DCNET |
1 |
30 min |
Monday 20 |
Session 1A |
14:15 - 15:45 |
DCNET - International Conference on Data Communication Networking |
G01 |
Towards a Real Application-aware Network |
DCNET |
2 |
30 min |
Monday 20 |
Session 1A |
14:15 - 15:45 |
DCNET - International Conference on Data Communication Networking |
G01 |
Speaking in Tongues - Practical Evaluation of TLS Cipher Suites Compatibility |
DCNET |
5 |
Poster |
Monday 20 |
Poster Session 1 |
15:45 - 16:45 |
DCNET - International Conference on Data Communication Networking |
Building K |
Service Forwarding Label for Network Function Virtualization and Application-centric Traffic Steering |
DCNET |
7 |
Poster |
Monday 20 |
Poster Session 1 |
15:45 - 16:45 |
DCNET - International Conference on Data Communication Networking |
Building K |
Indoor Localization of the Points of Interest using RO-SLAM |
DCNET |
8 |
Poster |
Monday 20 |
Poster Session 1 |
15:45 - 16:45 |
DCNET - International Conference on Data Communication Networking |
Building K |
Routing in Cognitive Wireless Mesh Networks - An Intelligent Framework |
ICE-B |
3 |
20 min |
Tuesday 21 |
Session 2A |
10:00 - 11:30 |
Applications |
G02 |
Salt Seller - Realization of a Business Game |
ICE-B |
5 |
30 min |
Monday 20 |
Session 1A |
14:15 - 15:45 |
Sustainable e-Business |
G02 |
Social Networking Sites: An Exploration of the Effect of National Cultural Dimensions on Country Adoption Rates |
ICE-B |
7 |
30 min |
Monday 20 |
Session 1A |
14:15 - 15:45 |
Applications |
G02 |
A Business Model Approach to Local mGovernment Applications - Mapping the Brussels Region’s Mobile App Initiatives |
ICE-B |
9 |
Poster |
Monday 20 |
Poster Session 1 |
15:45 - 16:45 |
Enterprise Engineering |
Building K |
Surveillance Camera System Balancing Privacy Protection and Effective Surveillance Image Use |
ICE-B |
10 |
20 min |
Wednesday 22 |
Session 6A |
11:00 - 12:00 |
Applications |
G02 |
Supporting Chinese Farmers with ICT-based Information Services - An Analysis of Service Models |
ICE-B |
11 |
Poster |
Monday 20 |
Poster Session 1 |
15:45 - 16:45 |
Applications |
Building K |
A Cloud Gaming System Design Insights |
ICE-B |
12 |
Poster |
Monday 20 |
Poster Session 1 |
15:45 - 16:45 |
Applications |
Building K |
Combining Physiological with Cognitive Measures of Online Users to Evaluate a Physicians’ Review Website |
ICE-B |
13 |
20 min |
Wednesday 22 |
Session 6A |
11:00 - 12:00 |
Collaboration and e-Services |
G02 |
Enhancing Business Processes with Web 2.0 Features |
ICE-B |
16 |
20 min |
Tuesday 21 |
Session 4A |
16:45 - 17:45 |
Sustainable e-Business |
G02 |
Content Control Scheme to Realize Right Succession and Edit Control |
ICE-B |
17 |
Poster |
Wednesday 22 |
Poster Session 3 |
15:30 - 16:30 |
Sustainable e-Business |
Building K |
Sustainable Farm System for Peri-urban Sydney SMEs |
ICE-B |
18 |
Poster |
Wednesday 22 |
Poster Session 3 |
15:30 - 16:30 |
Sustainable e-Business |
Building K |
An Intelligent Tool for All-to-All Sales on the Internet - Platform for Compilation of Commercial Offers and Requests for Companies and Customers |
ICE-B |
19 |
20 min |
Wednesday 22 |
Session 6A |
11:00 - 12:00 |
Collaboration and e-Services |
G02 |
A Model of Effective IT Governance for Collaborative Networked Organizations |
ICE-B |
20 |
Poster |
Wednesday 22 |
Poster Session 3 |
15:30 - 16:30 |
