


default search action
16. CIT 2016: Nadi, Fiji
- 2016 IEEE International Conference on Computer and Information Technology, CIT 2016, Nadi, Fiji, December 8-10, 2016. IEEE Computer Society 2016, ISBN 978-1-5090-4314-9

IEEE CIT 2016 - 2016 IEEE International Conference on Computer and Information Technology
Session 1: Programming & Software Analysis
- Peter Trifonov, Yuangang Wang:

Generalized Concatenated Codes for Block and Device Failure Protection. 1-9 - Yasmeen Akhtar, Soumen Maity, Reshma C. Chandrasekharan

:
Generating Test Suites with High 3-Way Coverage for Software Testing. 10-17 - I-Hsin Chung, Carlos H. A. Costa, Leopold Grinberg, Hui-Fang Wen:

Application Characterization Assisted System Design. 18-25 - André Magno Costa de Araújo, Valéria Cesário Times, Marcus Urbano da Silva, Danielle Santos Alves, Silvio Heverton Campelo de Santana:

Template4EHR: Building Dynamically GUIs for the Electronic Health Records Using Archetypes. 26-33 - Yutaka Watanobe, Nikolay N. Mirenkov, Mirai Watanabe:

Adaptation Aspects of AIDA Programs. 34-41 - Fei Tang, Jing Liu, Tingliang Zhou, Junfeng Sun, Haiying Sun:

Spatial Alloy: An Alloy Extension for Modeling Spatial Properties. 42-49
Session 2: Applications
- Kaan Eksen

, Tacha Serif
, George Ghinea
, Tor-Morten Grønli
:
inLoc: Location-Aware Emergency Evacuation Assistant. 50-56 - Chihiro Maru, Miki Enoki, Akihiro Nakao, Shu Yamamoto, Saneyasu Yamaguchi, Masato Oguchi:

QoE Control of Network Using Collective Intelligence of SNS in Large-Scale Disasters. 57-64 - Willy Tiengo, Evandro de Barros Costa, Joseana M. Fechine:

Reducing Risk of Rollover in Curve for Heavy-Duty Vehicles with an Agent-Based Advanced Driver Assistance System. 65-72 - Leong Lee, Matthew Jones, Gregory S. Ridenour, Sam J. Bennett, Arisha C. Majors, Bianca L. Melito, Michael J. Wilson:

Comparison of Accuracy and Precision of GPS-Enabled Mobile Devices. 73-82 - Md. Arifuzzaman, Md. Jahidul Islam, S. M. Sazirul Islam, Rajesh Palit

:
Drishti: A Mobile Application Based Multipurpose Surveillance System. 83-88 - Jesmin Nahar, A. B. M. Shawkat Ali, Tasadduq Imam

, Kevin Tickle, Yi-Ping Phoebe Chen
:
Brain Cancer Diagnosis-Association Rule Based Computational Intelligence Approach. 89-95
Session 3: Short Papers
- Teddy Falsen Hiis, Tor-Morten Grønli

, Gheorghita Ghinea
:
The SmartPT: Wearble Sensor Integration and Tracking in Training Equipment. 96-99 - Slim Chtourou

, Mohamed Kharrat, Nader Ben Amor
, Mohamed Jallouli, Mohamed Abid:
Development of an Android Service to add IOIO Hardware Features to Android Apps. 100-103 - Nayana Gupta, Mohammed Wasid, Rashid Ali

:
Analysis of Complex Data in Telecommunications Industry. 104-107 - G. S. Smrithy

, Ramadoss Balakrishnan
:
A Statistical Technique for Online Anomaly Detection for Big Data Streams in Cloud Collaborative Environment. 108-111 - Tawseef Ayoub Shaikh

, Rashid Ali
:
Quantum Computing in Big Data Analytics: A Survey. 112-115 - Mayra Samaniego

, Ralph Deters:
Hosting Virtual IoT Resources on Edge-Hosts with Blockchain. 116-119 - Anindya Chowdhury, Abid Jamal, Rubayath Alam, Rajesh Palit

:
Campus Ride: An Environment-Friendly Ride Sharing Platform for Academic Institutions. 120-124
Session 4: System Design
- Bilal Haider, Shagufta Henna

, Ambreen Gul, Farhan Aadil
:
A Survey on Mobility Management Techniques in VANETs. 125-133 - Mirai Watanabe, Yutaka Watanobe, Alexander Vazhenin:

Architecture for Hybrid Language Systems. 134-139 - Dermas Moffo, Philippe Canalda, François Spies

