List of Accepted Papers
NBiS | DEMoC | HETNET | INVITE | INWC | ISSE | ITIS | MCCTA | NeoFUSION | TwC | WSSM
Accepted Paper List of NBiS-2013
Paper Id |
Paper Title |
Author(s) |
NBiS-1 |
FPGA-driven Table System to Accelerate Network Flows |
Ralph Duncan; Peder Jungck; Andy Norton; Kenneth Ross; Greg Triplett |
NBiS-2 |
A Proposal of Privacy-Preserving Data Aggregation on the Cloud Computing | Mebae Ushida; Kouichi Itoh; Yoshinori Katayama; Fumihiko Kozakura; Hiroshi Tsuda |
NBiS-3 |
Exploratory Coverage in Limited Mobility Sensor Networks | Mark E Snyder; Sriram Chellappan; Mayur Thakur |
NBiS-4 |
3 Tiers Storage Model for Low Throughput Off-line Storage | Minoru Uehara |
NBiS-5 |
Dynamic Clusters of Servers for Reducing Electric Power in P2P Overlay Networks | Dilawaer Duolikun; Ailixier Aikebaier; Tomoya Enokido; Makoto Takizawa |
NBiS-6 |
A Fuzzy-based System to Evaluate Peer Trustworthiness in JXTA-Overlay P2P Platform | Evjola Spaho; Leonard Barolli; Fatos Xhafa |
NBiS-7 |
Performance Evaluation of Mesh Router Node Placement Using Simulated Annealing Considering Exponential and Weibull Distributions | Shinji Sakamoto; Tetsuya Oda; Evjola Spaho; Leonard Barolli |
NBiS-8 |
Redundant Execution Algorithm for Reducing Total Power Consumption of Server Clusters by Changing the Starting Time of Processes | Tomoya Enokido; Ailixier Aikebaier; Makoto Takizawa |
NBiS-9 |
A Simulated Annealing Algorithm for Ground Station Scheduling | Fatos Xhafa; Admir Barolli; Makoto Takizawa |
NBiS-10 |
A Comparison Study of GA and HC for Mesh Router Node Placement in Wireless Mesh Networks | Tetsuya Oda; Leonard Barolli; Xinyue Chang; Evjola Spaho |
NBiS-11 |
A MANET Approach for Air-to-Air Communications | Elis Kulla; Leonard Barolli |
NBiS-12 |
MANET Viewer III: 3D Visualization System for Mobile Ad-hoc Networks | Akio Koyama |
NBiS-13 |
A 3D Spatial Desktop Environment Empowered by Touch Interaction | Hiroaki Nishino |
NBiS-14 |
Delay Tolerant Network with Directional Anntenna Control for Disaster Information System | Noriki Uchida; Noritaka Kawamura; Yoshitaka Shibata |
NBiS-15 | Utilizing Security Risk Approach in Managing Risks in Cloud Computing Services | Danilo Bernardo |
NBiS-16 | When Mobile Computing meets Big Data | David Taniar |
NBiS-17 | On Environment-Aware and Service-Adaptive Data Transmission in Mobile Cognitive and Cooperative Networks | Feilong Tang |
NBiS-18 | Optimal Rate Allocation with Quality-of-Service and Delays Utility Function | Hengky Susanto; Byung-Guk Kim |
NBiS-19 | A Novel MMSE based Predictive method for Narrow band Interference Removal | Neeraj Varshney; Roop C Jain |
NBiS-20 | Video over Software Defined Networking | Harold Owens, II; Arjan Durresi |
NBiS-21 | Optimized Hash Lookup for Bloom Filter Based Packet Routing | Dagang Li; Pei Chen |
NBiS-22 | Single Document Summarization based on Triangle Analysis of Dependency Graphs | Kai Cheng |
NBiS-23 | Towards the new era of global aviation electronic data exchange: ensuring completeness, consistency and quality | Wenny Rahayu |
