Abstract is missing.
- A Comparison Study of Energy Proportionality of Data Center Network ArchitecturesYunfei Shang, Dan Li, Mingwei Xu. 1-7 [doi]
- Poincaré: A Hyperbolic Data Center ArchitectureMárton Csernai, András Gulyás, Attila Korösi, Balázs Sonkoly, Gergely Biczók. 8-16 [doi]
- Dynamic Random Access for Hadoop Distributed File SystemWei Zhou, Jizhong Han, Zhang Zhang, Jiao Dai. 17-22 [doi]
- Fast Eventual Consistency with Performance Guarantees for Distributed StorageFeng Yan, Alma Riska, Evgenia Smirni. 23-28 [doi]
- A Coding-based Approach to Mitigate TCP Incast in Data Center NetworksChanglin Jiang, Dan Li, Mingwei Xu, Kai Zheng. 29-34 [doi]
- Cooperative Redundancy Elimination in Data Center Networks with Wireless Cards at RoutersYong Cui, Chunpeng Liao, Ivan Stojmenovic, Di Li, Hongyi Wang. 35-42 [doi]
- Postcard: Minimizing Costs on Inter-Datacenter Traffic with Store-and-ForwardYuan Feng, Baochun Li, Bo Li 0001. 43-50 [doi]
- An Intelligent Anti-phishing Strategy Model for Phishing Website DetectionWeiwei Zhuang, Qingshan Jiang, Tengke Xiong. 51-56 [doi]
- Data Center Network Topologies Using Optical Packet SwitchesYuichi Ohsita, Masayuki Murata. 57-64 [doi]
- How Hard Am I Training? Using Smart Phones to Estimate Sport Activity IntensityIgor Pernek, Gregor Stiglic, Peter Kokol. 65-68 [doi]
- Design and Implementation of an On-body Placement-Aware SmartphoneKaori Fujinami, Satoshi Kouchi, Yuan Xue. 69-74 [doi]
- Influence of Playability and Usability in a Mobile Human Computation GameSomasundaram Kothandapani, Dion Hoe-Lian Goh, Khasfariyati Razikin. 75-78 [doi]
- Using Proximity and Homophily to Connect Conference Attendees in a Mobile Social NetworkAlvin Chin, Bin Xu, Fangxi Yin, Xia Wang, Wei Wang, Xiaoguang Fan, Dezhi Hong, Ying Wang. 79-87 [doi]
- Measuring Distance with Mobile Phones Using Single-Camera Stereo VisionClemens Holzmann, Matthias Hochgatterer. 88-93 [doi]
- Mobile Intelligent Synthetic Character in Smartphone Using Behavior Selection NetworkJongwon Yoon, Sung-Bae Cho. 94-97 [doi]
- Towards a Practical, Scalable Self-Localization System for Android Phones Based on WLAN FingerprintingPeter Riedl, Rene Mayrhofer. 98-101 [doi]
- An Efficient Energy Management System for Android Phone Using Bayesian NetworksYoungseol Lee, Sung-Bae Cho. 102-107 [doi]
- Wi2Me: A Mobile Sensing Platform for Wireless Heterogeneous NetworksGerman Castignani, Alejandro Lampropulos, Alberto Blanc, Nicolas Montavont. 108-113 [doi]
- DroidCluster: Towards Smartphone Cluster Computing - The Streets are Paved with Potential Computer ClustersFelix Büsching, Sebastian Schildt, Lars C. Wolf. 114-117 [doi]
- Exploring the Sustainability of Credit-incentivized Peer-to-Peer Content DistributionXuanjia Qiu, Wei Huang, Chuan Wu, Zongpeng Li, Francis C. M. Lau. 118-126 [doi]
- Detecting and Validating Sybil Groups in the WildJing Jiang, Zifei Shan, Wenpeng Sha, Xiao Wang, Yafei Dai. 127-132 [doi]
- Diffusive Logistic Model Towards Predicting Information Diffusion in Online Social NetworksFeng Wang, Haiyan Wang, Kuai Xu. 133-139 [doi]
- Provable Polylog Routing for DarknetsStefanie Roos, Thorsten Strufe. 140-146 [doi]
