Abstract is missing.
- A Hybrid Remote Rendering Approach for Graphic Applications on Cloud ComputingChin-Feng Lai, Han-Chieh Chao, Zong-Ruei Tsai, Ying Hsun Lai, Mohammad Mehedi Hassan. 3-17 [doi]
- A Policy-Based Application Service Management in Mobile Cloud BrokerWoojoong Kim, Chan-Hyun Youn. 18-28 [doi]
- Personalized Video Recommendations with Both Historical and New ItemsZhen Zhang, Zhongnan Huang, Guangyu Gao, Chi Harold Liu. 29-42 [doi]
- A VM Reservation-Based Cloud Service Broker and Its Performance EvaluationHeejae Kim, Yoonki Ha, Yusik Kim, Kyung-No Joo, Chan-Hyun Youn. 43-52 [doi]
- Virtualizing IMS Core and Its Performance AnalysisLingxia Liao, Victor C. M. Leung, Min Chen. 53-65 [doi]
- VM ^3 : Virtual Machine Multicast Migration Based on Comprehensive Load ForecastingFeng Guo, Dong Zhang, Zhengwei Liu, Kaiyuan Qi. 66-75 [doi]
- A Phased Workflow Scheduling Scheme with Task Division Policy in Cloud BrokerSeong-Hwan Kim, Kyung-No Joo, Yun-Gi Ha, Gyu-Beom Choi, Chan-Hyun Youn. 76-86 [doi]
- An Efficient Data Extracting Method Based on HadoopLianchao Cao, Zhanqiang Li, Kaiyuan Qi, Guomao Xin, Dong Zhang. 87-97 [doi]
- Based Big Data Analysis of Fraud Detection for Online Transaction OrdersQinghong Yang, Xiangquan Hu, Zhichao Cheng, Kang Miao, Xiaohong Zheng. 98-106 [doi]
- Question Classification Based on Hadoop PlatformXiangxiang Qi, Lei Su, Bin Yang, Jun Chen, Yiyang Li, Junhui Liu. 107-115 [doi]
- A Dynamic and Static Combined Replication Management Mechanism Based on Frequency AdaptiveZhenli He, Hua Zhou, Long Hu, Junhui Liu, Lei Su. 116-125 [doi]
- A Distributed Business Process Collaboration Architecture Based on Entropy in Cloud ComputingQi Mo, Fei Dai, Rui Zhu, Jian Da, Leilei Lin, Tong Li. 126-134 [doi]
- DSBAF: Running My Web Services in Your WS EnvironmentJunhui Liu, Zhenli He, Di Jiang, Lei Su. 135-144 [doi]
- Cloud-Based Iterative RFID Tag Search Protocol Using Bloom FiltersYuming Qian, Daqiang Zhang, Shengjie Zhao, Xiaopeng Fan, Ke-fan. 145-154 [doi]
- Design and Optimizations of the MD5 Crypt Cracking Algorithm Based on CUDARenjie Chen, Yu Zhang, Jianzhong Zhang, Jingdong Xu. 155-164 [doi]
- A Model of Cloud Computing Federation Based on Complex Network TheoryZhenli He, Hua Zhou, Yin Zhang, Junhui Liu, Lei Su. 165-174 [doi]
- The Implementation of IKEV2 for IPSecXiaojin Yang, Jianhua Liu. 175-180 [doi]
- Research and Design of Power Companies Unified Communications SystemHanshi Zhao, Jinglong Wu, Pan Deng, Ming Cai. 183-188 [doi]
- The Application of Inspection Robot in Substation InspectionYang Song, Pan Deng, Ming Cai, Feng Chen. 189-196 [doi]
- The Application of RFID and Two-Dimensional Bar Code in Substation InspectionDeyi Zou, Ming Cai, Feng Chen, Pan Deng, Huahua Ning. 197-203 [doi]
- Web Service Information Mining and Correlation Calculation Method StudyHuahua Ning, Feng Chen, Pan Deng, Yao Zhao, Wei Yuan, Chaofan Bi, Biying Yan. 204-215 [doi]
- A New Distributed Strategy to Schedule Computing ResourceQi Wang, Pan Deng, Qinghong Yang, Wei Yuan, Yaolong Nie, Chaofan Bi, Han-Chieh Chao. 216-224 [doi]
- An Algorithm to Detect the Automobiles Using the Copied Vehicle LicenseChaofan Bi, Wei Yuan, Biying Yan, Pan Deng, Feng Chen. 225-231 [doi]
- Research and Utilization on RFID Label in Substation InspectionZiwei Hu, Yang Wang, Xin Li, Dongmei Liu. 232-239 [doi]
- The Application of Inspection Platform in Substation InspectionYang Wang, Geng Zhang, Ziwei Hu, Dongmei Liu. 240-244 [doi]