default search action
CIT/IUCC/DASC/PICom 2015: Liverpool, United Kingdom
- Yulei Wu, Geyong Min, Nektarios Georgalas, Jia Hu, Luigi Atzori, Xiaolong Jin, Stephen A. Jarvis, Lei (Chris) Liu, Ramón Agüero Calvo:
15th IEEE International Conference on Computer and Information Technology, CIT 2015; 14th IEEE International Conference on Ubiquitous Computing and Communications, IUCC 2015; 13th IEEE International Conference on Dependable, Autonomic and Secure Computing, DASC 2015; 13th IEEE International Conference on Pervasive Intelligence and Computing, PICom 2015, Liverpool, United Kingdom, October 26-28, 2015. IEEE 2015, ISBN 978-1-5090-0154-5
Session CIT-1: Wireless Communication and 5G Technologies (I)
- Ahmed O. Abdul Salam, Ray E. Sheriff, Saleh R. Al-Araji, Kahtan A. Mezher, Qassim Nasir:
Automatic Modulation Classification in Cognitive Radio Using Multiple Antennas and Maximum-Likelihood Techniques. 1-5 - Ahsan Saadat, Gengfa Fang, Wei Ni:
A Two-Tier Evolutionary Game Theoretic Approach to Dynamic Spectrum Sharing through Licensed Shared Access. 6-11 - Weifeng Zhong, Rong Yu, Yan Zhang, Yue Gao, Stein Gjessing:
Adaptive Rate Control in Smart Grid Heterogeneous Communications Networks. 12-17 - Yuan Li, Hao Jiang, Shuwen Yi, Chen Zhou, Lihua Wu, Ming Wu:
Understanding Access Stability and Mobility Patterns of Mobile Internet Users. 18-22 - Ismat Chaib Draa, Jamel Tayeb, Smaïl Niar, Emmanuelle Grislin:
Application Sequence Prediction for Energy Consumption Reduction in Mobile Systems. 23-30 - Craig Miller, Wei Liu, Richard J. Langley:
Reduced Complexity MIMO Receiver with Real-Valued Beamforming. 31-36
Session CIT-2: Wireless Communication and 5G Technologies (II)
- Luis Díez, Ramón Agüero, Joël Penhoat, Emile Stephan, Fabien Héliot:
Exploiting the DASH Framework to Promote a Dynamic Transport Selection for Video Streaming over LTE Networks. 37-43 - Jan Garcia-Morales, Guillem Femenias, Felip Riera-Palou:
Channel-Aware Scheduling in FFR-Aided OFDMA-Based Heterogeneous Cellular Networks. 44-51 - Yi Yang, Yanhua Sun, Enchang Sun, Yanhua Zhang:
Evidence Theory Based Self-Interference Suppression for Two-Way Full-Duplex MIMO Relays. 52-58 - Yueying Zhang, Keju Wang, Hang Long:
SDR-Based ADS-B with Dual-Frequency for UAS: A Universal Design. 59-63 - Dinghe Wang, Qinglong Bao, Zengping Chen:
Acoustic Radar Weak Target Detection Method Based on Mellin Transform. 64-67 - Paola Jaramillo, Jean-Paul M. G. Linnartz:
Hidden Markov Model for Improved Ultrasound-Based Presence Detection. 68-74
Session CIT-3: Wireless Sensor and Ad Hoc Networks
- João Paulo Souza Medeiros, Paulo Sergio Motta Pires, João Batista Borges Neto, Antonio Alfredo Ferreira Loureiro:
Minimization and Placement of Sensors in Structurally Observable Networks. 75-82 - Juuso Nurmio, Ethiopia Nigussie, Christian Poellabauer:
Equalizing Energy Distribution in Sensor Nodes through Optimization of RPL. 83-91 - Hicham Lakhlef, Julien Bourgeois, Saad Harous, Jean Frédéric Myoupo:
Collision-Free Routing Protocol in Multi-hop Wireless Sensor Networks. 92-99 - Roberto Sadao Yokoyama, Bruno Yuji Lino Kimura, Leandro A. Villas, Edson dos Santos Moreira:
Measuring Distances with RSSI from Vehicular Short-Range Communications. 100-107 - Mohammadreza Iman, Flávia Coimbra Delicato, Claudio M. de Farias, Luci Pirmez, Igor Leão dos Santos, Paulo F. Pires:
THESEUS: A Routing System for Shared Sensor Networks. 108-115 - Marco Antonio To, Jose Alvarez, Marcos Cano, Stephane Maag:
Spanning Data Across Heterogeneous MANETs through Proactive Strip Interoperability. 116-124
Session CIT-4: Management of Data and Database Systems
- Boladale M. Isawhe, Maria G. Martini:
Analytical Performance Evaluation of Frame Synchronization for Data with Known, Unequal Distribution over Binary Symmetric Channel. 125-131 - Nermin Abdel-Hakim Othman, Ahmed Sharaf Eldin, Doaa Saad El Zanfaly:
Enhancing Aggregation over Uncertain Databases. 132-139 - Muzaffar Rao, Thomas Newe, Ian Andrew Grout, Elfed Lewis, Avijit Mathur:
FPGA Based Real Time 'Secure' Body Temperature Monitoring Suitable for WBSN. 140-143 - Felipe Simoes, Fábio T. Matsunaga, Armando Maciel Toda, Jacques Duílio Brancher, Abdallah Junior, Rosangela Busto:
SSIE: An Automatic Data Extractor for Sports Management in Athletics Modality. 144-151 - Dewi Wisnu Wardani, Josef Küng:
Semantic Mapping Relational to a Directed Property Hypergraph Model. 152-159
Session CIT-5: Information Security
- Kaio R. S. Barbosa, Eduardo Souto, Eduardo Feitosa, Khalil El-Khatib:
Identifying and Classifying Suspicious Network Behavior Using Passive DNS Analysis. 160-167 - Jorge Werner, Carla Merkle Westphall, Rafael Weingärtner, Guilherme Arthur Geronimo, Carlos Becker Westphall:
An Approach to IdM with Privacy in the Cloud. 168-175 - Wenjun Luo, Yaqiong Chen, Yousheng Zhou:
Dynamic Searchable Encryption with Multi-user Private Search for Cloud Computing. 176-182 - Mourad Benmalek, Yacine Challal, Abdelmadjid Bouabdallah:
Scalable Multi-group Key Management for Advanced Metering Infrastructure. 183-190 - Dorothy Kalui, Xi Guo, Dezheng Zhang, Yonghong Xie, Zhiyong Yang:
Personalized Privacy Aware Framework for Moving Objects in Participatory Sensing. 191-198
Session CIT-6: Pattern Recognition, Data Mining, and Artificial Intelligence (I)
- Julio C. S. dos Anjos, Marcos D. Assuncao, Jean Luca Bez, Cláudio F. R. Geyer, Edison Pignaton de Freitas, Alexandre Carissimi, João Paulo Carvalho Lustosa da Costa, Gilles Fedak, Felix Freitag, Volker Markl, Paul Fergus, Rubem Pereira:
SMART: An Application Framework for Real Time Big Data Analysis on Heterogeneous Cloud Environments. 199-206 - Bernardo Pereira Nunes, Giseli Rabello Lopes, Marco Antonio Casanova:
Automatic Classification and Taxonomy Generation for Semi-structured Data. 207-214 - Ibrahim Olatunji Idowu, Paul Fergus, Abir Jaafar Hussain, Chelsea Dobbins, Mohammed Khalaf, Raúl V. Casaña Eslava, Robert Keight:
Artificial Intelligence for Detecting Preterm Uterine Activity in Gynecology and Obstetric Care. 215-220 - Ming Jiang, Li Zhang:
A Novel Continuous Learning and Collaborative Decision Making Mechanism for Real-Time Cooperation of Humanoid Service Robots. 221-225 - Xin Ye, Feng Wei, Fan Jiang, Shaoyin Cheng:
An Optimization to CHARM Algorithm for Mining Frequent Closed Itemsets. 226-235 - Yi Chai, Guixia Kang, Ningbo Zhang, Yanyan Guo, Jingning Wang:
An Associative Classifier Adopting Fuzzy Weighted Rules Based on Information Gain. 236-243 - Asia L. Jabar, Tarik A. Rashid:
Combining Fuzzy Rough Set with Salient Features for HRM Classification. 244-251
Session CIT-7: Pattern Recognition, Data Mining, and Artificial Intelligence (II)
- Fuxi Wen, Wei Liu:
Diffusion Least Mean Square Algorithms with Zero-Attracting Adaptive Combiners. 252-256 - Sangwook Kang, Yeontaek Oh, Minho Kim, Hyuk-Chul Kwon:
Word-Sense Disambiguation of Korean Predicates Using Sejong Electronic Dictionary and Unsupervised Learning. 257-261 - Akkarach Kawbunjun, Ubon Thongsatapornwatana, Woraphon Lilakiatsakun:
Marketing or Newsletter Sender Reputation System Using Association Analysis Concept. 262-269 - Aswinseshadri K., V. Thulasi Bai:
