Abstract is missing.
- Template Matching Compression Algorithm for Wearable ECG Measurement System Based on Multi Wireless Transmission PlatformTae-young Kim, Yun-Hong Noh, Do-Un Jeong. 1-5 [doi]
- Implementation of the Variable ECG Data Packet Transmission System with Activity StateByeong-Gu Ahn, Yun-Hong Noh, Do-Un Jeong. 6-10 [doi]
- A Wearable ECG Monitoring System Using Adaptive EMD Filter Based on Activity StatusByeong Hoon Kim, Yun-Hong Noh, Do-Un Jeong. 11-16 [doi]
- Design and Analysis of an Enhanced Secure Mechanism of LLRP in RFID SystemsBaojiang Cui, Ziyue Wang, Jun Yang, Xiaofeng Chen 0001. 17-21 [doi]
- Privacy-Preserving Traffic Monitoring in Vehicular Ad Hoc NetworksChen Yang, Bo Qin, Xiuwen Zhou, Yang Sun, Shuangyu He, Qianhong Wu. 22-24 [doi]
- Hybrid Cloud Service Based Healthcare SolutionsYoung Sil Lee, Ndibanje Bruce, Thiranant Non, Esko Alasaarela, Hoon Jae Lee. 25-30 [doi]
- Integrated and Personalized Diabetes Coach for ChildrenAndy Harris, Arjan Durresi, Mihran Tuceryan, Tamara S. Hannon. 31-35 [doi]
- A Survey of 'User Comfort' in Home Energy Management Systems in Smart GridA. Mahmood, A. Ahmad, H. T. Javed, Z. Mehmood, Zahoor Ali Khan, Umar Qasim, Nadeem Javaid. 36-43 [doi]
- Development of Virtual Palpation System for Dental EducationTatsushi Tokuyasu, Takaaki Nakayama, Kazuhiko Toshimitsu, Kazutoshi Okamura, Kazunori Yoshiura. 44-48 [doi]
- Implementation and Evaluation of a Small Size Omnidirectional WheelchairKeita Matsuo, Yi Liu, Donald Elmazi, Leonard Barolli, Kazunori Uchida. 49-53 [doi]
- Integrating Wireless Cellular and Ad-Hoc Networks Using Fuzzy Logic Considering Node Mobility and SecurityTakaaki Inaba, Donald Elmazi, Yi Liu, Shinji Sakamoto, Leonard Barolli, Kazunori Uchida. 54-60 [doi]
- Enabling Large-Scale Biomolecular Conformation Search with Replica Exchange Statistical Temperature Molecular Dynamics (RESTMD) over HPC and Cloud Computing ResourcesNayong Kim, Richard Platania, Wei Huang, Chris Knight, Tom Keyes, Seung-Jong Park, Joohyun Kim. 61-66 [doi]
- Application of Neural Networks for Intrusion Detection in Tor NetworksTaro Ishitaki, Donald Elmazi, Yi Liu, Tetsuya Oda, Leonard Barolli, Kazunori Uchida. 67-72 [doi]
- An Improved Algorithm for Secure Outsourcing of Modular ExponentiationsJun Ye, Xiaofeng Chen, Jianfeng Ma. 73-76 [doi]
- Improving Business by Migrating Applications to the Cloud Using CloudstepPaulo R. M. Andrade, Renanh G. Araujo, Jose Cronemberger Filho, Tiago R. Pereira, Adriano Bessa Albuquerque, Nabor C. Mendonca. 77-82 [doi]
- Implementation of a Collaborative Document Processing in the CloudJiafei Wen, Xiaolong Wu, Shui Lam. 83-88 [doi]
- General Multi-key Searchable EncryptionJun Yang, Chuan Fu, Nan Shen, Zheli Liu, Chunfu Jia, Jin Li 0002. 89-95 [doi]
- Quantum Key Distribution Protocol Using Quantum Fourier TransformXiaoqing Tan, Siting Cheng, Jin Li, Zhihong Feng. 96-101 [doi]
- Implementation of a Software-Defined Storage Service with Heterogeneous Storage TechnologiesChao-Tung Yang, Wei-Hsiang Lien, Yu-Chuan Shen, Fang-Yi Leu. 102-107 [doi]
