List of Accepted Papers
AINA | BICom | BLSMC | CCPI | CCSI | COLLABES | DMWPC | EASyCoSe | EOOPS | FINA | HWISE | ICAES | iCCI | IWDENS | MAW | NetMM | NetVE | PAEWN | PAMS | PITSaC | SMME | SMPE | TeNAS | WReCS
Accepted Paper List of AINA-2013 main conference
Paper Id (EDAS) |
Paper Title |
Author(s) |
#1569661713 |
An Energy-Efficient Redundant Execution Algorithm by Terminating Meaningless Redundant Processes |
Tomoya Enokido; Ailixier Aikebaier; Makoto Takizawa |
#1569663557 |
An Approach to Rapid Prototyping of Mobile Applications |
Markus Aleksy |
#1569664029 |
A Dynamic Energy-aware Server Selection Algorithm |
Takuro Inoue; Ailixier Aikebaier; Tomoya Enokido; Makoto Takizawa |
#1569664093 |
An Extended Multimedia Quorum-based Synchronization Protocol |
Tadateru Ohkawara; Ailixier Aikebaier; Tomoya Enokido; Makoto Takizawa |
#1569664287 |
The inter-cloud meta-scheduling (ICMS) framework |
Stelios Sotiriadis; Nik Bessis; Pierre Kuonen; Nikos Antonopoulos |
#1569665733 |
Empowering Data Placement for Ad-hoc Queries in Mobile Broadcast Enviroments |
Agustinus Borgy Waluyo; David Taniar; Srinivasan Bala |
#1569666917 |
PLEMS: Plug Load Energy Management Solution for Enterprises |
Animikh Ghosh; Ketan Patil; Sunil K Vuppala |
#1569671437 |
Deterministic and Authenticated Flow Marking for IP Traceback |
Vahid Aghaei Foroushani; Nur Zincir-Heywood |
#1569671457 |
Performance Evaluation AODV and DSR Protocols in a VANET Scenario Using CAVENET and NS3 |
Evjola Spaho; Makoto Ikeda; Leonard Barolli; Muhammad Younas; Makoto Takizawa |
#1569671469 |
Node Placement in WMNs: Performance Evaluation of WMN-GA System for Weibull and Exponential Distribution of Mesh Clients |
Tetsuya Oda; Evjola Spaho; Admir Barolli; Leonard Barolli; Makoto Ikeda |
#1569671499 |
Investigation of MANET Routing Protocols in Different Scenarios: A simulation Study |
Elis Kulla; Makoto Ikeda; Leonard Barolli; Makoto Takizawa |
#1569671505 |
A WMN-GA Simulation Analysis WWN Considering Client Connectivity |
Makoto Ikeda; Tetsuya Oda; Elis Kulla; Taiki Honda; Leonard Barolli |
#1569671893 |
A Real Data Investigation of OLSR Behavior for Different Parameters in a MANET Testbed |
Masahiro Hiyama; Elis Kulla; Makoto Ikeda; Leonard Barolli |
#1569672079 |
LABERIO: Dynamic load-balanced routing in OpenFlow-enabled networks |
Hui Long; Yao Shen; Minyi Guo; Feilong Tang |
#1569672537 |
A Energy Efficient Data Collection Method by Two Types Routes Selection in Triage Networks |
Takuya Okamoto; Takuya Saito; Hiroshi Shigeno |
#1569672729 |
Privacy-Preserving Distributed Decision Tree Learning with Boolean Class Attributes |
Hiroaki Kikuchi |
#1569673129 |
Object-Based Semantic Clustering for XML Twig Query Optimization |
Norah Alghamdi; Wenny Rahayu; Eric Pardede |
#1569673613 |
Using MIMO Techniques to Enhance Communication Among Static and Mobile Nodes in Wireless Sensor Networks |
Marco Marinho; Edison Pignaton de Freitas; Andre L. F. de Almeida; Joao Paulo C Lustosa da Costa; Rafael Timoteo de Sousa Junior |
#1569675249 |
Coordination and Computation in distributed intelligent MEMS |
Julien Bourgeois; Jiannong Cao; Michel Raynal; Dominique Dhoutaut; Benoit Piranda; Eugen Dedu; Ahmed Mostefaoui; Hakim Mabed |
#1569675647 |
A Steady State GA for Ground Station Scheduling Problem |
Fatos Xhafa; Admir Barolli; Makoto Takizawa |
#1569676287 |
A robust un-supervised Neural Network based approach for predicting trust values of Cloud Services |
Farookh Hussain |
#1569676367 |
Efficient Indexing of Spatiotemporal Objects in Indoor Environments |
Sultan Alamri |
#1569676619 |
Wide Area Seamless Surveillance Video System to Recognize and Track Moving Objects Based on Gigabit Network |
Yoshitaka Shibata; Takuma Kon; Noriki Uchida; Koji Hashimoto |
#1569698223 |
Network Attack Analysis and the Behaviour Engine |
Anthony Benham; Huw Read; Iain Sutherland |
#1569641221 |
A Novel Cluster-based Energy Efficient Routing in Wireless Sensor Networks |
Aboobeker sidhik Koyamparambil mammu |
#1569663085 |
A Routing Method for Top-k Query Processing in Mobile Ad Hoc Networks |
Daichi Amagata; Yuya Sasaki; Takahiro Hara; Shojiro Nishio |
#1569663399 |
A Novel Power Aware Heterogeneous Routing Protocol for MANETs |
Haidar Safa; Marcel Karam; Bassam Moussa |
#1569666915 |
An Energy Efficient Distributed Scheduling Scheme for Wireless Mesh Networks |
Kanthaiah Sivapragasam Vijayalayan; Aaron Harwood; Shanika Karunasekera |
#1569667793 |
Performance Evaluation of a Multicast Routing Protocol for Wireless Mesh Networks Considering Network Load |
Akio Koyama |
#1569671879 |
Directional Pulse/Tone Based Channel Reservation |
Lucas Guimaraes; Jacir Luiz Bordim |
#1569673131 |
Design of Optimized AODV Routing Protocol for Multi-Interface Multi-Channel Wireless Mesh Networks |
Won-suk Kim; Sang-Hwa Chung |
#1569662815 |
A Highly Integrable FPGA-Based Runtime-Configurable Multilayer Perceptron |
Jan Skodzik; Vlado Altmann; Benjamin Wagner; Peter Danielis; Dirk Timmermann |
#1569664739 |
An Event-Driven Clustering Scheme for Data Aggregation in Real-Time Wireless Sensor Networks |
Besem Abid; Wiem Elghazel; Hamida Lagraa Seba; Souleymane Mbengue |
#1569670135 |
Using Intelligent Multi-Agent Systems to Model and Foster Self-Regulated Learning: A Theoretically-Based Approach using Markov Decision Process |
Babak Khosravifar; Francois Bouchet; Reza Feyzi-Behnagh; Roger Azevedo; Jason M Harley |
#1569671015 |
Game-based Simulation of Distributed Denial of Service (DDoS) Attack and Defense Mechanisms of Critical Infrastructures |
Rainer Poisel; Marlies Rybnicek; Simon Tjoa |
#1569672433 |
Investigating a Socially Inspired Heterogeneous System of Problem Solving Agents |
Diego Vrague Noble; Ricardo Araujo; Luis Lamb |
#1569673543 |
Using ontologies to build testbed for Peer-to-Peer Information Retrieval Systems |
Saloua Zammali |
#1569675121 |
An Efficient Peer-to-Peer Semantic Overlay Network for Learning Query Routing |
Taoufik Yeferny; Amel Bouzeghoub; Khedija Arour |
#1569664671 |
A failure recovery method based on cycle structure and its verification by OpenFlow |
Junichi Nagano; Norihiko Shinomiya |
#1569663529 |
HCube: A Server-centric Data Center Structure for Similarity Search |
Rodolfo da Silva Villaca; Rafael Pasquini; Luciano Bernardes de Paula; Mauricio Ferreira Magalhaes |
#1569663653 |
A New Concurrency Control Language for Transactional Process in Service-Oriented Architecture |
Gwan-Hwan Hwang; Chi Wu-Lee; Han-Meng Chiang |
#1569663959 |
Scaling MapReduce Applications across Hybrid Clouds to Meet Soft Deadline |
Michael Mattess; Rodrigo N. Calheiros; Rajkumar Buyya |
#1569664081 |
Grid on Cloud |
Shinchiro Kibe; Minoru Uehara; Motoi Yamagiwa |
#1569664549 |
An Architecture for Community Clouds using Concepts of the Intercloud |
Mark Gall; Angelika Schneider; Niels Fallenbeck |
#1569664583 |
PaaS on IaaS |
Shinchiro Kibe; Syota Watanabe; Kohta Kunishima; Ryo Adachi; Motoi Yamagiwa; Minoru Uehara |
#1569669007 |
Intelligent Urban Video Surveillance System for Automatic Vehicle Detection and Tracking in Clouds |
Yi-Ling Chen; Tse-Shih Chen; Tsiao-Wen Huang; Liang-Chun Yin; Shiou-Yaw Wang; Tzi-Cker Chiueh |
#1569669289 |
ETIS - Efficient Trust and Identity Management System for Federated Service Providers |
Sanjay Madria |
#1569671397 |
AAGA: Affinity-Aware Grouping Method for Allocation of Virtual Machines |
Jianhai Chen; Kevin Chiew; Deshi Ye; Zhu Liangwei; Wenzhi Chen |
#1569671455 |
The Framework of Cloud Computing Platform for Massive Remote Sensing Images |
Feng-Cheng Lin |
#1569671459 |
Service Component Architecture for Geographic Information System in Cloud Computing Infrastructure |
Feng-Cheng Lin |
#1569671791 |
Dynamic Voltage and Frequency Scaling in Multimedia servers |
Alaa Brihi; Waltenegus Dargie |
#1569671859 |
h-MapReduce: A Framework for Workload Balancing in MapReduce |
Venkata Swamy Martha; Weizhong Zhao; Xiaowei Xu |
#1569672089 |
QoS-Based Service Composition under Various QoS Requirements |
Gang Wang |
#1569672427 |
Does Live Migration of Virtual Machines cost Energy? |
Anja Strunk; Waltenegus Dargie |
#1569672737 |
CloudServ: PaaS resources provisioning for service-based applications |
Sami Yangui; Samir Tata |
#1569672901 |
An Efficient Grouped Virtual Mapreduce Cluster |
Yang Yang; Xiang Long; Bo Jiang |
#1569673281 |
An evolutionary approach for SLA-based cloud resource provisioning |
Victor Ion Munteanu; Teodor-Florin Forti_; Viorel Negru |
#1569673297 |
