Abstract is missing.
- New Evaluation Criterion of File Replicas Placement for Replication Strategies in Data GridsC. Hamdeni, Tarek Hamrouni, Faouzi Ben Charrada. 1-8 [doi]
- A Security Enhanced IEEE1588 Protocol for Deep-Space EnvironmentZijing Cheng, Lei He, Jingling Zhao, Kai Lin, Baojiang Cui. 9-13 [doi]
- A Dynamic Re-encrypted Ciphertext-Policy Attributed-Based Encryption Scheme for Cloud StorageLequn Mo, Fuyong Lin. 14-19 [doi]
- On Reliability and Security in Knowledge GridsChristian Esposito, Massimo Ficco, Francesco Palmieri, Vincenzo Loia. 20-27 [doi]
- A Method to Predict the Intermittent Power by Classification ModelHang Yang, Fuzheng Zhang, Aidong Xu, Cai Yuan, Chuanlin Chen. 28-33 [doi]
- A Review: The Effects of Imperfect Data on Incremental Decision TreeHang Yang, Aidong Xu, Huajun Chen, Cai Yuan. 34-41 [doi]
- A Decision Support System Using Two-Level Classifier for Smart GridHuajun Chen, Hang Yang, Aidong Xu, Cai Yuan. 42-45 [doi]
- A Collective Intelligence Approach for Building Student's Trustworthiness Profile in Online LearningJorge Miguel, Santi Caballé, Fatos Xhafa, Josep Prieto, Leonard Barolli. 46-53 [doi]
- A Vertical Handoff Decision Algorithm Based on the Movement-Aware of Mobile NodesQiu Xiaona, Liao Qing. 54-61 [doi]
- Concept Drift Mining of Fundamental Variables in China Stock MarketYong Hu, Kang Liu, Bin Feng, Lijun Su, Xiangzhou Zhang, Weiqi Chen, Yuran Zeng. 62-68 [doi]
- Epidemic Dynamics in Weighted Adaptive NetworksBo Song, Guo-Ping Jiang, Yu-Rong Song. 69-73 [doi]
- An Efficient Cloud-Based Personal Health Records System Using Attribute-Based Encryption and Anonymous Multi-receiver Identity-Based EncryptionChang-ji Wang, Xi-Lei Xu, Dong-Yuan Shi, Wen-long Lin. 74-81 [doi]
- HPC Cloud Pills: On-Demand Deployment and Execution of HPC Application in Cloud EnvironmentsPietro Ruiu, Olivier Terzo, Giuseppe Carlino, Rossella Prandi, Alberto Falzone, Paolo Maggi, Livia Torterolo, Enrico Usai, Gianpaolo Perego. 82-88 [doi]
- MOMC: Multi-objective and Multi-constrained Scheduling Algorithm of Many Tasks in HadoopCristiana Voicu, Florin Pop, Ciprian Dobre, Fatos Xhafa. 89-96 [doi]
- A Network Gene-Based Framework for Detecting Advanced Persistent ThreatsYuan Wang, Yongjun Wang, Jing Liu, Zhijian Huang. 97-102 [doi]
- Improving Differential Evolution with Ring Topology-Based Mutation OperatorsJingliang Liao, Yiqiao Cai, Yonghong Chen, Tian Wang, Hui Tian. 103-109 [doi]
- Topic Detection in Chinese Microblogs Using Hot Term Discovery and Adaptive Spectral ClusteringChengxu Ye, Ping Yang, Shaopeng Liu. 110-119 [doi]
- Design and Implementation of WPF-based Mini OA SystemCheng Wang, Zhixiao Lin, Fangsheng Guotang, Lixiao Zheng, Zhigang Zhu. 120-126 [doi]
- Improved Recommendation System with Friends on SNSYanxiang Ling, Qing Liao. 127-133 [doi]
- Multi-input Functional Encryption Based Electronic Voting SchemeYang Chen, You Lin. 134-138 [doi]
