


default search action
30th AINA 2016: Crans-Montana, Switzerland
- Leonard Barolli, Makoto Takizawa, Tomoya Enokido, Antonio J. Jara, Yann Bocchi:

30th IEEE International Conference on Advanced Information Networking and Applications, AINA 2016, Crans-Montana, Switzerland, 23-25 March, 2016. IEEE Computer Society 2016, ISBN 978-1-5090-1857-4
Session 1: Network Protocols and Applications I
- Shigenari Nakamura

, Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa
:
Influential Abortion Probability in a Flexible Read-Write Abortion Protocol. 1-8 - Arief Maulana, Kazumi Saito, Tetsuo Ikeda, Hiroaki Yuze, Takayuki Watanabe, Seiya Okubo, Nobuaki Mutoh:

Characterizing Similarity Structure of Spatial Networks Based on Degree Mixing Patterns. 9-16 - Saki Tabata, Kohei Ueda, Ryotaro Fukui, Keiko Shimazu, Hiroshi Shigeno:

Disaster Information Gathering System Based on Web Caching and OpenFlow in Unstable Networks. 17-24 - Anup Kumar Paul, Atsuo Tachibana, Teruyuki Hasegawa:

NEXT-FIT: Available Bandwidth Measurement over 4G/LTE Networks - A Curve-Fitting Approach. 25-32 - Masaki Suzuki, Quentin Plessis, Takeshi Kitahara, Shigehiro Ano:

Monitoring Communication Quality Degradation in LTE Network Using Statistics of State Transition. 33-38 - Sana Ezzine, Fatma Abdelkefi, Jean-Pierre Cances, Vahid Meghdadi, Ammar Bouallègue:

Channel Capacity and SA-BER Performances Evaluation of an OFDM-Based Two-Way Relaying AF-PNC-PLC Systems. 39-46
Session 2: Distributed Database and Data Mining
- Zhijie Ban, Le Liu:

CICPV: A New Academic Expert Search Model. 47-52 - Asma Musabah Alkalbani

, Ahmed Mohamed Ghamry, Farookh Khadeer Hussain, Omar Khadeer Hussain
:
Sentiment Analysis and Classification for Software as a Service Reviews. 53-58 - Ahmad Slim, Gregory L. Heileman, Wisam Al-Doroubi, Chaouki T. Abdallah

:
The Impact of Course Enrollment Sequences on Student Success. 59-65 - Jérôme Treboux, Fabian Cretton, Florian Evéquoz, Anne Le Calvé, Dominique Genoud:

Mining and Visualizing Social Data to Inform Marketing Decisions. 66-73 - Chia-Yin Ko, Fang-Yie Leu:

Applying Data Mining to Explore Students' Self-Regulation in Learning Contexts. 74-78 - María Teresa González-Aparicio

, Muhammad Younas, Javier Tuya, Rubén Casado:
A New Model for Testing CRUD Operations in a NoSQL Database. 79-86
Session 3: Content-Centric Networking
- Sergio Charpinel, Celso Alberto Saibel Santos

, Alex Borges Vieira, Rodolfo da Silva Villaça, Magnos Martinello:
SDCCN: A Novel Software Defined Content-Centric Networking Approach. 87-94 - Admir Barolli, Tetsuya Oda, Leonard Barolli, Makoto Takizawa

:
Experimental Results of a Raspberry Pi and OLSR Based Wireless Content Centric Network Testbed Considering OpenWRT OS. 95-100 - Elias Vathias

, Dimitrios S. Nikolopoulos
, Stathes Hadjiefthymiades
:
A Capital Market Metaphor for Content Delivery Network Resources. 101-108 - Olfa Ben Rhaiem

, Lamia Chaari Fourati
, Wessam Ajib:
New Hierarchical Parent-Child Caching Strategy (H-CS) for CCN-Based Video Streaming. 109-115 - Nesrine Khabou

, Ismael Bouassida Rodriguez, Mohamed Jmaiel:
Designing an Analysis Procedure for Context Aware Applications in Ubiquitous Environments. 116-123 - Kenji Yokota, Kohei Sugiyama, Jun Kurihara

, Atsushi Tagami:
RTT-Based Caching Policies to Improve User-Centric Performance in CCN. 124-131
Session 4: Network Protocols and Applications II
- Ying Huang, Hongli Ge, Jangsu Lee, Yuehua Dai, Dong Xu, Jin Zhang, Qiang Gao, Shaoying Zhao:

Cluster-Head and Border-Node Based Cluster Routing Protocol for LR-WPAN. 132-139 - Murat Karakus

, Arjan Durresi:
Economic Viability of QoS in Software Defined Networks (SDNs). 140-146 - Vinh Hoa La

, Raul A. Fuentes-Samaniego, Ana R. Cavalli:
Network Monitoring Using MMT: An Application Based on the User-Agent Field in HTTP Headers. 147-154 - Afef Bohli, Ridha Bouallegue

:
A New Sensing Strategy for 5G Mobile Networks: Towards Spectral and Energy Efficiency Trade off. 155-159 - Zhenqiang Huang, Enqing Dong, Yuan Yuan, Wei Liu:

Realization of Time Synchronization Protocol Based on Frequency Skew Bid and Dynamic Topology Using Embedded Linux System. 160-165 - Kawther Hassine

, Mounir Frikha
, Tijani Chahed:
Greedy Versus Limited Access Point Backhaul Resource Aggregation in Wireless Local Area Networks. 166-173
Session 5: Ad Hoc and Mesh Networks
- Ilir Shinko

, Tetsuya Oda, Evjola Spaho
, Admir Barolli, Vladi Kolici
, Leonard Barolli:
A GA-Based Simulation System for WMNs: Performance Analysis of WMN-GA System for Different WMN Architectures and Uniform Distribution Considering DCF and EDCA. 174-180 - Michael Rethfeldt

, Peter Danielis, Benjamin Beichler
, Björn Konieczek, Felix Uster, Dirk Timmermann
:
Evaluating Cross-Layer Cooperation of Congestion and Flow Control in IEEE 802.11s Networks. 181-188 - Pir Masoom Shah

, Ikram Ullah
, Tanveer Khan, Muhammad, Sheraz Hussain, Zahoor Ali Khan
, Umar Qasim, Nadeem Javaid
:
MobiSink: Cooperative Routing Protocol for Underwater Sensor Networks with Sink Mobility. 189-197 - Elis Kulla, Evjola Spaho

, Makoto Ikeda, Leonard Barolli:
Energy Concerns inWireless Sensor and Actor Networks: A Simulation Case. 198-205 - Shinji Sakamoto

, Tetsuya Oda, Makoto Ikeda, Leonard Barolli, Fatos Xhafa:
Implementation of a New Replacement Method in WMN-PSO Simulation System and Its Performance Evaluation. 206-211 - Abrar Omar Alkhamisi

, Seyed M. Buhari
:
Trusted Secure Adhoc On-demand Multipath Distance Vector Routing in MANET. 212-219
Session 6: Multimedia Systems and Applications
- Rabee Mustapha Abuteir, Anne Fladenmuller

, Olivier Fourmaux
:
SDN Based Architecture to Improve Video Streaming in Home Networks. 220-226 - Kazuaki Yoshihara, Kenzi Watanabe, Nobukazu Iguchi:

New Educational Equipments for Networking Study by Physical Visualizations and Physical Direct Manipurations. 227-230 - Yu Yan, Hara Kohei, Nakano Hiroto, Takenobu Kazuma, Aiguo He:

A Method to Describe Student Learning Status for Personalized Computer Programming e-Learning Environment. 231-238 - Raoudha Souabni, Inés Bayoudh Saâdi

, Nesrine Ben Salah
, Kinshuk, Henda Hajjami Ben Ghézala
:
On the Evaluation of Quality of Situation (QoSi) in Situation-Aware Ubiquitous Learning Environment. 239-246 - Houda Chihi, Reza Mahin Zaeem, Ridha Bouallegue

:
Energy Minimization by Selecting Appropriate Modulation and Coding Scheme for MB-OFDM UWB Systems. 247-252 - Sayaka Akiyama, Yuka Kato

:
An Estimation Model on Stress and Relaxed States for QOL Visualization and Its Evaluation. 253-259
Session 7: Network Protocols and Applications III
- Kuljaree Tantayakul

, Riadh Dhaou, Béatrice Paillassa:
Impact of SDN on Mobility Management. 260-265 - Kshitiz Verma, Shmuel Zaks, Alberto García-Martínez

:
SLEEPWELL: Energy Efficient Network Design for the Developing World Using Green Switches. 266-273 - Muriel Figueredo Franco

