Abstract is missing.
- MOOCs, MOOE and MOOR in ChinaWenai Song. 1 [doi]
- SONET over RPRAmmar Hamad, Michel Kadoch. 3-7 [doi]
- Quantifying security risk by measuring network risk conditionsCandace Suh-Lee, JuYeon Jo. 9-14 [doi]
- Feasibility analysis for incorporating/deploying SIEM for forensics evidence collection in cloud environmentMuhammad Irfan, Haider Abbas, Waseem Iqbal. 15-21 [doi]
- Mining information assurance data with a hybrid intelligence/multi-agent systemCharles A. Fowler, Robert J. Hammell II. 23-28 [doi]
- Secure in-vehicle systems against Trojan attacksMasaya Yoshikawa, Kyota Sugioka, Yusuke Nozaki, Kensaku Asahi. 29-33 [doi]
- Social routing: A novel routing protocol for delay tolerant network based on dynamic connectivityQuoc Nguyen Viet, Pham Van Phuoc, Trinh Quoc Son, Lung Vu Duc. 35-40 [doi]
- A Big Data approach to enhance the integration of Access Control Policies for Web servicesMohammed Alodib, Zaki Malik. 41-46 [doi]
- COPE: Cooperative Power and Energy-efficient routing protocol for Wireless Sensor NetworksSaima Jamil, Saqib Jamil, Sheeraz Ahmed, Muhammad Zubair, Farman Sikandar. 47-52 [doi]
- Comparative analysis on the signature algorithms to validate AS paths in BGPsecKyoungha Kim, Yanggon Kim. 53-58 [doi]
- Opportunistic wireless Network Coding based on small-time scale Traffic PredictionRui Zhang, Jie Li, Quan Qian, Wei Feng. 59-64 [doi]
- Web-based motion detection system for health careRuiling Gao, Minghuan Zhao, Zhihui Qiu, Yingzhou Yu, C. Hwa Chang. 65-70 [doi]
- A novel contention window backoff algorithm for IEEE 802.11 wireless networksIkram Syed, Bosung Kim, Byeong-hee Roh, Il-hyuk Oh. 71-75 [doi]
- Method for secure RESTful web serviceSungchul Lee, Ju-Yeon Jo, Yoohwan Kim. 77-81 [doi]
- Deploying agents in the network to detect intrusionsShankar M. Banik, Luis Peña. 83-87 [doi]
- Empirical evaluation of designing multicasting network with minimum delay variationNicklaus Rhodes, Shankar M. Banik. 89-94 [doi]
- An autonomous model to enforce security policies based on user's behaviorKambiz Ghazinour, Mehdi Ghayoumi. 95-99 [doi]
- Utilizing NFC to secure identificationRobert Gripentog, Yoohwan Kim. 101-105 [doi]
- A kernel based Atanassov's intuitionistic fuzzy clustering for network forensics and intrusion detectionAnupam Panwar. 107-112 [doi]
- Regimdroid: Framework for customize Android platform to act as a brain for telepresence robotNouha Ghribi, Boudour Ammar, Adel M. Alimi. 113-118 [doi]
- Communication system based on chaotic delayed feedback oscillator with switched delayMikhail Prokhorov, Danil Kulminskiy, Anatoly Karavaev, Vladimir Ponomarenko. 119-124 [doi]
- Effective gazewriting with support of text copy and pasteReo Kishi, Takahiro Hayashi. 125-130 [doi]
- A review of multimodal biometric systems: Fusion methods and their applicationsMehdi Ghayoumi. 131-136 [doi]
- An adaptive fuzzy multimodal biometric system for identification and verificationMehdi Ghayoumi, Kambiz Ghazinour. 137-141 [doi]
- Evaluating a GA-based approach to dynamic query approximation on an inference-enabled SPARQL endpointYuji Yamagata, Naoki Fukuta. 143-148 [doi]
- Fully pipelined VLSI architecture of a real-time block-based object detector for intelligent video surveillance systemsMin-Chun Tuan, Shih-Lun Chen. 149-154 [doi]
- A compact design of n-bit ripple carry adder circuit using QCA architectureTania Sultana, Rajon Bardhan, Tangina Firoz Bithee, Zinia Tabassum, Nusrat Jahan Lisa. 155-160 [doi]
- Using SPIN to check Simulink Stateflow modelsChikatoshi Yamada, D. Michael Miller. 161-166 [doi]
- Fast bootstrapping method for the memory-disk integrated memory systemSangjae Nam, Su-Kyung Yoon, Shin-Dug Kim. 167-172 [doi]
- Selective data buffering module for unified hybrid storage systemKihyun Park, Su-Kyung Yoon, Shin-Dug Kim. 173-178 [doi]
- Automated generation of hierarchic image database with hybrid method of ontology and GMM-based image clusteringRyosuke Yamanishi, Ryoya Fujimoto, Yuji Iwahori, Robert J. Woodham. 179-184 [doi]
