Journal: Cluster Computing

Volume 19, Issue 4

1691 -- 1701Xiao Zhang, Yanjun Wu, Chen Zhao. MrHeter: improving MapReduce performance in heterogeneous environments
1703 -- 1721Weiwei Zheng, Zhili Wang, Haoqiu Huang, Luoming Meng, Xuesong Qiu. SPSRG: a prediction approach for correlated failures in distributed computing systems
1723 -- 1745Narendra Kumar Kamila, Lambodar Jena, Hemanta Kumar Bhuyan. Pareto-based multi-objective optimization for classification in data mining
1747 -- 1767Binh Minh Nguyen, Dang-Tran, Giang Nguyen. Enhancing service capability with multiple finite capacity server queues in cloud data centers
1769 -- 1785Wanfeng Dou, Shoushuai Miao. A fast parallel re-computation with redundancy mechanism for parallel digital terrain analysis
1787 -- 1800Sukhpal Singh, Inderveer Chana, Maninder Singh, Rajkumar Buyya. SOCCER: Self-Optimization of Energy-efficient Cloud Resources
1801 -- 1818Chamseddine Hamdeni, Tarek Hamrouni, Faouzi Ben Charrada. Adaptive measurement method for data popularity in distributed systems
1819 -- 1833Sanem Arslan, Haluk Rahmi Topcuoglu, Mahmut Taylan Kandemir, Oguz Tosun. Asymmetrically reliable caches for multicore architectures under performance and energy constraints
1835 -- 1841Hyuncheol Kim, Seunghyun Yoon, Hongseok Jeon, Wonhyuk Lee, Seungae Kang. Service platform and monitoring architecture for network function virtualization (NFV)
1843 -- 1851Jinhong Yang, Hyo-Jin Park, Kyuyeong Jeon, Jeong-ile Jeong, Jun Kyun Choi. Serving a video into an image carousel: system design and implementation
1853 -- 1863Tomás Cerný, Michael J. Donahoo. On energy impact of web user interface approaches
1865 -- 1878ByungRae Cha, Sun Park, JongWon Kim. Availability analysis and case study of mobile-OTP key generation using skip sampling of voice
1879 -- 1884Jonghyuk Park, Nakhoon Baek, Sung-Ho Kim. A text-based user interface scheme for low-tier embedded systems: an object-oriented approach
1885 -- 1893Jinlou Xie, Jianjian Luo, Qingyuan Zhou. Data mining based quality analysis on informants involved applied research
1895 -- 1905Shunxiang Zhang, Xiaobo Yin, Congna He. The automatic estimating method of the in-degree of nodes in associated semantic network oriented to big data
1907 -- 1924Yun-chuan Yang, Li-ping Liao, Liubin Yan, Xiao-chuan Hu, Hong-bao Huang, Shuai Xiao. The big data analysis of land use evolution and its ecological security responses in Silver Beach of China by the clustering of spatial patterns
1925 -- 1935Ziyuan Sun, Yunhai Zhu, Ying Li, Mengdi Xie, Gang Li, Jianhua Song. Machine learning based control rights analysis of critical resources and the optimal ownership for management integration
1937 -- 1949Meng Fansheng, Li Bin, Yang Donghui, Yue Zenglei, Liu Zhi. Energy efficiency evaluation method based on multi-model fusion strategy
1951 -- 1962Youyuan Wang, Hang Liu, Jiangang Bi, Feng Wang, Chunyu Yan, Taiyun Zhu. An approach for Condition Based Maintenance strategy optimization oriented to multi-source data
1963 -- 1974Di Shen, Lei Wang, Chengfan Li. Event energy clustering and evaluation based on shock wave model
1975 -- 1986Kunfang Song, Hongwei Lu. High-performance XML modeling of parallel queries based on MapReduce framework
1987 -- 2000Ming Huang, Xinhan Huang, Xikai Tu, Zefang Li, Yue Wen. An online gain tuning proxy-based sliding mode control using neural network for a gait training robotic orthosis
2001 -- 2014Juan Du, Renzhi He, Vijayan Sugumaran. Clustering and ontology-based information integration framework for surface subsidence risk mitigation in underground tunnels
2015 -- 2026Li Guodong, Xu Wenxia, Yang Bing, Buhailiqiemu Awudong, Chang Xiaojuan. A method analysis for hail cloudy prediction based on CNN
