Default Cover Image

2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)

Oct. 10 2013 to Oct. 12 2013

Beijing, China

Table of Contents

Title Page iFreely available from IEEE.pp. i-i
Title Page iiiFreely available from IEEE.pp. iii-iii
Copyright PageFreely available from IEEE.pp. iv-iv
Table of ContentsFreely available from IEEE.pp. v-xi
PrefaceFreely available from IEEE.pp. xii-xii
Message from the Steering Committee ChairFreely available from IEEE.pp. xiii-xiii
Message from the Technical Program ChairsFreely available from IEEE.pp. xiv-xv
CommitteesFreely available from IEEE.pp. xvi-xvii
ReviewersFreely available from IEEE.pp. xviii-xxv
KeynotesFreely available from IEEE.pp. xxvi-xxx
A Homomorphic ElGamal Variant Based on BGN's MethodFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
A Survey on Querying Encrypted Data for Database as a ServiceFull-text access may be available. Sign in or learn about subscription options.pp. 14-18
Anonymous Multi-receiver Certificate-Based EncryptionFull-text access may be available. Sign in or learn about subscription options.pp. 19-26
Intelligent Checkers to Improve Attack Detection in Cyber Physical SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 27-30
Secure Wireless Multicast for Delay-Sensitive Prioritized Data Using Network CodingFull-text access may be available. Sign in or learn about subscription options.pp. 38-45
Security Mechanism for the Interactive Satellite Remote Education System Based on DTNFull-text access may be available. Sign in or learn about subscription options.pp. 46-52
Towards a Trusted Mobile RFID Network FrameworkFull-text access may be available. Sign in or learn about subscription options.pp. 53-58
A Security Ontology with MDA for Software DevelopmentFull-text access may be available. Sign in or learn about subscription options.pp. 67-74
Anomaly Detection via One Class SVM for Protection of SCADA SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 82-88
Blocker-Type Methods for Protecting Customers' Privacy in RFID SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 89-96
Seamless Privacy: Privacy-Preserving Subgraph Counting in Interactive Social Network AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 97-104
Cost-Aware Automatic Virtual Machine Scaling in Fine Granularity for Cloud ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 109-116
DAG Based Feature Additive XML Schema Generation for Unstructured TextFull-text access may be available. Sign in or learn about subscription options.pp. 117-124
Mining Frequent Rooted Ordered Tree Generators EfficientlyFull-text access may be available. Sign in or learn about subscription options.pp. 132-139
A Big Data Approach for a New ICT Agriculture Application DevelopmentFull-text access may be available. Sign in or learn about subscription options.pp. 140-143
Authorship Attribution of Short Historical Arabic Texts Based on Lexical FeaturesFull-text access may be available. Sign in or learn about subscription options.pp. 144-147
Big Data a Sure Thing for Telecommunications: Telecom's Future in Big DataFull-text access may be available. Sign in or learn about subscription options.pp. 148-154
Blending SQL and NewSQL Approaches: Reference Architectures for Enterprise Big Data ChallengesFull-text access may be available. Sign in or learn about subscription options.pp. 163-170
The Architecture and Design of a Community-Based Cloud Platform for Curating Big DataFull-text access may be available. Sign in or learn about subscription options.pp. 171-178
Matrix-Query: A Distributed SQL-Like Query Processing Model for Large Database ClustersFull-text access may be available. Sign in or learn about subscription options.pp. 179-185
Robustness of Community Partition Similarity MetricsFull-text access may be available. Sign in or learn about subscription options.pp. 186-193
Towards a Moderate-Granularity Incremental Clustering Algorithm for GPUFull-text access may be available. Sign in or learn about subscription options.pp. 194-201
A Virtualized Hybrid Distributed File SystemFull-text access may be available. Sign in or learn about subscription options.pp. 202-205
Architecture Research and Design Implementation of Multi-data and Multi-path Communication Control SystemFull-text access may be available. Sign in or learn about subscription options.pp. 206-209
Context Aware Semantic Web Services Description and MatchFull-text access may be available. Sign in or learn about subscription options.pp. 210-213
Discovering Massive High-Value Users from Sina Weibo Based on Quality and ActivityFull-text access may be available. Sign in or learn about subscription options.pp. 214-220
Predicting Service Execution Time towards a Runtime Monitoring ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 221-224
Replication in Distributed Storage Systems: State of the Art, Possible Directions, and Open IssuesFull-text access may be available. Sign in or learn about subscription options.pp. 225-232
A New Approach for Estimating the Infrared Radiative and SimulationFull-text access may be available. Sign in or learn about subscription options.pp. 233-236
The Architecture of ProMe Instant Question Answering SystemFull-text access may be available. Sign in or learn about subscription options.pp. 237-242
The mServices GUI Architectures Design for the mLearning SystemFull-text access may be available. Sign in or learn about subscription options.pp. 243-246
A Business Computing System Optimization Research on the Efficiency of Database QueriesFull-text access may be available. Sign in or learn about subscription options.pp. 247-250
A Light-Weight Rule-Based Monitoring System for Web of ThingsFull-text access may be available. Sign in or learn about subscription options.pp. 251-254
Design of a RS485-to-1553B Bus BridgeFull-text access may be available. Sign in or learn about subscription options.pp. 255-258
Diagnosis Rule Mining of Airborne Avionics Using Formal Concept AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 259-265
Electric Power Data Acquisition System Based on Multi-thread MechanismFull-text access may be available. Sign in or learn about subscription options.pp. 273-276
