Abstract is missing.
- Adaptive Multi-keyword Ranked Search Over Encrypted Cloud DataDaudi Mashauri, Ruixuan Li, Hongmu Han, Xiwu Gu, Zhiyong Xu, Cheng-Zhong Xu. 3-13 [doi]
- A Collaborated IPv6-Packets Matching Mechanism Base on Flow Label in OpenFlowWeifeng Sun, Huangping Wei, Zhenxing Ji, Qingqing Zhang, Chi Lin. 14-25 [doi]
- Traveller: A Novel Tourism Platform for Students Based on Cloud DataQi-Ying Hu, Chang-Dong Wang, Jia-Xin Hong, Meng-Zhe Hua, Di Huang. 26-35 [doi]
- Achieving Application-Level Utility Max-Min Fairness of Bandwidth Allocation in Datacenter NetworksWangying Ye, Fei Xu, Wei Zhang. 36-46 [doi]
- Cost-Effective Service Provisioning for Hybrid Cloud ApplicationsBin Luo, Yipei Niu, Fangming Liu. 47-56 [doi]
- On Rule Placement for Multi-path Routing in Software-Defined NetworksJie Zhang, Deze Zeng, Lin Gu, Hong Yao, Yuanyuan Fan. 59-71 [doi]
- Crowdstore: A Crowdsourcing Graph DatabaseVitaliy Liptchinsky, Benjamin Satzger, Stefan Schulte 0002, Schahram Dustdar. 72-81 [doi]
- An ARM-Based Hadoop Performance Evaluation Platform: Design and ImplementationXiaohu Fan, Si Chen, Shipeng Qi, Xincheng Luo, Jing Zeng, Hao Huang, Changsheng Xie. 82-94 [doi]
- Research on Service Organization Based on Decorator PatternJianxiao Liu, Zaiwen Feng, Zonglin Tian, Feng Liu, Xiaoxia Li. 95-105 [doi]
- Personalized QoS Prediction of Cloud Services via Learning Neighborhood-Based ModelHao Wu, Jun He, Bo Li, Yijian Pei. 106-117 [doi]
- Multi-core Accelerated Operational Transformation for Collaborative EditingWeiwei Cai, Fazhi He, Xiao Lv. 121-128 [doi]
- NFV: Near Field Vibration Based Group Device PairingZhiping Jiang, Jinsong Han, Wei Xi, Jizhong Zhao. 129-140 [doi]
- A Novel Method for Chinese Named Entity Recognition Based on Character VectorJing Lu, Mao Ye, Zhi Tang, Xiao-Jun Huang, Jia-Le Ma. 141-150 [doi]
- Android Apps Security Evaluation System in the CloudHao Wang, Tao Li, Tong Zhang, Jie Wang. 151-160 [doi]
- Protecting Privacy for Big Data in Body Sensor Networks: A Differential Privacy ApproachChi Lin, Zihao Song, Qing Liu, Weifeng Sun, Guowei Wu. 163-172 [doi]
- Characterizing Interference in a Campus WiFi Network via Mobile Crowd SensingChengwei Zhang, Dongsheng Qiu, Shiling Mao, Xiaojun Hei, Wenqing Cheng. 173-182 [doi]
- On Participant Selection for Minimum Cost Participatory Urban Sensing with Guaranteed Quality of InformationHong Yao, Changkai Zhang, Chao Liu, Qingzhong Liang, Xuesong Yan, Chengyu Hu. 183-194 [doi]
- \lambda -CoAP: An Internet of Things and Cloud Computing Integration Based on the Lambda Architecture and CoAPManuel Díaz, Cristian Martín, Bartolomé Rubio. 195-206 [doi]
- A Framework for Multiscale-, QoC- and Privacy-aware Context Dissemination in the Internet of ThingsSophie Chabridon, Denis Conan, Thierry Desprats, Mohamed Mbarki, Chantal Taconet, Léon Lim, Pierrick Marie, Sam Rottenberg. 207-218 [doi]
- SSG: Sensor Security Guard for Android SmartphonesBodong Li, Yuanyuan Zhang, Chen Lyu, Juanru Li, Dawu Gu. 221-233 [doi]
- Fast Secure Scalar Product Protocol with (almost) Optimal EfficiencyYouwen Zhu, Zhikuan Wang, Bilal Hassan, Yue Zhang, Jian Wang, Cheng Qian. 234-242 [doi]
- Efficient Secure Authenticated Key Exchange Without NAXOS' Approach Based on Decision Linear ProblemMojahed Mohamed, Xiaofen Wang, Xiaosong Zhang. 243-256 [doi]
- Towards Secure Distributed Hash TableZhe Wang, Naftaly H. Minsky. 257-266 [doi]
- An Anomaly Detection Model for Network Intrusions Using One-Class SVM and Scaling StrategyMing Zhang, Boyi Xu, Dongxia Wang. 267-278 [doi]
- Layered Consistency Management for Advanced Collaborative Compound Document AuthoringJohannes Klein 0001, Jean Botev, Steffen Rothkugel. 281-288 [doi]
- On Ambiguity Issues of Converting LaTeX Mathematical Formula to Content MathMLKai Wang, Xinfu Li, Xuedong Tian. 289-295 [doi]
- LTMF: Local-Based Tag Integration Model for RecommendationDeyuan Zheng, Huan Huo, Shangye Chen, Biao Xu, Liang Liu. 296-302 [doi]
- A Privacy-Friendly Model for an Efficient and Effective Activity Scheduling Inside Dynamic Virtual OrganizationsSalvatore F. Pileggi. 303-308 [doi]
- A Discovery Method of Service Bottleneck for Distributed ServiceJie Wang, Tao Li, Hao Wang, Tong Zhang. 309-316 [doi]
- A Collaborative Rear-End Collision Warning Algorithm in Vehicular Ad Hoc NetworksBinbin Zhou, Hexin Lv, Huafeng Chen, Ping Xu. 317-322 [doi]
- Analysis of Signaling Overhead and Performance Evaluation in Cellular Networks of WeChat SoftwareYuan Gao, Hong Ao, Jian Chu, Zhou Bo, Weigui Zhou, Yi Li. 323-328 [doi]
- Exploration of Applying Crowdsourcing in Geosciences: A Case Study of Qinghai-Tibetan Lake ExtractionJianghua Zhao, Xuezhi Wang, Qinghui Lin, Jianhui Li. 329-334 [doi]