|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
SoftNet2011 DataSys 2011 Conference Hotel
Sunday, October 23
Monday, October 24
Tuesday, October 25
Wednesday, October 26
Thursday, October 27
Friday, October 28
Saturday, October 29
Special Symposium discussion on “Why should one trust your model” Moderator Panelists: 1. Keynote Speech Teaching Biologists Computational Thinking Using Infectious Disease Modeling and Simulation by Diglio Simoni, RTI International, USA 2. Panel: Pedagogy of Modeling and Simulation: A Scaffolded Approach? Moderator Panelists:
DETAILED PROGRAM
INFOCOMP 2011, The First International Conference on Advanced Communications and Computation INFOCOMP 1: Advanced Applications I Implementation of Integrated Systems and Resources for Information and Computing Open Access Business Model and Financial Issues Study of the Growth of a New Social Network Platform The Simple Genetic Algorithm Performance: A Comparative Study on the Operators Combination INFOCOMP 2: Advanced Applications II Rotation-oriented Collaborative Air Traffic Management Warfare Simulation and Technology Forecasting in Support of Military Decision Making A Flexible Suite of Software Tools for Medical Image Analysis Digital identity-based multisignature scheme implementation INFOCOMP 3: Networks/systems communications Connected Dominating Set Problem and its Application to Wireless Sensor Networks Score Manager Discovery in EigenTrust Using Virtual Magnetic Fields On-the-Fly Routing and Traffic Self-Aggregation Towards Metro-Access Integration Implementation of Data Distribution Service Listeners on Top of FlexRay Driver INFOCOMP 4: Networks/systems measurement, control and management I Security and Performance Analysis of IPsec-based VPNs in RSMAD Using DRBL to Deploy MPICH2 and CUDA on Green Computing Inventory-Based Empty Container Repositioning in a Multi-Port System Sample Average Approximation for Stochastic Empty Container Repositioning INFOCOMP 5: Networks/systems measurement, control and management II Analysis of Video Streaming Performance in Vehicular Networks Vehicle Speed Estimation Using Wireless Sensor Network Testbed architecture for generic, energy-aware evaluations and optimisations Mptrace: Characterizing Physical Memory Usage for Chip Multiprocessors INFOCOMP 6: Large scale and fast computation I Augmented Reality for Urban Simulation Visualization Parallel Computing of EFG Method on DRBL Cluster LZW versus Sliding Window Compression on a Distributed System: Robustness and Communication Self-Organizing the Selection of Migratable Processes on Cluster-of-Clusters Environments INFOCOMP 7: Large scale and fast computation II Min-Sum-Min Message-Passing for Quadratic Optimization Parallel Computing the Longest Common Subsequence (LCS) on GPUs: Efficiency and Language Suitability MPI-based Solution for Efficient Data Access in Java HPC Real-Time Processing and Archiving Strategies INFOCOMP 8: Large scale and fast computing III High performance cosmological simulations on a grid of supercomputers Mantle Convection in a 2D Spherical Shell Constructing Parallel Programs Based on Rule Generators Impact of user concurrency in commonly used OGC map server implementations
IMMM 2011, The First International Conference on Advances in Information Mining and Management IMMM 1: Information mining and management I Mining Epidemiological Data Sources in H1N1 Pandemic Using Probabilistic Graphical Models Comment-guided Learning: Bridging the Knowledge Gap between Expert Assessor and Feature Engineer Data Preparation in the MineCor KDD Framework Exploiting Background Information Networks to Enhance Bilingual Event Extraction Through Topic Modeling IMMM 2: Information mining and management II Mining Ice Hockey: Continuous Data Flow Analysis Knowledge Management System IMMPETUS (KMSI) - Connoisseur Optimising Parameters for ASKNet: A Large Scale Semantic Knowledge Network Creation System IMMM 3: Automated retrieval and mining Semi-Automated Semantic Annotation for Semantic Advertising Networks Mining Cross-document Relationships from Text Analyzing the Use of Word Graphs for Abstractive Text