


default search action
29th AINA 2015: Gwangju, South Korea
- Leonard Barolli, Makoto Takizawa, Fatos Xhafa, Tomoya Enokido, Jong Hyuk Park:

29th IEEE International Conference on Advanced Information Networking and Applications, AINA 2015, Gwangju, South Korea, March 24-27, 2015. IEEE Computer Society 2015, ISBN 978-1-4799-7905-9
Session 1: Communications Network and Protocols I
- David Murray

, Kevin Ong:
Experimental Evaluation of Congestion Avoidance. 1-8 - Marcus Sandri, Alan C. Silva, Lucio Agostinho Rocha

, Fábio Luciano Verdi:
On the Benefits of Using Multipath TCP and Openflow in Shared Bottlenecks. 9-16 - A. H. Mohammed, Ahmed Shaharyar Khwaja, Alagan Anpalagan

, Isaac Woungang:
Base Station Selection in M2M Communication Using Q-Learning Algorithm in LTE-A Networks. 17-22 - Andris Skrastins, Gunars Lauks:

Evaluation of AggSessAC Admission Control Solution to Improve Network Revenue. 23-28
Session 2: Ad Hoc and Mesh Networks I
- Ssowjanya Harishankar, Isaac Woungang, Sanjay Kumar Dhurandher, Issa Traoré, Shakira Banu Kaleel:

E-MAnt Net: An ACO-Based Energy Efficient Routing Protocol for Mobile Ad Hoc Networks. 29-36 - Tetsuya Oda, Admir Barolli, Shinji Sakamoto

, Leonard Barolli, Makoto Ikeda, Kazunori Uchida:
Implementation and Experimental Results of a WMN Testbed in Indoor Environment Considering LoS Scenario. 37-42 - Shinji Sakamoto

, Tetsuya Oda, Leonard Barolli, Makoto Ikeda, Fatos Xhafa, Kazunori Uchida:
Application of WMN-SA Simulation System for WMN Node Placement in a Realistic Scenario. 43-47 - Xiaoying Zhang, Alagan Anpalagan

, Lei Guo
, Ahmed Shaharyar Khwaja:
Energy-Efficient Cooperative MAC Protocol Based on Power Control in MANETs. 48-53 - Zeeshan Hameed Mir, Woo Sung Jung

, Young-Bae Ko:
Continuous Neighbor Discovery Protocol in Wireless Ad Hoc Networks with Sectored-Antennas. 54-61
Session 3: Wireless Sensor Networks I
- Masaru Eto, Ryo Katsuma, Morihiko Tamai, Keiichi Yasumoto

:
Efficient Coverage of Agricultural Field with Mobile Sensors by Predicting Solar Power Generation. 62-69 - Oussama Ghorbel

, Mohamed Abid, Hichem Snoussi:
A Novel Outlier Detection Model Based on One Class Principal Component Classifier in Wireless Sensor Networks. 70-76 - Naveed Ilyas, Nadeem Javaid

, Zafar Iqbal, Muhammad Imran, Zahoor Ali Khan
, Umar Qasim, Muhammad Shoaib
:
AAEERP: Advanced AUV-Aided Energy Efficient Routing Protocol for Underwater WSNs. 77-83 - Kouhei Moriyama, Yongbing Zhang

:
An Efficient Distributed TDMA MAC Protocol for Large-Scale and High-Data-Rate Wireless Sensor Networks. 84-91 - Ayesha Hussain Khan, Nadeem Javaid

, Muhammad Imran, Zahoor Ali Khan
, Umar Qasim, Noman Haider:
DYN-NbC: A New Routing Scheme to Maximize Lifetime and Throughput of WSNs. 92-97
Session 4: Distributed and Parallel Systems I
- Samia Loucif

:
Performance Analysis of Traffic Bottleneck Induced by Concentration at K-Ary N-Cube NoC Routers. 98-105 - Michel Raynal:

A Simple Predicate to Expedite the Termination of a Randomized Consensus Algorithm. 106-111 - Masaki Kohana, Shusuke Okamoto:

A Server Selection Method for Web-Based Multiserver Systems. 112-117 - Yuanfang Chen, Xiaoming Li:

A Thread Merging Transformation to Improve Throughput of Multiple Programs. 118-125 - Anasthasia Agnes Haryanto, David Taniar

, Kiki Maulana Adhinugraha
:
Processing Group Reverse kNN in Spatial Databases. 126-133 - Norah Saleh Alghamdi

