Abstract is missing.
- Advanced Internet of ThingsLei Zhang, Nathalie Mitton. 1-8 [doi]
- Web of Things: Description, Discovery and IntegrationSujith Samuel Mathew, Yacine Atif, Quan Z. Sheng, Zakaria Maamar. 9-15 [doi]
- D-LITe: Distributed Logic for Internet of Things ServicesSylvain Cherrier, Yacine Ghamri-Doudane, Stéphane Lohier, Gilles Roussel. 16-24 [doi]
- Hyper-Environments: A Different Way to Think about IoTJonata Tyska Carvalho, Rafael Penna, Silvia Silva da Costa Botelho, Nelson Duarte Filho, Rodrigo Ruas Oliveira, Edevaldo Santos. 25-32 [doi]
- A Framework for Dynamic Updating of Service Pack in the Internet of ThingsJianhua Liu, Weiqin Tong. 33-42 [doi]
- Ontology Based Service Discovery Method for Internet of ThingsSimin Yang, Yang Xu, Qingyi He. 43-47 [doi]
- An Experimental Facility for Wireless Multi-hop Networks in Future Internet ScenariosOliver Hahm, Mesut Günes, Felix Juraschek, Bastian Blywis, Nicolai Schmittberger. 48-57 [doi]
- Scalable ID/Locator Resolution for the IoTGeorge Roussos, Paul Chartier. 58-66 [doi]
- Time Stamp-Based Algorithm for Task Scheduling in a Distributed Computing System with Multiple Master Multiple Slave ArchitectureSanjay Kumar Dhurandher, Ankit Aggarwal, Aashish Bhandari, Abhishek Verma, Mohammad S. Obaidat, Isaac Woungang. 67-73 [doi]
- GPEP: Graphics Processing Enhanced Pattern-Matching for High-Performance Deep Packet InspectionLucas Vespa, Ning Weng. 74-81 [doi]
- Design and Implementation of a Fault Tolerant Multiple Master Cloud Computing SystemMohammad S. Obaidat, Harsh Bedi, Aashish Bhandari, M. S. Don Bosco, Ankur Maheshwari, Sanjay Kumar Dhurandher, Isaac Woungang. 82-88 [doi]
- From U-Tile to Indoor-Tracer: An Indoor Location Sensing Platform Based on Passive RFIDLei Jing, Zixue Cheng, Yinghui Zhou, Junbo Wang. 89-93 [doi]
- Wireless Intelligent Fire Fighting Systems Software Platform R&DSheng'an Duan, Kaitao Cheng, Quanbo Ge, Chenglin Wen. 94-99 [doi]
- Massive Heterogeneous Sensor Data Management in the Internet of ThingsZhiming Ding, Qi Yang, Hong Wu. 100-108 [doi]
- Anonymous Video Processing for Live Street ViewUlrik Söderström, Haibo Li 0001. 109-113 [doi]
- A Learning Automata Based Solution for Preventing Distributed Denial of Service in Internet of ThingsSudip Misra, P. Venkata Krishna, Harshit Agarwal, Antriksh Saxena, Mohammad S. Obaidat. 114-122 [doi]
- An Optimized Schema to Improve the Time Efficiency of the EPG Gen-2 ProtocolXin-Qing Yan, Juan Bai, Yan Xu, Bin Li. 123-126 [doi]
- On Error Performance Improvements of Passive UHF RFID Systems via Syndrome DecodingRobert Morelos-Zaragoza. 127-130 [doi]
- ENST: A Simulation Toolbox Based on Simulink for E-Textile NetworksWei Cheng, Nenggan Zheng, Man Lin, Laurence Tianruo Yang. 131-138 [doi]
- Principal-Agent Theory Model in Dynamic Spectrum SharingYang Liu, Zhikui Chen, Xiaoning Lv. 139-143 [doi]