- Distance-Bounding Protocol with Time-Stamped Authentication for RFIDGuo-Heng Wei, Huan-guo Zhang, Zheng Li. 139-145 [doi]
- A Novel Fingerprint-Based Biometric EncryptionBin Liang, Zhendong Wu, Linyou. 146-150 [doi]
- A Verifiable Multi-recipient Encryption Scheme from Multilinear MapsZhengjun Jing, Guoping Jiang, Chunsheng Gu. 151-156 [doi]
- The Analysis of Compressive Sensing TheoryJia Yu. 157-160 [doi]
- Rumor Spreading Model Considering the Importance and Fuzziness of InformationLing-Ling Xia, Guo-Ping Jiang, Bo Song, Guan-Hua Zhu. 161-166 [doi]
- Developing Map Matching Algorithm for Transportation Data CenterJian Huang, Chunwei Liu, Jinhui Qie. 167-170 [doi]
- Static Compliance Checking beyond Separation of Duty ConstraintsYang Bo, Chunhe Xia, Yang Luo, Qing Tang. 171-178 [doi]
- Mixed Fruit Fly Optimization Algorithm Based on Lozi's Chaotic MappingHuixia Luo, Guidong Zhang, Yongjun Shen, Jialin Hu. 179-183 [doi]
- A Multi-attribute Vertical Handover Algorithm Based on Adaptive Weight in Heterogeneous Wireless NetworkFeng Dan, Yajie Ma, Fengxing Zhou, Shaowu Lu. 184-188 [doi]
- Static-Dynamic Control Flow IntegrityXiaolong Liu, Qiang Wei, Ziwei Ye. 189-196 [doi]
- The Chinese Conceptual Graph Matching Algorithm Based on Conceptual Sub-graph Weight Self-AdjustmentHui Zeng, Liyan Xiong, Jianjun Chen. 197-200 [doi]
- Chinese Person Name Recognition Based on Naive BayesHui Zeng, Jun Wang, Tao Wan. 201-204 [doi]
- Vinyl Acetate Polymerization Rate Prediction Based on FOA GNNYang Jing, Zeng Hui, Huang Jiangping. 205-208 [doi]
- An Improved Method of Interrogative Sentence Similarity Compute and Application in Q&A SystemJing Yang, Qi Zhu, Haizhou Xu. 209-212 [doi]
- Strain Sensitizing of High-Sensitivity SAW Sensor Based on FBGZhang Wei. 213-216 [doi]
- An Improved Image Encoding Algorithm Based on EZW and Huffman Joint EncodingZhang Wei. 217-220 [doi]
- The Research of Scale-Free Sensor Network Topology Evolution Based on the Energy EfficientYueshun He, Wei Zhang, Nan Jiang, Xiaoyan Luo. 221-226 [doi]
- The Research of Wireless Sensor Network Channel Propagation Model in the Wild EnvironmentYueshun He, Wei Zhang, Nan Jiang, Xiaoyan Luo. 227-231 [doi]
- Reliability Analysis of Business Continuity Based on SPN in Information System Security ManagementPing Pan, Xinyue Mao, Ping Yang, Huiling Zhou. 232-236 [doi]
- A Survey of Chaos-Based CryptographyPing Zhen, Geng Zhao, Lequan Min, Xiaodong Li. 237-244 [doi]
- High Efficient Multi-party Quantum Secret Sharing SchemeXiaoqian Zhang, Xiaoqing Tan, Cui Liang. 245-250 [doi]
- Multi-party Quantum Secure Direct CommunicationXiaoqing Tan, Xiaoqian Zhang, Cui Liang. 251-255 [doi]
- An Enhancement for Key Management in LTE/SAE X2 Handover Based on Ciphering Key ParametersQinshu Xiao, Wenan Zhou, Baojiang Cui, Lingrong Li. 256-261 [doi]
- Comprehensive Evaluation Method of Reliability of Internet of ThingsLi Yong-Fei, Tian Li-Qin. 262-266 [doi]
