Abstract is missing.
- On Exploring a Virtual Agent Negotiation Inspired Approach for Route Guidance in Urban Traffic NetworksWenbin Hu, Liping Yan, Huan Wang, Bo Du. 3-16 [doi]
- Optimization of Binomial Option Pricing on Intel MIC Heterogeneous SystemWeihao Liang, Hong An, Feng Li, Yichao Cheng. 17-29 [doi]
- Stencil Computations on HPC-oriented ARMv8 64-Bit Multi-Core ProcessorChunjiang Li, Yushan Dong, Kuan Li. 30-43 [doi]
- A Particle Swarm Optimization Algorithm for Controller Placement Problem in Software Defined NetworkChuangen Gao, Hua Wang, Fangjin Zhu, Linbo Zhai, Shanwen Yi. 44-54 [doi]
- A Streaming Execution Method for Multi-services in Mobile Cloud ComputingLei Li, Yonghua Xiong, Shufan Guo, Keyuan Jiang, Yongbing Tang. 55-67 [doi]
- Economy-Oriented Deadline Scheduling Policy for Render System Using IaaS CloudQian Li, Weiguo Wu, Zeyu Sun, Lei Wang, Jianhang Huang. 68-78 [doi]
- Towards Detailed Tissue-Scale 3D Simulations of Electrical Activity and Calcium Handling in the Human Cardiac VentricleQiang Lan, Namit Gaur, Johannes Langguth, Xing Cai. 79-92 [doi]
- Task Parallel Implementation of Matrix Multiplication on Multi-socket Multi-core ArchitecturesYizhuo Wang, Weixing Ji, Xu Chen, Sensen Hu. 93-104 [doi]
- Refactoring for Separation of Concurrent ConcernsYang Zhang, Dongwen Zhang, Weixing Ji, Yizhuo Wang. 105-118 [doi]
- Exploiting Scalable Parallelism for Remote Sensing Analysis Models by Data Transformation GraphZhenchun Huang, Guoqing Li. 119-133 [doi]
- Resource-Efficient Vibration Data Collection in Cyber-Physical SystemsMd. Zakirul Alam Bhuiyan, Guojun Wang, Jie Wu, Tian Wang, Xiangyong Liu. 134-147 [doi]
- A New Approach for Vehicle Recognition and Tracking in Multi-camera Traffic SystemWenbin Jiang, Zhiwei Lu, Hai Jin, Ye Chi. 148-161 [doi]
- DFIS: A Scalable Distributed Fingerprint Identification SystemYunxiang Zhao, Wanxin Zhang, Dongsheng Li, Zhen Huang. 162-175 [doi]
- Energy Saving and Load Balancing for SDN Based on Multi-objective Particle Swarm OptimizationRunshui Zhu, Hua Wang, Yanqing Gao, Shanwen Yi, Fangjin Zhu. 176-189 [doi]
- Pre-stack Kirchhoff Time Migration on Hadoop and SparkChen Yang, Jie Tang, Heng Gao, Gangshan Wu. 190-202 [doi]
- A Cyber Physical System with GPU for CNC ApplicationsJen-Chieh Chang, Ting-Hsuan Chien, Rong-Guey Chang. 203-212 [doi]
- NCPSO: A Solution of the Controller Placement Problem in Software Defined NetworksShuai Liu, Hua Wang, Shanwen Yi, Fangjin Zhu. 213-225 [doi]
- Parallel Column Subset Selection of Kernel Matrix for Scaling up Support Vector MachinesJiangang Wu, Chang Feng, Peihuan Gao, Shizhong Liao. 226-239 [doi]
- Real-Time Deconvolution with GPU and Spark for Big Imaging Data AnalysisLianyu Cao, Penghui Juan, Yinghua Zhang. 240-250 [doi]
- Parallel Kirchhoff Pre-Stack Depth Migration on Large High Performance ClustersChao Li, Yida Wang, Changhai Zhao, Haihua Yan, Jianlei Zhang. 251-266 [doi]
- MrBayes for Phylogenetic Inference Using Protein Data on a GPU ClusterShuai Pang, Rebecca Jean Stones, Ming-ming Ren, Gang Wang, Xiaoguang Liu. 267-280 [doi]
- Paralleled Continuous Tabu Search Algorithm with Sine Maps and Staged Strategy for Solving CNOPShijin Yuan, Yiwen Qian, Bin Mu. 281-294 [doi]
- VCLT: An Accurate Trajectory Tracking Attack Based on Crowdsourcing in VANETsChi Lin, Kun Liu, Bo Xu, Jing Deng, Chang-Wu Yu, Guowei Wu. 297-310 [doi]
- A Novel Search Engine-Based Method for Discovering Command and Control ServerXiaojun Guo, Guang Cheng, Wubin Pan, Truong Dinhtu, Yixin Liang. 311-322 [doi]
- Leveraging Behavior Diversity to Detect Spammers in Online Social NetworksJian Cao, Qiang Fu, Qiang Li, Dong Guo 0002. 323-336 [doi]
- A Proactive Fault Tolerance Scheme for Large Scale Storage SystemsXinpu Ji, Yuxiang Ma, Rui Ma, Peng Li, Jingwei Ma, Gang Wang, Xiaoguang Liu, Zhongwei Li. 337-350 [doi]
- When Software Defined Networks Meet Fault Tolerance: A SurveyJue Chen, Jinbang Chen, Fei Xu, Min Yin, Wei Zhang. 351-368 [doi]
- A Novel Signature Generation Approach for Polymorphic WormsJie Wang, Xiaoxian He. 369-382 [doi]
