Abstract is missing.
- Collaboration and Locality in CrowdsourcingAndreas Mladenow, Christine Bauer, Christine Strauss, Michal Gregus. 1-6 [doi]
- Application of SNS-Based Collaboration Scheme into Reproductive Design Education and Collaborative Design with Information SharingMasatoshi Imai, Yoshiro Imai. 7-13 [doi]
- Collaborative Tool to Enhance Quality Evaluation of Higher Education ProgrammesDavid Bañeres, Montse Serra, M. Elena Rodríguez. 14-20 [doi]
- A Model of Mining Noise-Tolerant Frequent Itemset in Transactional DatabasesXiaomei Yu, Hong Wang, Xiangwei Zheng, Shuangshuang Liu. 21-24 [doi]
- Chip Designed Health Transducer and Wireless Sensor for Intelligent Networking ApplicationWen Cheng Lai. 25-30 [doi]
- Proposing an Extended iBeacon System for Indoor Route GuidanceAkihiro Fujihara, Takuma Yanagizawa. 31-37 [doi]
- Performance Analysis of WMN-GA Simulation System for Different WMN Architectures and Routing Protocols Considering Exponential DistributionAdmir Barolli, Tetsuya Oda, Keita Matsuo, Leonard Barolli, Fatos Xhafa, Vincenzo Loia. 38-44 [doi]
- Management of Networking Systems Using Design PatternsViliam Malcher. 45-48 [doi]
- Comparison of Cognitive Information Systems Supporting Management TasksLidia Ogiela, Marek R. Ogiela. 49-56 [doi]
- An Improved DCI_Closed AlgorithmYongming Miao, Hong Wang. 57-61 [doi]
- Collaborative Composition of Production Services in Multi-agent Systems Based on AuctionsFu-Shiung Hsieh. 62-69 [doi]
- Process as a Service (PraaS) for Planning of Resources in OrganizationsPeter Balco, Michal Gregus. 70-73 [doi]
- Application of WMN-SA Web Interface and NS-3 for Optimization and Analysis in WMNs Considering Different Number of Mesh Routers and ArchitecturesVladi Kolici, Tetsuya Oda, Admir Barolli, Algenti Lala, Leonard Barolli, Fatos Xhafa. 74-81 [doi]
- A Modified Efficient Certificateless Signature Scheme without Bilinear PairingsLiangliang Wang, Kefei Chen, Yu Long, Xianping Mao, Huige Wang. 82-85 [doi]
- A Novel Exemplar-Based Image Inpainting AlgorithmYing Liu, Chanjuan Liu, Hailin Zou, Shusen Zhou, Qian Shen, Tong-tong Chen. 86-90 [doi]
- Human Thermal Face Recognition Based on Random Linear Oracle (RLO) EnsemblesTarek Gaber, Alaa Tharwat, Abdelhameed Ibrahim, Václav Snásel, Aboul Ella Hassanien. 91-98 [doi]
- Muzzle-Based Cattle Identification Using Speed up Robust Feature ApproachShaimaa Ahmed El-Said, Tarek Gaber, Alaa Tharwat, Aboul Ella Hassanien, Václav Snásel. 99-104 [doi]
- An Unusual Approach to Basic Challenges of Data MiningThomas H. Lenhard, Michal Gregu. 105-109 [doi]
- Composing and Solving General Differential Equations Using Extended Polynomial NetworksLadislav Zjavka, Václav Snásel. 110-115 [doi]
- Classification with Extreme Learning Machine on GPUToma Jeowicz, Petr Gajdos, Vojtech Uher, Václav Snásel. 116-122 [doi]
- A Method of Image Classification with Optimized BP Neural Network by Genetic AlgorithmQian Shen, Chanjuan Liu, Hailin Zou, Shusen Zhou, Tong-tong Chen. 123-129 [doi]
- Effects of Packet Loss on Reliability of JXTA-Overlay P2P Platform: A Comparison Study for Two Fuzzy-Based SystemsYi Liu, Shinji Sakamoto, Evjola Spaho, Keita Matsuo, Leonard Barolli, Fatos Xhafa. 130-137 [doi]
- Analysis of Trends in Authors Publication ActivitiesMartin Radvanský, Milos Kudelka, Václav Snásel. 138-143 [doi]
- Data Owner Based Attribute Based EncryptionJindan Zhang, Xu an Wang, Jianfeng Ma. 144-148 [doi]
- Development and Evaluation of Adobe Flash Based CPU Scheduling Simulator Executable on Major Multiple Web BrowsersYoshiro Imai, Kei Takeichi. 149-155 [doi]
- An Ontology about Emotion Awareness and Affective Feedback in ElearningMarta Arguedas, Fatos Xhafa, Thanasis Daradoumis. 156-163 [doi]
- Design and Implementation of a Simulation System Based on Particle Swarm Optimization for Node Placement Problem in Wireless Mesh NetworksShinji Sakamoto, Tetsuya Oda, Makoto Ikeda, Leonard Barolli. 164-168 [doi]
