default search action
37th COMPSAC Workshops 2013: Kyoto, Japan
- IEEE 37th Annual Computer Software and Applications Conference, COMPSAC Workshops 2013, Kyoto, Japan, July 22-26, 2013. IEEE Computer Society 2013, ISBN 978-1-4799-2159-1
CFSE 2013: The Fifth IEEE International Workshop on Computer Forensics in Software Engineering
CFSE 2013 Session 1
- Hyun-il Lim:
Customizing k-Gram Based Birthmark through Partial Matching in Detecting Software Thefts. 1-4 - Wei-Ho Tsai, Cin-Hao Ma:
Fingerprint Clustering for Forensic Data Indexing. 5-10 - Narn-Yih Lee, Zih-Ling Chen, Fu-Kun Chen:
Cloud Server Aided Computation for ElGamal Elliptic Curve Cryptosystem. 11-15
CFSE 2013 Session 2
- Y. Liang, Kam-Pui Chow, Lucas Chi Kwong Hui, Jun-bin Fang, Siu-Ming Yiu, Shuhui Hou:
Towards a Better Similarity Measure for Keyword Profiling via Clustering. 16-20 - Wataru Takahashi, Ryôichi Sasaki, Tetsutaro Uehara:
Development and Evaluation of Guideline Total Support System for Evidence Preservation by Using an Android Phone. 21-26
IWSC 2013: The 10th IEEE International Workshop on Software Cybernetics
IWSC 2013 Session 1
- Qing Zhou, Lin Liu:
Understanding Requirements for Online Services Based on Users' Behavioural Data Analysis. 27-34 - Wenlong Zhu, Bei-Bei Yin, Kai-Yuan Cai, Dazhi Huang, Stephen S. Yau:
An Adaptive Control Strategy for Managing Concurrent Service Requests in Service-Based Systems. 35-40
IWSC 2013 Session 2
- JoonSeok Park, Keunhyuk Yeom:
A Feedback-Based Approach to Validate SWRL Rules for Developing Situation-Aware Software. 41-46 - Changhai Nie, Siyang Chen, Hareton Leung, Kai-Yuan Cai:
A Case Study of Adaptive Combinatorial Testing. 47-52 - Yoshinobu Tamura, Shigeru Yamada:
Service-Oriented Maintainability Modeling and Analysis for a Cloud Computing. 53-58
STA 2013: The Fifth IEEE International Workshop on Software Test Automation
STA 2013 Session 1
- Haruto Tanno, Takashi Hoshino:
Reducing the Number of Initial Database States for Integration Testing. 59-64 - Mostafa Erfani, Iman Keivanloo, Juergen Rilling:
Opportunities for Clone Detection in Test Case Recommendation. 65-70
STA 2013 Session 2
- Valentin Chimisliu, Franz Wotawa:
Using Dependency Relations to Improve Test Case Generation from UML Statecharts. 71-76 - Andrea Calvagna, Emiliano Tramontana:
Incrementally Applicable t-Wise Combinatorial Test Suites for High-Strength Interaction Testing. 77-82
STPSA 2013: The Eighth IEEE International Workshop on Security, Trust, and Privacy for Software Applications
STPSA 2013 Session 1
- Wenyao Sha, Yongxin Zhu, Tian Huang, Meikang Qiu, Yan Zhu, Qiannan Zhang:
A Multi-order Markov Chain Based Scheme for Anomaly Detection. 83-88 - Jaehoon Kim:
Hybrid Authorization Conflict Detection by Inferring Partial Data in RDF Access Control. 89-94 - Dong Chen, Yang Zhang, Liang Cheng, Yi Deng, Xiaoshan Sun:
Heuristic Path Pruning Algorithm Based on Error Handling Pattern Recognition in Detecting Vulnerability. 95-100
STPSA 2013 Session 2
- Amina Souag, Camille Salinesi, Isabelle Wattiau, Haris Mouratidis:
Using Security and Domain Ontologies for Security Requirements Analysis. 101-107 - Xuan Zhang, Tong Li, Zhongwen Xie, Fei Dai, Jinzhuo Liu:
A Petri Net Based Model for Trustworthy Software Process Composition. 108-114 - Xiaoguang Wang, Yong Qi, Yue-hua Dai, Jianbao Ren:
Transparent Security-Sensitive Process Protection via VMM-Based Process Shadowing. 115-120
STPSA 2013 Session 3
- Rahena Akhter, Rownak Jahan Chowdhury, Keita Emura, Tamzida Islam, Mohammad Shahriar Rahman, Nusrat Rubaiyat:
Privacy-Preserving Two-Party k-Means Clustering in Malicious Model. 121-126 - Shunsuke Aoki, Masayuki Iwai, Kaoru Sezaki:
Privacy-Aware Community Sensing Using Randomized Response. 127-132
MVDA 2013: The Second IEEE Workshop on Modeling and Verifying Distributed Applications
MVDA 2013 Session 1
- Jinho On, Yeongbok Choe, Moonkun Lee:
An Abstraction Method of Behaviors for Process Algebra. 133-138 - Michaël Lauer, John Mullins, Moez Yeddes:
Cost Optimization Strategy for Iterative Integration of Multi-critical Functions in IMA and TTEthernet Architecture. 139-144 - Vedran Hrgovcic, Dimitris Karagiannis, Robert Woitsch:
Conceptual Modeling of the Organisational Aspects for Distributed Applications: The Semantic Lifting Approach. 145-150 - Marat Zhanikeev:
A Practical Software Model for Content Aggregation in Browsers Using Recent Advances in HTML5. 151-156
MVDA 2013 Session 2
- Lamia Zouhaier, Yousra Bendaly Hlaoui, Leila Jemni Ben Ayed:
Building Adaptive Accessible Context-Aware for User Interface Tailored to Disable Users. 157-162 - Eun-Sun Cho, Tae-Seob Yoon, Joong-Hyun Choi, Joon-Young Paik, Sumi Helal:
An Integrated Formal Model for Context-Aware Systems. 163-168 - Chiraz El Hog, Raoudha Ben Djemaa, Ikram Amous:
ArgoAWS-UML: Modeling Tool for Adaptive Web Services. 169-174
MVDA 2013 Session 3
- Ishtiaq Ahmed Choudhry, Nazir Ahmad Zafar, Mohammed Al-Zahrani:
Modeling and Verification of Call Setup Dynamics of LTE Communication Systems. 175-180 - Ping Luo, Rui Wang, Xiaojuan Li, Yong Guan, Hongxing Wei, Jie Zhang:
Model Checking for SpaceWire Link Interface Design Using Uppaal. 181-186 - Ahlem Ben Younes, Yousra Bendaly Hlaoui, Leila Jemni Ben Ayed, Rahma Jlassi:
Refinement Based Modeling of Workflow Applications Using UML Activity Diagrams. 187-192
SAPSE 2013: The Fith IEEE International Workshop on Security Aspects in Processes and Service Engineering
SAPSE 2013 Session 1
- Shigeru Shimada, Isao Echizen:
Predictive Notification Service of Privacy Invasion on Posting Pictures to SNS. 193-199 - Meiko Jensen:
Towards Privacy-Friendly Transparency Services in Inter-organizational Business Processes. 200-205 - Tian Huang, Yan Zhu, Qiannan Zhang, Yongxin Zhu, Dongyang Wang, Meikang Qiu, Lei Liu:
An LOF-Based Adaptive Anomaly Detection Scheme for Cloud Computing. 206-211 - Yuuki Kajiura, Atsushi Kanai, Shigeaki Tanimoto, Hiroyuki Sato:
A File-Distribution Approach to Achieve High Availability and Confidentiality for Data Storage on Multi-cloud. 212-217
METHOD 2013: The Second IEEE International Workshop on Methods for Establishing Trust with Open Data
METHOD 2013 Session 1
- Tom De Nies, Sam Coppens, Ruben Verborgh, Miel Vander Sande, Erik Mannens, Rik Van de Walle, Danius T. Michaelides, Luc Moreau:
Easy Access to Provenance: An Essential Step Towards Trust on the Web. 218-223 - Nadim Sarrouh:
Formal Modeling of Trust-Based Access Control in Dynamic Coalitions. 224-229 - Thomas Holst, Edzard Höfig:
Investigating the Relevance of Linked Open Data Sets with SPARQL Queries. 230-235 - Konrad Johannes Reiche, Edzard Höfig:
Implementation of Metadata Quality Metrics and Application on Public Government Data. 236-241
NETSAP 2013: The Fourth IEEE International Workshop on Network Technologies for Security, Administration, and Protection
NETSAP 2013 Session 1
- Masayuki Okada, Nasato Goto, Akira Kanaoka, Eiji Okamoto:
A Device for Transparent Probabilistic Packet Marking. 242-247 - Akihito Nakamura:
Towards Unified Vulnerability Assessment with Open Data. 248-253 - Noppawat Chaisamran, Takeshi Okuda, Suguru Yamaguchi:
Using a Trust Model to Reduce False Positives of SIP Flooding Attack Detection in IMS. 254-259 - Shin-Shung Chen, Tzong-Yih Kuo, Yu-Wen Chen:
Security Software Based on Windows NDIS Filter Drivers. 260-264
EUCASS 2013: The Fourth IEEE International Workshop on Enablers for Ubiquitous Computing
EUCASS 2013 Session 1
- Chin-Chih Chang, Judy C. R. Tseng, Hao-Yun Chang:
A Patrol Guidance Mechanism in a Context-Aware Environment. 265-270 - Asanga Nimalasena, Vladimir Getov:
System Evolution for Unknown Context through Multi-action Evaluation. 271-276 - Rui Zhou, Jing Li, Jinghan Wang, Guowei Wang:
A Knowledge-Based Development Approach with Fact and Service for End-User in Cloud Computing. 277-282
EUCASS 2013 Session 2
- Yutaka Arakawa, Takayuki Nakamura, Motonori Nakamura, Hajime Matsumura:
UBI-Tree: Indexing Method for Schema-Less Search. 283-288 - Tomoya Kawakami, Yoshimasa Ishi, Tomoki Yoshihisa, Yuuichi Teranishi:
A P2P Delivery Method for Sensor Data Stream Based on Load Estimation from Collection Cycles. 289-294
ITeS 2013: The Fifth IEEE International Workshop on IT-Enabled Services
ITeS 2013 Session 1
- Tung-Hsiang Chou:
The Service Design of Intelligent Robot (iRobot) for Entertainment. 295-299 - Sumiko Miyata, Hirotsugu Kinoshita, Tetsuya Morizumi, Li Chao:
Game theoretic analysis of the value exchange system. 300-305
ITeS 2013 Session 2
- Yu-Lung Wu, Chi-Jui Chang, Yu-Hui Tao:
Closed-Circuit Television-Enabled Service: A Review of Security and Privacy Issues. 306-309 - Rungsiman Nararatwong, Nagul Cooharojananone, Nattarat Pongsupankij, Rajalida Lipikorn, Kanokwan Atchariyachanvanich:
The Study of Brand Perception through Social Network Sites and Corporate Social Responsibility Programs. 310-315
ESAS 2013: The Eighth IEEE International Workshop on Engineering Semantic Agents - Intelligence and Robotics
ESAS 2013 Session 1
- Fu-Shiung Hsieh, Jim-Bon Lin:
A Problem Solver for Scheduling Workflows in Multi-agents Systems Based on Petri Nets. 316-321 - Reen-Cheng Wang, Ting-Han Su, Cheng-Peng Ma, Shih-Hung Chen, Hsi-Ho Huang:
Social Network Data Retrieving Using Semantic Technology. 322-327 - Behnam Rahnama, Makbule Canan Ozdemir, Yunus Kiran, Atilla Elçi:
Design and Implementation of a Novel Weighted Shortest Path Algorithm for Maze Solving Robots. 328-332
ESAS 2013 Session 2
- Duygu Çelik, Askyn Karakas, Gulsen Bal, Cem Gultunca, Atilla Elçi, Basak Buluz, Murat Can Alevli:
Towards an Information Extraction System Based on Ontology to Match Resumes and Jobs. 333-338
