default search action
26th AINA Workshops 2012: Fukuoka, Japan
- Leonard Barolli, Tomoya Enokido, Fatos Xhafa, Makoto Takizawa:
26th International Conference on Advanced Information Networking and Applications Workshops, WAINA 2012, Fukuoka, Japan, March 26-29, 2012. IEEE Computer Society 2012, ISBN 978-1-4673-0867-0
The Eighth International Symposium on Frontiers of Information Systems and Network Applications (FINA-2012)
Wireless and Mobile Network Applications
- Akira Sakuraba, Tomoyuki Ishida, Yoshitaka Shibata:
An Input Method for High-Resolution Large 2D Desktop Environment Using Wireless Device with Joystick. 1-6 - Yinghui Zhou, Lei Jing, Junbo Wang, Zixue Cheng:
Separator Design of Gesture Signals Based on Adaptive Threshold Using Wearable Sensors. 7-12 - Jiannong Cao, Chisheng Zhang, Jun Zhang, Yueming Deng, Xin Xiao, Miao Xiong, Jie Zhou, Yang Zou, Gang Yao, Wei Feng, Liang Yang, Yao Yu:
SHAWK: Platform for Secure Integration of Heterogeneous Advanced Wireless Networks. 13-18 - Miwa Takai:
Measurement of Active Quantity of the Subject Movement and Design of Surveillnace Camera System Using High Active Part. 19-24
Cryptography, Authentication, and Security
- Zhen Yu Wu, Dai-Lun Chiang, Tzu-Ching Lin, Yu-Fang Chung, Tzer-Shyong Chen:
A Reliable Dynamic User-Remote Password Authentication Scheme over Insecure Network. 25-28 - Amy Poh Ai Ling, Kokichi Sugihara, Masao Mukaidono:
Security Philosophy Important for a Sustainable Smart Grid System. 29-34 - Tsunetoshi Hayashi:
Source Code Publishing on World Wide Web. 35-40
Architectures and Middleware
- Tor-Morten Grønli, Bendik Bygstad:
A Successful Implementation of Service Oriented Architecture. 41-46 - Gwan-Hwan Hwang, Chi Wu-Lee, Zhong-Xiang Jiang:
Workflow-Based Dynamic Access Control in a Service-Oriented Architecture. 47-52 - Keling Da, Marc Dalmau, Philippe Roose:
WaterCOM: An Architecture Model of Context-Oriented Middleware. 53-60 - Yang-Hsin Fan, Jan-Ou Wu:
Middleware Software for Embedded Systems. 61-65
Privacy and Information Poisoning
- Salah-Eddine Tbahriti, Brahim Medjahed, Zaki Malik, Chirine Ghedira, Michael Mrissa:
How to Preserve Privacy in Services Interaction. 66-71 - Sho Kurita, Kenji Komoriya, Ryuya Uda:
Privacy Protection on Transfer System of Automated Teller Machine from Brute Force Attack. 72-77 - Junya Ishii, Afiza Razali, Ryuya Uda:
Confidential Information Poisoning Methods by Considering the Information Length in Electronic Portable Devices. 78-84 - Sin G. Teo, Vincent C. S. Lee, Shuguo Han:
A Study of Efficiency and Accuracy of Secure Multiparty Protocol in Privacy-Preserving Data Mining. 85-90
Video Streaming and Life Streaming
- Erick Jimenez Rodriguez, Toshiro Nunome, Shuji Tasaka:
Multidimensional QoE Assessment of Multi-view Video and Audio (MVV-A) IP Transmission: The Effects of User Interfaces and Contents. 91-98 - Iori Osada, Takashi Yoshino:
Proposal and Evaluation of User's Actions Distribution Method Using Life Streaming Service on Lifelog System. 99-104 - Kazuyuki Takayama, Takaya Fujimoto, Rei Endo, Hiroshi Shigeno:
Neighbor Selection Based on Transmission Bandwidth on P2P Live Streaming Service. 105-110 - Lei Chen, Narasimha K. Shashidhar, Qingzhong Liu:
Scalable Secure MJPEG Video Streaming. 111-115 - Parinya Sanguansat, Kornkamol Thakulsukanant, Vorapoj Patanavijit:
A Robust Video Super-Resolution Using a Recursive Leclerc Bayesian Approach with an OFOM (Optical Flow Observation Model). 116-121
Intrusion Detection and Blind Signature
- Eugene Albin, Neil C. Rowe:
A Realistic Experimental Comparison of the Suricata and Snort Intrusion-Detection Systems. 122-127 - Jingwei Liu, Zonghua Zhang, Rong Sun, Kyung Sup Kwak:
Certificateless Partially Blind Signature. 128-133 - Shun-ichi Kurino, Noriaki Yoshikai, Toshio Takahashi:
Personal Profile for Coping Behavior in a Virus Infection Situation. 134-140
Web-Based and TV Applications
- Masami Nakazawa, Maike Erdmann, Keiichiro Hoashi, Chihiro Ono:
Social Indexing of TV Programs: Detection and Labeling of Significant TV Scenes by Twitter Analysis. 141-146 - Tolga Arul, Abdulhadi Shoufan:
Consumer Opinions on Short-Interval Charging for Pay-TV over IPTV. 147-153 - Wei Chen, Rong-Chi Chang:
Automatic Web-Based EFP Studio System with XML Documents. 154-159
Secure Networks and Systems
- Wei-Liang Tai, Ya-Fen Chang, Yuan-Fu Li, Shun-Meng Pan:
A Security Enhancement on a Remote User Authentication Scheme Based on the Rabin Cryptosystem with Secure Password Updating. 160-164 - Frank Yeong-Sung Lin, Yu-Shun Wang, Yu-Pu Wu, Chia-Yang Hsu:
Effective Network Defense Strategies against Malicious Attacks with Various Defense Mechanisms under Quality of Service Constraints. 165-170 - Danilo Valeros Bernardo, Doan B. Hoang:
Symbolic Analysis of the Proposed UDT Security Architecture. 171-176 - Yuh-Min Tseng, Yi-Hung Huang, Hui-Ju Chang:
CCA-secure Anonymous Multi-receiver ID-based Encryption. 177-182
Multimedia Applications
- Jenq-Haur Wang, Jeng-Yuan Yang:
Statistical Single-Document Summarization for Chinese News Articles. 183-188 - Samuel Bernard, Xavier Défago, Sébastien Tixeuil:
A Fast and Robust Optimistic Total Order Broadcast for Online Video Games. 189-196 - Wen-Chiao Hsu, I-En Liao, Pei-Hua Lu:
Supporting Efficient XML Query Evaluation Using Double Indexes. 197-202 - Yoshiyuki Tanaka, Kenji Komoriya, Ryuya Uda:
Multiview Playback with Ghost in Required Condition. 203-208
Clustering and Grouping
- Xoluqobo Mkhwanazi, Hanh Le, Edwin H. Blake:
Clustering between Data Mules for Better Message Delivery. 209-214 - Ying-Dar Lin, Chi-Heng Chou, Yuan-Cheng Lai, Tse-Yau Huang, Simon Chung, Jui-Tsun Hung, Frank C. Lin:
Test Coverage Optimization for Large Code Problems. 215-220 - Chun-Nan Lu, Ying-Dar Lin, Chun-Ying Huang, Yuan-Cheng Lai:
Session Level Flow Classification by Packet Size Distribution and Session Grouping. 221-226
Multimedia Systems
- Takashi Yoshino, Shingo Fujita:
DOACOM: Video Chat System with Door-Type Interface. 227-231 - Fumiaki Murakami, Kenji Komoriya, Ryuya Uda, Seiichi Gohshi, Isao Echizen:
Preventing Surreptitious Filming by Saturation Irradiation of Infrared Rays. 232-237 - Alexander Camek, Christian Buckl, Pedro Sebastião Correia, Alois C. Knoll:
An Automotive Side-View System Based on Ethernet and IP. 238-243 - Darun Kesrarat, Vorapoj Patanavijit:
Empirical Study on Performance Comparisons of Block-Based Motion Estimation on Multi Sub-Pixel Displacement with Multiples Block Size. 244-249 - Liang-Yi Chung:
Virtual Reality in College English Curriculum: Case Study of Integrating Second Life in Freshman English Course. 250-253
Network Simulation, Analysis, and Performance Evaluation
- Shinya Saito, Yoshitoshi Murata, Tsuyoshi Takayama, Nobuyoshi Sato:
An International Driving Simulator: Recognizing the Sense of a Car Body by the Simulator. 254-260 - Ying Zhang, Ning Wu, Xiazhi Ke, Fen Ge:
A Coverage-Driven Verification Platform for Evaluating NoC Performance and Test Structure. 261-265 - Munehiro Namba, Yoshiya Nakata:
Probabilistic Replica Allocation in Multihop Networks. 266-273 - Yeim-Kuan Chang, Yu-Hsiang Wang:
CubeCuts: A Novel Cutting Scheme for Packet Classification. 274-279
Routing Algorithms and Traffic Control
- André Egners, Dominic Gatzen, Andriy Panchenko, Ulrike Meyer:
Introducing SOR: SSH-based Onion Routing. 280-286 - Yuwei Xu, Ying Wu, Jingdong Xu, Lin Sun:
Efficient Detection Scheme for Urban Traffic Congestion Using Buses. 287-293 - Shinji Kitagami, Yosuke Kaneko, Takuo Suganuma:
Method of Autonomic Load Balancing for Long Polling in M2M Service System. 294-299 - Taoufik Yeferny, Khedija Arour:
Efficient Routing Method in P2P Systems Based upon Training Knowledge. 300-305
Algorithms
- Feng Xie, Ming Xu, Zhen Chen:
RBRA: A Simple and Efficient Rating-Based Recommender Algorithm to Cope with Sparsity in Recommender Systems. 306-311 - Darun Kesrarat, Vorapoj Patanavijit:
A Novel Robust and High Reliability for Lucas-Kanade Optical Flow Algorithm Using Median Filter and Confidence Based Technique. 312-317 - Datchakorn Tancharoen, Pham Hong Ha, Kornkamol Thakulsukanant, Vorapoj Patanavijit:
Experimental Investigation for Practical Sparsity Number for Image Reconstruction Based on SL0 Algorithm in Discrete Frequency Domain. 318-323
Communication Systems
- Yangwei Li, Qingni Shen, Cong Zhang, Pengfei Sun, Ying Chen, Sihan Qing:
A Covert Channel Using Core Alternation. 324-328 - Jongjoo Park, Eunkyu In, Sangwoo Ahn, Cheoljon Jang, Jongwha Chong:
IEC 61850 Standard Based MMS Communication Stack Design Using OOP. 329-332 - Tunyawat Somjaitaweeporn, Pham Hong Ha, Kornkamol Thakulsukanant, Vorapoj Patanavijit:
An Alternative Robust SL0 Based on Recursive Huber Stochastic Estimation Technique in Frequency Domain. 333-338
Semantic Knowledge and Ontology
- Ko-Wei Huang, Wei-Chung Cheng, Chun-Wei Tsai, Chu-Sing Yang:
Design and Implementation of an Ontology-based Intelligent Project Management System. 339-343 - Gregory Blanc, Daisuke Miyamoto, Mitsuaki Akiyama, Youki Kadobayashi:
Characterizing Obfuscated JavaScript Using Abstract Syntax Trees: Experimenting with Malicious Scripts. 344-351
Internet Computing and Mobile Service Trends
- Toshihiko Yamakami:
From Gamenics to Servicenics: Lessons Learned in Mobile Social Games in Japan toward Service Engineering. 352-356 - Toshiro Minami:
Expertise Level Estimation of Library Books by Patron-Book Heterogeneous Information Network Analysis - Concept and Applications to Library's Learning Assistant Service. 357-362 - Hon Wai Lam, Tharam S. Dillon, Elizabeth Chang, Pornpit Wongthongtham, Wei Lui:
Detecting Events in Narrative Essays. 363-368 - I-Ping Chiang, Yi-Shiang Liao:
Exploring the Key Success Factors of Mobile Commerce in Taiwan. 369-374 - Nobuo Funabiki, Yousuke Korenaga, Yukiko Matsushima, Toru Nakanishi, Kan Watanabe:
An Online Fill-in-the-Blank Problem Function for Learning Reserved Words in Java Programming Education. 375-380
Trust Computing and Assurance
- Chun-Chia Wang, Chang-Cheng Sie:
A Study of Consumers' Trust in Online Shopping between Pick-up Goods Behavior in the Convenience Stores. 381-386 - Denise Umuhoza, Robin Braun:
Trustworthiness Assessment of Knowledge on the Semantic Sensor Web by Provenance Integration. 387-392 - Adil M. Hammadi, Omar Khadeer Hussain:
A Framework for SLA Assurance in Cloud Computing. 393-398
Network Monitoring and Virtualization
- Aki Choho, Nobuyoshi Sato, Tsuyoshi Takayama, Yoshitoshi Murata:
A Proposal of Method for Suspicious Person Detection on P2P Security Camera Network System. 399-405 - Golam Sorwar, Raqibul Hasan:
Smart-TV Based Integrated E-health Monitoring System with Agent Technology. 406-411 - Frank Yeong-Sung Lin, Yu-Shun Wang, Hui-Yu Chung, Jia-Ling Pan:
Maximization of Network Survivability under Malicious and Epidemic Attacks. 412-417 - Lee See Goh, Takaaki Ichimiya, Kazuhiro Watanabe, Norihiko Shinomiya:
A Hetero-core Spliced Optical Fiber Sensor Network for Remote Monitoring of Agricultural Enviroment. 418-422 - Dan Feng, Xiaojing Wang, Wei Zhao, Wei Tong, Jingning Liu:
vSuit: QoS-oriented Scheduler in Network Virtualization. 423-428
Parallel Computing and Interoperability
- Jiageng Yu, Yiwei Ci, Peng Zhou, Yanjun Wu, Chen Zhao:
Deterministic Replay of Multithread Applications Using Virtual Machine. 429-434 - Michel Hurfin, Izabela Moise, Jean-Pierre Le Narzul, Frédéric Majorczyk:
Adaptive Strategies for Speeding Up Sequences of Consensus. 435-442 - Heinz Kredel:
Fostering Interoperability in Java-Based Computer Algebra Software. 443-447
The Eighth International Workshop on Heterogeneous Wireless Networks (HWISE-2012)
Algorithms and Mechanisms for Wireless Networks
- Ying-Hong Wang, Wei-Chih Lin, Cheng-Hung Tsai, Guo-Rui Huang:
A Hybrid Scheduling Mechanism for IEEE 802.16j Networks. 448-453 - Muhammad Qasim Khan, Steinar Hidle Andresen:
PoA Selection in 802.11 Networks Using Media Independent Information Server (MIIS). 454-459 - Sung-Hoon Park, Seoun-Hyung Lee:
Token-Based Mutual Exclusion Algorithm in Mobile Cellular Networks. 460-465 - Nedal Ababneh, Nick F. Timmons, Jim Morrison, David C. Tracey:
Energy-Balanced Rate Assignment and Routing Protocol for Body Area Networks. 466-471
Ad-hoc Networks
- Sanjay Kumar Dhurandher, Isaac Woungang, Abhishek Gupta, Bharat K. Bhargava:
E2SIW: An Energy Efficient Scheme Immune to Wormhole Attacks in Wireless Ad Hoc Networks. 472-477 - Paulo Manoel Mafra, Joni da Silva Fraga, Altair Olivo Santin:
A Distributed IDS for Ad Hoc Networks. 478-483 - Abdulkader Benchi, Frédéric Guidec, Pascale Launay:
JOMS: A Java Message Service Provider for Disconnected MANETs. 484-489 - Saïd Yahiaoui, Yacine Belhoul, Nadia Nouali-Taboudjemat, Hamamache Kheddouci:
AdSIP: Decentralized SIP for Mobile Ad Hoc Networks. 490-495
Sensor and Ad-hoc Applications
- Bo-Si Lee, Hao-Wei Lin, Wernhuar Tarng:
A Cluster Allocation and Routing Algorithm Based on Node Density for Extending the Lifetime of Wireless Sensor Networks. 496-501 - Tsung-Chih Hsiao, Yu-Ting Liao, Jen-Yan Huang, Tzer-Shyong Chen, Gwoboa Horng:
Secure Authentication Scheme for Supporting Healthcare in Wireless Sensor Networks. 502-507 - Yuki Kasama, Toshiaki Miyazaki:
Simultaneous Estimation of the Number of Humans and their Movement Loci in a Room Using Infrared Sensors. 508-513 - Yuto Toguchi, Hiroshi Shigeno:
CDS-Based Routing Scheme Considering Node Properties in Triage Network. 514-519
Mesh Networks
- Sritrusta Sukaridhoto, Nobuo Funabiki, Toru Nakanishi, Kan Watanabe:
A Proposal of CSMA Fixed Backoff-time Switching Protocol and Its Implementation on QualNet Simulator for Wireless Mesh Networks. 520-525 - Edmundo Chissungo, Edwin H. Blake, Hanh Le:
Investigation into Batmand-0.3.2 Protocol Performance in an Indoor Mesh Potato Testbed. 526-532 - Jun Huy Lam, Sanggon Lee, Whye Kit Tan:
Multi-channel Wireless Mesh Networks Test-Bed with Embedded Systems. 533-537 - Kei Kikuchi, Yoshitoshi Murata, Goutam Chakraborty, Tsuyoshi Takayama, Nobuyoshi Sato:
Location Information System for Access Points in the Heterogeneous Wireless Enviornment. 538-543
Security Issues in Ad-hoc and Sensor Networks
- Soumyadev Maity, Ramesh C. Hansdah:
Membership Models and the Design of Authentication Protocols for MANETs. 544-551 - Tatsuro Iida, Keita Emura, Atsuko Miyaji, Kazumasa Omote:
An Intrusion and Random-Number-Leakage Resilient Scheme in Mobile Unattended WSNs. 552-557 - Young-Sil Lee, Tae-Yong Kim, Hoon-Jae Lee:
Mutual Authentication Protocol for Enhanced RFID Security and Anti-counterfeiting. 558-563 - Youjiro Takehana, Iichiro Nishimura, Norihito Yosaka, Tomoyuki Nagase, Yoshio Yoshioka:
Building Trust among Certificates Management Nodes in Mobile Ad-hoc Network. 564-568
Vehicular Networks
- Yiqing Gui, Edward Chan:
Data Scheduling for Multi-item Requests in Vehicle-Roadside Data Access with Motion Prediction Based Workload Transfer. 569-574 - Ján Janech, Anton Lieskovsky, Emil Krsák:
Comparation of Strategies for Data Replication in VANET Environment. 575-580 - Lin Sun, Ying Wu, Jingdong Xu, Yuwei Xu:
An RSU-assisted Cluster Head Selection and Backup Protocol. 581-587 - Giuseppe Ciaccio, Vittoria Gianuzzi:
Designing and Prototyping a Middleware for Vehicular Networks. 588-594
Sensor Networks
- Aoi Hashizume, Tadanori Mizuno, Hiroshi Mineno:
Energy Monitoring System Using Sensor Networks in Residential Houses. 595-600 - Shin-nosuke Toyoda, Fumiaki Sato:
Energy-Effective Clustering Algorithm Based on Adjacent Nodes and Residual Electric Power in Wireless Sensor Networks. 601-606 - Ana Nieto, Javier López:
Traffic Classifier for Heterogeneous and Cooperative Routing through Wireless Sensor Networks. 607-612 - Wataru Seino, Tomoki Yoshihisa, Takahiro Hara, Shojiro Nishio:
A Sensor Data Collection Method with a Mobile Sink for Communication Traffic Reduction by Delivering Predicted Values. 613-618
Wireless Communication Systems and Technologies
- Youji Ochi:
Development of Human-Like Agent to Support Lecture Presentation Using a Wireless Device and Image Processing Technology. 619-622 - Kevin Chin Yiu Shum, Joseph Kee-Yin Ng, Quan Jia Cheng:
The Design and Implementation of a Wireless Location Estimation System in a Wireless Local Area Network. 623-628 - Hiroshi Maeda, Shota Inoue, Shintaro Nakahara, Osamu Hatanaka, Yongmei Zhang, Hiroyuki Terashima:
Experimental Study on X-shaped Photonic Crystal Waveguide in 2D Triangular Lattice for Wavelength Division Multiplexing System. 629-632 - Masafumi Takematsu, Junichi Honda, Kazunori Uchida:
On Accuracy of Discrete Ray Tracing Method in Comparison with Rigorous Solutions. 633-638
Mobile Networks
- Hwi Woon Jeong, Jun Yeol Choi, Hyung Ku Kang, Hee Yong Youn:
An Efficient Group-Based Channel Scanning Scheme for Handover with IEEE 802.16e. 639-644 - Parin Sornlertlamvanich, Sinchai Kamolphiwong, Robert Elz, Panita Pongpaibool:
NEMO-Based Distributed Mobility Management. 645-650 - Masayuki Higashino, Kenichi Takahashi, Takao Kawamura, Kazunori Sugahara:
Mobile Agent Migration Based on Code Caching. 651-656 - Djallel Bouneffouf, Amel Bouzeghoub, Alda Lopes Gançarski:
Following the User's Interests in Mobile Context-Aware Recommender Systems: The Hybrid-e-greedy Algorithm. 657-662
Context Aware Middleware for Ubiquitous Computing Environments
- Senaka Buthpitiya, Faisal B. Luqman, Martin L. Griss, Bo Xing, Anind K. Dey:
Hermes - A Context-Aware Application Development Framework and Toolkit for the Mobile Environment. 663-670 - François Toutain, Fano Ramparany, Ewelina Szczekocka:
Semantic Context Reasoning for Formulating User Location. 671-677
The Seventh International Workshop on the Performance Analysis and Enhancement of Wireless Networks (PAEWN-2012)
Wireless Mesh and Mobile Networks
- Jason B. Ernst, Joseph Alexander Brown:
Co-existence of Evolutionary Mixed-Bias Scheduling with Quiescence and IEEE 802.11 DCF for Wireless Mesh Networks. 678-683 - Somayeh Nikbakhsh, Azizah Bt Abdul Manaf, Mazdak Zamani, Maziar Janbeglou:
A Novel Approach for Rogue Access Point Detection on the Client-Side. 684-687
Wireless Systems and Technologies
- Ranjeet Singh Tomar, Shekhar Verma:
Enhanced SDMA for VANET Communication. 688-693 - Yang-Han Lee, Hsien-Wei Tseng, Chih-Yuan Lo, Yih-Guang Jan, Hen-Wai Tsao, Jingshown Wu:
Software Simulation Tool for the Capacity Analysis of WiMAX Base Stations. 694-697
The Sixth International Symposuim on Security and Multimodality in Pervasive Environment (SMPE-2012)
Authentication and Analysis
