Abstract is missing.
- Towards Virtual Machine Migration in Fog ComputingLuiz Fernando Bittencourt, Marcio Moraes Lopes, Ioan Petri, Omer F. Rana. 1-8 [doi]
- A MapReduce Approach for Processing Student Data Activity in a Peer-to-Peer Networked SettingJorge Miguel, Santi Caballé, Fatos Xhafa. 9-16 [doi]
- A Variable Payout Information Security Financial Instrument and Trading Mechanism to Address Information Security RiskPankaj Pandey, Steven De Haes. 17-25 [doi]
- Live Data Replication Approach from Relational Tables to Schema-Free Collections Using Stream Processing FrameworkKun Ma, Bo Yang 0001. 26-31 [doi]
- Design Patterns in Cloud ComputingViliam Malcher. 32-35 [doi]
- A Public Cloud Storage Auditing Scheme with Lightweight Authenticator GenerationWenting Shen, Jia Yu, Rong Hao, Xu an Wang. 36-39 [doi]
- Virtual Machine Allocation in P2P-cloud Live Video StramingMehdi Seydali Seyfabad, Behzad Akbari. 40-45 [doi]
- Network Traffic Load Balancing in Hierarchical Peer-to-Peer SystemsGianluca Moro, Tommaso Pirini, Claudio Sartori. 46-53 [doi]
- Combining eLearning and P2P File-Sharing TechnologiesRajendra G. Singh, Margaret A. Bernard. 54-63 [doi]
- Towards Adaptive Peer Assessment for MOOCsNicola Capuano, Santi Caballé. 64-69 [doi]
- Towards a Notification System for Mobile Devices to Support Collaborative LearningSanti Caballé, Fatos Xhafa. 70-76 [doi]
- Towards Efficient and Effective Distributed Discovery of SWs in P2P Overlay NetworksAdel Boukhadra, Karima Benatchba, Amar Balla. 77-84 [doi]
- A Parallel Algorithm for the Prediction of Protein Binding SitesMaria Mirto, Giovanni Aloisio. 85-91 [doi]
- A Parallel Algorithm with the Search Space Partition for the Pickup and Delivery with Time WindowsJakub Nalepa, Miroslaw Blocho. 92-99 [doi]
- Development of the Big Data Management System on National Virtual Power PlantMijeom Kim, Jungin Choi, Jaeweon Yoon. 100-107 [doi]
- Text Mining Terms and Condition to Provide a Confidence Factor for the Use of Cloud ServicesMak Sharma, Philip Davies, David Newell, Philip Moore, Chander Sidhu. 108-115 [doi]
- Uploading Deferrable Big Data to the Cloud by Improved Dynamic Self-Adaption AlgorithmBaojiang Cui, Peilin Shi, Jun Yang, Yongle Hao. 116-120 [doi]
- Two-Tier Model for Supporting Network Functions Virtualization with FoCESShicong Ma, Baosheng Wang, Xianming Gao, Xiaozhe Zhang. 121-126 [doi]
- Towards Reliable Mobile Cloud ComputingKhaled O. Darwish, Islam El Madahh, Hoda K. Mohamed, Hadia El Hennawy. 127-133 [doi]
- A Performance Prediction Model for Google App EngineSachi Nishida, Yoshiyuki Shinkawa. 134-140 [doi]
- P2P-based Mobile Social NetworksSung-woo Cho. 141-145 [doi]
- Research and Implementation on Visual Analysis of Geological VolumeKunliang Liu, Dakun Zhang, Xu an Wang, Guozhi Song, Shuxia Ren. 146-150 [doi]
- Research on War Strategy Games on Mobile Phone Based on Cocos2d-JSGuozhi Song, Shuxia Ren, Dakun Zhang, Kunliang Liu, Yumeng Sun, Xu an Wang. 151-155 [doi]
- Trade-Off between QoE and Operational Cost in Edge Resource Supported Video StreamingValentin Burger, George Darzanos, Ioanna Papafili, Michael Seufert. 156-161 [doi]
