Default Cover Image

2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS)

July 8 2015 to July 10 2015

Santa Cantarina, Brazil

Table of Contents

Title Page iFreely available from IEEE.pp. i-i
Title Page iiiFreely available from IEEE.pp. iii-iii
Copyright PageFreely available from IEEE.pp. iv-iv
Table of ContentsFreely available from IEEE.pp. v-xiv
Message from IMIS 2015 General Co-ChairsFreely available from IEEE.pp. xv-xv
Message from IMIS 2015 Program Committee Co-ChairsFreely available from IEEE.pp. xvi-xvi
Message from IMIS 2015 Workshops Co-ChairsFreely available from IEEE.pp. xvii-xvii
IMIS 2015 Conference OrganizationFreely available from IEEE.pp. xviii-xxv
IMIS 2015 ReviewersFreely available from IEEE.pp. xxvi-xxvi
IMIS 2015 KeynotesFreely available from IEEE.pp. xxvii-xxviii
Message from BDITS 2015 Workshop Co-ChairsFreely available from IEEE.pp. xxix-xxix
BDITS 2015 Workshop OrganizationFreely available from IEEE.pp. xxx-xxx
BDITS 2015 ReviewersFreely available from IEEE.pp. xxxi-xxxi
Message from esIoT 2015 Workshop ChairsFreely available from IEEE.pp. xxxii-xxxii
esIoT 2015 Workshop OrganizationFreely available from IEEE.pp. xxxiii-xxxiv
esIoT 2015 ReviewersFreely available from IEEE.pp. xxxv-xxxv
Message from ITAUC 2015 Workshop Co-ChairsFreely available from IEEE.pp. xxxvi-xxxvi
ITAUC 2015 Workshop OrganizationFreely available from IEEE.pp. xxxvii-xxxvii
ITAUC 2015 ReviewersFreely available from IEEE.pp. xxxviii-xxxviii
Message from MCNCS 2015 Workshop Co-ChairsFreely available from IEEE.pp. xxxix-xxxix
MCNCS 2015 Workshop OrganizationFreely available from IEEE.pp. xl-xl
MCNCS 2015 ReviewersFreely available from IEEE.pp. xli-xli
Message from PISPIS 2015 Workshop ChairFreely available from IEEE.pp. xlii-xlii
PISPIS 2015 Workshop OrganizationFreely available from IEEE.pp. xliii-xliii
PISPIS 2015 ReviewersFreely available from IEEE.pp. xliv-xliv
Message from SMEUCE 2015 Workshop Co-ChairsFreely available from IEEE.pp. xlv-xlv
SMEUCE 2015 Workshop OrganizationFreely available from IEEE.pp. xlvi-xlvi
SMEUCE 2015 ReviewersFreely available from IEEE.pp. xlvii-xlvii
Message from WAIS 2015 Workshop Co-ChairsFreely available from IEEE.pp. xlviii-xlviii
WAIS 2015 Workshop OrganizationFreely available from IEEE.pp. xlvix-xlvix
WAIS 2015 ReviewersFreely available from IEEE.pp. l-l
A Visual Analytics Approach for e-Learning EducationFull-text access may be available. Sign in or learn about subscription options.pp. 34-40
An Enhanced Java-Based Mobile Device Theft Response SystemFull-text access may be available. Sign in or learn about subscription options.pp. 41-46
Evaluation of Power Consumption for Smart Devices in Web ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 47-52
Hybrid Recommendation Base on Learning to RankFull-text access may be available. Sign in or learn about subscription options.pp. 53-57
Monitoring Patients with Mental DisordersFull-text access may be available. Sign in or learn about subscription options.pp. 65-70
Bio-inspired Routing in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 71-77
A Multi-node Renewable Algorithm Based on Charging Range in Large-Scale Wireless Sensor NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 94-100
Reliable Voice-Based Transactions over VoIP CommunicationsFull-text access may be available. Sign in or learn about subscription options.pp. 101-108
Knowledge-Based Framework for the Virtual Communication of Public ArtFull-text access may be available. Sign in or learn about subscription options.pp. 117-124
Trustworthiness-Based Broadcast Protocols in Wireless NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 125-132
Proposal of the Digital Contents Management System Utilizing the AR TechnologyFull-text access may be available. Sign in or learn about subscription options.pp. 141-146
Supporting First Responders Localization during Crisis ManagementFull-text access may be available. Sign in or learn about subscription options.pp. 147-152
Qualitative Evaluation of Full Body Movements with Gesture Description LanguageFull-text access may be available. Sign in or learn about subscription options.pp. 160-165
Efficiency of Cognitive Information Systems Supporting Enterprise Management TasksFull-text access may be available. Sign in or learn about subscription options.pp. 166-170
Biometric Methods for Advanced Strategic Data Sharing ProtocolsFull-text access may be available. Sign in or learn about subscription options.pp. 179-183
Estimating Software System Reliability: An Architecture-Based ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 184-191
Ensuring Application Integrity: A Survey on Techniques and ToolsFull-text access may be available. Sign in or learn about subscription options.pp. 192-199
