|  |  |  |  | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|      |  |  |  | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| 
 
 NexTech 2011 UBICOMM 2011 / SEMAPRO 2011 / ADVCOMP 2011 /AP2PS 2011 / EMERGING 2011 / PECES 2011 CONFERENCE LOCATION: HOTEL MERCURE 
 Mercure Lisboa 
 Sunday, November 20 
 Monday, November 21 
 Tuesday, November 22 
 Wednesday, November 23 
 Thursday, November 24 
 Friday, November 25 
 
 DETAILED PROGRAM 
 SPECIAL EU SESSION Session Chair: Jorge Pereira CONET: Testbed Federation CONET: Testbed Federation SmartSantander: The SmartSantander Urban        Deployment: The Service-Research Duality WISEBED 
 PECES 2011, The Third International Workshop on Pervasive Computing in Embedded Systems PECES 1 Welcome and Introduction to PECES Smart Spaces Applications building blocks Tools for the development of Cooperative          Smart Spaces PECES 2 How to create a smart space using PECES          development tools (tutorial) PECES Application          Demonstrations PECES 3 CONET Project Presentation PLANET Project Presentation AGILE Project Presentation Passive versus Active Measurement:          the role of          smart sensors ADVCOMP 2011, The Fifth International Conference on Advanced Engineering Computing and Applications in Sciences ADVCOMP 1: Computing applications in science Computer Simulation of Steady State Emission and Absorption Spectra for   Molecular Ring Hybrid Walking Point Location Algorithm Virtual Environment in Civil Engineering: Construction and Maintenance of   Buildings An Electrical Circuits e-Tutor based on Symbolic and Qualitative   Analysis ADVCOMP 2: Computational geometry Adaptive Free-form Deformation for the Modification of CAD/CAM   Data On Root Classification in Kinetic Data Structures Advanced Space Filtering for the Construction of 3D Additively Weighted   Voronoi Diagram A Novel Approach for Detection of Copy-Move Forgery ADVCOMP 3: Advances in computation methods Concurrent Differential Evolution for Uncertain Optimization   Problems Energy-aware MPSoC with Space-sharing for Real-time   Applications Image Restoration by Revised Bayesian-Based Iterative Method Automatic Error Detection in Gaussian Processes Regression Modeling for   Production Scheduling Scalable Resource Provisioning in the Cloud Using Business   Metrics ADVCOMP 4: Complex computing in application domains e-Reverse Logistics for Remanufacture-to-Order: An Online Auction Based and   Multi-Agent System Supported Solution e-RL: The Internet of Things Supported Reverse Logistics for   Remanufacture-to-Order Particle Swarm Optimization for Nonlinear Model Predictive   Control Extending Microsoft Project for Real-World Job-Shop Scheduling ADVCOMP 5: Advances in computing theories An Analysis of MOSIX Load Balancing Capabilities Characterizing Energy Efficiency in I/O System for Scientific   Applications Supervised Hybrid SOM-NG Algorithm Building Virtual Private Clouds with Network-aware Cloud AP2PS 2011, The Third International Conference on Advances in P2P Systems AP2PS 1: Architectures and protocols I SGR-Tree: a Skip Graph based R-Tree for multi-dimensional data indexing in   Peer-to-Peer systems Virtual Landmarking for Locality Aware Peer IDs Leveraging Social and Content-based Recommendation in P2P Systems Web Service and Business Process Execution on Peer-to-Peer   Environments AP2PS 2: Architectures and protocols II Symmetric Push-Sum Protocol for Decentralised Aggregation A Data Aggregation System using Mobile Agents on Integrated Sensor   Networks Modular P2P-Based Approach for RDF Data Storage and Retrieval AP2PS 3: Applications Formal Analysis and Verification of Peer-to-Peer Node Behaviour Video Quality Assurance for SVC in Peer-to-Peer Streaming Pair-wise similarity criteria for flows identification in P2P/non-P2P traffic   classification An Empirical Study of MPI over PC Clusters AP2PS 4: Security, trust and reputation Coalitions and Incentives for Content Distribution over a Secure Peer-to-Peer   Middleware On the Performance of OpenDPI in Identifying P2P Truncated Flows Applying Certificate-Based Routing to a Kademlia-Based Distributed Hash   Table New Heuristics for Node and Flow Detection in eDonkey-based   Services 
