Default Cover Image

2017 14th International Symposium on Pervasive Systems, Algorithms and Networks & 2017 11th International Conference on Frontier of Computer Science and Technology & 2017 Third International Symposium of Creative Computing (ISPAN-FCST-ISCC)

June 21 2017 to June 23 2017

Exeter, United Kingdom

Table of Contents

[Title page i]Freely available from IEEE.pp. i-i
[Title page iii]Freely available from IEEE.pp. iii-iii
[Copypright notice]Freely available from IEEE.pp. iv-iv
Table of contentsFreely available from IEEE.pp. v-xiii
Message from I-SPAN 2017 General ChairsFreely available from IEEE.pp. xiv-xiv
Message from I-SPAN 2017 Program ChairsFreely available from IEEE.pp. xv-xvi
Message from I-SPAN 2017 Steering ChairsFreely available from IEEE.pp. xvii-xvii
I-SPAN 2017 Symposium OrganizationFreely available from IEEE.pp. xviii-xix
I-SPAN 2017 Program CommitteeFreely available from IEEE.pp. xx-xxiv
Message from FCST 2017 Program ChairsFreely available from IEEE.pp. xxv-xxv
FCST 2017 Symposium OrganizationFreely available from IEEE.pp. xxvi-xxvi
FCST 2017 Program CommitteeFreely available from IEEE.pp. xxvii-xxix
Message from ISCC 2017 General and Program ChairsFreely available from IEEE.pp. xxx-xxx
ISCC 2017 Symposium OrganizationFreely available from IEEE.pp. xxxi-xxxi
ISCC 2017 Program CommitteeFreely available from IEEE.pp. xxxii-xxxii
Message from CTA 2017 Workshop ChairsFreely available from IEEE.pp. xxxiii-xxxiii
CTA 2017 Workshop OrganizationFreely available from IEEE.pp. xxxiv-xxxiv
Message from ICTA 2017 Workshop ChairsFreely available from IEEE.pp. xxxv-xxxv
ICTA 2017 Workshop OrganizationFreely available from IEEE.pp. xxxvi-xxxvi
Message from MT4H 2017 Workshop ChairsFreely available from IEEE.pp. xxxvii-xxxvii
MT4H 2017 Workshop OrganizationFreely available from IEEE.pp. xxxviii-xxxviii
MT4H 2017 Programme CommitteeFreely available from IEEE.pp. xxxix-xxxix
Message from PCNT 2017 Workshop ChairsFreely available from IEEE.pp. xl-xl
PCNT 2017 Workshop OrganizationFreely available from IEEE.pp. xli-xli
Non-feature 3-D Rigid Intensity Image RegistrationFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
D-FS: A Novel Integration Method of Discretization and Feature SelectionFull-text access may be available. Sign in or learn about subscription options.pp. 6-13
Probabilistic Frequent Itemsets Mining Based on Expectation Bound over Uncertain DatabaseFull-text access may be available. Sign in or learn about subscription options.pp. 14-19
DPS: A DSM-based Parameter Server for Machine LearningFull-text access may be available. Sign in or learn about subscription options.pp. 20-27
On Detecting Partially Occluded Faces with Pose VariationsFull-text access may be available. Sign in or learn about subscription options.pp. 28-37
Grid-Based Indexing and Search Algorithms for Large-Scale and High-Dimensional DataFull-text access may be available. Sign in or learn about subscription options.pp. 46-51
Tight Bounds in Message Delays Despite Faults in a Class of Line Digraph NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 60-65
Linear k-Arboricity of Hypohamiltonian Graphs with Small OrderFull-text access may be available. Sign in or learn about subscription options.pp. 66-70
The Strength of Dithering in Recommender SystemFull-text access may be available. Sign in or learn about subscription options.pp. 71-78
CAre: Certificate Authority Rescue Engine for Proactive SecurityFull-text access may be available. Sign in or learn about subscription options.pp. 79-86
An Evaluation Framework for Inter-Domain Link Congestion Detection AlgorithmsFull-text access may be available. Sign in or learn about subscription options.pp. 87-92
A Study of the Decycling Problem for the Generalized Exchanged HypercubeFull-text access may be available. Sign in or learn about subscription options.pp. 93-99
Steiner Distance in Join, Corona and Threshold GraphsFull-text access may be available. Sign in or learn about subscription options.pp. 100-104
Improved Blood Pressure Estimation Using Photoplethysmography Based on Ensemble MethodFull-text access may be available. Sign in or learn about subscription options.pp. 105-111