- Toan-Thinh Truong, Minh-Triet Tran, Anh Duc Duong:
Improvement of the More Efficient and Secure ID-Based Remote Mutual Authentication with Key Agreement Scheme for Mobile Devices on ECC. 698-703 - Kwang Il Shin, Ji Soo Park, Jae Yong Lee, Jong Hyuk Park:
Design and Implementation of Improved Authentication System for Android Smartphone Users. 704-707 - Shunsuke Oshima, Takuo Nakashima, Toshinori Sueyoshi:
The Evaluation of an Anomaly Detection System Based on Chi-square Method. 708-713
Secure Architectures and Platforms
- Rafael Giménez, Marc Pous, Francisco Rico-Novella:
Securing an Interoperability Architecture for Home and Urban Networking: Implementation of the Security Aspects in the INREDIS Interoperability Architecture. 714-719 - Tsai-Yeh Tung, Laurent Lin, D. T. Lee:
Pandora Messaging: An Enhanced Self-Message-Destructing Secure Instant Messaging Architecture for Mobile Devices. 720-725 - Jinkeon Kang, Kitae Jeong, Sang-Soo Yeo, Changhoon Lee:
Related-Key Attack on the MD-64 Block Cipher Suitable for Pervasive Computing Environments. 726-731 - Takafumi Hayashi, Atsushi Kara, Toshiaki Miyazaki, Jiro Iwase, Hideyuki Fukuhara, Tetsu Saburi, Masayuki Hisada:
Coping with the Complexity of SOA Systems with Message Forensics. 732-737
Network Security
- Vinod P. Nair, Vijay Laxmi, Manoj Singh Gaur:
REFORM: Relevant Features for Malware Analysis. 738-744 - Ana Nieto, Javier López:
Security and QoS Tradeoffs: Towards a FI Perspective. 745-750 - Jung-Hyok Kwon, Eui-Jik Kim, Chul-Hee Kang:
CAD-MAC: Coverage Adaptive Directional Medium Access Control for mmWave Wireless Personal Area Networks. 751-754 - Jaehwan Lim, Yang-Hoon Kim, Yongsub Na, Hangbae Chang:
The Study for the User Oriented Service Design for Inter-organizational Collaboration. 755-759
The Fifth International Workshop on Data Management for Wireless and Pervasive Communications (DMWPC-2012)
VANET and WSN
- Songsheng Li, Xiaoying Kong, David B. Lowe:
Dynamic Path Determination of Mobile Beacons Employing Reinforcement Learning for Wireless Sensor Localization. 760-765 - Shogo Nakamura, Yoshiaki Hori, Kouichi Sakurai:
Communication-Efficient Anonymous Routing Protocol for Wireless Sensor Networks Using Single Path Tree Topology. 766-771 - Sheng-Tzong Cheng, Jian-Pan Li:
Using Interest-Aware Probabilistic for Leisure Information Dissemination in VANETs. 772-777
Data Processing and Management
- Kenji Ono, Tsutomu Terada, Masahiko Tsukamoto:
A Ubiquitous Data Logger that Selects an Efficient Data Compression Method. 778-782 - Taiga Abe, Hideyuki Kawashima, Hiroyuki Kitagawa:
An Efficient Stream Archiving Method by Operator Merge and Write Control. 783-788
The Fifth International Symposium on Mining and Web (MAW-2012)
Clustering and Classification
- Lifei Chen, Gongde Guo, Shengrui Wang:
Nearest Neighbor Classification by Partially Fuzzy Clustering. 789-794 - Elham Hoseini, Sattar Hashemi, Ali Hamzeh:
Link Prediction in Social Network Using Co-clustering Based Approach. 795-800 - Toshio Teraguchi, Kenji Nakamura, Shigenori Tanaka, Koichi Kitano:
Detection Method of Blog Spam Based on Categorization and Time Series Information. 801-808
Information Retrieval
- Joel Azzopardi, Christopher Staff:
Fusion of News Reports Using Surface-Based Methods. 809-814 - Yuichiro Tasaki, Tomohiro Fukuhara, Tetsuji Satoh:
Aggnel: An Information Aggregation System of Partial Contents from Multiple Web Pages. 815-820 - Sebastian Pretzsch, Klemens Muthmann, Alexander Schill:
FODEX - Towards Generic Data Extraction from Web Forums. 821-826
Feature Extraction and Representation
- Sheikh Muhammad Sarwar, Mosaddek Hossain Kamal:
Integration of Novel Image Based Features into Markov Random Field Model for Information Retrieval. 827-832 - Kosuke Takano, Kin Fun Li:
Classifying Sports Gesture Using Event-Based Matching in a Multimedia E-learning System. 833-838
Text Mining
- Dong Han, Kilian Stoffel:
Ontology Based Qualitative Methodology for Chinese Language Analysis. 839-844 - Toshihiro Ishikawa, Yasuhiro Yamada:
Development of Topic Navigation System for Assisting Searches on the Web. 845-850 - Ming-Fung Cheng, Korris Fu-Lai Chung, Siu-Nam Chuang:
GPU Accelerated Hot Term Extraction from User Generated Content. 851-856 - Tsendsuren Munkhdalai, Meijing Li, Taewook Kim, Oyun-Erdene Namsrai, Seon-Phil Jeong, Jungpil Shin, Keun Ho Ryu:
Bio Named Entity Recognition Based on Co-training Algorithm. 857-862
Behavior Models
- Tomonobu Ozaki, Minoru Etoh:
Social Network Discovery from Multiple Log Data through a Behavior Model. 863-868 - Atsuko Miyaji, Mohammad Shahriar Rahman:
Privacy-Preserving Set Operations in the Presence of Rational Parties. 869-874 - Hui-Huang Hsu, Yu-Fan Chen, Chi-Yi Lin, Cheng-Wei Hsieh, Timothy K. Shih:
Emotion Care Services with Facebook Wall Messages. 875-880
The Fifth International Workshop on Telecommunication Networking, Applications and Systems (TeNAS-2012)
Network Technologies and Applications I
- Hung-Yi Chang:
A Multipath Routing Algorithm for Degraded-Bandwidth Services under Availability Constraint in WDM Networks. 881-884 - Tananun Orawiwattanakul, Hideki Otsuki, Eiji Kawai, Shinji Shimojo:
Dynamic Time Scheduling in Advance Bandwidth Reservation. 885-890 - Shih-Hao Chang, Teh-Sheng Huang:
A Fuzzy Knowledge Based Fault Tolerance Algorithm in Wireless Sensor Networks. 891-896 - Atsushi Den, Katsuyoshi Iida:
Communication Quality Improvement Method through End Host Enhancements for TFRC-type Mobile Streaming. 897-902
Network Technologies and Applications II
- Wun-Yuan Huang, Jen-Wei Hu, Shu-Cheng Lin, Te-Lung Liu, Pang-Wei Tsai, Chu-Sing Yang, Fei Yeh, Jim Hao Chen, Joe Mambretti:
Design and Implementation of an Automatic Network Topology Discovery System for the Future Internet Across Different Domains. 903-908 - Ryo Oura, Saneyasu Yamaguchi:
Fairness Comparisons among Modern TCP Implementations. 909-914 - Tzu-Ming Wang, Wei-Tsong Lee, Tin Yu Wu, Hsin-Wen Wei, Yu-San Lin:
New P2P Sharing Incentive Mechanism Based on Social Network and Game Theory. 915-919
The Fifth International Workshop on Bio and Intelligent Computing (BICom-2012)
Genetic Algorithms and Simulated Annealing
- Li-Yeh Chuang, Ming-Cheng Lin, Hsueh-Wei Chang, Cheng-Hong Yang:
Odds Ratio-Based Genetic Algorithm for Prediction of SNP-SNP Interactions in Breast Cancer Association Study. 920-925 - Mark R. Kindl, Neil C. Rowe:
Evaluating Simulated Annealing for the Weighted-Region Path-Planning Problem. 926-931 - Yang Syu, Yong-Yi Fanjiang, Jong-Yih Kuo, Shang-Pin Ma:
A Genetic Algorithm with Prioritized Objective Functions for Service Composition. 932-937 - Huixing Peng, Yuebin Bai, Xiaoxia Liu:
End-to-End QoS Guaranteed Approach Using Multi-object Genetic Algorithm in Cognitive MANETs. 938-943
Fuzzy and Rule-Based Systems
- Kouhei Umezaki, Evjola Spaho, Yuichi Ogata, Leonard Barolli, Fatos Xhafa, Jiro Iwashige:
A Fuzzy-Based Trustworthiness System for JXTA-Overlay P2P Platform and Its Performance Evaluation Considering Three Parameters. 944-949 - Shigeaki Sakurai, Kyoko Makino, Shigeru Matsumoto:
A Discovery Method of Trend Rules from Complex Sequential Data. 950-955 - Li-Yeh Chuang, Yu-Da Lin, Hsueh-Wei Chang, Cheng-Hong Yang:
PCR-RFLP Primer Design Using Particle Swarm Optimization Combined with Chaotic Logistic Map. 956-961 - Qi Wang, Hironori Ando, Elis Kulla, Leonard Barolli, Arjan Durresi:
A Fuzzy-Based Cluster-Head Selection System forWSNs Considering Different Parameters. 962-967
Intelligent Control Systems and Applications
- Matti Mantere, Ilkka Uusitalo, Mirko Sailio, Sami Noponen:
Challenges of Machine Learning Based Monitoring for Industrial Control System Networks. 968-972 - Keita Matsuo, Yuichi Ogata, Kouhei Umezaki, Evjola Spaho, Leonard Barolli:
Design and Implementation of Waste Management Robots. 973-976 - Marek R. Ogiela, Lidia Ogiela:
Medical Visualizations in Secure Bio Computing. 977-980
The Fourth International Workshop on Information Technology for Innovative Services (ITIS-2012)
Innovative Systems
- Shinichiro Kibe, Motoi Yamagiwa, Minoru Uehara:
Proposal for Improving Throughput in Supersaturated Cloud. 981-986 - Kenichi Fujii, Motoi Yamagiwa, Minoru Uehara:
An Experiment and Discussion of the Reboot Feature on the Photovoltaic Grid System. 987-992 - Hideaki Yanagisawa:
Web-Based Environment for GUI Application Development. 993-998 - Gen Kitagata, Kazuto Sasai, Johan Sveholm, Hideyuki Takahashi, Tetsuo Kinoshita:
Network Management System Based on Activated Knowledge Resource. 999-1004
Innovative Applications and Security
- Nobuyoshi Sato, Ryota Takamagi, Tsuyoshi Takayama, Yoshitoshi Murata:
A Proposal of a Simplified Jumping Distance Measurement Method for Ski Jumper's Motion Monitoring System Using Terrestrial Magnetism and Acceleration Sensors. 1005-1010 - Yoshinari Nomura, Syunsuke Mihara, Hideo Taniguchi:
Implementation of a Practical Calendaring System Conforming with Ambiguous Pattern of Recurring Tasks. 1011-1016 - Peng Wan, Minoru Uehara:
Spam Detection Using Sobel Operators and OCR. 1017-1022 - Yuji Suga:
Interactive Fingerprint. 1023-1026 - Kenzi Watanabe, Makoto Otani, Shin-ichi Tadaki, Yoshiaki Watanabe:
Opengate on Cloud. 1027-1030
