Event Paper Nr. Presentation Day Session Time Area Room Paper Title
DCNET 3 Poster Wednesday 25 Poster Session 1 16:30 - 17:30 DCNET - International Conference on Data Communication Networking Foyer TRAFIL - A Tool for Enhancing Simulation TRAce FILes Processing
DCNET 5 30 min Tuesday 24 Session 2 14:30 - 16:30 DCNET - International Conference on Data Communication Networking Sevilla A Cross-layer Design for Video Transmission with TFRC in MANETs
DCNET 6 20 min Wednesday 25 Session 5 14:30 - 16:30 DCNET - International Conference on Data Communication Networking Sevilla Digital Signature of Network Segment using Flow Analysis
DCNET 8 Poster Wednesday 25 Poster Session 1 16:30 - 17:30 DCNET - International Conference on Data Communication Networking Foyer Hash Algorithms for 8051-based Sensornodes
DCNET 9 30 min Tuesday 24 Session 2 14:30 - 16:30 DCNET - International Conference on Data Communication Networking Sevilla Study on a Fast OSPF Route Reconstruction Method under Network Failures
DCNET 10 20 min Wednesday 25 Session 5 14:30 - 16:30 DCNET - International Conference on Data Communication Networking Sevilla Mobile Broadband Traffic Forecasts in Korea
DCNET 11 30 min Tuesday 24 Session 2 14:30 - 16:30 DCNET - International Conference on Data Communication Networking Sevilla Computational Intelligence Applied to Monitor Bird Behaviour
DCNET 17 Poster Wednesday 25 Poster Session 1 16:30 - 17:30 DCNET - International Conference on Data Communication Networking Foyer Strictness of Rate-latency Service Curves
DCNET 19 20 min Wednesday 25 Session 5 14:30 - 16:30 DCNET - International Conference on Data Communication Networking Sevilla Towards a CDN over ICN
DCNET 20 20 min Wednesday 25 Session 5 14:30 - 16:30 DCNET - International Conference on Data Communication Networking Sevilla Improving Network Performane - Management of Nonlinear Dynamics
ICE-B 3 Poster Thursday 26 Poster Session 2 16:30 - 17:30 Collaboration and e-Services Foyer Analysing E-Business Applications with Business Provenance
ICE-B 6 Poster Thursday 26 Poster Session 2 16:30 - 17:30 Sustainable e-Business Foyer IS Employees’ Stress and Outcomes at Work
ICE-B 8 30 min Thursday 26 Session 8 14:30 - 16:30 Sustainable e-Business Dali Three Dimensional Elements for Sustainable e-Business Modelling
ICE-B 10 Poster Thursday 26 Poster Session 2 16:30 - 17:30 Applications Foyer A Study on Older Adult Students’ Behavioural Intention and Learning Satisfaction of Blended e-Learning Course at the Active Aging University
ICE-B 13 Poster Thursday 26 Poster Session 2 16:30 - 17:30 Sustainable e-Business Foyer Factors that Influence e-Business Application in Tertiary Education
ICE-B 16 20 min Wednesday 25 Session 3 09:00 - 10:30 Enterprise Engineering Dali Resilient Sustainable Supply Chain Management - A Conceptual Framework
ICE-B 21 20 min Wednesday 25 Session 5 14:30 - 16:30 Applications Dali The Relative Importance of Teenagers’ Personal Characteristics on Technology Addiction
ICE-B 22 20 min Wednesday 25 Session 5 14:30 - 16:30 Applications Dali The Use of Internet as a Marketing Tool - Evaluating the Websites of Spain's Top Restaurants
ICE-B 23 Poster Friday 27 Poster Session 3 10:15 - 11:15 Sustainable e-Business Foyer The Road to a Responsible and Sustainable e-Business
ICE-B 24 30 min Tuesday 24 Session 1 10:45 - 12:15 Collaboration and e-Services Dali 3D Communities as Platforms for Developing Social Capital
ICE-B 26 30 min Tuesday 24 Session 2 14:30 - 16:30 Enterprise Engineering Dali The User-journey in Online Search - An Empirical Study of the Generic-to-Branded Spillover Effect based on User-level Data
ICE-B 27 20 min Thursday 26 Session 8 14:30 - 16:30 Collaboration and e-Services Dali A Framework for Performance Measurement in Service Oriented Virtual Organizations - A Value Network Approach to Collaborative Performance Measurement
