Abstract is missing.
- iDBP: A Distributed Min-Cut Density-Balanced Algorithm for Incremental Web-Pages RankingSumalee Sangamuang, Pruet Boonma, Juggapong Natwichai. 3-13 [doi]
- Fault-Tolerant Fog Computing Models in the IoTRyuji Oma, Shigenari Nakamura, Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa 0001. 14-25 [doi]
- Semi-synchronocity Enabling Protocol and Pulsed Injection Protocol For A Distributed Ledger SystemBruno Andriamanalimanana, Chen-Fu Chiang, Jorge Novillo, Sam Sengupta, Ali Tekeoglu. 26-35 [doi]
- WebSocket-Based Real-Time Single-Page Application Development FrameworkHao Qu, Kun Ma. 36-47 [doi]
- Texture Estimation System of Snacks Using Neural Network Considering Sound and LoadShigeru Kato, Naoki Wada, Ryuji Ito, Takaya Shiozaki, Yudai Nishiyama, Tomomichi Kagawa. 48-61 [doi]
- Blockchain-Based Trust Communities for Decentralized M2M Application ServicesBesfort Shala, Ulrich Trick, Armin Lehmann, Bogdan V. Ghita, Stavros Shiaeles. 62-73 [doi]
- Parameterized Pulsed Transaction Injection Computation Model And Performance Optimizer For IOTA-TangoBruno Andriamanalimanana, Chen-Fu Chiang, Jorge Novillo, Sam Sengupta, Ali Tekeoglu. 74-84 [doi]
- A Real-Time Fog Computing Approach for Healthcare EnvironmentEliza Gomes, M. A. R. Dantas, Patricia Della Mea Plentz. 85-95 [doi]
- On Construction of a Caffe Deep Learning Framework based on Intel Xeon PhiChao-Tung Yang, Jung-Chun Liu, Yu-Wei Chan, Endah Kristiani, Chan-Fu Kuo. 96-106 [doi]
- A Brief History of Self-destructing Data: From 2005 to 2017Xiao Fu, Zhijian Wang, Yong Chen, Yunfeng Chen, Hao Wu. 107-115 [doi]
- The Implementation of a Hadoop Ecosystem Portal with Virtualization DeploymentChao-Tung Yang, Chien-Heng Wu, Wen-Yi Chang, Whey-Fone Tsai, Yu-Wei Chan, Endah Kristiani, Yuan-Ping Chiang. 116-127 [doi]
- A Model for Data Enrichment over IoT Streams at Edges of InternetReinout Van Hille, Fatos Xhafa, Peter Hellinckx. 128-136 [doi]
- SQL Injection in Cloud: An Actual Case StudyXiao Fu, Zhijian Wang, Yong Chen, Yunfeng Chen, Hao Wu. 137-147 [doi]
- Smart Intrusion Detection with Expert SystemsFlora Amato, Francesco Moscato 0001, Fatos Xhafa, Emilio Vivenzio. 148-159 [doi]
- Cognitive Codes for Authentication and Management in Cloud Computing InfrastructuresMarek R. Ogiela, Lidia Ogiela. 160-166 [doi]
- Threshold Based Load Balancer for Efficient Resource Utilization of Smart Grid Using Cloud ComputingMubariz Rehman, Nadeem Javaid, Muhammad Junaid Ali, Talha Saif, Muhammad Hassaan Ashraf, Sadam Hussain Abbasi. 167-179 [doi]
- A Fuzzy-based Approach for MobilePeerDroid System Considering of Peer Communication CostYi Liu 0011, Kosuke Ozera, Keita Matsuo, Makoto Ikeda, Leonard Barolli. 180-191 [doi]
- On the Security of a CCA-Secure Timed-Release Conditional Proxy Broadcast Re-encryption SchemeXu an Wang, Arun Kumar Sangaiah, Nadia Nedjah, Chun Shan, Zuliang Wang. 192-198 [doi]
- Cloud-Fog Based Load Balancing Using Shortest Remaining Time First OptimizationMuhammad Zakria, Nadeem Javaid, Muhammad Ismail, Muhammad Zubair 0003, Muhammad Asad Zaheer, Faizan Saeed. 199-211 [doi]
- Mining and Utilizing Network Protocol's Stealth Attack BehaviorsYanjing Hu, Xu an Wang, Haining Luo, Shuaishuai Zhu. 212-222 [doi]
- A Fuzzy-Based System for Selection of IoT Devices in Opportunistic Networks Considering Number of Past EncountersMiralda Cuka, Donald Elmazi, Kevin Bylykbashi, Keita Matsuo, Makoto Ikeda, Leonard Barolli. 223-237 [doi]
- Hill Climbing Load Balancing Algorithm on Fog ComputingMaheen Zahid, Nadeem Javaid, Kainat Ansar, Kanza Hassan, Muhammad KaleemUllah Khan, Mohammad Waqas. 238-251 [doi]
- Performance Analysis of WMN-PSOSA Simulation System for WMNs Considering Weibull and Chi-Square Client DistributionsShinji Sakamoto, Leonard Barolli, Shusuke Okamoto. 252-264 [doi]
