Barolli, Leonard
Advances on Broad-Band Wireless Computing, Communication and Applications
Part I. 11th International Conference on Broad-Band Wireless Computing, Communication and Applications (BWCCA-2016)
1. C++ Memory Check tool based on Dynamic Binary Instrumentation Platform
Jing Ling Zhao, Lei He, Bing He
2. A program behavior recognition algorithm based on assembly instruction sequence similarity
Baojiang Cui, Chong Wang, GuoWei Dong, JinXin Ma
3. Energy-aware Migration of Virtual Machines in a Cluster
Dilawaer Duolikun, Shigenari Nakamura, Ryo Watanabe, Tomoya Enokido, Makoto Takizawa
4. An Energy-efficient Migration Model of Processes with Virtual Machines in a Server Cluster
Ryo Watanabe, Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa
5. Energy-aware Server Selection Algorithms for Storage and Computation Processes
Atsuhiro Sawada, Hiroki Kataoka, Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa
6. Topic-based Synchronization (TBS) Protocols to Prevent Illegal Information Flow in Peer-to-Peer Publish/Subscribe Systems
Shigenari Nakamura, Tomoya Enokido, Makoto Takizawa
7. Load-aware ACB Scheme for M2M Traffic in LTE-A Networks
Lijun Song, Wen’an Zhou, Yanjun Hou, Mengyu Gao
8. An Energy-Efficient Macro-assisted Sleep-Mode Scheme in Heterogeneous Networks
Xuhui Yang, Wen’an Zhou, Da Li
9. A QoE Estimation Model for Video Streaming over 5G Millimeter Wave Network
Yanjun Hou, Wen’an Zhou, Lijun Song, Mengyu Gao
10. An Energy-Efficient Process Replication Algorithm in Virtual Machine Environments
Tomoya Enokido, Makoto Takizawa
11. Comparison Analysis by WMN-GA Simulation System for Different WMN Architectures, Distributions and Routing Protocols Considering TCP
Tetsuya Oda, Admir Barolli, Ryoichiro Obukata, Leonard Barolli, Fatos Xhafa, Makoto Takizawa
12. Comparison Analysis by WMN-GA Simulation System for Different WMN Architectures, Normal and Uniform Distributions, DCF and EDCA Functions
Admir Barolli, Tetsuya Oda, Makoto Ikeda, Leonard Barolli, Fatos Xhafa, Makoto Takizawa
13. A GA-Based Simulation System for WMNs: Performance Analysis for Different WMN Architectures Considering Uniform Distribution, Transmission Rate and OLSR Protocol
Keita Matsuo, Tetsuya Oda, Admir Barolli, Makoto Ikeda, Leonard Barolli, Fatos Xhafa
14. Effect of Node Density and Node Movement Model on Performance of a VDTN
Kevin Bylykbashi, Evjola Spaho, Leonard Barolli, Makoto Takizawa
15. A Fuzzy-Based Simulation System for Actor Selection in Wireless Sensor and Actor Networks Considering as a New Parameter Density of Actor Nodes
Donald Elmazi, Tetsuya Oda, Evjola Spaho, Elis Kulla, Makoto Ikeda, Leonard Barolli
16. A Fuzzy-based System for Qualified Voting in P2P Mobile Collaborative Team
Yi Liu, Tetsuya Oda, Keita Matsuo, Leonard Barolli, Fatos Xhafa
17. An Integrated Simulation System Considering WMN-PSO Simulation System and Network Simulator 3
Shinji Sakamoto, Tetsuya Oda, Makoto Ikeda, Leonard Barolli, Fatos Xhafa
18. Impact of Delayed Acknowledgment for Message Suppression in Vehicular-DTN
Daichi Koga, Makoto Ikeda, Leonard Barolli
19. Reputation based Access Control in Social Networks for Persona Management
Keonsoo Lee, Yunyoung Nam
20. The Automatic Text Summarization Using Semantic Relevance And Hierarchical Structure Of Wordnet
JunSeok Cha, Pan Koo Kim
21. Korean spelling error correction using a Hangul similarity algorithm
SeungHyeon Bak, PanKoo Kim
22. A Comprehensive Security Analysis Checksheet for OpenFlow Networks