- Evolutionary Algorithm Based on Partition Crossover (EAPX) for the Vehicle Routing ProblemTakwa Tlili, Francisco Chicano, Saoussen Krichen, Enrique Alba. 169-175 [doi]
- Monte Carlo Schemata Searching for Physical Activity RecognitionAlejandro Baldominos, Pedro Isasi, Yago Sáez, Bernard Manderick. 176-183 [doi]
- Parallel Hybrid Trajectory Based Metaheuristics for Real-World ProblemsGabriel Luque, Enrique Alba. 184-191 [doi]
- Estimating Harvestable Solar Energy from Atmospheric Pressure Using Support Vector RegressionPavel Krömer, Petr Musílek, James Rodway, Marek Reformat, Michal Prauzek. 192-199 [doi]
- Energy Availability Forecasting for Harvesting-aware Wireless Sensor Networks: Analysis of Energy Demand of a Predictor Based on Evolutionary Fuzzy RulesMichal Prauzek, Petr Musílek, Pavel Krömer, James Rodway, Martin Stankus, Jakub Hlavica. 200-203 [doi]
- Evaluation of Errors Caused by Lowering Frequency of Measurements of an Environmental Sensor StationObiora Sam Ezeora, Jana Heckenbergerova, Petr Musílek, Pavel Krömer. 204-210 [doi]
- On Using Palm and Finger Movements as a Gesture-Based BiometricsMarcin Piekarczyk, Marek R. Ogiela. 211-216 [doi]
- Performance Evaluation of Data Mining Frameworks in Hadoop Cluster Using Virtual Campus Log FilesFatos Xhafa, Daniel Ramirez, Daniel Garcia, Santi Caballé. 217-222 [doi]
- A Fundamental Study on Coded Aperture Design for Depth from Projector Defocus Based on Evolutionary Multi-objective OptimizationYudai Mido, Yuuki Horita, Kentaro Nakai, Taishi Megano, Satoshi Ono, Hiroshi Kawasaki. 223-227 [doi]
- An Efficiency Enhanced Cluster Expanding Block Algorithm for Copy-Move Forgery DetectionCheng-Shian Lin, Chien-Chang Chen, Yi-Cheng Chang. 228-231 [doi]
- A GA-Based Simulation System for WMNs: Performance Analysis of WMN-GA System for Different WMN Architectures Considering DCF and EDCATetsuya Oda, Makoto Ikeda, Leonard Barolli, Fatos Xhafa, Makoto Takizawa. 232-238 [doi]
- Contents Delivery Method Using Route Prediction in Traffic Offloading by V2XShunsuke Otsuki, Hiroyoshi Miwa. 239-245 [doi]
- Minimum Background Fairness for Quality Video Delivery over the LTE DownlinkWen-Ping Lai, Ching-Hsiang Lin, En-Cheng Liou. 246-251 [doi]
- A Predicate Encryption Scheme Supporting Multiparty Cloud ComputationTan Zhenlin, Zhang Wei. 252-256 [doi]
- Controlling Outsourcing Data in Cloud Computing with Attribute-Based EncryptionShuaishuai Zhu, Yiliang Han, Yuechuan Wei. 257-261 [doi]
- Depth-Based Energy-Balanced Hybrid Routing Protocol for Underwater WSNsTayyaba Liaqat, Nadeem Javaid, Syed Muaraf Ali, Muhammad Imran, Mohammed Abdullah Alnuem. 262-267 [doi]
- A BGN-Type Multiuser Homomorphic Encryption SchemeZhang Wei. 268-271 [doi]
- A Knowledge Management Process to Enhance Trustworthiness-based Security in On-line Learning TeamsJorge Miguel, Santi Caballé, Fatos Xhafa. 272-279 [doi]
- Towards a Multi-modal Emotion-Awareness e-Learning SystemSanti Caballé. 280-287 [doi]
- Improving e-Assessment in Collaborative and Social Learning SettingsNestor Mora, Santi Caballé, Thanasis Daradoumis. 288-293 [doi]
- Analytic Information Systems in the Context of Higher Education: Expectations, Reality and TrendsIsabel Guitart, Jordi Conesa. 294-300 [doi]
- A Semi-automatic System to Detect Relevant Learning Content for Each SubjectIsabel Guitart, Joaquim Moré, Jordi Duran, Jordi Conesa, David Bañeres, David Gañán. 301-307 [doi]
- Adaptive Serious Games for Emergency Evacuation TrainingNicola Capuano, Richard King. 308-313 [doi]
- Towards a General Adaptive e-Assessment SystemDavid Bañeres, Xavier Baró, Ana-Elena Guerrero-Roldán, M. Elena Rodríguez. 314-321 [doi]
- Efficient Area Association Using Space Filling CurvesJan Platos, Pavel Krömer, Václav Snásel. 322-326 [doi]
- Computation of Kamada-Kawai Algorithm Using Barzilai-Borwein MethodLukás Pospísil, Martin Hasal, Jana Nowaková, Jan Platos. 327-333 [doi]
- On Evaluation of Evolutionary Networks Using New Temporal Centralities AlgorithmIvan Zelinka, Lukas Tomaszek, Václav Snásel. 334-339 [doi]
