Abstract is missing.
- Diabetes Mellitus Detection Based on Facial Block Texture Features Using the Gabor FilterTing Shu, Bob Zhang. 1-6 [doi]
- Classification of Electrocardiogram Signals with Deep Belief NetworksMeng Huanhuan, Zhang Yue. 7-12 [doi]
- Vector Quantization for ECG Beats ClassificationTong Liu, Yujuan Si, Dunwei Wen, Mujun Zang, Weiwei Song, Liuqi Lang. 13-20 [doi]
- An Isolated Sign Language Recognition System Using RGB-D Sensor with Sparse CodingYongjun Jiang, Jinxu Tao, Weiquan Ye, Wu Wang, Zhongfu Ye. 21-26 [doi]
- Combining N-Gram and Dependency Word Pair for Multi-document SummarizationYungang Ma, Ji Wu. 27-31 [doi]
- On Utilizing Stochastic Non-linear Fractional Bin Packing to Resolve Distributed Web CrawlingAnis Yazidi, B. John Oommen, Ole-Christoffer Granmo, Morten Goodwin. 32-37 [doi]
- Adaptive Neural Network Position/Force Hybrid Control for Constrained Reconfigurable ManipulatorsYingce Liu, Bo Zhao, Yuanchun Li. 38-43 [doi]
- Vehicle State Estimation Using Cubature Kalman FilterXiaoshuai Xin, Jinxi Chen, Jianxiao Zou. 44-48 [doi]
- Cart Velocity Tracking of General IPC Model Using ZG Control Compared with Cart Path TrackingZhengli Xiao, Dechao Chen, Mingzhi Mao, Hongzhou Tan, Yunong Zhang. 49-54 [doi]
- Design and Development of Sypinge-Type Magnetorheological DamperJinglong Tong, Kuangyuh Huang. 55-59 [doi]
- Reconstruction Algorithm of Ultrasonic CT Based on Matching PursuitLingjun Liu, Zhonghua Xie, Cui Yang. 60-65 [doi]
- An Algorithm for Fractional Order System IdentificationXixiao Liu, Guishu Liang. 66-71 [doi]
- Semi-active Spiral Flow Channel Magnetorheological DamperJinglong Tong, Kuangyuh Huang. 72-77 [doi]
- Attitude Tracking Control Based on Adaptive Sliding Mode Technique with Double Closed Loop for Spacecraft Near Small BodyChunhui Liang, Yuanchun Li. 78-82 [doi]
- Theory and Substantiation of z0g1 Controller Conquering Singularity Problem of Output Tracking for a Class of Nonlinear SystemYunong Zhang, Ying Wang, Yonghua Yin, Hongzhou Tan, Qingkai Zeng. 83-88 [doi]
- Modeling Well Scheduling as a Virtual Enterprise with Intelligent AgentsGraham Lange, Fuhua Lin. 89-96 [doi]
- Common Due-Date Problem: Linear Algorithm for a Given Job SequenceJörg Lässig, Abhishek Awasthi, Oliver Kramer. 97-104 [doi]
- A Novel Prediction Method for Analog Circuits Based on Gaussian White Noise EstimationJingyu Zhou, Shulin Tian, Bing Long, Chenglin Yang. 105-112 [doi]
- Parallel Optical Flow Processing of 4D Cardiac CT Data on Multicore ClustersXingfu Wu, Guangtai Ding, Valerie E. Taylor. 113-120 [doi]
- A GPU-Based Method for Weakly Compressible FluidsXiao Nie, Leiting Chen, Tao Xiang. 121-126 [doi]
- New FCM's Validity Index for Sorting Radar SignalMohaned Giess Shokrallah Ahmed, Bin Tang. 127-131 [doi]
- Robust Beamforming by an Improved Neural Minor Component Analysis AlgorithmYabo Yuan, Bin Wu. 132-136 [doi]
- Visual Cluttering Reduction for Visualizing Large Spatio-temporal Data SetsAyush Shrestha, Ying Zhu, Yan Zhu. 137-143 [doi]
- An Efficient Method for Structural Reliability Analysis Using Evidence TheoryMi Xiao, Haihong Xiong, Liang Gao, Qiangzhuang Yao. 144-149 [doi]
- Failure Analysis and Improved Method of Batch Cracks for Certain Fighter AircraftWei Zhang, Desheng Yu, Dongdong Qi, Hongling Qi, Dan Xu. 150-154 [doi]
- Identification and Marking of Molecular Surface Feature Regions Based on Spherical MappingJingqiao Zhang, Zhe Shi, Meiling Zhang. 155-160 [doi]
- Texture Defect Detection Using Dual-Tree Complex Wavelet ReconstructionHuixian Sun, Yuhua Zhang, Zhaorui Li. 161-164 [doi]
- IRIS2: A Semantic Search Engine That Does Rational ResearchWei Wang, Hai-Ning Liang. 165-171 [doi]
- A Robust Iterative Algorithm for Parameter Estimation of the Generalized Gamma DistributionRui Luo, Wei Zhao. 172-180 [doi]
- Cold-Start Mastered: LebiD1Lebi Jean-Marc Dali, Zhiguang Qin. 181-184 [doi]
- LPA Based Hierarchical Community DetectionTao Wu, Leiting Chen, Yayong Guan, Xin Li, Yuxiao Guo. 185-191 [doi]
- Delayering Tagging of Television Programs and Association Rule MiningXingyi Pan, Fulian Yin, Jianping Chai. 192-197 [doi]
- A Collaborative Filtering Recommender Algorithm Based on the User Interest ModelMin Zhu, Shuzhen Yao. 198-202 [doi]
- Vehicle Detection by Sparse Deformable Template ModelsJingcong Wang, Shuo Zhang, James Chen. 203-206 [doi]
- Automatic Twitter Topic SummarizationDunwei Wen, Geoffrey Marshall. 207-212 [doi]
- Predicting Stock Trend Using Fourier Transform and Support Vector RegressionHaiying Huang, Wuyi Zhang, Gaochao Deng, James Chen. 213-216 [doi]
- Evolutionary Computation with Multi-variates Hybrid Multi-order Fuzzy Time Series for Stock ForecastingShanhong Wan, Defu Zhang, Yain-Whar Si. 217-223 [doi]
- Segmentation of Mobile User Groups Based on Traffic Usage and Mobility PatternsHaibin Shi, Suyang Huang, Minzheng Huang, Zihong Chen, Xuemin Hong, Lingxiang Zheng, Huiru Zheng. 224-230 [doi]
- Constructing Sentiment Lexicons in Norwegian from a Large Text CorpusAleksander Bai, Hugo Hammer, Anis Yazidi, Paal Engelstad. 231-237 [doi]
- Big Data Management in Digital ForensicsMan Qi, Yang Liu 0005, Lin Lu, Junyong Liu, Maozhen Li. 238-243 [doi]
- A Visualizer for High Utility Itemset MiningWei Song, Mingyuan Liu. 244-248 [doi]
- An Unified Approach for Multimedia Document Representation and Document SimilarityPushpalatha K, Ananthanarayana V. S. 249-256 [doi]
- A Novel Resource Scheduling Approach in Container Based CloudsXin Xu, Huiqun Yu, Xin Pei. 257-264 [doi]
- Developing a Pattern Discovery Model for Host Load DataZhuoer Gu, Cheng Chang, Ligang He, Kenli Li. 265-271 [doi]
