default search action
INCoS 2011: Fukuoka, Japan
- Fatos Xhafa, Leonard Barolli, Mario Köppen:
2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30 - Dec. 2, 2011. IEEE Computer Society 2011, ISBN 978-1-4577-1908-0
Conference Regular Papers
Ad-hoc Networks
- Elis Kulla, Masahiro Hiyama, Makoto Ikeda, Leonard Barolli:
Comparison of Experimental Results of a MANET Testbed in Different Environments Considering BATMAN Protocol. 1-7 - Edmundo Chissungo, Edwin H. Blake, Hanh Le:
Investigation into Batman-adv Protocol Performance in an Indoor Mesh Potato Testbed. 8-13 - Makoto Ikeda, Masahiro Hiyama, Elis Kulla, Leonard Barolli:
Mobile Ad-hoc Network Routing Protocols Performance Evaluation Using NS-3 Simulator. 14-20
Social Networks
- Sergio L. Toral Marín, Nik Bessis, M. Rocío Martínez-Torres, Florian Franc, Federico Barrero, Fatos Xhafa:
An Exploratory Social Network Analysis of Academic Research Networks. 21-26 - Nikos Salamanos, Dimitris Konstantopoulos:
Diffusion in Social Networks and Market Stability. 27-34
Evolutionary Computation and Meta-heuristics
- Yan Pei, Hideyuki Takagi:
Comparative Evaluations of Evolutionary Computation with Elite Obtained in Reduced Dimensional Spaces. 35-40 - Pavel Krömer, Václav Snásel, Jan Platos, Ajith Abraham, Lukás Prokop, Stanislav Misák:
Genetically Evolved Fuzzy Predictor for Photovoltaic Power Output Estimation. 41-46 - Mario Köppen, Kaori Yoshida, Masato Tsuru:
Unsorting the Proportional Fairness Relation. 47-52 - Fatos Xhafa, Christian Sánchez, Admir Barolli, Makoto Takizawa:
A Tabu Search Algorithm for Efficient Node Placement in Wireless Mesh Networks. 53-59
E-learning
- Burasakorn Yoosooka, Vilas Wuwongse:
Linked Open Data for Learning Object Discovery: Adaptive e-Learning Systems. 60-67 - Michalis Feidakis, Thanasis Daradoumis, Santi Caballé:
Endowing e-Learning Systems with Emotion Awareness. 68-75 - Konstantinos Kalemis:
Can Games Based Learning Assists Teachers in Achieving the Aims of Curriculum to Bilingual Students of Different Ethnic Minorities? 76-83 - Tharrenos Bratitsis, Triantafyllos Kotopoulos, Kyriaki Mandila:
Kindergarten Children as Story Makers: The Effect of the Digital Medium. 84-91
Security in Mobile and Wireless Systems
- Hu Xiong, Qianhong Wu, Zhong Chen:
Strong Security Enabled Certificateless Aggregate Signatures Applicable to Mobile Computation. 92-99 - Bo Qin, Qianhong Wu, Josep Domingo-Ferrer, Willy Susilo:
Distributed Privacy-Preserving Secure Aggregation in Vehicular Communication. 100-107 - Juntao Gao, Xuelian Li:
Linear Complexities of the Frequency Hopping Sequences in Two Optimal Sets. 108-114
Sensor Networks
- Akio Koyama, Ryoma Watanabe, Leonard Barolli, Makoto Takizawa:
R-MAC: A MAC Protocol for Power Reduction in Wireless Sensor Networks Based on Load Estimation and Its Performance Evaluation. 115-121 - Junichi Honda, Kazunori Uchida:
Analysis of Field Distribution and Density of Sensor Node. 122-129 - Hironori Ando, Qi Wang, Leonard Barolli, Elis Kulla, Arjan Durresi, Fatos Xhafa:
A Fuzzy-Based Cluster-Head Selection System for WSNs Considering Sensor Node Movement. 130-135 - Ying-Hong Wang, Yu-Chu Lin, Cheng-Hung Tsai:
A Routing Protocol Based on Power-Controlled Sleep Scheduling for Wireless Sensor Networks. 136-140
Cloud and Grid Computing
- Saad Liaquat Kiani, Ashiq Anjum, Nik Bessis, Richard Hill, Michael Knappmeyer:
Context Parsing, Processing and Distribution in Clouds. 141-148 - Nik Bessis, Stelios Sotiriadis, Valentin Cristea, Florin Pop:
Modelling Requirements for Enabling Meta-scheduling in Inter-Clouds and Inter-Enterprises. 149-156 - Kenichi Fujii, Motoi Yamagiwa, Minoru Uehara:
A Study on Operation of Photovoltaic Grid System Using Weather Forecast. 157-163 - Fatos Xhafa, Bernat Duran, Joanna Kolodziej, Leonard Barolli, Makoto Takizawa:
On Exploitation vs Exploration of Solution Space for Grid Scheduling. 164-171
Secure Systems
- L. G. Zhao, C. K. Wu:
A Planes Detection Algorithm Based on Feature Distribution. 172-177 - Zhitu Su, Chunhui Sun, Hui Li, Jianfeng Ma, Kai Fan:
Fast Parallel Computation of Tate Pairing. 178-183
Wireless Mesh and Sensor Networks
- Yang Sun Lee, Ji-Min Lee, Sang Soo Yeo, Jong Hyuk Park, Leonard Barolli:
A Study on the Performance of Wireless Localization System Based on AoA in WSN Environment. 184-187 - Tetsuya Oda, Admir Barolli, Evjola Spaho, Fatos Xhafa, Leonard Barolli:
Effects of Mutation and Crossover in Genetic Algorithms for Node Placement in WMNs Considering Number of Covered Users Parameter. 188-195 - Tao Yang, Leonard Barolli, Jiro Iwashige, Arjan Durresi, Fatos Xhafa:
Comparison Evaluation of Static and Mobile Sensor Nodes in Wireless Sensor Networks Considering Packet-Loss and Delay Metrics. 196-202
Distributed Architectures
- Minoru Uehara:
An Alternative Implementation of 3FT RAID in Virtual Large Scale Disks. 203-208 - Hung-Fu Li, Tyng-Yeu Liang, Jhen-Lin Jiang:
An OpenMP Compiler for Hybrid CPU/GPU Computing Architecture. 209-216 - Takuro Inoue, Ailixier Aikebaier, Tomoya Enokido, Makoto Takizawa:
Energy Efficient Distributed Systems for Storage Servers. 217-224
Collaborative and Intelligent Systems
- Raiye Hailu, Takayuki Ito:
Challenges in Automating Collaborative Negotiations. 225-232 - Jordi Conesa, Veda C. Storey, Vijayan Sugumaran, Santi Caballé:
Knowledge Reuse: Its Role and Implications for Upper Level Ontologies. 233-240 - Jie Wu, Vaclav Svaton, Jan Martinovic, Eliska Ochodkova, Václav Snásel:
Generation of Offensive Strategies in Robot Soccer Game. 241-244
Wireless Communication Systems
- Tetsuya Shigeyasu, Xiong Liu, Hiroshi Matsuno:
A New Slot Assignment Method for Slotted CSMA Based on Maximum Clique Extraction. 245-250 - Yulong Shen, Zhiwei Zhang, Jianfeng Ma, Qingqi Pei, Qijian Xu, Hao Yin:
MS2HM: A Multimedia Service Session Handoff Method between Heterogeneous Wireless Networks. 251-257
Authentication and Signatures
- Shengli Liu, Kefei Chen:
Homomorphic Linear Authentication Schemes for Proofs of Retrievability. 258-262 - Kai Fan, Yue Wang, Hui Li:
Forward Secure Proxy Blind Signature Scheme. 263-267 - Haibo Tian:
A New Strong Multiple Designated Verifiers Signature for Broadcast Propagation. 268-274 - Kai Fan, Yue Wang, Hui Li:
Abuse-freeness Electronic Payment Protocol. 275-278
Optimization and Fairness
- Akihiro Fujihara, Shiro Ono, Hiroyoshi Miwa:
Optimal Forwarding Criterion of Utility-Based Routing under Sequential Encounters for Delay Tolerant Networks. 279-286 - Minoru Uehara:
Proposal of an Evolutional Architecture for Metabolic Computing. 287-292 - Yilei Wang, Qiuliang Xu:
Fairness with Semi-rational Players in Standard Communication Networks. 293-298
Network Protocols, Algorithms, and Search
- Hitomi Tamura, Mario Köppen, Masato Uchida, Masato Tsuru, Yuji Oie:
Node Degree-Aware Link Cost for Traffic Load-Distribution in Large-Scale Networks. 299-304 - Katsuichi Nakamura, Masato Tsuru, Yuji Oie:
A perfSONAR-based Integrated Multi-domain Network Measurement Platform - Internet Monitoring as a Service. 305-312 - Walisa Romsaiyud, Wichian Premchaiswadi:
Exploring Web Search Behavior Patterns to Personalize the Search Results. 313-319 - Yulong Shen, Qingqi Pei, Ning Xi, Jianfeng Ma, Qijian Xu, Hao Yin:
HGRP: Hybrid Grid Routing Protocol for Heterogeneous Hierarchical Wireless Networks. 320-327
Poster Session
- Hideki Kondo, Hiroyuki Narahara:
Design and Implementation of a Dynamic Reconfigurable Classroom for Cooperative Learning. 328-329 - Satoru Akimoto, Hitomi Tamura, Kenji Kawahara, Yoshiaki Hori:
Study on Energy-Efficient Routing Protocol Based on Experimental Evaluation. 330-331 - Hiroaki Yamanaka, Masayoshi Shimamura, Shuji Ishii, Eiji Kawai, Katsuyoshi Iida, Masato Tsuru:
A New Generation Network Architecture to Accommodate Virtual Network Application Services. 332-333 - Kazuki Kume, Kei Ohnishi, Kazuya Tsukamoto, Shinya Yamamura, Akira Nagata:
Heuristic Information Retrieval Using Variable Identifiers in Mobile Ad-hoc Networks. 334-335 - Sarenna Bao, Takeo Fujii:
Q-learning Based p-pesistent CSMA MAC Protcol for Secondary User of Cognitive Radio Networks. 336-337 - Daiki Nobayashi, Kazumi Kumazoe, Yutaka Fukuda, Takeshi Ikenaga, Tetsuya Ito:
Performance Evaluation of Power Saving Scheme for Wireless LAN with Station Aggregation. 338-339 - Hiroshi Yamamoto, Katsuyuki Yamazaki:
P2P-based Contents Distribution Method Using Network Coordinates System. 340-341 - Takayuki Yamamoto, Shinji Sugawara, Yutaka Ishibashi:
An Information Search Method Based on Management Area Segmentation with Multiple Mobile Agents in Unstructured Peer-to-Peer Networks. 342-343 - Toshinobu Hayashi, Shinji Sugawara, Yutaka Ishibashi:
Efficient Contents Sharing Using Differences between Versions in Peer-to-Peer Networks. 344-345 - Go Hirakawa, Thin Thin Nwe, Yuichi Hattori, Sozo Inoue:
Implementation of Activity Recognition from Accelerometers on Mobile Phones. 346-347 - Shogo Fujita, Leonardo Lanante, Yuhei Nagao, Masayuki Kurosaki, Hiroshi Ochi:
Low-Latency Normalization Method for Multi-user MIMO System Using Vector Perturbation Precoder. 348-349
The 13th International Symposium on Multimedia Network Systems and Applications (MNSA 2011)
Wireless Networks
- Takahiro Nagai, Hiroshi Shigeno:
A Framework of AP Aggregation Using Virtualization for High Density WLANs. 350-355 - Wen-Ping Lai, Bo Li:
A Piecewise Packet Mapping Algorithm for Video Transmission over 802.11e Wireless Networks. 356-361 - Noriki Uchida, Kazuo Takahata, Yoshitaka Shibata:
Cognitive Wireless Network for Large Scale Disaster. 362-366 - Nobuo Funabiki, Junki Shimizu, Toru Nakanishi, Kan Watanabe, Shigeru Tomisato:
An Extension of Active Access-Point Selection Algorithm for Throughput Maximization in Wireless Mesh Networks. 367-372
P2P Networks
- Evjola Spaho, Leonard Barolli, Fatos Xhafa, Jiro Iwashige, Akio Koyama:
A Fuzzy-Based System for Data Replication in P2P Networks. 373-377 - Tadateru Ohkawara, Ailixier Aikebaier, Tomoya Enokido, Makoto Takizawa:
Enriching and Impoverishing Types of Write Operations in the Multimedia Quorum-based (MQB) Protocol. 378-383 - Yuichi Ogata, Kouhei Umezaki, Evjola Spaho, Keita Matsuo, Leonard Barolli, Jiro Iwashige:
Performance Evaluation of SmartBox End-Device for Medical Applications Using JXTA-Overlay P2P System. 384-389 - Ailixier Aikebaier, Tomoya Enokido, Makoto Takizawa:
Trustworthy Group Based Agreement Protocol in Scalable Distributed Networks. 390-395
Secure Algorithms and Systems
- Peng Wan, Minoru Uehara:
Using Diagonal and Horizontal Vertical Sobel Operators Spam Detection. 396-400 - Noriyasu Yamamoto, Toshihiko Wakahara:
Comparison Evaluation of Encryption Methods for a User Attestation System Using a Cellular Phone. 401-407 - Edlira Martiri, Artur Baxhaku, Ezmolda Barolli:
Steganographic Algorithm Injection in Image Information Systems Used in Healthcare Organizations. 408-411
Wireless Communication
- Masafumi Takematsu, Junichi Honda, Kazunori Uchida:
Electric Field Intensity Computed by DRTM in Relation to the Number of Plate Observation Points and Frequency. 412-417 - Shunsuke Nakashima, Junichi Honda, Kazunori Uchida:
Doppler Shifted Scattering from a Target Moving Along Inhomogeneous Random Rough Surface. 418-423 - Wen-Ping Lai, En-Cheng Liou, Wei-Hao Fu:
Dispersive Video Frame Importance Driven Probabilistic Packet Mapping for 802.11e Based Video Transmission. 424-429 - Yuuki Kimura, Junichi Honda, Kazunori Uchida:
Application of Horner Method to Approximate Fresnel Function. 430-433
Wireless Communication
- Natthaphong Udomkarn, Toshihiko Wakahara:
A Seminar Record Editing Algorithm. 434-439 - Edlira Kalemi, Edlira Martiri:
FOAF-Academic Ontology: A Vocabulary for the Academic Community. 440-445 - Shinichi Inenaga, Kaoru Sugita, Tetsushi Oka, Masao Yokota:
Performance Evaluation of User Interfaces According to User Computer Skill and Computer Specifications. 446-449
Authentication Systems
- Kenzi Watanabe, Makoto Otani:
A Seamless Connection for Authentication Required Web Sites by Shibboleth. 450-452 - Yusuke Kowakame, Toshihiko Wakahara:
A New One-time Authentication System Using a Cellular Phone with FeliCa Chip. 453-456 - Yuji Suga:
A Fair Exchange Protocol for Attribute Certification. 457-461 - Mitsuhiro Suenaga, Makoto Otani, Kenzi Watanabe:
Detection and Prohibition of NAPT for Network User Authentication System "Opengate". 462-465
Authentication Systems
- Yung-Hui Chen, Lawrence Y. Deng, Ku-Chen Huang:
The Best Learning Order Inference Based on Blue-Red Trees of Rule-Space Model for Social Network - Case in ITE Course. 466-471 - Hiroaki Nishino, Shota Hidaka, Tsuneo Kagawa, Kouichi Utsumiya:
Micro E-board: An Interactive Teaching Aid Using Mobile Devices. 472-477 - Wei-Yong Zhao, Toshihiko Wakahara:
A Support System Using Moodle for Improving Students Understanding. 478-483
Distributed Platforms and Algorithms
- Kouhei Umezaki, Evjola Spaho, Yuichi Ogata, Leonard Barolli, Fatos Xhafa, Jiro Iwashige:
A Fuzzy-Based Trustworthiness System for JXTA-Overlay P2P Platform. 484-489 - Minoru Uehara:
Design and Implementation of 3D MeshRAID in Virtual Large-Scale Disks. 490-495 - Tomoya Enokido, Makoto Takizawa:
Evaluation of the Improved EPCLB Algorithm for Distributed Applications. 496-501
Performance Evaluation
- Igli Tafa, Ermal Beqiri, Hakik Paci, Elinda Kajo, Aleksander Xhuvani:
The Evaluation of Transfer Time, CPU Consumption and Memory Utilization in XEN-PV, XEN-HVM, OpenVZ, KVM-FV and KVM-PV Hypervisors Using FTP and HTTP Approaches. 502-507 - Fumihiko Nakamura, Takuo Nakashima:
Performance of a Stable Unit Active Queue Management. 508-513
Cloud Computing
- Jason C. Hung, Victoria Hsu, Yu-Bing Wang:
A Smart-Travel System Based on Social Network Service for Cloud Environment. 514-519 - Shinichiro Kibe, Minoru Uehara, Motoi Yamagiwa:
Evaluation of Bottlenecks in an Educational Cloud Environment. 520-525
Antenna and Wave Propagation
- Masaaki Yamanaka, Norihiko Morinaga, Shinichi Miyamoto, Seiichi Sampei:
A Study on a Secure Wireless Link Creation Based on Multi-path Routing Combined with Transmit Antenna Directivity Control. 526-531 - Junichi Honda, Kazunori Uchida:
Relationship between Source Height and Distance Order of Propagation Along Random Rough Surface. 532-536 - Hiroshi Maeda, Hiroyuki Terashima, Yongmei Zhang, Takuya Shinohara:
Hexagonal Resonator in Two Dimensional Photonic Crystal Structure. 537-540
Image and Sound Processing Systems
- Tsuneo Kagawa, Hideki Kudo, Shuichi Tanoue, Hiro Kiyosue, Hiromu Mori, Hiroaki Nishino, Kouichi Utsumiya:
Development of Medical Imaging Diagnosis Support System with Sound Effects. 541-545 - Makoto Fukumoto, Shintaro Ogawa:
An Efficiency of Optimization Method of Sign Sound Using Interactive Differential Evolution. 546-551 - Damri Samretwit, Toshihiko Wakahara:
Measurement of Reading Characteristics of Multiplexed Image in QR Code. 552-557
Multimedia Tools and Techniques
- Toshihiko Wakahara, Noriyasu Yamamoto, Natthaphong Udomkarn, Damri Samretwit, Wei-Yong Zhao:
A New Research Support System. 558-562 - Hiroyuki Fujioka, Shinya Miyata:
Reshaping and Reconstructing Handwritten Character Typeface Using Dynamic Font Model. 563-568 - Takayuki Nagoya, Hiroyuki Fujioka:
A Graph Theoretic Algorithm for Recovering Drawing Order of Multi-stroke Handwritten Images. 569-574
The Fourth International Workshop on Information Network Design (WIND 2011)
Network Design Method
- Koji Imagawa, Takeshi Fujimura, Hiroyoshi Miwa:
Approximation Algorithm for Finding Protected Links to Keep Small Diameter against Link Failures. 575-580 - Akira Noguchi, Takeshi Fujimura, Hiroyoshi Miwa:
Network Design Method by Link Protection for Network Load Alleviation against Failures. 581-586 - Mario Köppen, Kaori Yoshida, Masato Tsuru:
A Generic Approach to Multi-fairness and Its Application to Wireless Channel Allocation. 587-593
Network Architecture
- Shinya Yamamura, Akira Nagata, Masato Tsuru:
Store-Carry-Forward Based Networking Infrastructure: Vision and Potential. 594-599 - Ryo Sasaki, Makoto Otani, Kenzi Watanabe:
Development of IPv6/IPv4 Translator Using High Performance Packet Processing Engine. 600-604 - Hiroshi Sakai, Akira Arutaki:
Protocol Enhancement for Near Field Communication (NFC): Future Direction and Cross-Layer Approach. 605-610
Network Performance
- Remi Ando, Tutomu Murase, Masato Oguchi:
Influence of Interference with Moving Terminal in Wireless LAN Environment and Evaluation of Behavior of QoS-TCP. 611-616 - Yuki Nakamizo, Hiroshi Koide, Kazumi Yoshinaga, Dirceu Cavendish, Yuji Oie:
MVA Modeling of Multi-core Server Distributed Systems. 617-620 - Atsuo Tachibana, Shigehiro Ano, Masato Tsuru:
Selecting Measurement Paths for Efficient Network Monitoring and Diagnosis under Operational Constraints. 621-626
Third International Workshop on Managing Insider Security Threats (MIST 2011)
Keynote and Invited Paper
- Dieter Gollmann:
From Insider Threats to Business Processes that are Secure-by-Design. 627 - Shinsaku Kiyomoto, Yutaka Miyake:
On Data Importance Analysis. 628-633
Managing Insider Threats
- Yoshiaki Hori, Takashi Nishide, Kouichi Sakurai:
Towards Countermeasure of Insider Threat in Network Security. 634-636 - Takayuki Sasaki:
Towards Detecting Suspicious Insiders by Triggering Digital Data Sealing. 637-642 - Chien-Ting Kuo, He-Ming Ruan, Chin-Laung Lei, Shih-Jen Chen:
A Mechanism on Risk Analysis of Information Security with Dynamic Assessment. 643-646 - Yuki Wakamizu, Makoto Otani, Kenzi Watanabe:
Development of Network User Authentication Gateway System Using "High Performance Packet Processing Engine". 647-651 - Kwangjin Bae, Sungjin Kim, Yongoo Lee, Ilsun You, Kangbin Yim, Taeho Son:
Insider Threats are Getting Worse within Industries: Isolated Secondary Backup Required. 652-655
Cryptographic Technologies for Managing Insider Threats
- Takashi Nishide, Kouichi Sakurai:
Security of Offline Anonymous Electronic Cash Systems against Insider Attacks by Untrusted Authorities Revisited. 656-661 - Naoto Yanai, Raylin Tso, Masahiro Mambo, Eiji Okamoto:
Certificateless Ordered Sequential Aggregate Signature Scheme. 662-667 - Dan Cao, Baokang Zhao, Xiaofeng Wang, Jinshu Su, Guofei Ji:
Multi-authority Attribute-Based Signature. 668-672 - Marek R. Ogiela, Lidia Ogiela:
Image Based Crypto-biometric Key Generation. 673-678
Related Technologies
- Aniello Castiglione, Giuseppe Cattaneo, Alfredo De Santis:
A Forensic Analysis of Images on Online Social Networks. 679-684 - Pietro Albano, Aniello Castiglione, Giuseppe Cattaneo, Giancarlo De Maio, Alfredo De Santis:
On the Construction of a False Digital Alibi on the Android OS. 685-690 - Aniello Castiglione, Alfredo De Santis, Francesco Palmieri:
Characterizing and Classifying Card-Sharing Traffic through Wavelet Analysis. 691-697 - Raffaele Pizzolante, Bruno Carpentieri, Aniello Castiglione, Giancarlo De Maio:
The AVQ Algorithm: Watermarking and Compression Performances. 698-702 - Xingjun Zhang, Endong Wang, Long Xin, Zhongyuan Wu, Weiqing Dong, Xiaoshe Dong:
KVM-based Detection of Rootkit Attacks. 703-708 - Yan Yang, Xingjun Zhang, Endong Wang, Nan Wu, Xiaoshe Dong:
A Scalable Fault Management Architecture for ccNUMA Server. 709-714 - Xingjun Zhang, Endong Wang, Dong Zhang, Yu Wang, Weiguo Wu, Xiaoshe Dong:
Software-Based Detecting and Recovering from ECC-Memory Faults. 715-719 - Yu Cheng, Yongwen Wang, Zuocheng Xing, Minxuan Zhang:
Characterizing Time-Varying Behavior and Predictability of Cache AVF. 720-725
Second International Workshop on Computational Intelligence for Disaster Management (CIDM 2011)
Approaches and Methods for Intelligence in Disaster Management
- Hisayuki Sasaoka:
Introduction of Acquiring Method for Agents' Actions with Simple Ant Colony Optimization in RoboCup Rescue Simulation System. 726-728 - Eoghan Furey, Kevin Curran, Paul McKevitt:
A Bayesian Filter Approach to Modelling Human Movement Patterns for First Responders within Indoor Locations. 729-734 - Eleana Asimakopoulou, Nik Bessis, Stelios Sotiriadis, Fatos Xhafa, Leonard Barolli:
A Collective Intelligence Resource Management Dynamic Approach for Disaster Management: A Density Survey of Disasters Occurrence. 735-740 - Fatos Xhafa, Eleana Asimakopoulou, Nik Bessis, Leonard Barolli, Makoto Takizawa:
An Event-based Approach to Supporting Team Coordination and Decision Making in Disaster Management Scenarios. 741-745
Critical Reviews and Applications
- Thushari P. Silva, Vilas Wuwongse, Hitesh Nidhi Sharma:
Linked Data in Disaster Mitigation and Preparedness. 746-751 - Abdullah Saad Al Shahrani:
Rushing Attack in Mobile Ad Hoc Networks. 752-758 - Daniel Gutiérrez-Reina, Sergio L. Toral Marín, Federico Barrero, Nik Bessis, Eleana Asimakopoulou:
Evaluation of Ad Hoc Networks in Disaster Scenarios. 759-764
Network Applications for Disaster Management
- Jun-Hyuck Lee, Junichi Honda, Kazunori Uchida:
Allocation of Base Stations by Using PSO Method. 765-770 - Masahiro Hiyama, Elis Kulla, Makoto Ikeda, Leonard Barolli, Jiro Iwashige:
Performance Evaluation of MANET Testbed in a Mixed Indoor and Outdoor Environment. 771-776 - Leonard Barolli, Gjergji Mino, Elis Kulla, Akio Koyama, Jiro Iwashige:
Performance Evaluation of a Fuzzy-based Integrated CAC and Handover System for Cellular Networks. 777-786
International Workshop on Adaptive Learning Via Interactive, Collaborative and Emotional Approaches (ALICE 2011)
E-learning Systems
- Naomi Miyake:
Knowledge Constructive Jigsaw as an Adaptive Learning Framework: Its Design Principles and Network Supports. 787-788 - Nicola Capuano, Matteo Gaeta, Saverio Salerno, Giuseppina Rita Mangione:
An Ontology-Based Approach for Context-Aware E-learning. 789-794 - Jordi Conesa, Santi Caballé, David Gañán, Josep Prieto:
A Framework for Dealing with Knowledge about On-line Collaborative Learning Sessions. 795-800 - Miguel Ángel Conde González, Francisco José García-Peñalvo, Marc Alier Forment:
Interoperability Scenarios to Measure Informal Learning Carried Out in PLEs. 801-806 - Michalis Feidakis, Thanasis Daradoumis, Santi Caballé:
Emotion Measurement in Intelligent Tutoring Systems: What, When and How to Measure. 807-812
Adaptive Learning and Collaborative Systems
- Soumya Banerjee, Santi Caballé:
Exploring Learning Pattern in Social Network. 813-817 - Santi Caballé, Néstor Mora, Ian Dunwell, David Gañán:
CC-LO: A New Type of Learning Object for the Virtualization of Live Collaborative Sessions. 818-823 - Mohammad Al-Smadi, Margit Hoefler, Christian Guetl:
An Integrated Model for E-assessment of Learning Experiences Enriched with Complex Learning Resources. 824-829 - Ian Dunwell, Panagiotis Petridis, Sylvester Arnab, Aristidis Protopsaltis, Maurice Hendrix, Sara de Freitas:
Blended Game-Based Learning Environments: Extending a Serious Game into a Learning Content Management System. 830-835
E-learning Applications and Algorithms
- Giuseppina Rita Mangione, Francesco Orciuoli, Anna Pierri, Pierluigi Ritrovato, Marcello Rosciano:
A New Model for Storytelling Complex Learning Objects. 836-841 - Soumya Banerjee, Santi Caballé:
Exploring Fish School Algorithm for Improving Turnaround Time: An Experience of Content Retrieval. 842-847 - Konstantinos Kalemis:
Ethnic Immigrant Minorities and Mobile Learning for Schools - A Class without Walls: A New Didactic Approach to Digital Literacy across the Curriculum. 848-854 - Sayaka Tohyama, Naomi Miyake:
The Evaluation of ReCoNote Summaries for Learner-Centered Integration. 855-856
International Workshop on Kansei Engineering and Design (WKED 2011)
- Elnaz Mazandarani, Kaori Yoshida, Mario Köppen, Wladimir Bodrow:
Recommendation System Based on Competing Algorithms. 857-862 - Kentaro Hamada, Kaori Yoshida, Kei Ohnishi, Mario Köppen:
Color Effect on Subjective Perception of Progress Bar Speed. 863-866 - Hiroko Shoji, Hiroo Inamura, Akihiro Ogino:
A Study on Information Recommendation Systems for Continuous Use. 867-871 - Yuta Kurotaki, Hisao Shiizuka:
Measurement and Classification of the Affective Value of Drum Rhythm Patterns. 872-875 - Hisao Shiizuka, Ayako Hashizume:
Kansei/Affective Decision Making. 876-881
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.