


default search action
iThings/CPScom 2011: Dalian, China
- 2011 IEEE International Conference on Internet of Things (iThings) & 4th IEEE International Conference on Cyber, Physical and Social Computing (CPSCom), Dalian, China, October 19-22, 2011. IEEE Computer Society 2011, ISBN 978-1-4577-1976-9

2011 IEEE International Conference on Internet of Things (iThings 2011)
Architecture and Infrastructure I
- Lei Zhang, Nathalie Mitton:

Advanced Internet of Things. 1-8 - Sujith Samuel Mathew

, Yacine Atif
, Quan Z. Sheng
, Zakaria Maamar
:
Web of Things: Description, Discovery and Integration. 9-15 - Sylvain Cherrier, Yacine Ghamri-Doudane, Stéphane Lohier, Gilles Roussel:

D-LITe: Distributed Logic for Internet of Things Services. 16-24 - Jônata Tyska Carvalho

, Rafael Penna, Silvia Silva da Costa Botelho
, Nelson Duarte Filho, Rodrigo Ruas Oliveira, Edevaldo Santos:
Hyper-Environments: A Different Way to Think about IoT. 25-32
Architecture and Infrastructure II
- Jianhua Liu

, Weiqin Tong:
A Framework for Dynamic Updating of Service Pack in the Internet of Things. 33-42 - Simin Yang, Yang Xu, Qingyi He:

Ontology Based Service Discovery Method for Internet of Things. 43-47 - Oliver Hahm, Mesut Günes

, Felix Juraschek, Bastian Blywis, Nicolai Schmittberger:
An Experimental Facility for Wireless Multi-hop Networks in Future Internet Scenarios. 48-57 - George Roussos

, Paul Chartier:
Scalable ID/Locator Resolution for the IoT. 58-66 - Sanjay K. Dhurandher, Ankit Aggarwal, Aashish Bhandari, Abhishek Verma, Mohammad S. Obaidat

, Isaac Woungang:
Time Stamp-Based Algorithm for Task Scheduling in a Distributed Computing System with Multiple Master Multiple Slave Architecture. 67-73
System Design, Modeling, and Evaluation
- Lucas Vespa, Ning Weng:

GPEP: Graphics Processing Enhanced Pattern-Matching for High-Performance Deep Packet Inspection. 74-81 - Mohammad S. Obaidat

, Harsh Bedi, Aashish Bhandari, M. S. Don Bosco, Ankur Maheshwari, Sanjay K. Dhurandher, Isaac Woungang:
Design and Implementation of a Fault Tolerant Multiple Master Cloud Computing System. 82-88 - Lei Jing, Zixue Cheng, Yinghui Zhou, Junbo Wang

:
From U-Tile to Indoor-Tracer: An Indoor Location Sensing Platform Based on Passive RFID. 89-93 - Sheng'an Duan, Kaitao Cheng, Quanbo Ge, Chenglin Wen:

Wireless Intelligent Fire Fighting Systems Software Platform R&D. 94-99
Intelligent Information Processing
- Zhiming Ding, Qi Yang, Hong Wu:

Massive Heterogeneous Sensor Data Management in the Internet of Things. 100-108 - Ulrik Söderström, Haibo Li:

Anonymous Video Processing for Live Street View. 109-113 - Sudip Misra, P. Venkata Krishna

, Harshit Agarwal
, Antriksh Saxena, Mohammad S. Obaidat
:
A Learning Automata Based Solution for Preventing Distributed Denial of Service in Internet of Things. 114-122 - Xin-Qing Yan, Juan Bai, Yan Xu, Bin Li:

An Optimized Schema to Improve the Time Efficiency of the EPG Gen-2 Protocol. 123-126 - Robert Morelos-Zaragoza

:
On Error Performance Improvements of Passive UHF RFID Systems via Syndrome Decoding. 127-130
Networks and Communications
- Wei Cheng, Nenggan Zheng, Man Lin, Laurence Tianruo Yang:

ENST: A Simulation Toolbox Based on Simulink for E-Textile Networks. 131-138 - Yang Liu, Zhikui Chen, Xiaoning Lv:

Principal-Agent Theory Model in Dynamic Spectrum Sharing. 139-143 - Tomoya Okazaki, Eitaro Kohno, Yoshiaki Kakuda:

Improvement of Assurance for Wireless Sensor Networks Using Packet Detouring and Dispersed Data Transmission. 144-151 - Weifeng Sun, Tong Fu, Yu Su, Feng Xia

, Jianhua Ma:
ODAM-C: An Improved Algorithm for Vehicle Ad Hoc Network. 152-156 - Jiang Xu, Fanyu Bu, Wei Si, Yiteng Qiu, Zhikui Chen:

An Algorithm of Weighted Monte Carlo Localization Based on Smallest Enclosing Circle. 157-161
Applications: Business and Social Issues
- Zhiwen Yu, Yunji Liang

, Bukan Xu, Yue Yang, Bin Guo:
Towards a Smart Campus with Mobile Social Networking. 162-169 - Karin Fahlquist, Thomas Mejtoft

, Johannes Karlsson:
Social Media Game Concept within the Digital Zoo: New Ways of Connecting a Tourist Attraction with Its Visitors. 170-177 - Huansheng Ning

, Sha Hu:
Internet of Things: An Emerging Industrial or a New Major? 178-183 - Junyan Ma, Xingshe Zhou, ShiNing Li, Zhigang Li:

Connecting Agriculture to the Internet of Things through Sensor Networks. 184-187
2011 IEEE International Conference on Cyber, Physical and Social Computing (CPSCom 2011)
Invited Papers I
- Yufeng Wang, Athanasios V. Vasilakos

, Jianhua Ma:
Study on the Effect of Utility Uncertainty on Behavior Diffusion in Autonomous and Rational Networks. 188-194 - Luís M. L. Oliveira

, Joao P. Amaral, João M. L. P. Caldeira
, Joel J. P. C. Rodrigues, Liang Zhou:
Management System for IPv6-Enabled Wireless Sensor Networks. 195-200 - Qin Xin, Jean-Charles Delvenne, Zhanlong Zhang, Wei He:

Improved Compact Routing Scheme with Applications in Static Sensor Networks and Internet. 201-208
Invited Papers II
- Dion Hoe-Lian Goh, Khasfariyati Razikin, Alton Y. K. Chua, Chei Sian Lee, Keng Tiong Tan:

Understanding Location-Based Information Sharing in a Mobile Human Computation Game. 209-216 - Wei Liu, Zeming Zheng, Gang Pan, Shijian Li:

SoPhoNet: Photo Sharing Based on Participatory Sensing. 217-224 - Sozo Inoue, Yuichi Hattori:

Toward High-Level Activity Recognition from Accelerometers on Mobile Phones. 225-231
Cyber-Physical Systems and Society
- Luong Thi Thu Phuong, Nguyen Trung Hieu

, Jin Wang, Sungyoung Lee, Young-Koo Lee:
Energy Efficiency Based on Quality of Data for Cyber Physical Systems. 232-241 - Daniel Guymon, Brian Dougherty, Jules White, Mani Golparvar Fard:

Power-Efficient Cyber-Physical Late Arrival Detection with Smartphones. 242-251 - Chuang Lin, Xirui Sun, Kuanjiu Zhou, Feng Xia

:
Supervised Gabor-Based Kernel Locality Preserving Projections for Face Recognition. 252-257 - Longbiao Chen

, Gang Pan, Shijian Li:
Touch-Driven Interaction between Physical Space and Cyberspace with NFC. 258-265
Pervasive Social Computing I
- Darren Quinn, Liming Chen

, Maurice D. Mulvenna
:
Does Age Make a Difference in the Behaviour of Online Social Network Users? 266-272 - Bin Xu, Alvin Chin, Hao Wang, Lele Chang, Ke Zhang, Fangxi Yin, Hao Wang, Li Zhang:

Physical Proximity and Online User Behaviour in an Indoor Mobile Social Networking Application. 273-282 - Dingqi Yang, Bin Guo, Daqing Zhang:

Better Organizing Your Contacts: An Empirical Study of an Intelligent Social Contact Management System. 283-290 - Su Yang, Weihua Liu:

Anomaly Detection on Collective Moving Patterns: A Hidden Markov Model Based Solution. 291-296
Pervasive Social Computing II
- Bin Guo, Daqing Zhang, Zhu Wang

:
Living with Internet of Things: The Emergence of Embedded Intelligence. 297-304 - Yao-Ting Huang

, Kuan-Hung Lin, Bang Ye Wu:
A Structural Approach for Finding Real-Friend Links in Internet Social Networks. 305-312 - Sonia C. Sousa

, David Lamas
:
Emerging Trust Patterns in Online Communities. 313-316 - Fei Hao, Chunsheng Zhu, Min Chen, Laurence T. Yang, Zheng Pei:

Influence Strength Aware Diffusion Models for Dynamic Influence Maximization in Social Networks. 317-322
Sensor/Actuator Networks
- Ruitao Xu, Gaotao Shi, Jun Luo

, Zenghua Zhao, Yantai Shu:
MuZi: Multi-channel ZigBee Networks for Avoiding WiFi Interference. 323-329 - Chi Lin, Guowei Wu, Mingchu Li, Xiaojie Chen, Zuosong Liu, Lin Yao:

A Selfish Node Preventive Real Time Fault Tolerant Routing Protocol for WSNs. 330-337 - Xuan Zhang, Guangchi Liu, Qian Tian, Zhiqun Li:

MLMAC: Multi-channel Low-latency MAC Protocol for Industrial Wireless Sensor Networks. 338-342 - Md. Emdadul Haque, Fan Wei, Takehiro Gouda, Xiaodong Lu, Kinji Mori:

Autonomous Coordination Technology in Wireless Sensor Networks for Online Expansion. 343-350 - Yu Zhou, Tie Qiu, Feng Xia

, Gang Hou:
N-Times Trilateral Centroid Weighted Localization Algorithm of Wireless Sensor Networks. 351-357
Security, Privacy, and Trust
- Toshihiko Takemura:

Empirical Analysis of Behavior on Information Security. 358-363 - Jiazi Yi, Thomas H. Clausen

, Ulrich Herberg:
Vulnerability Analysis of the Simple Multicast Forwarding (SMF) Protocol for Mobile Ad Hoc Networks. 364-371 - Weili Han, Ye Cao, Chang Lei:

Using a Smart Phone to Strengthen Password-Based Authentication. 372-379 - Bonnie Zhu, Anthony D. Joseph

, Shankar Sastry:
A Taxonomy of Cyber Attacks on SCADA Systems. 380-388
Applications and Services
- Jian Chen, Haifeng Man, Qun Jin, Runhe Huang:

Goal-Driven Navigation for Learning Activities Based on Process Optimization. 389-395 - Ching-Lung Chang, Yu-shian Lin, Ching-Hung Chang:

An Optimal Unequal Frame Protection Scheme in Video Streaming. 396-401 - Jia Tian, Yuyang Du, Hongliang Yu:

Characterizing SMP Virtual Machine Scheduling in Virtualization Environment. 402-408 - Man-Ching Yuen

, Irwin King
, Kwong-Sak Leung:
Task Matching in Crowdsourcing. 409-412
International Workshop on Universal User Modeling and Applications (UUMA 2011)
User Modeling
- Yue Liu, Kang Wang, Wang Wei, Bofeng Zhang, Hailin Zhong:

User-Session-Based Test Cases Optimization Method Based on Agglutinate Hierarchy Clustering. 413-418 - Xujie Zhang, Zongtian Liu, Wei Liu, Wenjie Xu, Dong Wang:

Event Similarity Computation in Text. 419-423 - Yan Zhao, Wen Zhou, Yao Li, Zongtian Liu, Ying Zhu, Ping Zhu:

A Willing Events Identification Method. 424-431 - Fangfang Liu

, Xiaojing Li:
Using Metadata to Maintain Link Integrity for Linked Data. 432-437 - Xia Yin, Qingguo Xu, Kunliang Han:

Modeling Predicate Abstraction of Timed Automata in PVS. 438-443
Algorithms and Methods
- Bo Zhou, Bofeng Zhang, Yucong Liu, Kun Xing:

User Model Evolution Algorithm: Forgetting and Reenergizing User Preference. 444-447 - Kun Xing, Bofeng Zhang, Bo Zhou, Yucong Liu:

Behavior Based User Interests Extraction Algorithm. 448-452 - Haobin Shi

, Mingjun Xin, Wenjie Dong:
A Kind of Case Similarity Evaluation Model Based on Case-Based Reasoning. 453-457 - Yucong Liu, Bofeng Zhang, Kun Xing, Bo Zhou:

Document Clustering Method Based on Visual Features. 458-462 - Yunwen Ge, Shaochun Wu, Bowen Yuan, Jiazheng Li:

The Methods of Data Prefetching Based on User Model in Cloud Computing. 463-466
Systems and Applications
- Tanvir Shahid, Ashraf Uddin Ahmed, Christopher Craney, Bill Haraguchi:

A Dynamic Image Matching Model and Architecture for Smart Devices. 467-472 - Chan Wang, Xiaotong Fu:

Forgery Attacks on Two Pairing-Based Proxy Signature Schemes. 473-478 - Shengnan Fei, Wen Zhou, Zongtian Liu, Yan Zhao, Ying Zhu, Xiaolong Lu:

The Effects of Innovation Alliance on Network Structure and Association Rules. 479-482 - Wenhao Zhu, Li Fu, Lei Xu, Bofeng Zhang:

A TCM Diagnosis System Based on Textbook Information Extraction. 483-487 - Dong Wang, Wei Liu, Wenjie Xu, Xujie Zhang:

Topic Tracking Based on Event Network. 488-493
International Workshop on Resilience and ICT for Secure Open Cities (ReISOC 2011)
- Yutaka Hatakeyama, Hiromi Kataoka, Noriaki Nakajima, Teruaki Watabe, Yoshiyasu Okuhara, Yusuke Sagara:

An Education Support System with Anonymized Medical Data Based on Thin Client System. 494-497 - Tetsuro Kobayashi

, Noboru Sonehara, Yu Ichifuji:
The Structure of Psychological Resistance and Incentives in Lifelog Disclosure: An Experimental Study with Smartphone Users. 498-502 - Memiko Otsuki, Noboru Sonehara:

A Proposal of "Identity Commons": Utilization of Life Log and ID Information for Resilient Social System. 503-507 - Klaus Rechert, Konrad Meier, Dennis Wehrle, Dirk von Suchodoletz

:
Location Privacy in Mobile Telephony Networks - Conflict of Interest between Safety, Security and Privacy. 508-513 - Martin Salfer

, Sven Wohlgemuth
, Sebastian Schrittwieser, Bernhard Bauer, Isao Echizen:
Data Provenance with Watermarks for Usage Control Monitors at Disaster Recovery. 514-519 - Zhikui Chen, Zhenyu Li, Jing Li, Jianyun Chen, Yang Liu:

Quasi Real-Time Evaluation System for Seismic Disaster Based on Internet of Things. 520-524
International Workshop on the Trend and Future of Web Science (TFWS 2011)
- Jinhyung Kim, Dongmin Seo, Hanmin Jung, Pyung Kim, Seungwoo Lee, Won-Kyung Sung:

Query Performance Evaluation of OWL Storage Model. 525-528 - Jinhee Lee, Jinhyung Kim, Seungwoo Lee, Dongmin Seo, Hanmin Jung, Won-Kyung Sung:

Towards Discovering Emerging Technologies Based on Decision Tree. 529-532 - Myunggwon Hwang, Do-Heon Jeong, Seungwoo Lee, Hanmin Jung:

Measuring Similarities between Technical Terms Based on Wikipedia. 533-536 - Seungwoo Lee, Pyung Kim, Dongmin Seo, Jinhyung Kim, Jinhee Lee, Hanmin Jung, Christian Dirschl:

Multi-faceted Navigation of Legal Documents. 537-540 - Mikyoung Lee, Hanmin Jung, Jinhyung Kim, Young-Hyun Choi, Seungin Kim:

Establishing Usability and Development Strategies: Focused on Intelligent Legislation Support System. 541-545
International Workshop on Technology-Enhanced Social Learning (TESL 2011)
New Models and Systems for Social Learning Support
- Haifeng Man, Hong Chen

, Yan Wu, Qun Jin:
CAPK: A Learning Process Model for Web 2.0 Technology Enhanced Community of Practice. 546-551 - Hiroaki Ogata

, Mengmeng Li, Bin Hou, Noriko Uosaki, Yoneo Yano:
Learning by Logging: Supporting Ubiquitous Learning Using a Lifelogging Tool. 552-557 - Chengjiu Yin, Yoshiyuki Tabata, Xiaobin Wu, Tetsuya Nakatoh, Sachio Hirokawa

:
Building a Search Engine for Scientific Projects Survey. 558-563 - Ashraf Uddin Ahmed, Tanvir Shahid, Hong Chen

, Qun Jin:
A Hybrid P2P Search Engine for Social Learning. 564-569
Social Learning Pedagogy and Strategy, and Language Learning
- Steve Leung, Sandeep Virwaney, Fuhua Lin

, Andrew J. Armstrong:
TSI-Enhanced Engaging Pedagogical Agents. 570-575 - Gwo-Jen Hwang, Han-Yu Sung, Hong-Sheng Chang:

The Effect of Integrating STS Strategy to Online Inquiry-Based Learning on Students' Learning Performance. 576-580 - Yuqin Liu, Guohai Jiang, Bo Jiang, Bing Yan:

Online Japanese Composition Correction System. 581-584 - Lanling Han, Dechao Liu, Yunqin Liu:

Implementation of CALL-Based Online Janpanese Learning System. 585-588
International Workshop on Sensing, Networking, and Computing with Smartphones (PhoneCom 2011)
- Zheng Yan

, Peng Zhang:
Trust Behavior Based Recommender System for Software Usage. 589-591 - Zhenyu Wu, Chunhong Zhang, Yang Ji, Yunjie Liu:

Web of X Service Environment for Ubiquitous Network and Computing. 592-597 - Cheng Zeng, Liang Hong, Jian Wang, Chuan He, Jilei Tian, Xiaogang Yang:

Role-Based Contextual Recommendation. 598-601 - Bin Xu, Alvin Chin, Hao Wang, Hao Wang:

Using Physical Context in a Mobile Social Networking Application for Improving Friend Recommendations. 602-609 - Fangwei Ding, Feng Xia

, Wei Zhang, Xuhai Zhao, Chengchuan Ma:
Monitoring Energy Consumption of Smartphones. 610-613 - Gábor Kiss

:
Using Smartphones in Healthcare and to Save Lives. 614-619
International Workshop on Cyber-Physical Systems and Applications (CPSA 2011)
Applications and Services
- Farid Abedan Kondori, Shahrouz Yousefi:

Smart Baggage in Aviation. 620-623 - Heng Zhang, Chen Dong Yi, Ling Jian Zhong:

Study of Classroom Teaching Aids System Based on Wearable Computing and Centralized Sensor Network Technique. 624-628 - Yang Zhong, Li Liu:

Remote Neonatal Pain Assessment System Based on Internet of Things. 629-633 - Bo Li, Shafiq ur Réhman, Haibo Li:

i-Function of Electronic Cigarette: Building Social Network by Electronic Cigarette. 634-637 - Hao Jiang, Shuxu Guo, Siming Meng, Xiaonan Luo:

A Novel Depth Map Generation Method Based on K-Means Clustering and Depth Pattern Recognition. 638-643
Modeling and Design
- (Withdrawn) Symbiotic, Mobile Methodologies for Digital-to-Analog Converters. 644-647

- David Källberg, Oleg Seleznjev, Nikolai Leonenko

, Haibo Li:
Statistical Modeling for Image Matching in Large Image Databases. 648-652 - Aliyu Mohammed, Sulaiman Mohd Nor, Muhammad Nadzir Marsono

