{"title":"The Human Face of Mobile","authors":"H. Mousannif, Ismail Khalil","doi":"10.1007/978-3-642-55032-4_1","DOIUrl":"https://doi.org/10.1007/978-3-642-55032-4_1","url":null,"abstract":"","PeriodicalId":258952,"journal":{"name":"International Conference on Information and Communicatiaon Technology","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132269742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Predicting Size of Forest Fire Using Hybrid Model","authors":"G. F. Shidik, K. Mustofa","doi":"10.1007/978-3-642-55032-4_31","DOIUrl":"https://doi.org/10.1007/978-3-642-55032-4_31","url":null,"abstract":"","PeriodicalId":258952,"journal":{"name":"International Conference on Information and Communicatiaon Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116124074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Online Learning for Two Novel Latent Topic Models","authors":"A. Bakhtiari, N. Bouguila","doi":"10.1007/978-3-642-55032-4_28","DOIUrl":"https://doi.org/10.1007/978-3-642-55032-4_28","url":null,"abstract":"","PeriodicalId":258952,"journal":{"name":"International Conference on Information and Communicatiaon Technology","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122359694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modern Framework for Distributed Healthcare Data Analytics Based on Hadoop","authors":"P. Raja, E. Sivasankar","doi":"10.1007/978-3-642-55032-4_34","DOIUrl":"https://doi.org/10.1007/978-3-642-55032-4_34","url":null,"abstract":"","PeriodicalId":258952,"journal":{"name":"International Conference on Information and Communicatiaon Technology","volume":"47 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122808846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cryptanalysis of Unidirectional Proxy Re-Encryption Scheme","authors":"K. Singh, C. Rangan, A. Banerjee","doi":"10.1007/978-3-642-55032-4_58","DOIUrl":"https://doi.org/10.1007/978-3-642-55032-4_58","url":null,"abstract":"","PeriodicalId":258952,"journal":{"name":"International Conference on Information and Communicatiaon Technology","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132587542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nguyen Quang-Hung, L. Tan, Chiem Thach Phat, N. Thoai
{"title":"A GPU-Based Enhanced Genetic Algorithm for Power-Aware Task Scheduling Problem in HPC Cloud","authors":"Nguyen Quang-Hung, L. Tan, Chiem Thach Phat, N. Thoai","doi":"10.1007/978-3-642-55032-4_16","DOIUrl":"https://doi.org/10.1007/978-3-642-55032-4_16","url":null,"abstract":"","PeriodicalId":258952,"journal":{"name":"International Conference on Information and Communicatiaon Technology","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127272151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Steganalysis to Data Hiding of VQ Watermarking Upon Grouping Strategy","authors":"Ya-Ting Chang, Min-Hao Wu, Shiuh-Jeng Wang","doi":"10.1007/978-3-642-55032-4_65","DOIUrl":"https://doi.org/10.1007/978-3-642-55032-4_65","url":null,"abstract":"","PeriodicalId":258952,"journal":{"name":"International Conference on Information and Communicatiaon Technology","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129443503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Understanding eParticipation Services in Indonesian Local Government","authors":"F. Wahid, Øystein Sæbø","doi":"10.1007/978-3-642-55032-4_32","DOIUrl":"https://doi.org/10.1007/978-3-642-55032-4_32","url":null,"abstract":"","PeriodicalId":258952,"journal":{"name":"International Conference on Information and Communicatiaon Technology","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129649590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jun Ye, Wujun Zhang, Shu-Lin Wu, Yuan Gao, Jia-Tao Qiu
{"title":"Attribute-Based Fine-Grained Access Control with User Revocation","authors":"Jun Ye, Wujun Zhang, Shu-Lin Wu, Yuan Gao, Jia-Tao Qiu","doi":"10.1007/978-3-642-55032-4_60","DOIUrl":"https://doi.org/10.1007/978-3-642-55032-4_60","url":null,"abstract":"","PeriodicalId":258952,"journal":{"name":"International Conference on Information and Communicatiaon Technology","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115092820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bogdan Ksiezopolski, A. Wierzbicki, Damian Rusinek
{"title":"On the Modelling of the Computer Security Impact on the Reputation Systems","authors":"Bogdan Ksiezopolski, A. Wierzbicki, Damian Rusinek","doi":"10.1007/978-3-642-55032-4_54","DOIUrl":"https://doi.org/10.1007/978-3-642-55032-4_54","url":null,"abstract":"","PeriodicalId":258952,"journal":{"name":"International Conference on Information and Communicatiaon Technology","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115207246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}