Default Cover Image

2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld)

July 18 2016 to July 21 2016

Toulouse, France

Table of Contents

Cover ArtFreely available from IEEE.pp. c1-c1
Title Page iFreely available from IEEE.pp. i-i
Title Page iiiFreely available from IEEE.pp. iii-iii
Copyright PageFreely available from IEEE.pp. iv-iv
Table of ContentsFreely available from IEEE.pp. v-xviii
Message from the UIC 2016 General ChairsFreely available from IEEE.pp. xix-xx
Message from the UIC 2016 Program ChairsFreely available from IEEE.pp. xxi-xxi
UIC 2016 Organizing and Program CommitteesFreely available from IEEE.pp. xxii-xxv
Message from the ATC 2016 General ChairsFreely available from IEEE.pp. xxvi-xxvii
Message from the ATC 2016 Program ChairsFreely available from IEEE.pp. xxviii-xxviii
ATC 2016 Organizing and Program CommitteesFreely available from IEEE.pp. xxix-xxxiv
Message from the ScalCom 2016 General ChairsFreely available from IEEE.pp. xxxv-xxxvi
Message from ScalCom 2016 Program ChairsFreely available from IEEE.pp. xxxvii-xxxvii
ScalCom 2016 Organizing and Program CommitteesFreely available from IEEE.pp. xxxviii-xl
Message from the CBDCom 2016 General ChairsFreely available from IEEE.pp. xli-xlii
Message from CBDCom 2016 Program ChairsFreely available from IEEE.pp. xliii-xliii
CBDCom 2016 Organizing and Program CommitteesFreely available from IEEE.pp. xliv-xlvii
Message from the IoP 2016 General ChairsFreely available from IEEE.pp. xlviii-xlvix
IoP 2016 Organizing and Program CommitteesFreely available from IEEE.pp. l-lii
Message from the SmartWorld 2016 General ChairsFreely available from IEEE.pp. liii-liii
SmartWorld 2016 Organizing and Program CommitteesFreely available from IEEE.pp. liv-lvi
KeynotesFull-text access may be available. Sign in or learn about subscription options.pp. lvii-lxii
KeynotesFreely available from IEEE.pp. lvii-lxii
SponsorsFreely available from IEEE.pp. lxiii-lxiii
Activity Recognition Based on the Dynamic Coordinate Transformation of Inertial Sensor DataFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Plogs: Materializing Datalog Programs with MapReduce for Scalable ReasoningFull-text access may be available. Sign in or learn about subscription options.pp. 9-16
Toward QoS-Aware Cloud Robotic Applications: A Hybrid Architecture and Its ImplementationFull-text access may be available. Sign in or learn about subscription options.pp. 33-40
A Navigation Cognitive System Driven by Hierarchical Spiking Neural NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 51-56
Designing Parallel Data Processing for Large-Scale Sensor OrchestrationFull-text access may be available. Sign in or learn about subscription options.pp. 57-65
IoT-Lite: A Lightweight Semantic Model for the Internet of ThingsFull-text access may be available. Sign in or learn about subscription options.pp. 90-97
Dynamic Domain Model for Micro Context-Aware Adaptation of ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 98-105
Improving Data Fusion in Big Data Stream Computing for Automotive ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 106-113
PublicSense: A Crowd Sensing Platform for Public Facility Management in Smart CitiesFull-text access may be available. Sign in or learn about subscription options.pp. 114-120
Human Activity Recognition of Continuous Data Using Hidden Markov Models and the Aspect of Including Discrete DataFull-text access may be available. Sign in or learn about subscription options.pp. 121-126
Applied a Multi-scale Entropy Algorithm to Analyze Dynamic COP Signal via Accelerometer SensorFull-text access may be available. Sign in or learn about subscription options.pp. 127-132
Build Smart Campus Using Human Behavioral DataFull-text access may be available. Sign in or learn about subscription options.pp. 133-136
Process-Based Habit Mining: Experiments and TechniquesFull-text access may be available. Sign in or learn about subscription options.pp. 145-152
Using Real Traffic Data for ITS Simulation: Procedure and ValidationFull-text access may be available. Sign in or learn about subscription options.pp. 161-170
Fuzzy AHP for Learning Service Selection in Context-Aware Ubiquitous Learning SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 171-179
Leveraging Declarations over the Lifecycle of Large-Scale Sensor ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 211-219
A Novel Random Walk and Scale Control Method for Event RecommendationFull-text access may be available. Sign in or learn about subscription options.pp. 228-235
A Graph-Based Method for Indoor Subarea Localization with Zero-ConfigurationFull-text access may be available. Sign in or learn about subscription options.pp. 236-244
Detecting Attacks Smartly in Vehicle Cloud ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 245-252
A Personalized Tweet Recommendation Approach Based on Concept GraphsFull-text access may be available. Sign in or learn about subscription options.pp. 253-260
