Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
NBIS
NBIS 2015
Generate Citations
2015 18th International Conference on Network-Based Information Systems (NBiS)
Sept. 2 2015 to Sept. 4 2015
Taipei, Taiwan
Table of Contents
Title Page i
Freely available from IEEE.
pp. i-i
Title Page iii
Freely available from IEEE.
pp. iii-iii
Copyright Page
Freely available from IEEE.
pp. iv-iv
Table of Contents
Freely available from IEEE.
pp. v-xvi
Message from Steering Committee Co-Chairs
Freely available from IEEE.
pp. xvii-xvii
Message from General Co-Chairs
Freely available from IEEE.
pp. xviii-xviii
Message from Program Committee Co-Chairs
Freely available from IEEE.
pp. xix-xix
Message from Workshops Co-Chairs
Freely available from IEEE.
pp. xx-xx
NBiS 2015 Conference Organization
Freely available from IEEE.
pp. xxi-xxvii
NBiS 2015 Reviewers
Freely available from IEEE.
pp. xxviii-xxviii
Message from ADPNA 2015 Workshop Organizers
Freely available from IEEE.
pp. xxix-xxix
ADPNA 2015 Workshop Organization
Freely available from IEEE.
pp. xxx-xxx
ADPNA 2015 reviewers
Freely available from IEEE.
pp. xxxi-xxxi
Message from DEMoC 2015 Workshop Chair
Freely available from IEEE.
pp. xxxii-xxxii
DEMoC 2015 Workshop Organization
Freely available from IEEE.
pp. xxxiii-xxxiii
DEMoC 2015 Reviewers
Freely available from IEEE.
pp. xxxiv-xxxiv
Message from HETNET 2015 Workshop Co-Chairs
Freely available from IEEE.
pp. xxxv-xxxv
HETNET 2015 Workshop Organization
Freely available from IEEE.
pp. xxxvi-xxxvi
HETNET 2015 Reviewers
Freely available from IEEE.
pp. xxxvii-xxxvii
Message from INVITE 2015 Workshop Organizers
Freely available from IEEE.
pp. xxxviii-xxxviii
INVITE 2015 Workshop Organization
Freely available from IEEE.
pp. xxxix-xxxix
INVITE 2015 Reviewers
Freely available from IEEE.
pp. xl-xl
Message from INWC 2015 Workshop Organizers
Freely available from IEEE.
pp. xli-xli
INWC 2015 Workshop Organization
Freely available from IEEE.
pp. xlii-xlii
INWC 2015 Reviewers
Freely available from IEEE.
pp. xliii-xliii
Message from ISSE 2015 Workshop Co-Chairs
Freely available from IEEE.
pp. xliv-xliv
ISSE 2015 Workshop Organization
Freely available from IEEE.
pp. xlv-xlv
ISSE 2015 Reviewers
Freely available from IEEE.
pp. xlvi-xlvi
Message from TwCSec 2015 Workshop Co-Chairs
Freely available from IEEE.
pp. xlvii-xlvii
TwCSec 2015 Workshop Organization
Freely available from IEEE.
pp. xlviii-xlviii
TwCSec 2015 Reviewers
Freely available from IEEE.
pp. xlvix-xlvix
Message from WSSM 2015 Workshop Organizers
Freely available from IEEE.
pp. l-l
WSSM 2015 Workshop Organization
Freely available from IEEE.
pp. li-li
WSSM 2015 Reviewers
Freely available from IEEE.
pp. lii-lii
Keynotes
Freely available from IEEE.
pp. liii-liii
Tour Planning for AUV Data Gathering in Underwater Wireless
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Shih-Hao Chang
,
Kuei-Ping Shih
A Concentric-Based Sleep Scheduling Scheme for Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 6-13
by
Ying-Hong Wang
,
Yu-Hsuan Hsu
,
Yu-Yu Lin
A Wireless Physiological Sensor Area Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 14-19
by
Chi-Lun Ho
,
Fang-Yie Leu
Depth-Based Energy-Balanced Hybrid Routing Protocol for Underwater WSNs
Full-text access may be available. Sign in or learn about subscription options.
