IMIS-2015 Main Conference: Accepted Papers
Paper ID | Paper Title and Author(s) |
---|---|
IMIS-01 |
Experimental Results of a CentOS-based Ad-Hoc Network Testbed Considering LoS Scenario Tetsuya Oda; Yi Liu; Keita Matsuo; Shinji Sakamoto; Makoto Ikeda; Leonard Barolli |
IMIS-02 |
A Fuzzy-Based Reliable System for JXTA-Overlay P2P Platform Considering Number of Interactions, Security, Packet Loss and Local Scores Parameters Yi Liu; Leonard Barolli; Shinji Sakamoto; Keita Matsuo; Fatos Xhafa |
IMIS-03 |
Friedman Test for Analysing WMNs: A Comparison Study for Genetic Algorithms and Simulated Annealing Donald Elmazi; Tetsuya Oda; Shinji Sakamoto; Evjola Spaho; Elis Kulla; Leonard Barolli |
IMIS-04 |
Performance Evaluation of OLSR, AODV and HWMP Protocols in Ad-Hoc Networks and MANET Scenarios Keita Matsuo; Tetsuya Oda; Donald Elmazi; Shinji Sakamoto; Leonard Barolli |
IMIS-05 |
Performance Evaluation of a VANET Simulation System Based on One and SUMO Simulators Vladi Kolici; Tetsuya Oda; Shinji Sakamoto; Evjola Spaho; Makoto Ikeda; Leonard Barolli |
IMIS-06 |
Synchronization of Peers in Peer-to-peer Publish/Subscribe Systems Hiroki Nakayama; Dilawaer Duolikun; Tomoya Enokido; Makoto Takizawa |
IMIS-07 |
Evaluation of Broadcast Protocols in Wireless networks Kazuaki Kouno; Dilawaer Duolikun; Tomoya Enokido; Makoto Takizawa |
IMIS-08 |
IEEE802.11 based Vehicle-to-Vehicle Delay Tolerant Networks for Road Surveillance System in Local Areas Noriki Uchida; Go Hirakawa; Yoshitaka Shibata |
IMIS-09 |
Secure Authentication for Structured Smart Grid System Inshil Doh; Jiyoung Lim; Kijoon Chae |
IMIS-10 |
Impact of Location of Road-side Units Considering Message Suppression Method on Vehicular-DTN Makoto Ikeda; Seiichiro Ishikawa; Taiki Honda; Leonard Barolli |
IMIS-11 |
Analysis of Mesh Router Placement in Wireless Mesh Networks Using Friedman Test: A Comparision Study for Genetic Algorithms and Tabu Search Tetsuya Oda; Donald Elmazi; Leonard Barolli; Fatos Xhafa |
IMIS-12 |
A Visual Analytics Approach for E-learning Education Xin Li; Xuehui Zhang; Xin Liu |
IMIS-13 |
An Enhanced Java-based Laptop Theft Response System Yongwoo Kwon; Inhyeok Jeon; Woo-Seok Hyun; Jiyoung Lim; Ilsun You; Hae-Duck Joshua Jeong |
IMIS-14 |
Bio-inspired Routing Protocol B-DEEC for WSNs Hamzah Fahim; Nadeem Javaid; Zahoor Ali Khan; Umar Qasim |
IMIS-15 |
Interference and Bandwidth Aware Depth Based routing Protocols in Underwater WSNs Hamzah Fahim; Nadeem Javaid; Umar Qasim; Zahoor Ali Khan |
IMIS-16 |
Multilevel Routing Protocol for Energy Optimization in Wireless Sensor Networks Hamzah Fahim; Nadeem Javaid; Zahoor Ali Khan; Umar Qasim |
IMIS-17 |
Research on Advertising Dynamic Layout Problem Based on Context-awareness of Mobile Reading Layout Ren JunFeng; Jin Zhang; Xin Yuan; Tian Shunjian; Liu Junling; Feng Dajian |
IMIS-18 |
Evaluation of Power Consumption for Smart Devices in Web Applications Ken Nishimura; Kaoru Sugita |
IMIS-19 |
Dynamic cooperative transmission mechanism to guarantee QoS Xinyu Fang; Feilong Tang |
IMIS-20 |
Hybrid recommendation base on Learning to Rank Bin Xie; Xinhuai Tang; Feilong Tang |
IMIS-21 |
A Smart Wheelchair Based on Embedded System Miao Chi |
IMIS-22 |
Optimal Cloud Broker Method for Cloud Selection in Mobile Inter-Cloud Computing Glaucio Carvalho; Isaac Woungang; Alagan Anpalagan; Leonard Barolli |
IMIS-23 |
An adaptive routing protocol based on fixed hubs for opportunistic networks Tales Heimfarth |
IMIS-24 |
Knowledge-based framework for the virtual communication of public art Vincenzo Lombardo; Rossana Damiano; Antonio Lieto |
