Abstract is missing.
- A Homomorphic ElGamal Variant Based on BGN's MethodZhiwei Chen, Ruoqing Zhang, Yatao Yang, Zichen Li. 1-5 [doi]
- A Survey on Querying Encrypted Data for Database as a ServiceRama Roshan Ravan, Norbik Bashah Idris, Zahra Mehrabani. 14-18 [doi]
- Anonymous Multi-receiver Certificate-Based EncryptionChun-I. Fan, Pei-Jen Tsai, Jheng-Jia Huang, Wen-Tsuen Chen. 19-26 [doi]
- Intelligent Checkers to Improve Attack Detection in Cyber Physical SystemsGiedre Sabaliauskaite, Aditya P. Mathur. 27-30 [doi]
- Secure Wireless Multicast for Delay-Sensitive Prioritized Data Using Network CodingTuan T. Tran, Xiaolong Tang, Bin Xie. 38-45 [doi]
- Security Mechanism for the Interactive Satellite Remote Education System Based on DTNXiang-yu Bai, Yan-Jun Huang. 46-52 [doi]
- Towards a Trusted Mobile RFID Network FrameworkYan Sun, Lihua Yin, Licai Liu. 53-58 [doi]
- A Scalable Implementation of Malware Detection Based on Network Connection BehaviorsLiang Shi, Jialan Que, Zhenyu Zhong, Brett Meyer, Patrick Crenshaw, Yuanchen He. 59-66 [doi]
- A Security Ontology with MDA for Software DevelopmentWentao Kang, Ying Liang. 67-74 [doi]
- Anomaly Detection via One Class SVM for Protection of SCADA SystemsJianmin Jiang, Lasith Yasakethu. 82-88 [doi]
- Blocker-Type Methods for Protecting Customers' Privacy in RFID SystemsPrzemyslaw Blaskiewicz, Marek Klonowski, Krzysztof Majcher, Piotr Syga. 89-96 [doi]
- Seamless Privacy: Privacy-Preserving Subgraph Counting in Interactive Social Network AnalysisXuan Ding, Wei Wang, Meng Wan, Ming Gu. 97-104 [doi]
- Applications of Data Mining to an Asynchronous Argumentation Based Learning Assistance PlatformChao-Yi Chen, Heng-Ming Chen, Jui-Jiun Jian, Chenn-Jung Huang, Shun-Chih Chang, Yu-Wu Wang, Jhe-Hao Tseng. 105-108 [doi]
- Cost-Aware Automatic Virtual Machine Scaling in Fine Granularity for Cloud ApplicationsHe Zhao, Chenglei Peng, Yao Yu, Yu Zhou, Ziqiang Wang, Sidan Du. 109-116 [doi]
- DAG Based Feature Additive XML Schema Generation for Unstructured TextK. Rajbabu, S. Sudha. 117-124 [doi]
- Definition of Security Metrics for the Cloud Computing and Security-Aware Virtual Machine Placement AlgorithmsEddy Caron, Anh Dung Le, Arnaud Lefray, Christian Toinard. 125-131 [doi]
- Mining Frequent Rooted Ordered Tree Generators EfficientlyShengwei Yi, Jize Xu, Yong Peng, Qi Xiong, Ting Wang, Shilong Ma. 132-139 [doi]
- A Big Data Approach for a New ICT Agriculture Application DevelopmentR. Dennis A. Ludena, Alireza Ahrary. 140-143 [doi]
- Authorship Attribution of Short Historical Arabic Texts Based on Lexical FeaturesSiham Ouamour-Sayoud, Halim Sayoud. 144-147 [doi]
- Big Data a Sure Thing for Telecommunications: Telecom's Future in Big DataRob van den Dam. 148-154 [doi]
- Big Data Analytics in the Public Sector: Improving the Strategic Planning in World Class UniversitiesJoni A. Amorim, Sten F. Andler, Per M. Gustavsson, Oswaldo L. Agostinho. 155-162 [doi]
- Blending SQL and NewSQL Approaches: Reference Architectures for Enterprise Big Data ChallengesKshitij A. Doshi, Tao Zhong, Zhongyan Lu, Xi Tang, Ting Lou, Gang Deng. 163-170 [doi]
- The Architecture and Design of a Community-Based Cloud Platform for Curating Big DataSulayman K. Sowe, Koji Zettsu. 171-178 [doi]
- Matrix-Query: A Distributed SQL-Like Query Processing Model for Large Database ClustersQiao Liu, Ping Ji, Yuan Zuo. 179-185 [doi]
- Robustness of Community Partition Similarity MetricsDingyi Yin, Qi Ye. 186-193 [doi]
- Towards a Moderate-Granularity Incremental Clustering Algorithm for GPUChunlei Chen, Dejun Mu, Huixiang Zhang, Wei Hu. 194-201 [doi]
- A Virtualized Hybrid Distributed File SystemXingyu Zhou, Liangyu He. 202-205 [doi]
