Abstract is missing.
- Adaptive Management of Energy PacketsErol Gelenbe. 1-6 [doi]
- Design of Intelligent Checkers to Enhance the Security and Safety of Cyber Physical SystemsGiedre Sabaliauskaite, Aditya P. Mathur. 7-12 [doi]
- Countermeasures to Enhance Cyber-physical System Security and SafetyGiedre Sabaliauskaite, Aditya P. Mathur. 13-18 [doi]
- Controlling and Being Creative: Software Cybernetics and Creative ComputingHongji Yang, Lu Zhang. 19-24 [doi]
- A Study on Migration Technique Using Program Slicing for Large-Scale Information and Control SystemsTomoyuki Mochizuki, Akitoshi Shimura, Takayuki Takezawa. 25-30 [doi]
- A History-Based Dynamic Random Software TestingLei Zhang, Bei-Bei Yin, Junpeng Lv, Kai-Yuan Cai, Stephen S. Yau, Jia Yu. 31-36 [doi]
- Dynamic Random Testing with Parameter AdjustmentZijiang Yang, Bei-Bei Yin, Junpeng Lv, Kai-Yuan Cai, Stephen S. Yau, Jia Yu. 37-42 [doi]
- Fair Optimization - Methodological Foundations of Fairness in Network Resource AllocationWlodzimierz Ogryczak. 43-48 [doi]
- Maxmin Fairness under Priority for Network Resource Allocation TasksMario Köppen, Kei Ohnishi, Masato Tsuru. 49-54 [doi]
- Modeling of Dynamic Trend of Latency Variations on Mobile Network Using Markov Regime SwitchingHiroshi Yamamoto, Chie Hidano, Shigehiro Ano, Katsuyuki Yamazaki. 55-60 [doi]
- Toy Block Networking: Easily Deploying Diverse Network Functions in Programmable NetworksMasaki Fukushima, Yoshiaki Yoshida, Atsushi Tagami, Shu Yamamoto, Akihiro Nakao. 61-66 [doi]
- Bridging the Gap between Low-Level Network Traffic Data Acquisition and Higher-Level FrameworksRuediger Gad, Martin Kappes, Inmaculada Medina-Bulo. 67-72 [doi]
- A Mobility Management System for the Global Live Migration of Virtual Machine across Multiple SitesTohru Kondo, Reiji Aibara, Kazufumi Suga, Kaori Maeda. 73-77 [doi]
- Implementation and Evaluation of Secure Outsourcing Scheme for Secret Sharing Scheme on Cloud Storage ServicesToshihiro Ohigashi, Kouji Nishimura, Reiji Aibara, Kouta Yoshida. 78-83 [doi]
- Deploying OpenStack: Virtual Infrastructure or Dedicated HardwareRobayet Nasim, Andreas J. Kassler. 84-89 [doi]
- A Technique to Assign an Appropriate Server to a Client, for a CDN Consists of Servers at the Global Internet and Hierarchical Private NetworksTakashi Yamanoue, Yuuri Koarata, Kentaro Oda, Koichi Shimozono. 90-95 [doi]
- Computer Ethics Video Clips for University Students in Japan from 2003 until 2013Takashi Yamanoue, Izumi Fuse, Shigeto Okabe, Atsushi Nakamura, Michio Nakanishi, Shozo Fukada, Takahiro Tagawa, Tatsumi Takeo, Ikuya Murata, Tetsutaro Uehara, Tsuneo Yamada, Hiroshi Ueda. 96-101 [doi]
- Static Code Analysis for Software Security Verification: Problems and ApproachesZeineb Zhioua, Stuart Short, Yves Roudier. 102-109 [doi]
- Security by Design for the Smart Grid: Combining the SGAM and NISTIR 7628Mathias Uslar, Christine Rosinger, Stefanie Schlegel. 110-115 [doi]
- Introducing Code Assets of a New White-Box Security Modeling LanguageHe Sun, Lin Liu, Letong Feng, Yuan Xiang Gu. 116-121 [doi]
