Abstract is missing.
- Delay Asymmetry Correction Model for Master-Slave Synchronization ProtocolsMd. Arifur Rahman, Thomas Kunz, Howard Schwartz. 1-8 [doi]
- From Self-Regulate to Admission Control in Real-Time Traffic EnvironmentHengky Susanto. 9-16 [doi]
- End-to-End Measurement of Hop-by-Hop Available BandwidthKazumasa Koitani, Go Hasegawa, Masayuki Murata. 17-24 [doi]
- An Analytical View of Multiple CDNs CollaborationMoisés Rodrigues, Stenio Fernandes, Judith Kelner, Djamel Sadok. 25-32 [doi]
- PUSH: Proactive Unified Spectrum Handoff in CR-MANETsSamad Nejatian, Sharifah Kamilah Syed Yusof, N. M. Abdul Latiff, Vahid Asadpour. 33-40 [doi]
- An Imperialist Competitive Algorithm for Interference-Aware Cluster-Heads Selection in Ad Hoc NetworksMahboobeh Parsapoor, Urban Bilstrup. 41-48 [doi]
- Dynamic Hierarchical Trust Management of Mobile Groups and Its Application to Misbehaving Node DetectionIng-Ray Chen, Jia Guo. 49-56 [doi]
- Available-Bandwidth-Based Routing in IEEE 802.15.4-Based Ad-Hoc Networks: Proactive vs. Opportunistic TechniqueMuhammad Omer Farooq, Thomas Kunz. 57-64 [doi]
- Cooperative Mobile Live Streaming Considering Neighbor ReceptionSho Hatakeyama, Yoshiki Sakata, Hiroshi Shigeno. 65-72 [doi]
- Node Position Forecast in MANET with PheroCastPaulo R. S. L. Coelho, Enrique Fynn, Luis F. Faina, Rafael Pasquini, Lásaro Jonas Camargos. 73-80 [doi]
- USABle - A Communication Framework for Ubiquitous SystemsMarcio E. F. Maia, Rossana M. C. Andrade, Carlos A. B. de Queiroz Filho, Reinaldo Bezerra Braga, Saulo B. de Aguiar, Bruno Gois Mateus, Rute Nogueira, Fredrik Toorn. 81-88 [doi]
- A Personalized Learning System with an AR Augmented Reality Browser for Ecosystem FieldworkMasato Kasahara, Kosuke Takano, Kin Fun Li. 89-97 [doi]
- A New Efficient and Secure POR Scheme Based on Network CodingKazumasa Omote, Tran Thao Phuong. 98-105 [doi]
- Toward a Framework for Continuous Authentication Using StylometryMarcelo Luiz Brocardo, Issa Traoré, Isaac Woungang. 106-115 [doi]
- Protecting Run-Time Filters for Network Intrusion Detection SystemsVictor C. Valgenti, Hai Sun, Min Sik Kim. 116-122 [doi]
- Security in Online Learning Assessment Towards an Effective Trustworthiness Approach to Support E-Learning TeamsJorge Miguel, Santi Caballé, Fatos Xhafa, Josep Prieto. 123-130 [doi]
- Innovating on Interdomain Routing with an Inter-SDN ComponentRicardo Bennesby, Edjard Mota, Paulo Fonseca, Alexandre Passito. 131-138 [doi]
- An Identifier-Locator Approach to Host MultihomingBruce Simpson, Saleem N. Bhatti. 139-147 [doi]
- Joint Allocation of Nodes and Links with Load Balancing in Network VirtualizationAndré Vitor de Almeida Palhares, Marcelo Anderson Santos, Patricia Takako Endo, Jonatas Vitalino, Moisés Rodrigues, Glauco Estacio Gonçalves, Djamel Sadok, Azimeh Sefidcon, Fetahi Wuhib. 148-155 [doi]
