Abstract is missing.
- Influential Abortion Probability in a Flexible Read-Write Abortion ProtocolShigenari Nakamura, Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa. 1-8 [doi]
- Characterizing Similarity Structure of Spatial Networks Based on Degree Mixing PatternsArief Maulana, Kazumi Saito, Tetsuo Ikeda, Hiroaki Yuze, Takayuki Watanabe, Seiya Okubo, Nobuaki Mutoh. 9-16 [doi]
- Disaster Information Gathering System Based on Web Caching and OpenFlow in Unstable NetworksSaki Tabata, Kohei Ueda, Ryotaro Fukui, Keiko Shimazu, Hiroshi Shigeno. 17-24 [doi]
- NEXT-FIT: Available Bandwidth Measurement over 4G/LTE Networks - A Curve-Fitting ApproachAnup Kumar Paul, Atsuo Tachibana, Teruyuki Hasegawa. 25-32 [doi]
- Monitoring Communication Quality Degradation in LTE Network Using Statistics of State TransitionMasaki Suzuki, Quentin Plessis, Takeshi Kitahara, Shigehiro Ano. 33-38 [doi]
- Channel Capacity and SA-BER Performances Evaluation of an OFDM-Based Two-Way Relaying AF-PNC-PLC SystemsSana Ezzine, Fatma Abdelkefi, Jean-Pierre Cances, Vahid Meghdadi, Ammar Bouallègue. 39-46 [doi]
- CICPV: A New Academic Expert Search ModelZhijie Ban, Le Liu. 47-52 [doi]
- Sentiment Analysis and Classification for Software as a Service ReviewsAsma Musabah Alkalbani, Ahmed Mohamed Ghamry, Farookh Khadeer Hussain, Omar Khadeer Hussain. 53-58 [doi]
- The Impact of Course Enrollment Sequences on Student SuccessAhmad Slim, Gregory L. Heileman, Wisam Al-Doroubi, Chaouki T. Abdallah. 59-65 [doi]
- Mining and Visualizing Social Data to Inform Marketing DecisionsJérôme Treboux, Fabian Cretton, Florian Evéquoz, Anne Le Calvé, Dominique Genoud. 66-73 [doi]
- Applying Data Mining to Explore Students' Self-Regulation in Learning ContextsChia-Yin Ko, Fang-Yie Leu. 74-78 [doi]
- A New Model for Testing CRUD Operations in a NoSQL DatabaseMaría Teresa González-Aparicio, Muhammad Younas, Javier Tuya, Rubén Casado. 79-86 [doi]
- SDCCN: A Novel Software Defined Content-Centric Networking ApproachSergio Charpinel, Celso Alberto Saibel Santos, Alex Borges Vieira, Rodolfo da Silva Villaça, Magnos Martinello. 87-94 [doi]
- Experimental Results of a Raspberry Pi and OLSR Based Wireless Content Centric Network Testbed Considering OpenWRT OSAdmir Barolli, Tetsuya Oda, Leonard Barolli, Makoto Takizawa. 95-100 [doi]
- A Capital Market Metaphor for Content Delivery Network ResourcesElias Vathias, Dimitris Nikolopoulos, Stathes Hadjiefthymiades. 101-108 [doi]
- New Hierarchical Parent-Child Caching Strategy (H-CS) for CCN-Based Video StreamingOlfa Ben Rhaiem, Lamia Chaari Fourati, Wessam Ajib. 109-115 [doi]
- Designing an Analysis Procedure for Context Aware Applications in Ubiquitous EnvironmentsNesrine Khabou, Ismael Bouassida Rodriguez, Mohamed Jmaiel. 116-123 [doi]
- RTT-Based Caching Policies to Improve User-Centric Performance in CCNKenji Yokota, Kohei Sugiyama, Jun Kurihara, Atsushi Tagami. 124-131 [doi]
- Cluster-Head and Border-Node Based Cluster Routing Protocol for LR-WPANYing Huang, Hongli Ge, Jangsu Lee, Yuehua Dai, Dong Xu, Jin Zhang, Qiang Gao, Shaoying Zhao. 132-139 [doi]
- Economic Viability of QoS in Software Defined Networks (SDNs)Murat Karakus, Arjan Durresi. 140-146 [doi]
