Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
CYBERC
CYBERC 2013
Generate Citations
2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)
Oct. 10 2013 to Oct. 12 2013
Beijing, China
Table of Contents
Title Page i
Freely available from IEEE.
pp. i-i
Title Page iii
Freely available from IEEE.
pp. iii-iii
Copyright Page
Freely available from IEEE.
pp. iv-iv
Table of Contents
Freely available from IEEE.
pp. v-xi
Preface
Freely available from IEEE.
pp. xii-xii
Message from the Steering Committee Chair
Freely available from IEEE.
pp. xiii-xiii
Message from the Technical Program Chairs
Freely available from IEEE.
pp. xiv-xv
Committees
Freely available from IEEE.
pp. xvi-xvii
Reviewers
Freely available from IEEE.
pp. xviii-xxv
Keynotes
Freely available from IEEE.
pp. xxvi-xxx
A Homomorphic ElGamal Variant Based on BGN's Method
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Zhiwei Chen
,
Ruoqing Zhang
,
Yatao Yang
,
Zichen Li
A Survey on Querying Encrypted Data for Database as a Service
Full-text access may be available. Sign in or learn about subscription options.
pp. 14-18
by
Rama Roshan Ravan
,
Norbik Bashah Idris
,
Zahra Mehrabani
Anonymous Multi-receiver Certificate-Based Encryption
Full-text access may be available. Sign in or learn about subscription options.
pp. 19-26
by
Chun-i Fan
,
Pei-Jen Tsai
,
Jheng-Jia Huang
,
Wen-Tsuen Chen
Intelligent Checkers to Improve Attack Detection in Cyber Physical Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 27-30
by
Giedre Sabaliauskaite
,
Aditya P. Mathur
Secure Wireless Multicast for Delay-Sensitive Prioritized Data Using Network Coding
Full-text access may be available. Sign in or learn about subscription options.
pp. 38-45
by
Tuan T. Tran
,
Xiaolong Tang
,
Bin Xie
Security Mechanism for the Interactive Satellite Remote Education System Based on DTN
Full-text access may be available. Sign in or learn about subscription options.
pp. 46-52
by
Xiang-Yu Bai
,
Yan-Jun Huang
Towards a Trusted Mobile RFID Network Framework
Full-text access may be available. Sign in or learn about subscription options.
pp. 53-58
by
Yan Sun
,
Lihua Yin
,
Licai Liu
A Scalable Implementation of Malware Detection Based on Network Connection Behaviors
Full-text access may be available. Sign in or learn about subscription options.
pp. 59-66
by
Liang Shi
,
Jialan Que
,
Zhenyu Zhong
,
Brett Meyer
,
Patrick Crenshaw
,
Yuanchen He
A Security Ontology with MDA for Software Development
Full-text access may be available. Sign in or learn about subscription options.
pp. 67-74
by
Wentao Kang
,
Ying Liang
Anomaly Detection via One Class SVM for Protection of SCADA Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 82-88
by
Jianmin Jiang
,
Lasith Yasakethu
Blocker-Type Methods for Protecting Customers' Privacy in RFID Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 89-96
by
Przemyslaw Blaskiewicz
,
Marek Klonowski
,
Krzysztof Majcher
,
Piotr Syga
Seamless Privacy: Privacy-Preserving Subgraph Counting in Interactive Social Network Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 97-104
by
Xuan Ding
,
Wei Wang
,
Meng Wan
,
Ming Gu
Applications of Data Mining to an Asynchronous Argumentation Based Learning Assistance Platform
Full-text access may be available. Sign in or learn about subscription options.
pp. 105-108
by
Chao-Yi Chen
,
Hen-Ming Chen
,
Jui-Jiun Jian
,
Chenn-Jung Huang
,
Shun-Chih Chang
,
Yu-Wu Wang
,
Jhe-Hao Tseng
Cost-Aware Automatic Virtual Machine Scaling in Fine Granularity for Cloud Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 109-116
by
He Zhao
,
Chenglei Peng
,
Yao Yu
,
Yu Zhou
,
Ziqiang Wang
,
Sidan Du
DAG Based Feature Additive XML Schema Generation for Unstructured Text
Full-text access may be available. Sign in or learn about subscription options.
pp. 117-124
by
K. Rajbabu
,
S. Sudha
Definition of Security Metrics for the Cloud Computing and Security-Aware Virtual Machine Placement Algorithms
Full-text access may be available. Sign in or learn about subscription options.
pp. 125-131
by
Eddy Caron
,
Anh Dung Le
,
Arnaud Lefray
,
Christian Toinard
Mining Frequent Rooted Ordered Tree Generators Efficiently
Full-text access may be available. Sign in or learn about subscription options.
