DCNET |
3 |
Poster |
Wednesday 25 |
Poster Session 1 |
16:30 - 17:30 |
DCNET - International Conference on Data Communication Networking |
Foyer |
TRAFIL - A Tool for Enhancing Simulation TRAce FILes Processing |
DCNET |
5 |
30 min |
Tuesday 24 |
Session 2 |
14:30 - 16:30 |
DCNET - International Conference on Data Communication Networking |
Sevilla |
A Cross-layer Design for Video Transmission with TFRC in MANETs |
DCNET |
6 |
20 min |
Wednesday 25 |
Session 5 |
14:30 - 16:30 |
DCNET - International Conference on Data Communication Networking |
Sevilla |
Digital Signature of Network Segment using Flow Analysis |
DCNET |
8 |
Poster |
Wednesday 25 |
Poster Session 1 |
16:30 - 17:30 |
DCNET - International Conference on Data Communication Networking |
Foyer |
Hash Algorithms for 8051-based Sensornodes |
DCNET |
9 |
30 min |
Tuesday 24 |
Session 2 |
14:30 - 16:30 |
DCNET - International Conference on Data Communication Networking |
Sevilla |
Study on a Fast OSPF Route Reconstruction Method under Network Failures |
DCNET |
10 |
20 min |
Wednesday 25 |
Session 5 |
14:30 - 16:30 |
DCNET - International Conference on Data Communication Networking |
Sevilla |
Mobile Broadband Traffic Forecasts in Korea |
DCNET |
11 |
30 min |
Tuesday 24 |
Session 2 |
14:30 - 16:30 |
DCNET - International Conference on Data Communication Networking |
Sevilla |
Computational Intelligence Applied to Monitor Bird Behaviour |
DCNET |
17 |
Poster |
Wednesday 25 |
Poster Session 1 |
16:30 - 17:30 |
DCNET - International Conference on Data Communication Networking |
Foyer |
Strictness of Rate-latency Service Curves |
DCNET |
19 |
20 min |
Wednesday 25 |
Session 5 |
14:30 - 16:30 |
DCNET - International Conference on Data Communication Networking |
Sevilla |
Towards a CDN over ICN |
DCNET |
20 |
20 min |
Wednesday 25 |
Session 5 |
14:30 - 16:30 |
DCNET - International Conference on Data Communication Networking |
Sevilla |
Improving Network Performane - Management of Nonlinear Dynamics
|
ICE-B |
3 |
Poster |
Thursday 26 |
Poster Session 2 |
16:30 - 17:30 |
Collaboration and e-Services |
Foyer |
Analysing E-Business Applications with Business Provenance |
ICE-B |
6 |
Poster |
Thursday 26 |
Poster Session 2 |
16:30 - 17:30 |
Sustainable e-Business |
Foyer |
IS Employees’ Stress and Outcomes at Work |
ICE-B |
8 |
30 min |
Thursday 26 |
Session 8 |
14:30 - 16:30 |
Sustainable e-Business |
Dali |
Three Dimensional Elements for Sustainable e-Business Modelling |
ICE-B |
10 |
Poster |
Thursday 26 |
Poster Session 2 |
16:30 - 17:30 |
Applications |
Foyer |
A Study on Older Adult Students’ Behavioural Intention and Learning Satisfaction of Blended e-Learning Course at the Active Aging University |
ICE-B |
13 |
Poster |
Thursday 26 |
Poster Session 2 |
16:30 - 17:30 |
Sustainable e-Business |
Foyer |
Factors that Influence e-Business Application in Tertiary Education |
ICE-B |
16 |
20 min |
Wednesday 25 |
Session 3 |
09:00 - 10:30 |
Enterprise Engineering |
Dali |
Resilient Sustainable Supply Chain Management - A Conceptual Framework |
ICE-B |
21 |
20 min |
Wednesday 25 |
Session 5 |
14:30 - 16:30 |
Applications |
Dali |
The Relative Importance of Teenagers’ Personal Characteristics on Technology Addiction |
ICE-B |
22 |
20 min |
Wednesday 25 |
Session 5 |
14:30 - 16:30 |
Applications |
Dali |
The Use of Internet as a Marketing Tool - Evaluating the Websites of Spain's Top Restaurants |
ICE-B |
23 |
Poster |
Friday 27 |
Poster Session 3 |
10:15 - 11:15 |
Sustainable e-Business |
Foyer |
The Road to a Responsible and Sustainable e-Business |
ICE-B |
24 |
30 min |
Tuesday 24 |
Session 1 |
10:45 - 12:15 |
Collaboration and e-Services |
Dali |
3D Communities as Platforms for Developing Social Capital |
ICE-B |
26 |
30 min |
Tuesday 24 |
Session 2 |
14:30 - 16:30 |
Enterprise Engineering |
Dali |
The User-journey in Online Search - An Empirical Study of the Generic-to-Branded Spillover Effect based on User-level Data |
ICE-B |
27 |
20 min |
Thursday 26 |
Session 8 |
14:30 - 16:30 |
Collaboration and e-Services |
Dali |
A Framework for Performance Measurement in Service Oriented Virtual Organizations - A Value Network Approach to Collaborative Performance Measurement |
ICE-B |
29 |
30 min |
Tuesday 24 |
Session 1 |
10:45 - 12:15 |
Collaboration and e-Services |
