Default Cover Image

2015 18th International Conference on Network-Based Information Systems (NBiS)

Sept. 2 2015 to Sept. 4 2015

Taipei, Taiwan

Table of Contents

Title Page iFreely available from IEEE.pp. i-i
Title Page iiiFreely available from IEEE.pp. iii-iii
Copyright PageFreely available from IEEE.pp. iv-iv
Table of ContentsFreely available from IEEE.pp. v-xvi
Message from Steering Committee Co-ChairsFreely available from IEEE.pp. xvii-xvii
Message from General Co-ChairsFreely available from IEEE.pp. xviii-xviii
Message from Program Committee Co-ChairsFreely available from IEEE.pp. xix-xix
Message from Workshops Co-ChairsFreely available from IEEE.pp. xx-xx
NBiS 2015 Conference OrganizationFreely available from IEEE.pp. xxi-xxvii
NBiS 2015 ReviewersFreely available from IEEE.pp. xxviii-xxviii
Message from ADPNA 2015 Workshop OrganizersFreely available from IEEE.pp. xxix-xxix
ADPNA 2015 Workshop OrganizationFreely available from IEEE.pp. xxx-xxx
ADPNA 2015 reviewersFreely available from IEEE.pp. xxxi-xxxi
Message from DEMoC 2015 Workshop ChairFreely available from IEEE.pp. xxxii-xxxii
DEMoC 2015 Workshop OrganizationFreely available from IEEE.pp. xxxiii-xxxiii
DEMoC 2015 ReviewersFreely available from IEEE.pp. xxxiv-xxxiv
Message from HETNET 2015 Workshop Co-ChairsFreely available from IEEE.pp. xxxv-xxxv
HETNET 2015 Workshop OrganizationFreely available from IEEE.pp. xxxvi-xxxvi
HETNET 2015 ReviewersFreely available from IEEE.pp. xxxvii-xxxvii
Message from INVITE 2015 Workshop OrganizersFreely available from IEEE.pp. xxxviii-xxxviii
INVITE 2015 Workshop OrganizationFreely available from IEEE.pp. xxxix-xxxix
INVITE 2015 ReviewersFreely available from IEEE.pp. xl-xl
Message from INWC 2015 Workshop OrganizersFreely available from IEEE.pp. xli-xli
INWC 2015 Workshop OrganizationFreely available from IEEE.pp. xlii-xlii
INWC 2015 ReviewersFreely available from IEEE.pp. xliii-xliii
Message from ISSE 2015 Workshop Co-ChairsFreely available from IEEE.pp. xliv-xliv
ISSE 2015 Workshop OrganizationFreely available from IEEE.pp. xlv-xlv
ISSE 2015 ReviewersFreely available from IEEE.pp. xlvi-xlvi
Message from TwCSec 2015 Workshop Co-ChairsFreely available from IEEE.pp. xlvii-xlvii
TwCSec 2015 Workshop OrganizationFreely available from IEEE.pp. xlviii-xlviii
TwCSec 2015 ReviewersFreely available from IEEE.pp. xlvix-xlvix
Message from WSSM 2015 Workshop OrganizersFreely available from IEEE.pp. l-l
WSSM 2015 Workshop OrganizationFreely available from IEEE.pp. li-li
WSSM 2015 ReviewersFreely available from IEEE.pp. lii-lii
KeynotesFreely available from IEEE.pp. liii-liii
Tour Planning for AUV Data Gathering in Underwater WirelessFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
A Concentric-Based Sleep Scheduling Scheme for Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 6-13
A Wireless Physiological Sensor Area NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 14-19
Depth-Based Energy-Balanced Hybrid Routing Protocol for Underwater WSNsFull-text access may be available. Sign in or learn about subscription options.pp. 20-25
DTN Based MANET for Disaster Information Transport by Smart DevicesFull-text access may be available. Sign in or learn about subscription options.pp. 26-31
Multi-level Computation and Power Consumption ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 40-47
Towards Multiple Knapsack Problem Approach for Home Energy Management in Smart GridFull-text access may be available. Sign in or learn about subscription options.pp. 48-52
A Hybrid Algorithm for Energy Management in Smart GridFull-text access may be available. Sign in or learn about subscription options.pp. 58-63
A Proposal of QoS-aware Power Saving Scheme for SDN-based NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 71-77
A Two -- Stage Reservoir Sampling Algorithm for Massive Network GraphsFull-text access may be available. Sign in or learn about subscription options.pp. 107-114
Eclipse: A New Dynamic Delay-based Congestion Control Algorithm for Background TrafficFull-text access may be available. Sign in or learn about subscription options.pp. 115-123
High-Speed Communication with Confidentiality by Compactification of Design DataFull-text access may be available. Sign in or learn about subscription options.pp. 124-131
A Flexible Read-Write Abortion Protocol with Sensitivity of RolesFull-text access may be available. Sign in or learn about subscription options.pp. 132-139
Location Privacy Protection Considering the Location SafetyFull-text access may be available. Sign in or learn about subscription options.pp. 140-145
A Negotiated Virtual Role Solution in RBAC Scheme for Group-Based Heterogeneous Wireless NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 146-150