- Self-Certified Public Auditing for Data Integrity in Cloud StorageJianhong Zhang, Weina Zeng. 267-273 [doi]
- An Asynchronous Periodic Sequential Patterns Mining Algorithm with Multiple Minimum Item SupportsXiang-Zhan Yu, Haining Yu. 274-281 [doi]
- Computer-Aided Enterprise ManagementLidia Ogiela, Marek R. Ogiela. 282-285 [doi]
- Intelligent Bio-inspired Approach for Secrecy Management in the CloudMarek R. Ogiela, Lidia Ogiela, Urszula Ogiela. 286-289 [doi]
- Recognition of Body Movements Patterns for Immersive Virtual Reality System InterfaceTomasz Hachaj, Marek R. Ogiela. 290-294 [doi]
- Linguistic Approach to Modeling of Coronary Arteries in Semantic Techniques of Image RetrievalMiroslaw Trzupek, Marek R. Ogiela. 295-299 [doi]
- 'NoSQL' and Electronic Patient Record Systems: Opportunities and ChallengesPhilip Moore, Tarik Qassem, Fatos Xhafa. 300-307 [doi]
- Emerging Technologies for Monitoring Behavioural and Psychological Symptoms of DementiaTarik Qassem, George Tadros, Philip Moore, Fatos Xhafa. 308-315 [doi]
- Discovering Many-to-One Causality in Software Project Risk AnalysisWeiqi Chen, Kang Liu, Lijun Su, Mei Liu, Zhifeng Hao, Yong Hu, Xiangzhou Zhang. 316-323 [doi]
- Photon Pulses based Heterodyne Detection Precision Ranging SystemLi-Xia Lei, Yue-Jin Zhang. 324-328 [doi]
- Secure Personal Health Record System with Attribute-Based Encryption in Cloud ComputingHongyang Yan, Xuan Li, Jin Li. 329-332 [doi]
- Medical Image Feature Extraction and Fusion Algorithm Based on K-SVDHongli Chen, Zhaohua Huang. 333-337 [doi]
- Multiple Nested Schema of HBase for Migration from SQLGansen Zhao, Libo Li, Zijing Li, Qiaoying Lin. 338-343 [doi]
- Adaptive Cloud Bandwidth Rental and Allocation StrategyHongli Chen, Shanguo Lv. 344-349 [doi]
- An Algorithm of Video Network Transmission Based on Unbalanced Multiple Description CodingShanguo Lv, Yiqin Cao. 350-354 [doi]
- Schema Conversion Model of SQL Database to NoSQLGansen Zhao, Qiaoying Lin, Libo Li, Zijing Li. 355-362 [doi]
- New Data Publishing Framework in the Big Data EnvironmentsJun Yang, Zheli Liu, Chunfu Jia, Kai Lin, Zijing Cheng. 363-366 [doi]
- A Dynamic Multiple Digital Watermarking Model based on Temporal SeriesXiaoyi Zhou, Jixin Ma, Wencai Du, Yihong Li. 367-371 [doi]
- Security Analysis of TAU Procedure in LTE NetworkLi Qiang, Wenan Zhou, Baojiang Cui, Liu Na. 372-376 [doi]
- Design of a New EPON Connection Automatic Protection SystemLi-Xia Lei, Yue-Jin Zhang. 377-381 [doi]
- All-Optical Signal Processing with New DPSK Based on Multi-dimensional ComplexDan Zou, Yan Mei. 382-385 [doi]
- Distribution Properties and 2-Adic Complexity of Clock-Controlled FCSR SequencesLishan Ke, Zhiqiang Lin. 386-389 [doi]
- Research of Trust Model Personalized Dynamic Recommendation System Based on Auction MechanismShanguo Lv, Hongli Chen. 390-393 [doi]
