


default search action
INCoS 2011: Fukuoka, Japan
- Fatos Xhafa, Leonard Barolli, Mario Köppen:

2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30 - Dec. 2, 2011. IEEE Computer Society 2011, ISBN 978-1-4577-1908-0
Conference Regular Papers
Ad-hoc Networks
- Elis Kulla, Masahiro Hiyama, Makoto Ikeda, Leonard Barolli:

Comparison of Experimental Results of a MANET Testbed in Different Environments Considering BATMAN Protocol. 1-7 - Edmundo Chissungo, Edwin H. Blake

, Hanh Le:
Investigation into Batman-adv Protocol Performance in an Indoor Mesh Potato Testbed. 8-13 - Makoto Ikeda, Masahiro Hiyama, Elis Kulla, Leonard Barolli:

Mobile Ad-hoc Network Routing Protocols Performance Evaluation Using NS-3 Simulator. 14-20
Social Networks
- Sergio L. Toral Marín

, Nik Bessis
, M. Rocío Martínez-Torres
, Florian Franc, Federico Barrero
, Fatos Xhafa
:
An Exploratory Social Network Analysis of Academic Research Networks. 21-26 - Nikos Salamanos

, Dimitris Konstantopoulos:
Diffusion in Social Networks and Market Stability. 27-34
Evolutionary Computation and Meta-heuristics
- Yan Pei

, Hideyuki Takagi
:
Comparative Evaluations of Evolutionary Computation with Elite Obtained in Reduced Dimensional Spaces. 35-40 - Pavel Krömer

, Václav Snásel, Jan Platos
, Ajith Abraham, Lukás Prokop
, Stanislav Misák
:
Genetically Evolved Fuzzy Predictor for Photovoltaic Power Output Estimation. 41-46 - Mario Köppen, Kaori Yoshida, Masato Tsuru:

Unsorting the Proportional Fairness Relation. 47-52 - Fatos Xhafa

, Christian Sánchez, Admir Barolli, Makoto Takizawa
:
A Tabu Search Algorithm for Efficient Node Placement in Wireless Mesh Networks. 53-59
E-learning
- Burasakorn Yoosooka, Vilas Wuwongse:

Linked Open Data for Learning Object Discovery: Adaptive e-Learning Systems. 60-67 - Michalis Feidakis

, Thanasis Daradoumis
, Santi Caballé
:
Endowing e-Learning Systems with Emotion Awareness. 68-75 - Konstantinos Kalemis:

Can Games Based Learning Assists Teachers in Achieving the Aims of Curriculum to Bilingual Students of Different Ethnic Minorities? 76-83 - Tharrenos Bratitsis

, Triantafyllos Kotopoulos, Kyriaki Mandila:
Kindergarten Children as Story Makers: The Effect of the Digital Medium. 84-91
Security in Mobile and Wireless Systems
- Hu Xiong, Qianhong Wu, Zhong Chen:

Strong Security Enabled Certificateless Aggregate Signatures Applicable to Mobile Computation. 92-99 - Bo Qin, Qianhong Wu, Josep Domingo-Ferrer

, Willy Susilo
:
Distributed Privacy-Preserving Secure Aggregation in Vehicular Communication. 100-107 - Juntao Gao, Xuelian Li:

Linear Complexities of the Frequency Hopping Sequences in Two Optimal Sets. 108-114
Sensor Networks
- Akio Koyama, Ryoma Watanabe, Leonard Barolli, Makoto Takizawa

:
R-MAC: A MAC Protocol for Power Reduction in Wireless Sensor Networks Based on Load Estimation and Its Performance Evaluation. 115-121 - Junichi Honda, Kazunori Uchida:

Analysis of Field Distribution and Density of Sensor Node. 122-129 - Hironori Ando, Qi Wang, Leonard Barolli, Elis Kulla, Arjan Durresi, Fatos Xhafa

:
A Fuzzy-Based Cluster-Head Selection System for WSNs Considering Sensor Node Movement. 130-135 - Ying-Hong Wang, Yu-Chu Lin, Cheng-Hung Tsai:

A Routing Protocol Based on Power-Controlled Sleep Scheduling for Wireless Sensor Networks. 136-140
Cloud and Grid Computing
- Saad Liaquat Kiani, Ashiq Anjum

