Default Cover Image

2016 19th IEEE Intl Conference on Computational Science and Engineering (CSE), IEEE 14th Intl Conference on Embedded and Ubiquitous Computing (EUC), and 15th Intl Symposium on Distributed Computing and Applications for Business Engineering (DCABES)

Aug. 24 2016 to Aug. 26 2016

Paris

Table of Contents

[Title page i]Freely available from IEEE.pp. i-i
[Title page iii]Freely available from IEEE.pp. iii-iii
[Copyright notice]Freely available from IEEE.pp. iv-iv
Table of contentsFreely available from IEEE.pp. v-xiv
Message from the EUC 2016 General ChairsFreely available from IEEE.pp. xv-xv
Message from the EUC 2016 Steering Committee ChairsFreely available from IEEE.pp. xvi-xvi
Message from the EUC 2016 Program Committee ChairsFreely available from IEEE.pp. xvii-xvii
EUC 2016 Program CommitteeFreely available from IEEE.pp. xviii-xix
Message from the CSE 2016 General ChairsFreely available from IEEE.pp. xx-xxi
Message from the CSE 2016 Steering Committee ChairsFreely available from IEEE.pp. xxii-xxii
Message from the CSE 2016 Program Committee ChairsFreely available from IEEE.pp. xxiii-xxiii
CSE 2016 Program CommitteeFreely available from IEEE.pp. xxiv-xxvi
Message from the DCABES 2016 General and Program ChairsFreely available from IEEE.pp. xxvii-xxvii
DCABES 2016 Program CommitteeFreely available from IEEE.pp. xxviii-xxviii
An Analytical Channel Model for Emerging Wireless Networks-on-ChipFull-text access may be available. Sign in or learn about subscription options.pp. 9-15
Energy Consumption Measurements as a Basis for Computational Offloading for Android SmartphonesFull-text access may be available. Sign in or learn about subscription options.pp. 24-31
Towards Zero-Configuration Indoor Localization Using Asynchronous Acoustic BeaconsFull-text access may be available. Sign in or learn about subscription options.pp. 32-39
TSTP MAC: A Foundation for the Trustful Space-Time ProtocolFull-text access may be available. Sign in or learn about subscription options.pp. 40-47
Reliable Memory Efficient Name Forwarding in Named Data NetworkingFull-text access may be available. Sign in or learn about subscription options.pp. 48-55
Request-Size Aware Flash Translation Layer Based on Page-Level MappingFull-text access may be available. Sign in or learn about subscription options.pp. 68-71
Ruleset Minimization in Multi-tenant Smart BuildingsFull-text access may be available. Sign in or learn about subscription options.pp. 72-79
DockerCap: A Software-Level Power Capping Orchestrator for Docker ContainersFull-text access may be available. Sign in or learn about subscription options.pp. 90-97
LSKA: Location Similarity Based Key Agreement Scheme for Smartphone NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 99-105
Recursive and Rolling Windows for Medical Time Series Forecasting: A Comparative StudyFull-text access may be available. Sign in or learn about subscription options.pp. 106-113
FFWD: Latency-Aware Event Stream Processing via Domain-Specific Load-Shedding PoliciesFull-text access may be available. Sign in or learn about subscription options.pp. 130-137
On Eavesdropping Attacks in Wireless NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 138-141
An Online Tool to Design Highly Parametrized Optimized Encoders and DecodersFull-text access may be available. Sign in or learn about subscription options.pp. 142-145
An Android Systrace Extension for Tracing WakelocksFull-text access may be available. Sign in or learn about subscription options.pp. 146-149
An Efficient Scalable Parallelized Version of the Mondrian AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 150-153
Development of a Hybrid Defensive Embedded System with Face RecognitionFull-text access may be available. Sign in or learn about subscription options.pp. 154-157
Indoor Positioning Based on the iBeacon Framework with Gaussian Weight FunctionsFull-text access may be available. Sign in or learn about subscription options.pp. 158-165
Battery Life Estimation of Sensor Node with Zero Standby Power ConsumptionFull-text access may be available. Sign in or learn about subscription options.pp. 166-172
Formal Verification of Robotics Navigation AlgorithmsFull-text access may be available. Sign in or learn about subscription options.pp. 177-180
Persona Analysis Engine Based on Mobile NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 181-184
A New Cluster-Based Evolutionary Routing Algorithm for Extending the Lifetime of Heterogeneous Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 185-188
Support Vector Regression for Electricity Consumption Prediction in a Building in JapanFull-text access may be available. Sign in or learn about subscription options.pp. 189-196
Survey on Memory and Devices Disaggregation Solutions for HPC SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 197-204
CPUs Energy Consumption Reduction for Asynchronous Parallel Methods Running over GridsFull-text access may be available. Sign in or learn about subscription options.pp. 205-212
Reducing the Power Consumption of Matrix Multiplications by VectorizationFull-text access may be available. Sign in or learn about subscription options.pp. 213-220
Collaborative P2P Painting on a Shared CanvasFull-text access may be available. Sign in or learn about subscription options.pp. 221-224
Towards Scaling Parallel Seismic RaytracingFull-text access may be available. Sign in or learn about subscription options.pp. 225-233
Automatic Code Generation of Distributed Parallel TasksFull-text access may be available. Sign in or learn about subscription options.pp. 234-241
Parallelization of the ADAPT 3D Streamer Propagation CodeFull-text access may be available. Sign in or learn about subscription options.pp. 242-245
