Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
CIT
CIT 2017
Generate Citations
2017 IEEE International Conference on Computer and Information Technology (CIT)
Aug. 21 2017 to Aug. 23 2017
Helsinki, Finland
Table of Contents
[Title page i]
Freely available from IEEE.
pp. i-i
[Title page iii]
Freely available from IEEE.
pp. iii-iii
[Copyright notice]
Freely available from IEEE.
pp. iv-iv
Table of contents
Freely available from IEEE.
pp. v-ix
Message from the CIT 2017 General Chairs
Freely available from IEEE.
pp. x-xi
Message from the CIT 2017 Program Chairs
Freely available from IEEE.
pp. xii-xii
Organizing Committee
Freely available from IEEE.
pp. xiii-xiv
Technical Program Committee
Freely available from IEEE.
pp. xv-xix
Keynotes
Full-text access may be available. Sign in or learn about subscription options.
pp. xx-xxx
Learning From Big Data: A Survey and Evaluation of Approximation Technologies for Large-Scale Reinforcement Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Cheng Wu
,
Yiming Wang
Predicting the Popularity of Online News Based on Multivariate Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 9-15
by
Caiyun Liu
,
Wenjie Wang
,
Yuqing Zhang
,
Ying Dong
,
Fannv He
,
Chensi Wu
Efficient Strip-Mode Microwave Correlated Imaging Method with Data Fusion
Full-text access may be available. Sign in or learn about subscription options.
pp. 16-22
by
Yuanyue Guo
,
Jie Deng
,
Falin Liu
,
Dongjin Wang
Sentiment Classification: Feature Selection Based Approaches Versus Deep Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 23-30
by
Alper Kursat Uysal
,
Yi Lu Murphey
A Core Theory Based Algorithm for Influence Maximization in Social Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 31-36
by
Kan Zhang
,
Zichao Zhang
,
Yanlei Wu
,
Jin Xu
,
Yunyun Niu
A Design Towards Personally Identifiable Information Control and Awareness in OpenID Connect Identity Providers
Full-text access may be available. Sign in or learn about subscription options.
pp. 37-46
by
Rafael Weingärtner
,
Carla Merkle Westphall
ROBOMO: Effects of a Motivational Intervention to Adress the Barriers During Science Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 47-54
by
Khaoula Youssef
,
Walid Boukadida
,
Michio Okada
A Multi-objective Metaheuristic Approach to Search-Based Stress Testing
Full-text access may be available. Sign in or learn about subscription options.
pp. 55-62
by
Nauber Gois
,
Pedro Porfírio
,
André Coelho
Robust Optimal Spectrum Patrolling for Passive Monitoring in Cognitive Radio Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 63-68
by
Jiachen Li
,
Jing Xu
,
Wei Liu
,
Shimin Gong
,
Kai Zeng
Cooperative Multi-relay Assisted Multicast Beamforming in Wirelessly Powered Communications
Full-text access may be available. Sign in or learn about subscription options.
pp. 69-74
by
Jiachen Li
,
Yue Mi
,
Shimin Gong
,
Jing Xu
,
Xiaoxia Huang
,
Yanyan Shen
Improved Presence Detection for Occupancy Control in Multisensory Environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 75-80
by
Charikleia Papatsimpa
,
Jean-Paul M.G. Linnartz
Subspace Decomposition Channel Estimation for Multiple Virtual MIMO SC-FDMA Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 81-86
by
Ashraf Tahat
,
Claude D’Amours
,
Benoit Champagne
Dynamic MAC Protocol for Tactical Data Links
Full-text access may be available. Sign in or learn about subscription options.
pp. 87-92
by
Zhe Guo
,
Zheng Yan
Fast Coding-Unit Mode Decision for HEVC Transrating
Full-text access may be available. Sign in or learn about subscription options.
pp. 93-100
by
Shih-Hsuan Yang
,
Chong-Cheng Zhong
Multidimensional QoE Assessment of a Simultaneous Transmission Method in Multi-view Video and Audio Transmission with MPEG-DASH
Full-text access may be available. Sign in or learn about subscription options.
pp. 101-106
by
Yuki Maehara
,
Toshiro Nunome
Energy Efficient Event Driven Video Streaming Surveillance Using SleepyCAM
Full-text access may be available. Sign in or learn about subscription options.
pp. 107-113
by
Tenager Mekonnen
,
Erkki Harjula
,
Arto Heikkinen
,
Timo Koskela
,
Mika Ylianttila
Fuzzy Analogy Based Effort Estimation: An Empirical Comparative Study
Full-text access may be available. Sign in or learn about subscription options.
