Event Paper Nr. Presentation Day Session Time Area Room Paper Title
DCNET 3 20 min Thursday 28 Session 2 14:30 - 16:30 DCNET - International Conference on Data Communication Networking Hörsaal FH 2 Routing Strategy of a Prioritized Limited Multi-Server Processor-Sharing System
DCNET 8 20 min Thursday 28 Session 2 14:30 - 16:30 DCNET - International Conference on Data Communication Networking Hörsaal FH 2 AVP - An Android Virtual Playground
DCNET 9 20 min Thursday 28 Session 2 14:30 - 16:30 DCNET - International Conference on Data Communication Networking Hörsaal FH 2 Towards Identification of Operating Systems from the Internet Traffic - IPFIX Monitoring with Fingerprinting and Clustering
DCNET 12 Poster Thursday 28 Poster Session 2 16:30 - 17:30 DCNET - International Conference on Data Communication Networking Studierraum Remote Laboratory for Computer Networks
DCNET 13 20 min Thursday 28 Session 2 14:30 - 16:30 DCNET - International Conference on Data Communication Networking Hörsaal FH 2 Papers, Please... - X.509 Certificate Revocation in Practice
DCNET 15 Poster Thursday 28 Poster Session 2 16:30 - 17:30 DCNET - International Conference on Data Communication Networking Studierraum The Bio-Inspired and Social Evolution of Node and Data in a Multilayer Network
DCNET 18 20 min Thursday 28 Session 2 14:30 - 16:30 DCNET - International Conference on Data Communication Networking Hörsaal FH 2 A SCTP-based Authentication Protocol: SCTPAP
ICE-B 4 Poster Thursday 28 Poster Session 2 16:30 - 17:30 Applications Studierraum The Method of Automated Monitoring of Product Prices and Market Position Determination in Relation to Competition Quotes - Monitoring of Product Prices and Marketability Development with Continuous Assessment of Market Position in on-Line Sales
ICE-B 6 Poster Thursday 28 Poster Session 2 16:30 - 17:30 Applications Studierraum A Comparative Study of Engineering and Business Students’ Attitude to e-Business Application
ICE-B 7 Poster Thursday 28 Poster Session 2 16:30 - 17:30 Applications Studierraum A Framework for Selecting Sample Size in Educational Research on e-business Application
ICE-B 8 20 min Saturday 30 Session 6 14:30 - 16:00 Applications Hörsaal FH 2 A Conceptual Enterprise Architecture Framework for Smart Cities - A Survey Based Approach
ICE-B 9 20 min Saturday 30 Session 6 14:30 - 16:00 e-Logistics Hörsaal FH 2 A Multi-Data Mining Approach for Shelf Space Optimization - Considering Customer Behaviour
ICE-B 14 20 min Friday 29 Session 4 14:30 - 16:00 Applications Hörsaal FH 3 Do Specific Text Features Influence Click Probabilities in Paid Search Advertising?
ICE-B 15 20 min Friday 29 Session 3 11:45 - 13:15 Collaboration and e-Services Hörsaal FH 3 Towards Real-time Collaboration in User Interface Mashups
ICE-B 17 20 min Friday 29 Session 3 11:45 - 13:15 Collaboration and e-Services Hörsaal FH 3 Energizing People’s Work - Transforming Organizations Through Gamification
ICE-B 18 30 min Friday 29 Session 3 11:45 - 13:15 Enterprise Engineering Hörsaal FH 3 Business Models for Cloud-based High Perfomance Computing Service Provision - Insights from the Swiss Higher Education Sector
ICE-B 21 30 min Thursday 28 Session 2 14:30 - 16:30 Sustainable e-Business Hörsaal FH 3 Pricing and Competition in Mobile App Markets
ICE-B 22 20 min Thursday 28 Session 2 14:30 - 16:30 Technology Platforms Hörsaal FH 3 QoS based Resource Allocation and Service Selection in the Cloud
ICE-B 23 30 min Thursday 28 Session 1 12:15 - 13:15 Enterprise Engineering Hörsaal FH 3 Decision Support and Online Advertising - Development and Empirical Testing of a Data Landscape
ICE-B 24 30 min Friday 29 Session 3a 11:45 - 13:15 Mobility Hörsaal FH 4 Location Data – A Trade-off between Control and Value - Business Model Implications
ICE-B 25 Poster Thursday 28 Poster Session 2 16:30 - 17:30 Enterprise Engineering Studierraum Proposed Business Model for SME Farmers in Peri-Urban Sydney Region
ICE-B 30 30 min Thursday 28 Session 1 12:15 - 13:15 Enterprise Engineering Hörsaal FH 3 A Resource-aware Simulation Tool for Business Processes
ICE-B 32 Poster Thursday 28 Poster Session 2 16:30 - 17:30 Applications Studierraum Electronic Internal Marketing for Tourism - A New Tourism Marketing Approach
ICE-B 33 Poster Thursday 28 Poster Session 2 16:30 - 17:30 Applications Studierraum e-Shop User Preferences via User Behavior
ICE-B 34 20 min Friday 29 Session 4 14:30 - 16:00 Collaboration and e-Services Hörsaal FH 3 How to Efficiently Solve Internet Shopping Optimization Problem with Price Sensitive Discounts?