pp. 20-25
by
Tayyaba Liaqat
,
Nadeem Javaid
,
Syed Muaraf Ali
,
Muhammad Imran
,
Mohammed Alnuem
DTN Based MANET for Disaster Information Transport by Smart Devices
Full-text access may be available. Sign in or learn about subscription options.
pp. 26-31
by
Shinya Kitada
,
Go Hirakawa
,
Goshi Sato
,
Noriki Uchida
,
Yoshitaka Shibata
An Energy-Efficient Load Balancing Algorithm to Perform Computation Type Application Processes for Virtual Machine Environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 32-39
by
Tomoya Enokido
,
Makoto Takizawa
Multi-level Computation and Power Consumption Models
Full-text access may be available. Sign in or learn about subscription options.
pp. 40-47
by
Hiroki Kataoka
,
Dilawaer Duolikun
,
Tomoya Enokido
,
Makoto Takizawa
Towards Multiple Knapsack Problem Approach for Home Energy Management in Smart Grid
Full-text access may be available. Sign in or learn about subscription options.
pp. 48-52
by
S. Rahim
,
S. A. Khan
,
N. Javaid
,
N. Shaheen
,
Z. Iqbal
,
G. Rehman
An Energy Efficient Residential Load Management System for Multi-class Appliances in Smart Homes
Full-text access may be available. Sign in or learn about subscription options.
pp. 53-57
by
M. B. Rasheed
,
M. Awais
,
N. Javaid
,
Z. Iqbal
,
A. Khurshid
,
F. A. Chaudhry
,
F. Ilahi
A Hybrid Algorithm for Energy Management in Smart Grid
Full-text access may be available. Sign in or learn about subscription options.
pp. 58-63
by
N. Shaheen
,
N. Javaid
,
Z. Iqbal
,
K. Muhammad
,
K. Azad
,
F. A. Chaudhry
Performance Analysis of Never Die Network Based on Software Defined Disaster Resilient System
Full-text access may be available. Sign in or learn about subscription options.
pp. 64-70
by
Goshi Sato
,
Noriki Uchida
,
Norio Shiratori
,
Yoshitaka Shibata
A Proposal of QoS-aware Power Saving Scheme for SDN-based Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 71-77
by
Shingo Sasaki
,
Kanayo Ogura
,
Bhed Bahadur Bista
,
Toyoo Takata
Performance Analysis of WMN-GA Simulation System for Different WMN Architectures and Routing Protocols Considering Weibull Distribution
Full-text access may be available. Sign in or learn about subscription options.
pp. 78-84
by
Keita Matsuo
,
Tetsuya Oda
,
Admir Barolli
,
Leonard Barolli
,
Fatos Xhafa
Application of WMN-HC Web Interface and NS-3 for Optimization and Analysis in WMNs Considering Different Number of Mesh Routers and Architectures
Full-text access may be available. Sign in or learn about subscription options.
pp. 85-92
by
Algenti Lala
,
Tetsuya Oda
,
Admir Barolli
,
Vladi Kolici
,
Leonard Barolli
,
Fatos Xhaf
Performance Evaluation of a WMN Testbed in Indoor Environment Considering Mobile Mesh Node Scenario
Full-text access may be available. Sign in or learn about subscription options.
pp. 93-98
by
Tetsuya Oda
,
Keita Matsuo
,
Leonard Barolli
,
Makoto Ikeda
,
Makoto Takizawa
Reduction of Unnecessarily Ordered Messages in Scalable Group Communication
Full-text access may be available. Sign in or learn about subscription options.
pp. 99-106
by
Hiroaki Honda
,
Shigenari Nakamura
,
Dilawaer Duolikun
,
Tomoya Enokido
,
Makoto Takizawa
A Two -- Stage Reservoir Sampling Algorithm for Massive Network Graphs
Full-text access may be available. Sign in or learn about subscription options.
pp. 107-114
by
Kai Cheng
Eclipse: A New Dynamic Delay-based Congestion Control Algorithm for Background Traffic
Full-text access may be available. Sign in or learn about subscription options.
