Abstract is missing.
- An Input Method for High-Resolution Large 2D Desktop Environment Using Wireless Device with JoystickAkira Sakuraba, Tomoyuki Ishida, Yoshitaka Shibata. 1-6 [doi]
- Separator Design of Gesture Signals Based on Adaptive Threshold Using Wearable SensorsYinghui Zhou, Lei Jing, Junbo Wang, Zixue Cheng. 7-12 [doi]
- SHAWK: Platform for Secure Integration of Heterogeneous Advanced Wireless NetworksJiannong Cao, Chisheng Zhang, Jun Zhang, Yueming Deng, Xin Xiao, Miao Xiong, Jie Zhou, Yang Zou, Gang Yao, Wei Feng, Liang Yang, Yao Yu. 13-18 [doi]
- Measurement of Active Quantity of the Subject Movement and Design of Surveillnace Camera System Using High Active PartMiwa Takai. 19-24 [doi]
- A Reliable Dynamic User-Remote Password Authentication Scheme over Insecure NetworkZhen Yu Wu, Dai-Lun Chiang, Tzu-Ching Lin, Yu-Fang Chung, Tzer-Shyong Chen. 25-28 [doi]
- Security Philosophy Important for a Sustainable Smart Grid SystemAmy Poh Ai Ling, Kokichi Sugihara, Masao Mukaidono. 29-34 [doi]
- Source Code Publishing on World Wide WebTsunetoshi Hayashi. 35-40 [doi]
- A Successful Implementation of Service Oriented ArchitectureTor-Morten Grønli, Bendik Bygstad. 41-46 [doi]
- Workflow-Based Dynamic Access Control in a Service-Oriented ArchitectureGwan-Hwan Hwang, Chi Wu-Lee, Zhong-Xiang Jiang. 47-52 [doi]
- WaterCOM: An Architecture Model of Context-Oriented MiddlewareKeling Da, Marc Dalmau, Philippe Roose. 53-60 [doi]
- Middleware Software for Embedded SystemsYang-Hsin Fan, Jan-Ou Wu. 61-65 [doi]
- How to Preserve Privacy in Services InteractionSalah-Eddine Tbahriti, Brahim Medjahed, Zaki Malik, Chirine Ghedira, Michael Mrissa. 66-71 [doi]
- Privacy Protection on Transfer System of Automated Teller Machine from Brute Force AttackSho Kurita, Kenji Komoriya, Ryuya Uda. 72-77 [doi]
- Confidential Information Poisoning Methods by Considering the Information Length in Electronic Portable DevicesJunya Ishii, Afiza Razali, Ryuya Uda. 78-84 [doi]
- A Study of Efficiency and Accuracy of Secure Multiparty Protocol in Privacy-Preserving Data MiningSin G. Teo, Vincent C. S. Lee, Shuguo Han. 85-90 [doi]
- Multidimensional QoE Assessment of Multi-view Video and Audio (MVV-A) IP Transmission: The Effects of User Interfaces and ContentsErick Jimenez Rodriguez, Toshiro Nunome, Shuji Tasaka. 91-98 [doi]
- Proposal and Evaluation of User's Actions Distribution Method Using Life Streaming Service on Lifelog SystemIori Osada, Takashi Yoshino. 99-104 [doi]
- Neighbor Selection Based on Transmission Bandwidth on P2P Live Streaming ServiceKazuyuki Takayama, Takaya Fujimoto, Rei Endo, Hiroshi Shigeno. 105-110 [doi]
- Scalable Secure MJPEG Video StreamingLei Chen, Narasimha Shashidhar, Qingzhong Liu. 111-115 [doi]
- A Robust Video Super-Resolution Using a Recursive Leclerc Bayesian Approach with an OFOM (Optical Flow Observation Model)Parinya Sanguansat, Kornkamol Thakulsukanant, Vorapoj Patanavijit. 116-121 [doi]
- A Realistic Experimental Comparison of the Suricata and Snort Intrusion-Detection SystemsEugene Albin, Neil C. Rowe. 122-127 [doi]
- Certificateless Partially Blind SignatureJingwei Liu, Zonghua Zhang, Rong Sun, Kyung Sup Kwak. 128-133 [doi]
- Personal Profile for Coping Behavior in a Virus Infection SituationShun ichi Kurino, Noriaki Yoshikai, Toshio Takahashi. 134-140 [doi]
- Social Indexing of TV Programs: Detection and Labeling of Significant TV Scenes by Twitter AnalysisMasami Nakazawa, Maike Erdmann, Keiichiro Hoashi, Chihiro Ono. 141-146 [doi]
- Consumer Opinions on Short-Interval Charging for Pay-TV over IPTVTolga Arul, Abdulhadi Shoufan. 147-153 [doi]
- Automatic Web-Based EFP Studio System with XML DocumentsWei Chen, Rong-Chi Chang. 154-159 [doi]
- A Security Enhancement on a Remote User Authentication Scheme Based on the Rabin Cryptosystem with Secure Password UpdatingWei-Liang Tai, Ya-Fen Chang, Yuan-Fu Li, Shun-Meng Pan. 160-164 [doi]
- Effective Network Defense Strategies against Malicious Attacks with Various Defense Mechanisms under Quality of Service ConstraintsFrank Yeong-Sung Lin, Yu-Shun Wang, Yu-Pu Wu, Chia-Yang Hsu. 165-170 [doi]
- Symbolic Analysis of the Proposed UDT Security ArchitectureDanilo Valeros Bernardo, Doan B. Hoang. 171-176 [doi]