pp. 114-121
by
Ali Idri
,
Ibtissam Abnane
A Simplified Massive MIMO Approach Using Precoding
Full-text access may be available. Sign in or learn about subscription options.
pp. 122-127
by
Mário Marques da Silva
,
Rui Dinis
Indoor Localization Using Ambient FM Radio RSS Fingerprinting: A 9-Month Study
Full-text access may be available. Sign in or learn about subscription options.
pp. 128-134
by
Andrei Popleteev
Assessment of TCP Parameters for Mobile Devices Concerning Performance and Energy Consumption
Full-text access may be available. Sign in or learn about subscription options.
pp. 135-141
by
Jonas Pontes
,
Demetrio Borges
,
Eric Borba
,
Victor Lira
,
Eduardo Tavares
Antenna Array Based Localization Scheme for Vehicular Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 142-146
by
Marco Antonio Marques Marinho
,
Alexey Vinel
,
Felix Antreich
,
João Paulo Carvalho Lustosa da Costa
,
Edison Pignaton De Freitas
A New Method of Error Reduction for Affine Projection Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 147-150
by
Shin'ichi Koike
Remarks on Adaptive-Type Hypercomplex-Valued Neural Network-Based Feedforward Feedback Controller
Full-text access may be available. Sign in or learn about subscription options.
pp. 151-156
by
Kazuhiko Takahashi
Towards Accurate Predictions of Customer Purchasing Patterns
Full-text access may be available. Sign in or learn about subscription options.
pp. 157-161
by
K.P. Lam
,
Rafael Valero-Fernandez
,
David J. Collins
,
Colin Rigby
,
James Bailey
Improving Performance for Geo-Distributed Data Process in Wide-Area
Full-text access may be available. Sign in or learn about subscription options.
pp. 162-167
by
Ge Zhang
,
Haozhan Wang
,
Zhongzhi Luan
,
Weiguo Wu
,
Depei Qian
Predicting Student Performance in an ITS Using Task-Driven Features
Full-text access may be available. Sign in or learn about subscription options.
pp. 168-175
by
Ritu Chaturvedi
,
C. I. Ezeife
An Adaptive Visualization Tool for High Order Discontinuous Galerkin Method with Quadratic Elements
Full-text access may be available. Sign in or learn about subscription options.
pp. 176-183
by
Liyang Xu
,
Xiaoguang Ren
,
Xinhai Xu
,
Hao Li
,
Yuhua Tang
,
Yongquan Feng
A Software-Hardware Co-designed Methodology for Efficient Thread Level Speculation
Full-text access may be available. Sign in or learn about subscription options.
pp. 184-191
by
Qiong Wang
,
Jialong Wang
,
Li Shen
,
Zhiying Wang
Fast Transmission Mechanism for Secure VPLS Architectures
Full-text access may be available. Sign in or learn about subscription options.
pp. 192-196
by
Madhusanka Liyanage
,
Mika Ylianttila
,
Andrei Gurtov
“You have a Potential Hacker’s Infection”: A Study on Technical Support Scams
Full-text access may be available. Sign in or learn about subscription options.
pp. 197-203
by
Sampsa Rauti
,
Ville Leppänen
A New Approach to Utility-Based Privacy Preserving in Data Publishing
Full-text access may be available. Sign in or learn about subscription options.
pp. 204-209
by
Yilmaz Vural
,
Murat Aydos
Best Random Codes Construction for Syndrome Coding Scheme
Full-text access may be available. Sign in or learn about subscription options.
pp. 210-214
by
Ke Zhang
,
Martin Tomlinson
,
Mohammed Zaki Ahmed
A Sensitivity Approach to Energy-Efficient Mapping of Dependable Virtual Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 215-222
by
Victor Lira
,
Eduado Tavares
,
Meuse Oliveira
,
Dennys Azevedo
,
Jonas Pontes
CDController: A Cloud Data Access Control System Based on Reputation
Full-text access may be available. Sign in or learn about subscription options.
pp. 223-230
by
Huaqing Lin
,
Zheng Yan
,
Raimo Kantola
Cloud IEC 61850: DDS Performance in Virtualized Environment with OpenDDS
Full-text access may be available. Sign in or learn about subscription options.
pp. 231-236
by
Roger Daniel Francisco Ferreira
,
Rômulo Silva de Oliveira
Using Game Theory to Solve the Fault Diagnosis Problem under Symmetric Comparison Rules
Full-text access may be available. Sign in or learn about subscription options.
