Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
NBIS
NBIS 2013
Generate Citations
2013 16th International Conference on Network-Based Information Systems (NBiS)
Sept. 4 2013 to Sept. 6 2013
Seo-gu, Gwangju, CA, Korea (South)
Table of Contents
Title Page i
Freely available from IEEE.
pp. i-i
Title Page iii
Freely available from IEEE.
pp. iii-iii
Copyright Page
Freely available from IEEE.
pp. iv-iv
Table of Contents
Freely available from IEEE.
pp. v-xiii
NBiS 2013: Welcome Message from the Steering Committee Co-chairs
Freely available from IEEE.
pp. xiv-xiv
NBiS 2013: Welcome Message from the General Co-chairs
Freely available from IEEE.
pp. xv-xv
NBiS 2013: Welcome Message from the Program Committee Co-chairs
Freely available from IEEE.
pp. xvi-xvi
NBiS 2013: Welcome Message from the Workshops Co-chairs
Freely available from IEEE.
pp. xvii-xviii
NBiS 2013: Organization Committee
Freely available from IEEE.
pp. xix-xxvi
NBiS 2013: Reviewers
Freely available from IEEE.
pp. xxvii-xxvii
NBiS 2013: Keynote Talk
Full-text access may be available. Sign in or learn about subscription options.
pp. xxviii-xxviii
by
David Taniar
ADPNA 2013: Welcome Message from the Workshop Organizers
Freely available from IEEE.
pp. xxix-xxix
ADPNA 2013: Organizing Committee
Freely available from IEEE.
pp. xxx-xxx
ADPNA 2013: Reviewers
Freely available from IEEE.
pp. xxxi-xxxi
DEMoC 2013: Welcome Message from the Workshop Chair
Freely available from IEEE.
pp. xxxii-xxxii
DEMoC 2013: Organizing Committee
Freely available from IEEE.
pp. xxxiii-xxxiii
DEMoC 2013: Reviewers
Freely available from IEEE.
pp. xxxiv-xxxiv
HETNET 2013: Welcome Message from the Workshop Organizers
Freely available from IEEE.
pp. xxxv-xxxv
HETNET 2013: Organizing Committee
Freely available from IEEE.
pp. xxxvi-xxxvi
HETNET 2013: Reviewers
Freely available from IEEE.
pp. xxxvii-xxxvii
INVITE 2013: Welcome Message from the Workshop Chair
Freely available from IEEE.
pp. xxxviii-xxxviii
INVITE 2013: Organizing Committee
Freely available from IEEE.
pp. xxxix-xxxix
INVITE 2013: Reviewers
Freely available from IEEE.
pp. xl-xl
INWC 2013: Welcome Message from the Workshop Oranizers
Freely available from IEEE.
pp. xli-xli
INWC 2013: Organizing Committee
Freely available from IEEE.
pp. xlii-xlii
INWC 2013: Reviewers
Freely available from IEEE.
pp. xliii-xliii
ISSE 2013: Welcome Message from the Workshop Co-chairs
Freely available from IEEE.
pp. xliv-xliv
ISSE 2013: Organizing Committee
Freely available from IEEE.
pp. xlv-xlv
ISSE 2013: Reviewers
Freely available from IEEE.
pp. xlvi-xlvi
ITIS 2013: Welcome Message from the Workshop Co-chairs
Freely available from IEEE.
pp. xlvii-xlvii
ITIS 2013: Organizing Committee
Freely available from IEEE.
pp. xlviii-xlviii
ITIS 2013: Reviewers
Freely available from IEEE.
pp. xlvix-xlvix
MCCTA 2013: Welcome Message from the Workshop Organizers
Freely available from IEEE.
pp. l-li
MCCTA 2013: Organizing Committee
Freely available from IEEE.
pp. lii-lii
MCCTA 2013: Reviewers
Freely available from IEEE.
pp. liii-liii
NeoFusion 2013: Welcome Message from the Organizers
Freely available from IEEE.
pp. liv-liv
NeoFusion 2013: Organizing Committee
Freely available from IEEE.
pp. lv-lv
NeoFusion 2013: Reviewers
Freely available from IEEE.
pp. lvi-lvi
TwC 2013: Welcome Message from the Workshop Co-chairs
Freely available from IEEE.
pp. lvii-lvii
TwC 2013: Organizing Committee
Freely available from IEEE.
