Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
IMIS
IMIS 2012
Generate Citations
Innovative Mobile and Internet Services in Ubiquitous Computing, International Conference on
July 4 2012 to July 6 2012
Palermo, Italy Italy
ISBN: 978-1-4673-1328-5
Table of Contents
Papers
[Title page i]
Freely available from IEEE.
pp. i
Papers
[Title page iii]
Freely available from IEEE.
pp. iii
Papers
[Copyright notice]
Freely available from IEEE.
pp. iv
Papers
Welcome Message from IMIS 2012 General Co-Chairs
Freely available from IEEE.
pp. xxii-xxiii
Papers
Table of contents
Freely available from IEEE.
pp. v-xxi
Papers
Welcome Message from IMIS 2012 Program Committee Co-Chairs
Freely available from IEEE.
pp. xxiv
Papers
Welcome Message from Workshops Co-Chairs of IMIS 2012 International Conference
Freely available from IEEE.
pp. xxv-xxvi
Papers
IMIS 2012 Organizing Committee
Freely available from IEEE.
pp. xxvii-xxxiii
Papers
IMIS 2012 reviewers
Freely available from IEEE.
pp. xxxiv-xxxv
Papers
Welcome Message from FIMIS-2012 International Workshop Co-Chairs
Freely available from IEEE.
pp. xxxvi
Papers
FIMIS-2012 Organizers
Freely available from IEEE.
pp. xxxvii
Papers
FIMIS-2012 reviewers
Freely available from IEEE.
pp. xxxviii
Papers
Welcome Message from FINGNet-2012 International Workshop Organizers
Freely available from IEEE.
pp. xxxix
Papers
FINGNet 2012 Organizing Committee
Freely available from IEEE.
pp. xl
Papers
FINGNet-2012 reviewers
Freely available from IEEE.
pp. xli
Papers
Welcome Message from IFSN-2012 International Workshop Co-Chairs
Freely available from IEEE.
pp. xlii
IFSN-2012 Organizing Committee and Reviewers
Freely available from IEEE.
pp. xliii-xliii
Papers
Welcome Message from ITAUC-2012 International Workshop Organizers
Freely available from IEEE.
pp. xliv
Papers
ITAUC-2012 Organizing Committee
Freely available from IEEE.
pp. xlv
Papers
ITAUC-2012 reviewers list
Freely available from IEEE.
pp. xlvi
Papers
Welcome Message from MoMoPE 2012 International Workshop Organizers
Freely available from IEEE.
pp. xlvii
Papers
MoMoPE 2012 Organizing Committee
Freely available from IEEE.
pp. xlviii
Papers
MoMoPE 2012 reviewers list
Freely available from IEEE.
pp. xlvix
Papers
Welcome Message from MCNCS-2012 International Workshop Organizers
Freely available from IEEE.
pp. l
Papers
MCNCS-2012 Organizing Committee
Freely available from IEEE.
pp. li
Papers
MCNCS-2012 reviewers list
Freely available from IEEE.
pp. lii
Papers
Welcome Message from WAIS-2012 International Workshop Organizers
Freely available from IEEE.
pp. liii
Papers
WAIS 2012 Organizing Committee
Freely available from IEEE.
pp. liv
Papers
WAIS-2012 reviewers list
Freely available from IEEE.
pp. lv
Papers
Welcome Message from the esIoT-2012 General Chairs
Freely available from IEEE.
pp. lvi
Papers
esIoT-2012 Organizing Committee
Freely available from IEEE.
pp. lvii-lviii
Papers
esIoT-2012 reviewers
Freely available from IEEE.
pp. lvix
Papers
Welcome Message from SMEUCE-2012 International Workshop Co-Chairs
Freely available from IEEE.
pp. lx
Papers
SMEUCE-2012 Organizing Committee
Freely available from IEEE.
pp. lxi-lxii
Papers
SMEUCE-2012 reviewers
Freely available from IEEE.
pp. lxiii
Papers
Location-aware Authentication and Authorization - Concepts and Issues
Full-text access may be available. Sign in or learn about subscription options.
pp. lxiv
by
Elisa Bertino
Papers
The 4W (What-Where-When-Who) Project Goes Social
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
Papers
Exploring Urban Dynamics Based on Pervasive Sensing: Correlation Analysis of Traffic Density and Air Quality
Full-text access may be available. Sign in or learn about subscription options.