IMIS-25 |
Proposal of the Digital Contents Management System utilizing the AR Technology Ando Tsubasa; Tomoyuki Ishida; Noriki Uchida; Yoshitaka Shibata |
IMIS-26 |
Actor Selection Methods in Wireless Sensor and Actor Networks: A Simulation Approach Elis Kulla |
IMIS-27 |
Supporting First Responders Localization During Crisis Management Massimo Ficco; Francesco Palmieri; Aniello Castiglione |
IMIS-28 |
Application of Hidden Markov Models and Gesture Description Language classifiers to Oyama karate techniques recognition Tomasz Hachaj; Marek R Ogiela; Katarzyna Koptyra |
IMIS-29 |
Efficiency of Cognitive Information Systems Supporting Enterprise Management Tasks Lidia D Ogiela; Marek R Ogiela |
IMIS-30 |
Biometric Methods for Advanced Strategic Data Sharing Protocols Marek R Ogiela; Lidia D Ogiela; Urszula Ogiela |
IMIS-31 |
Estimating Software System Reliability: An Architecture-Based Approach Xiwen Wu; Linpeng Huang; Chen Li; Luxi Chen |
IMIS-32 |
Reliable Voice-based Transactions over VoIP Communications Gianluca Roscigno; Luigi Catuogno; Giuseppe Cattaneo; Fabio Petagna |
IMIS-33 |
Ensuring Application Integrity: A Survey on Techniques and Tools Luigi Catuogno; Clemente Galdi |
IMIS-34 |
The Web of Things and the trade-off between security and performance Luigi Catuogno; Stefano Turchi |
IMIS-35 |
Multi-tenants Data Duplicate Secure Storage in Cloud Lin Li; Yilei Wang; Yanhu Ding |
IMIS-36 |
Compromising Ad-hoc Networks by Attacking Weakly Connected Dominating Set Chi Lin; Wu Guowei; Kangbin Yim; Lin Yao; Gang Hou |
IMIS-37 |
Vulnerability Analysis on the CNG Crypto Library Kyungroul Lee; Ilsun You; Kangbin Yim |
IMIS-38 |
Towards Energy Efficient Scheduling for Online Tasks in Cloud Data Centers based on DVFS Weicheng Huai; Wei Huang; Jin Shi; Zhuzhong Qian |
IMIS-39 |
Performance Evaluation of Reactive Routing Protocols for VANETs in Urban Scenarios Following Good Simulation Practices J Garcia-Campos; Daniel Reina; Sergio Toral; Federico Barrero; Nik Bessis; Eleana Asimakopoulou |
IMIS-40 |
Mobile Application to Support Community Health Agents using GeneXus Smart Devices L. P. Araujo; Mauro Marcelo Mattos; S. Casa; Eric Boeing; Simone Erbs da Costa |
IMIS-41 |
A Multi-node Renewable Algorithm Based on Charging Range in Large-scale Wireless Sensor Network Wu Guowei; Chi Lin; Ying Li; Lin Yao; Ailun Chen |
IMIS-42 |
Monitoring Patients with Mental Disorders Philip T Moore; Nik Bessis; Bin Hu; Tarik Qassem |
BDITS Workshop: Accepted Papers
Paper ID | Paper Title and Author(s) |
---|---|
BDITS-01 |
Research on the collaborative analysis technology for source code and binary executable based upon the unified defect mode set Xiaobing Liang |
BDITS-02 |
Passive Storage Based Wireless Network resource management for 4G LTE Ran Tao, Wenan Zhou, Xuhui Yang |
BDITS-03 |
A New Framework of Security Vulnerabilities Detection in PHP Web Application Gong RuLin |
BDITS-04 |
Security analysis of OpenStack keystone Tao Xi, Baojiang Cui |
BDITS-05 |
A Secure Architecture for Data Storage in the Cloud Environments Chuan Fu, Jun Yang, Zheli Liu, Chunfu Jia |
BDITS-06 |
Multi-Layer Anomaly Detection for Internet Traffic Based on Data Mining Baojiang Cui, Shanshan He, Haifeng Jin |
BDITS-07 |
A Dynamic Self-Adaptive Algorithm for Uploading Deferrable Big Data to The Cloud Cost-Effectively Peilin Shi, Baojiang Cui, Haifeng Jin |
BDITS-08 |
Research on the Performance of Mining online education packets for Malware detection between PM and VM Jiangdong Deng, Jun Yang, Haifeng Jin, Baojiang Cui |
