


default search action
NBiS 2020: Victoria, BC, Canada
- Leonard Barolli, Kin Fun Li, Tomoya Enokido, Makoto Takizawa:

Advances in Networked-Based Information Systems - The 23rd International Conference on Network-Based Information Systems, NBiS 2020, Victoria, BC, Canada, 31 August - 2 September 2020. Advances in Intelligent Systems and Computing 1264, Springer 2021, ISBN 978-3-030-57810-7 - Shih-Ting Chiu, Fang-Yie Leu:

Detecting DoS and DDoS Attacks by Using CuSum Algorithm in 5G Networks. 1-9 - Ermioni Qafzezi, Kevin Bylykbashi, Phudit Ampririt, Makoto Ikeda, Leonard Barolli, Makoto Takizawa:

A Fuzzy-Based System for Assessment of Available Edge Computing Resources in a Cloud-Fog-Edge SDN-VANETs Architecture. 10-19 - Maria Patrou, Kenneth B. Kent

, Dane Sheppard:
Optimization of JavaScript Large-Scale Urban Simulations. 20-31 - Admir Barolli

, Shinji Sakamoto, Phudit Ampririt, Seiji Ohara, Leonard Barolli, Makoto Takizawa:
Performance Evaluation of WMN-PSOSA-DGA Simulation System Considering Uniform and Chi-Square Client Distributions. 32-42 - Takumi Saito, Shigenari Nakamura

, Tomoya Enokido, Makoto Takizawa:
Topic-Based Processing Protocol in a Mobile Fog Computing Model. 43-53 - Tomoya Enokido, Makoto Takizawa:

The Energy-Efficient Object Replication Scheme by Omitting Meaningless Write Methods in Virtual Machine Environments. 54-63 - Wendy Osborn, Shahul Shaik:

Strategies for Alternate Group Trip Planning Queries in Location-Based Services. 64-76 - Tomoyuki Sueda, Naohiro Hayashibara:

A Cost Analysis of Routing Algorithms in Pedestrian-Based Delay Tolerant Networks. 77-88 - Lidia Ogiela, Makoto Takizawa, Urszula Ogiela:

Secure Cognitive Protocols for Data Fusion in Transformative Computing. 89-93 - Yinzhe Guo, Takumi Saito, Shigenari Nakamura

, Tomoya Enokido, Makoto Takizawa:
A Dynamic Network-Based Fog Computing Model for Energy-Efficient IoT. 94-104 - Davinder Kaur, Suleyman Uslu, Arjan Durresi:

Requirements for Trustworthy Artificial Intelligence - A Review. 105-115 - Kenshiro Mitsugi, Atushi Toyama, Keita Matsuo, Leonard Barolli:

Optimal Number of MOAP Robots for WMNs Using Elbow Theory. 116-126 - Narges Attarmoghaddam, Kin Fun Li:

An Area-Efficient FPGA Implementation of a Real-Time Binary Object Detection System. 127-139 - Kazuya Odagiri, Shogo Shimizu, Naohiro Ishii:

Consideration of the Cloud Type Virtual Policy Based Network Management Scheme for the Whole Internet. 140-150 - Toshihiko Yamakami, Shunsuke Kirino, Masaki Takahashi:

The Antikythera Framework: A Novel Design Approach for Accommodating a Large Number of Web Services. 151-162 - Mohamed K. Elhadad

, Kin Fun Li, Fayez Gebali:
An Ensemble Deep Learning Technique to Detect COVID-19 Misleading Information. 163-175 - Belkacem Chikhaoui, Jean Marie Tshimula, Shengrui Wang:

Community Mining and Cross-Community Discovery in Online Social Networks. 176-187 - Hiroki Matsumoto, Shusei Igaki, Hiroaki Kikuchi:

Address Usage Estimation Based on Bitcoin Traffic Behavior. 188-199 - Takamichi Saito, Satoshi Shibata, Tsubasa Kikuta:

Comparison of OAuth/OpenID Connect Security in America and Japan. 200-210 - Lihua Wang

