09:00 - 10:15 - Building G Welcome Desk & Registration
10:15 - 10:30 - Plenary G Opening Session
10:30 - 12:00 - Plenary G Panel

"Communications in Smart Cities"

Chairs and Moderators:
Mohammad S. Obaidat, Monmouth University, NJ, United States
Pascal Lorenz, University of Haute Alsace, France

Helen Karatza, Aristotle University, Greece
Andrew Moore, University of Cambridge, United Kingdom
Anthony C. Boucouvalas,, University of Peloponnese, Greece
12:00 - 12:15 - Building K Coffee-Break
12:15 - 13:15 - Plenary G Keynote Lecture Integrating Retail and e-Commerce using Web Analytics and Intelligent Sensors Anthony C. Boucouvalas, University of Peloponnese, Greece
13:15 - 14:15 - Building RU Lunch
14:15 - 15:45 - Room G01 Parallel Session 1A - DCNET
  • 1: Towards a Real Application-aware Network Leo Caldarola, Amine Choukir, Davide Cuda, Marco Dondero, Domenico Ficara, Roberto Muccifora, Libor Polčák and Antonio Trifilo
  • 2: Speaking in Tongues - Practical Evaluation of TLS Cipher Suites Compatibility Manuel Koschuch, Taro Fruhwirth, Alexander Glaser, Silvie Schmidt and Matthias Hudler
14:15 - 15:45 - Room G02 Parallel Session 1A - ICE-B
  • 5: Social Networking Sites: An Exploration of the Effect of National Cultural Dimensions on Country Adoption Rates Rodney L. Stump and Wen Gong
  • 7: A Business Model Approach to Local mGovernment Applications - Mapping the Brussels Region’s Mobile App Initiatives Nils Walravens
  • 31: An Investigation of Customers’ Loyalty to Social Commerce Websites Hilal Alhulail, Martin Dick and Ahmad Abareshi
  • 39: Why and How People Use Location Sharing Services on Social Networking Platforms in China Shang Gao and Xuemei Zhang
14:15 - 15:45 - Room G03 Parallel Session 1A - SIGMAP
  • 12: Contrast-to-Noise based Metric of Denoising Algorithms for Liver Vein Segmentation A. Nikonorov, A. Kolsanov, M. Petrov, Y. Yuzifovich, E. Prilepin and K. Bychenkov
  • 17: A Time Delay based Approach to Enhance Lung Diseases Diagnostic Fatma Ayari, Ali Alouani and Mekki Ksouri
14:15 - 15:45 - Room G04 Parallel Session 1A - WINSYS
  • 2: A High Performance Class of DSTBC for HAPs Benigno Rodríguez and Juan Pablo González
  • 3: Implementation of Radio Tomographic Imaging based Localisation using a 6LoWPAN Wireless Sensor Network Vanessa Smallbon, Timothy Potie, Matthew D’Souza , Adam Postula and Montserrat Ros
  • 7: A Wireless Sensor Network System - For Monitoring Trees’ Health Related Parameters in a University Campus Luis Eduardo Pérez, Jorge Arturo Pardiñas-Mir, Omar Guerra, Javier de la Mora, Mauricio Pimienta, Nestor Hernández and Manuel de Atocha Lopez
  • 8: An Efficient Agent Lookup Approach in Middlewares for Mobile Agents Hiroaki Fukuda
  • 9: Making Software-defined Networks Semantic T. Cooklev
14:15 - 15:45 - Room G05 Parallel Session 1A - SECRYPT
  • 43: Formal Analysis of E-Cash Protocols Jannik Dreier, Ali Kassem and Pascal Lafourcade
  • 50: Algorithmic Information Theory for Obfuscation Security Rabih Mohsen and Alexandre Miranda Pinto
  • 14: Policy Anomaly Detection for Distributed IPv6 Firewalls Claas Lorenz and Bettina Schnor
  • 73: Cloud Resources Placement based on Functional and Non-functional Requirements Asma Guesmi, Patrice Clemente, Frederic Loulergue and Pascal Berthomé
14:15 - 15:45 - Room G06 Parallel Session 1B - SECRYPT
  • 35: Gateway Threshold Password-based Authenticated Key Exchange Secure against Undetectable On-line Dictionary Attack Yukou Kobayashi, Naoto Yanai, Kazuki Yoneyama, Takashi Nishide, Goichiro Hanaoka, Kwangjo Kim and Eiji Okamoto
