default search action
26th AINA Workshops 2012: Fukuoka, Japan
- Leonard Barolli, Tomoya Enokido, Fatos Xhafa, Makoto Takizawa:
26th International Conference on Advanced Information Networking and Applications Workshops, WAINA 2012, Fukuoka, Japan, March 26-29, 2012. IEEE Computer Society 2012, ISBN 978-1-4673-0867-0
The Eighth International Symposium on Frontiers of Information Systems and Network Applications (FINA-2012)
Wireless and Mobile Network Applications
- Akira Sakuraba, Tomoyuki Ishida, Yoshitaka Shibata:
An Input Method for High-Resolution Large 2D Desktop Environment Using Wireless Device with Joystick. 1-6 - Yinghui Zhou, Lei Jing, Junbo Wang, Zixue Cheng:
Separator Design of Gesture Signals Based on Adaptive Threshold Using Wearable Sensors. 7-12 - Jiannong Cao, Chisheng Zhang, Jun Zhang, Yueming Deng, Xin Xiao, Miao Xiong, Jie Zhou, Yang Zou, Gang Yao, Wei Feng, Liang Yang, Yao Yu:
SHAWK: Platform for Secure Integration of Heterogeneous Advanced Wireless Networks. 13-18 - Miwa Takai:
Measurement of Active Quantity of the Subject Movement and Design of Surveillnace Camera System Using High Active Part. 19-24
Cryptography, Authentication, and Security
- Zhen Yu Wu, Dai-Lun Chiang, Tzu-Ching Lin, Yu-Fang Chung, Tzer-Shyong Chen:
A Reliable Dynamic User-Remote Password Authentication Scheme over Insecure Network. 25-28 - Amy Poh Ai Ling, Kokichi Sugihara, Masao Mukaidono:
Security Philosophy Important for a Sustainable Smart Grid System. 29-34 - Tsunetoshi Hayashi:
Source Code Publishing on World Wide Web. 35-40
Architectures and Middleware
- Tor-Morten Grønli, Bendik Bygstad:
A Successful Implementation of Service Oriented Architecture. 41-46 - Gwan-Hwan Hwang, Chi Wu-Lee, Zhong-Xiang Jiang:
Workflow-Based Dynamic Access Control in a Service-Oriented Architecture. 47-52 - Keling Da, Marc Dalmau, Philippe Roose:
WaterCOM: An Architecture Model of Context-Oriented Middleware. 53-60 - Yang-Hsin Fan, Jan-Ou Wu:
Middleware Software for Embedded Systems. 61-65
Privacy and Information Poisoning
- Salah-Eddine Tbahriti, Brahim Medjahed, Zaki Malik, Chirine Ghedira, Michael Mrissa:
How to Preserve Privacy in Services Interaction. 66-71 - Sho Kurita, Kenji Komoriya, Ryuya Uda:
Privacy Protection on Transfer System of Automated Teller Machine from Brute Force Attack. 72-77 - Junya Ishii, Afiza Razali, Ryuya Uda:
Confidential Information Poisoning Methods by Considering the Information Length in Electronic Portable Devices. 78-84 - Sin G. Teo, Vincent C. S. Lee, Shuguo Han:
A Study of Efficiency and Accuracy of Secure Multiparty Protocol in Privacy-Preserving Data Mining. 85-90
Video Streaming and Life Streaming
- Erick Jimenez Rodriguez, Toshiro Nunome, Shuji Tasaka:
Multidimensional QoE Assessment of Multi-view Video and Audio (MVV-A) IP Transmission: The Effects of User Interfaces and Contents. 91-98 - Iori Osada, Takashi Yoshino:
Proposal and Evaluation of User's Actions Distribution Method Using Life Streaming Service on Lifelog System. 99-104 - Kazuyuki Takayama, Takaya Fujimoto, Rei Endo, Hiroshi Shigeno:
Neighbor Selection Based on Transmission Bandwidth on P2P Live Streaming Service. 105-110 - Lei Chen, Narasimha K. Shashidhar, Qingzhong Liu:
Scalable Secure MJPEG Video Streaming. 111-115 - Parinya Sanguansat, Kornkamol Thakulsukanant, Vorapoj Patanavijit:
A Robust Video Super-Resolution Using a Recursive Leclerc Bayesian Approach with an OFOM (Optical Flow Observation Model). 116-121
Intrusion Detection and Blind Signature
- Eugene Albin, Neil C. Rowe:
A Realistic Experimental Comparison of the Suricata and Snort Intrusion-Detection Systems. 122-127 - Jingwei Liu, Zonghua Zhang, Rong Sun, Kyung Sup Kwak:
Certificateless Partially Blind Signature. 128-133 - Shun-ichi Kurino, Noriaki Yoshikai, Toshio Takahashi:
Personal Profile for Coping Behavior in a Virus Infection Situation. 134-140
Web-Based and TV Applications
- Masami Nakazawa, Maike Erdmann, Keiichiro Hoashi, Chihiro Ono:
Social Indexing of TV Programs: Detection and Labeling of Significant TV Scenes by Twitter Analysis. 141-146 - Tolga Arul, Abdulhadi Shoufan:
Consumer Opinions on Short-Interval Charging for Pay-TV over IPTV. 147-153 - Wei Chen, Rong-Chi Chang:
Automatic Web-Based EFP Studio System with XML Documents. 154-159
Secure Networks and Systems
- Wei-Liang Tai, Ya-Fen Chang, Yuan-Fu Li, Shun-Meng Pan:
A Security Enhancement on a Remote User Authentication Scheme Based on the Rabin Cryptosystem with Secure Password Updating. 160-164 - Frank Yeong-Sung Lin, Yu-Shun Wang, Yu-Pu Wu, Chia-Yang Hsu:
Effective Network Defense Strategies against Malicious Attacks with Various Defense Mechanisms under Quality of Service Constraints. 165-170 - Danilo Valeros Bernardo, Doan B. Hoang:
Symbolic Analysis of the Proposed UDT Security Architecture. 171-176 - Yuh-Min Tseng, Yi-Hung Huang, Hui-Ju Chang:
CCA-secure Anonymous Multi-receiver ID-based Encryption. 177-182
Multimedia Applications
- Jenq-Haur Wang, Jeng-Yuan Yang:
Statistical Single-Document Summarization for Chinese News Articles. 183-188 - Samuel Bernard, Xavier Défago, Sébastien Tixeuil:
A Fast and Robust Optimistic Total Order Broadcast for Online Video Games. 189-196 - Wen-Chiao Hsu, I-En Liao, Pei-Hua Lu:
Supporting Efficient XML Query Evaluation Using Double Indexes. 197-202 - Yoshiyuki Tanaka, Kenji Komoriya, Ryuya Uda:
Multiview Playback with Ghost in Required Condition. 203-208
Clustering and Grouping
- Xoluqobo Mkhwanazi, Hanh Le, Edwin H. Blake:
Clustering between Data Mules for Better Message Delivery. 209-214 - Ying-Dar Lin, Chi-Heng Chou, Yuan-Cheng Lai, Tse-Yau Huang, Simon Chung, Jui-Tsun Hung, Frank C. Lin:
Test Coverage Optimization for Large Code Problems. 215-220 - Chun-Nan Lu, Ying-Dar Lin, Chun-Ying Huang, Yuan-Cheng Lai:
Session Level Flow Classification by Packet Size Distribution and Session Grouping. 221-226
Multimedia Systems
- Takashi Yoshino, Shingo Fujita:
DOACOM: Video Chat System with Door-Type Interface. 227-231 - Fumiaki Murakami, Kenji Komoriya, Ryuya Uda, Seiichi Gohshi, Isao Echizen:
Preventing Surreptitious Filming by Saturation Irradiation of Infrared Rays. 232-237 - Alexander Camek, Christian Buckl, Pedro Sebastião Correia, Alois C. Knoll:
An Automotive Side-View System Based on Ethernet and IP. 238-243 - Darun Kesrarat, Vorapoj Patanavijit:
Empirical Study on Performance Comparisons of Block-Based Motion Estimation on Multi Sub-Pixel Displacement with Multiples Block Size. 244-249 - Liang-Yi Chung:
Virtual Reality in College English Curriculum: Case Study of Integrating Second Life in Freshman English Course. 250-253
Network Simulation, Analysis, and Performance Evaluation
- Shinya Saito, Yoshitoshi Murata, Tsuyoshi Takayama, Nobuyoshi Sato:
An International Driving Simulator: Recognizing the Sense of a Car Body by the Simulator. 254-260 - Ying Zhang, Ning Wu, Xiazhi Ke, Fen Ge:
A Coverage-Driven Verification Platform for Evaluating NoC Performance and Test Structure. 261-265 - Munehiro Namba, Yoshiya Nakata:
Probabilistic Replica Allocation in Multihop Networks. 266-273 - Yeim-Kuan Chang, Yu-Hsiang Wang:
CubeCuts: A Novel Cutting Scheme for Packet Classification. 274-279
Routing Algorithms and Traffic Control
- André Egners, Dominic Gatzen, Andriy Panchenko, Ulrike Meyer:
Introducing SOR: SSH-based Onion Routing. 280-286 - Yuwei Xu, Ying Wu, Jingdong Xu, Lin Sun:
Efficient Detection Scheme for Urban Traffic Congestion Using Buses. 287-293 - Shinji Kitagami, Yosuke Kaneko, Takuo Suganuma:
Method of Autonomic Load Balancing for Long Polling in M2M Service System. 294-299 - Taoufik Yeferny, Khedija Arour:
Efficient Routing Method in P2P Systems Based upon Training Knowledge. 300-305
Algorithms
- Feng Xie, Ming Xu, Zhen Chen:
RBRA: A Simple and Efficient Rating-Based Recommender Algorithm to Cope with Sparsity in Recommender Systems. 306-311 - Darun Kesrarat, Vorapoj Patanavijit:
A Novel Robust and High Reliability for Lucas-Kanade Optical Flow Algorithm Using Median Filter and Confidence Based Technique. 312-317 - Datchakorn Tancharoen, Pham Hong Ha, Kornkamol Thakulsukanant, Vorapoj Patanavijit:
Experimental Investigation for Practical Sparsity Number for Image Reconstruction Based on SL0 Algorithm in Discrete Frequency Domain. 318-323
Communication Systems
- Yangwei Li, Qingni Shen, Cong Zhang, Pengfei Sun, Ying Chen, Sihan Qing:
A Covert Channel Using Core Alternation. 324-328 - Jongjoo Park, Eunkyu In, Sangwoo Ahn, Cheoljon Jang, Jongwha Chong:
IEC 61850 Standard Based MMS Communication Stack Design Using OOP. 329-332 - Tunyawat Somjaitaweeporn, Pham Hong Ha, Kornkamol Thakulsukanant, Vorapoj Patanavijit:
An Alternative Robust SL0 Based on Recursive Huber Stochastic Estimation Technique in Frequency Domain. 333-338
Semantic Knowledge and Ontology
- Ko-Wei Huang, Wei-Chung Cheng, Chun-Wei Tsai, Chu-Sing Yang:
Design and Implementation of an Ontology-based Intelligent Project Management System. 339-343 - Gregory Blanc, Daisuke Miyamoto, Mitsuaki Akiyama, Youki Kadobayashi:
Characterizing Obfuscated JavaScript Using Abstract Syntax Trees: Experimenting with Malicious Scripts. 344-351
Internet Computing and Mobile Service Trends
- Toshihiko Yamakami:
From Gamenics to Servicenics: Lessons Learned in Mobile Social Games in Japan toward Service Engineering. 352-356 - Toshiro Minami:
Expertise Level Estimation of Library Books by Patron-Book Heterogeneous Information Network Analysis - Concept and Applications to Library's Learning Assistant Service. 357-362 - Hon Wai Lam, Tharam S. Dillon, Elizabeth Chang, Pornpit Wongthongtham, Wei Lui:
Detecting Events in Narrative Essays. 363-368 - I-Ping Chiang, Yi-Shiang Liao:
Exploring the Key Success Factors of Mobile Commerce in Taiwan. 369-374 - Nobuo Funabiki, Yousuke Korenaga, Yukiko Matsushima, Toru Nakanishi, Kan Watanabe:
An Online Fill-in-the-Blank Problem Function for Learning Reserved Words in Java Programming Education. 375-380
Trust Computing and Assurance
- Chun-Chia Wang, Chang-Cheng Sie:
A Study of Consumers' Trust in Online Shopping between Pick-up Goods Behavior in the Convenience Stores. 381-386 - Denise Umuhoza, Robin Braun:
Trustworthiness Assessment of Knowledge on the Semantic Sensor Web by Provenance Integration. 387-392 - Adil M. Hammadi, Omar Khadeer Hussain:
A Framework for SLA Assurance in Cloud Computing. 393-398
Network Monitoring and Virtualization
- Aki Choho, Nobuyoshi Sato, Tsuyoshi Takayama, Yoshitoshi Murata:
A Proposal of Method for Suspicious Person Detection on P2P Security Camera Network System. 399-405 - Golam Sorwar, Raqibul Hasan:
Smart-TV Based Integrated E-health Monitoring System with Agent Technology. 406-411 - Frank Yeong-Sung Lin, Yu-Shun Wang, Hui-Yu Chung, Jia-Ling Pan:
Maximization of Network Survivability under Malicious and Epidemic Attacks. 412-417 - Lee See Goh, Takaaki Ichimiya, Kazuhiro Watanabe, Norihiko Shinomiya:
A Hetero-core Spliced Optical Fiber Sensor Network for Remote Monitoring of Agricultural Enviroment. 418-422 - Dan Feng, Xiaojing Wang, Wei Zhao, Wei Tong, Jingning Liu:
vSuit: QoS-oriented Scheduler in Network Virtualization. 423-428
Parallel Computing and Interoperability
- Jiageng Yu, Yiwei Ci, Peng Zhou, Yanjun Wu, Chen Zhao:
Deterministic Replay of Multithread Applications Using Virtual Machine. 429-434 - Michel Hurfin, Izabela Moise, Jean-Pierre Le Narzul, Frédéric Majorczyk:
Adaptive Strategies for Speeding Up Sequences of Consensus. 435-442 - Heinz Kredel:
Fostering Interoperability in Java-Based Computer Algebra Software. 443-447
The Eighth International Workshop on Heterogeneous Wireless Networks (HWISE-2012)
Algorithms and Mechanisms for Wireless Networks
- Ying-Hong Wang, Wei-Chih Lin, Cheng-Hung Tsai, Guo-Rui Huang:
A Hybrid Scheduling Mechanism for IEEE 802.16j Networks. 448-453 - Muhammad Qasim Khan, Steinar Hidle Andresen:
PoA Selection in 802.11 Networks Using Media Independent Information Server (MIIS). 454-459 - Sung-Hoon Park, Seoun-Hyung Lee:
Token-Based Mutual Exclusion Algorithm in Mobile Cellular Networks. 460-465 - Nedal Ababneh, Nick F. Timmons, Jim Morrison, David C. Tracey:
Energy-Balanced Rate Assignment and Routing Protocol for Body Area Networks. 466-471
Ad-hoc Networks
- Sanjay Kumar Dhurandher, Isaac Woungang, Abhishek Gupta, Bharat K. Bhargava:
E2SIW: An Energy Efficient Scheme Immune to Wormhole Attacks in Wireless Ad Hoc Networks. 472-477 - Paulo Manoel Mafra, Joni da Silva Fraga, Altair Olivo Santin:
A Distributed IDS for Ad Hoc Networks. 478-483 - Abdulkader Benchi, Frédéric Guidec, Pascale Launay:
JOMS: A Java Message Service Provider for Disconnected MANETs. 484-489 - Saïd Yahiaoui, Yacine Belhoul, Nadia Nouali-Taboudjemat, Hamamache Kheddouci:
AdSIP: Decentralized SIP for Mobile Ad Hoc Networks. 490-495
Sensor and Ad-hoc Applications
- Bo-Si Lee, Hao-Wei Lin, Wernhuar Tarng:
A Cluster Allocation and Routing Algorithm Based on Node Density for Extending the Lifetime of Wireless Sensor Networks. 496-501 - Tsung-Chih Hsiao, Yu-Ting Liao, Jen-Yan Huang, Tzer-Shyong Chen, Gwoboa Horng:
Secure Authentication Scheme for Supporting Healthcare in Wireless Sensor Networks. 502-507 - Yuki Kasama, Toshiaki Miyazaki:
Simultaneous Estimation of the Number of Humans and their Movement Loci in a Room Using Infrared Sensors. 508-513 - Yuto Toguchi, Hiroshi Shigeno:
CDS-Based Routing Scheme Considering Node Properties in Triage Network. 514-519
Mesh Networks
- Sritrusta Sukaridhoto, Nobuo Funabiki, Toru Nakanishi, Kan Watanabe:
A Proposal of CSMA Fixed Backoff-time Switching Protocol and Its Implementation on QualNet Simulator for Wireless Mesh Networks. 520-525 - Edmundo Chissungo, Edwin H. Blake, Hanh Le:
Investigation into Batmand-0.3.2 Protocol Performance in an Indoor Mesh Potato Testbed. 526-532 - Jun Huy Lam, Sanggon Lee, Whye Kit Tan:
Multi-channel Wireless Mesh Networks Test-Bed with Embedded Systems. 533-537 - Kei Kikuchi, Yoshitoshi Murata, Goutam Chakraborty, Tsuyoshi Takayama, Nobuyoshi Sato:
Location Information System for Access Points in the Heterogeneous Wireless Enviornment. 538-543
Security Issues in Ad-hoc and Sensor Networks
- Soumyadev Maity, Ramesh C. Hansdah:
Membership Models and the Design of Authentication Protocols for MANETs. 544-551 - Tatsuro Iida, Keita Emura, Atsuko Miyaji, Kazumasa Omote:
An Intrusion and Random-Number-Leakage Resilient Scheme in Mobile Unattended WSNs. 552-557 - Young-Sil Lee, Tae-Yong Kim, Hoon-Jae Lee:
Mutual Authentication Protocol for Enhanced RFID Security and Anti-counterfeiting. 558-563 - Youjiro Takehana, Iichiro Nishimura, Norihito Yosaka, Tomoyuki Nagase, Yoshio Yoshioka:
Building Trust among Certificates Management Nodes in Mobile Ad-hoc Network. 564-568
Vehicular Networks
- Yiqing Gui, Edward Chan:
Data Scheduling for Multi-item Requests in Vehicle-Roadside Data Access with Motion Prediction Based Workload Transfer. 569-574 - Ján Janech, Anton Lieskovsky, Emil Krsák:
Comparation of Strategies for Data Replication in VANET Environment. 575-580 - Lin Sun, Ying Wu, Jingdong Xu, Yuwei Xu:
An RSU-assisted Cluster Head Selection and Backup Protocol. 581-587 - Giuseppe Ciaccio, Vittoria Gianuzzi:
Designing and Prototyping a Middleware for Vehicular Networks. 588-594
Sensor Networks
- Aoi Hashizume, Tadanori Mizuno, Hiroshi Mineno:
Energy Monitoring System Using Sensor Networks in Residential Houses. 595-600 - Shin-nosuke Toyoda, Fumiaki Sato:
Energy-Effective Clustering Algorithm Based on Adjacent Nodes and Residual Electric Power in Wireless Sensor Networks. 601-606 - Ana Nieto, Javier López:
Traffic Classifier for Heterogeneous and Cooperative Routing through Wireless Sensor Networks. 607-612 - Wataru Seino, Tomoki Yoshihisa, Takahiro Hara, Shojiro Nishio:
A Sensor Data Collection Method with a Mobile Sink for Communication Traffic Reduction by Delivering Predicted Values. 613-618
Wireless Communication Systems and Technologies
- Youji Ochi:
Development of Human-Like Agent to Support Lecture Presentation Using a Wireless Device and Image Processing Technology. 619-622 - Kevin Chin Yiu Shum, Joseph Kee-Yin Ng, Quan Jia Cheng:
The Design and Implementation of a Wireless Location Estimation System in a Wireless Local Area Network. 623-628 - Hiroshi Maeda, Shota Inoue, Shintaro Nakahara, Osamu Hatanaka, Yongmei Zhang, Hiroyuki Terashima:
Experimental Study on X-shaped Photonic Crystal Waveguide in 2D Triangular Lattice for Wavelength Division Multiplexing System. 629-632 - Masafumi Takematsu, Junichi Honda, Kazunori Uchida:
On Accuracy of Discrete Ray Tracing Method in Comparison with Rigorous Solutions. 633-638
Mobile Networks
- Hwi Woon Jeong, Jun Yeol Choi, Hyung Ku Kang, Hee Yong Youn:
An Efficient Group-Based Channel Scanning Scheme for Handover with IEEE 802.16e. 639-644 - Parin Sornlertlamvanich, Sinchai Kamolphiwong, Robert Elz, Panita Pongpaibool:
NEMO-Based Distributed Mobility Management. 645-650 - Masayuki Higashino, Kenichi Takahashi, Takao Kawamura, Kazunori Sugahara:
Mobile Agent Migration Based on Code Caching. 651-656 - Djallel Bouneffouf, Amel Bouzeghoub, Alda Lopes Gançarski:
Following the User's Interests in Mobile Context-Aware Recommender Systems: The Hybrid-e-greedy Algorithm. 657-662
Context Aware Middleware for Ubiquitous Computing Environments
- Senaka Buthpitiya, Faisal B. Luqman, Martin L. Griss, Bo Xing, Anind K. Dey:
Hermes - A Context-Aware Application Development Framework and Toolkit for the Mobile Environment. 663-670 - François Toutain, Fano Ramparany, Ewelina Szczekocka:
Semantic Context Reasoning for Formulating User Location. 671-677
The Seventh International Workshop on the Performance Analysis and Enhancement of Wireless Networks (PAEWN-2012)
Wireless Mesh and Mobile Networks
- Jason B. Ernst, Joseph Alexander Brown:
Co-existence of Evolutionary Mixed-Bias Scheduling with Quiescence and IEEE 802.11 DCF for Wireless Mesh Networks. 678-683 - Somayeh Nikbakhsh, Azizah Bt Abdul Manaf, Mazdak Zamani, Maziar Janbeglou:
A Novel Approach for Rogue Access Point Detection on the Client-Side. 684-687
Wireless Systems and Technologies
- Ranjeet Singh Tomar, Shekhar Verma:
Enhanced SDMA for VANET Communication. 688-693