Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
IMIS
IMIS 2011
Generate Citations
Innovative Mobile and Internet Services in Ubiquitous Computing, International Conference on
June 30 2011 to July 2 2011
Seoul, Korea
ISBN: 978-0-7695-4372-7
Table of Contents
Papers
DAD-Less MIPv6 for Reduced Handover Latency
Full-text access may be available. Sign in or learn about subscription options.
pp. 353-360
Papers
Self-Similar Properties of Spam
Full-text access may be available. Sign in or learn about subscription options.
pp. 347-352
Papers
Title Page i
Freely available from IEEE.
pp. i
Papers
Title Page iii
Freely available from IEEE.
pp. iii
Papers
[Copyright notice]
Freely available from IEEE.
pp. iv
Papers
Table of contents
Freely available from IEEE.
pp. v-xv
Papers
Message from IMIS 2011 General Co-chairs
Freely available from IEEE.
pp. xvi
Papers
Message from IMIS 2011 Program Committee Co-chairs
Freely available from IEEE.
pp. xvii-xvii
Papers
Message from IMIS 2011 International Conference Workshop Co-chairs
Freely available from IEEE.
pp. xviii
Papers
IMIS 2011 Organizing Committee
Freely available from IEEE.
pp. xix
Papers
IMIS 2011 Track Area Chairs
Freely available from IEEE.
pp. xx-xxiv
Papers
IMIS 2011 Reviewers
Freely available from IEEE.
pp. xxv-xxvii
Papers
IMIS 2011 Keynote Talk
Freely available from IEEE.
pp. xxviii
Papers
Message from ACTICS 2011 International Workshop Organizers
Freely available from IEEE.
pp. xxix
Papers
ACTICS 2011 Organizing Committee
Freely available from IEEE.
pp. xxx
Papers
ACTICS 2011 Reviewers
Freely available from IEEE.
pp. xxxi
Papers
Message from FIMIS 2011 Workshop Co-chairs
Freely available from IEEE.
pp. xxxii
Papers
FIMIS 2011 Organizing Committee
Freely available from IEEE.
pp. xxxiii
Papers
FIMIS 2011 Reviewers
Freely available from IEEE.
pp. xxxiv
Papers
Message from FINGNet 2011 International Workshop Organizers
Freely available from IEEE.
pp. xxxv
Papers
FINGNet 2011 Organizing Committee
Freely available from IEEE.
pp. xxxvi
Papers
FINGNet 2011 Reviewers
Freely available from IEEE.
pp. xxxvii
Papers
Message from IFSN 2011 International Workshop Organizers
Freely available from IEEE.
pp. xxxviii-xxxviii
Papers
IFSN 2011 Organizing Committee
Freely available from IEEE.
pp. xxxix
Papers
IFSN 2011 Reviewers
Freely available from IEEE.
pp. xl-xl
Papers
Message from ITAUC 2011 International Workshop Organizers
Freely available from IEEE.
pp. xli-xli
Papers
ITAUC 2011 Organizing Committee
Freely available from IEEE.
pp. xlii
Papers
ITAUC 2011 Reviewers
Freely available from IEEE.
pp. xliii-xliii
Papers
Message from MoMoPE 2011 International Workshop Organizers
Freely available from IEEE.
pp. xliv-xliv
Papers
MoMoPE 2011 Organizing Committee
Freely available from IEEE.
pp. xlv
Papers
MoMoPE 2011 Reviewers
Freely available from IEEE.
pp. xlvi
Papers
Message from MCNCS 2011 International Workshop Organizers
Freely available from IEEE.
pp. xlvii-xlvii
Papers
MCNCS 2011 Organizing Committee
Freely available from IEEE.
pp. xlviii
Papers
MCNCS 2011 Reviewers
Freely available from IEEE.
pp. xlvix
Papers
Message from WAIS 2011 International Workshop Organizers
Freely available from IEEE.
pp. l-l
Papers
WAIS 2011 Organizing Committee
Freely available from IEEE.