- Scalable Access Policy for Attribute Based Encryption in Cloud StorageJing Wang, Chuanhe Huang, Jinhai Wang. 383-402 [doi]
- Minimizing Resource Expenditure While Maximizing Destructiveness for Node Capture AttacksChi Lin, Guowei Wu, Xiaochen Lai, Tie Qiu. 403-416 [doi]
- Deviation-Based Location Switching Protocol for Trajectory Privacy ProtectionShaobo Zhang, Qin Liu, Guojun Wang. 417-428 [doi]
- Exploring Efficient and Robust Virtual Machine Introspection TechniquesChonghua Wang, Xiao-chun Yun, Zhiyu Hao, Lei Cui, Yandong Han, Qingxin Zou. 429-448 [doi]
- CRVad: Confidential Reasoning and Verification Towards Secure Routing in Ad Hoc NetworksTeng Li, Jianfeng Ma, Cong Sun. 449-462 [doi]
- NMHP: A Privacy Preserving Profile Matching Protocol in Multi-hop Proximity Mobile Social NetworksEntao Luo, Qin Liu, Guojun Wang. 463-474 [doi]
- A New Data Replication Scheme for PVFS2Nianyuan Bao, Jie Tang, Xiaoyu Zhang, Gangshan Wu. 475-491 [doi]
- Efficient Private Matching Scheme for Friend Information ExchangeFang Qi, Wenbo Wang. 492-503 [doi]
- A Real-time Android Malware Detection System Based on Network Traffic AnalysisHongbo Han, Zhenxiang Chen, Qiben Yan, Lizhi Peng, Lei Zhang. 504-516 [doi]
- Sky: Opinion Dynamics Based Consensus for P2P Network with Trust RelationshipsHouwu Chen, Jiwu Shu. 517-531 [doi]
- Adopting Multi-mode Access Control for Secure Data Sharing in CloudChun-hua Li, Ronglei Wei, Zebang Wu, Ke Zhou, Cheng Lei, Hao Jin. 532-546 [doi]
- A Scheme to Manage Encrypted Data Storage with Deduplication in CloudZheng Yan, Wenxiu Ding, Haiqi Zhu. 547-561 [doi]
- HCBE: Achieving Fine-Grained Access Control in Cloud-Based PHR SystemsXuhui Liu, Qin Liu, Tao Peng, Jie Wu. 562-576 [doi]
- Lightweight Virtual Machine Checkpoint and Rollback for Long-running ApplicationsLei Cui, Zhiyu Hao, Lun Li, Haiqiang Fei, Zhenquan Ding, Bo Li, Peng Liu. 577-596 [doi]
- Fast and Scalable Regular Expressions Matching with Multi-Stride Index NFASheng Huo, Dafang Zhang, Yanbiao Li. 597-610 [doi]
- A Robust and Efficient Detection Model of DDoS Attack for Cloud ServicesJian Zhang, Ya-Wei Zhang, Jian-Biao He, Ou Jin. 611-624 [doi]
- Secure Bisimulation for Interactive SystemsGuanJun Liu, Changjun Jiang. 625-639 [doi]
- Privacy Preserving for Network Coding in Smart GridShiming He, Weini Zeng, Kun Xie. 640-654 [doi]
- Verifiable Dynamic Fuzzy Search Over Encrypted Data in Cloud ComputingXiaoyu Zhu, Qin Liu, Guojun Wang. 655-666 [doi]
- A Secure and Fine-Grained Query Results Verification Scheme for Private Search Over Encrypted Cloud DataHui Yin, Zheng Qin, Jixin Zhang, Lu Ou, Qin Liu, Yupeng Hu, Huigui Rong. 667-681 [doi]
- PEM4RFID: Privacy Enhancement Model for RFID SystemsGuangquan Xu, Yuanyuan Ren, Bin Liu, Gaoxu Zhang, Xiaohong Li, Zhiyong Feng. 682-694 [doi]
- Improved WOW Adaptive Image Steganography MethodXin Liao, Guoyong Chen, Qi Li, Jun Liu. 695-702 [doi]
- CloudS: A Multi-cloud Storage System with Multi-level SecurityLu Shen, Shifang Feng, Jinjin Sun, Zhongwei Li, Gang Wang, Xiaoguang Liu. 703-716 [doi]
- Crossing - A Highly Available Quorum Protocol for Arbitrary Planar TopologiesRobert Schadek, Oliver E. Theel. 717-728 [doi]
- Note on Fast Bridge Fault Test Generation Based on Critical AreaMasayuki Arai, Shingo Inuyama, Kazuhiko Iwasaki. 729-740 [doi]
- Joint Redundancy and Inspection-Based Maintenance Optimization for Series-Parallel SystemYuan Yao, Pan He, Zhihao Zheng, Chun Tan, Yue Yuan. 741-755 [doi]
- Addressing NoC Reliability Through an Efficient Fibonacci-Based Crosstalk Avoidance Codec DesignZahra Shirmohammadi, Seyed Ghassem Miremadi. 756-770 [doi]
- A Programming Framework for Implementing Fault-Tolerant Mechanism in IoT ApplicationsYung-Li Hu, Yuo-Yu Cho, Wei-Bing Su, David S. L. Wei, Yennun Huang, Jiann-Liang Chen, Ing-Yi Chen, Sy-Yen Kuo. 771-784 [doi]
- An Agent-Based Framework for Simulating and Analysing Attacks on Cyber Physical SystemsSridhar Adepu, Aditya Mathur, Jagadeesh Gunda, Sasa Z. Djokic. 785-798 [doi]