09:00
09:00 - 10:15 - Building G Welcome Desk & Registration
10:15
10:15 - 10:30 - Plenary G Opening Session
10:30
10:30 - 12:00 - Plenary G Panel

Title:
"Communications in Smart Cities"

Chairs and Moderators:
Mohammad S. Obaidat, Monmouth University, NJ, United States
Pascal Lorenz, University of Haute Alsace, France

Panelists:
Helen Karatza, Aristotle University, Greece
Andrew Moore, University of Cambridge, United Kingdom
Anthony C. Boucouvalas,, University of Peloponnese, Greece
12:00
12:00 - 12:15 - Building K Coffee-Break
12:15
12:15 - 13:15 - Plenary G Keynote Lecture Integrating Retail and e-Commerce using Web Analytics and Intelligent Sensors Anthony C. Boucouvalas, University of Peloponnese, Greece
13:15
13:15 - 14:15 - Building RU Lunch
14:15
14:15 - 15:45 - Room G01 Parallel Session 1A - DCNET
  • 1: Towards a Real Application-aware Network Leo Caldarola, Amine Choukir, Davide Cuda, Marco Dondero, Domenico Ficara, Roberto Muccifora, Libor Polčák and Antonio Trifilo
  • 2: Speaking in Tongues - Practical Evaluation of TLS Cipher Suites Compatibility Manuel Koschuch, Taro Fruhwirth, Alexander Glaser, Silvie Schmidt and Matthias Hudler
14:15 - 15:45 - Room G02 Parallel Session 1A - ICE-B
  • 5: Social Networking Sites: An Exploration of the Effect of National Cultural Dimensions on Country Adoption Rates Rodney L. Stump and Wen Gong
  • 7: A Business Model Approach to Local mGovernment Applications - Mapping the Brussels Region’s Mobile App Initiatives Nils Walravens
  • 31: An Investigation of Customers’ Loyalty to Social Commerce Websites Hilal Alhulail, Martin Dick and Ahmad Abareshi
  • 39: Why and How People Use Location Sharing Services on Social Networking Platforms in China Shang Gao and Xuemei Zhang
14:15 - 15:45 - Room G03 Parallel Session 1A - SIGMAP
  • 12: Contrast-to-Noise based Metric of Denoising Algorithms for Liver Vein Segmentation A. Nikonorov, A. Kolsanov, M. Petrov, Y. Yuzifovich, E. Prilepin and K. Bychenkov
  • 17: A Time Delay based Approach to Enhance Lung Diseases Diagnostic Fatma Ayari, Ali Alouani and Mekki Ksouri
14:15 - 15:45 - Room G04 Parallel Session 1A - WINSYS
  • 2: A High Performance Class of DSTBC for HAPs Benigno Rodríguez and Juan Pablo González
  • 3: Implementation of Radio Tomographic Imaging based Localisation using a 6LoWPAN Wireless Sensor Network Vanessa Smallbon, Timothy Potie, Matthew D’Souza , Adam Postula and Montserrat Ros
  • 7: A Wireless Sensor Network System - For Monitoring Trees’ Health Related Parameters in a University Campus Luis Eduardo Pérez, Jorge Arturo Pardiñas-Mir, Omar Guerra, Javier de la Mora, Mauricio Pimienta, Nestor Hernández and Manuel de Atocha Lopez
  • 8: An Efficient Agent Lookup Approach in Middlewares for Mobile Agents Hiroaki Fukuda
  • 9: Making Software-defined Networks Semantic T. Cooklev
14:15 - 15:45 - Room G05 Parallel Session 1A - SECRYPT
  • 43: Formal Analysis of E-Cash Protocols Jannik Dreier, Ali Kassem and Pascal Lafourcade
  • 50: Algorithmic Information Theory for Obfuscation Security Rabih Mohsen and Alexandre Miranda Pinto
  • 14: Policy Anomaly Detection for Distributed IPv6 Firewalls Claas Lorenz and Bettina Schnor
  • 73: Cloud Resources Placement based on Functional and Non-functional Requirements Asma Guesmi, Patrice Clemente, Frederic Loulergue and Pascal Berthomé
14:15 - 15:45 - Room G06 Parallel Session 1B - SECRYPT
  • 35: Gateway Threshold Password-based Authenticated Key Exchange Secure against Undetectable On-line Dictionary Attack Yukou Kobayashi, Naoto Yanai, Kazuki Yoneyama, Takashi Nishide, Goichiro Hanaoka, Kwangjo Kim and Eiji Okamoto
