Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
IMIS
IMIS 2015
Generate Citations
2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS)
July 8 2015 to July 10 2015
Santa Cantarina, Brazil
Table of Contents
Title Page i
Freely available from IEEE.
pp. i-i
Title Page iii
Freely available from IEEE.
pp. iii-iii
Copyright Page
Freely available from IEEE.
pp. iv-iv
Table of Contents
Freely available from IEEE.
pp. v-xiv
Message from IMIS 2015 General Co-Chairs
Freely available from IEEE.
pp. xv-xv
Message from IMIS 2015 Program Committee Co-Chairs
Freely available from IEEE.
pp. xvi-xvi
Message from IMIS 2015 Workshops Co-Chairs
Freely available from IEEE.
pp. xvii-xvii
IMIS 2015 Conference Organization
Freely available from IEEE.
pp. xviii-xxv
IMIS 2015 Reviewers
Freely available from IEEE.
pp. xxvi-xxvi
IMIS 2015 Keynotes
Freely available from IEEE.
pp. xxvii-xxviii
Message from BDITS 2015 Workshop Co-Chairs
Freely available from IEEE.
pp. xxix-xxix
BDITS 2015 Workshop Organization
Freely available from IEEE.
pp. xxx-xxx
BDITS 2015 Reviewers
Freely available from IEEE.
pp. xxxi-xxxi
Message from esIoT 2015 Workshop Chairs
Freely available from IEEE.
pp. xxxii-xxxii
esIoT 2015 Workshop Organization
Freely available from IEEE.
pp. xxxiii-xxxiv
esIoT 2015 Reviewers
Freely available from IEEE.
pp. xxxv-xxxv
Message from ITAUC 2015 Workshop Co-Chairs
Freely available from IEEE.
pp. xxxvi-xxxvi
ITAUC 2015 Workshop Organization
Freely available from IEEE.
pp. xxxvii-xxxvii
ITAUC 2015 Reviewers
Freely available from IEEE.
pp. xxxviii-xxxviii
Message from MCNCS 2015 Workshop Co-Chairs
Freely available from IEEE.
pp. xxxix-xxxix
MCNCS 2015 Workshop Organization
Freely available from IEEE.
pp. xl-xl
MCNCS 2015 Reviewers
Freely available from IEEE.
pp. xli-xli
Message from PISPIS 2015 Workshop Chair
Freely available from IEEE.
pp. xlii-xlii
PISPIS 2015 Workshop Organization
Freely available from IEEE.
pp. xliii-xliii
PISPIS 2015 Reviewers
Freely available from IEEE.
pp. xliv-xliv
Message from SMEUCE 2015 Workshop Co-Chairs
Freely available from IEEE.
pp. xlv-xlv
SMEUCE 2015 Workshop Organization
Freely available from IEEE.
pp. xlvi-xlvi
SMEUCE 2015 Reviewers
Freely available from IEEE.
pp. xlvii-xlvii
Message from WAIS 2015 Workshop Co-Chairs
Freely available from IEEE.
pp. xlviii-xlviii
WAIS 2015 Workshop Organization
Freely available from IEEE.
pp. xlvix-xlvix
WAIS 2015 Reviewers
Freely available from IEEE.
pp. l-l
Performance Evaluation of Reactive Routing Protocols for VANETs in Urban Scenarios Following Good Simulation Practices
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
J.M. Garcia-Campos
,
D.G. Reina
,
S.L. Toral
,
N. Bessis
,
F. Barrero
,
E. Asimakopoulou
,
R. Hill
Experimental Results of a CentOS-Based Ad-Hoc Network Testbed Considering LoS Scenario
Full-text access may be available. Sign in or learn about subscription options.
pp. 9-14
by
Tetsuya Oda
,
Yi Liu
,
Keita Matsuo
,
Shinji Sakamoto
,
Makoto Ikeda
,
Leonard Barolli
Performance Evaluation of AODV, OLSR and HWMP Protocols in Ad-Hoc Networks and MANET Scenarios
Full-text access may be available. Sign in or learn about subscription options.
pp. 15-21
by
Keita Matsuo
,
Tetsuya Oda
,
Donald Elmazi
,
Shinji Sakamoto
,
Leonard Barolli
Performance Evaluation of a VANET Simulation System Using NS-3 and SUMO Considering Number of Vehicles and Crossroad Scenario
Full-text access may be available. Sign in or learn about subscription options.