- Optimize Auction Bandwidth in Content Centric Network with Provider Portal for ApplicationWisarut Suesuwan, Woraphon Lilakiatsakun. 108-116 [doi]
- Experimental Study of Borehole Logs for Oil and Gas ExplorationS. Imran, N. Khan. 117-122 [doi]
- Contextual User Interest Modeling Approaches for Personalized Services on Multiple DevicesZheng Hao, Deng Xiaotao, Yu Lei, Zhang Jie, Inchul Hwang, Sunhee Youm. 123-130 [doi]
- DNS Name Autoconfiguration for IoT Home DevicesSejun Lee, Jaehoon Jeong, Jungsoo Park. 131-134 [doi]
- Will ToR Achieve Its Goals in the "Future Internet"? An Empirical Study of Using ToR with Cloud ComputingAntonio Carnielli, Mahdi Aiash. 135-140 [doi]
- SBUS: Smart e-Bus Battery Substitution Scheme in Vehicular NetworksJihyeok Seo, Jaehoon Jeong, Hyoungshick Kim, Jung Soo Park. 141-145 [doi]
- Privacy Preserving Nearest Neighbor Search Based on Topologies in Cellular NetworksMahdi Daghmechi Firoozjaei, Jaegwan Yu, Hyoungshick Kim. 146-149 [doi]
- A Framework for Security Services Based on Software-Defined NetworkingJaehoon Jeong, Jihyeok Seo, Geumhwan Cho, Hyoungshick Kim, Jung Soo Park. 150-153 [doi]
- Introducing a Hybrid Infrastructure and Information-Centric Approach for Secure Cloud ComputingMahdi Aiash, Robert Colson, Mohammad Muneer Kallash. 154-159 [doi]
- A Survey on Interfaces to Network Security Functions in Network VirtualizationHyunsu Jang, Jaehoon Jeong, Hyoungshick Kim, Jung Soo Park. 160-163 [doi]
- Packet Arrival Analysis in Wireless Sensor NetworksKrishna Doddapaneni, Purav Shah, Enver Ever, Ali Tasiran, Fredrick A. Omondi, Leonardo Mostarda, Orhan Gemikonakli. 164-169 [doi]
- RUHEED-Rotated Unequal Clustering Algorithm for Wireless Sensor NetworksNueraili Aierken, Roberto Gagliardi, Leonardo Mostarda, Zaib Ullah. 170-174 [doi]
- A Framework for Energy Based Performability Models for Wireless Sensor NetworksFredrick A. Omondi, Purav Shah, Orhan Gemikonakli, Enver Ever. 175-180 [doi]
- Time Reversal-Based Transmissions with Distributed Power Allocation for Two-Tier NetworksVu Tran-Ha, Quang-Doanh Vu, Een-Kee Hong. 181-186 [doi]
- A Constrained ECA Language Supporting Formal Verification of WSNsFlavio Corradini, Rosario Culmone, Leonardo Mostarda, Luca Tesei, Franco Raimondi. 187-192 [doi]
- An ANT+ Protocol Based Health Care SystemNadeem Qaisar Mehmood, Rosario Culmone. 193-198 [doi]
- An Active Learning System Using Smartphone for Improving Students Learning ConcentrationNoriyasu Yamamoto. 199-203 [doi]
- Technology Research of Tibetan Hot Topics ExtractionGuixian Xu, Lirong Qiu. 204-208 [doi]
- Word Sense Disambiguation Based on Feature Ranking GraphYeqing Li, Xiaoyu Qiu. 209-212 [doi]
- Named Entity Relation Extraction Based on Multiple FeaturesYeqing Li. 213-216 [doi]
- Power Consumption and Computation Models of a Server with a Multi-core CPU and ExperimentsHiroki Kataoka, Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa. 217-222 [doi]
- Implementation of Cloud Infrastructure Monitor Platform with Power Saving MethodChao-Tung Yang, Chih-Liang Chuang, Jung-Chung Liu, Chien-Chih Chen, William C. Chu. 223-228 [doi]