2027 -- 2037Huang Ming, Du Yanzhu, Zhang Jianguang, Zhang Yong. A topological enabled three-dimensional model based on constructive solid geometry and boundary representation
2039 -- 2049Long Zhao, LinFeng Jiang, Xiangjun Dong. Supervised feature selection method via potential value estimation
2051 -- 2060Shao Aijun, Liya Zhao, Wang Shiwen. Analysis of the dynamic impact of Three-Gorge Project on regime of soil water and salt in Yangtze River Delta
2061 -- 2074Wei Duan, Changqing Li, Pei Zhang, Qing Chang. Game modeling and policy research on the system dynamics-based tripartite evolution for government environmental regulation
2075 -- 2085Qinghua Wu, Hanmin Liu, Xuesong Yan. Multi-label classification algorithm research based on swarm intelligence
2087 -- 2096Xiao Liang, Guanglei Meng, Haitao Luo, Xia Chen. Dynamic path planning based on improved boundary value problem for unmanned aerial vehicle
2097 -- 2107Shuwei Jing, Zhanwen Niu, Chun-Bin Tung, Zih-Ping Ho. The application of terms mining technique to clustering participant's character patterns in the enterprise management
2109 -- 2117Qingyuan Zhou, Ranran Liu. Strategy optimization of resource scheduling based on cluster rendering
2119 -- 2131Yu Wang, Yao Chen. Multi-CODP adjustment model and algorithm driven by customer requirements in dynamic environments
2133 -- 2143Chao Lu, Jia-lu Chang. Beijing Cultural and Creative Industry policy effect evaluation based on fuzzy comprehensive evaluation
2145 -- 2156Zhen You, Jinyun Xue, Zhengkang Zuo. Unified formal derivation and automatic verification of three binary-tree traversal non-recursive algorithms
2157 -- 2167Xiaoqing Zuo, Hongchu Yu, Chenbo Zi, Xiaokun Xu. The atmospheric disturbance correction model in slope deformation monitoring using IBIS-L system
2169 -- 2177Chuanhe Shen, Zhe Xu, Yanchun Yang. A reduced pricing model for mezzanine financing based on options and support vector machines
2179 -- 2188Bin Hu, Huan-yan Qian, Yi Shen, Jia-xing Yan. An optimal path finding strategy in networks based on random walk
2189 -- 2199Hui Zhang, Jinzhao Wu, Jianguang Lu, Juan Tang. Safety verification of finite real-time nonlinear hybrid systems using enhanced group preserving scheme
2201 -- 2210Wei Gao, Yun Guo, Kaiyun Wang. Ontology algorithm using singular value decomposition and applied in multidisciplinary
2211 -- 2223Xiaoxi Fu, Zhanwen Niu, Ming-Kuei Yeh. Research trends in sustainable operation: a bibliographic coupling clustering analysis from 1988 to 2016
2225 -- 2240Eunji Hwang, Seontae Kim, Jik-Soo Kim, Soonwook Hwang, Young-ri Choi. On the role of application and resource characterizations in heterogeneous distributed computing systems
2241 -- 2250Baoyu Xu, Wu Zhang, Xian-He Sun, Yang Wang. A memory-driven scheduling scheme and optimization for concurrent execution in GPU
2251 -- 2260Atif Alamri. Nature-inspired multimedia service composition in a media cloud-based healthcare environment
2261 -- 2271Hoill Jung, Hyun Yoo, Kyungyong Chung. Associative context mining for ontology-driven hidden knowledge discovery
2273 -- 2284Ji-won Han, Jaechoon Jo, Hyesung Ji, HeuiSeok Lim. A collaborative recommender system for learning courses considering the relevance of a learner's learning skills
2285 -- 2293Seok-Woo Jang, Myunghee Jung. Robust detection of mosaic regions in visual image data
2295 -- 2304Hyun-mi Jung, Ki-Bong Kim, Han-Jin Cho. A study of android malware detection techniques in virtual environment
2305 -- 2314Young-Seok Choi, Kwangmin Hyun, Jae Yeon Choi. Assessing multiscale permutation entropy for short electroencephalogram recordings
2315 -- 2326Jungsun Jang, Yeonsoo Lee, Seolhwa Lee, Dongwon Shin, Dongjun Kim, Hae-Chang Rim. A novel density-based clustering method using word embedding features for dialogue intention recognition
