Abstract is missing.
- A Fuzzy IBE Scheme with Attribute TimelinessXin Wang, Shuting Zuo, Meiling Zhang, Lei Zhang, Chen Yang, Zhiyu Han, Juan Shui. 1-6 [doi]
- An Attribute-Based Searchable Encryption Scheme Supporting Trapdoor UpdatingJingjing Xu, Chun Ying, Shuhua Tan, Zhe Sun, Pan Wang, Zhixin Sun. 7-14 [doi]
- Application of Fuzzy Analogy Preferred Ratio Based on Euclid Distance in Quantitative Decision of Turfgrass IntroductionLinjing Wei, Wenke Dong, Hui Zhou, Yue Li, Xia Zhao. 15-18 [doi]
- Target Detection Based on Cascade Network and Densely Connected Network in Remote Sensing ImageJihao Wang, Yangping Wang, Jianwu Dang, Linjing Wei. 19-25 [doi]
- Incremental User Modeling of Online Activity for Cyber-I Growth with Successive Browsing LogsYen Tsan, Ao Guo, Jianhua Ma, Runhe Huang, Zhong Chen. 26-32 [doi]
- From User Models to the Cyber-I Model: Approaches, Progresses and IssuesAo Guo, Jianhua Ma, Kevin I-Kai Wang. 33-40 [doi]
- A Hierarchical Approach to Encrypted Data Packet Classification in Smart Home GatewaysXuejiao Chen, Jiahui Yu, Feng Ye, Pan Wang. 41-45 [doi]
- Correlation Analyses Between Personality Traits and Personal Behaviors Under Specific Emotion States Using Physiological Data from Wearable DevicesRuiying Cai, Ao Guo, Jianhua Ma, Runhe Huang, Ruiyun Yu, Chen Yang. 46-53 [doi]
- ARP-CP-ABE: Toward Efficient, Secure and Flexible Access Control for Personal Health Record SystemsGuofeng Lin, Chun Ying, Shuhua Tan, Yunhao Xia, Zhixin Sun. 54-61 [doi]
- A Study on Quantitative Risk Assessment Methods in Security Design for Industrial Control SystemsYasuyuki Kawanishi, Hideaki Nishihara, Daisuke Souma, Hirotaka Yoshida, Yoichi Hata. 62-69 [doi]
- USB SPY: A Stratagem for Tracing USB Storage DevicesPratiksha Dwivedi, Varsha Sharma, Ravindra Patel. 70-77 [doi]
- A Security Framework for ICN Traffic ManagementEslam G. AbdAllah, Mohammad Zulkernine, Hossam S. Hassanein. 78-85 [doi]
- Acquisition and Analysis of Forensic Data Artefacts of Some Popular Apps in Android SmartphoneYamini Konduru, Nishchol Mishra, Sanjeev Sharma. 86-93 [doi]
- ID Hopping CAN Controller Design with Obfuscated Priority AssignmentShan Ding, Tong Zhao, Ryo Kurachi, Gang Zeng. 94-99 [doi]
- Fraud Risk Monitoring System for E-Banking TransactionsChaonian Guo, Hao Wang, Hong-Ning Dai, Shuhan Cheng, Tongsen Wang. 100-105 [doi]
- A Blockchain-Based Risk and Information System Control FrameworkShenglan Ma, Wang Hao, Hong-Ning Dai, Shuhan Cheng, Ruihua Yi, Tongsen Wang. 106-113 [doi]
- The Model Experimental Evaluation of the Cardiovascular Interventional Surgery Robot SystemFulong Chen, Hao Shen, Cheng Wang, Le Xie, Shoujun Zhou, Hesheng Wang. 114-120 [doi]
- Using Digital Tokens to Improve Amortized Performance of eSignPuneet Bakshi, Neelakantan Subramanian, Sukumar Nandi. 121-128 [doi]
- Stencil Imaging and Defects Detection Using Artificial Neural NetworksXiaojun Yin, Kecheng Yang, Qi Zhang, Xiaohui Zhang. 129-134 [doi]
