Abstract is missing.
- A Fuzzy Search Based Joint Dual Mobile Service Discovery and Exposure ModelWalid El Ayeb, Zièd Choukair. 1-6 [doi]
- A Neural Network Based User Identification for Tor Networks: Data Analysis Using Friedman TestTaro Ishitaki, Tetsuya Oda, Leonard Barolli. 7-13 [doi]
- Effect of Angle Incidence on the Accuracy of Indoor Prediction Model Based on Neural NetworkM. Ayadi. 14-17 [doi]
- Comparison between Classifier's Accuracies Based on Different Outlier Methods Generated by Frequent and Infrequent Categorical DataB. Raveendra Babu, Lakshmi Sreenivasa Reddy D.. 18-23 [doi]
- Cost and Load Reduction Using Heuristic Algorithms in Smart Gridzafar iqbal, Nadeem Javaid, Mobushir Riaz Khan, Imran Ahmed, Zahoor Ali Khan, Umar Qasim. 24-30 [doi]
- A Novel Approach to Geocaching Event Prognosis Using Spatiotemporal DataTomasz Hachaj, Pawel S. Hachaj, Marek R. Ogiela. 31-34 [doi]
- A GPU-Parallel Algorithm for ECG Signal Denoising Based on the NLM MethodSalvatore Cuomo, Pasquale De Michele, Ardelio Galletti, Livia Marcellino. 35-39 [doi]
- Automatic Design Space Exploration of Approximate Algorithms for Big Data ApplicationsMario Barbareschi, Federico Iannucci, Antonino Mazzeo. 40-45 [doi]
- Automatic Cloud Services Composition for Big Data ManagementFlora Amato, Francesco Moscato. 46-51 [doi]
- A Logic Framework for C2C Network ManagementWalter Balzano, Maria Rosaria Del Sorbo, Silvia Stranieri. 52-57 [doi]
- M-DGPS: An Algorithm for the Post-Processing of Geodetic Tracks Based on Multiple DGPSWalter Balzano, Maria Rosaria Del Sorbo, Aniello Murano. 58-63 [doi]
- Unsupervised SPITters Detection Scheme for Unbalanced CallersKentaroh Toyoda, Mirang Park, Naonobu Okazaki. 64-68 [doi]
- Challenges in Detecting Epidemic Outbreaks from Social NetworksSara Romano, Sergio Di Martino, Nattiya Kanhabua, Antonino Mazzeo, Wolfgang Nejdl. 69-74 [doi]
- WiFACT - Wireless Fingerprinting Automated Continuous TrainingWalter Balzano, Aniello Murano, Fabio Vitale. 75-80 [doi]
- Modelling Multimedia Social Network for Topic RankingFlora Amato, Vincenzo Moscato, Antonio Picariello, Giancarlo Sperlì. 81-86 [doi]
- Implementing Hardware Decision Tree Prediction: A Scalable ApproachMario Barbareschi. 87-92 [doi]
- Characterizing Cloud Federation in IoTAntonio Celesti, Maria Fazio, Maurizio Giacobbe, Antonio Puliafito, Massimo Villari. 93-98 [doi]
- An Architecture for Service Deployed in the Cloud EnvironmentAmel Haji, Asma Ben Letaifa, Sami Tabbane. 99-102 [doi]
- CoSSMic Smart Grid Migration in Federated CloudsAlba Amato, Rocco Aversa, Massimo Ficco, Salvatore Venticinque. 103-108 [doi]
- Towards Data Interoperability: Turning Domain Specific Knowledge to Agnostic across the Data LifecycleAthanasios Kiourtis, Argyro Mavrogiorgou, Dimosthenis Kyriazis, Ilias Maglogiannis, Marinos Themistocleous. 109-114 [doi]
- Design of an Agent Based Monitoring Framework for Federated CloudsRocco Aversa, Luca Tasquier. 115-120 [doi]
- From Business Process Models to Cloud Deployment: A Semantic ApproachBeniamino Di Martino, Antonio Esposito, Giuseppina Cretella. 121-126 [doi]