pp. li
Papers
WAIS 2011 Reviewers
Freely available from IEEE.
pp. lii-lii
Papers
The Design of Video Door Phone and Control System for Home Secure Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Ching-Lung Chang
,
Han-Yu Tsai
Papers
Reversability Assessment on Secure USB Memories
Full-text access may be available. Sign in or learn about subscription options.
pp. 6-8
by
Kyungroul Lee
,
Sitha Pho
,
Kangbin Yim
Papers
Keyboard Security: A Technological Review
Full-text access may be available. Sign in or learn about subscription options.
pp. 9-15
by
Kyungroul Lee
,
Kangbin Yim
Papers
Architecture to Support Heterogeneous Devices for Video Surveillance System
Full-text access may be available. Sign in or learn about subscription options.
pp. 16-19
by
Mohammad A. Mikki
,
Kyungroul Lee
,
Wansoo Kim
,
Kangbin Yim
Papers
An Online Migration Environment for Executing Mobile Applications on the Cloud
Full-text access may be available. Sign in or learn about subscription options.
pp. 20-27
by
Shih-Hao Hung
,
Chi-Sheng Shih
,
Jeng-Peng Shieh
,
Chen-Pang Lee
,
Yi-Hsiang Huang
Papers
A Heuristic Approach for Scalability of Multi-tiers Web Application in Clouds
Full-text access may be available. Sign in or learn about subscription options.
pp. 28-35
by
Ruiqing Chi
,
Zhuzhong Qian
,
Sanglu Lu
Papers
Performability Analysis of IaaS Cloud
Full-text access may be available. Sign in or learn about subscription options.
pp. 36-43
by
Ji Ho Kim
,
Sang Min Lee
,
Dong Seong Kim
,
Jong Sou Park
Papers
Towards Multi-criteria Cloud Service Selection
Full-text access may be available. Sign in or learn about subscription options.
pp. 44-48
by
Zia ur Rehman
,
Farookh K. Hussain
,
Omar K. Hussain
Papers
An IP Passing Protocol for Vehicular Ad Hoc Networks with Network Fragmentations
Full-text access may be available. Sign in or learn about subscription options.
pp. 49-56
by
Yuh-Shyan Chen
,
Chih-Shun Hsu
,
Wei-Han Yi
Papers
NTC: Towards Efficient Network Coding in Delay Tolerant Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 57-64
by
Baokang Zhao
,
Ziming Song
,
Jinshu Su
,
Wei Peng
,
Qiaolin Hu
Papers
Contexts-Management Strategy in Considering the Security in Urban Computing Based on Urban Design
Full-text access may be available. Sign in or learn about subscription options.
pp. 65-72
by
Hoon Ko
,
Goreti Marreiros
,
Kyung-jin An
,
Zita Vale
,
Tai-hoon Kim
,
Jong-Myoung Choi
Papers
Efficient Object Localization for Query-by-Subregion
Full-text access may be available. Sign in or learn about subscription options.
pp. 73-77
by
Yong-Hwan Lee
,
Bonam Kim
,
Heung-Jun Kim
Papers
Short-Term Prediction-Based Optimistic Object Tracking Strategy in Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 78-85
by
Jenq Muh Hsu
,
Chao Chun Chen
,
Chia Chi Li
Papers
Adaptive DDoS Detector Design Using Fast Entropy Computation Method
Full-text access may be available. Sign in or learn about subscription options.
pp. 86-93
by
Giseop No
,
Ilkyeun Ra
Papers
A Resource Perspective to Wireless Sensor Network Security
Full-text access may be available. Sign in or learn about subscription options.
pp. 94-99
by
Venkatesh Kannan
,
Sahena Ahmed
Papers
ACSP: A Novel Security Protocol against Counting Attack for UHF RFID Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 100-105
by
Ce Chen
,
Zhuzhong Qian
,
Ilsun You
,
Jue Hong
,
Sanglu Lu
Papers
"Variated Availability" Approach to the Services Manageable Delivering
Full-text access may be available. Sign in or learn about subscription options.