- Demand Response: From Classification to Optimization Techniques in Smart GridAshfaq Ahmad, Nadeem Javaid, Umar Qasim, Zahoor Ali Khan. 229-235 [doi]
- Implementation of Application Softwares for Reducing Power Consumption in Web ServicesKen Nishimura, Kaoru Sugita. 236-241 [doi]
- Secure Two-Party Computation in Social Cloud Based on ReputationYilei Wang, Chao Guo, Tao Li, Qiuliang Xu. 242-245 [doi]
- e-MinZu: A Software Service Architecture Based on Saas for Massive Data SourceWeng Yu. 246-249 [doi]
- The Research of Security of P2P Network File Sharing SystemShaojing Li, Wanli Su, Haoling Li. 250-254 [doi]
- New Methods for Big Data Analysis in ImagesPetra Perner. 255-260 [doi]
- Why Internet Protocols Need IncentivesDavid Murray. 261-266 [doi]
- A New Scheduling Algorithm for Real-Time Communication in LTE NetworksSamia Dardouri, Ridha Bouallegue. 267-271 [doi]
- Broadcast Protocols in Wireless NetworksKazuaki Kouno, Dilawear Duolikun, Tomoya Enokido, Makoto Takizawa. 272-277 [doi]
- Performance Comparison Between RSA and Elliptic Curve Cryptography-Based QR Code AuthenticationNon Thiranant, Young Sil Lee, Hoon Jae Lee. 278-282 [doi]
- Analysis of Researcher Co-authorship NetworkJiana Meng, Jun Guo. 283-286 [doi]
- Anonymous Identity-Based Encryption with Bounded Leakage ResiliencePengtao Liu, Chengyu Hu, Shanqing Guo, Yilei Wang. 287-292 [doi]
- The Electronic Voting in the Presence of Rational VotersTao Li, Hao Yang, Yilei Wang, Qiuliang Xu. 293-296 [doi]
- Extended Lifetime Based Elliptical Sink-Mobility in Depth Based Routing Protocol for UWSNsNaveed Ilyas, Nadeem Javaid, zafar iqbal, Muhammad Imran, Zahoor Ali Khan, Umar Qasim, Muhammad Shoaib. 297-303 [doi]
- Selection of Actor Nodes in Wireless Sensor and Actor Networks: A Fuzzy Based Method Considering Actor MobilityDonald Elmazi, Elis Kulla, Tetsuya Oda, Evjola Spaho, Leonard Barolli, Kazunori Uchida. 304-310 [doi]
- Circular Joint Sink Mobility Scheme for Wireless Sensor NetworksS. Rahim, H. Rahim, R. D. Khan, M. Z. Siddiqi, M. A. Qureshi, Umar Qasim, Zahoor Ali Khan, S. Mahmood, Nadeem Javaid. 311-319 [doi]
- DYN-NbC-JSM: Dynamic Joint Sink Mobility with Need-Based Clustering in WSNsAyesha Hussain Khan, Nadeem Javaid, Muhammad Imran, Zahoor Ali Khan, Umar Qasim, Noman Haider. 320-325 [doi]
- Using Cellular Sensor Networks for Environment ProtectionMimoza Durresi, Arjan Durresi, Leonard Barolli, Kazunori Uchida. 326-331 [doi]
- An Analysis of Machine-Type-Communication on Human-Type-Communication over Wireless Communication NetworksParampreet Sidhu, Isaac Woungang, Glaucio H. S. Carvalho, Alagan Anpalagan, Sanjay Kumar Dhurandher. 332-337 [doi]
- Video Quality Transmission Evaluation over Next Generation Wireless NetworksHekma Chaari, Kais Mnif, Lotfi Kamoun. 338-343 [doi]
- Smartphone-Based Secure Access Control in Wireless Network AnalysisHyunho Kim, Young-Jin Kang, Ndibanje Bruce, Suhyun Park, Hoon Jae Lee. 344-347 [doi]
- Performance Evaluation of a VANET Simulation System Using NS-3 and SUMOVladi Kolici, Tetsuya Oda, Evjola Spaho, Leonard Barolli, Makoto Ikeda, Kazunori Uchida. 348-353 [doi]
