Event Paper Nr. Presentation Day Session Time Area Room Paper Title
DCNET 4 20 min Tuesday 30 Session 2A 09:00 - 10:30 DCNET - International Conference on Data Communication Networking M102 Evaluation of Video Transmission in Emergency Response Ad Hoc Networks
DCNET 6 Poster Monday 29 Poster Session 1 11:00 - 12:00 DCNET - International Conference on Data Communication Networking Sólin A Novel Technique for TCP Based Congestion Control
DCNET 7 30 min Tuesday 30 Session 2A 09:00 - 10:30 DCNET - International Conference on Data Communication Networking M102 Some Synchronization Issues in OSPF Routing
DCNET 8 20 min Wednesday 31 Session 6A 10:45 - 12:15 DCNET - International Conference on Data Communication Networking M209 Resource-aware Virtualization for Industrial Networks - A Novel Architecture Combining Resource Management, Policy Control and Network Virtualization for Networks in Automation or Supervisory Control and Data Acquisition Networks
DCNET 9 20 min Wednesday 31 Session 6A 10:45 - 12:15 DCNET - International Conference on Data Communication Networking M209 Token-based Authentication for Smartphones - Position Paper
DCNET 12 30 min Tuesday 30 Session 2A 09:00 - 10:30 DCNET - International Conference on Data Communication Networking M102 HyVVE - A Voronoi based Hybrid Architecture for Massively Multiplayer On-line Games
DCNET 14 20 min Wednesday 31 Session 6A 10:45 - 12:15 DCNET - International Conference on Data Communication Networking M209 A New Approach for Detection of Host Identity in IPv6 Networks
DCNET 17 Poster Monday 29 Poster Session 2 16:15 - 17:15 DCNET - International Conference on Data Communication Networking Sólin Towards Algorithm Agility for Wireless Sensor Networks - Comparison of the Portability of Selected Hash Functions - Position Paper
ICE-B 6 Poster Monday 29 Poster Session 1 11:00 - 12:00 Applications Sólin Accommodating Individual Differences in Web based Instruction (WBI) and Implementation
ICE-B 7 30 min Wednesday 31 Session 6A 10:45 - 12:15 Mobility M208 Integrating User-centred Design in an Early Stage of Mobile Medical Application Prototyping - A Case Study on Data Acquistion in Health Organisations
ICE-B 8 Poster Monday 29 Poster Session 2 16:15 - 17:15 Applications Sólin e-Business Application to Students""'' Blended Learning in Higher Education
ICE-B 10 20 min Tuesday 30 Session 2A 09:00 - 10:30 Sustainable e-Business M209 Electronic Human Resource Management Strategies for Atypical Employment
ICE-B 11 30 min Monday 29 Session 1A 14:15 - 16:15 Sustainable e-Business M209 Determinants of Use Intensity in Social Networking Sites - A Cross-cultural Study of Korea and USA
ICE-B 13 30 min Monday 29 Session 1A 14:15 - 16:15 Applications M209 Strategic use of Twitter in Local Government - A Northern Ireland Study
ICE-B 18 20 min Monday 29 Session 1A 14:15 - 16:15 Applications M209 The Trust in Online Discussion Forums and How they Influence Patients' Intention to Adopt Medical Tourism Services
ICE-B 19 30 min Tuesday 30 Session 4A 14:30 - 16:30 Enterprise Engineering M209 Which Clicks Lead to Conversions? - Modeling User-journeys Across Multiple Types of Online Advertising
ICE-B 20 30 min Wednesday 31 Session 6A 10:45 - 12:15 Technology Platforms M208 RestContext - A Service Framework for Context Retrieval
ICE-B 21 Poster Monday 29 Poster Session 1 11:00 - 12:00 Applications Sólin A Proposed Framework for Supporting Behaviour Change by Translating Personalised Activities into Measurable Benefits
