Abstract is missing.
- Strategies for Enhancing Data Quality in Mobile CRMRichard Hable, Thomas Aglassinger. 1-6 [doi]
- On Scheduling Real-Time Multi-item Queries in Multi-RSU Vehicular Ad Hoc Networks (VANETs)G. G. Md. Nawaz Ali, Edward Chan, Wenzhong Li. 7-12 [doi]
- A Basic Study of Data Collection Ratio of Drifting Sensor Networks for Monitoring WaterwaysKazuma Mitake, Susumu Ishihara. 13-20 [doi]
- A Method for Establishing Routes and IPv6 Addressing Based on the Estimated Distance from Neighboring Nodes in Wireless Mesh NetworksYuta Maruoka, Kazunori Ueda. 21-26 [doi]
- System Design for Estimating Social Relationships from Sensing DataAkihiro Kida, Tatsuro Takahashi, Ryoichi Shinkuma, Hiroyuki Kasai, Kazuhiro Yamaguchi, Oscar Mayora. 27-32 [doi]
- Social Link Analysis Using Wireless Beaconing and AccelerometerKazuto Shimizu, Masayuki Iwai, Kaoru Sezaki. 33-38 [doi]
- Data Mining and Analysis of Large Scale Time Series Network DataPatricia Morreale, Steve Holtz, Allan Goncalves. 39-43 [doi]
- ARISTOTELE: A Semantic-Driven Platform for Enterprise ManagementPierluigi Del Nostro, Francesco Orciuoli, Stefano Paolozzi, Pierluigi Ritrovato, Daniele Toti. 44-49 [doi]
- Behavior Modeling in Virtual OrganizationsMahdieh Shadi, Hamideh Afsarmanesh. 50-55 [doi]
- A Ontological Collaborative Framework for Bussiness Process IntegrationMinh Tuan Nguyen Hoang, Trung Van Nguyen, Hanh Huu Hoang. 56-61 [doi]
- MAR-AODV: Innovative Routing Algorithm in MANET Based on Mobile AgentCung Trong Cuong, Vo Thanh Tu, Nguyen Thuc Hai. 62-66 [doi]
- Simulating Wireless Nano Sensor Networks in the NS-3 PlatformGiuseppe Piro, Luigi Alfredo Grieco, Gennaro Boggia, Pietro Camarda. 67-74 [doi]
- An Admission Control Scheme Based on Transmissions Scheduling for Wireless Mesh NetworksJuliette Dromard, Rida Khatoun, Lyes Khoukhi. 75-81 [doi]
- An LSPI Based Reinforcement Learning Approach to Enable Network Cooperation in Cognitive Wireless Sensor NetworkMilos Rovcanin, Eli De Poorter, Ingrid Moerman, Piet Demeester. 82-89 [doi]
- A Performance Evaluation of Load Balancing and QoS-aware Gateway Discovery Protocol for VANETsNoura Aljari, Kaouther Abrougui, Mohammed Almulla, Azzedine Boukerche. 90-94 [doi]
- A Modular Architecture for QoS Provisioning over Wireless LinksMaurizio Casoni, Alessandro Paganelli, Paolo Valente. 95-100 [doi]
- Multi-threaded Simulation of 4G Cellular Systems within the LTE-Sim FrameworkAlessandro Pellegrini, Giuseppe Piro. 101-106 [doi]
- Effect of Radio Interference Models on the Performance of Time Slot Assignment Algorithms in IEEE 802.16j Relay NetworksRyosuke Mine, Go Hasegawa, Yoshiaki Taniguchi, Hirotaka Nakano. 107-113 [doi]
- Joint Random Linear Network Coding and Convolutional Code with Interleaving for Multihop Wireless NetworkMisfa Susanto, Yim-Fun Hu, Prashant Pillai. 114-119 [doi]
- Performance Evaluation of Alternative Network Architectures for Sensor-Satellite Integrated NetworksSuraj Verma, Prashant Pillai, Yim-Fun Hu. 120-125 [doi]
- The Price of Secure Mobile Video StreamingGábor Fehér. 126-131 [doi]
- Bounding End-to-End Delay for Real-Time Environmental Monitoring in Avionic SystemsDaeha Jin, Junhee Ryu, Juyoung Park, Jaemyoun Lee, Heonshik Shin, Kyungtae Kang. 132-137 [doi]
- Fault Tolerance on NoCsJ. M. Montanana, D. de Andres, F. Tirado. 138-143 [doi]
- Research of PE Array Connection Network for Cool Mega-ArrayRie Uno, Nobuaki Ozaki, Hideharu Amano. 144-149 [doi]
- An FPGA Implementation of Reconfigurable Real-Time Vision ArchitectureJorge Hiraiwa, Hideharu Amano. 150-155 [doi]
- A Circuit Division Method for High-Level Synthesis on Multi-FPGA SystemsKugami Daiki, Takaaki Miyajima, Hideharu Amano. 156-161 [doi]
- Proposal of Sensor Data Gathering with Single Board ComputerKatsuyoshi Matsumoto, Motoi Yamagiwa, Minoru Uehara, Hideki Mori. 162-167 [doi]
- Interactive Interface for Web-based Programming EnvironmentHideaki Yanagisawa, Kayo Kondou. 168-173 [doi]
- Proposal of Solar Powered Grid Computing with Reuse Handheld DevicesMotoi Yamagiwa, Katsuyoshi Matsumoto, Minoru Uehara. 174-178 [doi]
- Mining Online Book Reviews for Sentimental ClusteringEric Lin, Shiaofen Fang, Jie Wang. 179-184 [doi]
- Mining Botnet Behaviors on the Large-Scale Web Application CommunityDaniel Garant, Wei Lu. 185-190 [doi]
- Detecting Local Events by Analyzing Spatiotemporal Locality of TweetsTakuya Sugitani, Masumi Shirakawa, Takahiro Hara, Shojiro Nishio. 191-196 [doi]
- Two-Phase Genetic Algorithm for Social Network Graphs ClusteringJan Kohout, Roman Neruda. 197-202 [doi]
- Document Modeling Using Syntactic and Semantic InformationEmilie Au, Mohamed Bouguessa, Shengrui Wang. 203-206 [doi]
- Foreign Exchange Trading Rules Using a Single Technical Indicator from Multiple TimeframesShangkun Deng, Akito Sakurai. 207-212 [doi]
- A General Purpose Model for Future Prediction Based on Web Search Data: Predicting Greek and Spanish ElectionSpyros E. Polykalas, George N. Prezerakos, Agisilaos Konidaris. 213-218 [doi]