- CCA-secure Anonymous Multi-receiver ID-based EncryptionYuh-Min Tseng, Yi-Hung Huang, Hui-Ju Chang. 177-182 [doi]
- Statistical Single-Document Summarization for Chinese News ArticlesJenq-Haur Wang, Jeng-Yuan Yang. 183-188 [doi]
- A Fast and Robust Optimistic Total Order Broadcast for Online Video GamesSamuel Bernard, Xavier Défago, Sébastien Tixeuil. 189-196 [doi]
- Supporting Efficient XML Query Evaluation Using Double IndexesWen-Chiao Hsu, I-En Liao, Pei-Hua Lu. 197-202 [doi]
- Multiview Playback with Ghost in Required ConditionYoshiyuki Tanaka, Kenji Komoriya, Ryuya Uda. 203-208 [doi]
- Clustering between Data Mules for Better Message DeliveryXoluqobo Mkhwanazi, Hanh Le, Edwin Blake. 209-214 [doi]
- Test Coverage Optimization for Large Code ProblemsYing-Dar Lin, Chi-Heng Chou, Yuan-Cheng Lai, Tse-Yau Huang, Simon Chung, Jui-Tsun Hung, Frank C. Lin. 215-220 [doi]
- Session Level Flow Classification by Packet Size Distribution and Session GroupingChun-Nan Lu, Ying-Dar Lin, Chun-Ying Huang, Yuan-Cheng Lai. 221-226 [doi]
- DOACOM: Video Chat System with Door-Type InterfaceTakashi Yoshino, Shingo Fujita. 227-231 [doi]
- Preventing Surreptitious Filming by Saturation Irradiation of Infrared RaysFumiaki Murakami, Kenji Komoriya, Ryuya Uda, Seiichi Gohshi, Isao Echizen. 232-237 [doi]
- An Automotive Side-View System Based on Ethernet and IPAlexander Camek, Christian Buckl, Pedro Sebastiao Correia, Alois Knoll. 238-243 [doi]
- Empirical Study on Performance Comparisons of Block-Based Motion Estimation on Multi Sub-Pixel Displacement with Multiples Block SizeDarun Kesrarat, Vorapoj Patanavijit. 244-249 [doi]
- Virtual Reality in College English Curriculum: Case Study of Integrating Second Life in Freshman English CourseLiang-Yi Chung. 250-253 [doi]
- An International Driving Simulator: Recognizing the Sense of a Car Body by the SimulatorShinya Saito, Yoshitoshi Murata, Tsuyoshi Takayama, Nobuyoshi Sato. 254-260 [doi]
- A Coverage-Driven Verification Platform for Evaluating NoC Performance and Test StructureZhang Ying, Wu Ning, Ke Xiazhi, Ge Fen. 261-265 [doi]
- Probabilistic Replica Allocation in Multihop NetworksMunehiro Namba, Yoshiya Nakata. 266-273 [doi]
- CubeCuts: A Novel Cutting Scheme for Packet ClassificationYeim-Kuan Chang, Yu-Hsiang Wang. 274-279 [doi]
- Introducing SOR: SSH-based Onion RoutingAndre Egners, Dominic Gatzen, Andriy Panchenko, Ulrike Meyer. 280-286 [doi]
- Efficient Detection Scheme for Urban Traffic Congestion Using BusesYuwei Xu, Ying Wu, Jingdong Xu, Lin Sun. 287-293 [doi]
- Method of Autonomic Load Balancing for Long Polling in M2M Service SystemShinji Kitagami, Yosuke Kaneko, Takuo Suganuma. 294-299 [doi]
- Efficient Routing Method in P2P Systems Based upon Training KnowledgeTaoufik Yeferny, Khedija Arour. 300-305 [doi]
- RBRA: A Simple and Efficient Rating-Based Recommender Algorithm to Cope with Sparsity in Recommender SystemsFeng Xie, Ming Xu, Zhen Chen. 306-311 [doi]
- A Novel Robust and High Reliability for Lucas-Kanade Optical Flow Algorithm Using Median Filter and Confidence Based TechniqueDarun Kesrarat, Vorapoj Patanavijit. 312-317 [doi]
- Experimental Investigation for Practical Sparsity Number for Image Reconstruction Based on SL0 Algorithm in Discrete Frequency DomainDatchakorn Tancharoen, Pham Hong Ha, Kornkamol Thakulsukanant, Vorapoj Patanavijit. 318-323 [doi]
- A Covert Channel Using Core AlternationYangwei Li, Qingni Shen, Cong Zhang, Pengfei Sun, Ying Chen, Sihan Qing. 324-328 [doi]
- IEC 61850 Standard Based MMS Communication Stack Design Using OOPJongjoo Park, Eunkyu In, Sangwoo Ahn, Cheoljon Jang, JongWha Chong. 329-332 [doi]
- An Alternative Robust SL0 Based on Recursive Huber Stochastic Estimation Technique in Frequency DomainTunyawat Somjaitaweeporn, Pham Hong Ha, Kornkamol Thakulsukanant, Vorapoj Patanavijit. 333-338 [doi]
- Design and Implementation of an Ontology-based Intelligent Project Management SystemKo-Wei Huang, Wei-Chung Cheng, Chun-Wei Tsai, Chu-Sing Yang. 339-343 [doi]
- Characterizing Obfuscated JavaScript Using Abstract Syntax Trees: Experimenting with Malicious ScriptsGregory Blanc, Daisuke Miyamoto, Mitsuaki Akiyama, Youki Kadobayashi. 344-351 [doi]