- Network Monitoring Using MMT: An Application Based on the User-Agent Field in HTTP HeadersVinh Hoa La, Raul A. Fuentes-Samaniego, Ana R. Cavalli. 147-154 [doi]
- A New Sensing Strategy for 5G Mobile Networks: Towards Spectral and Energy Efficiency Trade offAfef Bohli, Ridha Bouallegue. 155-159 [doi]
- Realization of Time Synchronization Protocol Based on Frequency Skew Bid and Dynamic Topology Using Embedded Linux SystemZhenqiang Huang, Enqing Dong, Yuan Yuan, Wei Liu. 160-165 [doi]
- Greedy Versus Limited Access Point Backhaul Resource Aggregation in Wireless Local Area NetworksKawther Hassine, Mounir Frikha, Tijani Chahed. 166-173 [doi]
- A GA-Based Simulation System for WMNs: Performance Analysis of WMN-GA System for Different WMN Architectures and Uniform Distribution Considering DCF and EDCAIlir Shinko, Tetsuya Oda, Evjola Spaho, Admir Barolli, Vladi Kolici, Leonard Barolli. 174-180 [doi]
- Evaluating Cross-Layer Cooperation of Congestion and Flow Control in IEEE 802.11s NetworksMichael Rethfeldt, Peter Danielis, Benjamin Beichler, Björn Konieczek, Felix Uster, Dirk Timmermann. 181-188 [doi]
- MobiSink: Cooperative Routing Protocol for Underwater Sensor Networks with Sink MobilityPir Masoom Shah, Ikram Ullah, Tanveer Khan, Muhammad, Sheraz Hussain, Zahoor Ali Khan, Umar Qasim, Nadeem Javaid. 189-197 [doi]
- Energy Concerns inWireless Sensor and Actor Networks: A Simulation CaseElis Kulla, Evjola Spaho, Makoto Ikeda, Leonard Barolli. 198-205 [doi]
- Implementation of a New Replacement Method in WMN-PSO Simulation System and Its Performance EvaluationShinji Sakamoto, Tetsuya Oda, Makoto Ikeda, Leonard Barolli, Fatos Xhafa. 206-211 [doi]
- Trusted Secure Adhoc On-demand Multipath Distance Vector Routing in MANETAbrar Omar Alkhamisi, Seyed M. Buhari. 212-219 [doi]
- SDN Based Architecture to Improve Video Streaming in Home NetworksRabee Mustapha Abuteir, Anne Fladenmuller, Olivier Fourmaux. 220-226 [doi]
- New Educational Equipments for Networking Study by Physical Visualizations and Physical Direct ManipurationsKazuaki Yoshihara, Kenzi Watanabe, Nobukazu Iguchi. 227-230 [doi]
- A Method to Describe Student Learning Status for Personalized Computer Programming e-Learning EnvironmentYu Yan, Hara Kohei, Nakano Hiroto, Takenobu Kazuma, Aiguo He. 231-238 [doi]
- On the Evaluation of Quality of Situation (QoSi) in Situation-Aware Ubiquitous Learning EnvironmentRaoudha Souabni, Inés Bayoudh Saâdi, Nesrine Ben Salah, Kinshuk, Henda Hajjami Ben Ghézala. 239-246 [doi]
- Energy Minimization by Selecting Appropriate Modulation and Coding Scheme for MB-OFDM UWB SystemsHouda Chihi, Reza Mahin Zaeem, Ridha Bouallegue. 247-252 [doi]
- An Estimation Model on Stress and Relaxed States for QOL Visualization and Its EvaluationSayaka Akiyama, Yuka Kato. 253-259 [doi]
- Impact of SDN on Mobility ManagementKuljaree Tantayakul, Riadh Dhaou, Béatrice Paillassa. 260-265 [doi]
- SLEEPWELL: Energy Efficient Network Design for the Developing World Using Green SwitchesKshitiz Verma, Shmuel Zaks, Alberto García-Martínez. 266-273 [doi]
- VISION - Interactive and Selective Visualization for Management of NFV-Enabled NetworksMuriel Figueredo Franco, Ricardo Luis dos Santos, Alberto E. Schaeffer Filho, Lisandro Zambenedetti Granville. 274-281 [doi]
