Default Cover Image

Innovative Mobile and Internet Services in Ubiquitous Computing, International Conference on

July 4 2012 to July 6 2012

Palermo, Italy Italy

ISBN: 978-1-4673-1328-5

Table of Contents

Papers
[Title page i]Freely available from IEEE.pp. i
Papers
[Title page iii]Freely available from IEEE.pp. iii
Papers
[Copyright notice]Freely available from IEEE.pp. iv
Papers
Welcome Message from IMIS 2012 General Co-ChairsFreely available from IEEE.pp. xxii-xxiii
Papers
Table of contentsFreely available from IEEE.pp. v-xxi
Papers
Welcome Message from IMIS 2012 Program Committee Co-ChairsFreely available from IEEE.pp. xxiv
Papers
IMIS 2012 Organizing CommitteeFreely available from IEEE.pp. xxvii-xxxiii
Papers
IMIS 2012 reviewersFreely available from IEEE.pp. xxxiv-xxxv
Papers
Welcome Message from FIMIS-2012 International Workshop Co-ChairsFreely available from IEEE.pp. xxxvi
Papers
FIMIS-2012 OrganizersFreely available from IEEE.pp. xxxvii
Papers
FIMIS-2012 reviewersFreely available from IEEE.pp. xxxviii
Papers
FINGNet 2012 Organizing CommitteeFreely available from IEEE.pp. xl
Papers
FINGNet-2012 reviewersFreely available from IEEE.pp. xli
Papers
Welcome Message from IFSN-2012 International Workshop Co-ChairsFreely available from IEEE.pp. xlii
IFSN-2012 Organizing Committee and ReviewersFreely available from IEEE.pp. xliii-xliii
Papers
ITAUC-2012 Organizing CommitteeFreely available from IEEE.pp. xlv
Papers
ITAUC-2012 reviewers listFreely available from IEEE.pp. xlvi
Papers
Welcome Message from MoMoPE 2012 International Workshop OrganizersFreely available from IEEE.pp. xlvii
Papers
MoMoPE 2012 Organizing CommitteeFreely available from IEEE.pp. xlviii
Papers
MoMoPE 2012 reviewers listFreely available from IEEE.pp. xlvix
Papers
MCNCS-2012 Organizing CommitteeFreely available from IEEE.pp. li
Papers
MCNCS-2012 reviewers listFreely available from IEEE.pp. lii
Papers
Welcome Message from WAIS-2012 International Workshop OrganizersFreely available from IEEE.pp. liii
Papers
WAIS 2012 Organizing CommitteeFreely available from IEEE.pp. liv
Papers
WAIS-2012 reviewers listFreely available from IEEE.pp. lv
Papers
Welcome Message from the esIoT-2012 General ChairsFreely available from IEEE.pp. lvi
Papers
esIoT-2012 Organizing CommitteeFreely available from IEEE.pp. lvii-lviii
Papers
esIoT-2012 reviewersFreely available from IEEE.pp. lvix
Papers
SMEUCE-2012 Organizing CommitteeFreely available from IEEE.pp. lxi-lxii
Papers
SMEUCE-2012 reviewersFreely available from IEEE.pp. lxiii
Papers
Location-aware Authentication and Authorization - Concepts and IssuesFull-text access may be available. Sign in or learn about subscription options.pp. lxiv
Papers
The 4W (What-Where-When-Who) Project Goes SocialFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Papers
Exploring Urban Dynamics Based on Pervasive Sensing: Correlation Analysis of Traffic Density and Air QualityFull-text access may be available. Sign in or learn about subscription options.pp. 9-16
Papers
A Privacy Preserving Model for Personal Information in Search EngineFull-text access may be available. Sign in or learn about subscription options.pp. 17-21
Papers
A Novel Search System for Protecting Search WordFull-text access may be available. Sign in or learn about subscription options.pp. 22-28
Papers
A Service Oriented Analysis Environment for Neuroimaging StudiesFull-text access may be available. Sign in or learn about subscription options.pp. 29-36
Papers
Context-Awareness for IPTV Services PersonalizationFull-text access may be available. Sign in or learn about subscription options.pp. 37-44
Papers
Collaborative Decision-Making Framework for Supporting Multi-mobile Decision-Makers Using OntologyFull-text access may be available. Sign in or learn about subscription options.pp. 45-51
Papers
Neural Network Approach for Identification of Selected Brain Perfusion AbnormalitiesFull-text access may be available. Sign in or learn about subscription options.pp. 52-57
Papers
Cognitive Applications for Semantic and Cognitive Data AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 58-63
Papers
Cognitive Analysis Systems for 3D Image Data InterpretationFull-text access may be available. Sign in or learn about subscription options.pp. 64-68
Papers
