Default Cover Image

2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS)

July 2 2014 to July 4 2014

Birmingham, United Kingdom

Table of Contents

Title Page iFreely available from IEEE.pp. i-i
Title Page iiiFreely available from IEEE.pp. iii-iii
Copyright PageFreely available from IEEE.pp. iv-iv
Table of ContentsFreely available from IEEE.pp. v-xv
Message from General ChairsFreely available from IEEE.pp. xvi-xvii
Message from Program Committee Co-ChairsFreely available from IEEE.pp. xviii-xviii
Message from Workshop Co-ChairsFreely available from IEEE.pp. xix-xix
Organizing CommitteeFreely available from IEEE.pp. xx-xxvi
ReviewersFreely available from IEEE.pp. xxvii-xxviii
IMIS ACTICS Welcome MessageFreely available from IEEE.pp. xxix-xxix
IMIS ACTICS Organizing CommitteeFreely available from IEEE.pp. xxx-xxx
IMIS ACTICS ReviewersFreely available from IEEE.pp. xxxi-xxxi
IMIS esIoT Welcome MessageFreely available from IEEE.pp. xxxii-xxxii
IMIS esIoT Organizing CommitteeFreely available from IEEE.pp. xxxiii-xxxiv
IMIS esIoT ReviewersFreely available from IEEE.pp. xxxv-xxxv
IMIS FINGNet Welcome MessageFreely available from IEEE.pp. xxxvi-xxxvi
IMIS FINGNet Organizing CommitteeFreely available from IEEE.pp. xxxvii-xxxvii
IMIS FINGNet ReviewersFreely available from IEEE.pp. xxxviii-xxxviii
IMIS ITAUC Welcome MessageFreely available from IEEE.pp. xxxix-xxxix
IMIS ITAUC Organizing CommitteeFreely available from IEEE.pp. xl-xl
IMIS ITAUC ReviewersFreely available from IEEE.pp. xli-xli
IMIS MCNCS Welcome MessageFreely available from IEEE.pp. xlii-xlii
IMIS MCNCS Organizing CommitteeFreely available from IEEE.pp. xliii-xliii
IMIS MCNCS ReviewersFreely available from IEEE.pp. xliv-xliv
IMIS PISPIS Welcome MessageFreely available from IEEE.pp. xlv-xlv
IMIS PISPIS Organizing CommitteeFreely available from IEEE.pp. xlvi-xlvi
IMIS PISPIS ReviewersFreely available from IEEE.pp. xlvii-xlvii
IMIS SMEUCE Welcome MessageFreely available from IEEE.pp. xlviii-xlviii
IMIS SMEUCE Organizing CommitteeFreely available from IEEE.pp. xlvix-xlvix
IMIS SMEUCE ReviewersFreely available from IEEE.pp. l-l
IMIS WAIS Welcome MessageFreely available from IEEE.pp. li-li
IMIS WAIS Organizing CommitteeFreely available from IEEE.pp. lii-lii
IMIS WAIS ReviewersFreely available from IEEE.pp. liii-liii
Thermal-Aware Task Placement with Dynamic Thermal Model in an Established DatacenterFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
The GEO-Cloud Experiment: Global Earth Observation System Computed in CloudFull-text access may be available. Sign in or learn about subscription options.pp. 9-15
Visions and Challenges for Sensor Network Collaboration in the CloudFull-text access may be available. Sign in or learn about subscription options.pp. 16-22
Architecture Reconfiguration in Pervasive Environment: An AADL-based ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 23-30
Construction of Scholarly n-Gram from Huge Text DataFull-text access may be available. Sign in or learn about subscription options.pp. 31-35
A New Method of Measuring Document Similarity for Movie RecommendationFull-text access may be available. Sign in or learn about subscription options.pp. 41-44
Large Imbalance Data Classification Based on MapReduce for Traffic Accident PredictionFull-text access may be available. Sign in or learn about subscription options.pp. 45-49
Scenario-Based Behavioral Nonexistent Consistency Checking for Cyber-Physical SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 58-65
Data De-duplication on Similar File DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 66-73
An Enhanced Quantum PageRank Algorithm Integrated with Quantum SearchFull-text access may be available. Sign in or learn about subscription options.pp. 74-81
Conceptual Similarity Calculation Using Common-Context between Comparatives on OntologyFull-text access may be available. Sign in or learn about subscription options.pp. 82-89
On Semantic Techniques for Intelligent ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 90-95
Fast Multi-line Detection and Tracking with CUDA for Vision-Based UAV AutopilotFull-text access may be available. Sign in or learn about subscription options.pp. 96-101
Keyword-Based SPARQL Query Generation System to Improve Semantic Tractability on LOD CloudFull-text access may be available. Sign in or learn about subscription options.pp. 102-109
A Dissemination Analysis in Mobile Wireless Ad Hoc Networks Using Probabilistic BroadcastFull-text access may be available. Sign in or learn about subscription options.pp. 110-114
A Cross-Layer Design Scheme Based on Integrated Management Applied in Wireless CommunicationFull-text access may be available. Sign in or learn about subscription options.pp. 115-120
Cost-Effective Proxy-LMA Mobility Management Scheme in Mobile Networks with Global Mobility SupportFull-text access may be available. Sign in or learn about subscription options.pp. 121-127
Developing Useful Mobile Applications in Cross-Media PlatformsFull-text access may be available. Sign in or learn about subscription options.pp. 128-132
Mobile Gateway for Ubiquitous Health Care System Using ZigBee and BluetoothFull-text access may be available. Sign in or learn about subscription options.pp. 139-145
