Login / Signup
ICT-EurAsia/CONFENIS
2015
2015
2015
Keyphrases
Publications
2015
Masahiro Kuzunishi
,
Tetsuya Furukawa
Strength of Relationship Between Multi-labeled Data and Labels.
ICT-EurAsia/CONFENIS
(2015)
Hikari Kato
,
Szilárd Zsolt Fazekas
,
Mayumi Takaya
,
Akihiro Yamamura
Comparative Study of Monte-Carlo Tree Search and Alpha-Beta Pruning in Amazons.
ICT-EurAsia/CONFENIS
(2015)
Guido David
Markov Chain Solution to the 3-Tower Problem.
ICT-EurAsia/CONFENIS
(2015)
Sooyeon Shin
,
Seungyeon Kim
,
Taekyoung Kwon
Identification of Corrupted Cloud Storage in Batch Auditing for Multi-Cloud Environments.
ICT-EurAsia/CONFENIS
(2015)
Bo Liu
,
Baokang Zhao
,
Chunqing Wu
,
Wanrong Yu
,
Ilsun You
Efficient Almost Strongly Universal Hash Function for Quantum Key Distribution - Extended Abstract.
ICT-EurAsia/CONFENIS
(2015)
Yusuke Watanabe
,
Mayumi Takaya
,
Akihiro Yamamura
Fitness Function in ABC Algorithm for Uncapacitated Facility Location Problem.
ICT-EurAsia/CONFENIS
(2015)
Priagung Khusumanegara
,
Rischan Mafrur
,
Deokjai Choi
Profiler for Smartphone Users Interests Using Modified Hierarchical Agglomerative Clustering Algorithm Based on Browsing History.
ICT-EurAsia/CONFENIS
(2015)
Nan Guo
,
Fangting Peng
,
Tianhan Gao
Secure Mobility Management for MIPv6 with Identity-Based Cryptography.
ICT-EurAsia/CONFENIS
(2015)
Tomás Halagan
,
Tomas Kovacik
,
Peter Trúchly
,
Andrej Binder
Syn Flood Attack Detection and Type Distinguishing Mechanism Based on Counting Bloom Filter.
ICT-EurAsia/CONFENIS
(2015)
Michael Weigend
Making Computer Science Education Relevant.
ICT-EurAsia/CONFENIS
(2015)
Martin Sarnovsky
,
Peter Butka
,
Peter Bednár
,
Frantisek Babic
,
Ján Paralic
Analytical Platform Based on Jbowl Library Providing Text-Mining Services in Distributed Environment.
ICT-EurAsia/CONFENIS
(2015)
Chi-Yao Weng
,
Sheng-Jie Wang
,
Shiuh-Jeng Wang
A Lossless Data Hiding Strategy Based on Two-Dimensional Side-Match Predictions.
ICT-EurAsia/CONFENIS
(2015)
Peige Ren
,
Xiaofeng Wang
,
Hao Sun
,
Fen Xu
,
Baokang Zhao
,
Chunqing Wu
An Efficient Unsavory Data Detection Method for Internet Big Data.
ICT-EurAsia/CONFENIS
(2015)
Han Gang
,
Hongyang Yan
,
Lingling Xu
Secure Image Deduplication in Cloud Storage.
ICT-EurAsia/CONFENIS
(2015)
Hiromichi Abe
,
Kazuya Kinoshita
,
Kensuke Baba
,
Shigeru Takano
,
Kazuaki J. Murakami
Analyzing Brain Waves for Activity Recognition of Learners.
ICT-EurAsia/CONFENIS
(2015)
Mi-Young Cho
,
Young-Sook Jeong
Face Recognition Performance Comparison Between Real Faces and Pose Variant Face Images from Image Display Device.
ICT-EurAsia/CONFENIS
(2015)
Chunlu Chen
,
Hiroaki Anada
,
Junpei Kawamoto
,
Kouichi Sakurai
Hybrid Encryption Scheme Using Terminal Fingerprint and Its Application to Attribute-Based Encryption Without Key Misuse.