- Information Modelling and Semantic Linking for a Software Workbench for Interactive, Time Critical and Self-Adaptive Cloud ApplicationsPaul Martin 0002, Arie Taal, Francisco Quevedo, David H. Rogers, Kieran Evans, Andrew Jones, Vlado Stankovski, Salman Taherizadeh, Jernej Trnkoczy, George Suciu, Zhiming Zhao. 127-132 [doi]
- A Semantic System for Diagnoses Suggestion and Clinical Record ManagementFlora Amato, Giovanni Cozzolino, Antonino Mazzeo, Sara Romano. 133-138 [doi]
- A Comparison of Private Cloud SystemsCristian Chilipirea, Ghita Laurentiu, Mirona Popescu, Sorin Radoveneanu, Vladimir Cernov, Ciprian Dobre. 139-143 [doi]
- Unattended Deployment of Enabling Platforms for Cloud-Based ApplicationsSilviu Panica, Dana Petcu. 144-149 [doi]
- Transactional Processing for Polyglot PersistenceRicardo Jiménez-Peris, Marta Patiño-Martínez, Ivan Brondino, Valerio Vianello. 150-152 [doi]
- Cloud for Europe: The Experience of a TendererAntonella Longo, Marco Zappatore, Mario A. Bochicchio, Barbara Livieri, Nicola Guarino, Daniele Napoleone. 153-158 [doi]
- Cloudifier: An Ecosystem for the Migration of Distributed Applications to the CloudUmberto Villano, Stefano Cagnoni, Maria Carla Calzarossa, Antonella Di Stefano, Beniamino Di Martino. 159-164 [doi]
- Flexible Federation of Cloud Providers: The EUBrazil Cloud Connect ApproachFrancisco Vilar Brasileiro, José Luis Vivas, Giovanni Farias da Silva, Daniele Lezzi, Carlos Diaz, Rosa M. Badia, Miguel Caballer, Ignacio Blanquer. 165-170 [doi]
- Socio-Cultural Adaptation Approach to Enhance Intercultural Collaboration and LearningFadoua Ouamani, Narjès Bellamine-Ben Saoud, Henda Hajjami Ben Ghézala. 171-176 [doi]
- Towards the Effective Software Development of an eLearning Platform Featuring Learning Analytics and GamificationDavid Gañán Jimenez, Santi Caballé, Robert Clarisó, Jordi Conesa. 177-182 [doi]
- Scenario Based Dynamic Content Management System for e-Learning EnvironmentKeonsoo Lee, Seungmin Rho, Eenjun Hwang. 183-186 [doi]
- Collect, Scope, and Verify Big Data - A Framework for Institution AccreditationMohammed Hussain, Mohamed Basel Al-Mourad, Sujith Samuel Mathew. 187-192 [doi]
- A Generalized Framework for Multi-party Data Exchange for IoT SystemsJan Sliwa. 193-198 [doi]
- Investigation of Effects of Spoofing Attacks in P2P Online Social NetworksFrancisco de Asís López-Fuentes, Salvador Balleza-Gallegos. 199-203 [doi]
- Real-Time User Experience Evaluation for Cloud-Based Mobile VideoNouha Samet, Asma Ben Letaifa, Mohamed Hamdi, Sami Tabbane. 204-208 [doi]
- Collaborative Cloud Computing Based on P2P NetworksFrancisco de Asís López-Fuentes, Gerardo García-Rodríguez. 209-213 [doi]
- An Empirical Study on Optimal Correlation between Market Share and Concerns on Companies Measured through Search Engine SuggestsTakakazu Imada, Yusuke Inoue, Lei Chen, Syunya Doi, Takehito Utsuro, Yasuhide Kawada. 214-219 [doi]
- Keep It Simple, Fast and Scalable: A Multi-model NoSQL DBMS as an (eb) XML-over-SOAP ServiceAntonio Messina, Pietro Storniolo, Alfonso Urso. 220-225 [doi]
- Protection of Secrets by File Access Control with Common Key Cipher and Message Digests of Program FilesMinoru Ichikawa, Ryuya Uda. 226-231 [doi]
