DCNET |
2 |
20 min |
Monday 18 |
Session 1 |
14:00 - 15:45 |
DCNET - International Conference on Data Communication Networking |
AULA A0.12 |
AN IMPROVED GMPLS SURVIVABILITY MECHANISM USING LINK DELAY-CONSTRAINED ALGORITHM |
DCNET |
5 |
Poster |
Tuesday 19 |
Poster Session 2 |
16:00 - 16:30 |
DCNET - International Conference on Data Communication Networking |
Foyer |
RETHINKING ISP ARCHITECTURES THROUGH VIRTUALIZATION |
DCNET |
6 |
Poster |
Monday 18 |
Poster Session 1 |
15:45 - 16:15 |
DCNET - International Conference on Data Communication Networking |
Foyer |
NETWORK PLANNING OF A VOIP-CABLE PBX - The Use of Data Profiling Techniques for an Efficient Network Planning |
DCNET |
11 |
Poster |
Monday 18 |
Poster Session 1 |
15:45 - 16:15 |
DCNET - International Conference on Data Communication Networking |
Foyer |
SOFTWARE MODULES AND APPLICATION LAYER’S SECURITY STRUCTURE OF RSMAD |
DCNET |
14 |
30 min |
Tuesday 19 |
Session 3 |
09:00 - 10:30 |
DCNET - International Conference on Data Communication Networking |
AULA A0.12 |
MULTIPLE VECTOR CLASSIFICATION FOR P2P TRAFFIC IDENTIFICATION |
DCNET |
18 |
30 min |
Tuesday 19 |
Session 3 |
09:00 - 10:30 |
DCNET - International Conference on Data Communication Networking |
AULA A0.12 |
COMPUTATIONAL INTELLIGENCE APPLIED TO WILDFIRE PREDICTION USING WIRELESS SENSOR NETWORKS |
DCNET |
20 |
20 min |
Monday 18 |
Session 1 |
14:00 - 15:45 |
DCNET - International Conference on Data Communication Networking |
AULA A0.12 |
PERFORMANCE OF OPENDPI TO IDENTIFY TRUNCATED NETWORK TRAFFIC |
DCNET |
21 |
30 min |
Tuesday 19 |
Session 4 |
11:45 - 12:45 |
DCNET - International Conference on Data Communication Networking |
AULA A0.12 |
LOCALIZATION METHOD FOR LOW POWER CONSUMPTION SYSTEMS |
DCNET |
22 |
20 min |
Tuesday 19 |
Session 4 |
11:45 - 12:45 |
DCNET - International Conference on Data Communication Networking |
AULA A0.12 |
UTILIZING VIDEO ENCODING FOR POWER MANAGEMENT OVER WIRELESS NETWORKS |
DCNET |
24 |
Poster |
Tuesday 19 |
Poster Session 2 |
16:00 - 16:30 |
DCNET - International Conference on Data Communication Networking |
Foyer |
APPLICATION-TRANSPARENT INTEGRATION OF SIMULATION TOOLS IN A WSN DEVELOPMENT ENVIRONMENT |
DCNET |
25 |
Poster |
Monday 18 |
Poster Session 1 |
15:45 - 16:15 |
DCNET - International Conference on Data Communication Networking |
Foyer |
TECHNICAL VIABILITY STUDY FOR BEHAVIORAL MONITORING OF WILDLIFE ANIMALS IN DOÑANA - An 802.15.4 Coverage Study in a Natural Park |
DCNET |
26 |
20 min |
Monday 18 |
Session 1 |
14:00 - 15:45 |
DCNET - International Conference on Data Communication Networking |
AULA A0.12 |
ANOMALY DETECTION USING FIREFLY HARMONIC CLUSTERING ALGORITHM |
DCNET |
27 |
30 min |
Tuesday 19 |
Session 3 |
09:00 - 10:30 |
DCNET - International Conference on Data Communication Networking |
AULA A0.12 |
MODEL-BASED STOCHASTIC SIMULATION OF SUPER PEER PROMOTION IN P2P VOIP USING GRAPH TRANSFORMATION |
DCNET |
29 |
Poster |
Tuesday 19 |
Poster Session 2 |
16:00 - 16:30 |
DCNET - International Conference on Data Communication Networking |
Foyer |
ARCHITECTURE FOR ENVIRONMENTAL DATA ACCESS IN WSN |
DCNET |
31 |
20 min |
Monday 18 |
Session 1 |
14:00 - 15:45 |
DCNET - International Conference on Data Communication Networking |
AULA A0.12 |
OPTIMIZING CRYPTOGRAPHIC THRESHOLD SCHEMES FOR THE USE IN WIRELESS SENSOR NETWORKS
- Position Paper |
ICE-B |
3 |
Poster |
Monday 18 |
Poster Session 1 |
15:45 - 16:15 |
Enterprise Engineering |
Foyer |
A FRAMEWORK FOR CLASSIFYING RISKS IN ERP MAINTENANCE PROJECTS |
ICE-B |
9 |
20 min |
Tuesday 19 |
Session 4 |
11:45 - 12:45 |
Enterprise Engineering |
AULA A0.10 |
TECHNOLOGY FOR BUSINESS - Supporting Industries as a Main Driving Force for E-commerce Adoption in Saudi Arabia |
ICE-B |
10 |
20 min |
Monday 18 |
Session 1 |
14:00 - 15:45 |
Applications |
AULA A0.10 |
REALIZING THE STRATEGIC PLAN OF A TOP-TIER UNIVERSITY IN TAIWAN - A Multi-criteria Evaluation and Alignment |
ICE-B |
12 |
30 min |
Tuesday 19 |
Session 5 |
14:00 - 16:00 |
Collaboration and e-Services |
AULA A0.10 |
