Abstract is missing.
- Automatic Modulation Classification in Cognitive Radio Using Multiple Antennas and Maximum-Likelihood TechniquesAhmed O. Abdul Salam, Ray E. Sheriff, Saleh R. Al-Araji, Kahtan A. Mezher, Qassim Nasir. 1-5 [doi]
- A Two-Tier Evolutionary Game Theoretic Approach to Dynamic Spectrum Sharing through Licensed Shared AccessAhsan Saadat, Gengfa Fang, Wei Ni. 6-11 [doi]
- Adaptive Rate Control in Smart Grid Heterogeneous Communications NetworksWeifeng Zhong, Rong Yu, Yan Zhang 0002, Yue Gao, Stein Gjessing. 12-17 [doi]
- Understanding Access Stability and Mobility Patterns of Mobile Internet UsersYuan Li, Hao Jiang, Shuwen Yi, Chen Zhou, Lihua Wu, Ming Wu. 18-22 [doi]
- Application Sequence Prediction for Energy Consumption Reduction in Mobile SystemsIsmat Chaib Draa, Jamel Tayeb, Smaïl Niar, Emmanuelle Grislin. 23-30 [doi]
- Reduced Complexity MIMO Receiver with Real-Valued BeamformingCraig Miller, Wei Liu 0001, Richard J. Langley. 31-36 [doi]
- Exploiting the DASH Framework to Promote a Dynamic Transport Selection for Video Streaming over LTE NetworksLuis Díez, Ramón Agüero, Joël Penhoat, Emile Stephan, Fabien Heliot. 37-43 [doi]
- Channel-Aware Scheduling in FFR-Aided OFDMA-Based Heterogeneous Cellular NetworksJan Garcia-Morales, Guillem Femenias, Felip Riera-Palou. 44-51 [doi]
- Evidence Theory Based Self-Interference Suppression for Two-Way Full-Duplex MIMO RelaysYi Yang, Yanhua Sun, Enchang Sun, Yanhua Zhang. 52-58 [doi]
- SDR-Based ADS-B with Dual-Frequency for UAS: A Universal DesignYueying Zhang, Keju Wang, Hang Long. 59-63 [doi]
- Acoustic Radar Weak Target Detection Method Based on Mellin TransformDinghe Wang, Qinglong Bao, Zengping Chen. 64-67 [doi]
- Hidden Markov Model for Improved Ultrasound-Based Presence DetectionPaola Jaramillo, Jean-Paul M. G. Linnartz. 68-74 [doi]
- Minimization and Placement of Sensors in Structurally Observable NetworksJoão Paulo Souza Medeiros, Paulo Sergio Motta Pires, João Batista Borges Neto, Antonio Alfredo Ferreira Loureiro. 75-82 [doi]
- Equalizing Energy Distribution in Sensor Nodes through Optimization of RPLJuuso Nurmio, Ethiopia Nigussie, Christian Poellabauer. 83-91 [doi]
- Collision-Free Routing Protocol in Multi-hop Wireless Sensor NetworksHicham Lakhlef, Julien Bourgeois, Saad Harous, Jean Frédéric Myoupo. 92-99 [doi]
- Measuring Distances with RSSI from Vehicular Short-Range CommunicationsRoberto Sadao Yokoyama, Bruno Yuji Lino Kimura, Leandro A. Villas, Edson dos Santos Moreira. 100-107 [doi]
- THESEUS: A Routing System for Shared Sensor NetworksMohammadreza Iman, Flávia Coimbra Delicato, Claudio M. de Farias, Luci Pirmez, Igor Leão dos Santos, Paulo F. Pires. 108-115 [doi]
- Spanning Data Across Heterogeneous MANETs through Proactive Strip InteroperabilityMarco Antonio To, Jose Alvarez, Marcos Cano, Stephane Maag. 116-124 [doi]
- Analytical Performance Evaluation of Frame Synchronization for Data with Known, Unequal Distribution over Binary Symmetric ChannelBoladale M. Isawhe, Maria G. Martini. 125-131 [doi]
- Enhancing Aggregation over Uncertain DatabasesNermin Abdel-Hakim Othman, Ahmed Sharaf Eldin, Doaa Saad El Zanfaly. 132-139 [doi]
- FPGA Based Real Time 'Secure' Body Temperature Monitoring Suitable for WBSNMuzaffar Rao, Thomas Newe, Ian Grout, Elfed Lewis, Avijit Mathur. 140-143 [doi]
- SSIE: An Automatic Data Extractor for Sports Management in Athletics ModalityFelipe Simoes, Fábio T. Matsunaga, Armando Maciel Toda, Jacques Duilio Brancher, Abdallah Junior, Rosangela Busto. 144-151 [doi]
- Semantic Mapping Relational to a Directed Property Hypergraph ModelDewi Wisnu Wardani, Josef Küng. 152-159 [doi]
- Identifying and Classifying Suspicious Network Behavior Using Passive DNS AnalysisKaio R. S. Barbosa, Eduardo Souto, Eduardo Feitosa, Khalil El-Khatib. 160-167 [doi]
- An Approach to IdM with Privacy in the CloudJorge Werner, Carla Merkle Westphall, Rafael Weingärtner, Guilherme Arthur Geronimo, Carlos Becker Westphall. 168-175 [doi]
- Dynamic Searchable Encryption with Multi-user Private Search for Cloud ComputingWenjun Luo, Yaqiong Chen, Yousheng Zhou. 176-182 [doi]
- Scalable Multi-group Key Management for Advanced Metering InfrastructureMourad Benmalek, Yacine Challal, Abdelmadjid Bouabdallah. 183-190 [doi]
- Personalized Privacy Aware Framework for Moving Objects in Participatory SensingDorothy Kalui, Xi Guo 0001, Dezheng Zhang, Yonghong Xie, Zhiyong Yang. 191-198 [doi]
- SMART: An Application Framework for Real Time Big Data Analysis on Heterogeneous Cloud EnvironmentsJulio C. S. dos Anjos, Marcos D. Assuncao, Jean Bez, Cláudio F. R. Geyer, Edison Pignaton de Freitas, Alexandre Carissimi, João Paulo Carvalho Lustosa Da Costa, Gilles Fedak, Felix Freitag, Volker Markl, Paul Fergus, Rubem Pereira. 199-206 [doi]
- Automatic Classification and Taxonomy Generation for Semi-structured DataBernardo Pereira Nunes, Giseli Rabello Lopes, Marco Antonio Casanova. 207-214 [doi]
- Artificial Intelligence for Detecting Preterm Uterine Activity in Gynecology and Obstetric CareIbrahim Olatunji Idowu, Paul Fergus, Abir Jaafar Hussain, Chelsea Dobbins, Mohammed Khalaf, Raul V. Casana Eslava, Robert Keight. 215-220 [doi]
- A Novel Continuous Learning and Collaborative Decision Making Mechanism for Real-Time Cooperation of Humanoid Service RobotsMing Jiang, Li Zhang. 221-225 [doi]
- An Optimization to CHARM Algorithm for Mining Frequent Closed ItemsetsXin Ye, Feng Wei, Fan Jiang, Shaoyin Cheng. 226-235 [doi]
- An Associative Classifier Adopting Fuzzy Weighted Rules Based on Information GainYi Chai, Guixia Kang, Ningbo Zhang, Yanyan Guo, Jingning Wang. 236-243 [doi]
- Combining Fuzzy Rough Set with Salient Features for HRM ClassificationAsia L. Jabar, Tarik A. Rashid. 244-251 [doi]
- Diffusion Least Mean Square Algorithms with Zero-Attracting Adaptive CombinersFuxi Wen, Wei Liu. 252-256 [doi]
- Word-Sense Disambiguation of Korean Predicates Using Sejong Electronic Dictionary and Unsupervised LearningSangwook Kang, Yeontaek Oh, Minho Kim, Hyuk-Chul Kwon. 257-261 [doi]
- Marketing or Newsletter Sender Reputation System Using Association Analysis ConceptAkkarach Kawbunjun, Ubon Thongsatapornwatana, Woraphon Lilakiatsakun. 262-269 [doi]
- Feature Selection in Brain Computer Interface Using Genetics MethodAswinseshadri K., V. Thulasi Bai. 270-275 [doi]
- Online Pedestrian Tracking Using Ensemble Color FeatureBo Zhang, Yi Xu, Xiaokang Yang. 276-282 [doi]
- A Data-Driven Hybrid Optimization Model for Short-Term Residential Load ForecastingXiu Cao, Shuanshuan Dong, Zhenhao Wu, Yinan Jing. 283-287 [doi]
