


default search action
26th AINA Workshops 2012: Fukuoka, Japan
- Leonard Barolli, Tomoya Enokido, Fatos Xhafa, Makoto Takizawa:

26th International Conference on Advanced Information Networking and Applications Workshops, WAINA 2012, Fukuoka, Japan, March 26-29, 2012. IEEE Computer Society 2012, ISBN 978-1-4673-0867-0
The Eighth International Symposium on Frontiers of Information Systems and Network Applications (FINA-2012)
Wireless and Mobile Network Applications
- Akira Sakuraba, Tomoyuki Ishida, Yoshitaka Shibata:

An Input Method for High-Resolution Large 2D Desktop Environment Using Wireless Device with Joystick. 1-6 - Yinghui Zhou, Lei Jing, Junbo Wang

, Zixue Cheng:
Separator Design of Gesture Signals Based on Adaptive Threshold Using Wearable Sensors. 7-12 - Jiannong Cao

, Chisheng Zhang, Jun Zhang, Yueming Deng, Xin Xiao, Miao Xiong, Jie Zhou, Yang Zou, Gang Yao, Wei Feng, Liang Yang, Yao Yu:
SHAWK: Platform for Secure Integration of Heterogeneous Advanced Wireless Networks. 13-18 - Miwa Takai:

Measurement of Active Quantity of the Subject Movement and Design of Surveillnace Camera System Using High Active Part. 19-24
Cryptography, Authentication, and Security
- Zhen Yu Wu, Dai-Lun Chiang, Tzu-Ching Lin, Yu-Fang Chung

, Tzer-Shyong Chen
:
A Reliable Dynamic User-Remote Password Authentication Scheme over Insecure Network. 25-28 - Amy Poh Ai Ling, Kokichi Sugihara, Masao Mukaidono:

Security Philosophy Important for a Sustainable Smart Grid System. 29-34 - Tsunetoshi Hayashi:

Source Code Publishing on World Wide Web. 35-40
Architectures and Middleware
- Tor-Morten Grønli, Bendik Bygstad:

A Successful Implementation of Service Oriented Architecture. 41-46 - Gwan-Hwan Hwang, Chi Wu-Lee, Zhong-Xiang Jiang:

Workflow-Based Dynamic Access Control in a Service-Oriented Architecture. 47-52 - Keling Da, Marc Dalmau, Philippe Roose

:
WaterCOM: An Architecture Model of Context-Oriented Middleware. 53-60 - Yang-Hsin Fan

, Jan-Ou Wu:
Middleware Software for Embedded Systems. 61-65
Privacy and Information Poisoning
- Salah-Eddine Tbahriti, Brahim Medjahed, Zaki Malik

, Chirine Ghedira
, Michael Mrissa
:
How to Preserve Privacy in Services Interaction. 66-71 - Sho Kurita, Kenji Komoriya, Ryuya Uda:

Privacy Protection on Transfer System of Automated Teller Machine from Brute Force Attack. 72-77 - Junya Ishii, Afiza Razali, Ryuya Uda:

Confidential Information Poisoning Methods by Considering the Information Length in Electronic Portable Devices. 78-84 - Sin G. Teo, Vincent C. S. Lee, Shuguo Han:

A Study of Efficiency and Accuracy of Secure Multiparty Protocol in Privacy-Preserving Data Mining. 85-90
Video Streaming and Life Streaming
- Erick Jimenez Rodriguez, Toshiro Nunome, Shuji Tasaka

:
Multidimensional QoE Assessment of Multi-view Video and Audio (MVV-A) IP Transmission: The Effects of User Interfaces and Contents. 91-98 - Iori Osada, Takashi Yoshino:

Proposal and Evaluation of User's Actions Distribution Method Using Life Streaming Service on Lifelog System. 99-104 - Kazuyuki Takayama, Takaya Fujimoto, Rei Endo, Hiroshi Shigeno:

Neighbor Selection Based on Transmission Bandwidth on P2P Live Streaming Service. 105-110 - Lei Chen, Narasimha K. Shashidhar, Qingzhong Liu

:
Scalable Secure MJPEG Video Streaming. 111-115 - Parinya Sanguansat

, Kornkamol Thakulsukanant, Vorapoj Patanavijit:
A Robust Video Super-Resolution Using a Recursive Leclerc Bayesian Approach with an OFOM (Optical Flow Observation Model). 116-121
Intrusion Detection and Blind Signature
- Eugene Albin, Neil C. Rowe:

A Realistic Experimental Comparison of the Suricata and Snort Intrusion-Detection Systems. 122-127 - Jingwei Liu

, Zonghua Zhang, Rong Sun, Kyung Sup Kwak:
Certificateless Partially Blind Signature. 128-133 - Shun-ichi Kurino, Noriaki Yoshikai, Toshio Takahashi:

Personal Profile for Coping Behavior in a Virus Infection Situation. 134-140
Web-Based and TV Applications
- Masami Nakazawa, Maike Erdmann, Keiichiro Hoashi, Chihiro Ono:

Social Indexing of TV Programs: Detection and Labeling of Significant TV Scenes by Twitter Analysis. 141-146 - Tolga Arul

, Abdulhadi Shoufan
:
Consumer Opinions on Short-Interval Charging for Pay-TV over IPTV. 147-153 - Wei Chen, Rong-Chi Chang

:
Automatic Web-Based EFP Studio System with XML Documents. 154-159
Secure Networks and Systems
- Wei-Liang Tai

, Ya-Fen Chang, Yuan-Fu Li, Shun-Meng Pan:
A Security Enhancement on a Remote User Authentication Scheme Based on the Rabin Cryptosystem with Secure Password Updating. 160-164 - Frank Yeong-Sung Lin, Yu-Shun Wang, Yu-Pu Wu, Chia-Yang Hsu:

Effective Network Defense Strategies against Malicious Attacks with Various Defense Mechanisms under Quality of Service Constraints. 165-170 - Danilo Valeros Bernardo, Doan B. Hoang:

Symbolic Analysis of the Proposed UDT Security Architecture. 171-176 - Yuh-Min Tseng, Yi-Hung Huang, Hui-Ju Chang:

CCA-secure Anonymous Multi-receiver ID-based Encryption. 177-182
Multimedia Applications
- Jenq-Haur Wang

, Jeng-Yuan Yang:
Statistical Single-Document Summarization for Chinese News Articles. 183-188 - Samuel Bernard, Xavier Défago

, Sébastien Tixeuil:
A Fast and Robust Optimistic Total Order Broadcast for Online Video Games. 189-196 - Wen-Chiao Hsu, I-En Liao, Pei-Hua Lu:

Supporting Efficient XML Query Evaluation Using Double Indexes. 197-202 - Yoshiyuki Tanaka, Kenji Komoriya, Ryuya Uda:

Multiview Playback with Ghost in Required Condition. 203-208
Clustering and Grouping
- Xoluqobo Mkhwanazi, Hanh Le, Edwin H. Blake

:
Clustering between Data Mules for Better Message Delivery. 209-214 - Ying-Dar Lin, Chi-Heng Chou, Yuan-Cheng Lai, Tse-Yau Huang, Simon Chung, Jui-Tsun Hung, Frank C. Lin:

Test Coverage Optimization for Large Code Problems. 215-220 - Chun-Nan Lu, Ying-Dar Lin, Chun-Ying Huang

, Yuan-Cheng Lai:
Session Level Flow Classification by Packet Size Distribution and Session Grouping. 221-226
Multimedia Systems
- Takashi Yoshino, Shingo Fujita:

DOACOM: Video Chat System with Door-Type Interface. 227-231 - Fumiaki Murakami, Kenji Komoriya, Ryuya Uda, Seiichi Gohshi, Isao Echizen:

Preventing Surreptitious Filming by Saturation Irradiation of Infrared Rays. 232-237 - Alexander Camek, Christian Buckl

, Pedro Sebastião Correia, Alois C. Knoll:
An Automotive Side-View System Based on Ethernet and IP. 238-243 - Darun Kesrarat, Vorapoj Patanavijit:

Empirical Study on Performance Comparisons of Block-Based Motion Estimation on Multi Sub-Pixel Displacement with Multiples Block Size. 244-249 - Liang-Yi Chung:

Virtual Reality in College English Curriculum: Case Study of Integrating Second Life in Freshman English Course. 250-253
Network Simulation, Analysis, and Performance Evaluation
- Shinya Saito, Yoshitoshi Murata, Tsuyoshi Takayama, Nobuyoshi Sato:

An International Driving Simulator: Recognizing the Sense of a Car Body by the Simulator. 254-260 - Ying Zhang, Ning Wu, Xiazhi Ke, Fen Ge:

A Coverage-Driven Verification Platform for Evaluating NoC Performance and Test Structure. 261-265 - Munehiro Namba, Yoshiya Nakata:

Probabilistic Replica Allocation in Multihop Networks. 266-273 - Yeim-Kuan Chang, Yu-Hsiang Wang:

CubeCuts: A Novel Cutting Scheme for Packet Classification. 274-279
Routing Algorithms and Traffic Control
- André Egners, Dominic Gatzen, Andriy Panchenko, Ulrike Meyer:

Introducing SOR: SSH-based Onion Routing. 280-286 - Yuwei Xu, Ying Wu, Jingdong Xu, Lin Sun:

Efficient Detection Scheme for Urban Traffic Congestion Using Buses. 287-293 - Shinji Kitagami, Yosuke Kaneko, Takuo Suganuma:

Method of Autonomic Load Balancing for Long Polling in M2M Service System. 294-299 - Taoufik Yeferny, Khedija Arour:

Efficient Routing Method in P2P Systems Based upon Training Knowledge. 300-305
Algorithms
- Feng Xie, Ming Xu, Zhen Chen:

RBRA: A Simple and Efficient Rating-Based Recommender Algorithm to Cope with Sparsity in Recommender Systems. 306-311 - Darun Kesrarat, Vorapoj Patanavijit:

A Novel Robust and High Reliability for Lucas-Kanade Optical Flow Algorithm Using Median Filter and Confidence Based Technique. 312-317 - Datchakorn Tancharoen, Pham Hong Ha, Kornkamol Thakulsukanant, Vorapoj Patanavijit:

Experimental Investigation for Practical Sparsity Number for Image Reconstruction Based on SL0 Algorithm in Discrete Frequency Domain. 318-323
Communication Systems
- Yangwei Li, Qingni Shen, Cong Zhang, Pengfei Sun, Ying Chen, Sihan Qing:

A Covert Channel Using Core Alternation. 324-328 - Jongjoo Park, Eunkyu In, Sangwoo Ahn, Cheoljon Jang, Jongwha Chong:

IEC 61850 Standard Based MMS Communication Stack Design Using OOP. 329-332 - Tunyawat Somjaitaweeporn, Pham Hong Ha, Kornkamol Thakulsukanant, Vorapoj Patanavijit:

An Alternative Robust SL0 Based on Recursive Huber Stochastic Estimation Technique in Frequency Domain. 333-338
Semantic Knowledge and Ontology
- Ko-Wei Huang, Wei-Chung Cheng, Chun-Wei Tsai, Chu-Sing Yang:

Design and Implementation of an Ontology-based Intelligent Project Management System. 339-343 - Gregory Blanc

, Daisuke Miyamoto, Mitsuaki Akiyama, Youki Kadobayashi:
Characterizing Obfuscated JavaScript Using Abstract Syntax Trees: Experimenting with Malicious Scripts. 344-351
Internet Computing and Mobile Service Trends
- Toshihiko Yamakami:

From Gamenics to Servicenics: Lessons Learned in Mobile Social Games in Japan toward Service Engineering. 352-356 - Toshiro Minami:

Expertise Level Estimation of Library Books by Patron-Book Heterogeneous Information Network Analysis - Concept and Applications to Library's Learning Assistant Service. 357-362 - Hon Wai Lam, Tharam S. Dillon, Elizabeth Chang

, Pornpit Wongthongtham, Wei Lui:
Detecting Events in Narrative Essays. 363-368 - I-Ping Chiang, Yi-Shiang Liao:

Exploring the Key Success Factors of Mobile Commerce in Taiwan. 369-374 - Nobuo Funabiki, Yousuke Korenaga, Yukiko Matsushima, Toru Nakanishi, Kan Watanabe:

An Online Fill-in-the-Blank Problem Function for Learning Reserved Words in Java Programming Education. 375-380
Trust Computing and Assurance
- Chun-Chia Wang, Chang-Cheng Sie:

A Study of Consumers' Trust in Online Shopping between Pick-up Goods Behavior in the Convenience Stores. 381-386 - Denise Umuhoza, Robin Braun

:
Trustworthiness Assessment of Knowledge on the Semantic Sensor Web by Provenance Integration. 387-392 - Adil M. Hammadi, Omar Khadeer Hussain

:
A Framework for SLA Assurance in Cloud Computing. 393-398
Network Monitoring and Virtualization
- Aki Choho, Nobuyoshi Sato, Tsuyoshi Takayama, Yoshitoshi Murata:

A Proposal of Method for Suspicious Person Detection on P2P Security Camera Network System. 399-405 - Golam Sorwar, Raqibul Hasan:

Smart-TV Based Integrated E-health Monitoring System with Agent Technology. 406-411 - Frank Yeong-Sung Lin, Yu-Shun Wang, Hui-Yu Chung, Jia-Ling Pan:

Maximization of Network Survivability under Malicious and Epidemic Attacks. 412-417 - Lee See Goh, Takaaki Ichimiya, Kazuhiro Watanabe, Norihiko Shinomiya:

A Hetero-core Spliced Optical Fiber Sensor Network for Remote Monitoring of Agricultural Enviroment. 418-422 - Dan Feng, Xiaojing Wang, Wei Zhao, Wei Tong

, Jingning Liu:
vSuit: QoS-oriented Scheduler in Network Virtualization. 423-428
Parallel Computing and Interoperability
- Jiageng Yu, Yiwei Ci, Peng Zhou, Yanjun Wu, Chen Zhao:

Deterministic Replay of Multithread Applications Using Virtual Machine. 429-434 - Michel Hurfin, Izabela Moise, Jean-Pierre Le Narzul, Frédéric Majorczyk:

Adaptive Strategies for Speeding Up Sequences of Consensus. 435-442 - Heinz Kredel:

Fostering Interoperability in Java-Based Computer Algebra Software. 443-447
The Eighth International Workshop on Heterogeneous Wireless Networks (HWISE-2012)
Algorithms and Mechanisms for Wireless Networks
- Ying-Hong Wang, Wei-Chih Lin, Cheng-Hung Tsai, Guo-Rui Huang:

A Hybrid Scheduling Mechanism for IEEE 802.16j Networks. 448-453 - Muhammad Qasim Khan

, Steinar Hidle Andresen:
PoA Selection in 802.11 Networks Using Media Independent Information Server (MIIS). 454-459 - Sung-Hoon Park, Seoun-Hyung Lee:

Token-Based Mutual Exclusion Algorithm in Mobile Cellular Networks. 460-465 - Nedal Ababneh

, Nick F. Timmons, Jim Morrison
, David C. Tracey:
Energy-Balanced Rate Assignment and Routing Protocol for Body Area Networks. 466-471
Ad-hoc Networks
- Sanjay Kumar Dhurandher, Isaac Woungang, Abhishek Gupta, Bharat K. Bhargava:

E2SIW: An Energy Efficient Scheme Immune to Wormhole Attacks in Wireless Ad Hoc Networks. 472-477 - Paulo Manoel Mafra, Joni da Silva Fraga, Altair Olivo Santin

:
A Distributed IDS for Ad Hoc Networks. 478-483 - Abdulkader Benchi, Frédéric Guidec, Pascale Launay:

JOMS: A Java Message Service Provider for Disconnected MANETs. 484-489 - Saïd Yahiaoui

, Yacine Belhoul, Nadia Nouali-Taboudjemat, Hamamache Kheddouci:
AdSIP: Decentralized SIP for Mobile Ad Hoc Networks. 490-495
Sensor and Ad-hoc Applications
- Bo-Si Lee, Hao-Wei Lin, Wernhuar Tarng

:
A Cluster Allocation and Routing Algorithm Based on Node Density for Extending the Lifetime of Wireless Sensor Networks. 496-501 - Tsung-Chih Hsiao, Yu-Ting Liao, Jen-Yan Huang, Tzer-Shyong Chen

, Gwoboa Horng
:
Secure Authentication Scheme for Supporting Healthcare in Wireless Sensor Networks. 502-507 - Yuki Kasama, Toshiaki Miyazaki:

Simultaneous Estimation of the Number of Humans and their Movement Loci in a Room Using Infrared Sensors. 508-513 - Yuto Toguchi, Hiroshi Shigeno:

CDS-Based Routing Scheme Considering Node Properties in Triage Network. 514-519
Mesh Networks
- Sritrusta Sukaridhoto

, Nobuo Funabiki, Toru Nakanishi, Kan Watanabe:
A Proposal of CSMA Fixed Backoff-time Switching Protocol and Its Implementation on QualNet Simulator for Wireless Mesh Networks. 520-525 - Edmundo Chissungo, Edwin H. Blake

