


default search action
19. NBiS 2016: Ostrava, Czech Republic
- 19th International Conference on Network-Based Information Systems, NBiS 2016, Ostrava, Czech Republic, September 7-9, 2016. IEEE Computer Society 2016, ISBN 978-1-5090-0979-4

NBiS 2016
Session 1: Intelligent Networking
- Shinji Sakamoto

, Tetsuya Oda, Makoto Ikeda, Leonard Barolli, Fatos Xhafa, Isaac Woungang:
Node Placement in Wireless Mesh Networks: A Comparison Study of WMN-SA and WMN-PSO Simulation Systems. 1-8 - Tetsuya Oda, Donald Elmazi

, Masafumi Yamada, Ryoichiro Obukata, Leonard Barolli, Makoto Takizawa
:
Experimental Results of a Raspberry Pi Based WMN Testbed in Indoor Environment: A Comparison Study of LoS and NLoS Scenarios. 9-14 - Ilir Shinko

, Tetsuya Oda, Admir Barolli, Vladi Kolici
, Leonard Barolli, Fatos Xhafa:
Performance Analysis of WMNs by WMN-GA Simulation System for Exponential Distribution Considering EDCA and DCF. 15-21 - Admir Barolli, Tetsuya Oda, Ilir Shinko

, Leonard Barolli, Fatos Xhafa, Makoto Takizawa
:
Performance Analysis of WMNs by WMN-GA Simulation System for Different WMN Architectures and TCP Congestion-Avoidance Algorithms Considering Uniform Distribution. 22-28 - Donald Elmazi

, Evjola Spaho
, Elis Kulla, Tetsuya Oda, Makoto Ikeda, Leonard Barolli:
Selection of Actor Nodes in Wireless Sensor and Actor Networks Considering as a New Parameter Actor Congestion Situation. 29-36 - Keita Matsuo, Tetsuya Oda, Admir Barolli, Makoto Ikeda, Leonard Barolli, Fatos Xhafa:

A GA-based Simulation System for WMNs: Performance Analysis for Different WMN Architectures Considering Transmission Rate and OLSR Protocol. 37-41
Session 2: Network Protocols and Models
- Shigenari Nakamura

, Tomoya Enokido, Makoto Takizawa
:
Subscription Initialization (SI) Protocol to Prevent Illegal Information Flow in Peer-to-Peer Publish/Subscribe Systems. 42-49 - Dilawaer Duolikun, Ryo Watanabe, Tomoya Enokido, Makoto Takizawa

:
A Model for Energy-Aware Migration of Virtual Machines. 50-57 - Noriki Uchida, Kenta Ito, Go Hirakawa, Yoshitaka Shibata:

Evaluations of Wireless V2X Communication Systems of for Winter Road Surveillance Systems. 58-63 - Evjola Spaho

, Kevin Bylykbashi
, Leonard Barolli, Vladi Kolici
, Algenti Lala:
Evaluation of Different DTN Routing Protocols in an Opportunistic Network Considering Many-to-One Communication Scenario. 64-69 - Antonio Colella, Aniello Castiglione

, Alfredo De Santis
, Christian Esposito
, Francesco Palmieri:
Privacy-Aware Routing for Sharing Sensitive Information across Wide-Area Networks. 70-75 - Masaki Narita, Keisuke Kamada, Kanayo Ogura, Bhed Bahadur Bista, Toyoo Takata:

A Study of Packet Sampling Methods for Protecting Sensors Deployed on Darknet. 76-83
Session 3: Mobile and Wireless Networks
- Saman Cheema, Nadeem Javaid

, Shahzad Amin Sheikh, Zahoor Ali Khan
, Umar Qasim:
A Balanced Energy Adaptive Routing Protocol with Sector Based Node Selection in Underwater WSNs. 84-90 - Arshad Sher

, Nadeem Javaid
, Ghufran Ahmed
, Saif ul Islam
, Umar Qasim, Zahoor Ali Khan
:
MC: Maximum Coverage Routing Protocol for Underwater Wireless Sensor Networks. 91-98 - Faisal Alfouzan, Alireza Shahrabi

