Abstract is missing.
- Distributed Uncertain Data Mining for Frequent Patterns Satisfying Anti-monotonic ConstraintsCarson Kai-Sang Leung, Richard Kyle MacKinnon, Fan Jiang. 1-6 [doi]
- Botnet Behaviour Analysis Using IP Flows: With HTTP Filters Using ClassifiersFariba Haddadi, Jillian Morgan, Eduardo Gomes Filho, A. Nur Zincir-Heywood. 7-12 [doi]
- Prediction of System Critical Event in Virtualized Medical ApplicationsYuanyao Liu, Zhengping Wu. 13-18 [doi]
- An Intelligent Touring System Based on Mobile Social Network and Cloud Computing for Travel RecommendationYuan-Tse Yu, Chung-Ming Huang, Yun-Tz Lee. 19-24 [doi]
- A Fast Efficient Fractional-Pixel Displacement for H.264/AVC Motion CompensationLung-Jen Wang, Chia-Tzu Shu. 25-30 [doi]
- A Smart Environment and Heuristic Diagnostic Teaching Principle-Based System for Supporting Children with Autism during LearningArdiana Sula, Evjola Spaho, Keita Matsuo, Leonard Barolli, Rozeta Miho, Fatos Xhafa. 31-36 [doi]
- Internet Traffic Engineering: Understanding the Specialist Decision-Making Process for Traffic Management in South AmericaMarcio A. de Deus, Paulo H. P. Carvalho, Joao Paulo Leite. 37-41 [doi]
- Distinguishing between Web Attacks and Vulnerability Scans Based on Behavioral CharacteristicsKaterina Goseva-Popstojanova, Ana Dimitrijevikj. 42-48 [doi]
- A Heuristic-Based Co-clustering Algorithm for the Internet Traffic ClassificationWei Lu, Ling Xue. 49-54 [doi]
- SSL Application for Managed Security between the Mobile and HIS Biometric Information Collection ClientJae-Pil Lee, Young-Hyuk Kim, Jae Kwang Lee. 55-60 [doi]
- Tracking and Abnormal Behavior Detection in Video Surveillance Using Optical Flow and Neural NetworksNida Rasheed, Shoab A. Khan, Adnan Khalid. 61-66 [doi]
- Combining Wireless Sensor Networks and Machine Learning for Flash Flood NowcastingGustavo Furquim, Filipe Neto, Gustavo Pessin, Jo Ueyama, Joao P. de Albuquerque, Maria Clara, Eduardo M. Mendiondo, Vladimir C. B. de Souza, Desislava C. Dimitrova, Torsten Braun. 67-72 [doi]
- Real-Time Mobile Cloud Computing: A Case Study in Face RecognitionMarwa Ayad, Mohamed Taher, Ashraf M. Salem. 73-78 [doi]
- A Remote Control Method for Mobile Robots Using Game EnginesOsamu Ohashi, Eiji Ochiai, Yuka Kato. 79-84 [doi]
- Building a Confident Advanced Email System Using a New Correspondence ModelLaurent Cailleux, Ahmed Bouabdallah, Jean-Marie Bonnin. 85-90 [doi]
- Effective Third Party Auditing in Cloud ComputingMohammed Hussain, Mohamed Basel Al-Mourad. 91-95 [doi]
- Modeling User Interactions in Social Communication Networks with Variable Social Vector ClocksTa Yuan Hsu, Ajay D. Kshemkalyani, Min Shen. 96-101 [doi]
- E-butler: A User-Centric High Reliability Personal Portal SiteYoshio Kakizaki, Yoji Maeda, Hidekazu Tsuji. 102-107 [doi]
- Digital Convergence Services for Situation-Aware POI TouringHao-Hsiang Ku, Si-Yuan Huang. 108-113 [doi]
- Multi-criteria Consensus-Based Service Selection Using CrowdsourcingMahdi Sharifi, Azizah Abdul Manaf, Ali Memariani, Homa Movahednejad, Haslina Md Sarkan, Amir Vahid Dastjerdi. 114-120 [doi]
- Design of a Mobile Ad Hoc Network Communication App for Disaster RecoveryAllan Goncalves, Carlos Silva, Patricia Morreale. 121-126 [doi]