- Improvement of Assurance for Wireless Sensor Networks Using Packet Detouring and Dispersed Data TransmissionTomoya Okazaki, Eitaro Kohno, Yoshiaki Kakuda. 144-151 [doi]
- ODAM-C: An Improved Algorithm for Vehicle Ad Hoc NetworkWeifeng Sun, Tong Fu, Yu Su, Feng Xia, Jianhua Ma. 152-156 [doi]
- An Algorithm of Weighted Monte Carlo Localization Based on Smallest Enclosing CircleJiang Xu, Fanyu Bu, Wei Si, Yiteng Qiu, Zhikui Chen. 157-161 [doi]
- Towards a Smart Campus with Mobile Social NetworkingZhiwen Yu, Yunji Liang, Bukan Xu, Yue Yang, Bin Guo. 162-169 [doi]
- Social Media Game Concept within the Digital Zoo: New Ways of Connecting a Tourist Attraction with Its VisitorsKarin Fahlquist, Thomas Mejtoft, Johannes Karlsson. 170-177 [doi]
- Internet of Things: An Emerging Industrial or a New Major?Huansheng Ning, Sha Hu. 178-183 [doi]
- Connecting Agriculture to the Internet of Things through Sensor NetworksJunyan Ma, Xingshe Zhou, ShiNing Li, Zhigang Li. 184-187 [doi]
- Study on the Effect of Utility Uncertainty on Behavior Diffusion in Autonomous and Rational NetworksYufeng Wang, Athanasios V. Vasilakos, Jianhua Ma. 188-194 [doi]
- Management System for IPv6-Enabled Wireless Sensor NetworksLuís M. L. Oliveira, Joao P. Amaral, João M. L. P. Caldeira, Joel J. P. C. Rodrigues, Liang Zhou. 195-200 [doi]
- Improved Compact Routing Scheme with Applications in Static Sensor Networks and InternetQin Xin, Jean-Charles Delvenne, Zhanlong Zhang, Wei He. 201-208 [doi]
- Understanding Location-Based Information Sharing in a Mobile Human Computation GameDion Hoe-Lian Goh, Khasfariyati Razikin, Alton Y. K. Chua, Chei Sian Lee, Keng Tiong Tan. 209-216 [doi]
- SoPhoNet: Photo Sharing Based on Participatory SensingWei Liu, Zeming Zheng, Gang Pan, Shijian Li. 217-224 [doi]
- Toward High-Level Activity Recognition from Accelerometers on Mobile PhonesSozo Inoue, Yuichi Hattori. 225-231 [doi]
- Energy Efficiency Based on Quality of Data for Cyber Physical SystemsLuong Thi Thu Phuong, Nguyen Trung Hieu, Jin Wang, Sungyoung Lee, Young-Koo Lee. 232-241 [doi]
- Power-Efficient Cyber-Physical Late Arrival Detection with SmartphonesDaniel Guymon, Brian Dougherty, Jules White, Mani Golparvar Fard. 242-251 [doi]
- Supervised Gabor-Based Kernel Locality Preserving Projections for Face RecognitionChuang Lin, Xirui Sun, Kuanjiu Zhou, Feng Xia. 252-257 [doi]
- Touch-Driven Interaction between Physical Space and Cyberspace with NFCLongbiao Chen, Gang Pan, Shijian Li. 258-265 [doi]
- Does Age Make a Difference in the Behaviour of Online Social Network Users?Darren Quinn, Liming Chen, Maurice D. Mulvenna. 266-272 [doi]
- Physical Proximity and Online User Behaviour in an Indoor Mobile Social Networking ApplicationBin Xu, Alvin Chin, Hao Wang, Lele Chang, Ke Zhang, Fangxi Yin, Hao Wang, Li Zhang. 273-282 [doi]
- Better Organizing Your Contacts: An Empirical Study of an Intelligent Social Contact Management SystemDingqi Yang, Bin Guo, Daqing Zhang. 283-290 [doi]
