Abstract is missing.
- Enabling Proactive Data Management in Virtualized Hadoop Clusters Based on Predicted Data Activity PatternsGeorge Kousiouris, George Vafiadis, Theodora A. Varvarigou. 1-8 [doi]
- Cloud Brokering as a ServiceAlba Amato, Beniamino Di Martino, Salvatore Venticinque. 9-16 [doi]
- PER-MARE: Adaptive Deployment of MapReduce over Pervasive GridsLuiz Angelo Steffenel, Olivier Flauzac, Andrea Schwertner Charão, Patricia Pitthan Barcelos, Benhur de Oliveira Stein, Sergio Nesmachnow, Manuele Kirsch-Pinheiro, Daniel Diaz. 17-24 [doi]
- A Target-Predicting DR Algorithm in ROIA Cloud PlatformLiu Dong. 25-28 [doi]
- HPS5DSWS: A Hybrid P2P Strategy of the Distributed Discovery Mechanism for Semantic Web ServicesAdel Boukhadra, Karima Benatchba, Amar Balla. 29-36 [doi]
- Securing Structured P2P Overlay NetworksZied Trifa, Maher Khemakhem. 37-43 [doi]
- Network Multicast Opened by Network Operators to Be Used by P2P ApplicationsIrène Grosclaude, Bertrand Mathieu. 44-51 [doi]
- A NAT-ed Peer Organization Model in Kademlia ProtocolBingqing Shen, Jingzhi Guo, C. L. Philip Chen. 52-59 [doi]
- Towards the Cloud of Things Sensing and Actuation as a Service, a Key Enabler for a New Cloud ParadigmSalvatore Distefano, Giovanni Merlino, Antonio Puliafito. 60-67 [doi]
- Secure Enterprise Interoperability Ontology for Semantic Integration of Business to Business ApplicationsEmmanuel Sardis, Spyridon V. Gogouvitis, Thanassis Bouras, Panagiotis Gouvas, Theodora A. Varvarigou. 68-75 [doi]
- Agent-Based Design for UAV Mission PlanningDomenico Pascarella, Salvatore Venticinque, Rocco Aversa. 76-83 [doi]
- Cryptographic Spatio-temporal Predicates for Location-Based ServicesYan Zhu, Changjun Hu, Di Ma, Jin Li. 84-91 [doi]
- A Fully Distributed Resilient Routing Scheme for Switch-Based NetworksThanh Son Pham, Jacques Carlier, Joël Lattmann, Jean-Luc Lutton, Dritan Nace, Laurent Valeyre. 92-97 [doi]
- Elastic Routing: A Distributed Variant, Implementation Issues, and Numerical ResultsYoann Foquet, Dritan Nace, Michal Pióro, Ilir Shinko. 98-104 [doi]
- Dist-RIA Crawler: A Distributed Crawler for Rich Internet ApplicationsSeyed M. Mirtaheri, Di Zou, Gregor von Bochmann, Guy-Vincent Jourdan, Iosif-Viorel Onut. 105-112 [doi]
- Resource Management Architecture for Fair Scheduling of Optional ComputationsFrederic Camillo, Eddy Caron, Ronan Guivarch, Aurélie Hurault, Cristian Klein, Christian Pérez. 113-120 [doi]
- Multi-GPU Scalable Implementation of a Contour-Integral-Based Eigensolver for Real Symmetric Dense Generalized Eigenvalue ProblemsTakahiro Yano, Yasunori Futamura, Tetsuya Sakurai. 121-127 [doi]
- Monitoring and Detection of Agitation in Dementia: Towards Real-Time and Big-Data SolutionsPhilip Moore, Fatos Xhafa, Leonard Barolli, Andrew M. Thomas. 128-135 [doi]
- Evaluation of Virtual Machine Performance on NUMA Multicore SystemsYuxia Cheng, Wenzhi Chen. 136-143 [doi]
- A Parallel Memetic Algorithm for the Vehicle Routing Problem with Time WindowsMiroslaw Blocho, Zbigniew J. Czech. 144-151 [doi]
- A Fine-Grained Parallel Model for the Fast Iterative Method in Solving Eikonal EquationsFlorian Dang, Nahid Emad, Alexandre Fender. 152-157 [doi]
- Multi Level Parallelism of Multiple Implicitly/Explicitly Restarted Arnoldi Methods for Post-petascale ComputingMiwako Tsuji, Makarem Dandouna, Nahid Emad. 158-165 [doi]
- The Exploration of Pervasive and Fine-Grained Parallel Model Applied on Intel Xeon Phi CoprocessorChristophe Calvin, Fan Ye, Serge G. Petiton. 166-173 [doi]