- A Scalability Metric for Control Planes in Software Defined Networks (SDNs)Murat Karakus, Arjan Durresi. 282-289 [doi]
- Explore and Analyze the Performance Factors on Wi-Fi Sensing Starvation ProblemsYean-Fu Wen, Shih-Yao Chen, Chiu-Han Hsiao, Frank Yeong-Sung Lin. 290-296 [doi]
- EDR: An Encounter and Distance Based Routing Protocol for Opportunistic NetworksSanjay Kumar Dhurandher, Satya Jyoti Borah, Isaac Woungang, Deepak Kumar Sharma, Kunal Arora, Divyansh Agarwal. 297-302 [doi]
- Dynamic Sensor Management: Extending Sensor Web for Near Real-Time Mobile Sensor Integration in Dynamic ScenariosLuiz Fernando Gomes de Assis, Lucas P. Behnck, Dionísio Doering, Edison Pignaton de Freitas, Carlos Eduardo Pereira, Flávio Eduardo Aoki Horita, Jó Ueyama, João Porto de Albuquerque. 303-310 [doi]
- A Transmit Power Efficient Non-Cooperative Game Design for Wireless Sensor Networks Based on the Utility and Cost FunctionAnwar Khan, Hassan Mahmood, Zahoor Ali Khan, Umar Qasim, Nadeem Javaid. 311-315 [doi]
- An Opportunistic Void Avoidance Routing Protocol for Underwater Sensor NetworksSeyed Mohammad Ghoreyshi, Alireza Shahrabi, Tuleen Boutaleb. 316-323 [doi]
- An Energy Efficient and Balanced Energy Consumption Cluster Based Routing Protocol for Underwater Wireless Sensor NetworksAbdul Majid, Irfan Azam, Abdul Waheed, Muhammad Zain-ul-Abidin, Taimur Hafeez, Zahoor Ali Khan, Umar Qasim, Nadeem Javaid. 324-333 [doi]
- Three-Dimensional Sensor Localization Using Modified 3N AlgorithmDogan Yildiz, Serap Karagol, Okan Ozgonenel, Satish Tadiparthi, Marwan Bikdash. 334-338 [doi]
- A Comparison of HEED Based Clustering Algorithms - Introducing ER-HEEDZaib Ullah, Leonardo Mostarda, Roberto Gagliardi, Diletta Cacciagrano, Flavio Corradini. 339-345 [doi]
- Positional Estimation of Obstacles and Aircraft by Using ISDB-T Signal DelayJunichi Honda, Takuya Otsuyama. 346-351 [doi]
- SEEC: Sparsity-Aware Energy Efficient Clustering Protocol for Underwater Wireless Sensor NetworksIrfan Azam, Abdul Majid, Ijaz Ahmad, Usman Shakeel, Hammad Maqsood, Zahoor Ali Khan, Umar Qasim, Nadeem Javaid. 352-361 [doi]
- Feasibility of Analyzing Wi-Fi Activity to Estimate Transit Passenger PopulationThongtat Oransirikul, Ryo Nishide, Ian Piumarta, Hideyuki Takada. 362-369 [doi]
- Research on Never Die Network for Disaster Prevention Based on OpenFlow and Cognitive Wireless TechnologyGoshi Sato, Noriki Uchida, Norio Shiratori, Yoshitaka Shibata. 370-375 [doi]
- Comparing Strategies to Construct Local Disaster Recovery NetworksMatthias Herlich, Shigeki Yamada. 376-383 [doi]
- necoMAC: Network Coding Aware MAC Protocol for Multirate Wireless NetworksNyan Lin, Rithea Ngeth, Krittanai Sriviriyakul, Yuto Lim, Yasuo Tan. 384-391 [doi]
- An Energy-Efficient Load Balancing Algorithm for Virtual Machine Environments to Perform Communication Type Application ProcessesTomoya Enokido, Makoto Takizawa. 392-399 [doi]
- Energy-Aware Clusters of Servers for Storage and Computation ApplicationsAtsuhiro Sawada, Hiroki Kataoka, Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa. 400-407 [doi]
- Accelerating Packet Processing in a Xen Environment with OpenDataPlaneTarek Rabia, Othmen Braham, Guy Pujolle. 408-413 [doi]