ICE-B 22 30 min Tuesday 30 Session 4A 14:30 - 16:30 Mobility M209 Virtual Currency for Online Platforms - Business Model Implications
ICE-B 24 30 min Tuesday 30 Session 2A 09:00 - 10:30 e-Logistics M209 An Interactive Evaluation Method of Decentralized Procurement Plan by Multi-Objective Genetic Algorithm
ICE-B 26 Poster Monday 29 Poster Session 2 16:15 - 17:15 e-Logistics Sólin RFID based Data Mining for E-logistics
ICE-B 27 20 min Wednesday 31 Session 6A 10:45 - 12:15 Technology Platforms M208 Data Model and Data Access Control Method on Service Platform for Smart Public Infrastructure
ICE-B 30 Poster Monday 29 Poster Session 2 16:15 - 17:15 Enterprise Engineering Sólin The e-Visibility Maturity Model - Assessing Stages of Visibility Evolution for e-Business
ICE-B 31 Poster Monday 29 Poster Session 1 11:00 - 12:00 Applications Sólin Applying Bayesian Parameter Estimation to A/B Tests in e-Business Applications - Examining the Impact of Green Marketing Signals in Sponsored Search Advertising
ICE-B 32 Poster Tuesday 30 Poster Session 3 16:30 - 17:30 Applications Sólin The Influence of Virtualization of Resources Acquisition Processes on the Enterprises Competitiveness
ICE-B 33 20 min Tuesday 30 Session 2A 09:00 - 10:30 e-Logistics M209 A Distributed CTL Model Checker
ICE-B 34 Poster Monday 29 Poster Session 1 11:00 - 12:00 Applications Sólin A Comparative Prediction Study of Housing Price Index based on Web Search Data - Evidence from Beijing and Lanzhou in China
ICE-B 35 20 min Tuesday 30 Session 3B 10:45 - 12:15 Mobility M208 Marketing and Fundraising through Mobile Phones - New Strategies for Non Profit Organizations and Charities
ICE-B 36 Poster Monday 29 Poster Session 2 16:15 - 17:15 Collaboration and e-Services Sólin EFilter: An Efficient Filter for Supporting Twig Query Patterns in XML Streams
ICE-B 37 Poster Monday 29 Poster Session 2 16:15 - 17:15 Applications Sólin A Study on Construction of Inflation Index based on Web Search Data
ICE-B 38 30 min Tuesday 30 Session 3B 10:45 - 12:15 Applications M208 Emerging Trends in Local Governments Web Strategies - Citizen Web Empowerment Assessment in Italy
ICE-B 40 20 min Tuesday 30 Session 3A 10:45 - 12:15 Applications M209 Continuous Improvement of Geographic Data Production Processes - Approach and Results of a Case Study
ICE-B 41 30 min Tuesday 30 Session 4A 14:30 - 16:30 Enterprise Engineering M209 From e-Supply Chain Capability Generation to Information Technology Value Co-creation - A Perspective of e-Business Process
ICE-B 42 Poster Tuesday 30 Poster Session 3 16:30 - 17:30 Collaboration and e-Services Sólin The Concept of Building Regional Business Spatial Community
ICE-B 44 Poster Monday 29 Poster Session 2 16:15 - 17:15 Enterprise Engineering Sólin The Consideration of Organizational, Human and Corporate Cultural Factors in the Implementation of Business Process Management Projects - Social Factors to Prevent Failure of BPM Projects
ICE-B 45 30 min Tuesday 30 Session 4A 14:30 - 16:30 Applications M209 Estimating the Effort in the Development of Distance Learning Paths
ICE-B 47 Poster Tuesday 30 Poster Session 3 16:30 - 17:30 Collaboration and e-Services Sólin Proposed Use of Sharepoint to Improve New Employee In-processing
ICE-B 53 Poster Monday 29 Poster Session 1 11:00 - 12:00 Applications Sólin Qsense - Learning Semantic Web Concepts by Querying DBpedia
ICE-B 54 20 min Tuesday 30 Session 3A 10:45 - 12:15 Collaboration and e-Services M209 Continuous Information Provisioning for the Conference Participation Process
