default search action
10. IMIS 2016: Fukuoka, Japan
- 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2016, Fukuoka, Japan, July 6-8, 2016. IEEE Computer Society 2016, ISBN 978-1-5090-0984-8
IMIS 2016
Session 1: Context and Location-Aware Computing
- Eunji Lee, Chang Choi, Minchang Lee, Kunseok Oh, Pankoo Kim:
An Approach for Predicting Disease Outbreaks Using Fuzzy Inference among Physiological Variables. 1-4 - Jen-Chang Liu, Chieh-Yu Chiang, Sam Chen:
Image-Based Plant Recognition by Fusion of Multimodal Information. 5-11 - Yi-Hau Liu, Shian-Hua Lin, Chun-Ku Lai, Chun-Che Huang, Cheng-Yu Lu:
Mining Crowdsourcing Photos for Recognizing Landmark Areas. 12-19 - Chen-Ying Hsieh, Jeng-Wei Lin:
Component Extraction from Handwritten Chinese Characters for Font Synthesis in Personal Style Using Smartphone APP. 20-25 - Yi-Lin Hsu, Yan-Ju Chen, Sheng-Wen Shih:
A Particle Filter Approach for Pedestrian Dead Reckoning Using Wearable Sensors. 26-32 - Sheraz Hussain, Nadeem Javaid, Muhammad, Israr Ahmad, Umar Qasim, Zahoor Ali Khan:
Performance Analysis of Amplify and Forward Technique in Region Based Cooperative Routing for Underwater Wireless Sensor Networks. 33-41
Session 2: Wireless Sensor Networks
- Donald Elmazi, Shinji Sakamoto, Elis Kulla, Tetsuya Oda, Makoto Ikeda, Leonard Barolli:
A QoS-aware Actor Node Selection System for Wireless Sensor and Actor Networks Using Fuzzy Logic. 42-48 - Taimur Hafeez, Nadeem Javaid, Ahmad Raza Hameed, Arshad Sher, Zahoor Ali Khan, Umar Qasim:
AVN-AHH-VBF: Avoiding Void Node with Adaptive Hop-by-Hop Vector Based Forwarding for Underwater Wireless Sensor Networks. 49-56 - Syed Zarar, Nadeem Javaid, Arshad Sher, Ahmad Raza Hameed, Zahoor Ali Khan, Umar Qasim:
Geographic and Opportunistic Clustering for Underwater WSNs. 57-62 - Deok-Ki Kim, Jae-Hyeon Park, Jung-Won Lee:
Multi-sensor Based Low Power Sensing Model for Inferencing Location Context. 63-69 - Malik Khizar, Abdul Wahid, Khayyam Pervaiz, Mahin Sajid, Umar Qasim, Zahoor Ali Khan, Nadeem Javaid:
Enhanced Energy Efficient Depth Based Routing Protocol for Underwater WSNs. 70-77 - Usman Shakeel, Naeem Jan, Khizar, Umar Qasim, Zahoor Ali Khan, Nadeem Javaid:
DRADS: Depth and Reliability Aware Delay Sensitive Routing Protocol for Underwater WSNs. 78-83
Session 3: Security and Privacy
- Baojiang Cui, Shanshan He:
Anomaly Detection Model Based on Hadoop Platform and Weka Interface. 84-89 - Tianhan Gao, Fan Lang, Nan Guo:
An Emergency Communication System Based on UAV-assisted Self-Organizing Network. 90-95 - Jingling Zhao, Junxin Qi, Liang Zhou, Baojiang Cui:
Dynamic Taint Tracking of Web Application Based on Static Code Analysis. 96-101 - Hee-Kyung Kong, Tae-Sung Kim, Myoung-Ki Hong:
A Security Risk Assessment Framework for Smart Car. 102-108 - Seung-Jae Choi, Tae-Sung Kim:
Understanding Factors Affecting Information Security Practice of Elementary School Students. 109-113 - Francois Serman, Michaël Hauspie:
Achieving Virtualization Trustworthiness Using Software Mechanisms. 114-119
Session 4: Multimedia Systems and Applications
- Misaki Iyobe, Tomoyuki Ishida, Akihiro Miyakawa, Kaoru Sugita, Noriki Uchida, Yoshitaka Shibata:
Proposal of a Virtual Traditional Japanese Crafting Presentation System Mobile Edition. 120-125 - Ye-Seul Park, Meeyeon Lee, Jung-Won Lee:
Template-Driven Medical Imaging Information Providing Process Using Semantic Relations Targeting Acute Myocardial Infarction. 126-132 - Kaoru Sugita, Masao Yokota:
Implementation of Voice Guidance Function for Sightseeing Contents Using Web Speech API. 133-138 - Makoto Fukumto, Ryoichi Nagamatsu:
Feedback of Laughter by Detecting Variation in Respiration Amplitude for Augmenting Laughter. 139-142 - Noriyasu Yamamoto:
Improvement of Group Discussion System for Active Learning Using Smartphone. 143-148 - Liang Zhou, Siran Fu, Tao Guo, Lifang Han, Baojiang Cui:
Design and Implementation of a C++ Memory Leak Detection Tool Based on Dynamic Instrumentation. 149-153
Session 5: Energy Saving and Intelligent Computing
- Matteo Cristani, Francesco Olivieri, Claudio Tomazzoli:
Automatic Synthesis of Best Practices for Energy Consumptions. 154-161 - Atsuhiro Sawada, Hiroki Kataoka, Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa:
Design and Evaluation of Algorithms to Energy-Efficiently Select Servers for Storage and Computation Processes. 162-169 - Hammad Maqsood, Nadeem Javaid, Aqeb Yahya, Babar Ali, Zahoor Ali Khan, Umar Qasim:
MobiL-AUV: AUV-Aided Localization Scheme for Underwater Wireless Sensor Networks. 170-175 - Van-Huy Vu, Tein-Yaw Chung:
Bandwidth Estimation Based on MACD for DASH. 176-181 - Admir Barolli, Tetsuya Oda, Ilir Shinko, Leonard Barolli, Fatos Xhafa, Makoto Takizawa:
Performance Analysis of a Genetic Algorithm Based System for Wireless Mesh Networks Considering Weibull Distribution, DCF and EDCA. 182-188 - Yuki Sakai, Tetsuya Oda, Makoto Ikeda, Leonard Barolli:
A Vegetable Category Recognition System Using Deep Neural Network. 189-192
Session 6: Big Data and Data Management
- Tomasz Hachaj, Marek R. Ogiela:
Rule-Based Action Recognition: Performance Comparison between Lua and GDL Script Language. 193-197 - Lidia Ogiela, Marek R. Ogiela, Urszula Ogiela:
Efficiency of Strategic Data Sharing and Management Protocols. 198-201 - Toshitaka Maki, Kazuki Takahashi, Toshihiko Wakahara, Akihiro Yamaguchi, Yu Ichifuji, Noboru Sonehara:
A New Multiple Label Propagation Algorithm for Linked Open Data. 202-208 - Noriki Uchida, Kenta Ito, Go Hirakawa, Yoshitaka Shibata:
Adaptive Array Antenna Control Methods on Delay Tolerant Networks for Road Surveillance Systems. 209-214 - Fatos Xhafa, Daniel Palou, Leonard Barolli, Makoto Takizawa:
Energy-Aware Analysis of Synchronizing a Groupware Calendar. 215-222 - Jong-Hwan Shin, Ki-Yong Choi, Jeong-Woo Lee, Jung-Won Lee:
Improvement of Large Data Acquisition Method without the Interference on the CPU Load for Automotive Software Testing. 223-230
Session 7: Wireless and Mobile Networks
- Tetsuro Kuniyasu, Tetsuya Shigeyasu:
HRB: A New MAC Level 2-Hop Broadcast Protocol with Directional Receiving. 231-236 - Khuram Khalid, Isaac Woungang, Sanjay K. Dhurandher, Leonard Barolli, Glaucio H. S. Carvalho, Makoto Takizawa:
An Energy-Efficient Routing Protocol for Infrastructure-Less Opportunistic Networks. 237-244 - Da Li, Wenan Zhou, Xuhui Yang, Haitao Du:
An Intra-Cluster CoMP Based Sleep-Mode Scheme in Dense Heterogeneous Network. 245-249 - Fumiaki Sato, Ryohei Kikuchi:
Hybrid Routing Scheme Combining with Geo-Routing and DTN in VANET. 250-255 - Tianrun Gao, Gaofeng Nie, Chenshan Ren, Hui Tian:
Cooperative Load Balancing in OFDMA Small Cell Networks. 256-260 - Tein-Yaw Chung, Fong-Ching Yuan, Hsun-Fu Liu:
On Timing of Handoff Decision Making on Heterogeneous Wireless Networks. 261-266
ACTICS 2016
Session 1: Next Generation Network Applications
- Fei Chun Ma, Sok Hán Tóng, João Cordeiro:
Assessing Driving Behavior in Public Transportation through Mobile Crowd Sensing: A Concept Proposal for Macau Public Transportation System. 267-271 - El Bouatmani Hamza, Shigetomo Kimura:
A Scalable SDN-EPC Architecture Based on OpenFlow-Enabled Switches to Support Inter-domain Handover. 272-277 - Bhed Bahadur Bista:
Improving Energy Consumption of Epidemic Routing in Delay Tolerant Networks. 278-283 - Muhammad, Nadeem Javaid, Babar Ali, Aqeb Yahya, Zahoor Ali Khan, Umar Qasim:
Improved HydroCast: A Technique for Reliable Pressure Based Routing for Underwater WSNs. 284-290
BDITS
2016 Session 1: Security and Anomaly Detection
- Pengfei Li, Songling Shan:
An Improved Algorithm of Prefixspan. 291-294 - Jun Yang, Xiangping Du, Liang Zhou, Songling Shan, Baojiang Cui:
Research on the Identification of Software Behavior in Anomaly Detection. 295-298 - Xiaobing Liang, Bing Zhao, Rui Wang, Ying Liu:
Research on the Vulnerability Predicting Analysis Model for Binary Executables. 299-304 - Xuan Tian, Baojiang Cui, Jiangdong Deng, Jun Yang:
The Performance Optimization of Hadoop during Mining Online Education Packets for Malware Detection. 305-309 - Shuang Liang, Yong Ma, Yanyu Huang, Jia Guo, Chunfu Jia:
The Scheme of Detecting Encoded Malicious Web Pages Based on Information Entropy. 310-312 - Yong Ma, Shuang Liang, Xuan Chen, Chunfu Jia:
The Approach to Detect Abnormal Access Behavior Based on Naive Bayes Algorithm. 313-315
esIoT 2016
Session 1: Internet of Things and Smart Homes
- Borja Bordel Sánchez, Diego Sánchez de Rivera, Ramón Alcarria:
Plug-and-Play Transducers in Cyber-Physical Systems for Device-Driven Applications. 316-321 - Miguel A. Wister, José Adán Hernández-Nolasco, Pablo Pancardo, Francisco D. Acosta, Antonio Jara:
Emergency Population Warning about Floods by Social Media. 322-327 - Nusrat Shaheen, Nadeem Javaid, Najmun Nisa, Amber Madeeha Zeb, Zahoor Ali Khan, Umar Qasim:
Appliance Scheduling for Energy Management with User Preferences. 328-334 - Masafumi Yamada, Tetsuya Oda, Yi Liu, Masahiro Hiyama, Keita Matsuo, Leonard Barolli:
Performance Evaluation of an IoT-based e-Learning Testbed Considering OLSR and WEP Protocols. 335-341 - Sakeena Javaid, Nadeem Javaid, Muhammad Shoaib Javaid, Sehrish Javaid, Umar Qasim, Zahoor Ali Khan:
Optimal Scheduling in Smart Homes with Energy Storage Using Appliances' Super-Clustering. 342-348
FIMIS 2016
Session 1: Innovative Internet Service and Technologies
- Jie Tao, Yilun Liu, Yiping Wen, Jiahui Su:
The Expert System of Locomotive Running Gear Based on Sematic Network. 349-354 - Tianhan Gao, Nan Guo, Fanghua Geng, Xinyang Deng:
Access Authentication Schemes for PMIPV6: A Survey. 355-360 - Kazuki Takahashi, Toshitaka Maki, Toshihiko Wakahara:
A New Laboratory Assignment Support System for Undergraduate Students. 361-366 - Andrew Yearp, David Newell, Philip Davies, Russell Wade, Reza Sahandi:
Wireless Remote Patient Monitoring System: Effects of Interference. 367-370 - Tomoki Okutake, Noriki Uchida, Noriyasu Yamamoto:
A Collaborative Safety Flight Control System for Multiple Drones. 371-375 - Tzu-Hsien Wang, Yuan-Ko Huang, Chiang Lee:
Skyline Query Processing System for Taiwan Maps. 376-380
FINGNet 2016
Session 1: Security Issues and Networks
- Jiyoung Lim, Inshil Doh, Kijoon Chae:
Authentication for Mobile Open IPTV Service Security. 381-385 - Shi Li, Inshil Doh, Kijoon Chae:
A Group Authentication Scheme Based on Lagrange Interpolation Polynomial. 386-391 - Hyoungwoo Park, Il Sun Hwang, Jongsuk Ruth Lee:
Study on the Sustainable Migration to Software Defined Network for Nation-Wide R&E Network. 392-396 - Inho Jeon, Chan-Ho Choi, Jerry H. Seo, Youngsik Joe, Kumwon Cho, Hoon Ryu:
EDISON Nanophysics: Web-Based e-Learning Platform for Education and Research in Nanoscience. 397-402 - Hae-Duck Joshua Jeong, Hyeonggeun Kim, WonHwi Ahn, Jung-Hee Oh, Dawoon Lee, Sang-Kug Ye, Jongsuk Ruth Lee:
Analysis and Detection of Anomalous Network Traffic. 403-408
Session 2: Health and Video Streaming Services
- Hyun Jung Lee, Mye M. Sohn:
Health Service Knowledge Management to Support Medical Group Decision Making. 409-414 - WooSeok Hyun, Ilsun You, JoungSoon Jang, Fang-Yie Leu:
A Wireless Body Sensor Network and Its Applications: Rehearsal with a Smartphone. 415-418 - Yong-Hwan Lee, Youngseop Kim, Heung-Jun Kim, In-Kyoung Shin, Hyochang Ahn, Yukyong Lee:
Modified Active Shape Model for Realtime Facial Feature Tracking on iPhone. 419-421 - In-Kyoung Shin, Hyochang Ahn, Yong-Hwan Lee:
Efficient Image Retrieval Using Image and Audio Features in Video Stream. 422-424
ITAUC 2016
Session 1: Intelligent Techniques and Algorithms
- Tzu-Liang Kung, Chun-Nan Hung, Yuan-Hsiang Teng, Jui-Yu Hung, Lih-Hsing Hsu:
On the Robust Approach to Data Inconsistency Detection of Sensor Networks. 425-429 - Tzu-Liang Kung, Chun-Nan Hung, Cheng-Kuan Lin, Hsiang-Chun Chen, Chia-Hui Lin, Lih-Hsing Hsu:
A Framework of Cycle-Based Clustering on the Crossed Cube Architecture. 430-434 - Jung-Kuei Chang, Wei-Yun Hsu, Te-Chan Chen, Hui-Huang Hsu:
Identification of Negative Comments on Internet Forums. 435-439 - Hsing-Chung Chen, Pei-Chi Yeh, Ze-Min Lin, Qiu-Hua Ruan:
Security Awareness Investigation for Mobile User Examined by Using Association Rule Mining Method. 440-445 - Hsing-Chung Chen, Qiu-Hua Ruan, Pei-Chi Yeh, Ze-Min Lin:
Intelligent Management Model Based on CBR-SDA Approach - An Example of Smart Life Recommendation System for Choosing Clothes and Accessories. 446-451
MCNCS 2016
Section 1: Network Applications and Security
- Hung-Yuan Chen, Yao-Chung Fan, Chien-Liang Lai, Huan Chen:
Identifying Variable-Power Appliances in Non-intrusive Load Monitoring Systems. 452-457 - Fang-Yie Leu, Yi-Ting Hsiao:
Finite State Machine Based Real Time Scheduling for Microchip. 458-463 - Sen-Tarng Lai, Fang-Yie Leu:
A Version Control-Based Continuous Testing Frame for Improving the IID Process Efficiency and Quality. 464-469 - Yi-Li Huang, Fang-Yie Leu, Po-Hao Su, Ti-Hsun Sung, Sin-Cheng Liu:
A Secure and High Performance Wireless Sensor Network Based on Symmetric Key Matrix. 470-475 - Kun-Lin Tsai, Fang-Yie Leu, Yi-Fung Huang, Chi Yang, Cheng-Hsin Chang, King-Shing Yip, Yuchen Xue, Guan-Chi Lai:
Cloud Encryption Using Distributed Environmental Keys. 476-481 - Xia-Yun Guo, Chin-Ling Chen, Chang-Qing Gong, Fang-Yie Leu:
A Secure Official Vehicle Communication Protocol for VANET. 482-485
PIS-PIS 2016
Session 1: Security for Public Internet Services
- Kyungroul Lee, Yeunsu Lee, Hyeji Lee, Kangbin Yim:
A Brief Review on JTAG Security. 486-490 - Byeong-Gwon Kang, Seungyong Han, Sangjoon Park:
Impacts of Frequency Selectivity on the Error Performance of Time-Domain Equalizers in MIMO Systems. 491-494 - Sanghwan Oh, Hanchul Bae, Soojin Yoon, Hwankuk Kim, YoungTae Cha:
Malicious Script Blocking Detection Technology Using a Local Proxy. 495-498 - Kyungroul Lee, Hyeji Lee, Yeunsu Lee, Kangbin Yim:
Analysis on the Key Storage Mechanism of the CNG Library. 499-502 - Seungjun Yeon, Hyojung Jun:
Issues and Implementation Strategies of the IoT (Internet of Things) Industry. 503-508 - Guangming Yang, Zhenhua Tan, Fanghua Geng, Tianhan Gao:
A Novel Hybrid Algorithm Based on Hill Matrix and Haar Domain Sequence. 509-513 - Dongmin Choi, Chang Choi, Xin Su:
Invisible Secure Keypad Solution Resilient against Shoulder Surfing Attacks. 514-517
SMEUCE 2016
Session 1: Knowledge Learning and Service Innovation
- Tin-Chang Chang, Shu-Hui Chuang:
Exploring Value of e-Service Innovation: e-Service and Co-operation Complementarity. 518-521 - Ching-Hui Shih, Yao-Hua Wang:
Can Workplace Friendship Reduce Social Loafing? 522-526 - Shu-Hui Chuang, Shinyi Lin, Tin-Chang Chang:
Exploring the Performance of Service Innovation: Infrastructure Capability and Innovation Orientation Complementarity. 527-530 - Mei-Hua Liao, Yu-Ci Xu, Hidekazu Sone:
Old-Established Companies' Traditions and Innovations - Focusing on e-Business of Japan and Taiwan. 531-532 - Kuei-Yuan Wang, Cheng-Chun Kuo:
The Key Value-Drivers of Successful Travel Agency from the Perspective of Its Core Competence: Lion Travel versus Phoenix Tours. 533-537
Session 2: Sustainability Management for e-Business and Professional Associations
- Mei-Hua Liao, Wun-Huei Chen, Ying-Yun Lin:
SEO Behavior of the Family Firms through Agency Theory Perspective. 538-540 - Mei Hua Huang, Chiung-Yen Chen:
Antecedents and Outcomes of Trust in Professional Associations. 541-545 - Ying-Li Lin, Fang-Hua Hsiao, Pei-Shan Li:
Causal Analysis in Human Capital, R&D Assets and Financial Performance: Evidence from Taiwanese Firms Operating in China. 546-550 - Yung-Shun Tsai, Chun-Ping Chang, Shyh-Weir Tzang, Yu-Jhen Liou:
The Impact of Stock Prices, Risks and Business Cycle on Overconfidence. 551-555 - Chien-Wen Lai, Kuei-Yuan Wang, Tzu-Yu Lin:
A Comparative Study of Valuation and Value Drivers in the Auto Lamp Industry: Two Cases of Auto Lamp Companies. 556-562
Session 3: Ubiquitous Commerce and Operation Management
- Li-Jen He:
Successor Audit Partner Choice for Mandatory Audit Partner Rotation Companies. 563-566 - Chiung-Yen Chen, Mei Hua Huang:
An Investigation into Human Resources and Operating Performance between Competitive Strategies of Taiwan Public Accounting Firms. 567-572 - Chia-Ju Lu, Yi-Yu Shih, Shih-Ten Wang:
The Effect of Corporate Social Responsibility Initiatives on Internal Employee Motivation and Organizational Identification. 573-577 - Nien-Tzu Yang:
The Hindsight of ADR Listing - An Empirical Study on M&A Activities for Acquirers Before-and-After ADR Listing. 578-583 - Chung-Jen Fu, Chiung-Yao Huang:
Linking Dynamic Equity Valuations to Optimum Weighting in the Performance Compensation System. 584-586
WAIS 2016
Session 1: Secure Systems
- Takamichi Saito, Koki Yasuda, Takayuki Ishikawa, Rio Hosoi, Kazushi Takahashi, Yongyan Chen, Marcin Zalasinski:
Estimating CPU Features by Browser Fingerprinting. 587-592 - Takamichi Saito, Yuta Tsunoda, Daichi Miyata, Ryohei Watanabe, Yongyan Chen:
An Authorization Scheme Concealing Client's Access from Authentication Server. 593-598 - Hiroaki Kikuchi, Kota Sasa, Yuta Shimizu:
Interactive History Sniffing Attack with Amida Lottery. 599-602 - Pengfei Li, Yaokai Feng, Junpei Kawamoto, Kouichi Sakurai:
A Proposal for Cyber-Attack Trace-Back Using Packet Marking and Logging. 603-607 - Longzhu Cai, Yaokai Feng, Junpei Kawamoto, Kouichi Sakurai:
A Behavior-Based Method for Detecting DNS Amplification Attacks. 608-613 - Yuji Suga:
Generalized Graph-Based Visual Secret Sharing Schemes for Multiple Secrets. 614-619
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.