09:00 |
-
7:
Practical Applications of Homomorphic Encryption
Michael Brenner, Henning Perl and Matthew Smith
-
38:
Privacy-preserving Targeted Advertising Scheme for IPTV using the Cloud
Leyli Javid Khayati, Erkay Savaş, Berkant Ustaoğlu and Cengiz Örencik
-
124:
Secure File Allocation and Caching in Large-scale Distributed Systems
Alessio Di Mauro, Alessandro Mei and Sushil Jajodia
-
33:
The Effect of Multi-media Contents in Reducing Sensible Temperature
Shuhei Yamamoto, Akira Tomono and Hajime Katsuyama
-
34:
Image Presentation with Smell for Digital Signage and the Effect on Eye Catching
Keisuke Tomono, Hajime Katsuyama, Shuhei Yamamoto and Akira Tomono
-
42:
Architectural Model for Visualization of High Definition Images on Mobile Devices
Germán Corredor, Daniel Martínez, Eduardo Romero and Marcela Iregui
-
77:
Content Meets Semantics: Smarter Exploration of Image Collections - Presentation of Relevant Use Cases
Ilaria Bartolini
|
10:30 |
Coffee-Break (10:30 - 10:45)
|
10:45 |
-
10:
Channel-encoded and SVD-assisted MIMO Multimode Transmission Schemes with Iterative Detection
Sebastian Aust, Andreas Ahrens and Steffen Lochmann
-
13:
High Repetition Frequency Mode-locked Semiconductor Disk Laser
Yanrong Song, Peng Zhang, Jinrong Tian, Zhigang Zhang, Hark Hoe Tan and C. Jagadish
-
20:
Identity-based Password-Authenticated Key Exchange for Client/Server Model
Xun Yi, Raylin Tso and Eiji Okamoto
-
42:
SIMD-based Implementations of Eta Pairing Over Finite Fields of Small Characteristics
Anup Kr. Bhattacharya, Abhijit Das, Dipanwita Roychowdhury, Bhargav Bellur and Aravind Iyer
-
128:
Formal Analysis of the TLS Handshake Protocol
Hanane Houmani and Mourad Debbabi
-
59:
Keywords-based Automatic Multimedia Authoring in the Cloud
Abdelkader Outtagarts, Sylvain Squedin and Olivier Martimot
-
56:
Autonomous Constructing Everyday Projected Displays
Cui Xie, Qi Wang and Wei Cheng
-
79:
Next Generation TV through Automatic Multimedia Annotation Systems - A Hybrid Approach
Joël Dumoulin, Marco Bertini, Alberto Del Bimbo, Elena Mugellini, Omar Abou Khaled and Maria Sokhn
-
85:
A New Tool for the Analysis of Heart Rate Variability of Long Duration Records
Ricardo Chorão, Joana Sousa, Tiago Araújo and Hugo Gamboa
|
12:15 |
|
13:15 |
Lunch (13:15 - 14:30)
|
14:30 |
-
8:
Three Dimensional Elements for Sustainable e-Business Modelling
Mohammed Naim A. Dewan, Maruf Hossan Chowdhury and Mohammed A. Quaddus
-
44:
Evaluating Disseminators for Time-critical Information Diffusion on Social Networks
Yung-Ming Li and Lien-Fa Lin
-
27:
A Framework for Performance Measurement in Service Oriented Virtual Organizations - A Value Network Approach to Collaborative Performance Measurement
S. M. Amin Kamali, Greg Richards, Mohammad H. Danesh and Bijan Raahemi
-
33:
Identifying Emerging Technologies in the e-Business Industry - A Needs-driven Approach
Kyungpyo Lee, Youngkeun Song and Sungjoo Lee
-
58:
Local Governments and Cloud Computing Security
Inita Kindzule, Edzus Zeiris and Maris Ziema
-
15:
Improved “Partial Sums”-based Square Attack on AES
Michael Tunstall
-
18:
Two Dragons - A Family of Fast Word-based Stream Ciphers
Matt Henricksen
-
34:
Quantitative Assessment of Cloud Security Level Agreements - A Case Study
Jesus Luna Garcia, Hamza Ghani, Tsvetoslava Vateva and Neeraj Suri
-
74:
On Securing Communication from Profilers
Sandra Díaz-Santiago and Debrup Chakraborty
-
112:
Secure and Seamless Session Management in Mobile and Heterogeneous Environment
Ali Hammami and Noëmie Simoni
-
113:
A Collaborative Firewall for Wireless Ad-Hoc Social Networks
Leonardo Maccari
-
130:
Distributed Threshold Certificate based Encryption Scheme with No Trusted Dealer
Apostolos P. Fournaris
-
131:
Improving Cloud Survivability through Dependency based Virtual Machine Placement