- Multivariate temporal Link Prediction in evolving social networksAlper Ozcan, Sule Gündüz Ögüdücü. 185-190 [doi]
- A graph model based author attribution technique for single-class e-mail classificationNovino Nirmal A., Kyung-Ah Sohn, Tae-Sun Chung. 191-196 [doi]
- Introducing the concept of "always-welcome recommendations"Edson B. dos Santos, Arthur F. Da Costa, Rafael Martins D'Addio, Marcelo Garcia Manzato, Rudinei Goularte. 197-202 [doi]
- CBDIR: Fast and effective content based document Information Retrieval systemMoon Soo Cha, So-yeon Kim, Jae Hee Ha, Min-June Lee, Young-June Choi, Kyung-Ah Sohn. 203-208 [doi]
- Mobile phone spam image detection based on graph partitioning with Pyramid Histogram of Visual Words image descriptorSo-yeon Kim, Kyung-Ah Sohn. 209-214 [doi]
- Multi-purpose Adaptable Business Tier Components based on Call Level InterfacesÓscar Mortágua Pereira, Rui L. Aguiar. 215-221 [doi]
- Implementation of modified overload detection technique with VM selection strategies based on heuristics and migration controlMohammad Alaul Haque Monil, Rashedur M. Rahman. 223-227 [doi]
- A feature selection method for comparision of each concept in big dataTakafumi Nakanishi. 229-234 [doi]
- Searching human actions based on a multi-dimensional time series similarity calculation methodYu Fang, Kosuke Sugano, Kenta Oku, Hung-Hsuan Huang, Kyoji Kawagoe. 235-240 [doi]
- A human behavior processes database prototype system for surgery supportZhang Zuo, Kenta Oku, Hung-Hsuan Huang, Kyoji Kawagoe. 241-246 [doi]
- Clustered based VM placement strategiesMohammed Rashid Chowdhury, Mohammad Raihan Mahmud, Rashedur M. Rahman. 247-252 [doi]
- A personalized music discovery service based on data miningMd Mahfuzur Rahman Siddiquee, Md. Saifur Rahman, Naimul Haider, Rashedur M. Rahman, Shahnewaz Ul Islam Chowdhury, Sharnendu Banik. 253-258 [doi]
- Generalized entropy based semi-supervised learningTaocheng Hu, Jinhui Yu. 259-263 [doi]
- Investigation of localized sentiment for a given product by analyzing tweetsSyed Akib Anwar Hridoy, M. Tahmid Ekram, Mohammad Samiul Islam, Faysal Ahmed, Rashedur M. Rahman. 265-270 [doi]
- Enhancing the impact of science data toward data discovery and reuseAlan Chappell, Jesse Weaver, Sumit Purohit, William Smith, Karen Schuchardt, Patrick West, Benno Lee, Peter Fox. 271-277 [doi]
- A pruning algorithm for reverse nearest neighbors in directed road networksRizwan Qamar, Muhammad Attique, Tae-Sun Chung. 279-284 [doi]
- A semantic approach for transforming XML data to RDF triplesMohamed Kharrat, Anis Jedidi, Faïez Gargouri. 285-290 [doi]
- Syllable-based Myanmar language model for speech recognitionWunna Soe, Yadana Theins. 291-296 [doi]
- In-house alert sounds detection and direction of arrival estimation to assist people with hearing difficultiesMohammad I. Daoud, Mahmoud Al-Ashi, Fares Abawi, Ala Khalifeh. 297-302 [doi]
- Nearest multi-prototype based music mood classificationBabu Kaji Baniya, Choong Seon Hong, Joonwhoan Lee. 303-306 [doi]
- Decomposition of partly occluded objects based on evaluation of figural goodnessTakahiro Hayashi, Tatsuya Ooi, Motoki Sasaki. 307-312 [doi]
- Using Ant's Colony Algorithm for improved segmentation for number plate recognitionSanchay Dewan, Shreyansh Bajaj, Shantanu Prakash. 313-318 [doi]
- FPGA implementation of a low complexity steganographic system for digital imagesWilliams Antonio Pantoja Laces, Jose Juan Garcia Hernandez. 319-324 [doi]
- Recognition of Offline Handwritten Hindi text using middle zone of the wordsNaresh Kumar Garg, Lakhwinder Kaur, Manish Jndal. 325-328 [doi]
- Automatic extraction of text regions from document images by multilevel thresholding and k-means clusteringHoai Nam Vu, Tuan-Anh Tran, In Seop Na, Soo-Hyung Kim. 329-334 [doi]
