


default search action
29th AINA 2015: Gwangju, South Korea - Workshops
- Leonard Barolli, Makoto Takizawa, Fatos Xhafa, Tomoya Enokido, Jong Hyuk Park:

29th IEEE International Conference on Advanced Information Networking and Applications Workshops, AINA 2015 Workshops, Gwangju, South Korea, March 24-27, 2015. IEEE Computer Society 2015, ISBN 978-1-4799-1775-4
The Eighth International Workshop on Bio and Intelligent Computing (BICom-2015)
Session 1: Wearable and Mobile Computing
- Tae-Young Kim, Yun-Hong Noh, Do-Un Jeong:

Template Matching Compression Algorithm for Wearable ECG Measurement System Based on Multi Wireless Transmission Platform. 1-5 - Byeong-Gu Ahn, Yun-Hong Noh, Do-Un Jeong:

Implementation of the Variable ECG Data Packet Transmission System with Activity State. 6-10 - Byeong-Hoon Kim, Yun-Hong Noh, Do-Un Jeong:

A Wearable ECG Monitoring System Using Adaptive EMD Filter Based on Activity Status. 11-16 - Baojiang Cui, Ziyue Wang, Jun Yang, Xiaofeng Chen:

Design and Analysis of an Enhanced Secure Mechanism of LLRP in RFID Systems. 17-21 - Chen Yang, Bo Qin, Xiuwen Zhou, Yang Sun, Shuangyu He, Qianhong Wu:

Privacy-Preserving Traffic Monitoring in Vehicular Ad Hoc Networks. 22-24
Session 2: Healthcare and Smart Environments
- Young-Sil Lee, Bruce Ndibanje, Non Thiranant, Esko Alasaarela, Hoon-Jae Lee:

Hybrid Cloud Service Based Healthcare Solutions. 25-30 - Andy Harris, Arjan Durresi, Mihran Tuceryan, Tamara S. Hannon:

Integrated and Personalized Diabetes Coach for Children. 31-35 - Anzar Mahmood

, Ashfaq Ahmad
, H. T. Javed, Z. Mehmood, Zahoor Ali Khan
, Umar Qasim, Nadeem Javaid
:
A Survey of 'User Comfort' in Home Energy Management Systems in Smart Grid. 36-43 - Tatsushi Tokuyasu, Takaaki Nakayama, Kazuhiko Toshimitsu, Kazutoshi Okamura, Kazunori Yoshiura:

Development of Virtual Palpation System for Dental Education. 44-48 - Keita Matsuo, Yi Liu, Donald Elmazi

, Leonard Barolli, Kazunori Uchida:
Implementation and Evaluation of a Small Size Omnidirectional Wheelchair. 49-53
Session 3: Intelligent Comuting
- Takaaki Inaba, Donald Elmazi

, Yi Liu, Shinji Sakamoto
, Leonard Barolli, Kazunori Uchida:
Integrating Wireless Cellular and Ad-Hoc Networks Using Fuzzy Logic Considering Node Mobility and Security. 54-60 - Nayong Kim, Richard Platania, Wei Huang, Chris Knight, Tom Keyes, Seung-Jong Park, Joohyun Kim:

Enabling Large-Scale Biomolecular Conformation Search with Replica Exchange Statistical Temperature Molecular Dynamics (RESTMD) over HPC and Cloud Computing Resources. 61-66 - Taro Ishitaki, Donald Elmazi

, Yi Liu, Tetsuya Oda, Leonard Barolli, Kazunori Uchida:
Application of Neural Networks for Intrusion Detection in Tor Networks. 67-72 - Jun Ye, Xiaofeng Chen, Jianfeng Ma:

An Improved Algorithm for Secure Outsourcing of Modular Exponentiations. 73-76
The Third International Workshop on Collaborative Enterprise Systems (COLLABES-2015)
Session 1: Business Intelligence and Secure Systems
- Paulo R. M. Andrade

, Renanh G. Araujo, Jose Cronemberger Filho, Tiago R. Pereira, Adriano Bessa Albuquerque, Nabor C. Mendonça
:
Improving Business by Migrating Applications to the Cloud Using Cloudstep. 77-82 - Jiafei Wen, Xiaolong Wu, Shui Lam:

Implementation of a Collaborative Document Processing in the Cloud. 83-88 - Jun Yang, Chuan Fu, Nan Shen, Zheli Liu, Chunfu Jia, Jin Li:

General Multi-key Searchable Encryption. 89-95 - Xiaoqing Tan, Siting Cheng, Jin Li, Zhihong Feng:

Quantum Key Distribution Protocol Using Quantum Fourier Transform. 96-101
Session 2: Intelligent Data Processing
- Chao-Tung Yang

, Wei-Hsiang Lien, Yu-Chuan Shen, Fang-Yie Leu:
Implementation of a Software-Defined Storage Service with Heterogeneous Storage Technologies. 102-107 - Wisarut Suesuwan, Woraphon Lilakiatsakun:

Optimize Auction Bandwidth in Content Centric Network with Provider Portal for Application. 108-116 - S. Imran, Nasrullah Khan

:
Experimental Study of Borehole Logs for Oil and Gas Exploration. 117-122
The Second International Workshop on Device Centric Cloud (DC2-2015)
Session 1: Device Centric Cloud I
- Zheng Hao, Deng Xiaotao, Yu Lei, Zhang Jie, Inchul Hwang, Sunhee Youm:

Contextual User Interest Modeling Approaches for Personalized Services on Multiple Devices. 123-130 - Sejun Lee, Jaehoon Jeong, Jung-Soo Park:

DNS Name Autoconfiguration for IoT Home Devices. 131-134 - Antonio Carnielli, Mahdi Aiash:

Will ToR Achieve Its Goals in the "Future Internet"? An Empirical Study of Using ToR with Cloud Computing. 135-140 - Jihyeok Seo, Jaehoon Jeong, Hyoungshick Kim, Jung-Soo Park:

SBUS: Smart e-Bus Battery Substitution Scheme in Vehicular Networks. 141-145
Session 2: Device Centric Cloud II
- Mahdi Daghmechi Firoozjaei, Jaegwan Yu, Hyoungshick Kim:

Privacy Preserving Nearest Neighbor Search Based on Topologies in Cellular Networks. 146-149 - Jaehoon Jeong, Jihyeok Seo, Geumhwan Cho

, Hyoungshick Kim, Jung-Soo Park:
A Framework for Security Services Based on Software-Defined Networking. 150-153 - Mahdi Aiash, Robert Colson, Mohammad Muneer Kallash:

Introducing a Hybrid Infrastructure and Information-Centric Approach for Secure Cloud Computing. 154-159 - Hyunsu Jang, Jaehoon Jeong, Hyoungshick Kim, Jung-Soo Park:

A Survey on Interfaces to Network Security Functions in Network Virtualization. 160-163
The Second International Workshop on Engineering Energy Efficient WSNs (EEEWSN-2015)
Session 1: Applications of WSNs and Network Protocols
- Krishna Doddapaneni, Purav Shah

, Enver Ever
, Ali Tasiran, Fredrick A. Omondi, Leonardo Mostarda, Orhan Gemikonakli
:
Packet Arrival Analysis in Wireless Sensor Networks. 164-169 - Nueraili Aierken

, Roberto Gagliardi, Leonardo Mostarda, Zaib Ullah:
RUHEED-Rotated Unequal Clustering Algorithm for Wireless Sensor Networks. 170-174 - Fredrick A. Omondi, Purav Shah

, Orhan Gemikonakli
, Enver Ever
:
A Framework for Energy Based Performability Models for Wireless Sensor Networks. 175-180 - Vu Tran-Ha, Quang-Doanh Vu

, Een-Kee Hong
:
Time Reversal-Based Transmissions with Distributed Power Allocation for Two-Tier Networks. 181-186 - Flavio Corradini, Rosario Culmone

, Leonardo Mostarda, Luca Tesei
, Franco Raimondi
:
A Constrained ECA Language Supporting Formal Verification of WSNs. 187-192 - Nadeem Qaisar Mehmood

, Rosario Culmone
:
An ANT+ Protocol Based Health Care System. 193-198
The Eleventh International Symposium on Frontiers of Information Systems and Network Applications (FINA-2015)
Session 1: Distributed Applications and Software Engineering
- Noriyasu Yamamoto:

An Active Learning System Using Smartphone for Improving Students Learning Concentration. 199-203 - Guixian Xu, Lirong Qiu:

Technology Research of Tibetan Hot Topics Extraction. 204-208 - Yeqing Li, Xiaoyu Qiu:

Word Sense Disambiguation Based on Feature Ranking Graph. 209-212 - Yeqing Li:

Named Entity Relation Extraction Based on Multiple Features. 213-216
Session 2: Energy-Aware Information Systems
- Hiroki Kataoka, Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa

:
Power Consumption and Computation Models of a Server with a Multi-core CPU and Experiments. 217-222 - Chao-Tung Yang

, Chih-Liang Chuang, Jung-Chun Liu, Chien-Chih Chen, William C. Chu:
Implementation of Cloud Infrastructure Monitor Platform with Power Saving Method. 223-228 - Ashfaq Ahmad

, Nadeem Javaid
, Umar Qasim, Zahoor Ali Khan
:
Demand Response: From Classification to Optimization Techniques in Smart Grid. 229-235 - Ken Nishimura, Kaoru Sugita:

Implementation of Application Softwares for Reducing Power Consumption in Web Services. 236-241 - (Withdrawn) Secure Two-Party Computation in Social Cloud Based on Reputation. 242-245

Session 3: Scalable Computing Systems and Protocols
- Weng Yu:

e-MinZu: A Software Service Architecture Based on Saas for Massive Data Source. 246-249 - Shaojing Li, Wanli Su, Haoling Li:

The Research of Security of P2P Network File Sharing System. 250-254 - Petra Perner

:
New Methods for Big Data Analysis in Images. 255-260 - David Murray

:
Why Internet Protocols Need Incentives. 261-266 - Samia Dardouri

, Ridha Bouallegue
:
A New Scheduling Algorithm for Real-Time Communication in LTE Networks. 267-271 - Kazuaki Kouno, Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa

:
Broadcast Protocols in Wireless Networks. 272-277
Session 4: Security and Privacy
- Non Thiranant, Young-Sil Lee, Hoon-Jae Lee:

Performance Comparison Between RSA and Elliptic Curve Cryptography-Based QR Code Authentication. 278-282 - Jiana Meng, Jun Guo:

Analysis of Researcher Co-authorship Network. 283-286 - Pengtao Liu, Chengyu Hu, Shanqing Guo, Yilei Wang:

Anonymous Identity-Based Encryption with Bounded Leakage Resilience. 287-292 - Tao Li, Hao Yang, Yilei Wang, Qiuliang Xu:

The Electronic Voting in the Presence of Rational Voters. 293-296
The Eleventh International Workshop on Heterogeneous Wireless Networks (HWISE-2015)
Session 1: Wireless Sensor Networks
- Naveed Ilyas, Nadeem Javaid

, Zafar Iqbal, Muhammad Imran, Zahoor Ali Khan
, Umar Qasim, Muhammad Shoaib
:
Extended Lifetime Based Elliptical Sink-Mobility in Depth Based Routing Protocol for UWSNs. 297-303 - Donald Elmazi

, Elis Kulla, Tetsuya Oda, Evjola Spaho
, Leonard Barolli, Kazunori Uchida:
Selection of Actor Nodes in Wireless Sensor and Actor Networks: A Fuzzy Based Method Considering Actor Mobility. 304-310 - Sahar Rahim, Muhammad Hassan Rahim, Rahim Dad Khan, Muhammad Zain Siddiqi, M. A. Qureshi, Umar Qasim, Zahoor Ali Khan

, Shaharyar Mahmood, Nadeem Javaid
:
Circular Joint Sink Mobility Scheme for Wireless Sensor Networks. 311-319 - Ayesha Hussain Khan, Nadeem Javaid

, Muhammad Imran, Zahoor Ali Khan
, Umar Qasim, Noman Haider
:
DYN-NbC-JSM: Dynamic Joint Sink Mobility with Need-Based Clustering in WSNs. 320-325 - Mimoza Durresi, Arjan Durresi, Leonard Barolli, Kazunori Uchida:

Using Cellular Sensor Networks for Environment Protection. 326-331
Session 2: Wireless Network Algorithms and Performance Analysis
- Parampreet Sidhu, Isaac Woungang, Glaucio H. S. Carvalho, Alagan Anpalagan

, Sanjay K. Dhurandher:
An Analysis of Machine-Type-Communication on Human-Type-Communication over Wireless Communication Networks. 332-337 - Hekma Chaari, Kais Mnif

, Lotfi Kamoun:
Video Quality Transmission Evaluation over Next Generation Wireless Networks. 338-343 - Hyunho Kim, Young-Jin Kang, Bruce Ndibanje, Suhyun Park, Hoon-Jae Lee:

Smartphone-Based Secure Access Control in Wireless Network Analysis. 344-347 - Vladi Kolici