NBiS-24 | Optimization of Resources Discovery in Grid Computing Using Bloom filter | Razieh Tavose; Mahmood Ahmadi |
NBiS-25 | Health Care based on Mobile Cloud | Tamara Luarasi; Mimoza Durresi; Arjan Durresi |
NBiS-26 | Targeted Advertisement Using Smartphones and Cloud Computing | Mimoza Durresi; Tamara Luarasi; Arjan Durresi; Indrit Baholli |
NBiS-27 | Federated Identity Access Broker Pattern for Cloud Computing | Timothy Reimer; Qing Tan; Phil Abraham |
NBiS-28 | A Persistence Analysis of Smartphone Application Stores: An Approach to Understanding Gateways to the Internet | Toshihiko Yamakami |
NBiS-29 | Persuasive Strength Analysis of the Mobile Gang of Four: Toward Understanding Mobile Business Engineering in the Era of Mobile Persuasion | Toshihiko Yamakami |
NBiS-30 | Location Estimation Considering Inside and Outside Wireless LAN Coverage Area | Akinori Suzuki; Hiroko Shindo; Hiroshi Shigeno |
NBiS-31 | Jitter Considerations in On-demand Route Discovery for Mobile Ad Hoc Networks | Jiazi Yi; Juan Antonio Cordero; Thomas Heide Clausen |
NBiS-32 | Performance Comparison of Wireless Sensor Networks for Different Speeds of Multi Mobile Sensor Nodes with Different Radio Models | Tao Yang; Elis Kulla; Leonard Barolli; Gjergji Mino; Makoto Takizawa |
NBiS-33 | Effects of Receiver Initiated MAC Protocol for Reducing Power Consumption | Hitomi Date; Tetuya Shigeyasu |
NBiS-34 | A Fast Adaptation Scheme for TFRC over Vertical Handovers | Dagang Li; Wenpeng Sha |
NBiS-35 | A Location Based Cooperative Caching Approach for Mobile Ad hoc Networks | Preetha Joy |
NBiS-36 | Modeling the Node Compromise in Ad Hoc Network | Chi Lin; Wu Guowei |
NBiS-37 | Distributed Detection of DDoS Attack | Santhosh Karre |
NBiS-38 | A Reputation Aggregation Method considering File Request Distribution and Peer Behavior in Unstructured P2P Networks | Hiroki Ushikubo; Sonoko Takeda; Hiroshi Shigeno |
NBiS-39 | A proposal for the Deterrence of Information Leakage using Anti-virus Software | Takuya Kaneko; Takumi Nagaya; Keisuke Takemori; Yutaka Miyake; Masakatsu Nishigaki |
NBiS-40 | An Efficient Algorithm for Incremental Privacy Breach on (k, e)-Anonymous Model | Bowonsak Seisungsittisunti; Juggapong Natwichai |
NBiS-41 | Construction of a Multi-Domain Functional Encryption System on Functional Information Infrastructure | Yusuke Niwa; Akira Kanaoka; Eiji Okamoto |
NBiS-42 | Analysis of Heterogeneous Complex Networks using the Degree of Diffusion | Eman Aldwaisan; Maytham H Safar; Khaled Mahdi |
Accepted Paper List of ANPNA-2013
Paper Id |
Paper Title |
Author(s) |
ADPNA-1 |
Internal Filtering Approach toward Efficiency Optimization of Matching Large Scale XML Schemas | Ahmad A Alqarni and Eric Pardede |
ADPNA-2 |
A Routing Protocol Based on Power Generation Pattern of Sensor Node in Energy Harvesting Wireless Sensor Networks | Sato Fumiaki |
ADPNA-3 |
Experimentation of Group Communication Protocols | Dilawar Dolkun, Tomoya Enokido, and Makoto Takizawa |
ADPNA-4 |
Task Coordination in Android Mobile Peergroup Systems | Fatos Xhafa, Leonard Barolli, Evjola Spaho, Makoto Takizawa |
