Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
NBIS
NBIS 2012
Generate Citations
2012 15th International Conference on Network-Based Information Systems
Sept. 26 2012 to Sept. 28 2012
Melbourne, Australia Australia
ISBN: 978-1-4673-2331-4
Table of Contents
Papers
[Title page i]
Freely available from IEEE.
pp. i
Papers
[Title page iii]
Freely available from IEEE.
pp. iii
Papers
[Copyright notice]
Freely available from IEEE.
pp. iv
Papers
Table of contents
Freely available from IEEE.
pp. v-xviii
Papers
Welcome Message from NBiS 2012 General Co-Chairs
Freely available from IEEE.
pp. xix
Papers
Welcome Message from NBiS 2012 Program Committee Co-Chairs
Freely available from IEEE.
pp. xx
Papers
Welcome Message from NBiS Steering Committee Co-Chairs
Freely available from IEEE.
pp. xxi
Papers
Welcome Message from Workshops Co-Chairs of NBiS 2012
Freely available from IEEE.
pp. xxii
Papers
NBiS-2012 Keynote Talk: Intelligent Financial Early Warning Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. xxiii
by
Jie Lu
Papers
NBiS-2012 Keynote Talk: Reliability and Capacity Efficiency in Storage Virtualization
Full-text access may be available. Sign in or learn about subscription options.
pp. xxiv
by
Minoru Uehara
Papers
NBiS 2012 Organizing Committee
Freely available from IEEE.
pp. xxv-xxix
Papers
Reviewers
Freely available from IEEE.
pp. xxx
Papers
ADPNA 2012 Welcome Message
Freely available from IEEE.
pp. xxxi
Papers
ADPNA 2012 Committee
Freely available from IEEE.
pp. xxxii
Papers
ADPNA 2012 Reviewers
Freely available from IEEE.
pp. xxxiii
Papers
CPSAT 2012 Welcome Message
Freely available from IEEE.
pp. xxxiv
Papers
CPSAT 2012 Committee
Freely available from IEEE.
pp. xxxv
Papers
CPSAT 2012 Reviewers
Freely available from IEEE.
pp. xxxvi
Papers
DEMoC 2012 Welcome Message
Freely available from IEEE.
pp. xxxvii
Papers
DEMoC 2012 Committee
Freely available from IEEE.
pp. xxxviii
Papers
DEMoC 2012 Reviewers
Freely available from IEEE.
pp. xxxix
Papers
HETNET 2012 Welcome Message
Freely available from IEEE.
pp. xl
HETNET 2012 Committee
Freely available from IEEE.
pp. xli-xli
Papers
HETNET 2012 Reviewers
Freely available from IEEE.
pp. xlii
Papers
INVITE 2012 Welcome Message
Freely available from IEEE.
pp. xliii
Papers
INVITE 2012 Committee
Freely available from IEEE.
pp. xliv
Papers
INVITE 2012 Reviewers
Freely available from IEEE.
pp. xlv
Papers
INWC 2012 Welcome Message
Freely available from IEEE.
pp. xlvi
Papers
INWC 2012 Committee
Freely available from IEEE.
pp. xlvii
Papers
INWC 2012 Reviewers
Freely available from IEEE.
pp. xlviii
Papers
ISSE 2012 Welcome Message
Freely available from IEEE.
pp. xlvix
Papers
ISSE 2012 Committee
Freely available from IEEE.
pp. l
Papers
ISSE 2012 Reviewers
Freely available from IEEE.
pp. li
Papers
ITIS 2012 Welcome Message
Freely available from IEEE.
pp. lii
Papers
ITIS 2012 Committee
Freely available from IEEE.
pp. liii
Papers
ITIS 2012 Reviewers
Freely available from IEEE.
pp. liv
Papers
MCCTA 2012 Welcome Message
Freely available from IEEE.
pp. lv
Papers
MCCTA 2012 Committee
Freely available from IEEE.
pp. lvi
Papers
MCCTA 2012 Reviewers
Freely available from IEEE.
pp. lvii
Papers
NeoFUSION 2012 Welcome Message
Freely available from IEEE.
pp. lviii
Papers
NeoFUSION 2012 Committee
Freely available from IEEE.
pp. lvix
Papers
NeoFUSION 2012 Reviewers
Freely available from IEEE.
pp. lx
Papers
TwC 2012 Welcome Message
Freely available from IEEE.
pp. lxi
Papers
TwC 2012 Committee
Freely available from IEEE.
