Default Cover Image

International Conference on Internet of Things and International Conference on Cyber, Physical and Social Computing

Oct. 19 2011 to Oct. 22 2011

Dalian, Liaoning China

ISBN: 978-0-7695-4580-6

Table of Contents

Papers
Title Page iFreely available from IEEE.pp. i
Papers
Title Page iiiFreely available from IEEE.pp. iii
Papers
Copyright PageFreely available from IEEE.pp. iv
Papers
Table of ContentsFreely available from IEEE.pp. v-xvii
Papers
Message from the iThings 2011 General ChairsFreely available from IEEE.pp. xviii
Papers
Message from the iThings 2011 Program ChairsFreely available from IEEE.pp. xix
Papers
Message from the iThings 2011 Steering ChairsFreely available from IEEE.pp. xx
Papers
Message from the iThings 2011 Workshop ChairsFreely available from IEEE.pp. xxi
Papers
iThings 2011 Organizing and Program CommitteesFreely available from IEEE.pp. xxii-xxiv
Papers
Message from the CPSCom 2011 General ChairsFreely available from IEEE.pp. xxv
Papers
Message from the CPSCom 2011 Program ChairsFreely available from IEEE.pp. xxvi
Papers
Message from the CPSCom 2011 Steering CommitteeFreely available from IEEE.pp. xxvii
Papers
Message from the CPSCom 2011 Workshop ChairsFreely available from IEEE.pp. xxviii
Papers
CPSCom 2011 Organizing and Program CommitteesFreely available from IEEE.pp. xxix-xxx
Papers
Message from the UUMA 2011 Workshop ChairsFreely available from IEEE.pp. xxxi
Papers
UUMA 2011 Organizing and Program CommitteesFreely available from IEEE.pp. xxxii
Papers
Message from the ReISOC 2011 Workshop ChairsFreely available from IEEE.pp. xxxiii
Papers
ReISOC 2011 Organizing and Program CommitteesFreely available from IEEE.pp. xxxiv
Papers
Message from the TFWS 2011 Workshop ChairsFreely available from IEEE.pp. xxxv
Papers
TFWS 2011 Organizing and Program CommitteesFreely available from IEEE.pp. xxxvi
Papers
Message from the TESL 2011 Workshop ChairsFreely available from IEEE.pp. xxxvii
Papers
TESL 2011 Organizing and Program CommitteesFreely available from IEEE.pp. xxxviii
Papers
Message from the PhoneCom 2011 Workshop ChairsFreely available from IEEE.pp. xxxix
Papers
PhoneCom 2011 Organizing and Program CommitteesFreely available from IEEE.pp. xl
Papers
Message from the CPSA 2011 Workshop ChairsFreely available from IEEE.pp. xli
Papers
CPSA 2011 Organizing and Program CommitteesFreely available from IEEE.pp. xlii
Papers
Message from the DOIoT 2011 Workshop ChairsFreely available from IEEE.pp. xliii
Papers
DOIoT 2011 Organizing and Program CommitteesFreely available from IEEE.pp. xliv
Papers
Message from the QoSIoT 2011 Workshop ChairsFreely available from IEEE.pp. xlv
Papers
QoSIoT 2011 Organizing and Program CommitteesFreely available from IEEE.pp. xlvi
Papers
Keynote Speeches of iThings 2011 and CPSCom 2011Freely available from IEEE.pp. xlvii-li
Papers
Keynote Speech of ReISOC 2011Freely available from IEEE.pp. lii
Papers
Keynote Speech of PhoneCom 2011Freely available from IEEE.pp. liii
Papers
Advanced Internet of ThingsFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Papers
Web of Things: Description, Discovery and IntegrationFull-text access may be available. Sign in or learn about subscription options.pp. 9-15
Papers
D-LITe: Distributed Logic for Internet of Things ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 16-24
Papers
A Framework for Dynamic Updating of Service Pack in the Internet of ThingsFull-text access may be available. Sign in or learn about subscription options.pp. 33-42
Papers
Ontology Based Service Discovery Method for Internet of ThingsFull-text access may be available. Sign in or learn about subscription options.pp. 43-47
Papers
An Experimental Facility for Wireless Multi-hop Networks in Future Internet ScenariosFull-text access may be available. Sign in or learn about subscription options.pp. 48-57
Papers
Scalable ID/Locator Resolution for the IoTFull-text access may be available. Sign in or learn about subscription options.pp. 58-66
Papers
GPEP: Graphics Processing Enhanced Pattern-Matching for High-Performance Deep Packet InspectionFull-text access may be available. Sign in or learn about subscription options.pp. 74-81
Papers
From U-Tile to Indoor-Tracer: An Indoor Location Sensing Platform Based on Passive RFIDFull-text access may be available. Sign in or learn about subscription options.pp. 89-93
