08:45 Welcome Desk & Registration (08:45 - 10:45)
10:45
10:45 - 11:15 - Room Salón de Actos Opening Session
11:15
11:15 - 12:30 - Room Salón de Actos Panel
Title:Green Computing and Communication Systems: Goals, Present, Future and Challenges

Panel Chair: Mohammad S. Obaidat

Panelists:
Han-Chieh (Josh) Chao National Ilan University, Taiwan
Vincenzo Piuri, Universita' degli Studi di Milano, Italy
Enrique Cabello, University Rey Juan Carlos, Spain

12:30 Lunch (12:30 - 14:00)
14:00
14:00 - 15:45 - Room AULA A0.12 Parallel Session 1 - DCNET
  • 2: AN IMPROVED GMPLS SURVIVABILITY MECHANISM USING LINK DELAY-CONSTRAINED ALGORITHM Anastasios Bikos, Christos Bouras and Kostas Stamos
  • 20: PERFORMANCE OF OPENDPI TO IDENTIFY TRUNCATED NETWORK TRAFFIC Jawad Khalife, Amjad Hajjar and Jesús Díaz-Verdejo
  • 26: ANOMALY DETECTION USING FIREFLY HARMONIC CLUSTERING ALGORITHM Mario H. A. C. Adaniya, Moises F. Lima, Lucas D. H. Sampaio, Taufik Abrão and Mario Lemes Proença Jr.
  • 31: OPTIMIZING CRYPTOGRAPHIC THRESHOLD SCHEMES FOR THE USE IN WIRELESS SENSOR NETWORKS - Position Paper Manuel Koschuch, Matthias Hudler, Michael Krüger, Peter Lory and Jürgen Wenzl
14:00 - 15:45 - Room AULA A0.10 Parallel Session 1 - ICE-B
  • 23: VALUE-ADDED SERVICES FOR FIBRE TO THE HOME - Market Potential, Time Horizons and User Groups Tom Evens, Lynn De Vlieger, Elke Boudry, Pieter Verdegem, Lieven De Marez, Erik Vanhauwaert, Koen Casier, Jan Van Ooteghem, Sofie Verbrugge and Bart Lannoo
  • 37: SHOULD COMPANIES BID ON THEIR OWN BRAND IN SPONSORED SEARCH? Tobias Blask, Burkhardt Funk and Reinhard Schulte
  • 10: REALIZING THE STRATEGIC PLAN OF A TOP-TIER UNIVERSITY IN TAIWAN - A Multi-criteria Evaluation and Alignment Wei-Chien Chou and Sheng-Tun Li
  • 70: E-BUSINESS INTEROPERABILITY - Challenges and Opportunities George Feuerlicht
14:00 - 15:45 - Room AULA A0.11 Parallel Session 1 - SECRYPT
  • 35: TOWARDS OPTIMAL REVOCATION AND TRACING SCHEMES - The Power of the Ternary Tree Kazuhide Fukushima, Shinsaku Kiyomoto, Yutaka Miyake and Kouichi Sakurai
  • 142: CHAOTIC ITERATIONS FOR STEGANOGRAPHY - Stego-security and Chaos-security Nicolas Friot, Christophe Guyeux and Jacques M. Bahi
  • 66: ON THE SECURITY OF LOCATION DETERMINATION AND VERIFICATION METHODS FOR WIRELESS NETWORKS Günther Lackner
  • 114: BOTNET DETECTION BASED ON DNS RECORDS AND ACTIVE PROBING Iria Prieto, Eduardo Magaña, Daniel Morató and Mikel Izal
14:00 - 15:45 - Room AULA A0.13 Parallel Session 1a - SECRYPT
  • 58: EMBEDDING RATIO ESTIMATION BASED ON WEIGHTED STEGO IMAGE FOR EMBEDDING IN 2LSB Chunfang Yang, Tao Zhao, Hanning Li and Fenlin Liu
  • 108: A FRAMEWORK FOR SECURITY AND WORKLOAD GRADUAL ADAPTATION Antonio Vincenzo Taddeo, Luis Germán García Morales and Alberto Ferrante
  • 47: ANALYSIS OF BOTNETS THROUGH LIFE-CYCLE R. A. Rodríguez-Gómez, G. Maciá-Fernández and P. García-Teodoro
  • 106: UNOBSERVABLE INTRUSION DETECTION BASED ON CALL TRACES IN PARAVIRTUALIZED SYSTEMS Carlo Maiero and Marino Miculan