, Tushar Kanti Saha
, Yoshinori Aono, Takeshi Koshiba
, Shiho Moriai:
Enhanced Secure Comparison Schemes Using Homomorphic Encryption. 211-224 - Tetsuya Hirakawa, Toyoo Takata:

The Trade-Off Between the False-Positive Ratio and the Attack Cost of Slow HTTP DoS. 225-237 - Glaucio H. S. Carvalho, Isaac Woungang, Alagan Anpalagan

, Issa Traoré, Leonard Barolli:
Malware Detection Using Machine Learning Models. 238-246 - Hsing-Chung Chen, Agung Mulyo Widodo

, Bambang Irawan
, Cahya Damarjati
, Aristophane Nshimiyimana:
A Performance Evaluating Simulation for PSO Algorithm by Applying Traceroute Feature. 247-260 - Souta Kawahara, Atsushi Kanai:

Considerations for Using DPDK in a Hypervisor Virtual Environment. 261-268 - Ajay D. Kshemkalyani

, Anshuman Misra:
The Bloom Clock to Characterize Causality in Distributed Systems. 269-279 - Yoshio Kakizaki

, Ryôichi Sasaki, Tomohide Okochi, Hiroshi Yasuda:
CySec: Cybersecurity Review Program for Professionals in Japan. 280-289 - Shigeaki Tanimoto, Yuzuka Sato, Prajak Chertchom, Hiroyuki Sato, Atsushi Kanai:

Proposal of a Perimeter Line Management Method for Fog and Edge Computing with SDP Concept. 290-302 - Yitao Yang, Yubao Wu, Xu An Wang

:
Trusted Records Scheme in Scene Investigation. 303-308 - Naomichi Noaki, Takumi Saito, Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa:

Energy-Efficient Migration of Virtual Machines. 309-319 - Nanami Kitahara, Shigenari Nakamura

, Takumi Saito, Tomoya Enokido, Makoto Takizawa:
An Opportunistic Communication Protocol to Reduce Energy Consumption of Nodes. 320-326 - Yusuke Gotoh, Kanto Nishino:

A Scheduling Method for Division-Based Broadcasting Considering Consumption Rate of Multiple Videos. 327-337 - Hideaki Moriyama, Toshihiro Yamauchi

, Masaya Sato, Hideo Taniguchi:
Improvement and Evaluation of a Function for Tracing the Diffusion of Classified Information on KVM. 338-349 - Tomoki Yoshihisa, Yusuke Gotoh, Akimitsu Kanzaki:

A Continuous Media Data Broadcasting Model for Orbiting Base Stations. 350-358 - Yusuke Gotoh, Manoka Yamashita, Koji Sakai

, Koji Masui:
A Method for Displaying Puncture Information in CT-Guided Puncture Assistance System. 359-368 - Noriyasu Yamamoto:

An Integrated Online Learning Approach Using a Smartphone-Based Active Learning System and a Web Video On-Demand System. 369-374 - Titipat Sukhvibul, Juggapong Natwichai:

Effects of Early Update Cost in Cloud Object Storage Scheduling. 375-381 - Ke Wang, Shuguang Liu, Xiaofeng Zhang:

Construction and Application of Online and Offline Mixed Teaching Mode Under the Background of "Internet + Education". 382-389 - Zhifeng Wang

, Chunyan Zeng
, Surong Duan, Hongjie Ouyang, Hongmin Xu:
Robust Speaker Recognition Based on Stacked Auto-encoders. 390-399 - Rattapol Pornprasit, Methasit Pengmatchaya, Waranya Mahanan, Paskorn Champrasert

, Juggapong Natwichai:
A Portal for Air Pollution Mitigation for Northern Thailand. 400-404 - Pree Thiengburanathum

:
A Comparison of Thai Sentence Boundary Detection Approaches Using Online Product Review Data. 405-412 - Tomoyuki Ishida, Kazuma Iwama:

Implementation of a Mixed Reality Space Interior Layout System by Gesture Operation. 413-421 - Yoshitaka Shibata, Akira Sakuraba, Yoshikazu Arai, Goshi Sato, Noriki Uchida:

Predicted Viewer System of Road State Based on Crowd IoT Sensing Toward Autonomous EV Driving. 422-431 - Tetsuro Ogi, Keita Enomoto, Shohei Akita, Toshifumi Miyahashi, Takehito Akima, Takumi Sano:

Construction of Information Presentation Environment Where Various Objects Talk Using Multiple IoT Speakers. 432-439 - Tomoyuki Ishida, Yuki Sanefuji:

Implementation of a Traditional Craft Presentation System Using Smart Glass and Augmented Reality. 440-449 - Akira Sakuraba, Goshi Sato, Noriki Uchida, Yoshitaka Shibata:

Field Experiment on Cognitive Wireless V2X Communication Over High-Speed WLAN. 450-460 - Donald Elmazi

, Miralda Cuka, Makoto Ikeda, Keita Matsuo, Leonard Barolli, Makoto Takizawa:
Application of Fuzzy Logic for Event Evaluation in WSANs. 461-469 - Natwadee Ruedeeniraman, Makoto Ikeda, Leonard Barolli:

Performance Evaluation of VegeCare Tool for Potato Disease Classification. 470-478 - Kiyotaka Fujisaki, Yuki Yoshigai:

Effect of Parasitic Coil on Communication Performance on Table Type 13.56 MHz RFID Reader. 479-487 - Hiroshi Maeda

, Naoki Higashinaka:
Wavelength Tuning of Output Optical Signal Through Resonant Filter for WDM System by Periodic Structure Composed of Silica Glass. 488-497 - Yi-Wei Chang, Yu-Kai Hsiao, Chien-Chuan Ko, Rong-Show Shen, Wei-Yang Lin, Keng-Pei Lin:

A Grading System of Pot-Phalaenopsis Orchid Using YOLO-V3 Deep Learning Model. 498-507 - Phudit Ampririt, Seiji Ohara, Makoto Ikeda, Keita Matsuo, Leonard Barolli, Makoto Takizawa:

Effect of Network Slice Duration for 5G Wireless Networks: A Fuzzy-Based Admission Control System Considering Software-Defined Network Approach. 508-517 - Yafei Zhou, Takahiro Uchiya, Ichi Takumi:

Proposal of Container Management Mechanism on Multi-agent Framework. 518-527 - Takahiro Uchiya, Ichi Takumi:

Development of Indoor Evacuation Training System Using VR HMD. 528-537 - Jun Iio, Shigenori Wakabayashi:

Dialogbook: Simple e-Portfolio System for International Communication Learning. 538-548 - Yasuhiro Ohtaki, Kenta Togashi:

A Practical Implementation of Searchable Encrypted Audit Logging System. 549-559 - Koki Maruyama, Yasuhiro Ohtaki, Michitoshi Niibori, Tatsuhiro Yonekura, Masaru Kamada:

Another HTML5 Implementation of Web-Com for Embedding Chalk Annotations and Talk Voices into HTML Documents. 560-566 - Masaki Kohana, Shinji Sakamoto, Shusuke Okamoto:

Recovering Lost Connection for Web Browser Network. 567-575 - Kohei Takahashi, Michitoshi Niibori, Masaru Kamada:

A Web-Based Attendance Management System with NFC Seat Identifiers. 576-581 - Shiori Kawakami, Shinji Sakamoto, Shusuke Okamoto:

Preliminary Experiment for Location Tracking from Camera Image Using CNN. 582-589 - Yoshihiro Kawano, Yuka Kawano:

A Proposal of Children Learning System to Promote Self-directed Choosing of Learning Tasks and Analysis of Learning Data in a Programming Classroom. 590-599 - Shusuke Okamoto, Shinji Sakamoto, Masaki Kohana:

An Environment for Computer Programming Classes Under COVID-19 Situation. 600-608

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














