Abstract is missing.
- Biomedical Big Data Analytics for Patient-Centric and Outcome-Driven Precision HealthMay D. Wang. 1-2 [doi]
- Message from the SAPSE 2015 Workshop OrganizerStelvio Cimato. 3 [doi]
- Towards a Secure Database Integration Using SLA in a Multi-cloud ContextNadia Bennani, Chirine Ghedira Guegan, Genoveva Vargas-Solar, Martin A. Musicante. 4-9 [doi]
- An Adaptive Learning Model for k-Anonymity Location Privacy ProtectionGayathri Natesan, Jigang Liu. 10-16 [doi]
- Message from the CFSE 2015 Workshop OrganizersRyôichi Sasaki, Tetsutaro Uehara, Jigang Liu. 17 [doi]
- A Technique for Measuring Data Persistence Using the Ext4 File System JournalKevin D. Fairbanks. 18-23 [doi]
- Proposal and Evaluation of Methods Using the Quantification Theory and Machine Learning for Detecting C&C Server Used in a BotnetShota Okayasu, Ryôichi Sasaki. 24-29 [doi]
- Segmentation of Forensic Latent Fingerprint Images Lifted Contact-Less from Planar Surfaces with Optical Coherence TomographyRethabile Khutlang, Fulufhelo Vincent Nelwamondo, Ann Singh. 30-34 [doi]
- Enhancment of Image Tampering Detection Using JPEG's Quantization and Re-interpolation ProcessesSongpon Teerakanok, Tetsutaro Uehara. 35-39 [doi]
- Proposal for Combinatorial Optimization Technology in Consideration of the Dynamic Characteristic of IT RisksYuhei Umehara, Hayai Ando, Ryôichi Sasaki. 40-46 [doi]
- Performing an APT Investigation: Using People-Process-Technology-Strategy Model in Digital Triage ForensicsDa-Yu Kao. 47-52 [doi]
- Fog Computing: Issues and Challenges in Security and ForensicsYifan Wang, Tetsutaro Uehara, Ryôichi Sasaki. 53-59 [doi]
- Message from the MidCCI 2015 Workshop OrganizersToyokazu Akiyama, Hideaki Goto, Shuo-Yan Chou. 60 [doi]
- A Novel Approach for User Authentication to Industrial Components Using QR CodesAlexander Borisov. 61-66 [doi]
- A Traceable and Pseudonymous P2P Information Distribution SystemNaoki Tsujio, Yasuo Okabe. 67-72 [doi]
- An Extended CP-ABE Based Access Control Model for Data Outsourced in the CloudSomchart Fugkeaw, Hiroyuki Sato. 73-78 [doi]
- Basic Study on the Method for Real-Time Video Streaming with Low Latency and High Bandwidth EfficiencyShoichi Ando, Yu-ichi Hayashi, Takaaki Mizuki, Hideaki Sone. 79-82 [doi]
- Message from the SSS-MediComp 2015 Workshop OrganizersShuo-Yan Chou, Ji-Jiang Yang, Yang Li, Kwang-Jae Kim, Ji-Jiang Yang, JianQiang Li, Sheikh Iqbal Ahamed. 83 [doi]
- Developing Acceptance Policies for a Stochastic Single-Resource Revenue Management ProblemDebby Rahmi Isnaeni, Shuo-Yan Chou, Phan Nguyen Ky Phuc, Cheng-Hung Wu. 84-88 [doi]
- A Survey and Preliminary Research on Service Federation Based Modeling and SimulationXiao Song, Feng Li, Lin Zhang. 89-94 [doi]
- Using a Combination Method of MDS and SOM to Visually Analyze Postpartum Depression DomainXi Meng, Ruifang Shen, JianQiang Li, Jijiang Yang. 95 [doi]
- Message from the STPSA 2015 Workshop OrganizersFarzana Rahman, Chunfu Jia. 96 [doi]
