


default search action
INCoS 2016: Ostrawva, Czech Republic
- Fatos Xhafa, Leonard Barolli, Václav Snásel, Ivan Zelinka:

2016 International Conference on Intelligent Networking and Collaborative Systems, INCoS 2016, Ostrawva, Czech Republic, September 7-9, 2016. IEEE 2016, ISBN 978-1-5090-4124-4
Eighth IEEE International Conference on Intelligent Networking and Collaborative Systems (INCoS-2016)
Session 1: Intelligent Networking and Collaborative Systems
- Akihiro Fujihara:

Estimating Proper Communication Distance for Epidemic Routing in Japanese Urban Areas Using SNS-Based People Flow Data. 1-8 - Tatyana Golubeva

, Sergey Konshin:
The Research of Possibility of Sharing Use of Wireless and Mobile Technologies for Organizing the Radio Channels of Operation Control System of Earthmoving and Construction Machines. 9-14 - Martina Drahosová

, Peter Balco
:
The Benefits and Risks of Enterprise Social Networks. 15-19 - Ahmad Raza Hameed, Nadeem Javaid

, Saif ul Islam
, Ghufran Ahmed
, Umar Qasim, Zahoor Ali Khan
:
BEEC: Balanced Energy Efficient Circular Routing Protocol for Underwater Wireless Sensor Networks. 20-26 - Jianshe Kang, Kun Wu, Kuo Chi, Yinxia Du:

Multi-class Intelligent Fault Diagnosis Approach Based on Modified Relevance Vector Machine. 27-30 - Zhenhua Li, Dong-Li Duan

:
Node Importance of Complex Networks Based on Cascading Failure Dynamic. 31-35
Session 2: Cloud Computing for Secure Data and Management Systems
- Viliam Malcher:

Design Patterns in Management Systems. 36-39 - Marek R. Ogiela, Lidia Ogiela:

Data Understanding Techniques for Management Application and Cryptography. 40-43 - Xu An Wang

, Fatos Xhafa, Zhiheng Zheng, Jinting Nie:
Identity Based Proxy Re-Encryption Scheme (IBPRE+) for Secure Cloud Data Sharing. 44-48 - Ziyun Deng, Jing Zhang:

A Cloud Platform for CAE Simulation in Supercomputing Enviroment. 49-52 - Ye Ding, He Xu, Peng Li, Jie Ding:

Review of Virtual Memory Optimization in Cloud Environment. 53-58 - Lei Chen, Jing Zhang, Lijun Cai, Ziyun Deng, Tinqing He, Xu An Wang

:
Locality-Aware and Energy-Aware Job Pre-Assignment for Mapreduce. 59-65
Session 3: Intelligent Systems for Collaborative Robotics and Sensing
- Peter Beno, Vladimir Pavelka, Frantisek Duchon, Martin Dekan

:
Using Octree Maps and RGBD Cameras to Perform Mapping and A* Navigation. 66-72 - Ján Vascák, Jakub Hvizdo, Michal Puheim:

Agent-Based Cloud Computing Systems for Traffic Management. 73-79 - Denis Vere, Rudolf Jaka, Jakub Hvizdo:

Neural Network Based Ball Tracking for Robot Nao. 80-85 - Adam Viktorin

, Michal Pluhacek
, Roman Senkerik
:
Network Based Linear Population Size Reduction in SHADE. 86-93 - Kun Wu, Jianshe Kang, Xu An Wang

:
Research on Failure Prognostics Method of Electronic System Based on Improved Fruit Fly Algorithm and Grey Fast Relevance Vector Machine. 94-98 - Yan-Hua Liang, Wei-Min Tian:

Multi-sensor Fusion Approach for Fire Alarm Using BP Neural Network. 99-102
Session 4: Semantics, Social Networking and Collaborative Systems
- Giuseppe Fenza, Vincenzo Loia, Francesco Orciuoli

:
Providing Smart Objects with Intelligent Tutoring Capabilities by Semantic Technologies. 103-109 - Fatos Xhafa, Adriana Bogza, Santi Caballé

, Leonard Barolli:
Apache Mahout's k-Means vs Fuzzy k-Means Performance Evaluation. 110-116 - Kahina Rabahallah, Faiçal Azouaou

, Mohamed Tayeb Laskri:
Ontology-Based Approach for Semantic Description and the Discovery of e-Learning Web Services. 117-124 - Yutao Wu, Xisheng Jia, Liang Wen, Xu An Wang

:
An Optimization Research on the Alternate Interval for Electronic Products. 125-129 - Feng Ye, Shengyan Wu, Qian Huang

, Xu An Wang
:
The Research of Enhancing the Dependability of Cloud Services Using Self-Healing Mechanism. 130-134 - Tao Meng, Lijun Cai, Tinqinq He, Lei Chen, Ziyun Deng:

An Improved Community Detection Algorithm Based on the Distance Dynamics. 135-142
Session 5: Wireless, Mobile and Cognitive Networking Systems
- Yoshifumi Kamada, Tsuyoshi Yamasaki, Yuki Tsuno, Nobuyuki Tsuchimura, Hiroyoshi Miwa:

Traffic Control Method for Interactive Projection Mapping Control System. 143-149 - Jésica de Armas, Pere Tuset, Tengfei Chang, Ferran Adelantado

, Thomas Watteyne, Xavier Vilajosana
:
Determinism through Path Diversity: Why Packet Replication Makes Sense. 150-154 - Tomasz Hachaj

:
Creating Dynamically Changing World Map for Computer Games with Advanced Image Processing - A Use Case. 155-160 - Lijie Wang, Yi Tang, Bo Yuan, Dangfeng Zhu:

A Stackelberg Game for DSTC-Based Cognitive Radio Networks with Multiple Cooperative Relays. 161-166 - Wang Li:

An Identity-Based Proxy Signature Scheme from Lattices in the Standard Model. 167-172 - Babar Ali

, Nadeem Javaid
, Saif ul Islam
, Ghufran Ahmed
, Umar Qasim, Zahoor Ali Khan
:
RSM and VSM: Two New Routing Protocols for Underwater WSNs. 173-179
Session 6: Hidden Complex Networks
- Michal Pluhacek

, Roman Senkerik
, Adam Viktorin
, Ivan Zelinka
:
Creating Complex Networks Using Multi-swarm PSO. 180-185 - Roman Senkerik

, Adam Viktorin
, Michal Pluhacek
:
On the Transforming of the Indices Selection Mechanism inside Differential Evolution into Complex Network. 186-192 - Ivan Zelinka

, Lukas Tomaszek
, Lumír Kojecký
:
On Evolutionary Dynamics Modeled by Ant Algorithm. 193-198 - Licheng Wang, Jing Li, Jianhua Yan, Zhiguo Qu:

An Efficient Proxy Re-Encryption Based on (Semi) Group Factorization Problems. 199-202 - Lu Cheng, Peng Xu, Yuechuan Wei:

New Related-Key Impossible Differential Attack on MIBS-80. 203-206 - Michal Vasinek

, Jan Platos, Václav Snásel:
Limitations on Low Variance k-Fold Cross Validation in Learning Set of Rules Inducers. 207-214
Session 7: Nature's Inspired Computing and Optimization
- Pavel Krömer

, Jaromir Konecny
, Michal Prauzek
:
Point-Based Scan Matching by Differential Evolution. 215-221 - Javier Arellano-Verdejo

, Enrique Alba:
Optimal Allocation of Public Parking Slots Using Evolutionary Algorithms. 222-228 - Dimitris Souravlias, Gabriel Luque, Enrique Alba, Konstantinos E. Parsopoulos:

Smart Traffic Lights: A First Parallel Computing Approach. 229-236 - Wenbin Cao, Qiwei Hu, Wenyuan Song, Yutao Wu:

Mission-Oriented Maintenance Optimization Subject to Resources Constraints. 237-243 - Muhammad Hassan Rahim, Nadeem Javaid

, Muhammad Bilal Janjua, Muhammad Naeem, Zahoor Ali Khan
, Umar Qasim:
Comparative Assessment of Performance for Home Energy Management Controller in Smart Grid. 244-250 - Yun-Yuan Dong:

The Features of Low-Connectivity Essential Proteins. 251-254
Session 8: Machine Learning and Mining
- Alexander Amigud

, Joan Arnedo-Moreno, Thanasis Daradoumis
, Ana-Elena Guerrero-Roldán
:
A Behavioral Biometrics Based and Machine Learning Aided Framework for Academic Integrity in E-Assessment. 255-262 - Tomasz Hachaj

:
How to Solve Common Human Actions Recognition Use Cases with Gesture Description Language. 263-269 - Lidia Ogiela, Marek R. Ogiela:

Knowledge Management Approaches for Data Understanding. 270-273 - Xuan Guo, Yixiao Sun, Zhiting Xiao, Wenhui Wu:

Using Exploratory Analysis Modeling to Study the Correlation between EEG Signal and Respiratory Rhythm. 274-279 - Qian Xu, Jie Deng:

Identity Authentication System Based on Fingerprint Identification and Pulse Certification. 280-284 - Yuechuan Wei, Yisheng Rong, Xu An Wang

:
New Differential Fault Attack on Lightweight Cipher LBlock. 285-288
Session 9: Intelligent Algorithms for Scheduling, Resource Management and Image Processing
- Wu Meng, Gao Yang, Guan Bin, Li Kui:

Wide Image Geometric Mosaic and Measure Algorithm of Mobile Mapping System. 289-293 - Chun He:

Research of Web Resources Protection Based on Digital Watermarking and Digital Signature. 294-297 - Feng Ye, Shengyan Wu, Qian Huang

, Xu An Wang
:
A Novel QoS-Aware Load Balancing Mechanism in Cloud Environment. 298-301 - Yang Liu, Yubo Yang, Jing Wang:

Binocular Stereo Vision Based Face Recognition Using Sparse Representation. 302-306 - Jing Zhang, Juan Li:

Retail Commodity Sale Forecast Model Based on Data Mining. 307-310
Session 10: Secure Intelligent Collaborative Systems
- Jing Li, Licheng Wang, Xinxin Niu:

A Star-Topological Privacy Encryption for Telecare Medical Information Systems. 311-317 - Miao Zhang, Yang Liu, Jiteng Wang, Yangyu Hu:

A New Approach to Security Analysis of Wireless Sensor Networks for Smart Home Systems. 318-323 - Yang Su, Yuechuan Wei, Mingshu Zhang:

Research and Design of Dedicated Instruction for Reconfigurable Matrix Multiplication of VLIW Processor. 324-327 - Xu An Wang

, Fatos Xhafa, Wei Hao, Wei He:
Non-transferable Unidirectional Proxy Re-Encryption Scheme for Secure Social Cloud Storage Sharing. 328-331 - Mudassir Ejaz, Anwar Khan, Muhammad, Umar Qasim, Zahoor Ali Khan

, Nadeem Javaid
:
Position Aware Mobility Pattern of AUVs for Avoiding Void Zone in Underwater WSNs. 332-338
Sixth International Workshop on Adaptive Learning via Interactive, Collaborative and Emotional approaches (ALICE-2016)
Session 1: Formative Assessment and Learners' Profiling
- David Bañeres

:
Towards a Personalized Summative Model Based on Learner's Preferences. 339-344 - Isabel Guitart, Jordi Conesa

, Jordi Casas-Roma:
A Preliminary Study about the Analytic Maturity of Educational Organizations. 345-350 - David Bañeres

, Jordi Conesa
:
eOrient@ - A Recommender System to Address Life-Long Learning and Promote Employability. 351-356
Session 2: Interactive Learning Systems and Analytics
- Daniele Toti

, Marco Rinelli:
On the Road to Speed-Reading and Fast Learning with CONCEPTUM. 357-361 - David Gañán, Santi Caballé

, Robert Clarisó
, Jordi Conesa
:
A Prototype of an eLearning Platform in Support for Learning Analytics and Gamification. 362-369 - Giuliana Dettori:

Learning through the Design of Interactive Storie: Exploring the Concept of Storyworld. 370-374
International Workshop on Evolution of Social Networks (ESN 2016)
Session 1: Evolution of Social Networks
- Milos Kudelka, Jan Platos, Pavel Krömer

:
Author Evaluation Based on H-Index and Citation Response. 375-379 - Jialin Ma, Yongjun Zhang, Jinling Liu, Kun Yu, Xu An Wang

:
Intelligent SMS Spam Filtering Using Topic Model. 380-383 - Jianghao Jin, Xie Zhou, Chuangui Ma, Xu An Wang

:
A Rational Secret Sharing Relying on Reputation. 384-387 - Haibin Yang, Ling Zhang:

A Secure Private Information Retrieval in Cloud Environment. 388-391
Frontiers in Intelligent Networking and Collaborative Systems (FINCoS-2016)
Session 1: Frontiers in Intelligent Networking Systems and Application
- Haiming Cheng, Ling Huang, He Xu, Yifan Hu, Xu An Wang

:
Design and Implementation of Library Books Search and Management System Using RFID Technology. 392-397 - Jiewei Qian, He Xu, Peng Li:

A Novel Secure Architecture for the Internet of Things. 398-401 - Jianshe Kang, Kun Wu, Kuo Chi, Xu An Wang

:
A Novel Multi-class Classification Approach Based on Fruit Fly Optimization Algorithm and Relevance Vector Machine. 402-406 - Yan-Hua Liang, Ze-Dong Qian:

A Calibration Approach for Accuracy Infrared Temperature. 407-410 - Kuo Chi, Jianshe Kang, Kun Wu, Xu An Wang

:
Bayesian Parameter Estimation of Weibull Mixtures Using Cuckoo Search. 411-414 - Zuzana Sutova, Robert Vrabel

:
Numerical Investigation of Initial Condition and Singular Perturbation Parameter Value Influence on the Dynamical System Oscillatory Behaviour. 415-419
2016 International Workshop on Intelligent Applications for Business Productivity (IABP 2016)
Session 1: Intelligent Applications for Business Productivity
- Hongxia Li, Kai Yan:

The Research of the University Public Opinion Management on Internet. 420-422 - Liying Chen, Feng Wang, Yutao Wu:

Research on Selecting Emergency Material Production Enterprises Based on Productivity Reserve. 423-427 - Seyed Mohammad Khalili

, Mahla Babagolzadeh, Maziar Yazdani
, Morteza Saberi
, Elizabeth Chang
:
A Bi-objective Model for Relief Supply Location in Post-Disaster Management. 428-434 - Ben Cheng, Shan Hu, Jiang-Wei Wang, Yun-Yuan Dong:

A Goal Programming Approach for Group Decision Making with Four Incomplete Preference Relations. 435-438
Eighth International Workshop on Information Network Design (WIND 2016)
Session 1: Network Design, Management and Performance
- Daishi Irie, Hiroyoshi Miwa:

Network Design Method by Finding Server Placement and Protected Links to Keep Connectivity to Servers Against Link Failures. 439-444 - Tsuyoshi Yamasaki, Makoto Anan, Hiroyoshi Miwa:

Network Design Method Based on Link Protection Taking Account of the Connectivity and Distance Between Sites. 445-450 - Satoshi Furutani, Chisa Takano, Masaki Aida:

Proposal of the Network Resonance Method for Estimating Eigenvalues of the Scaled Laplacian Matrix. 451-456 - Nguyen Viet Ha

, Kazumi Kumazoe, Masato Tsuru:
Making TCP/NC Adjustable to Time Varying Loss Rates. 457-462 - Mario Koeppen, Kaori Yoshida:

The Price of Unfairness. 463-468
Second Workshop on Security and Privacy in Systems and Communication Networks (SecureSysComm 2016)
Session 1: Security and Privacy in Systems and Communication Networks
- Alessandra De Benedictis

, Valentina Casola
, Massimiliano Rak
, Umberto Villano:
Cloud Security: From Per-Provider to Per-Service Security SLAs. 469-474 - Xuguang Wu, Minqing Zhang, Shuaishuai Zhu:

Certificateless Multi-signcryption Scheme in Standard Model. 475-479 - Ferdinando Campanile, Gianfranco Cerullo, Salvatore D'Antonio, Giovanni Mazzeo

, Gaetano Papale, Luigi Sgaglione:
A Multi-sensor Data Fusion Approach for Detecting Direct Debit Frauds. 480-485 - Abir Awad, Sara Kadry, Guraraj Maddodi, Saul Gill, Brian Lee

:
Data Leakage Detection Using System Call Provenance. 486-491 - Yukun Dong, Yalan Wang:

Fully Detection of Illegal Value Use Defects. 492-497 - Yang Lei, Xu An Wang

, Hongyan Yin:
Intrusion Detection Techniques Based on Cutting-Based Real-Valued Negative Selection. 498-503
Second International Workshop for Collaborative e-Business Systems (IWCBS-2016)
Session 1: Collaborative e-Business Systems
- Jialin Ma, Yongjun Zhang:

Using Topic Model for Intelligent Computer-Aided Diagnosis in Traditional Chinese Medicine. 504-507 - Hongxia Li, Hongxi Di:

Research on the Job Stress Structure of Coal Miners Based on Textual Analysis. 508-511 - Weiwei Kong, Yang Lei, Jing Ma:

Data Security and Privacy Information Challenges in Cloud Computing. 512-514 - Hongxia Zhu, Xiuhua Lu:

The Prediction of PM2.5 Value Based on ARMA and Improved BP Neural Network Model. 515-517 - Yang Lei, Jia Liu, Hongyan Yin:

Intrusion Detection Techniques Based on Improved Intuitionistic Fuzzy Neural Networks. 518-521
Session 2: Intelligent Secure Collaborative e-Business Systems
- Wenbin Cao, Wenyuan Song, Qiwei Hu, Yinxia Du:

An Exact Method for Solving Selective Maintenance Problems Considering Imperfect Maintenance. 522-526 - Tanping Zhou, Xiaoyuan Yang, Xu An Wang

, Yiliang Han:
Some Practical Properties of AP14. 527-531 - Jie Li, Hong Zhang:

Damage Effectiveness Evaluation on the Time Sensitive Group Targets for Trajectory Correction Missile Carrying with Terminal-Sensitive Projectiles. 532-537 - Yan-Fei Zhang, Jun-Yan Wu, Jie Li, Wan-Yi Liu:

A Review of the Research Literature on Civil-Military Integration Equipment Support Reform in the United States and Its Enlightenment. 538-543 - Jie Luo, Weiwei Kong:

The Infrared and Visible Light Image Fusion Based on the Non-subsample Shearlet Transform and Heat Source Concentration Ratio. 544-547 - Morteza Saberi

, Anne Karduck, Omar Khadeer Hussain
, Elizabeth Chang
:
Challenges in Efficient Customer Recognition in Contact Centre: State-of-the-Art Survey by Focusing on Big Data Techniques Applicability. 548-554

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














