Abstract is missing.
- Tour Planning for AUV Data Gathering in Underwater WirelessShih-Hao Chang, Kuei-Ping Shih. 1-8 [doi]
- A Concentric-Based Sleep Scheduling Scheme for Wireless Sensor NetworksYing-Hong Wang, Yu-Hsuan Hsu, Yu-Yu Lin. 9-13 [doi]
- A Wireless Physiological Sensor Area NetworkChi-Lun Ho, Fang-Yie Leu. 14-19 [doi]
- Depth-Based Energy-Balanced Hybrid Routing Protocol for Underwater WSNsTayyaba Liaqat, Nadeem Javaid, Syed Muaraf Ali, Muhammad Imran, Mohammed Abdullah Alnuem. 20-25 [doi]
- DTN Based MANET for Disaster Information Transport by Smart DevicesShinya Kitada, Go Hirakawa, Goshi Sato, Noriki Uchida, Yoshitaka Shibata. 26-31 [doi]
- An Energy-Efficient Load Balancing Algorithm to Perform Computation Type Application Processes for Virtual Machine EnvironmentsTomoya Enokido, Makoto Takizawa. 32-39 [doi]
- Multi-level Computation and Power Consumption ModelsHiroki Kataoka, Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa. 40-47 [doi]
- Towards Multiple Knapsack Problem Approach for Home Energy Management in Smart GridS. Rahim, S. A. Khan, Nadeem Javaid, Nusrat Shaheen, zafar iqbal, Ghazanfar Rehman. 48-52 [doi]
- An Energy Efficient Residential Load Management System for Multi-class Appliances in Smart HomesMuhammad Babar Rasheed, Muhammad Awais, Nadeem Javaid, zafar iqbal, A. Khurshid, F. A. Chaudhry, F. Ilahi. 53-57 [doi]
- A Hybrid Algorithm for Energy Management in Smart GridNusrat Shaheen, Nadeem Javaid, zafar iqbal, K. Muhammad, K. Azad, F. A. Chaudhry. 58-63 [doi]
- Performance Analysis of Never Die Network Based on Software Defined Disaster Resilient SystemGoshi Sato, Noriki Uchida, Norio Shiratori, Yoshitaka Shibata. 64-70 [doi]
- A Proposal of QoS-aware Power Saving Scheme for SDN-based NetworksShingo Sasaki, Kanayo Ogura, Bhed Bahadur Bista, Toyoo Takata. 71-77 [doi]
- Performance Analysis of WMN-GA Simulation System for Different WMN Architectures and Routing Protocols Considering Weibull DistributionKeita Matsuo, Tetsuya Oda, Admir Barolli, Leonard Barolli, Fatos Xhafa. 78-84 [doi]
- Application of WMN-HC Web Interface and NS-3 for Optimization and Analysis in WMNs Considering Different Number of Mesh Routers and ArchitecturesAlgenti Lala, Tetsuya Oda, Admir Barolli, Vladi Kolici, Leonard Barolli, Fatos Xhafa. 85-92 [doi]
- Performance Evaluation of a WMN Testbed in Indoor Environment Considering Mobile Mesh Node ScenarioTetsuya Oda, Keita Matsuo, Leonard Barolli, Makoto Ikeda, Makoto Takizawa. 93-98 [doi]
- Reduction of Unnecessarily Ordered Messages in Scalable Group CommunicationHiroaki Honda, Shigenari Nakamura, Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa. 99-106 [doi]
- A Two - Stage Reservoir Sampling Algorithm for Massive Network GraphsKai Cheng. 107-114 [doi]
- Eclipse: A New Dynamic Delay-based Congestion Control Algorithm for Background TrafficHakim Adhari, Thomas Dreibholz, Sebastian Werner, Erwin Paul Rathgeb. 115-123 [doi]
- High-Speed Communication with Confidentiality by Compactification of Design DataShuji Shoji, Akio Koyama. 124-131 [doi]
