Default Cover Image

2013 16th International Conference on Network-Based Information Systems (NBiS)

Sept. 4 2013 to Sept. 6 2013

Seo-gu, Gwangju, CA, Korea (South)

Table of Contents

Title Page iFreely available from IEEE.pp. i-i
Title Page iiiFreely available from IEEE.pp. iii-iii
Copyright PageFreely available from IEEE.pp. iv-iv
Table of ContentsFreely available from IEEE.pp. v-xiii
NBiS 2013: Welcome Message from the General Co-chairsFreely available from IEEE.pp. xv-xv
NBiS 2013: Welcome Message from the Workshops Co-chairsFreely available from IEEE.pp. xvii-xviii
NBiS 2013: Organization CommitteeFreely available from IEEE.pp. xix-xxvi
NBiS 2013: ReviewersFreely available from IEEE.pp. xxvii-xxvii
NBiS 2013: Keynote TalkFull-text access may be available. Sign in or learn about subscription options.pp. xxviii-xxviii
ADPNA 2013: Welcome Message from the Workshop OrganizersFreely available from IEEE.pp. xxix-xxix
ADPNA 2013: Organizing CommitteeFreely available from IEEE.pp. xxx-xxx
ADPNA 2013: ReviewersFreely available from IEEE.pp. xxxi-xxxi
DEMoC 2013: Welcome Message from the Workshop ChairFreely available from IEEE.pp. xxxii-xxxii
DEMoC 2013: Organizing CommitteeFreely available from IEEE.pp. xxxiii-xxxiii
DEMoC 2013: ReviewersFreely available from IEEE.pp. xxxiv-xxxiv
HETNET 2013: Welcome Message from the Workshop OrganizersFreely available from IEEE.pp. xxxv-xxxv
HETNET 2013: Organizing CommitteeFreely available from IEEE.pp. xxxvi-xxxvi
HETNET 2013: ReviewersFreely available from IEEE.pp. xxxvii-xxxvii
INVITE 2013: Welcome Message from the Workshop ChairFreely available from IEEE.pp. xxxviii-xxxviii
INVITE 2013: Organizing CommitteeFreely available from IEEE.pp. xxxix-xxxix
INVITE 2013: ReviewersFreely available from IEEE.pp. xl-xl
INWC 2013: Welcome Message from the Workshop OranizersFreely available from IEEE.pp. xli-xli
INWC 2013: Organizing CommitteeFreely available from IEEE.pp. xlii-xlii
INWC 2013: ReviewersFreely available from IEEE.pp. xliii-xliii
ISSE 2013: Welcome Message from the Workshop Co-chairsFreely available from IEEE.pp. xliv-xliv
ISSE 2013: Organizing CommitteeFreely available from IEEE.pp. xlv-xlv
ISSE 2013: ReviewersFreely available from IEEE.pp. xlvi-xlvi
ITIS 2013: Welcome Message from the Workshop Co-chairsFreely available from IEEE.pp. xlvii-xlvii
ITIS 2013: Organizing CommitteeFreely available from IEEE.pp. xlviii-xlviii
ITIS 2013: ReviewersFreely available from IEEE.pp. xlvix-xlvix
MCCTA 2013: Organizing CommitteeFreely available from IEEE.pp. lii-lii
MCCTA 2013: ReviewersFreely available from IEEE.pp. liii-liii
NeoFusion 2013: Welcome Message from the OrganizersFreely available from IEEE.pp. liv-liv
NeoFusion 2013: Organizing CommitteeFreely available from IEEE.pp. lv-lv
NeoFusion 2013: ReviewersFreely available from IEEE.pp. lvi-lvi
TwC 2013: Welcome Message from the Workshop Co-chairsFreely available from IEEE.pp. lvii-lvii
TwC 2013: Organizing CommitteeFreely available from IEEE.pp. lviii-lviii
TwC 2013: ReviewersFreely available from IEEE.pp. lvix-lvix
WSSM 2013: Welcome Message from the Workshop ChairFreely available from IEEE.pp. lx-lx
WSSM 2013: Organizing CommitteeFreely available from IEEE.pp. lxi-lxi
WSSM 2013: ReviewersFreely available from IEEE.pp. lxii-lxii
FPGA-Driven Table System to Accelerate Network FlowsFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
3 Tiers Storage Model for Low Throughput Off-Line StorageFull-text access may be available. Sign in or learn about subscription options.pp. 17-23
A Simulated Annealing Algorithm for Ground Station Scheduling ProblemFull-text access may be available. Sign in or learn about subscription options.pp. 24-30
Optimized Hash Lookup for Bloom Filter Based Packet RoutingFull-text access may be available. Sign in or learn about subscription options.pp. 31-37
Single Document Summarization Based on Triangle Analysis of Dependency GraphsFull-text access may be available. Sign in or learn about subscription options.pp. 38-43
Video over Software-Defined Networking (VSDN)Full-text access may be available. Sign in or learn about subscription options.pp. 44-51
A Persistence Analysis of Smartphone Application Stores: An Approach to Understanding Gateways to the InternetFull-text access may be available. Sign in or learn about subscription options.pp. 52-56
Analysis of Heterogeneous Complex Networks Using the Degree of DiffusionFull-text access may be available. Sign in or learn about subscription options.pp. 57-65
MANET Approaches for Airborne Networks: A SurveyFull-text access may be available. Sign in or learn about subscription options.pp. 66-70
The Convergence of Big Data and Mobile ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 79-84
An Efficient Algorithm for Incremental Privacy Breach on (k, e)-Anonymous ModelFull-text access may be available. Sign in or learn about subscription options.pp. 97-104
Construction of a Multi-domain Functional Encryption System on Functional Information InfrastructureFull-text access may be available. Sign in or learn about subscription options.pp. 105-112