pp. 132-139
by
Shengwei Yi
,
Jize Xu
,
Yong Peng
,
Qi Xiong
,
Ting Wang
,
Shilong Ma
A Big Data Approach for a New ICT Agriculture Application Development
Full-text access may be available. Sign in or learn about subscription options.
pp. 140-143
by
R. Dennis A. Ludena
,
Alireza Ahrary
Authorship Attribution of Short Historical Arabic Texts Based on Lexical Features
Full-text access may be available. Sign in or learn about subscription options.
pp. 144-147
by
S. Ouamour
,
H. Sayoud
Big Data a Sure Thing for Telecommunications: Telecom's Future in Big Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 148-154
by
Rob Van Den Dam
Big Data Analytics in the Public Sector: Improving the Strategic Planning in World Class Universities
Full-text access may be available. Sign in or learn about subscription options.
pp. 155-162
by
Joni A. Amorim
,
Sten F. Andler
,
Per M. Gustavsson
,
Oswaldo L. Agostinho
Blending SQL and NewSQL Approaches: Reference Architectures for Enterprise Big Data Challenges
Full-text access may be available. Sign in or learn about subscription options.
pp. 163-170
by
Kshitij A. Doshi
,
Tao Zhong
,
Zhongyan Lu
,
Xi Tang
,
Ting Lou
,
Gang Deng
The Architecture and Design of a Community-Based Cloud Platform for Curating Big Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 171-178
by
Sulayman K. Sowe
,
Koji Zettsu
Matrix-Query: A Distributed SQL-Like Query Processing Model for Large Database Clusters
Full-text access may be available. Sign in or learn about subscription options.
pp. 179-185
by
Qiao Liu
,
Ping Ji
,
Yuan Zuo
Robustness of Community Partition Similarity Metrics
Full-text access may be available. Sign in or learn about subscription options.
pp. 186-193
by
Dingyi Yin
,
Qi Ye
Towards a Moderate-Granularity Incremental Clustering Algorithm for GPU
Full-text access may be available. Sign in or learn about subscription options.
pp. 194-201
by
Chunlei Chen
,
Dejun Mu
,
Huixiang Zhang
,
Wei Hu
A Virtualized Hybrid Distributed File System
Full-text access may be available. Sign in or learn about subscription options.
pp. 202-205
by
Xingyu Zhou
,
Liangyu He
Architecture Research and Design Implementation of Multi-data and Multi-path Communication Control System
Full-text access may be available. Sign in or learn about subscription options.
pp. 206-209
by
Li Xiu-xiu
,
He Ya-xi
,
Yu You-ling
Context Aware Semantic Web Services Description and Match
Full-text access may be available. Sign in or learn about subscription options.
pp. 210-213
by
Hui Peng
Discovering Massive High-Value Users from Sina Weibo Based on Quality and Activity
Full-text access may be available. Sign in or learn about subscription options.
pp. 214-220
by
Guangzhi Zhang
,
Rongfang Bie
Predicting Service Execution Time towards a Runtime Monitoring Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 221-224
by
Xinglong Ju
,
Youxiang Duan
,
Cheng Ma
,
Haiyan Ju
Replication in Distributed Storage Systems: State of the Art, Possible Directions, and Open Issues
Full-text access may be available. Sign in or learn about subscription options.
pp. 225-232
by
Ying Liu
,
Vladimir Vlassov
A New Approach for Estimating the Infrared Radiative and Simulation
Full-text access may be available. Sign in or learn about subscription options.
pp. 233-236
by
Chengpo Mu
,
Chao Han
,
Xianlei Zhang
,
Jiyuan Wang
The Architecture of ProMe Instant Question Answering System
Full-text access may be available. Sign in or learn about subscription options.
pp. 237-242
by
Guangzhi Zhang
,
Tao Jiang
,
Rongfang Bie
,
Xiaochun Liu
,
Zhichun Wang
,
Junyang Rao
The mServices GUI Architectures Design for the mLearning System
Full-text access may be available. Sign in or learn about subscription options.
pp. 243-246
by
Zhanlin Ji
,
Yongli An
,
Ivan Ganchev
,
Mairtin O'Droma
A Business Computing System Optimization Research on the Efficiency of Database Queries
Full-text access may be available. Sign in or learn about subscription options.
pp. 247-250
by
Lin Hong
,
Mingda Lu
,
Weiting Hong
A Light-Weight Rule-Based Monitoring System for Web of Things
Full-text access may be available. Sign in or learn about subscription options.
pp. 251-254
by
Li Yangqun
Design of a RS485-to-1553B Bus Bridge
Full-text access may be available. Sign in or learn about subscription options.
pp. 255-258
by
Li Zhou
,
Junshe An
Diagnosis Rule Mining of Airborne Avionics Using Formal Concept Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 259-265
by
Wen Ying
,
Xiao Mingqing
Distributed Algorithm for Router-Based Management of Replica Server in Next-CDN Infrastructure
Full-text access may be available. Sign in or learn about subscription options.
