Default Cover Image

2014 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)

Oct. 13 2014 to Oct. 15 2014

Shanghai, China

Table of Contents

Title Page iFreely available from IEEE.pp. i-i
Title Page iiiFreely available from IEEE.pp. iii-iii
Copyright PageFreely available from IEEE.pp. iv-iv
Table of ContentsFreely available from IEEE.pp. v-xi
ForewordFreely available from IEEE.pp. xii-xii
Message from the Steering Committee ChairFreely available from IEEE.pp. xiii-xiii
Message from the Technical Program ChairsFreely available from IEEE.pp. xiv-xiv
CommitteesFreely available from IEEE.pp. xv-xvi
ReviewersFreely available from IEEE.pp. xvii-xix
KeynotesFreely available from IEEE.pp. xx-xxiv
A SDKEY-Based Secure Storage and Transmission Approach for Android PhoneFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Random Characteristics for LSR, RC4, and Logistic Stream CipherFull-text access may be available. Sign in or learn about subscription options.pp. 7-9
A Robust Collaborative Threshold Authenticated Encryption Scheme Based on Message BlockingFull-text access may be available. Sign in or learn about subscription options.pp. 10-13
An Efficient Trusted Mobile Router Selection Mechanism for Multihomed NEMO NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 14-18
A Multilayer Evolutionary Homomorphic Encryption Approach for Privacy Preserving over Big DataFull-text access may be available. Sign in or learn about subscription options.pp. 19-26
A Robust Collaborative Threshold Authenticated Encryption Scheme Based on Message BlockingFull-text access may be available. Sign in or learn about subscription options.pp. 27-30
Automated Intrusion Response System Algorithm with Danger TheoryFull-text access may be available. Sign in or learn about subscription options.pp. 31-34
Exponential Optimal Synchronization of Chaotic Cryptosystems: Neural-Network-Based ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 35-42
A Heuristic Method of Attack Graph Analysis for Network Security HardeningFull-text access may be available. Sign in or learn about subscription options.pp. 43-47
Shell-Based Block Ciphering Structure (SBCS) for AES Parallelism with Feedback-Data ModeFull-text access may be available. Sign in or learn about subscription options.pp. 48-55
Positive Selection-Inspired Anomaly Detection Model with Artificial ImmuneFull-text access may be available. Sign in or learn about subscription options.pp. 56-59
DBSCAN Clustering Algorithm Applied to Identify Suspicious Financial TransactionsFull-text access may be available. Sign in or learn about subscription options.pp. 60-65
Generating Repudiable, Memorizable, and Privacy Preserving Security Questions Using the Propp Theory of NarrativeFull-text access may be available. Sign in or learn about subscription options.pp. 66-72
A Provable Secure Mutual RFID Authentication Protocol Based on Error-Correct CodeFull-text access may be available. Sign in or learn about subscription options.pp. 73-78
Optimized MHealth Batch Verification for a Variant of DSAFull-text access may be available. Sign in or learn about subscription options.pp. 79-86
An Identity Authentication Scheme for Opportunistic Network Based on Multidimensional ScalingFull-text access may be available. Sign in or learn about subscription options.pp. 87-93
Dummy Based Privacy Preservation in Continuous Querying Road Network ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 94-101
EAC: A Framework of Authentication Property for the IOTsFull-text access may be available. Sign in or learn about subscription options.pp. 102-105
A Privacy Preserving Group Recommender Based on Cooperative PerturbationFull-text access may be available. Sign in or learn about subscription options.pp. 106-111
A New Architecture of Ajax Web Application Security Crawler with Finite-State MachineFull-text access may be available. Sign in or learn about subscription options.pp. 112-117
Attacking Random Keypads through Click Timing AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 118-121
Performance Measurement of Decision Tree Excluding Insignificant Leaf NodesFull-text access may be available. Sign in or learn about subscription options.pp. 122-127
A Data Processing Algorithm in EPC Internet of ThingsFull-text access may be available. Sign in or learn about subscription options.pp. 128-131