- Effective CAPTCHA with Amodal Completion and Aftereffects by Complementary Colors and Difference of LuminanceRyuya Uda, Tomoka Azakami. 232-237 [doi]
- Data Pipeline for Generation and Recommendation of the IoT Rules Based on Open Text DataInchul Hwang, Munjo Kim, Hyoung Joo Ahn. 238-242 [doi]
- Detecting False Emergency Requests Using Callers' Reporting Behaviors and LocationsMahdi Daghmechi Firoozjaei, Jaewoo Park, Hyoungshick Kim. 243-247 [doi]
- SAN: Self-Adaptive Navigation for Drone Battery Charging in Wireless Drone NetworksJinyong Kim, Jinho Lee, Jaehoon Jeong, Hyoungshick Kim, Jung Soo Park, Taeho Kim. 248-251 [doi]
- CASD: A Framework of Context-Awareness Safety Driving in Vehicular NetworksYiwen Shen, Jaehoon Jeong, Tae Oh, Sang Hyuk Son. 252-257 [doi]
- DCMAC: Data-Oriented Cluster-Based Media Access Control Protocol for Vehicular NetworksJinho Lee, Jaehoon Jeong, Tae Oh, Junghyun Jun, Sang Hyuk Son. 258-261 [doi]
- RPA: Road-Side Units Placement Algorithm for Multihop Data Delivery in Vehicular NetworksYounghwa Jo, Jaehoon Jeong. 262-266 [doi]
- Balancing Delays and Energy Consumption in IPS-Enabled NetworksAlessio Merlo, Mauro Migliardi, Elena Spadacini. 267-272 [doi]
- AHP and Soft Computing for Energy-Aware Decision-MakingLuigi Benedicenti. 273-275 [doi]
- Identifying Energy-Deprivation in Wireless Sensor NetworksSherenaz W. Al-Haj Baddar. 276-279 [doi]
- Interoperable Access Control by Means of a Semantic ApproachChristian Esposito, Aniello Castiglione, Francesco Palmieri. 280-285 [doi]
- Protocols for Energy-Efficiently Broadcasting Messages in Wireless NetworksMiyu Sugino, Shigenari Nakamura, Tomoya Enokido, Makoto Takizawa. 286-293 [doi]
- A Scalable Group Communication Protocol in Heterogeneous NetworksHiroaki Honda, Shigenari Nakamura, Hiroki Nakayama, Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa. 294-299 [doi]
- Analytical Modelling and Performability Evaluation of LTE as Dominant Connectivity Technology for Internet of ThingsYonal Kiral, Yoney Kirsal-Ever. 300-305 [doi]
- Algorithms for Services with Multiple Levels of QualityAlfredo Navarra, Pietro Palazzo, Cristina M. Pinotti, Leonardo Mostarda. 306-311 [doi]
- A Data Acquisition and Document Oriented Storage Methodology for ANT+ Protocol Sensors in Real-Time WebNadeem Qaisar Mehmood, Rosario Culmone. 312-318 [doi]
- Towards a Uniform Ontology-Driven Approach for Modeling, Checking and Executing WSANsClaudia Vannucchi, Diletta Romana Cacciagrano, Rosario Culmone, Leonardo Mostarda. 319-324 [doi]
- OverUDP: Tunneling Transport Layer Protocols in UDP for P2P Application of IPv4Maziar Janbeglou, Nevil Brownlee. 325-330 [doi]
- Distributed Computation and Maintenance of a Spanning Tree in Dynamic Networks by Mobile AgentsMouna Ktari, Mohamed Amine Haddar, Mohamed Mosbah, Ahmed Hadj Kacem. 331-336 [doi]
- Latency and Routing Efficiency Based Metric for Performance Comparison of DHT Overlay NetworksNitin Varyani, Nikhil S., Virendra S. Shekhawat. 337-342 [doi]
- Enhanced Single Chain-Based Scheme in Cylindrical Underwater Wireless Sensor NetworksMuhammad Zain-ul-Abidin, Muhammad Awais Khan, Nadeem Javaid, Malik Khizar, Zahoor Ali Khan, Umar Qasim. 343-348 [doi]