, Hanh Le:
Investigation into Batmand-0.3.2 Protocol Performance in an Indoor Mesh Potato Testbed. 526-532 - Jun Huy Lam, Sanggon Lee, Whye Kit Tan:

Multi-channel Wireless Mesh Networks Test-Bed with Embedded Systems. 533-537 - Kei Kikuchi, Yoshitoshi Murata, Goutam Chakraborty, Tsuyoshi Takayama, Nobuyoshi Sato:

Location Information System for Access Points in the Heterogeneous Wireless Enviornment. 538-543
Security Issues in Ad-hoc and Sensor Networks
- Soumyadev Maity

, Ramesh C. Hansdah:
Membership Models and the Design of Authentication Protocols for MANETs. 544-551 - Tatsuro Iida, Keita Emura

, Atsuko Miyaji
, Kazumasa Omote:
An Intrusion and Random-Number-Leakage Resilient Scheme in Mobile Unattended WSNs. 552-557 - Young-Sil Lee, Tae-Yong Kim, Hoon-Jae Lee:

Mutual Authentication Protocol for Enhanced RFID Security and Anti-counterfeiting. 558-563 - Youjiro Takehana, Iichiro Nishimura, Norihito Yosaka, Tomoyuki Nagase, Yoshio Yoshioka:

Building Trust among Certificates Management Nodes in Mobile Ad-hoc Network. 564-568
Vehicular Networks
- Yiqing Gui, Edward Chan:

Data Scheduling for Multi-item Requests in Vehicle-Roadside Data Access with Motion Prediction Based Workload Transfer. 569-574 - Ján Janech

, Anton Lieskovsky, Emil Krsák
:
Comparation of Strategies for Data Replication in VANET Environment. 575-580 - Lin Sun, Ying Wu, Jingdong Xu, Yuwei Xu:

An RSU-assisted Cluster Head Selection and Backup Protocol. 581-587 - Giuseppe Ciaccio, Vittoria Gianuzzi:

Designing and Prototyping a Middleware for Vehicular Networks. 588-594
Sensor Networks
- Aoi Hashizume, Tadanori Mizuno, Hiroshi Mineno

:
Energy Monitoring System Using Sensor Networks in Residential Houses. 595-600 - Shin-nosuke Toyoda, Fumiaki Sato:

Energy-Effective Clustering Algorithm Based on Adjacent Nodes and Residual Electric Power in Wireless Sensor Networks. 601-606 - Ana Nieto

, Javier López
:
Traffic Classifier for Heterogeneous and Cooperative Routing through Wireless Sensor Networks. 607-612 - Wataru Seino, Tomoki Yoshihisa, Takahiro Hara, Shojiro Nishio:

A Sensor Data Collection Method with a Mobile Sink for Communication Traffic Reduction by Delivering Predicted Values. 613-618
Wireless Communication Systems and Technologies
- Youji Ochi:

Development of Human-Like Agent to Support Lecture Presentation Using a Wireless Device and Image Processing Technology. 619-622 - Kevin Chin Yiu Shum, Joseph Kee-Yin Ng

, Quan Jia Cheng:
The Design and Implementation of a Wireless Location Estimation System in a Wireless Local Area Network. 623-628 - Hiroshi Maeda

, Shota Inoue, Shintaro Nakahara, Osamu Hatanaka, Yongmei Zhang, Hiroyuki Terashima:
Experimental Study on X-shaped Photonic Crystal Waveguide in 2D Triangular Lattice for Wavelength Division Multiplexing System. 629-632 - Masafumi Takematsu, Junichi Honda, Kazunori Uchida:

On Accuracy of Discrete Ray Tracing Method in Comparison with Rigorous Solutions. 633-638
Mobile Networks
- Hwi Woon Jeong, Jun Yeol Choi, Hyung Ku Kang, Hee Yong Youn:

An Efficient Group-Based Channel Scanning Scheme for Handover with IEEE 802.16e. 639-644 - Parin Sornlertlamvanich

, Sinchai Kamolphiwong
, Robert Elz, Panita Pongpaibool:
NEMO-Based Distributed Mobility Management. 645-650 - Masayuki Higashino, Kenichi Takahashi, Takao Kawamura, Kazunori Sugahara:

Mobile Agent Migration Based on Code Caching. 651-656 - Djallel Bouneffouf, Amel Bouzeghoub, Alda Lopes Gançarski:

Following the User's Interests in Mobile Context-Aware Recommender Systems: The Hybrid-e-greedy Algorithm. 657-662
Context Aware Middleware for Ubiquitous Computing Environments
- Senaka Buthpitiya, Faisal B. Luqman, Martin L. Griss

, Bo Xing, Anind K. Dey:
Hermes - A Context-Aware Application Development Framework and Toolkit for the Mobile Environment. 663-670 - François Toutain, Fano Ramparany, Ewelina Szczekocka:

Semantic Context Reasoning for Formulating User Location. 671-677
The Seventh International Workshop on the Performance Analysis and Enhancement of Wireless Networks (PAEWN-2012)
Wireless Mesh and Mobile Networks
- Jason B. Ernst, Joseph Alexander Brown

:
Co-existence of Evolutionary Mixed-Bias Scheduling with Quiescence and IEEE 802.11 DCF for Wireless Mesh Networks. 678-683 - Somayeh Nikbakhsh, Azizah Bt Abdul Manaf, Mazdak Zamani

, Maziar Janbeglou:
A Novel Approach for Rogue Access Point Detection on the Client-Side. 684-687
Wireless Systems and Technologies
- Ranjeet Singh Tomar, Shekhar Verma

:
Enhanced SDMA for VANET Communication. 688-693 - Yang-Han Lee, Hsien-Wei Tseng, Chih-Yuan Lo, Yih-Guang Jan, Hen-Wai Tsao