- Straggler Detection in Parallel Computing Systems through Dynamic Threshold CalculationXue Ouyang, Peter Garraghan, David McKee, Paul Townend, Jie Xu. 414-421 [doi]
- eHSim: An Efficient Hybrid Similarity Search with MapReduceTrong Nhan Phan, Josef Küng, Tran Khanh Dang. 422-429 [doi]
- Data-Driven Workflows for Microservices: Genericity in JolieLarisa Safina, Manuel Mazzara, Fabrizio Montesi, Víctor Rivera. 430-437 [doi]
- Void Avoidance Scheme for Real-Time Data Dissemination in Irregular Wireless Sensor NetworksSangdae Kim, Cheonyong Kim, Hyunchong Cho, Yongbin Yim, Sang-Ha Kim. 438-443 [doi]
- A Precision Operation Optimization for Detection-Based Sensor NetworksFrank Yeong-Sung Lin, Chiu-Han Hsiao, Yean-Fu Wen. 444-451 [doi]
- Sink Mobility Support Scheme for Continuous Object Tracking in Wireless Sensor NetworksCheonyong Kim, Hyunchong Cho, Sangdae Kim, Taehun Yang, Sang-Ha Kim. 452-457 [doi]
- A Preamble Ahead Anycast Protocol for WSNsTales Heimfarth, João Carlos Giacomin, João Paulo de Araujo, Edison Pignaton de Freitas. 458-466 [doi]
- Development of Analytical Model for Data Trustworthiness in Sensor NetworksSami J. Habib, Paulvanna Nayaki Marimuthu. 467-472 [doi]
- Energy Efficient and Reliable Data Gathering in Underwater WSNsTayyaba Liaqat, Nadeem Javaid, Ashfaq Ahmad, Zahoor Ali Khan, Umar Qasim, Muhammad Imran. 473-478 [doi]
- Energy Considerations for Continuous Group Activity Recognition Using Mobile Devices: The Case of GroupSenseAmin B. Abkenar, Seng Wai Loke, J. Wenny Rahayu, Arkady B. Zaslavsky. 479-486 [doi]
- A Positioning Handoff Decision Algorithm for Ubiquitous Pedestrian Navigation SystemsWiem Fekih Hassen, Faïza Najjar. 487-494 [doi]
- Microinteractions in Mobile and Wearable ComputingMarkus Aleksy, Jonas Brönmark, Shakeel Mahate. 495-500 [doi]
- Soft Fall Detection Using Machine Learning in Wearable DevicesDominique Genoud, Vincent Cuendet, Julien Torrent. 501-505 [doi]
- Clustering Depth Based Routing for Underwater Wireless Sensor NetworksTanveer Khan, Israr Ahmad, Waqas Aman, Irfan Azam, Zahoor Ali Khan, Umar Qasim, Sanam Avais, Nadeem Javaid. 506-515 [doi]
- A QoS-Guaranteed Adaptive Cooperation Scheme in Cognitive Radio NetworkYufeng Wang, Feilong Tang, Yanqin Yang, Jie Li, Wenchao Xu, Jinsong Wu. 516-523 [doi]
- An Autonomic Majority Quorum SystemLuiz A. Rodrigues, Luciana Arantes, Elias Procópio Duarte Jr.. 524-531 [doi]
- ContentSDN: A Content-Based Transparent Proxy Architecture in Software-Defined NetworkingAlex F. R. Trajano, Marcial P. Fernandez. 532-539 [doi]
- Priority-Based State Machine Replication with PRaxosPaulo R. Pinho Filho, Luciana de Oliveira Rech, Lau Cheuk Lung, Miguel Correia, Lásaro Jonas Camargos. 540-547 [doi]
- Approximate-Centroid Election in Large-Scale Distributed Embedded SystemsAndré Naz, Benoît Piranda, Seth Copen Goldstein, Julien Bourgeois. 548-556 [doi]
- An Energy-Aware Migration of Virtual MachinesDilawaer Duolikun, Ryo Watanabe, Hiroki Kataoka, Shigenari Nakamura, Tomoya Enokido, Makoto Takizawa. 557-564 [doi]
- Energy-Aware Server Selection Algorithms in a Scalable ClusterHiroki Kataoka, Atsuhiro Sawada, Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa. 565-572 [doi]
- An Enhanced Message Suppression Controller for Vehicular-Delay Tolerant NetworksMakoto Ikeda, Seiichiro Ishikawa, Leonard Barolli. 573-579 [doi]
