Abstract is missing.
- Queue State Based Dynamical Routing for Non-geostationary Satellite NetworksHezhong Li, Heteng Zhang, Liang Qiao, Feilong Tang, Wenchao Xu, Long Chen, Jie Li. 1-8 [doi]
- Experimental Analysis of the Efficiency of Shared Access in IEEE802.15.4-TSCH Networks with Sporadic TrafficSahar Ben Yaala, Fabrice Theoleyre, Ridha Bouallegue. 9-16 [doi]
- Time Modeling with NS2 in UHF RFID Anti-Collision ProtocolsRahma Ben Fraj, Vincent Beroulle, Nicolas Fourty, Aref Meddeb. 17-23 [doi]
- A Protocol to Prevent Malicious Information Flow in P2PPS SystemsShigenari Nakamura, Lidia Ogiela, Tomoya Enokido, Makoto Takizawa 0001. 24-31 [doi]
- A Three-Dimensional Stabilization Protocol for Time-Slotted Multi-hop Cognitive Radio Networks with Channel HoppingPaulo Fernando Aragao Alves Junior, Markus Engel, Reinhard Gotzhein. 32-39 [doi]
- d-SHAM: An O(d) Scalable Routing AlgorithmManaf Zghaibeh, Najam Ul Hassan. 40-46 [doi]
- A Multi-path Extension to RDV Routing Scheme for Static-node-Assisted Vehicular NetworksDaichi Araki, Takuya Yoshihiro. 47-54 [doi]
- QCH-MAC: A Qos-Aware Centralized Hybrid MAC Protocol for Vehicular Ad Hoc NETworksNarjes Boulila, Mohamed Hadded, Anis Laouiti, Leïla Azouz Saïdane. 55-62 [doi]
- Smart Directional Data Aggregation in VANETsSabri Allani, Richard Chbeir, Taoufik Yeferny, Sadok Ben Yahia. 63-70 [doi]
- A MAC Multi-channel Scheme Based on Learning-Automata for Clustered VANETsEmna Daknou, Nabil Tabbane, Mariem Thaalbi. 71-78 [doi]
- Vehicle Control Method at T-Junctions for Mixed Environments Containing Autonomous and Non-autonomous VehiclesHiroto Furukawa, Masashi Saito, Yuichi Tokunaga, Ryozo Kiyohara. 79-85 [doi]
- Evaluating UAV-to-Car Communications Performance: Testbed ExperimentsSeilendria Ardityarama Hadiwardoyo, Enrique Hernández-Orallo, Carlos Miguel Tavares Calafate, Juan-Carlos Cano, Pietro Manzoni. 86-92 [doi]
- Enhanced Event Reliability in Wireless Sensor NetworksMuhammad Adeel Mahmood, Ian Welch, Peter Andreae. 93-100 [doi]
- Layer-Adaptive Communication and Collaborative Transformed-Domain Representations to Optimize Performance in Next-Generation WSNsMuzammil Behzad, Manal Abdullah, Muhammad Talal Hassan, Yao Ge, Mahmood Ashraf Khan. 101-108 [doi]
- Origin-Mediated Sink Mobility Support for Large-Scale Phenomena Monitoring in IWSNsMyung-Eun Kim, Youngsung Son, Cheonyong Kim, Yongbin Yim, Sang-Ha Kim. 109-114 [doi]
- Efficient Data Aggregation in Wireless Sensor Networks with Multiple SinksGaukhar Yestemirova, Sain Saginbekov. 115-119 [doi]
- Graph Colouring MAC Protocol for Underwater Sensor NetworksFaisal Alfouzan, Alireza Shahrabi, Seyed Mohammad Ghoreyshi, Tuleen Boutaleb. 120-127 [doi]
- Optimal Speed Allocation in Sink-Based Energy Harvesting Wireless Sensor NetworksAbbas Mehrabi. 128-134 [doi]
- Availability Analysis of a Disaster Recovery Solution Through Stochastic Models and Fault Injection ExperimentsJulio Mendonca, Ricardo Lima, Rubens de S. Matos, João Ferreira, Ermeson Carneiro de Andrade. 135-142 [doi]
- Utilizing HoloLens to Support Industrial Service ProcessesMarkus Aleksy, Michael Troost, Falk Scheinhardt, Gunnar T. Zank. 143-148 [doi]