pp. 22-27
by
Vladi Kolici
,
Tetsuya Oda
,
Yuki Sugihara
,
Evjola Spaho
,
Makoto Ikeda
,
Leonard Barolli
IEEE802.11 Based Vehicle-to-Vehicle Delay Tolerant Networks for Road Surveillance System in Local Areas
Full-text access may be available. Sign in or learn about subscription options.
pp. 28-33
by
Noriki Uchida
,
Go Hirakawa
,
Tomoyuki Ishida
,
Yoshikazu Arai
,
Yoshitaka Shibata
A Visual Analytics Approach for e-Learning Education
Full-text access may be available. Sign in or learn about subscription options.
pp. 34-40
by
Xin Li
,
Xuehui Zhang
,
Xin Liu
An Enhanced Java-Based Mobile Device Theft Response System
Full-text access may be available. Sign in or learn about subscription options.
pp. 41-46
by
Yongwoo Kwon
,
Inhyeok Jeon
,
Wooseok Hyun
,
Jiyoung Lim
,
Ilsun You
,
Hae-Duck J. Jeong
Evaluation of Power Consumption for Smart Devices in Web Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 47-52
by
Ken Nishimura
,
Kaoru Sugita
Hybrid Recommendation Base on Learning to Rank
Full-text access may be available. Sign in or learn about subscription options.
pp. 53-57
by
Bin Xie
,
Xinhuai Tang
,
Feilong Tang
Mobile Application to Support Community Health Workers Using GeneXus Smart Devices
Full-text access may be available. Sign in or learn about subscription options.
pp. 58-64
by
Mauro Marcelo Mattos
,
Simone Erbs da Costa
,
Luciana Pereira de Araujo
,
Shaiane Mafra Casa
,
Eric Boeing
Monitoring Patients with Mental Disorders
Full-text access may be available. Sign in or learn about subscription options.
pp. 65-70
by
Philip Moore
,
Andrew Thomas
,
Tarik Qassem
,
Nik Bessis
,
Bin Hu
Bio-inspired Routing in Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 71-77
by
Hamza Fahim
,
Nadeem Javaid
,
Zahoor Ali Khan
,
Umar Qasim
,
Shumaila Javed
,
Amir Hayat
,
Zafar Iqbal
,
Ghazanfar Rehman
Interference and Bandwidth Aware Depth Based Routing Protocols in Underwater WSNs
Full-text access may be available. Sign in or learn about subscription options.
pp. 78-85
by
Hamza Fahim
,
Nadeem Javaid
,
Umar Qasim
,
Zahoor Ali Khan
,
Shumaila Javed
,
Amir Hayat
,
Zafar Iqbal
,
Ghazanfar Rehman
Multilevel Routing Protocol for Energy Optimization in Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 86-93
by
Hamza Fahim
,
Nadeem Javaid
,
Zahoor Ali Khan
,
Umar Qasim
,
Shumaila Javed
,
Danish Mahmood
,
Zafar Iqbal
A Multi-node Renewable Algorithm Based on Charging Range in Large-Scale Wireless Sensor Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 94-100
by
Guowei Wu
,
Chi Lin
,
Ying Li
,
Lin Yao
,
Ailun Chen
Reliable Voice-Based Transactions over VoIP Communications
Full-text access may be available. Sign in or learn about subscription options.
pp. 101-108
by
Giuseppe Cattaneo
,
Luigi Catuogno
,
Fabio Petagna
,
Gianluca Roscigno
An Adaptive Routing Protocol Based on Fixed Hubs for Opportunistic Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 109-116
by
Hewerton Enes de Oliveira
,
Joao Paulo De Araujo
,
Tales Heimfarth
,
Joao Carlos Giacomin
Knowledge-Based Framework for the Virtual Communication of Public Art
Full-text access may be available. Sign in or learn about subscription options.
pp. 117-124
by
Vincenzo Lombardo
,
Rossana Damiano
,
Antonio Lieto
Trustworthiness-Based Broadcast Protocols in Wireless Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 125-132
by
Miyu Sugino
,
Shigenari Nakamura
,
Tomoya Enokido
,
Makoto Takizawa
Analysis of Node Placement in Wireless Mesh Networks Using Friedman Test: A Comparison Study for Tabu Search and Hill Climbing
Full-text access may be available. Sign in or learn about subscription options.