- From Gamenics to Servicenics: Lessons Learned in Mobile Social Games in Japan toward Service EngineeringToshihiko Yamakami. 352-356 [doi]
- Expertise Level Estimation of Library Books by Patron-Book Heterogeneous Information Network Analysis - Concept and Applications to Library's Learning Assistant ServiceToshiro Minami. 357-362 [doi]
- Detecting Events in Narrative EssaysHon Wai Lam, Tharam S. Dillon, Elizabeth Chang, Pornpit Wongthongtham, Wei Lui. 363-368 [doi]
- Exploring the Key Success Factors of Mobile Commerce in TaiwanI-Ping Chiang, Yi-Shiang Liao. 369-374 [doi]
- An Online Fill-in-the-Blank Problem Function for Learning Reserved Words in Java Programming EducationNobuo Funabiki, Yousuke Korenaga, Yukiko Matsushima, Toru Nakanishi, Kan Watanabe. 375-380 [doi]
- A Study of Consumers' Trust in Online Shopping between Pick-up Goods Behavior in the Convenience StoresChun-Chia Wang, Chang-Cheng Sie. 381-386 [doi]
- Trustworthiness Assessment of Knowledge on the Semantic Sensor Web by Provenance IntegrationDenise Umuhoza, Robin Braun. 387-392 [doi]
- A Framework for SLA Assurance in Cloud ComputingAdil M. Hammadi, Omar Hussain. 393-398 [doi]
- A Proposal of Method for Suspicious Person Detection on P2P Security Camera Network SystemAki Choho, Nobuyoshi Sato, Tsuyoshi Takayama, Yoshitoshi Murata. 399-405 [doi]
- Smart-TV Based Integrated E-health Monitoring System with Agent TechnologyGolam Sorwar, Raqibul Hasan. 406-411 [doi]
- Maximization of Network Survivability under Malicious and Epidemic AttacksFrank Yeong-Sung Lin, Yu-Shun Wang, Hui-Yu Chung, Jia-Ling Pan. 412-417 [doi]
- A Hetero-core Spliced Optical Fiber Sensor Network for Remote Monitoring of Agricultural EnviromentLee See Goh, Takaaki Ichimiya, Kazuhiro Watanabe, Norihiko Shinomiya. 418-422 [doi]
- vSuit: QoS-oriented Scheduler in Network VirtualizationDan Feng, Xiaojing Wang, Wei Zhao, Wei Tong, Jingning Liu. 423-428 [doi]
- Deterministic Replay of Multithread Applications Using Virtual MachineJiageng Yu, Yiwei Ci, Peng Zhou, Yanjun Wu, Chen Zhao. 429-434 [doi]
- Adaptive Strategies for Speeding Up Sequences of ConsensusMichel Hurfin, Izabela Moise, Jean-Pierre Le Narzul, Frédéric Majorczyk. 435-442 [doi]
- Fostering Interoperability in Java-Based Computer Algebra SoftwareHeinz Kredel. 443-447 [doi]
- A Hybrid Scheduling Mechanism for IEEE 802.16j NetworksYing-Hong Wang, Wei-Chih Lin, Cheng-Hung Tsai, Guo-Rui Huang. 448-453 [doi]
- PoA Selection in 802.11 Networks Using Media Independent Information Server (MIIS)Muhammad Qasim Khan, Steinar Hidle Andresen. 454-459 [doi]
- Token-Based Mutual Exclusion Algorithm in Mobile Cellular NetworksSung-Hoon Park, Seoun-Hyung Lee. 460-465 [doi]
- Energy-Balanced Rate Assignment and Routing Protocol for Body Area NetworksNedal Ababneh, Nick F. Timmons, Jim Morrison, David C. Tracey. 466-471 [doi]
- E2SIW: An Energy Efficient Scheme Immune to Wormhole Attacks in Wireless Ad Hoc NetworksSanjay Kumar Dhurandher, Isaac Woungang, Abhishek Gupta, Bharat K. Bhargava. 472-477 [doi]
- A Distributed IDS for Ad Hoc NetworksPaulo Manoel Mafra, Joni da Silva Fraga, Altair Olivo Santin. 478-483 [doi]
- JOMS: A Java Message Service Provider for Disconnected MANETsAbdulkader Benchi, Frédéric Guidec, Pascale Launay. 484-489 [doi]
- AdSIP: Decentralized SIP for Mobile Ad Hoc NetworksSaïd Yahiaoui, Yacine Belhoul, Nadia Nouali-Taboudjemat, Hamamache Kheddouci. 490-495 [doi]
- A Cluster Allocation and Routing Algorithm Based on Node Density for Extending the Lifetime of Wireless Sensor NetworksBo-Si Lee, Hao-Wei Lin, Wernhuar Tarng. 496-501 [doi]
- Secure Authentication Scheme for Supporting Healthcare in Wireless Sensor NetworksTsung-Chih Hsiao, Yu-Ting Liao, Jen-Yan Huang, Tzer-Shyong Chen, Gwo-Boa Horng. 502-507 [doi]
- Simultaneous Estimation of the Number of Humans and their Movement Loci in a Room Using Infrared SensorsYuki Kasama, Toshiaki Miyazaki. 508-513 [doi]
- CDS-Based Routing Scheme Considering Node Properties in Triage NetworkYuto Toguchi, Hiroshi Shigeno. 514-519 [doi]
- A Proposal of CSMA Fixed Backoff-time Switching Protocol and Its Implementation on QualNet Simulator for Wireless Mesh NetworksSritrusta Sukaridhoto, Nobuo Funabiki, Toru Nakanishi, Kan Watanabe. 520-525 [doi]