, Nik Bessis
, Richard Hill
, Michael Knappmeyer:
Context Parsing, Processing and Distribution in Clouds. 141-148 - Nik Bessis

, Stelios Sotiriadis, Valentin Cristea, Florin Pop:
Modelling Requirements for Enabling Meta-scheduling in Inter-Clouds and Inter-Enterprises. 149-156 - Kenichi Fujii, Motoi Yamagiwa, Minoru Uehara:

A Study on Operation of Photovoltaic Grid System Using Weather Forecast. 157-163 - Fatos Xhafa

, Bernat Duran, Joanna Kolodziej
, Leonard Barolli, Makoto Takizawa
:
On Exploitation vs Exploration of Solution Space for Grid Scheduling. 164-171
Secure Systems
- L. G. Zhao, C. K. Wu:

A Planes Detection Algorithm Based on Feature Distribution. 172-177 - Zhitu Su, Chunhui Sun, Hui Li, Jianfeng Ma, Kai Fan:

Fast Parallel Computation of Tate Pairing. 178-183
Wireless Mesh and Sensor Networks
- Yang Sun Lee

, Ji-Min Lee, Sang Soo Yeo
, Jong Hyuk Park, Leonard Barolli:
A Study on the Performance of Wireless Localization System Based on AoA in WSN Environment. 184-187 - Tetsuya Oda, Admir Barolli, Evjola Spaho

, Fatos Xhafa
, Leonard Barolli:
Effects of Mutation and Crossover in Genetic Algorithms for Node Placement in WMNs Considering Number of Covered Users Parameter. 188-195 - Tao Yang, Leonard Barolli, Jiro Iwashige, Arjan Durresi, Fatos Xhafa

:
Comparison Evaluation of Static and Mobile Sensor Nodes in Wireless Sensor Networks Considering Packet-Loss and Delay Metrics. 196-202
Distributed Architectures
- Minoru Uehara:

An Alternative Implementation of 3FT RAID in Virtual Large Scale Disks. 203-208 - Hung-Fu Li, Tyng-Yeu Liang, Jhen-Lin Jiang:

An OpenMP Compiler for Hybrid CPU/GPU Computing Architecture. 209-216 - Takuro Inoue, Ailixier Aikebaier, Tomoya Enokido, Makoto Takizawa

:
Energy Efficient Distributed Systems for Storage Servers. 217-224
Collaborative and Intelligent Systems
- Raiye Hailu, Takayuki Ito:

Challenges in Automating Collaborative Negotiations. 225-232 - Jordi Conesa

, Veda C. Storey, Vijayan Sugumaran
, Santi Caballé
:
Knowledge Reuse: Its Role and Implications for Upper Level Ontologies. 233-240 - Jie Wu, Vaclav Svaton

, Jan Martinovic
, Eliska Ochodkova, Václav Snásel:
Generation of Offensive Strategies in Robot Soccer Game. 241-244
Wireless Communication Systems
- Tetsuya Shigeyasu, Xiong Liu, Hiroshi Matsuno:

A New Slot Assignment Method for Slotted CSMA Based on Maximum Clique Extraction. 245-250 - Yulong Shen, Zhiwei Zhang, Jianfeng Ma, Qingqi Pei, Qijian Xu, Hao Yin:

MS2HM: A Multimedia Service Session Handoff Method between Heterogeneous Wireless Networks. 251-257
Authentication and Signatures
- Shengli Liu, Kefei Chen:

Homomorphic Linear Authentication Schemes for Proofs of Retrievability. 258-262 - Kai Fan, Yue Wang, Hui Li:

Forward Secure Proxy Blind Signature Scheme. 263-267 - Haibo Tian:

A New Strong Multiple Designated Verifiers Signature for Broadcast Propagation. 268-274 - Kai Fan, Yue Wang, Hui Li:

Abuse-freeness Electronic Payment Protocol. 275-278
Optimization and Fairness
- Akihiro Fujihara, Shiro Ono, Hiroyoshi Miwa:

Optimal Forwarding Criterion of Utility-Based Routing under Sequential Encounters for Delay Tolerant Networks. 279-286 - Minoru Uehara:

Proposal of an Evolutional Architecture for Metabolic Computing. 287-292 - Yilei Wang, Qiuliang Xu:

Fairness with Semi-rational Players in Standard Communication Networks. 293-298
Network Protocols, Algorithms, and Search
- Hitomi Tamura

