|  |  |  |  | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|      |  |  |  | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| 
 
 AICT 2014 / ICIW 2014 / ICIMP 2014 /  SMART 2014 /  Conference Venue Location 
 Sunday, July 20 
 Monday, July 21 
 Tuesday, July 22 
 Wednesday, July 23 
 Thursday, July 24 
 Friday, July 25  Recommended  tourist objectives to be visited on your own:  Tourist Attractions  in Paris The  Moulin Rouge Paris  for free Taking  a trip outside of Paris 
 DETAILED PROGRAM 
 AICT2014, The Tenth Advanced International Conference on Telecommunications AICT 1: Signal processing, protocols and standardization I Biomedical Applications of Intensity and Curvature Measures: The Case of   Magnetic Resonance Imaging of the Human Brain A New Blind Equalization Algorithm for M-PSK Constellations A Single-Threshold Model for Handoff Traffic Analysis in Cellular CDMA   Networks Design and Implementation of Simulation Engine for Very High-Rate   Communication over Power Grid AICT 2: Signal processing, protocols and standardization II Compression of Polysomnographic Signals Using the Discrete Cosine Transform   and Dead-zone Optimal Quantization Standards for Cooperative Intelligent Transportation Systems: a Proof of   Concept Extending a 3GPP Prepaid Protocol to Improve Credit Pre-reservation   Mechanism Simulator of Multi-service Switching Networks with Multi-service   Sources AICT 3: Management, operation and control networks Trust-based Incentive Cooperative Relay Routing Algorithm for   Wireless Proposal for a NETCONF Interface for Virtual Networks in Open vSwitch   Environments A new Unsupervised User Profiling Approach for Detecting Toll Fraud in VoIP   Networks Towards a Carrier Grade SDN Controller: Integrating OpenFlow With Telecom   Services AICT 4: Ad Hoc, autonomic and sensor networks A Bluetooth Network Dynamic Graph Energy-free Security in Wireless Sensor Networks PRISMA: A Publish-Subscribe and Resource-Oriented Middleware for Wireless   Sensor Networks A New Performance Efficient Trend of Delivery Mechanism Applied to DTN   Routing Protocols in VANETs AICT 5: Wireless technologies A Novel Chaos Based ASK-OOK Communication System Hybrid QoS Based Routing for IEEE 802.16j Mesh Infrastructure A Proposal for Path Loss Prediction in Urban Environments using Support   Vector Regression Applicable Cost Modeling of LTE-Advanced and IEEE 802.11ac based   Heterogeneous Wireless Access Networks AICT 6: Cognitive radio Interference Modelling and Analysis of Random FDMA schemes in Ultra   Narrowband Networks Fuzzy-based Interference Level Estimation in Cognitive Radio   Networks Performance of the LAD Spectrum Sensing Method in Measured Noise at Frequency   Ranges between 10 MHz and 39 GHz Ordered Sequential-Superposition Cooperative Spectrum Sensing for Cognitive   Radio Networks AICT 7: Future applications and services Automatic Floor Map Construction for Indoor Localization Evolving Future Internet Clean-Slate Entity Title Architecture with   Quality-Oriented Control Plane Extensions UML-based Modeling Entity Title Architecture (ETArch) Protocols Multicast Traffic Aggregation through Entity Title Model Design and Development of an Android Accounting Application Using Web   Services and Quality of Experience for Mobile Computing 
 ICIW 2014, The Ninth International Conference on Internet and Web Applications and Services ICIW 1: Virtual environments and Web applications for   eLearning Ebanshu: An Interactivity-aware Blended Virtual Learning   Environment A Study of the Effects of Scaffolded Assessment on the Learning Effectiveness   in Network Peer Assessment Activities Customer Satisfaction through E-Learning Software Product Line Collaboration and Community Building in an Online Teacher Community of   Learning: A Social Network Analysis ICIW 2: Web services-based systems and applications Context-Aware Leisure Service: A Case-Study based on a SOA 2.0   Infrastructure Asynchronous Learning Management System - The Case of Federal University of   Technology (UTFPR) Rated Tags as a Service: A Cloud-based Social Commerce Service Services to Support Use and Development of Speech Input for Multilingual   Multimodal Applications for Mobile Scenarios ICIW 3: Internet and Web-based applications and services I Investigating Aspects of Visual Clustering in the Organization of Personal   Document Collections Towards a Mobile Application Performance Benchmark Redundancy-Driven Vertical Domain Explorer Comparing the Twitter Usage of Online Retailers in Germany and in the   UK ICIW 4: Internet and Web-based applications and services II A Run-time Life-cycle for Interactive Public Display   Applications Driving the Learning of a Web Aapplication Framework by Using Separation of   Concerns A Method to Achieve Automation in the Development of Web-Based Software   Projects Search Query Share for Enhancing Communication Among Small   Community ICIW 5: Service computing Psychology for Predicting Internet Behavior Patterns A