pp. lxii
Papers
TwC 2012 Reviewers
Freely available from IEEE.
pp. lxiii
Papers
WReCS 2012 Welcome Message
Freely available from IEEE.
pp. lxiv
Papers
WReCS 2012 Committee
Freely available from IEEE.
pp. lxv
Papers
WReCS 2012 Reviewers
Freely available from IEEE.
pp. lxvi
Papers
WSSM 2012 Welcome Message
Freely available from IEEE.
pp. lxvii
Papers
WSSM 2012 Committee
Freely available from IEEE.
pp. lxviii
Papers
WSSM 2012 Reviewers
Freely available from IEEE.
pp. lxix
Papers
Reducing Power Consumption and Improving Quality of Service in Cloud Computing Environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Yuuki Awano
,
Shin-ichi Kuribayashi
Papers
Multitenancy - Security Risks and Countermeasures
Full-text access may be available. Sign in or learn about subscription options.
pp. 7-13
by
Wayne J. Brown
,
Vince Anderson
,
Qing Tan
Papers
The Cloud Computing Applications in Information Resource Dynamic Allocation
Full-text access may be available. Sign in or learn about subscription options.
pp. 14-17
by
Hui Ma
,
Yue Qiu
Papers
Cloud Computing: Architecture for Efficient Provision of Services
Full-text access may be available. Sign in or learn about subscription options.
pp. 18-23
by
Nawsher Khan
,
A. Noraziah
,
Tutut Herawan
,
Elrasheed Ismail
,
Zakira Inayat
Papers
Single Transition Constraint for XML Update Validation
Full-text access may be available. Sign in or learn about subscription options.
pp. 24-31
by
Norfaradilla Wahid
,
Eric Pardede
Papers
Integration of Data Warehouse and Unstructured Business Documents
Full-text access may be available. Sign in or learn about subscription options.
pp. 32-37
by
Ahmad Abdullah Alqarni
,
Eric Pardede
Papers
Indexing Moving Objects in Indoor Cellular Space
Full-text access may be available. Sign in or learn about subscription options.
pp. 38-44
by
Sultan Alamri
,
David Taniar
,
Maytham Safar
Papers
Database Research: Are We at a Crossroad? Reflection on NoSQL
Full-text access may be available. Sign in or learn about subscription options.
pp. 45-51
by
Maria Indrawan-Santiago
Papers
Experimental Evaluation of Anonymous Protocols under the JXTA Middlewar
Full-text access may be available. Sign in or learn about subscription options.
pp. 52-57
by
Joan Arnedo-Moreno
,
Noemi Perez-Gilabert
,
Marc Domingo-Prieto
Papers
Trustworthy Group Formation Algorithm Based on Decentralized Trust Management in Distributed Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 58-65
by
Ailixier Aikebaier
,
Tomoya Enokido
,
Makoto Takizawa
Papers
Dynamic Reconfiguration of Chord Ring Based on Physical Network and Finger Table Information
Full-text access may be available. Sign in or learn about subscription options.
pp. 66-73
by
Yuta Shimano
,
Fumiaki Sato
Papers
A Chunk Scheduling Based on Chunk Diffusion Ratio on P2P Live Streaming
Full-text access may be available. Sign in or learn about subscription options.
pp. 74-81
by
Yoshiki Sakata
,
Kazuyuki Takayama
,
Rei Endo
,
Hiroshi Shigeno
Papers
Estimating the Number of Lanes on Rapid Road Map Survey System Using GPS Trajectories as Collective Intelligence
Full-text access may be available. Sign in or learn about subscription options.
pp. 82-88
by
Nobuyoshi Sato
,
Tsuyoshi Takayama
,
Yoshitoshi Murata
Papers
Local Area Network Reactivation in Never Die Network for a Large Scale Disaster
Full-text access may be available. Sign in or learn about subscription options.
pp. 89-96
by
Noriki Uchida
,
Kazuo Takahata
,
Yoshitaka Shibata
,
Norio Shiratori
Papers
Performance Evaluation of DYMO Protocol in Different VANET Scenarios
Full-text access may be available. Sign in or learn about subscription options.