Dali |
Search Engine Optimization Meets e-Business - A Theory-based Evaluation: Findability and Usability as Key Success Factors |
ICE-B |
32 |
Poster |
Friday 27 |
Poster Session 3 |
10:15 - 11:15 |
Enterprise Engineering |
Foyer |
Paths of Business Model Evolution - Findings from Business Model Patents |
ICE-B |
33 |
20 min |
Thursday 26 |
Session 8 |
14:30 - 16:30 |
Sustainable e-Business |
Dali |
Identifying Emerging Technologies in the e-Business Industry - A Needs-driven Approach |
ICE-B |
34 |
30 min |
Wednesday 25 |
Session 4 |
10:45 - 12:15 |
Mobility |
Dali |
On the Development of Smart Adaptive User Interfaces for Mobile e-Business Applications - Towards Enhancing User Experience – Some Lessons Learned |
ICE-B |
36 |
Poster |
Friday 27 |
Poster Session 3 |
10:15 - 11:15 |
Collaboration and e-Services |
Foyer |
Comparison Study of Some Collaborative Tools Use in Virtual Teams |
ICE-B |
38 |
Poster |
Wednesday 25 |
Poster Session 1 |
16:30 - 17:30 |
Mobility |
Foyer |
A Mobile Information System for Improved Navigation in Public Transport - User Centered Design, Development, Evaluation and e-Business Scenarios of a Mobile Roadmap Application |
ICE-B |
39 |
20 min |
Wednesday 25 |
Session 3 |
09:00 - 10:30 |
Enterprise Engineering |
Dali |
Developing a Conceptual Framework to Structure an IT Organization using an Ontology Engineering Methodology |
ICE-B |
41 |
20 min |
Friday 27 |
Session 9 |
09:15 - 10:15 |
Collaboration and e-Services |
Dali |
Usability of Mobile Applications - Dissemination of Usability Engineering in Small and Medium Enterprises |
ICE-B |
42 |
30 min |
Wednesday 25 |
Session 4 |
10:45 - 12:15 |
Applications |
Dali |
Planning, Designing and Evaluating Multiple eGovernment Interventions |
ICE-B |
43 |
20 min |
Friday 27 |
Session 9 |
09:15 - 10:15 |
Collaboration and e-Services |
Dali |
A Dimension Integration Method for a Heterogeneous Data Warehouse Environment |
ICE-B |
44 |
30 min |
Thursday 26 |
Session 8 |
14:30 - 16:30 |
Collaboration and e-Services |
Dali |
Evaluating Disseminators for Time-critical Information Diffusion on Social Networks |
ICE-B |
47 |
20 min |
Wednesday 25 |
Session 3 |
09:00 - 10:30 |
Enterprise Engineering |
Dali |
Evaluation of Maturity Models for Business Process Management - Maturity Models for Small and Medium-sized Enterprises |
ICE-B |
48 |
20 min |
Wednesday 25 |
Session 5 |
14:30 - 16:30 |
Applications |
Dali |
ArchaeoApp Rome Edition (AARE): Making Invisible Sites Visible - e-Business Aspects of Historic Knowledge Discovery via Mobile Devices |
ICE-B |
49 |
Poster |
Wednesday 25 |
Poster Session 1 |
16:30 - 17:30 |
Collaboration and e-Services |
Foyer |
Collaborative Security Management Services for Port Information Systems |
ICE-B |
50 |
20 min |
Wednesday 25 |
Session 3 |
09:00 - 10:30 |
Enterprise Engineering |
Dali |
Leveraging the Software Ecosystem - Towards a Business Model Framework for Marketplaces |
ICE-B |
51 |
30 min |
Tuesday 24 |
Session 2 |
14:30 - 16:30 |
Enterprise Engineering |
Dali |
Strategic Planning in Highly Dinamic Competitive Contexts - A Study of Italian Mobile Network Operators |
ICE-B |
55 |
20 min |
Wednesday 25 |
Session 5 |
14:30 - 16:30 |
Applications |
Dali |
Pattern Characterization in Multivariate Data Series using Fuzzy Logic - Applications to e-Health |
ICE-B |
56 |
20 min |
Wednesday 25 |
Session 5 |
14:30 - 16:30 |
Applications |
Dali |
Measurement and Concepts of Individual Application Capability of e-Business |
ICE-B |
58 |
20 min |
Thursday 26 |
Session 8 |
14:30 - 16:30 |
Collaboration and e-Services |
Dali |
Local Governments and Cloud Computing Security |
ICE-B |
60 |
20 min |
Friday 27 |
Session 9 |
09:15 - 10:15 |
Collaboration and e-Services |
Dali |
e-Business - An Online Shop in the Area of Technical and Scientific Publications |
ICE-B |
61 |
30 min |
Tuesday 24 |
Session 2 |
14:30 - 16:30 |
Applications |
Dali |
Geographic Information System using ArcGIS 10 and Open Source MapWindow - Methodology and Comparative Study |
OPTICS |
8 |
Poster |
Wednesday 25 |
Poster Session 1 |
16:30 - 17:30 |
OPTICS - International Conference on Optical Communication Systems |
Foyer |