pp. 106-113
by
Natalia Kryvinska
,
Christine Strauss
,
Peter Zinterhof
Papers
A Formal Model for Dynamic Service Updates in Pervasive Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 114-119
by
Siqi Du
,
Linpeng Huang
,
Junqing Chen
Papers
An Effective Deadlock Prevention Mechanism for Distributed Transaction Management
Full-text access may be available. Sign in or learn about subscription options.
pp. 120-127
by
Lin Lou
,
Feilong Tang
,
Ilsun You
,
Minyi Guo
,
Yao Shen
,
Li Li
Papers
A Case for Real-World Smart Environments: The Development of a Remote Autonomous Energy Aware Monitoring System Using Next Generation Technologies
Full-text access may be available. Sign in or learn about subscription options.
pp. 128-135
by
Nicholas McLauchlan
,
Nik Bessis
"Memoxo" - Browser-Based Prototype for the Audio/Video Messages Recording
Full-text access may be available. Sign in or learn about subscription options.
pp. 136-142
by
Markus Hockner
,
Rudolf Hartjes
,
Christine Strauss
,
Natalia Kryvinska
Papers
Task Optimization Based on CPU Pipeline Technique in Multicore System
Full-text access may be available. Sign in or learn about subscription options.
pp. 143-150
by
Bo Wang
,
Yongwei Wu
,
Weimin Zheng
Papers
Display Verification IP Core Design Based on Star-Extraction and Star-Recognition Image Processing on FPGA
Full-text access may be available. Sign in or learn about subscription options.
pp. 151-155
by
Linyang Sheng
,
Jingbo Shao
,
Min Xu
,
Yuanquan Cui
Papers
Trying Linear Network Coding on a Network Flow Processor
Full-text access may be available. Sign in or learn about subscription options.
pp. 156-163
by
Peng Cao
,
Long Zheng
,
Yanchao Lu
,
Feilong Tang
,
Ilsun You
,
Minyi Guo
Papers
A Formalization of an Emulation Based Co-designed Virtual Machine
Full-text access may be available. Sign in or learn about subscription options.
pp. 164-168
by
Wei Chen
,
Weixia Xu
,
Zhiying Wang
,
Qiang Dou
,
Yongwen Wang
,
Baokang Zhao
,
Baosheng Wang
Papers
Secure Information Management Protocol Based on Linguistic Sharing Techniques
Full-text access may be available. Sign in or learn about subscription options.
pp. 169-174
by
Marek R. Ogiela
,
Urszula Ogiela
Papers
Combining Static and Dynamic Analysis to Discover Software Vulnerabilities
Full-text access may be available. Sign in or learn about subscription options.
pp. 175-181
by
Ruoyu Zhang
,
Shiqiu Huang
,
Zhengwei Qi
,
Haibin Guan
Papers
Semantic Analysis Processes in UBIAS Systems for Cognitive Data Interpretation
Full-text access may be available. Sign in or learn about subscription options.
pp. 182-185
by
Lidia Ogiela
,
Marek R. Ogiela
Papers
Information Retrieval Techniques to Grasp User Intention in Pervasive Computing Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 186-191
by
Myunggwon Hwang
,
Pankoo Kim
,
Dongjin Choi
Papers
Improvements on Sequential Minimal Optimization Algorithm for Support Vector Machine Based on Semi-sparse Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 192-199
by
Xiaopeng Yang
,
Hu Guan
,
Feilong Tang
,
Ilsun You
,
Minyi Guo
,
Yao Shen
Papers
Universal, Fast Method for iPad Forensics Imaging via USB Adapter
Full-text access may be available. Sign in or learn about subscription options.
pp. 200-207
by
Luís Gómez-Miralles
,
Joan Arnedo-Moreno
Papers
Trust-Driven Policy Enforcement through Gate Automata
Full-text access may be available. Sign in or learn about subscription options.
pp. 208-215
by
Gabriele Costa
,
Ilaria Matteucci
Papers
DDoS Attacks Detection Using GA Based Optimized Traffic Matrix
Full-text access may be available. Sign in or learn about subscription options.