WHAT IS THE RIGHT SERVICE? A MULTI-CRITERIA DECISION MODEL BASED ON ‘STEP’ |
ICE-B |
14 |
Poster |
Tuesday 19 |
Poster Session 2 |
16:00 - 16:30 |
Enterprise Engineering |
Foyer |
MODELING FACTORS THAT INFLUENCE ONLINE TRAVEL BOOKING |
ICE-B |
16 |
30 min |
Tuesday 19 |
Session 5 |
14:00 - 16:00 |
Collaboration and e-Services |
AULA A0.10 |
SUPPORTING SAFETY THROUGH SOCIAL TERRITORIAL NETWORKS |
ICE-B |
20 |
20 min |
Tuesday 19 |
Session 6 |
16:30 - 18:00 |
Applications |
AULA A0.10 |
COLLECTIVETHOUGHT - Supporting Virtual Teams with Semantic Networks |
ICE-B |
23 |
30 min |
Monday 18 |
Session 1 |
14:00 - 15:45 |
Applications |
AULA A0.10 |
VALUE-ADDED SERVICES FOR FIBRE TO THE HOME - Market Potential, Time Horizons and User Groups |
ICE-B |
25 |
Poster |
Tuesday 19 |
Poster Session 2 |
16:00 - 16:30 |
Enterprise Engineering |
Foyer |
BUSINESS MODEL APROACH FOR QOE OPTIMIZED SERVICE DELIVERY |
ICE-B |
26 |
20 min |
Tuesday 19 |
Session 4 |
11:45 - 12:45 |
Enterprise Engineering |
AULA A0.10 |
TOWARD AUTOMATIC GENERATION OF SPARQL RESULT SET VISUALIZATIONS - A Use Case in Service Monitoring |
ICE-B |
33 |
Poster |
Monday 18 |
Poster Session 1 |
15:45 - 16:15 |
Applications |
Foyer |
INFORMATION SYSTEMS AND E-BUSINESS - Risc and Value of Applications to Organizations |
ICE-B |
35 |
20 min |
Wednesday 20 |
Session 7 |
09:00 - 10:30 |
Applications |
AULA A0.10 |
SUCCESSFUL IMPLEMENTED THEORIES FOR REFERENCE CLASS FORECASTING IN INDUSTRIAL FIELD |
ICE-B |
37 |
30 min |
Monday 18 |
Session 1 |
14:00 - 15:45 |
Applications |
AULA A0.10 |
SHOULD COMPANIES BID ON THEIR OWN BRAND IN SPONSORED SEARCH? |
ICE-B |
39 |
20 min |
Wednesday 20 |
Session 7 |
09:00 - 10:30 |
Applications |
AULA A0.10 |
BLENDED SHOPPING - Interactivity and Individualization |
ICE-B |
40 |
Poster |
Monday 18 |
Poster Session 1 |
15:45 - 16:15 |
Applications |
Foyer |
CUSTOMER FEEDBACK AND INTERNET - Means used by the Biggest Portuguese Companies |
ICE-B |
41 |
20 min |
Wednesday 20 |
Session 8 |
11:45 - 12:45 |
Collaboration and e-Services |
AULA A0.10 |
RESOURCE ORIENTED MODELLING - Describing Restful Web Services using Collaboration Diagrams |
ICE-B |
43 |
30 min |
Tuesday 19 |
Session 5 |
14:00 - 16:00 |
Collaboration and e-Services |
AULA A0.10 |
QUALITY OF SERVICE AGGREGATION IN E-BUSINESS APPLICATIONS |
ICE-B |
44 |
Poster |
Tuesday 19 |
Poster Session 2 |
16:00 - 16:30 |
Technology Platforms |
Foyer |
EVALUATION OF NEW DISTRIBUTION CHANNELS FOR IP INTERACTIVE QOE BASED SERVICES |
ICE-B |
47 |
20 min |
Wednesday 20 |
Session 9 |
14:00 - 15:15 |
Collaboration and e-Services |
AULA A0.10 |
USER-CENTRIC USABILITY EVALUATION FOR ENTERPRISE 2.0 PLATFORMS - A Complementary Multi-method Approach |
ICE-B |
48 |
30 min |
Tuesday 19 |
Session 5 |
14:00 - 16:00 |
Mobility |
AULA A0.10 |
HANDWRITING RECOGNITION ON MOBILE DEVICES - State of the Art Technology, Usability and Business Analysis |
ICE-B |
49 |
20 min |
Wednesday 20 |
Session 7 |
09:00 - 10:30 |
Applications |
AULA A0.10 |
APPLYING ASPECT ORIENTED PROGRAMMING IN USABILITY ENGINEERING PROCESSES - On the Example of Tracking Usage Information for Remote Usability Testing |
ICE-B |
50 |
20 min |
Wednesday 20 |
Session 7 |
09:00 - 10:30 |
Applications |
AULA A0.10 |
RAPID PROTOTYPING ON THE EXAMPLE OF SOFTWARE DEVELOPMENT IN AUTOMOTIVE INDUSTRY - The Importance of their Provision for Software Projects at the Correct Time |
ICE-B |
51 |
Poster |
Monday 18 |
Poster Session 1 |
15:45 - 16:15 |
Collaboration and e-Services |
Foyer |
ABOUT CREATIVITY IN COLLABORATIVE SYSTEMS - Why it Matters and How it can be Supported |
ICE-B |
55 |
20 min |
Wednesday 20 |
Session 9 |
14:00 - 15:15 |
Collaboration and e-Services |
AULA A0.10 |
ARCHAEOLOGICAL SCAVENGER HUNT ON MOBILE DEVICES: FROM E-EDUCATION TO E-BUSINESS - A Triple Adaptive Mobile Application for Supporting Experts, Tourists and Children |
ICE-B |
63 |
Poster |
Monday 18 |
Poster Session 1 |
15:45 - 16:15 |
Mobility |
Foyer |
A PROPOSAL OF “IDENTITY COMMONS” FOR SERVICE CREATION USING COMMUNICATION LOG - Position Paper |
ICE-B |
64 |
Poster |