, Jingshown Wu:
Software Simulation Tool for the Capacity Analysis of WiMAX Base Stations. 694-697
The Sixth International Symposuim on Security and Multimodality in Pervasive Environment (SMPE-2012)
Authentication and Analysis
- Toan-Thinh Truong, Minh-Triet Tran

, Anh Duc Duong:
Improvement of the More Efficient and Secure ID-Based Remote Mutual Authentication with Key Agreement Scheme for Mobile Devices on ECC. 698-703 - Kwang Il Shin, Ji Soo Park, Jae Yong Lee, Jong Hyuk Park:

Design and Implementation of Improved Authentication System for Android Smartphone Users. 704-707 - Shunsuke Oshima, Takuo Nakashima, Toshinori Sueyoshi:

The Evaluation of an Anomaly Detection System Based on Chi-square Method. 708-713
Secure Architectures and Platforms
- Rafael Giménez, Marc Pous, Francisco Rico-Novella:

Securing an Interoperability Architecture for Home and Urban Networking: Implementation of the Security Aspects in the INREDIS Interoperability Architecture. 714-719 - Tsai-Yeh Tung, Laurent Lin, D. T. Lee:

Pandora Messaging: An Enhanced Self-Message-Destructing Secure Instant Messaging Architecture for Mobile Devices. 720-725 - Jinkeon Kang

, Kitae Jeong, Sang-Soo Yeo
, Changhoon Lee
:
Related-Key Attack on the MD-64 Block Cipher Suitable for Pervasive Computing Environments. 726-731 - Takafumi Hayashi

, Atsushi Kara, Toshiaki Miyazaki, Jiro Iwase, Hideyuki Fukuhara, Tetsu Saburi, Masayuki Hisada:
Coping with the Complexity of SOA Systems with Message Forensics. 732-737
Network Security
- Vinod P. Nair, Vijay Laxmi

, Manoj Singh Gaur:
REFORM: Relevant Features for Malware Analysis. 738-744 - Ana Nieto

, Javier López
:
Security and QoS Tradeoffs: Towards a FI Perspective. 745-750 - Jung-Hyok Kwon, Eui-Jik Kim, Chul-Hee Kang:

CAD-MAC: Coverage Adaptive Directional Medium Access Control for mmWave Wireless Personal Area Networks. 751-754 - Jaehwan Lim, Yang-Hoon Kim, Yongsub Na, Hangbae Chang:

The Study for the User Oriented Service Design for Inter-organizational Collaboration. 755-759
The Fifth International Workshop on Data Management for Wireless and Pervasive Communications (DMWPC-2012)
VANET and WSN
- Songsheng Li

, Xiaoying Kong
, David B. Lowe
:
Dynamic Path Determination of Mobile Beacons Employing Reinforcement Learning for Wireless Sensor Localization. 760-765 - Shogo Nakamura, Yoshiaki Hori, Kouichi Sakurai:

Communication-Efficient Anonymous Routing Protocol for Wireless Sensor Networks Using Single Path Tree Topology. 766-771 - Sheng-Tzong Cheng, Jian-Pan Li:

Using Interest-Aware Probabilistic for Leisure Information Dissemination in VANETs. 772-777
Data Processing and Management
- Kenji Ono, Tsutomu Terada

, Masahiko Tsukamoto:
A Ubiquitous Data Logger that Selects an Efficient Data Compression Method. 778-782 - Taiga Abe, Hideyuki Kawashima, Hiroyuki Kitagawa

:
An Efficient Stream Archiving Method by Operator Merge and Write Control. 783-788
The Fifth International Symposium on Mining and Web (MAW-2012)
Clustering and Classification
- Lifei Chen, Gongde Guo, Shengrui Wang:

Nearest Neighbor Classification by Partially Fuzzy Clustering. 789-794 - Elham Hoseini, Sattar Hashemi

, Ali Hamzeh
:
Link Prediction in Social Network Using Co-clustering Based Approach. 795-800 - Toshio Teraguchi, Kenji Nakamura, Shigenori Tanaka, Koichi Kitano:

Detection Method of Blog Spam Based on Categorization and Time Series Information. 801-808
Information Retrieval
- Joel Azzopardi

, Christopher Staff:
Fusion of News Reports Using Surface-Based Methods. 809-814 - Yuichiro Tasaki, Tomohiro Fukuhara, Tetsuji Satoh:

Aggnel: An Information Aggregation System of Partial Contents from Multiple Web Pages. 815-820 - Sebastian Pretzsch, Klemens Muthmann, Alexander Schill:

FODEX - Towards Generic Data Extraction from Web Forums. 821-826
Feature Extraction and Representation
- Sheikh Muhammad Sarwar, Mosaddek Hossain Kamal:

Integration of Novel Image Based Features into Markov Random Field Model for Information Retrieval. 827-832 - Kosuke Takano, Kin Fun Li:

Classifying Sports Gesture Using Event-Based Matching in a Multimedia E-learning System. 833-838
Text Mining
- Dong Han, Kilian Stoffel:

Ontology Based Qualitative Methodology for Chinese Language Analysis. 839-844 - Toshihiro Ishikawa, Yasuhiro Yamada:

Development of Topic Navigation System for Assisting Searches on the Web. 845-850 - Ming-Fung Cheng, Korris Fu-Lai Chung

, Siu-Nam Chuang:
GPU Accelerated Hot Term Extraction from User Generated Content. 851-856 - Tsendsuren Munkhdalai, Meijing Li, Taewook Kim, Oyun-Erdene Namsrai

, Seon-Phil Jeong, Jungpil Shin, Keun Ho Ryu:
Bio Named Entity Recognition Based on Co-training Algorithm. 857-862
Behavior Models
- Tomonobu Ozaki, Minoru Etoh:

Social Network Discovery from Multiple Log Data through a Behavior Model. 863-868 - Atsuko Miyaji