- An Architecture for Traffic Sign Management in Smart CitiesEverton R. Lira, Enrique Fynn, Paulo R. S. L. Coelho, Luis F. Faina, Lásaro J. Camargos, Rodolfo da Silva Villaça, Rafael Pasquini. 580-587 [doi]
- Handover Decision in Heterogeneous NetworksSassi Maaloul, Mériem Afif, Sami Tabbane. 588-595 [doi]
- Experimental Evaluation on Quality of VoIP over Aero MACSKazuyuki Morioka, Junichi Naganawa, Junichi Honda, Naoki Kanada, Shunichi Futatsumori, Akiko Kohmura, Takeshi Tomita, Naruto Yonemoto, Yasuto Sumiya. 596-602 [doi]
- Channel-Aware ECDSA Signature Verification of Basic Safety Messages with K-Means Clustering in VANETsElyes Ben Hamida, Muhammad Awais Javed. 603-610 [doi]
- Spectrum Sensing in Cognitive Radio Networks and Capacity Analysis for Vehicular NetworkWencheng Chen, Xiangming Wen, Wei Li. 611-617 [doi]
- An Openstack Based Accounting and Billing Service for Future Internet ApplicationsOladotun Omosebi, Stelios Sotiriadis, Nik Bessis. 618-623 [doi]
- Service Oriented Verification Integrated Fault Reasoning for SDNsYongning Tang, Guang Cheng, Zhiwei Xu, Feng Chen. 624-629 [doi]
- Examination of the Implementation Method of the Cloud Type Virtual Policy Based Network Management Scheme for the Common Use between Plural OrganizationsKazuya Odagiri, Shogo Shimizu, Naohiro Ishii, Makoto Takizawa. 630-636 [doi]
- Advance Reservation System for DatacentersRoxana Istrate, Andrei Poenaru, Florin Pop. 637-644 [doi]
- Partitioning-Based Workflow Scheduling in CloudsKhaled Almi'ani, Young Choon Lee. 645-652 [doi]
- Privacy Preservation for Participatory Sensing ApplicationsYuichi Sei, Akihiko Ohsuga. 653-660 [doi]
- A Proposal of a Password Manager Satisfying Security and Usability by Using the Secret Sharing and a Personal ServerMasayuki Fukumitsu, Shingo Hasegawa, Jun-ya Iwazaki, Masao Sakai, Daiki Takahashi. 661-668 [doi]
- Tightly-Secure Identity-Based Structured Aggregate Signature Scheme under the Computational Diffie-Hellman AssumptionTomoya Iwasaki, Naoto Yanai, Masaki Inamura, Keiichi Iwamura. 669-676 [doi]
- Preferential Attachment Model with Degree Bound and Its Application to Key Predistribution in WSNSushmita Ruj, Arindam Pal. 677-683 [doi]
- OS and Application Identification by Installed FontsTakamichi Saito, Kazushi Takahashi, Koki Yasuda, Takayuki Ishikawa, Ko Takasu, Tomotaka Yamada, Naoki Takei, Rio Hosoi. 684-689 [doi]
- An (n, n)-Multi Secret Image Sharing Scheme Using Boolean XOR and Modular ArithmeticMaroti Deshmukh, Neeta Nain, Mushtaq Ahmed. 690-697 [doi]
- Performance Comparison of Different Routing Protocols in Sparse and Dense VDTNsEvjola Spaho, Leonard Barolli, Vladi Kolici, Algenti Lala. 698-703 [doi]
- A Method for Recognizing Driver's Location Context with a Vehicle Information DeviceSeiji Matsuyama, Takatomo Yamabe, Yuki Nakayama, Yu Okuwaki, Ryozo Kiyohara. 704-710 [doi]
- Experimentation of V2X Communication in Real Environment for Road Alert Information Sharing SystemKenta Ito, Go Hirakawa, Yoshitaka Shibata. 711-716 [doi]
- Content and Context Aware Strategies for QoS Support in VANETsGianluca Rizzo, Maria Rita Palattella, Torsten Braun, Thomas Engel. 717-723 [doi]
