Abstract is missing.
- On the Path Management of Multi-path TCP in Internet Scenarios Based on the NorNet TestbedKun Wang, Thomas Dreibholz, Xing Zhou, Fu Fa, Yuyin Tan, Xi Cheng, Qining Tan. 1-8 [doi]
- The Performance Impact of Buffer Sizes for Multi-path TCP in Internet SetupsFeng Zhou, Thomas Dreibholz, Xing Zhou, Fa Fu, Yuyin Tan, Quan Gan. 9-16 [doi]
- On the Feasibility of Implementing TCP Using a Modular ArchitectureMohamed Oulmahdi, Nicolas Van Wambeke, Christophe Chassot, Abdelkamel Tari. 17-22 [doi]
- Performance Evaluation of a New Flexible Time Division Multiplexing Protocol on Mixed Traffic TypesYangyang Song, Yonghao Wang, Peter Bull, Joshua D. Reiss. 23-30 [doi]
- A Downlink Resources Allocation Scheme for Multimedia Applications in OFDMA Wireless SystemsHassen Hamouda, Mohamed Ouwais Kabaou, Mohamed Salim Bouhlel. 31-38 [doi]
- Fair and Efficient Listen Before Talk (LBT) Technique for LTE Licensed Assisted Access (LAA) NetworksVisali Mushunuri, Bighnaraj Panigrahi, Hemant Kumar Rath, Anantha Simha. 39-45 [doi]
- SwapItUp: A Face Swap Application for Privacy ProtectionSachit Mahajan, Ling-Jyh Chen, Tzu-Chieh Tsai. 46-50 [doi]
- A Proposal of Test Code Generation Tool for Java Programming Learning Assistant SystemNobuo Funabiki, Ryota Kusaka, Nobuya Ishihara, Wen-Chung Kao. 51-56 [doi]
- Multi-domain Video over Software-Defined Networking (MDVSDN)Harold Owens II, Arjan Durresi. 57-63 [doi]
- A Proposal of Software Architecture for Java Programming Learning Assistant SystemNobuya Ishihara, Nobuo Funabiki, Minoru Kuribayashi, Wen-Chung Kao. 64-70 [doi]
- Different Worlds Broadcasting: A Distributed Internet Live Broadcasting System with Video and Audio EffectsSatoru Matsumoto, Yoshimasa Ishi, Tomoki Yoshihisa, Tomoya Kawakami, Yuuichi Teranishi. 71-78 [doi]
- An Advertising Reciprocal Platform for MicroenterprisesThi-Thanh-An Nguyen, Chiao-Min Hu, Shyan-Ming Yuan. 79-84 [doi]
- Energy-Aware Virtual Machine Migration Models in a Scalable Cluster of ServersRyo Watanabe, Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa. 85-92 [doi]
- An Approach toward Energy Consumption Optimization in Optical Transport Networks Using GMPLS TechniquesMykola Kaidan, Natalia Kryvinska, Volodymyr Andrushchak, Mykhailo Klymash. 93-98 [doi]
- Differentiating the Starting Time of Computation Process Replicas in the Improved Redundant Delay Time-Based (IRDTB) AlgorithmTomoya Enokido, Makoto Takizawa. 99-106 [doi]
- Energy Efficiency of Cooperative MIMO in Wireless Sensor Networks over Rayleigh Fading ChannelLamia Grira, Ridha Bouallegue. 107-111 [doi]
- Simple and Energy Efficient Image Compression for Pulse-Based Communication in THz BandMuhammad Agus Zainuddin, Eugen Dedu, Julien Bourgeois. 112-119 [doi]
- Multiagent Control System for Residential Energy Management under Real Time Pricing EnvironmentMuhammad Babar Rasheed, Nadeem Javaid, Sardar Mehboob Hussain, Mariam Akbar, Zahoor Ali Khan. 120-125 [doi]
- Gazing Beyond Horizon: The Predict Active Queue Management for Controlling Load TransientsIlpo Järvinen, Markku Kojo. 126-135 [doi]