ICE-B 55 30 min Tuesday 30 Session 3A 10:45 - 12:15 Applications M208 The Development of ``BAU GIS'' Web/Program using Open Source MapWindow
ICE-B 56 20 min Tuesday 30 Session 3A 10:45 - 12:15 Collaboration and e-Services M209 Increase of Travel Safety for Public Transport by Mobile Applications
OPTICS 2 30 min Tuesday 30 Session 3A 10:45 - 12:15 OPTICS - International Conference on Optical Communication Systems M102 Dispersion Analysis within a Measured 1,4 km MIMO Multimode Channel
OPTICS 3 30 min Tuesday 30 Session 3A 10:45 - 12:15 OPTICS - International Conference on Optical Communication Systems M102 Optical Couplers in Multimode MIMO Transmission Systems - Measurement Results and Performance Analysis
OPTICS 10 Poster Monday 29 Poster Session 2 16:15 - 17:15 OPTICS - International Conference on Optical Communication Systems Sólin Optical Parametric Gain of Tellutire/Phosphate Highly Nonlinear Optical Fiber
OPTICS 11 20 min Tuesday 30 Session 3A 10:45 - 12:15 OPTICS - International Conference on Optical Communication Systems M102 Experimental Distribution of OFDM-UWB Radio Signals along Directly Modulated Long-reach Pons Indicated for Sparse Geographical Areas
SECRYPT 8 30 min Tuesday 30 Session 3A 10:45 - 12:15 SECRYPT - International Conference on Security and Cryptography M201 InCC: Hiding Information By Mimicking Traffic In Network Flows
SECRYPT 10 Poster Monday 29 Poster Session 1 11:00 - 12:00 SECRYPT - International Conference on Security and Cryptography Sólin Non-random Properties of Compression and Hash Functions using Linear Cryptanalysis
SECRYPT 13 30 min Monday 29 Session 1B 14:15 - 16:15 SECRYPT - International Conference on Security and Cryptography V201 Efficient Simultaneous Privately and Publicly Verifiable Robust Provable Data Possession from Elliptic Curves
SECRYPT 16 30 min Tuesday 30 Session 2A 09:00 - 10:30 SECRYPT - International Conference on Security and Cryptography M201 Improving Block Cipher Design by Rearranging Internal Operations
SECRYPT 19 20 min Tuesday 30 Session 4A 14:30 - 16:30 SECRYPT - International Conference on Security and Cryptography V201 Privacy-preserving SVANETs - Privacy-preserving Simple Vehicular Ad-hoc Networks
SECRYPT 22 Poster Monday 29 Poster Session 1 11:00 - 12:00 SECRYPT - International Conference on Security and Cryptography Sólin On the Connection between t-Closeness and Differential Privacy for Data Releases
SECRYPT 23 30 min Monday 29 Session 1A 14:15 - 16:15 SECRYPT - International Conference on Security and Cryptography M201 A Security-enhanced Design Methodology for Embedded Systems
SECRYPT 26 Poster Monday 29 Poster Session 1 11:00 - 12:00 SECRYPT - International Conference on Security and Cryptography Sólin AVON - A Fast Hash Function for Intel SIMD Architectures
SECRYPT 29 20 min Wednesday 31 Session 6B 10:45 - 12:15 SECRYPT - International Conference on Security and Cryptography V201 Topological Study and Lyapunov Exponent of a Secure Steganographic Scheme
SECRYPT 30 20 min Wednesday 31 Session 6A 10:45 - 12:15 SECRYPT - International Conference on Security and Cryptography M201 LMM - A Common Component for Software License Management on Cloud
SECRYPT 31 20 min Tuesday 30 Session 4B 14:30 - 16:30 SECRYPT - International Conference on Security and Cryptography M201 Dynamic Proofs of Retrievability from Chameleon-Hashes
SECRYPT 32 30 min Tuesday 30 Session 2B 09:00 - 10:30 SECRYPT - International Conference on Security and Cryptography V201 A Key-revocable Attribute-based Encryption for Mobile Cloud Environments
