Login

Barolli, Leonard

Advances on Broad-Band Wireless Computing, Communication and Applications

Barolli, Leonard - Advances on Broad-Band Wireless Computing, Communication and Applications, ebook

382,85€

Ebook, PDF with Adobe DRM
ISBN: 9783319491066
DRM Restrictions

PrintingNot allowed
Copy to clipboardNot allowed

Table of contents

Part I. 11th International Conference on Broad-Band Wireless Computing, Communication and Applications (BWCCA-2016)

1. C++ Memory Check tool based on Dynamic Binary Instrumentation Platform
Jing Ling Zhao, Lei He, Bing He

2. A program behavior recognition algorithm based on assembly instruction sequence similarity
Baojiang Cui, Chong Wang, GuoWei Dong, JinXin Ma

3. Energy-aware Migration of Virtual Machines in a Cluster
Dilawaer Duolikun, Shigenari Nakamura, Ryo Watanabe, Tomoya Enokido, Makoto Takizawa

4. An Energy-efficient Migration Model of Processes with Virtual Machines in a Server Cluster
Ryo Watanabe, Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa

5. Energy-aware Server Selection Algorithms for Storage and Computation Processes
Atsuhiro Sawada, Hiroki Kataoka, Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa

6. Topic-based Synchronization (TBS) Protocols to Prevent Illegal Information Flow in Peer-to-Peer Publish/Subscribe Systems
Shigenari Nakamura, Tomoya Enokido, Makoto Takizawa

7. Load-aware ACB Scheme for M2M Traffic in LTE-A Networks
Lijun Song, Wen’an Zhou, Yanjun Hou, Mengyu Gao

8. An Energy-Efficient Macro-assisted Sleep-Mode Scheme in Heterogeneous Networks
Xuhui Yang, Wen’an Zhou, Da Li

9. A QoE Estimation Model for Video Streaming over 5G Millimeter Wave Network
Yanjun Hou, Wen’an Zhou, Lijun Song, Mengyu Gao

10. An Energy-Efficient Process Replication Algorithm in Virtual Machine Environments
Tomoya Enokido, Makoto Takizawa

11. Comparison Analysis by WMN-GA Simulation System for Different WMN Architectures, Distributions and Routing Protocols Considering TCP
Tetsuya Oda, Admir Barolli, Ryoichiro Obukata, Leonard Barolli, Fatos Xhafa, Makoto Takizawa

12. Comparison Analysis by WMN-GA Simulation System for Different WMN Architectures, Normal and Uniform Distributions, DCF and EDCA Functions
Admir Barolli, Tetsuya Oda, Makoto Ikeda, Leonard Barolli, Fatos Xhafa, Makoto Takizawa

13. A GA-Based Simulation System for WMNs: Performance Analysis for Different WMN Architectures Considering Uniform Distribution, Transmission Rate and OLSR Protocol
Keita Matsuo, Tetsuya Oda, Admir Barolli, Makoto Ikeda, Leonard Barolli, Fatos Xhafa

14. Effect of Node Density and Node Movement Model on Performance of a VDTN
Kevin Bylykbashi, Evjola Spaho, Leonard Barolli, Makoto Takizawa

15. A Fuzzy-Based Simulation System for Actor Selection in Wireless Sensor and Actor Networks Considering as a New Parameter Density of Actor Nodes
Donald Elmazi, Tetsuya Oda, Evjola Spaho, Elis Kulla, Makoto Ikeda, Leonard Barolli

16. A Fuzzy-based System for Qualified Voting in P2P Mobile Collaborative Team
Yi Liu, Tetsuya Oda, Keita Matsuo, Leonard Barolli, Fatos Xhafa

17. An Integrated Simulation System Considering WMN-PSO Simulation System and Network Simulator 3
Shinji Sakamoto, Tetsuya Oda, Makoto Ikeda, Leonard Barolli, Fatos Xhafa

18. Impact of Delayed Acknowledgment for Message Suppression in Vehicular-DTN
Daichi Koga, Makoto Ikeda, Leonard Barolli

19. Reputation based Access Control in Social Networks for Persona Management
Keonsoo Lee, Yunyoung Nam

20. The Automatic Text Summarization Using Semantic Relevance And Hierarchical Structure Of Wordnet
JunSeok Cha, Pan Koo Kim

