| January 9, 2014 (Thursday) |

carpentergambrinousSecurity

Dec 3, 2013 (3 years and 7 months ago)

196 views

Time Paper ID Authors Title Time Paper ID Authors Title
9:00 32
Toshiaki Miyazaki*, Hiroki Iwata,
Koji Kobayashi, Shoichi
Yamaguchi, Deze Zeng,
Song Guo, Junji Kitamichi,
Takafumi Hayashi, and Tsuneo
Tsukahara
DASN: Demand-addressable Sensor Network for Active
Information Acquisition
9:00 279
Younsung Choi, Donghoon Lee,
Woongryul Jeon, Dongho Won
Password-Based Single-File Encryption and Secure Data Deletion
for Solid-State Drive
9:20 262
Hyun Jung Choe, Hyunseung
Choo
QoS-Aware Adaptive Data Collection in Wireless Sensor
Networks
9:20 266
Junggab

Son(1)
,
Hyunbum
Kim(2), Donghyun Kim(3),
Heekuck Oh(1)
On Secure Data Sharing in Cloud Environment
9:40 252
Hideya Ochiai(1), Yuuichi
Teranishi(2), Hiroshi Esaki(3)
InNetTC: In-Network Traffic Control for Full IP Sensor-Actuator
Networks
9:40 254
AAmir Shahzad, Shahrulniza
Musa, Abdulaziz Aborujilah,
Muhammad Irfan
Industrial Control Systems (ICSs) Vulnerabilities analysis and
SCADA Security Enhancement Using Testbed Encryption
10:00 435
Xudong Zhu, Jun Li, Yuanfang
Xia, Xiaofeng Gao, Guihai Chen
An Efficient Distributed Node Clustering Protocol for High
Dimensional Large-Scale Wireless Sensor Networks
10:00 18
Jatin

