Abstract is missing.
- Threat on Physical Layer Security: Side Channel vs. Wiretap ChannelPeng Luo, Huiyun Li, Guoqing Xu, Lei Peng. [doi]
- A System Implementation of Interruption Management for Mobile DevicesW. Vilwock, Praveen Madiraju, Sheikh Iqbal Ahamed. [doi]
- Applying Erasure Codes for Fault Tolerance in Cloud-RAIDMaxim Schnjakin, Tabias Metzke, Christoph Meinel. [doi]
- Nonlinear Support Vector Machines for Solving the PMC-Based System-Level Fault Diagnosis ProblemMourad Elhadef. 1-8 [doi]
- Secure Cloud Services: Matrix Multiplication RevisitedKhaled M. Khan, Mahboob Shaheen. 9-14 [doi]
- A Load-Balancing Force Decomposition Scheme for Parallel Simulation of Chemical Dynamics with Multiple Inter-atomic Force ModelsYu Zhuang, R. Rajagopalan, William L. Hase, Upakarasamy Lourderaj. 15-19 [doi]
- Aircraft Landing Problem: An Efficient Algorithm for a Given Landing SequenceAbhishek Awasthi, Oliver Kramer, Jörg Lässig. 20-27 [doi]
- Developing a Lean Mass Customization Based ManufacturingAndres Ojamaa, Vahur Kotkas, Margarita Spichakova, Jaan Penjam. 28-33 [doi]
- Securing Mobile Devices from DoS AttacksUdaya Kiran Tupakula, Vijay Varadharajan. 34-41 [doi]
- What to Reuse?: A Probabilistic Model to Transfer User Annotations in a Surveillance VideoOmar U. Florez, Curtis E. Dyreson, Junaith Shahabdeen. 42-49 [doi]
- An Acceleration Toolkit of MATLAB Based on Hybrid CPU/GPU ClustersTyng-Yeu Liang, Jyun-Kai Wu, Yu-Chih Chen. 50-57 [doi]
- An Application-Level Synchronous Checkpoint-Recover Method for Parallel CFD SimulationXiaoguang Ren, Xinhai Xu, Yuhua Tang, Xudong Fang, Ye Sen. 58-65 [doi]
- Aspects of Data Quality That Cause Impact on Business Intelligence SystemsPatricia Alves de Freitas, Everson Andrade dos Reis, Wanderson Senra Michel, Mauro Edson Gronovicz, Marcio Alexandre De Macedo Rodrigues. 76-80 [doi]
- Ray-Tracing-Based Geospatial Optimization for Heterogeneous Architectures Enhancing Situational AwarenessDavid A. Richie, James A. Ross, Song Jun Park, Dale R. Shires. 81-86 [doi]
- Technologies for Information Management of Life Cycle Inventories of the Product and Service Supply Chain in the Brazilian IndustryEverson Andrade dos Reis, Placida Leopoldina V. A. da Costa Santos. 87-91 [doi]
- Performance Impact of I/O on QMCPack Simulations at the Petascale and BeyondS. Herbein, M. Matheny, Matthew Wezowicz, J. Krogel, Jeremy Logan, J. Kim, Scott Klasky, Michela Taufer. 92-99 [doi]
- A Structure for Sliding Window Equijoins in Data Stream ProcessingHyeon Gyu Kim. 100-103 [doi]
- Using All-or-Nothing Encryption to Enhance the Security of Searchable EncryptionWenqi Ma, Qingbo Wu, Yusong Tan, Chunguang Wang, Quanyuan Wu, Huaping Hu. 104-108 [doi]
- Dynamic-Width Reconfigurable Parallel Prefix CircuitsHatem M. El-Boghdadi. 109-116 [doi]
- On Efficiently Capturing Scientific Properties in Distributed Big Data without Moving the Data: A Case Study in Distributed Structural Biology Using MapReduceBoyu Zhang, Trilce Estrada, Pietro Cicotti, Michela Taufer. 117-124 [doi]
- Music Enhancement Using Nonnegative Matrix Factorization with Penalty MaskingChingShun Lin, ZongChao Cheng, DongLiang Shih. 125-129 [doi]
- A Byzantine Fault Tolerance Model for a Multi-cloud ComputingMohammed A. Alzain, Ben Soh, Eric Pardede. 130-137 [doi]
- Identifying and Implementing Security Patterns for a Dependable Security Case - From Security Patterns to D-CaseVaise Patu, Shuichiro Yamamoto. 138-142 [doi]
