default search action
10. BWCCA 2015: Krakow, Poland
- Leonard Barolli, Fatos Xhafa, Marek R. Ogiela, Lidia Ogiela:
10th International Conference on Broadband and Wireless Computing, Communication and Applications, BWCCA 2015, Krakow, Poland, November 4-6, 2015. IEEE Computer Society 2015, ISBN 978-1-4673-8315-8
BWCCA 2015
Session 1: Wireless Ad-Hoc and Sensor Networks
- Guanglei Zhang, Bin Dong, Jichuan Zheng:
Visual Sensor Placement and Orientation Optimization for Surveillance Systems. 1-5 - Vinh Hoa La, Ana Rosa Cavalli:
A Comparative Evaluation of Two Intrusion-Tolerant Routing Protocols for Wireless Sensor Networks. 6-12 - Hammad Maqsood, Nadeem Javaid, Muhammad Zain-ul-Abidin, Mudassir Ejaz, Muhammad, Usman Shakeel:
Energy Balanced Interference Aware Energy Efficient Depth Base Routing Protocol for UWSNs. 13-19 - Muhammad, Nadeem Javaid, Sheraz Hussain, Taimur Hafeez, Hammad Maqsood, Syed Zarar:
EEHR: Energy Efficient Hybrid Routing Protocol for Underwater WSNs. 20-26 - Elis Kulla, Makoto Ikeda, Leonard Barolli:
Energy-Aware Actor Selection Methods in WSAN. 27-32 - Seung-Jun Lee, Young Jin Kwon, Doo Seop Yun, Do Hyun Kim:
Design of Parking Assistance System Using Wireless Sensor Networks. 33-37
Session 2: Security and Privacy I
- Yong Yu, Jianbing Ni, Wei Wu, Yilei Wang:
Provable Data Possession Supporting Secure Data Transfer for Cloud Storage. 38-42 - Mimoza Durresi, Arjan Durresi:
Security Based Cyber-Physical Architecture for Environment Protection. 43-50 - Su-Hyun Kim, Im-Yeong Lee:
Data Block Management Scheme Based on Secret Sharing for HDFS. 51-56 - Naoki Takei, Takamichi Saito, Ko Takasu, Tomotaka Yamada:
Web Browser Fingerprinting Using Only Cascading Style Sheets. 57-63 - Baojiang Cui, Mengchen Cao, Shilei Chen, Weikong Qi:
A New Program Classification Method Based on Binary Instrumentation and Instruction Flow Feature Extraction. 64-68
Session 3: Wireless Networks and Applications
- Kui Xu, Wei Xie, Youyun Xu, Dongmei Zhang, Ning Li:
Buffer-Aided Opportunistic Max^2-Min Network Coding for Wireless Data Broadcasting. 69-75 - Jian Wang, Youyun Xu, Kui Xu, Wei Xie:
A Finite Set Network Coding Automatic Repeat Request Scheme for Machine-to-Machine Wireless Broadcasting. 76-81 - Shipeng Yu, Wenan Zhou, Ran Tao, Yanjun Hou:
Modeling for Short-Form HTTP Adaptive Streaming Considering Memory Effect. 82-87 - Baojiang Cui, Yunze Ni, Yilun Fu:
ADDFuzzer: A New Fuzzing Framework of Android Device Drivers. 88-91 - Waleed Alfehaid, Asad I. Khan, Bala Srinivasan, Salem Alkhalaf:
Distributed Pattern Transformation-Invariant Recognition Scheme for Real-Time Sensory Applications. 92-98 - Sheraz Hussain, Nadeem Javaid, Syed Zarar, Muhammad Zain-ul-Abidin, Mudassir Ejaz, Taimur Hafeez:
Improved Adaptive Cooperative Routing in Underwater Wireless Sensor Networks. 99-106
Session 4: Security and Privacy II
- Tomotaka Yamada, Takamichi Saito, Ko Takasu, Naoki Takei:
Robust Identification of Browser Fingerprint Comparison Using Edit Distance. 107-113 - Lifang Han, Tingting Hou, Songling Shan, Yikang Li, Baojiang Cui:
The Research of Aspect-Oriented Dynamic Analysis Based on Static Analysis. 114-119 - Jianfeng Wang, Xiaofeng Chen, Jin Li, Kamil Kluczniak, Miroslaw Kutylowski:
A New Secure Data Deduplication Approach Supporting User Traceability. 120-124 - Donald Elmazi, Takaaki Inaba, Shinji Sakamoto, Tetsuya Oda, Makoto Ikeda, Leonard Barolli:
Selection of Secure Actors in Wireless Sensor and Actor Networks Using Fuzzy Logic. 125-131 - Marcin Piekarczyk, Marek R. Ogiela:
The Touchless Person Authentication Using Gesture-Types Emulation of Handwritten Signature Templates. 132-136
Session 5: Vehicular Networks
- Ilir Shinko, Tetsuya Oda, Evjola Spaho, Vladi Kolici, Makoto Ikeda, Leonard Barolli:
A Simulation System Based on ONE and SUMO Simulators: Performance Evaluation of First Contact, Prophet and Spray-and-Wait DTN Protocols. 137-142 - Tsuyoshi Takahashi, Yoshitaka Shibata, Satoshi Imata, Nobuo Suzuki:
Evaluation of Wake-on-Demand Accurate Activation and In-Vehicle Wireless Connecation Control. 143-149 - Ryo Yanagida, Keiji Obara, Koki Ogawa, Hiroshi Shigeno:
An Analysis of Road Maps Based on Voronoi Diagram for Vehicular Broadcast. 150-156 - Evjola Spaho, Leonard Barolli, Vladi Kolici, Algenti Lala:
Performance Evaluation of Different Routing Protocols in a Vehicular Delay Tolerant Network. 157-162 - Kenta Ito, Go Hirakawa, Goshi Sato, Yoshitaka Shibata:
SDN Based Road Condition Monitoring System for ITS. 163-168
Session 6: Security in Information and Intelligent Knowledge Management
- Lidia Ogiela, Urszula Ogiela:
Information Security in Intelligent Data Management Processes. 169-172 - Ling Li, Junxin Qi, Nan Liu, Lifang Han, Baojiang Cui:
Static-Based Test Case Dynamic Generation for SQLIVs Detection. 173-177 - Jingling Zhao, Kunfeng Xia, Yilun Fu, Baojiang Cui:
An AST-based Code Plagiarism Detection Algorithm. 178-182 - Katarzyna Koptyra, Marek R. Ogiela:
Fuzzy Vault Schemes in Multi-secret Digital Steganography. 183-186 - Baojiang Cui, Shengbo Feng, Qinshu Xiao, Ming Li:
Detection of LTE Protocol Based on Format Fuzz. 187-192 - Yi Liu, Shinji Sakamoto, Leonard Barolli, Evjola Spaho, Makoto Ikeda, Fatos Xhafa:
Effects of Security on Reliability of JXTA-Overlay P2P Platform a Comparison Study for Two Fuzzy-Based Systems. 193-200
Session 7: Wireless Mesh Networks and Mobile Networks
- Tetsuya Oda, Donald Elmazi, Taro Ishitaki, Admir Barolli, Keita Matsuo, Leonard Barolli:
Experimental Results of a Raspberry Pi Based WMN Testbed for Multiple Flows and Distributed Concurrent Processing. 201-206 - Admir Barolli, Tetsuya Oda, Keita Matsuo, Makoto Ikeda, Leonard Barolli, Makoto Takizawa:
Experimental Results of a Raspberry Pi Based WMN Testbed for Different OSs in Indoor Environment Considering LoS Scenario. 207-212 - Shinji Sakamoto, Tetsuya Oda, Makoto Ikeda, Leonard Barolli, Fatos Xhafa:
A PSO-based Simulation System for Node Placement in Wireless Mesh Networks: Evaluation Results for Different Replacement Methods. 213-219 - Christos Bouras, Georgios Diles, Vasileios Kokkinos, Andreas Papazois:
Optimizing Hybrid Access Femtocell Clusters in 5G Networks. 220-226 - Oluyomi Simpson, Yusuf Abdulkadir, Yichuang Sun, Baoyong Chi:
Relay-Based Cooperative Spectrum Sensing with Improved Energy Detection In Cognitive Radio. 227-231 - Usman Shakeel, Nadeem Javaid, Mudassir Ejaz, Syed Zarar, Taimur Hafeez, Muhammad:
Improved Interference Aware EEDBR Protocol for Underwater Wireless Sensor Networks. 232-239
Session 8: Multimedia and Web Applications
- Dan Hu, Xingshe Zhou, Xiaohao Yu, Zhiqiang Hou:
Study on Deep Learning and Its Application in Visual Tracking. 240-246 - Tomasz Hachaj, Marek R. Ogiela, Katarzyna Koptyra:
Human Actions Modelling and Recognition in Low-Dimensional Feature Space. 247-254 - Toshiyuki Haramaki, Hiroaki Nishino:
A Device Identification Method for AR-based Network Topology Visualization. 255-262 - Tetsuya Oda, Donald Elmazi, Taro Ishitaki, Keita Matsuo, Makoto Ikeda, Leonard Barolli:
Implementation and Experimental Results of a Raspberry Pi and OLSR Based Wireless Content-Centric Network Testbed. 263-268 - Asma Musabah Alkalbani, Ahmed Mohamed Ghamry, Farookh Khadeer Hussain, Omar Khadeer Hussain:
Blue Pages: Software as a Service Data Set. 269-274
Session 9: Cluster and Energy-Aware Computing
- Tomoya Enokido, Makoto Takizawa:
Power Consumption Model of a Server to Perform Communication Type Application Processes on Virtual Machines. 275-282 - Dilawaer Duolikun, Hiroki Kataoka, Shigenari Nakamura, Tomoya Enokido, Makoto Takizawa:
Energy-Aware Migration and Replication of Processes in a Cluster. 283-287 - Hiroki Kataoka, Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa:
Energy-Efficient Virtualisation of Threads in a Server Cluster. 288-295 - Yiqun Yang, Wenjie Zhang, Chai Kiat Yeo:
Modelling Calcium Signaling with a Two-Layer Cluster-Based Communication Network System. 296-303 - Taimur Hafeez, Nadeem Javaid, Usman Shakeel, Muhammad, Sheraz Hussain, Hammad Maqsood:
An Energy Efficient Adaptive Cooperative Routing Protocol for Underwater WSNs. 304-310 - Muhammad Waqas Khan, Anzar Mahmood, Muhammad Hussain Ayaz, Muhammad Waseem, Sohail Razzaq, Nadeem Javaid:
Optimized Energy Management System Using Electric Water Heater. 311-317
Session 10: Network Protocols and Resource Management
- Tokumasa Hiraoka, Junichi Funasaka:
A Progressive Download Method Using Multiple TCP Flows on Multiple Paths. 318-324 - Mohammad Javad Shamani, Weiping Zhu, Vahid Naghshin:
TMPTCP: Tailless Multi-path TCP. 325-332 - Shigenari Nakamura, Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa:
Role Safety in a Flexible Read-Write Abortion Protocol. 333-340 - Hui Tian, Youyun Xu, Kui Xu, Xingkang Hou, Xiaochen Xia, Wenfeng Ma:
Differential Multiply-and-Forward and Selective Combining Based Multi-relay TDBC Protocol. 341-346 - Savvas Charalambides, Michael Georgiades, Georgios Dimosthenous, Dora Christofi:
Investigating an ISP's Core Network in 2014. 347-352 - Christos Bouras, Georgios Diles:
Resource Management in 5G Femtocell Networks. 353-358
CWECS 2015 Workshop
Session 1: Cloud, Wireless and e-Commerce Security
- Jun Yang, Yong Guo, Zijing Cheng, Kai Lin, Baojiang Cui:
Space Time Protocol Based on IEEE1588. 359-363 - Peixin Chen, Xiaofeng Wang, Baokang Zhao, Hao Sun, Jinshu Su, Ilsun You:
An Escrow-Free Hierarchical Identity-Based Signature Scheme from Composite Order Bilinear Groups. 364-369 - Baokang Zhao, Bo Liu, Chunqing Wu, Wanrong Yu, Ilsun You:
A Tutorial on Quantum Key Distribution. 370-374 - Junho Choi, Chang Choi, Htet Myet Lynn, Pankoo Kim:
Ontology Based APT Attack Behavior Analysis in Cloud Computing. 375-379 - Fang-Yie Leu, Sheng-Chieh Chuang:
Cluster-RLM: Establishing a Routing Path with Cluster-Based Redundant Link Minimization in Wireless Sensor Networks. 380-385 - Sen-Tarng Lai, Fang-Yie Leu:
Applying Continuous Integration for Reducing Web Applications Development Risks. 386-391
LSNA 2015 Workshop
Session 1: Network Technologies and Applications
- Yue Li, Shunchen Yang:
Research on Cluster Head Selection Algorithm Based on QoS Constraints in Mobile Ad Hoc Networks. 392-395 - Chen Xuan:
An Improved Clustering Algorithm for Mixed Attributes Data Based on K-prototypes Algorithm. 396-399 - Xiaomei Yu, Yongqin Li, Hong Wang:
Mining Approximate Frequent Patterns from Noisy Databases. 400-403 - Baofang Hu:
A Cultural Algorithm Based on Artificial Bee Colony Optimization for Community Detection in Signed Social Networks. 404-409 - Zhen-Xing Zhang, Joon S. Lim:
Ventricular Fabrication Prediction Approach Based on Cloud-Mobile Healthcare Platform. 410-413
Session 2: Security and Trust
- Jun Ye, Meixia Miao, Peng Chen, Xiaofeng Chen:
Request-Based Comparable Encryption Scheme with Multiple Users. 414-416 - Yixiao Zhu, Liang Liu, Xiaofeng Chen:
Efficient First-Price Sealed-Bid Auction Protocols from Modified Comparable Encryption. 417-421 - Yang Rui-xia:
Design of Secure Mobile Payment System Based on IBC. 422-425 - Yunqi Dou, Jiang Weng, Chuangui Ma, Fushan Wei:
Fast Scalar Multiplication Algorithm Using Constrained Triple-Base Number System and Its Applications. 426-431 - Fang Zhifeng, Zhang Kun:
A Novel Trust Management Mechanism for Mobile Ad Hoc Networks Based on Grey Theory. 432-436
MAPWC 2015 Workshop
Session 1: Methods and Protocols for Wireless and Mobile Networking
- Takaaki Inaba, Shinji Sakamoto, Tetsuya Oda, Leonard Barolli:
Performance Evaluation of a Secure Call Connection Admission Control for Wireless Cellular Networks Using Fuzzy Logic. 437-441 - Makoto Ikeda, Keisuke Ebisu, Yuki Sakai, Donald Elmazi, Leonard Barolli, Elis Kulla:
Performance Evaluation of a Fuzzy-Based Wireless Sensor and Actuator Network Testbed for Object Tracking. 442-447 - Taro Ishitaki, Tetsuya Oda, Leonard Barolli:
Application of Neural Networks and Friedman Test for User Identification in Tor Networks. 448-454 - Hiroshi Maeda, Yuting Bao:
Numerical Analysis of Cavities in Photonic Crystal Waveguide for Filtering. 455-459
MNSA 2015 Workshop
Session 1: Network Models and Protocols
- Alda Xhafa, Evjola Spaho, Donald Elmazi, Makoto Takizawa:
A Study on Performance of Hill Climbing for Router Placement in Wireless Mesh Networks. 460-465 - Noriki Uchida, Kenta Ito, Go Hirakawa, Yoshikazu Arai, Yoshitaka Shibata:
Vehicle-to-Vehicle Delay Tolerant Networks with Area of Interest for Road Surveillance System. 466-471 - Atsuhiro Sawada, Hiroki Kataoka, Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa:
Power Consumption and Computation Models of a Storage Server. 472-477 - Satoru Izumi, Asato Edo, Toru Abe, Takuo Suganuma:
An Adaptive Multipath Routing Scheme Based on SDN for Disaster-Resistant Storage Systems. 478-483 - Hiroki Sugiyama, Makoto Takizawa:
Reliable and Efficient Parallel Transmission Protocols in P2P Networks. 484-489
Session 2: Multimedia Systems and Applications
- Guangjie Kou, Yunyan Ma:
Color Image Authentication Method Based on Triple-Channel Spiking Cortical Model. 490-493 - Lidia Ogiela, Marek R. Ogiela:
Semantic Data Analysis Algorithms Supporting Decision-Making Processes. 494-496 - Noriyasu Yamamoto:
Performance Evaluation of an Active Learning System to Improve Students Self-Learning and Concentration. 497-500 - Jun Zhao, Hong Wang:
Microblog Orientation Analysis Based on Connnectives. 501-506 - Qian Shen, Chanjuan Liu, Hailin Zou, Ying Liu, Tongtong Chen:
SURF Feature Description Method of Color Image Based on Quaternion. 507-511
NGWMN 2015 Workshop
Session 1: Wireless Networks
- Qiang Lin, Guowei Wu, Qing Liu:
EDP: A Wireless Network Control System Energy-Efficient Real-Time Task Scheduling Algorithm. 512-517 - Jyu-Wei Wang:
Cooperative Spectrum Sensing in Cognitive Radio Networks Using Hidden Markov Model. 518-521 - Xiaochen Lai, Guoqiao Zhou, Chi Lin, Kangbin Yim:
Event-Driven Gait Recognition Method Based on Dynamic Temporal Segmentation. 522-527 - Je-sung Jeon, Youngsun Kong, Yunyoung Nam, Kangbin Yim:
An Indoor Positioning System Using Bluetooth RSSI with an Accelerometer and a Barometer on a Smartphone. 528-531
Session 2: Security and Resource Management
- Seongmin Park, Sekwon Kim, Kyungho Son, Hwankuk Kim:
Security Threats and Countermeasure Frame Using a Session Control Mechanism on VoLTE. 532-537 - Hsing-Chung Chen:
A Hierarchical Virtual Role Assignment for Negotiation-Based RBAC Scheme. 538-543 - DaeWon Lee, Kangbin Yim, HwaMin Lee:
Proxy Based Resource Management Scheme in IoT Environment. 544-546 - Kyungroul Lee, Hyeungjun Yeuk, Habin Lim, Kangbin Yim:
Security Threats to the Platform Identification. 547-550
RI3C 2015 Workshop
Session 1: Robotics and Support Systems
- Chihiro Suwa, Kaoru Fujioka:
A Cellular Automaton Model of Traffic with Railroad Crossing. 551-554 - Rachanart Soontornvorn, Sarayoot Pongkarn, Hiroyuki Fujioka:
A Development of AR Calligraphy Skill Training System Using Dynamic Font. 555-558 - Tatsushi Tokuyasu, Shota Okamoto, Shimpei Matsumoto, Takako Otabe, Sen Takematsu, Takanori Tanaka:
Proposal of Design Support System of Pedestrian Space Based on Psychological Assessment. 559-562 - Keita Matsuo, Leonard Barolli:
Design and Implementation of an Omnidirectional Wheelchair for Playing Badminton. 563-567
SCC 2015 Workshop
Session 1: Cloud Computing and Algorithms
- Jianfeng Wang, Xiaofeng Chen, Jin Li:
Verifiable Search for Dynamic Outsourced Database in Cloud Computing. 568-571 - Qin Zou, Jianfeng Wang, Xiaofeng Chen:
Secure Encrypted Image Search in Mobile Cloud Computing. 572-575 - Zhen-Xing Zhang, Joon S. Lim:
Emotion Recognition Algorithm Based on Neural Fuzzy Network and the Cloud Technology. 576-579 - Lan Gao:
Research on the Application of an Improved Shortest Path Algorithmin Public Transport System. 580-582 - Xue Zhang:
The Enterprise Personnel Management System Based on B/S Design. 583-586 - Tongtong Chen, Chanjuan Liu, Xinmiao Ding, Hailin Zou, Qian Shen, Ying Liu:
A Multi-instance Multi-label Learning Algorithm Based on Feature Selection. 587-590
Session 2: Network Virtualization and Natural Language Processing
- Tao Huang, Xiaodong Yan:
Research on Construction of Tibetan Sentiment Corpus. 591-593 - Xiaodong Yan, Tao Huang:
Tibetan Sentence Sentiment Analysis Based on the Maximum Entropy Model. 594-597 - Ya-zhou Li, Xiang-Wei Zheng, Dianjie Lu:
Virtual Network Embedding Based on Multi-objective Group Search Optimizer. 598-601 - Hai-lin Zhu:
A Virtual Network Reconfiguration Algorithm to Improve Acceptance Ratio. 602-604 - Zhenhua Chen, Xiang-wei Zheng, Xi-bin Chen:
A Virtual Network Reconfiguration Algorithm Oriented to Energy Consumption. 605-609 - Zhen Zhang, Lirong Qiu:
A Semantic Orientation Distinction Method for Opinion Mining in Tibetan Language. 610-613
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.