


default search action
24th AINA Workshops 2010: Perth, Australia
- 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2010, Perth, Australia, 20-13 April 2010. IEEE Computer Society 2010, ISBN 978-0-7695-4019-1

IEEE First International Workshop on Socio-Technical Aspects of Mashups
- Sergio Martín

, Manuel Castro, Alex Talevski, Vidyasagar M. Potdar
:
A Middleware for Mobile and Ubiquitous Learning Ecosystems Based on a Reconfigurable Plug-and-Play Architecture: Application to Mashups. 1-6 - Flora Dilys Salim

:
Towards Adaptive Mobile Mashups: Opportunities for Designing Effective Persuasive Technology on the Road. 7-11 - Michele Stecca, Massimo Maresca:

Mashup Patterns from Service Component Taxonomy. 12-17
The Sixth International Symposium on Frontiers of Information Systems and Network Applications (FINA)
Cyber Engineering 1
- Wurong Pan, Xuefen Chi, Lin Guan

, Yining Wang, Xin Gang Wang
:
Evaluation of Error Control Mechanisms Based on System Throughput and Video Playable Frame Rate on Wireless Channel. 18-23 - Kai Hu, Zhe Wang

:
An Analytical Model of k-Ary n-Cube under Spatial Communication Locality. 24-29 - Girish Gokuldasan, Arobinda Gupta:

DTCC: A Distributed Congestion Control Scheme for Connectionless Networks. 30-35 - Yan Yang, Fei Yang, Ailixier Aikebaier, Naixue Xiong, Tomoya Enokido, Makoto Takizawa

:
Performance Evaluation of an Optimized Load Allocation Approach for Web Server Clusters. 36-41
Human Space Computing 1
- Vinicius Garcia de Oliveira, Marcos Rogério Salvador, Daniel Kenji Takayassu, Vinicius Geraldo Felix, Nelson Luis Saldanha da Fonseca

:
Applying Bloom Filter Addressing in Metro Ethernet Network. 42-49 - Ahmed Galib Reza

, Tan Saw Chin, Fouad M. Abbou:
A Selective Minimum Delay Value (SMDV) Algorithm for Packet Contention Resolution in Optical Packet Switching. 50-54 - Putu Dana Karningsih, Berman Kayis, Sami Kara:

Development of SCRIS: A Knowledge Based System Tool for Assisting Organizations in Managing Supply Chain Risks. 55-60 - Yoshitaka Sakurai, Kinshuk, Kouhei Takada, Rainer Knauf, Setsuo Tsuruta:

Enriched Cyberspace through Adaptive Multimedia Utilization for Dependable Remote Collaboration. 61-67
Applications 1
- Rachna Dhand, Gareth Lee, Graeme Cole:

Analytical Temporal Specification Issues for Industrial Control Systems. 68-74 - T. S. Indumathi, T. Srinivas, K. Rajaiah, Velur Rajappa:

Routing Analysis and Flexibility of ROADMs in All Optical Networks. 75-78 - Kwanghoon Pio Kim

, Minseok Oh:
A Workflow Fragmentation Framework for Enterprise Grid Workflow Systems. 79-84
Distributed Networks 1
- Omer Khalid, Ivo Maljevic

, Richard J. Anthony, Miltos Petridis, Kevin Parrott, Markus Schulz:
Deadline Aware Virtual Machine Scheduler for Grid and Cloud Computing. 85-90 - Mohammad Reza Ahmadi, Davood Maleki:

Effect of Virtual Techniques in Data Storage Access. 91-96 - Suresh L, Jay B. Simha, Rajappa Velur:

Generating Optimum Number of Clusters Using Median Search and Projection Algorithms. 97-102
Application 2
- Pijitra Jomsri, Siripun Sanguansintukul, Worasit Choochaiwattana:

A Framework for Tag-Based Research Paper Recommender System: An IR Approach. 103-108 - Rathiah Hashim

, Siti Z. Z. Abidin:
User Interface Development for a Computer-Based User Study: The Universal Model Approach. 109-114 - Xunli Fan, Feng Zheng, Lin Guan

, Xingang Wang
:
NLAR: A New Approach to AQM. 115-120
Security and Privacy
- Scott Loper, S. Kami Makki:

Data Filtering Utilizing Window Indexing. 121-126 - Noriki Uchida, Kazuo Takahata, Yoshitaka Shibata:

Proposal of Transmission Control Methods with Multihopped Environments in Cognitive Wireless Networks. 127-132 - Wen-Fong Wang, Fong-Cheng Lee, Guo-Lung Lu:

A Shared-Memory Design for Crosspoint Buffered Switches under Mixed Uni- and Multicast Traffic. 133-138 - Marc Domingo-Prieto, Joan Arnedo-Moreno, Jordi Herrera-Joancomartí