- Investigation into Batmand-0.3.2 Protocol Performance in an Indoor Mesh Potato TestbedEdmundo Chissungo, Edwin Blake, Hanh Le. 526-532 [doi]
- Multi-channel Wireless Mesh Networks Test-Bed with Embedded SystemsJun Huy Lam, Sang-Gon Lee, Whye Kit Tan. 533-537 [doi]
- Location Information System for Access Points in the Heterogeneous Wireless EnviornmentKei Kikuchi, Yoshitoshi Murata, Goutam Chakraborty, Tsuyoshi Takayama, Nobuyoshi Sato. 538-543 [doi]
- Membership Models and the Design of Authentication Protocols for MANETsSoumyadev Maity, R. C. Hansdah. 544-551 [doi]
- An Intrusion and Random-Number-Leakage Resilient Scheme in Mobile Unattended WSNsTatsuro Iida, Keita Emura, Atsuko Miyaji, Kazumasa Omote. 552-557 [doi]
- Mutual Authentication Protocol for Enhanced RFID Security and Anti-counterfeitingYoung Sil Lee, Tae-Yong Kim, Hoon Jae Lee. 558-563 [doi]
- Building Trust among Certificates Management Nodes in Mobile Ad-hoc NetworkYoujiro Takehana, Iichiro Nishimura, Norihito Yosaka, Tomoyuki Nagase, Yoshio Yoshioka. 564-568 [doi]
- Data Scheduling for Multi-item Requests in Vehicle-Roadside Data Access with Motion Prediction Based Workload TransferYiqing Gui, Edward Chan. 569-574 [doi]
- Comparation of Strategies for Data Replication in VANET EnvironmentJán Janech, Anton Lieskovsky, Emil Krsák. 575-580 [doi]
- An RSU-assisted Cluster Head Selection and Backup ProtocolLin Sun, Ying Wu, Jingdong Xu, Yuwei Xu. 581-587 [doi]
- Designing and Prototyping a Middleware for Vehicular NetworksGiuseppe Ciaccio, Vittoria Gianuzzi. 588-594 [doi]
- Energy Monitoring System Using Sensor Networks in Residential HousesAoi Hashizume, Tadanori Mizuno, Hiroshi Mineno. 595-600 [doi]
- Energy-Effective Clustering Algorithm Based on Adjacent Nodes and Residual Electric Power in Wireless Sensor NetworksShin-nosuke Toyoda, Fumiaki Sato. 601-606 [doi]
- Traffic Classifier for Heterogeneous and Cooperative Routing through Wireless Sensor NetworksAna Nieto, Javier Lopez. 607-612 [doi]
- A Sensor Data Collection Method with a Mobile Sink for Communication Traffic Reduction by Delivering Predicted ValuesWataru Seino, Tomoki Yoshihisa, Takahiro Hara, Shojiro Nishio. 613-618 [doi]
- Development of Human-Like Agent to Support Lecture Presentation Using a Wireless Device and Image Processing TechnologyYouji Ochi. 619-622 [doi]
- The Design and Implementation of a Wireless Location Estimation System in a Wireless Local Area NetworkKevin Chin Yiu Shum, Joseph Kee-Yin Ng, Quan Jia Cheng. 623-628 [doi]
- Experimental Study on X-shaped Photonic Crystal Waveguide in 2D Triangular Lattice for Wavelength Division Multiplexing SystemHiroshi Maeda, Shota Inoue, Shintaro Nakahara, Osamu Hatanaka, YongMei Zhang, Hiroyuki Terashima. 629-632 [doi]
- On Accuracy of Discrete Ray Tracing Method in Comparison with Rigorous SolutionsMasafumi Takematsu, Junichi Honda, Kazunori Uchida. 633-638 [doi]
- An Efficient Group-Based Channel Scanning Scheme for Handover with IEEE 802.16eHwi Woon Jeong, Jun Yeol Choi, Hyung Ku Kang, Hee Yong Youn. 639-644 [doi]
- NEMO-Based Distributed Mobility ManagementParin Sornlertlamvanich, Sinchai Kamolphiwong, Robert Elz, Panita Pongpaibool. 645-650 [doi]
- Mobile Agent Migration Based on Code CachingMasayuki Higashino, Kenichi Takahashi, Takao Kawamura, Kazunori Sugahara. 651-656 [doi]
- Following the User's Interests in Mobile Context-Aware Recommender Systems: The Hybrid-e-greedy AlgorithmDjallel Bouneffouf, Amel Bouzeghoub, Alda Lopes Gançarski. 657-662 [doi]
- Hermes - A Context-Aware Application Development Framework and Toolkit for the Mobile EnvironmentSenaka Buthpitiya, Faisal B. Luqman, Martin L. Griss, Bo Xing, Anind K. Dey. 663-670 [doi]
- Semantic Context Reasoning for Formulating User LocationFrançois Toutain, Fano Ramparany, Ewelina Szczekocka. 671-677 [doi]
- Co-existence of Evolutionary Mixed-Bias Scheduling with Quiescence and IEEE 802.11 DCF for Wireless Mesh NetworksJason B. Ernst, Joseph Alexander Brown. 678-683 [doi]
- A Novel Approach for Rogue Access Point Detection on the Client-SideSomayeh Nikbakhsh, Azizah Bt Abdul Manaf, Mazdak Zamani, Maziar Janbeglou. 684-687 [doi]
- Enhanced SDMA for VANET CommunicationRanjeet Singh Tomar, Shekhar Verma. 688-693 [doi]