- Towards an Efficient File Synchronization between Digital SafesMayssa Jemel, Mounira Msahli, Ahmed Serhrouchni. 136-143 [doi]
- Implementation and Evaluation of a Controller-Based Forwarding Scheme for NDNElian Aubry, Thomas Silverston, Isabelle Chrisment. 144-151 [doi]
- Performance Management of Optical Transport Networks through Time Series ForecastingJefferson Rodrigo A. Cavalcante, Ahmed Patel, Joaquim Celestino Jr.. 152-159 [doi]
- IEEE 802.11ac MU-MIMO Wireless LAN Cells with Legacy ClientsMamun I. Abu-Tair, Saleem N. Bhatti. 160-166 [doi]
- Family Structure Attribute Estimation Method for Product Recommendation SystemChiaki Doi, Masaji Katagiri, Takashi Araki, Daizo Ikeda, Hiroshi Shigeno. 167-173 [doi]
- Sensing Activities and Locations of Senior Citizens toward Automatic Daycare Report GenerationYukitoshi Kashimoto, Tatsuya Morita, Manato Fujimoto, Yutaka Arakawa, Hirohiko Suwa, Keiichi Yasumoto. 174-181 [doi]
- Analyzing and Forecasting the Performance of Video Service ProvidersJiali You, Yu Zhuo, Lixin Gao, Guoqiang Zhang, Hanxing Xue, Jinlin Wang. 182-188 [doi]
- Movie Summarization Based on Alignment of Plot and ShotsXueshan Li, Takehito Utsuro, Hiroshi Uehara. 189-196 [doi]
- An Adaptive Videoconferencing Framework for Collaborative TelemedicineRonnie Muthada Pottayya, Jean-Christophe Lapayre, Éric Garcia. 197-204 [doi]
- Dynamic Textures and Covariance Stationary Series Analysis Using Strategic Motion CoherenceKanoksak Wattanachote, Yong Wang, Timothy K. Shih, Hui-Huang Hsu, Wenyin Liu. 205-212 [doi]
- Web Service Flash Crowd Mitigation Using Feedback to UsersHarumasa Tada, Masayuki Murata, Masaki Aida. 213-219 [doi]
- Construction and Maintenance of K-Hop CDS in Mobile Ad Hoc NetworksJiahong Wang, Eiichiro Kodama, Toyoo Takata. 220-227 [doi]
- EDWiN: Leveraging Device-to-Device Communications for Efficient Data Dissemination over Wi-Fi NetworksLyes Hamidouche, Sébastien Monnet, Frederic Bardolle, Pierre Sens, Dimitri Refauvelet. 228-235 [doi]
- Hierarchical Small World Overlay for Efficient Forwarding in Volunteer CloudsFatma Hrizi, Anis Laouiti. 236-243 [doi]
- Middleware Adaptation through Process MiningNelson Rosa. 244-251 [doi]
- Query-Adaptive Online Partitioning of Associated Data for Efficient RetrievalTing Zhang, Duc A. Tran. 252-259 [doi]
- On Full-View Area Coverage by Rotatable Cameras in Wireless Camera Sensor NetworksYang-Pu Hsiao, Kuei-Ping Shih, Yen-Da Chen. 260-265 [doi]
- Maximizing Surveillance Quality for Barrier Coverage in Rechargeable Sensor NetworksZaixiu Dong, Weimin Wen, Guilin Chen, Shenghui Zhao, Chih-Yung Chang. 266-271 [doi]
- A New Routing Protocol for Maximum Coverage in Square Field for Underwater WSNsArslan Zahoor, Nadeem Javaid, Mariam Akbar, Zahoor Ali Khan. 272-277 [doi]
- Selection of Actor Nodes in Opportunistic Networks: A Fuzzy-Based ApproachMiralda Cuka, Donald Elmazi, Kosuke Ozera, Tetsuya Oda, Leonard Barolli. 278-284 [doi]
- A New Flow Network Approach for Improving Clustering Protocols in Wireless Sensor NetworksJose Henrique Brandao Neto, Joaquim Celestino Júnior, Leonardo Sampaio Rocha. 285-291 [doi]
