


default search action
5. IMIS 2011: Seoul, Korea
- Ilsun You, Leonard Barolli, Feilong Tang, Fatos Xhafa:

Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011, Seoul, Korea, June 30-July 02, 2011. IEEE Computer Society 2011, ISBN 978-0-7695-4372-7
Selected Area: Practical Security on Internet Services I
- Ching-Lung Chang, Han-Yu Tsai:

The Design of Video Door Phone and Control System for Home Secure Applications. 1-5 - Kyungroul Lee, Sitha Pho, Kangbin Yim:

Reversability Assessment on Secure USB Memories. 6-8 - Kyungroul Lee, Kangbin Yim:

Keyboard Security: A Technological Review. 9-15 - Mohammad A. Mikki, Kyungroul Lee, Wansoo Kim, Kangbin Yim:

Architecture to Support Heterogeneous Devices for Video Surveillance System. 16-19
Cloud Computing and Service Management I
- Shih-Hao Hung

, Chi-Sheng Shih
, Jeng-Peng Shieh, Chen-Pang Lee, Yi-Hsiang Huang:
An Online Migration Environment for Executing Mobile Applications on the Cloud. 20-27 - Ruiqing Chi, Zhuzhong Qian, Sanglu Lu:

A Heuristic Approach for Scalability of Multi-tiers Web Application in Clouds. 28-35 - Ji Ho Kim, Sang Min Lee, Dong Seong Kim

, Jong Sou Park:
Performability Analysis of IaaS Cloud. 36-43 - Zia ur Rehman

, Farookh Khadeer Hussain, Omar Khadeer Hussain
:
Towards Multi-criteria Cloud Service Selection. 44-48
Internet, Wireless and Mobile Networks for UPC I
- Yuh-Shyan Chen

, Chih-Shun Hsu, Wei-Han Yi:
An IP Passing Protocol for Vehicular Ad Hoc Networks with Network Fragmentations. 49-56 - Baokang Zhao, Ziming Song, Jinshu Su

, Wei Peng
, Qiaolin Hu:
NTC: Towards Efficient Network Coding in Delay Tolerant Networks. 57-64
Context and Location-Aware Computing
- Hoon Ko, Goreti Marreiros

, Kyung-jin An, Zita A. Vale
, Tai-Hoon Kim, Jong-Myoung Choi:
Contexts-Management Strategy in Considering the Security in Urban Computing Based on Urban Design. 65-72 - Yong-Hwan Lee, Bonam Kim, Heung-Jun Kim:

Efficient Object Localization for Query-by-Subregion. 73-77 - Jenq-Muh Hsu, Chao-Chun Chen, Chia Chi Li:

Short-Term Prediction-Based Optimistic Object Tracking Strategy in Wireless Sensor Networks. 78-85
Selected Area: Practical Security on Internet Services II
- Giseop No, Ilkyeun Ra:

Adaptive DDoS Detector Design Using Fast Entropy Computation Method. 86-93 - Venkatesh Kannan, Sahena Ahmed:

A Resource Perspective to Wireless Sensor Network Security. 94-99 - Ce Chen, Zhuzhong Qian, Ilsun You, Jue Hong, Sanglu Lu:

ACSP: A Novel Security Protocol against Counting Attack for UHF RFID Systems. 100-105
Cloud Computing and Service Management II
- Natalia Kryvinska

, Christine Strauss
, Peter Zinterhof:
"Variated Availability" Approach to the Services Manageable Delivering. 106-113 - Siqi Du, Linpeng Huang, Jun-Qing Chen:

A Formal Model for Dynamic Service Updates in Pervasive Computing. 114-119 - Lin Lou, Feilong Tang, Ilsun You, Minyi Guo, Yao Shen, Li Li:

An Effective Deadlock Prevention Mechanism for Distributed Transaction Management. 120-127
Internet, Wireless and Mobile Networks for UPC II
- Nicholas McLauchlan, Nik Bessis

:
A Case for Real-World Smart Environments: The Development of a Remote Autonomous Energy Aware Monitoring System Using Next Generation Technologies. 128-135 - Markus Höckner, Rudolf Hartjes, Christine Strauss

, Natalia Kryvinska
:
"Memoxo" - Browser-Based Prototype for the Audio/Video Messages Recording. 136-142
Embedded Systems and Wearable Computers
- Bo Wang, Yongwei Wu, Weimin Zheng:

Task Optimization Based on CPU Pipeline Technique in Multicore System. 143-150 - Linyang Sheng, Jingbo Shao, Min Xu, Yuanquan Cui:

Display Verification IP Core Design Based on Star-Extraction and Star-Recognition Image Processing on FPGA. 151-155 - Peng Cao, Long Zheng, Yanchao Lu, Feilong Tang, Ilsun You, Minyi Guo:

Trying Linear Network Coding on a Network Flow Processor. 156-163 - Wei Chen, Weixia Xu, Zhiying Wang, Qiang Dou, Yongwen Wang, Baokang Zhao, Baosheng Wang:

A Formalization of an Emulation Based Co-designed Virtual Machine. 164-168
Selected Area: Practical Security on Internet Services III
- Marek R. Ogiela, Urszula Ogiela:

Secure Information Management Protocol Based on Linguistic Sharing Techniques. 169-174 - Ruoyu Zhang, Shiqiu Huang, Zhengwei Qi, Haibing Guan:

Combining Static and Dynamic Analysis to Discover Software Vulnerabilities. 175-181
Data Management in Pervasive Systems
- Lidia Ogiela, Marek R. Ogiela:

Semantic Analysis Processes in UBIAS Systems for Cognitive Data Interpretation. 182-185 - Myunggwon Hwang, Pankoo Kim, Dongjin Choi:

Information Retrieval Techniques to Grasp User Intention in Pervasive Computing Environment. 186-191 - Xiaopeng Yang, Hu Guan, Feilong Tang, Ilsun You, Minyi Guo, Yao Shen:

Improvements on Sequential Minimal Optimization Algorithm for Support Vector Machine Based on Semi-sparse Algorithm. 192-199
Security, Trust and Privacy
- Luis Gómez-Miralles

, Joan Arnedo-Moreno:
Universal, Fast Method for iPad Forensics Imaging via USB Adapter. 200-207 - Gabriele Costa

, Ilaria Matteucci
:
Trust-Driven Policy Enforcement through Gate Automata. 208-215 - Je Hak Lee, Dong Seong Kim

, Sang Min Lee, Jong Sou Park:
DDoS Attacks Detection Using GA Based Optimized Traffic Matrix. 216-220 - Rong-Jian Chen, Jui-Lin Lai, Shi-Jinn Horng:

Novel Multi-bit and Multi-image Steganography Using Adaptive Embedding Algorithms with Minimum Error. 221-228
Knowledge Cities and Disaster Recovery
- Eleana Asimakopoulou, Nik Bessis

:
Buildings and Crowds: Forming Smart Cities for More Effective Disaster Management. 229-234 - Zemp Helena:

ICTs and Effective Communication Strategies: Specific Needs of Information before, during and after Disasters. 235-240
Modeling, Simulation and Performance in UPC
- Bart G. W. Craenen, Georgios K. Theodoropoulos

:
Ubiquitous Computing and Distributed Agent-Based Simulation. 241-247 - Jingbo Sun, Yue Wang, Jian Yuan, Xiuming Shan:

A PCA-based Approach to Modeling Location Update and Paging for Location Area Planning. 248-252 - Shiwei Hu, Minyi Guo, Feilong Tang, Jingyu Zhou, Yao Shen:

Circuit Emulation Services over SCTP. 253-257
Cognitive Radio Systems, Sensors and Applications (ACTICS 2011)
- Subhasree Bhattacharjee

, Amit Konar, Atulya K. Nagar
:
Channel Allocation for a Single Cell Cognitive Radio Network Using Genetic Algorithm. 258-264 - Yuya Uesugi, Tasuku Yamamoto, Jun Sawamoto, Norihisa Segawa, Eiji Sugino, Takuto Goto, Hiroshi Yajima:

A Proposal of an Application of Life Log to Remote Consultation. 265-270
Protocols and Algorithms (ACTICS 2011)
- David Fotue, Foued Melakessou, Houda Labiod, Thomas Engel:

Effect of Sink Location on Aggregation Based on Degree of Connectivity for Wireless Sensor Networks. 271-276 - Bilal Abu Bakr, Leszek Lilien

:
Extending Wireless Sensor Network Lifetime in the LEACH-SM Protocol by Spare Selection. 277-282
Ubiquitous and Cloud Computing (FIMIS 2011)
- Yishan Li, Yuhong Li, Tao Li:

A Game-Theoretic Resource Allocation Algorithm Based on Utility in IEEE 802.11e. 283-288 - Sok Chuob, Manish Pokharel, Jong Sou Park:

Modeling and Analysis of Cloud Computing Availability Based on Eucalyptus Platform for E-Government Data Center. 289-296 - Mye M. Sohn, Hyunwoo Kim, Hyun Jung Lee:

Personalized Information Recommendataion Using Hybrid CBR and CSP in a Ubiquitous Computing Environment. 297-303
Mobility Issues in Wireless Networks (FIMIS 2011)
- Yunjing Hou, Yuhong Li, Liang Yu:

A Novel Mobility Management Mechanism Based on Destination Address Overwritten and ID/Locator Separation. 304-309 - Antonio J. Jara, Leandro Marín, Antonio Fernandez Gómez-Skarmeta, Dhananjay Singh

, Gohel Bakul, Daeyeoul Kim:
Secure Mobility Management Scheme for 6LoWPAN ID/Locator Split Architecture. 310-315
Architectures and Platforms (FINGNet 2011)
- Matthias Hirth

, Tobias Hoßfeld
, Phuoc Tran-Gia:
Cost-Optimal Validation Mechanisms and Cheat-Detection for Crowdsourcing Platforms. 316-321 - Matthias Hirth

, Tobias Hoßfeld
, Phuoc Tran-Gia:
Anatomy of a Crowdsourcing Platform - Using the Example of Microworkers.com. 322-329 - Michael Jarschel, Daniel Schlosser, Sven Scheuring, Tobias Hoßfeld

:
An Evaluation of QoE in Cloud Gaming Based on Subjective Tests. 330-335 - Abbas Ali Siddiqui, M. Rahamatullah Khondoker, Bernd Reuther, Paul Müller, Christian Henke, Helge Backhaus:

Functional Composition and Its Challenges. 336-340
Security Issues and Mobile Internet Applications (FINGNet 2011)
- Jisun Kim, Jiyoung Lim, Kijoon Chae:

Secure Code Dissemination Using Energy-Efficient Minimal Virtual Backbone in Sensor Networks. 341-346 - Jong-Suk Ruth Lee, Hae-Duck Joshua Jeong, Donald C. McNickle, Krzysztof Pawlikowski:

Self-Similar Properties of Spam. 347-352 - Yu-xuan Hong, Krzysztof Pawlikowski, Harsha R. Sirisena:

DAD-Less MIPv6 for Reduced Handover Latency. 353-360 - Hong-Chang Lee, Bo-Hyeon Kim, Myung-Joon Lee:

CoLib: Client Library for Effective Development of WebDAV-based Collaborative Application. 361-365
Internet Security (IFSN 2011)
- Lei Wang, Shuhui Chen, Yong Tang, Jinshu Su

:
Gregex: GPU Based High Speed Regular Expression Matching Engine. 366-370 - Jinjing Zhao, Yan Wen, Dongxia Wang:

A Network Security Evaluation Method Framework Based on Multiple Criteria Decision Making Theory. 371-375 - Xuewei Feng, Dongxia Wang, Shanwen Ke, Guoqing Ma, Jin Li:

A Framework of Network Security Situation Analysis Based on the Technologies of Event Correlation and Situation Assessment. 376-380
Wireless Networks (IFSN 2011)
- Qin Xin, Xiaolan Yao, Wei He:

Energy Optimal Selection of Access Points in Wireless Sensor Networks. 381-387 - Zhu Tang, Bo Liu, Baokang Zhao, Wanrong Yu, Chunqing Wu, Wei Peng

, Bing Bai, Yanpeng Ma:
Building Practical Self Organization Networks on Heterogeneous Wireless Modems. 388-393
System Security (IFSN 2011)
- Bing Bai, Jinshu Su

, Baokang Zhao, Wanrong Yu, Ling Wen:
Snail Crawling: An Enhanced Method for DTNs Routing. 394-397 - Jing Tao, Baosheng Wang:

Towards Practical IPSec over Challenged Networks. 398-402 - Yan Wen, Jinjing Zhao, Minhuan Huang, Hua Chen:

Aquarius: A Tiny Hypervisor to Introspect Commodity OSes in a Non-bypassable Way. 403-407
Wireless Networks (ITAUC 2011)
- Yung-Fa Huang

, Hsing-Chung Chen, Li-Ming Wang, Jhao-Wei Guo:
Performance of Energy Efficient Relay and Minimum Distance Clustering for Wireless Sensor Networks. 408-413 - Chia-Hsin Cheng, Hsinying Liang

