Default Cover Image

2014 IEEE 11th Intl Conf on Ubiquitous Intelligence & Computing and 2014 IEEE 11th Intl Conf on Autonomic & Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom)

Dec. 9 2014 to Dec. 12 2014

Bali, Indonesia

Table of Contents

[Title page i]Freely available from IEEE.pp. i-i
[Title page iii]Freely available from IEEE.pp. iii-iii
[Copyright notice]Freely available from IEEE.pp. iv-iv
Table of contentsFreely available from IEEE.pp. v-xvi
Message from the UIC 2014 General ChairsFreely available from IEEE.pp. xvii-xvii
Message from the UIC 2014 Program ChairsFreely available from IEEE.pp. xviii-xix
Message from the UIC 2014 Steering ChairsFreely available from IEEE.pp. xx-xxi
Message from the UIC 2014 Workshop/Symposium ChairsFreely available from IEEE.pp. xxii-xxii
Message from the ATC 2014 General Chairs and Program ChairsFreely available from IEEE.pp. xxiii-xxiv
Message from the ATC 2014 Steering ChairsFreely available from IEEE.pp. xxv-xxvi
Message from the ScalCom 2014 General ChairsFreely available from IEEE.pp. xxvii-xxviii
Message from the ScalCom 2014 Program ChairsFreely available from IEEE.pp. xxix-xxx
Message from the ScalCom 2014 Steering ChairsFreely available from IEEE.pp. xxxi-xxxii
Message from the ScalCom 2014 Workshop ChairsFreely available from IEEE.pp. xxxiii-xxxiii
Message from the BusinessClouds 2014 Workshop ChairsFreely available from IEEE.pp. xxxiv-xxxv
Message from the FUSION 2014 Workshop ChairsFreely available from IEEE.pp. xxxvi-xxxvi
Message from the PUDA 2014 Workshop ChairsFreely available from IEEE.pp. xxxvii-xxxvii
Message from the UFirst 2014 Symposium ChairsFreely available from IEEE.pp. xxxviii-xxxviii
Message from the USDE 2014 Symposium ChairsFreely available from IEEE.pp. xxxix-xxxix
UIC 2014 Conference OrganizationFreely available from IEEE.pp. xl-xli
UIC 2014 Program CommitteeFreely available from IEEE.pp. xlii-xliii
ATC 2014 Conference OrganizationFreely available from IEEE.pp. xliv-xlv
ATC 2014 Program CommitteeFreely available from IEEE.pp. xlvi-xlvii
ScalCom 2014 Conference OrganizationFreely available from IEEE.pp. xlviii-xlvix
ScalCom 2014 Program CommitteeFreely available from IEEE.pp. l-lii
KeynotesFull-text access may be available. Sign in or learn about subscription options.pp. liii-lvi
Situation Inference by Fusion of Opportunistically Available ContextsFull-text access may be available. Sign in or learn about subscription options.pp. 10-17
Detecting Cruising Flagged Taxis' Passenger-Refusal Behaviors Using Traffic Data and CrowdsourcingFull-text access may be available. Sign in or learn about subscription options.pp. 18-25
Handling Influence among Multiple Applications in a Smart SpaceFull-text access may be available. Sign in or learn about subscription options.pp. 26-33
Shutter: Preventing Information Leakage Based on Domain Gateway for Social NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 42-49
RPC: A Localization Method Based on Regional Partition and CooperationFull-text access may be available. Sign in or learn about subscription options.pp. 58-65
Recognizing Semantic Locations from Smartphone Log with Combined Machine Learning TechniquesFull-text access may be available. Sign in or learn about subscription options.pp. 66-71
A Run-Time Generic Decision Framework for Power and Performance Management on Mobile DevicesFull-text access may be available. Sign in or learn about subscription options.pp. 72-79
Muclouds: Parallel Simulator for Large-Scale Cloud Computing SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 80-87
A Management System for Cyber Individuals and Heterogeneous DataFull-text access may be available. Sign in or learn about subscription options.pp. 88-95
Nanonetwork Minimum Energy CodingFull-text access may be available. Sign in or learn about subscription options.pp. 96-103
Design of Lower Limb Chair Exercise Support System with Depth SensorFull-text access may be available. Sign in or learn about subscription options.pp. 104-111
AR Go-Kon: A System for Facilitating a Smooth Communication in the First MeetingFull-text access may be available. Sign in or learn about subscription options.pp. 120-126
An Anypath Routing Protocol for Multi-hop Cognitive Radio Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 127-133
Intuitive Appliance Control System Based on a High-Accuracy Indoor Positioning SystemFull-text access may be available. Sign in or learn about subscription options.pp. 134-139
Discovering Latent Structures for Activity Recognition in Smart EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 140-147
An Opportunistic Music Sharing System Based on Mobility Prediction and Preference LearningFull-text access may be available. Sign in or learn about subscription options.pp. 148-153
Who Move the Treasures: A RFID-based Approach for the TreasuresFull-text access may be available. Sign in or learn about subscription options.pp. 154-162
Human-Assisted Rule Satisfaction in Partially Observable EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 171-178
GFRT-chord: Flexible Structured Overlay Using Node GroupsFull-text access may be available. Sign in or learn about subscription options.pp. 187-195
An Autonomic Approach to Real-Time Predictive Analytics Using Open Data and Internet of ThingsFull-text access may be available. Sign in or learn about subscription options.pp. 204-211
A Multi-armed Bandit Approach to Online Spatial Task AssignmentFull-text access may be available. Sign in or learn about subscription options.pp. 212-219
Palantir: Crowdsourced Newsification Using TwitterFull-text access may be available. Sign in or learn about subscription options.pp. 220-227
Historical Trajectories Based Location Privacy Protection QueryFull-text access may be available. Sign in or learn about subscription options.pp. 228-235