, Tetsuya Oda, Evjola Spaho
, Leonard Barolli, Makoto Ikeda, Kazunori Uchida:
Performance Evaluation of a VANET Simulation System Using NS-3 and SUMO. 348-353 - Mimoza Durresi, Arjan Durresi, Leonard Barolli, Kazunori Uchida:

Using Combined Cellular Ad Hoc Communications for Smart Environments. 354-359
Session 3: Wireless and Mobile Communication Systems
- Kazunori Uchida:

A Discrete Ray Tracing Method Based on Dijkstra Algorithm for 3D Propagation Environments. 360-365 - Hiroshi Maeda

, Naoki Sakuma, Noriyuki Toyomasu, Ryoma Nishi, Daichi Ogata:
Numerical Analysis of 1X4 Branch Waveguide in Two Dimensional Photonic Crystal Structure. 366-369 - Seiichiro Ishikawa, Taiki Honda, Makoto Ikeda, Leonard Barolli:

Investigation of Message Suppression Method Considering TCP in Vehicular-DTN. 370-375 - Marwane Ben Hcine, Ridha Bouallegue

:
Analytical Downlink Effective SINR Evaluation in LTE Networks. 376-381 - Kien Nguyen

, Kentaro Ishizu, Homare Murakami, Fumihide Kojima:
Investigating Performance of Concurrent Virtual Wi-Fi Interfaces. 382-386
The Third International Workshop on Informatics for Intelligent Context-Aware Enterprise Systems (ICAES-2015)
Session 1: Intelligent Context-Aware Systems and Applications
- Philip Moore

, Hai Van Pham
:
On Context and the Open World Assumption. 387-392 - Jagdev Bhogal

, Imran Choksi:
Handling Big Data Using NoSQL. 393-398 - Jagdev Bhogal

, William Campbell:
An Ontological Analysis of the Role of Culture within Green IT. 399-404 - David Newell, Philip Davies, Ron Austin, Philip Moore

, Mak Sharma
:
Models for an Intelligent Context-Aware Blended m-Learning System. 405-410
The Third International Workshop on the Theories and Intricacies of Information Security Problems (INTRICATE-SEC 2015)
Session 1: Theories and Intricacies of Information Security Problems
- Richard Ssembatya, Anne V. D. M. Kayem:

Secure and Efficient Mobile Personal Health Data Sharing in Resource Constrained Environments. 411-416 - Bader Alwasel, Stephen D. Wolthusen:

Structural Controllability Analysis Via Embedding Power Dominating Set Approximation in ErdHos-Rènyi Graphs. 418-423 - Aderonke Busayo Sakpere, Anne V. D. M. Kayem, Thabo Ndlovu:

A Usable and Secure Crime Reporting System for Technology Resource Constrained Context. 424-429 - Duc-Dung Tran, Nguyen-Son Vo

, Tan-Loc Vo, Dac-Binh Ha:
Physical Layer Secrecy Performance of Multi-hop Decode-and-Forward Relay Networks with Multiple Eavesdroppers. 430-435 - Peng Chen, Jun Ye, Xiaofeng Chen:

A New Efficient Request-Based Comparable Encryption Scheme. 436-439 - Hao Wang, Bo Yang, Yilei Wang:

Server Aided Ciphertext-Policy Attribute-Based Encryption. 440-444
The Eighth International Workshop on Information Technology for Innovative Services (ITIS-2015)
Session 1: Innovative Services and Systems
- Ahmad Jalal, Shaharyar Kamal, Daijin Kim:

Shape and Motion Features Approach for Activity Tracking and Recognition from Kinect Video Camera. 445-450 - Tomoaki Miyakawa, Akio Koyama:

A Hybrid Type DTN Routing Method Using Delivery Predictability and Maximum Number of Replication. 451-456 - Minoru Uehara:

The Design of a Framework for Smart Appliances. 457-462 - Hideaki Yanagisawa:

Extension of Web-Based Software Development Environment. 463-466 - Hideki Mori, Minoru Uehara, Katsuyoshi Matsumoto:

Parallel Architectures with Small World Network Model. 467-472
The Seventh International Workshop on Disaster and Emergency Information Network Systems (IWDENS-2015)
Session 1: Disaster Information System
- Quang Tran Minh, Shigeki Yamada:

Feasibility Validation of WiFi Based Multihop Access Network for Disaster Recovery. 473-477 - Xuan Thien Phan, Quang Tran Minh, Kien Nguyen, Nam Thoai, Shigeki Yamada:

GICS: Group-Based Internet Connection Spreading Architecture for Disaster Recovery. 478-483 - Kazuhiro Takahagi, Tomoyuki Ishida, Satoshi Noda, Akira Sakuraba, Noriki Uchida, Yoshitaka Shibata:

Proposal of the Fire Fighting Support System for the Volunteer Fire Company. 484-489 - Go Hirakawa, Noriki Uchida, Yoshikazu Arai, Yoshitaka Shibata:

Application of DTN to the Vehicle Sensor Platform CoMoSE. 490-493 - Satoshi Noda, Yasuo Ebara, Tomoyuki Ishida, Koji Hashimoto, Yoshitaka Shibata:

Implementation of High Presence Video Communication System for Multiple Users Using Tiled Display Environment. 494-499
Session 2: Disaster Information Network
- Mohammad Aazam

, Pham Phuoc Hung, Eui-Nam Huh:
M2M Emergency Help Alert Mobile Cloud Architecture. 500-505 - Noriki Uchida, Go Hirakawa, Yoshikazu Arai, Kazuo Takahata, Yoshitaka Shibata:

Evaluation of Vehicle-to-Vehicle Communication with Delay Tolerant Networks for Safety Surveillance System. 506-511 - Yosuke Kikuchi, Yoshitaka Shibata:

Mobile Cloud Computing for Distributed Disaster Information System in Challenged Communication Environment. 512-517 - Kenta Ito, Go Hirakawa, Yoshikazu Arai, Yoshitaka Shibata:

A Road Condition Monitoring System Using Various Sensor Data in Challenged Communication Network Environment. 518-523 - Hiroaki Yuze, Shinichi Nabeta, Yuji Ito:

Development of Autonomous Anti-Disaster Base Station by Combination of Satellite and Wireless Networks. 524-528
The Eighth International Symposium on Mining and Web (MAW-2015)
Session 1: Information Retreival and Tweet Sentiment Analysis
- Suzanne Mello-Stark, Edmund A. Lamagna:

Increasing Trust in Elections via a Simple Receipt Algorithm. 529-534 - Ichiro Moriya, Yusuke Inoue, Takakazu Imada, Takehito Utsuro, Yasuhide Kawada, Noriko Kando

:
Overviewing the Knowledge of a Query Keyword by Clustering Viewpoints of Web Search Information Needs. 535-540 - Tokinori Suzuki

, Atsushi Fujii:
Approximating Document Frequency for Self-Index based Top-k Document Retrieval. 541-546 - Fajri Koto, Mirna Adriani:

The Use of POS Sequence for Analyzing Sentence Pattern in Twitter Sentiment Analysis. 547-551 - Yuta Taniguchi, Daiki Monzen, Lutfiana Sari Ariestien, Daisuke Ikeda:

Discover Overlapping Topical Regions by Geo-Semantic Clustering of Tweets. 552-557
Session 2: Data Mining and Data Structures
- Yuzana Win, Tomonari Masada:

Exploring Technical Phrase Frames from Research Paper Titles. 558-563 - Omar Abdillah, Mirna Adriani:

Mining User Interests through Internet Review Forum for Building Recommendation System. 564-569 - Zaffar Ahmed Shaikh

, Denis Gillet, Shakeel Ahmed Khoja
:
SkillsRec: A Novel Semantic Analysis Driven Learner Skills Mining and Filtering Approach for Personal Learning Environments Based on Teacher Guidance. 570-576 - Cheng Lei, Kin Fun Li:

Academic Performance Predictors. 577-581 - Lu Shi, Sergey Butakov

, Dale Lindskog, Ron Ruhl, Evgeny Storozhenko:
Applicability of Probablistic Data Structures for Filtering Tasks in Data Loss Prevention Systems. 582-586
The Third International Workshop on Network Management and Monitoring (NetMM-2015)
Session 1: Network Monitoring and Management
- Xiaoping Che, Pengyu Liu, Zhipeng Zhang, Fangzhi Wen:

An Approach for Testing Data Intensive Systems: Application to a Banking CRM System. 587-592 - Marco Antonio To

, Marcos Cano, Preng Biba:
DOCKEMU - A Network Emulation Tool. 593-598 - Oscar Rodas

, Gerardo Morales, Jose Alvarez:
A Reliable and Scalable Classification-Based Hybrid IPS. 599-604 - Jorge López, Stephane Maag, Cecilia Saint-Pierre, Javier Bustos-Jiménez, Ana R. Cavalli:

Process Mining for Trust Monitoring. 605-610
The Fifth International Workshop on Protocols and Applications with Multi-Homing Support (PAMS-2015)
Session 1: Multipath Transport Protocols
- Thomas Dreibholz

, Jarle Bjørgeengen, Jonas Werme:
Maintaining and Monitoring the Infrastructure of the NORNET CORE Testbed for Multi-homed Systems. 611-616 - Thomas Dreibholz

, Xing Zhou, Fu Fa:
Multi-path TCP in Real-World Setups - An Evaluation in the NORNET CORE Testbed. 617-622 - W. Naeem, Nadeem Javaid

, Zahoor Ali Khan
, Umar Qasim, Anzar Mahmood
, Z. Mehmood, Ashfaq Ahmad
, F. Ali, W. Sarwar:
Performance Evaluation of Experimental Setups in Home Energy Management Systems in Smart Grid. 623-632 - Yuansheng Luo, Kun Yang, Qiang Tang, Jianming Zhang

, Shi Qiu:
Device-to-Device Service Selection Framework in Cloud Radio Access Network. 633-637
The Third International Workshop on Pervasive Internet of Things and Smart Cities (PITSaC-2015)
Session 1: Internet of Things
- Nizar Boussarsar, Youssef Kamoun, Mouna Ketatni, Anis Benhajji, Seifallah Jemal:

Smart Eco-Urban Cities Ubiquitous Public Park. 638-643 - Alex C. Olivieri, Gianluca Rizzo

, Francois Morard:
A Publish-Subscribe Approach to IoT Integration: The Smart Office Use Case. 644-651 - Tsung-Hui Chuang, Meng-Hsun Tsai

, Chun-Yi Chuang:
Group-Based Uplink Scheduling for Machine-Type Communications in LTE-Advanced Networks. 652-657 - Rene Romann:

Proof-of-Concept: Infrared Transmission Using Smart Phone Cameras. 658-661 - Younggi Kim, Younghee Lee:

Automatic Generation of Social Relationships between Internet of Things in Smart Home Using SDN-Based Home Cloud. 662-667 - Antonio J. Jara

, Yunchuan Sun, Houbing Song
, Rongfang Bie, Dominique Genoud, Yann Bocchi:
Internet of Things for Cultural Heritage of Smart Cities and Smart Regions. 668-675
Session 2: Security in the Internet of Things
- José Luis Hernández-Ramos

, Jorge Bernal Bernabé
, Antonio F. Skarmeta
:
Managing Context Information for Adaptive Security in IoT Environments. 676-681 - Abhijan Bhattacharyya, Tulika Bose, Soma Bandyopadhyay, Arijit Ukil, Arpan Pal

:
LESS: Lightweight Establishment of Secure Session: A Cross-Layer Approach Using CoAP and DTLS-PSK Channel Encryption. 682-687 - Olivier Flauzac, Carlos Gonzalez, Abdelhak Hachani, Florent Nolot

:
SDN Based Architecture for IoT and Improvement of the Security. 688-693 - Marcin Piotr Pawlowski, Antonio J. Jara

, Maciej J. Ogorzalek
:
EAP for IoT: More Efficient Transport of Authentication Data - TEPANOM Case Study. 694-699
The Ninth International Workshop on Telecommunication Networking, Applications and Systems (TeNAS-2015)
Session 1: Distributed and Parallel Applications
- Teh-Sheng Huang, Chun-Yen Wang, Tsung-Ching Lin, Jeu-Yih Jeng:

A Case Study and Design of Transformation Architecture in BSS. 700-705 - Chun-Hui Wang, Yue Pan, Shwu-Huey Yen:

An Anomaly Detection by Whitening HOSF. 706-710 - Rúben Pereira, Ella Pereira

:
Video Streaming: H.264 and the Internet of Things. 711-714
Session 2: Networking and Communications Technologies and Performance
- Yuta Yoshinaga, Masayoshi Shimamura, Katsuyoshi Iida

:
Multipath Transmission Model and Its Route Selection Policy Considering Packet Re-sequencing Buffers Availability. 715-720 - Ryosuke Akamatsu, Keiji Obara, Hiroshi Shigeno:

Road-Oriented Geographic Routing Protocol for Urban Vehicular Ad Hoc Networks. 721-726 - Yuki Fukushima, Isamu Wakabayashi, Takayuki Kawahara

:
Equalization for the FDM System Using Mach-Zehnder Filters. 727-732 - Shih-Hao Chang:

A Visible Light Communication Link Protection Mechanism for Smart Factory. 733-737

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