- HyTube: A Novel Middleware Layer for Smart Building SystemsChunhua Chen, Junwei Yan. 135-142 [doi]
- Multi-scale Trajectory Data Management and QueryLai Tu, Jing Wen, Benxiong Huang, Dan Tan. 143-150 [doi]
- Detecting Anomaly in Big Data System Logs Using Convolutional Neural NetworkSiyang Lu, Xiang Wei, Yandong Li, Liqiang Wang. 151-158 [doi]
- SMELs: A Data-Driven Middleware for Smart Miscellaneous Electrical Load Management in BuildingsBalaji Kalluri Mallikarjuna, Sekhar Kondepudi, Tham Kwok Wai, Kua Harn Wei, Andreas Kamilaris. 159-165 [doi]
- Augmented Reality Registration Method Based on Improved LMedsXiangyu Su, Wenrun Wang, Linjing Wei, Zhenghai Zhang. 166-172 [doi]
- Feature Selection for Machine Learning-Based Early Detection of Distributed Cyber AttacksYaokai Feng, Hitoshi Akiyama, Liang Lu, Kouichi Sakurai. 173-180 [doi]
- An Incremental Collaborative Filtering Based Recommendation Framework for Personalized WebsitesKehua Guo, Tao Xu, Yayuan Tang, Ruifang Zhang, Jianhua Ma. 181-186 [doi]
- Fake News Detection Enhancement with Data ImputationChandra Mouli Madhav Kotteti, Xishuang Dong, Na Li, Lijun Qian. 187-192 [doi]
- Table Analysis and Information Extraction for Medical Laboratory ReportsWenyuan Xue, Qingyong Li, Zhen Zhang, Yulei Zhao, Hao Wang. 193-199 [doi]
- OwlEye: An Advanced Detection System of Web Attacks Based on HMMXin Liu, Qingchen Yu, Xiaokang Zhou, Qingguo Zhou. 200-207 [doi]
- DYCUSBoost: Adaboost-Based Imbalanced Learning Using Dynamic Clustering and UndersamplingLingchi Chen, Xiaoheng Deng, Hailan Shen, Congxu Zhu, Le Chang. 208-215 [doi]
- The Influence Maximization Problem in the Network Under Node Personalized CharacteristicsWeimin Li, Jun Mo, Yue Liu, Nobuyasu Ito, Yohsuke Murase, Jianwei Liu. 216-221 [doi]
- Smart Crib Control System Based on Sentiment AnalysisYing Liu, Dequan Zheng, Tongmao Lin, Xianqi Liu, Deshuai Wang, Frank Hopfgartner. 222-229 [doi]
- An Automated Evaluation System for App Inventor AppsYue Li, Yiqing Pan, Wensheng Liu, Xingming Zhang. 230-235 [doi]
- Twitter Influencers or Cheated Buyers?Savvas Zenonos, Andreas Tsirtsis, Nicolas Tsapatsoulis. 236-242 [doi]
- Speech Emotion Recognition Using Cross-Correlation and Acoustic FeaturesJoyjit Chatterjee, Vajja Mukesh, Hui-Huang Hsu, Garima Vyas, Zhen Liu 0002. 243-249 [doi]
- Product Surface Defect Detection Based on Deep LearningPo Chun Lien, Qiangfu Zhao. 250-255 [doi]
- Interpretation of Deep Neural Networks Based on Decision TreesTsukasa Ueno, Qiangfu Zhao. 256-261 [doi]
- Hunting Algorithm Visualization and Performance Evaluation Through BDI Agent SimulationMarc Prince, Fuhua Lin. 262-269 [doi]
- Anomaly Prediction in Passenger Flow with Knowledge Transfer MethodZhipu Xie, Weifeng Lv, Syed Muhammad Asim Ali, Bowen Du, Runhe Huang. 270-277 [doi]
- Hidden Markov Model for Masquerade Detection Based on Sequence AlignmentWei Qiu, Andy Wai Hoong Khong, Wee-Peng Tay. 278-285 [doi]
- Specifying Latent Factors with a Domain Model for Personal Data AnalysisKiichi Tago, Kosuke Takagi, Kenichi Ito, Qun Jin. 286-291 [doi]
