By Topic

Advanced Communication Technology (ICACT), 2013 15th International Conference on

Date 27-30 Jan. 2013

Filter Results

Displaying Results 1 - 25 of 304
  • [Front cover]

    Publication Year: 2013, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (269 KB)
    Freely Available from IEEE
  • [Title page]

    Publication Year: 2013, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (97 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2013, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (59 KB)
    Freely Available from IEEE
  • Welcome messages

    Publication Year: 2013, Page(s):i - ii
    Request permission for commercial reuse | PDF file iconPDF (194 KB) | HTML iconHTML
    Freely Available from IEEE
  • List contrib

    Publication Year: 2013, Page(s):iii - xiii
    Request permission for commercial reuse | PDF file iconPDF (140 KB)
    Freely Available from IEEE
  • Active reviewer list

    Publication Year: 2013, Page(s):xiv - xx
    Request permission for commercial reuse | PDF file iconPDF (3261 KB)
    Freely Available from IEEE
  • List of outstanding paper award

    Publication Year: 2013, Page(s):xxi - xxv
    Request permission for commercial reuse | PDF file iconPDF (267 KB)
    Freely Available from IEEE
  • Session overview [breaker page]

    Publication Year: 2013, Page(s):xxvi - xxvii
    Request permission for commercial reuse | PDF file iconPDF (892 KB)
    Freely Available from IEEE
  • [Tutorial sessions - 9 abstracts]

    Publication Year: 2013, Page(s):xxviii - xxxvi
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (727 KB)

    Presents abstracts of tutorials from the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Table of contents

    Publication Year: 2013, Page(s):xxxvii - lx
    Request permission for commercial reuse | PDF file iconPDF (365 KB)
    Freely Available from IEEE
  • e-Government in Mexico [Keynote 1]

    Publication Year: 2013, Page(s):1 - 39
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (22000 KB) | HTML iconHTML

    In the year 2000, Mexican government created the e-Mexico National System which started the public policy to promote Internet Access among the population, as well as the development of government contents and services. Internet penetration has grown from 20.2 to 40.6 million users. In this presentation I show the e-Mexico networks created to provide public and free Internet access to more than 10 ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mining minds: Big data reveals our desires [Keynote 2]

    Publication Year: 2013, Page(s):1 - 36
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (20326 KB) | HTML iconHTML

    This article consists of a collection of slides from the author's conference presentation. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keynote Speech 3: IoT - Internet(s) of things [Plenary Session]

    Publication Year: 2013, Page(s): 1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (121 KB)

    Summary form only given. Thirty years ago, the idea of 'Connecting Every-Thing' was just a topic of science fiction, but with the introduction and technological advancements and introduction of the Internet, the fiction has become reality. Up to now, communications systems, and also the Internet, have predominantly been used by and for individuals. With loT we all experience a domain shift towards... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • BPM-supported social networks discovery and analysis techniques

    Publication Year: 2013, Page(s): 1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (75 KB)

    Summary form only given. Technology-supported social networks have been penetrating many aspects of our lives from friendships/blogging sites to working organizations. The recent advanced BAI (business analytics and business intelligence) systems, so, are started to adopt individuals, as employees of companies, and their work-sharing relationships as a sort of organizational knowledge in order to ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The future of cloud integration: Cloud Middleware?

    Publication Year: 2013, Page(s): 1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (100 KB) | HTML iconHTML

    As we know cloud computing can be defined in many ways, but in simple terms "the cloud" can be called as a metaphor for the Internet, which is quite familiar cliche, but when it combined with "computing," the meaning gets bigger and fuzzier. Several analyst and service vendors define cloud computing as an updated version of Service oriented computing with virtualization: basically virtual servers ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • LTE network and protocol

    Publication Year: 2013, Page(s): 1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (79 KB)

    Summary form only given. This tutorial provides an overview of the network architecture and protocol stack functions of the LTE or the E-UTRAN (Evolved Universal Terrestrial Access Network) that is the access part of the Evolved Packet System (EPS). LTE network, core network includes Mobility Management Entity (MME), Serving Gateway (SGW), Packet Data Network Gateway (PDN GW) where as E-UTRAN has ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Future Internet technical strategies and analysis of best practices

    Publication Year: 2013, Page(s): 1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (73 KB)

    Summary form only given. It is getting more important issue than before that the Future Internet. Because the evolving smart services and social networks are rapidly transforming societies and economies without barrier. And also the agenda of the Future Internet can cover all the smart brand new service challenges that are not available in the existing Internet world. Internet as WWW has been prov... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Algorithmic and evolutionary game theory and their applications in Internet of Things

    Publication Year: 2013, Page(s): 1
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (80 KB)

    Algorithmic game theory concerns algorithms and their analyses of finding equilibria in multi-agent strategic environments. Nash has shown that, in his seminal work, there is always an equilibrium where all agents can stay with their best responses. Evolutionary game theory concerns on stability and dynamics of agent population through differential reproduction governed by mutation and natural sel... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cloud services: Opportunity and direction

    Publication Year: 2013, Page(s):1 - 34
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (7951 KB) | HTML iconHTML

    Internet has changed everything in our daily life and our daily life is heavily depending on the Internet and mobile devices. Next big thing will be Cloud Computing which be another big Software and Computing Infra beyond the physical network Infra, Broadband. Recently Public Cloud has been gaining big popularity among Smart Phone and Pad users. Also the Cloud Computing will be an enabler of ITaaS... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Session 1A: Systems & software engineering 1 [breaker page]

    Publication Year: 2013, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (123 KB)
    Freely Available from IEEE
  • ICT students' perception concerning free and open source software: A case study of Central University of Technology

    Publication Year: 2013, Page(s):2 - 7
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (571 KB) | HTML iconHTML

    There has been general lack of free and open source software (FOSS) adoption in South Africa (SA), including at Universities of Technology (UoTs'). Even though there are organizations that are championing and encouraging the use of FOSS around the world, adoption rate in SA remains low. To better understand the rationale behind the lack of adoption at UoTs', the perception of students' concerning ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Open Source Native XML Database Architectures - a comparative study

    Publication Year: 2013, Page(s):8 - 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (523 KB) | HTML iconHTML

    Text-based and model-based architectures are two models used by Open Source Native XML databases (NXDs) to physically store collections of XML documents. The question is: which one of these two models is better in terms of performance. This paper provides some insights into these two NXD architectures. Additionally, the metric performance comparison of text-based and model-based architectures it o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Regularization parameter tuning optimization approach in logistic regression

    Publication Year: 2013, Page(s):13 - 18
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (781 KB) | HTML iconHTML

    Under regression analysis methods, logistic regression comes and it got popular since it has proved its effectiveness in modelling categorical outcomes as a function of either continuous -real value- or categorical - yes vs. no- variables. The coefficients of this prediction function are based on a data set that is used to shape this function. However, sometimes the dataset, which is used to gener... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A stereo camera and mini-projector for video communication in cell-phone calls

    Publication Year: 2013, Page(s):19 - 22
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (961 KB) | HTML iconHTML

    A novel cost-effective video communication technology for cell phones using mini-projector and stereo-camera has been introduced. In our proposed technique a virtual screen is created by displaying an image or video. And using the displayed images it is possible to interact with the virtual screen. To demonstrate the capability of our proposed technique, we have displayed dialling numbers to make ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Session 1B: Information and network security 1 [breaker page]

    Publication Year: 2013, Page(s): 23
    Request permission for commercial reuse | PDF file iconPDF (129 KB)
    Freely Available from IEEE