Abstract is missing.
- A Novel Framework for Outsourcing and Sharing Searchable Encrypted Data on Hybrid CloudJingwei Li, Chunfu Jia, Jin Li, Zheli Liu. 1-7 [doi]
- Implementing a Personal Health Record Cloud Platform Using Ciphertext-Policy Attribute-Based EncryptionChangji Wang, Xuan Liu, Wentao Li. 8-14 [doi]
- A Non-interactive Secure Outsourced Computation Scheme in Multi-party CloudShu Guo, Haixia Xu. 15-19 [doi]
- Improving Cloud Datacentre Scalability, Agility and Performance Using OpenFlowCharlie Baker, Ashiq Anjum, Richard Hill, Nik Bessis, Saad Liaquat Kiani. 20-27 [doi]
- Independent Task Scheduling by Artificial Immune Systems, Differential Evolution, and Genetic AlgorithmsPavel Krömer, Jan Platos, Václav Snásel. 28-32 [doi]
- Assistance to Trainers for the Observation and Analysis Activities of Operators Trainees on Nuclear Power Plant Full-Scope SimulatorOlivier Champalle, Karim Sehaba, Dino Cosmas, Alain Mille, Yannick Prié. 33-40 [doi]
- Improving Compression Using WordsJan Platos, Pavel Krömer. 41-46 [doi]
- Collection and Classification of Tennis Swings Using a Virtual RacketAna-Maria Sevcenco, Kin Fun Li, Kosuke Takano. 47-54 [doi]
- DOA Estimation Using Multiple Kernel Learning SVM Considering Mutual CouplingMehdi Dehghanpour, Vahid Tabataba Vakili, Ali Farrokhi. 55-61 [doi]
- A Multi-agent Matchmaker Based on Hidden Markov Model for Decentralized Grid SchedulingHolman Bolívar Barón, Mario Martinez Rojas, Rubén González Crespo, Oscar Sanjuán Martínez. 62-69 [doi]
- A Struggle Genetic Algorithm for Ground Stations Scheduling ProblemFatos Xhafa, Xavier Herrero, Admir Barolli, Makoto Takizawa. 70-76 [doi]
- A Normalized Local Binary Fitting Model for Image SegmentationYali Peng, Fang Liu, Shigang Liu. 77-80 [doi]
- An Advising System for Supporting Users of Collaborative Activities in LMSsThemistoklis Chronopoulos, Ioannis Hatzilygeroudis. 81-88 [doi]
- Orchestrating Adaptive and Complex CSCL Scenarios through a Choreography among IMS-LD and External ServicesIoannis Magnisalis, Stavros N. Demetriadis. 89-96 [doi]
- Providing Security to Computer-Supported Collaborative Learning: An OverviewJorge Miguel, Santi Caballé, Josep Prieto. 97-104 [doi]
- Optimizing the Energy Efficiency of Message Exchanging for Service Distribution in Interoperable InfrastructuresNik Bessis, Stelios Sotiriadis, Florin Pop, Valentin Cristea. 105-112 [doi]
- A Relational Approach to Collaborative FairnessMario Köppen, Rodrigo Verschae, Masato Tsuru. 113-120 [doi]
- Optimization Transmission for Improving Degrees of Freedom in MIMO Y ChannelYong Wang, Aixiang Guo, Hong He, Hui Li. 121-125 [doi]
- Transmission Rate Control Utilizing Chaotic Nature of Coupled OscillatorsYuri Takahashi, Chisa Takano, Yusuke Sakumoto, Masaki Aida. 126-131 [doi]
- Internet of Things as Virtual Settlements: Insights from Excavating Social Media SitesDemosthenes Akoumianakis, Nikolas Karadimitriou, George Vlachakis, Giannis Milolidakis, Nik Bessis. 132-139 [doi]
- Networking Tactics for Online eHealth Campaigns and Intervention Studies: Preliminary Results from a Case Study on Nutritional Support for Cancer PatientsDemosthenes Akoumianakis, Giannis Milolidakis, Patrizia Gnagnarella, Alessandro Maria Misotti, Nik Bessis. 140-147 [doi]
