Abstract is missing.
- Learning From Big Data: A Survey and Evaluation of Approximation Technologies for Large-Scale Reinforcement LearningCheng Wu, Yiming Wang. 1-8 [doi]
- Predicting the Popularity of Online News Based on Multivariate AnalysisCaiyun Liu, Wenjie Wang, Yuqing Zhang, Ying Dong, Fannv He, Chensi Wu. 9-15 [doi]
- Efficient Strip-Mode Microwave Correlated Imaging Method with Data FusionYuanyue Guo, Jie Deng, Falin Liu, Dongjin Wang. 16-22 [doi]
- Sentiment Classification: Feature Selection Based Approaches Versus Deep LearningAlper Kursat Uysal, Yi Lu Murphey. 23-30 [doi]
- A Core Theory Based Algorithm for Influence Maximization in Social NetworksKan Zhang, Zichao Zhang, Yanlei Wu, Jin Xu, Yunyun Niu. 31-36 [doi]
- A Design Towards Personally Identifiable Information Control and Awareness in OpenID Connect Identity ProvidersRafael Weingärtner, Carla Merkle Westphall. 37-46 [doi]
- ROBOMO: Effects of a Motivational Intervention to Adress the Barriers During Science LearningYoussef Khaoula, Walid Boukadida, Michio Okada. 47-54 [doi]
- A Multi-objective Metaheuristic Approach to Search-Based Stress TestingNauber Gois, Pedro Porfírio Muniz de Farias, André L. V. Coelho. 55-62 [doi]
- Robust Optimal Spectrum Patrolling for Passive Monitoring in Cognitive Radio NetworksJiachen Li, Jing Xu, Wei Liu, Shimin Gong, Kai Zeng 0001. 63-68 [doi]
- Cooperative Multi-relay Assisted Multicast Beamforming in Wirelessly Powered CommunicationsJiachen Li, Yue Mi, Shimin Gong, Jing Xu, Xiaoxia Huang, Yanyan Shen. 69-74 [doi]
- Improved Presence Detection for Occupancy Control in Multisensory EnvironmentsCharikleia Papatsimpa, Jean-Paul M. G. Linnartz. 75-80 [doi]
- Subspace Decomposition Channel Estimation for Multiple Virtual MIMO SC-FDMA SystemsAshraf Tahat, Claude D'Amours, Benoît Champagne. 81-86 [doi]
- Dynamic MAC Protocol for Tactical Data LinksZhe Guo, Zheng Yan. 87-92 [doi]
- Fast Coding-Unit Mode Decision for HEVC TransratingShih-Hsuan Yang, Chong-Cheng Zhong. 93-100 [doi]
- Multidimensional QoE Assessment of a Simultaneous Transmission Method in Multi-view Video and Audio Transmission with MPEG-DASHYuki Maehara, Toshiro Nunome. 101-106 [doi]
- Energy Efficient Event Driven Video Streaming Surveillance Using SleepyCAMTenager Mekonnen, Erkki Harjula, Arto Heikkinen, Timo Koskela, Mika Ylianttila. 107-113 [doi]
- Fuzzy Analogy Based Effort Estimation: An Empirical Comparative StudyAli Idri, Ibtissam Abnane. 114-121 [doi]
- A Simplified Massive MIMO Approach Using PrecodingMário Marques da Silva, Rui Dinis. 122-127 [doi]
- Indoor Localization Using Ambient FM Radio RSS Fingerprinting: A 9-Month StudyAndrei Popleteev. 128-134 [doi]
- Assessment of TCP Parameters for Mobile Devices Concerning Performance and Energy ConsumptionJonas Pontes, Demetrio Borges, Eric Borba, Victor Lira, Eduardo Tavares. 135-141 [doi]
- Antenna Array Based Localization Scheme for Vehicular NetworksMarco Antonio Marques Marinho, Alexey Vinel, Felix Antreich, João Paulo Carvalho Lustosa Da Costa, Edison Pignaton de Freitas. 142-146 [doi]
- A New Method of Error Reduction for Affine Projection AlgorithmShin'ichi Koike. 147-150 [doi]
- Remarks on Adaptive-Type Hypercomplex-Valued Neural Network-Based Feedforward Feedback ControllerKazuhiko Takahashi. 151-156 [doi]
- Towards Accurate Predictions of Customer Purchasing PatternsRafael Valero-Fernandez, David J. Collins, Colin Rigby, James Bailey. 157-161 [doi]
- Improving Performance for Geo-Distributed Data Process in Wide-AreaGe Zhang, Haozhan Wang, Zhongzhi Luan, Weiguo Wu, Depei Qian. 162-167 [doi]
- Predicting Student Performance in an ITS Using Task-Driven FeaturesRitu Chaturvedi, C. I. Ezeife. 168-175 [doi]
- An Adaptive Visualization Tool for High Order Discontinuous Galerkin Method with Quadratic ElementsLiyang Xu, Xiaoguang Ren, Xinhai Xu, Hao Li, Yuhua Tang, Yongquan Feng. 176-183 [doi]