- Case Base for Secure Software Development Using Software Security Knowledge BaseAtsuo Hazeyama, Masahito Saito, Nobukazu Yoshioka, Azusa Kumagai, Takanori Kobashi, Hironori Washizaki, Haruhiko Kaiya, Takao Okubo. 97-103 [doi]
- User Rank: A User Influence-Based Data Distribution Optimization Method for Privacy Protection in Cloud Storage SystemChang Guo, Qingni Shen, Yahui Yang, Zhonghai Wu. 104-109 [doi]
- Privacy Assurance in Data-Aggregation for Multiple MAX TransactionsKim T. Le, Parmesh Ramanathan, Kewal K. Saluja. 110-115 [doi]
- Health Capital Depreciation and Medical Care Demand: An Empirical Study of Taiwan's Senior CitizensJwu Rong Lin, Ching-Yu Chen, Shuo-Chun Weng. 116-119 [doi]
- Message from the ADMNET 2015 Workshop OrganizersNariyoshi Yamai, Mario Köppen, Youngseok Lee. 120 [doi]
- A Meta-Heuristic Load Balancer for Cloud Computing SystemsLeszek Sliwko, Vladimir Getov. 121-126 [doi]
- Design and Implementation of Client IP Notification Feature on DNS for Proactive Firewall SystemTomokazu Otsuka, Gada, Nariyoshi Yamai, Kiyohiko Okayama, Yong Jin. 127-132 [doi]
- On Estimating Message Diffusion Dynamics in Epidemic BroadcastingYuta Hashimoto, Hiroyuki Ohsaki. 133-138 [doi]
- or: How I Learned to Stop Worrying and Love Cloud ComputingHiroki Kashiwazaki. 139-140 [doi]
- Learning from Before and After Recovery to Detect Latent MisconfigurationHiroshi Otsuka, Yukihiro Watanabe, Yasuhide Matsumoto. 141-148 [doi]
- Optimization of Storage Quota Based on User's Usage DistributionYoshiaki Kasahara, Takuya Kawatani, Eisuke Ito, Koichi Simozono, Naomi Fujimura. 149-154 [doi]
- Flow-Aware Congestion Control to Improve Throughput under TCP Incast in Datacenter NetworksChunghan Lee, Yukihiro Nakagawa, Kazuki Hyoudou, Shinji Kobayashi, Osamu Shiraki, Takeshi Shimizu. 155-162 [doi]
- Message from the QUORS 2015 Workshop OrganizersXiaodong Liu, Hongji Yang. 163 [doi]
- Interface Information Management Tools for the Maritime and Oil and Gas IndustryJingyue Li, Torbjørn Skramstad, Thierry Coq. 164-169 [doi]
- Efficient Deployment of Content Applications in a Cloud EnvironmentLung-Pin Chen, Ruey-Kai Sheu, William C. Chu. 170-174 [doi]
- Developing a Research Ideas Creation System through Reusing Knowledge Bases for Ontology ConstructionDelin Jing, Hongji Yang, Meiyu Shi, Wei Zhu. 175-180 [doi]
- Message from the CDS 2015 Workshop OrganizersNorihiro Ishikawa, Yoshia Saito, Akimitsu Kanzaki, Kazuhiro Kitagawa, Noriko Arai. 181 [doi]
- Data Management Scheme to Enable Efficient Analysis of Sensing Data for Smart CommunityYuichi Hashi, Kazuyoshi Matsumoto, Yoshinori Seki, Masahiro Hiji, Toru Abe, Takuo Suganuma. 182-187 [doi]
- Design and Implementation of an On-Demand Home Power Management System Based on a Hierarchical ProtocolTomotaka Maeda, Hiroki Nakano, Naoyuki Morimoto, Kazumi Sakai, Yasuo Okabe. 188-193 [doi]
- Proposal of Linear Approximation of Household Fuel Cells and Small-Scale Community Energy Management SystemTakaaki Ushioda, Motomu Toyokawa, Shigeo Kaneda. 194-199 [doi]
