index - Information and Communication Technology Access content directly
   


Full Text Documents

71

Search


Table of Contents
Information and Communication Technology
Linawati, Made Sudiana Mahendra, Erich J. Neuhold, A Min Tjoa, IlsunYou (Eds.)
Front Matter

Information & Communication Technology-EurAsia
Conference 2014, ICT-EurAsia 2014


The Human Face of Mobile
Hajar Mousannif, Ismail Khalil
1-20
Agent-Based Methods for Simulation of Epidemics with a Low Number of Infected Persons
Florian Miksch, Philipp Pichler, Kurt Espinosa, Niki Popper
21-28
Cellular Automata Model of Urbanization in Camiguin, Philippines
Maria Beltran, Guido David
29-35
A Flexible Agent-Based Framework for Infectious Disease Modeling
Florian Miksch, Christoph Urach, Patrick Einzinger, Günther Zauner
36-45
Transformation of Digital Ecosystems: The Case of Digital Payments
Stefan Henningsson, Jonas Hedman
46-55
Do Personality Traits Work as Moderator on the Intention to Purchase Mobile Applications Work? - A Pilot Study
Charnsak Srisawatsakul, Gerald Quirchmayr, Borworn Papasratorn
56-65
Intelligent Method for Dipstick Urinalysis Using Smartphone Camera
R. Ginardi, Ahmad Saikhu, Riyanarto Sarno, Dwi Sunaryono, Ali Kholimi, Ratna Shanty
66-77
Empirical and Computational Issues of Microclimate Simulation
Aida Maleki, Kristina Kiesel, Milena Vuckovic, Ardeshir Mahdavi
78-85
A Distributed Generic Data Structure for Urban Level Building Data Monitoring
Stefan Glawischnig, Harald Hofstätter, Ardeshir Mahdavi
86-95
Toward a Data-Driven Performance-Guided Urban Decision-Support Environment
Neda Ghiassi, Stefan Glawischnig, Ulrich Pont, Ardeshir Mahdavi
96-107
Knowledge Management: Organization Culture in Healthcare Indonesia
Dana Sensuse, Yudho Sucahyo, Siti Rohajawati, Haya Rizqi, Pinkie Anggia
108-118
Semantic Versioning of In-Process Scientific Document
Imran Asif, M. Karim
119-128
Towards Semantic Mashup Tools for Big Data Analysis
Azzakiy Hendrik, Amin Anjomshoaa, A. Tjoa
129-138
Acceptance and Use of Information System: E-Learning Based on Cloud Computing in Vietnam
Thanh Nguyen, Dung Nguyen, Thi Cao
139-149
Requirements Identification for Migrating eGovernment Applications to the Cloud
Evangelos Gongolidis, Christos Kalloniatis, Evangelia Kavakli
150-158
A GPU-Based Enhanced Genetic Algorithm for Power-Aware Task Scheduling Problem in HPC Cloud
Nguyen Quang-Hung, Le Tan, Chiem Phat, Nam Thoai
159-169
Ball Distance Estimation and Tracking System of Humanoid Soccer Robot