- An Analysis of the Impact of Out-of-Order Recovery Algorithms on MPTCP ThroughputAmani Alheid, Dritan Kaleshi, Angela Doufexi. 156-163 [doi]
- CollabAssure: A Collaborative Market Based Data Service Assurance Framework for Mobile DevicesBhanu Kaushik, Honggang Zhang, Xinyu Yang, Xinwen Fu, Benyuan Liu. 164-171 [doi]
- Efficient Beacon-Less Broadcasting in MANETsLouisa Harutyunyan, Jaroslav Opatrny. 172-179 [doi]
- FBMIS: A Fuzzy-Based Multi-interface System for Cellular and Ad Hoc NetworksElis Kulla, Gjergji Mino, Shinji Sakamoto, Makoto Ikeda, Santi Caballé, Leonard Barolli. 180-185 [doi]
- HER-MAC: A Hybrid Efficient and Reliable MAC for Vehicular Ad Hoc NetworksDuc Ngoc Minh Dang, Hanh Ngoc Dang, Vandung Nguyen, Zaw Htike, Choong Seon Hong. 186-193 [doi]
- Application-Aware Fast Dormancy in LTEJacques Bou Abdo, Imad Sarji, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi. 194-201 [doi]
- Determining Per-Mode Battery Usage within Non-trivial Mobile Device AppsM. Abousaleh, D. Yarish, Deepali Arora, Stephen W. Neville, Thomas E. Darcie. 202-209 [doi]
- Clock Synchronization in Mobile Ad Hoc Networks Based on an Iterative Approximate Byzantine Consensus ProtocolChuanyou Li, Yun Wang, Michel Hurfin. 210-217 [doi]
- Annotation-Based Access Control Approach for Ubiquitous SystemsRhoney Benigno, Natan Pedrosa, Pedro Tome, Wesley Araujo, Jose R. Torres Neto, Eucassio Junior, Savio Mota, Jose B. Filho, Hervé Martin. 218-225 [doi]
- Analyzing Cascading Failures in Smart Grids under Random and Targeted AttacksSushmita Ruj, Arindam Pal. 226-233 [doi]
- A Spoofing Attack against a Cancelable Biometric Authentication SchemeTetsuya Izu, Yumi Sakemi, Masahiko Takenaka, Naoya Torii. 234-239 [doi]
- New Condition for Hierarchical Secret Image Sharing SchemeAngelina Espejel Trujillo, Mariko Nakano-Miyatake, Héctor Pérez-Meana. 240-244 [doi]
- RFID Path Authentication, RevisitedMohammad Saiful Islam Mamun, Atsuko Miyaji. 245-252 [doi]
- Transparent Multi-hop Protocol TerminationMichael Karl, Thorsten Herfet. 253-259 [doi]
- ASN-FWD: Shrinking the IPv4 Share on the Forwarding Information BaseMarta C. C. Lacerda, Marcos A. Siqueira, Paulo R. S. L. Coelho, Luis F. Faina, Lásaro Jonas Camargos, Christian Esteve Rothenberg, Rafael Pasquini. 260-267 [doi]
- A Wi-Fi Simulation Model Which Supports Channel Scanning across Multiple Non-overlapping Channels in NS3Jason B. Ernst, Stefan C. Kremer, Joel J. P. C. Rodrigues. 268-275 [doi]
- Congestion Control Scheme for Multimedia Streaming Service over High Bandwidth Delay Product NetworksSunghee Lee, Kwangsue Chung. 276-281 [doi]
- WMN-SA System for Node Placement in WMNs: Evaluation for Different Realistic Distributions of Mesh ClientsShinji Sakamoto, Tetsuya Oda, Albert Bravo, Leonard Barolli, Makoto Ikeda, Fatos Xhafa. 282-288 [doi]
- Analysis of Mesh Router Placement in Wireless Mesh Networks Using Friedman TestTetsuya Oda, Admir Barolli, Evjola Spaho, Leonard Barolli, Fatos Xhafa. 289-296 [doi]
