


default search action
CyberC 2013: Beijing, China
- 2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC 2013, Beijing, China, October 10-12, 2013. IEEE Computer Society 2013, ISBN 978-0-7695-5106-7

Session 1: Encryption, Confidentiality, and Assurance
- Zhiwei Chen, Ruoqing Zhang, Yatao Yang, Zichen Li:

A Homomorphic ElGamal Variant Based on BGN's Method. 1-5 - Rama Roshan Ravan, Norbik Bashah Idris

, Zahra Mehrabani:
A Survey on Querying Encrypted Data for Database as a Service. 14-18 - Chun-I Fan, Pei-Jen Tsai, Jheng-Jia Huang, Wen-Tsuen Chen:

Anonymous Multi-receiver Certificate-Based Encryption. 19-26 - Giedre Sabaliauskaite

, Aditya P. Mathur:
Intelligent Checkers to Improve Attack Detection in Cyber Physical Systems. 27-30 - Tuan T. Tran, Xiaolong Tang, Bin Xie:

Secure Wireless Multicast for Delay-Sensitive Prioritized Data Using Network Coding. 38-45 - Xiang-yu Bai, Yan-Jun Huang:

Security Mechanism for the Interactive Satellite Remote Education System Based on DTN. 46-52 - Yan Sun, Lihua Yin, Licai Liu:

Towards a Trusted Mobile RFID Network Framework. 53-58
Session 2: Authentication, Key, Privacy, and Security
- Liang Shi, Jialan Que, Zhenyu Zhong, Brett Meyer, Patrick Crenshaw, Yuanchen He:

A Scalable Implementation of Malware Detection Based on Network Connection Behaviors. 59-66 - Wentao Kang, Ying Liang:

A Security Ontology with MDA for Software Development. 67-74 - Jianmin Jiang, Lasith Yasakethu

:
Anomaly Detection via One Class SVM for Protection of SCADA Systems. 82-88 - Przemyslaw Blaskiewicz, Marek Klonowski, Krzysztof Majcher, Piotr Syga

:
Blocker-Type Methods for Protecting Customers' Privacy in RFID Systems. 89-96 - Xuan Ding, Wei Wang, Meng Wan, Ming Gu:

Seamless Privacy: Privacy-Preserving Subgraph Counting in Interactive Social Network Analysis. 97-104
Session 3: Distributed and Cloud Computing
- Chao-Yi Chen, Heng-Ming Chen, Jui-Jiun Jian, Chenn-Jung Huang

, Shun-Chih Chang, Yu-Wu Wang, Jhe-Hao Tseng:
Applications of Data Mining to an Asynchronous Argumentation Based Learning Assistance Platform. 105-108 - He Zhao, Chenglei Peng

, Yao Yu, Yu Zhou, Ziqiang Wang, Sidan Du:
Cost-Aware Automatic Virtual Machine Scaling in Fine Granularity for Cloud Applications. 109-116 - K. Rajbabu, Sudha Selvaraj:

DAG Based Feature Additive XML Schema Generation for Unstructured Text. 117-124 - Eddy Caron, Anh Dung Le, Arnaud Lefray, Christian Toinard:

Definition of Security Metrics for the Cloud Computing and Security-Aware Virtual Machine Placement Algorithms. 125-131 - Shengwei Yi, Jize Xu, Yong Peng, Qi Xiong, Ting Wang, Shilong Ma:

Mining Frequent Rooted Ordered Tree Generators Efficiently. 132-139
Session 4: Big Data and Algorithms
- R. Dennis A. Ludena, Alireza Ahrary:

A Big Data Approach for a New ICT Agriculture Application Development. 140-143 - Siham Ouamour-Sayoud

, Halim Sayoud:
Authorship Attribution of Short Historical Arabic Texts Based on Lexical Features. 144-147 - Rob van den Dam:

Big Data a Sure Thing for Telecommunications: Telecom's Future in Big Data. 148-154 - Joni A. Amorim, Sten F. Andler, Per M. Gustavsson

, Oswaldo L. Agostinho:
Big Data Analytics in the Public Sector: Improving the Strategic Planning in World Class Universities. 155-162 - Kshitij A. Doshi, Tao Zhong, Zhongyan Lu, Xi Tang, Ting Lou, Gang Deng:

Blending SQL and NewSQL Approaches: Reference Architectures for Enterprise Big Data Challenges. 163-170 - Sulayman K. Sowe

, Koji Zettsu:
The Architecture and Design of a Community-Based Cloud Platform for Curating Big Data. 171-178 - Qiao Liu, Ping Ji, Yuan Zuo:

Matrix-Query: A Distributed SQL-Like Query Processing Model for Large Database Clusters. 179-185 - Dingyi Yin, Qi Ye:

Robustness of Community Partition Similarity Metrics. 186-193 - Chunlei Chen, Dejun Mu, Huixiang Zhang, Wei Hu:

Towards a Moderate-Granularity Incremental Clustering Algorithm for GPU. 194-201
Session 5: Collaboration, Architecture, and System
- Xingyu Zhou, Liangyu He:

A Virtualized Hybrid Distributed File System. 202-205 - Xiu-xiu Li, Ya-xi He, You-Ling Yu:

Architecture Research and Design Implementation of Multi-data and Multi-path Communication Control System. 206-209 - Hui Peng:

Context Aware Semantic Web Services Description and Match. 210-213 - Guangzhi Zhang, Rongfang Bie:

Discovering Massive High-Value Users from Sina Weibo Based on Quality and Activity. 214-220 - Xinglong Ju

, Youxiang Duan, Cheng Ma, Haiyan Ju:
Predicting Service Execution Time towards a Runtime Monitoring Approach. 221-224 - Ying Liu, Vladimir Vlassov

:
Replication in Distributed Storage Systems: State of the Art, Possible Directions, and Open Issues. 225-232 - Chengpo Mu, Chao Han, Xianlei Zhang, Jiyuan Wang:

A New Approach for Estimating the Infrared Radiative and Simulation. 233-236 - Guangzhi Zhang, Tao Jiang, Rongfang Bie, Xiaochun Liu, Zhichun Wang, Junyang Rao:

The Architecture of ProMe Instant Question Answering System. 237-242 - Zhanlin Ji

, Yongli An, Ivan Ganchev
, Mairtin O'Droma
:
The mServices GUI Architectures Design for the mLearning System. 243-246
Session 6: Design, Implementation, and System Management
- Lin Hong, Mingda Lu, Weiting Hong:

A Business Computing System Optimization Research on the Efficiency of Database Queries. 247-250 - Li Yangqun:

A Light-Weight Rule-Based Monitoring System for Web of Things. 251-254 - Li Zhou, Junshe An:

Design of a RS485-to-1553B Bus Bridge. 255-258 - Ying Wen, Mingqing Xiao:

Diagnosis Rule Mining of Airborne Avionics Using Formal Concept Analysis. 259-265 - Erwin Harahap

, Janaka Wijekoon, Rajitha Tennekoon, Fumito Yamaguchi, Shinichi Ishida, Hiroaki Nishi
:
Distributed Algorithm for Router-Based Management of Replica Server in Next-CDN Infrastructure. 266-272 - Yuzhu Peng, Fanchao Meng, Dianhui Chu:

Electric Power Data Acquisition System Based on Multi-thread Mechanism. 273-276 - Qiuyang Hu, Zaiyue Yang:

Frequency-Estimation-Based Thigh Angle Prediction in Level-Ground Walking Using IMUs. 277-282 - Zhonghai Yang, Sun Ying, Qianqian Zhang:

Management Motivation and Earnings Management Methods. 283-286 - Siham Ouamour-Sayoud

, Halim Sayoud:
Speaker Detection on Telephone Calls Using Fusion between SVMs and Statistical Measures. 287-293 - Jipeng Gao, Gaoming Tang:

Virtual Machine Placement Strategy Research. 294-297 - Cheng Ma, Youxiang Duan, Xinglong Ju

, Fuchang Xu:
WS-S Evaluation Based on User Preferences and Ranking Mechanism. 298-301
Session 7: Smart Sensor Networks
- Nuwan Ganganath

, Chi-Tsun Cheng
:
A 2-Dimensional ACO-Based Path Planner for Off-Line Robot Path Planning. 302-307 - Zhanyang Zhang, Luciana H. Blanco:

A Cluster Based Smart MAC Layer Protocol for Delay-Tolerant Underwater Wireless Sensor Networks. 308-315 - Fulong Jiang, Hao Liu:

An Energy-Efficient Asynchronous MAC for Bulk-Data Collection in Wireless Sensor Networks. 316-319 - Jing Zhang, Erbao He, Xiaoqian Zheng:

Analysis of Image Transmission for Wireless Sensor Networks in the Mine Tunnel. 320-324 - Haitao Bao, Wai-Choong Wong

:
Improved PCA Based Step Direction Estimation for Dead-Reckoning Localization. 325-331 - Mo Haghighi, Chris J. Musselle:

Dynamic Collaborative Change Point Detection in Wireless Sensor Networks. 332-339 - Guorui Li, Ying Wang:

Sketch Based Anomaly Detection Scheme in Wireless Sensor Networks. 344-348 - Chi-Tsun Cheng

, Nuwan Ganganath
:
To Split or Not to Split? From the Perspective of a Delay-Aware Data Collection Network Structure. 349-355 - T. Shivaprakash, K. B. Raja, K. R. Venugopal, S. S. Iyengar

, Lalit M. Patnaik:
Traffic-Differentiated Two-Hop Routing for QoS in Wireless Sensor Networks. 356-363 - Jiuyang Tang, Guoming Tang, Daquan Tang, Weidong Xiao:

UFO: A United Framework for Target Localization in Wireless Sensor Networks. 364-370
Session 8: Network, Services, and Mobile Computing
- Guanghui Wang, Subin Shen:

An Efficient Localization Algorithm Using Sparse Anchors for the Internet of Things. 371-378 - Ji Lu, Zhiyi Zhang, Junfang Wang, Ning Li:

An Efficient Transmission Scheme for OpenFlow Based Wireless Networks. 379-382 - Tiziana Campana, Gregory M. P. O'Hare

:
An Evaluation of Intellectus WSN Monitoring and Debugging Tool Using the Indriya Testbed. 383-391 - Yao Lu, Jianping Chen, Ioan Sorin Comsa, Pierre Kuonen:

Backup Path with Energy Prediction Based on Energy-Aware Spanning Tree in Wireless Sensor Networks. 392-397 - Gang Wang, Yinhui Yang, Qinhua Ren, Runnian Ma:

Efficiency of Command and Control in Cyberspace: Visit from the Perspective of Complexity Theory. 398-401 - Shashikala Tapaswi, Arpit S. Gupta:

Flow-Based P2P Network Traffic Classification Using Machine Learning. 402-406 - Jaechun No, Sung-Soon Park:

MatBall: Matrix-Based File Allocation Method for Hybrid File System. 407-412 - Jieyu Liu, Eckehard Schnieder, Zuoyu Miao:

Message Collision and CSMA/CA Modeling and Simulation by Means of Petri Net. 413-420 - Yi Zheng, Yuwen Wang, Fanji Meng:

Modeling and Simulation of Pathloss and Fading for Air-Ground Link of HAPs within a Network Simulator. 421-426 - Yuzhen Huang, Yunpeng Cheng, Xueqiang Zheng, Jinlong Wang:

Performance Analysis of MRC Diversity for Spectrum Sharing Systems with Imperfect Channel Estimation. 427-432 - Lusheng Wang, Qingfeng Zhou, Hai Lin:

Toward High-Payoff Nash Equilibria for Interference Game between Body Area Networks. 433-437
Session 9: Wireless Network and Communications
- Xuefei Wang, Shan Gao, Qinghua Zhong, Han Zhang:

A Demodulation Technique for High Mobility OFDM Systems. 438-441 - Rong Wang, Tao Zhang, Xinlong Luo

, Dengkun Xiao, Fauzi Fanny:
A Novel Cell Reselection Method in the Scenario of Multi-RAT. 442-447 - Chang-Xing Liu, Jinchun Gao, Yuanan Liu, Gang Xie, Quan Hu:

A Stochastic Cooperative MIMO Channel Model Concerning the Correlation of B-R and R-M. 448-452 - Jie Li, Erling Gong, Zhiqiang Sun, Long Li, Hongwei Xie:

An Interference-Based Distributed TDMA Scheduling Algorithm for Aeronautical Ad Hoc Networks. 453-460 - Guolin Sun, Guisong Liu

, Yao Li, Chuan Xiao:
Context-Aware Optimization on Medium Access Delay for High-Density 802.11n Wi-Fi Network. 461-464 - Wei Feng, Shihang Li:

Energy Efficient Terminal-Discovering in Mobile Delay Tolerant Ad-hoc Networks. 465-470 - Xu Xie, Yufeng Dai, Huaning Wu, Liang Zhou:

Estimating the Loading of Logic Periodic Dipole Antenna with Impedances and Inductors. 471-474 - Zuoyu Miao, Tao Tang, Jieyu Liu:

Performance Analysis of High Speed Rail Wireless Communication Network. 483-489 - Rafik Zitouni

, Stefan Ataman
, Laurent George
:
RF Measurements of the RFX 900 and RFX 2400 Daughter Boards with the USRP N210 Driven by the GNU Radio Software. 490-494
Session 10: Algorithms and Efficiency
- Yongwei Wang, Yunan Liu, Rongcai Zhao, Cheng Si, Shuai Liu:

A Novel Rule Matching Algorithm Based on Improved Twig Pattern. 495-499 - Huaning Wu, Chao Liu

:
Broadband Matching Network Design for Antennas Using Invasive Weed Optimization Algorithm. 500-503 - Chengbing Liu, Xuejia Lai:

Evaluation of Statistical Tests for Randomness Using Conditional Entropy. 504-509 - Zhenghua Shu, Guodong Liu, Zhihua Xie, Zhong Ren, Lixin Gan:

Finite Ridgelet Transform Based Listless Block-Partitioning Image Coding Algorithm. 510-513 - Shaobo Shi, Yue Qi, Qin Wang:

FPGA Acceleration for Intersection Computation in Frequent Itemset Mining. 514-519 - Li Zhou

, Hengzhu Liu:
Mapping DAG to CGRA Using Min-Max Ant Colony System. 520-523 - Bin Guo, Xinzhi Yue, Xiaoyuan Yan:

Tracking the State of Primary Users Based on Purely Discontinuous Markov Process. 524-527

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














