313 | -- | 334 | Bojan Jovanovic, Ivan Milenkovic, Marija Bogicevic-Sretenovic, Dejan Simic. Extending identity management system with multimodal biometric authentication |
335 | -- | 358 | Mohammad Javad Amiri, Saeed Parsa, Amir Mohammadzade Lajevardi. Multifaceted service identification: Process, requirement and data |
359 | -- | 373 | Zhenzhen Xu, Huizhen Jiang, Xiangjie Kong, Jialiang Kang, Wei Wang 0077, Feng Xia. Cross-domain item recommendation based on user similarity |
375 | -- | 394 | Duck-Ho Bae, Jin Hyung Kim, Yong-Yeon Jo, Sang-Wook Kim, Hyunok Oh, Chanik Park. Intelligent SSD: A turbo for big data mining |
395 | -- | 425 | Ángel García-Crespo, Israel González-Carrasco, José L. López-Cuadrado, Daniel Villanueva, Álvaro Gonzalez. CESARSC: Framework for creating Cultural Entertainment Systems with Augmented Reality in Smart Cities |
427 | -- | 452 | Hyunwook Kim, Robiul M. Hoque, Seo Hyungyu, Sung-Hyun Yang. Development of middleware architecture to realize context-aware service in smart home environment |
453 | -- | 473 | Aljaz Osojnik, Pance Panov, Saso Dzeroski. Modeling dynamical systems with data stream mining |
475 | -- | 492 | Ali Gohar, Kyong Hoon Kim, Ki-Il Kim. Adaptive TDMA scheduling for real-time flows in cluster-based wireless sensor networks |
493 | -- | 514 | Milos Milutinovic, Zivko Bojovic, Aleksandra Labus, Zorica Bogdanovic, Marijana Despotovic-Zrakic. Ontology-based generated learning objects for mobile language learning |
515 | -- | 530 | Min Wang, Shenggang Yang, Liyuan Wu. Improved community mining method based on LFM and EAGLE |
531 | -- | 545 | Kaixiang Huang, Yue Chen, Hongyong Jia, Julong Lan, Xincheng Yan, Zhiwei Wang. Fast multicast scheme with secure network coding in cloud data centers |
547 | -- | 560 | Jiang Liu, Juan Liu, Renchao Xie. Reliability-based controller placement algorithm in software defined networking |
561 | -- | 577 | Yuchen Fu, Zhipeng Xu, Fei Zhu, Quan Liu, Xiaoke Zhou. Learn to human-level control in dynamic environment using incremental batch interrupting temporal abstraction |
579 | -- | 592 | Xiaolong Ma, Yonghui Dai, Ziyi Wang, Lanjuan Liu. Design of online double auction mechanism for aging sensitive commodity |
593 | -- | 608 | Huanzhao Wang, Kun Qian, Chengchen Hu, Che Zhang, Yadong Zhou. Routing optimization for server-centric data center networks |
609 | -- | 622 | Jing Long, Dafang Zhang, Chen Zuo, Jiajun Duan, Weihong Huang. A robust low-overhead watermarking for field authentication of intellectual property cores |
623 | -- | 638 | Wei Liang, Yong Xie, Xuhui Chen, Osama Hosam, Xiaoyan Chen. A two-step MF signal acquisition method for wireless underground sensor networks |
639 | -- | 658 | Tao Huang, Jiao Zhang, Yunjie Liu. A mechanism achieving low latency for wireless datacenter applications |
659 | -- | 676 | Dezhi Han, Kun Bi, Bolin Xie, Lili Huang, RuiJun Wang. An anomaly detection on the application-layer-based QoS in the cloud storage system |
677 | -- | 689 | Kun Bi, Dezhi Han, Jun Wang. K maximum probability attack paths dynamic generation algorithm |
691 | -- | 705 | Mei Liu, Bolin Liao, Lei Ding, Lin Xiao. Performance analyses of recurrent neural network models exploited for online time-varying nonlinear optimization |