Abstract is missing.
- Thermal-Aware Task Placement with Dynamic Thermal Model in an Established DatacenterZhigang Jiang, Wei Huang, Ilsun You, Zhuzhong Qian, Sanglu Lu. 1-8 [doi]
- The GEO-Cloud Experiment: Global Earth Observation System Computed in CloudJonathan Becedas. 9-15 [doi]
- Visions and Challenges for Sensor Network Collaboration in the CloudSimon Oechsner, Boris Bellalta, Desislava Dimitrova, Tobias Hoßfeld. 16-22 [doi]
- Architecture Reconfiguration in Pervasive Environment: An AADL-based ApproachLuxi Chen, Linpeng Huang, Chen Li, Mengyao Ruan. 23-30 [doi]
- Construction of Scholarly n-Gram from Huge Text DataMyunggwon Hwang, Ha Neul Yeom, Mi-Nyeong Hwang, Hanmin Jung. 31-35 [doi]
- Research for the Pattern Analysis of Individual Interest Using SNS Data: Focusing on FacebookDongjin Choi, Jeongin Kim, Eunji Lee, Chang Choi, Jiman Hong, PanKoo Kim. 36-40 [doi]
- A New Method of Measuring Document Similarity for Movie RecommendationSung Min Kim, Young-Guk Ha. 41-44 [doi]
- Large Imbalance Data Classification Based on MapReduce for Traffic Accident PredictionSeong-hun Park, Young-Guk Ha. 45-49 [doi]
- An Overview of Application Traffic Management Approaches: Challenges and Potential ExtensionsIoanna Papafili, Krzysztof Wajda, Roman Lapacz, Alessandro Predieri, Thomas Bocek, Michael Seufert. 50-57 [doi]
- Scenario-Based Behavioral Nonexistent Consistency Checking for Cyber-Physical SystemsYan Zhang, Xiangwei Liu, Jin Shi, Tian Zhang, Zhuzhong Qian. 58-65 [doi]
- Data De-duplication on Similar File DetectionYueguang Zhu, Xingjun Zhang, Runting Zhao, Xiaoshe Dong. 66-73 [doi]
- An Enhanced Quantum PageRank Algorithm Integrated with Quantum SearchHuiquan Wang, Junjie Wu, Xuejun Yang, Pingxing Chen, Xun Yi. 74-81 [doi]
- Conceptual Similarity Calculation Using Common-Context between Comparatives on OntologyHyun Jung Lee, Mye M. Sohn. 82-89 [doi]
- On Semantic Techniques for Intelligent ComputingMyunggwon Hwang, Mi-Nyeong Hwang, Hanmin Jung. 90-95 [doi]
- Fast Multi-line Detection and Tracking with CUDA for Vision-Based UAV AutopilotTyan Vladimir, Doo-Hyun Kim, Young-Guk Ha, Dongwoon Jeon. 96-101 [doi]
- Keyword-Based SPARQL Query Generation System to Improve Semantic Tractability on LOD CloudSoyeon Im, Mye M. Sohn, SungHwan Jeong, Hyun Jung Lee. 102-109 [doi]
- A Dissemination Analysis in Mobile Wireless Ad Hoc Networks Using Probabilistic BroadcastDaniel Gutiérrez-Reina, Sergio L. Toral Marín, Eleana Asimakopoulou, Nik Bessis, Federico Barrero. 110-114 [doi]
- A Cross-Layer Design Scheme Based on Integrated Management Applied in Wireless CommunicationLinyuan Yao, Fei Song, Hongke Zhang. 115-120 [doi]
- Cost-Effective Proxy-LMA Mobility Management Scheme in Mobile Networks with Global Mobility SupportChulhee Cho, Jun Dong Cho, Jongpil Jeong. 121-127 [doi]
- Developing Useful Mobile Applications in Cross-Media PlatformsCajsa Tora Hermansson, Mikael Söderstrom, Dan Johansson. 128-132 [doi]
