default search action
9. IMIS 2015: Santa Cantarina, Brazil
- Leonard Barolli, Francesco Palmieri, Hélio dos Santos Silva, Hsing-Chung Chen:
9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2015, Santa Cantarina, Brazil, July 8-10, 2015. IEEE Computer Society 2015, ISBN 978-1-4799-8873-0
IMIS 2015
Session 1: MANETs and VANETs
- José M. García-Campos, Daniel Gutiérrez-Reina, Sergio L. Toral Marín, Nik Bessis, Federico Barrero, Eleana Asimakopoulou, Richard Hill:
Performance Evaluation of Reactive Routing Protocols for VANETs in Urban Scenarios Following Good Simulation Practices. 1-8 - Tetsuya Oda, Yi Liu, Keita Matsuo, Shinji Sakamoto, Makoto Ikeda, Leonard Barolli:
Experimental Results of a CentOS-Based Ad-Hoc Network Testbed Considering LoS Scenario. 9-14 - Keita Matsuo, Tetsuya Oda, Donald Elmazi, Shinji Sakamoto, Leonard Barolli:
Performance Evaluation of AODV, OLSR and HWMP Protocols in Ad-Hoc Networks and MANET Scenarios. 15-21 - Vladi Kolici, Tetsuya Oda, Yuki Sugihara, Evjola Spaho, Makoto Ikeda, Leonard Barolli:
Performance Evaluation of a VANET Simulation System Using NS-3 and SUMO Considering Number of Vehicles and Crossroad Scenario. 22-27 - Noriki Uchida, Go Hirakawa, Tomoyuki Ishida, Yoshikazu Arai, Yoshitaka Shibata:
IEEE802.11 Based Vehicle-to-Vehicle Delay Tolerant Networks for Road Surveillance System in Local Areas. 28-33
Session 2: Multimedia and Medical Applications
- Xin Li, Xuehui Zhang, Xin Liu:
A Visual Analytics Approach for e-Learning Education. 34-40 - Yongwoo Kwon, Inhyeok Jeon, WooSeok Hyun, Jiyoung Lim, Ilsun You, Hae-Duck Joshua Jeong:
An Enhanced Java-Based Mobile Device Theft Response System. 41-46 - Ken Nishimura, Kaoru Sugita:
Evaluation of Power Consumption for Smart Devices in Web Applications. 47-52 - Bin Xie, Xinhuai Tang, Feilong Tang:
Hybrid Recommendation Base on Learning to Rank. 53-57 - Mauro Marcelo Mattos, Simone Erbs da Costa, Luciana Pereira de Araújo, Shaiane Mafra Casa, Eric Boeing:
Mobile Application to Support Community Health Workers Using GeneXus Smart Devices. 58-64 - Philip Moore, Andrew M. Thomas, Tarik Qassem, Nik Bessis, Bin Hu:
Monitoring Patients with Mental Disorders. 65-70
Session 3: Wireless Sensor Networks
- Hamza Fahim, Nadeem Javaid, Zahoor Ali Khan, Umar Qasim, Shumaila Javed, Amir Hayat, Zafar Iqbal, Ghazanfar Rehman:
Bio-inspired Routing in Wireless Sensor Networks. 71-77 - Hamza Fahim, Nadeem Javaid, Umar Qasim, Zahoor Ali Khan, Shumaila Javed, Amir Hayat, Zafar Iqbal, Ghazanfar Rehman:
Interference and Bandwidth Aware Depth Based Routing Protocols in Underwater WSNs. 78-85 - Hamza Fahim, Nadeem Javaid, Zahoor Ali Khan, Umar Qasim, Shumaila Javed, Danish Mahmood, Zafar Iqbal:
Multilevel Routing Protocol for Energy Optimization in Wireless Sensor Networks. 86-93 - Guowei Wu, Chi Lin, Ying Li, Lin Yao, Ailun Chen:
A Multi-node Renewable Algorithm Based on Charging Range in Large-Scale Wireless Sensor Network. 94-100
Session 4: Network Protocols and Applications
- Giuseppe Cattaneo, Luigi Catuogno, Fabio Petagna, Gianluca Roscigno:
Reliable Voice-Based Transactions over VoIP Communications. 101-108 - Hewerton Enes de Oliveira, João Paulo de Araujo, Tales Heimfarth, João Carlos Giacomin:
An Adaptive Routing Protocol Based on Fixed Hubs for Opportunistic Networks. 109-116 - Vincenzo Lombardo, Rossana Damiano, Antonio Lieto:
Knowledge-Based Framework for the Virtual Communication of Public Art. 117-124 - Miyu Sugino, Shigenari Nakamura, Tomoya Enokido, Makoto Takizawa:
Trustworthiness-Based Broadcast Protocols in Wireless Networks. 125-132
Session 5: Location and Context-Aware Computing
