09:30 - 10:00 - Building G Welcome Desk & Registration
10:00 - 11:30 - Room G02 Parallel Session 2A - ICE-B
  • 34: An Adaptive E-Advertising User Model: The AEADS Approach Alaa A. Qaffas and Alexandra I. Cristea
  • 3: Salt Seller - Realization of a Business Game Felix Kiechle, Corinna Uhr, Mario Schlereth, Yao Zhang, Leon O. Burkard, Andreas C. Sonnenbichler and Andreas Geyer-Schulz
10:00 - 11:30 - Room G05 Parallel Session 2A - SECRYPT
  • 70: A Uniform Modeling Pattern for Operating Systems Access Control Policies with an Application to SELinux Peter Amthor
  • 103: An OWL-based XACML Policy Framework Fabio Marfia, Mario Arrigoni Neri, Filippo Pellegrini and Marco Colombetti
  • 51: Modeling Authorization Policies for Web Services in Presence of Transitive Dependencies Worachet Uttha, Clara Bertolissi and Silvio Ranise
11:30 - 11:45 - Building K Coffee-Break
11:45 - 13:15 - Room G03 Parallel Session 3A - SIGMAP
  • 3: Compressed Domain ECG Biometric Identification using JPEG2000 Yi-Ting Wu, Hung-Tsai Wu and Wen-Whei Chang
  • 9: An Adaptive Reconstruction Algorithm for Image Block Compressed Sensing under Low Sampling Rate Cai Xu, Xie Zheng-Guang, Huang Hong-Wei and Jiang Xiao-Yan
  • 13: Traffic Signs Detection and Tracking using Modified Hough Transform Pavel Yakimov and Vladimir Fursov
11:45 - 13:15 - Room G04 Parallel Session 3A - OPTICS
  • 16: Time Synchronization in XG-PON Systems: An Error Analysis Panagiotis Sarigiannidis, Georgios Papadimitriou, Petros Nicopolitidis, Emmanouel Varvarigos and Malamati Louta
  • 14: Polarization Dependent Loss Emulator Built with Computer-driven Polarization Controllers and Single Mode Fibre Yangzi Liu, Peter Shepherd and Duncan Allsopp
11:45 - 13:15 - Room G05 Parallel Session 3A - SECRYPT
  • 106: New Results for Partial Key Exposure on RSA with Exponent Blinding Stelvio Cimato, Silvia Mella and Ruggero Susella
  • 20: Secure Physical Access Control with Strong Cryptographic Protection Jan Hajny, Petr Dzurenda and Lukas Malina
  • 36: Private Eyes: Secure Remote Biometric Authentication Ewa Syta, Michael J. Fischer, David Wolinsky, Abraham Silberschatz, Gina Gallegos-Garcia and Bryan Ford
  • 102: A Key-private Cryptosystem from the Quadratic Residuosity Marc Joye
13:15 - 14:30 - Building RU Lunch
14:30 - 15:45 - Plenary G European Project Space - Panel

"Future Generation of Information and Communication Technologies: Challenges and Perspectives"

EPS Chair:
Sofiane Hamrioui, USTHB University, Algeria; Laboratory of LARI, UMMTO Univesity (Algeria) and GRTC Research Groupe, UHA University, France; E-NGN Groupe (Africa and Middle East)

