Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
NBIS
NBIS 2014
Generate Citations
2014 17th International Conference on Network-Based Information Systems (NBiS)
Sept. 10 2014 to Sept. 12 2014
Salerno, Italy
Table of Contents
Title Page i
Freely available from IEEE.
pp. i-i
Title Page iii
Freely available from IEEE.
pp. iii-iii
Copyright Page
Freely available from IEEE.
pp. iv-iv
Table of Contents
Freely available from IEEE.
pp. v-xiii
Welcome Message from NBiS Steering Committee Co-Chairs
Freely available from IEEE.
pp. xiv-xiv
Welcome Message from NBiS 2014 General Co-Chairs
Freely available from IEEE.
pp. xv-xv
Welcome Message from NBiS 2014 Program Committee Co-Chairs
Freely available from IEEE.
pp. xvi-xvi
Welcome Message from NBiS 2014 Workshops Co-Chairs
Freely available from IEEE.
pp. xvii-xvii
NBiS 2014 Organizing Committee
Freely available from IEEE.
pp. xviii-xxiv
Reviewers
Freely available from IEEE.
pp. xxv-xxv
Keynote Talks
Freely available from IEEE.
pp. xxvi-xxviii
Welcome Message from INVITE 2014 International Workshop Organizers
Freely available from IEEE.
pp. xxix-xxix
INVITE 2014 Organizing Committee and Reviewers
Freely available from IEEE.
pp. xxx-xxx
Welcome Message from ADPNA 2014 Workshops Chair
Freely available from IEEE.
pp. xxxi-xxxi
ADPNA 2014 Organizing Committee and Reviewers
Freely available from IEEE.
pp. xxxii-xxxii
Welcome Message from ISSE 2014 Workshop Co-Chairs
Freely available from IEEE.
pp. xxxiii-xxxiii
ISSE 2014 Organizing Committee and Reviewers
Freely available from IEEE.
pp. xxxiv-xxxv
Welcome Message from TwC 2014 Workshop Co-Chairs
Freely available from IEEE.
pp. xxxvi-xxxvi
TwC 2014 Organizing Committee and Reviewers
Freely available from IEEE.
pp. xxxvii-xxxviii
Welcome Message from HETNET 2014 Workshop Organizers
Freely available from IEEE.
pp. xxxix-xxxix
HETNET 2014 Organizing Committee and Reviewers
Freely available from IEEE.
pp. xl-xli
Welcome Message from INWC 2014 Workshop Organizers
Freely available from IEEE.
pp. xlii-xlii
INWC 2014 Organizing Committee and Reviewers
Freely available from IEEE.
pp. xliii-xliii
Welcome Message from WSSM 2014 Workshop Chair
Freely available from IEEE.
pp. xliv-xliv
WSSM 2014 Organizing Committee and Reviewers
Freely available from IEEE.
pp. xlv-xlv
Welcome Message from DEMoC 2014 Workshop Chair
Freely available from IEEE.
pp. xlvi-xlvi
DEMoC 2014 Organizing Committee and Reviewers
Freely available from IEEE.
pp. xlvii-xlvii
An Exercise in Concurrency: From Non-blocking Objects to Fair Objects
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Carole Delporte
,
Hugues Fauconnier
,
Michel Raynal
A Comparison of Graphics Processor Architectures for RFID Simulation
Full-text access may be available. Sign in or learn about subscription options.
pp. 8-14
by
Renato Ferrero
,
Bartolomeo Montrucchio
,
Lorenzo David
,
Kargar Ebrahim
,
Luca Graglia
,
Giovanni di Dio Iovino
,
Marco Ribero
Power Consumption Models for Migrating Processes in a Server Cluster
Full-text access may be available. Sign in or learn about subscription options.
pp. 15-22
by
Dilawaer Duolikun
,
Ailixier Aikebaier
,
Tomoya Enokido
,
Makoto Takizawa
Parallel Algorithms for Edge Detection in an Image
Full-text access may be available. Sign in or learn about subscription options.