- Anomaly Detection on Collective Moving Patterns: A Hidden Markov Model Based SolutionSu Yang, Weihua Liu. 291-296 [doi]
- Living with Internet of Things: The Emergence of Embedded IntelligenceBin Guo, Daqing Zhang, Zhu Wang. 297-304 [doi]
- A Structural Approach for Finding Real-Friend Links in Internet Social NetworksYao-Ting Huang, Kuan-Hung Lin, Bang Ye Wu. 305-312 [doi]
- Emerging Trust Patterns in Online CommunitiesSonia C. Sousa, David Lamas. 313-316 [doi]
- Influence Strength Aware Diffusion Models for Dynamic Influence Maximization in Social NetworksFei Hao, Chunsheng Zhu, Min Chen, Laurence T. Yang, Zheng Pei. 317-322 [doi]
- MuZi: Multi-channel ZigBee Networks for Avoiding WiFi InterferenceRuitao Xu, Gaotao Shi, Jun Luo, Zenghua Zhao, Yantai Shu. 323-329 [doi]
- A Selfish Node Preventive Real Time Fault Tolerant Routing Protocol for WSNsChi Lin, Guowei Wu, MingChu Li, Xiaojie Chen, Zuosong Liu, Lin Yao. 330-337 [doi]
- MLMAC: Multi-channel Low-latency MAC Protocol for Industrial Wireless Sensor NetworksXuan Zhang, Guangchi Liu, Qian Tian, Zhiqun Li. 338-342 [doi]
- Autonomous Coordination Technology in Wireless Sensor Networks for Online ExpansionMd. Emdadul Haque, Fan Wei, Takehiro Gouda, Xiaodong Lu, Kinji Mori. 343-350 [doi]
- N-Times Trilateral Centroid Weighted Localization Algorithm of Wireless Sensor NetworksYu Zhou, Tie Qiu, Feng Xia, Gang Hou. 351-357 [doi]
- Empirical Analysis of Behavior on Information SecurityToshihiko Takemura. 358-363 [doi]
- Vulnerability Analysis of the Simple Multicast Forwarding (SMF) Protocol for Mobile Ad Hoc NetworksJiazi Yi, Thomas H. Clausen, Ulrich Herberg. 364-371 [doi]
- Using a Smart Phone to Strengthen Password-Based AuthenticationWeili Han, Ye Cao, Chang Lei. 372-379 [doi]
- A Taxonomy of Cyber Attacks on SCADA SystemsBonnie Zhu, Anthony D. Joseph, Shankar Sastry. 380-388 [doi]
- Goal-Driven Navigation for Learning Activities Based on Process OptimizationJian Chen, Haifeng Man, Qun Jin, Runhe Huang. 389-395 [doi]
- An Optimal Unequal Frame Protection Scheme in Video StreamingChing-Lung Chang, Yu-shian Lin, Ching-Hung Chang. 396-401 [doi]
- Characterizing SMP Virtual Machine Scheduling in Virtualization EnvironmentJia Tian, Yuyang Du, Hongliang Yu. 402-408 [doi]
- Task Matching in CrowdsourcingMan-Ching Yuen, Irwin King, Kwong-Sak Leung. 409-412 [doi]
- User-Session-Based Test Cases Optimization Method Based on Agglutinate Hierarchy ClusteringYue Liu, Kang Wang, Wang Wei, Bofeng Zhang, Hailin Zhong. 413-418 [doi]
- Event Similarity Computation in TextXujie Zhang, Zongtian Liu, Wei Liu, Wenjie Xu, Dong Wang. 419-423 [doi]
- A Willing Events Identification MethodYan Zhao, Wen Zhou, Yao Li, Zongtian Liu, Ying Zhu, Ping Zhu. 424-431 [doi]
- Using Metadata to Maintain Link Integrity for Linked DataFangfang Liu, Xiaojing Li. 432-437 [doi]
- Modeling Predicate Abstraction of Timed Automata in PVSXia Yin, Qingguo Xu, Kunliang Han. 438-443 [doi]