AMO-OFDM Signal Delivery of 20 Gbit/S throughput in 20-Km Single Loopback Fiber Link Employing Baseband I/Q Separation - Adaptive Optical OFDM Modulation and Separate I/Q Baseband Signal Transmission with Remotely-fed RSOAs for Colorless ONU in Next-generation WDM Access |
OPTICS |
10 |
30 min |
Thursday 26 |
Session 7 |
10:45 - 12:15 |
OPTICS - International Conference on Optical Communication Systems |
Dali |
Channel-encoded and SVD-assisted MIMO Multimode Transmission Schemes with Iterative Detection |
OPTICS |
13 |
30 min |
Thursday 26 |
Session 7 |
10:45 - 12:15 |
OPTICS - International Conference on Optical Communication Systems |
Dali |
High Repetition Frequency Mode-locked Semiconductor Disk Laser |
OPTICS |
15 |
20 min |
Friday 27 |
Session 9 |
09:15 - 10:15 |
OPTICS - International Conference on Optical Communication Systems |
Sevilla |
Budget Extension Schemes for Nx10 Gbit/s DPSK-based TDM/WDM PON |
OPTICS |
16 |
20 min |
Friday 27 |
Session 9 |
09:15 - 10:15 |
OPTICS - International Conference on Optical Communication Systems |
Sevilla |
Success Probability Evaluation of Quantum Circuits based on Probabilistic CNOT-Gates |
OPTICS |
22 |
20 min |
Friday 27 |
Session 9 |
09:15 - 10:15 |
OPTICS - International Conference on Optical Communication Systems |
Sevilla |
All-optical Multi-wavelength Virtual Memory Architecture - Design and Performances Analysis |
SECRYPT |
7 |
30 min |
Thursday 26 |
Session 6 |
09:00 - 10:30 |
SECRYPT - International Conference on Security and Cryptography |
Valencia |
Practical Applications of Homomorphic Encryption |
SECRYPT |
9 |
30 min |
Wednesday 25 |
Session 4 |
10:45 - 12:15 |
SECRYPT - International Conference on Security and Cryptography |
Valencia |
Reversible Steganographic Scheme with High Embedding Capacity using Dual Cover Images |
SECRYPT |
12 |
Poster |
Wednesday 25 |
Poster Session 1 |
16:30 - 17:30 |
SECRYPT - International Conference on Security and Cryptography |
Foyer |
Flexible Group Key Exchange with On-demand Computation of Subgroup Keys Supporting Subgroup Key Randomization |
SECRYPT |
15 |
30 min |
Thursday 26 |
Session 8 |
14:30 - 16:30 |
SECRYPT - International Conference on Security and Cryptography |
Valencia |
Improved “Partial Sums”-based Square Attack on AES |
SECRYPT |
16 |
20 min |
Friday 27 |
Session 9 |
09:15 - 10:15 |
SECRYPT - International Conference on Security and Cryptography |
Valencia |
Analysis of Some Natural Variants of the PKP Algorithm |
SECRYPT |
18 |
30 min |
Thursday 26 |
Session 8 |
14:30 - 16:30 |
SECRYPT - International Conference on Security and Cryptography |
Valencia |
Two Dragons - A Family of Fast Word-based Stream Ciphers |
SECRYPT |
20 |
30 min |
Thursday 26 |
Session 7 |
10:45 - 12:15 |
SECRYPT - International Conference on Security and Cryptography |
Valencia |
Identity-based Password-Authenticated Key Exchange for Client/Server Model |
SECRYPT |
22 |
Poster |
Thursday 26 |
Poster Session 2 |
16:30 - 17:30 |
SECRYPT - International Conference on Security and Cryptography |
Foyer |
lmRNG: A Lightweight Pseudorandom Number Generator for Wireless Sensor Networks |
SECRYPT |
25 |
20 min |
Tuesday 24 |
Session 1 |
10:45 - 12:15 |
SECRYPT - International Conference on Security and Cryptography |
Valencia |
VLR Group Signatures - How to Achieve Both Backward Unlinkability and Efficient Revocation Checks |
SECRYPT |
26 |
Poster |
Wednesday 25 |
Poster Session 1 |
16:30 - 17:30 |
SECRYPT - International Conference on Security and Cryptography |
Foyer |
On Secure Communication over Wireless Sensor Networks |
SECRYPT |
34 |
30 min |
Thursday 26 |
Session 8 |
14:30 - 16:30 |
SECRYPT - International Conference on Security and Cryptography |
Valencia |
Quantitative Assessment of Cloud Security Level Agreements - A Case Study |
SECRYPT |
38 |
30 min |
Thursday 26 |
Session 6 |
09:00 - 10:30 |
SECRYPT - International Conference on Security and Cryptography |
Valencia |
Privacy-preserving Targeted Advertising Scheme for IPTV using the Cloud |
SECRYPT |
40 |
30 min |
Tuesday 24 |
Session 2 |
14:30 - 16:30 |
SECRYPT - International Conference on Security and Cryptography |
Valencia |
Constructing Secure-channel Free Searchable Encryption from Anonymous IBE with Partitioned Ciphertext Structure |
SECRYPT |
41 |
Poster |
Friday 27 |
Poster Session 3 |
10:15 - 11:15 |
SECRYPT - International Conference on Security and Cryptography |
Foyer |
