Abstract is missing.
- Service Injection: A Threat to Self-Managed Complex SystemsPer Håkon Meland. 1-6 [doi]
- S2XS2: A Server Side Approach to Automatically Detect XSS AttacksHossain Shahriar, Mohammad Zulkernine. 7-14 [doi]
- Establishing Hypothesis for Recurrent System Failures from Cluster Log FilesEdward Chuah, Gary Kee Khoon Lee, William-Chandra Tjhi, Shyh-hao Kuo, Terence Hung, John Hammond, Tommy Minyard, James C. Browne. 15-22 [doi]
- Long-Term CPU Load PredictionJianhuang Liang, Jian Cao, Jungang Wang, Yuxia Xu. 23-26 [doi]
- Application of Neural Networks to the Correction of a Stiffness Matrix by a Static TestZhong Yang, Haifei Si. 27-30 [doi]
- New Latch-Up Model for Deep Sub-micron Integrated CircuitsPan Dong, Long Fan, Suge Yue, Hongchao Zheng, Shougang Du. 31-36 [doi]
- Self-Adaptive Authorization Framework for Policy Based RBAC/ABAC ModelsChristopher Bailey, David W. Chadwick, Rogério de Lemos. 37-44 [doi]
- Exact and Heuristic Algorithm for Multi-constrained Optimal Path ProblemQingan Fang, Jun Han, Liyong Mao, Zhaoguo Li. 45-51 [doi]
- A Wide-Range Edge-Combining DLL with a Charge Pump for Low SpurBin He, Tie-jun Lu, Zong-min Wang, Tie L. Zhang. 52-55 [doi]
- Analysis of the New Latchup Model for Deep Sub-micron Integrated CircuitsPan Dong, Long Fan, Suge Yue, Hongchao Zheng, Shougang Du. 56-62 [doi]
- A Trustful Infrastructure for the Internet of Things Based on EPOSMoteAntônio Augusto Fröhlich, Rodrigo Vieira Steiner, Leonardo Maccari Rufino. 63-68 [doi]
- A 46MHz Biquad Gm-C High Q Bandpass Filter Design for Wireless ApplicationChong Duan, Weimin Li. 69-72 [doi]
- Ontology Based Modeling for Information Security ManagementPartha Saha, Nandan Parameswaran, Pradeep Ray, Ambuj Mahanti. 73-80 [doi]
- Towards Self-Awareness in Cloud Markets: A Monitoring MethodologyIvan Breskovic, Christian Haas, Simon Caton, Ivona Brandic. 81-88 [doi]
- Intelligent Test Oracle Construction for Reactive Systems without Explicit SpecificationsFarn Wang, Li-Wei Yao, Jung-Hsuan Wu. 89-96 [doi]
- Workload Balancing for Highly Available Services: The Case of the N+M Redundancy ModelAli Kanso, Ferhat Khendek, Maria Toeroe. 97-104 [doi]
- Reliability Implications of Register Utilization: An Empirical StudyPaul Romer, Peter Tröger. 105-112 [doi]
- A Natural Classification Scheme for Software Security PatternsAleem Khalid Alvi, Mohammad Zulkernine. 113-120 [doi]
- Automatic Annotation of Software Configuration Models with Service Recovery InformationAli Kanso, Ferhat Khendek, Maria Toeroe. 121-128 [doi]
- A Connection-Based Signature Approach for Control Flow Error DetectionAtef Mohamed, Mohammad Zulkernine. 129-136 [doi]
- A Fuzzy Logic-Based Buffer Overflow Vulnerability AuditorHossain Shahriar, Mohammad Zulkernine. 137-144 [doi]
- A Bio-inspired Host-Based Multi-engine Detection System with Sequential Pattern RecognitionFrank Jiang, Michael R. Frater, Jiankun Hu. 145-150 [doi]
- Polymorphic Malware Detection Using Hierarchical Hidden Markov ModelFahad Bin Muhaya, Muhammad Khurram Khan, Yang Xiang. 151-155 [doi]