- Development of ECHONET Lite-Compliant Home Appliances Control System Using PUCC Protocols from Smart DevicesShohei Saito, Norihiro Ishikawa, Yosuke Tsuchiya. 200-204 [doi]
- An Agile Framework for Real-Time Motion TrackingSaikat Basu, Robert DiBiano, Manohar Karki, Malcolm Stagg, Jerry Weltman, Supratik Mukhopadhyay, Sangram Ganguly. 205-210 [doi]
- Hand-Gesture Recognition System by Using Microwave Doppler SensorsShigeo Kaneda, Yusuke Kubota, Tomohito Kurokawa, Takeshi Furuhata. 211-216 [doi]
- An Event Data Extraction Method Based on HTML Structure Analysis and Machine LearningChenyi Liao, Kei Hiroi, Katsuhiko Kaji, Nobuo Kawaguchi. 217-222 [doi]
- Agent-Oriented Cooperation of IoT Devices Towards Advanced LogisticsTakumi Kato, Ryo Chiba, Hideyuki Takahashi, Tetsuo Kinoshita. 223-227 [doi]
- Dynamic Reconfigurable Wireless Connection between Smartphone and GatewayKouichi Yasaki, Hidenobu Ito, Kazuaki Nimura. 228-233 [doi]
- Design Strategies for Building Mobile Crowdsourcing ServicesMizuki Sakamoto, Tatsuo Nakajima, Sayaka Akioka. 234-239 [doi]
- A Mobile Augmented Reality Service Model Based on Street Data, and Its ImplementationJun Lee, Jeonghwan Lee, Sora Lim, Yongjin Kwon. 240-247 [doi]
- Message from the NETSAP 2015 Workshop OrganizersYoshiaki Hori, Yutaka Miyake, Chung-Huang Yang. 248 [doi]
- Security Design for Configuration Management of Android DevicesCheng-Liang Kuo, Chung-Huang Yang. 249-254 [doi]
- Malware Detection Systems Based on API Log Data MiningChun-I Fan, Han-Wei Hsiao, Chun-Han Chou, Yi-Fan Tseng. 255-260 [doi]
- Web Server Protection against Application Layer DDoS Attacks Using Machine Learning and Traffic AuthenticationJema David Ndibwile, A. Govardhan, Kazuya Okada, Youki Kadobayashi. 261-267 [doi]
- A Simulation Approach to Quantify Network Survivability on MANETsZhipeng Yi, Tadashi Dohi. 268-273 [doi]
- Message from the ESAS 2015 Workshop OrganizersAtilla Elçi, Duygu Çelik. 274-275 [doi]
- An Ontology-Enabled Service Discovery for Supporting Health Promotion SystemSatriya Dinata, Anindhita Dewabharata, Shuo-Yan Chou. 276-281 [doi]
- mAAS - A Mobile Ambulatory Assessment System for Alcohol Craving StudiesRuiqi Shi, Zhang Chen, Haidong Wang, Peng Sun, Timothy Trull, Yi Shang. 282-287 [doi]
- Towards an Applied Oral Health Ontology: A Round Trip between Clinical Data and Experiential Medical KnowledgeLetong Feng, Yanqing Li, Lin Liu, Xiaojun Ye, Jianmin Wang, Zhanqiang Cao, Xin Peng. 288-295 [doi]
- Message from the SIMICE 2015 Workshop OrganizersBian Yang, Julien Bringer. 296 [doi]
- Developing Metrics for Surveillance Impact AssessmentYi-Ching Liao, Hanno Langweg. 297-302 [doi]
- An Adaptive Improved Winnow AlgorithmQiong Li, Shuming Wang, Haokun Mao, Qi Han, Xiamu Niu. 303-306 [doi]
- A Security Protocol Applied to Covert Communication Platform and Its Formal AnalysisYi-Jia Zhang, Rui-Ying Liu, Zhong-Jian Kang, Han Qi. 307-311 [doi]
- Using Honey Templates to Augment Hash Based Biometric Template ProtectionBian Yang, Edlira Martiri. 312-316 [doi]