- Software Simulation Tool for the Capacity Analysis of WiMAX Base StationsYang-Han Lee, Hsien-Wei Tseng, Chih-Yuan Lo, Yih-Guang Jan, Hen-Wai Tsao, Jingshown Wu. 694-697 [doi]
- Improvement of the More Efficient and Secure ID-Based Remote Mutual Authentication with Key Agreement Scheme for Mobile Devices on ECCToan-Thinh Truong, Minh-Triet Tran, Anh Duc Duong. 698-703 [doi]
- Design and Implementation of Improved Authentication System for Android Smartphone UsersKwang Il Shin, Ji Soo Park, Jae-Yong Lee, Jong Hyuk Park. 704-707 [doi]
- The Evaluation of an Anomaly Detection System Based on Chi-square MethodShunsuke Oshima, Takuo Nakashima, Toshinori Sueyoshi. 708-713 [doi]
- Securing an Interoperability Architecture for Home and Urban Networking: Implementation of the Security Aspects in the INREDIS Interoperability ArchitectureRafael Giménez, Marc Pous, Francisco Rico-Novella. 714-719 [doi]
- Pandora Messaging: An Enhanced Self-Message-Destructing Secure Instant Messaging Architecture for Mobile DevicesTsai-Yeh Tung, Laurent Lin, Der-Tsai Lee. 720-725 [doi]
- Related-Key Attack on the MD-64 Block Cipher Suitable for Pervasive Computing EnvironmentsJinkeon Kang, Kitae Jeong, Sang-Soo Yeo, Changhoon Lee. 726-731 [doi]
- Coping with the Complexity of SOA Systems with Message ForensicsTakafumi Hayashi, Atsushi Kara, Toshiaki Miyazaki, Jiro Iwase, Hideyuki Fukuhara, Tetsu Saburi, Masayuki Hisada. 732-737 [doi]
- REFORM: Relevant Features for Malware AnalysisVinod P. Nair, Vijay Laxmi, Manoj Singh Gaur. 738-744 [doi]
- Security and QoS Tradeoffs: Towards a FI PerspectiveAna Nieto, Javier Lopez. 745-750 [doi]
- CAD-MAC: Coverage Adaptive Directional Medium Access Control for mmWave Wireless Personal Area NetworksJung-Hyok Kwon, Eui Jik Kim, Chul-Hee Kang. 751-754 [doi]
- The Study for the User Oriented Service Design for Inter-organizational CollaborationJaehwan Lim, Yang-Hoon Kim, Yongsub Na, Hangbae Chang. 755-759 [doi]
- Dynamic Path Determination of Mobile Beacons Employing Reinforcement Learning for Wireless Sensor LocalizationSongsheng Li, Xiaoying Kong, David B. Lowe. 760-765 [doi]
- Communication-Efficient Anonymous Routing Protocol for Wireless Sensor Networks Using Single Path Tree TopologyShogo Nakamura, Yoshiaki Hori, Kouichi Sakurai. 766-771 [doi]
- Using Interest-Aware Probabilistic for Leisure Information Dissemination in VANETsSheng-Tzong Cheng, Jian Pan Li. 772-777 [doi]
- A Ubiquitous Data Logger that Selects an Efficient Data Compression MethodKenji Ono, Tsutomu Terada, Masahiko Tsukamoto. 778-782 [doi]
- An Efficient Stream Archiving Method by Operator Merge and Write ControlTaiga Abe, Hideyuki Kawashima, Hiroyuki Kitagawa. 783-788 [doi]
- Nearest Neighbor Classification by Partially Fuzzy ClusteringLifei Chen, Gongde Guo, Shengrui Wang. 789-794 [doi]
- Link Prediction in Social Network Using Co-clustering Based ApproachElham Hoseini, Sattar Hashemi, Ali Hamzeh. 795-800 [doi]
- Detection Method of Blog Spam Based on Categorization and Time Series InformationToshio Teraguchi, Kenji Nakamura, Shigenori Tanaka, Koichi Kitano. 801-808 [doi]
- Fusion of News Reports Using Surface-Based MethodsJoel Azzopardi, Christopher Staff. 809-814 [doi]
- Aggnel: An Information Aggregation System of Partial Contents from Multiple Web PagesYuichiro Tasaki, Tomohiro Fukuhara, Tetsuji Satoh. 815-820 [doi]
- FODEX - Towards Generic Data Extraction from Web ForumsSebastian Pretzsch, Klemens Muthmann, Alexander Schill. 821-826 [doi]
- Integration of Novel Image Based Features into Markov Random Field Model for Information RetrievalSheikh Muhammad Sarwar, Mosaddek Hossain Kamal. 827-832 [doi]
- Classifying Sports Gesture Using Event-Based Matching in a Multimedia E-learning SystemKosuke Takano, Kin Fun Li. 833-838 [doi]
- Ontology Based Qualitative Methodology for Chinese Language AnalysisDong Han, Kilian Stoffel. 839-844 [doi]
- Development of Topic Navigation System for Assisting Searches on the WebToshihiro Ishikawa, Yasuhiro Yamada. 845-850 [doi]
- GPU Accelerated Hot Term Extraction from User Generated ContentMing-Fung Cheng, Korris Fu-Lai Chung, Siu Nam Chuang. 851-856 [doi]
- Bio Named Entity Recognition Based on Co-training AlgorithmTsendsuren Munkhdalai, Meijing Li, Taewook Kim, Oyun-Erdene Namsrai, Seon-phil Jeong, Jungpil Shin, Keun Ho Ryu. 857-862 [doi]