- A P2P Traffic Localization Method with Additional Delay InsertionTakumi Miyoshi, Yuki Shinozaki, Olivier Fourmaux. 148-154 [doi]
- Grid Configuration and Application Monitoring in GridGainFlorin Pop, Maria-Alexandra Lovin, Catalin Negru, Valentin Cristea, Nik Bessis, Stelios Sotiriadis. 155-161 [doi]
- Using a Conversational Agent for Promoting Collaborative Language LearningStergios Tegos, Stavros N. Demetriadis, Thrasyvoulos Tsiatsos. 162-165 [doi]
- Evaluation for Acquiring Method for Agents' Actions with Ant Colony Optimization in Robo Cup Rescue Simulation SystemHisayuki Sasaoka. 166-169 [doi]
- Online Cooperative Behavior Planning Using a Tree Search Method in the RoboCup Soccer SimulationHidehisa Akiyama, Shigeto Aramaki, Tomoharu Nakashima. 170-177 [doi]
- A Benchmark for Evaluating Approximated Algorithms for Fair Wireless Channel AllocationRodrigo Verschae, Mario Köppen, Masato Tsuru. 178-184 [doi]
- The Wireless Vertical Handoff Decision Algorithm with Parameter PredictionYulong Shen, Ning Xi, Qingqi Pei, Jianfeng Ma, Yudi Niu. 185-192 [doi]
- Neighbour Traffic-Aware Load Balancing Method in Ad Hoc NetworksRyo Yamamoto, Takumi Miyoshi, Yoshiaki Tanaka. 193-197 [doi]
- Distributed Image Encoding Scheme Using LDPC Codes over GF(q) on Wireless Sensor NetworksPhat Nguyen Huu, Vinh Tran Quang, Takumi Miyoshi. 198-205 [doi]
- An Improved Binary Authentication Tree Algorithm for Vehicular NetworksHuaqun Wang, Bo Qin, Josep Domingo-Ferrer. 206-213 [doi]
- Securing Vehicular Networks Using Deterministic Schemes for Computing TrustMihaela Teler, Valentin Cristea. 214-221 [doi]
- A Lightweight Anonymous Authentication Scheme for VANET Based on Bilinear PairingHui Zhu, Wenhai Pan, Beishui Liu, Hui Li. 222-228 [doi]
- The Analysis of Mobility Models in MANETs with Two-Hop Relay AlgorithmYing Cai, Xiaofei Wang, Yuqing Zhang. 229-236 [doi]
- A Non-delegatable Strong Designated Verifier Signature without Random OraclesHaibo Tian, Zhengtao Jiang, Yi Liu, Baodian Wei. 237-244 [doi]
- On the Security of an Enhanced ID-Based Anonymous Proxy Signature Scheme in ICCAE2010Jianhong Zhang, Yuwei Xu. 245-250 [doi]
- Multi-party Computation with Social Rational PartiesYilei Wang, Qiuliang Xu, Zhe Liu. 251-258 [doi]
- Physical-Layer Network Coding and Connected Dominating Set Based Routing Protocol in Wireless Multi-hop NetworkLi Xu, Penggui Pan, Xiaoding Wang, Wei Wu. 259-263 [doi]
- DCCA-Secure Public-Key Encryptions from Hybrid ParadigmsYuan Chen, Xiaofeng Chen 0001, Hui Li. 264-269 [doi]
- Complementary Witness Soundness Witness Indistinguishable Proof System and CCA2 Public-Key Encryption SchemesHaixia Xu, Bao Li, Qixiang Mei. 270-278 [doi]
- A Trusted Authentication Scheme for Wireless Networks Using Direct Anonymous AttestationLi Yang, Jianfeng Ma, Zhihong Liu, Ruofan Zheng. 279-285 [doi]
- A Strong Designated Verifier Signature Scheme with Secure DisavowabilityBo Yang 0003, Ying Sun, Yong Yu, Qi Xia. 286-291 [doi]
- Toward Quantum-Resistant Strong Designated Verifier Signature from IsogeniesXi Sun, Haibo Tian, YuMin Wang. 292-296 [doi]
- Cryptanalysis of an Efficient Three-Party Key Exchange ProtocolXiaotong Fu, Ruijun Shi. 297-302 [doi]
- Secure Similarity Coefficients Computation with Malicious AdversariesBo Zhang, Fangguo Zhang. 303-310 [doi]
