Abstract is missing.
- Treatment of Missing Data in Intelligent Lighting ApplicationsAravind Kota Gopalakrishna, Tanir Özçelebi, Antonio Liotta, Johan J. Lukkien. 1-8 [doi]
- Development of the Smart Toilet Equipment with Measurements of Physiological ParametersJi-Jer Huang, Sheng-I Yu, Hao-Yi Syu. 9-16 [doi]
- Development of a Route Finding System for Manual Wheelchair Users Based on Actual Measurement DataYasuaki Sumida, Masaki Hayashi, Kazuaki Goshi, Katsuya Matsunaga. 17-23 [doi]
- A Lingustic Approach for Robustness in Context Aware ApplicationsYoung-Mok Min, Joon-Young Paik, Eun-Sun Cho. 24-31 [doi]
- Downlink Scheduling and Resource Allocation in EPON-WiMAX Integrated NetworksChung-Chih Kuo, Hung-Yi Teng, Ren-Hung Hwang. 32-39 [doi]
- SocioTelematics: Leveraging Interaction-Relationships in Developing Telematics Systems to Support Cooperative ConvoysMuhammad Ashad Kabir, Jun Han, Alan W. Colman, Jian Yu. 40-47 [doi]
- Data Gathering in a Hybrid Wireless Sensor NetworkHua-Wen Tsai, Tzung-Shi Chen, Bing-Hong Tsai, Cheng-Hao Chu, Jeng-Shian Tsai. 48-55 [doi]
- Anycast Routing Based on Connectivity Metric for Sensor and Ad Hoc NetworksSatoru Ohta, Shingo Toda. 56-63 [doi]
- A Content-Based Publish/Subscribe System for Efficient Event Notification over Vehicular Ad Hoc NetworksFusang Zhang, Beihong Jin, Wei Zhuo, Zhaoyang Wang, Lifeng Zhang. 64-71 [doi]
- Performance Analysis of LTE Smartphones-Based Vehicle-to-Infrastrcuture CommunicationHassan Abid, TaeChoong Chung, Sungyoung Lee, Saad B. Qaisar. 72-78 [doi]
- Improving the Estimation of Residual Delay based Forwarding Method in Opportunistic Vehicular NetworksJianbin Jia, Yingwen Chen, Ming Xu, Gu Yu. 79-86 [doi]
- Exploiting Ultrasonic Reflections for Improving Accuracy of Indoor Location TrackingKang-Wook Kim, Myung-Gon Park, Takao Hishikawa, Junghee Han, Chang-Gun Lee. 87-95 [doi]
- Routine Based Analysis for User Classification and Location PredictionYibing Xiong, Huiping Lin. 96-103 [doi]
- MPIGate: A Solution to Use Heterogeneous Networks for Assisted Living ApplicationsHugo Cruz-Sanchez, Lionel Havet, Moutie Chehaider, Yeqiong Song. 104-111 [doi]
- 3D Modeling and Simulation of Human Activities in Smart SpacesAbdelsalam Helal, Kyungeun Cho, Wonsik Lee, Yunsick Sung, Jaewoong Lee, Eunju Kim. 112-119 [doi]
- Java Virtual Machine Based Infrastructure for Decent Wireless Sensor Network Development EnvironmentXing Liu, Xun Xing Diao, Kun Mean Hou, Hailun Zhu, Xin Liu, Yazhou Wang, Wei Jia. 120-127 [doi]
- Situation-Based Design: A Rapid Approach for Pervasive Application DevelopmentLei Tang, Xingshe Zhou, Christian Becker, Zhiwen Yu, Gregor Schiele. 128-135 [doi]
- A Mobile Application Framework for Rapid Integration of Ubiquitous Web ServicesMeng-Yen Hsieh, Hua-Yi Lin, Ching-Hung Yeh, Kuan-Ching Li, Bo-Shiung Wu. 136-142 [doi]
- Study of a Conversational Agent System Encouraging "Real" Answers of Individuals in a Group of AcquaintancesAkihito Yoshii, Tatsuo Nakajima. 143-150 [doi]
- Intelligent Systems that Combine Pervasive Computing and Social NetworkingSarah Gallacher, Elizabeth Papadopoulou, Nick K. Taylor, Fraser R. Blackmun, M. Howard Williams. 151-158 [doi]