- A Neural Network Clamping Force Model for Bolt Tightening of Wind Turbine HubsEmanuele Lindo Secco, Atulya Nagar, Christian Deters, Helge A. Wurdemann, Hak-Keung Lam, Kaspar Althoefer. 288-296 [doi]
- WARank: Weighted Asymmetric Ranking for Approximate Nearest Neighbor SearchYuan Cao, Heng Qi, Keqiu Li, Yingwei Jin, Zhiyang Li. 297-304 [doi]
- Fault Detection and Classification Based on PCA and N-LMCXiaoqin Zhang, Feng Liu. 305-312 [doi]
- An Approach of Vector Space Model to Link Concrete Concepts with Wiki EntitiesLucas Borges Monteiro, Weigang Li, Ahmed Abdelfattah Saleh. 313-320 [doi]
- Multi-model or Single Model? A Study of Movie Box-Office Revenue PredictionGuijia He, Soowon Lee. 321-325 [doi]
- An Experimental Evaluation of Aggregation Algorithms for Processing Top-K QueriesLiang Zhu, Qin Ma, Weiyi Meng, Mingqian Yang, Fang Yuan. 326-333 [doi]
- Model-Based Self-Tuning PI Control of Bolt-Nut Tightening for Wind Turbine Bearing AssemblyChristian Deters, Hak-Keung Lam, Mark Barrett-Baxendale, Emanuele Lindo Secco. 334-342 [doi]
- Efficient CP-ABE Attribute/Key Management for IoT ApplicationsLyes Touati, Yacine Challal. 343-350 [doi]
- A Proactive Multi-type Context-Aware Recommender System in the Environment of Internet of ThingsYassmeen Salman, Abdallatif S. Abu-Issa, Iyad Tumar, Yousef Hassouneh. 351-355 [doi]
- Fog Computing in Healthcare Internet of Things: A Case Study on ECG Feature ExtractionTuan Nguyen Gia, Mingzhe Jiang, Amir-Mohammad Rahmani, Tomi Westerlund, Pasi Liljeberg, Hannu Tenhunen. 356-363 [doi]
- Rail Internet of Things: An Architectural Platform and Assured Requirements ModelMahmoud Hashem Eiza, Martin Randles, Princy Johnson, Nathan Shone, Jennifer Pang, Amhmed Bhih. 364-370 [doi]
- Towards a UML Profile for Privacy-Aware ApplicationsTânia Basso, Leonardo Montecchi, Regina Moraes, Mario Jino, Andrea Bondavalli. 371-378 [doi]
- Towards the Use of Unmanned Aerial Vehicles for Automatic Power Meter ReadingsJose Rodrigues Torres Neto, Roberto Sadao Yokoyama, Azzedine Boukerche, Daniel Ludovico Guidoni, Rodolfo Ipolito Meneguette, Leandro Aparecido Villas. 379-386 [doi]
- Semantic Web Services Discovery Adopting SERINJosé Renato Villela Dantas, Hermano Albuquerque Lira, Bruno de Azevedo Muniz, Tadeu Matos Nunes, Pedro Porfírio Muniz Farias. 387-394 [doi]
- A Taxonomy-Based Evaluation of Personalized E-AdvertisementDana Al Qudah, Alexandra I. Cristea, Suncica Hadzidedic Bazdarevic, Samar Al-Saqqa, Rizik M. H. Al-Sayyad. 395-402 [doi]
- Linux Enriched Design in Third Generation Wireless Open Access Research PlatformMuhammad Saad Saud, Anton Paatelma, Markku Jokinen, Tuomo Hänninen. 403-409 [doi]
- An Attributed Predicate RDFDewi Wisnu Wardani, Josef Küng. 410-416 [doi]
- A Method of Handling Control Dependence in Dynamic Taint AnalysisXuefei Wang, Hengtai Ma, Ke Yang. 417-422 [doi]
- Dynamically Evolving Annotation-Based Variability for Runtime AdaptationQinghua Zeng, Yinliang Zhao, Tan Tan, Bo Han. 423-430 [doi]
- An Extension of UML Activity Diagram to Model the Behaviour of Context-Aware SystemsAhmed Al-alshuhai, François Siewe. 431-437 [doi]
- A Dynamic Power-Aware Scheduling of Mixed-Criticality Real-Time SystemsIjaz Ali, Jun-Ho Seo, Kyong Hoon Kim. 438-445 [doi]
- Improving Network Efficiency with SimplemuxJosé Saldaña, Ignacio Forcen, Julián Fernández-Navajas, José Ruíz-Mas. 446-453 [doi]
- The Impact of Heterogeneous Spreading Abilities of Network Ties on Information SpreadingChengeng Ou, Xiaolong Jin, Yuanzhuo Wang, Wei Chen, Xueqi Cheng. 454-460 [doi]
- Technology and Information Trust for Supporting Risky Decisions Based on Social-Media ContentJason R. C. Nurse, Michael Goldsmith, Sadie Creese, Koen Lamberts. 461-468 [doi]
- Network Quality Adaptive Video TransmissionFakher Oueslati, Jean-Charles Grégoire. 469-476 [doi]
- DICE: A Distributed Protocol for Camera-Aided Video SurveillanceHanna Kavalionak, Claudio Gennaro, Giuseppe Amato, Carlo Meghini. 477-484 [doi]
- Recommendation Systems Based on Online User's ActionAymen Elkhelifi, Firas Ben Kharrat, Rim Faiz. 485-490 [doi]
- Videoconferencing over OpenFlow Networks: An Optimization Framework for QoS RoutingDjamel-Eddine Henni, Abdelghani Ghomari, Yassine Hadjadj Aoul. 491-496 [doi]
- Scorpion: A Solution Using Cooperative Rerouting to Prevent Congestion and Improve Traffic ConditionAllan Mariano de Souza, Roberto Sadao Yokoyama, Leonardo Castro Botega, Rodolfo Ipolito Meneguette, Leandro Aparecido Villas. 497-503 [doi]
- ETBAC-Based Model in Media Oriented System Transport NetworkShuaibing Lu, Zhiyi Fang, Guannan Qu, Song Gao. 504-511 [doi]
- CHOKeD: Fair Active Queue ManagementSanaullah Manzoor, Ghulam Abbas, Masroor Hussain. 512-516 [doi]
- On-the-Fly Process Resource Quarantine for System StabilizationGaku Nakagawa, Hirotaka Kawata, Shuichi Oikawa. 517-524 [doi]
- A Novel QoS Routing Method for LEO Rosette Constellation NetworkYuanyuan Zhang, Laitao Zhu, Jing Wu, Hao Jiang, Jianguo Zhou, TianYi Cao, Zijing Cheng, Zhaojun Wang. 525-531 [doi]
- Remote Temporal Couplers for Multiple Content SynchronizationRicardo Mendes Costa Segundo, Celso Alberto Saibel Santos. 532-539 [doi]
- Towards New Caching Strategy for Information-centric Networking Based on Data Proximity ControlAmine Abidi, Sonia Mettali Gammar. 540-547 [doi]
- A Robust Face Recognition System Based on Curvelet and Fractal Dimension TransformsAlaa S. Al-Waisy, Rami Qahwaji, Stanley S. Ipson, Shumoos Al-Fahdawi. 548-555 [doi]
- Accelerating Brain Simulations on Graphical Processing UnitsEngin Kayraklioglu, Tarek A. El-Ghazawi, Zeki Bozkus. 556-560 [doi]
- Graph Grammar for the Research Information Collection Method According to Research ActivitiesYouzou Miyadera, Chiaki Murakami, Koichi Anada, Yasuhiko Morimoto, Shoichi Nakamura, Hiroaki Kaminaga, Takeo Yaku. 561-567 [doi]
- BE-SIFT: A More Brief and Efficient SIFT Image Matching Algorithm for Computer VisionJian Zhao, Hengzhu Liu, Yiliu Feng, Shandong Yuan, Wanzeng Cai. 568-574 [doi]
- Robust Approach for Medical Data Classification and Deploying Self-Care Management System for Sickle Cell DiseaseMohammed Khalaf, Abir Jaafar Hussain, Dhiya Al-Jumeily, Russell Keenan, Paul Fergus, Ibrahim Olatunji Idowu. 575-580 [doi]
- Session Resumption-Based End-to-End Security for Healthcare Internet-of-ThingsSanaz Rahimi Moosavi, Tuan Nguyen Gia, Ethiopia Nigussie, Amir-Mohammad Rahmani, Seppo Virtanen, Hannu Tenhunen, Jouni Isoaho. 581-588 [doi]
- Context-Aware Clinical Knowledge Sharing in Cross-Boundary E-Health: A Conceptual ModelObinna Anya, Hissam Tawfik, Dhiya Al-Jumeily. 589-595 [doi]