- Using Combined Cellular Ad Hoc Communications for Smart EnvironmentsMimoza Durresi, Arjan Durresi, Leonard Barolli, Kazunori Uchida. 354-359 [doi]
- A Discrete Ray Tracing Method Based on Dijkstra Algorithm for 3D Propagation EnvironmentsKazunori Uchida. 360-365 [doi]
- Numerical Analysis of 1X4 Branch Waveguide in Two Dimensional Photonic Crystal StructureHiroshi Maeda, Naoki Sakuma, Noriyuki Toyomasu, Ryoma Nishi, Daichi Ogata. 366-369 [doi]
- Investigation of Message Suppression Method Considering TCP in Vehicular-DTNSeiichiro Ishikawa, Taiki Honda, Makoto Ikeda, Leonard Barolli. 370-375 [doi]
- Analytical Downlink Effective SINR Evaluation in LTE NetworksMarwane Ben Hcine, Ridha Bouallegue. 376-381 [doi]
- Investigating Performance of Concurrent Virtual Wi-Fi InterfacesKien Nguyen, Kentaro Ishizu, Homare Murakami, Fumihide Kojima. 382-386 [doi]
- On Context and the Open World AssumptionPhilip Moore, Hai Van Pham. 387-392 [doi]
- Handling Big Data Using NoSQLJagdev Bhogal, Imran Choksi. 393-398 [doi]
- An Ontological Analysis of the Role of Culture within Green ITJagdev Bhogal, William Campbell. 399-404 [doi]
- Models for an Intelligent Context-Aware Blended m-Learning SystemDavid Newell, Philip Davies, Ron Austin, Philip Moore, Mak Sharma. 405-410 [doi]
- Secure and Efficient Mobile Personal Health Data Sharing in Resource Constrained EnvironmentsRichard Ssembatya, Anne V. D. M. Kayem. 411-416 [doi]
- Structural Controllability Analysis Via Embedding Power Dominating Set Approximation in ErdHos-Rènyi GraphsBader Alwasel, Stephen D. Wolthusen. 418-423 [doi]
- A Usable and Secure Crime Reporting System for Technology Resource Constrained ContextAderonke Busayo Sakpere, Anne V. D. M. Kayem, Thabo Ndlovu. 424-429 [doi]
- Physical Layer Secrecy Performance of Multi-hop Decode-and-Forward Relay Networks with Multiple EavesdroppersDuc-Dung Tran, Nguyen-Son Vo, Tan-Loc Vo, Dac-Binh Ha. 430-435 [doi]
- A New Efficient Request-Based Comparable Encryption SchemePeng Chen, Jun Ye, Xiaofeng Chen. 436-439 [doi]
- Server Aided Ciphertext-Policy Attribute-Based EncryptionHao Wang, Bo Yang, Yilei Wang. 440-444 [doi]
- Shape and Motion Features Approach for Activity Tracking and Recognition from Kinect Video CameraAhmad Jalal, Shaharyar Kamal, Daijin Kim. 445-450 [doi]
- A Hybrid Type DTN Routing Method Using Delivery Predictability and Maximum Number of ReplicationTomoaki Miyakawa, Akio Koyama. 451-456 [doi]
- The Design of a Framework for Smart AppliancesMinoru Uehara. 457-462 [doi]
- Extension of Web-Based Software Development EnvironmentHideaki Yanagisawa. 463-466 [doi]
- Parallel Architectures with Small World Network ModelHideki Mori, Minoru Uehara, Katsuyoshi Matsumoto. 467-472 [doi]
- Feasibility Validation of WiFi Based Multihop Access Network for Disaster RecoveryQuang Tran Minh, Shigeki Yamada. 473-477 [doi]
- GICS: Group-Based Internet Connection Spreading Architecture for Disaster RecoveryXuan Thien Phan, Quang Tran Minh, Kien Nguen, Nam Thoai, Shigeki Yamada. 478-483 [doi]
- Proposal of the Fire Fighting Support System for the Volunteer Fire CompanyKazuhiro Takahagi, Tomoyuki Ishida, Satoshi Noda, Akira Sakuraba, Noriki Uchida, Yoshitaka Shibata. 484-489 [doi]