Panel Participants:
Jean-Jacques Bernardini, Alsace Innovation, France
Anthony C. Boucouvalas, University of Peloponnese, Greece
Ray Walshe, EIURA, Ireland
15:45 - 16:30 - Building K Coffee-Break
15:45 - 16:45 - Building K Posters Session 2
  • 21: SOA and EDA: A Comparative Study - Similarities, Differences and Conceptual Guidelines on their Usage Zaharah Allah Bukhsh, Marten van Sinderen and P. M. Singh
  • 27: Design and Implementation of a Workflow Oriented ERP System Bálint Molnár and Zsigmond Máriás
  • 29: SaaS Cloud Provider Management Framework Rima Grati, Khouloud Boukadi and Hanêne Ben-Abdallah
  • 38: IT-enabled Management of Sharing Logistic Trucks Ichiro Satoh
  • 7: Anonymity and Fair-Exchange in e-Commerce Protocol for Physical Products Delivery Cătălin V. Bîrjoveanu
  • 31: MEDA: A Machine Emulation Detection Algorithm Valerio Selis and Alan Marshall
  • 34: Monitoring Software Vulnerabilities through Social Networks Analysis Slim Trabelsi, Henrik Plate, Amine Abida, M. Marouane Ben Aoun, Anis Zouaoui, Chedy Missaoui, Sofien Gharbi and Alaeddine Ayari
  • 41: Revealing Encrypted WebRTC Traffic via Machine Learning Tools Mario Di Mauro and Maurizio Longo
  • 46: DPA Resistance Enhancement through a Self-healing PLL based Power Mask Fleura Hajilou, Ehsan Mazidi and Shahab Ardalan
  • 74: Distributed Intrusion Detection System based on Anticipation and Prediction Approach Hajar Benmoussa, Anas Abou El Kalam and Abdallah Ait Ouahman
  • 75: Towards Secure Gigabit Passive Optical Networks - Signal Propagation based Key Establishment Lukas Malina, Petr Munster, Jan Hajny and Tomas Horvath
  • 92: A Formally Verified Access Control Mechanism for Information Centric Networks Mahdi Aiash and Jonathan Loo
  • 115: Counter based Detection and Mitigation of Signalling Attacks Mihajlo Pavloski, Gökçe Görbil and Erol Gelenbe
  • 14: Computational Correction for Imaging through Single Fresnel Lenses Artem Nikonorov, Sergey Bibikov, Maksim Petrov, Yuriy Yuzifovich and Vladimir Fursov
  • 15: Objective Assessment of Asthenia using Energy and Low-to-High Spectral Ratio Farideh Jalalinajafabadi, Chaitaniya Gadepalli, Mohsen Ghasempour, Frances Ascott, Mikel Luján, Jarrod Homer and Barry Cheetham
  • 19: Real-time Super Resolution Algorithm for Security Cameras Seiichi Gohshi
  • 20: Mosaic-based Privacy-protection with Reversible Watermarking Yuichi Kusama, Hyunho Kang and Keiichi Iwamura
  • 21: Similarity-based Image Retrieval for Revealing Forgery of Handwritten Corpora Ilaria Bartolini
  • 13: Measurement of the Distributed Strain and Temperature by Modeling the Brillouin Spectrum Mohamed Bouyahi, Amira Zrelli, Houria Rezig and Tahar Ezzedine
  • 15: Impact of Optical Preamplifier Beat Noise on Inter-Satellite Coherent Optical Communication System Xiangnan Liu, Chengyong Xiang, Liang Zhang and Yingfei Li
16:45 - 17:45 - Room G02 Parallel Session 4A - ICE-B
  • 37: Hyred - HYbrid Job REcommenDation System Bruno Coelho, Fernando Costa and Gil M. Gonçalves
  • 16: Content Control Scheme to Realize Right Succession and Edit Control Katsuma Koga, Masaki Inamura, Kitahiro Kaneda and Keiichi Iwamura
16:45 - 17:45 - Room G03 Parallel Session 4A - SIGMAP
  • 1: Gramophone Noise Reconstruction - A Comparative Study of Interpolation Algorithms for Noise Reduction Christoph F. Stallmann and Andries P. Engelbrecht
  • 8: Beat Discovery from Dimensionality Reduced Perspective Streams of Electrocardiogram Signal Data Avi Bleiweiss
  • 18: Foveated Model based on the Action Potential of Ganglion Cells to Improve Objective Image Quality Metrics Sergio A. C. Bezerra and Alexandre Pohl
16:45 - 17:45 - Room G04 Parallel Session 4A - WINSYS
  • 11: Performance and Comparative Analysis of Design Schemes for Prioritised Data in Multi-hop Wireless Mesh Backbone Networks Sajid M. Sheikh, Riaan Wolhuter and G. J. van Rooyen
  • 13: Probability-based Controlled Flooding in Opportunistic Networks Sanjay K. Dhurandher, Satya Jyoti Borah, Mohammad S. Obaidat, Deepak Kr. Sharma, Sahil Gupta and Bikash Baruah
16:45 - 17:45 - Room G05 Parallel Session 4A - SECRYPT
  • 33: Mobile Malware Detection using Op-code Frequency Histograms Gerardo Canfora, Francesco Mercaldo and Corrado Aaron Visaggio
  • 107: On the Instability of Sensor Orientation in Gait Verification on Mobile Phone Thang Hoang, Deokjai Choi and Thuc Nguyen
17:45 - 18:45 - Plenary G Keynote Lecture Cloud Computing - State-of-the-Art and Future Research Trends Eleni Karatza, Aristotle University of Thessaloniki, Greece
19:00 Social Event (19:00 - 23:30)