Boosting Metrics for Cloud Services Evaluation - The Last Mile of Using Benchmark Suites |
Zheng Li; Liam O'Brien; Rainbow Cai; He Zhang |
#1569673477 |
Cloud-Aware Middleware |
Tercio Morais; Diego Liberalquino; Nelson Souto Rosa |
#1569673523 |
Adding Monitoring and Reconfiguration Facilities for Service-based Applications in the Cloud |
Mohamed Mohamed; Djamel Belaid; Samir Tata |
#1569673539 |
Scheduling of Sporadic Tasks with Deadline Constrains in Cloud Environments |
Florin Pop; Ciprian Dobre; Valentin Cristea; Nik Bessis |
#1569696619 |
Joint Reliable and Available Data Replication Planning for Cloud Storage |
Yean-Fu Wen; Joolahluk Janpet |
#1569639969 |
A New Binomial Conservative Multiplicative Cascade Approach for Network Traffic Modeling |
Jeferson Stenico; Luan Ling Lee |
#1569658815 |
EDCA 802.11e performance under different scenarios |
Santiago Perez; Higinio Facchini; Gustavo Mercado; Luis Bisaro; Javier Campos |
#1569662521 |
Efficient Power Allocation for Video over Superposition Coding |
Chun Pong Lau; Kamran Jamshaid; Basem Shihada |
#1569662901 |
A Short introduction to Synchronous Communication |
Michel Raynal |
#1569663107 |
Supporting Cross Layer Interactions on Wireless Protocol Stack |
Sunil B Jardosh |
#1569663625 |
A Cache Raplacement Method for Crowded Streaming Cache Servers Responding to Rapidly Changing Access Patterns |
Toru Osuga; Takayoshi Asakura; Kunihiro Taniguchi |
#1569663957 |
On the efectiveness of multi-criteria decision mechanisms for vertical handoff |
Carlos Ramirez-Perez; Victor Ramos |
#1569664613 |
A Task Migration Technique for Temperature Control in 3D NoCs |
Neda Hassanpour; Shaahin Hessabi; Parisa Khadem Hamedani |
#1569664853 |
A QoS-Aware Uplink Scheduling Paradigm for LTE Networks |
Haidar Safa; Wassim El-Hajj; Kamal Tohme |
#1569669391 |
Comparing OpenFlow Controller Paradigms: Reactive and Proactive |
Marcial P Fernandez |
#1569669457 |
An effective QoS Providing Mechanism Using Prediction-based Decentralized Routing |
Abutaleb Turky |
#1569671551 |
A Multi-Factors Cell Selection Scheme for Heterogeneous Networks with Multimedia Traffic |
Wen-Ching Chung; Chung-Ju Chang; Chih-Yuan Hsieh; Yung-Han Chen |
#1569672763 |
An Efficient TCAM Update Scheme for Packet Classification |
Yeim-Kuan Chang; Kai-Yang Liu |
#1569672917 |
Wireless Fair Intelligent Admission Control - WFIAC |
Fatima Furqan; Doan B Hoang |
#1569673147 |
Blind Principles Based Interference Cancellation Schemes for Spread Spectrum Systems |
Samantha Sriyananda; Jyrki Joutsensalo; Timo Hamalainen |
#1569673261 |
Autonomic Abilities through a Multi-homed Transport Protocol |
Code Diop |
#1569675771 |
A Multicast Retransmission Scheme Using Negative ACK in Wireless Networks |
Tsang-Ling Sheu; SanTai Lin |
#1569676547 |
A Sender Side Algorithm for Reducing Frequent Retransmission Timeouts of TCP NewReno over Multi-hop Wireless Networks |
Prasanthi Sreekumari |
#1569679095 |
Using Multiple Links Simultaneously to Increase Capacity for Multi-homed Terminals in Heterogeneous Wireless Networks |
Allen Ramaboli; Olabisi Emmanuel Falowo; H Anthony Chan |
#1569673805 |
SHMSTREAMING: A Shared Memory Approach for Improving Hadoop Streaming Performance |
Lai Longbin; Jingyu Zhou; Long Zheng; Huakang Li; Yanchao Lu; Feilong Tang; Minyi Guo |
#1569677831 |
Low Complexity Routing Algorithm for Rearrangeable Switching Networks |
Amitabha Chakrabarty; Martin Collier |
#1569661733 |
Efficient Processing of Updates for Moving Objects with Varying Speed and Direction |
Yuan-Ko Huang |
#1569671851 |
PSCAN: A Parallel Structural Clustering Algorithm for Big Networks in MapReduce |
Weizhong Zhao; Venkata Swamy Martha; Xiaowei Xu |
#1569672697 |
An analysis of players and bots behaviors in MMORPG |
Yutaro Mishima; Hiroshi Esaki; Kensuke Fukuda |
#1569673603 |
Mining Normal and Abnormal Class-Association Rules |
Viet Phan-Luong |
#1569676511 |
IC-BIDE:Intensity Constraint-based Closed Sequential Pattern Mining for Coding Pattern Extraction |
Hiromasa Takei; Hayato Yamana |
#1569676805 |
Advance Resource Provisioning in Bulk Data Scheduling |
Mehmet Balman |
#1569664283 |
SimIC: Designing a new Inter-Cloud Simulation platform for integrating large-scale resource managemen |
Stelios Sotiriadis; Nik Bessis; Nikos Antonopoulos |
#1569673367 |
On System Time Analysis for BitTorrent with Sharing Ratio Enforcement |
Yuh-Jzer Joung; Evan Chang |
#1569676077 |
Nature Inspired Self organization for Adhoc Grids |
Ashiq Anjum; Nik Bessis |
#1569676715 |
Processing HDF5 Datasets on Multi-core Architectures |
Rajdeep Bhowmik; Madhusudhan Govindaraju |
#1569676787 |
Management of Streaming Multimedia Content using Mobile Agent Technology on Pure P2P-based Distributed e-Learning System |
Masayuki Higashino; Kenichi Takahashi; Takao Kawamura; Kazunori Sugahara |
#1569679373 |
Locality Awareness in Multi-Channel Peer-to-Peer Live Video Streaming Networks |
Navid Bayat; Hamid Reza Rabiee; Mostafa Salehi |
#1569652799 |
A Deliberative Agent for Meeting Scheduling |
Elhadi Shakshuki; Mozammal Hossain |
#1569658893 |
A recommendation cascade for e-learning |
Rachid Anane |
#1569665515 |
Performance Analysis and Comparison of Different DNS64 Implementations for Linux, OpenBSD and FreeBSD |
Gabor Lencse; Sandor Repas |
#1569671787 |
Combining collaborative filtering and clustering for implicit recommender system |
Simon Renaud-Deputter; Tengke Xiong; Shengrui Wang |
#1569671849 |
Efficient Near-Optimal Dynamic Content Adaptation Applied to JPEG Slides Presentations in Mobile Web Conferencing |
Habib Louafi; Stephane Coulombe; Umesh Chandra |
#1569672217 |
Context-Aware and Cloud Based Adaptation of the User Experience |
Tor-Morten Gronli; Jarle Hansen; Gheorghita Ghinea; Muhammad Younas |
#1569673305 |
FuzzyCDN: Fuzzy Redirection Algorithm |
Thiago Oliveira; Marcial P Fernandez |
#1569673399 |
Internet Metaobject Protocol (IMOP): Weaving the Global Program Grid |
Yuh-Jzer Joung |
#1569676791 |
Towards the 3D Web with Open Simulator |
Iain Oliver; Alan Miller; Colin Allison; Sarah Kennedy; Lisa Dow; Anne Campbell; Christopher Davies; John McCaffery |
#1569663089 |
Data gathering considering geographical distribution of data values in dense mobile wireless sensor networks |
Kazuya Matsuo; Keisuke Goto; Akimitsu Kanzaki; Takahiro Hara; Shojiro Nishio |
#1569664391 |
Energy-Efficient Mobile P2P Communications based on Context Awareness |
Satoshi Miyake; Masaki Bandai |
#1569672275 |
Enhancing the Modelling of Vertical Handover in Integrated Cellular/WLAN Environments |
Yonal Kirsal; Enver Ever; Glenford E Mapp; Orhan Gemikonakli |
#1569673225 |
HBPR: History Based Prediction for Routing in Infrastructure-less Opportunistic Networks |
Sanjay Kumar Dhurandher; Deepak Kumar Sharma; Isaac Woungang; Shruti Bhati |
#1569673311 |
Exploring Service and Buffer Management Issues to Provide Integrated Voice and Data Services in Single and Multi Channel Wireless Networks |
Eser Gemikonakli; Glenford E Mapp; Orhan Gemikonakli; Enver Ever |
#1569676609 |
Feedback-based Adaptation for Improved Power Consumption |
Christos Bouras; Vaggelis Kapoulas; Georgios Kioumourtzis; Kostas Stamos, Mr; Nikos Stathopoulos; Nikos Tavoularis |
#1569676801 |
Just-In-Time Push Prefetching |
Paul A.S. Ward |
#1569663487 |
Adding Scent to Television Broadcasts by Using Closed Caption Data |
Tatsuki Tatara; Makoto Kikkawa; Kenichi Okada |
#1569663503 |
Group Based Traffic Shaping for Adaptive HTTP Video Streaming |
Bjorn Villa; Poul E. Heegaard |
#1569663733 |
Early Evaluation of Automatic Flying Distance Measurement on Ski Jumper's Motion Monitoring System |
Nobuyoshi Sato; Tsuyoshi Takayama; Yoshitoshi Murata |
#1569670987 |
Design and Simulation of a Distributed Control Scheme for Inter-Destination Media Synchronization |
Mario Montagud; Fernando Boronat; Hans Stokking |
#1569671763 |
Local Search Heuristics for Media Streams Planning Problem |
JiYi Marek; Petr Holub; Hana Rudova |
#1569672145 |
QoS for JPEG2000 Storage System (Based on Data Structure) |
Jesus Barbero; Carolina Gallardo |
#1569676743 |
A Comparative Study of Expert Search Strategies in Online Social Networks |
Yuh-Jzer Joung; ShyMin Chen; Terry Hui-Ye Chiu |
#1569663921 |
Causality-Based Model For User Profile Construction From Behavior Sequences |
Belkacem Chikhaoui; Shengrui Wang; Helene Pigot |
#1569664197 |
Efficient Survey Database Construction Using Location Fingerprinting Interpolation |
Ryosuke Kubota; Shigeaki Tagashira; Yutaka Arakawa; Teruaki Kitasuka; Akira Fukuda |
