Journal: The Journal of Supercomputing

Volume 72, Issue 7

2437 -- 2452Hyun Woo Kim, Jong Hyuk Park, Young-Sik Jeong. Human-centric storage resource mechanism for big data on cloud service architecture
2453 -- 2470Kwang-il Hwang, Young-Sik Jeong, Deok-Gyu Lee. Hierarchical multichannel-based integrated smart metering infrastructure
2471 -- 2487HeeEun Kang, Kihyun Jeong, Kwonyong Lee, Sungyong Park, Youngjae Kim. Android RMI: a user-level remote method invocation mechanism between Android devices
2488 -- 2501Lixia Liu, Hong Mei, Bing Xie. Towards a multi-QoS human-centric cloud computing load balance resource allocation method
2502 -- 2519Weina Fu, Jiantao Zhou, Chunyan An. Distributed dynamic target tracking method by block diagonalization of topological matrix
2520 -- 2536Daesung Moon, Sung Bum Pan, Ikkyun Kim. Host-based intrusion detection system for secure human-centric computing
2537 -- 2564Tao Wang, Shihong Yao, ZhengQuan Xu, Shan Jia. DCCP: an effective data placement strategy for data-intensive computations in distributed cloud computing systems
2565 -- 2578Hao Chen, Zhongkun Li, Wei Hu. An improved collaborative recommendation algorithm based on optimized user similarity
2579 -- 2593Eun-Seok Lee, Jin-Hee Lee, Byeong-Seok Shin. A bimodal empty space skipping of ray casting for terrain data
2594 -- 2608Qiudong Sun, Liandong Wang, Yufeng Shao, Jiancun Zuo. Watermarking technique based on three-coefficient comparison in DCT domain
2609 -- 2622Maengsik Choi, Hyeon-gu Lee, Harksoo Kim. Relation extraction based on two-step classification with distant supervision
2623 -- 2634Yong Zhang, Yiming Fang, Mei Song, Wei Hu. System level simulation platform for Cognitive LTE
2635 -- 2650Sang-Hoon Kim, Hyun-Ho Choi, YunSeop Yu. Improvements in adhesion force and smart embedded programming of wall inspection robot
2651 -- 2669Chi-Fu Huang, Wei-Chen Lin. Data collection for multiple mobile users in wireless sensor networks
2670 -- 2681Chunyong Yin, Lu Feng, Luyu Ma. An improved Hoeffding-ID data-stream classification algorithm
2682 -- 2702Su-Wan Park, Jeong-Nyeo Kim, Deok-Gyu Lee. SecureDom: secure mobile-sensitive information protection with domain separation
2703 -- 2719Fang Song, Su Yu, Tao Chen, Li-Ning Sun. Research on CNC simulation system with instruction interpretations possessed of wireless communication
2720 -- 2733Wei Song, Mingyun Wen, Yulong Xi, Phuong Minh Chu, Hoang-Vu, Shokh-Jakhon Kayumiy, Kyungeun Cho. A collaborative client participant fusion system for realistic remote conferences
2734 -- 2751Jianhong Zhou, Maode Ma, Yong Feng, Thuy Ngoc Nguyen. A symmetric key-based pre-authentication protocol for secure handover in mobile WiMAX networks
2752 -- 2766Van Thanh Tran, Jaewoon Lee, DongHo Kim, Young-Sik Jeong. Easy-to-use virtual brick manipulation techniques using hand gestures
2767 -- 2781Chengxi Gu, G. U. Caidong, Fan Ling. Calculation and simulation of transient optimal voltage output point in wireless sensor networks
2782 -- 2795Fei Hao, Doo-Soon Park, Zheng Pei, HwaMin Lee, Young-Sik Jeong. Identifying the social-balanced densest subgraph from signed social networks
2796 -- 2814Quanqing Xu, Khin Mi Mi Aung, Yongqing Zhu, Khai Leong Yong. Building a large-scale object-based active storage platform for data analytics in the internet of things
2815 -- 2831Seong-hun Park, Sung Min Kim, Young-Guk Ha. Highway traffic accident prediction using VDS big data analysis
2832 -- 0Seong-hun Park, Sung Min Kim, Young-Guk Ha. Erratum to: Highway traffic accident prediction using VDS big data analysis
2833 -- 2847BeiLie Wang, Hui Liu, Jie Song. SaaS-based enterprise application integration approach and case study
2848 -- 2859Surgwon Sohn. Feasibility study on the use of wireless accelerometers in the experimental modal testing
2860 -- 2873Hyungjin Im, Jeong Kyu Lee, Jong Hyuk Park. A rhythm-based access control system for secure wellness services
2874 -- 2890Yun Lin, Can Wang, Chunguang Ma, Zheng Dou, Xuefei Ma. A new combination method for multisensor conflict information
2891 -- 2909Wei Zhou, Su Yu. Research on the communication method of mobile network shadow fading based on interference alignment algorithm