Abstract is missing.
- Generalized Concatenated Codes for Block and Device Failure ProtectionPeter Trifonov, Yuangang Wang. 1-9 [doi]
- Generating Test Suites with High 3-Way Coverage for Software TestingYasmeen Akhtar, Soumen Maity, Reshma C. Chandrasekharan. 10-17 [doi]
- Application Characterization Assisted System DesignI-Hsin Chung, Carlos H. A. Costa, Leopold Grinberg, Hui-Fang Wen. 18-25 [doi]
- Template4EHR: Building Dynamically GUIs for the Electronic Health Records Using ArchetypesAndre Magno Costa de Araujo, Valéria Cesário Times, Marcus Urbano da Silva, Danielle Santos Alves, Silvio Heverton Campelo de Santana. 26-33 [doi]
- Adaptation Aspects of AIDA ProgramsYutaka Watanobe, Nikolay N. Mirenkov, Mirai Watanabe. 34-41 [doi]
- Spatial Alloy: An Alloy Extension for Modeling Spatial PropertiesFei Tang, Jing Liu, Tingliang Zhou, Junfeng Sun, Haiying Sun. 42-49 [doi]
- inLoc: Location-Aware Emergency Evacuation AssistantKaan Eksen, Tacha Serif, George Ghinea, Tor-Morten Grønli. 50-56 [doi]
- QoE Control of Network Using Collective Intelligence of SNS in Large-Scale DisastersChihiro Maru, Miki Enoki, Akihiro Nakao, Shu Yamamoto, Saneyasu Yamaguchi, Masato Oguchi. 57-64 [doi]
- Reducing Risk of Rollover in Curve for Heavy-Duty Vehicles with an Agent-Based Advanced Driver Assistance SystemWilly Tiengo, Evandro de Barros Costa, Joseana M. Fechine. 65-72 [doi]
- Comparison of Accuracy and Precision of GPS-Enabled Mobile DevicesLeong Lee, Matthew Jones, Gregory S. Ridenour, Sam J. Bennett, Arisha C. Majors, Bianca L. Melito, Michael J. Wilson. 73-82 [doi]
- Drishti: A Mobile Application Based Multipurpose Surveillance SystemMd. Arifuzzaman, Md. Jahidul Islam, Sm Sazirul Islam, Rajesh Palit. 83-88 [doi]
- Brain Cancer Diagnosis-Association Rule Based Computational Intelligence ApproachJesmin Nahar, A. B. M. Shawkat Ali, Tasadduq Imam, Kevin Tickle, Yi-Ping Phoebe Chen. 89-95 [doi]
- The SmartPT: Wearble Sensor Integration and Tracking in Training EquipmentTeddy Falsen Hiis, Tor-Morten Grønli, Gheorghita Ghinea. 96-99 [doi]
- Development of an Android Service to add IOIO Hardware Features to Android AppsSlim Chtourou, Mohamed Kharrat, Nader Ben Amor, Mohamed Jallouli, Mohamed Abid. 100-103 [doi]
- Analysis of Complex Data in Telecommunications IndustryNayana Gupta, Mohammed Wasid, Rashid Ali. 104-107 [doi]
- A Statistical Technique for Online Anomaly Detection for Big Data Streams in Cloud Collaborative EnvironmentG. S. Smrithy, Ramadoss Balakrishnan. 108-111 [doi]
- Quantum Computing in Big Data Analytics: A SurveyTawseef Ayoub Shaikh, Rashid Ali. 112-115 [doi]
- Hosting Virtual IoT Resources on Edge-Hosts with BlockchainMayra Samaniego, Ralph Deters. 116-119 [doi]
- Campus Ride: An Environment-Friendly Ride Sharing Platform for Academic InstitutionsAnindya Chowdhury, Abid Jamal, Rubayath Alam, Rajesh Palit. 120-124 [doi]
- A Survey on Mobility Management Techniques in VANETsBilal Haider, Shagufta Henna, Ambreen Gul, Farhan Aadil. 125-133 [doi]
- Architecture for Hybrid Language SystemsMirai Watanabe, Yutaka Watanobe, Alexander Vazhenin. 134-139 [doi]
- Relative and Absolute Positioning in Ultra Dense Mems SystemDermas Moffo, Philippe Canalda, François Spies. 140-147 [doi]
- Ontology Techniques for Representing the Problem of Discourse: Design of Solution Application PerspectiveShah Jahan Miah, Hafizul Islam, Ahmad Z. H. Samsudin. 148-153 [doi]