A Collaborative Traceback against P2P Botnet Using Information Sharing and Correlation AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 132-138
The Security for Power Internet of Things: Framework, Policies, and CountermeasuresFull-text access may be available. Sign in or learn about subscription options.pp. 139-142
Optimization of Communication in MPI-Based ClustersFull-text access may be available. Sign in or learn about subscription options.pp. 143-149
Ownership Management in the Context of the Internet of ThingsFull-text access may be available. Sign in or learn about subscription options.pp. 150-153
The Key Algorithms of Promoter Data Parallel Processing Based on OpenMPFull-text access may be available. Sign in or learn about subscription options.pp. 154-157
Data Clustering with Cluster Size Constraints Using a Modified K-Means AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 158-161
Big Data Processing with Probabilistic Latent Semantic Analysis on MapReduceFull-text access may be available. Sign in or learn about subscription options.pp. 162-166
Partitioner: A Distributed HDFS Metadata Server ClusterFull-text access may be available. Sign in or learn about subscription options.pp. 167-174
Transplantation of Data Mining Algorithms to Cloud Computing Platform When Dealing Big DataFull-text access may be available. Sign in or learn about subscription options.pp. 175-178
Application of Data Mining Techniques in Universal DesignFull-text access may be available. Sign in or learn about subscription options.pp. 179-182
Characterizing Patterns of Chinese Yiban Blogging ServiceFull-text access may be available. Sign in or learn about subscription options.pp. 183-186
Class Imbalance Oriented Logistic RegressionFull-text access may be available. Sign in or learn about subscription options.pp. 187-192
Latent Semantic Analysis for Mining Rules in Big Data EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 193-200
Refining LDA Results and Ranking Topics in Order of Quantity and Quality with an Application to Twitter Streaming DataFull-text access may be available. Sign in or learn about subscription options.pp. 209-216
A Data Delivery Scheme Based on Sink Centrality for Delay Tolerant Mobile Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 217-222
Top-N Frequent Itemsets Mining Algorithm Based on Greedy MethodFull-text access may be available. Sign in or learn about subscription options.pp. 223-228
The Overtime Waiting Model for Web Server Performance EvaluationFull-text access may be available. Sign in or learn about subscription options.pp. 229-232
ParaSAIL: Bitmap Indexing Using Many CoresFull-text access may be available. Sign in or learn about subscription options.pp. 233-240
A Distributed Redis Framework for Use in the UCWWFull-text access may be available. Sign in or learn about subscription options.pp. 241-244
A Smart Phone Healthcare Monitoring System for Oxygen Saturation and Heart RateFull-text access may be available. Sign in or learn about subscription options.pp. 245-247
SPDML: Graphical Modeling Language for Executable Architecture of SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 248-255
Semantic-Based Publish/Subscribe for M2MFull-text access may be available. Sign in or learn about subscription options.pp. 256-263
Pairing-Based Anonymous Boardroom Voting SchemeFull-text access may be available. Sign in or learn about subscription options.pp. 264-268
Forward Analysis of Timed Automata with Action Durations: Theory and ImplementationFull-text access may be available. Sign in or learn about subscription options.pp. 269-276
Configuration and Optimization for Virtualization Based Large-Scale IP Networks EmulationFull-text access may be available. Sign in or learn about subscription options.pp. 277-281
Motif Recognition Parallel Algorithm Based on GPUFull-text access may be available. Sign in or learn about subscription options.pp. 282-285
Effect of Embedding Way on Printed Watermarking Image by LithographyFull-text access may be available. Sign in or learn about subscription options.pp. 286-289
A Study on the Use Contexts of Personal Computing Devices Using a Diary Study MethodFull-text access may be available. Sign in or learn about subscription options.pp. 290-296
An Extension to Hub Algorithm Based on Triangular LoopFull-text access may be available. Sign in or learn about subscription options.pp. 297-303