#1569670917 |
Microscale Analysis on Sensing Devices and Its Impact on Assessing User Mobility |
Hyunsoon Kim; Eugene Kim; Hwantae Kim; Hwangnam Kim |
#1569672009 |
A Multilateration-based Localization Scheme for Adhoc Wireless Positioning Networks used in Information-oriented Construction |
Naoki Miwa; Shigeaki Tagashira; Hiroaki Matsuda; Takanori Tsutsui; Yutaka Arakawa; Akira Fukuda |
#1569673463 |
Reducing Congestion for Routing Algorithms in Opportunistic Networks with Socially-Aware Node Behavior Prediction |
Radu Ciobanu; Ciprian Dobre |
#1569676655 |
Evaluating QoS of a Wireless System for Real-Time Electrocardiogram Monitoring |
Juyoung Park; Jaemyoun Lee; Kyungtae Kang |
#1569654107 |
BSnort IPS |
Padmashani R; Shiju Sathyadevan; Devi Dath |
#1569656017 |
Learning Anomalies in IDSs by means of Multivariate Finite Mixture Models |
Nicola Greggio |
#1569661125 |
Symmetric Key based RFID Authentication Protocol with a Secure Key Updating Scheme |
Gul N. Khan; Guangyu Zhu |
#1569662007 |
A Network Modeling and Analysis Tool for Perfectly Secure Communication |
Stefan Rass; Benjamin Rainer; Matthias Vavti; Stefan Schauer |
#1569663871 |
Maximization of Wireless Mesh Networks Survivability to Assure Service Continuity under Intelligent and Jamming Attacks |
Yu-Shun Wang; Frank Yeong-Sung Lin; Chi-Hsiang Chan; Jing-Wei Wang |
#1569664037 |
A Study on Noise-Tolerant PN Code-Based Localization Attacks to Internet Threat Monitors by Exploiting Multiple Ports |
Masaki Narita; Bhed Bahadur Bista; Toyoo Takata |
#1569667051 |
Dispositional Trust Adaptation in User-Centric Networks |
Carlos Ballester; Jean-Marc Seigneur |
#1569671135 |
A Generic Construction of Proxy Signatures from Certificateless Signatures |
Lei Zhang; Qianhong Wu; Bo Qin; Josep Domingo-Ferrer; Peng Zeng |
#1569671963 |
Passive OS Fingerprinting by DNS Traffic Analysis |
Takashi Matsunaka; Akira Yamada; Ayumu Kubota |
#1569672061 |
Secret Sharing Scheme Suitable for Cloud Computing |
Satoshi Takahashi; Keiichi Iwamura |
#1569672657 |
A New Android Malware Detection Approach Using Bayesian Classification |
Suleiman Y Yerima; Sakir Sezer |
#1569672791 |
A Privacy Preserving Prediction-based Routing Protocol for Mobile Delay Tolerant Networks |
Omar Hasan; Jingwei Miao; Sonia Ben Mokhtar; Lionel Brunie |
#1569673379 |
FeelTrust: Providing Trustworthy Communications in Ubiquitous Mobile Environment |
Giuliana Carullo; Aniello Castiglione; Giuseppe Cattaneo; Alfredo De Santis; Ugo Fiore; Francesco Palmieri |
#1569673595 |
A forensically-sound method to collect live network digital evidence |
Aniello Castiglione; Giuseppe Cattaneo; Giancarlo De Maio; Alfredo De Santis |
#1569676217 |
Design and Implementation of a Functional Extension Framework for Authn & Authz Federation Infrastructure using Web Browser Add-on |
Toyokazu Akiyama; Takeshi Nishimura; Kazutsuna Yamaji; Motonori Nakamura; Yasuo Okabe |
#1569662525 |
Optimal Node Placement in Underwater Wireless Sensor Networks |
Muhamad Felemban; Basem Shihada; Kamran Jamshaid |
#1569664055 |
Distributed Spatial Correlation-based Clustering for Approximate Data Collection in WSNs |
Zhidan Liu; Wei Xing; Bo Zeng; Yongchao Wang; Dongming Lu |
#1569664323 |
How to Build Random Key Pre-distribution Schemes with Self-healing for Multiphase WSNs |
Atsuko Miyaji; Kazumasa Omote |
#1569664895 |
A Chaining Selective Wakeup Strategy for a Robust Continuous Object Tracking in Practical Wireless Sensor Networks |
Hyungseop Hong; Seungmin Oh; Jeongcheol Lee; Sang-Ha Kim |
#1569672905 |
An Integrated Protocol for Coverage, Connectivity and Communication (C3) in Wireless Sensor Networks |
Muhammad Akhlaq; Tarek Rahil Sheltami; Elhadi Shakshuki |
#1569670935 |
Detecting Energy-Efficient Central Nodes for Cooperative Caching in Wireless Sensor Networks |
Nikos Dimokas; Dimitrios Katsaros |
#1569671433 |
ABRM: In-Network Aggregation Based Routing Protocol for Mobile Sensor Networks with Multiple Mobile Sinks |
Hossam Mahmoud Fahmy; Maged Soliman |
#1569671737 |
The problem of joint scheduling and power assignment in wireless sensor networks |
Ada Gogu; Supriyo Chatterjea; Dritan Nace; Arta Dilo |
#1569672593 |
Overlapped Schedules with Centralized Clustering for Wireless Sensor Networks |
Ibrahim Amer Musbah Ammar; Irfan Awan |
#1569673121 |
Implementing Adaptation and Reconfiguration Strategies in Heterogeneous WSN |
Antinisca Di Marco; Francesco Gallo; Orhan Gemikonakli; Leonardo Mostarda; Franco Raimondi |
#1569673251 |
A Residual Error Control Scheme in Single-Hop Wireless Sensor Networks |
Bafrin Zarei |
#1569673357 |
Dynamic Aggregation Protocol for Wireless Sensor Networks |
Adel Mounir Said; Ashraf William Ibrahim; Ahmed Soua; Hossam Afifi |
#1569673455 |
Energy-efficient Data Gathering for Road-side Sensor Networks ensuring Reliability and Fault-tolerance |
Suchetana Chakraborty; Sandip Chakraborty; Sukumar Nandi; Sushanta Karmakar |
#1569676585 |
IBE-based Accurate Trust Computation in Wireless Sensor Networks |
Tomoya Enokido; Makoto Takizawa |
#1569676679 |
Lightweight Source Authentication Mechanisms for Group Communications in Wireless Sensor Networks |
Wafa Ben Jaballah; Mosbah Mohamed; Habib Youssef; Akka Zemmari |
#1569663883 |
An Advanced Vehicle Collision Warning algorithm over the DSRC Communication Environment |
Chung-Ming Huang; Shih-Yang Lin |
#1569671481 |
Arrival time based Traffic Signal Optimization for Intelligent Transportation Systems |
Vamsi Krishna Paruchuri; Sriram Chellappan; Rathinasamy B. Lenin |
#1569673183 |
Design and Implementation of Enhanced Asset Locating System for Vehicle Pooling in a Port Terminal |
Sanghyun Son |
#1569673503 |
A Risk Taking Routing Algorithm for Delay Tolerant Networks |
Maziar Mirzazad Barijough; Nasser Yazdani; Djamshid Tavangarian; Robil W. Daher |
#1569676799 |
Opportunistic Bit-Rate Selection in Multi-Vehicular Networks |
Paul A.S. Ward |
Accepted Paper List of BICom-2013
Paper Id |
Paper Title |
Author(s) |
BICom-1 |
Simulation evaluation of Fuzzy-based Trustworthiness System for P2P Communications in JXTA-Overlay |
Evjola Spaho, Kohei Umezaki, Leonard Barolli |
BICom-2 |
Performance Evaluation of WMN-GA System in Node Placement in WMNs for Normal Distribution of Mesh Clients and Different Selection and Mutation Operators |
Admir Barolli, Tetsuya Oda, Evjola Spaho, Leonard Barolli, Makoto Takizawa |
BICom-3 |
Information Splitting Using Crypto-biometrics Approach |
Marek R Ogiela, Lidia D Ogiela |
BICom-4 |
A Sensor Speed Feedback Fuzzy-based System in Wireless Sensor Networks |
Wang Qi, Leonard Barolli, Elis Kulla |
BICom-5 |
A Biometric-Based User Authentication Scheme for Heterogeneous Wireless Sensor Networks |
Ashok Kumar Das, Bruhadeshwar Bezawada |
BICom-6 |
Using Artificial Neural Network for Automatic Assessment of Video Sequences |
Brice Ekobo, Emmanuel Simeu, Fritz Lebowsky |
BICom-7 |
Multi-Agent System Proposal to Model and Foster Self-Regulated Learning |
Babak Khosravifar, Roger Azevedo, Jason M Harley, Francois Bouchet, Reza Feyzi-Behnagh |
BICom-8 |
How to compare and interpret two learnt Decision Trees from the same Domain? |
Petra Perner |
BICom-9 |
A Comprehensive Study of Bluetooth Fingerprinting-based Algorithms For Localization |
Li Zhang, Xiao Liu, Cathal Gurrin, Sijun Zhu, Zhiliang Zhu |
BICom-10 |
Ant Colony based Forwarding Method for Content-Centric Networking |
Chengming Li, Kouji Okamura, Wenjing Liu |
BICom-11 |
On-Line Signature Evaluation Using Fuzzy Set Theory |
Jungpil Shin |
BICom-12 |
An Improved Particle Swarm Optimization Algorithm with Different Banchmarks on MATLAB |
Talha Ali Khan, Muhammad Asif, Talha Ahmed Taj |
BICom-13 |
Improvements the Seccomp sandbox based on Perfect Bayesian Equilibrium(PBE) theory |
Bo Ma, Dejun Mu |
BICom-14 |
Estimate Thermo-physical Parameters from Characterization of the Building Materials by Using Artificial Intelligence |
Thanh Nga Thai |
Accepted Paper List of BLSMC-2013
Paper Id |
Paper Title |
Author(s) |
BLSMC-1 |
Dynalets : A new time-frequency representation for periodic biological signals |
J. DEMONGEOT, A. GLARIA & A. HAMIE |
BLSMC-2 |
MitomiRrs in enenergetic regulation |
J. DEMONGEOT, A. DONCESCU, O. COHEN & A. HENRION-CAUDE
|
BLSMC-3 |
Robustness in Genetic Regulatory Networks. Role of microRNAs |
J. DEMONGEOT, O. COHEN & H. HAZGUI
|
BLSMC-4 |
Identification of miRNA in Melanoma and the patient profile by Expectation Maximisation |
Andrei Doncescu, Sebastien Regis
