Default Cover Image

2012 15th International Conference on Network-Based Information Systems

Sept. 26 2012 to Sept. 28 2012

Melbourne, Australia Australia

ISBN: 978-1-4673-2331-4

Table of Contents

Papers
[Title page i]Freely available from IEEE.pp. i
Papers
[Title page iii]Freely available from IEEE.pp. iii
Papers
[Copyright notice]Freely available from IEEE.pp. iv
Papers
Table of contentsFreely available from IEEE.pp. v-xviii
Papers
Welcome Message from NBiS 2012 General  Co-ChairsFreely available from IEEE.pp. xix
Papers
Welcome Message from NBiS 2012 Program Committee Co-ChairsFreely available from IEEE.pp. xx
Papers
Welcome Message from NBiS Steering Committee Co-ChairsFreely available from IEEE.pp. xxi
Papers
Welcome Message from Workshops Co-Chairs of NBiS 2012Freely available from IEEE.pp. xxii
Papers
NBiS-2012 Keynote Talk: Intelligent Financial Early Warning SystemsFull-text access may be available. Sign in or learn about subscription options.pp. xxiii
Papers
NBiS-2012 Keynote Talk: Reliability and Capacity Efficiency in Storage VirtualizationFull-text access may be available. Sign in or learn about subscription options.pp. xxiv
Papers
NBiS 2012 Organizing CommitteeFreely available from IEEE.pp. xxv-xxix
Papers
ReviewersFreely available from IEEE.pp. xxx
Papers
ADPNA 2012 Welcome MessageFreely available from IEEE.pp. xxxi
Papers
ADPNA 2012 CommitteeFreely available from IEEE.pp. xxxii
Papers
ADPNA 2012 ReviewersFreely available from IEEE.pp. xxxiii
Papers
CPSAT 2012 Welcome MessageFreely available from IEEE.pp. xxxiv
Papers
CPSAT 2012 CommitteeFreely available from IEEE.pp. xxxv
Papers
CPSAT 2012 ReviewersFreely available from IEEE.pp. xxxvi
Papers
DEMoC 2012 Welcome MessageFreely available from IEEE.pp. xxxvii
Papers
DEMoC 2012 CommitteeFreely available from IEEE.pp. xxxviii
Papers
DEMoC 2012 ReviewersFreely available from IEEE.pp. xxxix
Papers
HETNET 2012 Welcome MessageFreely available from IEEE.pp. xl
HETNET 2012 CommitteeFreely available from IEEE.pp. xli-xli
Papers
HETNET 2012 ReviewersFreely available from IEEE.pp. xlii
Papers
INVITE 2012 Welcome MessageFreely available from IEEE.pp. xliii
Papers
INVITE 2012 CommitteeFreely available from IEEE.pp. xliv
Papers
INVITE 2012 ReviewersFreely available from IEEE.pp. xlv
Papers
INWC 2012 Welcome MessageFreely available from IEEE.pp. xlvi
Papers
INWC 2012 CommitteeFreely available from IEEE.pp. xlvii
Papers
INWC 2012 ReviewersFreely available from IEEE.pp. xlviii
Papers
ISSE 2012 Welcome MessageFreely available from IEEE.pp. xlvix
Papers
ISSE 2012 CommitteeFreely available from IEEE.pp. l
Papers
ISSE 2012 ReviewersFreely available from IEEE.pp. li
Papers
ITIS 2012 Welcome MessageFreely available from IEEE.pp. lii
Papers
ITIS 2012 CommitteeFreely available from IEEE.pp. liii
Papers
ITIS 2012 ReviewersFreely available from IEEE.pp. liv
Papers
MCCTA 2012 Welcome MessageFreely available from IEEE.pp. lv
Papers
MCCTA 2012 CommitteeFreely available from IEEE.pp. lvi
Papers
MCCTA 2012 ReviewersFreely available from IEEE.pp. lvii
Papers
NeoFUSION 2012 Welcome MessageFreely available from IEEE.pp. lviii
Papers
NeoFUSION 2012 CommitteeFreely available from IEEE.pp. lvix
Papers
NeoFUSION 2012 ReviewersFreely available from IEEE.pp. lx
Papers
TwC 2012 Welcome MessageFreely available from IEEE.pp. lxi
Papers
TwC 2012 CommitteeFreely available from IEEE.pp. lxii
Papers
TwC 2012 ReviewersFreely available from IEEE.pp. lxiii
Papers
WReCS 2012 Welcome MessageFreely available from IEEE.pp. lxiv
Papers
WReCS 2012 CommitteeFreely available from IEEE.pp. lxv
Papers
WReCS 2012 ReviewersFreely available from IEEE.pp. lxvi
Papers
WSSM 2012 Welcome MessageFreely available from IEEE.pp. lxvii
Papers
WSSM 2012 CommitteeFreely available from IEEE.pp. lxviii
Papers
WSSM 2012 ReviewersFreely available from IEEE.pp. lxix
Papers
Reducing Power Consumption and Improving Quality of Service in Cloud Computing EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Papers
Multitenancy - Security Risks and CountermeasuresFull-text access may be available. Sign in or learn about subscription options.pp. 7-13
Papers
The Cloud Computing Applications in Information Resource Dynamic AllocationFull-text access may be available. Sign in or learn about subscription options.pp. 14-17
Papers
Cloud Computing: Architecture for Efficient Provision of ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 18-23
Papers
Single Transition Constraint for XML Update ValidationFull-text access may be available. Sign in or learn about subscription options.pp. 24-31
Papers
Integration of Data Warehouse and Unstructured Business DocumentsFull-text access may be available. Sign in or learn about subscription options.pp. 32-37
Papers
Indexing Moving Objects in Indoor Cellular SpaceFull-text access may be available. Sign in or learn about subscription options.pp. 38-44
Papers
