Abstract is missing.
- The Design of Video Door Phone and Control System for Home Secure ApplicationsChing-Lung Chang, Han-Yu Tsai. 1-5 [doi]
- Reversability Assessment on Secure USB MemoriesKyungroul Lee, Sitha Pho, Kangbin Yim. 6-8 [doi]
- Keyboard Security: A Technological ReviewKyungroul Lee, Kangbin Yim. 9-15 [doi]
- Architecture to Support Heterogeneous Devices for Video Surveillance SystemMohammad A. Mikki, Kyungroul Lee, Wansoo Kim, Kangbin Yim. 16-19 [doi]
- An Online Migration Environment for Executing Mobile Applications on the CloudShih-Hao Hung, Chi-Sheng Shih, Jeng-Peng Shieh, Chen-Pang Lee, Yi-Hsiang Huang. 20-27 [doi]
- A Heuristic Approach for Scalability of Multi-tiers Web Application in CloudsRuiqing Chi, Zhuzhong Qian, Sanglu Lu. 28-35 [doi]
- Performability Analysis of IaaS CloudJi-Ho Kim, Sang Min Lee, Dong Seong Kim, Jong Sou Park. 36-43 [doi]
- Towards Multi-criteria Cloud Service SelectionZia ur Rehman, Farookh Khadeer Hussain, Omar Khadeer Hussain. 44-48 [doi]
- An IP Passing Protocol for Vehicular Ad Hoc Networks with Network FragmentationsYuh-Shyan Chen, Chih-Shun Hsu, Wei-Han Yi. 49-56 [doi]
- NTC: Towards Efficient Network Coding in Delay Tolerant NetworksBaoKang Zhao, Ziming Song, Jinshu Su, Wei Peng, Qiaolin Hu. 57-64 [doi]
- Contexts-Management Strategy in Considering the Security in Urban Computing Based on Urban DesignHoon Ko, Goreti Marreiros, Kyung-jin An, Zita Vale, Tai-Hoon Kim, Jong-Myoung Choi. 65-72 [doi]
- Efficient Object Localization for Query-by-SubregionYong-Hwan Lee, Bonam Kim, Heung-Jun Kim. 73-77 [doi]
- Short-Term Prediction-Based Optimistic Object Tracking Strategy in Wireless Sensor NetworksJenq-Muh Hsu, Chao-Chun Chen, Chia Chi Li. 78-85 [doi]
- Adaptive DDoS Detector Design Using Fast Entropy Computation MethodGiseop No, Ilkyeun Ra. 86-93 [doi]
- A Resource Perspective to Wireless Sensor Network SecurityVenkatesh Kannan, Sahena Ahmed. 94-99 [doi]
- ACSP: A Novel Security Protocol against Counting Attack for UHF RFID SystemsCe Chen, Zhuzhong Qian, Ilsun You, Jue Hong, Sanglu Lu. 100-105 [doi]
- Variated Availability Approach to the Services Manageable DeliveringNatalia Kryvinska, Christine Strauss, Peter Zinterhof. 106-113 [doi]
- A Formal Model for Dynamic Service Updates in Pervasive ComputingSiqi Du, Linpeng Huang, Jun-Qing Chen. 114-119 [doi]
- An Effective Deadlock Prevention Mechanism for Distributed Transaction ManagementLin Lou, Feilong Tang, Ilsun You, Minyi Guo, Yao Shen, Li Li. 120-127 [doi]
- A Case for Real-World Smart Environments: The Development of a Remote Autonomous Energy Aware Monitoring System Using Next Generation TechnologiesNicholas McLauchlan, Nik Bessis. 128-135 [doi]
- Memoxo - Browser-Based Prototype for the Audio/Video Messages RecordingMarkus Hockner, Rudolf Hartjes, Christine Strauss, Natalia Kryvinska. 136-142 [doi]
- Task Optimization Based on CPU Pipeline Technique in Multicore SystemBo Wang, Yongwei Wu, Weimin Zheng. 143-150 [doi]
- Display Verification IP Core Design Based on Star-Extraction and Star-Recognition Image Processing on FPGALinyang Sheng, Jingbo Shao, Min Xu, Yuanquan Cui. 151-155 [doi]