, Seyed Mohammad Ghoreyshi
, Tuleen Boutaleb:
Performance Comparison of Sender-Based and Receiver-Based Scheduling MAC Protocols for Underwater Sensor Networks. 99-106 - Yuria Oigawa, Fumiaki Sato:

An Improvement in Zone Routing Protocol Using Bloom Filter. 107-113 - Monika Pathak, Sanjay K. Dhurandher, Isaac Woungang, Bhagyashri Tushir, Vinesh Kumar

, Makoto Takizawa
, Leonard Barolli:
Power Control Scheme for Underlay Approach in Cognitive Radio Networks. 114-118 - Khizar Hameed, Muhammad Saleem Khan, Idrees Ahmed

, Zuhaib U. Ahmad, Abid Khan
, Aun Haider, Nadeem Javaid
:
A Zero Watermarking Scheme for Data Integrity in Wireless Sensor Networks. 119-126
Session 4: Network Security and Privacy
- Tomoka Azakami, Chihiro Shibata, Ryuya Uda:

Challenge of Deep Learning against CAPTCHA with Amodal Completion and Aftereffects by Colors. 127-134 - Hirofumi Nakakoji, Yasuhiro Fujii, Yoshiaki Isobe, Tomohiro Shigemoto, Tetsuro Kito, Naoki Hayashi, Nobutaka Kawaguchi, Naoki Shimotsuma, Hiroaki Kikuchi:

Proposal and Evaluation of Cyber Defense System Using Blacklist Refined Based on Authentication Results. 135-139 - Rio Hosoi, Takamichi Saito, Takayuki Ishikawa, Daichi Miyata, Yongyan Chen:

A Browser Scanner: Collecting Intranet Information. 140-145 - Jihoon Hong, Mirang Park, Naonobu Okazaki:

SGM: A Subgroup Management Scheme Using K-Means Clustering in M2M Systems. 146-151 - Tetsuya Hirakawa, Kanayo Ogura, Bhed Bahadur Bista, Toyoo Takata:

A Defense Method against Distributed Slow HTTP DoS Attack. 152-158 - Masahiro Fujita, Yuto Mano, Takuya Kaneko, Kenta Takahashi, Masakatsu Nishigaki

:
A Micro Biometric Authentication Mechanism Considering Minute Patterns of the Human Body: A Proposal and the First Attempt. 159-164
Session 5: Database, Data Mining and Big Data
- Alba Amato

, Rocco Aversa, Beniamino Di Martino, Salvatore Venticinque
:
A Cyber Physical System of Smart Micro-Grids. 165-172 - Nadeem Iftikhar

, Xiufeng Liu
, Finn Ebertsen Nordbjerg
, Sergiu Danalachi:
A Prediction-Based Smart Meter Data Generator. 173-180 - Tanaphol Suebchua, Arnon Rungsawang, Hayato Yamana

:
Adaptive Focused Website Segment Crawler. 181-187 - Hirotoshi Cho, Hiroaki Shiokawa, Hiroyuki Kitagawa

:
JsFlow: Integration of Massive Streams and Batches via JSON-based Dataflow Algebra. 188-195 - Muhammad Babar Rasheed, Muhammad Awais, Nadeem Javaid

, Waseem Nazar, Umar Qasim, Zahoor Ali Khan
:
Transient Stability Analysis of an Islanded Microgrid under Variable Load. 196-203
Session 6: Energy Efficient Networks
- Tam Nguyen Kieu, Khanh Nhan Nguyen Huu, Long Nguyen Ngoc, Hung Ha Duy

, Thuan Do Dinh, Miroslav Voznák
:
A Performance Analysis in the One-Way Full Duplex Relaying Network. 204-209 - Hiroki Kataoka, Atsuhiro Sawada, Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa

:
Multi-level Power Consumption and Computation Models and Energy-Efficient Server Selection Algorithms in a Scalable Cluster. 210-217 - Atsuhiro Sawada, Hiroki Kataoka, Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa

:
Selection Algorithms to Select Energy-Efficient Servers for Storage and Computation Processes. 218-225 - Malik Najmus Siraj, Nadeem Javaid