- An Enhancement of a Scheduling Approach for an Opportunistic EnvironmentEliza Gomes, M. A. R. Dantas. 174-178 [doi]
- Exploiting End-Users Caching Capacities to Improve Content-centric Networking DeliveryWei You, Bertrand Mathieu, Gwendal Simon. 179-185 [doi]
- Enabling a Metric Space for Content Search in Information-Centric NetworksPatrick Truong, Jean-François Peltier. 186-192 [doi]
- Towards a "Cloud Enabled" University Computer CenterChristodoulos Fragoudakis, Markos Karampatsis, Petros Potikas. 193-199 [doi]
- Building Event-Based Services for Awareness in P2P Groupware SystemsAlexandra Poulovassilis, Fatos Xhafa. 200-207 [doi]
- A Review on Massive E-Learning (MOOC) Design, Delivery and AssessmentThanasis Daradoumis, Roxana Bassi, Fatos Xhafa, Santi Caballé. 208-213 [doi]
- New Privacy-Preserving Location Sharing System for Mobile Online Social NetworksZheli Liu, Jin Li, Xiaofeng Chen 0001, Jingwei Li, Chunfu Jia. 214-218 [doi]
- A GRASP for Placement and Routing of Dataflow Process Networks on Many-Core ArchitecturesOana Stan, Renaud Sirdey, Jacques Carlier, Dritan Nace. 219-226 [doi]
- Determining the Performance of the Databases in the Context of Cloud GovernanceAdrian Copie, Teodor Florin Fortis, Victor Ion Munteanu. 227-234 [doi]
- SMVP Distribution Using Hypergraph Model and S-GBNZ AlgorithmIchrak Mehrez, Olfa Hamdi-Larbi. 235-241 [doi]
- A Parallelization Mixing OR-Tools/Gecode Solvers on Top of the Bobpp FrameworkTarek Menouer, Bertrand Le Cun. 242-246 [doi]
- Applying Data Mining Techniques to Intrusion Detection in Wireless Sensor NetworksLuigi Coppolino, Salvatore D'Antonio, Alessia Garofalo, Luigi Romano. 247-254 [doi]
- Nudging through Technology: Choice Architectures and the Mobile Information RevolutionAndrew M. Thomas, J. Parkinson, Philip Moore, A. Goodman, Fatos Xhafa, Leonard Barolli. 255-261 [doi]
- Customized SLAs in Cloud EnvironmentsNikoletta Mavrogeorgi, Vasileios Alexandrou, Spyridon V. Gogouvitis, Athanasios Voulodimos, Dimosthenis Kyriazis, Theodora A. Varvarigou, Elliot K. Kolodner. 262-269 [doi]
- Towards a Scalable Multi-agent Architecture for Managing IoT DataBogdan Manate, Victor Ion Munteanu, Teodor Florin Fortis. 270-275 [doi]
- Intrusion Detection in Cloud ComputingMassimo Ficco, Luca Tasquier, Rocco Aversa. 276-283 [doi]
- Towards Practical Program Execution over Fully Homomorphic Encryption SchemesSimon Fau, Renaud Sirdey, Caroline Fontaine, Carlos Aguilar Melchor, Guy Gogniat. 284-290 [doi]
- Authentication and Secured Execution for the Infrastructure-as-a-Service Layer of the Cloud Computing ModelLaurent Hubert, Renaud Sirdey. 291-297 [doi]
- Procurement Auctions to Trade Computing Capacity in the CloudGiuseppe Di Modica, Giuseppe Petralia, Orazio Tomarchio. 298-305 [doi]
- Two Anonymous Cooperative Caching Schemes in Mobile Ad Hoc NetworksChang-ji Wang, Xi-Lei Xu, Dong-Yuan Shi. 306-310 [doi]
- A Full-Discrete Finite Element Algorithm for a Semilinear Periodic Parabolic ProblemsZhiguang Xiong, Yanping Liu, Xiaocui Yan. 311-315 [doi]
- Trust-Based Scheduling Strategy for Workflow Applications in Cloud EnvironmentYuli Yang, Xinguang Peng. 316-320 [doi]
- Calculating the Power Usage Effectiveness of Data Centers by Using Weighted Average WorkloadYongmei Xu, Yuhui Deng, Lan Du. 321-323 [doi]
- Analysis of Mobile and Web Applications in Small and Medium Size EnterprisesVladi Kolici, Fatos Xhafa, Edilfredo Eliot Diaz Pinedo, Jose Luis Nunez, Vincent Segui Pascual, Leonard Barolli. 324-330 [doi]