- MEES: Mobile Energy Efficient Square Routing for Underwater Wireless Sensor NetworksAdnan Walayat, Nadeem Javaid, Mariam Akbar, Zahoor Ali Khan. 292-297 [doi]
- Push Typed Tourist Information System Based on Beacon and Augumented Reality TechnologiesGoshi Sato, Go Hirakawa, Yoshitaka Shibata. 298-303 [doi]
- An Efficient Image Gathering Scheme with Quality Control in DisasterJun Nishiyama, Saki Tabata, Hiroshi Shigeno. 304-311 [doi]
- A System to Retrieve Photographs Showing Designated PointsYuki Taniyama, Tomoki Yoshihisa, Takahiro Hara, Shojiro Nishio. 312-319 [doi]
- A Method for Personalized C Programming Learning Contents Recommendation to Enhance Traditional InstructionYu Yan, Kohei Hara, Takenobu Kazuma, Aiguo He. 320-327 [doi]
- Image Completion Using Sample SynthesisShwu-Huey Yen, Hsien-Yang Li, Po-Yen Kuo. 328-335 [doi]
- Ariadnima - Android Component Flow Reconstruction and VisualizationDennis Titze, Konrad Weiss, Julian Schütte. 336-341 [doi]
- Multi-leader Election in a Clustered Graph for Distributed Network ControlHideki Shindo, Hideo Kobayashi, Genya Ishigaki, Norihiko Shinomiya. 342-346 [doi]
- On Making Generalized Paxos PracticalTuanir F. Rezende, Pierre Sutra, Rodrigo Q. Saramago, Lásaro J. Camargos. 347-354 [doi]
- Message Dissemination Using Lévy Flight on Unit Disk GraphsKenya Shinki, Masahiko Nishida, Naohiro Hayashibara. 355-362 [doi]
- Performance Evaluation of OS-Level Virtualization Solutions for HPC Purposes on SoC-Based SystemsDavid Beserra, Manuele Kirsch-Pinheiro, Carine Souveyet, Luiz Angelo Steffenel, Edward David Moreno. 363-370 [doi]
- Detecting and Tackling Run-Time Obstacles in Social Business ProcessesZakaria Maamar, Mohamed Sellami, Noura Faci, Sylvain Lefebvre. 371-378 [doi]
- Parallel Search Processing of Tree-Structured Data in a Big Data EnvironmentLingxiao Li, David Taniar, Maria Indrawan-Santiago. 379-386 [doi]
- Supernova and Hypernova Misbehavior Detection Scheme for Opportunistic NetworksSanjay Kumar Dhurandher, Arun Kumar, Isaac Woungang, Mohammad S. Obaidat. 387-391 [doi]
- A Study on Implementation of NDN to WSNTetsuro Kuniyasu, Tetsuya Shigeyasu. 392-398 [doi]
- Providing Collision-Free and Conflict-Free Communication in General Synchronous Broadcast/Receive NetworksAbdelmadjid Bouabdallah, Hicham Lakhlef, Michel Raynal, François Taïani. 399-406 [doi]
- Monitoring Dynamic Mobile Ad-Hoc Networks: A Fully Distributed Hybrid ArchitectureJose Alvarez, Stephane Maag, Fatiha Zaïdi. 407-414 [doi]
- Reducing Energy Consumption in Provisioning of Virtual Sensors by Similarity of Heterogenous SensorsMarcus Lemos, Carlos Giovanni Nunes de Carvalho, Douglas Lopes, Ricardo A. L. Rabelo, Raimir Holanda Filho. 415-422 [doi]
- Acoustic Localization without SynchronizationJongtack Jung, Kangho Kim, Woonghee Lee, Hwangnam Kim. 423-430 [doi]
- Tracking Indoor Activities of Patients with Mild Cognitive Impairment Using Motion SensorsNelson Wai-Hung Tsang, Kam-yiu Lam, Joseph Kee-Yin Ng, Song Han, Ioannis Papavasileiou. 431-438 [doi]