- A Security Oriented Design (SOD) Framework for eHealth SystemsWeider D. Yu, Lavanya Davuluri, Monica Radhakrishnan, Maryam Runiassy. 122-127 [doi]
- Bayesian Model Averaging of Bayesian Network Classifiers for Intrusion DetectionLiyuan Xiao, Yetian Chen, Carl K. Chang. 128-133 [doi]
- DCAFE: A Distributed Cyber Security Automation Framework for ExperimentsGeorge Rush, Daniel R. Tauritz, Alexander D. Kent. 134-139 [doi]
- Quantification of Information Flow in a Smart GridLi Feng, Bruce McMillin. 140-145 [doi]
- A Privacy-Preserving Solution for Tracking People in Critical EnvironmentsFrancesco Buccafurri, Gianluca Lax, Serena Nicolazzo, Antonino Nocera. 146-151 [doi]
- Access Control Model for the My Number National Identification Program in JapanSumiko Miyata, Kazuhiro Suzuki, Tetsuya Morizumi, Hirotsugu Kinoshita. 152-157 [doi]
- Improvement of the Integrity Verification Application Using Timestamp Mechanism for Distributed File SystemHidenobu Watanabe, Tsukasa Iwama, Ken T. Murata, Shigenori Ushiyama, Yasushi Muto. 158-163 [doi]
- Secret Key Steganography with Message Obfuscation by Pseudo-random Number GeneratorsJuan M. Gutierrez-Cardenas. 164-168 [doi]
- Certificate-Based, Disruption-Tolerant Authentication System with Automatic CA Certificate Distribution for EduroamHao Liu, Hideaki Goto. 169-173 [doi]
- Centralized Online Sign-Up and Client Certificate Issuing System for EduroamTomo Niizuma, Hideaki Goto. 174-179 [doi]
- Modeling the Cost Structure of Identity ProofingMasaki Shimaoka, Noboru Sonehara. 180-185 [doi]
- Dripcast - Server-less Java Programming Framework for Billions of IoT DevicesIkuo Nakagawa, Masahiro Hiji, Hiroshi Esaki. 186-191 [doi]
- The Concept of a Mobility Data Cloud: Design, Implementation and TrialsNikolay Tcholtchev, Benjamin Dittwald, Thomas Scheel, Begum Ilke Zilci, Danilo Schmidt, Philipp Lammel, Jurma Jacobsen, Ina Schieferdecker. 192-198 [doi]
- Big Data in Memory: Benchmarking in Memory Database Using the Distributed Key-Value Store for Constructing a Large Scale Information InfrastructureMichiaki Iwazume, Takahiro Iwase, Kouji Tanaka, Hideaki Fujii. 199-204 [doi]
- Expert Mining for Evaluating Risk Indicators ScenariosOscar Franco-Bedoya, Dolors Costal, Soraya Hidalgo, Ron Ben-Jacob. 205-210 [doi]
- Building a Community: The Moodbile PerspectiveNikolas Galanis, María José Casany Guerrero, Marc Alier Forment, Enric Mayol. 211-216 [doi]
- Risk Measure Propagation through Organisational NetworkLuba Shabnam, Farzana Haque, Moshiur Bhuiyan, Aneesh Krishna. 217-222 [doi]
- The Application of Internet of Things in Social NetworkYu Zhang, Jiangtao Wen, Fan Mo. 223-228 [doi]
- Cross-Domain Scientific Collaborations Prediction with Citation InformationYing Guo, Xi Chen. 229-233 [doi]
- An Enterprise Social Recommendation System for Connecting Swedish ProfessionalsNima Dokoohaki, Mihhail Matskin, Usman Afzal, Md. Mustakimul Islam. 234-239 [doi]
- How Overlapping Community Structure Affects Epidemic Spreading in Complex NetworksJiaxing Shang, Lianchen Liu, Feng Xie, Cheng Wu. 240-245 [doi]
