


default search action
7. IMIS 2013: Taichung, Taiwan
- Leonard Barolli, Ilsun You, Fatos Xhafa, Fang-Yie Leu, Hsing-Chung Chen:

Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2013, Taichung, Taiwan, July 3-5, 2013. IEEE Computer Society 2013, ISBN 978-0-7695-4974-3
Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS 2013)
Session 1: 4G Networks and Mobility Management
- Chia-Hsuan Chang, Hsi-Lu Chao, Chia-Lung Liu, Kuei-Li Huang, Yi-Bing Lin:

A Local IP Access Mechanism for VoIP Service in LTE Home eNodeB Systems. 1-6 - Ben-Jye Chang, Ying-Hsin Liang, Kai-Xiang Cao:

Reward-Based Radio Interface Selection for Hybrid 4G UMTS and LTE Communications. 7-12 - Hassan Ali-Ahmad, Kashif Munir

, Xavier Lagrange, Meryem Ouzzif, Philippe Bertin:
Analysis of SIP-Based Location Updates in Distributed Mobility Management Schemes. 13-18 - Chai-Hien Gan, Yung-Chun Lin, Shun-Neng Yang, Yi-Bing Lin:

A Seamless Multi-link Switch Solution for LTE and Wi-Fi Integrated Networks. 19-23
Session 2: Mobile Network Algorithms and Applications
- Zhiwei Yan, Jong-Hyouk Lee, Ye Tian:

Localized Paging Scheme in PMIPv6. 24-28 - Seung Yoon Park, Jong Pil Jeong

:
On Pointer Forwarding Based Mobility Management for Cost-Optimized Proxy Mobile IPv6 Networks. 29-36 - Ying Rao, Huachun Zhou, Deyun Gao, Hongbin Luo, Ying Liu:

Proactive Caching for Enhancing User-Side Mobility Support in Named Data Networking. 37-42 - Shih-Hao Hung

, Yong-Wei Chen, Jeng-Peng Shieh:
Creating Pervasive, Dynamic, Scalable Android Applications. 43-50
Session 3: Wireless and Mobile Networks for UPC
- Mao Yang, Yong Li, Depeng Jin, Jian Yuan, Li Su, Lieguang Zeng:

Opportunistic Spectrum Sharing Based Resource Allocation for Wireless Virtualization. 51-58 - Yuxing Wu, Xingjun Zhang, Song Cen, Xiaoshe Dong

, Ilsun You:
A Novel Approach to Joint Source-Channel Coding for Scalable Video Transmission. 59-63 - Jianfeng Guan, Wei Quan, Changqiao Xu, Hongke Zhang:

The Stochastic Properties of Cognitive Networks under RD Mobility Model. 64-69 - Sung-Chiang Lin, Charlotte Wang

, Zhen Yu Wu, Yu-Fang Chung
:
Detect Rare Events via MICE Algorithm with Optimal Threshold. 70-75
Session 4: Internet Computing and Disaster Management
- Xin Zhao, Chunxiao Jiang, Yue Wang, Jian Yuan, Ilsun You:

Inter-cluster Topology Control: An Evolutionary Game Perspective. 76-82 - Fei Song, Yige Zhang, Zhaoxu An, Huachun Zhou, Hongke Zhang:

Connection Characteristics Analyses Based on Access Network Data. 83-87 - Goshi Sato, Noriki Uchida, Yoshitaka Shibata:

Implementation and Evaluation of Resilient Network Based on Cognitive Wireless Network Framework. 88-93 - Daniel Gutiérrez-Reina, Sergio L. Toral Marín, Jose Maria León-Coca, Federico Barrero

, Nik Bessis
, Eleana Asimakopoulou:
An Evolutionary Computational Approach for Optimizing Broadcasting in Disaster Response Scenarios. 94-100
Session 5: Algorithms and Systems for UPC
- Vincenzo Maniscalco, Silvana Greco Polito, Antonio Intagliata:

Tree-Based Genetic Algorithm with Binary Encoding for QoS Routing. 101-107 - Kazuyuki Ishii, Naoshi Sato:

GPS-Free Host Approaching in Mobile Ad-Hoc Networks. 108-115 - Kai Wang

, Huachun Zhou, Jia Chen, Yajuan Qin:
RDAI: Router-Based Data Aggregates Identification Mechanism for Named Data Networking. 116-121 - Xinyu Cong, Huiqun Yu, Xin Xu

:
Verification of Hybrid Chi Model for Cyber-physical Systems Using PHAVer. 122-128
Session 6: Secure Systems
- JongCheon Choi, Yongman Han, Seong-je Cho, Haeyoung Yoo, Jinwoon Woo, Minkyu Park, Youngsang Song, Lawrence Chung:

A Static Birthmark for MS Windows Applications Using Import Address Table. 129-134 - Wujian Ye, Kyungsan Cho:

Two-Step P2P Traffic Classification with Connection Heuristics. 135-141 - Byungha Choi, Sung-Kyo Choi, Kyungsan Cho:

Detection of Mobile Botnet Using VPN. 142-148 - Wen-Chung Kuo, Sheng-Yi Chang:

A GEMD Data Hiding by Pixel Segmentation Strategy. 149-152
Session 7: Security and Dependable Applications
- Yuexin Zhang, Li Xu, Xinyi Huang, Jie Li

:
Matrix-Based Pairwise Key Establishment with Pre and Post Deployment Knowledge for Wireless Mesh Networks. 153-158 - Chul Sur, Youngho Park, Sang-Uk Shin, Kyung Hyune Rhee, Changho Seo:

Certificate-Based Proxy Re-encryption for Public Cloud Storage. 159-166 - KiSeok Bae, Sang-Jae Moon, JaeCheol Ha:

Instruction Fault Attack on the Miller Algorithm in a Pairing-Based Cryptosystem. 167-174 - Zhen Yu Wu, Tzer-Long Chen, Sung-Chiang Lin, Charlotte Wang:

A Secure RFID Authentication Scheme for Medicine Applications. 175-181
Session 8: Trust and Privacy
- Lin Yao, Chi Lin, Jing Deng, Fangyu Deng, Jingwei Miao, Kangbin Yim, Guowei Wu:

Biometrics-based Data Link Layer Anonymous Authentication in VANETs. 182-187 - Mohammad A. Mikki, Yousif M. Mansour, Kangbin Yim:

Privacy Preserving Secure Communication Protocol for Vehicular Ad Hoc Networks. 188-195 - Yao Ma, Hongwei Lu, Zaobin Gan:

An Improved Direct Trust Evaluation Algorithm for the Context-Aware Trust Model. 196-201
Session 9: Intelligent Technologies and Applications
- Myunggwon Hwang, Taehong Kim, Jinhee Lee, Donald J. Kim, Do-Heon Jeong, Sa-Kwang Song, Hanmin Jung:

Collecting Korean-English Pairs for Translation of Technical Terms. 202-206 - Yanjie Sun, Dongwoon Jeon, Doo-Hyun Kim:

3-Axis Camera Motion Compensation Coupled with Target Tracking for Stabilized Video Capture from Small-Scale Flying Vehicle. 207-211 - Tyan Vladimir, Dongwoon Jeon, Doo-Hyun Kim:

Hough Transform with Kalman Filter on GPU for Real-Time Line Tracking. 212-216 - Dongjin Choi, Juhyun Shin

, Eunji Lee, Pankoo Kim:
A Method for Recommending the Most Appropriate Expansion of Acronyms Using Wikipedia. 217-220
Session 10: Ontology Applications
- Hyun Jung Lee, Mye M. Sohn:

Tag-Based Integrated Semantic Ontology Construction and Evolution. 221-227 - Seoung-Hun Park, Young-Guk Ha:

Visualization of Resource Description Framework Ontology Using Hadoop. 228-231 - Bumsuk Jang, Young-Guk Ha:

Transitivity Reasoning for RDF Ontology with Iterative MapReduce. 232-237
Session 11: Pervasive Systems and Intelligent Environments
- Mye M. Sohn, Sunghwan Jeong, Hyun Jung Lee:

Self-Evolved Ontology-Based Service Personalization Framework for Disabled Users in Smart Home Environment. 238-244 - Marek R. Ogiela, Lidia Ogiela:

Cognitive Information Systems in Ubiquitous Computing. 245-248 - Hae-Min Moon, Sung Bum Pan:

The LDA-Based Face Recognition at a Distance Using Multiple Distance Image. 249-255 - Yong-Hwan Lee, Dong-Seok Yang, Jong-Kook Lim, Yukyong Lee, Bonam Kim:

Improved Active Shape Model for Efficient Extraction of Facial Feature Points on Mobile Devices. 256-259
Session 12: Cloud Computing
- Shih-Hao Hung

, Fu-Tien Liang, Chia-Heng Tu, Norman Chang:
Performance and Power Estimation for Mobile-Cloud Applications on Virtualized Platforms. 260-267 - Xin Xu

, Huiqun Yu, Xinyu Cong:
A QoS-Constrained Resource Allocation Game in Federated Cloud. 268-275 - Xiaodong Liu, Weiqin Tong, Chao Shen:

QoS-Aware I/O Schedule for Virtual Machines in Cloud Computing Environment. 276-282 - Chao-Tung Yang

, Wei-Sheng Chen, Yi-Wei Su, Yao-Yu Yang, Jung-Chun Liu, Fang-Yie Leu, William C. Chu:
Implementation of a Virtual Switch Monitor System Using OpenFlow on Cloud. 283-290
Session 13: Distributed Systems
- Chen Li

, Linpeng Huang, Luxi Chen, Chengyuan Yu:
BGG: A Graph Grammar Approach for Software Architecture Verification and Reconfiguration. 291-298 - Weicheng Huai, Zhuzhong Qian, Xin Li, Sanglu Lu:

Towards Energy Efficient Data Centers: A DVFS-Based Request Scheduling Perspective. 299-306 - Xinhuai Tang, Feilong Tang, Liu Bing, Delai Chen:

Dynamic Web Service Composition Based on Service Integration and HTN Planning. 307-312 - Wei Huang, Xin Li, Zhuzhong Qian:

An Energy Efficient Virtual Machine Placement Algorithm with Balanced Resource Utilization. 313-319
The Third International Workshop on Advanced Communication Technologies and their Applications to Intelligent transportation Systems, Cognitive Radios and Sensor Networks (ACTICS-2013)
Session 1: Wireless and Mobile Networks
- Mo Haghighi, Dave Cliff

:
Multi-agent Support for Multiple Concurrent Applications and Dynamic Data-Gathering in Wireless Sensor Networks. 320-325 - Goshi Sato, Koji Hashimoto, Noriki Uchida, Yoshitaka Shibata:

Network Link Selection Method for Disaster Oriented Mobile Network Based on OpenFlow Framework. 326-330 - Kenta Ito, Kazuka Tsuda, Noriki Uchida, Yoshitaka Shibata:

Wireless Networked Omni-directional Video Distribution System Based on Delay Tolerant Network on Disaster Environment. 331-335 - Yuh-Shyan Chen

, Yun-Wei Lin, Chih-Hao Wang:
A Green Time-Bounded Routing Protocol in Solar-Based Vehicular Networks. 336-341
The Third International Workshop on Ad Hoc and Ubiquitous Computing (AHUC 2013)
Session 1: Ad Hoc and Sensor Networks
- Hung-Chin Jang

, Pei-Hsuan Lee:
Social Aware Assisted Transmission in MANET. 342-347 - Yung-Kuei Chiang, Neng-Chung Wang