- Dual Power: Integrating Renewable Energy into Green Datacenters without Grid Tie InverterXian Li, Rui Wang, Depei Qian. 272-278 [doi]
- An Efficient Hierarchical Clustering Algorithm via Root SearchingWenbo Xie, Zhen Liu. 279-284 [doi]
- GGreen: A Greedy Energy-Aware Scheduling Algorithm on Grid SystemsFábio Coutinho, Evandro Verdino, Jesus Ossian, Renato Santana. 285-290 [doi]
- FITDOC: Fast Virtual Machines Checkpointing with Delta Memory CompressionYunjie Du, Xuanhua Shi, Hai Jin, Song Wu. 291-298 [doi]
- HPC Environment on Azure Cloud for Hydrological Parameter EstimationGuangjun Zhang, Yingying Yao, Chunmiao Zheng. 299-304 [doi]
- A Credit-Based Allocation Method of Resource Quotas for Cloud UsersJing Chen, Yinglong Wang, Bing Xue, Zhigang Zhao, Ying Guo. 305-311 [doi]
- Architecting for the Cloud: A Systematic ReviewHongyu Pei Breivold, Ivica Crnkovic, Iva Radosevic, Ivan Balatinac. 312-318 [doi]
- Study on the Effect Mechanism of the Bipolar Junction Transistor Caused by ESDZhiliang Tan, Peijiao Song, Liyun Ma, Zhaoxiang Meng. 319-323 [doi]
- Three GPU-Based Parallel Schemes for SAR Back Projection Imaging AlgorithmKebin Hu, Xiaoling Zhang 0002, Wenjun Wu, Jun Shi 0002, Shunjun Wei. 324-328 [doi]
- Low Loss Compact Meander Stripline Delay Lines Using LTCCHaodong Lin, Hao Peng, Yu Liu, Jun Dong, Tao Yang. 329-333 [doi]
- Millimeter-Wave Interferometric Synthetic Aperture Radar Imaging via Ground ProjectionShunjun Wei, Liwen Guo, Xiaoling Zhang, Jun Shi. 334-339 [doi]
- A Method for Fast States Estimation of Multi-function Radar Based on Syntactic Derivation of Parse ChartLipeng Dai, Buhong Wang, Lingyue Jia. 340-344 [doi]
- Improved Reliability Information for Rectangular 16-QAM over Flat Rayleigh Fading ChannelsO. O. Ogundile, Daniel J. J. Versfeld. 345-349 [doi]
- A STDMA-Based Collaborative Transmission Scheme for 60GHz WPANs with Directional AntennaMin Wang, Hao Zhang, Wei Shi, Ting-ting Lu. 350-356 [doi]
- A Novel Routing Algorithm Based on Virtual Topology Snapshot in LEO Satellite NetworksHaichao Tan, Lidong Zhu. 357-361 [doi]
- An Energy Efficient Harmony Search Based Routing Algorithm for Small-Scale Wireless Sensor NetworksBing Zeng, Yan Dong. 362-367 [doi]
- Improved Single-Stream Beamforming Algorithm in TD-LTE SystemYanan Liu, Hao Liu, Tianxiang Jia, Teng Wang. 368-372 [doi]
- Localization Using Self-Organizing Maps Based on Spring RelaxationMengjiao Zhang, Xiaohui Chen, Kai Ruan, Jiyuan Sun, Yangrui Zhu. 373-377 [doi]
- Multipath Routing Protocol Based on Congestion Control Mechanism Implemented by Cross-Layer Design Concept for WSNPeng Qian, Enqing Dong, Juan Xu, Xing Lan, Wei Liu, Wentao Cui. 378-384 [doi]
- Resource Allocation for Energy Saving in Downlink Wireless Communication with Direction-Variable AntennasHan Han, Juan Chen, Junnan Yao, Yuzhen Huang, Ying Li, Jingchao Wang. 385-391 [doi]
- An Efficient Algorithm for Route Discovery and Mobility Management on Mobile Ad Hoc NetworksFenglien Lee, Daisy F. Sang, Tzu-Chaing Chiang. 392-396 [doi]
- A Modified Slotted Random Anti-collision Algorithm for the EPCglobal UHF Class-1 Generation-2 StandardYuliang Wu, Shuzhen Yao. 397-400 [doi]
- A Priority Based Adaptive Channel Reservation Algorithm for Improved System Capacity in Cognitive Radio NetworksTamal Chakraborty, Iti Saha Misra. 401-406 [doi]
- Identify & Measure Social Relations: Routing Algorithm Based on Social Relations in Opportunistic NetworksXiaohua Wu, Song Chen. 407-412 [doi]
- Development of a Teaching Material That Can Motivate Students to Learn Control Engineering and Image ProcessingRahok Yokokawa Sam Ann, Hirohisa Oneda, Shigeji Osawa, Koichi Ozaki. 413-419 [doi]
- A Case Study of Learning Action and Emotion from a Perspective of Learning AnalyticsHaiping Zhu, Xinhui Zhang, Xinhong Wang, Yan Chen, Bin Zeng. 420-424 [doi]
- A Methodology for Evaluation and Knowledge Extraction from On-going Learning ProcessIsidoros Perikos, Panagiotis Angelopoulos, Michael Paraskevas, Thomas Zarouchas, Giannis Tzimas. 425-431 [doi]
- Learning Model Development of Creating a Multimedia Application Particularly Puzzle GameHadi Sutopo. 432-437 [doi]
- The Future of Teleteaching in MOOC TimesMartin Malchow, Matthias Bauer, Christoph Meinel. 438-443 [doi]
- NSCC: Self-Service Network Security Architecture for Cloud ComputingJin He, Mianxiong Dong, Kaoru Ota, Mingyu Fan, Guangwei Wang. 444-449 [doi]
- Effective Sensors Deployment with Localization Accuracy ConstraintsRiming Wang, Jiuchao Feng. 450-457 [doi]
- Eye Detection for Gaze Tracker with Near Infrared IlluminatorHyun-Cheol Kim, Jihun Cha, Won Don Lee. 458-464 [doi]
- Development of Attitude Determination System for Moving Carrier Based on MEMS SensorsTianxiang Jia, Yanan Liu. 465-469 [doi]
- A Solver for Performance-Aware Component Composition Problem in Reconfigurable RouterZhiming Wang, Jiangxing Wu, Fengyu Zhang, Jianhui Zhang, Zhen Zhang, Yuxiang Hu. 470-475 [doi]
- A Task Scheduling and Placement Strategy Based on Tasks' Aspect RatioWeiguo Wu, Tao Wang, Chaohui Wang, Qing Zhang. 476-482 [doi]
- DCDF: A Distributed Clustered Decision Fusion Scheme for Target Detection in Wireless Sensor NetworksLingzhi Yi, Xianjun Deng, Dexin Ding, Zenghui Zou, Wenbin Wang. 483-486 [doi]
- A Novel Architecture for Inter-FPGA Traffic Collision ManagementAtef Dorai, Virginie Fresse, El-Bay Bourennane, Abdellatif Mtibaa. 487-495 [doi]
- Mathematical Models Applied to On-Chip Network on FPGA for Resource EstimationVirginie Fresse, Catherine Combes, Hatem Belhasseb. 496-504 [doi]