, Mario Köppen, Masato Uchida
, Masato Tsuru, Yuji Oie:
Node Degree-Aware Link Cost for Traffic Load-Distribution in Large-Scale Networks. 299-304 - Katsuichi Nakamura, Masato Tsuru, Yuji Oie:

A perfSONAR-based Integrated Multi-domain Network Measurement Platform - Internet Monitoring as a Service. 305-312 - Walisa Romsaiyud, Wichian Premchaiswadi:

Exploring Web Search Behavior Patterns to Personalize the Search Results. 313-319 - Yulong Shen, Qingqi Pei, Ning Xi, Jianfeng Ma, Qijian Xu, Hao Yin:

HGRP: Hybrid Grid Routing Protocol for Heterogeneous Hierarchical Wireless Networks. 320-327
Poster Session
- Hideki Kondo, Hiroyuki Narahara:

Design and Implementation of a Dynamic Reconfigurable Classroom for Cooperative Learning. 328-329 - Satoru Akimoto, Hitomi Tamura

, Kenji Kawahara, Yoshiaki Hori:
Study on Energy-Efficient Routing Protocol Based on Experimental Evaluation. 330-331 - Hiroaki Yamanaka, Masayoshi Shimamura, Shuji Ishii, Eiji Kawai, Katsuyoshi Iida

, Masato Tsuru:
A New Generation Network Architecture to Accommodate Virtual Network Application Services. 332-333 - Kazuki Kume, Kei Ohnishi, Kazuya Tsukamoto, Shinya Yamamura, Akira Nagata:

Heuristic Information Retrieval Using Variable Identifiers in Mobile Ad-hoc Networks. 334-335 - Sarenna Bao, Takeo Fujii:

Q-learning Based p-pesistent CSMA MAC Protcol for Secondary User of Cognitive Radio Networks. 336-337 - Daiki Nobayashi, Kazumi Kumazoe, Yutaka Fukuda, Takeshi Ikenaga

, Tetsuya Ito:
Performance Evaluation of Power Saving Scheme for Wireless LAN with Station Aggregation. 338-339 - Hiroshi Yamamoto, Katsuyuki Yamazaki:

P2P-based Contents Distribution Method Using Network Coordinates System. 340-341 - Takayuki Yamamoto, Shinji Sugawara

, Yutaka Ishibashi:
An Information Search Method Based on Management Area Segmentation with Multiple Mobile Agents in Unstructured Peer-to-Peer Networks. 342-343 - Toshinobu Hayashi, Shinji Sugawara

, Yutaka Ishibashi:
Efficient Contents Sharing Using Differences between Versions in Peer-to-Peer Networks. 344-345 - Go Hirakawa, Thin Thin Nwe, Yuichi Hattori, Sozo Inoue:

Implementation of Activity Recognition from Accelerometers on Mobile Phones. 346-347 - Shogo Fujita, Leonardo Lanante

, Yuhei Nagao, Masayuki Kurosaki, Hiroshi Ochi:
Low-Latency Normalization Method for Multi-user MIMO System Using Vector Perturbation Precoder. 348-349
The 13th International Symposium on Multimedia Network Systems and Applications (MNSA 2011)
Wireless Networks
- Takahiro Nagai, Hiroshi Shigeno:

A Framework of AP Aggregation Using Virtualization for High Density WLANs. 350-355 - Wen-Ping Lai, Bo Li:

A Piecewise Packet Mapping Algorithm for Video Transmission over 802.11e Wireless Networks. 356-361 - Noriki Uchida, Kazuo Takahata, Yoshitaka Shibata:

Cognitive Wireless Network for Large Scale Disaster. 362-366 - Nobuo Funabiki, Junki Shimizu, Toru Nakanishi, Kan Watanabe, Shigeru Tomisato:

An Extension of Active Access-Point Selection Algorithm for Throughput Maximization in Wireless Mesh Networks. 367-372
P2P Networks
- Evjola Spaho

, Leonard Barolli, Fatos Xhafa
, Jiro Iwashige, Akio Koyama:
A Fuzzy-Based System for Data Replication in P2P Networks. 373-377 - Tadateru Ohkawara, Ailixier Aikebaier, Tomoya Enokido, Makoto Takizawa

:
Enriching and Impoverishing Types of Write Operations in the Multimedia Quorum-based (MQB) Protocol. 378-383 - Yuichi Ogata, Kouhei Umezaki, Evjola Spaho