Secure Authentication for Structured Smart Grid SystemFull-text access may be available. Sign in or learn about subscription options.pp. 200-204
The Dark Side of the Interconnection: Security and Privacy in the Web of ThingsFull-text access may be available. Sign in or learn about subscription options.pp. 205-212
Compromising Ad-Hoc Networks by Attacking Weakly Connected Dominating SetFull-text access may be available. Sign in or learn about subscription options.pp. 213-220
Vulnerability Analysis on the CNG Crypto LibraryFull-text access may be available. Sign in or learn about subscription options.pp. 221-224
Towards Energy Efficient Scheduling for Online Tasks in Cloud Data Centers Based on DVFSFull-text access may be available. Sign in or learn about subscription options.pp. 225-232
Multi-tenants Data Duplication Secure Storage in SaaSFull-text access may be available. Sign in or learn about subscription options.pp. 233-238
Synchronization of Peers in Peer-to-Peer Publish/Subscribe SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 252-259
Passive Storage Based Wireless Network Resource Management for 4G LTEFull-text access may be available. Sign in or learn about subscription options.pp. 265-270
A New Framework of Security Vulnerabilities Detection in PHP Web ApplicationFull-text access may be available. Sign in or learn about subscription options.pp. 271-276
Multi-layer Anomaly Detection for Internet Traffic Based on Data MiningFull-text access may be available. Sign in or learn about subscription options.pp. 277-282
Security Analysis of Openstack KeystoneFull-text access may be available. Sign in or learn about subscription options.pp. 283-288
A Secure Architecture for Data Storage in the Cloud EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 289-291
A Dynamic Self-Adaptive Algorithm for Uploading Deferrable Big Data to the Cloud Cost-EffectivelyFull-text access may be available. Sign in or learn about subscription options.pp. 292-295
A Novel Privacy and Security Framework for the Cloud Network ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 301-305
JSON Sensor Signatures (JSS): End-to-End Integrity Protection from Constrained Device to IoT ApplicationFull-text access may be available. Sign in or learn about subscription options.pp. 306-312
Service Platform for Automated IoT Service ProvisioningFull-text access may be available. Sign in or learn about subscription options.pp. 325-329
A Semantic Engine for Internet of Things: Cloud, Mobile Devices and GatewaysFull-text access may be available. Sign in or learn about subscription options.pp. 336-341
SDN Based Architecture for Clustered WSNFull-text access may be available. Sign in or learn about subscription options.pp. 342-347
Dynamic Transmission Mode Selection and Resource Sharing Schemes for M2M Communications in Cellular NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 348-352
Scalable Approaches to Integration in Heterogeneous IoT and M2M ScenariosFull-text access may be available. Sign in or learn about subscription options.pp. 358-363
Context-Aware Applications in Mobile Sink of Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 376-379
The Impact of Use of Information Technology Teaching for Kindergarten EducationFull-text access may be available. Sign in or learn about subscription options.pp. 380-383
Double K-Folds in SVMFull-text access may be available. Sign in or learn about subscription options.pp. 384-387
A New Uighur Automatic Summarization MethodFull-text access may be available. Sign in or learn about subscription options.pp. 388-393
A Patient-Driven Mobile Medical Information System Applying to Physician Clinical CareFull-text access may be available. Sign in or learn about subscription options.pp. 394-398
A Mobile Nursing App Applying to the Wound Care and Drug Administration of PatientsFull-text access may be available. Sign in or learn about subscription options.pp. 399-402
An AP Selection with RSS Standard Deviation for Indoor Positioning in Wi-FiFull-text access may be available. Sign in or learn about subscription options.pp. 403-407
Applying Web Crawlers to Develop a Sale Management System for Online MallsFull-text access may be available. Sign in or learn about subscription options.pp. 408-413
A Security Threats Measurement Model for Reducing Cloud Computing Security RiskFull-text access may be available. Sign in or learn about subscription options.pp. 414-419
Constructing Military Smartphone Usage Criterion of Cloud-DEFSOP for Mobile SecurityFull-text access may be available. Sign in or learn about subscription options.pp. 420-425
Showing 100 out of 124