- Personalized Searching for Web Service Using User InterestsRong Hu, Wanchun Dou, Xiaoqing Frank Liu, Jianxun Liu. 156-163 [doi]
- Using Particle Swarm Optimization to Improve the Precision and Recall of Taxonomy ExtractionMohammad Syafrullah, Naomie Binti Salim. 164-169 [doi]
- A Formal Model for Advanced Physical AnnotationsAhmad A. Alzahrani, Seng Wai Loke, Hongen Lu. 170-177 [doi]
- Pervasive Intelligent Routing in Content Centric Delay Tolerant NetworksAnh Dung Nguyen, Patrick Sénac, Victor Ramiro, Michel Diaz. 178-185 [doi]
- Protecting from Inside Attacks in Wireless Sensor NetworksXu Huang, Muhammad Ahmed, Dharmendra Sharma. 186-191 [doi]
- First Prototype of Aquatic Tool Kit: Towards Low-Cost Intelligent Larval Fish Counting in HatcheriesBrian Chung Shiong Loh, Valliappan Raman, Patrick Hang Hui Then. 192-195 [doi]
- A Carrier Aggregation Based Resource Allocation Scheme for Pervasive Wireless NetworksFan Wu, Yuming Mao, Supeng Leng, Xiaoyan Huang. 196-201 [doi]
- The User-Group Based Recommendation for the Diverse Multimedia Contents in the Social Network EnvironmentsSaim Shin, Sei-Jin Jang, Seok-Pil Lee. 202-206 [doi]
- From Sensory Data to Situation Awareness: Enhanced Context Spaces Theory ApproachAndrey Boytsov, Arkady B. Zaslavsky. 207-214 [doi]
- Mapping for Activity Recognition in the Context-Aware Systems Using Software SensorsKamran Taj Pathan, Stephan Reiff-Marganiec, Yi Hong. 215-221 [doi]
- Design and Implementation of P2P Reasoning System Based on Description LogicHai Wan, Yang Yu, Jian-Tian Zheng. 222-229 [doi]
- Recognizing Concurrent and Interleaved Activities in Social InteractionsSaguna, Arkady B. Zaslavsky, Dipanjan Chakraborty 0001. 230-237 [doi]
- Intelligent Sensor Network Simulation for Battlefield Resources ManagementH. Y. Yu, Y. L. Lu. 238-241 [doi]
- Crowdsourcing in Mobile: A Three Stage Context Based ProcessAhmad Hassan Afridi. 242-245 [doi]
- Gesture-Based Easy-Computer Interaction Using a Linear Array of Low Cost Distance SensorsGuan Huang, Seng Wai Loke. 246-251 [doi]
- Load-Aware Dynamic Partial Reconfiguration Implementation of Crossbar SchedulerShaobin Zhang, TongSen Hu, Minghui Wu, Tianzhou Chen, Zening Qu. 252-258 [doi]
- Efficient Pattern Detection for Embedded Optical Bio-sensing SystemYingjie Cao, Yongxin Zhu, Guoguang Rong, Gang Cheng, Meikang Qiu. 259-266 [doi]
- Deriving High-Performance Real-Time Multicore Systems Based on Simulink ApplicationsMinji Cha, Kyong Hoon Kim, Chung-Jae Lee, Dojun Ha, Byoung Soo Kim. 267-274 [doi]
- Analysis and Comparison of Two Different Implementations of MCS-51 Compatible MicrocontrollersJincheng Fei, Haiyang Quan, Dawei Yuan. 275-278 [doi]
- Global Priority Table for Last-Level CachesBaozhong Yu, Jianliang Ma, Tianzhou Chen, Minghui Wu. 279-285 [doi]
- Design and Implementation of a Peripheral Bus Based on a New Kind of Reconfigurable SystemYiMao Cai, Yuanfu Zhao, Lidong Lan. 286-291 [doi]
- GALS-JOP: A Java Embedded Processor for GALS Reactive ProgramsMuhammad Nadeem, Morteza Biglari-Abhari, Zoran Salcic. 292-299 [doi]
