


default search action
2. ANT / 8. MobiWIS 2011: Niagara Falls, Ontario, Canada
- Elhadi M. Shakshuki, Muhammad Younas:
Proceedings of the 2nd International Conference on Ambient Systems, Networks and Technologies (ANT 2011), the 8th International Conference on Mobile Web Information Systems (MobiWIS-2011), Niagara Falls, Ontario, Canada, September 19-21, 2011. Procedia Computer Science 5, Elsevier 2011 - Elhadi M. Shakshuki
, Muhammad Younas:
Preface. 10-17 - Muhammad Younas, Elhadi M. Shakshuki
, Quan Z. Sheng
:
Preface. 18-24 - Jiang Li:
Preface. 25-33 - Hossam S. Hassanein:
Keynote I: Sensing and Identification in the Internet of Things Era. 34-35 - Diane McKerliea:
Keynote II: User Centred Design for the Mobile Web. 36-37 - Gökçe Görbil, Erol Gelenbe:
Opportunistic Communications for Emergency Support Systems. 39-47 - Koosha Paridel, Ansar-Ul-Haque Yasar
, Yves Vanrompay, Davy Preuveneers, Yolande Berbers:
Teamwork on the Road: Efficient Collaboration in VANETs with Context-based Grouping. 48-57 - Chih-Ning Huang, Chia-Tai Chan:
ZigBee-based indoor location system by k-nearest neighbor algorithm with weighted RSSI. 58-65 - Srideep Ghosh, Anurag D, Somprakash Bandyopadhyay:
Use of Wireless Mesh Network to Improve Mobile Asset Utilization in Manufacturing Industries. 66-73 - Oscar Botero, Hakima Chaouchi:
RFID service for non-RFID enabled devices: Embedded hardware implementation. 74-81 - Xiping Hu, Weichang Du, Bruce Spencer:
A Multi-Agent Framework for Ambient Systems Development. 82-89 - Mario Buchmayr, Werner Kurschl, Josef Küng:
A Simulator for Generating and Visualizing Sensor Data for Ambient Intelligence Environments. 90-97 - Naoto Kume, Mikko J. Rissanen:
Towards ambient communication support for power grid maintenance and repair. 98-105 - Hakilo Sabit
, Adnan Al-Anbuky
, Hamid Gholamhosseini
:
Wireless Sensor Network Based Wildfire Hazard Prediction System Modeling. 106-114 - Abidalrahman Moh'd, Hosein Marzi, Nauman Aslam, William J. Phillips, William Robertson:
A Secure Platform of Wireless Sensor Networks. 115-122 - Dusan Stevanovic, Natalija Vlajic, Aijun An:
Unsupervised Clustering of Web Sessions to Detect Malicious and Non-malicious Website Users. 123-131 - V. Sridhar, V. Raghavendar:
Key Predistribution Scheme for Grid Based Wireless Sensor Networks using Quadruplex Polynomial Shares per Node. 132-140 - Mohamed Helmy Megahed, Dimitrios Makrakis, Bidi Ying:
SurvSec: A New Security Architecture for Reliable Network Recovery from Base Station Failure of Surveillance WSN. 141-148 - R. Roopalakshmi
, G. Ram Mohana Reddy:
A Novel Approach to Video Copy Detection Using Audio Fingerprints and PCA. 149-156 - Usman Tariq
, Yasir Malik, Bessam Abdulrazak, Manpyo Hong:
Collaborative Peer to Peer Defense Mechanism for DDoS Attacks. 157-164 - Ali Najafizadeh, Ramiro Liscano, Miguel Vargas Martin, Peter C. Mason, Mazda Salmanian:
Challenges in the Implementation and Simulation for Wireless Side-Channel based on Intentionally Corrupted FCS. 165-172 - Adeeb M. Alhomoud, Rashid Munir, Jules Pagna Disso, Irfan Awan, Abdullah Al-Dhelaan:
Performance Evaluation Study of Intrusion Detection Systems. 173-180 - Babak Khosravifar, Jamal Bentahar
, Mahsa Alishahi, Maziar Gomrokchi:
Collusion-Resistant Reputation Mechanism for Multi-Agents Systems. 181-189 - Hao-Fan Yang
, Jinglan Zhang, Paul Roe:
Using Reputation Management in Participatory Sensing for Data Classification. 190-197 - Omar Cheikhrouhou
, Anis Koubaa
, Gianluca Dini
, Hani Alzaid, Mohamed Abid:
LNT: a Logical Neighbor Tree for Secure Group Management in Wireless Sensor Networks. 198-207 - Abderrahmen Guermazi, Mohamed Abid:
An Efficient Key Distribution Scheme to Secure Data-Centric Routing Protocols in Hierarchical Wireless Sensor Networks. 208-215 - Tahir Emre Kalayci
, Majid Bahrepour, Nirvana Meratnia, Paul J. M. Havinga:
How Wireless Sensor Networks Can Benefit from Brain Emotional Learning Based Intelligent Controller (BELBIC). 216-223 - Fadi M. Al-Turjman, Hossam S. Hassanein, Sharief M. A. Oteafy
:
Towards Augmenting Federated Wireless Sensor Networks. 224-231 - Mohd Izani Mohamed Rawi, Adnan Al-Anbuky
:
Development of Intelligent Wireless Sensor Networks for Human Comfort Index Measurement. 232-239 - Takuya Iwai, Naoki Wakamiya, Masayuki Murata
:
Proposal for Dynamic Organization of Service Networks over a Wireless Sensor and Actuator Network. 240-247 - Xinyu Xing, Yifei Jiang, Shivakant Mishra:
Understanding Characteristics of Available Bandwidth in Wireless Environment. 248-254 - Wen Sun, Lianying Ji, Wai-Choong Wong
:
Optimized Handover Strategy with Movement Trend Awareness for Body Sensor Networks. 255-263 - Ahmad El Kouche, Louai Al-Awami
, Hossam S. Hassanein:
Dynamically Reconfigurable Energy Aware Modular Software (DREAMS) Architecture for WSNs in Industrial Environments. 264-271 - Fredrick Mzee Awuor
, Karim Djouani
, Guillaume Noel:
Joint Power and Rate Adaptation in Ad Hoc Networks Based on Coupled Interference. 272-279 - Yu Lu
, Mehul Motani
, Wai-Choong Wong
:
The User-Context Module: A New Perspective on Future Internet Design. 280-287 - Jit Biswas, Aung Aung Phyo Wai, Andrei Tolstikov, Jinhong Kenneth Lin, Maniyeri Jayachandran, Victor Foo Siang Fook, Alwyn Vwen Yen Lee
, Clifton Phua, Jiaqi Zhu, Huynh Thai Hoa, Thibaut Tiberghien, Hamdi Aloulou, Mounir Mokhtari:
From Context to Micro-context - Issues and Challenges in Sensorizing Smart Spaces for Assistive Living. 288-295 - Patrice Roy, Bessam Abdulrazak, Yacine Belala:
A Distributed Architecture for Micro Context-Aware Agents. 296-303 - Ichiro Satoh:
Building and Operating Context-aware Services for Groups of Users. 304-311 - Peyman TalebiFard, Victor C. M. Leung
:
A Data Fusion Approach to Context-Aware Service Delivery in Heterogeneous Network Environments. 312-319 - Paul Couderc, Michel Banâtre, Fabien Allard:
Pervasive Integrity Checking With Coupled Objects. 320-327 - Stephan Bosch
, Raluca Marin-Perianu, Paul J. M. Havinga, Mihai Marin-Perianu:
Energy-Efficient Assessment of Physical Activity Level Using Duty-Cycled Accelerometer Data. 328-335 - Nicola Corriero, Emanuele Covino
, Angelo Mottola:
An approach to use FB-AODV with Android. 336-343 - Neeta Trivedi, Narayanaswamy Balakrishnan:
Arresting Particle Hijack in Multitarget Tracking. 344-353 - Ahmad Nazari Mohd Rose, Hasni Hassan, Mohd Isa Awang
, Nor Aida Mahiddin
, Hidayatulaminah Mohd Amin, Mustafa Mat Deris:
Solving Incomplete Datasets in Soft Set Using Supported Sets and Aggregate Values. 354-361 - Anas El Husseini, Abdallah M'hamed, Bachar El-Hassan, Mounir Mokhtari:
A Novel Trust-Based Authentication Scheme for Low-Resource Devices in Smart Environments. 362-369 - Thais R. M. Braga Silva, Linnyer Beatrys Ruiz, Antonio Alfredo Ferreira Loureiro, Fabrício A. Silva:
CReMe: a Dynamic and Flexible Conflict Resolution Methodology for Competitive Ambient Systems. 370-377 - Vivek Menon
, Bharat Jayaraman, Venu Govindaraju:
Spatio-Temporal Reasoning in Biometrics Based Smart Environments. 378-385 - Sasa Savic, Hao Shi:
An Intelligent Object Framework for Smart Living. 386-393 - Markus Aleksy
, Mikko J. Rissanen, Sylvia Maczey, Marcel Dix:
Wearable Computing in Industrial Service Applications. 394-400 - Dana Popovici, Mikael Desertot, Sylvain Lecomte, Thierry Delot
:
When the context changes, so does my transportation application: VESPA. 401-408 - Mohammad Zarifi Eslami, Alireza Zarghami, Brahmananda Sapkota, Marten van Sinderen:
Personalized Service Creation by Non-technical Users in the Homecare Domain. 409-417 - Anand Dersingh, Z. M. Faizul Islam, Shahram Shah-Heydari, Md. Mustafizur Rahman:
OLSR-based Topology Discovery for Mobile Situational Awareness Systems. 418-425 - Mayu Iwata, Takahiro Hara, Kentaro Shimatani, Tomohiro Mashita, Kiyoshi Kiyokawa, Shojiro Nishio, Haruo Takemura
:
A Location-based Content Search System Considering Situations of Mobile Users. 426-433 - Hiroki Miyamoto, Daijiro Komaki, Takahiro Hara, Kentaro Shimatani, Tomohiro Mashita, Kiyoshi Kiyokawa, Toshiaki Uemukai, Shojiro Nishio, Haruo Takemura
:
A Menu-based Content Search Support System Considering Mobile User's Situations. 434-441 - Ram Babu Roy, Uttam Kumar Sarkar:
Identifying influential stock indices from global stock markets: A social network analysis approach. 442-449 - G. Poornalatha
, Prakash S. Raghavendra:
Alignment Based Similarity distance Measure for Better Web Sessions Clustering. 450-457 - Haroon Malik, Ahsan Samad Malik:
Towards Identifying the Challenges Associated with Emerging Large Scale Social Networks. 458-465 - Said Elnaffar, Zakaria Maamar
:
Composite Web Services Formation Using a Social Network of Web Services: A Preliminary Investigation. 466-471 - Yingchi Mao:
Greedy-Face-Greedy Routing based Human Tracking in Mobile Social Networks. 472-479 - Maytham Safar
, Ibrahim Sorkhoh
, Hisham Farahat, Khaled Mahdi:
On Maximizing the Entropy of Complex Networks. 480-488 - Wail Mardini
, Yaser M. Khamayseh
, Marwa Salayma:
Optimal Power Consumption in Cooperative WSNs for a random Distance using a linear propagation model. 489-496 - Kevin Bouchard
, Bruno Bouchard, Abdenour Bouzouane:
A new qualitative spatial recognition model based on Egenhofer topological approach using C4.5 algorithm: experiment and results. 497-504 - Mohammed T. Lazim, Muthanna J. M. Al-khishali, Ahmed Isa. Al-Shawi:
Space Vector Modulation Direct Torque Speed Control Of Induction Motor. 505-512 - Atif Farid Mohammad, Hamid Mcheick
:
Cloud Services Testing: An Understanding. 513-520 - Amirreza Masoumzadeh, James Joshi:
An Alternative Approach to k-Anonymity for Location-Based Services. 522-530 - Micah Jones, Kevin W. Hamlen:
A Service-oriented Approach to Mobile Code Security. 531-538 - Debopam Acharya
, Vijay Kumar:
Security of MBAN based Health Records in Mobile Broadband Environment. 539-545 - Steven Salerno, Ameya Sanzgiri, Shambhu J. Upadhyaya:
Exploration of Attacks on Current Generation Smartphones. 546-553 - Elien Paret, William Van Woensel, Sven Casteleyn
, Beat Signer
, Olga De Troyer:
Efficient Querying of Distributed RDF Sources in Mobile Settings based on a Source Index Model. 554-561 - Debmalya Biswas, Nikolai Nefedov, Valtteri Niemi:
Distributed Usage Control. 562-569 - Mandana Sotoodeh, Rachel Pottinger, Philippe Kruchten
:
Towards Supporting Users in Semantic Exploration of Large Distributed Schemas. 570-577 - Ghada Hassan, Hamidah Ibrahim, Md Nasir Sulaiman, Rasali Yakob
:
A Domain-based query routing mechanism for peer-to-peer networks. 578-585 - Pascal Bihler, Paul Imhoff, Armin B. Cremers:
SmartGuide - A Smartphone Museum Guide with Ultrasound Control. 586-592 - Eduardo S. Barrenechea, Paulo S. C. Alencar:
An Adaptive Context-Aware and Event-Based Framework Design Model. 593-600 - Jean-Charles Grégoire, Angèle M. Hamel:
ALPINe: Another Location Privacy Information Network. 601-609 - Hamdi Yahyaoui
, L. Wang, Azzam Mourad
, Mohammed Almulla, Quan Z. Sheng
:
Towards context-adaptable Web service policies. 610-617 - Verdi March, Yan Gu, Erwin Leonardi, George Goh, Markus Kirchberg
, Bu-Sung Lee
:
μCloud: Towards a New Paradigm of Rich Mobile Applications. 618-624 - Shomoyita Jamal, Ralph Deters
:
Using a Cloud-Hosted Proxy to support Mobile Consumers of RESTful Services. 625-632 - Satish Narayana Srirama
, Carlos Paniagua, Huber Flores:
CroudSTag: Social Group Formation with Facial Recognition and Mobile Cloud Services. 633-640 - Carlos Duarte
, Ana Paula Afonso
:
Developing once, deploying everywhere: A case study using JIL. 641-644 - Antti Peuhkurinen, Tommi Mikkonen, Mikko Terho:
Using RDF Data as Basis for 3D Window Management in Mobile Devices. 645-652 - Arun K. Datta, Andi Sumargo, Victoria Jackson, Pradip P. Dey:
mCHOIS: An Application of Mobile Technology for Childhood Obesity Surveillance. 653-660 - Tommi Mikkonen, Mikko Terho, Mikko Kuusipalo, Pekka Reijula:
Scriptable web applications as first-class citizens. 661-668 - Jeff DePree, Stanley Y. W. Su:
Defining, executing and evolving microfranchise templates. 669-676 - Olexiy Chudnovskyy, Hendrik Gebhardt, Frank Weinhold, Martin Gaedke
:
Business Process Integration using Telco Mashups. 677-680 - Ian Warren, Thiranjith Weerasinghe, Ralph Maddison
, Y. Wang:
OdinTelehealth: A Mobile Service Platform for Telehealth. 681-688 - Kidd S. C. Toh, S. M. F. D. Syed Mustapha
:
Towards Building Semantic Next Generation Network - A Preliminary Study. 689-696 - Wafaa Ait-Cheik-Bihi, Mohamed Bakhouya
, Ahmed Nait-Sidi-Moh
, Jaafar Gaber
, Maxime Wack:
A Platform for Interactive Location-Based Services. 697-704 - Mingzhen Mo, Irwin King
, Kwong-Sak Leung:
Empirical Comparisons of Attack and Protection Algorithms for Online Social Networks. 705-712 - Kashinath Basu, Muhammad Younas:
A framework for peer-to-peer video streaming over WiMax. 713-720 - Natalia Kryvinska
, Christine Strauss
:
A Scenario-based Framework for Perceiving Crossbreed Service Interactions. 721-728 - Su-Hua Wang, Durgesh Samadhiya, Dengjie Chen:
Software Development and Quality Problems and Solutions by TRIZ. 730-735 - Amjad Gawanmeh
:
Embedding and Verification of ZigBee Protocol Stack in Event-B. 736-741 - Tahani Hussain, Sami Habib:
Assessing and Redesigning Enterprise Networks through NS-2 to Support VoIP. 742-748 - Ali El Kateeb:
Next-Generation Wireless Sensor Networks Infrastructure Development for Monitoring Applications. 749-753 - Hong Zhou, Gang Su, Guofang Li:
Forecasting Daily Gas Load with OIHF-Elman Neural Network. 754-758 - Abdulmutalib Masaud-Wahaishi, Ahmed M. Gaouda:
Intelligent Monitoring and Control Architecture for Future Electrical Power Systems. 759-764 - Nicola Corriero, Giuseppe Gargiuolo, Giovanni Pani
:
IFHNFS: fast indexing information in mobile devices. 765-770 - Bettina Biel, Stefan Seitz, Volker Gruhn:
Towards Pattern-based Generic Interaction Scenarios. 771-775 - Stefan Stieglitz, Christian Kaufhold:
Automatic Full Text Analysis in Public Social Media - Adoption of a Software Prototype to Investigate Political Communication. 776-781 - Gleneesha Johnson, Paulo Shakarian, Neha Gupta, Ashok K. Agrawala:
Towards Shrink-Wrapped Security: Practically Incorporating Context Into Security Services. 782-787 - Chao Wu, Yike Guo:
Detecting insecure person in crowd with human sensor. 788-792 - Woong Hee Kim, Sunyoung Lee, Jongwoon Hwang:
Real-time Energy Monitoring and Controlling System based on ZigBee Sensor Networks. 794-797 - Juan Lu, Adrien van den Bossche, Eric Campo:
An Adaptive and Distributed Collision-Free MAC Protocol for Wireless Personal Area Networks. 798-803 - Sofiane Moad, Morten Tranberg Hansen, Raja Jurdak
, Branislav Kusy, Nizar Bouabdallah:
Load Balancing Metric with Diversity for Energy Efficient Routing in Wireless Sensor Networks. 804-811 - Mohamadreza Shahrokhzadeh, Abolfazl Toroghi Haghighat, Fariborz Mahmoudi, Behrooz Shahrokhzadeh
:
A Heuristic Method for Wireless Sensor Network Localization. 812-819 - Stefan Stieglitz, Christoph Fuchß:
Challenges of MANET for Mobile Social Networks. 820-825 - Prapassara Pupunwiwat, Peter Darcy, Bela Stantic:
Conceptual Selective RFID Anti-Collision Technique Management. 827-834 - Ismael Abad
, Carlos Cerrada, José Antonio Cerrada
, Vicente Dies:
RRTL: RFID Reader Topology Language. A language to manage RFID reader's networks. 835-840 - Harold Boeck
, Jean Roy, Fabien Durif, Marc Grégoire:
The effect of perceived intrusion on consumers' attitude towards using an RFID-based marketing program. 841-848 - Ygal Bendavid, Harold Boeck
:
Using RFID to Improve Hospital Supply Chain Management for High Value and Consignment Items. 849-856 - Michele Ruta
, Simona Colucci
, Floriano Scioscia
, Eugenio Di Sciascio
, Francesco M. Donini
:
Finding Commonalities in RFID Semantic Streams. 857-864 - Kan Yu, Mikael Gidlund
, Johan Åkerberg, Mats Björkman:
Reliable and Low Latency Transmission in Industrial Wireless Sensor Networks. 866-873 - John Khalil, Ramiro Liscano:
Wireless Sensor Actor Network Simulation for a Fire Extinguishing System. 874-880 - Ali A. Abed
, Abdul Adhem A. Ali
, Nauman Aslam, Ali F. Marhoon
:
A Robust Neural Fuzzy Petri Net Controller For A Temperature Control System. 881-890 - Daniele Magliocchetti, Martin Gielow, Federico De Vigili, Giuseppe Conti, Raffaele De Amicis
:
A Personal Mobility Assistant based on Ambient Intelligence to Promote Sustainable Travel Choices. 892-899 - Scott Cadzow:
The protection of privacy in the i-Tour framework. 900-905 - Cristina d'Alessandro, Pier Carlo Trucco:
Business potential and market opportunities of intelligent LBSs for personal mobility - A European case study. 906-911 - Jianwei Zhang, Feixiong Liao
, Theo A. Arentze, Harry J. P. Timmermans:
A multimodal transport network model for advanced traveler information systems. 912-919 - Davide Calì, Antonio Condorelli, Santo Papa, Marius Rata, Luca Zagarella:
Improving intelligence through use of Natural Language Processing. A comparison between NLP interfaces and traditional visual GIS interfaces. 920-925 - Anita Fiorentino, Paquale Rovito, Sauro Straccali, Dario Donnari:
Innovative technologies to estimate public transport load in-real time by video content scene analysis. 926-931 - Frank Comeau, Nauman Aslam:
Analysis of LEACH Energy Parameters. 933-938 - Mazen G. Khair, Burak Kantarci, Hussein T. Mouftah:
Heterogeneous Clustering Of Sensor Network. 939-944 - Mohsen Maadani
, Seyed Ahmad Motamedi
, Hadi Safdarkhani:
Delay-Reliability Trade-off in MIMO-Enabled IEEE 802.11-Based Wireless Sensor and Actuator Networks. 945-950 - Mohammad Jalali, Nasser Ghasem-Aghaee:
A Fuzzy Reputation System in Vehicular Ad hoc Networks. 951-956

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.