- A Feasibility Study on Using Low-Cost Gaming Devices for RehabilitationKin Fun Li, Ana-Maria Sevcenco. 219-224 [doi]
- A Novel Web Service for Mammography Images IndexingAlfonso Farruggia, Rosario Magro, Salvatore Vitabile. 225-230 [doi]
- Directional Antenna Control Based Mobile Adhoc Network for Disaster Information SystemToshihiro Suzuki, Yoshitaka Shibata, Kazuo Takahata, Noriki Uchida. 231-236 [doi]
- Disaster Information Network Based on Software Defined Network FrameworkYuto Sekin, Noriki Uchida, Yoshitaka Shibata, Norio Shiratori. 237-242 [doi]
- Development of Smartphone Application for Off-Line Use in Case of DisasterHiroaki Yuze, Yuzhe Qian, Naoyoshi Suzuki. 243-248 [doi]
- Proposal of Delay Tolerant Network with Cognitive Wireless Network for Disaster Information Network SystemNoriki Uchida, Norihiro Kawamura, Nicholas Williams, Kazuo Takahata, Yoshitaka Shibata. 249-254 [doi]
- Self Power Supplied Micro Wireless Ballooned Network for Disaster RecoverySaneatsu Arimura, Noriki Uchida, Yoshitaka Shibata. 255-260 [doi]
- Using Workflow Management Systems to Improve Disaster Response ProcessesMarlen Hofmann, Stefan Sackmann, Hans Betke. 261-266 [doi]
- A Fuzzy-Based Trustworthiness System for P2P Communications in JXTA-Overlay Considering Positive and Negative EffectsKouhei Umezaki, Evjola Spaho, Leonard Barolli, Makoto Ikeda, Fatos Xhafa, Makoto Takizawa. 267-272 [doi]
- On-Line Signature Evaluation Using Fuzzy Set TheoryJungpil Shin, Tomomi Kikuchi. 273-277 [doi]
- A Fuzzy-Based Simulation System for Controlling Sensor Speed in Wireless Sensor NetworksQi Wang, Leonard Barolli, Elis Kulla, Gjergji Mino, Makoto Ikeda, Makoto Takizawa. 278-284 [doi]
- Using Artificial Neural Network for Automatic Assessment of Video SequencesBrice Ekobo Akoa, Emmanuel Simeu, Fritz Lebowsky. 285-290 [doi]
- A Biometric-Based User Authentication Scheme for Heterogeneous Wireless Sensor NetworksAshok Kumar Das, Bezawada Bruhadeshwar. 291-296 [doi]
- Information Splitting Using Crypto-biometrics ApproachMarek R. Ogiela, Lidia Ogiela. 297-299 [doi]
- A Comprehensive Study of Bluetooth Fingerprinting-Based Algorithms for LocalizationLi Zhang, Xiao Liu, Jie Song, Cathal Gurrin, Zhiliang Zhu. 300-305 [doi]
- Ant Colony Based Forwarding Method for Content-Centric NetworkingChengming Li, Kouji Okamura, Wenjing Liu. 306-311 [doi]
- Performance Evaluation of WMN-GA System for Node Placement in WMNs Considering Normal Distribution of Mesh Clients and Different Selection and Mutation OperatorsAdmir Barolli, Tetsuya Oda, Evjola Spaho, Leonard Barolli, Fatos Xhafa, Makoto Takizawa. 312-317 [doi]
- How to Compare and Interpret Two Learnt Decision Trees from the Same Domain?Petra Perner. 318-322 [doi]
- Improvements the Seccomp Sandbox Based on PBE TheoryBo Ma, Dejun Mu, Wei Fan, Wei Hu. 323-328 [doi]
- Estimate Thermo-physical Parameters from Characterization of the Building Materials by Using Artificial IntelligenceThanh Nga Thai. 329-334 [doi]
- Extensive Simulation Performance Analysis for DSDV, DSR and AODV MANET Routing ProtocolsQutaiba Razouqi, Ahmed Boushehri, Mohamed Gaballah, Lina Alsaleh. 335-342 [doi]
- Effect of Relay Nodes on End-to-End Delay in Multi-hop Wireless Ad-hoc NetworksRaja Vara Prasad Yerra, Pachamuthu Rajalakshmi. 343-348 [doi]
- A Novel Probabilistic Key Management Algorithm for Large-Scale MANETsMohammed Gharib, Ehsan Emamjomeh-Zadeh, Ashkan Norouzi-Fard, Ali Movaghar. 349-356 [doi]
- GAODV: A Modified AODV Against Single and Collaborative Black Hole Attacks in MANETsSanjay Kumar Dhurandher, Isaac Woungang, Raveena Mathur, Prashant Khurana. 357-362 [doi]
- A Secure and Efficient Authentication Protocol (SEAP) for MANETs wIth Membership RevocationSoumyadev Maity, R. C. Hansdah. 363-370 [doi]
- Performance Comparison of Wireless Sensor Networks for Different Speeds of Multi Mobile Sensor NodesTao Yang, Elis Kulla, Leonard Barolli, Gjergji Mino, Makoto Takizawa. 371-376 [doi]
- A Distributed TDMA Slot Scheduling Algorithm for Spatially Correlated Contention in WSNsAshutosh Bhatia, R. C. Hansdah. 377-384 [doi]
- Inner-Distance Measurement and Shape Recognition of Target Object Using Networked Binary SensorsShigeo Shioda. 385-392 [doi]
- Proposal and Implementation of Encounter Data Transmission with Ultrasonic Sensor-Based Active Wakeup Mechanism for Energy Efficient Sparse Wireless Sensor NetworkTatsuhiko Nakano, Yutaka Arakawa, Shigeaki Tagashira, Akira Fukuda, Riadh Dhaou. 393-400 [doi]
- On Determining Bandwidth Usage Threshold to Support Real-Time Multimedia Applications in Wireless Multimedia Sensor NetworksMuhammad Omer Farooq, Thomas Kunz. 401-406 [doi]
- Single-Sink Mobility Performance Analysis on a Wireless Senosr NetworksMajid Bayani Abbasy, Luis Miguel Lopez Ordonez. 407-412 [doi]
- Wireless Networks Sensors and Social StreamsDmitry Namiot, Manfred Sneps-Sneppe. 413-418 [doi]