- GARUDA: A New Geographical Accident Aware Solution to Reduce Urban CongestionAllan Mariano de Souza, Roberto Sadao Yokoyama, Nelson Luis Saldanha da Fonseca, Rodolfo Ipolito Meneguette, Leandro Aparecido Villas. 596-602 [doi]
- Stochastic Bounding Models for Performance Analysis of CloudsFarah Aït-Salaht, Hind Castel-Taleb. 603-610 [doi]
- Hybrid and Extensible Architecture for Cloud Infrastructure DeploymentEnrique Chirivella-Perez, Juan Gutierrez Aguado, José M. Claver, Jose M. Alcaraz Calero. 611-617 [doi]
- A New Lightweight Homomorphic Encryption Scheme for Mobile Cloud ComputingMohd Rizuan Baharon, Qi Shi, David Llewellyn-Jones. 618-625 [doi]
- Optimal Real Time Pricing Based on Income Maximization for Smart GridSahar Ahmadzadeh, Kun Yang. 626-631 [doi]
- Modelling the Data Aggregator Positioning Problem in Smart GridsGuilherme Rolim, Diego G. Passos, Igor M. Moraes, Célio Albuquerque. 632-639 [doi]
- A Zero-Penalty Container-Based Execution Infrastructure for Hadoop FrameworkHang Su, Jiafeng Zhu, Masood Mortazavi, Guangyu Shi, Dakai Zhu. 640-647 [doi]
- Middleware Reconfiguration Relying on Formal MethodsNelson Rosa. 648-655 [doi]
- An AGV Mechanism Based Secure Routing Protocol for Internet of ThingsYouhua Xia, Hui Lin, Li Xu. 662-666 [doi]
- Usage and Consequences of Privacy Settings in MicroblogsElena Daehnhardt, Nick K. Taylor, Yanguo Jing. 667-674 [doi]
- Association Rules Mining Based on Clustering Analysis and Soft SetsBo Li, Zheng Pei, Keyun Qin. 675-680 [doi]
- Big Data Analytics in MOOCsYanyan Zheng, Beibei Yin. 681-686 [doi]
- A Multi-criteria Review-Based Hotel Recommendation SystemYashvardhan Sharma, Jigar Bhatt, Rachit Magon. 687-691 [doi]
- The Belief Degrees of Fuzzy Linguistic Values Based on a Fuzzy Formal ContextLi Yan. 692-697 [doi]
- Recognition of Fuzzy Characters on Oracle-Bone InscriptionsFeng Gao, Jing Xiong, Yong-ge Liu. 698-702 [doi]
- LSA-Based Chinese-Slavic Mongolian NER DisambiguationYupeng Jiang, Hongxu Hou, Ping Yang. 703-708 [doi]
- Ontology Description of Chinese Character SemanticsJing Xiong, Xin Liu, Qingsheng Li. 709-713 [doi]
- Delaunay and Graph Modal-Based Bagua Layout Text Line Extraction for Shui ScriptGuofeng Zhang, Weiqin Zhang. 714-718 [doi]
- A Novel Dynamic Description and Generation Method for Chinese CharacterQingsheng Li, Quan Liu. 719-724 [doi]
- Power-Aware QoS Provisioning in OFDMA Small Cell NetworksAntonios G. Alexiou, Anastasios N. Bikos, Christos Bouras. 725-730 [doi]
- Power Management and Rate Control Mechanism for Wi-Fi Infrastructure NetworksChristos Bouras, Vaggelis Kapoulas, Kostas Stamos, Nikos Stathopoulos, Nikos Tavoularis. 731-736 [doi]
- Empirical Performance Models for V2V CommunicationsMiguel Sepulcre, Javier Gozálvez, Baldomero Coll-Perales, M. Carmen Lucas-Estan, Jose Ramon Gisbert. 737-742 [doi]
- SoCar: A Social Car2Car Framework to Refine Routes Information Based on Road Events and GPSWalter Balzano, Maria Rosaria Del Sorbo, Domenico del Prete. 743-748 [doi]
- Power Optimization Technique in Interference-Limited Femtocells in LTE and LTE Advanced Based Femtocell NetworksShahrukh Khan, Sahibzada Ali Mahmud. 749-754 [doi]
- Analyzing Linear Communication Networks Using the Ribosome Flow ModelYoram Zarai, Oz Mendel, Michael Margaliot. 755-761 [doi]
- A Novel Secure SDN/LTE Based Architecture for Smart Grid SecurityAsad Irfan, Nayab Taj, Sahibzada Ali Mahmud. 762-769 [doi]
- OpenGUFI: An Extensible Graphical User Flow Interface for an SDN-Enabled Wireless TestbedJoerg Schultz, Roman Szczepanski, Kay Haensge, Michael Maruschke, Nico Bayer, Hans Joachim Einsiedler. 770-776 [doi]
- HTTP Data Offloading Using Multipath TCP ProxyChristos Pollalis, Paris Charalampou, Efstathios Sykas. 777-782 [doi]
- Extending Event Elements of Business Process Model for Internet of ThingsHsiao-Hsien Chiu, Ming-Shi Wang. 783-788 [doi]
- Mapping Security Requirements to Identify Critical Security Areas of Focus in PaaS Cloud ModelsAlex Akinbi, Ella Pereira. 789-794 [doi]
- Lightweight Forensics Application: Lightweight Approach to Securing Mobile DevicesHelen Angela Brumfitt, Bob Askwith, Bo Zhou. 795-800 [doi]
- A Novel Network Topology in Underwater Visible Light Sensor NetworksShih-Hao Chang, Rubem Pereira, Kuei-Ping Shih. 801-805 [doi]
- Virtual Resource Allocation and Composition for Data Stream Processing of Online Auditing in Cloud ComputingLei Wang, Tuo Li. 806-813 [doi]
- A Study of a Virtual Network Embedding AlgorithmZhenhua Chen, Xiang-Wei Zheng, Dianjie Lu. 814-818 [doi]
- A Crisis Mitigation Policy for SLA Profit Maximization in Multitenant DatabaseZhenkun Wang, Yongqing Zheng, Lanju Kong, Zhiyong Chen. 819-824 [doi]
- REODM: Identify Local Outliers in Big DataYongchang Gao, Haowen Guan, Bin Gong. 825-830 [doi]
- Global Index Oriented Non-Shard Key for Multi-tenant DatabaseZongshui Xiao, Lanju Kong, Qingzhong Li, Cheng Pang. 831-836 [doi]
- An Intention-Topic Model Based on Verbs Clustering and Short Texts Topic MiningTingting Lu, Shifeng Hou, Zhenxiang Chen, LiZhen Cui, Lei Zhang. 837-842 [doi]
- Performance and Resource Prediction at High Utilization for N-Tier Service Systems in Cloud an Experiment Driven ApproachWenbin Zhang, Yuliang Shi, Lei Liu, LiZhen Cui, Yongqing Zheng. 843-848 [doi]
- Ontology-Based Requirements Generation for Credibility Validation of Safety-Critical SystemRui Li, Shilong Ma, Wentao Yao. 849-854 [doi]
- Method to Develop Coded Excitation for Velocimetry in Downhole DrillingWeijia Lu, Ran Niu, Longtao Yuan, Xin Qu, Heng Wu, Jing Ye. 855-860 [doi]
- Using Relational Algebra on the Specification of Real World ETL ProcessesVasco Santos, Orlando Belo. 861-866 [doi]
- An Empirical Evaluation of Software Quality Assurance Practices and Challenges in a Developing CountryOlaperi Yeside Sowunmi, Sanjay Misra. 867-871 [doi]
- Evaluating Open Source Software Quality Models Against ISO 25010Adewole Adewumi, Sanjay Misra, Nicholas Omoregbe. 872-877 [doi]
- IVOrpheus - A Proposal for Interaction by Voice Commands in Three-Dimensional Environments of Information VisualizationLennon Furtado, Brunelli Miranda, Nelson Neto, Bianchi Serique Meiguins. 878-883 [doi]
- Evaluating User Influence Based on the Properties of User in Social NetworksYong Yao, Bian Li, Lei Peng. 884-888 [doi]
- Dealing with Uncertainties in Software Project ManagementMarcelo L. M. Marinho, Suzana Sampaio, Alexandre Luna, Telma Lima, Hermano P. Moura. 889-894 [doi]
- Towards a Distinction between Application State Resources and Data Resources in ROATadeu Matos Nunes, Pedro Porfírio Muniz Farias, José Renato Villela Dantas, Hermano Albuquerque Lira, Bruno de Azevedo Muniz, Luiz Henrique S. Felix. 895-900 [doi]