Database Research: Are We at a Crossroad? Reflection on NoSQLFull-text access may be available. Sign in or learn about subscription options.pp. 45-51
Papers
Experimental Evaluation of Anonymous Protocols under the JXTA MiddlewarFull-text access may be available. Sign in or learn about subscription options.pp. 52-57
Papers
Trustworthy Group Formation Algorithm Based on Decentralized Trust Management in Distributed SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 58-65
Papers
Dynamic Reconfiguration of Chord Ring Based on Physical Network and Finger Table InformationFull-text access may be available. Sign in or learn about subscription options.pp. 66-73
Papers
A Chunk Scheduling Based on Chunk Diffusion Ratio on P2P Live StreamingFull-text access may be available. Sign in or learn about subscription options.pp. 74-81
Papers
Local Area Network Reactivation in Never Die Network for a Large Scale DisasterFull-text access may be available. Sign in or learn about subscription options.pp. 89-96
Papers
Performance Evaluation of DYMO Protocol in Different VANET ScenariosFull-text access may be available. Sign in or learn about subscription options.pp. 97-103
Papers
Integrating Information Systems Business Rules into a Design ModelFull-text access may be available. Sign in or learn about subscription options.pp. 104-111
Papers
The Extended Transmission Power Consumption Model for Communication-Based ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 112-119
Papers
Evaluation of an Energy-Aware Selection Algorithm for Computation and Storage-Based ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 120-127
Papers
RAIDv: Extensible RAID1 Based on VotingFull-text access may be available. Sign in or learn about subscription options.pp. 128-133
Papers
A Comparative Study of a MANET Testbed Performance in Indoor and Outdoor Stairs EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 134-140
Papers
Design and Evaluation of Multimedia Quorum-Based Synchronization ProtocolsFull-text access may be available. Sign in or learn about subscription options.pp. 164-171
Papers
Geological Visualisation with Augmented RealityFull-text access may be available. Sign in or learn about subscription options.pp. 172-179
Papers
Extending Service Coverage Using FGS-Aware Blind RepetitionFull-text access may be available. Sign in or learn about subscription options.pp. 180-186
Papers
A Boundary Node Detection Based Solution for Minimizing the Effects of Nodes Distribution over Key Exchange in Group Based WSNFull-text access may be available. Sign in or learn about subscription options.pp. 194-199
Papers
A Fuzzy-Based Simulation System for Controlling Sensor Speed in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 208-213
Papers
Mobile Social Game Design from the Perspective of Persuasive TechnologyFull-text access may be available. Sign in or learn about subscription options.pp. 221-225
Papers
Transition Analysis of Mobile Social Games from Feature-Phone to Smart-PhoneFull-text access may be available. Sign in or learn about subscription options.pp. 226-230
Papers
Feedback Capacity of Random NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 231-238
Papers
TCADS: Trustworthy, Context-Related Anomaly Detection for SmartphonesFull-text access may be available. Sign in or learn about subscription options.pp. 247-254
Papers
A Proposal of Security Advisory System at the Time of the Installation of Applications on Android OSFull-text access may be available. Sign in or learn about subscription options.pp. 261-267
Papers
Theoretical Suggestion of Policy-Based Wide Area Network Management System (wDACS System Part-I)Full-text access may be available. Sign in or learn about subscription options.pp. 268-275
Papers
Application Layer Traffic Engineering for Multipoint Communication SystemFull-text access may be available. Sign in or learn about subscription options.pp. 284-289
Papers
Proposal and Evaluation of Ant-Based Routing with Autonomous Zoning for Convergence ImprovementFull-text access may be available. Sign in or learn about subscription options.pp. 290-297
Papers
Building an Information System for Reality Mining Based on Communication TracesFull-text access may be available. Sign in or learn about subscription options.pp. 306-310
Papers
Riskr: A Low-Technological Web2.0 Disaster Service to Monitor and Share InformationFull-text access may be available. Sign in or learn about subscription options.pp. 311-318
Papers
Community Site for Music Therapists Based on the Session Records of Music TherapyFull-text access may be available. Sign in or learn about subscription options.pp. 319-325
Papers
An Interface for Simulating Node Placement in Wireless Mesh NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 326-333
Papers
Effects of Directional Receiving for MAC-Level Broadcasting on Wireless Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 334-340
Showing 100 out of 199