, Keita Matsuo, Leonard Barolli, Jiro Iwashige:
Performance Evaluation of SmartBox End-Device for Medical Applications Using JXTA-Overlay P2P System. 384-389 - Ailixier Aikebaier, Tomoya Enokido, Makoto Takizawa

:
Trustworthy Group Based Agreement Protocol in Scalable Distributed Networks. 390-395
Secure Algorithms and Systems
- Peng Wan, Minoru Uehara:

Using Diagonal and Horizontal Vertical Sobel Operators Spam Detection. 396-400 - Noriyasu Yamamoto, Toshihiko Wakahara:

Comparison Evaluation of Encryption Methods for a User Attestation System Using a Cellular Phone. 401-407 - Edlira Martiri

, Artur Baxhaku, Ezmolda Barolli
:
Steganographic Algorithm Injection in Image Information Systems Used in Healthcare Organizations. 408-411
Wireless Communication
- Masafumi Takematsu, Junichi Honda, Kazunori Uchida:

Electric Field Intensity Computed by DRTM in Relation to the Number of Plate Observation Points and Frequency. 412-417 - Shunsuke Nakashima, Junichi Honda, Kazunori Uchida:

Doppler Shifted Scattering from a Target Moving Along Inhomogeneous Random Rough Surface. 418-423 - Wen-Ping Lai, En-Cheng Liou, Wei-Hao Fu:

Dispersive Video Frame Importance Driven Probabilistic Packet Mapping for 802.11e Based Video Transmission. 424-429 - Yuuki Kimura, Junichi Honda, Kazunori Uchida:

Application of Horner Method to Approximate Fresnel Function. 430-433
Wireless Communication
- Natthaphong Udomkarn, Toshihiko Wakahara:

A Seminar Record Editing Algorithm. 434-439 - Edlira Kalemi, Edlira Martiri

:
FOAF-Academic Ontology: A Vocabulary for the Academic Community. 440-445 - Shinichi Inenaga, Kaoru Sugita, Tetsushi Oka, Masao Yokota:

Performance Evaluation of User Interfaces According to User Computer Skill and Computer Specifications. 446-449
Authentication Systems
- Kenzi Watanabe, Makoto Otani:

A Seamless Connection for Authentication Required Web Sites by Shibboleth. 450-452 - Yusuke Kowakame, Toshihiko Wakahara:

A New One-time Authentication System Using a Cellular Phone with FeliCa Chip. 453-456 - Yuji Suga:

A Fair Exchange Protocol for Attribute Certification. 457-461 - Mitsuhiro Suenaga, Makoto Otani, Kenzi Watanabe:

Detection and Prohibition of NAPT for Network User Authentication System "Opengate". 462-465
Authentication Systems
- Yung-Hui Chen, Lawrence Y. Deng, Ku-Chen Huang:

The Best Learning Order Inference Based on Blue-Red Trees of Rule-Space Model for Social Network - Case in ITE Course. 466-471 - Hiroaki Nishino, Shota Hidaka, Tsuneo Kagawa, Kouichi Utsumiya:

Micro E-board: An Interactive Teaching Aid Using Mobile Devices. 472-477 - Wei-Yong Zhao, Toshihiko Wakahara:

A Support System Using Moodle for Improving Students Understanding. 478-483
Distributed Platforms and Algorithms
- Kouhei Umezaki, Evjola Spaho

, Yuichi Ogata, Leonard Barolli, Fatos Xhafa
, Jiro Iwashige:
A Fuzzy-Based Trustworthiness System for JXTA-Overlay P2P Platform. 484-489 - Minoru Uehara:

Design and Implementation of 3D MeshRAID in Virtual Large-Scale Disks. 490-495 - Tomoya Enokido, Makoto Takizawa

:
Evaluation of the Improved EPCLB Algorithm for Distributed Applications. 496-501
Performance Evaluation
- Igli Tafa, Ermal Beqiri, Hakik Paci

, Elinda Kajo
, Aleksander Xhuvani:
The Evaluation of Transfer Time, CPU Consumption and Memory Utilization in XEN-PV, XEN-HVM, OpenVZ, KVM-FV and KVM-PV Hypervisors Using FTP and HTTP Approaches. 502-507 - Fumihiko Nakamura, Takuo Nakashima:

Performance of a Stable Unit Active Queue Management. 508-513
Cloud Computing
- Jason C. Hung, Victoria Hsu, Yu-Bing Wang:

A Smart-Travel System Based on Social Network Service for Cloud Environment. 514-519 - Shinichiro Kibe, Minoru Uehara, Motoi Yamagiwa:

Evaluation of Bottlenecks in an Educational Cloud Environment. 520-525
Antenna and Wave Propagation
- Masaaki Yamanaka, Norihiko Morinaga, Shinichi Miyamoto, Seiichi Sampei:

A Study on a Secure Wireless Link Creation Based on Multi-path Routing Combined with Transmit Antenna Directivity Control. 526-531 - Junichi Honda, Kazunori Uchida:

Relationship between Source Height and Distance Order of Propagation Along Random Rough Surface. 532-536 - Hiroshi Maeda

, Hiroyuki Terashima, Yongmei Zhang, Takuya Shinohara:
Hexagonal Resonator in Two Dimensional Photonic Crystal Structure. 537-540
Image and Sound Processing Systems
- Tsuneo Kagawa, Hideki Kudo, Shuichi Tanoue, Hiro Kiyosue, Hiromu Mori, Hiroaki Nishino, Kouichi Utsumiya:

Development of Medical Imaging Diagnosis Support System with Sound Effects. 541-545 - Makoto Fukumoto

, Shintaro Ogawa:
An Efficiency of Optimization Method of Sign Sound Using Interactive Differential Evolution. 546-551 - Damri Samretwit, Toshihiko Wakahara:

Measurement of Reading Characteristics of Multiplexed Image in QR Code. 552-557
Multimedia Tools and Techniques
- Toshihiko Wakahara, Noriyasu Yamamoto, Natthaphong Udomkarn, Damri Samretwit, Wei-Yong Zhao:

A New Research Support System. 558-562 - Hiroyuki Fujioka, Shinya Miyata:

Reshaping and Reconstructing Handwritten Character Typeface Using Dynamic Font Model. 563-568 - Takayuki Nagoya, Hiroyuki Fujioka:

A Graph Theoretic Algorithm for Recovering Drawing Order of Multi-stroke Handwritten Images. 569-574
The Fourth International Workshop on Information Network Design (WIND 2011)
Network Design Method
- Koji Imagawa, Takeshi Fujimura, Hiroyoshi Miwa:

Approximation Algorithm for Finding Protected Links to Keep Small Diameter against Link Failures. 575-580 - Akira Noguchi, Takeshi Fujimura, Hiroyoshi Miwa:

Network Design Method by Link Protection for Network Load Alleviation against Failures. 581-586 - Mario Köppen, Kaori Yoshida, Masato Tsuru:

A Generic Approach to Multi-fairness and Its Application to Wireless Channel Allocation. 587-593
Network Architecture
- Shinya Yamamura, Akira Nagata, Masato Tsuru:

Store-Carry-Forward Based Networking Infrastructure: Vision and Potential. 594-599 - Ryo Sasaki, Makoto Otani, Kenzi Watanabe:

Development of IPv6/IPv4 Translator Using High Performance Packet Processing Engine. 600-604 - Hiroshi Sakai, Akira Arutaki:

Protocol Enhancement for Near Field Communication (NFC): Future Direction and Cross-Layer Approach. 605-610
Network Performance
- Remi Ando, Tutomu Murase, Masato Oguchi:

Influence of Interference with Moving Terminal in Wireless LAN Environment and Evaluation of Behavior of QoS-TCP. 611-616 - Yuki Nakamizo, Hiroshi Koide

, Kazumi Yoshinaga, Dirceu Cavendish, Yuji Oie:
MVA Modeling of Multi-core Server Distributed Systems. 617-620 - Atsuo Tachibana, Shigehiro Ano, Masato Tsuru:

Selecting Measurement Paths for Efficient Network Monitoring and Diagnosis under Operational Constraints. 621-626
Third International Workshop on Managing Insider Security Threats (MIST 2011)
Keynote and Invited Paper
- Dieter Gollmann:

From Insider Threats to Business Processes that are Secure-by-Design. 627 - Shinsaku Kiyomoto, Yutaka Miyake:

On Data Importance Analysis. 628-633
Managing Insider Threats
- Yoshiaki Hori, Takashi Nishide, Kouichi Sakurai:

Towards Countermeasure of Insider Threat in Network Security. 634-636 - Takayuki Sasaki:

Towards Detecting Suspicious Insiders by Triggering Digital Data Sealing. 637-642 - Chien-Ting Kuo, He-Ming Ruan, Chin-Laung Lei, Shih-Jen Chen:

A Mechanism on Risk Analysis of Information Security with Dynamic Assessment. 643-646 - Yuki Wakamizu, Makoto Otani, Kenzi Watanabe:

Development of Network User Authentication Gateway System Using "High Performance Packet Processing Engine". 647-651 - Kwangjin Bae, Sungjin Kim, Yongoo Lee, Ilsun You, Kangbin Yim, Taeho Son:

Insider Threats are Getting Worse within Industries: Isolated Secondary Backup Required. 652-655
Cryptographic Technologies for Managing Insider Threats
- Takashi Nishide, Kouichi Sakurai:

Security of Offline Anonymous Electronic Cash Systems against Insider Attacks by Untrusted Authorities Revisited. 656-661 - Naoto Yanai

, Raylin Tso
, Masahiro Mambo, Eiji Okamoto:
Certificateless Ordered Sequential Aggregate Signature Scheme. 662-667 - Dan Cao, Baokang Zhao, Xiaofeng Wang, Jinshu Su

, Guofei Ji:
Multi-authority Attribute-Based Signature. 668-672 - Marek R. Ogiela, Lidia Ogiela:

Image Based Crypto-biometric Key Generation. 673-678
Related Technologies
- Aniello Castiglione

, Giuseppe Cattaneo
, Alfredo De Santis
:
A Forensic Analysis of Images on Online Social Networks. 679-684 - Pietro Albano, Aniello Castiglione

, Giuseppe Cattaneo
, Giancarlo De Maio, Alfredo De Santis
:
On the Construction of a False Digital Alibi on the Android OS. 685-690 - Aniello Castiglione

, Alfredo De Santis
, Francesco Palmieri
:
Characterizing and Classifying Card-Sharing Traffic through Wavelet Analysis. 691-697 - Raffaele Pizzolante, Bruno Carpentieri

, Aniello Castiglione
, Giancarlo De Maio:
The AVQ Algorithm: Watermarking and Compression Performances. 698-702 - Xingjun Zhang, Endong Wang, Long Xin, Zhongyuan Wu, Weiqing Dong, Xiaoshe Dong

:
KVM-based Detection of Rootkit Attacks. 703-708 - Yan Yang, Xingjun Zhang, Endong Wang, Nan Wu, Xiaoshe Dong

:
A Scalable Fault Management Architecture for ccNUMA Server. 709-714 - Xingjun Zhang, Endong Wang, Dong Zhang, Yu Wang, Weiguo Wu, Xiaoshe Dong

:
Software-Based Detecting and Recovering from ECC-Memory Faults. 715-719 - Yu Cheng, Yongwen Wang, Zuocheng Xing, Minxuan Zhang:

Characterizing Time-Varying Behavior and Predictability of Cache AVF. 720-725
Second International Workshop on Computational Intelligence for Disaster Management (CIDM 2011)
Approaches and Methods for Intelligence in Disaster Management
- Hisayuki Sasaoka:

Introduction of Acquiring Method for Agents' Actions with Simple Ant Colony Optimization in RoboCup Rescue Simulation System. 726-728 - Eoghan Furey

, Kevin Curran
, Paul McKevitt:
A Bayesian Filter Approach to Modelling Human Movement Patterns for First Responders within Indoor Locations. 729-734 - Eleana Asimakopoulou, Nik Bessis

, Stelios Sotiriadis, Fatos Xhafa
, Leonard Barolli:
A Collective Intelligence Resource Management Dynamic Approach for Disaster Management: A Density Survey of Disasters Occurrence. 735-740 - Fatos Xhafa

, Eleana Asimakopoulou, Nik Bessis
, Leonard Barolli, Makoto Takizawa
:
An Event-based Approach to Supporting Team Coordination and Decision Making in Disaster Management Scenarios. 741-745
Critical Reviews and Applications
- Thushari P. Silva

, Vilas Wuwongse, Hitesh Nidhi Sharma:
Linked Data in Disaster Mitigation and Preparedness. 746-751 - Abdullah Saad Al Shahrani:

Rushing Attack in Mobile Ad Hoc Networks. 752-758 - Daniel Gutiérrez-Reina

, Sergio L. Toral Marín
, Federico Barrero
, Nik Bessis
, Eleana Asimakopoulou:
Evaluation of Ad Hoc Networks in Disaster Scenarios. 759-764
Network Applications for Disaster Management
- Jun-Hyuck Lee, Junichi Honda, Kazunori Uchida:

Allocation of Base Stations by Using PSO Method. 765-770 - Masahiro Hiyama, Elis Kulla, Makoto Ikeda, Leonard Barolli, Jiro Iwashige:

Performance Evaluation of MANET Testbed in a Mixed Indoor and Outdoor Environment. 771-776 - Leonard Barolli, Gjergji Mino, Elis Kulla, Akio Koyama, Jiro Iwashige:

Performance Evaluation of a Fuzzy-based Integrated CAC and Handover System for Cellular Networks. 777-786
International Workshop on Adaptive Learning Via Interactive, Collaborative and Emotional Approaches (ALICE 2011)
E-learning Systems
- Naomi Miyake:

Knowledge Constructive Jigsaw as an Adaptive Learning Framework: Its Design Principles and Network Supports. 787-788 - Nicola Capuano

, Matteo Gaeta
, Saverio Salerno, Giuseppina Rita Mangione
:
An Ontology-Based Approach for Context-Aware E-learning. 789-794 - Jordi Conesa

, Santi Caballé
, David Gañán
, Josep Prieto
:
A Framework for Dealing with Knowledge about On-line Collaborative Learning Sessions. 795-800 - Miguel Ángel Conde González

, Francisco José García-Peñalvo
, Marc Alier Forment
:
Interoperability Scenarios to Measure Informal Learning Carried Out in PLEs. 801-806 - Michalis Feidakis

, Thanasis Daradoumis
, Santi Caballé
:
Emotion Measurement in Intelligent Tutoring Systems: What, When and How to Measure. 807-812
Adaptive Learning and Collaborative Systems
- Soumya Banerjee, Santi Caballé

:
Exploring Learning Pattern in Social Network. 813-817 - Santi Caballé

, Néstor Mora
, Ian Dunwell
, David Gañán
:
CC-LO: A New Type of Learning Object for the Virtualization of Live Collaborative Sessions. 818-823 - Mohammad Al-Smadi

, Margit Hoefler
, Christian Guetl
:
An Integrated Model for E-assessment of Learning Experiences Enriched with Complex Learning Resources. 824-829 - Ian Dunwell

, Panagiotis Petridis
, Sylvester Arnab
, Aristidis Protopsaltis
, Maurice Hendrix
, Sara de Freitas:
Blended Game-Based Learning Environments: Extending a Serious Game into a Learning Content Management System. 830-835
E-learning Applications and Algorithms
- Giuseppina Rita Mangione

, Francesco Orciuoli
, Anna Pierri
, Pierluigi Ritrovato, Marcello Rosciano:
A New Model for Storytelling Complex Learning Objects. 836-841 - Soumya Banerjee, Santi Caballé

:
Exploring Fish School Algorithm for Improving Turnaround Time: An Experience of Content Retrieval. 842-847 - Konstantinos Kalemis:

Ethnic Immigrant Minorities and Mobile Learning for Schools - A Class without Walls: A New Didactic Approach to Digital Literacy across the Curriculum. 848-854 - Sayaka Tohyama

, Naomi Miyake:
The Evaluation of ReCoNote Summaries for Learner-Centered Integration. 855-856
International Workshop on Kansei Engineering and Design (WKED 2011)
- Elnaz Mazandarani, Kaori Yoshida, Mario Köppen, Wladimir Bodrow:

Recommendation System Based on Competing Algorithms. 857-862 - Kentaro Hamada, Kaori Yoshida, Kei Ohnishi, Mario Köppen:

Color Effect on Subjective Perception of Progress Bar Speed. 863-866 - Hiroko Shoji, Hiroo Inamura, Akihiro Ogino:

A Study on Information Recommendation Systems for Continuous Use. 867-871 - Yuta Kurotaki, Hisao Shiizuka:

Measurement and Classification of the Affective Value of Drum Rhythm Patterns. 872-875 - Hisao Shiizuka, Ayako Hashizume:

Kansei/Affective Decision Making. 876-881

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














