By Topic

2015 12th International Symposium on Programming and Systems (ISPS)

28-30 April 2015

Filter Results

Displaying Results 1 - 25 of 57
  • [Front cover]

    Publication Year: 2015, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (6160 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2015, Page(s):1 - 9
    Request permission for commercial reuse | PDF file iconPDF (82 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2015, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (409 KB)
    Freely Available from IEEE
  • Foreword by the general chair

    Publication Year: 2015, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (247 KB)
    Freely Available from IEEE
  • Accessing linked open data

    Publication Year: 2015, Page(s):1 - 15
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2280 KB) | HTML iconHTML

    A core objective for linked data is the seamless mash-up of information from different data sources that serve data in an easy-to-deliver, resilient manner. The focus on the ease of serving data, however, puts significant burden on the consumer of linked open data. In particular, the consumer service must manage (i) data source discovery, (ii) data access, (iii) data source availability and (iv) d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Track 1: Communication technologies and systems security

    Publication Year: 2015, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (27 KB)
    Freely Available from IEEE
  • A reliable trust management scheme in wireless sensor networks

    Publication Year: 2015, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2441 KB) | HTML iconHTML

    Physical security of wireless sensor nodes cannot be provided because making sensor nodes tamperproof is prohibitively expensive. Due to this lack of physical security, intruders can easily compromise one or more sensor nodes to subvert network operations bypassing encryption and password security systems. Trust and reputation systems have been recently suggested as an effective security mechanism... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Balancing heuristic for independent task scheduling in cloud computing

    Publication Year: 2015, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2253 KB) | HTML iconHTML

    Distributed computing environment has become a new technology to execute large-scale applications and Cloud computing is one of these technologies. Resource allocation is one of the most important challenges in the Cloud Computing. The optimally assigning of the available resources to the needed cloud applications is known to be a NP complete problem. In this paper, we propose a new task schedulin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analytical evaluation of the impacts of Sybil attacks against RPL under mobility

    Publication Year: 2015, Page(s):1 - 9
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (335 KB) | HTML iconHTML

    The Routing Protocol for Low-Power and Lossy Networks (RPL) is the standardized routing protocol for constrained environments such as 6LoWPAN networks, and is considered as the routing protocol of the Internet of Things (IoT), However, this protocol is subject to several attacks that have been analyzed on static case. Nevertheless, IoT will likely present dynamic and mobile applications. In this p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cluster based key management in VANET networks

    Publication Year: 2015, Page(s):1 - 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1619 KB) | HTML iconHTML

    Vehicular networks VANET announce as the communication networks of the future, where the mobility is the main idea. These networks should be able to interconnect vehicles. The optimal goal is that these networks will contribute to safer roads and more effective in the future by providing timely information to drivers and concerned authorities. They are therefore vulnerable to many types of attacks... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The teleoperation of a mobile robot in a network without a quality of service guaranteed

    Publication Year: 2015, Page(s):1 - 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4107 KB) | HTML iconHTML

    The fluctuation of the time delay in a communication network is one of the obstacles for many real-time applications such as teleoperation of mobile robots. To solve this problem, we propose in this paper an architecture that allows to predict in real-time the Round Trip Time (RTT) and an improved speed limit module (ISLM), in order to control the mobile robot speed and reach the desired destinati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A survey of locality-awareness solutions in mobile DHT systems

    Publication Year: 2015, Page(s):1 - 7
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2618 KB) | HTML iconHTML

    Structured peer-to-peer (P2P) systems showed over time a high performance to P2P users since their appearance. They are no longer restricted to wired networks but they are also applied on mobile devices in some recent researches in which the characteristics of mobility and wireless networks must be taken into account. The existing P2P protocols are experienced by the nonconsideration of the physic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dishonest recommendation attacks in wireless sensor networks: A survey

    Publication Year: 2015, Page(s):1 - 10
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4399 KB) | HTML iconHTML

    Trust and reputation models in wireless sensor networks (WSN) have been recently proposed by many researches as an innovative solution for guaranteeing an effective security mechanism. They play an important role in defending WSNs such as securing routing and data forwarding protocols, against insider attacks. However, despite of the advantages, reputation models face with several security issues,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Energy efficient routing for Mobile underwater wireless sensor networks

    Publication Year: 2015, Page(s):1 - 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3536 KB) | HTML iconHTML

    Similar to the terrestrial sensor networks, the design of underwater wireless sensor networks (UWSN) has several challenges such as limited bandwidth, defective underwater channels and high propagation delay. Another primordial problem in UWSN is energy resource depletion of sensor node, which cannot be recharged; also solar energy cannot be exploited. In the coming years the number of sensor used... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed energy efficient adaptive clustering protocol with data gathering for large scale wireless sensor networks

