Abstract is missing.
- Perspectives on Cyber Science and Technology for Cyberization and Cyber-Enabled WorldsJianhua Ma, Kim-Kwang Raymond Choo, Hui-Huang Hsu, Qun Jin, William Liu, Kevin Wang, Yufeng Wang, Xiaokang Zhou. 1-9 [doi]
- Software Defined Small Cell Networking under Dynamic Traffic PatternsLi Zhou, Jiao Zhang, Boon-Chong Seet, Lei Zuo, Xiping Hu, Jiaxun Li, Shan Wang, Jibo Wei. 10-17 [doi]
- A Visual Inspection System for Rail Corrugation Based on Local Frequency FeaturesQingyong Li, Yunqiang Tan, Huayan Zhang, Shengwei Ren, Peng Dai, Weiyi Li. 18-23 [doi]
- Surface Construction from Kinect RGB-D StreamW. G. C. W. Kumara, Timothy K. Shih, Hui-Huang Hsu, Shih-Jung Wu, Stanislav Klimenko, Andrei Klimenko. 24-30 [doi]
- Record Linkage Using the Combination of Twice Iterative SVM Training and Controllable Manual ReviewFei Wang, Hongbo Wang. 31-38 [doi]
- Personal Data Analytics to Facilitate Cyber Individual ModelingXiaokang Zhou, Bo Wu, Qun Jin, Jianhua Ma, Weimin Li, Neil Y. Yen. 39-46 [doi]
- Emerging Mobile Communication Technologies for Healthcare System in 5G NetworkSadia Din, Anand Paul, Awais Ahmad, Seungmin Rho. 47-54 [doi]
- Radio Resource Allocation for D2D-Enabled Massive Machine Communication in the 5G EraHuitao Yang, Boon-Chong Seet, Syed Faraz Hasan, Peter Han Joo Chong, Min Young Chung. 55-60 [doi]
- Applying Virtual Coordination Anchor Node to Routing Mechanism in Wireless Sensor NetworksYing-Hong Wang, Cheng-Han Tsai. 61-68 [doi]
- Message Forwarding Strategies in Device-to-Device Based Mobile Social Networking in Proximity (MSNP)Yufeng Wang, Jiabing Chen, Qun Jin, Jianhua Ma. 69-74 [doi]
- A Scheme for Controlling Functionality of Mobile Device Using Specialized CodesSu-Wan Park, Jeong-Nyeo Kim. 75-82 [doi]
- A Fault Injection Simulation Method Based on Petri NetHaitao Liu, Yu Huang, Guangxian Lv, Peng Jin, Xueyuan Su. 83-86 [doi]
- A Cyber Voice Recognition with Low SNRHua-An Zhao. 87-90 [doi]
- Evaluation of Network Risk Using Attack Graph Based Security MetricsSantosh Kumar, Anuradha Negi, Keshav Prasad, Aniket Mahanti. 91-93 [doi]
- What Influences the Students' Learning Experience? The Impact of Peer Learning in an Online EnvironmentSonglak Sakulwichitsintu. 94-96 [doi]
- Review of Research on Computer Games for Tibetan ChessXiali Li, Songting Deng, Xinyang Wang, Yongji Li, Licheng Wu, Junxian Duan. 97-99 [doi]
- The Design and Implementation of a High-Efficiency Distributed Web CrawlerQiumei Pu. 100-104 [doi]
- Ontology Modeling and Application of Multi-agent for Negotiation SystemQiumei Pu, Hong Zhang. 105-108 [doi]
- A Preliminary Study of Plant Domain OntologyXiaoxu Li, Yiming Zhang, Junli Wang, Qiumei Pu. 109-112 [doi]
- A Proportional Multi-resource Scheduling Model in SDCloudHang Zhou, Qing Li, Ningning Dong, Xinying Zhu, Xiaodong Liu. 113-118 [doi]
- The Construction and Analysis of Baidu Baike Entry NetworkLei Wang, Lingyu Xu, Jie Yu, Yunlan Xue, Gaowei Zhang, Xiang Yu, Bofeng Zhang. 119-123 [doi]