:
Relative and Absolute Positioning in Ultra Dense Mems System. 140-147 - Shah Jahan Miah

, Hafizul Islam, Ahmad Zam Hariro Samsudin:
Ontology Techniques for Representing the Problem of Discourse: Design of Solution Application Perspective. 148-153 - Salman Arif

, Naveed Ghaffar, Ali Javed:
Implementation of Alternating Median Based Round Robin Scheduling Algorithm. 154-160
Session 5: Social Networks & Recommendation System
- Ameni Youssfi Nouira, Yassine Jamoussi, Henda Hajjami Ben Ghézala

:
Extracting Actions with Improved Part of Speech Tagging for Social Networking Texts. 161-166 - Ankush Bhatia:

Community Detection for Cold Start Problem in Personalization: Community Detection is Large Social Network Graphs Based on Users' Structural Similarities and Their Attribute Similarities. 167-171 - Xi Chen

, Jianwei Li, Zeyu Zheng, Tianran Wang:
Degree of Integration into Social Networks (DISN) Evaluation Model Based on Micro-Blogging Platforms and Information Dissemination Prediction. 172-176 - Xiaokang Zhou, Wei Liang, Bo Wu

, Zixian Lu, Shoji Nishimura
, Takashi Shinomiya, Qun Jin:
Dynamic Community Mining and Tracking Based on Temporal Social Network Analysis. 177-182 - Congcong Chen, Dong Wang, Yue Ding:

User Actions and Timestamp Based Personalized Recommendation for E-Commerce System. 183-189 - Qin Zhao, Yueqin Zhang, Jian Chen:

An Improved Ant Colony Optimization Algorithm for Recommendation of Micro-Learning Path. 190-196
Session 6: Networking & Web I
- T. H. Akila S. Siriweera, Incheon Paik, Banage T. G. S. Kumara

:
QoS-Aware Traffic-Efficient Web Service Selection over BigData Space. 197-203 - Hong Yao, Hui Li, Chao Liu, Muzhou Xiong, Deze Zeng, Guohui Li:

Joint Optimization of VM Placement and Rule Placement towards Energy Efficient Software-Defined Data Centers. 204-209 - Dong Seong Kim

, Jin B. Hong
, Tuan Anh Nguyen
, Fumio Machida, Jong Sou Park, Kishor S. Trivedi:
Availability Modeling and Analysis of a Virtualized System Using Stochastic Reward Nets. 210-218 - Nitin Naik, Paul Jenkins

, Philip Davies, David Newell:
Native Web Communication Protocols and Their Effects on the Performance of Web Services and Systems. 219-225
Session 7: Security & Privacy I
- Xuebin Ren, Chia-Mu Yu, Weiren Yu, Shusen Yang, Xinyu Yang, Julie A. McCann:

High-Dimensional Crowdsourced Data Distribution Estimation with Local Privacy. 226-233 - Song Jin Yu, Pauline Koh, Hyukmin Kwon, Dong Seong Kim

, Huy Kang Kim:
Hurst Parameter Based Anomaly Detection for Intrusion Detection System. 234-240 - Young-Hoon Moon, Ji Hong Kim, Dong Seong Kim

, Huy Kang Kim:
Hybrid Attack Path Enumeration System Based on Reputation Scores. 241-248 - Simon Yusuf Enoch

, Mengmeng Ge, Jin B. Hong
, Huy Kang Kim, Paul Kim, Dong Seong Kim
:
Security Modelling and Analysis of Dynamic Enterprise Networks. 249-256 - Mourad Elhadef

, Sofiane Grira
:
Performance Evaluation of a Game Theory-Based Fault Diagnosis Algorithm Under Partial Comparison Syndrome. 257-264
Session 8: Artificial Intelligence & Machine Learning
- Mu Yang, Ray-Bing Chen

, I-Hsin Chung, Weichung Wang:
Particle Swarm Stepwise Algorithm (PaSS) on Multicore Hybrid CPU-GPU Clusters. 265-272 - Young In Kim, Cheong Hee Park:

Concept Drift Detection on Streaming Data under Limited Labeling. 273-280 - Marcos Mouriño-García, Roberto Pérez-Rodríguez, Luis E. Anido-Rifón

, Miguel A. Gómez Carballa:
Bag-of-Concepts Document Representation for Bayesian Text Classification. 281-288 - Andrzej M. J. Skulimowski

:
Impact of Future Intelligent Information Technologies on the Methodology of Scientific Research. 289-298 - Yiming Zhou, Zeyang Dai, Lei Jing:

A Controlled Experiment Between Two Methods on Ten-Digits Air Writing. 299-302 - Aruna Govada

, Varsha S. Thomas, Ipsita Samal, Sanjay Kumar Sahay:
Distributed Multi-class Rule Based Classification Using RIPPER. 303-309
Session 9: Speech & Image Analysis
- Cuong H. Pham, Yuichi Yaguchi, Keitaro Naruse:

Feature Descriptors: A Review of Multiple Cues Approaches. 310-315 - Linhua Jiang, Pengfei Bai, Xiao Lin:

Saliency Detection via Background Seeds Combined with Bayesian Model. 316-322 - Lee-Min Lee:

Piecewise Polynomial High-Order Hidden Markov Models with Applications in Speech Recognition. 323-327 - Xiaoyin Che, Sheng Luo, Haojin Yang, Christoph Meinel:

Sentence-Level Automatic Lecture Highlighting Based on Acoustic Analysis. 328-334 - Xingang Wang, Suiping Qi, Zhigang Gai, Hui Li, Enxiao Liu

, Weihao Xie, Ding Hu:
Micro-Scale Severe Weather Prediction Based on Region Trajectories Extracted from Meteorological Radar Data. 335-338
Session 10: Networking & Web II
- Jibing Wu, Yahui Wu, Su Deng, Hongbin Huang:

Multi-way Clustering for Heterogeneous Information Networks with General Network Schema. 339-346 - Radhia Khdhir, Kais Mnif

, Aymen Belghith
, Lotfi Kamoun:
Tabu Approach for Adaptive Resource Allocation and Selection Carrier Aggregation in LTE-Advanced Network. 347-353 - Qi Zhang, Shasha Li, Qingbo Wu, Jie Yu:

Improving DHT Load Balance Using the Churn. 354-360 - Jing Xia, Deming Pang, Zhiping Cai, Ming Xu, Gang Hu:

Reasonably Migrating Virtual Machine in NFV-Featured Networks. 361-366
Session 11: Security & Privacy II
- Imen Khabou, Mohsen Rouached, Rafik Bouaziz

, Mohamed Abid:
Towards Privacy-Aware Web Services Compositions. 367-374 - Sonia Kotel

, Fatma Sbiaa
, Zeghid Medien
, Mohsen Machhout
, Adel Baganne, Rached Tourki:
Efficient Hybrid Encryption System Based on Block Cipher and Chaos Generator. 375-382 - Nazia Majadi, Jarrod Trevathan

, Neil W. Bergmann:
Analysis on Bidding Behaviours for Detecting Shill Bidders in Online Auctions. 383-390 - Fatma Sbiaa

, Sonia Kotel
, Zeghid Medien
, Rached Tourki, Mohsen Machhout
, Adel Baganne:
A Selective Encryption Scheme with Multiple Security Levels for the H.264/AVC Video Coding Standard. 391-398
IEEE SocialSec 2016 - Second IEEE International Symposium on Security and Privacy in Social Networks and Big Data
- Katanosh Morovat, Brajendra Panda:

Request Evaluation for Policy-Based Attribute Access Control in Social Network Cloud. 399-406 - Praveen Rao, Anas Katib, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla:

Probabilistic Inference on Twitter Data to Discover Suspicious Users and Malicious Content. 407-414 - Rui Chang, Liehui Jiang, Wenzhi Chen, Hongqi He, Shuiqiao Yang:

Enhancement of Permission Management for an ARM-Android Platform. 415-422 - Yuantian Miao, Zichan Ruan, Lei Pan

, Jun Zhang
, Yang Xiang, Yu Wang
:
Comprehensive Analysis of Network Traffic Data. 423-430 - Jiao Jiao Jiang

, Youyang Qu
, Shui Yu
, Wanlei Zhou
, Wei Wu:
Studying the Global Spreading Influence and Local Connections of Users in Online Social Networks. 431-435
IEEE SC2-2016 - The Sixth IEEE International Symposium on Cloud and Service Computing
Session 1
- Daniel Dauwe, Sudeep Pasricha, Anthony A. Maciejewski

, Howard Jay Siegel:
A Performance and Energy Comparison of Fault Tolerance Techniques for Exascale Computing Systems. 436-443 - Meilian Lu, Danhua Sun, Yan Shi, Yuhong Li:

Peer-Assisted Streaming Distribution over CCN. 444-451 - Jiahao Liu, You Li, Guohui Ling, Ronghua Li, Zibin Zheng