Data Aggregation Techniques in Heart Vessel Modelling and Recognition of Pathological ChangesFull-text access may be available. Sign in or learn about subscription options.pp. 69-72
Papers
A New Identity-Based Group Signature Scheme Based on Knapsack ECCFull-text access may be available. Sign in or learn about subscription options.pp. 73-80
Papers
An Efficient Identity-Based Strong Designated Verifier Signature without DelegatabilityFull-text access may be available. Sign in or learn about subscription options.pp. 81-88
Papers
A New Iterative Learning Control Scheme Based on Damped Newton Method for Nonlinear SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 89-92
Papers
An Access Control Mechanism for Remote Control of Home Security SystemFull-text access may be available. Sign in or learn about subscription options.pp. 93-98
Papers
Biological Modelling in Semantic Data Analysis SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 99-102
Papers
Similarity Measurement between Objects and Activities for User Intention ModelingFull-text access may be available. Sign in or learn about subscription options.pp. 103-107
Papers
Random Graph Languages for Distorted and Ambiguous Patterns: Single Layer ModelFull-text access may be available. Sign in or learn about subscription options.pp. 108-113
Papers
The Forensic Analysis of a False Digital AlibiFull-text access may be available. Sign in or learn about subscription options.pp. 114-121
Papers
A Secure Secondary Backup Storage with an Isolated AuthenticationFull-text access may be available. Sign in or learn about subscription options.pp. 122-125
Papers
Analysis on Maliciousness for Mobile ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 126-129
Papers
A Slow Intelligent Approach for the Improvement of Intrusion Detection and Prevention SystemFull-text access may be available. Sign in or learn about subscription options.pp. 130-137
Papers
Threshold-Based Energy-Efficient Data Transmission Policy for Mobile DevicesFull-text access may be available. Sign in or learn about subscription options.pp. 138-142
Papers
Delegation-Based Mutual Authentication Scheme for Multi-operator Wireless Mesh NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 143-147
Towards a Context-Aware and Adaptable Room System for Intelligent "Trusted" Office-Spaces in Smart CitiesFull-text access may be available. Sign in or learn about subscription options.pp. 148-154
Papers
Participatory Sensing in Environmental Monitoring -- ExperiencesFull-text access may be available. Sign in or learn about subscription options.pp. 155-162
Papers
Characterization of Vision-Aided Indoor Localization and Landmark RoutingFull-text access may be available. Sign in or learn about subscription options.pp. 163-170
Papers
Document Classification through Building Specified N-GramFull-text access may be available. Sign in or learn about subscription options.pp. 171-176
Papers
A Comparison between Single and Additive Contribution in RFID Reader-to-Reader Interference ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 177-184
Papers
Performance Analysis of Reliable Transmission on Multiple Paths and Single PathFull-text access may be available. Sign in or learn about subscription options.pp. 185-190
Papers
Application-Aware Virtual Machine Placement in Data CentersFull-text access may be available. Sign in or learn about subscription options.pp. 191-196
Papers
Transient Fault Tolerance for ccNUMA ArchitectureFull-text access may be available. Sign in or learn about subscription options.pp. 197-202
Papers
Fuzzy Fault Tree Based Fault DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 203-207
Papers
An Analysis of Strategies for Preventing Selfish Behavior in Mobile Delay Tolerant NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 208-215
Papers
ILSRO: Identifier/Location Split-Based Route Optimization for PMIPv6Full-text access may be available. Sign in or learn about subscription options.pp. 216-223
Papers
Extending Mesh Networks to Opportunistic Resource SharingFull-text access may be available. Sign in or learn about subscription options.pp. 224-230
Papers
Impacts of Internal Network Contexts on Performance of MANET Routing Protocols: A Case StudyFull-text access may be available. Sign in or learn about subscription options.pp. 231-236
Papers
