default search action
ICT-EurAsia/CONFENIS 2015: Daejeon, Korea
- Ismail Khalil, Erich J. Neuhold, A Min Tjoa, Li Da Xu, Ilsun You:
Information and Communication Technology - Third IFIP TC 5/8 International Conference, ICT-EurAsia 2015, and 9th IFIP WG 8.9 Working Conference, CONFENIS 2015, Held as Part of WCC 2015, Daejeon, Korea, October 4-7, 2015, Proceedings. Lecture Notes in Computer Science 9357, Springer 2015, ISBN 978-3-319-24314-6
Networks and System Architecture
- Kamil Burda, Martin Nagy, Ivan Kotuliak:
Reducing Keepalive Traffic in Software-Defined Mobile Networks with Port Control Protocol. 3-12 - Andrej Binder, Tomas Boros, Ivan Kotuliak:
A SDN Based Method of TCP Connection Handover. 13-19 - Roman Bronis, Ivan Kotuliak, Tomas Kovacik, Peter Trúchly, Andrej Binder:
IP Data Delivery in HBB-Next Network Architecture. 20-29 - Tomás Halagan, Tomas Kovacik, Peter Trúchly, Andrej Binder:
Syn Flood Attack Detection and Type Distinguishing Mechanism Based on Counting Bloom Filter. 30-39 - Martin Nagy, Ivan Kotuliak, Jan Skalny, Martin Kalcok, Tibor Hirjak:
Integrating Mobile OpenFlow Based Network Architecture with Legacy Infrastructure. 40-49
Teaching and Education
- Michael Weigend:
Making Computer Science Education Relevant. 53-63 - Hiromichi Abe, Kazuya Kinoshita, Kensuke Baba, Shigeru Takano, Kazuaki J. Murakami:
Analyzing Brain Waves for Activity Recognition of Learners. 64-73
Authentication and Profiling
- Thi Ai Thao Nguyen, Dinh Thanh Nguyen, Tran Khanh Dang:
A Multi-factor Biometric Based Remote Authentication Using Fuzzy Commitment and Non-invertible Transformation. 77-88 - Priagung Khusumanegara, Rischan Mafrur, Deokjai Choi:
Profiler for Smartphone Users Interests Using Modified Hierarchical Agglomerative Clustering Algorithm Based on Browsing History. 89-96
Data Management and Information Advertising
- Masahiro Kuzunishi, Tetsuya Furukawa:
Strength of Relationship Between Multi-labeled Data and Labels. 99-108 - Andreas Mladenow, Niina Maarit Novak, Christine Strauss:
Online Ad-fraud in Search Engine Advertising Campaigns - Prevention, Detection and Damage Limitation. 109-118
Applied Modeling and Simulation
- Guido David:
Markov Chain Solution to the 3-Tower Problem. 121-128 - Yusuke Watanabe, Mayumi Takaya, Akihiro Yamamura:
Fitness Function in ABC Algorithm for Uncapacitated Facility Location Problem. 129-138 - Hikari Kato, Szilárd Zsolt Fazekas, Mayumi Takaya, Akihiro Yamamura:
Comparative Study of Monte-Carlo Tree Search and Alpha-Beta Pruning in Amazons. 139-148
Network Security
- Takashi Kurokawa, Ryo Nojima, Shiho Moriai:
Can We Securely Use CBC Mode in TLS1.0? 151-160 - N. Renugadevi, C. Mala:
Key Agreement with Modified Batch Rekeying for Distributed Group in Cognitive Radio Networks. 161-172 - Nan Guo, Fangting Peng, Tianhan Gao:
Secure Mobility Management for MIPv6 with Identity-Based Cryptography. 173-178 - Yana A. Bekeneva, Konstantin Borisenko, Andrey Shorov, Igor V. Kotenko:
Investigation of DDoS Attacks by Hybrid Simulation. 179-189
Dependable Systems and Applications
- Sergey Krendelev, Mikhail Yakovlev, Maria Usoltseva:
Secure Database Using Order-Preserving Encryption Scheme Based on Arithmetic Coding and Noise Function. 193-202 - Shuichiro Yamamoto:
An Approach for Evaluating Softgoals Using Weight. 203-212 - Peige Ren, Xiaofeng Wang, Hao Sun, Fen Xu, Baokang Zhao, Chunqing Wu:
An Efficient Unsavory Data Detection Method for Internet Big Data. 213-220 - Sooyeon Shin, Seungyeon Kim, Taekyoung Kwon:
Identification of Corrupted Cloud Storage in Batch Auditing for Multi-Cloud Environments. 221-225
Multimedia Security
- Mi-Young Cho, Young-Sook Jeong:
Face Recognition Performance Comparison Between Real Faces and Pose Variant Face Images from Image Display Device. 229-234 - Chi-Yao Weng, Sheng-Jie Wang, Shiuh-Jeng Wang:
A Lossless Data Hiding Strategy Based on Two-Dimensional Side-Match Predictions. 235-242 - Han Gang, Hongyang Yan, Lingling Xu:
Secure Image Deduplication in Cloud Storage. 243-251
Cryptography
- Chunlu Chen, Hiroaki Anada, Junpei Kawamoto, Kouichi Sakurai:
Hybrid Encryption Scheme Using Terminal Fingerprint and Its Application to Attribute-Based Encryption Without Key Misuse. 255-264 - Dirmanto Jap, Jakub Breier:
Differential Fault Attack on LEA. 265-274 - Hsing-Chung Chen, Chung-Wei Chen:
A Secure Multicast Key Agreement Scheme. 275-281 - Bo Liu, Baokang Zhao, Chunqing Wu, Wanrong Yu, Ilsun You:
Efficient Almost Strongly Universal Hash Function for Quantum Key Distribution - Extended Abstract. 282-285
Big Data and Text Mining
- Yanchen Liu, Fang Cao, Masood S. Mortazavi, Mengmeng Chen, Ning Yan, Chi Ku, Aniket Adnaik, Stephen Morgan, Guangyu Shi, Yuhu Wang, Fan Fang:
DCODE: A Distributed Column-Oriented Database Engine for Big Data Analytics. 289-299 - Zhaohao Sun, Francisca Pambel, Fangwei Wang:
Incorporating Big Data Analytics into Enterprise Information Systems. 300-309 - Martin Sarnovsky, Peter Butka, Peter Bednár, Frantisek Babic, Ján Paralic:
Analytical Platform Based on Jbowl Library Providing Text-Mining Services in Distributed Environment. 310-319
Social Impact of EIS and Visualization
- Antonín Pavlícek, Petr Doucek:
Corporate Social Responsibility in Social Media Environment. 323-332 - David Kiwana, Björn Johansson, Sven A. Carlsson:
Usage of Finance Information Systems in Developing Countries: Identifying Factors During Implementation that Impact Use. 333-342 - Lukás Gregorovic, Ivan Polásek, Branislav Sobota:
Software Model Creation with Multidimensional UML. 343-352
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.