|
BLSMC-5 |
Observation and Representation of social networks |
J. DEMONGEOT & C. TARAMASCO
|
BLSMC-6 |
Tooth evolution: micro-RNAs as driving force? |
F. MICHON
|
Accepted Paper List of CCPI-2013
Paper Id |
Paper Title |
Author(s) |
CCPI-1 |
Service Level Agreement in Cloud: A Simulation-based Approach |
Massimiliano Rak. |
CCPI-2 |
A Framework for Semantic Interoperability over the Cloud |
Flora Amato, Antonino Mazzeo, Vincenzo Moscato, Antonio Picariello |
CCPI-3 |
Distributed Programming Models for Clouds |
Lutz Schubert, Daniel Rubio Bonilla, Stefan Wesner |
CCPI-4 |
A Cloud-based framework for collaborative data management in the VPH-Share Project |
Martin Koehler, Siegfried Benkner, Chris Borckholder, Yuriy Kaniovskyi, Marian Bubak, Spiros Koulouzis, Piotr Nowakowski, Richard Knight, Steven Wood |
CCPI-5 |
Programming ecological niche modeling workflows in the Cloud |
Daniele Lezzi, Roger Rafanell, Erik Torres, Rosa Badia, Ignacio Blanquer |
CCPI-6 |
Integrating Structured Peer-to-Peer Networks into OM4SPACE Project |
Irina Astrova, Arne Koschel |
CCPI-7 |
Cloud Security-Ifs and Buts |
Akanksha Varshney |
CCPI-8 |
Semantic Registry for Cloud Computing |
Cristina Mindruta |
CCPI-9 |
COMPOSE - a journey from the Internet of Things to the Internet of Services |
Benny Mandler, David Carerra, Carlos Pedrinaci, Elena Villa, Daniel Schreckling, Robert Kleinfeld, Fabio Antonelli, Dave Raggett, Iacopo Carreras, Vlad Trifa, Alessio Gugliotta |
CCPI-10 |
From Cloud Governance to IoT Governance |
Victor Ion Munteanu, Teodor-Florin Fortis, Viorel Negru |
CCPI-11 |
Multi-objective Decision Support for Brokering of Cloud SLA |
Alba Amato, Salvatore Venticinque |
CCPI-12 |
Semantic and Agent Technologies for Cloud Vendor Agnostic Resource Brokering |
Alba Amato, Giuseppina Cretella, Beniamino Di Martino, Salvatore Venticinque |
Accepted Paper List of CCSI-2013
Paper Id |
Paper Title |
Author(s) |
CCSI-1 |
Performance Analysis and Optimization of Map Only Left Outer Join |
Ming Hao, Tomasz Wiktor Wlodarczyk and Chunming Rong |
CCSI-2 |
A DDoS Mitigation System with Multi-Stage Detection and Text-Based Turing Testing in Cloud Computing |
Vincent Huang, Robert Huang and Ming Chiang |
CCSI-3 |
Efficient Service Management for Multimedia Sessions in Hybrid Clouds |
Cristina Dutu, Elena Apostol, Catalin Leordeanu and Valentin Cristea |
CCSI-4 |
Static Testing as a Service on Cloud |
Siqin Chen, Junfei Huang and Yunzhan Gong |
CCSI-5 |
TeraScaler ELB-an Algorithm of Prediction-based Elastic Load Balancing Resource Management in Cloud Computing |
He-Sheng WU, Chong-Jun WANG and Jun-Yuan XIE
|
CCSI-6 |
Structured and unstructured data in the Cloud: a Swiss perspective on readiness and internal controls |
David Simms and Solange Ghernaouti |
CCSI-7 |
Data-intensive Spatial Indexing on the Clouds |
Abdelmounaam Rezgui, Zaki Malik, Jizhe Xia, Kai Liu, Chaowei Yang |
CCSI-8 |
The Cloud Streaming Service Migration in Cloud Video Storage System |
Yi-Hsing Tsai |
CCSI-9 |
A Secure Shared Group Model of Cloud Storage |
Ching-Hung Yeh |
CCSI-10 |
Secure Picture Data Partitioning for Cloud Computing Services |
Rene Leistikow, Djamshid Tavangarian |
Accepted Paper List of COLLABES-2013
Paper Id |
Paper Title |
Author(s) |
COLLABES-1 |
An Approach to Enterprise Collaboration through Concurrent Scene Understanding and Interoperation |
John Mashford |
COLLABES-2 |
A Novel Workflow Management System for Handling Process Adaptation and Compliance |
M.S. Haji-Omar, P.W.H. Chung and C.W. Dawson |
COLLABES-3 |
Hyper-heuristic based Resource Scheduling in Grid Environment |
Rajni Rajni, Inderveer Chana |
COLLABES-4 |
Routing over Relaxed Triangulation Structures for P2P-based Virtual Environments |
Eliya Buyukkaya, Maha Abdallah
|
COLLABES-5 |
Hybrid Optical and Electrical Network Flow Scheduling in Cloud Data Centres |
Ibrahim Kabiru Musa, Stuart D Walker |
COLLABES-6 |
A Business Model for Personalized Promotion Systems On Using WLAN Localization and NFC Techniques
|
Kam-Yiu Lam; Joseph Kee-Yin Ng; JianTao Wang |
COLLABES-7 |
E-Commerce and B2B Services Enterprises |
Polina Fauska; Natalia V. Kryvinska; Christine Strauss |
COLLABES-8 |
Access network strategies and regulation in the EU |
Joao Paulo Ribeiro Pereira |
COLLABES-9 |
A Generic Logging Template for Infrastructure as a Service Cloud |
Winai Wongthai, Francisco Rocha, Aad van Moorsel |
COLLABES-10 |
An SLA ontology to support service discovery in future cloud markets |
Giuseppe Di Modica; Orazio Tomarchio; Giuseppe Petralia |
COLLABES-11 |
A Novel Two-Stage Multi-Crieteria Evaluation for Internal Attack in WSN |
Muhammad Raisuddin Ahmed; Xu Huang; Dharmendra Sharma; Hongyan Cui
|
COLLABES-12 |
Personal Analytics as a Factor of Change in Enterprise Communication and Collaboration Patterns |
Serguei Dobrinevski |
COLLABES-13 |
Experience in Developing Concurrent Inferences on a De-regulated Supply Chain Network |
Paul Moynihan and Wei Dai |
Accepted Paper List of DMWPC-2013
Paper Id |
Paper Title |
Author(s) |
DMWPC-1 |
Strategies for Enhancing Data Quality in Mobile CRM |
Richard Hable and Thomas Aglassinger |
DMWPC-2 |
On Scheduling Real-time Multi-item Queries in Multi-RSU Vehicular Ad Hoc Networks (VANETs) |
G.G.Md.Nawaz Ali, Edward Chan and Wenzhong Li |
DMWPC-3 |
A basic study of data collection ratio of drifting sensor networks for monitoring waterways |
Kazuma Mitake and Susumu Ishihara |
DMWPC-4 |
Routes establishing method and IPv6 addressing based on estimated distance form neighboring nodes in WMNs |
Yuta Maruoka and Kazunori Ueda |
DMWPC-5 |
System Design for Estimating Social Relationships from Sensing Data |
Akihiro Kida, Ryoichi Shinkuma, Tatsuro Takahashi, Kazuhiro Yamaguchi, Hiroyuki Kasai, Oscar Mayora |
DMWPC-6 |
Social Link Analysis using Wireless Beaconing and Accelerometer |
Kazuto Shimizu, Masayuki Iwai, Kaoru Sezaki |
DMWPC-7 |
Data Mining and Analysis of Large Scale Time Series Network Data |
Patricia A Morreale, Steve Holtz, Allan Goncalves |
Accepted Paper List of EASyCoSe-2013
Paper Id |
Paper Title |
Author(s) |
EASyCoSe-1 |
Energy Consumption Simulation of Different Distributed Intrusion Detection Approaches
|
Mauro Migliardi, Alessio Merlo |
EASyCoSe-2 |
Deriving Job Completion Reliability and Job Energy Consumption for a General MapReduce Infrastructure from Single-Job Perspective
|
Jia-Chun Lin, Fang-Yie Leu, Ming-Chang Lee, Ying-ping Chen |
EASyCoSe-3 |
Energy Consumption of the Mobile Wireless Sensor Network's Node Platform with Controlled Mobility
|
Konstantin Mikhaylov, Jouni Tervonen |
EASyCoSe-4 |
A Case for Energy-Aware Security Mechanisms
|
Xun Li; Fred Chong |
EASyCoSe-5 |
Scrutiny of Cyber Security for Smart Grid System
|
Davood Mohammadi Souran, Hanieh Esmaeeli |
EASyCoSe-6 |
Energy-Aware Cache Management for Content-Centric Networking |
Satoshi Imai, Kenji Leibnitz, Masayuki Murata |
EASyCoSe-7 |
CPNoC: An Energy-Efficient Photonic Network-on-chip |
Junhui Wang, Gang Han, Baoliang Li, Jia Lu, Wenhua Dou |
EASyCoSe-8 |
Smart Distributed System Architecture for Green Communications |
Anna Vizziello, Lorenzo Favalli |
EASyCoSe-9 |
Optimal Entropy based Spectrum Sensing for Maritime Cognitive Radio Networks
|
Waleed Ejaz, Mahin Atiq, Ghalib A. Shah, Hyung Seok Kim |
EASyCoSe-10 |
Estimation of the Energy Consumption of Mobile Sensors in WSN Environmental Monitoring Applications
|
Maurizio D'Arienzo, Mauro Iacono, Stefano Marrone, Roberto Nardone |
EASyCoSe-11 |
Reducing Energy Cost of Keepalive Messages in 3G Mobiles
|
Mohamed Oulmahdi, Christophe Chassot, Ernesto Exposito |
EASyCoSe-12 |
An Extension of the Link Layer Discovery Protocol for On-Demand Power Supply Network by PoE
|
Masaya Yokohata, Tomotaka Maeda, Yasuo Okabe |
EASyCoSe-13 |
The Potential of Energy/Utility-Accrual Scheduling
|
Marcus Hahnel, Marcus Volp, Bjorn Dobel, Hermann Hartig |
EASyCoSe-14 |
Cluster Head Assignment in Networks controlled by Gateway Entities (CHANGE)
|
Juan Rico, Javier Valino, Edgar Epifanio |
EASyCoSe-15 |
Modeling Energy Savings for Job Migration in Grid Environments
|
Antonella Galizia, Mark Yampolskiy, Michael Schiffers, Alfonso Quarati, Andrea Clematis |
EASyCoSe-16 |
Digital Watermarking Techniques and Security Issues in the Information and Communication Society
|
Jordi Nin, Sergio Ricciardi |
EASyCoSe-17 |
All Silicon Data Center, The Energy Perspective |
Antonio Scarfo |
EASyCoSe-18 |
Smart Outlet Network for Energy-aware Services Utilizing Various Sensor Information
|