ICT-EurAsia/CONFENIS
(2015)
Yanchen Liu
,
Fang Cao
,
Masood S. Mortazavi
,
Mengmeng Chen
,
Ning Yan
,
Chi Ku
,
Aniket Adnaik
,
Stephen Morgan
,
Guangyu Shi
,
Yuhu Wang
,
Fan Fang
DCODE: A Distributed Column-Oriented Database Engine for Big Data Analytics.
ICT-EurAsia/CONFENIS
(2015)
Sergey Krendelev
,
Mikhail Yakovlev
,
Maria Usoltseva
Secure Database Using Order-Preserving Encryption Scheme Based on Arithmetic Coding and Noise Function.
ICT-EurAsia/CONFENIS
(2015)
Kamil Burda
,
Martin Nagy
,
Ivan Kotuliak
Reducing Keepalive Traffic in Software-Defined Mobile Networks with Port Control Protocol.
ICT-EurAsia/CONFENIS
(2015)
Andrej Binder
,
Tomas Boros
,
Ivan Kotuliak
A SDN Based Method of TCP Connection Handover.
ICT-EurAsia/CONFENIS
(2015)
Dirmanto Jap
,
Jakub Breier
Differential Fault Attack on LEA.
ICT-EurAsia/CONFENIS
(2015)
Zhaohao Sun
,
Francisca Pambel
,
Fangwei Wang
Incorporating Big Data Analytics into Enterprise Information Systems.
ICT-EurAsia/CONFENIS
(2015)
Roman Bronis
,
Ivan Kotuliak
,
Tomas Kovacik
,
Peter Trúchly
,
Andrej Binder
IP Data Delivery in HBB-Next Network Architecture.
ICT-EurAsia/CONFENIS
(2015)
Lukás Gregorovic
,
Ivan Polásek
,
Branislav Sobota
Software Model Creation with Multidimensional UML.
ICT-EurAsia/CONFENIS
(2015)
Hsing-Chung Chen
,
Chung-Wei Chen
A Secure Multicast Key Agreement Scheme.
ICT-EurAsia/CONFENIS
(2015)
Martin Nagy
,
Ivan Kotuliak
,
Jan Skalny
,
Martin Kalcok
,
Tibor Hirjak
Integrating Mobile OpenFlow Based Network Architecture with Legacy Infrastructure.
ICT-EurAsia/CONFENIS
(2015)
Takashi Kurokawa
,
Ryo Nojima
,
Shiho Moriai
Can We Securely Use CBC Mode in TLS1.0?
ICT-EurAsia/CONFENIS
(2015)
Andreas Mladenow
,
Niina Maarit Novak
,
Christine Strauss
Online Ad-fraud in Search Engine Advertising Campaigns - Prevention, Detection and Damage Limitation.
ICT-EurAsia/CONFENIS
(2015)
Antonín Pavlícek
,
Petr Doucek
Corporate Social Responsibility in Social Media Environment.
ICT-EurAsia/CONFENIS
(2015)
Yana A. Bekeneva
,
Konstantin Borisenko
,
Andrey Shorov
,
Igor V. Kotenko
Investigation of DDoS Attacks by Hybrid Simulation.
ICT-EurAsia/CONFENIS
(2015)
N. Renugadevi
,
C. Mala
Key Agreement with Modified Batch Rekeying for Distributed Group in Cognitive Radio Networks.
ICT-EurAsia/CONFENIS
(2015)
Shuichiro Yamamoto
An Approach for Evaluating Softgoals Using Weight.
ICT-EurAsia/CONFENIS
(2015)
David Kiwana
,
Björn Johansson
,
Sven A. Carlsson
Usage of Finance Information Systems in Developing Countries: Identifying Factors During Implementation that Impact Use.
ICT-EurAsia/CONFENIS
(2015)
Thi Ai Thao Nguyen
,
Dinh Thanh Nguyen
,
Tran Khanh Dang
A Multi-factor Biometric Based Remote Authentication Using Fuzzy Commitment and Non-invertible Transformation.
ICT-EurAsia/CONFENIS
(2015)
volume 9357, 2015
Information and Communication Technology - Third IFIP TC 5/8 International Conference, ICT-EurAsia 2015, and 9th IFIP WG 8.9 Working Conference, CONFENIS 2015, Held as Part of WCC 2015, Daejeon, Korea, October 4-7, 2015, Proceedings
ICT-EurAsia/CONFENIS
9357 (2015)