


default search action
9. IMIS 2015: Santa Cantarina, Brazil
- Leonard Barolli, Francesco Palmieri, Hélio dos Santos Silva, Hsing-Chung Chen:

9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2015, Santa Cantarina, Brazil, July 8-10, 2015. IEEE Computer Society 2015, ISBN 978-1-4799-8873-0
IMIS 2015
Session 1: MANETs and VANETs
- José M. García-Campos

, Daniel Gutiérrez-Reina, Sergio L. Toral Marín, Nik Bessis
, Federico Barrero
, Eleana Asimakopoulou, Richard Hill
:
Performance Evaluation of Reactive Routing Protocols for VANETs in Urban Scenarios Following Good Simulation Practices. 1-8 - Tetsuya Oda, Yi Liu, Keita Matsuo, Shinji Sakamoto

, Makoto Ikeda, Leonard Barolli:
Experimental Results of a CentOS-Based Ad-Hoc Network Testbed Considering LoS Scenario. 9-14 - Keita Matsuo, Tetsuya Oda, Donald Elmazi

, Shinji Sakamoto
, Leonard Barolli:
Performance Evaluation of AODV, OLSR and HWMP Protocols in Ad-Hoc Networks and MANET Scenarios. 15-21 - Vladi Kolici

, Tetsuya Oda, Yuki Sugihara, Evjola Spaho
, Makoto Ikeda, Leonard Barolli:
Performance Evaluation of a VANET Simulation System Using NS-3 and SUMO Considering Number of Vehicles and Crossroad Scenario. 22-27 - Noriki Uchida, Go Hirakawa, Tomoyuki Ishida, Yoshikazu Arai, Yoshitaka Shibata:

IEEE802.11 Based Vehicle-to-Vehicle Delay Tolerant Networks for Road Surveillance System in Local Areas. 28-33
Session 2: Multimedia and Medical Applications
- Xin Li, Xuehui Zhang, Xin Liu:

A Visual Analytics Approach for e-Learning Education. 34-40 - Yongwoo Kwon, Inhyeok Jeon, WooSeok Hyun, Jiyoung Lim, Ilsun You, Hae-Duck Joshua Jeong:

An Enhanced Java-Based Mobile Device Theft Response System. 41-46 - Ken Nishimura, Kaoru Sugita:

Evaluation of Power Consumption for Smart Devices in Web Applications. 47-52 - Bin Xie, Xinhuai Tang, Feilong Tang:

Hybrid Recommendation Base on Learning to Rank. 53-57 - Mauro Marcelo Mattos, Simone Erbs da Costa, Luciana Pereira de Araújo, Shaiane Mafra Casa, Eric Boeing:

Mobile Application to Support Community Health Workers Using GeneXus Smart Devices. 58-64 - Philip Moore

, Andrew M. Thomas, Tarik Qassem, Nik Bessis
, Bin Hu:
Monitoring Patients with Mental Disorders. 65-70
Session 3: Wireless Sensor Networks
- Hamza Fahim

, Nadeem Javaid
, Zahoor Ali Khan
, Umar Qasim, Shumaila Javed
, Amir Hayat, Zafar Iqbal, Ghazanfar Rehman:
Bio-inspired Routing in Wireless Sensor Networks. 71-77 - Hamza Fahim

, Nadeem Javaid
, Umar Qasim, Zahoor Ali Khan
, Shumaila Javed
, Amir Hayat, Zafar Iqbal, Ghazanfar Rehman:
Interference and Bandwidth Aware Depth Based Routing Protocols in Underwater WSNs. 78-85 - Hamza Fahim

, Nadeem Javaid
, Zahoor Ali Khan
, Umar Qasim, Shumaila Javed
, Danish Mahmood
, Zafar Iqbal:
Multilevel Routing Protocol for Energy Optimization in Wireless Sensor Networks. 86-93 - Guowei Wu, Chi Lin, Ying Li, Lin Yao, Ailun Chen:

A Multi-node Renewable Algorithm Based on Charging Range in Large-Scale Wireless Sensor Network. 94-100
Session 4: Network Protocols and Applications
- Giuseppe Cattaneo

, Luigi Catuogno, Fabio Petagna, Gianluca Roscigno
:
Reliable Voice-Based Transactions over VoIP Communications. 101-108 - Hewerton Enes de Oliveira, João Paulo de Araujo, Tales Heimfarth, João Carlos Giacomin:

An Adaptive Routing Protocol Based on Fixed Hubs for Opportunistic Networks. 109-116 - Vincenzo Lombardo

, Rossana Damiano, Antonio Lieto
:
Knowledge-Based Framework for the Virtual Communication of Public Art. 117-124 - Miyu Sugino, Shigenari Nakamura