- A Virtual Market for Energy Negotiation and BrokeringAlba Amato, Beniamino Di Martino, Marco Scialdone, Salvatore Venticinque. 162-168 [doi]
- Experimental Evaluation of Memory Optimizations on an Embedded GPU PlatformInnocenzo Mungiello. 169-174 [doi]
- Improving Rank of a Website in Search Results - An Experimental ApproachMichal Gregus, Jakub Zilincan. 175-182 [doi]
- Practical Implementation of Private Cloud Based on Open Source ownCloud for Small Teams - Case StudyMichal Gregus, Vincent Karovic. 183-187 [doi]
- Enhanced Reliability Scheduling Method for the Data in Register FileQingyu Chen, Longsheng Wu, Li Li, Xuhan Ma, Xu an Wang. 188-193 [doi]
- Software Data Plane and Flow Switching Plane Separation in Next-Generation Router ArchitectureXianming Gao, Baosheng Wang, Xiaozhe Zhang, Xu'an Wang. 194-199 [doi]
- Performance Evaluation of a MapReduce Hadoop-Based Implementation for Processing Large Virtual Campus Log FilesFatos Xhafa, Daniel Garcia, Daniel Ramirez, Santi Caballé. 200-206 [doi]
- A Hierarchical Model for the Analysis of Efficiency and Speed-Up of Multi-core Cluster-ComputersHeinz Kredel, Hans-Günther Kruse, Sabine Richling. 207-215 [doi]
- A New Parallel Symmetric Tridiagonal Eigensolver Based on Bisection and Inverse Iteration Algorithms for Shared-Memory Multi-core ProcessorsHiroyuki Ishigami, Kinji Kimura, Yoshimasa Nakamura. 216-223 [doi]
- Managing Control the Water Treatment Using the Electro-Flotation Technology That is Based on the Pervasive Computing with the Internet ConnectionAnna Antonyova, Peter Antony. 224-230 [doi]
- Efficient Numerical Simulation for the Quasilinear Elliptic ProblemsQingli Zhao, Jin Li, Juxin Chen, Xu an Wang. 231-235 [doi]
- Parallel Query on the In-Memory Database in a CUDA PlatformYin-Fu Huang, Wei-Cheng Chen. 236-243 [doi]
- Analysis of Computational Models and Application Characteristics Suitable for Reconfigurable FPGAsDarshika G. Perera, Kin Fun Li. 244-247 [doi]
- UAV-based Aerial Monitoring: A Performance Evaluation of a Self-Organising Flocking AlgorithmMassimiliano De Benedetti, Fabio D'Urso, Fabrizio Messina, Giuseppe Pappalardo, Corrado Santoro. 248-255 [doi]
- Implementation of an FFT Hardware Accelerator for Security ApplicationsDomenico Argenziano. 256-259 [doi]
- Anonymous Communication in the Browser via Onion-RoutingFlorian Burgstaller, Andreas Derler, Stefan Kern, Gabriel Schanner, Andreas Reiter. 260-267 [doi]
- Profile-Based Viable Service Level Agreement (SLA) Violation Prediction Model in the CloudWalayat Hussain, Farookh Khadeer Hussain, Omar Hussain, Elizabeth Chang. 268-272 [doi]
- Face Detection Based on Multi-parts and Multi-featuresHua-Chun Yang. 273-277 [doi]
- Basic Internet Foundation and Cloud ComputingGeorge Suciu, Cristina Butca, Victor Suciu, Alin Geaba, Alexandru Stancu, Stefan Arseni. 278-284 [doi]
- Filters for Wi-Fi Generated Crowd Movement DataCristian Chilipirea, Andreea-Cristina Petre, Ciprian Dobre, Maarten van Steen. 285-290 [doi]
- SPIDER: A Bio-inspired Structured Peer-to-Peer Overlay for Data DisseminationBogdan Mocanu, Florin Pop, Alexandra Mihaita Mocanu, Ciprian Dobre, Valentin Cristea. 291-295 [doi]
