Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
DSDIS
DSDIS 2015
Generate Citations
2015 IEEE International Conference on Data Science and Data Intensive Systems (DSDIS)
Dec. 11 2015 to Dec. 13 2015
Sydney, Australia
Table of Contents
[Title page i]
Freely available from IEEE.
pp. i-i
[Title page iii]
Freely available from IEEE.
pp. iii-iii
[Copyright notice]
Freely available from IEEE.
pp. iv-iv
Table of contents
Freely available from IEEE.
pp. v-xiii
Message from the DSDIS2015 Chairs
Freely available from IEEE.
pp. xiv-xv
DSDIS2015 Organizing and Program Committees
Freely available from IEEE.
pp. xvi-xviii
Message from the CPSCom2015 Chairs
Freely available from IEEE.
pp. xix-xix
CPSCom2015 Organizing and Program Committees
Freely available from IEEE.
pp. xx-xxii
Message from the GreenCom2015 Chairs
Freely available from IEEE.
pp. xxiii-xxiii
GreenCom2015 Organizing and Program Committees
Freely available from IEEE.
pp. xxiv-xxvii
Message from the iThings2015 Chairs
Freely available from IEEE.
pp. xxviii-xxviii
iThings2015 Organizing and Program Committees
Freely available from IEEE.
pp. xxix-xxxii
I Shopping: Intelligent Shopping and Predicate Analysis System Using Data Mining
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Nethmi Deshani Hettiarachchi
,
Sobhani Umanga Pilapitiya
,
Nirmal Sankalpa Jayasinghe
,
Himash Deemantha
,
Sudheera Vitharana
Identification and Validation of Real-Time Health Events through Social Media
Freely available from IEEE.
pp. 9-16
by
Juan Zaldumbide
,
Richard O. Sinnott
Accident Black Spot Identification and Verification through Social Media
Full-text access may be available. Sign in or learn about subscription options.
pp. 17-24
by
Richard O. Sinnott
,
Shuangchao Yin
Active Storage Mechanism for Cluster-Wide RAID System
Full-text access may be available. Sign in or learn about subscription options.
pp. 25-32
by
Hiroki Ohtsuji
,
Osamu Tatebe
Secure Defensive Mechanisms: An Appropriate Categorisation
Full-text access may be available. Sign in or learn about subscription options.
pp. 33-37
by
Suliman A. Alsuhibany
,
Waleed Albattah
Spatio-Temporal Gridded Data Processing on the Semantic Web
Full-text access may be available. Sign in or learn about subscription options.
pp. 38-45
by
Andrej Andrejev
,
Dimitar Misev
,
Peter Baumann
,
Tore Risch
A Prediction Based Capacity Planning Strategy for Virtual Servers
Full-text access may be available. Sign in or learn about subscription options.
pp. 46-52
by
Lang Wang
,
Jian Cao
,
Yanru Qu
SMASH: A Cloud-Based Architecture for Big Data Processing and Visualization of Traffic Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 53-60
by
Richard O. Sinnott
,
Luca Morandini
,
Siqi Wu
Discovering Aspectual Classes of Russian Verbs in Untagged Large Corpora
Full-text access may be available. Sign in or learn about subscription options.
pp. 61-68
by
Aleksandr Drozd
,
Anna Gladkova
,
Satoshi Matsuoka
Sequential Pattern Mining System for Analysis of Programming Learning History
Full-text access may be available. Sign in or learn about subscription options.
pp. 69-74
by
Shoichi Nakamura
,
Kaname Nozaki
,
Hiroki Nakayama
,
Yasuhiko Morimoto
,
Youzou Miyadera
A Mixed and Batching Authentication Protocol for Grouped Tags in Mobile RFID System
Full-text access may be available. Sign in or learn about subscription options.
pp. 75-80
by
Duan Litian
,
Duan Fu
,
Wang John Zizhong
A Prediction Model of Traffic Congestion Using Weather Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 81-88
by
Jiwan Lee
,
Bonghee Hong
,
Kyungmin Lee
,
Yang-Ja Jang
Scalable Data Representation in Risk Management Information Systems Using an XQuery Extension
Full-text access may be available. Sign in or learn about subscription options.
pp. 89-96
by
Ionut Emil Iacob
,
Alex Apostolou
CPU Load Prediction Based on a Multidimensional Spatial Voting Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 97-102
by
Yu Chen
,
Jian Cao
,
Pinglei Guo
A Model for Linguistic Summaries of Results from Usability Studies
Full-text access may be available. Sign in or learn about subscription options.