- A Hardware Acceleration Engine for Ray TracingYuanyuan Gao, Li Zhou, Yanhu Chen, Yang Wang, Jia Wang, Tao Sun. 505-508 [doi]
- Saliency-Aware Image CompletionZhengzhi Li, Haoqian Wang, Kai Li. 509-512 [doi]
- A New Edge Ordering Heuristic in Network Reliability AnalysisHuan Wu, Xuan Liu, Zhusheng Pan, Farong Zhong, Yuchang Mo. 513-518 [doi]
- A Novel QoS Mapping Algorithm for Heterogeneous Home Networks Using General Regression Neural NetworksYi-Chih Tung, Wen-Jyi Hwang, Chih-Hsiang Ho. 519-526 [doi]
- A Bayesian Nonparametric Topic Model for User Interest ModelingQinjiao Mao, Boqin Feng, Shanliang Pan. 527-534 [doi]
- HD: A Cache Storage Strategy Based on Hierarchical Division in Content-centric NetworkingZongming Feng, Jun Li, Haibo Wu, Jiang Zhi. 535-540 [doi]
- A Novel Queue Management Algorithm INRIO-C Based on Differentiated ServicesJie Xu, Jianwei Song, Qingqiang He, Jun Xu. 541-546 [doi]
- Multi-byte Pattern Matching Using Stride-K DFA for High Speed Deep Packet InspectionMaleeha Najam, Usman Younis, Raihan Ur Rasool. 547-553 [doi]
- Effects of Memory on Information Spreading in Complex NetworksPanpan Shu. 554-556 [doi]
- Exploring Cache Coding Scheme for Information-centric NetworkingLidu Qin, Hui Li, Kai Pan, Fuxing Chen, Wensheng Chen, Chaoqi Yu. 557-562 [doi]
- Exploring the Benefits of Introducing Network Coding into Named Data NetworkingKai Lei, Tao Chen, Chen Peng, Zhi Tan. 563-568 [doi]
- A Novel Relative Frequency Based Ring Oscillator Physical Unclonable FunctionChaohui Du, Guoqiang Bai. 569-575 [doi]
- Design of Non-autonomous Chaotic Generalized Synchronization Based Pseudorandom Number Generator with Application in Avalanche Image EncryptionTing Liu, Lequan Min. 576-582 [doi]
- A Cost-Aware Method of Privacy Protection for Multiple Cloud Service RequestsQiuwei Yang, Changquan Cheng, Xiqiang Che. 583-590 [doi]
- ASPG: Generating Android Semantic PermissionsJiayu Wang, Qigeng Chen. 591-598 [doi]
- A Novel Mutual Authentication Scheme for Smart Card without Information LeakageCheng Cai, Yuesheng Zhu, Bojun Wang. 599-604 [doi]
- PeerSorter: Classifying Generic P2P Traffic in Real-TimeJie He, Yuexiang Yang, Xiaolei Wang, YingZhi Zeng, Chuan Tang. 605-613 [doi]
- A Design of Elliptic Curve Cryptography-Based Authentication Using QR CodeNon Thiranant, Young-Jin Kang, Taeyong Kim, Wontae Jang, Suhyun Park, Hoonjae Lee. 614-619 [doi]
- FVisor: Towards Thwarting Unauthorized File Accesses with a Light-Weight HypervisorYan Wen, Jinjing Zhao, Shuanghui Yi, Xiang Li. 620-626 [doi]
- Performance Analysis and Optimization for Stochastic Workflows Running under Authorization ConstraintsCheng Chang, Ligang He, Hao Chen, Jianhua Sun, Kenli Li. 627-633 [doi]
- Alljoyn Based Direct Proximity Service Development: Overview and PrototypeYufeng Wang, Li Wei, Qun Jin, Jianhua Ma. 634-641 [doi]
- A Heuristic Recommendation Method Based on Contextual Social NetworkChao Zhou, Bo Li. 642-646 [doi]
- A Complex Network Model Based on 'Friends of a Friend' in a Fixed CommunityDeshun Zhao, Kun Zhao, Jun Yang, Jingrong Sha. 647-652 [doi]
- Service Reliability Prediction Method for Service-Oriented Multi-agent SystemKwangkyu Lee, OkJoo Choi, Jongmoon Baik. 653-660 [doi]
- Performance Comparison and Evaluation of Web Development Technologies in PHP, Python, and Node.jsKai Lei, Yining Ma, Zhi Tan. 661-668 [doi]
- A Comparison of Content Based Image Retrieval SystemsYuhan Wang, Qiaochu Li, Tian Lan, James Chen. 669-673 [doi]
- Improve Parallelism of Task Execution to Optimize Utilization of MapReduce Cluster ResourcesLiming Zheng, Yao Shen. 674-681 [doi]
- Dynamic Core Allocation for Energy-Efficient Thread-Level SpeculationMeirong Li, Yinliang Zhao, Yongqiang Si. 682-689 [doi]
- PaREM: A Novel Approach for Parallel Regular Expression MatchingSuejb Memeti, Sabri Pllana. 690-697 [doi]
- Offline Data Dependence Analysis to Facilitate Runtime Parallelism ExtractionJohn M. Ye, Jason Chen, Tianzhou Chen, Minghui Wu, Li Liu. 698-703 [doi]
- Availability Analysis of Satellite Positioning Systems for Aviation Using the PRISM Model CheckerYu Lu, Alice Miller, Chris Johnson, Zhaoguang Peng, Tingdi Zhao. 704-713 [doi]
- A Novel Slack-Stealing Scheduling Algorithm for Hard-Real-Time Multiple-Processors SystemPing Zhu, Ming Hu, Xuhui Chen. 714-721 [doi]
- Reducing Repair Traffic with Exact and Uncoded Repair in Distributed Storage Systems: Intersecting Zigzag Sets Codes on Hierarchical CodesPengfei You, Zhen Huang, Changjian Wang, Yuxing Peng. 722-728 [doi]
- Tool Support for Rigorous Formal Specification InspectionMo Li, Shaoying Liu. 729-734 [doi]
- A Semi-centralized Algorithm to Detect and Resolve Distributed Deadlocks in the Generalized ModelZhi Tao, Hui Li, Bing Zhu, Yunmin Wang. 735-740 [doi]
- A Novel Technique for PID Tuning by Linearized Biogeography-Based OptimizationT. A. Boghdady, M. M. Sayed, A. M. Emam, E. E. Abu El-Zahab. 741-747 [doi]
- Usable Security Mechanisms in Smart BuildingWeihan Bo, Yiling Zhang, Xianbin Hong, Hanrong Sun, Xin Huang. 748-753 [doi]
- User Authentication Interfaces in Mobile Devices: Some Design ConsiderationsHaining Liang, Charles Fleming, Wei Wang. 754-757 [doi]
- Adrasteia: A Smartphone App for Securing Legacy Mobile Medical DevicesVahab Pournaghshband, David Meyer, Michael Holyland, Majid Sarrafzadeh, Peter L. Reiher. 758-763 [doi]
- Mobistore: Secure Cloud-like Storage on Mobile DevicesCharles Fleming, Haining Liang, Kalok Man, Yudi An. 764-767 [doi]
- Web Classification Using Deep Belief NetworksShu Sun, Fang Liu, Jun Liu, Yinan Dou, Hua Yu. 768-773 [doi]
- An Improvement to Feature Selection of Random Forests on SparkKe Sun, Wansheng Miao, Xin Zhang, Ruonan Rao. 774-779 [doi]