- Implementation of Alternating Median Based Round Robin Scheduling AlgorithmSalman Arif, Naveed Ghaffar, Ali Javed. 154-160 [doi]
- Extracting Actions with Improved Part of Speech Tagging for Social Networking TextsAmeni Youssfi Nouira, Yassine Jamoussi, Henda Hajjami Ben Ghézela. 161-166 [doi]
- Community Detection for Cold Start Problem in Personalization: Community Detection is Large Social Network Graphs Based on Users' Structural Similarities and Their Attribute SimilaritiesAnkush Bhatia. 167-171 [doi]
- Degree of Integration into Social Networks (DISN) Evaluation Model Based on Micro-Blogging Platforms and Information Dissemination PredictionXi Chen, Jianwei Li, Zeyu Zheng, Tianran Wang. 172-176 [doi]
- Dynamic Community Mining and Tracking Based on Temporal Social Network AnalysisXiaokang Zhou, Wei Liang, Bo Wu, Zixian Lu, Shoji Nishimura, Takashi Shinomiya, Qun Jin. 177-182 [doi]
- User Actions and Timestamp Based Personalized Recommendation for E-Commerce SystemCongcong Chen, Dong Wang, Yue Ding. 183-189 [doi]
- An Improved Ant Colony Optimization Algorithm for Recommendation of Micro-Learning PathQin Zhao, Yueqin Zhang, Jian Chen. 190-196 [doi]
- QoS-Aware Traffic-Efficient Web Service Selection over BigData SpaceT. H. Akila S. Siriweera, Incheon Paik, Banage T. G. S. Kumara. 197-203 [doi]
- Joint Optimization of VM Placement and Rule Placement towards Energy Efficient Software-Defined Data CentersHong Yao, Hui Li, Chao Liu, Muzhou Xiong, Deze Zeng, Guohui Li. 204-209 [doi]
- Availability Modeling and Analysis of a Virtualized System Using Stochastic Reward NetsDong Seong Kim, Jin B. Hong, Tuan-Anh Nguyen, Fumio Machida, Jong Sou Park, Kishor S. Trivedi. 210-218 [doi]
- Native Web Communication Protocols and Their Effects on the Performance of Web Services and SystemsNitin Naik, Paul Jenkins, Philip Davies, David Newell. 219-225 [doi]
- High-Dimensional Crowdsourced Data Distribution Estimation with Local PrivacyXuebin Ren, Chia-Mu Yu, Weiren Yu, Shusen Yang, Xinyu Yang, Julie A. McCann. 226-233 [doi]
- Hurst Parameter Based Anomaly Detection for Intrusion Detection SystemSong Jin Yu, Pauline Koh, Hyukmin Kwon, Dong Seong Kim, Huy Kang Kim. 234-240 [doi]
- Hybrid Attack Path Enumeration System Based on Reputation ScoresYoung-Hoon Moon, Ji Hong Kim, Dong Seong Kim, Huy Kang Kim. 241-248 [doi]
- Security Modelling and Analysis of Dynamic Enterprise NetworksSimon Enoch Yusuf, Mengmeng Ge, Jin B. Hong, Huy Kang Kim, Paul Kim, Dong Seong Kim. 249-256 [doi]
- Performance Evaluation of a Game Theory-Based Fault Diagnosis Algorithm Under Partial Comparison SyndromeMourad Elhadef, Sofiane Grira. 257-264 [doi]
- Particle Swarm Stepwise Algorithm (PaSS) on Multicore Hybrid CPU-GPU ClustersMu Yang, Ray-Bing Chen, I-Hsin Chung, Weichung Wang. 265-272 [doi]
- Concept Drift Detection on Streaming Data under Limited LabelingYoung In Kim, Cheong Hee Park. 273-280 [doi]
- Bag-of-Concepts Document Representation for Bayesian Text ClassificationMarcos Mourino Garcia, Roberto Pérez-Rodríguez, Luis E. Anido-Rifón, Miguel A. Gómez Carballa. 281-288 [doi]
- Impact of Future Intelligent Information Technologies on the Methodology of Scientific ResearchAndrzej M. J. Skulimowski. 289-298 [doi]
- A Controlled Experiment Between Two Methods on Ten-Digits Air WritingYiming Zhou, Zeyang Dai, Lei Jing. 299-302 [doi]