- The Information Sharing System Using Web-GIS at the Time of Wide-Scale DisasterTomoyuki Ishida, Kazuhiro Takahagi, Yoichiro Shimizu, Akira Sakuraba, Noriki Uchida, Yoshitaka Shibata. 133-138 [doi]
- Mobile Gateway for Ubiquitous Health Care System Using ZigBee and BluetoothTeemu Henrikki Laine, Chaewoo Lee, Haejung Suk. 139-145 [doi]
- Proposal of Autonomous Flight Wireless Nodes with Delay Tolerant Networks for Disaster UseNoriki Uchida, Noritaka Kawamura, Tomoyuki Ishida, Yoshitaka Shibata. 146-151 [doi]
- SODiCS on Challenged Communication EnvironmentKenta Ito, Go Hirakawa, Yoshitaka Shibata. 152-158 [doi]
- Seamless SPMIPv6-Based Handoff Scheme for Next-Generation Mobile NetworksChulhee Cho, Jun Dong Cho, Jongpil Jeong. 159-165 [doi]
- Analytical Modeling of IP-based Hierarchical Mobility Management ProtocolsChulhee Cho, Jun Dong Cho, Jongpil Jeong. 166-171 [doi]
- A Case Study for Potential Carpooling in BeijingFei Song, Rong Li, Huachun Zhou, Hongke Zhang, Ilsun You. 172-177 [doi]
- An Exercise Data Logging System for Retrofitting Gym EquipmentColin Patch, Kin Fun Li, Bruce Gooch. 178-185 [doi]
- Unsupervised Learning of GDL ClassifierTomasz Hachaj, Marek R. Ogiela. 186-191 [doi]
- Cognitive Management SystemsLidia Ogiela, Marek R. Ogiela. 192-195 [doi]
- Facial Feature Extraction Using an Active Appearance Model on the iPhoneYong-Hwan Lee, Woori Han, YoungSeop Kim, Bonam Kim. 196-201 [doi]
- Efficient Compression Algorithm for H.264/AVC Intra-prediction Using an Activity MapJune Kim, YoungSeop Kim, Yong-Hwan Lee, Oh-Jin Kwon, Bonam Kim. 202-206 [doi]
- Feature Mining for Machine Learning Based Compilation OptimizationFengqian Li, Feilong Tang, Yao Shen. 207-214 [doi]
- Exploring the Design Space for Android SmartphonesShih-Hao Hung, Jen-Hao Chen, Chia-Heng Tu, Jeng-Peng Shieh, Roger Chien. 215-222 [doi]
- Indoor Taxi-Cab: Real-Time Indoor Positioning and Location-Based Services with Ekahau and Android OSCaner Kilinc, Seraj Al Mahmud Mostafa, Raihan Ul Islam, Kashif Shahzad, Karl Andersson. 223-228 [doi]
- PasDroid: Real-Time Security Enhancement for AndroidShuen Wen Hsiao, Shih-Hao Hung, Roger Chien, Chih Wei Yeh. 229-235 [doi]
- Efficient Identification of Windows Executable Programs to Prevent Software PiracyYesol Kim, Jeongoh Moon, Seongje Cho, Minkyu Park, Sangchul Han. 236-240 [doi]
- A Survey of Green, Energy-Aware Security and Some of Its Recent Developments in Networking and Mobile ComputingMauro Migliardi, Alessio Merlo, Luca Caviglione. 241-246 [doi]
- On Security-Effective and Global Mobility Management for FPMIPv6 NetworksHyun Suk Chai, Jun Dong Cho, Jongpil Jeong. 247-253 [doi]
- Cryptographic Techniques in Advanced Information ManagementMarek R. Ogiela, Lidia Ogiela, Urszula Ogiela. 254-257 [doi]
- A Role-Based RSA Key Management Approach in a Hierarchy SchemeHsing-Chung Chen, Anita Christiana. 258-264 [doi]