Min Li, Yulong Zhang, Kun Bai, Wanyu Zang, Meng Yu and Xubin He
-
132:
PPiTTA - Preserving Privacy in TV Targeted Advertising
Tzachy Reinman and Erez Waisbard
-
140:
Improved Detection of Probe Request Attacks - Using Neural Networks and Genetic Algorithm
Deepthi N. Ratnayake, Hassan B. Kazemian and Syed A. Yusuf
-
13:
Fast Algorithm of Short-time DCT for Low Resolution Signal Processing
Vitaly Kober
-
38:
Sphere Decoding Complexity Reduction using an Adaptive SD-OSIC Algorithm
Bora Kim, Sangmi Moon, Saransh Malik, Cheolhong Kim and Intae Hwang
-
46:
Finding a Tradeoff between Compression and Loss in Motion Compensated Video Coding
Thomas Guthier, Adrian Sosic, Volker Willert and Julian Eggert
-
54:
New Two-step Motion Estimation using Adjustable Partial Distortion Search - Advanced Selected Search Point and Early Termination for Two Step Motion Search
Yonghoon Kim and Jechang Jeong
-
55:
Video Foreground/Background Segmentation using Spatially Distributed Model and Edge-based Shadow Cancellation
Shian-De Tsai, Jin-Jang Leou and Han-Hui Hsiao
-
61:
Raw Camera Image Demosaicing using Finite Impulse Response Filtering on Commodity GPU Hardware using CUDA
Patrik Goorts, Sammy Rogmans and Philippe Bekaert
-
62:
A Dataflow Description Of ACC-JPEG Codec
Khaled Jerbi, Tarek Ouni and Mohamed Abid
|
16:30 |
Coffee-Break (16:30 - 16:45)
|
16:30 |
-
3:
Analysing E-Business Applications with Business Provenance
Sergio Manuel Serra da Cruz, Laci Mary Manhães, Raimundo Costa and Jorge Zavaleta
-
6:
IS Employees’ Stress and Outcomes at Work
Huichih Wang, Sheng-Jim Fan and Her-Sen Doong
-
10:
A STUDY ON OLDER ADULT STUDENTS’ BEHAVIOURAL INTENTION AND LEARNING SATISFACTION OF BLENDED E-LEARNING COURSE AT THE ACTIVE AGING UNIVERSITY
Horng-Jyh Chen, Chien-Jen Liu, Chien-Liang Lin, Yi-Fang Chen and Hung-Liang Chen
-
13:
Factors that Influence e-Business Application in Tertiary Education
Andreas Ahrens, Sebastian Aust and Jeļena Zaščerinska
-
22:
lmRNG: A Lightweight Pseudorandom Number Generator for Wireless Sensor Networks
Anna Sojka and Krzysztof Piotrowski
-
68:
Non-repudiation of Forwarding - Traceability of Confidential Data Via Multiple Recipients
Rainer Schick and Christoph Ruland
-
106:
Sevigator: Network Confinement of Malware Applications and Untrusted Operating Systems
Denis Efremov and Nikolay Pakulin
-
120:
Development of a Snort IPv6 Plugin - Detection of Attacks on the Neighbor Discovery Protocol
Martin Schütte, Thomas Scheffler and Bettina Schnor
-
153:
Adaptive Speech Watermarking in Wavelet Domain based on Logarithm
Mehdi Fallahpour, David Megias and Hossein Najaf-Zadeh
-
163:
An Application of a Group Signature Scheme with Backward Unlinkability to Biometric Identity Management
Julien Bringer, Hervé Chabanne and Alain Patey
-
164:
A Novel Fuzzy Vault Scheme for Secret Key Exchange
Lin You and Jie Lu
-
173:
HoneyCloud: Elastic Honeypots - On-attack Provisioning of High-interaction Honeypots
Patrice Clemente, Jean-Francois Lalande and Jonathan Rouzaud-Cornabas
-
174:
A Proposed Framework for Analysing Security Ceremonies
Marcelo Carlomagno Carlos, Jean Everson Martina, Geraint Price and Ricardo Felipe Custódio
-
8:
Complexity Analysis of Video Frames by Corresponding Audio Features
SeungHo Shin and TaeYong Kim
-
12:
Design of Short Irregular LDPC Codes for a Markov-modulated Gaussian Channel
W. Proß, M. Otesteanu and F. Quint
-
40:
Enhancing Photoware in the Social Networks Environment
Ombretta Gaggi
-
51:
Search Range Adjustment and Motion Vector Prediction for Fast Motion Estimation - Using Neighbouring Motion Vectors and Distortions for Adjustment of a Search Range and a Starting Point
Do-Kyung Lee and Je-Chang Jeong
-
65:
Friction Sources Characterization for Fricative Consonants of Arabic
Fazia Karaoui and Amar Djéradi
|