- Message from the UCDAS 2015 Workshop OrganizersReyes Juárez-Ramírez, Andrés Mejía-Figueroa. 317 [doi]
- Context-Aware Framework for Performance Tuning via Multi-action EvaluationAsanga Nimalasena, Vladimir Getov. 318-323 [doi]
- Decision Supporting Approach under Uncertainty for Feature-Oriented Adaptive SystemHyo-Cheol Lee, Seok-Won Lee. 324-329 [doi]
- Applying Game Theoretic Approach to Goal-Driven Requirements Trade-Off Analysis for Self-AdaptationKwan Hong Lee, Seok-Won Lee. 330-335 [doi]
- Experiment on Multi-attribute Sorting Panel in E-commerceDongning Yan. 336-341 [doi]
- Message from the SSERV 2015 Workshop OrganizerTakao Terano. 342 [doi]
- Cost Efficiency of Web Systems in Municipal Governments of JapanYoshiaki Ono, Setsuya Kurahashi. 343-348 [doi]
- Verification of Patent Document Similarity of Using Dictionary Data Extracted from Notification of Reasons for RefusalKyoko Yanagihori, Kazuhiko Tsuda. 349-354 [doi]
- Design and Development of a Distributed Mobile Sensing Based Crowd Evacuation System: A Big Actor ApproachP. Govind Raj, Subrat Kar. 355-360 [doi]
- Analyzing the Validity of Smart Beta in Financial Markets through Agent-Based ModelingHiroshi Takahashi. 361-366 [doi]
- A Study on Shop-Around Agent Simulation Considering Attractiveness for Impulse StopMakoto Sonohara, Yoshinori Natsume, Toshiyuki Kaneda. 367-372 [doi]
- Message from the MVDA 2015 Workshop OrganizersLeila Jemni Ben Ayed, Fevzi Belli, Ahlem Ben Younes, Yousra Bendaly Hlaoui. 373-374 [doi]
- Dynamic Query Scheduling for Online Integration of Semistructured DataHandoko, Janusz R. Getta. 375-380 [doi]
- A Reduction Method for Process and System Complexity with Conjunctive and Complement Choices in a Process AlgebraWoorim Choi, Yeongbok Choe, Moonkun Lee. 381-386 [doi]
- Personalized and Generic E-assessment Process Based on Cloud ComputingFahima Hajjej, Yousra Bendaly Hlaoui, Leila Jemni Ben Ayed. 387-392 [doi]
- Dynamic Data Replication-Driven Model in Data GridsRahma Souli-Jbali, Minyar Sassi Hidri, Rahma Ben Ayed. 393-397 [doi]
- LTL Model Cheking of Service-Based Business Processes in the CloudKais Klai, Hanen Ochi. 398-403 [doi]
- Towards to Compose Cloud Service Flexible Workflow ApplicationsImen Ben Fraj, Yousra Bendaly Hlaoui, Ahlem Ben Younes, Leila Jemni Ben Ayed. 404-409 [doi]
- Enhanced Scenario Model for Peer Assessment in iMOOCs Based on Semantic WebSamia Bachir, Lilia Cheniti-Belcadhi, Serge Garlatti. 410-415 [doi]
- Message from the STA 2015 Workshop OrganizersFevzi Belli, Rajesh Subramanyan. 416 [doi]
- Measurable Metrics for Qualitative Guidelines of Metamorphic RelationZhanwei Hui, Song Huang, Hui Li, Jian-Hao Liu, Li-Ping Rao. 417-422 [doi]
- Estimating the Total Number of Software Faults Reliability Models and Mutation Testing a Bayesian ApproachHarald A. Stieber. 423-426 [doi]
- Model Based Testing of VHDL ProgramsTolga Ayav, Tugkan Tuglular, Fevzi Belli. 427-432 [doi]
- Systematic Software Product Line Test Case Derivation for Test Data ReuseSungwon Kang, Haeun Baek, Jungmin Kim, Jihyun Lee. 433-440 [doi]