    Publication Year: 2015, Page(s):1 - 7
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4000 KB) | HTML iconHTML

    Hierarchical routing is an efficient way to lower energy consumption within a cluster, performing data aggregation and fusion in order decrease the number of transmitted messages to the BS. In this paper, a novel hierarchical approach called distributed energy efficient adaptive clustering protocol with Data Gathering (DEACP) is proposed for Wireless sensor network. Since nodes in a sensor network... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Track 2: Information Systems & information technology

    Publication Year: 2015, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (27 KB)
    Freely Available from IEEE
  • Towards an open framework for inter-organizational workflow semantic annotation

    Publication Year: 2015, Page(s):1 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1062 KB) | HTML iconHTML

    In this paper, we propose a semantic and contextual workflow annotation framework for B2B integration. This annotation framework allows the detection of heterogeneities occurring between inter-organizational workflows and enables their correction through mediation services provided through a Cloud-based B2Bi (Business-to-Business integration) platform. This work describes also, the general archite... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A personalized adaptive e-learning system based on learner's feedback and learner's multiple intelligences

    Publication Year: 2015, Page(s):1 - 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2224 KB) | HTML iconHTML

    Personalized feedback strategies is a powerful method that expert humans apply when helping learners to optimize their learning. Thus, research on feedback strategies tailoring feedback according to important factors of the learning process has been recognized as a promising issue in the field of adaptive e-learning systems. Our paper seeks to contribute to this area of research by addressing the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A strong-dominance-based approach for refining the skyline

    Publication Year: 2015, Page(s):1 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1790 KB) | HTML iconHTML

    This paper addresses the problem of refining large skylines by introducing a new dominance relationship. Skyline queries are powerful tool to capture user preferences. However in some contexts, the skyline is too large to give any useful insight to the user. In order to solve this problem, we introduce a strong dominance relationship that relies on the relation called “much preferred”... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance evaluation of serializable snapshot isolation in PostgreSQL

    Publication Year: 2015, Page(s):1 - 11
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2832 KB) | HTML iconHTML

    Snapshot Isolation (SI) is a multiversion concurrency control protocol, allowing the concurrent transactions to consult older versions of the database while generating new versions using write operation. Its main advantage is to avoid the read-write conflicts, i.e. a read operation will never be blocked by a write operation and vice versa. Among existing concurrency control protocols, SI offers th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intuitionistic fuzzy bipolar approach for flexible querying in e-commerce applications

    Publication Year: 2015, Page(s):1 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (240 KB) | HTML iconHTML

    Several e-commerce applications ask customers to leave comments about the purchased products and to rate them positively or negatively as an opportunity to obtain valuable feedback on them. These information could be seen as user's preferences in a process of flexible query evaluation, which is capable to distinguish amongst the product items those that are the most suitable or most preferred to a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Crowd-voting-based group recommender systems

    Publication Year: 2015, Page(s):1 - 9
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (477 KB) | HTML iconHTML

    In this paper, we deal with group recommendations where the task is to choose a sequence of natural attractions that better matches the expectation of a group of tourists. We show in this setting, that the crowd support in selecting potential alternatives, may help members to preserve the harmony of their group and not deviating too much from each other as well. Taking into consideration each memb... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Web site classification based on URL and content: Algerian vs. non-Algerian case

    Publication Year: 2015, Page(s):1 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (442 KB) | HTML iconHTML

    Web page classification based on topic or sentiments is a common application of web content mining techniques. In this paper we will present a novel application intended to identify the nation targeted by a specific web page. The aim is to be able to automatically distinguish websites targeting a specific nation, using both the URL and the content of a web page. In this paper we will address the i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Combining skyline and multi-criteria decision methods to enhance Web services selection

    Publication Year: 2015, Page(s):1 - 8
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (191 KB) | HTML iconHTML

    This paper describes a new approach based on combining three Multi-Criteria Decision Making methods: Skyline, AHP and Promethee, for ranking Web services. The Skyline is used to reduce the search space and focusing only on interesting web services that are not dominated by any other service. AHP is used to weight QoS criteria in a simple and an intuitive manner; it allows for checking whether the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Social big data mining: A survey focused on opinion mining and sentiments analysis

    Publication Year: 2015, Page(s):1 - 10
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (483 KB) | HTML iconHTML

    The emergence of social media and the huge amount of data generated by them, has lead researchers to study the possibility of their exploitation in order to identify hidden knowledge. Thus, two areas are attracting more and more interest in the research community, the opinion mining and sentiment analysis. The research papers in this field are increasing rapidly. However, few survey papers have be... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.