- Real-Time Alert Service for Cyber-Infrastructure EnvironmentsIonut-Gabriel Raducu, Valentina-Camelia Bojan, Florin Pop, Mariana Mocanu, Valentin Cristea. 296-303 [doi]
- Analysis of Security Approaches for Vehicular Ad-Hoc NetworksAlexandra Mihaita, Ciprian Dobre, Bogdan Mocanu, Florin Pop, Valentin Cristea. 304-309 [doi]
- Proximity Graphs for Crowd Movement SensorsCristian Chilipirea, Andreea-Cristina Petre, Ciprian Dobre, Maarten van Steen. 310-314 [doi]
- Accelerating Physical Simulations from a Multicomponent Lattice Boltzmann Method on a Single-Node Multi-GPU ArchitectureJulien Duchateau, François Rousselle, Nicolas Maquignon, Gilles Roussel, Christophe Renaud. 315-322 [doi]
- A Study of Memory Consumption and Execution Performance of the cuFFT LibraryJosé Luis Jodra, Ibai Gurrutxaga, Javier Muguerza. 323-327 [doi]
- Efficient Lava Flows Simulations with OpenCL: A Preliminary Application for Civil Defence PurposesMaurizio Macri, Alessio De Rango, Davide Spataro, Donato D'Ambrosio, William Spataro. 328-335 [doi]
- Performance Increase by Software Decomposition with Characteristics of Combinational LogicNils Potthoff, Carsten Gremzow, Christoph Brandau, Dietmar Tutsch. 336-343 [doi]
- A4SDN - Adaptive Alienated Ant Algorithm for Software-Defined NetworkingAntonella Di Stefano, Giovanni Cammarata, Giovanni Morana, Daniele Zito. 344-350 [doi]
- Format-Independent Protection of DNA Microarray ImagesRaffaele Pizzolante, Arcangelo Castiglione, Bruno Carpentieri, Alfredo De Santis, Francesco Palmieri, Aniello Castiglione. 351-357 [doi]
- Learning from Annotated Video: An Initial Study Based on Oyama Karate Tournament RecordingsTomasz Hachaj, Marek R. Ogiela, Katarzyna Koptyra. 358-362 [doi]
- Usability of the Fuzzy Vault Scheme Applied to Predetermined Palm-Based Gestures as a Secure Behavioral LockMarcin Piekarczyk, Marek R. Ogiela. 363-367 [doi]
- Bio-inspired Algorithms in Data Management ProcessesLidia Ogiela, Marek R. Ogiela. 368-371 [doi]
- Machine Cognition and the Integration of Emotional Response in the Monitoring of Mental DisordersPhilip Moore, Hai Van Pham, Bin Hu, Hong Liu, Tarik Qassem. 372-379 [doi]
- Statistical Challenges for Quality Assessment of Smart Medical DevicesJan Sliwa. 380-385 [doi]
- Interpretation of New ECG Signal Shapes for Diagnostics of Cardio-Vascular SystemJiri Bila, Martina Mironovova. 386-391 [doi]
- Multiport Single Mode Fiber Coupler Technique for Mechanical Microactuator to Damped Blood FlowToto Saktioto, Dedi Irawan, Sofia Anita, Jalil Ali. 392-397 [doi]
- Fast and Secure Elliptic Curve Scalar Multiplication Algorithm Based on a Kind of Deformed Fibonacci-Type SeriesShuanggen Liu, Guanglu Qi, Xu an Wang. 398-402 [doi]
- Analyze Network Protocol's Hidden BehaviorYanjing Hu, Liaojun Pang, Qingqi Pei, Xu an Wang. 403-406 [doi]
- Improvement of GGH Multilinear MapChunsheng Gu, Zhimin Yu, Zhengjun Jing, Peizhong Shi, Jin Qian. 407-411 [doi]
- Full Secure Identity-Based Encryption Scheme over Lattices in the Standard ModelJizhong Wang, Chunxiao Wang. 412-415 [doi]
