Abstract is missing.
- User Perceptions of Internet of Things (IoT) SystemsAnastasios A. Economides. 3-20 [doi]
- Multipath Forwarding in Named Data Networking: Flow, Fairness, and Context-AwarenessBouacherine Abdelkader, Mustapha Réda Senouci, Billal Merabti. 23-47 [doi]
- Towards Understanding the Role of Execution Context for Observing Malicious Behavior in Android MalwareCatherine Boileau, François Gagnon, Jérémie Poisson, Simon Frenette, Mohamed Mejri. 48-71 [doi]
- Security Framework for Adopting Mobile Applications in Small and Medium EnterprisesBasel Hasan, Jorge Marx Gómez. 75-98 [doi]
- BPMN4V for Modeling and Handling Versions of BPMN Collaborations and ChoreographiesImen Ben Said, Mohamed Amine Chaâbane, Eric Andonoff, Rafik Bouaziz. 99-123 [doi]
- Content Protection Scheme to Realize Edit Control Including Diversion Control and Composition ControlTatsuya Fujimoto, Keiichi Iwamura, Masaki Inamura. 124-138 [doi]
- Product Service System Design and Implementation in a Customer Centric World - An Approach to a User Oriented PSS FrameworkAlexander Richter, Rebecca Bulander, Bernhard Kölmel, Johanna Schoblik. 139-157 [doi]
- Mode Excitation and Multiplexing for MIMO Systems Focusing on Digital Mirror DevicesAndré Sandmann, Andreas Ahrens, Steffen Lochmann, Peter Bartmann. 161-176 [doi]
- Hardware Implementation of HS1-SIVSergei Volokitin, Gerben Geltink. 179-194 [doi]
- Runtime Classification of Mobile Malware for Resource-Constrained DevicesJelena Milosevic, Miroslaw Malek, Alberto Ferrante. 195-215 [doi]
- Towards Realising Oblivious VotingDirk Achenbach, Anne Borcherding, Bernhard Löwe, Jörn Müller-Quade, Jochen Rill. 216-240 [doi]
- A Methodology for Silent and Continuous Authentication in Mobile EnvironmentGerardo Canfora, Paolo Di Notte, Francesco Mercaldo, Corrado Aaron Visaggio. 241-265 [doi]
- A Javascript Voting Client for Remote Online VotingJordi Cucurull, Sandra Guasch, David Galindo. 266-290 [doi]
- Attribute-Based Privacy-Friendly Access Control with ContextAndreas Put, Bart De Decker. 291-315 [doi]
- Protecting Smartphone Users' Private Locations Through CachingAsma Patel, Esther Palomar. 316-337 [doi]
- Investigation into the Use of WFSTs and DNNs for Speech Activity Detection in Broadcast Data TranscriptionLukás Mateju, Petr Cerva, Jindrich Zdánský. 341-358 [doi]
- Boundless Reconstruction Using Regularized 3D FusionM. A. A. Rajput, Eugen Funk, Anko Börner, Olaf Hellwich. 359-378 [doi]
- Social-DBSCAN: A Presence Analytics Approach for Mobile Users' Social ClusteringMuawya Habib Sarnoub Eldaw, Mark Levene, George Roussos. 381-400 [doi]
- Tracking Down High Interference and Low Coverage in 3G/4G Radio Networks Using Automatic RF Measurement ExtractionMarco Sousa, André Martins, Pedro Vieira 0001. 401-425 [doi]
- On the Use of Load Balancing for Saving Capacity in Dual Layer 3G Radio Access NetworksTiago Pedro, André Martins, António Rodrigues, Pedro Vieira 0001. 426-449 [doi]
- Coverage Range Analysis and Performance Evaluation of Wireless Technologies in Industrial Channel ConditionsArmin Wulf, Lisa Underberg, Ramona Croonenbroeck, Rüdiger Kays. 450-473 [doi]