Enterprise Engineering |
Building K |
Measurement Framework for Business Process Outsourcing to the Cloud |
ICE-B |
21 |
Poster |
Tuesday 21 |
Poster Session 2 |
15:45 - 16:45 |
Technology Platforms |
Building K |
SOA and EDA: A Comparative Study - Similarities, Differences and Conceptual Guidelines on their Usage |
ICE-B |
24 |
Poster |
Wednesday 22 |
Poster Session 3 |
15:30 - 16:30 |
Enterprise Engineering |
Building K |
Modelling Flexible Collaborative Process: The VCP2M Approach |
ICE-B |
25 |
Poster |
Wednesday 22 |
Poster Session 3 |
15:30 - 16:30 |
Enterprise Engineering |
Building K |
Business Process Model Matching: An Approach based on Semantics and Structure |
ICE-B |
26 |
Poster |
Monday 20 |
Poster Session 1 |
15:45 - 16:45 |
Enterprise Engineering |
Building K |
Stakeholder Oriented Enterprise Architecture Modelling |
ICE-B |
27 |
Poster |
Tuesday 21 |
Poster Session 2 |
15:45 - 16:45 |
Applications |
Building K |
Design and Implementation of a Workflow Oriented ERP System |
ICE-B |
28 |
20 min |
Wednesday 22 |
Session 7A |
14:30 - 15:30 |
Enterprise Engineering |
G02 |
The Impact of Digital Presence on Competitive Advantage - A Study Applied to Brazilian Bank Industry |
ICE-B |
29 |
Poster |
Tuesday 21 |
Poster Session 2 |
15:45 - 16:45 |
Technology Platforms |
Building K |
SaaS Cloud Provider Management Framework |
ICE-B |
31 |
20 min |
Monday 29 |
Session 1A |
14:15 - 15:45 |
Enterprise Engineering |
G02 |
An Investigation of Customers’ Loyalty to Social Commerce Websites |
ICE-B |
33 |
20 min |
Wednesday 22 |
Session 7A |
14:30 - 15:30 |
Enterprise Engineering |
G02 |
Meta-modelling the Strategic Alignment Model for Aligning Information Systems Support to Specific Application Domains |
ICE-B |
34 |
30 min |
Tuesday 21 |
Session 2A |
10:00 - 11:30 |
e-Logistics |
G02 |
An Adaptive E-Advertising User Model: The AEADS Approach |
ICE-B |
37 |
30 min |
Tuesday 21 |
Session 4A |
16:45 - 17:45 |
Enterprise Engineering |
G02 |
Hyred - HYbrid Job REcommenDation System |
ICE-B |
38 |
Poster |
Tuesday 21 |
Poster Session 2 |
15:45 - 16:45 |
e-Logistics |
Building K |
IT-enabled Management of Sharing Logistic Trucks |
ICE-B |
39 |
20 min |
Monday 20 |
Session 1A |
14:15 - 15:45 |
Collaboration and e-Services |
G02 |
Why and How People Use Location Sharing Services on Social Networking Platforms in China |
ICE-B |
40 |
Poster |
Monday 20 |
Poster Session 1 |
15:45 - 16:45 |
Enterprise Engineering |
Building K |
GSM Model Construction from Enterprise Models |
OPTICS |
7 |
30 min |
Wednesday 22 |
Session 6A |
11:00 - 12:00 |
OPTICS - International Conference on Optical Communication Systems |
G04 |
Performance Analysis of a WDMA Protocol with a Multiple Tunable Receivers Node Architecture for High-speed Optical Fiber Lans |
OPTICS |
9 |
20 min |
Wednesday 22 |
Session 6A |
11:00 - 12:00 |
OPTICS - International Conference on Optical Communication Systems |
G04 |
Pulley-type Ring Resonator and Optimization |
OPTICS |
10 |
20 min |
Wednesday 22 |
Session 6A |
11:00 - 12:00 |
OPTICS - International Conference on Optical Communication Systems |
G04 |
Amplitude Modulation by Superposition of Independent Light Sources |
OPTICS |
13 |
Poster |
Tuesday 21 |
Poster Session 2 |
15:45 - 16:45 |
OPTICS - International Conference on Optical Communication Systems |
Building K |