- TrAD: Traffic Adaptive Data Dissemination Protocol for Both Urban and Highway VANETsBin Tian, Kun Mean Hou, Jianjin Li. 724-731 [doi]
- Implementing a Cloud-Based Service Supporting Biological Network SimulationsFabrizio Bertone, Giuseppe Caragnano, Lorenzo Mossucca, Olivier Terzo, Alfredo Benso, Gianfranco Politano, Alessandro Savino. 732-736 [doi]
- QoS-Aware Scheduling of Workflows in Cloud Computing EnvironmentsKhadija Bousselmi, Zaki Brahmi, Mohamed Mohsen Gammoudi. 737-745 [doi]
- Formal Verification of Cloud Resource Allocation in Business Processes Using Event-BSouha Boubaker, Amel Mammar, Mohamed Graiet, Walid Gaaloul. 746-753 [doi]
- A Cloud-Based Energy Efficient System for Enhancing the Detection and Prevention of Modern MalwareQublai Khan Ali Mirza, Ghulam Mohi-Ud-Din, Irfan Awan. 754-761 [doi]
- Practical Single Node Failure Recovery Using Fractional Repetition Codes in Data CentersMay Itani, Sanaa Sharafeddine, Islam Elkabbani. 762-768 [doi]
- Analysis of "Receipt-Freeness" and "Coercion-Resistance" in Biometric Authentication ProtocolsYoshifumi Ueshige, Kouichi Sakurai. 769-775 [doi]
- Game-Theoretic Security of Commitment Protocols under a Realistic Cost ModelTsuyoshi Komatsubara, Yoshifumi Manabe. 776-783 [doi]
- Resistance to Chaff Attack through TCP/IP Packet Cross-Matching and RTT-Based Random WalkJianhua Yang. 784-789 [doi]
- Application of HAZOP to the Design of Cyber Security ExperimentsMasood Mansoori, Ian Welch, Kim-Kwang Raymond Choo, Roy A. Maxion. 790-799 [doi]
- Preventing Pass-the-Hash and Similar Impersonation Attacks in Enterprise InfrastructuresAlexander Oberle, Pedro Larbig, Ronald Marx, Frank G. Weber, Dirk Scheuermann, Daniel Fages, Fabien Thomas. 800-807 [doi]
- Network Packet Filtering and Deep Packet Inspection Hybrid Mechanism for IDS Early Packet MatchingZouheir Trabelsi, Safaa Zeidan, Mohammad M. Masud. 808-815 [doi]
- A Location-Based Attendance Confirming SystemMasaki Kohana, Shusuke Okamoto. 816-820 [doi]
- A Web Interface for Satellite Scheduling ProblemsFatos Xhafa, Carlos Garcia, Admir Barolli, Makoto Takizawa. 821-828 [doi]
- Connection Management Using the Locality of Application TrafficHuihwan Park, Kyung-Min Park, Hoon Choi. 829-833 [doi]
- A Framework for Massively Multiplayer Online Game Content GenerationTiago Alves, Jorge Coelho. 834-841 [doi]
- On Cooperative On-Path and Off-Path Caching Policy for Information Centric Networks (ICN)Hemant Kumar Rath, Bighnaraj Panigrahi, Anantha Simha. 842-849 [doi]
- Addressing Challenges in Browser Based P2P Content Sharing Framework Using WebRTCShikhar Vashishth, Yash Sinha, K. Hari Babu. 850-857 [doi]
- A Smart Home Energy Management Strategy Based on Demand Side Managementzafar iqbal, Nadeem Javaid, Mobushir Riaz Khan, Farman Ali Khan, Zahoor Ali Khan, Umar Qasim. 858-862 [doi]
- Soft Real-Time Hadoop Scheduler for Big Data Processing in Smart CitiesCiprian Barbieru, Florin Pop. 863-870 [doi]
- An Architecture for Monitoring and Improving Public Transportation SystemsPedro H. S. Duarte, Luis F. Faina, Lásaro J. Camargos, Luciano Bernardes de Paula, Rafael Pasquini. 871-878 [doi]
- Water Level Meter for Alerting Population about FloodsJosé Adán Hernández-Nolasco, Miguel A. Wister Ovando, Francisco D. Acosta, Pablo Pancardo. 879-884 [doi]
