


default search action
11. IMIS 2017: Torino, Italy
- Leonard Barolli, Tomoya Enokido:

Innovative Mobile and Internet Services in Ubiquitous Computing - Proceedings of the 11th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2017), Torino, Italy, 10-12 July 2017. Advances in Intelligent Systems and Computing 612, Springer 2018, ISBN 978-3-319-61541-7
The 11th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2017)
- Simone Scannapieco

, Claudio Tomazzoli
:
Ubiquitous and Pervasive Computing for Real-Time Energy Management and Saving - A System Architecture. 3-15 - Shinji Sakamoto

, Kosuke Ozera, Tetsuya Oda, Makoto Ikeda, Leonard Barolli:
Performance Evaluation of Intelligent Hybrid Systems for Node Placement in Wireless Mesh Networks: A Comparison Study of WMN-PSOHC and WMN-PSOSA. 16-26 - Masafumi Yamada, Miralda Cuka, Yi Liu, Tetsuya Oda, Keita Matsuo, Leonard Barolli:

Design of a Smart Desk for an IoT Testbed: Improving Learning Efficiency and System Security. 27-35 - Tetsuya Oda, Elis Kulla, Miralda Cuka, Donald Elmazi

, Makoto Ikeda, Leonard Barolli:
Performance Evaluation of a Deep Q-Network Based Simulation System for Actor Node Mobility Control in Wireless Sensor and Actor Networks Considering Different Distributions of Events. 36-49 - Keita Matsuo, Shinji Sakamoto

, Tetsuya Oda, Admir Barolli
, Makoto Ikeda, Leonard Barolli:
Performance Analysis of WMNs by WMN-GA Simulation System for Different WMN Architectures and TCP Congestion-Avoidance Algorithms Considering Exponential and Weibull Distributions. 50-62 - Shoma Takeuchi, Noriki Uchida, Yoshitaka Shibata:

Proposal of Traffic Accident Prevention System with Chronological Variations of Wireless Signals and Sensors on Mobile Nodes. 63-72 - Kosuke Ozera, Takaaki Inaba, Shinji Sakamoto

, Leonard Barolli:
Implementation of a WLAN Triage Testbed Using Fuzzy Logic: Evaluation for Different Number of Clients. 73-86 - Gaku Tsuchiya, Keisuke Ebisu, Makoto Ikeda, Donald Elmazi

, Leonard Barolli, Elis Kulla:
A Fuzzy-Based Testbed for Wireless Sensor and Actuator Networks: Performance Evaluation for Different Remaining Energy of Actuators. 87-97 - Atsuhiro Sawada, Shigenari Nakamura

, Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa
:
Simple Energy-Aware Algorithms to Selecting a Server for Storage and Computation Processes in a Cluster. 98-109 - Emi Ogawa, Shigenari Nakamura

, Makoto Takizawa
:
An Energy-Saving Unicast Routing Protocol in Wireless Ad-hoc Network. 110-120 - Klodiana Goga

, Fatos Xhafa, Olivier Terzo:
Performance Evaluation of Clustering and Collaborative Filtering Algorithms for Resource Scheduling in a Public Cloud Environment. 121-134 - Antonio Messina

, Agnese Augello
, Giovanni Pilato, Riccardo Rizzo
:
BioGraphBot: A Conversational Assistant for Bioinformatics Graph Databases. 135-146 - Markus Aleksy

, Johannes Schmitt:
Utilizing Augmented Reality and Wearables in Industrial Applications. 147-155 - Insu Oh, Yeunsu Lee, Hyeji Lee, Kyungroul Lee, Kangbin Yim:

Security Assessment of the Image-Based Authentication Using Screen-Capture Tools. 156-161 - Malik Ali Judge, Awais Manzoor

, Fahim Ahmed, Saqib Kazmi, Zahoor Ali Khan
, Umar Qasim, Nadeem Javaid
:
Monitoring of Power Transmission Lines Through Wireless Sensor Networks in Smart Grid. 162-170 - Awais Manzoor

, Fahim Ahmed, Malik Ali Judge, Adnan Ahmed
, Mirza Amaad Ul Haq Tahir, Zahoor Ali Khan
, Umar Qasim, Nadeem Javaid
:
User Comfort Oriented Residential Power Scheduling in Smart Homes. 171-180 - Farwa Ahmed, Saba Gul, Muhammad Amir Khalil