- Simulation-Based Performance Evaluation of the MLSD Protocol for Infrastructure WMNsGledson Elias, Daniel Porto. 297-304 [doi]
- On the Impact of Network Coding Delay for IEEE 802.11s Infrastructure Wireless Mesh NetworksCarlos Ernesto Carrillo Arellano, Víctor M. Ramos R.. 305-312 [doi]
- Energy Usage of UDP and DCCP over 802.11nMamun I. Abu-Tair, Saleem N. Bhatti. 313-320 [doi]
- Adaptive Decision-Making Scheme for Cognitive Radio NetworksIsmail AlQerm, Basem Shihada. 321-328 [doi]
- Performance Evaluation of Cognitive Radio Networks under Licensed and Unlicensed Spectrum BandsSalah Zahed, Irfan Awan, Andrea J. Cullen, Muhammad Younas. 329-336 [doi]
- Analysis of WMN-GA Simulation Results: WMN Performance Considering Stationary and Mobile ScenariosMakoto Ikeda, Taiki Honda, Tetsuya Oda, Shinji Sakamoto, Leonard Barolli. 337-342 [doi]
- A Scalable and Secure RFID Ownership Transfer ProtocolMohammad Saiful Islam Mamun, Atsuko Miyaji. 343-350 [doi]
- An Efficient and Transparent One-Time Authentication Protocol with Non-interactive Key Scheduling and UpdateArcangelo Castiglione, Alfredo De Santis, Aniello Castiglione, Francesco Palmieri. 351-358 [doi]
- Privacy-Preserving Hypothesis Testing for the Analysis of Epidemiological Medical DataHiroaki Kikuchi, Tomoki Sato, Jun Sakuma. 359-365 [doi]
- A Scalable Approach to Source Camera Identification over HadoopGiuseppe Cattaneo, Gianluca Roscigno, Umberto Ferraro Petrillo. 366-373 [doi]
- A Clustered SDN Architecture for Large Scale WSONManoel Camillo Penna, Edgard Jamhour, Marcio L. F. Miguel. 374-381 [doi]
- Augmented Reality for Improved Service DeliveryMarkus Aleksy, Elina Vartiainen, Veronika Domova, Martin Naedele. 382-389 [doi]
- Periodic Control Update Overheads in OpenFlow-Based Enterprise NetworksOlatunde Awobuluyi. 390-396 [doi]
- Towards SLA Policy Refinement for QoS Management in Software-Defined NetworkingCristian Cleder Machado, Lisandro Zambenedetti Granville, Alberto E. Schaeffer Filho, Juliano Araujo Wickboldt. 397-404 [doi]
- AgNOS: A Framework for Autonomous Control of Software-Defined NetworksAlexandre Passito, Edjard Mota, Ricardo Bennesby, Paulo Fonseca. 405-412 [doi]
- Priority-Based Multi-event Reporting in Hybrid Wireless Sensor NetworksIsrael Leyva Mayorga, Mario E. Rivero-Angeles, Chadwick Carreto Arellano. 413-420 [doi]
- A Guaranteed Lifetime Protocol for Real-Time Wireless Sensor NetworksBabar Shah, Ki-Il Kim. 421-428 [doi]
- Investigating Impact of ACK in Non-beacon Enabled Slotted IEEE 802.15.4D. Mahmood, K. Latif, Nadeem Javaid, S. U. Qureshi, I. Ahmed, U. Qasim, Z. A. Khan. 429-434 [doi]
- LAEEBA: Link Aware and Energy Efficient Scheme for Body Area NetworksS. Ahmed, Nadeem Javaid, M. Akbar, Adeel Iqbal, Z. A. Khan, U. Qasim. 435-440 [doi]
- Efficient Hashing for Dynamic Per-Flow Network-Interface SelectionPaul A. S. Ward, Kshirasagar Naik, Jakub K. Schmidtke. 441-448 [doi]
