HAL will be down for maintenance from Friday, June 10 at 4pm through Monday, June 13 at 9am. More information
Skip to Main content Skip to Navigation
   


Full Text Documents

Chargement de la page

Search

Chargement de la page

Table of Contents
Information and Communication Technology
Ismail Khalil, Erich Neuhold, A Min Tjoa, Li Da Xu, Ilsun You (Eds.)
Front Matter

Networks and System Architecture


Reducing Keepalive Traffic in Software-Defined Mobile Networks with Port Control Protocol
Kamil Burda, Martin Nagy, Ivan Kotuliak
3-12
A SDN Based Method of TCP Connection Handover
Andrej Binder, Tomas Boros, Ivan Kotuliak
13-19
IP Data Delivery in HBB-Next Network Architecture
Roman Bronis, Ivan Kotuliak, Tomas Kovacik, Peter Truchly, Andrej Binder
20-29
Syn Flood Attack Detection and Type Distinguishing Mechanism Based on Counting Bloom Filter
Tomáš Halagan, Tomáš Kováčik, Peter Trúchly, Andrej Binder
30-39
Integrating Mobile OpenFlow Based Network Architecture with Legacy Infrastructure
Martin Nagy, Ivan Kotuliak, Jan Skalny, Martin Kalcok, Tibor Hirjak
40-49

Teaching and Education


Making Computer Science Education Relevant
Michael Weigend
53-63
Analyzing Brain Waves for Activity Recognition of Learners
Hiromichi Abe, Kazuya Kinoshita, Kensuke Baba, Shigeru Takano, Kazuaki Murakami
64-73

Authentication and Profiling


A Multi-factor Biometric Based Remote Authentication Using Fuzzy Commitment and Non-invertible Transformation
Thi Nguyen, Dinh Nguyen, Tran Dang
77-88
Profiler for Smartphone Users Interests Using Modified Hierarchical Agglomerative Clustering Algorithm Based on Browsing History
Priagung Khusumanegara, Rischan Mafrur, Deokjai Choi
89-96

Data Management and Information Advertising


Strength of Relationship Between Multi-labeled Data and Labels
Masahiro Kuzunishi, Tetsuya Furukawa
99-108
Online Ad-fraud in Search Engine Advertising Campaigns
Andreas Mladenow, Niina Novak, Christine Strauss
109-118

Applied Modeling and Simulation


Markov Chain Solution to the 3-Tower Problem
Guido David
121-128
Fitness Function in ABC Algorithm for Uncapacitated Facility Location Problem
Yusuke Watanabe, Mayumi Takaya, Akihiro Yamamura
129-138
Comparative Study of Monte-Carlo Tree Search and Alpha-Beta Pruning in Amazons
Hikari Kato, Szilárd Fazekas, Mayumi Takaya, Akihiro Yamamura
139-148

Network Security


Can We Securely Use CBC Mode in TLS1.0?
Takashi Kurokawa, Ryo Nojima, Shiho Moriai
151-160
Key Agreement with Modified Batch Rekeying for Distributed Group in Cognitive Radio Networks
N. Renugadevi, C. Mala
161-172
Secure Mobility Management for MIPv6 with Identity-Based Cryptography
Nan Guo, Fangting Peng, Tianhan Gao
173-178
Investigation of DDoS Attacks by Hybrid Simulation
Yana Bekeneva, Konstantin Borisenko, Andrey Shorov, Igor Kotenko
179-189

Dependable Systems and Applications


Secure Database Using Order-Preserving Encryption Scheme Based on Arithmetic Coding and Noise Function
Sergey Krendelev, Mikhail Yakovlev, Maria Usoltseva
193-202
An Approach for Evaluating Softgoals Using Weight
Shuichiro Yamamoto
203-212
An Efficient Unsavory Data Detection Method for Internet Big Data
Peige Ren, Xiaofeng Wang, Hao Sun, Fen Xu, Baokang Zhao, Chunqing Wu
213-220
Identification of Corrupted Cloud Storage in Batch Auditing for Multi-Cloud Environments
Sooyeon Shin, Seungyeon Kim, Taekyoung Kwon
221-225

Multimedia Security


Face Recognition Performance Comparison Between Real Faces and Pose Variant Face Images from Image Display Device
Mi-Young Cho, Young-Sook Jeong
229-234
A Lossless Data Hiding Strategy Based on Two-Dimensional Side-Match Predictions
Chi-Yao Weng, Sheng-Jie Wang, Shiuh-Jeng Wang
235-242
Secure Image Deduplication in Cloud Storage
Han Gang, Hongyang Yan, Lingling Xu
243-251

Cryptography


Hybrid Encryption Scheme Using Terminal Fingerprint and Its Application to Attribute-Based Encryption Without Key Misuse
Chunlu Chen, Hiroaki Anada, Junpei Kawamoto, Kouichi Sakurai
255-264
Differential Fault Attack on LEA
Dirmanto Jap, Jakub Breier
265-274
A Secure Multicast Key Agreement Scheme
Hsing-Chung Chen, Chung-Wei Chen
275-281
Efficient Almost Strongly Universal Hash Function for Quantum Key Distribution
Bo Liu, Baokang Zhao, Chunqing Wu, Wanrong Yu, Ilsun You
282-285

Big Data and Text Mining


DCODE: A Distributed Column-Oriented Database Engine for Big Data Analytics
Yanchen Liu, Fang Cao, Masood Mortazavi, Mengmeng Chen, Ning Yan, Chi Ku, Aniket Adnaik, Stephen Morgan, Guangyu Shi, Yuhu Wang, Fan Fang
289-299
Incorporating Big Data Analytics into Enterprise Information Systems
Zhaohao Sun, Francisca Pambel, Fangwei Wang
300-309
Analytical Platform Based on Jbowl Library Providing Text-Mining Services in Distributed Environment
Martin Sarnovský, Peter Butka, Peter Bednár, František Babič, Ján Paralič
310-319

Social Impact of EIS and Visualization


Corporate Social Responsibility in Social Media Environment
Antonín Pavlíček, Petr Doucek
323-332
Usage of Finance Information Systems in Developing Countries: Identifying Factors During Implementation that Impact Use
David Kiwana, Björn Johansson, Sven Carlsson
333-342
Software Model Creation with Multidimensional UML
Lukáš Gregorovič, Ivan Polasek, Branislav Sobota
343-352

 

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/