SECRYPT 33 20 min Wednesday 31 Session 5A 09:00 - 10:30 SECRYPT - International Conference on Security and Cryptography M201 On the Security of the XOR Sandwiching Paradigm for Multiple Keyed Block Ciphers
SECRYPT 35 Poster Monday 29 Poster Session 1 11:00 - 12:00 SECRYPT - International Conference on Security and Cryptography Sólin Development of Device Identity using WiFi Layer 2 Management Frames for Combating Rogue APs
SECRYPT 38 20 min Wednesday 31 Session 6A 10:45 - 12:15 SECRYPT - International Conference on Security and Cryptography M201 Redactable Signature Scheme for Tree-structured Data based on Merkle Tree
SECRYPT 40 20 min Wednesday 31 Session 6A 10:45 - 12:15 SECRYPT - International Conference on Security and Cryptography M201 SVD-based Digital Image Watermarking on approximated Orthogonal Matrix
SECRYPT 42 30 min Tuesday 30 Session 2B 09:00 - 10:30 SECRYPT - International Conference on Security and Cryptography V201 Trust-based Secure Cloud Data Storage with Cryptographic Role-based Access Control
SECRYPT 46 20 min Wednesday 31 Session 6A 10:45 - 12:15 SECRYPT - International Conference on Security and Cryptography M201 Massive Group Message Authentication with Revocable Anonymity
SECRYPT 47 20 min Tuesday 30 Session 4A 14:30 - 16:30 SECRYPT - International Conference on Security and Cryptography V201 Partially Wildcarded Attribute-based Encryption and Its Efficient Construction
SECRYPT 49 30 min Tuesday 30 Session 3B 10:45 - 12:15 SECRYPT - International Conference on Security and Cryptography V201 A Dynamic Watermarking Model for Embedding Reducible Permutation Graphs into Software
SECRYPT 51 20 min Wednesday 31 Session 5B 09:00 - 10:30 SECRYPT - International Conference on Security and Cryptography V201 Policy-based Security Assessment of Mobile End-user Devices - An Alternative to Mobile Device Management Solutions for Android Smartphones
SECRYPT 58 30 min Monday 29 Session 1A 14:15 - 16:15 SECRYPT - International Conference on Security and Cryptography M201 HoneydV6: A Low-interaction IPv6 Honeypot
SECRYPT 59 20 min Wednesday 31 Session 5B 09:00 - 10:30 SECRYPT - International Conference on Security and Cryptography V201 Intent Security Testing - An Approach to Testing the Intent-based Vulnerability of Android Components
SECRYPT 60 30 min Tuesday 30 Session 4A 14:30 - 16:30 SECRYPT - International Conference on Security and Cryptography V201 Which Side Are You On? - A New Panopticon vs. Privacy
SECRYPT 61 30 min Tuesday 30 Session 3B 10:45 - 12:15 SECRYPT - International Conference on Security and Cryptography V201 Meet-in-the-Middle Preimage Attacks Revisited - New Results on MD5 and HAVAL
SECRYPT 63 Poster Monday 29 Poster Session 2 16:15 - 17:15 SECRYPT - International Conference on Security and Cryptography Sólin Are BiometricWeb Services a Reality? - A Best Practice Analysis for Telebiometric Deployment in Open Networks
SECRYPT 64 Poster Monday 29 Poster Session 1 11:00 - 12:00 SECRYPT - International Conference on Security and Cryptography Sólin Abusing Social Networks with Abuse Reports - A Coalition Attack for Social Networks
SECRYPT 66 30 min Tuesday 30 Session 3B 10:45 - 12:15 SECRYPT - International Conference on Security and Cryptography V201 Modelling SCADA and Corporate Network of a Medium Voltage Power Grid under Cyber Attacks
