Abstract is missing.
- The 4W (What-Where-When-Who) Project Goes SocialMauro Migliardi, Marco Gaudina. 1-8 [doi]
- Exploring Urban Dynamics Based on Pervasive Sensing: Correlation Analysis of Traffic Density and Air QualityWenzhu Zhang, Bing Zhu, Lin Zhang, Jian Yuan, Ilsun You. 9-16 [doi]
- A Privacy Preserving Model for Personal Information in Search EngineEun-Ae Cho, Kyungroul Lee, Kangbin Yim. 17-21 [doi]
- A Novel Search System for Protecting Search WordKyungroul Lee, Eun-Ae Cho, Kangbin Yim. 22-28 [doi]
- A Service Oriented Analysis Environment for Neuroimaging StudiesAshiq Anjum, Nik Bessis, Richard McClatchey, Kamran Munir, Irfan Habib, Andrew Branson, Jetendr Shamdasani. 29-36 [doi]
- Context-Awareness for IPTV Services PersonalizationMarek Dabrowski, Justyna Gromada, Hassnaa Moustafa. 37-44 [doi]
- Collaborative Decision-Making Framework for Supporting Multi-mobile Decision-Makers Using OntologyHyun Jung Lee, Mye M. Sohn. 45-51 [doi]
- Neural Network Approach for Identification of Selected Brain Perfusion AbnormalitiesTomasz Hachaj, Marek R. Ogiela. 52-57 [doi]
- Cognitive Applications for Semantic and Cognitive Data AnalysisLidia Ogiela, Dorota Srebrny. 58-63 [doi]
- Cognitive Analysis Systems for 3D Image Data InterpretationLidia Ogiela, Marek R. Ogiela. 64-68 [doi]
- Data Aggregation Techniques in Heart Vessel Modelling and Recognition of Pathological ChangesMiroslaw Trzupek, Marek R. Ogiela. 69-72 [doi]
- A New Identity-Based Group Signature Scheme Based on Knapsack ECCSazia Parvin, Song Han, Zia ur Rehman, Mohammad Abdullah Al Faruque, Farookh Khadeer Hussain. 73-80 [doi]
- An Efficient Identity-Based Strong Designated Verifier Signature without DelegatabilityHaibo Tian, Xiaofeng Chen 0001, Fangguo Zhang, Baodian Wei, Zhengtao Jiang, Yi Liu. 81-88 [doi]
- A New Iterative Learning Control Scheme Based on Damped Newton Method for Nonlinear SystemsYu Han, Kangbin Yim, Xiaochen Lai, Guangwei Xu, Hui Liu, Xilan Wang. 89-92 [doi]
- An Access Control Mechanism for Remote Control of Home Security SystemSeung-Hyun Seo, Taenam Cho. 93-98 [doi]
- Biological Modelling in Semantic Data Analysis SystemsLidia Ogiela. 99-102 [doi]
- Similarity Measurement between Objects and Activities for User Intention ModelingMyunggwon Hwang, Sa-Kwang Song, Do-Heon Jeong, Hanmin Jung, Jinhyung Kim. 103-107 [doi]
- Random Graph Languages for Distorted and Ambiguous Patterns: Single Layer ModelMarek R. Ogiela, Marcin Piekarczyk. 108-113 [doi]
- The Forensic Analysis of a False Digital AlibiAniello Castiglione, Giuseppe Cattaneo, Giancarlo De Maio, Alfredo De Santis, Gerardo Costabile, Mattia Epifani. 114-121 [doi]
- A Secure Secondary Backup Storage with an Isolated AuthenticationKwangjin Bae, Ilsun You, Kangbin Yim, Taeho Son. 122-125 [doi]
- Analysis on Maliciousness for Mobile ApplicationsSeung-Hyun Seo, Dong-Guen Lee, Kangbin Yim. 126-129 [doi]
- A Slow Intelligent Approach for the Improvement of Intrusion Detection and Prevention SystemFrancesco Colace, Massimo De Santo, Salvatore Ferrandino. 130-137 [doi]