- Vehicle Path Verification Using Wireless Sensor NetworksGerry Howser, Sriram Chellappan, Vamsi Paruchuri. 419-424 [doi]
- WiFi for Vehicular Communication SystemsJanis Jansons, Ernests Petersons, Nikolajs Bogdanov. 425-430 [doi]
- WiMAX-WLAN Vehicle-to-Infrastructure Network Architecture during Fast Handover ProcessMichael Charitos, Grigorios Kalivas. 431-436 [doi]
- Stabilization and Lifetime Optimization in Distributed Sensor NetworksJacques M. Bahi, Mohammed Haddad, Mourad Hakem, Hamamache Kheddouci. 437-442 [doi]
- A Stochastic Process Based Framework of Redeployment Model for Wireless Sensor NetworkRavindara Bhatt, Raja Datta. 443-449 [doi]
- ANCH: A New Clustering Algorithm for Wireless Sensor NetworksMorteza M. Zanjireh, Ali Shahrabi, Hadi Larijani. 450-455 [doi]
- Malicious Node Detection in Wireless Sensor NetworksAlaa Atassi, Naoum Sayegh, Imad Elhajj, Ali Chehab, Ayman I. Kayssi. 456-461 [doi]
- A Protocol for Authentication with Multiple Levels of Anonymity (AMLA) in VANETsN. Bharadiya Bhavesh, Soumyadev Maity, R. C. Hansdah. 462-469 [doi]
- Behavioral Mobility Model with Geographic ConstraintsRazvan Beuran, Shinsuke Miwa, Yoichi Shinoda. 470-477 [doi]
- A Priority Based Differentiation for Contention Mechanism in Legacy DCF MethodSanjay Kumar Dhurandher, Isaac Woungang, Sahil Sharma, Veeresh Goswami. 478-482 [doi]
- Mobility-Sensitive Power Control for MBSFN Cellular NetworksKonstantinos Asimakis, Christos Bouras, Vasileios Kokkinos, Andreas Papazois. 483-487 [doi]
- Toward Green Mobility in Femtocell NetworksAicha Ben Salem, Kaouthar Sethom Ben Reguiga. 488-492 [doi]
- Vertical Handover Decision Policy Based on the End User's Perceived Quality of ServiceSassi Maaloul, Mériem Afif, Sami Tabbane. 493-498 [doi]
- Effects of Signaling Attacks on LTE NetworksRamzi Bassil, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi. 499-504 [doi]
- A Novel Learning-Based Spectrum Sensing Technique for Cognitive Radio NetworksMehmet E. Aydin, Ghazanfar A. Safdar, Nauman Aslam. 505-510 [doi]
- Quantifying the Multiple Cognitive Radio Interfaces AdvantageMuhammad Talal Hassan, Ejaz Ahmed, Junaid Qadir, Adeel Baig. 511-516 [doi]
- A Proposal of Traffic Model That Allows Estimating Throughput Mean ValuesCesar Hernandez, Luis F. Pedraza, Camila Salgado. 517-522 [doi]
- On the Design of Energy-Aware 3G/WiFi Heterogeneous Networks under Realistic ConditionsSireen Taleb, Mohamad Dia, Jamal Farhat, Zaher Dawy, Hazem M. Hajj. 523-527 [doi]
- The Inter-cell Interference Suppression Algorithm Based on the JP-CoMP and Performance SimulationWeihong Fu, Lili Ma, Cheng Wang, Qingliang Kong, Weixin Tian. 528-533 [doi]
- Framework for Generic Context- and Policy-Based Traffic Distribution in Heterogeneous Wireless Networks: Black RiderSandra Frei, Woldemar F. Fuhrmann, Bogdan V. Ghita. 534-541 [doi]
- Decoupling Losses for End-to-End Bandwidth Guarantees in Interdomain TrafficFernando Fernandez-Valdes Pedrosa, Manuel Fernández-Veiga, Cándido López-García, Andrés Suárez-González. 542-547 [doi]
- Metropolitan Spectrum Survey in Bogota ColombiaLuis Fernando Pedraza, Felipe Forero, Ingrid Patricia Paez. 548-553 [doi]
- Access Control with RFID in the Internet of ThingsSteffen Elmstrom Holst Jensen, Rune Hylsberg Jacobsen. 554-559 [doi]
- Scheduling Workflows in Multi-cluster EnvironmentsSilvio Luiz Stanzani, Liria Matsumoto Sato, Marco Aurélio Stelmar Netto. 560-565 [doi]
- Empirical Evaluation of Superposition Coded Multicasting for Scalable VideoChun Pong Lau, Basem Shihada, Pin-Han Ho. 566-571 [doi]
- Improving Secure Routing Protocols Using Additional FeaturesJosé L. Tornos, José Luis Salazar. 572-577 [doi]
- Analyzing Broadband Divide in the Farming SectorMichael Jensen, José M. Gutiérrez López, Jens Myrup Pedersen. 578-582 [doi]
- A Retrospective Analysis of QoS Deployment, Operation and Use in Enterprise and Provider NetworksMichael Mackay, Christopher Edwards. 583-588 [doi]
- Performance Evaluation of Transmission Order Control on Relay Nodes in Multi-hop Wireless NetworksKentaro Kameyama, Hiroyuki Koga, Masayoshi Shimamura, Yutaka Fukuda, Takeshi Ikenaga. 589-594 [doi]
- Client Buffering Considerations for Video StreamingRubem Pereira, Ella Grishikashvili Pereira. 595-600 [doi]
- Sensor Data Processing Method Based on Observed Person's Similarity for Motion EstimationShintaro Imai, Mariko Miyamoto, Yoshikazu Arai, Toshimitsu Inomata. 601-606 [doi]
- Designing a Testbed for Broadcast Opportunistic Wireless Data Dissemination ProtocolsNasif Muslim, Florian Pregizer. 607-612 [doi]
- A Machine Learning Algorithm for Searching Vectorised RDF DataAsaad Sabah Hadi, Paul Fergus, Chelsea Dobbins, Abbas Muhsin Al-Bakry. 613-618 [doi]
- Design and Implementation of Real-Time Flow Viewer across Different DomainsWun-Yuan Huang, Jen-Wei Hu, Ta-Yuan Chou, Te-Lung Liu. 619-624 [doi]
- Performance Analysis and Optimization of Map Only Left Outer JoinMing Hao, Tomasz Wiktor Wlodarczyk, Chunming Rong. 625-631 [doi]