, J. Wenny Rahayu, Eric Pardede
:
Efficient Processing of Queries over Recursive XML Data. 134-142
Session 5: Communications Network and Protocols II
- Bruce Ndibanje, Hyunho Kim, Suhyun Park, Hoon-Jae Lee:

An Efficient and Provable Secret Shared Key Computation for Cryptographic Protocol Across Insecure Channel. 143-147 - Murat Karakus

, Arjan Durresi:
A Scalable Inter-AS QoS Routing Architecture in Software Defined Network (SDN). 148-154 - Shigenari Nakamura

, Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa
:
A Flexible Read-Write Abortion Protocol to Prevent Illegal Information Flow. 155-162 - Muhammad Babar Rasheed, Nadeem Javaid

, Turki Ali Alghamdi
, Sana Mukhtar, Umar Qasim, Zahoor Ali Khan
, M. Haris Baidar Raja:
Evaluation of Human Activity Recognition and Fall Detection Using Android Phone. 163-170 - Chin-Yu Liu, Fang-Yie Leu, Jung-Chun Liu, Aniello Castiglione

, Francesco Palmieri
:
Heterogeneous Network Handover Using 3GPP ANDSF. 171-175
Session 6: Ad Hoc and Mesh Networks II
- Shrikant H. Talawar, Ramesh C. Hansdah:

A Protocol for End-to-End Key Establishment During Route Discovery in MANETs. 176-184 - Mahdieh Ahmadi, Mohammed Gharib

, Fatemeh Ghassemi, Ali Movaghar
:
Probabilistic Key Pre-Distribution for Heterogeneous Mobile Ad Hoc Networks Using Subjective Logic. 185-192 - Quang-My Tran, Arek Dadej

:
Optimizing Cached Route Time-to-Live in Mobile Ad-Hoc Networks. 193-200 - Walayat Hussain

, Farookh Khadeer Hussain, Omar Khadeer Hussain
:
Transmitting Scalable Video Streaming over Wireless Ad Hoc Networks. 201-206 - Admir Barolli, Tetsuya Oda, Leonard Barolli, Fatos Xhafa, Vincenzo Loia, Kazunori Uchida:

Performance Analysis of WMN-GA Simulation System for Different WMN Architectures Considering OLSR. 207-214 - Vladi Kolici

, Leonard Barolli, Shinji Sakamoto
, Tetsuya Oda, Fatos Xhafa, Kazunori Uchida:
Optimization of Giant Component and Number of Covered Users in Wireless Mesh Networks: A Comparison Study. 215-222
Session 7: Wireless Sensor Networks II
- Ziad Serhan, Wafaa Bou Diab:

Energy-Efficient QoS Routing in Wireless Multimedia Sensor Networks. 223-230 - Siddharth Watwe, R. C. Hansdah:

Improving the Energy Efficiency of a Clock Synchronization Protocol for WSNs Using a TDMA-Based MAC Protocol. 231-238 - Arpan Sen, Shrestha Ghosh

, Arinjoy Basak, Harsh Parsuram Puria, Sushmita Ruj
:
Achieving Data Survivability and Confidentiality in Unattended Wireless Sensor Networks. 239-246 - Nachiketa Tarasia

, Manas Ranjan Lenka, Amulya Ratna Swain
:
Energy Efficient Extended Coverage in Wireless Sensor Networks. 247-254 - Hyun-Woo Kim, Eun-Ha Song, Jong Hyuk Park, Young-Sik Jeong:

Parallel Processing Simulator for Separate Sensor of WSN Simulator with GPU. 255-262
Session 8: Distributed and Parallel Systems II
- Fatos Xhafa, Victor Naranjo, Santi Caballé

:
Processing and Analytics of Big Data Streams with Yahoo!S4. 263-270 - Dilawaer Duolikun, Tomoya Enokido, Hui-Huang Hsu, Makoto Takizawa

:
Asynchronous Migration of Process Replicas in a Cluster. 271-278 - Tomoya Enokido, Makoto Takizawa

:
Energy-Efficient Delay Time-Based Process Allocation Algorithm for Heterogeneous Server Clusters. 279-286 - Ningping Sun, Masataka Murakami, Youhei Yamashita, Tomonori Yagi:

TeleBuilder: A 3DCG Builder System for Multiplayers via Network. 287-293 - Yohei Akiyama, Yuji Kasai, Masaya Iwata

