default search action
30th AINA 2016: Crans-Montana, Switzerland
- Leonard Barolli, Makoto Takizawa, Tomoya Enokido, Antonio J. Jara, Yann Bocchi:
30th IEEE International Conference on Advanced Information Networking and Applications, AINA 2016, Crans-Montana, Switzerland, 23-25 March, 2016. IEEE Computer Society 2016, ISBN 978-1-5090-1857-4
Session 1: Network Protocols and Applications I
- Shigenari Nakamura, Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa:
Influential Abortion Probability in a Flexible Read-Write Abortion Protocol. 1-8 - Arief Maulana, Kazumi Saito, Tetsuo Ikeda, Hiroaki Yuze, Takayuki Watanabe, Seiya Okubo, Nobuaki Mutoh:
Characterizing Similarity Structure of Spatial Networks Based on Degree Mixing Patterns. 9-16 - Saki Tabata, Kohei Ueda, Ryotaro Fukui, Keiko Shimazu, Hiroshi Shigeno:
Disaster Information Gathering System Based on Web Caching and OpenFlow in Unstable Networks. 17-24 - Anup Kumar Paul, Atsuo Tachibana, Teruyuki Hasegawa:
NEXT-FIT: Available Bandwidth Measurement over 4G/LTE Networks - A Curve-Fitting Approach. 25-32 - Masaki Suzuki, Quentin Plessis, Takeshi Kitahara, Shigehiro Ano:
Monitoring Communication Quality Degradation in LTE Network Using Statistics of State Transition. 33-38 - Sana Ezzine, Fatma Abdelkefi, Jean-Pierre Cances, Vahid Meghdadi, Ammar Bouallègue:
Channel Capacity and SA-BER Performances Evaluation of an OFDM-Based Two-Way Relaying AF-PNC-PLC Systems. 39-46
Session 2: Distributed Database and Data Mining
- Zhijie Ban, Le Liu:
CICPV: A New Academic Expert Search Model. 47-52 - Asma Musabah Alkalbani, Ahmed Mohamed Ghamry, Farookh Khadeer Hussain, Omar Khadeer Hussain:
Sentiment Analysis and Classification for Software as a Service Reviews. 53-58 - Ahmad Slim, Gregory L. Heileman, Wisam Al-Doroubi, Chaouki T. Abdallah:
The Impact of Course Enrollment Sequences on Student Success. 59-65 - Jérôme Treboux, Fabian Cretton, Florian Evéquoz, Anne Le Calvé, Dominique Genoud:
Mining and Visualizing Social Data to Inform Marketing Decisions. 66-73 - Chia-Yin Ko, Fang-Yie Leu:
Applying Data Mining to Explore Students' Self-Regulation in Learning Contexts. 74-78 - María Teresa González-Aparicio, Muhammad Younas, Javier Tuya, Rubén Casado:
A New Model for Testing CRUD Operations in a NoSQL Database. 79-86
Session 3: Content-Centric Networking
- Sergio Charpinel, Celso Alberto Saibel Santos, Alex Borges Vieira, Rodolfo da Silva Villaça, Magnos Martinello:
SDCCN: A Novel Software Defined Content-Centric Networking Approach. 87-94 - Admir Barolli, Tetsuya Oda, Leonard Barolli, Makoto Takizawa:
Experimental Results of a Raspberry Pi and OLSR Based Wireless Content Centric Network Testbed Considering OpenWRT OS. 95-100 - Elias Vathias, Dimitrios S. Nikolopoulos, Stathes Hadjiefthymiades:
A Capital Market Metaphor for Content Delivery Network Resources. 101-108 - Olfa Ben Rhaiem, Lamia Chaari Fourati, Wessam Ajib:
New Hierarchical Parent-Child Caching Strategy (H-CS) for CCN-Based Video Streaming. 109-115 - Nesrine Khabou, Ismael Bouassida Rodriguez, Mohamed Jmaiel:
Designing an Analysis Procedure for Context Aware Applications in Ubiquitous Environments. 116-123 - Kenji Yokota, Kohei Sugiyama, Jun Kurihara, Atsushi Tagami:
RTT-Based Caching Policies to Improve User-Centric Performance in CCN. 124-131
Session 4: Network Protocols and Applications II