, Qaisar Shafi, Zaheer Ahmed, Umar Qasim, Zahoor Ali Khan
:
Energy Aware Dynamic Routing Using SDN for a Campus Network. 226-230 - Tomoya Enokido, Makoto Takizawa

:
The Improved Redundant Delay Time-Based (IRDTB) Algorithm to Perform Computation Type Application Processes in Heterogeneous Server Clusters. 231-238 - Anwar Khan, Mudassir Ejaz, Nadeem Javaid

, Muhammad Qaisar Azeemi, Umar Qasim, Zahoor Ali Khan
:
EEORS: Energy Efficient Optimal Relay Selection Protocol for Underwater WSNs. 239-245
Session 7: Multimedia Applications
- Juraj Bienik

, Miroslav Uhrina
, Michal Kuba
, Martin Vaculík:
Performance of H.264, H.265, VP8 and VP9 Compression Standards for High Resolutions. 246-252 - Yuto Ishida, Takahiro Uchiya, Ichi Takumi:

Recommendation System that Presents the Recommendation Sentence in Alignment with the Contents. 253-259 - Nobuyoshi Sato, Noriyuki Umeki, Yoshitoshi Murata, Akimasa Suzuki:

Instant Video Share and View System for Ski-Jump Training Using Cheap Devices. 260-266 - Toshiyuki Haramaki

, Hiroaki Nishino:
An Engineering Education Support System Using Projection-Based AR. 267-272 - Yi Liu, Tetsuya Oda, Evjola Spaho

, Keita Matsuo, Leonard Barolli, Fatos Xhafa:
A Fuzzy-Based Reliaility for JXTA-overlay P2P Platform Considering Data Download Speed, Peer Congestion Situation, Number of Interaction and Packet Loss Parameters. 273-279
ADPNA 2016
Session 1: Distributed and Parallel Systems
- Shigeaki Tanimoto, Shunsuke Shiraki, Motoi Iwashita, Tohru Kobayashi, Hiroyuki Sato, Atsushi Kanai:

Risk Assessment Based on User's Viewpoint for Mobile Ad Hoc Network. 280-285 - Toru Kobayashi, Kazushige Katsuragi, Taishi Miyazaki, Kenichi Arai, Tomoya Sakai, Makoto Fujimura:

Social Media Mediation System for Elderly People: Message Exchange Learning Type Switching Method. 286-291 - Ryo Watanabe, Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa

:
An Eco Model of Process Migration with Virtual Machines. 292-297 - Nanami Imada, Kazunori Ueda:

Peer-to-Peer Network System and Application Design on Multiple Virtual Networks. 298-302 - Li Chen:

The Optimization of PID Control Strategy in VAV System Based on Bacterial Foraging Algorithm. 303-306 - Yuki Shinotsuka, Tomoyuki Ishida, Kazuhiro Takahagi, Misaki Iyobe, Norio Akatsu, Kaoru Sugita, Noriki Uchida, Yoshitaka Shibata:

Proposal of a Zoo Walk Navigation System for Regional Revitalization. 307-310
DEMoC 2016
Session 1: Data Engineering and Mobile Computing
- Satoru Matsumoto, Tomoki Yoshihisa, Tomoya Kawakami, Yoshimasa Ishi, Yuuichi Teranishi:

A Distributed Video Processing System for Internet Live Broadcasting Services. 311-316 - Ruiwei Shen, Tsutomu Terada, Masahiko Tsukamoto:

A Navigation System for Controlling Sightseeing Route by Changing Presenting Information. 317-322 - Kazuya Murao

, Tsutomu Terada, Ai Yano, Ryuichi Matsukura:
Estimating Trajectory of Inhabitants with Sparsely Aligned Infrared Sensors. 323-329 - Takeshi Ozaki, Yusuke Gotoh:

Hybrid Broadcasting System for Webcast. 330-335 - Akiyo Nadamoto, Shunsuke Hanai, Hidetsugu Nanba

:
Clustering for Similar Recipes in User-Generated Recipe Sites Based on Main Ingredients and Main Seasoning. 336-341 - Yuta Kusamura, Yusuke Kozawa