- Automated Generation of User-Interface Prototypes Based on Controlled Natural Language DescriptionReyes Juárez-Ramírez, Carlos Huertas, Sergio Inzunza. 246-251 [doi]
- Exploiting Reinforcement Learning to Profile Users and Personalize Web PagesStefano Ferretti, Silvia Mirri, Catia Prandi, Paola Salomoni. 252-257 [doi]
- Physiological Mouse: Towards an Emotion-Aware MouseYujun Fu, Hong Va Leong, Grace Ngai, Michael Xuelin Huang, Stephen C. F. Chan. 258-263 [doi]
- Towards a User Model for the Design of Adaptive Interfaces for Autistic UsersAndres Mejia Figueroa, Reyes Juarez-Ramirez. 264-269 [doi]
- Text-Based CAPTCHA Using Phonemic Restoration Effect and Similar SoundsMisako Goto, Toru Shirato, Ryuya Uda. 270-275 [doi]
- Improvement of Personal Identification by Flick Input with Acceleration SensorNozomi Takeuchi, Shuhei Kobata, Ryuya Uda. 276-281 [doi]
- Designing Interpersonal Communication Software for the Abilities of Elderly UsersDrew Williams, Sheikh Iqbal Ahamed, William C. Chu. 282-287 [doi]
- Designing of a Network-Aware Cloud Robotic Sensor Observation FrameworkFredrik Nordlund, Manabu Higashida, Yuuichi Teranishi, Shinji Shimojo, Masanori Yokoyama, Michio Shimomura. 288-294 [doi]
- Managing Heterogeneous Sensor Data on a Big Data Platform: IoT Services for Data-Intensive ScienceSulayman K. Sowe, Takashi Kimata, Mianxiong Dong, Koji Zettsu. 295-300 [doi]
- m-cloud - Distributed Statistical Computation Using Multiple Cloud ComputersIkuo Nakagawa, Masahiro Hiji, Yutaka Kikuchi, Masahiro Fukumoto, Shinji Shimojo. 301-305 [doi]
- Facility Information Management on HBase: Large-Scale Storage for Time-Series DataHideya Ochiai, Hiroyuki Ikegami, Yuuichi Teranishi, Hiroshi Esaki. 306-311 [doi]
- Towards a User-Friendly Loading System for the Analysis of Big Data in the Internet of ThingsMarco Mesiti, Stefano Valtolina. 312-317 [doi]
- Load-Adaptive Indexing Method for Schema-less SearchesYutaka Arakawa, Takayuki Nakamura, Motonori Nakamura, Nobuhiko Matsuura, Yuusuke Kawakita, Haruhisa Ichikawa. 318-324 [doi]
- Digital Fingerprinting on Executable File for Tracking Illegal UproadersMasayuki Tsubouchi, Tomotaka Maeda, Yasuo Okabe. 325-330 [doi]
- An Evaluation of Side-Information Assisted Forensic Hash MatchingJohan Garcia. 331-336 [doi]
- Evolving Decision Trees for the Categorization of SoftwareJasenko Hosic, Daniel R. Tauritz, Samuel A. Mulder. 337-342 [doi]
- Proposal and Evaluation of Safe and Efficient Log Signature Scheme for the Preservation of EvidenceNaoki Kobayashi, Ryoichi Sasaki. 343-347 [doi]
- A Safety Food Consumption Mobile System through Semantic Web TechnologyDuygu Çelik, Atilla Elçi, Ridvan Akcicek, Bora Gokce, Pelin Hurcan. 348-353 [doi]
- Mobile Pediatric Consultation and Monitoring System through Semantic Web TechnologyDuygu Çelik, Atilla Elçi, Ridvan Akcicek, Bora Gokce, Pelin Hurcan. 354-359 [doi]
- Using the Semantics Inherent in Sitemaps to Learn OntologiesAbdulelah A. Algosaibi, Austin C. Melton. 360-365 [doi]