- A Parallel Multi-agent Spatial Simulation Environment for Cluster SystemsTimothy Chuang, Munehiro Fukuda. 143-150 [doi]
- Web Services Mobile Application for Geographically Dispersed Crop FarmersRichard K. Lomotey, Yiding Chai, Kazi A. Ahmed, Ralph Deters. 151-158 [doi]
- Evaluation on the Performance Fluctuation of Hadoop Jobs in the CloudKento Aida, Omar Abdul-Rahman, Eisaku Sakane, Kazutaka Motoyama. 159-166 [doi]
- The Use of Locality Information on Data Intensive Parallel File SystemsRicardo Ryoiti Sugawara Junior, Liria Matsumoto Sato. 167-173 [doi]
- Implementation of Parallel 1-D FFT on GPU ClustersDaisuke Takahashi. 174-180 [doi]
- Synthesizing Social Proximity Networks by Combining Subjective Surveys with Digital TracesHuadong Xia, Jiangzhuo Chen, Madhav V. Marathe, Henning S. Mortveit, Marcel Salathé. 188-195 [doi]
- Intelligent and Efficient Web-Based Middleware for Data Management in Motif Finding in Gene RegulationSajid Hussain, Samuel Adeogun, Bright Dotu, Laurence T. Yang. 196-201 [doi]
- Similarity Assessment of Program Samples Based on Theory of FuzzyYuxiang Li, Yinliang Zhao, Bin Liu. 202-207 [doi]
- Performance Improvement Using Self-Link-Breakage Announcement in Wireless Ad-hoc NetworksHyun-Ho Shin, Seungjin Lee, Byung-Seo Kim. 208-212 [doi]
- Load-Prediction Scheduling for Computer Simulation of Electrocardiogram on a CPU-GPU PCWenfeng Shen, Lianqiang Sun, Daming Wei, Weimin Xu, Xin Zhu, Shizhong Yuan. 213-218 [doi]
- A Fast Searching for Similar Text Using Genomic Read Mapping MethodChang-Seok Ock, Sung-Hwan Kim, Haesung Tak, Hwan-Gue Cho. 219-226 [doi]
- Sentiment Analysis and Summarization of Twitter DataSeyed Ali Bahrainian, Andreas Dengel. 227-234 [doi]
- Secure and Oblivious Information Hiding in Binary ImageZheng Huang, Weidong Kou, Kefei Chen. 235-239 [doi]
- A Systematic Product Line Test Derivation from Activity DiagramsSungwon Kang, Jihyun Lee. 240-247 [doi]
- A New Scheme for Indirect Trust Calculation to Resist Bigmouth Attack in Wireless Ad Hoc NetworkYongkai Zhou, Zhi Xue, Chong Fu, Jianhua Li, Yue Wu, Yi Yuan, Yun Zhu, Yong Shi. 248-251 [doi]
- Routing Design and Analysis of Place Based Opportunistic NetworksYanliang Liu, Shanshan Lu, Yonghe Liu. 252-259 [doi]
- Development Risk Assessment in Software Projects Using Dependability ModelsA. Melo, E. Tavares, M. Marinho, E. Sousa, B. Nogueira, P. Maciel. 260-267 [doi]
- Dynamic Load Balancing in Real-Time Distributed Transaction ProcessingWaqar Haque, Andrew Toms, Aaron Germuth. 268-274 [doi]
- Spectrum Allocation Allowed for Total Transmission Rate and FairnessXiaodan Chen, Li Li, Lei Li, Hongtao Ling. 275-279 [doi]
- File Deduplication with Cloud Storage File SystemChan-I. Ku, Guo-Heng Luo, Che-Pin Chang, Shyan-Ming Yuan. 280-287 [doi]
- A Key Tree Merge Algorithm in Multi-privileged GroupsXiaozhuo Gu, Yongming Wang, Weihua Zhou. 288-294 [doi]
- Dynamic Adapter Reconfiguration in the Context of Business Protocol EvolutionMaryam Eslamichalandar, Kamel Barkaoui, Hamid Reza Motahari-Nezhad. 301-308 [doi]
- A Study of Parsing Process on Natural Language Processing in Bahasa IndonesiaElisa Margareth Sibarani, M. Nadial, Evy Panggabean, S. Meryana. 309-316 [doi]
- SACM: Stateful Access Control Model a More Detailed ApproachAndré L. M. dos Santos, Joaquim Celestino Júnior, Vincent Scarlata, Anderson C. Lima, Inacio C. Alves, Davi di C. Sampaio. 317-324 [doi]
- Nonbinary LDPC Decoder Design and Implementation on FPGA PlatformTony Tsang. 325-329 [doi]
