Abstract is missing.
- Robinia-BLAST: An Extensible Parallel BLAST Based on Data-Intensive Distributed ComputingYang Gu, Zhenchun Huang. 1-6 [doi]
- Quality of Service (QoS)-Guaranteed Network Resource Allocation via Software Defined Networking (SDN)Anand V. Akella, Kaiqi Xiong. 7-13 [doi]
- A Finite State Hidden Markov Model for Predicting Multistage Attacks in Cloud SystemsHisham A. Kholidy, Abdelkarim Erradi, Sherif Abdelwahed, Abdulrahman Azab. 14-19 [doi]
- Effective SBML Protocol for Tolerating Concurrent Failures Based on Broadcast NetworksJinHo Ahn, Yoohwan Kim. 20-25 [doi]
- Towards Thwarting Data Leakage with Memory Page Access InterceptionYan Wen, Jinjing Zhao, Hua Chen. 26-31 [doi]
- Towards Argumentation Schemes for Open Systems DependabilityHiroyuki Kido, Yukio Ohsawa, Makoto Hirai, Yoshifumi Yuasa, Toshinori Takai. 32-38 [doi]
- A Multi-use CCA-Secure Proxy Re-encryption SchemeYi Cai, Xudong Liu. 39-44 [doi]
- Application-Aware Byzantine Fault ToleranceWenbing Zhao. 45-50 [doi]
- A Study of Security Requirements NegotiationXinfeng Ye. 51-56 [doi]
- An Approach of Discovering Causal Knowledge for Alert Correlating Based on Data MiningXuewei Feng, Dongxia Wang, Minhuan Huang, Xiaoxia Sun. 57-62 [doi]
- Android App Protection via Interpretation ObfuscationJunliang Shu, Juanru Li, Yuanyuan Zhang, Dawu Gu. 63-68 [doi]
- Hunter: Online Accurate Taint Propagation Analysis Based System for Detecting Bugs in BinariesGen Li 0002, Shuang Xi Wang, Ying Zhang, Xiaohui Peng. 69-74 [doi]
- Modelling Analysis and Auto-detection of Cryptographic Misuse in Android ApplicationsShuai Shao, Guowei Dong, Tao Guo, Tianchang Yang, Chenjie Shi. 75-80 [doi]
- The DWT Group Fingerprinting SchemeYong Zhao, Aixin Zhang, Songnian Lu. 81-84 [doi]
- Provably Secure Anonymous Multi-receiver Identity-Based Encryption with Shorter CiphertextHuaqun Wang. 85-90 [doi]
- A Novel Dynamic Ranked Fuzzy Keyword Search over Cloud Encrypted DataWang Jie, Yu Xiao, Zhao Ming, Wang Yong. 91-96 [doi]
- A Survey of Defense against P2P BotnetsWei Zhang, Yue Ji Wang, Xiao-Lei Wang. 97-102 [doi]
- Scalable Collaborative Filtering Recommendation Algorithm with MapReduceYang Shang, Zhiyang Li, Wenyu Qu, Yujie Xu, Zining Song, Xuefei Zhou. 103-108 [doi]
- Byzantine Fault Tolerant Event Stream Processing for Autonomic ComputingHua Chai, Wenbing Zhao 0001. 109-114 [doi]
- Fault Models of CMOS Gates: An Empirical Study Based on Mutation AnalysisXiaofeng Tang, Aiqiang Xu, Wenhai Li, Zhiyong Yang. 115-120 [doi]
- A Novel Vulnerability Detection Method for ZigBee MAC LayerHui Li, Weishi Zhang, Weifu Zhou, Bo Su. 121-124 [doi]
- Security Issues of Chen et al.'s Dynamic ID-Based Authentication SchemeMuhammad Khurram Khan, Saru Kumari, Xiaomin Wang, Rahul Kumar. 125-128 [doi]
- Power System Dynamic Voltage Stability Analysis Considering Wind PowerZhengjun Bi, Changzheng Gao. 129-132 [doi]
- Enhancing the Security of Parallel Programs via Reducing Scheduling SpaceXu Zhou, Gen Li 0002, Kai Lu, Shuangxi Wang. 133-138 [doi]
- Achieving Dependability of Cyber Physical Systems with Autonomic CoveringKaiyu Wan, Vangalur Alagar. 139-145 [doi]