 EMERGING 2011, The Third International Conference on Emerging Network Intelligence EMERGING 1: Applications and services Model-Based Distributed On-line Safety Monitoring Distributed Service Discovery Architecture: A Bottom-Up Approach with   Application Oriented Networking A Holistic Configuration Management Methodology for Enterprise Application Test   Environments (POSTER) The Interoperability Challenge for Autonomic Computing EMERGING 2: Wireless An Alamouti Coding Scheme for Relay-Based Cooperative Communication   Systems Low Complexity Long PN Code Acquisition Scheme for Spread Spectrum   Systems Robust Integer Frequency Offset Estimation Scheme Based on Differentially   Combined Correlator Outputs for DVB-T Systems Investigating the Robustness of Detection vis-`a-vis the Detector Threshold   in WSN with Fading MAC and Differing Sensor SNRs – Optimal Sensor Gains vs.   Uniform Sensor Gains A New Telesupervision System Integrated in an Intelligent Networked Operating   Room EMERGING 3: Optimization Multi-Objective Optimization for Virtual Machine Migration on LANs for   Opportunistic Grid Infrastructures Restoring CSCF by Leveraging Feature of Retransmission Mechanism in Session   Initiation Protocol Mobility Aware Routing for Multihomed Wireless Networks Under Interference   Constraints Priority-based Packet Scheduling in Internet Protocol   Television EMERGING 4: Evolution of telecommunications network architectures Optical CDMA Using Dual Encoding with Optical Power A Comparison Study on Data Vortex Packet Switched Networks with Redundant   Buffers and with Inter-cylinder Paths Multicasting over OBS WDM Networks Performance Study of Interconnected Metro Ring Networks EMERGING 5: Security A MAC Layer Covert Channel in 802.11 Networks Design Time Reliability Predictions for Supporting Runtime Security Measuring   and Adaptation Incident Detection for Cloud Environments EMERGING 6: Networking and service differentiation Multipath Routing for Survivability of Complex Networks Under Cascading   Failures Association Control for Throughput Maximization and Energy Efficiency for   Wireless LANs Multipath Routing Management using Neural Networks-Based Traffic   Prediction Blocking Performance of Multi-Rate OCDMA Passive Optical Networks A Multimedia Capture System for Wildlife Studies 
 SEMAPRO 2011, The Fifth International Conference on Advances in Semantic Processing SEMAPRO 1: Ontology fundamentals for semantic processing Qualifying Audiovisual Searching Results with Ontologies and Semantic   Algorithms Analyzing the Ontology Approaches and the Formation of Open Ontology Model: A   Step for Organisational Ontology Employment An Approach for Indexation, Classification and Retrieval of Knowledge Sources   in Collaborative Environments A Fuzzy Logic Semantic Mapping Approach for Fuzzy Geospatial   Ontologies SEMAPRO 2: Semantic technologies Semantic Annotation Semantically: Using a Shareable Extraction Ontology and a   Reasoner Toward the Automatic Generation of a Semantic VRML Model from Unorganized 3D   Point Clouds Light-weight Ontology Versioning with Multi-temporal RDF Schema Local theme detection and annotation with keywords for narrow and wide domain   short text collections SEMAPRO 3: Semantic content searching Ontology Management Model for Effective Query Execution of Hierarchical   Information (POSTER) Ontology based Spreading Activation for NLP related Scenarios xhRank: Ranking Entities for Semantic Web Searching Query Expansion for Peculiar Images by Web-extracted Hyponyms SEMAPRO 4: Domain-oriented semantic applications Towards an Ontology for Enterprise Knowledge Management SIGA3D: A Semantic BIM Extension to Represent Urban   Environnement Semantic Processing in IT Management A Multi-Layer Approach to the Derivation of Schema Components of Ontologies   from German Tex SEMAPRO 5: Semantic applications/platforms/tools A Linked Dataverse Knows Better: Boosting Recommendation Quality Using   Semantic Knowledge SPARQL Query Processing Using Bobox Framework An ontology based framework for enriching event log data An Experiment on Semantic Emotional Evaluation of Chats 
 UBICOMM 2011, The Fifth International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies UBICOMM 1: Ubiquitous networks Locating Zigbee Devices in a Cluster-Tree Wireless Sensor Network: an   ESD-based Integrated Solution An Adaptative Broadcast Scheme for VANET Applications in a High Density   Context ZeDDS -- Fault-Tolerant Data Management in Wireless Sensor Networks with   Mobile Users Learning Enhanced Environment Perception for Cooperative Power   Control UBICOMM 2: Ubiquitous software and security Study on secure mobile communication based on the hardware security   module Personalized Security in Mobile Environments Using Software   Policies MergeIA: A Service for Dynamic Merging of Interfering Adaptations in   Ubiquitous System Dependability of Aggregated Objects, a pervasive