- Virtual Network Resource Allocation Considering Dependability IssuesVictor Lira, Eduardo Tavares, Stenio F. L. Fernandes, Paulo Romero Martins Maciel, Ricardo M. A. Silva. 330-337 [doi]
- Context-Aware Search in Dynamic Repositories of Digital DocumentsAsad Masood Khattak, N. Ahmad, Jibran Mustafa, Zeeshan Pervez, Khalid Latif, S. Y. Lee. 338-345 [doi]
- A Novel Taxonomy of Black-Hole Attack Detection Techniques in Mobile Ad-hoc Network (MANET)Ahmed Sherif, Maha Elsabrouty, Amin Shoukry. 346-352 [doi]
- Comparing the Reputation of Researchers Using a Profile Model and Scientific MetricsCristiano R. Cervi, Renata Galante, José Palazzo Moreira de Oliveira. 353-359 [doi]
- WAGE: Weighting with AHP, Grey Numbers, and Entropy for Multiple-Criteria Group Decision Making ProblemKyung Hwan Oh, Hyung Ku Kang, Jong Chang Park, Hee Yong Youn. 360-367 [doi]
- Digital Channel Capacity Calculation Using Augmented Ordered Binary Decision DiagramsJohannes Ulrich Herrmann, Sieteng Soh. 368-373 [doi]
- High-Precision and Practical Localization Using Seawater Movement Pattern and Filters in Underwater Wireless NetworksSungryul Kim, Younghwan Yoo. 374-381 [doi]
- Wireless Sensor Network Prototype for Solid Waste Bin Monitoring with Energy Efficient Sensing AlgorithmM. Abdulla Al Mamun, M. A. Hannan, Aini Hussain, Hassan Basri. 382-387 [doi]
- IBUOV, A Provably Secure Identity-Based UOV Signature SchemeWuqiang Shen, Shaohua Tang, Lingling Xu. 388-395 [doi]
- The Impact of the Buffer Unit on the Performance in 802.11 Wireless LANsJinbang Chen, Wei Zhang, Guillaume Urvoy-Keller. 396-402 [doi]
- Efficient Locality Sensitive Clustering in Multimedia RetrievalJinpeng Yue, Wei Zhang, Hong Hu, Zhongzhi Shi. 403-408 [doi]
- Virtualize for Architecture Sustainability in Industrial AutomationHongyu Pei Breivold, Anton Jansen, Kristian Sandström, Ivica Crnkovic. 409-415 [doi]
- A Case Study Comparison of Variability Representation Mechanisms with the HeRA Product LineHwi Ahn, Sungwon Kang, Jihyun Lee. 416-423 [doi]
- SDM-Go: An Agent for Go with an Improved Search Process Based on Monte-Carlo Tree Search and Sparse Distributed MemoryMatheus Araujo Aguiar, Rita Maria da Silva Julia. 424-431 [doi]
- Hierarchical Segment Learning Method for Road Objects Extraction and ClassificationTejy Kinattukara, Brijesh Verma. 432-438 [doi]
- Anycast Routing Based on the Node Degree for Ad Hoc and Sensor NetworksSatoru Ohta, Hiroki Makita. 439-446 [doi]
- Load Balancing for Real-Time, Location-Based Event Processing on Cloud SystemsSungmin Yi, Hyoseok Ryu, Yon Dohn Chung. 447-454 [doi]
- Effect of Varying Hidden Neurons and Data Size on Clusters, Layers, Diversity and Accuracy in Neural Ensemble ClassifierChien-Yuan Chiu, Brijesh Verma. 455-459 [doi]
- A Device Abstraction Framework for the Robotic Mediator Collaborating with Smart EnvironmentsYoung-Ho Suh, Kang-Woo Lee, Eun-Sun Cho. 460-467 [doi]
- Finding High-Influence Leader Based on Local MetricsYang Li, Ying Sha, Jixi Shan, Bo Jiang, Jianjun Wu. 468-475 [doi]
- Using the Multiple Knapsack Problem to Model the Problem of Virtual Machine Allocation in Cloud ComputingSilvio Roberto Martins Amarante, Filipe Maciel Roberto, André Ribeiro Cardoso, Joaquim Celestino Jr.. 476-483 [doi]
- Region Partition Using User Mobility Patterns Based on Topic ModelFeng Xiang, Lai Tu, Benxiong Huang, Xiaojun Yin. 484-489 [doi]
- An Effective Method of 1-D Bar Code Image IdentificationYong Xu, Yue Yuan, Huabing Dong, Yuhui Quan. 490-494 [doi]
