Abstract is missing.
- Comparison of Experimental Results of a MANET Testbed in Different Environments Considering BATMAN ProtocolElis Kulla, Masahiro Hiyama, Makoto Ikeda, Leonard Barolli. 1-7 [doi]
- Investigation into Batman-adv Protocol Performance in an Indoor Mesh Potato TestbedEdmundo Chissungo, Edwin Blake, Hanh Le. 8-13 [doi]
- Mobile Ad-hoc Network Routing Protocols Performance Evaluation Using NS-3 SimulatorMakoto Ikeda, Masahiro Hiyama, Elis Kulla, Leonard Barolli. 14-20 [doi]
- An Exploratory Social Network Analysis of Academic Research NetworksSergio L. Toral Marín, Nik Bessis, M. Rocío Martínez-Torres, Florian Franc, Federico Barrero, Fatos Xhafa. 21-26 [doi]
- Diffusion in Social Networks and Market StabilityNikos Salamanos, Dimitris Konstantopoulos. 27-34 [doi]
- Comparative Evaluations of Evolutionary Computation with Elite Obtained in Reduced Dimensional SpacesYan Pei, Hideyuki Takagi. 35-40 [doi]
- Genetically Evolved Fuzzy Predictor for Photovoltaic Power Output EstimationPavel Krömer, Václav Snásel, Jan Platos, Ajith Abraham, Lukás Prokop, Stanislav Misák. 41-46 [doi]
- Unsorting the Proportional Fairness RelationMario Köppen, Kaori Yoshida, Masato Tsuru. 47-52 [doi]
- A Tabu Search Algorithm for Efficient Node Placement in Wireless Mesh NetworksFatos Xhafa, Christian Sánchez, Admir Barolli, Makoto Takizawa. 53-59 [doi]
- Linked Open Data for Learning Object Discovery: Adaptive e-Learning SystemsBurasakorn Yoosooka, Vilas Wuwongse. 60-67 [doi]
- Endowing e-Learning Systems with Emotion AwarenessMichalis Feidakis, Thanasis Daradoumis, Santi Caballé. 68-75 [doi]
- Can Games Based Learning Assists Teachers in Achieving the Aims of Curriculum to Bilingual Students of Different Ethnic Minorities?Konstantinos Kalemis. 76-83 [doi]
- Kindergarten Children as Story Makers: The Effect of the Digital MediumTharrenos Bratitsis, Triantafyllos Kotopoulos, Kyriaki Mandila. 84-91 [doi]
- Strong Security Enabled Certificateless Aggregate Signatures Applicable to Mobile ComputationHu Xiong, Qianhong Wu, Zhong Chen. 92-99 [doi]
- Distributed Privacy-Preserving Secure Aggregation in Vehicular CommunicationBo Qin, Qianhong Wu, Josep Domingo-Ferrer, Willy Susilo. 100-107 [doi]
- Linear Complexities of the Frequency Hopping Sequences in Two Optimal SetsJuntao Gao, Xuelian Li. 108-114 [doi]
- R-MAC: A MAC Protocol for Power Reduction in Wireless Sensor Networks Based on Load Estimation and Its Performance EvaluationAkio Koyama, Ryoma Watanabe, Leonard Barolli, Makoto Takizawa. 115-121 [doi]
- Analysis of Field Distribution and Density of Sensor NodeJunichi Honda, Kazunori Uchida. 122-129 [doi]
- A Fuzzy-Based Cluster-Head Selection System for WSNs Considering Sensor Node MovementHironori Ando, Qi Wang, Leonard Barolli, Elis Kulla, Arjan Durresi, Fatos Xhafa. 130-135 [doi]
- A Routing Protocol Based on Power-Controlled Sleep Scheduling for Wireless Sensor NetworksYing-Hong Wang, Yu-Chu Lin, Cheng-Hung Tsai. 136-140 [doi]
- Context Parsing, Processing and Distribution in CloudsSaad Liaquat Kiani, Ashiq Anjum, Nik Bessis, Richard Hill, Michael Knappmeyer. 141-148 [doi]
- Modelling Requirements for Enabling Meta-scheduling in Inter-Clouds and Inter-EnterprisesNik Bessis, Stelios Sotiriadis, Valentin Cristea, Florin Pop. 149-156 [doi]