ICE-B 29 30 min Tuesday 24 Session 1 10:45 - 12:15 Collaboration and e-Services Dali Search Engine Optimization Meets e-Business - A Theory-based Evaluation: Findability and Usability as Key Success Factors
ICE-B 32 Poster Friday 27 Poster Session 3 10:15 - 11:15 Enterprise Engineering Foyer Paths of Business Model Evolution - Findings from Business Model Patents
ICE-B 33 20 min Thursday 26 Session 8 14:30 - 16:30 Sustainable e-Business Dali Identifying Emerging Technologies in the e-Business Industry - A Needs-driven Approach
ICE-B 34 30 min Wednesday 25 Session 4 10:45 - 12:15 Mobility Dali On the Development of Smart Adaptive User Interfaces for Mobile e-Business Applications - Towards Enhancing User Experience – Some Lessons Learned
ICE-B 36 Poster Friday 27 Poster Session 3 10:15 - 11:15 Collaboration and e-Services Foyer Comparison Study of Some Collaborative Tools Use in Virtual Teams
ICE-B 38 Poster Wednesday 25 Poster Session 1 16:30 - 17:30 Mobility Foyer A Mobile Information System for Improved Navigation in Public Transport - User Centered Design, Development, Evaluation and e-Business Scenarios of a Mobile Roadmap Application
ICE-B 39 20 min Wednesday 25 Session 3 09:00 - 10:30 Enterprise Engineering Dali Developing a Conceptual Framework to Structure an IT Organization using an Ontology Engineering Methodology
ICE-B 41 20 min Friday 27 Session 9 09:15 - 10:15 Collaboration and e-Services Dali Usability of Mobile Applications - Dissemination of Usability Engineering in Small and Medium Enterprises
ICE-B 42 30 min Wednesday 25 Session 4 10:45 - 12:15 Applications Dali Planning, Designing and Evaluating Multiple eGovernment Interventions
ICE-B 43 20 min Friday 27 Session 9 09:15 - 10:15 Collaboration and e-Services Dali A Dimension Integration Method for a Heterogeneous Data Warehouse Environment
ICE-B 44 30 min Thursday 26 Session 8 14:30 - 16:30 Collaboration and e-Services Dali Evaluating Disseminators for Time-critical Information Diffusion on Social Networks
ICE-B 47 20 min Wednesday 25 Session 3 09:00 - 10:30 Enterprise Engineering Dali Evaluation of Maturity Models for Business Process Management - Maturity Models for Small and Medium-sized Enterprises
ICE-B 48 20 min Wednesday 25 Session 5 14:30 - 16:30 Applications Dali ArchaeoApp Rome Edition (AARE): Making Invisible Sites Visible - e-Business Aspects of Historic Knowledge Discovery via Mobile Devices
ICE-B 49 Poster Wednesday 25 Poster Session 1 16:30 - 17:30 Collaboration and e-Services Foyer Collaborative Security Management Services for Port Information Systems
ICE-B 50 20 min Wednesday 25 Session 3 09:00 - 10:30 Enterprise Engineering Dali Leveraging the Software Ecosystem - Towards a Business Model Framework for Marketplaces
ICE-B 51 30 min Tuesday 24 Session 2 14:30 - 16:30 Enterprise Engineering Dali Strategic Planning in Highly Dinamic Competitive Contexts - A Study of Italian Mobile Network Operators
ICE-B 55 20 min Wednesday 25 Session 5 14:30 - 16:30 Applications Dali Pattern Characterization in Multivariate Data Series using Fuzzy Logic - Applications to e-Health
ICE-B 56 20 min Wednesday 25 Session 5 14:30 - 16:30 Applications Dali Measurement and Concepts of Individual Application Capability of e-Business
ICE-B 58 20 min Thursday 26 Session 8 14:30 - 16:30 Collaboration and e-Services Dali Local Governments and Cloud Computing Security
ICE-B 60 20 min Friday 27 Session 9 09:15 - 10:15 Collaboration and e-Services Dali e-Business - An Online Shop in the Area of Technical and Scientific Publications
ICE-B 61 30 min Tuesday 24 Session 2 14:30 - 16:30 Applications Dali Geographic Information System using ArcGIS 10 and Open Source MapWindow - Methodology and Comparative Study
OPTICS 8 Poster Wednesday 25 Poster Session 1 16:30 - 17:30 OPTICS - International Conference on Optical Communication Systems Foyer AMO-OFDM Signal Delivery of 20 Gbit/S throughput in 20-Km Single Loopback Fiber Link Employing Baseband I/Q Separation - Adaptive Optical OFDM Modulation and Separate I/Q Baseband Signal Transmission with Remotely-fed RSOAs for Colorless ONU in Next-generation WDM Access
