Abstract is missing.
- Improving the Lifetime of Non-penetrable Barrier Coverage in Sensor NetworksJorge Arturo Cobb. 1-10 [doi]
- On Notification Message Re-broadcasting for the Node-Disjoint Multipath Routing Method in Ad Hoc Networks to Counter Eavesdropping of Data PacketsTetsuya Murakami, Toshimasa Kimura, Takahide Uemori, Eitaro Kohno, Yoshiaki Kakuda. 11-16 [doi]
- An Alloy Verification Model for Consensus-Based Auction ProtocolsSaber Mirzaei, Flavio Esposito. 17-22 [doi]
- A Proposal for Mobile Collaborative Work Support Platform Using an Embedded Data Stream Management SystemYukikazu Nakamoto, Shingo Akiyama. 23-28 [doi]
- Using Genetic Programming to Identify Tradeoffs in Self-Stabilizing Programs: A Case StudyLing Zhu, Sandeep S. Kulkarni. 29-34 [doi]
- Ensuring Cloud Service Guarantees via Service Level Agreement (SLA)-Based Resource AllocationKaiqi Xiong, Xiao Chen. 35-41 [doi]
- Tengu: An Experimentation Platform for Big Data ApplicationsThomas Vanhove, Gregory van Seghbroeck, Tim Wauters, Filip De Turck, Brecht Vermeulen, Piet Demeester. 42-47 [doi]
- Making WiFi Work in Multi-hop Topologies: Automatic Negotiation and Allocation of AirtimeDomenico Garlisi, Fabrizio Giuliano, Alice Lo Valvo, Jonathan Lutz, Violet R. Syrotiuk, Ilenia Tinnirello. 48-55 [doi]
- Expressing Different Traffic Models Using the LegoTG FrameworkGenevieve Bartlett, Jelena Mirkovic. 56-63 [doi]
- Providing a High Level Abstraction for SDN Networks in GENIP. Sergio Rivera, Zongming Fei, James Griffioen. 64-71 [doi]
- Video Splicing Techniques for P2P Video StreamingMd Iftakharul Islam, Javed I. Khan. 72-76 [doi]
- In-Network Dynamic Pathlet Switching with VIRO for SDN NetworksBraulio Dumba, Hesham Mekky, Guobao Sun, Zhi-Li Zhang. 77-81 [doi]
- Selection of Virtual Machines Based on Classification of MapReduce JobsAdam Pasqua Blaisse, Zachary Andrew Wagner, Jie Wu. 82-86 [doi]
- Testbed Innovations for Experimenting with Wired and Wireless Software Defined NetworksKostas Choumas, Nikos Makris, Thanasis Korakis, Leandros Tassiulas, Max Ott. 87-94 [doi]
- Selective Packet Inspection to Detect DoS Flooding Using Software Defined Networking (SDN)Tommy Chin, Xenia Mountrouidou, Xiangyang Li, Kaiqi Xiong. 95-99 [doi]
- A Survey on the Security of Hypervisors in Cloud ComputingAndrew R. Riddle, Soon M. Chung. 100-104 [doi]
- Locality Aware Skip GraphYahya Hassanzadeh-Nazarabadi, Alptekin Küpçü, Öznur Özkasap. 105-111 [doi]
- Security and Privacy of Distributed Online Social NetworksSanaz Taheri-Boshrooyeh, Alptekin Küpçü, Öznur Özkasap. 112-119 [doi]
- Diversified Remote Code Execution Using Dynamic Obfuscation of Conditional BranchesMuhammad Hataba, Reem Elkhouly, Ahmed El-Mahdy. 120-127 [doi]
- A Scalable Distributed Private Stream Search SystemPeng Zhang, Yan Li, Qingyun Liu, Hailun Lin. 128-135 [doi]
- KTV-Tree: Interactive Top-K Aggregation on Dynamic Large Dataset in the CloudYuzhe Tang, Ling Liu, Jun'ichi Tatemura, Hakan Hacigümüs. 136-141 [doi]
- Tiny GPU Cluster for Big Spatial Data: A Preliminary Performance EvaluationJianting Zhang, Simin You, Le Gruenwald. 142-147 [doi]
- Optimising Bootstrapping Algorithms Using R and HadoopShicai Wang, Mihaela A. Mares, Yike Guo. 148-154 [doi]