- Trying Linear Network Coding on a Network Flow ProcessorPeng Cao, Long Zheng, Yanchao Lu, Feilong Tang, Ilsun You, Minyi Guo. 156-163 [doi]
- A Formalization of an Emulation Based Co-designed Virtual MachineWei Chen 0009, Weixia Xu, Zhiying Wang, Qiang Dou, Yongwen Wang, BaoKang Zhao, Baosheng Wang. 164-168 [doi]
- Secure Information Management Protocol Based on Linguistic Sharing TechniquesMarek R. Ogiela, Urszula Ogiela. 169-174 [doi]
- Combining Static and Dynamic Analysis to Discover Software VulnerabilitiesRuoyu Zhang, Shiqiu Huang, Zhengwei Qi, Haibing Guan. 175-181 [doi]
- Semantic Analysis Processes in UBIAS Systems for Cognitive Data InterpretationLidia Ogiela, Marek R. Ogiela. 182-185 [doi]
- Information Retrieval Techniques to Grasp User Intention in Pervasive Computing EnvironmentMyunggwon Hwang, PanKoo Kim, Dongjin Choi. 186-191 [doi]
- Improvements on Sequential Minimal Optimization Algorithm for Support Vector Machine Based on Semi-sparse AlgorithmXiaopeng Yang, Hu Guan, Feilong Tang, Ilsun You, Minyi Guo, Yao Shen. 192-199 [doi]
- Universal, Fast Method for iPad Forensics Imaging via USB AdapterLuis Gomez-Miralles, Joan Arnedo-Moreno. 200-207 [doi]
- Trust-Driven Policy Enforcement through Gate AutomataGabriele Costa, Ilaria Matteucci. 208-215 [doi]
- DDoS Attacks Detection Using GA Based Optimized Traffic MatrixJe Hak Lee, Dong Seong Kim, Sang Min Lee, Jong Sou Park. 216-220 [doi]
- Novel Multi-bit and Multi-image Steganography Using Adaptive Embedding Algorithms with Minimum ErrorRong-Jian Chen, Jui-Lin Lai, Shi-Jinn Horng. 221-228 [doi]
- Buildings and Crowds: Forming Smart Cities for More Effective Disaster ManagementEleana Asimakopoulou, Nik Bessis. 229-234 [doi]
- Ubiquitous Computing and Distributed Agent-Based SimulationBart G. W. Craenen, Georgios K. Theodoropoulos. 241-247 [doi]
- A PCA-based Approach to Modeling Location Update and Paging for Location Area PlanningJingbo Sun, Yue Wang, Jian Yuan, Xiuming Shan. 248-252 [doi]
- Circuit Emulation Services over SCTPShiwei Hu, Minyi Guo, Feilong Tang, Jingyu Zhou, Yao Shen. 253-257 [doi]
- Channel Allocation for a Single Cell Cognitive Radio Network Using Genetic AlgorithmSubhasree Bhattacharjee, Amit Konar, Atulya K. Nagar. 258-264 [doi]
- A Proposal of an Application of Life Log to Remote ConsultationYuya Uesugi, Tasuku Yamamoto, Jun Sawamoto, Norihisa Segawa, Eiji Sugino, Takuto Goto, Hiroshi Yajima. 265-270 [doi]
- Effect of Sink Location on Aggregation Based on Degree of Connectivity for Wireless Sensor NetworksDavid Fotue, Foued Melakessou, Houda Labiod, Thomas Engel. 271-276 [doi]
- Extending Wireless Sensor Network Lifetime in the LEACH-SM Protocol by Spare SelectionBilal Abu Bakr, Leszek Lilien. 277-282 [doi]
- A Game-Theoretic Resource Allocation Algorithm Based on Utility in IEEE 802.11eYishan Li, Yuhong Li, Tao Li. 283-288 [doi]
- Modeling and Analysis of Cloud Computing Availability Based on Eucalyptus Platform for E-Government Data CenterSok Chuob, Manish Pokharel, Jong Sou Park. 289-296 [doi]