, Eiichi Takahashi, Fumiaki Sato, Masahiro Murakawa
:
Anomaly Detection of Solar Power Generation Systems Based on the Normalization of the Amount of Generated Electricity. 294-301
Session 9: Pervasive and Ubiquitous Computing I
- Bang Wang, Shengliang Zhou:

Location Search Based on Subarea Fingerprinting and Surface Fitting for Indoor Positioning System. 302-309 - Neil Y. Yen, Jason C. Hung:

User-Centric Contexts Sensing for Instant Information Seeking Support. 310-315 - Anubis Graciela de Moraes Rossetto

, Carlos Oberdan Rolim
, Valderi R. Q. Leithardt
, Guilherme A. Borges
, Cláudio Fernando Resin Geyer, Luciana Arantes, Pierre Sens:
A New Unreliable Failure Detector for Self-Healing in Ubiquitous Environments. 316-323 - Matteo Cristani, Erisa Karafili, Claudio Tomazzoli

:
Improving Energy Saving Techniques by Ambient Intelligence Scheduling. 324-331 - Evangelos Pournaras, Izabela Moise, Dirk Helbing

:
Privacy-Preserving Ubiquitous Social Mining via Modular and Compositional Virtual Sensors. 332-338
Session 10: Security and Privacy I
- Fang Liu, Wee Keong Ng

, Wei Zhang:
Encrypted Gradient Descent Protocol for Outsourced Data Mining. 339-346 - Yuto Iso, Takamichi Saito:

A Proposal and Implementation of an ID Federation that Conceals a Web Service from an Authentication Server. 347-351 - Mahmood Ahmad, Zeeshan Pervez

, Byeong Ho Kang
, Sungyoung Lee:
O-Bin: Oblivious Binning for Encrypted Data over Cloud. 352-357 - Nuttachot Promrit, Anirach Mingkhwan:

Traffic Flow Classification and Visualization for Network Forensic Analysis. 358-364 - Thach V. Bui, Thuc Dinh Nguyen, Noboru Sonehara, Isao Echizen:

Efficient Authentication, Traitor Detection, and Privacy-Preserving for the Most Common Queries in Two-Tiered Wireless Sensor Networks. 365-372
Session 11: Wireless Sensor Networks III
- Tales Heimfarth, João Carlos Giacomin, João Paulo de Araujo:

AGA-MAC: Adaptive Geographic Anycast MAC Protocol for Wireless Sensor Networks. 373-381 - Subhasis Dash, Satya Sundar Mallick, R. C. Hansdah, Amulya Ratna Swain

:
A Distributed Approach to Construct Hierarchical Structure for Routing with Balanced Energy Consumption in WSNs. 382-388 - M. Sajid, K. Khan, Umar Qasim, Zahoor Ali Khan

, Subhan Tariq, Nadeem Javaid
:
A New Linear Cluster Handling (LCH) Technique Toward's Energy Efficiency in Linear WSNs. 389-393 - K. Khan, M. Sajid, Shaharyar Mahmood, Zahoor Ali Khan

, Umar Qasim, Nadeem Javaid
:
(LEACH)2: Combining LEACH with Linearly Enhanced Approach for Cluster Handling in WSNs. 394-399 - Rajoua Anane, Ridha Bouallegue

, Kosai Raoof:
Extensive Simulation Performance Evaluation of MSK Scheme with Error Correcting Codes in Wireless Sensor Networks. 400-405
Session 12: Internet Computing and Web Applications
- Zhongqqiang Zhang, Hiroaki Anada, Junpei Kawamoto, Kouichi Sakurai:

Detection of Illegal Players in Massively Multiplayer Online Role Playing Game by Classification Algorithms. 406-413 - Fan Zhao, Yuhan Song, Fenlin Liu, Ke Ke, Jingning Chen, Xiangyang Luo:

City-Level Geolocation Based on Routing Feature. 414-419 - Akkarach Kawbunjun

, Ubon Thongsatapornwatana
, Woraphon Lilakiatsakun:
Framework of Marketing or Newsletter Sender Reputation System (FMNSRS). 420-427 - Yefeng Ruan, Lina Alfantoukh, Arjan Durresi:

Exploring Stock Market Using Twitter Trust Network. 428-433 - Ralph Adaimy, Wassim El-Hajj, Ghassen Ben Brahim, Hazem M. Hajj, Haïdar Safa:

A Framework for Secure Information Flow Analysis in Web Applications. 434-441 - Toshiyuki Haramaki