:
Network Worm Propagation Model Based on a Campus Network Topology. 653-659 - Yan Tang, Qingchen Zhang:

Edge-Collapse Mesh Simplification Method Based on Gauss Curvature. 660-662 - Zongqiang Zhang, Mingchu Li, Feng Xia

, Jianhua Ma:
An Improved Iris Localization Method for Authentication System. 663-666 - Dong Jiao, Mingchu Li, Cheng Guo, Jianhua Ma:

A Multi-attribute Hierarchical Threshold Scheme. 667-671
International Workshop on the Future Design of the Internet of Things (DOIoT 2011)
Value, Space, and Time
- Thomas Mejtoft

:
Internet of Things and Co-creation of Value. 672-677 - Alaa Halawani, Haibo Li:

Personal Relative Time: Towards Internet of Watches. 678-682 - Ulrik Söderström:

Personal Internet-Driven Maps Based on Time Distances. 683-686 - Jian An, Xiaolin Gui, Wendong Zhang, Jinhua Jiang:

Nodes Social Relations Cognition for Mobility-Aware in the Internet of Things. 687-691 - Yang Liu, Zhikui Chen, Haozhe Wang, Xiaoning Lv:

An Architecture of Data Processing Using Deluge Computing in Internet of Things. 692-697
Security, Authentication, and Applications
- Zhanrong Chen, Xunwen Xu, Longxin Lin:

Pervasive Computing Oriented Interval-Valued Fuzzy Trust Model Research. 698-701 - Cao Pan, Hui Ding, Hongyuan Wang:

A New Authenticated Tripartite Key Agreement Protocol. 702-704 - Xunwen Xu, Zhanrong Chen:

Model of TrustRank Evaluation Based on Fuzzy Set for Pervasive Computing. 705-708 - Benjamin Khoo

:
RFID as an Enabler of the Internet of Things: Issues of Security and Privacy. 709-712 - Jean-Paul Kouma, Li Liu:

Internet of Food. 713-716
International Workshop on QoS of the Internet of Things (QoSIoT 2011)
Architecture and Design
- Ren Duan, Xiaojiang Chen, Tianzhang Xing:

A QoS Architecture for IOT. 717-720 - Yan Shi, Min Sheng, Fang He:

A Resource Management and Control Model Supporting Applications in the Internet of Things. 721-725 - Sandoche Balakrichenan, Antonio Kin-Foo, Mohsen Souissi:

Qualitative Evaluation of a Proposed Federated Object Naming Service Architecture. 726-732 - Douglas Rodrigues, Rayner de Melo Pires

, Júlio Cezar Estrella, Emerson Alberto Marconato, Onofre Trindade Júnior, Kalinka Regina Lucas Jaquie Castelo Branco:
Using SOA in Critical-Embedded Systems. 733-738 - Yu Liu, Ruomei Wang, Liyi Peng, Xiaonan Luo:

SWRL Bridge-Peer Model: An Improved Super-Peer Model Based on the Extended SWRL and Its Application. 739-743
Systems and Applications
- Keni Ren

, Johannes Karlsson, Haibo Li:
Interaction Design for Digital Zoo. 744-747 - Yanyan Han, Deshi Li, Jian Chen, Tianyu Wang:

Research on Wireless Sensor Network and Carrying Network Integration Based on Gateway. 748-751 - Hao Chen, Dingyi Fang

, Xiaojiang Chen, Feng Chen, Xiaoqing Gong, Baishun Zhou, Lang Qin:
A Reliable Transmission Protocol Based on Dynamic Link Cache. 752-755 - Yongjian Wang, Bin Feng, Shupeng Wang:

The Rapid Worm Detecting Technology in Large-Scale Network. 756-761 - Zhanwei Du, Yongjian Yang, Shuqiu Li, Li Ma, Xiange Li, Yuan Bai:

A Simulation Platform for Measurements in Dynamic Environment of Ultrasonic Wireless. 762-767 - Lujuan Ma, Deshi Li, Yuanyuan Zeng, Xianli Liu, Xiaoliang Wang:

Address Allocation in IPv6 Sensor Networks for Medical Monitoring Applications. 768-771

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