The Fourth International Workshop on Disaster and Emergency Information Network Systems (IWDENS-2012)
Disaster Information Networks
- Toshihiro Suzuki, Yoshitaka Shibata:
Wireless Network System with Autonomous Antenna Actuator Control for Disaster Information. 1031-1036 - Tetsuya Shigeyasu, Shota Katahira, Hitoshi Morioka, Hiroshi Matsuno:
Construction of IEEE802.11-based Wireless Network for Community Information Sharing in a Disaster-Affected Area. 1037-1042 - Noriki Uchida, Kazuo Takahata, Yoshitaka Shibata:
Network Relief Activity with Cognitive Wireless Network for Large Scale Disaster. 1043-1047 - Yutaka Sasaki, Yoshitaka Shibata:
A Disaster Information Sharing Method by the Mobile Servers in Challenged Networks. 1048-1053
Disaster Support Systems
- Yoshitaka Shibata, Noriki Uchida, Yuji Ohhashi:
Problem Analysis and Solutions of Information Network Systems on East Japan Great Earthquake. 1054-1059 - Norihisa Segawa, Yusuke Shinohe, Jun Sawamoto:
A Proposal of Forestry Worker Support System Using HMD. 1060-1064 - Erina Gyoba:
Differences in the Behaviors Collecting Information from Available Media between the Students of Afflicted and Those of Non-afflicted Prefectures in the Crisis Caused by the 2011 Off Pacific Coast of Tohoku Earthquake. 1065-1068 - Hiroaki Yuze, Naoyoshi Suzuki:
Development of Cloud Based Safety Confirmation System for Great Disaster. 1069-1074
The Third International Workshop on Cloud Computing, Services, and Interoperability (CCSI-2012)
- Byambajargal Byambajav, Tomasz Wiktor Wlodarczyk, Chunming Rong, Paea LePendu, Nigam Shah:
Performance of Left Outer Join on Hadoop with Right Side within Single Node Memory Size. 1075-1080 - Shinichi Sazawa, Masayoshi Hashima, Yuichi Sato, Kenichi Horio, Kazuki Matsui:
RVEC: Efficient Remote Desktop for the ENGINEERING CLOUD. 1081-1088 - Yuki Ashino, Masayuki Nakae:
Virtual Machine Migration Method between Different Hypervisor Implementations and Its Evaluation. 1089-1094 - Wu-Hsiao Hsu, Yuh-Pyng Shieh, Chia-Hui Wang, Sheng-Cheng Yeh:
Virtual Network Mapping through Path Splitting and Migration. 1095-1100
The Second International Workshop on Protocols and Applications with Multi-homing Support (PAMS-2012)
- Johan Eklund, Karl-Johan Grinnemo, Anna Brunström:
On the Use of an Increased Initial Congestion Window to Improve mSCTP Handover Performance. 1101-1106 - Pehr Söderman, Karl-Johan Grinnemo, Georgios Cheimonidis, Yuri Ismailov, Anna Brunström:
An SCTP-based Mobility Management Framework for Smartphones and Tablets. 1107-1112 - Thomas Dreibholz, Hakim Adhari, Martin Becke, Erwin P. Rathgeb:
Simulation and Experimental Evaluation of Multipath Congestion Control Strategies. 1113-1118 - Codé Diop, Guillaume Dugué, Christophe Chassot, Ernesto Exposito:
QoS-oriented MPTCP Extensions for Multimedia Multi-homed Systems. 1119-1124
The Second International Workshop on Complex Information Flows (CIF-2012)
- K. Habibul Kabir, Masahiro Sasabe, Tetsuya Takine:
Integer Programming Formulation for Grouping Clusters in Ferry-assisted DTNs. 1125-1130 - Hiroyuki Ohsaki, Yosuke Yamada, Dimitri Perrin, Makoto Imase:
Impact of Mobility Constraints on Epidemic Broadcast Mechanisms in Delay-Tolerant Networks. 1131-1136 - Sho Tsugawa, Hiroyuki Ohsaki, Makoto Imase:
Lightweight Distributed Method for Connectivity-based Clustering Based on Schelling's Model. 1137-1142 - Dimitri Perrin, Hiroyuki Ohsaki:
Decentralised Communication in Autonomous Agent Swarms. 1143-1146
The International Workshop on Bioinformatics and Life Science Modeling and Computing (BLSMC-2012)
- Jacques Demongeot, Jules Waku:
Robustness in Genetic Threshold Boolean Random Regulatory Networks: A Mathematical Approach. 1147-1152 - Jacques Demongeot, Olivier Hansen, Anne-Sophie Jannot, Carla Taramasco:
Random Modelling of Contagious (Social and Infectious) Diseases: Examples of Obesity and HIV and Perspectives Using Social Networks. 1153-1160 - Jimmy Nagau, Sébastien Régis, Jean-Luc Henry, Andrei Doncescu:
Study of Aggregation Operators for Scheduling Clusters in Digital Images of Plants. 1161-1166 - Sébastien Régis, Andrei Doncescu, Makoto Takizawa, Guillaume Cleuziou:
Initialization of Masses by the Okm for the Belief Function Theory: Application to System Biology. 1167-1171 - Mourad Benkaci, Andrei Doncescu, Makoto Takizawa:
Conflict Intersection as Diagnostic Model. 1172-1177
The First International Workshop on inter-Clouds and Collective Intelligence (iCCI-2012)
Efficient Resource Management and Allocation
- Chih-Wei Tsai, Zsehong Tsai:
Bid-Proportional Auction for Resource Allocation in Capacity-Constrained Clouds. 1178-1183 - Nik Bessis, Stelios Sotiriadis, Florin Pop, Valentin Cristea:
An Architectural Strategy for Meta-scheduling in Inter-clouds. 1184-1189 - Sheheryar Malik, Fabrice Huet, Denis Caromel:
Latency Based Dynamic Grouping Aware Cloud Scheduling. 1190-1195 - Tatsuya Mori, Makoto Nakashima, Tetsuro Ito:
A Sophisticated Ad Hoc Cloud Computing Environment Built by the Migration of a Server to Facilitate Distributed Collaboration. 1196-1202
Efficient Data Management and Allocation
- Ching-Ming Chao, Guan-Lin Chao:
Resource-Aware Density-and-Grid-Based Clustering in Ubiquitous Data Streams. 1203-1208 - Masaki Kohana, Shusuke Okamoto, Atsuko Ikegami:
Optimal Data Allocation for Keeping Fairness of Online Game. 1209-1214
Added Value for Inter-enterprises
- Andreas Mladenow, Elisabeth Fuchs, Paul Dohmen, Christine Strauss:
Value Creation Using Clouds: Analysis of Value Drivers for Start-Ups and Small and Medium Sized Enterprises in the Textile Industry. 1215-1220 - Martin Polaschek, Wolfgang Zeppelzauer, Natalia Kryvinska, Christine Strauss:
Enterprise 2.0 Integrated Communication and Collaboration Platform: A Conceptual Viewpoint. 1221-1226 - Oksana Urikova, Irena Ivanochko, Natalia Kryvinska, Christine Strauss, Peter Zinterhof:
Exploration of Factors Affecting the Advancement of Collaborative eBusiness in the Enterprises: Research Efforts Examination. 1227-1232 - Serguei Dobrinevski:
Organizational Pattern Discovery Linked to Activities. 1233-1237
Performance Analysis
- Fares Almari, Pavol Zavarsky, Ron Ruhl, Dale Lindskog, Amer Aljaedi:
Performance Analysis of Oracle Database in Virtual Environments. 1238-1245 - Hong-Chun Hsu, Pao-Lien Lai:
Adaptive Diagnosis for Grids under the Comparison Model. 1246-1251 - Joon S. Park, Edward Spetka, Hassan Rasheed, E. Paul Ratazzi, Keesook J. Han:
Near-Real-Time Cloud Auditing for Rapid Response. 1252-1257 - James Hardy, Lu Liu, Nik Bessis, Lei Cui, Jianxin Li:
Performance Measurements in iVIC Virtual Machine Clones. 1258-1263
Games, Social Networks and Collaboration
- Somayeh Koohborfardhaghighi, Juntae Kim:
Improving Recommendation Flow with Centrality Measure in an Evolving Social Network. 1264-1269 - Toshihiko Yamakami:
It is not a Game, Not Even Social: New Service Engineering Paradigms from Lessons Learned in Mobile Social Games in Japan. 1270-1274 - Michal Szczerbak, François Toutain, Ahmed Bouabdallah, Jean-Marie Bonnin:
Collaborative Context Experience in a Phonebook. 1275-1281 - Tadafumi Hayakawa, Masayuki Higashino, Kenichi Takahashi, Takao Kawamura, Kazunori Sugahara:
Management of Multimedia Data for Streaming on a Distributed E-learning System. 1282-1285
Security and Services
- Ronald Petrlic, Christoph Sorge:
Privacy-Preserving DRM for Cloud Computing. 1286-1291 - Qingni Shen, Yahui Yang, Zhonghai Wu, Xin Yang, Lizhe Zhang, Xi Yu, Zhenming Lao, Dandan Wang, Min Long:
SAPSC: Security Architecture of Private Storage Cloud Based on HDFS. 1292-1297 - Jarle Hansen, Tor-Morten Grønli, Gheorghita Ghinea:
Cloud to Device Push Messaging on Android: A Case Study. 1298-1303 - Wei Dai, Jonathan J. Liu, Axel Korthaus:
Towards a Framework for Context-Aware Services Management. 1304-1309
The 2012 International Symposium on Object-Oriented Intelligent Web Information Technologies and Applications (OIWITA-2012)
Cloud Computing and Energy Saving
- Sheng-Yuan Yang, Dong-Liang Lee:
Developing a Cloud Intelligent and Energy-Saving Information Interface Agent with Web Services. 1310-1315 - Chih-Yung Chen, Hsiang-Yi Tseng:
An Exploration of the Optimization of Excutive Scheduling in the Cloud Computing. 1316-1319 - Dong-Liang Lee, Kune-Yao Chen, Chun-Liang Hsu, Sheng-Yuan Yang:
Design for Middle-Way of Intelligent Energy-Saving System with Embedded System. 1320-1325
Platforms and Algorithms
- Kune-Yao Chen, Hsiu-Chuan Liu, Steve Tu:
A Study on the Establishment of Online S-P Platform. 1326-1331 - Dong-Liang Lee, Jih-Fu Tu, Hsuan-Jung Lee, Kwang Pi Chen:
Verifying the Produce of Car-Bind through Timed Petri Net. 1332-1336 - Lawrence Y. Deng, Yung-Hui Chen, Yi-Jen Liu:
Preference Sorting Based on User's Relevance Feedback. 1337-1342
The International Workshop on Networked Virtual Enterprises (NetVE 2012)
- Ugo Barchetti, Antonio Capodieci, Anna Lisa Guido, Luca Mainetti:
Collaborative Process Management for the Networked Enterprise: A Case Study. 1343-1348 - Hassan Fatemi, Marten van Sinderen, Roel J. Wieringa:
Managing Trust in Business Webs Using Game Theory. 1349-1354 - Vu Minh Hoang, Hanh Huu Hoang:
An Ontological Approach for Dynamic Cross-Enterprise Collaboration. 1355-1360
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.