pp. 23-30
by
C. Mala
,
M. Sridevi
The Improved Delay Time-Based (IDTB) Algorithm to Perform Computation Type Application Processes
Full-text access may be available. Sign in or learn about subscription options.
pp. 31-38
by
Tomoya Enokido
,
Makoto Takizawa
Analysis of Mesh Router Node Placement Using WMN-GA System Considering Different Architectures of WMNs
Full-text access may be available. Sign in or learn about subscription options.
pp. 39-44
by
Tetsuya Oda
,
Shinji Sakamoto
,
Admir Barolli
,
Makoto Ikeda
,
Fatos Xhafa
,
Leonard Barolli
Analysis of WMN-SA andWMN-GA Simulation Results: A Comparison Performance for Wireless Mesh Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 45-52
by
Makoto Ikeda
,
Tetsuya Oda
,
Shinji Sakamoto
,
Taiki Honda
,
Leonard Barolli
Mesh Net Viewer II: An Extended Visualization System for Wireless Mesh Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 53-60
by
Yuki Kumata
,
Akio Koyama
Implementation and Evaluation of Adaptive Multi-gateway Mesh Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 61-68
by
Takaaki Kawai
,
Naoki Yusa
,
Hiroshi Mineno
Performance Analysis of WMN-SA: Node Placement Problem Using Simulated Annealing Algorithm for Different Replacement Methods
Full-text access may be available. Sign in or learn about subscription options.
pp. 69-74
by
Shinji Sakamoto
,
Tetsuya Oda
,
Makoto Ikeda
,
Fatos Xhafa
,
Leonard Barolli
,
Kazunori Uchida
A Lifelog System Specialized to Record Timestamp of Daily Works
Full-text access may be available. Sign in or learn about subscription options.
pp. 75-82
by
Nobuyoshi Sato
A Patient-Centric Distributed Architecture for Electronic Health Record Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 83-90
by
Giorgio Mario Grasso
,
Alfredo Cuzzocrea
,
Andrea Nucita
Parallel Low-Complexity Lossless Coding of Three-Dimensional Medical Images
Full-text access may be available. Sign in or learn about subscription options.
pp. 91-98
by
Raffaele Pizzolante
,
Arcangelo Castiglione
,
Bruno Carpentieri
,
Alfredo De Santis
Modelling QoS in IoT Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 99-105
by
Irfan Awan
,
Muhammad Younas
,
Wajia Naveed
Ranked Matching of OWL-S Process Model for Distributed Discovery of SWs in P2P Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 106-113
by
Adel Boukhadra
,
Karima Benatchba
,
Amar Balla
Tsunami Simulation Based on Dijkstra Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 114-119
by
Kazunori Uchida
,
Shinsuke Nogami
,
Masafumi Takematsu
,
Junichi Honda
Read-Write Abortion (RWA) Based Synchronization Protocols to Prevent Illegal Information Flow
Full-text access may be available. Sign in or learn about subscription options.
pp. 120-127
by
Shigenari Nakamura
,
Dilewaer Duolikun
,
Ailixier Aikebaier
,
Tomoya Enokido
,
Makoto Takizaw
Explicit Routing in Software-Defined Networking (ERSDN): Addressing Controller Scalability
Full-text access may be available. Sign in or learn about subscription options.
pp. 128-134
by
Harold Owens
,
Arjan Durresi
Controlled Quantum Secure Direct Communication Protocol Based on Five-Particle Cluster State and EPR Pair Entanglement Swapping
Full-text access may be available. Sign in or learn about subscription options.
pp. 135-140
by
Tao Fang
New Kick Operators in Iterated Local Search Based Metaheuristic for Solving the Node Placement Problem in Multihop Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 141-148
by
Kengo Katayama
,
Yuto Akagi
,
Elis Kulla
,
Hideo Minamihara
,
Noritaka Nishihara
Optimized Multilevel Threshold Selection Using Evolutionary Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 149-156
by
M. Sridevi
,
C. Mala
,
E. Sivasankar
,
Ilsun You
Energy Saving by Ambient Intelligence Techniques
Full-text access may be available. Sign in or learn about subscription options.