- Design and Implementation of a Mobile Broadcast SystemAgustinus Borgy Waluyo, Feng Zhu, David Taniar, Bala Srinivasan. 449-456 [doi]
- Reverse Nearest Neighbour by Region on Mobile DevicesKiki Maulana Adhinugraha, David Taniar, Maria Indrawan-Santiago, Dirda M. K. Latjuba. 457-464 [doi]
- Faster Translated Binary Execution on Mobile System through VirtualizationMin Choi, Wonjae Lee, Seong-jun Bae, HyunWoo Lee, Jong Hyuk Park. 465-471 [doi]
- Combating Insider Attacks in IEEE 802.11 Wireless Networks with Broadcast EncryptionJoseph Soryal, Irippuge Milinda Perera, Ihab Darwish, Nelly Fazio, Rosario Gennaro, Tarek N. Saadawi. 472-479 [doi]
- MARD: A Framework for Metamorphic Malware Analysis and Real-Time DetectionShahid Alam, R. Nigel Horspool, Issa Traoré. 480-489 [doi]
- Channel Estimation for Secret Key GenerationMichael McGuire. 490-496 [doi]
- A Rotation Session Key-Based Transposition Cryptosystem Scheme Applied to Mobile Text ChattingHsing-Chung Chen, Alpha Liezel V. Epa. 497-503 [doi]
- A Bandwidth-Feasibility Algorithm for Reliable Virtual Network AllocationRafael L. Gomes, Luiz F. Bittencourt, Edmundo R. M. Madeira. 504-511 [doi]
- IP Spoofing Detection Using Modified Hop CountAyman Mukaddam, Imad Elhajj, Ayman I. Kayssi, Ali Chehab. 512-516 [doi]
- New Heuristic for Message Broadcasting in NetworksHovhannes A. Harutyunyan, Cosmin Jimborean. 517-524 [doi]
- Conducting Network Research in Large-Scale Platforms: Avoiding Pitfalls in PlanetLabMarcelo Anderson Santos, Stenio Fernandes, Carlos Alberto Kamienski. 525-532 [doi]
- A Power Assignment Method for Multi-sink WSN with Outage Probability ConstraintsMarcelo Eduardo Pellenz, Edgard Jamhour, Manoel Camillo Penna, Richard Demo Souza, Glauber Gomes de Oliveira Brante. 533-540 [doi]
- Integration of Push-Based and Pull-Based Connectivity Status Sharing for Efficient Data Forwarding towards Mobile Sinks in Wireless Sensor NetworksTakeshi Yoshimura, Kazuya Murao, Akimitsu Kanzaki, Shojiro Nishio. 541-548 [doi]
- HEX Clustering Protocol for Routing in Wireless Sensor NetworkM. Liaqat, Nadeem Javaid, M. Akbar, Z. A. Khan, L. Ali, S. Hafizah, A. Ghani. 549-554 [doi]
- TRP: Tunneling Routing Protocol for WSNsM. Akbar, Nadeem Javaid, S. Yousaf, A. H. Khan, Z. A. Khan, U. Qasim, A. A. Khan. 555-559 [doi]
- Processing Probabilistic K-Nearest Neighbor Query Using Rlsd-TreeYuan-Ko Huang, Lien-Fa Lin. 560-567 [doi]
- A Quality-Aware and Energy-Efficient Context Management Framework for Ubiquitous SystemsVinicius Bezerra, Misael C. Junior, Olga Valeria, Constantino D. Neto, Liliam Leal, Marcus Lemos, Carlos G. Carvalho, José Bringel Filho, Raimir Holanda, Nazim Agoulmine. 568-575 [doi]
- Optimizing Energy Consumption in Broker-Assisted Cyber Foraging SystemsManjinder Nir, Ashraf Matrawy, Marc St-Hilaire. 576-583 [doi]