- An Analysis of Verifications in Microblogging Social Networks - Sina WeiboJunting Chen, James She. 147-154 [doi]
- Towards the Realization of Decentralized Online Social Networks: An Empirical StudyRammohan Narendula, Thanasis G. Papaioannou, Karl Aberer. 155-162 [doi]
- Discovering Shared Interests in Online Social NetworksFeng Wang, Kuai Xu, Haiyan Wang. 163-168 [doi]
- Energy-Efficient and Robust Spatial Window Aggregation Query Processing Algorithm in Wireless Sensor NetworksLiang Liu, Xiaolin Qin, Bo-Han Li, Yulei Liu, Guineng Zheng. 169-177 [doi]
- Cooperative Neighbor Discovery Protocol for a Wireless Network Using Two Antenna PatternsJingzhe Du, Evangelos Kranakis, Amiya Nayak. 178-186 [doi]
- OSR: Optimal and Secure Routing Protocol in Multi-hop Wireless NetworksJie Zhou, Jiannong Cao. 187-193 [doi]
- Minimizing Movement for Target Coverage in Mobile Sensor NetworksZhuofan Liao, Shigeng Zhang, Jiannong Cao, Weiping Wang 0003, Jianxin Wang. 194-200 [doi]
- A Delay-Based Routing Protocol for Human-Oriented Delay Tolerant Mobile Sensor Network (DTMSN)Hui Zhao, Ming Liu. 201-208 [doi]
- BlueCat: An Efficient Way for Relative Mobile LocalizationTian Wang, Weijia Jia, Ping Shen. 209-215 [doi]
- Interference-Aware Multipath Routing for Video Delivery in Wireless Multimedia Sensor NetworksIlnaz Nikseresht, Hamed Yousefi, Ali Movaghar, Mohammad Khansari. 216-221 [doi]
- Techniques for Enhancing TCP Performance in Wireless NetworksBreeson Francis, Venkat Narasimhan, Amiya Nayak, Ivan Stojmenovic. 222-230 [doi]
- RES: A Robust and Efficient Snapshot Algorithm for Wireless Sensor NetworksWeigang Wu, Haiqing Liu, Hejun Wu. 231-236 [doi]
- Trust-Enabled Link Spoofing Detection in MANETMouhannad Alattar, Françoise Sailhan, Julien Bourgeois. 237-244 [doi]
- Intelligent Illumination Model-Based Lighting ControlMichael Fischer, Kui Wu, Pan Agathoklis. 245-249 [doi]
- A Novel Approach to Improve Signal to Noise Ratio Based on Sector Antenna in Radio NetworksReza Malekian, Abdul Hanan Abdullah. 250-253 [doi]
- Routing in Cyber Physical Systems with Application for Voltage Control in Microgrids: A Hybrid System ApproachHusheng Li, Robert Caiming Qiu, Zhiqiang Wu 0001. 254-259 [doi]
- Energy-Efficient Routing and Rate Allocation for Delay Tolerant NetworksYuanyuan Zeng, Jie Wu 0001, Naixue Xiong, Deshi Li. 260-266 [doi]
- System Stability Aware Multicast Routing in Cyber Physical SystemsHusheng Li. 267-272 [doi]
- Performance Comparison of Positioning Algorithms for Complex GPS SystemsWei Li 0008, Zimu Yuan, Biao Chen, Wei Zhao. 273-278 [doi]
- An Improved TPSN Algorithm for Time Synchronization in Wireless Sensor NetworkDechao Liu, Zhiyun Zheng, Zimu Yuan, Wei Li 0008. 279-284 [doi]
- Epidemic Control Based on Fused Body Sensed and Social Network InformationZhaoyang Zhang 0001, Ken C. K. Lee, Honggang Wang, Dong Xuan, Hua Fang. 285-290 [doi]
- Automated Sensor Verification Using Outlier Detection in the Internet of ThingsNauman Javed, Tilman Wolf. 291-296 [doi]
- Model-Based Engineering for Certification of Complex Adaptive Network SystemsKaliappa Ravindran. 297-302 [doi]