- Resource Exploration Using Levy Walk on Unit Disk GraphsKenya Shinki, Naohiro Hayashibara. 149-156 [doi]
- Eventual Leader Election in Shared-Memory Dynamic SystemsCatia Khouri, Fabíola Greve. 157-164 [doi]
- An Energy-Efficient Process Replication Algorithm Based on the Active Time of CoresTomoya Enokido, Dilawaer Duolikun, Makoto Takizawa 0001. 165-172 [doi]
- NIEP: NFV Infrastructure Emulation PlatformThales Nicolai Tavares, Leonardo da Cruz Marcuzzo, Vinicius Fulber Garcia, Giovanni Venâncio de Souza, Muriel Figueredo Franco, Lucas Bondan, Filip De Turck, Lisandro Zambenedetti Granville, Elias Procópio Duarte Jr., Carlos Raniery Paula dos Santos, Alberto Egon Schaeffer Filho. 173-180 [doi]
- Alarm Mechanism for Anticipated Detection of Network Unavailability in IP Networks Through Time Series AnalysisJefferson Rodrigo A. Cavalcante, Joaquim Celestino Júnior, Ahmed Patel. 181-188 [doi]
- An Eco Migration Algorithm of Virtual Machines in a Server ClusterDilawaer Duolikun, Ryo Watanabe, Tomoya Enokido, Makoto Takizawa 0001. 189-196 [doi]
- Simple Models of Processes Migration with Virtual Machines in a Cluster of ServersRyo Watanabe, Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa 0001. 197-204 [doi]
- A Flow-Level Performance Evaluation of Elastic Traffic Under Low Latency Queuing SystemMohamed El Hedi Boussada, Mounir Frikha, Jean-Marie Garcia. 205-212 [doi]
- Rotating Energy Efficient Clustering for Heterogeneous Devices (REECHD)Matteo Micheletti, Leonardo Mostarda, Andrea Piermarteri. 213-220 [doi]
- A New Contents Centric Interest Forwarding According to User Preference on NDNTetsuro Kuniyasu, Tetsuya Shigeyasu. 221-227 [doi]
- Evaluation of Routing Protocols for Opportunistic Networks in Scenarios with High Degree of People RenewalLeonardo Chancay-Garcia, Jorge Herrera-Tapia, Pietro Manzoni, Enrique Hernández-Orallo, Carlos Miguel Tavares Calafate, Juan-Carlos Cano. 228-235 [doi]
- Load Balancing and Collision Avoidance Using Opportunistic Routing in Wireless Sensor NetworksAasma Khan, Nadeem Javaid, Arshad Sher, Raza Abid Abbasi, Zeeshan Ahmad, Waseem Ahmed. 236-243 [doi]
- Time and Space in Android-Based Opportunistic NetworksAndre Ippisch, Tobias Kuper, Kalman Graffi. 244-250 [doi]
- Optimal Replication Based on Optimal Path Hops for Opportunistic NetworksAndre Ippisch, Salem Sati, Kalman Graffi. 251-258 [doi]
- Energy Consumption for Opportunistic Routing Algorithms in WSNHajer Ben Fradj, Rajoua Anane, Ridha Bouallegue. 259-265 [doi]
- Distributed User-Based Collaborative Filtering on an Opportunistic NetworkLucas Nunes Barbosa, Jonathan Gemmell, Miller Horvath, Tales Heimfarth. 266-273 [doi]
- Measuring Energy Consumption of a Wireless Sensor Node During Transmission: panStampSabrine Khriji, Rym Chéour, Martin Goetz, Dhouha El Houssaini, Inès Kammoun 0001, Olfa Kanoun. 274-280 [doi]
- An Efficient AUV-Aided Data Collection in Underwater Sensor NetworksSeyed Mohammad Ghoreyshi, Alireza Shahrabi, Tuleen Boutaleb. 281-288 [doi]
- PICO-MP: De-centralised Macro-Programming for Wireless Sensor and Actuator NetworksNaranker Dulay, Matteo Micheletti, Leonardo Mostarda, Andrea Piermarteri. 289-296 [doi]
