09:30 - 09:45 - Room M101 Opening Session
09:45 - 11:00 - Room M101 Panel

"ICT Technology for Smart Cities and Homes”

Chair and Moderator:
Mohammad S. Obaidat
Fellow of IEEE, Fellow of SCS, Past President of the Society for Modeling &Simulation International (SCS), Editor-in-Chief, Wiley International Journal of Communication Systems, and Professor in Monmouth University, NJ, United States

Pierangela Samarati, Universita' degli Studi di Milano, Italy
Pascal Lorenz, University of Haute Alsace, France
Laurence T. Yang, Huazhong University of Science and Technology, China and St Francis Xavier University, Canada
Donal O'Mahony, Trinity College Dublin, Ireland
Marten van Sinderen, University of Twente, The Netherlands
11:00 - 12:00 - Sólin Posters Session 1
  • 6: A Novel Technique for TCP Based Congestion Control Martin Hruby, Michal Olsovsky and Margareta Kotocova
  • 6: Accommodating Individual Differences in Web based Instruction (WBI) and Implementation Rana A. Alhajri, Steve Counsell and XiaoHui Lui
  • 21: A Proposed Framework for Supporting Behaviour Change by Translating Personalised Activities into Measurable Benefits Maurice Mulvenna, Adrian McCann, Maurice O'Kane, Barry Henderson, Karen Kirby and Deirdre McCay
  • 31: Applying Bayesian Parameter Estimation to A/B Tests in e-Business Applications - Examining the Impact of Green Marketing Signals in Sponsored Search Advertising Tobias Blask
  • 34: A Comparative Prediction Study of Housing Price Index based on Web Search Data - Evidence from Beijing and Lanzhou in China Bo Yong Wang, Xin Yang, Bian Wang and Benfu Lv
  • 53: Qsense - Learning Semantic Web Concepts by Querying DBpedia Andrei Panu, Sabin C. Buraga and Lenuta Alboaie
  • 10: Non-random Properties of Compression and Hash Functions using Linear Cryptanalysis Daniel Santana de Freitas and Jorge Nakahara Jr
  • 22: On the Connection between t-Closeness and Differential Privacy for Data Releases Josep Domingo-Ferrer
  • 26: AVON - A Fast Hash Function for Intel SIMD Architectures Matt Henricksen and Shinsaku Kiyomoto
  • 35: Development of Device Identity using WiFi Layer 2 Management Frames for Combating Rogue APs Jonny Milliken, Valerio Selis, Kian Meng Yap and Alan Marshall
  • 64: Abusing Social Networks with Abuse Reports - A Coalition Attack for Social Networks Slim Trabelsi and Hana Bouafif
  • 69: Diagnostic Category Leakage in Helper Data Schemes for Biometric Authentication Joep de Groot, Boris Skoric, Niels de Vreede and Jean-Paul Linnartz
  • 75: Practical and Exposure-resilient Hierarchical ID-based Authenticated Key Exchange without Random Oracles Kazuki Yoneyama
  • 141: Keystroke Authentication with a Capacitive Display using Different Mobile Devices Matthias Trojahn, Christian Schadewald and Frank Ortmeier
  • 8: Simplified Computation of l2-Sensitivity for 1-D and a Class of 2-D State-Space Digital Filters Considering 0 and +-1 Elements Yoichi Hinamoto and Akimitsu Doi
  • 12: A Parity-based Error Control Method for Distributed Compressive Video Sensing Shou-ning Chen, Bao-yu Zheng and Liang Zhou
  • 13: REENACT: Augmented Reality and Collective Role Playing to Enhance the Pedagogy of Historical Events - An EXPERIMEDIA Experiment Martin Lopez-Nores, Yolanda Blanco-Fernandez, José J. Pazos-arias, Alberto Gil-solla, Jorge Garcia-Duque and Manuel Ramos-Cabrer
  • 23: A TV Commercial Retrieval System based on Audio Features Jose E. Borras, Jorge Igual, Carlos Fernandez-Llatas and Vicente Traver
  • 34: Markerless Augmented Reality based on Local Binary Pattern Youssef Hbali, Mohamed Sadgal and Abdelaziz EL Fazziki
11:15 Coffee-Break (11:15 - 11:30)
12:00 - 13:00 - Room M101 A Data-as-a-Service Framework for IoT Big Data Keynote Speaker: Laurence T. Yang
13:00 Lunch (13:00 - 14:15)
14:15 - 16:15 - Room M209 Parallel Session 1A - ICE-B
  • 11: Determinants of Use Intensity in Social Networking Sites - A Cross-cultural Study of Korea and USA Cheol Park, Jongkun Jun and Thaemin Lee
  • 13: Strategic use of Twitter in Local Government - A Northern Ireland Study Tiago Picão, Fiona McMahon, Valerie Purchase and Maurice Mulvenna
  • 18: The Trust in Online Discussion Forums and How they Influence Patients' Intention to Adopt Medical Tourism Services Peter Ractham, Charlie Chen and Makoto Nakayama
14:15 - 16:15 - Room M201 Parallel Session 1A - SECRYPT
  • 23: A Security-enhanced Design Methodology for Embedded Systems Alberto Ferrante, Jelena Milosevic and Marija Janjušević
  • 58: HoneydV6: A Low-interaction IPv6 Honeypot Sven Schindler, Bettina Schnor, Simon Kiertscher, Thomas Scheffler and Eldad Zack
