dblp: IMIS 2016 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches


10. IMIS 2016: Fukuoka, Japan

jump to

SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as

10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2016, Fukuoka, Japan, July 6-8, 2016. IEEE Computer Society 2016, ISBN 978-1-5090-0984-8
Session 1: Context and Location-Aware Computing

Eunji Lee, Chang Choi
, Minchang Lee, Kunseok Oh, Pankoo Kim:
An Approach for Predicting Disease Outbreaks Using Fuzzy Inference among Physiological Variables. 1-4
Jen-Chang Liu, Chieh-Yu Chiang, Sam Chen:
Image-Based Plant Recognition by Fusion of Multimodal Information. 5-11
Yi-Hau Liu, Shian-Hua Lin, Chun-Ku Lai, Chun-Che Huang, Cheng-Yu Lu:
Mining Crowdsourcing Photos for Recognizing Landmark Areas. 12-19
Chen-Ying Hsieh, Jeng-Wei Lin
:
Component Extraction from Handwritten Chinese Characters for Font Synthesis in Personal Style Using Smartphone APP. 20-25
Yi-Lin Hsu, Yan-Ju Chen, Sheng-Wen Shih:
A Particle Filter Approach for Pedestrian Dead Reckoning Using Wearable Sensors. 26-32
Sheraz Hussain, Nadeem Javaid
, Muhammad, Israr Ahmad
, Umar Qasim, Zahoor Ali Khan
:
Performance Analysis of Amplify and Forward Technique in Region Based Cooperative Routing for Underwater Wireless Sensor Networks. 33-41
Session 2: Wireless Sensor Networks

Donald Elmazi
, Shinji Sakamoto
, Elis Kulla, Tetsuya Oda, Makoto Ikeda, Leonard Barolli:
A QoS-aware Actor Node Selection System for Wireless Sensor and Actor Networks Using Fuzzy Logic. 42-48
Taimur Hafeez, Nadeem Javaid
, Ahmad Raza Hameed, Arshad Sher
, Zahoor Ali Khan
, Umar Qasim:
AVN-AHH-VBF: Avoiding Void Node with Adaptive Hop-by-Hop Vector Based Forwarding for Underwater Wireless Sensor Networks. 49-56
Syed Zarar, Nadeem Javaid
, Arshad Sher
, Ahmad Raza Hameed, Zahoor Ali Khan
, Umar Qasim:
Geographic and Opportunistic Clustering for Underwater WSNs. 57-62
Deok-Ki Kim, Jae-Hyeon Park, Jung-Won Lee:
Multi-sensor Based Low Power Sensing Model for Inferencing Location Context. 63-69
Malik Khizar, Abdul Wahid
, Khayyam Pervaiz, Mahin Sajid, Umar Qasim, Zahoor Ali Khan
, Nadeem Javaid
:
Enhanced Energy Efficient Depth Based Routing Protocol for Underwater WSNs. 70-77
Usman Shakeel, Naeem Jan, Khizar, Umar Qasim, Zahoor Ali Khan
, Nadeem Javaid
:
DRADS: Depth and Reliability Aware Delay Sensitive Routing Protocol for Underwater WSNs. 78-83
Session 3: Security and Privacy

Baojiang Cui, Shanshan He:
Anomaly Detection Model Based on Hadoop Platform and Weka Interface. 84-89
Tianhan Gao, Fan Lang, Nan Guo:
An Emergency Communication System Based on UAV-assisted Self-Organizing Network. 90-95
Jingling Zhao, Junxin Qi, Liang Zhou, Baojiang Cui:
Dynamic Taint Tracking of Web Application Based on Static Code Analysis. 96-101
Hee-Kyung Kong, Tae-Sung Kim, Myoung-Ki Hong:
A Security Risk Assessment Framework for Smart Car. 102-108
Seung-Jae Choi, Tae-Sung Kim:
Understanding Factors Affecting Information Security Practice of Elementary School Students. 109-113
Francois Serman, Michaël Hauspie:
Achieving Virtualization Trustworthiness Using Software Mechanisms. 114-119
Session 4: Multimedia Systems and Applications