Tuesday 19 |
Poster Session 2 |
16:00 - 16:30 |
Applications |
Foyer |
STUDY ON SUCCESS FACTORS OF TOURISM WEBSITES |
ICE-B |
65 |
Poster |
Tuesday 19 |
Poster Session 2 |
16:00 - 16:30 |
Collaboration and e-Services |
Foyer |
A MOTIVATION FOR A MODERN WEB SERVICE DESCRIPTION |
ICE-B |
67 |
20 min |
Wednesday 20 |
Session 8 |
11:45 - 12:45 |
Collaboration and e-Services |
AULA A0.10 |
AN APPROACH TO METAMORPHIC TESTING FOR WS-BPEL COMPOSITIONS |
ICE-B |
68 |
20 min |
Wednesday 20 |
Session 8 |
11:45 - 12:45 |
Collaboration and e-Services |
AULA A0.10 |
TOWARDS HIGHER-ORDER MUTANT GENERATION FOR WS-BPEL |
ICE-B |
69 |
Poster |
Tuesday 19 |
Poster Session 2 |
16:00 - 16:30 |
Collaboration and e-Services |
Foyer |
SEMANTIC-BASED DELIVERY OF E-SERVICES APPLYING THE SAAS APPROACH - Poster Paper |
ICE-B |
70 |
20 min |
Monday 18 |
Session 1 |
14:00 - 15:45 |
Enterprise Engineering |
AULA A0.10 |
E-BUSINESS INTEROPERABILITY - Challenges and Opportunities |
ICE-B |
71 |
30 min |
Tuesday 19 |
Session 6 |
16:30 - 18:00 |
Applications |
AULA A0.10 |
THE DEVELOPMENT OF A WEB MAPPING SYSTEM AND ITS APPLICATION |
SIGMAP |
10 |
Poster |
Tuesday 19 |
Poster Session 2 |
16:00 - 16:30 |
Multimedia Signal Processing |
Foyer |
COLOR FACE RECOGNITION - A Multilinear-PCA Approach Combined with Hidden Markov Models |
SIGMAP |
11 |
Poster |
Tuesday 19 |
Poster Session 2 |
16:00 - 16:30 |
Multimedia Signal Processing |
Foyer |
REAL-TIME FACE RECOGNITION WITH GPUs - A DCT-based Face Recognition System using Graphics Processing Unit |
SIGMAP |
12 |
20 min |
Monday 18 |
Session 2a |
16:15 - 17:45 |
Multimedia Systems and Applications |
AULA A0.12 |
CONTEXT BASED WATERMARKING OF SECURE JPEG-LS IMAGES |
SIGMAP |
16 |
30 min |
Monday 18 |
Session 2 |
16:15 - 17:45 |
Multimedia Systems and Applications |
AULA A0.10 |
THE WINDSURF LIBRARY FOR THE EFFICIENT RETRIEVAL OF MULTIMEDIA HIERARCHICAL DATA |
SIGMAP |
20 |
30 min |
Tuesday 19 |
Session 5 |
14:00 - 16:00 |
Multimedia Signal Processing |
AULA A0.12 |
A NON-UNIFORM REAL-TIME SPEECH TIME-SCALE STRETCHING METHOD |
SIGMAP |
21 |
30 min |
Tuesday 19 |
Session 5 |
14:00 - 16:00 |
Multimedia Signal Processing |
AULA A0.12 |
ESTIMATION-DECODING ON LDPC-BASED 2D-BARCODES |
SIGMAP |
23 |
30 min |
Tuesday 19 |
Session 5 |
14:00 - 16:00 |
Multimedia Signal Processing |
AULA A0.12 |
HAND IMAGE SEGMENTATION BY MEANS OF GAUSSIAN MULTISCALE AGGREGATION FOR BIOMETRIC APPLICATIONS |
SIGMAP |
25 |
Poster |
Tuesday 19 |
Poster Session 2 |
16:00 - 16:30 |
Multimedia Signal Processing |
Foyer |
STEREO VISION MATCHING OVER SINGLE-CHANNEL COLOR-BASED SEGMENTATION |
SIGMAP |
27 |
Poster |
Monday 18 |
Poster Session 1 |
15:45 - 16:15 |
Multimedia and Communications |
Foyer |
TWO – DIMENSIONAL CODES ON MOBILE DEVICES AND THE DEVELOPMENT OF THE PLATFORM |
SIGMAP |
29 |
30 min |
Monday 18 |
Session 2 |
16:15 - 17:45 |
Multimedia Systems and Applications |
AULA A0.10 |
LATENT TOPIC VISUAL LANGUAGE MODEL FOR OBJECT CATEGORIZATION |
SIGMAP |
30 |
20 min |
Monday 18 |
Session 2a |
16:15 - 17:45 |
Multimedia Systems and Applications |
AULA A0.12 |
EFFECTIVE INTERFERENCE REDUCTION METHOD FOR SPREAD SPECTRUM FINGERPRINTING |
SIGMAP |
33 |
30 min |
Tuesday 19 |
Session 5 |
14:00 - 16:00 |
Multimedia Signal Processing |
AULA A0.12 |
SEGMENTATION OF TOUCHING LANNA CHARACTERS |
SIGMAP |
34 |
20 min |
Wednesday 20 |
Session 9 |
14:00 - 15:15 |
Multimedia Signal Processing |
AULA A0.12 |
3D VISUALIZATION OF SINGLE IMAGES USING PATCH LEVEL DEPTH |
SIGMAP |
36 |
20 min |
Wednesday 20 |
Session 7 |
09:00 - 10:30 |
Multimedia and Communications |
AULA A0.12 |
ACCURACY OF MP3 SPEECH RECOGNITION UNDER REAL-WORD CONDITIONS - Experimental Study |
SIGMAP |
37 |
20 min |
Wednesday 20 |
Session 7 |
09:00 - 10:30 |
Multimedia Systems and Applications |
AULA A0.12 |
SENSES - WHAT U SEE? - Vision Screening System Dedicated for iOS Based Devices Development and Screening Results |
SIGMAP |
41 |
Poster |
Monday 18 |
Poster Session 1 |
15:45 - 16:15 |
Multimedia Systems and Applications |
Foyer |