Frequency-Estimation-Based Thigh Angle Prediction in Level-Ground Walking Using IMUsFull-text access may be available. Sign in or learn about subscription options.pp. 277-282
Management Motivation and Earnings Management MethodsFull-text access may be available. Sign in or learn about subscription options.pp. 283-286
Speaker Detection on Telephone Calls Using Fusion between SVMs and Statistical MeasuresFull-text access may be available. Sign in or learn about subscription options.pp. 287-293
Virtual Machine Placement Strategy ResearchFull-text access may be available. Sign in or learn about subscription options.pp. 294-297
WS-S Evaluation Based on User Preferences and Ranking MechanismFull-text access may be available. Sign in or learn about subscription options.pp. 298-301
A 2-Dimensional ACO-Based Path Planner for Off-Line Robot Path PlanningFull-text access may be available. Sign in or learn about subscription options.pp. 302-307
A Cluster Based Smart MAC Layer Protocol for Delay-Tolerant Underwater Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 308-315
An Energy-Efficient Asynchronous MAC for Bulk-Data Collection in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 316-319
Analysis of Image Transmission for Wireless Sensor Networks in the Mine TunnelFull-text access may be available. Sign in or learn about subscription options.pp. 320-324
Improved PCA Based Step Direction Estimation for Dead-Reckoning LocalizationFull-text access may be available. Sign in or learn about subscription options.pp. 325-331
Dynamic Collaborative Change Point Detection in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 332-339
Sketch Based Anomaly Detection Scheme in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 344-348
To Split or Not to Split? From the Perspective of a Delay-Aware Data Collection Network StructureFull-text access may be available. Sign in or learn about subscription options.pp. 349-355
Traffic-Differentiated Two-Hop Routing for QoS in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 356-363
UFO: A United Framework for Target Localization in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 364-370
An Efficient Localization Algorithm Using Sparse Anchors for the Internet of ThingsFull-text access may be available. Sign in or learn about subscription options.pp. 371-378
An Efficient Transmission Scheme for OpenFlow Based Wireless NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 379-382
An Evaluation of Intellectus WSN Monitoring and Debugging Tool Using the Indriya TestbedFull-text access may be available. Sign in or learn about subscription options.pp. 383-391
Backup Path with Energy Prediction Based on Energy-Aware Spanning Tree in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 392-397
Efficiency of Command and Control in Cyberspace: Visit from the Perspective of Complexity TheoryFull-text access may be available. Sign in or learn about subscription options.pp. 398-401
Flow-Based P2P Network Traffic Classification Using Machine LearningFull-text access may be available. Sign in or learn about subscription options.pp. 402-406
MatBall: Matrix-Based File Allocation Method for Hybrid File SystemFull-text access may be available. Sign in or learn about subscription options.pp. 407-412
Message Collision and CSMA/CA Modeling and Simulation by Means of Petri NetFull-text access may be available. Sign in or learn about subscription options.pp. 413-420
Modeling and Simulation of Pathloss and Fading for Air-Ground Link of HAPs within a Network SimulatorFull-text access may be available. Sign in or learn about subscription options.pp. 421-426
Toward High-Payoff Nash Equilibria for Interference Game between Body Area NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 433-437
A Demodulation Technique for High Mobility OFDM SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 438-441
A Novel Cell Reselection Method in the Scenario of Multi-RATFull-text access may be available. Sign in or learn about subscription options.pp. 442-447
A Stochastic Cooperative MIMO Channel Model Concerning the Correlation of B-R and R-MFull-text access may be available. Sign in or learn about subscription options.pp. 448-452
An Interference-Based Distributed TDMA Scheduling Algorithm for Aeronautical Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 453-460
Context-Aware Optimization on Medium Access Delay for High-Density 802.11n Wi-Fi NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 461-464
Energy Efficient Terminal-Discovering in Mobile Delay Tolerant Ad-hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 465-470
Estimating the Loading of Logic Periodic Dipole Antenna with Impedances and InductorsFull-text access may be available. Sign in or learn about subscription options.pp. 471-474
Performance Analysis of High Speed Rail Wireless Communication NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 483-489
A Novel Rule Matching Algorithm Based on Improved Twig PatternFull-text access may be available. Sign in or learn about subscription options.pp. 495-499
Broadband Matching Network Design for Antennas Using Invasive Weed Optimization AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 500-503
Evaluation of Statistical Tests for Randomness Using Conditional EntropyFull-text access may be available. Sign in or learn about subscription options.pp. 504-509
Finite Ridgelet Transform Based Listless Block-Partitioning Image Coding AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 510-513
FPGA Acceleration for Intersection Computation in Frequent Itemset MiningFull-text access may be available. Sign in or learn about subscription options.pp. 514-519
Mapping DAG to CGRA Using Min-Max Ant Colony SystemFull-text access may be available. Sign in or learn about subscription options.pp. 520-523
Tracking the State of Primary Users Based on Purely Discontinuous Markov ProcessFull-text access may be available. Sign in or learn about subscription options.pp. 524-527
Author IndexFreely available from IEEE.pp. 528-531
Publisher's InformationFreely available from IEEE.pp. 532-532
Showing 95 out of 95