default search action
12th TrustCom / 11th ISPA / 12th IUCC 2013: Melbourne, Australia
- 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013. IEEE Computer Society 2013, ISBN 978-0-7695-5022-0
The 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-13)
Session 1: Privacy in Cloud Computing
- Gaofeng Zhang, Yun Yang, Jinjun Chen:
A Privacy-Leakage-Tolerance Based Noise Enhancing Strategy for Privacy Protection in Cloud Computing. 1-8 - Chang Liu, Xuyun Zhang, Chengfei Liu, Yun Yang, Rajiv Ranjan, Dimitrios Georgakopoulos, Jinjun Chen:
An Iterative Hierarchical Key Exchange Scheme for Secure Scheduling of Big Data Applications in Cloud Computing. 9-16 - Juan Li, Yan Bai, Nazia Zaman:
A Fuzzy Modeling Approach for Risk-Based Access Control in eHealth Cloud. 17-23 - Bernd Zwattendorfer, Daniel Slamanig:
Scalable and Privacy-Preserving Variants of the Austrian Electronic Mandate System in the Public Cloud. 24-33 - Xiaolin Si, Pengpian Wang, Liwu Zhang:
KP-ABE Based Verifiable Cloud Access Control Scheme. 34-41
Session 2: Security and Trust in Network Routing
- Chuanhao Qu, Lei Ju, Zhiping Jia, Huaqiang Xu, Longpeng Zheng:
Light-Weight Trust-Based On-Demand Multipath Routing Protocol for Mobile Ad Hoc Networks. 42-49 - Shaahin Madani, Ibrahim Khalil:
Garbled Routing (GR): Towards Unification of Anonymous Networks. 50-57 - Jing Chen, Ruiying Du, Qian Wang, Shixiong Yao:
Secure Routing Based on Network Coding in Wireless Sensor Networks. 58-64 - Ming Xiang, William Liu, Quan Bai:
TIGER: A Trust-based Intelligent Geographical Energy-aware Routing for Smart Grid Communication Networks. 65-72 - Rakesh Matam, Somanath Tripathy:
AFC: An Effective Metric for Reliable Routing in Wireless Mesh Networks. 73-80
Session 3: Trust in Mobile and Wireless Networks
- Marcin Seredynski, Riad Aggoune, Krzysztof Szczypiorski, Djamel Khadraoui:
Performance Evaluation of Trust-Based Collaborative Sanctioning in MANETs. 81-88 - Fangyong Hou, Nong Xiao, Hongjun He, Fang Liu, Zhiguang Chen:
Novel Physically-Embedded Data Encryption for Embedded Device. 89-93 - Aymen Boudguiga, Alexis Olivereau, Nouha Oualha:
Server Assisted Key Establishment for WSN: A MIKEY-Ticket Approach. 94-101 - Mohammad Saiful Islam Mamun, Atsuko Miyaji:
A Fully-Secure RFID Authentication Protocol from Exact LPN Assumption. 102-109 - Raihana Ferdous, Vallipuram Muthukkumarasamy, Elankayer Sithirasenan:
Determining Similar Recommenders Using Improved Collaborative Filtering in MANETs. 110-117
Session 4: Privacy in Mobile and Wireless Networks
- Xun Yi, Jan Willemson, Farid Naït-Abdesselam:
Privacy-Preserving Wireless Medical Sensor Network. 118-125 - Lingguang Lei, Yuewu Wang, Jian Zhou, Lei Wang, Zhongwen Zhang:
A Threat to Mobile Cyber-Physical Systems: Sensor-Based Privacy Theft Attacks on Android Smartphones. 126-133 - Yong Wang, Nan Zhang, Yan-mei Wu, Bin-bin Su, Yong-jian Liao:
Protocol Formats Reverse Engineering Based on Association Rules in Wireless Environment. 134-141 - Bryan Dixon, Shivakant Mishra:
Power Based Malicious Code Detection Techniques for Smartphones. 142-149 - Yu-Jia Chen, Chia-Yu Lin, Li-Chun Wang:
A Privacy-Preserved Joint Group Time Scheduling Mechanism for Mobile Social Applications. 150-155
Session 5: Security in Mobile and Wireless Networks
- Qihui Zhou, Dan Wang, Yan Zhang, Bo Qin, Aimin Yu, Baohua Zhao:
ChainDroid: Safe and Flexible Access to Protected Android Resources Based on Call Chain. 156-162 - Min Zheng, Mingshen Sun, John C. S. Lui:
Droid Analytics: A Signature Based Analytic System to Collect, Extract, Analyze and Associate Android Malware. 163-171 - Younchan Jung, Marnel Peradilla, J. William Atwood:
Securing Domain Name System Combined with MIPv6 for Mobile Hosts. 172-179 - Florent Batard, Karima Boudaoud, Michel Riveill:
Securing Mobile Mashups with SCCM. 180-187 - Soufiene Ben Othman, Abdelbasset Trad, Habib Youssef, Hani Alzaid:
Secure Data Aggregation with MAC Authentication in Wireless Sensor Networks. 188-195
Session 6: Trust and Security in Social Networks
- Sancheng Peng, Guojun Wang, Shui Yu:
Modeling Malware Propagation in Smartphone Social Networks. 196-201 - Zheng Yan, Raimo Kantola, Gaowa Shi, Peng Zhang:
Unwanted Content Control via Trust Management in Pervasive Social Networking. 202-209 - Sana Hamdi, Amel Bouzeghoub, Alda Lopes Gançarski, Sadok Ben Yahia:
Trust Inference Computation for Online Social Networks. 210-217 - Owen Sacco, John G. Breslin, Stefan Decker:
Fine-Grained Trust Assertions for Privacy Management in the Social Semantic Web. 218-225 - Mohd Izuan Hafez Ninggal, Jemal H. Abawajy:
Preserving Utility in Social Network Graph Anonymization. 226-232
Session 7: Network Security
- Yuan Tao, Shui Yu:
DDoS Attack Detection at Local Area Networks Using Information Theoretical Metrics. 233-240 - Yuxin Meng, Lam-for Kwok:
Towards an Information-Theoretic Approach for Measuring Intelligent False Alarm Reduction in Intrusion Detection. 241-248 - Yang Yu, Zhanfei Zhou:
Rational Secret Sharing Information - Theoretically Secure against Adaptive Adversaries. 249-256 - Tianzuo Wang, Huaimin Wang, Bo Liu, Peichang Shi:
What is the Pattern of a Botnet? 257-264 - Yong Qiao, Yuexiang Yang, Lin Ji, Jie He:
Analyzing Malware by Abstracting the Frequent Itemsets in API Call Sequences. 265-270
Session 8: Attack and Defense
- Nelcileno Virgilio de Souza Araújo, Ruy de Oliveira, Ed Wilson Tavares Ferreira, Valtemir Emerencio do Nascimento, Ailton Akira Shinoda, Bharat K. Bhargava:
Kappa-Fuzzy ARTMAP: A Feature Selection Based Methodology to Intrusion Detection in Computer Networks. 271-276 - Jinson Zhang, Mao Lin Huang:
Visual Analytics Model for Intrusion Detection in Flood Attack. 277-284 - Mingxi Li, Yan Xiong, Xuangou Wu, Xiancun Zhou, Yuhui Sun, Shenpei Chen, Xiaoya Zhu:
A Regional Statistics Detection Scheme against Sybil Attacks in WSNs. 285-291 - Abdulmohsen Almalawi, Zahir Tari, Adil Fahad, Ibrahim Khalil:
A Framework for Improving the Accuracy of Unsupervised Intrusion Detection for SCADA Systems. 292-301 - Michael N. Johnstone, Robert Thompson:
Security Aspects of Military Sensor-Based Defence Systems. 302-309
Session 9: Trusted Computing Algorithms
- Anmin Fu, Gongxuan Zhang, Zhenchao Zhu:
A Secure and Efficient Fault-Tolerant Group Key Agreement Protocol. 310-314 - T. Raghu Vamsi Krishna, Rajesh P. Barnwal, Soumya K. Ghosh:
MDS-Based Trust Estimation of Event Reporting Node in VANET. 315-320 - Oliver Bonham-Carter, Abhishek Parakh, Dhundy Bastola:
sEncrypt: An Encryption Algorithm Inspired from Biological Processes. 321-327 - Xavier Bonnaire, Rudyar Cortés, Fabrice Kordon, Olivier Marin:
A Scalable Architecture for Highly Reliable Certification. 328-335 - Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes:
A Secure and Trusted Channel Protocol for the User Centric Smart Card Ownership Model. 336-345
Session 10: Privacy and Trust
- Roland Assam, Thomas Seidl:
A Model for Context-Aware Location Identity Preservation Using Differential Privacy. 346-353 - Toru Nakamura, Shinsaku Kiyomoto, Ryu Watanabe, Yutaka Miyake:
P3MCF: Practical Privacy-Preserving Multi-domain Collaborative Filtering. 354-361 - Armen Aghasaryan, Makram Bouzid, Dimitre Kostadinov, Mohit Kothari, Animesh Nandi:
On the Use of LSH for Privacy Preserving Personalization. 362-371 - Jordi Soria-Comas, Josep Domingo-Ferrer, David Sánchez, Sergio Martínez:
Improving the Utility of Differentially Private Data Releases via k-Anonymity. 372-379 - Maria das Gracas da Silva Oliveira, Ruy J. G. B. de Queiroz:
Scheme of User Privacy Protection Applied to Online Marketing. 380-387 - Tianqing Zhu, Ping Xiong, Yang Xiang, Wanlei Zhou:
An Effective Deferentially Private Data Releasing Algorithm for Decision Tree. 388-395
Session 11: Security Models and Frameworks
- Dirar Abu-Saymeh, Dhiah el Diehn I. Abou-Tair, Ahmad Zmily:
An Application Security Framework for Near Field Communication. 396-403 - Jin Bum Hong, Dong Seong Kim, Tadao Takaoka:
Scalable Attack Representation Model Using Logic Reduction Techniques. 404-411 - Florian Volk, Florian Sokoli, Sascha Hauke, Max Mühlhäuser:
Formalizing and Modeling Fairness for Benefit Distribution in Collaborations. 412-420 - Ahmad Samer Wazan, Gregory Blanc, Hervé Debar, Joaquín García-Alfaro:
Attribute-Based Mining Process for the Organization-Based Access Control Model. 421-430 - Keita Emura, Atsuko Miyaji, Mohammad Shahriar Rahman:
Private Multiparty Set Intersection Protocol in Rational Model. 431-438
Session 12: Trust and Security in Cloud Computing
- Gwan-Hwan Hwang, Jenn-Zjone Peng, Wei-Sian Huang:
A Mutual Nonrepudiation Protocol for Cloud Storage with Interchangeable Accesses of a Single Account from Multiple Devices. 439-446 - Miao Zhou, Yi Mu, Willy Susilo, Man Ho Au:
Privacy-Enhanced Keyword Search in Clouds. 447-451 - Fu-Kuo Tseng, Rong-Jaye Chen, Bao-Shuh Paul Lin:
iPEKS: Fast and Secure Cloud Data Retrieval from the Public-Key Encryption with Keyword Search. 452-458 - Sheikh Mahbub Habib, Vijay Varadharajan, Max Mühlhäuser:
A Trust-Aware Framework for Evaluating Security Controls of Service Providers in Cloud Marketplaces. 459-468 - Talal H. Noor, Quan Z. Sheng, Abdullah Alfazi:
Reputation Attacks Detection for Effective Trust Assessment among Cloud Services. 469-476
Session 13: Cloud Application Security
- Xuejiao Liu, Yingjie Xia, Shasha Jiang, Fubiao Xia, Yanbo Wang:
Hierarchical Attribute-Based Access Control with Authentication for Outsourced Data in Cloud Computing. 477-484 - Mansura Habiba, Md. Rafiqul Islam, A. B. M. Shawkat Ali:
Access Control Management for Cloud. 485-492 - Adrian J. Duncan, Sadie Creese, Michael Goldsmith, Jamie S. Quinton:
Cloud Computing: Insider Attacks on Virtual Machines during Migration. 493-500 - Xuyun Zhang, Chang Liu, Surya Nepal, Chi Yang, Wanchun Dou, Jinjun Chen:
Combining Top-Down and Bottom-Up: Scalable Sub-tree Anonymization over Big Data Using MapReduce on Cloud. 501-508 - Nelson Mimura Gonzalez, Marco Antonio Torrez Rojas, Marcos Vinicius Maciel da Silva, Fernando F. Redígolo, Tereza Cristina Melo de Brito Carvalho, Charles Christian Miers, Mats Näslund, Abu Shohel Ahmed:
A Framework for Authentication and Authorization Credentials in Cloud Computing. 509-516
Session 14: Trust Management
- Aarthi Krishna, Vijay Varadharajan, Nathan Tarr:
On the Design of a Trust Enhanced Distributed Authorisation Architecture for Service Oriented Architectures. 517-524 - Sascha Hauke, Sebastian Biedermann, Max Mühlhäuser, Dominik Heider:
On the Application of Supervised Machine Learning to Trustworthiness Assessment. 525-534 - Jason R. C. Nurse, Ioannis Agrafiotis, Sadie Creese, Michael Goldsmith, Koen Lamberts:
Building Confidence in Information-Trustworthiness Metrics for Decision Support. 535-543 - Ou Ruan, Cai Fu, Jing Zhou, Lansheng Han, Xiaoyang Liu:
Efficient Fair UC-Secure Two-Party Computation on Committed Inputs. 544-551 - Udaya Kiran Tupakula, Vijay Varadharajan:
Trust Enhanced Security Architecture for Detecting Insider Threats. 552-559
Session 15: Data Security and Privacy
- Lan Zhou, Vijay Varadharajan, Michael Hitchens:
Integrating Trust with Cryptographic Role-Based Access Control for Secure Cloud Data Storage. 560-569 - Ying Zhou, Chen Wang:
An Online Query Authentication System for Outsourced Databases. 570-577 - Sultan Alneyadi, Elankayer Sithirasenan, Vallipuram Muthukkumarasamy:
Word N-Gram Based Classification for Data Leakage Prevention. 578-585 - Longxiang Gao, Ming Li, Wanlei Zhou, Wen Shi:
Privacy Protected Data Forwarding in Human Associated Delay Tolerant Networks. 586-593 - Chun Hui Suen, Ryan K. L. Ko, Yu Shyang Tan, Peter Jagadpramana, Bu-Sung Lee:
S2Logger: End-to-End Data Tracking Mechanism for Cloud Data Provenance. 594-602
Session 16: Cyber Security and Privacy
- Nicholas Charles Patterson, Michael Hobbs, Darren Palmer:
A Direct Insight into Victims of Cybercrime. 603-610 - Lazaros Kyrillidis, Keith Mayes, Boris Chazalet, Konstantinos Markantonakis:
Card-Present Transactions on the Internet Using the Smart Card Web Server. 611-619 - Jingquan Wang, Guilin Wang, Willy Susilo:
Secure Single Sign-On Schemes Constructed from Nominative Signatures. 620-627 - Isredza Rahmi A. Hamid, Jemal H. Abawajy:
Profiling Phishing Email Based on Clustering Approach. 628-635 - Lei Pan, Yan Zhou:
Developing an Empirical Algorithm for Protecting Text-Based CAPTCHAs against Segmentation Attacks. 636-643
Session 17: Communication Security and Trust
- Wei Zhou, Yang Xu, Guojun Wang:
Distributed Group Key Management Using Multilinear Forms for Multi-privileged Group Communications. 644-650 - Ming Zheng, Jianping Wu, Hai-Xin Duan:
Research on the Anti-attack Design Principles of Low-Latency Anonymous Communication. 651-658 - Younchan Jung, Enrique Festijo:
Securing RTP Packets Using Per-Packet Selective Encryption Scheme for Real-Time Multimedia Applications. 659-666 - Alasdair Thomason, Matthew Leeke, Matthew Bradbury, Arshad Jhumka:
Evaluating the Impact of Broadcast Rates and Collisions on Fake Source Protocols for Source Location Privacy. 667-674 - Adnan Aziz, Dirk Hoffstadt, Sebastian Ganz, Erwin P. Rathgeb:
Development and Analysis of Generic VoIP Attack Sequences Based on Analysis of Real Attack Traffic. 675-682
Session 18: Security Algorithms
- Minghui Zheng, Yongquan Cui, Liang Chen:
Security Analysis of a Paillier-Based Threshold Proxy Signature Scheme. 683-687 - Muhammad R. Ahmed, Xu Huang, Hongyan Cui:
A Novel Evidential Evaluation for Internal Attacks with Dempster-Shafer Theory in WSN. 688-693 - Daniel Migault, Stéphane Sénécal, Stanislas Francfort, Emmanuel Herbert, Maryline Laurent:
PREFETCHing to Overcome DNSSEC Performance Issue on Large Resolving Platform. 694-703 - Hui Cui, Yi Mu, Man Ho Au:
Verifiable and Anonymous Encryption in Asymmetric Bilinear Maps. 704-711 - Weiyu Jiang, Ji Xiang, Limin Liu, Daren Zha, Lei Wang:
From Mini House Game to Hobby-Driven Behavioral Biometrics-Based Password. 712-719
Session 19: Identity Management and Access Control
- Ebenezer Paintsil:
Towards Automation of Privacy and Security Risks Analysis in Identity Management Systems. 720-727 - Ibrahim F. Elashry, Yi Mu, Willy Susilo:
Identity-Based Mediated RSA Revisited. 728-735 - Md. Sadek Ferdous, Ron Poet:
Portable Personal Identity Provider in Mobile Phones. 736-745 - Rick Lopes de Souza, Lau Cheuk Lung, Ricardo Felipe Custódio:
Multi-factor Authentication in Key Management Systems. 746-752 - A. S. M. Kayes, Jun Han, Alan Colman:
A Semantic Policy Framework for Context-Aware Access Control Applications. 753-762