- Study on Security Protocol Analysis and Design Technology for RFID SystemPengpeng Yang, Baojiang Cui, Ziyue Wang, Xiaobing Liang, Yilun Fu. 416-419 [doi]
- Performance Analysis of an Improved Signal Detection Based on SDQR Decomposition AlgorithmXiaoyan Deng, Xiaohui Song, Yunlong Ge. 420-423 [doi]
- Another Look at Ciphertext Updating Algorithms for Cloud StorageXu an Wang, Jianfeng Ma, Fatos Xhafa. 424-429 [doi]
- Dynamic Binary Instrumentation Based Defense Solution against Virtual Function Table Hijacking Attacks at C++ Binary ProgramsYong Wang, Ming Li, Hailin Yan, Zhenyan Liu, Jingfeng Xue, Changzhen Hu. 430-434 [doi]
- Efficient Cryptology-Specific Instructions Generation with Algebra PrimitivesLei Liu, Guijie Han, Zixin Zhou, Sikun Li. 435-439 [doi]
- Quantum Secure Direct Communication Protocol Based on Cluster Entangled StateHuang Hong-Mei. 440-443 [doi]
- Outsourcing Decryption of Attribute Based Encryption with Energy EfficiencyXu an Wang, Jianfeng Ma, Fatos Xhafa. 444-448 [doi]
- Fully Secure Hierarchical Inner Product Encryption for Privacy Preserving Keyword Searching in CloudLeyou Zhang, Zhuanning Wang, Yi Mu, Yupu Hu. 449-453 [doi]
- Joint DWT and Integral Imaging for a Three-Dimensional Watermarking SystemYiqun Liu, Jianqi Zhang, Peng Luo, Xiaorui Wang. 454-457 [doi]
- Method for Eliminating the Black Zone of Integral ImagingJianlei Zhang, Yiqun Liu, Xiaorui Wang. 458-461 [doi]
- An Efficient VoIP Steganography Based on Random Binary MatrixJie Qin, Hui Tian, Yongfeng Huang, Jin Liu, Yonghong Chen, Tian Wang, Yiqiao Cai, Xu an Wang. 462-465 [doi]
- Exposing Blurred Image Forgeries through Blind Image RestorationFeng Zeng, Wei Wang, Min Tang, Zhanghua Cao. 466-469 [doi]
- Identity-Based One Round Key Agreement Protocol without Bilinear PairingsWenhao Liu, Shengbao Wang, Xiao Tan, Qi Xie, Qizhen Wang. 470-473 [doi]
- Efficient Numerical Simulation for the Nonlinear Laplacian ProblemQingli Zhao, Shengxiang Xia, Zongcheng Li. 474-477 [doi]
- Related-Item Display Support Based on Customer Queries in a StoreMinami Suzuki, Shu Li, Toshiya Iiba, Kosuke Takano. 478-483 [doi]
- Simulation and Re-engineering of Industrial Services: A Case Study from an Industrial Equipment ManufacturerMarcel Dix, Lennart Merkert, Zied M. Ouertani, Markus Aleksy, Reinhard Bauer. 484-489 [doi]
- C2C Web Transaction ReliabilityGulnar Ali, Kin Fun Li. 490-493 [doi]
- The Entity-Attribute-Value Data Model in a Multi-tenant Shared Data EnvironmentTorben Jastrow, Thomas Preuss. 494-497 [doi]
- A Cloud Federation ArchitectureGianluca Zangara, Diego Terrana, Pietro Paolo Corso, Marco Ughetti, Guido Montalbano. 498-503 [doi]
- A Hybrid Model for Ranking Cloud ServicesMassimiliano De Benedetti, Fabio D'Urso, Fabrizio Messina, Giuseppe Pappalardo, Corrado Santoro. 504-509 [doi]
- The HtComp Research Project: An OverviewAlessandro Cilardo. 510-514 [doi]
- An Architecture to Process Massive Vehicular Traffic DataSimon Kwoczek, Sergio Di Martino, Thomas Rustemeyer, Wolfgang Nejdl. 515-520 [doi]
- A Cloud Based Architecture for Massive Sensor Data Analysis in Health Monitoring SystemsMario Barbareschi, Sara Romano, Antonino Mazzeo. 521-526 [doi]
