default search action
INCoS 2012: Bucharest, Romania
- Fatos Xhafa, Leonard Barolli, Florin Pop, Xiaofeng Chen, Valentin Cristea:
2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, INCoS 2012, Bucharest, Romania, September 19-21, 2012. IEEE 2012, ISBN 978-1-4673-2279-9
Full Papers Sessions
Security and Cloud Computing
- Jingwei Li, Chunfu Jia, Jin Li, Zheli Liu:
A Novel Framework for Outsourcing and Sharing Searchable Encrypted Data on Hybrid Cloud. 1-7 - Changji Wang, Xuan Liu, Wentao Li:
Implementing a Personal Health Record Cloud Platform Using Ciphertext-Policy Attribute-Based Encryption. 8-14 - Shu Guo, Haixia Xu:
A Non-interactive Secure Outsourced Computation Scheme in Multi-party Cloud. 15-19 - Charlie Baker, Ashiq Anjum, Richard Hill, Nik Bessis, Saad Liaquat Kiani:
Improving Cloud Datacentre Scalability, Agility and Performance Using OpenFlow. 20-27
Intelligent and Immune Systems
- Pavel Krömer, Jan Platos, Václav Snásel:
Independent Task Scheduling by Artificial Immune Systems, Differential Evolution, and Genetic Algorithms. 28-32 - Olivier Champalle, Karim Sehaba, Dino Cosmas, Alain Mille, Yannick Prié:
Assistance to Trainers for the Observation and Analysis Activities of Operators Trainees on Nuclear Power Plant Full-Scope Simulator. 33-40 - Jan Platos, Pavel Krömer:
Improving Compression Using Words. 41-46 - Ana-Maria Sevcenco, Kin Fun Li, Kosuke Takano:
Collection and Classification of Tennis Swings Using a Virtual Racket. 47-54
Machine Learning and Agent Systems
- Mehdi Dehghanpour, Vahid Tabataba Vakili, Ali Farrokhi:
DOA Estimation Using Multiple Kernel Learning SVM Considering Mutual Coupling. 55-61 - Holman Bolívar Barón, Mario Martínez Rojas, Rubén González Crespo, Oscar Sanjuán Martínez:
A Multi-agent Matchmaker Based on Hidden Markov Model for Decentralized Grid Scheduling. 62-69 - Fatos Xhafa, Xavier Herrero, Admir Barolli, Makoto Takizawa:
A Struggle Genetic Algorithm for Ground Stations Scheduling Problem. 70-76 - Yali Peng, Fang Liu, Shigang Liu:
A Normalized Local Binary Fitting Model for Image Segmentation. 77-80
E-learning and Collaborative Systems
- Themistoklis Chronopoulos, Ioannis Hatzilygeroudis:
An Advising System for Supporting Users of Collaborative Activities in LMSs. 81-88 - Ioannis Magnisalis, Stavros N. Demetriadis:
Orchestrating Adaptive and Complex CSCL Scenarios through a Choreography among IMS-LD and External Services. 89-96 - Jorge Miguel, Santi Caballé, Josep Prieto:
Providing Security to Computer-Supported Collaborative Learning: An Overview. 97-104
Optimization in Networked Systems
- Nik Bessis, Stelios Sotiriadis, Florin Pop, Valentin Cristea:
Optimizing the Energy Efficiency of Message Exchanging for Service Distribution in Interoperable Infrastructures. 105-112 - Mario Köppen, Rodrigo Verschae, Masato Tsuru:
A Relational Approach to Collaborative Fairness. 113-120 - Yong Wang, Aixiang Guo, Hong He, Hui Li:
Optimization Transmission for Improving Degrees of Freedom in MIMO Y Channel. 121-125 - Yuri Takahashi, Chisa Takano, Yusuke Sakumoto, Masaki Aida:
Transmission Rate Control Utilizing Chaotic Nature of Coupled Oscillators. 126-131
Social Networking, Grid, and P2P Systems
- Demosthenes Akoumianakis, Nikolas Karadimitriou, George Vlachakis, Giannis Milolidakis, Nik Bessis:
Internet of Things as Virtual Settlements: Insights from Excavating Social Media Sites. 132-139 - Demosthenes Akoumianakis, Giannis Milolidakis, Patrizia Gnagnarella, Alessandro Maria Misotti, Nik Bessis:
Networking Tactics for Online eHealth Campaigns and Intervention Studies: Preliminary Results from a Case Study on Nutritional Support for Cancer Patients. 140-147 - Takumi Miyoshi, Yuki Shinozaki, Olivier Fourmaux:
A P2P Traffic Localization Method with Additional Delay Insertion. 148-154 - Florin Pop, Maria-Alexandra Lovin, Catalin Negru, Valentin Cristea, Nik Bessis, Stelios Sotiriadis:
Grid Configuration and Application Monitoring in GridGain. 155-161
Artificial and Agent-Based Collaborative Systems
- Stergios Tegos, Stavros N. Demetriadis, Thrasyvoulos Tsiatsos:
Using a Conversational Agent for Promoting Collaborative Language Learning. 162-165 - Hisayuki Sasaoka:
Evaluation for Acquiring Method for Agents' Actions with Ant Colony Optimization in Robo Cup Rescue Simulation System. 166-169 - Hidehisa Akiyama, Shigeto Aramaki, Tomoharu Nakashima:
Online Cooperative Behavior Planning Using a Tree Search Method in the RoboCup Soccer Simulation. 170-177
Wireless, Ad Hoc, and Sensor Networking
- Rodrigo Verschae, Mario Köppen, Masato Tsuru:
A Benchmark for Evaluating Approximated Algorithms for Fair Wireless Channel Allocation. 178-184 - Yulong Shen, Ning Xi, Qingqi Pei, Jianfeng Ma, Yudi Niu:
The Wireless Vertical Handoff Decision Algorithm with Parameter Prediction. 185-192 - Ryo Yamamoto, Takumi Miyoshi, Yoshiaki Tanaka:
Neighbour Traffic-Aware Load Balancing Method in Ad Hoc Networks. 193-197 - Phat Nguyen Huu, Vinh Tran-Quang, Takumi Miyoshi:
Distributed Image Encoding Scheme Using LDPC Codes over GF(q) on Wireless Sensor Networks. 198-205
Vehicular Networking and MANETs
- Huaqun Wang, Bo Qin, Josep Domingo-Ferrer:
An Improved Binary Authentication Tree Algorithm for Vehicular Networks. 206-213 - Mihaela Teler, Valentin Cristea:
Securing Vehicular Networks Using Deterministic Schemes for Computing Trust. 214-221 - Hui Zhu, Wenhai Pan, Beishui Liu, Hui Li:
A Lightweight Anonymous Authentication Scheme for VANET Based on Bilinear Pairing. 222-228 - Ying Cai, Xiaofei Wang, Yuqing Zhang:
The Analysis of Mobility Models in MANETs with Two-Hop Relay Algorithm. 229-236
Security Computation Schemes
- Haibo Tian, Zhengtao Jiang, Yi Liu, Baodian Wei:
A Non-delegatable Strong Designated Verifier Signature without Random Oracles. 237-244 - Jianhong Zhang, Yuwei Xu:
On the Security of an Enhanced ID-Based Anonymous Proxy Signature Scheme in ICCAE2010. 245-250 - Yilei Wang, Qiuliang Xu, Zhe Liu:
Multi-party Computation with Social Rational Parties. 251-258 - Li Xu, Penggui Pan, Xiaoding Wang, Wei Wu:
Physical-Layer Network Coding and Connected Dominating Set Based Routing Protocol in Wireless Multi-hop Network. 259-263
Security and Encryption
- Yuan Chen, Xiaofeng Chen, Hui Li:
DCCA-Secure Public-Key Encryptions from Hybrid Paradigms. 264-269 - Haixia Xu, Bao Li, Qixiang Mei:
Complementary Witness Soundness Witness Indistinguishable Proof System and CCA2 Public-Key Encryption Schemes. 270-278 - Li Yang, Jianfeng Ma, Zhihong Liu, Ruofan Zheng:
A Trusted Authentication Scheme for Wireless Networks Using Direct Anonymous Attestation. 279-285 - Bo Yang, Ying Sun, Yong Yu, Qi Xia:
A Strong Designated Verifier Signature Scheme with Secure Disavowability. 286-291
Cryptanalysis and Privacy
- Xi Sun, Haibo Tian, Yumin Wang:
Toward Quantum-Resistant Strong Designated Verifier Signature from Isogenies. 292-296 - Xiaotong Fu, Ruijun Shi:
Cryptanalysis of an Efficient Three-Party Key Exchange Protocol. 297-302 - Bo Zhang, Fangguo Zhang:
Secure Similarity Coefficients Computation with Malicious Adversaries. 303-310 - Xiaoyan Zhu, Momeng Liu, Min Xie:
Privacy-Preserving Affinity Propagation Clustering over Vertically Partitioned Data. 311-317
Security and Authentication I
- Xi Sun, Zhengtao Jiang, Meirong Zhou, Yumin Wang:
An Efficient Probably CP-CM-Secure Identity-Based Signature Scheme Applicable to Authentication in Multiuser Settings. 318-322 - Kai Fan, Jie Li, Hui Li, Xiaohui Liang, Xuemin (Sherman) Shen, Yintang Yang:
ESLRAS: A Lightweight RFID Authentication Scheme with High Efficiency and Strong Security for Internet of Things. 323-328 - Limin Shen, Futai Zhang, Yinxia Sun, Sujuan Li:
Cryptanalysis of a Certificateless Encryption Scheme in the Standard Model. 329-333 - Yueyu Zhang, Jie Chen, Hui Li, Wujun Zhang, Jin Cao, Chengzhe Lai:
Dynamic Group Based Authentication Protocol for Machine Type Communications. 334-341
Security and Authentication II
- Sujuan Li, Futai Zhang, Yinxia Sun, Limin Shen:
A New Variant of the Cramer-Shoup Leakage-Resilient Public Key Encryption. 342-346 - Xudong Zhu, Hui Li:
Unsupervised Human Action Categorization Using Latent Dirichlet Markov Clustering. 347-352 - Wujun Zhang, Yueyu Zhang, Jie Chen, Hui Li, Yumin Wang:
End-to-End Security Scheme for Machine Type Communication Based on Generic Authentication Architecture. 353-359 - Qi Xie, Guilin Wang, Fubiao Xia, Deren Chen:
Improvement of Provably Secure Self-Certified Proxy Convertible Authenticated Encryption Scheme. 360-364
Encoding, Malware, and Adversarial Systems
- Jian Mao, Yan Zhang, Xiandong Xu, Jianwei Liu, Tao Wei:
ET-DMD: An Error-Tolerant Scheme to Detect Malicious File Deletion on Distributed Storage. 365-372 - Lugang Zhao, Chengke Wu, Shigang Liu:
A Self-Calibration Method Based on Two Pairs of Orthogonal Parallel Lines. 373-376 - Chong-zhi Gao, Dongqing Xie, Jin Li, Baodian Wei, Haibo Tian:
Deniably Information-Hiding Encryptions Secure against Adaptive Chosen Ciphertext Attack. 377-384 - Yong Wang, Liu Yang, Yun Ai, Hui Li, Weidong Zhang:
Joint Signal Space Alignment and Precoding in Two-Way Relay Multi-user Networks. 385-389
Ontology and Semantic Collaborative Systems
- Aryya Gangopadhyay, Matthew Molek, Yelena Yesha, Mary Brady, Yaacov Yesha:
A Methodology for Ontology Evaluation Using Topic Models. 390-395 - M. E. Riu Villanueva, D. Bañeres Besora, Jordi Conesa Caralt:
Towards an Ontological Approach to Enrich a Community of Interest in Orthopaedic Specialty. 396-403 - Nabila Berkani, Selma Khouri, Ladjel Bellatreche:
Generic Methodology for Semantic Data Warehouse Design: From Schema Definition to ETL. 404-411 - Alba Amato, Beniamino Di Martino, Salvatore Venticinque:
A Semantic Framework for Delivery of Context-Aware Ubiquitous Services in Pervasive Environments. 412-419
Mobile and Location-Based Collaborative Systems
- Laia Descamps-Vila, Jordi Conesa, Antonio Pérez-Navarro:
Itiner@: Ontology for Personalizing Tourist Routes in Mobile Devices. 420-427 - Noriyuki Suzuki, Jane Louie Fresco Zamora, Shigeru Kashihara, Suguru Yamaguchi:
SOSCast: Location Estimation of Immobilized Persons through SOS Message Propagation. 428-435 - Takuya Tsuruike, Kazuya Tsukamoto, Masato Tsuru, Yuji Oie:
A Message Forward Scheduling Based on a Secretary Problem for Mobile Relay Nodes. 436-442 - Laia Descamps-Vila, Jordi Conesa, Antonio Pérez-Navarro:
Implementation of High Complex Routing Algorithms in Mobile Devices: The Itiner@ Case. 443-450