pp. 103-110
by
Radoslaw P. Katarzyniak
,
Wojciech A. Lorkiewicz
,
Janusz F. Sobecki
Operation-Level Performance Control in the Object Store for Distributed Storage Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 111-112
by
Yusuke Tanimura
,
Hidetaka Koie
A Datalog Engine for Iterative Graph Algorithms on Large Clusters
Full-text access may be available. Sign in or learn about subscription options.
pp. 113-114
by
Jacek Sroka
,
Marek Rogala
,
Michal Adamczyk
,
Jan Hidders
A Method for Extracting the Search Contexts in Collaborative Exploration
Full-text access may be available. Sign in or learn about subscription options.
pp. 115-116
by
Hiroki Nakayama
,
Ryo Onuma
,
Hiroaki Kaminaga
,
Youzou Miyadera
,
Shoichi Nakamura
Exploiting Collective Spontaneous Mobility to Improve Location Prediction of Mobile Phone Users
Full-text access may be available. Sign in or learn about subscription options.
pp. 117-122
by
Chen Zhou
,
Benxiong Huang
,
Lai Tu
An Event-Based Framework for the Specification and Runtime Checking of Timing Constraints in Wireless Sensor and Actuator Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 123-130
by
Nasos Grigoropoulos
,
Spyros Lalis
,
Manos Koutsoubelias
Flow-Control Policies for Wireless Sequencer-Based Causal and Total Order Communication
Full-text access may be available. Sign in or learn about subscription options.
pp. 131-138
by
Manos Koutsoubelias
,
Spyros Lalis
Model Design of Generating Path with Accessibility Semantics for Assisting Indoor Mobility
Full-text access may be available. Sign in or learn about subscription options.
pp. 139-146
by
Hangli Ge
,
Masahiro Bessho
,
Noboru Koshizuka
,
Ken Sakamura
Malicious Node Traceback in Opportunistic Networks Using Merkle Trees
Full-text access may be available. Sign in or learn about subscription options.
pp. 147-152
by
Majeed Alajeely
,
Asma'a Ahmad
,
Robin Doss
A Parallel Bee Colony Algorithm for Resource Allocation Application in Cloud Computing Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 153-160
by
Tingxi Wen
,
Zhongnan Zhang
,
Meihong Wang
Efficiency Improvements in Social Network Communication via MapReduce
Full-text access may be available. Sign in or learn about subscription options.
pp. 161-168
by
Fan Jiang
,
Carson K. Leung
,
Dacheng Liu
High-Performance FPGA Implementation of Modular Inversion over F_256 for Elliptic Curve Cryptography
Full-text access may be available. Sign in or learn about subscription options.
pp. 169-174
by
Md Selim Hossain
,
Yinan Kong
High-Speed, Area-Efficient, FPGA-Based Elliptic Curve Cryptographic Processor over NIST Binary Fields
Full-text access may be available. Sign in or learn about subscription options.
pp. 175-181
by
Md Selim Hossain
,
Ehsan Saeedi
,
Yinan Kong
An Epidemic Model Based Temporal Violation Prediction Strategy for Large Batch of Parallel Business Cloud Workflows
Full-text access may be available. Sign in or learn about subscription options.
pp. 182-189
by
Haoyu Luo
,
Xiao Liu
,
Jin Liu
,
Futian Wang
Performance Analysis of Integrated Canny and Fuzzy Logic Based (3-by-3 Cell Block) Edge Detection Algorithms
Full-text access may be available. Sign in or learn about subscription options.
pp. 190-195
by
Abdullah-Al-Nahid
,
Yinan Kong
,
Md Selim Hossain
Tamper-Resistant Security for Cyber-Physical Systems with eTRON Architecture
Full-text access may be available. Sign in or learn about subscription options.
pp. 196-203
by
M. Fahim Ferdous Khan
,
Ken Sakamura
Non-user Generated Annotation on User Shared Images for Connection Discovery
Full-text access may be available. Sign in or learn about subscription options.
pp. 204-209
by
Ming Cheung
,
James She
,
Xiaopeng Li
From Data to Knowledge: A Cognitive Approach to Retail Business Intelligence
Full-text access may be available. Sign in or learn about subscription options.
pp. 210-217
by
Atsushi Sato
,
Runhe Huang
Privacy-Preserved and Best-Effort Provisions of Cyber-I Information to Personalized Services
Full-text access may be available. Sign in or learn about subscription options.