- Cooperative Routing for Multi-flow Wireless Sensor NetworksMing Tao, Huaqiang Yuan, Wenhong Wei, Yong Qin, Zhixiong Li. 331-335 [doi]
- Public-Key Encryption with Keyword Search from LatticeChangjiang Hou, Fei Liu, Hongtao Bai, Lanfang Ren. 336-339 [doi]
- A Dynamic Trust Conference Algorithm for Social NetworkXin Liu, Leyi Shi, Yao Wang, Zhaojun Xin, Wenjing Fu. 340-346 [doi]
- An Unlinkable Secret Handshake with Fuzzy Matching for Social NetworksYamin Wen, Zheng Gong. 347-353 [doi]
- Lossless Image Authentication Algorithm Based on Three-Compa Image Basic BlocksXiangyang Li. 354-357 [doi]
- An Authentication Framework for Automatic Dependent Surveillance-Broadcast Based on Online/Offline Identity-Based SignatureJoonsang Baek, Young-Ji Byon, Eman Hableel, Mahmoud Al-Qutayri. 358-363 [doi]
- Research on Born-Digital Image Text Extraction Based on Conditional Random FieldJian Zhang, Renhong Cheng, Kai Wang, Hong Zhao, Jiao Jiao. 364-368 [doi]
- Study on the Ultra-wideband Wireless Positioning Protocol Based on Pseudo-random Turnaround DelayJuan Li, Xuerong Cui, Chunlei Wu. 369-372 [doi]
- Improving Particle Swarm Optimization Algorithm for Distributed Sensing and SearchYi Cai, Zhutian Chen, HuaQing Min. 373-379 [doi]
- RFSM-Fuzzing a Smart Fuzzing Algorithm Based on Regression FSMJingling Zhao, Shilei Chen, Shurui Liang, Baojiang Cui, Xiaolong Song. 380-386 [doi]
- Inconsistency-Tolerant Belief Revision for Distributed Decision SupportHendrik Decker, Rubén de Juan-Marín. 387-393 [doi]
- Mining WiFi Data for Business IntelligenceDeepali Arora, Stephen W. Neville, Kin Fun Li. 394-398 [doi]
- Principal Component Analysis in Business Intelligence ApplicationsAna-Maria Sevcenco, Kin Fun Li. 399-404 [doi]
- A Novel Approach to Generate and Extract Audio WatermarkChundong Wang, Guangming Bo. 405-409 [doi]
- A Multi-agent and Dynamic Programming Algorithm for Aeronautical Maintenance PlanningFrancesco Gargiulo, D. Pascar, Salvatore Venticinque. 410-415 [doi]
- Erasure-Coding Based Dissemination Protocol for Mobile CloudsRoberto Beraldi, Khalil Massri, Hussein M. Alnuweiri. 416-421 [doi]
- A Compositional Modelling Approach for Large Sensor Networks DesignErmanno Battista, Valentina Casola, Nicola Mazzocca, Roberto Nardone, Stefano Marrone. 422-429 [doi]
- On the Adoption of FPGA for Protecting Cyber Physical InfrastructuresMario Barbareschi, Ermanno Battista, Valentina Casola, Antonino Mazzeo, Nicola Mazzocca. 430-435 [doi]
- A Semantic Search Engine in the CloudFlora Amato, Francesco Gargiulo, Antonino Mazzeo, Sara Romano, Carlo Sansone. 436-441 [doi]
- A System for Semantic-Based Access ControlFlora Amato, Nicola Mazzocca, Giuseppe De Pietro, Massimo Esposito. 442-446 [doi]
- Fuzzy Closed Concept for the Correction of Errors in the Dematerialization ProcessMohammed Moujabbir, Mohammed Ramdani. 447-452 [doi]
- A Study on Metadata Tagging for Tracking Original File Information within the CloudRichard Crossley, Eleana Asimakopoulou, Stelios Sotiriadis, Nik Bessis. 453-456 [doi]
- Evaluating the Use of Automation in the Virtual Datacentre for Improved EfficiencyDon-Anthony Dasilva, Stelios Sotiriadis, Richard Hill, Nick Antonopoulos, Nik Bessis. 457-460 [doi]
- Addressing Complexity in DNS Security: A Case for Improved Security Status Indication Based on a Trust ModelMark Rivis, Eleana Asimakopoulou, Stelios Sotiriadis, Nik Bessis. 461-465 [doi]
- Optimizing Voice over Multi-protocol Label Switching (VoMPLS)Amer Alkayyal, Stelios Sotiriadis, Eleana Asimakopoulou, Nik Bessis. 466-469 [doi]
