Table of Contents
|
Information and Communication Technology Linawati, Made Sudiana Mahendra, Erich J. Neuhold, A Min Tjoa, IlsunYou (Eds.)
|
Front Matter |
Information & Communication Technology-EurAsia Conference 2014, ICT-EurAsia 2014
|
The Human Face of Mobile Hajar Mousannif, Ismail Khalil |
1-20 |
Agent-Based Methods for Simulation of Epidemics with a Low Number of Infected Persons Florian Miksch, Philipp Pichler, Kurt Espinosa, Niki Popper |
21-28 |
Cellular Automata Model of Urbanization in Camiguin, Philippines Maria Beltran, Guido David |
29-35 |
A Flexible Agent-Based Framework for Infectious Disease Modeling Florian Miksch, Christoph Urach, Patrick Einzinger, Günther Zauner |
36-45 |
Transformation of Digital Ecosystems: The Case of Digital Payments Stefan Henningsson, Jonas Hedman |
46-55 |
Do Personality Traits Work as Moderator on the Intention to Purchase Mobile Applications Work? - A Pilot Study Charnsak Srisawatsakul, Gerald Quirchmayr, Borworn Papasratorn |
56-65 |
Intelligent Method for Dipstick Urinalysis Using Smartphone Camera R. Ginardi, Ahmad Saikhu, Riyanarto Sarno, Dwi Sunaryono, Ali Kholimi, Ratna Shanty |
66-77 |
Empirical and Computational Issues of Microclimate Simulation Aida Maleki, Kristina Kiesel, Milena Vuckovic, Ardeshir Mahdavi |
78-85 |
A Distributed Generic Data Structure for Urban Level Building Data Monitoring Stefan Glawischnig, Harald Hofstätter, Ardeshir Mahdavi |
86-95 |
Toward a Data-Driven Performance-Guided Urban Decision-Support Environment Neda Ghiassi, Stefan Glawischnig, Ulrich Pont, Ardeshir Mahdavi |
96-107 |
Knowledge Management: Organization Culture in Healthcare Indonesia Dana Sensuse, Yudho Sucahyo, Siti Rohajawati, Haya Rizqi, Pinkie Anggia |
108-118 |
Semantic Versioning of In-Process Scientific Document Imran Asif, M. Karim |
119-128 |
Towards Semantic Mashup Tools for Big Data Analysis Azzakiy Hendrik, Amin Anjomshoaa, A. Tjoa |
129-138 |
Acceptance and Use of Information System: E-Learning Based on Cloud Computing in Vietnam Thanh Nguyen, Dung Nguyen, Thi Cao |
139-149 |
Requirements Identification for Migrating eGovernment Applications to the Cloud Evangelos Gongolidis, Christos Kalloniatis, Evangelia Kavakli |
150-158 |
A GPU-Based Enhanced Genetic Algorithm for Power-Aware Task Scheduling Problem in HPC Cloud Nguyen Quang-Hung, Le Tan, Chiem Phat, Nam Thoai |
159-169 |
Ball Distance Estimation and Tracking System of Humanoid Soccer Robot Widodo Budiharto, Bayu Kanigoro, Viska Noviantri |
170-178 |
Image Clustering Using Multi-visual Features Bilih Priyogi, Nungki Selviandro, Zainal Hasibuan, Mubarik Ahmad |
179-189 |
A Robust Visual Object Tracking Approach on a Mobile Device Abdulmalik Mohammed, Tim Morris |
190-198 |
Self-generating Programs – Cascade of the Blocks Josef Kufner, Radek Mařík |
199-212 |
State Machine Abstraction Layer Josef Kufner, Radek Mařík |
213-227 |
Concern Based SaaS Application Architectural Design Aldo Suwandi, Inggriani Liem, Saiful Akbar |
228-237 |
Hybridization of Haar Wavelet Decomposition and Computational Intelligent Algorithms for the Estimation of Climate Change Behavior Haruna Chiroma, Sameem Abdulkareem, Adamu Abubakar, Eka Sari, Tutut Herawan, Abdulsalam Gital |
238-247 |