- Distributed Multi-class Rule Based Classification Using RIPPERAruna Govada, Varsha S. Thomas, Ipsita Samal, Sanjay Kumar Sahay. 303-309 [doi]
- Feature Descriptors: A Review of Multiple Cues ApproachesCuong H. Pham, Yuichi Yaguchi, Keitaro Naruse. 310-315 [doi]
- Saliency Detection via Background Seeds Combined with Bayesian ModelLinhua Jiang, Pengfei Bai, Xiao Lin. 316-322 [doi]
- Piecewise Polynomial High-Order Hidden Markov Models with Applications in Speech RecognitionLee-Min Lee. 323-327 [doi]
- Sentence-Level Automatic Lecture Highlighting Based on Acoustic AnalysisXiaoyin Che, Sheng Luo, Haojin Yang, Christoph Meinel. 328-334 [doi]
- Micro-Scale Severe Weather Prediction Based on Region Trajectories Extracted from Meteorological Radar DataXingang Wang, Suiping Qi, Zhigang Gai, Hui Li, Enxiao Liu, Weihao Xie, Ding Hu. 335-338 [doi]
- Multi-way Clustering for Heterogeneous Information Networks with General Network SchemaJibing Wu, Yahui Wu, Su Deng, Hongbin Huang. 339-346 [doi]
- Tabu Approach for Adaptive Resource Allocation and Selection Carrier Aggregation in LTE-Advanced NetworkRadhia Khdhir, Kais Mnif, Aymen Belghith, Lotfi Kamoun. 347-353 [doi]
- Improving DHT Load Balance Using the ChurnQi Zhang, Shasha Li, Qingbo Wu, Jie Yu. 354-360 [doi]
- Reasonably Migrating Virtual Machine in NFV-Featured NetworksJing Xia, Deming Pang, Zhiping Cai, Ming Xu, Gang Hu. 361-366 [doi]
- Towards Privacy-Aware Web Services CompositionsImen Khabou, Mohsen Rouached, Rafik Bouaziz, Mohamed Abid. 367-374 [doi]
- Efficient Hybrid Encryption System Based on Block Cipher and Chaos GeneratorS. Kotel, F. Sbiaa, Zeghid Medien, Mohsen Machhout, Adel Baganne, Rached Tourki. 375-382 [doi]
- Analysis on Bidding Behaviours for Detecting Shill Bidders in Online AuctionsNazia Majadi, Jarrod Trevathan, Neil W. Bergmann. 383-390 [doi]
- A Selective Encryption Scheme with Multiple Security Levels for the H.264/AVC Video Coding StandardF. Sbiaa, S. Kotel, Zeghid Medien, Rached Tourki, Mohsen Machhout, Adel Baganne. 391-398 [doi]
- Request Evaluation for Policy-Based Attribute Access Control in Social Network CloudKatanosh Morovat, Brajendra Panda. 399-406 [doi]
- Probabilistic Inference on Twitter Data to Discover Suspicious Users and Malicious ContentPraveen Rao, Anas Katib, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla. 407-414 [doi]
- Enhancement of Permission Management for an ARM-Android PlatformRui Chang, Liehui Jiang, Wenzhi Chen, Hong-qi He, Shuiqiao Yang. 415-422 [doi]
- Comprehensive Analysis of Network Traffic DataYuantian Miao, Zichan Ruan, Lei Pan, Jun Zhang, Yang Xiang, Yu Wang. 423-430 [doi]
- Studying the Global Spreading Influence and Local Connections of Users in Online Social NetworksJiao Jiao Jiang, Youyang Qu, Shui Yu, Wanlei Zhou, Wei Wu. 431-435 [doi]
- A Performance and Energy Comparison of Fault Tolerance Techniques for Exascale Computing SystemsDaniel Dauwe, Sudeep Pasricha, Anthony A. Maciejewski, Howard Jay Siegel. 436-443 [doi]
- Peer-Assisted Streaming Distribution over CCNMeilian Lu, Danhua Sun, Yan Shi, Yuhong Li. 444-451 [doi]
- Community Detection in Location-Based Social Networks: An Entropy-Based ApproachJiahao Liu, You Li, Guohui Ling, Ronghua Li, Zibin Zheng. 452-459 [doi]
- Privacy-Enhanced Scheduling for Smart Power GridsPhilander Adriaan, Yan Bai, Donald Chinn. 460-467 [doi]