pp. lviii-lviii
TwC 2013: Reviewers
Freely available from IEEE.
pp. lvix-lvix
WSSM 2013: Welcome Message from the Workshop Chair
Freely available from IEEE.
pp. lx-lx
WSSM 2013: Organizing Committee
Freely available from IEEE.
pp. lxi-lxi
WSSM 2013: Reviewers
Freely available from IEEE.
pp. lxii-lxii
FPGA-Driven Table System to Accelerate Network Flows
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Ralph Duncan
,
Peder Jungck
,
Andy Norton
,
Kenneth Ross
,
Greg Triplett
Redundant Execution Algorithm for Reducing Total Power Consumption of Server Clusters by Differentiating the Starting Time of Processes
Full-text access may be available. Sign in or learn about subscription options.
pp. 9-16
by
Tomoya Enokido
,
Ailixier Aikebaier
,
Makoto Takizawa
3 Tiers Storage Model for Low Throughput Off-Line Storage
Full-text access may be available. Sign in or learn about subscription options.
pp. 17-23
by
Minoru Uehara
A Simulated Annealing Algorithm for Ground Station Scheduling Problem
Full-text access may be available. Sign in or learn about subscription options.
pp. 24-30
by
Fatos Xhafa
,
Xavier Herrero
,
Admir Barolli
,
Makoto Takizawa
Optimized Hash Lookup for Bloom Filter Based Packet Routing
Full-text access may be available. Sign in or learn about subscription options.
pp. 31-37
by
Dagang Li
,
Pei Chen
Single Document Summarization Based on Triangle Analysis of Dependency Graphs
Full-text access may be available. Sign in or learn about subscription options.
pp. 38-43
by
Kai Cheng
,
Yanting Li
,
Xin Wang
Video over Software-Defined Networking (VSDN)
Full-text access may be available. Sign in or learn about subscription options.
pp. 44-51
by
Harold Owens
,
Arjan Durresi
A Persistence Analysis of Smartphone Application Stores: An Approach to Understanding Gateways to the Internet
Full-text access may be available. Sign in or learn about subscription options.
pp. 52-56
by
Toshihiko Yamakami
Analysis of Heterogeneous Complex Networks Using the Degree of Diffusion
Full-text access may be available. Sign in or learn about subscription options.
pp. 57-65
by
Eman Aldwaisan
,
Maytham Safar
,
Khaled Mahdi
MANET Approaches for Airborne Networks: A Survey
Full-text access may be available. Sign in or learn about subscription options.
pp. 66-70
by
Elis Kulla
,
Shinji Sakamoto
,
Makoto Ikeda
,
Leonard Barolli
Towards the New Era of Global Aviation Electronic Data Exchange: Ensuring Completeness, Consistency and Quality in Data Migration
Full-text access may be available. Sign in or learn about subscription options.
pp. 71-78
by
Florian Puersch
,
Wenny Rahayu
,
Torab Torabi
,
Laura Irina Rusu
,
Karl Reed
,
Andrew Taylor-Harris
The Convergence of Big Data and Mobile Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 79-84
by
Agustinus Borgy Waluyo
,
David Taniar
,
Bala Srinivasan
Persuasive Strength Analysis of the Mobile Gang of Four: Toward Understanding Mobile Business Engineering in the Era of Mobile Persuasion
Full-text access may be available. Sign in or learn about subscription options.
pp. 85-89
by
Toshihiko Yamakami
A Proposal for the Deterrence of Information Leakage Using Anti-virus Software
Full-text access may be available. Sign in or learn about subscription options.
pp. 90-96
by
Takuya Kaneko
,
Takumi Nagaya
,
Keisuke Takemori
,
Yutaka Miyake
,
Masakatsu Nishigaki
An Efficient Algorithm for Incremental Privacy Breach on (k, e)-Anonymous Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 97-104
by
Bowonsak Seisungsittisunti
,
Juggapong Natwichai
Construction of a Multi-domain Functional Encryption System on Functional Information Infrastructure
Full-text access may be available. Sign in or learn about subscription options.
pp. 105-112
by
Yusuke Niwa
,
Akira Kanaoka
,
Eiji Okamoto
Healthcare Based on Cloud Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 113-118
by
Tamara Luarasi
,
Mimoza Durresi
,
Arjan Durresi
Utilizing Security Risk Approach in Managing Cloud Computing Services
Full-text access may be available. Sign in or learn about subscription options.