- A Study on Operation of Photovoltaic Grid System Using Weather ForecastKenichi Fujii, Motoi Yamagiwa, Minoru Uehara. 157-163 [doi]
- On Exploitation vs Exploration of Solution Space for Grid SchedulingFatos Xhafa, Bernat Duran, Joanna Kolodziej, Leonard Barolli, Makoto Takizawa. 164-171 [doi]
- A Planes Detection Algorithm Based on Feature DistributionL. G. Zhao, C. K. Wu. 172-177 [doi]
- Fast Parallel Computation of Tate PairingZhitu Su, Chunhui Sun, Hui Li, Jianfeng Ma, Kai Fan. 178-183 [doi]
- A Study on the Performance of Wireless Localization System Based on AoA in WSN EnvironmentYang-Sun Lee, Ji-Min Lee, Sang-Soo Yeo, Jong Hyuk Park, Leonard Barolli. 184-187 [doi]
- Effects of Mutation and Crossover in Genetic Algorithms for Node Placement in WMNs Considering Number of Covered Users ParameterTetsuya Oda, Admir Barolli, Evjola Spaho, Fatos Xhafa, Leonard Barolli. 188-195 [doi]
- Comparison Evaluation of Static and Mobile Sensor Nodes in Wireless Sensor Networks Considering Packet-Loss and Delay MetricsTao Yang, Leonard Barolli, Jiro Iwashige, Arjan Durresi, Fatos Xhafa. 196-202 [doi]
- An Alternative Implementation of 3FT RAID in Virtual Large Scale DisksMinoru Uehara. 203-208 [doi]
- An OpenMP Compiler for Hybrid CPU/GPU Computing ArchitectureHung-Fu Li, Tyng-Yeu Liang, Jhen-Lin Jiang. 209-216 [doi]
- Energy Efficient Distributed Systems for Storage ServersTakuro Inoue, Ailixier Aikebaier, Tomoya Enokido, Makoto Takizawa. 217-224 [doi]
- Challenges in Automating Collaborative NegotiationsRaiye Hailu, Takayuki Ito. 225-232 [doi]
- Knowledge Reuse: Its Role and Implications for Upper Level OntologiesJordi Conesa, Veda C. Storey, Vijayan Sugumaran, Santi Caballé. 233-240 [doi]
- Generation of Offensive Strategies in Robot Soccer GameJie Wu 0007, Vaclav Svaton, Jan Martinovic, Eliska Ochodkova, Václav Snásel. 241-244 [doi]
- A New Slot Assignment Method for Slotted CSMA Based on Maximum Clique ExtractionTetsuya Shigeyasu, Xiong Liu, Hiroshi Matsuno. 245-250 [doi]
- MS2HM: A Multimedia Service Session Handoff Method between Heterogeneous Wireless NetworksYulong Shen, Zhiwei Zhang, Jianfeng Ma, Qingqi Pei, Qijian Xu, Hao Yin. 251-257 [doi]
- Homomorphic Linear Authentication Schemes for Proofs of RetrievabilityShengli Liu, Kefei Chen. 258-262 [doi]
- Forward Secure Proxy Blind Signature SchemeKai Fan, Yue Wang, Hui Li. 263-267 [doi]
- A New Strong Multiple Designated Verifiers Signature for Broadcast PropagationHaibo Tian. 268-274 [doi]
- Abuse-freeness Electronic Payment ProtocolKai Fan, Yue Wang, Hui Li. 275-278 [doi]
- Optimal Forwarding Criterion of Utility-Based Routing under Sequential Encounters for Delay Tolerant NetworksAkihiro Fujihara, Shiro Ono, Hiroyoshi Miwa. 279-286 [doi]
- Proposal of an Evolutional Architecture for Metabolic ComputingMinoru Uehara. 287-292 [doi]
- Fairness with Semi-rational Players in Standard Communication NetworksYilei Wang, Qiuliang Xu. 293-298 [doi]
- Node Degree-Aware Link Cost for Traffic Load-Distribution in Large-Scale NetworksHitomi Tamura, Mario Köppen, Masato Uchida, Masato Tsuru, Yuji Oie. 299-304 [doi]
- A perfSONAR-based Integrated Multi-domain Network Measurement Platform - Internet Monitoring as a ServiceKatsuichi Nakamura, Masato Tsuru, Yuji Oie. 305-312 [doi]