pp. 133-140
by
Tetsuya Oda
,
Donald Elmazi
,
Algenti Lala
,
Vladi Kolici
,
Leonard Barolli
,
Fatos Xhafa
Proposal of the Digital Contents Management System Utilizing the AR Technology
Full-text access may be available. Sign in or learn about subscription options.
pp. 141-146
by
Tsubasa Ando
,
Tomoyuki Ishida
,
Noriki Uchida
,
Yoshitaka Shibata
Supporting First Responders Localization during Crisis Management
Full-text access may be available. Sign in or learn about subscription options.
pp. 147-152
by
Massimo Ficco
,
Francesco Palmieri
,
Aniello Castiglione
Impact of Location of Road-Side Units Considering Message Suppression Method for Vehicular-DTN
Full-text access may be available. Sign in or learn about subscription options.
pp. 153-159
by
Makoto Ikeda
,
Seiichiro Ishikawa
,
Taiki Honda
,
Leonard Barolli
Qualitative Evaluation of Full Body Movements with Gesture Description Language
Full-text access may be available. Sign in or learn about subscription options.
pp. 160-165
by
Tomasz Hachaj
,
Marek R. Ogiela
Efficiency of Cognitive Information Systems Supporting Enterprise Management Tasks
Full-text access may be available. Sign in or learn about subscription options.
pp. 166-170
by
Lidia Ogiela
,
Marek R. Ogiela
Friedman Test for Analysing WMNs: A Comparison Study for Genetic Algorithms and Simulated Annealing
Full-text access may be available. Sign in or learn about subscription options.
pp. 171-178
by
Donald Elmazi
,
Tetsuya Oda
,
Shinji Sakamoto
,
Evjola Spaho
,
Leonard Barolli
,
Fatos Xhafa
Biometric Methods for Advanced Strategic Data Sharing Protocols
Full-text access may be available. Sign in or learn about subscription options.
pp. 179-183
by
Marek R. Ogiela
,
Lidia Ogiela
,
Urszula Ogiela
Estimating Software System Reliability: An Architecture-Based Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 184-191
by
Xiwen Wu
,
Linpeng Huang
,
Chen Li
,
Luxi Chen
Ensuring Application Integrity: A Survey on Techniques and Tools
Full-text access may be available. Sign in or learn about subscription options.
pp. 192-199
by
Luigi Catuogno
,
Clemente Galdi
Secure Authentication for Structured Smart Grid System
Full-text access may be available. Sign in or learn about subscription options.
pp. 200-204
by
Inshil Doh
,
Jiyoung Lim
,
Kijoon Chae
The Dark Side of the Interconnection: Security and Privacy in the Web of Things
Full-text access may be available. Sign in or learn about subscription options.
pp. 205-212
by
Luigi Catuogno
,
Stefano Turchi
Compromising Ad-Hoc Networks by Attacking Weakly Connected Dominating Set
Full-text access may be available. Sign in or learn about subscription options.
pp. 213-220
by
Chi Lin
,
Guowei Wu
,
Kangbin Yim
,
Lin Yao
,
Gang Hou
Vulnerability Analysis on the CNG Crypto Library
Full-text access may be available. Sign in or learn about subscription options.
pp. 221-224
by
Kyungroul Lee
,
Ilsun You
,
Kangbin Yim
Towards Energy Efficient Scheduling for Online Tasks in Cloud Data Centers Based on DVFS
Full-text access may be available. Sign in or learn about subscription options.
pp. 225-232
by
Weicheng Huai
,
Wei Huang
,
Shi Jin
,
Zhuzhong Qian
Multi-tenants Data Duplication Secure Storage in SaaS
Full-text access may be available. Sign in or learn about subscription options.
pp. 233-238
by
Lin Li
,
Yilei Wang
,
Yanhui Ding
,
Yongxin Zhang
Optimal Cloud Broker Method for Cloud Selection in Mobile Inter-cloud Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 239-244
by
Glaucio H.S. Carvalho
,
Isaac Woungang
,
Alagan Anpalagan
,
Leonard Barolli
,
Makoto Takizawa
A Fuzzy-Based Reliability System for JXTA-Overlay P2P Platform Considering Number of Interaction, Security, Packet Loss and Local Score Parameters
Full-text access may be available. Sign in or learn about subscription options.