pp. 218-225
by
Wenjing Liu
,
Jianhua Ma
Establishing Energy Consumption Plans for Green Star-Queries in Data Warehousing Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 226-231
by
Orlando Belo
,
Ricardo Gonçalves
,
João Saraiva
A Comparative Study on the Energy Consumption of PHP Single and Double Quotes
Full-text access may be available. Sign in or learn about subscription options.
pp. 232-239
by
Colin Pattinson
,
Peter Olawale Olaoluwa
,
Ah-Lian Kor
Network Pruning for Extending Satellite Service Life in LEO Satellite Constellations
Full-text access may be available. Sign in or learn about subscription options.
pp. 240-246
by
Mohammed Hussein
,
Gentian Jakllari
,
Beatrice Paillassa
Smart Office Energy-Saving Service Using Bluetooth Low Energy Beacons and Smart Plugs
Full-text access may be available. Sign in or learn about subscription options.
pp. 247-251
by
Moonok Choi
,
Wan-Ki Park
,
Ilwoo Lee
Client-Side Energy Costs of Video Streaming
Full-text access may be available. Sign in or learn about subscription options.
pp. 252-259
by
Oche Ejembi
,
Saleem N. Bhatti
Power Model for Heterogeneous Cloud Radio Access Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 260-267
by
R. S. Alhumaima
,
M. Khan
,
H. S. Al-Raweshidy
On EDFA and Raman Fiber Amplifier Energy Efficiency
Full-text access may be available. Sign in or learn about subscription options.
pp. 268-275
by
Peng Wang
,
Kerry Hinton
,
Peter M. Farrell
,
Bipin Sankar Gopalakrishna Pillai
Context-Aware Adaptive Framework for e-Health Monitoring
Full-text access may be available. Sign in or learn about subscription options.
pp. 276-283
by
Haider Hasan Mshali
,
Tayeb Lemlouma
,
Damien Magoni
A Low Complexity Antenna Selection Algorithm for Energy Efficiency in Massive MIMO Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 284-289
by
Tzu-Hao Tai
,
Wei-Ho Chung
,
Ta-Sung Lee
A Robust Energy Efficient Epidemic Routing Protocol for Delay Tolerant Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 290-296
by
Bhed Bahadur Bista
,
Danda B. Rawat
EPDL: Supporting Context-Based Energy Control Policy Design in IoT-Enabled Smart Buildings: Programing the Physical World with EPDL
Full-text access may be available. Sign in or learn about subscription options.
pp. 297-303
by
Xiaohui Peng
,
Masahiro Bessho
,
Noboru Koshizuka
,
Ken Sakamura
Energy-Efficient QoS Based Route Management in Cognitive Radio Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 304-310
by
Anirudha R. Kulkarni
,
Anjali Agarwal
IMTeract Tool for Monitoring and Profiling HPC Systems and Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 311-317
by
Violeta Holmes
,
Christopher Newman
,
Matthew Newall
,
Daniel Munnings
,
Gillian Arnold
Energy-Efficient Video Streaming over Named Data Networking Using Interest Aggregation and Playout Buffer Control
Full-text access may be available. Sign in or learn about subscription options.
pp. 318-324
by
Yuya Ishizu
,
Kenji Kanai
,
Jiro Katto
,
Hidenori Nakazato
,
Marie Hirose
Low Power Spatial Computing Using Null Convention Logic
Full-text access may be available. Sign in or learn about subscription options.
pp. 325-329
by
Kashfia Haque
,
Conrad Jakob
,
Paul Beckett
Prototype Development of Small-Scale Green Energy Driven Power Plant to Supply Telecommunication Towers
Full-text access may be available. Sign in or learn about subscription options.
pp. 330-336
by
Shailendra Sharma
,
Bhim Singh
,
Ambrish Chandra
Revealing the Role of Topological Transitivity in Efficient Trust and Reputation System in Smart Metering Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 337-342
by
Aminu Bello
,
William Liu
,
Quan Bai
,
Ajit Narayanan
Exploring the Role of Structural Similarity in Securing Smart Metering Infrastructure
Full-text access may be available. Sign in or learn about subscription options.
pp. 343-349
by
Aminu Bello
,
William Liu
,
Quan Bai
,
Ajit Narayanan
A Low Power High Performance Optical Interconnect Architecture for Exascale Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 350-354
by
Lei Zhang
,
Xuehui Wang
Impact of Driving Behaviour on Emissions and Road Network Performance
Full-text access may be available. Sign in or learn about subscription options.