- Algorithm Parallelization Using Software Design Patterns, an Embedded Case Study ApproachRobbie Vincke, Sille Van Landschoot, Piet Cordemans, Joan Peuteman, Eric Steegmans, Jeroen Boydens. 470-473 [doi]
- Benchmarking of PCIe-Performance in MicroTCA-EquipmentKoen Lostrie, Paul De Meulenaere, Marijn Temmerman, Nick Van Remortel, W. P. Beaumont. 474-478 [doi]
- An Initial Investigation of a Multi-layered Approach for Optimizing and Parallelizing Real-Time Media and Audio ApplicationsSiegfried Mercelis, Guido Van den Berghe, Serge Demeyer, Marijn Temmerman. 479-484 [doi]
- Model Driven Engineering for Building Automation, a Research AgendaPhilip Luyckx, Peter Hellinckx, Hans Vangheluwe. 485-491 [doi]
- Taxonomy of Real-Time HypervisorsNills Franssens, Jan Broeckhove, Peter Hellinckx. 492-496 [doi]
- Dynamic and Hierarchical Load-Balancing Techniques Applied to Parallel Branch-and-Bound MethodsJuan F. R. Herrera, Leocadio G. Casado, Eligius M. T. Hendrix, Remigijus Paulavicius, Julius Zilinskas. 497-502 [doi]
- Scalable Distributed Branch and Bound for the Permutation Flow Shop ProblemSamia Kouki, Mohamed Jemni, Talel Ladhari. 503-508 [doi]
- Parallel Branch and Bound for Multidimensional Scaling with L1 Distances Formulated as Quadratic Programming with Complementarity ConstraintsNerijus Galiauskas, Julius ilinskas. 509-512 [doi]
- On Computational Aspects of a Regular n-Simplex BisectionGuillermo Aparicio, Leocadio G. Casado, Eligius M. T. Hendrix, Inmaculada García, Boglárka Tóth. 513-518 [doi]
- Solving a Continuous (1 I 1)-Centroid Problem with Endogenous Demand: High Performance ApproachesA. G. Arrondo, Juani L. Redondo, J. Fernández, P. P. Ortigosa. 519-524 [doi]
- A Parallel DISIMPL for Pile Placement Optimization in Grillage-Type FoundationsRemigijus Paulavicius, Julius Zilinskas, Juan F. R. Herrera, Leocadio G. Casado. 525-530 [doi]
- Electrical Energy Aware Parallel Computing with MPI and CUDAAleksandr Igumenov, Julius ilinskas. 531-536 [doi]
- Communications-Aware Process Placement Taking into Account Symmetries of TopologyJulius ilinskas. 537-542 [doi]
- Content-Based Switching Network: A Flexible Architecture for Future Content Distribution Optical NetworksChristophe Michard, Yosuke Tanigawa, Hideki Tode. 543-548 [doi]
- High-Level GPU Multi-purpose ProfilerMarian-Cristian Rotariu, Elena Apostol. 549-553 [doi]
- Secure Access to Cloud ResourcesConstantin Musca, Ana Ion, Catalin Leordeanu, Valentin Cristea. 554-558 [doi]
- A Code-Based Multiple Grade Proxy Signature SchemeHongbin Wang, Yan Ren. 559-562 [doi]
- Experimental Study on Camera Setting for Tele-communication Environment with Tiled Display WallYasuo Ebara. 563-568 [doi]
- Implementation of Sightseeing Information Contents for Universal Multimedia AccessKaoru Sugita, Masao Yokota. 569-573 [doi]
- Construction of Safety Confirmation System in the Disaster Countermeasures HeadquartersTomoyuki Ishida, Akira Sakuraba, Kaoru Sugita, Noriki Uchida, Yoshitaka Shibata. 574-577 [doi]
- Proposal of Business Intelligence System by Overlay Cloud Computing ArchitectureNoriki Uchida, Kazuo Takahata, Yoshitaka Shibata. 578-581 [doi]
- Multi-objective Security Driven Job Scheduling for Computational Cloud SystemsJakub Gasior, Franciszek Seredynski. 582-587 [doi]
- Large-Scale Home Care Crew Scheduling with a Parallel Evolutionary AlgorithmFrancisco Luna, Alejandro Cervantes, Pedro Isasi. 588-593 [doi]
