Default Cover Image

2017 IEEE International Conference on Computer and Information Technology (CIT)

Aug. 21 2017 to Aug. 23 2017

Helsinki, Finland

Table of Contents

[Title page i]Freely available from IEEE.pp. i-i
[Title page iii]Freely available from IEEE.pp. iii-iii
[Copyright notice]Freely available from IEEE.pp. iv-iv
Table of contentsFreely available from IEEE.pp. v-ix
Message from the CIT 2017 General ChairsFreely available from IEEE.pp. x-xi
Message from the CIT 2017 Program ChairsFreely available from IEEE.pp. xii-xii
Organizing CommitteeFreely available from IEEE.pp. xiii-xiv
Technical Program CommitteeFreely available from IEEE.pp. xv-xix
KeynotesFull-text access may be available. Sign in or learn about subscription options.pp. xx-xxx
Learning From Big Data: A Survey and Evaluation of Approximation Technologies for Large-Scale Reinforcement LearningFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Predicting the Popularity of Online News Based on Multivariate AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 9-15
Efficient Strip-Mode Microwave Correlated Imaging Method with Data FusionFull-text access may be available. Sign in or learn about subscription options.pp. 16-22
Sentiment Classification: Feature Selection Based Approaches Versus Deep LearningFull-text access may be available. Sign in or learn about subscription options.pp. 23-30
A Core Theory Based Algorithm for Influence Maximization in Social NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 31-36
ROBOMO: Effects of a Motivational Intervention to Adress the Barriers During Science LearningFull-text access may be available. Sign in or learn about subscription options.pp. 47-54
A Multi-objective Metaheuristic Approach to Search-Based Stress TestingFull-text access may be available. Sign in or learn about subscription options.pp. 55-62
Robust Optimal Spectrum Patrolling for Passive Monitoring in Cognitive Radio NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 63-68
Cooperative Multi-relay Assisted Multicast Beamforming in Wirelessly Powered CommunicationsFull-text access may be available. Sign in or learn about subscription options.pp. 69-74
Improved Presence Detection for Occupancy Control in Multisensory EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 75-80
Subspace Decomposition Channel Estimation for Multiple Virtual MIMO SC-FDMA SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 81-86
Dynamic MAC Protocol for Tactical Data LinksFull-text access may be available. Sign in or learn about subscription options.pp. 87-92
Fast Coding-Unit Mode Decision for HEVC TransratingFull-text access may be available. Sign in or learn about subscription options.pp. 93-100
Energy Efficient Event Driven Video Streaming Surveillance Using SleepyCAMFull-text access may be available. Sign in or learn about subscription options.pp. 107-113
Fuzzy Analogy Based Effort Estimation: An Empirical Comparative StudyFull-text access may be available. Sign in or learn about subscription options.pp. 114-121
A Simplified Massive MIMO Approach Using PrecodingFull-text access may be available. Sign in or learn about subscription options.pp. 122-127
Indoor Localization Using Ambient FM Radio RSS Fingerprinting: A 9-Month StudyFull-text access may be available. Sign in or learn about subscription options.pp. 128-134
A New Method of Error Reduction for Affine Projection AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 147-150
Remarks on Adaptive-Type Hypercomplex-Valued Neural Network-Based Feedforward Feedback ControllerFull-text access may be available. Sign in or learn about subscription options.pp. 151-156
Towards Accurate Predictions of Customer Purchasing PatternsFull-text access may be available. Sign in or learn about subscription options.pp. 157-161
Improving Performance for Geo-Distributed Data Process in Wide-AreaFull-text access may be available. Sign in or learn about subscription options.pp. 162-167
Predicting Student Performance in an ITS Using Task-Driven FeaturesFull-text access may be available. Sign in or learn about subscription options.pp. 168-175
A Software-Hardware Co-designed Methodology for Efficient Thread Level SpeculationFull-text access may be available. Sign in or learn about subscription options.pp. 184-191