- The Team Brain: Soccer Analysis and Battles of MindsMassimo Marchiori, Marco de Vecchi. 292-299 [doi]
- Road Extraction from High-Resolution Remotely Sensed Image Based on Improved Ant Colony Optimization MethodYangping Wang, Chengwei Tang, Jingyu Yang, Linjing Wei. 300-309 [doi]
- The Controller Placement of Software-Defined Networks Based on Minimum Delay and Load BalancingPeiying Tao, Chun Ying, Zhe Sun, Shuhua Tan, Pan Wang, Zhixin Sun. 310-313 [doi]
- Identifying Influential Nodes Based on Vital CommunitiesYafei Wang, Guanghui Yan, Qingqing Ma, Yu Wu, Meng Zhang. 314-317 [doi]
- A Community Detecting Algorithm Based on Modular Tensor in Temporal NetworkDan Jin, Yu Wu, Guanghui Yan, Yafei Wang, Qingqing Ma, Juncheng Li. 318-322 [doi]
- Contract Based Energy Blockchain for Secure Electric Vehicles Charging in Smart CommunityYuntao Wang, Zhou Su, Qichao Xu, Ning Zhang. 323-327 [doi]
- A Malware Analysis and Artifact Capture ToolDallas Wright, Josh Stroschein. 328-333 [doi]
- CPS: A Community Priority Based Vaccine Distribution Strategy in Different NetworksMengjin Jiang, Yizhi Ren, Ye Yao, Lifeng Yuan, Ting Wu, Zhen Wang. 334-337 [doi]
- Identifying Niche Singers in Online Music Streaming ServicesChih-Cheih Hung, Chun-Yu Kuo, Hui-Huang Hsu, Yian Chen. 338-342 [doi]
- Design of an AI-Empowered Recommender System for Travelling Support: Individual Traveler as an InstanceKuan-Hua Lai, Neil Y. Yen, Mu-Yen Chen. 343-346 [doi]
- Research on Dynamic Multi-objective FJSP Based on Genetic AlgorithmBi Li, Bin-feng Jin. 347-352 [doi]
- User Verification Based On Customized Sentence ReadingLuqi Yang, Zhiwei Zhao, Geyong Min. 353-356 [doi]
- Improved Fast-ICA for Change Detection of Multi Temporal Remote Sensing ImagesJingyu Yang, Zhengdong Ma, Jianwu Dang, Linjing Wei, Yangping Wang. 357-361 [doi]
- Toward Mitigation-as-a-Service in Cooperative Network DefensesStephan Mannhart, Bruno Rodrigues, Eder Scheid, Salil S. Kanhere, Burkhard Stiller. 362-367 [doi]
- Efficient File-Share Reconstruction Scheme for Device Addition/Removal in Personal Area NetworkJung-Eun Park, Young-Hoon Park. 368-372 [doi]
- Secured Architecture for Unmanned Surface Vehicle Fleets Management and ControlPedro Merino Laso, David Brosset, Marie-Annick Giraud. 373-375 [doi]
- Ensemble of Semi-Supervised Models for IoT Resource Scheduling and SharingTony Jan. 376-378 [doi]
- The Implementation of CNN-Based Object Detector on ARM Embedded PlatformsYingjie Zhang, Sheng Bi, Min Dong, Yunda Liu. 379-382 [doi]
- Key Frame Extraction of Skeleton Joint Based on Kinect SensorCheche Xie, Sheng Bi, Min Dong, Zehao Jin. 383-385 [doi]
- The Cyber Sensor NetworkMichael J. O'Grady, Olga Murdoch, Dominic Carr, Rem W. Collier, Gregory M. P. O'Hare. 386-389 [doi]
- Channel-Aware MAC Protocol for Cognitive Radio Sensor NetworksSubash Luitel, Sangman Moh. 390-392 [doi]
- Applications of Anomaly Detection Using Deep Learning on Time Series DataVan Quan Nguyen, Linh Van Ma, Jin Young Kim, Kwang-Ki Kim, Jinsul Kim. 393-396 [doi]
