Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
CYBERC
CYBERC 2014
Generate Citations
2014 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)
Oct. 13 2014 to Oct. 15 2014
Shanghai, China
Table of Contents
Title Page i
Freely available from IEEE.
pp. i-i
Title Page iii
Freely available from IEEE.
pp. iii-iii
Copyright Page
Freely available from IEEE.
pp. iv-iv
Table of Contents
Freely available from IEEE.
pp. v-xi
Foreword
Freely available from IEEE.
pp. xii-xii
Message from the Steering Committee Chair
Freely available from IEEE.
pp. xiii-xiii
Message from the Technical Program Chairs
Freely available from IEEE.
pp. xiv-xiv
Committees
Freely available from IEEE.
pp. xv-xvi
Reviewers
Freely available from IEEE.
pp. xvii-xix
Keynotes
Freely available from IEEE.
pp. xx-xxiv
A SDKEY-Based Secure Storage and Transmission Approach for Android Phone
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Ma Licui
,
Li Meihong
,
Li Lun
,
Du Ye
,
Zhang Dawei
Random Characteristics for LSR, RC4, and Logistic Stream Cipher
Full-text access may be available. Sign in or learn about subscription options.
pp. 7-9
by
Huijuan Xiao
,
Chengliang Deng
A Robust Collaborative Threshold Authenticated Encryption Scheme Based on Message Blocking
Full-text access may be available. Sign in or learn about subscription options.
pp. 10-13
by
Zhen Chen
,
Wenfang Zhang
,
Xiaomin Wang
An Efficient Trusted Mobile Router Selection Mechanism for Multihomed NEMO Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 14-18
by
Shuaishuai Tan
,
Xiaoping Li
,
Qingkuan Dong
A Multilayer Evolutionary Homomorphic Encryption Approach for Privacy Preserving over Big Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 19-26
by
Amine Rahmani
,
Abdelmalek Amine
,
Reda Hamou Mohamed
A Robust Collaborative Threshold Authenticated Encryption Scheme Based on Message Blocking
Full-text access may be available. Sign in or learn about subscription options.
pp. 27-30
by
Zhen Chen
,
Wenfang Zhang
,
Xiaomin Wang
Automated Intrusion Response System Algorithm with Danger Theory
Full-text access may be available. Sign in or learn about subscription options.
pp. 31-34
by
Ling-Xi Peng
,
Tian-Wei Chen
Exponential Optimal Synchronization of Chaotic Cryptosystems: Neural-Network-Based Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 35-42
by
Feng-Hsiag Hsiao
,
Kai-Ping Hsieh
,
Zhe-Hao Lin
A Heuristic Method of Attack Graph Analysis for Network Security Hardening
Full-text access may be available. Sign in or learn about subscription options.
pp. 43-47
by
Zhao Chao
,
Wang Huiqiang
,
Guo Fangfang
,
Zhou Mo
,
Zhang Yushu
Shell-Based Block Ciphering Structure (SBCS) for AES Parallelism with Feedback-Data Mode
Full-text access may be available. Sign in or learn about subscription options.
pp. 48-55
by
Yi-Nan Lin
,
Kuo-Tsang Huang
Positive Selection-Inspired Anomaly Detection Model with Artificial Immune
Full-text access may be available. Sign in or learn about subscription options.
pp. 56-59
by
Ling-Xi Peng
,
Yue-Feng Chen
DBSCAN Clustering Algorithm Applied to Identify Suspicious Financial Transactions
Full-text access may be available. Sign in or learn about subscription options.
pp. 60-65
by
Yan Yang
,
Bin Lian
,
Lian Li
,
Chen Chen
,
Pu Li
Generating Repudiable, Memorizable, and Privacy Preserving Security Questions Using the Propp Theory of Narrative
Full-text access may be available. Sign in or learn about subscription options.
pp. 66-72
by
Lei Pan
,
Shaun Bangay
A Provable Secure Mutual RFID Authentication Protocol Based on Error-Correct Code
Full-text access may be available. Sign in or learn about subscription options.