, Ricardo Luis dos Santos, Alberto E. Schaeffer Filho
, Lisandro Zambenedetti Granville
:
VISION - Interactive and Selective Visualization for Management of NFV-Enabled Networks. 274-281 - Murat Karakus

, Arjan Durresi:
A Scalability Metric for Control Planes in Software Defined Networks (SDNs). 282-289 - Yean-Fu Wen, Shih-Yao Chen, Chiu-Han Hsiao, Frank Yeong-Sung Lin:

Explore and Analyze the Performance Factors on Wi-Fi Sensing Starvation Problems. 290-296 - Sanjay Kumar Dhurandher, Satya Jyoti Borah, Isaac Woungang, Deepak Kumar Sharma

, Kunal Arora, Divyansh Agarwal:
EDR: An Encounter and Distance Based Routing Protocol for Opportunistic Networks. 297-302
Session 8: Wireless Sensor Networks I
- Luiz Fernando Ferreira Gomes de Assis, Lucas P. Behnck, Dionísio Doering, Edison Pignaton de Freitas

, Carlos Eduardo Pereira
, Flávio Eduardo Aoki Horita, Jó Ueyama
, João Porto de Albuquerque
:
Dynamic Sensor Management: Extending Sensor Web for Near Real-Time Mobile Sensor Integration in Dynamic Scenarios. 303-310 - Anwar Khan, Hassan Mahmood, Zahoor Ali Khan

, Umar Qasim, Nadeem Javaid
:
A Transmit Power Efficient Non-Cooperative Game Design for Wireless Sensor Networks Based on the Utility and Cost Function. 311-315 - Seyed Mohammad Ghoreyshi

, Alireza Shahrabi
, Tuleen Boutaleb:
An Opportunistic Void Avoidance Routing Protocol for Underwater Sensor Networks. 316-323 - Abdul Majid, Irfan Azam

, Abdul Waheed, Muhammad Zain-ul-Abidin, Taimur Hafeez, Zahoor Ali Khan
, Umar Qasim, Nadeem Javaid
:
An Energy Efficient and Balanced Energy Consumption Cluster Based Routing Protocol for Underwater Wireless Sensor Networks. 324-333 - Dogan Yildiz

, Serap Karagol
, Okan Ozgonenel, Satish Tadiparthi, Marwan Bikdash:
Three-Dimensional Sensor Localization Using Modified 3N Algorithm. 334-338 - Zaib Ullah, Leonardo Mostarda, Roberto Gagliardi, Diletta Cacciagrano

, Flavio Corradini:
A Comparison of HEED Based Clustering Algorithms - Introducing ER-HEED. 339-345
Session 9: Pervasive and Ubiquitous Computing I
- Junichi Honda, Takuya Otsuyama:

Positional Estimation of Obstacles and Aircraft by Using ISDB-T Signal Delay. 346-351 - Irfan Azam

, Abdul Majid, Ijaz Ahmad, Usman Shakeel, Hammad Maqsood, Zahoor Ali Khan
, Umar Qasim, Nadeem Javaid
:
SEEC: Sparsity-Aware Energy Efficient Clustering Protocol for Underwater Wireless Sensor Networks. 352-361 - Thongtat Oransirikul, Ryo Nishide, Ian Piumarta, Hideyuki Takada

:
Feasibility of Analyzing Wi-Fi Activity to Estimate Transit Passenger Population. 362-369 - Goshi Sato, Noriki Uchida, Norio Shiratori, Yoshitaka Shibata:

Research on Never Die Network for Disaster Prevention Based on OpenFlow and Cognitive Wireless Technology. 370-375 - Matthias Herlich, Shigeki Yamada:

Comparing Strategies to Construct Local Disaster Recovery Networks. 376-383 - Nyan Lin, Rithea Ngeth, Krittanai Sriviriyakul, Yuto Lim

, Yasuo Tan:
necoMAC: Network Coding Aware MAC Protocol for Multirate Wireless Networks. 384-391
Session 10: Distributed and Parallel Systems I
- Tomoya Enokido, Makoto Takizawa

:
An Energy-Efficient Load Balancing Algorithm for Virtual Machine Environments to Perform Communication Type Application Processes. 392-399 - Atsuhiro Sawada, Hiroki Kataoka, Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa

:
Energy-Aware Clusters of Servers for Storage and Computation Applications. 400-407 - Tarek Rabia, Othmen Braham, Guy Pujolle:

Accelerating Packet Processing in a Xen Environment with OpenDataPlane. 408-413 - Xue Ouyang

, Peter Garraghan
, David McKee
, Paul Townend, Jie Xu:
Straggler Detection in Parallel Computing Systems through Dynamic Threshold Calculation. 414-421 - Trong Nhan Phan, Josef Küng, Tran Khanh Dang

:
eHSim: An Efficient Hybrid Similarity Search with MapReduce. 422-429 - Larisa Safina

, Manuel Mazzara
, Fabrizio Montesi
, Victor Rivera:
Data-Driven Workflows for Microservices: Genericity in Jolie. 430-437
Session 11: Wireless Sensor Networks II
- Sangdae Kim, Cheonyong Kim, Hyunchong Cho, Yongbin Yim, Sang-Ha Kim:

Void Avoidance Scheme for Real-Time Data Dissemination in Irregular Wireless Sensor Networks. 438-443 - Frank Yeong-Sung Lin, Chiu-Han Hsiao, Yean-Fu Wen:

A Precision Operation Optimization for Detection-Based Sensor Networks. 444-451 - Cheonyong Kim, Hyunchong Cho, Sangdae Kim, Taehun Yang, Sang-Ha Kim:

Sink Mobility Support Scheme for Continuous Object Tracking in Wireless Sensor Networks. 452-457 - Tales Heimfarth, João Carlos Giacomin, João Paulo de Araujo, Edison Pignaton de Freitas

:
A Preamble Ahead Anycast Protocol for WSNs. 458-466 - Sami J. Habib, Paulvanna Nayaki Marimuthu:

Development of Analytical Model for Data Trustworthiness in Sensor Networks. 467-472 - Tayyaba Liaqat, Nadeem Javaid

, Ashfaq Ahmad
, Zahoor Ali Khan
, Umar Qasim, Muhammad Imran:
Energy Efficient and Reliable Data Gathering in Underwater WSNs. 473-478
Session 12: Pervasive and Ubiquitous Computing II
- Amin Bakshandeh Abkenar

, Seng Wai Loke, J. Wenny Rahayu, Arkady B. Zaslavsky:
Energy Considerations for Continuous Group Activity Recognition Using Mobile Devices: The Case of GroupSense. 479-486 - Wiem Fekih Hassen

, Faïza Najjar:
A Positioning Handoff Decision Algorithm for Ubiquitous Pedestrian Navigation Systems. 487-494 - Markus Aleksy

, Jonas Brönmark, Shakeel Mahate:
Microinteractions in Mobile and Wearable Computing. 495-500 - Dominique Genoud, Vincent Cuendet, Julien Torrent:

Soft Fall Detection Using Machine Learning in Wearable Devices. 501-505 - Tanveer Khan, Israr Ahmad

, Waqas Aman
, Irfan Azam
, Zahoor Ali Khan
, Umar Qasim, Sanam Avais, Nadeem Javaid
:
Clustering Depth Based Routing for Underwater Wireless Sensor Networks. 506-515 - Yufeng Wang, Feilong Tang, Yanqin Yang, Jie Li

, Wenchao Xu, Jinsong Wu
:
A QoS-Guaranteed Adaptive Cooperation Scheme in Cognitive Radio Network. 516-523
Session 13: Distributed and Parallel Systems II
- Luiz A. Rodrigues, Luciana Arantes, Elias P. Duarte Jr.:

An Autonomic Majority Quorum System. 524-531 - Alex F. R. Trajano

, Marcial Porto Fernandez
:
ContentSDN: A Content-Based Transparent Proxy Architecture in Software-Defined Networking. 532-539 - Paulo R. Pinho Filho, Luciana de Oliveira Rech, Lau Cheuk Lung, Miguel Correia

, Lásaro Jonas Camargos:
Priority-Based State Machine Replication with PRaxos. 540-547 - André Naz, Benoît Piranda, Seth Copen Goldstein, Julien Bourgeois:

Approximate-Centroid Election in Large-Scale Distributed Embedded Systems. 548-556 - Dilawaer Duolikun, Ryo Watanabe, Hiroki Kataoka, Shigenari Nakamura

, Tomoya Enokido, Makoto Takizawa
:
An Energy-Aware Migration of Virtual Machines. 557-564 - Hiroki Kataoka, Atsuhiro Sawada, Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa

:
Energy-Aware Server Selection Algorithms in a Scalable Cluster. 565-572
Session 14: Vehicular Networks and Applications I
- Makoto Ikeda, Seiichiro Ishikawa, Leonard Barolli:

An Enhanced Message Suppression Controller for Vehicular-Delay Tolerant Networks. 573-579 - Everton R. Lira

, Enrique Fynn, Paulo R. S. L. Coelho, Luis F. Faina, Lásaro J. Camargos, Rodolfo da Silva Villaça, Rafael Pasquini
:
An Architecture for Traffic Sign Management in Smart Cities. 580-587 - Sassi Maaloul

, Mériem Afif, Sami Tabbane:
Handover Decision in Heterogeneous Networks. 588-595 - Kazuyuki Morioka, Junichi Naganawa, Junichi Honda, Naoki Kanada

, Shunichi Futatsumori, Akiko Kohmura, Takeshi Tomita, Naruto Yonemoto, Yasuto Sumiya:
Experimental Evaluation on Quality of VoIP over Aero MACS. 596-602 - Elyes Ben Hamida, Muhammad Awais Javed:

Channel-Aware ECDSA Signature Verification of Basic Safety Messages with K-Means Clustering in VANETs. 603-610 - Wencheng Chen, Xiangming Wen, Wei Li:

Spectrum Sensing in Cognitive Radio Networks and Capacity Analysis for Vehicular Network. 611-617
Session 15: Data Centers and Cloud Computing I
- Oladotun Omosebi, Stelios Sotiriadis, Nik Bessis

:
An Openstack Based Accounting and Billing Service for Future Internet Applications. 618-623 - Yongning Tang, Guang Cheng, Zhiwei Xu

, Feng Chen:
Service Oriented Verification Integrated Fault Reasoning for SDNs. 624-629 - Kazuya Odagiri, Shogo Shimizu, Naohiro Ishii, Makoto Takizawa

:
Examination of the Implementation Method of the Cloud Type Virtual Policy Based Network Management Scheme for the Common Use between Plural Organizations. 630-636 - Roxana Istrate, Andrei Poenaru, Florin Pop:

Advance Reservation System for Datacenters. 637-644 - Khaled Almi'ani

, Young Choon Lee
:
Partitioning-Based Workflow Scheduling in Clouds. 645-652
Session 16: Security and Privacy I
- Yuichi Sei

, Akihiko Ohsuga:
Privacy Preservation for Participatory Sensing Applications. 653-660 - Masayuki Fukumitsu, Shingo Hasegawa, Jun-ya Iwazaki, Masao Sakai, Daiki Takahashi:

A Proposal of a Password Manager Satisfying Security and Usability by Using the Secret Sharing and a Personal Server. 661-668 - Tomoya Iwasaki, Naoto Yanai

, Masaki Inamura, Keiichi Iwamura:
Tightly-Secure Identity-Based Structured Aggregate Signature Scheme under the Computational Diffie-Hellman Assumption. 669-676 - Sushmita Ruj

, Arindam Pal:
Preferential Attachment Model with Degree Bound and Its Application to Key Predistribution in WSN. 677-683 - Takamichi Saito, Kazushi Takahashi, Koki Yasuda, Takayuki Ishikawa, Ko Takasu, Tomotaka Yamada, Naoki Takei, Rio Hosoi:

OS and Application Identification by Installed Fonts. 684-689 - Maroti Deshmukh

, Neeta Nain
, Mushtaq Ahmed
:
An (n, n)-Multi Secret Image Sharing Scheme Using Boolean XOR and Modular Arithmetic. 690-697
Session 17: Vehicular Networks and Applications II
- Evjola Spaho

, Leonard Barolli, Vladi Kolici
, Algenti Lala:
Performance Comparison of Different Routing Protocols in Sparse and Dense VDTNs. 698-703 - Seiji Matsuyama, Takatomo Yamabe, Yuki Nakayama, Yu Okuwaki, Ryozo Kiyohara:

A Method for Recognizing Driver's Location Context with a Vehicle Information Device. 704-710 - Kenta Ito, Go Hirakawa, Yoshitaka Shibata:

Experimentation of V2X Communication in Real Environment for Road Alert Information Sharing System. 711-716 - Gianluca Rizzo