- Identifying Ad Libraries by Their Network Behavior PatternsMing-Yang Su, Hong-Siou Wei, Xin-Yu Chen, Po-Wei Lin, Ding-You Qiu. 397-398 [doi]
- Design and Implementation of the Background Management Platform of Nutrition Point Catering for the ElderlyShu Fu, Lina Ma, Xiangyue Yang, Xin Jian. 399-402 [doi]
- A Novel Solution to Improve Network Coverage and Capacity with EasyMacroYu Su, Yan Zhang. 403-407 [doi]
- Boosted Probabilistic Neural Network for IoT Data ClassificationTony Jan, A. S. M. Sajeev. 408-411 [doi]
- Improved Collaborative Filtering Algorithm Based on Multifactor Fusion and User Features ClusteringLuyan Ni, Jiulei Jiang, Xiaofeng Wang. 412-417 [doi]
- A Novel Personalized Recommendation Algorithm Based on Trust Relevancy DegreeWeimin Li, Heng Zhu, Xiaokang Zhou, Shohei Shimizu, Mingjun Xin, Qun Jin. 418-422 [doi]
- Top-K Frequent Spatial-Temporal Words Query Based on R-TreeShoujian Yu, Guohui Cai, Weimin Li, Jianyun Xie. 423-428 [doi]
- Relationships and Rule-Based Organizational Goals Ontology: A Case of Library GoalsTengku Adil Tengku Izhar, Bernady O. Apduhan, Torab Torabi. 429-434 [doi]
- Opportunistic Message Broadcasting with Pheromone-Based CachingTomoyuki Sueda, Naohiro Hayashibara. 435-440 [doi]
- Activity Classification Using Raw Range and I & Q Radar Data with Long Short Term Memory LayersCharalampos Loukas, Francesco Fioranelli, Julien Le Kernec, Shufan Yang. 441-445 [doi]
- A New Method for Facial and Corporal Expression RecognitionKahina Amara, Naeem Ramzan, Nouara Achour, Mahmoud Belhocine, Cherif Larbes, Nadia Zenati. 446-450 [doi]
- IoT Driven Ambient Intelligence Architecture for Indoor Intelligent MobilityVaruna De Silva, Jamie Roche, Xiyu Shi, Ahmet M. Kondoz. 451-456 [doi]
- Design and Evaluation of Vivado HLS-Based Compressive Sensing for ECG Signal AnalysisOussama Kerdjidj, Naeem Ramzan, Abbes Amira, Khalida Ghanem, Fatima Chouireb. 457-461 [doi]
- Fog-Supported Internet of Things (IoTs) Architecture for Remote Patient Monitoring Systems Using Wireless Body Area Sensor NetworksRao Naveed Bin Rais, Muhammad Sajjad Akbar, Mohammad Aazam. 462-466 [doi]
- Opportunistic Doppler-Only Indoor Localization Via Passive RadarWenda Li, Bo Tan 0003, Robert J. Piechocki. 467-473 [doi]
- Unifying and Analysing Activities of Daily Living in Extra Care HomesAlexandros Konios, Yanguo Jing, Mark Eastwood, Bo Tan. 474-479 [doi]
- A Reliable and Low Cost Vehicle Localization Approach Using Interval AnalysisZhan Wang, Alain Lambert. 480-487 [doi]
- Distributed Denial of Service Attack Prevention at Source MachinesMasanori Misono, Kaito Yoshida, Juho Hwang, Takahiro Shinagawa. 488-495 [doi]
- SocialBotHunter: Botnet Detection in Twitter-Like Social Networking Services Using Semi-Supervised Collective ClassificationAli Dorri, Mahdi Abadi, Mahila Dadfarnia. 496-503 [doi]
- On Increasing Dependability of Web Services - an Approach to Design a Failure Detection ServiceJacek Kobusinski, Jerzy Brzezinski, Anna Kobusinska. 504-511 [doi]