- User Model Evolution Algorithm: Forgetting and Reenergizing User PreferenceBo Zhou, Bofeng Zhang, Yucong Liu, Kun Xing. 444-447 [doi]
- Behavior Based User Interests Extraction AlgorithmKun Xing, Bofeng Zhang, Bo Zhou, Yucong Liu. 448-452 [doi]
- A Kind of Case Similarity Evaluation Model Based on Case-Based ReasoningHao-bin Shi, Mingjun Xin, Wenjie Dong. 453-457 [doi]
- Document Clustering Method Based on Visual FeaturesYucong Liu, Bofeng Zhang, Kun Xing, Bo Zhou. 458-462 [doi]
- The Methods of Data Prefetching Based on User Model in Cloud ComputingYunwen Ge, Shaochun Wu, Bowen Yuan, Jiazheng Li. 463-466 [doi]
- A Dynamic Image Matching Model and Architecture for Smart DevicesTanvir Shahid, Ashraf Uddin Ahmed, Christopher Craney, Bill Haraguchi. 467-472 [doi]
- Forgery Attacks on Two Pairing-Based Proxy Signature SchemesChan Wang, Xiaotong Fu. 473-478 [doi]
- The Effects of Innovation Alliance on Network Structure and Association RulesFei Shengnan, Zhou Wen, Liu Zongtian, Zhao Yan, Zhu Ying, Lu Xiao-Long. 479-482 [doi]
- A TCM Diagnosis System Based on Textbook Information ExtractionWenhao Zhu, Li Fu, Lei Xu, Bofeng Zhang. 483-487 [doi]
- Topic Tracking Based on Event NetworkDong Wang, Wei Liu, Wenjie Xu, Xujie Zhang. 488-493 [doi]
- An Education Support System with Anonymized Medical Data Based on Thin Client SystemYutaka Hatakeyama, Hiromi Kataoka, Noriaki Nakajima, Teruaki Watabe, Yoshiyasu Okuhara, Yusuke Sagara. 494-497 [doi]
- The Structure of Psychological Resistance and Incentives in Lifelog Disclosure: An Experimental Study with Smartphone UsersTetsuro Kobayashi, Noboru Sonehara, Yu Ichifuji. 498-502 [doi]
- A Proposal of "Identity Commons": Utilization of Life Log and ID Information for Resilient Social SystemMemiko Otsuki, Noboru Sonehara. 503-507 [doi]
- Location Privacy in Mobile Telephony Networks - Conflict of Interest between Safety, Security and PrivacyKlaus Rechert, Konrad Meier, Dennis Wehrle, Dirk von Suchodoletz. 508-513 [doi]
- Data Provenance with Watermarks for Usage Control Monitors at Disaster RecoveryMartin Salfer, Sven Wohlgemuth, Sebastian Schrittwieser, Bernhard Bauer, Isao Echizen. 514-519 [doi]
- Quasi Real-Time Evaluation System for Seismic Disaster Based on Internet of ThingsZhikui Chen, Zhenyu Li, Jing Li, Jianyun Chen, Yang Liu. 520-524 [doi]
- Query Performance Evaluation of OWL Storage ModelJinhyung Kim, Dongmin Seo, Hanmin Jung, Pyung Kim, Seungwoo Lee, Won-Kyung Sung. 525-528 [doi]
- Towards Discovering Emerging Technologies Based on Decision TreeJinhee Lee, Jinhyung Kim, Seungwoo Lee, Dongmin Seo, Hanmin Jung, Won-Kyung Sung. 529-532 [doi]
- Measuring Similarities between Technical Terms Based on WikipediaMyunggwon Hwang, Do-Heon Jeong, Seungwoo Lee, Hanmin Jung. 533-536 [doi]
- Multi-faceted Navigation of Legal DocumentsSeungwoo Lee, Pyung Kim, Dongmin Seo, Jinhyung Kim, Jinhee Lee, Hanmin Jung, Christian Dirschl. 537-540 [doi]
- Establishing Usability and Development Strategies: Focused on Intelligent Legislation Support SystemMikyoung Lee, Hanmin Jung, Jinhyung Kim, Young-Hyun Choi, Seungin Kim. 541-545 [doi]