SECRYPT 67 30 min Tuesday 30 Session 2A 09:00 - 10:30 SECRYPT - International Conference on Security and Cryptography M201 Towards Cryptographic Function Distinguishers with Evolutionary Circuits
SECRYPT 68 20 min Wednesday 31 Session 6B 10:45 - 12:15 SECRYPT - International Conference on Security and Cryptography V201 Preimage Attack on BioHashing
SECRYPT 69 Poster Monday 29 Poster Session 1 11:00 - 12:00 SECRYPT - International Conference on Security and Cryptography Sólin Diagnostic Category Leakage in Helper Data Schemes for Biometric Authentication
SECRYPT 75 Poster Monday 29 Poster Session 1 11:00 - 12:00 SECRYPT - International Conference on Security and Cryptography Sólin Practical and Exposure-resilient Hierarchical ID-based Authenticated Key Exchange without Random Oracles
SECRYPT 76 30 min Tuesday 30 Session 2B 09:00 - 10:30 SECRYPT - International Conference on Security and Cryptography V201 Extending the Ciphertext-Policy Attribute Based Encryption Scheme for Supporting Flexible Access Control
SECRYPT 77 30 min Monday 29 Session 1B 14:15 - 16:15 SECRYPT - International Conference on Security and Cryptography V201 Secure Second Price Auctions with a Rational Auctioneer
SECRYPT 78 30 min Monday 29 Session 1B 14:15 - 16:15 SECRYPT - International Conference on Security and Cryptography V201 iOS Encryption Systems - Deploying iOS Devices in Security-critical Environments
SECRYPT 79 20 min Tuesday 30 Session 4B 14:30 - 16:30 SECRYPT - International Conference on Security and Cryptography M201 An Efficient and Provably Secure Certificateless Identification Scheme
SECRYPT 80 Poster Monday 29 Poster Session 2 16:15 - 17:15 SECRYPT - International Conference on Security and Cryptography Sólin Identity Security in Biometric Systems based on Keystroking
SECRYPT 81 30 min Tuesday 30 Session 3A 10:45 - 12:15 SECRYPT - International Conference on Security and Cryptography M201 Security Evaluation and Optimization of the Delay-based Dual-rail Pre-charge Logic in Presence of Early Evaluation of Data
SECRYPT 87 Poster Monday 29 Poster Session 2 16:15 - 17:15 SECRYPT - International Conference on Security and Cryptography Sólin Efficient Characteristic 3 Galois Field Operations for Elliptic Curve Cryptographic Applications
SECRYPT 88 30 min Tuesday 30 Session 2A 09:00 - 10:30 SECRYPT - International Conference on Security and Cryptography M201 Behavior-based Malware Analysis using Profile Hidden Markov Models
SECRYPT 92 Poster Monday 29 Poster Session 2 16:15 - 17:15 SECRYPT - International Conference on Security and Cryptography Sólin Related-key Impossible Differential Cryptanalysis of Full-round HIGHT
SECRYPT 93 20 min Tuesday 30 Session 4B 14:30 - 16:30 SECRYPT - International Conference on Security and Cryptography M201 Improving 802.11 Fingerprinting of Similar Devices by Cooperative Fingerprinting
SECRYPT 95 20 min Wednesday 31 Session 5B 09:00 - 10:30 SECRYPT - International Conference on Security and Cryptography V201 Instance-based Anomaly Method for Android Malware Detection
SECRYPT 96 20 min Tuesday 30 Session 4B 14:30 - 16:30 SECRYPT - International Conference on Security and Cryptography M201 A New Fully Auditable Proposal for an Internet Voting System with Secure Individual Verification and Complaining Capabilities
SECRYPT 98 20 min Wednesday 31 Session 6B 10:45 - 12:15 SECRYPT - International Conference on Security and Cryptography V201 Symmetric Searchable Encryption for Exact Pattern Matching using Directed Acyclic Word Graphs