, Mohammad Shahriar Rahman
:
Privacy-Preserving Set Operations in the Presence of Rational Parties. 869-874 - Hui-Huang Hsu, Yu-Fan Chen, Chi-Yi Lin, Cheng-Wei Hsieh, Timothy K. Shih:

Emotion Care Services with Facebook Wall Messages. 875-880
The Fifth International Workshop on Telecommunication Networking, Applications and Systems (TeNAS-2012)
Network Technologies and Applications I
- Hung-Yi Chang:

A Multipath Routing Algorithm for Degraded-Bandwidth Services under Availability Constraint in WDM Networks. 881-884 - Tananun Orawiwattanakul, Hideki Otsuki, Eiji Kawai, Shinji Shimojo

:
Dynamic Time Scheduling in Advance Bandwidth Reservation. 885-890 - Shih-Hao Chang, Teh-Sheng Huang:

A Fuzzy Knowledge Based Fault Tolerance Algorithm in Wireless Sensor Networks. 891-896 - Atsushi Den, Katsuyoshi Iida

:
Communication Quality Improvement Method through End Host Enhancements for TFRC-type Mobile Streaming. 897-902
Network Technologies and Applications II
- Wun-Yuan Huang, Jen-Wei Hu

, Shu-Cheng Lin, Te-Lung Liu, Pang-Wei Tsai, Chu-Sing Yang, Fei Yeh, Jim Hao Chen, Joe Mambretti:
Design and Implementation of an Automatic Network Topology Discovery System for the Future Internet Across Different Domains. 903-908 - Ryo Oura, Saneyasu Yamaguchi:

Fairness Comparisons among Modern TCP Implementations. 909-914 - Tzu-Ming Wang, Wei-Tsong Lee, Tin Yu Wu, Hsin-Wen Wei, Yu-San Lin:

New P2P Sharing Incentive Mechanism Based on Social Network and Game Theory. 915-919
The Fifth International Workshop on Bio and Intelligent Computing (BICom-2012)
Genetic Algorithms and Simulated Annealing
- Li-Yeh Chuang, Ming-Cheng Lin, Hsueh-Wei Chang, Cheng-Hong Yang:

Odds Ratio-Based Genetic Algorithm for Prediction of SNP-SNP Interactions in Breast Cancer Association Study. 920-925 - Mark R. Kindl, Neil C. Rowe:

Evaluating Simulated Annealing for the Weighted-Region Path-Planning Problem. 926-931 - Yang Syu, Yong-Yi Fanjiang, Jong-Yih Kuo, Shang-Pin Ma

:
A Genetic Algorithm with Prioritized Objective Functions for Service Composition. 932-937 - Huixing Peng, Yuebin Bai, Xiaoxia Liu:

End-to-End QoS Guaranteed Approach Using Multi-object Genetic Algorithm in Cognitive MANETs. 938-943
Fuzzy and Rule-Based Systems
- Kouhei Umezaki, Evjola Spaho

, Yuichi Ogata, Leonard Barolli, Fatos Xhafa
, Jiro Iwashige:
A Fuzzy-Based Trustworthiness System for JXTA-Overlay P2P Platform and Its Performance Evaluation Considering Three Parameters. 944-949 - Shigeaki Sakurai, Kyoko Makino, Shigeru Matsumoto:

A Discovery Method of Trend Rules from Complex Sequential Data. 950-955 - Li-Yeh Chuang, Yu-Da Lin

, Hsueh-Wei Chang, Cheng-Hong Yang:
PCR-RFLP Primer Design Using Particle Swarm Optimization Combined with Chaotic Logistic Map. 956-961 - Qi Wang, Hironori Ando, Elis Kulla, Leonard Barolli, Arjan Durresi:

A Fuzzy-Based Cluster-Head Selection System forWSNs Considering Different Parameters. 962-967
Intelligent Control Systems and Applications
- Matti Mantere

, Ilkka Uusitalo, Mirko Sailio
, Sami Noponen
:
Challenges of Machine Learning Based Monitoring for Industrial Control System Networks. 968-972 - Keita Matsuo, Yuichi Ogata, Kouhei Umezaki, Evjola Spaho

, Leonard Barolli:
Design and Implementation of Waste Management Robots. 973-976 - Marek R. Ogiela, Lidia Ogiela:

Medical Visualizations in Secure Bio Computing. 977-980
The Fourth International Workshop on Information Technology for Innovative Services (ITIS-2012)
Innovative Systems
- Shinichiro Kibe, Motoi Yamagiwa, Minoru Uehara:

Proposal for Improving Throughput in Supersaturated Cloud. 981-986 - Kenichi Fujii, Motoi Yamagiwa, Minoru Uehara:

An Experiment and Discussion of the Reboot Feature on the Photovoltaic Grid System. 987-992 - Hideaki Yanagisawa:

Web-Based Environment for GUI Application Development. 993-998 - Gen Kitagata, Kazuto Sasai, Johan Sveholm, Hideyuki Takahashi, Tetsuo Kinoshita

:
Network Management System Based on Activated Knowledge Resource. 999-1004
Innovative Applications and Security
- Nobuyoshi Sato, Ryota Takamagi, Tsuyoshi Takayama, Yoshitoshi Murata:

A Proposal of a Simplified Jumping Distance Measurement Method for Ski Jumper's Motion Monitoring System Using Terrestrial Magnetism and Acceleration Sensors. 1005-1010 - Yoshinari Nomura, Syunsuke Mihara, Hideo Taniguchi:

Implementation of a Practical Calendaring System Conforming with Ambiguous Pattern of Recurring Tasks. 1011-1016 - Peng Wan, Minoru Uehara:

Spam Detection Using Sobel Operators and OCR. 1017-1022 - Yuji Suga:

Interactive Fingerprint. 1023-1026 - Kenzi Watanabe, Makoto Otani, Shin-ichi Tadaki