Computer-Assisted Billiard Self-Training Using Intelligent GlassesFull-text access may be available. Sign in or learn about subscription options.pp. 119-126
A Group Handoff Scheme for the Proximity Service of Sharing Mobile Data DownloadingFull-text access may be available. Sign in or learn about subscription options.pp. 133-139
Design of LDPC Fast Encoding Based on Dynamic Memory Structure of Linked List QueueFull-text access may be available. Sign in or learn about subscription options.pp. 156-161
Spatial Signal Attenuation Model of Active RFID TagsFull-text access may be available. Sign in or learn about subscription options.pp. 162-165
High Speed Wireless USB for Internet of ThingsFull-text access may be available. Sign in or learn about subscription options.pp. 166-170
An Unmanned Aerial Vehicle Based Wireless Network for Bridging CommunicationFull-text access may be available. Sign in or learn about subscription options.pp. 179-184
New Mathematical Model for Wireless Signal Path Loss inside BuildingsFull-text access may be available. Sign in or learn about subscription options.pp. 185-190
PROTECT: Container Process Isolation Using System Call InterceptionFull-text access may be available. Sign in or learn about subscription options.pp. 191-196
Minimizing Data Access Latencies via Virtual Machine Placement Method in DatacenterFull-text access may be available. Sign in or learn about subscription options.pp. 197-202
Policy-Customized: A New Abstraction for Building Security as a ServiceFull-text access may be available. Sign in or learn about subscription options.pp. 203-210
Using Correlations for Application Monitoring in Cloud ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 211-217
Analyzing Selfish Behavior in Opportunistic NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 218-225
Differentially Private Big Data Publication via Structural Inference and Community DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 226-233
Crypt-EHRServer: Protecting Confidentiality with Attribute-Based Encryption and Encrypted Query ProcessingFull-text access may be available. Sign in or learn about subscription options.pp. 234-241
Performance Analysis of WLANs under Bursty and Correlated Video TrafficFull-text access may be available. Sign in or learn about subscription options.pp. 250-256
Developing Co-scheduling Mechanisms for Virtual Machines in CloudsFull-text access may be available. Sign in or learn about subscription options.pp. 257-264
Survivable Virtual SDN Embedding Approach for Innovative Cloud Data NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 265-271
Power-Efficient Routing of Spatial Error Tolerant Dynamic 3D NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 272-277
A Hierarchical Routing Algorithm for Satellite Networks Considering FSO CommunicationFull-text access may be available. Sign in or learn about subscription options.pp. 278-284
A Linear Programming Approach for Deadline Assignment of Update Transactions in Co-scheduling EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 285-292
Image Segmentation Based on Exponential Kernel FunctionFull-text access may be available. Sign in or learn about subscription options.pp. 293-298
A Personnel Identification Method Based on the Regional Division of a Classroom ImageFull-text access may be available. Sign in or learn about subscription options.pp. 299-304
Accurate Camera Calibration Using Iteratively Optimized Algorithm of Control PointsFull-text access may be available. Sign in or learn about subscription options.pp. 305-311
A Novel Fish Image Retrieval Method Based on Saliency Spatial PyramidFull-text access may be available. Sign in or learn about subscription options.pp. 312-317
Robust Correspondence Detection by L2E Estimator for Retinal Image RegistrationFull-text access may be available. Sign in or learn about subscription options.pp. 318-324
New Variable Regularized Partial Update Affine Projection Algorithms for Distributed EstimationFull-text access may be available. Sign in or learn about subscription options.pp. 325-330