Thakkar
,
Daniel

Ali
,
J
u
ng
-
Min "Jerry" Park, Sangook
Moon(1)
Securing a Distributed Policy-Based Cognitive Radio
Time Paper ID Authors Title Time Paper ID Title
10:40 10:40 110
Pham Phuoc Hung, Mohammad
Aazam, Eui-Nam Huh
A Solution for Optimizing Recovery Time in Cloud Computing
11:20 11:00 97
Ayesha Kanwal, Rahat Masood
and Awais Shibli
Evaluation and Establishment of Trust in Cloud Federation
11:20 211
Jaheon Gu, Sueng Jae Bae, Min
Young Chung
Evolutionary Algorithm for Proportional Fair Scheduling of
Device-to-Device Communications Underlaying Multi-Carrier
Cellular Networks
11:20 249
Syed Muhammad Raza, Dongsoo
S. Kim, Hyunseung Choo
Leveraging PMIPv6 with SDN
11:40 17
NgaNguyen, Bach Tran,
QuocKhuong Nguyen, VanDuc
Nguyen and Byeungwoo Jeon(1)
An investigation of the spatial correlation influence on the
coded MIMO-OFDM systems
11:40 25
Annanda Thavymony Rath, Jean-
Noël Colin
Modeling and Expressing Purpose Validation Policy for Privacy-
aware Usage Control in Distributed Environment
13:30
Time Paper ID Authors Title Time Paper ID Authors Title
86
Md. Golam Rabiul Alam, Choong
Seon Hong
Cloud Based Mental State Monitoring System for Suicide Risk
Reconnaissance Using Wearable Bio-sensors
414
Dong-Ki Kang, Seong-Hwan Kim,
Chan-Hyun Youn, Min Chen(1)
Cost Adaptive Workflow Scheduling in Cloud Computing
36 djelsep
Performance Study of Real-time Scheduling Schemes in
Configurable Component-based Sensor Node Platforms
218 Kyoungha Kim, Yanggon Kim The Security Appliance to BIRD Software Router (RTRPKI)
45
Hoo-rock Lee(1)(2), Kyung-yul
Chung(1), Kyoung-son Jhang(2)
TDMA Implementation for Simultaneous Signal Acquisition of
Machine Condition in Wireless Sensor Networks
225
Yalew Zelalem, Young-June Choi,
Kyung-yul Cheon(1), Chang-Joo
Kim(1)
Channel Assignment and Jammer Mitigation for Warfighter
MANETs: Application of Multiple Interfaces on Multiple
Channels
246
Yunmin Kim, Chul Wan Park, Tae-
Jin Lee
MAC Protocol for Energy-harvesting Users in Cognitive Radio
Networks
288 Hui-Seon Gang, Jae-Young Pyun
Error Resilient Motion Estimation in Multiple Reference Frame
Video Coding
29
Dohyung Kim, Jong-hwan Kim(1),
Hyun-soo Yoon, Ikjun Yeom(2)
Synchronous MAC for fairness in highly populated IEEE 802.11
WLANs
79
Yoonjeong Han, Zilong Jin,
Jinsung Cho
A Prediction Algorithm for Coexistence Problem in Multiple
WBANs Environment
238
Dien Nguyen Van, Tuan Nguyen
Anh, Tu Tran Ngoc, Van Duc
Nguyen, Byeungwoo Jeon(1), Tien
Hoa Nguyen
A real-time COFDM transmission system based on the GNU
Radio – USRP N210 platform
243 Haibin Huang, Susanto Rahardja
A NEW R-D ESTIMATION METHOD FOR COMPRESSED DOMAIN
MP3/AAC BIT RATE REDUCTION
91
Jaewook Jung*, Woongryul Jeon,
Dongho Won†
An enhanced Remote User Authentication Scheme Using Smart
Card
231 Gyusun Yi, Sungwon Lee
Fully Distributed Handover based on SDN in Heterogeneous
Wireless Networks
268
Yeong-Jun Kim, Seong-Jin Cho,
Seung-Hyun Yoon, Eun-Hye
Hwang, Jae-Wook Jeon
Fast and accurate power estimation method based on a PMU
counter
439
Rim Haw, Choong Seon Hong,
