Journal: IJES

Volume 8, Issue 5/6

368 -- 379Ríad Nassiffe, Eduardo Camponogara, George Lima, Daniel Mossé. Optimising QoS in adaptive real-time systems with energy constraint varying CPU frequency
380 -- 390Luiz Fernando Schrickte, Carlos Barros Montez, Rômulo Silva de Oliveira, Alex Sandro Roschildt Pinto. Design and implementation of a 6LoWPAN gateway for wireless sensor networks integration with the internet of things
391 -- 411Fernando Nicodemos, Osamu Saotome, George Lima, Sandro S. Sato. A minimally intrusive method for analysing the timing of RTEMS core characteristics
412 -- 426André Luíz de Oliveira, Rosana T. V. Braga, Paulo Cesar Masiero, Yiannis Papadopoulos, Ibrahim Habli, Tim Kelly. Model-based safety analysis of software product lines
427 -- 439Jun Yan, Wei Zhang. Priority L2 cache design for time predictability
440 -- 451Ernesto Massa, George Lima, Paul Regnier. From RUN to QPS: new trends for optimal real-time multiprocessor scheduling
452 -- 463Douglas P. B. Renaux, Fabiana Pöttker. Performance evaluation of CMSIS-RTOS: benchmarks and comparison
464 -- 482Vânia de Oliveira Neves, Márcio Eduardo Delamaro, Paulo Cesar Masiero. Combination and mutation strategies to support test data generation in the context of autonomous vehicles
483 -- 492Tiago Gomes, Jorge Pereira, Paulo Garcia, Filipe Salgado, Vitor Alberto Silva, Sandro Pinto, Mongkol Ekpanyapong, Adriano Tavares. Hybrid real-time operating systems: deployment of critical FreeRTOS features on FPGA
493 -- 503Tyng-Yeu Liang, Hung-Fu Li, Yu-Chih Chen, Yu-Jie Lin. A mobile integrated development environment for C programming
504 -- 518Jun Wu. IASA: an energy-efficient scheduling algorithm for real-time tasks with lock-free objects

Volume 8, Issue 4

277 -- 292Zonghua Gu, Hong Li, Haibin Cai. Improving computation efficiency of schedulability of transaction-based task model for distributed real-time embedded systems
293 -- 299Aobing Sun, Tongkai Ji, Jun Wang, Haitao Liu. Wearable mobile internet devices involved in big data solution for education
300 -- 312Long Peng, Fei Guan, Luc Perneel, Martin Timmerman. Behaviour and performance comparison between FreeRTOS and µC/OS-III
313 -- 322Yan Wang, Brian Vinter. Auto-tuning for large-scale image processing by dynamic analysis method on multicore platforms
323 -- 332Ming-Wei Qin, JianHao Hu, Shang Ma. NoC self-similar traffic modelling based on systolic architecture unit
333 -- 342Lin-Tao Duan, Bing Guo, Yan Shen, Jihe Wang, Wei Xiong. Interaction-based low power service for mobile OLED displays
343 -- 351Ching-Yi Chen, Shu-Yin Chiang, Chun-Te Wu. Path planning and obstacle avoidance for omni-directional mobile robot based on Kinect depth sensor
352 -- 366Mark Burgin, Rao Mikkilineni, Giovanni Morana. Intelligent organisation of semantic networks, DIME network architecture and grid automata