- Exploring Web Search Behavior Patterns to Personalize the Search ResultsWalisa Romsaiyud, Wichian Premchaiswadi. 313-319 [doi]
- HGRP: Hybrid Grid Routing Protocol for Heterogeneous Hierarchical Wireless NetworksYulong Shen, Qingqi Pei, Ning Xi, Jianfeng Ma, Qijian Xu, Hao Yin. 320-327 [doi]
- Design and Implementation of a Dynamic Reconfigurable Classroom for Cooperative LearningHideki Kondo, Hiroyuki Narahara. 328-329 [doi]
- Study on Energy-Efficient Routing Protocol Based on Experimental EvaluationSatoru Akimoto, Hitomi Tamura, Kenji Kawahara, Yoshiaki Hori. 330-331 [doi]
- A New Generation Network Architecture to Accommodate Virtual Network Application ServicesHiroaki Yamanaka, Masayoshi Shimamura, Shuji Ishii, Eiji Kawai, Katsuyoshi Iida, Masato Tsuru. 332-333 [doi]
- Heuristic Information Retrieval Using Variable Identifiers in Mobile Ad-hoc NetworksKazuki Kume, Kei Ohnishi, Kazuya Tsukamoto, Shinya Yamamura, Akira Nagata. 334-335 [doi]
- Q-learning Based p-pesistent CSMA MAC Protcol for Secondary User of Cognitive Radio NetworksSarenna Bao, Takeo Fujii. 336-337 [doi]
- Performance Evaluation of Power Saving Scheme for Wireless LAN with Station AggregationDaiki Nobayashi, Kazumi Kumazoe, Yutaka Fukuda, Takeshi Ikenaga, Tetsuya Ito. 338-339 [doi]
- P2P-based Contents Distribution Method Using Network Coordinates SystemHiroshi Yamamoto, Katsuyuki Yamazaki. 340-341 [doi]
- An Information Search Method Based on Management Area Segmentation with Multiple Mobile Agents in Unstructured Peer-to-Peer NetworksTakayuki Yamamoto, Shinji Sugawara, Yutaka Ishibashi. 342-343 [doi]
- Efficient Contents Sharing Using Differences between Versions in Peer-to-Peer NetworksToshinobu Hayashi, Shinji Sugawara, Yutaka Ishibashi. 344-345 [doi]
- Implementation of Activity Recognition from Accelerometers on Mobile PhonesGo Hirakawa, Thin Thin Nwe, Yuichi Hattori, Sozo Inoue. 346-347 [doi]
- Low-Latency Normalization Method for Multi-user MIMO System Using Vector Perturbation PrecoderShogo Fujita, Leonardo Lanante, Yuhei Nagao, Masayuki Kurosaki, Hiroshi Ochi. 348-349 [doi]
- A Framework of AP Aggregation Using Virtualization for High Density WLANsTakahiro Nagai, Hiroshi Shigeno. 350-355 [doi]
- A Piecewise Packet Mapping Algorithm for Video Transmission over 802.11e Wireless NetworksWen-Ping Lai, Bo Li. 356-361 [doi]
- Cognitive Wireless Network for Large Scale DisasterNoriki Uchida, Kazuo Takahata, Yoshitaka Shibata. 362-366 [doi]
- An Extension of Active Access-Point Selection Algorithm for Throughput Maximization in Wireless Mesh NetworksNobuo Funabiki, Junki Shimizu, Toru Nakanishi, Kan Watanabe, Shigeru Tomisato. 367-372 [doi]
- A Fuzzy-Based System for Data Replication in P2P NetworksEvjola Spaho, Leonard Barolli, Fatos Xhafa, Jiro Iwashige, Akio Koyama. 373-377 [doi]
- Enriching and Impoverishing Types of Write Operations in the Multimedia Quorum-based (MQB) ProtocolTadateru Ohkawara, Ailixier Aikebaier, Tomoya Enokido, Makoto Takizawa. 378-383 [doi]
- Performance Evaluation of SmartBox End-Device for Medical Applications Using JXTA-Overlay P2P SystemYuichi Ogata, Kouhei Umezaki, Evjola Spaho, Keita Matsuo, Leonard Barolli, Jiro Iwashige. 384-389 [doi]