Self-ad-MCNHA-SLOS - A Self-adaptive Minimum-Cost Network Hardening Algorithm based on Stochastic Loose Optimize Strategy |
SECRYPT |
42 |
30 min |
Thursday 26 |
Session 7 |
10:45 - 12:15 |
SECRYPT - International Conference on Security and Cryptography |
Valencia |
SIMD-based Implementations of Eta Pairing Over Finite Fields of Small Characteristics |
SECRYPT |
44 |
Poster |
Friday 27 |
Poster Session 3 |
10:15 - 11:15 |
SECRYPT - International Conference on Security and Cryptography |
Foyer |
ADQL: A Flexible Access Definition and Query Language to Define Access Control Models |
SECRYPT |
45 |
20 min |
Friday 27 |
Session 9 |
09:15 - 10:15 |
SECRYPT - International Conference on Security and Cryptography |
Valencia |
Securing In-vehicle Communication and Redefining the Role of Automotive Immobilizer |
SECRYPT |
49 |
20 min |
Wednesday 25 |
Session 3a |
09:00 - 10:30 |
SECRYPT - International Conference on Security and Cryptography |
Velazquez |
Building the Security Foundation to Embrace Public Software-as-a-Service (SaaS) - Security Policies for SaaS Data Protection |
SECRYPT |
50 |
20 min |
Tuesday 24 |
Session 1 |
10:45 - 12:15 |
SECRYPT - International Conference on Security and Cryptography |
Valencia |
Security Policies in Dynamic Service Compositions |
SECRYPT |
58 |
30 min |
Wednesday 25 |
Session 3 |
09:00 - 10:30 |
SECRYPT - International Conference on Security and Cryptography |
Valencia |
Homomorphic Primitives for a Privacy-friendly Smart Metering Architecture |
SECRYPT |
59 |
30 min |
Wednesday 25 |
Session 3 |
09:00 - 10:30 |
SECRYPT - International Conference on Security and Cryptography |
Valencia |
Flexible Redactable Signature Schemes for Trees - Extended Security Model and Construction |
SECRYPT |
61 |
20 min |
Tuesday 24 |
Session 1 |
10:45 - 12:15 |
SECRYPT - International Conference on Security and Cryptography |
Valencia |
Towards Pervasive Cryptographic Access Control Models |
SECRYPT |
62 |
20 min |
Tuesday 24 |
Session 1 |
10:45 - 12:15 |
SECRYPT - International Conference on Security and Cryptography |
Valencia |
Cryptographic Enforcement of Access Control while Mitigating Key Sharing |
SECRYPT |
63 |
20 min |
Wednesday 25 |
Session 5 |
14:30 - 16:30 |
SECRYPT - International Conference on Security and Cryptography |
Valencia |
Verifying Privacy by Little Interaction and No Process Equivalence |
SECRYPT |
64 |
20 min |
Wednesday 25 |
Session 5 |
14:30 - 16:30 |
SECRYPT - International Conference on Security and Cryptography |
Valencia |
A Security Analysis of Emerging Web Standards - HTML5 and Friends, from Specification to Implementation |
SECRYPT |
66 |
30 min |
Tuesday 24 |
Session 2 |
14:30 - 16:30 |
SECRYPT - International Conference on Security and Cryptography |
Valencia |
High-throughput Hardware Architectures of the JH Round-three SHA-3 Candidate - An FPGA Design and Implementation Approach |
SECRYPT |
68 |
Poster |
Thursday 26 |
Poster Session 2 |
16:30 - 17:30 |
SECRYPT - International Conference on Security and Cryptography |
Foyer |
Non-repudiation of Forwarding - Traceability of Confidential Data Via Multiple Recipients |
SECRYPT |
72 |
30 min |
Tuesday 24 |
Session 2 |
14:30 - 16:30 |
SECRYPT - International Conference on Security and Cryptography |
Valencia |
Private Outsourcing of Matrix Multiplication over Closed Semi-rings |
SECRYPT |
73 |
30 min |
Wednesday 25 |
Session 3 |
09:00 - 10:30 |
SECRYPT - International Conference on Security and Cryptography |
Valencia |
Extension of de Weger’s Attack on RSA with Large Public Keys |
SECRYPT |
74 |
30 min |
Thursday 26 |
Session 8 |
14:30 - 16:30 |
SECRYPT - International Conference on Security and Cryptography |
Valencia |
On Securing Communication from Profilers |
SECRYPT |
75 |
20 min |
Wednesday 25 |
Session 5 |
14:30 - 16:30 |
SECRYPT - International Conference on Security and Cryptography |
Valencia |
Biometric Identification in Virtual Worlds using Biometric Fusion Techniques |
SECRYPT |
79 |
20 min |
Wednesday 25 |
Session 5 |
14:30 - 16:30 |
SECRYPT - International Conference on Security and Cryptography |
Valencia |
On the Development of Totally Self-checking Hardware Design for the SHA-1 Hash Function |
SECRYPT |
81 |
30 min |
Wednesday 25 |
Session 4 |
10:45 - 12:15 |
SECRYPT - International Conference on Security and Cryptography |