- A Distributed Architecture for Supporting Context-Aware Applications in UbiCompJoão Ladislau Lopes, Rodrigo Santos de Souza, Ana Marilza Pernas, Adenauer C. Yamin, Cláudio Fernando Resin Geyer. 584-590 [doi]
- Efficient and Verifiable Algorithm for Secure Outsourcing of Large-scale Linear ProgrammingHaixin Nie, Xiaofeng Chen 0001, Jin Li, Josolph Liu, Wenjing Lou. 591-596 [doi]
- TDFA: Traceback-Based Defense against DDoS Flooding AttacksVahid Aghaei Foroushani, A. Nur Zincir-Heywood. 597-604 [doi]
- Secure Routing with an Integrated Localized Key Management Protocol in MANETsShrikant H. Talawar, Soumyadev Maity, Ramesh C. Hansdah. 605-612 [doi]
- On the Use of Traffic Information to Improve the Coordinated P2P Detection of SLA ViolationsJéferson Campos Nobre, Lisandro Zambenedetti Granville, Alexander Clemm, Alberto Gonzalez Prieto. 613-620 [doi]
- DAT: Dependency Analysis Tool for Service Based Business ProcessesOlfa Bouchaala, Mohamed Yangui, Samir Tata, Mohamed Jmaiel. 621-628 [doi]
- QoE Estimation for Web Service Selection Using a Fuzzy-Rough Hybrid Expert SystemJeevan Pokhrel, Felipe Lalanne, Ana R. Cavalli, Wissam Mallouli. 629-634 [doi]
- Mobile Application Platform Heterogeneity: Android vs Windows Phone vs iOS vs Firefox OSTor-Morten Grønli, Jarle Hansen, Gheorghita Ghinea, Muhammad Younas. 635-641 [doi]
- Unbiased Estimation Based on Biased Sampled Data of Communication NetworksShigeo Shioda. 642-648 [doi]
- Secure Data Transmission Protocol for Medical Wireless Sensor NetworksSoufiene Ben Othman, Abdullah Ali Bahattab, Abdelbasset Trad, Habib Youssef. 649-656 [doi]
- HADCC: Hybrid Advanced Distributed and Centralized Clustering Path Planning Algorithm for WSNsMuhammad Aslam, Ehsan Ullah Munir, Muhammad Bilal, Muhammad Asad, Asad Ali, Tauseef Shah, Syed Bilal. 657-664 [doi]
- A Synchronization and Routing Protocol for Rechargeable Sensor NetworksFumiaki Sato. 665-672 [doi]
- Mobile Sensor Networks for Leak and Backflow Detection in Water Distribution SystemsMahima Agumbe Suresh, Lidia Smith, A. Rasekh, Radu Stoleru, M. K. Banks, Basem Shihada. 673-680 [doi]
- Improving Information Dissemination in Vehicular Networks by Selecting Appropriate DisseminatorsFabrício A. Silva, Thais R. M. Braga Silva, Fabrício Benevenuto, Linnyer Beatrys Ruiz, Antonio A. F. Loureiro. 681-688 [doi]
- Joint MAC and Network Layer Control for VANET Broadcast Communications Considering End-to-End LatencyCelimuge Wu, Satoshi Ohzahata, Yusheng Ji, Toshihiko Kato. 689-696 [doi]
- A Sensitive Metric for the Assessment of Vehicular Communication ApplicationsRobert Protzmann, Björn Schünemann, Ilja Radusch. 697-703 [doi]
- Mitigating Constant Jamming in Cognitive Radio Networks Using Hybrid FEC CodeVictor Balogun, Axel W. Krings. 704-711 [doi]
- Impact of MapReduce Task Re-execution Policy on Job Completion Reliability and Job Completion TimeJia-Chun Lin, Fang-Yie Leu, Ying-Ping Chen, Waqaas Munawar. 712-718 [doi]
