Abstract is missing.
- PrefaceElhadi Shakshuki, Muhammad Younas. 10-17 [doi]
- PrefaceMuhammad Younas, Elhadi Shakshuki, Quan Z. Sheng. 18-24 [doi]
- PrefaceJiang Li. 25-33 [doi]
- Keynote I: Sensing and Identification in the Internet of Things EraHossam S. Hassanein. 34-35 [doi]
- Keynote II: User Centred Design for the Mobile WebDiane McKerliea. 36-37 [doi]
- Opportunistic Communications for Emergency Support SystemsGökçe Görbil, Erol Gelenbe. 39-47 [doi]
- Teamwork on the Road: Efficient Collaboration in VANETs with Context-based GroupingKoosha Paridel, Ansar-Ul-Haque Yasar, Yves Vanrompay, Davy Preuveneers, Yolande Berbers. 48-57 [doi]
- ZigBee-based indoor location system by k-nearest neighbor algorithm with weighted RSSIChih-Ning Huang, Chia-Tai Chan. 58-65 [doi]
- Use of Wireless Mesh Network to Improve Mobile Asset Utilization in Manufacturing IndustriesSrideep Ghosh, Anurag D, Somprakash Bandyopadhyay. 66-73 [doi]
- RFID service for non-RFID enabled devices: Embedded hardware implementationOscar Botero, Hakima Chaouchi. 74-81 [doi]
- A Multi-Agent Framework for Ambient Systems DevelopmentXiping Hu, Weichang Du, Bruce Spencer. 82-89 [doi]
- A Simulator for Generating and Visualizing Sensor Data for Ambient Intelligence EnvironmentsMario Buchmayr, Werner Kurschl, Josef Küng. 90-97 [doi]
- Towards ambient communication support for power grid maintenance and repairNaoto Kume, Mikko J. Rissanen. 98-105 [doi]
- Wireless Sensor Network Based Wildfire Hazard Prediction System ModelingHakilo Sabit, Adnan Al-Anbuky, Hamid Gholamhosseini. 106-114 [doi]
- A Secure Platform of Wireless Sensor NetworksAbidalrahman Moh'd, Hosein Marzi, Nauman Aslam, William J. Phillips, William Robertson. 115-122 [doi]
- Unsupervised Clustering of Web Sessions to Detect Malicious and Non-malicious Website UsersDusan Stevanovic, Natalija Vlajic, Aijun An. 123-131 [doi]
- Key Predistribution Scheme for Grid Based Wireless Sensor Networks using Quadruplex Polynomial Shares per NodeV. Sridhar, V. Raghavendar. 132-140 [doi]
- SurvSec: A New Security Architecture for Reliable Network Recovery from Base Station Failure of Surveillance WSNMohamed Helmy Megahed, Dimitrios Makrakis, Bidi Ying. 141-148 [doi]
- A Novel Approach to Video Copy Detection Using Audio Fingerprints and PCAR. Roopalakshmi, G. Ram Mohana Reddy. 149-156 [doi]
- Collaborative Peer to Peer Defense Mechanism for DDoS AttacksUsman Tariq, Yasir Malik, Bessam Abdulrazak, Manpyo Hong. 157-164 [doi]
- Challenges in the Implementation and Simulation for Wireless Side-Channel based on Intentionally Corrupted FCSAli Najafizadeh, Ramiro Liscano, Miguel Vargas Martin, Peter C. Mason, Mazda Salmanian. 165-172 [doi]
- Performance Evaluation Study of Intrusion Detection SystemsAdeeb M. Alhomoud, Rashid Munir, Jules Pagna Disso, Irfan Awan, Abdullah Al-Dhelaan. 173-180 [doi]
- Collusion-Resistant Reputation Mechanism for Multi-Agents SystemsBabak Khosravifar, Jamal Bentahar, Mahsa Alishahi, Maziar Gomrokchi. 181-189 [doi]
- Using Reputation Management in Participatory Sensing for Data ClassificationHaoFan Yang, Jinglan Zhang, Paul Roe. 190-197 [doi]
- LNT: a Logical Neighbor Tree for Secure Group Management in Wireless Sensor NetworksOmar Cheikhrouhou, Anis Koubaa, Gianluca Dini, Hani Alzaid, Mohamed Abid. 198-207 [doi]
- An Efficient Key Distribution Scheme to Secure Data-Centric Routing Protocols in Hierarchical Wireless Sensor NetworksAbderrahmen Guermazi, Mohamed Abid. 208-215 [doi]