:
Community Detection in Location-Based Social Networks: An Entropy-Based Approach. 452-459 - Philander Adriaan, Yan Bai, Donald Chinn:

Privacy-Enhanced Scheduling for Smart Power Grids. 460-467 - Anna Kobusinska

, Jerzy Brzezinski
, Jakub Aftowicz, Grzegorz Grzelachowski:
Distributed Content Dissemination with a Rank Function. 468-475 - Che-Hsun Liu, Zhi Jie Zhang, Sheng-De Wang:

An Android Malware Detection Approach Using Bayesian Inference. 476-483
Session 2
- Carson K. Leung

, Peter Braun, Murun Enkhee, Adam G. M. Pazdor, Oluwafemi A. Sarumi
, Kimberly Tran:
Knowledge Discovery from Big Social Key-Value Data. 484-491 - Zhenqiu Huang, Kwei-Jay Lin, Chi-Sheng Shih:

Supporting Edge Intelligence in Service-Oriented Smart IoT Applications. 492-499 - Worachate Apichanukul, Jun Kawahara, Shoji Kasahara

:
Accuracy Improvement for Backup Tasks in Hadoop Speculative Algorithm. 500-507 - Qingtang Xia, Tianjia Chen, Wei Xu:

CIDS: Adapting Legacy Intrusion Detection Systems to the Cloud with Hybrid Sampling. 508-515 - Yoshiaki Adachi, Hirozumi Yamaguchi

, Teruo Higashino, Takaaki Umedu:
Cloud-Assisted Dynamic Content Sharing among Vehicles. 516-523 - Rohit Ahuja, Sraban Kumar Mohanty

, Kouichi Sakurai:
A Traceable Signcryption Scheme for Secure Sharing of Data in Cloud Storage. 524-531
Session 3
- Sing-Chi Chen, Ren-Hung Hwang

:
A Scalable Integrated SDN and OpenStack Management System. 532-537 - HooYoung Ahn, Junsu Kim, YoonJoon Lee:

A Highly Reliable Storage Based on SSD Array for Cloud Computing Environment. 538-544 - Hong-Cyuan Hsu, Che-Rung Lee:

G-KVM: A Full GPU Virtualization on KVM. 545-552 - Simon Fong, Robert P. Biuk-Aghai, Yain-Whar Si

:
Lightweight Feature Selection Methods Based on Standardized Measure of Dispersion for Mining Big Data. 553-559
Session 4
- Roger Baig

, Felix Freitag
, Leandro Navarro
:
Fostering Collaborative Edge Service Provision in Community Clouds with Docker. 560-567 - Adam Gregory, Shikharesh Majumdar:

Energy Aware Resource Management for MapReduce Jobs with Service Level Agreements in Cloud Data Centers. 568-577 - Manish Kumar Pandey

, Karthikeyan Subbiah
:
A Novel Storage Architecture for Facilitating Efficient Analytics of Health Informatics Big Data in Cloud. 578-585 - Louis Y. Y. Lu, John S. Liu:

The Major Research Themes of Big Data Literature: From 2001 to 2016. 586-590 - Jianhua Gu, Xiaodong Dong:

A Data Backup Algorithm Based on Failure Correlation in In-memory Storage System. 591-598 - Leila Abidi, Souha Bejaoui, Christophe Cérin, Jonathan Lejeune, Yanik Ngoko, Walid Saad:

Data Management for the RedisDG Scientific Workflow Engine. 599-606
Poster Session
- Tian Tian, Yiming Zhang, Qiao Zhou, Ping Zhong

:
ModelX: Using Model Checking to Find Design Errors of Cloud Applications. 607-610 - Pathasu Doungmala, Katanyoo Klubsuwan:

Helmet Wearing Detection in Thailand Using Haar Like Feature and Circle Hough Transform on Image Processing. 611-614 - Asantha Thilina, Shakthi Attanayake, Sacith Samarakoon, Dahami Nawodya, Lakmal Rupasinghe, Nadith Pathirage, Tharindu Edirisinghe, Kesavan Krishnadeva:

Intruder Detection Using Deep Learning and Association Rule Mining. 615-620 - Radhouane B. N. Jrad, David Sundaram:

Inter-organizational Middleware System Implementations: Dos and Donts of Business Integration. 621-628 - A. T. M. Mosharof Hossain, Nazia Hasan Tuktuki, Hasibul Kabir, Rajesh Palit

