default search action
5. IMIS 2011: Seoul, Korea
- Ilsun You, Leonard Barolli, Feilong Tang, Fatos Xhafa:
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011, Seoul, Korea, June 30-July 02, 2011. IEEE Computer Society 2011, ISBN 978-0-7695-4372-7
Selected Area: Practical Security on Internet Services I
- Ching-Lung Chang, Han-Yu Tsai:
The Design of Video Door Phone and Control System for Home Secure Applications. 1-5 - Kyungroul Lee, Sitha Pho, Kangbin Yim:
Reversability Assessment on Secure USB Memories. 6-8 - Kyungroul Lee, Kangbin Yim:
Keyboard Security: A Technological Review. 9-15 - Mohammad A. Mikki, Kyungroul Lee, Wansoo Kim, Kangbin Yim:
Architecture to Support Heterogeneous Devices for Video Surveillance System. 16-19
Cloud Computing and Service Management I
- Shih-Hao Hung, Chi-Sheng Shih, Jeng-Peng Shieh, Chen-Pang Lee, Yi-Hsiang Huang:
An Online Migration Environment for Executing Mobile Applications on the Cloud. 20-27 - Ruiqing Chi, Zhuzhong Qian, Sanglu Lu:
A Heuristic Approach for Scalability of Multi-tiers Web Application in Clouds. 28-35 - Ji Ho Kim, Sang Min Lee, Dong Seong Kim, Jong Sou Park:
Performability Analysis of IaaS Cloud. 36-43 - Zia ur Rehman, Farookh Khadeer Hussain, Omar Khadeer Hussain:
Towards Multi-criteria Cloud Service Selection. 44-48
Internet, Wireless and Mobile Networks for UPC I
- Yuh-Shyan Chen, Chih-Shun Hsu, Wei-Han Yi:
An IP Passing Protocol for Vehicular Ad Hoc Networks with Network Fragmentations. 49-56 - Baokang Zhao, Ziming Song, Jinshu Su, Wei Peng, Qiaolin Hu:
NTC: Towards Efficient Network Coding in Delay Tolerant Networks. 57-64
Context and Location-Aware Computing
- Hoon Ko, Goreti Marreiros, Kyung-jin An, Zita A. Vale, Tai-Hoon Kim, Jong-Myoung Choi:
Contexts-Management Strategy in Considering the Security in Urban Computing Based on Urban Design. 65-72 - Yong-Hwan Lee, Bonam Kim, Heung-Jun Kim:
Efficient Object Localization for Query-by-Subregion. 73-77 - Jenq-Muh Hsu, Chao-Chun Chen, Chia Chi Li:
Short-Term Prediction-Based Optimistic Object Tracking Strategy in Wireless Sensor Networks. 78-85
Selected Area: Practical Security on Internet Services II
- Giseop No, Ilkyeun Ra:
Adaptive DDoS Detector Design Using Fast Entropy Computation Method. 86-93 - Venkatesh Kannan, Sahena Ahmed:
A Resource Perspective to Wireless Sensor Network Security. 94-99 - Ce Chen, Zhuzhong Qian, Ilsun You, Jue Hong, Sanglu Lu:
ACSP: A Novel Security Protocol against Counting Attack for UHF RFID Systems. 100-105
Cloud Computing and Service Management II
- Natalia Kryvinska, Christine Strauss, Peter Zinterhof:
"Variated Availability" Approach to the Services Manageable Delivering. 106-113 - Siqi Du, Linpeng Huang, Jun-Qing Chen:
A Formal Model for Dynamic Service Updates in Pervasive Computing. 114-119 - Lin Lou, Feilong Tang, Ilsun You, Minyi Guo, Yao Shen, Li Li:
An Effective Deadlock Prevention Mechanism for Distributed Transaction Management. 120-127
Internet, Wireless and Mobile Networks for UPC II
- Nicholas McLauchlan, Nik Bessis:
A Case for Real-World Smart Environments: The Development of a Remote Autonomous Energy Aware Monitoring System Using Next Generation Technologies. 128-135 - Markus Höckner, Rudolf Hartjes, Christine Strauss, Natalia Kryvinska:
"Memoxo" - Browser-Based Prototype for the Audio/Video Messages Recording. 136-142
Embedded Systems and Wearable Computers
- Bo Wang, Yongwei Wu, Weimin Zheng:
Task Optimization Based on CPU Pipeline Technique in Multicore System. 143-150 - Linyang Sheng, Jingbo Shao, Min Xu, Yuanquan Cui:
Display Verification IP Core Design Based on Star-Extraction and Star-Recognition Image Processing on FPGA. 151-155 - Peng Cao, Long Zheng, Yanchao Lu, Feilong Tang, Ilsun You, Minyi Guo:
Trying Linear Network Coding on a Network Flow Processor. 156-163 - Wei Chen, Weixia Xu, Zhiying Wang, Qiang Dou, Yongwen Wang, Baokang Zhao, Baosheng Wang:
A Formalization of an Emulation Based Co-designed Virtual Machine. 164-168
Selected Area: Practical Security on Internet Services III
- Marek R. Ogiela, Urszula Ogiela:
Secure Information Management Protocol Based on Linguistic Sharing Techniques. 169-174 - Ruoyu Zhang, Shiqiu Huang, Zhengwei Qi, Haibing Guan:
Combining Static and Dynamic Analysis to Discover Software Vulnerabilities. 175-181
Data Management in Pervasive Systems
- Lidia Ogiela, Marek R. Ogiela:
Semantic Analysis Processes in UBIAS Systems for Cognitive Data Interpretation. 182-185 - Myunggwon Hwang, Pankoo Kim, Dongjin Choi:
Information Retrieval Techniques to Grasp User Intention in Pervasive Computing Environment. 186-191 - Xiaopeng Yang, Hu Guan, Feilong Tang, Ilsun You, Minyi Guo, Yao Shen:
Improvements on Sequential Minimal Optimization Algorithm for Support Vector Machine Based on Semi-sparse Algorithm. 192-199
Security, Trust and Privacy
- Luis Gómez-Miralles, Joan Arnedo-Moreno:
Universal, Fast Method for iPad Forensics Imaging via USB Adapter. 200-207 - Gabriele Costa, Ilaria Matteucci:
Trust-Driven Policy Enforcement through Gate Automata. 208-215 - Je Hak Lee, Dong Seong Kim, Sang Min Lee, Jong Sou Park:
DDoS Attacks Detection Using GA Based Optimized Traffic Matrix. 216-220 - Rong-Jian Chen, Jui-Lin Lai, Shi-Jinn Horng:
Novel Multi-bit and Multi-image Steganography Using Adaptive Embedding Algorithms with Minimum Error. 221-228
Knowledge Cities and Disaster Recovery
- Eleana Asimakopoulou, Nik Bessis:
Buildings and Crowds: Forming Smart Cities for More Effective Disaster Management. 229-234 - Zemp Helena:
ICTs and Effective Communication Strategies: Specific Needs of Information before, during and after Disasters. 235-240
Modeling, Simulation and Performance in UPC
- Bart G. W. Craenen, Georgios K. Theodoropoulos:
Ubiquitous Computing and Distributed Agent-Based Simulation. 241-247 - Jingbo Sun, Yue Wang, Jian Yuan, Xiuming Shan:
A PCA-based Approach to Modeling Location Update and Paging for Location Area Planning. 248-252 - Shiwei Hu, Minyi Guo, Feilong Tang, Jingyu Zhou, Yao Shen:
Circuit Emulation Services over SCTP. 253-257
Cognitive Radio Systems, Sensors and Applications (ACTICS 2011)
- Subhasree Bhattacharjee, Amit Konar, Atulya K. Nagar:
Channel Allocation for a Single Cell Cognitive Radio Network Using Genetic Algorithm. 258-264 - Yuya Uesugi, Tasuku Yamamoto, Jun Sawamoto, Norihisa Segawa, Eiji Sugino, Takuto Goto, Hiroshi Yajima:
A Proposal of an Application of Life Log to Remote Consultation. 265-270
Protocols and Algorithms (ACTICS 2011)
- David Fotue, Foued Melakessou, Houda Labiod, Thomas Engel:
Effect of Sink Location on Aggregation Based on Degree of Connectivity for Wireless Sensor Networks. 271-276 - Bilal Abu Bakr, Leszek Lilien:
Extending Wireless Sensor Network Lifetime in the LEACH-SM Protocol by Spare Selection. 277-282
Ubiquitous and Cloud Computing (FIMIS 2011)