pp. 237-244
by
Mourad Elhadef
A Data Mining-Based Approach for Cardiovascular Dysautonomias Diagnosis and Treatment
Full-text access may be available. Sign in or learn about subscription options.
pp. 245-252
by
Ali Idri
,
Ilham Kadi
Investigating the Agility Bias in DNS Graph Mining
Full-text access may be available. Sign in or learn about subscription options.
pp. 253-260
by
Jukka Ruohonen
,
Ville Leppänen
The Enumeration of Flippable Edges in Maximal Planar Graphs
Full-text access may be available. Sign in or learn about subscription options.
pp. 261-267
by
Dongyang Zhao
,
Yangyang Zhou
,
Jin Xu
Accurate Localization Using LTE Signaling Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 268-273
by
Lei Ni
,
Yuxin Wang
,
Haoyang Tang
,
Zhao Yin
,
Yanming Shen
A Novel Model for Cybersecurity Economics and Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 274-279
by
Paresh Rathod
,
Timo Hämäläinen
Some Cryptography Models Designed by Double Odd-Edge Labelling of Trees
Full-text access may be available. Sign in or learn about subscription options.
pp. 280-285
by
Hongyu Wang
,
Jin Xu
,
Bing Yao
Enhancing Security, Scalability and Flexibility of Virtual Private LAN Services
Full-text access may be available. Sign in or learn about subscription options.
pp. 286-291
by
Madhusanka Liyanage
,
Mika Ylianttila
,
Andrei Gurtov
Horizontal Requirement Engineering in Integration of Multiple IoT Use Cases of City Platform as a Service
Full-text access may be available. Sign in or learn about subscription options.
pp. 292-296
by
Toshihiko Yamakami
Dynamic Malware Detection Using API Similarity
Full-text access may be available. Sign in or learn about subscription options.
pp. 297-301
by
Ehab Mufid Shafiq Alkhateeb
Where Resources Meet at the Edge
Full-text access may be available. Sign in or learn about subscription options.
pp. 302-307
by
Klervie Toczé
,
Simin Nadjm-Tehrani
Software-Defined Edge Defense Against IoT-Based DDoS
Full-text access may be available. Sign in or learn about subscription options.
pp. 308-313
by
Mert Özçelik
,
Niaz Chalabianloo
,
Gürkan Gür
Investigation and Performance Evaluation of Scalable High Efficiency Video Coding
Full-text access may be available. Sign in or learn about subscription options.
pp. 314-319
by
Wei-Lune Tang
,
Shih-Hsuan Yang
An Efficient Dynamic Ridesharing Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 320-325
by
Jianren Gao
,
Yuxin Wang
,
Haoyang Tang
,
Zhao Yin
,
Lei Ni
,
Yanming Shen
A Best Practice Based E-Government Portals’ Maturity Model — A Case Study
Full-text access may be available. Sign in or learn about subscription options.
pp. 326-331
by
Abdoullah Fath-Allah
,
Laila Cheikhi
,
Ali Idri
,
Rafa Al-Qutaish
Security Assessment of a Distributed, Modbus-Based Building Automation System
Full-text access may be available. Sign in or learn about subscription options.
pp. 332-337
by
Tuomas Tenkanen
,
Timo Hämäläinen
Practical Performance Models for High-Order CFD Simulation
Full-text access may be available. Sign in or learn about subscription options.
pp. 338-344
by
Hao Li
,
Xiaoguang Ren
,
Yufei Lin
,
Yuhua Tang
,
Shuai Ye
Dynamic Reconfiguration of Architecture in the Communication Network of Air Traffic Management System
Full-text access may be available. Sign in or learn about subscription options.
pp. 345-350
by
Igor Kabashkin
Changing for Win-Win: Change Management on Global Value Chain Optimization
Full-text access may be available. Sign in or learn about subscription options.
pp. 351-356
by
Guangyu Xiong
,
Timo R. Nyberg
,
Gang Xiong
,
Aping Zhao
3D Matrix-Based Visualization System of Association Rules
Full-text access may be available. Sign in or learn about subscription options.
pp. 357-362
by
Biying Wang
,
Tingting Zhang
,
Zheng Chang
,
Tapani Ristaniemi
,
Guohua Liu
On the Performance of Web Services and Google Cloud Messaging
Full-text access may be available. Sign in or learn about subscription options.
pp. 363-367
by
Guido Albertengo
,
Fikru Getachew Debele
,
Waqar Hassan
,
Dario Stramandino
Author index
Freely available from IEEE.
pp. 373-374
[Publisher's information]
Freely available from IEEE.
pp. 376-376
Showing 67 out of 67