:
Design and Development of a Mobile Application Based Drug Requisition System. 629-636 - Mohammad Adnan Shahriar, Sadman Sakib, Rajesh Palit

:
CitizenConnect: Connecting Citizens with Public Service Providers. 637-643 - Michael Glöckner, André Ludwig, Bogdan Franczyk:

A Reference Architecture for the Logistics Service Map: Structuring and Composing Logistics Services in Logistics Networks. 644-651 - Cunqun Fan, Xiangang Zhao, Manyun Lin, Lan Wei, Zhanyun Zhang, Xi Zhang, You Ma:

A Resource Scheduling Method with Rough Set for Virtual Cluster. 652-654 - Baoping Zou:

Heterogeneous and Homogeneous Samples with Different Weights for Classification. 655-657 - Hojjat Baghban, Mahdis Moradi, Ching-Hsien Hsu, Jerry Chou, Yeh-Ching Chung:

Byzantine Fault Tolerant Optimization in Federated Cloud Computing. 658-661 - Nipuna Upeka Pannala, Chamira Priyamanthi Nawarathna, J. T. K. Jayakody

, Lakmal Rupasinghe, Kesavan Krishnadeva:
Supervised Learning Based Approach to Aspect Based Sentiment Analysis. 662-666
Session 5
- Kezhi Wang, Kun Yang:

Power-Minimization Computing Resource Allocation in Mobile Cloud-Radio Access Network. 667-672 - Yi-Chih Kao, Yung-Chia Chang

, Sheng-Lung Peng, Ruay-Shiung Chang:
A Novel Method for Designing Information Technology Services. 673-680 - Babak Yadranjiaghdam, Komal Hotwani, Nasseh Tabrizi:

A Risk Evaluation Framework for Service Level Agreements. 681-685 - Maycon Leone Maciel Peixoto

, Dionisio Machado Leite Filho, Carlos Henrique, Danilo Costa Marim Segura, Bruno Tardiole Kuehne
, Bruno Guazzelli:
Predictive Dynamic Algorithm: An Approach toward QoS-Aware Service for IoT-Cloud Environment. 686-693 - Wei-Peng Chen, Chuan-Ming Liu:

Performance Comparison on the Heterogeneous File System in Cloud Storage Systems. 694-701 - Yung-Sheng Lin, Yu-Hsiang Chang, Yue-Shan Chang:

Constructing PM2.5 Map Based on Mobile PM2.5 Sensor and Cloud Platform. 702-707
Session 6
- Sungpil Woo, Jaewook Byun, Seong Hoon Kim, Hoang Minh Nguyen, Janggwan Im, Daeyoung Kim:

RNN-Based Personalized Activity Recognition in Multi-person Environment Using RFID. 708-715 - Björn Schwarzbach, Bogdan Franczyk, Lucas Petrich, Arkadius Schier, Michael ten Hompel:

Cloud Based Privacy Preserving Collaborative Business Process Management. 716-723 - Te-Yuan Lin, Chiou-Shann Fuh:

Considerations of Emerging Cloud Computing in Financial Industry and One-Time Password with Valet Key Solution. 724-731 - Ashan Chulanga Perera, Kesavan Krishnadeva, Sripa Vimukthi Bannakkotuwa, Chethana Liyanapathirana

, Lakmal Rupasinghe:
E-commerce (WEB) Application Security: Defense against Reconnaissance. 732-742 - David Nunes, Jorge Sá Silva

, Ashley Figueira, Hugo Dias, André Rodrigues
, Vasco Pereira
, Fernando Boavida
, Soraya Sinche
:
FoTSeC - Human Security in Fog of Things. 743-749 - Xiaoqiang Zhang, Xuesong Wang

:
Novel Survey on the Color-Image Graying Algorithm. 750-753
Session 7
- Chunxiao Fan, Yeqiao Wang, Zhigang Wen:

Research on Improved 2D-BPSO-Based VM-Container Hybrid Hierarchical Cloud Resource Scheduling Mechanism. 754-759 - Jinlei Jiang, Xun Zhao, Yongwei Wu, Weimin Zheng:

I/O-Conscious and Prediction-Enabled Virtual Machines Scheduling. 760-767 - Vincent E. Urias, William M. S. Stout, Caleb Loverro, John W. Young:

Hypervisor Assisted Forensics and Incident Response in the Cloud. 768-775 - Grant Wu, Maolin Tang

:
A Trading-Inspired Approach to the Dynamic Server Consolidation Problem in Data Centers. 776-782

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














