Abstract is missing.
- Visual Sensor Placement and Orientation Optimization for Surveillance SystemsGuanglei Zhang, Bin Dong, Jichuan Zheng. 1-5 [doi]
- A Comparative Evaluation of Two Intrusion-Tolerant Routing Protocols for Wireless Sensor NetworksVinh Hoa La, Ana Rosa Cavalli. 6-12 [doi]
- Energy Balanced Interference Aware Energy Efficient Depth Base Routing Protocol for UWSNsHammad Maqsood, Nadeem Javaid, Muhammad Zain-ul-Abidin, Mudassir Ejaz, Muhammad, Usman Shakeel. 13-19 [doi]
- EEHR: Energy Efficient Hybrid Routing Protocol for Underwater WSNsMuhammad, Nadeem Javaid, Sheraz Hussain, Taimur Hafeez, Hammad Maqsood, Syed Zarar. 20-26 [doi]
- Energy-Aware Actor Selection Methods in WSANElis Kulla, Makoto Ikeda, Leonard Barolli. 27-32 [doi]
- Design of Parking Assistance System Using Wireless Sensor NetworksSeung-Jun Lee, Young Jin Kwon, Doo Seop Yun, Do Hyun Kim. 33-37 [doi]
- Provable Data Possession Supporting Secure Data Transfer for Cloud StorageYong Yu, Jianbing Ni, Wei Wu, Yilei Wang. 38-42 [doi]
- Security Based Cyber-Physical Architecture for Environment ProtectionMimoza Durresi, Arjan Durresi. 43-50 [doi]
- Data Block Management Scheme Based on Secret Sharing for HDFSSu-Hyun Kim, Im-Yeong Lee. 51-56 [doi]
- Web Browser Fingerprinting Using Only Cascading Style SheetsNaoki Takei, Takamichi Saito, Ko Takasu, Tomotaka Yamada. 57-63 [doi]
- A New Program Classification Method Based on Binary Instrumentation and Instruction Flow Feature ExtractionBaojiang Cui, Mengchen Cao, Shilei Chen, Weikong Qi. 64-68 [doi]
- Buffer-Aided Opportunistic Max^2-Min Network Coding for Wireless Data BroadcastingKui Xu, Wei Xie, Youyun Xu, Dongmei Zhang, Ning Li. 69-75 [doi]
- A Finite Set Network Coding Automatic Repeat Request Scheme for Machine-to-Machine Wireless BroadcastingJian Wang, Youyun Xu, Kui Xu, Wei Xie. 76-81 [doi]
- Modeling for Short-Form HTTP Adaptive Streaming Considering Memory EffectShipeng Yu, Wen'an Zhou, Ran Tao, Yanjun Hou. 82-87 [doi]
- ADDFuzzer: A New Fuzzing Framework of Android Device DriversBaojiang Cui, Yunze Ni, Yilun Fu. 88-91 [doi]
- Distributed Pattern Transformation-Invariant Recognition Scheme for Real-Time Sensory ApplicationsWaleed Alfehaid, Asad I. Khan, Bala Srinivasan, Salem Alkhalaf. 92-98 [doi]
- Improved Adaptive Cooperative Routing in Underwater Wireless Sensor NetworksSheraz Hussain, Nadeem Javaid, Syed Zarar, Muhammad Zain-ul-Abidin, Mudassir Ejaz, Taimur Hafeez. 99-106 [doi]
- Robust Identification of Browser Fingerprint Comparison Using Edit DistanceTomotaka Yamada, Takamichi Saito, Ko Takasu, Naoki Takei. 107-113 [doi]
- The Research of Aspect-Oriented Dynamic Analysis Based on Static AnalysisLifang Han, Tingting Hou, Songling Shan, Yikang Li, Baojiang Cui. 114-119 [doi]
- A New Secure Data Deduplication Approach Supporting User TraceabilityJianfeng Wang, Xiaofeng Chen 0001, Jin Li 0002, Kamil Kluczniak, Miroslaw Kutylowski. 120-124 [doi]
- Selection of Secure Actors in Wireless Sensor and Actor Networks Using Fuzzy LogicDonald Elmazi, Takaaki Inaba, Shinji Sakamoto, Tetsuya Oda, Makoto Ikeda, Leonard Barolli. 125-131 [doi]