- Threshold-Based Energy-Efficient Data Transmission Policy for Mobile DevicesSung-Hwa Lim, Jungsup Oh, Byoung-Hoon Lee, Mye Sohn. 138-142 [doi]
- Delegation-Based Mutual Authentication Scheme for Multi-operator Wireless Mesh NetworkTian-han Gao, Nan Guo, Kangbin Yim. 143-147 [doi]
- Towards a Context-Aware and Adaptable Room System for Intelligent "Trusted" Office-Spaces in Smart CitiesTim French, Nik Bessis. 148-154 [doi]
- Participatory Sensing in Environmental Monitoring - ExperiencesVille Kotovirta, Timo Toivanen, Renne Tergujeff, Markku Huttunen. 155-162 [doi]
- Characterization of Vision-Aided Indoor Localization and Landmark RoutingAaron Ballew, Shiva Srivastava, Nikolay Valtchanov, Chung-Chieh Lee, Aleksandar Kuzmanovic. 163-170 [doi]
- Document Classification through Building Specified N-GramByeong-Kyu Ko, Dongjin Choi, Chang Choi, Junho Choi, PanKoo Kim. 171-176 [doi]
- A Comparison between Single and Additive Contribution in RFID Reader-to-Reader Interference ModelsLinchao Zhang, Renato Ferrero, Filippo Gandino, Maurizio Rebaudengo. 177-184 [doi]
- Performance Analysis of Reliable Transmission on Multiple Paths and Single PathFei Song, Huachun Zhou, Sidong Zhang, Hongke Zhang, Ilsun You. 185-190 [doi]
- Application-Aware Virtual Machine Placement in Data CentersFei Song, Daochao Huang, Huachun Zhou, Ilsun You. 191-196 [doi]
- Transient Fault Tolerance for ccNUMA ArchitectureXingjun Zhang, Endong Wang, Feilong Tang, Meishun Yang, Hengyi Wei, Xiaoshe Dong. 197-202 [doi]
- Fuzzy Fault Tree Based Fault DetectionYuening Kang, Xingjun Zhang, Nan Wu, Weiguo Wu, Xiaoshe Dong. 203-207 [doi]
- An Analysis of Strategies for Preventing Selfish Behavior in Mobile Delay Tolerant NetworksJingwei Miao, Omar Hasan, Sonia Ben Mokhtar, Lionel Brunie, Kangbin Yim. 208-215 [doi]
- ILSRO: Identifier/Location Split-Based Route Optimization for PMIPv6Jianfeng Guan, Changqiao Xu, Kai Wang, Huachun Zhou, Hongke Zhang. 216-223 [doi]
- Extending Mesh Networks to Opportunistic Resource SharingJeremy A. Hansen. 224-230 [doi]
- Impacts of Internal Network Contexts on Performance of MANET Routing Protocols: A Case StudyLongteng Yi, Yujia Zhai, Yue Wang, Jian Yuan, Ilsun You. 231-236 [doi]
- A Terrain-Awareness Based Mobility Model with Markov Random Disturbance for Tactical MANETBowen Deng, Yujia Zhai, Yue Wang, Jinhai Huo, Jian Yuan, Ilsun You. 237-243 [doi]
- Improved AODV Routing Protocol to Cope with High Overhead in High Mobility MANETsMohannad Ayash, Mohammad A. Mikki, Kangbin Yim. 244-251 [doi]
- A Resource-Aware Pairing Device Framework for Ubiquitous Cloud ApplicationsLiang (Ben) Chen, Maria Prokopi. 252-258 [doi]
- Lazy Monitoring for Distributed Computing EnvironmentsGiulio Caravagna, Gabriele Costa, Luca Wiegand, Giovanni Pardini. 259-265 [doi]
- Balancing Resource Utilization for Continuous Virtual Machine Requests in CloudsXin Li, Zhuzhong Qian, Ruiqing Chi, Bolei Zhang, Sanglu Lu. 266-273 [doi]