- A Study on QoS Routing Schem for Tactical Ad Hoc NetworkTaehun Kang, Hanah Kim, Jaiyong Lee. 300-304 [doi]
- Scheduling Instructions for Soft Errors in Register FilesJianjun Xu, Qingping Tan, Huiping Zhou. 305-312 [doi]
- System Level Performance Simulation of Distributed GENESYS Applications on Multi-core PlatformsSubayal Aftab Khan, Jukka Saastamoinen, Kari Tiensyrjä, Jari Nurmi. 313-320 [doi]
- Benchmarking Embedded Devices for Broadband Performance TestingSnehal Tangadpalliwar, Kumbesan Sandrasegaran, Malcolm Raymond, Ajanta Moitra, Faisal M. Madani. 321-327 [doi]
- An Efficient Test Design for Verification of Cache Coherence in CMPsMamata Dalui, Biplab K. Sikdar. 328-334 [doi]
- Impact of Inaccurate Design of Branch Predictors on Processors' Power ConsumptionBaisakhi Das, Gunjan Bhattacharya, Ilora Maity, Biplab K. Sikdar. 335-342 [doi]
- A Balanced Clustering Algorithm for Non-uniformly Deployed Sensor NetworksHeewook Shin, Sangman Moh, Ilyong Chung. 343-350 [doi]
- Coprocessing Architecture in System-on-Programmable-Chip for Walk on the Boundary Method to Calculate CapacitanceStephen J. J. Ong, Z. Abdul Halim. 351-355 [doi]
- An Elastic OLAP Cloud PlatformPeter Brezany, Yan Zhang, Ivan Janciak, Peng Chen 0014, Sicen Ye. 356-363 [doi]
- Analysis of Power-Saving Techniques over a Large Multi-use ClusterAndrew Stephen McGough, Clive Gerrard, Jonathan Noble, Paul Robinson, Stuart Wheater. 364-371 [doi]
- An Authenticated Key Exchange Scheme for Efficient Security-Aware Scheduling of Scientific Applications in Cloud ComputingChang Liu, Xuyun Zhang, Jinjun Chen, Chi Yang. 372-379 [doi]
- Energy Efficient Task Allocation over Mobile NetworksCarmela Comito, Deborah Falcone, Domenico Talia, Paolo Trunfio. 380-387 [doi]
- Application Behavior Mapping across Heterogeneous Hardware PlatformsHaifeng Chen, Hui Kang, Guofei Jiang, Kenji Yoshihira. 388-395 [doi]
- Performance Evaluation of Image Conversion Module Based on MapReduce for Transcoding and Transmoding in SMCCSEMyoungjin Kim, Hanku Lee, Yun Cui. 396-403 [doi]
- ALARM: Autonomic Load-Aware Resource Management for P2P Key-Value Stores in CloudCan Zhang, Hao-Peng Chen, Shuotao Gao. 404-410 [doi]
- BoostPred: An Automatic Demand Predictor for the CloudWaiho Wong, Joseph G. Davis. 411-418 [doi]
- Accurate Mutlicore Processor Power Models for Power-Aware Resource ManagementIbrahim Takouna, Wesam Dawoud, Christoph Meinel. 419-426 [doi]
- CBF: A Packet Filtering Method for DDoS Attack Defense in Cloud EnvironmentQi Chen, Wenmin Lin, Wanchun Dou, Shui Yu. 427-434 [doi]
- A Measurement Study of Server Utilization in Public CloudsHuan Liu. 435-442 [doi]
- Energy Prediction for MapReduce WorkloadsWenjun Li, Hailong Yang, Zhongzhi Luan, Depei Qian. 443-448 [doi]
- Towards a Service Lifecycle Based Methodology for Risk Assessment in Cloud ComputingMariam Kiran, Ming Jiang, Django Armstrong, Karim Djemame. 449-456 [doi]
- Migrating Complex Business Process to Cloud Based on Mspoa and CBPMHai Wan, Yang Yu. 457-464 [doi]
- On Reference Node Deployment for Precise Clock Synchronization in Smart Power GridChiu-Ping Chang, Chung-Ta King, Chen-Min Chan. 465-472 [doi]