pp. 216-220
by
Je Hak Lee
,
Dong Seong Kim
,
Sang Min Lee
,
Jong Sou Park
Papers
Novel Multi-bit and Multi-image Steganography Using Adaptive Embedding Algorithms with Minimum Error
Full-text access may be available. Sign in or learn about subscription options.
pp. 221-228
by
Rong-Jian Chen
,
Jui-Lin Lai
,
Shi-Jinn Horng
Papers
Buildings and Crowds: Forming Smart Cities for More Effective Disaster Management
Full-text access may be available. Sign in or learn about subscription options.
pp. 229-234
by
Eleana Asimakopoulou
,
Nik Bessis
Papers
ICTs and Effective Communication Strategies: Specific Needs of Information before, during and after Disasters
Full-text access may be available. Sign in or learn about subscription options.
pp. 235-240
by
Zemp Helena
Papers
Ubiquitous Computing and Distributed Agent-Based Simulation
Full-text access may be available. Sign in or learn about subscription options.
pp. 241-247
by
B.G.W. Craenen
,
G.K. Theodoropoulos
Papers
A PCA-based Approach to Modeling Location Update and Paging for Location Area Planning
Full-text access may be available. Sign in or learn about subscription options.
pp. 248-252
by
Jingbo Sun
,
Yue Wang
,
Jian Yuan
,
Xiuming Shan
Papers
Circuit Emulation Services over SCTP
Full-text access may be available. Sign in or learn about subscription options.
pp. 253-257
by
Shiwei Hu
,
Minyi Guo
,
Feilong Tang
,
Jingyu Zhou
,
Yao Shen
Papers
Channel Allocation for a Single Cell Cognitive Radio Network Using Genetic Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 258-264
by
Subhasree Bhattacharjee
,
Amit Konar
,
Atulya K. Nagar
Papers
A Proposal of an Application of Life Log to Remote Consultation
Full-text access may be available. Sign in or learn about subscription options.
pp. 265-270
by
Yuya Uesugi
,
Tasuku Yamamoto
,
Jun Sawamoto
,
Norihisa Segawa
,
Eiji Sugino
,
Takuto Goto
,
Hiroshi Yajima
Papers
Effect of Sink Location on Aggregation Based on Degree of Connectivity for Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 271-276
by
David Fotue
,
Foued Melakessou
,
Houda Labiod
,
Thomas Engel
Papers
Extending Wireless Sensor Network Lifetime in the LEACH-SM Protocol by Spare Selection
Full-text access may be available. Sign in or learn about subscription options.
pp. 277-282
by
Bilal Abu Bakr
,
Leszek Lilien
Papers
A Game-Theoretic Resource Allocation Algorithm Based on Utility in IEEE 802.11e
Full-text access may be available. Sign in or learn about subscription options.
pp. 283-288
by
Li Yishan
,
Li Yuhong
,
Li Tao
Papers
Modeling and Analysis of Cloud Computing Availability Based on Eucalyptus Platform for E-Government Data Center
Full-text access may be available. Sign in or learn about subscription options.
pp. 289-296
by
Sok Chuob
,
Manish Pokharel
,
Jong Sou Park
Papers
Personalized Information Recommendataion Using Hybrid CBR and CSP in a Ubiquitous Computing Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 297-303
by
Mye Sohn
,
Hyunwoo Kim
,
Hyun Jung Lee
Papers
A Novel Mobility Management Mechanism Based on Destination Address Overwritten and ID/Locator Separation
Full-text access may be available. Sign in or learn about subscription options.
pp. 304-309
by
Hou Yunjing
,
Li Yuhong
,
Yu Liang
Papers
Secure Mobility Management Scheme for 6LoWPAN ID/Locator Split Architecture
Full-text access may be available. Sign in or learn about subscription options.