- Relay Assisted Adaptive MIMO Communication Using STBC, VBLAST, MLSTBC and HYBRID-STBC-VBLAST for MACM. M. Kamruzzaman, Meng Wang, Wenqi He, Xiang Peng. 349-354 [doi]
- A Combining Classifiers Approach for Detecting Email SpamsShrawan Kumar Trivedi, Shubhamoy Dey. 355-360 [doi]
- State Recovering Attack Against QuaviumShiyong Zhang, Gongliang Chen, Jianhua Li. 361-364 [doi]
- K-Word Proximity Search on Encrypted DataMark Gall, Gerd Brost. 365-372 [doi]
- Security and Privacy for Real Time Video Streaming Using Hierarchical Inner Product Encryption Based Publish-Subscribe ArchitectureM. A. Rajan, Ashley Varghese, N. Narendra, Meena Singh, V. L. Shivraj, M. Girish Chandra, P. Balamuralidhar. 373-380 [doi]
- Integrate Hacking Technique into Information Assurance EducationJianhua Yang, Yien Wang, Thomas Reddington. 381-387 [doi]
- Neighbor Discovery Schedule for 6LoWPAN Smart Grid ApplicationsInes Hosni, Noureddine Hamdi. 388-393 [doi]
- Maintaining Coverage of Multiple Interest Points for Wireless Sensor Networks on Water SurfaceRyo Katsuma, Hirotaka Ueno. 394-399 [doi]
- Regional Indexing Approach for Mobile ObjectsSultan Alamri. 400-403 [doi]
- Migration Method for Seamless Service in Cloud Computing: Survey and Research ChallengesA.-Young Son, Eui-nam Huh. 404-409 [doi]
- Edge Data ProcessingIchiro Satoh. 410-415 [doi]
- Automatic Migration and Deployment of Cloud Services for Healthcare Application Development in FIWAREStelios Sotiriadis, Lenos Vakanas, Euripides G. M. Petrakis, Paolo Zampognaro, Nik Bessis. 416-419 [doi]
- Large-Sample Comparison of TCP Congestion Control Mechanisms over Wireless NetworksKevin Ong, David Murray, Tanya J. McGill. 420-426 [doi]
- The Effect of the Nonlinear Distortion on OFDM Based Cognitive Radio Systems over Rayleigh Fading ChannelHanen Lajnef, Maha Cherif Dakhli, Moez Hizem, Ridha Bouallegue. 427-430 [doi]
- QCN Performance Evaluation for Nicast Traffic TransmissionHela Mliki, Lamia Chaari, Lotfi Kamoun. 431-438 [doi]
- A Quick Convergence Active Constellation Extension Projection onto Convex Sets Algorithm for Reducing the PAPR of OFDM SystemMounira Laabidi, Rafik Zayani, Ridha Bouallegue. 439-443 [doi]
- Downlink Beamforming and Power Allocation in Cognitive Radio Network with Outdated and Limited Feedback of Channel EstimatesImen Turki, Inès Kammoun, Mohamed Siala. 444-449 [doi]
- Path Loss Characteristics for Wireless Communication System in Rotating Electrical MachineS. Ben Brahim, R. Bouallegue, J. David, T. H. Vuong. 450-454 [doi]
- Selecting Web Search Results of Diverse Contents with Search Engine Suggests and a Topic ModelYusuke Inoue, Takakazu Imada, Syunya Doi, Lei Chen, Takehito Utsuro, Yasuhide Kawada. 455-460 [doi]
- PseudoHandWriting: New Approach for Oral Presentation to have Both Advantages of Slide and HandwritingTakenobu Kazuma, Erika Yoshida, Yan Yu, Aiguo He. 461-465 [doi]
- A Novel Context-Based Risk Assessment Approach in Vehicular NetworksFarhan Ahmad, Asma Adnane. 466-474 [doi]
- A Fault-Tolerant Handshake Algorithm for Local ComputationsAllyx Fontaine, Mohamed Mosbah, Mohamed Tounsi, Akka Zemmari. 475-480 [doi]