Structured Approach to Architecting Fault Tolerant Services Scalable Web Content Understanding Framework ICIW 6: Online communications, collaborative systems, and social   networks A Tool to Assist the Social Search on Facebook Webpage Resource Protection via Obfuscation and Auto Expiry Message Spreading Model over Online Social Network with Multiple Channels and   Multiple Groups ICIW 7: Enterprise cloud computing, P2P Systems A New Semantic Role-based Access Control Model for Cloud   Computing Enhancing the Energy Efficiency in Enterprise Clouds Using Compute and   Network Power Management Functions Return the Data to the Owner: A Browser-Based Peer-to-Peer   Network A Comparative Study of Replication Schemes for Structured P2P   Networks ICIMP 2014, The Ninth International Conference on Internet Monitoring and Protection ICIMP 1: Internet monitoring and protection Classification of TLS Applications Trust and Risk Relationship Analysis on a Workflow Basis: A Use   Case A Security Policy for Cloud Providers: The Software-as-a-Service   Model Survey on Tor and I2P Autonomous Alternative Complex with Remote Data Collection   (PRESENTATION) An Automated Security Framework for Malware Detection and Infection   Notification (POSTER) 
 SMART 2014, The Third International Conference on Smart Systems, Devices and Technologies SMART 1: Smart spaces and environments Smart Grid Services Framework for Building Management Systems A Fast WiFi Direct Device Discovery with Caching Discovery Schedules for   Seamless N-Screen Services Towards Tactile Alarms Systems for Increased Awareness in Smart   Environments Stability Improvement Solution of the Smart Power Grid by an Analysis of   Voltage Variation in Intelligent Buildings Connectivity Requirements for the Industrial IoT (PRESENTATION) SMART 2: Smart mobility and tracking systems Hand Posture Control of a Robotic Wheelchair Using a Leap Motion Sensor and   Block Sparse Representation based Classification An RFID-based Smart Cage for Animal Behavior Analysis A Novel Authentication Framework Based on Biometric and Radio Fingerprinting   for the IoT in eHealth Smart Mobility for Reducing School Gate Congestion in Europe: Innovating   Smartphone Walking School Buses for Children of Primary Age SMART 3: Digital cities Beyond the Smart City: Reflecting Human Values in the Urban   Environment Online Geodatabases as a Source of Data for a Smart City World Model   Building Smart City as an Integrated Enterprise: A Business Process Centric Framework   Addressing Challenges in Systems Integration From Smart Metering to Smart City Infrastructure SMART 4: Smart multimedia and smart energy Effective Context-based BIM Style Description (BSD) of Query   Results A Combination of MCLT Peak-Pair Based Audio Fingerprinting and Spatial Audio   Reproduction Energy Monitoring in Smart Buildings Using Wireless Sensor   Networks Smart-Grid Control Comparing Low Power Listening Techniques with Wake up Receiver   Technology IMMM 2014, The Fourth International Conference on Advances in Information Mining and Management IMMM 1: Mining mechanisms and methods Semantic Tools for Forensics: Towards Finding Evidence in Short   Messages Class Stength Prediction Method for Associative Classification A Concept-based Feature Extraction Approach A Multi-Factor HMM-Based Forecasting Model for Fuzzy Time   Series IMMM 2: Mining tools and applications I The Group Strategic Knowledge Mining Model for Telecom Power   Infrastructure What Grammar Tells About Gender and Age of Authors Semantic Mining and Analysis of Heterogeneous Data for Novel Intelligence   Insights A Building Management System Using RGB-D Camera   (PRESENTATION) IMMM 3: Information mining and management Wireless Transmission of Stereo Images and its Disparity Levels Improving Digital Forensics Through Data Mining Towards Custom-Designed Professional Training Contents and Curriculums   through Educational Process Mining A Distribution for Service Model IMMM 4: Mining tools and applications II Compressed SIFT Feature Based Matching Privacy friendly Mobile Intelligent Advertising Framework Data Leakage Detection Using Information Retrieval Methods Document Retrieval in Big Data IMMM 5: Mining from specific sources Bag-of-Features Tagging Approach for a Better Recommendation with Social Big   Data Trace Analysis Exploration Using Semantic Web Tools Use Case: You Tube   Network Traffic Applications of Data Mining Techniques to Predict Metabolic Syndrome in   Taiwanese Children and Adolescents (POSTER) IMMM 6: Pervasive information retrieval A SQL-based Context Query Language for Context-aware Systems A Mobile Learning Framework on Cloud Computing Platforms Link Analysis among Sightseeing Spots based on Geo-Image Analysis --Towards   Majority-based Route Recommendation in Sightseeing-- INFOCOMP 2014, The Fourth International Conference on Advanced Communications and Computation INFOCOMP 1: Advanced applications I Internationalisation and Localisation of a Wireless Response System