- Efficient Service Management for Multimedia Sessions in Hybrid CloudsCristina Dutu, Elena Apostol, Catalin Leordeanu, Valentin Cristea. 632-637 [doi]
- Static Testing as a Service on CloudSiqin Chen, Junfei Huang, Yunzhan Gong. 638-642 [doi]
- Structured and Unstructured Data in the Cloud: A Swiss Perspective on Readiness and Internal ControlsDavid Simms, Solange Ghernaouti-Helie. 643-648 [doi]
- TeraScaler ELB-an Algorithm of Prediction-Based Elastic Load Balancing Resource Management in Cloud ComputingHe-Sheng Wu, Chong-Jun Wang, Jun-Yuan Xie. 649-654 [doi]
- A DDoS Mitigation System with Multi-stage Detection and Text-Based Turing Testing in Cloud ComputingVincent Shi-Ming Huang, Robert Huang, Ming Chiang. 655-662 [doi]
- A Secure Shared Group Model of Cloud StorageChing-Hung Yeh. 663-667 [doi]
- Secure Picture Data Partitioning for Cloud Computing ServicesRené Leistikow, Djamshid Tavangarian. 668-671 [doi]
- The Cloud Streaming Service Migration in Cloud Video Storage SystemYi-Hsing Tsai. 672-677 [doi]
- SWIFT: A Secure Web Domain Filter in HardwareVlado Altmann, Jens Rohrbeck, Jan Skodzik, Peter Danielis, Dirk Timmermann, Maik Roennau, Matthias Ninnemann. 678-683 [doi]
- A Practical Steganographic Approach for Matroska Based High Quality Video FilesNikolaos Pitropakis, Costas Lambrinoudakis, Dimitris Geneiatakis, Dimitris Gritzalis. 684-688 [doi]
- A Scheme for the Generation of Strong ICMetrics Based Session Key Pairs for Secure Embedded System ApplicationsRuhma Tahir, Huosheng Hu, Dongbing Gu, Klaus D. McDonald-Maier, Gareth Howells. 689-696 [doi]
- Toward Mobile Authentication with Keystroke Dynamics on Mobile Phones and TabletsMatthias Trojahn, Frank Ortmeier. 697-702 [doi]
- Analysis of the Forensic Traces Left by AirPrint in Apple iOS DevicesLuis Gómez-Miralles, Joan Arnedo-Moreno. 703-708 [doi]
- Bidirectional Private Policy Matching Based on Additively Homomorphic Encryption SystemsMomoko Aoyama, Fumihiro Mori, Hirofumi Yamaki. 709-716 [doi]
- Integration of Privacy Protection Mechanisms in Location-Based ServicesGianluca Dini, Pericle Perazzo. 717-724 [doi]
- Determining Home Users' Vulnerability to Universal Plug and Play (UPnP) AttacksShadi Esnaashari, Ian Welch, Peter Komisarczuk. 725-729 [doi]
- Reputation Scoring System Using an Economic Trust Model: A Distributed Approach to Evaluate Trusted Third Parties on the InternetMarat Vyshegorodtsev, Daisuke Miyamoto, Yasushi Wakahara. 730-737 [doi]
- Behavior Ontology: A Framework to Detect Attack Patterns for SecuritySujeong Woo, Jinho On, Moonkun Lee. 738-743 [doi]
- Petri-Net Based User Profile Data Ontology for SNSHwa-Young Jeong, Jong Hyuk Park, Young-Sik Jeong, Doo-Soon Park. 744-748 [doi]
- A Two-tier Overlay Publish/Subscribe System for Sensor Data Stream Using Geographic Based Load BalancingTatsuya Fukui, Satoshi Matsuura, Atsuo Inomata, Kazutoshi Fujikawa. 749-756 [doi]
- A Deadline Scheduler for Jobs in Distributed SystemsQuentin Perret, Gabriel Charlemagne, Stelios Sotiriadis, Nik Bessis. 757-764 [doi]
- Towards Inter-cloud Simulation Performance Analysis: Exploring Service-Oriented Benchmarks of Clouds in SimICStelios Sotiriadis, Nik Bessis, Nick Antonopoulos. 765-771 [doi]
- Reputation Guided Genetic Scheduling Algorithm for Independent Tasks in Inter-clouds EnvironmentsFlorin Pop, Valentin Cristea, Nik Bessis, Stelios Sotiriadis. 772-776 [doi]
- Intercloud Architecture Framework for Heterogeneous Cloud Based Infrastructure Services Provisioning On-DemandYuri Demchenko, Canh Ngo, Cees de Laat, Joan Antoni García Espín, Sergi Figuerola, Juan Rodríguez, Luis Miguel Contreras Murillo, Giada Landi, Nicola Ciulli. 777-784 [doi]
- An Agent-Based Architecture and a Two-Phase Protocol for the Data Portability in CloudsMeriem Thabet, Mahmoud Boufaïda. 785-790 [doi]
- Energy-Aware Social-Based Routing in Opportunistic NetworksCristian Chilipirea, Andreea-Cristina Petre, Ciprian Dobre. 791-796 [doi]
- User-Side Personalization Considering Privacy Preserving in Cloud SystemsLeila Sharifi, Maryam Heidari Beisafar. 797-802 [doi]
- Impact of IEEE 802.11 PHY/MAC Strategies on Routing Performance in Wireless Mesh NetworksChiraz Houaidia, Hanen Idoudi, Adrien van den Bossche, Thierry Val, Leïla Azouz Saïdane. 803-808 [doi]
- Multihop Mobility Metrics based on Link StabilityNamusale Chama, Rute C. Sofia, Susana Sargento. 809-816 [doi]
- CORP: An Efficient Protocol to Prevent Data Loss in Mobile Ad-hoc NetworksGanapathy Mani. 817-824 [doi]
- Early Detection Method of Service Quality Reduction Based on Linguistic and Time Series Analysis of TwitterKazushi Ikeda, Gen Hattori, Chihiro Ono, Hideki Asoh, Teruo Higashino. 825-830 [doi]
- Applying Reputation to Virtual Magnetic NetworksHenrique Galperin, Luiz Augusto de Paula Lima, Alcides Calsavara. 831-836 [doi]
- Performance Evaluation of Hierarchical-Torus NoCSamia Loucif. 837-842 [doi]