The Reloading and Implementation of Virtual Scene Resources of Tujia Brocade on Multi-terminalFull-text access may be available. Sign in or learn about subscription options.pp. 331-335
A Security Audit of the OpenPGP FormatFull-text access may be available. Sign in or learn about subscription options.pp. 336-343
Everything is Image: CNN-based Short-Term Electrical Load Forecasting for Smart GridFull-text access may be available. Sign in or learn about subscription options.pp. 344-351
Particle-Cell Detecting and Tracking in Live-Cell Time-Lapse ImagesFull-text access may be available. Sign in or learn about subscription options.pp. 352-356
Enhancing the Availability of Docker Swarm Using Checkpoint-and-RestoreFull-text access may be available. Sign in or learn about subscription options.pp. 357-362
SmartLohas: A Smart Assistive System for Elder PeopleFull-text access may be available. Sign in or learn about subscription options.pp. 369-374
A Study of an Ideal One-Hop Broadcast Range for Vehicle Communication Network on LTE-VFull-text access may be available. Sign in or learn about subscription options.pp. 380-384
Energy Efficient Dynamic Cooperating Set Planning for CoMP in LTE/LTE-A SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 385-390
GPU-based Gray-Level Co-occurrence Matrix for Extracting Features from Magnetic Resonance ImagesFull-text access may be available. Sign in or learn about subscription options.pp. 391-396
Multi-level Grid Based Clustering and GPU Parallel ImplementationsFull-text access may be available. Sign in or learn about subscription options.pp. 397-402
Securing the Communications in a WoT/WebRTC-based Smart Healthcare ArchitectureFull-text access may be available. Sign in or learn about subscription options.pp. 403-408
Sampling Frequency for Step Detection Based on Smartphone AccelerometryFull-text access may be available. Sign in or learn about subscription options.pp. 409-413
An IoT Approach to Personalised Remote Monitoring and Management of EpilepsyFull-text access may be available. Sign in or learn about subscription options.pp. 414-418
Feature Analysis in Indoor PositioningFull-text access may be available. Sign in or learn about subscription options.pp. 419-424
Research on Fusion Encryption Algorithm for Internet of Things Monitoring EquipmentFull-text access may be available. Sign in or learn about subscription options.pp. 425-429
An Electric Power Sensor Data Oriented Data Cleaning SolutionFull-text access may be available. Sign in or learn about subscription options.pp. 430-435
Cloud-Based Video Course Recording Model for WE-TUTORFull-text access may be available. Sign in or learn about subscription options.pp. 436-440
Smart Home Futures: Algorithmic Challenges and OpportunitiesFull-text access may be available. Sign in or learn about subscription options.pp. 441-448
User Needs and Wishes in Smart Homes: What Can Artificial Intelligence Contribute?Full-text access may be available. Sign in or learn about subscription options.pp. 449-453
Creative Travel Idea Generation Based on Semantic Web and Lateral ThinkingFull-text access may be available. Sign in or learn about subscription options.pp. 462-468
A Creative Computing Based Inspiration Assistant to Poem GenerationFull-text access may be available. Sign in or learn about subscription options.pp. 469-476
Creating Opera for Mobile Media: Artistic Opportunities and Technical LimitationsFull-text access may be available. Sign in or learn about subscription options.pp. 477-484
Rapid Construction of a Big Data Analysis System with Creative Comparison MethodsFull-text access may be available. Sign in or learn about subscription options.pp. 485-490
Designing the Next Mobile App Recommender System for the GlobeFull-text access may be available. Sign in or learn about subscription options.pp. 491-500
Lessons Learned in Design and Delivery of an Introductory Styling MOOCFull-text access may be available. Sign in or learn about subscription options.pp. 501-506
Showing 100 out of 106