pp. 355-361
by
Hussein Dia
,
Sakda Panwai
Evaluating Energy-Efficient Cloud Radio Access Networks for 5G
Full-text access may be available. Sign in or learn about subscription options.
pp. 362-367
by
Tshiamo Sigwele
,
Atm Shafiul Alam
,
Prashant Pillai
,
Y. Fun Hu
A Framework and Algorithm for Energy Efficient Container Consolidation in Cloud Data Centers
Full-text access may be available. Sign in or learn about subscription options.
pp. 368-375
by
Sareh Fotuhi Piraghaj
,
Amir Vahid Dastjerdi
,
Rodrigo N. Calheiros
,
Rajkumar Buyya
Energy-Efficient User-Oriented Cloud Elasticity for Data-Driven Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 376-383
by
David Guyon
,
Anne-Cécile Orgerie
,
Christine Morin
Measuring Cascading Failures for Smart Grids Vulnerability Assessment
Full-text access may be available. Sign in or learn about subscription options.
pp. 384-389
by
Sotharith Tauch
,
William Liu
,
Russel Pears
Energy Consumption Evaluation of ICN Toward Power-Saving Video Delivery
Full-text access may be available. Sign in or learn about subscription options.
pp. 390-395
by
Daiki Aoki
,
Sakiko Takenaka
,
Kenji Kanai
,
Jiro Katto
,
Hidenori Nakazato
,
Marie Hirose
On Understanding the Energy Impact of Speculative Execution in Hadoop
Full-text access may be available. Sign in or learn about subscription options.
pp. 396-403
by
Tien-Dat Phan
,
Shadi Ibrahim
,
Gabriel Antoniu
,
Luc Bougé
On Power Management Policies for Data Centers
Full-text access may be available. Sign in or learn about subscription options.
pp. 404-411
by
Zygmunt J. Haas
,
Shuyang Gu
GRaNADA: A Network-Aware and Energy-Efficient PaaS Cloud Architecture
Full-text access may be available. Sign in or learn about subscription options.
pp. 412-419
by
Ismael Cuadrado-Cordero
,
Anne-Cécile Orgerie
,
Christine Morin
An Energy Efficiency Channel Binding Mechanism for Multi-user MIMO in 802.11ac
Full-text access may be available. Sign in or learn about subscription options.
pp. 420-426
by
Xianglan Piao
,
Weifeng Sun
,
Zhenxing Ji
,
Xu Yuan
An Energy Efficient Data Dissemination and Information Retrieval Scheme for VANET
Full-text access may be available. Sign in or learn about subscription options.
pp. 427-434
by
Amit Dua
,
Neeraj Kumar
,
Seema Bawa
A Genetic Algorithm Based Approach for Energy Minimization of Scheduled Traffic in Optical Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 435-439
by
Arvind Kodakanchi
,
Ying Chen
,
Arunita Jaekel
Using the Shapley Value for Fair Consumer Compensation in Energy Demand Response Programs: Comparing Algorithms
Full-text access may be available. Sign in or learn about subscription options.
pp. 440-447
by
Salma Bakr
,
Stephen Cranefield
Opportunistic Scheduling in Clouds Partially Powered by Green Energy
Full-text access may be available. Sign in or learn about subscription options.
pp. 448-455
by
Yunbo Li
,
Anne-Cécile Orgerie
,
Jean-Marc Menaud
The ?-PUC-Fit Algorithm: Optimization of the Current Allocation of Virtual Machines in Cloud Computing for Energy Efficiency
Full-text access may be available. Sign in or learn about subscription options.
pp. 456-463
by
Fábio A. Pandolfo
,
Alcides Calsavara
,
Luiz Lima
,
Sediane C. L. Hernandes
Performance Evaluation of Energy-Aware Best Fit Decreasing Algorithms for Cloud Environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 464-469
by
Saad Mustafa
,
Kashif Bilal
,
Sajjad A. Madani
,
Nikos Tziritas
,
Samee U. Khan
,
Laurence T. Yang
Energy-Efficient Transmission Scheme for Vehicles with Cognitive Radio/WiFi in Vehicular Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 470-471
by
Che Wei Lee
,
Show-Shiow Tzeng
,
Ying-Jen Lin
Sensing and Monitoring for Cellular Networks: A Crowdsourcing Platform from Mobile Smartphones
Full-text access may be available. Sign in or learn about subscription options.