- Generic Ontology-Based Model for Adaptive Web Environments: A Revised Formal Description Explained within the Context of Its ImplementationMartin Balik, Ivan Jelinek. 495-500 [doi]
- Maximum Likelihood Estimation of Gaussian Mixture Models Using PSO for Image SegmentationKhoa Anh Tran, Vo Quang Nhat, Gueesang Lee. 501-507 [doi]
- Customer Requirement Patterns for Software VendorsR. Kousik Sankar, Aneesh Krishna. 508-514 [doi]
- Modeling and Mitigation of Faults in Cyber-physical Systems with Binary SensorsVolkan Gunes, Steffen Peter, Tony Givargis. 515-522 [doi]
- Towards Cluster-Based Real-Time Flow Scheduling in Interference-Aware Wireless Sensor NetworksGohar Ali, SeokYoon Kang, Kyong Hoon Kim, Ki-Il Kim. 523-530 [doi]
- A Distributed Data Allocation Algorithm for Biological DatabasesGustavo Tonini, Frank Siqueira. 531-537 [doi]
- New Components with On-Line Control to Improve Harmony SearchNicolás Rojas, María-Cristina Riff, Xavier Bonnaire, Elizabeth Montero. 538-544 [doi]
- Situation Awareness Based on Dempster-Shafer Theory and Semantic SimilarityZhong Yuan Li, Jong Chang Park, Byung Jun Lee, Hee Yong Youn. 545-552 [doi]
- Association Link Network Based Core Events Discovery on the WebYang Liu, Nazanin Borhan, Xiangfeng Luo, Hui Zhang, Xiang He. 553-560 [doi]
- A Tool for Scientific Provenance of Data and SoftwareAnna Ceguerra, Peter V. Liddicoat, Simon P. Ringer, Wojtek Goscinski, Steve G. Androulakis. 561-565 [doi]
- A User Demand Uncertainty Based Approach for Cloud Resource ManagementAdrian Johannes, Nazanin Borhan, Chang Liu, Rajiv Ranjan, Jinjun Chen. 566-571 [doi]
- Traffic Identification in Semi-known Network EnvironmentXiao Chen, Jun Zhang, Yang Xiang, Wanlei Zhou. 572-579 [doi]
- Investigating the Impact Factors for Event Detection Using Web Search EnginesZheng Xu, Xiangfeng Luo, Xiao Wei, Lin Mei. 580-587 [doi]
- Specifying Time Constraints of Cyber Physical Systems Based on Clock TheoryBingqing Xu, Lichen Zhang. 588-594 [doi]
- Multi-view Approach to Specify and Model Aerospace Cyber-physical SystemsLichen Zhang. 595-602 [doi]
- Specifying and Modeling Automotive Cyber Physical SystemsLichen Zhang. 603-610 [doi]
- Specifying and Modeling Railway Cyber Physical Systems by the Extension of AADLLichen Zhang. 611-618 [doi]
- Evaluation of Multi-threaded Processor Designs for Energy Efficient Embedded SystemsRan Zhang, Hui Guo. 619-626 [doi]
- Aspect-Oriented Customization of the Scheduling Algorithm and the Resource Access Protocol of a Real-Time Operating SystemKazuki Abe, Myungryun Yoo, Takanori Yokoyama. 627-634 [doi]
- Utilizing Intervals in Component-Based Design of Cyber Physical SystemsSteffen Peter, Tony Givargis. 635-642 [doi]
- AASMP - Android Application Server for Mobile PlatformsJian-Hong Liu, Jing Chen, Yi-Li Wu, Pei-Li Wang. 643-650 [doi]
- Distributed Intent: Android Framework for Networked Devices OperationYuki Nagahara, Hiroshi Oyama, Takuya Azumi, Nobuhiko Nishio. 651-658 [doi]
- Priority Based USB Communication: Dual Endpoint between Smart TV and Set-Back BoxJeik Kim, Kyung-Sik Kim, Aman Deep. 659-666 [doi]
- Certificate-Based Pairwise Key Establishment Protocol for Wireless Sensor NetworksPawani Porambage, Pardeep Kumar, Corinna Schmitt, Andrei Gurtov, Mika Ylianttila. 667-674 [doi]
- Intermediate Inverse Image HistogramBongkarn Homnan, Watit Benjapolakul. 675-679 [doi]
