default search action
14th IMIS 2020: Lodz, Poland
- Leonard Barolli, Aneta Poniszewska-Maranda, Hyunhee Park:
Innovative Mobile and Internet Services in Ubiquitous Computing - Proceedings of the 14th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2020), Lodz, Poland, 1-3 July, 2020. Advances in Intelligent Systems and Computing 1195, Springer 2021, ISBN 978-3-030-50398-7 - Admir Barolli, Shinji Sakamoto, Seiji Ohara, Leonard Barolli, Makoto Takizawa:
Performance Evaluation of WMN-PSOSA-DGA Simulation System Considering Linearly Decreasing Vmax Method and Rational Decreament of Vmax Method. 1-10 - Miralda Cuka, Donald Elmazi, Keita Matsuo, Makoto Ikeda, Leonard Barolli, Makoto Takizawa:
IoT Node Elimination and Selection for Completing Tasks in Opportunistic Networks: A Fuzzy Logic Approach. 11-22 - Kevin Bylykbashi, Ermioni Qafzezi, Makoto Ikeda, Keita Matsuo, Leonard Barolli, Makoto Takizawa:
A Fuzzy-Based Simulation System for Driving Risk Management in VANETs Considering Weather Condition as a New Parameter. 23-32 - Shiyu Li, Baojiang Cui:
Research on Association Analysis Technology of Network Attack Trace Based on Web Log. 33-43 - Liliana Mâta:
Ethical Use of Mobile Technology in the Academic Environment. 44-55 - Szu-Yin Lin, Fang-Yie Leu, Chia-Yin Ko, Ming-Chien Shih, Wei-Jia Tang:
A Hybrid Information-Based Smartphone Indoor-Position Approach. 56-64 - Jiha Kim, Hyewon Kim, WooSeok Hyun, Hae-Duck J. Jeong:
An Accounting Ledger System Using the Hyperledger Fabric-Based Blockchain. 65-72 - Jiyoon Kim, Soobin Ahn, Jiyoung Lim:
Protocol Design for Boarding Confirmation Through Arduino Sensing. 73-80 - Hsing-Chung Chen, Mosiur Rahaman, Cahya Damarjati:
A Security Analysis Approach for Secure Color-Code Key Exchange Protocol by Using BAN Logic. 81-93 - Xiao-ou Song, Xiao-Rong Wang:
An UWB Cyclostationary Detection Algorithm Based on Nonparametric Cusum. 94-103 - Tomoyuki Ishida, Kanae Sakamoto:
Proposal of a Disaster Evacuation Support System Using Beacon. 104-113 - Yifeng Dong, Tianhan Gao:
A Convolutional Neural Network Model for Object Detection Based on Receptive Field. 114-124 - Yuchao Wang, Baojiang Cui:
The Study and Realization of a Binary-Based Address Sanitizer Based on Code Injection. 125-134 - Kazuki Ikegami, Hiroaki Kikuchi:
Modeling the Risk of Data Breach Incidents at the Firm Level. 135-148 - Jacek Wytrebowicz, Michal Goworko:
IoT Cryptosecurity: Overview and Potential Solutions. 149-160 - Nampoina Andriamilanto, Tristan Allard, Gaëtan Le Guelvouit:
"Guess Who?" Large-Scale Data-Centric Study of the Adequacy of Browser Fingerprints for Web Authentication. 161-172 - Asif Qumer Gill, Ghassan Beydoun, Mahmood Niazi, Habib Ullah Khan:
Adaptive Architecture and Principles for Securing the IoT Systems. 173-182 - Zuan Gu, Tianhan Gao:
A Visual Particle System Based on Mechanism Model Data in Digital Twin. 183-193 - Xinbei Jiang, Tianhan Gao:
An EEG Emotion Classification System Based on One-Dimension Convolutional Neural Networks and Virtual Reality. 194-202 - Atushi Toyama, Kenshiro Mitsugi, Keita Matsuo, Leonard Barolli:
Implementation of a Moving Omnidirectional Access Point Robot and a Position Detecting System. 203-212 - Sai Wu, Zhihui Wang, Zhe Li, Zheng WeiJun, Weiping Shao, Baojuan Ma, Shunyu Yao, Ying Wang:
Uplink Resource Allocation Based on Short Block-Length Regime in Heterogeneous Cellular Networks for Smart Grid. 213-224 - Hyunhee Park:
Multiuser Channel Access with RTS-CTS Algorithm for Li-Fi Communications. 225-233 - Youngho An, Junyoung Park, Insu Oh, Myoungsu Kim, Kangbin Yim:
Design and Implementation of a Novel Testbed for Automotive Security Analysis. 234-243 - Zheng Zhang, Baojiang Cui, Chen Chen:
Reinforcement Learning-Based Fuzzing Technology. 244-253 - Min Yao, Baojiang Cui, Chen Chen:
Research on IoT Device Vulnerability Mining Technology Based on Static Preprocessing and Coloring Analysis. 254-263 - Dapeng Li, Shaodong Zhong, Zhizhang Song, Yijia Guo:
Computer-Aided English Education in China: An Online Automatic Essay Scoring System. 264-278 - Yuanwei Hou, Xiaoxiao Chen, Yongle Hao, Zhiwei Shi, Shiyu Yang:
Survey of Cyberspace Resources Scanning and Analyzing. 279-291 - Yijia Guo, Yuanwei Hou, Yongle Hao, Wenjue Xu:
Modeling and Analysis of Cyberspace Threat Sources Based on Vulnerabilities. 292-303 - Chen Chen, Weikong Qi, Wenting Jiang, Peng Sun:
A Dynamic Instrumentation Technology for IoT Devices. 304-312 - Yiyue Sun:
Theoretical Research and Practical Exploration on the Teaching Reform of Higher Mathematics. 313-323 - Chunming Zhang, Yiyue Sun, Xiaofeng Zhang:
Research on Experimental Teaching Reform of Electronic Technology Course. 324-333 - Xiang Ma, Xuhui Fan, Wei Li, Jiangtao Li, Qiong Li:
The Exploration and Research of Blended Teaching Mode Based on "Internet+" Big Data Cloud Platform. 334-343 - Xuhui Fan, Wei Li, Zhimin Wang, Yiyue Sun, Lili Su:
The Analysis of Higher Mathematics Teaching Strategy Based on the Innovative Teaching Mode. 344-353 - Qingchao Zhu, Yue Wang, Xiao-ou Song, Hongmei Huang:
Design of Gradient Push Algorithm in Time-Varying Directed Graph. 354-363 - Liming Zheng, Yi Zhao:
Generalized Snell's Law and Its Verification by Metasurface. 364-372 - Yuyue Wang, Chen Chen, Baojiang Cui:
A Targeted Fuzzing Technique Based on Neural Networks and Particle Swarm Optimization. 373-383 - Pengfei Xiong, Baojiang Cui, Zishuai Cheng:
Anomaly Network Traffic Detection Based on Deep Transfer Learning. 384-393 - Qiutong Lin, Bihua Zhuo, Lili Jiao, Li Liao, Jiangtao Guo:
Distributed Facial Feature Clustering Algorithm Based on Spatiotemporal Locality. 394-403 - Shian-Shyong Tseng, Shih-Nung Chen, Tsung-Yu Yang:
Developing an AR-Based Ubiquitous Learning System for a Smart Campus. 404-414 - Anthony Y. H. Liao, Shun-Pin Huang:
The Development and Evaluation of a Smart E-Learning Platform for Programming Instruction. 415-425 - Yue Wang, Qingchao Zhu, Xiao-ou Song, Hongmei Huang, Qiu Yang:
Research on Logistics Distribution Model of E-commerce Based on Improved Ant Colony Algorithm. 426-435 - Dohyeon Bak, Mintae Kim, Jonghoon Lim, Raeseung Jang, Wonyoung Jang, Sun-Young Lee:
Logical Network Separation and Update Inducing Techniques of Non-updated Vaccine Host by Creating Flow Rule in SDN. 436-446 - Won-Bin Kim, Im-Yeong Lee, Kangbin Yim:
Group Delegated ID-Based Proxy Re-encryption for PHR. 447-456 - Eunseon Jeong, Junyoung Park, Insu Oh, Myoungsu Kim, Kangbin Yim:
Analysis on Account Hijacking and Remote Dos Vulnerability in the CODESYS-Based PLC Runtime. 457-467 - Seongmin Park, Bomin Choi, Youngkwon Park, Dowon Kim, Eunseon Jeong, Kangbin Yim:
Vestiges of Past Generation: Threats to 5G Core Network. 468-480 - Kuei-Yuan Wang, Ying-Li Lin, Chien-Kuo Han, Tsung-Chih Hung:
Feasibility Study of Introducing Daily Rental Suites Business Model into Long-Term Care Institutions. 481-489 - Shyh-Weir Tzang, Chun-Ping Chang, Chih-Hsing Hung, Yung-Shun Tsai:
Black-Litterman Model and Momentum Strategy: Evidence of Taiwan Top 50 ETF. 490-497 - Chun-Ping Chang, Munkhnaran Duurenjargal, Zolzaya Batjargal, Shyh-Weir Tzang:
Investment Timing and External Effects. 498-503 - Chun-Ping Chang, Yung-Shun Tsai, Shyh-Weir Tzang, Zolzaya Batjargal:
The Choice Between Foreign Direct Investment and Export with Industry Competition and Marginal Cost. 504-509 - Yung-Shun Tsai, Shyh-Weir Tzang, Chun-Ping Chang:
Information Asymmetry, Market Liquidity and Abnormal Returns. 510-518 - Mei-Hua Huang, Chia-Hui Hsieh, Perng-Fei Huang, Chiung-Yen Chen:
Examining the Impacts of Strategic Alliance - Examples of the Taiwan Semiconductor Industry. 519-528 - Ying-Li Lin, Kuei-Yuan Wang, Li-Lu Hsu:
The Relationship Between Long-Term Care Issues and Disability Insurance. 529-539 - Chiung-Yen Chen, Mei-Hua Huang, Kuan-Ling Li, Ho-Yun Chao, Ke-Jie Shen, Szu-Han Yu:
Is Enforcing the Production and Filing of Corporate Social Responsibility Reports Conducive to Improving Corporate Performance? 540-551 - Ya-Lan Chan, Sue-Ming Hsu, Mei-Hua Liao:
An Inventory Model for Perishable Items Under Upstream and Downstream Trade Credit. 552-560 - Ya-Lan Chan, Sue-Ming Hsu, Neo Koe Hsin, Mei-Hua Liao:
The Social Performance of University Social Responsibility Elderly Project: The Perspective of Social Return on Investment. 561-572 - Mei-Hua Liao, Wei-Li Kuo, Ya-Lan Chan:
Investment Concentration and Home Bias. 573-578 - Mei-Hua Liao, Chieh-Lin He, Ruirui Cui, Ya-Lan Chan:
Investor Sentiment and Governance Mechanisms. 579-585 - Yiqi Sun, Baojiang Cui, Chen Chen, Yifei Wang:
A Static Instrumentation Method for IoT Firmware ELF Binary Emulation Patching. 586-596 - Tianhan Gao, Lei Zhao:
Pseudonym Schemes Based on Location Privacy Protection in VANETs: A Survey. 597-605 - Xiao-Feng Zhang:
Application of Blockchain Technology in Data Management of University Scientific Research. 606-613 - Xiaochen Wang, Baojiang Cui, Xinda Xu, Qian Ma:
Research on Vulnerability Site Location and Vulnerability Similarity Technology. 614-623 - Nobuyuki Teraura, Isao Echizen, Keiichi Iwamura:
Implementation of Digital Signature on QR Symbol by Area Division Using Rhombic Sub-cells. 624-638
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.