- Improving Precision of Java Script Program Analysis with an Extended Domain of IntervalsAstrid Younang, Lunjin Lu. 441-446 [doi]
- CovDroid: A Black-Box Testing Coverage System for AndroidChao-Chun Yeh, Shih-Kun Huang. 447-452 [doi]
- Message from the IWSC 2015 Workshop OrganizersStephen S. Yau, Wei-Tek Tsai, Kenji Takahashi, Xiaoying Bai, Helen D. Karatza. 453 [doi]
- Constraint-Based Multi-Tenant SaaS Deployment Using Feature Modeling and XML Filtering TechniquesYang Cao, Chung-Horng Lung, Samuel A. Ajila. 454-459 [doi]
- Adaptive Clustering Techniques for Software Components and ArchitectureDuo Liu, Chung-Horng Lung, Samuel A. Ajila. 460-465 [doi]
- Approach for Test Profile Optimization in Dynamic Random TestingYe Li, Bei-Bei Yin, Junpeng Lv, Kai-Yuan Cai. 466-471 [doi]
- Geographical Test Data Generation by Simulated-AnnealingKejia Hou, Jun Huang, Xiaoying Bai. 472-477 [doi]
- Message from the BIOT 2015 Workshop OrganizersHideya Ochiai, Susumu Takeuchi, Kurt Geihs, Ting-Yun Chi. 478 [doi]
- Context Aware Services: A Novel Trend in IoT Based Research in Smart City ProjectYashuchika Fujiwara, Keiji Yamada, Kenichi Tabata, Michio Oda, Kazuo Hashimoto, Takuo Suganuma, Abdur Rahim Biswas, Panagiotis Vlacheas, Vera Stavroulaki, Dimitris Kelaidonis, Andreas Georgakopoulos. 479-480 [doi]
- Real-Time Indoor Positioning System Based on RFID Heron-Bilateration Location Estimation and IMU Inertial-Navigation Location EstimationChian C. Ho, River Lee. 481-486 [doi]
- AnyControl - IoT Based Home Appliances Monitoring and ControllingDongyu Wang, Dixon Lo, Janak Bhimani, Kazunori Sugiura. 487-492 [doi]
- Internet of Things-Based Temperature Tracking SystemAmir Atabekov, Marcel Starosielsky, Dan Chia-Tien Lo, Jing Selena He. 493-498 [doi]
- From Internet of Things Mashups to Model-Based DevelopmentChristian Prehofer, Luca Chiarabini. 499-504 [doi]
- Real Time Power Capping with Smart Circuit Breaker to Maximize Power Utilization of Local GeneratorHiroyuki Ikegami, Raja Vara Prasad Yerra, Pachamuthu Rajalakshmi, Hiroshi Esaki. 505-510 [doi]
- Neural Network Based Short Term Forecasting Engine to Optimize Energy and Big Data Storage Resources of Wireless Sensor NetworksRaja Vara Prasad Yerra, Pachamuthu Rajalakshmi. 511-516 [doi]
- IEEE1888 Interactive Display as a Service (IDaaS): Example in Building Energy Management SystemPreecha Khawsa-Ard, Chaodit Aswakul. 517-522 [doi]
- Performance Comparison of IP and CCN as a Communication Infrastructure for Smart GridHiroyuki Ohsaki, Yoichi Nakamoto, Nobuhiro Yokoi, Hirotaka Moribe. 523-528 [doi]
- A Node Replication Method to Guarantee Reachability for P2P Sensor Data Stream Delivery System on Heterogeneous Churn SituationsTomoya Kawakami, Yoshimasa Ishi, Tomoki Yoshihisa, Yuuichi Teranishi. 529-534 [doi]
- Message from the DSA 2015 Workshop OrganizerBaowen Xu. 535 [doi]
- Formal Modeling and Verification of the Safety Critical Fire-Fighting Control SystemYa Wang, Rui Wang, Yong Guan, Xiaojuan Li, Hongxing Wei, Jie Zhang. 536-541 [doi]