OPTICS 10 30 min Thursday 26 Session 7 10:45 - 12:15 OPTICS - International Conference on Optical Communication Systems Dali Channel-encoded and SVD-assisted MIMO Multimode Transmission Schemes with Iterative Detection
OPTICS 13 30 min Thursday 26 Session 7 10:45 - 12:15 OPTICS - International Conference on Optical Communication Systems Dali High Repetition Frequency Mode-locked Semiconductor Disk Laser
OPTICS 15 20 min Friday 27 Session 9 09:15 - 10:15 OPTICS - International Conference on Optical Communication Systems Sevilla Budget Extension Schemes for Nx10 Gbit/s DPSK-based TDM/WDM PON
OPTICS 16 20 min Friday 27 Session 9 09:15 - 10:15 OPTICS - International Conference on Optical Communication Systems Sevilla Success Probability Evaluation of Quantum Circuits based on Probabilistic CNOT-Gates
OPTICS 22 20 min Friday 27 Session 9 09:15 - 10:15 OPTICS - International Conference on Optical Communication Systems Sevilla All-optical Multi-wavelength Virtual Memory Architecture - Design and Performances Analysis
SECRYPT 7 30 min Thursday 26 Session 6 09:00 - 10:30 SECRYPT - International Conference on Security and Cryptography Valencia Practical Applications of Homomorphic Encryption
SECRYPT 9 30 min Wednesday 25 Session 4 10:45 - 12:15 SECRYPT - International Conference on Security and Cryptography Valencia Reversible Steganographic Scheme with High Embedding Capacity using Dual Cover Images
SECRYPT 12 Poster Wednesday 25 Poster Session 1 16:30 - 17:30 SECRYPT - International Conference on Security and Cryptography Foyer Flexible Group Key Exchange with On-demand Computation of Subgroup Keys Supporting Subgroup Key Randomization
SECRYPT 15 30 min Thursday 26 Session 8 14:30 - 16:30 SECRYPT - International Conference on Security and Cryptography Valencia Improved “Partial Sums”-based Square Attack on AES
SECRYPT 16 20 min Friday 27 Session 9 09:15 - 10:15 SECRYPT - International Conference on Security and Cryptography Valencia Analysis of Some Natural Variants of the PKP Algorithm
SECRYPT 18 30 min Thursday 26 Session 8 14:30 - 16:30 SECRYPT - International Conference on Security and Cryptography Valencia Two Dragons - A Family of Fast Word-based Stream Ciphers
SECRYPT 20 30 min Thursday 26 Session 7 10:45 - 12:15 SECRYPT - International Conference on Security and Cryptography Valencia Identity-based Password-Authenticated Key Exchange for Client/Server Model
SECRYPT 22 Poster Thursday 26 Poster Session 2 16:30 - 17:30 SECRYPT - International Conference on Security and Cryptography Foyer lmRNG: A Lightweight Pseudorandom Number Generator for Wireless Sensor Networks
SECRYPT 25 20 min Tuesday 24 Session 1 10:45 - 12:15 SECRYPT - International Conference on Security and Cryptography Valencia VLR Group Signatures - How to Achieve Both Backward Unlinkability and Efficient Revocation Checks
SECRYPT 26 Poster Wednesday 25 Poster Session 1 16:30 - 17:30 SECRYPT - International Conference on Security and Cryptography Foyer On Secure Communication over Wireless Sensor Networks
SECRYPT 34 30 min Thursday 26 Session 8 14:30 - 16:30 SECRYPT - International Conference on Security and Cryptography Valencia Quantitative Assessment of Cloud Security Level Agreements - A Case Study
SECRYPT 38 30 min Thursday 26 Session 6 09:00 - 10:30 SECRYPT - International Conference on Security and Cryptography Valencia Privacy-preserving Targeted Advertising Scheme for IPTV using the Cloud
SECRYPT 40 30 min Tuesday 24 Session 2 14:30 - 16:30 SECRYPT - International Conference on Security and Cryptography Valencia Constructing Secure-channel Free Searchable Encryption from Anonymous IBE with Partitioned Ciphertext Structure