pp. 266-272
by
Erwin Harahap
,
Janaka Wijekoon
,
Rajitha Tennekoon
,
Fumito Yamaguchi
,
Shinichi Ishida
,
Hiroaki Nishi
Electric Power Data Acquisition System Based on Multi-thread Mechanism
Full-text access may be available. Sign in or learn about subscription options.
pp. 273-276
by
Yuzhu Peng
,
Fanchao Meng
,
Dianhui Chu
Frequency-Estimation-Based Thigh Angle Prediction in Level-Ground Walking Using IMUs
Full-text access may be available. Sign in or learn about subscription options.
pp. 277-282
by
Hu Qiuyang
,
Yang Zaiyue
Management Motivation and Earnings Management Methods
Full-text access may be available. Sign in or learn about subscription options.
pp. 283-286
by
Zhonghai Yang
,
Sun Ying
,
Qianqian Zhang
Speaker Detection on Telephone Calls Using Fusion between SVMs and Statistical Measures
Full-text access may be available. Sign in or learn about subscription options.
pp. 287-293
by
S. Ouamour
,
H. Sayoud
Virtual Machine Placement Strategy Research
Full-text access may be available. Sign in or learn about subscription options.
pp. 294-297
by
Jipeng Gao
,
Gaoming Tang
WS-S Evaluation Based on User Preferences and Ranking Mechanism
Full-text access may be available. Sign in or learn about subscription options.
pp. 298-301
by
Cheng Ma
,
Youxiang Duan
,
Xinglong Ju
,
Fuchang Xu
A 2-Dimensional ACO-Based Path Planner for Off-Line Robot Path Planning
Full-text access may be available. Sign in or learn about subscription options.
pp. 302-307
by
Nuwan Ganganath
,
Chi-Tsun Cheng
A Cluster Based Smart MAC Layer Protocol for Delay-Tolerant Underwater Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 308-315
by
Zhanyang Zhang
,
Luciana H. Blanco
An Energy-Efficient Asynchronous MAC for Bulk-Data Collection in Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 316-319
by
Fulong Jiang
,
Hao Liu
Analysis of Image Transmission for Wireless Sensor Networks in the Mine Tunnel
Full-text access may be available. Sign in or learn about subscription options.
pp. 320-324
by
Jing Zhang
,
Erbao He
,
Xiaoqian Zheng
Improved PCA Based Step Direction Estimation for Dead-Reckoning Localization
Full-text access may be available. Sign in or learn about subscription options.
pp. 325-331
by
Haitao Bao
,
Wai-Choong Wong
Dynamic Collaborative Change Point Detection in Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 332-339
by
Mo Haghighi
,
Chris J. Musselle
Sketch Based Anomaly Detection Scheme in Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 344-348
by
Guorui Li
,
Ying Wang
To Split or Not to Split? From the Perspective of a Delay-Aware Data Collection Network Structure
Full-text access may be available. Sign in or learn about subscription options.
pp. 349-355
by
Chi-Tsun Cheng
,
Nuwan Ganganath
Traffic-Differentiated Two-Hop Routing for QoS in Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 356-363
by
T. Shiva Prakash
,
K. B. Raja
,
K. R. Venugopal
,
S. S. Iyengar
,
L. M. Patnaik
UFO: A United Framework for Target Localization in Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 364-370
by
Jiuyang Tang
,
Guoming Tang
,
Daquan Tang
,
Weidong Xiao
An Efficient Localization Algorithm Using Sparse Anchors for the Internet of Things
Full-text access may be available. Sign in or learn about subscription options.
pp. 371-378
by
Guanghui Wang
,
Subin Shen
An Efficient Transmission Scheme for OpenFlow Based Wireless Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 379-382
by
Ji Lu
,
Zhiyi Zhang
,
Junfang Wang
,
Ning Li
An Evaluation of Intellectus WSN Monitoring and Debugging Tool Using the Indriya Testbed
Full-text access may be available. Sign in or learn about subscription options.
pp. 383-391
by
Tiziana Campana
,
Gregory M. P. OHare
Backup Path with Energy Prediction Based on Energy-Aware Spanning Tree in Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 392-397
by
Yao Lu
,
Jianping Chen
,
Ioan Sorin Comsa
,
Pierre Kuonen
Efficiency of Command and Control in Cyberspace: Visit from the Perspective of Complexity Theory
Full-text access may be available. Sign in or learn about subscription options.
pp. 398-401
by
Gang Wang
,
Yinhui Yang
,
Qinhua Ren
,
Runnian Ma
Flow-Based P2P Network Traffic Classification Using Machine Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 402-406
by
Shashikala Tapaswi
,
Arpit S. Gupta
MatBall: Matrix-Based File Allocation Method for Hybrid File System
Full-text access may be available. Sign in or learn about subscription options.