SECRYPT 102 30 min Monday 29 Session 1A 14:15 - 16:15 SECRYPT - International Conference on Security and Cryptography M201 An Efficient Approach to Assessing the Risk of Zero-Day Vulnerabilities
SECRYPT 103 Poster Monday 29 Poster Session 2 16:15 - 17:15 SECRYPT - International Conference on Security and Cryptography Sólin Survey and Benchmark of Lightweight Block Ciphers for Wireless Sensor Networks
SECRYPT 107 30 min Tuesday 30 Session 4B 14:30 - 16:30 SECRYPT - International Conference on Security and Cryptography M201 Secure Alert Tracking in Supply Chain
SECRYPT 110 20 min Wednesday 31 Session 5A 09:00 - 10:30 SECRYPT - International Conference on Security and Cryptography M201 Enhanced Truncated Differential Cryptanalysis of GOST
SECRYPT 111 Poster Monday 29 Poster Session 2 16:15 - 17:15 SECRYPT - International Conference on Security and Cryptography Sólin Privacy-enhanced Perceptual Hashing of Audio Data
SECRYPT 112 30 min Tuesday 30 Session 3A 10:45 - 12:15 SECRYPT - International Conference on Security and Cryptography M201 Differential Power Analysis of HMAC SHA-2 in the Hamming Weight Model
SECRYPT 116 20 min Tuesday 30 Session 4A 14:30 - 16:30 SECRYPT - International Conference on Security and Cryptography V201 Privacy-preserving Realization of the STORK Framework in the Public Cloud
SECRYPT 117 30 min Monday 29 Session 1B 14:15 - 16:15 SECRYPT - International Conference on Security and Cryptography V201 Secure Computation of Hidden Markov Models
SECRYPT 119 20 min Wednesday 31 Session 6B 10:45 - 12:15 SECRYPT - International Conference on Security and Cryptography V201 The Usability of CAPTCHAs on Smartphones
SECRYPT 120 20 min Wednesday 31 Session 5A 09:00 - 10:30 SECRYPT - International Conference on Security and Cryptography M201 From a Logical Approach to Internal States of Hash Functions
SECRYPT 122 20 min Tuesday 30 Session 4A 14:30 - 16:30 SECRYPT - International Conference on Security and Cryptography V201 Policy-based Non-interactive Outsourcing of Computation using Multikey FHE and CP-ABE
SECRYPT 127 20 min Wednesday 31 Session 5A 09:00 - 10:30 SECRYPT - International Conference on Security and Cryptography M201 Recovering RSA Private Keys on Implementations with Tampered LSBs
SECRYPT 128 20 min Wednesday 31 Session 5B 09:00 - 10:30 SECRYPT - International Conference on Security and Cryptography V201 On the Effectiveness of Dynamic Taint Analysis for Protecting against Private Information Leaks on Android-based Devices
SECRYPT 131 30 min Monday 29 Session 1A 14:15 - 16:15 SECRYPT - International Conference on Security and Cryptography M201 Adaptive Resource Management for Balancing Availability and Performance in Cloud Computing
SECRYPT 137 Poster Monday 29 Poster Session 2 16:15 - 17:15 SECRYPT - International Conference on Security and Cryptography Sólin Efficient Group Signatures with Verifier-local Revocation Employing a Natural Expiration
SECRYPT 138 Poster Tuesday 30 Poster Session 3 16:30 - 17:30 SECRYPT - International Conference on Security and Cryptography Sólin Public-key Cryptography from Different Assumptions - A Multi-bit Version
SECRYPT 139 Poster Tuesday 30 Poster Session 3 16:30 - 17:30 SECRYPT - International Conference on Security and Cryptography Sólin Not All ISPs Equally Secure Home Users - An Empirical Study Comparing Wi-Fi Security Provided by UK ISPs
SECRYPT 140 Poster Tuesday 30 Poster Session 3 16:30 - 17:30 SECRYPT - International Conference on Security and Cryptography Sólin Approaching Encryption through Complex Number Logarithms
