Abstract is missing.
- Performance analysis of black hole attack in MANETAyanwuyi T. Kolade, Megat F. Zuhairi, Eiad Yafi, C. L. Zheng. 1 [doi]
- Frag-shells cube based on hierarchical dimension encoding treeShanshan Tang, Dingsheng Wan, Yuelong Zhu, Jianguo Yao. 2 [doi]
- DNS amplification attack detection and mitigation via sFlow with security-centric SDNAhmad Ariff Aizuddin, Mohd Atan, Megat Norulazmi, Megat Mohamed Noor, Shadil Akimi, Zainal Abidin. 3 [doi]
- The effects of ambient scent on hedonic experience on online shoppingSo-Jeong Kim, Dong-Hee Shin. 4 [doi]
- Big data analysis on secure VoIP servicesAmna Saad, Ahmad Roshidi Amran, Iain William Phillips, Ana M. Salagean. 5 [doi]
- Toward accessibility with usability: understanding the requirements of impaired uses in the mobile contextClauirton de Siebra, Tatiana B. Gouveia, Jefte Macedo, Fabio Q. B. da Silva, André L. M. Santos, Walter Correia, Marcelo Penha, Marcelo Anjos, Fabiana Florentin. 6 [doi]
- Architectural framework in next learning support environmentToyohide Watanabe. 7 [doi]
- Design & development of digital learning resource (BMT): blended learning approachZahidah Abd Kadir, Shanti Balraj Baboo, Nurul Shuhadah Rosni, Zaidatul Husna Abd Rahman, Nurulain Abu Bakar. 8 [doi]
- Web-based application for learning Malaysian sign languageShamsul Anuar Mokhtar, Siti Sarah Shamsul Anuar, Siti Mashitah Shamsul Anuar. 9 [doi]
- Discovering users navigation of online newspaper using Markov modelHusna Sarirah Husin, Norsuhaili Seid. 10 [doi]
- Improvement of user authentication scheme preserving uniqueness and anonymity for connected health careJongho Moon, Hyungkyu Yang, Youngsook Lee, Dongho Won. 11 [doi]
- Experiments on images displayed for praising and scolding in e-learning systemsKenichi Takahashi, Masakazu Takeue, Michimasa Inaba. 12 [doi]
- An intention-based approach to the updatability of views in relational databasesYoshifumi Masunaga. 13 [doi]
- A proposal of event study methodology with Twitter sentimental analysis for risk managementTomohisa Ishikawa, Kouichi Sakurai. 14 [doi]
- Lecturers' perception on social media networks uses in educationAbdulaziz Aborujilah, Rasheed Nassr, Md. Nazmus Saadat, Munaisyah Abdullah. 15 [doi]
- Top-k frequent induced subgraph mining on a sliding window using samplingVan T. T. Duong, Kifayat-Ullah Khan, Young-Koo Lee. 16 [doi]
- Study on proactive auto scaling for instance through the prediction of network traffic on the container environmentWon-Yong Kim, Jin-Seop Lee, Eui-nam Huh. 17 [doi]
- Cryptanalysis and improvement of robust authentication scheme for telecare medicine information systemsDongwoo Kang, Donghoon Lee, Seokhyang Cho, Jaewook Jung, Dongho Won. 18 [doi]
- Dynamic weighted sequential pattern mining for USN systemPilsun Choi, Buhyun Hwang. 19 [doi]
- A proposed model of online information groundsBazilah A. Talip, Delina Beh Mei Yin. 20 [doi]
- Fusion of face recognition and facial expression detection for authentication: a proposed modelDelina Beh Mei Yin, Shariman Omar, Bazilah A. Talip, Amalia Muklas, Nur Afiqah Mohd Norain, Abu Talib Othman. 21 [doi]
- Effects of quizzes in marking supported e-learningNoriyuki Iwane, Chunming Gao, Makoto Yoshida. 22 [doi]
- Feature expression of frequency transform regarding daily power demand informationTomoya Imanishi, Rajitha Tennekoon, Hiroaki Nishi. 23 [doi]
- Salt hero: an interactive application for learning salt in chemistrySafurah Abdul Jalil, Siti Sarah Shamsul Anuar, Norariffuddin Abd Rahman. 24 [doi]
- Identifying major contents among web pages with search engine suggests by modeling topicsChen Zhao, Jiaqi Li, Tian Nie, Yi Ding, Linghan Xu, Takehito Utsuro, Yasuhide Kawada, Noriko Kando. 25 [doi]
- Immersive browsing in an image sphereGerald Schaefer, Mateusz Budnik, Bartosz Krawczyk. 26 [doi]
- TopicWave: visual exploration for topics with hierarchical time-varying dataChen-Chi Hu, Kai-Wen Xiong, Jian-Kai Guo, Chun-Min Liao, Ming-Te Chi. 27 [doi]