SECRYPT 41 Poster Friday 27 Poster Session 3 10:15 - 11:15 SECRYPT - International Conference on Security and Cryptography Foyer Self-ad-MCNHA-SLOS - A Self-adaptive Minimum-Cost Network Hardening Algorithm based on Stochastic Loose Optimize Strategy
SECRYPT 42 30 min Thursday 26 Session 7 10:45 - 12:15 SECRYPT - International Conference on Security and Cryptography Valencia SIMD-based Implementations of Eta Pairing Over Finite Fields of Small Characteristics
SECRYPT 44 Poster Friday 27 Poster Session 3 10:15 - 11:15 SECRYPT - International Conference on Security and Cryptography Foyer ADQL: A Flexible Access Definition and Query Language to Define Access Control Models
SECRYPT 45 20 min Friday 27 Session 9 09:15 - 10:15 SECRYPT - International Conference on Security and Cryptography Valencia Securing In-vehicle Communication and Redefining the Role of Automotive Immobilizer
SECRYPT 49 20 min Wednesday 25 Session 3a 09:00 - 10:30 SECRYPT - International Conference on Security and Cryptography Velazquez Building the Security Foundation to Embrace Public Software-as-a-Service (SaaS) - Security Policies for SaaS Data Protection
SECRYPT 50 20 min Tuesday 24 Session 1 10:45 - 12:15 SECRYPT - International Conference on Security and Cryptography Valencia Security Policies in Dynamic Service Compositions
SECRYPT 58 30 min Wednesday 25 Session 3 09:00 - 10:30 SECRYPT - International Conference on Security and Cryptography Valencia Homomorphic Primitives for a Privacy-friendly Smart Metering Architecture
SECRYPT 59 30 min Wednesday 25 Session 3 09:00 - 10:30 SECRYPT - International Conference on Security and Cryptography Valencia Flexible Redactable Signature Schemes for Trees - Extended Security Model and Construction
SECRYPT 61 20 min Tuesday 24 Session 1 10:45 - 12:15 SECRYPT - International Conference on Security and Cryptography Valencia Towards Pervasive Cryptographic Access Control Models
SECRYPT 62 20 min Tuesday 24 Session 1 10:45 - 12:15 SECRYPT - International Conference on Security and Cryptography Valencia Cryptographic Enforcement of Access Control while Mitigating Key Sharing
SECRYPT 63 20 min Wednesday 25 Session 5 14:30 - 16:30 SECRYPT - International Conference on Security and Cryptography Valencia Verifying Privacy by Little Interaction and No Process Equivalence
SECRYPT 64 20 min Wednesday 25 Session 5 14:30 - 16:30 SECRYPT - International Conference on Security and Cryptography Valencia A Security Analysis of Emerging Web Standards - HTML5 and Friends, from Specification to Implementation
SECRYPT 66 30 min Tuesday 24 Session 2 14:30 - 16:30 SECRYPT - International Conference on Security and Cryptography Valencia High-throughput Hardware Architectures of the JH Round-three SHA-3 Candidate - An FPGA Design and Implementation Approach
SECRYPT 68 Poster Thursday 26 Poster Session 2 16:30 - 17:30 SECRYPT - International Conference on Security and Cryptography Foyer Non-repudiation of Forwarding - Traceability of Confidential Data Via Multiple Recipients
SECRYPT 72 30 min Tuesday 24 Session 2 14:30 - 16:30 SECRYPT - International Conference on Security and Cryptography Valencia Private Outsourcing of Matrix Multiplication over Closed Semi-rings
SECRYPT 73 30 min Wednesday 25 Session 3 09:00 - 10:30 SECRYPT - International Conference on Security and Cryptography Valencia Extension of de Weger’s Attack on RSA with Large Public Keys
SECRYPT 74 30 min Thursday 26 Session 8 14:30 - 16:30 SECRYPT - International Conference on Security and Cryptography Valencia On Securing Communication from Profilers
SECRYPT 75 20 min Wednesday 25 Session 5 14:30 - 16:30 SECRYPT - International Conference on Security and Cryptography Valencia Biometric Identification in Virtual Worlds using Biometric Fusion Techniques
SECRYPT 79 20 min Wednesday 25 Session 5 14:30 - 16:30 SECRYPT - International Conference on Security and Cryptography Valencia On the Development of Totally Self-checking Hardware Design for the SHA-1 Hash Function