Accepted Paper List of DEMoC-2013
Paper Id |
Paper Title |
Author(s) |
DEMoC-1 |
A Scheduling Method for Division Based Broadcasting Considering Dynamic Update | Yusuke Gotoh and Hideo Taniguchi |
DEMoC-2 |
Evaluations on Playback Interruption Control for Broadcast and Communication Integrated Video-on-Demand Systems | Tomoki Yoshihisa and Shojiro Nishio |
DEMoC-3 |
Querying MongoDB with LINQ in a Server-side JavaScript Environment | Kousuke Nakabasami, Toshiyuki Amagasa and Hiroyuki Kitagawa |
DEMoC-4 |
A User Recognition Method using Accelerometer for Electric Appliances | Tsutomu Terada, Ryota Watanabe and Masahiko Tsukamoto |
DEMoC-5 |
Evaluation of Dynamic Running Mode Switch Mechanism by Presence of OS protection | Kazutoshi Yokoyama, Hiroki Kumon and Hideo Taniguchi |
DEMoC-6 |
Evaluation of Load Balancing in Multicore Processor for AnT | Takeshi Sakoda, Toshihiro Yamauchi and Hideo Taniguchi |
DEMoC-7 |
Memory Segmenting and Transferring in Mint Operating System | Kiyohito Miyazaki, Yoshinari Nomura and Hideo Taniguchi |
Accepted Paper List of HETNET-2013
Paper Id |
Paper Title |
Author(s) |
HETNET-1 |
Context and the Cloud: Situational Awareness in Mobile Systems | Philip Moore, Mak Sharma, Fatos Xhafa, Leonard Barolli |
HETNET-2 |
An Improved Identity Authentication Scheme for Internet of Things in Heterogeneous Networking Environments | Fuzhi Chu, Runtong Zhang, Wei Dai and Rongqian Ni |
HETNET-3 |
Dynamic High Performance Service Resources Management | Jonathan Liu and Wei Dai |
HETNET-4 |
The Impact of LPNs on Positioning Technology in LTE-A System | Yuanfeng Du, Dongkai Yang, Dengkun Xiao |
HETNET-5 |
ECIS, an Energy Conservation and Interconnection Scheme between WSN and Internet based on the 6LoWPAN | Yuan Quan, Runtong Zhang, Fuzhi Chu and Wei Dai |
HETNET-6 |
Concurrent Intelligent Integration and Optimisation Engine for Supply Chains Management | Paul Moynihan and Wei Dai |
HETNET-7 |
Workflow-Based Composite Job Scheduling for Decentralized Distributed Systems | Nasi Tantitharanukul, Juggapong Natwichai, Pruet Boonma |
HETNET-8 |
A Lightweight Approach to Semantify Saudi Open Government Data | Hend S. Al-Khalifa |
Accepted Paper List of INVITE-2013
Paper Id |
Paper Title |
Author(s) |
INVITE-1 |
Proposal of Disaster Management Support System using Tiled Display Wall Environment | Tomoyuki Ishida, Akira Sakuraba, Noriki Uchida, Yoshitaka Shibata |
INVITE-2 |
Tiled Display Environment to realize GIS based Disaster Information System | Akira Sakuraba,Satoshi Noda,Tomoyuki Ishida, Yasuo Ebara, Yoshitaka Shibata |
INVITE-3 |
An Experiment on Ultra-Resolution Video Transmission with Tiled Display Wall in Wide-Area Network | Yasuo Ebara, Satoshi Noda, Akira Sakuraba, Yoshitaka Shibata |
INVITE-4 |
A consideration of switching multimedia user interfaces according to operational events | Kaoru Sugita, Masao Yokota |
INVITE-5 |
Evaluation of High Presence Sensation based on Biological Information | Tetsuro Ogi, Yosuke Kubota, Tetsuya Toma, Takeshi Chikakiyo |
Accepted Paper List of INWC-2013
Paper Id |
Paper Title |
