1655 | -- | 1658 | Marek R. Ogiela, Aniello Castiglione, Ilsun You. Soft computing for security services in smart and ubiquitous environments |
1659 | -- | 1674 | José L. Hernández, María Victoria Moreno Cano, Antonio J. Jara, Antonio F. Skarmeta. A soft computing based location-aware access control for smart buildings |
1675 | -- | 1683 | Lidia Ogiela. Towards cognitive economy |
1685 | -- | 1696 | Mao Yang, Yong Li, Depeng Jin, Jian Yuan, Ilsun You, Lieguang Zeng. Opportunistic sharing scheme for spectrum allocation in wireless virtualization |
1697 | -- | 1703 | Junho Choi, Chang Choi, Byeong-Kyu Ko, PanKoo Kim. A method of DDoS attack detection using HTTP packet pattern and rule engine in cloud computing environment |
1705 | -- | 1714 | Vincenzo Maniscalco, Silvana Greco Polito, Antonio Intagliata. Binary and m-ary encoding in applications of tree-based genetic algorithms for QoS routing |
1715 | -- | 1728 | Mye M. Sohn, SungHwan Jeong, Hyun Jung Lee. Case-based context ontology construction using fuzzy set theory for personalized service in a smart home environment |
1729 | -- | 1743 | Fang-Yie Leu, Jung-Chun Liu, Ya-Ting Hsu, Yi-Li Huang. The simulation of an emotional robot implemented with fuzzy logic |
1745 | -- | 1756 | D. G. Reina, J. M. Leon-Coca, Sergio L. Toral Marín, Eleana Asimakopoulou, Federico Barrero, Peter Norrington, Nik Bessis. Multi-objective performance optimization of a probabilistic similarity/dissimilarity-based broadcasting scheme for mobile ad hoc networks in disaster response scenarios |
1757 | -- | 1770 | Tao-Wei Chiou, Shi-Chun Tsai, Yi-Bing Lin. Network security management with traffic pattern clustering |
1771 | -- | 1781 | Hua-Pei Chiang, Yao-Hsin Chou, Chia-Hui Chiu, Shu-Yu Kuo, Yueh-Min Huang. A quantum-inspired Tabu search algorithm for solving combinatorial optimization problems |
1783 | -- | 1793 | Evjola Spaho, Shinji Sakamoto, Leonard Barolli, Fatos Xhafa, Makoto Ikeda. Trustworthiness in P2P: performance behaviour of two fuzzy-based systems for JXTA-overlay platform |
1795 | -- | 1802 | Fatos Xhafa, Jianfeng Wang, Xiaofeng Chen 0001, Joseph K. Liu, Jin Li, Paul Krause. An efficient PHR service system supporting fuzzy keyword search and fine-grained access control |
1803 | -- | 1813 | Kai Wang, Huachun Zhou, Yajuan Qin, Hongke Zhang. Cooperative-Filter: countering Interest flooding attacks in named data networking |
1815 | -- | 1827 | Wujian Ye, Kyungsan Cho. Hybrid P2P traffic classification with heuristic rules and machine learning |
1829 | -- | 1840 | Guowei Wu, Zhuang Du, Yibo Hu, Taeyoung Jung, Ugo Fiore, Kangbin Yim. A dynamic trust model exploiting the time slice in WSNs |
1841 | -- | 1852 | N. M. Constantinescu. State filters on fuzzy structures with internal states |
1853 | -- | 1864 | Pradip Kundu, Samarjit Kar, Manoranjan Maiti. A fuzzy MCDM method and an application to solid transportation problem with mode preference |