Measurement of the Distributed Strain and Temperature by Modeling the Brillouin Spectrum |
OPTICS |
14 |
20 min |
Tuesday 21 |
Session 3A |
11:45 - 13:15 |
OPTICS - International Conference on Optical Communication Systems |
G04 |
Polarization Dependent Loss Emulator Built with Computer-driven Polarization Controllers and Single Mode Fibre |
OPTICS |
15 |
Poster |
Tuesday 21 |
Poster Session 2 |
15:45 - 16:45 |
OPTICS - International Conference on Optical Communication Systems |
Building K |
Impact of Optical Preamplifier Beat Noise on Inter-Satellite Coherent Optical Communication System |
OPTICS |
16 |
30 min |
Tuesday 21 |
Session 3A |
11:45 - 13:15 |
OPTICS - International Conference on Optical Communication Systems |
G04 |
Time Synchronization in XG-PON Systems: An Error Analysis |
SECRYPT |
2 |
Poster |
Wednesday 22 |
Poster Session 3 |
15:30 - 16:30 |
SECRYPT - International Conference on Security and Cryptography |
Building K |
hHB: A Harder HB+ Protocol |
SECRYPT |
4 |
30 min |
Wednesday 22 |
Session 6A |
11:00 - 12:00 |
SECRYPT - International Conference on Security and Cryptography |
G05 |
WeXpose: Towards on-Line Dynamic Analysis of Web Attack Payloads using Just-In-Time Binary Modification |
SECRYPT |
7 |
Poster |
Tuesday 21 |
Poster Session 2 |
15:45 - 16:45 |
SECRYPT - International Conference on Security and Cryptography |
Building K |
Anonymity and Fair-Exchange in e-Commerce Protocol for Physical Products Delivery |
SECRYPT |
8 |
Poster |
Monday 20 |
Poster Session 1 |
15:45 - 16:45 |
SECRYPT - International Conference on Security and Cryptography |
Building K |
A Framework for Incident Response in Industrial Control Systems |
SECRYPT |
9 |
Poster |
Wednesday 22 |
Poster Session 3 |
15:30 - 16:30 |
SECRYPT - International Conference on Security and Cryptography |
Building K |
Controlled Proxy Re-signing - Conditional Proxy Re-Signatures |
SECRYPT |
10 |
Poster |
Monday 20 |
Poster Session 1 |
15:45 - 16:45 |
SECRYPT - International Conference on Security and Cryptography |
Building K |
A Public-Key Cryptography Tool for Personal Use - A Real-world Implementation of ECC for Secure File Exchange |
SECRYPT |
11 |
20 min |
Wednesday 22 |
Session 7A |
14:30 - 15:30 |
SECRYPT - International Conference on Security and Cryptography |
G05 |
Parallel Approaches for Efficient Scalar Multiplication over Elliptic Curve |
SECRYPT |
14 |
20 min |
Monday 20 |
Session 1A |
14:15 - 15:45 |
SECRYPT - International Conference on Security and Cryptography |
G05 |
Policy Anomaly Detection for Distributed IPv6 Firewalls |
SECRYPT |
19 |
30 min |
Wednesday 22 |
Session 5A |
09:15 - 10:45 |
SECRYPT - International Conference on Security and Cryptography |
G05 |
A Flexible Architecture for Industrial Control System Honeypots |
SECRYPT |
20 |
20 min |
Tuesday 21 |
Session 3A |
11:45 - 13:15 |
SECRYPT - International Conference on Security and Cryptography |
G05 |
Secure Physical Access Control with Strong Cryptographic Protection |
SECRYPT |
31 |
Poster |
Tuesday 21 |
Poster Session 2 |
15:45 - 16:45 |
SECRYPT - International Conference on Security and Cryptography |
Building K |
MEDA: A Machine Emulation Detection Algorithm |
SECRYPT |
33 |
30 min |
Tuesday 21 |
Session 4A |
16:45 - 17:45 |
SECRYPT - International Conference on Security and Cryptography |
G05 |
Mobile Malware Detection using Op-code Frequency Histograms |
SECRYPT |