, Hiroaki Nishino:
A Network Topology Visualization System Based on Mobile AR Technology. 442-447
Session 13: Pervasive and Ubiquitous Computing II
- Byeong-Ju Kim, Yun-Hong Noh, Do-Un Jeong:

Implementation of the Smart Chair System for Multi-functional Unconstrained Healthcare Monitoring. 448-452 - Kam-yiu Lam

, Nelson Wai-Hung Tsang, Song Han, Joseph Kee-Yin Ng
, Sze-Wei Tam, Ajit Nath:
SmartMind: Activity Tracking and Monitoring for Patients with Alzheimer's Disease. 453-460 - Danish Mahmood

, Nadeem Javaid
, Muhammad Imran, Zahoor Ali Khan
, Umar Qasim, Mohammed Abdullah Alnuem:
On Data Fusion for Orientation Sensing in WBASNs Using Smart Phones. 461-467 - Vamsi Paruchuri

, Aravind Kumar:
Detecting Driver Distraction Using Smartphones. 468-475 - Arcangelo Castiglione

, Alfredo De Santis
, Raffaele Pizzolante, Aniello Castiglione
, Vincenzo Loia, Francesco Palmieri
:
On the Protection of fMRI Images in Multi-domain Environments. 476-481
Session 14: Security and Privacy II
- Babatunde Ojetunde

, Naoki Shibata
, Juntao Gao, Minoru Ito:
An Endorsement-Based Mobile Payment System for a Disaster Area. 482-489 - Jorge Miguel

, Santi Caballé
, Fatos Xhafa, Václav Snásel:
A Data Visualization Approach for Trustworthiness in Social Networks for On-line Learning. 490-497 - Bruce Ndibanje, Hyunho Kim, Young-Jin Kang, Young-Sil Lee, Hoon-Jae Lee:

On Modeling Protocol-Based Clustering Tag in RFID Systems with Formal Security Analysis. 498-505 - Young-Jin Kang, Hyunho Kim, Bruce Ndibanje, Younggoo Park, Hoonjae Lee:

Correlation Power Analysis Attack on the Ping Pong-128 Key Stream Generator. 506-509 - Hiroaki Kikuchi, Hideki Hashimoto

, Hideo Yasunaga, Takamichi Saito:
Scalability of Privacy-Preserving Linear Regression in Epidemiological Studies. 510-514
Session 15: P2P Systems
- Sujoy Mistry, Dibyanshu Jaiswal

, Arijit Mukherjee
, Nandini Mukherjee:
P2P-Based Service Distribution over Distributed Resources. 515-520 - Yi Liu, Donald Elmazi

, Shinji Sakamoto
, Leonard Barolli, Fatos Xhafa, Kazunori Uchida:
A Reliable System for JXTA-Overlay P2P Platform Considering Number of Authentic Files, Security and QoS Parameters. 521-526 - Kentaro Aburada, Yoshihiro Kita, Mirang Park, Naonobu Okazaki:

Content Access Control Scheme for P2P Networks Using a Reputation Value. 527-533 - Hiroki Nakayama, Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa

:
Causally Ordered Delivery of Event Messages with Keyword Vectors in P2P Publish/Subscribe Systems. 534-541 - Atsushi Takeda, Takuma Oide, Akiko Takahashi, Takuo Suganuma:

Accurate Data Aggregation on Unstable Structured P2P Network. 542-549
Session 16: Security and Privacy III
- Fang Liu, Wee Keong Ng

, Wei Zhang:
Encrypted Association Rule Mining for Outsourced Data Mining. 550-557 - Jianhua Yang, Yongzhong Zhang:

RTT-Based Random Walk Approach to Detect Stepping-Stone Intrusion. 558-563 - Atsuko Miyaji

, Mazumder Rashed:
A New (n, 2n) Double Block Length Hash Function Based on Single Key Scheduling. 564-570 - Julian Schütte

, Rafael Fedler, Dennis Titze:
ConDroid: Targeted Dynamic Analysis of Android Applications. 571-578 - Dennis Titze, Julian Schütte

:
Apparecium: Revealing Data Flows in Android Applications. 579-586
Session 17: Agents and Intelligent Computing
- Max Talanov

, Jordi Vallverdú
, Salvatore Distefano
, Manuel Mazzara
, Radhakrishnan Delhibabu
:
Neuromodulating Cognitive Architecture: Towards Biomimetic Emotional AI. 587-592 - Haïdar Safa, Nadine Ahmad:

Tabu Search Based Approach to Solve the TAs Reconfiguration Problem in LTE Networks. 593-599 - Chia-Hsing Cheng, Yung-Fa Huang

, Hsing-Chung Chen, Tsung-Yu Yao:
Neural Network-Based Estimation for OFDM Channels. 600-604 - Nan Jiang, Tao Wan, Lingfeng Liu, Jin Li:

Strength-Constrained Weighted Evolution Model for Wireless Sensor Networks. 605-610
Session 18: Cloud, Data Centers and Services Computing I
- Giang Son Tran, Alain Tchana, Daniel Hagimont, Noel De Palma:

Cooperative Resource Management in a IaaS. 611-618 - Luís Alexandre Rocha, Fábio Luciano Verdi:

A Network-Aware Optimization for VM Placement. 619-625 - Yaling Tao, Yongbing Zhang

, Yusheng Ji:
Efficient Computation Offloading Strategies for Mobile Cloud Computing. 626-633 - Amin M. Khan

, Felix Freitag
, Smrati Gupta, Victor Muntés-Mulero
, Jacek Dominiak
, Peter Matthews:
On Supporting Service Selection for Collaborative Multi-cloud Ecosystems in Community Networks. 634-641 - Mennan Selimi, Felix Freitag

, Roger Pueyo Centelles
, Agustí Moll, Luís Veiga
:
TROBADOR: Service Discovery for Distributed Community Network Micro-Clouds. 642-649 - Andre Silva, Nelson S. Rosa

:
FIrM: Functional Middleware with Support to Multi-tenancy. 650-657
Session 19: Scalable Computing and IoT
- Rudyar Cortés, Xavier Bonnaire, Olivier Marin

, Pierre Sens:
Free Split: A Write-Ahead Protocol to Improve Latency in Distributed Prefix Tree Indexing Structures. 658-665 - Ihsan Ullah, Nadeem Javaid

, Muhammad Imran, Zahoor Ali Khan
, Umar Qasim, Mohammed Abdullah Alnuem, Mudassar Bashir:
A Survey of Home Energy Management for Residential Customers. 666-673 - Tomoya Kawakami, Tomoki Yoshihisa, Yutaka Yanagisawa, Masahiko Tsukamoto:

A Rule Processing Scheme Using the Rete Algorithm in Grid Topology Networks. 674-679 - Deepali Arora, Kin Fun Li, Stephen W. Neville:

Consumers' Sentiment Analysis of Popular Phone Brands and Operating System Preference Using Twitter Data: A Feasibility Study. 680-686 - Mohammad Aazam

, Eui-Nam Huh:
Fog Computing Micro Datacenter Based Dynamic Resource Estimation and Pricing Model for IoT. 687-694 - Sun Park, ByungRae Cha, JongWon Kim:

Preparing and Inter-Connecting Hyper-Converged SmartX Boxes for IoT-Cloud Testbed. 695-697
Session 20: Security and Privacy IV
- Yohei Kaneko, Takamichi Saito, Hiroaki Kikuchi:

Cryptographic Operation Load-Balancing between Cryptographic Module and CPU. 698-705 - Dan Jiang, Kazumasa Omote:

An Approach to Detect Remote Access Trojan in the Early Stage of Communication. 706-713 - Hiroshi Yamaguchi, Masahito Gotaishi, Phillip C.-Y. Sheu

, Shigeo Tsujii:
Privacy Preserving Data Processing. 714-719 - Masahiro Sakuma, Yoshihiro Kita, Kentaro Aburada, Mirang Park, Naonobu Okazaki:

Study of Filter Sharing Method Using Virtual Peers in P2P Networks. 720-726 - Andrew Springall, Christopher DeVito, Shou-Hsuan Stephen Huang

:
Per Connection Server-Side Identification of Connections via Tor. 727-734
Session 21: Vehicular and Cognitive Radio Networks
- Nimish Sharma, Danda B. Rawat, Bhed Bahadur Bista, Sachin Shetty

:
A Testbed Using USRP(TM) and LabView(R) for Dynamic Spectrum Access in Cognitive Radio Networks. 735-740 - Goshi Sato, Noriki Uchida, Yoshitaka Shibata:

Performance Evaluation of Software Defined and Cognitive Wireless Network Based Disaster Resilient System. 741-746 - Aboobeker Sidhik Koyamparambil Mammu, Josef Jiru, Unai Hernández-Jayo

