index - Information and Communication Technology Access content directly
   


Full Text Documents

Chargement de la page

Search

Chargement de la page

Table of Contents
Information and Communication Technology
Ismail Khalil, Erich Neuhold, A Min Tjoa, Li Da Xu, Ilsun You (Eds.)
Front Matter

Networks and System Architecture


Reducing Keepalive Traffic in Software-Defined Mobile Networks with Port Control Protocol
Kamil Burda, Martin Nagy, Ivan Kotuliak
3-12
A SDN Based Method of TCP Connection Handover
Andrej Binder, Tomas Boros, Ivan Kotuliak
13-19
IP Data Delivery in HBB-Next Network Architecture
Roman Bronis, Ivan Kotuliak, Tomas Kovacik, Peter Truchly, Andrej Binder
20-29
Syn Flood Attack Detection and Type Distinguishing Mechanism Based on Counting Bloom Filter
Tomáš Halagan, Tomáš Kováčik, Peter Trúchly, Andrej Binder
30-39
Integrating Mobile OpenFlow Based Network Architecture with Legacy Infrastructure
Martin Nagy, Ivan Kotuliak, Jan Skalny, Martin Kalcok, Tibor Hirjak
40-49

Teaching and Education


Making Computer Science Education Relevant
Michael Weigend
53-63
Analyzing Brain Waves for Activity Recognition of Learners
Hiromichi Abe, Kazuya Kinoshita, Kensuke Baba, Shigeru Takano, Kazuaki Murakami
64-73

Authentication and Profiling


A Multi-factor Biometric Based Remote Authentication Using Fuzzy Commitment and Non-invertible Transformation
Thi Nguyen, Dinh Nguyen, Tran Dang
77-88
Profiler for Smartphone Users Interests Using Modified Hierarchical Agglomerative Clustering Algorithm Based on Browsing History
Priagung Khusumanegara, Rischan Mafrur, Deokjai Choi
89-96

Data Management and Information Advertising


Strength of Relationship Between Multi-labeled Data and Labels
Masahiro Kuzunishi, Tetsuya Furukawa
99-108
Online Ad-fraud in Search Engine Advertising Campaigns
Andreas Mladenow, Niina Novak, Christine Strauss
109-118

Applied Modeling and Simulation


Markov Chain Solution to the 3-Tower Problem
Guido David
121-128
Fitness Function in ABC Algorithm for Uncapacitated Facility Location Problem
Yusuke Watanabe, Mayumi Takaya, Akihiro Yamamura
129-138
Comparative Study of Monte-Carlo Tree Search and Alpha-Beta Pruning in Amazons
Hikari Kato, Szilárd Fazekas, Mayumi Takaya, Akihiro Yamamura
139-148

Network Security


Can We Securely Use CBC Mode in TLS1.0?
Takashi Kurokawa, Ryo Nojima, Shiho Moriai
151-160
Key Agreement with Modified Batch Rekeying for Distributed Group in Cognitive Radio Networks
N. Renugadevi, C. Mala
161-172
Secure Mobility Management for MIPv6 with Identity-Based Cryptography
Nan Guo, Fangting Peng, Tianhan Gao
173-178
Investigation of DDoS Attacks by Hybrid Simulation
Yana Bekeneva, Konstantin Borisenko, Andrey Shorov, Igor Kotenko
179-189

Dependable Systems and Applications


Secure Database Using Order-Preserving Encryption Scheme Based on Arithmetic Coding and Noise Function
Sergey Krendelev, Mikhail Yakovlev, Maria Usoltseva
193-202
An Approach for Evaluating Softgoals Using Weight
Shuichiro Yamamoto
203-212
An Efficient Unsavory Data Detection Method for Internet Big Data
Peige Ren, Xiaofeng Wang, Hao Sun, Fen Xu, Baokang Zhao, Chunqing Wu
213-220
Identification of Corrupted Cloud Storage in Batch Auditing for Multi-Cloud Environments
Sooyeon Shin, Seungyeon Kim, Taekyoung Kwon
221-225

Multimedia Security


Face Recognition Performance Comparison Between Real Faces and Pose Variant Face Images from Image Display Device
Mi-Young Cho, Young-Sook Jeong
229-234
A Lossless Data Hiding Strategy Based on Two-Dimensional Side-Match Predictions
Chi-Yao Weng, Sheng-Jie Wang, Shiuh-Jeng Wang
235-242
Secure Image Deduplication in Cloud Storage
Han Gang, Hongyang Yan, Lingling Xu
243-251

Cryptography


Hybrid Encryption Scheme Using Terminal Fingerprint and Its Application to Attribute-Based Encryption Without Key Misuse
Chunlu Chen, Hiroaki Anada, Junpei Kawamoto, Kouichi Sakurai
255-264
Differential Fault Attack on LEA
Dirmanto Jap, Jakub Breier
265-274
A Secure Multicast Key Agreement Scheme
Hsing-Chung Chen, Chung-Wei Chen
275-281
Efficient Almost Strongly Universal Hash Function for Quantum Key Distribution
Bo Liu, Baokang Zhao, Chunqing Wu, Wanrong Yu, Ilsun You
282-285

Big Data and Text Mining


DCODE: A Distributed Column-Oriented Database Engine for Big Data Analytics
Yanchen Liu, Fang Cao, Masood Mortazavi, Mengmeng Chen, Ning Yan, Chi Ku, Aniket Adnaik, Stephen Morgan, Guangyu Shi, Yuhu Wang, Fan Fang
289-299
Incorporating Big Data Analytics into Enterprise Information Systems
Zhaohao Sun, Francisca Pambel, Fangwei Wang
300-309
Analytical Platform Based on Jbowl Library Providing Text-Mining Services in Distributed Environment
Martin Sarnovský, Peter Butka, Peter Bednár, František Babič, Ján Paralič
310-319

Social Impact of EIS and Visualization


Corporate Social Responsibility in Social Media Environment
Antonín Pavlíček, Petr Doucek
323-332
Usage of Finance Information Systems in Developing Countries: Identifying Factors During Implementation that Impact Use
David Kiwana, Björn Johansson, Sven Carlsson
333-342
Software Model Creation with Multidimensional UML
Lukáš Gregorovič, Ivan Polasek, Branislav Sobota
343-352

 

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/