21. Korean spelling error correction using a Hangul similarity algorithm
SeungHyeon Bak, PanKoo Kim

22. A Comprehensive Security Analysis Checksheet for OpenFlow Networks
Yoshiaki Hori, Seiichiro Mizoguchi, Ryosuke Miyazaki, Akira Yamada, Yaokai Feng, Ayumu Kubota, Kouichi Sakurai

23. Enhanced energy conditioned mean square error algorithm for wireless sensor networks
Duha Binte Asim, Nadeem Javaid

24. In-Vehicle Cloudlet Computing based on Delay Tolerant Network Protocol for Disaster Information System
Masaki Otomo, Goshi Sato, Yoshitaka Shibata

25. Towards Heuristic Algorithms: GA, WDO, BPSO, and BFOA for Home Energy Management in Smart Grid
Mudassar Naseem, Samia Abid, Rabia Khalid, Ghulam Hafeez, Sardar Mahboob Hussain, Nadeem Javaid

26. Network lifetime maximization via energy hole alleviation in wireless sensor networks
Muhammad Awais Khan, Arshad Sher, Ahmad Raza Hameed, Naeem Jan, Junaid Shabir Abassi, Nadeem Javaid

27. A Smart Card-Based Three-Party Quantum Key Distribution Protocol
Heri Wijayanto, Hsing-Chung Chen, Wen Yen Lin

28. TCP with network coding meets loss burstiness estimation for lossy networks
Nguyen Viet Ha, Kazumi Kumazoe, Masato Tsuru

29. Reduction of Network Traffic by Using the Peer Cache Mechanism in Co-located Collaborative Web Search on Smartphones
Tsuyoshi Donen, Shingo Otsubo, Ryo Nishide, Hideyuki Takada

30. Building a Content Delivery Network among Tens of Nearby Devices Using MultihopWireless Communication
Yuki Takeda, Syuhei Yamamoto, Ryo Nishide, Hideyuki Takada

31. A Workbook Design for Fill-in-Blank Problems in Java Programming Learning Assistant System
Nobuo Funabiki, Minako Dake, Khin Khin Zaw, Wen-Chung Kao

32. Design and implementation of software consistency detection system based on Netty framework
Jun Yang, Haipeng Zhang, Lifang Han, Baojiang Cui, Guowei Dong

33. The generation of XSS attacks developing in the detect detection
Baojiang Cui, Yang Wei, Songling Shan, Jinxin Ma

34. Searchable Public Key Encryption Scheme with Data Integrity Checking
Jun Yang, Shujuan Li

35. An Attack Detection System for Multiple Web Applications Based on Big Data Platform
Xiaohui Jin, Congxian Yin, Pengpeng Yang, Baojiang Cui

36. Cognitive Countermeasures against BAD USB
Yeunsu Lee, Hyeji Lee, Kyungroul Lee, Kangbin Yim

37. Security Assessment on the Mouse Data using Mouse Loggers
Hyeji Lee, Yeunsu Lee, Kyungroul Lee, Kangbin Yim

38. Security Assessment of Keyboard Data Based on Kaspersky Product
Seungho Lee, Kyungroul Lee, Kangbin Yim

39. The Detection Technology of LTE based Stratified Fuzz
Jun Yang, Haixia Yang, Qinshu Xiao

40. Secure Multi-Protocol Mapping Gateway in Smart Grid
Kim Jin Cheol, Park Sung Wan, Lee Yong Gu, Lee Seung Won

41. An Adaptive DoS Attack Mitigation Measure for Field Networks in Smart Grids
Gunee Lee, Yun-Sam Kim, Jungmin Kang

42. Analysis on Attack Scenarios and Countermeasures for Self-driving Car and Its Infrastructures
Dohyun Lim, Kitaek Park, Dongjun Choi, Jungtaek Seo

43. Lightweight IEC 61850 Secure Communication Module for Microgrids
Yun-Sam Kim, Gunhee Lee, JungMin Kang

44. A New Approach to Building a Disguised Server Using the Honey Port Against General Scanning Attacks
Hyun Soo Park, Young Bae Jeon, Ji Won Yoon

45. Password Authentication Using One-Time Key-Based Signature and Homomorphic Encryption
Jong-Hyuk Im, Mun-Kyu Lee

46. On-line Voting System with Illegal Ballot Filtering Using Homomorphic Encryption
Mun-Kyu Lee, Jong-Hyuk Im

47. Real-Time Malicious Script Blocking Technology at the Host-Level
SangHwan Oh, HanChul Bae, Seongmin Park, HwanKuk Kim