ICE-B 35 20 min Friday 29 Session 3 11:45 - 13:15 Collaboration and e-Services Hörsaal FH 3 Usability for Blended Shopping - Solving Major Flaws by Applying Usability Engineering and Proven Integration Technologies
ICE-B 37 20 min Friday 29 Session 4 14:30 - 16:00 Collaboration and e-Services Hörsaal FH 3 Semantic and Syntactic Matching of e-Catalogues - Using Vector Space Model
ICE-B 39 20 min Friday 29 Session 4 14:30 - 16:00 Collaboration and e-Services Hörsaal FH 3 Toward Building Aesthetic, Useful and Readable Tag Clouds for Websites
ICE-B 40 20 min Saturday 30 Session 6 14:30 - 16:00 Enterprise Engineering Hörsaal FH 2 Business Model Framework to Provide Heterogeneous Mobility Services on Virtual Markets
ICE-B 41 Poster Thursday 28 Poster Session 2 16:30 - 17:30 Enterprise Engineering Studierraum Usage of Semantic Transformations in B2B Integration Solutions
ICE-B 42 Poster Thursday 28 Poster Session 2 16:30 - 17:30 Enterprise Engineering Studierraum Automatic Business Process Model Assembly on the Basis of Subject-Oriented Semantic Process Mark-up
ICE-B 43 20 min Saturday 30 Session 6 14:30 - 16:00 Enterprise Engineering Hörsaal FH 2 Simulating Digital Businesses using an Agent Based Modeling Approach
ICE-B 44 30 min Friday 29 Session 3a 11:45 - 13:15 Applications Hörsaal FH 4 The Use of Social Media to Enrich Information Systems Field Trip Experiences
ICE-B 45 Poster Thursday 28 Poster Session 2 16:30 - 17:30 Applications Studierraum A Research on Inflation Expectations Measurements and Applications - A View Based on Network Behavior
ICE-B 46 Poster Thursday 28 Poster Session 2 16:30 - 17:30 Collaboration and e-Services Studierraum Literature Review and an Analysis of the State of the Market of Anything Relationship Management (xRM) - xRM as an Extension of Customer Relationship Management
ICE-B 47 30 min Friday 29 Session 3a 11:45 - 13:15 Applications Hörsaal FH 4 Open Source Geographic Information System and Petrel Software - Adaptation and Integration
OPTICS 6 20 min Saturday 30 Session 5 10:45 - 12:15 OPTICS - International Conference on Optical Communication Systems Seminarraum 303 Multiclass Multiserver Service Differentiation in Optical Flow Switched Networks
OPTICS 13 Poster Thursday 28 Poster Session 1 11:15 - 12:15 OPTICS - International Conference on Optical Communication Systems Studierraum Receiver Design for an Optical MIMO Testbed
OPTICS 14 20 min Thursday 28 Session 1 12:15 - 13:15 OPTICS - International Conference on Optical Communication Systems Hörsaal FH 2 Equalisation of Measured Optical MIMO Channels
OPTICS 17 Poster Thursday 28 Poster Session 1 11:15 - 12:15 OPTICS - International Conference on Optical Communication Systems Studierraum Research of Cable Identification Method Based on Single Fiber
OPTICS 18 20 min Thursday 28 Session 1 12:15 - 13:15 OPTICS - International Conference on Optical Communication Systems Hörsaal FH 2 On the Impact of the Clipping Techniques on the Performance of Optical OFDM
OPTICS 20 20 min Saturday 30 Session 5 10:45 - 12:15 OPTICS - International Conference on Optical Communication Systems Seminarraum 303 QAMO: QoS Aware Multipath-TCP Over Optical Burst Switching in Data Centers
OPTICS 21 30 min Friday 29 Session 3 11:45 - 13:15 OPTICS - International Conference on Optical Communication Systems Hörsaal FH 2 HYRA: An Efficient Hybrid Reporting Method for XG-PON Upstream Resource Allocation
OPTICS 22 Poster Thursday 28 Poster Session 1 11:15 - 12:15 OPTICS - International Conference on Optical Communication Systems Studierraum Delay-Aware Dynamic Wavelength Bandwidth Allocation in Time- and Wavelength-Division-Multiplexed Passive Optical Network