- Mining Binary Data with Matrix AlgebraRitu Chaturvedi, Christie I. Ezeife. 901-906 [doi]
- Rankboost-Based Result MergingBenjamin Ghansah, Shengli Wu, Nathaniel Ghansah. 907-914 [doi]
- Blind Detection of Image Splicing Based on Fuzzy Run-LengthZenan Shi, Xuanjing Shen, Haipeng Chen, Xiang Li. 915-920 [doi]
- ITSR-HISL: An Improved Model for Trajectory Signature Recognition in Human Interactive Sign LanguageNehal F. Attia, Sherin M. Youssef, Saleh M. Elkaffas. 921-926 [doi]
- Adaptive Context-Sensitive Spelling Error Correction Techniques for the Extremely Unpredictable Error Generating Language EnvironmentsMinho Kim, Sung-Ki Choi, Jingzhi Jin, Hyuk-Chul Kwon. 927-930 [doi]
- Practical Target Word Selection Method in Korean to Korean Sign Language Machine TranslationMinho Kim, Sung-Ki Choi, Ae-sun Yoon, Hyuk-Chul Kwon. 931-934 [doi]
- Methodology for an Open Digital Forensics Model Based on CAINECasimer DeCusatis, Aparicio Carranza, Alassane Ngaide, Sundas Zafar, Nestor Landaez. 935-940 [doi]
- A Reliable Crisis Information System to Share Data after the Event of a Large-Scale DisasterMarcello Cinque, Domenico Cotroneo, Christian Esposito, Mario Fiorentino, Stefano Russo. 941-946 [doi]
- Use Cases and Development of Software Defined Networks in OpenStackArti Mann, Wei Wei, Ravi Badana, Tong Zhang, T. Andrew Yang. 947-953 [doi]
- Euclidean Distance-Based QoS Metric for Dynamic MAP Selection in HMIPv6 NetworkEsad Kaduic, Nataa ivic, Mirko krbic, Mesud Hadzialic, Narcis Behlilovic. 954-958 [doi]
- Real Time Bi-directional Traffic Management Support System with GPS and WebSocketMd. Rahatur Rahman, Shamim Akhter. 959-964 [doi]
- Power System Applications Integration for the Smart GridDo-Eun Oh, Hyun Soo Kim. 965-969 [doi]
- Static Group Privacy Protection Mechanism Based on Cloud ModelRuxiang Zhai, Kun Zhang, Mingjun Liu. 970-974 [doi]
- Tracking File's Metadata from Computer Memory AnalysisKhairul Akram Zainol Ariffin, Ahmad Kamil Mahmood, Jafreezal Jaafar, Solahuddin Shamsuddin. 975-980 [doi]
- Facial Expression Recognition with sEMG MethodMingzhe Jiang, Amir-Mohammad Rahmani, Tomi Westerlund, Pasi Liljeberg, Hannu Tenhunen. 981-988 [doi]
- A Correlated Topic Modeling Approach for Facial Expression RecognitionRouxin Sang, K. P. Chan. 989-993 [doi]
- Improving Camera Pose Estimation for Indoor Marker-less Augmented RealitySud Sudirman, Abdennour El Rhalibi. 994-999 [doi]
- Intelligent Mobile Framework Based on Swarm ComputationXinzheng Niu, Dazhuang Su, Minhao Cheng. 1000-1006 [doi]
- A Web Service Composition Method Based on Merging Genetic Algorithm and Ant Colony AlgorithmZhengde Zhao, Xin Hong, Shaohua Wang. 1007-1011 [doi]
- The Research on Collaborative Filtering Recommendation Algorithm Based on Improved Clustering ProcessingShaohua Wang, Zhengde Zhao, Xin Hong. 1012-1015 [doi]
- The Video Recommendation System Based on DBNHongliang Cui, Xiaona Qin. 1016-1021 [doi]
- Content-centric Network-Based MANET for Streaming Video TransmissionOlfa Ben Rhaiem, Lamia Chaari Fourati, Anis Masmoudi. 1022-1027 [doi]
- A Fast and Accurate Iris Localization Technique for Healthcare Security SystemAlaa S. Al-Waisy, Rami Qahwaji, Stanley S. Ipson, Shumoos Al-Fahdawi. 1028-1034 [doi]
- An Automatic Corneal Subbasal Nerve Registration System Using FFT and Phase Correlation Techniques for an Accurate DPN DiagnosisShumoos Al-Fahdawi, Rami Qahwaji, Alaa S. Al-Waisy, Stan Ipsopn. 1035-1041 [doi]
- Breast Cancer Detection Using 1D, 2D, and 3D FDTD Numerical MethodsA. F. Mirza, F. Abdulsalam, Rameez Asif, Y. A. S. Dama, M. M. Abusitta, Fauzi Elmegri, Raed A. Abd-Alhameed, James M. Noras, R. Qahwaji. 1042-1045 [doi]
- The Application of Full-Field Optical Coherence Tomography on Evaluating Film Coating of Pharmaceutical PelletsJinke Zhang, Yaochun Shen, Yalin Zheng. 1046-1050 [doi]
- Smart Bolus Estimation Taking into Account the Amount of Insulin on BoardAhmad M. Al-Taee, Majid A. Al-Taee, Waleed Al-Nuaimy, Zahra J. Muhsin, Hamzah S. AlZu'bi. 1051-1056 [doi]
- Channel Estimation for OFDM FFT/DWT in Multi-carrier Modulation Used in Wireless TelemedicineH. S. O. Migdadi, H. A. Obeidat, Kelvin O. O. Anoh, N. N. Khatib, James M. Noras, R. Qahwaji, Raed A. Abd-Alhameed. 1057-1062 [doi]
- Wear-I: A New Paradigm in Wearable Computing (Invited Paper)Jianhua Ma, Runhe Huang. 1063-1068 [doi]
- Beaconless Geographic Routing Protocol with Adaptive Delay Timer in Wireless Sensor NetworksJeongcheol Lee, SeokYoon Kang, Chung-Jae Lee, Kyong Hoon Kim, Ki-Il Kim. 1069-1073 [doi]
- Energy-Efficient Location Estimation Using Variable Range Beacons in Wireless Sensor NetworksMuhammad Farooq-i-Azam, Qiang Ni, Ejaz A. Ansari, Haris Pervaiz. 1074-1079 [doi]
- Energy Efficient Adaptive Cooperative Communications in Wireless Sensor NetworksRadwa Ahmed Osman, Xiao-Hong Peng, Zuoyin Tang. 1080-1086 [doi]
- XML Based Wireless Patient Monitoring System Using Vehicular Ad-Hoc NetworksAvleen Kaur Malhi, Shalini Batra. 1087-1094 [doi]
- When Smart Phone Meets Vehicle: A New On-Board Unit Scheme for VANETsXiuqi Li, Yong Feng, Feng Wang, Qian Qian. 1095-1100 [doi]
- Probabilistic Area-Based Dissemination for Heterogeneous Transmission Ranges in Vehicular Ad-Hoc NetworksMaryam M. Alotaibi, Hussein T. Mouftah. 1101-1108 [doi]
- A Decentralized Batch-Based Group Key Management Protocol for Mobile Internet of Things (DBGK)Mohammed Riyadh Abdmeziem, Djamel Tandjaoui, Imed Romdhani. 1109-1117 [doi]
- A Dynamic Power Tuning for the Constrained Application Protocol of Internet of ThingsMamoun Qasem, Ahmed Yassin Al-Dubai, Imed Romdhani, Muneer Bani Yassien. 1118-1122 [doi]
- E-Trickle: Enhanced Trickle Algorithm for Low-Power and Lossy NetworksBaraq Ghaleb, Ahmed Yassin Al-Dubai, Elias Ekonomou. 1123-1129 [doi]
- Exploring Accuracy-Cost Tradeoff in In-Home Living Activity Recognition Based on Power Consumptions and User PositionsKenki Ueda, Hirohiko Suwa, Yutaka Arakawa, Keiichi Yasumoto. 1130-1137 [doi]
- Bootstrapping Personalised Human Activity Recognition Models Using Online Active LearningTudor Miu, Paolo Missier, Thomas Plötz. 1138-1147 [doi]
- Minutiae Based Automatic Fingerprint Recognition: Machine Learning ApproachesAmjad Ali, Rehanullah Khan, Irfan Ullah, Adnan Daud Khan, Abid Munir. 1148-1153 [doi]
- Automatic Animal Detection from Kinect Sensed Images for Livestock Monitoring and AssessmentQiming Zhu, Jinchang Ren, David Barclay, Samuel McCormack, Willie Thomson. 1154-1157 [doi]
- Temporal Recursive Pedestrian Trajectory Identification for Multi-camera Surveillance SystemCong Shen, Rong Xie, Liang Zhang. 1158-1163 [doi]
- ECG Security Identification System on the Zynq SoC PlatformXiaojun Zhai, Abbes Amira, Faycal Bensaali. 1164-1169 [doi]
