks

    Publication Year: 2006, Page(s):96 - 103
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (231 KB) | HTML iconHTML

    We model the behaviour of an interactive stack in the setting of history functions on different levels of abstraction. The component's internal state is systematically introduced as an abstraction of the input history. We explore different history abstractions and describe the corresponding history-sensitive models by state transition machines with input and output. The case study exemplifies a fo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New Algorithms For Random Access Text Compression

    Publication Year: 2006, Page(s):104 - 111
    Cited by:  Papers (1)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (189 KB) | HTML iconHTML

    Random access text compression is a type of compression technique in which there is a direct access to the compressed data. It facilitates to start decompression from any place in the compressed file, not necessarily from first. If any byte changed during transmission, the remaining data can be retrieved safely. In this paper, a try has been made to develop few algorithms for random access text co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integrating Non-Functional Properties to Architecture Specification and Analysis

    Publication Year: 2006, Page(s):112 - 117
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (187 KB) | HTML iconHTML

    Software architecture (SA) provides a formal basis to describe and analyze a software system as a collection of components and their interactions (connectors). However, the current understanding and specification for non-functional properties inside a software architecture are still insufficient. Most of today's architecture specification and analysis only support functional properties. They overl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Production and Maintenance of Content-Intensive Videogames: A Document-Oriented Approach

    Publication Year: 2006, Page(s):118 - 123
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (301 KB) | HTML iconHTML

    <e-Game> is a tool for the rapid development of adventure videogames with an educational purpose. It provides a markup language (the <e-Game> language) for structuring documents containing storyboards, and a processor (the <e-Game> engine) for executing games from these marked documents. This paper describes how <e-Game> facilitates new development models for the production... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.