08:30 Welcome Desk & Registration (08:30 - 09:00)
09:00
09:00 - 10:30 - Room AULA A0.12 Parallel Session 3 - DCNET
  • 14: MULTIPLE VECTOR CLASSIFICATION FOR P2P TRAFFIC IDENTIFICATION F. J. Salcedo-Campos, J. E. Díaz-Verdejo and P. García-Teodoro
  • 18: COMPUTATIONAL INTELLIGENCE APPLIED TO WILDFIRE PREDICTION USING WIRELESS SENSOR NETWORKS V. G. Gasull, D. F. Larios, J. Barbancho, C. León and M. S. Obaidat
  • 27: MODEL-BASED STOCHASTIC SIMULATION OF SUPER PEER PROMOTION IN P2P VOIP USING GRAPH TRANSFORMATION Ajab Khan and Reiko Heckel
09:00 - 10:30 - Room AULA A0.11 Parallel Session 3 - SECRYPT
  • 37: A METHOD FOR FLEXIBLE REDUCTION OVER BINARY FIELDS USING A FIELD MULTIPLIER Saptarsi Das, Keshavan Varadarajan, Ganesh Garga, Rajdeep Mondal, Ranjani Narayan and S. K. Nandy
  • 49: ON THE (NON-)REUSABILITY OF FUZZY SKETCHES AND EXTRACTORS AND SECURITY IN THE COMPUTATIONAL SETTING Marina Blanton and Mehrdad Aliasgari
  • 56: DRIVER AUTHENTICATION USING BRAIN WAVES WHILE ROUTE TRACING AS A MENTAL TASK Isao Nakanishi, Sadao Baba and Masahiro Inoue
09:00 - 10:30 - Room AULA A0.10 Parallel Session 3a - SECRYPT
  • 30: ANOMALY-BASED SPAM FILTERING Igor Santos, Carlos Laorden, Xabier Ugarte-Pedrero, Borja Sanz and Pablo G. Bringas
  • 41: RELATED-KEY ATTACK AGAINST TRIPLE ENCRYPTION BASED ON FIXED POINTS Serge Vaudenay
  • 91: ON THE STRENGTH OF EGGLUE AND OTHER LOGIC CAPTCHAs Carlos Javier Hernández-Castro, Arturo Ribagorda and Julio Cesar Hernandez Castro
09:00 - 10:30 - Room AULA A0.13 Parallel Session 3 - WINSYS
  • 8: MAC SCHEDULING IN LARGE-SCALE UNDERWATER ACOUSTIC NETWORKS Wouter van Kleunen, Nirvana Meratnia and Paul J. M. Havinga
  • 12: DEPLOYMENT OF A WIRELESS SENSOR NETWORK IN A VINEYARD José A. Gay-Fernández and Iñigo Cuiñas
  • 26: FINGERPRINT INDOOR POSITION SYSTEM BASED ON OPENMAC A. Verónica Medina, José A. Gómez, Octavio Rivera, Enrique Dorronzoro and Manuel Merino
  • 29: PROTECTION AGAINST BYZANTINE ATTACKS ON WIRELESS SENSOR NETWORKS Björn Stelte
10:30 Coffee-Break (10:30 - 10:45)
10:45
10:45 - 11:45 - Room Salón de Actos PARADIGMS OF DISTRIBUTED SOFTWARE SYSTEMS - Services, Processes, and Self-organization Keynote Speaker: Winfried Lamersdorf
11:45
11:45 - 12:45 - Room AULA A0.12 Parallel Session 4 - DCNET
  • 21: LOCALIZATION METHOD FOR LOW POWER CONSUMPTION SYSTEMS D. F. Larios, J. Barbancho, F. J. Molina and C. León
  • 22: UTILIZING VIDEO ENCODING FOR POWER MANAGEMENT OVER WIRELESS NETWORKS C. Bouras, K. Stamos, S. Stroumpis and G. Zaoudis
11:45 - 12:45 - Room AULA A0.10 Parallel Session 4 - ICE-B
  • 9: TECHNOLOGY FOR BUSINESS - Supporting Industries as a Main Driving Force for E-commerce Adoption in Saudi Arabia Hani Brdesee, Brian Corbitt and Siddhi Pittayachawan
  • 26: TOWARD AUTOMATIC GENERATION OF SPARQL RESULT SET VISUALIZATIONS - A Use Case in Service Monitoring Marcello Leida, Du Xiaofeng, Paul Taylor and Basim Majeed
11:45 - 12:45 - Room AULA A0.11 Parallel Session 4 - SECRYPT