2327 -- 2334Seoung-hyun Koh, Yen-Yoo You, Do-sung Na. Object-based dynamic influence measurement model (DIMM) using social data (on facebook)
2335 -- 2341Kun Hee Han, Woo Sik Bae. Proposing and verifying a security-enhanced protocol for IoT-based communication for medical devices

Volume 19, Issue 3

1017 -- 1036Mostafa Ghobaei Arani, Sam Jabbehdari, Mohammad Ali Pourmina. An autonomic approach for resource provisioning of cloud services
1037 -- 1051Sandra Catalán, Francisco D. Igual, Rafael Mayo, Rafael Rodríguez-Sánchez, Enrique S. Quintana-Ortí. Architecture-aware configuration and scheduling of matrix multiplication on asymmetric multicore processors
1053 -- 1070Somayeh Kianpisheh, Nasrollah Moghaddam Charkari, Mehdi Kargahi. Ant colony based constrained workflow scheduling for heterogeneous computing systems
1071 -- 1087Najme Mansouri. QDR: a QoS-aware data replication algorithm for Data Grids considering security factors
1089 -- 1103Hang Zhou, Qing Li, Weiqin Tong, Samina Kausar, Hai Zhu. P-Aware: a proportional multi-resource scheduling strategy in cloud data center
1105 -- 1137Anna Sikora, Tomàs Margalef, Josep Jorba. Automated and dynamic abstraction of MPI application performance
1139 -- 1161Mohsin Fayyaz, Khurram Aziz, Ghulam Mujtaba. Performance analysis of optical interconnects' architectures for data center networks
1163 -- 1182Nasrin Akhter, Mohamed Othman. Energy aware resource allocation of cloud data center: review and open issues
1183 -- 1200Dmitry A. Zaitsev, Tatiana R. Shmeleva, Werner Retschitzegger, Birgit Pröll. Security of grid structures under disguised traffic attacks
1201 -- 1210Lei Wang, Lingyu Xu, Yunlan Xue, Gaowei Zhang. Group behavior time series anomaly detection in specific network space based on separation degree
1211 -- 1217Jianhong Zhang, Jian Mao. Efficient public key encryption with revocable keyword search in cloud computing
1219 -- 1225Gonzalo Hernández, Roberto León, Alejandra Urtubia. Detection of abnormal processes of wine fermentation by support vector machines
1227 -- 1242Raed Karim, Chen Ding, Ali Miri, Md Shahinur Rahman. Incorporating service and user information and latent features to predict QoS for selecting and recommending cloud service compositions
1243 -- 1260Jie Zhang, Jining Yan, Yan Ma, Dong Xu, Pengfei Li, Wei Jie. Infrastructures and services for remote sensing data production management across multiple satellite data centers
1261 -- 1273Jeongmin Kim, Hyun-Sook Chung, MyounJae Lee, Yunseok Chang, Jongjin Jung, Pan Seop Shin. Design of user-centric semantic rights model for validation of user-generated content
1275 -- 1282Qingyuan Zhou. Research on heterogeneous data integration model of group enterprise based on cluster computing
1283 -- 1292Zheng Xu, Lin Mei, Chuanping Hu, Yunhuai Liu. The big data analytics and applications of the surveillance system using video structured description technology
1293 -- 1308Bao Zhu, Le-An Yu, Zhi-Qiang Geng. Cost estimation method based on parallel Monte Carlo simulation and market investigation for engineering construction project
1309 -- 1321Jia Zhu, Chuanhua Xu, Zhixu Li, Gabriel Pui Cheong Fung, Xueqin Lin, Jin Huang, Changqin Huang. An examination of on-line machine learning approaches for pseudo-random generated data
1323 -- 1332Yushan Zhang, Huang Han, Zhifeng Hao, Guiwu Hu. First hitting time analysis of continuous evolutionary algorithms based on average gain
1333 -- 1345Lin Li, Jingjing Ye, Fang Deng, Shengwu Xiong, Luo Zhong. A comparison study of clustering algorithms for microblog posts
1347 -- 1358R. Suganya Devi, D. Manjula, Vijayan Sugumaran. Efficient indexing structure to handle durable queries through web crawling
