09:30 |
|
09:45 |
|
11:00 |
-
6:
A Novel Technique for TCP Based Congestion Control
Martin Hruby, Michal Olsovsky and Margareta Kotocova
-
6:
Accommodating Individual Differences in Web based Instruction (WBI) and Implementation
Rana A. Alhajri, Steve Counsell and XiaoHui Lui
-
21:
A Proposed Framework for Supporting Behaviour Change by Translating Personalised Activities into Measurable Benefits
Maurice Mulvenna, Adrian McCann, Maurice O'Kane, Barry Henderson, Karen Kirby and Deirdre McCay
-
31:
Applying
Bayesian Parameter Estimation to A/B Tests in e-Business Applications -
Examining the Impact of Green Marketing Signals in Sponsored Search
Advertising
Tobias Blask
-
34:
A Comparative Prediction Study of Housing Price Index based on Web Search Data - Evidence from Beijing and Lanzhou in China
Bo Yong Wang, Xin Yang, Bian Wang and Benfu Lv
-
53:
Qsense - Learning Semantic Web Concepts by Querying DBpedia
Andrei Panu, Sabin C. Buraga and Lenuta Alboaie
-
10:
Non-random Properties of Compression and Hash Functions using Linear Cryptanalysis
Daniel Santana de Freitas and Jorge Nakahara Jr
-
22:
On the Connection between t-Closeness and Differential Privacy for Data Releases
Josep Domingo-Ferrer
-
26:
AVON - A Fast Hash Function for Intel SIMD Architectures
Matt Henricksen and Shinsaku Kiyomoto
-
35:
Development of Device Identity using WiFi Layer 2 Management Frames for Combating Rogue APs
Jonny Milliken, Valerio Selis, Kian Meng Yap and Alan Marshall
-
64:
Abusing Social Networks with Abuse Reports - A Coalition Attack for Social Networks
Slim Trabelsi and Hana Bouafif
-
69:
Diagnostic Category Leakage in Helper Data Schemes for Biometric Authentication
Joep de Groot, Boris Skoric, Niels de Vreede and Jean-Paul Linnartz
-
75:
Practical and Exposure-resilient Hierarchical ID-based Authenticated Key Exchange without Random Oracles
Kazuki Yoneyama
-
141:
Keystroke Authentication with a Capacitive Display using Different Mobile Devices
Matthias Trojahn, Christian Schadewald and Frank Ortmeier
-
8:
Simplified Computation of l2-Sensitivity for 1-D and a Class of 2-D State-Space Digital Filters Considering 0 and +-1 Elements
Yoichi Hinamoto and Akimitsu Doi
-
12:
A Parity-based Error Control Method for Distributed Compressive Video Sensing
Shou-ning Chen, Bao-yu Zheng and Liang Zhou
-
13:
REENACT: Augmented Reality and Collective Role Playing to Enhance the Pedagogy of Historical Events - An EXPERIMEDIA Experiment
Martin
Lopez-Nores, Yolanda Blanco-Fernandez, José J. Pazos-arias, Alberto
Gil-solla, Jorge Garcia-Duque and Manuel Ramos-Cabrer
-
23:
A TV Commercial Retrieval System based on Audio Features
Jose E. Borras, Jorge Igual, Carlos Fernandez-Llatas and Vicente Traver
-
34:
Markerless Augmented Reality based on Local Binary Pattern
Youssef Hbali, Mohamed Sadgal and Abdelaziz EL Fazziki
|
11:15 |
Coffee-Break (11:15 - 11:30)
|
12:00 |
|
13:00 |
Lunch (13:00 - 14:15)
|
14:15 |
-
11:
Determinants of Use Intensity in Social Networking Sites - A Cross-cultural Study of Korea and USA
Cheol Park, Jongkun Jun and Thaemin Lee
-
13:
Strategic use of Twitter in Local Government - A Northern Ireland Study
Tiago Picão, Fiona McMahon, Valerie Purchase and Maurice Mulvenna
-
18:
The Trust in Online Discussion Forums and How they Influence Patients' Intention to Adopt Medical Tourism Services
Peter Ractham, Charlie Chen and Makoto Nakayama
-
23:
A Security-enhanced Design Methodology for Embedded Systems
Alberto Ferrante, Jelena Milosevic and Marija Janjušević
-
58:
HoneydV6: A Low-interaction IPv6 Honeypot
Sven Schindler, Bettina Schnor, Simon Kiertscher, Thomas Scheffler and Eldad Zack
-
102:
An Efficient Approach to Assessing the Risk of Zero-Day Vulnerabilities
Massimiliano Albanese, Sushil Jajodia, Anoop Singhal and Lingyu Wang
-
131:
Adaptive Resource Management for Balancing Availability and Performance in Cloud Computing
Ravi Jhawar and Vincenzo Piuri
-
13:
Efficient Simultaneous Privately and Publicly Verifiable Robust Provable Data Possession from Elliptic Curves