Near-Optimal Activity Prediction through Efficient Wavelet Modulus Maxima Partitioning and Conditional Random FieldsFull-text access may be available. Sign in or learn about subscription options.pp. 236-243
Taxi Exp: A Novel Framework for City-Wide Package Express Shipping via Taxi Crowd SourcingFull-text access may be available. Sign in or learn about subscription options.pp. 244-251
Towards Energy Optimization Based on Delay-Sensitive Traffic for WiFi NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 252-259
BodyRC: Exploring Interaction Modalities Using Human Body as Lossy Signal Transmission MediumFull-text access may be available. Sign in or learn about subscription options.pp. 260-267
Multi-source Broadcast Scheduling Algorithm of Barrage Relay Network in Tactical MANETFull-text access may be available. Sign in or learn about subscription options.pp. 268-275
Discovering People's Life Patterns from Anonymized WiFi ScanlistsFull-text access may be available. Sign in or learn about subscription options.pp. 276-283
uStitchHub: Stitching Multi-touch Trajectories on Tiled Very Large TabletopsFull-text access may be available. Sign in or learn about subscription options.pp. 284-289
Design of a Sensing Service Architecture for Internet of Things with Semantic Sensor SelectionFull-text access may be available. Sign in or learn about subscription options.pp. 290-298
Identifying Hot Lines of Urban Spatial Structure Using Cellphone Call Detail Record DataFull-text access may be available. Sign in or learn about subscription options.pp. 299-304
Study on Complex Event Processing for CPS: An Event Model PerspectiveFull-text access may be available. Sign in or learn about subscription options.pp. 305-310
Task Scheduling in Cyber-Physical SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 319-324
Data Collection Oriented Topology Control for Predictable Delay-Tolerant NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 325-330
A Novel Email Virus Propagation Model with Local GroupFull-text access may be available. Sign in or learn about subscription options.pp. 331-336
Making Business Environments Smarter: A Context-Adaptive Petri Net ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 343-348
Subtractive Clustering as ZUPT DetectorFull-text access may be available. Sign in or learn about subscription options.pp. 349-355
An Indoor Location-Tracking Using Wireless Sensor Networks Cooperated with Relative Distance Finger PrintingFull-text access may be available. Sign in or learn about subscription options.pp. 356-361
Defining and Analyzing a Gesture Set for Interactive TV Remote on Touchscreen PhonesFull-text access may be available. Sign in or learn about subscription options.pp. 362-365
Privacy Perceptive Wireless Service Game ModelFull-text access may be available. Sign in or learn about subscription options.pp. 366-371
Service Selection in Ubiquitous Environments: A Novel Approach Using CBR and Skyline ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 384-389
The Device Cloud - Applying Cloud Computing Concepts to the Internet of ThingsFull-text access may be available. Sign in or learn about subscription options.pp. 396-401
Studying Accessible States of User Interfaces on TabletopsFull-text access may be available. Sign in or learn about subscription options.pp. 402-405
Tailor-Made Gaussian Distribution for Intrusion Detection in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 406-411
Segmentation of Urban Areas Using Vector-Based ModelFull-text access may be available. Sign in or learn about subscription options.pp. 412-416
A Machine Learning Approach for Self-Diagnosing Multiprocessors Systems under the Generalized Comparison ModelFull-text access may be available. Sign in or learn about subscription options.pp. 417-424
Failure Prediction for Cloud Datacenter by Hybrid Message Pattern LearningFull-text access may be available. Sign in or learn about subscription options.pp. 425-432
Self-Adaptive Containers: Interoperability Extensions and Cloud IntegrationFull-text access may be available. Sign in or learn about subscription options.pp. 433-440
Automatically Generating External OS Kernel Integrity Checkers for Detecting Hidden RootkitsFull-text access may be available. Sign in or learn about subscription options.pp. 441-448
A Privacy-Aware Architecture for Energy Management Systems in Smart GridsFull-text access may be available. Sign in or learn about subscription options.pp. 449-455
Awareness and Control of Personal Data Based on the Cyber-I Privacy ModelFull-text access may be available. Sign in or learn about subscription options.pp. 456-463
SW-POR: A Novel POR Scheme Using Slepian-Wolf Coding for Cloud StorageFull-text access may be available. Sign in or learn about subscription options.pp. 464-472
Towards a Trust Model for Trust Establishment and Management in Business-to-Consumer E-CommerceFull-text access may be available. Sign in or learn about subscription options.pp. 479-486
An Efficient Trust-Oriented Trip Planning Method in Road NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 487-494
Trust-E: A Trusted Embedded Operating System Based on the ARM TrustzoneFull-text access may be available. Sign in or learn about subscription options.pp. 495-501
Secure Third Party Auditor for Ensuring Data Integrity in Cloud StorageFull-text access may be available. Sign in or learn about subscription options.pp. 510-517
A Routing Scheme Based on Autonomous Clustering and P2P Overlay Network in MANETsFull-text access may be available. Sign in or learn about subscription options.pp. 518-524
Privacy Protection against Query Prediction in Location-Based ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 525-532
Forwarding Impact Aware Routing Protocol for Delay Tolerant NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 533-539
Showing 100 out of 161