- An Intelligent Real-Time Odor Monitoring System Using a Pattern Extraction AlgorithmEungyeong Kima, Seok Lee, Taikjin Lee, Beom-Ju Shin, Jungho Lee, Young-Tae Byun, Hyung Seok Kim. 473-479 [doi]
- Cost and Energy Reduction Evaluation for ARM Based Web ServersOlle Svanfeldt-Winter, Sébastien Lafond, Johan Lilius. 480-487 [doi]
- A Distributed Application Component Placement Approach for Cloud Computing EnvironmentZhicheng Jin, Jian Cao, Minglu Li. 488-495 [doi]
- A Novel Cost-Effective Dynamic Data Replication Strategy for Reliability in Cloud Data CentresWenhao Li, Yun Yang, Dong Yuan. 496-502 [doi]
- Priority-Based Scheduling for Large-Scale Distribute Systems with Energy AwarenessMasnida Hussin, Young Choon Lee, Albert Y. Zomaya. 503-509 [doi]
- A Multi-objective GRASP Algorithm for Joint Optimization of Energy Consumption and Schedule Length of Precedence-Constrained ApplicationsJohnatan E. Pecero, Pascal Bouvry, Héctor Joaquin Fraire Huacuja, Samee Ullah Khan. 510-517 [doi]
- An Upper-Bound Control Approach for Cost-Effective Privacy Protection of Intermediate Dataset Storage in CloudXuyun Zhang, Chang Liu, Jinjun Chen, Wanchun Dou. 518-525 [doi]
- Disrupt the Disruptor: A Theoretical Approach of Cloud Computing on IT Outsourcing Industry DisruptionZhenyu Yang. 526-531 [doi]
- Data Allocation Based on XML Query Patterns to Reduce Power ConsumptionXuehua Jiang, Yousuke Watanabe, Haruo Yokota. 532-539 [doi]
- Cloud Control and Management Planes for Service ProvisioningGreco Polito Silvana, Adriano Costanzo. 540-546 [doi]
- A Weighted K-Means Clustering Based Co-scheduling Strategy towards Efficient Execution of Scientific Workflows in Collaborative Cloud EnvironmentsKefeng Deng, Lingmei Kong, Junqiang Song, Kaijun Ren, Dong Yuan. 547-554 [doi]
- The Sustainability and Survivabiltiy Network Design for Next Generation Cloud NetworkingBing Luo, William Liu. 555-560 [doi]
- Identifying Contextual Properties of Software Architecture in Cloud ComputingKhaled M. Khan, Qutaibah M. Malluhi. 561-568 [doi]
- The Differences and Commonalities between Green and Conventional Business Process ManagementAlexander Nowak, Frank Leymann, David Schumm. 569-576 [doi]
- A Taxonomy for Cloud Data Hosting SolutionsSteve Strauch, Oliver Kopp, Frank Leymann, Tobias Unger. 577-584 [doi]
- WSRank: A Method for Web Service Ranking in Cloud EnvironmentRong Hu, Wanchun Dou, Xiaoqing Frank Liu, Jianxun Liu. 585-592 [doi]
- Improving Energy Efficiency of LTE Networks by Applying Genetic Algorithm (GA)Kongluan Lin. 593-597 [doi]
- A Bio-inspired Approach to Provisioning of Virtual Resources in Federated CloudsLucio Agostinho Rocha, Guilherme Feliciano, Leonardo Olivi, Eleri Cardozo, Eliane G. Guimarães. 598-604 [doi]
- Energy Consumption Side-Channel Attack at Virtual Machines in a CloudHelmut Hlavacs, Thomas Treutner, Jean-Patrick Gelas, Laurent Lefèvre, Anne-Cécile Orgerie. 605-612 [doi]
- A Power-Aware Scheduling of MapReduce Applications in the CloudYing Li, Hongli Zhang, Kyong Hoon Kim. 613-620 [doi]