pp. 157-164
by
Matteo Cristani
,
Erisa Karafili
,
Claudio Tomazzoli
A Tabu Search Approach for the Circle Packing Problem
Full-text access may be available. Sign in or learn about subscription options.
pp. 165-171
by
Francesco Carrabs
,
Carmine Cerrone
,
Raffaele Cerulli
A Comparison Study on Meta-Heuristics for Ground Station Scheduling Problem
Full-text access may be available. Sign in or learn about subscription options.
pp. 172-179
by
Fatos Xhafa
,
Xavier Herrero
,
Admir Barolli
,
Makoto Takizawa
Evaluation of Wireless Network Communication by Autonomous Flight Wireless Nodes for Resilient Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 180-185
by
Noriki Uchida
,
Mizue Kimura
,
Tomoyuki Ishida
,
Yoshitaka Shibata
,
Norio Shiratori
Dynamic Sliding Contention Window Adjustment in Saturated Wireless Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 186-193
by
C. Mala
,
B. Nithya
CCR-MAC: A Communication Channel Recommendation MAC for Multi-channel WLANs
Full-text access may be available. Sign in or learn about subscription options.
pp. 194-200
by
Tetsuya Shigeyasu
,
Junko Nagamine
A Performance Study of ZigBee Network under Wi-Fi Interference
Full-text access may be available. Sign in or learn about subscription options.
pp. 201-207
by
Keigo Nomura
,
Fumiaki Sato
Functional Experiment of Virtual Policy Based Network Management Scheme in Cloud Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 208-214
by
Kazuya Odagiri
,
Shogo Shimizu
,
Naohiro Ishii
,
Makoto Takizawa
Resource Allocation Method for Cloud Computing Environments with Different Service Quality to Users at Multiple Access Points
Full-text access may be available. Sign in or learn about subscription options.
pp. 215-220
by
Yutaro Magome
,
Shin-Ichi Kuribayashi
Hybrid Algorithm for Workflow Scheduling in Cloud-Based Cyberinfrastructures
Full-text access may be available. Sign in or learn about subscription options.
pp. 221-228
by
Andrei Alexandru Nicolae
,
Catalin Negru
,
Florin Pop
,
Mariana Mocanu
,
Valentin Cristea
A Novel Cross Layer Approach to Enhance QoS Performance in Multihop Adhoc Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 229-236
by
B. Nithya
,
C. Mala
,
E. Sivasankar
A New Multi-channel Protocol Destined for Effective Broadcast on Ad Hoc WLANs
Full-text access may be available. Sign in or learn about subscription options.
pp. 237-243
by
Tetsuya Shigeyasu
,
Rina Matsuda
A Fuzzy Approach to Actor Selection in Wireless Sensor and Actor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 244-248
by
Elis Kulla
,
Makoto Ikeda
,
Leonard Barolli
Performance Evaluation of a Synchronization Protocol for Rechargeable Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 249-256
by
Fumiaki Sato
Prediction-Based Localization for Mobile Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 257-262
by
Imane Benkhelifa
,
Chakib Lamini
,
Hichem Azouz
,
Samira Moussaoui
,
Ashfaq Khokhar
Hierarchical and Shared Key Assignment
Full-text access may be available. Sign in or learn about subscription options.
pp. 263-270
by
Arcangelo Castiglione
,
Alfredo De Santis
,
Barbara Masucci
Evaluating a Dynamic Internet Threat Monitoring Method for Preventing PN Code-Based Localization Attack
Full-text access may be available. Sign in or learn about subscription options.
pp. 271-278
by
Masaki Narita
,
Kanayo Ogura
,
Bhed Bahadur Bista
,
Toyoo Takata
A Possible Pitfall in the Experimental Analysis of Tampering Detection Algorithms
Full-text access may be available. Sign in or learn about subscription options.
pp. 279-286
by
Giuseppe Cattaneo
,
Gianluca Roscigno
Provably Secure and Efficient ID-Based Strong Designated Verifier Signature Scheme with Message Recovery
Full-text access may be available. Sign in or learn about subscription options.
pp. 287-293
by
Min Li
,
Tao Fang
Flexible Querying in Linked Data Sources
Full-text access may be available. Sign in or learn about subscription options.