Valencia |
Voice Passwords Revisited |
SECRYPT |
87 |
Poster |
Wednesday 25 |
Poster Session 1 |
16:30 - 17:30 |
SECRYPT - International Conference on Security and Cryptography |
Foyer |
Attack Modelling and Security Evaluation for Security Information and Event Management |
SECRYPT |
91 |
30 min |
Tuesday 24 |
Session 2 |
14:30 - 16:30 |
SECRYPT - International Conference on Security and Cryptography |
Valencia |
DDoS Detection with Information Theory Metrics and Netflows - A Real Case |
SECRYPT |
106 |
Poster |
Thursday 26 |
Poster Session 2 |
16:30 - 17:30 |
SECRYPT - International Conference on Security and Cryptography |
Foyer |
Sevigator: Network Confinement of Malware Applications and Untrusted Operating Systems |
SECRYPT |
110 |
20 min |
Wednesday 25 |
Session 3a |
09:00 - 10:30 |
SECRYPT - International Conference on Security and Cryptography |
Velazquez |
Key Management as a Service |
SECRYPT |
112 |
20 min |
Thursday 26 |
Session 8a |
14:30 - 16:30 |
SECRYPT - International Conference on Security and Cryptography |
Velazquez |
Secure and Seamless Session Management in Mobile and Heterogeneous Environment |
SECRYPT |
113 |
20 min |
Thursday 26 |
Session 8a |
14:30 - 16:30 |
SECRYPT - International Conference on Security and Cryptography |
Velazquez |
A Collaborative Firewall for Wireless Ad-Hoc Social Networks |
SECRYPT |
116 |
20 min |
Wednesday 25 |
Session 5 |
14:30 - 16:30 |
SECRYPT - International Conference on Security and Cryptography |
Valencia |
Some Remarks on Keystroke Dynamics - Global Surveillance, Retrieving Information and Simple Countermeasures |
SECRYPT |
120 |
Poster |
Thursday 26 |
Poster Session 2 |
16:30 - 17:30 |
SECRYPT - International Conference on Security and Cryptography |
Foyer |
Development of a Snort IPv6 Plugin - Detection of Attacks on the Neighbor Discovery Protocol |
SECRYPT |
123 |
20 min |
Friday 27 |
Session 9 |
09:15 - 10:15 |
SECRYPT - International Conference on Security and Cryptography |
Valencia |
An Improved Public-key Tracing Scheme with Sublinear Ciphertext Size |
SECRYPT |
124 |
30 min |
Thursday 26 |
Session 6 |
09:00 - 10:30 |
SECRYPT - International Conference on Security and Cryptography |
Valencia |
Secure File Allocation and Caching in Large-scale Distributed Systems |
SECRYPT |
128 |
30 min |
Thursday 26 |
Session 7 |
10:45 - 12:15 |
SECRYPT - International Conference on Security and Cryptography |
Valencia |
Formal Analysis of the TLS Handshake Protocol |
SECRYPT |
129 |
20 min |
Wednesday 25 |
Session 3a |
09:00 - 10:30 |
SECRYPT - International Conference on Security and Cryptography |
Velazquez |
Data Repository for Security Information and Event Management in Service Infrastructures |
SECRYPT |
130 |
20 min |
Thursday 26 |
Session 8a |
14:30 - 16:30 |
SECRYPT - International Conference on Security and Cryptography |
Velazquez |
Distributed Threshold Certificate based Encryption Scheme with No Trusted Dealer |
SECRYPT |
131 |
20 min |
Thursday 26 |
Session 8a |
14:30 - 16:30 |
SECRYPT - International Conference on Security and Cryptography |
Velazquez |
Improving Cloud Survivability through Dependency based Virtual Machine Placement |
SECRYPT |
132 |
20 min |
Thursday 26 |
Session 8a |
14:30 - 16:30 |
SECRYPT - International Conference on Security and Cryptography |
Velazquez |
PPiTTA - Preserving Privacy in TV Targeted Advertising |
SECRYPT |
135 |
Poster |
Wednesday 25 |
Poster Session 1 |
16:30 - 17:30 |
SECRYPT - International Conference on Security and Cryptography |
Foyer |
The Concept of Compatibility between Identity-based and Certificateless Encryption Schemes |
SECRYPT |
137 |
20 min |
Wednesday 25 |
Session 3a |
09:00 - 10:30 |
SECRYPT - International Conference on Security and Cryptography |
Velazquez |
Quantifying the Benefits of File Size Information for Forensic Hash Matching |
SECRYPT |
139 |
20 min |
Friday 27 |
Session 9 |
09:15 - 10:15 |
SECRYPT - International Conference on Security and Cryptography |
Valencia |
Inverting Thanks to SAT Solving - An Application on Reduced-step MD* |
SECRYPT |
140 |
20 min |
Thursday 26 |
Session 8a |
14:30 - 16:30 |
SECRYPT - International Conference on Security and Cryptography |
Velazquez |
Improved Detection of Probe Request Attacks - Using Neural Networks and Genetic Algorithm |