- An Efficient Distributed Mobility Management Scheme Based on PMIPv6Li Yi, Huachun Zhou, Hongke Zhang. 274-279 [doi]
- Minimizing Communication Traffic in Data Centers with Power-Aware VM PlacementBolei Zhang, Zhuzhong Qian, Wei Huang, Xin Li, Sanglu Lu. 280-285 [doi]
- A Novel Framework of Self-Adaptive Fault-Tolerant for Pervasive ComputingHaibin Cai, Chao Peng, Yue Zhang. 286-291 [doi]
- Using Dynamic Probe for Deadlock Detection in Component-Based SystemChen Li, Linpeng Huang, Luxi Chen, Weichao Luo. 292-299 [doi]
- TCP Throughput of IPv6 and IPv4 on IEEE 802.11n Wireless Client Server LAN in Windows Vista/XP - Server 2008 EnvironmentNavneet Chand, Samad Salehi Kolahi. 300-304 [doi]
- Implementation and Test of PMIPv6 Dual Stack ProtocolFei Ren, Huachun Zhou. 305-310 [doi]
- Text Interface Adaptation in Ubiquitous ApplicationsLuigi Benedicenti, Sheila Petty. 311-316 [doi]
- A Cognitive Network for Intelligent EnvironmentsQian Li, Peter Quax, Kris Luyten, Wim Lamotte. 317-322 [doi]
- Geocast Routing Protocols for VANETs: Survey and GuidelinesSalim Allal, Saadi Boudjit. 323-328 [doi]
- Future Internet in Taiwan: Design and Research Activities over TWAREN NetworkJen-Wei Hu, Wun-Yuan Huang, Hui-Min Tseng, Hui-Lan Lee, Li-Chi Ku, Shu-Cheng Lin, Te-Lung Liu, Chu-Sing Yang. 329-333 [doi]
- A Multistep Process Model for Selecting and Composing Functional Blocks in a Future Internet ArchitectureDaniel Günther, Nathan Kerr, Paul Müller. 334-339 [doi]
- A Requirement-Based Socket API for a Transition to Future Internet ArchitecturesAbbas Ali Siddiqui, Paul Müller. 340-345 [doi]
- Service Orientation Paradigm in Future Network ArchitecturesM. Rahamatullah Khondoker, Abbas Ali Siddiqui, Bernd Reuther, Paul Müller. 346-351 [doi]
- Group Key Management for Secure Mobile IPTV ServiceInshil Doh, Jiyoung Lim, Min Young Chung. 352-357 [doi]
- Passive YouTube QoE Monitoring for ISPsRaimund Schatz, Tobias Hoßfeld, Pedro Casas. 358-364 [doi]
- Design and Implementation of Location-Based SNS Smartphone Application for the Disabled PopulationArisu An, Hae-Duck Joshua Jeong, Jiyoung Lim, WooSeok Hyun. 365-370 [doi]
- Content-Based Image Retrieval Using Wavelet Spatial-Color and Gabor Normalized Texture in Multi-resolution DatabaseYong-Hwan Lee, Sang-Burm Rhee, Bonam Kim. 371-377 [doi]
- A Survey of Virtualization Technologies Focusing on Untrusted Code ExecutionYan Wen, Jinjing Zhao, Gang Zhao, Hua Chen, Dongxia Wang. 378-383 [doi]
- Edges Immunization Strategy Based on Discrete PSO in Weighted Scale-Free NetworkBing Lin, Wenzhong Guo, Guolong Chen. 384-389 [doi]
- Identify Sentiment-Objects from Chinese Sentences Based on Skip Chain Conditional Random Fields ModelMinjie Zheng, Zhicheng Lei, Yue Liu, Xiangwen Liao, Guolong Chen. 390-394 [doi]
- An Optimistic Protocol for Distributed Fair ExchangeYang Zhao, Zhiguang Qin. 395-399 [doi]
- Reversing Engineering Data Structures in Binary Programs: Overview and Case StudyXiao Xia Sun, Hua Chen, Yan Wen, Minhuan Huang. 400-404 [doi]