- A Four-Stage Gate-Keeper Model of Social Service Engineering: Lessons from Golden Rules of Mobile Social Game DesignToshihiko Yamakami. 159-163 [doi]
- Predicting Mobile Phone User Locations by Exploiting Collective Behavioral PatternsHaoyi Xiong, Daqing Zhang, Daqiang Zhang, Vincent Gauthier. 164-171 [doi]
- Contribution-Based User Reputation Modeling in Collaborative Recommender SystemsWei Hu, Yaoxue Zhang, Yuezhi Zhou, Zhi Xue. 172-179 [doi]
- Knowledge Transfer in Activity Recognition Using Sensor ProfileYi-Ting Chiang, Jane Yung-jen Hsu. 180-187 [doi]
- Hybrid SN: Interlinking Opportunistic and Online Communities to Augment Information DisseminationBin Guo, Zhiwen Yu, Xingshe Zhou, Daqing Zhang. 188-195 [doi]
- Global Sensor Modeling and Constrained Application Methods Enabling Cloud-Based Open Space Smart ServicesAnh Lê Tuán, Hoan Nguyen Mau Quoc, Martin Serrano, Manfred Hauswirth, John Soldatos, Thanasis G. Papaioannou, Karl Aberer. 196-203 [doi]
- A Battery-Aware Energy-Efficient Android Phone with Bayesian NetworksSi-Hyuk Yi, Sung-Bae Cho. 204-209 [doi]
- An Energy-Efficient Data Collection Mechanism with a Mobile Sink for Wireless Sensor NetworksWen-Hwa Liao, Ssu-Chi Kuai. 210-216 [doi]
- Demand Response Control Strategies for On-campus Small Data CentersCheng-Jen Tang, Miau Ru Dai. 217-224 [doi]
- Hilbert-Chain Topology for Energy Conservation in Large-Scale Wireless Sensor NetworksYih-Chuan Lin, Jia-Hong Zhong. 225-232 [doi]
- The Challenge of Preparational Behaviours in Preference Learning for Ubiquitous SystemsSarah Gallacher, Elizabeth Papadopoulou, Nick K. Taylor, M. Howard Williams. 233-239 [doi]
- Risk-Based Intelligent Software Release PlanningShunsuke Tokumoto, Tadashi Dohi. 240-247 [doi]
- Efficient Time Series Disaggregation for Non-intrusive Appliance Load MonitoringYao-Chung Fan, Xingjie Liu, Wang-Chien Lee, Arbee L. P. Chen. 248-255 [doi]
- User Identification Based on Touch DynamicsFrode Eika Sandnes, Xiaoli Zhang. 256-263 [doi]
- Neighbor Selection Method Based on Sending Capacity for P2P Live Streaming with Layer CodingRei Endo, Kazuyuki Takayama, Yoshiki Sakata, Hiroshi Shigeno. 264-271 [doi]
- Using Dynamic Slots Collision Tracking Tree Technique Towards an Efficient Tag Anti-collision Algorithm in RFID SystemsChiu-Kuo Liang, Hsin-Mo Lin. 272-277 [doi]
- AB-Chord: An Efficient Approach for Resource Location in Structured P2P NetworksYufeng Wang, Xiangming Li, Qun Jin, Jianhua Ma. 278-284 [doi]
- Development of Industrial Safety Management System for Shipbuilding Industry Using RFID/USNJung-Min Yun, Peom Park. 285-291 [doi]
- A Transmission Scheduling for Data-Gathering Wireless Sensor NetworksChao Gao, Ilkka Kivelä, Xinyu Tan, Ismo Hakala. 292-297 [doi]
- A Decentralized Quality Aware Adaptive Sampling Strategy in Wireless Sensor NetworksAlireza Masoum, Nirvana Meratnia, Paul J. M. Havinga. 298-305 [doi]
- Robust and Dynamic Data Aggregation in Wireless Sensor Networks: A Cross-Layer ApproachWeigang Wu, Jiannong Cao, Hejun Wu, Jingjing Li. 306-313 [doi]
- The IG-Ferry Protocol to Support Efficient Controlled Replication in Vehicular Delay Tolerant NetworkIng-Chau Chang, Chien-Hsun Li, Cheng-Fu Chou. 314-321 [doi]