SECRYPT |
143 |
Poster |
Wednesday 25 |
Poster Session 1 |
16:30 - 17:30 |
SECRYPT - International Conference on Security and Cryptography |
Foyer |
iSATS: Leveraging Identity based Sender Authentication for Spam Mitigation |
SECRYPT |
153 |
Poster |
Thursday 26 |
Poster Session 2 |
16:30 - 17:30 |
SECRYPT - International Conference on Security and Cryptography |
Foyer |
Adaptive Speech Watermarking in Wavelet Domain based on Logarithm |
SECRYPT |
160 |
Poster |
Wednesday 25 |
Poster Session 1 |
16:30 - 17:30 |
SECRYPT - International Conference on Security and Cryptography |
Foyer |
Defense Against TCP Flooding Attack |
SECRYPT |
163 |
Poster |
Thursday 26 |
Poster Session 2 |
16:30 - 17:30 |
SECRYPT - International Conference on Security and Cryptography |
Foyer |
An Application of a Group Signature Scheme with Backward Unlinkability to Biometric Identity Management |
SECRYPT |
164 |
Poster |
Thursday 26 |
Poster Session 2 |
16:30 - 17:30 |
SECRYPT - International Conference on Security and Cryptography |
Foyer |
A Novel Fuzzy Vault Scheme for Secret Key Exchange |
SECRYPT |
167 |
Poster |
Wednesday 25 |
Poster Session 1 |
16:30 - 17:30 |
SECRYPT - International Conference on Security and Cryptography |
Foyer |
Network-based Executable File Extraction and Analysis for Malware Detection |
SECRYPT |
173 |
Poster |
Thursday 26 |
Poster Session 2 |
16:30 - 17:30 |
SECRYPT - International Conference on Security and Cryptography |
Foyer |
HoneyCloud: Elastic Honeypots - On-attack Provisioning of High-interaction Honeypots |
SECRYPT |
174 |
Poster |
Thursday 26 |
Poster Session 2 |
16:30 - 17:30 |
SECRYPT - International Conference on Security and Cryptography |
Foyer |
A Proposed Framework for Analysing Security Ceremonies |
SIGMAP |
7 |
Poster |
Wednesday 25 |
Poster Session 1 |
16:30 - 17:30 |
Multimedia Systems and Applications |
Foyer |
Computer Games Sound Effects - Recording, Postproduction and Existing Database |
SIGMAP |
8 |
Poster |
Thursday 26 |
Poster Session 2 |
16:30 - 17:30 |
Multimedia Signal Processing |
Foyer |
Complexity Analysis of Video Frames by Corresponding Audio Features |
SIGMAP |
11 |
Poster |
Wednesday 25 |
Poster Session 1 |
16:30 - 17:30 |
Multimedia and Communications |
Foyer |
MPEG-4/AVC versus MPEG-2 in IPTV |
SIGMAP |
12 |
Poster |
Thursday 26 |
Poster Session 2 |
16:30 - 17:30 |
Multimedia and Communications |
Foyer |
Design of Short Irregular LDPC Codes for a Markov-modulated Gaussian Channel |
SIGMAP |
13 |
20 min |
Thursday 26 |
Session 8 |
14:30 - 16:30 |
Multimedia Signal Processing |
Sevilla |
Fast Algorithm of Short-time DCT for Low Resolution Signal Processing |
SIGMAP |
18 |
20 min |
Wednesday 25 |
Session 3 |
09:00 - 10:30 |
Multimedia and Communications |
Sevilla |
Adaptive Rate Control Scheme for Improving Quality of Multimedia in Broadband Wireless Networks |
SIGMAP |
33 |
20 min |
Thursday 26 |
Session 6 |
09:00 - 10:30 |
Multimedia Systems and Applications |
Sevilla |
The Effect of Multi-media Contents in Reducing Sensible Temperature |
SIGMAP |
34 |
20 min |
Thursday 26 |
Session 6 |
09:00 - 10:30 |
Multimedia Systems and Applications |
Sevilla |
Image Presentation with Smell for Digital Signage and the Effect on Eye Catching |
SIGMAP |
35 |
Poster |
Friday 27 |
Poster Session 3 |
10:15 - 11:15 |
Multimedia Signal Processing |
Foyer |
Performance Analysis of New SNR Estimation Methodology based on Preamble Approach |
SIGMAP |
36 |
Poster |
Friday 27 |
Poster Session 3 |
10:15 - 11:15 |
Multimedia Signal Processing |
Foyer |
Novel Channel Estimation Algorithm using Various Filter Design in LTE-Advanced System |
SIGMAP |
38 |
20 min |
Thursday 26 |
Session 8 |
14:30 - 16:30 |
Multimedia Signal Processing |
Sevilla |
Sphere Decoding Complexity Reduction using an Adaptive SD-OSIC Algorithm |
SIGMAP |
40 |
Poster |
Thursday 26 |
Poster Session 2 |
16:30 - 17:30 |
Multimedia and Communications |
Foyer |
Enhancing Photoware in the Social Networks Environment |
SIGMAP |
42 |
20 min |
Thursday 26 |
Session 6 |
09:00 - 10:30 |
Multimedia Systems and Applications |
Sevilla |
Architectural Model for Visualization of High Definition Images on Mobile Devices |
SIGMAP |
44 |
30 min |
Wednesday 25 |
Session 4 |
10:45 - 12:15 |
Multimedia Signal Processing |
Sevilla |