- A Clustering-Bayesian Network Based Approach for Test Case PrioritizationXiaobin Zhao, Zan Wang, Xiangyu Fan, Zhenhua Wang. 542-547 [doi]
- Spectrum-Based Fault Localization Method with Test Case ReductionXiaohong Zhang, Ziyuan Wang, Weifeng Zhang, Hui Ding, Lin Chen. 548-549 [doi]
- Behavior Verification of Autonomous Robot Vehicle in Consideration of Errors and DisturbancesToshifusa Sekizawa, Fumiya Otsuki, Kazuki Ito, Kozo Okano. 550-555 [doi]
- Dependence Based Model-HealingYue Wang, Zheng Li, Ruilian Zhao. 556-561 [doi]
- Unified Programming Model and Software Framework for Big Data Machine Learning and Data AnalyticsRong Gu, Yun Tang, Qianhao Dong, Zhaokang Wang, Zhiqiang Liu, Shuai Wang, Chunfeng Yuan, Yihua Huang. 562-567 [doi]
- Replay Debugging of Real-Time Vxworks ApplicationsChunlei Ma, Xiang Long, Bo Jiang, Zhenyu Zhang. 568-573 [doi]
- A Model for Assessing the Dependability of Internetware Software SystemsHuiqun Zhao, Jing Sun, Ruixue Zhao. 578-581 [doi]
- An Agent-Based Self-Adaptive Mechanism with Reinforcement LearningDanni Yu, Qingshan Li, Lu Wang, Yishuai Lin. 582-585 [doi]
- Analyzing Lifecycle Behavior of Android Application ComponentsShin Nakajima. 586-591 [doi]
- Software for Wearable Devices: Challenges and OpportunitiesHe Jiang, Xin Chen, Shuwei Zhang, Xin Zhang, Weiqiang Kong, Tao Zhang. 592-597 [doi]
- An Architecture for Cloud Service Testing and Real Time ManagementWin-Tsung Lo, Xiao-Long Liu, Ruey-Kai Sheu, Shyan-Ming Yuan, Chun-Yu Chang. 598-603 [doi]
- Detecting SQL Vulnerability Attack Based on the Dynamic and Static Analysis TechnologyYaohui Wang, Dan Wang, Wenbing Zhao 0002, Yuan Liu. 604-607 [doi]
- Message from the Chair of the Student Research SymposiumW. Eric Wong. 608 [doi]
- An Implementation of Just-in-Time Fault-Prone Prediction Technique Using Text ClassifierKeita Mori, Osamu Mizuno. 609-612 [doi]
- Ultralightweight RFID Reader-Tag Mutual AuthenticationYu-Chung Huang, Jehn-Ruey Jiang. 613-616 [doi]
- Performance Comparison of Geographic DTN Routing AlgorithmsMisako Seki, Kazumine Ogura, Yasuhiro Yamasaki, Hiroyuki Ohsaki. 617-620 [doi]
- Performance Evaluation of an Open-Source Implementation of Content-Centric NetworkingRyo Nakamura, Hiroyuki Ohsaki. 621-624 [doi]
- Detecting MITM Based on Challenge Request ProtocolLabiblais Rahman. 625-626 [doi]
- Construction of a Green Power Virtual Machine Management Method on OpenStackChien-Chih Chen, Chao-Tung Yang, Shuo-Tsung Chen, Fang-Yie Leu, Jung-Chun Liu. 627-630 [doi]
- Implementation of Network Traffic Monitor System with SDNYao-Yu Yang, Chao-Tung Yang, Shuo-Tsung Chen, Wei-Hsun Cheng, Fuu-Cheng Jiang. 631-634 [doi]
- Message from the Fast Abstract ChairsHossain Shahriar, Stelvio Cimato, Jingyu Zhou, Katsuyoshi Iida. 635 [doi]
- Design and Development of a Cloud-Based Trip-Tracking SystemThanh An Nguyen Thi, Yaw-Chung Chen. 636-637 [doi]