- Wireless Smart Home Sensor Networks: Mobile Agent Based Anomaly DetectionMuhammad Usman, Vallipuram Muthukkumarasamy, Xin-Wen Wu, Surraya Khanum. 322-329 [doi]
- An Efficient Method for Lane-Mark Extraction in Complex ConditionsChin-Yu Chang, Chang Hong Lin. 330-336 [doi]
- An Intelligent Accessing Control System Based on Human Intention AnalysisTeng-Hui Tseng, Chin-Lun Lai, Sheng-Ta Hsieh, Jun-Horng Chen. 337-341 [doi]
- Comparative Study on Advanced TV Interface Types in the Smart Media WorldYoungjae Lim, Jaekyu Park, Eui S. Jung, David Ho Chung, Taeil Kim, Kwangsoo Choi, Seunghun Lee. 342-348 [doi]
- A Novel Interval Grey Number and Entropy-based Solution for Multiple-Criteria Group Decision Making ProblemHyung Ku Kang, Dae-Gun Kim, Hwi Woon Jeong, Geon Yong Park, Hee Yong Youn. 349-356 [doi]
- An Overlap Aware Technique for Redundant Reader EliminationChing-Hsien Hsu, Chia-Hao Yu, Chun-Yao Chung, Chao-Tung Yang, Chih-Hsun Chou. 357-360 [doi]
- Backlog Bounds Analysis of Different On-chip Cache Coherence Policies: A Network Calculus-Based ApprochXin Lai, Cong Liu, Zhiying Wang, Quanyou Feng. 361-365 [doi]
- Hydra: An Ubiquitous Application for Service ReroutingLucas A. Almeida, Fabricio Nogueira Buzeto, Ana H. O. R. Castillo, Carla Denise Castanho, Ricardo Pezzuol Jacobi. 366-373 [doi]
- Confidential Enhancement with Multi-code Keying Reconfiguration over Time-Shifted CHPC-based 2D OCDMA NetworksYao-Tang Chang, Chuen-Ching Wang. 374-381 [doi]
- Fault Management for Smart Wireless Sensor NetworksRadosveta Sokullu, Ozlem Karaca. 382-387 [doi]
- An Efficient Clustering Authentication Mechanism for Mobile Ad Hoc NetworksChing-Hung Yeh, Meng-Yen Hsieh, Kuan-Ching Li. 388-393 [doi]
- A Fault Detection and Diagnosis Framework for Ambient Intelligent SystemsAhmed Mohamed, Christophe Jacquet, Yacine Bellik. 394-401 [doi]
- Safe Driving Education System ASSIST - Education Anywhere, AnytimeKazuaki Goshi, Masaki Hayashi, Katsuya Matsunaga. 402-404 [doi]
- A New Generation Children Tracking System Using Bluetooth MANET Composed of Android Mobile TerminalsKoki Morii, Koji Taketa, Yuichiro Mori, Hideharu Kojima, Eitaro Kohno, Shinji Inoue, Tomoyuki Ohta, Yoshiaki Kakuda. 405-407 [doi]
- Guaranteeing Asymptotic Stability of Clustering by Autonomous Decentralized Structure FormationRyo Hamamoto, Chisa Takano, Kenji Ishida, Masaki Aida. 408-414 [doi]
- Semantic Modeling and Reasoning at Runtime for Autonomous Systems EngineeringTarak Chaari, Kaouthar Fakhfakh. 415-422 [doi]
- Autonomic Activities in the Execution of Scientific Workflows: Evaluation of the AWARD FrameworkLuís Assunção, Carlos Gonçalves, José C. Cunha. 423-430 [doi]
- Automatic I/O Scheduler Selection through Online Workload AnalysisRamon Nou, Jacobo Giralt, Toni Cortes. 431-438 [doi]
- Composite Trust Model for an Information Sharing ScenarioKevin S. Chan, Jin-Hee Cho, Sibel Adali. 439-446 [doi]
- Insuring Sensitive Processes through Process MiningJorge Munoz-Gama, Isao Echizen. 447-454 [doi]
- On Enhancing Adaptive Random Testing for AADL ModelBo Sun, Yunwei Dong, Hong Ye. 455-461 [doi]
- Component Importance Analysis of Virtualized SystemJunjun Zheng, Hiroyuki Okamura, Tadashi Dohi. 462-469 [doi]
- Performance Analysis of Virtual Disk System for Transparent ComputingYuan Gao, Yaoxue Zhang, Yuezhi Zhou. 470-477 [doi]