, Maria Rita Palattella
, Torsten Braun
, Thomas Engel
:
Content and Context Aware Strategies for QoS Support in VANETs. 717-723 - Bin Tian, Kun Mean Hou, Jianjin Li:

TrAD: Traffic Adaptive Data Dissemination Protocol for Both Urban and Highway VANETs. 724-731
Session 18: Data Centers and Cloud Computing II
- Fabrizio Bertone, Giuseppe Caragnano

, Lorenzo Mossucca, Olivier Terzo, Alfredo Benso, Gianfranco Politano, Alessandro Savino
:
Implementing a Cloud-Based Service Supporting Biological Network Simulations. 732-736 - Khadija Bousselmi

, Zaki Brahmi, Mohamed Mohsen Gammoudi
:
QoS-Aware Scheduling of Workflows in Cloud Computing Environments. 737-745 - Souha Boubaker, Amel Mammar, Mohamed Graiet, Walid Gaaloul

:
Formal Verification of Cloud Resource Allocation in Business Processes Using Event-B. 746-753 - Qublai Khan Ali Mirza

, Ghulam Mohi Ud Din, Irfan Awan:
A Cloud-Based Energy Efficient System for Enhancing the Detection and Prevention of Modern Malware. 754-761 - May Itani

, Sanaa Sharafeddine
, Islam Elkabbani
:
Practical Single Node Failure Recovery Using Fractional Repetition Codes in Data Centers. 762-768
Session 19: Security and Privacy II
- Yoshifumi Ueshige, Kouichi Sakurai:

Analysis of "Receipt-Freeness" and "Coercion-Resistance" in Biometric Authentication Protocols. 769-775 - Tsuyoshi Komatsubara, Yoshifumi Manabe:

Game-Theoretic Security of Commitment Protocols under a Realistic Cost Model. 776-783 - Jianhua Yang:

Resistance to Chaff Attack through TCP/IP Packet Cross-Matching and RTT-Based Random Walk. 784-789 - Masood Mansoori

, Ian Welch, Kim-Kwang Raymond Choo
, Roy A. Maxion:
Application of HAZOP to the Design of Cyber Security Experiments. 790-799 - Alexander Oberle, Pedro Larbig, Ronald Marx, Frank G. Weber, Dirk Scheuermann, Daniel Fages, Fabien Thomas:

Preventing Pass-the-Hash and Similar Impersonation Attacks in Enterprise Infrastructures. 800-807 - Zouheir Trabelsi, Safaa Zeidan, Mohammad M. Masud:

Network Packet Filtering and Deep Packet Inspection Hybrid Mechanism for IDS Early Packet Matching. 808-815
Session 20: Internet Computing and Web Applications
- Masaki Kohana, Shusuke Okamoto:

A Location-Based Attendance Confirming System. 816-820 - Fatos Xhafa, Carlos García, Admir Barolli, Makoto Takizawa

:
A Web Interface for Satellite Scheduling Problems. 821-828 - Huihwan Park, Kyung-Min Park, Hoon Choi

:
Connection Management Using the Locality of Application Traffic. 829-833 - Tiago Alves, Jorge Coelho

:
A Framework for Massively Multiplayer Online Game Content Generation. 834-841 - Hemant Kumar Rath, Bighnaraj Panigrahi, Anantha Simha:

On Cooperative On-Path and Off-Path Caching Policy for Information Centric Networks (ICN). 842-849 - Shikhar Vashishth, Yash Sinha

, K. Hari Babu:
Addressing Challenges in Browser Based P2P Content Sharing Framework Using WebRTC. 850-857
Session 21: Smart Home and Smart Cities
- Zafar Iqbal, Nadeem Javaid

, Mobushir Riaz Khan
, Farman Ali Khan, Zahoor Ali Khan
, Umar Qasim:
A Smart Home Energy Management Strategy Based on Demand Side Management. 858-862 - Ciprian Barbieru, Florin Pop:

Soft Real-Time Hadoop Scheduler for Big Data Processing in Smart Cities. 863-870 - Pedro H. S. Duarte, Luis F. Faina, Lásaro J. Camargos, Luciano Bernardes de Paula, Rafael Pasquini

:
An Architecture for Monitoring and Improving Public Transportation Systems. 871-878 - José Adán Hernández-Nolasco

, Miguel A. Wister Ovando, Francisco D. Acosta
, Pablo Pancardo
:
Water Level Meter for Alerting Population about Floods. 879-884 - Matteo Cristani, Claudio Tomazzoli