EXPLORING THE DIFFERENCES IN SURFACE ELECTROMYOGRAPHIC SIGNAL BETWEEN MYOFASCIAL-PAIN AND NORMAL GROUPS - Feature Extraction through Wavelet Denoising and Decomposition |
SIGMAP |
42 |
20 min |
Tuesday 19 |
Session 6 |
16:30 - 18:00 |
Multimedia Signal Processing |
AULA A0.12 |
IMAGE DENOISING BASED ON LAPLACE DISTRIBUTION WITH LOCAL PARAMETERS IN LAPPED TRANSFORM DOMAIN |
SIGMAP |
43 |
20 min |
Tuesday 19 |
Session 6 |
16:30 - 18:00 |
Multimedia Signal Processing |
AULA A0.12 |
IMPROVED INTER MODE DECISION FOR H.264/AVC USING WEIGHTED PREDICTION |
SIGMAP |
45 |
20 min |
Tuesday 19 |
Session 6 |
16:30 - 18:00 |
Multimedia Signal Processing |
AULA A0.12 |
IMAGE MATCHING ALGORITHMS IN STEREO VISION USING ADDRESS-EVENT-REPRESENTATION - A Theoretical Study and Evaluation of the Different Algorithms |
SIGMAP |
46 |
20 min |
Wednesday 20 |
Session 7 |
09:00 - 10:30 |
Multimedia and Communications |
AULA A0.12 |
TRANSMISSION OF LOW-MOTION JPEG2000 IMAGE SEQUENCES USING CLIENT-DRIVEN CONDITIONAL REPLENISHMENT |
SIGMAP |
48 |
20 min |
Wednesday 20 |
Session 9 |
14:00 - 15:15 |
Multimedia Signal Processing |
AULA A0.12 |
VISUAL AER-BASED PROCESSING WITH CONVOLUTIONS FOR A PARALLEL SUPERCOMPUTER |
SIGMAP |
51 |
Poster |
Tuesday 19 |
Poster Session 2 |
16:00 - 16:30 |
Multimedia Signal Processing |
Foyer |
VIDEO SURVEILLANCE AT AN INDUSTRIAL ENVIRONMENT USING AN ADDRESS EVENT VISION SENSOR - Comparative between Two Different Video Sensor based on a Bioinspired Retina |
SIGMAP |
56 |
20 min |
Wednesday 20 |
Session 7 |
09:00 - 10:30 |
Multimedia Systems and Applications |
AULA A0.12 |
QUALITY EVALUATION OF NOVEL DTD ALGORITHM BASED ON AUDIO WATERMARKING |
SIGMAP |
58 |
20 min |
Wednesday 20 |
Session 9 |
14:00 - 15:15 |
Multimedia Signal Processing |
AULA A0.12 |
AER SPIKE-PROCESSING FILTER SIMULATOR - Implementation of an AER Simulator based on Cellular Automata |
SIGMAP |
59 |
20 min |
Monday 18 |
Session 2 |
16:15 - 17:45 |
Multimedia Signal Processing |
AULA A0.10 |
A GENETIC APPROACH FOR IMPROVING THE SIDE INFORMATION IN WYNER-ZIV VIDEO CODING WITH LONG DURATION GOP |
SIGMAP |
60 |
20 min |
Monday 18 |
Session 2a |
16:15 - 17:45 |
Multimedia Systems and Applications |
AULA A0.12 |
OPTIMAL COMBINATION OF LOW-LEVEL FEATURES FOR SURVEILLANCE OBJECT RETRIEVAL |
SIGMAP |
61 |
Poster |
Monday 18 |
Poster Session 1 |
15:45 - 16:15 |
Multimedia Systems and Applications |
Foyer |
AUTOMATIC SOUND RESTORATION SYSTEM - Concepts and Design |
SIGMAP |
64 |
30 min |
Tuesday 19 |
Session 6 |
16:30 - 18:00 |
Multimedia Signal Processing |
AULA A0.12 |
WIRELESS IN-VEHICLE COMPLAINT DRIVER ENVIRONMENT RECORDER |
SIGMAP |
65 |
Poster |
Monday 18 |
Poster Session 1 |
15:45 - 16:15 |
Multimedia Systems and Applications |
Foyer |
A SPATIAL IMMERSIVE OFFICE ENVIRONMENT FOR COMPUTER-SUPPORTED COLLABORATIVE WORK - Moving Towards the Office of the Future |
SIGMAP |
66 |
Poster |
Monday 18 |
Poster Session 1 |
15:45 - 16:15 |
Multimedia Systems and Applications |
Foyer |
FOUR-PHASE RE-SPEAKER TRAINING SYSTEM |
SIGMAP |
68 |
20 min |
Monday 18 |
Session 2a |
16:15 - 17:45 |
Multimedia Signal Processing |
AULA A0.12 |
WHAT ARE GOOD CGS/MGS CONFIGURATIONS FOR H.264 QUALITY SCALABLE CODING? |
SIGMAP |
73 |
20 min |
Wednesday 20 |
Session 9 |
14:00 - 15:15 |
Multimedia Systems and Applications |
AULA A0.12 |
MANAGING MULTIPLE MEDIA STREAMS IN HTML5 - The IEEE 1599-2008 Case Study |
OPTICS |
1 |
20 min |
Tuesday 19 |
Session 6 |
16:30 - 18:00 |
OPTICS - International Conference on Optical Communication Systems |
AULA A0.13 |
A STABLE TUNABLE AND SWITCHABLE DUAL-WAVELENGTH SINGLE-LONGITUDINAL-MODE ERBIUM-DOPED FIBER LINEAR-CAVITY LASER |
OPTICS |
2 |
20 min |
Tuesday 19 |
Session 6 |
16:30 - 18:00 |
OPTICS - International Conference on Optical Communication Systems |
AULA A0.13 |
OPTICAL MIMO MULTIMODE FIBER LINKS - Channel Measurements and System Performance Analysis |
OPTICS |
9 |
20 min |
Tuesday 19 |
Session 6 |
16:30 - 18:00 |
OPTICS - International Conference on Optical Communication Systems |
AULA A0.13 |