- SOCP Approximation Based Resource Allocation in Shared Spectrum Access CommunicationsMirza Golam Kibria, Kentaro Ishizu, Fumihide Kojima, Hiroyuki Yano. 481-486 [doi]
- An Efficient of Secure Mobile Phone Application for Multiple Bill PaymentsPensri Pukkasenunk, Suphat Sukkasem. 487-492 [doi]
- Modification of Dijkstra Proximity Matrix for Diffraction and Reflection RaysKazunori Uchida, Leonard Barolli. 493-498 [doi]
- A QoS-Aware Admission Control System for WLAN Using Fuzzy LogicTakaaki Inaba, Shinji Sakamoto, Tetsuya Oda, Makoto Ikeda, Leonard Barolli. 499-505 [doi]
- Voice over LTE Standards: Solutions and QoS Control Parameters in High Mobile EnvironmentsAida Zaier, Emna Hajlaoui, Ridha Bouallegue. 506-511 [doi]
- Interference Analysis of Asynchronous OFDM/FBMC Based Cognitive Radio TransceiversSonia Ben Aissa, Moez Hizem, Ridha Bouallegue. 512-517 [doi]
- A Framework for Disseminating Trusted Safety Message in V2V CommunicationHanaa S. Basheer, Carole Bassil, Bilal Chebaro. 518-525 [doi]
- An Energy Efficient Hybrid Clustering Routing Protocol for Underwater WSNsMudassir Ejaz, Nadeem Javaid, Hammad Maqsood, Usman Shakeel, Zahoor Ali Khan, Umar Qasim. 526-532 [doi]
- A Variable Speed Limit (VSL) Based Model for Advanced Traffic Management through VANETsAjay Vikram Singh, Jas Singh Bhasin. 533-538 [doi]
- Efficient "MultiKG" Routing Protocol Based on Multi-Hop TransmissionRabiaa Elkamel, Noura Baccar, Adnane Cherif, Bouallague Ridha. 539-544 [doi]
- DASITS: Driver Assistance System in Intelligent Transport SystemJetendra Joshi, Anshumali Singh, Lakshya Gourav Moitra, Manash Jyoti Deka. 545-550 [doi]
- Dual Sink Efficient Balanced Energy Technique for Underwater Acoustic Sensor NetworksMuhammad Awais Khan, Nadeem Javaid, Abdul Majid, Muhammad Abdullah Imran, Mohammed Alnuem. 551-556 [doi]
- Greedy Zone Routing: Robust and Scalable Routing in Wireless Ad-hoc NetworksKasun Samarasinghe, Ricardo Wehbe, Pierre Leone. 557-564 [doi]
- Performance Analysis of a Wireless Sensor Network for Seism Reporting in an Overlay Cognitive Radio SystemHassel Aurora Alcalá Garrido, Mario E. Rivero-Angeles, Izlian Yolanda Orea-Flores. 565-570 [doi]
- Increased Throughput DB-EBH Protocol in Underwater Wireless Sensor NetworksSyed Zarar, Nadeem Javaid, Syed Muhammad Zaki, Mudassir Ejaz, Zahoor Ali Khan, Umar Qasim, Sheraz Hussain. 571-576 [doi]
- Improving Reliability of Cluster Nodes in MANETs: A Fuzzy-Based ApproachMirjeta Alinci, Takaaki Inaba, Donald Elmazi, Evjola Spaho, Vladi Kolici, Leonard Barolli. 577-584 [doi]
- Key Management for Secure Demand Data Communication in Constrained Micro-GridsAnne V. D. M. Kayem, Heinrich Strauss, Stephen D. Wolthusen, Christoph Meinel. 585-590 [doi]
- Conceptual Model for Security in Next Generation NetworkMasoud Hayeri Khyavi, Mina Rahimi. 591-595 [doi]
- Graphical Passwords - A DiscussionAnne V. D. M. Kayem. 596-600 [doi]
- Privacy Violations in Constrained Micro-Grids: Adversarial CasesPacome L. Ambassa, Anne V. D. M. Kayem, Stephen D. Wolthusen, Christoph Meinel. 601-606 [doi]
- Bringing Your Data Everywhere in the Internet of (Every) Thing: A Legal Reading of the New Right to PortabilityCamilla Bistolfi, Lucio Scudiero. 607-610 [doi]