- Towards a Kansei WordNet by Color Design SNS EvaluationKaori Yoshida, Dwilya Makiwan, Mario Koeppen. 340-345 [doi]
- Differential Evolution Enhanced by the Closeness Centrality: Initial StudyLenka Skanderova, Tomas Fabian, Ivan Zelinka. 346-353 [doi]
- Spam Detection Based on Nearest Community ClassifierMichal Prilepok, Milos Kudelka. 354-359 [doi]
- Video Steganography Algorithm Based on Trailing CoefficientsYingnan Zhang, Minqing Zhang, Ke Niu, Jia Liu. 360-364 [doi]
- A Novel Information Hiding Algorithm Based on Grey Relational Analysis for H.264/AVCYingnan Zhang, Minqing Zhang, Jingjing Wang, Ke Niu. 365-369 [doi]
- Bit-pattern Based Integral Attack on ICEBERGYuechuan Wei. 370-373 [doi]
- Fine-Grained Privacy-Preserving Spatiotemporal Matching in Mobile Social NetworksXiuguang Li, Kai Yang, Hui Li. 374-378 [doi]
- New Compact CCA Secure Elgamal Scheme in the Random Oracle ModelXu an Wang, Jianfeng Ma, Xiaoyuan Yang 0002. 379-383 [doi]
- Parallel NoSQL Entity Resolution Approach with MapReduceKun Ma, Bo Yang. 384-389 [doi]
- An Energy-saving Geographic Routing in Wireless Sensor NetworkXiao-ou Song. 390-393 [doi]
- Analysis and Implementation of Modified Costas Loop for QPSKXiao-ou Song. 394-397 [doi]
- A Novel Detection Scheme Based on D-S Evidence Theory in Wireless Sensor NetworksKai Yang, Shuguang Liu, Xiuguang Li. 398-401 [doi]
- Parallel Proxy-Signcryption Scheme in Cloud EnvironmentWenping Deng, Xuguang Wu. 402-406 [doi]
- Two-Dimensional Private Set Intersection in Big DataXiuguang Li, Pan Feng, Shuguang Liu. 407-410 [doi]
- Developing a Fuzzy Predictive Aid System in Contact Centres for an Efficient Customer Recognition ProcessMorteza Saberi, Zahra Saberi. 411-416 [doi]
- A Road Map to Risk Management Framework for Successful Implementation of Cloud Computing in OmanFatma Al-Musawi, Ali H. Al-Badi, Saqib Ali. 417-422 [doi]
- An Analysis of the Security Threats and Vulnerabilities of Cloud Computing in OmanAmira M. AlZadjali, Ali H. Al-Badi, Saqib Ali. 423-428 [doi]
- Handling Continuity in Seamless Learning via Opportunistic Recognition and Evaluation of Activity CohesionGiuseppe D'Aniello, Angelo Gaeta, Francesco Orciuoli, Pier Giuseppe Rossi, Stefania Tomasiello. 429-434 [doi]
- A Smart Competence-Based Prioritisation for Learning ProgrammesMatteo Gaeta, Antonio Marzano, Sergio Miranda, Kurt Sandkuhl. 435-439 [doi]
- Situation Awareness Enabling Decision Support in Seamless LearningGiuseppe D'Aniello, Matteo Gaeta, Vincenzo Loia, Francesco Orciuoli, Demetrios G. Sampson. 440-445 [doi]
- Semi-automatic Generation of an Object-Oriented API Framework over Semantic RepositoriesDaniele Toti, Marco Rinelli. 446-449 [doi]
- A Visual Ontology Management System for Handling, Integrating and Enriching Semantic RepositoriesDaniele Toti, Andrea Longhi. 450-453 [doi]
- A Preliminary Investigation of a Semi-Automatic Criminology Intelligence Extraction Method: A Big Data ApproachMarcello Trovati, Philip Hodgsons, Charlotte Hargreaves. 454-458 [doi]
- A Comprehensive Evaluation of a Novel Approach to Probabilistic Information Extraction from Large Unstructured DatasetsMarcello Trovati. 459-462 [doi]
- Fuzzy Partition Rules for Heart Arrhythmia DetectionOmar Behadada. 463-466 [doi]
- A Survey on Constructing Rosters for Air Traffic ControllersRichard Conniss. 467-471 [doi]
- A Critical Analysis of the Efficiencies of Emerging Wireless Security Standards Against Network AttacksKarolis Vilius, Lu Liu, John Panneerselvam, Thomas Stimpson. 472-477 [doi]
- Recent Trends and Some Lessons for Serious Network Failures in JapanMasato Uchida. 478-485 [doi]
- Polynomial-time Algorithm for Server Location Method for Keeping Small Distance from Clients to Servers During FailuresShinya Kurimoto, Nao Maeda, Hiroyoshi Miwa. 486-491 [doi]
- Energy-Efficient Link and Node Power Control for Avoidance of Congestion in Accordance with Traffic Load FluctuationsYuya Kawata, Akira Noguchi, Hiroyoshi Miwa. 492-497 [doi]
- A Short Note on the Solution of the Prisoner's DilemmaMario Köppen, Masato Tsuru. 498-502 [doi]