- Personalized Information Recommendataion Using Hybrid CBR and CSP in a Ubiquitous Computing EnvironmentMye M. Sohn, Hyunwoo Kim, Hyun Jung Lee. 297-303 [doi]
- A Novel Mobility Management Mechanism Based on Destination Address Overwritten and ID/Locator SeparationYunjing Hou, Yuhong Li, Liang Yu. 304-309 [doi]
- Secure Mobility Management Scheme for 6LoWPAN ID/Locator Split ArchitectureAntonio J. Jara, Leandro Marin, Antonio F. Gómez-Skarmeta, Dhananjay Singh, Gohel Bakul, Daeyeoul Kim. 310-315 [doi]
- Cost-Optimal Validation Mechanisms and Cheat-Detection for Crowdsourcing PlatformsMatthias Hirth, Tobias Hoßfeld, Phuoc Tran-Gia. 316-321 [doi]
- Anatomy of a Crowdsourcing Platform - Using the Example of Microworkers.comMatthias Hirth, Tobias Hoßfeld, Phuoc Tran-Gia. 322-329 [doi]
- An Evaluation of QoE in Cloud Gaming Based on Subjective TestsMichael Jarschel, Daniel Schlosser, Sven Scheuring, Tobias Hoßfeld. 330-335 [doi]
- Functional Composition and Its ChallengesAbbas Ali Siddiqui, Rahamatullah Khondoker, Bernd Reuther, Paul Müller, Christian Henke, Helge Backhaus. 336-340 [doi]
- Secure Code Dissemination Using Energy-Efficient Minimal Virtual Backbone in Sensor NetworksJisun Kim, Jiyoung Lim, Kijoon Chae. 341-346 [doi]
- Self-Similar Properties of SpamJong-Suk R. Lee, Hae-Duck J. Jeong, Donald C. McNickle, Krzysztof Pawlikowski. 347-352 [doi]
- DAD-Less MIPv6 for Reduced Handover LatencyYu-xuan Hong, Krzysztof Pawlikowski, Harsha Sirisena. 353-360 [doi]
- CoLib: Client Library for Effective Development of WebDAV-based Collaborative ApplicationHong-Chang Lee, Bo-Hyeon Kim, Myung-Joon Lee. 361-365 [doi]
- Gregex: GPU Based High Speed Regular Expression Matching EngineLei Wang, Shuhui Chen, Yong Tang, Jinshu Su. 366-370 [doi]
- A Network Security Evaluation Method Framework Based on Multiple Criteria Decision Making TheoryJinjing Zhao, Yan Wen, Dongxia Wang. 371-375 [doi]
- A Framework of Network Security Situation Analysis Based on the Technologies of Event Correlation and Situation AssessmentXuewei Feng, Dongxia Wang, Shanwen Ke, Guoqing Ma, Jin Li. 376-380 [doi]
- Energy Optimal Selection of Access Points in Wireless Sensor NetworksQin Xin, Xiaolan Yao, Wei He. 381-387 [doi]
- Building Practical Self Organization Networks on Heterogeneous Wireless ModemsZhu Tang, Bo Liu, BaoKang Zhao, Wanrong Yu, Chunqing Wu, Wei Peng, Bing Bai, Yanpeng Ma. 388-393 [doi]
- Snail Crawling: An Enhanced Method for DTNs RoutingBing Bai, Jinshu Su, BaoKang Zhao, Wanrong Yu, Ling Wen. 394-397 [doi]
- Towards Practical IPSec over Challenged NetworksJing Tao, Baosheng Wang. 398-402 [doi]
- Aquarius: A Tiny Hypervisor to Introspect Commodity OSes in a Non-bypassable WayYan Wen, Jinjing Zhao, Minhuan Huang, Hua Chen. 403-407 [doi]
- Performance of Energy Efficient Relay and Minimum Distance Clustering for Wireless Sensor NetworksYung-Fa Huang, Hsing-Chung Chen, Li-Ming Wang, Jhao-Wei Guo. 408-413 [doi]
- Impact of Broadcasting Directions in SDLS for Wireless Sensor NetworksChia-Hsin Cheng, Hsinying Liang, Yung-Fa Huang, Tian-Yue Wu. 414-419 [doi]