- ConExT-U: A Context-Aware Exception Handling Mechanism for Task-Based Ubiquitous SystemsCarlos A. B. de Queiroz Filho, Rossana M. de Castro Andrade, Lincoln S. Rocha, Reinaldo Bezerra Braga, Carina Teixeira De Oliveira. 127-132 [doi]
- VCPS: Vehicular Cyber-physical Systems for Smart Road ServicesJaehoon Jeong, Eunseok Lee. 133-138 [doi]
- UDP-DC2: User Data Processing Platform Based on Device-centric CloudInchul Hwang, Sunhee Youm, Soohong Park, Hwajung Kim. 139-143 [doi]
- Dynamic Edge-Caching for Mobile Users: Minimising Inter-AS traffic by Moving Cloud Services and VMsFragkiskos Sardis, Glenford E. Mapp, Jonathan Loo, Mahdi Aiash. 144-149 [doi]
- WWF: Web Application Workload Balancing FrameworkInchul Hwang, Jonggyu Ham. 150-153 [doi]
- Investigating the Impact of Live Migration on the Network Infrastructure in Enterprise EnvironmentsJose Sinti, Fowzan Jiffry, Mahdi Aiash. 154-159 [doi]
- Secure Live Virtual Machines Migration: Issues and SolutionsMahdi Aiash, Glenford E. Mapp, Orhan Gemikonakli. 160-165 [doi]
- QoS-Aware Packet Chunking Schemes for M2M Cloud ServicesAnan Sawabe, Kazuya Tsukamoto, Yuji Oie. 166-173 [doi]
- A First Look at Caching during TIP-Tree Navigation for Location Based ServicesWendy Osborn. 174-179 [doi]
- Routing Method Based on Relationships between Neighboring Nodes in Wireless Mesh NetworksWataru Kobayashi, Yuta Maruoka, Kazunori Ueda. 180-184 [doi]
- Energy-Efficient Data Gathering Using Sleep Scheduling and Spatio-temporal Interpolation in Wireless Sensor NetworksAkimitsu Kanzaki, Shinya Kondo, Takahiro Hara, Shojiro Nishio. 185-190 [doi]
- Context-Aware Media RecommendationsAbayomi Moradeyo Otebolaku, Maria Teresa Andrade. 191-196 [doi]
- A Menu-Based Content Search System Based on Relationships between Mobile User Context and Information NeedsMayu Iwata, Hiroki Miyamoto, Takahiro Hara, Kentaro Shimatani, Tomohiro Mashita, Kiyoshi Kiyokawa, Shojiro Nishio, Haruo Takemura. 197-202 [doi]
- A 3DCG Distribution System with Personalized Ranking for Augmented Reality User InterfaceHiroshi Honda, Kosuke Takano. 203-208 [doi]
- Data Allocation Techniques for Mobile Sensor NetworksTakahiro Hara, Shojiro Nishio. 209-214 [doi]
- Data Transmission Techniques for Mobile Sensor NetworksTomoki Yoshihisa, Shojiro Nishio. 215-220 [doi]
- Communication Techniques for Mobile Sensor NetworksAkimitsu Kanzaki, Shojiro Nishio. 221-226 [doi]
- Deployment Challenges and Developments in Wireless Sensor Networks ClusteringKrishna Doddapaneni, Fredrick A. Omondi, Enver Ever, Purav Shah, Orhan Gemikonakli, Roberto Gagliardi. 227-232 [doi]
- On Demand Multicast Routing in Wireless Sensor NetworksClifford Sule, Purav Shah, Krishna Doddapaneni, Orhan Gemikonakli, Enver Ever. 233-238 [doi]
- Intelligent Evaluation Models Based on the Single-Hop Protocol in Wireless Sensor NetworksNing Cao, Russell Higgs, Gregory M. P. O'Hare. 239-244 [doi]
- An Ontology Driven Software Framework for the Healthcare Applications Based on ANT+ ProtocolNadeem Qaisar Mehmood, Rosario Culmone, Leonardo Mostarda. 245-250 [doi]
- DA-DCT: Data Aggregation Using Discrete Cosine Transform in Wireless Sensor NetworksKi-Deok Kwon, Hyunwoo Ju, Younghwan Yoo. 251-254 [doi]
- Performance Evaluation of LTE Network via Using Fixed/Mobile FemtocellsRand Raheem, Aboubaker Lasebae, Jonathan Loo. 255-260 [doi]