- Model-Based Water Quality Assurance in Ground and Surface Provisioning SystemsUgo Gentile, Stefano Marrone, Francesco De Paola, Roberto Nardone, Nicola Mazzocca, Maurizio Giugni. 527-532 [doi]
- An Associative Engines Based Approach Supporting Collaborative Analytics in the Internet of Cultural ThingsAngelo Chianese, Paolo Benedusi, Fiammetta Marulli, Francesco Piccialli. 533-538 [doi]
- A Cultural Heritage Case Study of Visitor Experiences Shared on a Social NetworkSalvatore Cuomo, Pasquale De Michele, Ardelio Galletti, Francesco Piccialli. 539-544 [doi]
- User-Driven View Management for Wearable Augmented Reality Systems in the Cultural Heritage DomainGiuseppe Caggianese, Luigi Gallo, Pietro Neroni. 545-550 [doi]
- Extracting Compact Sets of Features for Question Classification in Cognitive Systems: A Comparative StudyMarco Pota, Angela Fuggi, Massimo Esposito, Giuseppe De Pietro. 551-556 [doi]
- A GPU Algorithm in a Distributed Computing System for 3D MRI DenoisingSalvatore Cuomo, Ardelio Galletti, Livia Marcellino. 557-562 [doi]
- Authenticating IoT Devices with Physically Unclonable Functions ModelsMario Barbareschi, Pierpaolo Bagnasco, Antonino Mazzeo. 563-567 [doi]
- An Agent-Based Model for Autonomous Planning in Distrubuted Critical SystemsFlora Amato, Francesco Moscato, Dario Pianese. 568-573 [doi]
- A Research Project on FPGA-accelerated Cryptographic ComputingDomenico Argenziano. 574-577 [doi]
- A Distributed Framework for Event Detection in Video Surveillance ContextFabio Persia, Daniela D'Auria. 578-583 [doi]
- Analysis of Techniques for Visualizing Security Risks and ThreatsChinyelu Philomena Udeagwu, Stelios Sotiriadis, Eleana Asimakopoulou, Nik Bessis, Marcello Trovati. 584-590 [doi]
- Introducing Auto Generated Certificates to Rank Wireless Home Network SecurityMarko Gaj, Nik Bessis, Lu Liu. 591-596 [doi]
- A Non-genuine Message Detection Method Based on Unstructured DatasetsMarcello Trovati, Richard Hill, Nik Bessis. 597-600 [doi]
- Designing a Subscription Service for Earthquake Big Data Analysis from Multiple SourcesOladotun Omosebi, Stelios Sotiriadis, Eleana Asimakopoulou, Nik Bessis, Marcello Trovati, Richard Hill. 601-604 [doi]
- Soft Error Protection in Safety Critical Embedded Applications: An OverviewJens Vankeirsbilck, Hans Hallez, Jeroen Boydens. 605-610 [doi]
- Hierarchical Real-Time Multi-core Scheduling through Virtualization: A SurveyYorick De Bock, Jan Broeckhove, Peter Hellinckx. 611-616 [doi]
- Managing Heterogeneity in Model-Based Systems Engineering of Cyber-Physical SystemsBert Van Acker, Joachim Denil, Hans Vangheluwe, Paul De Meulenaere. 617-622 [doi]
- DASH7 Alliance Protocol in Monitoring ApplicationsGlenn Ergeerts, Maciej Nikodem, Dragan Subotic, Tomasz Surmacz, Bartosz Wojciechowski, Paul De Meulenaere, Maarten Weyn. 623-628 [doi]
- Large Scale Distributed Localization Based on RSS and Mass-Spring ModelBart Praats, Rafael Berkvens, Glenn Ergeerts, Maarten Weyn. 629-634 [doi]
- A Three-Dimensional Optical Image Cryptosystem Based on Integral ImagingYiqun Liu. 635-638 [doi]
- A Real-Time Video Information Hiding Method Based on CAVLC EncodingYixiao Sun, Renjun Zhan, Gengrui Wu, Yang Wu. 639-644 [doi]