- A Cost-Energy Trade-Off Model in Smart Energy GridsUgo Gentile, Stefano Marrone, Nicola Mazzocca, Roberto Nardone. 394-399 [doi]
- A Semantic Access Control for Easy Management of the Privacy for EHR SystemsMario Sicuranza, Mario Ciampi. 400-405 [doi]
- A Modeling Profile for Availability Analysis of Composite Cloud ServicesFlora Amato, Francesco Moscato. 406-413 [doi]
- Mobile Traffic Analysis Exploiting a Cloud Infrastructure and Hardware AcceleratorsMario Barbareschi, Alessandra De Benedictis, Antonino Mazzeo, Antonino Vespoli. 414-419 [doi]
- A Distributed Information Extraction System Integrating Ontological Knowledge and Probabilistic ClassifiersAnita Alicante, Massimo Benerecetti, Anna Corazza, Stefano Silvestri. 420-425 [doi]
- An Automatic Method for Deriving OWL Ontologies from XML DocumentsAniello Minutolo, Angelo Esposito, Mario Ciampi, M. Esposito, G. Cassetti. 426-431 [doi]
- Automatic Population of Italian Medical Thesauri: A Morphosemantic ApproachFlora Amato, Annibale Elia, Alessandro Maisto, Antonino Mazzeo, Serena Pelosi. 432-436 [doi]
- Interactive Headphones for a Cloud 3D Audio ApplicationDaniela D'Auria, Dario Di Mauro, Davide Maria Calandra, Francesco Cutugno. 437-442 [doi]
- Research on Online Measurement Method of Smartphone Energy ConsumptionJie Ma, Haiyang Yu, Xiaoli Gong, Xiaoyu Zhang. 443-447 [doi]
- A Novel Framework for Application of Cloud Computing in Wireless Mesh NetworksRan Li, Qingqing Liu, Mingqiang Wang, Xianglin We. 448-452 [doi]
- Performance Overhead of Xen on Linux 3.13 on ARM Cortex-A7Xiaoli Gong, Qi Du, Xu Li, Jin Zhang, Ye Lu. 453-456 [doi]
- GMCR: A Novel Scheme for Improving Quality of Service of Live StreamingGuomin Zhang, Chao Hu, Na Wang, Xianglin Wei, Chang-you Xing. 457-462 [doi]
- A General Framework for Detecting Malicious Peers in Reputation-Based Peer-to-Peer SystemsXianglin Wei, Jianhua Fan, Ming Chen 0003, Guomin Zhang. 463-468 [doi]
- Optimizational Method of HBase Multi-dimensional Data Query Based on Hilbert Space-Filling CurveQingcheng Li, Ye Lu, Xiaoli Gong, Jin Zhang. 469-474 [doi]
- An Enhanced Secure Mechanism of Low Level Reader Protocol (LLRP) V1.1Bing Zhao, Ziyue Wang, Baojiang Cui, Xiaobing Liang. 475-480 [doi]
- Mining Mobile Internet Packets for Malware DetectionHaifeng Jin, Baojiang Cui, Jianxin Wang. 481-486 [doi]
- Reverse Analysis Method of Static XSS Defect Detection Technique Based on Database Query LanguageBaojiang Cui, Baolian Long, Tingting Hou. 487-491 [doi]
- Program Crash Analysis Based on Taint AnalysisZhang Puhan, Wu Jianxiong, Wang Xin, Zehui Wu. 492-498 [doi]
- Sentence Similarity Based on Semantic Vector ModelJingling Zhao, Huiyun Zhang, Baojiang Cui. 499-503 [doi]
- Analysis on Password Protection in Android ApplicationsShuai Shao, Guowei Dong, Tao Guo, Tianchang Tang, Chenjie Shi. 504-507 [doi]
- A RFID Mutual Authentication Security Protocol Design and AnalysisXiaobing Liang, Yingjie Lv, Bing Zhao, Ying Liu, Zhiqiang Sun, Wei Cen. 508-512 [doi]