- Continuous dε-Skyline Queries for Objects with Time-Varying Attribute in Road NetworksYuan-Ko Huang. 439-446 [doi]
- Development of a Smart Floor for Target Localization with Bayesian Binary SensingGongjin Lan, Jinhao Liang, Guocheng Liu, Qi Hao. 447-453 [doi]
- Infrastructure Mode Based Opportunistic Networks on Android DevicesAndre Ippisch, Kalman Graffi. 454-461 [doi]
- A GA-Based Simulation System for WMNs: Performance Analysis for Different WMN Architectures Considering Exponential Distribution, HWMP and TCP ProtocolsAdmir Barolli, Tetsuya Oda, Ryoichiro Obukata, Makoto Ikeda, Leonard Barolli, Makoto Takizawa. 462-467 [doi]
- Service Cost in Software Defined Networking (SDN)Murat Karakus, Arjan Durresi. 468-475 [doi]
- Usability of Composing REST Services on SmartphonesGebremariam Mesfin, Tor-Morten Grønli, Gheorghita Ghinea, Muhammad Younas. 476-483 [doi]
- Maestro: An NFV Orchestrator for Wireless Environments Aware of VNF Internal CompositionsAriel Galante Dalla-Costa, Lucas Bondan, Juliano Araujo Wickboldt, Cristiano Bonato Both, Lisandro Zambenedetti Granville. 484-491 [doi]
- Interactive Visualizations for Planning and Strategic Business Decisions in NFV-Enabled NetworksMuriel Figueredo Franco, Ricardo Luis dos Santos, Ricardo Andrade Cava, Eder J. Scheid, Ricardo J. Pfitscher, Carla Maria Dal Sasso Freitas, Lisandro Zambenedetti Granville. 492-499 [doi]
- iMPROVE: Enhancing the Introduction of Services on Programmable Virtual NetworksRicardo Luis dos Santos, Muriel Figueredo Franco, Eder J. Scheid, Ricardo J. Pfitscher, Lisandro Zambenedetti Granville, Liane Margarida Rockenbach Tarouco. 500-507 [doi]
- An Analytical Framework for Throughput Analysis of Real Time Applications in All-IP NetworksShankar K. Ghosh, Sasthi C. Ghosh. 508-515 [doi]
- Residual Size-Based Mobile Data Offloading for File Transmission on Mobile DevicesTsung-Hui Chuang, Pei-Hua Su, Meng-Hsun Tsai. 516-521 [doi]
- Bandwidth Efficient Clock Skew Compensation in TDMA-Based Star Topology Wireless NetworksAshutosh Bhatia, Sudhanshu Singh. 522-529 [doi]
- An Underwater Routing Protocol with Void Detection and Bypassing CapabilitySeyed Mohammad Ghoreyshi, Alireza Shahrabi, Tuleen Boutaleb. 530-537 [doi]
- Saving Resources in Discovery Protocol on Delay-Sensitive Rescue Mobile NetworksJanine Kniess, Luciana Arantes, Pierre Sens, Célio Vinicius N. de Albuquerque. 538-545 [doi]
- Adaptive Load-Balancing Scheme through Wireless SDN-Based Association ControlChia-Ying Lin, Wan-Ping Tsai, Meng-Hsun Tsai, Yun-Zhan Cai. 546-553 [doi]
- A Novel Multi-Step Opportunistic Scheduling Scheme for Streaming Applications over OFDMA Wireless SystemsHassen Hamouda, Mohamed Ouwais Kabaou, Mohamed Salim Bouhlel. 554-561 [doi]
- CODE+: Building Common Ontology from Community KnowledgeDhomas Hatta Fudholi, J. Wenny Rahayu, Eric Pardede. 562-569 [doi]
- Jointly Modeling Multi-grain Aspects and Opinions for Large-Scale Online ReviewYang Zhang, Feilong Tang, Leonard Barolli, Yanqin Yang, Wenchao Xu. 570-577 [doi]
- A Compact-Trie-Based Structure for K-Nearest-Neighbour SearchingPeng Gong, Wendy Osborn. 578-585 [doi]