- Automated thresholding of lung CT scan for Artificial Neural Network based classification of nodulesSheeraz Akram, Muhammad Younus Javed, Ayyaz Hussain. 335-340 [doi]
- Single-object resource allocation in multiple bid declaration with preferential orderKengo Saito, Toshiharu Sugawara. 341-347 [doi]
- HMM-based Vietnamese speech synthesisQuoc Son Trinh. 349-353 [doi]
- A scoring rule-based truthful demand response mechanismKeisuke Hara, Takayuki Ito. 355-360 [doi]
- Multiagent-based distributed backup system for individualsTakahiro Uchiya, Motohiro Shibakawa, Ichi Takumi, Tetsuo Kinoshita. 361-366 [doi]
- eMedicalHelp: A customized medical diagnostic application: Is a single questionnaire enough to measure stress?Hedieh Ranjbartabar, Amir Maddah, Manolya Kavakli. 367-372 [doi]
- Development of mobile voice navigation system using user-based mobile maps annotationsTomohiro Yanagi, Daisuke Yamamoto, Naohisa Takahashi. 373-378 [doi]
- 3D Web Applications in E-Commerce - A secondary study on the impact of 3D product presentations created with HTML5 and WebGLJens Geelhaar, Gabriel Rausch. 379-382 [doi]
- SQUED: A novel crowd-sourced system for detection and localization of unexpected events from smartphone-sensor dataTaishi Yamamoto, Kenta Oku, Hung-Hsuan Huang, Kyoji Kawagoe. 383-386 [doi]
- Some observations on online advertising: A new advertising systemDapeng Liu, Shaochun Xu, Lichao Chen, Chunning Wang. 387-392 [doi]
- Objective framework for early-stage comparison of software development project typesDonghwoon Kwon, Robert J. Hammell. 393-398 [doi]
- Dual RAID technique for ensuring high reliability and performance in SSDSohyun Koo, Se Jin Kwon, Sungsoo Kim, Tae-Sun Chung. 399-404 [doi]
- A novel architecture for learner's profiles interoperabilityLeila Ghorbel, Corinne Amel Zayani, Ikram Amous. 405-410 [doi]
- A Multimedia-Oriented Digital Ecosystem: A new collaborative environmentSolomon Asres Kidanu, Yudith Cardinale, Gilbert Tekli, Richard Chbeir. 411-416 [doi]
- Dynamic binary translation in a type-II hypervisor for Cavium Octeon MIPS64 based systemsQurrat ul Ain, Usama Anwar, Asad R. Usmani, Abdul Qadeer, Ghulam Mustafa, Abdul Waheed. 417-422 [doi]
- An energy-saving task scheduler for mobile devicesHao Qian, Daniel Andresen. 423-430 [doi]
- Challenges and implementation of ad-hoc water gauge system for the grasp of internal water damageTakanobu Otsuka, Yoshitaka Torii, Takayuki Ito. 431-436 [doi]
- Energy-efficient distributed computing solutions for Internet of Things with ZigBee devicesGrzegorz Chmaj, Henry Selvaraj. 437-442 [doi]
- Emerald: Enhance scientific workflow performance with computation offloading to the cloudHao Qian, Daniel Andresen. 443-448 [doi]
- Accelerating storage access by combining block storage with memory storageShuichi Oikawa. 449-454 [doi]
- Formal specification and reasoning for situated multi-agent systemZhuang Li, Huaikou Miao. 455-460 [doi]
- Automatic generation of programming exercises for learning programming languageAkiyoshi Wakatani, Toshiyuki Maeda. 461-465 [doi]
- Robust location tracking method for mixed reality robots using a rotation search methodMasahiro Yamamoto, Kazuhiro Suzuki, Ryosuke Ogawa, Nobuhiro Ito, Yoshinobu Kawabe. 467-472 [doi]
- Verifying ignition timing of gasoline direct injection engine's PCMMasato Yamauchi, Nobuhiro Ito, Yoshinobu Kawabe. 473-478 [doi]
- Analysis of driving behaviors based on GMM by using driving simulator with navigation pluginNaoto Mukai. 479-484 [doi]
- Analyzing relationship between the number of errors in review processes for embedded software development projectsToyoshiro Nakashima, Kazunori Iwata, Yoshiyuki Anan, Naohiro Ishii. 485-490 [doi]
- Classification on nonlinear mapping of reducts based on nearest neighbor relationNaohiro Ishii, Ippei Torii, Naoto Mukai, Kazunori Iwata, Toyoshiro Nakashima. 491-496 [doi]
- Proposal of programming creation application using road signs by smartphonesReiko Kuwabara, Eigo Ito, Takayuki Fujimoto. 497-502 [doi]