- Network Security Situation Element Extraction Based on Projection Pursuit RegressionBin Wen, Wenzhong Guo, Guolong Chen. 405-408 [doi]
- Research of Network Security Situation Prediction Based on Multidimensional Cloud ModelRui-Fen Wu, Guo-Long Chen. 409-414 [doi]
- The Relation on Prefix Hijacking and the Internet HierarchyJinjing Zhao, Yan Wen, Xiang Li, Wei Peng, Feng Zhao. 415-420 [doi]
- Constructing Robust Dissemination Paths in Centralized Control NetworkDan Zhao, Hongjun Liu, Xiaofeng Hu, Chunqing Wu. 421-426 [doi]
- An Analytic Goodput Model for TCP IncastZhenqian Feng, Bing Bai, BaoKang Zhao, Jinshu Su. 427-432 [doi]
- A Distribute and Geographic Information Based Routing Algorithm for LEO Satellite Constellation NetworksYanpeng Ma, Jinshu Su, Chunqing Wu, Jinshu Su, Xiaofeng Wang, Wanrong Yu, BaoKang Zhao, Xiaofeng Hu. 433-438 [doi]
- Locating Routing Instability Based on Path ExplorationHongjun Liu, Xiaofeng Hu, Dan Zhao, Xicheng Lu. 439-444 [doi]
- Secure Service and Management for Security-Critical Wireless Sensor NetworkQiang Liu, Li Liu, Xiaohui Kuang, Yan Wen. 445-449 [doi]
- Research on the Universal Platform for Aerospace Craft SimulationDong Liu, Yi Li, Weiyan Xing, Bo Wang. 450-453 [doi]
- Energy Efficient Block Division Methods for Data Aggregation in Wireless Sensor NetworksChia-Hsin Cheng, Hsinying Liang, Yung-Fa Huang, Tian-Yue Wu. 454-458 [doi]
- A Fuzzy-Based Cluster-Head Selection System for WSNs: A Comparison Study for Static and Mobile SensorsLeonard Barolli, Qi Wang, Elis Kulla, Fatos Xhafa, Bexhet Kamo, Makoto Takizawa. 459-464 [doi]
- A Low Complexity IR-UWB Receiver for Wireless Sensor NetworksHsi-Chou Hsu, Jyh-Horng Wen. 465-468 [doi]
- Performance of Adaptive Partial Interference Cancellation for Near-Far Environments in OFDMA SystemsYung-Fa Huang, Tan-Hsu Tan, Chia-Hsing Cheng. 469-474 [doi]
- A Simplified Wiener-Based SIC ICI Cancellation Scheme for OFDM Systems over Time-Varying ChannelsYung-Cheng Yao, Ying-Chih Kuo, Jyh-Horng Wen. 475-480 [doi]
- Performance Study of IEEE 802.11 DCF with Optimal Contention WindowChien-Erh Weng, Chun-Yin Chen. 481-484 [doi]
- Modified Dummy Sequence Generator for DSI on PAPR Reduction in OFDM SystemsShu-Hong Lee, Ho-Lung Hung. 485-488 [doi]
- Identifying Restricted-Faults in Multiprocessor Meshes under the PMC Diagnostic ModelTzu-Liang Kung, Cheng-Kuan Lin, Jimmy J. M. Tan, Hon-Chan Chen, Hsing-Chung Chen. 489-493 [doi]
- Cognitive RBAC in Small Heterogeneous NetworksHsing-Chung Chen, Marsha Anjanette Violetta. 494-499 [doi]
- A Method to Improve the Accuracy of the TOA Position Location Solution in Multistatic Radar SystemsJheng-Sian Li, Yung-Cheng Yao, Chun-Hung Chen, Jyh-Horng Wen. 500-505 [doi]
- Three-Party Authenticated Quantum Key Distribution Protocol with Time ConstraintHsing-Chung Chen, Syuan-Zong Lin, Tzu-Liang Kung. 506-511 [doi]
- A Novel Hybrid Approach for Web CachingRajeev Tiwari, Neeraj Kumar. 512-517 [doi]
- A Sparse Clustering Model of Wireless Communication NetworksWei-Shuo Li, Chun-Wei Tsai, Jong-Hyouk Lee, Wen-Shyong Hsieh. 518-523 [doi]