- A Flexible Read-Write Abortion Protocol with Sensitivity of RolesShigenari Nakamura, Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa. 132-139 [doi]
- Location Privacy Protection Considering the Location SafetyKohei Kasori, Fumiaki Sato. 140-145 [doi]
- A Negotiated Virtual Role Solution in RBAC Scheme for Group-Based Heterogeneous Wireless NetworksHsing-Chung Chen. 146-150 [doi]
- Mitigating the Wrongful Bandwidth Occupation by Malicious Node in Public Wireless Access NetworkShohei Nitta, Tetsuya Shigeyasu. 151-157 [doi]
- Wi-Fi Access Point Roaming: Challenges and Potential SolutionsLianyuan Wang, Yuxuan Zhao, David Olalekan Afolabi, Ka Lok Man, Hai-Ning Liang, Dawei Liu, Yiu Fai Lam, Charles Fleming, Moncef B. Tayahi. 158-161 [doi]
- Building a Secure Cross Platform Enterprise Service Mobile Apps Using HTML5Hsin-Chang Lin, Guanling Lee. 162-166 [doi]
- A Handover Prediction Mechanism Based on LTE-A UE History InformationYing-Hong Wang, Jui-Lin Chang, Guo-Rui Huang. 167-172 [doi]
- A Load-Balancing Algorithm for Hadoop Distributed File SystemChi-Yi Lin, Ying Chen Lin. 173-179 [doi]
- Suggestion of the Cloud Type Virtual Policy Based Network Management Scheme for the Common Use between Plural OrganizationsKazuya Odagiri, Shogo Shimizu, Naohiro Ishii, Makoto Takizawa. 180-186 [doi]
- An Extensible Home Automation Architecture Based on Cloud OffloadingYuichi Igarashi, Matti A. Hiltunen, Kaustubh R. Joshi, Richard D. Schlichting. 187-194 [doi]
- Distributed Synchronization over RESTful Web APIDaiki Murayama, Shouki Mizuno, Akihiro Fujii. 195-198 [doi]
- A Cloud-Based Mobile Anger Prediction ModelYuan-Chih Yu. 199-205 [doi]
- Mobile Cloud Computing on Delay Tolerant Network ProtocolYosuke Kikuchi, Yoshitaka Shibata. 206-211 [doi]
- SSH: Salient Structures Histogram for Content Based Image RetrievalJamil Ahmad, Muhammad Sajjad, Irfan Mehmood, Sung Wook Baik. 212-217 [doi]
- Exploring the Cognitive Psychology Paradigm of a Programming Language and Identification of Emotion under Collective Intelligence: An Experience with an Ant Colony MetaphorEiman Tamah Al-Shammari, Soumya Banerjee, Dana Timar Balas, Neil Y. Yen. 218-225 [doi]
- Implementation and Evaluation of a Spatial Metadata Join Method Based on Camera-Viewing AreaMasato Kasahara, Shu Li, Kosuke Takano, Kin Fun Li. 226-231 [doi]
- A Method for Estimating a Stress State Using a Pulse Sensor for QOL VisualizationSayaka Akiyama, Yuka Kato. 232-237 [doi]
- IslayTouch: An Educational Visual Programming Environment Based on State-Transition Diagrams that Runs on Android DevicesErjing Zhou, Shusuke Okamoto, Michitoshi Niibori, Masaru Kamada, Tatsuhiro Yonekura. 238-241 [doi]
- Business Resilient Vulnerability Analysis for Dynamic High Security EnvironmentKlaus Zaerens. 242-249 [doi]
- Security Authorization Scheme for Web ApplicationsTakamichi Saito, Daichi Miyata, Takafumi Watanabe, Yuta Nishikura. 250-256 [doi]
- CAPTCHA System by Differentiating the Awkwardness of ObjectsMichitomo Yamaguchi, Takeshi Okamoto, Hiroaki Kikuchi. 257-263 [doi]