Misaki Iyobe, Tomoyuki Ishida, Akihiro Miyakawa, Kaoru Sugita, Noriki Uchida, Yoshitaka Shibata:
Proposal of a Virtual Traditional Japanese Crafting Presentation System Mobile Edition. 120-125
Ye-Seul Park, Meeyeon Lee, Jung-Won Lee:
Template-Driven Medical Imaging Information Providing Process Using Semantic Relations Targeting Acute Myocardial Infarction. 126-132
Kaoru Sugita, Masao Yokota:
Implementation of Voice Guidance Function for Sightseeing Contents Using Web Speech API. 133-138
Makoto Fukumto, Ryoichi Nagamatsu:
Feedback of Laughter by Detecting Variation in Respiration Amplitude for Augmenting Laughter. 139-142
Noriyasu Yamamoto:
Improvement of Group Discussion System for Active Learning Using Smartphone. 143-148
Liang Zhou, Siran Fu, Tao Guo, Lifang Han, Baojiang Cui:
Design and Implementation of a C++ Memory Leak Detection Tool Based on Dynamic Instrumentation. 149-153
Session 5: Energy Saving and Intelligent Computing

Matteo Cristani, Francesco Olivieri
, Claudio Tomazzoli
:
Automatic Synthesis of Best Practices for Energy Consumptions. 154-161
Atsuhiro Sawada, Hiroki Kataoka, Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa
:
Design and Evaluation of Algorithms to Energy-Efficiently Select Servers for Storage and Computation Processes. 162-169
Hammad Maqsood, Nadeem Javaid
, Aqeb Yahya, Babar Ali
, Zahoor Ali Khan
, Umar Qasim:
MobiL-AUV: AUV-Aided Localization Scheme for Underwater Wireless Sensor Networks. 170-175
Van-Huy Vu, Tein-Yaw Chung:
Bandwidth Estimation Based on MACD for DASH. 176-181
Admir Barolli
, Tetsuya Oda, Ilir Shinko
, Leonard Barolli, Fatos Xhafa, Makoto Takizawa
:
Performance Analysis of a Genetic Algorithm Based System for Wireless Mesh Networks Considering Weibull Distribution, DCF and EDCA. 182-188
Yuki Sakai, Tetsuya Oda, Makoto Ikeda, Leonard Barolli:
A Vegetable Category Recognition System Using Deep Neural Network. 189-192
Session 6: Big Data and Data Management

Tomasz Hachaj
, Marek R. Ogiela:
Rule-Based Action Recognition: Performance Comparison between Lua and GDL Script Language. 193-197
Lidia Ogiela, Marek R. Ogiela, Urszula Ogiela:
Efficiency of Strategic Data Sharing and Management Protocols. 198-201
Toshitaka Maki, Kazuki Takahashi, Toshihiko Wakahara, Akihiro Yamaguchi, Yu Ichifuji, Noboru Sonehara:
A New Multiple Label Propagation Algorithm for Linked Open Data. 202-208
Noriki Uchida, Kenta Ito, Go Hirakawa, Yoshitaka Shibata:
Adaptive Array Antenna Control Methods on Delay Tolerant Networks for Road Surveillance Systems. 209-214
Fatos Xhafa, Daniel Palou, Leonard Barolli, Makoto Takizawa
:
Energy-Aware Analysis of Synchronizing a Groupware Calendar. 215-222
Jong-Hwan Shin, Ki-Yong Choi, Jeong-Woo Lee, Jung-Won Lee:
Improvement of Large Data Acquisition Method without the Interference on the CPU Load for Automotive Software Testing. 223-230
Session 7: Wireless and Mobile Networks

Tetsuro Kuniyasu, Tetsuya Shigeyasu:
HRB: A New MAC Level 2-Hop Broadcast Protocol with Directional Receiving. 231-236
Khuram Khalid
, Isaac Woungang, Sanjay K. Dhurandher, Leonard Barolli, Glaucio H. S. Carvalho, Makoto Takizawa
:
An Energy-Efficient Routing Protocol for Infrastructure-Less Opportunistic Networks. 237-244
Da Li, Wenan Zhou, Xuhui Yang, Haitao Du:
An Intra-Cluster CoMP Based Sleep-Mode Scheme in Dense Heterogeneous Network. 245-249
Fumiaki Sato, Ryohei Kikuchi:
Hybrid Routing Scheme Combining with Geo-Routing and DTN in VANET. 250-255
Tianrun Gao, Gaofeng Nie, Chenshan Ren, Hui Tian:
Cooperative Load Balancing in OFDMA Small Cell Networks. 256-260
Tein-Yaw Chung, Fong-Ching Yuan, Hsun-Fu Liu:
On Timing of Handoff Decision Making on Heterogeneous Wireless Networks. 261-266
ACTICS 2016
Session 1: Next Generation Network Applications
BDITS
2016 Session 1: Security and Anomaly Detection