OPTICS 23 30 min Friday 29 Session 3 11:45 - 13:15 OPTICS - International Conference on Optical Communication Systems Hörsaal FH 2 On the Prediction of EPON Traffic Using Polynomial Fitting in Optical Network Units
OPTICS 24 20 min Saturday 30 Session 5 10:45 - 12:15 OPTICS - International Conference on Optical Communication Systems Seminarraum 303 Research on Routing and Wavelength/Subcarrier Assignment Algorithm Based on Layered-graph Model in Optical Satellite Networks
OPTICS 26 Poster Thursday 28 Poster Session 1 11:15 - 12:15 OPTICS - International Conference on Optical Communication Systems Studierraum Mid-Infrared Supercontinuum Generation in an AsSe2-As2S5 Hybrid Microstructured Optical Fiber
OPTICS 27 20 min Saturday 30 Session 5 10:45 - 12:15 OPTICS - International Conference on Optical Communication Systems Seminarraum 303 Initial Alignment Scheme and Tracking Control Technique of Free Space Optics Laser Beam
SECRYPT 7 Poster Thursday 28 Poster Session 2 16:30 - 17:30 SECRYPT - International Conference on Security and Cryptography Studierraum A Formal Model for Forensic Storage Media Preparation Tools
SECRYPT 9 Poster Thursday 28 Poster Session 1 11:15 - 12:15 SECRYPT - International Conference on Security and Cryptography Studierraum An Efficient Lightweight Security Algorithm for Random Linear Network Coding
SECRYPT 17 30 min Friday 29 Session 4 14:30 - 16:00 SECRYPT - International Conference on Security and Cryptography FH HS 1 CloudaSec: A Novel Public-key Based Framework to Handle Data Sharing Security in Clouds
SECRYPT 21 30 min Thursday 28 Session 2 14:30 - 16:30 SECRYPT - International Conference on Security and Cryptography Hörsaal FH 4 Keeping Intruders at Large - A Graph-theoretic Approach to Reducing the Probability of Successful Network Intrusions
SECRYPT 22 Poster Thursday 28 Poster Session 2 16:30 - 17:30 SECRYPT - International Conference on Security and Cryptography Studierraum A Steganographic Protocol Based on Linear Error-Block Codes
SECRYPT 23 Poster Thursday 28 Poster Session 1 11:15 - 12:15 SECRYPT - International Conference on Security and Cryptography Studierraum Enhanced Intrusion Detection System Based on Bat Algorithm-support Vector Machine
SECRYPT 24 30 min Thursday 28 Session 2 14:30 - 16:30 SECRYPT - International Conference on Security and Cryptography Hörsaal FH 4 Certificateless Non-Interactive Key Exchange Protocol without Pairings
SECRYPT 25 20 min Friday 29 Session 3 11:45 - 13:15 SECRYPT - International Conference on Security and Cryptography FH HS 1 Robust Multispectral Palmprint Identification System by Jointly Using Contourlet Decomposition & Gabor Filter Response
SECRYPT 28 20 min Saturday 30 Session 6a 14:30 - 16:00 SECRYPT - International Conference on Security and Cryptography FH HS 1 Shellcode Detection in IPv6 Networks with HoneydV6
SECRYPT 29 30 min Thursday 28 Session 2a 14:30 - 16:30 SECRYPT - International Conference on Security and Cryptography Hörsaal FH 7 Adaptive Oblivious Transfer with Hidden Access Policy Realizing Disjunction
SECRYPT 31 20 min Saturday 30 Session 6a 14:30 - 16:00 SECRYPT - International Conference on Security and Cryptography FH HS 1 Signaling Attacks in Mobile Telephony
SECRYPT 32 20 min Friday 29 Session 3 11:45 - 13:15 SECRYPT - International Conference on Security and Cryptography FH HS 1 Efficient Construction of Infinite Length Hash Chains with Perfect Forward Secrecy Using Two Independent Hash Functions
SECRYPT 35 30 min Thursday 28 Session 2a 14:30 - 16:30 SECRYPT - International Conference on Security and Cryptography Hörsaal FH 7 A Secure Anonymous Proxy Multi-signature Scheme