- Ying Huang, Hongli Ge, Jangsu Lee, Yuehua Dai, Dong Xu, Jin Zhang, Qiang Gao, Shaoying Zhao:
Cluster-Head and Border-Node Based Cluster Routing Protocol for LR-WPAN. 132-139 - Murat Karakus, Arjan Durresi:
Economic Viability of QoS in Software Defined Networks (SDNs). 140-146 - Vinh Hoa La, Raul A. Fuentes-Samaniego, Ana R. Cavalli:
Network Monitoring Using MMT: An Application Based on the User-Agent Field in HTTP Headers. 147-154 - Afef Bohli, Ridha Bouallegue:
A New Sensing Strategy for 5G Mobile Networks: Towards Spectral and Energy Efficiency Trade off. 155-159 - Zhenqiang Huang, Enqing Dong, Yuan Yuan, Wei Liu:
Realization of Time Synchronization Protocol Based on Frequency Skew Bid and Dynamic Topology Using Embedded Linux System. 160-165 - Kawther Hassine, Mounir Frikha, Tijani Chahed:
Greedy Versus Limited Access Point Backhaul Resource Aggregation in Wireless Local Area Networks. 166-173
Session 5: Ad Hoc and Mesh Networks
- Ilir Shinko, Tetsuya Oda, Evjola Spaho, Admir Barolli, Vladi Kolici, Leonard Barolli:
A GA-Based Simulation System for WMNs: Performance Analysis of WMN-GA System for Different WMN Architectures and Uniform Distribution Considering DCF and EDCA. 174-180 - Michael Rethfeldt, Peter Danielis, Benjamin Beichler, Björn Konieczek, Felix Uster, Dirk Timmermann:
Evaluating Cross-Layer Cooperation of Congestion and Flow Control in IEEE 802.11s Networks. 181-188 - Pir Masoom Shah, Ikram Ullah, Tanveer Khan, Muhammad, Sheraz Hussain, Zahoor Ali Khan, Umar Qasim, Nadeem Javaid:
MobiSink: Cooperative Routing Protocol for Underwater Sensor Networks with Sink Mobility. 189-197 - Elis Kulla, Evjola Spaho, Makoto Ikeda, Leonard Barolli:
Energy Concerns inWireless Sensor and Actor Networks: A Simulation Case. 198-205 - Shinji Sakamoto, Tetsuya Oda, Makoto Ikeda, Leonard Barolli, Fatos Xhafa:
Implementation of a New Replacement Method in WMN-PSO Simulation System and Its Performance Evaluation. 206-211 - Abrar Omar Alkhamisi, Seyed M. Buhari:
Trusted Secure Adhoc On-demand Multipath Distance Vector Routing in MANET. 212-219
Session 6: Multimedia Systems and Applications
- Rabee Mustapha Abuteir, Anne Fladenmuller, Olivier Fourmaux:
SDN Based Architecture to Improve Video Streaming in Home Networks. 220-226 - Kazuaki Yoshihara, Kenzi Watanabe, Nobukazu Iguchi:
New Educational Equipments for Networking Study by Physical Visualizations and Physical Direct Manipurations. 227-230 - Yu Yan, Hara Kohei, Nakano Hiroto, Takenobu Kazuma, Aiguo He:
A Method to Describe Student Learning Status for Personalized Computer Programming e-Learning Environment. 231-238 - Raoudha Souabni, Inés Bayoudh Saâdi, Nesrine Ben Salah, Kinshuk, Henda Hajjami Ben Ghézala:
On the Evaluation of Quality of Situation (QoSi) in Situation-Aware Ubiquitous Learning Environment. 239-246 - Houda Chihi, Reza Mahin Zaeem, Ridha Bouallegue:
Energy Minimization by Selecting Appropriate Modulation and Coding Scheme for MB-OFDM UWB Systems. 247-252 - Sayaka Akiyama, Yuka Kato:
An Estimation Model on Stress and Relaxed States for QOL Visualization and Its Evaluation. 253-259
Session 7: Network Protocols and Applications III
- Kuljaree Tantayakul, Riadh Dhaou, Béatrice Paillassa:
Impact of SDN on Mobility Management. 260-265 - Kshitiz Verma, Shmuel Zaks, Alberto García-Martínez:
SLEEPWELL: Energy Efficient Network Design for the Developing World Using Green Switches. 266-273 - Muriel Figueredo Franco, Ricardo Luis dos Santos, Alberto E. Schaeffer Filho, Lisandro Zambenedetti Granville:
VISION - Interactive and Selective Visualization for Management of NFV-Enabled Networks. 274-281 - Murat Karakus, Arjan Durresi:
A Scalability Metric for Control Planes in Software Defined Networks (SDNs). 282-289 - Yean-Fu Wen, Shih-Yao Chen, Chiu-Han Hsiao, Frank Yeong-Sung Lin:
Explore and Analyze the Performance Factors on Wi-Fi Sensing Starvation Problems. 290-296 - Sanjay Kumar Dhurandher, Satya Jyoti Borah, Isaac Woungang, Deepak Kumar Sharma, Kunal Arora, Divyansh Agarwal:
EDR: An Encounter and Distance Based Routing Protocol for Opportunistic Networks. 297-302
Session 8: Wireless Sensor Networks I
- Luiz Fernando Ferreira Gomes de Assis, Lucas P. Behnck, Dionísio Doering, Edison Pignaton de Freitas, Carlos Eduardo Pereira, Flávio Eduardo Aoki Horita, Jó Ueyama, João Porto de Albuquerque:
Dynamic Sensor Management: Extending Sensor Web for Near Real-Time Mobile Sensor Integration in Dynamic Scenarios. 303-310 - Anwar Khan, Hassan Mahmood, Zahoor Ali Khan, Umar Qasim, Nadeem Javaid:
A Transmit Power Efficient Non-Cooperative Game Design for Wireless Sensor Networks Based on the Utility and Cost Function. 311-315 - Seyed Mohammad Ghoreyshi, Alireza Shahrabi, Tuleen Boutaleb:
An Opportunistic Void Avoidance Routing Protocol for Underwater Sensor Networks. 316-323 - Abdul Majid, Irfan Azam, Abdul Waheed, Muhammad Zain-ul-Abidin, Taimur Hafeez, Zahoor Ali Khan, Umar Qasim, Nadeem Javaid:
An Energy Efficient and Balanced Energy Consumption Cluster Based Routing Protocol for Underwater Wireless Sensor Networks. 324-333 - Dogan Yildiz, Serap Karagol, Okan Ozgonenel, Satish Tadiparthi, Marwan Bikdash:
Three-Dimensional Sensor Localization Using Modified 3N Algorithm. 334-338 - Zaib Ullah, Leonardo Mostarda, Roberto Gagliardi, Diletta Cacciagrano, Flavio Corradini:
A Comparison of HEED Based Clustering Algorithms - Introducing ER-HEED. 339-345
Session 9: Pervasive and Ubiquitous Computing I
- Junichi Honda, Takuya Otsuyama:
Positional Estimation of Obstacles and Aircraft by Using ISDB-T Signal Delay. 346-351 - Irfan Azam, Abdul Majid, Ijaz Ahmad, Usman Shakeel, Hammad Maqsood, Zahoor Ali Khan, Umar Qasim, Nadeem Javaid:
SEEC: Sparsity-Aware Energy Efficient Clustering Protocol for Underwater Wireless Sensor Networks. 352-361 - Thongtat Oransirikul, Ryo Nishide, Ian Piumarta, Hideyuki Takada:
Feasibility of Analyzing Wi-Fi Activity to Estimate Transit Passenger Population. 362-369 - Goshi Sato, Noriki Uchida, Norio Shiratori, Yoshitaka Shibata:
Research on Never Die Network for Disaster Prevention Based on OpenFlow and Cognitive Wireless Technology. 370-375 - Matthias Herlich, Shigeki Yamada:
Comparing Strategies to Construct Local Disaster Recovery Networks. 376-383 - Nyan Lin, Rithea Ngeth, Krittanai Sriviriyakul, Yuto Lim, Yasuo Tan:
necoMAC: Network Coding Aware MAC Protocol for Multirate Wireless Networks. 384-391
Session 10: Distributed and Parallel Systems I
- Tomoya Enokido, Makoto Takizawa:
An Energy-Efficient Load Balancing Algorithm for Virtual Machine Environments to Perform Communication Type Application Processes. 392-399 - Atsuhiro Sawada, Hiroki Kataoka, Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa:
Energy-Aware Clusters of Servers for Storage and Computation Applications. 400-407 - Tarek Rabia, Othmen Braham, Guy Pujolle:
Accelerating Packet Processing in a Xen Environment with OpenDataPlane. 408-413 - Xue Ouyang, Peter Garraghan, David McKee, Paul Townend, Jie Xu:
Straggler Detection in Parallel Computing Systems through Dynamic Threshold Calculation. 414-421 - Trong Nhan Phan, Josef Küng, Tran Khanh Dang:
eHSim: An Efficient Hybrid Similarity Search with MapReduce. 422-429 - Larisa Safina, Manuel Mazzara, Fabrizio Montesi, Victor Rivera:
Data-Driven Workflows for Microservices: Genericity in Jolie. 430-437
Session 11: Wireless Sensor Networks II
- Sangdae Kim, Cheonyong Kim, Hyunchong Cho, Yongbin Yim, Sang-Ha Kim:
Void Avoidance Scheme for Real-Time Data Dissemination in Irregular Wireless Sensor Networks. 438-443 - Frank Yeong-Sung Lin, Chiu-Han Hsiao, Yean-Fu Wen:
A Precision Operation Optimization for Detection-Based Sensor Networks. 444-451 - Cheonyong Kim, Hyunchong Cho, Sangdae Kim, Taehun Yang, Sang-Ha Kim:
Sink Mobility Support Scheme for Continuous Object Tracking in Wireless Sensor Networks. 452-457 - Tales Heimfarth, João Carlos Giacomin, João Paulo de Araujo, Edison Pignaton de Freitas:
A Preamble Ahead Anycast Protocol for WSNs. 458-466 - Sami J. Habib, Paulvanna Nayaki Marimuthu:
Development of Analytical Model for Data Trustworthiness in Sensor Networks. 467-472 - Tayyaba Liaqat, Nadeem Javaid, Ashfaq Ahmad, Zahoor Ali Khan, Umar Qasim, Muhammad Imran:
Energy Efficient and Reliable Data Gathering in Underwater WSNs. 473-478
Session 12: Pervasive and Ubiquitous Computing II
- Amin Bakshandeh Abkenar, Seng Wai Loke, J. Wenny Rahayu, Arkady B. Zaslavsky:
Energy Considerations for Continuous Group Activity Recognition Using Mobile Devices: The Case of GroupSense. 479-486 - Wiem Fekih Hassen, Faïza Najjar:
A Positioning Handoff Decision Algorithm for Ubiquitous Pedestrian Navigation Systems. 487-494 - Markus Aleksy, Jonas Brönmark, Shakeel Mahate:
Microinteractions in Mobile and Wearable Computing. 495-500 - Dominique Genoud, Vincent Cuendet, Julien Torrent:
Soft Fall Detection Using Machine Learning in Wearable Devices. 501-505 - Tanveer Khan, Israr Ahmad, Waqas Aman, Irfan Azam, Zahoor Ali Khan, Umar Qasim, Sanam Avais, Nadeem Javaid:
Clustering Depth Based Routing for Underwater Wireless Sensor Networks. 506-515 - Yufeng Wang, Feilong Tang, Yanqin Yang, Jie Li, Wenchao Xu, Jinsong Wu:
A QoS-Guaranteed Adaptive Cooperation Scheme in Cognitive Radio Network. 516-523
Session 13: Distributed and Parallel Systems II
- Luiz A. Rodrigues, Luciana Arantes, Elias P. Duarte Jr.:
An Autonomic Majority Quorum System. 524-531 - Alex F. R. Trajano, Marcial Porto Fernandez:
ContentSDN: A Content-Based Transparent Proxy Architecture in Software-Defined Networking. 532-539 - Paulo R. Pinho Filho, Luciana de Oliveira Rech, Lau Cheuk Lung, Miguel Correia, Lásaro Jonas Camargos:
Priority-Based State Machine Replication with PRaxos. 540-547 - André Naz, Benoît Piranda, Seth Copen Goldstein, Julien Bourgeois:
Approximate-Centroid Election in Large-Scale Distributed Embedded Systems. 548-556 - Dilawaer Duolikun, Ryo Watanabe, Hiroki Kataoka, Shigenari Nakamura, Tomoya Enokido, Makoto Takizawa:
An Energy-Aware Migration of Virtual Machines. 557-564 - Hiroki Kataoka, Atsuhiro Sawada, Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa:
Energy-Aware Server Selection Algorithms in a Scalable Cluster. 565-572