Pengfei Li, Songling Shan:
An Improved Algorithm of Prefixspan. 291-294
Jun Yang, Xiangping Du, Liang Zhou, Songling Shan, Baojiang Cui:
Research on the Identification of Software Behavior in Anomaly Detection. 295-298
Xiaobing Liang, Bing Zhao, Rui Wang, Ying Liu:
Research on the Vulnerability Predicting Analysis Model for Binary Executables. 299-304
Xuan Tian, Baojiang Cui, Jiangdong Deng, Jun Yang:
The Performance Optimization of Hadoop during Mining Online Education Packets for Malware Detection. 305-309
Shuang Liang, Yong Ma, Yanyu Huang
, Jia Guo, Chunfu Jia:
The Scheme of Detecting Encoded Malicious Web Pages Based on Information Entropy. 310-312
Yong Ma, Shuang Liang, Xuan Chen, Chunfu Jia:
The Approach to Detect Abnormal Access Behavior Based on Naive Bayes Algorithm. 313-315
esIoT 2016
Session 1: Internet of Things and Smart Homes

Borja Bordel Sánchez
, Diego Sánchez de Rivera, Ramón Alcarria
:
Plug-and-Play Transducers in Cyber-Physical Systems for Device-Driven Applications. 316-321
Miguel A. Wister
, José Adán Hernández-Nolasco
, Pablo Pancardo
, Francisco D. Acosta
, Antonio Jara
:
Emergency Population Warning about Floods by Social Media. 322-327
Nusrat Shaheen, Nadeem Javaid
, Najmun Nisa, Amber Madeeha Zeb, Zahoor Ali Khan
, Umar Qasim:
Appliance Scheduling for Energy Management with User Preferences. 328-334
Masafumi Yamada, Tetsuya Oda, Yi Liu, Masahiro Hiyama, Keita Matsuo, Leonard Barolli:
Performance Evaluation of an IoT-based e-Learning Testbed Considering OLSR and WEP Protocols. 335-341
Sakeena Javaid
, Nadeem Javaid
, Muhammad Shoaib Javaid, Sehrish Javaid, Umar Qasim, Zahoor Ali Khan
:
Optimal Scheduling in Smart Homes with Energy Storage Using Appliances' Super-Clustering. 342-348
FIMIS 2016
Session 1: Innovative Internet Service and Technologies

Jie Tao, Yilun Liu, Yiping Wen, Jiahui Su:
The Expert System of Locomotive Running Gear Based on Sematic Network. 349-354
Tianhan Gao, Nan Guo, Fanghua Geng, Xinyang Deng:
Access Authentication Schemes for PMIPV6: A Survey. 355-360
Kazuki Takahashi, Toshitaka Maki, Toshihiko Wakahara:
A New Laboratory Assignment Support System for Undergraduate Students. 361-366
Andrew Yearp, David Newell, Philip Davies, Russell Wade, Reza Sahandi:
Wireless Remote Patient Monitoring System: Effects of Interference. 367-370
Tomoki Okutake, Noriki Uchida, Noriyasu Yamamoto:
A Collaborative Safety Flight Control System for Multiple Drones. 371-375
Tzu-Hsien Wang, Yuan-Ko Huang, Chiang Lee:
Skyline Query Processing System for Taiwan Maps. 376-380
FINGNet 2016
Session 1: Security Issues and Networks

Jiyoung Lim, Inshil Doh, Kijoon Chae:
Authentication for Mobile Open IPTV Service Security. 381-385
Shi Li, Inshil Doh, Kijoon Chae:
A Group Authentication Scheme Based on Lagrange Interpolation Polynomial. 386-391
Hyoungwoo Park, Il Sun Hwang, Jongsuk Ruth Lee:
Study on the Sustainable Migration to Software Defined Network for Nation-Wide R&E Network. 392-396
Inho Jeon, Chan-Ho Choi, Jerry H. Seo, Youngsik Joe, Kumwon Cho, Hoon Ryu:
EDISON Nanophysics: Web-Based e-Learning Platform for Education and Research in Nanoscience. 397-402
Hae-Duck Joshua Jeong, Hyeonggeun Kim, WonHwi Ahn, Jung-Hee Oh, Dawoon Lee, Sang-Kug Ye, Jongsuk Ruth Lee:
Analysis and Detection of Anomalous Network Traffic. 403-408
Session 2: Health and Video Streaming Services