SECRYPT 141 Poster Monday 29 Poster Session 1 11:00 - 12:00 SECRYPT - International Conference on Security and Cryptography Sólin Keystroke Authentication with a Capacitive Display using Different Mobile Devices
SECRYPT 151 Poster Tuesday 30 Poster Session 3 16:30 - 17:30 SECRYPT - International Conference on Security and Cryptography Sólin MINHO - A Novel Authentication Scheme based on Pre-Authentication Service
SECRYPT 157 Poster Tuesday 30 Poster Session 3 16:30 - 17:30 SECRYPT - International Conference on Security and Cryptography Sólin A Model-driven Approach for Securing Software Architectures
SECRYPT 162 Poster Monday 29 Poster Session 2 16:15 - 17:15 SECRYPT - International Conference on Security and Cryptography Sólin Database Anomalous Activities - Detection and Quantification
SECRYPT 163 Poster Tuesday 30 Poster Session 3 16:30 - 17:30 SECRYPT - International Conference on Security and Cryptography Sólin A Preliminary Application of Generalized Fault Trees to Security
SECRYPT 164 Poster Tuesday 30 Poster Session 3 16:30 - 17:30 SECRYPT - International Conference on Security and Cryptography Sólin E3SN - Efficient Security Scheme for Sensor Networks
SIGMAP 8 Poster Monday 29 Poster Session 1 11:00 - 12:00 Multimedia Signal Processing Sólin Simplified Computation of l2-Sensitivity for 1-D and a Class of 2-D State-Space Digital Filters Considering 0 and +-1 Elements
SIGMAP 12 Poster Monday 29 Poster Session 1 11:00 - 12:00 Multimedia Systems and Applications Sólin A Parity-based Error Control Method for Distributed Compressive Video Sensing
SIGMAP 13 Poster Monday 29 Poster Session 1 11:00 - 12:00 Multimedia Systems and Applications Sólin REENACT: Augmented Reality and Collective Role Playing to Enhance the Pedagogy of Historical Events - An EXPERIMEDIA Experiment
SIGMAP 16 Poster Monday 29 Poster Session 2 16:15 - 17:15 Multimedia Signal Processing Sólin Length of Phonemes in a Context of their Positions in Polish Sentences
SIGMAP 18 20 min Tuesday 30 Session 4A 14:30 - 16:30 Multimedia Systems and Applications M208 Multi-Point Measurement System and Data Processing for Earthquakes Monitoring
SIGMAP 23 Poster Monday 29 Poster Session 1 11:00 - 12:00 Multimedia Signal Processing Sólin A TV Commercial Retrieval System based on Audio Features
SIGMAP 25 20 min Tuesday 30 Session 4A 14:30 - 16:30 Multimedia Signal Processing M208 Limitations of Super Resolution Image Reconstruction and How to Overcome them for a Single Image
SIGMAP 27 30 min Tuesday 30 Session 4A 14:30 - 16:30 Multimedia and Communications M208 Optimization of Free Viewpoint Interpolation by Applying Adaptive Depth Plane Distributions in Plane Sweeping - A Histogram-based Approach to a Non-uniform Plane Distribution
SIGMAP 29 20 min Tuesday 30 Session 4A 14:30 - 16:30 Multimedia Systems and Applications M208 A Linearvibrotactile Actuator for Mobile Devices
SIGMAP 30 30 min Tuesday 30 Session 4A 14:30 - 16:30 Multimedia Signal Processing M208 Improving the Performance of Speaker Verification Systems under Noisy Conditions using Low Level Features and Score Level Fusion
SIGMAP 32 Poster Monday 29 Poster Session 2 16:15 - 17:15 Multimedia Systems and Applications Sólin Fully Automatic Saliency-based Subjects Extraction in Digital Images
SIGMAP 33 30 min Monday 29 Session 1A 14:15 - 16:15 Multimedia Signal Processing M208 Multi-modal Bike Sensing for Automatic Geo-annotation - Geo-annotation of Road/Terrain Type by Participatory Bike-sensing