- JavaScript Malicious Codes Analysis Based on Naive Bayes ClassificationYongle Hao, Hongliang Liang, Daijie Zhang, Qian Zhao, Baojiang Cui. 513-519 [doi]
- OpenSSL HeartBleed: Security Management of Implements of Basic ProtocolsYongle Hao, Yizhen Jia, Baojiang Cui, Wei Xin, Dehu Meng. 520-524 [doi]
- A Digital Watermarking Algorithm of Color Image based on Visual Cryptography and Discrete Cosine TransformYanyan Han, Wencai He, Shuai Ji, Qing Luo. 525-530 [doi]
- Automatic Generation Algorithm of Penetration Graph in Penetration TestingXueqiu, Qiong Jia, Shuguang Wang, Chunhe Xia, Liangshuang Lv. 531-537 [doi]
- Research and Prevention of Rogue AP Based MitM in Wireless NetworkMengru Cai, Zhendong Wu, Jianwu Zhang. 538-542 [doi]
- Improved EAP-AKA Protocol Based on Redirection DefenseBinbin Yu, Jianwu Zhang, Zhendong Wu. 543-547 [doi]
- A Statistical Integrity Authentication Scheme without Grouping for Streaming DataXi Shi. 548-552 [doi]
- Virus-Evolutionary Genetic Algorithm Based Selective Ensemble for SteganalysisFuqiang Di, Minqing Zhang, Jia Liu. 553-558 [doi]
- Encrypted Botnet Detection SchemeWang Ying. 559-565 [doi]
- Challenges and Trends of Big Data AnalyticsHui Li, Xin Lu. 566-567 [doi]
- Mobile Security Apps: Loyal Gaurds or Hypocritical Thieves?Yonglin Sun, Yongjun Wang, XiaoBin Wang. 568-572 [doi]
- Evaluation of Division Based Broadcasting System Considering Additional InformationYusuke Gotoh, Akihiro Kimura. 573-578 [doi]
- Experimental Deployment of a Multi-channel Wireless Backbone Network Based on an Efficient Traffic Management FrameworkYuzo Taenaka, Masaki Tagawa, Kazuya Tsukamoto. 579-584 [doi]
- DTLS for Lightweight Secure Data Streaming in the Internet of ThingsRoy Fisher, Gerhard P. Hancke. 585-590 [doi]
- A Study of Robustness Enhancement Technique on P2P Sensor Data Stream Delivery System Using Distributed HashingTomoya Kawakami, Yoshimasa Ishi, Tomoki Yoshihisa, Yuuichi Teranishi. 591-596 [doi]
- An Evaluation of a P2P Sensor Data Streaming System Considering the Number of Hops on the PIAX TestbedYoshimasa Ishi, Tomoya Kawakami, Tomoki Yoshihisa, Yuuichi Teranishi. 597-602 [doi]
- Integrated Technical Planning for Regional Smart GridZhengrong Wu, Aidong Xu, Tao Zhang, Chuanlin Chen. 603-608 [doi]
- WDM-PON Breakpoint Precision Detection System Based Broadband Chaos LightDan Zou, Yue-Jin Zhang. 609-615 [doi]
- Malicious Code Detection Using Opcode Running Tree RepresentationYuxin Ding, Wei Dai, Yibin Zhang, Chenglong Xue. 616-621 [doi]
- An Efficient Time-Frequency Domain Speech Perceptual Hashing Authentication Algorithm Based on Discrete Wavelet TransformQiu-yu Zhang, Peng-Fei Xing, Yi-Bo Huang, Rui-Hong Dong, Zhong-Ping Yang. 622-627 [doi]
- Performance of Space Network Time Synchronization Protocol in Proximity LinkXiang Lu, Jianxun Liu. 628-632 [doi]