- Optimizing Software Rejuvenation Policies under Interval Reliability CriteriaTadashi Dohi, Hiroyuki Okamura, Kishor S. Trivedi. 478-485 [doi]
- Combined Server Rejuvenation in a Virtualized Data CenterFumio Machida, Jianwen Xiang, Kumiko Tadano, Yoshiharu Maeno. 486-493 [doi]
- Model-Based Performance Optimization of Generalized Snapshot Isolation in Database SystemChao Luo, Hiroyuki Okamura, Tadashi Dohi. 494-500 [doi]
- Filesystem Layout Reorganization in Virtualized EnvironmentMasaya Yamada, Saneyasu Yamaguchi. 501-508 [doi]
- An Availability-Aware Virtual Machine Placement Approach for Dynamic Scaling of Cloud ApplicationsWenting Wang, Hao-Peng Chen, Xi Chen. 509-516 [doi]
- iSac: Intimacy Based Access Control for Social Network SitesYonggang Wang, Ennan Zhai, Eng Keong Lua, Jian-bin Hu, Zhong Chen. 517-524 [doi]
- PKU-STRAW-L: A Simulative Platform Evaluate the Power-Saving Rate of the Intelligent Street Lamp SystemTao Yang, Lingbo Kong, Yinyang Wang, Jian-bin Hu, Zhong Chen. 525-532 [doi]
- Performance Management of Virtual Machines via Passive Measurement and Machine LearningToshiaki Hayashi, Satoru Ohta. 533-538 [doi]
- A Self-Protection Mechanism against Stepping-Stone Attacks for IaaS CloudsKenichi Kourai, Takeshi Azumi, Shigeru Chiba. 539-546 [doi]
- Neighbor Similarity Trust against Sybil Attack in P2P E-commerceFelix Musau, Guojun Wang, Song Guo, Muhammad Bashir Abdullahi. 547-554 [doi]
- Accuracy of Privacy-Preserving Collaborative Filtering Based on Quasi-homomorphic SimilarityHiroaki Kikuchi, Yoshiki Aoki, Masayuki Terada, Kazuhiko Ishii, Kimihiko Sekino. 555-562 [doi]
- A Two-Level Virtual Machine Self-Reconfiguration Mechanism for the Cloud Computing PlatformsWei Chen, Xiaoqiang Qiao, Jun Wei, Tao Huang. 563-570 [doi]
- A Frame Rate Up-Conversion Algorithm for 3-D VideoShen-Chuan Tai, Chuen-Ching Wang, Chien-Shiang Hong, Chih-Pei Yeh, Yao-Tang Chang. 571-577 [doi]
- A Power Saving Method with Consideration of Performance in Android TerminalsKyosuke Nagata, Saneyasu Yamaguchi, Hisato Ogawa. 578-585 [doi]
- Dependability Modeling and Analysis of Random Port HoppingKousaburo Hari, Tadashi Dohi. 586-593 [doi]
- An Assurance Enhanced Route-Split Routing for Non-uniform Node Density in Mobile Ad Hoc NetworksMario Takeuchi, Anri Kimura, Eitaro Kohno, Tomoyuki Ohta, Yoshiaki Kakuda. 594-599 [doi]
- An Extension of Routing Tree Algorithm Considering Link Speed Change in IEEE 802.11n Protocol for Wireless Mesh NetworkNobuo Funabiki, Wataru Maruyama, Toru Nakanishi, Kan Watanabe. 600-605 [doi]
- Quasi-static Approach for Analyzing Interactions between Networks and Users Based on Decomposition of TimescalesMasaki Aida, Chisa Takano, Masayuki Murata, Makoto Imase. 606-611 [doi]
- Toward Remote Service Invocation in AndroidKazuhiro Nakao, Yukikazu Nakamoto. 612-617 [doi]
- Achieving High Availability of Consistent Data in the Presence of Network PartitionsTatsuhiro Tsuchiya. 618-620 [doi]
- A Routing ID-based Node-disjoint Multipath Scheme for Ad Hoc NetworksTakahide Uemori, Eitaro Kohno, Yoshiaki Kakuda. 621-626 [doi]
- Privacy, Security and Trust in Cloud Computing: The Perspective of the Telecommunication IndustryLeonardo A. Martucci, Albin Zuccato, Ben J. M. Smeets, Sheikh Mahbub Habib, Thomas Johansson, Nahid Shahmehri. 627-632 [doi]