- An Attempt to Memorize Strong Passwords while Playing GamesMasahiro Fujita, Mako Yamada, Shiori Arimura, Yuki Ikeya, Masakatsu Nishigaki. 264-268 [doi]
- Personalized Cryptography in Data Sharing and ManagementMarek R. Ogiela, Lidia Ogiela. 269-272 [doi]
- Incrementally Mining Usage Correlations among Appliances in Smart HomesYi-Cheng Chen, Hsiu-Chieh Hung, Bing-Yang Chiang, Sheng-Yuan Peng, Peng-Jun Chen. 273-279 [doi]
- SAX-based Group Stock Portfolio Mining ApproachChun-Hao Chen, Cheng-Yu Lu, Chih-Hung Yu. 280-285 [doi]
- Multivariate and Categorical Analysis of Gaming StatisticsPin-Yu Chen, Zhengling Qi, Yanxin Pan, Shin-Ming Cheng. 286-293 [doi]
- An Algorithm of City-Level Landmark Mining Based on Internet ForumGuang Zhu, Xiangyang Luo, Fenlin Liu, Jingning Chen. 294-301 [doi]
- Rail Inspection Meets Big Data: Methods and TrendsQingyong Li, Zhangdui Zhong, Zhengping Liang, Yong Liang. 302-308 [doi]
- Push-Based Traffic-Aware Cache Management in Named Data NetworkingKenta Mori, Takashi Kamimoto, Hiroshi Shigeno. 309-316 [doi]
- A GPU-based Fast Solution for Riesz Space Fractional Reaction-Diffusion EquationQinglin Wang, Jie Liu, Chunye Gong, Yang Zhang, Zuocheng Xing. 317-323 [doi]
- Design of Application Specific Throughput Processor for Matrix OperationsPing-Ju Wu, Chien-Yu Lin, Bo-Cheng Charles Lai. 324-331 [doi]
- Effectiveness Comparison of Kinect and Kinect 2 for Recognition of Oyama Karate TechniquesTomasz Hachaj, Marek R. Ogiela, Katarzyna Koptyra. 332-337 [doi]
- A New FACS for Cellular Wireless Networks Considering QoS: A Comparison Study of FuzzyC with MATLABTakaaki Inaba, Shinji Sakamoto, Tetsuya Oda, Leonard Barolli, Makoto Takizawa. 338-344 [doi]
- Selection of Rendezvous Point in Content Centric Networks Using Fuzzy LogicDonald Elmazi, Tetsuya Oda, Shinji Sakamoto, Elis Kulla, Evjola Spaho, Leonard Barolli. 345-350 [doi]
- An Efficient Genetic Algorithm Based Demand Side Management Scheme for Smart GridMuhammad Awais, Nadeem Javaid, Nusrat Shaheen, zafar iqbal, Ghazanfar Rehman, K. Muhammad, I. Ahmad. 351-356 [doi]
- Energy-Efficient Broadcast Protocols in Wireless NetworkMiyu Sugino, Shigenari Nakamura, Tomoya Enokido, Makoto Takizawa. 357-364 [doi]
- A Road Alert Information Sharing System with Multiple Vehicles Using Vehicle-to-Vehicle Communication Considering Various Communication Network EnvironmentKenta Ito, Go Hirakawa, Yoshikazu Arai, Yoshitaka Shibata. 365-370 [doi]
- Efficient Remote Software Execution Architecture Based on Dynamic Address Translation for Internet-of-Things Software Execution PlatformMin Woo Jung, Daejin Park, Jeonghun Cho. 371-378 [doi]
- Selective Delivery of Event Messages in Peer-to-Peer Topic-Based Publish/Subscribe SystemsHiroki Nakayama, Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa. 379-386 [doi]
- Proposal of Connectivity Support Methods with Autonomous Flight Wireless Nodes for Never Die NetworkNoriki Uchida, Goshi Sato, Yoshitaka Shibata, Norio Shiratori. 387-392 [doi]