Sungwon Lee
An Efficient Content Delivery Framework for SDN Based LTE
Network
54
Hai Quang Hong Dam, Tin Quoc
Phan, and Quang Nguyen Ngoc
To
Simulation Software using Unicast and Broadcast Real-time
Streaming for Online Learning
241 Denis A. Migov
New Network Reliability Model for Ad Hoc Networks with
Imperfect Nodes
67
Seungryeol Go, Sangdeok Kim,
Jong-Wha Chong
An Efficient Non-Line-of-Sight Error Mitigation Method for TOA
measurement in Indoor Environments
64
Irma Syarlina Hj Che Ilias,
Mohamad Sahimi Ibrahim
Performance Analysis of Audio Video Codec’s over Wi-
Fi/WiMAX Networks
Time Paper ID Authors Title Time Paper ID Authors Title
15:40 80
Kunryun Cho, Zilong Jin, Jinsung
Cho
Design and Implementation of a Single Radio Multi-Channel
MAC Protocol on IEEE 802.15.4 for WBAN
15:40 210
Young Min Kwon, Jun Suk Kim,
Min Young Chung, JaeSheung
Shin(1), Sung-Min Oh(1), Ae-Soon
Park(1)
Development of System Level Simulator for Evaluating
Performance of Heterogeneous Network
16:00 55
Duc Ngoc Minh Dang, Phuong
Luu Vo, Choong Seon Hong
Mitigating starvation in Wireless Ad hoc Networks: Multi-
channel MAC and Power Control
16:00 98 Phearin Sok, Keecheon Kim
PRoPHET Routing based on Distance Mechanism in Disruption-
Tolerant Network
16:20 93
Kyunghoon Lee, Wipil Kang,
Hyung-Jin Choi
A Practical Channel Estimation and Feedback Method for
Device-to-Device Communication in 3GPP LTE System
16:20 37
Sungwoo Tak, Taehoon Kim,
Donglyul Kim, and Yougyung Kim
Modeling and Performance Study of AP Placement Framework
for Indoor Location-awareness and Network Performance
16:40 48
Uyen C. Nguyen, Dung T. Tran†,
Giang V. Nguyen
A taxonomy of applying filter techniques to improve the
available bandwidth estimations
16:40 117
Mingye Chen, Lingxi Li, Dongsoo
Kim, Yaobin Chen
Performance Evaluation of Routing Protocols Based on Realistic
Traces from Driving Simulator
Keynote Speech 1:
Prof. Ben Lee
Wireless HD Video Transmission Technology: Challenges and Future Applications
(http://imcom.org/gnu/kspeakers.htm)
Session 6:
Modeling and Estimation
Session 1:
Wireless Sensor Networks
Session 3:
Future Mobile Technology
Session 5:
Network Resource Management
| January 9, 2014 (Thursday) |
Invited Talk 1:
Prof. Dong In Kim
Large-Scale Small Cells via Hierarchical Cooperation:
The Evolution Path beyond 4G Cellular
(http://imcom.org/gnu/ispeakers.htm)
Session 2:
Networking Algorithms and Security
Coffee Break &
Poster Session 1: Communication & Networking
14:30 14:30
Session 4:
Distributed and Cloud Computing
Time Paper ID Authors Title Time Paper ID Authors Title
9:00 257
Taqdir Ali, Maqbool Hussain,
Wajahat Ali Khan, Muhammad
Afzal, Sungyoung Lee
Customized clinical domain ontology extraction for Knowledge
Authoring Tool
9:00 212
Naoko Hishinuma, Atsuko
Takefusa, Hidomoto Nakada,
Masato Oguchi
Hidomoto Nakada
Implementation of Data Affinity-based Distributed Parallel
Processing on a Distributed Key Value Store
9:20 428
Byeong Ho Kang, Do Hyeong
Kim, and Hyunsuk Chung
What issue spread on the web: Analyze the web trends 9:20 236
KwanHo