- Geographical QoS-Oriented Protocol for Environmental Sensor NetworksAllan da Silva Espindola, Manoel Camillo Penna, Marcelo Eduardo Pellenz, Edgard Jamhour. 297-304 [doi]
- An Efficient Routing Algorithm for Void Hole Avoidance in Underwater Wireless Sensor NetworksGhazanfar Latif, Nadeem Javaid, Arshad Sher, Muhammad Khan, Tayyab Hameed, Waseem Abbas. 305-310 [doi]
- Energy Efficient Secure Communication in Wireless Sensor NetworksRavi Babu Gudivada, R. C. Hansdah. 311-319 [doi]
- Is he Becoming an Excellent Customer for us? A Customer Level Prediction Method for a Customer Relationship Management SystemChiaki Doi, Masaji Katagiri, Takashi Araki, Daizo Ikeda, Hiroshi Shigeno. 320-326 [doi]
- A QoE-Oriented Control Scheme for Adaptive HTTP Video Streaming in the Wireless Mobile NetworkChung-Ming Huang, Rui-Xian Wei, Shouzhi Xu, Huan Zhou 0002. 327-333 [doi]
- A Novel Online QoE Prediction Model Based on Multiclass Incremental Support Vector MachineYosr Ben Youssef, Mériem Afif, Riadh Ksantini, Sami Tabbane. 334-341 [doi]
- Space Saving Text Input Method for Head Mounted Display with Virtual 12-key KeyboardTaihei Ogitani, Yoshitaka Arahori, Yusuke Shinyama, Katsuhiko Gondow. 342-349 [doi]
- Rope Deployment Method for Ropeway-Type Vermin Detection SystemsKodai Ogura, Kei Nihonyanagi, Ryo Katsuma. 350-357 [doi]
- Towards Video Flow Classification at a Million Encrypted Flows Per SecondJohan Garcia, Topi Korhonen, Ricky Andersson, Filip Vastlund. 358-365 [doi]
- Starvation-Avoidance Routing Assignment for Multihop Wireless NetworksShih-Yao Chen, Frank Yeong-Sung Lin, Yean-Fu Wen, Chiu-Han Hsiao. 366-372 [doi]
- Efficiency of the TR Technique and the POPS Algorithm for Waveform Optimization in MISO-OFDM SystemsWafa Khrouf, Fatma Abdelkefi, Mohamed Siala 0001, Matthieu Crussière. 373-377 [doi]
- Dynamic Sensitivity Control Based on Two-Hop Farthest Terminal in Dense WLANTakanobu Ohnuma, Hiroshi Shigeno, Yusuke Tanaka, Tomoya Yamaura. 378-385 [doi]
- End-to-End Efficient Heuristic Algorithm for 5G Network SlicingAmal Kammoun, Nabil Tabbane, Gladys Diaz, Abdulhalim Dandoush, Nadjib Achir. 386-392 [doi]
- A New SDN-Based Next Generation Fronthaul Interface for a Partially Centralized C-RANTarek Rabia, Othmen Braham. 393-398 [doi]
- SDMan: Towards a Software Defined Management FrameworkMaxwell Eduardo Monteiro, Rodolfo da Silva Villaça, Kaio Cesar Ferreira Simonassi, Renan Freire Tavares, Cássio Chaves Reginato. 399-406 [doi]
- Modeling and Simulation of Spark StreamingJia-Chun Lin, Ming-Chang Lee, Ingrid Chieh Yu, Einar Broch Johnsen. 407-413 [doi]
- On the Impossibility of Byzantine Collision-Fast Atomic BroadcastRodrigo Q. Saramago, Eduardo Adílio Pelinson Alchieri, Tuanir Franca Rezende, Lásaro J. Camargos. 414-421 [doi]
- Towards Dynamic Interaction-Based Reputation ModelsAlmaz Melnikov, Jooyoung Lee, Victor Rivera, Manuel Mazzara, Luca Longo. 422-428 [doi]
- Diversity on State Machine ReplicationCaio Yuri da Silva Costa, Eduardo Adílio Pelinson Alchieri. 429-436 [doi]
- Triangle-Driven Community Detection in Large Graphs Using Propositional SatisfiabilitySaïd Jabbour, Nizar Mhadhbi, Badran Raddaoui, Lakhdar Sais. 437-444 [doi]
