


default search action
ICT-EurAsia/CONFENIS 2015: Daejeon, Korea
- Ismail Khalil, Erich J. Neuhold, A Min Tjoa

, Li Da Xu, Ilsun You:
Information and Communication Technology - Third IFIP TC 5/8 International Conference, ICT-EurAsia 2015, and 9th IFIP WG 8.9 Working Conference, CONFENIS 2015, Held as Part of WCC 2015, Daejeon, Korea, October 4-7, 2015, Proceedings. Lecture Notes in Computer Science 9357, Springer 2015, ISBN 978-3-319-24314-6
Networks and System Architecture
- Kamil Burda

, Martin Nagy, Ivan Kotuliak:
Reducing Keepalive Traffic in Software-Defined Mobile Networks with Port Control Protocol. 3-12 - Andrej Binder, Tomas Boros, Ivan Kotuliak:

A SDN Based Method of TCP Connection Handover. 13-19 - Roman Bronis, Ivan Kotuliak, Tomas Kovacik

, Peter Trúchly
, Andrej Binder:
IP Data Delivery in HBB-Next Network Architecture. 20-29 - Tomás Halagan, Tomas Kovacik

, Peter Trúchly
, Andrej Binder:
Syn Flood Attack Detection and Type Distinguishing Mechanism Based on Counting Bloom Filter. 30-39 - Martin Nagy, Ivan Kotuliak, Jan Skalny, Martin Kalcok, Tibor Hirjak:

Integrating Mobile OpenFlow Based Network Architecture with Legacy Infrastructure. 40-49
Teaching and Education
- Michael Weigend:

Making Computer Science Education Relevant. 53-63 - Hiromichi Abe, Kazuya Kinoshita, Kensuke Baba

, Shigeru Takano, Kazuaki J. Murakami:
Analyzing Brain Waves for Activity Recognition of Learners. 64-73
Authentication and Profiling
- Thi Ai Thao Nguyen, Dinh Thanh Nguyen, Tran Khanh Dang

:
A Multi-factor Biometric Based Remote Authentication Using Fuzzy Commitment and Non-invertible Transformation. 77-88 - Priagung Khusumanegara, Rischan Mafrur

, Deokjai Choi:
Profiler for Smartphone Users Interests Using Modified Hierarchical Agglomerative Clustering Algorithm Based on Browsing History. 89-96
Data Management and Information Advertising
- Masahiro Kuzunishi

, Tetsuya Furukawa:
Strength of Relationship Between Multi-labeled Data and Labels. 99-108 - Andreas Mladenow

, Niina Maarit Novak
, Christine Strauss
:
Online Ad-fraud in Search Engine Advertising Campaigns - Prevention, Detection and Damage Limitation. 109-118
Applied Modeling and Simulation
- Guido David:

Markov Chain Solution to the 3-Tower Problem. 121-128 - Yusuke Watanabe, Mayumi Takaya, Akihiro Yamamura

:
Fitness Function in ABC Algorithm for Uncapacitated Facility Location Problem. 129-138 - Hikari Kato, Szilárd Zsolt Fazekas

, Mayumi Takaya, Akihiro Yamamura
:
Comparative Study of Monte-Carlo Tree Search and Alpha-Beta Pruning in Amazons. 139-148
Network Security
- Takashi Kurokawa, Ryo Nojima, Shiho Moriai:

Can We Securely Use CBC Mode in TLS1.0? 151-160 - N. Renugadevi

, C. Mala:
Key Agreement with Modified Batch Rekeying for Distributed Group in Cognitive Radio Networks. 161-172 - Nan Guo, Fangting Peng, Tianhan Gao:

Secure Mobility Management for MIPv6 with Identity-Based Cryptography. 173-178 - Yana A. Bekeneva, Konstantin Borisenko, Andrey Shorov, Igor V. Kotenko

:
Investigation of DDoS Attacks by Hybrid Simulation. 179-189
Dependable Systems and Applications
- Sergey Krendelev, Mikhail Yakovlev, Maria Usoltseva:

Secure Database Using Order-Preserving Encryption Scheme Based on Arithmetic Coding and Noise Function. 193-202 - Shuichiro Yamamoto:

An Approach for Evaluating Softgoals Using Weight. 203-212 - Peige Ren, Xiaofeng Wang, Hao Sun, Fen Xu, Baokang Zhao, Chunqing Wu:

An Efficient Unsavory Data Detection Method for Internet Big Data. 213-220 - Sooyeon Shin, Seungyeon Kim, Taekyoung Kwon:

Identification of Corrupted Cloud Storage in Batch Auditing for Multi-Cloud Environments. 221-225
Multimedia Security
- Mi-Young Cho, Young-Sook Jeong:

Face Recognition Performance Comparison Between Real Faces and Pose Variant Face Images from Image Display Device. 229-234 - Chi-Yao Weng, Shengjie Wang, Shiuh-Jeng Wang:

A Lossless Data Hiding Strategy Based on Two-Dimensional Side-Match Predictions. 235-242 - Han Gang, Hongyang Yan, Lingling Xu:

Secure Image Deduplication in Cloud Storage. 243-251
Cryptography
- Chunlu Chen, Hiroaki Anada, Junpei Kawamoto, Kouichi Sakurai:

Hybrid Encryption Scheme Using Terminal Fingerprint and Its Application to Attribute-Based Encryption Without Key Misuse. 255-264 - Dirmanto Jap, Jakub Breier

:
Differential Fault Attack on LEA. 265-274 - Hsing-Chung Chen, Chung-Wei Chen:

A Secure Multicast Key Agreement Scheme. 275-281 - Bo Liu, Baokang Zhao, Chunqing Wu, Wanrong Yu, Ilsun You:

Efficient Almost Strongly Universal Hash Function for Quantum Key Distribution - Extended Abstract. 282-285
Big Data and Text Mining
- Yanchen Liu, Fang Cao, Masood S. Mortazavi, Mengmeng Chen, Ning Yan, Chi Ku, Aniket Adnaik, Stephen Morgan, Guangyu Shi, Yuhu Wang, Fan Fang:

DCODE: A Distributed Column-Oriented Database Engine for Big Data Analytics. 289-299 - Zhaohao Sun

, Francisca Pambel, Fangwei Wang
:
Incorporating Big Data Analytics into Enterprise Information Systems. 300-309 - Martin Sarnovsky

, Peter Butka
, Peter Bednár
, Frantisek Babic
, Ján Paralic:
Analytical Platform Based on Jbowl Library Providing Text-Mining Services in Distributed Environment. 310-319
Social Impact of EIS and Visualization
- Antonín Pavlícek

, Petr Doucek
:
Corporate Social Responsibility in Social Media Environment. 323-332 - David Kiwana, Björn Johansson

, Sven A. Carlsson:
Usage of Finance Information Systems in Developing Countries: Identifying Factors During Implementation that Impact Use. 333-342 - Lukás Gregorovic, Ivan Polásek

, Branislav Sobota
:
Software Model Creation with Multidimensional UML. 343-352

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