- A Cluster-Tree-Based GTS Allocation Scheme for IEEE 802.15.4 MAC LayerDer-Chen Huang, Hsiang-Wei Wu, Yi-Wei Lee. 524-528 [doi]
- Botnet Topology Reconstruction: A Case StudyMing-Yi Liao, Jynu-Hao Li, Chu-Sing Yang, Min Chen, Chun-Wei Tsai, Ming-Cho Chang. 529-534 [doi]
- Performance Analysis of Mobile Publish-Subscribe Service Discovery on IPv6 over GeoNetworkingSatoru Noguchi, Satoshi Matsuura, Kazutoshi Fujikawa. 535-540 [doi]
- Survey on Route Optimization Schemes for Proxy Mobile IPv6Jianfeng Guan, Ilsun You, Changqiao Xu, Huachun Zhou, Hongke Zhang. 541-546 [doi]
- Cloud Computing-Based Building Energy Management System with ZigBee Sensor NetworkInsung Hong, Jinsung Byun, Sehyun Park. 547-551 [doi]
- Energy-Efficiency and Security Issues in the Cisco Nexus Virtual Distributed SwitchingBenjamin Peterson, Sergio Ricciardi, Jordi Nin. 552-557 [doi]
- Large-Scale Coordinated attacks: Impact on the Cloud SecurityDamien Riquet, Gilles Grimaud, Michaël Hauspie. 558-563 [doi]
- Security of a Public CloudIrina Astrova, Stella Gatziu Grivas, Marc Schaaf, Arne Koschel, Jan Bernhardt, Mark Dennis Kellermeier, Stefan Nitz, Francisco Carriedo Scher, Michael Herr. 564-569 [doi]
- A Secure Communication over Wireless Environments by Using a Data Connection CoreKo-Chung Wei, Yi-Li Huang, Fang-Yie Leu. 570-575 [doi]
- A Novel Key Management of Two-Tier Dissemination for Wireless Sensor NetworkChin-Ling Chen, Yu-Ting Tsai, Tzay-Farn Shih. 576-579 [doi]
- ConSec: Context-Aware Security Framework for Smart SpacesSumayah Al-Rabiaah, Jalal Al-Muhtadi. 580-584 [doi]
- Copyright Protection for Images on Mobile DevicesRaffaele Pizzolante, Bruno Carpentieri. 585-590 [doi]
- The Digital Profiling Techniques Applied to the Analysis of a GPS Navigation DeviceClara Maria Colombini, Antonio Colella, Aniello Castiglione, Vincenzo Scognamiglio. 591-596 [doi]
- Freight Train monitoring: A Case-Study for the pSHIELD ProjectValentina Casola, Mariana Esposito, Nicola Mazzocca, Francesco Flammini. 597-602 [doi]
- Device Tracking in Private Networks via NAPT Log AnalysisAniello Castiglione, Alfredo De Santis, Ugo Fiore, Francesco Palmieri. 603-608 [doi]
- Experiments on Improving Sensor Pattern Noise Extraction for Source Camera IdentificationGiuseppe Cattaneo, Pompeo Faruolo, Umberto Ferraro Petrillo. 609-616 [doi]
- A Proposal of a Mobile Payment System Based on AndroidAlex Roehrs, Cristiano André da Costa, Jorge Luis Victória Barbosa. 617-622 [doi]
- Mobile Computer System with User Friendly Environment and Security ProtectionChu-Hsing Lin, Jung-Chun Liu, Wen-Chen Wu, Tsau-Wei You, Ming-Hung Liu. 623-627 [doi]
- Using ANFIS and FML for Deploying Transparent Services in Smart EnvironmentsGiovanni Acampora, Vincenzo Loia, Autilia Vitiello. 628-633 [doi]
- Security Paradigm in Ubiquitous ComputingAntonio Colella, Clara Maria Colombini. 634-638 [doi]
- Proposal of the Hierarchical File Server Groups for Implementing Mandatory Access ControlTaketoshi Sakuraba, Kouichi Sakurai. 639-644 [doi]
