Abstract is missing.
- A Configurable Shared Scratchpad Memory for GPU-like ProcessorsAlessandro Cilardo, Mirko Gagliardi, Ciro Donnarumma. 3-14 [doi]
- Research of Double Threshold Collaborative Spectrum Sensing Based on OFDMRuilian Tan. 15-23 [doi]
- Research on particle swarm optimization of variable parameterZhe Li, Ruilian Tan, Baoxiang Ren. 25-33 [doi]
- An Access Control Architecture for Protecting Health Information SystemsAngelo Esposito, Mario Sicuranza, Mario Ciampi. 35-47 [doi]
- Intelligent Management System for Small Gardens Based on Wireless Sensor NetworkXiao-hui Zeng, Man-sheng Long, Qing Liu, Xu an Wang, Wen-lang Luo. 49-56 [doi]
- An AHP Based Study of Coal-Mine Zero Harm Safety Culture EvaluationHongxia Li, Hongxi Di, Xu an Wang. 57-68 [doi]
- Analysis of Interval-Valued Reliability of Multi-State System in Consideration of Epistemic UncertaintyGang Pan, Chaoxun Shang, Yuying Liang, Jingyan Cai, Danyang Li. 69-80 [doi]
- Toward Construction of Efficient Privacy Preserving Reusable Garbled CircuitsXu an Wang. 81-92 [doi]
- A Heuristically Optimized Partitioning Strategy on Elias-Fano IndexXingshen Song, Kun Jiang, Yuexiang Yang. 93-104 [doi]
- Smart Underground: Enhancing Cultural Heritage Information Access and Management through Proximity-Based InteractionGiuseppe Caggianese, Luigi Gallo. 105-114 [doi]
- Ciphertext-Policy Attribute Based Encryption with Large Attribute UniverseSiyu Xiao, Aijun Ge, Fushan Wei, Chuangui Ma. 115-122 [doi]
- Asymmetric Searchable Encryption from Inner Product EncryptionSiyu Xiao, Aijun Ge, Jie Zhang, Chuangui Ma, Xu'an Wang. 123-132 [doi]
- Design of a Reconfigurable Parallel Nonlinear Boolean Function Targeted at Stream CipherSu Yang. 133-143 [doi]
- Temporally Adaptive Co-operation SchemesJakub Nalepa, Miroslaw Blocho. 145-156 [doi]
- Discovering Syndrome Regularities in Traditional Chinese Medicine Clinical by Topic ModelJialin Ma, Zhijian Wang. 157-162 [doi]
- Fuzzy on FHIR: a Decision Support service for Healthcare ApplicationsAniello Minutolo, Massimo Esposito, Giuseppe De Pietro. 163-172 [doi]
- Electric Mobility in Green and Smart CitiesAdrian-Gabriel Morosan, Florin Pop, Aurel-Florin Arion. 173-184 [doi]
- k-NN Queries over Moving ObjectsZiqiang Yu, Yuehui Chen, Kun Ma. 185-196 [doi]
- Intrusion Detection for WSN Based on Kernel Fisher Discriminant and SVMZhipeng Hu, Jing Zhang, Xu an Wang. 197-208 [doi]
- Automatic Verification of Security of OpenID Connect Protocol with ProVerifJintian Lu, Jinli Zhang, Jing Li, Zhongyu Wan, Bo Meng. 209-220 [doi]
- Low Power Computing and Communication System for Critical EnvironmentsLuca Pilosu, Lorenzo Mossucca, Alberto Scionti, Giorgio Giordanengo, Flavio Renga, Pietro Ruiu, Olivier Terzo, Simone Ciccia, Giuseppe Vecchi. 221-232 [doi]
- Risk Management Framework to Avoid SLA Violation in Cloud from a Provider's PerspectiveWalayat Hussain, Farookh Khadeer Hussain, Omar Khadeer Hussain. 233-241 [doi]
- Enhancing Video Streaming Services by Studying Distance Impact on the QoS in Cloud Computing EnvironmentsAmirah Alomari, Heba Kurdi. 243-251 [doi]
- Application of Personalized Cryptography in Cloud EnvironmentMarek R. Ogiela, Lidia Ogiela. 253-257 [doi]
- Optimizing Machine Learning based Large Scale Android Malwares Detection by Feature DisposalLingling Zeng, Min Lei, Wei Ren, Shiqi Deng. 259-268 [doi]