- Socialized User Modeling in Microblogging Scenarios for Interest PredictionMingqing Huang, Bofeng Zhang, Guobing Zou, Chengwei Gu, Peiye Wu, Shulin Cheng, Zhu Zhang. 124-131 [doi]
- Overview of the Task Management System of Ternary Optical ComputerSulan Zhang, Yi Jin, Yunfu Shen, Junjie Peng, Shan Ouyang, Cong Peng. 132-135 [doi]
- An Asynchronous Distributed ADMM Algorithm and Efficient Communication ModelLing Fang, Yongmei Lei. 136-140 [doi]
- Analysis and Modeling for Interaction with Mobility Based on Pi-CalculusYaya Liu, Jiulei Jiang. 141-146 [doi]
- A Probabilistic Perspective Model for Recommendation Considering Long Tail EffectShuanghu Luo, Jun Xie. 147-150 [doi]
- An Ontology Pattern for Emergency Event ModelingWei Liu, Yue Tan, Ning Ding, Yujia Zhang, Zongtian Liu. 151-156 [doi]
- Overlap Community Detection Based on Node Convergence DegreeWeimin Li, Shu Jiang, Huaikou Miao, Xiaokang Zhou, Qun Jin. 163-167 [doi]
- An Anonymous Scheme for Current Taxi ApplicationsZijian Zhang, Ange Tong, Liehuang Zhu, Mingxin Chen, Pengchuan Su. 168-172 [doi]
- Intrusion Detection Based on IDBMYajun Liu, Xuan Zhang. 173-177 [doi]
- A MapReduce-Based Framework for Analyzing Web Logs in Offline StreamsRuoyu Chen, Yangsen Zhang, RongRong Bi, Yuru Jiang, Yanhua Zhang. 178-183 [doi]
- Measuring Structural Resilience through a Carrier Network ModelZiheng Wei, Jiamou Liu. 184-189 [doi]
- Noisy Problem on Discrete Linear Consensus Protocol in Networked Multi-agent SystemsQuansheng Dou, Jinjiang Li, Hui Fan, Yuehao Pan. 190-195 [doi]
- ShapeNets: Image Representation Based on the ShapeHui Fan, Yan Zhang, Zhen Hua, Jinjiang Li, Tao Sun, Menglin Ren. 196-201 [doi]
- Causal Association Analysis Algorithm for MOOC Learning Behavior and Learning EffectHongyan Wang, Xingwei Hao, Wenjiang Jiao, Xingwu Jia. 202-206 [doi]
- Construction of Learning Partners Based on Learning InterestMingliang Hou, Xingwei Hao, Shuo Tian, Yi Liu. 207-210 [doi]
- Single Image Super-resolution Based on Self-Similarity and Dictionary NeighborhoodLiang Guo, Guizhong Wang, Fan Zhang, Xuemei Li. 211-216 [doi]
- A New Interpolation Algorithm Based on the Frequency TransformQinglan Fan, Yunfeng Zhang, Xunxiang Yao, Fangxun Bao, Xiaohong Shen. 217-222 [doi]
- Saliency Detection Based on Multi-scale Image FeaturesChaoqun Zheng, Xiaozhi Zheng, Guizhong Wang, Shuo Tian, Qiang Guo. 223-227 [doi]
- Weakly-Supervised Classification of Pulmonary Nodules Based on Shape CharactersJingqi Song, Hui Liu, Fenghuan Geng, Caiming Zhang. 228-232 [doi]
- Single Image Dehazing Method under the Influence of Un-uniform IlluminationWenhua Zhang, Shanshan Gao, Jing Chi, Hui Liu, Yuanfeng Zhou. 233-238 [doi]
- Managing Energy Efficiency in the Cloud Computing Environment Using SNMPv3: A Quantitative Analysis of Processing and Power UsageAsif Iqbal, Colin Pattinson, Ah Lian Kor. 239-244 [doi]
- Evaluation of ICT Environmental Impact for an SMEMichail Papanderou, Ah Lian Kor, Colin Pattinson. 245-250 [doi]