- How Wireless Sensor Networks Can Benefit from Brain Emotional Learning Based Intelligent Controller (BELBIC)Tahir Emre Kalayci, Majid Bahrepour, Nirvana Meratnia, Paul J. M. Havinga. 216-223 [doi]
- Towards Augmenting Federated Wireless Sensor NetworksFadi M. Al-Turjman, Hossam S. Hassanein, Sharief M. A. Oteafy. 224-231 [doi]
- Development of Intelligent Wireless Sensor Networks for Human Comfort Index MeasurementMohd Izani Mohamed Rawi, Adnan Al-Anbuky. 232-239 [doi]
- Proposal for Dynamic Organization of Service Networks over a Wireless Sensor and Actuator NetworkTakuya Iwai, Naoki Wakamiya, Masayuki Murata. 240-247 [doi]
- Understanding Characteristics of Available Bandwidth in Wireless EnvironmentXinyu Xing, Yifei Jiang, Shivakant Mishra. 248-254 [doi]
- Optimized Handover Strategy with Movement Trend Awareness for Body Sensor NetworksWen Sun, Lianying Ji, Wai-Choong Wong. 255-263 [doi]
- Dynamically Reconfigurable Energy Aware Modular Software (DREAMS) Architecture for WSNs in Industrial EnvironmentsAhmad El Kouche, Louai Al-Awami, Hossam S. Hassanein. 264-271 [doi]
- Joint Power and Rate Adaptation in Ad Hoc Networks Based on Coupled InterferenceFredrick Mzee Awuor, Karim Djouani, Guillaume Noel. 272-279 [doi]
- The User-Context Module: A New Perspective on Future Internet DesignYu Lu, Mehul Motani, Wai-Choong Wong. 280-287 [doi]
- From Context to Micro-context - Issues and Challenges in Sensorizing Smart Spaces for Assistive LivingJit Biswas, Aung Aung Phyo Wai, Andrei Tolstikov, Jinhong Kenneth Lin, Maniyeri Jayachandran, Victor Foo Siang Fook, Alwyn Vwen Yen Lee, Clifton Phua, Jiaqi Zhu, Huynh Thai Hoa, Thibaut Tiberghien, Hamdi Aloulou, Mounir Mokhtari. 288-295 [doi]
- A Distributed Architecture for Micro Context-Aware AgentsPatrice Roy, Bessam Abdulrazak, Yacine Belala. 296-303 [doi]
- Building and Operating Context-aware Services for Groups of UsersIchiro Satoh. 304-311 [doi]
- A Data Fusion Approach to Context-Aware Service Delivery in Heterogeneous Network EnvironmentsPeyman TalebiFard, Victor C. M. Leung. 312-319 [doi]
- Pervasive Integrity Checking With Coupled ObjectsPaul Couderc, Michel Banâtre, Fabien Allard. 320-327 [doi]
- Energy-Efficient Assessment of Physical Activity Level Using Duty-Cycled Accelerometer DataStephan Bosch, Raluca Marin-Perianu, Paul J. M. Havinga, Mihai Marin-Perianu. 328-335 [doi]
- An approach to use FB-AODV with AndroidNicola Corriero, Emanuele Covino, Angelo Mottola. 336-343 [doi]
- Arresting Particle Hijack in Multitarget TrackingNeeta Trivedi, Narayanaswamy Balakrishnan. 344-353 [doi]
- Solving Incomplete Datasets in Soft Set Using Supported Sets and Aggregate ValuesAhmad Nazari Mohd Rose, Hasni Hassan, Mohd Isa Awang, Nor Aida Mahiddin, Hidayatulaminah Mohd Amin, Mustafa Mat Deris. 354-361 [doi]
- A Novel Trust-Based Authentication Scheme for Low-Resource Devices in Smart EnvironmentsAnas El Husseini, Abdallah M'hamed, Bachar El Hassan, Mounir Mokhtari. 362-369 [doi]
- CReMe: a Dynamic and Flexible Conflict Resolution Methodology for Competitive Ambient SystemsThais R. M. Braga Silva, Linnyer Beatrys Ruiz, Antonio Alfredo Ferreira Loureiro, Fabrício A. Silva. 370-377 [doi]
- Spatio-Temporal Reasoning in Biometrics Based Smart EnvironmentsVivek Menon, Bharat Jayaraman, Venu Govindaraju. 378-385 [doi]
- An Intelligent Object Framework for Smart LivingSasa Savic, Hao Shi. 386-393 [doi]
- Wearable Computing in Industrial Service ApplicationsMarkus Aleksy, Mikko J. Rissanen, Sylvia Maczey, Marcel Dix. 394-400 [doi]