Widodo Budiharto, Bayu Kanigoro, Viska Noviantri
170-178
Image Clustering Using Multi-visual Features
Bilih Priyogi, Nungki Selviandro, Zainal Hasibuan, Mubarik Ahmad
179-189
A Robust Visual Object Tracking Approach on a Mobile Device
Abdulmalik Mohammed, Tim Morris
190-198
Self-generating Programs – Cascade of the Blocks
Josef Kufner, Radek Mařík
199-212
State Machine Abstraction Layer
Josef Kufner, Radek Mařík
213-227
Concern Based SaaS Application Architectural Design
Aldo Suwandi, Inggriani Liem, Saiful Akbar
228-237
Hybridization of Haar Wavelet Decomposition and Computational Intelligent Algorithms for the Estimation of Climate Change Behavior
Haruna Chiroma, Sameem Abdulkareem, Adamu Abubakar, Eka Sari, Tutut Herawan, Abdulsalam Gital
238-247
An Improved Ant Colony Matching by Using Discrete Curve Evolution
Younes Saadi, Eka Sari, Tutut Herawan
248-256
A Novel Approach to Gasoline Price Forecasting Based on Karhunen-Loève Transform and Network for Vector Quantization with Voronoid Polyhedral
Haruna Chiroma, Sameem Abdulkareem, Adamu Abubakar, Eka Sari, Tutut Herawan
257-266
Enhancing the Use of Digital Model with Team-Based Learning Approach in Science Teaching
Bens Pardamean, Teddy Suparyanto, . Suyanta, Eryadi Masli, Jerome Donovan
267-276
Improving Reusability of OER
Peter Baumgartner
277-285
Online Learning for Two Novel Latent Topic Models
Ali Bakhtiari, Nizar Bouguila
286-295
An Infinite Mixture Model of Generalized Inverted Dirichlet Distributions for High-Dimensional Positive Data Modeling
Nizar Bouguila, Mohamed Mashrgy
296-305
On If-Then Multi Soft Sets-Based Decision Making
R. Hakim, Eka Sari, Tutut Herawan
306-315
Predicting Size of Forest Fire Using Hybrid Model
Guruh Shidik, Khabib Mustofa
316-327
Understanding eParticipation Services in Indonesian Local Government
Fathul Wahid, Øystein Sæbø
328-337
Document Tracking Technology to Support Indonesian Local E-Governments
Wikan Sunindyo, Bayu Hendradjaya, G. Saptawati, Tricya Widagdo
338-347
Modern Framework for Distributed Healthcare Data Analytics Based on Hadoop
P. Raja, E. Sivasankar
348-355
A Bioinformatics Workflow for Genetic Association Studies of Traits in Indonesian Rice
James Baurley, Bens Pardamean, Anzaludin Perbangsa, Dwinita Utami, Habib Rijzaani, Dani Satyawan
356-364
Fuzzy Logic Weight Estimation in Biometric-Enabled Co-authentication Systems
Van Nhan Nguyen, Vuong Nguyen, Minh Nguyen, Tran Dang
365-374