- Effective Green IT Strategy in a UK Higher Education InstituteLatifah M. AlHarbi, Colin Pattinson. 251-256 [doi]
- An Evaluation of the Impact of Remote Collaboration Tools on Corporate SustainabilityJeanette Shaw, Ah Lian Kor, Colin Pattinson. 257-262 [doi]
- Enhancing Windows Firewall Security Using Fuzzy ReasoningNitin Naik, Paul Jenkins. 263-269 [doi]
- MalAware: Effective and Efficient Run-Time Mobile Malware DetectorJelena Milosevic, Alberto Ferrante, Miroslaw Malek. 270-277 [doi]
- uAuction: Analysis, Design, and Implementation of a Secure Online Auction SystemNazia Majadi, Jarrod Trevathan, Neil Bergmann. 278-285 [doi]
- Collusion Attack Detection in Networked SystemsMd. Zakirul Alam Bhuiyan, Jie Wu 0001. 286-293 [doi]
- A Model to Evaluate the Credibility of Service in Cloud Computing EnvironmentLi Liao, Bixin Li, Chao Li. 294-301 [doi]
- Sensor-Cloud and Power Line Communication: Recent Developments and IntegrationChunsheng Zhu, Yinjia Huo, Victor C. M. Leung, Laurence T. Yang. 302-308 [doi]
- Detecting Denial of Service Attacks in the CloudRaneel Kumar, Sunil Pranit Lal, Alok Sharma. 309-316 [doi]
- Multi-stakeholders' Policy Enforcement for AndroidShahryar Khan Afridi, Daud Khan, Latif Jan, Aftab Khan. 317-321 [doi]
- Developing a Mobile System for Natural Language Grammar AcquisitionMarina Purgina, Maxim Mozgovoy, Vitaly Klyuev. 322-325 [doi]
- Needleman-Wunsch and Smith-Waterman Algorithms for Identifying Viral Polymorphic Malware VariantsVijay Naidu, Ajit Narayanan. 326-333 [doi]
- Hierarchical Transactional Memory Protocol for Distributed Mixed-Criticality Embedded SystemsZaher Owda, Moises Urbina, Roman Obermaisser, Mohammed Abuteir. 334-343 [doi]
- ChainVoxel: A Data Structure for Scalable Distributed Collaborative Editing for 3D ModelsKengo Imae, Naohiro Hayashibara. 344-351 [doi]
- Dependency Management in Component-Based Building Automation SystemsMalte Burkert, Heiko Krumm. 352-359 [doi]
- Distributed Strategic Learning for Building Network Embedded Coding to Achieve Reliable Event NotificationChristian Esposito, Aniello Castiglione, Francesco Palmieri, Florin Pop. 360-367 [doi]
- Autocorrelation-Based Detection of Infinite Loops at RuntimeAndreas Ibing, Julian Kirsch, Lorenz Panny. 368-375 [doi]
- A Publish/Subscribe Protocol for Event-Driven Communications in the Internet of ThingsChristian Esposito, Aniello Castiglione, Francesco Palmieri, Massimo Ficco, Kim-Kwang Raymond Choo. 376-383 [doi]
- A Discussion and Review of Network SteganographyJun O. Seo, Sathiamoorthy Manoharan, Aniket Mahanti. 384-391 [doi]
- Design and Analysis of IoT Applications: A Model-Driven ApproachBruno Costa, Paulo F. Pires, Flávia Coimbra Delicato, Wei Li 0058, Albert Y. Zomaya. 392-399 [doi]
- Range Encoding-Based Network Verification in SDNYen-Lun Tseng, Guey-Yun Chang, Chun-Chung Shih, Yue-Xin Liu, Tien-Hsiang Wu. 400-405 [doi]
- Attack Detection in Cloud Infrastructures Using Artificial Neural Network with Genetic Feature SelectionSayantan Guha, Stephen S. Yau, Arun Balaji Buduru. 414-419 [doi]