  • 42: Evaluating the Comprehensive Complexity of Authorization-based Access Control Policies using Quantitative Metrics Malek Belhaouane, Joaquin Garcia-Alfaro and Hervé Debar
15:45
15:45 - 16:30 - Building K Coffee-Break
15:45
15:45 - 16:45 - Building K Posters Session 1
DCNET
  • 5: Service Forwarding Label for Network Function Virtualization and Application-centric Traffic Steering Changcheng Huang and Jiafeng Zhu
  • 7: Indoor Localization of the Points of Interest using RO-SLAM Yamnia Rodríguez Esteves, Julio Barbancho Concejero and Antidio Viguria Jiménez
  • 8: Routing in Cognitive Wireless Mesh Networks - An Intelligent Framework Nadhir Ben Halima and Mohammad Ayoub Khan
ICE-B
  • 9: Surveillance Camera System Balancing Privacy Protection and Effective Surveillance Image Use Kent Kobayashi, Masaki Inamura, Kitahiro Kaneda, Keiichi Iwamura and Isao Echizen
  • 11: A Cloud Gaming System Design Insights Serban Ungureanu, Andrei Panu and Lenuta Alboaie
  • 12: Combining Physiological with Cognitive Measures of Online Users to Evaluate a Physicians’ Review Website Andreas Gregoriades and Olga Vozniuk
  • 26: Stakeholder Oriented Enterprise Architecture Modelling Malgorzata Pankowska
  • 40: GSM Model Construction from Enterprise Models Imen Jellali, Mounira Ben Abdallah, Nahla Zaaboub Haddar and Hanêne Ben-Abdallah
SECRYPT
  • 8: A Framework for Incident Response in Industrial Control Systems Roman Schlegel, Ana Hristova and Sebastian Obermeier
  • 10: A Public-Key Cryptography Tool for Personal Use - A Real-world Implementation of ECC for Secure File Exchange Luigi Maria Bottasso
  • 47: Design and Performance Aspects of Information Security Prediction Markets for Risk Management Pankaj Pandey and Einar Arthur Snekkenes
  • 53: Battling Against DDoS in SIP - Is Machine Learning-based Detection an Effective Weapon? Z. Tsiatsikas, A. Fakis, D. Papamartzivanos, D. Geneiatakis, G. Kambourakis and C. Kolias
  • 81: Experimental Extraction of Shared Secret Key from Fluctuations of Multipath Channel at Moving a Mobile Transceiver in an Urban Environment Alexey D. Smolyakov, Amir I. Sulimov, Arkadiy V. Karpov and Aidar V. Galiev
  • 99: Performance Evaluation of Meteor Key Distribution Amir I. Sulimov and Arkadiy V. Karpov
  • 114: Adaptive SVDD-based Learning for False Alarm Reduction in Intrusion Detection Tayeb Kenaza, Abdenour Labed, Yacine Boulahia and Mohcen Sebehi
  • 117: Examining the Performance for Forensic Detection of Rare Videos Under Time Constraints Johan Garcia
  • 120: Towards Compliant Reference Architectures by Finding Analogies and Overlaps in Compliance Regulations Eduardo B. Fernandez and Dereje Yimam
  • 129: Practical and Secure Integrated PKE+PEKS with Keyword Privacy Francesco Buccafurri, Gianluca Lax, Rajeev Anand Sahu and Vishal Saraswat
  • 131: A Risk Awareness Approach for Monitoring the Compliance of RBAC-based Policies Faouzi Jaidi and Faten Labbene Ayachi
WINSYS
  • 6: Localization Method According to Collect Data from an Acoustic Wireless Sensor Network - Example of Homarus Gammarus in Natural Area Jean-Sébastien Gualtieri, Bastien Poggi , Paul-Antoine Bisgambiglia, Thierry Antoine-Santoni, Dominique Federici, Emmanuelle de Gentili and Antoine Aïello
  • 10: Minimising Energy Consumption in Wireless Sensor Network by Enhancement of LEACH Protocol Ahmadu Girgiri, Murtala Aminu Baba, Lawan Gana Ali and Mohammed Adamu
  • 12: Counting Credibility based Cooperative Spectrum Sensing Algorithm Lianlian Song, Li Wang and Shibing Zhang
16:45
16:45 - 17:45 - Plenary G Keynote Lecture Future SDN - Reconfiguration Heartland, Challenge and Revolution Andrew Moore, University of Cambridge, United Kingdom
17:45
17:45 - 18:15 - Building K Welcome Drink