:
Cluster Based Semantic Data Aggregation in VANETs. 747-753 - Taiki Honda, Makoto Ikeda, Seiichiro Ishikawa, Leonard Barolli:

A Message Suppression Controller for Vehicular Delay Tolerant Networking. 754-760
Session 22: Cloud, Data Centers, and Services Computing II
- Emna Hachicha, Walid Gaaloul

:
Towards Resource-aware Business Process development in the Cloud. 761-768 - Kazuya Odagiri, Shogo Shimizu, Naohiro Ishii, Makoto Takizawa

:
Establishment of Virtual Policy Based Network Management Scheme by Load Experimets in Virtual Environment. 769-776 - Abdalla Artail, Karim Frenn, Haïdar Safa, Hassan Artail:

A Framework of Mobile Cloudlet Centers Based on the Use of Mobile Devices as Cloudlets. 777-784 - Asma Alkalbani

, Akshatha Shenoy, Farookh Khadeer Hussain, Omar Khadeer Hussain
, Yanping Xiang:
Design and Implementation of the Hadoop-Based Crawler for SaaS Service Discovery. 785-790 - ByungRae Cha, Sun Park, Sujeong Shim, JongWon Kim:

Secured mVoIP Service over Cloud and Container-Based Improvement. 791-795
Session 23: Security and Privacy V
- Danilo Valeros Bernardo, Bee Bee Chua:

Introduction and Analysis of SDN and NFV Security Architecture (SN-SECA). 796-801 - Karel Heurtefeux, Ochirkhand Erdene-Ochir, Nasreen Mohsin

, Hamid Menouar:
Enhancing RPL Resilience Against Routing Layer Insider Attacks. 802-807 - Jinyang Li, Jun Ye:

Secure Outsourcing of Multiple Modular Exponentiations. 808-811 - Taeyoung Jung, Jaein Kim, Junyoung Park, Kangbin Yim:

Novel Approaches to Protecting Block Ciphers by Distributing Round Keys. 812-816 - Hyeryun Lee, Kyunghee Choi, Kihyun Chung, Jaein Kim, Kangbin Yim:

Fuzzing CAN Packets into Automobiles. 817-821
Session 24: Mobile Networks
- Miho Kawamoto, Tetsuya Shigeyasu:

Message Relay Decision Algorithm to Improve Message Delivery Ratio in DTN-Based Wireless Disaster Information Systems. 822-828 - Qiao Kong, Bang Wang:

Adaptive Cell Range Expansion for Energy Cost Saving in Heterogeneous Cellular Networks with Hybrid Energy Supplies. 829-836 - Kenta Mori, Sho Hatakeyama, Hiroshi Shigeno:

DCLA: Distributed Chunk Loss Avoidance Method for Cooperative Mobile Live Streaming. 837-843 - Mamun I. Abu-Tair, Saleem N. Bhatti

:
Upgrading 802.11 deployments: A Critical Examination of Performance. 844-851 - Woonghee Lee

, Mungyu Bae, Hyunsoon Kim, Suk Kyu Lee, Hwangnam Kim:
MACoD: Mobile Device-Centric Approach for Identifying Access Point Congestion. 852-859 - Vamsi Paruchuri

, Arjan Durresi:
Stateless Adaptive Reliable Broadcast Protocol for Heterogeneous Wireless Networks. 860-867
Session 25: Multimedia Systems and Applications
- Misaki Hagino, Yuki Tayama, Ken-ichi Okada:

A Triage Training System with Dynamic Scenario Change. 868-875 - Motoo Ino, Koji Hashimoto, Yoshitaka Shibata:

An Adaptive Video Quality Control Method in Wireless Network Environment. 876-881 - Yusaku Maki, Satoshi Gondo, Tomoo Inoue, Ken-ichi Okada:

Travel Agency Desk Support System Using Interest Degree. 882-889 - Hiroyuki Endo, Shinnosuke Furuya, Ken-ichi Okada:

MR Manual and Authoring Tool with Afterimages. 890-895 - Feng Xie, Zhen Chen, Jiaxing Shang, Wen-Liang Huang, Jun Li:

Item Similarity Learning Methods for Collaborative Filtering Recommender Systems. 896-903 - Junghoon Park, Taeyoung Jung, Kangbin Yim:

Implementation of an Eye Gaze Tracking System for the Disabled People. 904-908

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