- A Core Language for Executable Models of Cyber-Physical Systems (Preliminary Report)Walid Taha, Paul Brauner, Yingfu Zeng, Robert Cartwright, Verónica Gaspes, Aaron Ames, Alexandre Chapoutot. 303-308 [doi]
- Virtual Queue Based Distributed Data Traffic Scheduling for Cyber Physical Systems with Application in Smart GridHusheng Li. 309-314 [doi]
- Real-Time, Real-Location, and Real-Identity Service Information (R3SI) Based Application Enabled Mobile Service Architecture in Cellular NetworksDapeng Wang, Jing Li, Kai Xing, Shan Jin, Kevin Liu. 315-323 [doi]
- A Cyber-physical Systems Approach to the Design of Vehicle Safety NetworksYaser P. Fallah, Raja Sengupta. 324-329 [doi]
- A Case Study of CPNS Intelligence: Provenance Reasoning over Tracing Cross Contamination in Food Supply ChainShunqing Yan, Yongxin Zhu, Qiannan Zhang, Qin Wang, Ming Ni, Guangwei Xie. 330-335 [doi]
- On Studying Relationship between Altruism and the Psychological Phenomenon of Self-Deception in Rational and Autonomous NetworksYufeng Wang, Athanasios V. Vasilakos, Qun Jin, Jianhua Ma. 336-341 [doi]
- Security and Dependability Enhancement of Wireless Sensor Networks with Multipath Routing Utilizing the Connectedness of Joint NodesAnri Kimura, Eitaro Kohno, Yoshiaki Kakuda. 342-348 [doi]
- An Inter-domain Routing for Heterogeneous Mobile Ad Hoc Networks Using Packet Conversion and Address SharingShohei Fujiwara, Tomoyuki Ohta, Yoshiaki Kakuda. 349-355 [doi]
- On Convergence Rate of Autonomous Decentralized Structure Formation Technology for Clustering in Ad Hoc NetworksKenji Takagi, Yusuke Sakumoto, Chisa Takano, Masaki Aida. 356-361 [doi]
- Autonomous Local Coordination Technology for Congestion Control in Wireless Sensor NetworksMd. Emdadul Haque, Xiaodong Lu, Kinji Mori. 362-368 [doi]
- Failure Detection in P2P-Grid EnvironmentsWang Huan, Nakazato Hidenori. 369-374 [doi]
- Gateway Access Permission Technology for High AssuranceKhalid Mahmood, Hironao Takahashi, Yasukai Arakawa. 375-381 [doi]
- Replica Voting Based Mechanisms for Dissemination of Multi-modal Surveillance DataKaliappa Ravindran, Mohammad Rabby. 382-389 [doi]
- Realization of Flexible Railway System by Heterogeneous Real-Time Autonomous Integrating ArchitectureTakashi Kunifuji, Hiroshi Ito. 390-399 [doi]
- A Cost-Effective Intelligent Configuration Model in Cloud ComputingWei-Tek Tsai, Guanqiu Qi, Yinong Chen. 400-408 [doi]
- Modeling and Automating Analysis of Server Duty and Client Obligation for High AssuranceChin-Tser Huang, Vipul Gupta. 409-416 [doi]
- Traceback Attacks in Cloud - Pebbletrace BotnetWenjie Lin, David Lee. 417-426 [doi]
- On-Demand VPC Topology Construction for Virtual Perimeter Defense in Public CloudsXiaoxin Wu, Donghui Wang. 427-435 [doi]
- Flow Inspection Router Assignment (FIRA) in Access/Aggregation Network CloudsJianping Wang, Chunming Qiao, Raghuram S. Sudhaakar, Sateesh Addepalli, Yaohui Jin, Pablo Jesús Argibay-Losada. 436-445 [doi]
- The MEERKATS Cloud Security ArchitectureAngelos D. Keromytis, Roxana Geambasu, Simha Sethumadhavan, Salvatore J. Stolfo, Junfeng Yang, Azzedine Benameur, Marc Dacier, Matthew C. Elder, Darrell M. Kienzle, Angelos Stavrou. 446-450 [doi]