, Toshiyuki Amagasa
, Hiroyuki Kitagawa
:
GPU Acceleration of Content-Based Image Retrieval Based on SIFT Descriptors. 342-347
HETNET 2016
Session 1: Heterogeneous Networking and Applications
- Hiroki Nakayama, Shigenari Nakamura

, Tomoya Enokido, Makoto Takizawa
:
Topic-Based Causally Ordered Delivery of Event Messages in a Peer-to-Peer (P2P) Model of Publish/Subscribe Systems. 348-354 - Mirjeta Alinci, Takaaki Inaba, Donald Elmazi

, Evjola Spaho
, Vladi Kolici
, Leonard Barolli:
Improving Node Security in MANET Clusters: A Comparison Study of Two Fuzzy-Based Systems. 355-363 - Torsak Soontornphand, Juggapong Natwichai

:
Joint Attack: A New Privacy Attack for Incremental Data Publishing. 364-369 - Zengfeng Wang, Yujuan Sun, Hao Zhang, Tingting Lu:

Two-Stage Centroid Localization for Wireless Sensor Networks Using Received Signal Strength. 370-375 - Yusuke Gotoh, Yuki Takagi:

Proposition of Division-Based Broadcasting System over Wireless LAN. 376-381 - Muhammad Zain-ul-Abidin, Muhammad, Hammad Maqsood, Umar Qasim, Zahoor Ali Khan

, Nadeem Javaid
:
Improved Genetic Algorithm Based Energy Efficient Routing in Two-Tiered Wireless Sensor Networks. 382-386
INVITE 2016
Session 1: Multimedia Applications and Virtual Reality
- Tetsuro Ogi, Kenichiro Ito

, Shigeyuki Konita:
Multilingual Digital Signage Using iBeacon Communication. 387-392 - Go Hirakawa, Ryoichi Nagatsuji, Yoshitaka Shibata:

A Collection and Delivery Method of Contents in Tourism with Location Information. 393-396 - Akio Doi, Kenji Oshida, Y. Takashima, Kenji Sakakibara, Tomoya Itoh:

3D Modeling of Reconstruction Plan at Sanriku Coast for Great East Japan Earthquake: Visualization of the Reconstruction Plan for Effective Information Sharing. 397-400 - Hideo Miyachi, Koji Koyamada, Daisuke Matsuoka, Isamu Kuroki:

Fusion Visualization System as an Open Science Foundation. 401-404 - Yasuo Ebara:

Fundamental Consideration on Possibility of Meta Realistic Sensation Communication Technology. 405-409 - Yoshitaka Shibata, Katsumi Sasaki:

Tourist Information System Based on Beacon and Augumented Reality Technologies. 410-413
INWC 2016
Session 1: Mobile Comuting and Communication
- Takaaki Inaba, Donald Elmazi

, Shinji Sakamoto
, Tetsuya Oda, Makoto Ikeda, Leonard Barolli:
Performance Evaluation of a Fuzzy-Based Connection Admission Control System for Wireless Cellular Networks Considering Security and Priority Parameters. 414-419 - Daichi Koga, Makoto Ikeda, Leonard Barolli:

An Improved Message Suppression Controller Considering Delayed Acknowledgment for VANETs. 420-424 - Hiroshi Maeda

, Jianming Jin, Kazuya Tomiura:
Control of Envelope Pulse through Nonlinear and Dispersive Medium. 425-428 - Hina Nasir, Nadeem Javaid

, Shaharyar Mahmood, Umar Qasim, Zahoor Ali Khan
, Furqan Ahmed:
Distributed Topology Control Protocols for Underwater Sensor Networks. 429-436 - Yuki Sakai, Tetsuya Oda, Makoto Ikeda, Leonard Barolli:

Performance Evaluation of an Accessory Category Recognition System Using Deep Neural Network. 437-441 - Hiroshi Maeda

, Kazuya Tomiura, Jianming Jin:
Numerical and Experimental Study on Transmission Spectrum of Waveguide with Periodic Structure. 442-446
ISSE 2016
Session 1: Intelligent and Smart Environments
- Ryoichiro Obukata, Tetsuya Oda, Donald Elmazi