, Arshad Sher
, Zahoor Ali Khan
, Umar Qasim, Nadeem Javed:
Two Hop Adaptive Routing Protocol for Underwater Wireless Sensor Networks. 181-189 - Fozia Feroze, Itrat Fatima, Saman Zahoor, Nabeeha Qayyum, Zahoor Ali Khan

, Umar Qasim, Nadeem Javaid
:
User Satisfaction Based Home Energy Management System for Smart Cities. 190-199 - Rabiya Khalid, Samia Abid, Ayesha Zafar, Anila Yasmeen, Zahoor Ali Khan

, Umar Qasim, Nadeem Javaid
:
Fuzzy Energy Management Controller for Smart Homes. 200-207 - Xiaobo Hu, Xinhuai Tang, Feilong Tang:

Analysis of Investment Relationships Between Companies and Organizations Based on Knowledge Graph. 208-218 - Jiacheng Liu

, Feilong Tang, Long Chen, Liang Qiao, Yanqin Yang, Wenchao Xu:
Converging Human Knowledge for Opinion Mining. 219-230 - Huan Yu, Ying Wang, Yaning Fan, Sachula Meng, Rui Huang:

Accuracy Is Not Enough: Serendipity Should Be Considered More. 231-241 - Yaning Fan, Ying Wang, Huan Yu, Baoling Liu:

Movie Recommendation Based on Visual Features of Trailers. 242-253 - Xiaochen Lai, Wenzhe Shi, Lu Liu, Xin Liu, Yu Zhao:

A Study on the Motion Recognition of Basketball Players Based on Unit Gesture Decomposition. 254-265 - Fumiaki Sato:

Indoor Navigation System Based on Augmented Reality Markers. 266-274 - Baojiang Cui, Qi Zhao, Tianyu Liu:

Study on Android Native Layer Code Protection Based on Improved O-LLVM. 275-285 - Yan Zhu, Guidong Zhang, Zhiquan Lai, Boya Niu, Yongjun Shen:

A Two-Tiered Defence of Techniques to Prevent SQL Injection Attacks. 286-295 - Baojiang Cui, Yi Ren, Pin Mao:

The Study and Realization of Browser Defect Detection Technology Based on Intelligent Boundary Reverse. 296-309 - Tianhan Gao, Yanqiang Li, Nan Guo:

An Anonymous Access Authentication Scheme for VANETs Based on ISGS. 310-320 - Valentin Lefils, Gilles Grimaud, Julien Iguchi-Cartigny:

EE-CFI: Externalized Control Flow Integrity for Embedded Devices. 321-329 - Tianhan Gao, Xinyang Deng, Nan Guo:

An Anonymous Authentication Scheme Based on Group IBS for PMIPv6 Network. 330-341 - Mona Nandwani, Rishabh Kaushal

:
Evaluating User Vulnerability to Privacy Disclosures over Online Dating Platforms. 342-353 - Xiaoliang Wang, Xuhui Zhu, Xiaochen Lai, Chi Lin, Shouwei Li:

Application of Improved Software Phase-Locked-Loop in DSTATCOM. 354-363 - Xiaoliang Wang, Xiaochen Lai, Chi Lin, Zhen Xu, Shouwei Li:

Digital Harmonic Detection with Rapid Response and High Steady Precision. 364-373 - Mengyu Gao, Wenan Zhou, Zheng Hu, Wenji Zhang:

A Prospect of Interdisciplinary Methodology of QoE Assessment. 374-384 - Bingqian Li, Wenan Zhou, Xuhui Yang:

A Macro-Assisted Cooperative Edge Caching in Heterogeneous Mobile Networks. 385-394 - Urszula Ogiela, Makoto Takizawa

, Lidia Ogiela:
Security of Selected Secret Sharing Schemes. 395-400 - Alba Amato

, Antonio Coronato:
Supporting Hypothesis Generation by Machine Learning in Smart Health. 401-410
The 11th International Workshop on Advances in Information Security (WAIS-2017)
- Yuanyuan Pan, Yongdong Shi