- Study on user customized data service model for improving data service reliabilityYunkon Kim, Eui-nam Huh. 28 [doi]
- Efficient query processing on distributed stream processing engineManhui Han, Jonghem Youn, Sang-goo Lee. 29 [doi]
- WARP: an web-based adaptive remote display protocol for improvement of user experienceJa-Hun Ku, Ga-won Lee, Eui-nam Huh. 30 [doi]
- Collection of responsive utterances to show attentive hearing attitude to speakersTomohiro Ohno, Masaki Murata, Shigeki Matsubara. 31 [doi]
- Improving the accuracy of signature authentication using the eight principles of YongTaku Nishigori, Junpei Kawamoto, Kouichi Sakurai. 32 [doi]
- A collaborative filtering method based on empathy with reviewersDaichi Minami, Taketoshi Ushiama. 33 [doi]
- C&C session detection using random forestLiang Lu, Yaokai Feng, Kouichi Sakurai. 34 [doi]
- Cache-assisted amorphous cell association for heterogeneous content delivery networksTae Yeong Kim, Dong In Kim. 35 [doi]
- Improving read performance by isolating multiple queues in NVMe SSDsMinkyeong Lee, Donghyun Kang, Minho Lee, Young Ik Eom. 36 [doi]
- Centralized management solution for vagrant in development environmentNam Pham Nguyen Xuan, Sungmin Lim, Souhwan Jung. 37 [doi]
- An enhanced unlinkable anonymous payment scheme based on near field commnicationHakjun Lee, Jiye Kim, Jaewook Jung, Youngsook Lee, Dongho Won. 38 [doi]
- Effectively mining time-constrained sequential patterns of smartphone application usageKuo-Wei Hsu. 39 [doi]
- Heterogeneous AdaBoost with stochastic algorithm selectionKuo-Wei Hsu. 40 [doi]
- Identifying user profile using Facebook photosWen-Hung Liao, Ting-Ya Chang, Yi-Chieh Wu. 41 [doi]
- An optimal data fusion for distributed multisensor systems: covariance extension methodSukhan Lee, Muhammad Abu Bakr. 42 [doi]
- A method of collecting know-how knowledge based on question-answer examples and search engine suggestsJiaqi Li, Chen Zhao, Youchao Lin, Mizuho Baba, Tian Nie, Takehito Utsuro, Yasuhide Kawada, Noriko Kando. 43 [doi]
- A flexible architecture for orchestrating network security functions to support high-level security policiesSanghak Oh, Eunsoo Kim, Jaehoon (Paul) Jeong, Hoon Ko, Hyoungshick Kim. 44 [doi]
- Clustering picture books based on an infant's developmental reactions in reviews on picture booksMizuho Baba, Hiroshi Uehara, Takehito Utsuro. 45 [doi]
- A trajectory analysis system for social media contents using AsterixDBSoyeop Yoo, Taesoo Park, Jein Song, Okran Jeong. 46 [doi]
- Topology and survivability analysis for flight flow networks: case studies of three China airline companiesXiaofeng Gao, Yaru Dang, Guihai Chen, Jian Gu, Yongjian Wang. 47 [doi]
- Information diffusion on Facebook: a case study of the sunflower student movement in TaiwanShu-I Chiu, Kuo-Wei Hsu. 48 [doi]
- Internet of family: increasing social presence of family members via sharing ambient IoT usage dataNaeun Kim, Boram Yoon, Sam Jin, Hayang Seo, Ohkyun Kwon, Jinwoo Kim. 49 [doi]
- Cryptanalysis and improvement of a biometric and smart card based remote user authentication schemeChunyi Quan, Jaewook Jung, Jiye Kim, Qimin Sun, Donghoon Lee, Dongho Won. 50 [doi]
- A study on authentication mechanism in SEaaS for SDNGreen Kim, Junghyun An, Keecheon Kim. 51 [doi]
- Low-power backscatter relay networkDaniyal Munir, Syed Tariq Shah, Won-Jin Lee, Min Young Chung. 52 [doi]
- Coordinated-beam selection scheme using mobility pattern of mobile device in 5G mobile communication systemsSeung Hyun Cha, Jun Suk Kim, Min Young Chung. 53 [doi]
- Computer simulation of tree mapping approach to project the future growth of forestYasmin Yahya, Roslan Ismail. 54 [doi]
- Geometric progression algorithm for adjacent band power allocation in OFDM based cognitive radioTien-Hoa Nguyen, Helio Augusto Muzamane, Van-Duc Nguyen. 55 [doi]
- Modularity approach for community detection in complex networksSuriana Ismail, Roslan Ismail. 56 [doi]