  • 33: SMARTPHONE SECURITY EVALUATION - The Malware Attack Case Alexios Mylonas, Stelios Dritsas, Bill Tsoumas and Dimitris Gritzalis
  • 73: A SMART CARD BASED GENERIC CONSTRUCTION FOR ANONYMOUS AUTHENTICATION IN MOBILE NETWORKS Jing Xu, Wen-Tao Zhu and Deng-Guo Feng
11:45 - 12:45 - Room AULA A0.13 Parallel Session 4 - WINSYS
  • 11: MODULATION-MODE ASSIGNMENT IN SVD-ASSISTED MULTIUSER MIMO-OFDM SYSTEMS Sebastian Aust, Andreas Ahrens and César Benavente-Peces
  • 23: EXPERIMENTAL VALIDATION FOR TR-UWB SYSTEMS - By Time Delayed Sampling & Correlation (TDSC) Jorge A. Pardiñas-Mir, Muriel Muller, Roger Lamberti and Claude Gimenes
12:45 Lunch (12:45 - 14:00)
14:00
14:00 - 16:00 - Room AULA A0.10 Parallel Session 5 - ICE-B
  • 12: WHAT IS THE RIGHT SERVICE? A MULTI-CRITERIA DECISION MODEL BASED ON ‘STEP’ Tobias Mettler and Markus Eurich
  • 16: SUPPORTING SAFETY THROUGH SOCIAL TERRITORIAL NETWORKS Martin Steinhauser, Andreas C. Sonnenbichler and Andreas Geyer-Schulz
  • 43: QUALITY OF SERVICE AGGREGATION IN E-BUSINESS APPLICATIONS Nabil Fakhfakh, Frédéric Pourraz and Hervé Verjus
  • 48: HANDWRITING RECOGNITION ON MOBILE DEVICES - State of the Art Technology, Usability and Business Analysis Andreas Holzinger, Lamija Basic, Bernhard Peischl and Matjaz Debevc
14:00 - 16:00 - Room AULA A0.11 Parallel Session 5 - SECRYPT
  • 32: THREE-PARTY PASSWORD-AUTHENTICATED KEY EXCHANGE WITHOUT RANDOM ORACLES Xun Yi, Raylin Tso and Eiji Okamoto
  • 77: PRIVACY-PRESERVING SMART METERING WITHOUT A TRUSTED-THIRD-PARTY Tobias Jeske
  • 88: INFORMATION-LEAKAGE IN HYBRID RANDOMIZED PROTOCOLS Stefan Rass and Peter Schartner
  • 109: HIGHER LAYER AUTHENTICATION FOR BROADCAST IN CONTROLLER AREA NETWORKS Bogdan Groza and Pal-Stefan Murvay
14:00 - 16:00 - Room AULA A0.13 Parallel Session 5a - SECRYPT
  • 43: COLLECTIVE CLASSIFICATION FOR UNKNOWN MALWARE DETECTION Igor Santos, Carlos Laorden and Pablo G. Bringas
  • 97: IS IP MULTIMEDIA SUBSYSTEM AFFECTED BY ‘MALFORMED MESSAGE’ ATTACKS? - An Evaluation of OpenIMS Nikos Vrakas, Dimitris Geneiatakis and Costas Lambrinoudakis
  • 104: A FORWARD PRIVATE PROTOCOL BASED ON PRNG AND LPN FOR LOW-COST RFID Xiaolin Cao and Maire O’Neill
  • 116: E-COMMERCE AND FAIR EXCHANGE - The Problem of Item Validation Fabio Piva and Ricardo Dahab
14:00 - 16:00 - Room AULA A0.12 Parallel Session 5 - SIGMAP
  • 20: A NON-UNIFORM REAL-TIME SPEECH TIME-SCALE STRETCHING METHOD Adam Kupryjanow and Andrzej Czyzewski
  • 21: ESTIMATION-DECODING ON LDPC-BASED 2D-BARCODES W. Proß, M. Otesteanu and F. Quint
  • 23: HAND IMAGE SEGMENTATION BY MEANS OF GAUSSIAN MULTISCALE AGGREGATION FOR BIOMETRIC APPLICATIONS Alberto de Santos Sierra, Carmen Sánchez Ávila, Javier Guerra Casanova and Gonzalo Bailador del Pozo
  • 33: SEGMENTATION OF TOUCHING LANNA CHARACTERS Sakkayaphop Pravesjit and Arit Thammano
16:00
16:00 - 16:30 - Foyer Posters Session 2
DCNET
  • 5: RETHINKING ISP ARCHITECTURES THROUGH VIRTUALIZATION Alejandro Cordero and David Fernández
