Abstract is missing.
- A Cloud Computing Management System Platform Based on Power-Sensitive ResourceHuafeng Kong, YunTing Lei, Zhang Zhang, Deqing Zou. 3-7 [doi]
- A Peer-to-Peer Massive Battle Observing System to Support Game LiveLinchen Yu, Xiaofei Liao. 8-13 [doi]
- A Service Intermediary Agent Framework for Web Service IntegrationJian Cao, Jie Wang, Liang Hu, Rujie Lai. 14-21 [doi]
- JRBridge: A Framework of Large-Scale Statistical Computing for RXia Xie, Jie Cao, Hai Jin, Xijiang Ke, Wenzhi Cao. 27-34 [doi]
- Orchestrating Provisioning among Heterogeneous Grid MiddlewareLi Qi, Jie Dai. 35-42 [doi]
- Research on Software Development Process Assurance Models in ICT Supply Chain Risk ManagementFeng Xie, Tianbo Lu, Bing Xu, Dongqing Chen, Yong Peng. 43-49 [doi]
- Dynamic Resource Arrangement in Cloud FederationYisheng Wang, Haopeng Chen. 50-57 [doi]
- A Model Checking Based Approach to Automatic Test Suite Generation for Testing Web Services and BPELHuiqun Zhao, Jing Sun, Xiaodong Liu. 61-69 [doi]
- A Multi-agent Learning Model for Service CompositionWenbo Xu, Jian Cao, Haiyan Zhao, Lei Wang. 70-75 [doi]
- A Novel QoS-Aware Service Composition Approach Based on Path DecompositionYulong Liu, Lei Wu, Shijun Liu. 76-82 [doi]
- Approaches on Getting Workflow Task Execution Number of TimesNaiqiao Du, Xiaojun Ye, Jianmin Wang 0001. 83-90 [doi]
- Business Process Compositions Preserving k-Soundness PropertyKahina Bessai, Selmin Nurcan, Claude Godart, Samir Youcef. 91-97 [doi]
- Research on the Effect of Business Models on Enterprise Performance: Based on Information Technology Industry Listed Companies in ChinaLi Wang, Liangjie Zhang, Wei Wang, Weiwei Xiao, Susheng Wang. 98-105 [doi]
- An Approach for Modeling and Analyzing Code MobilityJunhua Ding, JiDong Ge. 109-116 [doi]
- Executability Analysis for Semantically Annotated Process ModelPing Gong, Jianmin Jiang, Shi Zhang, Zhi Qin Chen. 117-124 [doi]
- Failure-Aware Virtual Machine Configuration for Cloud ComputingYaqin Luo, Li Qi. 125-132 [doi]
- Live Migrating the Virtual Machine Directly Accessing a Physical NICBinbin Zhang, Xiaolin Wang, Yingwei Luo, Xiaoming Li, Zhenlin Wang. 133-137 [doi]
- Statement Hypergraph as Partitioning Model for RDF Data ProcessingPingpeng Yuan, Wenya Zhang, Hai Jin, Buwen Wu. 138-145 [doi]
- Using Graph Analysis Approach to Support Question & Answer on Enterprise Social NetworkKe Ning, Ning Li, Liang-Jie Zhang. 146-153 [doi]
- A Novel Task Management System for Modelica-Based Multi-discipline Virtual Experiment PlatformWenbin Jiang, Shuguang Wang, Hai Jin, Yong Huang. 157-164 [doi]
- An Integrated Service Platform for Pervasive Elderly CareQiang Lin, Daqing Zhang, Hongbo Ni, Xingshe Zhou, Zhiwen Yu. 165-172 [doi]
- An OSGi-Based Smart Taxi Service PlatformYang Yuan, Kejian Miao, Daqing Zhang, Lin Sun, Chao Chen. 173-178 [doi]
- Context-Aware Mashup for Smart Mobile DevicesSejin Chun, Jooik Jung, Hyun-Bae Jeon, Beom Jun Kim, Kyong-Ho Lee. 179-186 [doi]
- Empirical Study of Communication Connectivity Quality for Mobile RobotsYi Zhong, Shan Gao, Yan He. 187-191 [doi]
- Evaluating the Quality of Distance Education Services by Using Modern Information TechnologyYan Wang, Liang-Jie Zhang, Hui Cai, Jian Sun 0004, Ning Li. 192-199 [doi]
- Controllability Preservation and Behavioural Refinement for Service ProtocolsNabil Hameurlain. 203-210 [doi]
- Educational Effect of Kanji Learning SystemKotomi Ishida, Jungpil Shin. 211-216 [doi]
- Linked Social Service: Connecting Isolated Services into a Global Social Service NetworkWuhui Chen, Incheon Paik, Patrick C. K. Hung. 217-224 [doi]
- Towards Dynamic Evolution of Service ChoreographiesWei Song, Gongxuan Zhang, Yang Zou, Qiliang Yang, Xiaoxing Ma. 225-232 [doi]
- Efficient Fair Secure Two-Party ComputationOu Ruan, Jing Zhou, Minghui Zheng, Guohua Cui. 243-248 [doi]
- Model Based Byzantine Fault Detection Technique for Cloud ComputingGuisheng Fan, Huiqun Yu, Liqiong Chen, Dongmei Liu. 249-256 [doi]