, Tomoya Enokido, Makoto Takizawa
:
Trustworthiness-Based Broadcast Protocols in Wireless Networks. 125-132
Session 5: Location and Context-Aware Computing
- Tetsuya Oda, Donald Elmazi

, Algenti Lala, Vladi Kolici
, Leonard Barolli, Fatos Xhafa:
Analysis of Node Placement in Wireless Mesh Networks Using Friedman Test: A Comparison Study for Tabu Search and Hill Climbing. 133-140 - Tsubasa Ando, Tomoyuki Ishida, Noriki Uchida, Yoshitaka Shibata:

Proposal of the Digital Contents Management System Utilizing the AR Technology. 141-146 - Massimo Ficco, Francesco Palmieri

, Aniello Castiglione
:
Supporting First Responders Localization during Crisis Management. 147-152 - Makoto Ikeda, Seiichiro Ishikawa, Taiki Honda, Leonard Barolli:

Impact of Location of Road-Side Units Considering Message Suppression Method for Vehicular-DTN. 153-159
Session 6: Intelligent Computing
- Tomasz Hachaj

, Marek R. Ogiela:
Qualitative Evaluation of Full Body Movements with Gesture Description Language. 160-165 - Lidia Ogiela, Marek R. Ogiela:

Efficiency of Cognitive Information Systems Supporting Enterprise Management Tasks. 166-170 - Donald Elmazi

, Tetsuya Oda, Shinji Sakamoto
, Evjola Spaho
, Leonard Barolli, Fatos Xhafa:
Friedman Test for Analysing WMNs: A Comparison Study for Genetic Algorithms and Simulated Annealing. 171-178 - Marek R. Ogiela, Lidia Ogiela, Urszula Ogiela:

Biometric Methods for Advanced Strategic Data Sharing Protocols. 179-183
Session 7: Security, Trust and Privacy
- Xiwen Wu, Linpeng Huang, Chen Li

, Luxi Chen:
Estimating Software System Reliability: An Architecture-Based Approach. 184-191 - Luigi Catuogno, Clemente Galdi

:
Ensuring Application Integrity: A Survey on Techniques and Tools. 192-199 - Inshil Doh, Jiyoung Lim, Kijoon Chae:

Secure Authentication for Structured Smart Grid System. 200-204 - Luigi Catuogno, Stefano Turchi:

The Dark Side of the Interconnection: Security and Privacy in the Web of Things. 205-212 - Chi Lin, Guowei Wu, Kangbin Yim, Lin Yao, Gang Hou:

Compromising Ad-Hoc Networks by Attacking Weakly Connected Dominating Set. 213-220 - Kyungroul Lee, Ilsun You, Kangbin Yim:

Vulnerability Analysis on the CNG Crypto Library. 221-224
Session 8: Cloud Computing and P2P
- Weicheng Huai, Wei Huang, Shi Jin, Zhuzhong Qian:

Towards Energy Efficient Scheduling for Online Tasks in Cloud Data Centers Based on DVFS. 225-232 - Lin Li, Yilei Wang, Yanhui Ding, Yongxin Zhang:

Multi-tenants Data Duplication Secure Storage in SaaS. 233-238 - Glaucio H. S. Carvalho, Isaac Woungang, Alagan Anpalagan

, Leonard Barolli, Makoto Takizawa
:
Optimal Cloud Broker Method for Cloud Selection in Mobile Inter-cloud Computing. 239-244 - Yi Liu, Shinji Sakamoto

, Keita Matsuo, Leonard Barolli, Makoto Ikeda, Fatos Xhafa:
A Fuzzy-Based Reliability System for JXTA-Overlay P2P Platform Considering Number of Interaction, Security, Packet Loss and Local Score Parameters. 245-251 - Hiroki Nakayama, Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa

:
Synchronization of Peers in Peer-to-Peer Publish/Subscribe Systems. 252-259
BDITS 2015
Session 1: Network Resource Management and Intrusion Detection
- Xiaobing Liang, Baojiang Cui, Yingjie Lv, Yilun Fu:

Research on the Collaborative Analysis Technology for Source Code and Binary Executable Based upon the Unified Defect Mode Set. 260-264 - Ran Tao, Wenan Zhou, Xuhui Yang, Guanglin Han:

Passive Storage Based Wireless Network Resource Management for 4G LTE. 265-270 - Jingling Zhao, Rulin Gong:

A New Framework of Security Vulnerabilities Detection in PHP Web Application. 271-276 - Baojiang Cui, Shanshan He, Haifeng Jin:

Multi-layer Anomaly Detection for Internet Traffic Based on Data Mining. 277-282
Session 2: Big Data, Cloud Computing and Security
- Baojiang Cui, Tao Xi:

Security Analysis of Openstack Keystone. 283-288 - Chuan Fu, Jun Yang, Zheli Liu, Chunfu Jia:

A Secure Architecture for Data Storage in the Cloud Environments. 289-291 - Baojiang Cui, Peilin Shi, Haifeng Jin:

A Dynamic Self-Adaptive Algorithm for Uploading Deferrable Big Data to the Cloud Cost-Effectively. 292-295 - Jun Yang, Jiangdong Deng, Baojiang Cui, Haifeng Jin:

Research on the Performance of Mining Packets of Educational Network for Malware Detection between PM and VM. 296-300
esIoT 2015
Session 1: Networking, Security and IPv6 for the IoT
- Irish Singh

, Kamta Nath Mishra
, Antônio Marcos Alberti
, Dhananjay Singh
, Antonio J. Jara
:
A Novel Privacy and Security Framework for the Cloud Network Services. 301-305 - Henrich C. Pöhls:

JSON Sensor Signatures (JSS): End-to-End Integrity Protection from Constrained Device to IoT Application. 306-312 - José Luis Hernández-Ramos

, Jorge Bernal Bernabé
, Salvador Perez Franco, Antonio F. Skarmeta
:
Certificateless and Privacy-Enhancing Group Sharing Mechanism for the Future Internet. 313-318 - Ian Thomas, Lou Fedon, Antonio J. Jara

, Yann Bocchi:
Towards a Human Centric Intelligent Society: Using Cloud and the Web of Everything to Facilitate New Social Infrastructures. 319-324
Session 2: Adaptive IoT
- Timo Niemirepo, Markus Sihvonen

, Vesa Jordan, Juhani Heinilä:
Service Platform for Automated IoT Service Provisioning. 325-329 - Diego Gachet, Manuel de Buenaga Rodríguez, Enrique Puertas Sanz

, María Teresa Villalba
:
Big Data Processing of Bio-signal Sensors Information for Self-Management of Health and Diseases. 330-335 - Amelie Gyrard, Soumya Kanti Datta, Christian Bonnet

, Karima Boudaoud:
A Semantic Engine for Internet of Things: Cloud, Mobile Devices and Gateways. 336-341 - Olivier Flauzac, Carlos Gonzalez, Florent Nolot

:
SDN Based Architecture for Clustered WSN. 342-347 - Xi Luan, Jianjun Wu, Yuxin Cheng, Haige Xiang:

Dynamic Transmission Mode Selection and Resource Sharing Schemes for M2M Communications in Cellular Networks. 348-352
Session 3: IoT Solutions
- Mariam Barque, Luc Dufour, Dominique Genoud, Arnaud Zufferey, Bruno Ladevie, Jean Jacques Bezian

:
Solar Production Prediction Based on Non-linear Meteo Source Adaptation. 353-357 - Alex C. Olivieri, Gianluca Rizzo

:
Scalable Approaches to Integration in Heterogeneous IoT and M2M Scenarios. 358-363 - Borja Bordel Sánchez

, Álvaro Sánchez-Picot, Diego Sánchez de Rivera:
Using 5G Technologies in the Internet of Things Handovers, Problems and Challenges. 364-369 - Miguel A. Wister

, Pablo Pancardo
, Francisco D. Acosta
, José Adán Hernández-Nolasco
, Eddy Sánchez-DelaCruz:
Experiences with RFID Technology to Manage Information during Natural Disasters. 370-375
ITAUC 2015
Session 1: Intelligent Techniques and Algorithms for Ubiquitous Computing
- Chia-Hsin Cheng, Yeong-Long Shiue, Wei-Chia Lo, Hsing-Chung Chen:

Context-Aware Applications in Mobile Sink of Wireless Sensor Networks. 376-379 - Yen-Tsung Lin, Hsing-Chung Chun, Shu-Hui Chuang:

The Impact of Use of Information Technology Teaching for Kindergarten Education. 380-383 - Fengming Chang, Hsing-Chung Chen, Hsiang-Chuan Liu:

Double K-Folds in SVM. 384-387 - Xiaodong Yan:

A New Uighur Automatic Summarization Method. 388-393 - Ching-Kan Lo, Ye-Chi Wu, Cheng-Hung Chuang, Hsing-Chung Chen:

A Patient-Driven Mobile Medical Information System Applying to Physician Clinical Care. 394-398 - Ching-Kan Lo, Sin-Sen Chang, Cheng-Hung Chuang, Hsing-Chung Chen:

A Mobile Nursing App Applying to the Wound Care and Drug Administration of Patients. 399-402
MCNCS 2015
Session 1: Security, Wireless Sensor Network
- Fong-Mao Jhuang, Chi-Fu Hung, Chiu-Ching Tuan, Yi-Chao Wu, Fang-Yie Leu:

An AP Selection with RSS Standard Deviation for Indoor Positioning in Wi-Fi. 403-407 - Yu-Jen Chang, Fang-Yie Leu, Shih-Chieh Chen, Hei-Lam Wong:

Applying Web Crawlers to Develop a Sale Management System for Online Malls. 408-413 - Sen-Tarng Lai, Fang-Yie Leu:

A Security Threats Measurement Model for Reducing Cloud Computing Security Risk. 414-419 - Tien-Sheng Lin, I. Long Lin, Fang-Yie Leu:

Constructing Military Smartphone Usage Criterion of Cloud-DEFSOP for Mobile Security. 420-425
PISPIS 2015
Session 1: Security Issues in Public Internet Services
- Junyoung Park, Taeyoung Jung, Jaein Kim, Kangbin Yim:

Soliciting Unexpected Traffic Flows into VoLTE. 426-430 - Junghoon Park, Taeyoung Jung, Kangbin Yim:

Precise Exposure Control for Efficient Eye Tracking. 431-435 - Hyun Lock Choo, Sanghwan Oh, Jonghun Jung, Hwankuk Kim

:
The Behavior-Based Analysis Techniques for HTML5 Malicious Features. 436-440
Session 2: Privacy and Social Issues in Public Internet Services
- Gyu-Sang Cho:

NTFS Directory Index Analysis for Computer Forensics. 441-446 - Tharoeun Thap, Yunyoung Nam, Hee-Won Chung, Jinseok Lee

:
Simplified 3D Hologram Heart Activity Monitoring Using a Smartphone. 447-451 - Kwon-Ha Yoon, Tharoeun Thap, Chang-Won Jeong, Nam Ho Kim, Seung Noh, Yunyoung Nam, Jinseok Lee

:
Analysis of Statistical Methods for Automatic Detection of Congestive Heart Failure and Atrial Fibrillation with Short RR Interval Time Series. 452-457 - Tae-Yang Han, Se Dong Min, Yunyoung Nam:

A Real-Time Sleep Monitoring System with a Smartphone. 458-461
SMEUCE 2015
Session 1: Sustainability Management of e-Business and Information Management
- Kuei-Yuan Wang, Shu-E. Chung:

A Case Study of Valuation and Value Drivers in the Edible Oil and Fats Industry: TTET Union Corporation. 462-466 - Mei Hua Huang:

Professional Network Structure and Relationship Quality Effects on Member Knowledge Acquisition, Well-Being, and Performance. 467-473 - Mei Hua Huang:

Examining the Direct and Moderating Effects of Relational Exchange and Innovation Characteristics on New Product Adoption. 474-479 - Ying-Li Lin:

How to Enhance Market Value? A Balanced Scorecard Perspective. 480-484 - Ying-Li Lin:

How Do Political Relations Affect State-Owned Bank Loans? 485-488
Session 2: Ubiquitous Commerce Engineering and Operation Management
- Mei-Hua Liao, Li-Wen Chen, Saburo Horimoto:

The Relationship of Companies Social Connection and SEOs. 489-492 - Hidekazu Sone, Mei-Hua Liao:

Study of e-Business Strategy in Japanese Family Business and Long-Established Companies. 493-495 - Ya-Wen Yu, Shao-Chun Chiu, Chen-Yu Chen, Bolortuya Odser:

An Exploratory Study on Mongolian Women Consumer Behavior toward Purchasing Luxury Fashion Brands. 496-501 - Yen-Tsung Lin, Hsing-Chung Chun, Shu-Hui Chuang:

Explore the Development of Social Enterprises in Taiwan from the Dynamic Capabilities Approach. 502-505
WAIS 2015
Session 1: Privacy and Security
- Yuji Suga:

Consideration of the XOR-operation Based Secure Multiparty Computation. 506-510 - Hiroaki Kikuchi, Hiroaki Matsumoto, Hiroshi Ishii:

Automated Detection of Drive-By Download Attack. 511-515 - Shuhua Zhang, Changsong Yang, Tao Jiang:

General Construction for the Resources Information Library of Shaanxi Folk Culture and Art. 516-519 - Ko Takasu, Takamichi Saito, Tomotaka Yamada, Takayuki Ishikawa:

A Survey of Hardware Features in Modern Browsers: 2015 Edition. 520-524 - Takamichi Saito, Hiroyuki Miyazaki, Takaaki Baba, Yoshifumi Sumida, Yosuke Hori:

Study on Diffusion of Protection/Mitigation against Memory Corruption Attack in Linux Distributions. 525-530

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