- Integration of QoS Parameters from IEEE 802.11s WLAN Mesh Networks into Logical P2P OverlaysMichael Rethfeldt, Peter Danielis, Bjorn Konieczek, Felix Uster, Dirk Timmermann. 1170-1177 [doi]
- A New Relay Node Selection Model for Wireless Community Mesh NetworksLiang Zhao, Ahmed Yassin Al-Dubai, Xianwei Li, Guolong Chen. 1178-1185 [doi]
- Joint Relay Selection and Resource Allocation for D2D-Enabled Cellular CommunicationsGuopeng Zhang, Ru Wang, Shuanshuan Wu, Lin Chen, Bo Dai, Kun Yang, Liqiang Zhao. 1186-1192 [doi]
- Adaptive Current Level Control Algorithm For Battery-Powered ZigBee Network in Enterprise SettingsYitian Zhang, Kun Yang, Xiao Wang. 1193-1199 [doi]
- Increasing Interference Robustness of WiFi Fingerprinting by Leveraging Spectrum InformationFilip Lemic, Arash Behboodi, Vlado Handziski, Adam Wolisz. 1200-1208 [doi]
- Channel Capacity Analysis of Blood Capillary-Based Molecular CommunicationYue Sun, Kun Yang, Qiang Liu. 1209-1215 [doi]
- Performance Investigation and Comparison between Virtual Networks and Physical Networks Based on an Advanced Testbed NetworkTong Li, Xiaodan Zhang, Zongzhen Liu, Jingguo Ge, Zhongjiang Yao, Yuepeng E, Yulei Wu, Lei Zhang. 1216-1221 [doi]
- Prototyping and In-Depth Analysis of Big Data BenchmarkingDivya Pandove, Shivani Goel. 1222-1229 [doi]
- Pota: Maximizing Profit for Task-Level Scheduling for Data Center NetworksXiaoyi Tao, Heng Qi, Wenxin Li, Keqiu Li, Yingwei Jin. 1230-1237 [doi]
- A Data Imputation Method Based on Deep Belief NetworkZhikui Chen, Siqian Liu, Kunyou Jiang, Han Xu, Xinru Cheng. 1238-1243 [doi]
- DRISTI: Distributed Real-Time In-Situ Seismic Tomographic ImagingGoutham Kamath, Wen-Zhan Song, Paritosh Ramanan, Lei Shi, Junjie Yang. 1244-1251 [doi]
- Load Scheduling Based on an Advanced Real-Time Price Forecasting ModelXing Luo, Xu Zhu, Eng Gee Lim. 1252-1257 [doi]
- On the Implementation of RT-FAIR Scheduling Framework in LinuxHang Su, Dakai Zhu, Jiafeng Zhu. 1258-1265 [doi]
- Developing Energy-Aware Task Allocation Schemes in Cloud-Assisted Mobile WorkflowsBo Gao, Ligang He, Xin Lu, Cheng Chang, Kenli Li, Keqin Li. 1266-1273 [doi]
- A Smartphone Management Method to Save Battery Using Bayesian Networks and Fuzzy SystemJun-Ho Kim, Sung-Bae Cho. 1274-1279 [doi]
- DIVINE: Building a Wearable Device for Intelligent Control of Environment Using Google GlassTamir Sobeih, Nick Whittaker, Liangxiu Han. 1280-1285 [doi]
- Cost-Effective Hybrid Replacement Strategy for SSD in Web CacheQu Li, Xiaofei Liao, Hai Jin, Li Lin, Xia Xie, Qiongjie Yao. 1286-1294 [doi]
- Analysis of Urban Residential Water Consumption Based on Smart Meters and Fuzzy ClusteringJi Yang, Yong Li, Nan Feng Zhang, Jing Feng Yang, Ke Kuang, Yue-Hua Hu, Wen Guang Qi. 1295-1301 [doi]
- Response Time in Switching Scents When Converting ScenesShutaro Homma, Eri Matsuura, Sayaka Matsumoto, Shohei Horiguchi, Ken-ichi Okada. 1302-1307 [doi]
- COVER: A Cooperative Virtual Force Robot Deployment TechniqueGamal Sallam, Uthman Baroudi. 1308-1315 [doi]
- Assessing Physical Location as a Potential Contextual Cue For Adaptive Mobile Contact ListsAthanasios Plessas, Olga Georgiadou, Vasilios Stefanis, Andreas Komninos, John D. Garofalakis. 1316-1324 [doi]
- Anti-counterfeiting Using Irregularities of Magnetic Flux DensityHyunho Kang, Keiichi Iwamura. 1325-1329 [doi]
- A Map-Reduce Method for Training Autoencoders on Xeon PhiQiongjie Yao, Xiaofei Liao, Hai Jin. 1330-1337 [doi]
- Universal Random Number Generation with Field-Programmable Analog Array and Magnetic Tunneling Junction (MTJ) DevicesYu Bai, Mingjie Lin. 1338-1343 [doi]
- Integrated QoS Assessment of Web ServicesOlga Georgieva, Dessislava Petrova-Antonova. 1344-1348 [doi]
- On Induced Soft Sets and Topology for the Parameter Set of a Soft SetZhicai Liu, Keyun Qin, Zheng Pei, Jin Liu. 1349-1353 [doi]
- A Consensus Model for Multiple Criteria Group Decision Making under Linguistic EnvironmentFen Zou, Liangzhong Yi, Zheng Pei, Jing Liu. 1354-1359 [doi]
- Entropy on Interval-Valued Intuitionistic Fuzzy Soft SetYaya Liu, Keyun Qin. 1360-1365 [doi]
- The Rough Set Model Based on Grade Indiscernibility RelationJunfang Luo, Keyun Qin. 1366-1371 [doi]
- Estimation of Physical Activity Walking in Different Slopes Based on Accelerometer ApproachKai He, Jing-Xian Yao, Hsien-Tsung Chang. 1372-1376 [doi]
- Energy-Efficient Multimedia Multicast Scheduling and Resource Allocation Algorithms for OFDMA-Based SystemsShih-Lin Wu, Wei-Wen Wang. 1377-1382 [doi]
- Efficient Strategies of Compressing Three-Dimensional Sparse Arrays Based on Intel XEON and Intel XEON Phi EnvironmentsChun-Yuan Lin, Huang-Ting Yen, Che-Lun Hung. 1383-1388 [doi]
- Trusted Platform Based Linux File Access ControlGuang-liang Guo, Quan Qian. 1389-1394 [doi]
- Efficient Brain MRI Segmentation Algorithm on TK1Che-Lun Hung, Chun-Yuan Lin, Yuan-Huai Wu, Hsiao-Hsi Wang, Yu-Chen Hu. 1395-1399 [doi]
- Voice Helper: A Mobile Assistive System for Visually Impaired PersonsKuei-Chun Liu, Ching-Hung Wu, Shau-Yin Tseng, Yin-Te Tsai. 1400-1405 [doi]
- Walk and Jog Characterization Using a Triaxial AccelerometerJose David Lopez, Angela Sucerquia, Leonardo Duque-Muñoz, Francisco Vargas-Bonilla. 1406-1410 [doi]
- Activity Tracker and ElderlyPeter Rasche, Matthias Wille, Sabine Theis, Katharina Schaefer, Christopher M. Schlick, Alexander Mertens. 1411-1416 [doi]
- Introducing Digital Wellness: Bringing Cyberpsychological Balance to Healthcare and Information TechnologyCiaran McMahon, Mary Aiken. 1417-1422 [doi]
- Clustering of Physical Activities for Quantified Self and mHealth ApplicationsChelsea Dobbins, Reza Rawassizadeh. 1423-1428 [doi]
- A Simple Software Development Methodology Based on MVP for Android Applications in a Classroom ContextCarmen N. Ojeda-Guerra. 1429-1434 [doi]
- Travel Time Prediction on HighwaysJan Rupnik, John Davies, Blaz Fortuna, Alistair Duke, Sandra Stincic Clarke. 1435-1442 [doi]
- A Combined Smartphone and Smartwatch Fall Detection SystemThomas Vilarinho, Babak A. Farshchian, Daniel Gloppestad Bajer, Ole Halvor Dahl, Iver Egge, Sondre Steinsland Hegdal, Andreas Lones, Johan N. Slettevold, Sam Mathias Weggersen. 1443-1448 [doi]
- CoRFL: A Connectivity Restoration Mechanism Using Fuzzy Logic in Wireless Actor and Sensor NetworksUthman Baroudi, Mohammed Aldarwbi. 1449-1454 [doi]
- Inspired Counter Based Broadcasting for Dynamic Source Routing in Mobile NetworksMuneer O. Bani Yassein, Ahmed Yassin Al-Dubai. 1455-1459 [doi]
- Development of ZigBee Triaxial Accelerometer Based Human Activity Recognition SystemS. Irene, N. M. Shwetha, P. Haribabu, R. Pitchiah. 1460-1466 [doi]
