Abstract is missing.
- C++ Memory Check tool based on Dynamic Binary Instrumentation PlatformJingling Zhao, Lei He, Bing He. 3-11 [doi]
- A program behavior recognition algorithm based on assembly instruction sequence similarityBaojiang Cui, Chong Wang, Guowei Dong, Jinxin Ma. 13-20 [doi]
- Energy-aware Migration of Virtual Machines in a ClusterDilawaer Duolikun, Shigenari Nakamura, Ryo Watanabe, Tomoya Enokido, Makoto Takizawa. 21-32 [doi]
- An Energy-efficient Migration Model of Processes with Virtual Machines in a Server ClusterRyo Watanabe, Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa. 33-44 [doi]
- Energy-aware Server Selection Algorithms for Storage and Computation ProcessesAtsuhiro Sawada, Hiroki Kataoka, Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa. 45-56 [doi]
- Topic-based Synchronization (TBS) Protocols to Prevent Illegal Information Flow in Peer-to-Peer Publish/Subscribe SystemsShigenari Nakamura, Tomoya Enokido, Makoto Takizawa. 57-68 [doi]
- Load-aware ACB Scheme for M2M Traffic in LTE-A NetworksLijun Song, Wenan Zhou, Yanjun Hou, Mengyu Gao. 69-80 [doi]
- An Energy-Efficient Macro-assisted Sleep-Mode Scheme in Heterogeneous NetworksXuhui Yang, Wenan Zhou, Da Li. 81-91 [doi]
- A QoE Estimation Model for Video Streaming over 5G Millimeter Wave NetworkYanjun Hou, Wenan Zhou, Lijun Song, Mengyu Gao. 93-104 [doi]
- An Energy-Efficient Process Replication Algorithm in Virtual Machine EnvironmentsTomoya Enokido, Makoto Takizawa. 105-114 [doi]
- Comparison Analysis by WMN-GA Simulation System for Different WMN Architectures, Distributions and Routing Protocols Considering TCPTetsuya Oda, Admir Barolli, Ryoichiro Obukata, Leonard Barolli, Fatos Xhafa, Makoto Takizawa. 115-127 [doi]
- Comparison Analysis by WMN-GA Simulation System for Different WMN Architectures, Normal and Uniform Distributions, DCF and EDCA FunctionsAdmir Barolli, Tetsuya Oda, Makoto Ikeda, Leonard Barolli, Fatos Xhafa, Makoto Takizawa. 129-142 [doi]
- A GA-Based Simulation System for WMNs: Performance Analysis for Different WMN Architectures Considering Uniform Distribution, Transmission Rate and OLSR ProtocolKeita Matsuo, Tetsuya Oda, Admir Barolli, Makoto Ikeda, Leonard Barolli, Fatos Xhafa. 143-152 [doi]
- Effect of Node Density and Node Movement Model on Performance of a VDTNKevin Bylykbashi, Evjola Spaho, Leonard Barolli, Makoto Takizawa. 153-161 [doi]
- A Fuzzy-Based Simulation System for Actor Selection in Wireless Sensor and Actor Networks Considering as a New Parameter Density of Actor NodesDonald Elmazi, Tetsuya Oda, Evjola Spaho, Elis Kulla, Makoto Ikeda, Leonard Barolli. 163-174 [doi]
- A Fuzzy-based System for Qualified Voting in P2P Mobile Collaborative TeamYi Liu, Tetsuya Oda, Keita Matsuo, Leonard Barolli, Fatos Xhafa. 175-186 [doi]
- An Integrated Simulation System Considering WMN-PSO Simulation System and Network Simulator 3Shinji Sakamoto, Tetsuya Oda, Makoto Ikeda, Leonard Barolli, Fatos Xhafa. 187-198 [doi]
- Impact of Delayed Acknowledgment for Message Suppression in Vehicular-DTNDaichi Koga, Makoto Ikeda, Leonard Barolli. 199-208 [doi]
- Reputation based Access Control in Social Networks for Persona ManagementKeonsoo Lee, Yunyoung Nam. 209-214 [doi]
- The Automatic Text Summarization Using Semantic Relevance And Hierarchical Structure Of WordnetJunSeok Cha, Pan-Koo Kim. 215-222 [doi]
- Korean spelling error correction using a Hangul similarity algorithmSeungHyeon Bak, Pan-Koo Kim. 223-229 [doi]