- Defeasible Reasoning about Electric ConsumptionsMatteo Cristani, Claudio Tomazzoli, Erisa Karafili, Francesco Olivieri. 885-892 [doi]
- HVAC System for Maintaining Pleasant Sleep During Warm Nights in JapanKanae Matsui. 893-900 [doi]
- Intersection Automata Based Model for Android Application CollusionShweta Bhandari, Vijay Laxmi, Akka Zemmari, Manoj Singh Gaur. 901-908 [doi]
- A Data Usage Control System Using Dynamic Taint TrackingJulian Schütte, Gerd Stefan Brost. 909-916 [doi]
- Privacy-Preserving Triangle Counting in Distributed GraphsHoang Giang Do, Wee Keong Ng. 917-924 [doi]
- Failure Tolerant Rational Secret SharingSourya Joyee De, Sushmita Ruj. 925-932 [doi]
- Secure Neighbor Discovery in Mobile Ad Hoc Networks through Local Topology VisualizationSomayeh Taheri, Radu Stoleru, Dieter Hogrefe. 933-940 [doi]
- Empirical Analysis of Impact of HTTP Referer on Malicious Website Behaviour and DeliveryMasood Mansoori, Yuichi Hirose, Ian Welch, Kim-Kwang Raymond Choo. 941-948 [doi]
- QoE-Fuzzy VHO Approach for Heterogeneous Wireless Networks (HWNs)Aymen Ben Zineb, Mohamed Ayadi, Sami Tabbane. 949-956 [doi]
- Effect of Security Parameter for Selection of Actor Nodes in WSAN: A Comparison Study of Two Fuzzy-Based SystemsDonald Elmazi, Shinji Sakamoto, Tetsuya Oda, Elis Kulla, Evjola Spaho, Leonard Barolli. 957-964 [doi]
- Fuzzy-Based Trust Model for Detection of Selfish Nodes in MANETsZia Ullah, Muhammad Saleem Khan, Idrees Ahmed, Nadeem Javaid, Majid Iqbal Khan. 965-972 [doi]
- A Machine Learning Based Web Spam Filtering ApproachSantosh Kumar, Xiaoying Gao, Ian Welch, Masood Mansoori. 973-980 [doi]
- Experimental Results of a Raspberry Pi Based WMN Testbed Considering CPU FrequencyTetsuya Oda, Leonard Barolli. 981-986 [doi]
- A Python Framework for Exhaustive Machine Learning Algorithms and Features EvaluationsFabien Dubosson, Stefano Bromuri, Michael Ignaz Schumacher. 987-993 [doi]
- IoT Healthcare Analytics: The Importance of Anomaly DetectionArijit Ukil, Soma Bandyopadhyay, Chetanya Puri, Arpan Pal. 994-997 [doi]
- Efficient Broadcast Protocol for the Internet of ThingsHicham Lakhlef, Michel Raynal, Julien Bourgeois. 998-1005 [doi]
- Multi-master Replication of Enhanced Learning Assistant System in IoT ClusterBishnu Prasad Gautam, Katsumi Wasaki, Amit Batajoo, Suresh Shrestha, Sato Kazuhiko. 1006-1012 [doi]
- Trust Management Framework for Internet of ThingsYefeng Ruan, Arjan Durresi, Lina Alfantoukh. 1013-1019 [doi]
- Dynamic Street-Parking OptimisationNuria Pazos, M. Müller, M. Favre-Bulle, K. Brandt-Dit-Grieurin, O. Hüsser, Marco Aeberli, Nabil Ouerhani. 1020-1026 [doi]
- Performance Analysis of 6LoWPAN and CoAP for Secure Communications in Smart HomesRafael de Jesus Martins, Vinicius Garcez Schaurich, Luis Augusto Dias Knob, Juliano Araujo Wickboldt, Alberto E. Schaeffer Filho, Lisandro Zambenedetti Granville, Marcelo Pias. 1027-1034 [doi]
- Ice and Fire: Quantifying the Risk of Re-identification and Utility in Data AnonymizationHiroaki Kikuchi, Takayasu Yamaguchi, Koki Hamada, Yuji Yamaoka, Hidenobu Oguri, Jun Sakuma. 1035-1042 [doi]
- Detecting Stepping-Stone Intruders by Identifying Crossover Packets in SSH ConnectionsShou-Hsuan Stephen Huang, Hongyang Zhang, Michael Phay. 1043-1050 [doi]