- Fast and Cost-Effective Load Balancing Method for Range Queriable Cloud StorageXun Shao, Masahiro Jibiki, Yuuichi Teranishi, Nozomu Nishinaga. 638-639 [doi]
- Improved Handover Using Cloud Control in Heterogeneous Wireless NetworksRyota Ishikawa, Katsuyoshi Iida, Hiroyuki Koga, Masayoshi Shimamura. 640-641 [doi]
- Semantic Enriched Category Recommendation System for Large-Scale Emails Exploiting Big Data Processing TechnologiesJae-Ik Kim, Kyung-Wook Park, Hyung-Rak Jo, Dong-Ho Lee. 642-643 [doi]
- A Semantic Category Recommendation System Exploiting LDA Clustering Algorithm and Social FolksonomyHyung-Rak Jo, Kyung-Wook Park, Jae-Ik Kim, Dong-Ho Lee. 644-645 [doi]
- Cooperative Cache Distribution System for Virtual P2P Web ProxyKazuki Matsushita, Masashi Nishimine, Kazunori Ueda. 646-647 [doi]
- A Novel Semantic Tagging Technique Exploiting Wikipedia-Based Associated WordsHyun-Ki Hong, Kyung-Wook Park, Dong-Ho Lee. 648-649 [doi]
- A Read-Optimized Index Structure for Distributed Log-Structured Key-Value StoreIn-Su Kang, Bo-kyeong Kim, Dong-Ho Lee. 650-651 [doi]
- On the Impact of Scale-Free Structure on End-to-End TCP PerformanceYusuke Sakumoto, Hiroyuki Ohsaki. 652-653 [doi]
- A Semantic-Based Health Advising System Exploiting Web-Based Personal Health Record ServicesGun-Woo Kim, Kyung-Wook Park, Dong-Ho Lee. 654-655 [doi]
- Using Binding Bigraphs to Model Context-Aware Adaptive ApplicationsDong Xu, Jingjing Wang. 656-657 [doi]
- Software as a High-Tech Weapon in Ireland's StrategyClare McInerney, Tiziana Margaria. 658-663 [doi]
- Pair Programming for Enhancing Communication in the Fundamental C Language ExerciseWeiwei Du, Motoyuki Ozeki, Hiroki Nomiya, Kazuyoshi Murata, Masahiro Araki. 664-665 [doi]
- Breakpoint-Based Lightweight Prefetching to Improve Application ResponseHaegeon Jeong, Jiwoong Won, Jaemyoun Lee, Kyungtae Kang, Junhee Ryu. 666-667 [doi]
- Model Driven Development by Separating Concerns in UML Requirements SpecificationSatoshi Kawai, Saeko Matsuura. 668-669 [doi]
- Automated Assessment in MathematicsAlice Barana, Marina Marchisio, Sergio Rabellino. 670-671 [doi]
- Test Script Generation Based on Design Documents for Web Application TestingHaruto Tanno, Xiaojing Zhang. 672-673 [doi]
- Detection Method of DNS-based Botnet Communication Using Obtained NS Record HistoryHikaru Ichise, Yong Jin, Katsuyoshi Iida. 676-677 [doi]
- Redesigning QR Code Ecosystem with Improved Mobile SecurityL. Roger Yin, Jiazhen Zhou, Maxwell K. Hsu. 678-679 [doi]
- A KEM/DEM-Based Construction for Secure and Anonymous CommunicationKeita Emura, Akira Kanaoka, Satoshi Ohta, Takeshi Takahashi. 680-681 [doi]
- DHT Extension of m-Cloud - Scalable and Distributed Privacy Preserving Statistical Computation on Public CloudIkuo Nakagawa, Yoshifumi Hashimoto, Mitsuharu Goto, Masahiro Hiji, Yutaka Kikuchi, Masahiro Fukumoto, Shinji Shimojo. 682-683 [doi]
- Provenance Research Issues and Challenges in the Big Data EraAlfredo Cuzzocrea. 684-686 [doi]
- Concept Representation and Its Role in Artifact DevelopmentBayu Tenoyo, Petrus Mursanto. 687-692 [doi]