- Trustworthy Group Based Agreement Protocol in Scalable Distributed NetworksAilixier Aikebaier, Tomoya Enokido, Makoto Takizawa. 390-395 [doi]
- Using Diagonal and Horizontal Vertical Sobel Operators Spam DetectionPeng Wan, Minoru Uehara. 396-400 [doi]
- Comparison Evaluation of Encryption Methods for a User Attestation System Using a Cellular PhoneNoriyasu Yamamoto, Toshihiko Wakahara. 401-407 [doi]
- Steganographic Algorithm Injection in Image Information Systems Used in Healthcare OrganizationsEdlira Martiri, Artur Baxhaku, Ezmolda Barolli. 408-411 [doi]
- Electric Field Intensity Computed by DRTM in Relation to the Number of Plate Observation Points and FrequencyMasafumi Takematsu, Junichi Honda, Kazunori Uchida. 412-417 [doi]
- Doppler Shifted Scattering from a Target Moving Along Inhomogeneous Random Rough SurfaceShunsuke Nakashima, Junichi Honda, Kazunori Uchida. 418-423 [doi]
- Dispersive Video Frame Importance Driven Probabilistic Packet Mapping for 802.11e Based Video TransmissionWen-Ping Lai, En-Cheng Liou, Wei-Hao Fu. 424-429 [doi]
- Application of Horner Method to Approximate Fresnel FunctionYuuki Kimura, Junichi Honda, Kazunori Uchida. 430-433 [doi]
- A Seminar Record Editing AlgorithmNatthaphong Udomkarn, Toshihiko Wakahara. 434-439 [doi]
- FOAF-Academic Ontology: A Vocabulary for the Academic CommunityEdlira Kalemi, Edlira Martiri. 440-445 [doi]
- Performance Evaluation of User Interfaces According to User Computer Skill and Computer SpecificationsShinichi Inenaga, Kaoru Sugita, Tetsushi Oka, Masao Yokota. 446-449 [doi]
- A Seamless Connection for Authentication Required Web Sites by ShibbolethKenzi Watanabe, Makoto Otani. 450-452 [doi]
- A New One-time Authentication System Using a Cellular Phone with FeliCa ChipYusuke Kowakame, Toshihiko Wakahara. 453-456 [doi]
- A Fair Exchange Protocol for Attribute CertificationYuji Suga. 457-461 [doi]
- Detection and Prohibition of NAPT for Network User Authentication System "Opengate"Mitsuhiro Suenaga, Makoto Otani, Kenzi Watanabe. 462-465 [doi]
- The Best Learning Order Inference Based on Blue-Red Trees of Rule-Space Model for Social Network - Case in ITE CourseYung-Hui Chen, Lawrence Y. Deng, Ku-Chen Huang. 466-471 [doi]
- Micro E-board: An Interactive Teaching Aid Using Mobile DevicesHiroaki Nishino, Shota Hidaka, Tsuneo Kagawa, Kouichi Utsumiya. 472-477 [doi]
- A Support System Using Moodle for Improving Students UnderstandingWei-Yong Zhao, Toshihiko Wakahara. 478-483 [doi]
- A Fuzzy-Based Trustworthiness System for JXTA-Overlay P2P PlatformKouhei Umezaki, Evjola Spaho, Yuichi Ogata, Leonard Barolli, Fatos Xhafa, Jiro Iwashige. 484-489 [doi]
- Design and Implementation of 3D MeshRAID in Virtual Large-Scale DisksMinoru Uehara. 490-495 [doi]
- Evaluation of the Improved EPCLB Algorithm for Distributed ApplicationsTomoya Enokido, Makoto Takizawa. 496-501 [doi]
- The Evaluation of Transfer Time, CPU Consumption and Memory Utilization in XEN-PV, XEN-HVM, OpenVZ, KVM-FV and KVM-PV Hypervisors Using FTP and HTTP ApproachesIgli Tafa, Ermal Beqiri, Hakik Paci, Elinda Kajo, Aleksander Xhuvani. 502-507 [doi]
- Performance of a Stable Unit Active Queue ManagementFumihiko Nakamura, Takuo Nakashima. 508-513 [doi]