- A Privacy Negotiation Mechanism for the Internet of ThingsKhaled Alanezi, Shivakant Mishra. 512-519 [doi]
- Capture the RAT: Proximity-Based Attacks in 5G Using the Routine Activity TheoryAna Nieto, Antonio Acien, Javier López 0001. 520-527 [doi]
- Hardware Performance Counters for Embedded Software Anomaly DetectionKarl Ott, Rabi Mahapatra. 528-535 [doi]
- Analyzing Cross-Platform Attacks: Towards a Three-Actor ApproachAntonio Acien, Ana Nieto, Javier López 0001. 536-543 [doi]
- Validation of the Proposed Fault Injection, Test and Hardness Analysis for Combinational Data-Flow Verilog HDL Designs Under the RASP-FIT ToolAbdul Rafay Khatri, Ali Hayek, Josef Börscök. 544-551 [doi]
- Android Hooking RevisitedNikolaos Totosis, Constantinos Patsakis. 552-559 [doi]
- A Dynamic App Anti-Debugging Approach on Android ART RuntimeJia Wan, Mohammad Zulkernine, Clifford Liem. 560-567 [doi]
- Abnormal-Node Detection Based on Spatio-Temporal and Multivariate-Attribute Correlation in Wireless Sensor NetworksNesrine Berjab, Hieu Hanh Le, Chia-Mu Yu, Sy-Yen Kuo, Haruo Yokota. 568-575 [doi]
- A Forensic System for Identifying the Suspects of a Crime with No Solid Material EvidencesKamal Taha, Paul D. Yoo. 576-583 [doi]
- Porting the Pip Proto-Kernel's Model to Multi-core EnvironmentsQuentin Bergougnoux, Julien Cartigny, Gilles Grimaud. 584-591 [doi]
- Soft Error Characterization on Scientific ApplicationsZuhal Ozturk, Haluk Rahmi Topcuoglu, Sanem Arslan, Mahmut Taylan Kandemir. 592-599 [doi]
- Privacy Preserving Random Decision Tree Classification Over Horizontally and Vertically Partitioned DataFatemeh Khodaparast 0002, Mina Sheikhalishahi, Hassan Haghighi, Fabio Martinelli. 600-607 [doi]
- Dynamic Memory Protection via Intel SGX-Supported Heap AllocationSaman A. Zonouz, Mingbo Zhang, Pengfei Sun, Luis Garcia, Xiruo Liu. 608-617 [doi]
- Securing Web Applications with Secure Coding Practices and Integrity VerificationArafa Anis, Mohammad Zulkernine, Shahrear Iqbal, Clifford Liem, Catherine Chambers. 618-625 [doi]
- Wi-Fi Halow Signal Coverage Estimation in Collapsed StructuresMuhammad Faizan Khan, Guojun Wang, Md. Zakirul Alam Bhuiyan, Tao Peng. 626-633 [doi]
- Accelerating Event Processing for Security Analytics on a Distributed In-Memory PlatformDavid Jaeger, Feng Cheng 0002, Christoph Meinel. 634-643 [doi]
- Context Awareness for Improved Continuous Face Authentication on Mobile DevicesMax Smith-Creasey, Fatema Albalooshi, Muttukrishnan Rajarajan. 644-652 [doi]
- Enhancing Hadoop System Dependability Through Autonomous SnapshotTsozen Yeh, Yipin Wang. 653-660 [doi]
- Implementation Efficiency and Alternations, on CAESAR Finalists: AEGIS ApproachMaria Katsaiti, Nicolas Sklavos. 661-665 [doi]
- A System Architecture for Cloud of SensorsIgor Leão dos Santos, Marcelo Pitanga Alves, Flávia Coimbra Delicato, Paulo F. Pires, Luci Pirmez, Wei Li, Albert Y. Zomaya, Samee U. Khan. 666-672 [doi]