pp. 472-473
by
Wentao Fan
,
Yiran Peng
,
Zhe Yuan
,
Pengyu Chen
,
Chunjing Hu
,
Xing Zhang
A User-Centric Small BSs Collaboration Mechanism in Ultra-Dense Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 474-475
by
Xuefen Hong
,
Kun Yang
,
Shuo Wang
,
Xing Zhang
Energy-Aware Massively Distributed Cloud Facilities: The DISCOVERY Initiative
Full-text access may be available. Sign in or learn about subscription options.
pp. 476-477
by
Frédéric Desprez
,
Shadi Ibrahim
,
Adrien Lebre
,
Anne-Cécile Orgerie
,
Jonathan Pastor
,
Anthony Simonet
Markovian Model Based Channel Allocation in Cognitive Radio Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 478-482
by
Vinesh Teotia
,
Sanjay K. Dhurandher
,
Isaac Woungang
,
Mohammad S. Obaidat
The Internet of Things Resource Management Challenge
Full-text access may be available. Sign in or learn about subscription options.
pp. 483-490
by
Andreas Kliem
,
Odej Kao
A Smart Home Application Based on the Internet of Things Management Platform
Full-text access may be available. Sign in or learn about subscription options.
pp. 491-496
by
Mahmoud Elkhodr
,
Seyed Shahrestani
,
Hon Cheung
Selecting the Sensing Method in Cognitive Radio and Future Networks: A QoS-Aware Fuzzy Scheme
Full-text access may be available. Sign in or learn about subscription options.
pp. 497-504
by
Nabil Giweli
,
Seyed Shahrestani
,
Hon Cheung
A Building/Environment Data Based Indoor Positioning Service
Full-text access may be available. Sign in or learn about subscription options.
pp. 505-512
by
J. W. S. Liu
,
L. J. Chen
,
J. Su
,
C. C. Li
,
E. T.-H. Chu
Agent-based approach to enhance the new born social Web of Services
Full-text access may be available. Sign in or learn about subscription options.
pp. 513-519
by
Mikhail Komarov
,
Nikita Konovalov
,
Nikolay Kazantsev
Developing an Integration Framework for Crowdsourcing and Internet of Things with Applications for Disaster Response
Full-text access may be available. Sign in or learn about subscription options.
pp. 520-524
by
Rameshwar Dubey
,
Zongwei Luo
,
Meiling Xu
,
Samuel Fosso Wamba
Distributed Device Health Platform Using Internet of Things devices
Full-text access may be available. Sign in or learn about subscription options.
pp. 525-531
by
Hariprasad Anumala
,
Shiva Murthy Busetty
Internet of Things for Industrial Automation -- Challenges and Technical Solutions
Full-text access may be available. Sign in or learn about subscription options.
pp. 532-539
by
Hongyu Pei Breivold
,
Kristian Sandström
An Architecture for Verbal Summaries in Smart Mobile Devices
Full-text access may be available. Sign in or learn about subscription options.
pp. 540-547
by
Radoslaw P. Katarzyniak
,
Wojciech A. Lorkiewicz
,
Janusz F. Sobecki
LTCEP: Efficient Long-Term Event Processing for Internet of Things Data Streams
Full-text access may be available. Sign in or learn about subscription options.
pp. 548-555
by
Meng Ma
,
Ping Wang
,
Chao-Hsien Chu
Applying Attribute-Based Encryption on Publish Subscribe Messaging Patterns for the Internet of Things
Full-text access may be available. Sign in or learn about subscription options.
pp. 556-563
by
Dirk Thatmann
,
Sebastian Zickau
,
Alexander Förster
,
Axel Küpper
Combining Mobile and Fog Computing: Using CoAP to Link Mobile Device Clouds with Fog Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 564-571
by
Heng Shi
,
Nan Chen
,
Ralph Deters
LightBib: Marathoner Recognition System with Visible Light Communications
Full-text access may be available. Sign in or learn about subscription options.
pp. 572-578
by
Chiao Fu
,
Chia-Wen Cheng
,
Wen-Hsuan Shen
,
Yu-Lin Wei
,
Hsin-Mu Tsai
Managing the Internet of Things
Full-text access may be available. Sign in or learn about subscription options.
pp. 579-585
by
Mahmoud Elkhodr
,
Seyed Shahrestani
,
Hon Cheung
An IoT Environment for WSN Adaptive QoS
Full-text access may be available. Sign in or learn about subscription options.
pp. 586-593
by
Syarifah Ezdiani
,
Indrajit S Acharyya
,
Sivaramakrishnan Sivakumar
,
Adnan Al-Anbuky
Showing 100 out of 125
Load More
Load All