SIGMAP 34 Poster Monday 29 Poster Session 1 11:00 - 12:00 Multimedia Systems and Applications Sólin Markerless Augmented Reality based on Local Binary Pattern
SIGMAP 39 20 min Wednesday 31 Session 5A 09:00 - 10:30 Multimedia Systems and Applications M208 Automatic Attendance Rating of Movie Content using Bag of Audio Words Representation
SIGMAP 40 20 min Wednesday 31 Session 5A 09:00 - 10:30 Multimedia Systems and Applications M208 Towards Live Subtitling of TV Ice-hockey Commentary
SIGMAP 43 20 min Monday 29 Session 1A 14:15 - 16:15 Multimedia Systems and Applications M208 SignalBIT - A Web-based Platform for Real-time Biosignal Visualization and Recording
SIGMAP 44 20 min Wednesday 31 Session 5A 09:00 - 10:30 Multimedia Systems and Applications M208 A Data Cube Model for Surveillance Video Indexing and Retrieval
SIGMAP 45 Poster Tuesday 30 Poster Session 3 16:30 - 17:30 Multimedia Signal Processing Sólin An Unsupervised Ensemble-based Markov Random Field Approach to Microscope Cell Image Segmentation
SIGMAP 46 Poster Tuesday 30 Poster Session 3 16:30 - 17:30 Multimedia and Communications Sólin SAO Filtering inside CTU Loop for High Efficiency Video Coding
SIGMAP 47 Poster Monday 29 Poster Session 2 16:15 - 17:15 Multimedia and Communications Sólin Design Approaches for Mode Decision in HEVC Encoder - Exploiting Parallelism at CTB Level
WINSYS 2 30 min Tuesday 30 Session 2A 09:00 - 10:30 Sensor, Mesh and Ad Hoc Communications and Networks M208 Reliability Analysis of IEEE 802.11p Wireless Communication and Vehicle Safety Applications
WINSYS 9 Poster Tuesday 30 Poster Session 3 16:30 - 17:30 Sensor, Mesh and Ad Hoc Communications and Networks Sólin Moving Object Classifier based on UWB Radar Signal
WINSYS 10 20 min Monday 29 Session 1A 14:15 - 16:15 Sensor, Mesh and Ad Hoc Communications and Networks M102 Efficient Coupled PHY and MAC use of Physical Bursts by ARQ-Enabled Connections in IEEE 802.16e/WiMAX Networks
WINSYS 11 30 min Wednesday 31 Session 5A 09:00 - 10:30 Wireless and Mobile Technologies M209 Modulation-mode and Power Assignment in SVD-assisted MIMO Systems with Transmitter-side Antennas Correlation
WINSYS 16 Poster Monday 29 Poster Session 2 16:15 - 17:15 Mobile Software and Services Sólin Tool Support for Building Graph Construction
WINSYS 18 30 min Wednesday 31 Session 5A 09:00 - 10:30 Wireless and Mobile Technologies M209 Capacity Analysis of Heterogeneous Wireless Networks under SINR Interference Constraints
WINSYS 24 20 min Tuesday 30 Session 2A 09:00 - 10:30 Sensor, Mesh and Ad Hoc Communications and Networks M208 RealWorld Testing of Aggregation in Publish/Subscribe Systems
WINSYS 26 20 min Tuesday 30 Session 2A 09:00 - 10:30 Sensor, Mesh and Ad Hoc Communications and Networks M208 VIMENO: A VirtualWireless Mesh Network Architecture for Operators
WINSYS 28 Poster Tuesday 30 Poster Session 3 16:30 - 17:30 Wireless and Mobile Technologies Sólin Prediction of Spectrum based on Improved RBF Neural Network in Cognitive Radio
WINSYS 32 20 min Wednesday 31 Session 5A 09:00 - 10:30 Wireless and Mobile Technologies M209 Low Latency of Re-authentication during Handover - Re-authentication using a Signed Token in Heterogeneous Wireless Access Networks
WINSYS 35 20 min Monday 29 Session 1A 14:15 - 16:15 Sensor, Mesh and Ad Hoc Communications and Networks M102 Energy Aware Routing in IEEE 802.11sWireless Mesh Networks
WINSYS 36 20 min Monday 29 Session 1A 14:15 - 16:15 Wireless and Mobile Technologies M102 On Providing Fair Performance in Adaptive Wireless Push Systems