- Dynamically Deploying Packet Processing Applications on Running Systems without HaltingRalph Duncan, Peder Jungck, Kenneth Ross, Alfredo Chorro-Rivas, Jim Frandeen, Minh Nguyen. 393-400 [doi]
- Preparing HPC Applications for Exascale: Challenges and RecommendationsErika Ábrahám, Costas Bekas, Ivona Brandic, Samir Genaim, Einar Broch Johnsen, Ivan Kondov, Sabri Pllana, Achim Streit. 401-406 [doi]
- Eco Models of Storage-Based SeversAtsuhiro Sawada, Shigenari Nakamura, Tomoya Enokido, Makoto Takizawa. 407-411 [doi]
- Risk Assessment in Cyber-Physical System in Office EnvironmentShoichi Yoneda, Shigeaki Tanimoto, Tsutomu Konosu, Hiroyuki Sato, Atsushi Kanai. 412-417 [doi]
- A Simulation System Based on ONE and SUMO Simulators: Performance Evaluation of Direct Delivery, Epidemic and Energy Aware Epidemic DTN ProtocolsTetsuya Oda, Donald Elmazi, Evjola Spaho, Vladi Kolici, Leonard Barolli. 418-423 [doi]
- Performance Evaluation of Routing Method Based on Neighboring Node Information in WMNWataru Kobayashi, Kazunori Ueda, Yuta Maruoka. 424-431 [doi]
- Efficient Dynamic Load Balancing for Structured P2P NetworkAtsushi Takeda, Takuma Oide, Akiko Takahashi, Takuo Suganuma. 432-437 [doi]
- An Assessment System for Student's Physical Expression in Nature Sound Ensemble with Narrative PicturesKaede Yamazaki, Shu Li, Kosuke Takano. 438-443 [doi]
- Sizzle Word Analysis from Multiple Internet MediaDaisuke Kato, Mai Miyabe, Eiji Aramaki, Akiyo Nadamoto. 444-451 [doi]
- A System for Querying RDF Data Using LINQKazumasa Kumamoto, Toshiyuki Amagasa, Hiroyuki Kitagawa. 452-457 [doi]
- Acquiring Application History for Successful Handover of Business TasksTakuya Okada, Yoshinari Nomura. 458-463 [doi]
- A Scheduling Method for Division Based Broadcasting of Multiple Video Considering Data SizeYusuke Gotoh. 464-469 [doi]
- Dynamic Data Broadcasting Methods for Streaming Delivery on Hybrid Broadcasting EnvironmentsTomoki Yoshihisa. 470-475 [doi]
- On Streaming Consistency of Big Data Stream Processing in Heterogenous ClutsersFatos Xhafa, Victor Naranjo, Leonard Barolli, Makoto Takizawa. 476-482 [doi]
- Performance Evaluation of a Message Suppression Controller in Vehicular-DTN without Road-Side UnitsSeiichiro Ishikawa, Taiki Honda, Makoto Ikeda, Leonard Barolli. 483-488 [doi]
- (k, e)-Anonymous for Ordinal DataSurapon Riyana, Nattapon Harnsamut, Torsak Soontornphand, Juggapong Natwichai. 489-493 [doi]
- Reliable Cluster on Uncertain MultigraphPruet Boonma, Juggapong Natwichai. 494-498 [doi]
- Crowdsourcing Environment to Create Voice Interaction Scenario of Spoken Dialogue SystemYuichi Matsushita, Takahiro Uchiya, Ryota Nishimura, Daisuke Yamamoto, Ichi Takumi. 499-504 [doi]
- Proposal of the Disaster Information Transmission Common Infrastructure System Intended to Rapid Sharing of Information in a Time of Mega DisasterKazuhiro Takahagi, Tomoyuki Ishida, Akira Sakuraba, Kaoru Sugita, Noriki Uchida, Yoshitaka Shibata. 505-510 [doi]