- Acceleration of Communication-Aware Task Mapping Techniques through GPU ComputingJavier Reyes, Juan M. Orduña, Guillermo Vigueras, Rafael Tornero. 843-848 [doi]
- A New Active Path Identification and Filtering MethodLin Chen, Ming He, Zhihong Liu, Guilin Cai. 849-853 [doi]
- The Throughput Benefits of Network Coding for SW-ARQ CommunicationAlaa Alsebae, Mark S. Leeson, Roger J. Green. 854-859 [doi]
- On the Gaussian Characteristics of Aggregated Short-Lived Flows on High-Bandwidth LinksGhasem Kahe, Amir-Hossein Jahangir. 860-865 [doi]
- Modeling Controls for Compliance - An Analysis of Business Process Modeling LanguagesHans Betke, Kai Kittel, Stefan Sackmann. 866-871 [doi]
- Image Objects Phase/Intensity Measurements with Conjugated Liquid Crystal Modulators over Mach-Zehnder InterferometryJen-Fa Huang, Ta-Chun Nieh, Yu-Chang He. 872-876 [doi]
- Experiment of Geometrically Invariant and Unneeded Synchronism Watermarking Using Winding NumberHiroki Nishikawa, Yoshio Kakizaki, Keiichi Iwamura, Isao Echizen. 877-882 [doi]
- An ECC-Time Stamp Based Mutual Authentication and Key Management Scheme for WSNsGaurav Indra, Renu Taneja. 883-889 [doi]
- An Add-on for Security on Concurrent Multipath Communication SCTPHamideh Jabalameli, Abbas Malekpour, Rashid Hassani, Peter Luksch. 890-895 [doi]
- DNS Update Extension to IPv6 Secure AddressingHosnieh Rafiee, Martin von Löwis, Christoph Meinel. 896-902 [doi]
- Data Collection from Isolated Clusters in Wireless Sensor Networks Using Mobile FerriesKonstantin Mikhaylov, Jouni Tervonen. 903-909 [doi]
- A Novel Cluster Head Selection Method based on K-Means Algorithm for Energy Efficient Wireless Sensor NetworkGeon Yong Park, Hee-seong Kim, Hwi Woon Jeong, Hee Yong Youn. 910-915 [doi]
- Performance Analysis of Medium Access Control Protocol for Wireless Body Area NetworksNourchene Bradai, Lamia Chaari Fourati, Lotfi Kamoun. 916-921 [doi]
- Protecting Access Pattern Privacy in Database Outsourcing ServicePham Thi Bach Hue, Nguyen Dinh Thuc, Dong Thi Bich Thuy, Isao Echizen, Sven Wohlgemuth. 922-928 [doi]
- Privacy Enhanced and Computationally Efficient HSK-AKA LTE SchemeKhodor Hamandi, Imad Sarji, Ali Chehab, Imad H. Elhajj, Ayman I. Kayssi. 929-934 [doi]
- A Client Privacy Preserving Discovery Service SchemeZhipeng Wang, Hong Zhu. 935-940 [doi]
- Privacy Obfuscation with Bloom Filter for Effective AdvertisementRyuya Uda. 941-946 [doi]
- A Novel Web Synchronization Method for Supporting Smooth Web CommunicationKazuyuki Tasaka, Takashi Ozu, Akira Idoue. 947-952 [doi]
- An M2M Data Analysis Service System Based on Open Source Software EnvironmentsShinji Kitagami, Moriki Yamamoto, Hisao Koizumi, Takuo Suganuma. 953-958 [doi]
- A Virtual Campus Tour Service Using Remote Control Robots on Robot Service Network ProtocolToshiyuki Kusu, Yuka Ito, Takaaki Kida, Tetsuya Shimada, Masahiko Takahashi, Yuta Nomoto, Yosuke Tsuchiya, Masahiko Narita, Yuka Kato. 959-964 [doi]
- The Impact of Content Oriented Routing on OpenFlow Burst Switched Optical NetworksMohammed Al-Momin, John Cosmas. 965-970 [doi]
- Routing Protocol Based on the Position, Velocity, and Direction of the NodesGil Eduardo de Andrade, Luiz Augusto de Paula Lima, Alcides Calsavara, Carlos Alberto Maziero. 971-976 [doi]
- Comparison of Three Interpolation Techniques in Comb-Type Pilot-Assisted Channel Coded OFDM SystemLatif Ullah Khan, Zeeshan Sabir, Sahibzada Ali Mahmud, Gul Muhammad Khan. 977-981 [doi]
- CCN-TV: A Data-centric Approach to Real-Time Video ServicesVincenzo Ciancaglini, Giuseppe Piro, Riccardo Loti, Luigi Alfredo Grieco, Luigi Liquori. 982-989 [doi]
- Continuous Usage Intention of Videoconferencing Software: A Case Study of One-to-Some Online CoursesTai-Tien Lin, Kuo-Lun Hsiao, Hsiu-Sen Chiang, Ching Ting Huang. 990-995 [doi]
- Feedback Capacity of Different Complex Network ModelsGhufran Al-Shiridah, Khaled Mahdi, Maytham Safar. 996-1003 [doi]
- Android SMS Malware: Vulnerability and MitigationKhodor Hamandi, Ali Chehab, Imad H. Elhajj, Ayman I. Kayssi. 1004-1009 [doi]
- A Multi-Class Mobility Model for Dynamic and Dependable SystemsPeter Bull, Georgios Antonopoulos, Lin Guan, Xingang Wang, Xunli Fan. 1010-1015 [doi]
- Technical Challenges in Providing Remote Health Consultancy Services for the Unreached CommunityEiko Kai, Ashir Ahmed. 1016-1020 [doi]
- A Markov Chain Based Model for Congestion Control in VANETsM. A. Benatia, Lyes Khoukhi, Moez Esseghir, Leïla Merghem-Boulahia. 1021-1026 [doi]
- Group Communication Protocols for Scalable Groups of PeersDilawaer Duolikun, Hiroyuki Hama, Ailixier Aikebaier, Tomoya Enokido, Makoto Takizawa. 1027-1032 [doi]
- Green and Secure Office Space Using Near Field Coupling Communication SystemTomoaki Yanagawa, K. Nagata, M. Nozawa, T. Nakamura, Yuichi Kado. 1033-1037 [doi]
- Runtime Change of Collaboration Patterns in Autonomic Systems: Motivations and PerspectivesGiacomo Cabri, Nicola Capodieci. 1038-1043 [doi]