- A Role-Oriented Routing Algorithm Applied for Wireless Heterogeneous NetworksHsing-Chung Chen, Kanoksak Wattanachote. 420-423 [doi]
- TOA Estimation with DLC Receivers for IEEE 802.15.4a UWB SystemsHsi-Chou Hsu, Jyh-Horng Wen, Chia-Hsin Cheng, Yi-Shiang Chen, Tian-Yue Wu. 424-428 [doi]
- A Generalized Associated Temporal and Spatial Role-Based Access Control Model for Wireless Heterogeneous NetworksHsing-Chung Chen, Yung-Fa Huang, Syuan-Zong Lin. 429-433 [doi]
- A Minimal Fuzzy Gain Scheduling Speed Controller and Torque Compensation for the Variable Sampling System of BLDC MotorsChun-Wen Hung, Jhih-Han Chen, Hsuan T. Chang. 434-437 [doi]
- A Fuzzy-Based Reliability System for JXTA-Overlay P2P PlatformKouhei Umezaki, Evjola Spaho, Yuichi Ogata, Hironori Ando, Leonard Barolli, Fatos Xhafa. 438-443 [doi]
- SaMob: A Social Attributes Based Mobility Model for Ad Hoc NetworksJingxin Wang, Jian Yuan, Xiuming Shan, Zhenming Feng, Junwei Geng, Ilsun You. 444-449 [doi]
- NAVOPT: Navigator Assisted Vehicular Route OPTimizerWooseong Kim, Mario Gerla. 450-455 [doi]
- A Secure and Location Assurance Protocol for Location-Aware Services in VANETsYoungho Park, Kyung Hyune Rhee, Chul Sur. 456-461 [doi]
- Analysis of Optimal Query, Fairness and Replication for DHT-based Mobility ManagementYujia Zhai, Yue Wang, Jian Yuan, Yong Ren, Xiuming Shan, Ilsun You. 462-469 [doi]
- Joint Uplink/Downlink Connection Admission Control in WLAN/Cellular Integrated SystemsHyung-Taig Lim, Younghyun Kim, Sangheon Pack, Chul-Hee Kang. 470-474 [doi]
- PMIPv6-based Flow Mobility Simulation in NS-3Hyon-Young Choi, Sung-Gi Min, Youn-Hee Han. 475-480 [doi]
- Mobility Management Research of Internet Based on the Splitting MechanismHuachun Zhou, Fei Song, Hongke Zhang. 481-486 [doi]
- Enhance IPv6 Dynamic Host Configuration with Cryptographically Generated AddressesSean Shen, Xiaodong Lee, Zhili Sun, Sheng Jiang. 487-490 [doi]
- Mobility Modeling and Security Validation of a Mobility Management Scheme Based on ECC for IP-based Wireless Sensor Networks (6LoWPAN)Antonio J. Jara, Leandro Marin, Antonio F. Gómez-Skarmeta, Dhananjay Singh, Gohel Bakul, Daeyeoul Kim. 491-496 [doi]
- Analysis of Multi-path Random Key Pre-distribution for Wireless Sensor NetworksChun-Wei Tsai, Wei-Shuo Li, Min Chen, Wen-Shyong Hsieh, Chu-Sing Yang. 497-502 [doi]
- E-mail-Based Covert Channels for Asynchronous Message SteganographyAniello Castiglione, Alfredo De Santis, Ugo Fiore, Francesco Palmieri. 503-508 [doi]
- Improvement of Strong Designated Verifier SignaturesFuw-Yi Yang, Ling-Ren Liang, Su-Hui Chiu. 509-513 [doi]
- Identity-Based Concurrent Signature Scheme with Improved AccountabilityChih-Hung Wang, Chao Chuan Chen. 514-519 [doi]
- SECR3T: Secure End-to-End Communication over 3G Telecommunication NetworksAniello Castiglione, Giuseppe Cattaneo, Giancarlo De Maio, Fabio Petagna. 520-526 [doi]
- Integrating Security Considerations in Client Server Architectures of Health Information Systems DevelopmentChih-Cheng Lien, Chang-Wu Liu, Yi-An Chen. 527-531 [doi]