- The Touchless Person Authentication Using Gesture-Types Emulation of Handwritten Signature TemplatesMarcin Piekarczyk, Marek R. Ogiela. 132-136 [doi]
- A Simulation System Based on ONE and SUMO Simulators: Performance Evaluation of First Contact, Prophet and Spray-and-Wait DTN ProtocolsIlir Shinko, Tetsuya Oda, Evjola Spaho, Vladi Kolici, Makoto Ikeda, Leonard Barolli. 137-142 [doi]
- Evaluation of Wake-on-Demand Accurate Activation and In-Vehicle Wireless Connecation ControlTsuyoshi Takahashi, Yoshitaka Shibata, Satoshi Imata, Nobuo Suzuki. 143-149 [doi]
- An Analysis of Road Maps Based on Voronoi Diagram for Vehicular BroadcastRyo Yanagida, Keiji Obara, Koki Ogawa, Hiroshi Shigeno. 150-156 [doi]
- Performance Evaluation of Different Routing Protocols in a Vehicular Delay Tolerant NetworkEvjola Spaho, Leonard Barolli, Vladi Kolici, Algenti Lala. 157-162 [doi]
- SDN Based Road Condition Monitoring System for ITSKenta Ito, Go Hirakawa, Goshi Sato, Yoshitaka Shibata. 163-168 [doi]
- Information Security in Intelligent Data Management ProcessesLidia Ogiela, Urszula Ogiela. 169-172 [doi]
- Static-Based Test Case Dynamic Generation for SQLIVs DetectionLing Li, Junxin Qi, Nan Liu, Lifang Han, Baojiang Cui. 173-177 [doi]
- An AST-based Code Plagiarism Detection AlgorithmJingling Zhao, Kunfeng Xia, Yilun Fu, Baojiang Cui. 178-182 [doi]
- Fuzzy Vault Schemes in Multi-secret Digital SteganographyKatarzyna Koptyra, Marek R. Ogiela. 183-186 [doi]
- Detection of LTE Protocol Based on Format FuzzBaojiang Cui, Shengbo Feng, Qinshu Xiao, Ming Li. 187-192 [doi]
- Effects of Security on Reliability of JXTA-Overlay P2P Platform a Comparison Study for Two Fuzzy-Based SystemsYi Liu, Shinji Sakamoto, Leonard Barolli, Evjola Spaho, Makoto Ikeda, Fatos Xhafa. 193-200 [doi]
- Experimental Results of a Raspberry Pi Based WMN Testbed for Multiple Flows and Distributed Concurrent ProcessingTetsuya Oda, Donald Elmazi, Taro Ishitaki, Admir Barolli, Keita Matsuo, Leonard Barolli. 201-206 [doi]
- Experimental Results of a Raspberry Pi Based WMN Testbed for Different OSs in Indoor Environment Considering LoS ScenarioAdmir Barolli, Tetsuya Oda, Keita Matsuo, Makoto Ikeda, Leonard Barolli, Makoto Takizawa. 207-212 [doi]
- A PSO-based Simulation System for Node Placement in Wireless Mesh Networks: Evaluation Results for Different Replacement MethodsShinji Sakamoto, Tetsuya Oda, Makoto Ikeda, Leonard Barolli, Fatos Xhafa. 213-219 [doi]
- Optimizing Hybrid Access Femtocell Clusters in 5G NetworksChristos Bouras, Georgios Diles, Vasileios Kokkinos, Andreas Papazois. 220-226 [doi]
- Relay-Based Cooperative Spectrum Sensing with Improved Energy Detection In Cognitive RadioOluyomi Simpson, Yusuf Abdulkadir, Yichuang Sun, Baoyong Chi. 227-231 [doi]
- Improved Interference Aware EEDBR Protocol for Underwater Wireless Sensor NetworksUsman Shakeel, Nadeem Javaid, Mudassir Ejaz, Syed Zarar, Taimur Hafeez, Muhammad. 232-239 [doi]
- Study on Deep Learning and Its Application in Visual TrackingDan Hu, Xingshe Zhou, Xiaohao Yu, Zhiqiang Hou. 240-246 [doi]
- Human Actions Modelling and Recognition in Low-Dimensional Feature SpaceTomasz Hachaj, Marek R. Ogiela, Katarzyna Koptyra. 247-254 [doi]