pp. 294-301
by
Gilles Nachouki
Data Replication Strategies in P2P Systems: A Survey
Full-text access may be available. Sign in or learn about subscription options.
pp. 302-309
by
Evjola Spaho
,
Leonard Barolli
,
Fatos Xhafa
StreamOp: An Innovative Middleware for Supporting Data Management and Query Functionalities over Sensor Network Streams Efficiently
Full-text access may be available. Sign in or learn about subscription options.
pp. 310-317
by
Alfredo Cuzzocrea
,
Jose Cecilio
,
Pedro Furtado
Frequent-Pattern Based Facet Extraction from Graph Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 318-323
by
Takahiro Komamizu
,
Toshiyuki Amagasa
,
Hiroyuki Kitagawa
Sentiment Mining through Mixed Graph of Terms
Full-text access may be available. Sign in or learn about subscription options.
pp. 324-330
by
Francesco Colace
,
Massimo De Santo
,
Luca Greco
NeighborNote: An Evernote Application with Capability of Suggesting Related Notes Based on User Operation History
Full-text access may be available. Sign in or learn about subscription options.
pp. 331-335
by
Yuki Takahashi
,
Michitoshi Niibori
,
Masaru Kamada
Techniques for Collecting data in Social Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 336-341
by
Lina Alfantoukh
,
Arjan Durresi
A Non-Zero-Sum Social Experience Approach: Building Blocks of Social Experience Design
Full-text access may be available. Sign in or learn about subscription options.
pp. 342-346
by
Toshihiko Yamakami
Sampling from Large Graphs with a Reservoir
Full-text access may be available. Sign in or learn about subscription options.
pp. 347-354
by
Kai Cheng
Countering Browser Fingerprinting Techniques: Constructing a Fake Profile with Google Chrome
Full-text access may be available. Sign in or learn about subscription options.
pp. 355-360
by
Ugo Fiore
,
Aniello Castiglione
,
Alfredo De Santis
,
Francesco Palmieri
Exploring Trust Propagation Behaviors in Online Communities
Full-text access may be available. Sign in or learn about subscription options.
pp. 361-367
by
Yefeng Ruan
,
Lina Alfantoukh
,
Anna Fang
,
Arjan Durresi
A Fuzzy-Based CAC Scheme for Cellular Networks Considering Security
Full-text access may be available. Sign in or learn about subscription options.
pp. 368-373
by
Vladi Kolici
,
Takaaki Inaba
,
Algenti Lala
,
Gjergji Mino
,
Shinji Sakamoto
,
Leonard Barolli
Industrial Control System Cyber Threats Indicators in Smart Grid Technology
Full-text access may be available. Sign in or learn about subscription options.
pp. 374-380
by
Antonio Colella
,
Aniello Castiglione
,
Clara Maria Colombini
A GIS Based Disaster Status Sharing and Representation System Using Ultra Definition Display Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 381-386
by
Akira Sakuraba
,
Goshi Sato
,
Tomoyuki Ishida
,
Yasuo Ebara
,
Noriki Uchida
,
Yoshitaka Shibata
High-Presence Informal Communication on Tiled Display Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 387-392
by
Yoshitaka Shibata
,
Toshio Noda
,
Yu Ebisawa
,
Koji Hashimoto
Experimental Evaluation on Transmission and Display of Ultra-Resolution Video on Tiled Display Wall in JGN-X Testbed
Full-text access may be available. Sign in or learn about subscription options.
pp. 393-398
by
Yasuo Ebara
,
Satoshi Noda
,
Akira Sakuraba
,
Yoshitaka Shibata
HyperInfo: Interactive Large Display for Informal Visual Communication
Full-text access may be available. Sign in or learn about subscription options.
pp. 399-404
by
Nobuyuki Kukimoto
,
Yosuke Onoue
,
Kazuo Aoki
,
Kinya Fujita
,
Koji Koyamada
Proposal of New Disaster Support System for Large-Scale Natural Disaster
Full-text access may be available. Sign in or learn about subscription options.