Diffusion Tracking Algorithm for Image Segmentation |
SIGMAP |
45 |
Poster |
Wednesday 25 |
Poster Session 1 |
16:30 - 17:30 |
Multimedia Signal Processing |
Foyer |
Optimal Multidimensional Signal Processing in Wireless Sensor Networks |
SIGMAP |
46 |
20 min |
Thursday 26 |
Session 8 |
14:30 - 16:30 |
Multimedia Signal Processing |
Sevilla |
Finding a Tradeoff between Compression and Loss in Motion Compensated Video Coding |
SIGMAP |
47 |
20 min |
Tuesday 24 |
Session 1 |
10:45 - 12:15 |
Multimedia Systems and Applications |
Sevilla |
Consumer Propensity and Location Analysis based Real-time Location Tracing Advertisement Service Design and Implementation - Real-time Location based Advertisement System |
SIGMAP |
48 |
Poster |
Friday 27 |
Poster Session 3 |
10:15 - 11:15 |
Multimedia Systems and Applications |
Foyer |
Semi-dynamic Calibration for Eye Gaze Pointing System based on Image Processing |
SIGMAP |
51 |
Poster |
Thursday 26 |
Poster Session 2 |
16:30 - 17:30 |
Multimedia Signal Processing |
Foyer |
Search Range Adjustment and Motion Vector Prediction for Fast Motion Estimation - Using Neighbouring Motion Vectors and Distortions for Adjustment of a Search Range and a Starting Point |
SIGMAP |
54 |
20 min |
Thursday 26 |
Session 8 |
14:30 - 16:30 |
Multimedia Signal Processing |
Sevilla |
New Two-step Motion Estimation using Adjustable Partial Distortion Search - Advanced Selected Search Point and Early Termination for Two Step Motion Search |
SIGMAP |
55 |
20 min |
Thursday 26 |
Session 8 |
14:30 - 16:30 |
Multimedia Signal Processing |
Sevilla |
Video Foreground/Background Segmentation using Spatially Distributed Model and Edge-based Shadow Cancellation |
SIGMAP |
56 |
20 min |
Thursday 26 |
Session 7 |
10:45 - 12:15 |
Multimedia Systems and Applications |
Sevilla |
Autonomous Constructing Everyday Projected Displays |
SIGMAP |
57 |
20 min |
Wednesday 25 |
Session 3 |
09:00 - 10:30 |
Multimedia and Communications |
Sevilla |
Time-frequency Filtering of Gaussian and Impulse Noise for Spread Spectrum Power Line Communication |
SIGMAP |
58 |
30 min |
Wednesday 25 |
Session 4 |
10:45 - 12:15 |
Multimedia Signal Processing |
Sevilla |
Optimisation of Smoothing Parameter of Diffeomorphism Kernel Estimate for Bounded Random Data |
SIGMAP |
59 |
30 min |
Thursday 26 |
Session 7 |
10:45 - 12:15 |
Multimedia Systems and Applications |
Sevilla |
Keywords-based Automatic Multimedia Authoring in the Cloud |
SIGMAP |
60 |
30 min |
Wednesday 25 |
Session 4 |
10:45 - 12:15 |
Multimedia Signal Processing |
Sevilla |
Development of Computer Algorithms to Control a Weelchair through the Movement of the Head by Artificial Vision |
SIGMAP |
61 |
20 min |
Thursday 26 |
Session 8 |
14:30 - 16:30 |
Multimedia Signal Processing |
Sevilla |
Raw Camera Image Demosaicing using Finite Impulse Response Filtering on Commodity GPU Hardware using CUDA |
SIGMAP |
62 |
20 min |
Thursday 26 |
Session 8 |
14:30 - 16:30 |
Multimedia Signal Processing |
Sevilla |
A Dataflow Description of ACC-JPEG Codec |
SIGMAP |
65 |
Poster |
Thursday 26 |
Poster Session 2 |
16:30 - 17:30 |
Multimedia Signal Processing |
Foyer |
Friction Sources Characterization for Fricative Consonants of Arabic |
SIGMAP |
75 |
20 min |
Wednesday 25 |
Session 3 |
09:00 - 10:30 |
Multimedia and Communications |
Sevilla |
Spaxels, Pixels in Space - A Novel Mode of Spatial Display |
SIGMAP |
76 |
Poster |
Friday 27 |
Poster Session 3 |
10:15 - 11:15 |
Multimedia Systems and Applications |
Foyer |
Simulated Annealing based Parameter Optimization of Time-frequency e-filter Utilizing Correlation Coefficient |
SIGMAP |
77 |
20 min |
Thursday 26 |
Session 6 |
09:00 - 10:30 |
Multimedia Systems and Applications |
Sevilla |
Content Meets Semantics: Smarter Exploration of Image Collections - Presentation of Relevant Use Cases |
SIGMAP |
79 |
20 min |
Thursday 26 |
Session 7 |
10:45 - 12:15 |
Multimedia Systems and Applications |
Sevilla |
Next Generation TV through Automatic Multimedia Annotation Systems - A Hybrid Approach |
SIGMAP |
80 |
20 min |
Tuesday 24 |
Session 1 |
10:45 - 12:15 |
Multimedia Systems and Applications |
Sevilla |
Centroid-based Clustering for Student Models in Computer-based Multiple Language Tutoring |
SIGMAP |
81 |
20 min |
Tuesday 24 |
Session 1 |