- A Device Identification Method for AR-based Network Topology VisualizationToshiyuki Haramaki, Hiroaki Nishino. 255-262 [doi]
- Implementation and Experimental Results of a Raspberry Pi and OLSR Based Wireless Content-Centric Network TestbedTetsuya Oda, Donald Elmazi, Taro Ishitaki, Keita Matsuo, Makoto Ikeda, Leonard Barolli. 263-268 [doi]
- Blue Pages: Software as a Service Data SetAsma Musabah Alkalbani, Ahmed Mohamed Ghamry, Farookh Khadeer Hussain, Omar Khadeer Hussain. 269-274 [doi]
- Power Consumption Model of a Server to Perform Communication Type Application Processes on Virtual MachinesTomoya Enokido, Makoto Takizawa. 275-282 [doi]
- Energy-Aware Migration and Replication of Processes in a ClusterDilawaer Duolikun, Hiroki Kataoka, Shigenari Nakamura, Tomoya Enokido, Makoto Takizawa. 283-287 [doi]
- Energy-Efficient Virtualisation of Threads in a Server ClusterHiroki Kataoka, Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa. 288-295 [doi]
- Modelling Calcium Signaling with a Two-Layer Cluster-Based Communication Network SystemYiqun Yang, Wenjie Zhang, Chai Kiat Yeo. 296-303 [doi]
- An Energy Efficient Adaptive Cooperative Routing Protocol for Underwater WSNsTaimur Hafeez, Nadeem Javaid, Usman Shakeel, Muhammad, Sheraz Hussain, Hammad Maqsood. 304-310 [doi]
- Optimized Energy Management System Using Electric Water HeaterMuhammad Waqas Khan, Anzar Mahmood, Muhammad Hussain Ayaz, Muhammad Waseem, Sohail Razzaq, Nadeem Javaid. 311-317 [doi]
- A Progressive Download Method Using Multiple TCP Flows on Multiple PathsTokumasa Hiraoka, Junichi Funasaka. 318-324 [doi]
- TMPTCP: Tailless Multi-path TCPMohammad Javad Shamani, Weiping Zhu, Vahid Naghshin. 325-332 [doi]
- Role Safety in a Flexible Read-Write Abortion ProtocolShigenari Nakamura, Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa. 333-340 [doi]
- Differential Multiply-and-Forward and Selective Combining Based Multi-relay TDBC ProtocolHui Tian, Youyun Xu, Kui Xu, Xingkang Hou, Xiaochen Xia, Wenfeng Ma. 341-346 [doi]
- Investigating an ISP's Core Network in 2014Savvas Charalambides, Michael Georgiades, Georgios Dimosthenous, Dora Christofi. 347-352 [doi]
- Resource Management in 5G Femtocell NetworksChristos Bouras, Georgios Diles. 353-358 [doi]
- Space Time Protocol Based on IEEE1588Jun Yang, Yong Guo, Zijing Cheng, Kai Lin, Baojiang Cui. 359-363 [doi]
- An Escrow-Free Hierarchical Identity-Based Signature Scheme from Composite Order Bilinear GroupsPeixin Chen, Xiaofeng Wang, BaoKang Zhao, Hao Sun, Jinshu Su, Ilsun You. 364-369 [doi]
- A Tutorial on Quantum Key DistributionBaoKang Zhao, Bo Liu, Chunqing Wu, Wanrong Yu, Ilsun You. 370-374 [doi]
- Ontology Based APT Attack Behavior Analysis in Cloud ComputingJunho Choi, Chang Choi, Htet Myet Lynn, PanKoo Kim. 375-379 [doi]
- Cluster-RLM: Establishing a Routing Path with Cluster-Based Redundant Link Minimization in Wireless Sensor NetworksFang-Yie Leu, Sheng-Chieh Chuang. 380-385 [doi]
- Applying Continuous Integration for Reducing Web Applications Development RisksSen-Tarng Lai, Fang-Yie Leu. 386-391 [doi]
- Research on Cluster Head Selection Algorithm Based on QoS Constraints in Mobile Ad Hoc NetworksYue Li, Shunchen Yang. 392-395 [doi]