SECRYPT 81 30 min Wednesday 25 Session 4 10:45 - 12:15 SECRYPT - International Conference on Security and Cryptography Valencia Voice Passwords Revisited
SECRYPT 87 Poster Wednesday 25 Poster Session 1 16:30 - 17:30 SECRYPT - International Conference on Security and Cryptography Foyer Attack Modelling and Security Evaluation for Security Information and Event Management
SECRYPT 91 30 min Tuesday 24 Session 2 14:30 - 16:30 SECRYPT - International Conference on Security and Cryptography Valencia DDoS Detection with Information Theory Metrics and Netflows - A Real Case
SECRYPT 106 Poster Thursday 26 Poster Session 2 16:30 - 17:30 SECRYPT - International Conference on Security and Cryptography Foyer Sevigator: Network Confinement of Malware Applications and Untrusted Operating Systems
SECRYPT 110 20 min Wednesday 25 Session 3a 09:00 - 10:30 SECRYPT - International Conference on Security and Cryptography Velazquez Key Management as a Service
SECRYPT 112 20 min Thursday 26 Session 8a 14:30 - 16:30 SECRYPT - International Conference on Security and Cryptography Velazquez Secure and Seamless Session Management in Mobile and Heterogeneous Environment
SECRYPT 113 20 min Thursday 26 Session 8a 14:30 - 16:30 SECRYPT - International Conference on Security and Cryptography Velazquez A Collaborative Firewall for Wireless Ad-Hoc Social Networks
SECRYPT 116 20 min Wednesday 25 Session 5 14:30 - 16:30 SECRYPT - International Conference on Security and Cryptography Valencia Some Remarks on Keystroke Dynamics - Global Surveillance, Retrieving Information and Simple Countermeasures
SECRYPT 120 Poster Thursday 26 Poster Session 2 16:30 - 17:30 SECRYPT - International Conference on Security and Cryptography Foyer Development of a Snort IPv6 Plugin - Detection of Attacks on the Neighbor Discovery Protocol
SECRYPT 123 20 min Friday 27 Session 9 09:15 - 10:15 SECRYPT - International Conference on Security and Cryptography Valencia An Improved Public-key Tracing Scheme with Sublinear Ciphertext Size
SECRYPT 124 30 min Thursday 26 Session 6 09:00 - 10:30 SECRYPT - International Conference on Security and Cryptography Valencia Secure File Allocation and Caching in Large-scale Distributed Systems
SECRYPT 128 30 min Thursday 26 Session 7 10:45 - 12:15 SECRYPT - International Conference on Security and Cryptography Valencia Formal Analysis of the TLS Handshake Protocol
SECRYPT 129 20 min Wednesday 25 Session 3a 09:00 - 10:30 SECRYPT - International Conference on Security and Cryptography Velazquez Data Repository for Security Information and Event Management in Service Infrastructures
SECRYPT 130 20 min Thursday 26 Session 8a 14:30 - 16:30 SECRYPT - International Conference on Security and Cryptography Velazquez Distributed Threshold Certificate based Encryption Scheme with No Trusted Dealer
SECRYPT 131 20 min Thursday 26 Session 8a 14:30 - 16:30 SECRYPT - International Conference on Security and Cryptography Velazquez Improving Cloud Survivability through Dependency based Virtual Machine Placement
SECRYPT 132 20 min Thursday 26 Session 8a 14:30 - 16:30 SECRYPT - International Conference on Security and Cryptography Velazquez PPiTTA - Preserving Privacy in TV Targeted Advertising
SECRYPT 135 Poster Wednesday 25 Poster Session 1 16:30 - 17:30 SECRYPT - International Conference on Security and Cryptography Foyer The Concept of Compatibility between Identity-based and Certificateless Encryption Schemes
SECRYPT 137 20 min Wednesday 25 Session 3a 09:00 - 10:30 SECRYPT - International Conference on Security and Cryptography Velazquez Quantifying the Benefits of File Size Information for Forensic Hash Matching
SECRYPT 139 20 min Friday 27 Session 9 09:15 - 10:15 SECRYPT - International Conference on Security and Cryptography Valencia Inverting Thanks to SAT Solving - An Application on Reduced-step MD*
SECRYPT 140 20 min Thursday 26 Session 8a 14:30 - 16:30 SECRYPT - International Conference on Security and Cryptography Velazquez Improved Detection of Probe Request Attacks - Using Neural Networks and Genetic Algorithm