- Demand Side Energy Management Using Hybrid Chicken Swarm and Bacterial Foraging Optimization TechniquesZaheer Abbas, Nadeem Javaid, Ahmad Jaffar Khan, Malik Hassan Abdul Rehman, Jawad Sahi, Abdul Saboor. 445-456 [doi]
- Where Can we Accomplish our To-Do?: Estimating the Target Location by Analyzing the TaskReiji Suzumura, Shogo Matsuno, Minoru Ohyama. 457-463 [doi]
- Proxy Oriented Approach for Evaluating Usability of a Resilient Life-Critical Interactive SystemsMouna Jarraya, Faouzi Moussa. 464-471 [doi]
- Fast Setup and Robust WiFi Localization for the Exhibition IndustryVictor C. W. Cheng, Hao Li, Joseph K. Ng, William K. Cheung. 472-479 [doi]
- A Statistical Framework to Forecast Duration and Volume of Internet Usage Based on Pervasive Monitoring of NetFlow LogsSoheil Sarmadi, Mingyang Li, Sriram Chellappan. 480-487 [doi]
- Wayfinding Behavior Detection by SmartphoneRyosuke Narimoto, Shugo Kajita, Hirozumi Yamaguchi, Teruo Higashino. 488-495 [doi]
- Distributed Mobility Management (DMM) Using the Software Defined Network (SDN)-Based Backward Fast Handover (SBF-DMM) MethodChung-Ming Huang, Duy-Tuan Dao, Meng-Shu Chiang. 496-503 [doi]
- SANGN: A New Service Oriented Architecture for Provisioning of NGN Scalable Multimedia ServicesJuliana C. S. Andrade, Renato Benezath Cabelino Ribeiro, Rodolfo da Silva Villaça, Magnos Martinello, Celso A. S. Santos. 504-511 [doi]
- A Flexible Network and Compute-Aware Orchestrator to Enhance QoS in NFV-Based Multimedia ServicesRodrigo Moreira, Flávio de Oliveira Silva, Pedro Frosi Rosa, Rui L. Aguiar. 512-519 [doi]
- Enhancing Money Saving Tips Recommendation System by Pairwise PreferencesTakashi Araki, Chiaki Doi, Daizo Ikeda, Masaji Katagiri, Shuhei Kuwata, Tatsuya Kawasaki. 520-527 [doi]
- Training System Using a Force Feedback Device for Acupuncture TreatmentMeguru Yamashita, Zhiyi Gao, Akio Doi, Hajime Ogawa. 528-533 [doi]
- Citation Count Prediction Based on Academic Network FeaturesXin Ping Zhu, Zhijie Ban. 534-541 [doi]
- A Context Aware Recommender System for Digital StorytellingFabio Clarizia, Francesco Colace, Marco Lombardi, Francesco Pascale. 542-549 [doi]
- Indoor Trajectory Reconstruction Using Mobile DevicesRisca Mukti Susanti, Kiki Maulana Adhinugraha, Sultan Alamri, Leonard Barolli, David Taniar. 550-555 [doi]
- Cross-Layer Balanced Relay Node Selection Algorithm for Opportunistic Routing in Underwater Ad-Hoc NetworksNing Li 0003, José-Fernán Martínez-Ortega, Vicente Hernández Díaz, Lourdes López Santidrián. 556-563 [doi]
- Load-Balanced Cooperative Transmission in MEO-LEO Satellite NetworkShukun Li, Feilong Tang. 564-571 [doi]
- Reducing Error of Positioning Based on Unstable RSSI of Short Range CommunicationWakana Nakai, Yu Kawahama, Ryo Katsuma. 572-578 [doi]
- MBCAP: Mission Based Collision Avoidance Protocol for UAVsFrancisco Fabra, Carlos T. Calafate, Juan-Carlos Cano, Pietro Manzoni. 579-586 [doi]
- A New V2X Communication System to Realize Long Distance and Large Data Transmittion by N-Wavelength Wireless Cognitive NetworkYoshitaka Shibata, Kenta Ito, Noriki Uchida. 587-592 [doi]
