|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
AICT 2014 / ICIW 2014 / ICIMP 2014 / SMART 2014 / Conference Venue Location
Sunday, July 20
Monday, July 21
Tuesday, July 22
Wednesday, July 23
Thursday, July 24
Friday, July 25 Recommended tourist objectives to be visited on your own: Tourist Attractions in Paris The Moulin Rouge Paris for free Taking a trip outside of Paris
DETAILED PROGRAM
AICT2014, The Tenth Advanced International Conference on Telecommunications AICT 1: Signal processing, protocols and standardization I Biomedical Applications of Intensity and Curvature Measures: The Case of Magnetic Resonance Imaging of the Human Brain A New Blind Equalization Algorithm for M-PSK Constellations A Single-Threshold Model for Handoff Traffic Analysis in Cellular CDMA Networks Design and Implementation of Simulation Engine for Very High-Rate Communication over Power Grid AICT 2: Signal processing, protocols and standardization II Compression of Polysomnographic Signals Using the Discrete Cosine Transform and Dead-zone Optimal Quantization Standards for Cooperative Intelligent Transportation Systems: a Proof of Concept Extending a 3GPP Prepaid Protocol to Improve Credit Pre-reservation Mechanism Simulator of Multi-service Switching Networks with Multi-service Sources AICT 3: Management, operation and control networks Trust-based Incentive Cooperative Relay Routing Algorithm for Wireless Proposal for a NETCONF Interface for Virtual Networks in Open vSwitch Environments A new Unsupervised User Profiling Approach for Detecting Toll Fraud in VoIP Networks Towards a Carrier Grade SDN Controller: Integrating OpenFlow With Telecom Services AICT 4: Ad Hoc, autonomic and sensor networks A Bluetooth Network Dynamic Graph Energy-free Security in Wireless Sensor Networks PRISMA: A Publish-Subscribe and Resource-Oriented Middleware for Wireless Sensor Networks A New Performance Efficient Trend of Delivery Mechanism Applied to DTN Routing Protocols in VANETs AICT 5: Wireless technologies A Novel Chaos Based ASK-OOK Communication System Hybrid QoS Based Routing for IEEE 802.16j Mesh Infrastructure A Proposal for Path Loss Prediction in Urban Environments using Support Vector Regression Applicable Cost Modeling of LTE-Advanced and IEEE 802.11ac based Heterogeneous Wireless Access Networks AICT 6: Cognitive radio Interference Modelling and Analysis of Random FDMA schemes in Ultra Narrowband Networks Fuzzy-based Interference Level Estimation in Cognitive Radio Networks Performance of the LAD Spectrum Sensing Method in Measured Noise at Frequency Ranges between 10 MHz and 39 GHz Ordered Sequential-Superposition Cooperative Spectrum Sensing for Cognitive Radio Networks AICT 7: Future applications and services Automatic Floor Map Construction for Indoor Localization Evolving Future Internet Clean-Slate Entity Title Architecture with Quality-Oriented Control Plane Extensions UML-based Modeling Entity Title Architecture (ETArch) Protocols Multicast Traffic Aggregation through Entity Title Model Design and Development of an Android Accounting Application Using Web Services and Quality of Experience for Mobile Computing
ICIW 2014, The Ninth International Conference on Internet and Web Applications and Services ICIW 1: Virtual environments and Web applications for eLearning Ebanshu: An Interactivity-aware Blended Virtual Learning Environment A Study of the Effects of Scaffolded Assessment on the Learning Effectiveness in Network Peer Assessment Activities Customer Satisfaction through E-Learning Software Product Line Collaboration and Community Building in an Online Teacher Community of Learning: A Social Network Analysis ICIW 2: Web services-based systems and applications Context-Aware Leisure Service: A Case-Study based on a SOA 2.0 Infrastructure Asynchronous Learning Management System - The Case of Federal University of Technology (UTFPR) Rated Tags as a Service: A Cloud-based Social Commerce Service Services to Support Use and Development of Speech Input for Multilingual Multimodal Applications for Mobile Scenarios ICIW 3: Internet and Web-based applications and services I Investigating Aspects of Visual Clustering in the Organization of Personal Document Collections Towards a Mobile Application Performance Benchmark Redundancy-Driven Vertical Domain Explorer Comparing the Twitter Usage of Online Retailers in Germany and in the UK ICIW 4: Internet and Web-based applications and services II A Run-time Life-cycle for Interactive Public Display Applications Driving the Learning of a Web Aapplication Framework by Using Separation of Concerns A Method to Achieve Automation in the Development of Web-Based Software Projects Search Query Share for Enhancing Communication Among Small Community