Efficient Matricization of n-D Array with CUDA and Its EvaluationFull-text access may be available. Sign in or learn about subscription options.pp. 246-252
Automatic Tuning of Computation-Communication Overlap for Parallel 1-D FFTFull-text access may be available. Sign in or learn about subscription options.pp. 253-256
Threewise: a local variance algorithm for GPUFull-text access may be available. Sign in or learn about subscription options.pp. 257-262
An Algorithm for Detection of Chiastic Structures in Text DatabasesFull-text access may be available. Sign in or learn about subscription options.pp. 263-269
A New Design of Swarm Intelligence Based Metaheuristics for Constrained Multi-objective OptimizationFull-text access may be available. Sign in or learn about subscription options.pp. 278-282
Evaluation and Comparison of QoE-Based Admission Control SolutionsFull-text access may be available. Sign in or learn about subscription options.pp. 283-286
Personalized Social Image Organization, Visualization, and Querying Tool Using Low- and High-Level FeaturesFull-text access may be available. Sign in or learn about subscription options.pp. 287-294
Galerkin Least Square Method for Time-Harmonic Acoustics in Royaumont AbbeyFull-text access may be available. Sign in or learn about subscription options.pp. 299-307
HPC Accelerators with 3D MemoryFull-text access may be available. Sign in or learn about subscription options.pp. 320-328
Optimizing Radio Resource Allocation in Multicast Mobile NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 329-334
NBTI in FinFET Circuits under the Temperature Effect InversionFull-text access may be available. Sign in or learn about subscription options.pp. 343-350
Exact Diversity-Multiplexing-Delay Tradeoff of Diffusion Selection Cooperation Networks with ARQFull-text access may be available. Sign in or learn about subscription options.pp. 351-354
Identification of Sleep Apnea from Single-Lead ElectrocardiogramFull-text access may be available. Sign in or learn about subscription options.pp. 355-360
A New Hybrid Approach on Blood Glucose Level Control Based on Palumbo Delayed ModelFull-text access may be available. Sign in or learn about subscription options.pp. 361-366
Resource-Centered Distributed Processing of Large Histopathology ImagesFull-text access may be available. Sign in or learn about subscription options.pp. 367-370
Galerkin Gradient Least Square Method for Sound Holography in Royaumont AbbeyFull-text access may be available. Sign in or learn about subscription options.pp. 371-378
Spectral Domain Decomposition Method for Physically-Based Rendering of Royaumont AbbeyFull-text access may be available. Sign in or learn about subscription options.pp. 379-385
Grade Prediction in MOOCsFull-text access may be available. Sign in or learn about subscription options.pp. 386-392
Transconductance Filter Synthesis with NAMFull-text access may be available. Sign in or learn about subscription options.pp. 408-411
Feature-Opinion Pairs Discovery for Chinese ReviewFull-text access may be available. Sign in or learn about subscription options.pp. 432-435
Summary of Topological Study of Chaotic CBC Mode of OperationFull-text access may be available. Sign in or learn about subscription options.pp. 436-443
Diffusion and Confusion of Chaotic Iteration Based Hash FunctionsFull-text access may be available. Sign in or learn about subscription options.pp. 444-447
Levelized Taxonomy Approach for the Job Seeking/Recruitment ProblemFull-text access may be available. Sign in or learn about subscription options.pp. 448-451
Indoor Massive MIMO: Uplink Pilot Mitigation Using Channel State Information MapFull-text access may be available. Sign in or learn about subscription options.pp. 452-458
Thing-Oriented Learning: Application to Mathematical ObjectsFull-text access may be available. Sign in or learn about subscription options.pp. 464-467
A Bitcoin Model for Evaluation of Clustering to Improve Propagation Delay in Bitcoin NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 468-475
Modeling Human Behavior Using Feature Extraction and Class PredictionFull-text access may be available. Sign in or learn about subscription options.pp. 476-479
A Case-Based Reasoning Approach to Convert Natural Language into First Order LogicFull-text access may be available. Sign in or learn about subscription options.pp. 480-483
Echo State Networks-Based Reservoir Computing for MNIST Handwritten Digits RecognitionFull-text access may be available. Sign in or learn about subscription options.pp. 484-491
Time-Delay Reservoir Computers and High-Speed Information Processing CapacityFull-text access may be available. Sign in or learn about subscription options.pp. 492-495
Reservoir Computing: Information Processing of Stationary SignalsFull-text access may be available. Sign in or learn about subscription options.pp. 496-503
A Composite Lasso Penalty With an Application in CosmologyFull-text access may be available. Sign in or learn about subscription options.pp. 504-507
Total Variation Minimization for Compressed Sensing with “Smoothly” Varying CovariatesFull-text access may be available. Sign in or learn about subscription options.pp. 508-511
Total Variation Minimization for Compressed Sensing with “Smoothly” Varying CovariatesFull-text access may be available. Sign in or learn about subscription options.pp. 508-511
Cross Join Operation Over Large Quantities of Data Considering Data Locality and Data ReplicationFull-text access may be available. Sign in or learn about subscription options.pp. 522-525
Transparent Redirection of File-Based Data Accesses for Distributed Scientific ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 526-533
Ham-Spam Filtering Using Different PCA ScenariosFull-text access may be available. Sign in or learn about subscription options.pp. 542-545
Showing 100 out of 135