- Protection against Web 2.0 Client-Side Web Attacks Using Information Flow ControlBassam Sayed, Issa Traoré. 261-268 [doi]
- E-Voting Attacks and CountermeasuresM. Tarek Ibn Ziad, Amr Al-Anwar, Yousra Alkabani, M. Watheq El-Kharashi, Hassan Bedour. 269-274 [doi]
- Securing Optical Network Access with Post-switching Coding Scheme of Signatures ReconfigurationJen-Fa Huang, Sheng-Hui Meng, Kai-Sheng Chen, Ying Chen Lin. 275-280 [doi]
- An S/Key-like One-Time Password Authentication Scheme Using Smart Cards for Smart MeterWei-Bin Lee, Tzungher Chen, Wei-Rung Sun, Kevin I.-J. Ho. 281-286 [doi]
- A Virtual Campus Tour Service Using Mobile RobotsMasanori Fujita, Yoshiaki Tokiwa, Osamu Ohashi, Yuka Kato. 287-292 [doi]
- Thai Related Foreign Language-Specific Website Segment CrawlerArnon Rungsawang, Tanaphol Suebchua, Bundit Manaskasemsak. 293-298 [doi]
- Assessing Energy Efficiency in ISP and Web Search Engine CollaborationNicolas Hidalgo, Erika Rosas, Veronica Gil Costa, Mauricio Marín. 299-304 [doi]
- Defining Computational Resources Prices Based on the Expectations Equilibrium of Consumers and Providers from a Desktop GridL. A. Gois, G. B. Casella, E. C. M. Ishikawa. 305-309 [doi]
- Evaluation of Space-Time-Frequency (STF)-Coded MIMO-OFDM Systems in Realistic Channel ModelsRicardo Kehrle Miranda, Joao Paulo C. Lustosa da Costa, Marco A. M. Marinho, Edison Pignaton de Freitas, Rafael de Freitas Ramos, Kefei Liu, Hing-Cheung So, Leonardo Baltar, Rafael Timóteo de Sousa Júnior. 310-315 [doi]
- Seamless Handoff and Performance Anomaly Reduction Schemes Based on OpenFlow Access PointsWon-Suk Kim, Sang-Hwa Chung, Chang-Woo Ahn, Mi-Rim Do. 316-321 [doi]
- Co-channel Interference Mitigation Based on Location Information in LTE Femtocell SystemsSok Chhorn, Si-o Seo, Mustafa Habibu Mohsini, Hyong-Woo Lee, Choong-Ho Cho, Se-Jin Kim, Seungwan Ryu. 322-327 [doi]
- DAIDS: An Architecture for Modular Mobile IDSAlaa Salman, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi. 328-333 [doi]
- Composing Thermostatically Controlled Loads to Determine the Reliability against BlackoutsNils Müllner, Oliver E. Theel, Martin Fränzle. 334-341 [doi]
- Monitoring for Power-Line Change and Outage Detection in Smart Grid via the Alternating Direction Method of MultipliersLiang Zhao, Wen-Zhan Song, Lang Tong, Yuan Wu. 342-346 [doi]
- Data-Driven Computer Go Based on HadoopKwangjin Hong, Jinuk Kim, Hongwon Lee, Jihoon Lee, Jiwoong Heo, Sunchul Kim, Keechul Jung. 347-351 [doi]
- An Approach for Performance Modelling and Analysis of Multi-tiers Autonomic SystemsMehdi Sliem, Nabila Salmi, Malika Ioualalen. 352-357 [doi]
- REST API Design Patterns for SDN Northbound APIWei Zhou, Li Li 0001, Min Luo, Wu Chou. 358-365 [doi]
- A Design for Performance Improvement of Clock Synchronization in WSNs Using a TDMA-Based MAC ProtocolSiddharth Watwe, Ashutosh Bhatia, R. C. Hansdah. 366-371 [doi]
- An Energy Consumption Analysis of Beacon Enabled Slotted CSMA/CA IEEE 802.15.4M. B. Rasheed, Nadeem Javaid, A. Haider, Umar Qasim, Zahoor Ali Khan, Turki Ali Alghamdi. 372-377 [doi]
- RD-TDMA: A Randomized Distributed TDMA Scheduling for Correlated Contention in WSNsAshutosh Bhatia, R. C. Hansdah. 378-384 [doi]