- Load Balancing Task Scheduling Based on Genetic Algorithm in Cloud ComputingTingting Wang, Zhaobin Liu, Yi Chen, Yujie Xu, Xiaoming Dai. 146-152 [doi]
- Skyline Query Based on User Preference with MapReduceYuanyuan Li, Wenyu Qu, Zhiyang Li, Yujie Xu, Changqing Ji, Junfeng Wu. 153-158 [doi]
- Preference-Oriented Fixed-Priority Scheduling for Real-Time SystemsRehana Begam, Dakai Zhu, Hakan Aydin. 159-165 [doi]
- Source Code Annotated Memory Leak Detection for Soft Real Time Embedded Systems with Resource ConstraintsMabel Mary Joy, Wolfgang Müller 0003, Franz-Josef Rammig. 166-172 [doi]
- Fuzzy Search Controller in Unstructured Mobile Peer-to-Peer NetworksBabar Shah, ChungJae Lee, Ki-Il Kim. 173-178 [doi]
- A Low Overhead Last-Write-Touch Prediction SchemeJun Xia, Li Luo, Zhengbin Pang, Jun Zhang, Junsheng Chang. 179-183 [doi]
- A Ubiquitous Integrated Development Environment for C Programming on Mobile DevicesTyng-Yeu Liang, Hung-Fu Li, Yu-Chih Chen. 184-189 [doi]
- Energy-Efficient Scheduling for Real-Time Tasks on Uniform MultiprocessorsChin-Fu Kuo. 190-195 [doi]
- A Confidence-Based Software Voter for Safety-Critical SystemsMohammadreza Rezaee, Yasser Sedaghat, Masoud Khosravi Farmad. 196-201 [doi]
- A Spanning Tree Based Data Collection for Real-Time Streaming Sensor DataKyung Tae Kim, Jong Chang Park, Manyun Kim, Ung-Mo Kim, Hee Yong Youn. 202-207 [doi]
- An FPGA-Assisted Cloud Framework for Massive ECG Signal ProcessingShengyan Zhou, Yongxin Zhu, Chaojun Wang, Xiaoqi Gu, Jun Yin, Jiang Jiang, Guoguang Rong. 208-213 [doi]
- Distributed Collaborative Vehicle Tracking in Embedded Smart Camera NetworksYaying Zhang, Xiuqing Lu, Chen Ye. 214-218 [doi]
- Energy-Efficient Gossiping Protocol of WSN with Realtime Streaming DataByung Jun Lee, Ho Kuen Song, Youngho Suh, Kyung Hwan Oh, Hee Yong Youn. 219-224 [doi]
- Energy-Efficient Scheduling of Real-Time Tasks with Lock-Free ObjectsJun Wu. 225-230 [doi]
- MIMO Radar Algorithm Parallel Implementation Based on TMS320C6678Yantao Gao, Hao Gao, Xudong Zhang. 231-236 [doi]
- Mixed-Criticality Scheduling upon Varying-Speed MultiprocessorsZhishan Guo, Sanjoy K. Baruah. 237-244 [doi]
- Parallel Implementation of Feasible Direction Algorithm for Large-Scale Sensor Network Location ProblemsChang Xiaokai, Xue Wei. 245-251 [doi]
- Performance Characterization of Web Applications with HTML5 EnhancementsXianfeng Li, Zhiqiang Bao. 252-258 [doi]
- A Novel Progressive Transmission in Mobile Visual SearchQi Zhang, Zhiyang Li, Yegang Du, Wenyu Qu, Xiaoxuan Zhang. 259-264 [doi]
- A Weighted Aggregation Rule in Crowdsourcing Systems for High Result AccuracyDejun Yue, Ge Yu, Derong Shen, Xiaocong Yu. 265-270 [doi]
- Cyber-Physical Directory with Optimized VisualizationJean Loup Lamothe, James She, Xiaoqi Tan. 271-276 [doi]
- Analyzing the Waiting Energy Consumption of NoSQL DatabasesTiantian Li, Ge Yu, Xuebing Liu, Jie Song. 277-282 [doi]
- A Wi-Fi Direct Based P2P Application Prototype for Mobile Social Networking in Proximity (MSNP)Yufeng Wang, Athanasios V. Vasilakos, Qun Jin, Jianhua Ma. 283-288 [doi]
- Modeling BPEL-Based Collaborations with Heterogeneous IoT DevicesSoo Dong Kim, Jae Yoo Lee, Dae Young Kim, Chun Woo Park, Hyun Jung La. 289-294 [doi]