, Erisa Karafili, Francesco Olivieri
:
Defeasible Reasoning about Electric Consumptions. 885-892 - Kanae Matsui:

HVAC System for Maintaining Pleasant Sleep During Warm Nights in Japan. 893-900
Session 22: Security and Privacy III
- Shweta Bhandari

, Vijay Laxmi
, Akka Zemmari
, Manoj Singh Gaur:
Intersection Automata Based Model for Android Application Collusion. 901-908 - Julian Schütte

, Gerd Stefan Brost:
A Data Usage Control System Using Dynamic Taint Tracking. 909-916 - Hoang Giang Do, Wee Keong Ng

:
Privacy-Preserving Triangle Counting in Distributed Graphs. 917-924 - Sourya Joyee De, Sushmita Ruj

:
Failure Tolerant Rational Secret Sharing. 925-932 - Somayeh Taheri, Radu Stoleru, Dieter Hogrefe:

Secure Neighbor Discovery in Mobile Ad Hoc Networks through Local Topology Visualization. 933-940 - Masood Mansoori

, Yuichi Hirose
, Ian Welch, Kim-Kwang Raymond Choo
:
Empirical Analysis of Impact of HTTP Referer on Malicious Website Behaviour and Delivery. 941-948
Session 23: Intelligent Computing
- Aymen Ben Zineb, Mohamed Ayadi, Sami Tabbane:

QoE-Fuzzy VHO Approach for Heterogeneous Wireless Networks (HWNs). 949-956 - Donald Elmazi

, Shinji Sakamoto
, Tetsuya Oda, Elis Kulla, Evjola Spaho
, Leonard Barolli:
Effect of Security Parameter for Selection of Actor Nodes in WSAN: A Comparison Study of Two Fuzzy-Based Systems. 957-964 - Zia Ullah, Muhammad Saleem Khan, Idrees Ahmed

, Nadeem Javaid
, Majid Iqbal Khan:
Fuzzy-Based Trust Model for Detection of Selfish Nodes in MANETs. 965-972 - Santosh Kumar, Xiaoying Gao, Ian Welch

, Masood Mansoori
:
A Machine Learning Based Web Spam Filtering Approach. 973-980 - Tetsuya Oda, Leonard Barolli:

Experimental Results of a Raspberry Pi Based WMN Testbed Considering CPU Frequency. 981-986 - Fabien Dubosson, Stefano Bromuri

, Michael Ignaz Schumacher
:
A Python Framework for Exhaustive Machine Learning Algorithms and Features Evaluations. 987-993
Session 24: Internet of Things
- Arijit Ukil, Soma Bandyopadhyay, Chetanya Puri, Arpan Pal

:
IoT Healthcare Analytics: The Importance of Anomaly Detection. 994-997 - Hicham Lakhlef, Michel Raynal, Julien Bourgeois:

Efficient Broadcast Protocol for the Internet of Things. 998-1005 - Bishnu Prasad Gautam

, Katsumi Wasaki
, Amit Batajoo, Suresh Shrestha, Kazuhiko Sato:
Multi-master Replication of Enhanced Learning Assistant System in IoT Cluster. 1006-1012 - Yefeng Ruan, Arjan Durresi, Lina Alfantoukh:

Trust Management Framework for Internet of Things. 1013-1019 - Nuria Pazos, Michael Müller, Matthieu Favre-Bulle, Kilian Brandt-Dit-Grieurin, Oliver Hüsser, Marco Aeberli, Nabil Ouerhani

:
Dynamic Street-Parking Optimisation. 1020-1026 - Rafael de Jesus Martins

, Vinicius Garcez Schaurich, Luis Augusto Dias Knob
, Juliano Araújo Wickboldt
, Alberto E. Schaeffer Filho, Lisandro Zambenedetti Granville
, Marcelo Pias
:
Performance Analysis of 6LoWPAN and CoAP for Secure Communications in Smart Homes. 1027-1034
Session 25: Security and Privacy IV
- Hiroaki Kikuchi, Takayasu Yamaguchi, Koki Hamada, Yuji Yamaoka, Hidenobu Oguri, Jun Sakuma:

Ice and Fire: Quantifying the Risk of Re-identification and Utility in Data Anonymization. 1035-1042 - Shou-Hsuan Stephen Huang