:
JXTA Security in Mobile Constrained Devices. 139-144
Distributed Networks 2
- Vishal Barot, Robert Harrison, Stuart McLeod:

Distribution of Machine Information Using Blackboard Designed Component for Remote Monitoring of Reconfigurable Manufacturing Systems. 145-151 - Farhad Faghani

, Ghasem Mirjalily
:
Isolated Forwarding Strategy in Ethernet Networks. 152-156 - Jun Sawamoto, Eiji Sugino, Norihisa Segawa, Yuji Wada:

Program Learning Using Static Information and Dynamic Program Execution Slices. 157-162
Human Space Computing 2
- Yasunori Osana, Shin-ichi Kuribayashi:

Enhanced Fair Joint Multiple Resource Allocation Method in All-IP Networks. 163-168 - Ji Qing, Xiaohui Li, Naian Liu, Yongqiang Hei, Guanghui Yu:

A Joint Antenna Selection and Power Allocation Algorithm for CoMP Systems. 169-172 - Masayuki Minoura, Norihiko Shinomiya, Kazuyuki Tajima, Takuya Miyashita, Motoyoshi Sekiya:

An Evaluation Technique Using Network Voronoi Diagram for Balanced Optical Network Design. 173-176
Cyber Engineering 2
- Shiori Toyoshima, Saneyasu Yamaguchi, Masato Oguchi:

Storage Access Optimization with Virtual Machine Migration During Execution of Parallel Data Processing on a Virtual Machine PC Cluster. 177-182 - Kaouthar Fakhfakh, Saïd Tazi, Khalil Drira, Tarak Chaari, Mohamed Jmaiel:

Implementing and Testing a Semantic-Driven Approach Towards a Better Comprehension Between Service Consumers and Providers. 183-188 - Alcides Calsavara, Luiz A. Paula Lima Jr.:

Routing Based on Message Attraction. 189-194 - Arash Rezaei, Hadi Salimi, Mohsen Sharifi

:
Improving Software Dependability Using System-Level Virtualization: A Survey. 195-199
Distributed Networks 2
- Atif Sharif, Vidyasagar M. Potdar

, Rana Fayyaz Ahmad:
Adaptive Channel Coding and Modulation Scheme Selection for Achieving High Throughput in Wireless Networks. 200-207
Security and Privacy 2
- Mohammed A. Alhabeeb, Abdullah Mohammed Almuhaideb

, Phu Dung Le, Bala Srinivasan:
Information Security Threats Classification Pyramid. 208-213 - Yuji Wada, Yuta Watanabe, Keisuke Syoubu, Jun Sawamoto, Takashi Katoh:

Virtual Database Technology for Distributed Database. 214-219 - Fatos Xhafa

, Alexandra Poulovassilis:
Requirements for Distributed Event-Based Awareness in P2P Groupware Systems. 220-225
Security and Privacy 3
- Haruki Ota, Shinsaku Kiyomoto, Toshiaki Tanaka:

Security Verification for Authentication and Key Exchange Protocols, Revisited. 226-233 - Chiou-Yng Lee

, Yu-Hsin Chiu, Jung-Hui Chiu:
Concurrent Error Detection in Shifted Dual Basis Multiplier over GF(2m) Using Cyclic Code Approach. 234-239 - Gerald Quirchmayr, Christopher C. Wills

:
Some Thoughts on the Legal Background of the Continuously Increasing Privacy Risk in Information Systems and on How to Deal with It. 240-244
Cyber Engineering 3
- Tao Yang, Makoto Ikeda, Gjergji Mino, Leonard Barolli, Arjan Durresi, Fatos Xhafa

:
Performance Evaluation of Wireless Sensor Networks for Mobile Sink Considering Consumed Energy Metric. 245-250 - Li-Chi Feng, Hsin-Yang Chen, Tsung-Hsien Li, Jr-Jung Chiou, Chung-Chiu Shen:

Design and Implementation of an IEEE 802.15.4 Protocol Stack in Embedded Linux Kernel. 251-256 - Davi Junio Silva de Oliveira, Nelson Souto Rosa

:
Evaluating Product Line Architecture for Grid Computing Middleware Systems: Uba Experience. 257-262 - Erwin Adi

, Sri Ayu Ningsih:
Ubiquitous Public Transportation Route Guide for a Developing Country. 263-268
Security and Privacy 4
- Takahiro Fujishiro, Akane Sato, Yoko Kumagai, Tadashi Kaji, Kenichi Okada:

Development of Hi-Speed X.509 Certification Path Validation System. 269-274 - Guoyan Zhang:

Practical Threshold One-Time Proxy Signature Scheme. 275-279 - Min-Xiou Chen, Yung-Cheng Chuang:

Supporting Home Security System in OSGi Platform. 280-285 - Markus M. Kohn, Elizabeth Chang

, Achim Karduck, Alex Talevski:
SMART CAMP: Environmental Sustainability Through Intelligent Automation Technologies. 286-292
The Sixth International Workshop on Heterogeneous Wireless Networks (HWISE 2010)
Enabling Technologies
- Jiro Iwashige, Leonard Barolli:

Effects of Diffracted Waves for Perfectly Conducting Wedges in Propagation Path of Wireless Communication. 293-298 - Amjed Majeed, Tanveer A. Zia

:
Multi-set Architecture for Multi-applications Running on Wireless Sensor Networks. 299-304 - Cheng-Chung Lin, Kumbesan Sandrasegaran

, Huda Adibah Mohd Ramli
, Minjie Xue:
Requirement of Handover Modeling in the Downlink 3GPP Long Term Evolution System. 305-310
Applications
- Marcelo H. Vithoft, Altair Olivo Santin

, Cinthia O. de A. Freitas, Heverson Borba Ribeiro:
SP2MS: A MANet-Based P2P Service. 311-316 - Mahdi Jalili

:
A Graph Weighting Method for Reducing Consensus Time in Random Geographical Networks. 317-322 - Ching-Yi Yang, Shou-Chih Lo:

Street Broadcast with Smart Relay for Emergency Messages in VANET. 323-328
Resource Management
- Chien-Yu Wu, Hann-Jang Ho, Sing-Ling Lee:

Cross-Layer Subchannel Assignment with Multicast over WiMAX Networks. 329-334 - Kuo-Hui Yeh, Nai-Wei Lo, Yingjiu Li, Enrico Winata:

An Adaptive n-Resolution Anti-Collision Algorithm for RFID Tag Identification. 335-338 - Kwan-Wu Chin

:
On the Impact of Wi-Fi Multmedia Power Save Mode on the VoIP Capacity of WLANs. 339-344
Session Security in Wireless Systems
- Donglai Sun, Yue Wu, Tian Wu, Yang Liu, Ning Liu, Junhua Tang:

Design and Construction of a Prototype Secure Wireless Mesh Network Testbed. 345-350 - Raihana Ferdous, Vallipuram Muthukkumarasamy, Abdul Sattar

:
Trust Formalization in Mobile Ad-Hoc Networks. 351-356 - Roja Kiran Basukala, Kyu Jin Park, Dong-You Choi, Seung Jo Han:

Secure Mobile IP Communication in Residential Networks. 357-362 - Manjun Zhang, Changxing Pei, Lanjun Dang:

Efficient Mobile IP Registration in Certificateless Signature. 363-366
The Sixth International Symposium on Web and Mobile Information Services (WAMIS 2010)
Web Services
- Chi-Chun Lo, Ding-Yuan Cheng, Chen-Fang Tsai, Kuo-Ming Chao

:
Service Selection Based on Fuzzy TOPSIS Method. 367-372 - Thair Khdour

, Maria Fasli:
A Semantic-Based Web Service Registry Filtering Mechanism. 373-378 - Zakaria Maamar

, Samir Tata, Djamal Benslimane, Philippe Thiran:
How do Goals Drive the Engineering of Capacity-Driven Web Services?. 379-386 - Adeel Shajjar, Hafiz Farooq Ahmad

:
Web Service Provisioning to Nomadic Users Using a Light Weight Multi Agent System. 387-394
The Web and Mobile Applications
- Kaori Kobayashi, Ryong Lee, Kazutoshi Sumiya:

Pros and Cons of Utilizing Mobile Navigation Systems in Pedestrian Way Finding. 395-400 - Shuchih Ernest Chang, Chia-Wei Wang:

Effectively Generating and Delivering Personalized Product Information: Adopting the Web 2.0 Approach. 401-406 - Shuchih Ernest Chang, Ching-Huei Tung:

A Web-Feed Based Service for Enhancing Asynchronous Learning on Personal Computers and Mobile Devices. 407-412 - Basit Qureshi

, Geyong Min, Demetres D. Kouvatsos, Mohammad Ilyas
:
An Adaptive Content Sharing Protocol for P2P Mobile Social Networks. 413-418
Security and Privacy
- Brent Kimpton, Eric Pardede

:
Securing Queries to Outsourced XML Databases. 419-424 - Takeru Inoue, Yohei Katayama, Hiroshi Sato, Noriyuki Takahashi:

iAuth: HTTP Authentication Framework Integrated into HTML Forms. 425-430 - Ha-Thanh Le, Deepak Subramanian, Wen-Jing Hsu, Peter Kok Keong Loh:

Scoring Web-Based Vulnerability Impact Using Property-Based Vulnerability Model. 431-436 - Mohammad Hasan Samadani, Mehdi Shajari, Mohammad Mehdi Ahaniha:

Self-Proxy Mobile Signature: A New Client-Based Mobile Signature Model. 437-442
Data Models and Query Processing
- S. Kami Makki, Matthew Rockey:

Query Visualization for Query Trimming in Semantic Caching. 443-448 - Masaki Kohana, Shusuke Okamoto, Masaru Kamada, Tatsuhiro Yonekura:

Dynamic Data Allocation Scheme for Multi-server Web-Based MORPG System. 449-454 - Abdullah M. Baqasah

, Eric Pardede
:
Managing Schema Evolution in Hybrid XML-Relational Database Systems. 455-460
Web Applications
- Andreas Rusnjak, Marwane El Kharbili, Hristomir Hristov, Andreas Speck:

Managing the Dynamics of E/mCommerce with a Hierarchical Overlapping Business-Value-Framework. 461-466 - Tatsuya Fujisaka, Ryong Lee, Kazutoshi Sumiya:

Detection of Unusually Crowded Places through Micro-Blogging Sites. 467-472 - Chun-Hung Wu, Mei-Ling Chiang

, Tsung-Lin Lu:
Kernel Mechanisms for Supporting Differentiated Services and Content-Aware Request Distribution in Web Clusters Providing Multiple Services. 473-478
Fifth Workshop on Performance Analysis and Enhancement of Wireless Networks (PAEWN-2010)
Algorithms and Protocols
- Wei-Jhih Lin, Kuen-Ding Lin, K. Robert Lai

:
Density Control-Based Algorithms for Dynamic Maintenance in Sensor Networks with Limited Mobility. 479-484
Performance Evaluation and Testing
- Kashif Nisar

, Abas Md Said, Halabi Hasbullah:
Enhanced Performance of Packet Transmission over VoIP Network. 485-490 - Leijia Wu, Abdallah E. Al Sabbagh

, Kumbesan Sandrasegaran
, Maged Elkashlan, Cheng-Chung Lin:
Performance Evaluation on Common Radio Resource Management Algorithms. 491-495 - Daisuke Kasamatsu, Norihiko Shinomiya:

Implementation and Evaluation of Emulator for Testing Service Programs in MANET. 496-501
The Fifth Workshop on Service Oriented Architectures in Converging Networked Environments (SOCNE 2010)
SOA and Embedded Systems
- Stephan Sommer, Andreas Scholz, Irina Gaponova, Alois C. Knoll, Alfons Kemper, Christian Buckl

, Gerd Kainz, Jörg Heuer, Anton Schmitt:
Service Migration Scenarios for Embedded Networks. 502-507 - Sebastian Käbisch, Daniel Peintner, Jörg Heuer, Harald Kosch

:
Efficient and Flexible XML-Based Data-Exchange in Microcontroller-Based Sensor Actor Networks. 508-513 - Guido Moritz, Dirk Timmermann

, Regina Stoll
, Frank Golatowski
:
Encoding and Compression for the Devices Profile for Web Services. 514-519 - Robert Hilbrich

:
An Evaluation of the Performance of DPWS on Embedded Devices in a Body Area Network. 520-525
SOA: Middleware, Platform, and Methodologies
- Oliver Dohndorf

, Jan Krüger, Heiko Krumm, Christoph Fiehe, Anna Litvina, Ingo Lück, Franz-Josef Stewing:
Lightweight Policy-Based Management of Quality-Assured, Device-Based Service Systems. 526-531 - Jürgen Tacken, Stephan Flake, Frank Golatowski

, Steffen Prüter, Carsten Rust, Alexandra Chapko, Andreas Emrich:
Towards a Platform for User-Generated Mobile Services. 532-538
Large-Scale SOA and Cloud Computing
- Amit Sangroya, Kirti Garg, Vasudeva Varma

:
SAGE: An Approach to Evaluate the Impact of SOA Governance Policies. 539-544 - Raphael Zender, Ulrike Lucke, Djamshid Tavangarian:

SOA Interoperability for Large-Scale Pervasive Environments. 545-550 - Martin Randles

, David J. Lamb, A. Taleb-Bendiab:
A Comparative Study into Distributed Load Balancing Algorithms for Cloud Computing. 551-556 - Yi-Heng Feng, C. Joseph Lee:

Exploring Development of Service-Oriented Architecture for Next Generation Emergency Management System. 557-561
Third International Workshop on RFID and WSN and its Industrial Applications
RFID
- Nai-Wei Lo, Kuo-Hui Yeh:

A Secure Communication Protocol for EPCglobal Class 1 Generation 2 RFID Systems. 562-566 - Tongliang Zhang, Feng Wei, Hui Tang, Jianming Cui, Dan Han:

The Performance Analysis Using Multiple Beams for RFID Warehouse Management System. 567-570 - Pritam Gajkumar Shah

, Xu Huang, Dharmendra Sharma
:
Algorithm Based on One's Complement for Fast Scalar Multiplication in ECC for Wireless Sensor Network. 571-576
Wireless Sensor Networks
- Ashish Kumar Singh, Vidyasagar M. Potdar

:
Torpid Mode: Hybrid of Sleep and Idle Mode as Power Saving Mechanism for IEEE 802.16j. 577-582 - Atif Sharif, Vidyasagar M. Potdar

, A. J. D. Rathnayaka:
Priority Enabled Transport Layer Protocol for Wireless Sensor Network. 583-588 - Pritam Gajkumar Shah

, Xu Huang, Dharmendra Sharma
:
Analytical Study of Implementation Issues of Elliptical Curve Cryptography for Wireless Sensor networks. 589-592
The 2010 IEEE International Symposium on Mining and Web (MAW)
Semantic Data Processing
- Dimitrios A. Koutsomitropoulos, Georgia D. Solomou, Tzanetos Pomonis, Panagiotis Aggelopoulos, Theodore S. Papatheodorou:

Developing Distributed Reasoning-Based Applications for the Semantic Web. 593-598 - Si Chen, Gongde Guo, Lifei Chen:

A New Over-Sampling Method Based on Cluster Ensembles. 599-604
Multimedia Mining
- Ahmad Hammoud, Daniel Bourget:

Eye-like Algorithm to produce voice web pages. 605-608 - George Adam, Christos Bouras, Vassilis Poulopoulos

:
Image Extraction from Online Text Streams: A Straightforward Template Independent Approach without Training. 609-614 - Jeremy K. Hall, Shuichi Kurabayashi

, Yasushi Kiyoki:
Multimedia Data Analysis on a Massively Distributed Parallelization Network of Anonymous Web Clients. 615-620 - Larbi Guezouli

, Hassane Essafi:
CASIT: Content Based Identification of Textual Information in a Large Database. 621-625
Web Analysis
- Akira Yamada

, Hara Masanori, Yutaka Miyake:
Web Tracking Site Detection Based on Temporal Link Analysis. 626-631
User Models
- Anwar Alhenshiri, Jack Duffy:

User Studies in Web Information Retrieval: User-Centered Measures in Web IR Evaluation. 632-637 - Ishant Arora, V. K. Panchal:

An MIU [Most Influential Users]-Based Model for Recommender Systems. 638-643
Web and Data Mining
- Yu Zhang, Zhaoqing Wang, Chaolun Xia:

Identifying Key Users for Targeted Marketing by Mining Online Social Network. 644-649
The Third International Symposium on Applications of Ad Hoc and Sensor Networks (AASNET '10)
MAC and Routing Protocols
- Daiki Shitara, Toshiaki Miyazaki, Hidenori Igari:

A Function Alternation Algorithm for Wireless Sensor Networks. 650-655 - Kuei-Ping Shih, Yen-Da Chen, Shu-Sheng Liu:

A Collision Avoidance Multi-channel MAC Protocol with Physical Carrier Sensing for Mobile Ad Hoc Networks. 656-661 - Peter Janacik, Emi Mathews, Dalimir Orfanus:

Self-Organizing Data Collection in Wireless Sensor Networks. 662-667
Power Saving Protocols
- Najmeh Kamyabpour, Doan B. Hoang:

A Hierarchy Energy Driven Architecture for Wireless Sensor Networks. 668-673 - Hossein Memarzadeh, Mehdi Dehghan

, Sam Jabbehdari
:
A New Quorum-Based Power Saving Protocol to Maintain QoS for MANETs with Burst Traffics. 674-679 - Kyung Tae Kim, Chang Hoon Lyu, Sung Soo Moon, Hee Yong Youn:

Tree-Based Clustering(TBC) for Energy Efficient Wireless Sensor Networks. 680-685
Security, Lifetime, Architecture of Sensor Network
- Sourendra Nath Sinha, Zenon Chaczko:

T-SNIPER: Trust-Aware Sensor Network Information Protocol for Efficient Routing. 686-691 - Pardeep Kumar

, Mesut Günes
, Qasim Mushtaq, Jochen H. Schiller
:
Optimizing Duty-Cycle for Delay and Energy Bound WSN Applications. 692-697 - Antônio Vicente Lourenço Dâmaso, Jeisa Pereira de Oliveira Domingues, Nelson Souto Rosa

:
SAGe: Sensor Advanced Gateway for Integrating Wireless Sensor Networks and Internet. 698-703
The Third International Workshop on Disaster and Emergency Information Network Systems (IWDENS 2010)
Disaster Information System
- Hidenori Torii, Jun Sawamoto, Norihisa Segawa, Eiji Sugino, Yukinori Nomura:

Tsunami Early Alert and Evacuation Support System for Fishery Workers by Mobile Phones. 704-709 - Wei Kang, Yoshitaka Shibata:

Performance Evaluation of Disaster Information System Based on P2Pnetwork. 710-715 - Hiroaki Yuze, Naoyoshi Suzuki:

Improvement of the Survivor Information System for University. 716-720 - Toshihiro Suzuki, Yoshitaka Shibata:

Self Power Supplied Wireless Disaster Information Network. 721-726
Disaster Information Network
- Misako Urakami, Yuya Okada, Yasuyuki Niwa, Hisaya Motogi, Hiroshi Matsuno:

Construction of Wireless Network for Information Communication for a Disaster-Affected Island. 727-732 - Goshi Sato, Noriki Uchida, Kazuo Takahata, Yoshitaka Shibata:

Dynamic Network Configuration Method Based Cognitive Radio LANs for Disaster Information System. 733-738 - Kazuo Takahata, Takashi Miura, Noriki Uchida, Yoshitaka Shibata:

Disaster Communication Method Using Electromagnetic Wave Leaking from Wireless LAN System to Outdoors. 739-744
The 2010 IEEE International Workshop on Bioinformatics and Life Science Modeling and Computing (BLSMC 10)
- Hedi Ben Amor, Jacques Demongeot

, Nicolas Glade:
Mnesic Evocation: An Isochron-Based Analysis. 745-750 - Jean Gaudart

, Mohamad Ghassani, Julie Mintsa, Jules Waku, Mustapha Rachdi
, Ogobara K. Doumbo, Jacques Demongeot
:
Demographic and Spatial Factors as Causes of an Epidemic Spread, the Copule Approach: Application to the Retro-prediction of the Black Death Epidemy of 1346. 751-758 - Celine Franco, Jacques Demongeot

, Christophe Villemazet, Nicolas Vuillerme:
Behavioral Telemonitoring of the Elderly at Home: Detection of Nycthemeral Rhythms Drifts from Location Data. 759-766 - Flavien Caraguel, Muhammad Tayyab, Françoise Giroud, Jacques Demongeot

:
Evolution of the Genetic Regulatory Networks: The Example of the Cell Cycle Control Network. 767-774 - Antonio Glaría, Carla Taramasco, Jacques Demongeot

:
Methodological Proposal to Estimate a Tailored to the Problem Specificity Mathematical Transformation: Use of Computer Intelligence to Optimize Algorithm Complexity and Application to Auditory Brainstem Responses Modeling. 775-781 - Jacques Demongeot

, Mathilde Noual, Sylvain Sené:
On the Number of Attractors of Positive and Negative Boolean Automata Circuits. 782-789 - Mourad Benkaci, Bruno Jammes, Andrei Doncescu:

Feature Selection for Medical Diagnosis Using Fuzzy Artmap Classification and Intersection Conflict. 790-795 - Katsumi Inoue

, Andrei Doncescu, Gabriel Synnaeve, Nabil Kabbaj:
Main Pathway Discovery in Metabolic Pathways. 796-801 - Emmanuel Faure, Carla Taramasco, Jacques Demongeot

, Louise Duloquin, Benoit Lombardot, Nadine Peyriéras
, Paul Bourgine:
Global Strategy of Active Machine Learning for Complex Systems: Embryogenesis Application on Cell Division Detection. 802-809
The Fourth International Symposium on Security and Multimodality in Pervasive Environments (SMPE-10)
Wireless Applications
- Ming-Fong Tsai, Naveen K. Chilamkurti, Ce-Kuen Shieh:

Multipath Transmission with Forward Error Correction Mechanism for Delay-Sensitive Video Communications. 810-813 - Dexi Liu, Changxuan Wan, Naixue Xiong, Jong Hyuk Park, Sang-Soo Yeo:

Global Top-k Aggregate Queries Based on X-tuple in Uncertain Database. 814-821
Services in Pervasive Computing
- Jong Sik Moon, Im-Yeong Lee, Kang Bin Yim, Sang-Gu Byeon:

An Authentication and Authorization Protocol Using Ticket in Pervasive Environment. 822-826 - Sun-Myung Hwang:

Quality Metrics for Software Process Certification Based on K-model. 827-830 - Hamed Khiabani, Zailani Mohamed Sidek, Jamalul-lail Ab Manan

:
Towards a Unified Trust Model in Pervasive Systems. 831-835
Human Oriented Interface
- Davrondzhon Gafurov, Einar Snekkenes, Patrick Bours:

Improved Gait Recognition Performance Using Cycle Matching. 836-841 - Yifei Wang, Yao Shen, Minyi Guo, Daqiang Zhang:

A Context Conflict Resolution with Optimized Mediation. 842-847 - Jaesoo Kim, Y. H. Shinn:

An Instructional Strategy Selection Model Based on Agent and Ontology for an Intelligent Tutoring System. 848-853 - Jianxin Li, Bo Li, Linlin Meng, Dazhi Sun:

HiTrust: A Hybrid Tree Based Trust Negotiation Service. 854-859 - Jia Zhang

, Hai-Xin Duan, Wu Liu, Jianping Wu:
Analysis of Anonymity in P2P Anonymous Communication Systems. 860-865
The Fourth International Workshop on Telecommunication Networking, Applications, and Systems (TeNAS 2010)
Network Technologies
- Kashif Kifayat

, Paul Fergus
, Simon Cooper, Madjid Merabti:
Body Area Networks for Movement Analysis in Physiotherapy Treatments. 866-872 - Yan-Bo Wang, Tin Yu Wu, Wei-Tsong Lee, Chih-Heng Ke:

A Novel Geographic Routing Strategy over VANET. 873-879 - Arshad Muhammad

, Paul Fergus
, Madjid Merabti, Bob Askwith:
Peer-to-Peer Overlay Gateway Services for Home Automation and Management. 880-886
Network Applications
- Akihiro Tomono, Minoru Uehara, Yuji Shimada:

A Proposal for Method to Manage License Based on Log. 887-892 - Jen-Wei Hu

, Hui-Min Chen, Te-Lung Liu, Hui-Min Tseng, Daniel Lin, Chu-Sing Yang, C. Eugene Yeh:
Implementation of Alarm Correlation System for Hybrid Networks Based upon the perfSONAR Framework. 893-898 - Nobuyoshi Sato, Toshihiro Takahashi, Akira Tajima, Shouichi Odashima, Jun Suzuki, Taiji Ishikawa, Yoshitoshi Murata:

Improvement and its Evaluation of Worker's Motion Monitor System in Automobile Assembly Factory. 899-904 - Shiori Toyoshima, Saneyasu Yamaguchi, Masato Oguchi:

Storage Access Optimization with Virtual Machine Migration and Basic Performance Analysis of Amazon EC2. 905-910
Mobile Computing
- Shengqiong Wang:

SLA-Based Online Charging Model in Mobile Environment. 911-914 - Minjie Xue, Kumbesan Sandrasegaran

, Huda Adibah Mohd Ramli
, Cheng-Chung Lin:
Performance Analysis of Two Packet Scheduling Algorithms in Downlink 3GPP LTE System. 915-919 - Tor-Morten Grønli, Jarle Hansen, Gheorghita Ghinea:

Android, Java ME and Windows Mobile Interplay: The Case of a Context-Aware Meeting Room. 920-925 - Guan-Hsiung Liaw, Chien-Fu Lee, Jun-Lin Liu:

A Seamless Playback Mechanism for Mobile Multicast Streaming Video in IEEE 802.11-Based Wireless Mesh Networks. 926-931
International Workshop on Data Management for Wireless and Pervasive Communications (DMWPC 2010)
Wireless Sensor Networks
- Ehsan Ahvar:

EDQD: An Energy-Distance Aware Query-Based Data Aggregation Technique for Wireless Sensor Networks. 932-937 - Sami J. Habib, Paulvanna Nayaki Marimuthu:

Incorporating Imprecise Computations in Scheduling of Aggregated Data within Wireless Sensor Networks. 938-943
Data Management and Query Processing
- Yuya Sasaki, Ryo Hagihara, Takahiro Hara, Masako Shinohara, Shojiro Nishio:

A Top-k Query Method by Estimating Score Distribution in Mobile Ad Hoc Networks. 944-949 - Yoshihiro Kosaka, Akimitsu Kanzaki, Takahiro Hara, Shojiro Nishio:

A P2P Network Construction Method Based on Cycle of Sensing in Ubiquitous Sensor Environment. 950-955
Applications
- Daisuke Yamamoto, Kohei Hukuhara, Naohisa Takahashi:

A Focus Control Method Based on City Blocks for the Focus+Glue+Context Map. 956-961 - Luis Carlos Moreno Varandas, Binod Vaidya, Joel José Puga Coelho Rodrigues:

mTracker: A Mobile Tracking Application for Pervasive Environment. 962-967 - Tsuyoshi Hamaguchi, Takuya Komata, Takahiro Nagai, Hiroshi Shigeno:

A Framework of Better Deployment for WLAN Access Point Using Virtualization Technique. 968-973
International Workshop on Bio and Intelligent Computing (BICom 2010)
Technologies for Health Care
- Terry Boyd, Thomas G. Savel, Gautam Kesarinath, Brian Lee