- Stereoscopic Image Quality Assessment Based on Cyclopean ImageKaixuan Lu, Wei Zhu. 420-423 [doi]
- An Efficient Tool for Industrial Control System Security AnalysisChuangming Xia, Jing Tian, Erqing Li, Junwei Zhou, Jianwen Xiang, Jin Wang, Liang Bai, Yueying He. 424-427 [doi]
- An Analysis of Open Standard Identity Protocols in Cloud Computing Security ParadigmNitin Naik, Paul Jenkins. 428-431 [doi]
- Tolerance-Based Group Scoring Scheme Promotes Cooperation in Public Goods GameHaiping Zhang, Gang Wang, Hongjun Qiu, Weitong Hu, Lanping Yu. 432-436 [doi]
- An Improved Exponential Smoothing Model on Rental Trends Prediction of Public Bicycle StationsFei Lin, Linyao Zhang, Haitao Xu, Yong Sun. 437-441 [doi]
- Effect of Different Migration Strategies on Evolution of Cooperation in Spatial Prisoner's Dilemma GameHong Ding, Xiangyu Chen, Benyun Shi, Yanming Ye, Yizhi Ren. 442-447 [doi]
- Threat Modeling in Cyber-Physical SystemsEduardo B. Fernández. 448-453 [doi]
- An Ontology-Based Framework for Hybrid Cloud Resiliency MechanismToshihiro Uchibayashi, Bernady O. Apduhan, Norio Shiratori. 454-458 [doi]
- Discovering Items with Potential Popularity on Social MediaAbbas Khushnood, Xin Luo, Mingsheng Shang. 459-466 [doi]
- Harnessing Smartphones as a Personal Informatics Tool towards Self-Awareness and Behavior ImprovementHania Aslam, Hamid Mukhtar, Farhana Seemi, Djamel Belaïd. 467-474 [doi]
- A Framework for Third Party Android Marketplaces to Identify Repackaged AppsNai-Wei Lo, Shau-Kang Lu, Yo-Hsuan Chuang. 475-482 [doi]
- A Novel Network Selection Mechanism for Vehicle-to-Infrastructure CommunicationEmmanuel Ndashimye, Nurul I. Sarkar, Sayan Kumar Ray. 483-488 [doi]
- Architecture and Protocols for Inter-cell Device-to-Device Communication in 5G NetworksA. Murkaz, Riaz Hussain, Syed Faraz Hasan, Min Young Chung, Boon-Chong Seet, Peter Han Joo Chong, Syed Tariq Shah, Shahzad A. Malik. 489-492 [doi]
- Assessing Device-Free Passive Localization with a Single Access PointDebraj Basu, Syed Faraz Hasan. 493-496 [doi]
- Communities Evolution Analysis Based on Events in Dynamic Complex NetworkHong Yao, Cai Fu, Qingfeng Huang, Zhicun Fang, JieHua Zeng, Lansheng Han. 497-503 [doi]
- Early Stage Internet Traffic Identification Using Data Gravitation Based ClassificationLizhi Peng, Haibo Zhang, Bo Yang 0001, Yuehui Chen, Xiaoqing Zhou. 504-511 [doi]
- LPA: Learning-Based Power Aware Communication Protocol in WBANsAbbas Arghavani, Haibo Zhang 0001, Zhiyi Huang 0001. 512-519 [doi]
- A Moment-Based Classification Algorithm and Its Comparison to the K-Nearest Neighbours for 2-Dimensional DataKrzysztof Pawelec, Artem Lenskiy. 520-525 [doi]
- An Intelligent Defects Identification for Motors Using Partial Discharge SignalsHong-Chan Chang, Cheng-Chien Kuo, Yuan-Sheng Li. 526-529 [doi]
- Automated Scene Analysis by Image Feature ExtractionSyed Omer Gilani, Mohsin Jamil, Zahra Fazal, Muhammad Naveed, Rabiel Sakina. 530-536 [doi]