34 |
Poster |
Tuesday 21 |
Poster Session 2 |
15:45 - 16:45 |
SECRYPT - International Conference on Security and Cryptography |
Building K |
Monitoring Software Vulnerabilities through Social Networks Analysis |
SECRYPT |
35 |
30 min |
Monday 20 |
Session 1B |
14:15 - 15:45 |
SECRYPT - International Conference on Security and Cryptography |
G06 |
Gateway Threshold Password-based Authenticated Key Exchange Secure against Undetectable On-line Dictionary Attack |
SECRYPT |
36 |
20 min |
Tuesday 21 |
Session 3A |
11:45 - 13:15 |
SECRYPT - International Conference on Security and Cryptography |
G05 |
Private Eyes: Secure Remote Biometric Authentication |
SECRYPT |
39 |
Poster |
Wednesday 22 |
Poster Session 3 |
15:30 - 16:30 |
SECRYPT - International Conference on Security and Cryptography |
Building K |
Practical IBE Secure under CBDH - Encrypting Without Pairing |
SECRYPT |
41 |
Poster |
Tuesday 21 |
Poster Session 2 |
15:45 - 16:45 |
SECRYPT - International Conference on Security and Cryptography |
Building K |
Revealing Encrypted WebRTC Traffic via Machine Learning Tools |
SECRYPT |
42 |
30 min |
Monday 20 |
Session 1B |
14:15 - 15:45 |
SECRYPT - International Conference on Security and Cryptography |
G06 |
Evaluating the Comprehensive Complexity of Authorization-based Access Control Policies using Quantitative Metrics |
SECRYPT |
43 |
30 min |
Monday 20 |
Session 1A |
14:15 - 15:45 |
SECRYPT - International Conference on Security and Cryptography |
G05 |
Formal Analysis of E-Cash Protocols |
SECRYPT |
46 |
Poster |
Tuesday 21 |
Poster Session 2 |
15:45 - 16:45 |
SECRYPT - International Conference on Security and Cryptography |
Building K |
DPA Resistance Enhancement through a Self-healing PLL based Power Mask |
SECRYPT |
47 |
Poster |
Monday 20 |
Poster Session 1 |
15:45 - 16:45 |
SECRYPT - International Conference on Security and Cryptography |
Building K |
Design and Performance Aspects of Information Security Prediction Markets for Risk Management |
SECRYPT |
48 |
20 min |
Wednesday 22 |
Session 7A |
14:30 - 15:30 |
SECRYPT - International Conference on Security and Cryptography |
G05 |
MoCrySIL – Carry Your Cryptographic Keys in Your Pocket |
SECRYPT |
50 |
30 min |
Monday 20 |
Session 1A |
14:15 - 15:45 |
SECRYPT - International Conference on Security and Cryptography |
G05 |
Algorithmic Information Theory for Obfuscation Security |
SECRYPT |
51 |
20 min |
Tuesday 21 |
Session 2A |
10:00 - 11:30 |
SECRYPT - International Conference on Security and Cryptography |
G05 |
Modeling Authorization Policies for Web Services in Presence of Transitive Dependencies |
SECRYPT |
53 |
Poster |
Monday 20 |
Poster Session 1 |
15:45 - 16:45 |
SECRYPT - International Conference on Security and Cryptography |
Building K |
Battling Against DDoS in SIP - Is Machine Learning-based Detection an Effective Weapon? |
SECRYPT |
57 |
20 min |
Wednesday 22 |
Session 5A |
09:15 - 10:45 |
SECRYPT - International Conference on Security and Cryptography |
G05 |
Solving the Grid Defender’s Dilemma: Tamper Protection for Distributed Cyber-Physical Systems |
SECRYPT |
61 |
20 min |
Wednesday 22 |
Session 5A |
09:15 - 10:45 |
SECRYPT - International Conference on Security and Cryptography |
G05 |
Attack Surface and Vulnerability Assessment of Automotive Electronic Control Units |
SECRYPT |
64 |
20 min |
Wednesday 22 |