- A Comprehensive Security Analysis Checksheet for OpenFlow NetworksYoshiaki Hori, Seiichiro Mizoguchi, Ryosuke Miyazaki, Akira Yamada, Yaokai Feng, Ayumu Kubota, Kouichi Sakurai. 231-242 [doi]
- Enhanced energy conditioned mean square error algorithm for wireless sensor networksDuha Binte Asim, Nadeem Javaid. 243-254 [doi]
- In-Vehicle Cloudlet Computing based on Delay Tolerant Network Protocol for Disaster Information SystemMasaki Otomo, Goshi Sato, Yoshitaka Shibata. 255-266 [doi]
- Towards Heuristic Algorithms: GA, WDO, BPSO, and BFOA for Home Energy Management in Smart GridMudassar Naseem, Samia Abid, Rabiya Khalid, Ghulam Hafeez, Sardar Mahboob Hussain, Nadeem Javaid. 267-278 [doi]
- Network lifetime maximization via energy hole alleviation in wireless sensor networksMuhammad Awais Khan, Arshad Sher, Ahmad Raza Hameed, Naeem Jan, Junaid Shabir Abassi, Nadeem Javaid. 279-290 [doi]
- A Smart Card-Based Three-Party Quantum Key Distribution ProtocolHeri Wijayanto, Hsing-Chung Chen, Wen-Yen Lin. 291-301 [doi]
- TCP with network coding meets loss burstiness estimation for lossy networksNguyen Viet Ha, Kazumi Kumazoe, Masato Tsuru. 303-314 [doi]
- Reduction of Network Traffic by Using the Peer Cache Mechanism in Co-located Collaborative Web Search on SmartphonesTsuyoshi Donen, Shingo Otsubo, Ryo Nishide, Hideyuki Takada. 315-322 [doi]
- Building a Content Delivery Network among Tens of Nearby Devices Using MultihopWireless CommunicationYuki Takeda, Syuhei Yamamoto, Ryo Nishide, Hideyuki Takada. 323-330 [doi]
- A Workbook Design for Fill-in-Blank Problems in Java Programming Learning Assistant SystemNobuo Funabiki, Minako Dake, Khin Khin Zaw, Wen-Chung Kao. 331-342 [doi]
- Design and implementation of software consistency detection system based on Netty frameworkJun Yang, Haipeng Zhang, Lifang Han, Baojiang Cui, Guowei Dong. 343-351 [doi]
- The generation of XSS attacks developing in the detect detectionBaojiang Cui, Yang Wei, Songling Shan, Jinxin Ma. 353-361 [doi]
- Searchable Public Key Encryption Scheme with Data Integrity CheckingJun Yang, Shujuan Li. 363-370 [doi]
- An Attack Detection System for Multiple Web Applications Based on Big Data PlatformXiaohui Jin, Congxian Yin, Pengpeng Yang, Baojiang Cui. 371-376 [doi]
- Cognitive Countermeasures against BAD USBYeunsu Lee, Hyeji Lee, Kyungroul Lee, Kangbin Yim. 377-386 [doi]
- Security Assessment on the Mouse Data using Mouse LoggersHyeji Lee, Yeunsu Lee, Kyungroul Lee, Kangbin Yim. 387-393 [doi]
- Security Assessment of Keyboard Data Based on Kaspersky ProductSeungho Lee, Kyungroul Lee, Kangbin Yim. 395-400 [doi]
- The Detection Technology of LTE based Stratified FuzzJun Yang, Haixia Yang, Qinshu Xiao. 401-409 [doi]
- Secure Multi-Protocol Mapping Gateway in Smart GridJin Cheol Kim, Sung Wan Park, Yong-Gu Lee, Seung-Won Lee. 411-418 [doi]
- An Adaptive DoS Attack Mitigation Measure for Field Networks in Smart GridsGunee Lee, Yun-Sam Kim, JungMin Kang. 419-428 [doi]
- Analysis on Attack Scenarios and Countermeasures for Self-driving Car and Its InfrastructuresDohyun Lim, Kitaek Park, DongJun Choi, Jungtaek Seo. 429-442 [doi]
- Lightweight IEC 61850 Secure Communication Module for MicrogridsYun-Sam Kim, Gunhee Lee, JungMin Kang. 443-451 [doi]
- A New Approach to Building a Disguised Server Using the Honey Port Against General Scanning AttacksHyun Soo Park, Young Bae Jeon, Ji Won Yoon. 453-465 [doi]