- A Dynamic Power Features Selection Method for Multi-appliance Recognition on Cloud-Based Smart GridChin-Feng Lai, Ren-Hung Hwang, Han-Chieh Chao, Ying Hsun Lai. 780-785 [doi]
- Mobility Prediction Based Opportunistic Computational Offloading for Mobile Device CloudBo Li, Zhi Liu, Yijian Pei, Hao Wu. 786-792 [doi]
- A Ubiquitous Computing Platform - Affordable Telepresence Robot Design and ApplicationsMarc Denojean-Mairet, Qing Tan, Frederique C. Pivot, Mohamed Ally. 793-798 [doi]
- Research on Response Model of Data MiningSheng Liu, Lili He, Binfei Shao. 799-802 [doi]
- Highly Efficient Local Non-Texture Image Inpainting Based on Partial Differential EquationChuang Zhu, Huizhu Jia, Meng Li, Xiaofeng Huang, Xiaodong Xie. 803-807 [doi]
- An Effective Way to Improve Actigraphic Algorithm by Using Tri-axial Accelerometer in Sleep DetectionChuan Jiang, Sheng Zhang, Xiaokang Lin. 808-811 [doi]
- Geospatial Sensor Network eLearning Collaboratory - A Portal for Sensor Knowledge Acquisition and RepresentationXiaoliang Meng, Yunhao Wu, Yuwei Wang. 812-817 [doi]
- A Safe-Region Approach to k-RNN Queries in Directed Road NetworkKamil Zeberga, Hyung-Ju Cho, Tae-Sun Chung. 818-824 [doi]
- Rényi's Entropy Based Method for Analog Circuits Soft Fault DetectionXuan Xie, Xifeng Li, Dongjie Bi, Qizhong Zhou, Yongle Xie, Sanshan Xie. 825-830 [doi]
- The Real-Time Eye Detection for Single User Based on Template MatchingWeijia Zhong, Ziqiang Huang. 831-834 [doi]
- A Modified Greedy Algorithm for Wavelet Coefficients ReconstructionDeyin Liu, Ruojin Cao, Xiaomin Mu, Lin Qi. 835-839 [doi]
- A New Redundant Binary Partial Product Generator for Fast 2n-Bit Multiplier DesignXiao-Ping Cui, Hu Wei, Chen Xin, Shumin Wang. 840-844 [doi]
- Global Hybrid Multi-core-GPUs-OpenMPs-Resources Platform in Hard Real Time SystemFurkan Rabee, Yong Liao, Maolin Yang, Jian Liu, Ge Zhu. 845-850 [doi]
- Chroma-Keying Based on Global Weighted Sampling and Laplacian PropagationWenyi Wang, Jiying Zhao. 851-854 [doi]
- Efficient Dual Channel Multiple Access for Multihop Wireless NetworksXiaojun Li, Quanzhong Li, Kai Liu. 855-858 [doi]
- Antenna Array Beam Pattern Synthesis Based on Trust Region MethodYunxiang Zhang, Zhiqin Zhao, Jinguo Wang, Gengyuan Dan. 859-862 [doi]
- A Hierarchical Scheduling Algorithm in Improving Quality of Wireless 3D Video TransmissionXiang Gao, Dou Li, Zhiming Liu, Yuping Zhao. 863-867 [doi]
- Adaptive Resource Allocation for QoE-Aware Mobile Communication NetworksMirghiasaldin Seyedebrahimi, Xiao-Hong Peng, Rob Harrison. 868-875 [doi]
- A Novel Routing Scheme for LEO Satellite Networks Based on Link State RoutingHongcheng Yan, Qingjun Zhang, Yong Sun. 876-880 [doi]
- Design of an X-Band Negative Resistance Oscillator Based on the ASIW in Modern Wireless Communication SystemsXin Cao, Zongxi Tang, Chengjie Su, Fei Wang, Yunqiu Wu. 881-883 [doi]
- Data Directed Estimation Based Turbo Equalization in HF CommunicationZhuo Ma, Shuanyi Du. 884-889 [doi]
- Lattice Reduction Aided Blind Signal Separation AlgorithmKun Zhang, Yourong Lu, Wei Wang. 890-894 [doi]
- UWBSS: Ultra-wideband Spectrum Sensing with Multiple Sub-Nyquist Sampling RatesYong Lu, Shaohe Lv, Xiaodong Wang, Xingming Zhou. 895-900 [doi]
- Distributed Construction of Connected Dominating Sets Optimized by Minimum-Weight Spanning Tree in Wireless Ad-Hoc Sensor NetworksSijun Ren, Ping Yi, Dapeng Hong, Yue Wu, Ting Zhu. 901-908 [doi]
- Distance Based Energy Efficient Clustering Method in Wireless Sensor NetworksHyunduk Kim, Chulki Kim, Jaehun Kim, Minah Seo, Seok Lee, Taikjin Lee. 909-914 [doi]
- Energy-Aware Secure Routing for Hybrid Wireless Mesh NetworksJia Hu, Hui Lin, Li Xu. 915-922 [doi]
- WiPCon: A Proxied Control Plane for Wireless Access Points in Software Defined NetworksWon-Suk Kim, Sang-Hwa Chung, Jiameng Shi. 923-929 [doi]
- User Evaluations Service Quality on E-Tax Filing Satisfaction within the Public SectorNakanya Chumsombat. 930-935 [doi]
- Parameter Estimation of Phase Code and Linear Frequency Modulation Combined Signal Based on Fractional Autocorrelation and Haar Wavelet TransformZhaoyang Qiu, Jun Zhu, Pei Wang, Bin Tang. 936-939 [doi]
- Cone Dominance-Based Interactive Evolutionary Multiobjective Algorithm for QoS-Driven Service Selection ProblemDalaijargal Purevsuren, Saif-Ur Rehman, Gang Cui, Nwe Nwe Htay Win, Bao Jian-Min. 940-945 [doi]
- Enabling Query of Frequently Updated Data from Mobile Sensing SourcesYuchao Zhou, Suparna De, Wei Wang, Klaus Moessner. 946-952 [doi]
- Multiple Secret Key Sharing Based on the Network Coding Technique for an Open Cloud DRM Service ProviderWiroon Sriborrirux, Panuwat Promsiri, Apirath Limmanee. 953-959 [doi]
- Solutions for the Key Technologies of Cultural Transmission Platform under Wireless NetworksChao Guo, Yinbo Liu, Xingang Liu. 960-963 [doi]
- An Effective Algorithm to Detect Abnormal Step Counting Based on One-Class SVMZhen-Jie Yao, Zhi-peng Zhang, Li-Qun Xu. 964-969 [doi]
- Preliminary Study on Wireless Home Automation Systems with Both Cloud-Based Mode and Stand-Alone ModeZhibo Pang, Yuxin Cheng, Morgan E. Johansson, Gargi Bag. 970-975 [doi]
- NC-COCA: Network Coding-Based Cooperative Caching SchemeYide Zhang, Xiaojuan Xu, Xinling Wang, Zhipan Fang, Jie Tang. 976-980 [doi]
- Uncorrelated Weighted Median Filtering for Noise Removal in SuperDARNClarence Goh, John C. Devlin, Dennis Deng, Andrew McDonald, Muhammad Ramlee Kamarudin. 981-988 [doi]
- Detection of SMSP Jamming in Netted Radar System Based on Fractional Power SpectrumYuan Zhao, Dong-Ping Du, Ahmed Abdalla Ali, Bin Tang. 989-993 [doi]
