


default search action
UIC/ATC 2013: Vietri sul Mare, Italy
- 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, UIC/ATC 2013, Vietri sul Mare, Sorrento Peninsula, Italy, December 18-21, 2013. IEEE Computer Society 2013, ISBN 978-1-4799-2481-3

The 10th IEEE International Conference on Ubiquitous Intelligence and Computing (UIC'10)
UIC 1: Localization and Location-Based Services
- Massimo Ficco, Rocco Aversa:

Hybrid Localization for Ubiquitous Services. 1-8 - Liqing Ren, Xiaojiang Chen, Junjie Huang, Tianzhang Xing, Weike Nie, Chen Liu, Dingyi Fang

:
DE2: Localization with the Rotating RSS Using a Single Beacon. 9-16 - Jingwei Wang, Neil Y. Yen, Bin Guo, Runhe Huang, Jianhua Ma, Tao Ban, Hong Zhao:

User Travelling Pattern Prediction via Indistinct Cellular Data Mining. 17-24 - Roland Assam, Thomas Seidl

:
BodyGuards: A Clairvoyant Location Predictor Using Frequent Neighbors and Markov Model. 25-32 - Yuqing Sun

, Haoran Xu, Reynold Cheng
:
Privacy Preserving Path Recommendation for Moving User on Location Based Service. 33-40 - Xiaodong Cai, Ling Chen, Gencai Chen:

Constructing Adaptive Indoor Radio Maps for Dynamic Wireless Environments. 41-47
UIC 2: Mobile and Ubiquitous Systems
- Yukikazu Nakamoto, Masanori Okamoto, Mohanmed Bhuiya, Akihiro Yamaguchi

, Kenya Sato
, Shinya Honda, Hiroaki Takada:
Android Platform Based on Vehicle Embedded Data Stream Processing. 48-55 - Alessandro Cilardo, Nicola Mazzocca

, Paolo Prinetto:
Exploring a New Dimension in Code Mobility for Ubiquitous Embedded Systems. 56-63 - Teruhiro Mizumoto, Khaled El-Fakih, Keiichi Yasumoto

:
PathSim: A Tool for Finding Minimal Energy Device Operation Sequence for Reaching a Target Context in a Smart-Home. 64-71 - Davide Mulfari, Antonio Celesti

, Massimo Villari
, Antonio Puliafito:
Using Virtualization and Guacamole/VNC to Provide Adaptive User Interfaces to Disabled People in Cloud Computing. 72-79 - Muhammad Shoaib, Hans Scholten, Paul J. M. Havinga:

Towards Physical Activity Recognition Using Smartphone Sensors. 80-87 - Fabricio Nogueira Buzeto, Miriam A. M. Capretz, Carla Denise Castanho, Ricardo P. Jacobi

:
uOS: A Resource Rerouting Middleware for Ubiquitous Games. 88-95
UIC 3: Mobile Social Networking and Crowd Sensing (1)
- Zahra Moradlu, Mohammad-Ali Doostari, Mohammed Gharib

, Ali Movaghar
:
Fully Distributed Self Certified Key Management for Large-Scale MANETs. 96-102 - Yao Yang, Bin Guo, Zhiwen Yu, Huilei He:

Social Activity Recognition and Recommendation Based on Mobile Sound Sensing. 103-110 - Wei Hu, Yaoxue Zhang, Yuezhi Zhou, Kun Deng:

Tagpref: User Preference Modeling by Social Tagging. 111-118 - Luis Miguel Dominguez-Peinado, Marino Linaje

:
Integrating Things and the Smart Mobile Phone Capabilities through the Wireless Web of Things. 119-126 - Bowen Du, Yang Yang, Weifeng Lv:

Understand Group Travel Behaviors in an Urban Area Using Mobility Pattern Mining. 127-133
UIC 4: Mobile Social Networking and Crowd Sensing (2)
- Feng Xia

, Nana Yaw Asabere
, Joel J. P. C. Rodrigues, Filippo Basso, Nakema Deonauth, Wei Wang
:
Socially-Aware Venue Recommendation for Conference Participants. 134-141 - Shenlong Huangfu, Bin Guo, Zhiwen Yu, Dongsheng Li:

Using the Model of Markets with Intermediaries as an Incentive Scheme for Opportunistic Social Networks. 142-149 - Chung-Ming Huang, Chao-Hsien Lee, Hsin-Yi Lai, Chia-Ching Yang:

A Mobile Social Network-Based Group Touring Scheme with FEC Packet Loss Recovery. 150-156 - Zhiyong Yu

, Daqing Zhang, Dingqi Yang:
Where is the Largest Market: Ranking Areas by Popularity from Location Based Social Networks. 157-162 - Chih-An Hsu, Ming-Kai Jiau, Shih-Chia Huang:

An Automatic Face Annotation System Featuring High Accuracy for Online Social Networks. 163-169 - Jun-ichiro Watanabe, Kazuo Yano, Saki Matsuda:

Relationship between Physical Behaviors of Students and Their Scholastic Performance. 170-177
UIC 5: Ubiquitous Intelligence
- Roland Assam, Thomas Seidl

:
Private Map Matching: Realistic Private Route Cognition on Road Networks. 178-185 - Pedro Albuquerque Santos

, Rui Neves Madeira
, Nuno Correia
:
FCT4U - When Private Mobile Displays Meet Public Situated Displays to Enhance the User Experience. 186-193 - Jiawei Zhu, Fabrice Lauri, Abderrafiaa Koukam

, Vincent Hilaire, Marcelo Godoy Simões
:
Improving Thermal Comfort in Residential Buildings Using Artificial Immune System. 194-200 - Okan Turkes, Hans Scholten, Paul J. M. Havinga:

RoRo-LT: Social Routing with Next-Place Prediction from Self-Assessment of Spatiotemporal Routines. 201-208 - Utsav Drolia, Rolando Martins

, Jiaqi Tan, Ankit Chheda, Monil Sanghavi
, Rajeev Gandhi, Priya Narasimhan:
The Case for Mobile Edge-Clouds. 209-215
UIC 6: Intelligent Devices and Smart Environments
- Katsuya Fujii, Keita Higuchi, Jun Rekimoto:

Endless Flyer: A Continuous Flying Drone with Automatic Battery Replacement. 216-223 - Hongwei Xie, XianPing Tao, Haibo Ye, Jian Lu:

WeCare: An Intelligent Badge for Elderly Danger Detection and Alert. 224-231 - Antonio Coronato

, Giovanni Paragliola
:
An Intelligent Monitoring System for Cognitive Impaired People. 232-237 - Ilce Georgievski, Tuan Anh Nguyen, Marco Aiello

:
Combining Activity Recognition and AI Planning for Energy-Saving Offices. 238-245 - Hicham Lakhlef, Hakim Mabed, Julien Bourgeois:

Dynamicity to Save Energy in Microrobots Reconfiguration. 246-253 - Claudio M. de Farias, Luci Pirmez, Flávia Coimbra Delicato, Henrique Soares, Igor Leão dos Santos

, Luiz F. R. C. Carmo:
A Control and Decision System for Smart Buildings. 254-261
UIC 7: Context-Aware Computing
- (Withdrawn) The Right Thing to Do: Automating Support for Assisted Living with Dynamic Decision Networks. 262-269

- Arun Kishore Ramakrishnan, Davy Preuveneers, Yolande Berbers:

A Loosely Coupled and Distributed Bayesian Framework for Multi-context Recognition in Dynamic Ubiquitous Environments. 270-277 - Ana H. O. R. Castillo, Fabricio Nogueira Buzeto, Carla Denise Castanho, Ricardo P. Jacobi

:
An Ontology-Based Model for Context Information Management in Smart Spaces. 278-284 - Jaewoong Lee, Abdelsalam Helal

, Yunsick Sung, Kyungeun Cho:
Context-Driven Control Algorithms for Scalable Simulation of Human Activities in Smart Homes. 285-292 - Eun-Sun Cho

, Joong-Hyun Choi, Sumi Helal
:
Dynamic Parameter Filling for Semantic Exceptions in Context-Aware Systems. 293-300 - Kyon-Mo Yang, Sung-Bae Cho:

STRIPS Planning with Modular Behavior Selection Networks for Smart Home Agents. 301-307
UIC 8: Ubiquitous Intelligence: The Future (Invited Session)
- Guangyu Piao, Qun Jin, Xiaokang Zhou, Shoji Nishimura

, Kanoksak Wattanachote, Timothy K. Shih, Neil Y. Yen:
Eye-Tracking Experiment Design for Extraction of Viewing Patterns in Social Media. 308-313 - Gabriella Castelli, Marco Mamei, Alberto Rosi, Franco Zambonelli

:
Developing Social Applications in SAPERE. 314-320 - Alessandra Esposito, Luciano Tarricone

, Marco Zappatore:
A Linked Data Approach to Electromagnetic Pollution Monitoring. 321-328 - Jia Zhang, Zhipeng Li, Oscar Sandoval, Norman Xin, Yuan Ren, Rodney A. Martin, Bob Iannucci, Martin L. Griss, Steven Rosenberg, Jordan Cao, Anthony Rowe:

Supporting Personizable Virtual Internet of Things. 329-336
The 10th IEEE International Conference on Autonomic and Trusted Computing (IEEE ATC 2013)
ATC 1: Security, Privacy, and SLA Monitoring
- Massimiliano Albanese

, Sushil Jajodia
, Cristian Molinaro
:
A Logic Framework for Flexible and Security-Aware Service Composition. 337-346 - Miltiadis Kandias, Vasilis Stavrou, Nick Bozovic, Lilian Mitrou, Dimitris Gritzalis:

Can We Trust This User? Predicting Insider's Attitude via YouTube Usage Profiling. 347-354 - Nikolaos Pitropakis

, Eleni Darra, Nikos Vrakas, Costas Lambrinoudakis
:
It's All in the Cloud: Reviewing Cloud Security. 355-362 - Asma Al Falasi, Mohamed Adel Serhani, Rachida Dssouli:

A Model for Multi-levels SLA Monitoring in Federated Cloud Environment. 363-370
ATC 2: Reliability and Trustworthiness
- Roberto Di Pietro

, Flavio Lombardi
, Fabio Martinelli, Daniele Sgandurra:
AntiCheetah: An Autonomic Multi-round Approach for Reliable Computing. 371-379 - Annarita Drago, Stefano Marrone

, Nicola Mazzocca
, Annarita Tedesco
, Valeria Vittorini:
Model-Driven Estimation of Distributed Vulnerability in Complex Railway Networks. 380-387 - Rolf Kiefhaber, Ralf Jahr, Nizar Msadek, Theo Ungerer:

Ranking of Direct Trust, Confidence, and Reputation in an Abstract System with Unreliable Components. 388-395 - Nikos Virvilis, Dimitris Gritzalis, Theodoros K. Apostolopoulos:

Trusted Computing vs. Advanced Persistent Threats: Can a Defender Win This Game? 396-403
ATC 3: Autonomic Systems and Behavioral Monitoring
- Andrea Margheri

, Rosario Pugliese
, Francesco Tiezzi:
Linguistic Abstractions for Programming and Policing Autonomic Computing Systems. 404-409 - Domenico Pascarella

, Salvatore Venticinque
, Rocco Aversa:
Autonomic Agents for Real Time UAV Mission Planning. 410-415 - Roberto Koh-Dzul, Mariano Vargas-Santiago

, Codé Diop, Ernesto Exposito
, Francisco Moo-Mena:
A Smart Diagnostic Model for an Autonomic Service Bus Based on a Probabilistic Reasoning Approach. 416-421 - Samane Abdi:

An Autonomic Trust Management Framework for Secure Dynamic Coalition Cooperation. 422-429 - Claudia Becker, Sven Schlinga, Stefan Fischer:

Trustful Data Forwarding in Social Opportunistic Networks. 430-437 - Nathan Shone, Qi Shi

, Madjid Merabti, Kashif Kifayat
:
Towards Efficient Collaborative Behavioural Monitoring in a System-of-Systems. 438-443
ATC 4: Confidentiality and Security
- Jason Cohen, Subatra Acharya:

Towards a Trusted Hadoop Storage Platform: Design Considerations of an AES Based Encryption Scheme with TPM Rooted Key Protections. 444-451 - Sepideh Deliri, Massimiliano Albanese

:
Security-Aware Scheduling of Mission Tasks under Temporal Constraints. 452-457 - Leanid Krautsevich, Fabio Martinelli, Artsiom Yautsiukhin

:
Formal Analysis of Security Metrics with Defensive Actions. 458-465
The 2013 International Symposium on Ubiquitous Intelligence and Autonomic Systems (UIAS 2013)
UIAS 1: Augmented Reality and Smart Environments
- Dan Feng, Dongdong Weng, Weiquan Lu

, Chenchen Sun, Ellen Yi-Luen Do
:
A Browser-Based Perceptual Experiment Platform for Visual Search Study in Augmented Reality System. 466-473 - Sarvenaz Salehi, Gabriele Bleser, Norbert Schmitz, Didier Stricker

:
A Low-Cost and Light-Weight Motion Tracking Suit. 474-479 - Aqeel H. Kazmi

, Michael J. O'Grady
, Gregory M. P. O'Hare
:
Energy Management in the Smart Home. 480-486 - Dipak Surie, Saeed Partonia, Helena Lindgren

:
Human Sensing Using Computer Vision for Personalized Smart Spaces. 487-494 - Antoine Ferreira, Ana M. Bernardos

, Luca Bergesio
, José R. Casar:
ARTHE: Experiencing Projected Augmented Reality with THings of the Everyday. 495-501 - Dan Feng, Dandan Meng, Yupeng Zhang, Dongdong Weng:

Time Machine: A Mobile Augmented Reality System for Tourism Based on Coded-Aperture Camera. 502-506
UIAS 2: Semantic Web and Mobile Computing
- Maria Teresa Andrade

, Fabio Almeida:
Novel Hybrid Approach to Content Recommendation Based on Predicted Profiles. 507-514 - Jong Chang Park, Min Seok Choi, Byoung Joon Lee, Kyung Tae Kim, Hee Yong Youn:

Distributed Semantic Service Discovery for MANET. 515-520 - Dennis Mohan Punjabi, Li-Ping Tung, Bao-Shuh Paul Lin:

CrowdSMILE: A Crowdsourcing-Based Social and Mobile Integrated System for Learning by Exploration. 521-526 - Rocco Aversa, Luca Tasquier

, Salvatore Venticinque
:
Agents Based Monitoring of Heterogeneous Cloud Infrastructures. 527-532 - Chiraz El Hog

, Raoudha Ben Djemaa, Ikram Amous:
Adaptable Web Service Registry for Publishing Profile Annotation Description. 533-538 - Jian He, Chen Hu, Yang Li:

An Autonomous Fall Detection and Alerting System Based on Mobile and Ubiquitous Computing. 539-543
UIAS 3: Trust Computing and Computer Forensic
- Edewede Oriwoh, Paul Sant

:
The Forensics Edge Management System: A Concept and Design. 544-550 - Omowunmi E. Isafiade, Antoine B. Bagula

:
CitiSafe: Adaptive Spatial Pattern Knowledge Using Fp-Growth Algorithm for Crime Situation Recognition. 551-556 - Samer Machara Marquez, Sophie Chabridon

, Chantal Taconet:
Trust-Based Context Contract Models for the Internet of Things. 557-562 - Alessandro Cilardo, Nicola Mazzocca

, Luigi Coppolino:
TrustedSIM: Towards Unified Mobile Security. 563-568 - Peipei Sui, Tianyu Wo, Zhangle Wen, Xianxian Li:

Privacy-Preserving Trajectory Publication against Parking Point Attacks. 569-574 - Zaheer Ahmad, Lishoy Francis, Tansir Ahmed, Christopher Lobodzinski, Dev Audsin, Peng Jiang:

Enhancing the Security of Mobile Applications by Using TEE and (U)SIM. 575-582
UIAS 4: Ad-hoc and Wireless Sensor Networks
- Ehsan Ahvar, Antonio Manuel Ortiz, Noël Crespi:

Improving Decision-Making for Fuzzy Logic-Based Routing in Wireless Sensor Networks. 583-588 - Ferdinand Peper, Naoki Wakamiya, Akifumi Kasamatsu, Shukichi Tanaka, Kenji Leibnitz, Jun-nosuke Teramae

, Katsuyuki Kasai, Akira Otomo:
On Neuro-inspired Wireless Sensor Networks. 589-594 - Erina Takeshtia, Naoki Wakamiya:

Proposal and Evaluation of Attractor Selection-Based Adaptive Routing in Layered Networks. 595-600 - Qihua Yang, Biao Jiang, Tarek N. Saadawi, Ahmed Abdelal, Mitesh Patel:

Support Vector Regression Technique for Multimedia Quality Control in Multicast Networks. 601-606 - Le The Dung

, Beongku An:
The Analysis of Route Availability and Route Stability in Mobile Ad-hoc Wireless Networks. 607-612 - Jen-Chun Chang, Hsin-Lung Wu, Daqiang Zhang:

On Constant-Time-Identification and Privacy-Preserving RFID Protocols: Trade-Off between Time and Memory. 613-618
UIAS 5: Social Engineering
- Juan Luis Carus

, Víctor Peláez, Sonia Garcia, Miguel Ángel Fernández, Gabriel Díaz, Eduardo Alvarez
:
A Non-invasive and Autonomous Physical Activity Measurement System for the Elderly. 619-624 - Tuan Anh Nguyen, Viktoriya Degeler

, Rosario Contarino, Alexander Lazovik
, Doina Bucur
, Marco Aiello
:
Towards Context Consistency in a Rule-Based Activity Recognition Architecture. 625-630 - Kunal Mankodiya

, Vinod Sharma, Rolando Martins
, Ishan Pande, Samay Jain, Neal Ryan, Rajeev Gandhi:
Understanding User's Emotional Engagement to the Contents on a Smartphone Display: Psychiatric Prospective. 631-637 - Hamid Mukhtar

, Djamel Belaïd:
Using Adaptive Feedback for Promoting Awareness about Physical Activeness in Adults. 638-643 - Mohamed Adel Serhani, N. Sertac Artan, H. Jonathan Chao:

Smart End-to-End Infrastructural Solution for Monitoring Patients with Neurological Disorders. 644-649 - Junjun Kong, Yao Guo

, Xiangqun Chen, Weizhong Shao:
Supporting Localized Interactions among Heterogeneous Smart Things with ThingWare. 650-655
The 2013 International Workshop on Intelligent Techniques for Ubiquitous Systems (ITUS 2013)
ITUS 1: Distributed Systems and Networking
- Pardeep Kumar

, Pawani Porambage, Mika Ylianttila
, Andrei V. Gurtov
:
A Mobile Object-Based Secret Key Distribution Scheme for Wireless Sensor Networks. 656-661 - Karima B. Hein, Leander B. Hörmann

, Reinhold Weiss:
Analysis of Threshold-Based Event Detection Algorithms for Wireless Sensor Networks by Fault Injection. 662-667 - Yan Wang, Jiliu Zhou:

Vehicle Type Recognition in WSN Based on ITESP Algorithm. 668-671 - Vincenzo De Florio

, Hong Sun
, Jonas Buys, Chris Blondia:
On the Impact of Fractal Organization on the Performance of Socio-technical Systems. 672-677 - Taariq Mullins, Antoine B. Bagula

:
Monitoring Community Clouds: The Lightweight Network Management Protocol. 678-684 - Yu-Hsiang Jian, Ming-Kai Jiau, Shih-Chia Huang:

Automatic Face Annotation System Used Pyramid Database Architecture for Online Social Networks. 685-690
ITUS 2: Intelligent Environments and Ubiquitous Computing
- Asma Gharsellaoui, Yacine Bellik, Christophe Jacquet:

A Run Time Executable Task Model for Ambient Intelligent Environments. 691-696 - Vinicius Bezerra, Misael C. Junior, Olga Valeria, Constantino D. Neto, Liliam Leal, Marcus Lemos, Carlos Giovanni Carvalho, José Bringel Filho, Raimir Holanda Filho

, Nazim Agoulmine:
An Energy-Efficient Context Management Framework for Ubiquitous Systems. 697-702

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