Session 20: Data Protection
- Xiaochen Yuan, Chi-Man Pun:
Feature Based Video Watermarking Resistant to Geometric Distortions. 763-767 - Soumyadeb Chowdhury, Ron Poet, Lewis Mackenzie:
Exploring the Guessability of Image Passwords Using Verbal Descriptions. 768-775 - Peili Li, Haixia Xu, Shu Guo:
Public Verification of Outsourced Computation of Polynomial Functions. 776-780 - Harini Ragavan, Brajendra Panda:
Mitigating Malicious Updates: Prevention of Insider Threat to Databases. 781-788 - Sébastien Gambs, Marc-Olivier Killijian, Miguel Núñez del Prado Cortez:
De-anonymization Attack on Geolocated Data. 789-797
Trusted 21: Trusted Computing Applications
- M. Manzur Murshed, Tishna Sabrina, Anindya Iqbal, Mortuza Ali:
Verifiable and Privacy Preserving Electronic Voting with Untrusted Machines. 798-804 - Wei Ye, Ruixuan Li, Huaqing Li:
Role Mining Using Boolean Matrix Decomposition with Hierarchy. 805-812 - Guowei Wu, Jia Wang, Lin Yao, Chi Lin:
A Secure Social-Aware Incentive Scheme for Delay Tolerant Networks. 813-820 - Gonzalo Huerta Cánepa, Seungwook Han, Dongman Lee, Byoungoh Kim:
A Place-Aware Stereotypical Trust Supporting Scheme. 821-828 - Charles Thevathayan, James Harland, Peter Bertók:
An Endorsement Trust Model. 829-836
The 11th IEEE International Symposium on Parallel and Distributed Processing with Applications (ISPA-13)
Session 1: Networking and Modeling
- Md. Zakirul Alam Bhuiyan, Guojun Wang, Jiannong Cao, Jie Wu:
Local Monitoring and Maintenance for Operational Wireless Sensor Networks. 837-844 - Waltenegus Dargie, Jianjun Wen:
A Probabilistic Model for Estimating the Power Consumption of Processors and Network Interface Cards. 845-852 - Chen Chen, Yao Wu, Joshua Suetterlein, Long Zheng, Minyi Guo, Guang R. Gao:
Automatic Locality Exploitation in the Codelet Model. 853-862 - Tao Li, Hua Li, Xuechen Liu, Shuai Zhang, Kai Wang, Yulu Yang:
GPU Acceleration of Interior Point Methods in Large Scale SVM Training. 863-870 - Chung Hwan Lee, Peter Strazdins:
An Analysis of Driver Domain Offload for Paravirtualized Communication. 871-878 - Shuai Zhang, Zhiyong Liu, Dongrui Fan, Fenglong Song, Mingzhe Zhang:
Energy-Performance Modeling and Optimization of Parallel Computing in On-Chip Networks. 879-886
Session 2: Parallel and Distributed Applications
- Yifeng Geng, Xiaomeng Huang, Meiqi Zhu, Huabin Ruan, Guangwen Yang:
SciHive: Array-Based Query Processing with HiveQL. 887-894 - Burkhard Englert, Reza Gheissari:
Multivalued and Deterministic Peer-to-Peer Polling in Social Networks with Reputation Conscious Participants. 895-902 - Qi Guo, Chao Wang, Xuehai Zhou, Xi Li:
Static or Dynamic: Trade-Offs for Task Dependency Analysis for Heterogeneous MPSoC. 903-910 - Wencan Wang, Xiaomeng Huang, Haohuan Fu, Yong Hu, Shizhen Xu, Guangwen Yang:
CFIO: A Fast I/O Library for Climate Models. 911-918 - Qi Guo, Chao Wang, Xiaojing Feng, Xuehai Zhou:
Automatic Loop-Based Pipeline Optimization on Reconfigurable Platform. 919-926
Session 3: Parallel and Distributed Systems
- Xuemeng Zhang, Hui Wu, Haiyan Sun:
Register Allocation by Incremental Graph Colouring for Clustered VLIW Processors. 927-934 - Ehsan Atoofian:
TxSnoop: Power-Aware Transactional Snoop. 935-940 - Bharath Ramesh, Calvin J. Ribbens, Srinidhi Varadarajan:
Regional Consistency: Programmability and Performance for Non-cache-coherent Systems. 941-948 - Aftab Ahmed Chandio, Cheng-Zhong Xu, Nikos Tziritas, Kashif Bilal, Samee Ullah Khan:
A Comparative Study of Job Scheduling Strategies in Large-Scale Parallel Computational Systems. 949-957 - Savio S. H. Tse:
Bicriteria Load Balancing for Online Placement in Heterogeneous Servers with Pareto Upper Bounds. 958-965
Session 4: Parallel and Distributed Algorithms
- Mahmood A. Rashid, M. A. Hakim Newton, Md. Tamjidul Hoque, Abdul Sattar:
Collaborative Parallel Local Search for Simplified Protein Structure Prediction. 966-973 - Abdullah M. Baqasah, Eric Pardede, Irena Holubová, J. Wenny Rahayu:
On Change Detection of XML Schemas. 974-982 - Dong Xiang, Zhigang Yu, Jie Wu:
Deadlock-Free Fully Adaptive Routing in Irregular Networks without Virtual Channels. 983-990 - Junrui Zhou, Hong An, Yanyan Zou, Tao Sun:
Quantitative Analysis of Inter-block Dependence in Speculative Execution. 991-998 - Servesh Muralidharan, Aravind Vasudevan, Avinash Malik, David Gregg:
Heterogeneous Multiconstraint Application Partitioner (HMAP). 999-1007
Session 5: High-Performance Computing
- Xiaochuan Yu, Alvin Chan Toong Shoon:
A Hypercubic Overlay Using Bloom-Filter Based Addressing for a Non-dedicated Distributed Tag-Based Pub/Sub System. 1008-1015 - Yunfang Tai, Wanwei Cai, Qi Liu, Ge Zhang:
KVM-Loongson: An Efficient Hypervisor on MIPS. 1016-1022 - Rui Shan, Tao Li, Jungang Han:
The Buffered Edge Reconfigurable Cell Array and Its Applications. 1023-1030 - Vasiliki Kalavri, Vladimir Vlassov:
MapReduce: Limitations, Optimizations and Open Issues. 1031-1038 - Shinichi Yamagiwa, Shixun Zhang:
Scenario-Based Execution Method for Massively Parallel Accelerators. 1039-1048
Session 6: Data Management
- Long Wang, Rubing Duan, Xiaorong Li, Sifei Lu, Terence Hung, Rodrigo N. Calheiros, Rajkumar Buyya:
An Iterative Optimization Framework for Adaptive Workflow Management in Computational Clouds. 1049-1056 - Radu Tudoran, Alexandru Costan, Gabriel Antoniu:
DataSteward: Using Dedicated Compute Nodes for Scalable Data Management on Public Clouds. 1057-1064 - Walid Saad, Heithem Abbes, Christophe Cérin, Mohamed Jemni:
A Data Prefetching Model for Desktop Grids and the Condor Use Case. 1065-1072 - Antonio Gómez-Iglesias, Andreas T. Ernst, Gaurav Singh:
Scalable Multi Swarm-Based Algorithms with Lagrangian Relaxation for Constrained Problems. 1073-1080 - Richard K. Lomotey, Ralph Deters:
Real-Time Effective Framework for Unstructured Data Mining. 1081-1088
Session 7: Scheduling Algorithms
- Chunghan Lee, Hirotake Abe, Toshio Hirotsu, Kyoji Umemura:
Performance Implications of Task Scheduling by Predicting Network Throughput on the Internet. 1089-1098 - Yin Li, Chuang Lin, Fengyuan Ren, Yifeng Geng:
H-PFSP: Efficient Hybrid Parallel PFSP Protected Scheduling for MapReduce System. 1099-1106 - Yohei Miyake, Hiroshi Nakashima:
Low-Cost Load Balancing for Parallel Particle-in-Cell Simulations with Thick Overlapping Layers. 1107-1114 - Joshua D. Goehner, Taylor L. Groves, Dorian C. Arnold, Dong H. Ahn, Gregory L. Lee:
An Optimal Algorithm for Extreme Scale Job Launching. 1115-1122 - Carlo Brandolese, William Fornaciari, Luigi Rucco:
Power Management Support to Optimal Duty-Cycling in Stateful Multitasking WSN. 1123-1132
Session 8: Resource Management
- Cheng Luo, Reiji Suda:
An Efficient Task Partitioning and Scheduling Method for Symmetric Multiple GPU Architecture. 1133-1142 - Nhat-Phuong Tran, Myungho Lee, Sugwon Hong, Jongwoo Bae:
Performance Optimization of Aho-Corasick Algorithm on a GPU. 1143-1152 - Tao Huang, Jing Wang, Xuetao Guan, Qi Zhong, Keyi Wang:
Combining Process-Based Cache Partitioning and Pollute Region Isolation to Improve Shared Last Level Cache Utilization on Multicore Systems. 1153-1160 - Zhikun Chen, Shuqiang Yang, Shuang Tan, Ge Zhang, Huiyu Yang:
Hybrid Range Consistent Hash Partitioning Strategy - A New Data Partition Strategy for NoSQL Database. 1161-1169 - Hugo Meyer, Ronal Muresano, Dolores Rexachs, Emilio Luque:
Tuning SPMD Applications in Order to Increase Performability. 1170-1178
Session 9: Multithreaded Computing
- Servesh Muralidharan, Kevin Casey, David Gregg:
A Parallel Runtime Framework for Communication Intensive Stream Applications. 1179-1187 - HeeJong Park, Zoran Salcic, Kevin I-Kai Wang, Udayanto Dwi Atmojo, Wei-Tsun Sun, Avinash Malik:
A New Design Paradigm for Designing Reactive Pervasive Concurrent Systems with an Ambient Intelligence Example. 1188-1197 - Mingzhe Zhang, Da Wang, Xiaochun Ye, Liqiang He, Dongrui Fan, Zhiyong Liu:
A Path-Adaptive Opto-electronic Hybrid NoC for Chip Multi-processor. 1198-1205 - Licheng Chen, Yongbing Huang, Yungang Bao, Guangming Tan, Zehan Cui:
A Study of Leveraging Memory Level Parallelism for DRAM System on Multi-core/Many-Core Architecture. 1206-1215 - Hamilton A. Turner, Jules White:
Multi-core Deployment Optimization Using Simulated Annealing and Ant Colony Optimization. 1216-1223
Session 10: Multicore Algorithms
- Zied Ellouze, Nada Louati, Rafik Bouaziz:
A Next Generation Object-Oriented Environment for Real-Time Database Application Development. 1224-1232 - Abhishek Biswas, Desh Ranjan, Mohammad Zubair:
Genome Assembly on a Multicore System. 1233-1240 - Karolina Sarnowska-Upton, Andrew S. Grimshaw:
The Value of Automation: A Study of MPI Application Migration Methods. 1241-1248 - Flavien Quesnel, Adrien Lebre, Jonathan Pastor, Mario Südholt, Daniel Balouek:
Advanced Validation of the DVMS Approach to Fully Distributed VM Scheduling. 1249-1256 - Guowei Wu, Ying Li, Jiankang Ren, Chi Lin:
Partitioned Fixed-Priority Real-Time Scheduling Based on Dependent Task-Split on Multicore Platform. 1257-1264
Session 11: Reliability and Performance
- Alvaro Wong, Dolores Rexachs, Emilio Luque:
Enhanced Method for the Signature Adaptability to the Application Behavior. 1265-1273 - Joao Gramacho, Dolores Rexachs, Emilio Luque:
Saving Time in a Program Robustness Evaluation. 1274-1282 - Daniele Apiletti, Elena Baralis, Tania Cerquitelli, Silvia Chiusano, Luigi Grimaudo:
SeaRum: A Cloud-Based Service for Association Rule Mining. 1283-1290 - João Salada, João Pedro Barreto:
TurboSockets: Democratizing Distributed Deduplication. 1291-1298 - Yanheng Zhao, Xin Li, Zhiping Jia, Lei Ju, Ziliang Zong:
Dependency-Based Energy-Efficient Scheduling for Homogeneous Multi-core Clusters. 1299-1306