pp. 119-125
by
Danilo Valeros Bernardo
Targeted Advertisement Using Smartphones and Cloud Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 126-133
by
Mimoza Durresi
,
Tamara Luarasi
,
Indrit Baholli
,
Arjan Durresi
Federated Identity Access Broker Pattern for Cloud Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 134-140
by
Tim Reimer
,
Phil Abraham
,
Qing Tan
A Proposal of Privacy-Preserving Data Aggregation on the Cloud Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 141-148
by
Mebae Ushdia
,
Kouichi Itoh
,
Yoshinori Katayama
,
Fumihiko Kozakura
,
Hiroshi Tsuda
Dynamic Clusters of Servers for Reducing Electric Power in P2P Overlay Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 149-155
by
Dilawaer Doulikun
,
Ailixier Aikebaier
,
Tomoya Enokido
,
Makoto Takizawa
A Fuzzy-Based System for Peer Reliability in JXTA-Overlay P2P Considering Number of Interactions
Full-text access may be available. Sign in or learn about subscription options.
pp. 156-161
by
Evjola Spaho
,
Shinji Sakamoto
,
Leonard Barolli
,
Fatos Xhafa
,
Valbona Barolli
,
Jiro Iwashige
A Reputation Aggregation Method Considering File Request Distribution and Peer Behavior in Unstructured P2P Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 162-169
by
Hiroki Ushikubo
,
Sonoko Takeda
,
Hiroshi Shigeno
Jitter Considerations in On-Demand Route Discovery for Mobile Ad Hoc Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 170-177
by
Jiazi Yi
,
Juan Antonio Cordero Fuertes
,
Thomas Clausen
MANET Viewer III: 3D Visualization System for Mobile Ad Hoc Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 178-185
by
Akihiro Inoue
,
Yuma Takahashi
,
Akio Koyama
Exploratory Coverage in Limited Mobility Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 186-193
by
Mark Snyder
,
Sriram Chellappan
,
Mayur Thakur
Performance Comparison of Moving Sensors and Sink with Static Sink in WSNs
Full-text access may be available. Sign in or learn about subscription options.
pp. 194-200
by
Leonard Barolli
,
Tao Yang
,
Elis Kulla
,
Shinji Sakamoto
,
Gjergji Mino
Performance Evaluation of Mesh Router Node Placement Using Simulated Annealing Considering Exponential and Weibull Distributions
Full-text access may be available. Sign in or learn about subscription options.
pp. 201-205
by
Shinji Sakamoto
,
Tetsuya Oda
,
Elis Kulla
,
Evjola Spaho
,
Leonard Barolli
A Comparison Study of GA and HC for Mesh Router Node Placement in Wireless Mesh Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 206-213
by
Tetsuya Oda
,
Xinyue Chang
,
Shinji Sakamoto
,
Evjola Spaho
,
Fatos Xhafa
,
Leonard Barolli
Effects of Receiver Initiated MAC Protocol for Reducing Power Consumption in Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 214-221
by
Hitomi Date
,
Tetsuya Shigeyasu
Delay Tolerant Network with Directional Antenna Control for Disaster Information System
Full-text access may be available. Sign in or learn about subscription options.
pp. 222-227
by
Noriki Uchida
,
Norihiro Kawamura
,
Yoshitaka Shibata
A Novel MMSE Based Predictive Method for Narrow Band Interference Removal
Full-text access may be available. Sign in or learn about subscription options.
pp. 228-233
by
Neeraj Varshney
,
Roop C. Jain
A Fast Adaptation Scheme for TFRC over Vertical Handovers
Full-text access may be available. Sign in or learn about subscription options.
pp. 234-241
by
Dagang Li
,
Wenpeng Sha
Location Estimation Considering Inside and Outside Wireless LAN Coverage Area
Full-text access may be available. Sign in or learn about subscription options.
pp. 242-249
by
Akinori Suzuki
,
Hiroko Shindo
,
Hiroshi Shigeno
Emotional Recognition from Facial Expression Analysis Using Bezier Curve Fitting
Full-text access may be available. Sign in or learn about subscription options.
pp. 250-254
by
Yong-Hwan Lee
,
Woori Han
,
Youngseop Kim
A Novel Resource Allocation Heuristic for a Power Constrained Data Center
Full-text access may be available. Sign in or learn about subscription options.