- Improving Prediction Robustness of VAB-SVM for Cross-Project Defect PredictionDuksan Ryu, OkJoo Choi, Jongmoon Baik. 994-999 [doi]
- Agent Based Resource Discovery for Peak Request Periods in Peer-to-Peer Grid InfrastructuresMoses Olaifa, Ronell Van Der Merwe, Temitope Mapayi. 1000-1005 [doi]
- Fast Intra/Inter-mode Decision for Arbitrary Downsizing Video Transcoder Using H.264/AVC StandardXin-Yan Xu, Zhao-Guang Liu. 1006-1009 [doi]
- Broadcast Searchable Keyword EncryptionMohamed Ali, Hamza Ali, Ting Zhong, Fagen Li, Zhiguan Qin, Ahmed Abdelrahaman A. A.. 1010-1016 [doi]
- DPSC: A Novel Scheduling Strategy for Overloaded Real-Time SystemsZhuo Cheng, Haitao Zhang, Yasuo Tan, Azman Osman Lim. 1017-1023 [doi]
- A Weakness-Based Attack Pattern Modeling and Relational Analysis MethodLili Lu, Song Huang, Zhengping Ren. 1024-1028 [doi]
- Modified Cramer-Rao Bounds for Parameter Estimation of Hybrid Modulated Signal Combining PRBC and LFMPei Wang, Dongping Du, Zhaoyang Qiu, Bin Tang. 1029-1033 [doi]
- A Method for PRI Estimation of Multicomponent LFM Signals from MIMO RadarsYunhao Li, Jun Wang, Xiaodong He, Bin Tang. 1034-1038 [doi]
- A New Error Concealment Algorithm for H.264/AVCZhixin Shen, Xingang Liu, Lingyun Lu, Xun Wang. 1039-1042 [doi]
- Transmit Multi-beamforming of Wideband Signals Based on the Focusing TransformQi Zhang, Yunhao Li, Ying Xiong, Bin Tang. 1043-1046 [doi]
- Fast Intra-mode Decision Algorithm for HEVC Based on Texture DirectionYinbo Liu, Xingang Liu, Binfei Shao. 1047-1050 [doi]
- Two-Dimensional Direction-of-Arrival Estimation Using Two Transform MatricesXiaoyu Luo, Ping Wei, Lu Gan. 1051-1054 [doi]
- A Fast Media Synchronization Mechanism for Streaming Screen Recording ApplicationsPei-Ting Wu, Shin-Hung Chang. 1055-1062 [doi]
- CRA: A Real-Time CUDA-Based Resolution Adapter in Screen Recording ApplicationsKang-Tso Wu, Shin-Hung Chang. 1063-1070 [doi]
- FMA-RRSS: Fingerprint Matching Algorithm Based on Relative Received Signal Strength in Indoor Wi-Fi PositioningGuangyu Dong, Kai Lin, Keqiu Li, Huayong Luo, Xiangwen Zhang. 1071-1077 [doi]
- R-FirstFit: A Reservation Based First Fit Priority Job Scheduling Strategy and Its Application for RenderingQian Li, Weiguo Wu, Xiaxin Zhou, Zeyu Sun, Jianhang Huang. 1078-1085 [doi]
- Algorithm Analysis and System Implementation of Advanced Facial Information Extraction and Face Recognition under Wireless NetworksLingyun Lu, Xingang Liu, Xun Wang, Zhixin Shen. 1086-1089 [doi]
- Modeling Geospatial Sensor Knowledge under a Semantic Sensor Web EnvironmentXiaoliang Meng, Yuwei Wang, Yunhao Wu. 1090-1095 [doi]
- A Real-Time Hand Gesture Recognition Approach Based on Motion Features of Feature PointsYingying She, Qian Wang, Yunzhe Jia, Ting Gu, Qun He, Baorong Yang. 1096-1102 [doi]
- Mobile Sensing on GSM Channel Utilization at Metropolitan ScalesWei Zhang, Haofu Han, Minglu Li. 1103-1108 [doi]
- Network Redundancy Elimination by Dynamic Buffer AllocationChao Yang, Hua Shi, Guangtao Xue, Hongzi Zhu, Chen Qian. 1109-1114 [doi]
- Big Data Density Analytics Using Parallel Coordinate VisualizationJinson Zhang, Mao Lin Huang, Wenbo Wang, Liang Fu Lu, Zhao-Peng Meng. 1115-1120 [doi]
- On the Complexity of Reverse Minus Domination on GraphsChuan-Min Lee, Cheng-Chien Lo. 1121-1126 [doi]
- When to Combine Two Visual Cognition SystemsDarius A. Mulia, Charles R. Skelsey, Lihan Yao, Dougan J. McGrath, D. Frank Hsu. 1127-1133 [doi]
- On the Minimum Hub Set ProblemSheng-Lung Peng, Yin-Te Li. 1134-1137 [doi]
- Clustered Trees with Minimum Inter-cluster DistanceBang Ye Wu, Chen-Wan Lin. 1138-1141 [doi]
- A Neighbor Discovery Algorithm in Network of Radar and Communication Integrated SystemJinming Li, Laixian Peng, Yilei Ye, Renhui Xu, Wendong Zhao, Chang Tian. 1142-1149 [doi]
- Parallel Construction of Independent Spanning Trees on Parity CubesYu-Huei Chang, Jinn-Shyong Yang, Jou-Ming Chang, Yue-Li Wang. 1150-1154 [doi]
- Belated Analyses of Three Credit-Based Adaptive Polling AlgorithmsSavio S. H. Tse. 1155-1162 [doi]
- Publish/Subscribe in NoSQLChia-Ping Tsai, Kuo-Yu Yang, Jui-Yu Hsieh, Hung-Chang Hsiao, Ching-Hsien Hsu. 1163-1170 [doi]
- A Recursive Algorithm for General Hash Chain TraversalYi-Wen Peng, Wei-Mei Chen. 1171-1174 [doi]
- Multicast Rendezvous in Cognitive Radio Networks: A Hypercube ApproachKehao Wang. 1175-1180 [doi]
- Predicting the Quality of Experience for Internet Video with Fuzzy Decision TreeYuran Zhang, Ting Yue, Hongbo Wang, Anming Wei. 1181-1187 [doi]
- Hierarchical RBF Neural Network Using for Early Stage Internet Traffic IdentificationLizhi Peng, Bo Yang, Yuehui Chen. 1188-1195 [doi]
- Overlapping Local Community Detection in Directed Weighted NetworksShidong Li, Sheng Ge. 1196-1200 [doi]
- A Simple Voice Extraction Algorithm in a High-Noise EnvironmentYichao Cao, Fujun Wang, Yaheng Zhang. 1201-1204 [doi]
- An Asynchronous Distributed Algorithm for Constructing a Connected Dominating Set Optimized by Minimum-Weight Spanning TreeSijun Ren, Ping Yi, Yue Wu, Jianhua Li. 1205-1212 [doi]
- Connectivity Results of Hierarchical Cubic Networks as Associated with Linearly Many FaultsEddie Cheng, Ke Qiu, Zhizhang Shen. 1213-1220 [doi]
- A Low-Power System Design of RFID Sensor NetworksZhiyong Luo, Rui Wang, Ke Chen, Yu Pang, Sheng Yang. 1221-1225 [doi]
- Solving the Problem of Runge Phenomenon by Pseudoinverse Cubic SplineDechao Chen, Tianjian Qiao, Hongzhou Tan, Mingming Li, Yunong Zhang. 1226-1231 [doi]
- Power-Activated WASD Neuronet Based Russian Population Estimation, Correction, and PredictionYunong Zhang, Jianxi Liu, Dongsheng Guo, Sitong Ding, Hongzhou Tan. 1232-1236 [doi]