- Yishan Li, Yuhong Li, Tao Li:
A Game-Theoretic Resource Allocation Algorithm Based on Utility in IEEE 802.11e. 283-288 - Sok Chuob, Manish Pokharel, Jong Sou Park:
Modeling and Analysis of Cloud Computing Availability Based on Eucalyptus Platform for E-Government Data Center. 289-296 - Mye M. Sohn, Hyunwoo Kim, Hyun Jung Lee:
Personalized Information Recommendataion Using Hybrid CBR and CSP in a Ubiquitous Computing Environment. 297-303
Mobility Issues in Wireless Networks (FIMIS 2011)
- Yunjing Hou, Yuhong Li, Liang Yu:
A Novel Mobility Management Mechanism Based on Destination Address Overwritten and ID/Locator Separation. 304-309 - Antonio J. Jara, Leandro Marín, Antonio Fernandez Gómez-Skarmeta, Dhananjay Singh, Gohel Bakul, Daeyeoul Kim:
Secure Mobility Management Scheme for 6LoWPAN ID/Locator Split Architecture. 310-315
Architectures and Platforms (FINGNet 2011)
- Matthias Hirth, Tobias Hoßfeld, Phuoc Tran-Gia:
Cost-Optimal Validation Mechanisms and Cheat-Detection for Crowdsourcing Platforms. 316-321 - Matthias Hirth, Tobias Hoßfeld, Phuoc Tran-Gia:
Anatomy of a Crowdsourcing Platform - Using the Example of Microworkers.com. 322-329 - Michael Jarschel, Daniel Schlosser, Sven Scheuring, Tobias Hoßfeld:
An Evaluation of QoE in Cloud Gaming Based on Subjective Tests. 330-335 - Abbas Ali Siddiqui, M. Rahamatullah Khondoker, Bernd Reuther, Paul Müller, Christian Henke, Helge Backhaus:
Functional Composition and Its Challenges. 336-340
Security Issues and Mobile Internet Applications (FINGNet 2011)
- Jisun Kim, Jiyoung Lim, Kijoon Chae:
Secure Code Dissemination Using Energy-Efficient Minimal Virtual Backbone in Sensor Networks. 341-346 - Jong-Suk Ruth Lee, Hae-Duck Joshua Jeong, Donald C. McNickle, Krzysztof Pawlikowski:
Self-Similar Properties of Spam. 347-352 - Yu-xuan Hong, Krzysztof Pawlikowski, Harsha R. Sirisena:
DAD-Less MIPv6 for Reduced Handover Latency. 353-360 - Hong-Chang Lee, Bo-Hyeon Kim, Myung-Joon Lee:
CoLib: Client Library for Effective Development of WebDAV-based Collaborative Application. 361-365
Internet Security (IFSN 2011)
- Lei Wang, Shuhui Chen, Yong Tang, Jinshu Su:
Gregex: GPU Based High Speed Regular Expression Matching Engine. 366-370 - Jinjing Zhao, Yan Wen, Dongxia Wang:
A Network Security Evaluation Method Framework Based on Multiple Criteria Decision Making Theory. 371-375 - Xuewei Feng, Dongxia Wang, Shanwen Ke, Guoqing Ma, Jin Li:
A Framework of Network Security Situation Analysis Based on the Technologies of Event Correlation and Situation Assessment. 376-380
Wireless Networks (IFSN 2011)
- Qin Xin, Xiaolan Yao, Wei He:
Energy Optimal Selection of Access Points in Wireless Sensor Networks. 381-387 - Zhu Tang, Bo Liu, Baokang Zhao, Wanrong Yu, Chunqing Wu, Wei Peng, Bing Bai, Yanpeng Ma:
Building Practical Self Organization Networks on Heterogeneous Wireless Modems. 388-393
System Security (IFSN 2011)
- Bing Bai, Jinshu Su, Baokang Zhao, Wanrong Yu, Ling Wen:
Snail Crawling: An Enhanced Method for DTNs Routing. 394-397 - Jing Tao, Baosheng Wang:
Towards Practical IPSec over Challenged Networks. 398-402 - Yan Wen, Jinjing Zhao, Minhuan Huang, Hua Chen:
Aquarius: A Tiny Hypervisor to Introspect Commodity OSes in a Non-bypassable Way. 403-407
Wireless Networks (ITAUC 2011)
- Yung-Fa Huang, Hsing-Chung Chen, Li-Ming Wang, Jhao-Wei Guo:
Performance of Energy Efficient Relay and Minimum Distance Clustering for Wireless Sensor Networks. 408-413 - Chia-Hsin Cheng, Hsinying Liang, Yung-Fa Huang, Tian-Yue Wu:
Impact of Broadcasting Directions in SDLS for Wireless Sensor Networks. 414-419 - Hsing-Chung Chen, Kanoksak Wattanachote:
A Role-Oriented Routing Algorithm Applied for Wireless Heterogeneous Networks. 420-423 - Hsi-Chou Hsu, Jyh-Horng Wen, Chia-Hsin Cheng, Yi-Shiang Chen, Tian-Yue Wu:
TOA Estimation with DLC Receivers for IEEE 802.15.4a UWB Systems. 424-428
Intelligent Systems and Algorithms (ITAUC 2011)
- Hsing-Chung Chen, Yung-Fa Huang, Syuan-Zong Lin:
A Generalized Associated Temporal and Spatial Role-Based Access Control Model for Wireless Heterogeneous Networks. 429-433 - Chun-Wen Hung, Jhih-Han Chen, Hsuan T. Chang:
A Minimal Fuzzy Gain Scheduling Speed Controller and Torque Compensation for the Variable Sampling System of BLDC Motors. 434-437 - Kouhei Umezaki, Evjola Spaho, Yuichi Ogata, Hironori Ando, Leonard Barolli, Fatos Xhafa:
A Fuzzy-Based Reliability System for JXTA-Overlay P2P Platform. 438-443
Performance Modeling of Vehicular Mobility (MoMoPE 2011)
- Jingxin Wang, Jian Yuan, Xiuming Shan, Zhenming Feng, Junwei Geng, Ilsun You:
SaMob: A Social Attributes Based Mobility Model for Ad Hoc Networks. 444-449 - Wooseong Kim, Mario Gerla:
NAVOPT: Navigator Assisted Vehicular Route OPTimizer. 450-455 - Youngho Park, Kyung Hyune Rhee, Chul Sur:
A Secure and Location Assurance Protocol for Location-Aware Services in VANETs. 456-461
Performance Modeling of Mobility Protocols (MoMoPE 2011)
- Yujia Zhai, Yue Wang, Jian Yuan, Yong Ren, Xiuming Shan, Ilsun You:
Analysis of Optimal Query, Fairness and Replication for DHT-based Mobility Management. 462-469 - Hyung-Taig Lim, Younghyun Kim, Sangheon Pack, Chul-Hee Kang:
Joint Uplink/Downlink Connection Admission Control in WLAN/Cellular Integrated Systems. 470-474 - Hyon-Young Choi, Sung-Gi Min, Youn-Hee Han:
PMIPv6-based Flow Mobility Simulation in NS-3. 475-480 - Huachun Zhou, Fei Song, Hongke Zhang:
Mobility Management Research of Internet Based on the Splitting Mechanism. 481-486
Performance Modeling of Mobility Protocols (MoMoPE 2011)
- Sean Shen, Xiaodong Lee, Zhili Sun, Sheng Jiang:
Enhance IPv6 Dynamic Host Configuration with Cryptographically Generated Addresses. 487-490 - Antonio J. Jara, Leandro Marín, Antonio Fernandez Gómez-Skarmeta, Dhananjay Singh, Gohel Bakul, Daeyeoul Kim:
Mobility Modeling and Security Validation of a Mobility Management Scheme Based on ECC for IP-based Wireless Sensor Networks (6LoWPAN). 491-496 - Chun-Wei Tsai, Wei-Shuo Li, Min Chen, Wen-Shyong Hsieh, Chu-Sing Yang:
Analysis of Multi-path Random Key Pre-distribution for Wireless Sensor Networks. 497-502
Steganography and Signature (MCNCS 2011)
- Aniello Castiglione, Alfredo De Santis, Ugo Fiore, Francesco Palmieri:
E-mail-Based Covert Channels for Asynchronous Message Steganography. 503-508 - Fuw-Yi Yang, Ling-Ren Liang, Su-Hui Chiu:
Improvement of Strong Designated Verifier Signatures. 509-513 - Chih-Hung Wang, Chao Chuan Chen:
Identity-Based Concurrent Signature Scheme with Improved Accountability. 514-519
Network and System Security (MCNCS 2011)
- Aniello Castiglione, Giuseppe Cattaneo, Giancarlo De Maio, Fabio Petagna:
SECR3T: Secure End-to-End Communication over 3G Telecommunication Networks. 520-526 - Chih-Cheng Lien, Chang-Wu Liu, Yi-An Chen:
Integrating Security Considerations in Client Server Architectures of Health Information Systems Development. 527-531 - Sung-Shiou Shen, Horng-Ru Liao, Shen-Ho Lin, Jung-Hui Chiu:
A Novel Stream Cipher with Hash Function for the RFID Device. 532-536 - Chu-Hsing Lin, Jung-Chun Liu, Guan-Han Chen, Ying-Hsuan Chen, Chien-Hua Huang:
Use Double Check Priority Queue to Alleviate Malicious Packet Flows from Distributed DoS Attacks. 537-542
System Security and Reliability (MCNCS 2011)
- I-Long Lin, Yun-Sheng Yen, Annie Chang:
A Study on Digital Forensics Standard Operation Procedure for Wireless Cybercrime. 543-548 - Chin-Tseng Huang, Hwa-Lu Jhi, Ru-Chi Ni:
A TOA Based Location Estimation Incorporating the Reliability Information. 549-554
Cloud Computing and Security (MCNCS 2011)
- Chin-Ling Chen, Yu-Fan Lin, Fang-Yie Leu:
An Improvement of Chen Et al.'s Scheme for Mobile Pay-TV. 555-560 - Chi-Fu Hung, Chiu-Ching Tuan, Yu-Chi Chu:
Constructing a Private Cloud for Government IT Services Consolidation: Taiwan's Experence. 561-566 - Shi-Huang Chen, Jun-Yu Chen, Kuo-Yuan Lu:
The Use of Cloud Speech Recognition Technology in Vehicle Diagnosis Applications. 567-570
Wireless Network and Communication (MCNCS 2011)
- Fang-Yie Leu, Kuo-Chi Liang:
A Location-Based Handoff Scheme Based on IEEE 802.21 in Heterogeneous Wireless Networks. 571-576 - Fang-Yie Leu, Keng-Yen Chao:
A Semi-preemptive Ad Hoc Computational Service System with Limited Resources. 577-582 - Li-Ling Hung, Sheng-Han Wu, Chao-Tsun Chang:
Maximizing Throughput for Delay-Constraint Transmissions with Smart Antenna Systems in WLANs. 583-588 - Fenq-Lin Jenq, Tang-Jen Liu, Fang-Yie Leu:
An AC LED Smart Lighting System with Visible Light Time-Division Multiplexing Free Space Optical Communication. 589-593
Security Systems and Algorithms (WAIS 2011)
- Tetsuya Izu, Masahiko Takenaka, Masaya Yasuda:
Time Estimation of Cheon's Algorithm over Elliptic Curves on Finite Fields with Characteristic 3. 594-596 - Yoshio Kakizaki, Maeda Kazunari, Keiichi Iwamura:
Identity Continuance in Single Sign-On with Authentication Server Failure. 597-602 - Yasuyuki Nogami, Erika Yanagi, Taichi Sumo, Tomoko Matsushima, Satoshi Uehara:
A Multiplicative Extension for Discrete Logarithms on Ordinary Pairing-Friendly Curves of Embedding Degree. 603-606 - Jun Furukawa, Akihiro Sakai, Takashi Nishide, Yoshiaki Hori, Kouichi Sakurai:
Design and Implementation of a Forced Encryption Kernel Module. 607-611
Information Security (WAIS 2011)
- Maeda Kazunari, Yoshio Kakizaki, Keiichi Iwamura:
Identifier Migration in OpenID. 612-617 - Yasuyuki Nogami, Yusuke Takai, Tomoko Matsushima, Satoshi Uehara:
Rho Method with Period k on Non - symmetric Ordinary Pairings of Embedding Degree k - Especially for Barreto - Naehrig Curves. 618-621 - Hiroaki Kikuchi, Yoshiki Aoki, Masayuki Terada, Kazuhiko Ishii, Kimihiko Sekino:
Distributed Collaborative Filtering Protocol Based on Quasi-homomorphic Similarity. 622-627
Information Security (WAIS 2011)
- Masayuki Okada, Yasuharu Katsuno, Akira Kanaoka, Eiji Okamoto:
32-bit as Number Based IP Traceback. 628-633 - Yuji Suga:
Optimal Constructions of Visual Secret Sharing Schemes for the Graph Access Structure. 634-638 - Seiichiro Mizoguchi, Keisuke Takemori, Yutaka Miyake, Yoshiaki Hori, Kouichi Sakurai:
Traceback Framework against Botmaster by Sharing Network Communication Pattern Information. 639-644
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.