Abstract is missing.
- Reducing Keepalive Traffic in Software-Defined Mobile Networks with Port Control ProtocolKamil Burda, Martin Nagy, Ivan Kotuliak. 3-12 [doi]
- A SDN Based Method of TCP Connection HandoverAndrej Binder, Tomas Boros, Ivan Kotuliak. 13-19 [doi]
- IP Data Delivery in HBB-Next Network ArchitectureRoman Bronis, Ivan Kotuliak, Tomas Kovacik, Peter Truchly, Andrej Binder. 20-29 [doi]
- Syn Flood Attack Detection and Type Distinguishing Mechanism Based on Counting Bloom FilterTomás Halagan, Tomas Kovacik, Peter Trúchly, Andrej Binder. 30-39 [doi]
- Integrating Mobile OpenFlow Based Network Architecture with Legacy InfrastructureMartin Nagy, Ivan Kotuliak, Jan Skalny, Martin Kalcok, Tibor Hirjak. 40-49 [doi]
- Making Computer Science Education RelevantMichael Weigend. 53-63 [doi]
- Analyzing Brain Waves for Activity Recognition of LearnersHiromichi Abe, Kazuya Kinoshita, Kensuke Baba, Shigeru Takano, Kazuaki Murakami. 64-73 [doi]
- A Multi-factor Biometric Based Remote Authentication Using Fuzzy Commitment and Non-invertible TransformationThi Ai Thao Nguyen, Dinh Thanh Nguyen, Tran Khanh Dang. 77-88 [doi]
- Profiler for Smartphone Users Interests Using Modified Hierarchical Agglomerative Clustering Algorithm Based on Browsing HistoryPriagung Khusumanegara, Rischan Mafrur, Deokjai Choi. 89-96 [doi]
- Strength of Relationship Between Multi-labeled Data and LabelsMasahiro Kuzunishi, Tetsuya Furukawa. 99-108 [doi]
- Online Ad-fraud in Search Engine Advertising Campaigns - Prevention, Detection and Damage LimitationAndreas Mladenow, Niina Maarit Novak, Christine Strauss. 109-118 [doi]
- Markov Chain Solution to the 3-Tower ProblemGuido David. 121-128 [doi]
- Fitness Function in ABC Algorithm for Uncapacitated Facility Location ProblemYusuke Watanabe, Mayumi Takaya, Akihiro Yamamura. 129-138 [doi]
- Comparative Study of Monte-Carlo Tree Search and Alpha-Beta Pruning in AmazonsHikari Kato, Szilárd Zsolt Fazekas, Mayumi Takaya, Akihiro Yamamura. 139-148 [doi]
- Can We Securely Use CBC Mode in TLS1.0?Takashi Kurokawa, Ryo Nojima, Shiho Moriai. 151-160 [doi]
- Key Agreement with Modified Batch Rekeying for Distributed Group in Cognitive Radio NetworksN. Renugadevi, C. Mala. 161-172 [doi]
- Secure Mobility Management for MIPv6 with Identity-Based CryptographyNan Guo, Fangting Peng, Tian-han Gao. 173-178 [doi]
- Investigation of DDoS Attacks by Hybrid SimulationYana Bekeneva, Konstantin Borisenko, Andrey Shorov, Igor V. Kotenko. 179-189 [doi]
- Secure Database Using Order-Preserving Encryption Scheme Based on Arithmetic Coding and Noise FunctionSergey Krendelev, Mikhail Yakovlev, Maria Usoltseva. 193-202 [doi]
- An Approach for Evaluating Softgoals Using WeightShuichiro Yamamoto. 203-212 [doi]
- An Efficient Unsavory Data Detection Method for Internet Big DataPeige Ren, Xiaofeng Wang, Hao Sun, Fen Xu, BaoKang Zhao, Chunqing Wu. 213-220 [doi]
- Identification of Corrupted Cloud Storage in Batch Auditing for Multi-Cloud EnvironmentsSooyeon Shin, Seungyeon Kim, Taekyoung Kwon. 221-225 [doi]
- Face Recognition Performance Comparison Between Real Faces and Pose Variant Face Images from Image Display DeviceMi-Young Cho, Young-Sook Jeong. 229-234 [doi]
- A Lossless Data Hiding Strategy Based on Two-Dimensional Side-Match PredictionsChi-Yao Weng, Sheng-Jie Wang, Shiuh-Jeng Wang. 235-242 [doi]
- Secure Image Deduplication in Cloud StorageHan Gang, Hongyang Yan, Lingling Xu. 243-251 [doi]
- Hybrid Encryption Scheme Using Terminal Fingerprint and Its Application to Attribute-Based Encryption Without Key MisuseChunlu Chen, Hiroaki Anada, Junpei Kawamoto, Kouichi Sakurai. 255-264 [doi]
- Differential Fault Attack on LEADirmanto Jap, Jakub Breier. 265-274 [doi]
- A Secure Multicast Key Agreement SchemeHsing-Chung Chen, Chung-Wei Chen. 275-281 [doi]
- Efficient Almost Strongly Universal Hash Function for Quantum Key Distribution - Extended AbstractBo Liu, BaoKang Zhao, Chunqing Wu, Wanrong Yu, Ilsun You. 282-285 [doi]
- DCODE: A Distributed Column-Oriented Database Engine for Big Data AnalyticsYanchen Liu, Fang Cao, Masood Mortazavi, Mengmeng Chen, Ning Yan, Chi Ku, Aniket Adnaik, Stephen Morgan, Guangyu Shi, Yuhu Wang, Fan Fang. 289-299 [doi]
- Incorporating Big Data Analytics into Enterprise Information SystemsZhaohao Sun, Francisca Pambel, Fangwei Wang. 300-309 [doi]
- Analytical Platform Based on Jbowl Library Providing Text-Mining Services in Distributed EnvironmentMartin Sarnovsky, Peter Butka, Peter Bednár, Frantisek Babic, Jan Paralic. 310-319 [doi]
- Corporate Social Responsibility in Social Media EnvironmentAntonin Pavlicek, Petr Doucek. 323-332 [doi]
- Usage of Finance Information Systems in Developing Countries: Identifying Factors During Implementation that Impact UseDavid Kiwana, Björn Johansson, Sven Carlsson. 333-342 [doi]
- Software Model Creation with Multidimensional UMLLukás Gregorovic, Ivan Polásek, Branislav Sobota. 343-352 [doi]