OPTIMIZATION OF OPTICAL SSB-OFDM SYSTEM WITH DIRECT DETECTION FOR APPLICATION IN METROPOLITAN/REGIONAL NETWORKS |
OPTICS |
12 |
Poster |
Tuesday 19 |
Poster Session 2 |
16:00 - 16:30 |
OPTICS - International Conference on Optical Communication Systems |
Foyer |
OPTICAL DOMAIN MULTIUSER INTERFERENCE ESTIMATION FOR SPECTRAL PHASE ENCODING OPTICAL FIBRE CDMA SYSTEMS |
OPTICS |
13 |
30 min |
Tuesday 19 |
Session 6 |
16:30 - 18:00 |
OPTICS - International Conference on Optical Communication Systems |
AULA A0.13 |
PHOTONIC ANALOGUE-TO-DIGITAL CONVERTER BASED ON WAVELENGTH DIVISION MULTIPLEXING TECHNIQUE |
SECRYPT |
22 |
20 min |
Wednesday 20 |
Session 9 |
14:00 - 15:15 |
SECRYPT - International Conference on Security and Cryptography |
AULA A0.11 |
A STATIC SOFTWARE BIRTHMARK BASED ON USE-DEFINE CHAINS FOR DETECTING THE THEFT OF JAVA PROGRAMS |
SECRYPT |
30 |
30 min |
Tuesday 19 |
Session 3a |
09:00 - 10:30 |
SECRYPT - International Conference on Security and Cryptography |
AULA A0.10 |
ANOMALY-BASED SPAM FILTERING |
SECRYPT |
31 |
20 min |
Wednesday 20 |
Session 7 |
09:00 - 10:30 |
SECRYPT - International Conference on Security and Cryptography |
AULA A0.11 |
A SMART-GENTRY BASED SOFTWARE SYSTEM FOR SECRET PROGRAM EXECUTION |
SECRYPT |
32 |
30 min |
Tuesday 19 |
Session 5 |
14:00 - 16:00 |
SECRYPT - International Conference on Security and Cryptography |
AULA A0.11 |
THREE-PARTY PASSWORD-AUTHENTICATED KEY EXCHANGE WITHOUT RANDOM ORACLES |
SECRYPT |
33 |
30 min |
Tuesday 19 |
Session 4 |
11:45 - 12:45 |
SECRYPT - International Conference on Security and Cryptography |
AULA A0.11 |
SMARTPHONE SECURITY EVALUATION - The Malware Attack Case |
SECRYPT |
34 |
20 min |
Wednesday 20 |
Session 9 |
14:00 - 15:15 |
SECRYPT - International Conference on Security and Cryptography |
AULA A0.11 |
A SECURITY METRICS FRAMEWORK FOR THE CLOUD |
SECRYPT |
35 |
30 min |
Monday 18 |
Session 1 |
14:00 - 15:45 |
SECRYPT - International Conference on Security and Cryptography |
AULA A0.11 |
TOWARDS OPTIMAL REVOCATION AND TRACING SCHEMES - The Power of the Ternary Tree |
SECRYPT |
37 |
30 min |
Tuesday 19 |
Session 3 |
09:00 - 10:30 |
SECRYPT - International Conference on Security and Cryptography |
AULA A0.11 |
A METHOD FOR FLEXIBLE REDUCTION OVER BINARY FIELDS USING A FIELD MULTIPLIER |
SECRYPT |
41 |
30 min |
Tuesday 19 |
Session 3a |
09:00 - 10:30 |
SECRYPT - International Conference on Security and Cryptography |
AULA A0.10 |
RELATED-KEY ATTACK AGAINST TRIPLE ENCRYPTION BASED ON FIXED POINTS |
SECRYPT |
43 |
20 min |
Tuesday 19 |
Session 5a |
14:00 - 16:00 |
SECRYPT - International Conference on Security and Cryptography |
AULA A0.13 |
COLLECTIVE CLASSIFICATION FOR UNKNOWN MALWARE DETECTION |
SECRYPT |
47 |
20 min |
Monday 18 |
Session 1a |
14:00 - 15:45 |
SECRYPT - International Conference on Security and Cryptography |
AULA A0.13 |
ANALYSIS OF BOTNETS THROUGH LIFE-CYCLE |
SECRYPT |
49 |
30 min |
Tuesday 19 |
Session 3 |
09:00 - 10:30 |
SECRYPT - International Conference on Security and Cryptography |
AULA A0.11 |
ON THE (NON-)REUSABILITY OF FUZZY SKETCHES AND EXTRACTORS AND SECURITY IN THE COMPUTATIONAL SETTING |
SECRYPT |
56 |
30 min |
Tuesday 19 |
Session 3 |
09:00 - 10:30 |
SECRYPT - International Conference on Security and Cryptography |
AULA A0.11 |
DRIVER AUTHENTICATION USING BRAIN WAVES WHILE ROUTE TRACING AS A MENTAL TASK |
SECRYPT |
58 |
30 min |
Monday 18 |
Session 1a |
14:00 - 15:45 |
SECRYPT - International Conference on Security and Cryptography |
AULA A0.13 |
EMBEDDING RATIO ESTIMATION BASED ON WEIGHTED STEGO IMAGE FOR EMBEDDING IN 2LSB |
SECRYPT |
59 |
Poster |
Monday 18 |
Poster Session 1 |
15:45 - 16:15 |
SECRYPT - International Conference on Security and Cryptography |
Foyer |
PRIVATE SEARCHING FOR SENSITIVE FILE SIGNATURES |
SECRYPT |
60 |
Poster |
Tuesday 19 |
Poster Session 2 |
16:00 - 16:30 |
SECRYPT - International Conference on Security and Cryptography |
Foyer |
THE IMAGE PROTECTOR - A Flexible Security Rule Specification Toolkit |
SECRYPT |
66 |
20 min |
Monday 18 |
Session 1 |
14:00 - 15:45 |
SECRYPT - International Conference on Security and Cryptography |