- Probabilistic Ontology Reasoning in Ambient Assistance: Predicting Human ActionsGabriel Machado Lunardi, Guilherme Medeiros Machado, Fadi Al Machot, Vinícius Maran, Alencar Machado, Heinrich C. Mayr, Vladimir A. Shekhovtsov, José Palazzo Moreira de Oliveira. 593-600 [doi]
- An Ontology-Based Approach to Dynamic Contextual Role for Pervasive Access ControlA. S. M. Kayes, J. Wenny Rahayu, Tharam S. Dillon. 601-608 [doi]
- An Ontology-Based Approach for Mining Radicalization Indicators from Online MessagesAbir Masmoudi 0002, Mahmoud Barhamgi, Noura Faci, Zohra Saoud, Khalid Belhajjame, Djamal Benslimane, David Camacho. 609-616 [doi]
- Survival Classification with Two-Tied Labeling of Censored DataAurélien Bach, Jianfei Zhang, Shengrui Wang. 617-622 [doi]
- Fog Computing with Distributed DatabaseTsukasa Kudo. 623-630 [doi]
- Data Security in Cognitive Information SystemsAnna Kubarek, Lidia Ogiela. 631-635 [doi]
- Efficient Power Scheduling in Smart Homes Using Meta Heuristic Hybrid Grey Wolf Differential Evolution Optimization TechniqueMuqaddas Naz, Nadeem Javaid, Urva Latif, Talha Naeem Qureshi, Aqdas Naz, Zahoor Ali Khan. 636-643 [doi]
- Pseudorehearsal in Actor-Critic Agents with Neural Network Function ApproximationVladimir Marochko, Leonard Johard, Manuel Mazzara, Luca Longo. 644-650 [doi]
- Using Link Analysis Algorithms to Study the Role of Neurons in the Worm ConnectomePiotr Szczurek, Mark Horeni. 651-657 [doi]
- Selection of Actor Nodes in Wireless Sensor and Actor Networks: A Fuzzy-Based Approach Considering Number of Obstacles as New ParameterDonald Elmazi, Miralda Cuka, Kevin Bylykbashi, Evjola Spaho, Makoto Ikeda, Leonard Barolli. 658-666 [doi]
- Cost Optimization in Home Energy Management System Using Genetic Algorithm, Bat Algorithm and Hybrid Bat Genetic AlgorithmUrva Latif, Nadeem Javaid, Syed Shahab Zarin, Muqaddas Naz, Asma Jamal, Abdul Mateen. 667-677 [doi]
- Design and Implementation of a Hybrid Intelligent System Based on Particle Swarm Optimization, Hill Climbing and Distributed Genetic Algorithm for Node Placement Problem in WMNs: A Comparison StudyShinji Sakamoto, Admir Barolli, Leonard Barolli, Makoto Takizawa 0001. 678-685 [doi]
- Improving Security on IoT Applications Based on the FIWARE PlatformCaio Thomas Oliveira, Rodrigo Moreira, Flávio de Oliveira Silva, Rodrigo Sanches Miani, Pedro Frosi Rosa. 686-693 [doi]
- Dynamic Collaboration of Centralized & Edge Processing for Coordinated Data Management in an IoT ParadigmRoger Young, Sheila Fallon, Paul Jacob. 694-701 [doi]
- Research on PUF-Based Security Enhancement of Narrow-Band Internet of ThingsYuesong Lin, Fuqiang Jiang, Zhu Wang, Zhuping Wang. 702-709 [doi]
- A Fuzzy-Based System for Selection of IoT Devices in Opportunistic Networks Considering IoT Device Storage, Waiting Time and Node Centrality ParametersMiralda Cuka, Donald Elmazi, Kevin Bylykbashi, Evjola Spaho, Makoto Ikeda, Leonard Barolli. 710-716 [doi]
- Edge and Cluster Computing as Enabling Infrastructure for Internet of Medical ThingsPierluigi Ritrovato, Fatos Xhafa, Andrea Giordano. 717-723 [doi]