, Chih-Hung Hsieh:
Cycle-Based Data Aggregation for Grid-Based Wireless Sensor Networks. 348-353 - Kuen-Han Li, Jenq-Shiou Leu, Jiri Hosek

:
Ant-Based On-Demand Clustering Routing Protocol for Mobile Ad-Hoc Networks. 354-359 - Young-Long Chen, Yu-Cheng Lin, Tzu-Chieh Sun:

A Prediction Scheme for Object Tracking in Grid Wireless Sensor Networks. 360-364
Session 2: Ubiquitous Computing
- Cheng-Hao Chu, Wan-Chuen Wu, Cheng-Chi Wang, Tzung-Shi Chen, Jen-Jee Chen:

Friend Recommendation for Location-Based Mobile Social Networks. 365-370 - Cheng Li, Zhangdui Zhong, Hao Wu, Lei Xiong:

A Modified Inhomogeneity Measure in Spatial Distribution. 371-374 - Wen-Ping Lai, Wei-Hao Fu:

Congestion Control of Wireless Video Using Dispersive Piecewise Mapping. 375-380 - Yangyang Gao, Fei Song, Yajuan Qin, Ilsun You:

On Performance Evaluation of Various Traffic Combination Based on Network Calculus. 381-386
Session 3: Vehicular and Delay Tolerant Networks
- Miao Hu, Zhangdui Zhong, Chih-Yung Chang:

A Multicast Scheduling Approach for Layered Video Service in Vehicular Ad Hoc Networks. 387-392 - Muchen Wu, Zhangdui Zhong, Hao Wu, Minming Ni:

Multi-hop Connected Probability Based on Dependence among Consecutive Links in VANETs. 393-398 - Jang-Ping Sheu, Chih-Yin Lee, Chuang Ma:

An Efficient Transmission Protocol Based on Network Coding in Delay Tolerant Networks. 399-404 - Jia Meng, Hao Wu, Hengliang Tang, Xingyu Qian:

An Adaptive Strategy for Location-Aided Routing Protocol in Vehicular Ad Hoc Networks. 405-410
The Second International Workshop on Extending Seamlessly to the Internet of Things (esIoT-2013)
Session 1: Performing the Internet of Things
- Pedro Martinez-Julia

, Elena Torroglosa-García, Jordi Ortiz Murillo, Antonio Fernandez Gómez-Skarmeta
:
Evaluating Video Streaming in Network Architectures for the Internet of Things. 411-415 - Edwin Cedeño Herrera, Tomás Robles, Ramón Alcarria

, Augusto Morales Dominguez:
On the Characterization of Collaborative Mobile Services for the Internet of Things. 416-420 - Pedro J. Fernández, Antonio J. Jara, Antonio Fernandez Gómez-Skarmeta:

Evaluation Framework for IEEE 802.15.4 and IEEE 802.11 for Smart Cities. 421-426 - Krishnan Srinivasarengan, Y. G. Goutam, M. Girish Chandra, Swanand Kadhe

:
A Framework for Non Intrusive Load Monitoring Using Bayesian Inference. 427-432
Session 2: IPv6 and Smart Cities
- Mohammadreza Sahebi Shahamabadi, Borhanuddin Bin Mohd Ali, Pooria Varahram

, Antonio J. Jara
:
A Network Mobility Solution Based on 6LoWPAN Hospital Wireless Sensor Network (NEMO-HWSN). 433-438 - Soledad Pellicer, Guadalupe Santa, Andrés L. Bleda, Rafael Maestre, Antonio J. Jara, Antonio Fernandez Gómez-Skarmeta:

A Global Perspective of Smart Cities: A Survey. 439-444 - Felix Jesús Villanueva

, María J. Santofimia, David Villa
, Jesús Barba, Juan Carlos López
:
Civitas: The Smart City Middleware, from Sensors to Big Data. 445-450
Session 3: Cloud of Things and Web of Things
- Diego Gachet Páez, Fernando Aparicio