- A Software-Hardware Co-designed Methodology for Efficient Thread Level SpeculationQiong Wang, Jialong Wang, Li Shen, Zhiying Wang. 184-191 [doi]
- Fast Transmission Mechanism for Secure VPLS ArchitecturesMadhusanka Liyanage, Mika Ylianttila, Andrei V. Gurtov. 192-196 [doi]
- "You have a Potential Hacker's Infection": A Study on Technical Support ScamsSampsa Rauti, Ville Leppänen. 197-203 [doi]
- A New Approach to Utility-Based Privacy Preserving in Data PublishingYilmaz Vural, Murat Aydos. 204-209 [doi]
- Best Random Codes Construction for Syndrome Coding SchemeKe Zhang, Martin Tomlinson, Mohammed Zaki Ahmed. 210-214 [doi]
- A Sensitivity Approach to Energy-Efficient Mapping of Dependable Virtual NetworksVictor Antonio Ribeiro de Lira Cavalcanti, Eduado Antonio Guimaraes Tavares, Meuse Oliveira de Nogueira Junior, Dennys Azevedo, Jonas da Conceicao Nascimento Pontes. 215-222 [doi]
- CDController: A Cloud Data Access Control System Based on ReputationHuaqing Lin, Zheng Yan, Raimo Kantola. 223-230 [doi]
- Cloud IEC 61850: DDS Performance in Virtualized Environment with OpenDDSRoger Daniel Francisco Ferreira, Romulo Silva de Oliveira. 231-236 [doi]
- Using Game Theory to Solve the Fault Diagnosis Problem under Symmetric Comparison RulesMourad Elhadef. 237-244 [doi]
- A Data Mining-Based Approach for Cardiovascular Dysautonomias Diagnosis and TreatmentAli Idri, Ilham Kadi. 245-252 [doi]
- Investigating the Agility Bias in DNS Graph MiningJukka Ruohonen, Ville Leppänen. 253-260 [doi]
- The Enumeration of Flippable Edges in Maximal Planar GraphsDongyang Zhao, Yangyang Zhou, Jin Xu. 261-267 [doi]
- Accurate Localization Using LTE Signaling DataLei Ni, Yuxin Wang, Haoyang Tang, Zhao Yin, Yanming Shen. 268-273 [doi]
- A Novel Model for Cybersecurity Economics and AnalysisParesh Rathod, Timo Hämäläinen. 274-279 [doi]
- Some Cryptography Models Designed by Double Odd-Edge Labelling of TreesHongyu Wang, Jin Xu, Bing Yao. 280-285 [doi]
- Enhancing Security, Scalability and Flexibility of Virtual Private LAN ServicesMadhusanka Liyanage, Mika Ylianttila, Andrei V. Gurtov. 286-291 [doi]
- Horizontal Requirement Engineering in Integration of Multiple IoT Use Cases of City Platform as a ServiceToshihiko Yamakami. 292-296 [doi]
- Dynamic Malware Detection Using API SimilarityEhab Mufid Shafiq Alkhateeb. 297-301 [doi]
- Where Resources Meet at the EdgeKlervie Toczé, Simin Nadjm-Tehrani. 302-307 [doi]
- Software-Defined Edge Defense Against IoT-Based DDoSMert Ozcelik, Niaz Chalabianloo, Gurkan Gur. 308-313 [doi]
- Investigation and Performance Evaluation of Scalable High Efficiency Video CodingWei-Lune Tang, Shih-Hsuan Yang. 314-319 [doi]
- An Efficient Dynamic Ridesharing AlgorithmJianren Gao, Yuxin Wang, Haoyang Tang, Zhao Yin, Lei Ni, Yanming Shen. 320-325 [doi]
- A Best Practice Based E-Government Portals' Maturity Model - A Case StudyAbdoullah Fath-Allah, Laila Cheikhi, Ali Idri, Rafa E. Al-Qutaish. 326-331 [doi]
- Security Assessment of a Distributed, Modbus-Based Building Automation SystemTuomas Tenkanen, Timo Hämäläinen. 332-337 [doi]
- Practical Performance Models for High-Order CFD SimulationHao Li, Xiaoguang Ren, Yufei Lin, Yuhua Tang, Shuai Ye. 338-344 [doi]
- Dynamic Reconfiguration of Architecture in the Communication Network of Air Traffic Management SystemIgor Kabashkin. 345-350 [doi]
- Changing for Win-Win: Change Management on Global Value Chain OptimizationGuang-yu Xiong, Timo R. Nyberg, Gang Xiong. 351-356 [doi]
- 3D Matrix-Based Visualization System of Association RulesTingting Zhang, Zheng Chang, Tapani Ristaniemi, Guohua Liu. 357-362 [doi]
- On the Performance of Web Services and Google Cloud MessagingGuido Albertengo, Fikru Getachew Debele, Waqar Hassan, Dario Stramandino. 363-367 [doi]