pp. 97-103
by
Evjola Spaho
,
Makoto Ikeda
,
Leonard Barolli
,
Fatos Xhafa
,
Aleksander Biberaj
,
Makoto Takizawa
Papers
Integrating Information Systems Business Rules into a Design Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 104-111
by
Mohammed Bonais
,
Wenny Rahayu
,
Eric Pardede
Papers
The Extended Transmission Power Consumption Model for Communication-Based Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 112-119
by
Tomoya Enokido
,
Makoto Takizawa
Papers
Evaluation of an Energy-Aware Selection Algorithm for Computation and Storage-Based Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 120-127
by
Takuro Inoue
,
Ailixier Aikebaier
,
Tomoya Enokido
,
Makoto Takizawa
Papers
RAIDv: Extensible RAID1 Based on Voting
Full-text access may be available. Sign in or learn about subscription options.
pp. 128-133
by
Minoru Uehara
Papers
A Comparative Study of a MANET Testbed Performance in Indoor and Outdoor Stairs Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 134-140
by
Masahiro Hiyama
,
Elis Kulla
,
Makoto Ikeda
,
Leonard Barolli
,
Muhammad Younas
Papers
Simulation Performance of a MANET Using Static Source and Destination Considering AODV Routing Protocol
Full-text access may be available. Sign in or learn about subscription options.
pp. 141-147
by
Elis Kulla
,
Makoto Ikeda
,
Leonard Barolli
,
Muhammad Younas
,
Kazunori Uchida
,
Makoto Takizawa
Papers
An Implementation of Visualization System for Visualizing Network Topology and Packet Flow in Mobile Ad Hoc Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 148-155
by
Akio Koyama
,
Shohei Sato
,
Leonard Barolli
,
Makoto Takizawa
Papers
TCP Congestion Control in MANETs for Multiple Traffic Considering Proactive and Reactive Routing Protocols
Full-text access may be available. Sign in or learn about subscription options.
pp. 156-163
by
Makoto Ikeda
,
Elis Kulla
,
Masahiro Hiyama
,
Leonard Barolli
,
Muhammad Younas
,
Makoto Takizawa
Papers
Design and Evaluation of Multimedia Quorum-Based Synchronization Protocols
Full-text access may be available. Sign in or learn about subscription options.
pp. 164-171
by
Tadateru Ohkawara
,
Ailixier Aikebaier
,
Tomoya Enokido
,
Makoto Takizawa
Papers
Geological Visualisation with Augmented Reality
Full-text access may be available. Sign in or learn about subscription options.
pp. 172-179
by
Dylan Mathiesen
,
Trina Myers
,
Ian Atkinson
,
Jarrod Trevathan
Papers
Extending Service Coverage Using FGS-Aware Blind Repetition
Full-text access may be available. Sign in or learn about subscription options.
pp. 180-186
by
Juyoung Park
,
Jaemyoun Lee
,
Junbeom Hur
,
Kyungtae Kang
Papers
Evaluation of a Seamless Surveillance Video Monitoring System Used by High-Speed Network and High-Resolution Omni-directional Cameras
Full-text access may be available. Sign in or learn about subscription options.
pp. 187-193
by
Takuma Kon
,
Noriki Uchida
,
Koji Hashimoto
,
Yoshitaka Shibata
Papers
A Boundary Node Detection Based Solution for Minimizing the Effects of Nodes Distribution over Key Exchange in Group Based WSN
Full-text access may be available. Sign in or learn about subscription options.
pp. 194-199
by
Rabia Latif
,
Asad Raza
Papers
Energy-Efficient Data Gathering Using Traffic Reduction Based on Change in Data Characteristics in Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 200-207
by
Shinya Kondo
,
Akimitsu Kanzaki
,
Takahiro Hara
,
Shojiro Nishio
Papers
A Fuzzy-Based Simulation System for Controlling Sensor Speed in Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 208-213
by
Qi Wang
,
Leonard Barolli
,
Elis Kulla
,
Arjan Durresi
,
Aleksander Biberaj
,
Makoto Takizawa
Papers
Node Placement in WMNs and Visualization of Evolutionary Computation Process Using WMN-GA System
Full-text access may be available. Sign in or learn about subscription options.
pp. 214-220
by
Tetsuya Oda
,
Admir Barolli
,
Evjola Spaho
,
Leonard Barolli
,
Fatos Xhafa
,
Jiro Iwashige
Papers
Mobile Social Game Design from the Perspective of Persuasive Technology
Full-text access may be available. Sign in or learn about subscription options.
pp. 221-225
by
Toshihiko Yamakami
Papers
Transition Analysis of Mobile Social Games from Feature-Phone to Smart-Phone
Full-text access may be available. Sign in or learn about subscription options.