esIoT Workshop: Accepted Papers
Paper ID | Paper Title and Author(s) |
---|---|
esIoT-01 |
Using 5G technologies in the Internet of Things: Handovers, problems and challenges Borja Bordel S疣chez, チlvaro S疣chez-Picot and Diego S疣chez De Rivera |
esIoT-02 |
Dynamic Transmission Mode Selection and Resource Sharing Schemes for M2M communications in Cellular Networks Xi Luan, Jianjun Wu, Yuxin Cheng and Haige Xiang |
esIoT-03 |
Authentication and Access Control in Cloud Computing Framework for Smart City ITS Applications Irish Singh, Dhananjay Singh and Antonio M. Alberti |
esIoT-04 |
JSON Sensor Signatures (JSS): End-to-End Integrity Protection from Constrained Device to IoT Application Henrich C. Pöhls |
esIoT-05 |
Service Platform for Automated IoT Service Provisioning Timo Niemirepo, Markus Sihvonen, Vesa Jordan and Juhani Heinil |
esIoT-06 |
IOT Based Smart Water Quality Monitoring for conjunctive use of Ground water and Harvested Rain Water Jubin Sebastian E |
esIoT-07 |
Security and Privacy in Internet of Vehicles Yunchuan Sun, Lei Wu, Huimin Guo, Houbing Song and Antonio Jara |
esIoT-08 |
Big Data processing of bio-signal sensors information for self-management of health and diseases Diego Gachet, Manuel de Buenaga, Enrique Puertas and Maria Teresa Villalba |
esIoT-09 |
Experiences with RFID technology to manage information during natural disasters Miguel A. Wister, Pablo Pancardo, Francisco D. Acosta, Jos・A. Hern疣dez-Nolasco, Eddy S疣chez-De-La-Cruz, Francisco Gonz疝ez and Claudia R. Chabl |
esIoT-10 |
Flexible Semantic-based Internet of Things Architectures Amelie Gyrard, Christian Bonnet and Karima Boudaoud |
esIoT-11 |
SDN based architecture for clustered WSN Olivier Flauzac, Carlos Gonzalez and Florent Nolot |
esIoT-12 |
Certificateless and Privacy-enhancing Group Sharing Mechanism for the Future Internet Jos・Luis Hern疣dez Ramos, Jorge Bernal Bernabe, Salvador P駻ez Franco and Antonio Skarmeta Gomez |
esIoT-13 |
Solar production prediction based on non linear meteo source adaptation Mariam Barque, Luc Dufour, Dominique Genoud, Bruno Ladevie and Jean-Jacques Bezian |
esIoT-14 |
Scalable approaches to integration in heterogeneous IoT and M2M scenarios Alex Carmine Olivieri, Gianluca A. Rizzo |
esIoT-15 |
Security and Privacy in Edge Network Processing Antonio J. Jara, Dominique Genoud, Yann Bocchi |
ITAUC Workshop: Accepted Papers
Paper ID | Paper Title and Author(s) |
---|---|
ITAUC-01 |
Wi-Fi Channels Saturation Using Standard Wi-Fi Gateway Octavio Salcedo Parra; Brayan Reyes |
ITAUC-02 |
A Study of Hand Gesture Recognition with Wireless Channel Modeling by Using Wearable Device Yung-Fa Huang |
ITAUC-03 |
Context-aware Applications in Mobile Sink of Wireless Sensor Networks Chia-Hsin Cheng; Hsing-Chung Chen |
ITAUC-04 |
Double k-Folds in SVM Fengming Chang |
ITAUC-05 |
The Case Study of Adopting Information Technology Teaching for Kindergarten Education Yuh-Ying Hsieh; Anthony Y. H. Liao; Hsing-Chung Chen |
ITAUC-06 |
A new Uighur automatic summarization method Xiaodong Yan |
ITAUC-07 |
A Mobile Medical Information System Applying to the Physician's Clinical Works ChingKan Lo |
ITAUC-08 |
A Mobile Nursing App Applying to the Wound Care of Patients ChingKan Lo |
MCNCS Workshop: Accepted Papers
Paper ID | Paper Title and Author(s) |
---|---|
MCNCS-01 |
An AP Selection with RSS Standard Deviation for Indoor Positioning in Wi-Fi Fong-Mao Jhuang, Chi-Fu Hung, Chiu-Ching Tuan, Yi-Chao Wu |
MCNCS-02 |
Applying the Web Crawler to Develop the Sale Management System of Online Malls Yu-Jen Chang, Shih-Chieh Chen, Hei-LamWong; |
MCNCS-03 |
A Security Threats Measurement model for Reducing Cloud Computing Security Risk Sen-Tarng Lai |
MCNCS-04 |
Establishing a Routing Path with Redundant Link Minimization in Wireless Sensor Networks Fang-Yie Leu and Sheng-Chieh Chuang |
PISPIS Workshop: Accepted Papers
Paper ID | Paper Title and Author(s) |
---|---|
PISPIS-01 |
Soliciting unexpected traffic flows into VoLTE Junyoung Park, Taeyoung Jung, Kangbin Yim |
PISPIS-02 |
Anonymous authentication schemes for VANET: a survey Tianhan Gao |
PISPIS-03 |
Secure mobility management for MIPv6 with identity-based cryptography Tianhan Gao |
PISPIS-04 |
Precise exposure control for efficient eye tracking Junghoon Park, Taeyoung Jung, Kangbin Yim |
PISPIS-05 |
The Behavior-Based Analysis Techniques for HTML5 Malicious features Hyun-Lock Choo, Sang-Hwan Oh, Jong-Hwn Jung, Hwan-Kuk Kim |
PISPIS-06 |
NTFS Directory Index Analysis for Computer Forensics Gyusang Cho |
PISPIS-07 |
3D Hologram Heart Activity Monitoring using Smartphone Yunyoung Nam |
PISPIS-08 |
Automatic Detection of Congestive Heart Failure and Atrial Fibrillation with Short RR Interval Time Series using Electrocardiogram Yunyoung Nam |
PISPIS-09 |
A Real-time Sleep Monitoring System using a Smartphone Chi Lin; Wu Guowei; Kangbin Yim; Lin Yao; Gang Hou |
SMEUCE Workshop: Accepted Papers
Paper ID | Paper Title and Author(s) |
---|---|
SMEUCE-01 |
A Case Study of Valuation and Value Drivers in the Edible Oil and Fats Industry: TTET Union Corporation Kuei-Yuan Wang |
SMEUCE-02 |
Professional Network Structure and Relationship Quality Effects on Member Knowledge Acquisition, Well-being, and Performance Mei Hua Huang |
SMEUCE-03 |
Examining the Direct and Moderating Effects of Relational Exchange and Innovation Characteristics on New Product Adoption Mei Hua Huang |
SMEUCE-04 |
How to enhance market value? A balanced scorecard perspective Ying-Li Lin |
SMEUCE-05 |
How does political relations affect capital structure? Ying-Li Lin |
SMEUCE-06 |
The Relationship of Companies Social Connection and SEOs Subscription Fads Mei-Hua Liao, Li-Wen Chen, Saburo Horimoto |
SMEUCE-07 |
The Impact of Banker's Social Ties on the Corporate Value Mei-Hua Liao, Jiayu Huang, Wun-Huei Chen |
SMEUCE-08 |
Study of e-business strategy in Japanese Family Business and Long-Established Companies Hidekazu Sone |
SMEUCE-09 |
An Exploratory Study on Mongolian Women Consumer Behavior toward Purchasing Luxury Fashion Brands Ya-Wen Yu; Shao-Chun Chiu |
SMEUCE-10 |
Explore the development of social enterprises in Taiwan from the dynamic capabilities approach Yen-Tsung Lin, Hsing-Chung Chen, Shu-Hui Chuang |
WAIS Workshop: Accepted Papers
Paper ID | Paper Title and Author(s) |
---|---|
WAIS-01 |
Man in the Middle attackImplementation in Wireless LAN Octavio Salcedo Parra; Brayan Reyes; Mychel Figueroa |
WAIS-02 |
Consideration of the XOR-operation based Secure Multiparty Computation Yuji Suga |
WAIS-03 |
Automated Detection of Drive-by Download Attack Hiroaki Kikuchi; Hiroaki Matsumoto |
WAIS-04 |
Research on the Resources Information Library Construction of Shaanxi Folk Culture and Art with Secure Access Control Shuhua Zhang; Changsong Yang; Tao Jiang |
WAIS-05 |
A Survey of Hardware Features on Modern Browsers: 2015 Edition Ko Takasu; Takamichi Saito; Tomotaka Yamada; Takayuki Ishikawa; Naoki Takei |
WAIS-06 |
Study on Diffusion of Protection/Mitigation against Memory Corruption Attack in Linux Distributions Takamichi Saito; Hiroyuki Miyazaki; Yoshifumi Sumida; Takaaki Baba |