


default search action
NBiS 2012: Melbourne, Australia
- Leonard Barolli, David Taniar, Tomoya Enokido, J. Wenny Rahayu, Makoto Takizawa:

15th International Conference on Network-Based Information Systems, NBiS 2012, Melbourne, Australia, September 26-28, 2012. IEEE Computer Society 2012, ISBN 978-1-4673-2331-4
Cloud and Scalable Computing
- Yuki Awano, Shin-ichi Kuribayashi:

Reducing Power Consumption and Improving Quality of Service in Cloud Computing Environments. 1-6 - Wayne J. Brown, Vince Anderson, Qing Tan:

Multitenancy - Security Risks and Countermeasures. 7-13 - Hui Ma, Yue Qiu:

The Cloud Computing Applications in Information Resource Dynamic Allocation. 14-17 - Nawsher Khan, Ahmad Noraziah

, Tutut Herawan
, Elrasheed I. Ismail, Zakira Inayat:
Cloud Computing: Architecture for Efficient Provision of Services. 18-23
Data Management
- Norfaradilla Wahid, Eric Pardede

:
Single Transition Constraint for XML Update Validation. 24-31 - Ahmad Abdullah Alqarni, Eric Pardede

:
Integration of Data Warehouse and Unstructured Business Documents. 32-37 - Sultan Alamri

, David Taniar
, Maytham Safar
:
Indexing Moving Objects in Indoor Cellular Space. 38-44 - Maria Indrawan-Santiago:

Database Research: Are We at a Crossroad? Reflection on NoSQL. 45-51
P2P Computing and Networks
- Joan Arnedo-Moreno, Noemi Perez-Gilabert, Marc Domingo-Prieto:

Experimental Evaluation of Anonymous Protocols under the JXTA Middlewar. 52-57 - Ailixier Aikebaier, Tomoya Enokido, Makoto Takizawa

:
Trustworthy Group Formation Algorithm Based on Decentralized Trust Management in Distributed Systems. 58-65 - Yuta Shimano, Fumiaki Sato:

Dynamic Reconfiguration of Chord Ring Based on Physical Network and Finger Table Information. 66-73 - Yoshiki Sakata, Kazuyuki Takayama, Rei Endo, Hiroshi Shigeno:

A Chunk Scheduling Based on Chunk Diffusion Ratio on P2P Live Streaming. 74-81
Intelligent Systems and Networking
- Nobuyoshi Sato, Tsuyoshi Takayama, Yoshitoshi Murata:

Estimating the Number of Lanes on Rapid Road Map Survey System Using GPS Trajectories as Collective Intelligence. 82-88 - Noriki Uchida, Kazuo Takahata, Yoshitaka Shibata, Norio Shiratori:

Local Area Network Reactivation in Never Die Network for a Large Scale Disaster. 89-96 - Evjola Spaho

, Makoto Ikeda, Leonard Barolli, Fatos Xhafa
, Aleksander Biberaj, Makoto Takizawa
:
Performance Evaluation of DYMO Protocol in Different VANET Scenarios. 97-103 - Mohammed Bonais, J. Wenny Rahayu, Eric Pardede

:
Integrating Information Systems Business Rules into a Design Model. 104-111
Distributed Computing and Networking
- Tomoya Enokido, Makoto Takizawa

:
The Extended Transmission Power Consumption Model for Communication-Based Applications. 112-119 - Takuro Inoue, Ailixier Aikebaier, Tomoya Enokido, Makoto Takizawa

:
Evaluation of an Energy-Aware Selection Algorithm for Computation and Storage-Based Applications. 120-127 - Minoru Uehara:

RAIDv: Extensible RAID1 Based on Voting. 128-133
Mobile Ad Hoc Networks
- Masahiro Hiyama, Elis Kulla, Makoto Ikeda, Leonard Barolli, Muhammad Younas:

A Comparative Study of a MANET Testbed Performance in Indoor and Outdoor Stairs Environment. 134-140 - Elis Kulla, Makoto Ikeda, Leonard Barolli, Muhammad Younas, Kazunori Uchida, Makoto Takizawa

:
Simulation Performance of a MANET Using Static Source and Destination Considering AODV Routing Protocol. 141-147 - Akio Koyama, Shohei Sato, Leonard Barolli, Makoto Takizawa

:
An Implementation of Visualization System for Visualizing Network Topology and Packet Flow in Mobile Ad Hoc Networks. 148-155 - Makoto Ikeda, Elis Kulla, Masahiro Hiyama, Leonard Barolli, Muhammad Younas, Makoto Takizawa

:
TCP Congestion Control in MANETs for Multiple Traffic Considering Proactive and Reactive Routing Protocols. 156-163
Multimedia Systems and Applications
- Tadateru Ohkawara, Ailixier Aikebaier, Tomoya Enokido, Makoto Takizawa

:
Design and Evaluation of Multimedia Quorum-Based Synchronization Protocols. 164-171 - Dylan Mathiesen, Trina S. Myers

, Ian Atkinson
, Jarrod Trevathan
:
Geological Visualisation with Augmented Reality. 172-179 - Juyoung Park, Jaemyoun Lee

, Junbeom Hur, Kyungtae Kang:
Extending Service Coverage Using FGS-Aware Blind Repetition. 180-186 - Takuma Kon, Noriki Uchida, Koji Hashimoto, Yoshitaka Shibata:

Evaluation of a Seamless Surveillance Video Monitoring System Used by High-Speed Network and High-Resolution Omni-directional Cameras. 187-193
Wireless Sensor Networks
- Rabia Latif

, Asad Raza
:
A Boundary Node Detection Based Solution for Minimizing the Effects of Nodes Distribution over Key Exchange in Group Based WSN. 194-199 - Shinya Kondo, Akimitsu Kanzaki, Takahiro Hara, Shojiro Nishio:

Energy-Efficient Data Gathering Using Traffic Reduction Based on Change in Data Characteristics in Wireless Sensor Networks. 200-207 - Qi Wang, Leonard Barolli, Elis Kulla, Arjan Durresi, Aleksander Biberaj, Makoto Takizawa

:
A Fuzzy-Based Simulation System for Controlling Sensor Speed in Wireless Sensor Networks. 208-213 - Tetsuya Oda, Admir Barolli

, Evjola Spaho
, Leonard Barolli, Fatos Xhafa
, Jiro Iwashige:
Node Placement in WMNs and Visualization of Evolutionary Computation Process Using WMN-GA System. 214-220
Social Networks
- Toshihiko Yamakami:

Mobile Social Game Design from the Perspective of Persuasive Technology. 221-225 - Toshihiko Yamakami:

Transition Analysis of Mobile Social Games from Feature-Phone to Smart-Phone. 226-230 - Maytham Safar

, Khaled Mahdi
, Ghufran Al-Shiridah:
Feedback Capacity of Random Networks. 231-238 - Alan Chia-Lung Chen, Mohamad Elzohbi, Ahmad Elhajj, Kostas F. Xylogiannopoulos

, Panagiotis Karampelas
, Mick J. Ridley, Reda Alhajj:
Finding Hidden Nodes by Checking for Missing Nodes against Past Social Networks. 239-246
Secure Systems and Networks
- Ingo Bente, Bastian Hellmann, Jörg Vieweg, Josef von Helden, Gabi Dreo:

TCADS: Trustworthy, Context-Related Anomaly Detection for Smartphones. 247-254 - Jiazi Yi, Thomas H. Clausen

:
Vulnerability Analysis of Relay Set Selection Algorithms for the Simplified Multicast Forwarding (SMF) Protocol for Mobile Ad Hoc Networks. 255-260 - Takayuki Matsudo, Eiichiro Kodama, Jiahong Wang, Toyoo Takata:

A Proposal of Security Advisory System at the Time of the Installation of Applications on Android OS. 261-267
Communication Networks and Protocols
- Kazuya Odagiri, Shogo Shimizu, Naohiro Ishii, Makoto Takizawa