- Preventing the Access of Fraudulent WEB Sites by Using a Special Two-Dimensional CodeNobuyuki Teraura, Kouichi Sakurai. 645-650 [doi]
- Integrity Assurance for Real-Time Video RecordingTetsuya Izu, Masahiko Takenaka, Jun Yajima, Takashi Yoshioka. 651-655 [doi]
- Countermeasures and Tactics for Transitioning against the SSL/TLS Renegotiation VulnerabilityYuji Suga. 656-659 [doi]
- Efficient Implementation of Evaluating Multivariate Quadratic System with GPUsSatoshi Tanaka, Takashi Nishide, Kouichi Sakurai. 660-664 [doi]
- A Method for Embedding Secret Key Information in RSA Public Key and Its ApplicationMotoki Kitahara, Takashi Nishide, Kouichi Sakurai. 665-670 [doi]
- Privacy-Preserving Collaborative Filtering Using Randomized ResponseHiroaki Kikuchi, Anna Mochizuki. 671-676 [doi]
- A Proposal to Realize the Provision of Secure Android Applications - ADMS: An Application Development and Management SystemHarunobu Agematsu, Junya Kani, Kohei Nasaka, Hideaki Kawabata, Takamasa Isohara, Keisuke Takemori, Masakatsu Nishigaki. 677-682 [doi]
- Integrating Building Automation Systems and IPv6 in the Internet of ThingsMarkus Jung, Christian Reinisch, Wolfgang Kastner. 683-688 [doi]
- Demand Forecasting and Smart Devices as Building Blocks of Smart Micro GridsRené Schumann, Dominique Genoud. 689-694 [doi]
- Enabling Transparent Communication with Global ID for the Internet of ThingsSuho Jeong, Seong-Hoon Kim, Minkeun Ha, Taehong Kim, Jinyoung Yang, Nam Giang, Daeyoung Kim 0001. 695-701 [doi]
- Constrained Application Protocol for Low Power Embedded Networks: A SurveyBerta Carballido Villaverde, Dirk Pesch, Rodolfo de Paz Alberola, Szymon Fedor, Menouer Boubekeur. 702-707 [doi]
- Proposal of a REST-Based Architecture Server to Control a RobotRoger Esteller-Curto, Enric Cervera, Angel P. Del Pobil, Raúl Marín. 708-710 [doi]
- A Lightweight and Identity-Based Network Architecture for the Internet of ThingsPedro Martinez-Julia, Antonio F. Gómez-Skarmeta. 711-716 [doi]
- Facilitating Sensor Deployment, Discovery and Resource Access Using Embedded Web ServicesIsam Ishaq, Jeroen Hoebeke, Jen Rossey, Eli De Poorter, Ingrid Moerman, Piet Demeester. 717-724 [doi]
- Smart Spaces and Smart Objects Interoperability Architecture (S3OiA)Mario Vega Barbas, Diego Casado Mansilla, Miguel Ángel Valero, Diego López-de-Ipiña, José Bravo, Francisco Flórez. 725-730 [doi]
- Light-Weight Multicast DNS and DNS-SD (lmDNS-SD): IPv6-Based Resource and Service Discovery for the Web of ThingsAntonio J. Jara, Pedro Martinez-Julia, Antonio F. Gómez-Skarmeta. 731-738 [doi]
- DAAF: A Device Abstraction and Aggregation Framework for Smart EnvironmentsAlejandro Paz-Lopez, Gervasio Varela, Victor Sonora, José Antonio Becerra. 739-744 [doi]
- Anticipating Health Hazards through an Ontology-Based, IoT Domotic EnvironmentVittorio Miori, Dario Russo. 745-750 [doi]
- Moving Application Logic from the Firmware to the Cloud: Towards the Thin Server Architecture for the Internet of ThingsMatthias Kovatsch, Simon Mayer, Benedikt Ostermaier. 751-756 [doi]