- 3D-to-2D Projection Algorithm for Remote Control Using Smartphone: Enhancing Smartphone Capability for Costless Wireless Audio Visual Consumer Appliance ControlP. N. Ali Fahmi, Prayoga Budhi, Jongmin Song, Ardiansyah, Deokjai Choi, Youngchul Kim. 1044-1049 [doi]
- A Recommendation Exchange Protocol between Smart Devices in Pervasive Computing EnvironmentNaima Iltaf, Abdul Ghafoor, Usman Zia. 1050-1055 [doi]
- A Configurable and Extensible Security Service Architecture for SmartphonesDennis Titze, Philipp Stephanow, Julian Schütte. 1056-1062 [doi]
- Simulating Reader-to-Reader Interference in RFID SystemsRenato Ferrero, Filippo Gandino, Linchao Zhang, Bartolomeo Montrucchio, Maurizio Rebaudengo. 1063-1069 [doi]
- A Study on Practices against Malware in Free Software ProjectsIgnacio Colomina, Joan Arnedo-Moreno, Robert Clarisó. 1070-1075 [doi]
- MCF: MultiComponent Features for Malware AnalysisP. Vinod, Vijay Laxmi, Manoj Singh Gaur, Smita Naval, Parvez Faruki. 1076-1081 [doi]
- Modelling Attacker with Deciding Security Properties by Induction and DeductionYoney Kirsal-Ever, Agozie Eneh, Orhan Gemikonakli, Leonardo Mostarda. 1082-1087 [doi]
- Network Data Visualization Using Parallel Coordinates Version of Time-tunnel with 2Dto2D Visualization for Intrusion DetectionYoshihiro Okada. 1088-1093 [doi]
- Design and Implementation of the NORNET CORE Research Testbed for Multi-homed SystemsThomas Dreibholz, Ernst Gunnar Gran. 1094-1100 [doi]
- Network Topology Inference from End-to-End Unicast MeasurementsAmir Malekzadeh, Mike H. MacGregor. 1101-1106 [doi]
- Multipath Video Streaming Based on Hierarchical Routing ManagementThomas Volkert, Manuel Osdoba, Andreas Mitschele-Thiel, Martin Becke. 1107-1112 [doi]
- Non-renegable Selective Acknowledgments (NR-SACKs) for MPTCPFan Yang, Paul D. Amer. 1113-1118 [doi]
- Mitigating Receiver's Buffer Blocking by Delay Aware Packet Scheduling in Multipath Data TransferGolam Sarwar, Roksana Boreli, Emmanuel Lochin, Ahlem Mifdaoui, Guillaume Smith. 1119-1124 [doi]
- An Approach to Enterprise Collaboration through Concurrent Scene Understanding and InteroperationJohn Mashford. 1125-1128 [doi]
- A Business Model for Personalized Promotion Systems on Using WLAN Localization and NFC TechniquesKam-yiu Lam, Joseph K. Ng, Jian-Tao Wang. 1129-1134 [doi]
- Personal Analytics as a Factor of Change in Enterprise Communication and Collaboration PatternsSerguei Dobrinevski. 1135-1140 [doi]
- E-commerce and B2B Services EnterprisesPolina Fauska, Natalia Kryvinska, Christine Strauss. 1141-1146 [doi]
- Experience in Developing Concurrent Inferences on a De-regulated Supply Chain NetworkPaul Moynihan, Wei Dai. 1147-1152 [doi]
- A Generic Logging Template for Infrastructure as a Service CloudWinai Wongthai, Francisco Liberal Rocha, Aad P. A. van Moorsel. 1153-1160 [doi]
- An SLA Ontology to Support Service Discovery in Future Cloud MarketsGiuseppe Di Modica, Giuseppe Petralia, Orazio Tomarchio. 1161-1166 [doi]
- Routing over Relaxed Triangulation Structures for P2P-based Virtual EnvironmentsEliya Buyukkaya, Maha Abdallah. 1167-1173 [doi]
- A Novel Workflow Management System for Handling Process Adaptation and ComplianceM. S. Haji Omar, Paul W. H. Chung, Christian W. Dawson. 1174-1179 [doi]
- Towards Independent Assisted Living: The Application of Intelligent Context-Aware SystemsPhilip Moore, Cain Evans, George Tadros. 1180-1185 [doi]
- 1C. Evans, S. Abu Rmeileh. 1186-1191 [doi]
- iMAS: An Intelligent Mobile Advertising System: Development and ImplementationC. Evans, P. Moore, A. M. Thomas, O. Pavlemko. 1192-1196 [doi]
- eMonitoring for eHealth: Research Projects for Assisted LivingA. M. Thomas, C. Evans, P. Moore, M. Sharma, A. Patel, H. Shah, P. Chima, S. Abu Rmeileh, G. Dubb, R. Bhana. 1197-1202 [doi]
- A Cloud-Based Framework for Collaborative Data Management in the VPH-Share ProjectSiegfried Benkner, Chris Borckholder, Marian Bubak, Yuriy Kaniovskyi, Richard Knight, Martin Koehler, Spiros Koulouzis, Piotr Nowakowski, Steven Wood. 1203-1210 [doi]
- Integrating Structured Peer-to-Peer Networks Into OM4SPACE ProjectIrina Astrova, Arne Koschel, Leonard Renners, Thomas Rossow, Marc Schaaf. 1211-1216 [doi]
- COMPOSE - A Journey from the Internet of Things to the Internet of ServicesBenny Mandler, Fabio Antonelli, Robert Kleinfeld, Carlos Pedrinaci, David Carrera, Alessio Gugliotta, Daniel Schreckling, Iacopo Carreras, Dave Raggett, Marc Pous, Carmen Vicente Villares, Vlad Trifa. 1217-1222 [doi]
- Programming Ecological Niche Modeling Workflows in the CloudDaniele Lezzi, Roger Rafanell, Erik Torres, Renato De Giovanni, Ignacio Blanquer, Rosa M. Badia. 1223-1228 [doi]
- From Cloud Governance to IoT GovernanceAdrian Copie, Teodor Florin Fortis, Victor Ion Munteanu, Viorel Negru. 1229-1234 [doi]
- A Proposal of a Simulation-Based Approach for Service Level Agreement in CloudMassimiliano Rak, Antonio Cuomo, Umberto Villano. 1235-1240 [doi]
- Multi-objective Decision Support for Brokering of Cloud SLAAlba Amato, Salvatore Venticinque. 1241-1246 [doi]