- The Modulation Method Based on Reed-Solomon Code for WatermarkingHuang-Chi Chen, Yu-Wen Chang, Rey-Chue Hwang. 633-637 [doi]
- Dual-Watermarking by QR-code Applications in Image ProcessingFu-Hau Hsu, Min-Hao Wu, Shiuh-Jeng Wang. 638-643 [doi]
- Employing LSB and VQ for Undetectable Secret Data HidingCheng-Ta Huang, Wei-Jen Wang, Min-Yi Tsai, Chin-Feng Lee. 644-649 [doi]
- The Design and Realization of Video Phone System in Embedded PlatformChing-Lung Chang, Chang-Hsuan Hung. 650-654 [doi]
- A Framework for Scalable Cloud Video Recorder System in Surveillance EnvironmentChia Feng Lin, Shyan-Ming Yuan, Muh-Chyi Leu, Ching-Tsorng Tsai. 655-660 [doi]
- An Architecture for Video Surveillance Service Based on P2P and Cloud ComputingYu-Sheng Wu, Yue-Shan Chang, Tong-Ying Juang, Jing-Shyang Yen. 661-666 [doi]
- A Project-Based Curriculum for Teaching C++ Object-Oriented ProgrammingYen-Lin Chen, Chuan-Yen Chiang, Yo-Ping Huang, Shyan-Ming Yuan. 667-672 [doi]
- An Expert System Application for Respiratory Infection DiagnosticSheng-Ta Hsieh, Chih-Dao Chen, Jun-Horng Chen, Chin-Lun Lai, Yu-Long Syu. 673-678 [doi]
- Accelerating Computation of DCM for ERP with GPU-Based Parallel StrategyWei-Jen Wang, I.-Fan Hsieh, Chun-Chuan Chen. 679-684 [doi]
- Applying Pervasive Computing in an Architecture for Homecare EnvironmentsLeandro Freitas, Giovani Rubert Librelotto, Henrique G. G. Pereira, Jeferson Kasper, Ricardo Giuliani Martini, Bruno Augusti Mozzaquatro, Rafael T. Pereira. 685-692 [doi]
- Assessing the Relationships between IS Success with Intellectual Capital for International Medical Services Centers in Taiwan - The Perspective of PhysiciansHsien-Cheng Lin, Chen-Chia Chen, Echo Huang, Yang Ya-Hui, Cheng-Yuan Chiu. 693-698 [doi]
- Squareknot: A Flexible Framework for Actuators and Controllers in Smart EnvironmentTakeru Ujinawa, Naohiro Hayashibara. 699-706 [doi]
- FOSS4G Based Mobile Web-GIS for Field Survey in Natural Environmental StudiesYu Nakayama, Suguru Mori. 707-712 [doi]
- Constructing Private Cloud Storage Using Network Attatched StorageWen-Feng Hsu, Guo-Heng Luo, Shyan-Ming Yuan, Ching-Tsorng Tsai. 713-718 [doi]
- Ubiquitous Computing and Evaluation of Water Quality by Grey Relational AnalysisHong-Jin Chen, Yo-Ping Huang, Yun-Kai Ke. 719-724 [doi]
- Design and Implementation of an Assisted Body Movement System for Visually Impaired ChildrenHung-Chi Chu, Wei-Tai Wu, Fang-Lin Chao, Liza Lee. 725-728 [doi]
- Execution Time Prediction Using Rough Set Theory in Hybrid CloudChih-Tien Fan, Yue-Shan Chang, Wei-Jen Wang, Shyan-Ming Yuan. 729-734 [doi]
- A Finite State Machine-Based Fall Detection Mechanism on SmartphonesShang-Lin Hsieh, Ming Hsiung Su, Lu Feng Liu, Wey-Wen Jiang. 735-739 [doi]
- System Design of an Intelligent Nutrition Consultation and Recommendation ModelEn-Yu Lin, Don-Lin Yang, Ming-Chuan Hung. 740-745 [doi]
- An Enhanced IOT Gateway in a Broadcast SystemXianyang Jiang, Deshi Li, Shaobo Nie, Jing Luo, Zhonghai Lu. 746-751 [doi]
- How Online Social Network Affects Offline Events: A Case Study on DoubanJunwei Han, Jianwei Niu, Alvin Chin, Wei Wang, Chao Tong, Xia Wang. 752-757 [doi]