- Proposal of Multiple Travel Scheduling System based on Inverse Operation MethodKazuya Murata, Takayuki Fujimoto. 503-507 [doi]
- A proposal of programming education system using mechanical calculator mechanismEigo Ito, Takayuki Fujimoto. 509-512 [doi]
- SDSS: Proposal on feeding support application software which enables the user to create a state of "mental alertness"Motoichi Adachi, Takayuki Fujimoto. 513-518 [doi]
- A proposal of the system to stop a decline of the interest of Great East Japan EarthquakeKouji Fujita, Takayuki Fujimoto. 519-523 [doi]
- Singing voice detection of popular music using beat tracking and SVM classificationFengyan Wu, Shutao Sun, Jianglong Zhang, Yongbin Wang. 525-528 [doi]
- Solving the supermarket shopping route planning problem based on genetic algorithmXiaojia Chen, Ying Li, Tao Hu. 529-533 [doi]
- Online advertising demand-side platform business system design explorationTao Lei, Junpeng Gong, Yujun Wen. 535-538 [doi]
- A feature selection algorithm of music genre classification based on ReliefF and SFSMeimei Wu, Yongbin Wang. 539-544 [doi]
- Research and implementation of four-prime RSA digital signature algorithmZhenjiu Xiao, Yongbin Wang, Zhengtao Jiang. 545-549 [doi]
- The design and implementation of personalized news recommendation systemXuejiao Han, Wenqian Shang, Shuchao Feng. 551-554 [doi]
- A logic model of interest in information networkShiping Zhou, Wei Zhang, Xiangrong Tong. 555-558 [doi]
- Research on public opinion based on Big DataSongtao Shang, Minyong Shi, Wenqian Shang, Zhiguo Hong. 559-562 [doi]
- An automatic semantic Web service composition method based on ontologyYing Li, Yulong Li, Tao Hu, Zhisheng Lv. 563-566 [doi]
- The maximal operator classifierYuqi Wang, Wenqian Shang, Shuchao Feng. 567-570 [doi]
- Visualization in media big data analysisYing-Jian Qi, Guoliang Shi, Xinyan Yu, Ying Li. 571-574 [doi]
- Personalized two party key exchange protocolTong Yi, Minyong Shi, Wenqian Shang. 575-579 [doi]
- Personalized news recommendation based on links of webZhenzhong Li, Wenqian Shang. 581-584 [doi]
- Interactive virtual theater display systemMin Feng, Huaichang Du. 585-588 [doi]
- An improved algorithm for active contour extraction based on greedy snakeHui Ren, Zhibin Su, Chaohui Lu, Fangjv Zou. 589-592 [doi]
- Spread influence algorithm of news website based on PageRankGuowei Chen, Fei Xie, Tao Lei, Yu Su. 593-596 [doi]
- Petri Nets-based design of real-time reconfigurable networks on chipsHela Ben Salah, Adel Benzina, Mohamed Khalgui. 597-604 [doi]
- Real-time reconfigurable scheduling of multiprocessor embedded systems using hybrid genetic based approachHamza Gharsellaoui, Ismail Ktata, Naoufel Kharroubi, Mohamed Khalgui. 605-609 [doi]
- New adaptive middleware for real-time embedded operating systemsFethi Jarray, Hamza Chniter, Mohamed Khalgui. 610-618 [doi]
- SABPEL: Creating self-adaptive business processesSihem Cherif, Raoudha Ben Djemaa, Ikram Amous. 619-626 [doi]
- A learning semantic Web service for generating learning pathsChaker Ben Mahmoud, Ikbel Azaiez, Fathia Bettahar, Marie-Hélène Abel, Faïez Gargouri. 627-631 [doi]
- 2LPA-RTDW: A Two-Level data Partitioning Approach for Real-time Data WarehouseIssam Hamdi, Emna Bouazizi, Saleh Alshomrani, Jamel Feki. 632-638 [doi]
- Opus framework: A proof-of-concept implementationNahla Haddar, Mohamed Tmar, Faïez Gargouri. 639-641 [doi]
- A service-oriented architecture (SOA) framework for choreography verificationSirine Rebai, Hatem Hadj Kacem, Mohamed Karaa, Saúl E. Pomares Hernández, Ahmed Hadj Kacem. 642-646 [doi]
- Adaptive security for Cloud data warehouse as a serviceEmna Guermazi, Mounir Ben Ayed, Hanêne Ben-Abdallah. 647-650 [doi]
- Enriching user model ontology for handicraft domain by FOAFMaha Maalej, Achraf Mtibaa, Faïez Gargouri. 651-655 [doi]
- Integrating semantics and structural information for BPMN model refactoringWiem Khlif, Hanêne Ben-Abdallah. 656-660 [doi]