- A Semantic Registry for Cloud ServicesCristina Mindruta, Teodor Florin Fortis. 1247-1252 [doi]
- Semantic and Agent Technologies for Cloud Vendor Agnostic Resource BrokeringAlba Amato, Giuseppina Cretella, Beniamino Di Martino, Salvatore Venticinque. 1253-1258 [doi]
- A Framework for Semantic Interoperability over the CloudFlora Amato, Antonino Mazzeo, Vincenzo Moscato, Antonio Picariello. 1259-1264 [doi]
- Scripting a Smart City: The CityScripts Experiment in SantanderDavide Carboni, Antonio Pintus, Andrea Piras, Alberto Serra, Atta Badii, Marco Tiemann. 1265-1270 [doi]
- A Living Smart City: Dynamically Changing Nodes Behavior through over the Air ProgrammingJosé Antonio Galache, Pablo Sotres, Juan R. Santana, Veronica Gutiérrez, Luis Sánchez, Luis Muñoz. 1271-1276 [doi]
- Architecture for Smart Highway Real Time MonitoringFelix Jesús Villanueva, Javier Albusac, Luis Jiménez, David Villa, Juan Carlos López. 1277-1282 [doi]
- A Unified View on Data Path Aspects for Sensing Applications at a Smart City ScaleVangelis Gazis, Martin Strohbach, Navot Akiva, Maximilian Walther. 1283-1288 [doi]
- Semantic-Based Knowledge Dissemination and Extraction in Smart EnvironmentsMichele Ruta, Floriano Scioscia, Eugenio Di Sciascio, Domenico Rotondi, Salvatore Piccione. 1289-1294 [doi]
- RFID Tracking for Urban Transportation Using EPCGlobal-based WebServicesJose I. San Jose, José Manuel Pastor, Roberto Zangróniz Higuera, Juan J. De Dios. 1295-1300 [doi]
- Enabling Participative Marketing through the Internet of ThingsAntonio J. Jara, Antonio F. Gómez-Skarmeta, Maria Concepcion Parra. 1301-1306 [doi]
- Design of Geographically Aggregatable Address and Routing Toward Location Based MulticastKazuya Okada, Takeshi Okuda, Suguru Yamaguchi. 1307-1312 [doi]
- An Extended Topic-Based Pub/Sub Broker for Cooperative Mobile ServicesAugusto Morales Dominguez, Ramón Alcarria, Edwin Cedeno, Tomás Robles. 1313-1318 [doi]
- Benchmarking Internet of Things Deployments in Smart CitiesFranck Le Gall, Sophie Vallet Chevillard, Alex Gluhak, Zhang Xueli. 1319-1324 [doi]
- Mobile Digcovery: A Global Service Discovery for the Internet of ThingsAntonio J. Jara, Pablo Lopez, David Fernández, Jose F. Castillo, Miguel A. Zamora, Antonio F. Gómez-Skarmeta. 1325-1330 [doi]
- HIP Security Architecture for the IP-Based Internet of ThingsFrancisco Vidal-Meca, Jan Henrik Ziegeldorf, Pedro Moreno-Sanchez, Oscar García Morchon, Sandeep S. Kumar, Sye Loong Keoh. 1331-1336 [doi]
- Differential Elliptic Point Addition in Twisted Edwards CurvesLeandro Marin. 1337-1342 [doi]
- Towards Ambient Assisted Cities and CitizensDiego López-de-Ipiña, Bernhard Klein, Sacha Vanhecke, Jorge Perez-Velasco. 1343-1348 [doi]
- Survey of Internet of Things Technologies for Clinical EnvironmentsPablo Lopez, David Fernández, Antonio J. Jara, Antonio F. Gómez-Skarmeta. 1349-1354 [doi]
- Validating a Business Model Framework for Smart City Services: The Case of FixMyStreetNils Walravens. 1355-1360 [doi]
- Building Automation and Smart Cities: An Integration Approach Based on a Service-Oriented ArchitectureMarkus Jung, Jürgen Weidinger, Wolfgang Kastner, Alex Olivieri. 1361-1367 [doi]
- A Variability Model for Template Personalization in Mobile Prosumer EnvironmentsRamón Alcarria, Tomás Robles, Augusto Morales Dominguez, Sergio Gonzalez-Miranda, Daniel Caballero. 1368-1373 [doi]
- Smart Lighting Solutions for Smart CitiesMiguel Castro, Antonio J. Jara, Antonio F. Gómez-Skarmeta. 1374-1379 [doi]
- Parking Easier by Using Context Information of a Smart City: Enabling Fast Search and Management of Parking ResourcesJuan Rico, Juan Sancho, Bruno Cendón, Miguel Camus. 1380-1385 [doi]
- Extension of the ITS Station Architecture to Low-Power Pervasive Sensor NetworksLaszlo Viragg, József Kovács, András Edelmayer. 1386-1391 [doi]
- Improving Service Quality for Parking Lot Users Using Intelligent Parking Reservation PoliciesNikolaos D. Doulamis, Eftychios Protopapadakis, Lambros Lambrinos. 1392-1397 [doi]
- Evaluation of Java for General Purpose GPU ComputingJorge Docampo, Sabela Ramos, Guillermo L. Taboada, Roberto R. Expósito, Juan Touriño, Ramon Doallo. 1398-1404 [doi]
- Object Support for OpenMP-style Programming of GPU Clusters in JavaCarolin Wolf, Georg Dotzler, Ronald Veldema, Michael Philippsen. 1405-1410 [doi]
- A Multi-GPU Framework for In-Memory Text Data AnalyticsPoh Kit Chong, Ettikan Kandasamy Karuppiah, Keh Kok Yong. 1411-1416 [doi]
- Promoting Data-Centric Supercomputing to the WWW World: Open MPI's Java BindingsAlexey Cheptsov. 1417-1422 [doi]
- CUDA Powered User-Defined Types and AggregatesMarcin Gorawski, Michal Lorek 0002, Anna Gorawska. 1423-1428 [doi]
- Distributed Gröbner Bases Computation with MPJHeinz Kredel. 1429-1435 [doi]
- Straightforward Parallelization of Polynomial Multiplication Using Parallel Collections in ScalaRaphaol Jolly. 1436-1438 [doi]
- Passive Testing on Performance Requirements of Network ProtocolsXiaoping Che, Stéphane Maag. 1439-1444 [doi]