AULA A0.11 |
ON THE SECURITY OF LOCATION DETERMINATION AND VERIFICATION METHODS FOR WIRELESS NETWORKS |
SECRYPT |
73 |
20 min |
Tuesday 19 |
Session 4 |
11:45 - 12:45 |
SECRYPT - International Conference on Security and Cryptography |
AULA A0.11 |
A SMART CARD BASED GENERIC CONSTRUCTION FOR ANONYMOUS AUTHENTICATION IN MOBILE NETWORKS |
SECRYPT |
74 |
30 min |
Monday 18 |
Session 2 |
16:15 - 17:45 |
SECRYPT - International Conference on Security and Cryptography |
AULA A0.11 |
A TINY RSA COPROCESSOR BASED ON OPTIMIZED SYSTOLIC MONTGOMERY ARCHITECTURE |
SECRYPT |
75 |
Poster |
Tuesday 19 |
Poster Session 2 |
16:00 - 16:30 |
SECRYPT - International Conference on Security and Cryptography |
Foyer |
A NEW STEGANOGRAPHIC SCHEME BASED ON FIRST ORDER REED MULLER CODES - A New Steganographic Scheme |
SECRYPT |
77 |
30 min |
Tuesday 19 |
Session 5 |
14:00 - 16:00 |
SECRYPT - International Conference on Security and Cryptography |
AULA A0.11 |
PRIVACY-PRESERVING SMART METERING WITHOUT A TRUSTED-THIRD-PARTY |
SECRYPT |
79 |
Poster |
Monday 18 |
Poster Session 1 |
15:45 - 16:15 |
SECRYPT - International Conference on Security and Cryptography |
Foyer |
DIFFERENTIAL FAULT ANALYSIS OF HUMMINGBIRD |
SECRYPT |
83 |
Poster |
Monday 18 |
Poster Session 1 |
15:45 - 16:15 |
SECRYPT - International Conference on Security and Cryptography |
Foyer |
A NEW TREE-STRUCTURE-SPECIFIED MULTISIGNATURE SCHEME FOR A DOCUMENT CIRCULATION SYSTEM |
SECRYPT |
85 |
Poster |
Tuesday 19 |
Poster Session 2 |
16:00 - 16:30 |
SECRYPT - International Conference on Security and Cryptography |
Foyer |
OPBUS: RISK-AWARE FRAMEWORK FOR THE CONFORMANCE OF SECURITY-QUALITY REQUIREMENTS IN BUSINESS PROCESSES |
SECRYPT |
86 |
30 min |
Tuesday 19 |
Session 6 |
16:30 - 18:00 |
SECRYPT - International Conference on Security and Cryptography |
AULA A0.11 |
BYTE SLICING GRØSTL - Optimized Intel AES-NI and 8-bit Implementations of the SHA-3 Finalist Grøstl |
SECRYPT |
87 |
Poster |
Monday 18 |
Poster Session 1 |
15:45 - 16:15 |
SECRYPT - International Conference on Security and Cryptography |
Foyer |
SYNEMA: VISUAL MONITORING OF NETWORK AND SYSTEM SECURITY SENSORS |
SECRYPT |
88 |
30 min |
Tuesday 19 |
Session 5 |
14:00 - 16:00 |
SECRYPT - International Conference on Security and Cryptography |
AULA A0.11 |
INFORMATION-LEAKAGE IN HYBRID RANDOMIZED PROTOCOLS |
SECRYPT |
90 |
30 min |
Tuesday 19 |
Session 6 |
16:30 - 18:00 |
SECRYPT - International Conference on Security and Cryptography |
AULA A0.11 |
ATTACK INTERFERENCE IN NON-COLLABORATIVE SCENARIOS FOR SECURITY PROTOCOL ANALYSIS |
SECRYPT |
91 |
30 min |
Tuesday 19 |
Session 3a |
09:00 - 10:30 |
SECRYPT - International Conference on Security and Cryptography |
AULA A0.10 |
ON THE STRENGTH OF EGGLUE AND OTHER LOGIC CAPTCHAs |
SECRYPT |
92 |
Poster |
Monday 18 |
Poster Session 1 |
15:45 - 16:15 |
SECRYPT - International Conference on Security and Cryptography |
Foyer |
PRIVACY--ENHANCING CRYPTOGRAPHY--BASED MATERIALS |
SECRYPT |
95 |
30 min |
Monday 18 |
Session 2 |
16:15 - 17:45 |
SECRYPT - International Conference on Security and Cryptography |
AULA A0.11 |
A FRESH LOOK INTO THE BIOMETRIC AUTHENTICATION - Perspective from Shannon's Secrecy System and a Special Wiretap Channel |
SECRYPT |
97 |
20 min |
Tuesday 19 |
Session 5a |
14:00 - 16:00 |
SECRYPT - International Conference on Security and Cryptography |
AULA A0.13 |
IS IP MULTIMEDIA SUBSYSTEM AFFECTED BY ‘MALFORMED MESSAGE’ ATTACKS? - An Evaluation of OpenIMS |
SECRYPT |
99 |
20 min |
Wednesday 20 |
Session 7 |
09:00 - 10:30 |
SECRYPT - International Conference on Security and Cryptography |
AULA A0.11 |
ON THE PRIVACY THREATS OF ELECTRONIC POLL BOOKS |
SECRYPT |
104 |
20 min |
Tuesday 19 |
Session 5a |
14:00 - 16:00 |
SECRYPT - International Conference on Security and Cryptography |
AULA A0.13 |
A FORWARD PRIVATE PROTOCOL BASED ON PRNG AND LPN FOR LOW-COST RFID |
SECRYPT |
105 |
20 min |
Wednesday 20 |
Session 7 |
09:00 - 10:30 |
SECRYPT - International Conference on Security and Cryptography |
AULA A0.11 |
