Program
Time | Session A |
Session B |
09:00 - 09:25 |
Opening Session | |
09:30 - 11:00 |
Session : Wireless LAN & Mesh Networks A Sensor Data Collection Method for Rounding Sink An Information Acquiring System with Privacy Protection on Distributed Communications Networks Physical Cell Identity Reservation for 3GPP LTE Femtocell Enhanced Detection Method for 3GPP LTE QO-SFBC system in frequency selective Rayleigh Fading Channel Environment Dual Token Bucket Based HCCA Scheduler for IEEE 802.11e WLAN |
Session : Sensor Networks Community-Based Recipe Recommendation and Adaptation in Peer-to-Peer Networks (Invited Paper) Public Key Cryptography - based Security Scheme for Wireless Sensor Networks in Healthcare Reliable Transmission on Wireless Sensor Networks with Delegated Acknowledgement Privacy Enhancement in Mobile Data Broadcasting Environments MGR A Multicandidate Greedy Routing Scheme in Wireless Sensor Networks |
11:00 - 11:15 |
Break | |
11:15 - 12:30 |
Session : Telecommunication Networks Quality Analysis of CSMA/CA Communications in Inter-Vehicle Communication Services Proposal and Evaluation of a Bloom Filter-Based User Search Method for Movement Records on P2P Network A QoS Provisioning Mechanisms based on Effective Bandwidth for the Polling based WLAN System OCDP : A WBAN MAC Protocol for Contention-based Medical and CE applications |
Session : Multimedia Processing I A Technique of Embedding Digital Data in an Image Compression Code Reversibly (Invited Paper) Reversible Data Hiding Scheme with High Payload for JPEG images Enhance the Visual Quality of Shares and Recovered Secret on Meaningful Shares Visual Secret Sharing A Novel Color Palette Image Authentication Scheme DIRECTIONAL TWO-DIMENSIONAL PRINCIPAL COMPONENT ANALYSIS FOR FACE RECOGNITION |
12:30 - 2:00 |
Lunch | |
2:00 - 3:45 |
Session : Systems and Applications I Community-Based Recipe Recommendation and Adaptation in Peer-to-Peer Networks (Invited Paper) Judgment of Web Pages Based on Information Value that Decays with Time B2B E-Commerce Adoption and Implementation Constraints and Critical Success Factors in the Healthcare Organizations A Model of Transiting Individual Efforts to the Outcomes of Virtual Team In Situ Measurement of Geosensors in Low-rate Networks A Constraint-based Tool for Data Integrity Management on the Web |
Session : Web Technology Evaluating Credibility of Web Information (Invited Paper) Discovering Intermediate Entities from Two Examples by Using Web Search Engine Indices ChronoSeeker: Search Engine for Future and Past Events A Prediction Search Based on Changes of Queries and Search Results Adaptive Ranking of Search Results by Considering User's Comprehension Influence Maximization through Identifying Seed Nodes from Implicit Social Networks |
3:45 - 4:00 |
Break | |
4:00 - 5:45 |
Session : Information Management Bridging the Gap Between Web Service-based Context Suppliers and Ontology-based Context Consumers Dimensionality Reduction Based on Nonparametric Discriminant Analysis with Kernels for Feature Extraction and Recognition Methods to Utilizing Cloud Computing in Developing Mobile Internet Device (MID) Applications Context Data Abstraction Framework using RDF Game Behavior Pattern Modeling for Game BOT Detection in MMORPG A Partitioning Method for High Dimensional Data |
Session : Data and Web Mining Interactive Stream Mining of Maximal Frequent Itemsets Allowing Flexible Time Intervals and Support Thresholds Discovery of User Behavior Patterns from Geo-tagged Micro-blogs Using Compressed FP-tree for Incremental Data Mining Detecting Splogs using Similarities of Splog HTML Structures Diversity of Feature Selection Approaches combined with back-propagation neural network in Credit Scoring Link Analysis in Mind Maps: A New Approach to Determining Document Relatedness |
Time | Session A |
Session B |
09:00 - 10:30 |
Session : Intelligent Systems I Universal Rich Presence Framework for Intelligent Call Management Intent Feature Discovery using Q&A Corpus and Web Data Systematic Measurement of Human Map-Reading Ability with Street-View based Navigation Systems Proposal of Electronic Commerce System with Cellular Phones for Digital Forensics Cache Conscious Trees on Modern Microprocessors |
Session : Multimedia Processing II A Simple Image Encoding Method with Data Lossless Information Hiding A Hierarchical Model Approach for Measuring Typicality of Images Query by Example for Geographic Entity Search with Implicit Negative Feedback Detailed-information Browsing to Form Centralized Mesh Structure in Region of Interest Reversible Data Hiding Using Neighboring Block in VQ-Compressed Images |
10:30 - 10:45 |
Break | |
10:45 - 12:40 |
Session : Systems and Applications II Performance Improvement of iSCSI Remote Storage Access (Invited Paper) A Proposal of Visualizing Reputation Using Evaluation Expression Dictionaries The Open Source IPTV Service Development Environment -- IPTV Service Execution Environment A TOTEM-based Approach for Scientific Workflow Management A Reversible and Multiple-layer Embedding Strategy with High Capacity Hiding Data in Parity Check Bit |
Session : Intelligent Systems II An interactive agent system for supporting knowledge-based recommendation£A case study on an e-novel recommender system Smartcard-based Micro-Billing Scheme to Activate the Market for User-Generated Content Actor Petri net Model for Scientific Workflows: Model, Design and System (Regluar) A System for Supporting Dietary Habits: Planning Menus and Visualizing Nutritional Intake Balance A Personalized Recommendation System Based on Product Attribute-specific Weights and Improved User Behavior Analysis |
12:40 - 2:00 |
Lunch | |
2:00 - 3:45 |
Session : Security, Privacy and Personalization Query Log Perturbation Method for Privacy Preserving Query Security Analysis on Commercial Online Music Streaming Service and Countermeasures An Efficient Context-Aware Personalization Technique in Ubiquitous Environments Automatic Query-based Personalized Summarization that uses Pseudo Relevance Feedback with NMF Skin Surface Reconstruction from Stereo Images RBAC-Based Access Control for Privacy Preserving in Semantic Web |
Session : Communication Technologies A Scaffolding M-learning Framework with IMS Based IPTV PVR Service A Minimum Mean-Squared Error Relay for Three-way Relay Channels with Network Coding High throughput path selection for IEEE 802.11s based Wireless Mesh Networks A Multi-Rate Routing Protocol with Connection Entropy for Mobile Ad Hoc Networks An Improved DV-Hop Localization Algorithm in Ad Hoc Networks |
3:45 - 4:00 |
Break | |
4:00 - 6:00 |
Session : Intelligent Systems III A Self-Organizing Two-way DPWS Adaptor for Adaptive Interoperability of Multiple Heterogeneous Services An Enhanced OLSR Protocol Based on Link Reliability ARHMAM: an Activity Recognition System based on Hidden Markov minded Activity Model A Comprehensive Architecture for Autonomic Service Management Comparison of Feature Selection Methods in ECG Signal Classification |
Session : Systems and Applications III Semantic Operation Composition according to User Tasks in Ubiquitous Environment A SIP-TRW Algorithm for DDoS Attack Detection in SIP Environments A 2.4-GHz IEEE 802.15.4 CMOS Single-Chip Transceiver for Wireless PAN Applications High-Speed Architecture for Three-Parallel Reed-Solomon Decoder using S-DCME |