pp. 405-410
by
Tomoyuki Ishida
,
Kazuhiro Takahagi
,
Akira Sakuraba
,
Noriki Uchida
,
Yoshitaka Shibata
Push Type Digital Signage System that Displays Personalized Information
Full-text access may be available. Sign in or learn about subscription options.
pp. 411-415
by
Tetsuro Ogi
,
Yoshisuke Tateyama
,
Yuuki Matsuda
Applying Fusion Visualization to Unstructured Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 416-419
by
Hideo Miyachi
,
Naohisa Sakamoto
,
Koji Koyamada
Cooperation P2P Web Proxy to Reduce Resource Usage
Full-text access may be available. Sign in or learn about subscription options.
pp. 420-425
by
Kazuki Matsushita
,
Masashi Nishimine
,
Kazunori Ueda
A Study of Risk Assessment Quantification in Cloud Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 426-431
by
Shigeaki Tanimoto
,
Ryota Sato
,
Kazuhiko Kato
,
Motoi Iwashita
,
Yoshiaki Seki
,
Hiroyuki Sato
,
Atsushi Kanai
Data Management Approach for Multiple Clouds Using Secret Sharing Scheme
Full-text access may be available. Sign in or learn about subscription options.
pp. 432-437
by
Atsushi Kanai
,
Naoya Kikuchi
,
Shigeaki S. Tanimoto
,
Hiroyuki Sato
An Effectiveness Evaluation of PLC/WLAN Cooperative Transmission Scheme under Practical Network Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 438-443
by
Adriano Muniz
,
Kazuya Tsukamoto
,
Kenji Kawahara
,
Yuji Oie
Causal Order of Application Events is P2P Publish/Subscribe Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 444-449
by
Hiroki Nakayama
,
Dilawaer Duolikun
,
Ailixier Aikebaiery
,
Tomoya Enokidoz
,
Makoto Takizaw
Controlled Quantum Secure Direct Communication Protocol Based on Extended Three-Particle GHZ State Decoy
Full-text access may be available. Sign in or learn about subscription options.
pp. 450-454
by
Tao Fang
,
Min Li
A Sensor Data Processing and Access Platform Based on Hadoop for Smart Environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 455-460
by
Chi-Yi Lin
,
Chia-Chen Li
,
Wei-Hsun Huang
,
Wei-Che Liao
,
Wei-Ming Chen
Application of Automotive Sensor Information Server Platform to Ubiquitous Sensing System
Full-text access may be available. Sign in or learn about subscription options.
pp. 461-464
by
Go Hirakawa
,
Phyu Phyu Kywe
,
Kenta Ito
,
Yoshitaka Shibata
Smartphone Indoor Localization with Accelerometer and Gyroscope
Full-text access may be available. Sign in or learn about subscription options.
pp. 465-469
by
Hui-Huang Hsu
,
Wei-Jan Peng
,
Timothy K. Shih
,
Tun-Wen Pai
,
Ka Lok Man
A QoS-Based Fairness-Aware Downlink Scheduling in LTE-Advanced
Full-text access may be available. Sign in or learn about subscription options.
pp. 470-475
by
Ying-Hong Wang
,
Hao-Yi Huang
A Group File Encryption Method using Dynamic System Environment Key
Full-text access may be available. Sign in or learn about subscription options.
pp. 476-483
by
Kun-Lin Tsai
,
Jiu-Soon Tan
,
Fang-Yie Leu
,
Yi-Li Huang
A Fuzzy-Based Reliability System for P2P Communication Considering Number of Interactions, Local Score and Security Parameters
Full-text access may be available. Sign in or learn about subscription options.
pp. 484-489
by
Yi Liu
,
Leonard Barolli
,
Evjola Spaho
,
Makoto Ikeda
,
Santi Caballe
,
Fatos Xhafa
Trustworthiness-Based Group Communication Protocols
Full-text access may be available. Sign in or learn about subscription options.
pp. 490-494
by
Kazuaki Kouno
,
Ailixier Aikebaier
,
Tomoya Enokido
,
Makoto Takizawa
Showing 100 out of 129
Load More
Load All