Author(s) |
INWC-1 |
Performance Analysis of User Connectivity by Optimizing Placement of Wireless Access Points | Taiki Honda, Makoto Ikeda |
INWC-2 |
Investigation of Diffracted Waves Between Parallel and Arbitrary Angle of Edges: A Comparison Study | Jiro Iwashige, Motohiko Iwaida, Saki Kameyama, Leonard Barolli |
INWC-3 |
An Analytic Procedure to Generate Inhomogeneous Random Rough Surface | Kazunori Uchida, Masafumi Takematsu, Junichi Honda |
INWC-4 |
Numerical and Experimental Study on Y-shaped Branch Waveguide by Post Wall | Hiroshi Maeda, Huili Chen, Kazuya Tomiura, Daichi Ogata, Kiyotoshi Yasumoto |
INWC-5 |
Investigation of Scattered E-wave and H-wave on DRTM | Masafumi Takematsu, Kazunori Uchida, Junichi Honda |
INWC-6 |
Comparison of Coded-BOC and Uncoded BOC Modulation for Radionavigation | Rahul Kaushik, Roop C Jain |
Accepted Paper List of ISSE-2013
Paper Id |
Paper Title |
Author(s) |
ISSE-1 |
Non-Real Time Data Transmission Mechanism with Mobile Sink in Cluster-based Wireless Sensor | Kuo-Feng Huang, Yi Hsun Lin, Shao-Wei Tsao, Ying-Hong Wang |
ISSE-2 |
Building Long-Distance Health Care Network by Minimized Portable Sensors and Actively Alert System | Chun-Che Shih, Kuang-Yi Chou, Huan-Chao Keh, Yuan Cheng Cheng, Po-Yuan Yu, Nan-Ching Huang |
ISSE-3 |
Using Decision Tree to Analyze Patient of Aortic Aneurysm with Chronic Diseases in Clinical Application | Kuang-Yi Chou, Chun-Che Shih, Huan-Chao Keh, Po-Yuan Yu, Yuan Cheng Cheng, Nan-Ching Huang |
ISSE-4 |
Using Kinect to Develop a Smart Meeting Room | Hui-Huang Hsu, Yi Chiou, Yu-Ren Chen, Timothy Shih |
Accepted Paper List of ITIS-2013
Paper Id |
Paper Title |
Author(s) |
ITIS-1 |
Rapid Deployment for Machine Learning in Educational Cloud | Yuichiro Takabe, Minoru Uehara |
ITIS-2 |
Proposal for BYOD based Virtual PC Room | Minoru Uehara |
ITIS-3 |
Implementation of Web-based Interactive Interface as Software Execution Environment | Hideaki YANAGISAWA, Kayo KONDO |
ITIS-4 |
A Proposal and Evaluation of Access Point Allocation Algorithm for Wireless Mesh Networks | Takuma Hoshi, Yuki Kumata, and Akio Koyama |
Accepted Paper List of MCCTA-2013
Paper Id |
Paper Title |
Author(s) |
MCCTA-1 |
The Practical Quality Model for Embedded System and Software | HwaYoung Jeong |
MCCTA-2 |
Service based User oriented Adaptive Learning System | HwaYoung Jeong, JongHyuk Park |
MCCTA-3 |
A study on the smart device monitoring system | Chan Kim, Jae-Suhp Oh |
MCCTA-4 |
Application for Mobile Cloud Learning | JongHyuk Park |
MCCTA-5 |
A study on the evaluation model of smart mobile app | Hye-Yeon Kim, Jae-Suhp Oh, Hyeong-Nam Moon |
Accepted Paper List of NeoFUSION-2013
Paper Id |
Paper Title |
Author(s) |
NeoFusion-1 |
Emotional Recognition from Facial Expression Analysis using Bezier Curve Fitting | Yong-Hwan Lee, Youngseop Kim, Woori Han |
NeoFusion-2 |
A Novel Task Scheduling Algorithm for Power Constrained Data Centers | Shuo Zhang, Baosheng Wang, Baokang Zhao |
NeoFusion-3 |
Security framework for Content Distribution Network Interconnection | Jiyoung Lim |
NeoFusion-4 |