- ICFS: An Improved Fast Search and Find of Density Peaks Clustering AlgorithmJing Gao, Liang Zhao, Zhikui Chen, Peng Li, Han Xu, Yueming Hu. 537-543 [doi]
- Proactive Intelligent System for Optimizing Traffic SignalingRamon Sanchez-Iborra, Juan F. Inglés-Romero, Ginés Doménech-Asensi, José-Luis Moreno-Cegarra, Maria-Dolores Cano. 544-551 [doi]
- A Lightweight Trust Design for IoT RoutingDavid Airehrour, Jairo A. Gutiérrez, Sayan Kumar Ray. 552-557 [doi]
- Hybrid Backtracking Search Optimization Algorithm and K-Means for Clustering in Wireless Sensor NetworksN. M. Abdul Latiff, N. N. Nik Abdul Malik, L. Idoumghar. 558-564 [doi]
- A Two-Level Load Balancing Method with Dynamic Strategy for Cloud ComputingYan-Wun Qiu, Jen-Ing G. Hwang. 565-571 [doi]
- A Simulated Annealing Combined Genetic Algorithm for Virtual Machine Migration in Cloud DatacentersYidong Li, Xiangjun Meng, Hairong Dong. 572-577 [doi]
- A Usability Study on the Privacy Policy Visualization ModelKambiz Ghazinour, Tahani Albalawi. 578-585 [doi]
- Are Coarse-Grained Overlays Ready for General Purpose Application Acceleration on FPGAs?Abhishek Kumar Jain, Douglas L. Maskell, Suhaib A. Fahmy. 586-593 [doi]
- Fast CU Size Decisions for HEVC Intra Frame Coding Based on Support Vector MachinesDeyuan Liu, Xingang Liu, Yayong Li. 594-597 [doi]
- A Low-Complexity Intra Prediction Mode Selection Algorithm in HEVCWentao Yang, Yiming Pi. 598-603 [doi]
- Online Resource Management in Thermal and Energy Constrained Heterogeneous High Performance ComputingMark A. Oxley, Sudeep Pasricha, Anthony A. Maciejewski, Howard Jay Siegel, Patrick J. Burns. 604-611 [doi]
- Performance Optimization of the SSVD Collaborative Filtering Algorithm on MapReduce ArchitecturesShiouCheng Yu, Quey-Liang Kao, Che-Rung Lee. 612-619 [doi]
- expanCodes: Tailored LDPC Codes for Big Data StorageYongmei Wei, Fengmin Chen. 620-625 [doi]
- Backbone Traffic Pattern Analysing Based on Joint EntropyJie Xu, Wei Ding 0001, Jian Gong, XiaoDong Zang. 626-633 [doi]
- A Four-Layer Architecture for Online and Historical Big Data AnalyticsJulie Yixuan Zhu, Jialing Xu, Victor O. K. Li. 634-639 [doi]
- FOG-Engine: Towards Big Data Analytics in the FogFarahd Mehdipour, Bahman Javadi, Aniket Mahanti. 640-646 [doi]
- Self-Operation of a NetworkHaitao Tang, Kaj Stenber. 647-653 [doi]
- A Cloud-Based Network Architecture for Big Data ServicesMing Zhao, Arun Kumar, G. G. Md. Nawaz Ali, Peter Han Joo Chong. 654-659 [doi]
- QoS Oriented Embedding for Network VirtualizationLi Xu, Hui Li, Jingting Sun, Kai Pan, Guanghui Zhang. 660-665 [doi]
- NoWog: A Workload Generator for Database Performance BenchmarkingParinaz Ameri, Nico Schlitter, Jörg Meyer, Achim Streit. 666-673 [doi]
- A Context-Aware Trust Prediction Method Based on Behavioral Data Analysis in Distributed Network EnvironmentsGuoyu Yang, Qibo Sun, Ao Zhou, Jinglin Li, Xiang Yuan, Hanyi Tang. 674-680 [doi]