- Automated Risk Analysis for IoT SystemsMassimiliano Rak, Valentina Casola, Alessandra De Benedictis, Umberto Villano. 265-275 [doi]
- Integration of Cloud-Fog Based Platform for Load Balancing Using Hybrid Genetic Algorithm Using Bin Packing TechniqueMuhammad Zubair 0003, Nadeem Javaid, Muhammad Ismail, Muhammad Zakria, Muhammad Asad Zaheer, Faizan Saeed. 279-292 [doi]
- More Secure Outsource Protocol for Matrix Multiplication in Cloud ComputingXu an Wang, Shuaishuai Zhu, Arun Kumar Sangaiah, Shuai Xue, Yunfei Cao. 293-299 [doi]
- Load Balancing on Cloud Using Professional Service Scheduler OptimizationMuhammad Asad Zaheer, Nadeem Javaid, Muhammad Zakria, Muhammad Zubair 0003, Muhammad Ismail, Abdul Rehman. 300-312 [doi]
- Privacy Preservation for Re-publication Data by Using Probabilistic GraphPachara Tinamas, Nattapon Harnsamut, Surapon Riyana, Juggapong Natwichai. 313-325 [doi]
- Evaluation of Scheduling Method for Division Based Broadcasting of Multiple Video Considering Data SizeRen Manabe, Yusuke Gotoh. 329-339 [doi]
- A Design of Hierarchical ECA Rules for Distributed Multi-viewpoint Internet Live Broadcasting SystemsSatoru Matsumoto, Tomoki Yoshihisa, Tomoya Kawakami, Yuuichi Teranishi. 340-347 [doi]
- An Evaluation on Virtual Bandwidth for Video Streaming Delivery in Hybrid Broadcasting EnvironmentsTomoki Yoshihisa. 348-356 [doi]
- A Load Distribution Method for Sensor Data Stream Collection Considering Phase DifferencesTomoya Kawakami, Tomoki Yoshihisa, Yuuichi Teranishi. 357-367 [doi]
- Proposal of a Zoo Navigation AR Application Using Markerless Image ProcessingHayato Sakamoto, Tomoyuki Ishida. 371-380 [doi]
- Implementation of a Virtual Reality Streaming Software for Network Performance EvaluationKo Takayama, Yusi Machidori, Kaoru Sugita. 381-386 [doi]
- Remote Voltage Controls by Image Recognitions for Adaptive Array Antenna of Vehicular Delay Tolerant NetworksNoriki Uchida, Ryo Hashimoto, Goshi Sato, Yoshitaka Shibata. 387-394 [doi]
- A Collaborative Safety Flight Control System for Multiple Drones: Dealing with Weak Wind by Changing Drones FormationNoriyasu Yamamoto, Noriki Uchida. 395-402 [doi]
- Contact Detection for Social Networking of Small AnimalsRafael Berkvens, Ivan Herrera Olivares, Siegfried Mercelis, Lucinda Kirkpatrick, Maarten Weyn. 405-414 [doi]
- Introduction of Deep Neural Network in Hybrid WCET AnalysisThomas Huybrechts, Thomas Cassimon, Siegfried Mercelis, Peter Hellinckx. 415-425 [doi]
- Distributed Uniform Streaming Framework: Towards an Elastic Fog Computing Platform for Event Stream ProcessingSimon Vanneste, Jens de Hoog, Thomas Huybrechts, Stig Bosmans, Muddsair Sharif, Siegfried Mercelis, Peter Hellinckx. 426-436 [doi]
- Context-Aware Distribution In Constrained IoT EnvironmentsReinout Eyckerman, Muddsair Sharif, Siegfried Mercelis, Peter Hellinckx. 437-446 [doi]
- Towards a Scalable Distributed Real-Time Hybrid Simulator for Autonomous VehiclesJens de Hoog, Manu Pepermans, Siegfried Mercelis, Peter Hellinckx. 447-456 [doi]
- Challenges of Modeling and Simulating Internet of Things SystemsStig Bosmans, Siegfried Mercelis, Joachim Denil, Peter Hellinckx. 457-466 [doi]
- Cyber Incident Classification: Issues and ChallengesMarina Danchovsky Ibrishimova. 469-477 [doi]
- Outsourcing Online/offline Proxy Re-encryption for Mobile Cloud Storage SharingXu an Wang, Nadia Nedjah, Arun Kumar Sangaiah, Chun Shan, Zuliang Wang. 478-485 [doi]
- DAHS: A Distributed Data-as-a-Service Framework for Data Analytics in HealthcarePruet Boonma, Juggapong Natwichai, Krit Khwanngern, Panutda Nantawad. 486-495 [doi]
- Round Robin Inspired History Based Load Balancing Using Cloud ComputingTalha Saif, Nadeem Javaid, Mubariz Rahman, Hanan Butt, Muhammad Babar Kamal, Muhammad Junaid Ali. 496-508 [doi]