default search action
29th AINA 2015: Gwangju, South Korea - Workshops
- Leonard Barolli, Makoto Takizawa, Fatos Xhafa, Tomoya Enokido, Jong Hyuk Park:
29th IEEE International Conference on Advanced Information Networking and Applications Workshops, AINA 2015 Workshops, Gwangju, South Korea, March 24-27, 2015. IEEE Computer Society 2015, ISBN 978-1-4799-1775-4
The Eighth International Workshop on Bio and Intelligent Computing (BICom-2015)
Session 1: Wearable and Mobile Computing
- Tae-Young Kim, Yun-Hong Noh, Do-Un Jeong:
Template Matching Compression Algorithm for Wearable ECG Measurement System Based on Multi Wireless Transmission Platform. 1-5 - Byeong-Gu Ahn, Yun-Hong Noh, Do-Un Jeong:
Implementation of the Variable ECG Data Packet Transmission System with Activity State. 6-10 - Byeong-Hoon Kim, Yun-Hong Noh, Do-Un Jeong:
A Wearable ECG Monitoring System Using Adaptive EMD Filter Based on Activity Status. 11-16 - Baojiang Cui, Ziyue Wang, Jun Yang, Xiaofeng Chen:
Design and Analysis of an Enhanced Secure Mechanism of LLRP in RFID Systems. 17-21 - Chen Yang, Bo Qin, Xiuwen Zhou, Yang Sun, Shuangyu He, Qianhong Wu:
Privacy-Preserving Traffic Monitoring in Vehicular Ad Hoc Networks. 22-24
Session 2: Healthcare and Smart Environments
- Young-Sil Lee, Bruce Ndibanje, Non Thiranant, Esko Alasaarela, Hoon-Jae Lee:
Hybrid Cloud Service Based Healthcare Solutions. 25-30 - Andy Harris, Arjan Durresi, Mihran Tuceryan, Tamara S. Hannon:
Integrated and Personalized Diabetes Coach for Children. 31-35 - Anzar Mahmood, Ashfaq Ahmad, H. T. Javed, Z. Mehmood, Zahoor Ali Khan, Umar Qasim, Nadeem Javaid:
A Survey of 'User Comfort' in Home Energy Management Systems in Smart Grid. 36-43 - Tatsushi Tokuyasu, Takaaki Nakayama, Kazuhiko Toshimitsu, Kazutoshi Okamura, Kazunori Yoshiura:
Development of Virtual Palpation System for Dental Education. 44-48 - Keita Matsuo, Yi Liu, Donald Elmazi, Leonard Barolli, Kazunori Uchida:
Implementation and Evaluation of a Small Size Omnidirectional Wheelchair. 49-53
Session 3: Intelligent Comuting
- Takaaki Inaba, Donald Elmazi, Yi Liu, Shinji Sakamoto, Leonard Barolli, Kazunori Uchida:
Integrating Wireless Cellular and Ad-Hoc Networks Using Fuzzy Logic Considering Node Mobility and Security. 54-60 - Nayong Kim, Richard Platania, Wei Huang, Chris Knight, Tom Keyes, Seung-Jong Park, Joohyun Kim:
Enabling Large-Scale Biomolecular Conformation Search with Replica Exchange Statistical Temperature Molecular Dynamics (RESTMD) over HPC and Cloud Computing Resources. 61-66 - Taro Ishitaki, Donald Elmazi, Yi Liu, Tetsuya Oda, Leonard Barolli, Kazunori Uchida:
Application of Neural Networks for Intrusion Detection in Tor Networks. 67-72 - Jun Ye, Xiaofeng Chen, Jianfeng Ma:
An Improved Algorithm for Secure Outsourcing of Modular Exponentiations. 73-76
The Third International Workshop on Collaborative Enterprise Systems (COLLABES-2015)
Session 1: Business Intelligence and Secure Systems
- Paulo R. M. Andrade, Renanh G. Araujo, Jose Cronemberger Filho, Tiago R. Pereira, Adriano Bessa Albuquerque, Nabor C. Mendonça:
Improving Business by Migrating Applications to the Cloud Using Cloudstep. 77-82 - Jiafei Wen, Xiaolong Wu, Shui Lam:
Implementation of a Collaborative Document Processing in the Cloud. 83-88 - Jun Yang, Chuan Fu, Nan Shen, Zheli Liu, Chunfu Jia, Jin Li:
General Multi-key Searchable Encryption. 89-95 - Xiaoqing Tan, Siting Cheng, Jin Li, Zhihong Feng:
Quantum Key Distribution Protocol Using Quantum Fourier Transform. 96-101
Session 2: Intelligent Data Processing