- Predicting political affiliation of posts on FacebookChe-Chia Chang, Shu-I Chiu, Kuo-Wei Hsu. 57 [doi]
- Analysis and comparison of fax spam detection algorithmsJaekwang Kim, Hyoungshick Kim, Jee-Hyong Lee. 58 [doi]
- A novel available bandwidth estimation method for mobile networks using a train of packet groupsShota Shiobara, Takao Okamawari. 59 [doi]
- CPE: a cloud server performance evaluation modelJun Feng, Lixia Zhang, Jiamin Lu, Bin Xu. 60 [doi]
- Multimedia data for efficient detection of visual objectsDumitru Dan Burdescu, Liana Stanescu, Marius Brezovan, Florin Slabu, Daniel EbĂ¢nca. 61 [doi]
- CLOSER: applying aggregation for effective event reconstruction of cloud service logsB. K. S. P. Kumar Raju, Nikhil Bharadwaj Gosala, G. Geethakumari. 62 [doi]
- Standard-based patient-centered personal health record systemYeong-Tae Song, Jinie Pak, Aleksejs Kalabins, Sandro Fouché. 63 [doi]
- SkyCube-tree based query processing in OLAP skyline cubesHideki Sato, Takayuki Usami. 64 [doi]
- An efficient similar image search framework for large-scale data on cloudTri D. T. Nguyen, Eui-nam Huh. 65 [doi]
- Collaborative filtering algorithm based on rating distanceYi Liu, Jun Feng, Jiamin Lu. 66 [doi]
- Physical learning support using a smartphone with image processing technologiesKenji Matsuura, Stephen Karungaru, Naka Gotoda. 67 [doi]
- Advising cache for lower cacheYoshida Kotaro, Saneyasu Yamaguchi. 68 [doi]
- A quantitative analysis of fault tolerance mechanisms for parallel machine learning systems with parameter serversMingxi Li, Yusuke Tanimura, Hidemoto Nakada. 69 [doi]
- Lumen boundary detection in IVUS medical imaging using structured elementHannah Sofian, Joel Chia Ming Than, Norliza Mohd. Noor, Suraya Mohamad. 70 [doi]
- Answer ranking based on named entity types for question answeringSangdo Han, Soonchoul Kwon, Hwanjo Yu, Gary Geunbae Lee. 71 [doi]
- Children book app as emotional learning mediaDianing Ratri, Yoomi Choi. 72 [doi]
- Two-stage approach to named entity recognition using Wikipedia and DBpediaSeonghan Ryu, Hwanjo Yu, Gary Geunbae Lee. 73 [doi]
- Parameter manipulation attack prevention and detection by using web application deception proxyTomohisa Ishikawa, Kouichi Sakurai. 74 [doi]
- Virtual running model for locating road intersections using GPS trajectory dataJinkwan Park, Hwan-Gue Cho. 75 [doi]
- An efficient resource allocation scheme for scalable video multicast in LTE-advanced networksPhuc Chau, Yong Woo Lee, Toan Duc Bui, Jitae Shin, Jaehoon (Paul) Jeong. 76 [doi]
- Syntactic pattern recognition of car driving behavior detectionMohd Nizam Husen, Sukhan Lee, Muhammad Qasim Khan. 77 [doi]
- Constructing virtual IoT network topologies with a brain-inspired connectivity modelMasaya Murakami, Kenji Leibnitz, Daichi Kominami, Tetsuya Shimokawa, Masayuki Murata. 78 [doi]
- Performance improvement of I/O intensive OLAP with dynamic control of file storing locationEita Fujishima, Kenji Nakashima, Saneyasu Yamaguchi. 79 [doi]
- Static analysis with paragraph vector for malware detectionYuta Nagano, Ryuya Uda. 80 [doi]
- Design of a trivia game for traveling and domestic enjoyment in JapanSyunya Doi, Yiqing Wang, Chen Zhao, Takehito Utsuro. 81 [doi]
- Accessible multimodal-interaction platform for computer-supported collaborative learning systemYuki Hayashi, Aoi Sugimoto, Kazuhisa Seta. 82 [doi]
- Transportation mode inference using environmental constraintsHidekazu Kasahara, Masaaki Iiyama, Michihiko Minoh. 83 [doi]
- Classification of short comments by weighted tree kernels using the hierarchy of WikipediaMashahiro Takeda, Nobuyuki Kobayashi, Hiromitsu Shiina. 84 [doi]
- Object lifetime trend of modern Android applications for GC performance improvementShintaro Hamanaka, Shun Kurihara, Shoki Fukuda, Ryusuke Mori, Masato Oguchi, Saneyasu Yamaguchi. 85 [doi]
- Application power consumption estimation considering software dependency in AndroidShun Kurihara, Shoki Fukuda, Shintaro Hamanaka, Masato Oguchi, Saneyasu Yamaguchi. 86 [doi]