Papers
Wireless Intelligent Fire Fighting Systems Software Platform RDFull-text access may be available. Sign in or learn about subscription options.pp. 94-99
Papers
Massive Heterogeneous Sensor Data Management in the Internet of ThingsFull-text access may be available. Sign in or learn about subscription options.pp. 100-108
Papers
Anonymous Video Processing for Live Street ViewFull-text access may be available. Sign in or learn about subscription options.pp. 109-113
Papers
An Optimized Schema to Improve the Time Efficiency of the EPG Gen-2 ProtocolFull-text access may be available. Sign in or learn about subscription options.pp. 123-126
Papers
On Error Performance Improvements of Passive UHF RFID Systems via Syndrome DecodingFull-text access may be available. Sign in or learn about subscription options.pp. 127-130
Papers
ENST: A Simulation Toolbox Based on Simulink for E-Textile NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 131-138
Papers
Principal-Agent Theory Model in Dynamic Spectrum SharingFull-text access may be available. Sign in or learn about subscription options.pp. 139-143
Papers
Improvement of Assurance for Wireless Sensor Networks Using Packet Detouring and Dispersed Data TransmissionFull-text access may be available. Sign in or learn about subscription options.pp. 144-151
Papers
ODAM-C: An Improved Algorithm for Vehicle Ad Hoc NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 152-156
Papers
An Algorithm of Weighted Monte Carlo Localization Based on Smallest Enclosing CircleFull-text access may be available. Sign in or learn about subscription options.pp. 157-161
Papers
Towards a Smart Campus with Mobile Social NetworkingFull-text access may be available. Sign in or learn about subscription options.pp. 162-169
Papers
Social Media Game Concept within the Digital Zoo: New Ways of Connecting a Tourist Attraction with Its VisitorsFull-text access may be available. Sign in or learn about subscription options.pp. 170-177
Papers
Internet of Things: An Emerging Industrial or a New Major?Full-text access may be available. Sign in or learn about subscription options.pp. 178-183
Papers
Connecting Agriculture to the Internet of Things through Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 184-187
Papers
Study on the Effect of Utility Uncertainty on Behavior Diffusion in Autonomous and Rational NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 188-194
Papers
Management System for IPv6-Enabled Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 195-200
Papers
Improved Compact Routing Scheme with Applications in Static Sensor Networks and InternetFull-text access may be available. Sign in or learn about subscription options.pp. 201-208
Papers
Understanding Location-Based Information Sharing in a Mobile Human Computation GameFull-text access may be available. Sign in or learn about subscription options.pp. 209-216
Papers
SoPhoNet: Photo Sharing Based on Participatory SensingFull-text access may be available. Sign in or learn about subscription options.pp. 217-224
Papers
Toward High-Level Activity Recognition from Accelerometers on Mobile PhonesFull-text access may be available. Sign in or learn about subscription options.pp. 225-231
Papers
Energy Efficiency Based on Quality of Data for Cyber Physical SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 232-241
Papers
Power-Efficient Cyber-Physical Late Arrival Detection with SmartphonesFull-text access may be available. Sign in or learn about subscription options.pp. 242-251
Papers
Supervised Gabor-Based Kernel Locality Preserving Projections for Face RecognitionFull-text access may be available. Sign in or learn about subscription options.pp. 252-257
Papers
Touch-Driven Interaction between Physical Space and Cyberspace with NFCFull-text access may be available. Sign in or learn about subscription options.pp. 258-265
Papers
Does Age Make a Difference in the Behaviour of Online Social Network Users?Full-text access may be available. Sign in or learn about subscription options.pp. 266-272
Papers
Physical Proximity and Online User Behaviour in an Indoor Mobile Social Networking ApplicationFull-text access may be available. Sign in or learn about subscription options.pp. 273-282
Papers