Healthcare Based on Cloud ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 113-118
Utilizing Security Risk Approach in Managing Cloud Computing ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 119-125
Targeted Advertisement Using Smartphones and Cloud ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 126-133
Federated Identity Access Broker Pattern for Cloud ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 134-140
A Proposal of Privacy-Preserving Data Aggregation on the Cloud ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 141-148
Dynamic Clusters of Servers for Reducing Electric Power in P2P Overlay NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 149-155
Jitter Considerations in On-Demand Route Discovery for Mobile Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 170-177
MANET Viewer III: 3D Visualization System for Mobile Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 178-185
Exploratory Coverage in Limited Mobility Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 186-193
Performance Comparison of Moving Sensors and Sink with Static Sink in WSNsFull-text access may be available. Sign in or learn about subscription options.pp. 194-200
Effects of Receiver Initiated MAC Protocol for Reducing Power Consumption in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 214-221
Delay Tolerant Network with Directional Antenna Control for Disaster Information SystemFull-text access may be available. Sign in or learn about subscription options.pp. 222-227
A Novel MMSE Based Predictive Method for Narrow Band Interference RemovalFull-text access may be available. Sign in or learn about subscription options.pp. 228-233
A Fast Adaptation Scheme for TFRC over Vertical HandoversFull-text access may be available. Sign in or learn about subscription options.pp. 234-241
Location Estimation Considering Inside and Outside Wireless LAN Coverage AreaFull-text access may be available. Sign in or learn about subscription options.pp. 242-249
Emotional Recognition from Facial Expression Analysis Using Bezier Curve FittingFull-text access may be available. Sign in or learn about subscription options.pp. 250-254
A Novel Resource Allocation Heuristic for a Power Constrained Data CenterFull-text access may be available. Sign in or learn about subscription options.pp. 255-260
Study on Collaboration System Constructions in Medical SitesFull-text access may be available. Sign in or learn about subscription options.pp. 261-266
GEESE: A Cognitive USN PlatformFull-text access may be available. Sign in or learn about subscription options.pp. 267-269
Secure Aggregation and Attack Detection for Smart Grid SystemFull-text access may be available. Sign in or learn about subscription options.pp. 270-275
Aggregate Signature-Based Efficient Attributes Proof with Pairing-Based Anonymous CredentialFull-text access may be available. Sign in or learn about subscription options.pp. 276-281
Detecting Anomaly Teletraffic Using Stochastic Self-Similarity Based on HadoopFull-text access may be available. Sign in or learn about subscription options.pp. 282-287
The Practical Quality Model for Embedded System and SoftwareFull-text access may be available. Sign in or learn about subscription options.pp. 288-291
Service Based User Oriented Adaptive Learning SystemFull-text access may be available. Sign in or learn about subscription options.pp. 292-295
Application for Mobile Cloud LearningFull-text access may be available. Sign in or learn about subscription options.pp. 296-299
Development of Smart Mobile App Assessment ModelFull-text access may be available. Sign in or learn about subscription options.pp. 300-304
Proposal of Disaster Management Support System Using Tiled Display Wall EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 305-310
Tiled Display Environment to Realize GIS Based Disaster Information SystemFull-text access may be available. Sign in or learn about subscription options.pp. 311-316
Building Efficient Questionnaire Survey of Video Contents with Different QoS ParametersFull-text access may be available. Sign in or learn about subscription options.pp. 323-326
Evaluation of High Presence Sensation Based on Biological InformationFull-text access may be available. Sign in or learn about subscription options.pp. 327-331
A Scheduling Method for Division Based Broadcasting Considering Dynamic UpdateFull-text access may be available. Sign in or learn about subscription options.pp. 332-337
Evaluations on Playback Interruption Control for Broadcast and Communication Integrated Video-on-Demand SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 338-343
Querying MongoDB with LINQ in a Server-Side JavaScript EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 344-349
A User Recognition Method Using Accelerometer for Electric AppliancesFull-text access may be available. Sign in or learn about subscription options.pp. 350-355
Evaluation of Dynamic Running Mode Switch Mechanism by Presence of OS ProtectionFull-text access may be available. Sign in or learn about subscription options.pp. 356-359
Showing 100 out of 145