pp. 115-123
by
Hakim Adhari
,
Thomas Dreibholz
,
Sebastian Werner
,
Erwin Paul Rathgeb
High-Speed Communication with Confidentiality by Compactification of Design Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 124-131
by
Shuji Shoji
,
Akio Koyama
A Flexible Read-Write Abortion Protocol with Sensitivity of Roles
Full-text access may be available. Sign in or learn about subscription options.
pp. 132-139
by
Shigenari Nakamura
,
Dilawaer Duolikun
,
Tomoya Enokido
,
Makoto Takizawa
Location Privacy Protection Considering the Location Safety
Full-text access may be available. Sign in or learn about subscription options.
pp. 140-145
by
Kohei Kasori
,
Fumiaki Sato
A Negotiated Virtual Role Solution in RBAC Scheme for Group-Based Heterogeneous Wireless Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 146-150
by
Hsing-Chung Chen
Mitigating the Wrongful Bandwidth Occupation by Malicious Node in Public Wireless Access Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 151-157
by
Shohei Nitta
,
Tetsuya Shigeyasu
Wi-Fi Access Point Roaming: Challenges and Potential Solutions
Full-text access may be available. Sign in or learn about subscription options.
pp. 158-161
by
Lianyuan Wang
,
Yuxuan Zhao
,
David Afolabi
,
Ka Lok Man
,
Hai-Ning Liang
,
Dawei Liu
,
Yiu Fai Lam
,
Charles Fleming
,
Moncef Tayahi
Building a Secure Cross Platform Enterprise Service Mobile Apps Using HTML5
Full-text access may be available. Sign in or learn about subscription options.
pp. 162-166
by
Hsin-Chang Lin
,
Guanling Lee
A Handover Prediction Mechanism Based on LTE-A UE History Information
Full-text access may be available. Sign in or learn about subscription options.
pp. 167-172
by
Ying-Hong Wang
,
Jui-Lin Chang
,
Guo-Rui Huang
A Load-Balancing Algorithm for Hadoop Distributed File System
Full-text access may be available. Sign in or learn about subscription options.
pp. 173-179
by
Chi-Yi Lin
,
Ying-Chen Lin
Suggestion of the Cloud Type Virtual Policy Based Network Management Scheme for the Common Use between Plural Organizations
Full-text access may be available. Sign in or learn about subscription options.
pp. 180-186
by
Kazuya Odagiri
,
Shogo Shimizu
,
Naohiro Ishii
,
Makoto Takizawa
An Extensible Home Automation Architecture Based on Cloud Offloading
Full-text access may be available. Sign in or learn about subscription options.
pp. 187-194
by
Yuichi Igarashi
,
Matti Hiltunen
,
Kaustubh Joshi
,
Richard Schlichting
Distributed Synchronization over RESTful Web API
Full-text access may be available. Sign in or learn about subscription options.
pp. 195-198
by
Daiki Murayama
,
Shouki Mizuno
,
Akihiro Fujii
A Cloud-Based Mobile Anger Prediction Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 199-205
by
Yuan-Chih Yu
Mobile Cloud Computing on Delay Tolerant Network Protocol
Full-text access may be available. Sign in or learn about subscription options.
pp. 206-211
by
Yosuke Kikuchi
,
Yoshitaka Shibata
SSH: Salient Structures Histogram for Content Based Image Retrieval
Full-text access may be available. Sign in or learn about subscription options.
pp. 212-217
by
Jamil Ahmad
,
Muhammad Sajjad
,
Irfan Mehmood
,
Sung Wook Baik
Exploring the Cognitive Psychology Paradigm of a Programming Language and Identification of Emotion under Collective Intelligence: An Experience with an Ant Colony Metaphor
Full-text access may be available. Sign in or learn about subscription options.
pp. 218-225
by
Eiman Tamah Al-Shammari
,
Soumya Banerjee
,
Dana Timar Balas
,
Neil Y. Yen
Implementation and Evaluation of a Spatial Metadata Join Method Based on Camera-Viewing Area
Full-text access may be available. Sign in or learn about subscription options.