A Terrain-Awareness Based Mobility Model with Markov Random Disturbance for Tactical MANETFull-text access may be available. Sign in or learn about subscription options.pp. 237-243
Papers
Improved AODV Routing Protocol to Cope with High Overhead in High Mobility MANETsFull-text access may be available. Sign in or learn about subscription options.pp. 244-251
Papers
A Resource-Aware Pairing Device Framework for Ubiquitous Cloud ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 252-258
Papers
Lazy Monitoring for Distributed Computing EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 259-265
Papers
Balancing Resource Utilization for Continuous Virtual Machine Requests in CloudsFull-text access may be available. Sign in or learn about subscription options.pp. 266-273
Papers
An Efficient Distributed Mobility Management Scheme Based on PMIPv6Full-text access may be available. Sign in or learn about subscription options.pp. 274-279
Papers
Minimizing Communication Traffic in Data Centers with Power-Aware VM PlacementFull-text access may be available. Sign in or learn about subscription options.pp. 280-285
Papers
A Novel Framework of Self-Adaptive Fault-Tolerant for Pervasive ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 286-291
Papers
Using Dynamic Probe for Deadlock Detection in Component-Based SystemFull-text access may be available. Sign in or learn about subscription options.pp. 292-299
Papers
TCP Throughput of IPv6 and IPv4 on IEEE 802.11n Wireless Client Server LAN in Windows Vista/XP -- Server 2008 EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 300-304
Papers
Implementation and Test of PMIPv6 Dual Stack ProtocolFull-text access may be available. Sign in or learn about subscription options.pp. 305-310
Papers
Text Interface Adaptation in Ubiquitous ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 311-316
Papers
A Cognitive Network for Intelligent EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 317-322
Papers
Geocast Routing Protocols for VANETs: Survey and GuidelinesFull-text access may be available. Sign in or learn about subscription options.pp. 323-328
Papers
Future Internet in Taiwan: Design and Research Activities over TWAREN NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 329-333
Papers
A Multistep Process Model for Selecting and Composing Functional Blocks in a Future Internet ArchitectureFull-text access may be available. Sign in or learn about subscription options.pp. 334-339
Papers
A Requirement-Based Socket API for a Transition to Future Internet ArchitecturesFull-text access may be available. Sign in or learn about subscription options.pp. 340-345
Papers
Service Orientation Paradigm in Future Network ArchitecturesFull-text access may be available. Sign in or learn about subscription options.pp. 346-351
Papers
Group Key Management for Secure Mobile IPTV ServiceFull-text access may be available. Sign in or learn about subscription options.pp. 352-357
Papers
Passive YouTube QoE Monitoring for ISPsFull-text access may be available. Sign in or learn about subscription options.pp. 358-364
Papers
Design and Implementation of Location-Based SNS Smartphone Application for the Disabled PopulationFull-text access may be available. Sign in or learn about subscription options.pp. 365-370
Papers
Content-Based Image Retrieval Using Wavelet Spatial-Color and Gabor Normalized Texture in Multi-resolution DatabaseFull-text access may be available. Sign in or learn about subscription options.pp. 371-377
Papers
A Survey of Virtualization Technologies Focusing on Untrusted Code ExecutionFull-text access may be available. Sign in or learn about subscription options.pp. 378-383
Papers
Edges Immunization Strategy Based on Discrete PSO in Weighted Scale-Free NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 384-389
Papers
Identify Sentiment-Objects from Chinese Sentences Based on Skip Chain Conditional Random Fields ModelFull-text access may be available. Sign in or learn about subscription options.pp. 390-394
Papers
An Optimistic Protocol for Distributed Fair ExchangeFull-text access may be available. Sign in or learn about subscription options.pp. 395-399
Papers
Reversing Engineering Data Structures in Binary Programs: Overview and Case StudyFull-text access may be available. Sign in or learn about subscription options.pp. 400-404
Showing 100 out of 203