default search action
6. IMIS 2012: Palermo, Italy
- Ilsun You, Leonard Barolli, Antonio Gentile, Hae-Duck Joshua Jeong, Marek R. Ogiela, Fatos Xhafa:
Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012, Palermo, Italy, July 4-6, 2012. IEEE Computer Society 2012, ISBN 978-1-4673-1328-5 - Mauro Migliardi, Marco Gaudina:
The 4W (What-Where-When-Who) Project Goes Social. 1-8 - Wenzhu Zhang, Bing Zhu, Lin Zhang, Jian Yuan, Ilsun You:
Exploring Urban Dynamics Based on Pervasive Sensing: Correlation Analysis of Traffic Density and Air Quality. 9-16 - Eun-Ae Cho, Kyungroul Lee, Kangbin Yim:
A Privacy Preserving Model for Personal Information in Search Engine. 17-21 - Kyungroul Lee, Eun-Ae Cho, Kangbin Yim:
A Novel Search System for Protecting Search Word. 22-28 - Ashiq Anjum, Nik Bessis, Richard McClatchey, Kamran Munir, Irfan Habib, Andrew Branson, Jetendr Shamdasani:
A Service Oriented Analysis Environment for Neuroimaging Studies. 29-36 - Marek Dabrowski, Justyna Gromada, Hassnaa Moustafa:
Context-Awareness for IPTV Services Personalization. 37-44 - Hyun Jung Lee, Mye M. Sohn:
Collaborative Decision-Making Framework for Supporting Multi-mobile Decision-Makers Using Ontology. 45-51 - Tomasz Hachaj, Marek R. Ogiela:
Neural Network Approach for Identification of Selected Brain Perfusion Abnormalities. 52-57 - Lidia Ogiela, Dorota Srebrny:
Cognitive Applications for Semantic and Cognitive Data Analysis. 58-63 - Lidia Ogiela, Marek R. Ogiela:
Cognitive Analysis Systems for 3D Image Data Interpretation. 64-68 - Miroslaw Trzupek, Marek R. Ogiela:
Data Aggregation Techniques in Heart Vessel Modelling and Recognition of Pathological Changes. 69-72 - Sazia Parvin, Song Han, Zia ur Rehman, Mohammad Abdullah Al Faruque, Farookh Khadeer Hussain:
A New Identity-Based Group Signature Scheme Based on Knapsack ECC. 73-80 - Haibo Tian, Xiaofeng Chen, Fangguo Zhang, Baodian Wei, Zhengtao Jiang, Yi Liu:
An Efficient Identity-Based Strong Designated Verifier Signature without Delegatability. 81-88 - Yu Han, Kangbin Yim, Xiaochen Lai, Guangwei Xu, Hui Liu, Xilan Wang:
A New Iterative Learning Control Scheme Based on Damped Newton Method for Nonlinear Systems. 89-92 - Seung-Hyun Seo, Taenam Cho:
An Access Control Mechanism for Remote Control of Home Security System. 93-98 - Lidia Ogiela:
Biological Modelling in Semantic Data Analysis Systems. 99-102 - Myunggwon Hwang, Sa-Kwang Song, Do-Heon Jeong, Hanmin Jung, Jinhyung Kim:
Similarity Measurement between Objects and Activities for User Intention Modeling. 103-107 - Marek R. Ogiela, Marcin Piekarczyk:
Random Graph Languages for Distorted and Ambiguous Patterns: Single Layer Model. 108-113 - Aniello Castiglione, Giuseppe Cattaneo, Giancarlo De Maio, Alfredo De Santis, Gerardo Costabile, Mattia Epifani:
The Forensic Analysis of a False Digital Alibi. 114-121 - Kwangjin Bae, Ilsun You, Kangbin Yim, Taeho Son:
A Secure Secondary Backup Storage with an Isolated Authentication. 122-125 - Seung-Hyun Seo, Dong-Guen Lee, Kangbin Yim:
Analysis on Maliciousness for Mobile Applications. 126-129 - Francesco Colace, Massimo De Santo, Salvatore Ferrandino:
A Slow Intelligent Approach for the Improvement of Intrusion Detection and Prevention System. 130-137 - Sung-Hwa Lim, Jungsup Oh, Byoung-Hoon Lee, Mye M. Sohn:
Threshold-Based Energy-Efficient Data Transmission Policy for Mobile Devices. 138-142 - Tianhan Gao, Nan Guo, Kangbin Yim:
Delegation-Based Mutual Authentication Scheme for Multi-operator Wireless Mesh Network. 143-147 - Tim French, Nik Bessis:
Towards a Context-Aware and Adaptable Room System for Intelligent "Trusted" Office-Spaces in Smart Cities. 148-154 - Ville Kotovirta, Timo Toivanen, Renne Tergujeff, Markku Huttunen:
Participatory Sensing in Environmental Monitoring - Experiences. 155-162 - Aaron Ballew, Shiva Srivastava, Nikolay Valtchanov, Chung-Chieh Lee, Aleksandar Kuzmanovic:
Characterization of Vision-Aided Indoor Localization and Landmark Routing. 163-170 - Byeong-Kyu Ko, Dongjin Choi, Chang Choi, Junho Choi, Pankoo Kim:
Document Classification through Building Specified N-Gram. 171-176 - Linchao Zhang, Renato Ferrero, Filippo Gandino, Maurizio Rebaudengo:
A Comparison between Single and Additive Contribution in RFID Reader-to-Reader Interference Models. 177-184 - Fei Song, Huachun Zhou, Sidong Zhang, Hongke Zhang, Ilsun You:
Performance Analysis of Reliable Transmission on Multiple Paths and Single Path. 185-190 - Fei Song, Daochao Huang, Huachun Zhou, Ilsun You:
Application-Aware Virtual Machine Placement in Data Centers. 191-196 - Xingjun Zhang, Endong Wang, Feilong Tang, Meishun Yang, Hengyi Wei, Xiaoshe Dong:
Transient Fault Tolerance for ccNUMA Architecture. 197-202 - Yuening Kang, Xingjun Zhang, Nan Wu, Weiguo Wu, Xiaoshe Dong:
Fuzzy Fault Tree Based Fault Detection. 203-207 - Jingwei Miao, Omar Hasan, Sonia Ben Mokhtar, Lionel Brunie, Kangbin Yim:
An Analysis of Strategies for Preventing Selfish Behavior in Mobile Delay Tolerant Networks. 208-215 - Jianfeng Guan, Changqiao Xu, Kai Wang, Huachun Zhou, Hongke Zhang:
ILSRO: Identifier/Location Split-Based Route Optimization for PMIPv6. 216-223 - Jeremy A. Hansen:
Extending Mesh Networks to Opportunistic Resource Sharing. 224-230 - Longteng Yi, Yujia Zhai, Yue Wang, Jian Yuan, Ilsun You:
Impacts of Internal Network Contexts on Performance of MANET Routing Protocols: A Case Study. 231-236 - Bowen Deng, Yujia Zhai, Yue Wang, Jinhai Huo, Jian Yuan, Ilsun You:
A Terrain-Awareness Based Mobility Model with Markov Random Disturbance for Tactical MANET. 237-243 - Mohannad Ayash, Mohammad A. Mikki, Kangbin Yim:
Improved AODV Routing Protocol to Cope with High Overhead in High Mobility MANETs. 244-251 - Liang (Ben) Chen, Maria Prokopi:
A Resource-Aware Pairing Device Framework for Ubiquitous Cloud Applications. 252-258 - Giulio Caravagna, Gabriele Costa, Luca Wiegand, Giovanni Pardini:
Lazy Monitoring for Distributed Computing Environments. 259-265 - Xin Li, Zhuzhong Qian, Ruiqing Chi, Bolei Zhang, Sanglu Lu:
Balancing Resource Utilization for Continuous Virtual Machine Requests in Clouds. 266-273 - Li Yi, Huachun Zhou, Hongke Zhang:
An Efficient Distributed Mobility Management Scheme Based on PMIPv6. 274-279 - Bolei Zhang, Zhuzhong Qian, Wei Huang, Xin Li, Sanglu Lu:
Minimizing Communication Traffic in Data Centers with Power-Aware VM Placement. 280-285 - Haibin Cai, Chao Peng, Yue Zhang:
A Novel Framework of Self-Adaptive Fault-Tolerant for Pervasive Computing. 286-291 - Chen Li, Linpeng Huang, Luxi Chen, Weichao Luo:
Using Dynamic Probe for Deadlock Detection in Component-Based System. 292-299 - Navneet Chand, Samad Salehi Kolahi:
TCP Throughput of IPv6 and IPv4 on IEEE 802.11n Wireless Client Server LAN in Windows Vista/XP - Server 2008 Environment. 300-304 - Fei Ren, Huachun Zhou:
Implementation and Test of PMIPv6 Dual Stack Protocol. 305-310 - Luigi Benedicenti, Sheila Petty:
Text Interface Adaptation in Ubiquitous Applications. 311-316 - Qian Li, Peter Quax, Kris Luyten, Wim Lamotte:
A Cognitive Network for Intelligent Environments. 317-322 - Salim Allal, Saadi Boudjit:
Geocast Routing Protocols for VANETs: Survey and Guidelines. 323-328 - Jen-Wei Hu, Wun-Yuan Huang, Hui-Min Tseng, Hui-Lan Lee, Li-Chi Ku, Shu-Cheng Lin, Te-Lung Liu, Chu-Sing Yang:
Future Internet in Taiwan: Design and Research Activities over TWAREN Network. 329-333 - Daniel Günther, Nathan Kerr, Paul Müller:
A Multistep Process Model for Selecting and Composing Functional Blocks in a Future Internet Architecture. 334-339 - Abbas Ali Siddiqui, Paul Müller:
A Requirement-Based Socket API for a Transition to Future Internet Architectures. 340-345 - M. Rahamatullah Khondoker, Abbas Ali Siddiqui, Bernd Reuther, Paul Müller:
Service Orientation Paradigm in Future Network Architectures. 346-351 - Inshil Doh, Jiyoung Lim, Min Young Chung:
Group Key Management for Secure Mobile IPTV Service. 352-357 - Raimund Schatz, Tobias Hoßfeld, Pedro Casas:
Passive YouTube QoE Monitoring for ISPs. 358-364 - Arisu An, Hae-Duck Joshua Jeong, Jiyoung Lim, WooSeok Hyun:
Design and Implementation of Location-Based SNS Smartphone Application for the Disabled Population. 365-370 - Yong-Hwan Lee, Sang-Burm Rhee, Bonam Kim:
Content-Based Image Retrieval Using Wavelet Spatial-Color and Gabor Normalized Texture in Multi-resolution Database. 371-377 - Yan Wen, Jinjing Zhao, Gang Zhao, Hua Chen, Dongxia Wang:
A Survey of Virtualization Technologies Focusing on Untrusted Code Execution. 378-383 - Bing Lin, Wenzhong Guo, Guolong Chen:
Edges Immunization Strategy Based on Discrete PSO in Weighted Scale-Free Network. 384-389 - Minjie Zheng, Zhicheng Lei, Yue Liu, Xiangwen Liao, Guolong Chen:
Identify Sentiment-Objects from Chinese Sentences Based on Skip Chain Conditional Random Fields Model. 390-394 - Yang Zhao, Zhiguang Qin:
An Optimistic Protocol for Distributed Fair Exchange. 395-399 - Xiao Xia Sun, Hua Chen, Yan Wen, Minhuan Huang:
Reversing Engineering Data Structures in Binary Programs: Overview and Case Study. 400-404 - Bin Wen, Wenzhong Guo, Guolong Chen:
Network Security Situation Element Extraction Based on Projection Pursuit Regression. 405-408 - Rui-Fen Wu, Guo-Long Chen:
Research of Network Security Situation Prediction Based on Multidimensional Cloud Model. 409-414 - Jinjing Zhao, Yan Wen, Xiang Li, Wei Peng, Feng Zhao:
The Relation on Prefix Hijacking and the Internet Hierarchy. 415-420 - Dan Zhao, Hongjun Liu, Xiaofeng Hu, Chunqing Wu:
Constructing Robust Dissemination Paths in Centralized Control Network. 421-426 - Zhenqian Feng, Bing Bai, Baokang Zhao, Jinshu Su:
An Analytic Goodput Model for TCP Incast. 427-432 - Yanpeng Ma, Jinshu Su, Chunqing Wu, Xiaofeng Wang, Wanrong Yu, Baokang Zhao, Xiaofeng Hu:
A Distribute and Geographic Information Based Routing Algorithm for LEO Satellite Constellation Networks. 433-438 - Hongjun Liu, Xiaofeng Hu, Dan Zhao, Xicheng Lu:
Locating Routing Instability Based on Path Exploration. 439-444 - Qiang Liu, Li Liu, Xiaohui Kuang, Yan Wen:
Secure Service and Management for Security-Critical Wireless Sensor Network. 445-449 - Dong Liu, Yi Li, Weiyan Xing, Bo Wang:
Research on the Universal Platform for Aerospace Craft Simulation. 450-453 - Chia-Hsin Cheng, Hsinying Liang, Yung-Fa Huang, Tian-Yue Wu:
Energy Efficient Block Division Methods for Data Aggregation in Wireless Sensor Networks. 454-458 - Leonard Barolli, Qi Wang, Elis Kulla, Fatos Xhafa, Bexhet Kamo, Makoto Takizawa:
A Fuzzy-Based Cluster-Head Selection System for WSNs: A Comparison Study for Static and Mobile Sensors. 459-464 - Hsi-Chou Hsu, Jyh-Horng Wen:
A Low Complexity IR-UWB Receiver for Wireless Sensor Networks. 465-468 - Yung-Fa Huang, Tan-Hsu Tan, Chia-Hsing Cheng:
Performance of Adaptive Partial Interference Cancellation for Near-Far Environments in OFDMA Systems. 469-474 - Yung-Cheng Yao, Ying-Chih Kuo, Jyh-Horng Wen:
A Simplified Wiener-Based SIC ICI Cancellation Scheme for OFDM Systems over Time-Varying Channels. 475-480 - Chien-Erh Weng, Chun-Yin Chen:
Performance Study of IEEE 802.11 DCF with Optimal Contention Window. 481-484 - Shu-Hong Lee, Ho-Lung Hung:
Modified Dummy Sequence Generator for DSI on PAPR Reduction in OFDM Systems. 485-488 - Tzu-Liang Kung, Cheng-Kuan Lin, Jimmy J. M. Tan, Hon-Chan Chen, Hsing-Chung Chen:
Identifying Restricted-Faults in Multiprocessor Meshes under the PMC Diagnostic Model. 489-493 - Hsing-Chung Chen, Marsha Anjanette Violetta:
Cognitive RBAC in Small Heterogeneous Networks. 494-499 - Jheng-Sian Li, Yung-Cheng Yao, Chun-Hung Chen, Jyh-Horng Wen:
A Method to Improve the Accuracy of the TOA Position Location Solution in Multistatic Radar Systems. 500-505 - Hsing-Chung Chen, Syuan-Zong Lin, Tzu-Liang Kung:
Three-Party Authenticated Quantum Key Distribution Protocol with Time Constraint. 506-511 - Rajeev Tiwari, Neeraj Kumar:
A Novel Hybrid Approach for Web Caching. 512-517 - Wei-Shuo Li, Chun-Wei Tsai, Jong-Hyouk Lee, Wen-Shyong Hsieh:
A Sparse Clustering Model of Wireless Communication Networks. 518-523 - Der-Chen Huang, Hsiang-Wei Wu, Yi-Wei Lee:
A Cluster-Tree-Based GTS Allocation Scheme for IEEE 802.15.4 MAC Layer. 524-528 - Ming-Yi Liao, Jynu-Hao Li, Chu-Sing Yang, Min Chen, Chun-Wei Tsai, Ming-Cho Chang:
Botnet Topology Reconstruction: A Case Study. 529-534 - Satoru Noguchi, Satoshi Matsuura, Kazutoshi Fujikawa:
Performance Analysis of Mobile Publish-Subscribe Service Discovery on IPv6 over GeoNetworking. 535-540 - Jianfeng Guan, Ilsun You, Changqiao Xu, Huachun Zhou, Hongke Zhang:
Survey on Route Optimization Schemes for Proxy Mobile IPv6. 541-546 - Insung Hong, Jinsung Byun, Sehyun Park:
Cloud Computing-Based Building Energy Management System with ZigBee Sensor Network. 547-551 - Benjamin Peterson, Sergio Ricciardi, Jordi Nin:
Energy-Efficiency and Security Issues in the Cisco Nexus Virtual Distributed Switching. 552-557 - Damien Riquet, Gilles Grimaud, Michaël Hauspie:
Large-Scale Coordinated attacks: Impact on the Cloud Security. 558-563 - Irina Astrova, Stella Gatziu Grivas, Marc Schaaf, Arne Koschel, Jan Bernhardt, Mark Dennis Kellermeier, Stefan Nitz, Francisco Carriedo Scher, Michael Herr:
Security of a Public Cloud. 564-569 - Ko-Chung Wei, Yi-Li Huang, Fang-Yie Leu:
A Secure Communication over Wireless Environments by Using a Data Connection Core. 570-575 - Chin-Ling Chen, Yu-Ting Tsai, Tzay-Farn Shih:
A Novel Key Management of Two-Tier Dissemination for Wireless Sensor Network. 576-579 - Sumayah Al-Rabiaah, Jalal Al-Muhtadi:
ConSec: Context-Aware Security Framework for Smart Spaces. 580-584 - Raffaele Pizzolante, Bruno Carpentieri:
Copyright Protection for Images on Mobile Devices. 585-590 - Clara Maria Colombini, Antonio Colella, Aniello Castiglione, Vincenzo Scognamiglio:
The Digital Profiling Techniques Applied to the Analysis of a GPS Navigation Device. 591-596 - Valentina Casola, Mariana Esposito, Nicola Mazzocca, Francesco Flammini:
Freight Train monitoring: A Case-Study for the pSHIELD Project. 597-602 - Aniello Castiglione, Alfredo De Santis, Ugo Fiore, Francesco Palmieri:
Device Tracking in Private Networks via NAPT Log Analysis. 603-608 - Giuseppe Cattaneo, Pompeo Faruolo, Umberto Ferraro Petrillo:
Experiments on Improving Sensor Pattern Noise Extraction for Source Camera Identification. 609-616 - Alex Roehrs, Cristiano André da Costa, Jorge Luis Victória Barbosa:
A Proposal of a Mobile Payment System Based on Android. 617-622 - Chu-Hsing Lin, Jung-Chun Liu, Wen-Chen Wu, Tsau-Wei You, Ming-Hung Liu:
Mobile Computer System with User Friendly Environment and Security Protection. 623-627 - Giovanni Acampora, Vincenzo Loia, Autilia Vitiello:
Using ANFIS and FML for Deploying Transparent Services in Smart Environments. 628-633 - Antonio Colella, Clara Maria Colombini:
Security Paradigm in Ubiquitous Computing. 634-638 - Taketoshi Sakuraba, Kouichi Sakurai:
Proposal of the Hierarchical File Server Groups for Implementing Mandatory Access Control. 639-644 - Nobuyuki Teraura, Kouichi Sakurai:
Preventing the Access of Fraudulent WEB Sites by Using a Special Two-Dimensional Code. 645-650 - Tetsuya Izu, Masahiko Takenaka, Jun Yajima, Takashi Yoshioka:
Integrity Assurance for Real-Time Video Recording. 651-655 - Yuji Suga:
Countermeasures and Tactics for Transitioning against the SSL/TLS Renegotiation Vulnerability. 656-659 - Satoshi Tanaka, Takashi Nishide, Kouichi Sakurai:
Efficient Implementation of Evaluating Multivariate Quadratic System with GPUs. 660-664 - Motoki Kitahara, Takashi Nishide, Kouichi Sakurai:
A Method for Embedding Secret Key Information in RSA Public Key and Its Application. 665-670 - Hiroaki Kikuchi, Anna Mochizuki:
Privacy-Preserving Collaborative Filtering Using Randomized Response. 671-676 - Harunobu Agematsu, Junya Kani, Kohei Nasaka, Hideaki Kawabata, Takamasa Isohara, Keisuke Takemori, Masakatsu Nishigaki:
A Proposal to Realize the Provision of Secure Android Applications - ADMS: An Application Development and Management System. 677-682 - Markus Jung, Christian Reinisch, Wolfgang Kastner:
Integrating Building Automation Systems and IPv6 in the Internet of Things. 683-688 - René Schumann, Dominique Genoud:
Demand Forecasting and Smart Devices as Building Blocks of Smart Micro Grids. 689-694 - Suho Jeong, Seong Hoon Kim, Minkeun Ha, Taehong Kim,