SECRYPT 143 Poster Wednesday 25 Poster Session 1 16:30 - 17:30 SECRYPT - International Conference on Security and Cryptography Foyer iSATS: Leveraging Identity based Sender Authentication for Spam Mitigation
SECRYPT 153 Poster Thursday 26 Poster Session 2 16:30 - 17:30 SECRYPT - International Conference on Security and Cryptography Foyer Adaptive Speech Watermarking in Wavelet Domain based on Logarithm
SECRYPT 160 Poster Wednesday 25 Poster Session 1 16:30 - 17:30 SECRYPT - International Conference on Security and Cryptography Foyer Defense Against TCP Flooding Attack
SECRYPT 163 Poster Thursday 26 Poster Session 2 16:30 - 17:30 SECRYPT - International Conference on Security and Cryptography Foyer An Application of a Group Signature Scheme with Backward Unlinkability to Biometric Identity Management
SECRYPT 164 Poster Thursday 26 Poster Session 2 16:30 - 17:30 SECRYPT - International Conference on Security and Cryptography Foyer A Novel Fuzzy Vault Scheme for Secret Key Exchange
SECRYPT 167 Poster Wednesday 25 Poster Session 1 16:30 - 17:30 SECRYPT - International Conference on Security and Cryptography Foyer Network-based Executable File Extraction and Analysis for Malware Detection
SECRYPT 173 Poster Thursday 26 Poster Session 2 16:30 - 17:30 SECRYPT - International Conference on Security and Cryptography Foyer HoneyCloud: Elastic Honeypots - On-attack Provisioning of High-interaction Honeypots
SECRYPT 174 Poster Thursday 26 Poster Session 2 16:30 - 17:30 SECRYPT - International Conference on Security and Cryptography Foyer A Proposed Framework for Analysing Security Ceremonies
SIGMAP 7 Poster Wednesday 25 Poster Session 1 16:30 - 17:30 Multimedia Systems and Applications Foyer Computer Games Sound Effects - Recording, Postproduction and Existing Database
SIGMAP 8 Poster Thursday 26 Poster Session 2 16:30 - 17:30 Multimedia Signal Processing Foyer Complexity Analysis of Video Frames by Corresponding Audio Features
SIGMAP 11 Poster Wednesday 25 Poster Session 1 16:30 - 17:30 Multimedia and Communications Foyer MPEG-4/AVC versus MPEG-2 in IPTV
SIGMAP 12 Poster Thursday 26 Poster Session 2 16:30 - 17:30 Multimedia and Communications Foyer Design of Short Irregular LDPC Codes for a Markov-modulated Gaussian Channel
SIGMAP 13 20 min Thursday 26 Session 8 14:30 - 16:30 Multimedia Signal Processing Sevilla Fast Algorithm of Short-time DCT for Low Resolution Signal Processing
SIGMAP 18 20 min Wednesday 25 Session 3 09:00 - 10:30 Multimedia and Communications Sevilla Adaptive Rate Control Scheme for Improving Quality of Multimedia in Broadband Wireless Networks
SIGMAP 33 20 min Thursday 26 Session 6 09:00 - 10:30 Multimedia Systems and Applications Sevilla The Effect of Multi-media Contents in Reducing Sensible Temperature
SIGMAP 34 20 min Thursday 26 Session 6 09:00 - 10:30 Multimedia Systems and Applications Sevilla Image Presentation with Smell for Digital Signage and the Effect on Eye Catching
SIGMAP 35 Poster Friday 27 Poster Session 3 10:15 - 11:15 Multimedia Signal Processing Foyer Performance Analysis of New SNR Estimation Methodology based on Preamble Approach
SIGMAP 36 Poster Friday 27 Poster Session 3 10:15 - 11:15 Multimedia Signal Processing Foyer Novel Channel Estimation Algorithm using Various Filter Design in LTE-Advanced System
SIGMAP 38 20 min Thursday 26 Session 8 14:30 - 16:30 Multimedia Signal Processing Sevilla Sphere Decoding Complexity Reduction using an Adaptive SD-OSIC Algorithm
SIGMAP 40 Poster Thursday 26 Poster Session 2 16:30 - 17:30 Multimedia and Communications Foyer Enhancing Photoware in the Social Networks Environment
SIGMAP 42 20 min Thursday 26 Session 6 09:00 - 10:30 Multimedia Systems and Applications Sevilla Architectural Model for Visualization of High Definition Images on Mobile Devices