- A Smart-Travel System Based on Social Network Service for Cloud EnvironmentJason C. Hung, Victoria Hsu, Yu-Bing Wang. 514-519 [doi]
- Evaluation of Bottlenecks in an Educational Cloud EnvironmentShinichiro Kibe, Minoru Uehara, Motoi Yamagiwa. 520-525 [doi]
- A Study on a Secure Wireless Link Creation Based on Multi-path Routing Combined with Transmit Antenna Directivity ControlMasaaki Yamanaka, Norihiko Morinaga, Shinichi Miyamoto, Seiichi Sampei. 526-531 [doi]
- Relationship between Source Height and Distance Order of Propagation Along Random Rough SurfaceJunichi Honda, Kazunori Uchida. 532-536 [doi]
- Hexagonal Resonator in Two Dimensional Photonic Crystal StructureHiroshi Maeda, Hiroyuki Terashima, YongMei Zhang, Takuya Shinohara. 537-540 [doi]
- Development of Medical Imaging Diagnosis Support System with Sound EffectsTsuneo Kagawa, Hideki Kudo, Shuichi Tanoue, Hiro Kiyosue, Hiromu Mori, Hiroaki Nishino, Kouichi Utsumiya. 541-545 [doi]
- An Efficiency of Optimization Method of Sign Sound Using Interactive Differential EvolutionMakoto Fukumoto, Shintaro Ogawa. 546-551 [doi]
- Measurement of Reading Characteristics of Multiplexed Image in QR CodeDamri Samretwit, Toshihiko Wakahara. 552-557 [doi]
- A New Research Support SystemToshihiko Wakahara, Noriyasu Yamamoto, Natthaphong Udomkarn, Damri Samretwit, Wei-Yong Zhao. 558-562 [doi]
- Reshaping and Reconstructing Handwritten Character Typeface Using Dynamic Font ModelHiroyuki Fujioka, Shinya Miyata. 563-568 [doi]
- A Graph Theoretic Algorithm for Recovering Drawing Order of Multi-stroke Handwritten ImagesTakayuki Nagoya, Hiroyuki Fujioka. 569-574 [doi]
- Approximation Algorithm for Finding Protected Links to Keep Small Diameter against Link FailuresKoji Imagawa, Takeshi Fujimura, Hiroyoshi Miwa. 575-580 [doi]
- Network Design Method by Link Protection for Network Load Alleviation against FailuresAkira Noguchi, Takeshi Fujimura, Hiroyoshi Miwa. 581-586 [doi]
- A Generic Approach to Multi-fairness and Its Application to Wireless Channel AllocationMario Köppen, Kaori Yoshida, Masato Tsuru. 587-593 [doi]
- Store-Carry-Forward Based Networking Infrastructure: Vision and PotentialShinya Yamamura, Akira Nagata, Masato Tsuru. 594-599 [doi]
- Development of IPv6/IPv4 Translator Using High Performance Packet Processing EngineRyo Sasaki, Makoto Otani, Kenzi Watanabe. 600-604 [doi]
- Protocol Enhancement for Near Field Communication (NFC): Future Direction and Cross-Layer ApproachHiroshi Sakai, Akira Arutaki. 605-610 [doi]
- Influence of Interference with Moving Terminal in Wireless LAN Environment and Evaluation of Behavior of QoS-TCPRemi Ando, Tutomu Murase, Masato Oguchi. 611-616 [doi]
- MVA Modeling of Multi-core Server Distributed SystemsYuki Nakamizo, Hiroshi Koide, Kazumi Yoshinaga, Dirceu Cavendish, Yuji Oie. 617-620 [doi]
- Selecting Measurement Paths for Efficient Network Monitoring and Diagnosis under Operational ConstraintsAtsuo Tachibana, Shigehiro Ano, Masato Tsuru. 621-626 [doi]
- From Insider Threats to Business Processes that are Secure-by-DesignDieter Gollmann. 627 [doi]
- On Data Importance AnalysisShinsaku Kiyomoto, Yutaka Miyake. 628-633 [doi]
- Towards Countermeasure of Insider Threat in Network SecurityYoshiaki Hori, Takashi Nishide, Kouichi Sakurai. 634-636 [doi]