, Yoshiaki Watanabe:
Opengate on Cloud. 1027-1030
The Fourth International Workshop on Disaster and Emergency Information Network Systems (IWDENS-2012)
Disaster Information Networks
- Toshihiro Suzuki, Yoshitaka Shibata:

Wireless Network System with Autonomous Antenna Actuator Control for Disaster Information. 1031-1036 - Tetsuya Shigeyasu, Shota Katahira, Hitoshi Morioka, Hiroshi Matsuno:

Construction of IEEE802.11-based Wireless Network for Community Information Sharing in a Disaster-Affected Area. 1037-1042 - Noriki Uchida, Kazuo Takahata, Yoshitaka Shibata:

Network Relief Activity with Cognitive Wireless Network for Large Scale Disaster. 1043-1047 - Yutaka Sasaki, Yoshitaka Shibata:

A Disaster Information Sharing Method by the Mobile Servers in Challenged Networks. 1048-1053
Disaster Support Systems
- Yoshitaka Shibata, Noriki Uchida, Yuji Ohhashi:

Problem Analysis and Solutions of Information Network Systems on East Japan Great Earthquake. 1054-1059 - Norihisa Segawa, Yusuke Shinohe, Jun Sawamoto:

A Proposal of Forestry Worker Support System Using HMD. 1060-1064 - Erina Gyoba:

Differences in the Behaviors Collecting Information from Available Media between the Students of Afflicted and Those of Non-afflicted Prefectures in the Crisis Caused by the 2011 Off Pacific Coast of Tohoku Earthquake. 1065-1068 - Hiroaki Yuze, Naoyoshi Suzuki:

Development of Cloud Based Safety Confirmation System for Great Disaster. 1069-1074
The Third International Workshop on Cloud Computing, Services, and Interoperability (CCSI-2012)
- Byambajargal Byambajav, Tomasz Wiktor Wlodarczyk, Chunming Rong

, Paea LePendu
, Nigam Shah:
Performance of Left Outer Join on Hadoop with Right Side within Single Node Memory Size. 1075-1080 - Shinichi Sazawa, Masayoshi Hashima, Yuichi Sato, Kenichi Horio, Kazuki Matsui

:
RVEC: Efficient Remote Desktop for the ENGINEERING CLOUD. 1081-1088 - Yuki Ashino, Masayuki Nakae:

Virtual Machine Migration Method between Different Hypervisor Implementations and Its Evaluation. 1089-1094 - Wu-Hsiao Hsu, Yuh-Pyng Shieh, Chia-Hui Wang

, Sheng-Cheng Yeh:
Virtual Network Mapping through Path Splitting and Migration. 1095-1100
The Second International Workshop on Protocols and Applications with Multi-homing Support (PAMS-2012)
- Johan Eklund, Karl-Johan Grinnemo, Anna Brunström:

On the Use of an Increased Initial Congestion Window to Improve mSCTP Handover Performance. 1101-1106 - Pehr Söderman

, Karl-Johan Grinnemo, Georgios Cheimonidis, Yuri Ismailov, Anna Brunström:
An SCTP-based Mobility Management Framework for Smartphones and Tablets. 1107-1112 - Thomas Dreibholz

, Hakim Adhari, Martin Becke, Erwin P. Rathgeb:
Simulation and Experimental Evaluation of Multipath Congestion Control Strategies. 1113-1118 - Codé Diop, Guillaume Dugué, Christophe Chassot, Ernesto Exposito

:
QoS-oriented MPTCP Extensions for Multimedia Multi-homed Systems. 1119-1124
The Second International Workshop on Complex Information Flows (CIF-2012)
- K. Habibul Kabir

, Masahiro Sasabe, Tetsuya Takine:
Integer Programming Formulation for Grouping Clusters in Ferry-assisted DTNs. 1125-1130 - Hiroyuki Ohsaki, Yosuke Yamada, Dimitri Perrin

, Makoto Imase:
Impact of Mobility Constraints on Epidemic Broadcast Mechanisms in Delay-Tolerant Networks. 1131-1136 - Sho Tsugawa, Hiroyuki Ohsaki, Makoto Imase:

Lightweight Distributed Method for Connectivity-based Clustering Based on Schelling's Model. 1137-1142 - Dimitri Perrin

, Hiroyuki Ohsaki:
Decentralised Communication in Autonomous Agent Swarms. 1143-1146
The International Workshop on Bioinformatics and Life Science Modeling and Computing (BLSMC-2012)
- Jacques Demongeot

, Jules Waku:
Robustness in Genetic Threshold Boolean Random Regulatory Networks: A Mathematical Approach. 1147-1152 - Jacques Demongeot

, Olivier Hansen, Anne-Sophie Jannot, Carla Taramasco:
Random Modelling of Contagious (Social and Infectious) Diseases: Examples of Obesity and HIV and Perspectives Using Social Networks. 1153-1160 - Jimmy Nagau

, Sébastien Régis, Jean-Luc Henry, Andrei Doncescu:
Study of Aggregation Operators for Scheduling Clusters in Digital Images of Plants. 1161-1166 - Sébastien Régis, Andrei Doncescu, Makoto Takizawa

, Guillaume Cleuziou:
Initialization of Masses by the Okm for the Belief Function Theory: Application to System Biology. 1167-1171 - Mourad Benkaci, Andrei Doncescu, Makoto Takizawa

:
Conflict Intersection as Diagnostic Model. 1172-1177
The First International Workshop on inter-Clouds and Collective Intelligence (iCCI-2012)
Efficient Resource Management and Allocation
- Chih-Wei Tsai, Zsehong Tsai:

Bid-Proportional Auction for Resource Allocation in Capacity-Constrained Clouds. 1178-1183 - Nik Bessis