- Synthesis of Pareto Efficient Technical Architectures for Multi-core SystemsSergey Zverlov, Sebastian Voss. 366-371 [doi]
- Towards Context-Oriented Self-Adaptation in Resource-Constrained Cyberphysical SystemsMikhail Afanasov, Luca Mottola, Carlo Ghezzi. 372-377 [doi]
- Towards a Common Software-to-Hardware Allocation Framework for the Heterogeneous High Performance ComputingZdravko Krpic, Ivica Crnkovic, Jan Carlson. 378-383 [doi]
- Identifying Evolution Problems for Large Long Term Industrial Evolution SystemsDaniel Hallmans, Marcus Jagemar, Stig Larsson, Thomas Nolte. 384-389 [doi]
- Variable Factors of Influence in Product Line DevelopmentFranz-Felix Fussl, Jirka Ciemala. 390-395 [doi]
- The Problem of Handling Multiple Headers in WS-Security ImplementationsErnesto Damiani, Valerio Coviello, Fulvio Frati, Claudio Santacesaria. 396-400 [doi]
- A Socio-technical Methodology for the Security and Privacy Analysis of ServicesGiampaolo Bella, Paul Curzon, Rosario Giustolisi, Gabriele Lenzini. 401-406 [doi]
- I Was Confused: Robust Accountability for Permission Delegation in Cloud FederationsSamane Abdi. 407-412 [doi]
- Integration of Heterogeneous Policies for Trust ManagementSamane Abdi. 413-419 [doi]
- What Is the Impact of Heterogeneous Knowledge about Fundamentals on Market Liquidity and Efficiency: An ABM ApproachVivien Lespagnol, Juliette Rouchier. 420-425 [doi]
- A Study on Filtering of the Effect Range with the Package Insert of the MedicineTakashi Ikoma, Masakazu Takahashi, Kazuhiko Tsuda. 426-431 [doi]
- Learning Agents for Human Complex SystemsIris Lorscheid. 432-437 [doi]
- Heuristics for Designing and Evaluating Socio-technical Agent-Oriented Behaviour Models with Coloured Petri NetsMsury Mahunnah, Alex Norta, Lixin Ma, Kuldar Taveter. 438-443 [doi]
- Analyzing the Role of Noise Trader in Financial Markets through Agent-Based ModellingHiroshi Takahashi. 444-449 [doi]
- Emergence of Fashion Cycle by Agent-Based Model of WoM DisseminationTakashi Yoshida, Setsuya Kurahashi. 450-455 [doi]
- Chartists and Fundamentalists in an Agent Based Herding ModelSouhir Masmoudi. 456-461 [doi]
- Heterogeneity in Lowest Unique Integer GameTakashi Yamada, Nobuyuki Hanaki. 462-467 [doi]
- A Multi-dimensional Component Importance Analysis Mechanism for Component Based SystemsXin Zhang. 468-473 [doi]
- A SysML Based Requirement Modeling Automatic Transformation ApproachChih-Hung Chang, Chih-Wei Lu, Wen Pin Yang, William Cheng-Chung Chu, Chao-Tung Yang, Ching-Tsorng Tsai, Pao-Ann Hsiung. 474-479 [doi]
- Analyzing Artifact Anomalies in a Temporal Structural Workflow for SBSFeng-Jian Wang, Parameswaramma Mandalapu. 480-485 [doi]
- A Framework of Patterns Applicability in Software DevelopmentHossam Hakeem, Hui Guan, Hongji Yang. 486-491 [doi]
- Reverse Engineering Web Applications for Security Mechanism EnhancementHui Guan, Hongji Yang, Hossam Hakeem. 492-497 [doi]
- Comparing Reuse Strategies: An Empirical Evaluation of Developer ViewsJulia F. Varnell-Sarjeant, Anneliese Amschler Andrews, Andreas Stefik. 498-503 [doi]