Yoshiaki Hori, Seiichiro Mizoguchi, Ryosuke Miyazaki, Akira Yamada, Yaokai Feng, Ayumu Kubota, Kouichi Sakurai
23. Enhanced energy conditioned mean square error algorithm for wireless sensor networks
Duha Binte Asim, Nadeem Javaid
24. In-Vehicle Cloudlet Computing based on Delay Tolerant Network Protocol for Disaster Information System
Masaki Otomo, Goshi Sato, Yoshitaka Shibata
25. Towards Heuristic Algorithms: GA, WDO, BPSO, and BFOA for Home Energy Management in Smart Grid
Mudassar Naseem, Samia Abid, Rabia Khalid, Ghulam Hafeez, Sardar Mahboob Hussain, Nadeem Javaid
26. Network lifetime maximization via energy hole alleviation in wireless sensor networks
Muhammad Awais Khan, Arshad Sher, Ahmad Raza Hameed, Naeem Jan, Junaid Shabir Abassi, Nadeem Javaid
27. A Smart Card-Based Three-Party Quantum Key Distribution Protocol
Heri Wijayanto, Hsing-Chung Chen, Wen Yen Lin
28. TCP with network coding meets loss burstiness estimation for lossy networks
Nguyen Viet Ha, Kazumi Kumazoe, Masato Tsuru
29. Reduction of Network Traffic by Using the Peer Cache Mechanism in Co-located Collaborative Web Search on Smartphones
Tsuyoshi Donen, Shingo Otsubo, Ryo Nishide, Hideyuki Takada
30. Building a Content Delivery Network among Tens of Nearby Devices Using MultihopWireless Communication
Yuki Takeda, Syuhei Yamamoto, Ryo Nishide, Hideyuki Takada
31. A Workbook Design for Fill-in-Blank Problems in Java Programming Learning Assistant System
Nobuo Funabiki, Minako Dake, Khin Khin Zaw, Wen-Chung Kao
32. Design and implementation of software consistency detection system based on Netty framework
Jun Yang, Haipeng Zhang, Lifang Han, Baojiang Cui, Guowei Dong
33. The generation of XSS attacks developing in the detect detection
Baojiang Cui, Yang Wei, Songling Shan, Jinxin Ma
34. Searchable Public Key Encryption Scheme with Data Integrity Checking
Jun Yang, Shujuan Li
35. An Attack Detection System for Multiple Web Applications Based on Big Data Platform
Xiaohui Jin, Congxian Yin, Pengpeng Yang, Baojiang Cui
36. Cognitive Countermeasures against BAD USB
Yeunsu Lee, Hyeji Lee, Kyungroul Lee, Kangbin Yim
37. Security Assessment on the Mouse Data using Mouse Loggers
Hyeji Lee, Yeunsu Lee, Kyungroul Lee, Kangbin Yim
38. Security Assessment of Keyboard Data Based on Kaspersky Product
Seungho Lee, Kyungroul Lee, Kangbin Yim
39. The Detection Technology of LTE based Stratified Fuzz
Jun Yang, Haixia Yang, Qinshu Xiao
40. Secure Multi-Protocol Mapping Gateway in Smart Grid
Kim Jin Cheol, Park Sung Wan, Lee Yong Gu, Lee Seung Won
41. An Adaptive DoS Attack Mitigation Measure for Field Networks in Smart Grids
Gunee Lee, Yun-Sam Kim, Jungmin Kang
42. Analysis on Attack Scenarios and Countermeasures for Self-driving Car and Its Infrastructures
Dohyun Lim, Kitaek Park, Dongjun Choi, Jungtaek Seo
43. Lightweight IEC 61850 Secure Communication Module for Microgrids
Yun-Sam Kim, Gunhee Lee, JungMin Kang
44. A New Approach to Building a Disguised Server Using the Honey Port Against General Scanning Attacks
Hyun Soo Park, Young Bae Jeon, Ji Won Yoon
45. Password Authentication Using One-Time Key-Based Signature and Homomorphic Encryption
Jong-Hyuk Im, Mun-Kyu Lee
46. On-line Voting System with Illegal Ballot Filtering Using Homomorphic Encryption
Mun-Kyu Lee, Jong-Hyuk Im
47. Real-Time Malicious Script Blocking Technology at the Host-Level
SangHwan Oh, HanChul Bae, Seongmin Park, HwanKuk Kim
48. A Probabilistic Encounter and Distance-based Routing Protocol for Opportunistic Networks