- Chao-Tung Yang, Wei-Hsiang Lien, Yu-Chuan Shen, Fang-Yie Leu:
Implementation of a Software-Defined Storage Service with Heterogeneous Storage Technologies. 102-107 - Wisarut Suesuwan, Woraphon Lilakiatsakun:
Optimize Auction Bandwidth in Content Centric Network with Provider Portal for Application. 108-116 - S. Imran, Nasrullah Khan:
Experimental Study of Borehole Logs for Oil and Gas Exploration. 117-122
The Second International Workshop on Device Centric Cloud (DC2-2015)
Session 1: Device Centric Cloud I
- Zheng Hao, Deng Xiaotao, Yu Lei, Zhang Jie, Inchul Hwang, Sunhee Youm:
Contextual User Interest Modeling Approaches for Personalized Services on Multiple Devices. 123-130 - Sejun Lee, Jaehoon Jeong, Jung-Soo Park:
DNS Name Autoconfiguration for IoT Home Devices. 131-134 - Antonio Carnielli, Mahdi Aiash:
Will ToR Achieve Its Goals in the "Future Internet"? An Empirical Study of Using ToR with Cloud Computing. 135-140 - Jihyeok Seo, Jaehoon Jeong, Hyoungshick Kim, Jung-Soo Park:
SBUS: Smart e-Bus Battery Substitution Scheme in Vehicular Networks. 141-145
Session 2: Device Centric Cloud II
- Mahdi Daghmechi Firoozjaei, Jaegwan Yu, Hyoungshick Kim:
Privacy Preserving Nearest Neighbor Search Based on Topologies in Cellular Networks. 146-149 - Jaehoon Jeong, Jihyeok Seo, Geumhwan Cho, Hyoungshick Kim, Jung-Soo Park:
A Framework for Security Services Based on Software-Defined Networking. 150-153 - Mahdi Aiash, Robert Colson, Mohammad Muneer Kallash:
Introducing a Hybrid Infrastructure and Information-Centric Approach for Secure Cloud Computing. 154-159 - Hyunsu Jang, Jaehoon Jeong, Hyoungshick Kim, Jung-Soo Park:
A Survey on Interfaces to Network Security Functions in Network Virtualization. 160-163
The Second International Workshop on Engineering Energy Efficient WSNs (EEEWSN-2015)
Session 1: Applications of WSNs and Network Protocols
- Krishna Doddapaneni, Purav Shah, Enver Ever, Ali Tasiran, Fredrick A. Omondi, Leonardo Mostarda, Orhan Gemikonakli:
Packet Arrival Analysis in Wireless Sensor Networks. 164-169 - Nueraili Aierken, Roberto Gagliardi, Leonardo Mostarda, Zaib Ullah:
RUHEED-Rotated Unequal Clustering Algorithm for Wireless Sensor Networks. 170-174 - Fredrick A. Omondi, Purav Shah, Orhan Gemikonakli, Enver Ever:
A Framework for Energy Based Performability Models for Wireless Sensor Networks. 175-180 - Vu Tran-Ha, Quang-Doanh Vu, Een-Kee Hong:
Time Reversal-Based Transmissions with Distributed Power Allocation for Two-Tier Networks. 181-186 - Flavio Corradini, Rosario Culmone, Leonardo Mostarda, Luca Tesei, Franco Raimondi:
A Constrained ECA Language Supporting Formal Verification of WSNs. 187-192 - Nadeem Qaisar Mehmood, Rosario Culmone:
An ANT+ Protocol Based Health Care System. 193-198
The Eleventh International Symposium on Frontiers of Information Systems and Network Applications (FINA-2015)
Session 1: Distributed Applications and Software Engineering
- Noriyasu Yamamoto:
An Active Learning System Using Smartphone for Improving Students Learning Concentration. 199-203 - Guixian Xu, Lirong Qiu:
Technology Research of Tibetan Hot Topics Extraction. 204-208 - Yeqing Li, Xiaoyu Qiu:
Word Sense Disambiguation Based on Feature Ranking Graph. 209-212 - Yeqing Li:
Named Entity Relation Extraction Based on Multiple Features. 213-216
Session 2: Energy-Aware Information Systems
- Hiroki Kataoka, Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa:
Power Consumption and Computation Models of a Server with a Multi-core CPU and Experiments. 217-222 - Chao-Tung Yang, Chih-Liang Chuang, Jung-Chun Liu, Chien-Chih Chen, William C. Chu:
Implementation of Cloud Infrastructure Monitor Platform with Power Saving Method. 223-228 - Ashfaq Ahmad, Nadeem Javaid, Umar Qasim, Zahoor Ali Khan:
Demand Response: From Classification to Optimization Techniques in Smart Grid. 229-235 - Ken Nishimura, Kaoru Sugita:
Implementation of Application Softwares for Reducing Power Consumption in Web Services. 236-241 - (Withdrawn) Secure Two-Party Computation in Social Cloud Based on Reputation. 242-245
Session 3: Scalable Computing Systems and Protocols
- Weng Yu:
e-MinZu: A Software Service Architecture Based on Saas for Massive Data Source. 246-249 - Shaojing Li, Wanli Su, Haoling Li:
The Research of Security of P2P Network File Sharing System. 250-254 - Petra Perner:
New Methods for Big Data Analysis in Images. 255-260 - David Murray:
Why Internet Protocols Need Incentives. 261-266 - Samia Dardouri, Ridha Bouallegue:
A New Scheduling Algorithm for Real-Time Communication in LTE Networks. 267-271 - Kazuaki Kouno, Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa:
Broadcast Protocols in Wireless Networks. 272-277
Session 4: Security and Privacy
- Non Thiranant, Young-Sil Lee, Hoon-Jae Lee:
Performance Comparison Between RSA and Elliptic Curve Cryptography-Based QR Code Authentication. 278-282 - Jiana Meng, Jun Guo:
Analysis of Researcher Co-authorship Network. 283-286 - Pengtao Liu, Chengyu Hu, Shanqing Guo, Yilei Wang:
Anonymous Identity-Based Encryption with Bounded Leakage Resilience. 287-292 - Tao Li, Hao Yang, Yilei Wang, Qiuliang Xu:
The Electronic Voting in the Presence of Rational Voters. 293-296
The Eleventh International Workshop on Heterogeneous Wireless Networks (HWISE-2015)
Session 1: Wireless Sensor Networks
- Naveed Ilyas, Nadeem Javaid, Zafar Iqbal, Muhammad Imran, Zahoor Ali Khan, Umar Qasim, Muhammad Shoaib:
Extended Lifetime Based Elliptical Sink-Mobility in Depth Based Routing Protocol for UWSNs. 297-303 - Donald Elmazi, Elis Kulla, Tetsuya Oda, Evjola Spaho, Leonard Barolli, Kazunori Uchida:
Selection of Actor Nodes in Wireless Sensor and Actor Networks: A Fuzzy Based Method Considering Actor Mobility. 304-310 - Sahar Rahim, Muhammad Hassan Rahim, Rahim Dad Khan, Muhammad Zain Siddiqi, M. A. Qureshi, Umar Qasim, Zahoor Ali Khan, Shaharyar Mahmood, Nadeem Javaid:
Circular Joint Sink Mobility Scheme for Wireless Sensor Networks. 311-319 - Ayesha Hussain Khan, Nadeem Javaid, Muhammad Imran, Zahoor Ali Khan, Umar Qasim, Noman Haider:
DYN-NbC-JSM: Dynamic Joint Sink Mobility with Need-Based Clustering in WSNs. 320-325 - Mimoza Durresi, Arjan Durresi, Leonard Barolli, Kazunori Uchida:
Using Cellular Sensor Networks for Environment Protection. 326-331
Session 2: Wireless Network Algorithms and Performance Analysis
- Parampreet Sidhu, Isaac Woungang, Glaucio H. S. Carvalho, Alagan Anpalagan, Sanjay K. Dhurandher:
An Analysis of Machine-Type-Communication on Human-Type-Communication over Wireless Communication Networks. 332-337 - Hekma Chaari, Kais Mnif, Lotfi Kamoun:
Video Quality Transmission Evaluation over Next Generation Wireless Networks. 338-343 - Hyunho Kim, Young-Jin Kang, Bruce Ndibanje, Suhyun Park, Hoon-Jae Lee:
Smartphone-Based Secure Access Control in Wireless Network Analysis. 344-347 - Vladi Kolici, Tetsuya Oda, Evjola Spaho, Leonard Barolli, Makoto Ikeda, Kazunori Uchida:
Performance Evaluation of a VANET Simulation System Using NS-3 and SUMO. 348-353 - Mimoza Durresi, Arjan Durresi, Leonard Barolli, Kazunori Uchida:
Using Combined Cellular Ad Hoc Communications for Smart Environments. 354-359