, Manuel de Buenaga Rodríguez
, Margarita Rubio
:
Highly Personalized Health Services Using Cloud and Sensors. 451-455 - Giovanny Mauricio Tarazona Bermúdez, Jordán Pascual Espada

, Edward Rolando Núñez-Valdéz
:
Using Collaborative Virtual Objects Based on Services to Communicate Smart Objects. 456-461 - Salvatore Distefano

, Giovanni Merlino
, Antonio Puliafito:
Infrastructure Setup and Deployment in Sensing Cloud Environments. 462-467
Session 4: Identification Solutions and Security
- María Victoria Bueno Delgado

, Pablo Pavón-Mariño:
Using Non-uniform Probability Distribution p* to Improve Identification Performance in Dense RFID Reader Environments. 468-471 - Luís M. L. Oliveira

, Joel J. P. C. Rodrigues, Carlos Neto, Amaro F. de Sousa
:
Network Admission Control Solution for 6LoWPAN Networks. 472-477 - Jose I. San Jose

, Roberto Zangróniz Higuera
, Juan J. De Dios
, José Manuel Pastor
:
A Service-Oriented Auto Managed System for Transportation Applications. 478-482 - Sergio Gonzalez-Miranda, Ramón Alcarria

, Tomás Robles, Augusto Morales Dominguez
, Ignacio Gonzalez, Eloi Montcada:
Future Supermarket: Overcoming Food Awareness Challenges. 483-488
Session 5: Methods and Platforms for IoT
- Juan Lopez-de-Armentia

, Diego Casado Mansilla
, Diego López-de-Ipiña
:
Saving Energy through Collaborative Eco-aware Everyday Things. 489-493 - Diego Martín de Andrés

, Ramón Alcarria
, Tomás Robles, Augusto Morales Dominguez
:
A Systematic Approach for Service Prosumerization in IoT Scenarios. 494-499 - Roberto Girau

, Michele Nitti
, Luigi Atzori:
Implementation of an Experimental Platform for the Social Internet of Things. 500-505 - Yi-Zong Ou, C. M. Huang, C. T. Hu, Jane W.-S. Liu, Edward T.-H. Chu, Chi-Sheng Shih

:
An Asynchronous Message Delivery Service for iGaDs (Intelligent Guards Against Disasters). 506-511
Session 6: Internet of Things Applications
- Hongyang Zhang, Junqi Guo, Xiaobo Xie, Rongfang Bie, Yunchuan Sun:

Environmental Effect Removal Based Structural Health Monitoring in the Internet of Things. 512-517 - Andrés L. Bleda, Rafael Maestre, Guadalupe Santa, Soledad Pellicer, Antonio J. Jara, Antonio Fernandez Gómez-Skarmeta:

Evolution Towards Better AAL Environments. 518-523 - Ying Zheng, Xuejun Wang, Xiaojian Li, Caiyun Xi:

The Research on Construction of Assessment Instruments for Postgraduates Based on Competency Model. 524-529 - Sylvain Vittecoq:

A Radio Mesh Platform for the IOT. 530-534
Session 7: Industrial Track
- Ian Thomas, Sebastien Gaide, Matthieu Hug:

Composite Business Ecosystems for the Web of Everything: Using Cloud Platforms for Web Convergence. 535-540 - Pascal Thubert, Thomas Watteyne, Maria Rita Palattella

, Xavier Vilajosana
, Qin Wang:
IETF 6TSCH: Combining IPv6 Connectivity with Industrial Performance. 541-546 - Thomas Watteyne, Lance Doherty, Jonathan Simon, Kris Pister