- LiveSec: Towards Effective Security Management in Large-Scale Production NetworksKai Wang, Yaxuan Qi, Baohua Yang, Yibo Xue, Jun Li. 451-460 [doi]
- Profiling-as-a-Service in Multi-tenant Cloud Computing EnvironmentsKuai Xu, Feng Wang, Lin Gu. 461-465 [doi]
- Toward Privacy-Assured Cloud Data Services with Flexible Search FunctionalitiesMing Li, Shucheng Yu, Wenjing Lou, Y. Thomas Hou. 466-470 [doi]
- Phrase Search over Encrypted Data with Symmetric Encryption SchemeYinqi Tang, Dawu Gu, Ning Ding, Haining Lu. 471-480 [doi]
- Secure Data Retrieval of Outsourced Data with Complex Query SupportYan Zhu, Di Ma, Shan-Biao Wang. 481-490 [doi]
- SaaS Anonymous Cloud Service Consumption StructureVinícius M. Pacheco, Ricardo Staciarini Puttini. 491-499 [doi]
- PDP: A Privacy-Preserving Data Provenance SchemeKhalid Alharbi, Xiaodong Lin. 500-505 [doi]
- GeoProof: Proofs of Geographic Location for Cloud Computing EnvironmentAiiad Albeshri, Colin Boyd, Juan Manuel González Nieto. 506-514 [doi]
- Robust Dynamic Provable Data PossessionBo Chen, Reza Curtmola. 515-525 [doi]
- Access Control as a Service for Public Cloud StorageYang Zhang, Junliang Chen. 526-536 [doi]
- Why it is Hard to Fight against Cyber Criminals?Shui Yu, Wanlei Zhou, Wanchun Dou, S. Kami Makki. 537-541 [doi]
- When Digital Forensic Research Meets LawsJunwei Huang, Zhen Ling, Tao Xiang, Jie Wang, Xinwen Fu. 542-551 [doi]
- Android Malware Forensics: Reconstruction of Malicious EventsJuanru Li, Dawu Gu, Yuhao Luo. 552-558 [doi]
- A Flow-Based Traceback Scheme on an AS-Level Overlay NetworkHongcheng Tian, Jun Bi, Peiyao Xiao. 559-564 [doi]
- Trade-off between Being Attacked and Being ProtectedJames Mao, F. Yan, Kai Hau Yeung. 565-572 [doi]
- Security Issues and Solutions in Cloud ComputingPengfei You, Yuxing Peng, Weidong Liu, Shoufu Xue. 573-577 [doi]
- Building a High Serviceability Model by Checkpointing and Replication Strategy in Cloud Computing EnvironmentsDawei Sun, Guiran Chang, Changsheng Miao, Xingwei Wang. 578-587 [doi]
- Authentication and Access Control in the Internet of ThingsJing Liu, Yang Xiao, C. L. Philip Chen. 588-592 [doi]
- An Empirical Study of Passive 802.11 Device FingerprintingChristoph Neumann, Olivier Heen, Stéphane Onno. 593-602 [doi]
- Two-Party Trust Sensitivity Analysis for Social NetworksLiudong Xing, Honggang Wang, Yujie Wang, Chaonan Wang. 603-607 [doi]
- Analysis of Malicious and Benign Android ApplicationsMoutaz Alazab, Veelasha Moonsamy, Lynn Margaret Batten, Patrik Lantz, Ronghua Tian. 608-616 [doi]
- Semi-supervised and Compound Classification of Network TrafficJun Zhang, Chao Chen, Yang Xiang, Wanlei Zhou. 617-621 [doi]
- Anonymizing Network Traces with Temporal Pseudonym ConsistencyWahbeh H. Qardaji, Ninghui Li. 622-633 [doi]
- Garlic: A Distributed Botnets Suppression SystemFuye Han, Zhen Chen, HongFeng Xu, Yong Liang. 634-639 [doi]
- A Class of Non-statistical Traffic Anomaly Detection in Complex Network SystemsWenlin Han, Wei Xiong, Yang Xiao, Magdy Ellabidy, Athanasios V. Vasilakos, Naixue Xiong. 640-646 [doi]