- Behavior Modeling of Cyber-physical System Based on Discrete Hybrid AutomataQiang Wang, Gang Yang, Xingshe Zhou, Yalei Yang. 680-684 [doi]
- Coordinated Bank and Cache Coloring for Temporal Protection of Memory AccessesNoriaki Suzuki, Hyoseung Kim, Dionisio de Niz, Björn Andersson, Lutz Wrage, Mark H. Klein, Ragunathan Rajkumar. 685-692 [doi]
- Improving GPOS Real-Time Responsiveness Using vCPU Migration in an Embedded Multicore Virtualization PlatformTsung-Han Lin, Hitoshi Mitake, Tatsuo Nakajima. 693-700 [doi]
- 3D Adjacency: A Communication-Aware Online Scheduling Algorithm for 2D Partially Reconfigurable DevicesYingying Sheng, Renfa Li, Yan Liu. 701-705 [doi]
- Hardware-Based I/O Virtualization for Mixed Criticality Real-Time Systems Using PCIe SR-IOVDaniel Münch, Ole Isfort, Kevin Mueller, Michael Paulitsch, Andreas Herkersdorf. 706-713 [doi]
- Monoprocessor Real-Time Scheduling of Data Dependent Tasks with Exact Preemption Cost for Embedded SystemsFalou Ndoye, Yves Sorel. 714-721 [doi]
- A New RTA Based Scheduling Algorithm for Mixed-Criticality SystemsLong Li, Renfa Li, Lida Huang, Renfei Wu, Lining Zeng. 722-729 [doi]
- Sipping from the Firehose: How to "Grok" Gigabytes of Trace Debug DataJohn Burger, Matthew Burdett, Jeffrey Hall. 730-733 [doi]
- ExCHARON: Improved Modeling Language for Cyber-physical Systems Based on CHARONYounghun Han, Sungwon Kang, Jinhyun Kim. 734-741 [doi]
- Local-Memory-Based Integrity Checking for Embedded SystemsNing Li, Tatsuo Nakajima. 742-750 [doi]
- Analysis and Modeled Design of One State-Driven Autonomous Passing-Through Algorithm for Driverless Vehicles at IntersectionsKailong Zhang, Arnaud de La Fortelle, Dafang Zhang, Xiao Wu. 751-757 [doi]
- Fault Detection in Wireless Sensor Networks: A Machine Learning ApproachEhsan Ullah Warriach, Kenji Tei. 758-765 [doi]
- A Novel Architecture to Identify the Microprocessor Chips by Implanting Timing-Fault Execution UnitXiaoping Huang, Jianfeng An. 766-769 [doi]
- Dynamic Scheduling of Imprecise-Computation Tasks on Real-Time Embedded MultiprocessorsHeng Yu, Bharadwaj Veeravalli, Yajun Ha, Shaobo Luo. 770-777 [doi]
- An Embedded NIDS with Multi-core Aware Packet CaptureChia-Hao Hsu, Sheng-De Wang. 778-785 [doi]
- Risk Assessment Mechanism for Personal Information Operations - Case Study by HospitalShe-I Chang, Jung-Jei Su, Hsing-Jung Li. 786-793 [doi]
- Optimised Application Specific Architecture Generation and Mapping Approach for Heterogeneous 3D Networks-on-ChipMichael Opoku Agyeman, Ali Ahmadinia. 794-801 [doi]
- Video Structural Description: A Semantic Based Model for Representing and Organizing Video Surveillance Big DataZheng Xu, Lin Mei, Yunhuai Liu, Chuanping Hu. 802-809 [doi]
- Clustering-Based Collaborative Filtering Approach for Mashups Recommendation over Big DataRong Hu, Wanchun Dou, Jianxun Liu. 810-817 [doi]
- Relational Database Design PatternsRamzi A. Haraty, Georges Stephan. 818-824 [doi]
- Secure and Controlled Sharing of Data in Distributed ComputingDanan Thilakanathan, Rafael Calvo, Shiping Chen, Surya Nepal. 825-832 [doi]
- Agricultural Production System Based on IoTMeong-hun Lee, Jeong-hwan Hwang, Hyun Yoe. 833-837 [doi]
- A Consumer-Oriented Service Selection Method for Service-Based Applications in the CloudTaotao Wu, Shaoqian Zhang, Xiaotong Wu, Wanchun Dou. 838-845 [doi]
- A Preference-Aware Service Recommendation Method on Map-ReduceShunmei Meng, Xu Tao, Wanchun Dou. 846-853 [doi]
- Topics and Terms Mining in Unstructured Data StoresRichard K. Lomotey, Ralph Deters. 854-861 [doi]
