default search action
11. IMIS 2017: Torino, Italy
- Leonard Barolli, Tomoya Enokido:
Innovative Mobile and Internet Services in Ubiquitous Computing - Proceedings of the 11th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2017), Torino, Italy, 10-12 July 2017. Advances in Intelligent Systems and Computing 612, Springer 2018, ISBN 978-3-319-61541-7
The 11th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2017)
- Simone Scannapieco, Claudio Tomazzoli:
Ubiquitous and Pervasive Computing for Real-Time Energy Management and Saving - A System Architecture. 3-15 - Shinji Sakamoto, Kosuke Ozera, Tetsuya Oda, Makoto Ikeda, Leonard Barolli:
Performance Evaluation of Intelligent Hybrid Systems for Node Placement in Wireless Mesh Networks: A Comparison Study of WMN-PSOHC and WMN-PSOSA. 16-26 - Masafumi Yamada, Miralda Cuka, Yi Liu, Tetsuya Oda, Keita Matsuo, Leonard Barolli:
Design of a Smart Desk for an IoT Testbed: Improving Learning Efficiency and System Security. 27-35 - Tetsuya Oda, Elis Kulla, Miralda Cuka, Donald Elmazi, Makoto Ikeda, Leonard Barolli:
Performance Evaluation of a Deep Q-Network Based Simulation System for Actor Node Mobility Control in Wireless Sensor and Actor Networks Considering Different Distributions of Events. 36-49 - Keita Matsuo, Shinji Sakamoto, Tetsuya Oda, Admir Barolli, Makoto Ikeda, Leonard Barolli:
Performance Analysis of WMNs by WMN-GA Simulation System for Different WMN Architectures and TCP Congestion-Avoidance Algorithms Considering Exponential and Weibull Distributions. 50-62 - Shoma Takeuchi, Noriki Uchida, Yoshitaka Shibata:
Proposal of Traffic Accident Prevention System with Chronological Variations of Wireless Signals and Sensors on Mobile Nodes. 63-72 - Kosuke Ozera, Takaaki Inaba, Shinji Sakamoto, Leonard Barolli:
Implementation of a WLAN Triage Testbed Using Fuzzy Logic: Evaluation for Different Number of Clients. 73-86 - Gaku Tsuchiya, Keisuke Ebisu, Makoto Ikeda, Donald Elmazi, Leonard Barolli, Elis Kulla:
A Fuzzy-Based Testbed for Wireless Sensor and Actuator Networks: Performance Evaluation for Different Remaining Energy of Actuators. 87-97 - Atsuhiro Sawada, Shigenari Nakamura, Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa:
Simple Energy-Aware Algorithms to Selecting a Server for Storage and Computation Processes in a Cluster. 98-109 - Emi Ogawa, Shigenari Nakamura, Makoto Takizawa:
An Energy-Saving Unicast Routing Protocol in Wireless Ad-hoc Network. 110-120 - Klodiana Goga, Fatos Xhafa, Olivier Terzo:
Performance Evaluation of Clustering and Collaborative Filtering Algorithms for Resource Scheduling in a Public Cloud Environment. 121-134 - Antonio Messina, Agnese Augello, Giovanni Pilato, Riccardo Rizzo:
BioGraphBot: A Conversational Assistant for Bioinformatics Graph Databases. 135-146 - Markus Aleksy, Johannes Schmitt:
Utilizing Augmented Reality and Wearables in Industrial Applications. 147-155 - Insu Oh, Yeunsu Lee, Hyeji Lee, Kyungroul Lee, Kangbin Yim:
Security Assessment of the Image-Based Authentication Using Screen-Capture Tools. 156-161 - Malik Ali Judge, Awais Manzoor, Fahim Ahmed, Saqib Kazmi, Zahoor Ali Khan, Umar Qasim, Nadeem Javaid:
Monitoring of Power Transmission Lines Through Wireless Sensor Networks in Smart Grid. 162-170 - Awais Manzoor, Fahim Ahmed, Malik Ali Judge, Adnan Ahmed, Mirza Amaad Ul Haq Tahir, Zahoor Ali Khan, Umar Qasim, Nadeem Javaid:
User Comfort Oriented Residential Power Scheduling in Smart Homes. 171-180 - Farwa Ahmed, Saba Gul, Muhammad Amir Khalil, Arshad Sher, Zahoor Ali Khan, Umar Qasim, Nadeem Javed:
Two Hop Adaptive Routing Protocol for Underwater Wireless Sensor Networks. 181-189 - Fozia Feroze, Itrat Fatima, Saman Zahoor, Nabeeha Qayyum, Zahoor Ali Khan, Umar Qasim, Nadeem Javaid:
User Satisfaction Based Home Energy Management System for Smart Cities. 190-199 - Rabiya Khalid, Samia Abid, Ayesha Zafar, Anila Yasmeen, Zahoor Ali Khan, Umar Qasim, Nadeem Javaid:
Fuzzy Energy Management Controller for Smart Homes. 200-207 - Xiaobo Hu, Xinhuai Tang, Feilong Tang:
Analysis of Investment Relationships Between Companies and Organizations Based on Knowledge Graph. 208-218 - Jiacheng Liu, Feilong Tang, Long Chen, Liang Qiao, Yanqin Yang, Wenchao Xu:
Converging Human Knowledge for Opinion Mining. 219-230 - Huan Yu, Ying Wang, Yaning Fan, Sachula Meng, Rui Huang:
Accuracy Is Not Enough: Serendipity Should Be Considered More. 231-241 - Yaning Fan, Ying Wang, Huan Yu, Baoling Liu:
Movie Recommendation Based on Visual Features of Trailers. 242-253 - Xiaochen Lai, Wenzhe Shi, Lu Liu, Xin Liu, Yu Zhao:
A Study on the Motion Recognition of Basketball Players Based on Unit Gesture Decomposition. 254-265 - Fumiaki Sato:
Indoor Navigation System Based on Augmented Reality Markers. 266-274 - Baojiang Cui, Qi Zhao, Tianyu Liu:
Study on Android Native Layer Code Protection Based on Improved O-LLVM. 275-285 - Yan Zhu, Guidong Zhang, Zhiquan Lai, Boya Niu, Yongjun Shen:
A Two-Tiered Defence of Techniques to Prevent SQL Injection Attacks. 286-295 - Baojiang Cui, Yi Ren, Pin Mao:
The Study and Realization of Browser Defect Detection Technology Based on Intelligent Boundary Reverse. 296-309 - Tianhan Gao, Yanqiang Li, Nan Guo:
An Anonymous Access Authentication Scheme for VANETs Based on ISGS. 310-320 - Valentin Lefils, Gilles Grimaud, Julien Iguchi-Cartigny:
EE-CFI: Externalized Control Flow Integrity for Embedded Devices. 321-329 - Tianhan Gao, Xinyang Deng, Nan Guo:
An Anonymous Authentication Scheme Based on Group IBS for PMIPv6 Network. 330-341 - Mona Nandwani, Rishabh Kaushal:
Evaluating User Vulnerability to Privacy Disclosures over Online Dating Platforms. 342-353 - Xiaoliang Wang, Xuhui Zhu, Xiaochen Lai, Chi Lin, Shouwei Li:
Application of Improved Software Phase-Locked-Loop in DSTATCOM. 354-363 - Xiaoliang Wang, Xiaochen Lai, Chi Lin, Zhen Xu, Shouwei Li:
Digital Harmonic Detection with Rapid Response and High Steady Precision. 364-373 - Mengyu Gao, Wenan Zhou, Zheng Hu, Wenji Zhang:
A Prospect of Interdisciplinary Methodology of QoE Assessment. 374-384 - Bingqian Li, Wenan Zhou, Xuhui Yang:
A Macro-Assisted Cooperative Edge Caching in Heterogeneous Mobile Networks. 385-394 - Urszula Ogiela, Makoto Takizawa, Lidia Ogiela:
Security of Selected Secret Sharing Schemes. 395-400 - Alba Amato, Antonio Coronato:
Supporting Hypothesis Generation by Machine Learning in Smart Health. 401-410
The 11th International Workshop on Advances in Information Security (WAIS-2017)
- Yuanyuan Pan, Yongdong Shi, Jianqing Li:
A Novel and Practical Pseudonym Change Scheme in VANETs. 413-422 - Hanqiu Xu, Qingping Wang, Jing Zhou, Ou Ruan:
An Efficient Provably Secure Password-Based Authenticated Key Agreement. 423-434 - Takamichi Saito, Ryohei Hosoya, Koki Yasuda, Kazushi Takahashi, Yuta Tsunoda, Kazuhisa Tanabe, Masayuki Taneoka, Satoshi Yashiro:
Proposal and Implementation of a Countermeasure Against Event Tracking on the Web. 435-444 - Nanda Kumar Thanigaivelan, Ethiopia Nigussie, Seppo Virtanen, Jouni Isoaho:
Self-aware Access Control System for Android. 445-454 - Nobuyuki Teraura:
Counterfeit Detection by Smartphone Using Double-Encoded Two-Dimensional Code. 455-466 - Ryuichi Ohori, Satoru Torii:
Suspicious User Detection Based on File Server Usage Features. 467-470
The 7th International Workshop on Mobile Commerce, Cloud Computing, Network and Communication Security (MCNCS-2017)
- Xiu-Shu Zhang, Fang-Yie Leu, Ching-Wen Yang:
Healthcare Based on Cloud Electrocardiogram System: A Medical Center Experience in Middle Taiwan. 473-482 - Sen-Tarng Lai, Fang-Yie Leu:
An Iterative and Incremental Data Preprocessing Procedure for Improving the Risk of Big Data Project. 483-492 - Chien-Hsiang Kao, Fang-Yie Leu:
Prediction of the Fragment of Video Streamed to Mobile Phones Under a 5G Network Base Station. 493-501 - Fang-Yie Leu, Chih-Chung Cheng:
MIH-Based Congestion Control with Seamless Handover in Untrusted Networks. 502-510
The 7th International Workshop on Intelligent Techniques and Algorithms for Ubiquitous Computing (ITAUC-2017)
- Sonia Aimene, Idir Rassoul:
Integration of Ubiquitous Specifications in the Lifecycle of Design Object Oriented. 513-519 - Adia Khalid, Ayesha Zafar, Samia Abid, Rabiya Khalid, Zahoor Ali Khan, Umar Qasim, Nadeem Javaid:
Cuckoo Search Optimization Technique for Multi-objective Home Energy Management. 520-529 - Shuqing Wang, Ruotian Yao, Yuexiang Mao:
The Application of Heuristic Neural Network in Speed Estimation of Asynchronous Motor. 530-538 - Yung-Fa Huang, Tan-Hsu Tan, Yu-Shing Lee, Hsing-Chung Chen:
Performance of Power Allocation of Relay Stations for Cognitive Radio Based Cooperative Communication Systems. 539-546 - Huu-Phuc Dang, Hong-Nhu Nguyen, Thanh-Duc Le, Si-Phu Le, Dinh-Thuan Do, Jaroslav Zdralek, Miroslav Voznák:
Enabling D2D Transmission Mode in Cellular Networks: Instantaneous Rate Consideration. 547-553 - Thanh-Duc Le, Hong-Nhu Nguyen, Si-Phu Le, Dinh-Thuan Do, Jaroslav Zdralek, Miroslav Voznák:
Performance Analysis of Wireless Powered Cognitive Radio Networks. 554-562 - Shian-Shyong Tseng, Yuh-Jye Wang:
A New Collaborative Knowledge Integration Scheme. 563-570
The 7th International Workshop on Future Internet and Next Generation Networks (FINGNet-2017)
- Shama Siddiqui, Sayeed Ghani, Anwar Ahmed Khan:
Effect of Polling Interval Distributions on the Performance of MAC Protocols in Wireless Sensor Networks. 573-579 - Jiyoung Lim, Inshil Doh, Kijoon Chae:
Lightweight Authentication for Distributed Mobile P2P Communications. 580-589 - Hae-Duck J. Jeong, Gil-Seong Jeong, Won-Jung Kim, Jinwon Kim, Hanbin Song, Myeong-Un Ryu, Jongsuk R. Lee:
A Search for Computationally Efficient Supervised Learning Algorithms of Anomalous Traffic. 590-600 - Sunghwan Jeong, Jun-Sik Kong, Mye M. Sohn, Hyun Jung Lee:
Ontology Development for Dynamic Service Composition in Cyber-Physical Systems (CPSs). 601-610 - Hyun Jung Lee, Mye M. Sohn:
Cross-Recommendation Depending on Commonly Shared Users' Preferences in IoT Environment. 611-619 - Si-Phu Le, Hong-Nhu Nguyen, Thanh-Duc Le, Huu-Phuc Dang, Dinh-Thuan Do, Jaroslav Zdralek, Miroslav Voznák:
Power Beacon-Assisted Relaying Scheme for Cellular Networks: System Model and Performance Analysis. 620-628 - Hong-Nhu Nguyen, Huu-Phuc Dang, Thanh-Duc Le, Si-Phu Le, Dinh-Thuan Do, Jaroslav Zdralek, Miroslav Voznák:
On the Outage Probability of Device-to-Device Communication Enabled NOMA. 629-635 - Nguyen Thai Anh, Huu-Phuc Dang, Hong-Nhu Nguyen, Thanh-Duc Le, Si-Phu Le, Dinh-Thuan Do, Jaroslav Zdralek, Miroslav Voznák:
Performance Analysis of Device-To-Device Communication Using AF Relaying Under Impact of Co-channel Interferences. 636-644
The 6th International Workshop on Frontiers in Innovative Mobile and Internet Services (FIMIS-2017)
- Jahangir Dadkhah Chimeh, Mojtaba Mazoochi:
Approaching to Mobile 5G Communications. 647-656 - Xuan Guo, Zhiting Xiao, Pin-shan Zeng, Ying Yang:
Terrorists Spatio-Temporal Analysis Based on Social Network Tools. 657-665 - Yonghui Chen, Mingwu Zhang, Chao Xu:
Reliable Homomorphic Matrix Disguising Scheme. 666-675 - Anwar Ahmed Khan, Sayeed Ghani, Shama Siddiqui:
Contention Window Prioritization for Heterogeneous Traffic in Wireless Sensor Networks. 676-685 - Huazhong Jin, Feng Guan, Fang Wan, Ou Ruan, Qing Li:
An Optimal Algorithm for Multiscale Segmentation of High Resolution Remote Sensing Image Based on Spectral Clustering. 686-695
The 6th International Workshop on Sustainability Management of e-Business and Ubiquitous Commerce Engineering (SMEUCE-2017)
- Shyh-Weir Tzang, Yung-Shun Tsai, Chun-Ping Chang, Ya-Ping Yang:
Moving Average Timing Strategy from a Volatility Perspective: Evidence of the Taiwan Stock Market. 699-707 - Yung-Shun Tsai, Chun-Ping Chang, Shyh-Weir Tzang:
The Impact of Golden Cross and Death Cross Frequency on Stock Returns in Pre- and Post-financial Crisis. 708-713 - Chun-Ping Chang, Yung-Shun Tsai, Shyh-Weir Tzang:
Managers' Bargaining Power and the Intrinsic Value. 714-719 - Chaio-Hsing Chen, Mei Hua Huang, Perng-Fei Huang, Chiung-Yen Chen:
Investigation into the Relationships Among Sponsorship, Identification and Purchase Intention. 720-729 - Mei-Hua Liao, Xiang-Ling Zhan, Hidekazu Sone:
The Effects of CSR Announcement on Long-Life Business. 730-734 - Chiou-Shya Torng, Ming-Sui Weng, Chai-Ju Lu:
Serious Leisure and Flow Experience of Teenagers - A Case Study on the Activities of Orchestra. 735-740 - Wen-Hsin Huang, Mei-Juh Huang, Mei-Hua Huang:
The Impact of Government Shareholding on Firm Performance: A Corporate Governance Perspective. 741-750 - Chia-Ju Lu, Chiou-Shya Torng:
The Impact of Corporate Social Responsibility and Organization Identification on Employee Engagement. 751-758 - Wen-Hsin Huang, Hsien-Feng Lee:
A Study of Impact of Social Welfare from Public-Private-Partnerships: A Case of Taipei City Youbike. 759-770 - Ying-Li Lin, Li-Yu Lin, Hsiu-Feng Huang:
The Influence of Senior Supervisors' Professional Degree and Their Job Changes and Part-Time Duties on Corporate Performance. 771-780 - Ying-Li Lin, Yu-Ju Chen, Tin-Chang Chang:
Causal Relationship Between Research and Development Input, Research and Development Output, and Corporate Value. 781-787 - Hsiang-Chih Hu, Mei-Ying Chen, Shu-Hui Chuang:
A Study on the Influencing Factors of Consumers Repeat Purchasing Intention in International Travel Fair. 788-794 - Chung-Yi Hsu, Ya-Wen Huang, Shu-Hui Chuang:
Examining the Relationships Among Electronic Word of Mouth, Perceived Value and Risk, and Consumer Purchase Intention. 795-801 - Kuei-Yuan Wang, Chien-Kuo Han, Xiao-Hong Lin, Ming-De Lin:
The Influence of Internationalization on Value Drivers: Song Ho Industrial Corporation, Ltd. vs. Chih Lien Industrial Corporation, Ltd. 802-811 - Kuei-Yuan Wang, Chien-Kuo Han, Xiao-Hong Lin, Chia-Hua Lin:
A Comparative Study of Valuation and Value Drivers in the Textile Industry: Kwang Ming Silk Mill Co., Ltd. vs. Eclat Textile Co., Ltd. 812-820 - Ching-Hui Shih, Chun-Chiu Shao, Yao-Hua Wang:
Study of Social Loafing and Employee Creativity. 821-830 - Pei-Shih Chen, Tin-Chang Chang, Ying-Li Lin:
Customer Satisfaction and Quality of Service Towards Public Servants in a Governmental Education Training Center in Taiwan. 831-840 - Ling-Yi Chou:
The Effect of Flipped Classroom on Self-efficacy and Satisfaction of Computer Auditing. 841-845
The 6th International Workshop on Extending Seamlessly to the Internet of Things (esIoT-2017)
- Francisco D. Acosta, Miguel A. Wister, José Adán Hernández-Nolasco, Pablo Pancardo:
Moving Smartphones to Send Emergency Messages During Assaults. 849-859 - Borja Bordel, Ramón Alcarria, Diego Sánchez de Rivera, Antonio Jara:
Low-Level Service Management in Cyber-Physical Systems. 860-872 - Ramón Alcarria, Borja Bordel, Antonio Jara:
Flexible Service Provision in Context-Aware Cyber-Physical Systems. 873-883 - Audrey Dupont, Yann Bocchi, Gianluca Rizzo:
NOSE: A NOmadic Scalable Ecosystem for Pervasive Sensing, Computing and Communication. 884-893 - Gianluca Rizzo, Helmut Neukirchen:
Geo-Based Content Sharing for Disaster Relief Applications. 894-903 - Joanna Alvarado-Uribe, Andrea Gómez-Oliva, Germán Molina, Miguel González-Mendoza, María Concepción Parra-Meroño, Antonio J. Jara:
Towards the Development of a Smart Tourism Application Based on Smart POI and Recommendation Algorithms: Ceutí as a Study Case. 904-916 - Salvador Pérez, Domenico Rotondi, Diego Pedone, Leonardo Straniero, Maria José Nuñez, Fernando Gigante:
Towards the CP-ABE Application for Privacy-Preserving Secure Data Sharing in IoT Contexts. 917-926
The 3rd International Workshop on Big Data and IoT Security (BDITS-2017)
- Jingling Zhao, Guoxiao Huang, Tianyu Liu, Baojiang Cui:
Software Abnormal Behavior Detection Based on Hidden Markov Model. 929-940 - Jun Yang, Qiyi Tang:
RTF Editor XSS Fuzz Framework. 941-951 - Luca Casati, Andrea Visconti:
Exploiting a Bad User Practice to Retrieve Data Leakage on Android Password Managers. 952-958 - Hou Yuan Wei, Hao Yong Le, Xin Shu, Caiyuan Chen:
A Context-Aware Smart Office Application System. 959-966 - Yongle Hao, Ying Hou, Longjie Li:
A Novel Algorithm for Feature Selection Used in Intrusion Detection. 967-974
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.