pp. 310-315
by
Antonio J. Jara
,
Leandro Marin
,
Antonio F.G. Skarmeta
,
Dhananjay Singh
,
Gohel Bakul
,
Daeyeoul Kim
Papers
Cost-Optimal Validation Mechanisms and Cheat-Detection for Crowdsourcing Platforms
Full-text access may be available. Sign in or learn about subscription options.
pp. 316-321
by
Matthias Hirth
,
Tobias Hoßfeld
,
Phuoc Tran-Gia
Papers
Anatomy of a Crowdsourcing Platform - Using the Example of Microworkers.com
Full-text access may be available. Sign in or learn about subscription options.
pp. 322-329
by
Matthias Hirth
,
Tobias Hoßfeld
,
Phuoc Tran-Gia
Papers
An Evaluation of QoE in Cloud Gaming Based on Subjective Tests
Full-text access may be available. Sign in or learn about subscription options.
pp. 330-335
by
Michael Jarschel
,
Daniel Schlosser
,
Sven Scheuring
,
Tobias Hoßfeld
Papers
Functional Composition and Its Challenges
Full-text access may be available. Sign in or learn about subscription options.
pp. 336-340
by
Abbas Siddiqui
,
Rahamatullah Khondoker
,
Bernd Reuther
,
Paul Mueller
,
Christian Henke
,
Helge Backhaus
Papers
Secure Code Dissemination Using Energy-Efficient Minimal Virtual Backbone in Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 341-346
by
Jisun Kim
,
Jiyoung Lim
,
Kijoon Chae
Papers
CoLib: Client Library for Effective Development of WebDAV-based Collaborative Application
Full-text access may be available. Sign in or learn about subscription options.
pp. 361-365
by
Hong-Chang Lee
,
Bo-Hyeon Kim
,
Myung-Joon Lee
Papers
Gregex: GPU Based High Speed Regular Expression Matching Engine
Full-text access may be available. Sign in or learn about subscription options.
pp. 366-370
by
Lei Wang
,
Shuhui Chen
,
Yong Tang
,
Jinshu Su
Papers
A Network Security Evaluation Method Framework Based on Multiple Criteria Decision Making Theory
Full-text access may be available. Sign in or learn about subscription options.
pp. 371-375
by
Zhao Jinjing
,
Wen Yan
,
Wang Dongxia
Papers
A Framework of Network Security Situation Analysis Based on the Technologies of Event Correlation and Situation Assessment
Full-text access may be available. Sign in or learn about subscription options.
pp. 376-380
by
Feng Xuewei
,
Wang Dongxia
,
Ke Shanwen
,
Ma Guoqing
,
Li Jin
Papers
Energy Optimal Selection of Access Points in Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 381-387
by
Qin Xin
,
Xiaolan Yao
,
Wei He
Papers
Building Practical Self Organization Networks on Heterogeneous Wireless Modems
Full-text access may be available. Sign in or learn about subscription options.
pp. 388-393
by
Zhu Tang
,
Bo Liu
,
Baokang Zhao
,
Wanrong Yu
,
Chunqing Wu
,
Wei Peng
,
Bin Bai
,
Yanpeng Ma
Papers
Snail Crawling: An Enhanced Method for DTNs Routing
Full-text access may be available. Sign in or learn about subscription options.
pp. 394-397
by
Bing Bai
,
Jinshu Su
,
Baokang Zhao
,
Wanrong Yu
,
Ling Wen
Papers
Towards Practical IPSec over Challenged Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 398-402
by
Jing Tao
,
Baosheng Wang
Papers
Aquarius: A Tiny Hypervisor to Introspect Commodity OSes in a Non-bypassable Way
Full-text access may be available. Sign in or learn about subscription options.
pp. 403-407
by
Yan Wen
,
Jinjing Zhao
,
Minhuan Huang
,
Hua Chen
Papers
Performance of Energy Efficient Relay and Minimum Distance Clustering for Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 408-413
by
Yung-Fa Huang
,
Hsing-Chung Chen
,
Li-Ming Wang
,
Jhao-Wei Guo
Showing 100 out of 144
Load More
Load All