ICIW 5: Service computing Psychology for Predicting Internet Behavior Patterns A Structured Approach to Architecting Fault Tolerant Services Scalable Web Content Understanding Framework ICIW 6: Online communications, collaborative systems, and social networks A Tool to Assist the Social Search on Facebook Webpage Resource Protection via Obfuscation and Auto Expiry Message Spreading Model over Online Social Network with Multiple Channels and Multiple Groups ICIW 7: Enterprise cloud computing, P2P Systems A New Semantic Role-based Access Control Model for Cloud Computing Enhancing the Energy Efficiency in Enterprise Clouds Using Compute and Network Power Management Functions Return the Data to the Owner: A Browser-Based Peer-to-Peer Network A Comparative Study of Replication Schemes for Structured P2P Networks ICIMP 2014, The Ninth International Conference on Internet Monitoring and Protection ICIMP 1: Internet monitoring and protection Classification of TLS Applications Trust and Risk Relationship Analysis on a Workflow Basis: A Use Case A Security Policy for Cloud Providers: The Software-as-a-Service Model Survey on Tor and I2P Autonomous Alternative Complex with Remote Data Collection (PRESENTATION) An Automated Security Framework for Malware Detection and Infection Notification (POSTER)
SMART 2014, The Third International Conference on Smart Systems, Devices and Technologies SMART 1: Smart spaces and environments Smart Grid Services Framework for Building Management Systems A Fast WiFi Direct Device Discovery with Caching Discovery Schedules for Seamless N-Screen Services Towards Tactile Alarms Systems for Increased Awareness in Smart Environments Stability Improvement Solution of the Smart Power Grid by an Analysis of Voltage Variation in Intelligent Buildings Connectivity Requirements for the Industrial IoT (PRESENTATION) SMART 2: Smart mobility and tracking systems Hand Posture Control of a Robotic Wheelchair Using a Leap Motion Sensor and Block Sparse Representation based Classification An RFID-based Smart Cage for Animal Behavior Analysis A Novel Authentication Framework Based on Biometric and Radio Fingerprinting for the IoT in eHealth Smart Mobility for Reducing School Gate Congestion in Europe:
Innovating Smartphone Walking School Buses for Children of Primary Age SMART 3: Digital cities Beyond the Smart City: Reflecting Human Values in the Urban Environment Online Geodatabases as a Source of Data for a Smart City World Model Building Smart City as an Integrated Enterprise: A Business Process Centric Framework Addressing Challenges in Systems Integration From Smart Metering to Smart City Infrastructure SMART 4: Smart multimedia and smart energy Effective Context-based BIM Style Description (BSD) of Query Results A Combination of MCLT Peak-Pair Based Audio Fingerprinting and Spatial Audio Reproduction Energy Monitoring in Smart Buildings Using Wireless Sensor Networks Smart-Grid Control Comparing Low Power Listening Techniques with Wake up Receiver Technology IMMM 2014, The Fourth International Conference on Advances in Information Mining and Management IMMM 1: Mining mechanisms and methods Semantic Tools for Forensics: Towards Finding Evidence in Short Messages Class Stength Prediction Method for Associative Classification A Concept-based Feature Extraction Approach A Multi-Factor HMM-Based Forecasting Model for Fuzzy Time Series IMMM 2: Mining tools and applications I The Group Strategic Knowledge Mining Model for Telecom Power Infrastructure What Grammar Tells About Gender and Age of Authors Semantic Mining and Analysis of Heterogeneous Data for Novel Intelligence Insights A Building Management System Using RGB-D Camera (PRESENTATION) IMMM 3: Information mining and management Wireless Transmission of Stereo Images and its Disparity Levels Improving Digital Forensics Through Data Mining Towards Custom-Designed Professional Training Contents and Curriculums through Educational Process Mining A Distribution for Service Model IMMM 4: Mining tools and applications II Compressed SIFT Feature Based Matching Privacy friendly Mobile Intelligent Advertising Framework Data Leakage Detection Using Information Retrieval Methods Document Retrieval in Big Data IMMM 5: Mining from specific sources Bag-of-Features Tagging Approach for a Better Recommendation with Social Big Data Trace Analysis Exploration Using Semantic Web Tools Use Case: You Tube Network Traffic Applications of Data Mining Techniques to Predict Metabolic Syndrome in Taiwanese Children and Adolescents (POSTER) IMMM 6: Pervasive information retrieval A SQL-based Context Query Language for Context-aware Systems A Mobile Learning Framework on Cloud Computing Platforms Link Analysis among Sightseeing Spots based on Geo-Image