The 2014 Asian Conference on Availability, Reliability and Security, AsiaARES 2014


A Real-Time Intrusion Detection and Protection System at System Call Level under the Assistance of a Grid
Fang-Yie Leu, Yi-Ting Hsiao, Kangbin Yim, Ilsun You
375-385
A Hybrid System for Reducing Memory and Time Overhead of Intrusion Detection System
Zhi-Guo Chen, Sung-Ryul Kim
386-395
LDFGB Algorithm for Anomaly Intrusion Detection
Shang-Nan Yin, Zhi-Guo Chen, Sung-Ryul Kim
396-404
Assets Dependencies Model in Information Security Risk Management
Jakub Breier, Frank Schindler
405-412
Creation of Assurance Case Using Collaboration Diagram
Takuya Saruwatari, Shuichiro Yamamoto
413-418
Using Model Driven Security Approaches in Web Application Development
Christoph Hochreiner, Zhendong Ma, Peter Kieseberg, Sebastian Schrittwieser, Edgar Weippl
419-431
An Evaluation of Argument Patterns Based on Data Flow
Shuichiro Yamamoto
432-437
A Design of Web Log Integration Framework Using NoSQL
Huijin Jeong, Junho Choi, Chang Choi, Ilsun You, Pankoo Kim
438-445
Motivation-Based Risk Analysis Process for IT Systems
Agata Niescieruk, Bogdan Ksiezopolski
446-455
Formalizing Information Flow Control in a Model-Driven Approach
Kurt Stenzel, Kuzman Katkalov, Marian Borek, Wolfgang Reif
456-461
Security Assessment of Computer Networks Based on Attack Graphs and Security Events
Igor Kotenko, Elena Doynikova
462-471
A Pipeline Optimization Model for QKD Post-processing System
Jianyi Zhou, Bo Liu, Baokang Zhao, Bo Liu
472-481
Aggregation of Network Protocol Data Near Its Source
Marcel Fourné, Kevin Stegemann, Dominique Petersen, Norbert Pohlmann
482-491
The Mediating Role of Social Competition Identity Management Strategy in the Predictive Relationship between Susceptibility to Social Influence, Internet Privacy Concern, and Online Political Efficacy
Juneman Abraham, Murty Pane
492-499
Formal Security Analysis and Performance Evaluation of the Linkable Anonymous Access Protocol
Rima Addas, Ning Zhang
500-510
On Safety of Pseudonym-Based Location Data in the Context of Constraint Satisfation Problems
Tomoya Tanjo, Kazuhiro Minami, Ken Mano, Hiroshi Maruyama
511-520
Advanced Techniques for Computer Sharing and Management of Strategic Data
Marek Ogiela, Lidia Ogiela, Urszula Ogiela
521-525
On the Modelling of the Computer Security Impact on the Reputation Systems
Bogdan Ksiezopolski, Adam Wierzbicki, Damian Rusinek
526-531
Efficient Variant of Rainbow without Triangular Matrix Representation
Takanori Yasuda, Tsuyoshi Takagi, Kouichi Sakurai
532-541
Efficient Lattice HIBE in the Standard Model with Shorter Public Parameters
Kunwar Singh, C. Rangan, A. Banerjee
542-553
Security Analysis of Public Key Encryptions Based on Conjugacy Search Problem
Akihiro Yamamura
554-563
Cryptanalysis of Unidirectional Proxy Re-Encryption Scheme
Kunwar Singh, C. Rangan, A. Banerjee
564-575
An Algorithm to Analyze Non-injective S-Boxes
Leandro Marin, Ludo Tolhuizen
576-585
Attribute-Based Fine-Grained Access Control with User Revocation
Jun Ye, Wujun Zhang, Shu-Lin Wu, Yuan-Yuan Gao, Jia-Tao Qiu
586-595
A Full Privacy-Preserving Scheme for Location-Based Services
Fei Shao, Rong Cheng, Fangguo Zhang
596-601
Implementation of Efficient Operations over GF(232) Using Graphics Processing Units
Satoshi Tanaka, Takanori Yasuda, Kouichi Sakurai
602-611
M-SRS: Secure and Trustworthy Mobile Service Review System Based on Mobile Cloudlet
Tao Jiang, Xiaofeng Chen, Jin Li, Jianfeng Ma
612-621
High-Quality Reversible Data Hiding Approach Based on Evaluating Multiple Prediction Methods
Cheng-Hsing Yang, Kuan-Liang Liu, Chun-Hao Chang, Yi-Jhong Jhang
622-632
Steganalysis to Data Hiding of VQ Watermarking Upon Grouping Strategy
Ya-Ting Chang, Min-Hao Wu, Shiuh-Jeng Wang
633-642
Experimental Evaluation of an Algorithm for the Detection of Tampered JPEG Images
Giuseppe Cattaneo, Gianluca Roscigno, Umberto Ferraro Petrillo
643-652
A Semantic-Based Malware Detection System Design Based on Channels
Peige Ren, Xiaofeng Wang, Chunqing Wu, Baokang Zhao, Hao Sun
653-662
An Efficient Semantic-Based Organization and Similarity Search Method for Internet Data Resources
Peige Ren, Xiaofeng Wang, Hao Sun, Baokang Zhao, Chunqing Wu
663-673
Efficient DVFS to Prevent Hard Faults for Many-Core Architectures
Zhiquan Lai, Baokang Zhao, Jinshu Su
674-679
Improving Availability through Energy-Saving Optimization in LEO Satellite Networks
Zhu Tang, Chunqing Wu, Zhenqian Feng, Baokang Zhao, Wanrong Yu
680-689
An Effective Cloud-Based Active Defense System against Malicious Codes
Zhenyu Zhang, Wujun Zhang, Jianfeng Wang, Xiaofeng Chen
690-695

 

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/