pp. 226-231
by
Masato Kasahara
,
Shu Li
,
Kosuke Takano
,
Kin Fun Li
A Method for Estimating a Stress State Using a Pulse Sensor for QOL Visualization
Full-text access may be available. Sign in or learn about subscription options.
pp. 232-237
by
Sayaka Akiyama
,
Yuka Kato
IslayTouch: An Educational Visual Programming Environment Based on State-Transition Diagrams that Runs on Android Devices
Full-text access may be available. Sign in or learn about subscription options.
pp. 238-241
by
Erjing Zhou
,
Shusuke Okamoto
,
Michitoshi Niibori
,
Masaru Kamada
,
Tatsuhiro Yonekura
Business Resilient Vulnerability Analysis for Dynamic High Security Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 242-249
by
Klaus Zaerens
Security Authorization Scheme for Web Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 250-256
by
Takamichi Saito
,
Daichi Miyata
,
Takafumi Watanabe
,
Yuta Nishikura
CAPTCHA System by Differentiating the Awkwardness of Objects
Full-text access may be available. Sign in or learn about subscription options.
pp. 257-263
by
Michitomo Yamaguchi
,
Takeshi Okamoto
,
Kikuchi Hiroaki
An Attempt to Memorize Strong Passwords while Playing Games
Full-text access may be available. Sign in or learn about subscription options.
pp. 264-268
by
Masahiro Fujita
,
Mako Yamada
,
Shiori Arimura
,
Yuki Ikeya
,
Masakatsu Nishigaki
Personalized Cryptography in Data Sharing and Management
Full-text access may be available. Sign in or learn about subscription options.
pp. 269-272
by
Marek R. Ogiela
,
Lidia Ogiela
Incrementally Mining Usage Correlations among Appliances in Smart Homes
Full-text access may be available. Sign in or learn about subscription options.
pp. 273-279
by
Yi-Cheng Chen
,
Hsiu-Chieh Hung
,
Bing-Yang Chiang
,
Sheng-Yuan Peng
,
Peng-Jun Chen
SAX-based Group Stock Portfolio Mining Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 280-285
by
Chun-Hao Chen
,
Cheng-Yu Lu
,
Chih-Hung Yu
Multivariate and Categorical Analysis of Gaming Statistics
Full-text access may be available. Sign in or learn about subscription options.
pp. 286-293
by
Pin-Yu Chen
,
Zhengling Qi
,
Yanxin Pan
,
Shin-Ming Cheng
An Algorithm of City-Level Landmark Mining Based on Internet Forum
Full-text access may be available. Sign in or learn about subscription options.
pp. 294-301
by
Guang Zhu
,
Xiangyang Luo
,
Fenlin Liu
,
Jingning Chen
Rail Inspection Meets Big Data: Methods and Trends
Full-text access may be available. Sign in or learn about subscription options.
pp. 302-308
by
Qingyong Li
,
Zhangdui Zhong
,
Zhengping Liang
,
Yong Liang
Push-Based Traffic-Aware Cache Management in Named Data Networking
Full-text access may be available. Sign in or learn about subscription options.
pp. 309-316
by
Kenta Mori
,
Takashi Kamimoto
,
Hiroshi Shigeno
A GPU-based Fast Solution for Riesz Space Fractional Reaction-Diffusion Equation
Full-text access may be available. Sign in or learn about subscription options.
pp. 317-323
by
Qinglin Wang
,
Jie Liu
,
Chunye Gong
,
Yang Zhang
,
Zuocheng Xing
Design of Application Specific Throughput Processor for Matrix Operations
Full-text access may be available. Sign in or learn about subscription options.
pp. 324-331
by
Ping-Ju Wu
,
Chien-Yu Lin
,
Bo-Cheng Charles Lai
Effectiveness Comparison of Kinect and Kinect 2 for Recognition of Oyama Karate Techniques
Full-text access may be available. Sign in or learn about subscription options.
