


default search action
10. MoMM 2012: Bali, Indonesia
- Eric Pardede, David Taniar:
The 10th International Conference on Advances in Mobile Computing & Multimedia, MoMM '12, Bali, Indonesia - December 03 - 05, 2012. ACM 2012, ISBN 978-1-4503-1307-0
Keynote talks
- Gabriele Kotsis:
10 years mobile multimedia: from Motorola RAZR to iPhone 5. 1 - Abdelkader Hameurlain:
Evolution of data management systems: from uni-processor to large-scale distributed systems. 2 - Kerstin Altmanninger:
Innovations in modeling web applications. 3 - Edgar R. Weippl:
Is security an afterthought when designing apps? 4 - Antonio Liotta:
The human side of video streaming services. 5 - Mohamed Ridza Wahiddin:
Information security in scale free networks. 6
Mobile multimedia applications
- Launa Li-Yan Lee, Jiayong Ren, Dian Tjondronegoro
:
Mobile social tool for supporting responsible drinking in young women. 9-12 - Selene Uras, Emanuela De Vita, Daniele Ardu, Ivan Marcialis, Alessandro Soro
, Gavino Paddeu:
Evaluation of Trippple: a field analysis. 13-16 - Selene Uras, Daniele Ardu, Gavino Paddeu, Massimo Deriu:
Do not judge an interactive book by its cover: a field research. 17-20 - Chairunissa Atimas Nurahmad, Mirna Adriani:
Identifying traditional music instruments on polyphonic Indonesian folksong using mel-frequency cepstral coefficients (MFCC). 21-24 - Ngu Phuc Huy, Do Van Thanh:
Evaluation of mobile app paradigms. 25-30
Mobile business and social applications
- Key Pousttchi
, Yvonne Hufenbach:
Mobile payment in the smartphone age: extending the mobile payment reference model with non-traditional revenue streams. 31-38 - Youngseol Lee, Sung-Bae Cho:
Automatic image tagging using two-layered Bayesian networks and mobile data from smart phones. 39-46 - Shang Gao
, Per Christian Røinend, John Krogstie
:
The adoption of mobile tourism services: an empirical study. 47-56 - Dian Tjondronegoro
, Tat-Seng Chua:
Transforming mobile personal life log into autobiographical multimedia eChronicles. 57-63 - Andreu Pere Isern-Deyà
, Magdalena Payeras-Capellà
, Macià Mut Puigserver, Josep Lluís Ferrer-Gomila
, Llorenç Huguet i Rotger:
Micropayment scheme implementation on the Android platform with performance evaluation. 64-73
Multimedia streaming and visualization
- Afsoon Yousefi Zowj, Mehdi Dehghan
:
StrU: a user behaviour-aware video-on-demand streaming service. 74-83 - Antonio Liotta
, Luca Druda, Vlado Menkovski
, Georgios Exarchakos
:
Quality of experience management for video streams: the case of Skype. 84-92 - Chih-Chin Liu:
MP3 sniffer: a system for online detecting MP3 music transmissions. 93-96 - Ruiwei Shen, Tsutomu Terada
, Masahiko Tsukamoto:
A system for visualizing sound source using augmented reality. 97-102 - Mounira Taileb:
Content based image retrieval system using NOHIS-tree. 103-108
Evaluation of mobile multimedia applications
- Marcin Davies, Joachim Zeiss, René Gabner:
Evaluating two approaches for browser-based real-time multimedia communication. 109-117 - Florian Lettner, Clemens Holzmann
:
Automated and unsupervised user interaction logging as basis for usability evaluation of mobile applications. 118-127 - Tadateru Ohkawara, Ailixier Aikebaier, Tomoya Enokido, Makoto Takizawa
:
Evaluation of multimedia quorum-based synchronization protocols. 128-135 - Sazia Parvin
, Farookh Khadeer Hussain, Omar Khadeer Hussain
:
Digital signature-based authentication framework in cognitive radio networks. 136-142 - Clauirton de Siebra, Paulo Costa, Regina C. G. Miranda, Fabio Q. B. da Silva
, Andre Luís de Medeiros Santos
:
The software perspective for energy-efficient mobile applications development. 143-150
Pervasive mobile computing
- Yuzuru Tanahashi, James R. Rowland, Stephen C. North, Kwan-Liu Ma:
Inferring human mobility patterns from anonymized mobile communication usage. 151-160 - Bogdan Groza, Rene Mayrhofer