- An Analysis of M2M Platforms: Challenges and Opportunities for the Internet of ThingsMiguel Castro, Antonio J. Jara, Antonio F. Gómez-Skarmeta. 757-762 [doi]
- Assessing Data Dissemination Strategies within Triple Spaces on the Web of ThingsAitor Gómez-Goiri, Diego López-de-Ipiña. 763-769 [doi]
- Implementation of the EXI Schema on Wireless Sensor Nodes Using ContikiDomenico Caputo, Luca Mainetti, Luigi Patrono, Antonio Vilei. 770-774 [doi]
- Heterogeneous Sensors Become Homogeneous Things in Smart CitiesMaria Fazio, Maurizio Paone, Antonio Puliafito, Massimo Villari. 775-780 [doi]
- Secure Identifiers and Initial Credential Bootstrapping for IoT@WorkKai Fischer, Jürgen Gessner, Steffen Fries. 781-786 [doi]
- IoT Access Control Issues: A Capability Based ApproachSergio Gusmeroli, Salvatore Piccione, Domenico Rotondi. 787-792 [doi]
- Shifting Primes: Optimizing Elliptic Curve Cryptography for Smart ThingsLeandro Marin, Antonio J. Jara, Antonio F. Gómez-Skarmeta. 793-798 [doi]
- The Smart University Experience: An NFC-Based Ubiquitous EnvironmentMaría Victoria Bueno Delgado, Pablo Pavón-Mariño, A. De-Gea-Garcia, A. Dolon-Garcia. 799-804 [doi]
- An Indoor Localization Mechanism Based on RFID and IR Data in Ambient Intelligent EnvironmentsMaria V. Moreno, Miguel A. Zamora, José Santa, Antonio F. Gómez-Skarmeta. 805-810 [doi]
- Internet of Things Architecture for an RFID-Based Product Tracking Business ModelFélix Jesús Villanueva, David Villa, Francisco Moya, Maria J. Santofimia, Juan Carlos López. 811-816 [doi]
- Mixed Reality-Aware Service Architecture for Mobile EnvironmentsAugusto Morales Dominguez, Tomás Robles, Ramón Alcarria, Edwin Cedeno. 817-822 [doi]
- Resolving Coordination Challenges in Cooperative Mobile ServicesRamón Alcarria, Tomás Robles, Augusto Morales Dominguez, Edwin Cedeno. 823-828 [doi]
- An Attitude-Based Reasoning Strategy to Enhance Interaction with Augmented ObjectsJosué Iglesias, David Gomez, Ana M. Bernardos, José R. Casar. 829-834 [doi]
- A Ubiquitous Model for Wireless Sensor Networks MonitoringAndre G. F. Elias, Joel J. P. C. Rodrigues, Luís M. L. Oliveira, Bruno Bogaz Zarpelão. 835-839 [doi]
- On Route Travel Assistant for Public Transport Based on Android TechnologyCarmelo R. García, Santiago Candela Solá, Jonatan Ginory, Alexis Quesada-Arencibia, Francisco Alayón Hernández. 840-845 [doi]
- Web of Things as a Product Improvement tool: Furniture as Case StudyAndres L. Bleda, Rafael Maestre, Guadalupe Santa, Antonio J. Jara, Antonio F. Gómez-Skarmeta. 846-851 [doi]
- Marketing 4.0: A New Value Added to the Marketing through the Internet of ThingsAntonio J. Jara, Maria Concepcion Parra, Antonio F. Gómez-Skarmeta. 852-857 [doi]
- Enabling the Cloud of ThingsSalvatore Distefano, Giovanni Merlino, Antonio Puliafito. 858-863 [doi]
- A Test-Bed Internet Based Architecture Proposal for Benchmarking of Visual Servoing TechniquesRoger Esteller-Curto, Angel P. Del Pobil, Enric Cervera, Raúl Marín. 864-867 [doi]