- When the context changes, so does my transportation application: VESPADana Popovici, Mikael Desertot, Sylvain Lecomte, Thierry Delot. 401-408 [doi]
- Personalized Service Creation by Non-technical Users in the Homecare DomainMohammad Zarifi Eslami, Alireza Zarghami, Brahmananda Sapkota, Marten van Sinderen. 409-417 [doi]
- OLSR-based Topology Discovery for Mobile Situational Awareness SystemsAnand Dersingh, Z. M. Faizul Islam, Shahram Shah-Heydari, Md. Mustafizur Rahman. 418-425 [doi]
- A Location-based Content Search System Considering Situations of Mobile UsersMayu Iwata, Takahiro Hara, Kentaro Shimatani, Tomohiro Mashita, Kiyoshi Kiyokawa, Shojiro Nishio, Haruo Takemura. 426-433 [doi]
- A Menu-based Content Search Support System Considering Mobile User's SituationsHiroki Miyamoto, Daijiro Komaki, Takahiro Hara, Kentaro Shimatani, Tomohiro Mashita, Kiyoshi Kiyokawa, Toshiaki Uemukai, Shojiro Nishio, Haruo Takemura. 434-441 [doi]
- Identifying influential stock indices from global stock markets: A social network analysis approachRam Babu Roy, Uttam Kumar Sarkar. 442-449 [doi]
- Alignment Based Similarity distance Measure for Better Web Sessions ClusteringG. Poornalatha, Prakash S. Raghavendra. 450-457 [doi]
- Towards Identifying the Challenges Associated with Emerging Large Scale Social NetworksHaroon Malik, Ahsan Samad Malik. 458-465 [doi]
- Composite Web Services Formation Using a Social Network of Web Services: A Preliminary InvestigationSaid Elnaffar, Zakaria Maamar. 466-471 [doi]
- Greedy-Face-Greedy Routing based Human Tracking in Mobile Social NetworksYingchi Mao. 472-479 [doi]
- On Maximizing the Entropy of Complex NetworksMaytham Safar, Ibrahim Sorkhoh, Hisham Farahat, Khaled Mahdi. 480-488 [doi]
- Optimal Power Consumption in Cooperative WSNs for a random Distance using a linear propagation modelWail Mardini, Yaser Khamayseh, Marwa Salayma. 489-496 [doi]
- A new qualitative spatial recognition model based on Egenhofer topological approach using C4.5 algorithm: experiment and resultsKevin Bouchard, Bruno Bouchard, Abdenour Bouzouane. 497-504 [doi]
- Space Vector Modulation Direct Torque Speed Control Of Induction MotorMohammed T. Lazim, Muthanna J. M. Al-khishali, Ahmed Isa. Al-Shawi. 505-512 [doi]
- Cloud Services Testing: An UnderstandingAtif Farid Mohammad, Hamid Mcheick. 513-520 [doi]
- An Alternative Approach to k-Anonymity for Location-Based ServicesAmirreza Masoumzadeh, James Joshi. 522-530 [doi]
- A Service-oriented Approach to Mobile Code SecurityMicah Jones, Kevin W. Hamlen. 531-538 [doi]
- Security of MBAN based Health Records in Mobile Broadband EnvironmentDebopam Acharya, Vijay Kumar. 539-545 [doi]
- Exploration of Attacks on Current Generation SmartphonesSteven Salerno, Ameya Sanzgiri, Shambhu Upadhyaya. 546-553 [doi]
- Efficient Querying of Distributed RDF Sources in Mobile Settings based on a Source Index ModelElien Paret, William Van Woensel, Sven Casteleyn, Beat Signer, Olga De Troyer. 554-561 [doi]
- Distributed Usage ControlDebmalya Biswas, Nikolai Nefedov, Valtteri Niemi. 562-569 [doi]
- Towards Supporting Users in Semantic Exploration of Large Distributed SchemasMandana Sotoodeh, Rachel Pottinger, Philippe Kruchten. 570-577 [doi]
- A Domain-based query routing mechanism for peer-to-peer networksGhada Hassan, Hamidah Ibrahim, Md Nasir Sulaiman, Rasali Yakob. 578-585 [doi]
- SmartGuide - A Smartphone Museum Guide with Ultrasound ControlPascal Bihler, Paul Imhoff, Armin B. Cremers. 586-592 [doi]
- An Adaptive Context-Aware and Event-Based Framework Design ModelEduardo S. Barrenechea, Paulo S. C. Alencar. 593-600 [doi]