Road Danger Estimation for Winter Road ManagementFull-text access may be available. Sign in or learn about subscription options.pp. 304-311
An Empirical Study on Consumer Acceptance of Mobile Payment Based on the Perceived Risk and TrustFull-text access may be available. Sign in or learn about subscription options.pp. 312-317
A Push-Notification Service for Use in the UCWWFull-text access may be available. Sign in or learn about subscription options.pp. 318-322
A Sleep Scheduling Algorithm for Target Tracking in Energy Harvesting Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 323-330
A New Multipath Grid-Based Geographic Routing Protocol for Underwater Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 331-336
Energy Efficient Virtual MIMO for Cognitive Radio Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 337-342
Decision Fusion Using Three-Level Censoring Scheme in Sensor Networks under Rician Fading ChannelsFull-text access may be available. Sign in or learn about subscription options.pp. 343-348
Advancement of a Sensor Aided Smart Grid Node ArchitectureFull-text access may be available. Sign in or learn about subscription options.pp. 349-356
Simulation-Based Coverage Optimization for the Nearest Closer Protocol in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 357-360
Fan-Shaped Clustering for Large-Scale Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 361-364
Spatio-temporal Event Detection: A Hierarchy Based Approach for Wireless Sensor NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 372-379
A CPW-Fed Triple-Band Planar Monopole Antenna for Internet of Things ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 380-383
A k-Means-Based Formation Algorithm for the Delay-Aware Data Collection Network StructureFull-text access may be available. Sign in or learn about subscription options.pp. 384-388
Analysis of CSMA/CA in Narrowband Power Line Communication SystemFull-text access may be available. Sign in or learn about subscription options.pp. 389-394
A Performance Study of Zig Bee Broadcasts in Coexistence with Wi-FiFull-text access may be available. Sign in or learn about subscription options.pp. 395-399
A High Efficient Common IPC for LTE Layer1 Multi-core DSP/SoC SystemFull-text access may be available. Sign in or learn about subscription options.pp. 400-405
Efficient and Prompt Handover in LTE-Based Systems by Predicting the Target eNodeBsFull-text access may be available. Sign in or learn about subscription options.pp. 406-413
An Analysis of Different TCP Variants in Cognitive Radio NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 414-419
The Research of Pattern Synthesis of Linear Antenna Array Based on Seeker Optimization AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 420-424
Low Power VCO and Mixer for Computing Miracast and Mobile Bluetooth ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 425-428
Machine Learning to Data Fusion Approach for Cooperative Spectrum SensingFull-text access may be available. Sign in or learn about subscription options.pp. 429-434
An Approach for Optimal Two-Dimensional Independent Antenna Electrical AdjustmentFull-text access may be available. Sign in or learn about subscription options.pp. 435-440
Spectrum Allocation in Cognitive Radio -- Quantum Immune Clonal Based ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 441-447
A Configuration Compression Approach for Coarse-Grain Reconfigurable Architecture for Radar Signal ProcessingFull-text access may be available. Sign in or learn about subscription options.pp. 448-453
Channel Availability Analysis for Sensing Order Selection in CRNs with Correlated ChannelsFull-text access may be available. Sign in or learn about subscription options.pp. 454-457
FPGA Design and Implementation of MIMO Decoder for 1 Gbps Wireless LANFull-text access may be available. Sign in or learn about subscription options.pp. 458-463
Energy Efficient Spectrum Access for Cognitive Radio Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 464-469
Resource Reallocation of Virtual Machine in Cloud Computing with MCDM AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 470-477
Joint Cooperative MAC and Network Coding for Two-way Relaying NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 478-482
Author IndexFreely available from IEEE.pp. 483-486
Publisher's InformationFreely available from IEEE.pp. 488-488
Showing 95 out of 95