- From Newton Fractals to Gradient Fractals in Addition to Zhang FractalsYunong Zhang, Tianjian Qiao, Bolin Liao, Long Jin, Junwei Chen. 1237-1242 [doi]
- ZG Control of Populations of Lotka-Volterra Equations Using Interaction Coefficients as InputsYunong Zhang, Yinyan Zhang, Dechao Chen, Zhengli Xiao, Hongzhou Tan. 1243-1248 [doi]
- A Multiple Interfaces Routing System Embedded on FPGAZhihua Chen, Deshi Li. 1249-1255 [doi]
- Region Disjoint Paths in a Class of Optimal Line Graph NetworksPrashant D. Joshi, Arunabha Sen, Said Hamdioui, Koen Bertels. 1256-1260 [doi]
- Reducing Communication in Parallel Breadth-First Search on Distributed Memory SystemsHuiwei Lv, Guangming Tan, Mingyu Chen, Ninghui Sun. 1261-1268 [doi]
- Broadcasting in Harary-Like GraphsPuspal Bhabak, Hovhannes A. Harutyunyan, Shreelekha Tanna. 1269-1276 [doi]
- Conditional Connectivity with Distance Requirement on HypercubeLiang Ma, Jianxi Fan, Lih-Hsing Hsu, Cheng-Kuan Lin. 1277-1281 [doi]
- NM2H: Design and Implementation of NoSQL Extension for HDFS Metadata ManagementRuini Xue, Zhongyang Guan, Shengli Gao, Lixiang Ao. 1282-1289 [doi]
- IOMRA - A High Efficiency Frequent Itemset Mining Algorithm Based on the MapReduce Computation ModelSheng-hui Liu, Shi-Jia Liu, Shi-Xuan Chen, Kun-Ming Yu. 1290-1295 [doi]
- N Fault-Tolerant Sender-Based Message Logging for Group Communication-Based Message Passing SystemsJinHo Ahn. 1296-1301 [doi]
- LRU-MRU with Physical Address Cache Replacement Algorithm on FPGA ApplicationYuan Xue, Yongmei Lei. 1302-1307 [doi]
- A Strategy of Service Quality Optimization for Live Virtual Machine MigrationCho-chin Lin, Zong-De Jian, Ching-Hsien Hsu. 1308-1313 [doi]
- Work and Sojourn Time in an M/G/1 Retrial Queue with BreakdownsAmar Aissani. 1314-1319 [doi]
- Dynamic Clone Sharing Scheme in Mobile Cloud Computing: A Delaunay Triangulation ApproachZhen Yang, Xing Liu. 1320-1325 [doi]
- Aggregation Decoding for Multi-failure Recovery in Erasure-Coded StorageJing Zhang, Shanshan Li, Xiangke Liao, Xiaodong Liu. 1326-1331 [doi]
- The Auto-configurable LDPC Codes for Distributed StorageYongmei Wei, Yong Wee Foo, Khai Cher Lim, Fengmin Chen. 1332-1338 [doi]
- Design of Simple Bleeding Detector and Alarm System Using RF Transceiver and GSM SystemMohamed Y. E. Simik, Feng Chi, Abdeldime M. S. Abdelgader, Randa S. I. Saleh. 1339-1343 [doi]
- Design and Implementation of Flow Mobility Based on D-PMIPv6Keqiang Xie, Jun Lin, Lei Wu. 1344-1349 [doi]
- A Relay-Optimized Cooperative MAC Protocol for Mobile Ad Hoc NetworksXiaoying Chang, Kai Liu, Zhen Xu, Feng Liu. 1350-1355 [doi]
- Opportunistic Spectrum Sharing with Quality-of-Service Support in Cognitive Radio NetworksXiaojun Li, Quanzhong Li, Kai Liu. 1356-1361 [doi]
- Dynamics Nature and Link Prediction Methods in Opportunistic NetworksYin Li, Xuebing Zhao, Hao Tang, Qi Wang, Sanfeng Zhang. 1362-1368 [doi]
- Bi-directional Probing for Neighbor DiscoveryHongyan Wang, Jing Ma, Yongshan Liu, Wenyuan Liu, Lin Wang. 1369-1375 [doi]
- An All-to-All-Broadcast Oriented MAC Protocol Using Directional Antennas in Ad Hoc NetworksPeng Duan, Laixian Peng, Yilei Ye, Renhui Xu, Wendong Zhao, Chang Tian. 1376-1381 [doi]
- Human Activity Recognition Based on SimilarityYangda Zhu, Changhai Wang, Jianzhong Zhang, Jingdong Xu. 1382-1387 [doi]
- Crowdsensing Service by Mining Trajectory Patterns in Wireless Sensor NetworksTzung-Shi Chen, Hua-Wen Tsai, Cheng-Hsien Tsai, Yow-Chwen Leu. 1388-1395 [doi]
- A Secret Key Extraction Technique Applied in Vehicular NetworksAbdeldime M. S. Abdelgader, Lenan Wu. 1396-1403 [doi]
- Uplink Power Control for Dual ConnectivityLi Zhao, Xueyan Huang, Yong Li, Liu Liu, Huiling Jiang, Kazuki Takeda, Xiaodong Ji. 1412-1416 [doi]
- Reliable Delivery of Warning Messages in Partitioned Vehicular Ad Hoc NetworksHuan Zhou, Shouzhi Xu, Dong Ren, Chungming Huang. 1417-1423 [doi]
- Full Duplex with Buffer-Aided RelayChen Chen, Xiaodong Ji, Jun Wang, Tingting Wang, Yong Li, Wenbo Wang. 1424-1429 [doi]
- Secure SMS Communication Using Encryption Gateway and Digital SignatureMhair Kashif. 1430-1434 [doi]
- Exploiting Partial Centrality of Nodes for Data Forwarding in Mobile Opportunistic NetworksPeiyan Yuan, Ping Liu, ShaoJie Tang. 1435-1442 [doi]
- Buffer Capacity-Constrained Epidemic Routing Model in Mobile Ad-Hoc NetworksXiaofei Luo, Guozhu Liu, Huawei Huang. 1443-1448 [doi]
- Delay Constrained Routing Algorithm for WSN with Mobile SinkMd Arquam, C. P. Gupta, M. Amjad. 1449-1454 [doi]
- Optimal Power Allocation for Energy Harvesting and Grid Power Hybrid SystemsPeter He, Jie Luo, Lian Zhao, Yujun Kuang. 1455-1460 [doi]
- Dolphin: Ultrasonic-Based Gesture Recognition on Smartphone PlatformQifan Yang, Hao Tang, Xuebing Zhao, Yin Li, Sanfeng Zhang. 1461-1468 [doi]
- An Ensemble Approach for Activity Recognition with Accelerometer in Mobile-PhoneYuan Yuan, Changhai Wang, Jianzhong Zhang, Jingdong Xu, Meng Li. 1469-1474 [doi]
- A Two-Phase Context-Sensitive Service Composition Method with the Workflow Model in Cyber-Physical SystemsTao Wang, Chongli Niu, Lianglun Cheng. 1475-1482 [doi]
- The Effect of Attacks on DCT-Based Features for Image Copy DetectionNirin Thanirat, Sudsanguan Ngamsuriyaroj. 1483-1488 [doi]
- Context-Based Web Service Reputation MeasurementWei Li, Qibo Sun, Shangguang Wang. 1489-1496 [doi]
- A Fruit Recognition Method via Image Conversion Optimized through Evolution StrategyMichael Vogl, Jang-Yoon Kim, Shin-Dug Kim. 1497-1502 [doi]