- Architecture Research and Design Implementation of Multi-data and Multi-path Communication Control SystemXiu-xiu Li, Ya-xi He, You-Ling Yu. 206-209 [doi]
- Context Aware Semantic Web Services Description and MatchHui Peng. 210-213 [doi]
- Discovering Massive High-Value Users from Sina Weibo Based on Quality and ActivityGuangzhi Zhang, Rongfang Bie. 214-220 [doi]
- Predicting Service Execution Time towards a Runtime Monitoring ApproachXinglong Ju, Youxiang Duan, Cheng Ma, Haiyan Ju. 221-224 [doi]
- Replication in Distributed Storage Systems: State of the Art, Possible Directions, and Open IssuesYing Liu, Vladimir Vlassov. 225-232 [doi]
- A New Approach for Estimating the Infrared Radiative and SimulationChengpo Mu, Chao Han, Xianlei Zhang, Jiyuan Wang. 233-236 [doi]
- The Architecture of ProMe Instant Question Answering SystemGuangzhi Zhang, Tao Jiang, Rongfang Bie, Xiaochun Liu, Zhichun Wang, Junyang Rao. 237-242 [doi]
- The mServices GUI Architectures Design for the mLearning SystemZhanlin Ji, Yongli An, Ivan Ganchev, Mairtin O'Droma. 243-246 [doi]
- A Business Computing System Optimization Research on the Efficiency of Database QueriesLin Hong, Mingda Lu, Weiting Hong. 247-250 [doi]
- A Light-Weight Rule-Based Monitoring System for Web of ThingsLi Yangqun. 251-254 [doi]
- Design of a RS485-to-1553B Bus BridgeLi Zhou, Junshe An. 255-258 [doi]
- Diagnosis Rule Mining of Airborne Avionics Using Formal Concept AnalysisYing Wen, Mingqing Xiao. 259-265 [doi]
- Distributed Algorithm for Router-Based Management of Replica Server in Next-CDN InfrastructureErwin Harahap, Janaka Wijekoon, Rajitha Tennekoon, Fumito Yamaguchi, Shinichi Ishida, Hiroaki Nishi. 266-272 [doi]
- Electric Power Data Acquisition System Based on Multi-thread MechanismYuzhu Peng, Fanchao Meng, Dianhui Chu. 273-276 [doi]
- Frequency-Estimation-Based Thigh Angle Prediction in Level-Ground Walking Using IMUsQiuyang Hu, Zaiyue Yang. 277-282 [doi]
- Management Motivation and Earnings Management MethodsZhonghai Yang, Sun Ying, Qianqian Zhang. 283-286 [doi]
- Speaker Detection on Telephone Calls Using Fusion between SVMs and Statistical MeasuresSiham Ouamour-Sayoud, Halim Sayoud. 287-293 [doi]
- Virtual Machine Placement Strategy ResearchJipeng Gao, Gaoming Tang. 294-297 [doi]
- WS-S Evaluation Based on User Preferences and Ranking MechanismCheng Ma, Youxiang Duan, Xinglong Ju, Fuchang Xu. 298-301 [doi]
- A 2-Dimensional ACO-Based Path Planner for Off-Line Robot Path PlanningNuwan Ganganath, Chi-Tsun Cheng. 302-307 [doi]
- A Cluster Based Smart MAC Layer Protocol for Delay-Tolerant Underwater Wireless Sensor NetworksZhanyang Zhang, Luciana H. Blanco. 308-315 [doi]
- An Energy-Efficient Asynchronous MAC for Bulk-Data Collection in Wireless Sensor NetworksFulong Jiang, Hao Liu. 316-319 [doi]
- Analysis of Image Transmission for Wireless Sensor Networks in the Mine TunnelJing Zhang, Erbao He, Xiaoqian Zheng. 320-324 [doi]
- Improved PCA Based Step Direction Estimation for Dead-Reckoning LocalizationHaitao Bao, Wai-Choong Wong. 325-331 [doi]
- Dynamic Collaborative Change Point Detection in Wireless Sensor NetworksMo Haghighi, Chris J. Musselle. 332-339 [doi]
- Sketch Based Anomaly Detection Scheme in Wireless Sensor NetworksGuorui Li, Ying Wang. 344-348 [doi]
- To Split or Not to Split? From the Perspective of a Delay-Aware Data Collection Network StructureChi-Tsun Cheng, Nuwan Ganganath. 349-355 [doi]
- Traffic-Differentiated Two-Hop Routing for QoS in Wireless Sensor NetworksT. Shivaprakash, K. B. Raja, K. R. Venugopal, S. S. Iyengar, Lalit M. Patnaik. 356-363 [doi]
- UFO: A United Framework for Target Localization in Wireless Sensor NetworksJiuyang Tang, Guoming Tang, Daquan Tang, Weidong Xiao. 364-370 [doi]