Session 3: Wireless and Mobile Communication Systems
- Kazunori Uchida:
A Discrete Ray Tracing Method Based on Dijkstra Algorithm for 3D Propagation Environments. 360-365 - Hiroshi Maeda, Naoki Sakuma, Noriyuki Toyomasu, Ryoma Nishi, Daichi Ogata:
Numerical Analysis of 1X4 Branch Waveguide in Two Dimensional Photonic Crystal Structure. 366-369 - Seiichiro Ishikawa, Taiki Honda, Makoto Ikeda, Leonard Barolli:
Investigation of Message Suppression Method Considering TCP in Vehicular-DTN. 370-375 - Marwane Ben Hcine, Ridha Bouallegue:
Analytical Downlink Effective SINR Evaluation in LTE Networks. 376-381 - Kien Nguyen, Kentaro Ishizu, Homare Murakami, Fumihide Kojima:
Investigating Performance of Concurrent Virtual Wi-Fi Interfaces. 382-386
The Third International Workshop on Informatics for Intelligent Context-Aware Enterprise Systems (ICAES-2015)
Session 1: Intelligent Context-Aware Systems and Applications
- Philip Moore, Hai Van Pham:
On Context and the Open World Assumption. 387-392 - Jagdev Bhogal, Imran Choksi:
Handling Big Data Using NoSQL. 393-398 - Jagdev Bhogal, William Campbell:
An Ontological Analysis of the Role of Culture within Green IT. 399-404 - David Newell, Philip Davies, Ron Austin, Philip Moore, Mak Sharma:
Models for an Intelligent Context-Aware Blended m-Learning System. 405-410
The Third International Workshop on the Theories and Intricacies of Information Security Problems (INTRICATE-SEC 2015)
Session 1: Theories and Intricacies of Information Security Problems
- Richard Ssembatya, Anne V. D. M. Kayem:
Secure and Efficient Mobile Personal Health Data Sharing in Resource Constrained Environments. 411-416 - Bader Alwasel, Stephen D. Wolthusen:
Structural Controllability Analysis Via Embedding Power Dominating Set Approximation in ErdHos-Rènyi Graphs. 418-423 - Aderonke Busayo Sakpere, Anne V. D. M. Kayem, Thabo Ndlovu:
A Usable and Secure Crime Reporting System for Technology Resource Constrained Context. 424-429 - Duc-Dung Tran, Nguyen-Son Vo, Tan-Loc Vo, Dac-Binh Ha:
Physical Layer Secrecy Performance of Multi-hop Decode-and-Forward Relay Networks with Multiple Eavesdroppers. 430-435 - Peng Chen, Jun Ye, Xiaofeng Chen:
A New Efficient Request-Based Comparable Encryption Scheme. 436-439 - Hao Wang, Bo Yang, Yilei Wang:
Server Aided Ciphertext-Policy Attribute-Based Encryption. 440-444
The Eighth International Workshop on Information Technology for Innovative Services (ITIS-2015)
Session 1: Innovative Services and Systems
- Ahmad Jalal, Shaharyar Kamal, Daijin Kim:
Shape and Motion Features Approach for Activity Tracking and Recognition from Kinect Video Camera. 445-450 - Tomoaki Miyakawa, Akio Koyama:
A Hybrid Type DTN Routing Method Using Delivery Predictability and Maximum Number of Replication. 451-456 - Minoru Uehara:
The Design of a Framework for Smart Appliances. 457-462 - Hideaki Yanagisawa:
Extension of Web-Based Software Development Environment. 463-466 - Hideki Mori, Minoru Uehara, Katsuyoshi Matsumoto:
Parallel Architectures with Small World Network Model. 467-472
The Seventh International Workshop on Disaster and Emergency Information Network Systems (IWDENS-2015)
Session 1: Disaster Information System
- Quang Tran Minh, Shigeki Yamada:
Feasibility Validation of WiFi Based Multihop Access Network for Disaster Recovery. 473-477 - Xuan Thien Phan, Quang Tran Minh, Kien Nguyen, Nam Thoai, Shigeki Yamada:
GICS: Group-Based Internet Connection Spreading Architecture for Disaster Recovery. 478-483 - Kazuhiro Takahagi, Tomoyuki Ishida, Satoshi Noda, Akira Sakuraba, Noriki Uchida, Yoshitaka Shibata:
Proposal of the Fire Fighting Support System for the Volunteer Fire Company. 484-489 - Go Hirakawa, Noriki Uchida, Yoshikazu Arai, Yoshitaka Shibata:
Application of DTN to the Vehicle Sensor Platform CoMoSE. 490-493 - Satoshi Noda, Yasuo Ebara, Tomoyuki Ishida, Koji Hashimoto, Yoshitaka Shibata:
Implementation of High Presence Video Communication System for Multiple Users Using Tiled Display Environment. 494-499
Session 2: Disaster Information Network
- Mohammad Aazam, Pham Phuoc Hung, Eui-Nam Huh:
M2M Emergency Help Alert Mobile Cloud Architecture. 500-505 - Noriki Uchida, Go Hirakawa, Yoshikazu Arai, Kazuo Takahata, Yoshitaka Shibata:
Evaluation of Vehicle-to-Vehicle Communication with Delay Tolerant Networks for Safety Surveillance System. 506-511 - Yosuke Kikuchi, Yoshitaka Shibata:
Mobile Cloud Computing for Distributed Disaster Information System in Challenged Communication Environment. 512-517 - Kenta Ito, Go Hirakawa, Yoshikazu Arai, Yoshitaka Shibata:
A Road Condition Monitoring System Using Various Sensor Data in Challenged Communication Network Environment. 518-523 - Hiroaki Yuze, Shinichi Nabeta, Yuji Ito:
Development of Autonomous Anti-Disaster Base Station by Combination of Satellite and Wireless Networks. 524-528
The Eighth International Symposium on Mining and Web (MAW-2015)
Session 1: Information Retreival and Tweet Sentiment Analysis
- Suzanne Mello-Stark, Edmund A. Lamagna:
Increasing Trust in Elections via a Simple Receipt Algorithm. 529-534 - Ichiro Moriya, Yusuke Inoue, Takakazu Imada, Takehito Utsuro, Yasuhide Kawada, Noriko Kando:
Overviewing the Knowledge of a Query Keyword by Clustering Viewpoints of Web Search Information Needs. 535-540 - Tokinori Suzuki, Atsushi Fujii:
Approximating Document Frequency for Self-Index based Top-k Document Retrieval. 541-546 - Fajri Koto, Mirna Adriani:
The Use of POS Sequence for Analyzing Sentence Pattern in Twitter Sentiment Analysis. 547-551 - Yuta Taniguchi, Daiki Monzen, Lutfiana Sari Ariestien, Daisuke Ikeda:
Discover Overlapping Topical Regions by Geo-Semantic Clustering of Tweets. 552-557
Session 2: Data Mining and Data Structures
- Yuzana Win, Tomonari Masada:
Exploring Technical Phrase Frames from Research Paper Titles. 558-563 - Omar Abdillah, Mirna Adriani:
Mining User Interests through Internet Review Forum for Building Recommendation System. 564-569 - Zaffar Ahmed Shaikh, Denis Gillet, Shakeel Ahmed Khoja:
SkillsRec: A Novel Semantic Analysis Driven Learner Skills Mining and Filtering Approach for Personal Learning Environments Based on Teacher Guidance. 570-576 - Cheng Lei, Kin Fun Li:
Academic Performance Predictors. 577-581 - Lu Shi, Sergey Butakov, Dale Lindskog, Ron Ruhl, Evgeny Storozhenko:
Applicability of Probablistic Data Structures for Filtering Tasks in Data Loss Prevention Systems. 582-586
The Third International Workshop on Network Management and Monitoring (NetMM-2015)
Session 1: Network Monitoring and Management
- Xiaoping Che, Pengyu Liu, Zhipeng Zhang, Fangzhi Wen:
An Approach for Testing Data Intensive Systems: Application to a Banking CRM System. 587-592 - Marco Antonio To, Marcos Cano, Preng Biba:
DOCKEMU - A Network Emulation Tool. 593-598 - Oscar Rodas, Gerardo Morales, Jose Alvarez:
A Reliable and Scalable Classification-Based Hybrid IPS. 599-604 - Jorge López, Stephane Maag, Cecilia Saint-Pierre, Javier Bustos-Jiménez, Ana R. Cavalli:
Process Mining for Trust Monitoring. 605-610
