Abstract is missing.
- An Efficient Dynamic Programming Algorithm for STR-IC-STR-EC-LCS ProblemDaxin Zhu, Yingjie Wu, Xiaodong Wang. 3-17 [doi]
- A Polynomial Time Algorithm for a Generalized Longest Common Subsequence ProblemXiaodong Wang, Yingjie Wu, Daxin Zhu. 18-29 [doi]
- Improved Survey Propagation on Graphics Processing UnitsYang Zhao, Jingfei Jiang, Pengbo Wu. 30-41 [doi]
- ZooKeeper+: The Optimization of Election Algorithm in Complex Network CircumstanceXinyan Zhang, Zhipeng Tan, Meng Li, Yingfei Zheng, Wei Zhou. 42-60 [doi]
- An Efficient Dynamic Provable Data Possession Scheme in Cloud StorageGe Yao, Yong Li 0002, Linan Lei, Huaqun Wang, Changlu Lin. 63-81 [doi]
- iGEMS: A Cloud Green Energy Management System in Data CenterChao-Tung Yang, Yin-Zhen Yan, Shuo-Tsung Chen, Ren-Hao Liu, Jean-Huei Ou, Kun-liang Chen. 82-98 [doi]
- The Macro-DSE for HPC Processing Unit: The Physical Constraints PerspectiveYuXing Tang, Lei Wang, Yu Deng, Xiaoqiang Ni, Qiang Dou. 99-112 [doi]
- A Scalable Cloud-Based Android App Repackaging Detection FrameworkJinghua Li, Xiaoyan Liu, Huixiang Zhang, Dejun Mu. 113-125 [doi]
- Chameleon: Virtual Machine Migration Supporting Cascading Overload Management in CloudYing Liu. 129-145 [doi]
- Heterogeneous Computation Migration on LLVMTyng-Yeu Liang, Yu-Jie Lin. 146-162 [doi]
- A Flow Scheduling Algorithm Based on VM Migration in Data Center NetworksXingyan Zhang. 163-179 [doi]
- Optimizing I/O Intensive Domain Handling in Xen Hypervisor for Consolidated Server EnvironmentsVenkataramanan Venkatesh, Amiya Nayak. 180-195 [doi]
- User-Centric and Real-Time Activity Recognition Using Smart GlassesJoshua Ho, Chien-Min Wang. 196-210 [doi]
- Minimizing Confident Information Coverage Breach in Rechargeable Wireless Sensor Networks with Uneven Recharging RatesZehui Xiong, Bang Wang. 213-228 [doi]
- An Improved Dynamic ID Based Remote User Authentication Scheme for Multi-server EnvironmentQimin Sun, Jongho Moon, Younsung Choi, Dongho Won. 229-242 [doi]
- Mining Frequent Attack Sequence in Web LogsHui Sun, Jianhua Sun, Hao Chen. 243-260 [doi]
- Practical Server-Aided k-out-of-n Oblivious Transfer ProtocolXiaochao Wei, Chuan Zhao, Han Jiang, Qiuliang Xu, Hao Wang. 261-277 [doi]
- Improved Power Analysis Attack Based on the Preprocessed Power TracesXueyang Han, Qiuliang Xu, Fengbo Lin, Minghao Zhao. 278-289 [doi]
- Preserving User Location Privacy for Location-Based ServiceXiaojuan Chen, Yi Mu. 290-300 [doi]
- Towards Secure Private Image MatchingZaid Ameen Abduljabbar, Hai Jin, Ayad Ibrahim, Zaid Alaa Hussien, Mohammed Abdulridha Hussain, Salah H. Abbdal, Deqing Zou. 301-315 [doi]