for the   Arabic Language Semi-Analytic Modelling of Stratified Flows. Theory and   Applications Minimizing Total Tardiness in a Hybrid Flexible Flowshop with Sequence   Dependent Setup Times An Evaluation of Smoothing Filters for Gas Sensor Signal   Cleaning Using Mobile Serious Games for Learning Programming INFOCOMP 2: Large scale and fast computation CUDA Accelerated Entropy Constrained Vector Quantization and Multiple   K-Means Scheduling periodic Tasks on Multiple Periodic Resources P2P4GS: A Specification for Services Management in Peer-to-Peer   Grids Benchmarking the Problem of Optimal Autonomous Systems Aggregation on   Different Computer Architectures INFOCOMP 3: Networks/systems communications The Designing and Implementation of a Smart Home System with Wireless   Sensor/Actuator and Smartphone Outage Probability of Full-duplex Systems in Multi-spectrum   Environments Testing of feasibility of QKD system deployment in commercial metropolitan   fiber networks Decision Making and Taking in Changing Ecologies Considering Network   Law Flow Adjustment – a Flexible Routing Strategy for Demand Protection Against   Multiple Partial Link Failures INFOCOMP 4: Networks/systems measurement, control and   management Agent Supported QoS Management Ontology-based Management of a Network for Distributed Control   System Fairness Improvement of Multiple-Bottleneck Flow in Data Center   Networks Multi-layer Power Saving System Model Including Virtualization Server and   Many-core Server Study of the Complex Alternative Energy to power Communication Devices and   Computer Equipment in the Arctic (PRESENTATION) INFOCOMP 5: Biometry, security, access technologies, algorithms, and   applications I Trans-Organizational Role-Based Access Control in Android Scalable, Self-configurable Eduroam by using Distributed Hash   Table Integrated Learning Environment for Smart Grid Security INFOCOMP 6: Biometry, security, access technologies, algorithms, and   applications II A SAML Metadata Broker for Dynamic Federations and   Inter-Federations Intrusions Detection System Based on Ubiquitous Network Nodes Fast Person Identification Using JPEG2000 Compressed ECG Data INFOCOMP 7: Advanced applications II Teaching Networking: A Hands-on Approach that Relies on Emulation-based   Projects Computing Optimised Result Matrices for the Processing of Objects from   Knowledge Resources Research on Classification of Fiber Intrusion Signal Based on Supported   Vector Machines A Constraint-Based Graphical Approach to Modelling Construction Systems: An   alternative to discrete-event simulation MOBILITY 2014, The Fourth International Conference on Mobile Services, Resources, and Users MOBILITY 1: Chanllenges A Design of Mobile Trusted Module for Application Dedicated Cryptographic   Keys Predicting Destinations with Smartphone Log using Trajectory-based   HMMs TEDS: A Trusted Entropy and Dempster Shafer Mechanism for Routing in Wireless   Mesh Networks A Non-GPS Low-power Context-aware System using Modular Bayesian Networks'   submitted to MOBILITY 2014 Mobility and Boards of Directors: Towards a Mobile Governance Paradigm   (PRESENTATION) MOBILITY 2: Mobile architectures, mechanisms, protocols Smart TV – Smartphone Cooperation Model on Digital Signage Environments: An   Implementation Approach A Flow Aggregation Scheme for Seamless QoS Mobility Support in Wireless Mesh   Networks Self-organizing Mobile Medium Ad hoc Network COmpAsS: A Context-Aware, User-Oriented Radio Access Technology Selection   Mechanism in Heterogeneous Wireless Networks MOBILITY 3: Mobile devices and services Use of Bluetooth Technology on Mobile Phones for Optimal Traffic Signal   Timing Empowering Mobile Users: Applications in Mobile Data   Collection Car Ride Classification for Drive Context Recognition What am I Doing Now? Pythia: A Mobile Service for Spatial Behavior   Analysis Design and Evaluation of a Mobile Payment System for Public Transport: the   MobiPag STCP Prototype MOBILITY 4: Mobile networking and management Expected Penetration Rate of 5G Mobile Users by 2020: A Case   Study Design and Implementation of Co-Presence Transportation for Physical   Objects The Connectivity Control Framework: Enabling Session Continuity in   Multi-Domain Environments Performance of Novel Target Detection in Radar Network Systems with a 3D   Vehicle Model TV Content Delivery to PC, Tablet, Smartphone - From the Accessibility Vision   into Market Reality |  | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|  | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|  | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|  | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|  |  | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|  | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|  | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|  |  | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|  |  | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Copyright (c) 2006-2014, IARIA