08:30 |
Welcome Desk & Registration (08:30 - 09:00)
|
09:00 |
-
14:
MULTIPLE VECTOR CLASSIFICATION FOR P2P TRAFFIC IDENTIFICATION
F. J. Salcedo-Campos, J. E. Díaz-Verdejo and P. García-Teodoro
-
18:
COMPUTATIONAL INTELLIGENCE APPLIED TO WILDFIRE PREDICTION USING WIRELESS SENSOR NETWORKS
V. G. Gasull, D. F. Larios, J. Barbancho, C. León and M. S. Obaidat
-
27:
MODEL-BASED STOCHASTIC SIMULATION OF SUPER PEER PROMOTION IN P2P VOIP USING GRAPH TRANSFORMATION
Ajab Khan and Reiko Heckel
-
37:
A METHOD FOR FLEXIBLE REDUCTION OVER BINARY FIELDS USING A FIELD MULTIPLIER
Saptarsi Das, Keshavan Varadarajan, Ganesh Garga, Rajdeep Mondal, Ranjani Narayan and S. K. Nandy
-
49:
ON THE (NON-)REUSABILITY OF FUZZY SKETCHES AND EXTRACTORS AND SECURITY IN THE COMPUTATIONAL SETTING
Marina Blanton and Mehrdad Aliasgari
-
56:
DRIVER AUTHENTICATION USING BRAIN WAVES WHILE ROUTE TRACING AS A MENTAL TASK
Isao Nakanishi, Sadao Baba and Masahiro Inoue
-
30:
ANOMALY-BASED SPAM FILTERING
Igor Santos, Carlos Laorden, Xabier Ugarte-Pedrero, Borja Sanz and Pablo G. Bringas
-
41:
RELATED-KEY ATTACK AGAINST TRIPLE ENCRYPTION BASED ON FIXED POINTS
Serge Vaudenay
-
91:
ON THE STRENGTH OF EGGLUE AND OTHER LOGIC CAPTCHAs
Carlos Javier Hernández-Castro, Arturo Ribagorda and Julio Cesar Hernandez Castro
-
8:
MAC SCHEDULING IN LARGE-SCALE UNDERWATER ACOUSTIC NETWORKS
Wouter van Kleunen, Nirvana Meratnia and Paul J. M. Havinga
-
12:
DEPLOYMENT OF A WIRELESS SENSOR NETWORK IN A VINEYARD
José A. Gay-Fernández and Iñigo Cuiñas
-
26:
FINGERPRINT INDOOR POSITION SYSTEM BASED ON OPENMAC
A. Verónica Medina, José A. Gómez, Octavio Rivera, Enrique Dorronzoro and Manuel Merino
-
29:
PROTECTION AGAINST BYZANTINE ATTACKS ON WIRELESS SENSOR NETWORKS
Björn Stelte
|
10:30 |
Coffee-Break (10:30 - 10:45)
|
10:45 |
|
11:45 |
-
21:
LOCALIZATION METHOD FOR LOW POWER CONSUMPTION SYSTEMS
D. F. Larios, J. Barbancho, F. J. Molina and C. León
-
22:
UTILIZING VIDEO ENCODING FOR POWER MANAGEMENT OVER WIRELESS NETWORKS
C. Bouras, K. Stamos, S. Stroumpis and G. Zaoudis
-
9:
TECHNOLOGY FOR BUSINESS - Supporting Industries as a Main Driving Force for E-commerce Adoption in Saudi Arabia
Hani Brdesee, Brian Corbitt and Siddhi Pittayachawan
-
26:
TOWARD AUTOMATIC GENERATION OF SPARQL RESULT SET VISUALIZATIONS - A Use Case in Service Monitoring
Marcello Leida, Du Xiaofeng, Paul Taylor and Basim Majeed
-
33:
SMARTPHONE SECURITY EVALUATION - The Malware Attack Case
Alexios Mylonas, Stelios Dritsas, Bill Tsoumas and Dimitris Gritzalis
-
73:
A SMART CARD BASED GENERIC CONSTRUCTION FOR ANONYMOUS AUTHENTICATION IN MOBILE NETWORKS
Jing Xu, Wen-Tao Zhu and Deng-Guo Feng
-
11:
MODULATION-MODE ASSIGNMENT IN SVD-ASSISTED MULTIUSER MIMO-OFDM SYSTEMS
Sebastian Aust, Andreas Ahrens and César Benavente-Peces
-
23:
EXPERIMENTAL VALIDATION FOR TR-UWB SYSTEMS - By Time Delayed Sampling & Correlation (TDSC)
Jorge A. Pardiñas-Mir, Muriel Muller, Roger Lamberti and Claude Gimenes
|
12:45 |
Lunch (12:45 - 14:00)
|
14:00 |
-
12:
WHAT IS THE RIGHT SERVICE? A MULTI-CRITERIA DECISION MODEL BASED ON ‘STEP’
Tobias Mettler and Markus Eurich
-
16:
SUPPORTING SAFETY THROUGH SOCIAL TERRITORIAL NETWORKS
Martin Steinhauser, Andreas C. Sonnenbichler and Andreas Geyer-Schulz
-
43:
QUALITY OF SERVICE AGGREGATION IN E-BUSINESS APPLICATIONS
Nabil Fakhfakh, Frédéric Pourraz and Hervé Verjus
-
48:
HANDWRITING RECOGNITION ON MOBILE DEVICES - State of the Art Technology, Usability and Business Analysis
Andreas Holzinger, Lamija Basic, Bernhard Peischl and Matjaz Debevc
-
32:
THREE-PARTY PASSWORD-AUTHENTICATED KEY EXCHANGE WITHOUT RANDOM ORACLES
Xun Yi, Raylin Tso and Eiji Okamoto
-
77:
PRIVACY-PRESERVING SMART METERING WITHOUT A TRUSTED-THIRD-PARTY
Tobias Jeske
-
88:
INFORMATION-LEAKAGE IN HYBRID RANDOMIZED PROTOCOLS
Stefan Rass and Peter Schartner
-
109:
HIGHER LAYER AUTHENTICATION FOR BROADCAST IN CONTROLLER AREA NETWORKS
Bogdan Groza and Pal-Stefan Murvay
-
43:
COLLECTIVE CLASSIFICATION FOR UNKNOWN MALWARE DETECTION
Igor Santos, Carlos Laorden and Pablo G. Bringas
-
97:
IS IP MULTIMEDIA SUBSYSTEM AFFECTED BY ‘MALFORMED MESSAGE’ ATTACKS? - An Evaluation of OpenIMS
Nikos Vrakas, Dimitris Geneiatakis and Costas Lambrinoudakis
-
104:
A FORWARD PRIVATE PROTOCOL BASED ON PRNG AND LPN FOR LOW-COST RFID
Xiaolin Cao and Maire O’Neill
-
116:
E-COMMERCE AND FAIR EXCHANGE - The Problem of Item Validation
Fabio Piva and Ricardo Dahab
-
20:
A NON-UNIFORM REAL-TIME SPEECH TIME-SCALE STRETCHING METHOD
Adam Kupryjanow and Andrzej Czyzewski
-
21:
ESTIMATION-DECODING ON LDPC-BASED 2D-BARCODES
W. Proß, M. Otesteanu and F. Quint
-
23:
HAND IMAGE SEGMENTATION BY MEANS OF GAUSSIAN MULTISCALE AGGREGATION FOR BIOMETRIC APPLICATIONS
Alberto de Santos Sierra, Carmen Sánchez Ávila, Javier Guerra Casanova and Gonzalo Bailador del Pozo
-
33:
SEGMENTATION OF TOUCHING LANNA CHARACTERS
Sakkayaphop Pravesjit and Arit Thammano
|
16:00 |
DCNET
-
5:
RETHINKING ISP ARCHITECTURES THROUGH VIRTUALIZATION
Alejandro Cordero and David Fernández
-
24:
APPLICATION-TRANSPARENT INTEGRATION OF SIMULATION TOOLS IN A WSN DEVELOPMENT ENVIRONMENT
Juan Luis Font, Pablo Iñigo, Manuel Domínguez, José Luis Sevillano and Daniel Cascado
-
29:
ARCHITECTURE FOR ENVIRONMENTAL DATA ACCESS IN WSN
J. M. Mora-Merchan, F. J. Molina, D. F. Larios, G. Rodriguez, J. Barbancho and C. León
-
14:
MODELING FACTORS THAT INFLUENCE ONLINE TRAVEL BOOKING
Michael Conyette
-
25:
BUSINESS MODEL APROACH FOR QOE OPTIMIZED SERVICE DELIVERY
José I. Aznar, Eduardo Virute, Julian Fernandez-Navajas, Jose Ruiz-Mas, Jose Saldana and L. Casadesus
-
44:
EVALUATION OF NEW DISTRIBUTION CHANNELS FOR IP INTERACTIVE QOE BASED SERVICES
Jose I. Aznar, Jose Ruiz-Mas, L. Casadesus, Jose Saldana, Julian Fernandez-Navajas and Eduardo Virute
-
64:
STUDY ON SUCCESS FACTORS OF TOURISM WEBSITES
Her-Sen Doong, Huichih Wang and You-Yu Chen
-
65:
A MOTIVATION FOR A MODERN WEB SERVICE DESCRIPTION
Konstanty Haniewicz
-
69:
SEMANTIC-BASED DELIVERY OF E-SERVICES APPLYING THE SAAS APPROACH - Poster Paper
Agata Filipowska, Monika Kaczmarek and Tomasz Kaczmarek
-
12:
OPTICAL DOMAIN MULTIUSER INTERFERENCE ESTIMATION FOR SPECTRAL PHASE ENCODING OPTICAL FIBRE CDMA SYSTEMS
Arash Yazdani, Morteza Noshad, Hojat Jaliloghli, Amirhossein Jaliloghli and Mohammad Noshad
-
60:
THE IMAGE PROTECTOR - A Flexible Security Rule Specification Toolkit
Bechara Al Bouna, Richard Chbeir and Alban Gabillon
-
75:
A NEW STEGANOGRAPHIC SCHEME BASED ON FIRST ORDER REED MULLER CODES - A New Steganographic Scheme
Houda Jouhari and El Mamoun Souidi
-
85:
OPBUS: RISK-AWARE FRAMEWORK FOR THE CONFORMANCE OF SECURITY-QUALITY REQUIREMENTS IN BUSINESS PROCESSES
A. J. Varela-Vaca, Rafael M. Gasca and Sergio Pozo
-
118:
APOLLON: TOWARDS A SEMANTICALLY EXTENSIBLE POLICY FRAMEWORK
Julian Schütte
-
153:
TOWARDS AN INFORMATION CONTROL POLICY MODEL - Achieving More Transparency in Internet Filtering Approaches
Andreas Kasten
-
157:
NO SECURITY BY OBSCURITY – WHY TWO FACTOR AUTHENTICATION SHOULD BE BASED ON AN OPEN DESIGN
Jinying Yu and Philipp Brune
-
158:
ARTIFICIAL IMMUNITY-BASED CORRELATION SYSTEM
Guillermo Suarez-Tangil, Esther Palomar, Sergio Pastrana and Arturo Ribagorda
-
160:
INTERNATIONALLY STANDARDIZED EFFICIENT CRYPTOGRAPHIC HASH FUNCTION
Danilo Gligoroski, Svein Johan Knapskog, Jørn Amundsen and Rune Erlend Jensen
-
162:
A PUBLIC RANDOMNESS SERVICE
Michael J. Fischer, Michaela Iorga and René Peralta
-
10:
COLOR FACE RECOGNITION - A Multilinear-PCA Approach Combined with Hidden Markov Models
Dimitrios S. Alexiadis and Dimitrios Glaroudis
-
11:
REAL-TIME FACE RECOGNITION WITH GPUs - A DCT-based Face Recognition System using Graphics Processing Unit
Dimitrios S. Alexiadis, Anastasia Papastergiou and Athanasios Hatzigaidas
-
25:
STEREO VISION MATCHING OVER SINGLE-CHANNEL COLOR-BASED SEGMENTATION
Pablo Revuelta Sanz, Belén Ruiz Mezcua, José M. Sánchez Pena and Jean-Phillippe Thiran
-
51:
VIDEO SURVEILLANCE AT AN INDUSTRIAL ENVIRONMENT USING AN ADDRESS EVENT VISION SENSOR - Comparative between Two Different Video Sensor based on a Bioinspired Retina