The Fifth International Workshop on Protocols and Applications with Multi-Homing Support (PAMS-2015)
Session 1: Multipath Transport Protocols
- Thomas Dreibholz, Jarle Bjørgeengen, Jonas Werme:
Maintaining and Monitoring the Infrastructure of the NORNET CORE Testbed for Multi-homed Systems. 611-616 - Thomas Dreibholz, Xing Zhou, Fu Fa:
Multi-path TCP in Real-World Setups - An Evaluation in the NORNET CORE Testbed. 617-622 - W. Naeem, Nadeem Javaid, Zahoor Ali Khan, Umar Qasim, Anzar Mahmood, Z. Mehmood, Ashfaq Ahmad, F. Ali, W. Sarwar:
Performance Evaluation of Experimental Setups in Home Energy Management Systems in Smart Grid. 623-632 - Yuansheng Luo, Kun Yang, Qiang Tang, Jianming Zhang, Shi Qiu:
Device-to-Device Service Selection Framework in Cloud Radio Access Network. 633-637
The Third International Workshop on Pervasive Internet of Things and Smart Cities (PITSaC-2015)
Session 1: Internet of Things
- Nizar Boussarsar, Youssef Kamoun, Mouna Ketatni, Anis Benhajji, Seifallah Jemal:
Smart Eco-Urban Cities Ubiquitous Public Park. 638-643 - Alex C. Olivieri, Gianluca Rizzo, Francois Morard:
A Publish-Subscribe Approach to IoT Integration: The Smart Office Use Case. 644-651 - Tsung-Hui Chuang, Meng-Hsun Tsai, Chun-Yi Chuang:
Group-Based Uplink Scheduling for Machine-Type Communications in LTE-Advanced Networks. 652-657 - Rene Romann:
Proof-of-Concept: Infrared Transmission Using Smart Phone Cameras. 658-661 - Younggi Kim, Younghee Lee:
Automatic Generation of Social Relationships between Internet of Things in Smart Home Using SDN-Based Home Cloud. 662-667 - Antonio J. Jara, Yunchuan Sun, Houbing Song, Rongfang Bie, Dominique Genoud, Yann Bocchi:
Internet of Things for Cultural Heritage of Smart Cities and Smart Regions. 668-675
Session 2: Security in the Internet of Things
- José Luis Hernández Ramos, Jorge Bernal Bernabé, Antonio F. Skarmeta:
Managing Context Information for Adaptive Security in IoT Environments. 676-681 - Abhijan Bhattacharyya, Tulika Bose, Soma Bandyopadhyay, Arijit Ukil, Arpan Pal:
LESS: Lightweight Establishment of Secure Session: A Cross-Layer Approach Using CoAP and DTLS-PSK Channel Encryption. 682-687 - Olivier Flauzac, Carlos Gonzalez, Abdelhak Hachani, Florent Nolot:
SDN Based Architecture for IoT and Improvement of the Security. 688-693 - Marcin Piotr Pawlowski, Antonio J. Jara, Maciej J. Ogorzalek:
EAP for IoT: More Efficient Transport of Authentication Data - TEPANOM Case Study. 694-699
The Ninth International Workshop on Telecommunication Networking, Applications and Systems (TeNAS-2015)
Session 1: Distributed and Parallel Applications
- Teh-Sheng Huang, Chun-Yen Wang, Tsung-Ching Lin, Jeu-Yih Jeng:
A Case Study and Design of Transformation Architecture in BSS. 700-705 - Chun-Hui Wang, Yue Pan, Shwu-Huey Yen:
An Anomaly Detection by Whitening HOSF. 706-710 - Rúben Pereira, Ella Pereira:
Video Streaming: H.264 and the Internet of Things. 711-714
Session 2: Networking and Communications Technologies and Performance
- Yuta Yoshinaga, Masayoshi Shimamura, Katsuyoshi Iida:
Multipath Transmission Model and Its Route Selection Policy Considering Packet Re-sequencing Buffers Availability. 715-720 - Ryosuke Akamatsu, Keiji Obara, Hiroshi Shigeno:
Road-Oriented Geographic Routing Protocol for Urban Vehicular Ad Hoc Networks. 721-726 - Yuki Fukushima, Isamu Wakabayashi, Takayuki Kawahara:
Equalization for the FDM System Using Mach-Zehnder Filters. 727-732 - Shih-Hao Chang:
A Visible Light Communication Link Protection Mechanism for Smart Factory. 733-737
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.