![]() |
![]() |
![]() |
![]() |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
![]() ![]() ![]() |
![]() |
![]() |
![]() |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
NexComm 2016
Sunday, February 21
Monday, February 22
Tuesday, February 23
Wednesday, February 24
Thursday, February 25
Friday, February 26 Recommended tourist objectives to be visited on your own: Lisbon
DETAILED PRGRAM
ALLDATA 2016, The Second International Conference on Big Data, Small Data, Linked Data and Open Data (includes KESA 2016) ALLDATA 1: Big data I AScale: Simple and Fast ETL+Q Scaling for Small and Big Data Informed Consent and Privacy of De-Identified Information and Estimated Data: Lessons from Iceland and the United States in an Era of Computational Genomics Social Sentiment Indices Powered by X-Scores Mayo / Alice – The Supreme Court’s Requirement Statement as to Semiotics in Substantive Patent Law (“SPL”) & Emerging Technology Claimed Inventions (“ET CI”s) [PRESENTATION] ALLDATA 2: Big data II Stream Mining Revised Data Quality Centric Application Framework for Big Data Combining “Small Data” from Surveys and “Big Data” from Online Experiments at Pinterest Unsupervised Aircraft Trajectories Clustering: a Minimum Entropy Approach ALLDATA 3: Linked data I Modelling Support for a Linked Data Approach to Tool Interoperability Reasoning with Place Information on the Linked Data Web Graph-based Data Integration in EUDAT Data Infrastructure IPR Issues in Data Sharing via Linkage of Platforms and Apps ALLDATA 4: Linked data II Modelling the Cost of Open Data Link Detection Based on Named Entity Keywords in Turkish News Corpus KESA 1: Semantic retrieval and annotation Using Domain Ontologies for Classification and Semantic Interpretation of Documents Extraction of Business Information on the web to Supply a Geolocated Search Service A Semantic Annotation Model for Syntactic Parsing in Ontology Learning Task Semantic Annotation to Support Decision Making KESA 2: Methods in data mining and knowledge management An Ontology-based Method for Discovering Specific Concepts from Texts via Knowledge Completion Analyzing the Retirement Satisfaction Predictors among Men and Women Using a Multi-Layer Feed Forward Neural Network and Decision Trees Group Method of Data Handling: How Does it Measure Up? A Novel Event-based Method for Abducting Evolutional Motivation of Empirical Engineering Knowledge
COCORA 2016, The Sixth International Conference on Advances in Cognitive Radio COCORA 1: Mechanisms and protocols Game based Cognitive Radio Bandwidth Allocation Scheme Exploring the Impact of Node Cooperation Level on Routing in Cognitive Radio Networks Optimal Action for Cognitive Radio User under Constrained Energy and Data Traffic Uncertainty Multi-Antenna Energy Detector Under Unknown Primary User Traffic COCORA 2: Applications, measurement and management Underlay Cognitive Radio Wireless Networks using Repetition Coding and Spread Spectrum Analyzing the Effect of Spectrum Mobility on Mobile IPv6 in Cognitive Radio Networks LTE and WLAN Interference Suppression in CR Applications Citizens Broadband Radio Service Spectrum Sharing Framework - A Path to New Business Opportunity for Mobile Network Operators?
