


default search action
10. IMIS 2016: Fukuoka, Japan
- 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2016, Fukuoka, Japan, July 6-8, 2016. IEEE Computer Society 2016, ISBN 978-1-5090-0984-8

IMIS 2016
Session 1: Context and Location-Aware Computing
- Eunji Lee, Chang Choi

, Minchang Lee, Kunseok Oh, Pankoo Kim:
An Approach for Predicting Disease Outbreaks Using Fuzzy Inference among Physiological Variables. 1-4 - Jen-Chang Liu, Chieh-Yu Chiang, Sam Chen:

Image-Based Plant Recognition by Fusion of Multimodal Information. 5-11 - Yi-Hau Liu, Shian-Hua Lin, Chun-Ku Lai, Chun-Che Huang, Cheng-Yu Lu:

Mining Crowdsourcing Photos for Recognizing Landmark Areas. 12-19 - Chen-Ying Hsieh, Jeng-Wei Lin

:
Component Extraction from Handwritten Chinese Characters for Font Synthesis in Personal Style Using Smartphone APP. 20-25 - Yi-Lin Hsu, Yan-Ju Chen, Sheng-Wen Shih:

A Particle Filter Approach for Pedestrian Dead Reckoning Using Wearable Sensors. 26-32 - Sheraz Hussain, Nadeem Javaid

, Muhammad, Israr Ahmad
, Umar Qasim, Zahoor Ali Khan
:
Performance Analysis of Amplify and Forward Technique in Region Based Cooperative Routing for Underwater Wireless Sensor Networks. 33-41
Session 2: Wireless Sensor Networks
- Donald Elmazi

, Shinji Sakamoto
, Elis Kulla, Tetsuya Oda, Makoto Ikeda, Leonard Barolli:
A QoS-aware Actor Node Selection System for Wireless Sensor and Actor Networks Using Fuzzy Logic. 42-48 - Taimur Hafeez, Nadeem Javaid

, Ahmad Raza Hameed, Arshad Sher
, Zahoor Ali Khan
, Umar Qasim:
AVN-AHH-VBF: Avoiding Void Node with Adaptive Hop-by-Hop Vector Based Forwarding for Underwater Wireless Sensor Networks. 49-56 - Syed Zarar, Nadeem Javaid

, Arshad Sher
, Ahmad Raza Hameed, Zahoor Ali Khan
, Umar Qasim:
Geographic and Opportunistic Clustering for Underwater WSNs. 57-62 - Deok-Ki Kim, Jae-Hyeon Park, Jung-Won Lee:

Multi-sensor Based Low Power Sensing Model for Inferencing Location Context. 63-69 - Malik Khizar, Abdul Wahid

, Khayyam Pervaiz, Mahin Sajid, Umar Qasim, Zahoor Ali Khan
, Nadeem Javaid
:
Enhanced Energy Efficient Depth Based Routing Protocol for Underwater WSNs. 70-77 - Usman Shakeel, Naeem Jan, Khizar, Umar Qasim, Zahoor Ali Khan

, Nadeem Javaid
:
DRADS: Depth and Reliability Aware Delay Sensitive Routing Protocol for Underwater WSNs. 78-83
Session 3: Security and Privacy
- Baojiang Cui, Shanshan He:

Anomaly Detection Model Based on Hadoop Platform and Weka Interface. 84-89 - Tianhan Gao, Fan Lang, Nan Guo:

An Emergency Communication System Based on UAV-assisted Self-Organizing Network. 90-95 - Jingling Zhao, Junxin Qi, Liang Zhou, Baojiang Cui:

Dynamic Taint Tracking of Web Application Based on Static Code Analysis. 96-101 - Hee-Kyung Kong, Tae-Sung Kim, Myoung-Ki Hong:

A Security Risk Assessment Framework for Smart Car. 102-108 - Seung-Jae Choi, Tae-Sung Kim:

Understanding Factors Affecting Information Security Practice of Elementary School Students. 109-113 - Francois Serman, Michaël Hauspie:

Achieving Virtualization Trustworthiness Using Software Mechanisms. 114-119
Session 4: Multimedia Systems and Applications
- Misaki Iyobe, Tomoyuki Ishida, Akihiro Miyakawa, Kaoru Sugita, Noriki Uchida, Yoshitaka Shibata:

Proposal of a Virtual Traditional Japanese Crafting Presentation System Mobile Edition. 120-125 - Ye-Seul Park, Meeyeon Lee, Jung-Won Lee:

Template-Driven Medical Imaging Information Providing Process Using Semantic Relations Targeting Acute Myocardial Infarction. 126-132 - Kaoru Sugita, Masao Yokota:

Implementation of Voice Guidance Function for Sightseeing Contents Using Web Speech API. 133-138 - Makoto Fukumto, Ryoichi Nagamatsu:

Feedback of Laughter by Detecting Variation in Respiration Amplitude for Augmenting Laughter. 139-142 - Noriyasu Yamamoto:

Improvement of Group Discussion System for Active Learning Using Smartphone. 143-148 - Liang Zhou, Siran Fu, Tao Guo, Lifang Han, Baojiang Cui:

Design and Implementation of a C++ Memory Leak Detection Tool Based on Dynamic Instrumentation. 149-153
Session 5: Energy Saving and Intelligent Computing
- Matteo Cristani, Francesco Olivieri

, Claudio Tomazzoli
:
Automatic Synthesis of Best Practices for Energy Consumptions. 154-161 - Atsuhiro Sawada, Hiroki Kataoka, Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa

:
Design and Evaluation of Algorithms to Energy-Efficiently Select Servers for Storage and Computation Processes. 162-169 - Hammad Maqsood, Nadeem Javaid

, Aqeb Yahya, Babar Ali
, Zahoor Ali Khan
, Umar Qasim:
MobiL-AUV: AUV-Aided Localization Scheme for Underwater Wireless Sensor Networks. 170-175 - Van-Huy Vu, Tein-Yaw Chung:

Bandwidth Estimation Based on MACD for DASH. 176-181 - Admir Barolli

, Tetsuya Oda, Ilir Shinko
, Leonard Barolli, Fatos Xhafa, Makoto Takizawa
:
Performance Analysis of a Genetic Algorithm Based System for Wireless Mesh Networks Considering Weibull Distribution, DCF and EDCA. 182-188 - Yuki Sakai, Tetsuya Oda, Makoto Ikeda, Leonard Barolli:

A Vegetable Category Recognition System Using Deep Neural Network. 189-192
Session 6: Big Data and Data Management
- Tomasz Hachaj

, Marek R. Ogiela:
Rule-Based Action Recognition: Performance Comparison between Lua and GDL Script Language. 193-197 - Lidia Ogiela, Marek R. Ogiela, Urszula Ogiela:

Efficiency of Strategic Data Sharing and Management Protocols. 198-201 - Toshitaka Maki, Kazuki Takahashi, Toshihiko Wakahara, Akihiro Yamaguchi, Yu Ichifuji, Noboru Sonehara:

A New Multiple Label Propagation Algorithm for Linked Open Data. 202-208 - Noriki Uchida, Kenta Ito, Go Hirakawa, Yoshitaka Shibata:

Adaptive Array Antenna Control Methods on Delay Tolerant Networks for Road Surveillance Systems. 209-214 - Fatos Xhafa, Daniel Palou, Leonard Barolli, Makoto Takizawa

:
Energy-Aware Analysis of Synchronizing a Groupware Calendar. 215-222 - Jong-Hwan Shin, Ki-Yong Choi, Jeong-Woo Lee, Jung-Won Lee:

Improvement of Large Data Acquisition Method without the Interference on the CPU Load for Automotive Software Testing. 223-230
Session 7: Wireless and Mobile Networks
- Tetsuro Kuniyasu, Tetsuya Shigeyasu:

HRB: A New MAC Level 2-Hop Broadcast Protocol with Directional Receiving. 231-236 - Khuram Khalid

, Isaac Woungang, Sanjay K. Dhurandher, Leonard Barolli, Glaucio H. S. Carvalho, Makoto Takizawa
:
An Energy-Efficient Routing Protocol for Infrastructure-Less Opportunistic Networks. 237-244 - Da Li, Wenan Zhou, Xuhui Yang, Haitao Du:

An Intra-Cluster CoMP Based Sleep-Mode Scheme in Dense Heterogeneous Network. 245-249 - Fumiaki Sato, Ryohei Kikuchi:

Hybrid Routing Scheme Combining with Geo-Routing and DTN in VANET. 250-255 - Tianrun Gao, Gaofeng Nie, Chenshan Ren, Hui Tian:

Cooperative Load Balancing in OFDMA Small Cell Networks. 256-260 - Tein-Yaw Chung, Fong-Ching Yuan, Hsun-Fu Liu:

On Timing of Handoff Decision Making on Heterogeneous Wireless Networks. 261-266
ACTICS 2016
Session 1: Next Generation Network Applications
- Fei Chun Ma, Sok Hán Tóng, João Cordeiro