- Research on Decisive Mechanism of Internet Financial Interest RateShengdong Mu, Yixiang Tian, Li Li, Xu an Wang. 269-280 [doi]
- Toward Construction of Encryption with Decryption Awareness Ability for Cloud StorageXu an Wang, Fatos Xhafa, Guangming Wu, Wei Wang. 281-291 [doi]
- Elastipipe: On Providing Cloud Elasticity for Pipeline-structured ApplicationsRodrigo Da Rosa Righi, Mateus Aubin, Cristiano André da Costa, Antônio Marcos Alberti, Arismar Cerqueira S. Jr.. 293-304 [doi]
- Semantic Summarization of News from Heterogeneous SourcesFlora Amato, Antonio d'Acierno, Francesco Colace, Vincenzo Moscato, Antonio Penta, Antonio Picariello. 305-314 [doi]
- Self Planning in Critical Multi-Agent SystemsFlora Amato, Nicola Mazzocca, Francesco Moscato 0001. 315-324 [doi]
- Towards a coaching system for daily living activities: the use of kitchen objects and devices for cognitive impaired peopleAlba Amato, Antonio Coronato, Giovanni Paragliola. 325-336 [doi]
- Wellness & LifeStyle Server: a Platform for Anthropometric and LifeStyle Data AnalysisGiovanna Sannino, Alessio Graziani, Giuseppe De Pietro, Roberto Pratola. 337-347 [doi]
- Semantic Information Retrieval from Patient SummariesMario Sicuranza, Angelo Esposito, Mario Ciampi. 349-360 [doi]
- Adaptive Modular Mapping to Reduce Shared Memory Bank Conflicts on GPUsInnocenzo Mungiello, Francesco De Rosa. 361-372 [doi]
- A Review on Data Cleaning Technology for RFID NetworkHe Xu, Jie Ding, Peng Li, Wei Li. 373-382 [doi]
- An Efficient RFID Reader Network Planning Strategy Based on P2P ComputingHe Xu, Weiwei Shen, Peng Li, Cong Qian. 383-390 [doi]
- Energy Optimization Algorithm of Wireless Sensor Networks based on LEACH-BPeng Li, Wanyuan Jiang, He Xu, Wei Liu. 391-404 [doi]
- On the Security of a Cloud-Based Revocable IBPRE Scheme for Data SharingJindan Zhang, Baocang Wang. 405-413 [doi]
- Semantic Integration and Correlation of Digital Evidences in Forensic InvestigationsFlora Amato, Giovanni Cozzolino, Nicola Mazzocca. 415-424 [doi]
- Efficient Batch and Online Kernel Ridge Regression for Green CloudsBo-Wei Chen, Seungmin Rho, Naveen Chilamkurti. 425-433 [doi]
- Queuing-Oriented Job Optimizing Scheduling In Cloud MapreduceTingqin He, Lijun Cai, Ziyun Deng, Tao Meng, Xu an Wang. 435-446 [doi]
- A Novel Cloud Computing Architecture Oriented Internet of VehiclesHe Xu, Ye Ding, Peng Li, Ruchuan Wang. 447-458 [doi]
- Design and implementation of Data Center Network Global Congestion Price Calculating method based on Software Defined NetworkingXiao Long Chen, Chun Shan. 459-466 [doi]
- Business Process Mining based Insider Threat Detection SystemTaiming Zhu, Yuanbo Guo, Jun Ma, Ankang Ju. 467-478 [doi]
- Design of Intermediate Frequency digital processing module based on AD9269Li Mei. 481-486 [doi]
- Research on Adaptive Cooperative Spectrum SensingRuilian Tan. 487-495 [doi]
- Research on Directional AF Cooperative Communication System Based on Outage ProbabilityZhe Li, Ruilian Tan, Kai Shi, Baoxiang Ren. 497-505 [doi]
- Research on Efficient Fibre-Channel-based Token-Routing Switch-Network Communication ProtocolWen-lang Luo, Jingxiang Lv, Dong Sheng Liu, Xiao-hui Zeng. 507-516 [doi]
- Path Optimization of Coal Mining Machine Based on Virtual Coal-Rock InterfaceGang Dong, Zhen Nie, Peijun Wang. 517-523 [doi]
- Test Sequencing Optimization for a Kind of Radar ReceiverXiao-pan Liu, Jin-yan Cai, Shihao Wu, Danyang Li. 525-532 [doi]
- A Method for the Detection of Singularity in PulseWei Qi, Hongwei Zhuang, Liqiong Zhang. 533-542 [doi]
- Design of non-lethal kinetic weapon impact method based on hybrid-III dummyWei Qi, Hongwei Zhuang, Fadong Zhao. 543-553 [doi]
- Review and Research Development of Optimization Algorithms Based on Wolf IntelligenceYixiao Sun, Renjun Zhan, Husheng Wu, Zhexin Han, Yanbin Ma. 555-566 [doi]
- SFCS-Broker: Supporting Feedback Credibility Brokering Service for Multiple Clouds EnvironmentsHeba Kurdi, Sara Alfaraj, Asma Alatawi. 567-576 [doi]
- QoE Assessment of Multi-View Video and Audio Transmission with a Packet Discarding Method over Bandwidth Guaranteed IP NetworksKeita Furukawa, Toshiro Nunome. 579-588 [doi]
- Evaluation of Division-based Broadcasting System over Wireless LANYusuke Gotoh, Yuki Takagi. 589-598 [doi]
- High Quality Multi-path Multi-view Video Transmission considering Path Priority ControlTetta Ishida, Takahito Kito, Iori Otomo, Takuya Fujihashi, Yusuke Hirota, Takashi Watanabe. 599-608 [doi]
- A Recursive Continuous Query Language for Integration of Streams and GraphsYousuke Watanabe. 609-618 [doi]
- A Design of a Video Effect Process Allocation Scheme for Internet Live BroadcastingTomoya Kawakami, Yoshimasa Ishi, Satoru Matsumoto, Tomoki Yoshihisa, Yuuichi Teranishi. 619-628 [doi]
- Numerical Simulation of Impact Acceleration on the Key Parts of Packing Ammunition on Condition of DroppingQing Xue. 631-637 [doi]
- Instruction Sequences Clustering and Analysis of Network Protocol's Dormant BehaviorsYanjing Hu. 639-649 [doi]
- Consideration of Educational Multimedia Contents Introducing Multimedia Switching FunctionKaoru Sugita. 651-656 [doi]
- Mobile Spam Filtering base on BTM Topic ModelJialin Ma, Yongjun Zhang, Lin Zhang. 657-665 [doi]
- Construction of an Electronic Health Record System for supporting a Zoo VeterinarianTatsuya Oyanagi, Misaki Iyobe, Tomoyuki Ishida, Noriki Uchida, Kaoru Sugita, Yoshitaka Shibata. 667-676 [doi]
- An Architecture for processing of Heterogeneous SourcesFlora Amato, Giovanni Cozzolino, Antonino Mazzeo, Sara Romano. 679-688 [doi]
- Modeling Approach for Specialist DomainFlora Amato, Giovanni Cozzolino, Francesco Moscato 0001, Vincenzo Moscato, Antonio Picariello. 689-698 [doi]
- Designing a Service Oriented System for social analyticsAngelo Chianese, Paolo Benedusi, Francesco Piccialli. 699-705 [doi]
- GPU Profiling of Singular Value Decomposition in OLPCA Method for Image DenoisingSalvatore Cuomo, Pasquale De Michele, Francesco Maiorano, Livia Marcellino. 707-716 [doi]
- A machine learning approach for predictive maintenance for mobile phones service providersAnna Corazza, Francesco Isgrò, Luca Longobardo, Roberto Prevete. 717-726 [doi]
- A Cloud-based Approach for Analyzing Viral Propagation of Linguistic Deviations by Social Networking: Current Challenges and Pitfalls for Text Analysis ToolsFiammetta Marulli, Alessandro Nardaggio, Adriano Racioppi, Luca Vallifuoco. 727-736 [doi]
- A Logic-based Clustering Approach for Cooperative Traffic Control SystemsWalter Balzano, Maria Rosaria Del Sorbo, Aniello Murano, Silvia Stranieri. 737-746 [doi]