- Adkintun: SLA Monitoring of ISP Broadband OfferingsJavier Bustos-Jiménez, Victor Ramiro, Felipe Lalanne, Tomás Barros. 1445-1449 [doi]
- An Effective Attack Detection Approach in Wireless Mesh NetworksFelipe Barbosa Abreu, Anderson Nunes Paiva Morais, Ana R. Cavalli, Bachar Wehbi, Edgardo Montes de Oca. 1450-1455 [doi]
- Enabling IPTV Service Assurance Using OpenFlowPatrick McDonagh, Cristian Olariu, Adriana Hava, Christina Thorpe. 1456-1460 [doi]
- A Study on a Distributed Rerouting SchemeIlir Shinko, Yoann Foquet, Dritan Nace. 1461-1466 [doi]
- Encrypted Incremental Backup without Server-Side SoftwareShih-Yu Lu. 1467-1472 [doi]
- Modeling and Evaluation of Machine Learning Based Network Management System for NGNAbul Bashar. 1473-1478 [doi]
- Usage of Social Media for External Stakeholder Relationship Management - A Study of German Companies and International Non-government OrganizationsNina Krüger, Linh Dang-Xuan, Anna-Maria Schneider, Stefan Stieglitz. 1479-1482 [doi]
- Adoption of Social Media for Internal Usage in a Global EnterpriseStefan Stieglitz, Siegfried Schallenmuller, Christian Meske. 1483-1488 [doi]
- Accessing Knowledge with a Game - A Meta-analysis of Prediction MarketsChristian Scheiner, Philipp Haas, Niklas Leicht, Kai-Ingo Voigt. 1489-1494 [doi]
- Specification of mCRM Enterprise Applications to Support IT-ConsultantsTobias Brockmann, Stefan Stieglitz. 1495-1500 [doi]
- MitomiRs and Energetic RegulationJacques Demongeot, Olivier Cohen, Andrei Doncescu, A. Henrion-Caude. 1501-1508 [doi]
- MicroRNAs: Unspecific Inhibitory Regulation in Immunologic Control and in Mitochondrial RespirationJacques Demongeot, H. Hazgui, N. Villerme. 1509-1516 [doi]
- Data Mining Based Analysis of Genomic Location Shifts of Conserved Annotated miRNA Genes gives Preliminary Insights on Molecular Network EvolutionFrederic Michon. 1517-1524 [doi]
- Dynalets: A New Representation of Periodic Biological Signals and Spectral DataJacques Demongeot, A. Hamie, Antonio Glaria, Carla Taramasco. 1525-1532 [doi]
- Information Design of Biological Networks: Application to Genetic, Immunologic, Metabolic and Social NetworksJacques Demongeot, H. Pempelfort, J. M. Martinez, R. Vallejos, Marta Barría, Carla Taramasco. 1533-1540 [doi]
- A Case for Energy-Aware Security MechanismsXun Li 0001, Frederic T. Chong. 1541-1546 [doi]
- Energy Consumption Simulation of Different Distributed Intrusion Detection ApproachesMauro Migliardi, Alessio Merlo. 1547-1552 [doi]
- Digital Watermarking Techniques and Security Issues in the Information and Communication SocietyJordi Nin, Sergio Ricciardi. 1553-1558 [doi]
- Decentralized Consensus Protocols: The Enabler for Smarter Grids MonitoringAntonio Iacoviello, Vincenzo Loia, Antonio Pietrosanto, Alfredo Vaccaro. 1559-1564 [doi]
- Modeling Energy Savings for Job Migration in Grid EnvironmentsAntonella Galizia, Mark Yampolskiy, Michael Schiffers, Alfonso Quarati, Andrea Clematis. 1565-1570 [doi]
- CPNoC: An Energy-Efficient Photonic Network-on-ChipJunhui Wang, Gang Han, Baoliang Li, Jia Lu, Wenhua Dou. 1571-1576 [doi]
- Smart Distributed System Architecture for Green CommunicationsAnna Vizziello, Lorenzo Favalli. 1577-1581 [doi]
- Energy Consumption of the Mobile Wireless Sensor Network's Node with Controlled MobilityKonstantin Mikhaylov, Jouni Tervonen. 1582-1587 [doi]
- Estimation of the Energy Consumption of Mobile Sensors in WSN Environmental Monitoring ApplicationsMaurizio D'Arienzo, Mauro Iacono, Stefano Marrone, Roberto Nardone. 1588-1593 [doi]
- Energy Efficient Double Cluster Head Routing Scheme in a City Vehicular NetworkHamdi Idjmayyel, Bilal R. Qazi, Jaafar M. H. Elmirghani. 1594-1599 [doi]
- Reducing Energy Cost of Keepalive Messages in 3G MobilesMohamed Oulmahdi, Christophe Chassot, Ernesto Exposito. 1600-1605 [doi]
- Cluster Head Assignment in Networks Controlled by Gateway Entities (CHANGE): Simulation Analysis of Protocol PerformanceJuan Rico, Javier Valino, Edgar Epifanio. 1606-1611 [doi]
- An Extension of the Link Layer Discovery Protocol for On-Demand Power Supply Network by PoEMasaya Yokohata, Tomotaka Maeda, Yasuo Okabe. 1612-1616 [doi]
- All Silicon Data Center, the Energy PerspectivesAntonio Scarfò. 1617-1622 [doi]
- Energy-Aware Cache Management for Content-Centric NetworkingSatoshi Imai, Kenji Leibnitz, Masayuki Murata. 1623-1629 [doi]
- Smart Outlet Network for Energy-Aware Services Utilizing Various Sensor InformationNaoyuki Morimoto, Yuu Fujita, Masaaki Yoshida, Hiroyuki Yoshimizu, Masafumi Takiyamada, Terukazu Akehi, Masami Tanaka. 1630-1635 [doi]
- The Potential of Energy/Utility-Accrual SchedulingMarcus Hähnel, Marcus Völp, Björn Döbel, Hermann Härtig. 1636-1641 [doi]
- Deriving Job Completion Reliability and Job Energy Consumption for a General MapReduce Infrastructure from Single-Job PerspectiveJia-Chun Lin, Fang-Yie Leu, Ming-Chang Lee, Ying-Ping Chen. 1642-1647 [doi]