SIGMAP 44 30 min Wednesday 25 Session 4 10:45 - 12:15 Multimedia Signal Processing Sevilla Diffusion Tracking Algorithm for Image Segmentation
SIGMAP 45 Poster Wednesday 25 Poster Session 1 16:30 - 17:30 Multimedia Signal Processing Foyer Optimal Multidimensional Signal Processing in Wireless Sensor Networks
SIGMAP 46 20 min Thursday 26 Session 8 14:30 - 16:30 Multimedia Signal Processing Sevilla Finding a Tradeoff between Compression and Loss in Motion Compensated Video Coding
SIGMAP 47 20 min Tuesday 24 Session 1 10:45 - 12:15 Multimedia Systems and Applications Sevilla Consumer Propensity and Location Analysis based Real-time Location Tracing Advertisement Service Design and Implementation - Real-time Location based Advertisement System
SIGMAP 48 Poster Friday 27 Poster Session 3 10:15 - 11:15 Multimedia Systems and Applications Foyer Semi-dynamic Calibration for Eye Gaze Pointing System based on Image Processing
SIGMAP 51 Poster Thursday 26 Poster Session 2 16:30 - 17:30 Multimedia Signal Processing Foyer Search Range Adjustment and Motion Vector Prediction for Fast Motion Estimation - Using Neighbouring Motion Vectors and Distortions for Adjustment of a Search Range and a Starting Point
SIGMAP 54 20 min Thursday 26 Session 8 14:30 - 16:30 Multimedia Signal Processing Sevilla New Two-step Motion Estimation using Adjustable Partial Distortion Search - Advanced Selected Search Point and Early Termination for Two Step Motion Search
SIGMAP 55 20 min Thursday 26 Session 8 14:30 - 16:30 Multimedia Signal Processing Sevilla Video Foreground/Background Segmentation using Spatially Distributed Model and Edge-based Shadow Cancellation
SIGMAP 56 20 min Thursday 26 Session 7 10:45 - 12:15 Multimedia Systems and Applications Sevilla Autonomous Constructing Everyday Projected Displays
SIGMAP 57 20 min Wednesday 25 Session 3 09:00 - 10:30 Multimedia and Communications Sevilla Time-frequency Filtering of Gaussian and Impulse Noise for Spread Spectrum Power Line Communication
SIGMAP 58 30 min Wednesday 25 Session 4 10:45 - 12:15 Multimedia Signal Processing Sevilla Optimisation of Smoothing Parameter of Diffeomorphism Kernel Estimate for Bounded Random Data
SIGMAP 59 30 min Thursday 26 Session 7 10:45 - 12:15 Multimedia Systems and Applications Sevilla Keywords-based Automatic Multimedia Authoring in the Cloud
SIGMAP 60 30 min Wednesday 25 Session 4 10:45 - 12:15 Multimedia Signal Processing Sevilla Development of Computer Algorithms to Control a Weelchair through the Movement of the Head by Artificial Vision
SIGMAP 61 20 min Thursday 26 Session 8 14:30 - 16:30 Multimedia Signal Processing Sevilla Raw Camera Image Demosaicing using Finite Impulse Response Filtering on Commodity GPU Hardware using CUDA
SIGMAP 62 20 min Thursday 26 Session 8 14:30 - 16:30 Multimedia Signal Processing Sevilla A Dataflow Description of ACC-JPEG Codec
SIGMAP 65 Poster Thursday 26 Poster Session 2 16:30 - 17:30 Multimedia Signal Processing Foyer Friction Sources Characterization for Fricative Consonants of Arabic
SIGMAP 75 20 min Wednesday 25 Session 3 09:00 - 10:30 Multimedia and Communications Sevilla Spaxels, Pixels in Space - A Novel Mode of Spatial Display
SIGMAP 76 Poster Friday 27 Poster Session 3 10:15 - 11:15 Multimedia Systems and Applications Foyer Simulated Annealing based Parameter Optimization of Time-frequency e-filter Utilizing Correlation Coefficient
SIGMAP 77 20 min Thursday 26 Session 6 09:00 - 10:30 Multimedia Systems and Applications Sevilla Content Meets Semantics: Smarter Exploration of Image Collections - Presentation of Relevant Use Cases
SIGMAP 79 20 min Thursday 26 Session 7 10:45 - 12:15 Multimedia Systems and Applications Sevilla Next Generation TV through Automatic Multimedia Annotation Systems - A Hybrid Approach
SIGMAP 80 20 min Tuesday 24 Session 1 10:45 - 12:15 Multimedia Systems and Applications Sevilla Centroid-based Clustering for Student Models in Computer-based Multiple Language Tutoring