Fast Transmission Mechanism for Secure VPLS ArchitecturesFull-text access may be available. Sign in or learn about subscription options.pp. 192-196
“You have a Potential Hacker’s Infection”: A Study on Technical Support ScamsFull-text access may be available. Sign in or learn about subscription options.pp. 197-203
A New Approach to Utility-Based Privacy Preserving in Data PublishingFull-text access may be available. Sign in or learn about subscription options.pp. 204-209
Best Random Codes Construction for Syndrome Coding SchemeFull-text access may be available. Sign in or learn about subscription options.pp. 210-214
A Sensitivity Approach to Energy-Efficient Mapping of Dependable Virtual NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 215-222
CDController: A Cloud Data Access Control System Based on ReputationFull-text access may be available. Sign in or learn about subscription options.pp. 223-230
Cloud IEC 61850: DDS Performance in Virtualized Environment with OpenDDSFull-text access may be available. Sign in or learn about subscription options.pp. 231-236
Using Game Theory to Solve the Fault Diagnosis Problem under Symmetric Comparison RulesFull-text access may be available. Sign in or learn about subscription options.pp. 237-244
A Data Mining-Based Approach for Cardiovascular Dysautonomias Diagnosis and TreatmentFull-text access may be available. Sign in or learn about subscription options.pp. 245-252
Investigating the Agility Bias in DNS Graph MiningFull-text access may be available. Sign in or learn about subscription options.pp. 253-260
The Enumeration of Flippable Edges in Maximal Planar GraphsFull-text access may be available. Sign in or learn about subscription options.pp. 261-267
Accurate Localization Using LTE Signaling DataFull-text access may be available. Sign in or learn about subscription options.pp. 268-273
A Novel Model for Cybersecurity Economics and AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 274-279
Some Cryptography Models Designed by Double Odd-Edge Labelling of TreesFull-text access may be available. Sign in or learn about subscription options.pp. 280-285
Enhancing Security, Scalability and Flexibility of Virtual Private LAN ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 286-291
Horizontal Requirement Engineering in Integration of Multiple IoT Use Cases of City Platform as a ServiceFull-text access may be available. Sign in or learn about subscription options.pp. 292-296
Dynamic Malware Detection Using API SimilarityFull-text access may be available. Sign in or learn about subscription options.pp. 297-301
Where Resources Meet at the EdgeFull-text access may be available. Sign in or learn about subscription options.pp. 302-307
Software-Defined Edge Defense Against IoT-Based DDoSFull-text access may be available. Sign in or learn about subscription options.pp. 308-313
Investigation and Performance Evaluation of Scalable High Efficiency Video CodingFull-text access may be available. Sign in or learn about subscription options.pp. 314-319
An Efficient Dynamic Ridesharing AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 320-325
A Best Practice Based E-Government Portals’ Maturity Model — A Case StudyFull-text access may be available. Sign in or learn about subscription options.pp. 326-331
Security Assessment of a Distributed, Modbus-Based Building Automation SystemFull-text access may be available. Sign in or learn about subscription options.pp. 332-337
Practical Performance Models for High-Order CFD SimulationFull-text access may be available. Sign in or learn about subscription options.pp. 338-344
Dynamic Reconfiguration of Architecture in the Communication Network of Air Traffic Management SystemFull-text access may be available. Sign in or learn about subscription options.pp. 345-350
Changing for Win-Win: Change Management on Global Value Chain OptimizationFull-text access may be available. Sign in or learn about subscription options.pp. 351-356
3D Matrix-Based Visualization System of Association RulesFull-text access may be available. Sign in or learn about subscription options.pp. 357-362
On the Performance of Web Services and Google Cloud MessagingFull-text access may be available. Sign in or learn about subscription options.pp. 363-367
Author indexFreely available from IEEE.pp. 373-374
[Publisher's information]Freely available from IEEE.pp. 376-376
Showing 67 out of 67