1359 -- 1372Shanliang Yang, Mei Yang, Song Wang, Kedi Huang. Adaptive immune genetic algorithm for weapon system portfolio optimization in military big data environment
1373 -- 1384Chuanliang Xia. Property preservation of refinement for Petri net based representation for embedded systems
1385 -- 1397Qingsheng Zhu, Ji Feng, Jinlong Huang. Weighted natural neighborhood graph: an adaptive structure for clustering and outlier detection with no neighborhood parameter
1399 -- 1410Shunxiang Zhang, Yin Wang, Shiyao Zhang, Guangli Zhu. Building associated semantic representation model for the ultra-short microblog text jumping in big data
1411 -- 1420Chunchun Hu, Nianxue Luo, Qiansheng Zhao. Fast fuzzy trajectory clustering strategy based on data summarization and rough approximation
1421 -- 1436Lei Wang, Lingyu Xu, Jie Yu, Yunlan Xue, Gaowei Zhang. Context-aware edge similarity segmentation algorithm of time series
1437 -- 1447Penghao Xu, Bing Yan, Shouwei Hu. DOA estimation of multiple sources in sparse space with an extended array technique
1449 -- 1459Fanqi Meng, Xiaohong Su, Zhaoyang Qu. Nonlinear approach for estimating WCET during programming phase
1461 -- 1474Zhige Jia, Zhengsong Chen, Dijin Wang, Pengfei Yu. Time series analysis of carrier phase differences for dual-frequency GPS high-accuracy positioning
1475 -- 1487Xiao Wei, Jun Zhang, Daniel Dajun Zeng, Qing Li. A multi-level text representation model within background knowledge based on human cognitive process for big data analysis
1489 -- 1501Jie-Yu Wang, Hai-Cheng Xu. Transportation route optimization with cost object in China
1503 -- 1514Junping Xiang, ZongHai Chen. An adaptive traffic signal coordination optimization method based on vehicle-to-infrastructure communication
1515 -- 1526Seoyoung Kim, Jieun Choi, Yoonhee Kim. Adaptive application-aware job scheduling optimization strategy in heterogeneous infrastructures
1527 -- 1539Md. Azam Hossain, Cao Ngoc Nguyen, Jik-Soo Kim, Soonwook Hwang. Exploiting resource profiling mechanism for large-scale scientific computing on grids
1541 -- 1553Yongseok Son, Hara Kang, Hyuck Han, Heon Young Yeom. An empirical evaluation and analysis of the performance of NVM express solid state drive
1555 -- 1570Yoonsung Nam, Minkyu Kang, Hanul Sung, Jincheol Kim, Hyeonsang Eom. Workload-aware resource management for software-defined compute
1571 -- 1583Jaehun Lee, Kihan Choi, Youngjin Kim, Hyuck Han, Sooyong Kang. Exploiting remote GPGPU in mobile devices
1585 -- 1597Gemoh Maliva Tihfon, Sanghyun Park, Jinsul Kim, Yong-Min Kim. An efficient multi-task PaaS cloud infrastructure based on docker and AWS ECS for application deployment
1599 -- 1605Jaehyung Park, Younho Jung, Yong-Min Kim. Cost-effective multicast routings in wireless mesh networks with multiple gateways
1607 -- 1617Jeong-ile Jeong. A study on smart door lock control system
1619 -- 1633V. Saravanan, V. Mohan Raj. Maximizing QoS by cooperative vertical and horizontal handoff for tightly coupled WiMAX/WLAN overlay networks
1635 -- 1646Youngki Kim, Tae Ung Kim, Seong-Taek Park, Jae-Rim Jung. Establishing the importance weight of appropriability mechanism by using AHP: the case of the China's electronic industry
1647 -- 1658Eun-Mi Park, Joung-Hae Seo, Mi-Hyun Ko. The effects of leadership by types of soccer instruction on big data analysis
1659 -- 1669Kyoo-Sung Noh. A study on the position of CDO for improving competitiveness based big data in cluster computing environment
1671 -- 1682Won Il Seo, Jae Hyun Lim. Implementation of context prediction system based on event recurrence time
1683 -- 1690Sang Yeob Oh, Kyungyong Chung. Vocabulary optimization process using similar phoneme recognition and feature extraction

Volume 19, Issue 2

567 -- 583Esmail Asyabi, Azadeh Azhdari, Mostafa Dehsangi, Michel Gokan Khan, Mohsen Sharifi, Sayed Vahid Azhari. Kani: a QoS-aware hypervisor-level scheduler for cloud computing environments