- Subset Selection Classifier (SSC): A Training Set Reduction MethodZubair Shah, Abdun Naser Mahmood, Mehmet A. Orgun, M. Hadi Mashinchi. 862-869 [doi]
- Multi-tenant Database Access ControlHaitham Yaish, Madhu Goyal. 870-877 [doi]
- A Descriptive Big Data Model Using Grounded TheoryMarco Pospiech, Carsten Felden. 878-885 [doi]
- Visual Analytics Framework for Cloud Infrastructure DataArun Kejariwal, Winston Lee, Owen Vallis, Jordan Hochenbaum, Bryce Yan. 886-893 [doi]
- m2r2: A Framework for Results Materialization and Reuse in High-Level Dataflow Systems for Big DataVasiliki Kalavri, Hui Shang, Vladimir Vlassov. 894-901 [doi]
- Swarm Search for Feature Selection in ClassificationSimon Fong, Xin-She Yang, Suash Deb. 902-909 [doi]
- Improving the Accuracy of Incremental Decision Tree Learning Algorithm via Loss FunctionHang Yang, Simon Fong. 910-916 [doi]
- Discovery and Analysis of Usage Data Based on Hadoop for Personalized Information AccessDawen Xia, Zhuobo Rong, Yanhui Zhou, Binfeng Wang, Yantao Li, Zili Zhang. 917-924 [doi]
- A New Exploration to Build Flash-Based Storage Systems by Co-designing File System and FTLWenwei Qiu, Xiang Chen, Nong Xiao, Fang Liu, Zhiguang Chen. 925-932 [doi]
- A Multi-tenant Database Architecture Design for Software ApplicationsHaitham Yaish, Madhu Goyal. 933-940 [doi]
- Privacy Preserving Support Vector Machine Using Non-linear Kernels on Hadoop MahoutSin G. Teo, Shuguo Han, Vincent C. S. Lee. 941-948 [doi]
- Reduction of Association Rules for Big Data Sets in Socially-Aware ComputingWoo Sik Seol, Hwi Woon Jeong, Byung Jun Lee, Hee Yong Youn. 949-956 [doi]
- Self-Healing Spatio-temporal Data Streams Using Error SignaturesShigeru Imai, Richard Klockowski, Carlos A. Varela. 957-964 [doi]
- Stream Processing of Scientific Big Data on Heterogeneous Platforms - Image Analytics on Big Data in MotionS. M. Najmabadi, Michael Klaiber, Z. Wang, Yousef Baroud, S. Simon. 965-970 [doi]
- A MapReduce and Information Compression Based Social Community Structure Mining MethodSongchang Jin, Aiping Li, Shuqiang Yang, Wangqun Lin, Bo Deng, Shudong Li. 971-980 [doi]
- Making a Graph Database from Unstructured TextSeungwoo Jeon, Yohanes Khosiawan, Bonghee Hong. 981-988 [doi]
- A Framework for Online Hot Event Discovery on the WebYang Liu, Xiangfeng Luo. 989-996 [doi]
- Managing and Analysing Big Audio Data for Environmental MonitoringJinglan Zhang, Kai Huang, Mark Cottman-Fields, Anthony Truskinger, Paul Roe, Shufei Duan, Xueyan Dong, Michael W. Towsey, Jason Wimmer. 997-1004 [doi]
- A DT-SVM Strategy for Stock Futures Prediction with Big DataDingxian Wang, Xiao Liu, Mengdi Wang. 1005-1012 [doi]
- Migration Validity of WS-BPEL Instances RevisitedWei Song, Xiaoxing Ma, Hao Hu, Yang Zou, Gongxuan Zhang. 1013-1020 [doi]
- 5Ws Model for Big Data Analysis and VisualizationJinson Zhang, Mao Lin Huang. 1021-1028 [doi]
- Data File Layout Inference Using Content-Based OraclesReid Phillips, Wing Ning Li, Craig W. Thompson, Wesley Deneke. 1029-1035 [doi]
- Automatic Composition of ETL Workflows from Business IntentsWesley Deneke, Wing Ning Li, Craig W. Thompson. 1036-1042 [doi]
- Mining Websites Preferences on Web Events in Big Data EnvironmentJunyu Xuan, Xiangfeng Luo, Jie Lu. 1043-1050 [doi]
- Social Sentiment Detection of Event via MicroblogXinzhi Wang, Xiangfeng Luo, Jinjun Chen. 1051-1058 [doi]