- Proposal of Information Acquisition Method Utilizing CCN in a Time of Large Scale Natural DisasterMasaya Yamazaki, Kazuhiro Takahagi, Tomoyuki Ishida, Kaoru Sugita, Noriki Uchida, Yoshitaka Shibata. 645-650 [doi]
- A Preliminary Evaluation of Web Based Communication Services for Reducing Power ConsumptionKen Nishimura, Kaoru Sugita. 651-654 [doi]
- Evaluation of Power Consumption for Multimedia Contents Considering Difference in Computer Skill and DevicesKaoru Sugita, Ken Nishimura, Masao Yokota. 655-660 [doi]
- Fundamental Study on Simultaneous Display of Enormous Multimedia Contents in Ultra-Resolution Display EnvironmentYasuo Ebara. 661-664 [doi]
- A Business Analysis of Cloud Computing: Data Security and Contract Lock-In IssuesJustice Opara-Martins, Reza Sahandi, Feng Tian. 665-670 [doi]
- Security in Cloud-Based Cyber-Physical SystemsJuha Puttonen, Samuel Olaiya Afolaranmi, Luis E. Gonzalez Moctezuma, Andrei Lobov, José L. Martínez Lastra. 671-676 [doi]
- DoS Protection in the Cloud through the SPECS ServicesValentina Casola, Alessandra De Benedictis, Massimiliano Rak, Umberto Villano. 677-682 [doi]
- Sampling UAV Most Informative Diagnostic SignalsRoberto Pietrantuono, Massimo Ficco, Stefano Russo, Gabriella Gigante. 683-688 [doi]
- On the Feasibility of Moderating a Peer-to-Peer CDN System: A Proof-of-Concept ImplementationMauro Migliardi, Alessio Merlo, Andrea Passaglia. 689-694 [doi]
- The OFIDIA Fire Danger Rating SystemMaria Mirto, A. Mariello, A. Nuzzo, M. Mancini, Alessandro Raolil, O. Marra, Sandro Fiore, C. Sirca, M. Salis, V. Bacciu, D. Spano, Giovanni Aloisio. 695-700 [doi]
- An Artificial Intelligence-Based Trust Model for Pervasive ComputingGianni D'Angelo, Salvatore Rampone, Francesco Palmieri. 701-706 [doi]
- Reversible Copyright Protection for DNA Microarray ImagesRaffaele Pizzolante, Arcangelo Castiglione, Bruno Carpentieri, Alfredo De Santis, Aniello Castiglione. 707-712 [doi]
- Direct Debit Transactions: A Comprehensive Analysis of Emerging Attack PatternsLuigi Coppolino, Salvatore D'Antonio, Luigi Romano, Gaetano Papale, Luigi Sgaglione, Ferdinando Campanile. 713-717 [doi]
- Lockup: A Software Tool to Harden iOS by Disabling Default Lockdown ServicesLuis Gómez-Miralles, Joan Arnedo-Moreno. 718-723 [doi]
- Adapting an Ensemble of One-Class Classifiers for a Web-Layer Anomaly Detection SystemRafal Kozik, Michal Choras. 724-729 [doi]
- A Scheduling Method to Reduce Waiting Time for Close-Range DeliveryYusuke Gotoh, Tomoki Yoshihisa. 730-735 [doi]
- A Radio Interference Aware Dynamic Channel Utilization Method on Software Defined WMNYuzo Taenaka, Kazuya Tsukamoto. 736-741 [doi]
- A P2P Sensor Data Stream Delivery System to Accommodate Heterogeneous Cycles Using Skip GraphsTomoya Kawakami, Yoshimasa Ishi, Tomoki Yoshihisa, Yuuichi Teranishi. 742-747 [doi]
- A Sensor Data Stream Delivery System with Different Delivery Cycles for IoT EnvironmentsTomoki Yoshihisa, Yoshimasa Ishi, Kodai Mako, Tomoya Kawakami, Yuuichi Teranishi. 748-753 [doi]
- Dynamic Modification of Continuous Queries by Using RDF Metadata of Information SourcesYousuke Watanabe, Haruo Yokota. 754-759 [doi]