585 -- 599Heithem Abbes, Thouraya Louati. PGTrust: a decentralized free-riding prevention model for DG systems
601 -- 614Zeng Zeng, Tram Truong Huu, Bharadwaj Veeravalli, Chen-Khong Tham. Operational cost-aware resource provisioning for continuous write applications in cloud-of-clouds
615 -- 631George Terzopoulos, Helen D. Karatza. Power-aware Bag-of-Tasks scheduling on heterogeneous platforms
633 -- 645Prasanthi Sreekumari, Jae-Il Jung, Meejeong Lee. A simple and efficient approach for reducing TCP timeouts due to lack of duplicate acknowledgments in data center networks
647 -- 662Yichuan Wang, Santosh Chandrasekhar, Mukesh Singhal, Jianfeng Ma. A limited-trust capacity model for mitigating threats of internal malicious services in cloud computing
663 -- 678Fawaz Al Hazemi, Dong-Ki Kang, Seong-Hwan Kim, Yuyang Peng, S. H. Shah Newaz, Chan-Hyun Youn. LPC \(_\mathrm{FreqSchd}\) : A local power controller using the frequency scheduling approach for virtualized servers
679 -- 698Tarandeep Kaur, Inderveer Chana. Energy aware scheduling of deadline-constrained tasks in cloud computing
699 -- 708Quan-Dong Feng, Miao Xu, Xin Zhang. The model for improving big data sub-image retrieval performance using scalable vocabulary tree based on predictive clustering
709 -- 721Jiaxuan Wu, Bin Zhang, Lei Yang, Peng Wang, Changsheng Zhang. A replicas placement approach of component services for service-based cloud application
723 -- 740Darren Quick, Kim-Kwang Raymond Choo. Big forensic data reduction: digital forensic images and electronic evidence
741 -- 755Jie Wan, Guorui Ren, Jinfu Liu, Qinghua Hu, Daren Yu. Ultra-short-term wind speed prediction based on multi-scale predictability analysis
757 -- 767Xinhui Xu, Fei Xie, Xingyu Zhou. Research on spatial and temporal characteristics of drought based on GIS using Remote Sensing Big Data
769 -- 781Bing Zhao, Yanhong Gu, Yuan Ruan, Quanle Chen. Two game-based solution concepts for a two-agent scheduling problem
783 -- 791Jie Zheng. Research on a cluster system for binary data frames of wireless sensor network
793 -- 810Lizhe Wang, Weijing Song, Peng Liu. Link the remote sensing big data to the image features via wavelet transformation
811 -- 820Jun Ye, Zheng Xu, Yong Ding. Secure outsourcing of modular exponentiations in cloud and cluster computing
821 -- 835Jiemin Chen, Feiyi Tang, Jing Xiao, Jianguo Li, Jing He, Yong Tang. CogTime_RMF: regularized matrix factorization with drifting cognition degree for collaborative filtering
837 -- 848K. P. Swaraj, D. Manjula. A fast approach to identify trending articles in hot topics from XML based big bibliographic datasets
849 -- 864Ji Xue, Feng Yan, Alma Riska, Evgenia Smirni. Scheduling data analytics work with performance guarantees: queuing and machine learning models in synergy
865 -- 878Alina Sîrbu, Özalp Babaoglu. Towards operator-less data centers through data-driven, predictive, proactive autonomics
879 -- 892Rajath Subramanyam, Indranil Gupta, Luke M. Leslie, Wenting Wang. Idempotent distributed counters using a forgetful bloom filter
893 -- 909Daniel J. Dubois, Giuliano Casale. OptiSpot: minimizing application deployment cost using spot cloud resources
911 -- 919Hyun-mi Jung, Yong Hwan Jung, Jang-Won Choi. The integrated management method of heterogeneous WIPS sensors
921 -- 930Hanjo Jeong, Yong-Ki Kim, Jaesoo Kim. An evaluation-committee recommendation system for national R&D projects using social network analysis
931 -- 938Min-Cheol Jeon, Man-Seok Han, Jae-Uk Jang, Yong-Kyun Kim, Sun-Youl Seo, Gab-Jung Kim, Chang-Gyu Kim. Evaluation of image reconstruction according to changing physical parameter