- A Flexible Data Model for Multi-tenant Databases for Software as a ServiceIndrani Gorti, Nematollaah Shiri, Thiruvengadam Radhakrishnan. 1059-1066 [doi]
- A Flexible GridFTP Client for Scheduling of Big Data TransfersEsma Yildirim. 1067-1074 [doi]
- An Improved Regularized Latent Semantic Indexing with L1/2 Regularization and Non-negative ConstraintsYong Chen, Hui Zhang, Yuan Zuo, Deqing Wang. 1075-1082 [doi]
- SAFAL: A MapReduce Spatio-temporal Analyzer for UNAVCO FTP LogsKathleen Hodgkinson, Abdelmounaam Rezgui. 1083-1090 [doi]
- Optimizing Big Data in Bioinformatics with Swarm AlgorithmsShuzlina Abdul Rahman, Azuraliza Abu Bakar, Zeti Azura Mohamed Hussein. 1091-1095 [doi]
- Towards Mining Frequent Patterns in Genome Wide AssociationSofianita Mutalib, Shuzlina Abdul Rahman, Azlinah Mohamed. 1096-1100 [doi]
- Exploring Feature Selection and Support Vector Machine in Text CategorizationShuzlina Abdul Rahman, Sofianita Mutalib, Nur Amira Khanafi, Azliza Mohd Ali. 1101-1104 [doi]
- A Synthetic Information Approach to Urban-Scale Disaster ModelingSamarth Swarup, Kristian Lum, Christopher L. Barrett, Keith R. Bisset, Stephen G. Eubank, Madhav V. Marathe, Paula Elaine Stretz. 1105-1112 [doi]
- Computational Methods for Testing Adequacy and Quality of Massive Synthetic Proximity Social NetworksHuadong Xia, Christopher L. Barrett, Jiangzhuo Chen, Madhav V. Marathe. 1113-1120 [doi]
- Querying Streaming XML Big Data with Multiple Filters on CloudChi Yang, Chang Liu, Xuyun Zhang, Surya Nepal, Jinjun Chen. 1121-1127 [doi]
- Public Auditing for Big Data Storage in Cloud Computing - A SurveyChang Liu, Rajiv Ranjan, Xuyun Zhang, Chi Yang, Dimitrios Georgakopoulos, Jinjun Chen. 1128-1135 [doi]
- Agent-Based Flexible Management for Big Data Fusion Service on IRC NetworkTae-young Kim, Jaekwon Kim, Minoh Park, Sanggil Kang, Jong Sik Lee, Kangsun Lee. 1136-1137 [doi]
- Conversion Profit Analysis of Cloud Computer for Integrated Campus Web ServicesGoo Yeon Lee, Changyeol Choi, Hwang Kyu Choi. 1138-1139 [doi]
- Usage Control of Programs and Application Libraries in z/OS Environment in the Big Data AgeEverson Andrade dos Reis, Lessiclebes Silva Brito. 1140-1141 [doi]
- Information Governance, Big Data and Data QualityPatricia Alves de Freitas, Everson Andrade dos Reis, Wanderson Senra Michel, Mauro Edson Gronovicz, Marcio Alexandre De Macedo Rodrigues. 1142-1143 [doi]
- Prescriptive Analytics System for Improving Research PowerSa-Kwang Song, Donald J. Kim, Myunggwon Hwang, Jangwon Kim, Do-Heon Jeong, Seungwoo Lee, Hanmin Jung, Won-Kyung Sung. 1144-1145 [doi]
- Edge Detection and Linking Pattern Analysis Using Markov ChainsHaklin Kimm, Neda Abolhassani, Fenglien Lee. 1146-1152 [doi]
- An Enhanced Genetic Programming Approach for Detecting Unsolicited EmailsShrawan Kumar Trivedi, Shubhamoy Dey. 1153-1160 [doi]
- The Identification Service in Health Information ExchangeWang Lijun, Cai Jianchao. 1161-1166 [doi]
- Indoor Navigation Using Semantic Symbolic InformationGridaphat Sriharee. 1167-1173 [doi]
- An Analysis of Scripting Languages for Research in Applied ComputingOlugbenga O. Oluwagbemi, Adewole Adewumi, Sanjay Misra, Folakemi Majekodunmi, Luis Fernández Sanz. 1174-1180 [doi]
- A Maintainability Spreadsheet-Driven Regression Test Automation FrameworkZhenyu Liu, Qiang Chen, Xu Jiang. 1181-1184 [doi]
- Application Based Handover: An Energy-Efficient Approach for Heterogeneous NetworksFarnaz Farid, Seyed A. Shahrestani, Chun Ruan. 1185-1190 [doi]
