Abstract is missing.
- Models of Circular CausalityMassimo Bartoletti, Tiziana Cimoli, G. Michele Pinna, Roberto Zunino. 1-20 [doi]
- Checking Cloud Contracts in Microsoft AzureNikolaj Bjørner, Karthick Jayaraman. 21-32 [doi]
- Privacy and Security Challenges in Internet of ThingsManik Lal Das. 33-48 [doi]
- Geo-indistinguishability: A Principled Approach to Location PrivacyKonstantinos Chatzikokolakis, Catuscia Palamidessi, Marco Stronati. 49-72 [doi]
- Fusing Sensors for Occupancy Sensing in Smart BuildingsNabeel Nasir, Kartik Palani, Amandeep Chugh, Vivek Chil Prakash, Uddhav Arote, Anand P. Krishnan, Krithi Ramamritham. 73-92 [doi]
- Discrete Control-Based Design of Adaptive and Autonomic Computing SystemsXin An, Gwenaël Delaval, Jean-Philippe Diguet, Abdoulaye Gamatié, Soguy Mak Karé Gueye, Hervé Marchand, Noël De Palma, Éric Rutten. 93-113 [doi]
- Designing for Scalability and Trustworthiness in mHealth SystemsSanjiva Prasad. 114-133 [doi]
- Host Trait Prediction of Metagenomic Data for Topology-Based VisualizationLaxmi Parida, Niina Haiminen, David Haws, Jan Suchodolski. 134-149 [doi]
- Gappy Total Recaller: Efficient Algorithms and Data Structures for Accurate TranscriptomicsB. Mishra. 150-161 [doi]
- Finding RkNN Set in Directed GraphsPankaj Sahu, Prachi Agrawal, Vikram Goyal, Debajyoti Bera. 162-173 [doi]
- Gathering Asynchronous Swarm Robots under Nonuniform Limited VisibilityAvik Chatterjee, Sruti Gan Chaudhuri, Krishnendu Mukhopadhyaya. 174-180 [doi]
- A Routing Calculus with Flooding UpdatesManish Gaur, Simon J. Gay, Ian Mackie. 181-186 [doi]
- k-Distinct Strong Minimum Energy Topology Problem in Wireless Sensor NetworksBhawani Sankar Panda, D. Pushparaj Shetty, Arti Pandey. 187-192 [doi]
- Path Planning Algorithm for Mobile Anchor in Connected Sensor NetworksKaushik Mondal, Arindam Karmakar, Partha Sarathi Mandal 0001. 193-198 [doi]
- SMCDCT: A Framework for Automated MC/DC Test Case Generation Using Distributed Concolic TestingSangharatna Godboley, Subhrakanta Panda, Durga Prasad Mohapatra. 199-202 [doi]
- On-the-Fly Symmetry Reduction of Explicitly Represented Probabilistic ModelsReema Patel, Kevin Patel, Dhiren R. Patel. 203-206 [doi]
- Time and Cost Aware Checkpointing of Choreographed Web ServicesVani Vathsala Atluri, Hrushikesha Mohanty. 207-219 [doi]
- A Preprocessing of Service Registry: Based on I/O Parameter SimilarityLakshmi H. N., Hrushikesha Mohanty. 220-232 [doi]
- Financial Risk Management in e-commerce Using Executable Business Process Modeling NotationRamkumar Iyer, Sanjeevi Moorthy. 233-238 [doi]
- DILT: A Hybrid Model for Dynamic Composition and Execution of Heterogeneous Web ServicesKanchana Rajaram, Chitra Babu, Akshaya Ganesan. 239-244 [doi]
- Application of Soft Computing Technique for Web Service SelectionDebendra Kumar Naik, Smita Kumari, Santanu Kumar Rath. 245-248 [doi]
- Weighted Load Balanced Adaptive Gateway Discovery in Integrated Internet MANETRafi U. Zaman, Khaleel Ur Rahman Khan, A. Venugopal Reddy. 249-252 [doi]
- Slice Based Testing of CGI Based Web ApplicationsMadhusmita Sahu, Durga Prasad Mohapatra. 253-256 [doi]
- A Fuzzy Computationally Intelligent System for Resource Allocation in WiMAXAkashdeep Sharma. 257-260 [doi]
- Improving Activity Prediction and Activity Scheduling in Smart Home Networks for Enhanced QoSKoteswara Rao Vemu. 261-264 [doi]