- Performance Comparison of Source Routing Tactics for WSN of Grid TopologyWenxiang Li, Yunhe Wu, Chunsheng Zhu, Yajie Ma. 295-300 [doi]
- A Shape Clustering Based Framework for Fast Context-Sensitive Shape RetrievalHeng Qi, Haibo Xu, Keqiu Li, Jingyi Li. 301-304 [doi]
- A Matching Algorithm with Low Message Overhead for Sensor Relocation ProblemChien-Fu Cheng, Chih We Huang, Meng-Shiuan Pan. 305-309 [doi]
- A Novel Probabilistic Latent Semantic Analysis Based Image Blur MetricTao Zhang, Qi Zhang, Dequn Liang. 310-315 [doi]
- An Efficient Context Acquisition for 'n' Mobile AppsHyun Jung La, Jae Yoo Lee, Zhen Zhe Piao, Soo Dong Kim. 316-321 [doi]
- An Efficient ZigBee-WebSocket Based M2M Environmental Monitoring SystemKai Shuang, Xuan Shan, Zhengguo Sheng, Chunsheng Zhu. 322-326 [doi]
- Brain Image Segmentation Based on Hypergraph ModelingJicheng Hu, Xiaofeng Wei, Honglin He. 327-332 [doi]
- A Bitmap-Based Algorithm for Detecting Stealthy SuperpointsZhimin Li, Weijiang Liu, Zhiyang Li, Jingxia Sun. 333-337 [doi]
- Color Image Retrieval Using Visual Weighted BlocksJunfeng Wu, Zhiyang Li, Yujie Xu, Changqing Ji, Yuanyuan Li, Xufeng Xing. 338-343 [doi]
- Distributed Energy-Efficient Power Control Algorithm of Delay Constrained Traffic over Multi Fading ChannelsShuai Wang, Zhijun Li, Shouxu Jiang. 344-349 [doi]
- Ensemble Learning with Correlation-Based PenaltyYong Liu, Qiangfu Zhao, Yan Pei. 350-353 [doi]
- GPS-Based Vehicle Moving State Recognition Method and Its Applications on Dynamic In-Car Navigation SystemsHui Qi, Yanheng Liu, Da Wei. 354-360 [doi]
- iDBMM: A Novel Algorithm to Model Dynamic Behavior in Large Evolving GraphsXiujuan Xu, Wei Wang, Yu Liu, Hong Yu, Xiaowei Zhao. 361-366 [doi]
- Ontology Based Heterogeneous Data Integration Framework Facing Mobile EnvironmentChuanwei Xu, Shuo Yang, Jiting Huang, Changqing Ji. 367-371 [doi]
- Research on Multiple Services Scheduling Based on Priority-Queuing ModelPeng Ke, Wenxiang Li, Yunhe Wu. 372-376 [doi]
- The Role of Probability of Learning and Reconnecting in the Evolution of CooperationXiaowei Zhao, Hong Yu, Zhenzhen Xu, Tinlin Tian, Xiujuan Xu. 377-381 [doi]
- Incentive and Quality Aware Participatory Sensing SystemJaya Bhattacharjee, Anita Pal, Sajal Mukhopadhyay, Anirban Bharasa. 382-387 [doi]
- Kernel-Level Design to Support Partitioning and Hierarchical Real-Time Scheduling of ARINC 653 for VxWorksWeilong Ruan, Zhengjun Zhai. 388-393 [doi]
- A Method for Large-Scale Access in Smart Power Consumption Field Based on Stateless Load BalancingXingzhe Hou, Chong Liu, Hongliang Sun, Yuangang Tan, Rong He, Yingchun Zheng. 394-399 [doi]
- An Approach to Resources Management of Software Evolution Processes Based on 3SYunzhi Jin, Hua Zhou, Hongwei Kang, Jinzhuo Liu, Na Zhao. 400-405 [doi]
- Analysis of HTTP Requests for Anomaly Detection of Web AttacksMikhail Zolotukhin, Timo Hämäläinen 0002, Tero Kokkonen, Jarmo Siltanen. 406-411 [doi]
- The Low-Power and Long-Distance System Based on Wireless Sensor NetworksLiang Liu, Yanjun Hu, Hua Qian, Xuming Pei. 412-417 [doi]
- Convergence Approach to Model Physical World and Cyber World of Aviation Cyber Physical SystemLichen Zhang. 418-423 [doi]
