Default Cover Image

2014 17th International Conference on Network-Based Information Systems (NBiS)

Sept. 10 2014 to Sept. 12 2014

Salerno, Italy

Table of Contents

Title Page iFreely available from IEEE.pp. i-i
Title Page iiiFreely available from IEEE.pp. iii-iii
Copyright PageFreely available from IEEE.pp. iv-iv
Table of ContentsFreely available from IEEE.pp. v-xiii
Welcome Message from NBiS Steering Committee Co-ChairsFreely available from IEEE.pp. xiv-xiv
Welcome Message from NBiS 2014 General Co-ChairsFreely available from IEEE.pp. xv-xv
Welcome Message from NBiS 2014 Workshops Co-ChairsFreely available from IEEE.pp. xvii-xvii
NBiS 2014 Organizing CommitteeFreely available from IEEE.pp. xviii-xxiv
ReviewersFreely available from IEEE.pp. xxv-xxv
Keynote TalksFreely available from IEEE.pp. xxvi-xxviii
INVITE 2014 Organizing Committee and ReviewersFreely available from IEEE.pp. xxx-xxx
Welcome Message from ADPNA 2014 Workshops ChairFreely available from IEEE.pp. xxxi-xxxi
ADPNA 2014 Organizing Committee and ReviewersFreely available from IEEE.pp. xxxii-xxxii
Welcome Message from ISSE 2014 Workshop Co-ChairsFreely available from IEEE.pp. xxxiii-xxxiii
ISSE 2014 Organizing Committee and ReviewersFreely available from IEEE.pp. xxxiv-xxxv
Welcome Message from TwC 2014 Workshop Co-ChairsFreely available from IEEE.pp. xxxvi-xxxvi
TwC 2014 Organizing Committee and ReviewersFreely available from IEEE.pp. xxxvii-xxxviii
Welcome Message from HETNET 2014 Workshop OrganizersFreely available from IEEE.pp. xxxix-xxxix
HETNET 2014 Organizing Committee and ReviewersFreely available from IEEE.pp. xl-xli
Welcome Message from INWC 2014 Workshop OrganizersFreely available from IEEE.pp. xlii-xlii
INWC 2014 Organizing Committee and ReviewersFreely available from IEEE.pp. xliii-xliii
Welcome Message from WSSM 2014 Workshop ChairFreely available from IEEE.pp. xliv-xliv
WSSM 2014 Organizing Committee and ReviewersFreely available from IEEE.pp. xlv-xlv
Welcome Message from DEMoC 2014 Workshop ChairFreely available from IEEE.pp. xlvi-xlvi
DEMoC 2014 Organizing Committee and ReviewersFreely available from IEEE.pp. xlvii-xlvii
An Exercise in Concurrency: From Non-blocking Objects to Fair ObjectsFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Power Consumption Models for Migrating Processes in a Server ClusterFull-text access may be available. Sign in or learn about subscription options.pp. 15-22
Parallel Algorithms for Edge Detection in an ImageFull-text access may be available. Sign in or learn about subscription options.pp. 23-30
The Improved Delay Time-Based (IDTB) Algorithm to Perform Computation Type Application ProcessesFull-text access may be available. Sign in or learn about subscription options.pp. 31-38
Mesh Net Viewer II: An Extended Visualization System for Wireless Mesh NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 53-60
Implementation and Evaluation of Adaptive Multi-gateway Mesh NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 61-68
A Lifelog System Specialized to Record Timestamp of Daily WorksFull-text access may be available. Sign in or learn about subscription options.pp. 75-82
A Patient-Centric Distributed Architecture for Electronic Health Record SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 83-90
Modelling QoS in IoT ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 99-105
Ranked Matching of OWL-S Process Model for Distributed Discovery of SWs in P2P SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 106-113
Tsunami Simulation Based on Dijkstra AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 114-119
Explicit Routing in Software-Defined Networking (ERSDN): Addressing Controller ScalabilityFull-text access may be available. Sign in or learn about subscription options.pp. 128-134
Controlled Quantum Secure Direct Communication Protocol Based on Five-Particle Cluster State and EPR Pair Entanglement SwappingFull-text access may be available. Sign in or learn about subscription options.pp. 135-140
Optimized Multilevel Threshold Selection Using Evolutionary ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 149-156
Energy Saving by Ambient Intelligence TechniquesFull-text access may be available. Sign in or learn about subscription options.pp. 157-164
A Tabu Search Approach for the Circle Packing ProblemFull-text access may be available. Sign in or learn about subscription options.pp. 165-171
A Comparison Study on Meta-Heuristics for Ground Station Scheduling ProblemFull-text access may be available. Sign in or learn about subscription options.pp. 172-179
Dynamic Sliding Contention Window Adjustment in Saturated Wireless NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 186-193
CCR-MAC: A Communication Channel Recommendation MAC for Multi-channel WLANsFull-text access may be available. Sign in or learn about subscription options.pp. 194-200
A Performance Study of ZigBee Network under Wi-Fi InterferenceFull-text access may be available. Sign in or learn about subscription options.pp. 201-207