pp. 407-412
by
Jaechun No
,
Sung-soon Park
Message Collision and CSMA/CA Modeling and Simulation by Means of Petri Net
Full-text access may be available. Sign in or learn about subscription options.
pp. 413-420
by
Jieyu Liu
,
Eckehard Schnieder
,
Zuoyu Miao
Modeling and Simulation of Pathloss and Fading for Air-Ground Link of HAPs within a Network Simulator
Full-text access may be available. Sign in or learn about subscription options.
pp. 421-426
by
Yi Zheng
,
Yuwen Wang
,
Fanji Meng
Performance Analysis of MRC Diversity for Spectrum Sharing Systems with Imperfect Channel Estimation
Full-text access may be available. Sign in or learn about subscription options.
pp. 427-432
by
Yuzhen Huang
,
Yunpeng Cheng
,
Xueqiang Zheng
,
Jinlong Wang
Toward High-Payoff Nash Equilibria for Interference Game between Body Area Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 433-437
by
Lusheng Wang
,
Qingfeng Zhou
,
Hai Lin
A Demodulation Technique for High Mobility OFDM Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 438-441
by
Xuefei Wang
,
Shan Gao
,
Qinghua Zhong
,
Han Zhang
A Novel Cell Reselection Method in the Scenario of Multi-RAT
Full-text access may be available. Sign in or learn about subscription options.
pp. 442-447
by
Rong Wang
,
Tao Zhang
,
Xinlong Luo
,
Dengkun Xiao
,
Fauzi Fanny
A Stochastic Cooperative MIMO Channel Model Concerning the Correlation of B-R and R-M
Full-text access may be available. Sign in or learn about subscription options.
pp. 448-452
by
Liu Chang-Xing
,
Gao Jin-Chun
,
Liu Yuan-An
,
Xie Gang
,
Hu Quan
An Interference-Based Distributed TDMA Scheduling Algorithm for Aeronautical Ad Hoc Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 453-460
by
Jie Li
,
Erling Gong
,
Zhiqiang Sun
,
Long Li
,
Hongwei Xie
Context-Aware Optimization on Medium Access Delay for High-Density 802.11n Wi-Fi Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 461-464
by
Guolin Sun
,
Guisong Liu
,
Yao Li
,
Chuan Xiao
Energy Efficient Terminal-Discovering in Mobile Delay Tolerant Ad-hoc Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 465-470
by
Wei Feng
,
Shihang Li
Estimating the Loading of Logic Periodic Dipole Antenna with Impedances and Inductors
Full-text access may be available. Sign in or learn about subscription options.
pp. 471-474
by
Xu Xie
,
Yufeng Dai
,
Huaning Wu
,
Liang Zhou
Performance Analysis of High Speed Rail Wireless Communication Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 483-489
by
Zuoyu Miao
,
Tao Tang
,
Jieyu Liu
RF Measurements of the RFX 900 and RFX 2400 Daughter Boards with the USRP N210 Driven by the GNU Radio Software
Full-text access may be available. Sign in or learn about subscription options.
pp. 490-494
by
Rafik Zitouni
,
Stefan Ataman
,
Laurent George
A Novel Rule Matching Algorithm Based on Improved Twig Pattern
Full-text access may be available. Sign in or learn about subscription options.
pp. 495-499
by
Yongwei Wang
,
Yunan Liu
,
Rongcai Zhao
,
Cheng Si
,
Shuai Liu
Broadband Matching Network Design for Antennas Using Invasive Weed Optimization Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 500-503
by
Huaning Wu
,
Chao Liu
Evaluation of Statistical Tests for Randomness Using Conditional Entropy
Full-text access may be available. Sign in or learn about subscription options.
pp. 504-509
by
Chengbing Liu
,
Xuejia Lai
Finite Ridgelet Transform Based Listless Block-Partitioning Image Coding Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 510-513
by
Zhenghua Shu
,
Guodong Liu
,
Zhihua Xie
,
Zhong Ren
,
Lixin Gan
FPGA Acceleration for Intersection Computation in Frequent Itemset Mining
Full-text access may be available. Sign in or learn about subscription options.
pp. 514-519
by
Shaobo Shi
,
Yue Qi
,
Qin Wang
Mapping DAG to CGRA Using Min-Max Ant Colony System
Full-text access may be available. Sign in or learn about subscription options.
pp. 520-523
by
Li Zhou
,
Hengzhu Liu
Tracking the State of Primary Users Based on Purely Discontinuous Markov Process
Full-text access may be available. Sign in or learn about subscription options.
pp. 524-527
by
Bin Guo
,
Xinzhi Yue
,
Xiaoyuan Yan
Author Index
Freely available from IEEE.
pp. 528-531
Publisher's Information
Freely available from IEEE.
pp. 532-532
Showing 95 out of 95