- Towards a Holistic Multi-cloud Brokerage System: Taxonomy, Survey, and Future DirectionsBandar Aldawsari, Thar Baker, David England. 1467-1472 [doi]
- C2@home - A Novel User-Side Cloud-of-Clouds Management ArchitectureAntonella Di Stefano, Giovanni Morana, Daniele Zito. 1473-1480 [doi]
- Wireless Location Estimation Using Virtual ForcesFahed H. Awad. 1481-1486 [doi]
- Towards a Mobile Assistive Technology for Monitoring and Assessing Cognitive Fatigue in Individuals with Acquired Brain InjuryEdward Price, George Moore, Leo Galway, Mark Linden. 1487-1491 [doi]
- Probabilistic Estimation of Resource Affinities of Processes in Computing SystemsSusmit Bagchi. 1492-1497 [doi]
- Towards a Semantic Layer to Support Road and Public Transport User Decision-MakingNicholas Gould, David Atkin. 1498-1503 [doi]
- Development of an Integrated Agent for Greener Airport OperationsZhexing Yan, Mahroo Eftekhari. 1504-1509 [doi]
- Big Data Computation for Workshop-Based Planning SupportJianguang Tu, Jianquan Cheng, Liangxiu Han. 1510-1514 [doi]
- Implementation of the Big Data Management System for Demand Side Energy ManagementJungin Choi, Mijeom Kim, Jaeweon Yoon. 1515-1520 [doi]
- POPmine: Tracking Political Opinion on the WebPedro Saleiro, Silvio Amir, Mário Silva, Carlos Soares. 1521-1526 [doi]
- Nudge Better Quantified-Self with Context-Aware and Proactive ServicesLi Guo. 1527-1532 [doi]
- Towards a Heterogeneous Compute Engine for Software Acceleration on Big Data InfrastructuresChristos Margiolas, Ioannis Manousakis. 1533-1537 [doi]
- Predictive Models for Energy-Efficient Clouds: An Analysis on Real-Life and Synthetic DataAlbino Altomare, Eugenio Cesario. 1538-1543 [doi]
- Towards Free Market Cloud ComputingJeremy Singer, Abyd Adhami, Colin Perkins. 1544-1547 [doi]
- Separating Gesture Detection and Application Control Concerns with a Multimodal ArchitectureLeonel Morgado, Bernardo Cardoso, Fausto de Carvalho, Luis Fernandes, Hugo Paredes, Luis Barbosa, Benjamim Fonseca, Paulo Martins, Ricardo Rodrigues Nunes. 1548-1553 [doi]
- The Potential of the Brain-Computer Interface for Learning: A Technology ReviewLeo Galway, Paul J. McCullagh, Gaye Lightbody, Chris P. Brennan, David Trainor. 1554-1559 [doi]
- Design of Novel Teaching Episodes in Medical Education Using Emerging Experiential Digital Assets: Technology Enabled Medical Education Beyond the GimmickyPanagiotis E. Antoniou, Eleni Dafli, Panagiotis D. Bamidis. 1560-1565 [doi]
- Simulating Nature for Elderly Users - A Design Approach for Recreational Virtual EnvironmentsJon Ram Bruun-Pedersen, Stefania Serafin, Lise Busk Kofoed. 1566-1571 [doi]
- Playing Immersive Games on the REVERIE PlatformIoannis Doumanis, Julie A. Wall, David S. Monaghan. 1572-1577 [doi]
- Hardware Interfaces for VR Applications: Evaluation on PrototypesMarkos Mentzelopoulos, Filippo Tarpini, Agazio Emanuele, Aristidis Protopsaltis. 1578-1583 [doi]
- The REVERIE Human Representation Addresses Issues Related to Virtual Presence, Communication, and Interaction in Collaborative Virtual EnvironmentsIoannis Doumanis, Daphne Economou, Nektarios Georgalas. 1584-1589 [doi]
- Lessons from Digital Puppetry: Updating a Design Framework for a Perceptual User InterfaceJeffrey Ferguson. 1590-1595 [doi]
- Survey on Clean Slate Cellular-IoT Standard ProposalsWael Guibène, Keith E. Nolan, Mark Y. Kelly. 1596-1599 [doi]
- Performance Evaluation of the RPL Protocol in Fixed and Mobile Sink Low-Power and Lossy-NetworksIsam Wadhaj, Istvan Kristof, Imed Romdhani, Ahmed Yassin Al-Dubai. 1600-1605 [doi]
- Performance Evaluation of RPL Objective FunctionsMamoun Qasem, Hussien Altawssi, Muneer Bani Yassien, Ahmed Yassin Al-Dubai. 1606-1613 [doi]
- Empirical Experiments for Sensors' Distance Estimation in Smart PlacesNadhir Ben Halima, Yaser M. Khamayseh, Wail Mardini, Abedl Rahman Almodawar. 1614-1619 [doi]
- Level Crossing Rate of Ratio of Product of Two k-u Random Variables and Nakagami-m Random VariableDragana Krstie, Imed Romdhani, M. Masadeh Bani Yassein, Sinia Minic, Goran Petkovic, Predrag Milacic. 1620-1625 [doi]
- Content-Based Video Quality Prediction Using Random Neural Networks for Video Streaming over LTE NetworksTarik Ghalut, Hadi Larijani, Ali Shahrabi. 1626-1631 [doi]
- OpenFlow 1.3 Extension for OMNeT++Mukhald A. Salih, John Cosmas, Yue Zhang. 1632-1637 [doi]
- Medium Access Control Protocol to Address Hidden Terminals in MU-MIMO WLANsSanjeeb Shrestha, Gengfa Fang, Eryk Dutkiewicz, Xiaojing Huang. 1638-1645 [doi]
- Hata Path Loss Model Tuning for Cellular Networks in Irbid CityOmar Banimelhem, Muneer M. Al-Zu'bi, Mohammad S. Al Salameh. 1646-1650 [doi]
- Hybrid Clustered Peer-Assisted DASH-SVC SystemRan Dubin, Ofer Hadar, Yariv Freifeld, Aviv Ruham, Amit Dvir, Nissim Harel, Refael Barkan. 1651-1656 [doi]
- Video Quality in 5G Networks: Context-Aware QoE Management in the SDN Control PlaneOlatunde Awobuluyi, James Nightingale, Qi Wang, Jose M. Alcaraz Calero. 1657-1662 [doi]
- Client QoE-Oriented Segment Selection for DASHMirghiasaldin Seyedebrahimi, Colin Bailey, Xiao-Hong Peng. 1663-1668 [doi]
- Anomalous Region Detection on the Mobility DataHuan Huo, Shangye Chen, Liang Song, Leiyu Ban, Zonghan Wu, Liang Liu, Liping Gao. 1669-1674 [doi]
- Block-Based Feature Adaptive Compressive Sensing for VideoXin Ding, Wei Chen, Ian J. Wassell. 1675-1680 [doi]
- Distributed Black Virus Decontamination and Rooted Acyclic OrientationsJie Cai, Paola Flocchini, Nicola Santoro. 1681-1688 [doi]
- Towards Automated Generation and Visualization of Hierarchical Attack Representation ModelsFangcheng Jia, Jin B. Hong, Dong Seong Kim. 1689-1696 [doi]
- Predicting the Effects of DDoS Attacks on a Network of Critical InfrastructuresWilliam Hurst, Nathan Shone, Quentin Monnet. 1697-1702 [doi]
- Efficient Discovery of Malicious Symptoms in Clouds via Monitoring Virtual MachinesSultan S. Alshamrani, Dariusz R. Kowalski, Leszek Antoni Gasieniec. 1703-1710 [doi]
- Efficient Event Detection in Social Media Data StreamsXiang Sun, Yan Wu, Lu Liu, John Panneerselvam. 1711-1717 [doi]
- A New Prime and Probe Cache Side-Channel Attack for Cloud ComputingYounis A. Younis, Kashif Kifayat, Qi Shi, Bob Askwith. 1718-1724 [doi]
- Evolutionary Virus Immune Strategy Based on Community VitalityCai Fu, Li Min, Jia Yang, Deliang Xu, Xiaoyang Liu, Lansheng Han. 1725-1732 [doi]
- CloudZombie: Launching and Detecting Slow-Read Distributed Denial of Service Attacks from the CloudSaeed Shafieian, Mohammad Zulkernine, Anwar Haque. 1733-1740 [doi]
- Detection and Prevention of Malicious Requests in ICN Routing and CachingEslam G. AbdAllah, Mohammad Zulkernine, Hossam S. Hassanein. 1741-1748 [doi]