- A Parallel Hybrid Evolutionary Algorithm for the Optimization of Broker Virtual Machines Subletting in Cloud SystemsSantiago Iturriaga, Sergio Nesmachnow, Bernabé Dorronsoro Díaz, El-Ghazali Talbi, Pascal Bouvry. 594-599 [doi]
- Solving a Real-World Structural Optimization Problem with a Distributed SMS-EMOA AlgorithmFrancisco Luna, Gustavo R. Zavala, Antonio J. Nebro, Juan José Durillo, Carlos A. Coello Coello. 600-605 [doi]
- Distributed Evolutionary Algorithms in Heterogeneous EnvironmentsCarolina Salto, Francisco Luna, Enrique Alba. 606-611 [doi]
- Programming for GPUs: The Directive-Based ApproachLucas Grillo, Francisco de Sande, Juan J. Fumero, Ruymán Reyes. 612-617 [doi]
- Task Scheduling in Heterogeneous Computing Systems Using a MicroGAJohnatan E. Pecero, Pascal Bouvry, Héctor Joaquin Fraire Huacuja, Jesús David Terán Villanueva, M. A. Ramiro Zuniga, Claudia Gómez Santillán. 618-623 [doi]
- A High Throughput Complex Event Detection Technique with Bulk EvaluationNaotaka Nishimura, Hideyuki Kawashima, Hiroyuki Kitagawa. 624-629 [doi]
- SOM-Based Visualization for Classifying Large-Scale Sensing Data of MoonquakesYasumichi Goto, Ryuhei Yamada, Yukio Yamamoto, Shohei Yokoyama, Hiroshi Ishikawa. 630-634 [doi]
- Evaluation of Parallel Window-Join Algorithms for Reduction of Processing DelayYousuke Watanabe, Haruo Yokota. 635-640 [doi]
- Multicast Distribution System with Functions of Time-Shift and Loss-Recovery Based on In-Network Caching and OpenFlow ControlRyo Kawasumi, Yusuke Hirota, Koso Murakami, Hideki Tode. 641-646 [doi]
- A P2P Streaming System for Sensor Data Stream Based on Load Estimation from Collection CyclesYoshimasa Ishi, Tomoya Kawakami, Tomoki Yoshihisa, Yuuichi Teranishi. 647-652 [doi]
- Evaluation of Division Based Broadcasting System Considering Receiving OpportunityYusuke Gotoh, Akihiro Kimura, Hideo Taniguchi. 653-658 [doi]
- Short Segment Cumulative Modeling Algorithm for Markovian Model on Packet LossIslam Amro. 659-664 [doi]
- The Dependence of the Period and Range of the Oscillations on the Elevator Deflection for the ADMIRE Simplified ModelAlexandra Emilia Fortis, Stefan Balint, Teodor Florin Fortis. 665-670 [doi]
- A Model-Driven Engineering Platform for Wireless Sensor NetworksPruet Boonma, Yuthapong Somchit, Juggapong Natwichai. 671-676 [doi]
- Publisher/Subscriber Implementation in Cloud EnvironmentSebasijan Stoja, Srdan Vukmirovic Bojan Jelacic. 677-682 [doi]
- Linear Complexity and High Scalability of a Parallel Monte Carlo Simulation MethodGuillermo Amaro-Rico, Salvador Botello Rionda, Mauricio Carrillo-Tripp. 683-687 [doi]
- Local Ecosystem versus Digital Ecosystem: A Different Purpose Than Multiple Innovation PlatformsVeronique Misseri. 688-694 [doi]
- Management of Twitter Resources in a Semantic Organizational MemoryCristian Lai, Claude Moulin, Marie-Hélène Abel. 695-700 [doi]
- Exploring an Organizational Social Network through Its Digital Ecosystem ActivitiesÉtienne Deparis, Marie-Hélène Abel, Gaëlle Lortal, Juliette Mattioli. 701-706 [doi]
- Synchronous Remote Collaboration Using Multi-touch DevicesClaude Moulin, Kenji Sugawara, Shigeru Fujita. 707-712 [doi]
- Towards a Knowledge (Experience)-Based Recommender System for Crisis ManagementElsa Negre. 713-718 [doi]
- Using Ontologies for Monitoring Knowledge Evolution in Communities of PracticeJean-Paul A. Barthès, Gilson Yukio Sato. 719-722 [doi]
- A Semantic Social Software for Mobile EnvironmentGhada Ben Nejma, Philippe Roose, Marc Dalmau, Jérôme Gensel, Mohamed Amine Ghorbali. 723-727 [doi]