- An Innovative Self-Adaptive Configuration Optimization System in Cloud ComputingJing Jiang, Jie Lu, Guangquan Zhang. 621-627 [doi]
- A Consumer-Provider Cloud Cost Model Considering Variable CostWerner Mach, Erich Schikuta. 628-635 [doi]
- SecDM: Securing Data Migration between Cloud Storage SystemsQingni Shen, Lizhe Zhang, Xin Yang, Yahui Yang, Zhonghai Wu, Ying Zhang. 636-641 [doi]
- A Workflow Scheduling Algorithm for Optimizing Energy-Efficient Grid Resources UsageFábio Coutinho, Luís Alfredo V. de Carvalho, Renato Santana. 642-649 [doi]
- A Restful Approach to Service Level Agreements for Cloud EnvironmentsFlorian Blümel, Thijs Metsch, Alexander Papaspyrou. 650-657 [doi]
- A Performance and Energy Consumption Analytical Model for GPUCheng Luo, Reiji Suda. 658-665 [doi]
- Energy-Aware Communities Using Mobile ClientsFabrice Saffre, Sebastien Nicolas, Hanno Hildmann. 666-673 [doi]
- A Group-Choose Model for Partner Selection in Virtual OrganizationMiaomiao Li, Yang Yu, Zhenguang Huang. 674-681 [doi]
- Assessing Measurements of QoS for Global Cloud Computing ServicesJens Myrup Pedersen, Tahir M. Riaz, Joaquim Celestino Júnior, Bozydar Dubalski, Damian Ledzinski, Ahmed Patel. 682-689 [doi]
- Cloud-Enabled Adaptive Activity-Aware Energy-Saving System in a Dynamic EnvironmentHui-Wen Yeh, Ching-Hu Lu, Yu-Chiao Huang, Tsung-Han Yang, Li-Chen Fu. 690-696 [doi]
- An Empirical Analysis of Cloud, Mobile, Social and Green Computing: Financial Services IT Strategy and Enterprise ArchitectureAsif Qumer Gill, Deborah Bunker, Philip Seltsikas. 697-704 [doi]
- From Cloud to Green: E-Collaboration for Environmental ConservationChadi Aoun, Savanid Vatanasakdakul, Deborah Bunker. 705-712 [doi]
- A Generic QoS Framework for Cloud Workflow SystemsXiao Liu, Yun Yang, Dong Yuan, Gaofeng Zhang, Wenhao Li, Dahai Cao. 713-720 [doi]
- A PID-Controlled Power Manager for Energy Efficient Web ClustersSimon Holmbacka, Sébastien Lafond, Johan Lilius. 721-728 [doi]
- Model Interactive Search between User and Associated Link NetworksBaiquan Zhu, Xiangfeng Luo, Yang Liu, Xiang He, Lingyu Xu. 729-736 [doi]
- An Elastic Multi-tenant Database Schema for Software as a ServiceHaitham Yaish, Madhu Goyal, George Feuerlicht. 737-743 [doi]
- Intrusion Detection Techniques for Infrastructure as a Service CloudUdaya Kiran Tupakula, Vijay Varadharajan, Naveen Akku. 744-751 [doi]
- An Evaluation of Power-Proportional Data Placement for Hadoop Distributed File SystemsHieu Hanh Le, Satoshi Hikida, Haruo Yokota. 752-759 [doi]
- Conceptualization of a Context Aware Cloud Adaptation (CACA) FrameworkAsif Qumer Gill, Deborah Bunker. 760-767 [doi]
- Profiling Energy Consumption of VMs for Green Cloud ComputingQingwen Chen, Paola Grosso, Karel van der Veldt, Cees de Laat, Rutger F. H. Hofman, Henri E. Bal. 768-775 [doi]
- Multi-level Subsidy and Penalty Strategy for a Green Industry SectorHsiao-Fan Wang. 776-783 [doi]
- MCDB: Using Multi-clouds to Ensure Security in Cloud ComputingMohammed Abdullatif Alzain, Ben Soh, Eric Pardede. 784-791 [doi]