48. A Probabilistic Encounter and Distance-based Routing Protocol for Opportunistic Networks
Sanjay K. Dhurandher, Satya J. Borah, Isaac Woungang, Sahil Gupta, Pragya Kuchal, Makoto Takizawa, Leonard Barolli

49. Comparison of Biometric and Linguistic Secret Sharing Protocols
Lidia Ogiela, Marek R. Ogiela, Urszula Ogiela

50. Concealing Additional Secrets Using Sharing Approach in Steganography
Marek R. Ogiela, Katarzyna Koptyra

51. Enhance Robotics ability in Hand Gesture Recognition by Using Leap Motion Controller
Alaa Ahmed Almarzuqi, Seyed Mohamed Buhari

52. Fast Signature Verification with Shared Implicit Certificates for Vehicular Communication
Hee-Yong Kwon, Mun-Kyu Lee

53. Design of an Adhoc Testbed for IoT and WSAN Applications Using Raspberry Pi
Hiroya Oda, Elis Kulla, Ryo Ozaki, Noritaka Nishihara

Part II. The 18-th International Symposium on Multimedia Network Systems and Applications (MNSA-2016)

54. Performance Evaluation of an IoT-Based E-Learning Testbed Using Mean Shift Clustering Approach Considering Electroencephalogram Data
Masafumi Yamada, Tetsuya Oda, Yi Liu, Keita Matsuo, Leonard Barolli

55. A Testbed for Admission Control in WLAN: A Fuzzy Approach and Its Performance Evaluation
Takaaki Inaba, Shinji Sakamoto, Tetsuya Oda, Makoto Ikeda, Leonard Barolli

56. Simple Energy-efficient Server Selection Algorithm in a Scalable Cluster
Hiroki Kataoka, Atsuhiro Sawada, Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa

57. An Energy-efficient and Reliable Protocol in Wireless Networks
Emi Ogawa, Shigenari Nakamura, Makoto Takizawa

58. Proposal of Collaborative Object Tracking Methods by Multi-Drones for Flight Surveillance Systems
Tomoki Okutake, Noriki Uchida, Noriyasu Yamamoto

59. Performance Evaluation of a DTN Based Multi-hop Network for Disaster Information Transmission by Smart Devices
Shinya Kitada, Goshi Sato, Yoshitaka Shibata

60. OpenFlow Mesh for Metabolic Computing
Minoru Uehara

Part III. The 9-th International Workshop on Next Generation of Wireless and Mobile Networks (NGWMN-2016)

61. Performance Evaluation of an AmI Testbed for Improving QoL: Evaluation Using Clustering Approach Considering Parallel Processing
Ryoichiro Obukata, Tetsuya Oda, Donald Elmazi, Makoto Ikeda, Leonard Barolli

62. Variable Neighborhood Search Algorithms for the Node Placement Problem in Multihop Networks
Kengo Katayama, Yusuke Okamoto, Elis Kulla, Noritaka Nishihara

63. Performance Evaluation of VANETs in Different Real Map Scenarios
Ryuji Ono, Elis Kulla, Evjola Spaho

64. Error Performance of Successive Interference Cancellation Schemes in MIMO Systems
Sangjoon Park, Kangbin Yim, Byeong-Gwon Kang

65. A Study on the Classification of Common Vulnerabilities and Exposures using Naïve Bayes
Sarang Na, Taeeun Kim, Hwankuk Kim

66. A Study on The behavior-based Malware Detection Signature
Sungtaek Oh, Woong Go, Taejin Lee

Part IV. The 7-th International Workshop on Methods, Analysis and Protocols for Wireless Communication (MAPWC-2016)

67. Design and Implementation of a Simulation System Based on Genetic Algorithm for Node Placement in Wireless Sensor and Actor Networks
Kosuke Ozera, Tetsuya Oda, Donald Elmazi, Leonard Barolli

68. VegeShop Tool: A Tool for Vegetable Recognition Using DNN
Yuki Sakai, Tetsuya Oda, Makoto Ikeda, Leonard Barolli

69. A Fuzzy-Based Wireless Sensor and Actuator Network: Simulation and Experimental Results
Keisuke Ebisu, Takaaki Inaba, Donald Elmazi, Makoto Ikeda, Leonard Barolli, Elis Kulla