- An Efficient Localization Algorithm Using Sparse Anchors for the Internet of ThingsGuanghui Wang, Subin Shen. 371-378 [doi]
- An Efficient Transmission Scheme for OpenFlow Based Wireless NetworksJi Lu, Zhiyi Zhang, Junfang Wang, Ning Li. 379-382 [doi]
- An Evaluation of Intellectus WSN Monitoring and Debugging Tool Using the Indriya TestbedTiziana Campana, Gregory M. P. O'Hare. 383-391 [doi]
- Backup Path with Energy Prediction Based on Energy-Aware Spanning Tree in Wireless Sensor NetworksYao Lu, Jianping Chen, Ioan Sorin Comsa, Pierre Kuonen. 392-397 [doi]
- Efficiency of Command and Control in Cyberspace: Visit from the Perspective of Complexity TheoryGang Wang, Yinhui Yang, Qinhua Ren, Runnian Ma. 398-401 [doi]
- Flow-Based P2P Network Traffic Classification Using Machine LearningShashikala Tapaswi, Arpit S. Gupta. 402-406 [doi]
- MatBall: Matrix-Based File Allocation Method for Hybrid File SystemJaechun No, Sung Soon Park. 407-412 [doi]
- Message Collision and CSMA/CA Modeling and Simulation by Means of Petri NetJieyu Liu, Eckehard Schnieder, Zuoyu Miao. 413-420 [doi]
- Modeling and Simulation of Pathloss and Fading for Air-Ground Link of HAPs within a Network SimulatorYi Zheng, Yuwen Wang, Fanji Meng. 421-426 [doi]
- Performance Analysis of MRC Diversity for Spectrum Sharing Systems with Imperfect Channel EstimationYuzhen Huang, Yunpeng Cheng, Xueqiang Zheng, JinLong Wang. 427-432 [doi]
- Toward High-Payoff Nash Equilibria for Interference Game between Body Area NetworksLusheng Wang, QingFeng Zhou, Hai Lin. 433-437 [doi]
- A Demodulation Technique for High Mobility OFDM SystemsXuefei Wang, Shan Gao, Qinghua Zhong, Han Zhang. 438-441 [doi]
- A Novel Cell Reselection Method in the Scenario of Multi-RATRong Wang, Tao Zhang, Xinlong Luo, Dengkun Xiao, Fauzi Fanny. 442-447 [doi]
- A Stochastic Cooperative MIMO Channel Model Concerning the Correlation of B-R and R-MChang-Xing Liu, Jinchun Gao, Yuanan Liu, Gang Xie, Quan Hu. 448-452 [doi]
- An Interference-Based Distributed TDMA Scheduling Algorithm for Aeronautical Ad Hoc NetworksJie Li, Erling Gong, Zhiqiang Sun, Long Li, Hongwei Xie. 453-460 [doi]
- Context-Aware Optimization on Medium Access Delay for High-Density 802.11n Wi-Fi NetworkGuolin Sun, Guisong Liu, Yao Li, Chuan Xiao. 461-464 [doi]
- Energy Efficient Terminal-Discovering in Mobile Delay Tolerant Ad-hoc NetworksWei Feng, Shihang Li. 465-470 [doi]
- Estimating the Loading of Logic Periodic Dipole Antenna with Impedances and InductorsXu Xie, YuFeng Dai, Huaning Wu, Liang Zhou. 471-474 [doi]
- Performance Analysis of High Speed Rail Wireless Communication NetworkZuoyu Miao, Tao Tang, Jieyu Liu. 483-489 [doi]
- RF Measurements of the RFX 900 and RFX 2400 Daughter Boards with the USRP N210 Driven by the GNU Radio SoftwareRafik Zitouni, Stefan Ataman, Laurent George 0001. 490-494 [doi]
- A Novel Rule Matching Algorithm Based on Improved Twig PatternYongwei Wang, Yunan Liu, Rongcai Zhao, Cheng Si, Shuai Liu. 495-499 [doi]
- Broadband Matching Network Design for Antennas Using Invasive Weed Optimization AlgorithmHuaning Wu, Chao Liu. 500-503 [doi]
- Evaluation of Statistical Tests for Randomness Using Conditional EntropyChengbing Liu, Xuejia Lai. 504-509 [doi]
- Finite Ridgelet Transform Based Listless Block-Partitioning Image Coding AlgorithmZhenghua Shu, Guodong Liu, Zhihua Xie, Zhong Ren, Lixin Gan. 510-513 [doi]
- FPGA Acceleration for Intersection Computation in Frequent Itemset MiningShaobo Shi, Yue Qi, Qin Wang. 514-519 [doi]
- Mapping DAG to CGRA Using Min-Max Ant Colony SystemLi Zhou, Hengzhu Liu. 520-523 [doi]
- Tracking the State of Primary Users Based on Purely Discontinuous Markov ProcessBin Guo, Xinzhi Yue, Xiaoyuan Yan. 524-527 [doi]