10:45 - 12:15 |
Multimedia Systems and Applications |
Sevilla |
Influence of Different Phoneme Mappings on the Recognition Accuracy of Electrolaryngeal Speech |
SIGMAP |
82 |
20 min |
Tuesday 24 |
Session 1 |
10:45 - 12:15 |
Multimedia Systems and Applications |
Sevilla |
Large Scale Similar Song Retrieval using Beat-aligned Chroma Patch Codebook with Location Verification |
SIGMAP |
85 |
20 min |
Thursday 26 |
Session 7 |
10:45 - 12:15 |
Multimedia Systems and Applications |
Sevilla |
A New Tool for the Analysis of Heart Rate Variability of Long Duration Records |
WINSYS |
1 |
30 min |
Wednesday 25 |
Session 5 |
14:30 - 16:30 |
Wireless and Mobile Technologies |
Velazquez |
Optimal MAC PDU Size in ARQ-enabled Connections in IEEE 802.16e/WiMAX Systems |
WINSYS |
2 |
20 min |
Wednesday 25 |
Session 5 |
14:30 - 16:30 |
Wireless and Mobile Technologies |
Velazquez |
Efficient Coupled PHY and MAC Use of Physical Bursts in WiMAX/IEEE 802.16e Networks |
WINSYS |
3 |
Poster |
Wednesday 25 |
Poster Session 1 |
16:30 - 17:30 |
Wireless and Mobile Technologies |
Foyer |
Differential Space Time Block Codes for High Mobility Scenarios |
WINSYS |
6 |
30 min |
Tuesday 24 |
Session 1 |
10:45 - 12:15 |
Mobile Software and Services |
Velazquez |
Quality of Experience Evaluation for Data Services over Cellular Networks |
WINSYS |
7 |
30 min |
Tuesday 24 |
Session 1 |
10:45 - 12:15 |
Sensor, Mesh and Ad Hoc Communications and Networks |
Velazquez |
Authentication Optimization for Vertical Handover in Heterogeneous Wireless Networks |
WINSYS |
10 |
20 min |
Tuesday 24 |
Session 2 |
14:30 - 16:30 |
Sensor, Mesh and Ad Hoc Communications and Networks |
Velazquez |
From Farm to Fork: Traceability based on RFID - A Proposal for Complete Traceability in the Wine Sector |
WINSYS |
12 |
Poster |
Wednesday 25 |
Poster Session 1 |
16:30 - 17:30 |
Sensor, Mesh and Ad Hoc Communications and Networks |
Foyer |
Bandwidth Analysis of the Ubiquitous Video Conferencing Application |
WINSYS |
14 |
20 min |
Tuesday 24 |
Session 2 |
14:30 - 16:30 |
Sensor, Mesh and Ad Hoc Communications and Networks |
Velazquez |
Using Radio Frequency Identification Technology to Track Individual Wine Bottles |
WINSYS |
17 |
20 min |
Wednesday 25 |
Session 4 |
10:45 - 12:15 |
Wireless and Mobile Technologies |
Velazquez |
Implementation of the COST 273 Directional Channel Model in Microcell Scenarios |
WINSYS |
19 |
30 min |
Wednesday 25 |
Session 5 |
14:30 - 16:30 |
Wireless and Mobile Technologies |
Velazquez |
Improving the Reliability of a Train Positioning System through the Use of Full Coverage Radio Communication Technologies - Performance Study of a TETRA Network to Transmit Position Information |
WINSYS |
23 |
20 min |
Tuesday 24 |
Session 2 |
14:30 - 16:30 |
Sensor, Mesh and Ad Hoc Communications and Networks |
Velazquez |
Performance Evaluation for TCP in Tactical Mobile Ad Hoc Networks |
WINSYS |
24 |
30 min |
Wednesday 25 |
Session 5 |
14:30 - 16:30 |
Wireless and Mobile Technologies |
Velazquez |
Investigation of a Radio Propagation Model for Vegetation Scatter Dynamic Channels at BFWA Frequencies |
WINSYS |
32 |
20 min |
Tuesday 24 |
Session 2 |
14:30 - 16:30 |
Sensor, Mesh and Ad Hoc Communications and Networks |
Velazquez |
Improved NetArgus - A Suite of Wi-fi Positioning & SNMP Monitor |
WINSYS |
42 |
Poster |
Wednesday 25 |
Poster Session 1 |
16:30 - 17:30 |
Sensor, Mesh and Ad Hoc Communications and Networks |
Foyer |
New Mobility Metric based on MultiPoint Relay Life Duration |
WINSYS |
46 |
Poster |
Wednesday 25 |
Poster Session 1 |
16:30 - 17:30 |
Mobile Software and Services |
Foyer |
Student Experience - Issues of Wireless Access and Cloud Deployment in Higher Education |
WINSYS |
51 |
20 min |
Wednesday 25 |
Session 4 |
10:45 - 12:15 |
Wireless and Mobile Technologies |
Velazquez |
Sustainable Rural Areas - Network-based Architecture |
WINSYS |
52 |
20 min |
Wednesday 25 |
Session 4 |
10:45 - 12:15 |
Wireless and Mobile Technologies |
Velazquez |
QoE – Based Scheduling in WiMAX Networks |
WINSYS |
53 |
30 min |
Tuesday 24 |
Session 1 |
10:45 - 12:15 |
Sensor, Mesh and Ad Hoc Communications and Networks |
Velazquez |
Knowledge Acquisition System based on JSON Schema - Implementation of a HCI for Actuation of Biosignals Acquisition Systems |