- Healthcare Digital Signage Using Gamification MethodTetsuro Ogi, Kenichiro Ito, Go Nakada. 511-516 [doi]
- Evaluation of a Communication Support Tool for Understanding Emotion in an Unstable Narrowband NetworkKaoru Sugita, Ken Nishimura. 517-520 [doi]
- Data Gathering System for Recommender System in TourismGo Hirakawa, Goshi Satoh, Kenji Hisazumi, Yoshitaka Shibata. 521-525 [doi]
- Data Reduction by Generating 3D ImageHideo Miyachi. 526-529 [doi]
- An Evaluation on Realistic Sensation in Ultra-Resolution Video Tele-communication with Tiled Display WallYasuo Ebara. 530-535 [doi]
- Application of Tiled Display Environment for High Presence Informal CommunicationSatoshi Noda, Yu Ebisawa, Yasuo Ebara, Tomoyuki Ishida, Koji Hashimoto, Yoshitaka Shibata. 536-541 [doi]
- A Design for Interface Device for Counter Disaster GIS on Ultra High Definition Tiled Display EnvironmentAkira Sakuraba, Tomoyuki Ishida, Yasuo Ebara, Yoshitaka Shibata. 542-547 [doi]
- A Fuzzy-Based Testbed Design for Wireless Sensor and Actuator NetworksKeisuke Ebisu, Takaaki Inaba, Donald Elmazi, Makoto Ikeda, Leonard Barolli, Elis Kulla. 548-553 [doi]
- SAMI: A Sensor Actor Network Matlab ImplementationElis Kulla, Tetsuya Oda, Makoto Ikeda, Leonard Barolli. 554-560 [doi]
- An Object Tracking System Based on SIFT and SURF Feature Extraction MethodsYuki Sakai, Tetsuya Oda, Makoto Ikeda, Leonard Barolli. 561-565 [doi]
- Tibetan Text Sentiment Classification Based on RulesTao Huang, Xiaodong Yan. 566-569 [doi]
- Research on Construction of Tibetan Emotion DictionaryXiaodong Yan, Tao Huang. 570-572 [doi]
- New Functions for an Active Learning System to Improve Students Self-Learning and ConcentrationNoriyasu Yamamoto. 573-576 [doi]
- Transmission Characteristics in Two Dimensional Periodic Waveguide Structures with 45 Degree BendHiroshi Maeda. 577-580 [doi]
- Development Tool of Q-Nash Learning Agent for Intelligent SystemMasato Hibino, Takahiro Uchiya, Ichi Takumi, Tetsuo Kinoshita. 581-585 [doi]
- Design Monitoring Systems for Multi-channel Technology in Wireless Sensor NetworksChia-Hsin Cheng, Yeong-Long Shiue, Yi Yan, Chien-Chih Lin, Hsing-Chung Chen. 586-590 [doi]
- Development of Open-Campus Event System Using Voice Interaction AgentTakahiro Uchiya, Masaki Yoshida, Daisuke Yamamoto, Ichi Takumi. 591-595 [doi]
- Performance of Hand Gesture Recognition Based on Received Signal Strength with Weighting Signaling in Wireless CommunicationsYung-Fa Huang, Tsung-Yu Yao, Hua-Jui Yang. 596-600 [doi]
- A Token-Based User Authentication Mechanism for Data Exchange in RESTful APIXiang-Wen Huang, Chin-Yun Hsieh, Cheng-Hao Wu, Yu Chin Cheng. 601-606 [doi]
- Application of Incremental SVM Learning for Infant Cries RecognitionChuan-Yu Chang, Yu-Chi Hsiao, Szu-Ta Chen. 607-610 [doi]
- Two-Phase Activity Recognition with Smartphone SensorsHui-Huang Hsu, Chin-Ting Chu, Yinghui Zhou, Zixue Cheng. 611-615 [doi]
- Analysis of Parallel Sub-swarm PSO with the Same Total Particle NumbersTzung-Pei Hong, Jui-Chi Chen, Wen-Yang Lin, Chun-Hao Chen. 616-619 [doi]