  • 42: Evaluating the Comprehensive Complexity of Authorization-based Access Control Policies using Quantitative Metrics Malek Belhaouane, Joaquin Garcia-Alfaro and Hervé Debar
15:45 - 16:30 - Building K Coffee-Break
15:45 - 16:45 - Building K Posters Session 1
  • 5: Service Forwarding Label for Network Function Virtualization and Application-centric Traffic Steering Changcheng Huang and Jiafeng Zhu
  • 7: Indoor Localization of the Points of Interest using RO-SLAM Yamnia Rodríguez Esteves, Julio Barbancho Concejero and Antidio Viguria Jiménez
  • 8: Routing in Cognitive Wireless Mesh Networks - An Intelligent Framework Nadhir Ben Halima and Mohammad Ayoub Khan
  • 9: Surveillance Camera System Balancing Privacy Protection and Effective Surveillance Image Use Kent Kobayashi, Masaki Inamura, Kitahiro Kaneda, Keiichi Iwamura and Isao Echizen
  • 11: A Cloud Gaming System Design Insights Serban Ungureanu, Andrei Panu and Lenuta Alboaie
  • 12: Combining Physiological with Cognitive Measures of Online Users to Evaluate a Physicians’ Review Website Andreas Gregoriades and Olga Vozniuk
  • 26: Stakeholder Oriented Enterprise Architecture Modelling Malgorzata Pankowska
  • 40: GSM Model Construction from Enterprise Models Imen Jellali, Mounira Ben Abdallah, Nahla Zaaboub Haddar and Hanêne Ben-Abdallah
  • 8: A Framework for Incident Response in Industrial Control Systems Roman Schlegel, Ana Hristova and Sebastian Obermeier
  • 10: A Public-Key Cryptography Tool for Personal Use - A Real-world Implementation of ECC for Secure File Exchange Luigi Maria Bottasso
  • 47: Design and Performance Aspects of Information Security Prediction Markets for Risk Management Pankaj Pandey and Einar Arthur Snekkenes
  • 53: Battling Against DDoS in SIP - Is Machine Learning-based Detection an Effective Weapon? Z. Tsiatsikas, A. Fakis, D. Papamartzivanos, D. Geneiatakis, G. Kambourakis and C. Kolias
  • 81: Experimental Extraction of Shared Secret Key from Fluctuations of Multipath Channel at Moving a Mobile Transceiver in an Urban Environment Alexey D. Smolyakov, Amir I. Sulimov, Arkadiy V. Karpov and Aidar V. Galiev
  • 99: Performance Evaluation of Meteor Key Distribution Amir I. Sulimov and Arkadiy V. Karpov
  • 114: Adaptive SVDD-based Learning for False Alarm Reduction in Intrusion Detection Tayeb Kenaza, Abdenour Labed, Yacine Boulahia and Mohcen Sebehi
  • 117: Examining the Performance for Forensic Detection of Rare Videos Under Time Constraints Johan Garcia
  • 120: Towards Compliant Reference Architectures by Finding Analogies and Overlaps in Compliance Regulations Eduardo B. Fernandez and Dereje Yimam
  • 129: Practical and Secure Integrated PKE+PEKS with Keyword Privacy Francesco Buccafurri, Gianluca Lax, Rajeev Anand Sahu and Vishal Saraswat
  • 131: A Risk Awareness Approach for Monitoring the Compliance of RBAC-based Policies Faouzi Jaidi and Faten Labbene Ayachi
  • 6: Localization Method According to Collect Data from an Acoustic Wireless Sensor Network - Example of Homarus Gammarus in Natural Area Jean-Sébastien Gualtieri, Bastien Poggi , Paul-Antoine Bisgambiglia, Thierry Antoine-Santoni, Dominique Federici, Emmanuelle de Gentili and Antoine Aïello
  • 10: Minimising Energy Consumption in Wireless Sensor Network by Enhancement of LEACH Protocol Ahmadu Girgiri, Murtala Aminu Baba, Lawan Gana Ali and Mohammed Adamu
  • 12: Counting Credibility based Cooperative Spectrum Sensing Algorithm Lianlian Song, Li Wang and Shibing Zhang
16:45 - 17:45 - Plenary G Keynote Lecture Future SDN - Reconfiguration Heartland, Challenge and Revolution Andrew Moore, University of Cambridge, United Kingdom
17:45 - 18:15 - Building K Welcome Drink