, Hongyang Zhang, Michael Phay:
Detecting Stepping-Stone Intruders by Identifying Crossover Packets in SSH Connections. 1043-1050 - Jahnabi Phukan, Kin Fun Li, Fayez Gebali:

Hardware Covert Attacks and Countermeasures. 1051-1054 - Marek R. Ogiela, Lidia Ogiela:

On Using Cognitive Models in Cryptography. 1055-1058 - Lidia Ogiela, Marek R. Ogiela:

Bio-Inspired Cryptographic Techniques in Information Management Applications. 1059-1063 - Amir Azodi, Feng Cheng, Christoph Meinel:

Towards Better Attack Path Visualizations Based on Deep Normalization of Host/Network IDS Alerts. 1064-1071
Session 26: Social Networking and Collaborative Systems
- Julien Tscherrig, Elena Mugellini

, Omar Abou Khaled
, Philippe Cudré-Mauroux
:
LinkedPolitics: Incremental Semantic Lifting of Political Facts. 1072-1079 - Hussein Hazimeh

, Iman Youness, Jawad Makki
, Hassan Noureddine, Julien Tscherrig, Elena Mugellini
, Omar Abou Khaled
:
Leveraging Co-authorship and Biographical Information for Author Ambiguity Resolution in DBLP. 1080-1084 - Amina Jarraya, Khedija Arour, Amel Borgi, Amel Bouzeghoub:

Distributed Cooperative Reasoning in Ambient Environment. 1085-1092 - Alessio Bechini

, Davide Gazzè, Andrea Marchetti
, Maurizio Tesconi
:
Towards a General Architecture for Social Media Data Capture from a Multi-Domain Perspective. 1093-1100 - Awais Ahmad, M. Mazhar Rathore, Anand Paul

, Seungmin Rho:
Defining Human Behaviors Using Big Data Analytics in Social Internet of Things. 1101-1107
Session 27: Semantic Computing
- Cheng Xie

, Melisachew Wudage Chekol, Blerina Spahiu
, Hongming Cai:
Leveraging Structural Information in Ontology Matching. 1108-1115 - Dhomas Hatta Fudholi

, J. Wenny Rahayu, Eric Pardede
:
Ontology-Based Information Extraction for Knowledge Enrichment and Validation. 1116-1123 - Geovanny Poveda, René Schumann:

An Ontology Driven Model Approach for the Creation and Evaluation of Models in the Electricity Retail Market: A Research in Progress. 1124-1129 - Sujata Swain

, Rajdeep Niyogi:
An Ontology Based Approach for Satisfying User Requests in Context Aware Settings. 1130-1137 - Gustavo de Assis Costa, José Maria Parente de Oliveira:

A Blocking Scheme for Entity Resolution in the Semantic Web. 1138-1145
Session 28: Grid, P2P and Scalable Computing
- Shashwati Banerjea, Mayank Pandey, Manoj Madhava Gore:

Towards Peer-to-Peer Solution for Utilization of Volunteer Resources to Provide Computation-as-a-Service. 1146-1153 - Sahar Rahim, Zafar Iqbal, Nusrat Shaheen, Zahoor Ali Khan

, Umar Qasim, Shahid Ahmed Khan, Nadeem Javaid
:
Ant Colony Optimization Based Energy Management Controller for Smart Grid. 1154-1159 - Hiroki Nakayama, Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa

:
Reduction of Unnecessarily Ordered Event Messages in Peer-to-Peer Model of Topic-Based Publish/Subscribe Systems. 1160-1167 - Yi Liu, Shinji Sakamoto

, Evjola Spaho
, Keita Matsuo, Leonard Barolli, Fatos Xhafa:
A Fuzzy-Based Reliability System for JXTA-Overlay P2P Platform Considering as New Parameter Sustained Communication Time. 1168-1175 - Agustinus Borgy Waluyo, David Taniar

, Bala Srinivasan, J. Wenny Rahayu:
Trustworthy P2P Data Delivery for Moving Objects in Wireless Ad-Hoc Networks. 1176-1183 - Ziaur Rahman, Zaheer Ahmad, Amir Murad

, Tanveer Khan, Zahoor Ali Khan
, Umar Qasim, Nadeem Javaid
:
On Utilizing Static Courier Nodes to Achieve Energy Efficiency with Depth Based Routing for Underwater Wireless Sensor Networks. 1184-1191

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