:
Assessing Driving Behavior in Public Transportation through Mobile Crowd Sensing: A Concept Proposal for Macau Public Transportation System. 267-271 - El Bouatmani Hamza, Shigetomo Kimura

:
A Scalable SDN-EPC Architecture Based on OpenFlow-Enabled Switches to Support Inter-domain Handover. 272-277 - Bhed Bahadur Bista:

Improving Energy Consumption of Epidemic Routing in Delay Tolerant Networks. 278-283 - Muhammad, Nadeem Javaid

, Babar Ali
, Aqeb Yahya, Zahoor Ali Khan
, Umar Qasim:
Improved HydroCast: A Technique for Reliable Pressure Based Routing for Underwater WSNs. 284-290
BDITS
2016 Session 1: Security and Anomaly Detection
- Pengfei Li, Songling Shan:

An Improved Algorithm of Prefixspan. 291-294 - Jun Yang, Xiangping Du, Liang Zhou, Songling Shan, Baojiang Cui:

Research on the Identification of Software Behavior in Anomaly Detection. 295-298 - Xiaobing Liang, Bing Zhao, Rui Wang, Ying Liu:

Research on the Vulnerability Predicting Analysis Model for Binary Executables. 299-304 - Xuan Tian, Baojiang Cui, Jiangdong Deng, Jun Yang:

The Performance Optimization of Hadoop during Mining Online Education Packets for Malware Detection. 305-309 - Shuang Liang, Yong Ma, Yanyu Huang

, Jia Guo, Chunfu Jia:
The Scheme of Detecting Encoded Malicious Web Pages Based on Information Entropy. 310-312 - Yong Ma, Shuang Liang, Xuan Chen, Chunfu Jia:

The Approach to Detect Abnormal Access Behavior Based on Naive Bayes Algorithm. 313-315
esIoT 2016
Session 1: Internet of Things and Smart Homes
- Borja Bordel Sánchez

, Diego Sánchez de Rivera, Ramón Alcarria
:
Plug-and-Play Transducers in Cyber-Physical Systems for Device-Driven Applications. 316-321 - Miguel A. Wister

, José Adán Hernández-Nolasco
, Pablo Pancardo
, Francisco D. Acosta
, Antonio Jara
:
Emergency Population Warning about Floods by Social Media. 322-327 - Nusrat Shaheen, Nadeem Javaid

, Najmun Nisa, Amber Madeeha Zeb, Zahoor Ali Khan
, Umar Qasim:
Appliance Scheduling for Energy Management with User Preferences. 328-334 - Masafumi Yamada, Tetsuya Oda, Yi Liu, Masahiro Hiyama, Keita Matsuo, Leonard Barolli:

Performance Evaluation of an IoT-based e-Learning Testbed Considering OLSR and WEP Protocols. 335-341 - Sakeena Javaid

, Nadeem Javaid
, Muhammad Shoaib Javaid, Sehrish Javaid, Umar Qasim, Zahoor Ali Khan
:
Optimal Scheduling in Smart Homes with Energy Storage Using Appliances' Super-Clustering. 342-348
FIMIS 2016
Session 1: Innovative Internet Service and Technologies
- Jie Tao, Yilun Liu, Yiping Wen, Jiahui Su:

The Expert System of Locomotive Running Gear Based on Sematic Network. 349-354 - Tianhan Gao, Nan Guo, Fanghua Geng, Xinyang Deng:

Access Authentication Schemes for PMIPV6: A Survey. 355-360 - Kazuki Takahashi, Toshitaka Maki, Toshihiko Wakahara:

A New Laboratory Assignment Support System for Undergraduate Students. 361-366 - Andrew Yearp, David Newell, Philip Davies, Russell Wade, Reza Sahandi:

Wireless Remote Patient Monitoring System: Effects of Interference. 367-370 - Tomoki Okutake, Noriki Uchida, Noriyasu Yamamoto:

A Collaborative Safety Flight Control System for Multiple Drones. 371-375 - Tzu-Hsien Wang, Yuan-Ko Huang, Chiang Lee:

Skyline Query Processing System for Taiwan Maps. 376-380
FINGNet 2016
Session 1: Security Issues and Networks
- Jiyoung Lim, Inshil Doh, Kijoon Chae:

Authentication for Mobile Open IPTV Service Security. 381-385 - Shi Li, Inshil Doh, Kijoon Chae:

A Group Authentication Scheme Based on Lagrange Interpolation Polynomial. 386-391 - Hyoungwoo Park, Il Sun Hwang, Jongsuk Ruth Lee:

Study on the Sustainable Migration to Software Defined Network for Nation-Wide R&E Network. 392-396 - Inho Jeon, Chan-Ho Choi, Jerry H. Seo, Youngsik Joe, Kumwon Cho, Hoon Ryu:

EDISON Nanophysics: Web-Based e-Learning Platform for Education and Research in Nanoscience. 397-402 - Hae-Duck Joshua Jeong, Hyeonggeun Kim, WonHwi Ahn, Jung-Hee Oh, Dawoon Lee, Sang-Kug Ye, Jongsuk Ruth Lee:

Analysis and Detection of Anomalous Network Traffic. 403-408
Session 2: Health and Video Streaming Services
- Hyun Jung Lee, Mye M. Sohn:

Health Service Knowledge Management to Support Medical Group Decision Making. 409-414 - WooSeok Hyun, Ilsun You, JoungSoon Jang, Fang-Yie Leu:

A Wireless Body Sensor Network and Its Applications: Rehearsal with a Smartphone. 415-418 - Yong-Hwan Lee, Youngseop Kim, Heung-Jun Kim, In-Kyoung Shin, Hyochang Ahn, Yukyong Lee:

Modified Active Shape Model for Realtime Facial Feature Tracking on iPhone. 419-421 - In-Kyoung Shin, Hyochang Ahn, Yong-Hwan Lee:

Efficient Image Retrieval Using Image and Audio Features in Video Stream. 422-424
ITAUC 2016
Session 1: Intelligent Techniques and Algorithms
- Tzu-Liang Kung, Chun-Nan Hung, Yuan-Hsiang Teng, Jui-Yu Hung, Lih-Hsing Hsu:

On the Robust Approach to Data Inconsistency Detection of Sensor Networks. 425-429 - Tzu-Liang Kung, Chun-Nan Hung, Cheng-Kuan Lin, Hsiang-Chun Chen, Chia-Hui Lin, Lih-Hsing Hsu:

A Framework of Cycle-Based Clustering on the Crossed Cube Architecture. 430-434 - Jung-Kuei Chang, Wei-Yun Hsu, Te-Chan Chen, Hui-Huang Hsu:

Identification of Negative Comments on Internet Forums. 435-439 - Hsing-Chung Chen, Pei-Chi Yeh, Ze-Min Lin, Qiu-Hua Ruan:

Security Awareness Investigation for Mobile User Examined by Using Association Rule Mining Method. 440-445 - Hsing-Chung Chen, Qiu-Hua Ruan, Pei-Chi Yeh, Ze-Min Lin:

Intelligent Management Model Based on CBR-SDA Approach - An Example of Smart Life Recommendation System for Choosing Clothes and Accessories. 446-451
MCNCS 2016
Section 1: Network Applications and Security
- Hung-Yuan Chen, Yao-Chung Fan

, Chien-Liang Lai, Huan Chen:
Identifying Variable-Power Appliances in Non-intrusive Load Monitoring Systems. 452-457 - Fang-Yie Leu, Yi-Ting Hsiao:

Finite State Machine Based Real Time Scheduling for Microchip. 458-463 - Sen-Tarng Lai, Fang-Yie Leu:

A Version Control-Based Continuous Testing Frame for Improving the IID Process Efficiency and Quality. 464-469 - Yi-Li Huang, Fang-Yie Leu, Po-Hao Su, Ti-Hsun Sung, Sin-Cheng Liu:

A Secure and High Performance Wireless Sensor Network Based on Symmetric Key Matrix. 470-475 - Kun-Lin Tsai

, Fang-Yie Leu, Yi-Fung Huang, Chi Yang, Cheng-Hsin Chang, King-Shing Yip, Yuchen Xue, Guan-Chi Lai:
Cloud Encryption Using Distributed Environmental Keys. 476-481 - Xia-Yun Guo, Chin-Ling Chen, Chang-Qing Gong, Fang-Yie Leu:

A Secure Official Vehicle Communication Protocol for VANET. 482-485
PIS-PIS 2016
Session 1: Security for Public Internet Services
- Kyungroul Lee, Yeunsu Lee, Hyeji Lee, Kangbin Yim:

A Brief Review on JTAG Security. 486-490 - Byeong-Gwon Kang, Seungyong Han, Sangjoon Park

:
Impacts of Frequency Selectivity on the Error Performance of Time-Domain Equalizers in MIMO Systems. 491-494 - Sanghwan Oh, Hanchul Bae, Soojin Yoon, Hwankuk Kim

, YoungTae Cha:
Malicious Script Blocking Detection Technology Using a Local Proxy. 495-498 - Kyungroul Lee, Hyeji Lee, Yeunsu Lee, Kangbin Yim:

Analysis on the Key Storage Mechanism of the CNG Library. 499-502 - Seungjun Yeon, Hyojung Jun:

Issues and Implementation Strategies of the IoT (Internet of Things) Industry. 503-508 - Guangming Yang, Zhenhua Tan

, Fanghua Geng, Tianhan Gao:
A Novel Hybrid Algorithm Based on Hill Matrix and Haar Domain Sequence. 509-513 - Dongmin Choi, Chang Choi

, Xin Su:
Invisible Secure Keypad Solution Resilient against Shoulder Surfing Attacks. 514-517
SMEUCE 2016
Session 1: Knowledge Learning and Service Innovation
- Tin-Chang Chang, Shu-Hui Chuang:

Exploring Value of e-Service Innovation: e-Service and Co-operation Complementarity. 518-521 - Ching-Hui Shih, Yao-Hua Wang:

Can Workplace Friendship Reduce Social Loafing? 522-526 - Shu-Hui Chuang, Shinyi Lin, Tin-Chang Chang:

Exploring the Performance of Service Innovation: Infrastructure Capability and Innovation Orientation Complementarity. 527-530 - Mei-Hua Liao, Yu-Ci Xu, Hidekazu Sone:

Old-Established Companies' Traditions and Innovations - Focusing on e-Business of Japan and Taiwan. 531-532 - Kuei-Yuan Wang, Cheng-Chun Kuo:

The Key Value-Drivers of Successful Travel Agency from the Perspective of Its Core Competence: Lion Travel versus Phoenix Tours. 533-537
Session 2: Sustainability Management for e-Business and Professional Associations
- Mei-Hua Liao, Wun-Huei Chen, Ying-Yun Lin:

SEO Behavior of the Family Firms through Agency Theory Perspective. 538-540 - Mei Hua Huang, Chiung-Yen Chen:

Antecedents and Outcomes of Trust in Professional Associations. 541-545 - Ying-Li Lin, Fang-Hua Hsiao, Pei-Shan Li:

Causal Analysis in Human Capital, R&D Assets and Financial Performance: Evidence from Taiwanese Firms Operating in China. 546-550 - Yung-Shun Tsai, Chun-Ping Chang, Shyh-Weir Tzang, Yu-Jhen Liou:

The Impact of Stock Prices, Risks and Business Cycle on Overconfidence. 551-555 - Chien-Wen Lai, Kuei-Yuan Wang, Tzu-Yu Lin:

A Comparative Study of Valuation and Value Drivers in the Auto Lamp Industry: Two Cases of Auto Lamp Companies. 556-562
Session 3: Ubiquitous Commerce and Operation Management
- Li-Jen He:

Successor Audit Partner Choice for Mandatory Audit Partner Rotation Companies. 563-566 - Chiung-Yen Chen, Mei Hua Huang:

An Investigation into Human Resources and Operating Performance between Competitive Strategies of Taiwan Public Accounting Firms. 567-572 - Chia-Ju Lu, Yi-Yu Shih, Shih-Ten Wang:

The Effect of Corporate Social Responsibility Initiatives on Internal Employee Motivation and Organizational Identification. 573-577 - Nien-Tzu Yang:

The Hindsight of ADR Listing - An Empirical Study on M&A Activities for Acquirers Before-and-After ADR Listing. 578-583 - Chung-Jen Fu, Chiung-Yao Huang:

Linking Dynamic Equity Valuations to Optimum Weighting in the Performance Compensation System. 584-586
WAIS 2016
Session 1: Secure Systems
- Takamichi Saito, Koki Yasuda, Takayuki Ishikawa, Rio Hosoi, Kazushi Takahashi, Yongyan Chen, Marcin Zalasinski

:
Estimating CPU Features by Browser Fingerprinting. 587-592 - Takamichi Saito, Yuta Tsunoda, Daichi Miyata, Ryohei Watanabe, Yongyan Chen:

An Authorization Scheme Concealing Client's Access from Authentication Server. 593-598 - Hiroaki Kikuchi, Kota Sasa, Yuta Shimizu:

Interactive History Sniffing Attack with Amida Lottery. 599-602 - Pengfei Li, Yaokai Feng, Junpei Kawamoto, Kouichi Sakurai:

A Proposal for Cyber-Attack Trace-Back Using Packet Marking and Logging. 603-607 - Longzhu Cai, Yaokai Feng, Junpei Kawamoto, Kouichi Sakurai:

A Behavior-Based Method for Detecting DNS Amplification Attacks. 608-613 - Yuji Suga:

Generalized Graph-Based Visual Secret Sharing Schemes for Multiple Secrets. 614-619

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