- A Design and Implementation of Information Service Architecture for Resource-Constraint Devices in Internet of ThingsMingliu Liu, Deshi Li, Haili Mao. 1503-1508 [doi]
- IoT Information Service Composition Driven by User RequirementZhen Yang, Deshi Li. 1509-1513 [doi]
- A Pilot Crowdsourced City Governance System: CITY FEEDLinlin You, Gianmario Motta, Kaixu Liu, Tianyi Ma. 1514-1519 [doi]
- Security-Aware Real-Time Scheduling for HypervisorsRekha Kashyap, Deo Prakash Vidyarthi. 1520-1527 [doi]
- PeerDigger: Digging Stealthy P2P Hosts through Traffic Analysis in Real-TimeJie He, Yuexiang Yang, Xiaolei Wang, Chuan Tang, YingZhi Zeng. 1528-1535 [doi]
- Authoritative Scholarly Paper Recommendation Based on Paper CommunitiesQuan Zhou, Xiuzhen Chen, Changsong Chen. 1536-1540 [doi]
- Privacy Preserving Biometric-Based User Authentication Protocol Using Smart CardsMinsu Park, Hyun-Sung Kim, Sung-Woon Lee. 1541-1544 [doi]
- Multimodal Cryptosystem Based on Fuzzy CommitmentLi Yuan. 1545-1549 [doi]
- An Approach to Formally Validate and Verify the Compliance of Low Level Access Control PoliciesFaouzi Jaïdi, Faten Labbene-Ayachi. 1550-1557 [doi]
- Self-Stabilizing Selection of Influential Users in Social NetworksYihua Ding, James Zijun Wang, Pradip K. Srimani. 1558-1565 [doi]
- Design and Implementation of Multi-channel Wideband and RF Signal GeneratorJiafen Zhang, Feiyan Mu, Qingang Shi, Xiaodong He. 1566-1569 [doi]
- Constructing Minimum Connected Dominating Sets with Constant Update Time in Wireless Ad-Hoc Sensor NetworksSijun Ren, Ping Yi, Zhuqiulong Lin, Chenxi Guo, Yue Wu. 1570-1576 [doi]
- Fast and Reliable IP Recovery for Overlay Routing in Mission Critical Message Oriented MiddlewareYue Jia, Chris I. Phillips. 1577-1584 [doi]
- A Texture Complexity Based Fast Prediction Unit Size Selection Algorithm for HEVC Intra-codingYinbo Liu, Xingang Liu, Peicheng Wang. 1585-1588 [doi]
- A Load Balancing and Overload Controlling Architecture in Clouding ComputingHongyan Mao, Li Yuan, Zhengwei Qi. 1589-1594 [doi]
- 802.11ad Key Performance Analysis and Its Application in Home Wireless EntertainmentShuyan Jiang, Jie Peng, Zhi Lu, Junjie Jiao, Shanshan Jiang. 1595-1598 [doi]
- A CDS-Based Network Coding Scheme in Wireless Sensor Converge-Cast NetworksJing Zhang, Li Xu, Hui Lin. 1599-1604 [doi]
- Discovering Regional Taxicab Demand Based on Distribution Modeling from Trajectory DataQi Zhou, Junming Zhang, Jinglin Li, Shangguang Wang. 1605-1610 [doi]
- Detail-Enhanced Multimodal Medical Image FusionGuocheng Yang, Leiting Chen, Hang Qiu. 1611-1615 [doi]
- The Interactive Design and Performance Study of Instrument Panels Based on the Single-Handed Keyboard MouseLinlin Wang, Shiji Xiahou, Yi Kang. 1616-1620 [doi]
- Formal Specification and Transformation Method of System Requirements from B Method to AADL ModelTingting Wu, Yunwei Dong, Ning Hu. 1621-1628 [doi]
- Practical Preserving Identity-Privacy Anonymous Data Sharing in Cloud ComputingJianhong Zhang, Weina Zhen. 1629-1636 [doi]
- Shielding Your Privacy with the Local-Booted Virtual MachineYan Wen, Youyuan Fang, Jinjing Zhao, Xiang Li. 1637-1643 [doi]
- Is Really NACK Protocol Secure to Be Employed in MANETs?Maryam Saeed, Ali Mackvandi, Mehdi Taghavi, Mohammad Zare Bidoki, Mehdi Ghasemi, Ali Neshati. 1644-1647 [doi]
- Evaluating Graphs from a New PerspectiveWeidong Huang. 1648-1652 [doi]
- Study of Target Face Search Algorithm for Video AdvertisementJihong Liu, Yutao Fu, Qi Zhang, Yuting Geng. 1653-1657 [doi]
- The Parallel Implementation of Interval Global Optimization Algorithm and Its ApplicationTilong Qi, Yongmei Lei. 1658-1663 [doi]
- Classification of Drowsiness in EEG Records Based on Energy Distribution and Wavelet-Neural NetworkNaiyana Boonnak, Suwatchai Kamonsantiroj, Luepol Pipanmaekaporn. 1664-1668 [doi]
- Fast Protocol Decoding in Parallel with FPGA HardwareHan Li, Yuzhuo Fu, Ting Liu, Jiafang Wang. 1669-1673 [doi]
- Real-Time Implementation of Particle-PHD Filter Based on GPULin Gao, Xu Tang, Ping Wei. 1674-1678 [doi]
- Dynamic and Adaptive Topology-Aware Load Balancing for GridsHaitham Barkallah, Mariem Gzara, Hanêne Ben-Abdallah. 1679-1684 [doi]
- Migration of CUDA Program Based on a Divide-and-Conquer MethodNan Li, Jianmin Pang, Zheng Shan. 1685-1691 [doi]
- Extending Collection+JSON and Automatic CRUD InterfacesBryan Barnard, Massimo Di Pierro. 1692-1696 [doi]
- Credit Risk Classification Using Discriminative Restricted Boltzmann MachinesQiaochu Li, Jian Zhang, Yuhan Wang, Kary Kang. 1697-1700 [doi]
- An Improved Text Categorization Algorithm Based on VSMJi Geng, Yunling Lu, Wei Chen, Zhiguang Qin. 1701-1706 [doi]
- A Cartoon Image Annotation and Retrieval System Supporting Fast Cartoon MakingYuxiang Xie, Xidao Luan, Xin Zhang, Chen Li, Liang Bai. 1707-1714 [doi]
- Performance Evaluation of Inverted Index Traversal TechniquesKun Jiang, Xingshen Song, Yuexiang Yang. 1715-1720 [doi]
- Remote Sensing Image Classification Based on Hybrid Entropy and L1 NormJunyi Li, Jianhua Li. 1721-1726 [doi]
- Multi-instance Learning Using Information Entropy Theory for Image RetrievalJunyi Li, Jianhua Li, Shuicheng Yan. 1727-1733 [doi]
- A New Facial Expression Recognition Method Based on Geometric Alignment and LBP FeaturesXun Wang, Xingang Liu, Lingyun Lu, Zhixin Shen. 1734-1737 [doi]
- A Similarity Network Based Behavior Anomaly Detection Model for Computer SystemsQijun Shen, Jian Cao, Hua Gu. 1738-1745 [doi]
- Security Enhanced Anonymous Remote User Authentication and Key Agreement for Cloud ComputingZheming Dong, Lei Zhang, Jiangtao Li. 1746-1751 [doi]
- Backup Backhaul for FemtocellsMuhammad Asad Khan, Supeng Leng, Ahmer Khan Jadoon, Jiechen Yin. 1752-1757 [doi]