- Searching Data Cube for Submerging and Emerging CuboidsViet Phan Luong. 586-593 [doi]
- Optimizing Diverse Group Stock Portfolio without Setting a Number of GroupsChun-Hao Chen, Jonathan Coupe, Tzung-Pei Hong. 594-598 [doi]
- Realtime Online Hot Topics Prediction in Sina Weibo for News Earlier ReportSha Yuan, Zhe Tao, Tingshao Zhu, Shuotian Bai. 599-605 [doi]
- Utilization Based Secured Dynamic Scheduling Algorithm for Real-Time Applications on Grid (U-SDSA)Surendra Singh, Sachin Tripathi, Suvadip Batabyal. 606-613 [doi]
- A Distributed Calculation Scheme for Contents CategorizationMasaki Kohana, Hiroki Sakaji, Akio Kobayashi, Shusuke Okamoto. 614-620 [doi]
- CapSearch: Capacity-Based Search in Highly Dynamic Peer-to-Peer NetworksAndreas Disterhöft, Kalman Graffi. 621-630 [doi]
- Evaluation of Protocols to Prevent Illegal Information Flow in Peer-to-Peer Publish/Subscribe SystemsShigenari Nakamura, Lidia Ogiela, Tomoya Enokido, Makoto Takizawa. 631-638 [doi]
- A Fuzzy-Based System for Qualified Voting in P2P Mobile Collaborative Team: Effects of Member Activity FailureYi Liu, Shinji Sakamoto, Leonard Barolli, Makoto Ikeda. 639-645 [doi]
- Combined Power Control and Partially Overlapping Channel Assignment for Interference Mitigation in Dense WLANBabul P. Tewari, Sasthi C. Ghosh. 646-653 [doi]
- SONA: Software Defined Optical Networks Slicing ArchitectureTiago Portela de Souza, Jefferson Rodrigo A. Cavalcante, Ahmed Patel, Maxwell E. Monteiro, Joaquim Celestino Jr.. 654-661 [doi]
- Braided on Demand Multipath RPL in the Mobility ContextFatma Somaa, Inès El Korbi, Leïla Azouz Saïdane. 662-669 [doi]
- EA-PRoPHET: An Energy Aware PRoPHET-Based Routing Protocol for Delay Tolerant NetworksBhed Bahadur Bista, Danda B. Rawat. 670-677 [doi]
- Empowering Drones' Teamwork with Airborne NetworkSeungho Yoo, Jongtack Jung, Albert Yongjoon Chung, Kangho Kim, Jiyeon Lee, Seong Joon Park, Suk-Kyu Lee, Hyung-Kyu Lee, Hwangnam Kim. 678-685 [doi]
- SAMAR - Spectrum Aware token MAc for Cognitive Radio NetworksRamesh Babu Battula, Avinash Reddy Avuthu, S. Venkata Narayana. 686-691 [doi]
- Performance Analysis by WMN-GA Simulation System for Different WMN Architectures Considering Exponential Distribution, Different Transmission Rates and OLSR ProtocolKeita Matsuo, Tetsuya Oda, Ryoichiro Obukata, Masafumi Yamada, Leonard Barolli. 692-696 [doi]
- Implementation of an Intelligent Hybrid Simulation System for Node Placement Problem in WMNs Considering Particle Swarm Optimization and Simulated AnnealingShinji Sakamoto, Ryoichiro Obukata, Tetsuya Oda, Leonard Barolli, Makoto Ikeda. 697-703 [doi]
- Cluster-than-Label: Semi-Supervised Approach for Domain AdaptationSantosh Kumar, Xiaoying Gao, Ian Welch. 704-711 [doi]
- A Reuse-Based Approach to Promote the Adoption of Visualizations for Network Management TasksVinicius Tavares Guimaraes, Oscar Mauricio Caicedo Rendon, Glederson Lessa dos Santos, Guilherme da Cunha Rodrigues, Carla Maria Dal Sasso Freitas, Liane Margarida Rockenbach Tarouco, Lisandro Zambenedetti Granville. 712-719 [doi]