Hyun Jung Lee, Mye M. Sohn:
Health Service Knowledge Management to Support Medical Group Decision Making. 409-414
WooSeok Hyun, Ilsun You, JoungSoon Jang, Fang-Yie Leu:
A Wireless Body Sensor Network and Its Applications: Rehearsal with a Smartphone. 415-418
Yong-Hwan Lee, Youngseop Kim, Heung-Jun Kim, In-Kyoung Shin, Hyochang Ahn, Yukyong Lee:
Modified Active Shape Model for Realtime Facial Feature Tracking on iPhone. 419-421
In-Kyoung Shin, Hyochang Ahn, Yong-Hwan Lee:
Efficient Image Retrieval Using Image and Audio Features in Video Stream. 422-424
ITAUC 2016
Session 1: Intelligent Techniques and Algorithms

Tzu-Liang Kung, Chun-Nan Hung, Yuan-Hsiang Teng, Jui-Yu Hung, Lih-Hsing Hsu:
On the Robust Approach to Data Inconsistency Detection of Sensor Networks. 425-429
Tzu-Liang Kung, Chun-Nan Hung, Cheng-Kuan Lin, Hsiang-Chun Chen, Chia-Hui Lin, Lih-Hsing Hsu:
A Framework of Cycle-Based Clustering on the Crossed Cube Architecture. 430-434
Jung-Kuei Chang, Wei-Yun Hsu, Te-Chan Chen, Hui-Huang Hsu:
Identification of Negative Comments on Internet Forums. 435-439
Hsing-Chung Chen, Pei-Chi Yeh, Ze-Min Lin, Qiu-Hua Ruan:
Security Awareness Investigation for Mobile User Examined by Using Association Rule Mining Method. 440-445
Hsing-Chung Chen, Qiu-Hua Ruan, Pei-Chi Yeh, Ze-Min Lin:
Intelligent Management Model Based on CBR-SDA Approach - An Example of Smart Life Recommendation System for Choosing Clothes and Accessories. 446-451
MCNCS 2016
Section 1: Network Applications and Security

Hung-Yuan Chen, Yao-Chung Fan
, Chien-Liang Lai, Huan Chen:
Identifying Variable-Power Appliances in Non-intrusive Load Monitoring Systems. 452-457
Fang-Yie Leu, Yi-Ting Hsiao:
Finite State Machine Based Real Time Scheduling for Microchip. 458-463
Sen-Tarng Lai, Fang-Yie Leu:
A Version Control-Based Continuous Testing Frame for Improving the IID Process Efficiency and Quality. 464-469
Yi-Li Huang, Fang-Yie Leu, Po-Hao Su, Ti-Hsun Sung, Sin-Cheng Liu:
A Secure and High Performance Wireless Sensor Network Based on Symmetric Key Matrix. 470-475
Kun-Lin Tsai
, Fang-Yie Leu, Yi-Fung Huang, Chi Yang, Cheng-Hsin Chang, King-Shing Yip, Yuchen Xue, Guan-Chi Lai:
Cloud Encryption Using Distributed Environmental Keys. 476-481
Xia-Yun Guo, Chin-Ling Chen, Chang-Qing Gong, Fang-Yie Leu:
A Secure Official Vehicle Communication Protocol for VANET. 482-485
PIS-PIS 2016
Session 1: Security for Public Internet Services

Kyungroul Lee, Yeunsu Lee, Hyeji Lee, Kangbin Yim:
A Brief Review on JTAG Security. 486-490
Byeong-Gwon Kang, Seungyong Han, Sangjoon Park
:
Impacts of Frequency Selectivity on the Error Performance of Time-Domain Equalizers in MIMO Systems. 491-494
Sanghwan Oh, Hanchul Bae, Soojin Yoon, Hwankuk Kim
, YoungTae Cha:
Malicious Script Blocking Detection Technology Using a Local Proxy. 495-498
Kyungroul Lee, Hyeji Lee, Yeunsu Lee, Kangbin Yim:
Analysis on the Key Storage Mechanism of the CNG Library. 499-502
Seungjun Yeon, Hyojung Jun:
Issues and Implementation Strategies of the IoT (Internet of Things) Industry. 503-508
Guangming Yang, Zhenhua Tan
, Fanghua Geng, Tianhan Gao:
A Novel Hybrid Algorithm Based on Hill Matrix and Haar Domain Sequence. 509-513
Dongmin Choi, Chang Choi
, Xin Su:
Invisible Secure Keypad Solution Resilient against Shoulder Surfing Attacks. 514-517
SMEUCE 2016
Session 1: Knowledge Learning and Service Innovation