- Online Distance Measurement for Tree Data Event StreamsEileen Kuehn, Achim Streit. 681-688 [doi]
- Comparing Intention and Behavior: Characteristics of Valuable Information and Information VerificationMathupayas Thongmak. 689-695 [doi]
- Improving Recommendation Accuracy by Considering Electronic Word-of-Mouth and the Effects of Its Propagation Using Collective Matrix FactorizationRen-Shiou Liu, Tian-Chih Yang. 696-703 [doi]
- On the Role of Mobility and Network Coding on Multi-message Gossip in Random Geometric GraphGang Wang, Zun Lin, Jie Wu. 704-709 [doi]
- CDR Based Temporal-Spatial Analysis of Anomalous Mobile UsersZhen Wang, Sihai Zhang. 710-714 [doi]
- Efficient Processing of Uncertain Data Using Dezert-Smarandache Theory: A Case StudyHossein Jafari, Xiangfang Li, Lijun Qian. 715-722 [doi]
- A New Algorithm of Geometric Mean for Solving High-Order Fredholm Integro-differential EquationsElayaraja Aruchunan, Nathnarong Khajohnsaksumeth, Benchawan Wiwatanapataphee. 723-729 [doi]
- ZQL: A Unified Middleware Bridging Both Relational and NoSQL DatabasesJie Xu, Mengji Shi, Chao-Yuan Chen, Zhen Zhang, Jigao Fu, Chi Harold Liu. 730-737 [doi]
- G-Storm: A GPU-Aware Storm SchedulerYi Ren Chen, Che-Rung Lee. 738-745 [doi]
- Big Data Framework for Analyzing Patents to Support Strategic R&D PlanningWonchul Seo, Namhyoung Kim, Sungchul Choi. 746-753 [doi]
- Information Pricing: A Utility Based Pricing MechanismDivya Rao, Wee Keong Ng. 754-760 [doi]
- On the Incentive Effect of Reputation SystemsHan Jiao, Lu Lu, Zhanhua Xin. 761-768 [doi]
- Modeling of Resource Granularity and Utilization with Virtual Machine SplittingHojjat Baghban, Jerry Chou, Ching-Hsien Hsu, Yeh-Ching Chung. 769-772 [doi]
- Logico-linguistic Semantic Representation of DocumentsSharyar Wani, Mohamed Ridza Wahiddin, Tengku Mohd Tengku Sembok. 773-780 [doi]
- Design and Partial Implementation of Health Care System for Disease Detection and Behavior Analysis by Using DM TechniquesDingkun Li, Hyun Woo Park, Ibrahim M. Ishag, Erdenebileg Batbaatar, Keun Ho Ryu. 781-786 [doi]
- MSFS: Multiple Spatio-temporal Scales Traffic Forecasting in Mobile Cellular NetworkDandan Miao, Weijian Sun, Xiaowei Qin, Weidong Wang. 787-794 [doi]
- Forecasting Crimes Using Autoregressive ModelsEugenio Cesario, Charlie Catlett, Domenico Talia. 795-802 [doi]
- Unsupervised Anomaly Detection Using Light Switches for Smart Nursing HomesChih-Wei Ho, Chun-Ting Chou, Yu-Chun Chien, Chia-Fu Lee. 803-810 [doi]
- Interactive Healthcare Big Data Analytics Platform under Simulated PerformanceDillon Chrimes, Belaid Moa, Hamid Zamani, Mu-Hsing Kuo. 811-818 [doi]
- A Comprehensive Validation Methodology for Trajectory Pattern Mining of GPS DataEugenio Cesario, Carmela Comito, Domenico Talia. 819-826 [doi]
- Efficient On/Off-Line Query Pre-processing for Telecom Social Streaming DataCheng Wu, Jigao Fu, Zhen Zhang, Chi Harold Liu. 827-834 [doi]
- Social Media Analysis on Evaluating Organisational Performance a Railway Service Management ContextJie Yang, Ahm Mehbub Anwar. 835-841 [doi]