Sanjay K. Dhurandher, Satya J. Borah, Isaac Woungang, Sahil Gupta, Pragya Kuchal, Makoto Takizawa, Leonard Barolli
49. Comparison of Biometric and Linguistic Secret Sharing Protocols
Lidia Ogiela, Marek R. Ogiela, Urszula Ogiela
50. Concealing Additional Secrets Using Sharing Approach in Steganography
Marek R. Ogiela, Katarzyna Koptyra
51. Enhance Robotics ability in Hand Gesture Recognition by Using Leap Motion Controller
Alaa Ahmed Almarzuqi, Seyed Mohamed Buhari
52. Fast Signature Verification with Shared Implicit Certificates for Vehicular Communication
Hee-Yong Kwon, Mun-Kyu Lee
53. Design of an Adhoc Testbed for IoT and WSAN Applications Using Raspberry Pi
Hiroya Oda, Elis Kulla, Ryo Ozaki, Noritaka Nishihara
Part II. The 18-th International Symposium on Multimedia Network Systems and Applications (MNSA-2016)
54. Performance Evaluation of an IoT-Based E-Learning Testbed Using Mean Shift Clustering Approach Considering Electroencephalogram Data
Masafumi Yamada, Tetsuya Oda, Yi Liu, Keita Matsuo, Leonard Barolli
55. A Testbed for Admission Control in WLAN: A Fuzzy Approach and Its Performance Evaluation
Takaaki Inaba, Shinji Sakamoto, Tetsuya Oda, Makoto Ikeda, Leonard Barolli
56. Simple Energy-efficient Server Selection Algorithm in a Scalable Cluster
Hiroki Kataoka, Atsuhiro Sawada, Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa
57. An Energy-efficient and Reliable Protocol in Wireless Networks
Emi Ogawa, Shigenari Nakamura, Makoto Takizawa
58. Proposal of Collaborative Object Tracking Methods by Multi-Drones for Flight Surveillance Systems
Tomoki Okutake, Noriki Uchida, Noriyasu Yamamoto
59. Performance Evaluation of a DTN Based Multi-hop Network for Disaster Information Transmission by Smart Devices
Shinya Kitada, Goshi Sato, Yoshitaka Shibata
60. OpenFlow Mesh for Metabolic Computing
Minoru Uehara
Part III. The 9-th International Workshop on Next Generation of Wireless and Mobile Networks (NGWMN-2016)
61. Performance Evaluation of an AmI Testbed for Improving QoL: Evaluation Using Clustering Approach Considering Parallel Processing
Ryoichiro Obukata, Tetsuya Oda, Donald Elmazi, Makoto Ikeda, Leonard Barolli
62. Variable Neighborhood Search Algorithms for the Node Placement Problem in Multihop Networks
Kengo Katayama, Yusuke Okamoto, Elis Kulla, Noritaka Nishihara
63. Performance Evaluation of VANETs in Different Real Map Scenarios
Ryuji Ono, Elis Kulla, Evjola Spaho
64. Error Performance of Successive Interference Cancellation Schemes in MIMO Systems
Sangjoon Park, Kangbin Yim, Byeong-Gwon Kang
65. A Study on the Classification of Common Vulnerabilities and Exposures using Naïve Bayes
Sarang Na, Taeeun Kim, Hwankuk Kim
66. A Study on The behavior-based Malware Detection Signature
Sungtaek Oh, Woong Go, Taejin Lee
Part IV. The 7-th International Workshop on Methods, Analysis and Protocols for Wireless Communication (MAPWC-2016)
67. Design and Implementation of a Simulation System Based on Genetic Algorithm for Node Placement in Wireless Sensor and Actor Networks
Kosuke Ozera, Tetsuya Oda, Donald Elmazi, Leonard Barolli
68. VegeShop Tool: A Tool for Vegetable Recognition Using DNN
Yuki Sakai, Tetsuya Oda, Makoto Ikeda, Leonard Barolli
69. A Fuzzy-Based Wireless Sensor and Actuator Network: Simulation and Experimental Results
Keisuke Ebisu, Takaaki Inaba, Donald Elmazi, Makoto Ikeda, Leonard Barolli, Elis Kulla
70. Numerical Analysis of Resonance Characteristics in Cavities in Periodic Structure for WDM Telecommunication System
Hiroshi Maeda, Kazuya Tomiura, Jianming Jin