- Utilization-Aware Channel Allocation and Routing for Mesh Networks for Battery-Powered Surveillance CamerasHyungwon Kim, M. G. A. Mohamed. 385-390 [doi]
- Migration-less Energy-Aware Task Scheduling Policies in Cloud EnvironmentsSeyedmehdi Hosseinimotlagh, Farshad Khunjush, Seyedmahyar Hosseinimotlagh. 391-397 [doi]
- Power-Latency Trade-offs in Virtualized EnvironmentsWaltenegus Dargie, Jianjun Wen. 398-403 [doi]
- Towards a Multi-tenancy Aware Cloud Service CompositionWael Sellami, Hatem Hadj Kacem, Ahmed Hadj Kacem. 404-409 [doi]
- Cloud Services Orchestration: A Comparative Study of Existing ApproachesKhadija Bousselmi, Zaki Brahmi, Mohamed Mohsen Gammoudi. 410-416 [doi]
- The Impact of Dissimilarity and Redundancy on the Reliability of DSRC Safety ApplicationsAhmed Serageldin, Axel W. Krings. 417-424 [doi]
- A Novel Long Term Traffic Forecast Algorithm and Case Study for ChinaDongchen Zhang, Shoufeng Wang, Xiaoyan Xu, Xingzheng Li, Wenwen Yao, Tinglan Wang. 425-430 [doi]
- A Study of Contact Network Generation for Cyber-bullying DetectionMingmei Li, Atsushi Tagami. 431-436 [doi]
- On the Role of Semantic Descriptions for Adaptable Protocol Stacks in the Internet of ThingsVangelis Gazis, Konstantinos Sasloglou, Andreas Merentitis, Kostas Mathioudakis. 437-443 [doi]
- Towards Simulating the Internet of ThingsStelios Sotiriadis, Nik Bessis, Eleana Asimakopoulou, Navonil Mustafee. 444-448 [doi]
- Improving and Optimizing the Operation Layer Algorithm of NETCONF ProtocolYangmin Lee, Jaekee Lee. 449-455 [doi]
- A New Transmission Control Protocol for Active RFID NetworksFariha Baloch, Ravi Pendse. 456-461 [doi]
- Replacing Socket Communication by REST Open API for Acquisition Tax Analyzer DevelopmentHae-Ryong Cho, Min Choi. 462-468 [doi]
- Priority Scheme for Mobile Nodes in P2P Bit-Torrent Based NetworksEdgar Baez Esquivel, Mario E. Rivero-Angeles, Alfonso Fernandez-Vazquez. 469-473 [doi]
- HEAT: Horizontal Moveable Energy-efficient Adaptive Threshold-Based Routing Protocol for Wireless Body Area NetworksA. Afridi, Nadeem Javaid, S. Jamil, M. Akbar, Zahoor Ali Khan, Umar Qasim. 474-478 [doi]
- Impact of Acoustic Propagation Models on Depth-Based Routing Techniques in Underwater Wireless Sensor NetworksMohsin Raza Jafri, Nadeem Javaid, N. Amjad, M. Akbar, Zahoor Ali Khan, Umar Qasim. 479-485 [doi]
- Performance Analysis of a Non-preemptive Hybrid WSN Protocol in Mobile EnvironmentsIsrael Leyva Mayorga, Mario E. Rivero-Angeles, Chadwick Carreto Arellano. 486-491 [doi]
- Wireless Communication Infrastructure for a Short-Range Unmanned AerialJ. P. Bodanese, G. M. de Araujo, Guilherme Steup, Guilherme V. Raffo, Leandro B. Becker. 492-497 [doi]
- A Beaconing-Based Opportunistic Service Discovery Protocol for Vehicular NetworksRoberto Sadao Yokoyama, Bruno Yuji Lino Kimura, Luz M. S. Jaimes, Edson dos Santos Moreira. 498-503 [doi]
- Impacts of Periodical Burst Packet Loss on Streaming Applications - Focusing on a Mobile Network in a High-Speed TrainMasanori Terada, Kunitake Kaneko, Fumio Teraoka. 504-511 [doi]
- Design of a Mix Network Using Connectivity Index - A Novel Privacy Enhancement ApproachRajan Ma, Hemant Kuamr Rath, Balamuralidhar P.. 512-517 [doi]
- Proposal of a Method Detecting Malicious ProcessesTakumi Yamamoto, Kiyoto Kawauchi, Shoji Sakurai. 518-523 [doi]