- Privacy-Preserving Affinity Propagation Clustering over Vertically Partitioned DataXiaoyan Zhu, Momeng Liu, Min Xie 0003. 311-317 [doi]
- An Efficient Probably CP-CM-Secure Identity-Based Signature Scheme Applicable to Authentication in Multiuser SettingsXi Sun, Zhengtao Jiang, Meirong Zhou, YuMin Wang. 318-322 [doi]
- ESLRAS: A Lightweight RFID Authentication Scheme with High Efficiency and Strong Security for Internet of ThingsKai Fan, Jie Li, Hui Li, Xiaohui Liang, Xuemin (Sherman) Shen, Yintang Yang. 323-328 [doi]
- Cryptanalysis of a Certificateless Encryption Scheme in the Standard ModelLimin Shen, Futai Zhang, Yinxia Sun, Sujuan Li. 329-333 [doi]
- Dynamic Group Based Authentication Protocol for Machine Type CommunicationsYueYu Zhang, Jie Chen, Hui Li, Wujun Zhang, Jin Cao, Chengzhe Lai. 334-341 [doi]
- A New Variant of the Cramer-Shoup Leakage-Resilient Public Key EncryptionSujuan Li, Futai Zhang, Yinxia Sun, Limin Shen. 342-346 [doi]
- Unsupervised Human Action Categorization Using Latent Dirichlet Markov ClusteringXudong Zhu, Hui Li. 347-352 [doi]
- End-to-End Security Scheme for Machine Type Communication Based on Generic Authentication ArchitectureWujun Zhang, YueYu Zhang, Jie Chen, Hui Li, YuMin Wang. 353-359 [doi]
- Improvement of Provably Secure Self-Certified Proxy Convertible Authenticated Encryption SchemeQi Xie, Guilin Wang, Fubiao Xia, Deren Chen. 360-364 [doi]
- ET-DMD: An Error-Tolerant Scheme to Detect Malicious File Deletion on Distributed StorageJian Mao, Yan Zhang, Xiandong Xu, Jianwei Liu, Tao Wei. 365-372 [doi]
- A Self-Calibration Method Based on Two Pairs of Orthogonal Parallel LinesLugang Zhao, Chengke Wu, Shigang Liu. 373-376 [doi]
- Deniably Information-Hiding Encryptions Secure against Adaptive Chosen Ciphertext AttackChong-zhi Gao, Dongqing Xie, Jin Li, Baodian Wei, Haibo Tian. 377-384 [doi]
- Joint Signal Space Alignment and Precoding in Two-Way Relay Multi-user NetworksYong Wang, Liu Yang, Yun Ai, Hui Li, Weidong Zhang. 385-389 [doi]
- A Methodology for Ontology Evaluation Using Topic ModelsAryya Gangopadhyay, Matthew Molek, Yelena Yesha, Mary Brady, Yaacov Yesha. 390-395 [doi]
- Towards an Ontological Approach to Enrich a Community of Interest in Orthopaedic SpecialtyM. E. Riu Villanueva, D. Bañeres Besora, Jordi Conesa Caralt. 396-403 [doi]
- Generic Methodology for Semantic Data Warehouse Design: From Schema Definition to ETLNabila Berkani, Selma Khouri, Ladjel Bellatreche. 404-411 [doi]
- A Semantic Framework for Delivery of Context-Aware Ubiquitous Services in Pervasive EnvironmentsAlba Amato, Beniamino Di Martino, Salvatore Venticinque. 412-419 [doi]
- Itiner@: Ontology for Personalizing Tourist Routes in Mobile DevicesLaia Descamps-Vila, Jordi Conesa, Antonio Pérez-Navarro. 420-427 [doi]
- SOSCast: Location Estimation of Immobilized Persons through SOS Message PropagationNoriyuki Suzuki, Jane Louie Fresco Zamora, Shigeru Kashihara, Suguru Yamaguchi. 428-435 [doi]
- A Message Forward Scheduling Based on a Secretary Problem for Mobile Relay NodesTakuya Tsuruike, Kazuya Tsukamoto, Masato Tsuru, Yuji Oie. 436-442 [doi]
- Implementation of High Complex Routing Algorithms in Mobile Devices: The Itiner@ CaseLaia Descamps-Vila, Jordi Conesa, Antonio Pérez-Navarro. 443-450 [doi]
