default search action
INCoS 2016: Ostrawva, Czech Republic
- Fatos Xhafa, Leonard Barolli, Václav Snásel, Ivan Zelinka:
2016 International Conference on Intelligent Networking and Collaborative Systems, INCoS 2016, Ostrawva, Czech Republic, September 7-9, 2016. IEEE 2016, ISBN 978-1-5090-4124-4
Eighth IEEE International Conference on Intelligent Networking and Collaborative Systems (INCoS-2016)
Session 1: Intelligent Networking and Collaborative Systems
- Akihiro Fujihara:
Estimating Proper Communication Distance for Epidemic Routing in Japanese Urban Areas Using SNS-Based People Flow Data. 1-8 - Tatyana Golubeva, Sergey Konshin:
The Research of Possibility of Sharing Use of Wireless and Mobile Technologies for Organizing the Radio Channels of Operation Control System of Earthmoving and Construction Machines. 9-14 - Martina Drahosová, Peter Balco:
The Benefits and Risks of Enterprise Social Networks. 15-19 - Ahmad Raza Hameed, Nadeem Javaid, Saif ul Islam, Ghufran Ahmed, Umar Qasim, Zahoor Ali Khan:
BEEC: Balanced Energy Efficient Circular Routing Protocol for Underwater Wireless Sensor Networks. 20-26 - Jianshe Kang, Kun Wu, Kuo Chi, Yinxia Du:
Multi-class Intelligent Fault Diagnosis Approach Based on Modified Relevance Vector Machine. 27-30 - Zhenhua Li, Dong-Li Duan:
Node Importance of Complex Networks Based on Cascading Failure Dynamic. 31-35
Session 2: Cloud Computing for Secure Data and Management Systems
- Viliam Malcher:
Design Patterns in Management Systems. 36-39 - Marek R. Ogiela, Lidia Ogiela:
Data Understanding Techniques for Management Application and Cryptography. 40-43 - Xu An Wang, Fatos Xhafa, Zhiheng Zheng, Jinting Nie:
Identity Based Proxy Re-Encryption Scheme (IBPRE+) for Secure Cloud Data Sharing. 44-48 - Ziyun Deng, Jing Zhang:
A Cloud Platform for CAE Simulation in Supercomputing Enviroment. 49-52 - Ye Ding, He Xu, Peng Li, Jie Ding:
Review of Virtual Memory Optimization in Cloud Environment. 53-58 - Lei Chen, Jing Zhang, Lijun Cai, Ziyun Deng, Tinqing He, Xu An Wang:
Locality-Aware and Energy-Aware Job Pre-Assignment for Mapreduce. 59-65
Session 3: Intelligent Systems for Collaborative Robotics and Sensing
- Peter Beno, Vladimir Pavelka, Frantisek Duchon, Martin Dekan:
Using Octree Maps and RGBD Cameras to Perform Mapping and A* Navigation. 66-72 - Ján Vascák, Jakub Hvizdo, Michal Puheim:
Agent-Based Cloud Computing Systems for Traffic Management. 73-79 - Denis Vere, Rudolf Jaka, Jakub Hvizdo:
Neural Network Based Ball Tracking for Robot Nao. 80-85 - Adam Viktorin, Michal Pluhacek, Roman Senkerik:
Network Based Linear Population Size Reduction in SHADE. 86-93 - Kun Wu, Jianshe Kang, Xu An Wang:
Research on Failure Prognostics Method of Electronic System Based on Improved Fruit Fly Algorithm and Grey Fast Relevance Vector Machine. 94-98 - Yan-Hua Liang, Wei-Min Tian:
Multi-sensor Fusion Approach for Fire Alarm Using BP Neural Network. 99-102
Session 4: Semantics, Social Networking and Collaborative Systems
- Giuseppe Fenza, Vincenzo Loia, Francesco Orciuoli:
Providing Smart Objects with Intelligent Tutoring Capabilities by Semantic Technologies. 103-109 - Fatos Xhafa, Adriana Bogza, Santi Caballé, Leonard Barolli:
Apache Mahout's k-Means vs Fuzzy k-Means Performance Evaluation. 110-116 - Kahina Rabahallah, Faiçal Azouaou, Mohamed Tayeb Laskri:
Ontology-Based Approach for Semantic Description and the Discovery of e-Learning Web Services. 117-124 - Yutao Wu, Xisheng Jia, Liang Wen, Xu An Wang:
An Optimization Research on the Alternate Interval for Electronic Products. 125-129 - Feng Ye, Shengyan Wu, Qian Huang, Xu An Wang:
The Research of Enhancing the Dependability of Cloud Services Using Self-Healing Mechanism. 130-134 - Tao Meng, Lijun Cai, Tinqinq He, Lei Chen, Ziyun Deng:
An Improved Community Detection Algorithm Based on the Distance Dynamics. 135-142
Session 5: Wireless, Mobile and Cognitive Networking Systems
