Abstract is missing.
- Nth-Order Multifunction Filter Employing Current Differencing Transconductance AmplifiersMeili Cao, Haizhen He, Rongming Luo, Lei Wen. 3-12 [doi]
- An Efficient Spatial Query Processing Algorithm in Multi-sink Directional Sensor NetworkZheng Ma, Jin Zheng, Weijia Jia, Guojun Wang. 13-23 [doi]
- An Improved Method for Reversible Data Hiding in Encrypted ImageYuling Liu, Zuhong Liu. 24-34 [doi]
- Study on Personalized Location Privacy Preservation Algorithms Based on Road NetworksHongyun Xu, Jun Yang, Yong Zhang, Mengzhen Xu, Jiayi Gan. 35-45 [doi]
- A Hierarchical Identity-Based Signature from Composite Order Bilinear GroupsPeixin Chen, Xiaofeng Wang, Jinshu Su. 46-56 [doi]
- STRATUS: Towards Returning Data Control to Cloud UsersRyan K. L. Ko, Giovanni Russello, Richard Nelson, Shaoning Pang, Aloysius Cheang, Gill Dobbie, Abdolhossein Sarrafzadeh, Sivadon Chaisiri, Muhammad Rizwan Asghar, Geoffrey Holmes. 57-70 [doi]
- VSEP: A Distributed Algorithm for Graph Edge PartitioningYu Zhang, Yanbing Liu, Jing Yu, Ping Liu, Li Guo. 71-84 [doi]
- Scheduling Stochastic Tasks with Precedence Constrain on Cluster Systems with Heterogenous Communication ArchitectureQun Liao, Shuangshuang Jiang, Qiaoxiang Hei, Tao Li, Yulu Yang. 85-99 [doi]
- An Output-Oriented Approach of Test Data Generation Based on Genetic AlgorithmWeixiang Zhang, Bo Wei, Huisen Du. 100-108 [doi]
- An Efficient Pre-filter to Accelerate Regular Expression MatchingChengcheng Xu, Shuhui Chen, Xiaofeng Wang, Jinshu Su. 111-119 [doi]
- A Hybrid Optimization Approach for Anonymizing Transactional DataLi e Wang, Xianxian Li. 120-132 [doi]
- Program Obfuscator for Privacy-Carrying Unidirectional One-hop Re-encryptionMingwu Zhang, Biwen Chen, Hua Shen. 133-142 [doi]
- Predicting Severity of Software Vulnerability Based on Grey System TheoryJinkun Geng, Daren Ye, Ping Luo. 143-152 [doi]
- Characterization of Android Applications with Root Exploit by Using Static Feature AnalysisHuikang Hao, Zhoujun Li, Yueying He, Jinxin Ma. 153-165 [doi]
- LIP3: A Lightweighted Fine-Grained Privacy-Preserving Profile Matching Mechanism for Mobile Social Networks in ProximityYufeng Wang, Xiaohong Chen, Qun Jin, Jianhua Ma. 166-176 [doi]
- Context-Aware QoS Assurance for Smart Grid Big Data Processing with Elastic Cloud Resource ReconfigurationLuyan Nie, Chuanzhi Xie, Yujun Yin, Xin Li. 177-186 [doi]
- Continuous User Identity Verification for Trusted Operators in Control RoomsEnrico Schiavone, Andrea Ceccarelli, Andrea Bondavalli. 187-200 [doi]
- Leakage-Resilient Anonymous Identity-Based Broadcast Encryption in the Standard ModelLeyou Zhang, Zhuanning Wang, Qing Wu. 201-210 [doi]
- Scheduling Resource of IaaS Clouds for Energy Saving Based on Predicting the Overloading Status of Physical MachinesQingxin Xia, Yuqing Lan, Limin Xiao. 211-221 [doi]
- Towards Mechanised Semantics of HPC: The BSP with Subgroup Synchronisation CaseJean Fortin, Frédéric Gava. 222-237 [doi]
- Cloud Computing Threats and Provider Security AssessmentHuiming Yu, Kenneth Williams, Xiaohong Yuan. 238-250 [doi]
- Collaborative Multiparty Association Rules Mining with Threshold Homomorphic EncryptionMarcin Gorawski, Zacheusz Siedlecki, Anna Gorawska. 251-263 [doi]
- An Illegal Indirect Access Prevention Method in Transparent Computing SystemWenjuan Tang, Yang Xu, Guojun Wang, Yaoxue Zhang. 264-275 [doi]
- EPAMP: An Anonymous Multicast Protocol in Mobile Ad Hoc NetworksHongling Xiao, Hong Song, Weiping Wang 0003. 276-289 [doi]
- Energy Saving Mechanism Analysis Based on Dynamic Resource Scaling for Cloud ComputingXiaojie Zhang, Nao Wang, Xin Zheng, Caocai Wang, Dongmei Bin. 293-301 [doi]
