


default search action
ICT-EurAsia 2014: Bali, Indonesia
- Linawati, Made Sudiana Mahendra, Erich J. Neuhold, A Min Tjoa

, Ilsun You:
Information and Communication Technology - Second IFIP TC5/8 International Conference, ICT-EurAsia 2014, Bali, Indonesia, April 14-17, 2014. Proceedings. Lecture Notes in Computer Science 8407, Springer 2014, ISBN 978-3-642-55031-7
Information & Communication Technology-EurAsia Conference 2014, ICT-EurAsia 2014
- Hajar Mousannif

, Ismail Khalil:
The Human Face of Mobile. 1-20 - Florian Miksch, Philipp Pichler, Kurt Junshean Espinosa, Niki Popper

:
Agent-Based Methods for Simulation of Epidemics with a Low Number of Infected Persons. 21-28 - Maria Isabel Beltran, Guido David:

Cellular Automata Model of Urbanization in Camiguin, Philippines. 29-35 - Florian Miksch, Christoph Urach, Patrick Einzinger

, Günther Zauner:
A Flexible Agent-Based Framework for Infectious Disease Modeling. 36-45 - Stefan Henningsson, Jonas Hedman:

Transformation of Digital Ecosystems: The Case of Digital Payments. 46-55 - Charnsak Srisawatsakul

, Gerald Quirchmayr, Borworn Papasratorn:
Do Personality Traits Work as Moderator on the Intention to Purchase Mobile Applications Work? - A Pilot Study. 56-65 - R. V. Hari Ginardi

, Ahmad Saikhu, Riyanarto Sarno, Dwi Sunaryono
, Ali Sofyan Kholimi, Ratna Nur Tiara Shanty:
Intelligent Method for Dipstick Urinalysis Using Smartphone Camera. 66-77 - Aida Maleki, Kristina Kiesel, Milena Vuckovic

, Ardeshir Mahdavi:
Empirical and Computational Issues of Microclimate Simulation. 78-85 - Stefan Glawischnig, Harald Hofstätter, Ardeshir Mahdavi:

A Distributed Generic Data Structure for Urban Level Building Data Monitoring. 86-95 - Neda Ghiassi, Stefan Glawischnig, Ulrich Pont

, Ardeshir Mahdavi:
Toward a Data-Driven Performance-Guided Urban Decision-Support Environment. 96-107 - Dana Indra Sensuse, Yudho Giri Sucahyo

, Siti Rohajawati
, Haya Rizqi, Pinkie Anggia:
Knowledge Management: Organization Culture in Healthcare Indonesia. 108-118 - Imran Asif

, M. Shuaib Karim:
Semantic Versioning of In-Process Scientific Document. 119-128 - Hendrik

, Amin Anjomshoaa
, A Min Tjoa:
Towards Semantic Mashup Tools for Big Data Analysis. 129-138 - Thanh D. Nguyen

, Dung T. Nguyen, Thi H. Cao:
Acceptance and Use of Information System: E-Learning Based on Cloud Computing in Vietnam. 139-149 - Evangelos Gongolidis, Christos Kalloniatis, Evangelia Kavakli:

Requirements Identification for Migrating eGovernment Applications to the Cloud. 150-158 - Nguyen Quang-Hung

, Le Thanh Tan
, Chiem Thach Phat, Nam Thoai:
A GPU-Based Enhanced Genetic Algorithm for Power-Aware Task Scheduling Problem in HPC Cloud. 159-169 - Widodo Budiharto, Bayu Kanigoro

, Viska Noviantri
:
Ball Distance Estimation and Tracking System of Humanoid Soccer Robot. 170-178 - Bilih Priyogi, Nungki Selviandro

, Zainal Arifin Hasibuan
, Mubarik Ahmad
:
Image Clustering Using Multi-visual Features. 179-189 - Abdulmalik Danlami Mohammed

, Tim Morris:
A Robust Visual Object Tracking Approach on a Mobile Device. 190-198 - Josef Kufner

, Radek Marík
:
Self-generating Programs - Cascade of the Blocks. 199-212 - Josef Kufner

, Radek Marík
:
State Machine Abstraction Layer. 213-227 - Aldo Suwandi, Inggriani Liem, Saiful Akbar

:
Concern Based SaaS Application Architectural Design. 228-237 - Haruna Chiroma, Sameem Abdul Kareem, Adamu I. Abubakar, Eka Novita Sari, Tutut Herawan