Session 7A |
14:30 - 15:30 |
SECRYPT - International Conference on Security and Cryptography |
G05 |
Semantic Secure Public Key Encryption with Filtered Equality Test - PKE-FET |
SECRYPT |
70 |
30 min |
Tuesday 21 |
Session 2A |
10:00 - 11:30 |
SECRYPT - International Conference on Security and Cryptography |
G05 |
A Uniform Modeling Pattern for Operating Systems Access Control Policies with an Application to SELinux |
SECRYPT |
73 |
20 min |
Monday 20 |
Session 1A |
14:15 - 15:45 |
SECRYPT - International Conference on Security and Cryptography |
G05 |
Cloud Resources Placement based on Functional and Non-functional Requirements |
SECRYPT |
74 |
Poster |
Tuesday 21 |
Poster Session 2 |
15:45 - 16:45 |
SECRYPT - International Conference on Security and Cryptography |
Building K |
Distributed Intrusion Detection System based on Anticipation and Prediction Approach |
SECRYPT |
75 |
Poster |
Tuesday 21 |
Poster Session 2 |
15:45 - 16:45 |
SECRYPT - International Conference on Security and Cryptography |
Building K |
Towards Secure Gigabit Passive Optical Networks - Signal Propagation based Key Establishment |
SECRYPT |
79 |
30 min |
Wednesday 22 |
Session 6A |
11:00 - 12:00 |
SECRYPT - International Conference on Security and Cryptography |
G05 |
Automated Exploit Detection using Path Profiling - The Disposition Should Matter, Not the Position |
SECRYPT |
81 |
Poster |
Monday 20 |
Poster Session 1 |
15:45 - 16:45 |
SECRYPT - International Conference on Security and Cryptography |
Building K |
Experimental Extraction of Shared Secret Key from Fluctuations of Multipath Channel at Moving a Mobile Transceiver in an Urban Environment |
SECRYPT |
83 |
20 min |
Wednesday 22 |
Session 5B |
09:15 - 10:45 |
SECRYPT - International Conference on Security and Cryptography |
G06 |
Light Blind: Why Encrypt If You Can Share? |
SECRYPT |
91 |
20 min |
Wednesday 22 |
Session 5A |
09:15 - 10:45 |
SECRYPT - International Conference on Security and Cryptography |
G05 |
Scargos: Towards Automatic Vulnerability Distribution |
SECRYPT |
92 |
Poster |
Tuesday 21 |
Poster Session 2 |
15:45 - 16:45 |
SECRYPT - International Conference on Security and Cryptography |
Building K |
A Formally Verified Access Control Mechanism for Information Centric Networks |
SECRYPT |
93 |
Poster |
Wednesday 22 |
Poster Session 3 |
15:30 - 16:30 |
SECRYPT - International Conference on Security and Cryptography |
Building K |
A Note on Schoenmakers Algorithm for Multi Exponentiation |
SECRYPT |
97 |
30 min |
Wednesday 22 |
Session 5B |
09:15 - 10:45 |
SECRYPT - International Conference on Security and Cryptography |
G06 |
Preserving Privacy in Collaborative Business Process Composition |
SECRYPT |
99 |
Poster |
Monday 20 |
Poster Session 1 |
15:45 - 16:45 |
SECRYPT - International Conference on Security and Cryptography |
Building K |
Performance Evaluation of Meteor Key Distribution |
SECRYPT |
102 |
20 min |
Tuesday 21 |
Session 3A |
11:45 - 13:15 |
SECRYPT - International Conference on Security and Cryptography |
G05 |
A Key-private Cryptosystem from the Quadratic Residuosity |
SECRYPT |
103 |
30 min |
Tuesday 21 |
Session 2A |
10:00 - 11:30 |
SECRYPT - International Conference on Security and Cryptography |
G05 |
An OWL-based XACML Policy Framework |
SECRYPT |
106 |
30 min |
Tuesday 21 |
Session 3A |
11:45 - 13:15 |