- ALPINe: Another Location Privacy Information NetworkJean-Charles Grégoire, Angèle M. Hamel. 601-609 [doi]
- Towards context-adaptable Web service policiesHamdi Yahyaoui, L. Wang, Azzam Mourad, Mohammed Almulla, Quan Z. Sheng. 610-617 [doi]
- μCloud: Towards a New Paradigm of Rich Mobile ApplicationsVerdi March, Yan Gu, Erwin Leonardi, George Goh, Markus Kirchberg, Bu-Sung Lee. 618-624 [doi]
- Using a Cloud-Hosted Proxy to support Mobile Consumers of RESTful ServicesShomoyita Jamal, Ralph Deters. 625-632 [doi]
- CroudSTag: Social Group Formation with Facial Recognition and Mobile Cloud ServicesSatish Narayana Srirama, Carlos Paniagua, Huber Flores. 633-640 [doi]
- Developing once, deploying everywhere: A case study using JILCarlos Duarte, Ana Paula Afonso. 641-644 [doi]
- Using RDF Data as Basis for 3D Window Management in Mobile DevicesAntti Peuhkurinen, Tommi Mikkonen, Mikko Terho. 645-652 [doi]
- mCHOIS: An Application of Mobile Technology for Childhood Obesity SurveillanceArun K. Datta, Andi Sumargo, Victoria Jackson, Pradip P. Dey. 653-660 [doi]
- Scriptable web applications as first-class citizensTommi Mikkonen, Mikko Terho, Mikko Kuusipalo, Pekka Reijula. 661-668 [doi]
- Defining, executing and evolving microfranchise templatesJeff DePree, Stanley Y. W. Su. 669-676 [doi]
- Business Process Integration using Telco MashupsOlexiy Chudnovskyy, Hendrik Gebhardt, Frank Weinhold, Martin Gaedke. 677-680 [doi]
- OdinTelehealth: A Mobile Service Platform for TelehealthIan Warren, Thiranjith Weerasinghe, R. Maddison, Y. Wang. 681-688 [doi]
- Towards Building Semantic Next Generation Network - A Preliminary StudyKidd S. C. Toh, S. M. F. D. Syed Mustapha. 689-696 [doi]
- A Platform for Interactive Location-Based ServicesWafaa Ait-Cheik-Bihi, Mohamed Bakhouya, Ahmed Nait-Sidi-Moh, Jaafar Gaber, Maxime Wack. 697-704 [doi]
- Empirical Comparisons of Attack and Protection Algorithms for Online Social NetworksMingzhen Mo, Irwin King, Kwong-Sak Leung. 705-712 [doi]
- A framework for peer-to-peer video streaming over WiMaxKashinath Basu, Muhammad Younas. 713-720 [doi]
- A Scenario-based Framework for Perceiving Crossbreed Service InteractionsNatalia Kryvinska, Christine Strauss. 721-728 [doi]
- Software Development and Quality Problems and Solutions by TRIZSu-Hua Wang, Durgesh Samadhiya, Dengjie Chen. 730-735 [doi]
- Embedding and Verification of ZigBee Protocol Stack in Event-BAmjad Gawanmeh. 736-741 [doi]
- Assessing and Redesigning Enterprise Networks through NS-2 to Support VoIPTahani Hussain, Sami Habib. 742-748 [doi]
- Next-Generation Wireless Sensor Networks Infrastructure Development for Monitoring ApplicationsAli El Kateeb. 749-753 [doi]
- Forecasting Daily Gas Load with OIHF-Elman Neural NetworkHong Zhou, Gang Su, Guofang Li. 754-758 [doi]
- Intelligent Monitoring and Control Architecture for Future Electrical Power SystemsAbdulmutalib Masaud-Wahaishi, Ahmed Gaouda. 759-764 [doi]
- IFHNFS: fast indexing information in mobile devicesNicola Corriero, Giuseppe Gargiuolo, Giovanni Pani. 765-770 [doi]
- Towards Pattern-based Generic Interaction ScenariosBettina Biel, Stefan Seitz, Volker Gruhn. 771-775 [doi]
- Automatic Full Text Analysis in Public Social Media - Adoption of a Software Prototype to Investigate Political CommunicationStefan Stieglitz, Christian Kaufhold. 776-781 [doi]
- Towards Shrink-Wrapped Security: Practically Incorporating Context Into Security ServicesGleneesha Johnson, Paulo Shakarian, Neha Gupta, Ashok K. Agrawala. 782-787 [doi]