:
Theoretical Suggestion of Policy-Based Wide Area Network Management System (wDACS System Part-I). 268-275 - Chung-Ming Huang, Yih-Chung Chen, Shih Yang Lin:

The QoS-Aware Order Prediction Scheduling (QOPS) Scheme for Video Streaming Using the Multi-path Datagram Congestion Control Protocol (MP-DCCP). 276-283 - Yumi Nakayama, Katsuhiko Kaji, Nobuo Kawaguchi:

Application Layer Traffic Engineering for Multipoint Communication System. 284-289 - Naomi Kuze, Naoki Wakamiya, Masayuki Murata

:
Proposal and Evaluation of Ant-Based Routing with Autonomous Zoning for Convergence Improvement. 290-297
Web and Internet Applications
- Keizo Sato, Yoshitaka Adachi, Makoto Nakashima, Tetsuro Ito:

A Mechanism of Trailing the Footprint for the Previously Visited Web Pages to Ease a Meta-Knowledge-Based Search. 298-305 - Matthias Steinbauer, Gabriele Kotsis

:
Building an Information System for Reality Mining Based on Communication Traces. 306-310 - Jess Farber, Trina S. Myers

, Jarrod Trevathan
, Ian Atkinson
, Trevor Andersen:
Riskr: A Low-Technological Web2.0 Disaster Service to Monitor and Share Information. 311-318 - Naoko Kosugi, Mayu Kondo:

Community Site for Music Therapists Based on the Session Records of Music Therapy. 319-325
Mobile and Wireless Networks
- Fatos Xhafa

, Albert Bravo, Admir Barolli
, Makoto Takizawa
:
An Interface for Simulating Node Placement in Wireless Mesh Networks. 326-333 - Tetsuya Shigeyasu, Hiroshi Matsuno:

Effects of Directional Receiving for MAC-Level Broadcasting on Wireless Ad Hoc Networks. 334-340 - Tao Yang, Elis Kulla, Tetsuya Oda, Leonard Barolli, Muhammad Younas, Makoto Takizawa

:
Performance Evaluation of WSNs Considering MAC and Routing Protocols Using Goodput and Delay Metrics. 341-348 - Suhaimi Bin Abd Latif, Mohammed A. Rashid

:
Dynamic Superframe Selection Scheme for High-Speed Wireless Networks. 349-356
Ubiquitous and Pervasive Computing Applications
- Stan Kurkovsky

, Wittawat Meesangnil:
Building and Evaluating a Mobile Application for an Academic Library. 357-363 - Toru Kato, Masahiro Higuchi:

A Handling Management System for Freight with the Ambient Calculus and UHF RFID Tags. 364-371 - Martin M. Weng, Guangyu Piao, Neil Y. Yen, Timothy K. Shih:

General Pattern Discovery for Social Game on Facebook. 372-375
Secure Systems and Trust Management
- Ingo Bente, Bastian Hellmann, Thomas Rossow, Jörg Vieweg, Josef von Helden:

On Remote Attestation for Google Chrome OS. 376-383 - Toan-Thinh Truong, Minh-Triet Tran

, Anh Duc Duong:
Robust Biometrics-Based Remote User Authentication Scheme Using Smart Cards. 384-391 - Pawat Chomphoosang, Arjan Durresi, Mimoza Durresi, Leonard Barolli:

Trust Management of Social Networks in Health Care. 392-396
ADPNA 2012
Distributed Networks and Applications
- Dilawaer Duolikun, Ailixier Aikebaier, Tomoya Enokido, Makoto Takizawa

:
Ordered Delivery of Messages in Group Communication Protocols. 397-401 - Ailixier Aikebaier, Tomoya Enokido, Makoto Takizawa

:
Trustworthiness of Peers in P2P Overlay Networks. 402-407 - Dinh Thuan Nguyen

, Gia Toan Nguyen, Lam Vu Tuan Nguyen:
An Approach Mining Cyclic Association Rules in E-Commerce. 408-411 - Xiuzhen Feng, Xiaohong He, Bianling Feng:

Online Slicing Analysis in Adverse Drug Reaction Data Warehouse. 412-416
CPSAT 2012
Cyber-Physical Systems and Cloud Web Services
- Jaipal Singh, Omar Khadeer Hussain

:
Cyber-Physical Systems as an Enabler for Next Generation Applications. 417-422 - Wai Wai Shein, Yasuo Tan, Azman Osman Lim:

PID Controller for Temperature Control with Multiple Actuators in Cyber-Physical Home System. 423-428 - Ashley Chonka, Jemal H. Abawajy:

Detecting and Mitigating HX-DoS Attacks against Cloud Web Services. 429-434
Sensor Networks and Healthcare Systems
- Marc Domingo-Prieto, Joan Arnedo-Moreno, Xavier Vilajosana-Guillen

:
jxSensor: A Sensor Network Integration Layer for JXTA. 435-440 - Andrei V. Kelarev, Andrew Stranieri

, John Yearwood, Herbert F. Jelinek
:
Empirical Study of Decision Trees and Ensemble Classifiers for Monitoring of Diabetes Patients in Pervasive Healthcare. 441-446 - Cedric Perrot, Gavin Finnie, Iain Morrison:

Establishing Context for Software Agents in Pervasive Healthcare Systems. 447-452
DEMoC 2012
Content Delivery Scheduling and Broadcasting Systems
- Yusuke Gotoh, Hideo Taniguchi:

A Scheduling Scheme for Improving Error Resilience on Media Data Broadcasting. 453-458 - Yuuki Furukawa, Toshihiro Yamauchi

, Hideo Taniguchi:
Novel Control Method for Preventing Missed Deadlines in Periodic Scheduling. 459-464 - Akihiro Kimura, Yusuke Gotoh, Hideo Taniguchi:

TeleCaS: Division Based Broadcasting System Considering Sequential Playback. 465-470 - Tomoki Yoshihisa, Shojiro Nishio:

Video Data Reception Methods Considering Playing Position on Hybrid Broadcasting Environments. 471-476
HETNET 2011
Heterogeneous Networking and Applications
- James Elton, Paul W. H. Chung:

A Novel Server System to Support Different Types of Communication Services for Applications. 477-482 - Axel Korthaus

, Wei Dai:
Crowdsourcing in Heterogeneous Networked Environments - Opportunities and Challenges. 483-488 - Lixin Zhou, Catherine Xiaocui Lou

:
Intelligent Cargo Tracking System Based on the Internet of Things. 489-493 - Xiaomin Zhu, Donghua Chen

, Wei Dai, Runtong Zhang:
An Integration Technology for Socially Aware Mobile Applications in Heterogeneous Networking Environments. 494-499
HETNETs for Enterprise and Business
- Serguei Dobrinevski:

Integration of Mobile-Devices-Based Personal Analytics into Enterprise Organizational Transformation Scenarios. 500-505 - Paul Moynihan, Wei Dai:

HetNet Framework for Supply Chain Management. 506-511 - Yongqiang Li, Wei Dai, Anona Armstrong, Andrew Clarke, Miaoli Du:

Developing an Integrated Supply Chain System for Small Businesses in Australia: A Service-Oriented PHOENIX Solution. 512-517 - Catherine Xiaocui Lou

, Wei Dai:
Robust Supply Chain Services System through Optimization Modeling for Enterprises. 518-523
INVITE 2012
Multimedia Applications
- Kaoru Sugita, Masao Yokota:

A Preliminary Evaluation for Effectiveness of Media Switching Function. 524-527 - Akira Sakuraba, Tomoyuki Ishida, Yoshitaka Shibata:

A Method for User-Location Estimation for Intuitive Input System on Very Large Display Space. 528-533 - Tetsuro Ogi, Yoshisuke Tateyama, Hao Lu, Erika Ikeda:

Digital 3D Ukiyoe Using the Effect of Motion Parallax. 534-539
Tiled Display
- Yasuo Ebara:

Approaches to Display of Ultra-resolution Video Streaming by Multi-transmission on Tiled Display Environment. 540-545 - Kaoru Sugita, Masao Yokota:

A Universal Multimedia Contents on a Tiled Display Equipment. 546-549 - Tomoyuki Ishida, Akira Sakuraba, Noriki Uchida, Koji Hashimoto, Yoshitaka Shibata:

A Unified Large Scale Disaster Information Presentation System Using Ultra GIS Based Tiled Display Environment. 550-555
INWC 2012
Information Networking and Wireless Communication Systems
- Kazunori Uchida, Masafumi Takematsu, Junichi Honda:

An Algorithm to Estimate Propagation Parameters Based on 2-Ray Model. 556-561 - Hiroshi Maeda

, Huili Chen, Kazuya Tomiura, Takuya Shinohara:
Numerical and Experimental Study on Confinement of Microwave in Dielectric and Metallic Post Array Waveguide. 562-566 - Junichi Honda, Takuya Otsuyama:

An Algorithm for Analysis of Reflected and Diffracted Fields from a Polyhedron Type of Target above a Plane-Ground. 567-571 - Toshihiko Wakahara, Damri Samretwit, Noriyasu Yamamoto:

A Study on the Reading Characteristics of Colored 2-Dimensional Code. 572-576
ISSE 2012
Intelligent Sensors and Smart Environments
- Malabika Parida, Huan-Chi Yang, Shiang-Wen Jheng, Chung-Jen Kuo:

Application of RFID Technology for In-House Drug Management System. 577-581 - Chi-Yi Lin, Ming-Tze Hung, Wei-Hsun Huang:

A Location-Based Personal Task Management Application for Indoor and Outdoor Environments. 582-587 - Hui-Huang Hsu, Kang-Chun Tsai, Zixue Cheng, Tongjun Huang:

Posture Recognition with G-Sensors on Smart Phones. 588-591 - Chuan-Yu Chang, Yu-Mon Lin, Jun-Ying Zheng:

Physiological Angry Emotion Detection Using Support Vector Regression. 592-596
ITIS 2012
Innovative Systems
- Kiyotaka Oe, Akio Koyama:

A Multicast Routing Protocol for Wireless Mesh Networks Considering Network Load. 597-602 - Nobuyoshi Sato, Tsuyoshi Takayama, Yoshitoshi Murata:

On Automatic Flying Distance Measurement on Ski Jumper's Motion Monitoring System. 603-609 - Rei Itsuki:

Design of Management System for Arrayed Returnable Containers. 610-614 - Ritu Endo, Junichi Kumamimi, Minoru Uehara:

Storage Deduplication by Virtual Large-Scale Disks. 615-620
Innovative Applications
- Shinichiro Kibe, Teruaki Koyama, Minoru Uehara:

The Evaluations of Desktop as a Service in an Educational Cloud. 621-626 - Takamasa Miyano, Minoru Uehara:

Proposal for Cloud Search Engine as a Service. 627-632 - Hideaki Yanagisawa:

Evaluation of a Web-Based Programming Environment. 633-638 - Ryunosuke Ozawa, Minoru Uehara:

Long Term Management of Web Cache for Web Archive. 639-644
MCCTA 2012
Mobile and Cloud Computing
- Keonsoo Lee, Seungmin Rho:

Meta Index Model Based Matchmaking for Human Resource Management: An Approach for Similarity Comparing between Employee and Job Position Using Meta Index Model. 645-649 - Yang Sun Lee

, Ze-Guang Jin, Jae-Myeong Choi
, Sang-Soo Yeo
:
A Study on the Design of Digital Narrowband Communication System for Next Generation Group Communication. 650-653 - Milos Stojmenovic:

Mobile Cloud Computing for Biometric Applications. 654-659 - Niroshinie Fernando, Seng Wai Loke, J. Wenny Rahayu:

Mobile Crowd Computing with Work Stealing. 660-665
Modeling, Trust and Security
- Mucheol Kim, Sang Oh Park:

Trust Based Sensor Network Clustering with Load Balance Factors. 666-669 - Seokhwan Yang, Mokdong Chung:

A Neural Network Model Using Extended Feature-Based Neuron: NNDFF. 670-674 - Yuseop Lee, Jongsung Kim, Seokhie Hong, Changhoon Lee

:
Improved Differential Fault Analysis on Block Cipher SEED-128. 675-680 - Jae-Myeong Choi

, Sang-Soo Yeo
:
Automated Security Level Conversion on Security Documents in Different Domains. 681-684
NeoFusion 2012
Ubiquitous Computing
- Rong He, Zhongzhi Luan, Yuanqiang Huang, Zhendong Cheng, Depei Qian, Gang Guan:

Providing High Availability for Distributed Stream Processing Application with Replica Placement. 685-690 - Mye M. Sohn, Young Min Kwon, Hyun Jung Lee:

Context-Based Hybrid Semantic Matching Framework for E-mentoring System. 691-696 - Hyun Jung Lee, Mye M. Sohn:

Construction of Tag-Based Dynamic Data Catalog (TaDDCat) Using Ontology. 697-702 - Seongil Lee, Kyohyun Song, Jihwan Kim, Jiho Choi:

Ambient Widget: An Ambient Information System Using Gesture-Based Interactions. 703-708
Wireless and Multimedia Networking
- Yulong Ou, Bo Li, Hailong Yang, Zhongzhi Luan, Depei Qian:

Efficient Statistical Computing on Multicore and MultiGPU Systems. 709-714 - Chengjun Wang, Baokang Zhao, Wei Peng

, Chunqing Wu, Zhenghu Gong:
Routing Algorithm Based on Ant Colony Optimization for DTN Congestion Control. 715-720 - Dingjie Zou, Baokang Zhao, Chunqing Wu, Bo Liu, Wanrong Yu, Xiangchun Ma, Hongxin Zou:

CLIP: A Distributed Emulation Platform for Research on Information Reconciliation. 721-726 - Chengjun Wang, Baokang Zhao, Wei Peng

, Chunqing Wu, Zhenghu Gong:
Following Routing: An Active Congestion Control Approach for Delay-Tolerant Networks. 727-732
Ubiquitous Services and Applications
- Jong-Suk Ruth Lee, Young Jin Jung, Sun Rae Park, Junglok Yu, Du-Seok Jin, Kumwon Cho:

A Ubiquitous Smart Learning Platform for the 21st Smart Learners in an Advanced Science and Engineering Education. 733-738 - Dongjin Choi, Byeong-Kyu Ko, Eunji Lee, Myunggwon Hwang, Pankoo Kim:

Automatic Evaluation of Document Classification Using N-Gram Statistics. 739-742 - Dong-Seok Yang, Yong-Hwan Lee:

Mobile Image Retrieval Using Integration of Geo-sensing and Visual Descriptor. 743-748 - Yong-Hwan Lee, Hyochang Ahn, Sang-Burm Rhee:

Efficient Image Retrieval Using Advanced Clustering SURF. 749-753
Ubiquitous Security and Intelligent System
- Inshil Doh, Kijoon Chae, Jiyoung Lim, Min Young Chung:

An Improved Security Approach Based on Kerberos for M2M Open IPTV System. 754-759 - Seongil Lee, Kyohyun Song, Jiho Choi:

Access to an Automated Security System Using Gesture-Based Passwords. 760-765 - Hae-Duck Joshua Jeong, WooSeok Hyun, Jiyoung Lim, Ilsun You:

Anomaly Teletraffic Intrusion Detection Systems on Hadoop-Based Platforms: A Survey of Some Problems and Solutions. 766-770 - Guofeng Zhu, Xingjun Zhang, Longxiang Wang, Yueguang Zhu, Xiaoshe Dong

:
An Intelligent Data De-duplication Based Backup System. 771-776
TwC 2012
Secure Systems
- Hiroki Nishikawa, Shingo Kuse, Keiichi Iwamura, Isao Echizen:

A Method for Resisting Averaging Attacks on Digital Watermarks and Use of This Method with Digital Watermarks. 777-781 - Yoshiro Wataguchi, Takao Okubo, Yukie Unno, Nobuyuki Kanaya:

Cooperative Secure Integration Process for Secure System Development. 782-786 - Danilo Valeros Bernardo:

Securing the Cloud, Dispelling Fears: Ways to Combat Climate Change. 787-793
Trust and Access Control
- Yuji Suga:

Access Control Methods Suitable for Stream Contents Delivery Cloud Services by Using Hash-Chain Based Key Derivation Schemes. 794-798 - Yoshifumi Kamoshida, Hiroaki Kikuchi:

Word Salad CAPTCHA - Application and Evaluation of Synthesized Sentences. 799-804 - Kouhei Umezaki, Evjola Spaho

, Leonard Barolli, Fatos Xhafa
, Muhammad Younas, Jiro Iwashige:
A Fuzzy-Based Reliability System for JXTA-Overlay P2P Platform Considering Actual Behaviour and Amount of Data Exchanged between Peers. 805-810
WReCS 2012
Bioinspired Computing
- Salvatore Vitabile

:
Biologically Inspired Hardware: Status and Perspectives (Invited Talk). 811-814 - Katsuyoshi Matsumoto, Shinichiro Kibe, Minoru Uehara, Hideki Mori:

Design of Development as a Service in the Cloud. 815-819
Reconfigurable Systems
- Hideharu Amano:

Castle of Chips: A New Chip Stacking Structure with Wireless Inductive Coupling for Large Scale 3-D Multicore Systems. 820-825 - Toru Katagiri, Kazuei Hironaka, Hideharu Amano:

Extension of Memory Controller Equipped with MuCCRA-3-DP: Dynamically Reconfigurable Processor Array. 826-831 - Hiroyuki Ito, Minoru Watanabe:

A Uniform Partitioning Method for Mono-Instruction Set Computer (MISC). 832-837
Energy Saving
- Yuichiro Takabe, Katsuyoshi Matsumoto, Motoi Yamagiwa, Minoru Uehara:

Proposed Sensor Network for Living Environments Using Cloud Computing. 838-843 - Motoi Yamagiwa, Minoru Uehara:

A Study on Constructing an Energy Saving Cloud System Powered by Photovoltaic Generation. 844-848 - Tatsunori Takahashi, Hidenao Tanaka, Shinichiro Kibe, Minoru Uehara:

Storage-Side Computing for Data Management in Private and Public Clouds. 849-854
WSSM 2012
Social Media Experiences
- Jun Iio:

Evaluating the Usefulness of Online Reviews. 855-860 - Tobias Brockmann, Stefan Stieglitz, Johannes Kmieciak, Stephan Diederich:

User Acceptance of Mobile Business Intelligence Services. 861-866 - Yui Takizawa, Kazutaka Tsuji, Tatsuhiro Yonekura:

How to Encourage Intermediary on Social Media. 867-872 - Narichika Hamaguchi, Hiroshi Fujisawa, Masaru Miyazaki, Ritsu Yonekura, Satoshi Nishimura:

Investigating Trends in Social TV Services Based on User Participating Experiments. 873-878
Web Tools and Social Media
- Yoshihiro Kawano, Yuka Obu, Yorinori Kishimoto, Takashi Yamaguchi, Eiji Nunohiro, Tatsuhiro Yonekura:

A Personal Branding for University Students by Practical Use of Social Media. 879-884 - Naoto Takama, Michitoshi Niibori, Shusuke Okamoto, Masaru Kamada, Tatsuhiro Yonekura:

Web-Based Tool for Programming Interactive Animations in Terms of State-Transition Diagrams. 885-888 - Michitoshi Niibori, Yutaro Arisawa, Shusuke Okamoto, Masaru Kamada, Tatsuhiro Yonekura:

An Authoring Tool for Flash Games in ActionScript3.0. 889-892 - Makoto Rokujo, Michitoshi Niibori, Shusuke Okamoto, Masaru Kamada, Tatsuhiro Yonekura:

Authoring Tool for Flash 3D Animations in Terms of State-Transition Diagrams. 893-897

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