- An Improved Clustering Algorithm for Mixed Attributes Data Based on K-prototypes AlgorithmChen Xuan. 396-399 [doi]
- Mining Approximate Frequent Patterns from Noisy DatabasesXiaomei Yu, Yongqin Li, Hong Wang. 400-403 [doi]
- A Cultural Algorithm Based on Artificial Bee Colony Optimization for Community Detection in Signed Social NetworksBaofang Hu. 404-409 [doi]
- Ventricular Fabrication Prediction Approach Based on Cloud-Mobile Healthcare PlatformZhen-Xing Zhang, Joon S. Lim. 410-413 [doi]
- Request-Based Comparable Encryption Scheme with Multiple UsersJun Ye, Meixia Miao, Peng Chen, Xiaofeng Chen 0001. 414-416 [doi]
- Efficient First-Price Sealed-Bid Auction Protocols from Modified Comparable EncryptionYixiao Zhu, Liang Liu, Xiaofeng Chen 0001. 417-421 [doi]
- Design of Secure Mobile Payment System Based on IBCYang Rui-xia. 422-425 [doi]
- Fast Scalar Multiplication Algorithm Using Constrained Triple-Base Number System and Its ApplicationsYunqi Dou, Jiang Weng, Chuangui Ma, Fushan Wei. 426-431 [doi]
- A Novel Trust Management Mechanism for Mobile Ad Hoc Networks Based on Grey TheoryFang Zhifeng, Zhang Kun. 432-436 [doi]
- Performance Evaluation of a Secure Call Connection Admission Control for Wireless Cellular Networks Using Fuzzy LogicTakaaki Inaba, Shinji Sakamoto, Tetsuya Oda, Leonard Barolli. 437-441 [doi]
- Performance Evaluation of a Fuzzy-Based Wireless Sensor and Actuator Network Testbed for Object TrackingMakoto Ikeda, Keisuke Ebisu, Yuki Sakai, Donald Elmazi, Leonard Barolli, Elis Kulla. 442-447 [doi]
- Application of Neural Networks and Friedman Test for User Identification in Tor NetworksTaro Ishitaki, Tetsuya Oda, Leonard Barolli. 448-454 [doi]
- Numerical Analysis of Cavities in Photonic Crystal Waveguide for FilteringHiroshi Maeda, Yuting Bao. 455-459 [doi]
- A Study on Performance of Hill Climbing for Router Placement in Wireless Mesh NetworksAlda Xhafa, Evjola Spaho, Donald Elmazi, Makoto Takizawa. 460-465 [doi]
- Vehicle-to-Vehicle Delay Tolerant Networks with Area of Interest for Road Surveillance SystemNoriki Uchida, Kenta Ito, Go Hirakawa, Yoshikazu Arai, Yoshitaka Shibata. 466-471 [doi]
- Power Consumption and Computation Models of a Storage ServerAtsuhiro Sawada, Hiroki Kataoka, Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa. 472-477 [doi]
- An Adaptive Multipath Routing Scheme Based on SDN for Disaster-Resistant Storage SystemsSatoru Izumi, Asato Edo, Toru Abe, Takuo Suganuma. 478-483 [doi]
- Reliable and Efficient Parallel Transmission Protocols in P2P NetworksHiroki Sugiyama, Makoto Takizawa. 484-489 [doi]
- Color Image Authentication Method Based on Triple-Channel Spiking Cortical ModelGuangjie Kou, Yunyan Ma. 490-493 [doi]
- Semantic Data Analysis Algorithms Supporting Decision-Making ProcessesLidia Ogiela, Marek R. Ogiela. 494-496 [doi]
- Performance Evaluation of an Active Learning System to Improve Students Self-Learning and ConcentrationNoriyasu Yamamoto. 497-500 [doi]
- Microblog Orientation Analysis Based on ConnnectivesJun Zhao, Hong Wang. 501-506 [doi]