SODiCS on Challenged Communication EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 152-158
Seamless SPMIPv6-Based Handoff Scheme for Next-Generation Mobile NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 159-165
Analytical Modeling of IP-based Hierarchical Mobility Management ProtocolsFull-text access may be available. Sign in or learn about subscription options.pp. 166-171
A Case Study for Potential Carpooling in BeijingFull-text access may be available. Sign in or learn about subscription options.pp. 172-177
An Exercise Data Logging System for Retrofitting Gym EquipmentFull-text access may be available. Sign in or learn about subscription options.pp. 178-185
Unsupervised Learning of GDL ClassifierFull-text access may be available. Sign in or learn about subscription options.pp. 186-191
Cognitive Management SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 192-195
Facial Feature Extraction Using an Active Appearance Model on the iPhoneFull-text access may be available. Sign in or learn about subscription options.pp. 196-201
Efficient Compression Algorithm for H.264/AVC Intra-prediction Using an Activity MapFull-text access may be available. Sign in or learn about subscription options.pp. 202-206
Feature Mining for Machine Learning Based Compilation OptimizationFull-text access may be available. Sign in or learn about subscription options.pp. 207-214
Exploring the Design Space for Android SmartphonesFull-text access may be available. Sign in or learn about subscription options.pp. 215-222
PasDroid: Real-Time Security Enhancement for AndroidFull-text access may be available. Sign in or learn about subscription options.pp. 229-235
Efficient Identification of Windows Executable Programs to Prevent Software PiracyFull-text access may be available. Sign in or learn about subscription options.pp. 236-240
On Security-Effective and Global Mobility Management for FPMIPv6 NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 247-253
Cryptographic Techniques in Advanced Information ManagementFull-text access may be available. Sign in or learn about subscription options.pp. 254-257
A Role-Based RSA Key Management Approach in a Hierarchy SchemeFull-text access may be available. Sign in or learn about subscription options.pp. 258-264
Adaptive Stealth Energy-Related DoS Attacks against Cloud Data CentersFull-text access may be available. Sign in or learn about subscription options.pp. 265-272
How to Find an Appropriate K for K-AnonymizationFull-text access may be available. Sign in or learn about subscription options.pp. 273-279
Elliptic Curve Scalar Multiplication with a Bijective TransformFull-text access may be available. Sign in or learn about subscription options.pp. 280-286
Identifying Windows Installer Package Files for Detection of Pirated SoftwareFull-text access may be available. Sign in or learn about subscription options.pp. 287-290
The Impact of TDMA Frame Size on Latency in a Neighbor-Aware VANET MACFull-text access may be available. Sign in or learn about subscription options.pp. 291-296
An Evaluation Environment and Methodology for Automotive Media Streaming ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 297-304
Evaluation of Sleep Scheduling Method for Data Collection from Sensor Networks Divided into Local AreasFull-text access may be available. Sign in or learn about subscription options.pp. 316-321
Flexible, Direct Interactions between CoAP-enabled IoT DevicesFull-text access may be available. Sign in or learn about subscription options.pp. 322-327
Challenges of the Internet of Things: IPv6 and Network ManagementFull-text access may be available. Sign in or learn about subscription options.pp. 328-333
Towards Privacy-Preserving Data Sharing in Smart EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 334-339
Extending Extensible Authentication Protocol over IEEE 802.15.4 NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 340-345
A System to Enable Level-of-Detail Mobile Interaction with Augmented Media ObjectsFull-text access may be available. Sign in or learn about subscription options.pp. 346-351
A Mobile Crowdsourcing Platform for Urban Infrastructure MaintenanceFull-text access may be available. Sign in or learn about subscription options.pp. 358-363
Reusing Web-Enabled Actuators from a Semantic Space-Based PerspectiveFull-text access may be available. Sign in or learn about subscription options.pp. 370-375
Big Data for Cyber Physical Systems: An Analysis of Challenges, Solutions and OpportunitiesFull-text access may be available. Sign in or learn about subscription options.pp. 376-380
Top-k Queries in Wireless Sensor Networks Leveraging Hierarchical Grid IndexFull-text access may be available. Sign in or learn about subscription options.pp. 381-386
Exploiting the Internet of Things for Systems Engineering: Breaking Down the Barriers between Siloed Engineering TeamsFull-text access may be available. Sign in or learn about subscription options.pp. 393-398
Smart City Data Stream Visualization Using GlyphsFull-text access may be available. Sign in or learn about subscription options.pp. 399-403
Chronic Patients Monitoring Using Wireless Sensors and Big Data ProcessingFull-text access may be available. Sign in or learn about subscription options.pp. 404-408
Showing 100 out of 136