CIF 2013: The Third International Workshop on Complex Information Flows
CIF 2013 Session 1
- Dimitri Perrin, Christophe Duhamel:
Efficiency of Parallelisation of Genetic Algorithms in the Data Analysis Context. 339-344
CIF 2013 Session 2
- G. M. Tanimul Ahsan, Ivor D. Addo, Sheikh Iqbal Ahamed, Daniel Petereit, Shalini Kanekar, Linda Burhansstipanov, Linda U. Krebs:
Toward an mHealth Intervention for Smoking Cessation. 345-350 - Yuto Nakai, Dimitri Perrin, Hiroyuki Ohsaki, Ray Walshe:
Performance Evaluation of Cloud-Based Parallel Computing. 351-355 - Piotr Wrzeciono, Waldemar Karwowski:
Automatic Indexing and Creating Semantic Networks for Agricultural Science Papers in the Polish Language. 356-360
MidArch 2013: The Seventh International Workshop on Middleware Architecture in the Internet
MidArch 2013 Session 1
- Teruhisa Hochin:
Heterogeneous Closed Information Sources and Open Services. 361-366 - Motonori Nakamura, Takeshi Nishimura, Kazutsuna Yamaji, Hiroyuki Sato, Yasuo Okabe:
Privacy Preserved Attribute Aggregation to Avoid Correlation of User Activities across Shibboleth SPs. 367-372
MidArch 2013 Session 2
- Takuma Oide, Atsushi Takeda, Takuo Suganuma, Akiko Takahashi:
Implementation and Evaluation of the Well-Distribution Algorithm for an Overlay Network. 373-378 - Hiroyuki Sato, Yasuo Okabe, Takeshi Nishimura, Kazutsuna Yamaji, Motonori Nakamura:
Privacy Enhancing Proxies in Attribute Releases: Two Approaches. 379-384 - Toshiki Watanabe, Shunichi Kinoshita, Yasuhiro Yamasaki, Hideaki Goto, Hideaki Sone:
Flexible Access and Priority Control System Based on 802.1X Authentication in Time of Disaster. 385-390
SSS 2013: The Sixth IEEE International Workshop on Service Science and Systems
SSS 2013 Session 1
- Yi-Shiang Wang, Chih-Ming Chen, Chin-Ming Hong, Yen-Nung Tsai:
Interactive Augmented Reality Game for Enhancing Library Instruction in Elementary Schools. 391-396 - Chieh-Yuan Tsai, Bo-Han Lai:
A Customized Visiting Route Service under RFID Environment. 397-402 - Wichian Premchaiswadi, Pittaya Poompuang, Nipat Jongsawat, Nucharee Premchaiswadi:
Enhancing Diversity-Accuracy Technique on User-Based Top-N Recommendation Algorithms. 403-408
SSS 2013 Systems Session 2
- Rajiv Khosla, Mei-Tai Chu, Khanh Nguyen:
Affective Robot Enabled Capacity and Quality Improvement of Nursing Home Aged Care Services in Australia. 409-414 - Xiaocao Hu, Zhiyong Feng, Shizhan Chen:
Analyzing Distribution of Implicit Semantic Information in Web Services. 415-420 - Anindhita Dewabharata, Don Ming-Hui Wen, Shuo-Yan Chou:
An Activity Ontology for Context-Aware Health Promotion Application. 421-426
SSS 2013 Systems Session 3
- Ting-Yun Lu, Mi Lin, Chih-Ming Chen, Jhih-Hao Wu:
Forecasting Reading Anxiety to Promote Reading Performance Based on Annotation Behavior. 427-432 - Zhaogang Han, Peng Gong, Li Zhang, Jiming Ling, Wenqing Huang:
Definition and Detection of Control-Flow Anti-patterns in Process Models. 433-438 - William Wei Song, Aijaz Soomro, Yang Li, Qin Liu:
A Structural Analysis of SLAs and Dependencies Using Conceptual Modelling Approach. 439-444
QUORS 2013: The Seventh IEEE Workshop on Quality Oriented Reuse of Software
