default search action
CyberC 2014: Shanghai, China
- 2014 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC 2014, Shanghai, China, October 13-15, 2014. IEEE Computer Society 2014, ISBN 978-1-4799-6235-8
Session 1: Encryption, Confidentiality, and Assurance
- Licui Ma, Meihong Li, Lun Li, Ye Du, Dawei Zhang:
A SDKEY-Based Secure Storage and Transmission Approach for Android Phone. 1-6 - Huijuan Xiao, Chengliang Deng:
Random Characteristics for LSR, RC4, and Logistic Stream Cipher. 7-9 - Zhen Chen, Wenfang Zhang, Xiaomin Wang:
A Robust Collaborative Threshold Authenticated Encryption Scheme Based on Message Blocking. 10-13 - Shuaishuai Tan, Xiaoping Li, Qingkuan Dong:
An Efficient Trusted Mobile Router Selection Mechanism for Multihomed NEMO Network. 14-18 - Amine Rahmani, Abdelmalek Amine, Reda Mohamed Hamou:
A Multilayer Evolutionary Homomorphic Encryption Approach for Privacy Preserving over Big Data. 19-26 - Zhen Chen, Wenfang Zhang, Xiaomin Wang:
A Robust Collaborative Threshold Authenticated Encryption Scheme Based on Message Blocking. 27-30 - Ling-Xi Peng, Tianwei Chen:
Automated Intrusion Response System Algorithm with Danger Theory. 31-34 - Feng-Hsiag Hsiao, Kai-Ping Hsieh, Zhe-Hao Lin:
Exponential Optimal Synchronization of Chaotic Cryptosystems: Neural-Network-Based Approach. 35-42 - Chao Zhao, Huiqiang Wang, Fangfang Guo, Mo Zhou, Yushu Zhang:
A Heuristic Method of Attack Graph Analysis for Network Security Hardening. 43-47 - Yi-Nan Lin, Kuo-Tsang Huang:
Shell-Based Block Ciphering Structure (SBCS) for AES Parallelism with Feedback-Data Mode. 48-55 - Ling-Xi Peng, Yue-Feng Chen:
Positive Selection-Inspired Anomaly Detection Model with Artificial Immune. 56-59
Session 2: Authentication, Key, Privacy, and Security
- Yan Yang, Bin Lian, Chen Chen, Pu Li:
DBSCAN Clustering Algorithm Applied to Identify Suspicious Financial Transactions. 60-65 - Lei Pan, Shaun Bangay:
Generating Repudiable, Memorizable, and Privacy Preserving Security Questions Using the Propp Theory of Narrative. 66-72 - Zehui Li, Ruoqing Zhang, Yatao Yang, Zichen Li:
A Provable Secure Mutual RFID Authentication Protocol Based on Error-Correct Code. 73-78 - Angolo Shem Mbandu, Chunxiang Xu, Kamenyi Domenic Mutiria:
Optimized MHealth Batch Verification for a Variant of DSA. 79-86 - Xiaomei Cao, Ying Yin:
An Identity Authentication Scheme for Opportunistic Network Based on Multidimensional Scaling. 87-93 - Yankson Herbert Gustav, Xiao Wu, Yan Ren, Yong Wang, Fengli Zhang:
Dummy Based Privacy Preservation in Continuous Querying Road Network Services. 94-101 - Licai Liu, Lihua Yin, Yunchuan Guo, Bingxing Fang:
EAC: A Framework of Authentication Property for the IOTs. 102-105 - Zhifeng Luo, Zhanli Chen:
A Privacy Preserving Group Recommender Based on Cooperative Perturbation. 106-111 - Huiyao An, Yang Song, Tao Yu, Hui Li, Peng Zhang, Jun Zha:
A New Architecture of Ajax Web Application Security Crawler with Finite-State Machine. 112-117 - Charles Fleming, Ning Cui, Dawei Liu, Haining Liang:
Attacking Random Keypads through Click Timing Analysis. 118-121
Session 3: Distributed, Internet of Things, and Cloud Computing
- Hae Sook Jeon, Won Don Lee:
Performance Measurement of Decision Tree Excluding Insignificant Leaf Nodes. 122-127 - Huiqun Zhao, Chuancong Huang:
A Data Processing Algorithm in EPC Internet of Things. 128-131 - Xiaolei Wang, Jie He, Yuexiang Yang:
A Collaborative Traceback against P2P Botnet Using Information Sharing and Correlation Analysis. 132-138 - Yiying Zhang, Weifu Zou, Xi Chen, Chengyue Yang, Jinping Cao:
The Security for Power Internet of Things: Framework, Policies, and Countermeasures. 139-142 - Rashid Hassani, Ganesh Chavan, Peter Luksch:
Optimization of Communication in MPI-Based Clusters. 143-149 - Xuefei Leng, Keith Mayes, Yuanhung Lien:
Ownership Management in the Context of the Internet of Things. 150-153