- Prototyping Incentive-Based Resource Assignment for Clouds in Community NetworksAmin M. Khan, Ümit Cavus Büyüksahin, Felix Freitag. 719-726 [doi]
- Architecture of Distributed Data Aggregation ServiceVlad Nicolae Serbanescu, Florin Pop, Valentin Cristea, Gabriel Antoniu. 727-734 [doi]
- Reputation-Based Composition of Social Web ServicesAlessandro Celestini, Gianpiero Costantino, Rocco De Nicola, Zakaria Maamar, Fabio Martinelli, Marinella Petrocchi, Francesco Tiezzi. 735-742 [doi]
- Cache Replacement Algorithms for YouTubeMing-Chang Lee, Fang-Yie Leu, Ying-Ping Chen. 743-750 [doi]
- CODE (Common Ontology DEvelopment): A Knowledge Integration Approach from Multiple OntologiesDhomas Hatta Fudholi, Wenny Rahayu, Eric Pardede. 751-758 [doi]
- Empowering the Healthcare Worker Using the Portable Health ClinicEiko Kai, Andrew Rebeiro-Hargrave, Sozo Inoue, Yasunobu Nohara, Rafiqul Islam Maruf, Naoki Nakashima, Ashir Ahmed. 759-764 [doi]
- Semantics-Enhanced Recommendation System for Social HealthcareNazia Zaman, Juan Li. 765-770 [doi]
- Restrictions Affecting New Zealanders' Access to the Internet: A Local StudyShadi Esnaashari, Ian Welch, Brenda Chawner. 771-774 [doi]
- Evaluation of a Genetic Programming Approach to Generate Wireless Sensor Network ApplicationsTales Heimfarth, Joao Paulo de Araujo, Renato Resende Ribeiro de Oliveira, Raphael Winckler de Bettio. 775-782 [doi]
- FEEL: Forwarding Data Energy Efficiently with Load Balancing in Wireless Body Area NetworksM. M. Sandhu, Nadeem Javaid, M. Akbar, F. Najeeb, U. Qasim, Z. A. Khan. 783-789 [doi]
- OTICOR: Opportunistic Time Slot Assignment in Cognitive Radio Sensor NetworksOns Mabrouk, Hanen Idoudi, Ichrak Amdouni, Ridha Soua, Pascale Minet, Leïla Azouz Saïdane. 790-797 [doi]
- A TDMA-Based Energy Aware MAC (TEA-MAC) Protocol for Reliable Multicast in WSNsAshutosh Bhatia, R. C. Hansdah. 798-805 [doi]
- Performance Analysis of BitTorrent-Like P2P Networks for Video Streaming Services at the Chunk LevelEdgar Baez Esquivel, Mario E. Rivero-Angeles, Izlian Y. Orea-Flores. 806-812 [doi]
- Formal Verification of Fault-Tolerant and Recovery Mechanisms for Safe Node Sequence ProtocolRui Zhou 0005, Rong Min, Qi Yu, Chanjuan Li, Yong Sheng, Qingguo Zhou, Xuan Wang, Kuan-Ching Li. 813-820 [doi]
- Statistical Assessment of Sybil-Placement Strategies within DHT-Structured Peer-to-Peer BotnetsDeepali Arora, Adam Verigin, Teghan Godkin, Stephen W. Neville. 821-828 [doi]
- Trust Aware System for P2P Routing ProtocolsHaïdar Safa, Wassim El-Hajj, Marwa Moutaweh. 829-836 [doi]
- Towards a Community Cloud StorageYing Liu, Vladimir Vlassov, Leandro Navarro. 837-844 [doi]
- Supersaturated Cloud for Multicore SystemsMinoru Uehara. 845-849 [doi]
- A Cloud Trust Evaluation System Using Hierarchical Fuzzy Inference System for Service SelectionChenhao Qu, Rajkumar Buyya. 850-857 [doi]