, Stelios Sotiriadis, Florin Pop, Valentin Cristea:
An Architectural Strategy for Meta-scheduling in Inter-clouds. 1184-1189 - Sheheryar Malik

, Fabrice Huet, Denis Caromel:
Latency Based Dynamic Grouping Aware Cloud Scheduling. 1190-1195 - Tatsuya Mori, Makoto Nakashima, Tetsuro Ito:

A Sophisticated Ad Hoc Cloud Computing Environment Built by the Migration of a Server to Facilitate Distributed Collaboration. 1196-1202
Efficient Data Management and Allocation
- Ching-Ming Chao, Guan-Lin Chao:

Resource-Aware Density-and-Grid-Based Clustering in Ubiquitous Data Streams. 1203-1208 - Masaki Kohana, Shusuke Okamoto, Atsuko Ikegami:

Optimal Data Allocation for Keeping Fairness of Online Game. 1209-1214
Added Value for Inter-enterprises
- Andreas Mladenow

, Elisabeth Fuchs, Paul Dohmen, Christine Strauss
:
Value Creation Using Clouds: Analysis of Value Drivers for Start-Ups and Small and Medium Sized Enterprises in the Textile Industry. 1215-1220 - Martin Polaschek, Wolfgang Zeppelzauer, Natalia Kryvinska

, Christine Strauss
:
Enterprise 2.0 Integrated Communication and Collaboration Platform: A Conceptual Viewpoint. 1221-1226 - Oksana Urikova

, Irena Ivanochko
, Natalia Kryvinska
, Christine Strauss
, Peter Zinterhof:
Exploration of Factors Affecting the Advancement of Collaborative eBusiness in the Enterprises: Research Efforts Examination. 1227-1232 - Serguei Dobrinevski:

Organizational Pattern Discovery Linked to Activities. 1233-1237
Performance Analysis
- Fares Almari, Pavol Zavarsky, Ron Ruhl, Dale Lindskog, Amer Aljaedi

:
Performance Analysis of Oracle Database in Virtual Environments. 1238-1245 - Hong-Chun Hsu, Pao-Lien Lai:

Adaptive Diagnosis for Grids under the Comparison Model. 1246-1251 - Joon S. Park, Edward Spetka, Hassan Rasheed, E. Paul Ratazzi

, Keesook J. Han:
Near-Real-Time Cloud Auditing for Rapid Response. 1252-1257 - James Hardy

, Lu Liu
, Nik Bessis
, Lei Cui, Jianxin Li:
Performance Measurements in iVIC Virtual Machine Clones. 1258-1263
Games, Social Networks and Collaboration
- Somayeh Koohborfardhaghighi, Juntae Kim:

Improving Recommendation Flow with Centrality Measure in an Evolving Social Network. 1264-1269 - Toshihiko Yamakami:

It is not a Game, Not Even Social: New Service Engineering Paradigms from Lessons Learned in Mobile Social Games in Japan. 1270-1274 - Michal Szczerbak, François Toutain, Ahmed Bouabdallah, Jean-Marie Bonnin:

Collaborative Context Experience in a Phonebook. 1275-1281 - Tadafumi Hayakawa, Masayuki Higashino, Kenichi Takahashi, Takao Kawamura, Kazunori Sugahara:

Management of Multimedia Data for Streaming on a Distributed E-learning System. 1282-1285
Security and Services
- Ronald Petrlic, Christoph Sorge:

Privacy-Preserving DRM for Cloud Computing. 1286-1291 - Qingni Shen, Yahui Yang, Zhonghai Wu, Xin Yang, Lizhe Zhang, Xi Yu, Zhenming Lao, Dandan Wang, Min Long:

SAPSC: Security Architecture of Private Storage Cloud Based on HDFS. 1292-1297 - Jarle Hansen, Tor-Morten Grønli, Gheorghita Ghinea

:
Cloud to Device Push Messaging on Android: A Case Study. 1298-1303 - Wei Dai, Jonathan J. Liu, Axel Korthaus

:
Towards a Framework for Context-Aware Services Management. 1304-1309
The 2012 International Symposium on Object-Oriented Intelligent Web Information Technologies and Applications (OIWITA-2012)
Cloud Computing and Energy Saving
- Sheng-Yuan Yang, Dong-Liang Lee:

Developing a Cloud Intelligent and Energy-Saving Information Interface Agent with Web Services. 1310-1315 - Chih-Yung Chen, Hsiang-Yi Tseng:

An Exploration of the Optimization of Excutive Scheduling in the Cloud Computing. 1316-1319 - Dong-Liang Lee, Kune-Yao Chen, Chun-Liang Hsu, Sheng-Yuan Yang:

Design for Middle-Way of Intelligent Energy-Saving System with Embedded System. 1320-1325
Platforms and Algorithms
- Kune-Yao Chen, Hsiu-Chuan Liu, Steve Tu:

A Study on the Establishment of Online S-P Platform. 1326-1331 - Dong-Liang Lee, Jih-Fu Tu, Hsuan-Jung Lee, Kwang Pi Chen:

Verifying the Produce of Car-Bind through Timed Petri Net. 1332-1336 - Lawrence Y. Deng, Yung-Hui Chen, Yi-Jen Liu:

Preference Sorting Based on User's Relevance Feedback. 1337-1342
The International Workshop on Networked Virtual Enterprises (NetVE 2012)
- Ugo Barchetti, Antonio Capodieci

, Anna Lisa Guido, Luca Mainetti
:
Collaborative Process Management for the Networked Enterprise: A Case Study. 1343-1348 - Hassan Fatemi, Marten van Sinderen

, Roel J. Wieringa:
Managing Trust in Business Webs Using Game Theory. 1349-1354 - Vu Minh Hoang, Hanh Huu Hoang:

An Ontological Approach for Dynamic Cross-Enterprise Collaboration. 1355-1360

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