- Adaptive Stealth Energy-Related DoS Attacks against Cloud Data CentersFrancesco Palmieri, Massimo Ficco, Aniello Castiglione. 265-272 [doi]
- How to Find an Appropriate K for K-AnonymizationShinsaku Kiyomoto, Yutaka Miyake. 273-279 [doi]
- Elliptic Curve Scalar Multiplication with a Bijective TransformYoshitaka Nagai, Masaaki Shirase, Tetsuya Izu. 280-286 [doi]
- Identifying Windows Installer Package Files for Detection of Pirated SoftwareDong Jin Kim, Yesol Kim, Jeongoh Moon, Seongje Cho, Jinwoon Woo, Ilsun You. 287-290 [doi]
- The Impact of TDMA Frame Size on Latency in a Neighbor-Aware VANET MACMarthinus J. Booysen, Gert-Jan van Rooyen. 291-296 [doi]
- An Evaluation Environment and Methodology for Automotive Media Streaming ApplicationsRobert Protzmann, Kay Massow, Ilja Radusch. 297-304 [doi]
- Cooperative Power and Contention Control MAC Protocol in Multichannel Cognitive Radio Ad Hoc NetworksChien-Min Wu, Hui-Kai Su, Maw-Lin Leou, Yi-Ching Liaw, Chih Pin Lo. 305-309 [doi]
- The Effect of TDMA Frame Size and the Hidden Node Problem on the Performance of a Neighbor-Aware VANET MACMarthinus J. Booysen, Gert-Jan van Rooyen. 310-315 [doi]
- Evaluation of Sleep Scheduling Method for Data Collection from Sensor Networks Divided into Local AreasMasato Nakamura, Shigetomo Kimura. 316-321 [doi]
- Flexible, Direct Interactions between CoAP-enabled IoT DevicesGirum Ketema Teklemariam, Jeroen Hoebeke, Ingrid Moerman, Piet Demeester. 322-327 [doi]
- Challenges of the Internet of Things: IPv6 and Network ManagementNabil Benamar, Antonio J. Jara, Latif Ladid, Moulay Driss El Ouadghiri. 328-333 [doi]
- Towards Privacy-Preserving Data Sharing in Smart EnvironmentsJosé Luis Hernández Ramos, Jorge Bernal Bernabé, Antonio F. Skarmeta-Gomez. 334-339 [doi]
- Extending Extensible Authentication Protocol over IEEE 802.15.4 NetworksMarcin Piotr Pawlowski, Antonio J. Jara, Maciej J. Ogorzalek. 340-345 [doi]
- A System to Enable Level-of-Detail Mobile Interaction with Augmented Media ObjectsDavid Gómez, Ana M. Bernardos, José R. Casar. 346-351 [doi]
- Midgar: Domain-Specific Language to Generate Smart Objects for an Internet of Things PlatformCristian González García, Jordán Pascual Espada, Edward Rolando Núñez-Valdéz, Vicente García-Díaz. 352-357 [doi]
- A Mobile Crowdsourcing Platform for Urban Infrastructure MaintenanceJose Pablo Gomez Barron, Miguel-Ángel Manso, Ramon Alcarria, Rufino Perez Gomez. 358-363 [doi]
- Extending the EPCIS with Building Automation Systems: A New Information System for the Internet of ThingsNam Ky Giang, Seonghoon Kim, Daeyoung Kim, Markus Jung, Wolfgang Kastner. 364-369 [doi]
- Reusing Web-Enabled Actuators from a Semantic Space-Based PerspectiveAitor Gómez-Goiri, Iñigo Goiri, Diego López-de-Ipiña. 370-375 [doi]
- Big Data for Cyber Physical Systems: An Analysis of Challenges, Solutions and OpportunitiesAntonio J. Jara, Dominique Genoud, Yann Bocchi. 376-380 [doi]