SECRYPT 39 20 min Saturday 30 Session 6a 14:30 - 16:00 SECRYPT - International Conference on Security and Cryptography FH HS 1 SMS Spam - A Holistic View
SECRYPT 42 20 min Saturday 30 Session 6 14:30 - 16:00 SECRYPT - International Conference on Security and Cryptography Hörsaal FH 3 Constructing Empirical Tests of Randomness
SECRYPT 45 Poster Thursday 28 Poster Session 2 16:30 - 17:30 SECRYPT - International Conference on Security and Cryptography Studierraum Hybrid-Style Personal Key Management in Ubiquitous Computing
SECRYPT 46 Poster Friday 29 Poster Session 3 16:00 - 17:00 SECRYPT - International Conference on Security and Cryptography Studierraum Using the Juliet Test Suite to Compare Static Security Scanners
SECRYPT 49 20 min Saturday 30 Session 5 10:45 - 12:15 SECRYPT - International Conference on Security and Cryptography FH HS 1 Secure Video Player for Mobile Devices Integrating a Watermarking-based Tracing Mechanism
SECRYPT 51 Poster Thursday 28 Poster Session 1 11:15 - 12:15 SECRYPT - International Conference on Security and Cryptography Studierraum On Privacy Protection in the Internet Surveillance Era
SECRYPT 52 30 min Friday 29 Session 4 14:30 - 16:00 SECRYPT - International Conference on Security and Cryptography FH HS 1 Pairing-free Single Round Certificateless and Identity Based Authenticated Key Exchange Protocols
SECRYPT 53 Poster Thursday 28 Poster Session 1 11:15 - 12:15 SECRYPT - International Conference on Security and Cryptography Studierraum Framework for Securing Data in Cloud Storage Services
SECRYPT 56 30 min Saturday 30 Session 5a 10:45 - 12:15 SECRYPT - International Conference on Security and Cryptography Hörsaal FH 2 Mobile Devices: A Phisher’s Paradise
SECRYPT 57 Poster Thursday 28 Poster Session 2 16:30 - 17:30 SECRYPT - International Conference on Security and Cryptography Studierraum Partial Fingerprint Identification Through Correlation-Based Approach
SECRYPT 59 Poster Friday 29 Poster Session 3 16:00 - 17:00 SECRYPT - International Conference on Security and Cryptography Studierraum Framework Implementation Based on Grid of Smartcards to Authenticate Users and Virtual Machines
SECRYPT 60 30 min Saturday 30 Session 5a 10:45 - 12:15 SECRYPT - International Conference on Security and Cryptography Hörsaal FH 2 Dynamic Analysis of Usage Control Policies
SECRYPT 64 20 min Saturday 30 Session 6a 14:30 - 16:00 SECRYPT - International Conference on Security and Cryptography FH HS 1 On Reliability of Clock-skew-based Remote Computer Identification
SECRYPT 66 20 min Thursday 28 Session 2a 14:30 - 16:30 SECRYPT - International Conference on Security and Cryptography Hörsaal FH 7 KDM-CCA Security of the Cramer-Shoup Cryptosystem, Revisited
SECRYPT 67 20 min Saturday 30 Session 5 10:45 - 12:15 SECRYPT - International Conference on Security and Cryptography FH HS 1 A Multiple-server Efficient Reusable Proof of Data Possesion from Private Information Retrieval Techniques
SECRYPT 68 Poster Friday 29 Poster Session 3 16:00 - 17:00 SECRYPT - International Conference on Security and Cryptography Studierraum Modeling Requirements for Security-enhanced Design of Embedded Systems
SECRYPT 69 20 min Thursday 28 Session 1 12:15 - 13:15 SECRYPT - International Conference on Security and Cryptography Hörsaal FH 7 A Novel Pseudo Random Number Generator Based on L’Ecuyer’s Scheme
SECRYPT 71 30 min Thursday 28 Session 2 14:30 - 16:30 SECRYPT - International Conference on Security and Cryptography Hörsaal FH 4 Formal Analysis of Electronic Exams
SECRYPT 72 30 min Thursday 28 Session 2 14:30 - 16:30 SECRYPT - International Conference on Security and Cryptography Hörsaal FH 4 Towards a Framework for Assessing the Feasibility of Side-channel Attacks in Virtualized Environments
SECRYPT 74 30 min Friday 29 Session 3 11:45 - 13:15 SECRYPT - International Conference on Security and Cryptography FH HS 1 FORCE - Fully Off-line secuRe CrEdits for Mobile Micro Payments
SECRYPT 76 30 min Thursday 28 Session 2a 14:30 - 16:30 SECRYPT - International Conference on Security and Cryptography Hörsaal FH 7 Privacy Preserving Delegated Word Search in the Cloud
SECRYPT 78 20 min Saturday 30 Session 6 14:30 - 16:00 SECRYPT - International Conference on Security and Cryptography Hörsaal FH 3 Verifying Conformance of Security Implementation with Organizational Access Policies in Community Cloud - A Formal Approach
SECRYPT 79 30 min Friday 29 Session 4 14:30 - 16:00 SECRYPT - International Conference on Security and Cryptography FH HS 1 Identifying Cryptographic Functionality in Android Applications
SECRYPT 80 Poster Friday 29 Poster Session 3 16:00 - 17:00 SECRYPT - International Conference on Security and Cryptography Studierraum NFC Based Mobile Single Sign-On Solution as a Chrome Extension
SECRYPT 81 Poster Friday 29 Poster Session 3 16:00 - 17:00 SECRYPT - International Conference on Security and Cryptography Studierraum Secure Virtual Machine Migration (SV2M) in Cloud Federation
SECRYPT 84 20 min Saturday 30 Session 5a 10:45 - 12:15 SECRYPT - International Conference on Security and Cryptography Hörsaal FH 2 Randomized Addition of Sensitive Attributes for l-diversity
SECRYPT 86 20 min Thursday 28 Session 1 12:15 - 13:15 SECRYPT - International Conference on Security and Cryptography Hörsaal FH 7 Optimizing Elliptic Curve Scalar Multiplication with Near-Factorization
SECRYPT 88 20 min Saturday 30 Session 5 10:45 - 12:15 SECRYPT - International Conference on Security and Cryptography FH HS 1 A Hybrid Approach for Content Based Image Authentication
SECRYPT 90 20 min Thursday 28 Session 1 12:15 - 13:15 SECRYPT - International Conference on Security and Cryptography Hörsaal FH 7 Revisiting a Recent Resource-efficient Technique for Increasing the Throughput of Stream Ciphers
SECRYPT 91 Poster Thursday 28 Poster Session 1 11:15 - 12:15 SECRYPT - International Conference on Security and Cryptography Studierraum Secure Protocol for Financial Transactions Using Smartphones - SPFT - Formally Proved by AVISPA
SECRYPT 96 Poster Thursday 28 Poster Session 1 11:15 - 12:15 SECRYPT - International Conference on Security and Cryptography Studierraum A Cryptographic Study of Tokenization Systems
SECRYPT 98 Poster Thursday 28 Poster Session 1 11:15 - 12:15 SECRYPT - International Conference on Security and Cryptography Studierraum Combined Algebraic and Truncated Differential Cryptanalysis on Reduced-round Simon
SECRYPT 114 Poster Thursday 28 Poster Session 1 11:15 - 12:15 SECRYPT - International Conference on Security and Cryptography Studierraum Software and Hardware Certification Techniques in a Combined Certification Model
SECRYPT 117 Poster Thursday 28 Poster Session 1 11:15 - 12:15 SECRYPT - International Conference on Security and Cryptography Studierraum Experimental Study of Performance and Security Constraints on Wireless Key Distribution Using Random Phase of Multipath Radio Signal
SECRYPT 118 Poster Thursday 28 Poster Session 1 11:15 - 12:15 SECRYPT - International Conference on Security and Cryptography Studierraum Network-based Intrusion Prevention System Prototype with Multi-Detection - A Position Paper
SECRYPT 119 Poster Thursday 28 Poster Session 1 11:15 - 12:15 SECRYPT - International Conference on Security and Cryptography Studierraum Could Bitcoin Transactions Be 100x Faster?
SECRYPT 121 Poster Thursday 28 Poster Session 1 11:15 - 12:15 SECRYPT - International Conference on Security and Cryptography Studierraum Using Bitmaps for Executing Range Queries in Encrypted Databases
SECRYPT 122 Poster Thursday 28 Poster Session 1 11:15 - 12:15 SECRYPT - International Conference on Security and Cryptography Studierraum Differential Fault Attacks against AES Tampering with the Instruction Flow
SECRYPT 125 Poster Thursday 28 Poster Session 2 16:30 - 17:30 SECRYPT - International Conference on Security and Cryptography Studierraum Secure Key Distribution based on Meteor Burst Communications
SECRYPT 126 Poster Thursday 28 Poster Session 1 11:15 - 12:15 SECRYPT - International Conference on Security and Cryptography Studierraum COGITO: Code Polymorphism to Secure Devices
SECRYPT 129 Poster Thursday 28 Poster Session 2 16:30 - 17:30 SECRYPT - International Conference on Security and Cryptography Studierraum Using Abductive and Inductive Inference to Generate Policy Explanations
SECRYPT 130 Poster Thursday 28 Poster Session 2 16:30 - 17:30 SECRYPT - International Conference on Security and Cryptography Studierraum Towards a Legislation Driven Framework for Access Control and Privacy Protection in Public Cloud
SECRYPT 131 Poster Thursday 28 Poster Session 2 16:30 - 17:30 SECRYPT - International Conference on Security and Cryptography Studierraum Pseudorandom Number Generators with Balanced Gray Codes
SECRYPT 133 Poster Thursday 28 Poster Session 2 16:30 - 17:30 SECRYPT - International Conference on Security and Cryptography Studierraum Keeping an Eye on Your Security Through Assurance Indicators
SECRYPT 137 Poster Thursday 28 Poster Session 1 11:15 - 12:15 SECRYPT - International Conference on Security and Cryptography Studierraum QR Steganography - A Threat to New Generation Electronic Voting Systems
SECRYPT 138 20 min Saturday 30 Session 6 14:30 - 16:00 SECRYPT - International Conference on Security and Cryptography Hörsaal FH 3 On the Security of Partially Masked Software Implementations
SECRYPT 141 Poster Thursday 28 Poster Session 2 16:30 - 17:30 SECRYPT - International Conference on Security and Cryptography Studierraum RBAC with ABS - Implementation Practicalities for RBAC Integrity Policies
SIGMAP 4 30 min Friday 29 Session 3 11:45 - 13:15 Multimedia Signal Processing Hörsaal FH 5 Clothes Change Detection Using the Kinect Sensor
SIGMAP 8 Poster Thursday 28 Poster Session 2 16:30 - 17:30 Multimedia Signal Processing Studierraum Computational Complexity Analysis of the Graph Extraction Algorithm for Volumetric Segmentation Method
SIGMAP 10 20 min Saturday 30 Session 5 10:45 - 12:15 Multimedia Systems and Applications Seminarraum 101 A Design and Implementation of a Driver Drowsiness Detection System - A Practical Approach
SIGMAP 11 20 min Saturday 30 Session 6 14:30 - 16:00 Multimedia and Communications Seminarraum 101 A Product Integral Binding Coefficients for High-order Wavelets
SIGMAP 12 Poster Thursday 28 Poster Session 2 16:30 - 17:30 Multimedia Signal Processing Studierraum Real-time Super Resolution Equipment for 8K Video
SIGMAP 14 20 min Friday 29 Session 3 11:45 - 13:15 Multimedia Signal Processing Hörsaal FH 5 Basic Concept of Cuckoo Search Algorithm for 2D Images Processing with Some Research Results - An Idea to Apply Cuckoo Search Algorithm in 2D Images Key-points Search
SIGMAP 16 30 min Thursday 28 Session 1 12:15 - 13:15 Multimedia Signal Processing Seminarraum 101 A A Multi-Threaded Full-feature HEVC Encoder Based on Wavefront Parallel Processing
SIGMAP 17 20 min Friday 29 Session 4 14:30 - 16:00 Multimedia Systems and Applications Hörsaal FH 2 Image Display System Using Bamboo-blind Type Screen that Can Discharge Smell
SIGMAP 18 Poster Thursday 28 Poster Session 1 11:15 - 12:15 Multimedia Signal Processing Studierraum Methods and Algorithms of Cluster Analysis in the Mining Industry - Solution of Tasks for Mineral Rocks Recognition
SIGMAP 19 20 min Friday 29 Session 3 11:45 - 13:15 Multimedia Systems and Applications Hörsaal FH 5 HMM-based Breath and Filled Pauses Elimination in ASR
SIGMAP 20 20 min Friday 29 Session 4 14:30 - 16:00 Multimedia Systems and Applications Hörsaal FH 2 Food Image Presentation System that Discharge Smell Through Screen and Psychological Effect
SIGMAP 23 Poster Thursday 28 Poster Session 1 11:15 - 12:15 Multimedia Systems and Applications Studierraum Hierarchical Optimization Using Hierarchical Multi-competitive Genetic Algorithm and its Application to Multiple Vehicle Routing Problem
SIGMAP 25 20 min Saturday 30 Session 6 14:30 - 16:00 Multimedia Signal Processing Seminarraum 101 A Lip Tracking Using Particle Filter and Geometric Model for Visual Speech Recognition
SIGMAP 27 Poster Thursday 28 Poster Session 2 16:30 - 17:30 Multimedia Systems and Applications Studierraum Home Position Recognition Methods Using Polarizing Films for an Eye-gaze Interface System
SIGMAP 28 30 min Friday 29 Session 4 14:30 - 16:00 Multimedia Systems and Applications Hörsaal FH 2 An Application Supporting Gastroesophageal Multichannel Intraluminal Impedance-pH Analysis
SIGMAP 30 30 min Friday 29 Session 4a 14:30 - 16:00 Multimedia Signal Processing Hörsaal FH 5 Three-stage Unstructured Filter for Removing Mixed Gaussian plus Random Impulse Noise
SIGMAP 33 20 min Saturday 30 Session 6 14:30 - 16:00 Multimedia and Communications Seminarraum 101 A Combining Top-down and Bottom-up Visual Saliency for Firearms Localization
SIGMAP 35 Poster Thursday 28 Poster Session 2 16:30 - 17:30 Multimedia and Communications Studierraum Protecting Digital Fingerprint in Automated Fingerprint Identification System using Local Binary Pattern Operator
SIGMAP 39 30 min Thursday 28 Session 2 14:30 - 16:30 Multimedia Signal Processing Seminarraum 101 A Self-calibration of Large Scale Camera Networks
SIGMAP 40 20 min Friday 29 Session 4a 14:30 - 16:00 Multimedia Signal Processing Hörsaal FH 5 3D Dual-Tree Discrete Wavelet Transform Based Multiple Description Video Coding
SIGMAP 41 Poster Thursday 28 Poster Session 2 16:30 - 17:30 Multimedia Signal Processing Studierraum Image Enhancement for Hand Sign Detection
SIGMAP 42 20 min Saturday 30 Session 6 14:30 - 16:00 Multimedia and Communications Seminarraum 101 A A Fast and Robust Key-Frames based Video Copy Detection Using BSIF-RMI
SIGMAP 44 Poster Thursday 28 Poster Session 1 11:15 - 12:15 Multimedia and Communications Studierraum Auditory Features Analysis for BIC-based Audio Segmentation
SIGMAP 45 Poster Friday 29 Poster Session 3 16:00 - 17:00 Multimedia Systems and Applications Studierraum Automatic Letter/Pillarbox Detection for Optimized Display of Digital TV
SIGMAP 46 30 min Friday 29 Session 4a 14:30 - 16:00 Multimedia Signal Processing Hörsaal FH 5 Real-time Local Stereo Matching Using Edge Sensitive AdaptiveWindows
SIGMAP 47 30 min Thursday 28 Session 2 14:30 - 16:30 Multimedia and Communications Seminarraum 101 A Noise Mitigation over Powerline Communication Using LDPC-Convolutional Code and Fusion of Mean and Median Filters
SIGMAP 50 Poster Friday 29 Poster Session 3 16:00 - 17:00 Multimedia Signal Processing Studierraum Gabor Fused to 2DPCA for Face Recognition
SIGMAP 51 20 min Saturday 30 Session 5 10:45 - 12:15 Multimedia Systems and Applications Seminarraum 101 A A Multimedia Tracing Traitors Scheme Using Multi-level Hierarchical Structure for Tardos Fingerprint Based Audio Watermarking
SIGMAP 52 20 min Saturday 30 Session 5 10:45 - 12:15 Multimedia and Communications Seminarraum 101 A Efficient Rate Control for Intra-Frame Coding in High Efficiency Video Coding
SIGMAP 53 30 min Thursday 28 Session 2 14:30 - 16:30 Multimedia Signal Processing Seminarraum 101 A Evaluation of Acoustic Feedback Cancellation Methods with Multiple Feedback Paths
SIGMAP 54 Poster Friday 29 Poster Session 3 16:00 - 17:00 Multimedia and Communications Studierraum Image Stitching with Efficient Brightness Fusion and Automatic Content Awareness
SIGMAP 55 Poster Friday 29 Poster Session 3 16:00 - 17:00 Multimedia Systems and Applications Studierraum Why Using the Alpha-stable Distribution in Neuroimage?
SIGMAP 57 20 min Thursday 28 Session 1 12:15 - 13:15 Multimedia Signal Processing Seminarraum 101 A Visual Attention in Edited Dynamical Images
SIGMAP 63 Poster Friday 29 Poster Session 3 16:00 - 17:00 Multimedia Signal Processing Studierraum Comparison of Adaptive Filters for Wavelet Generation
SIGMAP 64 20 min Friday 29 Session 4 14:30 - 16:00 Multimedia Signal Processing Hörsaal FH 2 An Integrated Approach for Efficient Analysis of Facial Expressions
SIGMAP 65 Poster Friday 29 Poster Session 3 16:00 - 17:00 Multimedia Systems and Applications Studierraum Gender Classification Using M-Estimator Based Radial Basis Function Neural Network
SIGMAP 66 Poster Thursday 28 Poster Session 1 11:15 - 12:15 Multimedia Signal Processing Studierraum Image Denoising Algorithm with a Three-dimensional Grid System of Coupled Nonlinear Elements
SIGMAP 69 Poster Thursday 28 Poster Session 2 16:30 - 17:30 Multimedia and Communications Studierraum Towards a Wake-up and Synchronization Mechanism for Multiscreen Applications using iBeacon
SIGMAP 70 Poster Thursday 28 Poster Session 1 11:15 - 12:15 Multimedia and Communications Studierraum Smoothed Surface Transitions for Human Motion Synthesis
WINSYS 3 Poster Friday 29 Poster Session 3 16:00 - 17:00 Wireless and Mobile Technologies Studierraum Identification Technology of Mobile Phone Devices Using RFF
WINSYS 4 30 min Friday 29 Session 4 14:30 - 16:00 Wireless and Mobile Technologies Hörsaal FH 4 Resource Allocation in GMD and SVD-based MIMO System
WINSYS 5 Poster Friday 29 Poster Session 3 16:00 - 17:00 Wireless and Mobile Technologies Studierraum Monitoring Wi-Fi Radiation Levels at Residences in Kuwait - A Field Survey
WINSYS 7 Poster Friday 29 Poster Session 3 16:00 - 17:00 Sensor, Mesh and Ad Hoc Communications and Networks Studierraum An Effective Alert-Message Routing Protocol for Urban VANETs
WINSYS 8 30 min Friday 29 Session 4 14:30 - 16:00 Wireless and Mobile Technologies Hörsaal FH 4 A Simultaneous Network Search Scheme for Fast Roaming and Handover of the Simultaneous Voice and LTE Mobile Devices
WINSYS 21 20 min Thursday 28 Session 1 12:15 - 13:15 Wireless and Mobile Technologies Hörsaal FH 4 Assessing the Cooperativeness of Users in Wi-Fi Networks
WINSYS 22 20 min Thursday 28 Session 1 12:15 - 13:15 Wireless and Mobile Technologies Hörsaal FH 4 Impact of the IEEE 802.11aa Intra-AC Prioritization on QoE for H.264 Compression
WINSYS 23 20 min Thursday 28 Session 1 12:15 - 13:15 Wireless and Mobile Technologies Hörsaal FH 4 Improved Secure Neighbor Discovery Protocol (ISEND) for New Wireless Networks Generations