Default Cover Image

2015 IEEE Twelfth International Symposium on Autonomous Decentralized System (ISADS)

March 25 2015 to March 27 2015

Taichung, Taiwan

Table of Contents

Title Page iFreely available from IEEE.pp. i-i
Title Page iiiFreely available from IEEE.pp. iii-iii
Copyright PageFreely available from IEEE.pp. iv-iv
Table of ContentsFreely available from IEEE.pp. v-ix
Message from the General ChairFreely available from IEEE.pp. x-x
Message from the Steering Committee ChairFreely available from IEEE.pp. xi-xii
Message from the ISADS Program Co-ChairsFreely available from IEEE.pp. xiii-xiii
ISADS 2015 Organizing CommitteesFreely available from IEEE.pp. xiv-xiv
ISADS 2015 Program CommitteeFreely available from IEEE.pp. xv-xv
ADROIT Systems 2015 CommitteesFreely available from IEEE.pp. xvi-xvi
SADEI 2015 CommitteesFreely available from IEEE.pp. xvii-xvii
SASWIM 2015 CommitteesFreely available from IEEE.pp. xviii-xviii
SmartGridComNet 2015 CommitteesFreely available from IEEE.pp. xix-xix
Keynote 1Full-text access may be available. Sign in or learn about subscription options.pp. xx-xx
Keynote 2Full-text access may be available. Sign in or learn about subscription options.pp. xxi-xxi
[Various abstract-only presentations - 9 abstracts]Full-text access may be available. Sign in or learn about subscription options.pp. xxii-xxxii
VOBC Data Storage and Online Diagnosing System Based on Data CloudFull-text access may be available. Sign in or learn about subscription options.pp. 5-8
Autonomous Decentralized Semantic Based URL Filtering System for Low LatencyFull-text access may be available. Sign in or learn about subscription options.pp. 9-16
Workload Estimation for Improving Resource Management Decisions in the CloudFull-text access may be available. Sign in or learn about subscription options.pp. 25-32
Enhancing the Performance of Tree Algorithm Using Re-split MechanismFull-text access may be available. Sign in or learn about subscription options.pp. 35-39
Autonomous Decentralized Combinatorial TestingFull-text access may be available. Sign in or learn about subscription options.pp. 40-47
Web-Based Performance Monitor for Distributed ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 48-55
Physiological-Signal-Based Key Negotiation Protocols for Body Sensor Networks: A SurveyFull-text access may be available. Sign in or learn about subscription options.pp. 63-70
Trust-Based Task Assignment in Autonomous Service-Oriented Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 71-77
Flexible Manufacturing System with CC-Link Network DescentralizedFull-text access may be available. Sign in or learn about subscription options.pp. 78-86
Implementation of an Agent-Based Manufacturing GridFull-text access may be available. Sign in or learn about subscription options.pp. 101-108
Tourism Service Composition Based on Multi-objective OptimizationFull-text access may be available. Sign in or learn about subscription options.pp. 117-122
Analysis of Industrial Control Systems Traffic Based on Time SeriesFull-text access may be available. Sign in or learn about subscription options.pp. 123-129
The Design and Implementation of an Automatic Burdening System Based on ProviewFull-text access may be available. Sign in or learn about subscription options.pp. 139-144
A Foot-Mounted Sensor Based 3D Indoor Positioning ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 145-150
A Hybrid Feature Based Mobile Forensics SystemFull-text access may be available. Sign in or learn about subscription options.pp. 151-155
Robot as a Service in Computing CurriculumFull-text access may be available. Sign in or learn about subscription options.pp. 156-161
Rehabilitation Training System for the Motor Deficit of Upper ExtremityFull-text access may be available. Sign in or learn about subscription options.pp. 162-166
The Research Synopsis about SWIM in ChinaFull-text access may be available. Sign in or learn about subscription options.pp. 171-174
Real-Time Oriented System Wide Information Management for Service AssuranceFull-text access may be available. Sign in or learn about subscription options.pp. 175-180
QoS Implementation in System Wide Information Management (SWIM) Network ModelFull-text access may be available. Sign in or learn about subscription options.pp. 181-184
The Sender Controlled Security Model for Message ServiceFull-text access may be available. Sign in or learn about subscription options.pp. 187-191
Autonomous Decentralized Tenant Access Control Model for Sub-tenancy Architecture in Software-as-a-Service (SaaS)Full-text access may be available. Sign in or learn about subscription options.pp. 211-216
A Semantic Approach for Traceability Link Recovery in Aerospace Requirements Management SystemFull-text access may be available. Sign in or learn about subscription options.pp. 217-222
A Study of Emulator with Trema for Ad-hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 225-229
Preventing Attacks in Real-Time through the Use of a Dummy ServerFull-text access may be available. Sign in or learn about subscription options.pp. 236-241
Theoretical Analysis of Pure Waiting Time for Battery Charging While Doing SomethingFull-text access may be available. Sign in or learn about subscription options.pp. 242-247
A Stackelberg Game Approach for Energy Management in Smart Distribution Systems with Multiple MicrogridsFull-text access may be available. Sign in or learn about subscription options.pp. 248-253
A Security Mechanism for Demand Response Using RBAC and Pub/subFull-text access may be available. Sign in or learn about subscription options.pp. 260-265
Energy Efficiency Scheme with Cellular Partition Zooming for Massive MIMO SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 266-271
An Optimal Information Centric Networking Model for the Future Green NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 272-277
Study on Authentication Protocol of SDN Trusted DomainFull-text access may be available. Sign in or learn about subscription options.pp. 281-284
Lane Detection Method Based on Improved RANSAC AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 285-288
Affinity and Conflict-Aware Placement of Virtual Machines in Heterogeneous Data CentersFull-text access may be available. Sign in or learn about subscription options.pp. 289-294
A Full Symbolic Reachability Analysis Algorithm of Timed Automata Based on BDDFull-text access may be available. Sign in or learn about subscription options.pp. 301-304
Author IndexFreely available from IEEE.pp. 305-306
Roster PageFreely available from IEEE.pp. 308-308
Showing 64 out of 64