  • 24: APPLICATION-TRANSPARENT INTEGRATION OF SIMULATION TOOLS IN A WSN DEVELOPMENT ENVIRONMENT Juan Luis Font, Pablo Iñigo, Manuel Domínguez, José Luis Sevillano and Daniel Cascado
  • 29: ARCHITECTURE FOR ENVIRONMENTAL DATA ACCESS IN WSN J. M. Mora-Merchan, F. J. Molina, D. F. Larios, G. Rodriguez, J. Barbancho and C. León
ICE-B
  • 14: MODELING FACTORS THAT INFLUENCE ONLINE TRAVEL BOOKING Michael Conyette
  • 25: BUSINESS MODEL APROACH FOR QOE OPTIMIZED SERVICE DELIVERY José I. Aznar, Eduardo Virute, Julian Fernandez-Navajas, Jose Ruiz-Mas, Jose Saldana and L. Casadesus
  • 44: EVALUATION OF NEW DISTRIBUTION CHANNELS FOR IP INTERACTIVE QOE BASED SERVICES Jose I. Aznar, Jose Ruiz-Mas, L. Casadesus, Jose Saldana, Julian Fernandez-Navajas and Eduardo Virute
  • 64: STUDY ON SUCCESS FACTORS OF TOURISM WEBSITES Her-Sen Doong, Huichih Wang and You-Yu Chen
  • 65: A MOTIVATION FOR A MODERN WEB SERVICE DESCRIPTION Konstanty Haniewicz
  • 69: SEMANTIC-BASED DELIVERY OF E-SERVICES APPLYING THE SAAS APPROACH - Poster Paper Agata Filipowska, Monika Kaczmarek and Tomasz Kaczmarek
OPTICS
  • 12: OPTICAL DOMAIN MULTIUSER INTERFERENCE ESTIMATION FOR SPECTRAL PHASE ENCODING OPTICAL FIBRE CDMA SYSTEMS Arash Yazdani, Morteza Noshad, Hojat Jaliloghli, Amirhossein Jaliloghli and Mohammad Noshad
SECRYPT
  • 60: THE IMAGE PROTECTOR - A Flexible Security Rule Specification Toolkit Bechara Al Bouna, Richard Chbeir and Alban Gabillon
  • 75: A NEW STEGANOGRAPHIC SCHEME BASED ON FIRST ORDER REED MULLER CODES - A New Steganographic Scheme Houda Jouhari and El Mamoun Souidi
  • 85: OPBUS: RISK-AWARE FRAMEWORK FOR THE CONFORMANCE OF SECURITY-QUALITY REQUIREMENTS IN BUSINESS PROCESSES A. J. Varela-Vaca, Rafael M. Gasca and Sergio Pozo
  • 118: APOLLON: TOWARDS A SEMANTICALLY EXTENSIBLE POLICY FRAMEWORK Julian Schütte
  • 153: TOWARDS AN INFORMATION CONTROL POLICY MODEL - Achieving More Transparency in Internet Filtering Approaches Andreas Kasten
  • 157: NO SECURITY BY OBSCURITY – WHY TWO FACTOR AUTHENTICATION SHOULD BE BASED ON AN OPEN DESIGN Jinying Yu and Philipp Brune
  • 158: ARTIFICIAL IMMUNITY-BASED CORRELATION SYSTEM Guillermo Suarez-Tangil, Esther Palomar, Sergio Pastrana and Arturo Ribagorda
  • 160: INTERNATIONALLY STANDARDIZED EFFICIENT CRYPTOGRAPHIC HASH FUNCTION Danilo Gligoroski, Svein Johan Knapskog, Jørn Amundsen and Rune Erlend Jensen
  • 162: A PUBLIC RANDOMNESS SERVICE Michael J. Fischer, Michaela Iorga and René Peralta
SIGMAP
  • 10: COLOR FACE RECOGNITION - A Multilinear-PCA Approach Combined with Hidden Markov Models Dimitrios S. Alexiadis and Dimitrios Glaroudis
  • 11: REAL-TIME FACE RECOGNITION WITH GPUs - A DCT-based Face Recognition System using Graphics Processing Unit Dimitrios S. Alexiadis, Anastasia Papastergiou and Athanasios Hatzigaidas
  • 25: STEREO VISION MATCHING OVER SINGLE-CHANNEL COLOR-BASED SEGMENTATION Pablo Revuelta Sanz, Belén Ruiz Mezcua, José M. Sánchez Pena and Jean-Phillippe Thiran