- Refining Visual Activity Recognition with Semantic ReasoningNathan Ramoly, Vincent Vassout, Amel Bouzeghoub, Mounim A. El-Yacoubi, Mossaab Hariz. 720-727 [doi]
- Data Exchange Strategies for Aggregating Geographical Distribution of Demands for Location-Dependent Information Using Soft-State Sketches in VANETsAkihiro Yamada, Susumu Ishihara. 728-736 [doi]
- In-vehicle Cloudlet Computing System for Disaster Information Based on Delay Tolerant Network ProtocolMasaki Otomo, Goshi Sato, Yoshitaka Shibata. 737-742 [doi]
- Performance Evaluation of Delayed ACK Method for Message Suppression in VANETsDaichi Koga, Makoto Ikeda, Leonard Barolli. 743-748 [doi]
- Performance Optimization in Wireless Sensor Networks: A Novel Collaborative Compressed Sensing ApproachMuzammil Behzad, Yao Ge. 749-756 [doi]
- Performance Analysis of Sensor Fusion Models for Brake Pedal in a Brake-by-Wire SystemMinsu Jo, Youngmi Baek, Ki-Dong Kang, Seonghun Lee, Sang Hyuk Son. 757-763 [doi]
- LLR-Based Sentiment Analysis for Kernel Event SequencesRobert Luh, Sebastian Schrittwieser, Stefan Marschalek. 764-771 [doi]
- K-Aggregation: Improving Accuracy for Differential Privacy Synthetic Dataset by Utilizing K-Anonymity AlgorithmBo-Chen Tai, Szu-Chuang Li, Yennun Huang. 772-779 [doi]
- An Efficient Blacklistable Anonymous Credentials without TTPs Using Pairing-Based AccumulatorYuu Aikou, Shahidatul Sadiah, Toru Nakanishi 0001. 780-786 [doi]
- Malicious Apps May Explore a Smartphone's Vulnerability to Detect One's ActivitiesXi Lu, Shou-Hsuan Stephen Huang. 787-794 [doi]
- Fully Secure Lattice-Based Group Signatures with Verifier-Local RevocationM. Nisansala, S. Perera, Takeshi Koshiba. 795-802 [doi]
- A Proposal of a Secure P2P-Type Storage Scheme by Using the Secret Sharing and the BlockchainMasayuki Fukumitsu, Shingo Hasegawa, Jun-ya Iwazaki, Masao Sakai, Daiki Takahashi. 803-810 [doi]
- Secure Deduplication in a Multiple Group Signature SettingEi Mon Cho, Takeshi Koshiba. 811-818 [doi]
- Smart Partitioning Mechanism for Dealing with Intermediate Data Skew in Reduce Task on Cloud ComputingTzu-Chi Huang, Kuo-Chih Chu, Guo-Hao Huang, Yan-Chen Shen, Ce-Kuen Shieh. 819-826 [doi]
- Scheduling of Parallel Migration for Multiple Virtual MachinesKoichi Onoue, Satoshi Imai, Naoki Matsuoka. 827-834 [doi]
- Scheduling-Aware Data Prefetching for Data Processing Services in CloudChien-Hung Chen, Ting-Yuan Hsia, Yennun Huang, Sy-Yen Kuo. 835-842 [doi]
- Service Scheduling Scheme Based Load Balancing for 5G/HetNets Cloud RANOlfa Chabbouh, Sonia Ben Rejeb, Nazim Agoulmine, Zièd Choukair. 843-849 [doi]
- Quality of Service Scheme for Intra/Inter-Data Center CommunicationsMamun I. Abu-Tair, Md Israfil Biswas, Philip J. Morrow, Sally I. McClean, Bryan W. Scotney, Gerard Parr. 850-856 [doi]
- A Smart Micro-Grid Architecture for Resource Constrained EnvironmentsAnne V. D. M. Kayem, Christoph Meinel, Stephen D. Wolthusen. 857-864 [doi]
- Effect of Node Density on Actor Selection in WSANs: A Comparison Study for Two Fuzzy-Based SystemsDonald Elmazi, Miralda Cuka, Tetsuya Oda, Makoto Ikeda, Leonard Barolli. 865-871 [doi]