CTRQ 2016, The Ninth International Conference on Communication Theory, Reliability, and Quality of Service CTRQ 1: Communication theory, reliability, and Quality of Service Cloudcasting: A New Architecture for Cloud Centric Networks Performance Bounds for Regular LDPC Codes for Asymmetric Channels Over the Top Content Streaming Adaptive System- Implementation and Validation Improvement of Sequential Tests in IEC-61123 Reliability Testing ̶̶ Compliance Test Plans for Success Ratio [POSTER]
ICDT 2016, The Eleventh International Conference on Digital Telecommunications ICDT 1: Digital communications Tracking Sound Source Localization for a Home Robot Application Underwater Acoustic Physical Layer Emulator to Evaluate Digital Communications QoS Control Method for W-LAN Ad Hoc Network with Automatic Contention Window Adjustment Enhanced Indoor Positioning Method based on IEEE 802.11 RSSI Considering DOP in Building Environments A Novel Tap Selection Design for Filters in Unequal-Passbands Scheme
ICN 2016, The Fifteenth International Conference on Networks (includes SOFTNETWORKING 2016) ICN 1: Performance evaluation, tools, simulation Toward a Framework for VM Organisation based on Multi-Objectives Influence of the Channel Model in the Optimum Switching Points in an Adaptive Modulation System Towards a Method Integrating Virtual Switch Performance into Data Centre Design Experimental Analysis on Performance Anomaly for Download Data Transfer at IEEE 802.11n Wireless LAN C2LP: Modelling Load Propagation and Evaluation through the Cloud Components ICN 2: Communications security, reliability, availability Chain-of-trust Packet Marking Towards Privacy in Identity Management Dynamic Federations A Packet-Interleaving Scheme for Reliability Resilience under Burst Errors in Wireless Sensor Networks A Way of Eliminating Errors When Using Bloom Filters for Routing in Computer Networks ICN 3: Software defined networks and network functions virtualization openwincon: Open Source Wireless-Wired Network Controller Function Oriented Network Architecture for Realization of Autonomic Networks uLoBal: Enabling In-Network Load Balancing for Arbitrary Internet Services on SDN ICN 4: Internet of Things, cellular cognitive networks Smart Factory or Smart Car? The Concept of IoT Usability A Study on Device Management for IoT Services with Uncoordinated Device Operating History Performance Evaluation of the Opportunistic Spectrum Access in a Cognitive Radio Network with Imperfect Sensing Throughput Analysis in Cognitive Radio Networks Using Slotted Aloha Protocol with Imperfect Sensing SOFTNETWORKING 1: Reliability, resiliency and fault management in SDN and NFV Reliablity, Resiliency and Fault Management in Network Function Virtualization A STRIDE-based Security Architecture for Software-Defined Networking Multi-criteria based Optimization of Placement for Software Defined Networking Controllers and Forwarding Nodes Controller Placement Problem to Enhance Performance in Multi-domain SDN Networks SOFTNETWORKING 2: SDN applications and use cases Performance Comparison of SDN Solutions for Switching Dedicated Long-Haul Connections A Channel Utilization Method for Flow Admission Control with Maximum Network Capacity toward Loss-free Software Defined WMNs Implementation of Virtualization in Software Defined Networking (SDN) for Data Center Networks QoS Constrained Path Optimization Algorithm in NFV/SDN Environment Centralized Retransmission Management with SDN in Multihop Wireless Access Network
ICONS 2016, The Eleventh International Conference on Systems (includes EMBEDDED 2016) ICONS 1: Specialized systems Peer-Sourced Media Management for Augmented Reality Complexity-based Thinking in Systems Intelligence for Systems Resilience On the Riding Aids Recognition System for Horse Riding Simulators Safe Operation of Autonomous Machines Systems Analysis and Design for IoT based Greenhouse [POSTER] ICONS 2: Security and protection systems Can I Let You In? On Event-Centric Context-Aware Authorization Detection and Protection Against Unwanted Small UAVs Privacy Issue in Federated IDMS for Cloud Computing Identifying Requirements for a Social Media-based Emergency Management System ICONS 3 / EMBEDDED: Embedded and IT systems Performance Evaluation of the New TUAK Mobile Authentication Algorithm Proving Transformation Correctness of Refactorings for Discrete and Continuous Simulink Models Development of Real-time LCA System based on Automotive Radar The Anatomy of IT Service Incidents