Naoyuki Morimoto, Yuu Fujita, Masaaki Yoshida, Hiroyuki Yoshimizu, Masafumi Takiyamada, Terukazu Akehi, Masami Tanaka |
EASyCoSe-19 |
Decentralized Consensus Protocols: the enabler for Smart Grids Monitoring
|
Vincenzo Loia, Antonio Pietrosanto, Alfredo Vaccaro |
EASyCoSe-20 |
Energy Efficient Double Cluster Head Routing Scheme in a City Vehicular Network
|
Hamdi Idjmayyel, Bilal R Qazi, Jaafar Elmirghani |
Accepted Paper List of EOOPS-2013
Paper Id |
Paper Title |
Author(s) |
EOOPS-1 |
Evaluation of Java for General Purpose GPU Computing |
Jorge Docampo, Sabela Ramos, Guillermo L. Taboada, Roberto R. Exposito, Juan Tourino and Ramon Doallo |
EOOPS-2 |
Object support for OpenMP-style programming of GPU clusters in Java |
Carolin Wolf, Georg Dotzler, Ronald S Veldema and Michael Philippsen |
EOOPS-3 |
Promoting Data-Centric Supercomputing to the WWW World: Open MPI's Java Bindings |
Alexey Cheptsov |
EOOPS-4 |
Distributed Grobner bases computation with MPJ and pure Socket middle-ware |
Heinz Kredel |
EOOPS-5 |
Straightforward parallelization of polynomial multiplication using parallel collections in Scala |
Raphael Jolly |
EOOPS-6 |
CUDA Powered User-Defined Types and Aggregates |
Marcin Gorawski, Michal Lorek |
EOOPS-7 |
A Multi-GPU Framework for In-Memory Text Data Analytics |
Poh Kit Chong, Ettikan Kandasamy Karuppiah, Keh Kok Yong |
Accepted Paper List of FINA-2013
Paper Id(EDAS) |
Paper Title |
Author(s) |
#1569672739 |
A Framework to Assess Security Risks of Dynamic ID-Based Authentication Schemes |
Zhengxian Gao, Shou-Hsuan Stephen Huang, Wei Ding |
#1569672667 |
Privacy Enhanced and Computationally Efficient HSK-AKA LTE Scheme |
Khodor Hamandi, Imad Sarji, Ali Chehab, Imad H Elhajj, Ayman Kayssi |
#1569664309 |
Early Detection Method of Service Quality Reduction Based on Linguistic and Time Series Analysis of Twitter |
Kazushi Ikeda, Gen Hattori, Chihiro Ono, Hideki Asoh, Teruo Higashino |
#1569676525 |
Group Communication Protocols for Scalable Groups of Peers |
Dilawaer Duolikun, Ailixier Aikebaier, Tomoya Enokido, Makoto Takizawa |
#1569663965 |
3D-to-2D Projection Algorithm for Remote Control using Smartphone |
Ali Fahmi Perwira Negara, Budhi Prayoga, Jongmin Song, Ardiansyah Ardiansyah, Deokjai Choi |
#1569663947 |
DNS Update Extension to IPv6 Secure Addressing |
Hosnieh Rafiee, Martin Lowis, Christoph Meinel |
#1569697057 |
Optimal Frame Size for Internal and External Linear Prediction Techniques |
Faheem Khan, Latifullah Khan, Sahibzada Ali Mahmud, Gul Muhammad Khan |
#1569674159 |
MCF: Multi-Component Features for Malware analysis |
Vinod P, Vijay Laxmi, Manoj Singh Gaur, Smita Naval, Parvez Faruki |
#1569674081 |
On the Gaussian Characteristic of Aggregated Short-lived Flows on High-Bandwidth Links |
Ghasem Kahe, Amir Hossein Jahangir |
#1569673483 |
CCN-TV: a data-centric approach to real-time video services |
Vincenzo Ciancaglini, Giuseppe Piro, Riccardo Loti, Luigi Alfredo Grieco, Luigi Liquori |
#1569667049 |
Feedback Capacity of Different Complex Networks Models |
Ghufran Al-Shiridah, Khaled Mahdi, Maytham H Safar |
#1569676941 |
CORP: An Efficient Protocol to Prevent Data Loss in Mobile Ad-Hoc Networks |
Ganapathy Mani |
#1569676927 |
Protecting Access Pattern Privacy in Database Outsourcing Service |
Pham T. B. Hue |
#1569672923 |
Experiment of Geometrically Invariant and Unneeded Synchoronism Watermarking Using Winding Number |
Hiroki Nishikawa, Yoshio Kakizaki, Keiichi Iwamura, Isao Echizen |
#1569670253 |
An add-on for Security on Concurrent Multipath Communication SCTP |
Abbas Malekpour, Hamideh Jabalameli |
#1569664161 |
Green and Secure Office Space Using Near Field Coupling Communication System |
Tomoaki Yanagawa, Kohei Nagata, Yuichi Kado |
#1569653595 |
A Post-processing Beam Hardening Correction Method for Axial Computed Tomography |
Guowei Xue, Xiuwang Li, Yan Zhang |
#1569679015 |
Performance Analysis of Medium Access Control Protocol for Wireless Body Area Networks |
Nourchene Bradai, Lamia Chaari Fourati, Lotfi Kamoun |
#1569672577 |
Disambiguation in Named Entity Translation of Knowledge Base |
Liqun Ni, Minyi Guo, Yao Shen, Cheng-Zhong Xu |
#1569672455 |
The Throughput Benefits of Network Coding for SW-ARQ Communication |
Alaa Alsebae, Mark S Leeson, Roger J Green |
#1569672211 |
Impact of IEEE 802.11 PHY/MAC Strategies on Routing Performance in Wireless Mesh Networks |
Chiraz Houaidia, Hanen Idoudi, Adrien Bossche, Thierry Val, Leila Azouz Saidane |
#1569671173 |
A Novel Cluster Head Selection Method based on K-Means Algorithm for Energy Efficiency Wireless Sensor Networks |
Geon Yong Park, Heeseong Kim, Hwi Woon Jeong, Hee Yong Youn |
#1569662859 |
Modeling Controls for Compliance - An Analysis of Business Process Modeling Languages |
Hans Betke, Kai Kittel, Stefan Sackmann |
#1569673589 |
Simulating reader-to-reader interference in RFID systems |
Renato Ferrero, Filippo Gandino, Linchao Zhang, Bartolomeo Montrucchio, Maurizio Rebaudeng |
#1569668049 |
A Configurable And Extensible Security Service Architecture for Smartphones |
Philipp Stephanow, Dennis Titze, Julian Schutte |
#1569664065 |
A Novel Web Synchronization Method for Supporting Smooth Web Communication |
Kazuyuki Tasaka, Takashi Ozu, Akira Idoue |
#1569677063 |
Technical Challenges in Providing Remote Health Consultancy Services for the Unreached Community |
Kai Eiko |
#1569671025 |
Acceleration of Communication-Aware Task Mapping Techniques through GPU Computing |
Javier Reyes, Juan Manuel Ordua, Guillermo Vigueras, Rafael Tornero Gavila |
#1569671221 |
M2M Data Analysis Service System based on Open Source Software Environments |
Shinji Kitagami, Hisao Koizumi, Moriki Yamamoto, Takuo Suganuma |
#1569664441 |
Routing Protocol Based on the Position, Velocity, and Direction of the Nodes |
Gil Eduardo Andrade, Luiz A. P. Lima, Jr., Alcides Calsavara, Carlos A Maziero |
#1569656883 |
Performance Comparison of Wireless Networks over IPv6 and IPv4 Under Several Operating Systems |
Hossam Mahmoud Fahmy |
#1569672639 |
Android SMS Malware: Vulnerability and Mitigation |
Khodor Hamandi, Ali Chehab, Imad H Elhajj, Ayman Kayssi |
#1569673301 |
Network Data Visualization Using Parallel Coordinates Version of Time-tunnel with 2Dto2D visualization for Intrusion Detection |
Yoshihiro Okada |
#1569673117 |
Performance Evaluation of Hierarchical-Torus NoC |
Samia Loucif |
#1569658251 |
Applying Reputation to Virtual Magnetic Networks |
Henrique Galperin, Luiz A. P. Lima, Jr., Alcides Calsavara |
#1569673469 |
A Markov Chain Based Model for Congestion Control in VANETs |
Lyes Khoukhi, Moez Esseghir, Leila Boulahia, Mohamed Amine Benatia |
#1569664199 |
Data Collection From Isolated Clusters in Wireless Sensor Networks Using Mobile Ferries |
Konstantin Mikhaylov, Jouni Tervonen |
#1569662393 |
Exploring the factors that influence continuance intention to attend one-to-some online courses via videoconferencing software |
Tai-Tien Lin, Kuo-Lun Hsiao, Ching-Ting Huang, Hsiu-Sen Chiang |
#1569675873 |
Scalablity performance analysis of H.264/SVC video transmission over WLANs |
Olfa Ben Rhayem, Lamia Chaari Fourati |
#1569661823 |
Runtime Change of Collaboration Patterns in Autonomic Systems: Motivations and Perspectives |
Giacomo Cabri, Nicola Capodieci |
#1569676445 |
Influence of buffer size on TCP performance in heterogeneous wired/wireless networks |
Ivan Vujovic |
#1569661679 |
Comparison of Three Interpolation Techniques In Comb-Type Pilot-Assisted Channel Coded OFDM System |
Latifullah Khan, Sahibzada Ali Mahmud, Zeeshan Sabir, Gul Muhammad Khan |
#1569673429 |
A recommendation exchange protocol between smart devices in pervasive computing environment |
Naima Iltaf, Abdul Ghafoor, Usman Zia |
#1569672599 |
Multihop Mobility Metrics based on Link Stability |
Namusale Chama, Rute C. Sofia, Susana Sargento |
#1569663011 |
A New Active Path Identification and Filtering Method |
Lin Chen |
#1569672783 |
A Multi-Class Mobility Model for Dynamic & Dependable Systems |
Peter Bull, Georgios Antonopoulos, Lin Guan |
#1569663923 |
UML Profile for Modeling Mobility Data of a Hospital in Motion |
Jalel Akaichi |
#1569676599 |
The Impact of Content Oriented Routing on OpenFlow Burst Switched Optical Networks |
Mohammed Al-Momin, John Cosmas |
#1569673215 |
A Virtual Campus Tour Service using Remote Control Robots on Robot Service Network Protocol |
Yuka Kato |
#1569671389 |
Modelling Attacker with Deciding Security Properties by Induction and Deduction |