Christian Hanser and Daniel Slamanig
-
77:
Secure Second Price Auctions with a Rational Auctioneer
Boaz Catane and Amir Herzberg
-
78:
iOS Encryption Systems - Deploying iOS Devices in Security-critical Environments
Peter Teufl, Thomas Zefferer, Christof Stromberger and Christoph Hechenblaikner
-
117:
Secure Computation of Hidden Markov Models
Mehrdad Aliasgari and Marina Blanton
-
33:
Multi-modal Bike Sensing for Automatic Geo-annotation - Geo-annotation of Road/Terrain Type by Participatory Bike-sensing
Steven Verstockt, Viktor Slavkovikj, Pieterjan De Potter, Jürgen Slowack and Rik Van de Walle
-
43:
SignalBIT - A Web-based Platform for Real-time Biosignal Bisualization and Recording
Ana Priscila Alves, Hugo Plácido da Silva, André Lourenço and Ana Fred
-
10:
Efficient Coupled PHY and MAC use of Physical Bursts by ARQ-Enabled Connections in IEEE 802.16e/WiMAX Networks
Oran Sharon, Amit Liron and Yaron Alpert
-
35:
Energy Aware Routing in IEEE 802.11sWireless Mesh Networks
Maria Zogkou, Aggeliki Sgora and Dimitrios D. Vergados
-
36:
On Providing Fair Performance in Adaptive Wireless Push Systems
P. Nicopolitidis
|
16:15 |
-
17:
Towards
Algorithm Agility for Wireless Sensor Networks - Comparison of the
Portability of Selected Hash Functions - Position Paper
Manuel Koschuch, Matthias Hudler and Zsolt Saffer
-
8:
e-Business Application to Students""'' Blended Learning in Higher Education
Jelena Zaščerinska and Andreas Ahrens
-
26:
RFID based Data Mining for E-logistics
Yi Wang, Quan Yu and Kesheng Wang
-
30:
The e-Visibility Maturity Model - Assessing Stages of Visibility Evolution for e-Business
Olga Levina and Iris Vilnai-Yavetz
-
36:
EFilter: An Efficient Filter for Supporting Twig Query Patterns in XML Streams
Wen-Chiao Hsu, Chia-Fang Li and I-En Liao
-
37:
A Study on Construction of Inflation Index based on Web Search Data
Chen Hang, Sun Yi, Yang Xin and Lv Benfu
-
44:
The
Consideration of Organizational, Human and Corporate Cultural Factors in
the Implementation of Business Process Management Projects - Social
Factors to Prevent Failure of BPM Projects
Rebecca Bulander and Matthias Dietel
-
10:
Optical Parametric Gain of Tellutire/Phosphate Highly Nonlinear Optical Fiber
Edmund Samuel, Tong Hoang Tuan, Koji Asano, Takenobu Suzuki and Yasutake Ohishi
-
63:
Are BiometricWeb Services a Reality? - A Best Practice Analysis for Telebiometric Deployment in Open Networks
Dustin van der Haar and Basie von Solms
-
80:
Identity Security in Biometric Systems based on Keystroking
Lucjan Hanzlik and Wojciech Wodo
-
87:
Efficient Characteristic 3 Galois Field Operations for Elliptic Curve Cryptographic Applications
Vinay S. Iyengar
-
92:
Related-key Impossible Differential Cryptanalysis of Full-round HIGHT
Saeed Rostami, Sadegh Bamohabbat Chafjiri and Seyed Amir Hossein Tabatabaei
-
103:
Survey and Benchmark of Lightweight Block Ciphers for Wireless Sensor Networks
Mickaël Cazorla, Kevin Marquet and Marine Minier
-
111:
Privacy-enhanced Perceptual Hashing of Audio Data
Heiko Knospe
-
137:
Efficient Group Signatures with Verifier-local Revocation Employing a Natural Expiration
Lukas Malina, Jan Hajny and Zdenek Martinasek
-
162:
Database Anomalous Activities - Detection and Quantification
Elisa Costante, Sokratis Vavilis, Sandro Etalle, Jerry den Hartog, Milan Petkovic and Nicola Zannone
-
16:
Length of Phonemes in a Context of their Positions in Polish Sentences
Magdalena Igras, Bartosz Ziółko and Mariusz Ziółko
-
32:
Fully Automatic Saliency-based Subjects Extraction in Digital Images
Luca Greco, Marco La Cascia and Francesco Lo Cascio
-
47:
Design Approaches for Mode Decision in HEVC Encoder - Exploiting Parallelism at CTB Level
Ramakrishna Adireddy and Suyash Ugare
-
16:
Tool Support for Building Graph Construction
Paul Heiniz, Karl-Heinz Krempels, Christian Samsel, Kai Schwarz and Gökay Bodur
|
16:30 |
Coffee-Break (16:30 - 16:45)
|
17:15 |
|
18:15 |
Welcome Drink (18:15 - 18:45)
|