- Fighting against Vampire Appliances through Eco-Aware ThingsJuan Lopez-de-Armentia, Diego Casado Mansilla, Diego López-de-Ipiña. 868-873 [doi]
- Convergence of Utility Computing with the Internet-of-ThingsJohn Soldatos, Martin Serrano, Manfred Hauswirth. 874-879 [doi]
- Impact of Online Games and M2M Applications Traffic on Performance of HSPA Radio Access NetworksDejan Drajic, Srdjan Krco, Igor Tomic, Milica Popovic, Nenad Zeljkovic, Navid Nikaein, Philipp Svoboda. 880-885 [doi]
- A Feasibility Study of Wrist-Worn Accelerometer Based Detection of Smoking HabitsPhilipp Scholl, Kristof Van Laerhoven. 886-891 [doi]
- Interaction of Patients with Breathing Problems through NFC in Ambient Assisted Living EnvironmentsAntonio J. Jara, Pablo Lopez, David Fernández, Benito Úbeda Miñaro, Miguel A. Zamora, Antonio F. Gómez-Skarmeta. 892-897 [doi]
- Big Data on the Internet of Things: An Example for the E-healthMartin-Diaz, Gonzalo Juan, Oikawa Lucas, Alberto Ryuga. 898-900 [doi]
- Self-StarMAS: A Multi-Agent System for the Self-Management of AAL ApplicationsInmaculada Ayala, Mercedes Amor, Lidia Fuentes. 901-906 [doi]
- Home Telehealth Interventions for People with AsthmaMagdalena Kowalczyk, Antonio J. Jara, Antonio F. Gómez-Skarmeta. 907-911 [doi]
- Evaluation of Bluetooth Low Energy Capabilities for Continuous Data Transmission from a Wearable ElectrocardiogramAntonio J. Jara, David Fernández, Pablo Lopez, Miguel A. Zamora, Benito Úbeda Miñaro, Antonio F. Gómez-Skarmeta. 912-917 [doi]
- Integrating Internet of Things and Cloud Computing for Health Services Provisioning: The Virtual Cloud Carer ProjectDiego Gachet, Manuel Buenaga, Fernando Aparicio, Víctor Padrón. 918-921 [doi]
- Bringing IoT and Cloud Computing towards Pervasive HealthcareCharalampos Doukas, Ilias Maglogiannis. 922-926 [doi]
- Analysis of the Cloud Computing Paradigm on Mobile Health Records SystemsGonzalo Fernández-Cardeñosa, Isabel de la Torre Díez, Joel J. P. C. Rodrigues. 927-932 [doi]
- Entrepreneurial Success for High-Tech Start-Ups - Case Study of Taiwan High-Tech CompaniesYa-Wen Yu, Yu-Shing Chang, Yu-Fu Chen, Li-Sheng Chu. 933-937 [doi]
- Performance Implications of Knowledge Management: Mediating Roles of Dynamic Capability and Competitive StrategyShu-Hui Chuang, Hong-Nan Lin. 938-942 [doi]
- The Influence of Media Coverage on the Stock Returns and Momentum ProfitsKuei-Yuan Wang, Chien-Kuo Chen. 943-947 [doi]
- Marriage, Education and Housing PriceMei-Hua Liao. 948-951 [doi]
- Intangible Assets, Financial Performance, and Market Value - An Integrative Research of Financial Services IndustryYing-Li Lin, Hsiu Feng Huang. 952-955 [doi]
- The Emerging Financial Pre-warning SystemsMushang Lee, Ching-Hui Shih, Tsui-Chih Wu. 956-961 [doi]
- Global Trends in Workplace LearningLung-Sheng Lee, Chun-Chin Lai. 962-964 [doi]
- Automatic Bibliometric Analysis of Research Literature in Adult EducationYao-Hua Wang, Yuen-Hsien Tseng. 965-968 [doi]