- Effectiveness of DNS-Based Security Approaches in Large-Scale NetworksMaziar Janbeglou, Habib Naderi, Nevil Brownlee. 524-529 [doi]
- C-SCAN: An Energy-Efficient Network Layer Security Protocol for Mobile Ad Hoc NetworksSanjay Kumar Dhurandher, Isaac Woungang, Issa Traoré. 530-535 [doi]
- Semantic Valence Modeling: Emotion Recognition and Affective States in Context-Aware SystemsPhilip Moore, Fatos Xhafa, Leonard Barolli. 536-541 [doi]
- Towards Object-Oriented Context Modeling: Object-Oriented Relational Database Data StorageJagdev Bhogal, Philip Moore. 542-547 [doi]
- An Initial Analysis of the Contextual Information Available within Auction Posts on Contract Cheating Agency WebsitesThomas Lancaster, Robert Clarke. 548-553 [doi]
- Cultural Transformation to Support the Adoption of Green ITWilliam M. Campbell, Philip Moore, Mak Sharma. 554-559 [doi]
- Context-Aware User Profiling and Multimedia Content Classification for Smart DevicesAbayomi Moradeyo Otebolaku, Maria Teresa Andrade. 560-565 [doi]
- Towards Understanding the Use of Wiki in Agile Software DevelopmentPankaj Kamthan. 566-571 [doi]
- A Proposal and Evaluation of Electricity Reduction Method in HomeTakaya Okamoto, Akio Koyama. 572-577 [doi]
- SmartLocService: Place Identification Method Using Space Dependent Information for Indoor Location-Based ServicesTatsuro Hachiya, Masaki Bandai. 578-581 [doi]
- Analysis of the Film Selection Process for a Film FestivalMasashi Inoue, Sakie Sakuma. 582-587 [doi]
- Light-Weight Safety Confirmation System for Large-Scale DisastersHiroaki Yuze, Shinichi Nabeta, Masao Izumi. 588-592 [doi]
- Construction of Integrated Safety Confirmation System Using the IC CardTomoyuki Ishida, Yoichiro Shimizu, Kazuhiro Takahagi, Akira Sakuraba, Noriki Uchida, Yoshitaka Shibata. 593-598 [doi]
- Parallel Infrastructures and Systems for Near-Field Tsunami Detection and Impact AssessmentYagiz Onat Yazir, Josh Erickson, Yvonne Coady. 599-604 [doi]
- Disaster Management Projects Using Wireless Sensor Networks: An OverviewImane Benkhelifa, Nadia Nouali-Taboudjemat, Samira Moussaoui. 605-610 [doi]
- Performance Evaluation of PC Router Based Cognitive Wireless Network for Disaster-Resilient WANsGoshi Sato, Noriki Uchida, Yoshitaka Shibata. 611-616 [doi]
- A New Wireless Micro-balloon Network for Disaster UseSaneatsu Arimura, Yoshitaka Shibata, Yuji Ohhashi, Noriki Uchida. 617-622 [doi]
- Automotive Sensor Network Platform for Disaster Information SystemGo Hirakawa, Phyu Phyu Kywe, Kenta Ito, Yoshitaka Shibata. 623-626 [doi]
- Omnidirectional Video and Sensor Data Collection and Distribution System on Challenged Communication EnvironmentKenta Ito, Go Hirakawa, Yoshitaka Shibata. 627-632 [doi]
- Proposal of Dynamic FEC Controls with Population Estimation Methods for Delay Tolerant NetworksNoriki Uchida, Noritaka Kawamura, Kazuo Takahata, Yoshitaka Shibata. 633-638 [doi]
- Collaborator Recommendation for Isolated ResearchersTin Huynh, Atsuhiro Takasu, Tomonari Masada, Kiem Hoang. 639-644 [doi]
- Game Theory Based Recommendation Mechanism for Taxi-SharingSheng-Tzong Cheng, Jian Pan Li, Gwo-Jiun Horng. 645-650 [doi]
- A Database Selection Method for Cherry Blossom Movies Based on Changing Trend of Color FrequencyMasato Kasahara, Li Shu, Kosuke Takano. 651-656 [doi]