:
Technical Overview of SmartMesh IP. 547-551 - Tomas Gea, Josep Paradells

, Mariano Lamarca, David Roldán:
Smart Cities as an Application of Internet of Things: Experiences and Lessons Learnt in Barcelona. 552-557
Third International Workshop on Frontiers in Innovative Mobile and Internet Services (FIMIS-2013)
Session 1: Innovative Internet Service and Technologies
- Kai-Di Chang, Chia-Yu Chang, Huei-Min Liao, Jiann-Liang Chen, Han-Chieh Chao

:
A Framework for IoT Objects Management Based on Future Internet IoT-IMS Communication Platform. 558-562 - Neng Zhang, Jianfeng Guan, Changqiao Xu, Hongke Zhang:

TSS: A Primary User Mobility Model in Cognitive Internet. 563-567 - Toshihiko Yamakami:

An Emotion-Object-Interaction Framework for Exploration of Design Patterns of Massive Interpersonal Persuasion. 568-572 - Samuel Idowu, Desta Haileselassie Hagos, Welderufael Berhane Tesfay, Abiola Famurewa, Juwel Rana, Kåre Synnes:

NexTrend: Context-Aware Music-Relay Corridors Using NFC Tags. 573-578
The Third International Workshop on Future Internet and Next Generation Networks (FINGNet-2013)
Session 1: Security Issues and New Applications
- Inshil Doh, Jiyoung Lim, Shi Li, Kijoon Chae:

Key Establishment and Management for Secure Cellular Machine-to-Machine Communication. 579-584 - Xingyu Qian, Hao Wu, Jia Meng:

A Dual-Antenna and Mobile Relay Station Based Handover in Distributed Antenna System for High-Speed Railway. 585-590 - Hyoungwoo Park, Il Yeon Yeo, Jongsuk Ruth Lee, Haengjin Jang:

Study on Big Data Center Traffic Management Based on the Separation of Large-Scale Data Stream. 591-594 - Hae-Duck Joshua Jeong, Sang-Kug Ye, Jiyoung Lim, Ilsun You, WooSeok Hyun, Hee-Kyoung Song:

A Remote Computer Control System Using Speech Recognition Technologies of Mobile Devices. 595-600
The Third International Workshop on Intelligent Techniques and Algorithms for Ubiquitous Computing (ITAUC-2013)
Session 1: Innovative Intelligent Algorithms and Network Security
- Neng-Yih Shih, Hsing-Chung Chen:

Multi-generating Procedure and Second Grey Relational Analysis. 601-604 - Mao-Cheng Wu, Wei-Fu Lu:

On Target Coverage Problem of Angle Rotatable Directional Sensor Networks. 605-610 - Hsing-Chung Chen, Chao-Ching Lee, Chuan-Hsien Mao, Chun-Cheng Pan:

Secure Multicast Key Protocol for E-Mail System Using Factorial Number Structure. 611-616
Session 2: Intelligent Techniques for Sensor Networks and Radio Networks
- Cheng-Chih Yang, Jyh-Horng Wen:

A Hybrid Local Virtual Force Algorithm for Sensing Deployment in Wireless Sensor Network. 617-621 - Young-Long Chen, Fu-Kai Cheung, Yung-Chi Chang:

A Low-Energy Adaptive Clustering Hierarchy Architecture with an Intersection-Based Coverage Algorithm in Wireless Sensor Networks. 622-625 - Jyu-Wei Wang, Ramzi Adriman

:
Analysis of Cognitive Radio Networks with Imperfect Sensing and Backup Channels. 626-631 - Shu-Hong Lee, Ho-Lung Hung:

Using Innovative Differential Evolution Algorithm for OFDM Reducing PAPR. 632-636
Session 3: Intelligent Techniques and Its Applications
- Yu-Chih Lin, Yu-Len Huang

, Dar-Ren Chen:
Breast Tumor Segmentation Based on Level-Set Method in 3D Sonography. 637-640 - Mu-Yen Chen

:
Context-Aware for Smartphone Sensing in Over-the-Counter Market: Ambient Intelligence in Mobile Stock Markets. 641-646 - Ching-Haur Chang, Shin-Da Lee