939 -- 948Kyuman Jeong, Han-Jin Cho. Photo quality enhancement by relocating subjects
949 -- 966Seung-Mi Moon, Sook-Youn Kwon, Jae Hyun Lim. Implementation of smartphone-based color temperature and wavelength control LED lighting system
967 -- 977Hoill Jung, Kyung-Yong Chung. Life style improvement mobile service for high risk chronic disease based on PHR platform
979 -- 985Jung-Soo Han, Gui-Jung Kim. A method of unsupervised machine learning based on self-organizing map for BCI
987 -- 999Ill-Woo Park, Jeonghye Han. Teachers' views on the use of robots and cloud services in education for sustainable development
1001 -- 1013DongBum Seo, You-Boo Jeon, Song-Hee Lee, Keun-Ho Lee. Cloud computing for ubiquitous computing on M2M and IoT environment mobile application
1015 -- 0Seong-Taek Park, Eun-Mi Park, Joung-Hae Seo, GuoZhong Li. Erratum to: Factors affecting the continuous use of cloud service: focused on security risks

Volume 19, Issue 1

1 -- 11Antonio Llanes, José M. Cecilia, Antonia Sánchez, José M. García 0001, Martyn Amos, Manuel Ujaldon. Dynamic load balancing on heterogeneous clusters for parallel ant colony optimization
13 -- 27Mohammed Rebbah, Yahya Slimani, Abdelkader Benyettou, Lionel Brunie. A decentralized fault tolerance model based on level of performance for grid environment
29 -- 46Chen Yang, Peng Chi, Xiao Song, Tingyu Lin, Bo Hu Li, Xudong Chai. An efficient approach to collaborative simulation of variable structure systems on multi-core machines
47 -- 56Jianhong Zhang, Xubing Zhao. Efficient chameleon hashing-based privacy-preserving auditing in cloud storage
57 -- 71Carlos M. Toledo, Ricardo J. Barrientos, Andrés I. Ávila. Similarity (range and kNN) queries processing on an Intel Xeon Phi coprocessor
73 -- 77Tian Zhuo. Face recognition from a single image per person using deep architecture neural networks
79 -- 86Erwin Adi, Zubair A. Baig, Philip Hingston, Chiou Peng Lam. Distributed denial-of-service attacks against HTTP/2 services
87 -- 97S. Raja Ratna, R. Ravi 0003. Scrutiny of unruly and abuse in wireless networks to mitigate physical layer threats using discriminate based misbehavior prevention
99 -- 108Musaed Alhussein. Automatic facial emotion recognition using weber local descriptor for e-Healthcare system
109 -- 126Mahmoud Alewiwi, Cengiz Örencik, Erkay Savas. Efficient top-k similarity document search utilizing distributed file systems and cosine similarity
127 -- 138Jianhong Zhang, Pengyan Li, Jian Mao. IPad: ID-based public auditing for the outsourced data in the standard model
139 -- 152Lingjun Zhao, Lajiao Chen, Rajiv Ranjan, Kim-Kwang Raymond Choo, Jijun He. Geographical information system parallelization for spatial big data processing: a review
153 -- 166Yan Hu, Jun Yan, Kim-Kwang Raymond Choo. PEDAL: a dynamic analysis tool for efficient concurrency bug reproduction in big data environment
167 -- 182Jiyuan Shi, Junzhou Luo, Fang Dong, Jinghui Zhang, Junxue Zhang. Elastic resource provisioning for scientific workflow scheduling in cloud under budget and deadline constraints
183 -- 195Chao Yang, Bin Jiang, Isao Ono, Setsuya Kurahashi, Takao Terano. A grid based simulation environment for agent-based models with vast parameter spaces
197 -- 210Jia Wang, Xiaoping Li. Task scheduling for MapReduce in heterogeneous networks
211 -- 221Zhiang Wu, Guangliang Gao, Zhan Bu, Jie Cao. SIMPLE: a simplifying-ensembling framework for parallel community detection from large networks
223 -- 235Hwa Gyoo Park, Weiming Shen. A methodology for developing clinical collaborative communication systems
237 -- 253Yuan Cheng, Fazhi He, Yiqi Wu, Dejun Zhang. Meta-operation conflict resolution for human-human interaction in collaborative feature-based CAD systems