- A Science Cloud Resource Provisioning Model Using Statistical Analysis of Job HistorySeoyoung Kim, Jung-In Koh, Yoonhee Kim, Chongam Kim. 792-793 [doi]
- Monitoring Energy Consumption in Clouds: The CompatibleOne ExperienceLaurent Lefèvre, Olivier Mornard, Jean-Patrick Gelas, Maxime Morel. 794-795 [doi]
- HERO Web Portal: On-Demand Portal for Co-allocating Computing and Network Resources on Top of TIGRIS Middleware PlatformJae-Hyuck Kwak, JunWeon Yoon, Yonghwan Jung, Jaegyoon Hahm, Dongin Park. 796-797 [doi]
- The Green Computing Observatory: A Data Curation Approach for Green ITCécile Germain-Renaud, Frédéric Fürst, Michel Jouvin, Gilles Kassel, Julien Nauroy, Guillaume Philippon. 798-799 [doi]
- Combining Technical Analysis with Sentiment Analysis for Stock Price PredictionShangkun Deng, Takashi Mitsubuchi, Kei Shioda, Tatsuro Shimada, Akito Sakurai. 800-807 [doi]
- Partial Social Network Disclosure and CrawlersSuhendry Effendy, Felix Halim, Roland H. C. Yap. 808-815 [doi]
- Applications of Social Network Construction and Analysis in the Medical Referral ProcessWadhah Almansoori, Omar Zarour, Tamer N. Jarada, Panagiotis Karampelas, Jon G. Rokne, Reda Alhajj. 816-823 [doi]
- Finding Strong Groups of Friends among Friends in Social NetworksJuan J. Cameron, Carson Kai-Sang Leung, Syed Khairuzzaman Tanbeer. 824-831 [doi]
- Evaluating Roving Patrol Effectiveness by GPS TrajectoryHuanhuan Li, Jianxun Liu, Yizhi Liu, Long Jin. 832-837 [doi]
- SkyBoundary: An Improved Approach to Member Promotion in Social NetworksZhuo Peng, Chaokun Wang, Fangbo Tao, Lu Han. 838-845 [doi]
- Organized Crime Structures in Co-offending NetworksMohammad A. Tayebi, Uwe Glässer. 846-853 [doi]
- TIE: Temporal Interaction Explorer for Co-presence CommunitiesDaniel Boston, Cristian Borcea. 854-863 [doi]
- On the Socialness of SoftwareWalid Maalej, Dennis Pagano. 864-871 [doi]
- Social-Aware Document Similarity Computation for Recommender SystemsTran Vu Pham, Le Nguyen Thach. 872-878 [doi]
- Expert-Citizen Engineering: "Crowdsourcing" Skilled CitizensZhi Zhai, Peter Sempolinski, Douglas Thain, Gregory R. Madey, Daniel Wei, Ahsan Kareem. 879-886 [doi]
- Credibility Assessment Using Wikipedia for Messages on Social Network ServicesYu Suzuki, Akiyo Nadamoto. 887-894 [doi]
- Monitoring Trends on FacebookIrena Pletikosa Cvijikj, Florian Michahelles. 895-902 [doi]
- An Exploration of Social Media in Public Opinion Convergence: Elaboration Likelihood and Semantic Networks on Political EventsYi Wu, Jackson Wong, Yimeng Deng, Klarissa Chang. 903-910 [doi]
- Multistage Filtering for Collusion Detection in P2P NetworkYu Bao, Tianjie Cao, Guosun Zeng. 911-916 [doi]
- Identifying Consensus Tags in Social Tagging SystemsKening Gao, Yin Zhang, Bin Zhang, Xin Jin, Pengwei Guo. 917-923 [doi]
- Organizational Social Media around the GLOBEDaniel Schlagwein, Pattarawan Prasarnphanich. 924-931 [doi]
- A Model for Social Network-Enhanced Health CommunicationRobert Steele. 932-938 [doi]
- A Mobile Community Service Platform Promoting Ubiquitous CollaborationKyungran Kang, Jungtae Lee, Kyoungwon Beak, Sungeun Park, Jaehwan Kim. 939-946 [doi]