- Top-k Queries in Wireless Sensor Networks Leveraging Hierarchical Grid IndexJine Tang, Zhenhua Wang, Yunchuan Sun, Chu Du, ZhangBing Zhou. 381-386 [doi]
- Codesign-Oriented Platform for Agile Internet of Things Prototype DevelopmentJonathan Ruiz de Garibay, Aitor Almeida, Szilard A. Kados, Adolfo Garcia Corcuera, Diego López-de-Ipiña. 387-392 [doi]
- Exploiting the Internet of Things for Systems Engineering: Breaking Down the Barriers between Siloed Engineering TeamsIan Giblett. 393-398 [doi]
- Smart City Data Stream Visualization Using GlyphsFelix Jesús Villanueva, Cesar Aguirre, David Villa, Maria J. Santofimia, Juan Carlos López. 399-403 [doi]
- Chronic Patients Monitoring Using Wireless Sensors and Big Data ProcessingD. Gachet Paez, Fernando Aparicio, Manuel de Buenaga Rodríguez, Juan Ramon Ascanio. 404-408 [doi]
- Team Up with Eco-aware Everyday Things to Green Your Workplace!Diego Casado Mansilla, Juan Lopez-de-Armentia, Pablo Garaizar, Diego López-de-Ipiña. 409-414 [doi]
- Test Set Validation for Home Electrical Signal DisaggregationLuc Dufour, Dominique Genoud, Gianluca Rizzo, Antonio J. Jara, Pierre Roduit, Jean Jacques Bezian, Bruno Ladevie. 415-420 [doi]
- ekoNET - Environmental Monitoring Using Low-Cost Sensors for Detecting Gases, Particulate Matter, and Meteorological ParametersBoris Pokric, Srdan Kreo, Dejan Drajic, Maja Pokric, Ivan Jokic, Milena Jovaevic Stojanovic. 421-426 [doi]
- Service Security for Smart Grid SystemInshil Doh, Jiyoung Lim, Kijoon Chae. 427-432 [doi]
- Security of Selected Future Internet Architectures: A SurveyRahamatullah Khondoker, Beny Nugraha, Ronald Marx, Kpatcha M. Bayarou. 433-440 [doi]
- A Remote Lock System Using Bluetooth CommunicationHae-Duck Joshua Jeong, Jiyoung Lim, WooSeok Hyun, Woojin Lee. 441-446 [doi]
- Multi-defense Mechanism against DDoS in SDN Based CDNiNishat I. Mowla, Inshil Doh, Kijoon Chae. 447-451 [doi]
- A Credit-Based Incentive Protocol for Stimulating Network-Coded Cooperative Content Distribution in VANETIng-Chau Chang, Jacky Lo. 452-457 [doi]
- NFC Attacks Analysis and SurveyCheng-Hao Chen, Iuon-Chang Lin, Chou Chen Yang. 458-462 [doi]
- QoS Based Performance Evaluation for the Cooperative Communication Systems in Decode-and-Forward ModeJyh-Horng Wen, Jheng-Sian Li, Cheng-Ying Yang, Yi-Shan Lin, Hsing-Chung Chen. 463-467 [doi]
- Energy Efficiency of Bandwidth Expansion Algorithms in Wireless Communication SystemsYung-Fa Huang, Chuan-Bi Lin, Chia-Chi Chang, Che-Hao Li, Ching-Mu Chen. 468-472 [doi]
- An Improving Localization Scheme Using Mobile Anchors with Directional Antennas in Wireless Sensor NetworksYoung-Long Chen, Tzu-Chieh Sun, Neng-Chung Wang, Shin You Shie. 473-476 [doi]
- A Dual-Path-Based Data Aggregation Scheme for Grid-Based Wireless Sensor NetworksNeng-Chung Wang, Yung-Kuei Chiang, Young-Long Chen, Chih-Hung Hsieh. 477-482 [doi]