Fernando Perez-Peña, Arturo Morgado-Estevez, Rafael J. Montero-Gonzalez, Alejandro Linares-Barranco and Gabriel Jimenez-Moreno
-
18:
MULTIPLE TARGETS DETECTION AND LOCALIZATION BASED ON BLIND ESTIMATION IN WIRELESS SENSOR NETWORK
Peng Zhang, Xiaoyong Deng, Huimin Wen and Jifu Guo
-
22:
A LOAD-BALANCED TOPOLOGY MAINTENANCE WITH PARTIAL RECONSTRUCTION OF CONNECTED DOMINATING SETS
Youn-Sik Hong, Hwa-Seok Lim and Chol-Ho Lee
-
42:
EFFICIENT NETWORK DESIGN FOR ENVIRONMENTAL MONITORING APPLICATIONS - A Practical Approach
Farooq Sultan and Salam A. Zummo
|
16:15 |
Coffee-Break (16:15 - 16:30)
|
16:30 |
-
71:
THE DEVELOPMENT OF A WEB MAPPING SYSTEM AND ITS APPLICATION
Balqies Sadoun, Omar Al-Bayari and Samih Al-Rawashdeh
-
20:
COLLECTIVETHOUGHT - Supporting Virtual Teams with Semantic Networks
Kathy Ning Shen and Mohamed Khalifa
-
13:
PHOTONIC ANALOGUE-TO-DIGITAL CONVERTER BASED ON WAVELENGTH DIVISION MULTIPLEXING TECHNIQUE
Tiago Alves and Adolfo Cartaxo
-
1:
A STABLE TUNABLE AND SWITCHABLE DUAL-WAVELENGTH SINGLE-LONGITUDINAL-MODE ERBIUM-DOPED FIBER LINEAR-CAVITY LASER
Xiaoying He, D. N. Wang and Changrui Liao
-
2:
OPTICAL MIMO MULTIMODE FIBER LINKS - Channel Measurements and System Performance Analysis
Andreas Ahrens, Jens Pankow, Sebastian Aust and Steffen Lochmann
-
9:
OPTIMIZATION OF OPTICAL SSB-OFDM SYSTEM WITH DIRECT DETECTION FOR APPLICATION IN METROPOLITAN/REGIONAL NETWORKS
Bruno M. M. Meireles and João L. Rebola
-
86:
BYTE SLICING GRØSTL - Optimized Intel AES-NI and 8-bit Implementations of the SHA-3 Finalist Grøstl
Kazumaro Aoki, Günther Roland, Yu Sasaki and Martin Schläffer
-
90:
ATTACK INTERFERENCE IN NON-COLLABORATIVE SCENARIOS FOR SECURITY PROTOCOL ANALYSIS
M.-Camilla Fiazza, Michele Peroli and Luca Viganò
-
112:
A SNORT-BASED MOBILE AGENT FOR A DISTRIBUTED INTRUSION DETECTION SYSTEM
Imen Brahmi, Sadok Ben Yahia and Pascal Poncelet
-
64:
WIRELESS IN-VEHICLE COMPLAINT DRIVER ENVIRONMENT RECORDER
Oscar S. Siordia, Isaac Martín de Diego, Cristina Conde and Enrique Cabello
-
42:
IMAGE DENOISING BASED ON LAPLACE DISTRIBUTION WITH LOCAL PARAMETERS IN LAPPED TRANSFORM DOMAIN
Vijay Kumar Nath and Anil Mahanta
-
43:
IMPROVED INTER MODE DECISION FOR H.264/AVC USING WEIGHTED PREDICTION
Amrita Ganguly and Anil Mahanta
-
45:
IMAGE MATCHING ALGORITHMS IN STEREO VISION USING ADDRESS-EVENT-REPRESENTATION - A Theoretical Study and Evaluation of the Different Algorithms
M. Dominguez-Morales, E. Cerezuela-Escudero, A. Jimenez-Fernandez, R. Paz-Vicente, J. L. Font-Calvo, P. Iñigo-Blasco, A. Linares-Barranco and G. Jimenez-Moreno
|
18:30 |
Social Event (18:30 - 23:30)
|