An Improved Ant Colony Matching by Using Discrete Curve Evolution Younes Saadi, Eka Sari, Tutut Herawan |
248-256 |
A Novel Approach to Gasoline Price Forecasting Based on Karhunen-Loève Transform and Network for Vector Quantization with Voronoid Polyhedral Haruna Chiroma, Sameem Abdulkareem, Adamu Abubakar, Eka Sari, Tutut Herawan |
257-266 |
Enhancing the Use of Digital Model with Team-Based Learning Approach in Science Teaching Bens Pardamean, Teddy Suparyanto, . Suyanta, Eryadi Masli, Jerome Donovan |
267-276 |
Improving Reusability of OER Peter Baumgartner |
277-285 |
Online Learning for Two Novel Latent Topic Models Ali Bakhtiari, Nizar Bouguila |
286-295 |
An Infinite Mixture Model of Generalized Inverted Dirichlet Distributions for High-Dimensional Positive Data Modeling Nizar Bouguila, Mohamed Mashrgy |
296-305 |
On If-Then Multi Soft Sets-Based Decision Making R. Hakim, Eka Sari, Tutut Herawan |
306-315 |
Predicting Size of Forest Fire Using Hybrid Model Guruh Shidik, Khabib Mustofa |
316-327 |
Understanding eParticipation Services in Indonesian Local Government Fathul Wahid, Øystein Sæbø |
328-337 |
Document Tracking Technology to Support Indonesian Local E-Governments Wikan Sunindyo, Bayu Hendradjaya, G. Saptawati, Tricya Widagdo |
338-347 |
Modern Framework for Distributed Healthcare Data Analytics Based on Hadoop P. Raja, E. Sivasankar |
348-355 |
A Bioinformatics Workflow for Genetic Association Studies of Traits in Indonesian Rice James Baurley, Bens Pardamean, Anzaludin Perbangsa, Dwinita Utami, Habib Rijzaani, Dani Satyawan |
356-364 |
Fuzzy Logic Weight Estimation in Biometric-Enabled Co-authentication Systems Van Nhan Nguyen, Vuong Nguyen, Minh Nguyen, Tran Dang |
365-374 |
The 2014 Asian Conference on Availability, Reliability and Security, AsiaARES 2014
|
A Real-Time Intrusion Detection and Protection System at System Call Level under the Assistance of a Grid Fang-Yie Leu, Yi-Ting Hsiao, Kangbin Yim, Ilsun You |
375-385 |
A Hybrid System for Reducing Memory and Time Overhead of Intrusion Detection System Zhi-Guo Chen, Sung-Ryul Kim |
386-395 |
LDFGB Algorithm for Anomaly Intrusion Detection Shang-Nan Yin, Zhi-Guo Chen, Sung-Ryul Kim |
396-404 |
Assets Dependencies Model in Information Security Risk Management Jakub Breier, Frank Schindler |
405-412 |
Creation of Assurance Case Using Collaboration Diagram Takuya Saruwatari, Shuichiro Yamamoto |
413-418 |
Using Model Driven Security Approaches in Web Application Development Christoph Hochreiner, Zhendong Ma, Peter Kieseberg, Sebastian Schrittwieser, Edgar Weippl |
419-431 |
An Evaluation of Argument Patterns Based on Data Flow Shuichiro Yamamoto |
432-437 |
A Design of Web Log Integration Framework Using NoSQL Huijin Jeong, Junho Choi, Chang Choi, Ilsun You, Pankoo Kim |
438-445 |
Motivation-Based Risk Analysis Process for IT Systems Agata Niescieruk, Bogdan Ksiezopolski |
446-455 |
Formalizing Information Flow Control in a Model-Driven Approach Kurt Stenzel, Kuzman Katkalov, Marian Borek, Wolfgang Reif |
456-461 |
Security Assessment of Computer Networks Based on Attack Graphs and Security Events Igor Kotenko, Elena Doynikova |
462-471 |
A Pipeline Optimization Model for QKD Post-processing System Jianyi Zhou, Bo Liu, Baokang Zhao, Bo Liu |