pp. 9-16
Papers
A Privacy Preserving Model for Personal Information in Search Engine
Full-text access may be available. Sign in or learn about subscription options.
pp. 17-21
Papers
A Novel Search System for Protecting Search Word
Full-text access may be available. Sign in or learn about subscription options.
pp. 22-28
Papers
A Service Oriented Analysis Environment for Neuroimaging Studies
Full-text access may be available. Sign in or learn about subscription options.
pp. 29-36
Papers
Context-Awareness for IPTV Services Personalization
Full-text access may be available. Sign in or learn about subscription options.
pp. 37-44
Papers
Collaborative Decision-Making Framework for Supporting Multi-mobile Decision-Makers Using Ontology
Full-text access may be available. Sign in or learn about subscription options.
pp. 45-51
Papers
Neural Network Approach for Identification of Selected Brain Perfusion Abnormalities
Full-text access may be available. Sign in or learn about subscription options.
pp. 52-57
Papers
Cognitive Applications for Semantic and Cognitive Data Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 58-63
Papers
Cognitive Analysis Systems for 3D Image Data Interpretation
Full-text access may be available. Sign in or learn about subscription options.
pp. 64-68
Papers
Data Aggregation Techniques in Heart Vessel Modelling and Recognition of Pathological Changes
Full-text access may be available. Sign in or learn about subscription options.
pp. 69-72
Papers
A New Identity-Based Group Signature Scheme Based on Knapsack ECC
Full-text access may be available. Sign in or learn about subscription options.
pp. 73-80
Papers
An Efficient Identity-Based Strong Designated Verifier Signature without Delegatability
Full-text access may be available. Sign in or learn about subscription options.
pp. 81-88
Papers
A New Iterative Learning Control Scheme Based on Damped Newton Method for Nonlinear Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 89-92
Papers
An Access Control Mechanism for Remote Control of Home Security System
Full-text access may be available. Sign in or learn about subscription options.
pp. 93-98
Papers
Biological Modelling in Semantic Data Analysis Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 99-102
Papers
Similarity Measurement between Objects and Activities for User Intention Modeling
Full-text access may be available. Sign in or learn about subscription options.
pp. 103-107
Papers
Random Graph Languages for Distorted and Ambiguous Patterns: Single Layer Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 108-113
Papers
The Forensic Analysis of a False Digital Alibi
Full-text access may be available. Sign in or learn about subscription options.
pp. 114-121
Papers
A Secure Secondary Backup Storage with an Isolated Authentication
Full-text access may be available. Sign in or learn about subscription options.
pp. 122-125
Papers
Analysis on Maliciousness for Mobile Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 126-129
Papers
A Slow Intelligent Approach for the Improvement of Intrusion Detection and Prevention System
Full-text access may be available. Sign in or learn about subscription options.
pp. 130-137
Papers
Threshold-Based Energy-Efficient Data Transmission Policy for Mobile Devices
Full-text access may be available. Sign in or learn about subscription options.
pp. 138-142
Papers
Delegation-Based Mutual Authentication Scheme for Multi-operator Wireless Mesh Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 143-147
Towards a Context-Aware and Adaptable Room System for Intelligent "Trusted" Office-Spaces in Smart Cities
Full-text access may be available. Sign in or learn about subscription options.
pp. 148-154
by
Tim French
,
Nik Bessis
Papers
Participatory Sensing in Environmental Monitoring -- Experiences
Full-text access may be available. Sign in or learn about subscription options.
pp. 155-162
Papers
Characterization of Vision-Aided Indoor Localization and Landmark Routing
Full-text access may be available. Sign in or learn about subscription options.
pp. 163-170
Papers
Document Classification through Building Specified N-Gram
Full-text access may be available. Sign in or learn about subscription options.
pp. 171-176
Papers
A Comparison between Single and Additive Contribution in RFID Reader-to-Reader Interference Models
Full-text access may be available. Sign in or learn about subscription options.
pp. 177-184
Papers
Performance Analysis of Reliable Transmission on Multiple Paths and Single Path
Full-text access may be available. Sign in or learn about subscription options.
pp. 185-190
Papers
Application-Aware Virtual Machine Placement in Data Centers
Full-text access may be available. Sign in or learn about subscription options.
pp. 191-196
Papers
Transient Fault Tolerance for ccNUMA Architecture
Full-text access may be available. Sign in or learn about subscription options.