71. Spectrum Analysis of Envelope Pulse After Propagating in Nonlinear Dielectric Material
Hiroshi Maeda, Jianming Jin, Kazuya Tomiura
Part V. The 7-th International Workshop on Cloud, Wireless and e-Commerce Security (CWECS-2016)
72. Device Parameter based Secure User Authentication
Kun-Lin Tsai, Fang-Yie Leu, King-Shing Yip
73. Data Preprocessing Quality Management Procedure for Improving Big Data Applications Efficiency and Practicality
Sen-Tarng Lai, Fang-Yie Leu
74. Inferring Smartphone User Demographics from Wi-Fi trace Logs: A Study of Users’ Privacy Concerns
Cheng-Ying Hsu, Shang-En Yang, Hung-Yuan Chen, Fang-Yie Leu, Yao-Chung Fan
75. Enhancing Security of LTE using a Double Masking Technique
Jung-Chun Liu, Yi-Li Huang, Fang-Yie Leu
Part VI. The 5-th International Workshop on Robot Interaction, Control, Communication and Cooperation (RI3C-2016)
76. The effective flock control by two sheepdogs
Haruka Watanabe, Kaoru Fujioka
77. Design and Control of an Omnidirectional Wheelchair for Moving in Room Narrow Spaces
Keita Matsuo, Leonard Barolli
78. Development of Training System for Pedaling Skill by Visualizing Muscle Activity Pattern
Takuhiro Sato, Shoma Kushizaki, Shimpei Matsumoto, Tomoki Kitawaki, Tatsushi Tokuyasu
79. Proposal for a strategy to discover the students with need for a learning support by using text analysis
Chicako Miyamoto, Naoko Furukawa, Tatsushi Tokuyasu
Part VII. The 3-rd International Workshop on Secure Cloud Computing (SCC-2016)
80. Construction of Boolean Functions with Optimal Algebraic Immunity
Hang Liu, Dong Zheng, Qinglan Zhao
81. Location-Sensitive Data Sharing in Mobile Cloud Computing
Zhiwei Zhang, Yunling Wang, Jianfeng Wang, Xiaofeng Chen, Jianfeng Ma
82. Efficient and Expressive Anonymous Attribute-Based Encryption for Mobile Cloud Computing
Yinghui Zhang, Dong Zheng
83. Flexible Attribute-Based Keyword Search via Two Access Policies
Peilin Zhou, Zhenhua Liu, Shuhong Duan
84. Large Universe Revocable Fine-Grained Encryption with Public Auditing
Xuewei Yan, Hua Ma, Zhenhua Liu, Ting Peng
85. A privacy-preserving personal health record with searchability and revocability using attribute-based encryption
Shuhong Duan, Zhenhua Liu, Peilin Zhou
86. Security Analysis and Improvement of A Collusion-Resistant Identity-Based Proxy Re-Encryption Scheme
Linchao Zhang, Hua Ma, Zhenhua Liu, Enting Dong
Part VIII. The 3-rd International Workshop on Large Scale Networks and Applications (LSNA-2016)
87. A Provably Secure Two-Factor Authenticated Key Exchange Protocol for Wireless Sensor Networks Based on Authenticated Encryption
Fushan Wei, Ruijie Zhang, Jian Shen
88. Three elliptic curve cryptography-based RFID authentication protocols for Internet of Things
Rui An, Hui Feng, Qin Liu, Li Li
89. On the Security of Three-factor Authentication Scheme for Telecare Medical Information Systems
Qi Jiang, Bingyan Li, Jianfeng Ma
90. Oblivious Transfer Protocols Based on Group Factoring Problem
Jing Li, Xiong Li, Licheng Wang, Debiao He, Xinxin Niu
91. E-Voting Scheme Using Secret Sharing and K-Anonymity
Quanyu Zhao, Yining Liu
Keywords: Engineering, Communications Engineering, Networks
- Editor
- Barolli, Leonard
- Xhafa, Fatos
- Yim, Kangbin
- Publisher
- Springer
- Publication year
- 2017
- Language
- en
- Edition
- 1
- Series
- Lecture Notes on Data Engineering and Communications Technologies
- Category
- Technology, Energy, Traffic
- Format
- Ebook
- eISBN (PDF)
- 9783319491066
- Printed ISBN
- 978-3-319-49105-9