integrity checking   architecture UBICOMM 3: Information Ubiquity An Extension of RankBoost for semi-supervised Learning of Ranking   Functions A DHT-based Scalable and Fault-tolerant Cloud Information   Service A 3D Simulation Framework for Safe Ambient-Assisted Home Care UBICOMM 4: Ubiquitous devices and operative systems Voice Activated Interactive Ambient Information Display An Analysis of Android Smartphones as a Platform for Augmented Reality   Games Context-aware Multimedia Distribution to User Groups Where's My Pixel? Multi-view Reconstruction of Smart LED Displays UBICOMM 5: Ubiquitous mobile services and protocols I A TCP Service Migration Protocol for Single User Multiple   Devices Increasing Usage Intention of Mobile Information Services via Mobile   Tagging A Smart Control System Solution Based on Semantic Web and uID UBICOMM 6: Ubiquitous mobile services and protocols II Mobile IS Success in Personnel Marketing: A Consumer-based Analysis of Quality   and Perceived Value (POSTER) Babel Multi-hop Routing for TinyOS Low-power Devices OLFServ: An Opportunistic and Location-Aware Forwarding Protocol for Service   Delivery in Disconnected MANETs UBICOMM 7: Ubiquitous devices and operative systems Transforming Basic Robotic Platforms into Easily Deployable and Web Remotely   Controllable Robots Performance Evaluation of Distributed Applications via Kahn Process Networks   and ABSOLUT The Interaction Analyzer: A Tool for Debugging Ubiquitous Computing   Applications Real-time Diagnosis of Ambient Environments Using a Modeling of Physical   Effects Combined with Temporal Logic UBICOMM 8: Web services Significance of Semantic Web in Facilitating HCI in Mobile and Ubiquitous   Learning Fault Tolerant Execution of Transactional CompositeWeb Services: An   Approach Dynamic negotiation layer for secure Semantic Service Oriented   Architectures Data and Computation Interoperability in Internet Services (POSTER) UBICOMM 9: Collaborative ubiquitous systems Fusing Camera and Wi-Fi Sensors for Opportunistic Localization Cooperation in Ad Hoc Network Security Services - Classification and   Survey Collaborative Knowledge Construction Using Concept Maps for Cross-cultural   Communication Performance Evaluation of Wireless IP Telephony (W-IPT) over Wi-Fi   Networks UBICOMM 10: Users, applications, and business models I Towards a Runtime Evolutionary Model of User Interface Adaptation in a   Ubiquitous Environment Capturing Mobile Devices Interactions Minimizing the External   Influence Ubiquitous Computing Market and Companies in Finland A New Model for context aware applications analysis and design Social Network-Based Course Material Transformations For A Personalized And   Shared Ubiquitous E-Learning Experience Propensity to Use Smartphone Applications UBICOMM 11: Users, applications, and business models II Online Friend Recommendation through Personality Matching and Collaborative   Filtering UbiPOL: A Platform for Context-aware Mobile Device Applications in Policy   Making Healthcare Tomorrow: Toward Self-adaptive, Ubiquitous and Personalized   Services Economic Aspects of Intelligent Network Selection: A Game-Theoretic   Approach On an Information Architecture for Mobile Applications UBICOMM 12: Wireless Technology I Communication system with SISO channel decoding using bit   stuffing External Interference-Aware Distributed Channel Assignment in Wireless Mesh   Networks A Fast Bandwidth Request and Grant Method for IEEE 802.16 OFDMA/TDD   Systems UBICOMM 13: Wireless technology II An Approach to Enhance the Timeliness of Wireless   Communications Opportunistic spectrum sharing scheme for secondary WiFi-like devices in TV   white spaces Interference Control Technology for Heterogeneous Networks UBICOMM 14: Mobility Mobile Learning (mLearning) Based on Cloud Computing: mLearning as a Service   (mLaaS) Focus and Exploration in Contextual Relevance Assistive Mobile Software for Public Transportation Mobility in a Personalized and Flexible Video-based Transmedia   Environment |  | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|  | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|  | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|  | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|  |  | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|  | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|  | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|  |  | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|  |  | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Copyright (c) 2006-2011, IARIA