Session 4
Ad Hoc Network and Delay Tolerant Network
|
8:30-8:45 |
An Autonomous Clustering-based Inter-domain Routing Protocol for Heterogeneous Mobile Ad Hoc Networks
Keisei Okano, Yuto Aoki, Tomoyuki Ohta and Yoshiaki Kakuda |
8:45-9:00 |
Development of a Real-time System for Visualizing Network Topology and Packet Flow in MANET Field Experiments
Yuri Tsutsui, Yuya Kitaura, Kaori Kikuchi, Tomoyuki Ohta and Yoshiaki Kakuda |
9:00-9:15 |
An Investigation of Multi-User Interference Cancellation Techniques at Roadside Unit in Vehicular Networks
Cheng Li, Fan Jiang and Cecilia Moloney |
9:15-9:30 |
A Realistic Underlay Concept for Delay Tolerant Networks in Disaster Scenarios
Silvia Krug, Peggy Begerow, Atheer Al Rubaye, Sebastian Schellenberg and Jochen Seitz |
9:30-9:45 |
Buffer Management for Reliable Multicast over Delay Tolerant Networks
Peggy Begerow, Silvia Krug, Sebastian Schellenberg and Jochen Seitz |
9:45-10:00 |
An Effective Message Forwarding Algorithm for Delay Tolerant Network with Cyclic Probabilistic Influences
Yitao Li, Ling Ding, Jie Sheng, Cong Liu and Ankur Teredesai |
Coffee Break |
10:00-10:15 |
|
Session 5
Localization and Wireless Network
|
10:15-10:30 |
Fast Indoor Localization of Smart Hand-held Devices Using Bluetooth
Yu Gu, Lianghu Quan, Fuji Ren and Jie Li |
10:30-10:45 |
Location Privacy in Buildings: A 3-Dimensional K-anonymity Model
Zhu Yujia and Lidong Zhai |
10:45-11:00 |
HILL: A Hybrid Indoor Localization Scheme
Sahil Kharidia, Qiang Ye, Srinivas Sampalli, Jie Cheng, Hongwei Du and Lei Wang |
11:00-11:15 |
Indoor Relative Positioning Scheme using illuminance and Color Temperature
Hiroto Aida, Hikaru Ichikawa, Motoi Okada and Mitsunori Miki |
11:15-11:30 |
Effective Map Matching using Curve Tangents and Hidden Markov Model
Roland Assam and Thomas Seidl |
11:30-11:45 |
A Game Theory Based Vertical Handoff Scheme For Wireless Heterogeneous Networks
Jie Li, Fu Shuai and Li Ruidong |
11:45-12:00 |
Minimizing the Access Time of Multi-item Requests in Wireless Data Broadcast Environments
Bin Fu, Chuanhe Huang, Zaixin Lu, Miao Pan and Weili Wu |
Lunch |
12:00-13:00 |
|
Session 6
Social Network
|
13:00-13:15 |
Social Network Rumors Spread Model Based on Cellular Automata
Ailian Wang and Weili Wu |
13:15-13:30 |
Probabilistic snapshot based evolutionary social network event detection
Zhongnan Zhang and Lei Hu |
13:30-13:45 |
Analysis on Evolution and Topological Features of a Real Mobile Social Network
Qichao Xu, Zhou Su, Dongfeng Fang and Bo Han |
13:45-14:00 |
New Competitive Influence Propagation Models in Social Networks
Yuqing Zhu, Deying Li, Huiping Guo and Raj Pamula |
14:00-14:15 |
A Survey of Research Fields for Social Network and Corresponding Techniques
Lei Cui and Weili Wu |
14:15-14:30 |
Inferring Network Structure via Cascades
Xuming Zhai, Lidan Fan, Kai Xing, He Chen, Ailian Wang and Jiaofei Zhong |
14:30-14:45 |
How Could a Boy Influence a Girl?
He Chen, Wen Xu, Xuming Zhai, Yuanjun Bi, Ailian Wang and Ding-Zhu Du |
Coffee Break |
14:45-15:00 |
|
Session 7
Miscellaneous
|
15:00-15:15 |
Trade-off between Service Granularity and User Privacy in Smart Meter Operation
Junggab Son, Donghyun Kim, Sejin Lee, Heekuck Oh, Alade Tokuta and Hayk Melikyan |
15:15-15:30 |
Analysis and Performance Evaluation of MultiPath Diversity based SGSN Pool in Packet Switched Domain Core Networks
Yu Su and Xian Feng |
15:30-15:45 |
Clustering and Partition Based Divide and Conquer for SAT Solving
Quanrun Fan, Zhenhua Duan, Cong Tian and Hongwei Du |
15:45-16:00 |
Load-aware Relay Selection in LTE-A System via Global Differentiated-Fairness Control
Long Wang and Qinghe Du |
16:00-16:15 |
Cloud-based Cyber Physical Systems: Design Challenges and Security Needs
Yenumula Reddy |