- Social Network Discovery from Multiple Log Data through a Behavior ModelTomonobu Ozaki, Minoru Etoh. 863-868 [doi]
- Privacy-Preserving Set Operations in the Presence of Rational PartiesAtsuko Miyaji, Mohammad Shahriar Rahman. 869-874 [doi]
- Emotion Care Services with Facebook Wall MessagesHui-Huang Hsu, Yu-Fan Chen, Chi-Yi Lin, Cheng-Wei Hsieh, Timothy K. Shih. 875-880 [doi]
- A Multipath Routing Algorithm for Degraded-Bandwidth Services under Availability Constraint in WDM NetworksHung-Yi Chang. 881-884 [doi]
- Dynamic Time Scheduling in Advance Bandwidth ReservationTananun Orawiwattanakul, Hideki Otsuki, Eiji Kawai, Shinji Shimojo. 885-890 [doi]
- A Fuzzy Knowledge Based Fault Tolerance Algorithm in Wireless Sensor NetworksShih-Hao Chang, Teh-Sheng Huang. 891-896 [doi]
- Communication Quality Improvement Method through End Host Enhancements for TFRC-type Mobile StreamingAtsushi Den, Katsuyoshi Iida. 897-902 [doi]
- Design and Implementation of an Automatic Network Topology Discovery System for the Future Internet Across Different DomainsWun-Yuan Huang, Jen-Wei Hu, Shu-Cheng Lin, Te-Lung Liu, Pang-Wei Tsai, Chu-Sing Yang, Fei Yeh, Jim Hao Chen, Joe Mambretti. 903-908 [doi]
- Fairness Comparisons among Modern TCP ImplementationsRyo Oura, Saneyasu Yamaguchi. 909-914 [doi]
- New P2P Sharing Incentive Mechanism Based on Social Network and Game TheoryTzu-Ming Wang, Wei-Tsong Lee, Tin Yu Wu, Hsin-Wen Wei, Yu-San Lin. 915-919 [doi]
- Odds Ratio-Based Genetic Algorithm for Prediction of SNP-SNP Interactions in Breast Cancer Association StudyLi-Yeh Chuang, Ming-Cheng Lin, Hsueh-Wei Chang, Cheng-Hong Yang. 920-925 [doi]
- Evaluating Simulated Annealing for the Weighted-Region Path-Planning ProblemMark R. Kindl, Neil C. Rowe. 926-931 [doi]
- A Genetic Algorithm with Prioritized Objective Functions for Service CompositionYang Syu, Yong-Yi Fanjiang, Jong-Yih Kuo, Shang-Pin Ma. 932-937 [doi]
- End-to-End QoS Guaranteed Approach Using Multi-object Genetic Algorithm in Cognitive MANETsHuixing Peng, Yuebin Bai, Xiaoxia Liu. 938-943 [doi]
- A Fuzzy-Based Trustworthiness System for JXTA-Overlay P2P Platform and Its Performance Evaluation Considering Three ParametersKouhei Umezaki, Evjola Spaho, Yuichi Ogata, Leonard Barolli, Fatos Xhafa, Jiro Iwashige. 944-949 [doi]
- A Discovery Method of Trend Rules from Complex Sequential DataShigeaki Sakurai, Kyoko Makino, Shigeru Matsumoto. 950-955 [doi]
- PCR-RFLP Primer Design Using Particle Swarm Optimization Combined with Chaotic Logistic MapLi-Yeh Chuang, Yu-Da Lin, Hsueh-Wei Chang, Cheng-Hong Yang. 956-961 [doi]
- A Fuzzy-Based Cluster-Head Selection System forWSNs Considering Different ParametersQi Wang, Hironori Ando, Elis Kulla, Leonard Barolli, Arjan Durresi. 962-967 [doi]
- Challenges of Machine Learning Based Monitoring for Industrial Control System NetworksMatti Mantere, Ilkka Uusitalo, Mirko Sailio, Sami Noponen. 968-972 [doi]
- Design and Implementation of Waste Management RobotsKeita Matsuo, Yuichi Ogata, Kouhei Umezaki, Evjola Spaho, Leonard Barolli. 973-976 [doi]
- Medical Visualizations in Secure Bio ComputingMarek R. Ogiela, Lidia Ogiela. 977-980 [doi]
- Proposal for Improving Throughput in Supersaturated CloudShinichiro Kibe, Motoi Yamagiwa, Minoru Uehara. 981-986 [doi]
- An Experiment and Discussion of the Reboot Feature on the Photovoltaic Grid SystemKenichi Fujii, Motoi Yamagiwa, Minoru Uehara. 987-992 [doi]
- Web-Based Environment for GUI Application DevelopmentHideaki Yanagisawa. 993-998 [doi]
- Network Management System Based on Activated Knowledge ResourceGen Kitagata, Kazuto Sasai, Johan Sveholm, Hideyuki Takahashi, Tetsuo Kinoshita. 999-1004 [doi]
- A Proposal of a Simplified Jumping Distance Measurement Method for Ski Jumper's Motion Monitoring System Using Terrestrial Magnetism and Acceleration SensorsNobuyoshi Sato, Ryota Takamagi, Tsuyoshi Takayama, Yoshitoshi Murata. 1005-1010 [doi]
- Implementation of a Practical Calendaring System Conforming with Ambiguous Pattern of Recurring TasksYoshinari Nomura, Syunsuke Mihara, Hideo Taniguchi. 1011-1016 [doi]
- Spam Detection Using Sobel Operators and OCRPeng Wan, Minoru Uehara. 1017-1022 [doi]