- Application of DTN to the Vehicle Sensor Platform CoMoSEGo Hirakawa, Noriki Uchida, Yoshikazu Arai, Yoshitaka Shibata. 490-493 [doi]
- Implementation of High Presence Video Communication System for Multiple Users Using Tiled Display EnvironmentSatoshi Noda, Yasuo Ebara, Tomoyuki Ishida, Koji Hashimoto, Yoshitaka Shibata. 494-499 [doi]
- M2M Emergency Help Alert Mobile Cloud ArchitectureMohammad Aazam, Pham Phuoc Hung, Eui-nam Huh. 500-505 [doi]
- Evaluation of Vehicle-to-Vehicle Communication with Delay Tolerant Networks for Safety Surveillance SystemNoriki Uchida, Go Hirakawa, Yoshikazu Arai, Kazuo Takahata, Yoshitaka Shibata. 506-511 [doi]
- Mobile Cloud Computing for Distributed Disaster Information System in Challenged Communication EnvironmentYosuke Kikuchi, Yoshitaka Shibata. 512-517 [doi]
- A Road Condition Monitoring System Using Various Sensor Data in Challenged Communication Network EnvironmentKenta Ito, Go Hirakawa, Yoshikazu Arai, Yoshitaka Shibata. 518-523 [doi]
- Development of Autonomous Anti-Disaster Base Station by Combination of Satellite and Wireless NetworksHiroaki Yuze, Shinichi Nabeta, Yuji Ito. 524-528 [doi]
- Increasing Trust in Elections via a Simple Receipt AlgorithmSuzanne Mello-Stark, Edmund A. Lamagna. 529-534 [doi]
- Overviewing the Knowledge of a Query Keyword by Clustering Viewpoints of Web Search Information NeedsIchiro Moriya, Yusuke Inoue, Takakazu Imada, Takehito Utsuro, Yasuhide Kawada, Noriko Kando. 535-540 [doi]
- Approximating Document Frequency for Self-Index based Top-k Document RetrievalTokinori Suzuki, Atsushi Fujii. 541-546 [doi]
- The Use of POS Sequence for Analyzing Sentence Pattern in Twitter Sentiment AnalysisFajri Koto, Mirna Adriani. 547-551 [doi]
- Discover Overlapping Topical Regions by Geo-Semantic Clustering of TweetsYuta Taniguchi, Daiki Monzen, Lutfiana Sari Ariestien, Daisuke Ikeda. 552-557 [doi]
- Exploring Technical Phrase Frames from Research Paper TitlesYuzana Win, Tomonari Masada. 558-563 [doi]
- Mining User Interests through Internet Review Forum for Building Recommendation SystemOmar Abdillah, Mirna Adriani. 564-569 [doi]
- SkillsRec: A Novel Semantic Analysis Driven Learner Skills Mining and Filtering Approach for Personal Learning Environments Based on Teacher GuidanceZaffar Ahmed Shaikh, Denis Gillet, Shakeel Ahmed Khoja. 570-576 [doi]
- Academic Performance PredictorsCheng Lei, Kin Fun Li. 577-581 [doi]
- Applicability of Probablistic Data Structures for Filtering Tasks in Data Loss Prevention SystemsLu Shi, Sergey Butakov, Dale Lindskog, Ron Ruhl, Evgeny Storozhenko. 582-586 [doi]
- An Approach for Testing Data Intensive Systems: Application to a Banking CRM SystemXiaoping Che, Pengyu Liu, Zhipeng Zhang, Fangzhi Wen. 587-592 [doi]
- DOCKEMU - A Network Emulation ToolMarco Antonio To, Marcos Cano, Preng Biba. 593-598 [doi]
- A Reliable and Scalable Classification-Based Hybrid IPSOscar Rodas, Gerardo Morales, Jose Alvarez. 599-604 [doi]
- Process Mining for Trust MonitoringJorge Lopez, Stephane Maag, Cecilia Saint-Pierre, Javier Bustos, Ana R. Cavalli. 605-610 [doi]