, Yung-Fa Huang
, Tian-Yue Wu:
Impact of Broadcasting Directions in SDLS for Wireless Sensor Networks. 414-419 - Hsing-Chung Chen, Kanoksak Wattanachote:

A Role-Oriented Routing Algorithm Applied for Wireless Heterogeneous Networks. 420-423 - Hsi-Chou Hsu, Jyh-Horng Wen, Chia-Hsin Cheng, Yi-Shiang Chen, Tian-Yue Wu:

TOA Estimation with DLC Receivers for IEEE 802.15.4a UWB Systems. 424-428
Intelligent Systems and Algorithms (ITAUC 2011)
- Hsing-Chung Chen, Yung-Fa Huang

, Syuan-Zong Lin:
A Generalized Associated Temporal and Spatial Role-Based Access Control Model for Wireless Heterogeneous Networks. 429-433 - Chun-Wen Hung, Jhih-Han Chen, Hsuan T. Chang:

A Minimal Fuzzy Gain Scheduling Speed Controller and Torque Compensation for the Variable Sampling System of BLDC Motors. 434-437 - Kouhei Umezaki, Evjola Spaho

, Yuichi Ogata, Hironori Ando, Leonard Barolli, Fatos Xhafa
:
A Fuzzy-Based Reliability System for JXTA-Overlay P2P Platform. 438-443
Performance Modeling of Vehicular Mobility (MoMoPE 2011)
- Jingxin Wang, Jian Yuan, Xiuming Shan, Zhenming Feng, Junwei Geng, Ilsun You:

SaMob: A Social Attributes Based Mobility Model for Ad Hoc Networks. 444-449 - Wooseong Kim

, Mario Gerla:
NAVOPT: Navigator Assisted Vehicular Route OPTimizer. 450-455 - Youngho Park, Kyung Hyune Rhee, Chul Sur:

A Secure and Location Assurance Protocol for Location-Aware Services in VANETs. 456-461
Performance Modeling of Mobility Protocols (MoMoPE 2011)
- Yujia Zhai, Yue Wang, Jian Yuan, Yong Ren, Xiuming Shan, Ilsun You:

Analysis of Optimal Query, Fairness and Replication for DHT-based Mobility Management. 462-469 - Hyung-Taig Lim, Younghyun Kim, Sangheon Pack

, Chul-Hee Kang:
Joint Uplink/Downlink Connection Admission Control in WLAN/Cellular Integrated Systems. 470-474 - Hyon-Young Choi, Sung-Gi Min, Youn-Hee Han:

PMIPv6-based Flow Mobility Simulation in NS-3. 475-480 - Huachun Zhou, Fei Song, Hongke Zhang:

Mobility Management Research of Internet Based on the Splitting Mechanism. 481-486
Performance Modeling of Mobility Protocols (MoMoPE 2011)
- Sean Shen, Xiaodong Lee, Zhili Sun

, Sheng Jiang:
Enhance IPv6 Dynamic Host Configuration with Cryptographically Generated Addresses. 487-490 - Antonio J. Jara, Leandro Marín, Antonio Fernandez Gómez-Skarmeta, Dhananjay Singh, Gohel Bakul, Daeyeoul Kim:

Mobility Modeling and Security Validation of a Mobility Management Scheme Based on ECC for IP-based Wireless Sensor Networks (6LoWPAN). 491-496 - Chun-Wei Tsai, Wei-Shuo Li, Min Chen, Wen-Shyong Hsieh, Chu-Sing Yang:

Analysis of Multi-path Random Key Pre-distribution for Wireless Sensor Networks. 497-502
Steganography and Signature (MCNCS 2011)
- Aniello Castiglione

, Alfredo De Santis
, Ugo Fiore
, Francesco Palmieri
:
E-mail-Based Covert Channels for Asynchronous Message Steganography. 503-508 - Fuw-Yi Yang, Ling-Ren Liang, Su-Hui Chiu:

Improvement of Strong Designated Verifier Signatures. 509-513 - Chih-Hung Wang, Chao Chuan Chen:

Identity-Based Concurrent Signature Scheme with Improved Accountability. 514-519
Network and System Security (MCNCS 2011)
- Aniello Castiglione

, Giuseppe Cattaneo
, Giancarlo De Maio, Fabio Petagna:
SECR3T: Secure End-to-End Communication over 3G Telecommunication Networks. 520-526 - Chih-Cheng Lien, Chang-Wu Liu, Yi-An Chen:

Integrating Security Considerations in Client Server Architectures of Health Information Systems Development. 527-531 - Sung-Shiou Shen, Horng-Ru Liao, Shen-Ho Lin, Jung-Hui Chiu:

A Novel Stream Cipher with Hash Function for the RFID Device. 532-536 - Chu-Hsing Lin, Jung-Chun Liu, Guan-Han Chen, Ying-Hsuan Chen, Chien-Hua Huang:

Use Double Check Priority Queue to Alleviate Malicious Packet Flows from Distributed DoS Attacks. 537-542
System Security and Reliability (MCNCS 2011)
- I-Long Lin, Yun-Sheng Yen, Annie Chang:

A Study on Digital Forensics Standard Operation Procedure for Wireless Cybercrime. 543-548 - Chin-Tseng Huang, Hwa-Lu Jhi, Ru-Chi Ni:

A TOA Based Location Estimation Incorporating the Reliability Information. 549-554
Cloud Computing and Security (MCNCS 2011)
- Chin-Ling Chen, Yu-Fan Lin, Fang-Yie Leu:

An Improvement of Chen Et al.'s Scheme for Mobile Pay-TV. 555-560 - Chi-Fu Hung, Chiu-Ching Tuan, Yu-Chi Chu:

Constructing a Private Cloud for Government IT Services Consolidation: Taiwan's Experence. 561-566 - Shi-Huang Chen, Jun-Yu Chen, Kuo-Yuan Lu:

The Use of Cloud Speech Recognition Technology in Vehicle Diagnosis Applications. 567-570
Wireless Network and Communication (MCNCS 2011)
- Fang-Yie Leu, Kuo-Chi Liang:

A Location-Based Handoff Scheme Based on IEEE 802.21 in Heterogeneous Wireless Networks. 571-576 - Fang-Yie Leu, Keng-Yen Chao:

A Semi-preemptive Ad Hoc Computational Service System with Limited Resources. 577-582 - Li-Ling Hung, Sheng-Han Wu, Chao-Tsun Chang:

Maximizing Throughput for Delay-Constraint Transmissions with Smart Antenna Systems in WLANs. 583-588 - Fenq-Lin Jenq, Tang-Jen Liu, Fang-Yie Leu:

An AC LED Smart Lighting System with Visible Light Time-Division Multiplexing Free Space Optical Communication. 589-593
Security Systems and Algorithms (WAIS 2011)
- Tetsuya Izu, Masahiko Takenaka, Masaya Yasuda:

Time Estimation of Cheon's Algorithm over Elliptic Curves on Finite Fields with Characteristic 3. 594-596 - Yoshio Kakizaki

, Maeda Kazunari, Keiichi Iwamura:
Identity Continuance in Single Sign-On with Authentication Server Failure. 597-602 - Yasuyuki Nogami, Erika Yanagi, Taichi Sumo, Tomoko Matsushima, Satoshi Uehara:

A Multiplicative Extension for Discrete Logarithms on Ordinary Pairing-Friendly Curves of Embedding Degree. 603-606 - Jun Furukawa, Akihiro Sakai, Takashi Nishide, Yoshiaki Hori, Kouichi Sakurai:

Design and Implementation of a Forced Encryption Kernel Module. 607-611
Information Security (WAIS 2011)
- Maeda Kazunari, Yoshio Kakizaki

, Keiichi Iwamura:
Identifier Migration in OpenID. 612-617 - Yasuyuki Nogami, Yusuke Takai, Tomoko Matsushima, Satoshi Uehara:

Rho Method with Period k on Non - symmetric Ordinary Pairings of Embedding Degree k - Especially for Barreto - Naehrig Curves. 618-621 - Hiroaki Kikuchi, Yoshiki Aoki, Masayuki Terada

, Kazuhiko Ishii, Kimihiko Sekino:
Distributed Collaborative Filtering Protocol Based on Quasi-homomorphic Similarity. 622-627
Information Security (WAIS 2011)
- Masayuki Okada, Yasuharu Katsuno, Akira Kanaoka, Eiji Okamoto:

32-bit as Number Based IP Traceback. 628-633 - Yuji Suga:

Optimal Constructions of Visual Secret Sharing Schemes for the Graph Access Structure. 634-638 - Seiichiro Mizoguchi, Keisuke Takemori, Yutaka Miyake, Yoshiaki Hori, Kouichi Sakurai:

Traceback Framework against Botmaster by Sharing Network Communication Pattern Information. 639-644

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














