


default search action
14th IMIS 2020: Lodz, Poland
- Leonard Barolli, Aneta Poniszewska-Maranda, Hyunhee Park:

Innovative Mobile and Internet Services in Ubiquitous Computing - Proceedings of the 14th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2020), Lodz, Poland, 1-3 July, 2020. Advances in Intelligent Systems and Computing 1195, Springer 2021, ISBN 978-3-030-50398-7 - Admir Barolli, Shinji Sakamoto, Seiji Ohara, Leonard Barolli, Makoto Takizawa:

Performance Evaluation of WMN-PSOSA-DGA Simulation System Considering Linearly Decreasing Vmax Method and Rational Decreament of Vmax Method. 1-10 - Miralda Cuka, Donald Elmazi

, Keita Matsuo, Makoto Ikeda, Leonard Barolli, Makoto Takizawa:
IoT Node Elimination and Selection for Completing Tasks in Opportunistic Networks: A Fuzzy Logic Approach. 11-22 - Kevin Bylykbashi, Ermioni Qafzezi, Makoto Ikeda, Keita Matsuo, Leonard Barolli, Makoto Takizawa:

A Fuzzy-Based Simulation System for Driving Risk Management in VANETs Considering Weather Condition as a New Parameter. 23-32 - Shiyu Li, Baojiang Cui:

Research on Association Analysis Technology of Network Attack Trace Based on Web Log. 33-43 - Liliana Mâta:

Ethical Use of Mobile Technology in the Academic Environment. 44-55 - Szu-Yin Lin, Fang-Yie Leu, Chia-Yin Ko, Ming-Chien Shih, Wei-Jia Tang:

A Hybrid Information-Based Smartphone Indoor-Position Approach. 56-64 - Jiha Kim, Hyewon Kim, WooSeok Hyun, Hae-Duck J. Jeong:

An Accounting Ledger System Using the Hyperledger Fabric-Based Blockchain. 65-72 - Jiyoon Kim, Soobin Ahn, Jiyoung Lim:

Protocol Design for Boarding Confirmation Through Arduino Sensing. 73-80 - Hsing-Chung Chen, Mosiur Rahaman

, Cahya Damarjati
:
A Security Analysis Approach for Secure Color-Code Key Exchange Protocol by Using BAN Logic. 81-93 - Xiao-ou Song, Xiao-Rong Wang:

An UWB Cyclostationary Detection Algorithm Based on Nonparametric Cusum. 94-103 - Tomoyuki Ishida, Kanae Sakamoto:

Proposal of a Disaster Evacuation Support System Using Beacon. 104-113 - Yifeng Dong, Tianhan Gao:

A Convolutional Neural Network Model for Object Detection Based on Receptive Field. 114-124 - Yuchao Wang, Baojiang Cui:

The Study and Realization of a Binary-Based Address Sanitizer Based on Code Injection. 125-134 - Kazuki Ikegami, Hiroaki Kikuchi:

Modeling the Risk of Data Breach Incidents at the Firm Level. 135-148 - Jacek Wytrebowicz

, Michal Goworko:
IoT Cryptosecurity: Overview and Potential Solutions. 149-160 - Nampoina Andriamilanto, Tristan Allard

, Gaëtan Le Guelvouit:
"Guess Who?" Large-Scale Data-Centric Study of the Adequacy of Browser Fingerprints for Web Authentication. 161-172 - Asif Qumer Gill

, Ghassan Beydoun
, Mahmood Niazi, Habib Ullah Khan
:
Adaptive Architecture and Principles for Securing the IoT Systems. 173-182 - Zuan Gu, Tianhan Gao:

A Visual Particle System Based on Mechanism Model Data in Digital Twin. 183-193 - Xinbei Jiang, Tianhan Gao:

An EEG Emotion Classification System Based on One-Dimension Convolutional Neural Networks and Virtual Reality. 194-202 - Atushi Toyama, Kenshiro Mitsugi, Keita Matsuo, Leonard Barolli:

Implementation of a Moving Omnidirectional Access Point Robot and a Position Detecting System. 203-212 - Sai Wu, Zhihui Wang, Zhe Li, Zheng WeiJun, Weiping Shao, Baojuan Ma, Shunyu Yao, Ying Wang:

Uplink Resource Allocation Based on Short Block-Length Regime in Heterogeneous Cellular Networks for Smart Grid. 213-224 - Hyunhee Park:

Multiuser Channel Access with RTS-CTS Algorithm for Li-Fi Communications. 225-233 - Youngho An, Junyoung Park, Insu Oh, Myoungsu Kim, Kangbin Yim:

Design and Implementation of a Novel Testbed for Automotive Security Analysis. 234-243 - Zheng Zhang, Baojiang Cui, Chen Chen:

Reinforcement Learning-Based Fuzzing Technology. 244-253 - Min Yao, Baojiang Cui, Chen Chen:

Research on IoT Device Vulnerability Mining Technology Based on Static Preprocessing and Coloring Analysis. 254-263 - Dapeng Li, Shaodong Zhong, Zhizhang Song, Yijia Guo:

Computer-Aided English Education in China: An Online Automatic Essay Scoring System. 264-278 - Yuanwei Hou, Xiaoxiao Chen, Yongle Hao, Zhiwei Shi, Shiyu Yang:

Survey of Cyberspace Resources Scanning and Analyzing. 279-291 - Yijia Guo, Yuanwei Hou, Yongle Hao, Wenjue Xu:

Modeling and Analysis of Cyberspace Threat Sources Based on Vulnerabilities. 292-303 - Chen Chen, Weikong Qi, Wenting Jiang, Peng Sun:

A Dynamic Instrumentation Technology for IoT Devices. 304-312 - Yiyue Sun:

Theoretical Research and Practical Exploration on the Teaching Reform of Higher Mathematics. 313-323 - Chunming Zhang, Yiyue Sun, Xiaofeng Zhang:

Research on Experimental Teaching Reform of Electronic Technology Course. 324-333 - Xiang Ma, Xuhui Fan, Wei Li, Jiangtao Li, Qiong Li:

The Exploration and Research of Blended Teaching Mode Based on "Internet+" Big Data Cloud Platform. 334-343 - Xuhui Fan, Wei Li, Zhimin Wang, Yiyue Sun, Lili Su:

The Analysis of Higher Mathematics Teaching Strategy Based on the Innovative Teaching Mode. 344-353 - Qingchao Zhu, Yue Wang, Xiao-ou Song, Hongmei Huang:

Design of Gradient Push Algorithm in Time-Varying Directed Graph. 354-363 - Liming Zheng, Yi Zhao:

Generalized Snell's Law and Its Verification by Metasurface. 364-372 - Yuyue Wang, Chen Chen, Baojiang Cui:

A Targeted Fuzzing Technique Based on Neural Networks and Particle Swarm Optimization. 373-383 - Pengfei Xiong, Baojiang Cui, Zishuai Cheng

:
Anomaly Network Traffic Detection Based on Deep Transfer Learning. 384-393 - Qiutong Lin, Bihua Zhuo, Lili Jiao, Li Liao, Jiangtao Guo:

Distributed Facial Feature Clustering Algorithm Based on Spatiotemporal Locality. 394-403 - Shian-Shyong Tseng, Shih-Nung Chen, Tsung-Yu Yang:

Developing an AR-Based Ubiquitous Learning System for a Smart Campus. 404-414 - Anthony Y. H. Liao, Shun-Pin Huang:

The Development and Evaluation of a Smart E-Learning Platform for Programming Instruction. 415-425 - Yue Wang, Qingchao Zhu, Xiao-ou Song, Hongmei Huang, Qiu Yang:

Research on Logistics Distribution Model of E-commerce Based on Improved Ant Colony Algorithm. 426-435 - Dohyeon Bak, Mintae Kim, Jonghoon Lim, Raeseung Jang, Wonyoung Jang, Sun-Young Lee:

Logical Network Separation and Update Inducing Techniques of Non-updated Vaccine Host by Creating Flow Rule in SDN. 436-446 - Won-Bin Kim, Im-Yeong Lee, Kangbin Yim:

Group Delegated ID-Based Proxy Re-encryption for PHR. 447-456 - Eunseon Jeong, Junyoung Park, Insu Oh, Myoungsu Kim, Kangbin Yim:

Analysis on Account Hijacking and Remote Dos Vulnerability in the CODESYS-Based PLC Runtime. 457-467 - Seongmin Park, Bomin Choi, Youngkwon Park, Dowon Kim, Eunseon Jeong, Kangbin Yim:

Vestiges of Past Generation: Threats to 5G Core Network. 468-480 - Kuei-Yuan Wang, Ying-Li Lin, Chien-Kuo Han, Tsung-Chih Hung:

Feasibility Study of Introducing Daily Rental Suites Business Model into Long-Term Care Institutions. 481-489 - Shyh-Weir Tzang

, Chun-Ping Chang, Chih-Hsing Hung, Yung-Shun Tsai:
Black-Litterman Model and Momentum Strategy: Evidence of Taiwan Top 50 ETF. 490-497 - Chun-Ping Chang, Munkhnaran Duurenjargal, Zolzaya Batjargal, Shyh-Weir Tzang

:
Investment Timing and External Effects. 498-503 - Chun-Ping Chang, Yung-Shun Tsai, Shyh-Weir Tzang

, Zolzaya Batjargal:
The Choice Between Foreign Direct Investment and Export with Industry Competition and Marginal Cost. 504-509 - Yung-Shun Tsai, Shyh-Weir Tzang, Chun-Ping Chang:

Information Asymmetry, Market Liquidity and Abnormal Returns. 510-518 - Mei-Hua Huang, Chia-Hui Hsieh, Perng-Fei Huang, Chiung-Yen Chen:

Examining the Impacts of Strategic Alliance - Examples of the Taiwan Semiconductor Industry. 519-528 - Ying-Li Lin, Kuei-Yuan Wang, Li-Lu Hsu:

The Relationship Between Long-Term Care Issues and Disability Insurance. 529-539 - Chiung-Yen Chen, Mei-Hua Huang, Kuan-Ling Li, Ho-Yun Chao, Ke-Jie Shen, Szu-Han Yu:

Is Enforcing the Production and Filing of Corporate Social Responsibility Reports Conducive to Improving Corporate Performance? 540-551 - Ya-Lan Chan, Sue-Ming Hsu, Mei-Hua Liao:

An Inventory Model for Perishable Items Under Upstream and Downstream Trade Credit. 552-560 - Ya-Lan Chan, Sue-Ming Hsu, Neo Koe Hsin, Mei-Hua Liao:

The Social Performance of University Social Responsibility Elderly Project: The Perspective of Social Return on Investment. 561-572 - Mei-Hua Liao, Wei-Li Kuo, Ya-Lan Chan:

Investment Concentration and Home Bias. 573-578 - Mei-Hua Liao, Chieh-Lin He, Ruirui Cui, Ya-Lan Chan:

Investor Sentiment and Governance Mechanisms. 579-585 - Yiqi Sun, Baojiang Cui, Chen Chen, Yifei Wang:

A Static Instrumentation Method for IoT Firmware ELF Binary Emulation Patching. 586-596 - Tianhan Gao, Lei Zhao:

Pseudonym Schemes Based on Location Privacy Protection in VANETs: A Survey. 597-605 - Xiao-Feng Zhang:

Application of Blockchain Technology in Data Management of University Scientific Research. 606-613 - Xiaochen Wang, Baojiang Cui, Xinda Xu, Qian Ma:

Research on Vulnerability Site Location and Vulnerability Similarity Technology. 614-623 - Nobuyuki Teraura, Isao Echizen, Keiichi Iwamura:

Implementation of Digital Signature on QR Symbol by Area Division Using Rhombic Sub-cells. 624-638

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