- Towards Implementing Web-Based Adaptive Application Mobility Using Web Real-Time CommunicationsDan Johansson, Mikael Holmgren. 483-486 [doi]
- High-Efficient Multi-key Exchange Protocol Based on Three-Party AuthenticationKun-Lin Tsai, Yi-Li Huang, Fang-Yie Leu, Jiu Soon Tan, Mengyuan Ye. 487-492 [doi]
- Interoperability between Federated Authentication SystemsLuigi Catuogno, Clemente Galdi. 493-498 [doi]
- A Secure Authentication Scheme of Health Care Based on the CloudChin-Ling Chen, Tsai-Tung Yang, Fang-Yie Leu. 499-504 [doi]
- A Multi-layer Secure Prevention Scheme for Improving e-Commerce SecuritySen-Tarng Lai, Fang-Yie Leu, William Cheng-Chung Chu. 505-510 [doi]
- Research on Comparison and Analysis of the DEFSOP, NIST Cell SOP, and ISO27037 SOPI.-Long Lin, Yun-Sheng Yen, Fang-Yie Leu. 511-516 [doi]
- An Efficient Protocol for Reliable Data Communication on Dataless DevicesArcangelo Castiglione, Raffaele Pizzolante, Bruno Carpentieri, Alfredo De Santis. 517-522 [doi]
- Minimum Cost Content Object Reconstruction in Multi-tier ServersLung-Pin Chen, Chih-Wei Hsieh, Fang-Yie Leu. 523-528 [doi]
- Foreground Object Detection in Complex Scenes Using Cluster ColorChung-Chi Lin, Wen-Kai Tsai, Chishyan Liaw. 529-532 [doi]
- Anonymous Authentication Scheme Based on Proxy Group Signature for Wireless MESH NetworkTian-han Gao, Qidi Miao, Nan Guo. 533-537 [doi]
- Threats and Countermeasures on a 4G Mobile NetworkSeongmin Park, Sekwon Kim, JooHyung Oh, Myoungsun Noh, Chaetae Im. 538-541 [doi]
- An Intuitive Computer Forensic Method by Timestamp Changing PatternsGyu-Sang Cho. 542-548 [doi]
- Anti-theft Solusions for In-Vehicle Electronic DevicesKyungroul Lee, Hyungjun Yeuk, Jaein Kim, Kangbin Yim. 549-553 [doi]
- Anonymous Credential-Based Privacy-Preserving Identity Verification for Business ProcessesNan Guo, Yuanting Jin, Kangbin Yim. 554-559 [doi]
- A Comparative Study on the Performance of Electronic Reservation ServicesMei Hua Huang, Zhao Yu Liu, Perng-Fei Huang. 560-566 [doi]
- Study of e-Business and Long-Established Companies in JapanHidekazu Sone, Innan Sasaki. 567-569 [doi]
- Media Coverage and Stock Return an Impulse Response AnalysisKuei-Yuan Wang, Chien-Kuo Chen, Hsiao Chi Wei. 570-574 [doi]
- Analysts' Forecasts and Institutional Investors' BehaviorMei-Hua Liao, Chia-Yun Chang. 575-579 [doi]
- How Does the Ratio and Part-Time Situation of Independent Directors Affect Firm Performance?Ying-Li Lin, Hsiu Feng Huang, Shu-Chen Chen. 580-582 [doi]
- Privacy-Preserving Technology for Secure Utilization of Sensor Data (Extended Abstract)Tetsuya Izu, Takao Ogura, Yumi Sakemi, Masahiko Takenaka, Hiroshi Tsuda. 583 [doi]
- On the Vulnerability of Ghost Domain NamesHiroaki Kikuchi, Tomohiro Arimizu. 584-587 [doi]
- Visualization of SSL Setting Status Such as the FQDN MismatchYuji Suga. 588-593 [doi]
- New Privacy-Preserving Method for Matching Location DataMebae Ushida, Yuji Yamaoka, Kouichi Itoh, Hiroshi Tsuda. 594-599 [doi]