- Research of Single Sign-On in Mobile RFID Middleware Based on Dynamic Tokens and WMMPZhuosheng Su, Qianhua He, Junkai Zhang, Hongtao Li. 1191-1194 [doi]
- On the Improved Performance of Luby Transform Codes over Selective Repeat ARQ in Turbulent Free Space Optical LinksGeetha Prakash, Anuj Nayak, Muralidhar Kulkarni, Sripati Acharya. 1195-1200 [doi]
- An Empirical Validation of the Complexity of Code Changes and Bugs in Predicting the Release Time of Open Source SoftwareK. K. Chaturvedi, Punam Bedi, Sanjay Misra, V. B. Singh. 1201-1206 [doi]
- Quantitative Quality Model for Evaluating Open Source Web Applications: Case Study of Repository SoftwareAdewole Adewumi, Nicholas Ikhu-Omoregbe, Sanjay Misra, Luis Fernández Sanz. 1207-1213 [doi]
- DR Code: The Two Dimensions Barcode Supporting High Rate Data RecoveryWiwat Sriphum. 1214-1219 [doi]
- ICDM: An Encryption That Supports Unlimited Times Homomorphic Arithmetic Operations on Encrypted DataPan Yang, Xiaolin Gui, Jing Yao, Jiancai Lin, Feng Tian. 1220-1225 [doi]
- Study of Resource Utilization in IEEE 802.15.4 Wireless Body Sensor Network, Part I: The Need for EnhancementAmir Hossein Moravejosharieh, Ehsan Tabatabaei Yazdi. 1226-1231 [doi]
- Resource Allocation for Femtocell Network in FFR Based Frequency Allocation EnvironmentJeomg Gon Kim, Won Geon Bae. 1232-1237 [doi]
- What We Use to Predict a Mobile-Phone Users' Status in Campus?Fei Sun, Jun Zhang, Lai Tu, Benxiong Huang. 1238-1241 [doi]
- Statistical Context-Sensitive Spelling Correction Using Typing Error RateMinho Kim, Jingzhi Jin, Hyuk-Chul Kwon, Ae-sun Yoon. 1242-1246 [doi]
- Memorization of Materialization PointsMareike Hoger, Odej Kao. 1247-1254 [doi]
- Dynamic Profiling and Feedback Framework for Reduce-Side JoinMakoto Nakayama, Kenichi Yamazaki, Satoshi Tanaka, Hironori Kasahara. 1255-1262 [doi]
- Scheduling Divisible Loads from Multiple Input Sources in MapReduceTao Gu, Qun Liao, Yulu Yang, Tao Li. 1263-1270 [doi]
- Using MapReduce for High Energy Physics Data AnalysisFabian Glaser, Helmut Neukirchen, Thomas Rings, Jens Grabowski. 1271-1278 [doi]
- Moim: A Multi-GPU MapReduce FrameworkMengjun Xie, Kyoung-Don Kang, Can Basaran. 1279-1286 [doi]
- OAMS: A Highly Reliable Metadata Service for Big Data StorageJiang Zhou, Jing Guo, Weiping Wang, Cuilan Du, Xiaoyan Gu, Dan Meng. 1287-1294 [doi]
- Determine the Hardware Choice to Improve HDFS Performance Deployed in a Commodity ClusterYouwei Wang, Ge Fu, Weiping Wang, Xinran Liu, Can Ma, Dan Meng. 1295-1302 [doi]
- DIFTSAS: A DIstributed Full Text Search and Analysis System for Big DataBo Li 0009, Jingjie Zhang, Mingyu Chen, Jinchao Zhang, Kunpeng Wang, Dan Meng. 1303-1309 [doi]
- Locality Based Data Partitioning in MapReduceChunguang Wang, Qingbo Wu, Yusong Tan, Wenzhu Wang, Quanyuan Wu. 1310-1317 [doi]
- PT: A Lightweight Job Scheduler with Remote Interface for MultiprocessorsQingquan Wang, Rui Wang, Tao Liu, Yi Liu. 1318-1323 [doi]
- Using Paralleled-PEs Method to Resolve the Bursting Data in Distributed Stream Processing SystemBaojian Zhou, Zhongzhi Luan, JieQian Wu, Ming Xie. 1324-1331 [doi]
- Research and Implementation of MapReduce Programming Oriented Graphical Modeling SystemWulun Du, Depei Qian, Ming Xie, Wei Chen. 1332-1337 [doi]
- Elastic Resource Allocation in the CloudJieQian Wu, Baojian Zhou, Depei Qian, Ming Xie, Wei Chen. 1338-1342 [doi]
- A Framework for Earth System Model Application MonitoringRan Yan, JieQian Wu, Yibo Xie, You Meng, Depei Qian. 1343-1348 [doi]