Feature Selection in Brain Computer Interface Using Genetics Method. 270-275 - Bo Zhang, Yi Xu, Xiaokang Yang:
Online Pedestrian Tracking Using Ensemble Color Feature. 276-282 - Xiu Cao, Shuanshuan Dong, Zhenhao Wu, Yinan Jing:
A Data-Driven Hybrid Optimization Model for Short-Term Residential Load Forecasting. 283-287
Session CIT-8: Pattern Recognition, Data Mining, and Artificial Intelligence (III)
- Emanuele Lindo Secco, Atulya Nagar, Christian Deters, Helge A. Wurdemann, Hak-Keung Lam, Kaspar Althoefer:
A Neural Network Clamping Force Model for Bolt Tightening of Wind Turbine Hubs. 288-296 - Yuan Cao, Heng Qi, Keqiu Li, Yingwei Jin, Zhiyang Li:
WARank: Weighted Asymmetric Ranking for Approximate Nearest Neighbor Search. 297-304 - Xiaoqin Zhang, Feng Liu:
Fault Detection and Classification Based on PCA and N-LMC. 305-312 - Lucas Borges Monteiro, Weigang Li, Ahmed Abdelfattah Saleh:
An Approach of Vector Space Model to Link Concrete Concepts with Wiki Entities. 313-320 - Guijia He, Soowon Lee:
Multi-model or Single Model? A Study of Movie Box-Office Revenue Prediction. 321-325 - Liang Zhu, Qin Ma, Weiyi Meng, Mingqian Yang, Fang Yuan:
An Experimental Evaluation of Aggregation Algorithms for Processing Top-K Queries. 326-333 - Christian Deters, Hak-Keung Lam, Mark Barrett-Baxendale, Emanuele Lindo Secco:
Model-Based Self-Tuning PI Control of Bolt-Nut Tightening for Wind Turbine Bearing Assembly. 334-342
Session CIT-9: Internet of Things
- Lyes Touati, Yacine Challal:
Efficient CP-ABE Attribute/Key Management for IoT Applications. 343-350 - Yassmeen Salman, Abdallatif S. Abu-Issa, Iyad Tumar, Yousef Hassouneh:
A Proactive Multi-type Context-Aware Recommender System in the Environment of Internet of Things. 351-355 - Tuan Nguyen Gia, Mingzhe Jiang, Amir-Mohammad Rahmani, Tomi Westerlund, Pasi Liljeberg, Hannu Tenhunen:
Fog Computing in Healthcare Internet of Things: A Case Study on ECG Feature Extraction. 356-363 - Mahmoud Hashem Eiza, Martin Randles, Princy Johnson, Nathan Shone, Jennifer Pang, Amhmed Bhih:
Rail Internet of Things: An Architectural Platform and Assured Requirements Model. 364-370
Session CIT-10: Information Technology and Applications (I)
- Tânia Basso, Leonardo Montecchi, Regina Moraes, Mário Jino, Andrea Bondavalli:
Towards a UML Profile for Privacy-Aware Applications. 371-378 - José Rodrigues Torres Neto, Roberto Sadao Yokoyama, Azzedine Boukerche, Daniel Ludovico Guidoni, Rodolfo Ipolito Meneguette, Leandro Aparecido Villas:
Towards the Use of Unmanned Aerial Vehicles for Automatic Power Meter Readings. 379-386 - José Renato Villela Dantas, Hermano Albuquerque Lira, Bruno de Azevedo Muniz, Tadeu Matos Nunes, Pedro Porfírio Muniz Farias:
Semantic Web Services Discovery Adopting SERIN. 387-394 - Dana Al Qudah, Alexandra I. Cristea, Suncica Hadzidedic Bazdarevic, Samar Al-Saqqa, Rizik M. H. Al-Sayyad:
A Taxonomy-Based Evaluation of Personalized E-Advertisement. 395-402 - Muhammad Saad Saud, Anton Paatelma, Markku Jokinen, Tuomo Hänninen:
Linux Enriched Design in Third Generation Wireless Open Access Research Platform. 403-409 - Dewi Wisnu Wardani, Josef Küng:
An Attributed Predicate RDF. 410-416
Session CIT-11: Information Technology and Applications (II)
- Xuefei Wang, Hengtai Ma, Ke Yang:
A Method of Handling Control Dependence in Dynamic Taint Analysis. 417-422 - Qinghua Zeng, Yinliang Zhao, Tan Tan, Bo Han:
Dynamically Evolving Annotation-Based Variability for Runtime Adaptation. 423-430 - Ahmed Al-alshuhai, François Siewe:
An Extension of UML Activity Diagram to Model the Behaviour of Context-Aware Systems. 431-437 - Ijaz Ali, Jun-Ho Seo, Kyong Hoon Kim:
A Dynamic Power-Aware Scheduling of Mixed-Criticality Real-Time Systems. 438-445 - Jose Saldana, Ignacio Forcen, Julián Fernández-Navajas, José Ruíz-Mas:
Improving Network Efficiency with Simplemux. 446-453 - Chengeng Ou, Xiaolong Jin, Yuanzhuo Wang, Wei Chen, Xueqi Cheng:
The Impact of Heterogeneous Spreading Abilities of Network Ties on Information Spreading. 454-460 - Jason R. C. Nurse, Michael Goldsmith, Sadie Creese, Koen Lamberts:
Technology and Information Trust for Supporting Risky Decisions Based on Social-Media Content. 461-468
Session CIT-12: Multimedia Application and QoS/QoE Provision and Estimation (I)
- Fakher Oueslati, Jean-Charles Grégoire:
Network Quality Adaptive Video Transmission. 469-476 - Hanna Kavalionak, Claudio Gennaro, Giuseppe Amato, Carlo Meghini:
DICE: A Distributed Protocol for Camera-Aided Video Surveillance. 477-484 - Aymen Elkhelifi, Firas Ben Kharrat, Rim Faiz:
Recommendation Systems Based on Online User's Action. 485-490 - Djamel-Eddine Henni, Abdelghani Ghomari, Yassine Hadjadj Aoul:
Videoconferencing over OpenFlow Networks: An Optimization Framework for QoS Routing. 491-496 - Allan Mariano de Souza, Roberto Sadao Yokoyama, Leonardo Castro Botega, Rodolfo Ipolito Meneguette, Leandro Aparecido Villas:
Scorpion: A Solution Using Cooperative Rerouting to Prevent Congestion and Improve Traffic Condition. 497-503 - Shuaibing Lu, Zhiyi Fang, Guannan Qu, Song Gao:
ETBAC-Based Model in Media Oriented System Transport Network. 504-511
Session CIT-13: Multimedia Application and QoS/QoE Provision and Estimation (II)
- Sanaullah Manzoor, Ghulam Abbas, Masroor Hussain:
CHOKeD: Fair Active Queue Management. 512-516 - Gaku Nakagawa, Hirotaka Kawata, Shuichi Oikawa:
On-the-Fly Process Resource Quarantine for System Stabilization. 517-524 - Yuanyuan Zhang, Laitao Zhu, Jing Wu, Hao Jiang, Jianguo Zhou, TianYi Cao, Zijing Cheng, Zhaojun Wang:
A Novel QoS Routing Method for LEO Rosette Constellation Network. 525-531 - Ricardo Mendes Costa Segundo, Celso Alberto Saibel Santos:
Remote Temporal Couplers for Multiple Content Synchronization. 532-539 - Amine Abidi, Sonia Mettali Gammar:
Towards New Caching Strategy for Information-centric Networking Based on Data Proximity Control. 540-547
Session CIT-14: Computer Graphics/Image Processing
- Alaa S. Al-Waisy, Rami Qahwaji, Stanley S. Ipson, Shumoos Al-Fahdawi:
A Robust Face Recognition System Based on Curvelet and Fractal Dimension Transforms. 548-555 - Engin Kayraklioglu, Tarek A. El-Ghazawi, Zeki Bozkus:
Accelerating Brain Simulations on Graphical Processing Units. 556-560 - Youzou Miyadera, Chiaki Murakami, Koichi Anada, Yasuhiko Morimoto, Shoichi Nakamura, Hiroaki Kaminaga, Takeo Yaku:
Graph Grammar for the Research Information Collection Method According to Research Activities. 561-567 - Jian Zhao, Hengzhu Liu, Yiliu Feng, Shandong Yuan, Wanzeng Cai:
BE-SIFT: A More Brief and Efficient SIFT Image Matching Algorithm for Computer Vision. 568-574
Session CIT-15: Information Technology for Biomedicine and Smart Health
- Mohammed Khalaf, Abir Jaafar Hussain, Dhiya Al-Jumeily, Russell Keenan, Paul Fergus, Ibrahim Olatunji Idowu:
Robust Approach for Medical Data Classification and Deploying Self-Care Management System for Sickle Cell Disease. 575-580 - Sanaz Rahimi Moosavi, Tuan Nguyen Gia, Ethiopia Nigussie, Amir-Mohammad Rahmani, Seppo Virtanen, Hannu Tenhunen, Jouni Isoaho:
Session Resumption-Based End-to-End Security for Healthcare Internet-of-Things. 581-588 - Obinna Anya, Hissam Tawfik, Dhiya Al-Jumeily:
Context-Aware Clinical Knowledge Sharing in Cross-Boundary E-Health: A Conceptual Model. 589-595 - Allan Mariano de Souza, Roberto Sadao Yokoyama, Nelson Luis Saldanha da Fonseca, Rodolfo Ipolito Meneguette, Leandro Aparecido Villas:
GARUDA: A New Geographical Accident Aware Solution to Reduce Urban Congestion. 596-602
Session CIT-16: Utility Computing/Clouding Computing/Ubiquitous Computing
- Farah Aït-Salaht, Hind Castel-Taleb:
Stochastic Bounding Models for Performance Analysis of Clouds. 603-610 - Enrique Chirivella-Perez, Juan Gutierrez-Aguado, José M. Claver, José M. Alcaraz Calero:
Hybrid and Extensible Architecture for Cloud Infrastructure Deployment. 611-617 - Mohd Rizuan Baharon, Qi Shi, David Llewellyn-Jones:
A New Lightweight Homomorphic Encryption Scheme for Mobile Cloud Computing. 618-625 - Sahar Ahmadzadeh, Kun Yang:
Optimal Real Time Pricing Based on Income Maximization for Smart Grid. 626-631 - Guilherme Rolim, Diego G. Passos, Igor M. Moraes, Célio Albuquerque:
Modelling the Data Aggregator Positioning Problem in Smart Grids. 632-639 - Hang Su, Jiafeng Zhu, Masood Mortazavi, Guangyu Shi, Dakai Zhu:
A Zero-Penalty Container-Based Execution Infrastructure for Hadoop Framework. 640-647 - Nelson S. Rosa:
Middleware Reconfiguration Relying on Formal Methods. 648-655
Session SOWN-1: Security & Optimization for Wireless Networks
- Liang Bu-lin, Huang Chuan:
Core-Selecting Auction Based Spectrum Allocation Scheme in Cognitive Femtocell Networks. 656-661 - Youhua Xia, Hui Lin, Li Xu:
An AGV Mechanism Based Secure Routing Protocol for Internet of Things. 662-666
Session SMMA-1: Social Media Mining and Analysis
- Elena Daehnhardt, Nick K. Taylor, Yanguo Jing:
Usage and Consequences of Privacy Settings in Microblogs. 667-674 - Bo Li, Zheng Pei, Keyun Qin:
Association Rules Mining Based on Clustering Analysis and Soft Sets. 675-680 - Yanyan Zheng, Beibei Yin:
Big Data Analytics in MOOCs. 681-686 - Yashvardhan Sharma, Jigar Bhatt, Rachit Magon:
A Multi-criteria Review-Based Hotel Recommendation System. 687-691 - Li Yan:
The Belief Degrees of Fuzzy Linguistic Values Based on a Fuzzy Formal Context. 692-697
Session WCTU-1: Character and Text Understanding
- Feng Gao, Jing Xiong, Yong-ge Liu:
Recognition of Fuzzy Characters on Oracle-Bone Inscriptions. 698-702 - Yupeng Jiang, Hongxu Hou, Ping Yang:
LSA-Based Chinese-Slavic Mongolian NER Disambiguation. 703-708 - Jing Xiong, Xin Liu, Qingsheng Li:
Ontology Description of Chinese Character Semantics. 709-713 - Guofeng Zhang, Weiqin Zhang:
Delaunay and Graph Modal-Based Bagua Layout Text Line Extraction for Shui Script. 714-718 - Qingsheng Li, Quan Liu:
A Novel Dynamic Description and Generation Method for Chinese Character. 719-724
Session WNM-1: Wireless Network and Multimedia
- Antonios G. Alexiou, Anastasios N. Bikos, Christos Bouras:
Power-Aware QoS Provisioning in OFDMA Small Cell Networks. 725-730 - Christos Bouras, Vaggelis Kapoulas, Kostas Stamos, Nikos Stathopoulos, Nikos Tavoularis:
Power Management and Rate Control Mechanism for Wi-Fi Infrastructure Networks. 731-736 - Miguel Sepulcre, Javier Gozálvez, Baldomero Coll-Perales, M. Carmen Lucas-Estan, Jose Ramon Gisbert:
Empirical Performance Models for V2V Communications. 737-742 - Walter Balzano, Maria Rosaria Del Sorbo, Domenico del Prete:
SoCar: A Social Car2Car Framework to Refine Routes Information Based on Road Events and GPS. 743-748 - Shahrukh Khan, Sahibzada Ali Mahmud:
Power Optimization Technique in Interference-Limited Femtocells in LTE and LTE Advanced Based Femtocell Networks. 749-754 - Yoram Zarai, Oz Mendel, Michael Margaliot:
Analyzing Linear Communication Networks Using the Ribosome Flow Model. 755-761 - Asad Irfan, Nayab Taj, Sahibzada Ali Mahmud:
A Novel Secure SDN/LTE Based Architecture for Smart Grid Security. 762-769 - Joerg Schultz, Roman Szczepanski, Kay Haensge, Michael Maruschke, Nico Bayer, Hans Joachim Einsiedler:
OpenGUFI: An Extensible Graphical User Flow Interface for an SDN-Enabled Wireless Testbed. 770-776 - Christos Pollalis, Paris Charalampou, Efstathios D. Sykas:
HTTP Data Offloading Using Multipath TCP Proxy. 777-782
Session I-SOCA-1: Internet of Things: Smart Objects, Cloud, and Applications
- Hsiao-Hsien Chiu, Ming-Shi Wang:
Extending Event Elements of Business Process Model for Internet of Things. 783-788 - Alex Akinbi, Ella Pereira:
Mapping Security Requirements to Identify Critical Security Areas of Focus in PaaS Cloud Models. 789-794 - Helen Angela Brumfitt, Bob Askwith, Bo Zhou:
Lightweight Forensics Application: Lightweight Approach to Securing Mobile Devices. 795-800 - Shih-Hao Chang, Rubem Pereira, Kuei-Ping Shih:
A Novel Network Topology in Underwater Visible Light Sensor Networks. 801-805 - Lei Wang, Tuo Li:
Virtual Resource Allocation and Composition for Data Stream Processing of Online Auditing in Cloud Computing. 806-813
Session IntelNet-1: Intelligent Communication and Social Networks
- Zhenhua Chen, Xiang-wei Zheng, Dianjie Lu:
A Study of a Virtual Network Embedding Algorithm. 814-818 - Zhenkun Wang, Yongqing Zheng, Lanju Kong, Zhiyong Chen:
A Crisis Mitigation Policy for SLA Profit Maximization in Multitenant Database. 819-824 - Yongchang Gao, Haowen Guan, Bin Gong:
REODM: Identify Local Outliers in Big Data. 825-830 - Zongshui Xiao, Lanju Kong, Qingzhong Li, Cheng Pang:
Global Index Oriented Non-Shard Key for Multi-tenant Database. 831-836 - Tingting Lu, Shifeng Hou, Zhenxiang Chen, Lizhen Cui, Lei Zhang:
An Intention-Topic Model Based on Verbs Clustering and Short Texts Topic Mining. 837-842 - Wenbin Zhang, Yuliang Shi, Lei Liu, Lizhen Cui, Yongqing Zheng:
Performance and Resource Prediction at High Utilization for N-Tier Service Systems in Cloud an Experiment Driven Approach. 843-848
Session ITA-1: Information Technology and Applications (I)
- Rui Li, Shilong Ma, Wentao Yao:
Ontology-Based Requirements Generation for Credibility Validation of Safety-Critical System. 849-854 - Weijia Lu, Ran Niu, Longtao Yuan, Xin Qu, Heng Wu, Jing Ye:
Method to Develop Coded Excitation for Velocimetry in Downhole Drilling. 855-860 - Vasco Santos, Orlando Belo:
Using Relational Algebra on the Specification of Real World ETL Processes. 861-866 - Olaperi Yeside Sowunmi, Sanjay Misra:
An Empirical Evaluation of Software Quality Assurance Practices and Challenges in a Developing Country. 867-871
Session ITA-2: Information Technology and Applications (II)
- Adewole Adewumi, Sanjay Misra, Nicholas A. Omoregbe:
Evaluating Open Source Software Quality Models Against ISO 25010. 872-877 - Lennon Furtado, Brunelli Miranda, Nelson Neto, Bianchi Serique Meiguins:
IVOrpheus - A Proposal for Interaction by Voice Commands in Three-Dimensional Environments of Information Visualization. 878-883 - Yong Yao, Bian Li, Lei Peng:
Evaluating User Influence Based on the Properties of User in Social Networks. 884-888 - Marcelo L. M. Marinho, Suzana Sampaio, Alexandre Luna, Telma Lima, Hermano P. Moura:
Dealing with Uncertainties in Software Project Management. 889-894 - Tadeu Matos Nunes, Pedro Porfírio Muniz Farias, José Renato Villela Dantas, Hermano Albuquerque Lira, Bruno de Azevedo Muniz, Luiz Henrique S. Felix:
Towards a Distinction between Application State Resources and Data Resources in ROA. 895-900
Session ITA-3: Pattern Recognition, Data Mining, and Artificial Intelligence (I)
- Ritu Chaturvedi, Christie I. Ezeife:
Mining Binary Data with Matrix Algebra. 901-906 - Benjamin Ghansah, Shengli Wu, Nathaniel Ghansah:
Rankboost-Based Result Merging. 907-914 - Zenan Shi, Xuanjing Shen, Haipeng Chen, Xiang Li:
Blind Detection of Image Splicing Based on Fuzzy Run-Length. 915-920 - Nehal F. Attia, Sherin M. Youssef, Saleh M. Elkaffas:
ITSR-HISL: An Improved Model for Trajectory Signature Recognition in Human Interactive Sign Language. 921-926
Session ITA-4: Pattern Recognition, Data Mining, and Artificial Intelligence (II)
- Minho Kim, Sung-Ki Choi, Jingzhi Jin, Hyuk-Chul Kwon:
Adaptive Context-Sensitive Spelling Error Correction Techniques for the Extremely Unpredictable Error Generating Language Environments. 927-930 - Minho Kim, Sung-Ki Choi, Ae-sun Yoon, Hyuk-Chul Kwon:
Practical Target Word Selection Method in Korean to Korean Sign Language Machine Translation. 931-934 - Casimer M. DeCusatis, Aparicio Carranza, Alassane Ngaide, Sundas Zafar, Nestor Landaez:
Methodology for an Open Digital Forensics Model Based on CAINE. 935-940 - Marcello Cinque, Domenico Cotroneo, Christian Esposito, Mario Fiorentino, Stefano Russo:
A Reliable Crisis Information System to Share Data after the Event of a Large-Scale Disaster. 941-946
Session ITA-5: Future Internet
- Arti Mann, Wei Wei, Ravi Badana, Tong Zhang, T. Andrew Yang:
Use Cases and Development of Software Defined Networks in OpenStack. 947-953 - Esad Kaduic, Nataa ivic, Mirko krbic, Mesud Hadzialic, Narcis Behlilovic:
Euclidean Distance-Based QoS Metric for Dynamic MAP Selection in HMIPv6 Network. 954-958 - Md. Rahatur Rahman, Shamim Akhter:
Real Time Bi-directional Traffic Management Support System with GPS and WebSocket. 959-964
Session ITA-6: High Performance Computing
- Do-Eun Oh, Hyun Soo Kim:
Power System Applications Integration for the Smart Grid. 965-969 - Ruxiang Zhai, Kun Zhang, Mingjun Liu:
Static Group Privacy Protection Mechanism Based on Cloud Model. 970-974 - Khairul Akram Zainol Ariffin, Ahmad Kamil Mahmood, Jafreezal Jaafar, Solahuddin Shamsuddin:
Tracking File's Metadata from Computer Memory Analysis. 975-980
Session ITA-7: Computer Graphics/Image Processing
- Mingzhe Jiang, Amir-Mohammad Rahmani, Tomi Westerlund, Pasi Liljeberg, Hannu Tenhunen:
Facial Expression Recognition with sEMG Method. 981-988 - Rouxin Sang, K. P. Chan:
A Correlated Topic Modeling Approach for Facial Expression Recognition. 989-993 - Sud Sudirman, Abdennour El Rhalibi:
Improving Camera Pose Estimation for Indoor Marker-less Augmented Reality. 994-999
Session MSNCom-1: Mobile Social Networking and Computing
- Xinzheng Niu, Dazhuang Su, Minhao Cheng:
Intelligent Mobile Framework Based on Swarm Computation. 1000-1006 - Zhengde Zhao, Xin Hong, Shaohua Wang:
A Web Service Composition Method Based on Merging Genetic Algorithm and Ant Colony Algorithm. 1007-1011 - Shaohua Wang, Zhengde Zhao, Xin Hong:
The Research on Collaborative Filtering Recommendation Algorithm Based on Improved Clustering Processing. 1012-1015 - Hongliang Cui, Xiaona Qin:
The Video Recommendation System Based on DBN. 1016-1021 - Olfa Ben Rhaiem, Lamia Chaari Fourati, Anis Masmoudi:
Content-centric Network-Based MANET for Streaming Video Transmission. 1022-1027
Session WISH-1: Imaging and Sensor Technologies for Improved Healthcare
- Alaa S. Al-Waisy, Rami Qahwaji, Stanley S. Ipson, Shumoos Al-Fahdawi:
A Fast and Accurate Iris Localization Technique for Healthcare Security System. 1028-1034 - Shumoos Al-Fahdawi, Rami Qahwaji, Alaa S. Al-Waisy, Stan Ipson:
An Automatic Corneal Subbasal Nerve Registration System Using FFT and Phase Correlation Techniques for an Accurate DPN Diagnosis. 1035-1041 - A. F. Mirza, F. Abdulsalam, Rameez Asif, Y. A. S. Dama, M. M. Abusitta, Fauzi Elmegri, Raed A. Abd-Alhameed, James M. Noras, Rami Qahwaji:
Breast Cancer Detection Using 1D, 2D, and 3D FDTD Numerical Methods. 1042-1045 - Jinke Zhang, Yaochun Shen, Yalin Zheng:
The Application of Full-Field Optical Coherence Tomography on Evaluating Film Coating of Pharmaceutical Pellets. 1046-1050 - Ahmad M. Al-Taee, Majid A. Al-Taee, Waleed Al-Nuaimy, Zahra J. Muhsin, Hamzah S. AlZu'bi:
Smart Bolus Estimation Taking into Account the Amount of Insulin on Board. 1051-1056 - H. S. O. Migdadi, Huthaifa A. Obeidat, Kelvin O. O. Anoh, N. N. Khatib, James M. Noras, Rami Qahwaji, Raed A. Abd-Alhameed:
Channel Estimation for OFDM FFT/DWT in Multi-carrier Modulation Used in Wireless Telemedicine. 1057-1062 - Jianhua Ma, Runhe Huang:
Wear-I: A New Paradigm in Wearable Computing (Invited Paper). 1063-1068
Session IUCC-1: Sensor Networks and Ad Hoc Networks
- Jeongcheol Lee, SeokYoon Kang, Chung-Jae Lee, Kyong Hoon Kim, Ki-Il Kim:
Beaconless Geographic Routing Protocol with Adaptive Delay Timer in Wireless Sensor Networks. 1069-1073 - Muhammad Farooq-i-Azam, Qiang Ni, Ejaz A. Ansari, Haris Pervaiz:
Energy-Efficient Location Estimation Using Variable Range Beacons in Wireless Sensor Networks. 1074-1079 - Radwa Ahmed Osman, Xiao-Hong Peng, Zuoyin Tang:
Energy Efficient Adaptive Cooperative Communications in Wireless Sensor Networks. 1080-1086 - Avleen Kaur Malhi, Shalini Batra:
XML Based Wireless Patient Monitoring System Using Vehicular Ad-Hoc Networks. 1087-1094 - Xiuqi Li, Yong Feng, Feng Wang, Qian Qian:
When Smart Phone Meets Vehicle: A New On-Board Unit Scheme for VANETs. 1095-1100 - Maryam M. Alotaibi, Hussein T. Mouftah:
Probabilistic Area-Based Dissemination for Heterogeneous Transmission Ranges in Vehicular Ad-Hoc Networks. 1101-1108
Session IUCC-2: Internet of Things
- Mohammed Riyadh Abdmeziem, Djamel Tandjaoui, Imed Romdhani:
A Decentralized Batch-Based Group Key Management Protocol for Mobile Internet of Things (DBGK). 1109-1117 - Mamoun Qasem, Ahmed Yassin Al-Dubai, Imed Romdhani, Muneer O. Bani Yassein:
A Dynamic Power Tuning for the Constrained Application Protocol of Internet of Things. 1118-1122 - Baraq Ghaleb, Ahmed Yassin Al-Dubai, Elias Ekonomou:
E-Trickle: Enhanced Trickle Algorithm for Low-Power and Lossy Networks. 1123-1129
Session IUCC-3: Detection, Identification, and Recognition
- Kenki Ueda, Hirohiko Suwa, Yutaka Arakawa, Keiichi Yasumoto:
Exploring Accuracy-Cost Tradeoff in In-Home Living Activity Recognition Based on Power Consumptions and User Positions. 1130-1137 - Tudor Miu, Paolo Missier, Thomas Plötz:
Bootstrapping Personalised Human Activity Recognition Models Using Online Active Learning. 1138-1147 - Amjad Ali, Rehanullah Khan, Irfan Ullah, Adnan Daud Khan, Abid Munir:
Minutiae Based Automatic Fingerprint Recognition: Machine Learning Approaches. 1148-1153 - Qiming Zhu, Jinchang Ren, David Barclay, Samuel McCormack, Willie Thomson:
Automatic Animal Detection from Kinect Sensed Images for Livestock Monitoring and Assessment. 1154-1157 - Cong Shen, Rong Xie, Liang Zhang:
Temporal Recursive Pedestrian Trajectory Identification for Multi-camera Surveillance System. 1158-1163 - Xiaojun Zhai, Abbes Amira, Faycal Bensaali:
ECG Security Identification System on the Zynq SoC Platform. 1164-1169
Session IUCC-4: Wireless Networks and Ubiquitous Networks
- Michael Rethfeldt, Peter Danielis, Björn Konieczek, Felix Uster, Dirk Timmermann:
Integration of QoS Parameters from IEEE 802.11s WLAN Mesh Networks into Logical P2P Overlays. 1170-1177 - Liang Zhao, Ahmed Yassin Al-Dubai, Xianwei Li, Guolong Chen:
A New Relay Node Selection Model for Wireless Community Mesh Networks. 1178-1185 - Guopeng Zhang, Ru Wang, Shuanshuan Wu, Lin Chen, Bo Dai, Kun Yang, Liqiang Zhao:
Joint Relay Selection and Resource Allocation for D2D-Enabled Cellular Communications. 1186-1192 - Yitian Zhang, Kun Yang, Xiao Wang:
Adaptive Current Level Control Algorithm For Battery-Powered ZigBee Network in Enterprise Settings. 1193-1199 - Filip Lemic, Arash Behboodi, Vlado Handziski, Adam Wolisz:
Increasing Interference Robustness of WiFi Fingerprinting by Leveraging Spectrum Information. 1200-1208 - Yue Sun, Kun Yang, Qiang Liu:
Channel Capacity Analysis of Blood Capillary-Based Molecular Communication. 1209-1215 - Tong Li, Xiaodan Zhang, Zongzhen Liu, Jingguo Ge, Zhongjiang Yao, Yuepeng E, Yulei Wu, Lei Zhang:
Performance Investigation and Comparison between Virtual Networks and Physical Networks Based on an Advanced Testbed Network. 1216-1221
Session IUCC-5: Data Processing and Big Data
- Divya Pandove, Shivani Goel:
Prototyping and In-Depth Analysis of Big Data Benchmarking. 1222-1229 - Xiaoyi Tao, Heng Qi, Wenxin Li, Keqiu Li, Yingwei Jin:
Pota: Maximizing Profit for Task-Level Scheduling for Data Center Networks. 1230-1237 - Zhikui Chen, Siqian Liu, Kunyou Jiang, Han Xu, Xinru Cheng:
A Data Imputation Method Based on Deep Belief Network. 1238-1243 - Goutham Kamath, Wen-Zhan Song, Paritosh Ramanan, Lei Shi, Junjie Yang:
DRISTI: Distributed Real-Time In-Situ Seismic Tomographic Imaging. 1244-1251
Session IUCC-6: Resource Management and Scheduling
- Xing Luo, Xu Zhu, Eng Gee Lim:
Load Scheduling Based on an Advanced Real-Time Price Forecasting Model. 1252-1257 - Hang Su, Dakai Zhu, Jiafeng Zhu:
On the Implementation of RT-FAIR Scheduling Framework in Linux. 1258-1265 - Bo Gao, Ligang He, Xin Lu, Cheng Chang, Kenli Li, Keqin Li:
Developing Energy-Aware Task Allocation Schemes in Cloud-Assisted Mobile Workflows. 1266-1273 - Jun-Ho Kim, Sung-Bae Cho:
A Smartphone Management Method to Save Battery Using Bayesian Networks and Fuzzy System. 1274-1279
Session IUCC-7: Ubiquitous Computing and Ambient Intelligence
- Tamir Sobeih, Nick Whittaker, Liangxiu Han:
DIVINE: Building a Wearable Device for Intelligent Control of Environment Using Google Glass. 1280-1285 - Qu Li, Xiaofei Liao, Hai Jin, Li Lin, Xia Xie, Qiongjie Yao:
Cost-Effective Hybrid Replacement Strategy for SSD in Web Cache. 1286-1294 - Ji Yang, Yong Li, Nan Feng Zhang, Jing Feng Yang, Ke Kuang, Yue Hua Hu, Wen Guang Qi:
Analysis of Urban Residential Water Consumption Based on Smart Meters and Fuzzy Clustering. 1295-1301 - Shutaro Homma, Eri Matsuura, Sayaka Matsumoto, Shohei Horiguchi, Ken-ichi Okada:
Response Time in Switching Scents When Converting Scenes. 1302-1307 - Gamal Sallam, Uthman Baroudi:
COVER: A Cooperative Virtual Force Robot Deployment Technique. 1308-1315 - Athanasios Plessas, Olga Georgiadou, Vasilios Stefanis, Andreas Komninos, John D. Garofalakis:
Assessing Physical Location as a Potential Contextual Cue For Adaptive Mobile Contact Lists. 1316-1324 - Hyunho Kang, Keiichi Iwamura:
Anti-counterfeiting Using Irregularities of Magnetic Flux Density. 1325-1329 - Qiongjie Yao, Xiaofei Liao, Hai Jin:
A Map-Reduce Method for Training Autoencoders on Xeon Phi. 1330-1337 - Yu Bai, Mingjie Lin:
Universal Random Number Generation with Field-Programmable Analog Array and Magnetic Tunneling Junction (MTJ) Devices. 1338-1343
Session IWSCA-1: Soft Computing and Applications
- Olga Georgieva, Dessislava Petrova-Antonova:
Integrated QoS Assessment of Web Services. 1344-1348 - Zhicai Liu, Keyun Qin, Zheng Pei, Jin Liu:
On Induced Soft Sets and Topology for the Parameter Set of a Soft Set. 1349-1353 - Fen Zou, Liangzhong Yi, Zheng Pei, Jing Liu:
A Consensus Model for Multiple Criteria Group Decision Making under Linguistic Environment. 1354-1359 - Yaya Liu, Keyun Qin:
Entropy on Interval-Valued Intuitionistic Fuzzy Soft Set. 1360-1365 - Junfang Luo, Keyun Qin:
The Rough Set Model Based on Grade Indiscernibility Relation. 1366-1371
Session ICTA-1: Innovative Computational Technologies and Its Applications
- Kai He, Jing-Xian Yao, Hsien-Tsung Chang:
Estimation of Physical Activity Walking in Different Slopes Based on Accelerometer Approach. 1372-1376 - Shih-Lin Wu, Wei-Wen Wang:
Energy-Efficient Multimedia Multicast Scheduling and Resource Allocation Algorithms for OFDMA-Based Systems. 1377-1382 - Chun-Yuan Lin, Huang Ting Yen, Che-Lun Hung:
Efficient Strategies of Compressing Three-Dimensional Sparse Arrays Based on Intel XEON and Intel XEON Phi Environments. 1383-1388 - Guang-liang Guo, Quan Qian:
Trusted Platform Based Linux File Access Control. 1389-1394 - Che-Lun Hung, Chun-Yuan Lin, Yuan-Huai Wu, Hsiao-Hsi Wang, Yu-Chen Hu:
Efficient Brain MRI Segmentation Algorithm on TK1. 1395-1399 - Kuei-Chun Liu, Ching-Hung Wu, Shau-Yin Tseng, Yin-Te Tsai:
Voice Helper: A Mobile Assistive System for Visually Impaired Persons. 1400-1405
Session MT4H-1: Mobile Technology for Healthcare
- José David López, Angela Sucerquia, Leonardo Duque-Muñoz, Jesús Francisco Vargas-Bonilla:
Walk and Jog Characterization Using a Triaxial Accelerometer. 1406-1410 - Peter Rasche, Matthias Wille, Sabine Theis, Katharina Schaefer, Christopher M. Schlick, Alexander Mertens:
Activity Tracker and Elderly. 1411-1416 - Ciaran McMahon, Mary P. Aiken:
Introducing Digital Wellness: Bringing Cyberpsychological Balance to Healthcare and Information Technology. 1417-1422 - Chelsea Dobbins, Reza Rawassizadeh:
Clustering of Physical Activities for Quantified Self and mHealth Applications. 1423-1428
Session AUCN-1: Advances in Ubiquitous Computing and Networking (I)
- Carmen N. Ojeda-Guerra:
A Simple Software Development Methodology Based on MVP for Android Applications in a Classroom Context. 1429-1434 - Jan Rupnik, John Davies, Blaz Fortuna, Alistair Duke, Sandra Stincic Clarke:
Travel Time Prediction on Highways. 1435-1442 - Thomas Vilarinho, Babak A. Farshchian, Daniel Gloppestad Bajer, Ole Halvor Dahl, Iver Egge, Sondre Steinsland Hegdal, Andreas Lones, Johan N. Slettevold, Sam Mathias Weggersen:
A Combined Smartphone and Smartwatch Fall Detection System. 1443-1448 - Uthman Baroudi, Mohammed Aldarwbi:
CoRFL: A Connectivity Restoration Mechanism Using Fuzzy Logic in Wireless Actor and Sensor Networks. 1449-1454 - Muneer O. Bani Yassein, Ahmed Yassin Al-Dubai:
Inspired Counter Based Broadcasting for Dynamic Source Routing in Mobile Networks. 1455-1459 - S. Irene, N. M. Shwetha, P. Haribabu, R. Pitchiah:
Development of ZigBee Triaxial Accelerometer Based Human Activity Recognition System. 1460-1466
Session AUCN-2: Advances in Ubiquitous Computing and Networking (II)
- Bandar Aldawsari, Thar Baker, David England:
Towards a Holistic Multi-cloud Brokerage System: Taxonomy, Survey, and Future Directions. 1467-1472 - Antonella Di Stefano, Giovanni Morana, Daniele Zito:
C2@home - A Novel User-Side Cloud-of-Clouds Management Architecture. 1473-1480 - Fahed Hasan Awad:
Wireless Location Estimation Using Virtual Forces. 1481-1486 - Edward Price, George Moore, Leo Galway, Mark Linden:
Towards a Mobile Assistive Technology for Monitoring and Assessing Cognitive Fatigue in Individuals with Acquired Brain Injury. 1487-1491 - Susmit Bagchi:
Probabilistic Estimation of Resource Affinities of Processes in Computing Systems. 1492-1497
Session BigData-1: Big Data and Smart Sustainable Society
- Nicholas Gould, David Atkin:
Towards a Semantic Layer to Support Road and Public Transport User Decision-Making. 1498-1503 - Zhexing Yan, Mahroo Eftekhari:
Development of an Integrated Agent for Greener Airport Operations. 1504-1509 - Jianguang Tu, Jianquan Cheng, Liangxiu Han:
Big Data Computation for Workshop-Based Planning Support. 1510-1514 - Jungin Choi, Mijeom Kim, Jaeweon Yoon:
Implementation of the Big Data Management System for Demand Side Energy Management. 1515-1520 - Pedro Saleiro, Silvio Amir, Mário J. Silva, Carlos Soares:
POPmine: Tracking Political Opinion on the Web. 1521-1526 - Li Guo:
Nudge Better Quantified-Self with Context-Aware and Proactive Services. 1527-1532 - Christos Margiolas, Ioannis Manousakis:
Towards a Heterogeneous Compute Engine for Software Acceleration on Big Data Infrastructures. 1533-1537 - Albino Altomare, Eugenio Cesario:
Predictive Models for Energy-Efficient Clouds: An Analysis on Real-Life and Synthetic Data. 1538-1543 - Jeremy Singer, Abyd Adhami, Colin Perkins:
Towards Free Market Cloud Computing. 1544-1547
Session VEAI-1: Virtual Environments and Advanced Interfaces
- Leonel Morgado, Bernardo Cardoso, Fausto de Carvalho, Luis Fernandes, Hugo Paredes, Luis Barbosa, Benjamim Fonseca, Paulo Martins, Ricardo Rodrigues Nunes:
Separating Gesture Detection and Application Control Concerns with a Multimodal Architecture. 1548-1553 - Leo Galway, Paul J. McCullagh, Gaye Lightbody, Chris P. Brennan, David Trainor:
The Potential of the Brain-Computer Interface for Learning: A Technology Review. 1554-1559 - Panagiotis E. Antoniou, Eleni Dafli, Panagiotis D. Bamidis:
Design of Novel Teaching Episodes in Medical Education Using Emerging Experiential Digital Assets: Technology Enabled Medical Education Beyond the Gimmicky. 1560-1565 - Jon Ram Bruun-Pedersen, Stefania Serafin, Lise Busk Kofoed:
Simulating Nature for Elderly Users - A Design Approach for Recreational Virtual Environments. 1566-1571 - Ioannis Doumanis, Julie A. Wall, David S. Monaghan:
Playing Immersive Games on the REVERIE Platform. 1572-1577 - Markos Mentzelopoulos, Filippo Tarpini, Agazio Emanuele, Aristidis Protopsaltis:
Hardware Interfaces for VR Applications: Evaluation on Prototypes. 1578-1583 - Ioannis Doumanis, Daphne Economou, Nektarios Georgalas:
The REVERIE Human Representation Addresses Issues Related to Virtual Presence, Communication, and Interaction in Collaborative Virtual Environments. 1584-1589 - Jeffrey Ferguson:
Lessons from Digital Puppetry: Updating a Design Framework for a Perceptual User Interface. 1590-1595
Session IoT-Smart-1: Internet of Things and Smart Spaces
- Wael Guibène, Keith E. Nolan, Mark Y. Kelly:
Survey on Clean Slate Cellular-IoT Standard Proposals. 1596-1599 - Isam Wadhaj, Istvan Kristof, Imed Romdhani, Ahmed Yassin Al-Dubai:
Performance Evaluation of the RPL Protocol in Fixed and Mobile Sink Low-Power and Lossy-Networks. 1600-1605 - Mamoun Qasem, Hussien Altawssi, Muneer O. Bani Yassein, Ahmed Yassin Al-Dubai:
Performance Evaluation of RPL Objective Functions. 1606-1613 - Nadhir Ben Halima, Yaser M. Khamayseh, Wail Mardini, Abedl Rahman Almodawar:
Empirical Experiments for Sensors' Distance Estimation in Smart Places. 1614-1619 - Dragana Krstic, Imed Romdhani, M. Masadeh Bani Yassein, Sinisa Minic, Goran Petkovic, Predrag Milacic:
Level Crossing Rate of Ratio of Product of Two k-u Random Variables and Nakagami-m Random Variable. 1620-1625
Session HWNQoE-1: Heterogeneous Wireless Networks and Quality-of-Experience
- Tarik Ghalut, Hadi Larijani, Ali Shahrabi:
Content-Based Video Quality Prediction Using Random Neural Networks for Video Streaming over LTE Networks. 1626-1631 - Mukhald A. Salih, John Cosmas, Yue Zhang:
OpenFlow 1.3 Extension for OMNeT++. 1632-1637 - Sanjeeb Shrestha, Gengfa Fang, Eryk Dutkiewicz, Xiaojing Huang:
Medium Access Control Protocol to Address Hidden Terminals in MU-MIMO WLANs. 1638-1645 - Omar Banimelhem, Muneer M. Al-Zu'bi, Mohammad S. Al Salameh:
Hata Path Loss Model Tuning for Cellular Networks in Irbid City. 1646-1650
Session MultiCom-1: Multimedia Communications and Networking
- Ran Dubin, Ofer Hadar, Yariv Freifeld, Aviv Ruham, Amit Dvir, Nissim Harel, Refael Barkan:
Hybrid Clustered Peer-Assisted DASH-SVC System. 1651-1656 - Olatunde Awobuluyi, James Nightingale, Qi Wang, José M. Alcaraz Calero:
Video Quality in 5G Networks: Context-Aware QoE Management in the SDN Control Plane. 1657-1662 - Mirghiasaldin Seyedebrahimi, Colin Bailey, Xiao-Hong Peng:
Client QoE-Oriented Segment Selection for DASH. 1663-1668 - Huan Huo, Shangye Chen, Liang Song, Leiyu Ban, Zonghan Wu, Liang Liu, Liping Gao:
Anomalous Region Detection on the Mobility Data. 1669-1674 - Xin Ding, Wei Chen, Ian J. Wassell:
Block-Based Feature Adaptive Compressive Sensing for Video. 1675-1680
Session DASC-1: Self-Protection and Intrusion-Detection (I)
- Jie Cai, Paola Flocchini, Nicola Santoro:
Distributed Black Virus Decontamination and Rooted Acyclic Orientations. 1681-1688 - Fangcheng Jia, Jin B. Hong, Dong Seong Kim:
Towards Automated Generation and Visualization of Hierarchical Attack Representation Models. 1689-1696 - William Hurst, Nathan Shone, Quentin Monnet:
Predicting the Effects of DDoS Attacks on a Network of Critical Infrastructures. 1697-1702 - Sultan S. Alshamrani, Dariusz R. Kowalski, Leszek Antoni Gasieniec:
Efficient Discovery of Malicious Symptoms in Clouds via Monitoring Virtual Machines. 1703-1710 - Xiang Sun, Yan Wu, Lu Liu, John Panneerselvam:
Efficient Event Detection in Social Media Data Streams. 1711-1717
Session DASC-2: Self-Protection and Intrusion-Detection (II)
- Younis A. Younis, Kashif Kifayat, Qi Shi, Bob Askwith:
A New Prime and Probe Cache Side-Channel Attack for Cloud Computing. 1718-1724 - Cai Fu, Li Min, Jia Yang, Deliang Xu, Xiaoyang Liu, Lansheng Han:
Evolutionary Virus Immune Strategy Based on Community Vitality. 1725-1732 - Saeed Shafieian, Mohammad Zulkernine, Anwar Haque:
CloudZombie: Launching and Detecting Slow-Read Distributed Denial of Service Attacks from the Cloud. 1733-1740 - Eslam G. AbdAllah, Mohammad Zulkernine, Hossam S. Hassanein:
Detection and Prevention of Malicious Requests in ICN Routing and Caching. 1741-1748 - Fatma Hachmi, Khadouja Boujenfa, Mohamed Limam:
A Three-Stage Process to Detect Outliers and False Positives Generated by Intrusion Detection Systems. 1749-1755
Session DASC-3: Information and System Security
- Curtis L. Maines, David Llewellyn-Jones, Stephen Tang, Bo Zhou:
A Cyber Security Ontology for BPMN-Security Extensions. 1756-1763 - Malik Shahzad Kaleem Awan, Pete Burnap, Omer F. Rana:
An Empirical Risk Management Framework for Monitoring Network Security. 1764-1771 - Helen Angela Brumfitt, Bob Askwith, Bo Zhou:
Protecting Future Personal Computing: Challenging Traditional Network Security Models. 1772-1779 - Irune Agirre, Mikel Azkarate-askasua, Asier Larrucea, Jon Pérez, Tullio Vardanega, Francisco J. Cazorla:
A Safety Concept for a Railway Mixed-Criticality Embedded System Based on Multicore Partitioning. 1780-1787 - Asier Larrucea, Jon Pérez, Roman Obermaisser:
A Modular Safety Case for an IEC 61508 Compliant Generic COTS Processor. 1788-1795
Session DASC-4: Trust and Privacy
- Nathan Shone, Chelsea Dobbins, William Hurst, Qi Shi:
Digital Memories Based Mobile User Authentication for IoT. 1796-1802 - Kevin G. Lyn, Lee W. Lerner, Christopher J. McCarty, Cameron D. Patterson:
The Trustworthy Autonomic Interface Guardian Architecture for Cyber-Physical Systems. 1803-1810 - Borui Yang, Jianxin Li, Lu Liu, Yingjie Cao, Hua Wei, Peiyuan Sun, Nannan Wu, Bo Li:
ShutterRoller: Preserving Social Network Privacy towards High-Speed Domain Gateway. 1811-1818 - Xin Huang, Paul Craig, Qinghua Wang:
Identity-Based Association Protocols for Wireless Personal Area Networks. 1819-1826 - Jan Kantert, Sarah Edenhofer, Sven Tomforde, Christian Müller-Schloer:
Representation of Trust and Reputation in Self-Managed Computing Systems. 1827-1834 - Mianxiong Dong, Kaoru Ota, Anfeng Liu:
Preserving Source-Location Privacy through Redundant Fog Loop for Wireless Sensor Networks. 1835-1842
Session DASC-5: Autonomic Computing Theory, Models, Architectures, and Communications
- Moisés Urbina, Zaher Owda, Roman Obermaisser:
Simulation Environment Based on SystemC and VEOS for Multi-core Processors with Virtual AUTOSAR ECUs. 1843-1852 - Chaminda Alocious, Hannan Xiao, Bruce Christianson, James A. Malcolm:
Evaluation and Prevention of MAC Layer Misbehaviours in Public Wireless Hotspots. 1853-1860 - Ruairí de Fréin, Joel Pfaff, Thomas Pare:
Enterprise Data Center Globality Measurement. 1861-1869 - Kirill Belyaev, Indrakshi Ray:
Towards Efficient Dissemination and Filtering of XML Data Streams. 1870-1877 - Giles Oatley, Tom Crick, Dee Bolt:
CCTV as a Smart Sensor Network. 1878-1885
Session DASC-6: QoS of Communications and Services (I)
- Ruairí de Fréin:
Take Off a Load: Load-Adjusted Video Quality Prediction and Measurement. 1886-1894 - Zahra Shirmohammadi, Mohsen Ansari, Sanaz Kazemi Abharian, Sepideh Safari, Seyed Ghassem Miremadi:
PAM: A Packet Manipulation Mechanism for Mitigating Crosstalk Faults in NoCs. 1895-1902 - Qi Xie, Zibin Zheng, Lu Liu, Mengtian Cui:
Correlation-Based Top-k Recommendation for Web Services. 1903-1909
Session DASC-7: QoS of Communications and Services (II)
- Tsvetoslava Vateva-Gurova, Neeraj Suri, Avi Mendelson:
The Impact of Hypervisor Scheduling on Compromising Virtualized Environments. 1910-1917 - Roman Obermaisser, Ayman Murshed:
Incremental, Distributed, and Concurrent Scheduling in Systems-of-Systems with Real-Time Requirements. 1918-1927 - Andrea Höller, Tobias Rauter, Johannes Iber, Christian Kreiner:
Diverse Compiling for Microprocessor Fault Detection in Temporal Redundant Systems. 1928-1935 - Zhu Li, Li Jun, Hu Tao, Xiang Jun:
Calligraphy Imitation System Based on Virtual Brush and Scale-Invariant Feature Transform. 1936-1941
Session PASS4CI-1: Privacy, Data Assurance, Security Solutions for Cloud Computing and Internet-of-Things
- Yan-Xiao Liu, Zhi-Xiao Wang, Wen-Yao Yan:
Linear (k, n) Secret Sharing Scheme with Cheating Detection. 1942-1947
Session SocialSec-1: Social Computing and Security
- Ning Zheng, Jinlong Wang, Ting Wu, Ming Xu:
A Fragment Classification Method Depending on Data Type. 1948-1953 - Hong Ding, Junyao Huang, Yuangfang Chen, Yizhi Ren:
Don't Speak to Strangers: The Suspicious Strategy Can Help to Improve Cooperation in Spatial Donation Game. 1954-1959 - Shehzad Ashraf Chaudhry, Khalid Mahmood, Husnain Naqvi, Muhammad Sher:
A Secure Authentication Scheme for Session Initiation Protocol Based on Elliptic Curve Cryptography. 1960-1965
Session CEWE-1: Cybercrimes and Emerging Web Environments
- Alvaro Botas, Ricardo J. Rodríguez, Teemu Uolevi Väisänen, Patrycjusz Zdzichowski:
Counterfeiting and Defending the Digital Forensic Process. 1966-1971 - Raian Ali, John McAlaney, Shamal Faily, Keith Phalp, Vasilios Katos:
Mitigating Circumstances in Cybercrime: A Position Paper. 1972-1976 - Giovanni Bottazzi, Emiliano Casalicchio, Davide Cingolani, Fabio Marturana, Marco Piu:
MP-Shield: A Framework for Phishing Detection in Mobile Devices. 1977-1983 - Tharmini Janarthanan, Shahrzad Zargari:
The Evidentiary Value of Link Files in Linux File System to Digital Forensic Investigation. 1984-1988 - Giovanni Bottazzi, Giuseppe Francesco Italiano:
Fast Mining of Large-Scale Logs for Botnet Detection: A Field Study. 1989-1996
Session SHPC-1: Sustainable High Performance Computing
- Andrew A. Chien, Rich Wolski, Fan Yang:
Zero-Carbon Cloud: A Volatile Resource for High-Performance Computing. 1997-2001 - Justin Y. Shi:
Use HDLC Principles for Distributed Applications. 2002-2009 - Yasin Celik, Aakash Pradeep, Justin Y. Shi:
AnkaCom: A Development and Experiment for Extreme Scale Computing. 2010-2016
Session ASCC-1: Advances in Autonomic and Secure Computing and Communications
- Nabeel Ali Albahbooh, Patrick Bours:
A Mobile Phone Device as a Biometrics Authentication Method for an ATM Terminal. 2017-2024 - Svetla Radeva, Dimitar Radev:
Human-Computer Interaction System for Communications and Control. 2025-2030 - Balwinder Sodhi:
Using Dropped Call as an Authentication Factor. 2031-2035 - Krzysztof M. Brzezinski:
Function and Performance of Testing: Towards a Systemic View. 2036-2042
Session ASCC-2: Advances in Autonomic and Secure Computing and Communications
- Maurice Djibril Faye, Eddy Caron, Ousmane Thiare:
Autonomic Management Using Self-Stabilization for Hierarchical and Distributed Middleware. 2043-2048 - Hui Lin, Jia Hu, Jiajia Liu, Li Xu, Yulei Wu:
A Context Aware Reputation Mechanism for Enhancing Big Data Veracity in Mobile Cloud Computing. 2049-2054 - Khurram Shahzad, Steve Woodhead:
Empirical Analysis of Rate Limiting + Leap Ahead (RL+LA) Countermeasure against Witty Worm. 2055-2061 - Nitin Naik:
Fuzzy Inference Based Intrusion Detection System: FI-Snort. 2062-2067 - Junfeng Xu, Li Zhang, Yunchuan Sun, Dong Lin, Ye Mao:
Toward a Secure Android Software Protection System. 2068-2074
Session IBDS-1: Intelligent Big Data Systems
- Aaron Johnson, Paul Holmes, Lewis Craske, Marcello Trovati, Nik Bessis, Peter Larcombe:
Computational Objectivity in Depression Assessment for Unstructured Large Datasets. 2075-2079 - Nathan Whittington, Lu Liu, Bo Yuan, Marcello Trovati:
Investigation of Energy Efficiency on Cloud Computing. 2080-2087 - Marcello Trovati, Jayne Trovati, Peter Larcombe, Lu Liu:
A Semi-automated Assessment of the Direction of Influence Relations from Semantic Networks: A Case Study in Maths Anxiety. 2088-2091 - James Hardy, Lu Liu:
Reducing Vehicular Traffic Congestion Using Available Forward Road Capacity Detection. 2092-2097
Session PICom-1: Ubiquitous Intelligence & Cyber-Physical Computing
- Andrea Sassi, Claudio Borean, Roberta Giannantonio, Marco Mamei, Dario Mana, Franco Zambonelli:
Crowd Steering in Public Spaces: Approaches and Strategies. 2098-2105 - Tuan Phan Vuong, George Loukas, Diane Gan:
Performance Evaluation of Cyber-Physical Intrusion Detection on a Robotic Vehicle. 2106-2113 - Ao Guo, Jianhua Ma:
A Smartphone-Based System for Personal Data Management and Personality Analysis. 2114-2122 - Zehua Lan, Yu Li, Xingang Liu:
A Novel Image Quality Assessment Method Based on Vision Attention. 2123-2129 - Hidir Yuzuguzel, Jari Niemi, Serkan Kiranyaz, Moncef Gabbouj, Thomas Heinz:
ShakeMe: Key Generation from Shared Motion. 2130-2133
Session PICom-2: Artificial Intelligence & Knowledge Computing
- Jinsoo Han, Youn-Kwae Jeong, Il-Woo Lee:
A Rule-Based Ontology Reasoning System for Context-Aware Building Energy Management. 2134-2142 - Chaoyun Zhang, Pan Zhou, Cheng Hua Li, Lijun Liu:
A Convolutional Neural Network for Leaves Recognition Using Data Augmentation. 2143-2150 - Yuan Wang, Yongkun Wang, Mingwei Sun, Shengzhi Du, Zengqiang Chen:
Neural Networks Based Formation Control of Anti-ship Missiles with Constant Velocity. 2151-2156 - Jens Naber, Dominik Schäfer, Sebastian VanSyckel, Christian Becker:
Interactive Display Services for Smart Environments. 2157-2164 - Bessam Abdulrazak, Rami Yared:
Prevent Cooking Risks in Kitchen of Elderly People: Adaptable Reasoning Engine Based on Fuzzy Logic for Smart Oven. 2165-2172 - Alasdair Thomason, Nathan Griffiths, Victor Sanchez:
Parameter Optimisation for Location Extraction and Prediction Applications. 2173-2180 - Atsushi Sato, Runhe Huang:
Unified Structure and Data Driven Process for Knowledge Enrichment and Problem Solving. 2181-2188
Session PICom-3: Wireless Networks
- Matthias Sander Frigau:
Cooperative Socio-aware Dynamic Backoff Optimization for Urban VANETs. 2189-2197 - Hui Lin, Jia Hu, Chuan Huang, Li Xu:
A Secure Cooperative Spectrum Sensing Strategy for Distributed Cognitive Radio Networks. 2198-2205 - Muhammad Asad Khan, Supeng Leng, Xiaoyan Huang, Jiechen Yin, Bo Fan:
Backhaul Aggregation for Smart Homes in Heterogeneous Wireless Networks. 2206-2211 - Muzaffar Rao, Thomas Newe, Ian Andrew Grout, Elfed Lewis, Avijit Mathur:
FPGA Based Reconfigurable IPSec AH Core Suitable for IoT Applications. 2212-2216
Session PICom-4: Intelligent Social Networking
- Bo Fan, Supeng Leng, Kun Yang, Geyong Min:
Coalition Based Bandwidth Allocation in Mobile Social Networks. 2217-2223 - Mariwan Ahmed, Lu Liu, Bo Yuan, Marcello Trovati, James Hardy:
Context-Aware Service Discovery and Selection in Decentralized Environments. 2224-2231 - Paul Craig, Xin Huang, Huayue Chen, Xi Wang, Shiyao Zhang:
Pervasive Information Visualization: Toward an Information Visualization Design Methodology for Multi-device Co-located Synchronous Collaboration. 2232-2239 - Paul Craig, Xin Huang:
The Mobile Tree Browser: A Space Filling Information Visualization for Browsing Labelled Hierarchies on Mobile Devices. 2240-2247 - Haichang Gao, Lei Lei, Xin Zhou, Jiawei Li, Xiyang Liu:
The Robustness of Face-Based CAPTCHAs. 2248-2255
Session PICom-5: High Performance Computing
- Kailong Zhang, Shaoli Zhou, Liang Hu, Hang Su, Xiao Wu, Kejian Miao:
Design and Verification of Heterogeneous Streaming Parallel Mechanisms on Kepler CUDA. 2256-2262 - Xiyang Liu, Lei Fan, Liming Wang, Sha Meng:
PSO Based Multiobjective Reliable Optimization Model for Cloud Storage. 2263-2269 - Xiyang Liu, Qiong Pan, Yingying An, Guimin Qin:
Community Detection Algorithm Based on the Scale Free Property of Networks. 2270-2275 - Ronghui Ju, Pan Zhou, Cheng Hua Li, Lijun Liu:
An Efficient Method for Document Categorization Based on Word2vec and Latent Semantic Analysis. 2276-2283 - Ji Yang, Yong Li, Nan Feng Zhang, Jing Feng Yang, Jian Tang, Yong Xian Su:
Water Quality Modeling for Pipeline Network Peripherals Based on Simulation of Water Age. 2284-2290
Session IoTBDH-1: Internet of Things and Big Data for Healthcare
- Yang Fu, Wenyan Wu:
Prediction and Guidance of Behaviour: A Web-Based Multipurpose Behaviour Intervention Investigation Methodology. 2291-2296 - Carl Chalmers, William Hurst, Michael Mackay, Paul Fergus:
Smart Health Monitoring Using the Advance Metering Infrastructure. 2297-2302 - Emmanuel Eyo Effiok, Enjie Liu, Hong Qing Yu, Jon Hitchcock:
A Prostate Cancer Care Process Example of Using Data from Internet of Things. 2303-2308 - Po Yang, Martin Hanneghan, Jun Qi, Zhikun Deng, Feng Dong, Dina Fan:
Improving the Validity of Lifelogging Physical Activity Measures in an Internet of Things Environment. 2309-2314 - Zhikun Deng, Po Yang, Youbing Zhao, Xia Zhao, Feng Dong:
Life-Logging Data Aggregation Solution for Interdisciplinary Healthcare Research and Collaboration. 2315-2320 - Elias Chinedum Eze, Sijing Zhang, Enjie Liu:
Improving Reliability of Message Broadcast over Internet of Vehicles (IoVs). 2321-2328 - Xiaohua Feng, Babatunde Onafeso, Enjie Liu:
Investigating Big Data Healthcare Security Issues with Raspberry Pi. 2329-2334 - Farzad Parvinzamir, Youbing Zhao, Zhikun Deng, Xia Zhao, Nikolaos Ersotelos, Feng Dong, Enjie Liu, Gordon Clapworthy:
MyHealthAvatar: A Case Study of Web-Based Interactive Visual Analytics of Lifestyle Data. 2335-2339 - Koh Song Sang, Bo Zhou:
BPMN Security Extensions for Healthcare Process. 2340-2345 - Joy Eze, Sijing Zhang, Enjie Liu, Elias Chinedum Eze, Hong Qing Yu:
Cognitive Radio Aided Internet of Vehicles (IoVs) for Improved Spectrum Resource Allocation. 2346-2352 - Jun Qi, Po Yang, Dina Fan, Zhikun Deng:
A Survey of Physical Activity Monitoring and Assessment Using Internet of Things Technology. 2353-2358
Session PCIS-1: Pervasive Computing and Intelligence Systems
- Xi Ouyang, Pan Zhou, Cheng Hua Li, Lijun Liu:
Sentiment Analysis Using Convolutional Neural Network. 2359-2364 - Beniamino Di Martino, Antonio Esposito:
Recognition of Dynamic Data Structures to Support Porting of Applications to the Cloud. 2365-2372 - Hady Khaddaj Mallat, Bessam Abdulrazak:
Assist-Me - A Volunteer Mobile Emergency System to Assist Elderly People. 2373-2380 - Kee-Hoon Kim, Sung-Bae Cho:
A Dining Context-Aware System with Mobile and Wearable Devices. 2381-2386 - Mourad Elhadef:
An Adaptable inVANETs-Based Intersection Traffic Control Algorithm. 2387-2392 - Yu Bao, Yuanping Wang, Liang Zhao, Yuan Hu, Aijuan Zhang:
Relay Node Deployment for Wireless Sensor Networks Based on PSO. 2393-2398
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.