- Distributed Content Dissemination with a Rank FunctionAnna Kobusinska, Jerzy Brzezinski, Jakub Aftowicz, Grzegorz Grzelachowski. 468-475 [doi]
- An Android Malware Detection Approach Using Bayesian InferenceChe-Hsun Liu, Zhi-jie Zhang, Sheng-De Wang. 476-483 [doi]
- Knowledge Discovery from Big Social Key-Value DataCarson K. Leung, Peter Braun, Murun Enkhee, Adam G. M. Pazdor, Oluwafemi A. Sarumi, Kimberly Tran. 484-491 [doi]
- Supporting Edge Intelligence in Service-Oriented Smart IoT ApplicationsZhenqiu Huang, Kwei-Jay Lin, Chi-Sheng Shih. 492-499 [doi]
- Accuracy Improvement for Backup Tasks in Hadoop Speculative AlgorithmWorachate Apichanukul, Jun Kawahara, Shoji Kasahara. 500-507 [doi]
- CIDS: Adapting Legacy Intrusion Detection Systems to the Cloud with Hybrid SamplingQingtang Xia, Tianjia Chen, Wei Xu. 508-515 [doi]
- Cloud-Assisted Dynamic Content Sharing among VehiclesYoshiaki Adachi, Hirozumi Yamaguchi, Teruo Higashino, Takaaki Umedu. 516-523 [doi]
- A Traceable Signcryption Scheme for Secure Sharing of Data in Cloud StorageRohit Ahuja, Sraban Kumar Mohanty, Kouichi Sakurai. 524-531 [doi]
- A Scalable Integrated SDN and OpenStack Management SystemSing-Chi Chen, Ren-Hung Hwang. 532-537 [doi]
- A Highly Reliable Storage Based on SSD Array for Cloud Computing EnvironmentHooYoung Ahn, Junsu Kim, Yoonjoon Lee. 538-544 [doi]
- G-KVM: A Full GPU Virtualization on KVMHong-Cyuan Hsu, Che-Rung Lee. 545-552 [doi]
- Lightweight Feature Selection Methods Based on Standardized Measure of Dispersion for Mining Big DataSimon Fong, Robert P. Biuk-Aghai, Yain-Whar Si. 553-559 [doi]
- Fostering Collaborative Edge Service Provision in Community Clouds with DockerRoger Baig, Felix Freitag, Leandro Navarro. 560-567 [doi]
- Energy Aware Resource Management for MapReduce Jobs with Service Level Agreements in Cloud Data CentersAdam Gregory, Shikharesh Majumdar. 568-577 [doi]
- A Novel Storage Architecture for Facilitating Efficient Analytics of Health Informatics Big Data in CloudManish Kumar Pandey, Karthikeyan Subbiah. 578-585 [doi]
- The Major Research Themes of Big Data Literature: From 2001 to 2016Louis Y. Y. Lu, John S. Liu. 586-590 [doi]
- A Data Backup Algorithm Based on Failure Correlation in In-memory Storage SystemJianhua Gu, Xiaodong Dong. 591-598 [doi]
- Data Management for the RedisDG Scientific Workflow EngineLeila Abidi, Souha Bejaoui, Christophe Cérin, Jonathan Lejeune, Yanik Ngoko, Walid Saad. 599-606 [doi]
- ModelX: Using Model Checking to Find Design Errors of Cloud ApplicationsTian Tian, Yiming Zhang, Qiao Zhou, Ping Zhong. 607-610 [doi]
- Helmet Wearing Detection in Thailand Using Haar Like Feature and Circle Hough Transform on Image ProcessingPathasu Doungmala, Katanyoo Klubsuwan. 611-614 [doi]
- Intruder Detection Using Deep Learning and Association Rule MiningAsantha Thilina, Shakthi Attanayake, Sacith Samarakoon, Dahami Nawodya, Lakmal Rupasinghe, Nadith Pathirage, Tharindu Edirisinghe, Kesavan Krishnadeva. 615-620 [doi]
- Inter-organizational Middleware System Implementations: Dos and Donts of Business IntegrationRadhouane B. N. Jrad, David Sundaram. 621-628 [doi]
- Design and Development of a Mobile Application Based Drug Requisition SystemA. T. M. Mosharof Hossain, Nazia Hasan Tuktuki, Hasibul Kabir, Rajesh Palit. 629-636 [doi]