- Modeling a Safety- and Automotive-Oriented Process Line to Enable Reuse and Flexible Process DerivationBarbara Gallina, Shaghayegh Kashiyarandi, Helmut Martin, Robert Bramberger. 504-509 [doi]
- Critical Evaluation on jClouds and Cloudify Abstract APIs against EC2, Azure and HP-CloudSteven Thomas Graham, Xiaodong Liu. 510-515 [doi]
- Institution Theory for Services Oriented ApplicationsAmine Achouri, Yousra Bendaly Hlaoui, Leila Jemni Ben Ayed. 516-521 [doi]
- Towards Feature-Oriented Fault Tree AnalysisBenjamin Behringer, Martina Lehser, Steffen Rothkugel. 522-527 [doi]
- Integrating the Modelica DSL into a Platform for Model-Based Tool InteroperabilityNikolay Tcholtchev, Grit Dudeck, Michael Wagner 0006, Christian Hein, Arun Prakash, Tom Ritter. 528-534 [doi]
- Requirements Model Oriented System Generation Tool and Its Practical EvaluationShinobu Saito, Jun Hagiwara, Tomoki Yagasaki, Katsuyuki Natsukawa. 535-540 [doi]
- Using TTCN-3 to Test SPDY Protocol Interaction PropertySumei Zhang, Hua Li, Yu Xue, Xianrong Wang. 541-546 [doi]
- A Hazard Detection Method for Bicycles by Using Probe BicycleShigeo Kaneda, Shohei Asada, Akira Yamamoto, Yuta Kawachi, Yusuke Tabata. 547-551 [doi]
- An Ironing Support System with Superimposed Information for BeginnersKimie Suzuki, Kaori Fujinami. 552-557 [doi]
- A Hybrid Device Profile Detection Method and Its ApplicationsNaofumi Yoshida, Naoki Ishibashi, Norihiro Ishikawa. 558-560 [doi]
- A Study of On-Vehicle Information Devices Using a SmartphoneTakatomo Yamabe, Ryozo Kiyohara. 561-566 [doi]
- An API Design Process in Terms of Usability: A Case Study on Building More Usable APIs for Smart TV PlatformSunghoon Lee, SangHee Lee, Sumi Lim, Jiyoung Jung, SangHo Choi, Neunghoe Kim, Jung-Been Lee. 567-571 [doi]
- Design and Implementation of Event Information Summarization SystemChenyi Liao, Katsuhiko Kaji, Kei Hiroi, Nobuo Kawaguchi. 572-577 [doi]
- Metadata for Energy DisaggregationJack Kelly, William J. Knottenbelt. 578-583 [doi]
- Customizable Web-Based System to Federate Smart Devices and PeripheralsHidenobu Ito, Kazuaki Nimura. 584-589 [doi]
- A Power Allocation Management System Using an Algorithm for the Knapsack ProblemNaoyuki Morimoto, Yuu Fujita, Masaaki Yoshida, Hiroyuki Yoshimizu, Masafumi Takiyamada, Terukazu Akehi, Masami Tanaka. 590-595 [doi]
- A Rapid Prototyping Approach for Smart Energy Systems Based on Partial System ModelsGeorg Hackenberg, Maximilian Irlbeck, Vasileios Koutsoumpas, Denis Bytschkow. 596-601 [doi]
- Dynamic Adaptive Management of Buffer for QoS Guarantees and Energy ReductionWael Zouaoui, Carolina Albea-Sanchez, Yann Labit. 602-607 [doi]
- Profile-Based Scalable Video Adaptation Employing MD-FEC Interleaving over Loss-Burst ChannelsSheau-Ru Tong, Huan-Wen Chen, Cheng-Han Yang. 608-613 [doi]
- An Evaluation of Adaptive Traffic Engineering for Delivering High Bandwidth Movie on Overlay Routing NetworkHiroki Kashiwazaki, Yoshiaki Takai. 614-619 [doi]