Session 4: Big Data and Algorithms
- Yan Shi, Jun Lu, Xinyi Shi, Jinliang Zheng, Jun Li:
The Key Algorithms of Promoter Data Parallel Processing Based on OpenMP. 154-157 - Nuwan Ganganath, Chi-Tsun Cheng, Chi K. Tse:
Data Clustering with Cluster Size Constraints Using a Modified K-Means Algorithm. 158-161 - Yong Zhao, Yao Chen, Zhao Liang, Shuangshuang Yuan, Youfu Li:
Big Data Processing with Probabilistic Latent Semantic Analysis on MapReduce. 162-166 - Ruini Xue, Lixiang Ao, Shengli Gao, Zhongyang Guan, Lupeng Lian:
Partitioner: A Distributed HDFS Metadata Server Cluster. 167-174 - Yong Wang, Ya-Wei Zhao:
Transplantation of Data Mining Algorithms to Cloud Computing Platform When Dealing Big Data. 175-178 - Fangyan Zhang, Hao Liang:
Application of Data Mining Techniques in Universal Design. 179-182 - Jian Wang, Xiaolin Xu, Xiumei Wu, Xiaoming Hu, Yinchun Yang:
Characterizing Patterns of Chinese Yiban Blogging Service. 183-186 - Yadong Dong, Huaping Guo, Weimei Zhi, Ming Fan:
Class Imbalance Oriented Logistic Regression. 187-192 - Kyung Tae Kim, Woo Sik Seol, Ung-Mo Kim, Hee Yong Youn:
Latent Semantic Analysis for Mining Rules in Big Data Environment. 193-200 - (Withdrawn) Hadoop Preemptive Deadline Constraint Scheduler. 201-208
- Iwao Fujino:
Refining LDA Results and Ranking Topics in Order of Quantity and Quality with an Application to Twitter Streaming Data. 209-216
Session 5: Collaboration, Architecture, and Protocols
- Puning Zhang, Yuan'an Liu, Fan Wu, Bihua Tang, Hongguang Zhang, Wenhao Fan:
A Data Delivery Scheme Based on Sink Centrality for Delay Tolerant Mobile Sensor Networks. 217-222 - Ming Hu, Huan Cui, Hong-Mei Wang, Xin-Jing Zhang:
Top-N Frequent Itemsets Mining Algorithm Based on Greedy Method. 223-228 - Lijun Zhang, Qiuyu Zhu:
The Overtime Waiting Model for Web Server Performance Evaluation. 229-232 - Tao Zhong, Kshitij A. Doshi, Gang Deng:
ParaSAIL: Bitmap Indexing Using Many Cores. 233-240 - Zhanlin Ji, Ivan Ganchev, Mairtin O'Droma, Tiefan Ding:
A Distributed Redis Framework for Use in the UCWW. 241-244 - Dongjian Fang, Jicheng Hu, Xiaofeng Wei, Heng Shao, Yongen Luo:
A Smart Phone Healthcare Monitoring System for Oxygen Saturation and Heart Rate. 245-247 - Jianpeng Hu, Linpeng Huang, Bei Cao, Xuling Chang:
SPDML: Graphical Modeling Language for Executable Architecture of Systems. 248-255 - Mário Antunes, Diogo Gomes, Rui L. Aguiar:
Semantic-Based Publish/Subscribe for M2M. 256-263 - Long-Hai Li, Cheng-Qiang Huang, Shao-Feng Fu:
Pairing-Based Anonymous Boardroom Voting Scheme. 264-268
Session 6: Design, Implementation, and System Management
- Souad Guellati, Ilham Kitouni, Riadh Matmat, Djamel-Eddine Saïdouni:
Forward Analysis of Timed Automata with Action Durations: Theory and Implementation. 269-276 - Dawei Li:
Configuration and Optimization for Virtualization Based Large-Scale IP Networks Emulation. 277-281 - Jinliang Zheng, Jun Lu, Xinyi Shi, Yan Shi, Ruiqing Jing:
Motif Recognition Parallel Algorithm Based on GPU. 282-285 - Yong Xie, Yi Yuan, Haihu Tan, Juanjuan Wang:
Effect of Embedding Way on Printed Watermarking Image by Lithography. 286-289 - Jimin Kim, Younghoon Chang, Siew Fan Wong, Myeong-Cheol Park:
A Study on the Use Contexts of Personal Computing Devices Using a Diary Study Method. 290-296 - Xiongtao Ma, Chongming Bao, Lei Li, Lihua Zhou, Bing Kong:
An Extension to Hub Algorithm Based on Triangular Loop. 297-303 - Pavel Moiseets, Yuzuru Tanaka:
Road Danger Estimation for Winter Road Management. 304-311 - Mingxing Shao, Jing Fan, Yafang Li:
An Empirical Study on Consumer Acceptance of Mobile Payment Based on the Perceived Risk and Trust. 312-317 - Zhanlin Ji, Ivan Ganchev, Mairtin O'Droma, Qingjuan Zhao:
A Push-Notification Service for Use in the UCWW. 318-322
Session 7: Smart Sensor Networks
- Qian Zeng, Hongbin Chen, Feng Zhao, Xiaohuan Li:
A Sleep Scheduling Algorithm for Target Tracking in Energy Harvesting Sensor Networks. 323-330 - Faiza Al-Salti, Nasser Alzeidi, Bassel R. Arafeh:
A New Multipath Grid-Based Geographic Routing Protocol for Underwater Wireless Sensor Networks. 331-336 - Kancheng Lin, Hongjiang Si, Lin Kang, Xiuhua Li, Yinghai Zhang:
Energy Efficient Virtual MIMO for Cognitive Radio Sensor Networks. 337-342 - Shoujun Liu, Kezhong Liu, Wei Chen:
Decision Fusion Using Three-Level Censoring Scheme in Sensor Networks under Rician Fading Channels. 343-348 - Markus Duchon, Pragya Kirti Gupta, Dagmar Koss, Denis Bytschkow, Bernhard Schätz, Sebastian Wilzbach:
Advancement of a Sensor Aided Smart Grid Node Architecture. 349-356 - Ning Cao, Russell Higgs, Gregory M. P. O'Hare:
Simulation-Based Coverage Optimization for the Nearest Closer Protocol in Wireless Sensor Networks. 357-360 - Hai Lin, Ping Chen, Lusheng Wang:
Fan-Shaped Clustering for Large-Scale Sensor Networks. 361-364 - Dongze Song, Wanming Luo, Ting Liu, Baoping Yan:
The Application of the Sensor Model Language in Sensor Observation Service of the HeiHe Experimental Research. 365-371 - Xianfeng Pei, Xianda Chen, Kyung Tae Kim, Seung Wan Kim, Hee Yong Youn:
Spatio-temporal Event Detection: A Hierarchy Based Approach for Wireless Sensor Network. 372-379
Session 8: Wireless Networks and Communications
- Yang Yang, Yuanan Liu:
A CPW-Fed Triple-Band Planar Monopole Antenna for Internet of Things Applications. 380-383 - Pat-Yam Tsoi, Chi-Tsun Cheng, Nuwan Ganganath:
A k-Means-Based Formation Algorithm for the Delay-Aware Data Collection Network Structure. 384-388 - Wenjing Liu, Yanxin Yan:
Analysis of CSMA/CA in Narrowband Power Line Communication System. 389-394 - Zhizhong Zhang, Peiliang Dong, Jun Yao, Koen Holtman:
A Performance Study of Zig Bee Broadcasts in Coexistence with Wi-Fi. 395-399 - Hao Xiang, Xiaogen Jiang, Qunfeng Shang:
A High Efficient Common IPC for LTE Layer1 Multi-core DSP/SoC System. 400-405 - Xianda Chen, Min Jae Kim, Sang Hyun Yoo, Na Young Park, Hee Yong Youn:
Efficient and Prompt Handover in LTE-Based Systems by Predicting the Target eNodeBs. 406-413 - Ram Narayan Yadav, Rajiv Misra:
An Analysis of Different TCP Variants in Cognitive Radio Networks. 414-419 - Bing Wang, Chao Liu, Huaning Wu:
The Research of Pattern Synthesis of Linear Antenna Array Based on Seeker Optimization Algorithm. 420-424 - Wen-Cheng Lai, Jhin-Fang Huang, Change-Ming Hsu, Pi-Gi Yang:
Low Power VCO and Mixer for Computing Miracast and Mobile Bluetooth Applications. 425-428
Session 9: Antenna, Spectrum, and Cognitive Computing
- Ahmed Mohammed Mikaeil, Bin Guo, Zhijun Wang:
Machine Learning to Data Fusion Approach for Cooperative Spectrum Sensing. 429-434 - Jianfeng Du, Zhiwei Li:
An Approach for Optimal Two-Dimensional Independent Antenna Electrical Adjustment. 435-440 - Jie Li, Yuxi Liu, Qiyue Li, Lusheng Wang:
Spectrum Allocation in Cognitive Radio - Quantum Immune Clonal Based Approach. 441-447 - Bo Liu, Wan-Yu Zhu, Yang Liu, Peng Cao:
A Configuration Compression Approach for Coarse-Grain Reconfigurable Architecture for Radar Signal Processing. 448-453 - Ningning Jiang, Junbo Hua:
Channel Availability Analysis for Sensing Order Selection in CRNs with Correlated Channels. 454-457 - Ruyue Dong, Guixia Kang, Xiaoshuang Liu, Yuncheng Liu:
FPGA Design and Implementation of MIMO Decoder for 1 Gbps Wireless LAN. 458-463 - Kancheng Lin, Hongjiang Si, Lin Kang, Xiuhua Li, Yinghai Zhang:
Energy Efficient Spectrum Access for Cognitive Radio Sensor Networks. 464-469 - Byung Jun Lee, Kyung Hwan Oh, Hee Jung Park, Ung-Mo Kim, Hee Yong Youn:
Resource Reallocation of Virtual Machine in Cloud Computing with MCDM Algorithm. 470-477 - Yubo Li, Yang Xie, Min Peng, Qing F. Zhou, Shengli Zhang:
Joint Cooperative MAC and Network Coding for Two-way Relaying Networks. 478-482
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.