- Tetsuya Oda, Donald Elmazi, Algenti Lala, Vladi Kolici, Leonard Barolli, Fatos Xhafa:
Analysis of Node Placement in Wireless Mesh Networks Using Friedman Test: A Comparison Study for Tabu Search and Hill Climbing. 133-140 - Tsubasa Ando, Tomoyuki Ishida, Noriki Uchida, Yoshitaka Shibata:
Proposal of the Digital Contents Management System Utilizing the AR Technology. 141-146 - Massimo Ficco, Francesco Palmieri, Aniello Castiglione:
Supporting First Responders Localization during Crisis Management. 147-152 - Makoto Ikeda, Seiichiro Ishikawa, Taiki Honda, Leonard Barolli:
Impact of Location of Road-Side Units Considering Message Suppression Method for Vehicular-DTN. 153-159
Session 6: Intelligent Computing
- Tomasz Hachaj, Marek R. Ogiela:
Qualitative Evaluation of Full Body Movements with Gesture Description Language. 160-165 - Lidia Ogiela, Marek R. Ogiela:
Efficiency of Cognitive Information Systems Supporting Enterprise Management Tasks. 166-170 - Donald Elmazi, Tetsuya Oda, Shinji Sakamoto, Evjola Spaho, Leonard Barolli, Fatos Xhafa:
Friedman Test for Analysing WMNs: A Comparison Study for Genetic Algorithms and Simulated Annealing. 171-178 - Marek R. Ogiela, Lidia Ogiela, Urszula Ogiela:
Biometric Methods for Advanced Strategic Data Sharing Protocols. 179-183
Session 7: Security, Trust and Privacy
- Xiwen Wu, Linpeng Huang, Chen Li, Luxi Chen:
Estimating Software System Reliability: An Architecture-Based Approach. 184-191 - Luigi Catuogno, Clemente Galdi:
Ensuring Application Integrity: A Survey on Techniques and Tools. 192-199 - Inshil Doh, Jiyoung Lim, Kijoon Chae:
Secure Authentication for Structured Smart Grid System. 200-204 - Luigi Catuogno, Stefano Turchi:
The Dark Side of the Interconnection: Security and Privacy in the Web of Things. 205-212 - Chi Lin, Guowei Wu, Kangbin Yim, Lin Yao, Gang Hou:
Compromising Ad-Hoc Networks by Attacking Weakly Connected Dominating Set. 213-220 - Kyungroul Lee, Ilsun You, Kangbin Yim:
Vulnerability Analysis on the CNG Crypto Library. 221-224
Session 8: Cloud Computing and P2P
- Weicheng Huai, Wei Huang, Shi Jin, Zhuzhong Qian:
Towards Energy Efficient Scheduling for Online Tasks in Cloud Data Centers Based on DVFS. 225-232 - Lin Li, Yilei Wang, Yanhui Ding, Yongxin Zhang:
Multi-tenants Data Duplication Secure Storage in SaaS. 233-238 - Glaucio H. S. Carvalho, Isaac Woungang, Alagan Anpalagan, Leonard Barolli, Makoto Takizawa:
Optimal Cloud Broker Method for Cloud Selection in Mobile Inter-cloud Computing. 239-244 - Yi Liu, Shinji Sakamoto, Keita Matsuo, Leonard Barolli, Makoto Ikeda, Fatos Xhafa:
A Fuzzy-Based Reliability System for JXTA-Overlay P2P Platform Considering Number of Interaction, Security, Packet Loss and Local Score Parameters. 245-251 - Hiroki Nakayama, Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa:
Synchronization of Peers in Peer-to-Peer Publish/Subscribe Systems. 252-259
BDITS 2015
Session 1: Network Resource Management and Intrusion Detection
- Xiaobing Liang, Baojiang Cui, Yingjie Lv, Yilun Fu:
Research on the Collaborative Analysis Technology for Source Code and Binary Executable Based upon the Unified Defect Mode Set. 260-264 - Ran Tao, Wenan Zhou, Xuhui Yang, Guanglin Han:
Passive Storage Based Wireless Network Resource Management for 4G LTE. 265-270 - Jingling Zhao, Rulin Gong:
A New Framework of Security Vulnerabilities Detection in PHP Web Application. 271-276 - Baojiang Cui, Shanshan He, Haifeng Jin:
Multi-layer Anomaly Detection for Internet Traffic Based on Data Mining. 277-282
Session 2: Big Data, Cloud Computing and Security
- Baojiang Cui, Tao Xi:
Security Analysis of Openstack Keystone. 283-288 - Chuan Fu, Jun Yang, Zheli Liu, Chunfu Jia:
A Secure Architecture for Data Storage in the Cloud Environments. 289-291 - Baojiang Cui, Peilin Shi, Haifeng Jin:
A Dynamic Self-Adaptive Algorithm for Uploading Deferrable Big Data to the Cloud Cost-Effectively. 292-295 - Jun Yang, Jiangdong Deng, Baojiang Cui, Haifeng Jin:
Research on the Performance of Mining Packets of Educational Network for Malware Detection between PM and VM. 296-300
esIoT 2015
Session 1: Networking, Security and IPv6 for the IoT
- Irish Singh, Kamta Nath Mishra, Antônio Marcos Alberti, Dhananjay Singh, Antonio J. Jara:
A Novel Privacy and Security Framework for the Cloud Network Services. 301-305 - Henrich C. Pöhls:
JSON Sensor Signatures (JSS): End-to-End Integrity Protection from Constrained Device to IoT Application. 306-312 - José Luis Hernández Ramos, Jorge Bernal Bernabé, Salvador Perez Franco, Antonio F. Skarmeta:
Certificateless and Privacy-Enhancing Group Sharing Mechanism for the Future Internet. 313-318 - Ian Thomas, Lou Fedon, Antonio J. Jara, Yann Bocchi:
Towards a Human Centric Intelligent Society: Using Cloud and the Web of Everything to Facilitate New Social Infrastructures. 319-324
Session 2: Adaptive IoT
- Timo Niemirepo, Markus Sihvonen, Vesa Jordan, Juhani Heinilä:
Service Platform for Automated IoT Service Provisioning. 325-329 - Diego Gachet, Manuel de Buenaga Rodríguez, Enrique Puertas Sanz, María Teresa Villalba:
Big Data Processing of Bio-signal Sensors Information for Self-Management of Health and Diseases. 330-335 - Amelie Gyrard, Soumya Kanti Datta, Christian Bonnet, Karima Boudaoud:
A Semantic Engine for Internet of Things: Cloud, Mobile Devices and Gateways. 336-341 - Olivier Flauzac, Carlos Gonzalez, Florent Nolot:
SDN Based Architecture for Clustered WSN. 342-347 - Xi Luan, Jianjun Wu, Yuxin Cheng, Haige Xiang:
Dynamic Transmission Mode Selection and Resource Sharing Schemes for M2M Communications in Cellular Networks. 348-352
Session 3: IoT Solutions
- Mariam Barque, Luc Dufour, Dominique Genoud, Arnaud Zufferey, Bruno Ladevie, Jean Jacques Bezian:
Solar Production Prediction Based on Non-linear Meteo Source Adaptation. 353-357 - Alex C. Olivieri, Gianluca Rizzo:
Scalable Approaches to Integration in Heterogeneous IoT and M2M Scenarios. 358-363 - Borja Bordel Sánchez, Álvaro Sánchez-Picot, Diego Sánchez de Rivera:
Using 5G Technologies in the Internet of Things Handovers, Problems and Challenges. 364-369 - Miguel A. Wister, Pablo Pancardo, Francisco D. Acosta, José Adán Hernández-Nolasco, Eddy Sánchez-Delacruz:
Experiences with RFID Technology to Manage Information during Natural Disasters. 370-375
ITAUC 2015
Session 1: Intelligent Techniques and Algorithms for Ubiquitous Computing
- Chia-Hsin Cheng, Yeong-Long Shiue, Wei-Chia Lo, Hsing-Chung Chen:
Context-Aware Applications in Mobile Sink of Wireless Sensor Networks. 376-379 - Yen-Tsung Lin, Hsing-Chung Chun, Shu-Hui Chuang:
The Impact of Use of Information Technology Teaching for Kindergarten Education. 380-383 - Fengming Chang, Hsing-Chung Chen, Hsiang-Chuan Liu:
Double K-Folds in SVM. 384-387 - Xiaodong Yan:
A New Uighur Automatic Summarization Method. 388-393 - Ching-Kan Lo, Ye-Chi Wu, Cheng-Hung Chuang, Hsing-Chung Chen:
A Patient-Driven Mobile Medical Information System Applying to Physician Clinical Care. 394-398 - Ching-Kan Lo, Sin-Sen Chang, Cheng-Hung Chuang, Hsing-Chung Chen:
A Mobile Nursing App Applying to the Wound Care and Drug Administration of Patients. 399-402
MCNCS 2015
Session 1: Security, Wireless Sensor Network
- Fong-Mao Jhuang, Chi-Fu Hung, Chiu-Ching Tuan, Yi-Chao Wu, Fang-Yie Leu:
An AP Selection with RSS Standard Deviation for Indoor Positioning in Wi-Fi. 403-407 - Yu-Jen Chang, Fang-Yie Leu, Shih-Chieh Chen, Hei-Lam Wong:
Applying Web Crawlers to Develop a Sale Management System for Online Malls. 408-413 - Sen-Tarng Lai, Fang-Yie Leu:
A Security Threats Measurement Model for Reducing Cloud Computing Security Risk. 414-419 - Tien-Sheng Lin, I. Long Lin, Fang-Yie Leu:
Constructing Military Smartphone Usage Criterion of Cloud-DEFSOP for Mobile Security. 420-425
PISPIS 2015
Session 1: Security Issues in Public Internet Services
- Junyoung Park, Taeyoung Jung, Jaein Kim, Kangbin Yim:
Soliciting Unexpected Traffic Flows into VoLTE. 426-430 - Junghoon Park, Taeyoung Jung, Kangbin Yim:
Precise Exposure Control for Efficient Eye Tracking. 431-435 - Hyun Lock Choo, Sanghwan Oh, Jonghun Jung, Hwankuk Kim:
The Behavior-Based Analysis Techniques for HTML5 Malicious Features. 436-440
Session 2: Privacy and Social Issues in Public Internet Services
- Gyu-Sang Cho:
NTFS Directory Index Analysis for Computer Forensics. 441-446 - Tharoeun Thap, Yunyoung Nam, Hee-Won Chung, Jinseok Lee:
Simplified 3D Hologram Heart Activity Monitoring Using a Smartphone. 447-451 - Kwon-Ha Yoon, Tharoeun Thap, Chang-Won Jeong, Nam Ho Kim, Seung Noh, Yunyoung Nam, Jinseok Lee:
Analysis of Statistical Methods for Automatic Detection of Congestive Heart Failure and Atrial Fibrillation with Short RR Interval Time Series. 452-457 - Tae-Yang Han, Se Dong Min, Yunyoung Nam:
A Real-Time Sleep Monitoring System with a Smartphone. 458-461
SMEUCE 2015
Session 1: Sustainability Management of e-Business and Information Management
- Kuei-Yuan Wang, Shu-E. Chung:
A Case Study of Valuation and Value Drivers in the Edible Oil and Fats Industry: TTET Union Corporation. 462-466 - Mei Hua Huang:
Professional Network Structure and Relationship Quality Effects on Member Knowledge Acquisition, Well-Being, and Performance. 467-473 - Mei Hua Huang:
Examining the Direct and Moderating Effects of Relational Exchange and Innovation Characteristics on New Product Adoption. 474-479 - Ying-Li Lin:
How to Enhance Market Value? A Balanced Scorecard Perspective. 480-484 - Ying-Li Lin:
How Do Political Relations Affect State-Owned Bank Loans? 485-488
Session 2: Ubiquitous Commerce Engineering and Operation Management
- Mei-Hua Liao, Li-Wen Chen, Saburo Horimoto:
The Relationship of Companies Social Connection and SEOs. 489-492 - Hidekazu Sone, Mei-Hua Liao:
Study of e-Business Strategy in Japanese Family Business and Long-Established Companies. 493-495 - Ya-Wen Yu, Shao-Chun Chiu, Chen-Yu Chen, Bolortuya Odser:
An Exploratory Study on Mongolian Women Consumer Behavior toward Purchasing Luxury Fashion Brands. 496-501 - Yen-Tsung Lin, Hsing-Chung Chun, Shu-Hui Chuang:
Explore the Development of Social Enterprises in Taiwan from the Dynamic Capabilities Approach. 502-505
WAIS 2015
Session 1: Privacy and Security
- Yuji Suga:
Consideration of the XOR-operation Based Secure Multiparty Computation. 506-510 - Hiroaki Kikuchi, Hiroaki Matsumoto, Hiroshi Ishii:
Automated Detection of Drive-By Download Attack. 511-515 - Shuhua Zhang, Changsong Yang, Tao Jiang:
General Construction for the Resources Information Library of Shaanxi Folk Culture and Art. 516-519 - Ko Takasu, Takamichi Saito, Tomotaka Yamada, Takayuki Ishikawa:
A Survey of Hardware Features in Modern Browsers: 2015 Edition. 520-524 - Takamichi Saito, Hiroyuki Miyazaki, Takaaki Baba, Yoshifumi Sumida, Yosuke Hori:
Study on Diffusion of Protection/Mitigation against Memory Corruption Attack in Linux Distributions. 525-530
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.