- Exploring Problems with Virtualization in Cloud ComputingEdren Dacaymat, Jun Zhang, Qi Wang, M. D. Alam Bhuiyan, Thaier Hayajneh. 673-680 [doi]
- Deep Learning with Non-parametric Regression Model for Traffic Flow PredictionMuhammad Arif, Guojun Wang, Shuhong Chen. 681-688 [doi]
- Performance Evaluation of History-Based and Priority-Based MAC for Traffic-Differentiated Intra-Vehicular NetworkIbnu Febry Kurniawan, Md. Arafatur Rahman, A. Taufiq Asyhari, Md. Zakirul Alam Bhuiyan. 689-694 [doi]
- Parallelizing Louvain Algorithm: Distributed Memory ChallengesNaw Safrin Sattar, Shaikh Arifuzzaman. 695-701 [doi]
- Android Malware Detection Using Feature Fusion and Artificial DataRaja Khurram Shahzad. 702-709 [doi]
- A New Static-Based Framework for Ransomware DetectionMay Medhat, Samir Gaber, Nashwa Abdelbaki. 710-715 [doi]
- Threat Analysis of Software Agents in Online Banking and PaymentsTamsanqa Ngalo, Hannan Xiao, Bruce Christianson, Ying Zhang. 716-723 [doi]
- WiP: A Novel Blockchain-Based Trust Model for Cloud Identity ManagementKeltoum Bendiab, Nicholas Kolokotronis, Stavros Shiaeles, Samia Boucherkha. 724-729 [doi]
- WiP: Are Cracked Applications Really Free? An Empirical Analysis on Android DevicesKonstantinos-Panagiotis Grammatikakis, Angela Ioannou, Stavros Shiaeles, Nicholas Kolokotronis. 730-735 [doi]
- WiP: Floating XY-YX: An Efficient Thermal Management Routing Algorithm for 3D NoCsMaede Safari, Zahra Shirmohammadi, Nezam Rohbani, Hamed Farbeh. 736-741 [doi]
- Collecting and Analyzing Digital Proof Material to Detect CybercrimesAbdulghani Ali Ahmed, Yee Wai Kit. 742-747 [doi]
- MSRR: Measurement Framework For Remote AttestationJason Gevargizian, Prasad Kulkarni. 748-753 [doi]
- Time-Incremental Convolutional Neural Network for Arrhythmia Detection in Varied-Length ElectrocardiogramQihang Yao, Xiaomao Fan, Yunpeng Cai, Ruxin Wang, Liyan Yin, Ye Li 0002. 754-761 [doi]
- Cooperative Caching Plan of Popular Videos for Mobile Users by Grouping PreferencesYi-Ting Chen, Chia-Cheng Yen, Yu-Tai Lin, Jia-Shung Wang. 762-769 [doi]
- DRAW: Data Replication for Enhanced Data Availability in IoT-based Sensor SystemsWaleed Bin Qaim, Öznur Özkasap. 770-775 [doi]
- Multilevel Observability in Cloud OrchestrationRodolfo Picoreti, Alexandre Pereira do Carmo, Felippe Mendonça de Queiroz, Anilton Salles Garcia, Raquel Frizera Vassallo, Dimitra Simeonidou. 776-784 [doi]
- Wale: A Dockerfile-Based Approach to Deduplicate Shared Libraries in Docker ContainersCorrado Santoro, Fabrizio Messina, Fabio D'Urso, Federico Fausto Santoro. 785-791 [doi]
- C-SAK: Chinese Scanning Ambiguous Keyboard for Parkinson's Disease PatientsFarzana Jabeen, Linmi Tao, Xinyue Wang, Shanshan Mei. 792-799 [doi]
- Cost Efficient Edge Intelligence Framework Using Docker ContainersMabrook Al-Rakhami, Mohammed Alsahli, Mohammad Mehedi Hassan, Atif Alamri, Antonio Guerrieri, Giancarlo Fortino. 800-807 [doi]
- Pervasive 3D Reconstruction to Identify Hidden 3D Survival Spaces for Search and Rescue ManagementPanagiotis Mysiris, Nikolaos Doulamis, Anastasios Doulamis, Vassilis Sourlas, Aggelos Amditis. 808-813 [doi]