70. Numerical Analysis of Resonance Characteristics in Cavities in Periodic Structure for WDM Telecommunication System
Hiroshi Maeda, Kazuya Tomiura, Jianming Jin

71. Spectrum Analysis of Envelope Pulse After Propagating in Nonlinear Dielectric Material
Hiroshi Maeda, Jianming Jin, Kazuya Tomiura

Part V. The 7-th International Workshop on Cloud, Wireless and e-Commerce Security (CWECS-2016)

72. Device Parameter based Secure User Authentication
Kun-Lin Tsai, Fang-Yie Leu, King-Shing Yip

73. Data Preprocessing Quality Management Procedure for Improving Big Data Applications Efficiency and Practicality
Sen-Tarng Lai, Fang-Yie Leu

74. Inferring Smartphone User Demographics from Wi-Fi trace Logs: A Study of Users’ Privacy Concerns
Cheng-Ying Hsu, Shang-En Yang, Hung-Yuan Chen, Fang-Yie Leu, Yao-Chung Fan

75. Enhancing Security of LTE using a Double Masking Technique
Jung-Chun Liu, Yi-Li Huang, Fang-Yie Leu

Part VI. The 5-th International Workshop on Robot Interaction, Control, Communication and Cooperation (RI3C-2016)

76. The effective flock control by two sheepdogs
Haruka Watanabe, Kaoru Fujioka

77. Design and Control of an Omnidirectional Wheelchair for Moving in Room Narrow Spaces
Keita Matsuo, Leonard Barolli

78. Development of Training System for Pedaling Skill by Visualizing Muscle Activity Pattern
Takuhiro Sato, Shoma Kushizaki, Shimpei Matsumoto, Tomoki Kitawaki, Tatsushi Tokuyasu

79. Proposal for a strategy to discover the students with need for a learning support by using text analysis
Chicako Miyamoto, Naoko Furukawa, Tatsushi Tokuyasu

Part VII. The 3-rd International Workshop on Secure Cloud Computing (SCC-2016)

80. Construction of Boolean Functions with Optimal Algebraic Immunity
Hang Liu, Dong Zheng, Qinglan Zhao

81. Location-Sensitive Data Sharing in Mobile Cloud Computing
Zhiwei Zhang, Yunling Wang, Jianfeng Wang, Xiaofeng Chen, Jianfeng Ma

82. Efficient and Expressive Anonymous Attribute-Based Encryption for Mobile Cloud Computing
Yinghui Zhang, Dong Zheng

83. Flexible Attribute-Based Keyword Search via Two Access Policies
Peilin Zhou, Zhenhua Liu, Shuhong Duan

84. Large Universe Revocable Fine-Grained Encryption with Public Auditing
Xuewei Yan, Hua Ma, Zhenhua Liu, Ting Peng

85. A privacy-preserving personal health record with searchability and revocability using attribute-based encryption
Shuhong Duan, Zhenhua Liu, Peilin Zhou

86. Security Analysis and Improvement of A Collusion-Resistant Identity-Based Proxy Re-Encryption Scheme
Linchao Zhang, Hua Ma, Zhenhua Liu, Enting Dong

Part VIII. The 3-rd International Workshop on Large Scale Networks and Applications (LSNA-2016)

87. A Provably Secure Two-Factor Authenticated Key Exchange Protocol for Wireless Sensor Networks Based on Authenticated Encryption
Fushan Wei, Ruijie Zhang, Jian Shen

88. Three elliptic curve cryptography-based RFID authentication protocols for Internet of Things
Rui An, Hui Feng, Qin Liu, Li Li

89. On the Security of Three-factor Authentication Scheme for Telecare Medical Information Systems
Qi Jiang, Bingyan Li, Jianfeng Ma

90. Oblivious Transfer Protocols Based on Group Factoring Problem
Jing Li, Xiong Li, Licheng Wang, Debiao He, Xinxin Niu

91. E-Voting Scheme Using Secret Sharing and K-Anonymity
Quanyu Zhao, Yining Liu

Keywords: Engineering, Communications Engineering, Networks

Editor
 
 
Publisher
Springer
Publication year
2017
Language
en
Edition
1
Series
Lecture Notes on Data Engineering and Communications Technologies
Category
Technology, Energy, Traffic
Format
Ebook
eISBN (PDF)
9783319491066
Printed ISBN
978-3-319-49105-9

Similar titles