Summarization IMMM 4: Data management in special environments Improving Email Management A Redundant Bi-Dimensional Indexing Scheme for Three-Dimensional Trajectories Reasoning on High Performance Computing Resources Pervasive Ad hoc Location Sharing To Enhance Dynamic Group Tours IMMM 5: Mining from specific sources Automatic Drug Side Effect Discovery from Online Patient-Submitted Reviews: Focus on Statin Drugs FATS: A Framework for Annotation of Travel Blogs Based on Subjectivity The Migraine Radar - A Medical Study Analyzing Twitter Messages? Selecting Data Mining Model for Web Advertising in Virtual Communities IMMM 6: Mining mechanisms and methods Large-Scale Association Rule Discovery from Heterogeneous Databases with Missing Values using Genetic Network Programming. New Solution for Extracting Inductive Learning Rules and their Post-Analysis An Equivalence Class Based Clustering Algorithm for Categorical Data Classification of Time-Interval Sequential Temporal Patterns (POSTER) IMMM 7: Mining tools and applications Exploiting Student Intervention System Using Data Mining Supporting Global Design Through Data Mining and Localization ArmSquare: An Association Rule Miner Based on Multidimensional Numbered Information Spaces Review of Shape-based Similarity Algorithms and Design Retrieval Methods for Computer-aided Design and Manufacturing IMMM 8: Mining features Mining Information Retrieval Results Significant IR parameters Mining Literal Correlation Rules from Itemsets Designing Cost-sensitive Fuzzy Classification Systems Using Rule-weight
SOTICS 2011, The First International Conference on Social Eco-Informatics SOTICS 1: Social evaluation and metrics Mobile Applications for Ethical Consumption - Metrics and Frameworks Why Numbers, Invites and Visits are not Enough: Evaluating the User Experience in Social Eco-Systems Agricultural Knowledge Transfer Via Talking Planter Clothes that Coordinate Your Fashion Based on Previous Choices SOTICS 2: Social applications Discovering Dynamic Logical Blog Communities Based on Their Distinct Interest Profiles Restatement of Subjects of Design in Engineering as a Contribution to the Training of Engineers with a Sustainable Approach Automatic question generation to determine roles during a crisis Forging Trust and Privacy with User Modeling Frameworks: An Ontological Analysis Taking into account Tabbed Browsing in Predictive Web Usage Mining SOTICS 3: Challenges in social environments Brave New World? Political participation and new media Exploring Security Risks in Virtual Economies Study of Sociocultural Ontology Integrating Privacy During Requirements Capture for Ubiquitous Computing SOTICS 4: Mechanisms for social services Automatic tracking and control for web recommendation. New approaches for web recommendation Modeling Democratic Elections via Congestion Networks Using Conversational Agents To Help Teach Information Security Risk Analysis User Semantic Model for Hybrid Recommender Systems
MOBILITY 2011, The First International Conference on Mobile Services, Resources, and Users MOBILITY 1: Mobile devices and services I OghmaSip: Peer-to-Peer Multimedia for Mobile Devices An NFC-based Customer Loyalty System Amazon-on-Earth Library Navigator On-Demand Service Delivery for Mobile Networks MOBILITY 2: Mobile devices and services II Building the Bridge Towards an Open Electronic Wallet on NFC Smartphones Situation-based Energy Management System A Storyboard-based Mobile Application Authoring Method for End Users Influence Factors in Adopting the m-Commerce Mobile Services through Tagging Context and Touching Interaction MOBILITY 3: Mobile Internet of things Context as an IMS Service Challenges in Building a Mobile SpeechWeb Browser Motivation for Collective Action in the Smart Living Business Ecosystem MOBILITY 4: Challenges in mobile environments I Extending Friend-to-Friend Computing to Mobile Environments Use of Emerging Mobile Technologies in Portfolio Development A Dynamic Approach for User Privacy Management in Location-based Mobile Services Mobilizing Enterprise Applications for B2B and B2C: The Need for Hybrid Deployments (POSTER) MOBILITY 5: Mobile architectures, mechanisms, protocols I Performance Evaluation of Distributed Application Virtualization Services Using the UMTS Mobility Model A Framework for Data Roving in Ubiquitous Computing Infrastructure Formalisms for Use Cases in Ubiquitous Computing Development of a Context-Aware Information System for Baseball Service MOBILITY 6: Mobile prosumers and interfaces Data Center Workload Analysis in Multi-Source RSMAD’s Test Environment Usability Evaluation Using Eye Tracking for Iconographic Authentication on Mobile Devices Meeting the Challenge of Global Mobile Phone Usability Communication Needs of Japan and the United States: A Comparative Analysis of the Use of Mobile Information Services MOBILITY 7: Mobile architectures, mechanisms, protocols II Cloud Systems and Their Applications for Mobile Devices New Scheduler with Call Admission Control (CAC) for IEEE 802.16 Fixed with Delay Bound Guarantee A Hardware Architecture for MAP Decoding Based on Nibble Alignment Digital Signature Platform on Mobile Devices MOBILITY 8: Challenges in mobile environments II SMARTPOS: Accurate and Precise Indoor Positioning on Mobile Phones Balancing High-Load Scenarios with Next Cell Predictions and Mobility Pattern Recognition Real-time Cognitive-Capacity-Sensitive Multimodal Information Exchange for the Cockpit Environment Using Vision-Based Driver Assistance to Augment Vehicular Ad-Hoc Network Communication A study on the intention of utilization of health application on mobile services (POSTER)
ICSEA 2011, The Sixth International Conference on Software Engineering Advances ICSEA 1: Agile Software Techniques Software Product Line Agility An Agile Model-Driven Development Approach - A case study in a finance organization A Planning Poker Tool for Supporting Collaborative Estimation in Distributed Agile Development Scrum Maturity Model: Validation for IT organizations’ roadmap to develop software centered on the client role ICSEA 2: Advances in Software Testing I Usage of Robot Framework in Automation of Functional Test Regression A Test Purpose and Test Case Generation Approach for SOAP Web Ev-ADA: A Simulation-driven Evaluation Architecture for Advanced Driving-Assistance Systems On the Preliminary Adaptive Random Testing of Aspect-Oriented Programs ICSEA 3: Advances in Software Testing II Devising Mutant Operators for Dynamic Systems Models by Applying the HAZOP Study A Static Robustness Grid Using MISRA C2 Language Rules A Specifications-Based Mutation Engine for Testing Programs in C# ICSEA 4: Software Engineering Techniques, Metrics, and Formalisms I Component-based Software System Dependency Metrics based on Component Information Flow Measurements Module Interactions for Model-Driven Engineering of Complex Behaviour of Autonomous Robots Case Study for a Quality-Oriented Service Design Process Meta-Model for Global Software Development to Support Portability and Interoperability in Global Software Development ICSEA 5: Advanced Mechanisms for Software Development I A New Approach to Software Development Process with Formal Modeling of Behavior Based on Visualization Non-Functional Requirements for Business Processes in the Context of Service-Oriented Architectures A framework for adapting service-oriented applications based on functional/extra-functional requirements tradeoffs PSW: A Framework-based Tool Integration Solution for Global Collaborative Software Development Feature-Oriented Programming and Context-Oriented Programming: Comparing Paradigm Characteristics by Example Implementations ICSEA 6: Advanced Mechanisms for Software Development II Soft Constraints in Feature Models Feature Modeling of Software as a Service Domain to Support Application Architecture Design Adding Support for Hardware Devices to Component Models for Embedded Systems A Service Component Framework for Multi-User Scenario Management in Ubiquitous Environments ICSEA 7: Software Security, Privacy, Safeness I A Graph-Based Requirement Traceability Maintenance Model A Systematic Mapping Study on Patient Data Privacy and Security for Software System Development Impact on the inclusion of