MMEDIA 2016, The Eighth International Conferences on Advances in Multimedia MMEDIA 1: Fundamentals in multimedia Opinion Mining: A Comparison of Hybrid Approaches Automatic Labelling of Seeds Based on Saliency Detection and Edge Detection for Image Segmentation Supervised Approach for Indication of Contrast Enhancement in Application of Image Segmentation A Crowd-sourced Method for Real-time Detection and Localization of Unexpected Events MMEDIA 2: Multimedia applications Natural User Interaction Requires Good Affordance When Using a Head-Mounted Display Two Kinds of Audio Feature Selection Algorithms in Wavelet Domain A Fast Mode Determination Algorithm Using Spatiotemporal and Depth Information for High Efficiency Video Coding (HEVC) Low Complexity Multiple Candidate Motion Estimation Using Gray Coded Bit-plane Matching MMEDIA 3: Multimedia services and security Towards Audio Enrichment through Images: A User Evaluation on Image Relevance with Spoken Content Information Hiding in Real Object Images Captured with Video Camera Using Brightness-Modulated Light A Robust Image Watermark Algorithm for AD/DA Conversion Technique for Protecting Copyrights of Digital Data for 3-D Printing, and Its Application to Low Infill Density Objects
PESARO 2016, The Sixth International Conference on Performance, Safety and Robustness in Complex Systems and Applications PESARO 1: Performance, safety and robustness in complex systems and applications Evaluation of Selecting Cloud Services Approach for Data Storage using Secret Sharing Scheme Coping with System Hazards in Early Project Life Cycle; Identification and Prioritization Using XPath to Define Design Metrics
SOFTENG 2016, The Second International Conference on Advances and Trends in Software Engineering SOFTENG 1: Software designing and production Using the Event-B Formal Method for Disciplined Agile Delivery of Safety-critical Systems Unifying Modeling and Programming with ALF A Systematic Approach to Assist Designers in Security Pattern Integration Function Point Analysis with Model Driven Architecture Applied on Frameworks of Partial Code Generation Developing Software for Mobile Devices: How to Do That Best SOFTENG 2: Maintenance and life-cycle management Developing a Quality Report for Software Maintainability Assessment: An Exploratory Survey A Tree-Based Approach to Support Refactoring in Multi-Language Software Applications Collecting Product Usage Data Using a Transparent Logging Component The ICT Measurement System Definition, Components and a Maturity Evaluation Approach SOFTENG 3: Software requirements Distributed Asynchronous Focus Group Interviews Applying Privacy by Design in Software Engineering - An European Perspective End User in Charge - Social Framework for Open Source Development SOFTENG 4: Software reuse Sequence Data Mining Approach for Detecting Type-3 Clones A Multi-Agent System for Expertise Localization in Software Development Exploring the Scala Macro System for Compile Time Model-Based Generation of Statically Type-Safe REST Services Migration from Annotation-Based to Composition-Based Product Lines: Towards a Tool-Driven Process SOFTENG 5: Software testing and validation I Executable Testing based on an Agnostic-Platform Modeling Language Software Based Test Automation Approach Using Integrated Signal Simulation Mobile Medical Apps Data Security Overview SOFTENG 6: Software testing and validation II Reachability Games Revisited Dynamic Symbolic Execution with Interpolation Based Path Merging Verification of Architectural Constraints on Interaction Protocols Among Modules
SPACOMM 2016, The Eighth International Conference on Advances in Satellite and Space Communications (includes RESENS 2016) SPACOMM 1: Signal processing in telecommunications Industrial Wireless Sensor Networks (ISWN): Requirements and Solutions The Design of Sparse and Non-sparse FIR Filters Using Linear Complementarity Problem Approach Measurements of UWB Propagation and Transmission for Wireless Links in Spacecrafts Mode Selection Algorithm for Advanced TOA Trilateration Techniques SPACOMM 2: Satellite and space communications Playback Data Analysis Utility for a LEO Satellite Preliminary Design of S-AIS Payload for KOMPSAT-6 Performance Analysis of Operational Ka-band Link with Kepler Simulation of SAR Jammer Techniques and Hardware Implementation for Point Scatterer Modelling Fast and Efficient Satellite Imagery Fusion Using DT-CWT and WZP |
![]() |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
![]() |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
![]() |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
![]() |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
![]() |
![]() |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
![]() |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
![]() |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
![]() |
![]() |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
![]() |
![]() |
Copyright (c) 2006-2016, IARIA