pp. 73-78
by
Zehui Li
,
Ruoqing Zhang
,
Yatao Yang
,
Zichen Li
Optimized MHealth Batch Verification for a Variant of DSA
Full-text access may be available. Sign in or learn about subscription options.
pp. 79-86
by
Angolo Shem Mbandu
,
Chunxiang Xu
,
Kamenyi Domenic Mutiria
An Identity Authentication Scheme for Opportunistic Network Based on Multidimensional Scaling
Full-text access may be available. Sign in or learn about subscription options.
pp. 87-93
by
Xiaomei Cao
,
Ying Yin
Dummy Based Privacy Preservation in Continuous Querying Road Network Services
Full-text access may be available. Sign in or learn about subscription options.
pp. 94-101
by
Yankson Herbert Gustav
,
Xiao Wu
,
Yan Ren
,
Yong Wang
,
Fengli Zhang
EAC: A Framework of Authentication Property for the IOTs
Full-text access may be available. Sign in or learn about subscription options.
pp. 102-105
by
Licai Liu
,
Lihua Yin
,
Yunchuan Guo
,
Bingxing Fang
A Privacy Preserving Group Recommender Based on Cooperative Perturbation
Full-text access may be available. Sign in or learn about subscription options.
pp. 106-111
by
Zhifeng Luo
,
Zhanli Chen
A New Architecture of Ajax Web Application Security Crawler with Finite-State Machine
Full-text access may be available. Sign in or learn about subscription options.
pp. 112-117
by
An Huiyao
,
Song Yang
,
Yu Tao
,
Li Hui
,
Zhang Peng
,
Zha Jun
Attacking Random Keypads through Click Timing Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 118-121
by
Charles Fleming
,
Ning Cui
,
Dawei Liu
,
Haining Liang
Performance Measurement of Decision Tree Excluding Insignificant Leaf Nodes
Full-text access may be available. Sign in or learn about subscription options.
pp. 122-127
by
Hae Sook Jeon
,
Won Don Lee
A Data Processing Algorithm in EPC Internet of Things
Full-text access may be available. Sign in or learn about subscription options.
pp. 128-131
by
Huiqun Zhao
,
Chuancong Huang
A Collaborative Traceback against P2P Botnet Using Information Sharing and Correlation Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 132-138
by
Xiaolei Wang
,
Jie He
,
Yuexiang Yang
The Security for Power Internet of Things: Framework, Policies, and Countermeasures
Full-text access may be available. Sign in or learn about subscription options.
pp. 139-142
by
Yiying Zhang
,
Weifu Zou
,
Xi Chen
,
Chengyue Yang
,
Jinping Cao
Optimization of Communication in MPI-Based Clusters
Full-text access may be available. Sign in or learn about subscription options.
pp. 143-149
by
Rashid Hassani
,
Ganesh Chavan
,
Peter Luksch
Ownership Management in the Context of the Internet of Things
Full-text access may be available. Sign in or learn about subscription options.
pp. 150-153
by
Xuefei Leng
,
Keith Mayes
,
Yuanhung Lien
The Key Algorithms of Promoter Data Parallel Processing Based on OpenMP
Full-text access may be available. Sign in or learn about subscription options.
pp. 154-157
by
Yan Shi
,
Jun Lu
,
Xinyi Shi
,
Jinliang Zheng
,
Jun Li
Data Clustering with Cluster Size Constraints Using a Modified K-Means Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 158-161
by
Nuwan Ganganath
,
Chi-Tsun Cheng
,
Chi K. Tse
Big Data Processing with Probabilistic Latent Semantic Analysis on MapReduce
Full-text access may be available. Sign in or learn about subscription options.
pp. 162-166
by
Yong Zhao
,
Yao Chen
,
Zhao Liang
,
Shuangshuang Yuan
,
Youfu Li
Partitioner: A Distributed HDFS Metadata Server Cluster
Full-text access may be available. Sign in or learn about subscription options.