SECRYPT - International Conference on Security and Cryptography |
G05 |
New Results for Partial Key Exposure on RSA with Exponent Blinding |
SECRYPT |
107 |
30 min |
Tuesday 21 |
Session 4A |
16:45 - 17:45 |
SECRYPT - International Conference on Security and Cryptography |
G05 |
On the Instability of Sensor Orientation in Gait Verification on Mobile Phone |
SECRYPT |
114 |
Poster |
Monday 20 |
Poster Session 1 |
15:45 - 16:45 |
SECRYPT - International Conference on Security and Cryptography |
Building K |
Adaptive SVDD-based Learning for False Alarm Reduction in Intrusion Detection |
SECRYPT |
115 |
Poster |
Tuesday 21 |
Poster Session 2 |
15:45 - 16:45 |
SECRYPT - International Conference on Security and Cryptography |
Building K |
Counter based Detection and Mitigation of Signalling Attacks |
SECRYPT |
117 |
Poster |
Monday 20 |
Poster Session 1 |
15:45 - 16:45 |
SECRYPT - International Conference on Security and Cryptography |
Building K |
Examining the Performance for Forensic Detection of Rare Videos Under Time Constraints |
SECRYPT |
118 |
20 min |
Wednesday 22 |
Session 5B |
09:15 - 10:45 |
SECRYPT - International Conference on Security and Cryptography |
G06 |
Phish-IDetector: Message-Id Based Automatic Phishing Detection |
SECRYPT |
120 |
Poster |
Monday 20 |
Poster Session 1 |
15:45 - 16:45 |
SECRYPT - International Conference on Security and Cryptography |
Building K |
Towards Compliant Reference Architectures by Finding Analogies and Overlaps in Compliance Regulations |
SECRYPT |
126 |
Poster |
Wednesday 22 |
Poster Session 3 |
15:30 - 16:30 |
SECRYPT - International Conference on Security and Cryptography |
Building K |
Design and Implementation of an Espionage Network for Cache-based Side Channel Attacks on AES |
SECRYPT |
129 |
Poster |
Monday 20 |
Poster Session 1 |
15:45 - 16:45 |
SECRYPT - International Conference on Security and Cryptography |
Building K |
Practical and Secure Integrated PKE+PEKS with Keyword Privacy |
SECRYPT |
131 |
Poster |
Monday 20 |
Poster Session 1 |
15:45 - 16:45 |
SECRYPT - International Conference on Security and Cryptography |
Building K |
A Risk Awareness Approach for Monitoring the Compliance of RBAC-based Policies |
SIGMAP |
1 |
20 min |
Tuesday 21 |
Session 4A |
16:45 - 17:45 |
Multimedia Signal Processing |
G03 |
Gramophone Noise Reconstruction - A Comparative Study of Interpolation Algorithms for Noise Reduction |
SIGMAP |
3 |
30 min |
Tuesday 21 |
Session 3A |
11:45 - 13:15 |
Multimedia Signal Processing |
G03 |
Compressed Domain ECG Biometric Identification using JPEG2000 |
SIGMAP |
8 |
20 min |
Tuesday 21 |
Session 4A |
16:45 - 17:45 |
Multimedia Signal Processing |
G03 |
Beat Discovery from Dimensionality Reduced Perspective Streams of Electrocardiogram Signal Data |
SIGMAP |
9 |
30 min |
Tuesday 21 |
Session 3A |
11:45 - 13:15 |
Multimedia Signal Processing |
G03 |
An Adaptive Reconstruction Algorithm for Image Block Compressed Sensing under Low Sampling Rate |
SIGMAP |
12 |
20 min |
Monday 20 |
Session 1A |
14:15 - 15:45 |
Multimedia Systems and Applications |
G03 |
Contrast-to-Noise based Metric of Denoising Algorithms for Liver Vein Segmentation |
SIGMAP |
13 |
30 min |
Tuesday 21 |
Session 3A |
11:45 - 13:15 |
Multimedia Signal Processing |
G03 |
Traffic Signs Detection and Tracking using Modified Hough Transform |
SIGMAP |
14 |
Poster |
Tuesday 21 |