255 -- 267Liping Gao, Fangyu Yu, QingKui Chen, Naixue Xiong. Consistency maintenance of Do and Undo/Redo operations in real-time collaborative bitmap editing systems
269 -- 277S. P. Malarvizhi, B. Sathiyabhama. Frequent pagesets from web log by enhanced weighted association rule mining
279 -- 283Hye-Young Kim. An energy-efficient load balancing scheme to extend lifetime in wireless sensor networks
285 -- 292Changhee Cho, Jisu Kim, Jinsul Kim, Sang Joon Lee, Kuinam J. Kim. Detecting for high speed flying object using image processing on target place
293 -- 300Sanghyun Park, Jisu Kim, Gemoh Maliva Tihfon, Hoyong Ryu, Jinsul Kim. Dynamic multimedia transmission control virtual machine using weighted Round-Robin
301 -- 308Dae-Won Park, Suhyun Park. Multiple-domain marine data utilization structure for e-navigation
309 -- 314Hoyoung Cheong, Jonwon Eun, Hyuncheol Kim, Kuinam J. Kim. Belief propagation decoding assisted on-the-fly Gaussian elimination for short LT codes
315 -- 323Hyoung-Gook Kim, Hye-Seung Cho, Jin Young Kim. Robust audio fingerprinting using peak-pair-based hash of non-repeating foreground audio in a real environment
325 -- 333Seung-Ho Kang, Kuinam J. Kim. A feature selection approach to find optimal feature subsets for the network intrusion detection system
335 -- 347Wai-Kong Lee, Hon-Sang Cheong, Raphael C.-W. Phan, Bok-Min Goi. Fast implementation of block ciphers and PRNGs in Maxwell GPU architecture
349 -- 368Munwar Ali Zardari, Low Tang Jung. Data security rules/regulations based classification of file data using TsF-kNN algorithm
369 -- 377Kyung-shick Choi, Kyungseok Choo, Yong-eun Sung. Demographic variables and risk factors in computer-crime: an empirical assessment
379 -- 387Kuinam J. Kim, Cheong-Ghil Kim, Taeg Keun Whangbo, Kyoungro Yoon. A continuous playing scheme on RESTful web service
389 -- 410Hamzeh Mohammad Alabool, Ahmad Kamil Bin Mahmood. A novel evaluation framework for improving trust level of Infrastructure as a Service
411 -- 425Sufian Sudeng, Naruemon Wattanapongsakorn. A knee-based multi-objective evolutionary algorithm: an extension to network system optimization design problem
427 -- 438Taher Ahmed Ghaleb. Techniques and countermeasures of website/wireless traffic analysis and fingerprinting
439 -- 453Saad Alqahtany, Nathan L. Clarke, Steven Furnell, Christoph Reich. A forensic acquisition and analysis system for IaaS
455 -- 474Abdulwahid Al Abdulwahid, Nathan L. Clarke, Ingo Stengel, Steven Furnell, Christoph Reich. Continuous and transparent multimodal authentication: reviewing the state of the art
475 -- 484Yoon-Su Jeong, Seung Soo Shin, Kun Hee Han. High-dimentional data authentication protocol based on hash chain for Hadoop systems
485 -- 495Seong-Taek Park, Eun-Mi Park, Joung-Hae Seo, GuoZhong Li. Factors affecting the continuous use of cloud service: focused on security risks
497 -- 504Kun Hee Han, Woo Sik Bae. Proposing and verifying a security protocol for hash function-based IoT communication system
505 -- 517Kyungyong Chung, Roy C. Park. PHR open platform based smart health service using distributed object group framework
519 -- 528Jong-Hak Oh, Jung-Wan Hong, Yen-Yoo You, Gwan-Sik Na. Effects of patent indicators on national technological level: concentrated on mobile communication, network, and convergence technologies
529 -- 546IlKyu Yoon, JaMee Kim, WonGyu Lee. The analysis and application of an educational programming language (RUR-PLE) for a pre-introductory computer science course
547 -- 556Yunsick Sung, Young-Sik Jeong, Jong Hyuk Park. Beacon-based active media control interface in indoor ubiquitous computing environment
557 -- 566Emmanuel N. Millán, Silvana B. Goirán, María Fabiana Piccoli, Carlos García Garino, Julieta N. Aranibar, Eduardo M. Bringa. Monte Carlo simulations of settlement dynamics in GPUs