, John Stinn:
The Use of Public Health Grid Technology in the United States Centers for Disease Control and Prevention H1N1 Pandemic Response. 974-978 - Rattiporn Luanrattana, Khin Than Win

, John Fulcher:
Data Security and Information Privacy for PDA Accessible Clinical-Log for Medical Education in Problem-Based Learning (PBL) Approach. 979-984
Intelligent Solutions
- Blesson Varghese, Gerard T. McKee, Vassil Alexandrov

:
Intelligent Agents for Fault Tolerance: From Multi-agent Simulation to Cluster-Based Implementation. 985-990 - Neil C. Rowe, Ahren A. Reed, Jose J. Flores:

Detecting Suspicious Motion with Nonimaging Sensors. 991-996 - Rattiporn Luanrattana, Khin Than Win

, John Fulcher:
A Feasibility of Incorporating PDAs into Problem-Based Learning Approach to Medical Education: An Overview. 997-1004
Enabling Technologies
- Tzu-Ming Wang, Po-Chun Lin, Hung-Lin Chan, Jen-Chi Liao, Tian-Wen Sun, Tin Yu Wu:

Energy Saving of Air Condition Using Fuzzy Control System over Zigbee Temperature Sensor. 1005-1010 - Amiza Amir, Raja Azlina Raja Mahmood

, Asad I. Khan:
A Wheel Graph Structured Associative Memory for Single-Cycle Pattern Recognition within P2P Networks. 1011-1016 - Wen-Sen Lee

:
Choosing Text Description Language Features for Training and Testing Adaptive Resonance Theory: A Case Study for Botanical Classification. 1017-1022
The 2010 IEEE International Workshop on Quantitative Evaluation of Large-Scale Systems and Technologies (QuEST)
Performance Evaluation
- Ricardo Santa

, W. K. Daniel Pun:
Is the Strategic Role of Large-Scale Information Systems an Essential Part of Quantitative Evaluation Process? 1023-1028 - Sayaka Akioka, Yoichi Muraoka:

HPC Benchmarks on Amazon EC2. 1029-1034 - Sudsanguan Ngamsuriyaroj, Rangsan Pornpattana:

Performance Evaluation of TPC-H Queries on MySQL Cluster. 1035-1040
Performance Model
- Michael Horie, Stephen W. Neville, Christopher Mueller, Fiona Warman:

A Framework for Performing Statistical Testing of Distributed Systems. 1041-1046
The First International Workshop on Networking and Games (N&G 2010)
Networking and Games
- Orlando R. E. Pereira, Joel J. P. C. Rodrigues, Abel João Padrão Gomes:

Contributions of Sensor Networks to Improve Gaming Experience. 1047-1052
Online Games and IPTV
- Audrius Jurgelionis, Francesco Bellotti, Alessandro De Gloria, Jukka-Pekka Laulajainen, Philipp Fechteler, Peter Eisert

, Haggai David:
Testing Cross-Platform Streaming of Video Games over Wired and Wireless LANs. 1053-1058 - Paula Prata

, Etelvina Pinho, Eduardo Aires:
Database and State Replication in Multiplayer Online Games. 1059-1064 - João Rodrigues, Paulo Salvador

, António Nogueira
, Joel J. P. C. Rodrigues:
IPTV Service with Automatic Channels Personalization. 1065-1070
Advances in Mobile Computing and Applications: Security, Privacy, and Trust
- Sébastien Gambs, Marc-Olivier Killijian, Miguel Núñez del Prado Cortez

:
GEPETO: A GEoPrivacy-Enhancing TOolkit. 1071-1076 - Johnson I. Agbinya

, Denise Umuhoza:
A New Trust Chain Model. 1077-1084 - Ali Dehghantanha, Nur Izura Udzir

, Ramlan Mahmod:
Towards a Pervasive Formal Privacy Language. 1085-1091 - Raimo Kantola:

Implementing Trust-to-Trust with Customer Edge Switching. 1092-1099 - Amirreza Tahamtan, Johann Eder

:
Privacy Preservation Through Process Views. 1100-1107 - Soichi Sawamura, Ailixier Aikebaier, Tomoya Enokido, Valbona Barolli, Makoto Takizawa

:
Subjective and Objective Types of Trustworthiness in Peer-to-Peer(P2P) Overlay Networks. 1108-1113 - Timothy Stewart French, Nik Bessis

, Carsten Maple:
A High-Level Semiotic Trust Agent Scoring Model for Collaborative Virtual Organsations. 1114-1120 - Jae Wook Woo, Myung Jin Hwang, Chun Gyeong Lee, Hee Yong Youn:

Dynamic Role-Based Access Control with Trust-Satisfaction and Reputation for Multi-agent System. 1121-1126

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