- Exploiting Evolving Trust Relationships in the Modelling of Opinion Formation Dynamics in Online Social NetworksRajkumar Das, Joarder Kamruzzaman, Gour C. Karmakar. 872-879 [doi]
- ALPAS: Analog-PIR-Sensor-Based Activity Recognition System in SmarthomeYukitoshi Kashimoto, Masashi Fujiwara, Manato Fujimoto, Hirohiko Suwa, Yutaka Arakawa, Keiichi Yasumoto. 880-885 [doi]
- Information Gain Based Maximum Task Matching in Spatial CrowdsourcingJiantong Zhang, Feilong Tang, Leonard Barolli, Yanqin Yang, Wenchao Xu. 886-893 [doi]
- Fog Computing as a Resource-Aware Enhancement for Vicinal Mobile Mesh Social NetworkingChii Chang, Mohan Liyanage, Sander Soo, Satish Narayana Srirama. 894-901 [doi]
- Performance Analysis of Sorting of FHE Data: Integer-Wise Comparison vs Bit-Wise ComparisonHarika Narumanchi, Dishant Goyal, Nitesh Emmadi, Praveen Gauravaram. 902-908 [doi]
- Enhancing Security Attacks Analysis Using Regularized Machine Learning TechniquesDesta Haileselassie Hagos, Anis Yazidi, Øivind Kure, Paal E. Engelstad. 909-918 [doi]
- Mitigating Use-After-Free Attack with Application Program LoaderTakamichi Saito, Shuta Kondo, Hiroyuki Miyazaki, Wang Bing, Ryohei Watanabe, Ryota Sugawara, Masateru Yokoyama. 919-924 [doi]
- The 12th-Order Differential Attack on the 10-Round Variants of Midori64 Block CipherYusuke Takahashi, Yasutaka Igarashi, Toshinobu Kaneko. 925-930 [doi]
- Towards Continuous Security Certification of Software-as-a-Service Applications Using Web Application Testing TechniquesPhilipp Stephanow, Koosha Khajehmoogahi. 931-938 [doi]
- Securing the Internet of Things: A Worst-Case Analysis of Trade-Off between Query-Anonymity and Communication-CostKadhim Hayawi, Pin-Han Ho, Sujith Samuel Mathew, Limei Peng. 939-946 [doi]
- Time and Bandwidth-Aware Virtual Network Embedding and Migration in Hybrid Optical-Electrical Data CentersLekha Purushothaman, Tram Truong Huu, Mohan Gurusamy. 947-954 [doi]
- Performance Overhead Comparison between Hypervisor and Container Based VirtualizationZheng Li, Maria Kihl, Qinghua Lu, Jens A. Andersson. 955-962 [doi]
- Cost Efficient Batch Processing in Amazon Cloud with Deadline AwarenessKabin Tamrakar, Anis Yazidi, Hårek Haugerud. 963-971 [doi]
- Car Pooling Based on Trajectories of Drivers and Requirements of PassengersFu-Shiung Hsieh. 972-978 [doi]
- Implementation of Lambda Architecture: A Restaurant Recommender System over Apache MesosChung-Ho Lee, Chi-Yi Lin. 979-985 [doi]
- A Process Model to Support Continuous Certification of Cloud ServicesImmanuel Kunz, Philipp Stephanow. 986-993 [doi]
- Engineering Democratization in Internet of Things Data AnalyticsEvangelos Pournaras, Jovan Nikolic, Alex Omerzel, Dirk Helbing. 994-1003 [doi]
- Sensing and Mining Urban Qualities in Smart CitiesDanielle Griego, Varin Buff, Eric Hayoz, Izabela Moise, Evangelos Pournaras. 1004-1011 [doi]
- Mining Opinion Leaders in Big Social NetworkYi-Cheng Chen, Yi-Hsiang Chen, Chia-Hao Hsu, Hao-Jun You, Jianquan Liu, Xin Huang. 1012-1018 [doi]
- Performance Evaluation of Mahout Clustering Algorithms Using a Twitter Streaming DatasetFatos Xhafa, Adriana Bogza, Santi Caballé. 1019-1026 [doi]
- An IoT-Aware Architecture for Smart Healthcare Coaching SystemsAkba Amato, Antonio Coronato. 1027-1034 [doi]
- An Optimized Priority Enabled Energy Management System for Smart HomesSamia Shah, Rabiya Khalid, Ayesha Zafar, Sardar Mehboob Hussain, Muhammad Hassan Rahim, Nadeem Javaid. 1035-1041 [doi]
- Privacy-Preserving Multiple Linear Regression of Vertically Partitioned Real Medical DatasetsHiroaki Kikuchi, Chika Hamanaga, Hideo Yasunaga, Hiroki Matsui, Hideki Hashimoto. 1042-1049 [doi]
- Cognitive Keys in Personalized CryptographyMarek R. Ogiela, Lidia Ogiela. 1050-1054 [doi]
- An MFCC-Based Speaker Identification SystemFang-Yie Leu, Guan-Liang Lin. 1055-1062 [doi]
- Access Control for Plugins in Cordova-Based Hybrid ApplicationsNaoki Kudo, Toshihiro Yamauchi, Thomas H. Austin. 1063-1069 [doi]
- A Privacy-Reserved Approach for Message Forwarding in Opportunistic NetworksXiaojie Wang, Lei Wang, Zhaolong Ning. 1070-1075 [doi]
- Safety and Standardization of Data Sharing Techniques and Protocols for Management of Strategic DataLidia Ogiela, Marek R. Ogiela, Makoto Takizawa. 1076-1081 [doi]
- From Event to Evidence: An Approach for Multi-tenant Cloud Services' AccountabilityFatma Masmoudi, Mohamed Sellami, Monia Loulou, Ahmed Hadj Kacem. 1082-1089 [doi]
- Starvation Avoidance with Deadline Constraints in Hadoop EnvironmentsAlexandru-Ciprian Farcasanu, Florin Pop, Mihaela-Catalina Nita, Ciprian Dobre. 1090-1097 [doi]
- An Eco Migration of Virtual Machines in a Server ClusterDilawaer Duolikun, Ryo Watanabe, Tomoya Enokido, Makoto Takizawa. 1098-1105 [doi]
- An Efficient Sampling and Classification Approach for Flow Detection in SDN-Based Big Data CentersFeilong Tang, Lu Li, Leonard Barolli, Can Tang. 1106-1115 [doi]
- Unit and Integration Testing of Modular Cloud ServicesStelios Sotiriadis, Andrus Lehmets, Euripides G. M. Petrakis, Nik Bessis. 1116-1123 [doi]
- Analysing Cloud Services Reviews Using Opining MiningAsma Musabah Alkalbani, Lekhaben Gadhvi, Bhaumik Patel, Farookh Khadeer Hussain, Ahmed Mohamed Ghamry, Omar Khadeer Hussain. 1124-1129 [doi]
- Data-Driven Approach for Evaluating Risk of Disclosure and Utility in Differentially Private Data ReleaseKang-Cheng Chen, Chia-Mu Yu, Bo-Chen Tai, Szu-Chuang Li, Yao-Tung Tsou, Yennun Huang, Chia-Ming Lin. 1130-1137 [doi]
- FEAST: An Automated Feature Selection Framework for Compilation TasksPai-Shun Ting, Chun Chen Tu, Pin-Yu Chen, Ya-Yun Lo, Shin-Ming Cheng. 1138-1145 [doi]
- A Trust Management Framework for Cloud Computing PlatformsYefeng Ruan, Arjan Durresi. 1146-1153 [doi]
- Adaptive Risk Management Framework for Cloud ComputingManel Medhioub, Mohamed Hamdi, Tai-Hoon Kim. 1154-1161 [doi]
- A Trustworthiness-Based Ad-Hoc Routing Protocol in Wireless NetworksEmi Ogawa, Shigenari Nakamura, Makoto Takizawa. 1162-1168 [doi]
- A Trust Based Distributed Intrusion Detection Mechanism for Internet of ThingsZeeshan Ali Khan, Peter Herrmann. 1169-1176 [doi]