pp. 226-230
by
Toshihiko Yamakami
Papers
Feedback Capacity of Random Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 231-238
by
Maytham Safar
,
Khaled Mahdi
,
Ghufran Al-Shiridah
Papers
Finding Hidden Nodes by Checking for Missing Nodes against Past Social Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 239-246
by
Alan Chia-Lung Chen
,
Mohamad Elzohbi
,
Ahmed Elhajj
,
Konstantinos F. Xylogiannopoulos
,
Panagiotis Karampelas
,
Mick Ridley
,
Reda Alhajj
Papers
TCADS: Trustworthy, Context-Related Anomaly Detection for Smartphones
Full-text access may be available. Sign in or learn about subscription options.
pp. 247-254
by
Ingo Bente
,
Bastian Hellmann
,
Joerg Vieweg
,
Josef von Helden
,
Gabi Dreo
Papers
Vulnerability Analysis of Relay Set Selection Algorithms for the Simplified Multicast Forwarding (SMF) Protocol for Mobile Ad Hoc Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 255-260
by
Jiazi Yi
,
Thomas Clausen
Papers
A Proposal of Security Advisory System at the Time of the Installation of Applications on Android OS
Full-text access may be available. Sign in or learn about subscription options.
pp. 261-267
by
Takayuki Matsudo
,
Eiichiro Kodama
,
Jiahong Wang
,
Toyoo Takata
Papers
Theoretical Suggestion of Policy-Based Wide Area Network Management System (wDACS System Part-I)
Full-text access may be available. Sign in or learn about subscription options.
pp. 268-275
by
Kazuya Odagiri
,
Shogo Shimizu
,
Naohiro Ishii
,
Makoto Takizawa
Papers
The QoS-Aware Order Prediction Scheduling (QOPS) Scheme for Video Streaming Using the Multi-path Datagram Congestion Control Protocol (MP-DCCP)
Full-text access may be available. Sign in or learn about subscription options.
pp. 276-283
by
Chung-Ming Huang
,
Yih-Chung Chen
,
Shih-Yang Lin
Papers
Application Layer Traffic Engineering for Multipoint Communication System
Full-text access may be available. Sign in or learn about subscription options.
pp. 284-289
by
Yumi Nakayama
,
Katsuhiko Kaji
,
Nobuo Kawaguchi
Papers
Proposal and Evaluation of Ant-Based Routing with Autonomous Zoning for Convergence Improvement
Full-text access may be available. Sign in or learn about subscription options.
pp. 290-297
by
Naomi Kuze
,
Naoki Wakamiya
,
Masayuki Murata
Papers
A Mechanism of Trailing the Footprint for the Previously Visited Web Pages to Ease a Meta-Knowledge-Based Search
Full-text access may be available. Sign in or learn about subscription options.
pp. 298-305
by
Keizo Sato
,
Yoshitaka Adachi
,
Makoto Nakashima
,
Tetsuro Ito
Papers
Building an Information System for Reality Mining Based on Communication Traces
Full-text access may be available. Sign in or learn about subscription options.
pp. 306-310
by
Matthias Steinbauer
,
Gabriele Kotsis
Papers
Riskr: A Low-Technological Web2.0 Disaster Service to Monitor and Share Information
Full-text access may be available. Sign in or learn about subscription options.
pp. 311-318
by
Jess Farber
,
Trina Myers
,
Jarrod Trevathan
,
Ian Atkinson
,
Trevor Andersen
Papers
Community Site for Music Therapists Based on the Session Records of Music Therapy
Full-text access may be available. Sign in or learn about subscription options.
pp. 319-325
by
Naoko Kosugi
,
Mayu Kondo
Papers
An Interface for Simulating Node Placement in Wireless Mesh Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 326-333
by
Fatos Xhafa
,
Albert Bravo
,
Admir Barolli
,
Makoto Takizawa
Papers
Effects of Directional Receiving for MAC-Level Broadcasting on Wireless Ad Hoc Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 334-340
by
Tetsuya Shigeyasu
,
Hiroshi Matsuno
Papers
Performance Evaluation of WSNs Considering MAC and Routing Protocols Using Goodput and Delay Metrics
Full-text access may be available. Sign in or learn about subscription options.
pp. 341-348
by
Tao Yang
,
Elis Kulla
,
Tetsuya Oda
,
Leonard Barolli
,
Muhammad Younas
,
Makoto Takizawa
Showing 100 out of 199
Load More
Load All