- CAPK: A Learning Process Model for Web 2.0 Technology Enhanced Community of PracticeHaifeng Man, Hong Chen, Yan Wu, Qun Jin. 546-551 [doi]
- Learning by Logging: Supporting Ubiquitous Learning Using a Lifelogging ToolHiroaki Ogata, Mengmeng Li, Bin Hou, Noriko Uosaki, Yoneo Yano. 552-557 [doi]
- Building a Search Engine for Scientific Projects SurveyChengjiu Yin, Yoshiyuki Tabata, Xiaobin Wu, Tetsuya Nakatoh, Sachio Hirokawa. 558-563 [doi]
- A Hybrid P2P Search Engine for Social LearningAshraf Uddin Ahmed, Tanvir Shahid, Hong Chen, Qun Jin. 564-569 [doi]
- TSI-Enhanced Engaging Pedagogical AgentsSteve Leung, Sandeep Virwaney, Fuhua Lin, Andrew J. Armstrong. 570-575 [doi]
- The Effect of Integrating STS Strategy to Online Inquiry-Based Learning on Students' Learning PerformanceGwo-Jen Hwang, Han-Yu Sung, Hong-Sheng Chang. 576-580 [doi]
- Online Japanese Composition Correction SystemYuqin Liu, Guohai Jiang, Bo Jiang, Bing Yan. 581-584 [doi]
- Implementation of CALL-Based Online Janpanese Learning SystemLanling Han, Dechao Liu, Yunqin Liu. 585-588 [doi]
- Trust Behavior Based Recommender System for Software UsageZheng Yan, Peng Zhang. 589-591 [doi]
- Web of X Service Environment for Ubiquitous Network and ComputingZhenyu Wu, Chunhong Zhang, Yang Ji, Yunjie Liu. 592-597 [doi]
- Role-Based Contextual RecommendationCheng Zeng, Liang Hong, Jian Wang, Chuan He, Jilei Tian, Xiaogang Yang. 598-601 [doi]
- Using Physical Context in a Mobile Social Networking Application for Improving Friend RecommendationsBin Xu, Alvin Chin, Hao Wang, Hao Wang. 602-609 [doi]
- Monitoring Energy Consumption of SmartphonesFangwei Ding, Feng Xia, Wei Zhang, Xuhai Zhao, Chengchuan Ma. 610-613 [doi]
- Using Smartphones in Healthcare and to Save LivesGábor Kiss. 614-619 [doi]
- Smart Baggage in AviationFarid Abedan Kondori, Shahrouz Yousefi. 620-623 [doi]
- Study of Classroom Teaching Aids System Based on Wearable Computing and Centralized Sensor Network TechniqueZhang Heng, Chen Dong Yi, Ling Jian Zhong. 624-628 [doi]
- Remote Neonatal Pain Assessment System Based on Internet of ThingsYang Zhong, Li Liu. 629-633 [doi]
- i-Function of Electronic Cigarette: Building Social Network by Electronic CigaretteBo Li, Shafiq ur Réhman, Haibo Li 0001. 634-637 [doi]
- A Novel Depth Map Generation Method Based on K-Means Clustering and Depth Pattern RecognitionHao Jiang, Shuxu Guo, Siming Meng, Xiaonan Luo. 638-643 [doi]
- Symbiotic, Mobile Methodologies for Digital-to-Analog ConvertersZhenhua Wang, Benxiong Huang, Zhe Guo, Lai Tu. 644-647 [doi]
- Statistical Modeling for Image Matching in Large Image DatabasesDavid Källberg, Oleg Seleznjev, Nikolai Leonenko, Haibo Li 0001. 648-652 [doi]
- Network Worm Propagation Model Based on a Campus Network TopologyAliyu Mohammed, Sulaiman Mohd Nor, Muhammad Nadzir Marsono. 653-659 [doi]