security in the UPnP protocol within the Smart Home OntoLog: Using Web Semantic and Ontology for Security Log Analysis ICSEA 8: Software Security, Privacy, Safeness II Intrusion Detection with Symbolic Model Verifier Security Quality Assurance on Web Applications On Generating Security Implementations from Models of Embedded Systems ICSEA 9: Specialized Software Advanced Applications Proposal for Ground Shipping High Volume of Data Parameter in Supersampling Unmanned Aircraft Through Radio Modem The Smart Persistence Layer UML-Based Modeling of Non-Functional Requirements in Telecommunication Systems A maintenance Approach of a BJI Index Configuration ICSEA 10: Software Performance Software Cache Eviction Policy based on Stochastic Approach Performance Simulation of a System's Parallelization Towards Executable Business Processes with the Problem Oriented Engineering Process Algebra Optimal Functionality and Domain Data Clustering based on Latent Dirichlet Allocation ICSEA 11: Engineering Techniques, Metrics, and Formalisms II Formal Parsing Analysis of Context-Free Grammar using Left Most Derivations Functional Complexity Measurement: Proposals and Evaluations Design Patterns for Model Transformations Component-oriented Software Development with UML ICSEA 12: Engineering Techniques, Metrics, and Formalisms III Metrics in Distributed Product Development Edola: A Domain Modeling and Verification Language for PLC Systems A Practical Method for the Reachability Analysis of Real-Time Systems Modelled as Timed Automata Reverse Engineering of Graphical User Interfaces ICSEA 13: Engineering Techniques, Metrics, and Formalisms IV Towards Design Method Based on Formalisms of Petri Nets, DEVS, and UML Invariant Preservation by Component Composition Using Semantical Interface Automata Method for CMMI-DEV Implementation in Distributed Teams Advanced Object Oriented Metrics for Process Measurement On the Creation of a Software Pattern Index Using Social Tagging (PRESENTATION) ICSEA 14: Engineering Techniques, Metrics, and Formalisms V Quality Issues in Global Software Development A Systematic Review of Self-adaptation in Service-oriented Architectures A Formal Specification of G-DTD:A Conceptual Model to Describe XML Documents Formal Specification of Software Design Metrics ICSEA 15: Open Source Software E-FOTO: Development of an Open-Source Educational Digital Photogrammetric Workstation Vitalizing Local ICT-industry by Acceleration of FLOSS-based Software Product Development: A Case Study of the ICT-industry in Okinawa Empirical Case Study of Measuring Productivity of Programming Language Ruby and Ruby on Rails ICSEA 16: Advanced Design Tools for Developing Software I Querying Source Code Using a Controlled Natural Language Towards Complementing User Stories Performance Evaluation of a Generic Deployment Infrastructure for Component- based S/W Engineering A Proof-based Approach for Verifying Composite Service Transactional Behavior ICSEA 17: Advanced Design Tools for Developing Software II Certification of MDA Tools: Vision and Application Automatic Generation of Graphical User Interfaces From VDM++ Specifications An Approach to Model, Configure and Apply QoS Attributes to Web Services Transformation of Composite Web Service for QoS Extension into ACME\Armani ICSEA 18: Advanced Design Tools for Developing Software III ATL Transformation of UML 2.0 for the Generation of SCA Model Towards the Development of Integrated Reuse Environments for UML Artifacts An Automated Translation of UML Class Diagrams into a Formal Specification to Detect Inconsistencies UML 2.0 Profile for Structural and Behavioral Specification of SCA Architectures ICSEA 19: Software Economics, Adoption, and Education I Process Improvement and Knowledge Sharing in Small Software Companies: A Case Study Choosing a Business Software Systems Development and Enhancement Project Variant on the basis of Benchmarking Data – Case Study Towards Functional and Constructional Perspectives on Business Process Patterns Virtual Laboratory as a Model For Measuring Understanding (PRESENTATION) ICSEA 20: Software Economics, Adoption, and