- Simulation on the Dynamics of Interpersonal Communication NetworkYing Liu, Yuxiao Li. 947-950 [doi]
- An Organization Model in MAS Based on HolonJie Liu, Wei Ming Zhang, Bao-Xin Xiu, Zhong Liu. 951-957 [doi]
- A Uniform Semantic Web Framework for Co-authorship NetworksLule Ahmedi, Lejla Abazi-Bexheti, Arbana Kadriu. 958-965 [doi]
- Participation and Engagement in Inter-organizational Groups: Synthesizing Social Network Analysis with Ethnography to Evaluate Social CapitalTim Butcher, Caroline Chan, Paul Scriven, Seamus O'Reilly, Steven Pereira. 966-973 [doi]
- Trust and Trustworthiness in Online Credit MarketsKo Kuwabara, Christine Horne, Denise Anthony. 974-979 [doi]
- The Interrelation between Communities, Trust and Their Online Social PatternsSonia C. Sousa, David R. Lamas, Paulo Dias. 980-986 [doi]
- Building Hierarchical Keyword Level Association Link Networks for Web Events Semantic AnalysisJunyu Xuan, Xiangfeng Luo, Shunxiang Zhang, Zheng Xu, Huimin Liu, Feiyue Ye. 987-994 [doi]
- Tweeting Government: A Case of Australian Government Use of TwitterLubna Alam, Richard Lucas. 995-1001 [doi]
- Using Social Media in Government: The Australian Taxation Office e-Tax Facebook PageSultana Lubna Alam, John Campbell, Richard Lucas. 1002-1009 [doi]
- Making the Most of Virtual Expertise in Telemedicine and Telehealth EnvironmentsCraig Standing, Izabela Volpe, Susan Standing, Raj Gururajan. 1010-1016 [doi]
- Modeling Learners and Contents in Academic-Oriented Recommendation FrameworkJia Zhou, Tiejian Luo, Fuxing Cheng. 1017-1024 [doi]
- Extracting Opinions from Topic-Based Events in the BlogosphereChen Ming Wu, Tsun Ku. 1025-1030 [doi]
- Complex Human-System Systems Design for C2Xu-Hui Luo, Jiang Wang, Meng Qian, Zhong Liu, Wei Ming Zhang, Cheng Zhu. 1031-1038 [doi]
- State of the Art of Community-Driven Software Engineering Ontology EvolutionPornpit Wongthongtham, Tharam S. Dillon, Elizabeth Chang. 1039-1045 [doi]
- Study of Multistage Anomaly Detection for Secured Cloud Computing Resources in Future InternetByungRae Cha, JongWon Kim 0001. 1046-1050 [doi]
- Service Level Agreement for Distributed Services: A ReviewMohammed Alhamad, Tharam S. Dillon, Elizabeth Chang. 1051-1054 [doi]
- NetML: Networking NetworksRonald G. Addie, Yu Peng, Moshe Zukerman. 1055-1060 [doi]
- Mobile Cloud Web-Service for U-CityJong Won Park, Chang Ho Yun, Seong Woo Rho, Yongwoo Lee, Hae-Sun Jung. 1061-1065 [doi]
- Evaluating Sustainability, Environmental Assessment and Toxic Emissions during Manufacturing Process of RFID Based SystemsRajeev Kumar Kanth, Pasi Liljeberg, Hannu Tenhunen, Qiansu Wan, Yasar Amin, Botao Shao, Qiang Chen, Li-Rong Zheng, Harish Kumar. 1066-1071 [doi]
- Command and Control Network Modeling and Efficiency Measure Based on Capability Weighted-NodeWei Du, Zhong Liu, Bao-Xin Xiu, Wei Ming Zhang, Qing Cheng. 1072-1077 [doi]
- Some Ethical Considerations for Gov 2.0 Using Web 2.0Lubna Alam, Richard Lucas. 1078-1083 [doi]
- Project or Process? How to Measure the Real Type of Employees' Activity?Dmitry Romanov, Pavel Sidorov. 1084-1088 [doi]