- A Watermark Algorithm for Image Content Authentication and Correcting Errors in Terms of PixelsYixiao Sun, Renjun Zhan, Zhexin Han, Qixiang Lin. 760-765 [doi]
- Cascade Face Detection Based on Histograms of Oriented Gradients and Support Vector MachineHua-Chun Yang, Xu an Wang. 766-770 [doi]
- Extensional Schemes of Multipartite Non-interactive Key Exchange from Multilinear MapsHuiwen Jia, Yupu Hu, Xu an Wang, Zheliang Liu, Wei Xiong. 771-774 [doi]
- Survival Continuity on Intrusion Detection System of Wireless Sensor NetworksZixin Zhou, Lei Liu, Guijie Han. 775-779 [doi]
- An Additively Homomorphic Encryption from Ideal LatticesHu Chen, Yupu Hu, Huiwen Jia. 780-784 [doi]
- SPA Resistant Scalar Multiplication Based on Addition and Tripling Indistinguishable on Elliptic Curve CryptosystemShuanggen Liu, Huatong Yao, Xu an Wang. 785-790 [doi]
- Instruction Clustering Analysis for Network Protocol's Abnormal BehaviorYanjing Hu, Liaojun Pang, Qingqi Pei, Xu an Wang. 791-794 [doi]
- Research on Web Intelligent Robot Based on Virtual RealityShuxia Ren, Dakun Zhang, Kunliang Liu, Tianyu Lu, Guozhi Song. 795-799 [doi]
- Deployment Method of Virtual Machine Cluster Based on Energy Minimization and Graph Cuts TheoryZhiping Peng, Bo Xu, Delong Cui, Weiwei Lin, Xuan Wang. 800-803 [doi]
- A Content-Based Adaptive Event Routing AlgorithmLiming Zheng, Xiaodong Li. 804-809 [doi]
- Research on Identification and Addressing of the Internet of ThingsRui Ma, Yue Liu, Chun Shan, Xiaolin Zhao, Xu an Wang. 810-814 [doi]
- An Authentication Key Agreement Scheme for Heterogeneous Sensor Network Based on Improved Counting Bloom FilterJiuru Wang, Haifeng Wang, Xu an Wang, Yunpeng Cao. 815-820 [doi]
- Replacement Strategy of Web Cache Based on Data MiningJing Zhang. 821-823 [doi]
- FPGA-based Acceleration of Deep Neural Networks Using High Level MethodLei Liu, Jianlu Luo, Xiaoyan Deng, Sikun Li. 824-827 [doi]
- DOA Estimation Method Based on Neural NetworkZhang Ping. 828-831 [doi]
- On Cloud Computing Middleware ArchitectureJihua Yang, Longjun Zhang, Xu an Wang. 832-835 [doi]
- A Novel Privacy Preserving Keyword Search Scheme over Encrypted Cloud DataXiuxiu Jiang, Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao. 836-839 [doi]
- Analysis and Improvement of a Verifiable Phrase Search over Encrypted Data in a Single PhraseFanyu Kong, Jie Wang, Jia Yu, Xuan Wang. 840-843 [doi]
- Proxy Re-signature Supporting Conditional DelegationXu an Wang. 844-848 [doi]
- Design and Analysis of the Secure Scheme for Quantum Positioning Based on Entangled Photon PairHong-Mei Huang, Lu-ping Xu. 849-852 [doi]
- Lattice-Based Dynamical and Anonymous Broadcast Encryption SchemeFenghe Wang, Xuan Wang, Chunxiao Wang. 853-858 [doi]
- Ring Signature Scheme from Multilinear Maps in the Standard ModelXiangsong Zhang, Zhenhua Liu, Xu'an Wang. 859-864 [doi]
- A Tentative Study on MOOC-based Strategies of College Stuents' Self-Learning AbilityLiu Fang. 865-867 [doi]
- A Zero-Knowledge Identification Scheme Based on Matrix Power ProblemHuawei Huang, Lunzhi Deng, Yunyun Qu, Chunhua Li. 868-871 [doi]