- An Adaptive XACMLv3 Policy Enforcement PointRomain Laborde, Bashar Kabbani, François Barrère, Abdelmalek Benzekri. 620-625 [doi]
- Testing Java Exceptions: An Instrumentation TechniqueAlexandre Locci Martins, Simone Hanazumi, Ana Cristina Vieira de Melo. 626-631 [doi]
- Automated Generation of Integration Test Sequences from Logical ContractsDianxiang Xu, Weifeng Xu, Manghui Tu. 632-637 [doi]
- Risk Based Testing of Open Source Software (OSS)Inbal Yahav, Ron S. Kenett, Xiaoying Bai. 638-643 [doi]
- Automated Model-Based Performance Testing for PaaS Cloud ServicesJunzan Zhou, Bo Zhou, Shanping Li. 644-649 [doi]
- A Structured Model of Consistency Rules in After-State Database TestingRobert Setiadi, Man Fai Lau. 650-655 [doi]
- Improving Models for Model-Based Testing Based on Exploratory TestingCeren Sahin Gebizli, Hasan Sozer. 656-661 [doi]
- Noninvasive Ambulatory Monitoring of the Electric and Mechanical Function of Heart with a Multifunction Wearable SensorXianxiang Chen, Xinyu Hu, Ren Ren, Bing Zhou, Xiao Tan, Jiabai Xie, Zhen Fang, Yangmin Qian, Huaiyong Li, Lili Tian, Shanhong Xia. 662-667 [doi]
- Current Electronic Medical Record in ChinaChen Shi, Liu Hui-Ting, Pan Hui, Ji-Jiang Yang, JianQiang Li, Qing Wang. 668-672 [doi]
- A ZigBee Based Multi-hop Health Monitoring System: Design and Performance EvaluationF. M. Sun, Z. Fang, Z. Zhao, L. D. Du, Z. H. Xu, D. L. Chen, Y. M. Qian, H. Y. Hui, L.-L. Tian. 673-677 [doi]
- Using Knowledge Management and Mhealth in High-Risk Pregnancy Care: A Case for the Floating Population in ChinaBen-Da Gu, Ji-Jiang Yang, JianQiang Li, Qing Wang, Yu Niu. 678-683 [doi]
- A Practical and Automated Approach for Engineering Service-Oriented Applications with Design PatternsPatrizia Scandurra, Steven Capelli. 684-689 [doi]
- Measuring Prediction Sensitivity of a Cloud Auto-scaling SystemAli Yadavar Nikravesh, Samuel A. Ajila, Chung-Horng Lung. 690-695 [doi]
- Towards an Ontology-Based Context-Aware Meta-model for the Software DomainMostafa Erfani, Juergen Rilling, Iman Keivanloo. 696-701 [doi]
- Accountability in a Context-Aware Smarthome Healthcare Reasoning SystemBingchuan Yuan, John Herbert. 702-707 [doi]
- MuScADeL: A Deployment DSL Based on a Multiscale Characterization FrameworkRaja Boujbel, Sam Rottenberg, Sébastien Leriche, Chantal Taconet, Jean-Paul Arcangeli, Claire Lecocq. 708-715 [doi]
- A Load Distribution Method Based on Distributed Hashing for P2P Sensor Data Stream Delivery SystemTomoya Kawakami, Yoshimasa Ishi, Tomoki Yoshihisa, Yuuichi Teranishi. 716-721 [doi]
- A Calculus for Transportation SystemsMoonkun Lee, Jungrhan Choi. 722-727 [doi]
- Towards an Institutional Representation for the B Model Oriented SpecificationAmine Achouri, Yousra Bendaly Hlaoui, Leila Jemni Ben Ayed. 728-733 [doi]
- A Formal Modeling for Exceptions in Context-Aware SystemsTae-Seob Yoon, Joong-Hyun Choi, Eun-Sun Cho, Sumi Helal. 734-739 [doi]
- A Meta-model Transformation from UML Activity Diagrams to Event-B ModelsAhlem Ben Younes, Yousra Bendaly Hlaoui, Leila Jemni Ben Ayed. 740-745 [doi]