The 12th IEEE International Conference on Ubiquitous Computing and Communications (IUCC-2013)
Session 1: Ubiquitous Computing
- Longpeng Zheng, Zhiping Jia, Ruihua Zhang, Hui Xia, Lei Ju, Chuanhao Qu:
Context-Aware Routing Algorithm for WSNs Based on Unequal Clustering. 1307-1314 - Qingfeng Yu, Yijiao Chen, Xilong Mao, Baokang Zhao, Jinfeng Huang:
SMC: A Shared Memory Based SpaceWire Controller Solution. 1315-1322 - Jurairat Phuttharak, Seng W. Loke:
LogicCrowd: A Declarative Programming Platform for Mobile Crowdsourcing. 1323-1330 - Ahmad A. Alzahrani, Seng W. Loke, Hongen Lu:
Conflict and Interference Resolution for Physical Annotation Systems. 1331-1338 - Wei Wang, Ruihua Zhang, Zhongwei Chen, Lei Ju:
Normal Vector Based Fault-Tolerant Event Boundary Detection in Wireless Sensor Networks. 1339-1344
Session 2: Ubiquitous Communications
- Yi-Hsueh Tsai, Yi-Ting Lin, Kanchei Loa, Tsung-Yu Tsai, Chun-Che Chien, Dun-Cheih Huang, Shiann-Tsong Sheu:
Proximity-Based Service beyond 4G Network: Peer-Aware Discovery and Communication Using E-UTRAN and WLAN. 1345-1350 - Dan Zhao, Chunqing Wu, Xiaofeng Hu, Xiaofeng Wang, Baokang Zhao:
Characterization of OSPF Convergence with Correlated Failures. 1351-1356 - Yinbo Liu, Xingang Liu, Zhixin Shen, Laurence T. Yang:
Fast Intra Mode Decision Algorithm Based on Spatial-Domain Energy for H.264/AVC. 1357-1361 - Yanpeng Ma, Wei Peng, Xiaofeng Wang, Baokang Zhao, Jinshu Su, Chunqing Wu:
A Location Management Algorithm for LEO Satellite Networks. 1362-1366 - Yanpeng Ma, Wei Peng, Wanrong Yu, Jinshu Su, Chunqing Wu, Guohong Zhao:
A Distributed Routing Algorithm for LEO Satellite Networks. 1367-1371 - Ki-Sook Chung, Young-Mee Shin:
Communication and Collaboration Service Components for Ubiquitous Communication Applications. 1372-1377
Session 3: Ubiquitous Systems
- Javeria Samad, Seng W. Loke, Karl Reed:
Quantitative Risk Analysis for Mobile Cloud Computing: A Preliminary Approach and a Health Application Case Study. 1378-1385 - Yang Li, Lei Ju, Zhiping Jia, Yi Wang, Zili Shao:
Thermal-Aware On-Chip Memory Architecture Exploration. 1386-1393 - Chao Sun, Xingang Liu, Kai Kang, Laurence T. Yang:
Quality Assessment for Stereoscopic Image Based on DCT Frequency Information. 1394-1398 - Xiaochuan Yu, Alvin Chan Toong Shoon:
Hope: A Fault-Tolerant Distributed Pub/Sub Architecture for Large-Scale Dynamic Network Environment. 1399-1406 - Aekyung Moon, Sangho Lee:
Design of the Farmer's Experience Based Greenhouse Operating Systems. 1407-1411 - Franz Gravenhorst, Timothy Turner, Conny Draper, Richard M. Smith, Gerhard Tröster:
Validation of a Rowing Oar Angle Measurement System Based on an Inertial Measurement Unit. 1412-1419
Session 4: Ubiquitous Services
- Adam Muhlbauer, Timothy Zelinsky, Salil S. Kanhere:
Platform Zero: A Context-Based Computing Platform for Collaboration. 1420-1427 - Uzo Okafor, Ramesh K. Karne, Alexander L. Wijesinha, Patrick Appiah-Kubi:
A Methodology to Transform an OS-Based Application to a Bare Machine Application. 1428-1433 - Halikul Lenando, Mohamad Nazim Jambli, Kartinah bt Hj Zen, Johari Abdullah:
Impact of Mobility Models on Social Structure Formation in Opportunistic Networks. 1434-1441 - Octavio J. Salcedo Parra, Neil Orlando Diaz Martinez, Gustavo López Rubio:
Comparison SIP and IAX to Voice Packet Signaling over VOIP. 1442-1449 - Yann Busnel, Nuno Cruz, Denis Gillet, Adrian Holzer, Hugo Miranda:
Reinventing Mobile Community Computing and Communication. 1450-1457
Session 5: Ubiquitous Applications
- Umran Azziz Abdulla, Ken Taylor, Michael G. Barlow, Khushnood Z. Naqshbandi:
Measuring Walking and Running Cadence Using Magnetometers. 1458-1462 - Saeed Farooq Khan, Marius Portmann, Neil W. Bergmann:
VoIP Spam Prevention. 1463-1470 - Shuo Zhang, Baosheng Wang, Baokang Zhao, Jing Tao:
An Energy-Aware Task Scheduling Algorithm for a Heterogeneous Data Center. 1471-1477 - Jingguo Ge, Hanji Shen, Yuepeng E., Yulei Wu, Junling You:
An OpenFlow-Based Dynamic Path Adjustment Algorithm for Multicast Spanning Trees. 1478-1483 - Pingjian Wang, Zongbin Liu, Lei Wang, Neng Gao:
High Radix Montgomery Modular Multiplier on Modern FPGA. 1484-1489 - Andreas Huebner, Christian Facchi, Markus Meyer, Helge Janicke:
A Model-Based Approach for RFID Application Testing. 1490-1497
The Third IEEE International Symposium on Trust and Identity in Mobile Internet, Computing and Communications TrustID 2013)
Session 1: Trust Management
- Xiaofeng Qiu, Lei Cao, Pengfei Li, Liang Zhao:
A Trust Evaluation Method for Supplier Selection. 1498-1503 - Yue Yu, Huaimin Wang, Bo Liu, Gang Yin:
A Trusted Remote Attestation Model Based on Trusted Computing. 1504-1509 - Carlos Ballester Lafuente, Jean-Marc Seigneur:
Achieving Collaborative Wi-Fi Sharing without Changing Current Technologies. 1510-1515 - Zhongwei Chen, Ruihua Zhang, Lei Ju, Wei Wang:
Multivalued Trust Routing Based on Topology Level for Wireless Sensor Networks. 1516-1521 - Zheng Yan, Peng Zhang, Valtteri Niemi, Raimo Kantola:
A Research Model for Trustworthy Pervasive Social Networking. 1522-1527
Session 2: Identity Management Systems and Applications
- Hani Moaiteq Aljahdali, Ron Poet:
The Affect of Familiarity on the Usability of Recognition-Based Graphical Passwords: Cross Cultural Study between Saudi Arabia and the United Kingdom. 1528-1534 - Miroslaw Kutylowski, Piotr Lipiak:
Disability Parking Permit - Lightweight But Trustworthy Identity Documents. 1535-1540 - Gianluca Dini, Fabio Martinelli, Ilaria Matteucci, Marinella Petrocchi, Andrea Saracino, Daniele Sgandurra:
Evaluating the Trust of Android Applications through an Adaptive and Distributed Multi-criteria Approach. 1541-1546 - Tao Feng, Xi Zhao, Bogdan Carbunar, Weidong Shi:
Continuous Mobile Authentication Using Virtual Key Typing Biometrics. 1547-1552 - Ana Ferreira, Rosario Giustolisi, Jean-Louis Huynen, Vincent Koenig, Gabriele Lenzini:
Studies in Socio-technical Security Analysis: Authentication of Identities with TLS Certificates. 1553-1558
The Third IEEE International Symposium on Trust and Security in Cloud Computing (IEEE TSCloud 2013)
- Y. Govinda Ramaiah, G. Vijaya Kumari:
Complete Privacy Preserving Auditing for Data Integrity in Cloud Computing. 1559-1566 - Wenkang Wu, Zhuo Tang, Renfa Li:
On the Complexity of Authorization of Temporal RBAC in Cloud Computing Service. 1567-1572 - Karthick Ramachandran, Hanan Lutfiyya, Mark Perry:
On Subjective Trust for Privacy Policy Enforcement in Cloud Computing. 1573-1580 - Wenjuan Fan, Harry G. Perros:
A Reliability-Based Trust Management Mechanism for Cloud Services. 1581-1586 - Kazi Wali Ullah, Abu Shohel Ahmed, Jukka Ylitalo:
Towards Building an Automated Security Compliance Tool for the Cloud. 1587-1593
The Fifth IEEE International Workshop on Security in e-Science and e-Research (ISSR 2013)
- Zubair Ahmed Baig, Saif Ahmad, Sadiq M. Sait:
Detecting Intrusive Activity in the Smart Grid Communications Infrastructure Using Self-Organizing Maps. 1594-1599 - Saad Alsunbul, Phu Dung Le, Jefferson Tan:
A Defense Security Approach for Infrastructures against Hacking. 1600-1606 - Yong Qiao, Yuexiang Yang, Lin Ji, Chuan Tang, Jie He:
A Lightweight Design of Malware Behavior Representation. 1607-1612 - Manabu Hirano, David W. Chadwick, Suguru Yamaguchi:
Use of Role Based Access Control for Security-Purpose Hypervisors. 1613-1619
TThe Fifth IEEE International Symposium on UbiSafe Computing (IEEE UbiSafe-13)
- Seyed Ali Mirheidari, Sajjad Arshad, Saeidreza Khoshkdahan, Rasool Jalili:
A Comprehensive Approach to Abusing Locality in Shared Web Hosting Servers. 1620-1625 - Ammar Alazab, Jemal H. Abawajy, Michael Hobbs, Robert Layton, Ansam Khraisat:
Crime Toolkits: The Productisation of Cybercrime. 1626-1632 - Al Amin Hossain, Seung-Jin Lee, Eui-Nam Huh:
Shear-Based Spatial Transformation to Protect Proximity Attack in Outsourced Database. 1633-1638 - Arnaud Oglaza, Romain Laborde, Pascale Zaraté:
Authorization Policies: Using Decision Support System for Context-Aware Protection of User's Private Data. 1639-1644 - Roberto Gallo, Henrique Kawakami, Ricardo Dahab:
Case Study: On the Security of Key Storage on PCs. 1645-1651 - Manman Peng, Yan Hu:
A Power Model Combined of Architectural Level and Gate Level for Multicore Processors. 1652-1655 - Jingyu Feng, Yuqing Zhang, Guangyue Lu, Liang Zhang:
Defend against Collusive SSDF Attack Using Trust in Cooperative Spectrum Sensing Environment. 1656-1661 - Kashif Saleem, Mohammed Sayim Khalil, Norsheila Fisal, Adel Ali Ahmed, Mehmet Ali Orgun:
Efficient Random Key Based Encryption System for Data Packet Confidentiality in WSNs. 1662-1668
The Third IEEE International Symposium on Security and Privacy in Internet of Things (IEEE SPIoT-13)
- Luke Mirowski:
Exposing Clone RFID Tags at the Reader. 1669-1674 - Naim Asaj, Florian Schaub, Michael Müter, Albert Held, Michael Weber:
ProTACD: A Generic Privacy Process for Vehicle Development. 1675-1682
The Third IEEE International Symposium on Anonymity and Communication Systems (IEEE ACS-13)
- Lucjan Hanzlik, Kamil Kluczniak, Lukasz Krzywiecki, Miroslaw Kutylowski:
Mutual Chip Authentication. 1683-1689 - Shouwen Yang, Hui Li, Xiaotao Zhang, Gang Zhao:
Celerity Hardware Implementation of the AES with Data Parallel and Pipelining Architecture inside the Round Function. 1690-1695 - Wagner Medeiros dos Santos, Ruy J. G. B. de Queiroz, Carlos E. R. Saraiva, Gleudson P. V. Junior:
Toward Coercion-Resistant End-to-End Verifiable Electronic Voting Systems. 1696-1703 - Zhiwei Wang, Wei Lv:
Server-Aided Verification Proxy Re-signature. 1704-1707 - Muhammad Khurram Khan, Debiao He:
Cryptanalysis of "An Improved Remote Password Authentication Scheme with Smartcard". 1708-1710 - Paul Robertson, Robert Laddaga, Mark H. Burstein:
Trust and Adaptation in STRATUS. 1711-1716 - Dennis Titze, Hans Hofinger, Peter Schoo:
Using Secure Multiparty Computation for Collaborative Information Exchange. 1717-1722 - Sören Finster, Ingmar Baumgart:
Pseudonymous Smart Metering without a Trusted Third Party. 1723-1728
The Fourth International Workshop on Wireless Networks and Multimedia (WNM-2013)
- Yiqing Hu, Yan Xiong, Xudong Gong, Qiwei Lu, Mingxi Li, Wenchao Huang:
TARS: Trusted Adaptive Routing Strategy with Back-Off Observing Mechanism. 1729-1734 - Khosrow Ramezani, Elankayer Sithirasenan, Vallipuram Muthukkumarasamy:
Formal Verification of the Coordinated Robust Authentication Protocol for Wireless Networks. 1735-1740 - Chong Yan, Zhiping Jia, Lei Ju, Hui Xia, Huaqiang Xu:
TimSim: A Timestep-Based Wireless Ad-Hoc Network Simulator. 1741-1746 - Li Li, Wang Yang, Guojun Wang:
HIWL: An Unsupervised Learning Algorithm for Indoor Wireless Localization. 1747-1753 - Zeshan Aslam Khan, Edison Pignaton de Freitas, Tony Larsson, Haider Abbas:
A Multi-agent Model for Fire Detection in Coal Mines Using Wireless Sensor Networks. 1754-1761 - Chi-Hsien Wang, Gwo-Jong Yu:
Power Control and Channel Assignment Mechanisms for Cluster-Based Multichannel Vehicular Ad-Hoc Networks. 1762-1767 - Pingping Xu, Hongyun Chu, Suheng Zhang:
A Novel Device-Device Beam Discovery Scheme with Cross-Layer Design for Millimeter-Wave WPAN. 1768-1773 - Qiong Wu, Pingping Xu, Suheng Zhang, Hongyun Chu:
A Distributed Localization Algorithm Based on Random Diffusion in WSN. 1774-1777
The Fist International Workshop on Cloud Data Mining (IWCDM-2013)
Session 1: Data Mining in Cloud Systems
- Meng Sun, Weidong Gu, Xinchang Zhang, Huiling Shi, Wei Zhang:
A Matrix Transformation Algorithm for Virtual Machine Placement in Cloud. 1778-1783 - Wenjie Yang, Xingang Liu, Lan Zhang, Laurence T. Yang:
Big Data Real-Time Processing Based on Storm. 1784-1787 - Dong Dai, Xi Li, Chao Wang, Junneng Zhang, Xuehai Zhou:
Detecting Associations in Large Dataset on MapReduce. 1788-1794 - Norfaradilla Wahid, Eric Pardede:
Protecting Cumulative Node Constraint during XML Update. 1795-1802
Session 2: Data Mining in Security and Privacy Applications
- Mayssaa El Rifai, Pramode K. Verma:
An Algorithmic Approach to Securing the Three-Stage Quantum Cryptography Protocol. 1803-1807 - Dae-Ha Park, Eun-Ae Cho, Byung-Won On:
Social Spam Discovery Using Bayesian Network Classifiers Based on Feature Extractions. 1808-1811 - Athar Mahmood Ahmed Qureshi, Nina Evans:
The Role of Trust in Absorptive Capacity Operationalization. 1812-1816 - Xinfeng Ye, Jupeng Zheng:
An Adaptive Rating System for Service Computing. 1817-1824
The Fifth IEEE International Workshop on Multicore and Multithreaded Architectures and Algorithms (M2A2 2013)
Session 1: Multithreaded Algorithms
- Xiaoxian Liu, Rongcai Zhao, Lin Han, Peng Liu:
An Automatic Parallel-Stage Decoupled Software Pipelining Parallelization Algorithm Based on OpenMP. 1825-1831 - Rashid Khogali, Olivia Das, Kaamran Raahemifar:
Mobile Parallel Computing Algorithms for Single-Buffered, Speed-Scalable Processors. 1832-1839 - Naoki Yonezawa, Ken'ichi Katou, Issei Kino, Koichi Wada:
Probabilistic Analysis of Parallel Program with Partially Eliminated Barriers. 1840-1847 - Hucai Huang, Tao Li, Jungang Han:
Simulator Implementation and Performance Study of a Polymorphous Array Computer. 1848-1855 - Carlos Domínguez, Houcine Hassan, Vicent Mayans, Alfons Crespo:
Multicore Parallel Implementation of Agent Emotional Processes. 1856-1861 - Felipe Díaz Sánchez, Maurice Gagnaire, Iain James Marshall, Jean-Pierre Laisné:
COSCHED: A Scheduling Agent Maximizing Cloud Broker's Revenues under the CompatibleOne Architecture. 1862-1867
Session 2: Multicore and Multithreaded Applications
- Jingguo Ge, Chuan Du, Yulei Wu, Yuepeng E., Junling You:
Performance Analysis of Load-Aware Anycasting Based on OpenFlow. 1868-1872 - Alex Pappachen James, Sherin Sugathan:
Parallel Realization of Cognitive Cells on Film Mammography. 1873-1878 - Young-Ho Lee, Jihong Kim:
Fast and Accurate On-line Prediction of Performance and Power Consumption in Multicore-based Systems. 1879-1886 - Arthur Pyka, Mathias Rohde, Sascha Uhrig:
Performance Evaluation of the Time Analysable On-Demand Coherent Cache. 1887-1892 - Rongjie Yan, Kai Huang, Min Yu, Xiaomeng Zhang:
Communication Pipelining for Code Generation from Simulink Models. 1893-1900 - Luechao Yuan, Zuocheng Xing, Yang Zhang, Xiaobao Chen:
An Optimizing Strategy Research of LDPC Decoding Based on GPGPU. 1901-1906 - Ahsan Morshed, Jagannath Aryal, Ritaban Dutta:
Environmental Spatio-temporal Ontology for the Linked Open Data Cloud. 1907-1912
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.