QUORS 2013 Session 1
- Chi-Chung Chang, Kuan-Chou Lai, Chao-Tung Yang:
Auction-Based Resource Provisioning with SLA Consideration on Multi-cloud Systems. 445-450 - Chao-Tung Yang, Kuan-Lung Huang, William C. Chu, Kuan-Chou Lai, Chih-Hung Chang, Chih-Wei Lu:
Implementation of Video and Medical Image Services in Cloud. 451-456 - Nicolas Nussbaumer, Xiaodong Liu:
Cloud Migration for SMEs in a Service Oriented Approach. 457-462 - Chih-Wei Lu, Chih-Ming Hsieh, Chih-Hung Chang, Chao-Tung Yang:
An Improvement to Data Service in Cloud Computing with Content Sensitive Transaction Analysis and Adaptation. 463-468
QUORS 2013 Session 2
- Xiaoyu Wang, Hongwei Ruan, Yan Wang, Hua Li, Hongji Yang:
A Software-Reuse Method from Model1 to SSH2. 469-474 - Shang Zheng, Hongji Yang:
A Three-Dimensional Approach to Evolving Software. 475-480 - Aseel Hmood, Juergen Rilling:
Analyzing and Predicting Software Quality Trends Using Financial Patterns. 481-486 - Yen-Hung Kuo, Yu-Lin Jeng, Juei-Nan Chen:
A Hybrid Cloud Storage Architecture for Service Operational High Availability. 487-492
QUORS 2013 Session 3
- Andrea Calvagna, Emiliano Tramontana:
Delivering Dependable Reusable Components by Expressing and Enforcing Design Decisions. 493-498 - Emiliano Tramontana:
Automatically Characterising Components with Concerns and Reducing Tangling. 499-504 - Atakan Aral, Tolga Ovatman:
Utilization of Method Graphs to Measure Cohesion in Object Oriented Software. 505-510 - Chih-Hung Chang, Chih-Wei Lu, William C. Chu, Xin-Hao Huang, Dianxiang Xu, Tse-Chuan Hsu, Yu-Bin Lai:
An UML Behavior Diagram Based Automatic Testing Approach. 511-516
CDS 2013: The First IEEE International Workshop on Consumer Devices and Systems
- Norihiro Ishikawa, Yoshia Saito, Hiroshi Mineno:
Message from the Workshop Chairs: CDS 2013.
CDS 2013 Session 1
- Masaya Yokohata, Tomotaka Maeda, Yasuo Okabe:
Power Allocation Algorithms of PoE for On-Demand Power Supply. 517-522
CDS 2013 Session 2
- Yuki Nakano, Natsuki Hirota, Yoshia Saito, Yuko Murayama:
An Implementation of a Still Picture Internet Broadcasting System with Audience-Oriented QoS Control for Smartphones and PCs Audience. 523-527 - Louay Bassbouss, Max Tritschler, Stephan Steglich, Kiyoshi Tanaka, Yasuhiko Miyazaki:
Towards a Multi-screen Application Model for the Web. 528-533 - Tianhui Yang, Katsuhiko Kaji, Nobuo Kawaguchi:
Elevator Acceleration Sensing: Design and Estimation Recognition Algorithm Using Crowdsourcing. 534-539
CDS 2013 Session 3
- Takumi Kato, Hideyuki Takahashi, Kazuto Sasai, Yujin Lim, Hak-Man Kim, Gen Kitagata, Tetsuo Kinoshita:
Multiagent System for Priority-Based Load Shedding in Microgrid. 540-545 - Chin-Yang Lin, Yi-Bin Lin:
Projection-Based User Interface for Smart Home Environments. 546-549 - Marat Zhanikeev:
A Home Gateway Box with Meter, Probe and L2 QoS Policy Edge. 550-555
ADMNET 2013: The First IEEE International Workshop on Architecture, Design, Deployment, and Management of Networks and Applications
ADMNET 2013 Session 1.1
- Mohamed Slim Ben Mahmoud, Nicolas Larrieu:
An ADS-B Based Secure Geographical Routing Protocol for Aeronautical Ad Hoc Networks. 556-562 - Akihiro Fujihara, Hiroyoshi Miwa:
On the Use of Congestion Information for Rerouting in the Disaster Evacuation Guidance Using Opportunistic Communication. 563-568 - Yasuhiro Ohishi, Kaori Maeda, Takemi Sahara, Naoki Hayashi, Reiji Aibara:
Consideration of Network Selection Criteria on IP Mobility Communications Quality by Real-Time Status and/or Statistical Information. 569-574 - Takuya Yamaguchi, Yong Jin, Nariyoshi Yamai, Kiyohiko Okayama, Koki Okamoto, Motonori Nakamura:
An Optimal Route Selection Mechanism for Outbound Connection on IPv6 Site Multihoming Environment. 575-580
ADMNET 2013 Session 1.2
- Gada, Nariyoshi Yamai, Kiyohiko Okayama, Keita Kawano, Motonori Nakamura:
E-Mail Priority Delivery System with Dynamic Whitelist in the Layer 3 Switch. 581-586 - Masayuki Matsuoka, Nariyoshi Yamai, Kiyohiko Okayama, Keita Kawano, Motonori Nakamura, Masato Minda:
Domain Registration Date Retrieval System of URLs in E-Mail Messages for Improving Spam Discrimination. 587-592 - Akihiro Satoh, Yutaka Nakamura, Takeshi Ikenaga:
Identifying User Authentication Methods on Connections for SSH Dictionary Attack Detection. 593-598 - Kunihiko Toumura, Naokazu Nemoto:
A Scalable Server Load Balancing Method Using IP Address Stealing. 599-603
ADMNET 2013 Session 2.1
- Hiroshi Yamamoto, Katsuyuki Yamazaki:
Analysis of Temporal Latency Variation on Network Coordinate System for Host Selection in Large-Scale Distributed Network. 604-609 - Kei Ohnishi, Mario Köppen:
Parallel Evolutionary P2P Networking Technique Evaluating Network Topologies Sequentially. 610-615 - Mario Köppen, Kei Ohnishi, Masato Tsuru:
Knaster Procedure for Proportional Fair Wireless Channel Allocation. 616-620 - Xiaoyi Zhang, Zheng Zheng, Yueni Zhu, Kai-Yuan Cai:
A Distributed Protective Approach for Multiechelon Supply Systems. 621-626
ADMNET 2013 Session 2.2
- Daisuke Okamoto, Masanori Fujiwara, Keita Kawano, Nariyoshi Yamai:
Target Application Grouping Function Considering Software Updates on Application Execution Control System. 627-632 - Han Sung Kim, Sooleen Nam, Won-Gyu Lee, Kichun Nam, DaiYoung Kwon:
Effects of Moral Judgement, Emotional Control and Problem Solving on Information Ethics of Gifted Students in Computer Science. 633-638 - SoAh Gwak, Han Sung Kim, WonGyu Lee:
Development and Application of the Information Ethical Sensitivity Measurement Tool for College Students in Korea. 639-643
ADMNET 2013 Session 3
- Nao Maeda, Hiroyoshi Miwa:
Method for Keeping Small Distance from Users to Servers during Failures by Link Protection. 644-649 - Yasuhiro Teramoto, Rei Atarashi, Yoshifumi Atarashi, Yasuo Okabe:
Managing Networks Independently of the Physical Topology by Service Defined Network. 650-655
IEESD & TIP 2013: The Fifth IEEE International Workshop on Industrial Experience in Embedded Systems Design and the Second IEEE International Workshop on Tools in Process
IEESD & TIP 2013 Session 1
- Reyes Juárez-Ramírez, Rafael Pimienta-Romo, Violeta Ocegueda-Miramontes:
Supporting the Software Development Process Using Social Media: Experiences with Student Projects. 656-661 - Arjan J. Mooij, Jozef Hooman, Rob Albers:
Gaining Industrial Confidence for the Introduction of Domain-Specific Languages. 662-667 - Daniel Hallmans, Thomas Nolte, Stig Larsson:
Industrial Requirements on Evolution of an Embedded System Architecture. 668-673
IEESD & TIP 2013 Session 2
- Gaetana Sapienza, Tiberiu Seceleanu, Ivica Crnkovic:
Partitioning Decision Process for Embedded Hardware and Software Deployment. 674-680 - Khalid Ebanhesaten, Franz Felix Füßl, Detlef Streitferdt:
Refactoring and automated testing of distributed ERP systems. 681-684
IEESD & TIP 2013 Session 3
- Irina Gushchina, Wolfgang Fengler, Jirka Ciemala, Detlef Streitferdt:
Certifiable Development Process for Information Processing in the Measurement Domain on the Base of 3W-Models. 685-690 - Lei Ma, Cyrille Artho, Hiroyuki Sato:
Analyzing Distributed Java Applications by Automatic Centralization. 691-696 - Matthias Biehl, Josune De Sosa, Martin Törngren, Oscar Díaz:
Efficient Construction of Presentation Integration for Web-Based and Desktop Development Tools. 697-702
HSNCE 2013: The Fourth IEEE International Workshop on High-Speed Network and Computing Environments
HSNCE 2013 Session 1
- Alexandre Ancel, Ingo Assenmacher, Ken-ichi Baba, Julien Cisonni, Yo Fujiso, Paulo Gonçalves, Matthieu Imbert, Koji Koyamada, P. Neyron, Kazunori Nozaki, Hiroyuki Ohsaki, Anne-Cécile Orgerie, Xavier Pelorson, Bruno Raffin, Naohisa Sakamoto, Eisaku Sakane, Shinji Shimojo, Annemie Van Hirtum, Shigeo Wada:
PetaFlow - An Example of Communication and Computational Technologies with Social Impact. 703-708 - Alexandre Ancel, Bruno Raffin, Ingo Assenmacher, Annemie Van Hirtum, Yo Fujiso, Kazunori Nozaki:
Parallel Caching for Scientific Visualization. 709-712
HSNCE 2013 Session 2
- Yukai Yang, Hirotake Abe, Ken-ichi Baba, Shinji Shimojo:
A Scalable Approach to Avoid Incast Problem from Application Layer. 713-718 - Van Dan Nguyen, Thomas Begin, Isabelle Guérin Lassous:
Multi-constrained Routing Algorithm: A Networking Evaluation. 719-723 - Yasuhiro Watashiba, Susumu Date, Hirotake Abe, Kohei Ichikawa, Hiroaki Yamanaka, Eiji Kawai, Haruo Takemura:
An Architectural Design of a Job Management System Leveraging Software Defined Network. 724-729 - Thomas Begin, Alexandre Brandwajn:
A Note on the Accuracy of Several Existing Approximations for M/Ph/m Queues. 730-735
IWFIT 2013: The First IEEE International Workshop on Future Internet Technologies
IWFIT 2013 Session 1
- Yuncheng Zhu, Akihiro Nakao:
A Practical Study on Distributed Resolution Service for ICN. 736-741 - Janaka Wijekoon, Shinichi Ishida, Erwin Harahap, Hiroaki Nishi:
Service-Oriented Router-Based CDN System: An SoR-Based CDN Infrastructure Implementation on a Real Network Environment. 742-747 - Chun-Hui Tsai, Hung-Mao Chu, Pi-Chung Wang:
Packet Classification Using Multi-iteration RFC. 748-753 - Quang Tran Minh, Kien Nguyen, Shigeki Yamada:
DRANs: Resilient Disaster Recovery Access Networks. 754-759
IWFIT 2013 Session 2
- Hitoshi Yabusaki, Masakuni Agetsuma, Hiroshi Nakagoe, Koichi Murayama, Hiroyuki Osaki, Masami Hiramatsu, Takatoshi Kato:
Flow Control for Higher Resiliency in Wide Area Distributed Cloud Computing. 760-764 - Othman M. M. Othman, Koji Okamura:
Hybrid Control Model for Flow-Based Networks. 765-770
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.