- Repetition Pattern Attack on Multi-word-containing SecureString 2.0 ObjectsGünter Fahrnberger. 265-277 [doi]
- Computationally Secure Cheating Identifiable Multi-Secret Sharing for General Access StructurePartha Sarathi Roy, Angsuman Das, Avishek Adhikari. 278-287 [doi]
- S-Gossip: Security Enhanced Gossip Protocol for Unstructured P2P NetworksSumit Kumar Tetarave, Somanath Tripathy, Sathya Peri. 288-298 [doi]
- k-degree Closeness Anonymity: A Centrality Measure Based Approach for Network AnonymizationDebasis Mohapatra, Manas Ranjan Patra. 299-310 [doi]
- A Chinese Remainder Theorem Based Key Management Algorithm for Hierarchical Wireless Sensor NetworkPranave Kumar Bhaskar, Alwyn R. Pais. 311-317 [doi]
- An Evolutionary Computation Based Classification Model for Network Intrusion DetectionAshalata Panigrahi, Manas Ranjan Patra. 318-324 [doi]
- Intrusion Detection in a Tailor-Made Gaussian Distribution Wireless Sensor NetworksAmrita Ghosal, Subir Halder. 325-330 [doi]
- SecureString 3.0 - A Cryptosystem for Blind Computing on Encrypted Character StringsGünter Fahrnberger, Kathrin Heneis. 331-334 [doi]
- A Secure Image Hashing Technique for Forgery DetectionTanmoy Kanti Das, Piyush Kanti Bhunre. 335-338 [doi]
- Design and Development of Secure Cloud Architecture for Sensor ServicesR. S. Ponmagal, N. Dinesh, Uma Rajaram. 339-344 [doi]
- Cloud Federation Formation Using Coalitional Game TheoryBenay Kumar Ray, Sunirmal Khatua, Sarbani Roy. 345-350 [doi]
- An Efficient Resource Allocation Algorithm for IaaS CloudSanjaya Kumar Panda, Prasanta K. Jana. 351-355 [doi]
- Genetic Algorithm Framework for Bi-objective Task Scheduling in Cloud Computing SystemsA. S. Ajeena Beegom, M. S. Rajasree. 356-359 [doi]
- Optimal Cloud Resource Provisioning: A Two-Criteria FormulationGeetika Mudali, Manas Ranjan Patra, K. Hemant Reddy, Diptendu Sinha Roy. 360-364 [doi]
- Predicting Post Importance in Question Answer Forums Based on Topic-Wise User ExpertiseDeepa Anand, Febin A. Vahab. 365-376 [doi]
- SQLiDDS: SQL Injection Detection Using Query Transformation and Document SimilarityDebabrata Kar, Suvasini Panigrahi, Srikanth Sundararajan. 377-390 [doi]
- Information Retrieval in Wikipedia with Conceptual DirectionsJulian Szymanski. 391-402 [doi]
- Query Execution for RDF Data on Row and Column StoreTrupti Padiya, Minal Bhise, Sandeep Vasani, Mohit Pandey. 403-408 [doi]
- A Concept for Co-existence of Heterogeneous Recommender Systems Based on Blackboard ArchitectureRohit Gupta, Anil Kumar Singh. 409-414 [doi]
- Co-occurrence and Semantic Similarity Based Hybrid Approach for Improving Automatic Query Expansion in Information RetrievalJagendra Singh, Aditi Sharan. 415-418 [doi]
- Predicting User Visibility in Online Social Networks Using Local Connectivity PropertiesNemi Chandra Rathore, Somanath Tripathy, Joydeep Chandra. 419-430 [doi]
- Using KNN and SVM Based One-Class Classifier for Detecting Online Radicalization on TwitterSwati Agarwal 0001, Ashish Sureka. 431-442 [doi]
- Data Mining on ICT Usage in an Academic Campus: A Case StudyAjay Auddy, Sripati Mukhopadhyay. 443-447 [doi]
- A Theory on Genesis and Spread of CorruptionHrushikesha Mohanty. 448-451 [doi]
- Social Network Analysis of Different Parameters Derived from Realtime ProfileParamita Dey, Aniket Sinha, Sarbani Roy. 452-455 [doi]
- Analysis of Emergency Evacuation of Building Using PEPAAnil Kumar Singh, Surinder Kaur. 456-459 [doi]