Better Organizing Your Contacts: An Empirical Study of an Intelligent Social Contact Management SystemFull-text access may be available. Sign in or learn about subscription options.pp. 283-290
Papers
Anomaly Detection on Collective Moving Patterns: A Hidden Markov Model Based SolutionFull-text access may be available. Sign in or learn about subscription options.pp. 291-296
Papers
Living with Internet of Things: The Emergence of Embedded IntelligenceFull-text access may be available. Sign in or learn about subscription options.pp. 297-304
Papers
A Structural Approach for Finding Real-Friend Links in Internet Social NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 305-312
Papers
Emerging Trust Patterns in Online CommunitiesFull-text access may be available. Sign in or learn about subscription options.pp. 313-316
Papers
Influence Strength Aware Diffusion Models for Dynamic Influence Maximization in Social NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 317-322
Papers
MuZi: Multi-channel ZigBee Networks for Avoiding WiFi InterferenceFull-text access may be available. Sign in or learn about subscription options.pp. 323-329
Papers
A Selfish Node Preventive Real Time Fault Tolerant Routing Protocol for WSNsFull-text access may be available. Sign in or learn about subscription options.pp. 330-337
Papers
MLMAC: Multi-channel Low-latency MAC Protocol for Industrial Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 338-342
Papers
Autonomous Coordination Technology in Wireless Sensor Networks for Online ExpansionFull-text access may be available. Sign in or learn about subscription options.pp. 343-350
Papers
N-Times Trilateral Centroid Weighted Localization Algorithm of Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 351-357
Papers
Empirical Analysis of Behavior on Information SecurityFull-text access may be available. Sign in or learn about subscription options.pp. 358-363
Papers
Vulnerability Analysis of the Simple Multicast Forwarding (SMF) Protocol for Mobile Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 364-371
Papers
Using a Smart Phone to Strengthen Password-Based AuthenticationFull-text access may be available. Sign in or learn about subscription options.pp. 372-379
Papers
A Taxonomy of Cyber Attacks on SCADA SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 380-388
Papers
Goal-Driven Navigation for Learning Activities Based on Process OptimizationFull-text access may be available. Sign in or learn about subscription options.pp. 389-395
Papers
An Optimal Unequal Frame Protection Scheme in Video StreamingFull-text access may be available. Sign in or learn about subscription options.pp. 396-401
Papers
Characterizing SMP Virtual Machine Scheduling in Virtualization EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 402-408
Papers
Task Matching in CrowdsourcingFull-text access may be available. Sign in or learn about subscription options.pp. 409-412
Papers
User-Session-Based Test Cases Optimization Method Based on Agglutinate Hierarchy ClusteringFull-text access may be available. Sign in or learn about subscription options.pp. 413-418
Papers
Event Similarity Computation in TextFull-text access may be available. Sign in or learn about subscription options.pp. 419-423
Papers
A Willing Events Identification MethodFull-text access may be available. Sign in or learn about subscription options.pp. 424-431
Papers
Using Metadata to Maintain Link Integrity for Linked DataFull-text access may be available. Sign in or learn about subscription options.pp. 432-437
Papers
Modeling Predicate Abstraction of Timed Automata in PVSFull-text access may be available. Sign in or learn about subscription options.pp. 438-443
Papers
User Model Evolution Algorithm: Forgetting and Reenergizing User PreferenceFull-text access may be available. Sign in or learn about subscription options.pp. 444-447
Papers
Behavior Based User Interests Extraction AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 448-452
Papers
A Kind of Case Similarity Evaluation Model Based on Case-Based ReasoningFull-text access may be available. Sign in or learn about subscription options.pp. 453-457
Papers
Document Clustering Method Based on Visual FeaturesFull-text access may be available. Sign in or learn about subscription options.pp. 458-462
Showing 100 out of 165