pp. 167-174
by
Ruini Xue
,
Lixiang Ao
,
Shengli Gao
,
Zhongyang Guan
,
Lupeng Lian
Transplantation of Data Mining Algorithms to Cloud Computing Platform When Dealing Big Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 175-178
by
Yong Wang
,
Ya-Wei Zhao
Application of Data Mining Techniques in Universal Design
Full-text access may be available. Sign in or learn about subscription options.
pp. 179-182
by
Fangyan Zhang
,
Hao Liang
Characterizing Patterns of Chinese Yiban Blogging Service
Full-text access may be available. Sign in or learn about subscription options.
pp. 183-186
by
Jian Wang
,
Xiaolin Xu
,
Xiumei Wu
,
Xiaoming Hu
,
Yinchun Yang
Class Imbalance Oriented Logistic Regression
Full-text access may be available. Sign in or learn about subscription options.
pp. 187-192
by
Yadong Dong
,
Huaping Guo
,
Weimei Zhi
,
Ming Fan
Latent Semantic Analysis for Mining Rules in Big Data Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 193-200
by
Kyung Tae Kim
,
Woo Sik Seol
,
Ung Mo Kim
,
Hee Yong Youn
Notice of Violation of IEEE Publication Principles: Hadoop Preemptive Deadline Constraint Scheduler
Full-text access may be available. Sign in or learn about subscription options.
pp. 201-208
by
Ihsan Ullah
,
Jihyeon Choi
,
Yonjoong Ryou
,
Man Yun Kim
,
Hee Yong Youn
Refining LDA Results and Ranking Topics in Order of Quantity and Quality with an Application to Twitter Streaming Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 209-216
by
Iwao Fujino
A Data Delivery Scheme Based on Sink Centrality for Delay Tolerant Mobile Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 217-222
by
Puning Zhang
,
Yuan-An Liu
,
Fan Wu
,
Bihua Tang
,
Hongguang Zhang
,
Wenhao Fan
Top-N Frequent Itemsets Mining Algorithm Based on Greedy Method
Full-text access may be available. Sign in or learn about subscription options.
pp. 223-228
by
Ming Hu
,
Huan Cui
,
Hong-mei Wang
,
Xin-jing Zhang
The Overtime Waiting Model for Web Server Performance Evaluation
Full-text access may be available. Sign in or learn about subscription options.
pp. 229-232
by
Lijun Zhang
,
Qiuyu Zhu
ParaSAIL: Bitmap Indexing Using Many Cores
Full-text access may be available. Sign in or learn about subscription options.
pp. 233-240
by
Tao Zhong
,
Kshitij A. Doshi
,
Gang Deng
A Distributed Redis Framework for Use in the UCWW
Full-text access may be available. Sign in or learn about subscription options.
pp. 241-244
by
Zhanlin Ji
,
Ivan Ganchev
,
Mairtin O'Droma
,
Tiefan Ding
A Smart Phone Healthcare Monitoring System for Oxygen Saturation and Heart Rate
Full-text access may be available. Sign in or learn about subscription options.
pp. 245-247
by
Dongjian Fang
,
Jicheng Hu
,
Xiaofeng Wei
,
Heng Shao
,
Yongen Luo
SPDML: Graphical Modeling Language for Executable Architecture of Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 248-255
by
Jianpeng Hu
,
Linpeng Huang
,
Bei Cao
,
Xuling Chang
Semantic-Based Publish/Subscribe for M2M
Full-text access may be available. Sign in or learn about subscription options.
pp. 256-263
by
Mario Antunes
,
Diogo Gomes
,
Rui Aguiar
Pairing-Based Anonymous Boardroom Voting Scheme
Full-text access may be available. Sign in or learn about subscription options.
pp. 264-268
by
Long-Hai Li
,
Cheng-Qiang Huang
,
Shao-Feng Fu
Forward Analysis of Timed Automata with Action Durations: Theory and Implementation
Full-text access may be available. Sign in or learn about subscription options.
pp. 269-276
by
Souad Guellati
,
Ilham Kitouni
,
Riadh Matmat
,
Djamel Eddine Saidouni
Configuration and Optimization for Virtualization Based Large-Scale IP Networks Emulation
Full-text access may be available. Sign in or learn about subscription options.