- Theme-Based Mobile Social Network SystemJiamei Tang, Sangwook Kim. 1089-1095 [doi]
- Web Based Cross Language Semantic Plagiarism DetectionChow Kok Kent, Naomie Salim. 1096-1102 [doi]
- A Model of Close-Relationship among Mobile Users on Mobile Social NetworkPaul Kim, Sangwook Kim. 1103-1109 [doi]
- A Cloud Computing Environment for Supporting Networked Robotics ApplicationsLucio Agostinho Rocha, Leonardo Olivi, Guilherme Feliciano, Fernando Paolieri Neto, Diego Rodrigues, Eleri Cardozo, Eliane G. Guimarães. 1110-1116 [doi]
- BSNet: A Three-Layer Business Service Correlation Network ModelKeman Huang, Yushun Fan, Wei Tan. 1117-1124 [doi]
- Multi-business Services Selection Model and Calculation MethodYushun Fan, Sufen Li. 1125-1130 [doi]
- A Conceptual Platform of SLA in Cloud ComputingMinChao Wang, Xing Wu, Wu Zhang, FuQiang Ding, Jun Zhou, GuoCai Pei. 1131-1135 [doi]
- A Dynamical Optimization Approach for Service Process LibraryLei Wang, Jian Cao, Haiyan Zhao. 1136-1143 [doi]
- A New Process Mining Algorithm Based on Event TypeDongyi Wang, JiDong Ge, Hao Hu, Bin Luo. 1144-1151 [doi]
- Activity Instance Oriented Handling in WorkflowsYiping Wen, Zhigang Chen, Jianxun Liu. 1152-1158 [doi]
- Requirements Management Using KANO Model and AHP for Service Systems DesignJaeung Lee 0002, Vijayan Sugumaran, Sooyong Park. 1159-1166 [doi]
- Control Strategy of Group Behavior for Internet of ThingsQingKui Chen, He Jia. 1167-1171 [doi]
- Private Cloud System Based on BOINC with Support for Parallel and Distributed SimulationYihua Wu, Jian Cao, Minglu Li. 1172-1178 [doi]
- TM 2.0 Automated Evaluation System in EFL ClassroomShuwen Wang. 1179-1183 [doi]
- Fuzzy Genetic Semantic Based Text SummarizationLadda Suanmali, Naomie Salim, Mohammed Salem Binwahlan. 1184-1191 [doi]
- A Multiplicity Approach to Organization of Knowledge and Development of Web SoftwareKai-On Chow, Tak-Lam Wong. 1192-1198 [doi]
- Towards Data Quality into the Data Warehouse DevelopmentMunawar, Naomie Salim, Roliana Ibrahim. 1199-1206 [doi]
- An Automated Approach to Web Service Classification Based on SemanticZhaoteng Song, Xinhuai Tang. 1207-1210 [doi]
- Characterizing Twitter with Respondent-Driven SamplingMostafa Salehi, Hamid R. Rabiee, Nasim Nabavi, Shayan Pooya. 1211-1217 [doi]
- On Analyzing User Ratings and Directional Trusts in Epinions.comShaoyu Li, Won-Seok Hwang, Sang-Wook Kim. 1218-1221 [doi]
- Incorporating Sentiment Analysis for Improved Tag-Based RecommendationQingbiao Zhou, Jie Fang, Gaundong Xu. 1222-1227 [doi]
- Photo Cube: An Automatic Management and Search for Photos Using Mobile SmartphonesJinho Kim, Suan Lee, Ji-Seop Won, Yang-Sae Moon. 1228-1234 [doi]
- Parallel Range Query Processing on R-Tree with Graphics Processing UnitBoseon Yu, Hyunduk Kim, Wonik Choi, Dongseop Kwon. 1235-1242 [doi]
- Maximum Reliable Tree for Social Network SearchWookey Lee, James Jung-Hun Lee, Justin JongSu Song, Chris Soo-Hyun Eom. 1243-1249 [doi]
- Semantic Pattern Tree Kernels for Short-Text ClassificationKwanho Kim, Beom-Suk Chung, Ye Rim Choi, Jonghun Park. 1250-1252 [doi]