, Makoto Ikeda, Keita Matsuo, Leonard Barolli:
Performance Evaluation of an Ambient Intelligence Testbed for Improving Quality of Life: Evaluation Using Mean Shift Clustering Algorithm. 447-450 - Masafumi Yamada, Tetsuya Oda, Yi Liu, Keita Matsuo, Makoto Ikeda, Leonard Barolli:

Performance Evaluation of an IoT-based e-Learning Testbed Considering OLSR Protocol in a NLoS Environment. 451-457 - Adnan Ahmad

, Nadeem Javaid
, Saeed Ahmad, Shah Saud
, Umar Qasim, Zahoor Ali Khan
:
Realistic Home Energy Management System Using Exogenous Grid Signals. 458-463 - Yuto Ishida, Takahiro Uchiya, Kouhei Yamamoto, Daisuke Yamamoto, Ryota Nishimura

, Ichi Takumi:
Related Word Recommendation Mechanism for Speech Dialogue System. 464-468 - Zengfeng Wang, Hao Zhang, Tingting Lu:

Localization in Wireless Sensor Networks Based on RSS Rank Vectors. 469-473
TwCSec
2016 Session 1: Secure Systems and Applications
- Syrine Chatti, Habib Ounelli:

An Intrusion Tolerance Scheme for a Cloud of Databases Environment. 474-479 - Tetsuya Oda, Ryoichiro Obukata, Masafumi Yamada, Masahiro Hiyama, Leonard Barolli, Makoto Takizawa

:
A Neural Network Based User Identification for Tor Networks: Comparison Analysis of Different Activation Functions Using Friedman Test. 480-487 - Feng Guo, Ying Wang:

Panoramic Image Mosaics Using Local Wavelet-Features. 488-491 - Yujuan Sun, Qiuming Ma:

Three Dimensional Reconstruction from Single Uniform Texture Image with Unknown Lighting Conditions. 492-495 - Minghao Zhao, Zhen Li, Yilei Wang, Qiuliang Xu:

Longest Common Sub-sequence Computation and Retrieve for Encrypted Character Strings. 496-499 - Takamichi Saito, Ryohei Watanabe, Shuta Kondo, Shota Sugawara, Masahiro Yokoyama:

A Survey of Prevention/Mitigation against Memory Corruption Attacks. 500-505
WSSM 2016
Session 1: Web Services
- Ryousuke Iiya, Erjing Zhou, Michitoshi Niibori, Masaru Kamada, Osamu Saitou, Susumu Shibusawa:

A Handy Real-Time Location System for Community Bus Service. 506-509 - Jun Iio:

Attendance Management System Using a Mobile Device and a Web Application. 510-515 - Masaki Kohana, Shusuke Okamoto:

A Reservation System for Oral Exam of Programming Class. 516-519 - Daiki Ito, Michitoshi Niibori, Masaru Kamada:

A Real-Time Web-Cast System for Classes in the BYOD Style. 520-525 - Yoshihiro Kawano, Eiji Nunohiro:

A Proposal of Distributed Autonomous Cooperative System about Exclusive Web Crawling for Cyber Security. 526-529
Session 2: Analysis and Developments
- Shumpei Fujii, Michitoshi Niibori, Masaru Kamada:

A Preliminary Experiment of Tweet Filtering by Back Propagation. 530-535 - Tadashi Okada, Jun Iio, Yoshihiko Kubota, Tatsuhiro Yonekura:

An Intensive Analysis on the Usage Situation of the Mobile Services in Japanese High Schools: Why and How are They Used? 536-540 - Shusuke Okamoto, Masaki Kohana:

A C++ Header Library for Web Applications. 541-545 - Marina Nakano, Emi Masuda, Masaru Kamada:

A Structure Editor for the English Language. 546-549 - Hiroki Sakaji, Masaki Kohana, Akio Kobayashi, Hiroyuki Sakai:

Estimation of Tags via Comments on Nico Nico Douga. 550-553

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














