Table of Contents
|
Information and Communication Technology Ismail Khalil, Erich Neuhold, A Min Tjoa, Li Da Xu, Ilsun You (Eds.)
|
Front Matter |
Networks and System Architecture
|
Reducing Keepalive Traffic in Software-Defined Mobile Networks with Port Control Protocol Kamil Burda, Martin Nagy, Ivan Kotuliak |
3-12 |
A SDN Based Method of TCP Connection Handover Andrej Binder, Tomas Boros, Ivan Kotuliak |
13-19 |
IP Data Delivery in HBB-Next Network Architecture Roman Bronis, Ivan Kotuliak, Tomas Kovacik, Peter Truchly, Andrej Binder |
20-29 |
Syn Flood Attack Detection and Type Distinguishing Mechanism Based on Counting Bloom Filter Tomáš Halagan, Tomáš Kováčik, Peter Trúchly, Andrej Binder |
30-39 |
Integrating Mobile OpenFlow Based Network Architecture with Legacy Infrastructure Martin Nagy, Ivan Kotuliak, Jan Skalny, Martin Kalcok, Tibor Hirjak |
40-49 |
Teaching and Education
|
Making Computer Science Education Relevant Michael Weigend |
53-63 |
Analyzing Brain Waves for Activity Recognition of Learners Hiromichi Abe, Kazuya Kinoshita, Kensuke Baba, Shigeru Takano, Kazuaki Murakami |
64-73 |
Authentication and Profiling
|
A Multi-factor Biometric Based Remote Authentication Using Fuzzy Commitment and Non-invertible Transformation Thi Nguyen, Dinh Nguyen, Tran Dang |
77-88 |
Profiler for Smartphone Users Interests Using Modified Hierarchical Agglomerative Clustering Algorithm Based on Browsing History Priagung Khusumanegara, Rischan Mafrur, Deokjai Choi |
89-96 |
Data Management and Information Advertising
|
Strength of Relationship Between Multi-labeled Data and Labels Masahiro Kuzunishi, Tetsuya Furukawa |
99-108 |
Online Ad-fraud in Search Engine Advertising Campaigns Andreas Mladenow, Niina Novak, Christine Strauss |
109-118 |
Applied Modeling and Simulation
|
Markov Chain Solution to the 3-Tower Problem Guido David |
121-128 |
Fitness Function in ABC Algorithm for Uncapacitated Facility Location Problem Yusuke Watanabe, Mayumi Takaya, Akihiro Yamamura |
129-138 |
Comparative Study of Monte-Carlo Tree Search and Alpha-Beta Pruning in Amazons Hikari Kato, Szilárd Fazekas, Mayumi Takaya, Akihiro Yamamura |
139-148 |
Network Security
|
Can We Securely Use CBC Mode in TLS1.0? Takashi Kurokawa, Ryo Nojima, Shiho Moriai |
151-160 |
Key Agreement with Modified Batch Rekeying for Distributed Group in Cognitive Radio Networks N. Renugadevi, C. Mala |
161-172 |
Secure Mobility Management for MIPv6 with Identity-Based Cryptography Nan Guo, Fangting Peng, Tianhan Gao |
173-178 |
Investigation of DDoS Attacks by Hybrid Simulation Yana Bekeneva, Konstantin Borisenko, Andrey Shorov, Igor Kotenko |
179-189 |
Dependable Systems and Applications
|
Secure Database Using Order-Preserving Encryption Scheme Based on Arithmetic Coding and Noise Function Sergey Krendelev, Mikhail Yakovlev, Maria Usoltseva |
193-202 |
An Approach for Evaluating Softgoals Using Weight Shuichiro Yamamoto |
203-212 |
An Efficient Unsavory Data Detection Method for Internet Big Data Peige Ren, Xiaofeng Wang, Hao Sun, Fen Xu, Baokang Zhao, Chunqing Wu |
213-220 |
Identification of Corrupted Cloud Storage in Batch Auditing for Multi-Cloud Environments Sooyeon Shin, Seungyeon Kim, Taekyoung Kwon |
221-225 |
Multimedia Security
|
Face Recognition Performance Comparison Between Real Faces and Pose Variant Face Images from Image Display Device Mi-Young Cho, Young-Sook Jeong |
229-234 |
A Lossless Data Hiding Strategy Based on Two-Dimensional Side-Match Predictions Chi-Yao Weng, Sheng-Jie Wang, Shiuh-Jeng Wang |
235-242 |
Secure Image Deduplication in Cloud Storage Han Gang, Hongyang Yan, Lingling Xu |
243-251 |
Cryptography
|
Hybrid Encryption Scheme Using Terminal Fingerprint and Its Application to Attribute-Based Encryption Without Key Misuse Chunlu Chen, Hiroaki Anada, Junpei Kawamoto, Kouichi Sakurai |
255-264 |
Differential Fault Attack on LEA Dirmanto Jap, Jakub Breier |
265-274 |
A Secure Multicast Key Agreement Scheme Hsing-Chung Chen, Chung-Wei Chen |
275-281 |
Efficient Almost Strongly Universal Hash Function for Quantum Key Distribution Bo Liu, Baokang Zhao, Chunqing Wu, Wanrong Yu, Ilsun You |
282-285 |
Big Data and Text Mining
|
DCODE: A Distributed Column-Oriented Database Engine for Big Data Analytics Yanchen Liu, Fang Cao, Masood Mortazavi, Mengmeng Chen, Ning Yan, Chi Ku, Aniket Adnaik, Stephen Morgan, Guangyu Shi, Yuhu Wang, Fan Fang |
289-299 |
Incorporating Big Data Analytics into Enterprise Information Systems Zhaohao Sun, Francisca Pambel, Fangwei Wang |
300-309 |
Analytical Platform Based on Jbowl Library Providing Text-Mining Services in Distributed Environment Martin Sarnovský, Peter Butka, Peter Bednár, František Babič, Ján Paralič |
310-319 |
Social Impact of EIS and Visualization
|
Corporate Social Responsibility in Social Media Environment Antonín Pavlíček, Petr Doucek |
323-332 |
Usage of Finance Information Systems in Developing Countries: Identifying Factors During Implementation that Impact Use David Kiwana, Björn Johansson, Sven Carlsson |
333-342 |
Software Model Creation with Multidimensional UML Lukáš Gregorovič, Ivan Polasek, Branislav Sobota |
343-352 |