- A Three-Stage Process to Detect Outliers and False Positives Generated by Intrusion Detection SystemsFatma Hachmi, Khadouja Boujenfa, Mohamed Limam. 1749-1755 [doi]
- A Cyber Security Ontology for BPMN-Security ExtensionsCurtis L. Maines, David Llewellyn-Jones, Stephen Tang, Bo Zhou. 1756-1763 [doi]
- An Empirical Risk Management Framework for Monitoring Network SecurityMalik Shahzad Kaleem Awan, Pete Burnap, Omer F. Rana. 1764-1771 [doi]
- Protecting Future Personal Computing: Challenging Traditional Network Security ModelsHelen Angela Brumfitt, Bob Askwith, Bo Zhou. 1772-1779 [doi]
- A Safety Concept for a Railway Mixed-Criticality Embedded System Based on Multicore PartitioningIrune Agirre, Mikel Azkarate-askasua, Asier Larrucea, Jon Perez, Tullio Vardanega, Francisco J. Cazorla. 1780-1787 [doi]
- A Modular Safety Case for an IEC 61508 Compliant Generic COTS ProcessorAsier Larrucea, Jon Perez, Roman Obermaisser. 1788-1795 [doi]
- Digital Memories Based Mobile User Authentication for IoTNathan Shone, Chelsea Dobbins, William Hurst, Qi Shi. 1796-1802 [doi]
- The Trustworthy Autonomic Interface Guardian Architecture for Cyber-Physical SystemsKevin G. Lyn, Lee W. Lerner, Christopher J. McCarty, Cameron D. Patterson. 1803-1810 [doi]
- ShutterRoller: Preserving Social Network Privacy towards High-Speed Domain GatewayBorui Yang, Jianxin Li, Lu Liu, Yingjie Cao, Hua Wei, Peiyuan Sun, Nannan Wu, Bo Li. 1811-1818 [doi]
- Identity-Based Association Protocols for Wireless Personal Area NetworksXin Huang, Paul Craig, Qinghua Wang. 1819-1826 [doi]
- Representation of Trust and Reputation in Self-Managed Computing SystemsJan Kantert, Sarah Edenhofer, Sven Tomforde, Christian Müller-Schloer. 1827-1834 [doi]
- Preserving Source-Location Privacy through Redundant Fog Loop for Wireless Sensor NetworksMianxiong Dong, Kaoru Ota, Anfeng Liu. 1835-1842 [doi]
- Simulation Environment Based on SystemC and VEOS for Multi-core Processors with Virtual AUTOSAR ECUsMoises Urbina, Zaher Owda, Roman Obermaisser. 1843-1852 [doi]
- Evaluation and Prevention of MAC Layer Misbehaviours in Public Wireless HotspotsChaminda Alocious, Hannan Xiao, Bruce Christianson, James A. Malcolm. 1853-1860 [doi]
- Enterprise Data Center Globality MeasurementRuairi de Fréin, Joel Pfaff, Thomas Pare. 1861-1869 [doi]
- Towards Efficient Dissemination and Filtering of XML Data StreamsKirill Belyaev, Indrakshi Ray. 1870-1877 [doi]
- CCTV as a Smart Sensor NetworkGiles Oatley, Tom Crick, Dee Bolt. 1878-1885 [doi]
- Take Off a Load: Load-Adjusted Video Quality Prediction and MeasurementRuairí de Fréin. 1886-1894 [doi]
- PAM: A Packet Manipulation Mechanism for Mitigating Crosstalk Faults in NoCsZahra Shirmohammadi, Mohsen Ansari, Sanaz Kazemi Abharian, Sepideh Safari, Seyed Ghassem Miremadi. 1895-1902 [doi]
- Correlation-Based Top-k Recommendation for Web ServicesQi Xie, Zibin Zheng, Lu Liu, Mengtian Cui. 1903-1909 [doi]
- The Impact of Hypervisor Scheduling on Compromising Virtualized EnvironmentsTsvetoslava Vateva-Gurova, Neeraj Suri, Avi Mendelson. 1910-1917 [doi]
- Incremental, Distributed, and Concurrent Scheduling in Systems-of-Systems with Real-Time RequirementsRoman Obermaisser, Ayman Murshed. 1918-1927 [doi]
- Diverse Compiling for Microprocessor Fault Detection in Temporal Redundant SystemsAndrea Höller, Tobias Rauter, Johannes Iber, Christian Kreiner. 1928-1935 [doi]
- Calligraphy Imitation System Based on Virtual Brush and Scale-Invariant Feature TransformZhu Li, Li Jun, Hu Tao, Xiang Jun. 1936-1941 [doi]
- Linear (k, n) Secret Sharing Scheme with Cheating DetectionYan-Xiao Liu, Zhi-Xiao Wang, Wen-Yao Yan. 1942-1947 [doi]
- A Fragment Classification Method Depending on Data TypeNing Zheng, JinLong Wang, Ting Wu, Ming Xu. 1948-1953 [doi]
- Don't Speak to Strangers: The Suspicious Strategy Can Help to Improve Cooperation in Spatial Donation GameHong Ding, Junyao Huang, Yuangfang Chen, Yizhi Ren. 1954-1959 [doi]
- A Secure Authentication Scheme for Session Initiation Protocol Based on Elliptic Curve CryptographyShehzad Ashraf Chaudhry, Khalid Mahmood, Husnain Naqvi, Muhammad Sher. 1960-1965 [doi]
- Counterfeiting and Defending the Digital Forensic ProcessAlvaro Botas, Ricardo J. Rodríguez, Teemu Väisänen, Patrycjusz Zdzichowski. 1966-1971 [doi]
- Mitigating Circumstances in Cybercrime: A Position PaperRaian Ali, John McAlaney, Shamal Faily, Keith Phalp, Vasilios Katos. 1972-1976 [doi]
- MP-Shield: A Framework for Phishing Detection in Mobile DevicesGiovanni Bottazzi, Emiliano Casalicchio, Davide Cingolani, Fabio Marturana, Marco Piu. 1977-1983 [doi]
- The Evidentiary Value of Link Files in Linux File System to Digital Forensic InvestigationTharmini Janarthanan, Shahrzad Zargari. 1984-1988 [doi]
- Fast Mining of Large-Scale Logs for Botnet Detection: A Field StudyGiovanni Bottazzi, Giuseppe Francesco Italiano. 1989-1996 [doi]
- Zero-Carbon Cloud: A Volatile Resource for High-Performance ComputingAndrew A. Chien, Rich Wolski, Fan Yang. 1997-2001 [doi]
- Use HDLC Principles for Distributed ApplicationsJustin Y. Shi. 2002-2009 [doi]
- AnkaCom: A Development and Experiment for Extreme Scale ComputingYasin Celik, Aakash Pradeep, Justin Y. Shi. 2010-2016 [doi]
- A Mobile Phone Device as a Biometrics Authentication Method for an ATM TerminalNabeel Ali Albahbooh, Patrick Bours. 2017-2024 [doi]
- Human-Computer Interaction System for Communications and ControlSvetla Radeva, Dimitar Radev. 2025-2030 [doi]
- Using Dropped Call as an Authentication FactorBalwinder Sodhi. 2031-2035 [doi]
- Function and Performance of Testing: Towards a Systemic ViewKrzysztof M. Brzezinski. 2036-2042 [doi]
- Autonomic Management Using Self-Stabilization for Hierarchical and Distributed MiddlewareMaurice Djibril Faye, Eddy Caron, Ousmane Thiare. 2043-2048 [doi]
- A Context Aware Reputation Mechanism for Enhancing Big Data Veracity in Mobile Cloud ComputingHui Lin, Jia Hu, Jiajia Liu, Li Xu, Yulei Wu. 2049-2054 [doi]
- Empirical Analysis of Rate Limiting + Leap Ahead (RL+LA) Countermeasure against Witty WormKhurram Shahzad, Steve Woodhead. 2055-2061 [doi]
- Fuzzy Inference Based Intrusion Detection System: FI-SnortNitin Naik. 2062-2067 [doi]
- Toward a Secure Android Software Protection SystemJunfeng Xu, Li Zhang, Yunchuan Sun, Dong Lin, Ye Mao. 2068-2074 [doi]
- Computational Objectivity in Depression Assessment for Unstructured Large DatasetsAaron Johnson, Paul Holmes, Lewis Craske, Marcello Trovati, Nik Bessis, Peter Larcombe. 2075-2079 [doi]
- Investigation of Energy Efficiency on Cloud ComputingNathan Whittington, Lu Liu, Bo Yuan, Marcello Trovati. 2080-2087 [doi]