Functional Experiment of Virtual Policy Based Network Management Scheme in Cloud EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 208-214
A Novel Cross Layer Approach to Enhance QoS Performance in Multihop Adhoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 229-236
A New Multi-channel Protocol Destined for Effective Broadcast on Ad Hoc WLANsFull-text access may be available. Sign in or learn about subscription options.pp. 237-243
A Fuzzy Approach to Actor Selection in Wireless Sensor and Actor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 244-248
Performance Evaluation of a Synchronization Protocol for Rechargeable Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 249-256
Prediction-Based Localization for Mobile Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 257-262
Hierarchical and Shared Key AssignmentFull-text access may be available. Sign in or learn about subscription options.pp. 263-270
A Possible Pitfall in the Experimental Analysis of Tampering Detection AlgorithmsFull-text access may be available. Sign in or learn about subscription options.pp. 279-286
Provably Secure and Efficient ID-Based Strong Designated Verifier Signature Scheme with Message RecoveryFull-text access may be available. Sign in or learn about subscription options.pp. 287-293
Flexible Querying in Linked Data SourcesFull-text access may be available. Sign in or learn about subscription options.pp. 294-301
Data Replication Strategies in P2P Systems: A SurveyFull-text access may be available. Sign in or learn about subscription options.pp. 302-309
Frequent-Pattern Based Facet Extraction from Graph DataFull-text access may be available. Sign in or learn about subscription options.pp. 318-323
Sentiment Mining through Mixed Graph of TermsFull-text access may be available. Sign in or learn about subscription options.pp. 324-330
Techniques for Collecting data in Social NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 336-341
A Non-Zero-Sum Social Experience Approach: Building Blocks of Social Experience DesignFull-text access may be available. Sign in or learn about subscription options.pp. 342-346
Sampling from Large Graphs with a ReservoirFull-text access may be available. Sign in or learn about subscription options.pp. 347-354
Exploring Trust Propagation Behaviors in Online CommunitiesFull-text access may be available. Sign in or learn about subscription options.pp. 361-367
A Fuzzy-Based CAC Scheme for Cellular Networks Considering SecurityFull-text access may be available. Sign in or learn about subscription options.pp. 368-373
Industrial Control System Cyber Threats Indicators in Smart Grid TechnologyFull-text access may be available. Sign in or learn about subscription options.pp. 374-380
High-Presence Informal Communication on Tiled Display EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 387-392
HyperInfo: Interactive Large Display for Informal Visual CommunicationFull-text access may be available. Sign in or learn about subscription options.pp. 399-404
Proposal of New Disaster Support System for Large-Scale Natural DisasterFull-text access may be available. Sign in or learn about subscription options.pp. 405-410
Push Type Digital Signage System that Displays Personalized InformationFull-text access may be available. Sign in or learn about subscription options.pp. 411-415
Applying Fusion Visualization to Unstructured DataFull-text access may be available. Sign in or learn about subscription options.pp. 416-419
Cooperation P2P Web Proxy to Reduce Resource UsageFull-text access may be available. Sign in or learn about subscription options.pp. 420-425
A Study of Risk Assessment Quantification in Cloud ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 426-431
Data Management Approach for Multiple Clouds Using Secret Sharing SchemeFull-text access may be available. Sign in or learn about subscription options.pp. 432-437
Causal Order of Application Events is P2P Publish/Subscribe SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 444-449
Controlled Quantum Secure Direct Communication Protocol Based on Extended Three-Particle GHZ State DecoyFull-text access may be available. Sign in or learn about subscription options.pp. 450-454
A Sensor Data Processing and Access Platform Based on Hadoop for Smart EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 455-460
Application of Automotive Sensor Information Server Platform to Ubiquitous Sensing SystemFull-text access may be available. Sign in or learn about subscription options.pp. 461-464
Smartphone Indoor Localization with Accelerometer and GyroscopeFull-text access may be available. Sign in or learn about subscription options.pp. 465-469
A QoS-Based Fairness-Aware Downlink Scheduling in LTE-AdvancedFull-text access may be available. Sign in or learn about subscription options.pp. 470-475
A Group File Encryption Method using Dynamic System Environment KeyFull-text access may be available. Sign in or learn about subscription options.pp. 476-483
Trustworthiness-Based Group Communication ProtocolsFull-text access may be available. Sign in or learn about subscription options.pp. 490-494
Showing 100 out of 129