- An Optimal Rate Adaptive Video Streaming Scheme to Improve QoE of DashXiaolong Gong, Gaocai Wang, Nao Wang. 302-310 [doi]
- Community-Based Energy-Aware Routing Protocol in Mobile Social NetworksDongmei Bin, Ying Peng, Gaocai Wang. 311-321 [doi]
- Research of CMABC Algorithm in Intrusion DetectionMing Liu, Xiaoling Yang, Fanling Huang, Yanming Fu. 322-332 [doi]
- A Parallel Tabu Search Algorithm with Solution Space Partition for Cohesive Clustering ProblemsZheng Xu, Buyang Cao. 333-343 [doi]
- Symmetric Game for Distributed Estimation in Energy Harvesting Wireless Sensor Networks with Selfish SensorsGuiyun Liu, Jing Yao, Hongbin Chen, Han Zhang, Dong Tang. 344-352 [doi]
- File Creation Optimization for Metadata-Intensive Application in File SystemsLimin Xiao, Qiaoling Zhong, Zhisheng Huo, Ang Li, Li Ruan, Kelong Liu, Yuanyuan Zang, Zheqi Lu. 353-363 [doi]
- A Sharing-Memory Based Ring FrameworkShicong Ma, Baosheng Wang, Xianming Gao, Xiaozhe Zhang. 364-369 [doi]
- Streaming Computing Technology for Android Applications: Design Model and Case StudyBinji Mo, Yang Xu, Guojun Wang. 370-381 [doi]
- An Energy-Efficient Aggregation and Collection Algorithm for Heterogeneous Wireless Sensor NetworkLifang Liu, Xiaogang Qi, Gengzhong Zheng, Mande Xie. 382-392 [doi]
- TDD-Based Massive MIMO Systems: Overview and DevelopmentRonghua Shi, Kun Tang, Jian Dong, Wentai Lei, Chunhua Peng, Yunxiang Jiang. 393-402 [doi]
- A Hierarchical Shared Key Algorithm in Wireless Sensor NetworksZeyu Sun, Weiguo Wu, Xiaofei Xing, Chuanfeng Li, Yalin Nie, Yangjie Cao. 405-412 [doi]
- Evaluation Model of the Cloud Systems Based on Queuing Petri NetYangjie Cao, Huimin Lu, Xiaodong Shi, Pengsong Duan. 413-423 [doi]
- MTCPP: Multi-targets K-Coverage Preservation Protocol in Wireless Sensor NetworksLiu Yang. 424-432 [doi]
- Design Flaws in a Secure Medical Data Exchange Protocol Based on Cloud EnvironmentsChun-Ta Li, Cheng-Chi Lee, Chun-Cheng Wang, Tzu-Hui Yang, Song-Jhih Chen. 435-444 [doi]
- Privacy Preserving Personalization in Probabilistic SearchRajeswary Ravi, Greeshma N. Gopal. 445-453 [doi]
- A Security-Critical Task Management Method for Distributed Real-Time SystemsYang Yu, Qi Dong, Zhipeng Luo, Hao Chen, Jun Deng, Wei Guan. 454-464 [doi]
- A Model of Dynamic Malware Analysis Based on VMIChengye Li, Yangyue Xiang, Jiangyong Shi. 465-475 [doi]
- Multiple Secret Sharing Using Natural Language Letter Based Visual Cryptography SchemeRoshni Kadeparambil Raphel, Muhammed Ilyas H., Janu R. Panicker. 476-486 [doi]
- Reconstruction of Android Applications' Network Behavior Based on Application Layer TrafficQun Li, Lei Zhang, Shifeng Hou, Zhenxiang Chen, Hongbo Han. 487-496 [doi]
- Android Malware Network Behavior Analysis at HTTP Protocol Packet LevelShanshan Wang, Shifeng Hou, Lei Zhang, Zhenxiang Chen, Hongbo Han. 497-507 [doi]
- Energy Efficient Encryption Scheme for Network-Coded Mobile Ad Hoc NetworksDeepa S. Nair, Muhammed Ilyas H.. 508-517 [doi]
- Attribute-Based Ring Signcryption Scheme and Its Application in Wireless Body Area NetworksChangji Wang, Jing Liu. 521-530 [doi]
- Dependable Cascading Target Tracking in Heterogeneous Mobile Camera Sensor NetworksZhen Peng, Tian Wang, Md. Zakirul Alam Bhuiyan, Xiaoqiang Wu, Guojun Wang. 531-540 [doi]
- A Web-Based Resource Management Platform for Transparent ComputingDacheng Wang, Hong Song, Yun Xu, Wenhao Zhang, Jianxin Wang. 541-550 [doi]
- Architecture and Scheduling Method of Cloud Video Surveillance System Based on IoTXia Wei, Wen-xiang Li, Cong Ran, Chun-Chun Pi, Ya-Jie Ma, Yu-Xia Sheng. 551-560 [doi]