  • 102: An Efficient Approach to Assessing the Risk of Zero-Day Vulnerabilities Massimiliano Albanese, Sushil Jajodia, Anoop Singhal and Lingyu Wang
  • 131: Adaptive Resource Management for Balancing Availability and Performance in Cloud Computing Ravi Jhawar and Vincenzo Piuri
14:15 - 16:15 - Room V201 Parallel Session 1B - SECRYPT
  • 13: Efficient Simultaneous Privately and Publicly Verifiable Robust Provable Data Possession from Elliptic Curves Christian Hanser and Daniel Slamanig
  • 77: Secure Second Price Auctions with a Rational Auctioneer Boaz Catane and Amir Herzberg
  • 78: iOS Encryption Systems - Deploying iOS Devices in Security-critical Environments Peter Teufl, Thomas Zefferer, Christof Stromberger and Christoph Hechenblaikner
  • 117: Secure Computation of Hidden Markov Models Mehrdad Aliasgari and Marina Blanton
14:15 - 16:15 - Room M208 Parallel Session 1A - SIGMAP
  • 33: Multi-modal Bike Sensing for Automatic Geo-annotation - Geo-annotation of Road/Terrain Type by Participatory Bike-sensing Steven Verstockt, Viktor Slavkovikj, Pieterjan De Potter, Jürgen Slowack and Rik Van de Walle
  • 43: SignalBIT - A Web-based Platform for Real-time Biosignal Bisualization and Recording Ana Priscila Alves, Hugo Plácido da Silva, André Lourenço and Ana Fred
14:15 - 16:15 - Room M102 Parallel Session 1A - WINSYS
  • 10: Efficient Coupled PHY and MAC use of Physical Bursts by ARQ-Enabled Connections in IEEE 802.16e/WiMAX Networks Oran Sharon, Amit Liron and Yaron Alpert
  • 35: Energy Aware Routing in IEEE 802.11sWireless Mesh Networks Maria Zogkou, Aggeliki Sgora and Dimitrios D. Vergados
  • 36: On Providing Fair Performance in Adaptive Wireless Push Systems P. Nicopolitidis
16:15 - 17:15 - Sólin Posters Session 2
  • 17: Towards Algorithm Agility for Wireless Sensor Networks - Comparison of the Portability of Selected Hash Functions - Position Paper Manuel Koschuch, Matthias Hudler and Zsolt Saffer
  • 8: e-Business Application to Students""'' Blended Learning in Higher Education Jelena Zaščerinska and Andreas Ahrens
  • 26: RFID based Data Mining for E-logistics Yi Wang, Quan Yu and Kesheng Wang
  • 30: The e-Visibility Maturity Model - Assessing Stages of Visibility Evolution for e-Business Olga Levina and Iris Vilnai-Yavetz
  • 36: EFilter: An Efficient Filter for Supporting Twig Query Patterns in XML Streams Wen-Chiao Hsu, Chia-Fang Li and I-En Liao
  • 37: A Study on Construction of Inflation Index based on Web Search Data Chen Hang, Sun Yi, Yang Xin and Lv Benfu
  • 44: The Consideration of Organizational, Human and Corporate Cultural Factors in the Implementation of Business Process Management Projects - Social Factors to Prevent Failure of BPM Projects Rebecca Bulander and Matthias Dietel
  • 10: Optical Parametric Gain of Tellutire/Phosphate Highly Nonlinear Optical Fiber Edmund Samuel, Tong Hoang Tuan, Koji Asano, Takenobu Suzuki and Yasutake Ohishi
  • 63: Are BiometricWeb Services a Reality? - A Best Practice Analysis for Telebiometric Deployment in Open Networks Dustin van der Haar and Basie von Solms
  • 80: Identity Security in Biometric Systems based on Keystroking Lucjan Hanzlik and Wojciech Wodo
  • 87: Efficient Characteristic 3 Galois Field Operations for Elliptic Curve Cryptographic Applications Vinay S. Iyengar
  • 92: Related-key Impossible Differential Cryptanalysis of Full-round HIGHT Saeed Rostami, Sadegh Bamohabbat Chafjiri and Seyed Amir Hossein Tabatabaei
  • 103: Survey and Benchmark of Lightweight Block Ciphers for Wireless Sensor Networks Mickaël Cazorla, Kevin Marquet and Marine Minier
  • 111: Privacy-enhanced Perceptual Hashing of Audio Data Heiko Knospe
  • 137: Efficient Group Signatures with Verifier-local Revocation Employing a Natural Expiration Lukas Malina, Jan Hajny and Zdenek Martinasek
  • 162: Database Anomalous Activities - Detection and Quantification Elisa Costante, Sokratis Vavilis, Sandro Etalle, Jerry den Hartog, Milan Petkovic and Nicola Zannone
  • 16: Length of Phonemes in a Context of their Positions in Polish Sentences Magdalena Igras, Bartosz Ziółko and Mariusz Ziółko
  • 32: Fully Automatic Saliency-based Subjects Extraction in Digital Images Luca Greco, Marco La Cascia and Francesco Lo Cascio
  • 47: Design Approaches for Mode Decision in HEVC Encoder - Exploiting Parallelism at CTB Level Ramakrishna Adireddy and Suyash Ugare
  • 16: Tool Support for Building Graph Construction Paul Heiniz, Karl-Heinz Krempels, Christian Samsel, Kai Schwarz and Gökay Bodur
16:30 Coffee-Break (16:30 - 16:45)
17:15 - 18:15 - Room M101 Instantaneous Frequency Analysis Keynote Speaker: David Naccache
18:15 Welcome Drink (18:15 - 18:45)