pp. 245-251
by
Yi Liu
,
Shinji Sakamoto
,
Keita Matsuo
,
Leonard Barolli
,
Makoto Ikeda
,
Fatos Xhafa
Synchronization of Peers in Peer-to-Peer Publish/Subscribe Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 252-259
by
Hiroki Nakayama
,
Dilawaer Duolikun
,
Tomoya Enokido
,
Makoto Takizawa
Research on the Collaborative Analysis Technology for Source Code and Binary Executable Based upon the Unified Defect Mode Set
Full-text access may be available. Sign in or learn about subscription options.
pp. 260-264
by
Xiaobing Liang
,
Baojiang Cui
,
Yingjie Lv
,
Yilun Fu
Passive Storage Based Wireless Network Resource Management for 4G LTE
Full-text access may be available. Sign in or learn about subscription options.
pp. 265-270
by
Ran Tao
,
Wen'an Zhou
,
Xuhui Yang
,
Guanglin Han
A New Framework of Security Vulnerabilities Detection in PHP Web Application
Full-text access may be available. Sign in or learn about subscription options.
pp. 271-276
by
Jingling Zhao
,
Rulin Gong
Multi-layer Anomaly Detection for Internet Traffic Based on Data Mining
Full-text access may be available. Sign in or learn about subscription options.
pp. 277-282
by
Baojiang Cui
,
Shanshan He
,
Haifeng Jin
Security Analysis of Openstack Keystone
Full-text access may be available. Sign in or learn about subscription options.
pp. 283-288
by
Baojiang Cui
,
Tao Xi
A Secure Architecture for Data Storage in the Cloud Environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 289-291
by
Chuan Fu
,
Jun Yang
,
Zheli Liu
,
Chunfu Jia
A Dynamic Self-Adaptive Algorithm for Uploading Deferrable Big Data to the Cloud Cost-Effectively
Full-text access may be available. Sign in or learn about subscription options.
pp. 292-295
by
Baojiang Cui
,
Peilin Shi
,
Haifeng Jin
Research on the Performance of Mining Packets of Educational Network for Malware Detection between PM and VM
Full-text access may be available. Sign in or learn about subscription options.
pp. 296-300
by
Jun Yang
,
Jiangdong Deng
,
Baojiang Cui
,
Haifeng Jin
A Novel Privacy and Security Framework for the Cloud Network Services
Full-text access may be available. Sign in or learn about subscription options.
pp. 301-305
by
Irish Singh
,
K.N. Mishra
,
Antonio Alberti
,
Dhananjay Singh
,
Antonio Jara
JSON Sensor Signatures (JSS): End-to-End Integrity Protection from Constrained Device to IoT Application
Full-text access may be available. Sign in or learn about subscription options.
pp. 306-312
by
Henrich C. Pohls
Certificateless and Privacy-Enhancing Group Sharing Mechanism for the Future Internet
Full-text access may be available. Sign in or learn about subscription options.
pp. 313-318
by
Jose L. Hernandez Ramos
,
Jorge Bernal Bernabe
,
Salvador Perez Franco
,
Antonio F. Skarmeta
Towards a Human Centric Intelligent Society: Using Cloud and the Web of Everything to Facilitate New Social Infrastructures
Full-text access may be available. Sign in or learn about subscription options.
pp. 319-324
by
Ian Thoma
,
Lou Fedon
,
Antonio Jara
,
Yann Bocchi
Service Platform for Automated IoT Service Provisioning
Full-text access may be available. Sign in or learn about subscription options.
pp. 325-329
by
Timo Niemirepo
,
Markus Sihvonen
,
Vesa Jordan
,
Juhani Heinila
Big Data Processing of Bio-signal Sensors Information for Self-Management of Health and Diseases
Full-text access may be available. Sign in or learn about subscription options.
pp. 330-335
by
Diego Gachet
,
Manuel De Buenaga
,
Enrique Puertas
,
Maria T. Villalva
A Semantic Engine for Internet of Things: Cloud, Mobile Devices and Gateways
Full-text access may be available. Sign in or learn about subscription options.