- Outage Performance for Secure Communication over Correlated Fading Channels with Partial CSIJinxiao Zhu, Xiaohong Jiang, Yuezhi Zhou, Yaoxue Zhang, Osamu Takahashi, Norio Shiratori. 257-262 [doi]
- Secure Rank-Ordered Search of Multi-keyword Trapdoor over Encrypted Cloud DataAyad Ibrahim, Hai Jin, Ali A. Yassin, Deqing Zou. 263-270 [doi]
- Selecting the Best Solvers: Toward Community Based Crowdsourcing for Disaster ManagementZhiyong Yu, Daqing Zhang, Dingqi Yang, Guolong Chen. 271-277 [doi]
- Addressing the Context-Awareness Requirements in Personal Smart SpacesNicolas Liampotis, Nikos Kalatzis, Ioanna Roussaki, Pavlos Kosmides, Ioannis V. Papaioannou, Eystathios D. Sykas, Miltiades E. Anagnostou, Stavros Xynogalas. 281-285 [doi]
- A Full Scale Authentication Protocol for RFID Conforming to EPC Class1 Gen2 StandardGuiyue Jin, Jiyu Jin, Xueheng Tao, Baoying Li. 286-290 [doi]
- A Middleware for Cross-Platform and Context-Aware of Mobile TerminalsMa Lin, Liao Qing. 291-294 [doi]
- A Mixed Multi-tenancy Data Model and Its Migration Approach for the SaaS ApplicationLi Jiang, Jin Cao, Peifeng Li, Qiaoming Zhu. 295-300 [doi]
- A New Method of Sample Reduction for Support Vector ClassificationLing Wang, Meiling Sui, Qin Li, Haijun Xiao. 301-304 [doi]
- A Product Lifecycle Data Management Framework Based on Resource Meta-modelShaojun Qin, Hongming Cai, Lihong Jiang. 305-308 [doi]
- Adapkeys: An Adaptive Security Scheme for Network CodingMing He, Lin Chen, Hong Wang, Zhenghu Gong, Fan Dai, Zhihong Liu. 309-314 [doi]
- An Improved Face Recognition Based on ICA and WTMin Luo, Liu Song, Shi-dong Li. 315-318 [doi]
- An Intuitionistic Fuzzy Set Model for Concept Similarity Using Ontological RelationsFagui Liu, Fen Xiao, Yuedong Lin, Yang Zhang. 319-324 [doi]
- An ITIL v3-Based Solution to SOA GovernanceCui Xian-Peng, Lin Bi-Ying, Mo Rui-Fang. 325-328 [doi]
- Cloud Platforms: Impact on Guest Application Quality AttributesBalwinder Sodhi, T. V. Prabhakar. 329-334 [doi]
- Consistency Reflection for Automatic Update of Testing EnvironmentChaiwat Sathawornwichit, Shigeru Hosono. 335-340 [doi]
- E2VT: An Effective and Efficient VM-Transparent Mechanism for Preventing TPVM OS Boot FailureXiaolin Chang, Bin Xing, Jogesh K. Muppala. 341-344 [doi]
- Experts Ranking on the Enterprise Microblogging Based on the PageRank AlgorithmNing Li, Ke Ning, Liangjie Zhang, Yan Wang. 345-349 [doi]
- Hadoop MapReduce Framework to Implement Molecular Docking of Large-Scale Virtual ScreeningJing Zhao, Ruisheng Zhang, Zhili Zhao, Dianwei Chen, Lujie Hou. 350-353 [doi]
- Providing Information Services for Wireless Sensor Networks through Cloud ComputingPengfei You, Yuxing Peng, Hang Gao. 362-364 [doi]
- Research Focus on MES Oriented Communication among Enterprise Informatization SystemXiaopan Gao, Ruisheng Zhang, Yan Zhang, Shui Jing. 365-368 [doi]
- Research of Strategic Transformation Model of the Fast Moving Consumer Goods IndustryNing Li, Liangjie Zhang, YueJun Chen, ShengPing Wu. 369-373 [doi]
- SLA-Based Service Composition Model with Semantic SupportHui Liu, Fenglin Bu, Hongming Cai. 374-379 [doi]
- Study and Application of Business Process Optimization and EvaluationDewei Peng, Liang Cheng, Hongmei Zhou, Xia Zhang. 380-383 [doi]
- The Distributed Storage System Based on MPP for Mass DataCunchen Li, Jun Yang, Jing Han, Haihong E. 384-387 [doi]
- Using Fuzzy Measures to Assess Service Satisfaction Values of RetailersSong Zhou, Yong Li. 388-392 [doi]
- A Fast Accurate Interpretive Simulator Based on Shared Basic Block Cache TechniqueYingsong Hu, Dan Li, Jun Xiao, Liang Guo. 395-398 [doi]
- A Progressive Method on Studying and Practicing of Computer GraphicsShi Li, Dan Li. 399-402 [doi]
- Reform and Exploration of the Computer GraphicsYunfeng He, Yizhu Zhao. 403-405 [doi]
- Some Key Issues of Teaching Reform about Digital LogicYizhu Zhao, Yunfeng He. 406-409 [doi]
- The Firewall Technology Study of Network Perimeter SecurityHuang Ling-Fang. 410-413 [doi]