- Internet of Things, Crowdsourcing and Systemic Risk Management for Smart Cities and Nations: Initial insight from IoT Lab European Research projectSébastien Ziegler, José D. P. Rolim, Sotiris Nikoletsea. 611-616 [doi]
- Consent, Risk and Compliance: Technologies and ProcessesDavid Lund, George Mourikas, Bassem Ammar, Abubakr Magzoub, Noel Catterall. 617-621 [doi]
- Towards a Global IPv6 Addressing Model for the Internet of ThingsSébastien Ziegler, Latif Ladid. 622-627 [doi]
- Cloudlet Softwarization for Pervasive HealthcareAymen El Amraoui, Kaouthar Sethom. 628-632 [doi]
- An Implementation of Visualization System for Vehicles and PedestriansAkio Koyama, Daisuke Inoue, Shuji Shoji. 633-637 [doi]
- Performance Evaluations of LXC Based Educational Cloud in Amazon EC2Minoru Uehara. 638-643 [doi]
- Small-World Architecture for Parallel ProcessorsHideki Mori, Minoru Uehara. 644-648 [doi]
- Proposal of Vehicle-to-Vehicle Based Delay Tolerant Networks with Adaptive Aray Antenna Control SystemsNoriki Uchida, Kazuo Takahata, Yoshitaka Shibata, Norio Shiratori. 649-654 [doi]
- A Resilient Network and Information Management System for Large Scale DisasterYoshitaka Shibata, Noriki Uchida, Norio Shiratori. 655-660 [doi]
- Mobile Cloud Computing by In-vehicle Servers Based on Delay Tolerant Network ProtocolMasaki Otomo, Noriki Uchida, Yoshitaka Shibata. 661-666 [doi]
- Improvement of Autonomous Anti-disaster Base Station by Combination of Satellite and Wireless NetworksHiroaki Yuze, Shinichi Nabeta, Yuji Ito, Hiroshi Kosaka, Yoshitaka Shibata. 667-672 [doi]
- Proposal of a Common Infrastructure System for Real-Time Disaster Information TransmissionKazuhiro Takahagi, Tomoyuki Ishida, Noriki Uchida, Yoshitaka Shibata. 673-676 [doi]
- Optimizing Media Quality Parameters to Reduce Energy Consumption for Emergency Communication ServicesKen Nishimura, Kaoru Sugita, Tomoyuki Ishida. 677-680 [doi]
- Extending Network Coverage by Using Static and Mobile Relays during Natural DisastersMichal Król, Yusheng Ji, Shigeki Yamada, Cristian Borcea, Lei Zhong, Kiyoshi Takano. 681-686 [doi]
- Big Data Based Service Area Estimation for Mobile Communications during Natural DisastersLei Zhong, Kiyoshi Takano, Yusheng Ji, Shigeki Yamada. 687-692 [doi]
- Toward a Forensic Analysis of Voting SystemsSuzanne Mello-Stark, Edmund A. Lamagna. 693-700 [doi]
- Analysis of Software Developer Activity on a Distributed Version Control SystemShu Li, Hayato Tsukiji, Kosuke Takano. 701-707 [doi]
- Big Data Analytics for Classification of Network Enabled DevicesDeepali Arora, Kin Fun Li, Alex Loffler. 708-713 [doi]
- Design of an Ambient Intelligence Testbed for Improving Quality of LifeRyoichiro Obukata, Tetsuya Oda, Leonard Barolli. 714-719 [doi]
- Design of an IoT-Based E-learning TestbedMasafumi Yamada, Tetsuya Oda, Keita Matsuo, Leonard Barolli. 720-724 [doi]
- QoE-Driven Service Optimization Aware of the Business ModelDiego Rivera, Ana R. Cavalli. 725-730 [doi]
- Traffic Profiling: Evaluating Stability in Multi-device User EnvironmentsTaimur Bakhshi, Bogdan V. Ghita. 731-736 [doi]
- Ads Network Monitoring Integrating Realistic Urban Mobility PatternsThi Hien Le, Stephane Maag. 737-742 [doi]