Fine-Grained Delta Privacy Preservation for Hierarchical ContextsFull-text access may be available. Sign in or learn about subscription options.pp. 261-268
VIPR: A Visual Interface Tool for Programming Semantic Web RulesFull-text access may be available. Sign in or learn about subscription options.pp. 277-284
Concealed in the Internet: A Novel Covert Channel with Normal Traffic ImitatingFull-text access may be available. Sign in or learn about subscription options.pp. 285-292
A Context Modelling Approach Based on Temporal Euclidean Vector SpaceFull-text access may be available. Sign in or learn about subscription options.pp. 293-300
Novel Efficient and Privacy-Preserving Protocols for Sensor-Based Human Activity RecognitionFull-text access may be available. Sign in or learn about subscription options.pp. 301-308
ROAT: Road-Network-Based Anonymization of TrajectoriesFull-text access may be available. Sign in or learn about subscription options.pp. 309-314
Discovering Mass Activities Using Anomalies in Individual Mobility MotifsFull-text access may be available. Sign in or learn about subscription options.pp. 321-326
Less Annotation on Personalized Activity Recognition Using Context DataFull-text access may be available. Sign in or learn about subscription options.pp. 327-332
Hypervisor-Based Attestation of Virtual EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 333-340
A Novel Hybrid Flow-Based Handler with DDoS Attacks in Software-Defined NetworkingFull-text access may be available. Sign in or learn about subscription options.pp. 350-357
Timing Analysis for Inferring the Topology of the Bitcoin Peer-to-Peer NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 358-367
The Unreasonable Effectiveness of Address ClusteringFull-text access may be available. Sign in or learn about subscription options.pp. 368-373
Blockchain-Based Publishing Layer for the Keyless Signing InfrastructureFull-text access may be available. Sign in or learn about subscription options.pp. 374-381
Buy Your Coffee with Bitcoin: Real-World Deployment of a Bitcoin Point of Sale TerminalFull-text access may be available. Sign in or learn about subscription options.pp. 382-389
Building Privacy-Preserving Search Engine Query Logs for Data MonetizationFull-text access may be available. Sign in or learn about subscription options.pp. 390-397
Distributed Coverage of Ego Networks in F2F Online Social NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 423-431
A Timer Based Leader Election AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 432-439
RPiDS: Raspberry Pi IDS — A Fruitful Intrusion Detection System for IoTFull-text access may be available. Sign in or learn about subscription options.pp. 440-448
RPiDS: Raspberry Pi IDS — A Fruitful Intrusion Detection System for IoTFull-text access may be available. Sign in or learn about subscription options.pp. 440-448
An Adaptive Replica Mechanism for Real-Time Stream ProcessingFull-text access may be available. Sign in or learn about subscription options.pp. 449-455
A Framework of Multiple Kernel Ensemble Learning for Hyperspectral ClassificationFull-text access may be available. Sign in or learn about subscription options.pp. 456-460
Multi-application Query Optimization for Shared WSNs Leveraging Caching MechanismFull-text access may be available. Sign in or learn about subscription options.pp. 461-466
Implementation of Collaborative E-Learning System for Unstable EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 496-501
Smart-Guard: Defending User Input from MalwareFull-text access may be available. Sign in or learn about subscription options.pp. 502-509
A Quorum System for Distributing RFID TagsFull-text access may be available. Sign in or learn about subscription options.pp. 510-517
A Green Trust Management Scheme to Mitigate Trust-Distortion Attacks on MANETsFull-text access may be available. Sign in or learn about subscription options.pp. 518-525
Enabling Self-Configuration of QoC-Centric Fog Computing EntitiesFull-text access may be available. Sign in or learn about subscription options.pp. 526-533
Choosing Security Elements for the xAAL Home Automation SystemFull-text access may be available. Sign in or learn about subscription options.pp. 534-541
An Integrated Virtualized Strategy for Fault Tolerance in Cloud Computing EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 542-549
AGOCS — Accurate Google Cloud Simulator FrameworkFull-text access may be available. Sign in or learn about subscription options.pp. 550-558
AGOCS — Accurate Google Cloud Simulator FrameworkFull-text access may be available. Sign in or learn about subscription options.pp. 550-558
A Cloud Solution for Multi-omics Data IntegrationFull-text access may be available. Sign in or learn about subscription options.pp. 559-566
Showing 100 out of 199