COLLUDING TAGS ATTACK ON THE ECC-BASED GROUPING PROOFS FOR RFIDS |
SECRYPT |
106 |
20 min |
Monday 18 |
Session 1a |
14:00 - 15:45 |
SECRYPT - International Conference on Security and Cryptography |
AULA A0.13 |
UNOBSERVABLE INTRUSION DETECTION BASED ON CALL TRACES IN PARAVIRTUALIZED SYSTEMS |
SECRYPT |
108 |
30 min |
Monday 18 |
Session 1a |
14:00 - 15:45 |
SECRYPT - International Conference on Security and Cryptography |
AULA A0.13 |
A FRAMEWORK FOR SECURITY AND WORKLOAD GRADUAL ADAPTATION |
SECRYPT |
109 |
30 min |
Tuesday 19 |
Session 5 |
14:00 - 16:00 |
SECRYPT - International Conference on Security and Cryptography |
AULA A0.11 |
HIGHER LAYER AUTHENTICATION FOR BROADCAST IN CONTROLLER AREA NETWORKS |
SECRYPT |
110 |
Poster |
Monday 18 |
Poster Session 1 |
15:45 - 16:15 |
SECRYPT - International Conference on Security and Cryptography |
Foyer |
TOWARDS A CALCULUS FOR NON REPUDIATION PROTOCOLS |
SECRYPT |
112 |
30 min |
Tuesday 19 |
Session 6 |
16:30 - 18:00 |
SECRYPT - International Conference on Security and Cryptography |
AULA A0.11 |
A SNORT-BASED MOBILE AGENT FOR A DISTRIBUTED INTRUSION DETECTION SYSTEM |
SECRYPT |
114 |
20 min |
Monday 18 |
Session 1 |
14:00 - 15:45 |
SECRYPT - International Conference on Security and Cryptography |
AULA A0.11 |
BOTNET DETECTION BASED ON DNS RECORDS AND ACTIVE PROBING |
SECRYPT |
116 |
20 min |
Tuesday 19 |
Session 5a |
14:00 - 16:00 |
SECRYPT - International Conference on Security and Cryptography |
AULA A0.13 |
E-COMMERCE AND FAIR EXCHANGE - The Problem of Item Validation |
SECRYPT |
117 |
Poster |
Monday 18 |
Poster Session 1 |
15:45 - 16:15 |
SECRYPT - International Conference on Security and Cryptography |
Foyer |
HOW TO TRANSMIT MESSAGES VIA WSN IN A HOSTILE ENVIRONMENT |
SECRYPT |
118 |
Poster |
Tuesday 19 |
Poster Session 2 |
16:00 - 16:30 |
SECRYPT - International Conference on Security and Cryptography |
Foyer |
APOLLON: TOWARDS A SEMANTICALLY EXTENSIBLE POLICY FRAMEWORK |
SECRYPT |
124 |
Poster |
Monday 18 |
Poster Session 1 |
15:45 - 16:15 |
SECRYPT - International Conference on Security and Cryptography |
Foyer |
BYZANTINE DECISIONS FOR INFERRING TRUST IN SENSOR NETWORKS |
SECRYPT |
125 |
20 min |
Wednesday 20 |
Session 7 |
09:00 - 10:30 |
SECRYPT - International Conference on Security and Cryptography |
AULA A0.11 |
BLACK-BOX COLLISION ATTACKS ON THE COMPRESSION FUNCTION OF THE GOST HASH FUNCTION |
SECRYPT |
126 |
Poster |
Monday 18 |
Poster Session 1 |
15:45 - 16:15 |
SECRYPT - International Conference on Security and Cryptography |
Foyer |
DISTRIBUTED THRESHOLD CRYPTOGRAPHY CERTIFICATION WITH NO TRUSTED DEALER |
SECRYPT |
129 |
20 min |
Wednesday 20 |
Session 9 |
14:00 - 15:15 |
SECRYPT - International Conference on Security and Cryptography |
AULA A0.11 |
TOWARDS AN AUTHORIZATION SYSTEM FOR CLOUD INFRASTRUCTURE PROVIDERS |
SECRYPT |
142 |
30 min |
Monday 18 |
Session 1 |
14:00 - 15:45 |
SECRYPT - International Conference on Security and Cryptography |
AULA A0.11 |
CHAOTIC ITERATIONS FOR STEGANOGRAPHY - Stego-security and Chaos-security |
SECRYPT |
148 |
Poster |
Monday 18 |
Poster Session 1 |
15:45 - 16:15 |
SECRYPT - International Conference on Security and Cryptography |
Foyer |
PRACTICAL ANONYMOUS AUTHENTICATION - Designing Anonymous Authentication for Everyday Use |
SECRYPT |
153 |
Poster |
Tuesday 19 |
Poster Session 2 |
16:00 - 16:30 |
SECRYPT - International Conference on Security and Cryptography |
Foyer |
TOWARDS AN INFORMATION CONTROL POLICY MODEL - Achieving More Transparency in Internet Filtering Approaches |
SECRYPT |
155 |
Poster |
Monday 18 |
Poster Session 1 |
15:45 - 16:15 |
SECRYPT - International Conference on Security and Cryptography |
Foyer |
FAST SELECTIVE ENCRYPTION SCHEME FOR MP3 FILES - Using GRAIN Stream Cipher |
SECRYPT |
157 |
Poster |
Tuesday 19 |
Poster Session 2 |
16:00 - 16:30 |
SECRYPT - International Conference on Security and Cryptography |
Foyer |
NO SECURITY BY OBSCURITY – WHY TWO FACTOR AUTHENTICATION SHOULD BE BASED ON AN OPEN DESIGN |
SECRYPT |
158 |
Poster |
Tuesday 19 |
Poster Session 2 |
16:00 - 16:30 |