- Density Based Multisensor Data Fusion for Multiapplication Wireless Sensor NetworksClaudio Miceli de Farias, Luci Pirmez, Flávia Coimbra Delicato. 814-821 [doi]
- A Dual Sampling Cooperative Communication Method for Energy and Delay ReductionFenyu Jiang, Yan Sun 0005, Chris Phillips 0001. 822-827 [doi]
- FTSGD: An Adaptive Stochastic Gradient Descent Algorithm for Spark MLlibHong Zhang, Zixia Liu, Hai Huang, Liqiang Wang. 828-835 [doi]
- A Pilot Study Mapping Citizens' Interaction with Urban NatureEnrico Ferrara, Antonio Liotta, Laura Erhan, Maryleen U. Ndubuaku, Daniele D. Giusto, Miles Richardson, David Sheffield, Kirsten McEwan. 836-841 [doi]
- Effective Routing Algorithm Based on Software Defined Networking for Big Data Applications in Data Centre NetworkAli Khaleel, Hamed Saffa Al-Raweshidy. 842-848 [doi]
- Edge-based Energy Management for Smart HomesChunqiu Xia, Wei Li, Xiaomin Chang, Flávia Coimbra Delicato, Ting Yang, Albert Y. Zomaya. 849-856 [doi]
- Incentive Allocation to Sequential Decision-Making Sensors in Mobile CrowdsensingIordanis Koutsopoulos. 857-861 [doi]
- SDM-Based Means of Gradient for Eye Center LocalizationYifan Xia, Jianwen Lou, Junyu Dong, Gongfa Li, Hui Yu. 862-867 [doi]
- Dance Posture/Steps Classification Using 3D Joints from the Kinect SensorsNikoloas Bakalos, Eftychios Protopapadakis, Anastasios Doulamis, Nikolaos Doulamis. 868-873 [doi]
- Safe Cycle: Infrastructural Control for BikersMassimo Marchiori. 874-880 [doi]
- Joint Power Control and Channel Assignment for Green Device-to-Device CommunicationChih-Shun Hsu, Wei-Chen Chen. 881-884 [doi]
- Decision Boundary Formation of Deep Convolution Networks with ReLUSeongyoun Woo, Chulhee Lee. 885-888 [doi]
- UNS: A Portable, Mobile, and Exchangeable Namespace for Supporting Fetch-from-Anywhere Big Data Eco-SystemsHsing-bung Chen, Qiang Guan, Song Fu. 889-896 [doi]
- Predication of NCAA Bracket Using Recurrent Neural Network and Combinatorial FusionYuhan Hao, Bruce S. Kristal, D. Frank Hsu. 897-903 [doi]
- Incorporate Proactive Data Protection in ZFS Towards Reliable Storage SystemsZhi Qiao, Jacob Hochstetler, Shuwen Liang, Song Fu, Hsing-bung Chen, Bradley W. Settlemyer. 904-911 [doi]
- Efficient and Fair Item Coverage in Recommender SystemsIordanis Koutsopoulos, Maria Halkidi. 912-918 [doi]
- Substituting Missing Values in End-to-End Internet Performance Measurements Using k-Nearest NeighborsSaqib Ali, Guojun Wang, Xiaofei Xing, Roger Leslie Cottrell. 919-926 [doi]
- Densely Labeling Large-Scale Satellite Images with Generative Adversarial NetworksYupeng Yan, Xiaohui Huang, Anand Rangarajan 0001, Sanjay Ranka. 927-934 [doi]
- Real-Time Traffic Estimation of Unmonitored RoadsPierfrancesco Bellini, Stefano Bilotta, Paolo Nesi, Michela Paolucci, Mirco Soderi. 935-942 [doi]
- Classifying Solid State Drive Firmware via Side-Channel Current Draw AnalysisZachary Johnson, Alex Varon, Justin A. Blanco, Ryan N. Rakvic, James Shey, Hau T. Ngo, Dane Brown, T. Owens Walker. 943-948 [doi]