Analysis --Towards Majority-based Route Recommendation in
Sightseeing-- INFOCOMP 2014, The Fourth International Conference on Advanced Communications and Computation INFOCOMP 1: Advanced applications I Internationalisation and Localisation of a Wireless Response System for the Arabic Language Semi-Analytic Modelling of Stratified Flows. Theory and Applications Minimizing Total Tardiness in a Hybrid Flexible Flowshop with Sequence Dependent Setup Times An Evaluation of Smoothing Filters for Gas Sensor Signal Cleaning Using Mobile Serious Games for Learning Programming INFOCOMP 2: Large scale and fast computation CUDA Accelerated Entropy Constrained Vector Quantization and Multiple K-Means Scheduling periodic Tasks on Multiple Periodic Resources P2P4GS: A Specification for Services Management in Peer-to-Peer Grids Benchmarking the Problem of Optimal Autonomous Systems Aggregation on Different Computer Architectures INFOCOMP 3: Networks/systems communications The Designing and Implementation of a Smart Home System with Wireless Sensor/Actuator and Smartphone Outage Probability of Full-duplex Systems in Multi-spectrum Environments Testing of feasibility of QKD system deployment in commercial metropolitan fiber networks Decision Making and Taking in Changing Ecologies Considering Network Law Flow Adjustment – a Flexible Routing Strategy for Demand Protection Against Multiple Partial Link Failures INFOCOMP 4: Networks/systems measurement, control and management Agent Supported QoS Management Ontology-based Management of a Network for Distributed Control System Fairness Improvement of Multiple-Bottleneck Flow in Data Center Networks Multi-layer Power Saving System Model Including Virtualization Server and Many-core Server Study of the Complex Alternative Energy to power Communication Devices and Computer Equipment in the Arctic (PRESENTATION) INFOCOMP 5: Biometry, security, access technologies, algorithms, and applications I Trans-Organizational Role-Based Access Control in Android Scalable, Self-configurable Eduroam by using Distributed Hash Table Integrated Learning Environment for Smart Grid Security INFOCOMP 6: Biometry, security, access technologies, algorithms, and applications II A SAML Metadata Broker for Dynamic Federations and Inter-Federations Intrusions Detection System Based on Ubiquitous Network Nodes Fast Person Identification Using JPEG2000 Compressed ECG Data INFOCOMP 7: Advanced applications II Teaching Networking: A Hands-on Approach that Relies on Emulation-based Projects Computing Optimised Result Matrices for the Processing of Objects from Knowledge Resources Research on Classification of Fiber Intrusion Signal Based on Supported Vector Machines A Constraint-Based Graphical Approach to Modelling Construction Systems: An alternative to discrete-event simulation MOBILITY 2014, The Fourth International Conference on Mobile Services, Resources, and Users MOBILITY 1: Chanllenges A Design of Mobile Trusted Module for Application Dedicated Cryptographic Keys Predicting Destinations with Smartphone Log using Trajectory-based HMMs TEDS: A Trusted Entropy and Dempster Shafer Mechanism for Routing in Wireless Mesh Networks A Non-GPS Low-power Context-aware System using Modular Bayesian Networks' submitted to MOBILITY 2014 Mobility and Boards of Directors: Towards a Mobile Governance Paradigm (PRESENTATION) MOBILITY 2: Mobile architectures, mechanisms, protocols Smart TV – Smartphone Cooperation Model on Digital Signage Environments: An Implementation Approach A Flow Aggregation Scheme for Seamless QoS Mobility Support in Wireless Mesh Networks Self-organizing Mobile Medium Ad hoc Network COmpAsS: A Context-Aware, User-Oriented Radio Access Technology Selection Mechanism in Heterogeneous Wireless Networks MOBILITY 3: Mobile devices and services Use of Bluetooth Technology on Mobile Phones for Optimal Traffic Signal Timing Empowering Mobile Users: Applications in Mobile Data Collection Car Ride Classification for Drive Context Recognition What am I Doing Now? Pythia: A Mobile Service for Spatial Behavior Analysis Design and Evaluation of a Mobile Payment System for Public Transport: the MobiPag STCP Prototype MOBILITY 4: Mobile networking and management Expected Penetration Rate of 5G Mobile Users by 2020: A Case Study Design and Implementation of Co-Presence Transportation for Physical Objects The Connectivity Control Framework: Enabling Session Continuity in Multi-Domain Environments Performance of Novel Target Detection in Radar Network Systems with a 3D Vehicle Model TV Content Delivery to PC, Tablet, Smartphone - From the Accessibility Vision into Market Reality |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Copyright (c) 2006-2014, IARIA