Tin-Chang Chang, Shu-Hui Chuang:
Exploring Value of e-Service Innovation: e-Service and Co-operation Complementarity. 518-521
Ching-Hui Shih, Yao-Hua Wang:
Can Workplace Friendship Reduce Social Loafing? 522-526
Shu-Hui Chuang, Shinyi Lin, Tin-Chang Chang:
Exploring the Performance of Service Innovation: Infrastructure Capability and Innovation Orientation Complementarity. 527-530
Mei-Hua Liao, Yu-Ci Xu, Hidekazu Sone:
Old-Established Companies' Traditions and Innovations - Focusing on e-Business of Japan and Taiwan. 531-532
Kuei-Yuan Wang, Cheng-Chun Kuo:
The Key Value-Drivers of Successful Travel Agency from the Perspective of Its Core Competence: Lion Travel versus Phoenix Tours. 533-537
Session 2: Sustainability Management for e-Business and Professional Associations

Mei-Hua Liao, Wun-Huei Chen, Ying-Yun Lin:
SEO Behavior of the Family Firms through Agency Theory Perspective. 538-540
Mei Hua Huang, Chiung-Yen Chen:
Antecedents and Outcomes of Trust in Professional Associations. 541-545
Ying-Li Lin, Fang-Hua Hsiao, Pei-Shan Li:
Causal Analysis in Human Capital, R&D Assets and Financial Performance: Evidence from Taiwanese Firms Operating in China. 546-550
Yung-Shun Tsai, Chun-Ping Chang, Shyh-Weir Tzang, Yu-Jhen Liou:
The Impact of Stock Prices, Risks and Business Cycle on Overconfidence. 551-555
Chien-Wen Lai, Kuei-Yuan Wang, Tzu-Yu Lin:
A Comparative Study of Valuation and Value Drivers in the Auto Lamp Industry: Two Cases of Auto Lamp Companies. 556-562
Session 3: Ubiquitous Commerce and Operation Management

Li-Jen He:
Successor Audit Partner Choice for Mandatory Audit Partner Rotation Companies. 563-566
Chiung-Yen Chen, Mei Hua Huang:
An Investigation into Human Resources and Operating Performance between Competitive Strategies of Taiwan Public Accounting Firms. 567-572
Chia-Ju Lu, Yi-Yu Shih, Shih-Ten Wang:
The Effect of Corporate Social Responsibility Initiatives on Internal Employee Motivation and Organizational Identification. 573-577
Nien-Tzu Yang:
The Hindsight of ADR Listing - An Empirical Study on M&A Activities for Acquirers Before-and-After ADR Listing. 578-583
Chung-Jen Fu, Chiung-Yao Huang:
Linking Dynamic Equity Valuations to Optimum Weighting in the Performance Compensation System. 584-586
WAIS 2016
Session 1: Secure Systems

Takamichi Saito, Koki Yasuda, Takayuki Ishikawa, Rio Hosoi, Kazushi Takahashi, Yongyan Chen, Marcin Zalasinski
:
Estimating CPU Features by Browser Fingerprinting. 587-592
Takamichi Saito, Yuta Tsunoda, Daichi Miyata, Ryohei Watanabe, Yongyan Chen:
An Authorization Scheme Concealing Client's Access from Authentication Server. 593-598
Hiroaki Kikuchi, Kota Sasa, Yuta Shimizu:
Interactive History Sniffing Attack with Amida Lottery. 599-602
Pengfei Li, Yaokai Feng, Junpei Kawamoto, Kouichi Sakurai:
A Proposal for Cyber-Attack Trace-Back Using Packet Marking and Logging. 603-607
Longzhu Cai, Yaokai Feng, Junpei Kawamoto, Kouichi Sakurai:
A Behavior-Based Method for Detecting DNS Amplification Attacks. 608-613
Yuji Suga:
Generalized Graph-Based Visual Secret Sharing Schemes for Multiple Secrets. 614-619

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:







