DCNET |
3 |
20 min |
Thursday 28 |
Session 2 |
14:30 - 16:30 |
DCNET - International Conference on Data Communication Networking |
Hörsaal FH 2 |
Routing Strategy of a Prioritized Limited Multi-Server Processor-Sharing System |
DCNET |
8 |
20 min |
Thursday 28 |
Session 2 |
14:30 - 16:30 |
DCNET - International Conference on Data Communication Networking |
Hörsaal FH 2 |
AVP - An Android Virtual Playground |
DCNET |
9 |
20 min |
Thursday 28 |
Session 2 |
14:30 - 16:30 |
DCNET - International Conference on Data Communication Networking |
Hörsaal FH 2 |
Towards Identification of Operating Systems from the Internet Traffic - IPFIX Monitoring with Fingerprinting and Clustering |
DCNET |
12 |
Poster |
Thursday 28 |
Poster Session 2 |
16:30 - 17:30 |
DCNET - International Conference on Data Communication Networking |
Studierraum |
Remote Laboratory for Computer Networks |
DCNET |
13 |
20 min |
Thursday 28 |
Session 2 |
14:30 - 16:30 |
DCNET - International Conference on Data Communication Networking |
Hörsaal FH 2 |
Papers, Please... - X.509 Certificate Revocation in Practice |
DCNET |
15 |
Poster |
Thursday 28 |
Poster Session 2 |
16:30 - 17:30 |
DCNET - International Conference on Data Communication Networking |
Studierraum |
The Bio-Inspired and Social Evolution of Node and Data in a Multilayer Network |
DCNET |
18 |
20 min |
Thursday 28 |
Session 2 |
14:30 - 16:30 |
DCNET - International Conference on Data Communication Networking |
Hörsaal FH 2 |
A SCTP-based Authentication Protocol: SCTPAP |
ICE-B |
4 |
Poster |
Thursday 28 |
Poster Session 2 |
16:30 - 17:30 |
Applications |
Studierraum |
The Method of Automated Monitoring of Product Prices and Market Position Determination in Relation to Competition Quotes - Monitoring of Product Prices and Marketability Development with Continuous Assessment of Market Position in on-Line Sales |
ICE-B |
6 |
Poster |
Thursday 28 |
Poster Session 2 |
16:30 - 17:30 |
Applications |
Studierraum |
A Comparative Study of Engineering and Business Students’ Attitude to e-Business Application |
ICE-B |
7 |
Poster |
Thursday 28 |
Poster Session 2 |
16:30 - 17:30 |
Applications |
Studierraum |
A Framework for Selecting Sample Size in Educational Research on e-business Application |
ICE-B |
8 |
20 min |
Saturday 30 |
Session 6 |
14:30 - 16:00 |
Applications |
Hörsaal FH 2 |
A Conceptual Enterprise Architecture Framework for Smart Cities - A Survey Based Approach |
ICE-B |
9 |
20 min |
Saturday 30 |
Session 6 |
14:30 - 16:00 |
e-Logistics |
Hörsaal FH 2 |
A Multi-Data Mining Approach for Shelf Space Optimization - Considering Customer Behaviour |
ICE-B |
14 |
20 min |
Friday 29 |
Session 4 |
14:30 - 16:00 |
Applications |
Hörsaal FH 3 |
Do Specific Text Features Influence Click Probabilities in Paid Search Advertising? |
ICE-B |
15 |
20 min |
Friday 29 |
Session 3 |
11:45 - 13:15 |
Collaboration and e-Services |
Hörsaal FH 3 |
Towards Real-time Collaboration in User Interface Mashups |
ICE-B |
17 |
20 min |
Friday 29 |
Session 3 |
11:45 - 13:15 |
Collaboration and e-Services |
Hörsaal FH 3 |
Energizing People’s Work - Transforming Organizations Through Gamification |
ICE-B |
18 |
30 min |
Friday 29 |
Session 3 |
11:45 - 13:15 |
Enterprise Engineering |
Hörsaal FH 3 |
Business Models for Cloud-based High Perfomance Computing Service Provision - Insights from the Swiss Higher Education Sector |
ICE-B |
21 |
30 min |
Thursday 28 |
Session 2 |
14:30 - 16:30 |
Sustainable e-Business |
Hörsaal FH 3 |
Pricing and Competition in Mobile App Markets |
ICE-B |
22 |
20 min |
Thursday 28 |
Session 2 |
14:30 - 16:30 |
Technology Platforms |
Hörsaal FH 3 |
QoS based Resource Allocation and Service Selection in the Cloud |
ICE-B |
23 |
30 min |
Thursday 28 |
Session 1 |
12:15 - 13:15 |
Enterprise Engineering |
Hörsaal FH 3 |
Decision Support and Online Advertising - Development and Empirical Testing of a Data Landscape |
ICE-B |
24 |
30 min |
Friday 29 |
Session 3a |
11:45 - 13:15 |
Mobility |
Hörsaal FH 4 |
Location Data – A Trade-off between Control and Value - Business Model Implications |
ICE-B |
25 |
Poster |
Thursday 28 |
Poster Session 2 |
16:30 - 17:30 |
Enterprise Engineering |
Studierraum |
Proposed Business Model for SME Farmers in Peri-Urban Sydney Region |
ICE-B |
30 |
30 min |
Thursday 28 |
Session 1 |
12:15 - 13:15 |
Enterprise Engineering |
Hörsaal FH 3 |
A Resource-aware Simulation Tool for Business Processes |
ICE-B |
32 |
Poster |
Thursday 28 |
Poster Session 2 |
16:30 - 17:30 |
Applications |
Studierraum |
Electronic Internal Marketing for Tourism - A New Tourism Marketing Approach |
ICE-B |
33 |
Poster |
Thursday 28 |
Poster Session 2 |
16:30 - 17:30 |
Applications |
Studierraum |
e-Shop User Preferences via User Behavior |
ICE-B |
34 |
20 min |
Friday 29 |
Session 4 |
14:30 - 16:00 |
Collaboration and e-Services |
Hörsaal FH 3 |
How to Efficiently Solve Internet Shopping Optimization Problem with Price Sensitive Discounts? |
ICE-B |
35 |
20 min |
Friday 29 |
Session 3 |
11:45 - 13:15 |
Collaboration and e-Services |
Hörsaal FH 3 |
Usability for Blended Shopping - Solving Major Flaws by Applying Usability Engineering and Proven Integration Technologies |
ICE-B |
37 |
20 min |
Friday 29 |
Session 4 |
14:30 - 16:00 |
Collaboration and e-Services |
Hörsaal FH 3 |
Semantic and Syntactic Matching of e-Catalogues - Using Vector Space Model |
ICE-B |
39 |
20 min |
Friday 29 |
Session 4 |
14:30 - 16:00 |
Collaboration and e-Services |
Hörsaal FH 3 |
Toward Building Aesthetic, Useful and Readable Tag Clouds for Websites |
ICE-B |
40 |
20 min |
Saturday 30 |
Session 6 |
14:30 - 16:00 |
Enterprise Engineering |
Hörsaal FH 2 |
Business Model Framework to Provide Heterogeneous Mobility Services on Virtual Markets |
ICE-B |
41 |
Poster |
Thursday 28 |
Poster Session 2 |
16:30 - 17:30 |
Enterprise Engineering |
Studierraum |
Usage of Semantic Transformations in B2B Integration Solutions |
ICE-B |
42 |
Poster |
Thursday 28 |
Poster Session 2 |
16:30 - 17:30 |
Enterprise Engineering |
Studierraum |
Automatic Business Process Model Assembly on the Basis of Subject-Oriented Semantic Process Mark-up |
ICE-B |
43 |
20 min |
Saturday 30 |
Session 6 |
14:30 - 16:00 |
Enterprise Engineering |
Hörsaal FH 2 |
Simulating Digital Businesses using an Agent Based Modeling Approach |
ICE-B |
44 |
30 min |
Friday 29 |
Session 3a |
11:45 - 13:15 |
Applications |
Hörsaal FH 4 |
The Use of Social Media to Enrich Information Systems Field Trip Experiences |
ICE-B |
45 |
Poster |
Thursday 28 |
Poster Session 2 |
16:30 - 17:30 |
Applications |
Studierraum |
A Research on Inflation Expectations Measurements and Applications - A View Based on Network Behavior |
ICE-B |
46 |
Poster |
Thursday 28 |
Poster Session 2 |
16:30 - 17:30 |
Collaboration and e-Services |
Studierraum |
Literature Review and an Analysis of the State of the Market of Anything Relationship Management (xRM) - xRM as an Extension of Customer Relationship Management |
ICE-B |
47 |
30 min |
Friday 29 |
Session 3a |
11:45 - 13:15 |
Applications |
Hörsaal FH 4 |
Open Source Geographic Information System and Petrel Software - Adaptation and Integration |
OPTICS |
6 |
20 min |
Saturday 30 |
Session 5 |
10:45 - 12:15 |
OPTICS - International Conference on Optical Communication Systems |
Seminarraum 303 |
Multiclass Multiserver Service Differentiation in Optical Flow Switched Networks |
OPTICS |
13 |
Poster |
Thursday 28 |
Poster Session 1 |
11:15 - 12:15 |
OPTICS - International Conference on Optical Communication Systems |
Studierraum |
Receiver Design for an Optical MIMO Testbed |
OPTICS |
14 |
20 min |
Thursday 28 |
Session 1 |
12:15 - 13:15 |
OPTICS - International Conference on Optical Communication Systems |
Hörsaal FH 2 |
Equalisation of Measured Optical MIMO Channels |
OPTICS |
17 |
Poster |
Thursday 28 |
Poster Session 1 |
11:15 - 12:15 |
OPTICS - International Conference on Optical Communication Systems |
Studierraum |
Research of Cable Identification Method Based on Single Fiber |
OPTICS |
18 |
20 min |
Thursday 28 |
Session 1 |
12:15 - 13:15 |
OPTICS - International Conference on Optical Communication Systems |
Hörsaal FH 2 |
On the Impact of the Clipping Techniques on the Performance of Optical OFDM |
OPTICS |
20 |
20 min |
Saturday 30 |
Session 5 |
10:45 - 12:15 |
OPTICS - International Conference on Optical Communication Systems |
Seminarraum 303 |
QAMO: QoS Aware Multipath-TCP Over Optical Burst Switching in Data Centers |
OPTICS |
21 |
30 min |
Friday 29 |
Session 3 |
11:45 - 13:15 |
OPTICS - International Conference on Optical Communication Systems |
Hörsaal FH 2 |
HYRA: An Efficient Hybrid Reporting Method for XG-PON Upstream Resource Allocation |
OPTICS |
22 |
Poster |
Thursday 28 |
Poster Session 1 |
11:15 - 12:15 |
OPTICS - International Conference on Optical Communication Systems |
Studierraum |
Delay-Aware Dynamic Wavelength Bandwidth Allocation in Time- and Wavelength-Division-Multiplexed Passive Optical Network |
OPTICS |
23 |
30 min |
Friday 29 |
Session 3 |
11:45 - 13:15 |
OPTICS - International Conference on Optical Communication Systems |
Hörsaal FH 2 |
On the Prediction of EPON Traffic Using Polynomial Fitting in Optical Network Units |
OPTICS |
24 |
20 min |
Saturday 30 |
Session 5 |
10:45 - 12:15 |
OPTICS - International Conference on Optical Communication Systems |
Seminarraum 303 |
Research on Routing and Wavelength/Subcarrier Assignment Algorithm Based on Layered-graph Model in Optical Satellite Networks |
OPTICS |
26 |
Poster |
Thursday 28 |
Poster Session 1 |
11:15 - 12:15 |
OPTICS - International Conference on Optical Communication Systems |
Studierraum |
Mid-Infrared Supercontinuum Generation in an AsSe2-As2S5 Hybrid Microstructured Optical Fiber |
OPTICS |
27 |
20 min |
Saturday 30 |
Session 5 |
10:45 - 12:15 |
OPTICS - International Conference on Optical Communication Systems |
Seminarraum 303 |
Initial Alignment Scheme and Tracking Control Technique of Free Space Optics Laser Beam |
SECRYPT |
7 |
Poster |
Thursday 28 |
Poster Session 2 |
16:30 - 17:30 |
SECRYPT - International Conference on Security and Cryptography |
Studierraum |
A Formal Model for Forensic Storage Media Preparation Tools |
SECRYPT |
9 |
Poster |
Thursday 28 |
Poster Session 1 |
11:15 - 12:15 |
SECRYPT - International Conference on Security and Cryptography |
Studierraum |
An Efficient Lightweight Security Algorithm for Random Linear Network Coding |
SECRYPT |
17 |
30 min |
Friday 29 |
Session 4 |
14:30 - 16:00 |
SECRYPT - International Conference on Security and Cryptography |
FH HS 1 |
CloudaSec: A Novel Public-key Based Framework to Handle Data Sharing Security in Clouds |
SECRYPT |
21 |
30 min |
Thursday 28 |
Session 2 |
14:30 - 16:30 |
SECRYPT - International Conference on Security and Cryptography |
Hörsaal FH 4 |
Keeping Intruders at Large - A Graph-theoretic Approach to Reducing the Probability of Successful Network Intrusions |
SECRYPT |
22 |
Poster |
Thursday 28 |
Poster Session 2 |
16:30 - 17:30 |
SECRYPT - International Conference on Security and Cryptography |
Studierraum |
A Steganographic Protocol Based on Linear Error-Block Codes |
SECRYPT |
23 |
Poster |
Thursday 28 |
Poster Session 1 |
11:15 - 12:15 |
SECRYPT - International Conference on Security and Cryptography |
Studierraum |
Enhanced Intrusion Detection System Based on Bat Algorithm-support Vector Machine |
SECRYPT |
24 |
30 min |
Thursday 28 |
Session 2 |
14:30 - 16:30 |
SECRYPT - International Conference on Security and Cryptography |
Hörsaal FH 4 |
Certificateless Non-Interactive Key Exchange Protocol without Pairings |
SECRYPT |
25 |
20 min |
Friday 29 |
Session 3 |
11:45 - 13:15 |
SECRYPT - International Conference on Security and Cryptography |
FH HS 1 |
Robust Multispectral Palmprint Identification System by Jointly Using Contourlet Decomposition & Gabor Filter Response |
SECRYPT |
28 |
20 min |
Saturday 30 |
Session 6a |
14:30 - 16:00 |
SECRYPT - International Conference on Security and Cryptography |
FH HS 1 |
Shellcode Detection in IPv6 Networks with HoneydV6 |
SECRYPT |
29 |
30 min |
Thursday 28 |
Session 2a |
14:30 - 16:30 |
SECRYPT - International Conference on Security and Cryptography |
Hörsaal FH 7 |
Adaptive Oblivious Transfer with Hidden Access Policy Realizing Disjunction |
SECRYPT |
31 |
20 min |
Saturday 30 |
Session 6a |
14:30 - 16:00 |
SECRYPT - International Conference on Security and Cryptography |
FH HS 1 |
Signaling Attacks in Mobile Telephony |
SECRYPT |
32 |
20 min |
Friday 29 |
Session 3 |
11:45 - 13:15 |
SECRYPT - International Conference on Security and Cryptography |
FH HS 1 |
Efficient Construction of Infinite Length Hash Chains with Perfect Forward Secrecy Using Two Independent Hash Functions |
SECRYPT |
35 |
30 min |
Thursday 28 |
Session 2a |
14:30 - 16:30 |
SECRYPT - International Conference on Security and Cryptography |
Hörsaal FH 7 |
A Secure Anonymous Proxy Multi-signature Scheme |
SECRYPT |
39 |
20 min |
Saturday 30 |
Session 6a |
14:30 - 16:00 |
SECRYPT - International Conference on Security and Cryptography |
FH HS 1 |
SMS Spam - A Holistic View |
SECRYPT |
42 |
20 min |
Saturday 30 |
Session 6 |
14:30 - 16:00 |
SECRYPT - International Conference on Security and Cryptography |
Hörsaal FH 3 |
Constructing Empirical Tests of Randomness |
SECRYPT |
45 |
Poster |
Thursday 28 |
Poster Session 2 |
16:30 - 17:30 |
SECRYPT - International Conference on Security and Cryptography |
Studierraum |
Hybrid-Style Personal Key Management in Ubiquitous Computing |
SECRYPT |
46 |
Poster |
Friday 29 |
Poster Session 3 |
16:00 - 17:00 |
SECRYPT - International Conference on Security and Cryptography |
Studierraum |
Using the Juliet Test Suite to Compare Static Security Scanners |
SECRYPT |
49 |
20 min |
Saturday 30 |
Session 5 |
10:45 - 12:15 |
SECRYPT - International Conference on Security and Cryptography |
FH HS 1 |
Secure Video Player for Mobile Devices Integrating a Watermarking-based Tracing Mechanism |
SECRYPT |
51 |
Poster |
Thursday 28 |
Poster Session 1 |
11:15 - 12:15 |
SECRYPT - International Conference on Security and Cryptography |
Studierraum |
On Privacy Protection in the Internet Surveillance Era |
SECRYPT |
52 |
30 min |
Friday 29 |
Session 4 |
14:30 - 16:00 |
SECRYPT - International Conference on Security and Cryptography |
FH HS 1 |
Pairing-free Single Round Certificateless and Identity Based Authenticated Key Exchange Protocols |
SECRYPT |
53 |
Poster |
Thursday 28 |
Poster Session 1 |
11:15 - 12:15 |
SECRYPT - International Conference on Security and Cryptography |
Studierraum |
Framework for Securing Data in Cloud Storage Services |
SECRYPT |
56 |
30 min |
Saturday 30 |
Session 5a |
10:45 - 12:15 |
SECRYPT - International Conference on Security and Cryptography |
Hörsaal FH 2 |
Mobile Devices: A Phisher’s Paradise |
SECRYPT |
57 |
Poster |
Thursday 28 |
Poster Session 2 |
16:30 - 17:30 |
SECRYPT - International Conference on Security and Cryptography |
Studierraum |
Partial Fingerprint Identification Through Correlation-Based Approach |
SECRYPT |
59 |
Poster |
Friday 29 |
Poster Session 3 |
16:00 - 17:00 |
SECRYPT - International Conference on Security and Cryptography |
Studierraum |
Framework Implementation Based on Grid of Smartcards to Authenticate Users and Virtual Machines |
SECRYPT |
60 |
30 min |
Saturday 30 |
Session 5a |
10:45 - 12:15 |
SECRYPT - International Conference on Security and Cryptography |
Hörsaal FH 2 |
Dynamic Analysis of Usage Control Policies |
SECRYPT |
64 |
20 min |
Saturday 30 |
Session 6a |
14:30 - 16:00 |
SECRYPT - International Conference on Security and Cryptography |
FH HS 1 |
On Reliability of Clock-skew-based Remote Computer Identification |
SECRYPT |
66 |
20 min |
Thursday 28 |
Session 2a |
14:30 - 16:30 |
SECRYPT - International Conference on Security and Cryptography |
Hörsaal FH 7 |
KDM-CCA Security of the Cramer-Shoup Cryptosystem, Revisited |
SECRYPT |
67 |
20 min |
Saturday 30 |
Session 5 |
10:45 - 12:15 |
SECRYPT - International Conference on Security and Cryptography |
FH HS 1 |
A Multiple-server Efficient Reusable Proof of Data Possesion from Private Information Retrieval Techniques |
SECRYPT |
68 |
Poster |
Friday 29 |
Poster Session 3 |
16:00 - 17:00 |
SECRYPT - International Conference on Security and Cryptography |
Studierraum |
Modeling Requirements for Security-enhanced Design of Embedded Systems |
SECRYPT |
69 |
20 min |
Thursday 28 |
Session 1 |
12:15 - 13:15 |
SECRYPT - International Conference on Security and Cryptography |
Hörsaal FH 7 |
A Novel Pseudo Random Number Generator Based on L’Ecuyer’s Scheme |
SECRYPT |
71 |
30 min |
Thursday 28 |
Session 2 |
14:30 - 16:30 |
SECRYPT - International Conference on Security and Cryptography |
Hörsaal FH 4 |
Formal Analysis of Electronic Exams |
SECRYPT |
72 |
30 min |
Thursday 28 |
Session 2 |
14:30 - 16:30 |
SECRYPT - International Conference on Security and Cryptography |
Hörsaal FH 4 |
Towards a Framework for Assessing the Feasibility of Side-channel Attacks in Virtualized Environments |
SECRYPT |
74 |
30 min |
Friday 29 |
Session 3 |
11:45 - 13:15 |
SECRYPT - International Conference on Security and Cryptography |
FH HS 1 |
FORCE - Fully Off-line secuRe CrEdits for Mobile Micro Payments |
SECRYPT |
76 |
30 min |
Thursday 28 |
Session 2a |
14:30 - 16:30 |
SECRYPT - International Conference on Security and Cryptography |
Hörsaal FH 7 |
Privacy Preserving Delegated Word Search in the Cloud |
SECRYPT |
78 |
20 min |
Saturday 30 |
Session 6 |
14:30 - 16:00 |
SECRYPT - International Conference on Security and Cryptography |
Hörsaal FH 3 |
Verifying Conformance of Security Implementation with Organizational Access Policies in Community Cloud - A Formal Approach |
SECRYPT |
79 |
30 min |
Friday 29 |
Session 4 |
14:30 - 16:00 |
SECRYPT - International Conference on Security and Cryptography |
FH HS 1 |
Identifying Cryptographic Functionality in Android Applications |
SECRYPT |
80 |
Poster |
Friday 29 |
Poster Session 3 |
16:00 - 17:00 |
SECRYPT - International Conference on Security and Cryptography |
Studierraum |
NFC Based Mobile Single Sign-On Solution as a Chrome Extension |
SECRYPT |
81 |
Poster |
Friday 29 |
Poster Session 3 |
16:00 - 17:00 |
SECRYPT - International Conference on Security and Cryptography |
Studierraum |
Secure Virtual Machine Migration (SV2M) in Cloud Federation |
SECRYPT |
84 |
20 min |
Saturday 30 |
Session 5a |
10:45 - 12:15 |
SECRYPT - International Conference on Security and Cryptography |
Hörsaal FH 2 |
Randomized Addition of Sensitive Attributes for l-diversity |
SECRYPT |
86 |
20 min |
Thursday 28 |
Session 1 |
12:15 - 13:15 |
SECRYPT - International Conference on Security and Cryptography |
Hörsaal FH 7 |
Optimizing Elliptic Curve Scalar Multiplication with Near-Factorization |
SECRYPT |
88 |
20 min |
Saturday 30 |
Session 5 |
10:45 - 12:15 |
SECRYPT - International Conference on Security and Cryptography |
FH HS 1 |
A Hybrid Approach for Content Based Image Authentication |
SECRYPT |
90 |
20 min |
Thursday 28 |
Session 1 |
12:15 - 13:15 |
SECRYPT - International Conference on Security and Cryptography |
Hörsaal FH 7 |
Revisiting a Recent Resource-efficient Technique for Increasing the Throughput of Stream Ciphers |
SECRYPT |
91 |
Poster |
Thursday 28 |
Poster Session 1 |
11:15 - 12:15 |
SECRYPT - International Conference on Security and Cryptography |
Studierraum |
Secure Protocol for Financial Transactions Using Smartphones - SPFT - Formally Proved by AVISPA |
SECRYPT |
96 |
Poster |
Thursday 28 |
Poster Session 1 |
11:15 - 12:15 |
SECRYPT - International Conference on Security and Cryptography |
Studierraum |
A Cryptographic Study of Tokenization Systems |
SECRYPT |
98 |
Poster |
Thursday 28 |
Poster Session 1 |
11:15 - 12:15 |
SECRYPT - International Conference on Security and Cryptography |
Studierraum |
Combined Algebraic and Truncated Differential Cryptanalysis on Reduced-round Simon |
SECRYPT |
114 |
Poster |
Thursday 28 |
Poster Session 1 |
11:15 - 12:15 |
SECRYPT - International Conference on Security and Cryptography |
Studierraum |
Software and Hardware Certification Techniques in a Combined Certification Model |
SECRYPT |
117 |
Poster |
Thursday 28 |
Poster Session 1 |
11:15 - 12:15 |
SECRYPT - International Conference on Security and Cryptography |
Studierraum |
Experimental Study of Performance and Security Constraints on Wireless Key Distribution Using Random Phase of Multipath Radio Signal |
SECRYPT |
118 |
Poster |
Thursday 28 |
Poster Session 1 |
11:15 - 12:15 |
SECRYPT - International Conference on Security and Cryptography |
Studierraum |
Network-based Intrusion Prevention System Prototype with Multi-Detection - A Position Paper |
SECRYPT |
119 |
Poster |
Thursday 28 |
Poster Session 1 |
11:15 - 12:15 |
SECRYPT - International Conference on Security and Cryptography |
Studierraum |
Could Bitcoin Transactions Be 100x Faster? |
SECRYPT |
121 |
Poster |
Thursday 28 |
Poster Session 1 |
11:15 - 12:15 |
SECRYPT - International Conference on Security and Cryptography |
Studierraum |
Using Bitmaps for Executing Range Queries in Encrypted Databases |
SECRYPT |
122 |
Poster |
Thursday 28 |
Poster Session 1 |
11:15 - 12:15 |
SECRYPT - International Conference on Security and Cryptography |
Studierraum |
Differential Fault Attacks against AES Tampering with the Instruction Flow |
SECRYPT |
125 |
Poster |
Thursday 28 |
Poster Session 2 |
16:30 - 17:30 |
SECRYPT - International Conference on Security and Cryptography |
Studierraum |
Secure Key Distribution based on Meteor Burst Communications |
SECRYPT |
126 |
Poster |
Thursday 28 |
Poster Session 1 |
11:15 - 12:15 |
SECRYPT - International Conference on Security and Cryptography |
Studierraum |
COGITO: Code Polymorphism to Secure Devices |
SECRYPT |
129 |
Poster |
Thursday 28 |
Poster Session 2 |
16:30 - 17:30 |
SECRYPT - International Conference on Security and Cryptography |
Studierraum |
Using Abductive and Inductive Inference to Generate Policy Explanations |
SECRYPT |
130 |
Poster |
Thursday 28 |
Poster Session 2 |
16:30 - 17:30 |
SECRYPT - International Conference on Security and Cryptography |
Studierraum |
Towards a Legislation Driven Framework for Access Control and Privacy Protection in Public Cloud |
SECRYPT |
131 |
Poster |
Thursday 28 |
Poster Session 2 |
16:30 - 17:30 |
SECRYPT - International Conference on Security and Cryptography |
Studierraum |
Pseudorandom Number Generators with Balanced Gray Codes |
SECRYPT |
133 |
Poster |
Thursday 28 |
Poster Session 2 |
16:30 - 17:30 |
SECRYPT - International Conference on Security and Cryptography |
Studierraum |
Keeping an Eye on Your Security Through Assurance Indicators |
SECRYPT |
137 |
Poster |
Thursday 28 |
Poster Session 1 |
11:15 - 12:15 |
SECRYPT - International Conference on Security and Cryptography |
Studierraum |
QR Steganography - A Threat to New Generation Electronic Voting Systems |
SECRYPT |
138 |
20 min |
Saturday 30 |
Session 6 |
14:30 - 16:00 |
SECRYPT - International Conference on Security and Cryptography |
Hörsaal FH 3 |
On the Security of Partially Masked Software Implementations |
SECRYPT |
141 |
Poster |
Thursday 28 |
Poster Session 2 |
16:30 - 17:30 |
SECRYPT - International Conference on Security and Cryptography |
Studierraum |
RBAC with ABS - Implementation Practicalities for RBAC Integrity Policies |
SIGMAP |
4 |
30 min |
Friday 29 |
Session 3 |
11:45 - 13:15 |
Multimedia Signal Processing |
Hörsaal FH 5 |
Clothes Change Detection Using the Kinect Sensor |
SIGMAP |
8 |
Poster |
Thursday 28 |
Poster Session 2 |
16:30 - 17:30 |
Multimedia Signal Processing |
Studierraum |
Computational Complexity Analysis of the Graph Extraction Algorithm for Volumetric Segmentation Method |
SIGMAP |
10 |
20 min |
Saturday 30 |
Session 5 |
10:45 - 12:15 |
Multimedia Systems and Applications |
Seminarraum 101 A |
Design and Implementation of a Driver Drowsiness Detection System - A Practical Approach |
SIGMAP |
11 |
20 min |
Saturday 30 |
Session 6 |
14:30 - 16:00 |
Multimedia and Communications |
Seminarraum 101 A |
Product Integral Binding Coefficients for High-order Wavelets |
SIGMAP |
12 |
Poster |
Thursday 28 |
Poster Session 2 |
16:30 - 17:30 |
Multimedia Signal Processing |
Studierraum |
Real-time Super Resolution Equipment for 8K Video |
SIGMAP |
14 |
20 min |
Friday 29 |
Session 3 |
11:45 - 13:15 |
Multimedia Signal Processing |
Hörsaal FH 5 |
Basic Concept of Cuckoo Search Algorithm for 2D Images Processing with Some Research Results - An Idea to Apply Cuckoo Search Algorithm in 2D Images Key-points Search |
SIGMAP |
16 |
30 min |
Thursday 28 |
Session 1 |
12:15 - 13:15 |
Multimedia Signal Processing |
Seminarraum 101 A |
A Multi-Threaded Full-feature HEVC Encoder Based on Wavefront Parallel Processing
|
SIGMAP |
17 |
20 min |
Friday 29 |
Session 4 |
14:30 - 16:00 |
Multimedia Systems and Applications |
Hörsaal FH 2 |
Image Display System Using Bamboo-blind Type Screen that Can Discharge Smell |
SIGMAP |
18 |
Poster |
Thursday 28 |
Poster Session 1 |
11:15 - 12:15 |
Multimedia Signal Processing |
Studierraum |
Methods and Algorithms of Cluster Analysis in the Mining Industry - Solution of Tasks for Mineral Rocks Recognition |
SIGMAP |
19 |
20 min |
Friday 29 |
Session 3 |
11:45 - 13:15 |
Multimedia Systems and Applications |
Hörsaal FH 5 |
HMM-based Breath and Filled Pauses Elimination in ASR |
SIGMAP |
20 |
20 min |
Friday 29 |
Session 4 |
14:30 - 16:00 |
Multimedia Systems and Applications |
Hörsaal FH 2 |
Food Image Presentation System that Discharge Smell Through Screen and Psychological Effect |
SIGMAP |
23 |
Poster |
Thursday 28 |
Poster Session 1 |
11:15 - 12:15 |
Multimedia Systems and Applications |
Studierraum |
Hierarchical Optimization Using Hierarchical Multi-competitive Genetic Algorithm and its Application to Multiple Vehicle Routing Problem |
SIGMAP |
25 |
20 min |
Saturday 30 |
Session 6 |
14:30 - 16:00 |
Multimedia Signal Processing |
Seminarraum 101 A |
Lip Tracking Using Particle Filter and Geometric Model for Visual Speech Recognition |
SIGMAP |
27 |
Poster |
Thursday 28 |
Poster Session 2 |
16:30 - 17:30 |
Multimedia Systems and Applications |
Studierraum |
Home Position Recognition Methods Using Polarizing Films for an Eye-gaze Interface System |
SIGMAP |
28 |
30 min |
Friday 29 |
Session 4 |
14:30 - 16:00 |
Multimedia Systems and Applications |
Hörsaal FH 2 |
An Application Supporting Gastroesophageal Multichannel Intraluminal Impedance-pH Analysis |
SIGMAP |
30 |
30 min |
Friday 29 |
Session 4a |
14:30 - 16:00 |
Multimedia Signal Processing |
Hörsaal FH 5 |
Three-stage Unstructured Filter for Removing Mixed Gaussian plus Random Impulse Noise |
SIGMAP |
33 |
20 min |
Saturday 30 |
Session 6 |
14:30 - 16:00 |
Multimedia and Communications |
Seminarraum 101 A |
Combining Top-down and Bottom-up Visual Saliency for Firearms Localization |
SIGMAP |
35 |
Poster |
Thursday 28 |
Poster Session 2 |
16:30 - 17:30 |
Multimedia and Communications |
Studierraum |
Protecting Digital Fingerprint in Automated Fingerprint Identification System using Local Binary Pattern Operator |
SIGMAP |
39 |
30 min |
Thursday 28 |
Session 2 |
14:30 - 16:30 |
Multimedia Signal Processing |
Seminarraum 101 A |
Self-calibration of Large Scale Camera Networks |
SIGMAP |
40 |
20 min |
Friday 29 |
Session 4a |
14:30 - 16:00 |
Multimedia Signal Processing |
Hörsaal FH 5 |
3D Dual-Tree Discrete Wavelet Transform Based Multiple Description Video Coding |
SIGMAP |
41 |
Poster |
Thursday 28 |
Poster Session 2 |
16:30 - 17:30 |
Multimedia Signal Processing |
Studierraum |
Image Enhancement for Hand Sign Detection |
SIGMAP |
42 |
20 min |
Saturday 30 |
Session 6 |
14:30 - 16:00 |
Multimedia and Communications |
Seminarraum 101 A |
A Fast and Robust Key-Frames based Video Copy Detection Using BSIF-RMI |
SIGMAP |
44 |
Poster |
Thursday 28 |
Poster Session 1 |
11:15 - 12:15 |
Multimedia and Communications |
Studierraum |
Auditory Features Analysis for BIC-based Audio Segmentation |
SIGMAP |
45 |
Poster |
Friday 29 |
Poster Session 3 |
16:00 - 17:00 |
Multimedia Systems and Applications |
Studierraum |
Automatic Letter/Pillarbox Detection for Optimized Display of Digital TV |
SIGMAP |
46 |
30 min |
Friday 29 |
Session 4a |
14:30 - 16:00 |
Multimedia Signal Processing |
Hörsaal FH 5 |
Real-time Local Stereo Matching Using Edge Sensitive AdaptiveWindows |
SIGMAP |
47 |
30 min |
Thursday 28 |
Session 2 |
14:30 - 16:30 |
Multimedia and Communications |
Seminarraum 101 A |
Noise Mitigation over Powerline Communication Using LDPC-Convolutional Code and Fusion of Mean and Median Filters |
SIGMAP |
50 |
Poster |
Friday 29 |
Poster Session 3 |
16:00 - 17:00 |
Multimedia Signal Processing |
Studierraum |
Gabor Fused to 2DPCA for Face Recognition |
SIGMAP |
51 |
20 min |
Saturday 30 |
Session 5 |
10:45 - 12:15 |
Multimedia Systems and Applications |
Seminarraum 101 A |
A Multimedia Tracing Traitors Scheme Using Multi-level Hierarchical Structure for Tardos Fingerprint Based Audio Watermarking |
SIGMAP |
52 |
20 min |
Saturday 30 |
Session 5 |
10:45 - 12:15 |
Multimedia and Communications |
Seminarraum 101 A |
Efficient Rate Control for Intra-Frame Coding in High Efficiency Video Coding |
SIGMAP |
53 |
30 min |
Thursday 28 |
Session 2 |
14:30 - 16:30 |
Multimedia Signal Processing |
Seminarraum 101 A |
Evaluation of Acoustic Feedback Cancellation Methods with Multiple Feedback Paths |
SIGMAP |
54 |
Poster |
Friday 29 |
Poster Session 3 |
16:00 - 17:00 |
Multimedia and Communications |
Studierraum |
Image Stitching with Efficient Brightness Fusion and Automatic Content Awareness |
SIGMAP |
55 |
Poster |
Friday 29 |
Poster Session 3 |
16:00 - 17:00 |
Multimedia Systems and Applications |
Studierraum |
Why Using the Alpha-stable Distribution in Neuroimage? |
SIGMAP |
57 |
20 min |
Thursday 28 |
Session 1 |
12:15 - 13:15 |
Multimedia Signal Processing |
Seminarraum 101 A |
Visual Attention in Edited Dynamical Images |
SIGMAP |
63 |
Poster |
Friday 29 |
Poster Session 3 |
16:00 - 17:00 |
Multimedia Signal Processing |
Studierraum |
Comparison of Adaptive Filters for Wavelet Generation |
SIGMAP |
64 |
20 min |
Friday 29 |
Session 4 |
14:30 - 16:00 |
Multimedia Signal Processing |
Hörsaal FH 2 |
An Integrated Approach for Efficient Analysis of Facial Expressions |
SIGMAP |
65 |
Poster |
Friday 29 |
Poster Session 3 |
16:00 - 17:00 |
Multimedia Systems and Applications |
Studierraum |
Gender Classification Using M-Estimator Based Radial Basis Function Neural Network |
SIGMAP |
66 |
Poster |
Thursday 28 |
Poster Session 1 |
11:15 - 12:15 |
Multimedia Signal Processing |
Studierraum |
Image Denoising Algorithm with a Three-dimensional Grid System of Coupled Nonlinear Elements |
SIGMAP |
69 |
Poster |
Thursday 28 |
Poster Session 2 |
16:30 - 17:30 |
Multimedia and Communications |
Studierraum |
Towards a Wake-up and Synchronization Mechanism for Multiscreen Applications using iBeacon |
SIGMAP |
70 |
Poster |
Thursday 28 |
Poster Session 1 |
11:15 - 12:15 |
Multimedia and Communications |
Studierraum |
Smoothed Surface Transitions for Human Motion Synthesis |
WINSYS |
3 |
Poster |
Friday 29 |
Poster Session 3 |
16:00 - 17:00 |
Wireless and Mobile Technologies |
Studierraum |
Identification Technology of Mobile Phone Devices Using RFF |
WINSYS |
4 |
30 min |
Friday 29 |
Session 4 |
14:30 - 16:00 |
Wireless and Mobile Technologies |
Hörsaal FH 4 |
Resource Allocation in GMD and SVD-based MIMO System |
WINSYS |
5 |
Poster |
Friday 29 |
Poster Session 3 |
16:00 - 17:00 |
Wireless and Mobile Technologies |
Studierraum |
Monitoring Wi-Fi Radiation Levels at Residences in Kuwait - A Field Survey |
WINSYS |
7 |
Poster |
Friday 29 |
Poster Session 3 |
16:00 - 17:00 |
Sensor, Mesh and Ad Hoc Communications and Networks |
Studierraum |
An Effective Alert-Message Routing Protocol for Urban VANETs |
WINSYS |
8 |
30 min |
Friday 29 |
Session 4 |
14:30 - 16:00 |
Wireless and Mobile Technologies |
Hörsaal FH 4 |
A Simultaneous Network Search Scheme for Fast Roaming and Handover of the Simultaneous Voice and LTE Mobile Devices |
WINSYS |
21 |
20 min |
Thursday 28 |
Session 1 |
12:15 - 13:15 |
Wireless and Mobile Technologies |
Hörsaal FH 4 |
Assessing the Cooperativeness of Users in Wi-Fi Networks |
WINSYS |
22 |
20 min |
Thursday 28 |
Session 1 |
12:15 - 13:15 |
Wireless and Mobile Technologies |
Hörsaal FH 4 |
Impact of the IEEE 802.11aa Intra-AC Prioritization on QoE for H.264 Compression |
WINSYS |
23 |
20 min |
Thursday 28 |
Session 1 |
12:15 - 13:15 |
Wireless and Mobile Technologies |
Hörsaal FH 4 |
Improved Secure Neighbor Discovery Protocol (ISEND) for New Wireless Networks Generations |