Mitigating the Wrongful Bandwidth Occupation by Malicious Node in Public Wireless Access NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 151-157
Building a Secure Cross Platform Enterprise Service Mobile Apps Using HTML5Full-text access may be available. Sign in or learn about subscription options.pp. 162-166
A Handover Prediction Mechanism Based on LTE-A UE History InformationFull-text access may be available. Sign in or learn about subscription options.pp. 167-172
A Load-Balancing Algorithm for Hadoop Distributed File SystemFull-text access may be available. Sign in or learn about subscription options.pp. 173-179
An Extensible Home Automation Architecture Based on Cloud OffloadingFull-text access may be available. Sign in or learn about subscription options.pp. 187-194
Distributed Synchronization over RESTful Web APIFull-text access may be available. Sign in or learn about subscription options.pp. 195-198
A Cloud-Based Mobile Anger Prediction ModelFull-text access may be available. Sign in or learn about subscription options.pp. 199-205
Mobile Cloud Computing on Delay Tolerant Network ProtocolFull-text access may be available. Sign in or learn about subscription options.pp. 206-211
SSH: Salient Structures Histogram for Content Based Image RetrievalFull-text access may be available. Sign in or learn about subscription options.pp. 212-217
Implementation and Evaluation of a Spatial Metadata Join Method Based on Camera-Viewing AreaFull-text access may be available. Sign in or learn about subscription options.pp. 226-231
A Method for Estimating a Stress State Using a Pulse Sensor for QOL VisualizationFull-text access may be available. Sign in or learn about subscription options.pp. 232-237
Business Resilient Vulnerability Analysis for Dynamic High Security EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 242-249
Security Authorization Scheme for Web ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 250-256
CAPTCHA System by Differentiating the Awkwardness of ObjectsFull-text access may be available. Sign in or learn about subscription options.pp. 257-263
An Attempt to Memorize Strong Passwords while Playing GamesFull-text access may be available. Sign in or learn about subscription options.pp. 264-268
Personalized Cryptography in Data Sharing and ManagementFull-text access may be available. Sign in or learn about subscription options.pp. 269-272
Incrementally Mining Usage Correlations among Appliances in Smart HomesFull-text access may be available. Sign in or learn about subscription options.pp. 273-279
SAX-based Group Stock Portfolio Mining ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 280-285
Multivariate and Categorical Analysis of Gaming StatisticsFull-text access may be available. Sign in or learn about subscription options.pp. 286-293
An Algorithm of City-Level Landmark Mining Based on Internet ForumFull-text access may be available. Sign in or learn about subscription options.pp. 294-301
Rail Inspection Meets Big Data: Methods and TrendsFull-text access may be available. Sign in or learn about subscription options.pp. 302-308
Push-Based Traffic-Aware Cache Management in Named Data NetworkingFull-text access may be available. Sign in or learn about subscription options.pp. 309-316
A GPU-based Fast Solution for Riesz Space Fractional Reaction-Diffusion EquationFull-text access may be available. Sign in or learn about subscription options.pp. 317-323
Design of Application Specific Throughput Processor for Matrix OperationsFull-text access may be available. Sign in or learn about subscription options.pp. 324-331
Effectiveness Comparison of Kinect and Kinect 2 for Recognition of Oyama Karate TechniquesFull-text access may be available. Sign in or learn about subscription options.pp. 332-337
Selection of Rendezvous Point in Content Centric Networks Using Fuzzy LogicFull-text access may be available. Sign in or learn about subscription options.pp. 345-350
An Efficient Genetic Algorithm Based Demand Side Management Scheme for Smart GridFull-text access may be available. Sign in or learn about subscription options.pp. 351-356
Energy-Efficient Broadcast Protocols in Wireless NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 357-364
Eco Models of Storage-Based SeversFull-text access may be available. Sign in or learn about subscription options.pp. 407-411
Risk Assessment in Cyber-Physical System in Office EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 412-417
Performance Evaluation of Routing Method Based on Neighboring Node Information in WMNFull-text access may be available. Sign in or learn about subscription options.pp. 424-431
Showing 100 out of 158