|
[1] S. C. Lin, P. H. Wu, H. T. Lu, S. H. Chuang and W. J. Wang, "Dynamic throttling for IoT streaming hub services on multi-tenant cloud environment," 2018 IEEE International Conference on Applied System Invention (ICASI), Chiba, Japan, 2018, pp. 544-547 [2] T. Pering, K. Farrington and T. Dahm, "Taming the IoT: Operationalized Testing to Secure Connected Devices," in Computer, vol. 51, no. 6, pp. 90-94, June 2018. [3] S. Jeong and K. Law, "An IoT Platform for Civil Infrastructure Monitoring," 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC), Tokyo, Japan, 2018, pp. 746-754. [4] A. Borodinsky, "Methods to improve the efficiency of IPTV services," 2012 11th Conference of Open Innovations Association (FRUCT), St. Petersburg, 2012, pp. 13-21. [5]M. Milosevic, N. Teslic, M. Pejovic, M. Radonjic and B. Mlikota, "Android framework for web-based digital TV applications: A proposal and analyses," 2015 IEEE 5th International Conference on Consumer Electronics - Berlin (ICCE-Berlin), Berlin, 2015, pp. 32-34. [6] G. Zhang et al., "Big Data Collection and Analysis Framework Research for Public Digital Culture Sharing Service," 2015 IEEE International Conference on Multimedia Big Data, Beijing, 2015, pp. 196-199 [7] S. Consolo and U. F. Petrillo, "A Framework for the Efficient Collection of Big Data from Online Social Networks," 2014 International Conference on Intelligent Networking and Collaborative Systems, Salerno, 2014, pp. 34-41 [8] X. Qin, Y. Luo, N. Tang and G. Li, "DeepEye: An automatic big data visualization framework," in Big Data Mining and Analytics, vol. 1, no. 1, pp. 75-82, March 2018. [9] K. A. Sergeevich, A. M. Ovseevna and S. I. Petrovich, "Web-application for real-time big data visualization of complex physical experiments," 2015 International Siberian Conference on Control and Communications (SIBCON), Omsk, 2015, pp. 1-5. [10] J. Zhang and M. L. Huang, "5Ws Model for Big Data Analysis and Visualization," 2013 IEEE 16th International Conference on Computational Science and Engineering, Sydney, NSW, 2013, pp. 1021-1028.
[11] R. Bhattacharya, N. Bandyopadhyay and S. Kalaivani, "Real time Android app based respiration rate monitor," 2017 International conference of Electronics, Communication and Aerospace TechnoLogy (ICECA), Coimbatore, 2017, pp. 709-712. [12] D. A. Girei, M. Ali Shah and M. B. Shahid, "An enhanced botnet detection technique for mobile devices using Log analysis," 2016 22nd International Conference on Automation and Computing (ICAC), Colchester, 2016, pp. 450-455. [13] N. Ahmed, S. Ahamed, J. I. Rafiq and S. Rahim, "Data processing in Hive vs. SQL server: A comparative analysis in the query performance," 2017 IEEE 3rd International Conference on Engineering TechnoLogies and Social Sciences (ICETSS), Bangkok, 2017, pp. 1-5. [14] C. Qi, "On index-based query in SQL Server database," 2016 35th Chinese Control Conference (CCC), Chengdu, 2016, pp. 9519-9523. [15] O. Sohail and T. Naqash, "Anti-theft cloud application for android operating system (Nougats)," 2018 IEEE International Conference on Applied System Invention (ICASI), Chiba, Japan, 2018, pp. 321-324. [16] S. S. Kumbhar, Y. Lee and J. Yang, "Hybrid Encryption for Securing SharedPreferences of Android Applications," 2018 1st International Conference on Data Intelligence and Security (ICDIS), South Padre Island, TX, 2018, pp. 246-249. [17] M. M. Swastikasari, E. Sediyono and A. S. Ardjo, "Design of E-KOST: An Android-based mobile application using location based service (Study case: SWCU'S students)," 2017 International Conference on Innovative and Creative Information TechnoLogy (ICITech), Salatiga, 2017, pp. 1-9. [18] S. Nayak et al., "An application for end to end secure messaging service on Android supported device," 2017 8th IEEE Annual Information TechnoLogy, Electronics and Mobile Communication Conference (IEMCON), Vancouver, BC, 2017, pp. 290-294. [19] J. Xie, X. Fu, X. Du, B. Luo and M. Guizani, "AutoPatchDroid: A framework for patching inter-app vulnerabilities in android application," 2017 IEEE International Conference on Communications (ICC), Paris, 2017, pp. 1-6. [20] D. H. You and B. N. Noh, "Android platform based linux kernel rootkit," 2011 6th International Conference on Malicious and Unwanted Software, Fajardo, 2011, pp. 79-87. [21] H. Elmaghraoui, L. Benhlima and D. Chiadmi, "Dynamic web service composition using AND/OR directed graph," 2017 3rd International Conference of Cloud Computing TechnoLogies and Applications (CloudTech), Rabat, 2017, pp.1-8. [22] Y. Lei, Z. Jiantao, G. Yongqiang, L. Jing and M. Xuebin, "Dynamic Web Service Composition Based on State Space Searching," 2015 IEEE 21st International Conference on Parallel and Distributed Systems (ICPADS), Melbourne, VIC, 2015, pp. 821-826. [23] R. Selvam and A. Senthilkumar, "Web Service based vulnerability testing framework," 2014 International Conference on Green Computing Communication and Electrical Engineering (ICGCCEE), Coimbatore, 2014, pp. 1-6. [24] Chuangwei Zhang and Xu Yin, "Design and implementation of single-service multi-function Web Service," 2011 International Conference on Computer Science and Service System (CSSS), Nanjing, 2011, pp. 3912-3915. [25] S. O. Park et al., "Electrical cell-substrate impedance spectroscopy system using cloud based database," 2018 IEEE International Conference on Applied System Invention (ICASI), Chiba, Japan, 2018, pp. 267-270. [26] R. Cao, Z. Yu, T. Marbach, J. Li, G. Wang and X. Liu, "Load Prediction for Data Centers Based on Database Service," 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC), Tokyo, Japan, 2018, pp. 728-737. [27] S. Luo, Z. Gao, M. Gubanov, L. L. Perez and C. Jermaine, "Scalable Linear Algebra on a Relational Database System," in IEEE Transactions on Knowledge and Data Engineering. [28] A. Alsharif, G. M. Kapfhammer and P. McMinn, "DOMINO: Fast and Effective Test Data Generation for Relational Database Schemas," 2018 IEEE 11th International Conference on Software Testing, Verification and Validation (ICST), Vasteras, 2018, pp. 12-22. [29] D. Luo et al., "You Are What You Watch and When You Watch: Inferring Household Structures From IPTV Viewing Data," in IEEE Transactions on Broadcasting, vol. 60, no. 1, pp. 61-72, March 2014. [30] M. Kren, U. Sedlar, J. Bešter and A. Kos, "Determination of user opinion based on IPTV data," 2016 18th International Conference on Transparent Optical Networks (ICTON), Trento, 2016, pp. 1-5. [31] L. Yu, J. Gu, S. Wang and S. Zhang, "The IPTV video evaluation model based on big data," 2017 IEEE 2nd International Conference on Big Data Analysis (ICBDA)(, Beijing, 2017, pp. 159-163. [32] 替您錄科技股份有限公司,LiTV線上影視, https://www.litv.tv/
|