pp. 277-281
by
Li Dawei
Motif Recognition Parallel Algorithm Based on GPU
Full-text access may be available. Sign in or learn about subscription options.
pp. 282-285
by
Jinliang Zheng
,
Jun Lu
,
Xinyi Shi
,
Yan Shi
,
Ruiqing Jing
Effect of Embedding Way on Printed Watermarking Image by Lithography
Full-text access may be available. Sign in or learn about subscription options.
pp. 286-289
by
Xie Yong
,
Yuan Yi
,
Tan Haihu
,
Wang Juanjuan
A Study on the Use Contexts of Personal Computing Devices Using a Diary Study Method
Full-text access may be available. Sign in or learn about subscription options.
pp. 290-296
by
Jimin Kim
,
Younghoon Chang
,
Siew Fan Wong
,
Myeong-Cheol Park
An Extension to Hub Algorithm Based on Triangular Loop
Full-text access may be available. Sign in or learn about subscription options.
pp. 297-303
by
Xiongtao Ma
,
Chongming Bao
,
Lei Li
,
Lihua Zhou
,
Bing Kong
Road Danger Estimation for Winter Road Management
Full-text access may be available. Sign in or learn about subscription options.
pp. 304-311
by
Pavel Moiseets
,
Yuzuru Tanaka
An Empirical Study on Consumer Acceptance of Mobile Payment Based on the Perceived Risk and Trust
Full-text access may be available. Sign in or learn about subscription options.
pp. 312-317
by
Shao Mingxing
,
Fan Jing
,
Li Yafang
A Push-Notification Service for Use in the UCWW
Full-text access may be available. Sign in or learn about subscription options.
pp. 318-322
by
Zhanlin Ji
,
Ivan Ganchev
,
Mairtin O'Droma
,
Qingjuan Zhao
A Sleep Scheduling Algorithm for Target Tracking in Energy Harvesting Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 323-330
by
Qian Zeng
,
Hongbin Chen
,
Feng Zhao
,
Xiaohuan Li
A New Multipath Grid-Based Geographic Routing Protocol for Underwater Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 331-336
by
Faiza Al-Salti
,
N. Alzeidi
,
Bassel Arafeh
Energy Efficient Virtual MIMO for Cognitive Radio Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 337-342
by
Kancheng Lin
,
Hongjiang Si
,
Lin Kang
,
Xiuhua Li
,
Yinghai Zhang
Decision Fusion Using Three-Level Censoring Scheme in Sensor Networks under Rician Fading Channels
Full-text access may be available. Sign in or learn about subscription options.
pp. 343-348
by
Shoujun Liu
,
Kezhong Liu
,
Wei Chen
Advancement of a Sensor Aided Smart Grid Node Architecture
Full-text access may be available. Sign in or learn about subscription options.
pp. 349-356
by
Markus Duchon
,
Pragya Kirti Gupta
,
Dagmar Koss
,
Denis Bytschkow
,
Berhard Schatz
,
Sebastian Wilzbach
Simulation-Based Coverage Optimization for the Nearest Closer Protocol in Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 357-360
by
Ning Cao
,
Russell Higgs
,
Gregory M. P. O'Hare
Fan-Shaped Clustering for Large-Scale Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 361-364
by
Hai Lin
,
Ping Chen
,
Lusheng Wang
The Application of the Sensor Model Language in Sensor Observation Service of the HeiHe Experimental Research
Full-text access may be available. Sign in or learn about subscription options.
pp. 365-371
by
Dongze Song
,
Wanming Luo
,
Ting Liu
,
Baoping Yan
Spatio-temporal Event Detection: A Hierarchy Based Approach for Wireless Sensor Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 372-379
by
Xianfeng Pei
,
Xianda Chen
,
Kyung Tae Kim
,
Seung Wan Kim
,
Hee Yong Youn
A CPW-Fed Triple-Band Planar Monopole Antenna for Internet of Things Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 380-383
by
Yang Yang
,
Yuanan Liu
A k-Means-Based Formation Algorithm for the Delay-Aware Data Collection Network Structure
Full-text access may be available. Sign in or learn about subscription options.