- Performance Modeling and Evaluation of Distributed Deep Learning Frameworks on GPUsShaohuai Shi, Qiang Wang, Xiaowen Chu. 949-957 [doi]
- The Battle for Information: Exposing WikipediaMassimo Marchiori, Enrico Bonetti Vieno. 958-965 [doi]
- Tracking Supply Chain Process Variability with Unsupervised Cluster TraversalTeng Yung Lin, Howard Hao-Chun Chuang, Fang Yu. 966-973 [doi]
- MER-SDN: Machine Learning Framework for Traffic Aware Energy Efficient Routing in SDNBeakal Gizachew Assefa, Öznur Özkasap. 974-980 [doi]
- Countering Real-Time Stream Poisoning: An Architecture for Detecting Vessel Spoofing in Streams of AIS DataIoannis Kontopoulos, Giannis Spiliopoulos, Dimitrios Zissis, Konstantinos Chatzikokolakis 0002, Alexander Artikis. 981-986 [doi]
- Supervised Papers Classification on Large-Scale High-Dimensional Data with Apache SparkLeonidas Akritidis, Panayiotis Bozanis, Athanasios Fevgas. 987-994 [doi]
- Foundational Issues on Big Data Science and EngineeringAlaa Alsaig, Vangular Alagar, Olga Ormandjieva. 995-1000 [doi]
- Network Traffic Identification with Convolutional Neural NetworksAkshit V. Jain. 1001-1007 [doi]
- Activation Server for Bidirectional Limited Usages of Digital ObjectsRyo Ogitani, Kunitake Kaneko. 1008-1015 [doi]
- Parallel Study of 3-D Oil Reservoir Data Visualization Tool Using Hybrid Distributed/Shared-Memory ModelsHanan Khaled, Ali A. El-Moursy, Salwa M. Nassar, Mohamed Taher, Fadi N. Sibai. 1016-1021 [doi]
- Improving Collaborative Filtering's Rating Prediction Accuracy by Considering Users' Rating VariabilityDionisis Margaris, Costas Vassilakis. 1022-1027 [doi]
- A Distributed Architecture and Design Challenges of an Astray Pilgrim Tracking SystemMohammad A. R. Abdeen. 1028-1033 [doi]
- Research on SWIM Services Dynamic Migration MechanismZhijun Wu, Shengyan Zhou, Meng Yue. 1034-1039 [doi]
- Policy-Based Approach for Securing Message Dissemination in Mobile Ad Hoc NetworksHumayun Bakht, Samuel Eding. 1040-1045 [doi]
- Data-Driven Travel Itinerary with Branch and Bound AlgorithmJiaoman Du, Lei Li, Xiang Li. 1046-1053 [doi]
- Improving Collaborative Filtering's Rating Prediction Coverage in Sparse Datasets by Exploiting User DissimilarityDionisis Margaris, Costas Vassilakis. 1054-1059 [doi]
- Towards a Two Layers Based Scheduling Schema for Data Aware StrategiesSouha Bejaoui, Christophe Cérin, Tarek Menouer, Walid Saad. 1060-1067 [doi]
- Using Sentiment Analysis to Determine Users' Likes on TwitterYo-Ping Huang, Nontobeko Hlongwane, Li-Jen Kao. 1068-1073 [doi]
- Air Pollution Forecasting Using RNN with LSTMYi-Ting Tsai, Yu-Ren Zeng, Yue-Shan Chang. 1074-1079 [doi]
- An Explicit Construction of Systematic MDS Codes with Small Sub-Packetization for All-Node RepairKatina Kralevska, Danilo Gligoroski. 1080-1084 [doi]
- LSTM Model to Forecast Time Series for EC2 Cloud PriceAlkharif Sarah, Kyungyong Lee, Hyeokman Kim. 1085-1088 [doi]