- Detecting insecure person in crowd with human sensorChao Wu, Yike Guo. 788-792 [doi]
- Real-time Energy Monitoring and Controlling System based on ZigBee Sensor NetworksWoong Hee Kim, Sunyoung Lee, Jongwoon Hwang. 794-797 [doi]
- An Adaptive and Distributed Collision-Free MAC Protocol for Wireless Personal Area NetworksJuan Lu, Adrien van den Bossche, Eric Campo. 798-803 [doi]
- Load Balancing Metric with Diversity for Energy Efficient Routing in Wireless Sensor NetworksSofiane Moad, Morten Tranberg Hansen, Raja Jurdak, Branislav Kusy, Nizar Bouabdallah. 804-811 [doi]
- A Heuristic Method for Wireless Sensor Network LocalizationMohamadreza Shahrokhzadeh, Abolfazl Toroghi Haghighat, Fariborz Mahmoudi, Behrooz Shahrokhzadeh. 812-819 [doi]
- Challenges of MANET for Mobile Social NetworksStefan Stieglitz, Christoph Fuchß. 820-825 [doi]
- Conceptual Selective RFID Anti-Collision Technique ManagementPrapassara Pupunwiwat, Peter Darcy, Bela Stantic. 827-834 [doi]
- RRTL: RFID Reader Topology Language. A language to manage RFID reader's networksIsmael Abad, Carlos Cerrada, José Antonio Cerrada, Vicente Dies. 835-840 [doi]
- The effect of perceived intrusion on consumers' attitude towards using an RFID-based marketing programHarold Boeck, Jean Roy, Fabien Durif, Marc Grégoire. 841-848 [doi]
- Using RFID to Improve Hospital Supply Chain Management for High Value and Consignment ItemsYgal Bendavid, Harold Boeck. 849-856 [doi]
- Finding Commonalities in RFID Semantic StreamsMichele Ruta, Simona Colucci, Floriano Scioscia, Eugenio Di Sciascio, Francesco M. Donini. 857-864 [doi]
- Reliable and Low Latency Transmission in Industrial Wireless Sensor NetworksKan Yu, Mikael Gidlund, Johan Åkerberg, Mats Björkman. 866-873 [doi]
- Wireless Sensor Actor Network Simulation for a Fire Extinguishing SystemJohn Khalil, Ramiro Liscano. 874-880 [doi]
- A Robust Neural Fuzzy Petri Net Controller For A Temperature Control SystemAli A. Abed, Abdul Adhem A. Ali, Nauman Aslam, Ali F. Marhoon. 881-890 [doi]
- A Personal Mobility Assistant based on Ambient Intelligence to Promote Sustainable Travel ChoicesDaniele Magliocchetti, Martin Gielow, Federico De Vigili, Giuseppe Conti, Raffaele de Amicis. 892-899 [doi]
- The protection of privacy in the i-Tour frameworkScott Cadzow. 900-905 [doi]
- Business potential and market opportunities of intelligent LBSs for personal mobility - A European case studyCristina d'Alessandro, Pier Carlo Trucco. 906-911 [doi]
- A multimodal transport network model for advanced traveler information systemsJianwei Zhang, Feixiong Liao, Theo A. Arentze, Harry J. P. Timmermans. 912-919 [doi]
- Improving intelligence through use of Natural Language Processing. A comparison between NLP interfaces and traditional visual GIS interfacesDavide Calì, Antonio Condorelli, Santo Papa, Marius Rata, Luca Zagarella. 920-925 [doi]
- Innovative technologies to estimate public transport load in-real time by video content scene analysisAnta Fiorentino, Paquale Rovito, Sauro Straccali, Dario Donnari. 926-931 [doi]
- Analysis of LEACH Energy ParametersFrank Comeau, Nauman Aslam. 933-938 [doi]
- Heterogeneous Clustering Of Sensor NetworkMazen G. Khair, Burak Kantarci, Hussein T. Mouftah. 939-944 [doi]
- Delay-Reliability Trade-off in MIMO-Enabled IEEE 802.11-Based Wireless Sensor and Actuator NetworksMohsen Maadani, Seyed Ahmad Motamedi, H. Safdarkhani. 945-950 [doi]
- A Fuzzy Reputation System in Vehicular Ad hoc NetworksMohammad Jalali, Nasser Ghasem-Aghaee. 951-956 [doi]