Education II Practical Experiences with Software Factory Approaches in Enterprise Software Delivery A "Future-Proof" Postgraduate Software Engineering Programme: Maintainability Issues Using Software Engineering Principles to Develop a Web-Based Application ICSEA 21: Advances in Fundamentals for Software Development I How to Think about Customer Value in Requirements Engineering Migrating Functional Requirements in SSUCD Use Cases to a More Formal Representation KM-SORE: Knowledge Management for Service Oriented Requirements Engineering Brainstorming as a Route to Improving Software Processes ICSEA 22: Advances in Fundamentals for Software Development II Web-Based Focus Groups for Requirements Elicitation Mapping Architectural Concepts to SysML Profile for Product Line Architecture Modeling Exploring Architecture Design Alternatives for Global Software Product Line Engineering Towards CMMI-compliant MDD Software Processes ICSEA 23: Advances in Fundamentals for Software Development III From Boolean Relations to Control Software Empirical Evidence in Software Architecture: A Systematic Literature Review Protocol Agile Development of Interactive Software by means of User Objectives REfIS: A Stage-based Methodology for Eliciting Requirements ICSEA 24: Advances in Fundamentals for Software Development IV A Metamodel for Representing Safety LifeCycle Development Process On the Extensibility of Plug-ins Effective Task Allocation in Distributed Environments: A Traceability Perspective An Agile Method for Model-Driven Requirements Engineering ICSEA 25: Advances in Fundamentals for Software Development V Evidence in Requirements Engineering: A Systematic Literature Review Protocol Success Factors Leading to the Sustainability of Software Process Improvement Efforts Software Quality Assessment and Error/Defect Identification in the Italian Industry Preliminary Results from a State of the Practice Survey Revisiting the Requirements Communication Problem from a Knowledge Management Perspective
ICSNC 2011, The Sixth International Conference on Systems and Networks Communications ICSNC 1: Wireless Networks I Improving Spectral Efficiency of Spread Spectrum Systems Under Peak Load Network Conditions Uplink Power Control Based on an Evolutionary Algorithm with Associative Memory High Spectrum Efficiency Delay Tolerant Scheduling and Resource Allocation of Diverse Traffic in LTE Networks Self-Adaptive TCP Protocol Combined with Network Coding Scheme ICSNC 2: Multimedia Communications Systems I Content Management Systems using Quality Transition Mode in Video Content Utilization Services A Practical Implementation of Fountain Codes over WiMAX Networks with an Optimised Probabilistic Degree Distribution The Adaptive Content and Contrast-aware Technique for Visible Watermarking Mobile broadband everywhere : the satellite a solution for a rapid and large 3,9G deployment ICSNC 3: Sensor Networks I A New Classification of Backbone Formation Algorithms for Wireless Sensor Networks A Distributed Cluster-Based Localization Method for Wireless Sensor Networks Experiences in Ensemble-based Decision Systems for Wireless Sensor Networks Dust Monitoring Systems Evaluation of Adaptive Interference Cancellation in Chirp Spread Spectrum-based Communication Systems ICSNC 4: Radio-frequency Identification Systems The Relationship Analysis of RFID Adoption and Organizational Performance Providing QoS to Secondary Users Employing VoIP Applications in Cognitive Radio Networks Overcoming EPC Class 1 Gen 2 RFID limitations with p-persistent CSMA Incorporating Radio Frequency Identification into The Production Line for Work Flow Improvement ICSNC 5: Wireless Networks II Cross-Layer Analysis and Performance Evaluation of Cognitive Radio Networks Performance Analysis of Coordinated Base Stations in Multi-Cellular Network Using Multistream Transmission and Different Size Cells Design Framework for Heterogeneous Hardware and Software in Wireless Sensor Networks A Fair and Efficient Spectrum Assignment for WiFi/WiMAX Integrated Networks Research on Indoor Visible-Light Communications System with Carrier Interferometry OFDM ICSNC 