In
,
HaRim

Jung
,
DongEun Kim, GiWoong Nam,
Ung-Mo Kim
Distributed Processing of Continuous Range Queries
9:40 233
Jaedong Lee, Sora Hong, Jee-
Hyong Lee
An Efficient Prediction for Heavy Rain from Big Weather Data
using Genetic Algorithm
9:40 264
Rize Jin, Hyung-Ju Cho, Tae-Sun
Chung
A Group Round Robin Based B-tree Index Storage Scheme for
Flash Memory Devices
10:00 81 Najeeb Elahi and Randi Karlsen Relation Based Image Retrival In Online Social Network 10:00 8
Lars Frank, Rasmus Ulslev
Pedersen
Managing Consistency Anomalies in Distributed Integrated
Databases With Relaxed ACID Properties
Time Paper ID Authors Title Time Paper ID Authors Title
10:40 10:40 115 Sung-Hwan Kim, Hwan-Gue Cho
Privacy-Enhanced String Matching with Wordwise Positional
Sampling
11:20 11:00 221
Takahiro Hara, Ayana Yamamoto,
Mayu Iwata, Yuki Arase, Xing Xie,
Shojiro Nishio
Location Anonymization using Real Car Trace Data for Location
Based Services
11:20 16
Amna Saad, Mohd Izzat Mohamat
Roseli, Muhammad Saufi
Zullkeply
A SMART E-VOTING SYSTEM USING RFID AUTHENTICATION
METHOD FOR A CAMPUS ELECTORAL
11:20 65
Delina Beh Mei Yin, Herny
Ramadhani Mohd Husny Hamid,
Mohd Syafiq Mohd Salleh
Smart Lock and Smart Alarm: Alert and Protect Your Lost USB
Flash Drive
11:40 5 Dongwoo Kim, Jaecheol Ryou SecureSMS: Prevention of SMS Interception on Android Platform 11:40 44
Roslan Ismail, Toqeer Ali Syed,
Shahrulniza Musa
Design and Implementation of an Efficient Framework for
Behaviour Attestation Using N-Call Slides
13:40
Time
t
er Sessio
n
Authors Title Time Paper ID Authors Title
244
Jong Kyu, Hae Sung Tak, Hwan
Gue Cho
Multi-Level Sequence Alignment : A Trade-off between Speed
and Accuracy in Text Searching
103
Yuta Nakamura, Kyosuke Nagata,
Shun Nomura, Saneyasu
Yamaguchi
I/O Scheduling in Android Devices with Flash Storages
43
Khu Phi Nguyen, Hong Tuyet
Tu(1)
Locality Mutual Clustering for Document Retrieval 118
Motoki Kitahara, Junpei
Kawamoto(1), Kouichi Sakura
A Method of Digital Rights Management based on Bitcoin
Protocol
267
Shashwat Garg, Krishna K. Dhara,
Venkatesh Krishnaswamy
Predicting Relevant Documents for Enterprise Communication
Contexts
19
Kooktae Choi, Shin-gyu Kim,
Hyeonsang Eom, Heon Y. Yeom
Improving Writeback Performance of Memory-based Storage
Devices
272
Yuya Hirano, Qiang Ma,
Masatoshi Yoshikawa
Linkage of Compound Objects for Supporting Maintenance of
Large-scale Web sites
239
Phuoc Vinh Tran, Hong Thi
Nguyen, Trung Vinh Tran(1)
Approaching Multi-dimensional Cube for Visualizationbased
Epidemic Warning System - Dengue Fever
11
Snehasish Banerjee, Alton Y. K.
Chua
A Study of Manipulative and Authentic Negative Reviews 121
Shuhei Kobata, Shin Tezuka,
Ryuya Uda
Personal Identification by Flick Input with Acceleration Sensor
106
Seok-Ho Yoon, Tae-Hwan Eom,
Duck-Ho Bae, Sang-Wook Kim,
Young-Sup Hwang(1)
Computing Paper Similarity based on Latent Dirichlet Allocation 429
Pham Thuy, Nguyen Thuan,
Yongkoo Han, Kisung Park,
Young-Koo Lee
RDB2RDF: Completed Transformation from Relational Database
into RDF Ontology
7
Lars Frank, Rasmus Ulslev
Pedersen, Christian Havnø Frank,
N. Jesper Larsson(1)
The CAP Theorem Versus Databases with Relaxed ACID
properties
27
Nurashikin Saaludin, Yasmin
Yahya, Suriyati Harun, Wan
Suriyani Che Wan Ahmad
Modeling Individual Tree Diameter Increment for
Dipterocarpaceae and Non-Dipterocarpaceae in Tropical
Rainforest
104