- Maintaining and Monitoring the Infrastructure of the NORNET CORE Testbed for Multi-homed SystemsThomas Dreibholz, Jarle Bjørgeengen, Jonas Werme. 611-616 [doi]
- Multi-path TCP in Real-World Setups - An Evaluation in the NORNET CORE TestbedThomas Dreibholz, Xing Zhou, Fu Fa. 617-622 [doi]
- Performance Evaluation of Experimental Setups in Home Energy Management Systems in Smart GridW. Naeem, Nadeem Javaid, Zahoor Ali Khan, Umar Qasim, A. Mahmood, Z. Mehmood, A. Ahmad, F. Ali, W. Sarwar. 623-632 [doi]
- Device-to-Device Service Selection Framework in Cloud Radio Access NetworkYuansheng Luo, Kun Yang, Qiang Tang, Jianming Zhang, Shi Qiu. 633-637 [doi]
- Smart Eco-Urban Cities Ubiquitous Public ParkNizar Boussarsar, Youssef Kamoun, Mouna Ketatni, Anis Benhajji, Seifallah Jemal. 638-643 [doi]
- A Publish-Subscribe Approach to IoT Integration: The Smart Office Use CaseAlex C. Olivieri, Gianluca Rizzo, Francois Morard. 644-651 [doi]
- Group-Based Uplink Scheduling for Machine-Type Communications in LTE-Advanced NetworksTsung-Hui Chuang, Meng-Hsun Tsai, Chun-Yi Chuang. 652-657 [doi]
- Proof-of-Concept: Infrared Transmission Using Smart Phone CamerasRene Romann. 658-661 [doi]
- Automatic Generation of Social Relationships between Internet of Things in Smart Home Using SDN-Based Home CloudYounggi Kim, Young Hee Lee. 662-667 [doi]
- Internet of Things for Cultural Heritage of Smart Cities and Smart RegionsAntonio J. Jara, Yunchuan Sun, Houbing Song, Rongfang Bie, Dominique Genoud, Yann Bocchi. 668-675 [doi]
- Managing Context Information for Adaptive Security in IoT EnvironmentsJosé Luis Hernández Ramos, Jorge Bernal Bernabé, Antonio F. Skarmeta. 676-681 [doi]
- LESS: Lightweight Establishment of Secure Session: A Cross-Layer Approach Using CoAP and DTLS-PSK Channel EncryptionAbhijan Bhattacharyya, Tulika Bose, Soma Bandyopadhyay, Arijit Ukil, Arpan Pal. 682-687 [doi]
- SDN Based Architecture for IoT and Improvement of the SecurityOlivier Flauzac, Carlos Gonzalez, Abdelhak Hachani, Florent Nolot. 688-693 [doi]
- EAP for IoT: More Efficient Transport of Authentication Data - TEPANOM Case StudyMarcin Piotr Pawlowski, Antonio J. Jara, Maciej J. Ogorzalek. 694-699 [doi]
- A Case Study and Design of Transformation Architecture in BSSTeh-Sheng Huang, Chun-Yen Wang, Tsung-Ching Lin, Jeu-Yih Jeng. 700-705 [doi]
- An Anomaly Detection by Whitening HOSFChun-Hui Wang, Yue Pan, Shwu-Huey Yen. 706-710 [doi]
- Video Streaming: H.264 and the Internet of ThingsR. Pereira, E. Pereira. 711-714 [doi]
- Multipath Transmission Model and Its Route Selection Policy Considering Packet Re-sequencing Buffers AvailabilityYuta Yoshinaga, Masayoshi Shimamura, Katsuyoshi Iida. 715-720 [doi]
- Road-Oriented Geographic Routing Protocol for Urban Vehicular Ad Hoc NetworksRyosuke Akamatsu, Keiji Obara, Hiroshi Shigeno. 721-726 [doi]
- Equalization for the FDM System Using Mach-Zehnder FiltersYuki Fukushima, Isamu Wakabayashi, Takayuki Kawahara. 727-732 [doi]
- A Visible Light Communication Link Protection Mechanism for Smart FactoryShih-Hao Chang. 733-737 [doi]