- Mobile Privacy Protection Enhanced with Multi-access Edge ComputingPing Zhang 0017, Mimoza Durresi, Arjan Durresi. 724-731 [doi]
- Privacy Preservation in Social Networks Sequential PublishingBourahla Safia, Challal Yacine. 732-739 [doi]
- Cognitive Cryptography in Advanced Data SecurityMarek R. Ogiela, Lidia Ogiela. 740-743 [doi]
- Active Attack Against Oblivious RAMYuto Nakano, Seira Hidano, Shinsaku Kiyomoto, Kouichi Sakurai. 744-751 [doi]
- A Machine Learning Approach for Detecting Spoofing Attacks in Wireless Sensor NetworksEliel Marlon de Lima Pinto, Rosana Lachowski, Marcelo Eduardo Pellenz, Manoel Camillo Penna, Richard Demo Souza. 752-758 [doi]
- Securing Cloud Storage Brokerage Systems Through Threat ModelsKennedy A. Torkura, Muhammad I. H. Sukmana, Michael Meinig, Anne V. D. M. Kayem, Feng Cheng 0002, Hendrik Graupner, Christoph Meinel. 759-768 [doi]
- DeMONS: A DDoS Mitigation NFV SolutionVinicius Fulber Garcia, Guilherme de Freitas Gaiardo, Leonardo da Cruz Marcuzzo, Raul Ceretta Nunes, Carlos Raniery Paula dos Santos. 769-776 [doi]
- Anomaly Detection and Diagnosis Scheme for Mobile Health ApplicationsLamia Ben Amor, Imene Lahyani, Mohamed Jmaiel, Khalil Drira. 777-784 [doi]
- A Budget Feasible Mechanism for Hiring Doctors in E-HealthcareVikash Kumar Singh, Sajal Mukhopadhyay, Fatos Xhafa, Aniruddh Sharma. 785-792 [doi]
- Privacy Preserved Spectral Analysis Using IoT mHealth Biomedical Data for Stress EstimationXuping Huang, Hiroaki Kikuchi, Chun-I Fan. 793-800 [doi]
- Analyzing Attributes of Successful Learners by Using Machine Learning in an Undergraduate Computer CourseChia-Yin Ko, Fang-Yie Leu. 801-806 [doi]
- Design of Program Analysis Based Approach for Narrowing Down Misconfigurations in Beginner Network Construction ExercisesYuichiro Tateiwa, Naohisa Takahashi. 807-814 [doi]
- Demand Side Management Using Hybrid Genetic Algorithm and Pigeon Inspired Optimization TechniquesMalik Hassan Abdul Rehman, Nadeem Javaid, Muhammad Nadeem Iqbal, Zaheer Abbas, Muhammad Awais, Ahmed Jaffar Khan, Umar Qasim. 815-825 [doi]
- Model Checking in Multiplayer Games DevelopmentRuslan Rezin, Ilya Afanasyev, Manuel Mazzara, Victor Rivera. 826-833 [doi]
- Stackelberg Game-Theoretic Approach in Joint Pricing and Assortment Optimizing for Small-Scale Online Retailers: Seller-Buyer Supply Chain CaseZahra Saberi, Omar Khadeer Hussain, Morteza Saberi, Elizabeth Chang. 834-838 [doi]
- Efficient Demand Side Management Using Hybridization of Elephant Herding Optimization and Firefly OptimizationIqra Fatima, Sikandar Asif, Sundas Shafiq, Itrat Fatima, Muhammad Hassan Rahim, Nadeem Javaid. 839-845 [doi]
- Smart Homes Coalition Based on Game TheoryAdia Khalid, Nadeem Javaid, Abdul Mateen, Muhammad Hassan Rahim, Manzoor Ilahi. 846-849 [doi]
- Performance Evaluation of WMN-PSODGA System for Node Placement Problem in WMNs Considering Four Different Crossover MethodsAdmir Barolli, Shinji Sakamoto, Leonard Barolli, Makoto Takizawa 0001. 850-857 [doi]
- Value CoCreation (VCC) Language Design in the Frame of a Smart Airport Network Case StudyChristophe Feltus, Erik H. A. Proper, Andreas Metzger, Juan Carlos Garcia Lopez, Rodrigo Gonzalez Castineira. 858-865 [doi]