SIGMAP 81 20 min Tuesday 24 Session 1 10:45 - 12:15 Multimedia Systems and Applications Sevilla Influence of Different Phoneme Mappings on the Recognition Accuracy of Electrolaryngeal Speech
SIGMAP 82 20 min Tuesday 24 Session 1 10:45 - 12:15 Multimedia Systems and Applications Sevilla Large Scale Similar Song Retrieval using Beat-aligned Chroma Patch Codebook with Location Verification
SIGMAP 85 20 min Thursday 26 Session 7 10:45 - 12:15 Multimedia Systems and Applications Sevilla A New Tool for the Analysis of Heart Rate Variability of Long Duration Records
WINSYS 1 30 min Wednesday 25 Session 5 14:30 - 16:30 Wireless and Mobile Technologies Velazquez Optimal MAC PDU Size in ARQ-enabled Connections in IEEE 802.16e/WiMAX Systems
WINSYS 2 20 min Wednesday 25 Session 5 14:30 - 16:30 Wireless and Mobile Technologies Velazquez Efficient Coupled PHY and MAC Use of Physical Bursts in WiMAX/IEEE 802.16e Networks
WINSYS 3 Poster Wednesday 25 Poster Session 1 16:30 - 17:30 Wireless and Mobile Technologies Foyer Differential Space Time Block Codes for High Mobility Scenarios
WINSYS 6 30 min Tuesday 24 Session 1 10:45 - 12:15 Mobile Software and Services Velazquez Quality of Experience Evaluation for Data Services over Cellular Networks
WINSYS 7 30 min Tuesday 24 Session 1 10:45 - 12:15 Sensor, Mesh and Ad Hoc Communications and Networks Velazquez Authentication Optimization for Vertical Handover in Heterogeneous Wireless Networks
WINSYS 10 20 min Tuesday 24 Session 2 14:30 - 16:30 Sensor, Mesh and Ad Hoc Communications and Networks Velazquez From Farm to Fork: Traceability based on RFID - A Proposal for Complete Traceability in the Wine Sector
WINSYS 12 Poster Wednesday 25 Poster Session 1 16:30 - 17:30 Sensor, Mesh and Ad Hoc Communications and Networks Foyer Bandwidth Analysis of the Ubiquitous Video Conferencing Application
WINSYS 14 20 min Tuesday 24 Session 2 14:30 - 16:30 Sensor, Mesh and Ad Hoc Communications and Networks Velazquez Using Radio Frequency Identification Technology to Track Individual Wine Bottles
WINSYS 17 20 min Wednesday 25 Session 4 10:45 - 12:15 Wireless and Mobile Technologies Velazquez Implementation of the COST 273 Directional Channel Model in Microcell Scenarios
WINSYS 19 30 min Wednesday 25 Session 5 14:30 - 16:30 Wireless and Mobile Technologies Velazquez Improving the Reliability of a Train Positioning System through the Use of Full Coverage Radio Communication Technologies - Performance Study of a TETRA Network to Transmit Position Information
WINSYS 23 20 min Tuesday 24 Session 2 14:30 - 16:30 Sensor, Mesh and Ad Hoc Communications and Networks Velazquez Performance Evaluation for TCP in Tactical Mobile Ad Hoc Networks
WINSYS 24 30 min Wednesday 25 Session 5 14:30 - 16:30 Wireless and Mobile Technologies Velazquez Investigation of a Radio Propagation Model for Vegetation Scatter Dynamic Channels at BFWA Frequencies
WINSYS 32 20 min Tuesday 24 Session 2 14:30 - 16:30 Sensor, Mesh and Ad Hoc Communications and Networks Velazquez Improved NetArgus - A Suite of Wi-fi Positioning & SNMP Monitor
WINSYS 42 Poster Wednesday 25 Poster Session 1 16:30 - 17:30 Sensor, Mesh and Ad Hoc Communications and Networks Foyer New Mobility Metric based on MultiPoint Relay Life Duration
WINSYS 46 Poster Wednesday 25 Poster Session 1 16:30 - 17:30 Mobile Software and Services Foyer Student Experience - Issues of Wireless Access and Cloud Deployment in Higher Education
WINSYS 51 20 min Wednesday 25 Session 4 10:45 - 12:15 Wireless and Mobile Technologies Velazquez Sustainable Rural Areas - Network-based Architecture
WINSYS 52 20 min Wednesday 25 Session 4 10:45 - 12:15 Wireless and Mobile Technologies Velazquez QoE – Based Scheduling in WiMAX Networks
WINSYS 53 30 min Tuesday 24 Session 1 10:45 - 12:15 Sensor, Mesh and Ad Hoc Communications and Networks Velazquez Knowledge Acquisition System based on JSON Schema - Implementation of a HCI for Actuation of Biosignals Acquisition Systems