, Abdulsalam Ya'u Gital
:
Hybridization of Haar Wavelet Decomposition and Computational Intelligent Algorithms for the Estimation of Climate Change Behavior. 238-247 - Younes Saadi, Eka Novita Sari, Tutut Herawan

:
An Improved Ant Colony Matching by Using Discrete Curve Evolution. 248-256 - Haruna Chiroma, Sameem Abdul Kareem, Adamu I. Abubakar, Eka Novita Sari, Tutut Herawan

:
A Novel Approach to Gasoline Price Forecasting Based on Karhunen-Loève Transform and Network for Vector Quantization with Voronoid Polyhedral. 257-266 - Bens Pardamean

, Teddy Suparyanto
, Suyanta, Eryadi Masli, Jerome Donovan
:
Enhancing the Use of Digital Model with Team-Based Learning Approach in Science Teaching. 267-276 - Peter Baumgartner

:
Improving Reusability of OER - Educational Patterns for Content Sharing. 277-285 - Ali Shojaee Bakhtiari, Nizar Bouguila

:
Online Learning for Two Novel Latent Topic Models. 286-295 - Nizar Bouguila

, Mohamed Al Mashrgy:
An Infinite Mixture Model of Generalized Inverted Dirichlet Distributions for High-Dimensional Positive Data Modeling. 296-305 - R. B. Fajriya Hakim, Eka Novita Sari, Tutut Herawan

:
On If-Then Multi Soft Sets-Based Decision Making. 306-315 - Guruh Fajar Shidik

, Khabib Mustofa
:
Predicting Size of Forest Fire Using Hybrid Model. 316-327 - Fathul Wahid

, Øystein Sæbø:
Understanding eParticipation Services in Indonesian Local Government. 328-337 - Wikan Danar Sunindyo

, Bayu Hendradjaya, G. A. Putri Saptawati, Tricya Esterina Widagdo:
Document Tracking Technology to Support Indonesian Local E-Governments. 338-347 - P. Vignesh Raja, E. Sivasankar:

Modern Framework for Distributed Healthcare Data Analytics Based on Hadoop. 348-355 - James W. Baurley, Bens Pardamean

, Anzaludin S. Perbangsa
, Dwinita Utami, Habib Rijzaani
, Dani Satyawan
:
A Bioinformatics Workflow for Genetic Association Studies of Traits in Indonesian Rice. 356-364 - Van Nhan Nguyen, Vuong Quoc Nguyen, Minh Ngoc Binh Nguyen, Tran Khanh Dang

:
Fuzzy Logic Weight Estimation in Biometric-Enabled Co-authentication Systems. 365-374
The 2014 Asian Conference on Availability, Reliability and Security, AsiaARES 2014
- Fang-Yie Leu, Yi-Ting Hsiao, Kangbin Yim, Ilsun You:

A Real-Time Intrusion Detection and Protection System at System Call Level under the Assistance of a Grid. 375-385 - Zhi-Guo Chen

, Sung-Ryul Kim:
A Hybrid System for Reducing Memory and Time Overhead of Intrusion Detection System. 386-395 - Shang-nan Yin, Zhi-Guo Chen

, Sung-Ryul Kim:
LDFGB Algorithm for Anomaly Intrusion Detection. 396-404 - Jakub Breier

, Frank Schindler:
Assets Dependencies Model in Information Security Risk Management. 405-412 - Takuya Saruwatari, Shuichiro Yamamoto:

Creation of Assurance Case Using Collaboration Diagram. 413-418 - Christoph Hochreiner

, Zhendong Ma, Peter Kieseberg
, Sebastian Schrittwieser, Edgar R. Weippl:
Using Model Driven Security Approaches in Web Application Development. 419-431 - Shuichiro Yamamoto:

An Evaluation of Argument Patterns Based on Data Flow. 432-437 - Huijin Jeong, Junho Choi, Chang Choi

, Ilsun You, Pankoo Kim:
A Design of Web Log Integration Framework Using NoSQL. 438-445 - Agata Niescieruk, Bogdan Ksiezopolski

:
Motivation-Based Risk Analysis Process for IT Systems. 446-455 - Kurt Stenzel, Kuzman Katkalov, Marian Borek, Wolfgang Reif

:
Formalizing Information Flow Control in a Model-Driven Approach. 456-461 - Igor V. Kotenko