- Mixed-Style Print Advertising Combining Fashion Photography and Digital Illustrations: Examining the Print Advertising of Consumer Products in TaiwanYi-Lin Yu. 758-763 [doi]
- Ubiquitous Smart Devices and Applications for Disaster PreparednessW. P. Liao, Y. Z. Ou, Edward T.-H. Chu, Chi-Sheng Shih, Jane W.-S. Liu. 764-770 [doi]
- A Surveillance System Designed for the Correction of Sitting Posture in WritingYi-Ping Wu, Jun-Horng Chen. 771-773 [doi]
- Development of an Intelligent App for Obstructive Sleep Apnea Prediction on Android Smartphone Using Data Mining ApproachMing-Hseng Tseng, Hsueh-Chen Hsu, Che-Chia Chang, Hua Ting, Hui-Ching Wu, Ping-Hung Tang. 774-779 [doi]
- Mining Distributed Frequent Itemsets Using a Gossip Based ProtocolMaryam Bagheri, Seyed-Hassan Mirian-Hosseinabadi, Hoda Mashayekhi, Jafar Habibi. 780-785 [doi]
- An Intelligent Virtual Fence Security System for the Detection of People InvadingJun-Horng Chen, Teng-Hui Tseng, Chin-Lun Lai, Sheng-Ta Hsieh. 786-791 [doi]
- From User Experience to Social Experience: A New Perspective for Mobile Social Game DesignToshihiko Yamakami. 792-796 [doi]
- A Distributed Integrated Fare Collection and Accounting System for Metropolitan Railway TransitPintsang Chang. 797-802 [doi]
- Interval-Valued Cloud Model Based Personal Sub-health Status Diagnosing Prototype System on TCM Syndrome DataFeng Guo, Ying Lin, Shaozi Li, Ying Dai. 803-810 [doi]
- A New RFID Anti-collision Algorithm for the EPCglobal UHF Class-1 Generation-2 StandardWen-Tzu Chen. 811-815 [doi]
- Design and Implementation of an Auto-Configuration and Cooperation Generation of Web Service User Interface Based on TR-069 ProtocolJin-Neng Wu, Chia-Ching Chan, Ping-Yu Chen, Cheng-Lung Chu. 816-821 [doi]
- Enhancing Traditional Games with Augmented Reality TechnologiesHiroyuki Sakuma, Tetsuo Yamabe, Tatsuo Nakajima. 822-825 [doi]
- Toward Efficient Detection of Semantic Exceptions in Context-Aware SystemsEun-Sun Cho, Sumi Helal. 826-831 [doi]
- A Vision-Based Vehicle Speed Warning SystemShih-Chieh Huang, Chien-Chuan Lin, Ming-Shi Wang. 832-834 [doi]
- Recovery Mechanism for Diff-based Reprogramming in WSNsShin-Lu Lien, Mei-Ling Chiang. 835-840 [doi]
- Compiler Optimization to Reduce Cache Power with Victim CacheCheng-Yu Lee, Jen-Chieh Chang, Rong-Guey Chang. 841-844 [doi]
- F-VT: A Friendly Virtualization FrameworkYuan-Cheng Lee, Tang-Hsun Tu, Chih-wen Hsueh. 845-850 [doi]
- HeapDefender: A Mechanism of Defending Embedded Systems against Heap Overflow via HardwareDongfang Li, Zhenglin Liu, Yizhi Zhao. 851-856 [doi]
- Smart Trend-Traversal Protocol with Shortcutting for Memory-less RFID Tag Collision ResolutionXin-Qing Yan, Rui-Xia Zhang, Bin Li. 857-862 [doi]
- Reverse Nearest Neighbors Search in Wireless Broadcast EnvironmentsChe-Lun Mak, Chuan-Ming Liu, Wei-Chi Yeh. 863-868 [doi]
- SARM: A Congestion Control Algorithm for DTNChengjun Wang, BaoKang Zhao, Wanrong Yu, Chunqing Wu, Zhenghu Gong. 869-875 [doi]
- Station Decision Problem in Bicycle Ad Hoc NetworksWen Ouyang, Chang-Wu Yu, Kun-Ming Yu, Ko-Jui Lin, Jo-Heng Yu, Hsin-Wen Chang, Lin-Li Tai, Chung-Han Lin. 876-881 [doi]