Yoney Kirsal-Ever, Agozie Eneh, Orhan Gemikonakli, Leonardo Mostarda |
#1569673439 |
An ECC-Time Stamp based Mutual Authentication and Key Management Scheme for WSNs |
Gaurav Indra |
#1569670235 |
A study on practices against malware in free software projects |
Ignacio Colomina, Robert Clariso, Joan Arnedo-Moreno |
#1569663657 |
Image Objects Phase/Intensity Measurements Using Conjugated Spatial Light Modulators over Mach-Zehnder Interferometry |
Jen-Fa Huang, Yu-Chang He |
#1569664277 |
Research into Recommender Functions for Learning Support Systems |
Yuji Wada |
#1569673793 |
Privacy Obfuscation with Bloom Filter for Effective Advertisement |
Ryuya Uda |
#1569666181 |
A Client Privacy Preserving Discovery Service Scheme |
Zhipeng Wang, Hong Zhu |
#1569672611 |
Dynamic Virtual Routers Using Multiway Segment Tree |
Yeim-Kuan Chang, Zi-Yang Ou, Fang-Chen Kuo |
Accepted Paper List of HWISE-2013
Paper Id |
Paper Title |
Author(s) |
HWISE-1 |
A Comparison of Wireless Sensor Network Goodput and Delay on the simulation and an Experimental Testbed |
Tao Yang, Elis Kulla, Leonard Barolli, Gjergji Mino, Makoto Takizawa |
HWISE-2 |
A distributed TDMA slot scheduling algorithm for spatially correlated contention in WSNs |
Ashutosh Bhatia, Ramesh C. Hansdah |
HWISE-3 |
Access Control with RFID in the Internet of Things |
Steffen Jensen, Rune Hylsberg Jacobsen |
HWISE-4 |
Inner-Distance Measurement and Shape Recognition of Target Object Using Networked Binary Sensors |
Shigeo Shioda |
HWISE-5 |
Mobility-Sensitive Power Control for MBSFN Cellular Networks |
Konstantinos Asimakis, Christos Bouras, Vasileios Kokkinos, Andreas Papazois |
HWISE-6 |
A Protocol for Authentication with Multiple Levels of Anonymity (AMLA) in VANETs |
Bhavesh Bharadiya, Soumyadev Maity, Ramesh C. Hansdah |
HWISE-7 |
Effects of Signaling Attacks on LTE Networks |
Ramzi Bassil, Imad H Elhajj, Ali Chehab, Ayman Kayssi |
HWISE-8 |
Proposal and Implementation of Encounter Data Transmission with Ultrasonic Sensor-based Active Wakeup Mechanism for Energy Efficient Sparse Wireless Sensor Network |
Tatsuhiko Nakano, Yutaka Arakawa, Shigeaki Tagashira, Akira Fukuda, Riadh Dhaou |
HWISE-9 |
Wireless Networks Sensors and Social Streams |
Dmitry Namiot, Manfred Sneps-Sneppe |
HWISE-10 |
Perform Vertical Handover Decision based on the Quality of Service Perceived to the End Users |
Sassi Maaloul, Afif Meriem, Sami Tabbane |
HWISE-11 |
ANCH: A New Clustering Algorithm for Wireless Sensor Networks |
Morteza Mohammadi Zanjireh, Alireza Shahrabi, Hadi Larijani |
HWISE-12 |
Effect Of Relay Nodes On End-to-end Delay In Multi-hop Wireless Ad-hoc Networks |
Rajavaraprasad Yerra, Pachamuthu Rajalakshmi |
HWISE-13 |
Scheduling Workflows in Multi-Cluster Environments |
Silvio Luiz Stanzani, Liria Sato, Marco A. S. Netto |
HWISE-14 |
A novel learning-based spectrum sensing technique for Cognitive Radio Networks |
Mehmet Emin Aydin, Ghazanfar A. Safdar, Nauman Aslam |
HWISE-15 |
AODV vs AODV: Modifications in Routing Metric and Route Discovery Mechanism |
Latifullah Khan, Sahibzada Ali Mahmud, Gul Muhammad Khan, Hamed Saffa Al-Raweshidy |
HWISE-16 |
Toward Green Mobility in Femtocell Networks |
Aicha Salem, Kaouthar Sethom |
HWISE-17 |
A Novel Probabilistic Key Management Algorithm for Large Scale MANETs |
Mohammed Gharib, Ehsan Emamjomeh-Zadeh, Ashkan Norouzifard, Ali Movaghar |
HWISE-18 |
Framework for Generic Context- and Policy-Based Traffic Distribution in Heterogeneous Wireless Networks: Black Rider |
Sandra Frei, Woldemar Fuhrmann, Bogdan Ghita |
HWISE-19 |
On the Feasibility of making Intelligent Antenna Selection Decision in IEEE 802.15.4 Wireless Sensor Networks |
Mubashir Husain Rehmani, Abderrezak Rachedi, Stephane Lohier, Thierry Alves, Benoit Poussot |
HWISE-20 |
Quantifying the Multiple Cognitive Radio Interfaces Advantage |
Muhammad Talal Hassan, Ejaz Ahmed, Junaid Qadir, Adeel Baig |
HWISE-21 |
Improving Secure Routing Protocols Using Additional Features |
Jose Luis Tornos, Jose Luis Salazar |
HWISE-22 |
Metropolitan Spectrum Survey in Bogota Colombia |
Luis Pedraza |
HWISE-23 |
GAODV: A Modified AODV against single and collaborative Black Hole attacks in MANETs |
Sanjay Kumar Dhurandher, Isaac Woungang, Prashant Khurana, Raveena Mathur, Shipra Agrawal |
HWISE-24 |
Malicious Node Detection in Wireless Sensor Networks |
Alaa Atassi, Naoum Sayegh, Imad H Elhajj, Ali Chehab, Ayman Kayssi |
HWISE-25 |
On Determining Bandwidth Usage Threshold to Support Real-Time Multimedia Applications in Wireless Multimedia Sensor Networks |
Muhammad Farooq |
HWISE-26 |
Single-Sink Mobility Performance Analysis on a Wireless Senosr Networks |
Majid Bayani |
HWISE-27 |
Behavioral Mobility Model with Geographic Constraints |
Razvan Beuran, Shinsuke Miwa, Yoichi Shinoda |
HWISE-28 |
The inter-cell interference suppression algorithm based on the JP-CoMP and performance simulation |
Weihong Fu, Lili Ma, Cheng Wang, Qingliang Kong, Weixin Tian |
HWISE-29 |
A Priority Based Differentiation for Contention Mechanism in Legacy DCF Method |
Sanjay Kumar Dhurandher, Isaac Woungang, Sahil Sharma, Veeresh Goswami |
HWISE-30 |
A Secure and Efficient Authentication Protocol (SEAP) for MANETs with Membership Revocation |
Soumyadev Maity, Ramesh C. Hansdah |
HWISE-31 |
Evaluation of IEEE 802.11n for Multimedia applications in VANET |
Mohammad Akbar |
HWISE-32 |
Vehicle Path Verification using Wireless Sensor Networks |
Vamsi Krishna Paruchuri, Sriram Chellappan, Gerry Howser |
HWISE-33 |
WiMAX-WLAN Vehicle-to-Infrastructure Network Architecture during fast handover process |
Michael Charitos, Grigorios Kalivas |
HWISE-34 |
Decoupling losses for end-to-end bandwidth guarantees in interdomain traffic |
Fernando Fernandez-Valdes Pedrosa, Manuel Fernandez Veiga, Candido Lopez Garcia, Andres Suarez-Gonzalez |
HWISE-35 |
Stabilization and Lifetime Optimization in Distributed Sensor Networks |
Mourad Hakem |
HWISE-36 |
A multi-variable traffic model of a Wi-Fi data network that allows estimating Throughput mean values |
Cesar Hernandez, Luis Pedraza, Camila Salgado |
HWISE-37 |
Towards High Reliability of a Multi-Agent System Designed for Intrusion Detection in MANET |
Leila Mechtri, Fatiha Djemili, Salim Ghanemi |
HWISE-38 |
A Stochastic Process based Framework of Redeployment Model for Wireless Sensor Network |
Ravindara Bhatt |
HWISE-39 |
Performance Evaluation of ADV with AODV for Real-time Applications in Vehicular Ad-hoc Networks (VANETs) |
Omer Masood, Adeel Akram, Nadeem Majeed |
HWISE-40 |
Combined Traffic Simulation Scenarios For Performance Investigation Routing protocols AODV, DSR and DSDV in MANET |
Qutaiba Razouqi, Mohamad M. Gaballah |
HWISE-41 |
MAR-AODV:Innovative Routing Algorithm in MANET based on Mobile Agent |
Cuong Cung Trong, Tu Vo Thanh, Hai Nguyen Thuc |
HWISE-42 |
Empirical Evaluation of Superposition Coded Multicasting for Scalable Video |
Chun Pong Lau, Basem Shihada, Pin-Han Ho |
HWISE-43 |
On the Design of Energy-Aware 3G/WiFi Heterogeneous Networks Under Realistic Conditions |
Sireen Taleb, Mohamad Dia, Jamal Farhat, Zaher Dawy, Hazem Hajj |
HWISE-44 |
WiFi for Vehicular Communication Systems |
Janis Jansons, Ernests Petersons, Nikolajs Bogdanovs |
Accepted Paper List of ICAES-2013
Paper Id |
Paper Title |
Author(s) |
ICAES-1 |
iMAS: an Intelligent Mobile Advertising System: Development and Implementation |
Evans, C, H. P. Moore, Thomas, A., Pavlenko, O. |
ICAES-2 |
Implementation of a FIPA compliant BDI agent platform in .NET: CloudNetBDI 1.0 |
Evans,C., Abu Rmeileh, S. |
ICAES-3 |
eMonitoring for eHealth: Research Projects for Assisted Living |
Thomas, A.M., Evans, C., Moore, P., Sharma, M., Patel, A., Shah, H., Chima, P., Abu Rmeileh, S., Dubb, G., Bhana, R. |
ICAES-4 |
Towards Independent Assisted Living: The Application of Intelligent Context-Aware System |
Moore, P., Evans, C., Tadros, G. |
Accepted Paper List of iCCI-2013
Paper Id |
Paper Title |
Author(s) |
iCCI-1 |
A Deadline Scheduler for Job Execution in Cloud Systems |
Quentin Perret, Gabriel Charlemagne, Stelios Sotiriadis, Nik Bessis |
iCCI-2 |
Towards inter-cloud simulation performance analysis: Exploring service-oriented benchmarks of clouds in SimIC |
Stelios Sotiriadis, Nik Bessis, Nikos Antonopoulos |
iCCI-3 |
An agent-based architecture and a two-phase protocol for the data portability in clouds |
Meriem Thabet |
iCCI-4 |
Energy-Aware Social-based Routing in Opportunistic Networks |
Cristian C. Chilipirea, Andreea-Cristina Petre, Ciprian Dobre |
