Abstract is missing.
- Avionics Self-adaptive Software: Towards Formal Verification and ValidationMeenakshi D'Souza, Rajanikanth N. Kashi. 3-23 [doi]
- The Digital Turn: On the Quest for Holistic ApproachesChristian Erfurth. 24-30 [doi]
- Secured Communications on Vehicular Networks over Cellular NetworksHacène Fouchal, Emilien Bourdy, Geoffrey Wilhelm, Marwane Ayaida. 31-41 [doi]
- IT-Security in Critical Infrastructures Experiences, Results and Research DirectionsUlrike Lechner. 42-59 [doi]
- Digital Society: A Computing Science ProspectiveHrushikesha Mohanty. 60-70 [doi]
- A Hybrid Meta-heuristic Approach for Load Balanced Workflow Scheduling in IaaS CloudIndrajeet Gupta, Shivangi Gupta, Anubhav Choudhary, Prasanta K. Jana. 73-89 [doi]
- Duplication Based Budget Effective Workflow Scheduling for Cloud ComputingMadhu Sudan Kumar, Indrajeet Gupta, Prasanta K. Jana. 90-98 [doi]
- Dr. Hadoop: In Search of a Needle in a HaystackSabuzima Nayak, Ripon Patgiri. 99-107 [doi]
- Parallel High Average-Utility Itemset Mining Using Better Search Space Division ApproachKrishan Kumar Sethi, Dharavath Ramesh, M. Sreenu. 108-124 [doi]
- Supporting Transaction Predictability in Replicated DRTDBSPratik Shrivastava, Udai Shanker. 125-140 [doi]
- Data Scheduling and Resource Optimization for Fog Computing Architecture in Industrial IoTWei Wang, Guanyu Wu, Zhe Guo, Liang Qian, Lianghui Ding, Feng Yang 0006. 141-149 [doi]
- Research on CNN Parallel Computing and Learning Architecture Based on Real-Time Streaming ArchitectureYuting Zhu, Liang Qian, Chuyan Wang, Lianghui Ding, Feng Yang 0006, Hao Wang. 150-158 [doi]
- Detection of Alcoholism: An EEG Hybrid Features and Ensemble Subspace K-NN Based ApproachSandeep Bavkar, Brijesh Iyer, Shankar B. Deosarkar. 161-168 [doi]
- On the Growth of the Prime Numbers Based Encoded Vector ClockAjay D. Kshemkalyani, Bhargav Voleti. 169-184 [doi]
- A Sensitivity Analysis on Weight Sum Method MCDM Approach for Product RecommendationGaurav Kumar, N. Parimala. 185-193 [doi]
- Event Detection and Aspects in Twitter: A BoW ApproachAbhaya Kumar Pradhan, Hrushikesha Mohanty, Rajendra Prasad Lal. 194-211 [doi]
- A New Automatic Multi-document Text Summarization using Topic ModelingRajendra Kumar Roul, Samarth Mehrotra, Yash Pungaliya, Jajati Keshari Sahoo. 212-221 [doi]
- Improved Visible Light Communication Using Code Shift Keying ModulationIshrath Unissa, Syed Jalal Ahmad, P. Radha Krishna. 222-232 [doi]
- Optimization of Transmission Range for a Fault Tolerant Wireless Sensor NetworkAditi, Rasita Pai, S. Mini 0001. 235-242 [doi]
- Community Detection Using an Enhanced Louvain Method in Complex NetworksLaxmi Chaudhary, Buddha Singh. 243-250 [doi]
- A Fast Handoff Technique for Wireless Mobile NetworksDebasis Das. 251-259 [doi]
- Adaptive Partitioning Using Partial Replication for Sensor DataBhumika Kalavadia, Tarushi Bhatia, Trupti Padiya, Ami Pandat, Minal Bhise. 260-269 [doi]
- Design and Implementation of Cognitive Radio Sensor Network for Emergency Communication Using Discrete Wavelet Packet Transform TechniqueMariappan Ramasamy, Rama Subramanian M.. 270-278 [doi]
- A Network Formation Model for Collaboration NetworksAnkur Sharma, S. Durga Bhavani. 279-294 [doi]
- Bees Detection on Images: Study of Different Color Models for Neural NetworksJerzy Dembski, Julian Szymanski. 295-308 [doi]
- Mobile Charging of Wireless Sensor Networks for Internet of Things: A Multi-Attribute Decision Making ApproachAbhinav Tomar, Prasanta K. Jana. 309-324 [doi]
- Efficient Searching Over Encrypted Database: Methodology and AlgorithmsVarad Deshpande, Debasis Das. 327-338 [doi]
- Tag-Reader Authentication System Guarded by Negative Identifier Filtering and Distance BoundingRuchi Kachhia, Prachi Agrawal, Manik Lal Das. 339-348 [doi]
- RSA-Based Collusion Resistant Quorum Controlled Proxy Re-encryption Scheme for Distributed Secure CommunicationShravani Mahesh Patil, B. R. Purushothama. 349-363 [doi]
- Extended Power Modulus Scrambling (PMS) Based Image Steganography with Bit Mapping InsertionSrilekha Mukherjee, Goutam Sanyal. 364-379 [doi]
- Empirical Study on Malicious URL Detection Using Machine LearningRipon Patgiri, Hemanth Katari, Ronit Kumar, Dheeraj Sharma. 380-388 [doi]
- Inter-family Communication in Hyperledger Sawtooth and Its Application to a Crypto-Asset FrameworkLuke Owens, Benoît Razet, W. Bryan Smith, Theodore C. Tanner Jr.. 389-401 [doi]
- Attack Detection and Forensics Using Honeypot in IoT EnvironmentRajesh Kumar Shrivastava, Bazila Bashir, Chittaranjan Hota. 402-409 [doi]
- JSpongeGen: A Pseudo Random Generator for Low Resource DevicesPranav Kumar Singh, Anish V. Monsy, Rajan Garg, Sukanta Dey, Sukumar Nandi. 410-421 [doi]
- Elliptic Curve Cryptography Based Mechanism for Secure Wi-Fi ConnectivityPranav Kumar Singh, Prateek Vij, Arpan Vyas, Sunit Kumar Nandi, Sukumar Nandi. 422-439 [doi]