:
Denoise of ECG Based on Weighted Sum of Intrinsic Mode Functions. 647-649 - Yanzhe Du:

A Novel Algorithm Based on Improved BP Neural Network and Its Application in Color Management. 650-653
The Third International Workshop on Mobile Commerce, Cloud Computing, Network and Communication Security 2013 (MCNCS-2013)
Session 1: Security and Data Management
- Yi-Li Huang, Fang-Yie Leu, Jian-Hong Chen, William Cheng-Chung Chu, Chao-Tung Yang

:
A True Random-Number Encryption Method. 654-659 - Chin-Ling Chen, Wei-Chen Tsai:

Using a Stored-Value Card to Provide an Added-Value Service of Payment Protocol in VANET. 660-665 - Arcangelo Castiglione

, Ciriaco D'Ambrosio
, Alfredo De Santis
, Aniello Castiglione
, Francesco Palmieri
:
On Secure Data Management in Health-Care Environment. 666-671 - Raffaele Pizzolante, Bruno Carpentieri

, Aniello Castiglione
, Arcangelo Castiglione
, Francesco Palmieri
:
Text Compression and Encryption through Smart Devices for Mobile Communication. 672-677 - Ming-Chang Lee, Fang-Yie Leu, Ying-Ping Chen:

TSR: Topology Reduction from Tree to Star Data Grids. 678-683
Session 2: Health and Medical Care
- Jwu Rong Lin, Tso-Kwei Peng, Ching-Yu Chen, Li-Wei Wu, Ming Hsien Lu:

Medical Care Quality and Operating Performance of Taiwan's Psychiatric Hospitals - BNV-DEA and CND-DEA Applications. 684-689 - Wen-Dee Chiang, Min-Chung Hong, Wan-Teng Lin

:
Enhancing Lipolysis-Stimulating Activity of Potato Protein Hydrolysate Using Limited Enzymatic Hydrolysis and Ultrafiltration. 690-694 - Kuei-I Lee, Wen-Dee Chiang, Wan-Teng Lin:

Did the Older Adults' Physical Health Affect Their Behaviors of Eating Food Away from Home in Taiwan? 695-700 - Jei-Chen Hsieh, Chang-Chan Huang:

Performance Evaluation on Simplified Computer for the Elderly People. 701-705
2013 International Workshop for Practical Issues on Security in Public Internet Services (PISPIS 2013)
Session 1: Vulnerability Assessment on Public Internet Services
- Kyungroul Lee, Hyungjun Yeuk, Sungkwan Kim, Kangbin Yim:

Security Assessment on User Authentication by an HttpSendRequest Hooking in an HTTP Client. 706-708 - Kyungroul Lee, Youngjun Lee, Junyoung Park, Kangbin Yim, Ilsun You:

Security Issues on the CNG Cryptography Library (Cryptography API: Next Generation). 709-713 - Hoon Ko

:
Analysis on Smart Warning System for Home Network in Smart Grid. 714-718
Session 2: Perspective Security Techniques for Public Internet Services
- Tianhan Gao, Nan Guo, Kangbin Yim, Qingshan Li:

Anonymity Scheme with Unlinkability Property in Wireless Mesh Networks. 719-722 - JongCheon Choi, Yongman Han, Seong-je Cho, Haeyoung Yoo, Minkyu Park, Sangchul Han, Ilsun You, Inshik Song:

A Survey of Feature Extraction Techniques to Detect the Theft of Windows Applications. 723-728 - Aiman Abu Samra

, Osama A. Ghanem:
Analysis of Clustering Technique in Android Malware Detection. 729-733 - Yesol Kim, Jeongoh Moon, Dongjin Kim, Younsik Jeong, Seong-je Cho, Minkyu Park, Sangchul Han:

A Static Birthmark of Windows Binary Executables Based on Strings. 734-738
The Second International Workshop on Sustainability Management of e-Business and Ubiquitous Commerce Engineering (SMEUCE-2013)
Session 1: Sustainability Management of E-Business and Information Management I
- Hidekazu Sone:

Tradition and Innovation in Japanese Long-Established Companies: Focus on E-Business. 739-742 - Saburo Horimoto, Mohammad Ali Tareq

:
The Ex-ante and Ex-post Information of an Asset Return. 743-748 - Mei-Hua Liao, Li-Wen Chen:

SEO and Insider Trading. 749-752 - Mei-Hua Liao, Chia-Hung Kao, Chih-Hsin Muo:

Investor Sentiment and Acute Coronary Syndrome. 753-756 - Kewei Bi:

A Study on FDI Technological Spillover Effect in Central China. 757-762
Session 2: Sustainability Management of E-Business and Information Management II
- Mei-Hua Liao, Ya-Yun Chang:

House Pricing and Corporate Social Responsibility. 763-768 - Mei-Hua Liao, Yong-Chin Liu, Li-Ning Lai:

Institutional Stock Trading and Loan Renegotiation Information. 769-772 - Neng-Hui Wu, Bin-Tsann Yang, Ching-Hui Shih, Pei-Ching Lee:

Relationship Quality and Customer Loyalty in Taiwan - A Longitudinal Aspect. 773-775 - Wang Yongmao:

Currency Mismatch, Foreign Reserves and RMB Exchange Rate Evidence on 1986 - 2010 Data in China. 776-779
Session 3: Ubiquitous Commerce Engineering and Operation Management
- Ying-Li Lin, Ching-Wen Tung:

The Changing Pattern of Value Creating Activities: Evidence from Taiwanese Manufacturing Firms in China. 780-783 - Shyh-Weir Tzang, Kuei-Yuan Wang, Relia Novita Rahim:

Macroeconomic Condition and Capital Structure Adjustment Speed - Evidence from the Indonesian Stock Market. 784-789 - Mei Hua Huang, Perng-Fei Huang, Chao-Jung Wu:

The Impacts of Business Relational Characteristics on the Performance of Innovation Diffusion. 790-795 - Ya-Wen Yu, Yuchia Natalia:

The Effect of User Generated Video Reviews on Consumer Purchase Intention. 796-800 - Shao-Chun Chiu:

Identifying Sub-community of Finance Research. 801-804
Session 4: Ubiquitous Social Enterprise Governance of Information Management
- Dingrong Liu:

Research on Innovation of the Structure of Social Enterprise Governance - A Case Study on CAN YOU Group. 805-808 - Dai Changqiao:

The Obstacles of Constructing a Learning Government and Resolution. 809-813 - Ding-Rong Liu, Bingfeng Wang:

Benefits Sharing of University-Enterprise Innovation Platform. 814-816 - Deng Manyuan:

The Thoughts on Tax Policy for Promoting the Development of SMEs. 817-819
The Seventh International Workshop on Advances in Information Security (WAIS-2013)
Session 1: Security and Privacy
- Daisuke Miyamoto, Takeshi Takahashi

:
Toward Automated Reduction of Human Errors Based on Cognitive Analysis. 820-825 - Kazuyoshi Furukawa, Masahiko Takenaka, Tetsuya Izu:

Improving the Confidential Data Totalization. 826-830 - Hiroaki Kikuchi, Tomoki Sato, Jun Sakuma:

Privacy-Preserving Protocol for Epidemiology in Effect of Radiation. 831-836 - Yuji Suga:

New Constructions of (2, n)-Threshold Secret Sharing Schemes Using Exclusive-OR Operations. 837-842 - Satoshi Tanaka, Takanori Yasuda, Bo-Yin Yang, Chen-Mou Cheng, Kouichi Sakurai:

Efficient Computing over GF(2^16) Using Graphics Processing Unit. 843-846

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