Tran Khanh DANG(1), Dinh Long
VU(2), Van Nghiem NGUYEN(3)
BdHCO-tree: Integrating location privacy protection algorithms
for frequent updates of moving objects
28 Jae-Hwan Yu, Deok-Hwan Kim*
Multiple Gait Phase Recognition using Boosted Classifiers based
on sEMG Signal and Classification Matrix
251
Aekavute Sujarae, Chutiporn
Anutariya
A Framework for In-Class Teaching Assistant Platform 84
Fauziah Abdul Rahman(1),
Mohammad Ishak Desa(2), Antoni
Wibowo(2), Norhaidah A. Haris(3)
The Data Cleaning Process in Knowledge Discovery Database
(KDD)
52
Philip DePalo, Kyung Eun Park,
Yeong-Tae Song
Improving Patient Care in Transport Medicine through an
Ontological Approach
22
Yasmin Yahya, Roslan Ismail,
Samreth Vanna(1), Khorn Saret(1)
Using Data Mining Techniques for Predicting Individual Tree
Mortality in Tropical Rain Forest: Logistic Regression and
Decision Trees Approach
281
Kyungeun Park, Yanggon Kim,
Juno Chang
Interoperable Context Sharing in an Ontology-Enabled
Collaboration Framework
69
Norhatta Mohd, Siti Mistima
Maat, Salwah Che Mat
FACTORS INFLUENCING ENTREPRENEURIAL INTENTION
AMONG ENGINEERING TECHNOLOGY STUDENTS
Time Paper ID Authors Title Time Paper ID Authors Title
15:40 71
Seho Lee, Junghoon Kim, Young
Ik Eom
Last Block Logging Mechanism for Improving Performance and
Lifetime on SCM-based File System
15:40 34 Hyoungshick Kim
Don’t Count The Number of Friends When You Are Spreading
Information in Social Networks
16:00 255
Dongjin Kim, Jeongoh Moon,
Seong-Je Cho, Jongmoo Choi,
Minkyu Park, Sangchul Han
A Birthmark based Method for Intellectual Asset Management in
Software
16:00 112
Taketoshi Ushiama, Kazushige
Tominaga
A Method for Personalized Ranking of Items Based on Similarity
between Twitter Users
16:20 426
Yu-Ming Chang, Yuan-Hao
Chang, Po-Chun Huang, Shou-
Chieh Hsu, Tei-Wei Kuo
Adaptive Range-based Address Mapping for the Flash Storage
Devices with Explosive Capacity
16:20 30
Dong-Hee Shin, Taeyang Kim,
Soowan Kim
Smart TV as a Social Platform
16:40 260
Amit Kumar Das, Tamal Adhikary,
Md. Abdur Razzaque, Eung Jun
Cho, Choong Seon Hong
A QoS and Profit Aware Cloud Confederation Model for IaaS
Service Providers
16:40 76
Wan Liyana Binti Wan Osman,
Ryuya Uda
A Translating Website for Dyslexic Children
Keynote Speech 2:
Prof. Hamid R. Arabnia
Bio-Inspired Supercomputing and Big Data
(http://imcom.org/gnu/kspeakers.htm)
Session 8:
Advanced Database Technology
Session 7:
Knowledge Extraction from Data
Session 9:
Smart Applications with Mobile Devices
Session 11:
Potpourri
Session 10:
Privacy and Security
Session 12:
Smart Communications
| January 10, 2014 (Friday) |
Invited Talk 2:
Prof. Sajal K. Das
Participatory Urban Sensing: Challenges and Opportunities
(http://imcom.org/gnu/ispeakers.htm)
Coffee Break &
Poster Session 2: Information & Mobile Computing
14:20 14:20
Time Paper ID Authors Title Time Paper ID Authors Title
9:30 42
Yuan Tian, Biao Song, Mznah Al-
Rodhaan, Abdullah Al-Dhelaan,
Eui-Nam Huh
Threat-based Evaluation for Context-aware Multimedia
Surveillance System
9:30 437
Weiwei Yuan, Donghai Guan,
Sungyoung Lee
Extract Reputable Users for Trust-Aware Applications
9:50 284
Dung Phan, In-Seop Na, Soo-
Hyung Kim
Local Features and Histogram based Planar Object Recognition 9:50 430
Mark Beattie, Huiru Zheng, Chris
Nugent, Paul McCullagh
Self-management of COPD: A technology driven paradigm
10:10 217 Elyor Kodirov, Guee-Sang Lee
