107 | -- | 118 | Zhongjie Wang, Xiaofei Xu. Re-examining social network services from sociability perspective |
119 | -- | 124 | Zhiwei Tang, Ziwei Lin, Bin Li, Longhu Chen. The embedded real-time detection system of moving object based on improved Gaussian mixture model |
125 | -- | 134 | Yuanting Li, Xiaohong Li, Vincent Havyarimana, Dong Wang, Zhu Xiao. Low-cost sensors aided vehicular position prediction with partial least squares regression during GPS outage |
135 | -- | 145 | Weilong Ding, Zhuofeng Zhao, Yanbo Han. ePush: a streaming push service for mobile content delivery |
146 | -- | 154 | Rong Wang, Hao Chen, Jianhua Sun. Phoney: protecting password hashes with threshold cryptology and honeywords |
155 | -- | 163 | Chao Qu, Ming Tao, Fagui Liu, Ruifen Yuan. Design and application of top ontologies for the transactions on IoT |
164 | -- | 173 | Qiang Wei, Zhi Jin, Lixing Li, Ge Li. Lightweight semantic service modelling for IoT: an environment-based approach |
174 | -- | 184 | Yu-Teng Jacky Jang, Shuchih Ernest Chang, Wei-Cheng Shen, Sheng-Wen Wang. Cloud backup: an enhanced smartphone app designed with cross-platform approach |
185 | -- | 195 | Guo Chi, Luo Meng, Liu Xuan, Cui Jingsong. Active or inactive: infer private user information in location-based social network |
196 | -- | 205 | Tong Ning, Zhang Xue, Wang ChunShuang, Hun Jiexu. Variable ferry routing algorithm for sparse wireless sensor networks |
206 | -- | 216 | Yuliang Zhang, Tinghuai Ma, Jie Cao, Meili Tang. K-anonymisation of social network by vertex and edge modification |
217 | -- | 227 | Xin Su, Dafang Zhang, Shuaifu Dai, Jianyu Zhang, Duanbin Wang. Mobile traffic identification based on application's network signature |
228 | -- | 236 | Zhenyu Liao, Jiangfeng Li, Chenxi Zhang. Interest overlay network model on distributed social network service |
237 | -- | 248 | Shuibing He, Yuanhua Yang, Xianbin Xu, XiaoHua Xu. MGPA: a multi-granularity space preallocation algorithm for object-based storage devices |
249 | -- | 257 | Zhao-Xia Yin, Wien Hong, Jin Tang, Bin Luo. High capacity reversible steganography in encrypted images based on feature mining in plaintext domain |
258 | -- | 265 | Hua Su, Gaoyong Wang, Xuemei Sun, Dong Yu. Optimal node deployment strategy for wireless sensor networks based on dynamic ant colony algorithm |
266 | -- | 275 | Wei Ren, Jiahua Lin, Qiang Cao, Yi Ren. LibTiP: a lightweight and robust scheme for data trustworthiness and privacy protection in participatory sensing |