, Elena Doynikova
:
Security Assessment of Computer Networks Based on Attack Graphs and Security Events. 462-471 - Jianyi Zhou, Bo Liu, Baokang Zhao, Bo Liu:

A Pipeline Optimization Model for QKD Post-processing System. 472-481 - Marcel Fourné, Kevin Stegemann, Dominique Petersen, Norbert Pohlmann:

Aggregation of Network Protocol Data Near Its Source. 482-491 - Juneman Abraham

, Murty Magda Pane:
The Mediating Role of Social Competition Identity Management Strategy in the Predictive Relationship between Susceptibility to Social Influence, Internet Privacy Concern, and Online Political Efficacy. 492-499 - Rima Addas, Ning Zhang:

Formal Security Analysis and Performance Evaluation of the Linkable Anonymous Access Protocol. 500-510 - Tomoya Tanjo, Kazuhiro Minami, Ken Mano, Hiroshi Maruyama:

On Safety of Pseudonym-Based Location Data in the Context of Constraint Satisfation Problems. 511-520 - Marek R. Ogiela, Lidia Ogiela, Urszula Ogiela:

Advanced Techniques for Computer Sharing and Management of Strategic Data. 521-525 - Bogdan Ksiezopolski

, Adam Wierzbicki
, Damian Rusinek:
On the Modelling of the Computer Security Impact on the Reputation Systems. 526-531 - Takanori Yasuda, Tsuyoshi Takagi, Kouichi Sakurai:

Efficient Variant of Rainbow without Triangular Matrix Representation. 532-541 - Kunwar Singh, C. Pandu Rangan, A. K. Banerjee:

Efficient Lattice HIBE in the Standard Model with Shorter Public Parameters. 542-553 - Akihiro Yamamura

:
Security Analysis of Public Key Encryptions Based on Conjugacy Search Problem. 554-563 - Kunwar Singh, C. Pandu Rangan, A. K. Banerjee:

Cryptanalysis of Unidirectional Proxy Re-Encryption Scheme. 564-575 - Leandro Marín, Ludo Tolhuizen:

An Algorithm to Analyze Non-injective S-Boxes. 576-585 - Jun Ye, Wujun Zhang, Shu-Lin Wu, Yuan-Yuan Gao, Jia-Tao Qiu:

Attribute-Based Fine-Grained Access Control with User Revocation. 586-595 - Fei Shao, Rong Cheng, Fangguo Zhang

:
A Full Privacy-Preserving Scheme for Location-Based Services. 596-601 - Satoshi Tanaka, Takanori Yasuda, Kouichi Sakurai:

Implementation of Efficient Operations over GF(232) Using Graphics Processing Units. 602-611 - Tao Jiang, Xiaofeng Chen, Jin Li, Jianfeng Ma:

M-SRS: Secure and Trustworthy Mobile Service Review System Based on Mobile Cloudlet. 612-621 - Cheng-Hsing Yang, Kuan-Liang Liu, Chun-Hao Chang, Yi-Jhong Jhang:

High-Quality Reversible Data Hiding Approach Based on Evaluating Multiple Prediction Methods. 622-632 - Ya-Ting Chang, Min-Hao Wu, Shiuh-Jeng Wang:

Steganalysis to Data Hiding of VQ Watermarking Upon Grouping Strategy. 633-642 - Giuseppe Cattaneo

, Gianluca Roscigno
, Umberto Ferraro Petrillo:
Experimental Evaluation of an Algorithm for the Detection of Tampered JPEG Images. 643-652 - Peige Ren, Xiaofeng Wang, Chunqing Wu, Baokang Zhao, Hao Sun:

A Semantic-Based Malware Detection System Design Based on Channels. 653-662 - Peige Ren, Xiaofeng Wang, Hao Sun, Baokang Zhao, Chunqing Wu:

An Efficient Semantic-Based Organization and Similarity Search Method for Internet Data Resources. 663-673 - Zhiquan Lai, Baokang Zhao, Jinshu Su:

Efficient DVFS to Prevent Hard Faults for Many-Core Architectures. 674-679 - Zhu Tang, Chunqing Wu, Zhenqian Feng, Baokang Zhao, Wanrong Yu:

Improving Availability through Energy-Saving Optimization in LEO Satellite Networks. 680-689 - Zhenyu Zhang, Wujun Zhang, Jianfeng Wang

, Xiaofeng Chen:
An Effective Cloud-Based Active Defense System against Malicious Codes. 690-695

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