Music with Harmony: Chord Separation and Recognition in
Printed Music Score Images
10:10 111
Xinshuang Zhao, Ahmed M.
Naguib, Sukhan Lee
Octree Segmentation Based Calling Gesture Recognition for
Elderly Care Robot
10:30 440
Mohammed Sinky, Ben Lee, Tae-
Wook Lee, Chang-Gone Kim,
Jone-Keun Shin
DRAS.264: A Dynamic Retry Adaptation Scheme to Improve
Transmission of H.264 HD Video Over 802.11 Peer-to-Peer
Networks
10:30 40
Noormadinah Allias, Megat
Norulazmi Megat Mohamed
Noor, Mohd. Nazri Ismail
A Hybrid Gini PSO-SVM Feature Selection Based on Taguchi
Method: An Evaluation on Email Filtering
Time Paper ID Authors Title Time Paper ID Authors Title
105
Hongoak Yun, Byeong-Taek
Lee(1)
Expectation-based Sentence Processing in Korean: Evidence
from Behavioral and Neurological Studies
203
Toan Bui, Chunsoo Ahn, Yong-
woo Lee, Jitae Shin
Fully Automatic Segmentation Based on Localizing Active
285
Younghyun Joo, Dongwoo Lee,
Young Ik Eom
Delegating OpenGL Commands to Host for Hardware Support in
Virtualized Environments
50
Tran Tuan Anh, Pham The Bao,
Nguyen Tuan Hung
Identification of Bacillus species using Support Vector Machine
and Codon Pair Relative Frequency
224
Tae-Yeon Kim, Jaekwang Kim,
Jaedong Lee, Jee-Hyong Lee
A Tweet Summarization Method Based on a Keyword Graph 4
Suliman Mohamed Fati, Rahmat
Budiartu, Putra Sumari
PROVISIONING VIRTUAL IPTV DELIVERY NETWORKS USING
HYBRID GENETIC ALGORITHM
372
Khoa Anh Tran, Trung Manh
Huynh, Gueesang Lee
A Novel Clustering Algorithm Based Gaussian Mixture Model for
Image Segmentation
283
Kang Han Oh, Soo Hyung Kim, In
Seop Na
Saliency detection using Centroid Weight Map
247
Hong Quy Nguyen, Hyung-Jeong
Yang
Automatic Touching Detection and Recognition of Music Chord
using Auto-Encoding and Softmax
261
Azmi Ahmad, Faizah Shaari(1),
Zalizah Awang Long
Outlier Detection Method based on Hybrid Rough – Negative
using PSO Algorithm
250 Vo Quang Nhat, GueeSang Lee
Adaptive Line Fitting for Staff Detection in Handwritten Music
Score Images
1 Nguyen Phan Anh Huy
EVALUATING AND SELECTING ERP SYSTEMS BY A FUZZY
WEIGHTED AVERAGE APPROACH
427
Junggi Yang, Jiin Woo, Mihee
Jang, Youngho Lee
Study on a HDSS-based PEI model for chronic disease
management
6 Mohd Nizam Husen, Sukhan Lee
Indoor Human Localization with Orientation using WiFi
Fingerprinting
10
Toyohide Watanabe, Masatoshi
Takamiya
Police Patrol Routing on Network Voronoi Diagram 74 Teruyuki Iijima, Ryuya Uda Proposal of Egogram Presumption Technique from a Life Log
214 Qiang Li, Liang He, Xin Lin
Improved Categorical Distribution Difference Feature Selection
for Chinese Document Categorization
68 Aedah Abd Rahman
Requirements

Engineering

Approach

for

Real
-
Time

and
Embedded Systems: A Case Study of Android-Based Smart
Phone Devices
253
Jingjing Wang, Satoshi Oyama,
Masahito Kurihara, Hisashi
Kashima(1)
Learning an Accurate Entity Resolution Model from
Crowdsourced Labels
24
Abu Talib Othman, Mohammad
Nauman, Sohail Khan, Shahrulniza
Musa
Transforming High-Level Requirements to Executable Policies
for Android
204
Tuan Nguyen, Don Nguyen, Phu
Nguyen
UIT-ANPR: Toward an Open framework for Automatic Number
Plate Recognition on Smartphones
Coffee Break &
Poster Session 3: Intelligent Processing
10:50
~
12:00
10:50
~
12:00
Session 13:
Intelligent Multimedia Data Management
| January 11, 2014 (Saturday) |
Session 14:
Classification and Recognition