pp. 384-388
by
Pat-Yam Tsoi
,
Chi-Tsun Cheng
,
Nuwan Ganganath
Analysis of CSMA/CA in Narrowband Power Line Communication System
Full-text access may be available. Sign in or learn about subscription options.
pp. 389-394
by
Wenjing Liu
,
Yanxin Yan
A Performance Study of Zig Bee Broadcasts in Coexistence with Wi-Fi
Full-text access may be available. Sign in or learn about subscription options.
pp. 395-399
by
Zhizhong Zhang
,
Peiliang Dong
,
Jun Yao
,
Koen Holtman
A High Efficient Common IPC for LTE Layer1 Multi-core DSP/SoC System
Full-text access may be available. Sign in or learn about subscription options.
pp. 400-405
by
Hao Xiang
,
Xiaogen Jiang
,
Qunfeng Shang
Efficient and Prompt Handover in LTE-Based Systems by Predicting the Target eNodeBs
Full-text access may be available. Sign in or learn about subscription options.
pp. 406-413
by
Xianda Chen
,
Min Jae Kim
,
Sang Hyun Yoo
,
Na Young Park
,
Hee Yong Youn
An Analysis of Different TCP Variants in Cognitive Radio Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 414-419
by
Ram Narayan Yadav
,
Rajiv Misra
The Research of Pattern Synthesis of Linear Antenna Array Based on Seeker Optimization Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 420-424
by
Bing Wang
,
Chao Liu
,
Huaning Wu
Low Power VCO and Mixer for Computing Miracast and Mobile Bluetooth Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 425-428
by
Wen-Cheng Lai
,
Jhin-Fang Huang
,
Change-Ming Hsu
,
Pi-Gi Yang
Machine Learning to Data Fusion Approach for Cooperative Spectrum Sensing
Full-text access may be available. Sign in or learn about subscription options.
pp. 429-434
by
Ahmed Mohammed Mikaeil
,
Bin Guo
,
Zhijun Wang
An Approach for Optimal Two-Dimensional Independent Antenna Electrical Adjustment
Full-text access may be available. Sign in or learn about subscription options.
pp. 435-440
by
Du Jianfeng
,
Li Zhiwei
Spectrum Allocation in Cognitive Radio -- Quantum Immune Clonal Based Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 441-447
by
Jie Li
,
Yuxi Liu
,
Qiyue Li
,
Lusheng Wang
A Configuration Compression Approach for Coarse-Grain Reconfigurable Architecture for Radar Signal Processing
Full-text access may be available. Sign in or learn about subscription options.
pp. 448-453
by
Bo Liu
,
Wan-Yu Zhu
,
Yang Liu
,
Peng Cao
Channel Availability Analysis for Sensing Order Selection in CRNs with Correlated Channels
Full-text access may be available. Sign in or learn about subscription options.
pp. 454-457
by
Ningning Jiang
,
Junbo Hua
FPGA Design and Implementation of MIMO Decoder for 1 Gbps Wireless LAN
Full-text access may be available. Sign in or learn about subscription options.
pp. 458-463
by
Ruyue Dong
,
Guixia Kang
,
Xiaoshuang Liu
,
Yuncheng Liu
Energy Efficient Spectrum Access for Cognitive Radio Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 464-469
by
Kancheng Lin
,
Hongjiang Si
,
Lin Kang
,
Xiuhua Li
,
Yinghai Zhang
Resource Reallocation of Virtual Machine in Cloud Computing with MCDM Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 470-477
by
Byungjun Lee
,
Kyung Hwan Oh
,
Hee Jung Park
,
Ung Mo Kim
,
Hee Yong Youn
Joint Cooperative MAC and Network Coding for Two-way Relaying Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 478-482
by
Yubo Li
,
Yang Xie
,
Min Peng
,
Qing F. Zhou
,
Shengli Zhang
Author Index
Freely available from IEEE.
pp. 483-486
Publisher's Information
Freely available from IEEE.
pp. 488-488
Showing 95 out of 95