15:45
15:45 - 16:15 - Foyer Posters Session 1
DCNET
  • 6: NETWORK PLANNING OF A VOIP-CABLE PBX - The Use of Data Profiling Techniques for an Efficient Network Planning Igor Ruiz-Agundez, Yoseba K. Penya and Pablo G. Bringas
  • 11: SOFTWARE MODULES AND APPLICATION LAYER’S SECURITY STRUCTURE OF RSMAD Slawomir Gajewski, Malgorzata Gajewska, Marcin Sokol and Michal Brewka
  • 25: TECHNICAL VIABILITY STUDY FOR BEHAVIORAL MONITORING OF WILDLIFE ANIMALS IN DOÑANA - An 802.15.4 Coverage Study in a Natural Park M. Dominguez-Morales, A. Jimenez-Fernández, D. Cascado-Caballero, A. Linares-Barranco, R. Paz, G. Jiménez-Moreno and R. Soriguer
ICE-B
  • 3: A FRAMEWORK FOR CLASSIFYING RISKS IN ERP MAINTENANCE PROJECTS Cristina Lopez and Jose L. Salmeron
  • 33: INFORMATION SYSTEMS AND E-BUSINESS - Risc and Value of Applications to Organizations Jorge Pereira, José Martins, Vítor Santos and Ramiro Gonçalves
  • 40: CUSTOMER FEEDBACK AND INTERNET - Means used by the Biggest Portuguese Companies Ramiro Gonçalves, Frederico Branco, José Martins, Vítor Santos and Jorge Pereira
  • 51: ABOUT CREATIVITY IN COLLABORATIVE SYSTEMS - Why it Matters and How it can be Supported Marius Ioan Podean, Dan Benta and Lucia Rusu
  • 63: A PROPOSAL OF “IDENTITY COMMONS” FOR SERVICE CREATION USING COMMUNICATION LOG - Position Paper Memiko Otsuki and Noboru Sonehara
SECRYPT
  • 59: PRIVATE SEARCHING FOR SENSITIVE FILE SIGNATURES John Solis
  • 79: DIFFERENTIAL FAULT ANALYSIS OF HUMMINGBIRD Yaser Esmaeili Salehani and Amr Youssef
  • 83: A NEW TREE-STRUCTURE-SPECIFIED MULTISIGNATURE SCHEME FOR A DOCUMENT CIRCULATION SYSTEM Masaki Inamura, Keiichi Iwamura, Ryu Watanabe, Makoto Nishikawa and Toshiaki Tanaka
  • 87: SYNEMA: VISUAL MONITORING OF NETWORK AND SYSTEM SECURITY SENSORS Aline Bousquet, Patrice Clemente and Jean-François Lalande
  • 92: PRIVACY--ENHANCING CRYPTOGRAPHY--BASED MATERIALS Almudena Alcaide, Esther Palomar, Israel Barroso-Perez and Ali E. Abdallah
  • 110: TOWARDS A CALCULUS FOR NON REPUDIATION PROTOCOLS Abdesselam Redouane
  • 117: HOW TO TRANSMIT MESSAGES VIA WSN IN A HOSTILE ENVIRONMENT Marek Klonowski, Michał Koza and Mirisosław Kutyłowski
  • 124: BYZANTINE DECISIONS FOR INFERRING TRUST IN SENSOR NETWORKS Björn Stelte
  • 126: DISTRIBUTED THRESHOLD CRYPTOGRAPHY CERTIFICATION WITH NO TRUSTED DEALER Apostolos P. Fournaris
  • 148: PRACTICAL ANONYMOUS AUTHENTICATION - Designing Anonymous Authentication for Everyday Use Jan Hajny, Lukas Malina and Vaclav Zeman
  • 155: FAST SELECTIVE ENCRYPTION SCHEME FOR MP3 FILES - Using GRAIN Stream Cipher Praloy Kr. Biswas, Dipanwita Roy Chowdhury and K. S. Dasgupta
SIGMAP
  • 27: TWO – DIMENSIONAL CODES ON MOBILE DEVICES AND THE DEVELOPMENT OF THE PLATFORM José Manuel Fornés Rumbao and Francisco Rodríguez Rubio
  • 41: EXPLORING THE DIFFERENCES IN SURFACE ELECTROMYOGRAPHIC SIGNAL BETWEEN MYOFASCIAL-PAIN AND NORMAL GROUPS - Feature Extraction through Wavelet Denoising and Decomposition Ching-Fen Jiang, Nan-Ying Yu and Yu Ching Lin