SECRYPT - International Conference on Security and Cryptography |
Foyer |
ARTIFICIAL IMMUNITY-BASED CORRELATION SYSTEM |
SECRYPT |
160 |
Poster |
Tuesday 19 |
Poster Session 2 |
16:00 - 16:30 |
SECRYPT - International Conference on Security and Cryptography |
Foyer |
INTERNATIONALLY STANDARDIZED EFFICIENT CRYPTOGRAPHIC HASH FUNCTION |
SECRYPT |
162 |
Poster |
Tuesday 19 |
Poster Session 2 |
16:00 - 16:30 |
SECRYPT - International Conference on Security and Cryptography |
Foyer |
A PUBLIC RANDOMNESS SERVICE |
WINSYS |
7 |
20 min |
Monday 18 |
Session 2 |
16:15 - 17:45 |
Sensor, Mesh and Ad Hoc Communications and Networks |
AULA A0.13 |
DEVELOPMENT TOOLS FOR PERVASIVE COMPUTING IN EMBEDDED SYSTEMS (PECES) MIDDLEWARE |
WINSYS |
8 |
20 min |
Tuesday 19 |
Session 3 |
09:00 - 10:30 |
Sensor, Mesh and Ad Hoc Communications and Networks |
AULA A0.13 |
MAC SCHEDULING IN LARGE-SCALE UNDERWATER ACOUSTIC NETWORKS |
WINSYS |
10 |
20 min |
Wednesday 20 |
Session 7 |
09:00 - 10:30 |
Wireless and Mobile Technologies |
AULA A0.13 |
WIDEBAND WIRELESS PROPAGATION IN CONFINED SPACES |
WINSYS |
11 |
30 min |
Tuesday 19 |
Session 4 |
11:45 - 12:45 |
Wireless and Mobile Technologies |
AULA A0.13 |
MODULATION-MODE ASSIGNMENT IN SVD-ASSISTED MULTIUSER MIMO-OFDM SYSTEMS |
WINSYS |
12 |
20 min |
Tuesday 19 |
Session 3 |
09:00 - 10:30 |
Sensor, Mesh and Ad Hoc Communications and Networks |
AULA A0.13 |
DEPLOYMENT OF A WIRELESS SENSOR NETWORK IN A VINEYARD |
WINSYS |
16 |
20 min |
Monday 18 |
Session 2 |
16:15 - 17:45 |
Sensor, Mesh and Ad Hoc Communications and Networks |
AULA A0.13 |
QOS-AWARE MULTIPATH ROUTING PROTOCOL FOR DELAY SENSITIVE APPLICATIONS IN MANETS - A Cross-layer Approach |
WINSYS |
18 |
Poster |
Tuesday 19 |
Poster Session 2 |
16:00 - 16:30 |
Sensor, Mesh and Ad Hoc Communications and Networks |
Foyer |
MULTIPLE TARGETS DETECTION AND LOCALIZATION BASED ON BLIND ESTIMATION IN WIRELESS SENSOR NETWORK |
WINSYS |
22 |
Poster |
Tuesday 19 |
Poster Session 2 |
16:00 - 16:30 |
Sensor, Mesh and Ad Hoc Communications and Networks |
Foyer |
A LOAD-BALANCED TOPOLOGY MAINTENANCE WITH PARTIAL RECONSTRUCTION OF CONNECTED DOMINATING SETS |
WINSYS |
23 |
30 min |
Tuesday 19 |
Session 4 |
11:45 - 12:45 |
Wireless and Mobile Technologies |
AULA A0.13 |
EXPERIMENTAL VALIDATION FOR TR-UWB SYSTEMS - By Time Delayed Sampling & Correlation (TDSC) |
WINSYS |
26 |
20 min |
Tuesday 19 |
Session 3 |
09:00 - 10:30 |
Sensor, Mesh and Ad Hoc Communications and Networks |
AULA A0.13 |
FINGERPRINT INDOOR POSITION SYSTEM BASED ON OPENMAC |
WINSYS |
27 |
30 min |
Monday 18 |
Session 2 |
16:15 - 17:45 |
Sensor, Mesh and Ad Hoc Communications and Networks |
AULA A0.13 |
DISTRIBUTED JOINT POWER AND RATE ADAPTATION IN AD HOC NETWORKS |
WINSYS |
29 |
20 min |
Tuesday 19 |
Session 3 |
09:00 - 10:30 |
Sensor, Mesh and Ad Hoc Communications and Networks |
AULA A0.13 |
PROTECTION AGAINST BYZANTINE ATTACKS ON WIRELESS SENSOR NETWORKS |
WINSYS |
39 |
Poster |
Monday 18 |
Poster Session 1 |
15:45 - 16:15 |
Wireless and Mobile Technologies |
Foyer |
AN INTELLIGENT MAINTENANCE BASED ON MACHINE LEARNING APPROACH FOR WIRELESS AND MOBILE SYSTEMS |
WINSYS |
41 |
20 min |
Wednesday 20 |
Session 7 |
09:00 - 10:30 |
Wireless and Mobile Technologies |
AULA A0.13 |
COMPLEXITY ANALYSIS OF A HYBRID THRESHOLD-BASED ZF-MMSE EQUALIZER FOR SIC-BASED MIMO-OFDM RECEIVERS |
WINSYS |
42 |
Poster |
Tuesday 19 |
Poster Session 2 |
16:00 - 16:30 |
Sensor, Mesh and Ad Hoc Communications and Networks |
Foyer |
EFFICIENT NETWORK DESIGN FOR ENVIRONMENTAL MONITORING APPLICATIONS - A Practical Approach |
WINSYS |
43 |
30 min |
Wednesday 20 |
Session 8 |
11:45 - 12:45 |
Wireless and Mobile Technologies |
AULA A0.13 |
CONGESTION CONTROL WITH DYNAMIC THRESHOLD ADAPTATION AND CROSS-LAYER RESPONSE FOR TCP OVER IEEE 80.11 WIRELESS NETWORKS |
WINSYS |
44 |
30 min |
Wednesday 20 |
Session 8 |
11:45 - 12:45 |
Sensor, Mesh and Ad Hoc Communications and Networks |
AULA A0.13 |
APPLICATION OF ANT COLONY OPTIMIZATION TO DEVELOP ENERGY EFFICIENT PROTOCOL IN MOBILE AD-HOC NETWORKS |