Volume 8, Issue 2/3

107 -- 118Zhongjie Wang, Xiaofei Xu. Re-examining social network services from sociability perspective
119 -- 124Zhiwei Tang, Ziwei Lin, Bin Li, Longhu Chen. The embedded real-time detection system of moving object based on improved Gaussian mixture model
125 -- 134Yuanting Li, Xiaohong Li, Vincent Havyarimana, Dong Wang, Zhu Xiao. Low-cost sensors aided vehicular position prediction with partial least squares regression during GPS outage
135 -- 145Weilong Ding, Zhuofeng Zhao, Yanbo Han. ePush: a streaming push service for mobile content delivery
146 -- 154Rong Wang, Hao Chen, Jianhua Sun. Phoney: protecting password hashes with threshold cryptology and honeywords
155 -- 163Chao Qu, Ming Tao, Fagui Liu, Ruifen Yuan. Design and application of top ontologies for the transactions on IoT
164 -- 173Qiang Wei, Zhi Jin, Lixing Li, Ge Li. Lightweight semantic service modelling for IoT: an environment-based approach
174 -- 184Yu-Teng Jacky Jang, Shuchih Ernest Chang, Wei-Cheng Shen, Sheng-Wen Wang. Cloud backup: an enhanced smartphone app designed with cross-platform approach
185 -- 195Guo Chi, Luo Meng, Liu Xuan, Cui Jingsong. Active or inactive: infer private user information in location-based social network
196 -- 205Tong Ning, Zhang Xue, Wang ChunShuang, Hun Jiexu. Variable ferry routing algorithm for sparse wireless sensor networks
206 -- 216Yuliang Zhang, Tinghuai Ma, Jie Cao, Meili Tang. K-anonymisation of social network by vertex and edge modification
217 -- 227Xin Su, Dafang Zhang, Shuaifu Dai, Jianyu Zhang, Duanbin Wang. Mobile traffic identification based on application's network signature
228 -- 236Zhenyu Liao, Jiangfeng Li, Chenxi Zhang. Interest overlay network model on distributed social network service
237 -- 248Shuibing He, Yuanhua Yang, Xianbin Xu, XiaoHua Xu. MGPA: a multi-granularity space preallocation algorithm for object-based storage devices
249 -- 257Zhao-Xia Yin, Wien Hong, Jin Tang, Bin Luo. High capacity reversible steganography in encrypted images based on feature mining in plaintext domain
258 -- 265Hua Su, Gaoyong Wang, Xuemei Sun, Dong Yu. Optimal node deployment strategy for wireless sensor networks based on dynamic ant colony algorithm
266 -- 275Wei Ren, Jiahua Lin, Qiang Cao, Yi Ren. LibTiP: a lightweight and robust scheme for data trustworthiness and privacy protection in participatory sensing

Volume 8, Issue 1

1 -- 11Cheng Lei, Hongqi Zhang, Yi Sun, Xuehui Du, Xudong Jia. Multilayer collaborative traceback technique based on net-flow fingerprint
12 -- 23Zhongming Han, Ke Yang, Fengmin Xu, Dagao Duan. Probabilistic graphical model for detecting spammers in microblog websites
24 -- 33Shaowu Mao, Huanguo Zhang, Wanqing Wu, Houzhen Wang. Multi-bit LWE-based encryption scheme without decryption errors
34 -- 38Yang Xu, BaoZhan Chen, ZhiChen Hu. Research for multi-sensor data fusion based on Huffman tree clustering algorithm in greenhouses
39 -- 45Haihe Ba, Jiangchun Ren, Zhiying Wang, Huaizhe Zhou, Yiming Li, Tie Hong. User-policy-based dynamic remote attestation in cloud computing
46 -- 58Hongmu Han, Ruixuan Li, Xiwu Gu. Identifying malicious Android apps using permissions and system events
59 -- 68Chenlin Huang, Ligang He, Xiangke Liao, Huadong Dai, Mengluo Ji. Developing a trustworthy computing framework for clouds
69 -- 77P. Devi, A. Kannammal. An integrated intelligent paradigm to detect DDoS attack in mobile ad hoc networks
78 -- 86Hui Zhu, Xiaoying He, Ximeng Liu, Hui Li 0006. PTFA: a secure and privacy-preserving traffic flow analysis scheme for intelligent transportation system
87 -- 92Yanghong Zhou, Shijie Zhou, Jiaqing Luo. Explore city dynamics from the communication network between base stations
93 -- 103Yan Li, Chong Chen, Jian Zhou, Gaofeng Zhang, Xiaolong Chen. Dual state-parameter simultaneous estimation using localised ensemble Kalman filter and application in environmental model