- CFFQ: I/O scheduler for providing fairness and high performance in SSD devicesMinhoon Yi, Minho Lee, Young Ik Eom. 87 [doi]
- Integrating adaptive boosting and support vector machines with varying kernelsKuo-Wei Hsu. 88 [doi]
- Energy level-based efficient wireless power and information transfer in sensor networksArshad Iqbal, Yunmin Kim, Jihyoung Ahn, Tae-Jin Lee. 89 [doi]
- A study of enhancement of ranging performance of beacons through improvement of the smart phone's gyroscope: focusing on the Bluetooth low energyYohan Bu, Kyungryong Seo, Jun Ho Huh. 90 [doi]
- A PSO-based virtual SDN customization for multi-tenant cloud servicesKai Li, Jiannan Bao, Zhonghao Lu, Qi Qi, Jingyu Wang. 91 [doi]
- Mechanism to continue system availability during cyber threat scenarioSohail Safdar, Mohd. Fadzil Hassan, Karim Hajjar, Rehan Akbar, Baraa T. Sharef, Muhammad Aasim Qureshi. 92 [doi]
- An optimal investment scheme based on ATM considering cloud security environmentJun-Young Park, Sang-Ho Na, Eui-nam Huh. 93 [doi]
- Pre-interaction identification by dynamic grip classificationMohammad Faizuddin Mohd Noor, Simon Rogers, John Williamson. 94 [doi]
- A development of power consumption measurement system for Android smartphonesJaewoo Chung, HaRim Jung, Jahwan Koo, Yoonho Kim, Ung-Mo Kim. 95 [doi]
- Construction and analysis of easily fold-able processes for computer-aided origamiHiroshi Shimanuki, Toyohide Watanabe, Koichi Asakura, Hideki Sato. 96 [doi]
- Pipeline-based processing of the deep learning framework caffeAyae Ichinose, Atsuko Takefusa, Hidemoto Nakada, Masato Oguchi. 97 [doi]
- Leveraging BLE and social trust to enable mobile in situ collaborationsKhaled Alanezi, Rahat Ibn Rafiq, Lijun Chen, Shivakant Mishra. 98 [doi]
- Ushare: user controlled social media based on blockchainAntorweep Chakravorty, Chunming Rong. 99 [doi]
- Accelerated test for applications with client application and server softwareShoki Fukuda, Shun Kurihara, Shintaro Hamanaka, Masato Oguchi, Saneyasu Yamaguchi. 100 [doi]
- On unconditionally binding code-based commitment schemesKirill Morozov, Partha Sarathi Roy, Kouichi Sakurai. 101 [doi]
- Agent-mediated academic advising system: nodal approach on knowledge management system towards achieving students' graduate-on-timeShahrinaz Ismail, Sarerusaenye Ismail. 102 [doi]
- Agent-oriented simulation: new advantages in simulation optimizationAlexey S. Rodionov. 103 [doi]
- SOUYA: an open extensible search service to build rich-content applicationsPeng Xu, Xueyuan Zhao. 104 [doi]
- An IoT based monitoring framework for software defined 5G mobile networksTaras Maksymyuk, Stepan Dumych, Mykola Brych, Dimas Satria, Minho Jo 0001. 105 [doi]
- Biometric authentication by handwriting with single direction using self-organizing mapsSatoshi Kamaishi, Ryuya Uda. 106 [doi]
- Design and implementation of SDN-based lightweight IPv6 mobility manager in ONOSYunjung Yang, Seil Jeon, Daecheon Kim, Hyunseung Choo. 107 [doi]
- A fast recovery scheme based on detour planning for in-band openflow networksYongdeuk Park, Dung T. Nguyen, Byung-Seok Kang, Kang-Woo Lee, JinKyu Lee, Hyunseung Choo. 108 [doi]
- Real-time background subtraction based on GPGPU for high-resolution video surveillanceSunhee Hwang, Youngjung Uh, Minsong Ki, Kwangyong Lim, Daeyong Park, Hyeran Byun. 109 [doi]
- Software defined networking-based one-packet DDoS mitigation architectureThu-Huong Truong, Nguyen Huu Thanh. 110 [doi]
- Improving NIC algorithm using different binary structure elements for multi-modal foreground detectionThien Huynh-The, Cam-Hao Hua, Sungyoung Lee. 111 [doi]
- Joint optimization of sensing period and transmission time for energy-efficient CRSNsZilong Jin, Fanhua Kong, Jinsung Cho, Chang-Woo Kim, SangYeob Na. 112 [doi]
- A matching game approach for resource allocation in wireless network virtualizationS. M. Ahsan Kazmi, Choong Seon Hong. 113 [doi]