- Yoshifumi Kamada, Tsuyoshi Yamasaki, Yuki Tsuno, Nobuyuki Tsuchimura, Hiroyoshi Miwa:
Traffic Control Method for Interactive Projection Mapping Control System. 143-149 - Jésica de Armas, Pere Tuset, Tengfei Chang, Ferran Adelantado, Thomas Watteyne, Xavier Vilajosana:
Determinism through Path Diversity: Why Packet Replication Makes Sense. 150-154 - Tomasz Hachaj:
Creating Dynamically Changing World Map for Computer Games with Advanced Image Processing - A Use Case. 155-160 - Lijie Wang, Yi Tang, Bo Yuan, Dangfeng Zhu:
A Stackelberg Game for DSTC-Based Cognitive Radio Networks with Multiple Cooperative Relays. 161-166 - Wang Li:
An Identity-Based Proxy Signature Scheme from Lattices in the Standard Model. 167-172 - Babar Ali, Nadeem Javaid, Saif ul Islam, Ghufran Ahmed, Umar Qasim, Zahoor Ali Khan:
RSM and VSM: Two New Routing Protocols for Underwater WSNs. 173-179
Session 6: Hidden Complex Networks
- Michal Pluhacek, Roman Senkerik, Adam Viktorin, Ivan Zelinka:
Creating Complex Networks Using Multi-swarm PSO. 180-185 - Roman Senkerik, Adam Viktorin, Michal Pluhacek:
On the Transforming of the Indices Selection Mechanism inside Differential Evolution into Complex Network. 186-192 - Ivan Zelinka, Lukas Tomaszek, Lumír Kojecký:
On Evolutionary Dynamics Modeled by Ant Algorithm. 193-198 - Licheng Wang, Jing Li, Jianhua Yan, Zhiguo Qu:
An Efficient Proxy Re-Encryption Based on (Semi) Group Factorization Problems. 199-202 - Lu Cheng, Peng Xu, Yuechuan Wei:
New Related-Key Impossible Differential Attack on MIBS-80. 203-206 - Michal Vasinek, Jan Platos, Václav Snásel:
Limitations on Low Variance k-Fold Cross Validation in Learning Set of Rules Inducers. 207-214
Session 7: Nature's Inspired Computing and Optimization
- Pavel Krömer, Jaromir Konecny, Michal Prauzek:
Point-Based Scan Matching by Differential Evolution. 215-221 - Javier Arellano-Verdejo, Enrique Alba:
Optimal Allocation of Public Parking Slots Using Evolutionary Algorithms. 222-228 - Dimitris Souravlias, Gabriel Luque, Enrique Alba, Konstantinos E. Parsopoulos:
Smart Traffic Lights: A First Parallel Computing Approach. 229-236 - Wenbin Cao, Qiwei Hu, Wenyuan Song, Yutao Wu:
Mission-Oriented Maintenance Optimization Subject to Resources Constraints. 237-243 - Muhammad Hassan Rahim, Nadeem Javaid, Muhammad Bilal Janjua, Muhammad Naeem, Zahoor Ali Khan, Umar Qasim:
Comparative Assessment of Performance for Home Energy Management Controller in Smart Grid. 244-250 - Yun-Yuan Dong:
The Features of Low-Connectivity Essential Proteins. 251-254
Session 8: Machine Learning and Mining
- Alexander Amigud, Joan Arnedo-Moreno, Thanasis Daradoumis, Ana-Elena Guerrero-Roldán:
A Behavioral Biometrics Based and Machine Learning Aided Framework for Academic Integrity in E-Assessment. 255-262 - Tomasz Hachaj:
How to Solve Common Human Actions Recognition Use Cases with Gesture Description Language. 263-269 - Lidia Ogiela, Marek R. Ogiela:
Knowledge Management Approaches for Data Understanding. 270-273 - Xuan Guo, Yixiao Sun, Zhiting Xiao, Wenhui Wu:
Using Exploratory Analysis Modeling to Study the Correlation between EEG Signal and Respiratory Rhythm. 274-279 - Qian Xu, Jie Deng:
Identity Authentication System Based on Fingerprint Identification and Pulse Certification. 280-284 - Yuechuan Wei, Yisheng Rong, Xu An Wang:
New Differential Fault Attack on Lightweight Cipher LBlock. 285-288
Session 9: Intelligent Algorithms for Scheduling, Resource Management and Image Processing
- Wu Meng, Gao Yang, Guan Bin, Li Kui:
Wide Image Geometric Mosaic and Measure Algorithm of Mobile Mapping System. 289-293 - Chun He:
Research of Web Resources Protection Based on Digital Watermarking and Digital Signature. 294-297 - Feng Ye, Shengyan Wu, Qian Huang, Xu An Wang:
A Novel QoS-Aware Load Balancing Mechanism in Cloud Environment. 298-301 - Yang Liu, Yubo Yang, Jing Wang:
Binocular Stereo Vision Based Face Recognition Using Sparse Representation. 302-306 - Jing Zhang, Juan Li:
Retail Commodity Sale Forecast Model Based on Data Mining. 307-310
Session 10: Secure Intelligent Collaborative Systems
- Jing Li, Licheng Wang, Xinxin Niu:
A Star-Topological Privacy Encryption for Telecare Medical Information Systems. 311-317 - Miao Zhang, Yang Liu, Jiteng Wang, Yangyu Hu:
A New Approach to Security Analysis of Wireless Sensor Networks for Smart Home Systems. 318-323 - Yang Su, Yuechuan Wei, Mingshu Zhang:
Research and Design of Dedicated Instruction for Reconfigurable Matrix Multiplication of VLIW Processor. 324-327 - Xu An Wang, Fatos Xhafa, Wei Hao, Wei He:
Non-transferable Unidirectional Proxy Re-Encryption Scheme for Secure Social Cloud Storage Sharing. 328-331 - Mudassir Ejaz, Anwar Khan, Muhammad, Umar Qasim, Zahoor Ali Khan, Nadeem Javaid:
Position Aware Mobility Pattern of AUVs for Avoiding Void Zone in Underwater WSNs. 332-338
Sixth International Workshop on Adaptive Learning via Interactive, Collaborative and Emotional approaches (ALICE-2016)
Session 1: Formative Assessment and Learners' Profiling
- David Bañeres:
Towards a Personalized Summative Model Based on Learner's Preferences. 339-344 - Isabel Guitart, Jordi Conesa, Jordi Casas-Roma:
A Preliminary Study about the Analytic Maturity of Educational Organizations. 345-350 - David Bañeres, Jordi Conesa:
eOrient@ - A Recommender System to Address Life-Long Learning and Promote Employability. 351-356
Session 2: Interactive Learning Systems and Analytics
- Daniele Toti, Marco Rinelli:
On the Road to Speed-Reading and Fast Learning with CONCEPTUM. 357-361 - David Gañán, Santi Caballé, Robert Clarisó, Jordi Conesa:
A Prototype of an eLearning Platform in Support for Learning Analytics and Gamification. 362-369 - Giuliana Dettori:
Learning through the Design of Interactive Storie: Exploring the Concept of Storyworld. 370-374
International Workshop on Evolution of Social Networks (ESN 2016)
Session 1: Evolution of Social Networks
- Milos Kudelka, Jan Platos, Pavel Krömer:
Author Evaluation Based on H-Index and Citation Response. 375-379 - Jialin Ma, Yongjun Zhang, Jinling Liu, Kun Yu, Xu An Wang:
Intelligent SMS Spam Filtering Using Topic Model. 380-383 - Jianghao Jin, Xie Zhou, Chuangui Ma, Xu An Wang:
A Rational Secret Sharing Relying on Reputation. 384-387 - Haibin Yang, Ling Zhang:
A Secure Private Information Retrieval in Cloud Environment. 388-391
Frontiers in Intelligent Networking and Collaborative Systems (FINCoS-2016)
Session 1: Frontiers in Intelligent Networking Systems and Application
- Haiming Cheng, Ling Huang, He Xu, Yifan Hu, Xu An Wang:
Design and Implementation of Library Books Search and Management System Using RFID Technology. 392-397 - Jiewei Qian, He Xu, Peng Li:
A Novel Secure Architecture for the Internet of Things. 398-401 - Jianshe Kang, Kun Wu, Kuo Chi, Xu An Wang:
A Novel Multi-class Classification Approach Based on Fruit Fly Optimization Algorithm and Relevance Vector Machine. 402-406 - Yan-Hua Liang, Ze-Dong Qian:
A Calibration Approach for Accuracy Infrared Temperature. 407-410 - Kuo Chi, Jianshe Kang, Kun Wu, Xu An Wang:
Bayesian Parameter Estimation of Weibull Mixtures Using Cuckoo Search. 411-414 - Zuzana Sutova, Robert Vrabel:
Numerical Investigation of Initial Condition and Singular Perturbation Parameter Value Influence on the Dynamical System Oscillatory Behaviour. 415-419
2016 International Workshop on Intelligent Applications for Business Productivity (IABP 2016)
Session 1: Intelligent Applications for Business Productivity
- Hongxia Li, Kai Yan:
The Research of the University Public Opinion Management on Internet. 420-422 - Liying Chen, Feng Wang, Yutao Wu:
Research on Selecting Emergency Material Production Enterprises Based on Productivity Reserve. 423-427 - Seyed Mohammad Khalili, Mahla Babagolzadeh, Maziar Yazdani, Morteza Saberi, Elizabeth Chang:
A Bi-objective Model for Relief Supply Location in Post-Disaster Management. 428-434 - Ben Cheng, Shan Hu, Jiang-Wei Wang, Yun-Yuan Dong:
A Goal Programming Approach for Group Decision Making with Four Incomplete Preference Relations. 435-438
Eighth International Workshop on Information Network Design (WIND 2016)
Session 1: Network Design, Management and Performance
- Daishi Irie, Hiroyoshi Miwa:
Network Design Method by Finding Server Placement and Protected Links to Keep Connectivity to Servers Against Link Failures. 439-444 - Tsuyoshi Yamasaki, Makoto Anan, Hiroyoshi Miwa:
Network Design Method Based on Link Protection Taking Account of the Connectivity and Distance Between Sites. 445-450 - Satoshi Furutani, Chisa Takano, Masaki Aida:
Proposal of the Network Resonance Method for Estimating Eigenvalues of the Scaled Laplacian Matrix. 451-456 - Nguyen Viet Ha, Kazumi Kumazoe, Masato Tsuru:
Making TCP/NC Adjustable to Time Varying Loss Rates. 457-462 - Mario Koeppen, Kaori Yoshida:
The Price of Unfairness. 463-468
Second Workshop on Security and Privacy in Systems and Communication Networks (SecureSysComm 2016)
Session 1: Security and Privacy in Systems and Communication Networks
- Alessandra De Benedictis, Valentina Casola, Massimiliano Rak, Umberto Villano:
Cloud Security: From Per-Provider to Per-Service Security SLAs. 469-474 - Xuguang Wu, Minqing Zhang, Shuaishuai Zhu:
Certificateless Multi-signcryption Scheme in Standard Model. 475-479 - Ferdinando Campanile, Gianfranco Cerullo, Salvatore D'Antonio, Giovanni Mazzeo, Gaetano Papale, Luigi Sgaglione:
A Multi-sensor Data Fusion Approach for Detecting Direct Debit Frauds. 480-485 - Abir Awad, Sara Kadry, Guraraj Maddodi, Saul Gill, Brian Lee:
Data Leakage Detection Using System Call Provenance. 486-491 - Yukun Dong, Yalan Wang:
Fully Detection of Illegal Value Use Defects. 492-497 - Yang Lei, Xu An Wang, Hongyan Yin:
Intrusion Detection Techniques Based on Cutting-Based Real-Valued Negative Selection. 498-503
Second International Workshop for Collaborative e-Business Systems (IWCBS-2016)
Session 1: Collaborative e-Business Systems
- Jialin Ma, Yongjun Zhang:
Using Topic Model for Intelligent Computer-Aided Diagnosis in Traditional Chinese Medicine. 504-507 - Hongxia Li, Hongxi Di:
Research on the Job Stress Structure of Coal Miners Based on Textual Analysis. 508-511 - Weiwei Kong, Yang Lei, Jing Ma:
Data Security and Privacy Information Challenges in Cloud Computing. 512-514 - Hongxia Zhu, Xiuhua Lu:
The Prediction of PM2.5 Value Based on ARMA and Improved BP Neural Network Model. 515-517 - Yang Lei, Jia Liu, Hongyan Yin:
Intrusion Detection Techniques Based on Improved Intuitionistic Fuzzy Neural Networks. 518-521
Session 2: Intelligent Secure Collaborative e-Business Systems
- Wenbin Cao, Wenyuan Song, Qiwei Hu, Yinxia Du:
An Exact Method for Solving Selective Maintenance Problems Considering Imperfect Maintenance. 522-526 - Tanping Zhou, Xiaoyuan Yang, Xu An Wang, Yiliang Han:
Some Practical Properties of AP14. 527-531 - Jie Li, Hong Zhang:
Damage Effectiveness Evaluation on the Time Sensitive Group Targets for Trajectory Correction Missile Carrying with Terminal-Sensitive Projectiles. 532-537 - Yan-Fei Zhang, Jun-Yan Wu, Jie Li, Wan-Yi Liu:
A Review of the Research Literature on Civil-Military Integration Equipment Support Reform in the United States and Its Enlightenment. 538-543 - Jie Luo, Weiwei Kong:
The Infrared and Visible Light Image Fusion Based on the Non-subsample Shearlet Transform and Heat Source Concentration Ratio. 544-547 - Morteza Saberi, Anne Karduck, Omar Khadeer Hussain, Elizabeth Chang:
Challenges in Efficient Customer Recognition in Contact Centre: State-of-the-Art Survey by Focusing on Big Data Techniques Applicability. 548-554
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.