- Forward Experiments on the Test Cases Dependencies Architecture: A Use Case TrialAlberto Marroquin, Diego Calderon, Manuel Hernandez. 743-747 [doi]
- QoS/QoE-CAODV: Routing Protocol for Cognitive Radio Ad-Hoc NetworkYosra Mallat, Mohamed Ayadi, Aymen Ayari, Sami Tabbane. 748-753 [doi]
- Troubleshooting Wireless Home Networks Using a Portable TestbedEnri Dalipi, Vincent Sercu, Pieter Becue, Bart Jooris, Ingrid Moerman, Jeroen Hoebeke. 754-759 [doi]
- From Modeling with SysML to Simulation with Contiki Cooja Simulator of Wireless Sensor NetworksNesrine Ammar, Hela Chaieb, Ridha Bouallegue. 760-765 [doi]
- Evaluation of Power Control Mechanism on OLSR Routing ProtocolChristos Bouras, Vaggelis Kapoulas, Kostas Stamos, Nikos Stathopoulos. 766-771 [doi]
- Evaluation of the Energy Consumption and the Packet Loss in WSNs Using Deterministic Stochastic Petri NetsAmel Berrachedi, Malika Boukala-Ioualalen. 772-777 [doi]
- Distributed Query Results and IoT Data in a Publish-Subscribe Network Implementing User NotificationsDiego Sánchez de Rivera, Ramón Alcarria, Diego Martín de Andrés, Álvaro Sánchez-Picot, Borja Bordel Sanchez, Tomás Robles. 778-783 [doi]
- Modeling and Simulation of Interactions Among People and Devices in Ambient Intelligence EnvironmentsÁlvaro Sánchez-Picot, Diego Martín de Andrés, Diego Sánchez de Rivera, Borja Bordel Sanchez, Tomás Robles. 784-789 [doi]
- Smart Spaces for On-line Tailor-Made Production of ClothesPetra Perner. 790-795 [doi]
- Connected Smart Cities: Interoperability with SEG 3.0 for the Internet of ThingsAmelie Gyrard, Martin Serrano. 796-802 [doi]
- SOFT-IoT: Self-Organizing FOG of ThingsCássio V. S. Prazeres, Martin Serrano. 803-808 [doi]
- Mobility Support for the Routing Protocol in Low Power and Lossy NetworksHanane Lamaazi, Nabil Benamar, Muhammad I. Imaduddin, Adib Habbal, Antonio J. Jara. 809-814 [doi]
- Off-the-Shelf Embedded Middleware Solution for UAVs HW-SW Platform DevelopmentJesús Barba, Felix Jesús Villanueva, M. J. Abaldea, D. Villa, Óscar Aceña, J. Carlos Lopez. 815-820 [doi]
- Heating and Hot Water Industrial Prediction System for Residential DistrictLuc Dufour, Dominique Genoud, Bruno Ladevie, Jean Jacques Bezian. 821-826 [doi]
- Economic Interest of Heating and Hot Water Prediction System for Residential DistrictLuc Dufour, Dominique Genoud, Bruno Ladevie, Jean Jacques Bezian, Francesco Cimmino, Stephane Genoud. 827-832 [doi]
- Improving the Locating Precision of an Active WIFI RFID System to Obtain Traceability of Patients in a HospitalMaría Martínez Pérez, Guillermo Vázquez González, José Ramon Vizoso Hermida, Isabel Martín Herranz, Carlos Dafonte. 833-837 [doi]
- Security Identifier Randomization: A Method to Prevent Kernel Privilege-Escalation AttacksLifeng Wei, Yudan Zuo, Yan Ding, Pan Dong, Chenlin Huang, Yuanming Gao. 838-842 [doi]
- IaaS Platforms: How Secure are They?Irina Astrova, Arne Koschel, Mats Lennart Henke. 843-848 [doi]
- A Host and Network Based Intrusion Detection for Android SmartphonesKanishka Ariyapala, Hoang Giang Do, Huynh Ngoc Anh, Wee Keong Ng, Mauro Conti. 849-854 [doi]