- Semantic Properties of Customer Sentiment in TweetsEun Hee Ko, Diego Klabjan. 657-663 [doi]
- Comparative Topic Analysis of Japanese and Chinese BloggersLiyi Zheng, Tian Nie, Ichiro Moriya, Yusuke Inoue, Takakazu Imada, Takehito Utsuro, Yasuhide Kawada, Noriko Kando. 664-669 [doi]
- Reputation on Stack Exchange: Tag, You're It!Laura MacLeod. 670-674 [doi]
- Mining Hidden Concepts: Using Short Text Clustering and Wikipedia KnowledgeCheng-Lin Yang, Nuttakorn Benjamasutin, Yun-Heh Chen-Burger. 675-680 [doi]
- Location-Based Analysis of Developers and Technologies on GitHubDavid Rusk, Yvonne Coady. 681-685 [doi]
- Consumer Transactions on the WebGulnar Ali, Kin Fun Li. 686-689 [doi]
- Controlling Network Processors by Using Packet-Processing CoresYasusi Kanada. 690-695 [doi]
- Role-Based Self-Appointment for Autonomic Management of ResourcesPatricia Takako Endo, André Vitor de Almeida Palhares, Marcelo Anderson Santos, Glauco Estacio Gonçalves, Djamel Fawzi Hadj Sadok, Judith Kelner, Azimeh Sefidcon, Fetahi Zebenigus Wuhib. 696-701 [doi]
- A Distributed Monitoring Approach for Trust Assessment Based on Formal TestingJorge López, Xiaoping Che, Stéphane Maag, Gerardo Morales. 702-707 [doi]
- Automatic Code Instrumentation for Converged Service Monitoring and Fault DetectionDiego Adrada, Esteban Salazar, Julian Rojas, Juan Carlos Corrales. 708-713 [doi]
- Optimizing Bit Transmission Power for Link Layer Energy EfficiencyAli Zarei Ghanavati, Daniel Chonghwan Lee. 714-718 [doi]
- On the Impact of Network Topology on Wireless Sensor Networks Performances: Illustration with Geographic RoutingTony Ducrocq, Michaël Hauspie, Nathalie Mitton, Sara Pizzi. 719-724 [doi]
- Theoretical Analysis and Performance Simulation of In-Band LTE Mobile Relays in Railway EnvironmentsJaime Calle-Sánchez, David De-Antonio-Monte, Mariano Molina-Garcia, José I. Alonso. 725-730 [doi]
- Performance Analysis of Artificial Neural Network-Based Learning Schemes for Cognitive Radio Systems in LTE-ULAhsan Adeel, Hadi Larijani, Ali Ahmadinia. 731-736 [doi]
- Kernel Principal Subspace Based Outlier Detection Method in Wireless Sensor NetworksOussama Ghorbel, Mohamed Abid, Hichem Snoussi. 737-742 [doi]
- Impact of Path Characteristics and Scheduling Policies on MPTCP PerformanceBehnaz Arzani, Alexander J. T. Gurney, Shuotian Cheng, Roch Guérin, Boon Thau Loo. 743-748 [doi]
- Out-of-Order Transmission for In-Order Arrival Scheduling for Multipath TCPFan Yang, Qi Wang, Paul D. Amer. 749-752 [doi]
- Measuring the QoS Characteristics of Operational 3G Mobile Broadband NetworksSimone Ferlin Oliveira, Thomas Dreibholz, Ozgu Alay, Amund Kvalbein. 753-758 [doi]
- Retransmission Timeout Estimation for Low-Delay Applications Using Multipath RTPRalf Globisch, Yago Sanchez de la Fuente, Thomas Schierl, Keith Ferguson, Thomas Wiegand. 759-764 [doi]
- LEDBAT-MP - On the Application of "Lower-than-Best-Effort" for Concurrent Multipath TransferHakim Adhari, Sebastian Werner, Thomas Dreibholz, Erwin Paul Rathgeb. 765-771 [doi]
- Using Concurrent Multipath Transfer to Improve the SCTP Startup Behavior for PSTN Signaling TrafficKarl-Johan Grinnemo, Anna Brunstrom, Jun Cheng. 772-778 [doi]
- The Need of a Hybrid Storage Approach for IoT in PaaS Cloud FederationMaria Fazio, Antonio Celesti, Massimo Villari, Antonio Puliafito. 779-784 [doi]
