| 
    Session 1a, Network Analysis  | 
 
  | 
    | 
  
  
    - Routing Tradeoffs inside 
    a d-Dimensional Torus with Applicability to CAN, M. Guirguis, A. Bestavros, 
    I. Matta
 
    - A Distributed Bandwidth-Guaranteed Routing Algorithm 
    for Point-to-Multipoint VPLS Virtual Connections, N. Abu Ali, H. Mouftah, S. 
    Gazor
 
   
   | 
 
  | 
   Session 1b, Image Processing Applications | 
   
  | 
    | 
  
  
    - An Efficient Face Region Detection for Video Indexing, 
    J. Kim, S. Lee, J. Baek
 
   
      | 
 
 
  | 
   Session 2a, Network Modeling  | 
   
  | 
    | 
  
  
    - An Improved Model for IEEE 
    802.11 MAC Protocol K. Khayyat, F. Gebali
 
   
      | 
 
   
  | 
  Session 2b, 
  Parallel and Distributed Processing | 
   
  | 
    | 
  
  
    - Distributed Processing Over Loosely Coupled Networks, 
    A. Amin, A. Azab, H. Al-Mohandes, A. Darwish
 
    - Automated Method for Building CNOT Based Quantum 
    Circuits for Boolean Functions, A. Younes, J. Miller
 
   
      | 
 
   
  | 
   Session 3a, Ad-Hoc and Wireless
  Networks  | 
   
  | 
    | 
  
  
    - An Efficient Reclustering 
    Algorithm in Mobile Ad Hoc Networks, M. Al-kahtani, H. Mouftah
 
   
      | 
 
   
  | 
      Session 3b, Neural 
      Networks | 
   
  | 
    | 
  
  
    - A Multi-Classifier 
    Approach to Self-Supervised Learning, N. El Gayar
 
   
      | 
 
   
  | 
      
      Session 4a, Network Management
      
   | 
   
  | 
    | 
  
  
    - Traffic Congestion in 
    Computer Network and its Avoidance by Reinforcement Learning T. Horiguchi, 
    K. Hayashi, A. Tretiakov
 
   
      | 
 
   
  | 
  Session 4b, Data 
  Compression | 
   
  | 
    | 
  
  
    - Optimizing the Tree 
    Structure in the Lossless Binary Tree Predictive Coding, Z. Chen, M. El-Sakka
 
   
      | 
 
   
  | 
   Session 5a, Image Processing and
  Hardware Components  | 
   
  | 
    | 
  
  
    - Hadamard Transform in 
    H.264/MPEG-4 Part 10: A Hardware Prototype, I. Amer, W. Badawy, G. Jullien
 
   
      | 
 
   
  | 
  Session 5b, 
  Computational Intelligence | 
   
  | 
    | 
  
  
    - A Neural Network Approach 
    to Stock Market Prediction Using Peak & Trough Analysis, H. Abdelazim, F. 
    Badawy
 
   
      | 
 
   
  | 
   Session 6a, QoS in Networks  | 
   
  | 
    | 
  
  
    - New Chain Construction for 
    Multicast Stream Authentication Q. Abuein, S. Shibusawa
 
   
      | 
 
   
  | 
  Session 6b, Knowledge 
  Discovery and Web Mining | 
   
  | 
    | 
  
  
    - A Framework for 
    Information Extraction, Storage and Retrieval, S. El-Beltagy, M. Said, K. 
    Shaalan
 
    - Ontology-Aided Web Search Assistant, M. Kamel, E. 
    Powers, A. Lee
 
   
      | 
 
   
  | 
   Session 7a, Communications Networks  | 
   
  | 
    | 
  
  
    - Reducing the Risk of the 
    Honest Dealer Assumption in Robust Threshold RSA Function Sharing, M. 
    Ibrahim
 
   
      | 
 
   
  | 
  Session 7b, 
  Computational Intelligence | 
 
 
  | 
    | 
  
  
    - A Near Optimal Predictive 
    Image Encoding Algorithm, S. Zahir
 
   
    | 
 
   
  | 
   Session 8a, Intelligent Agents 
   | 
 
 
  | 
    | 
  
  
    - Localization, Mapping and 
    Feature Discovery of a Platoon of Cooperative Heterogeneous Mobile Robots 
    Using Colored Circles and RGB Images, M. El Kaissi, M. Elgamel, M. Bayoumi
 
    - Web-enabling Legacy 
    Systems via Presentation Access From Webulation to Automation, M. El-Ramly
 
   
    | 
 
   
  | 
  Session 8b, Neural 
  Networks and Hardware Components | 
 
 
  | 
    | 
  
  
    - Rapid Prototyping of 
    Tricore SoC Without Software Hooks, Colt R. Correa, Jefferey P. Stumpff, 
    Selim Awad
 
   
    | 
 
   
  | 
    |