- Interactive FingerprintYuji Suga. 1023-1026 [doi]
- Opengate on CloudKenzi Watanabe, Makoto Otani, Shin-ichi Tadaki, Yoshiaki Watanabe. 1027-1030 [doi]
- Wireless Network System with Autonomous Antenna Actuator Control for Disaster InformationToshihiro Suzuki, Yoshitaka Shibata. 1031-1036 [doi]
- Construction of IEEE802.11-based Wireless Network for Community Information Sharing in a Disaster-Affected AreaTetsuya Shigeyasu, Shota Katahira, Hitoshi Morioka, Hiroshi Matsuno. 1037-1042 [doi]
- Network Relief Activity with Cognitive Wireless Network for Large Scale DisasterNoriki Uchida, Kazuo Takahata, Yoshitaka Shibata. 1043-1047 [doi]
- A Disaster Information Sharing Method by the Mobile Servers in Challenged NetworksYutaka Sasaki, Yoshitaka Shibata. 1048-1053 [doi]
- Problem Analysis and Solutions of Information Network Systems on East Japan Great EarthquakeYoshitaka Shibata, Noriki Uchida, Yuji Ohhashi. 1054-1059 [doi]
- A Proposal of Forestry Worker Support System Using HMDNorihisa Segawa, Yusuke Shinohe, Jun Sawamoto. 1060-1064 [doi]
- Differences in the Behaviors Collecting Information from Available Media between the Students of Afflicted and Those of Non-afflicted Prefectures in the Crisis Caused by the 2011 Off Pacific Coast of Tohoku EarthquakeErina Gyoba. 1065-1068 [doi]
- Development of Cloud Based Safety Confirmation System for Great DisasterHiroaki Yuze, Naoyoshi Suzuki. 1069-1074 [doi]
- Performance of Left Outer Join on Hadoop with Right Side within Single Node Memory SizeByambajargal Byambajav, Tomasz Wiktor Wlodarczyk, Chunming Rong, Paea LePendu, Nigam Shah. 1075-1080 [doi]
- RVEC: Efficient Remote Desktop for the ENGINEERING CLOUDShinichi Sazawa, Masayoshi Hashima, Yuichi Sato, Kenichi Horio, Kazuki Matsui. 1081-1088 [doi]
- Virtual Machine Migration Method between Different Hypervisor Implementations and Its EvaluationYuki Ashino, Masayuki Nakae. 1089-1094 [doi]
- Virtual Network Mapping through Path Splitting and MigrationWu-Hsiao Hsu, Yuh-Pyng Shieh, Chia-Hui Wang, Sheng-Cheng Yeh. 1095-1100 [doi]
- On the Use of an Increased Initial Congestion Window to Improve mSCTP Handover PerformanceJohan Eklund, Karl-Johan Grinnemo, Anna Brunstrom. 1101-1106 [doi]
- An SCTP-based Mobility Management Framework for Smartphones and TabletsPehr Söderman, Karl-Johan Grinnemo, Georgios Cheimonidis, Yuri Ismailov, Anna Brunstrom. 1107-1112 [doi]
- Simulation and Experimental Evaluation of Multipath Congestion Control StrategiesThomas Dreibholz, Hakim Adhari, Martin Becke, Erwin P. Rathgeb. 1113-1118 [doi]
- QoS-oriented MPTCP Extensions for Multimedia Multi-homed SystemsCodé Diop, Guillaume Dugué, Christophe Chassot, Ernesto Exposito. 1119-1124 [doi]
- Integer Programming Formulation for Grouping Clusters in Ferry-assisted DTNsK. Habibul Kabir, Masahiro Sasabe, Tetsuya Takine. 1125-1130 [doi]
- Impact of Mobility Constraints on Epidemic Broadcast Mechanisms in Delay-Tolerant NetworksHiroyuki Ohsaki, Yosuke Yamada, Dimitri Perrin, Makoto Imase. 1131-1136 [doi]
- Lightweight Distributed Method for Connectivity-based Clustering Based on Schelling's ModelSho Tsugawa, Hiroyuki Ohsaki, Makoto Imase. 1137-1142 [doi]
- Decentralised Communication in Autonomous Agent SwarmsDimitri Perrin, Hiroyuki Ohsaki. 1143-1146 [doi]
- Robustness in Genetic Threshold Boolean Random Regulatory Networks: A Mathematical ApproachJacques Demongeot, Jules Waku. 1147-1152 [doi]
- Random Modelling of Contagious (Social and Infectious) Diseases: Examples of Obesity and HIV and Perspectives Using Social NetworksJacques Demongeot, Olivier Hansen, Anne-Sophie Jannot, Carla Taramasco. 1153-1160 [doi]
- Study of Aggregation Operators for Scheduling Clusters in Digital Images of PlantsJimmy Nagau, Sébastien Régis, Jean-Luc Henry, Andrei Doncescu. 1161-1166 [doi]
- Initialization of Masses by the Okm for the Belief Function Theory: Application to System BiologySébastien Régis, Andrei Doncescu, Makoto Takizawa, Guillaume Cleuziou. 1167-1171 [doi]
- Conflict Intersection as Diagnostic ModelMourad Benkaci, Andrei Doncescu, Makoto Takizawa. 1172-1177 [doi]
- Bid-Proportional Auction for Resource Allocation in Capacity-Constrained CloudsChih-Wei Tsai, Zsehong Tsai. 1178-1183 [doi]