pp. 332-337
by
Tomasz Hachaj
,
Marek R. Ogiela
,
Katarzyna Koptyra
A New FACS for Cellular Wireless Networks Considering QoS: A Comparison Study of FuzzyC with MATLAB
Full-text access may be available. Sign in or learn about subscription options.
pp. 338-344
by
Takaaki Inaba
,
Shinji Sakamoto
,
Tetsuya Oda
,
Leonard Barolli
,
Makoto Takizawa
Selection of Rendezvous Point in Content Centric Networks Using Fuzzy Logic
Full-text access may be available. Sign in or learn about subscription options.
pp. 345-350
by
Donald Elmazi
,
Tetsuya Oda
,
Shinji Sakamoto
,
Elis Kulla
,
Evjola Spaho
,
Leonard Barolli
An Efficient Genetic Algorithm Based Demand Side Management Scheme for Smart Grid
Full-text access may be available. Sign in or learn about subscription options.
pp. 351-356
by
M. Awais
,
N. Javaid
,
N. Shaheen
,
Z. Iqbal
,
G. Rehman
,
K. Muhammad
,
I. Ahmad
Energy-Efficient Broadcast Protocols in Wireless Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 357-364
by
Miyu Sugino
,
Shigenari Nakamura
,
Tomoya Enokido
,
Makoto Takizawa
A Road Alert Information Sharing System with Multiple Vehicles Using Vehicle-to-Vehicle Communication Considering Various Communication Network Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 365-370
by
Kenta Ito
,
Go Hirakawa
,
Yoshikazu Arai
,
Yoshitaka Shibata
Efficient Remote Software Execution Architecture Based on Dynamic Address Translation for Internet-of-Things Software Execution Platform
Full-text access may be available. Sign in or learn about subscription options.
pp. 371-378
by
Minwoo Jung
,
Daejin Park
,
Jeonghun Cho
Selective Delivery of Event Messages in Peer-to-Peer Topic-Based Publish/Subscribe Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 379-386
by
Hiroki Nakayama
,
Dilawaer Duolikun
,
Tomoya Enokido
,
Makoto Takizawa
Proposal of Connectivity Support Methods with Autonomous Flight Wireless Nodes for Never Die Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 387-392
by
Noriki Uchida
,
Goshi Sato
,
Yoshitaka Shibata
,
Norio Shiratori
Dynamically Deploying Packet Processing Applications on Running Systems without Halting
Full-text access may be available. Sign in or learn about subscription options.
pp. 393-400
by
Ralph Duncan
,
Peder Jungck
,
Kenneth Ross
,
Alfredo Chorro-Rivas
,
Jim Frandeen
,
Minh Nguyen
Preparing HPC Applications for Exascale: Challenges and Recommendations
Full-text access may be available. Sign in or learn about subscription options.
pp. 401-406
by
Erika Abraham
,
Costas Bekas
,
Ivona Brandic
,
Samir Genaim
,
Einar Broch Johnsen
,
Ivan Kondov
,
Sabri Pllana
,
Achim Streit
Eco Models of Storage-Based Severs
Full-text access may be available. Sign in or learn about subscription options.
pp. 407-411
by
Atsuhiro Sawada
,
Shigenari Nakamura
,
Tomoya Enokido
,
Makoto Takizawa
Risk Assessment in Cyber-Physical System in Office Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 412-417
by
Shoichi Yoneda
,
Shigeaki Tanimoto
,
Tsutomu Konosu
,
Hiroyuki Sato
,
Atsushi Kanai
A Simulation System Based on ONE and SUMO Simulators: Performance Evaluation of Direct Delivery, Epidemic and Energy Aware Epidemic DTN Protocols
Full-text access may be available. Sign in or learn about subscription options.
pp. 418-423
by
Tetsuya Oda
,
Donald Elmazi
,
Evjola Spaho
,
Vladi Kolici
,
Leonard Barolli
Performance Evaluation of Routing Method Based on Neighboring Node Information in WMN
Full-text access may be available. Sign in or learn about subscription options.
pp. 424-431
by
Wataru Kobayashi
,
Kazunori Ueda
,
Yuta Maruoka
Showing 100 out of 158
Load More
Load All