6: Security Systems A Distributed Group Rekeying Scheme for Wireless Sensor Networks GEMOM Middleware Self-healing and Fault-tolerance: a Highway Tolling Case Study Enhancing DNS Security using Dynamic Firewalling with Network Sensors Failure Analysis and Threats Statistic to Assess Risk and Security Strategy in a Communication System Public key cryptoystems using real and complex numbers (PRESENTATION) ICSNC 7: Multimedia Communications Systems II An Approach to Estimate Regulatory Performance Scalable Embedded Architecture for High-speed Video Transmissions and Processing Using Coordinated Clients to Improve Live Media Contents Transmissions New Block-Relationships Based Stereo Image Watermarking Algorithm An Efficient Access Control Scheme for Multimedia Content Using Modified Hash Chain ICSNC 8: Sensor Networks II Energy Efficient Target Tracking in Wireless Sensor Networks with Limited Sensing Range Wireless Ad hoc and Sensor Network Underground with Sensor Data in Real-Time On Design of Mobile Agent Routing Algorithm for Information Gain Maximization in Wireless Sensor Networks Wireless Intelligent Sensor Network with Different Types of Sensors for Universal Use (POSTER) ICSNC 9: High Speed Networks Priority-based Time Slot Assignment Algorithm for Hierarchical Time Sliced Optical Burst Switched Networks Optimization of link capacity for telemedicine applications 20 Gb/s Absolute Polar Duty Cycle Division Multiplexing-Polarization Division Multiplexing (AP-DCDM-PolDM) Transmission System Cooperative Clustered Architecture and Resource Reservation for OBS Networks Performance Evaluation of the Nanosecond Resolution Timestamping Feature of the Enhanced Libpcap ICSNC 10: Vehicular Networks Remote Vehicle Diagnostics over the Internet using the DoIP Protocol CoHoN: A Fault-Tolerant Publish/Subscribe Tree-Based Middleware for Robots with Heterogeneous Communication Hardware A Framework for Assessing the Security of the Connected Car Infrastructure Performance Evaluation of Large-Scale Charge Spot Networks for Electric Mobility Services
CENTRIC 2011, The Fourth International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services CENTRIC 1: User-centric Supporting Mechanisms Methodolgy for Bridging the Brain and Body for Briliant Innovations Positive Psychology Centered Online Studies A Study on the Lost Seeking Devices and Systems for Dementia-Patients Service control system based on behavioral characteristics of user multitasking Business Context Information Manager: application to Information Retrieval CENTRIC 2: Centric Views Privacy and Distributed Tactical Operations Evaluation Personal Information Systems: User Views and Information Categorization Diversity in Recommender Systems: Bridging the gap between users and systems A Method to Synthesize 3-Dimensional Face Corresponding to Diverse Words Expressing Facial Features through Mapping and Inspecting Validity of Mapping Function CENTRIC 3: Personalization User Profile Matching: A Statistical Approach Serious Games to Improve the Physical Health of the Elderly: A Categorization Scheme CodeDroid: A Framework to Develop Context-Aware Applications A Personalization Approach Based on Models Integration for a User Interface for Supervision in a Power Plant
VALID 2011, The Third International Conference on Advances in System Testing and Validation Lifecycle VALID 1: Testing Techniques and Mechanisms I Using Assertion-Based Testing in String Search Algorithms An Approach to Modularization in Model-Based Testing Dealing with Challenges of Automating Test Execution Detecting Equivalent Mutants by Means of Constraint Systems VALID 2: Testing Techniques and Mechanisms II Answer-Set Programming as a new Approach to Event-Sequence Testing A Test Case Suite Generation Framework of Scenario Testing Is Mutation Testing Scalable for Real-World Software Projects? Testing As A Service for Component-based Developments VALID 3: Software Verification and Validation A Zone-based Reachability Analysis of Variable Driven Timed Automata Retrospective Project Analysis Using the Expectation-Maximization Clustering Algorithm Extracting and