- Robust Scheduling of Scientific Workflows with Deadline and Budget Constraints in CloudsDeepak Poola, Saurabh Kumar Garg, Rajkumar Buyya, Yun Yang, Kotagiri Ramamohanarao. 858-865 [doi]
- Header Field Based Partitioning of Network Traffic for Distributed Packet Capturing and ProcessingRuediger Gad, Martin Kappes, Robin Mueller-Bady, Inmaculada Medina-Bulo. 866-874 [doi]
- An Approach to Overcome the Complexity of Network Management Situations by MashmentsOscar Mauricio Caicedo Rendon, Felipe Estrada Solano, Lisandro Zambenedetti Granville. 875-883 [doi]
- Design and Analysis of Symbol Detection Schemes with Imperfect CSI for SDF-Relay NetworksAli Zarei Ghanavati, Daniel Chonghwan Lee. 884-891 [doi]
- Determination of Delay Bound over Multi-hop Real-Time Switches with Virtual Output QueuingSanghwa Han, Kyungtae Kang, Junhee Ryu. 892-898 [doi]
- Greedy Flooding in Redoubtable Sensor NetworksNesrine Ouled Abdallah, Mohamed Jmaiel, Mohamed Mosbah, Akka Zemmari. 899-906 [doi]
- Using Unmanned Aerial Vehicle to Connect Disjoint Segments of Wireless Sensor NetworkTales Heimfarth, Joao Paulo de Araujo. 907-914 [doi]
- CEMob: Critical Data Transmission in Emergency with Mobility Support in WBANsS. Yousaf, M. Akbar, Nadeem Javaid, A. Iqba, Z. A. Khan, U. Qasim. 915-919 [doi]
- Energy Hole Analysis for Energy Efficient Routing in BANsK. Latif, Nadeem Javaid, Adeel Iqbal, Z. A. Khan, U. Qasim, Turki Ali Alghamdi. 920-924 [doi]
- Stabilizing Agent's Interactions in Dynamic ContextsPascal Francois Faye, Samir Aknine, Mbaye Sene, Onn Shehory. 925-932 [doi]
- A Simple Broadcast Algorithm for Recurrent Dynamic SystemsMichel Raynal, Julien Stainer, Jiannong Cao, Weigang Wu. 933-939 [doi]
- Evaluation of the Extended Improved Redundant Power Consumption Laxity-Based (EIRPCLB) AlgorithmTomoya Enokido, Ailixier Aikebaier, Makoto Takizawa. 940-947 [doi]
- Reducing the Amount of Small Data Communication for Telematics ServicesHirohito Kakizawa, Ryozo Kiyohara. 948-954 [doi]
- Open Government Data Visualization System to Facilitate Evidence-Based Debate Using a Large-Scale Interactive DisplayNobuyuki Kukimoto. 955-960 [doi]
- Automated Dynamic Resource Provisioning and Monitoring in Virtualized Large-Scale DatacenterSameera Abar, Pierre Lemarinier, Georgios K. Theodoropoulos, Gregory M. P. O'Hare. 961-970 [doi]
- Secure Deduplication Storage Systems with Keyword SearchJin Li, Xiaofeng Chen 0001, Fatos Xhafa, Leonard Barolli. 971-977 [doi]
- Holistic Modeling and Performance Evaluation for Converged Network-Cloud Service ProvisioningQiang Duan, Zhen Zheng. 978-984 [doi]
- Capturing and Analyzing Pervasive Data for SmartHealthJoseph Kee-Yin Ng, Jiantao Wang, Kam-yiu Lam, Calvin Ho Chuen Kam, Song Han. 985-992 [doi]
- Personalized Healthcare Recommender Based on Social MediaJuan Li, Nazia Zaman. 993-1000 [doi]
- Computing Sammon's Projection of Social Networks by Differential EvolutionPavel Krömer, Milos Kudelka, Václav Snásel, Martin Radvanský, Zdenek Horak. 1001-1006 [doi]