- Performance Evaluation of Virtual Segment Method Based on Actual Road Network Topology at the Time of the Great East Japan EarthquakeYuta Kimura, Hiroshi Tsuji, Hiroyoshi Miwa. 451-456 [doi]
- Effect of Traffic Volume in Real-Time Disaster Evacuation Guidance Using Opportunistic CommunicationsAkihiro Fujihara, Hiroyoshi Miwa. 457-462 [doi]
- Learning the Classification of Traffic Accident TypesTibebe Beshah, Dejene Ejigu, Pavel Krömer, Václav Snásel, Jan Platos, Ajith Abraham. 463-468 [doi]
- Secure Provable Data Possession for Object Storage SystemZhefeng Zou, Zhen Wang, Xiaoping Yuan, Peng Liu. 469-472 [doi]
- Comment on Anonymous Multi-receiver Identity-Based Encryption SchemeJianhong Zhang, Yuwei Xu. 473-476 [doi]
- How Can Semantic Be Introduced in GIS Mobile Applications: Expectations, Theory and RealityLaia Descamps-Vila, Jordi Conesa, Antonio Pérez-Navarro. 477-482 [doi]
- A Composability Model for Efficient Web Service's ConnectivityHajar Omrana, Fatima-Zahra Belouadha, Ounsa Roudies. 483-484 [doi]
- Collaborative Systems for Building AutomationIoan Valentin Sita. 485-486 [doi]
- Towards Programmatic Management of Services from Multiple CloudsDana Petcu, Marc Frîncu, Silviu Panica, Marian Neagul. 487-488 [doi]
- Management of Software Driven Networks - Research ChallengesAlex Galis, Stuart Clayman. 489-490 [doi]
- Opengate on OpenFlow: System OutlineMitsuhiro Suenaga, Makoto Otani, Hisaharu Tanaka, Kenzi Watanabe. 491-492 [doi]
- End-to-End Header Compression over Software-Defined Networks: A Low Latency Network ArchitectureSupalerk Jivorasetkul, Masayoshi Shimamura, Katsuyoshi Iida. 493-494 [doi]
- Rule Based Expert Systems Running over the CloudTraian-Lucian Militaru, George Suciu, Gyorgy Todoran, Anisia Florescu, Vlad Poenaru, Laurentiu Nae, Cristian Cernat. 495-496 [doi]
- Optimizing Task Allocation on Fire FightingFrank-Gerrit Poggenpohl, Dennis Güttinger. 497-502 [doi]
- Interconnectedness of Complex Systems of Internet of Things through Social Network Analysis for Disaster ManagementAsta Zelenkauskaite, Nik Bessis, Stelios Sotiriadis, Eleana Asimakopoulou. 503-508 [doi]
- Disaster Management and Profile Modelling of IoT Objects: Conceptual Parameters for Interlinked Objects in Relation to Social Network AnalysisAsta Zelenkauskaite, Nik Bessis, Stelios Sotiriadis, Eleana Asimakopoulou. 509-514 [doi]
- Context Based Access Control in Pervasive EnvironmentsAlexandru Petculescu. 515-519 [doi]
- Energy-Aware Joint Power and Rate Control in Overlay Cognitive Radio Networks: A Nash Bargaining PerspectiveChungang Yang, Min Sheng, Jiandong Li, Hongyan Li, Jing Li. 520-524 [doi]
- Game-Theoretic Resource Allocation of the Cognitive Base Station in Two-Tie Co-existing Femtocell NetworksJing Song, Jianhua Ge, Jing Li, Li Cong. 525-530 [doi]
- Outage-Optimal Power Allocation for Space-Time Cooperative Network Coding with Amplify-and-ForwardYan-cheng Ji, Guoan Zhang, Xiaoge Zhang, Xun Huang. 531-535 [doi]
- Network-Coding-Based Hybrid-ARQ for Two-Way RelayingXiaoye Shi, Jianhua Ge, Yancheng Ji, Chuiqiang Sun. 536-540 [doi]
- Cooperative Transmission with Broadcasting and CommunicationDongdong Wei, Lei Deng, Yun Rui, Mingqi Li, Fang Wang. 541-545 [doi]
- Novel Distributed Turbo Coding Scheme in Two-Hop Relay NetworksDefeng Ren, Jianhua Ge, Xiaoye Shi. 546-549 [doi]