472-481 |
Aggregation of Network Protocol Data Near Its Source Marcel Fourné, Kevin Stegemann, Dominique Petersen, Norbert Pohlmann |
482-491 |
The Mediating Role of Social Competition Identity Management Strategy in the Predictive Relationship between Susceptibility to Social Influence, Internet Privacy Concern, and Online Political Efficacy Juneman Abraham, Murty Pane |
492-499 |
Formal Security Analysis and Performance Evaluation of the Linkable Anonymous Access Protocol Rima Addas, Ning Zhang |
500-510 |
On Safety of Pseudonym-Based Location Data in the Context of Constraint Satisfation Problems Tomoya Tanjo, Kazuhiro Minami, Ken Mano, Hiroshi Maruyama |
511-520 |
Advanced Techniques for Computer Sharing and Management of Strategic Data Marek Ogiela, Lidia Ogiela, Urszula Ogiela |
521-525 |
On the Modelling of the Computer Security Impact on the Reputation Systems Bogdan Ksiezopolski, Adam Wierzbicki, Damian Rusinek |
526-531 |
Efficient Variant of Rainbow without Triangular Matrix Representation Takanori Yasuda, Tsuyoshi Takagi, Kouichi Sakurai |
532-541 |
Efficient Lattice HIBE in the Standard Model with Shorter Public Parameters Kunwar Singh, C. Rangan, A. Banerjee |
542-553 |
Security Analysis of Public Key Encryptions Based on Conjugacy Search Problem Akihiro Yamamura |
554-563 |
Cryptanalysis of Unidirectional Proxy Re-Encryption Scheme Kunwar Singh, C. Rangan, A. Banerjee |
564-575 |
An Algorithm to Analyze Non-injective S-Boxes Leandro Marin, Ludo Tolhuizen |
576-585 |
Attribute-Based Fine-Grained Access Control with User Revocation Jun Ye, Wujun Zhang, Shu-Lin Wu, Yuan-Yuan Gao, Jia-Tao Qiu |
586-595 |
A Full Privacy-Preserving Scheme for Location-Based Services Fei Shao, Rong Cheng, Fangguo Zhang |
596-601 |
Implementation of Efficient Operations over GF(232) Using Graphics Processing Units Satoshi Tanaka, Takanori Yasuda, Kouichi Sakurai |
602-611 |
M-SRS: Secure and Trustworthy Mobile Service Review System Based on Mobile Cloudlet Tao Jiang, Xiaofeng Chen, Jin Li, Jianfeng Ma |
612-621 |
High-Quality Reversible Data Hiding Approach Based on Evaluating Multiple Prediction Methods Cheng-Hsing Yang, Kuan-Liang Liu, Chun-Hao Chang, Yi-Jhong Jhang |
622-632 |
Steganalysis to Data Hiding of VQ Watermarking Upon Grouping Strategy Ya-Ting Chang, Min-Hao Wu, Shiuh-Jeng Wang |
633-642 |
Experimental Evaluation of an Algorithm for the Detection of Tampered JPEG Images Giuseppe Cattaneo, Gianluca Roscigno, Umberto Ferraro Petrillo |
643-652 |
A Semantic-Based Malware Detection System Design Based on Channels Peige Ren, Xiaofeng Wang, Chunqing Wu, Baokang Zhao, Hao Sun |
653-662 |
An Efficient Semantic-Based Organization and Similarity Search Method for Internet Data Resources Peige Ren, Xiaofeng Wang, Hao Sun, Baokang Zhao, Chunqing Wu |
663-673 |
Efficient DVFS to Prevent Hard Faults for Many-Core Architectures Zhiquan Lai, Baokang Zhao, Jinshu Su |
674-679 |
Improving Availability through Energy-Saving Optimization in LEO Satellite Networks Zhu Tang, Chunqing Wu, Zhenqian Feng, Baokang Zhao, Wanrong Yu |
680-689 |
An Effective Cloud-Based Active Defense System against Malicious Codes Zhenyu Zhang, Wujun Zhang, Jianfeng Wang, Xiaofeng Chen |
690-695 |