- Analysis of Intrusion Detection and Prevention Systems as Queueing ServicesSergey Zapechnikov, Natalia G. Miloslavskaya, Alexander I. Tolstoy. 855-860 [doi]
- L2OVX: An On-demand VPLS Service with Software-Defined NetworksJen-Wei Hu, Chu-Sing Yang, Te-Lung Liu. 861-866 [doi]
- A Quality Assurance Approach and Case Study in BSSTeh-Sheng Huang, Chia-Yen Chan, Jeu-Yih Jeng. 867-871 [doi]
- A Cache Management Method for Simultaneous Downloading from Multiple Receivers for Content Centric NetworkingKyouhei Sasano, Masaki Bandai, Miki Yamamoto. 872-877 [doi]
- A Visible Light Communication Positioning Mechanism in Industrial Logistics ManagementShih-Hao Chang, Chi-Yi Lin. 878-882 [doi]
- Contextual Source Selection for Federated Search in Mobile EnvironmentBenachour Hamid, Kechid Samir. 883-888 [doi]
- Detect DoS Attack Using MrDR Method in Merging Two MANETsAlbandari Alsumayt, John Haggerty, Ahmad Lotfi. 889-895 [doi]
- The Application of Web Services for Real Time Charging in Mobile NetworksFarouk Gaffoor, Bobby L. Tait. 896-901 [doi]
- Adaptable Dense Representation with Collaborative Representation Classification for Face Recognition Using Low-Rank Matrices RecoveryDeng-Yuan Huang, Ching-Ning Huang, Wu-Chih Hu. 902-907 [doi]
- Lightweight Topological-Based Map Matching for Indoor NavigationJi-Han Jiang, Hoang-Long Le, Shih-Chieh Shie. 908-913 [doi]
- Human Action Recognition Based on Action Forests Model Using Kinect CameraChi-Hung Chuang, Ying-Nong Chen, Kuo-Chin Fan. 914-917 [doi]
- A Computer-Aided Grading System of Breast Carcinoma: Scoring of Tubule FormationChien-Chuan Ko, Chi-Yang Cheng, Chun-Hung Lin. 918-923 [doi]
- Selecting the Universal Features for Breast Lumps with Different Acquisition Parameter SettingsChuan-Yu Chang, Mao-Cheng Chen, Shao-Jer Chen. 924-927 [doi]
- Geological Segmentation on UAV Aerial Image Using Shape-Based LSM with Dominant ColorChieh-Ling Huang, Jwu-Jenq Chen, Ching-Ju Chen, Yung-Gi Wu. 928-933 [doi]
- The Development and Implementation of a Real-Time Depth Image Capturing System Using SoC FPGAChien-Chung Wu, Kai-Wen Weng. 934-938 [doi]
- An Efficient Quadtree-Based Block Truncation Coding for Digital Image CompressionFu-Jhong Yang, Chih-Yuan Lien, Pei-Yin Chen, Chih-Ling Hsu. 939-942 [doi]
- A Fast Linear-Prediction Fractional-Pixel Search AlgorithmLung-Jen Wang, Wen-Ming Tai. 943-948 [doi]
- Adaptive Carrier Frequency Offset and Channel Estimation for MIMO-OFDM SystemsChang-Yi Yang, Yu-Li Chen, Hai-Yan Song. 949-954 [doi]
- Using Prefix Tree to Improve the Performance of Chinese Sentiment AnalysisYi-Jen Su, Rung Ching Chen, Chin-Min Hsiung, Yue-Qun Chen, Shuo-Wen Yu, Huang-Wei Huang. 955-959 [doi]
- Analysis of the Queue Service Probability for the EDF Scheduling AlgorithmMu-Song Chen, Chi-Pan Hwang, Hsuan-Fu Wang. 960-963 [doi]
- Performance Evaluation of Call Center Agents by Neural NetworksHui-Huang Hsu, Te-Chan Chen, Wei-Tsung Chan, Jung-Kuei Chang. 964-968 [doi]
- A PTC Scheme for Internet of Things: Private-Trust-ConfidentialityChih-Hsueh Lin, Wen-Shyong Hsieh, Fu Mo, Ming-Hao Chang. 969-974 [doi]
- Development of Car Cloud Sensor Network Application PlatformChi-Pan Hwang, Mu-Song Chen, Hsuan-Fu Wang. 975-978 [doi]