- Password Authentication Using One-Time Key-Based Signature and Homomorphic EncryptionJong-Hyuk Im, Mun-Kyu Lee. 467-474 [doi]
- On-line Voting System with Illegal Ballot Filtering Using Homomorphic EncryptionMun-Kyu Lee, Jong-Hyuk Im. 475-482 [doi]
- Real-Time Malicious Script Blocking Technology at the Host-LevelSanghwan Oh, HanChul Bae, Seongmin Park, Hwankuk Kim. 483-490 [doi]
- A Probabilistic Encounter and Distance-based Routing Protocol for Opportunistic NetworksSanjay Kumar Dhurandher, Satya Jyoti Borah, Isaac Woungang, Sahil Gupta, Pragya Kuchal, Makoto Takizawa, Leonard Barolli. 491-499 [doi]
- Comparison of Biometric and Linguistic Secret Sharing ProtocolsLidia Ogiela, Marek R. Ogiela, Urszula Ogiela. 501-505 [doi]
- Concealing Additional Secrets Using Sharing Approach in SteganographyMarek R. Ogiela, Katarzyna Koptyra. 507-512 [doi]
- Enhance Robotics ability in Hand Gesture Recognition by Using Leap Motion ControllerAlaa Ahmed Almarzuqi, Seyed Mohammed Buhari. 513-523 [doi]
- Fast Signature Verification with Shared Implicit Certificates for Vehicular CommunicationHee-Yong Kwon, Mun-Kyu Lee. 525-533 [doi]
- Design of an Adhoc Testbed for IoT and WSAN Applications Using Raspberry PiHiroya Oda, Elis Kulla, Ryo Ozaki, Noritaka Nishihara. 535-546 [doi]
- Performance Evaluation of an IoT-Based E-Learning Testbed Using Mean Shift Clustering Approach Considering Electroencephalogram DataMasafumi Yamada, Tetsuya Oda, Yi Liu, Keita Matsuo, Leonard Barolli. 549-557 [doi]
- A Testbed for Admission Control in WLAN: A Fuzzy Approach and Its Performance EvaluationTakaaki Inaba, Shinji Sakamoto, Tetsuya Oda, Makoto Ikeda, Leonard Barolli. 559-571 [doi]
- Simple Energy-efficient Server Selection Algorithm in a Scalable ClusterHiroki Kataoka, Atsuhiro Sawada, Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa. 573-584 [doi]
- An Energy-efficient and Reliable Protocol in Wireless NetworksEmi Ogawa, Shigenari Nakamura, Makoto Takizawa. 585-592 [doi]
- Proposal of Collaborative Object Tracking Methods by Multi-Drones for Flight Surveillance SystemsTomoki Okutake, Noriki Uchida, Noriyasu Yamamoto. 593-600 [doi]
- Performance Evaluation of a DTN Based Multi-hop Network for Disaster Information Transmission by Smart DevicesShinya Kitada, Goshi Sato, Yoshitaka Shibata. 601-611 [doi]
- OpenFlow Mesh for Metabolic ComputingMinoru Uehara. 613-620 [doi]
- Performance Evaluation of an AmI Testbed for Improving QoL: Evaluation Using Clustering Approach Considering Parallel ProcessingRyoichiro Obukata, Tetsuya Oda, Donald Elmazi, Makoto Ikeda, Leonard Barolli. 623-630 [doi]
- Variable Neighborhood Search Algorithms for the Node Placement Problem in Multihop NetworksKengo Katayama, Yusuke Okamoto, Elis Kulla, Noritaka Nishihara. 631-638 [doi]
- Performance Evaluation of VANETs in Different Real Map ScenariosRyuji Ono, Elis Kulla, Evjola Spaho. 639-647 [doi]
- Error Performance of Successive Interference Cancellation Schemes in MIMO SystemsSangjoon Park, Kangbin Yim, Byeong-Gwon Kang. 649-655 [doi]
- A Study on the Classification of Common Vulnerabilities and Exposures using Naïve BayesSarang Na, Taeeun Kim, Hwankuk Kim. 657-662 [doi]
- A Study on The behavior-based Malware Detection SignatureSungtaek Oh, Woong Go, TaeJin Lee. 663-670 [doi]
- Design and Implementation of a Simulation System Based on Genetic Algorithm for Node Placement in Wireless Sensor and Actor NetworksKosuke Ozera, Tetsuya Oda, Donald Elmazi, Leonard Barolli. 673-682 [doi]