- A Novel Stream Cipher with Hash Function for the RFID DeviceSung-Shiou Shen, Horng-Ru Liao, Shen-Ho Lin, Jung-Hui Chiu. 532-536 [doi]
- Use Double Check Priority Queue to Alleviate Malicious Packet Flows from Distributed DoS AttacksChu-Hsing Lin, Jung-Chun Liu, Guan-Han Chen, Ying-Hsuan Chen, Chien-Hua Huang. 537-542 [doi]
- A Study on Digital Forensics Standard Operation Procedure for Wireless CybercrimeI-Long Lin, Yun-Sheng Yen, Annie Chang. 543-548 [doi]
- A TOA Based Location Estimation Incorporating the Reliability InformationChin-Tseng Huang, Hwa-Lu Jhi, Ru-Chi Ni. 549-554 [doi]
- An Improvement of Chen Et al. s Scheme for Mobile Pay-TVChin-Ling Chen, Yu-Fan Lin, Fang-Yie Leu. 555-560 [doi]
- Constructing a Private Cloud for Government IT Services Consolidation: Taiwan s ExperenceChi-Fu Hung, Chiu-Ching Tuan, Yu-Chi Chu. 561-566 [doi]
- The Use of Cloud Speech Recognition Technology in Vehicle Diagnosis ApplicationsShi-Huang Chen, Jun-Yu Chen, Kuo-Yuan Lu. 567-570 [doi]
- A Location-Based Handoff Scheme Based on IEEE 802.21 in Heterogeneous Wireless NetworksFang-Yie Leu, Kuo-Chi Liang. 571-576 [doi]
- A Semi-preemptive Ad Hoc Computational Service System with Limited ResourcesFang-Yie Leu, Keng-Yen Chao. 577-582 [doi]
- Maximizing Throughput for Delay-Constraint Transmissions with Smart Antenna Systems in WLANsLi-Ling Hung, Sheng-Han Wu, Chao-Tsun Chang. 583-588 [doi]
- An AC LED Smart Lighting System with Visible Light Time-Division Multiplexing Free Space Optical CommunicationFenq-Lin Jenq, Tang-Jen Liu, Fang-Yie Leu. 589-593 [doi]
- Time Estimation of Cheon s Algorithm over Elliptic Curves on Finite Fields with Characteristic 3Tetsuya Izu, Masahiko Takenaka, Masaya Yasuda. 594-596 [doi]
- Identity Continuance in Single Sign-On with Authentication Server FailureYoshio Kakizaki, Maeda Kazunari, Keiichi Iwamura. 597-602 [doi]
- A Multiplicative Extension for Discrete Logarithms on Ordinary Pairing-Friendly Curves of Embedding DegreeYasuyuki Nogami, Erika Yanagi, Taichi Sumo, Tomoko Matsushima, Satoshi Uehara. 603-606 [doi]
- Design and Implementation of a Forced Encryption Kernel ModuleJun Furukawa, Akihiro Sakai, Takashi Nishide, Yoshiaki Hori, Kouichi Sakurai. 607-611 [doi]
- Identifier Migration in OpenIDMaeda Kazunari, Yoshio Kakizaki, Keiichi Iwamura. 612-617 [doi]
- Rho Method with Period k on Non - symmetric Ordinary Pairings of Embedding Degree k - Especially for Barreto - Naehrig CurvesYasuyuki Nogami, Yusuke Takai, Tomoko Matsushima, Satoshi Uehara. 618-621 [doi]
- Distributed Collaborative Filtering Protocol Based on Quasi-homomorphic SimilarityHiroaki Kikuchi, Yoshiki Aoki, Masayuki Terada, Kazuhiko Ishii, Kimihiko Sekino. 622-627 [doi]
- 32-bit as Number Based IP TracebackMasayuki Okada, Yasuharu Katsuno, Akira Kanaoka, Eiji Okamoto. 628-633 [doi]
- Optimal Constructions of Visual Secret Sharing Schemes for the Graph Access StructureYuji Suga. 634-638 [doi]
- Traceback Framework against Botmaster by Sharing Network Communication Pattern InformationSeiichiro Mizoguchi, Keisuke Takemori, Yutaka Miyake, Yoshiaki Hori, Kouichi Sakurai. 639-644 [doi]