- Towards Detecting Suspicious Insiders by Triggering Digital Data SealingTakayuki Sasaki. 637-642 [doi]
- A Mechanism on Risk Analysis of Information Security with Dynamic AssessmentChien-Ting Kuo, He-Ming Ruan, Chin-Laung Lei, Shih-Jen Chen. 643-646 [doi]
- Development of Network User Authentication Gateway System Using "High Performance Packet Processing Engine"Yuki Wakamizu, Makoto Otani, Kenzi Watanabe. 647-651 [doi]
- Insider Threats are Getting Worse within Industries: Isolated Secondary Backup RequiredKwangjin Bae, Sungjin Kim, Yongoo Lee, Ilsun You, Kangbin Yim, Taeho Son. 652-655 [doi]
- Security of Offline Anonymous Electronic Cash Systems against Insider Attacks by Untrusted Authorities RevisitedTakashi Nishide, Kouichi Sakurai. 656-661 [doi]
- Certificateless Ordered Sequential Aggregate Signature SchemeNaoto Yanai, Raylin Tso, Masahiro Mambo, Eiji Okamoto. 662-667 [doi]
- Multi-authority Attribute-Based SignatureDan Cao, BaoKang Zhao, Xiaofeng Wang, Jinshu Su, Guofei Ji. 668-672 [doi]
- Image Based Crypto-biometric Key GenerationMarek R. Ogiela, Lidia Ogiela. 673-678 [doi]
- A Forensic Analysis of Images on Online Social NetworksAniello Castiglione, Giuseppe Cattaneo, Alfredo De Santis. 679-684 [doi]
- On the Construction of a False Digital Alibi on the Android OSPietro Albano, Aniello Castiglione, Giuseppe Cattaneo, Giancarlo De Maio, Alfredo De Santis. 685-690 [doi]
- Characterizing and Classifying Card-Sharing Traffic through Wavelet AnalysisAniello Castiglione, Alfredo De Santis, Francesco Palmieri. 691-697 [doi]
- The AVQ Algorithm: Watermarking and Compression PerformancesRaffaele Pizzolante, Bruno Carpentieri, Aniello Castiglione, Giancarlo De Maio. 698-702 [doi]
- KVM-based Detection of Rootkit AttacksXingjun Zhang, Endong Wang, Long Xin, Zhongyuan Wu, Weiqing Dong, Xiaoshe Dong. 703-708 [doi]
- A Scalable Fault Management Architecture for ccNUMA ServerYan Yang, Xingjun Zhang, Endong Wang, Nan Wu, Xiaoshe Dong. 709-714 [doi]
- Software-Based Detecting and Recovering from ECC-Memory FaultsXingjun Zhang, Endong Wang, Dong Zhang, Yu Wang, Weiguo Wu, Xiaoshe Dong. 715-719 [doi]
- Characterizing Time-Varying Behavior and Predictability of Cache AVFYu Cheng, Yongwen Wang, Zuocheng Xing, Minxuan Zhang. 720-725 [doi]
- Introduction of Acquiring Method for Agents' Actions with Simple Ant Colony Optimization in RoboCup Rescue Simulation SystemHisayuki Sasaoka. 726-728 [doi]
- A Bayesian Filter Approach to Modelling Human Movement Patterns for First Responders within Indoor LocationsEoghan Furey, Kevin Curran, Paul McKevitt. 729-734 [doi]
- A Collective Intelligence Resource Management Dynamic Approach for Disaster Management: A Density Survey of Disasters OccurrenceEleana Asimakopoulou, Nik Bessis, Stelios Sotiriadis, Fatos Xhafa, Leonard Barolli. 735-740 [doi]
- An Event-based Approach to Supporting Team Coordination and Decision Making in Disaster Management ScenariosFatos Xhafa, Eleana Asimakopoulou, Nik Bessis, Leonard Barolli, Makoto Takizawa. 741-745 [doi]
- Linked Data in Disaster Mitigation and PreparednessThushari Silva, Vilas Wuwongse, Hitesh Nidhi Sharma. 746-751 [doi]
- Rushing Attack in Mobile Ad Hoc NetworksAbdullah Saad Al Shahrani. 752-758 [doi]
