08:45 |
Welcome Desk & Registration (08:45 - 10:45)
|
10:45 |
|
11:15 |
|
12:30 |
Lunch (12:30 - 14:00)
|
14:00 |
-
2:
AN IMPROVED GMPLS SURVIVABILITY MECHANISM USING LINK DELAY-CONSTRAINED ALGORITHM
Anastasios Bikos, Christos Bouras and Kostas Stamos
-
20:
PERFORMANCE OF OPENDPI TO IDENTIFY TRUNCATED NETWORK TRAFFIC
Jawad Khalife, Amjad Hajjar and Jesús Díaz-Verdejo
-
26:
ANOMALY DETECTION USING FIREFLY HARMONIC CLUSTERING ALGORITHM
Mario H. A. C. Adaniya, Moises F. Lima, Lucas D. H. Sampaio, Taufik Abrão and Mario Lemes Proença Jr.
-
31:
OPTIMIZING CRYPTOGRAPHIC THRESHOLD SCHEMES FOR THE USE IN WIRELESS SENSOR NETWORKS
- Position Paper
Manuel Koschuch, Matthias Hudler, Michael Krüger, Peter Lory and Jürgen Wenzl
-
23:
VALUE-ADDED SERVICES FOR FIBRE TO THE HOME - Market Potential, Time Horizons and User Groups
Tom Evens, Lynn De Vlieger, Elke Boudry, Pieter Verdegem, Lieven De Marez, Erik Vanhauwaert, Koen Casier, Jan Van Ooteghem, Sofie Verbrugge and Bart Lannoo
-
37:
SHOULD COMPANIES BID ON THEIR OWN BRAND IN SPONSORED SEARCH?
Tobias Blask, Burkhardt Funk and Reinhard Schulte
-
10:
REALIZING THE STRATEGIC PLAN OF A TOP-TIER UNIVERSITY IN TAIWAN - A Multi-criteria Evaluation and Alignment
Wei-Chien Chou and Sheng-Tun Li
-
70:
E-BUSINESS INTEROPERABILITY - Challenges and Opportunities
George Feuerlicht
-
35:
TOWARDS OPTIMAL REVOCATION AND TRACING SCHEMES - The Power of the Ternary Tree
Kazuhide Fukushima, Shinsaku Kiyomoto, Yutaka Miyake and Kouichi Sakurai
-
142:
CHAOTIC ITERATIONS FOR STEGANOGRAPHY - Stego-security and Chaos-security
Nicolas Friot, Christophe Guyeux and Jacques M. Bahi
-
66:
ON THE SECURITY OF LOCATION DETERMINATION AND VERIFICATION METHODS FOR WIRELESS NETWORKS
Günther Lackner
-
114:
BOTNET DETECTION BASED ON DNS RECORDS AND ACTIVE PROBING
Iria Prieto, Eduardo Magaña, Daniel Morató and Mikel Izal
-
58:
EMBEDDING RATIO ESTIMATION BASED ON WEIGHTED STEGO IMAGE FOR EMBEDDING IN 2LSB
Chunfang Yang, Tao Zhao, Hanning Li and Fenlin Liu
-
108:
A FRAMEWORK FOR SECURITY AND WORKLOAD GRADUAL ADAPTATION
Antonio Vincenzo Taddeo, Luis Germán García Morales and Alberto Ferrante
-
47:
ANALYSIS OF BOTNETS THROUGH LIFE-CYCLE
R. A. Rodríguez-Gómez, G. Maciá-Fernández and P. García-Teodoro
-
106:
UNOBSERVABLE INTRUSION DETECTION BASED ON CALL TRACES IN PARAVIRTUALIZED SYSTEMS
Carlo Maiero and Marino Miculan
|
15:45 |
DCNET
-
6:
NETWORK PLANNING OF A VOIP-CABLE PBX - The Use of Data Profiling Techniques for an Efficient Network Planning
Igor Ruiz-Agundez, Yoseba K. Penya and Pablo G. Bringas
-
11:
SOFTWARE MODULES AND APPLICATION LAYER’S SECURITY STRUCTURE OF RSMAD
Slawomir Gajewski, Malgorzata Gajewska, Marcin Sokol and Michal Brewka
-
25:
TECHNICAL VIABILITY STUDY FOR BEHAVIORAL MONITORING OF WILDLIFE ANIMALS IN DOÑANA - An 802.15.4 Coverage Study in a Natural Park
M. Dominguez-Morales, A. Jimenez-Fernández, D. Cascado-Caballero, A. Linares-Barranco, R. Paz, G. Jiménez-Moreno and R. Soriguer
-
3:
A FRAMEWORK FOR CLASSIFYING RISKS IN ERP MAINTENANCE PROJECTS
Cristina Lopez and Jose L. Salmeron
-
33:
INFORMATION SYSTEMS AND E-BUSINESS - Risc and Value of Applications to Organizations
Jorge Pereira, José Martins, Vítor Santos and Ramiro Gonçalves
-
40:
CUSTOMER FEEDBACK AND INTERNET - Means used by the Biggest Portuguese Companies
Ramiro Gonçalves, Frederico Branco, José Martins, Vítor Santos and Jorge Pereira
-
51:
ABOUT CREATIVITY IN COLLABORATIVE SYSTEMS - Why it Matters and How it can be Supported
Marius Ioan Podean, Dan Benta and Lucia Rusu
-
63:
A PROPOSAL OF “IDENTITY COMMONS” FOR SERVICE CREATION USING COMMUNICATION LOG - Position Paper
Memiko Otsuki and Noboru Sonehara
-
59:
PRIVATE SEARCHING FOR SENSITIVE FILE SIGNATURES
John Solis
-
79:
DIFFERENTIAL FAULT ANALYSIS OF HUMMINGBIRD
Yaser Esmaeili Salehani and Amr Youssef
-
83:
A NEW TREE-STRUCTURE-SPECIFIED MULTISIGNATURE SCHEME FOR A DOCUMENT CIRCULATION SYSTEM
Masaki Inamura, Keiichi Iwamura, Ryu Watanabe, Makoto Nishikawa and Toshiaki Tanaka
-
87:
SYNEMA: VISUAL MONITORING OF NETWORK AND SYSTEM SECURITY SENSORS
Aline Bousquet, Patrice Clemente and Jean-François Lalande
-
92:
PRIVACY--ENHANCING CRYPTOGRAPHY--BASED MATERIALS
Almudena Alcaide, Esther Palomar, Israel Barroso-Perez and Ali E. Abdallah
-
110:
TOWARDS A CALCULUS FOR NON REPUDIATION PROTOCOLS
Abdesselam Redouane
-
117:
HOW TO TRANSMIT MESSAGES VIA WSN IN A HOSTILE ENVIRONMENT
Marek Klonowski, Michał Koza and Mirisosław Kutyłowski
-
124:
BYZANTINE DECISIONS FOR INFERRING TRUST IN SENSOR NETWORKS
Björn Stelte
-
126:
DISTRIBUTED THRESHOLD CRYPTOGRAPHY CERTIFICATION WITH NO TRUSTED DEALER
Apostolos P. Fournaris
-
148:
PRACTICAL ANONYMOUS AUTHENTICATION - Designing Anonymous Authentication for Everyday Use
Jan Hajny, Lukas Malina and Vaclav Zeman
-
155:
FAST SELECTIVE ENCRYPTION SCHEME FOR MP3 FILES - Using GRAIN Stream Cipher
Praloy Kr. Biswas, Dipanwita Roy Chowdhury and K. S. Dasgupta
-
27:
TWO – DIMENSIONAL CODES ON MOBILE DEVICES AND THE DEVELOPMENT OF THE PLATFORM
José Manuel Fornés Rumbao and Francisco Rodríguez Rubio
-
41:
EXPLORING THE DIFFERENCES IN SURFACE ELECTROMYOGRAPHIC SIGNAL BETWEEN MYOFASCIAL-PAIN AND NORMAL GROUPS - Feature Extraction through Wavelet Denoising and Decomposition
Ching-Fen Jiang, Nan-Ying Yu and Yu Ching Lin
-
61:
AUTOMATIC SOUND RESTORATION SYSTEM - Concepts and Design
Andrzej Czyzewski, Bozena Kostek and Adam Kupryjanow
-
65:
A SPATIAL IMMERSIVE OFFICE ENVIRONMENT FOR COMPUTER-SUPPORTED COLLABORATIVE WORK - Moving Towards the Office of the Future
Maarten Dumont, Sammy Rogmans, Steven Maesen, Karel Frederix, Johannes Taelman and Philippe Bekaert
-
66:
FOUR-PHASE RE-SPEAKER TRAINING SYSTEM
Aleš Pražák, Zdeněk Loose, Josef Psutka, Vlasta Radová and Luděk Müller
-
39:
AN INTELLIGENT MAINTENANCE BASED ON MACHINE LEARNING APPROACH FOR WIRELESS AND MOBILE SYSTEMS
Amine Chohra, Felicita Di Giandomenico, Stefano Porcarelli and Andrea Bondavalli
|
16:00 |
Coffee-Break (16:00 - 16:15)
|
16:15 |
-
74:
A TINY RSA COPROCESSOR BASED ON OPTIMIZED SYSTOLIC MONTGOMERY ARCHITECTURE
Zongbin Liu, Luning Xia, Jiwu Jing and Peng Liu
-
95:
A FRESH LOOK INTO THE BIOMETRIC AUTHENTICATION - Perspective from Shannon's Secrecy System and a Special Wiretap Channel
Yanling Chen and A. J. Han Vinck
-
16:
THE WINDSURF LIBRARY FOR THE EFFICIENT RETRIEVAL OF MULTIMEDIA HIERARCHICAL DATA
Ilaria Bartolini, Marco Patella and Guido Stromei
-
29:
LATENT TOPIC VISUAL LANGUAGE MODEL FOR OBJECT CATEGORIZATION
Lei Wu, Nenghai Yu, Jing Liu and Mingjing Li
-
59:
A GENETIC APPROACH FOR IMPROVING THE SIDE INFORMATION IN WYNER-ZIV VIDEO CODING WITH LONG DURATION GOP
Charles Yaacoub, Joumana Farah and Chadi Jabroun
-
12:
CONTEXT BASED WATERMARKING OF SECURE JPEG-LS IMAGES
A. V. Subramanyam and Sabu Emmanuel
-
30:
EFFECTIVE INTERFERENCE REDUCTION METHOD FOR SPREAD SPECTRUM FINGERPRINTING
Minoru Kuribayashi
-
60:
OPTIMAL COMBINATION OF LOW-LEVEL FEATURES FOR SURVEILLANCE OBJECT RETRIEVAL
Virginia Fernandez Arguedas, Krishna Chandramouli, Qianni Zhang and Ebroul Izquierdo
-
68:
WHAT ARE GOOD CGS/MGS CONFIGURATIONS FOR H.264 QUALITY SCALABLE CODING?
Shih-Hsuan Yang and Wei-Lune Tang
-
27:
DISTRIBUTED JOINT POWER AND RATE ADAPTATION IN AD HOC NETWORKS
Fredrick Mzee Awuor, Karim Djouani and Guillaume Noel
-
7:
DEVELOPMENT TOOLS FOR PERVASIVE COMPUTING IN EMBEDDED SYSTEMS (PECES) MIDDLEWARE
Ran Zhao, Kirusnapillai Selvarajah and Neil Speirs
-
16:
QOS-AWARE MULTIPATH ROUTING PROTOCOL FOR DELAY SENSITIVE APPLICATIONS IN MANETS - A Cross-layer Approach
Mu’ath Obaidat, M. A. Ali, Ihsan Shahwan, M. S. Obaidat and Suhaib Obeidat
|
17:45 |
|
18:45 |
Tapas Cocktail (18:45 - 19:30)
|
19:30 |
Buses to Reales Alcazares and Guided Visit (19:30 - 22:00)
|