- Chain-of-Trust for Microcontrollers using SRAM PUFs: the Linux Case StudyDomenico Amelino, Mario Barbareschi, Antonino Mazzeo. 747-756 [doi]
- Hybrid Approach on Cache Aware Real-Time Scheduling for Multi-Core SystemsThomas Huybrechts, Yorick De Bock, Haoxuan Li, Peter Hellinckx. 759-768 [doi]
- Towards Recognising Activities of Daily Living through Indoor Localisation TechniquesAndriy Zubaliy, Anna Hristoskova, Nicolás González-Deleito, Elena Tsiporkova. 769-778 [doi]
- Powerwindow: a Multi-component TACLeBench Benchmark for Timing AnalysisHaoxuan Li, Paul De Meulenaere, Peter Hellinckx. 779-788 [doi]
- Predictive Algorithms for Scheduling Parameter Sweep Calculations in a Cloud EnvironmentStig Bosmans, Glenn Maricaux, Filip Van der Schueren. 789-798 [doi]
- A Study of the Internet Financial Interest Rate Risk Evaluation Index System in Context of Cloud ComputingSheng-dong Mu, Yixiang Tian, Lili, Xu an Wang. 801-812 [doi]
- A Dynamic System development Method for Startups Migrate to C loudAsmaa Abdelrehim Selim Ibrahim, Mohamed Mamdouh Awny. 813-824 [doi]
- Integrated Algorithms for Network Optimization of Dangerous Goods TransportationHaixing Wang, Guiping Xiao, Tao Hai. 825-833 [doi]
- Study on Dynamic Monitoring System for Railway Gaseous Tank Cars TransportationHaixing Wang, Jujian Wang, Chao Li. 835-844 [doi]
- Improvement of Study Logging System for Active Learning Using SmartphoneNoriyasu Yamamoto. 845-851 [doi]
- Identifying Prime Customers Based on MobileUsage PatternsDeepali Arora, Kin Fun Li. 853-861 [doi]
- NetFlow: Network Monitoring and Intelligence GatheringVivek Ratan, Kin Fun Li. 863-867 [doi]
- Company Web Site Analysis Based on Visual InformationKosuke Takono, Yurika Moriwaki. 869-876 [doi]
- A Study of the Standardization of Fire Forces Equipment ProcurementZhang Jie. 877-882 [doi]
- Monitoring of Cardiac Arrhythmia Patterns by Adaptive AnalysisJosé Elías Cancino Herrera, Ricardo R. Jorge, Osslan Osiris Vergara-Villegas, Vianey Guadalupe Cruz Sánchez, Jirí Bíla, Manuel de Jesús Nandayapa Alfaro, Israel U. Ponce, Ángel Israel Soto Marrufo, Angel Flores-Abad. 885-894 [doi]
- Pakistan Sign Language Recognition and Translation System using Leap Motion DeviceNosheela Raziq, Seemab Latif. 895-902 [doi]
- Identifying stable objects for accelerating the classification phase of k-meansAdriana Mexicano, Salvador Cervantes, Ricardo Rodriguez, J. Pérez, Nelva Almanza, M. A. Jiménez, A. Azuara. 903-912 [doi]
- Engage CHAEA Learning Styles, ACRA Learning Strategies and Learning Objects into an E-Learning Platform for Higher Education StudentsJosé Angel Montes Olguín, Francisco Javier Carrillo García, Ma. de la Luz Carrillo González, Antonia Mireles Medina, Julio Zenón García Cortés. 913-922 [doi]
- Security Analysis of OpenID Connect Protocol with Cryptoverif in the Computational ModelJinli Zhang, Jintian Lu, Zhongyu Wan, Jing Li, Bo Meng. 925-934 [doi]
- Towards a Particular Prediction System to Evaluate Student's SuccessDavid Bañeres. 935-945 [doi]
- Evaluation of an eLearning Platform Featuring Learning Analytics and GamificationDavid Gañán, Santi Caballé, Robert Clarisó, Jordi Conesa. 947-959 [doi]
- MobilePeerDroid: A Platform for Sharing, Controlling and Coordination in Mobile Android TeamsFatos Xhafa, Daniel Palou, Santi Caballé, Keita Matsuo, Leonard Barolli. 961-972 [doi]