- Coordinated Multimode (Cellular - WSN) User Equipment Accessing Wireless Sensor Network MechanismJun Xia, Yun Rui, Kai Yu, Fei Yin, Haifeng Wang, Zhiyong Bu. 550-555 [doi]
- Interference Alignment with Complex FDPM-Based Subspace Tracking in MIMO Cognitive NetworksBin Zhu, Jianhua Ge, Xiaoye Shi, Yunxia Huang. 556-561 [doi]
- A Leakage-Based Precoding Scheme for Cognitive Multiuser MIMO SystemsChuiqiang Sun, Jianhua Ge, Xinxin Bao, Xiaoye Shi. 562-565 [doi]
- Impartial Spectrum Decision under Interference Temperature Model in Cognitive Wireless Mesh NetworksYun Yang, Guo-an Zhang, Yan-cheng Ji. 566-570 [doi]
- On the Security of a Multi-use CCA-Secure Proxy Re-encryption SchemeJindan Zhang, Xu an Wang. 571-576 [doi]
- Lattice Attack on the Knapsack Cipher 0/255Baocang Wang, Hao Lei. 577-580 [doi]
- Security Analysis of a Multi-use Identity Based CCA-Secure Proxy Re-encryption SchemeJindan Zhang, Xu an Wang. 581-586 [doi]
- Further Cryptanalysis of a Signature Scheme with Message RecoveryLei Niu, Yong Yu, Jianbing Ni, Ying Sun. 587-589 [doi]
- Key Recovery Attack on a Knapsack Public Key CryptosystemChunfei Ju, Hui Yuan. 590-593 [doi]
- Identity-Based Proxy Signature for Cloud Service in SaaSXi Cao, Li Xu, Yuexin Zhang, Wei Wu. 594-599 [doi]
- Efficient and Secure Batch Exponentiations Outsourcing in Cloud ComputingXu Ma, Jin Li, Fangguo Zhang. 600-605 [doi]
- A New Identity Based Signcryption Scheme in the Standard ModelBo Qin, Huaqun Wang, Qianhong Wu, Jianwei Liu, Josep Domingo-Ferrer. 606-611 [doi]
- Inference Detection and Database Security for a Business EnvironmentTraian Popeea, Anca Constantinescu, Laura-Cristina Gheorghe, Nicolae Tapus. 612-617 [doi]
- A Comparative Evaluation of Private Information Retrieval Techniques in Location-Based ServicesSergiu Costea, Dumitru Marian Barbu, Gabriel Ghinita, Razvan Rughinis. 618-623 [doi]
- Optimized Directional Content Distribution Using ReputationAndreea Urzica, Mircea Bardac. 624-629 [doi]
- Securing Virtual Networks for Multi-owner Wireless Sensor NetworksLaura Gheorghe, Dan Tudose, Markus Wehner, Sven Zeisberg. 630-635 [doi]
- Adaptive Security Framework for Wireless Sensor NetworksLaura Gheorghe, Razvan Rughinis, Nicolae Tapus. 636-641 [doi]
- A Comparative Study between Spatial-Temporal Orthogonal Moments for Volumes DescriptionManel Boutaleb, Imen Lassoued, Ezzeddine Zagrouba. 642-647 [doi]
- An Overview of Gait Analysis and Step Detection in Mobile Computing DevicesMichael L. McGuire. 648-651 [doi]
- Virtual Drums Based on Natural InteractionJacob Wilschrey, Cristian Rusu, Ivan Mercado, Rodolfo Inostroza, Cristhy Jiménez. 652-655 [doi]
- Biomechanical Validation of Upper-Body and Lower-Body Joint Movements of Kinect Motion Capture Data for Rehabilitation TreatmentsAdso Fernández-Baena, Antonio Susin, Xavier Lligadas. 656-661 [doi]
- Building Control, Monitoring, Safety and Security Using Collaborative SystemsIoan Valentin Sita. 662-667 [doi]
- Constructing Designated-Verifier Ring Signature and Ring Signcryption under the k-CCA2 AssumptionXiaotong Fu, Wen Liu. 668-670 [doi]
- A Practical Metadata Model for Access Control ModulesAlexandru Petculescu. 671-676 [doi]
- The Spiral-In Method for Designing and Connecting Learning ObjectsEvgenios Vlachos. 677-681 [doi]
- Social Capital in Virtual OrganizationsSaad Alqithami, Henry Hexmoor. 682-687 [doi]