- Performance Evaluation of a Neural Network Based Intrusion Detection System for Tor Networks Considering different Hidden UnitsTaro Ishitaki, Tetsuya Oda, Keita Matsuo, Leonard Barolli, Makoto Takizawa. 620-627 [doi]
- An Efficient Privacy Authentication Scheme Based on Cloud Models for Medical EnvironmentZhaoqin Ying, Shin Yan Chiou, Junqiang Liu. 628-633 [doi]
- SPIKE: Scalable Peer Intermediaries for Key Establishment in Sensor NetworksYumi Sakemi, Masahiko Takenaka, Tetsuya Izu. 634-639 [doi]
- New Publicly Verifiable Databases Supporting Insertion OperationMeixia Miao, Jianfeng Wang, Jianfeng Ma. 640-642 [doi]
- Secure Outsourcing of Modular Exponentiation with Single Untrusted ServerJun Ye, Jianfeng Wang. 643-645 [doi]
- Analysis of Path ORAM toward Practical UtilizationSteven Gordon, Atsuko Miyaji, Chunhua Su, Karin Sumongkayyothin. 646-651 [doi]
- Trustworthiness in Peer-to-Peer SystemsShota Nakahira, Shigenari Nakamura, Tomoya Enokido, Makoto Takizawa. 652-657 [doi]
- Evaluation of Peers Trustworthiness for JXTA-overlay Considering Data Download Speed, Local Score and Security ParametersYi Liu, Shinji Sakamoto, Leonard Barolli, Makoto Ikeda, Fatos Xhafa. 658-664 [doi]
- Proposal of Rhythm Authentication Method Using Users Classification by Self-Organizing MapYoshihiro Kita, Mirang Park, Naonobu Okazaki. 665-668 [doi]
- Extracting Polarity Comments from Nico Nico DougaHiroki Sakaji, Junya Ishibuchi, Hiroyuki Sakai. 669-672 [doi]
- Classification of Comments on Nico Nico Douga for Annotation Based on Referred ContentsAkihito Ikeda, Akio Kobayashi, Hiroki Sakaji, Shigeru Masuyama. 673-678 [doi]
- A New Method of Utilizing Video Content Structured on the Basis of the RDF: Combining Broadcasting Content with External Services Using RDF TriplesMakoto Urakawa, Masaru Miyazaki, Ichiro Yamada, Hiroshi Fujisawa, Toshio Nakagawa. 679-684 [doi]
- Document Management System Based on ISAD(G)Tongjin Lee, Jun Iio. 685-689 [doi]
- A Scheduling Model of a Lunch CarHironori Harada, Masaki Kohana, Shusuke Okamoto. 690-693 [doi]
- Design and Practice of File Backup System Taking Advantage of Remotely Distributed CampusesHiroshi Noguchi, Yasuhiro Ohtaki, Masaru Kamada. 694-697 [doi]
- Web-Based Location Sharing Service for a Group of People to Get TogetherShuji Ogawa, Michitoshi Niibori, Masaru Kamada. 698-701 [doi]
- Development of IslayPub3.0 - Educational Programming Environment Based on State-Transition DiagramsKazuomi Suzuki, Michitoshi Niibori, Adnan Saleh Rashed, Shusuke Okamoto, Masaru Kamada. 702-705 [doi]
- A Software Framework for Internet of ThingsTakahiro Inui, Mashaki Kohana, Shusuke Okamoto, Masaru Kamada. 706-709 [doi]
- Student Attendance Management System with Bluetooth Low Energy Beacon and Android DevicesShota Noguchi, Michitoshi Niibori, Erjing Zhou, Masaru Kamada. 710-713 [doi]
- A System for Confirming Attendance at WorkMasaki Kohana, Shusuke Okamoto. 714-717 [doi]
- Library Navigation System with FeliCa Cards as LandmarksXiaolei Li, Erjing Zhou, Osamu Saitou, Masaru Kamada. 718-721 [doi]