- A Semi-automated Assessment of the Direction of Influence Relations from Semantic Networks: A Case Study in Maths AnxietyMarcello Trovati, Jayne Trovati, Peter Larcombe, Lu Liu. 2088-2091 [doi]
- Reducing Vehicular Traffic Congestion Using Available Forward Road Capacity DetectionJames Hardy, Lu Liu. 2092-2097 [doi]
- Crowd Steering in Public Spaces: Approaches and StrategiesAndrea Sassi, Claudio Borean, Roberta Giannantonio, Marco Mamei, Dario Mana, Franco Zambonelli. 2098-2105 [doi]
- Performance Evaluation of Cyber-Physical Intrusion Detection on a Robotic VehicleTuan Phan Vuong, George Loukas, Diane Gan. 2106-2113 [doi]
- A Smartphone-Based System for Personal Data Management and Personality AnalysisAo Guo, Jianhua Ma. 2114-2122 [doi]
- A Novel Image Quality Assessment Method Based on Vision AttentionZehua Lan, Yu Li, Xingang Liu. 2123-2129 [doi]
- ShakeMe: Key Generation from Shared MotionHidir Yuzuguzel, Jari Niemi, Serkan Kiranyaz, Moncef Gabbouj, Thomas Heinz. 2130-2133 [doi]
- A Rule-Based Ontology Reasoning System for Context-Aware Building Energy ManagementJinsoo Han, Youn-Kwae Jeong, Il-Woo Lee. 2134-2142 [doi]
- A Convolutional Neural Network for Leaves Recognition Using Data AugmentationChaoyun Zhang, Pan Zhou, Cheng Hua Li, Lijun Liu. 2143-2150 [doi]
- Neural Networks Based Formation Control of Anti-ship Missiles with Constant VelocityYuan Wang, Yongkun Wang, Mingwei Sun, Shengzhi Du, Zengqiang Chen. 2151-2156 [doi]
- Interactive Display Services for Smart EnvironmentsJens Naber, Dominik Schäfer, Sebastian VanSyckel, Christian Becker. 2157-2164 [doi]
- Prevent Cooking Risks in Kitchen of Elderly People: Adaptable Reasoning Engine Based on Fuzzy Logic for Smart OvenBessam Abdulrazak, Rami Yared. 2165-2172 [doi]
- Parameter Optimisation for Location Extraction and Prediction ApplicationsAlasdair Thomason, Nathan Griffiths, Victor Sanchez. 2173-2180 [doi]
- Unified Structure and Data Driven Process for Knowledge Enrichment and Problem SolvingAtsushi Sato, Runhe Huang. 2181-2188 [doi]
- Cooperative Socio-aware Dynamic Backoff Optimization for Urban VANETsMatthias Sander Frigau. 2189-2197 [doi]
- A Secure Cooperative Spectrum Sensing Strategy for Distributed Cognitive Radio NetworksHui Lin, Jia Hu, Chuan Huang, Li Xu. 2198-2205 [doi]
- Backhaul Aggregation for Smart Homes in Heterogeneous Wireless NetworksMuhammad Asad Khan, Supeng Leng, Xiaoyan Huang, Jiechen Yin, Bo Fan. 2206-2211 [doi]
- FPGA Based Reconfigurable IPSec AH Core Suitable for IoT ApplicationsMuzaffar Rao, Thomas Newe, Ian Grout, Elfed Lewis, Avijit Mathur. 2212-2216 [doi]
- Coalition Based Bandwidth Allocation in Mobile Social NetworksBo Fan, Supeng Leng, Kun Yang, Geyong Min. 2217-2223 [doi]
- Context-Aware Service Discovery and Selection in Decentralized EnvironmentsMariwan Ahmed, Lu Liu, Bo Yuan, Marcello Trovati, James Hardy. 2224-2231 [doi]
- Pervasive Information Visualization: Toward an Information Visualization Design Methodology for Multi-device Co-located Synchronous CollaborationPaul Craig, Xin Huang, Huayue Chen, Xi Wang, Shiyao Zhang. 2232-2239 [doi]
- The Mobile Tree Browser: A Space Filling Information Visualization for Browsing Labelled Hierarchies on Mobile DevicesPaul Craig, Xin Huang. 2240-2247 [doi]
- The Robustness of Face-Based CAPTCHAsHaichang Gao, Lei Lei, Xin Zhou, Jiawei Li, Xiyang Liu. 2248-2255 [doi]
- Design and Verification of Heterogeneous Streaming Parallel Mechanisms on Kepler CUDAKailong Zhang, Shaoli Zhou, Liang Hu, Hang Su, Xiao Wu, Kejian Miao. 2256-2262 [doi]
- PSO Based Multiobjective Reliable Optimization Model for Cloud StorageXiyang Liu, Lei Fan, Liming Wang, Sha Meng. 2263-2269 [doi]
- Community Detection Algorithm Based on the Scale Free Property of NetworksXiyang Liu, Qiong Pan, Yingying An, Guimin Qin. 2270-2275 [doi]
- An Efficient Method for Document Categorization Based on Word2vec and Latent Semantic AnalysisRonghui Ju, Pan Zhou, Cheng Hua Li, Lijun Liu. 2276-2283 [doi]
- Water Quality Modeling for Pipeline Network Peripherals Based on Simulation of Water AgeJi Yang, Yong Li, Nan Feng Zhang, Jing Feng Yang, Jian Tang, Yong-xian Su. 2284-2290 [doi]
- Prediction and Guidance of Behaviour: A Web-Based Multipurpose Behaviour Intervention Investigation MethodologyYang Fu, Wenyan Wu. 2291-2296 [doi]
- Smart Health Monitoring Using the Advance Metering InfrastructureCarl Chalmers, William Hurst, Michael Mackay, Paul Fergus. 2297-2302 [doi]
- A Prostate Cancer Care Process Example of Using Data from Internet of ThingsEmmanuel Eyo Effiok, Enjie Liu, Hong Qing Yu, Jon Hitchcock. 2303-2308 [doi]
- Improving the Validity of Lifelogging Physical Activity Measures in an Internet of Things EnvironmentPo Yang, Martin Hanneghan, Jun Qi, Zhikun Deng, Feng Dong, Dina Fan. 2309-2314 [doi]
- Life-Logging Data Aggregation Solution for Interdisciplinary Healthcare Research and CollaborationZhikun Deng, Po Yang, Youbing Zhao, Xia Zhao, Feng Dong. 2315-2320 [doi]
- Improving Reliability of Message Broadcast over Internet of Vehicles (IoVs)Elias C. Eze, Sijing Zhang, Enjie Liu. 2321-2328 [doi]
- Investigating Big Data Healthcare Security Issues with Raspberry PiXiaohua Feng, Babatunde Onafeso, Enjie Liu. 2329-2334 [doi]
- MyHealthAvatar: A Case Study of Web-Based Interactive Visual Analytics of Lifestyle DataFarzad Parvinzamir, Youbing Zhao, Zhikun Deng, Xia Zhao, Nikolaos Ersotelos, Feng Dong, Enjie Liu, Gordon Clapworthy. 2335-2339 [doi]
- BPMN Security Extensions for Healthcare ProcessKoh Song Sang, Bo Zhou. 2340-2345 [doi]
- Cognitive Radio Aided Internet of Vehicles (IoVs) for Improved Spectrum Resource AllocationJoy Eze, Sijing Zhang, Enjie Liu, Elias E. Chinedum, Hong Qing Yu. 2346-2352 [doi]
- A Survey of Physical Activity Monitoring and Assessment Using Internet of Things TechnologyJun Qi, Po Yang, Dina Fan, Zhikun Deng. 2353-2358 [doi]
- Sentiment Analysis Using Convolutional Neural NetworkXi Ouyang, Pan Zhou, Cheng Hua Li, Lijun Liu. 2359-2364 [doi]
- Recognition of Dynamic Data Structures to Support Porting of Applications to the CloudBeniamino Di Martino, Antonio Esposito. 2365-2372 [doi]
- Assist-Me - A Volunteer Mobile Emergency System to Assist Elderly PeopleHady Khaddaj Mallat, Bessam Abdulrazak. 2373-2380 [doi]
- A Dining Context-Aware System with Mobile and Wearable DevicesKee-Hoon Kim, Sung-Bae Cho. 2381-2386 [doi]
- An Adaptable inVANETs-Based Intersection Traffic Control AlgorithmMourad Elhadef. 2387-2392 [doi]
- Relay Node Deployment for Wireless Sensor Networks Based on PSOYu Bao, Yuanping Wang, Liang Zhao, Yuan Hu, Aijuan Zhang. 2393-2398 [doi]