- Hardware Covert Attacks and CountermeasuresJahnabi Phukan, Kin Fun Li, Fayez Gebali. 1051-1054 [doi]
- On Using Cognitive Models in CryptographyMarek R. Ogiela, Lidia Ogiela. 1055-1058 [doi]
- Bio-Inspired Cryptographic Techniques in Information Management ApplicationsLidia Ogiela, Marek R. Ogiela. 1059-1063 [doi]
- Towards Better Attack Path Visualizations Based on Deep Normalization of Host/Network IDS AlertsAmir Azodi, Feng Cheng 0002, Christoph Meinel. 1064-1071 [doi]
- LinkedPolitics: Incremental Semantic Lifting of Political FactsJulien Tscherrig, Elena Mugellini, Omar Abou Khaled, Philippe Cudré-Mauroux. 1072-1079 [doi]
- Leveraging Co-authorship and Biographical Information for Author Ambiguity Resolution in DBLPHussein Hazimeh 0002, Iman Youness, Jawad Makki, Hassan Noureddine, Julien Tscherrig, Elena Mugellini, Omar Abou Khaled. 1080-1084 [doi]
- Distributed Cooperative Reasoning in Ambient EnvironmentAmina Jarraya, Khedija Arour, Amel Borgi, Amel Bouzeghoub. 1085-1092 [doi]
- Towards a General Architecture for Social Media Data Capture from a Multi-Domain PerspectiveAlessio Bechini, Davide Gazzè, Andrea Marchetti, Maurizio Tesconi. 1093-1100 [doi]
- Defining Human Behaviors Using Big Data Analytics in Social Internet of ThingsAwais Ahmad, M. Mazhar Rathore, Anand Paul, Seungmin Rho. 1101-1107 [doi]
- Leveraging Structural Information in Ontology MatchingCheng Xie, Melisachew Wudage Chekol, Blerina Spahiu, Hongming Cai. 1108-1115 [doi]
- Ontology-Based Information Extraction for Knowledge Enrichment and ValidationDhomas Hatta Fudholi, J. Wenny Rahayu, Eric Pardede. 1116-1123 [doi]
- An Ontology Driven Model Approach for the Creation and Evaluation of Models in the Electricity Retail Market: A Research in ProgressGeovanny Poveda, René Schumann. 1124-1129 [doi]
- An Ontology Based Approach for Satisfying User Requests in Context Aware SettingsSujata Swain, Rajdeep Niyogi. 1130-1137 [doi]
- A Blocking Scheme for Entity Resolution in the Semantic WebGustavo de Assis Costa, José Maria Parente de Oliveira. 1138-1145 [doi]
- Towards Peer-to-Peer Solution for Utilization of Volunteer Resources to Provide Computation-as-a-ServiceShashwati Banerjea, Mayank Pandey, M. M. Gore. 1146-1153 [doi]
- Ant Colony Optimization Based Energy Management Controller for Smart GridSahar Rahim, zafar iqbal, Nusrat Shaheen, Zahoor Ali Khan, Umar Qasim, Shahid Ahmed Khan, Nadeem Javaid. 1154-1159 [doi]
- Reduction of Unnecessarily Ordered Event Messages in Peer-to-Peer Model of Topic-Based Publish/Subscribe SystemsHiroki Nakayama, Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa. 1160-1167 [doi]
- A Fuzzy-Based Reliability System for JXTA-Overlay P2P Platform Considering as New Parameter Sustained Communication TimeYi Liu, Shinji Sakamoto, Evjola Spaho, Keita Matsuo, Leonard Barolli, Fatos Xhafa. 1168-1175 [doi]
- Trustworthy P2P Data Delivery for Moving Objects in Wireless Ad-Hoc NetworksAgustinus Borgy Waluyo, David Taniar, Bala Srinivasan, J. Wenny Rahayu. 1176-1183 [doi]
- On Utilizing Static Courier Nodes to Achieve Energy Efficiency with Depth Based Routing for Underwater Wireless Sensor NetworksZia-ur Rahman, Zaheer Ahmad, Amir Murad, Tanveer Khan, Zahoor Ali Khan, Umar Qasim, Nadeem Javaid. 1184-1191 [doi]