Session 14: Vehicular Networks and Applications I
- Makoto Ikeda, Seiichiro Ishikawa, Leonard Barolli:
An Enhanced Message Suppression Controller for Vehicular-Delay Tolerant Networks. 573-579 - Everton R. Lira, Enrique Fynn, Paulo R. S. L. Coelho, Luis F. Faina, Lásaro J. Camargos, Rodolfo da Silva Villaça, Rafael Pasquini:
An Architecture for Traffic Sign Management in Smart Cities. 580-587 - Sassi Maaloul, Mériem Afif, Sami Tabbane:
Handover Decision in Heterogeneous Networks. 588-595 - Kazuyuki Morioka, Junichi Naganawa, Junichi Honda, Naoki Kanada, Shunichi Futatsumori, Akiko Kohmura, Takeshi Tomita, Naruto Yonemoto, Yasuto Sumiya:
Experimental Evaluation on Quality of VoIP over Aero MACS. 596-602 - Elyes Ben Hamida, Muhammad Awais Javed:
Channel-Aware ECDSA Signature Verification of Basic Safety Messages with K-Means Clustering in VANETs. 603-610 - Wencheng Chen, Xiangming Wen, Wei Li:
Spectrum Sensing in Cognitive Radio Networks and Capacity Analysis for Vehicular Network. 611-617
Session 15: Data Centers and Cloud Computing I
- Oladotun Omosebi, Stelios Sotiriadis, Nik Bessis:
An Openstack Based Accounting and Billing Service for Future Internet Applications. 618-623 - Yongning Tang, Guang Cheng, Zhiwei Xu, Feng Chen:
Service Oriented Verification Integrated Fault Reasoning for SDNs. 624-629 - Kazuya Odagiri, Shogo Shimizu, Naohiro Ishii, Makoto Takizawa:
Examination of the Implementation Method of the Cloud Type Virtual Policy Based Network Management Scheme for the Common Use between Plural Organizations. 630-636 - Roxana Istrate, Andrei Poenaru, Florin Pop:
Advance Reservation System for Datacenters. 637-644 - Khaled Almi'ani, Young Choon Lee:
Partitioning-Based Workflow Scheduling in Clouds. 645-652
Session 16: Security and Privacy I
- Yuichi Sei, Akihiko Ohsuga:
Privacy Preservation for Participatory Sensing Applications. 653-660 - Masayuki Fukumitsu, Shingo Hasegawa, Jun-ya Iwazaki, Masao Sakai, Daiki Takahashi:
A Proposal of a Password Manager Satisfying Security and Usability by Using the Secret Sharing and a Personal Server. 661-668 - Tomoya Iwasaki, Naoto Yanai, Masaki Inamura, Keiichi Iwamura:
Tightly-Secure Identity-Based Structured Aggregate Signature Scheme under the Computational Diffie-Hellman Assumption. 669-676 - Sushmita Ruj, Arindam Pal:
Preferential Attachment Model with Degree Bound and Its Application to Key Predistribution in WSN. 677-683 - Takamichi Saito, Kazushi Takahashi, Koki Yasuda, Takayuki Ishikawa, Ko Takasu, Tomotaka Yamada, Naoki Takei, Rio Hosoi:
OS and Application Identification by Installed Fonts. 684-689 - Maroti Deshmukh, Neeta Nain, Mushtaq Ahmed:
An (n, n)-Multi Secret Image Sharing Scheme Using Boolean XOR and Modular Arithmetic. 690-697
Session 17: Vehicular Networks and Applications II
- Evjola Spaho, Leonard Barolli, Vladi Kolici, Algenti Lala:
Performance Comparison of Different Routing Protocols in Sparse and Dense VDTNs. 698-703 - Seiji Matsuyama, Takatomo Yamabe, Yuki Nakayama, Yu Okuwaki, Ryozo Kiyohara:
A Method for Recognizing Driver's Location Context with a Vehicle Information Device. 704-710 - Kenta Ito, Go Hirakawa, Yoshitaka Shibata:
Experimentation of V2X Communication in Real Environment for Road Alert Information Sharing System. 711-716 - Gianluca Rizzo, Maria Rita Palattella, Torsten Braun, Thomas Engel:
Content and Context Aware Strategies for QoS Support in VANETs. 717-723 - Bin Tian, Kun Mean Hou, Jianjin Li:
TrAD: Traffic Adaptive Data Dissemination Protocol for Both Urban and Highway VANETs. 724-731
Session 18: Data Centers and Cloud Computing II
- Fabrizio Bertone, Giuseppe Caragnano, Lorenzo Mossucca, Olivier Terzo, Alfredo Benso, Gianfranco Politano, Alessandro Savino:
Implementing a Cloud-Based Service Supporting Biological Network Simulations. 732-736 - Khadija Bousselmi, Zaki Brahmi, Mohamed Mohsen Gammoudi:
QoS-Aware Scheduling of Workflows in Cloud Computing Environments. 737-745 - Souha Boubaker, Amel Mammar, Mohamed Graiet, Walid Gaaloul:
Formal Verification of Cloud Resource Allocation in Business Processes Using Event-B. 746-753 - Qublai Khan Ali Mirza, Ghulam Mohi Ud Din, Irfan Awan:
A Cloud-Based Energy Efficient System for Enhancing the Detection and Prevention of Modern Malware. 754-761 - May Itani, Sanaa Sharafeddine, Islam Elkabbani:
Practical Single Node Failure Recovery Using Fractional Repetition Codes in Data Centers. 762-768
Session 19: Security and Privacy II
- Yoshifumi Ueshige, Kouichi Sakurai:
Analysis of "Receipt-Freeness" and "Coercion-Resistance" in Biometric Authentication Protocols. 769-775 - Tsuyoshi Komatsubara, Yoshifumi Manabe:
Game-Theoretic Security of Commitment Protocols under a Realistic Cost Model. 776-783 - Jianhua Yang:
Resistance to Chaff Attack through TCP/IP Packet Cross-Matching and RTT-Based Random Walk. 784-789 - Masood Mansoori, Ian Welch, Kim-Kwang Raymond Choo, Roy A. Maxion:
Application of HAZOP to the Design of Cyber Security Experiments. 790-799 - Alexander Oberle, Pedro Larbig, Ronald Marx, Frank G. Weber, Dirk Scheuermann, Daniel Fages, Fabien Thomas:
Preventing Pass-the-Hash and Similar Impersonation Attacks in Enterprise Infrastructures. 800-807 - Zouheir Trabelsi, Safaa Zeidan, Mohammad M. Masud:
Network Packet Filtering and Deep Packet Inspection Hybrid Mechanism for IDS Early Packet Matching. 808-815
Session 20: Internet Computing and Web Applications
- Masaki Kohana, Shusuke Okamoto:
A Location-Based Attendance Confirming System. 816-820 - Fatos Xhafa, Carlos García, Admir Barolli, Makoto Takizawa:
A Web Interface for Satellite Scheduling Problems. 821-828 - Huihwan Park, Kyung-Min Park, Hoon Choi:
Connection Management Using the Locality of Application Traffic. 829-833 - Tiago Alves, Jorge Coelho:
A Framework for Massively Multiplayer Online Game Content Generation. 834-841 - Hemant Kumar Rath, Bighnaraj Panigrahi, Anantha Simha:
On Cooperative On-Path and Off-Path Caching Policy for Information Centric Networks (ICN). 842-849 - Shikhar Vashishth, Yash Sinha, K. Hari Babu:
Addressing Challenges in Browser Based P2P Content Sharing Framework Using WebRTC. 850-857
Session 21: Smart Home and Smart Cities
- Zafar Iqbal, Nadeem Javaid, Mobushir Riaz Khan, Farman Ali Khan, Zahoor Ali Khan, Umar Qasim:
A Smart Home Energy Management Strategy Based on Demand Side Management. 858-862 - Ciprian Barbieru, Florin Pop:
Soft Real-Time Hadoop Scheduler for Big Data Processing in Smart Cities. 863-870 - Pedro H. S. Duarte, Luis F. Faina, Lásaro J. Camargos, Luciano Bernardes de Paula, Rafael Pasquini:
An Architecture for Monitoring and Improving Public Transportation Systems. 871-878 - José Adán Hernández-Nolasco, Miguel A. Wister Ovando, Francisco D. Acosta, Pablo Pancardo:
Water Level Meter for Alerting Population about Floods. 879-884 - Matteo Cristani, Claudio Tomazzoli, Erisa Karafili, Francesco Olivieri:
Defeasible Reasoning about Electric Consumptions. 885-892 - Kanae Matsui:
HVAC System for Maintaining Pleasant Sleep During Warm Nights in Japan. 893-900
Session 22: Security and Privacy III
- Shweta Bhandari, Vijay Laxmi, Akka Zemmari, Manoj Singh Gaur:
Intersection Automata Based Model for Android Application Collusion. 901-908 - Julian Schütte, Gerd Stefan Brost:
A Data Usage Control System Using Dynamic Taint Tracking. 909-916 - Hoang Giang Do, Wee Keong Ng:
Privacy-Preserving Triangle Counting in Distributed Graphs. 917-924 - Sourya Joyee De, Sushmita Ruj:
Failure Tolerant Rational Secret Sharing. 925-932 - Somayeh Taheri, Radu Stoleru, Dieter Hogrefe:
Secure Neighbor Discovery in Mobile Ad Hoc Networks through Local Topology Visualization. 933-940 - Masood Mansoori, Yuichi Hirose, Ian Welch, Kim-Kwang Raymond Choo:
Empirical Analysis of Impact of HTTP Referer on Malicious Website Behaviour and Delivery. 941-948
Session 23: Intelligent Computing
- Aymen Ben Zineb, Mohamed Ayadi, Sami Tabbane:
QoE-Fuzzy VHO Approach for Heterogeneous Wireless Networks (HWNs). 949-956 - Donald Elmazi, Shinji Sakamoto, Tetsuya Oda, Elis Kulla, Evjola Spaho, Leonard Barolli:
Effect of Security Parameter for Selection of Actor Nodes in WSAN: A Comparison Study of Two Fuzzy-Based Systems. 957-964 - Zia Ullah, Muhammad Saleem Khan, Idrees Ahmed, Nadeem Javaid, Majid Iqbal Khan:
Fuzzy-Based Trust Model for Detection of Selfish Nodes in MANETs. 965-972 - Santosh Kumar, Xiaoying Gao, Ian Welch, Masood Mansoori:
A Machine Learning Based Web Spam Filtering Approach. 973-980 - Tetsuya Oda, Leonard Barolli:
Experimental Results of a Raspberry Pi Based WMN Testbed Considering CPU Frequency. 981-986 - Fabien Dubosson, Stefano Bromuri, Michael Ignaz Schumacher:
A Python Framework for Exhaustive Machine Learning Algorithms and Features Evaluations. 987-993
Session 24: Internet of Things
- Arijit Ukil, Soma Bandyopadhyay, Chetanya Puri, Arpan Pal:
IoT Healthcare Analytics: The Importance of Anomaly Detection. 994-997 - Hicham Lakhlef, Michel Raynal, Julien Bourgeois:
Efficient Broadcast Protocol for the Internet of Things. 998-1005 - Bishnu Prasad Gautam, Katsumi Wasaki, Amit Batajoo, Suresh Shrestha, Kazuhiko Sato:
Multi-master Replication of Enhanced Learning Assistant System in IoT Cluster. 1006-1012 - Yefeng Ruan, Arjan Durresi, Lina Alfantoukh:
Trust Management Framework for Internet of Things. 1013-1019 - Nuria Pazos, Michael Müller, Matthieu Favre-Bulle, Kilian Brandt-Dit-Grieurin, Oliver Hüsser, Marco Aeberli, Nabil Ouerhani:
Dynamic Street-Parking Optimisation. 1020-1026 - Rafael de Jesus Martins, Vinicius Garcez Schaurich, Luis Augusto Dias Knob, Juliano Araujo Wickboldt, Alberto E. Schaeffer Filho, Lisandro Zambenedetti Granville, Marcelo Pias:
Performance Analysis of 6LoWPAN and CoAP for Secure Communications in Smart Homes. 1027-1034
Session 25: Security and Privacy IV
- Hiroaki Kikuchi, Takayasu Yamaguchi, Koki Hamada, Yuji Yamaoka, Hidenobu Oguri, Jun Sakuma:
Ice and Fire: Quantifying the Risk of Re-identification and Utility in Data Anonymization. 1035-1042 - Shou-Hsuan Stephen Huang, Hongyang Zhang, Michael Phay:
Detecting Stepping-Stone Intruders by Identifying Crossover Packets in SSH Connections. 1043-1050 - Jahnabi Phukan, Kin Fun Li, Fayez Gebali:
Hardware Covert Attacks and Countermeasures. 1051-1054 - Marek R. Ogiela, Lidia Ogiela:
On Using Cognitive Models in Cryptography. 1055-1058 - Lidia Ogiela, Marek R. Ogiela:
Bio-Inspired Cryptographic Techniques in Information Management Applications. 1059-1063 - Amir Azodi, Feng Cheng, Christoph Meinel:
Towards Better Attack Path Visualizations Based on Deep Normalization of Host/Network IDS Alerts. 1064-1071
Session 26: Social Networking and Collaborative Systems
- Julien Tscherrig, Elena Mugellini, Omar Abou Khaled, Philippe Cudré-Mauroux:
LinkedPolitics: Incremental Semantic Lifting of Political Facts. 1072-1079 - Hussein Hazimeh, Iman Youness, Jawad Makki, Hassan Noureddine, Julien Tscherrig, Elena Mugellini, Omar Abou Khaled:
Leveraging Co-authorship and Biographical Information for Author Ambiguity Resolution in DBLP. 1080-1084 - Amina Jarraya, Khedija Arour, Amel Borgi, Amel Bouzeghoub:
Distributed Cooperative Reasoning in Ambient Environment. 1085-1092 - Alessio Bechini, Davide Gazzè, Andrea Marchetti, Maurizio Tesconi:
Towards a General Architecture for Social Media Data Capture from a Multi-Domain Perspective. 1093-1100 - Awais Ahmad, M. Mazhar Rathore, Anand Paul, Seungmin Rho:
Defining Human Behaviors Using Big Data Analytics in Social Internet of Things. 1101-1107
Session 27: Semantic Computing
- Cheng Xie, Melisachew Wudage Chekol, Blerina Spahiu, Hongming Cai:
Leveraging Structural Information in Ontology Matching. 1108-1115 - Dhomas Hatta Fudholi, J. Wenny Rahayu, Eric Pardede:
Ontology-Based Information Extraction for Knowledge Enrichment and Validation. 1116-1123 - Geovanny Poveda, René Schumann:
An Ontology Driven Model Approach for the Creation and Evaluation of Models in the Electricity Retail Market: A Research in Progress. 1124-1129 - Sujata Swain, Rajdeep Niyogi:
An Ontology Based Approach for Satisfying User Requests in Context Aware Settings. 1130-1137 - Gustavo de Assis Costa, José Maria Parente de Oliveira:
A Blocking Scheme for Entity Resolution in the Semantic Web. 1138-1145
Session 28: Grid, P2P and Scalable Computing
- Shashwati Banerjea, Mayank Pandey, Manoj Madhava Gore:
Towards Peer-to-Peer Solution for Utilization of Volunteer Resources to Provide Computation-as-a-Service. 1146-1153 - Sahar Rahim, Zafar Iqbal, Nusrat Shaheen, Zahoor Ali Khan, Umar Qasim, Shahid Ahmed Khan, Nadeem Javaid:
Ant Colony Optimization Based Energy Management Controller for Smart Grid. 1154-1159 - Hiroki Nakayama, Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa:
Reduction of Unnecessarily Ordered Event Messages in Peer-to-Peer Model of Topic-Based Publish/Subscribe Systems. 1160-1167 - Yi Liu, Shinji Sakamoto, Evjola Spaho, Keita Matsuo, Leonard Barolli, Fatos Xhafa:
A Fuzzy-Based Reliability System for JXTA-Overlay P2P Platform Considering as New Parameter Sustained Communication Time. 1168-1175 - Agustinus Borgy Waluyo, David Taniar, Bala Srinivasan, J. Wenny Rahayu:
Trustworthy P2P Data Delivery for Moving Objects in Wireless Ad-Hoc Networks. 1176-1183 - Ziaur Rahman, Zaheer Ahmad, Amir Murad, Tanveer Khan, Zahoor Ali Khan, Umar Qasim, Nadeem Javaid:
On Utilizing Static Courier Nodes to Achieve Energy Efficiency with Depth Based Routing for Underwater Wireless Sensor Networks. 1184-1191
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.