- HiTrans: An FPGA-Based Gateway Design and Implementation in HPC EnvironmentsWei Shi, Gaofeng Lv, ZhiGang Sun, Zhenghu Gong. 561-571 [doi]
- Dealing with Reliable Event-Based Communications by Means of Layered MulticastChristian Esposito, Aniello Castiglione, Francesco Palmieri. 572-581 [doi]
- Scalable Network Intrusion Detection and Countermeasure Selection in Virtual Network SystemsJin B. Hong, Chun-Jen Chung, Dijiang Huang, Dong Seong Kim. 582-592 [doi]
- Removing Key Escrow from the LW-HIBE SchemePeixin Chen, Xiaofeng Wang, BaoKang Zhao, Jinshu Su, Ilsun You. 593-605 [doi]
- FASTDB: An Array Database System for Efficient Storing and Analyzing Massive Scientific DataHui Li, Nengjun Qiu, Mei Chen, Hongyuan Li, Zhenyu Dai, Ming Zhu, Menglin Huang. 606-616 [doi]
- An Effective Correlation-Aware VM Placement Scheme for SLA Violation Reduction in Data CentersSheng Xu, Binzhang Fu, Mingyu Chen, Lixin Zhang. 617-626 [doi]
- Reliability-Aware Distributed Computing Scheduling PolicyJemal Abawajy, Mohammad Mehedi Hassan. 627-632 [doi]
- An Escrow-Free Hierarchical Identity-Based Signature Model for Cloud StoragePeixin Chen, Xiaofeng Wang, Jinshu Su. 633-647 [doi]
- A Predictive Data Reliability Method for Wireless Sensor Network ApplicationsAdil Amjad Sheikh, Ahmed Lbath, Ehsan Ullah Warriach, Emad Felemban. 648-658 [doi]
- A Cycle-Time-Analysis Model for Byzantine Fault ToleranceLiu Chen, Wei Zhou. 659-668 [doi]
- Resource Utilization Based Dynamic Pricing Approach on Cloud Computing ApplicationAdrian Johannes, Priyadarsi Nanda, Xiangjian He. 669-677 [doi]
- Weight-Based Batch Rekeying Scheme for Dynamic Multi-privileged Group CommunicationsWei Zhou, Yang Xu, LiJuan Yang, Guojun Wang. 678-690 [doi]
- Application-Assisted Dynamic Attestation for JVM-Based CloudHaihe Ba, Huaizhe Zhou, Zhiying Wang, Jiangchun Ren, Tie Hong, Yiming Li. 691-700 [doi]
- New Escrow-Free Scheme for Hierarchical Identity-Based EncryptionFang Qi, Xin Tang, Quanyun Wei. 701-713 [doi]
- Neural Networks in Petrol Station Objects CalibrationMarcin Gorawski, Miroslaw Skrzewski, Michal Gorawski, Anna Gorawska. 714-723 [doi]
- A Dependable, Scalable, Distributed, Virtual Data StructureSilvia Grampone, Witold Litwin, S. J. Thomas Schwarz. 724-735 [doi]
- Effect of Bias Temperature Instability on Soft Error RateZhen Wang, Jianhui Jiang. 736-745 [doi]
- Security Modeling and Analysis of a SDN Based Web ServiceTaehoon Eom, Jin B. Hong, Jong Sou Park, Dong Seong Kim. 746-756 [doi]
- Single Anchor Node Based Localization in Mobile Underwater Wireless Sensor NetworksAnjana P. Das, Sabu M. Thampi. 757-770 [doi]
- A Novel Bug Report Extraction ApproachTao Lin, Jianhua Gao, Xue Fu, Yan Lin. 771-780 [doi]
- ABR-Tree: An Efficient Distributed Multidimensional Indexing Approach for Massive DataXin Zhou, Hui Li, Xiao Zhang, Shan Wang, Yanyu Ma, Keyan Liu, Ming Zhu, Menglin Huang. 781-790 [doi]
- A Simple Local Search Algorithm for Minimizing Interference in Wireless Sensor NetworksZhihai Wang, Weidong Chen. 791-799 [doi]
- Unknown Bit Stream Protocol Message Discovery with Zero KnowledgeFengli Zhang, Junjiao Zhang, Hongchuan Zhou. 800-809 [doi]
- Distributed Authentication in the Cloud Computing EnvironmentYanzhu Liu, Zhi Li, Yuxia Sun. 810-818 [doi]
- Influential Nuisance Factors on a Decision of Sufficient TestingMahnaz Malekzadeh, Iain Bate. 819-828 [doi]
- Research of Improved Particle Swarm Optimization Based on Genetic Algorithm for Hadoop Task Scheduling ProblemJun Xu, Yong Tang. 829-834 [doi]
- Acceleration of CFD Engineering Software on GPU and MICYang Liu, Liang Deng. 835-848 [doi]