- Privacy and Node Cooperation in Mobile Social NetworksAhmed B. Altamimi, T. Aaron Gulliver. 1007-1010 [doi]
- A High-Performance DAG Task Scheduling Algorithm for Heterogeneous Networked Embedded SystemsGuoqi Xie, Ren Fa Li, Xiongren Xiao, Yuekun Chen. 1011-1016 [doi]
- Redundant and Relay Assistant Scheduling of Small SatellitesLei Xia, Nenghai Yu. 1017-1024 [doi]
- Peak Load Scheduling in Smart Grid Communication EnvironmentM. A. Khan, Nadeem Javaid, M. Arif, S. Saud, U. Qasim, Z. A. Khan. 1025-1032 [doi]
- A Tabu Search Algorithm for Ground Station Scheduling ProblemFatos Xhafa, Xavier Herrero, Admir Barolli, Makoto Takizawa. 1033-1040 [doi]
- On the Practicality to Implement Byzantine Fault Tolerant Services Based on Tuple SpaceAldelir Fernando Luiz, Lau Cheuk Lung, Luciana de Oliveira Rech. 1041-1048 [doi]
- Combining Decomposition and Lumping to Evaluate Semi-hierarchical SystemsNils Müllner, Oliver E. Theel, Martin Fränzle. 1049-1056 [doi]
- Robust Parallel Redeployment Algorithm for MEMS MicrorobotsHicham Lakhlef, Julien Bourgeois, Hakim Mabed. 1057-1064 [doi]
- Collision-Fast Atomic BroadcastRodrigo Schmidt, Lásaro Jonas Camargos, Fernando Pedone. 1065-1072 [doi]
- Minimizing Cost of K-Replica in Hierarchical Data Grid EnvironmentYaser Mansouri, Saeed Talatian Azad, Alireza Chamkori. 1073-1080 [doi]
- XSM - A Tracking System for XML Schema VersionsAbdullah Baqasah, Eric Pardede, Wenny Rahayu. 1081-1088 [doi]
- Efficient Distributed Spatial Semijoins and Their Application in Multiple-Site QueriesNawshad Farruque, Wendy Osborn. 1089-1096 [doi]
- Semantic Graph Compression with HypergraphsArber Borici, Alex Thomo. 1097-1104 [doi]
- Intelligent Electrocardiogram Monitoring System for Early Arrhythmia DetectionJuyoung Park, Kuyeon Lee, Kyungtae Kang. 1105-1110 [doi]
- Graph Anonymization Using Machine LearningMaria Laura Maag, Ludovic Denoyer, Patrick Gallinari. 1111-1118 [doi]
- A Semantic Approach for Learning Situation DetectionAna Marilza Pernas, Adenauer C. Yamin, Joao L. B. Lopes, José Palazzo Moreira de Oliveira. 1119-1126 [doi]
- Prediction of Sensor Lifetime in Wireless Sensor Networks Using Fuzzy LogicQi Wang, Elis Kulla, Gjergji Mino, Leonard Barolli. 1127-1131 [doi]
- Energy-Aware Replication Models of Mobile AgentsDilawaer Duolikun, Ailixier Aikebaier, Tomoya Enokido, Makoto Takizawa. 1132-1139 [doi]
- Role-Based Information Flow Control ModelsShigenari Nakamura, Dilawaer Doulikun, Ailixier Aikebaier, Tomoya Enokido, Makoto Takizawa. 1140-1147 [doi]
- Node Placement in WMNs Using WMN-HC System and Different Movement MethodsXinyue Chang, Tetsuya Oda, Evjola Spaho, Makoto Ikeda, Leonard Barolli, Fatos Xhafa. 1148-1153 [doi]
- A Novel Method for the Interpretation of Spectrometer Signals Based on Delta-Modulation and Similarity DeterminationPetra Perner. 1154-1160 [doi]