- Big Data in Smart Cities: From Poisson to Human DynamicsAntonio J. Jara, Dominique Genoud, Yann Bocchi. 785-790 [doi]
- A New Location-Aware Authorization Mechanism for Indoor EnvironmentsM. Victoria Moreno, Jose Luis Hernandez, Antonio F. Skarmeta. 791-796 [doi]
- IPv6 as a Global Addressing Scheme and Integrator for the Internet of Things and the CloudSébastien Ziegler, Cedric Crettaz, Ian Thomas. 797-802 [doi]
- Augmented Reality Based Smart City Services Using Secure IoT InfrastructureBoris Pokric, Srdjan Krco, Maja Pokric. 803-808 [doi]
- Domotic Evolution towards the IoTVittorio Miori, Dario Russo. 809-814 [doi]
- A Framework for Citizen Participation in the Internet of ThingsM. Victoria Moreno, José L. Hernández, Antonio F. Skarmeta, Michele Nati, Nick Palaghias, Alexander Gluhak, Rob Van Kranenburg. 815-820 [doi]
- An Internet of Things-Based Model for Smart Water ManagementTomás Robles, Ramón Alcarria, Diego Martín de Andrés, Augusto Morales Dominguez, Mariano Navarro, Rodrigo Calero, Sofia Iglesias, Manuel Lopez. 821-826 [doi]
- Dynamic Bandwidth Distribution for Entertainment Vehicular Networks ApplicationsRonan D. Mendonca, Thais R. M. Braga Silva, Fabrício A. Silva, Linnyer Beatrys Ruiz, Antonio Alfredo Ferreira Loureiro. 827-832 [doi]
- K-Anonymity for Privacy Preserving Crime Data Publishing in Resource Constrained EnvironmentsMark-John Burke, Anne V. D. M. Kayem. 833-840 [doi]
- A Secure Framework for Communications in Heterogeneous NetworksMahdi Aiash, Glenford E. Mapp, Aboubaker Lasebae, Jonathan Loo. 841-846 [doi]
- Intent Biometrics: An Enhanced Form of Multimodal Biometric SystemsErez Gilady, Dale Lindskog, Shaun Aghili. 847-851 [doi]
- A Steganographic Approach to Localizing BotmastersJulian L. Rrushi. 852-859 [doi]
- Multiple Data Integration ServiceXin Hong, Chunming Rong. 860-865 [doi]
- Targeted Attack Prevention at Early StageChia-Mei Chen, Peng-Yu Yang, Ya-Hui Ou, Han-Wei Hsiao. 866-870 [doi]
- Enhancing the Key Distribution Model in the RFID-Enabled Supply ChainsSarah Abughazalah, Konstantinos Markantonakis, Keith Mayes. 871-878 [doi]
- A Resource Reservation Scheme in Cognitive Radio Ad Hoc Networks for C4I SystemsS. M. Kamruzzaman, Abdullah S. Alghamdi. 879-886 [doi]
- Performance Optimization by Simplification of Relationship in Scalable Layer StreamHeung Ki Lee, Kyung Jin Ahn, Jaehee Jung, Gangman Yi. 887-894 [doi]
- The Cloud Storage Model for Manufacturing System in Global Factory AutomationHwa-Young Jeong, Jong Hyuk Park, Jae-dong Lee. 895-899 [doi]
- Instant Channel Allocation Technique to Improve System Throughput in Joint LTE Cellular NetworkShahadate Rezvy, Shahedur Rahman, Aboubaker Lasebae, Jonathan Loo. 900-904 [doi]
- Dynamic Adaptive Streaming over HTTP and Progressive Download: Comparative ConsiderationsRubem Pereira, Ella Grishikashvili Pereira. 905-909 [doi]
- Automatical End to End Topology Discovery and Flow Viewer on SDNWun-Yuan Huang, Ta-Yuan Chou, Jen-Wei Hu, Te-Lung Liu. 910-915 [doi]
- Big Data Analysis Techniques for Cyber-threat Detection in Critical InfrastructuresWilliam Hurst, Madjid Merabti, Paul Fergus. 916-921 [doi]
- The Big Data Obstacle of LifeloggingChelsea Dobbins, Madjid Merabti, Paul Fergus, David Llewellyn-Jones. 922-926 [doi]