default search action
ICT-EurAsia 2014: Bali, Indonesia
- Linawati, Made Sudiana Mahendra, Erich J. Neuhold, A Min Tjoa, Ilsun You:
Information and Communication Technology - Second IFIP TC5/8 International Conference, ICT-EurAsia 2014, Bali, Indonesia, April 14-17, 2014. Proceedings. Lecture Notes in Computer Science 8407, Springer 2014, ISBN 978-3-642-55031-7
Information & Communication Technology-EurAsia Conference 2014, ICT-EurAsia 2014
- Hajar Mousannif, Ismail Khalil:
The Human Face of Mobile. 1-20 - Florian Miksch, Philipp Pichler, Kurt Junshean Espinosa, Niki Popper:
Agent-Based Methods for Simulation of Epidemics with a Low Number of Infected Persons. 21-28 - Maria Isabel Beltran, Guido David:
Cellular Automata Model of Urbanization in Camiguin, Philippines. 29-35 - Florian Miksch, Christoph Urach, Patrick Einzinger, Günther Zauner:
A Flexible Agent-Based Framework for Infectious Disease Modeling. 36-45 - Stefan Henningsson, Jonas Hedman:
Transformation of Digital Ecosystems: The Case of Digital Payments. 46-55 - Charnsak Srisawatsakul, Gerald Quirchmayr, Borworn Papasratorn:
Do Personality Traits Work as Moderator on the Intention to Purchase Mobile Applications Work? - A Pilot Study. 56-65 - R. V. Hari Ginardi, Ahmad Saikhu, Riyanarto Sarno, Dwi Sunaryono, Ali Sofyan Kholimi, Ratna Nur Tiara Shanty:
Intelligent Method for Dipstick Urinalysis Using Smartphone Camera. 66-77 - Aida Maleki, Kristina Kiesel, Milena Vuckovic, Ardeshir Mahdavi:
Empirical and Computational Issues of Microclimate Simulation. 78-85 - Stefan Glawischnig, Harald Hofstätter, Ardeshir Mahdavi:
A Distributed Generic Data Structure for Urban Level Building Data Monitoring. 86-95 - Neda Ghiassi, Stefan Glawischnig, Ulrich Pont, Ardeshir Mahdavi:
Toward a Data-Driven Performance-Guided Urban Decision-Support Environment. 96-107 - Dana Indra Sensuse, Yudho Giri Sucahyo, Siti Rohajawati, Haya Rizqi, Pinkie Anggia:
Knowledge Management: Organization Culture in Healthcare Indonesia. 108-118 - Imran Asif, M. Shuaib Karim:
Semantic Versioning of In-Process Scientific Document. 119-128 - Hendrik, Amin Anjomshoaa, A Min Tjoa:
Towards Semantic Mashup Tools for Big Data Analysis. 129-138 - Thanh D. Nguyen, Dung T. Nguyen, Thi H. Cao:
Acceptance and Use of Information System: E-Learning Based on Cloud Computing in Vietnam. 139-149 - Evangelos Gongolidis, Christos Kalloniatis, Evangelia Kavakli:
Requirements Identification for Migrating eGovernment Applications to the Cloud. 150-158 - Nguyen Quang-Hung, Le Thanh Tan, Chiem Thach Phat, Nam Thoai:
A GPU-Based Enhanced Genetic Algorithm for Power-Aware Task Scheduling Problem in HPC Cloud. 159-169 - Widodo Budiharto, Bayu Kanigoro, Viska Noviantri:
Ball Distance Estimation and Tracking System of Humanoid Soccer Robot. 170-178 - Bilih Priyogi, Nungki Selviandro, Zainal Arifin Hasibuan, Mubarik Ahmad:
Image Clustering Using Multi-visual Features. 179-189 - Abdulmalik Danlami Mohammed, Tim Morris:
A Robust Visual Object Tracking Approach on a Mobile Device. 190-198 - Josef Kufner, Radek Marík:
Self-generating Programs - Cascade of the Blocks. 199-212 - Josef Kufner, Radek Marík:
State Machine Abstraction Layer. 213-227 - Aldo Suwandi, Inggriani Liem, Saiful Akbar:
Concern Based SaaS Application Architectural Design. 228-237 - Haruna Chiroma, Sameem Abdul Kareem, Adamu I. Abubakar, Eka Novita Sari, Tutut Herawan, Abdulsalam Ya'u Gital:
Hybridization of Haar Wavelet Decomposition and Computational Intelligent Algorithms for the Estimation of Climate Change Behavior. 238-247 - Younes Saadi, Eka Novita Sari, Tutut Herawan:
An Improved Ant Colony Matching by Using Discrete Curve Evolution. 248-256 - Haruna Chiroma, Sameem Abdul Kareem, Adamu I. Abubakar, Eka Novita Sari, Tutut Herawan:
A Novel Approach to Gasoline Price Forecasting Based on Karhunen-Loève Transform and Network for Vector Quantization with Voronoid Polyhedral. 257-266 - Bens Pardamean, Teddy Suparyanto, Suyanta, Eryadi Masli, Jerome Donovan:
Enhancing the Use of Digital Model with Team-Based Learning Approach in Science Teaching. 267-276 - Peter Baumgartner:
Improving Reusability of OER - Educational Patterns for Content Sharing. 277-285 - Ali Shojaee Bakhtiari, Nizar Bouguila:
Online Learning for Two Novel Latent Topic Models. 286-295 - Nizar Bouguila, Mohamed Al Mashrgy:
An Infinite Mixture Model of Generalized Inverted Dirichlet Distributions for High-Dimensional Positive Data Modeling. 296-305 - R. B. Fajriya Hakim, Eka Novita Sari, Tutut Herawan:
On If-Then Multi Soft Sets-Based Decision Making. 306-315 - Guruh Fajar Shidik, Khabib Mustofa:
Predicting Size of Forest Fire Using Hybrid Model. 316-327 - Fathul Wahid, Øystein Sæbø:
Understanding eParticipation Services in Indonesian Local Government. 328-337 - Wikan Danar Sunindyo, Bayu Hendradjaya, G. A. Putri Saptawati, Tricya Esterina Widagdo:
Document Tracking Technology to Support Indonesian Local E-Governments. 338-347 - P. Vignesh Raja, E. Sivasankar:
Modern Framework for Distributed Healthcare Data Analytics Based on Hadoop. 348-355 - James W. Baurley, Bens Pardamean, Anzaludin S. Perbangsa, Dwinita Utami, Habib Rijzaani, Dani Satyawan:
A Bioinformatics Workflow for Genetic Association Studies of Traits in Indonesian Rice. 356-364 - Van Nhan Nguyen, Vuong Quoc Nguyen, Minh Ngoc Binh Nguyen, Tran Khanh Dang:
Fuzzy Logic Weight Estimation in Biometric-Enabled Co-authentication Systems. 365-374
The 2014 Asian Conference on Availability, Reliability and Security, AsiaARES 2014
- Fang-Yie Leu, Yi-Ting Hsiao, Kangbin Yim, Ilsun You:
A Real-Time Intrusion Detection and Protection System at System Call Level under the Assistance of a Grid. 375-385 - Zhi-Guo Chen, Sung-Ryul Kim:
A Hybrid System for Reducing Memory and Time Overhead of Intrusion Detection System. 386-395 - Shang-nan Yin, Zhi-Guo Chen, Sung-Ryul Kim:
LDFGB Algorithm for Anomaly Intrusion Detection. 396-404 - Jakub Breier, Frank Schindler:
Assets Dependencies Model in Information Security Risk Management. 405-412 - Takuya Saruwatari, Shuichiro Yamamoto:
Creation of Assurance Case Using Collaboration Diagram. 413-418 - Christoph Hochreiner, Zhendong Ma, Peter Kieseberg, Sebastian Schrittwieser, Edgar R. Weippl:
Using Model Driven Security Approaches in Web Application Development. 419-431 - Shuichiro Yamamoto:
An Evaluation of Argument Patterns Based on Data Flow. 432-437 - Huijin Jeong, Junho Choi, Chang Choi, Ilsun You, Pankoo Kim:
A Design of Web Log Integration Framework Using NoSQL. 438-445 - Agata Niescieruk, Bogdan Ksiezopolski:
Motivation-Based Risk Analysis Process for IT Systems. 446-455 - Kurt Stenzel, Kuzman Katkalov, Marian Borek, Wolfgang Reif:
Formalizing Information Flow Control in a Model-Driven Approach. 456-461 - Igor V. Kotenko, Elena Doynikova:
Security Assessment of Computer Networks Based on Attack Graphs and Security Events. 462-471 - Jianyi Zhou, Bo Liu, Baokang Zhao, Bo Liu:
A Pipeline Optimization Model for QKD Post-processing System. 472-481 - Marcel Fourné, Kevin Stegemann, Dominique Petersen, Norbert Pohlmann:
Aggregation of Network Protocol Data Near Its Source. 482-491 - Juneman Abraham, Murty Magda Pane:
The Mediating Role of Social Competition Identity Management Strategy in the Predictive Relationship between Susceptibility to Social Influence, Internet Privacy Concern, and Online Political Efficacy. 492-499 - Rima Addas, Ning Zhang:
Formal Security Analysis and Performance Evaluation of the Linkable Anonymous Access Protocol. 500-510 - Tomoya Tanjo, Kazuhiro Minami, Ken Mano, Hiroshi Maruyama:
On Safety of Pseudonym-Based Location Data in the Context of Constraint Satisfation Problems. 511-520 - Marek R. Ogiela, Lidia Ogiela, Urszula Ogiela:
Advanced Techniques for Computer Sharing and Management of Strategic Data. 521-525 - Bogdan Ksiezopolski, Adam Wierzbicki, Damian Rusinek:
On the Modelling of the Computer Security Impact on the Reputation Systems. 526-531 - Takanori Yasuda, Tsuyoshi Takagi, Kouichi Sakurai:
Efficient Variant of Rainbow without Triangular Matrix Representation. 532-541 - Kunwar Singh, C. Pandu Rangan, A. K. Banerjee:
Efficient Lattice HIBE in the Standard Model with Shorter Public Parameters. 542-553 - Akihiro Yamamura:
Security Analysis of Public Key Encryptions Based on Conjugacy Search Problem. 554-563 - Kunwar Singh, C. Pandu Rangan, A. K. Banerjee:
Cryptanalysis of Unidirectional Proxy Re-Encryption Scheme. 564-575 - Leandro Marín, Ludo Tolhuizen:
An Algorithm to Analyze Non-injective S-Boxes. 576-585 - Jun Ye, Wujun Zhang, Shu-Lin Wu, Yuan-Yuan Gao, Jia-Tao Qiu:
Attribute-Based Fine-Grained Access Control with User Revocation. 586-595 - Fei Shao, Rong Cheng, Fangguo Zhang:
A Full Privacy-Preserving Scheme for Location-Based Services. 596-601 - Satoshi Tanaka, Takanori Yasuda, Kouichi Sakurai:
Implementation of Efficient Operations over GF(232) Using Graphics Processing Units. 602-611 - Tao Jiang, Xiaofeng Chen, Jin Li, Jianfeng Ma:
M-SRS: Secure and Trustworthy Mobile Service Review System Based on Mobile Cloudlet. 612-621 - Cheng-Hsing Yang, Kuan-Liang Liu, Chun-Hao Chang, Yi-Jhong Jhang:
High-Quality Reversible Data Hiding Approach Based on Evaluating Multiple Prediction Methods. 622-632 - Ya-Ting Chang, Min-Hao Wu, Shiuh-Jeng Wang:
Steganalysis to Data Hiding of VQ Watermarking Upon Grouping Strategy. 633-642 - Giuseppe Cattaneo, Gianluca Roscigno, Umberto Ferraro Petrillo:
Experimental Evaluation of an Algorithm for the Detection of Tampered JPEG Images. 643-652 - Peige Ren, Xiaofeng Wang, Chunqing Wu, Baokang Zhao, Hao Sun:
A Semantic-Based Malware Detection System Design Based on Channels. 653-662 - Peige Ren, Xiaofeng Wang, Hao Sun, Baokang Zhao, Chunqing Wu:
An Efficient Semantic-Based Organization and Similarity Search Method for Internet Data Resources. 663-673 - Zhiquan Lai, Baokang Zhao, Jinshu Su:
Efficient DVFS to Prevent Hard Faults for Many-Core Architectures. 674-679 - Zhu Tang, Chunqing Wu, Zhenqian Feng, Baokang Zhao, Wanrong Yu:
Improving Availability through Energy-Saving Optimization in LEO Satellite Networks. 680-689 - Zhenyu Zhang, Wujun Zhang, Jianfeng Wang, Xiaofeng Chen:
An Effective Cloud-Based Active Defense System against Malicious Codes. 690-695
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.