- SURF Feature Description Method of Color Image Based on QuaternionShen Qian, Liu Chan-juan, Zou Hai-lin, Liu Ying, Chen Tong-tong. 507-511 [doi]
- EDP: A Wireless Network Control System Energy-Efficient Real-Time Task Scheduling AlgorithmQiang Lin, Guowei Wu, Qing Liu. 512-517 [doi]
- Cooperative Spectrum Sensing in Cognitive Radio Networks Using Hidden Markov ModelJyu-Wei Wang. 518-521 [doi]
- Event-Driven Gait Recognition Method Based on Dynamic Temporal SegmentationXiaochen Lai, Guoqiao Zhou, Chi Lin, Kangbin Yim. 522-527 [doi]
- An Indoor Positioning System Using Bluetooth RSSI with an Accelerometer and a Barometer on a SmartphoneJe-sung Jeon, Youngsun Kong, Yunyoung Nam, Kangbin Yim. 528-531 [doi]
- Security Threats and Countermeasure Frame Using a Session Control Mechanism on VoLTESeongmin Park, Sekwon Kim, Kyungho Son, Hwankuk Kim. 532-537 [doi]
- A Hierarchical Virtual Role Assignment for Negotiation-Based RBAC SchemeHsing-Chung Chen. 538-543 [doi]
- Proxy Based Resource Management Scheme in IoT EnvironmentDaewon Lee, Kang Bin Yim, HwaMin Lee. 544-546 [doi]
- Security Threats to the Platform IdentificationKyungroul Lee, Hyeungjun Yeuk, Habin Lim, Kangbin Yim. 547-550 [doi]
- A Cellular Automaton Model of Traffic with Railroad CrossingChihiro Suwa, Kaoru Fujioka. 551-554 [doi]
- A Development of AR Calligraphy Skill Training System Using Dynamic FontRachanart Soontornvorn, Sarayoot Pongkarn, Hiroyuki Fujioka. 555-558 [doi]
- Proposal of Design Support System of Pedestrian Space Based on Psychological AssessmentTatsushi Tokuyasu, Shota Okamoto, Shimpei Matsumoto, Takako Otabe, Sen Takematsu, Takanori Tanaka. 559-562 [doi]
- Design and Implementation of an Omnidirectional Wheelchair for Playing BadmintonKeita Matsuo, Leonard Barolli. 563-567 [doi]
- Verifiable Search for Dynamic Outsourced Database in Cloud ComputingJianfeng Wang, Xiaofeng Chen, Jin Li. 568-571 [doi]
- Secure Encrypted Image Search in Mobile Cloud ComputingQin Zou, Jianfeng Wang, Xiaofeng Chen. 572-575 [doi]
- Emotion Recognition Algorithm Based on Neural Fuzzy Network and the Cloud TechnologyZhen-Xing Zhang, Joon S. Lim. 576-579 [doi]
- Research on the Application of an Improved Shortest Path Algorithmin Public Transport SystemLan Gao. 580-582 [doi]
- The Enterprise Personnel Management System Based on B/S DesignXue Zhang. 583-586 [doi]
- A Multi-instance Multi-label Learning Algorithm Based on Feature SelectionTong-tong Chen, Chanjuan Liu, Xin-miao Ding, Hailin Zou, Qian Shen, Ying Liu. 587-590 [doi]
- Research on Construction of Tibetan Sentiment CorpusTao Huang, Xiaodong Yan. 591-593 [doi]
- Tibetan Sentence Sentiment Analysis Based on the Maximum Entropy ModelXiaodong Yan, Tao Huang. 594-597 [doi]
- Virtual Network Embedding Based on Multi-objective Group Search OptimizerYa-zhou Li, Xiang-Wei Zheng, Dianjie Lu. 598-601 [doi]
- A Virtual Network Reconfiguration Algorithm to Improve Acceptance RatioHai-lin Zhu. 602-604 [doi]
- A Virtual Network Reconfiguration Algorithm Oriented to Energy ConsumptionZhen-hua Chen, Xiang-Wei Zheng, Xi-bin Chen. 605-609 [doi]
- A Semantic Orientation Distinction Method for Opinion Mining in Tibetan LanguageZhen Zhang, Lirong Qiu. 610-613 [doi]