pp. 197-202
Papers
Fuzzy Fault Tree Based Fault Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 203-207
Papers
An Analysis of Strategies for Preventing Selfish Behavior in Mobile Delay Tolerant Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 208-215
Papers
ILSRO: Identifier/Location Split-Based Route Optimization for PMIPv6
Full-text access may be available. Sign in or learn about subscription options.
pp. 216-223
Papers
Extending Mesh Networks to Opportunistic Resource Sharing
Full-text access may be available. Sign in or learn about subscription options.
pp. 224-230
Papers
Impacts of Internal Network Contexts on Performance of MANET Routing Protocols: A Case Study
Full-text access may be available. Sign in or learn about subscription options.
pp. 231-236
Papers
A Terrain-Awareness Based Mobility Model with Markov Random Disturbance for Tactical MANET
Full-text access may be available. Sign in or learn about subscription options.
pp. 237-243
Papers
Improved AODV Routing Protocol to Cope with High Overhead in High Mobility MANETs
Full-text access may be available. Sign in or learn about subscription options.
pp. 244-251
Papers
A Resource-Aware Pairing Device Framework for Ubiquitous Cloud Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 252-258
Papers
Lazy Monitoring for Distributed Computing Environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 259-265
Papers
Balancing Resource Utilization for Continuous Virtual Machine Requests in Clouds
Full-text access may be available. Sign in or learn about subscription options.
pp. 266-273
Papers
An Efficient Distributed Mobility Management Scheme Based on PMIPv6
Full-text access may be available. Sign in or learn about subscription options.
pp. 274-279
Papers
Minimizing Communication Traffic in Data Centers with Power-Aware VM Placement
Full-text access may be available. Sign in or learn about subscription options.
pp. 280-285
Papers
A Novel Framework of Self-Adaptive Fault-Tolerant for Pervasive Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 286-291
Papers
Using Dynamic Probe for Deadlock Detection in Component-Based System
Full-text access may be available. Sign in or learn about subscription options.
pp. 292-299
Papers
TCP Throughput of IPv6 and IPv4 on IEEE 802.11n Wireless Client Server LAN in Windows Vista/XP -- Server 2008 Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 300-304
Papers
Implementation and Test of PMIPv6 Dual Stack Protocol
Full-text access may be available. Sign in or learn about subscription options.
pp. 305-310
Papers
Text Interface Adaptation in Ubiquitous Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 311-316
Papers
A Cognitive Network for Intelligent Environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 317-322
Papers
Geocast Routing Protocols for VANETs: Survey and Guidelines
Full-text access may be available. Sign in or learn about subscription options.
pp. 323-328
Papers
Future Internet in Taiwan: Design and Research Activities over TWAREN Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 329-333
Papers
A Multistep Process Model for Selecting and Composing Functional Blocks in a Future Internet Architecture
Full-text access may be available. Sign in or learn about subscription options.
pp. 334-339
Papers
A Requirement-Based Socket API for a Transition to Future Internet Architectures
Full-text access may be available. Sign in or learn about subscription options.
pp. 340-345
Papers
Service Orientation Paradigm in Future Network Architectures
Full-text access may be available. Sign in or learn about subscription options.
pp. 346-351
Papers
Group Key Management for Secure Mobile IPTV Service
Full-text access may be available. Sign in or learn about subscription options.
pp. 352-357
Papers
Passive YouTube QoE Monitoring for ISPs
Full-text access may be available. Sign in or learn about subscription options.
pp. 358-364
Papers
Design and Implementation of Location-Based SNS Smartphone Application for the Disabled Population
Full-text access may be available. Sign in or learn about subscription options.
pp. 365-370
Papers
Content-Based Image Retrieval Using Wavelet Spatial-Color and Gabor Normalized Texture in Multi-resolution Database
Full-text access may be available. Sign in or learn about subscription options.
pp. 371-377
Papers
A Survey of Virtualization Technologies Focusing on Untrusted Code Execution
Full-text access may be available. Sign in or learn about subscription options.
pp. 378-383
Papers
Edges Immunization Strategy Based on Discrete PSO in Weighted Scale-Free Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 384-389
Papers
Identify Sentiment-Objects from Chinese Sentences Based on Skip Chain Conditional Random Fields Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 390-394
Papers
An Optimistic Protocol for Distributed Fair Exchange
Full-text access may be available. Sign in or learn about subscription options.
pp. 395-399
Papers
Reversing Engineering Data Structures in Binary Programs: Overview and Case Study
Full-text access may be available. Sign in or learn about subscription options.
pp. 400-404
Showing 100 out of 203
Load More
Load All