default search action
11. BWCCA 2016: Asan, Korea
- Leonard Barolli, Fatos Xhafa, Kangbin Yim:
Advances on Broad-Band Wireless Computing, Communication and Applications, Proceedings of the 11th International Conference On Broad-Band Wireless Computing, Communication and Applications, BWCCA 2016, Soonchunhyang University, Asan, Korea, November 5-7, 2016. Lecture Notes on Data Engineering and Communications Technologies 2, Springer 2017, ISBN 978-3-319-49105-9
11th International Conference on Broad-Band Wireless Computing, Communication and Applications (BWCCA-2016)
- Jingling Zhao, Lei He, Bing He:
C++ Memory Check tool based on Dynamic Binary Instrumentation Platform. 3-11 - Baojiang Cui, Chong Wang, Guowei Dong, Jinxin Ma:
A program behavior recognition algorithm based on assembly instruction sequence similarity. 13-20 - Dilawaer Duolikun, Shigenari Nakamura, Ryo Watanabe, Tomoya Enokido, Makoto Takizawa:
Energy-aware Migration of Virtual Machines in a Cluster. 21-32 - Ryo Watanabe, Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa:
An Energy-efficient Migration Model of Processes with Virtual Machines in a Server Cluster. 33-44 - Atsuhiro Sawada, Hiroki Kataoka, Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa:
Energy-aware Server Selection Algorithms for Storage and Computation Processes. 45-56 - Shigenari Nakamura, Tomoya Enokido, Makoto Takizawa:
Topic-based Synchronization (TBS) Protocols to Prevent Illegal Information Flow in Peer-to-Peer Publish/Subscribe Systems. 57-68 - Lijun Song, Wenan Zhou, Yanjun Hou, Mengyu Gao:
Load-aware ACB Scheme for M2M Traffic in LTE-A Networks. 69-80 - Xuhui Yang, Wenan Zhou, Da Li:
An Energy-Efficient Macro-assisted Sleep-Mode Scheme in Heterogeneous Networks. 81-91 - Yanjun Hou, Wenan Zhou, Lijun Song, Mengyu Gao:
A QoE Estimation Model for Video Streaming over 5G Millimeter Wave Network. 93-104 - Tomoya Enokido, Makoto Takizawa:
An Energy-Efficient Process Replication Algorithm in Virtual Machine Environments. 105-114 - Tetsuya Oda, Admir Barolli, Ryoichiro Obukata, Leonard Barolli, Fatos Xhafa, Makoto Takizawa:
Comparison Analysis by WMN-GA Simulation System for Different WMN Architectures, Distributions and Routing Protocols Considering TCP. 115-127 - Admir Barolli, Tetsuya Oda, Makoto Ikeda, Leonard Barolli, Fatos Xhafa, Makoto Takizawa:
Comparison Analysis by WMN-GA Simulation System for Different WMN Architectures, Normal and Uniform Distributions, DCF and EDCA Functions. 129-142 - Keita Matsuo, Tetsuya Oda, Admir Barolli, Makoto Ikeda, Leonard Barolli, Fatos Xhafa:
A GA-Based Simulation System for WMNs: Performance Analysis for Different WMN Architectures Considering Uniform Distribution, Transmission Rate and OLSR Protocol. 143-152 - Kevin Bylykbashi, Evjola Spaho, Leonard Barolli, Makoto Takizawa:
Effect of Node Density and Node Movement Model on Performance of a VDTN. 153-161 - Donald Elmazi, Tetsuya Oda, Evjola Spaho, Elis Kulla, Makoto Ikeda, Leonard Barolli:
A Fuzzy-Based Simulation System for Actor Selection in Wireless Sensor and Actor Networks Considering as a New Parameter Density of Actor Nodes. 163-174 - Yi Liu, Tetsuya Oda, Keita Matsuo, Leonard Barolli, Fatos Xhafa:
A Fuzzy-based System for Qualified Voting in P2P Mobile Collaborative Team. 175-186 - Shinji Sakamoto, Tetsuya Oda, Makoto Ikeda, Leonard Barolli, Fatos Xhafa:
An Integrated Simulation System Considering WMN-PSO Simulation System and Network Simulator 3. 187-198 - Daichi Koga, Makoto Ikeda, Leonard Barolli:
Impact of Delayed Acknowledgment for Message Suppression in Vehicular-DTN. 199-208 - Keonsoo Lee, Yunyoung Nam:
Reputation based Access Control in Social Networks for Persona Management. 209-214 - JunSeok Cha, Pan-Koo Kim:
The Automatic Text Summarization Using Semantic Relevance And Hierarchical Structure Of Wordnet. 215-222 - SeungHyeon Bak, Pan-Koo Kim:
Korean spelling error correction using a Hangul similarity algorithm. 223-229 - Yoshiaki Hori, Seiichiro Mizoguchi, Ryosuke Miyazaki, Akira Yamada, Yaokai Feng, Ayumu Kubota, Kouichi Sakurai:
A Comprehensive Security Analysis Checksheet for OpenFlow Networks. 231-242 - Duha Binte Asim, Nadeem Javaid:
Enhanced energy conditioned mean square error algorithm for wireless sensor networks. 243-254 - Masaki Otomo, Goshi Sato, Yoshitaka Shibata:
In-Vehicle Cloudlet Computing based on Delay Tolerant Network Protocol for Disaster Information System. 255-266 - Mudassar Naseem, Samia Abid, Rabiya Khalid, Ghulam Hafeez, Sardar Mahboob Hussain, Nadeem Javaid:
Towards Heuristic Algorithms: GA, WDO, BPSO, and BFOA for Home Energy Management in Smart Grid. 267-278 - Muhammad Awais Khan, Arshad Sher, Ahmad Raza Hameed, Naeem Jan, Junaid Shabir Abassi, Nadeem Javaid:
Network lifetime maximization via energy hole alleviation in wireless sensor networks. 279-290 - Heri Wijayanto, Hsing-Chung Chen, Wen Yen Lin:
A Smart Card-Based Three-Party Quantum Key Distribution Protocol. 291-301 - Nguyen Viet Ha, Kazumi Kumazoe, Masato Tsuru:
TCP with network coding meets loss burstiness estimation for lossy networks. 303-314 - Tsuyoshi Donen, Shingo Otsubo, Ryo Nishide, Hideyuki Takada:
Reduction of Network Traffic by Using the Peer Cache Mechanism in Co-located Collaborative Web Search on Smartphones. 315-322 - Yuki Takeda, Syuhei Yamamoto, Ryo Nishide, Hideyuki Takada:
Building a Content Delivery Network among Tens of Nearby Devices Using MultihopWireless Communication. 323-330 - Nobuo Funabiki, Minako Dake, Khin Khin Zaw, Wen-Chung Kao:
A Workbook Design for Fill-in-Blank Problems in Java Programming Learning Assistant System. 331-342 - Jun Yang, Haipeng Zhang, Lifang Han, Baojiang Cui, Guowei Dong:
Design and implementation of software consistency detection system based on Netty framework. 343-351 - Baojiang Cui, Yang Wei, Songling Shan, Jinxin Ma:
The generation of XSS attacks developing in the detect detection. 353-361 - Jun Yang, Shujuan Li:
Searchable Public Key Encryption Scheme with Data Integrity Checking. 363-370 - Xiaohui Jin, Congxian Yin, Pengpeng Yang, Baojiang Cui:
An Attack Detection System for Multiple Web Applications Based on Big Data Platform. 371-376 - Yeunsu Lee, Hyeji Lee, Kyungroul Lee, Kangbin Yim:
Cognitive Countermeasures against BAD USB. 377-386 - Hyeji Lee, Yeunsu Lee, Kyungroul Lee, Kangbin Yim:
Security Assessment on the Mouse Data using Mouse Loggers. 387-393 - Seungho Lee, Kyungroul Lee, Kangbin Yim:
Security Assessment of Keyboard Data Based on Kaspersky Product. 395-400 - Jun Yang, Haixia Yang, Qinshu Xiao:
The Detection Technology of LTE based Stratified Fuzz. 401-409 - Jin Cheol Kim, Sung Wan Park, Yong Gu Lee, Seung Won Lee:
Secure Multi-Protocol Mapping Gateway in Smart Grid. 411-418 - Gunhee Lee, Yun-Sam Kim, Jungmin Kang:
An Adaptive DoS Attack Mitigation Measure for Field Networks in Smart Grids. 419-428 - Dohyun Lim, Kitaek Park, DongJun Choi, Jungtaek Seo:
Analysis on Attack Scenarios and Countermeasures for Self-driving Car and Its Infrastructures. 429-442 - Yun-Sam Kim, Gunhee Lee, Jungmin Kang:
Lightweight IEC 61850 Secure Communication Module for Microgrids. 443-451 - Hyun Soo Park, Young Bae Jeon, Ji Won Yoon:
A New Approach to Building a Disguised Server Using the Honey Port Against General Scanning Attacks. 453-465 - Jong-Hyuk Im, Mun-Kyu Lee:
Password Authentication Using One-Time Key-Based Signature and Homomorphic Encryption. 467-474 - Mun-Kyu Lee, Jong-Hyuk Im:
On-line Voting System with Illegal Ballot Filtering Using Homomorphic Encryption. 475-482 - Sanghwan Oh, Hanchul Bae, Seongmin Park, Hwankuk Kim:
Real-Time Malicious Script Blocking Technology at the Host-Level. 483-490 - Sanjay K. Dhurandher, Satya Jyoti Borah, Isaac Woungang, Sahil Gupta, Pragya Kuchal, Makoto Takizawa, Leonard Barolli:
A Probabilistic Encounter and Distance-based Routing Protocol for Opportunistic Networks. 491-499 - Lidia Ogiela, Marek R. Ogiela, Urszula Ogiela:
Comparison of Biometric and Linguistic Secret Sharing Protocols. 501-505 - Marek R. Ogiela, Katarzyna Koptyra:
Concealing Additional Secrets Using Sharing Approach in Steganography. 507-512 - Alaa Ahmed Almarzuqi, Seyed Mohammed Buhari:
Enhance Robotics ability in Hand Gesture Recognition by Using Leap Motion Controller. 513-523 - Hee-Yong Kwon, Mun-Kyu Lee:
Fast Signature Verification with Shared Implicit Certificates for Vehicular Communication. 525-533 - Hiroya Oda, Elis Kulla, Ryo Ozaki, Noritaka Nishihara:
Design of an Adhoc Testbed for IoT and WSAN Applications Using Raspberry Pi. 535-546
The 18-th International Symposium on Multimedia Network Systems and Applications (MNSA-2016)
- Masafumi Yamada, Tetsuya Oda, Yi Liu, Keita Matsuo, Leonard Barolli:
Performance Evaluation of an IoT-Based E-Learning Testbed Using Mean Shift Clustering Approach Considering Electroencephalogram Data. 549-557 - Takaaki Inaba, Shinji Sakamoto, Tetsuya Oda, Makoto Ikeda, Leonard Barolli:
A Testbed for Admission Control in WLAN: A Fuzzy Approach and Its Performance Evaluation. 559-571 - Hiroki Kataoka, Atsuhiro Sawada, Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa:
Simple Energy-efficient Server Selection Algorithm in a Scalable Cluster. 573-584 - Emi Ogawa, Shigenari Nakamura, Makoto Takizawa:
An Energy-efficient and Reliable Protocol in Wireless Networks. 585-592 - Tomoki Okutake, Noriki Uchida, Noriyasu Yamamoto:
Proposal of Collaborative Object Tracking Methods by Multi-Drones for Flight Surveillance Systems. 593-600 - Shinya Kitada, Goshi Sato, Yoshitaka Shibata:
Performance Evaluation of a DTN Based Multi-hop Network for Disaster Information Transmission by Smart Devices. 601-611 - Minoru Uehara:
OpenFlow Mesh for Metabolic Computing. 613-620
The 9-th International Workshop on Next Generation of Wireless and Mobile Networks (NGWMN-2016)
- Ryoichiro Obukata, Tetsuya Oda, Donald Elmazi, Makoto Ikeda, Leonard Barolli:
Performance Evaluation of an AmI Testbed for Improving QoL: Evaluation Using Clustering Approach Considering Parallel Processing. 623-630 - Kengo Katayama, Yusuke Okamoto, Elis Kulla, Noritaka Nishihara:
Variable Neighborhood Search Algorithms for the Node Placement Problem in Multihop Networks. 631-638 - Ryuji Ono, Elis Kulla, Evjola Spaho:
Performance Evaluation of VANETs in Different Real Map Scenarios. 639-647 - Sangjoon Park, Kangbin Yim, Byeong-Gwon Kang:
Error Performance of Successive Interference Cancellation Schemes in MIMO Systems. 649-655 - Sarang Na, Taeeun Kim, Hwankuk Kim:
A Study on the Classification of Common Vulnerabilities and Exposures using Naïve Bayes. 657-662 - Sungtaek Oh, Woong Go, Taejin Lee:
A Study on The behavior-based Malware Detection Signature. 663-670
The 7-th International Workshop on Methods, Analysis and Protocols for Wireless Communication (MAPWC-2016)
- Kosuke Ozera, Tetsuya Oda, Donald Elmazi, Leonard Barolli:
Design and Implementation of a Simulation System Based on Genetic Algorithm for Node Placement in Wireless Sensor and Actor Networks. 673-682 - Yuki Sakai, Tetsuya Oda, Makoto Ikeda, Leonard Barolli:
VegeShop Tool: A Tool for Vegetable Recognition Using DNN. 683-691 - Keisuke Ebisu, Takaaki Inaba, Donald Elmazi, Makoto Ikeda, Leonard Barolli, Elis Kulla:
A Fuzzy-Based Wireless Sensor and Actuator Network: Simulation and Experimental Results. 693-701 - Hiroshi Maeda, Kazuya Tomiura, Jianming Jin:
Numerical Analysis of Resonance Characteristics in Cavities in Periodic Structure for WDM Telecommunication System. 703-710 - Hiroshi Maeda, Jianming Jin, Kazuya Tomiura:
Spectrum Analysis of Envelope Pulse After Propagating in Nonlinear Dielectric Material. 711-718
The 7-th International Workshop on Cloud, Wireless and e-Commerce Security (CWECS-2016)
- Kun-Lin Tsai, Fang-Yie Leu, King-Shing Yip:
Device Parameter based Secure User Authentication. 721-730 - Sen-Tarng Lai, Fang-Yie Leu:
Data Preprocessing Quality Management Procedure for Improving Big Data Applications Efficiency and Practicality. 731-738 - Cheng-Ying Hsu, Shang-En Yang, Hung-Yuan Chen, Fang-Yie Leu, Yao-Chung Fan:
Inferring Smartphone User Demographics from Wi-Fi trace Logs: A Study of Users' Privacy Concerns. 739-746 - Jung-Chun Liu, Yi-Li Huang, Fang-Yie Leu:
Enhancing Security of LTE using a Double Masking Technique. 747-754
The 5-th International Workshop on Robot Interaction, Control, Communication and Cooperation (RI3C-2016)
- Haruka Watanabe, Kaoru Fujioka:
The effective flock control by two sheepdogs. 757-762 - Keita Matsuo, Leonard Barolli:
Design and Control of an Omnidirectional Wheelchair for Moving in Room Narrow Spaces. 763-774 - Takuhiro Sato, Shoma Kushizaki, Shimpei Matsumoto, Tomoki Kitawaki, Tatsushi Tokuyasu:
Development of Training System for Pedaling Skill by Visualizing Muscle Activity Pattern. 775-782 - Chicako Miyamoto, Naoko Furukawa, Tatsushi Tokuyasu:
Proposal for a strategy to discover the students with need for a learning support by using text analysis. 783-788
The 3-rd International Workshop on Secure Cloud Computing (SCC-2016)
- Hang Liu, Dong Zheng, Qinglan Zhao:
Construction of Boolean Functions with Optimal Algebraic Immunity. 791-798 - Zhiwei Zhang, Yunling Wang, Jianfeng Wang, Xiaofeng Chen, Jianfeng Ma:
Location-Sensitive Data Sharing in Mobile Cloud Computing. 799-805 - Yinghui Zhang, Dong Zheng:
Efficient and Expressive Anonymous Attribute-Based Encryption for Mobile Cloud Computing. 807-814 - Peilin Zhou, Zhenhua Liu, Shuhong Duan:
Flexible Attribute-Based Keyword Search via Two Access Policies. 815-822 - Xuewei Yan, Hua Ma, Zhenhua Liu, Ting Peng:
Large Universe Revocable Fine-Grained Encryption with Public Auditing. 823-830 - Shuhong Duan, Zhenhua Liu, Peilin Zhou:
A privacy-preserving personal health record with searchability and revocability using attribute-based encryption. 831-838 - Linchao Zhang, Hua Ma, Zhenhua Liu, Enting Dong:
Security Analysis and Improvement of A Collusion-Resistant Identity-Based Proxy Re-Encryption Scheme. 839-846
The 3-rd International Workshop on Large Scale Networks and Applications (LSNA-2016)
- Fushan Wei, Ruijie Zhang, Jian Shen:
A Provably Secure Two-Factor Authenticated Key Exchange Protocol for Wireless Sensor Networks Based on Authenticated Encryption. 849-855 - Rui An, Hui Feng, Qin Liu, Li Li:
Three elliptic curve cryptography-based RFID authentication protocols for Internet of Things. 857-878 - Qi Jiang, Bingyan Li, Jianfeng Ma:
On the Security of Three-factor Authentication Scheme for Telecare Medical Information Systems. 879-884 - Jing Li, Xiong Li, Licheng Wang, Debiao He, Xinxin Niu:
Oblivious Transfer Protocols Based on Group Factoring Problem. 885-892 - Quanyu Zhao, Yi-Ning Liu:
E-Voting Scheme Using Secret Sharing and K-Anonymity. 893-900
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.