MDCCC: Mission-Driven Clinical Collaborative Communication Framework | Hwagyoo Park, Kangbin Yim |
NeoFusion-5 |
GEESE: A Cognitive USN Platform | Hanggon Kim, Kangbin Yim |
NeoFusion-6 |
A Simple and High Efficient Wormhole Attack Method in Wireless Sensor Networks | Kangbin Yim, Wu Guowei, Chi Lin |
NeoFusion-7 |
Efficient Anonymous Credential Based on Aggregate Signature | Nan Guo, Tianhan Gao, Kangbin Yim |
NeoFusion-8 |
Detecting Anomaly Teletraffic Using Stochastic Self-similarity Based on Hadoop | JongSuk Lee, Hae-Duck Joshua Jeong |
Accepted Paper List of TwC-2013
Paper Id |
Paper Title |
Author(s) |
TwC-1 |
A Smaller Final Exponentiation for Tate and Ate Pairings with Barreto-Naehrig Curve |
Yuki Kono, Sumo Taichi, Yasuyuki Nogami |
TwC-2 |
Faster Scalar Multiplication for Elliptic Curve Cryptosystems | Yumi Sakemi, Tetsuya Izu, Masaaki Shirase |
TwC-3 |
An Improved Addition Formula on Elliptic Curves Given by Weierstrass Normal Form | Masaaki Shirase |
TwC-4 |
Location Privacy vulnerable from Bluetooth Devices | Hiroaki Kikuchi, Takeru Yokomizo |
TwC-5 |
A fast (2, 2^m)-threshold secret sharing scheme using m linearly independent binary vectors | Yuji Suga |
TwC-6 |
Marking intrusion of transaction-based applications in WSAN | Syrine Chatti, Habib Ounelli |
Accepted Paper List of WSSM-2013
Paper Id |
Paper Title |
Author(s) |
WSSM-1 |
Effects of Side-channel Communication: Text-based Analyses of Chat Transcripts from a Case of Remote Education using a Tele-conference System and an Social Networking System | Jun Iio |
WSSM-2 |
Web-Based Tool for Programming Interactive 3D Animations in Terms of State-Transition Diagrams | Dandy K. Ling, Michitoshi Niibori, Masaru Kamada, Shusuke Okamoto and Tatsuhiro Yonekura |
WSSM-3 |
A Clustering Algorithm Using Twitter User Biography | Masaki Kohana, Shusuke Okamoto and Masaya Kaneko |
WSSM-4 |
A Parallelization of Interactive Animation Software with Web Workers | Yuta Watanabe, Shusuke Okamoto, Masaki Kohana, Masaru Kamada and Tatsuhiro Yonekura |
WSSM-5 |
Consideration of IT technology which solves an agricultural problem Examination of the solution of an agricultural problem which utilized the agricultural support system |
Tadashi Okada , Jun Iio, Mayumi Nakada, Yuka Obu and Tatsuhiro Yonekura |
WSSM-6 |
Social TV System for Senior Community: Stimulating Elderly Communication using Information and Communications Technology | Masaru Miyazaki, Masanori Sano, Masahide Naemura, Hideki Sumiyoshi, Shigeaki Mitsuya and Arisa Fujii |
WSSM-7 |
Real-Time Water Level Visualization with Pervasive IC Sensors | Osamu Saitou, Yuji Kuwahara, Michitoshi Niibori and Masaru Kamada |
WSSM-8 |
A Dynamic Bus Guide Based on Real-Time Bus Locations - A Demonstration Plan | Ikuko Shigihara, Akiko Arai, Osamu Saitou, Yuji Kuwahara and Masaru Kamada |
WSSM-9 |
A Web-Based Platform for Clients and Designers to Prototype Web Sites | Tsukasa Soutome, Dandy K. Ling, Michitoshi Niibori and Masaru Kamada |
WSSM-10 |
System Design of Self-actualization Support Service through Friendly Rivalry | Yoshihiro Kawano and Yuka Obu |