- An Architectural Strategy for Meta-scheduling in Inter-cloudsNik Bessis, Stelios Sotiriadis, Florin Pop, Valentin Cristea. 1184-1189 [doi]
- Latency Based Dynamic Grouping Aware Cloud SchedulingSheheryar Malik, Fabrice Huet, Denis Caromel. 1190-1195 [doi]
- A Sophisticated Ad Hoc Cloud Computing Environment Built by the Migration of a Server to Facilitate Distributed CollaborationTatsuya Mori, Makoto Nakashima, Tetsuro Ito. 1196-1202 [doi]
- Resource-Aware Density-and-Grid-Based Clustering in Ubiquitous Data StreamsChing-Ming Chao, Guan-Lin Chao. 1203-1208 [doi]
- Optimal Data Allocation for Keeping Fairness of Online GameMasaki Kohana, Shusuke Okamoto, Atsuko Ikegami. 1209-1214 [doi]
- Value Creation Using Clouds: Analysis of Value Drivers for Start-Ups and Small and Medium Sized Enterprises in the Textile IndustryAndreas Mladenow, Elisabeth Fuchs, Paul Dohmen, Christine Strauss. 1215-1220 [doi]
- Enterprise 2.0 Integrated Communication and Collaboration Platform: A Conceptual ViewpointMartin Polaschek, Wolfgang Zeppelzauer, Natalia Kryvinska, Christine Strauss. 1221-1226 [doi]
- Exploration of Factors Affecting the Advancement of Collaborative eBusiness in the Enterprises: Research Efforts ExaminationO. Urikova, Irena Ivanochko, Natalia Kryvinska, Christine Strauss, Peter Zinterhof. 1227-1232 [doi]
- Organizational Pattern Discovery Linked to ActivitiesSerguei Dobrinevski. 1233-1237 [doi]
- Performance Analysis of Oracle Database in Virtual EnvironmentsFares Almari, Pavol Zavarsky, Ron Ruhl, Dale Lindskog, Amer Aljaedi. 1238-1245 [doi]
- Adaptive Diagnosis for Grids under the Comparison ModelHong-Chun Hsu, Pao-Lien Lai. 1246-1251 [doi]
- Near-Real-Time Cloud Auditing for Rapid ResponseJoon S. Park, Edward Spetka, Hassan Rasheed, Paul Ratazzi, Keesook J. Han. 1252-1257 [doi]
- Performance Measurements in iVIC Virtual Machine ClonesJames Hardy, Lu Liu, Nik Bessis, Lei Cui, Jianxin Li. 1258-1263 [doi]
- Improving Recommendation Flow with Centrality Measure in an Evolving Social NetworkSomayeh Koohborfardhaghighi, Juntae Kim. 1264-1269 [doi]
- It is not a Game, Not Even Social: New Service Engineering Paradigms from Lessons Learned in Mobile Social Games in JapanToshihiko Yamakami. 1270-1274 [doi]
- Collaborative Context Experience in a PhonebookMichal Szczerbak, François Toutain, Ahmed Bouabdallah, Jean-Marie Bonnin. 1275-1281 [doi]
- Management of Multimedia Data for Streaming on a Distributed E-learning SystemTadafumi Hayakawa, Masayuki Higashino, Kenichi Takahashi, Takao Kawamura, Kazunori Sugahara. 1282-1285 [doi]
- Privacy-Preserving DRM for Cloud ComputingRonald Petrlic, Christoph Sorge. 1286-1291 [doi]
- SAPSC: Security Architecture of Private Storage Cloud Based on HDFSQingni Shen, Yahui Yang, Zhonghai Wu, Xin Yang, Lizhe Zhang, Xi Yu, Zhenming Lao, Dandan Wang, Min Long. 1292-1297 [doi]
- Cloud to Device Push Messaging on Android: A Case StudyJarle Hansen, Tor-Morten Grønli, Gheorghita Ghinea. 1298-1303 [doi]
- Towards a Framework for Context-Aware Services ManagementWei Dai, Jonathan Liu, Axel Korthaus. 1304-1309 [doi]
- Developing a Cloud Intelligent and Energy-Saving Information Interface Agent with Web ServicesSheng-Yuan Yang, Dong-liang Lee. 1310-1315 [doi]
- An Exploration of the Optimization of Excutive Scheduling in the Cloud ComputingChih-Yung Chen, Hsiang-Yi Tseng. 1316-1319 [doi]
- Design for Middle-Way of Intelligent Energy-Saving System with Embedded SystemDong-liang Lee, Kune-Yao Chen, Chun-Liang Hsu, Sheng-Yuan Yang. 1320-1325 [doi]
- A Study on the Establishment of Online S-P PlatformKune-Yao Chen, Hsiu-Chuan Liu, Steve Tu. 1326-1331 [doi]
- Verifying the Produce of Car-Bind through Timed Petri NetDong-liang Lee, Jih-Fu Tu, Hsuan-Jung Lee, Kwang Pi Chen. 1332-1336 [doi]
- Preference Sorting Based on User's Relevance FeedbackLawrence Y. Deng, Yung-Hui Chen, Yi-Jen Liu. 1337-1342 [doi]
- Collaborative Process Management for the Networked Enterprise: A Case StudyUgo Barchetti, Antonio Capodieci, Anna Lisa Guido, Luca Mainetti. 1343-1348 [doi]
- Managing Trust in Business Webs Using Game TheoryHassan Fatemi, Marten van Sinderen, Roel Wieringa. 1349-1354 [doi]
- An Ontological Approach for Dynamic Cross-Enterprise CollaborationVu Minh Hoang, Hanh Huu Hoang. 1355-1360 [doi]