Abstract is missing.
- Traffic Accident Hotspots Identification Based on Clustering Ensemble ModelQiang Xu, Gang Tao. 1-4 [doi]
- An Effective Verifiable Database Protocol in Severe Untrusted EnvironmentAixin Zhang, Shalin Huang, Xinghua Wu, Shilin Wang, Jianhua Li. 5-11 [doi]
- Hatchetman Attack: A Denial of Service Attack Against Routing in Low Power and Lossy NetworksTianyi Song, Cong Pu. 12-17 [doi]
- CAPTCHA: Machine or Human Solvers? A Game-Theoretical AnalysisZhen Li, Qi Liao. 18-23 [doi]
- A System for Exploratory Analysis in CloudLiangchen Guo, Yazhong Zhang, Chang Lu, Yinan Jing, Zhenying He, X. Sean Wang. 24-28 [doi]
- Privacy-Preserving and Unforgeable Searchable Encrypted Audit Logs for Cloud StorageWeiwei Zhao, Li Qiang, Huanying Zou, Aixin Zhang, Jianhua Li. 29-34 [doi]
- A Real-Time Sensor Network Aggregation Computing SystemYumin Zhou, Peng Wang, Wei Wang. 35-40 [doi]
- A Distributed Technique for Repairing Inconsistencies of Functional DependenciesAi Ran, Shen Qin. 41-45 [doi]
- MTComm Based Virtualization and Integration of Physical Machine Operations with Digital-Twins in Cyber-Physical Manufacturing CloudMd Rakib Shahriar, S. M. Nahian Al Sunny, Xiaoqing (Frank) Liu, Ming C. Leu, Liwen Hu, Ngoc-Tu Nguyen 0002. 46-51 [doi]
- Difference Function Projective Synchronization for Secure Communication Based on Complex Chaotic SystemsYawen Chen, Haibo Zhang 0001, Fangfang Zhang. 52-57 [doi]
- An Approach of Fog Detecting Magnitude Using Referenceless Perceptual Image DefoggingKeke Gai, Xiaotong Sun, Yujun Li. 58-63 [doi]
- Reliability Ranking Prediction for Cloud Services via SkylineWei Xiong, Zhao Wu, Bing Li, Bo Hang. 64-74 [doi]
- Replay Attack: A Prevalent Pattern of Fraudulent Online TransactionsChen Jing, Cheng Wang, ChunGang Yan. 75-82 [doi]
- A Cooperative Game for Online Cloud Federation Formation Based on Security Risk AssessmentTalal Halabi, Martine Bellaïche, Adel Abusitta. 83-88 [doi]
- A Knowledge-Based Approach to Reducing Complexity of Maintaining Semantic Constraints in Data Exchange and IntegrationNing Jiang, Lixin Tao. 89-94 [doi]
- Review on Big Data Fusion Methods of Quality Inspection for Consumer GoodsWei Jiang, Xiuli Ning, Yingcheng Xu. 95-102 [doi]
- Unique Topic Query Processing On CloudLvhong Liu, Zhihui Yang, Zhenying He, Yinan Jing, Xiaoyang Sean Wang. 103-105 [doi]
- Enterprise Workflow Modeling Based on Priced Timed Petri NetsHong Zheng, Litian Li, Bozhi Wang, Tong Ruan. 106-110 [doi]
- An SDN Architecture for Improving Throughput of Large Flows Using Multipath TCPFaisal Alharbi, Zongming Fei. 111-116 [doi]
- Smart Collaboration Mechanism Using Blockchain TechnologyKaranveer Singh Jhala, Rajvardhan Oak, Mrunmayee Khare. 117-121 [doi]
- Performance Evaluation of BATMAN-Adv Wireless Mesh Network Routing AlgorithmsLigang Liu, Jianpo Liu, Hanwang Qian, Jun Zhu. 122-127 [doi]
- FASTBEE: A Fast and Self-Adaptive Clustering Algorithm Towards to Edge ComputingHaizhou Du, Shuqing Zeng, Tingting Dou, Wei Fang, Yi Wang, Chenlu Zhang. 128-133 [doi]
- Cryptanalysis of AN RFID Ownership Transfer Protocol Based on CloudCheng-Chi Lee, Shun-der Chen, Chun-Ta Li, Chung-Lun Cheng, Yan-Ming Lai. 134-139 [doi]
- Constructing Digital Watermark Based on Orthogonal FunctionsTakayuki Sasaki, Tomoyuki Nagase. 140-143 [doi]
- Enterprise Cloud: Its Growth & Security Challenges in ChinaSonali Chandel, Tian-Yi Ni, Geng Yang. 144-152 [doi]
- Network Security Based on D-S Evidence Theory Optimizing CS-BP Neural Network Situation AssessmentJie Qiang, Fei Wang, Xin-lai Dang. 153-159 [doi]
- Access Control Scheme Based on Combination of Blockchain and XOR-Coding for ICNXiaobin Tan, Chaoming Huang, Liguo Ji. 160-165 [doi]
- Research and Design of NFV Infrastructure and Cloud Platform Based on Virtual RouterWenwei Li. 166-171 [doi]
- Design and Implementation of Ceramic Formula Calculation and Management System Based on Cloud ServicesKaihua Hu, Hua Huang, Yujing Zhang, Xu Xing. 179-184 [doi]
- The Research of Information Security for The Education Cloud Platform Based on AppScan TechnologyWei Nie, Xiangfei Xiao, Zhaohui Wu, Yuanhui Wu, Fang Shen, Xionglan Luo. 185-189 [doi]
- Embedding Virtual Network Functions with Backup for Reliable Large-Scale Edge ComputingYuntong Zhang, Zhiwei Zhao, Chang Shu, Geyong Min, Zhe Wang. 190-195 [doi]
- Data-Driven Parallel Video Transcoding for Content Delivery Network in the CloudMinggang Chen, Wenjie Chen, Lizhi Cai. 196-199 [doi]
- An Analysis and Comparison for Public Cloud Technology and Market Development Trend in ChinaWenli Li, Xiaoli Wang. 200-205 [doi]
- A Diffusional Schedule for Traffic Reducing on Network-on-ChipJihe Wang, Meng Zhang, Meikang Qiu. 206-210 [doi]
- A Novel VSFTP-Based KVM Virtualization Cloud Deployment SchemeWanqing Bai, Wenli Li. 211-217 [doi]
- A Distributed Fog Computing Architecture Supporting Multiple Migrating ModeQimin Jin, Rongheng Lin, Hua Zou, Fangchun Yang. 218-223 [doi]
- Storage and Indexing of Big Data for Power Distribution NetworksNaiwang Guo, Yun Su, Hongshan Yang. 224-227 [doi]
- The Requrirement and Experiment Test for Green Cloud Computing by UsersKe Miao, Jianhong Wang, Xing Wang. 228-231 [doi]