- CitizenConnect: Connecting Citizens with Public Service ProvidersMohammad Adnan Shahriar, Sadman Sakib, Rajesh Palit. 637-643 [doi]
- A Reference Architecture for the Logistics Service Map: Structuring and Composing Logistics Services in Logistics NetworksMichael Glöckner, André Ludwig, Bogdan Franczyk. 644-651 [doi]
- A Resource Scheduling Method with Rough Set for Virtual ClusterCunqun Fan, Xiangang Zhao, Manyun Lin, Lan Wei, Zhanyun Zhang, Xi Zhang, You Ma. 652-654 [doi]
- Heterogeneous and Homogeneous Samples with Different Weights for ClassificationBaoping Zou. 655-657 [doi]
- Byzantine Fault Tolerant Optimization in Federated Cloud ComputingHojjat Baghban, Mahdis Moradi, Ching-Hsien Hsu, Jerry Chou, Yeh-Ching Chung. 658-661 [doi]
- Supervised Learning Based Approach to Aspect Based Sentiment AnalysisNipuna Upeka Pannala, Chamira Priyamanthi Nawarathna, J. T. K. Jayakody, Lakmal Rupasinghe, Kesavan Krishnadeva. 662-666 [doi]
- Power-Minimization Computing Resource Allocation in Mobile Cloud-Radio Access NetworkKezhi Wang, Kun Yang. 667-672 [doi]
- A Novel Method for Designing Information Technology ServicesYi-Chih Kao, Yung-Chia Chang, Sheng-Lung Peng, Ruay Shiung Chang. 673-680 [doi]
- A Risk Evaluation Framework for Service Level AgreementsBabak Yadranjiaghdam, Komal Hotwani, Nasseh Tabrizi. 681-685 [doi]
- Predictive Dynamic Algorithm: An Approach toward QoS-Aware Service for IoT-Cloud EnvironmentMaycon Leone Maciel Peixoto, Dionisio Machado Leite Filho, Carlos Henrique, Danilo Costa Marim Segura, Bruno Tardiole Kuehne, Bruno Guazzelli. 686-693 [doi]
- Performance Comparison on the Heterogeneous File System in Cloud Storage SystemsWei-Peng Chen, Chuan-Ming Liu. 694-701 [doi]
- Constructing PM2.5 Map Based on Mobile PM2.5 Sensor and Cloud PlatformYung-Sheng Lin, Yu-Hsiang Chang, Yue-Shan Chang. 702-707 [doi]
- RNN-Based Personalized Activity Recognition in Multi-person Environment Using RFIDSungpil Woo, Jaewook Byun, Seong-Hoon Kim, Hoang Minh Nguyen, Janggwan Im, Daeyoung Kim 0001. 708-715 [doi]
- Cloud Based Privacy Preserving Collaborative Business Process ManagementBjörn Schwarzbach, Bogdan Franczyk, Lucas Petrich, Arkadius Schier, Michael ten Hompel. 716-723 [doi]
- Considerations of Emerging Cloud Computing in Financial Industry and One-Time Password with Valet Key SolutionTe-Yuan Lin, Chiou-Shann Fuh. 724-731 [doi]
- E-commerce (WEB) Application Security: Defense against ReconnaissanceAshan Chulanga Perera, Kesavan Krishnadeva, Sripa Vimukthi Bannakkotuwa, Chethana Liyanapathirana, Lakmal Rupasinghe. 732-742 [doi]
- FoTSeC - Human Security in Fog of ThingsDavid Nunes, Jorge Sá Silva, Ashley Figueira, Hugo Dias, André Rodrigues, Vasco Pereira, Fernando Boavida, Soraya Sinche. 743-749 [doi]
- Novel Survey on the Color-Image Graying AlgorithmXiaoqiang Zhang, Xuesong Wang. 750-753 [doi]
- Research on Improved 2D-BPSO-Based VM-Container Hybrid Hierarchical Cloud Resource Scheduling MechanismChunxiao Fan, Yeqiao Wang, Zhigang Wen. 754-759 [doi]
- I/O-Conscious and Prediction-Enabled Virtual Machines SchedulingJinlei Jiang, Xun Zhao, Yongwei Wu, Weimin Zheng. 760-767 [doi]
- Hypervisor Assisted Forensics and Incident Response in the CloudVincent E. Urias, William M. S. Stout, Caleb Loverro, John W. Young. 768-775 [doi]
- A Trading-Inspired Approach to the Dynamic Server Consolidation Problem in Data CentersGrant Wu, Maolin Tang. 776-782 [doi]