, Jianqing Li
:
A Novel and Practical Pseudonym Change Scheme in VANETs. 413-422 - Hanqiu Xu, Qingping Wang, Jing Zhou, Ou Ruan:

An Efficient Provably Secure Password-Based Authenticated Key Agreement. 423-434 - Takamichi Saito, Ryohei Hosoya, Koki Yasuda, Kazushi Takahashi, Yuta Tsunoda, Kazuhisa Tanabe, Masayuki Taneoka, Satoshi Yashiro:

Proposal and Implementation of a Countermeasure Against Event Tracking on the Web. 435-444 - Nanda Kumar Thanigaivelan, Ethiopia Nigussie, Seppo Virtanen

, Jouni Isoaho
:
Self-aware Access Control System for Android. 445-454 - Nobuyuki Teraura:

Counterfeit Detection by Smartphone Using Double-Encoded Two-Dimensional Code. 455-466 - Ryuichi Ohori, Satoru Torii:

Suspicious User Detection Based on File Server Usage Features. 467-470
The 7th International Workshop on Mobile Commerce, Cloud Computing, Network and Communication Security (MCNCS-2017)
- Xiu-Shu Zhang, Fang-Yie Leu, Ching-Wen Yang:

Healthcare Based on Cloud Electrocardiogram System: A Medical Center Experience in Middle Taiwan. 473-482 - Sen-Tarng Lai, Fang-Yie Leu:

An Iterative and Incremental Data Preprocessing Procedure for Improving the Risk of Big Data Project. 483-492 - Chien-Hsiang Kao, Fang-Yie Leu:

Prediction of the Fragment of Video Streamed to Mobile Phones Under a 5G Network Base Station. 493-501 - Fang-Yie Leu, Chih-Chung Cheng:

MIH-Based Congestion Control with Seamless Handover in Untrusted Networks. 502-510
The 7th International Workshop on Intelligent Techniques and Algorithms for Ubiquitous Computing (ITAUC-2017)
- Sonia Aimene, Idir Rassoul:

Integration of Ubiquitous Specifications in the Lifecycle of Design Object Oriented. 513-519 - Adia Khalid, Ayesha Zafar, Samia Abid, Rabiya Khalid, Zahoor Ali Khan

, Umar Qasim, Nadeem Javaid
:
Cuckoo Search Optimization Technique for Multi-objective Home Energy Management. 520-529 - Shuqing Wang, Ruotian Yao, Yuexiang Mao:

The Application of Heuristic Neural Network in Speed Estimation of Asynchronous Motor. 530-538 - Yung-Fa Huang

, Tan-Hsu Tan, Yu-Shing Lee, Hsing-Chung Chen:
Performance of Power Allocation of Relay Stations for Cognitive Radio Based Cooperative Communication Systems. 539-546 - Huu-Phuc Dang

, Hong-Nhu Nguyen
, Thanh-Duc Le, Si-Phu Le
, Dinh-Thuan Do
, Jaroslav Zdralek, Miroslav Voznák
:
Enabling D2D Transmission Mode in Cellular Networks: Instantaneous Rate Consideration. 547-553 - Thanh-Duc Le, Hong-Nhu Nguyen

, Si-Phu Le
, Dinh-Thuan Do
, Jaroslav Zdralek, Miroslav Voznák
:
Performance Analysis of Wireless Powered Cognitive Radio Networks. 554-562 - Shian-Shyong Tseng, Yuh-Jye Wang:

A New Collaborative Knowledge Integration Scheme. 563-570
The 7th International Workshop on Future Internet and Next Generation Networks (FINGNet-2017)
- Shama Siddiqui

, Sayeed Ghani, Anwar Ahmed Khan
:
Effect of Polling Interval Distributions on the Performance of MAC Protocols in Wireless Sensor Networks. 573-579 - Jiyoung Lim, Inshil Doh, Kijoon Chae:

Lightweight Authentication for Distributed Mobile P2P Communications. 580-589 - Hae-Duck J. Jeong, Gil-Seong Jeong, Won-Jung Kim, Jinwon Kim, Hanbin Song, Myeong-Un Ryu, Jongsuk R. Lee:

A Search for Computationally Efficient Supervised Learning Algorithms of Anomalous Traffic. 590-600 - Sunghwan Jeong, Jun-Sik Kong, Mye M. Sohn, Hyun Jung Lee:

Ontology Development for Dynamic Service Composition in Cyber-Physical Systems (CPSs). 601-610 - Hyun Jung Lee, Mye M. Sohn:

Cross-Recommendation Depending on Commonly Shared Users' Preferences in IoT Environment. 611-619 - Si-Phu Le

, Hong-Nhu Nguyen
, Thanh-Duc Le, Huu-Phuc Dang
, Dinh-Thuan Do
, Jaroslav Zdralek, Miroslav Voznák
:
Power Beacon-Assisted Relaying Scheme for Cellular Networks: System Model and Performance Analysis. 620-628 - Hong-Nhu Nguyen

, Huu-Phuc Dang
, Thanh-Duc Le, Si-Phu Le
, Dinh-Thuan Do
, Jaroslav Zdralek, Miroslav Voznák
:
On the Outage Probability of Device-to-Device Communication Enabled NOMA. 629-635 - Nguyen Thai Anh, Huu-Phuc Dang

, Hong-Nhu Nguyen
, Thanh-Duc Le, Si-Phu Le
, Dinh-Thuan Do
, Jaroslav Zdralek, Miroslav Voznák
:
Performance Analysis of Device-To-Device Communication Using AF Relaying Under Impact of Co-channel Interferences. 636-644
The 6th International Workshop on Frontiers in Innovative Mobile and Internet Services (FIMIS-2017)
- Jahangir Dadkhah Chimeh, Mojtaba Mazoochi:

Approaching to Mobile 5G Communications. 647-656 - Xuan Guo, Zhiting Xiao, Pin-shan Zeng, Ying Yang:

Terrorists Spatio-Temporal Analysis Based on Social Network Tools. 657-665 - Yonghui Chen, Mingwu Zhang, Chao Xu:

Reliable Homomorphic Matrix Disguising Scheme. 666-675 - Anwar Ahmed Khan

, Sayeed Ghani, Shama Siddiqui
:
Contention Window Prioritization for Heterogeneous Traffic in Wireless Sensor Networks. 676-685 - Huazhong Jin, Feng Guan, Fang Wan, Ou Ruan, Qing Li:

An Optimal Algorithm for Multiscale Segmentation of High Resolution Remote Sensing Image Based on Spectral Clustering. 686-695
The 6th International Workshop on Sustainability Management of e-Business and Ubiquitous Commerce Engineering (SMEUCE-2017)
- Shyh-Weir Tzang

, Yung-Shun Tsai, Chun-Ping Chang, Ya-Ping Yang:
Moving Average Timing Strategy from a Volatility Perspective: Evidence of the Taiwan Stock Market. 699-707 - Yung-Shun Tsai, Chun-Ping Chang, Shyh-Weir Tzang

:
The Impact of Golden Cross and Death Cross Frequency on Stock Returns in Pre- and Post-financial Crisis. 708-713 - Chun-Ping Chang, Yung-Shun Tsai, Shyh-Weir Tzang

:
Managers' Bargaining Power and the Intrinsic Value. 714-719 - Chaio-Hsing Chen, Mei Hua Huang, Perng-Fei Huang, Chiung-Yen Chen:

Investigation into the Relationships Among Sponsorship, Identification and Purchase Intention. 720-729 - Mei-Hua Liao, Xiang-Ling Zhan, Hidekazu Sone:

The Effects of CSR Announcement on Long-Life Business. 730-734 - Chiou-Shya Torng, Ming-Sui Weng, Chai-Ju Lu:

Serious Leisure and Flow Experience of Teenagers - A Case Study on the Activities of Orchestra. 735-740 - Wen-Hsin Huang, Mei-Juh Huang, Mei-Hua Huang:

The Impact of Government Shareholding on Firm Performance: A Corporate Governance Perspective. 741-750 - Chia-Ju Lu, Chiou-Shya Torng:

The Impact of Corporate Social Responsibility and Organization Identification on Employee Engagement. 751-758 - Wen-Hsin Huang, Hsien-Feng Lee:

A Study of Impact of Social Welfare from Public-Private-Partnerships: A Case of Taipei City Youbike. 759-770 - Ying-Li Lin, Li-Yu Lin, Hsiu-Feng Huang:

The Influence of Senior Supervisors' Professional Degree and Their Job Changes and Part-Time Duties on Corporate Performance. 771-780 - Ying-Li Lin, Yu-Ju Chen, Tin-Chang Chang:

Causal Relationship Between Research and Development Input, Research and Development Output, and Corporate Value. 781-787 - Hsiang-Chih Hu, Mei-Ying Chen, Shu-Hui Chuang:

A Study on the Influencing Factors of Consumers Repeat Purchasing Intention in International Travel Fair. 788-794 - Chung-Yi Hsu, Ya-Wen Huang, Shu-Hui Chuang:

Examining the Relationships Among Electronic Word of Mouth, Perceived Value and Risk, and Consumer Purchase Intention. 795-801 - Kuei-Yuan Wang, Chien-Kuo Han, Xiao-Hong Lin, Ming-De Lin:

The Influence of Internationalization on Value Drivers: Song Ho Industrial Corporation, Ltd. vs. Chih Lien Industrial Corporation, Ltd. 802-811 - Kuei-Yuan Wang, Chien-Kuo Han, Xiao-Hong Lin, Chia-Hua Lin:

A Comparative Study of Valuation and Value Drivers in the Textile Industry: Kwang Ming Silk Mill Co., Ltd. vs. Eclat Textile Co., Ltd. 812-820 - Ching-Hui Shih, Chun-Chiu Shao, Yao-Hua Wang:

Study of Social Loafing and Employee Creativity. 821-830 - Pei-Shih Chen, Tin-Chang Chang, Ying-Li Lin:

Customer Satisfaction and Quality of Service Towards Public Servants in a Governmental Education Training Center in Taiwan. 831-840 - Ling-Yi Chou:

The Effect of Flipped Classroom on Self-efficacy and Satisfaction of Computer Auditing. 841-845
The 6th International Workshop on Extending Seamlessly to the Internet of Things (esIoT-2017)
- Francisco D. Acosta

, Miguel A. Wister
, José Adán Hernández-Nolasco
, Pablo Pancardo
:
Moving Smartphones to Send Emergency Messages During Assaults. 849-859 - Borja Bordel, Ramón Alcarria

, Diego Sánchez de Rivera, Antonio Jara
:
Low-Level Service Management in Cyber-Physical Systems. 860-872 - Ramón Alcarria

, Borja Bordel
, Antonio Jara
:
Flexible Service Provision in Context-Aware Cyber-Physical Systems. 873-883 - Audrey Dupont, Yann Bocchi, Gianluca Rizzo

:
NOSE: A NOmadic Scalable Ecosystem for Pervasive Sensing, Computing and Communication. 884-893 - Gianluca Rizzo

, Helmut Neukirchen:
Geo-Based Content Sharing for Disaster Relief Applications. 894-903 - Joanna Alvarado-Uribe

, Andrea Gómez-Oliva, Germán Molina, Miguel González-Mendoza
, María Concepción Parra-Meroño
, Antonio J. Jara
:
Towards the Development of a Smart Tourism Application Based on Smart POI and Recommendation Algorithms: Ceutí as a Study Case. 904-916 - Salvador Pérez, Domenico Rotondi

, Diego Pedone, Leonardo Straniero, Maria José Nuñez
, Fernando Gigante
:
Towards the CP-ABE Application for Privacy-Preserving Secure Data Sharing in IoT Contexts. 917-926
The 3rd International Workshop on Big Data and IoT Security (BDITS-2017)
- Jingling Zhao, Guoxiao Huang, Tianyu Liu, Baojiang Cui:

Software Abnormal Behavior Detection Based on Hidden Markov Model. 929-940 - Jun Yang, Qiyi Tang:

RTF Editor XSS Fuzz Framework. 941-951 - Luca Casati

, Andrea Visconti
:
Exploiting a Bad User Practice to Retrieve Data Leakage on Android Password Managers. 952-958 - Hou Yuan Wei, Hao Yong Le, Xin Shu, Caiyuan Chen:

A Context-Aware Smart Office Application System. 959-966 - Yongle Hao, Ying Hou, Longjie Li:

A Novel Algorithm for Feature Selection Used in Intrusion Detection. 967-974

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