pp. 255-260
by
Shuo Zhang
,
Baosheng Wang
,
Baokang Zhao
,
Zhenghu Gong
,
Jing Tao
Study on Collaboration System Constructions in Medical Sites
Full-text access may be available. Sign in or learn about subscription options.
pp. 261-266
by
Hwa Gyoo Park
,
Yim Kang Bin
GEESE: A Cognitive USN Platform
Full-text access may be available. Sign in or learn about subscription options.
pp. 267-269
by
Junyoung Park
,
Youngjun Lee
,
Kyungroul Lee
,
Hanggon Kim
,
Dmitry Volokhov
,
Kangbin Yim
Secure Aggregation and Attack Detection for Smart Grid System
Full-text access may be available. Sign in or learn about subscription options.
pp. 270-275
by
Inshil Doh
,
Jiyoung Lim
,
Kijoon Chae
Aggregate Signature-Based Efficient Attributes Proof with Pairing-Based Anonymous Credential
Full-text access may be available. Sign in or learn about subscription options.
pp. 276-281
by
Nan Guo
,
Jianju Cheng
,
Bin Zhang
,
Kangbin Yim
Detecting Anomaly Teletraffic Using Stochastic Self-Similarity Based on Hadoop
Full-text access may be available. Sign in or learn about subscription options.
pp. 282-287
by
Jongsuk R. Lee
,
Sang-Kug Ye
,
Hae-Duck J. Jeong
The Practical Quality Model for Embedded System and Software
Full-text access may be available. Sign in or learn about subscription options.
pp. 288-291
by
Hwa-Young Jeong
Service Based User Oriented Adaptive Learning System
Full-text access may be available. Sign in or learn about subscription options.
pp. 292-295
by
Hwa-Young Jeong
,
Jong-Hyuk Park
Application for Mobile Cloud Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 296-299
by
Jae Dong Lee
,
Jong-Hyuk Park
Development of Smart Mobile App Assessment Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 300-304
by
Hyeyeon Kim
,
Jae Suhp Oh
,
Hyeong Nam Moon
Proposal of Disaster Management Support System Using Tiled Display Wall Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 305-310
by
Tomoyuki Ishida
,
Akira Sakuraba
,
Noriki Uchida
,
Yoshitaka Shibata
Tiled Display Environment to Realize GIS Based Disaster Information System
Full-text access may be available. Sign in or learn about subscription options.
pp. 311-316
by
Akira Sakuraba
,
Satoshi Nodas
,
Tomoyuki Ishida
,
Yasuo Ebara
,
Yoshitaka Shibata
An Experiment on Ultra-resolution Video Transmission with Tiled Display Wall in Wide-Area Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 317-322
by
Yasuo Ebara
,
Satoshi Noda
,
Akira Sakuraba
,
Yoshitaka Shibata
Building Efficient Questionnaire Survey of Video Contents with Different QoS Parameters
Full-text access may be available. Sign in or learn about subscription options.
pp. 323-326
by
Kaoru Sugita
,
Masao Yokota
Evaluation of High Presence Sensation Based on Biological Information
Full-text access may be available. Sign in or learn about subscription options.
pp. 327-331
by
Tetsuro Ogi
,
Yosuke Kubota
,
Tetsuya Toma
,
Takeshi Chikakiyo
A Scheduling Method for Division Based Broadcasting Considering Dynamic Update
Full-text access may be available. Sign in or learn about subscription options.
pp. 332-337
by
Yusuke Gotoh
,
Hideo Taniguchi
Evaluations on Playback Interruption Control for Broadcast and Communication Integrated Video-on-Demand Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 338-343
by
Tomoki Yoshihisa
,
Shojiro Nishio
Querying MongoDB with LINQ in a Server-Side JavaScript Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 344-349
by
Kousuke Nakabasami
,
Toshiyuki Amagasa
,
Hiroyuki Kitagawa
A User Recognition Method Using Accelerometer for Electric Appliances
Full-text access may be available. Sign in or learn about subscription options.
pp. 350-355
by
Tsutomu Terada
,
Ryota Watanabe
,
Masahiko Tsukamoto
Evaluation of Dynamic Running Mode Switch Mechanism by Presence of OS Protection
Full-text access may be available. Sign in or learn about subscription options.
pp. 356-359
by
Kazutoshi Yokoyama
,
Hiroki Kumon
,
Hideo Taniguchi
Showing 100 out of 145
Load More
Load All