- Analysis of Human Autonomic Nervous Activity Based on Big Data Measurement via SmartPhoneMakoto Komazawa, Kenichi Itao, Hiroyuki Kobayashi, Zhiwei Luo. 842-847 [doi]
- Sustainability through Intelligent Scheduling of Electric Water Heaters in a Smart GridM. J. Booysen, A. H. Cloete. 848-855 [doi]
- A New Topology Time Division Beacon Construction Approach for IEEE802.15.4/ZigBee Cluster-Tree Wireless Sensor NetworksSmain Femmam, Mohamed Ikbal Benakila. 856-860 [doi]
- Vehicle Classification in Acoustic Sensor Networks Based on Hybrid Dictionary LearningShuilin Guo, Rui Wang, Bin Liu, Qiyue Wei, Yanping Li. 861-865 [doi]
- A Data Science Model for Big Data Analytics of Frequent PatternsCarson K. Leung, Fan Jiang, Hao Zhang, Adam G. M. Pazdor. 866-873 [doi]
- Collaborative Filtering and Deep Learning Based Hybrid Recommendation for Cold Start ProblemJian Wei, Jianhua He, Kai Chen 0006, Yi Zhou, Zuoyin Tang. 874-877 [doi]
- Privacy-Preserving Palm Print Authentication Using Homomorphic EncryptionJong-Hyuk Im, JinChun Choi, DaeHun Nyang, Mun-Kyu Lee. 878-881 [doi]
- Log on Cloud: A SaaS Data Collection, Storage, and Analysis FrameworkPeng Xu, Yadong Zhang, Kai Shuang. 882-885 [doi]
- Scalable Interactive Geo Visualization Platform for GIS Data AnalysisLekha R. Nair, Sarath Saleem, Sujala D. Shetty. 886-889 [doi]
- Stochastic Self-Organisation of Poorly Structured Data and Memory Realisation in an Information Domain When Designing News Events Forecasting ModelsS. A. Lesko, D. O. Zhukov. 890-893 [doi]
- Generation of the Single Precision BLAS Library for the Parallella Platform, with Epiphany Co-processor Acceleration, Using the BLIS FrameworkMiguel Tasende. 894-897 [doi]
- Enhancing Mobility Management and Supporting 3d VisualizationHanafy M. Ali. 898-904 [doi]
- Temporal and Spatial Trend Analysis of Cloud Spot Instance Pricing in Amazon EC2Khandelwal Veena, Chaturvedi Anand, Chandra Prakash Gupta. 909-912 [doi]
- PyramidViz: Visual Analytics and Big Data Visualization for Frequent PatternsCarson K. Leung, Vadim V. Kononov, Adam G. M. Pazdor, Fan Jiang. 913-916 [doi]
- A Distributed and Autonomous Guard System Based on Cloud EnvironmentsWei-Fa Liao, Hung-Min Sun, Wei Wu. 917-920 [doi]
- Fast Processing SPARQL Queries on Large RDF DataGuang Yang, Pingpeng Yuan, Hai Jin. 921-926 [doi]
- A Semantic-Based Approach to Building Auxiliary System for Screen-Based ReadingHuizhong Zhong, Shaofeng Li, Feng Zhao, Hai Jin, Qin Zhang. 927-932 [doi]
- Research about New Media Security Technology Base on Big Data EraZheng-Wu Lu. 933-936 [doi]
- Design and Implementation of Hybrid Shingled Recording RAID SystemZheng-Wu Lu, Gang Zhou. 937-942 [doi]
- Disaster EHealth-Sustainability in the ExtremeDavid Parry, Samaneh Madanian, Tony Norris. 943-946 [doi]
- CatchMe If You Can: Enable Sustainable Communications Using Internet of Movable ThingsAmbreen Memon, William Liu, Adnan Al-Anbuky. 947-952 [doi]