:
SAPHE: simple accelerometer based wireless pairing with heuristic trees. 161-168 - Sharmistha Chatterjee, Jukka K. Nurminen, Matti Siekkinen
:
Low cost positioning by matching altitude readings with crowd-sourced route data. 169-178 - Vanessa El-Khoury, Martin Jergler, David Coquil, Harald Kosch
:
Semantic video content annotation at the object level. 179-188 - Teddy Mantoro
, Adamu I. Abubakar, Media A. Ayu
, Haruna Chiroma
:
Pedestrian position and pathway in the design of 3D mobile interactive navigation aid. 189-198
Wireless and ad-hoc sensor networks
- Yuka Komai, Yuya Sasaki, Takahiro Hara, Shojiro Nishio:
Searching K-nearest neighbor nodes based on node density in ad hoc networks. 199-207 - Bambang Harjito
, Vidyasagar M. Potdar
, Jaipal Singh:
Watermarking technique for copyright protection of wireless sensor network data using LFSR and Kolmogorov complexity. 208-217 - Sami J. Habib, Paulvanna Nayaki Marimuthu:
Communication restoration within wireless sensor networks. 218-223 - Leonard Barolli, Evjola Spaho
, Makoto Ikeda, Elis Kulla, Fatos Xhafa
, Muhammad Younas:
A fuzzy-based data replication system for QoS improvement in MANETs. 224-231 - Yusuke Gotoh, Tomoki Yoshihisa, Hideo Taniguchi, Masanori Kanazawa:
A scheduling method considering heterogeneous clients for NVoD systems. 232-239 - Man Wei, Xiaotao Huang, Chi Wu
, Liqun Huang, Fen Wang, Yonggang Zhu:
Network coding based energy-efficient multi-path routing for wireless sensor network. 240-244
Mobile business and services
- Per J. Nesse, Stein Svaet, Xiaomeng Su, Darijus Strasunskas, Alexei A. Gaivoronski:
Telecom industry in the cloud value chain: methods for assessing business opportunities. 245-248 - Shang Gao
, Zhihao Chen, Wenying Zheng, Wenyan Zhou:
An exploratory study on lifestyles and the adoption of mobile services in China. 249-252 - Elhadi M. Shakshuki
, Tarek R. Sheltami
, Muhammad Akhlaq
:
Sandstorm monitoring system architecture using agents and sensor networks. 253-256 - Roland Schlöglhofer, Johannes Sametinger
:
Secure and usable authentication on mobile devices. 257-262 - Le Sun, Jaipal Singh, Omar Khadeer Hussain
:
Service level agreement (SLA) assurance for cloud services: a survey from a transactional risk perspective. 263-266 - Junguk Cho, Jinkyu Jeong
, Euiseong Seo:
TwoB: a two-tier web browser architecture optimized for mobile network. 267-270 - Chiung Ching Ho
, Chikkannan Eswaran, Kok-Why Ng, June-Yee Leow:
An unobtrusive Android person verification using accelerometer based gait. 271-274 - Rainhard Dieter Findling, Rene Mayrhofer
:
Towards face unlock: on the difficulty of reliably detecting faces on mobile phones. 275-280 - Thu Le Thi Bao, Tran Khanh Dang
:
Semantic Bob-tree: a new obfuscation technique for location privacy protection. 281-284
Multimedia data processing
- Hyun Ji Jeong, Tak-Eun Kim, Myoung-Ho Kim:
An accurate lecture video segmentation method by using sift and adaptive threshold. 285-288 - Hongxing Guo, Jie Wang, Ting Tian, Aihua Zhang:
Transrating-assisted MPEG-4 video resizing with rate-distortion optimization. 289-292 - Reginamary Matthews, Soon Hin Hew, Koo Ah Choo:
Merits and pitfalls of programming learning objects: a pilot study. 293-296 - Li Wang, Nandita Bhattacharjee, Bala Srinivasan:
A method for fingerprint alignment and matching. 297-301 - Kazuha Yamada, Yasuna Yamashita, Masahiro Toyoura
, Xiaoyang Mao
, Satoshi Takatsu, Chihiro Sugawara:
Be-code: information embedding for logo images. 302-305 - Zulaikha Kadim, Kim Meng Liang, Norshuhada Samudin, Khairunnisa Mohamed Johari, Khairil Hafriza, Teck Liong Choong, Hock Woon Hon:
Video analytics algorithm for detecting objects crossing lines in specific direction using blob-based analysis. 306-312

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.