iCCI-5 |
Reputation guided Genetic Scheduling Algorithm for Independent Tasks in Inter-Clouds Environments |
Florin Pop, Nik Bessis, Stelios Sotiriadis, Valentin Cristea |
iCCI-6 |
InterCloud Architecture Framework for Heterogeneous Cloud based Infrastructure Services Provisioning On-Demand |
Yuri Demchenko, Canh Ngo, Joan A. Garcia-Espin, Sergi Figuerola, Juan Rodriguez, Luis Miguel Contreras, Giada Landi, Nicola Ciulli |
iCCI-7 |
User-side Personalization Considering Privacy Preserving in Cloud Systems |
Leila Sharifi, Maryam Heidari Beisafar, Omid Reza Speily |
Accepted Paper List of IWDENS-2013
Paper Id |
Paper Title |
Author(s) |
IWDENS-1 |
Directional Antenna Control based Mobile Adhoc Network for Disaster Use |
Yoshitaka Shibata, Noriki Uchida and Toshihiro Suzuki |
IWDENS-2 |
Self Power Supplied Micro Wireless Ballooned Network for Disaster Recovery |
Saneatsu Arimura, Noriki Uchida and Yoshitaka Shibata |
IWDENS-3 |
Study on change method of the link between the Network Node based on NDN |
Yuto Sekino, Noriki Uchida, Yoshitaka Shibata |
IWDENS-4 |
Proposal of Delay Tolerant Network with Cognitive Wireless Network for Disaster Information Network System |
Noriki Uchida, Norihiro Kawamura, Nicholas Williams, Kazuo Takahata, Yoshitaka Shibata |
IWDENS-5 |
Using Workflow Management Systems for Improving Disaster Response Processes |
Marlen Hofmann, Stefan Sackmann, Hans Betke |
IWDENS-6 |
Development of Smartphone Application for Off-line Use in Case of Disaster |
Hiroaki YUZE, Yuzhe QIAN, Naoyoshi SUZUKI |
Accepted Paper List of MAW-2013
Paper Id |
Paper Title |
Author(s) |
MAW-1 |
Document Modeling using Syntactic and Semantic Information |
Emilie Au, Mohamed Bouguessa, Shengrui Wang |
MAW-2 |
Cycling Course Recommender System based on User’s Taste of Scenery |
Masato Kasahara, Ryuto Ota, Kosuke Takano |
MAW-3 |
Detecting Local Events by Analyzing Spatiotemporal Locality of Tweets |
Takuya Sugitani, Masumi Shirakawa, Takahiro Hara, Shojiro Nishio |
MAW-4 |
Foreign Exchange Trading Rules using a Single Technical Indicator from Multiple Timeframes |
Shangkun DENG, Akito SAKURAI |
MAW-5 |
Mining Botnet Behaviors on the Large-scale Web Application Community |
Dan Garant, Wei Lu |
MAW-6 |
A general purpose model for future prediction based on web search data: Predicting Greek and Spanish elections |
Spyros Polykalas, George Prezerakos, Agisilaos Konidaris |
MAW-7 |
Fine-Grained Access Control for Object-Oriented Databases:An Annotation Specific Approach |
Rahat Masood, Awais Shibli, Abdul Ghafoor |
MAW-8 |
A Feasibility Study on Using Low-Cost Gaming Devices for Rehabilitation |
Kin Fun Li, Ana-Maria Sevcenco |
MAW-9 |
Two-Phase Genetic Algorithm for Social Network Graphs Clustering |
Jan Kohout, Roman Neruda |
MAW-10 |
A Novel Architecture Based on Web Services Integrating Mammography Images Structured Reports |
Alfonso Farruggia, Rosario Magro, Salvatore Vitabile |
MAW-11 |
Mining Online Book Reviews for Sentimental Clustering |
Eric Lin, Shiaofen Fang, Jie Wang |
Accepted Paper List of NetMM-2013
Paper Id |
Paper Title |
Author(s) |
NetMM-1 |
Passive Testing on Performance Requirements of Network Protocols |
Xiaoping Che and Stephane Maag |
NetMM-2 |
Enabling IPTV Service Assurance using OpenFlow |
Patrick McDonagh, Cristian Olariu, Adriana Hava and Christina Thorpe |
NetMM-3 |
Encrypted Incremental Backup without Server-Side Software |
Meriem Shih-Yu Lu |
NetMM-4 |
An Effective Attack Detection Approach in Wireless Mesh Networks |
Felipe Barbosa Abreu, Anderson Morais, Ana Cavalli, Bachar Wehbi and Edgardo Montes de Oca |
NetMM-5 |
Study on a Distributed Rerouting Scheme |
Ilir Shinko, Yoann Fouquet and Dritan Nace |
NetMM-6 |
Modeling and Evaluation of Machine Learning based Network Management System for NGN |
Abul Bashar |
NetMM-7 |
Adkintun: SLA Monitoring of ISP Broadband Offerings |
Javier Bustos, Victor Ramiro, Felipe Lalanne and Tomas Barros |
Accepted Paper List of NetVE-2013
Paper Id |
Paper Title |
Author(s) |
NetVE-1 |
ARISTOTELE: A Semantic-driven Platform for Enterprise Management |
Pierluigi Del Nostro, Francesco Orciuoli, Stefano Paolozzi, Pierluigi Ritrovato, Daniele Toti |
NetVE-2 |
A new framework for Virtual Organizations |
Mahdieh Shadi, Hamideh Afsarmanesh |
NetVE-3 |
Supporting Decision Meeting in virtual organization |
Abdelkader Adla |
NetVE-4 |
MAR-AODV:Innovative Routing Algorithm in MANET based on Mobile Agent |
Cuong T. Cung, Tu T. Vo, Hai T. Nguyen |
NetVE-5 |
A Ontological Collaborative Framework for Business Process Integration |
Minh T. N. Hoang, Trung V. Nguyen, Hanh H. Hoang |
Accepted Paper List of PAEWN-2013
Paper Id |
Paper Title |
Author(s) |
PAEWN-1 |
A Modular Architecture for QoS Provisioning over Wireless Links |
Maurizio Casoni, Alessandro Paganelli and Paolo Valente |
PAEWN-2 |
Simulating Wireless Nano Sensor Networks in the NS-3 platform |
Giuseppe Piro, Luigi Alfredo Grieco, Gennaro Boggia and Pietro Camarda |
PAEWN-3 |
An LSPI based Reinforcement Learning Approach to Enable Network Cooperation in Cognitive Wireless Sensor Networks |
Milos Rovcanin, Eli De Poorter, Ingrid Moerman and Piet Demeester |
PAEWN-4 |
The Price of Secure Mobile Video Streaming |
Gabor Feher |
PAEWN-5 |
Multi-threaded Simulation of 4G Cellular Systems within the LTE-Sim Framework |
Alessandro Pellegrini, Giuseppe Piro |
PAEWN-6 |
Bounding End-to-End Delay for Real-Time Environmental Monitoring in Avionic Systems |
Daeha Jiny, Junhee Ryu, Heonshik Shin, Juyoung Park, Kyungtae Kang |
PAEWN-7 |
Performance and Reliability Analysis of Small Cell Networks with Retrials and Different Breakdowns Disciplines: A Computational Approach |
Nawel Gharbi |
PAEWN-8 |
An Admission Control Scheme based on Transmissions Scheduling for Wireless Mesh Networks |
Dromard Juliette, Khoukhi Lyes and Khatoun Rida |
PAEWN-9 |
Outage Tolerant Markov Model of Wireless Fading Channels for Statistical Parameter Estimation |
Anjana Jain, Prakash Vyavahare and Leeladhar Arya |
PAEWN-10 |
Effect of radio interference models on the performance of time slot assignment algorithms in IEEE 802.16j relay networks |
Ryosuke Mine, Go Hasegawa, Yoshiaki Taniguchi and Hirotaka Nakano |
PAEWN-11 |
Joint Random Linear Network Coding and Convolutional Code with Interleaving for Multihop Wireless Network |
Misfa Susanto, Yim Fun Hu and Prashant Pillai |
PAEWN-12 |
Performance Evaluation of Alternative Network Architectures for Sensor-satellite Integrated Networks |
Suraj Verma, Prashant Pillai and Yim Fun Hu |
PAEWN-13 |
Performance Evaluation of QoS and Load balancing Strategies for VANET Based Gateway Discovery Protocols |
Noura Aljari, K. Abrougui, M. Almulla, A. Boukerche |
Accepted Paper List of PAMS-2013
Paper Id |
Paper Title |
Author(s) |
PAMS-1 |
Design and Implementation of the NorNet Core Research Testbed for Multi-Homed Systems |
Thomas Dreibholz and Ernst Gran
|
PAMS-2 |
Network Topology Inference from End-to-End Unicast Measurements |
Amir Malekzadeh and Mike H. MacGregor |
PAMS-3 |
Throughput Analysis of Load-Sharing Protocols in an Inter-Continental Testbed Environment |
Hakim Adhari, Erwin Rathgeb, Xing Zhou |
PAMS-4 |
Multipath Video Streaming based on Hierarchical Routing Management |
Thomas Volkert, Martin Becke and Manuel Osdoba |
PAMS-5 |
Non-Renegable Selective Acknowledgments (NR-SACKs) for MPTCP |
Fan Yang and Paul Amer |
PAMS-6 |
Mitigating Receiver’s Buffer Blocking by Delay Aware Packet Scheduling in Multipath Data Transfer |
Golam Sarwar, Roksana Boreli, Emmanuel Lochin, Ahlem Mifdaoui and Guillaume Smith |
Accepted Paper List of PITSaC-2013
Paper Id |
Paper Title |
Author(s) |
PITSaC-1 |
A Unified View on Data Path Aspects for Sensing Applications at a Smart City Scale |
Vangelis Gazis, Martin Strohbach, Navot Akiva and Maximilian Walther |
PITSaC-2 |
Parking easier by using context information of a Smart City |
Juan Rico, Juan Sancho, Bruno Cendon and Miguel Camus |
PITSaC-3 |
Challenges and considerations for smart parking applications |
Lambros Lambrinos |
PITSaC-4 |
Scripting a Smart City |
Davide Carboni, Andrea Piras, Antonio Pintus, Alberto Serra, Atta Badii and Marco Tiemann |
PITSaC-5 |
Validating a Business Model Framework for Smart City Services: The Case of FixMyStreet |
Nils Walravens |
PITSaC-6 |
A Living Smart City: Dynamically Changing Nodes Behavior Through Over the Air Programming |
Jose Antonio Galache, Pablo Sotres, Juan R. Santana, Verica Gutierez, Luis Schez and Luis Muz |
PITSaC-7 |