  • 51: VIDEO SURVEILLANCE AT AN INDUSTRIAL ENVIRONMENT USING AN ADDRESS EVENT VISION SENSOR - Comparative between Two Different Video Sensor based on a Bioinspired Retina Fernando Perez-Peña, Arturo Morgado-Estevez, Rafael J. Montero-Gonzalez, Alejandro Linares-Barranco and Gabriel Jimenez-Moreno
WINSYS
  • 18: MULTIPLE TARGETS DETECTION AND LOCALIZATION BASED ON BLIND ESTIMATION IN WIRELESS SENSOR NETWORK Peng Zhang, Xiaoyong Deng, Huimin Wen and Jifu Guo
  • 22: A LOAD-BALANCED TOPOLOGY MAINTENANCE WITH PARTIAL RECONSTRUCTION OF CONNECTED DOMINATING SETS Youn-Sik Hong, Hwa-Seok Lim and Chol-Ho Lee
  • 42: EFFICIENT NETWORK DESIGN FOR ENVIRONMENTAL MONITORING APPLICATIONS - A Practical Approach Farooq Sultan and Salam A. Zummo
16:15 Coffee-Break (16:15 - 16:30)
16:30
16:30 - 18:00 - Room AULA A0.10 Parallel Session 6 - ICE-B
  • 71: THE DEVELOPMENT OF A WEB MAPPING SYSTEM AND ITS APPLICATION Balqies Sadoun, Omar Al-Bayari and Samih Al-Rawashdeh
  • 20: COLLECTIVETHOUGHT - Supporting Virtual Teams with Semantic Networks Kathy Ning Shen and Mohamed Khalifa
16:30 - 18:00 - Room AULA A0.13 Parallel Session 6 - OPTICS
  • 13: PHOTONIC ANALOGUE-TO-DIGITAL CONVERTER BASED ON WAVELENGTH DIVISION MULTIPLEXING TECHNIQUE Tiago Alves and Adolfo Cartaxo
  • 1: A STABLE TUNABLE AND SWITCHABLE DUAL-WAVELENGTH SINGLE-LONGITUDINAL-MODE ERBIUM-DOPED FIBER LINEAR-CAVITY LASER Xiaoying He, D. N. Wang and Changrui Liao
  • 2: OPTICAL MIMO MULTIMODE FIBER LINKS - Channel Measurements and System Performance Analysis Andreas Ahrens, Jens Pankow, Sebastian Aust and Steffen Lochmann
  • 9: OPTIMIZATION OF OPTICAL SSB-OFDM SYSTEM WITH DIRECT DETECTION FOR APPLICATION IN METROPOLITAN/REGIONAL NETWORKS Bruno M. M. Meireles and João L. Rebola
16:30 - 18:00 - Room AULA A0.11 Parallel Session 6 - SECRYPT
  • 86: BYTE SLICING GRØSTL - Optimized Intel AES-NI and 8-bit Implementations of the SHA-3 Finalist Grøstl Kazumaro Aoki, Günther Roland, Yu Sasaki and Martin Schläffer
  • 90: ATTACK INTERFERENCE IN NON-COLLABORATIVE SCENARIOS FOR SECURITY PROTOCOL ANALYSIS M.-Camilla Fiazza, Michele Peroli and Luca Viganò
  • 112: A SNORT-BASED MOBILE AGENT FOR A DISTRIBUTED INTRUSION DETECTION SYSTEM Imen Brahmi, Sadok Ben Yahia and Pascal Poncelet
16:30 - 18:00 - Room AULA A0.12 Parallel Session 6 - SIGMAP
  • 64: WIRELESS IN-VEHICLE COMPLAINT DRIVER ENVIRONMENT RECORDER Oscar S. Siordia, Isaac Martín de Diego, Cristina Conde and Enrique Cabello
  • 42: IMAGE DENOISING BASED ON LAPLACE DISTRIBUTION WITH LOCAL PARAMETERS IN LAPPED TRANSFORM DOMAIN Vijay Kumar Nath and Anil Mahanta
  • 43: IMPROVED INTER MODE DECISION FOR H.264/AVC USING WEIGHTED PREDICTION Amrita Ganguly and Anil Mahanta
  • 45: IMAGE MATCHING ALGORITHMS IN STEREO VISION USING ADDRESS-EVENT-REPRESENTATION - A Theoretical Study and Evaluation of the Different Algorithms M. Dominguez-Morales, E. Cerezuela-Escudero, A. Jimenez-Fernandez, R. Paz-Vicente, J. L. Font-Calvo, P. Iñigo-Blasco, A. Linares-Barranco and G. Jimenez-Moreno
18:30 Social Event (18:30 - 23:30)