Poster Session 2 |
15:45 - 16:45 |
Multimedia Systems and Applications |
Building K |
Computational Correction for Imaging through Single Fresnel Lenses |
SIGMAP |
15 |
Poster |
Tuesday 21 |
Poster Session 2 |
15:45 - 16:45 |
Multimedia Systems and Applications |
Building K |
Objective Assessment of Asthenia using Energy and Low-to-High Spectral Ratio |
SIGMAP |
17 |
20 min |
Monday 20 |
Session 1A |
14:15 - 15:45 |
Multimedia Signal Processing |
G03 |
A Time Delay based Approach to Enhance Lung Diseases Diagnostic |
SIGMAP |
18 |
20 min |
Tuesday 21 |
Session 4A |
16:45 - 17:45 |
Multimedia Systems and Applications |
G03 |
Foveated Model based on the Action Potential of Ganglion Cells to Improve Objective Image Quality Metrics |
SIGMAP |
19 |
Poster |
Tuesday 21 |
Poster Session 2 |
15:45 - 16:45 |
Multimedia Systems and Applications |
Building K |
Real-time Super Resolution Algorithm for Security Cameras |
SIGMAP |
20 |
Poster |
Tuesday 21 |
Poster Session 2 |
15:45 - 16:45 |
Multimedia Systems and Applications |
Building K |
Mosaic-based Privacy-protection with Reversible Watermarking |
SIGMAP |
21 |
Poster |
Tuesday 21 |
Poster Session 2 |
15:45 - 16:45 |
Multimedia Systems and Applications |
Building K |
Similarity-based Image Retrieval for Revealing Forgery of Handwritten Corpora |
WINSYS |
2 |
20 min |
Monday 20 |
Session 1A |
14:15 - 15:45 |
Wireless and Mobile Technologies |
G04 |
A High Performance Class of DSTBC for HAPs |
WINSYS |
3 |
20 min |
Monday 20 |
Session 1A |
14:15 - 15:45 |
Sensor, Mesh and Ad Hoc Communications and Networks |
G04 |
Implementation of Radio Tomographic Imaging based Localisation using a 6LoWPAN Wireless Sensor Network |
WINSYS |
6 |
Poster |
Monday 20 |
Poster Session 1 |
15:45 - 16:45 |
Sensor, Mesh and Ad Hoc Communications and Networks |
Building K |
Localization Method According to Collect Data from an Acoustic Wireless Sensor Network - Example of Homarus Gammarus in Natural Area |
WINSYS |
7 |
20 min |
Monday 20 |
Session 1A |
14:15 - 15:45 |
Sensor, Mesh and Ad Hoc Communications and Networks |
G04 |
A Wireless Sensor Network System - For Monitoring Trees’ Health Related Parameters in a University Campus |
WINSYS |
8 |
20 min |
Monday 20 |
Session 1A |
14:15 - 15:45 |
Mobile Software and Services |
G04 |
An Efficient Agent Lookup Approach in Middlewares for Mobile Agents |
WINSYS |
9 |
20 min |
Monday 20 |
Session 1A |
14:15 - 15:45 |
Sensor, Mesh and Ad Hoc Communications and Networks |
G04 |
Making Software-defined Networks Semantic |
WINSYS |
10 |
Poster |
Monday 20 |
Poster Session 1 |
15:45 - 16:45 |
Sensor, Mesh and Ad Hoc Communications and Networks |
Building K |
Minimising Energy Consumption in Wireless Sensor Network by Enhancement of LEACH Protocol |
WINSYS |
11 |
30 min |
Tuesday 21 |
Session 4A |
16:45 - 17:45 |
Sensor, Mesh and Ad Hoc Communications and Networks |
G04 |
Performance and Comparative Analysis of Design Schemes for Prioritised Data in Multi-hop Wireless Mesh Backbone Networks |
WINSYS |
12 |
Poster |
Monday 20 |
Poster Session 1 |
15:45 - 16:45 |
Wireless and Mobile Technologies |
Building K |
Counting Credibility based Cooperative Spectrum Sensing Algorithm |
WINSYS |
13 |
30 min |
Tuesday 21 |
Session 4A |
16:45 - 17:45 |
Wireless and Mobile Technologies |
G04 |
Probability-based Controlled Flooding in Opportunistic Networks |