Design of Geographically Aggregatable Address and Routing toward Location Based Multicast |
Kazuya Okada, Takeshi Okuda and Suguru Yamaguchi |
PITSaC-8 |
Potential Battlefield Networks Management: Scale Free Network Applications |
Dhananjay Singh and Gaurav Tripathi |
PITSaC-9 |
HIP security architecture for the IP-based Internet of Things |
Francisco Vidal Meca, Jan Henrik Ziegeldorf, Oscar Garcia Morchon, Sandeep S. Kumar, Sye Loong Keoh and Pedro Moreno Sanchez |
PITSaC-10 |
Architecture for smart highway real time monitoring |
Felix Villanueva Molina, Javier Albusac, Luis Jimenez, David Villa and Juan Carlos Lopez |
PITSaC-11 |
Semantic-based Knowledge Dissemination and Extraction in Smart Environments |
Michele Ruta, Floriano Scioscia, Eugenio Di Sciascio, Domenico Rotondi and Salvatore Piccione |
PITSaC-12 |
Differential Elliptic Point Addition in Twisted Edwards Curves |
Leandro Marin and Paul Gorissen |
PITSaC-13 |
Ethics inside |
Rob Van Kranenburg |
PITSaC-14 |
Heterogeneous device interaction based on an IPv6 enabled service-oriented architecture for building automation systems |
Markus Jung, Alex Olivieri and Wolfgang Kastner |
PITSaC-15 |
RFID Tracking for urban transportation using EPCGlobal-based WebServices |
Jose Ivan San Jose Vieco, Jose Manuel Pastor Garc, Roberto Zangroniz Cantabrana and Juan Jose de Dios de Dios |
PITSaC-16 |
Towards Ambient Assisted Cities and Citizens |
Diego Lopez-De-Ipina, Bernhard Klein and Jorge Perez-Velasco |
PITSaC-17 |
Improving service quality for parking lot users using intelligent parking reservation policies |
Nikolaos Doulamis, Eftychios Protopapadakis and Lambros Lambrinos |
PITSaC-18 |
An Extended Topic-based Pub/Sub Broker for Cooperative Mobile Services |
Augusto Morales, Ramon Alcarria, Edwin Cede and Tomas Robles Valladares |
PITSaC-19 |
Extension of the ITS Station Architecture to Low-Power Pervasive Sensor Networks |
Laszlo Virag, Josef Kovacs and Andras Edelmayer |
PITSaC-20 |
Benchmarking Internet of Things deployments in Smart Cities |
Franck Le Gall, Sophie Vallet Chevillard, Alexander Gluhak and Zhang Xueli |
PITSaC-21 |
Obtaining patient tracking and medications through RFID technology at the Day Hospital of Integrated Management of A Coru |
Maria Martinez Perez, Jose Ramon Vizoso Hermida, Isabel Martin Herranz and Guillermo Vazquez Gonzalez |
PITSaC-22 |
A Variability Model for Template Personalization in Mobile Prosumer Environments |
Ramon Alcarria, Tomas Robles Valladares, Augusto Morales and Daniel Caballero Bellot |
PITSaC-23 |
Probabilistic Model Checking as Means of Energy Evaluation in Communication Protocols |
Sophia Petridou and Stylianos Basagiannis |
PITSaC-24 |
Digcovery Mobile: A global service discovery for the Internet of Things |
Antonio J. Jara, Pablo Lpez, David Fernadez Ros, Antonio F. Skarmeta |
PITSaC-25 |
Enabling Participative Marketing through the Internet of Things |
Antonio J. Jara, Maria Concepcion Parra, Antonio F. Skarmeta |
PITSaC-26 |
Smart lighting solutions for Smart Cities |
Antonio J. Jara, Miguel Castro, and Antonio F. Skarmeta |
PITSaC-27 |
Survey of Internet of Things technologies for clinical environments |
David Fernadez Ros, Pablo Lpez, Antonio J. Jara, Benito Ubeda, Miguel A. Zamora, Antonio F. Skarmeta |
Accepted Paper List of SMME-2013
Paper Id |
Paper Title |
Author(s) |
SMME-1 |
Adoption of Social Media for Internal Usage in a Global Enterprise |
Stefan Stieglitz, Siegfried Schallenmuller, Christian Meske
|
SMME-2 |
Accessing Knowledge with a Game - a Meta-analysis of Prediction Markets |
Christian W. Scheiner, Philipp Haas, Niklas Leicht, Kai-Ingo Vogt |
SMME-3 |
Taxonomy of Business Values for Enterprise Apps |
Tobias Brockmann |
SMME-4 |
Usage of Social Media for external stakeholder Relationship Management a study of German Companies and international non-governmental organizations |
Nina Kruger, Anna-Maria Schneider, Linh Dang-Xuan, Stefan Stieglitz
|
SMME-5 |
A Mobile Social Network for Collaboration in Semi-Structured Business-Ecosystems - The Case of Block Restoration |
Christoph Lattemann |
SMME-6 |
Specification of mCRM Enterprise Applications to Support IT-Consultants |
Tobias Brockmann, Stefan Stieglitz |
Accepted Paper List of SMPE-2013
Paper Id |
Paper Title |
Author(s) |
SMPE-1 |
Analysis of the forensic traces left by AirPrint in Apple iOS devices
|
Luis Gomez-Miralles, Joan Arnedo-Moreno |
SMPE-2 |
SWIFT: A Secure Web Domain Filter in Hardware
|
Vlado Altmann, Jens Rohrbeck, Peter Danielis, Dirk Timmermann, Maik R, Matthias Ninnemann |
SMPE-3 |
Reputation Scoring System Using an Economic Trust Model
|
Marat Vyshegorodtsev, Daisuke Miyamoto, Yasushi Wakahara |
SMPE-4 |
Behavior Ontology: A Framework to Detect Attack Patterns for Security
|
Sujeong Woo, Jinho On, Moonkun Lee |
SMPE-5 |
Integration of Privacy Protection Mechanisms in Location-Based Services
|
Pericle Perazzo, Gianluca Dini |
SMPE-6 |
Toward mobile authentication with keystroke dynamics on mobile phones and tablets
|
Matthias Trojahn, Frank Ortmeier |
SMPE-7 |
A Practical Steganographic Approach for Matroska based High Quality Video files |
Nikolaos Pitropakis, Costas Lambrinoudakis, Dimitris Geneiatakis, Dimitris Gritzalis |
SMPE-8 |
A Two-tier Overlay Publish/Subscribe System for Sensor Data Stream Using Geographic Based Load Balancing
|
Tatsuya Fukui, Satoshi Matsuura, Atsuo Inomata, Kazutoshi Fujikawa |
SMPE-9 |
Bidirectional Private Policy Matching based on Additively Homomorphic Encryption Systems
|
Momoko Aoyama, Fumihiro Mori, Hirofumi Yamaki |
SMPE-10 |
Determining Home Users' Vulnerability to Universal Plug and Play (UPnP) Attacks
|
Shadi Esnaashari, Ian Welch |
SMPE-11 |
Design and Implementation of IP Network Behaviour Analysis System Based on NetFlow
|
Huihui Hou, Tongge Xu, Rongbo Zou |
SMPE-12 |
A Scheme for the Generation of Strong ICMetrics based Session Key Pairs for Secure Embedded System Applications
|
Ruhma Tahir, Gareth Howells, Housheng Hu, Dongbing Gu, Klaus McDonald-Maier |
SMPE-13 |
Petri-Net Based User Profile Data Ontology for SNS
|
Hwa-Young Jeong, Jong-Hyuk Park, Young-Sik Jeong |
SMPE-14 |
Traditional Culture Learning System for Korean Folk Literature, Pansori
|
Dong-Keon Kim, Woon-Ho Choi |
Accepted Paper List of TeNAS-2013
Paper Id |
Paper Title |
Author(s) |
TeNAS-1 |
Design and Implementation of Real-Time Flow Viewer Across Different Domains for Future Internet |
Wun-Yuan Huang, Jen-Wei Hu, Ta-Yuan Chou, Te-Lung Liu |
TeNAS-2 |
Designing a Testbed for Broadcast Opportunistic Wireless Data Dissemination Protocols |
Nasif Muslim, Florian Pregizer |
TeNAS-3 |
Analyzing Broadband Divide in the Farming Sector |
Michael Jensen, Jose M. Gutierrez and Jens M. Pedersen |
TeNAS-4 |
Sensor Data Processing Method Based on Observed Person’s Similarity for Motion Estimation |
Shintaro Imai, Mariko Miyamoto, Yoshikazu Arai, Toshimitsu Inomata |
TeNAS-5 |
A Retrospective Analysis of QoS Deployment, Operation and Use in Enterprise and Provider Networks |
Michael Mackay, Christopher Edwards |
TeNAS-6 |
Client Buffering Considerations for Video Streaming |
R. Pereira, E. G. Pereira |
TeNAS-7 |
Performance Evaluation of Transmission Order Control on Relay Nodes in Multi-hopWireless Networks |
Kentaro Kameyama, Hiroyuki Koga, Masayoshi Shimamura, Yutaka Fukuda and Takeshi Ikenaga |
TeNAS-8 |
A Machine Learning Algorithm for Searching Vectorised RDF Data |
Asaad Hadi, Paul Fergus, Chelsea Dobbins, Abbas Muhsin, Abir Hussain,,and Dhyia |
Accepted Paper List of WReCS-2013
Paper Id |
Paper Title |
Author(s) |
WReCS-1 |
Proposal of Sensor Data Gathering System with Single Board Computer |
Katsuysohi Matsumoto, Motoi Yamagiwa, Minoru Uehara, Hideki Mori |
WReCS-2 |
Proposal of solar powered grid computing with reuse handheld devices |
Motoi Yamagiwa, Katsuyoshi Matsumoto, Minoru Uehara |
WReCS-3 |
Interactive Interface for Web-based Programming Environment |
Hideaki Yamagisawa, Kayo KONDO |
WReCS-4 |
Research of PE Array Connection Network for Cool Mega-Array |
Rie Uno, Nobuaki Ozaki, Hideharu Amano |
WReCS-5 |
An FPGA Implementation of Reconfigurable Real-Time Vision Architecture |
Jorge Hiraiwa, Hideharu Amano |
WReCS-6 |
A Dependable CSP-based Small World Communication Processor |
Hideki Mori, Katsuyoshi Matsumoto, Minoru Uehara |
WReCS-7 |
A circuit division method for High-Level synthesis on Multi-FPGA systems |
Kugami Daiki, Takaaki Miyajima, Hideharu Amano |
WReCS-8 |
Fault Tolerance on NOCs (Invited Talk) |
Jose Miguel Montanana |
|