- Entropy-Based Distributed Fault-Tolerant Event Boundary Detection Algorithm for Wireless Sensor NetworksWen Ouyang, Yu-Ting Liu, Yu-Wei Lin, Yi-Hao Chen. 882-887 [doi]
- The Design of Multisource Application Layer Multicast with Fast Route RecoveryChia-Hui Huang, Kai-Wei Ke, Ho-Ting Wu. 888-893 [doi]
- IRDT-GEDIR: Next-Hop Selection in Intermittent Wireless Multihop Sensor NetworksTakanori Takehira, Hiroaki Higaki. 894-899 [doi]
- DCSim: Design Analysis on Virtualization Data CenterChia-Jung Chen, Yi-Sheng Liu 0002, Rong-Guey Chang. 900-905 [doi]
- GreenTech: A Case Study for Using the Web of Things in Household Energy ConservationYang Liu, Qiang Li, Weijun Qin, Limin Sun, Yan Liu. 906-911 [doi]
- IdleCached: An Idle Resource Cached Dynamic Scheduling Algorithm in Cloud ComputingHu Song, Jing Li, Xinchun Liu. 912-917 [doi]
- Multi-periodic Data Aggregation Scheme Based on Interest for Energy Efficiency in Wireless Sensor NetworkA.-Jeong Jeong, Se-Mi Kim, Chae-Seok Lee, Jong-Deok Kim. 918-923 [doi]
- Implementation of Smart Power Management and Service System on Cloud ComputingChao-Tung Yang, Wei-Sheng Chen, Kuan-Lung Huang, Jung-Chun Liu, Wen-Hung Hsu, Ching-Hsien Hsu. 924-929 [doi]
- WaterLady: A Case Study for Connecting Physical Devices into Social NetworksLongbiao Chen, Yaochun Li, Zeming Zheng, Li Zhang, Dan He, Xiaolong Li, Sha Zhao, Shijian Li, Gang Pan. 930-934 [doi]
- PPCare: A Personal and Pervasive Health Care System for the ElderlyYan Tang, Shuangquan Wang, Yiqiang Chen, Zhenyu Chen. 935-939 [doi]
- Towards Scalable Processing for a Large-Scale Ride Sharing ServiceBeihong Jin, Jiafeng Hu. 940-944 [doi]
- Context-Aware Mobile Web Browsing Based on HTML5Xinxin Zhang, Zhiwen Yu, Jilei Tian, Zhitao Wang, Bin Guo. 945-950 [doi]
- Fall Detection on Mobile Phones Using Features from a Five-Phase ModelYue Shi, Yuanchun Shi, Xia Wang. 951-956 [doi]
- UI Portals: Sharing Arbitrary Regions of User Interfaces on Traditional and Multi-user Interactive DevicesJie Liu, Yuanchun Shi. 957-962 [doi]
- A Universal Lightweight Authentication Scheme Based on Delegation Mechanism in Heterogeneous NetworksChou Chen Yang, Shin-Hao Lo, Eric Jui-Lin Lu. 963-966 [doi]
- A Patient Privacy-Aware E-health System Based on Passive RFIDKuo-Hui Yeh, Nai-Wei Lo, Chieh Wang. 967-972 [doi]
- Efficiently Preserving Data Privacy Range Queries in Two-Tiered Wireless Sensor NetworksThuc Dinh Nguyen, Thach V. Bui, Van H. Dang, Deokjai Choi. 973-978 [doi]
- Trusted Service Application Framework on Mobile NetworkXin Gu, ZhengQuan Xu, Tao Wang, Yilin Fang. 979-984 [doi]
- Developing QR Code Based Augmented Reality Using SIFT FeaturesChin-Hung Teng, Bing-Shiun Wu. 985-990 [doi]
- A Web-Based Interaction Design Tool: Pattern Language ToolkitChieh Jen Chen, Chin-Hung Teng, Tsai-Yen Li. 991-995 [doi]
- An Augmented Reality Environment for Learning OpenGL ProgrammingChin-Hung Teng, Jr-Yi Chen. 996-1001 [doi]
- Imperceptible Visible Watermarking Scheme Using Color Distribution ModulationWei-Fan Hsieh, Pei-Yu Lin. 1002-1005 [doi]
- A Self-Authentication Mechanism for a (3, 3)-threshold Secret Sharing SchemeYi-Hui Chen, Ci-Wei Lan. 1006-1008 [doi]
- Enhancement of Human-Preference Assisted Activity Recognition Using a Cooperative ADL InfrastructureChing-Hu Lu, Li-Chen Fu. 1009-1014 [doi]