  • 61: AUTOMATIC SOUND RESTORATION SYSTEM - Concepts and Design Andrzej Czyzewski, Bozena Kostek and Adam Kupryjanow
  • 65: A SPATIAL IMMERSIVE OFFICE ENVIRONMENT FOR COMPUTER-SUPPORTED COLLABORATIVE WORK - Moving Towards the Office of the Future Maarten Dumont, Sammy Rogmans, Steven Maesen, Karel Frederix, Johannes Taelman and Philippe Bekaert
  • 66: FOUR-PHASE RE-SPEAKER TRAINING SYSTEM Aleš Pražák, Zdeněk Loose, Josef Psutka, Vlasta Radová and Luděk Müller
WINSYS
  • 39: AN INTELLIGENT MAINTENANCE BASED ON MACHINE LEARNING APPROACH FOR WIRELESS AND MOBILE SYSTEMS Amine Chohra, Felicita Di Giandomenico, Stefano Porcarelli and Andrea Bondavalli
16:00 Coffee-Break (16:00 - 16:15)
16:15
16:15 - 17:45 - Room AULA A0.11 Parallel Session 2 - SECRYPT
  • 74: A TINY RSA COPROCESSOR BASED ON OPTIMIZED SYSTOLIC MONTGOMERY ARCHITECTURE Zongbin Liu, Luning Xia, Jiwu Jing and Peng Liu
  • 95: A FRESH LOOK INTO THE BIOMETRIC AUTHENTICATION - Perspective from Shannon's Secrecy System and a Special Wiretap Channel Yanling Chen and A. J. Han Vinck
16:15 - 17:45 - Room AULA A0.10 Parallel Session 2 - SIGMAP
  • 16: THE WINDSURF LIBRARY FOR THE EFFICIENT RETRIEVAL OF MULTIMEDIA HIERARCHICAL DATA Ilaria Bartolini, Marco Patella and Guido Stromei
  • 29: LATENT TOPIC VISUAL LANGUAGE MODEL FOR OBJECT CATEGORIZATION Lei Wu, Nenghai Yu, Jing Liu and Mingjing Li
  • 59: A GENETIC APPROACH FOR IMPROVING THE SIDE INFORMATION IN WYNER-ZIV VIDEO CODING WITH LONG DURATION GOP Charles Yaacoub, Joumana Farah and Chadi Jabroun
16:15 - 17:45 - Room AULA A0.12 Parallel Session 2a - SIGMAP
  • 12: CONTEXT BASED WATERMARKING OF SECURE JPEG-LS IMAGES A. V. Subramanyam and Sabu Emmanuel
  • 30: EFFECTIVE INTERFERENCE REDUCTION METHOD FOR SPREAD SPECTRUM FINGERPRINTING Minoru Kuribayashi
  • 60: OPTIMAL COMBINATION OF LOW-LEVEL FEATURES FOR SURVEILLANCE OBJECT RETRIEVAL Virginia Fernandez Arguedas, Krishna Chandramouli, Qianni Zhang and Ebroul Izquierdo
  • 68: WHAT ARE GOOD CGS/MGS CONFIGURATIONS FOR H.264 QUALITY SCALABLE CODING? Shih-Hsuan Yang and Wei-Lune Tang
16:15 - 17:45 - Room AULA A0.13 Parallel Session 2 - WINSYS
  • 27: DISTRIBUTED JOINT POWER AND RATE ADAPTATION IN AD HOC NETWORKS Fredrick Mzee Awuor, Karim Djouani and Guillaume Noel
  • 7: DEVELOPMENT TOOLS FOR PERVASIVE COMPUTING IN EMBEDDED SYSTEMS (PECES) MIDDLEWARE Ran Zhao, Kirusnapillai Selvarajah and Neil Speirs
  • 16: QOS-AWARE MULTIPATH ROUTING PROTOCOL FOR DELAY SENSITIVE APPLICATIONS IN MANETS - A Cross-layer Approach Mu’ath Obaidat, M. A. Ali, Ihsan Shahwan, M. S. Obaidat and Suhaib Obeidat
17:45
17:45 - 18:45 - Room Salón de Actos WIMAX? - A Case Study on Minimizing Construction Cost for IEEE 802.16j Multi-hop Relay Networks Keynote Speaker: Han-Chieh Chao
18:45 Tapas Cocktail (18:45 - 19:30)
19:30 Buses to Reales Alcazares and Guided Visit (19:30 - 22:00)