- A Visualization Representation Method Based on GIS & RIA and Its Application in Interactive Power Utilization FieldXingzhe Hou, Yuangang Tan, Hongliang Sun, Gang Wang, Ying Wang, Yali Wang. 424-428 [doi]
- WLCleaner: Reducing Energy Waste Caused by WakeLock Bugs at RuntimeXigui Wang, Xianfeng Li, Wen Wen. 429-434 [doi]
- Research of QoC Based Management for Complex Sensor Networks ApplicationsDi Zheng, Jun Wang, Ben Kerong. 435-440 [doi]
- Cache Simulation for Instruction Set Simulator QEMUTran Van Dung, Ittetsu Taniguchi, Hiroyuki Tomiyama. 441-446 [doi]
- Design of Dynamic Digital Circuits with n-Channel Multiple-Input Floating-Gate TransistorsGuoqiang Hang, XuanChang Zhou, Xiaohui Hu. 447-452 [doi]
- Post Deployment Encryption Key Generation for a Fully Connected and Secure Wireless Sensor NetworkSaif-Ur Rehman, Gang Cui, Jianmin Bao. 453-458 [doi]
- Power-Aware Real-Time Virtual Machine Schedulers in Discrete DVFS SystemsJun-Ho Seo, Guy Martin Tchamgoue, Kyong Hoon Kim. 459-463 [doi]
- Compositional Real-Time Scheduling of Mixed-Criticality Real-Time SystemsAmjad Ali, Kyong Hoon Kim. 464-469 [doi]
- A Software-Defined Intelligent Method for Antenna DesignYuanyuan Fan, Dajun Xiao, Xu Mei, Chao Liu, Xuesong Yan, Chengyu Hu. 470-474 [doi]
- SAPSN: A Sensor Network for Signal Acquisition and ProcessingQingzhong Liang, Hui Li, Yuanyuan Fan, Xuesong Yan, Chengyu Hu, Hong Yao. 475-478 [doi]
- Contention Window-Based MAC Protocol for Wireless Sensor NetworksBin Cheng, Linlin Ci, Chengping Tian, Xuanya Li, Minghua Yang. 479-484 [doi]
- A 3D Location-Based Energy Aware Routing Protocol in Delay Tolerant NetworksChengping Tian, Linlin Ci, Bin Cheng, Xuanya Li. 485-490 [doi]
- A Game Model for Predicting the Attack Path of APTXupeng Fang, Lidong Zhai, Zhaopeng Jia, Wenyan Bai. 491-495 [doi]
- Research of Context-Aware Component Adaptation Model in Pervasive EnvironmentDi Zheng, Jun Wang, Ben Kerong. 496-501 [doi]
- Fuzzy Adaptive PID Control of a Mobile Assistive Robot PlatformFuCheng Cao, Xianwei Wang, Xin Li. 502-506 [doi]
- Location Based TOA Algorithm for UWB Wireless Body Area NetworksXin Li, FuCheng Cao. 507-511 [doi]
- The Study and Development of the Automatic Scoring System for Answer Sheet of Blind StudentsXiaoli Wang, Ping Feng, Lirong Wang, Yajuan Song. 512-515 [doi]
- Research on Identification Modeling for Rehabilitation Training Control System for Stroke Patients' Lower Limbs Based on Support Vector MachineLiye Ren, Lifeng Ren, Yajuan Song, Ping Feng. 516-519 [doi]
- Research on the Control Method of Inverted Pendulum Based on Kalman FilterWanli Zhang, Guoxin Li, Lirong Wang. 520-523 [doi]
- Application and Optimization of RSM Algorithm in Aqueous Two-Phase ExtractionLifeng Ren, Liye Ren, Jing Wang, Xiaoli Wang. 524-527 [doi]
- The Evaluation of Massage Skill of Palm Press Based on Dynamics and Kinematical DataYajuan Song, Ping Feng, Xiaoli Wang, Kai Xing. 528-531 [doi]
- The Research of Wavelet Analysis for sEMG in Massage AssessmentPing Feng, Xiao-Li Wang, Ya-Juan Song, Li-Ye Ren. 532-535 [doi]
- Design of Soft Human-Robot Interface Based on Neuro-Muscular-Skeletal ModelLei Shi, Zhen Liu. 536-541 [doi]
- Practice and Research on Construction of Corpus for Natural Sign LanguageXiaomei Zhang, Gang Zhao, Yongyang Xu. 542-545 [doi]