- Automatic Movie Summarization Based on the Visual-Audio FeaturesChen Li, Yuxiang Xie, Xidao Luan, Kaichao Zhang, Liang Bai. 1758-1761 [doi]
- SVD-Based 3D Image Quality Assessment by Using Depth InformationLan Zhang, Xingang Liu, Kaixuan Lu. 1762-1765 [doi]
- Study on Based Reinforcement Q-Learning for Mobile Load Balancing Techniques in LTE-A HetNetsJuanxiong Xu, Lun Tang, Qianbin Chen, Li Yi. 1766-1771 [doi]
- Contour-Preserved Retargeting of Cartoon ImagesXing Gao, Jing Liu, Juncong Lin, Minghong Liao, Lisheng Xiang. 1772-1778 [doi]
- Realtime Illustrative Rendering of Large Scale Skinned MeshesJuncong Lin, Guangyu Zhang, Xing Gao, Minghong Liao, Lisheng Xiang. 1779-1784 [doi]
- 3D Image Quality Assessment Based on Texture InformationKai Kang, Xingang Liu, Kaixuan Lu. 1785-1788 [doi]
- A New Segmentation Method for Broadcast Sports VideoHao Sun, Jim X. Chen, Harry Wechsler, Yongquan Jiang. 1789-1793 [doi]
- Efficient Recording of Parallel Chien Search Results of BCH Code by Three-Staged and Group-Sorted CircuitTao Wu. 1794-1798 [doi]
- Automated Alarm System for Diaper Wet Using GSMMohamed Y. E. Simik, Feng Chi, Abdeldime M. S. Abdelgader, Randa S. I. Saleh. 1799-1803 [doi]
- Dynamic Communication Performance of STTN under Various Traffic Patterns Using Virtual Cut-Through Flow ControlFaiz Al Faisal, M. M. Hafizur Rahman, Yasushi Inoguchi. 1804-1809 [doi]
- Analysis and Design of Conical Equiangular Spiral Antenna Using MPIE and QGA TechniqueChuang Guan, Junjian Bi, Zhiliang Tan, Zhaoxiang Meng. 1810-1813 [doi]
- An Organic View of Prototyping in Information System DevelopmentGuohua Bai. 1814-1818 [doi]
- Efficient Identity-Based Public Auditing Scheme for Cloud Storage from Lattice AssumptionXiaojun Zhang, Chunxiang Xu. 1819-1826 [doi]
- Research on Large Scale 3D Terrain GenerationZhongxing Liang, Dan Liu, Ming Zhou. 1827-1832 [doi]
- Performance Improvement of Energy-Aware MANET Routing Algorithm Using Load-BalancingXiaoying Zhang, Alagan Anpalagan, Lei Guo. 1833-1837 [doi]
- Improving Performance of Forensics Investigation with Parallel Coordinates Visual AnalyticsWenbo Wang, Mao Lin Huang, Liangfu Lu, Jinson Zhang. 1838-1843 [doi]
- A Particle PHD Filter with Improved Resampling Design for Multiple Target TrackingXiaohui Zeng, Yibing Shi, Yi Lian. 1844-1849 [doi]
- Research on Effect of Antenna Beamwidth for Compressive Sensing Based GPR ImagingMaoqi Luo, Xuelian Yu, Yun Zhou, Xuegang Wang. 1850-1854 [doi]
- A License Plate Super-resolution Reconstruction Algorithm Based on Manifold LearningLina Wei, Ying Liu. 1855-1859 [doi]
- Generating Snapshot Backups in Cloud Virtual DisksPo-Jen Chuang, Wei-Chin Wong. 1860-1863 [doi]
- Learning Sparse Representation by K-SVD for Stock ClassificationJian Zhang, Shuo Zhang, Wuyi Zhang, Kary Kang. 1864-1867 [doi]
- Implementation of Low Power 8-Bit Multiplier Using Gate Diffusion Input LogicB. N. Manjunatha Reddy, H. N. Sheshagiri, B. R. Vijayakumar, Shanthala S. 1868-1871 [doi]
- Multi-authority Attribute Based Encryption with Attribute RevocationZhenpeng Liu, Xianchao Zhu, Shouhua Zhang. 1872-1876 [doi]
- Optimal Control of an Improved SIR Model Based on Cholera SpreadingJie Xu, Chengyi Gao, Yahong Yu, Jian Sun. 1877-1881 [doi]
- Extended Gradient Local Ternary Pattern for Vehicle DetectionJian Li, Hanyi Du, Yingru Liu, Kai Zhang, Hui Zhou. 1882-1885 [doi]
- A Design of a Communication Library between Multiple Sets of MPI Processes for MPMDTakenori Shimosaka, Hitoshi Murai, Mitsuhisa Sato. 1886-1893 [doi]
- Pseudo Share: Bring Shared to Exclusive for Main Memory in Multi-core SystemsXiaolin Meng, Gangyong Jia, Jian Wan, Jilin Zhang. 1894-1899 [doi]
- Variable Universe Fuzzy PID Control for Multi-level Gas Tank PressureJian Zhang, Song Zhang, Zhihong Dan, Chufan Jiang. 1900-1904 [doi]
- SSH: Image Index Based on Sparse Spectral HashingXiaojun Liu, Fangying Du, Junyi Li. 1905-1908 [doi]
- Evaluating Open IaaS Cloud Platforms Based upon NIST Cloud Computing Reference ModelQing Lei, Yingtao Jiang, Mei Yang. 1909-1914 [doi]
- A Smart Home Architecture Based on Resource Name ServiceCui Yang, Bo Yuan, Ye Tian, Zongming Feng, Wei Mao. 1915-1920 [doi]
- The Social Feature-Based Priority Relation Graph of Mobile Social NetworksLimei Lin, Li Xu, Shuming Zhou, Wei Wu. 1921-1926 [doi]
- Cache Management for Information-centric NetworkingJie Duan, Xiong Wang, Sheng Wang, Shizhong Xu. 1927-1933 [doi]
- Face Recognition Using Markov Stationary Features and Vector Quantization HistogramQiu Chen, Koji Kotani, Feifei Lee, Tadahiro Ohmi. 1934-1938 [doi]
- Emerging Topic Detection Model Based on LDA and Its Application in Stem Cell FieldQing-Qiang Wu, Yan Zheng, Yingying She, Xinying An. 1939-1944 [doi]
- Cress: Dynamic Scheduling for Resource Constrained JobsYong Li, Jizhong Han, Wei Zhou. 1945-1952 [doi]
- Lessons from Experimental Methodology of Cache Hierarchy Changes with the Memory TechnologyYanjiang Wei, Rui Wang, Danfeng Zhu, Zhongzhi Luan, Depei Qian. 1953-1959 [doi]
- An Improved Semi-supervised K-Means Algorithm Based on Information GainZhenpeng Liu, Ding Guo, Xizhong Zhang, Xu Wang, Xianchao Zhu. 1960-1963 [doi]
- Time-Domain Dictionary for Sparse Representation of Radar High Resolution Range ProfileJinrong Zhong, Gongjian Wen, Cong Hui Ma, Boyuan Ding. 1964-1967 [doi]
- Llama: Distributed Multi-versioned Model Data Management for SCADAJie Wen, Jiao Dai, Jizhong Han, Fangchun Di, Hu Yan. 1968-1973 [doi]
- False Target Deceptive Jamming for Countering Missile-Borne SARXiaodong He, Jun Zhu, Jun Wang, Dongping Du, Bin Tang. 1974-1978 [doi]