- Edge-Collapse Mesh Simplification Method Based on Gauss CurvatureYan Tang, Qingchen Zhang. 660-662 [doi]
- An Improved Iris Localization Method for Authentication SystemZongqiang Zhang, MingChu Li, Feng Xia, Jianhua Ma. 663-666 [doi]
- A Multi-attribute Hierarchical Threshold SchemeDong Jiao, MingChu Li, Cheng Guo, Jianhua Ma. 667-671 [doi]
- Internet of Things and Co-creation of ValueThomas Mejtoft. 672-677 [doi]
- Personal Relative Time: Towards Internet of WatchesAlaa Halawani, Haibo Li 0001. 678-682 [doi]
- Personal Internet-Driven Maps Based on Time DistancesUlrik Söderström. 683-686 [doi]
- Nodes Social Relations Cognition for Mobility-Aware in the Internet of ThingsJian An, Xiaolin Gui, Wendong Zhang, Jinhua Jiang. 687-691 [doi]
- An Architecture of Data Processing Using Deluge Computing in Internet of ThingsYang Liu, Zhikui Chen, Haozhe Wang, Xiaoning Lv. 692-697 [doi]
- Pervasive Computing Oriented Interval-Valued Fuzzy Trust Model ResearchZhanrong Chen, Xunwen Xu, Longxin Lin. 698-701 [doi]
- A New Authenticated Tripartite Key Agreement ProtocolCao Pan, Hui Ding, Hongyuan Wang. 702-704 [doi]
- Model of TrustRank Evaluation Based on Fuzzy Set for Pervasive ComputingXunwen Xu, Zhanrong Chen. 705-708 [doi]
- RFID as an Enabler of the Internet of Things: Issues of Security and PrivacyBenjamin Khoo. 709-712 [doi]
- Internet of FoodJean-Paul Kouma, Li Liu. 713-716 [doi]
- A QoS Architecture for IOTRen Duan, XiaoJiang Chen, Tianzhang Xing. 717-720 [doi]
- A Resource Management and Control Model Supporting Applications in the Internet of ThingsYan Shi, Min Sheng, Fang He. 721-725 [doi]
- Qualitative Evaluation of a Proposed Federated Object Naming Service ArchitectureSandoche Balakrichenan, Antonio Kin-Foo, Mohsen Souissi. 726-732 [doi]
- Using SOA in Critical-Embedded SystemsDouglas Rodrigues, Rayner de Melo Pires, Júlio Cezar Estrella, Emerson Alberto Marconato, Onofre Trindade Júnior, Kalinka Regina Lucas Jaquie Castelo Branco. 733-738 [doi]
- SWRL Bridge-Peer Model: An Improved Super-Peer Model Based on the Extended SWRL and Its ApplicationYu Liu, Ruomei Wang, Liyi Peng, Xiaonan Luo. 739-743 [doi]
- Interaction Design for Digital ZooKeni Ren, Johannes Karlsson, Haibo Li 0001. 744-747 [doi]
- Research on Wireless Sensor Network and Carrying Network Integration Based on GatewayYanyan Han, Deshi Li, Jian Chen, Tianyu Wang. 748-751 [doi]
- A Reliable Transmission Protocol Based on Dynamic Link CacheHao Chen, Dingyi Fang, XiaoJiang Chen, Feng Chen, Xiaoqing Gong, Baishun Zhou, Lang Qin. 752-755 [doi]
- The Rapid Worm Detecting Technology in Large-Scale NetworkYongjian Wang, Bin Feng, Shupeng Wang. 756-761 [doi]
- A Simulation Platform for Measurements in Dynamic Environment of Ultrasonic WirelessZhanwei Du, Yongjian Yang, Shuqiu Li, Li Ma, Xiange Li, Yuan Bai. 762-767 [doi]
- Address Allocation in IPv6 Sensor Networks for Medical Monitoring ApplicationsLujuan Ma, Deshi Li, Yuanyuan Zeng, Xianli Liu, Xiaoliang Wang. 768-771 [doi]