Verifying Viewpoints Models in Multitask Applications Requirements and Solutions for Tool Integration in Software Test Automation RobusTest: Towards a Framework for Automated Testing of Robustness in Software VALID 4: Robust Design Methodologies Simulated Injection of Radiation-Induced Logic Faults in FPGAs Concurrent Engineering used to Implement Risk & Hazard Control Model Reconstruction: Mining Test Cases Generic Data Format Approach for Generation of Security Test Data VALID 5: System and Feature Testing A Classification for Model-Based Security Testing Utilizing Domain-Specific Modelling for Software Testing Comparison of off-chip interconnect validation to field failures Software Testing in Critical Embedded Systems: a Systematic Review of Adherence to the DO-178B Standard
SIMUL 2011, The Third International Conference on Advances in System Simulation SIMUL 1: Simulation Methodologies Stochastic Simulation of Snow Cover The Lambda Chart: A Model of Design Abstraction and Exploration at System-Level Increase of Robustness on Pre-optimized Production Plans Through Simulation-based Analysis and Evaluation SIMUL 2: Distributed Simulation Using Complex Event Processing for Semantically Interoperable Federated Critical Infrastructure Simulation Fault-tolerant Distributed Discrete Event Simulator Based on a P2P Architecture Distributed Simulation of Dense Crowds Distributed Simulation on a Many-Core Processor SIMUL 3: Transport Simulation Simulation of Particle Deposition in an Airplane Cabin Mockup Traffic and Monotone Random Walk of Particles: Analytical and Simulation Results Tunnel Simulator for Traffic Video Detection SUMO - Simulation of Urban MObility - an Overview SIMUL 4: Model based System Prediction Mechanisms Controlling the Sensitivity of Amperometric Biosensors in the Case of Substrate and Product Inhibition A Generic Operational Simulation for Early Design Civil Unmanned Aerial Vehicles Traceability Handling in Model-based Prediction of System Quality SIMUL 5: Simulation Models I A Simulation-Based Innovation Forecasting Approach Combining the Bass Diffusion Model, the Discrete Choice Model and System Dynamics: An Application in the German Market for Electric Cars Plaque Lesion Classification Fuzzy Model Based on Various Color Models A Multi-Layer Constraint and Decision Support System for Construction Operation SIMUL 6: Simulation Models II Agent-based simulation validation: A case study in demographic simulation Analysis and Simulation of Power Law Distribution of File Types in File Sharing Systems Simulation hypotheses SimARC: An Ontology-driven Behavioural Model of Alcohol Abuse SIMUL 7: Building Simulation Agent-Based Model (ABM) Validation Considerations Detailed Input data Source for Construction Process Simulation Energy Simulation Supporting the Building Design Process SIMUL 8: Practical Applications on Processes Simulating Counterinsurgency and Coalition Strategies Simulation of Bacterial Self-Organization in Circular Container Along Contact Line as Detected by Bioluminescence Imaging Applying Simulation and Mathematical Programming on a Business Case Analysis for Setting up a Spare Part Logistics in the Construction Supply Industry Integrating Current State and Future State Value Stream Mapping with Discrete Event Simulation: A Lean Distribution Case Study SIMUL 9: Simulation Tools and Platforms Review of Spatial Simulation Tools for Geographic Information Systems Towards Internet Scale Simulation Simulation and Sustainability Towards a SDL-DEVS Simulator
AMBIENT 2011, The First International Conference on Ambient Computing, Applications, Services and Technologies AMBIENT 1: Ambient Computing Context-aware Multimodal Feedback in a Smart Environment Context-Aware 3D Gesture Interaction Based on Multiple Kinects A Model for Activity Recognition and Emergency Detection in Smart Environments Environment - Application - Adaptation: a Community Architecture for Ambient Intelligence The Experience Cylinder, an immersive interactive platform - The Sea Stallion's voyage: a case study |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Copyright (c) 2006-2011, IARIA