Intelligent Traffic and Disaster Management
- Yuta Kimura, Hiroshi Tsuji, Hiroyoshi Miwa:
Performance Evaluation of Virtual Segment Method Based on Actual Road Network Topology at the Time of the Great East Japan Earthquake. 451-456 - Akihiro Fujihara, Hiroyoshi Miwa:
Effect of Traffic Volume in Real-Time Disaster Evacuation Guidance Using Opportunistic Communications. 457-462 - Tibebe Beshah, Dejene Ejigu, Pavel Krömer, Václav Snásel, Jan Platos, Ajith Abraham:
Learning the Classification of Traffic Accident Types. 463-468
Short Papers Session
- Zhefeng Zou, Zhen Wang, Xiaoping Yuan, Peng Liu:
Secure Provable Data Possession for Object Storage System. 469-472 - Jianhong Zhang, Yuwei Xu:
Comment on Anonymous Multi-receiver Identity-Based Encryption Scheme. 473-476 - Laia Descamps-Vila, Jordi Conesa, Antonio Pérez-Navarro:
How Can Semantic Be Introduced in GIS Mobile Applications: Expectations, Theory and Reality. 477-482
Poster Session
- Hajar Omrana, Fatima-Zahra Belouadha, Ounsa Roudiès:
A Composability Model for Efficient Web Service's Connectivity. 483-484 - Ioan-Valentin Sita:
Collaborative Systems for Building Automation. 485-486 - Dana Petcu, Marc Frîncu, Silviu Panica, Marian Neagul:
Towards Programmatic Management of Services from Multiple Clouds. 487-488 - Alex Galis, Stuart Clayman:
Management of Software Driven Networks - Research Challenges. 489-490 - Mitsuhiro Suenaga, Makoto Otani, Hisaharu Tanaka, Kenzi Watanabe:
Opengate on OpenFlow: System Outline. 491-492 - Supalerk Jivorasetkul, Masayoshi Shimamura, Katsuyoshi Iida:
End-to-End Header Compression over Software-Defined Networks: A Low Latency Network Architecture. 493-494 - Traian-Lucian Militaru, George Suciu, Gyorgy Todoran, Anisia Florescu, Vlad Poenaru, Laurentiu Nae, Cristian Cernat:
Rule Based Expert Systems Running over the Cloud. 495-496
CIDM 2012 Workshop
Advanced Methods for Disaster Management
- Frank-Gerrit Poggenpohl, Dennis Güttinger:
Optimizing Task Allocation on Fire Fighting. 497-502 - Asta Zelenkauskaite, Nik Bessis, Stelios Sotiriadis, Eleana Asimakopoulou:
Interconnectedness of Complex Systems of Internet of Things through Social Network Analysis for Disaster Management. 503-508 - Asta Zelenkauskaite, Nik Bessis, Stelios Sotiriadis, Eleana Asimakopoulou:
Disaster Management and Profile Modelling of IoT Objects: Conceptual Parameters for Interlinked Objects in Relation to Social Network Analysis. 509-514 - Alexandru Petculescu:
Context Based Access Control in Pervasive Environments. 515-519
C3WN 2012 Workshop
Resource Allocation
- Chungang Yang, Min Sheng, Jiandong Li, Hongyan Li, Jing Li:
Energy-Aware Joint Power and Rate Control in Overlay Cognitive Radio Networks: A Nash Bargaining Perspective. 520-524 - Jing Song, Jianhua Ge, Jing Li, Li Cong:
Game-Theoretic Resource Allocation of the Cognitive Base Station in Two-Tie Co-existing Femtocell Networks. 525-530 - Yancheng Ji, Guoan Zhang, Xiaoge Zhang, Xun Huang:
Outage-Optimal Power Allocation for Space-Time Cooperative Network Coding with Amplify-and-Forward. 531-535
Cooperative Transmission
- Xiaoye Shi, Jianhua Ge, Yancheng Ji, Chuiqiang Sun:
Network-Coding-Based Hybrid-ARQ for Two-Way Relaying. 536-540 - Dongdong Wei, Lei Deng, Yun Rui, Mingqi Li, Fang Wang:
Cooperative Transmission with Broadcasting and Communication. 541-545 - Defeng Ren, Jianhua Ge, Xiaoye Shi:
Novel Distributed Turbo Coding Scheme in Two-Hop Relay Networks. 546-549 - Jun Xia, Yun Rui, Kai Yu, Fei Yin, Haifeng Wang, Zhiyong Bu:
Coordinated Multimode (Cellular - WSN) User Equipment Accessing Wireless Sensor Network Mechanism. 550-555
Cognitive Networks
- Bin Zhu, Jianhua Ge, Xiaoye Shi, Yunxia Huang:
Interference Alignment with Complex FDPM-Based Subspace Tracking in MIMO Cognitive Networks. 556-561 - Chuiqiang Sun, Jianhua Ge, Xinxin Bao, Xiaoye Shi:
A Leakage-Based Precoding Scheme for Cognitive Multiuser MIMO Systems. 562-565 - Yun Yang, Guo-an Zhang, Yancheng Ji:
Impartial Spectrum Decision under Interference Temperature Model in Cognitive Wireless Mesh Networks. 566-570
LSNS 2012 Workshop
Security Analysis
- Jindan Zhang, Xu An Wang:
On the Security of a Multi-use CCA-Secure Proxy Re-encryption Scheme. 571-576 - Baocang Wang, Hao Lei:
Lattice Attack on the Knapsack Cipher 0/255. 577-580 - Jindan Zhang, Xu An Wang:
Security Analysis of a Multi-use Identity Based CCA-Secure Proxy Re-encryption Scheme. 581-586 - Lei Niu, Yong Yu, Jianbing Ni, Ying Sun:
Further Cryptanalysis of a Signature Scheme with Message Recovery. 587-589
Attack and Design
- Chunfei Ju, Hui Yuan:
Key Recovery Attack on a Knapsack Public Key Cryptosystem. 590-593 - Xi Cao, Li Xu, Yuexin Zhang, Wei Wu:
Identity-Based Proxy Signature for Cloud Service in SaaS. 594-599 - Xu Ma, Jin Li, Fangguo Zhang:
Efficient and Secure Batch Exponentiations Outsourcing in Cloud Computing. 600-605 - Bo Qin, Huaqun Wang, Qianhong Wu, Jianwei Liu, Josep Domingo-Ferrer:
A New Identity Based Signcryption Scheme in the Standard Model. 606-611
SloT 2012 Workshop
Data Security and Management
- Traian Popeea, Anca Constantinescu, Laura-Cristina Gheorghe, Nicolae Tapus:
Inference Detection and Database Security for a Business Environment. 612-617 - Sergiu Costea, Dumitru Marian Barbu, Gabriel Ghinita, Razvan Rughinis:
A Comparative Evaluation of Private Information Retrieval Techniques in Location-Based Services. 618-623 - Andreea Urzica, Mircea Bardac:
Optimized Directional Content Distribution Using Reputation. 624-629 - Laura Gheorghe, Dan Tudose, Markus Wehner, Sven Zeisberg:
Securing Virtual Networks for Multi-owner Wireless Sensor Networks. 630-635 - Laura Gheorghe, Razvan Rughinis, Nicolae Tapus:
Adaptive Security Framework for Wireless Sensor Networks. 636-641
MC2 2012 Workshop
Motion Capture and Classification
- Manel Boutaleb, Imen Lassoued, Ezzeddine Zagrouba:
A Comparative Study between Spatial-Temporal Orthogonal Moments for Volumes Description. 642-647 - Michael L. McGuire:
An Overview of Gait Analysis and Step Detection in Mobile Computing Devices. 648-651 - Jacob Wilschrey, Cristian Rusu, Ivan Mercado, Rodolfo Inostroza, Cristhy Jiménez:
Virtual Drums Based on Natural Interaction. 652-655 - Adso Fernández-Baena, Antonio Susín, Xavier Lligadas:
Biomechanical Validation of Upper-Body and Lower-Body Joint Movements of Kinect Motion Capture Data for Rehabilitation Treatments. 656-661
FINCoS 2012 Workshop
Intelligent Collaborative Systems
- Ioan-Valentin Sita:
Building Control, Monitoring, Safety and Security Using Collaborative Systems. 662-667 - Xiaotong Fu, Wen Liu:
Constructing Designated-Verifier Ring Signature and Ring Signcryption under the k-CCA2 Assumption. 668-670 - Alexandru Petculescu:
A Practical Metadata Model for Access Control Modules. 671-676 - Evgenios Vlachos:
The Spiral-In Method for Designing and Connecting Learning Objects. 677-681 - Saad Alqithami, Henry Hexmoor:
Social Capital in Virtual Organizations. 682-687
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.