- VegeShop Tool: A Tool for Vegetable Recognition Using DNNYuki Sakai, Tetsuya Oda, Makoto Ikeda, Leonard Barolli. 683-691 [doi]
- A Fuzzy-Based Wireless Sensor and Actuator Network: Simulation and Experimental ResultsKeisuke Ebisu, Takaaki Inaba, Donald Elmazi, Makoto Ikeda, Leonard Barolli, Elis Kulla. 693-701 [doi]
- Numerical Analysis of Resonance Characteristics in Cavities in Periodic Structure for WDM Telecommunication SystemHiroshi Maeda, Kazuya Tomiura, Jianming Jin. 703-710 [doi]
- Spectrum Analysis of Envelope Pulse After Propagating in Nonlinear Dielectric MaterialHiroshi Maeda, Jianming Jin, Kazuya Tomiura. 711-718 [doi]
- Device Parameter based Secure User AuthenticationKun-Lin Tsai, Fang-Yie Leu, King-Shing Yip. 721-730 [doi]
- Data Preprocessing Quality Management Procedure for Improving Big Data Applications Efficiency and PracticalitySen-Tarng Lai, Fang-Yie Leu. 731-738 [doi]
- Inferring Smartphone User Demographics from Wi-Fi trace Logs: A Study of Users' Privacy ConcernsCheng-Ying Hsu, Shang-En Yang, Hung-Yuan Chen, Fang-Yie Leu, Yao-Chung Fan. 739-746 [doi]
- Enhancing Security of LTE using a Double Masking TechniqueJung-Chun Liu, Yi-Li Huang, Fang-Yie Leu. 747-754 [doi]
- The effective flock control by two sheepdogsHaruka Watanabe, Kaoru Fujioka. 757-762 [doi]
- Design and Control of an Omnidirectional Wheelchair for Moving in Room Narrow SpacesKeita Matsuo, Leonard Barolli. 763-774 [doi]
- Development of Training System for Pedaling Skill by Visualizing Muscle Activity PatternTakuhiro Sato, Shoma Kushizaki, Shimpei Matsumoto, Tomoki Kitawaki, Tatsushi Tokuyasu. 775-782 [doi]
- Proposal for a strategy to discover the students with need for a learning support by using text analysisChicako Miyamoto, Naoko Furukawa, Tatsushi Tokuyasu. 783-788 [doi]
- Construction of Boolean Functions with Optimal Algebraic ImmunityHang Liu, Dong Zheng, Qinglan Zhao. 791-798 [doi]
- Location-Sensitive Data Sharing in Mobile Cloud ComputingZhiwei Zhang, Yunling Wang, Jianfeng Wang, Xiaofeng Chen 0001, Jianfeng Ma. 799-805 [doi]
- Efficient and Expressive Anonymous Attribute-Based Encryption for Mobile Cloud ComputingYinghui Zhang, Dong Zheng. 807-814 [doi]
- Flexible Attribute-Based Keyword Search via Two Access PoliciesPeilin Zhou, Zhenhua Liu, Shuhong Duan. 815-822 [doi]
- Large Universe Revocable Fine-Grained Encryption with Public AuditingXuewei Yan, Hua Ma, Zhenhua Liu, Ting Peng. 823-830 [doi]
- A privacy-preserving personal health record with searchability and revocability using attribute-based encryptionShuhong Duan, Zhenhua Liu, Peilin Zhou. 831-838 [doi]
- Security Analysis and Improvement of A Collusion-Resistant Identity-Based Proxy Re-Encryption SchemeLinchao Zhang, Hua Ma, Zhenhua Liu, Enting Dong. 839-846 [doi]
- A Provably Secure Two-Factor Authenticated Key Exchange Protocol for Wireless Sensor Networks Based on Authenticated EncryptionFushan Wei, Ruijie Zhang, Jian Shen. 849-855 [doi]
- Three elliptic curve cryptography-based RFID authentication protocols for Internet of ThingsRui An, Hui Feng, Qin Liu, Li Li. 857-878 [doi]
- On the Security of Three-factor Authentication Scheme for Telecare Medical Information SystemsQi Jiang 0001, Bingyan Li, Jianfeng Ma. 879-884 [doi]
- Oblivious Transfer Protocols Based on Group Factoring ProblemJing Li, Xiong Li, Licheng Wang, Debiao He, Xinxin Niu. 885-892 [doi]
- E-Voting Scheme Using Secret Sharing and K-AnonymityQuanyu Zhao, Yining Liu. 893-900 [doi]