- Evaluation of Ad Hoc Networks in Disaster ScenariosD. G. Reina, Sergio L. Toral Marín, Federico Barrero, Nik Bessis, Eleana Asimakopoulou. 759-764 [doi]
- Allocation of Base Stations by Using PSO MethodJun-Hyuck Lee, Junichi Honda, Kazunori Uchida. 765-770 [doi]
- Performance Evaluation of MANET Testbed in a Mixed Indoor and Outdoor EnvironmentMasahiro Hiyama, Elis Kulla, Makoto Ikeda, Leonard Barolli, Jiro Iwashige. 771-776 [doi]
- Performance Evaluation of a Fuzzy-based Integrated CAC and Handover System for Cellular NetworksLeonard Barolli, Gjergji Mino, Elis Kulla, Akio Koyama, Jiro Iwashige. 777-786 [doi]
- Knowledge Constructive Jigsaw as an Adaptive Learning Framework: Its Design Principles and Network SupportsNaomi Miyake. 787-788 [doi]
- An Ontology-Based Approach for Context-Aware E-learningNicola Capuano, Matteo Gaeta, Saverio Salerno, Giuseppina Rita Mangione. 789-794 [doi]
- A Framework for Dealing with Knowledge about On-line Collaborative Learning SessionsJordi Conesa, Santi Caballé, David Ganan Jimenez, Josep Prieto. 795-800 [doi]
- Interoperability Scenarios to Measure Informal Learning Carried Out in PLEsMiguel Ángel Conde González, Francisco José García Peñalvo, Marc Alier Forment. 801-806 [doi]
- Emotion Measurement in Intelligent Tutoring Systems: What, When and How to MeasureMichalis Feidakis, Thanasis Daradoumis, Santi Caballé. 807-812 [doi]
- Exploring Learning Pattern in Social NetworkSoumya Banerjee, Santi Caballé. 813-817 [doi]
- CC-LO: A New Type of Learning Object for the Virtualization of Live Collaborative SessionsSanti Caballé, Nestor Mora, Ian Dunwell, David Ganan Jimenez. 818-823 [doi]
- An Integrated Model for E-assessment of Learning Experiences Enriched with Complex Learning ResourcesMohammad Al-Smadi, Margit Hoefler, Christian Guetl. 824-829 [doi]
- Blended Game-Based Learning Environments: Extending a Serious Game into a Learning Content Management SystemIan Dunwell, Panagiotis Petridis, Sylvester Arnab, Aristidis Protopsaltis, Maurice Hendrix, Sara de Freitas. 830-835 [doi]
- A New Model for Storytelling Complex Learning ObjectsGiuseppina Rita Mangione, Francesco Orciuoli, Anna Pierri, Pierluigi Ritrovato, Marcello Rosciano. 836-841 [doi]
- Exploring Fish School Algorithm for Improving Turnaround Time: An Experience of Content RetrievalSoumya Banerjee, Santi Caballé. 842-847 [doi]
- Ethnic Immigrant Minorities and Mobile Learning for Schools - A Class without Walls: A New Didactic Approach to Digital Literacy across the CurriculumKonstantinos Kalemis. 848-854 [doi]
- The Evaluation of ReCoNote Summaries for Learner-Centered IntegrationSayaka Tohyama, Naomi Miyake. 855-856 [doi]
- Recommendation System Based on Competing AlgorithmsElnaz Mazandarani, Kaori Yoshida, Mario Köppen, Wladimir Bodrow. 857-862 [doi]
- Color Effect on Subjective Perception of Progress Bar SpeedKentaro Hamada, Kaori Yoshida, Kei Ohnishi, Mario Köppen. 863-866 [doi]
- A Study on Information Recommendation Systems for Continuous UseHiroko Shoji, Hiroo Inamura, Akihiro Ogino. 867-871 [doi]
- Measurement and Classification of the Affective Value of Drum Rhythm PatternsYuta Kurotaki, Hisao Shiizuka. 872-875 [doi]
- Kansei/Affective Decision MakingHisao Shiizuka, Ayako Hashizume. 876-881 [doi]