- Risk Prediction in Smart Home CareZeineb Fki, Boudour Ammar, Mounir Ben Ayed. 866-873 [doi]
- Time and Device Based Priority Induced Demand Side Load Management in Smart Home with Consumer Budget LimitAsif Khan, Nadeem Javaid, Muhammad Nadeem Iqbal, Naveed Anwar, Inzimam ul-Haq, Faraz Ahmad. 874-881 [doi]
- Meta Heuristic and Nature Inspired Hybrid Approach for Home Energy Management Using Flower Pollination Algorithm and Bacterial Foraging Optimization TechniqueMuhammad Awais, Nadeem Javaid, Abdul Mateen, Nasir Khan, Ali Mohiuddin, Malik Hassan Abdul Rehman. 882-891 [doi]
- Towards Secure Smart Home IoT: Manufacturer and User Network Access Control FrameworkMohammed Al-Shaboti, Ian Welch, Aaron Chen, Muhammad Adeel Mahmood. 892-899 [doi]
- Cyber Threat Intelligence from Honeypot Data Using ElasticsearchHamad Al-Mohannadi, Irfan Awan, Jassim Al Hamar, Andrea J. Cullen, Jules Pagna Disso, Lorna Armitage. 900-906 [doi]
- Ransomware Detection Considering User's Document EditingToshiki Honda, Kohei Mukaiyama, Takeharu Shirai, Tetsushi Ohki, Masakatsu Nishigaki. 907-914 [doi]
- An Adaptive Analysis Framework for Correlating Cyber-Security-Related DataXiaohui Jin, Baojiang Cui, Jun Yang, Zishuai Cheng. 915-919 [doi]
- Using Externals IdPs on OpenStack: A Security Analysis of OpenID Connect, Facebook Connect, and OpenStack AuthenticationGlauber Cassiano Batista, Charles Christian Miers, Guilherme Piegas Koslovski, Maurício Aronne Pillon, Nelson Mimura Gonzalez, Marcos A. Simplício Jr.. 920-927 [doi]
- Challenges and Methodologies of Hardware SecurityKin Fun Li, Narges Attarmoghaddam. 928-933 [doi]
- Risk of Re-identification from Payment Card Histories in Multiple DomainsSatoshi Ito, Reo Harada, Hiroaki Kikuchi. 934-941 [doi]
- Julunga: A New Large-Scale Distributed Read-Write File Storage System for Cloud Computing EnvironmentsHrishikesh Dewan, Ramesh C. Hansdah. 942-951 [doi]
- Formal Verification of Temporal Constraints and Allocated Cloud Resources in Business ProcessesRania Ben Halima, Imen Zouaghi, Slim Kallel, Walid Gaaloul, Mohamed Jmaiel. 952-959 [doi]
- Analysis and Representation of QoS Attributes in Cloud Service SelectionMona Eisa, Muhammad Younas 0001, Kashinath Basu. 960-967 [doi]
- Cognitive Systems for Service Management in Cloud ComputingUrszula Ogiela, Makoto Takizawa 0001, Lidia Ogiela. 968-972 [doi]
- A New Formal Proxy-Based Approach for Secure Distributed Business Process on the CloudMaroua Nouioua, Adel Alti, Belhassen Zouari. 973-980 [doi]
- Clustering Method for Characterizing Areas of Spatial Networks Based on Degree Mixing PatternsMaulana Arief. 981-987 [doi]
- Using Spatial Outliers Detection to Assess Balancing Mechanisms in Bike Sharing SystemsRayane El Sibai, Yousra Chabchoub, Christine Fricker. 988-995 [doi]
- EasyChoose: A Continuous Feature Extraction and Review Highlighting Scheme on Hadoop YARNMing-Chang Lee, Jia-Chun Lin, Olaf Owe. 996-1002 [doi]
- NBF: An FCA-Based Algorithm to Identify Negative Correlation Biclusters of DNA Microarray DataAmina Houari, Wassim Ayadi, Sadok Ben Yahia. 1003-1010 [doi]
- Correlated Differential Privacy Protection for Big DataDenglong Lv, Shibing Zhu. 1011-1018 [doi]
- Anomaly Clustering Based on Correspondence AnalysisHumayra Islam, Tarem Ahmed. 1019-1025 [doi]
- A Novel Task Scheduling Scheme for Computational Grids - Greedy ApproachSrinivas Dibbur Byrappa, Sujay N. Hegde, Rajan M. A, Krishnappa H. K. 1026-1033 [doi]
- Minicamp: Middleware for Incomplete Participation in Structured Peer-to-Peer Monitoring ProtocolsAndreas Disterhöft, Kalman Graffi. 1034-1042 [doi]
- Afuronto: A Six Hop Peer-to-Peer Network of Zillions of NodesHrishikesh Dewan, Ramesh C. Hansdah. 1043-1052 [doi]
- Peer-to-Peer Collaborative Video-on-Demand Streaming over Mobile Content Centric NetworkingRyma Boussaha, Yacine Challal, Abdelmadjid Bouabdallah, Djelloul Ighit, Lyes Tairi. 1053-1059 [doi]
- Harmony Pigeon Inspired Optimization for Appliance Scheduling in Smart GridNasir Khan, Nadeem Javaid, Muhammad Khan, Ahmed Subhani, Abdul Mateen, Arshad Iqbal. 1060-1069 [doi]
- Home Energy Management in Smart Grid Using Evolutionary AlgorithmsAbdul Saboor, Nadeem Javaid, zafar iqbal, Zaheer Abbas, Ahmad Jaffar Khan, Saad Rashid, Muhammad Awais. 1070-1080 [doi]
- ISPANN: A Policy-Based ISP Auditor for Network Neutrality Violation DetectionVinicius Garcez Schaurich, Marcio Barbosa de Carvalho, Lisandro Zambenedetti Granville. 1081-1088 [doi]
- Security of Distributed Ledger Solutions Based on Blockchain TechnologiesMarek R. Ogiela, Michal Majcher. 1089-1095 [doi]
- BlockStore: A Secure Decentralized Storage Framework on BlockchainSushmita Ruj, Mohammad Shahriar Rahman, Anirban Basu, Shinsaku Kiyomoto. 1096-1103 [doi]
- Online Signature Verification Using the Information Set Based ModelsUrvashi Choudhary, Sanjay Kumar Dhurandher, Vinesh Kumar, Isaac Woungang, Joel J. P. C. Rodrigues. 1104-1109 [doi]
- Comparison of Selected Homomorphic Encryption TechniquesMarek R. Ogiela, Marcin Oczko. 1110-1114 [doi]
- Authenticated Network Coding for Software-Defined Named Data NetworkingRyma Boussaha, Yacine Challal, Abdelmadjid Bouabdallah. 1115-1122 [doi]
- Exploring Textures in Traffic Matrices to Classify Data Center CommunicationsCelio Trois, Luis C. E. Bona, Luiz S. Oliveira, Magnos Martinello, Douglas Harewood-Gill, Marcos Didonet Del Fabro, Reza Nejabati, Dimitra Simeonidou, Joao C. D. Lima, Benhur Stein. 1123-1130 [doi]
- CloudFarm: Management of Farms and Crops Data on the CloudApostolos Rousalis, Stelios Sotiriadis, Euripides G. M. Petrakis. 1131-1138 [doi]
- Feedback Based High-Quality Task Assignment in Collaborative CrowdsourcingLiang Qiao, Feilong Tang, Jiacheng Liu. 1139-1146 [doi]
- Allocation of Virtual Infrastructures on Multiple IaaS Providers with Survivability and Reliability RequirementsAnderson S. Raugust, Felipe Rodrigo de Souza, Maurício Aronne Pillon, Charles Christian Miers, Guilherme Piegas Koslovski. 1147-1154 [doi]
- Trust Assessment for Internet of Things in Multi-access Edge ComputingYefeng Ruan, Arjan Durresi, Suleyman Uslu. 1155-1161 [doi]
- In-network Self-Learning Algorithms for BEMS Through a Collaborative Fog PlatformZhishu Shen, Kenji Yokota, Jiong Jin, Atsushi Tagami, Teruo Higashino. 1162-1169 [doi]