pp. 336-341
by
Amelie Gyrard
,
Soumya Kanti Datta
,
Christian Bonnet
,
Karima Boudaoud
SDN Based Architecture for Clustered WSN
Full-text access may be available. Sign in or learn about subscription options.
pp. 342-347
by
Flauzac Olivier
,
Gonzalez Carlos
,
Nolot Florent
Dynamic Transmission Mode Selection and Resource Sharing Schemes for M2M Communications in Cellular Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 348-352
by
Xi Luan
,
Jianjun Wu
,
Yuxin Cheng
,
Haige Xiang
Solar Production Prediction Based on Non-linear Meteo Source Adaptation
Full-text access may be available. Sign in or learn about subscription options.
pp. 353-357
by
Mariam Barque
,
Luc Dufour
,
Dominique Genoud
,
Arnaud Zufferey
,
Bruno Ladevie
,
Jean-Jacques Bezian
Scalable Approaches to Integration in Heterogeneous IoT and M2M Scenarios
Full-text access may be available. Sign in or learn about subscription options.
pp. 358-363
by
Alex C. Olivieri
,
Gialuca Rizzo
Using 5G Technologies in the Internet of Things Handovers, Problems and Challenges
Full-text access may be available. Sign in or learn about subscription options.
pp. 364-369
by
Borja Bordel Sanchez
,
Álvaro Sánchez-Picot
,
Diego Sanchez De Rivera
Experiences with RFID Technology to Manage Information during Natural Disasters
Full-text access may be available. Sign in or learn about subscription options.
pp. 370-375
by
Miguel A. Wister
,
Pablo Pancardo
,
Francisco D. Acosta
,
J.A. Hernandez-Nolasco
,
Eddy Sanchez-Delacruz
Context-Aware Applications in Mobile Sink of Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 376-379
by
Chia-Hsin Cheng
,
Yeong-Long Shiue
,
Wei-Chia Lo
,
Hsing-Chung Chen
The Impact of Use of Information Technology Teaching for Kindergarten Education
Full-text access may be available. Sign in or learn about subscription options.
pp. 380-383
by
Yen-Tsung Lin
,
Hsing-Chung Chun
,
Shu-Hui Chuang
Double K-Folds in SVM
Full-text access may be available. Sign in or learn about subscription options.
pp. 384-387
by
Fengming Chang
,
Hsing-Chung Chen
,
Hsiang-Chuan Liu
A New Uighur Automatic Summarization Method
Full-text access may be available. Sign in or learn about subscription options.
pp. 388-393
by
Xiaodong Yan
A Patient-Driven Mobile Medical Information System Applying to Physician Clinical Care
Full-text access may be available. Sign in or learn about subscription options.
pp. 394-398
by
Ching-Kan Lo
,
Ye-Chi Wu
,
Cheng-Hung Chuang
,
Hsing-Chung Chen
A Mobile Nursing App Applying to the Wound Care and Drug Administration of Patients
Full-text access may be available. Sign in or learn about subscription options.
pp. 399-402
by
Ching-Kan Lo
,
Sin-Sen Chang
,
Cheng-Hung Chuang
,
Hsing-Chung Chen
An AP Selection with RSS Standard Deviation for Indoor Positioning in Wi-Fi
Full-text access may be available. Sign in or learn about subscription options.
pp. 403-407
by
Fong-Mao Jhuang
,
Chi-Fu Hung
,
Chiu-Ching Tuan
,
Yi-Chao Wu
,
Fang-Yie Leu
Applying Web Crawlers to Develop a Sale Management System for Online Malls
Full-text access may be available. Sign in or learn about subscription options.
pp. 408-413
by
Yu-Jen Chang
,
Fang-Yie Leu
,
Shih-Chieh Chen
,
Hei-Lam Wong
A Security Threats Measurement Model for Reducing Cloud Computing Security Risk
Full-text access may be available. Sign in or learn about subscription options.
pp. 414-419
by
Sen-Tarng Lai
,
Fang-Yie Leu
Constructing Military Smartphone Usage Criterion of Cloud-DEFSOP for Mobile Security
Full-text access may be available. Sign in or learn about subscription options.
pp. 420-425
by
Tien-Sheng Lin
,
I-Long Lin
,
Fang-Yie Leu
Showing 100 out of 124
Load More
Load All