Abstract is missing.
- Estimating Proper Communication Distance for Epidemic Routing in Japanese Urban Areas Using SNS-Based People Flow DataAkihiro Fujihara. 1-8 [doi]
- The Research of Possibility of Sharing Use of Wireless and Mobile Technologies for Organizing the Radio Channels of Operation Control System of Earthmoving and Construction MachinesTatyana Golubeva, Sergey Konshin. 9-14 [doi]
- The Benefits and Risks of Enterprise Social NetworksMartina Drahosová, Peter Balco. 15-19 [doi]
- BEEC: Balanced Energy Efficient Circular Routing Protocol for Underwater Wireless Sensor NetworksAhmad Raza Hameed, Nadeem Javaid, Saif ul Islam, Ghufran Ahmed, Umar Qasim, Zahoor Ali Khan. 20-26 [doi]
- Multi-class Intelligent Fault Diagnosis Approach Based on Modified Relevance Vector MachineJianshe Kang, Kun Wu, Kuo Chi, Yinxia Du. 27-30 [doi]
- Node Importance of Complex Networks Based on Cascading Failure DynamicZhen-hua Li, Dong-Li Duan. 31-35 [doi]
- Design Patterns in Management SystemsViliam Malcher. 36-39 [doi]
- Data Understanding Techniques for Management Application and CryptographyMarek R. Ogiela, Lidia Ogiela. 40-43 [doi]
- Identity Based Proxy Re-Encryption Scheme (IBPRE+) for Secure Cloud Data SharingXu an Wang, Fatos Xhafa, Zhiheng Zheng, Jinting Nie. 44-48 [doi]
- A Cloud Platform for CAE Simulation in Supercomputing EnviromentZiyun Deng, Jing Zhang. 49-52 [doi]
- Review of Virtual Memory Optimization in Cloud EnvironmentYe Ding, He Xu, Peng Li, Jie Ding. 53-58 [doi]
- Locality-Aware and Energy-Aware Job Pre-Assignment for MapreduceLei Chen, Jing Zhang, Lijun Cai, Ziyun Deng, Tinqing He, Xuan Wang. 59-65 [doi]
- Using Octree Maps and RGBD Cameras to Perform Mapping and A* NavigationPeter Beno, Vladimir Pavelka, Frantisek Duchon, Martin Dekan. 66-72 [doi]
- Agent-Based Cloud Computing Systems for Traffic ManagementJán Vascák, Jakub Hvizdo, Michal Puheim. 73-79 [doi]
- Neural Network Based Ball Tracking for Robot NaoDenis Vere, Rudolf Jaka, Jakub Hvizdo. 80-85 [doi]
- Network Based Linear Population Size Reduction in SHADEAdam Viktorin, Michal Pluhacek, Roman Senkerik. 86-93 [doi]
- Research on Failure Prognostics Method of Electronic System Based on Improved Fruit Fly Algorithm and Grey Fast Relevance Vector MachineKun Wu, Jianshe Kang, Xuan Wang. 94-98 [doi]
- Multi-sensor Fusion Approach for Fire Alarm Using BP Neural NetworkYan-Hua Liang, Wei-Min Tian. 99-102 [doi]
- Providing Smart Objects with Intelligent Tutoring Capabilities by Semantic TechnologiesGiuseppe Fenza, Vincenzo Loia, Francesco Orciuoli. 103-109 [doi]
- Apache Mahout's k-Means vs Fuzzy k-Means Performance EvaluationFatos Xhafa, Adriana Bogza, Santi Caballé, Leonard Barolli. 110-116 [doi]
- Ontology-Based Approach for Semantic Description and the Discovery of e-Learning Web ServicesKahina Rabahallah, Faiçal Azouaou, Mohamed Tayeb Laskri. 117-124 [doi]
- An Optimization Research on the Alternate Interval for Electronic ProductsYutao Wu, Xisheng Jia, Liang Wen, Xu'an Wang. 125-129 [doi]
- The Research of Enhancing the Dependability of Cloud Services Using Self-Healing MechanismFeng Ye, Shengyan Wu, Qian Huang, Xu an Wang. 130-134 [doi]
- An Improved Community Detection Algorithm Based on the Distance DynamicsTao Meng, Lijun Cai, Tinqinq He, Lei Chen, Ziyun Deng. 135-142 [doi]
- Traffic Control Method for Interactive Projection Mapping Control SystemYoshifumi Kamada, Tsuyoshi Yamasaki, Yuki Tsuno, Nobuyuki Tsuchimura, Hiroyoshi Miwa. 143-149 [doi]
- Determinism through Path Diversity: Why Packet Replication Makes SenseJésica de Armas, Pere Tuset, Tengfei Chang, Ferran Adelantado, Thomas Watteyne, Xavier Vilajosana. 150-154 [doi]
- Creating Dynamically Changing World Map for Computer Games with Advanced Image Processing - A Use CaseTomasz Hachaj. 155-160 [doi]
- A Stackelberg Game for DSTC-Based Cognitive Radio Networks with Multiple Cooperative RelaysLijie Wang, Yi Tang, Bo Yuan, Dangfeng Zhu. 161-166 [doi]
- An Identity-Based Proxy Signature Scheme from Lattices in the Standard ModelWang Li. 167-172 [doi]
- RSM and VSM: Two New Routing Protocols for Underwater WSNsBabar Ali, Nadeem Javaid, Saif ul Islam, Ghufran Ahmed, Umar Qasim, Zahoor Ali Khan. 173-179 [doi]
- Creating Complex Networks Using Multi-swarm PSOMichal Pluhacek, Roman Senkerik, Adam Viktorin, Ivan Zelinka. 180-185 [doi]
- On the Transforming of the Indices Selection Mechanism inside Differential Evolution into Complex NetworkRoman Senkerik, Adam Viktorin, Michal Pluhacek. 186-192 [doi]
- On Evolutionary Dynamics Modeled by Ant AlgorithmIvan Zelinka, Lukas Tomaszek, Lumir Kojecky. 193-198 [doi]
- An Efficient Proxy Re-Encryption Based on (Semi) Group Factorization ProblemsLicheng Wang, Jing Li, Jianhua Yan, Zhiguo Qu. 199-202 [doi]
- New Related-Key Impossible Differential Attack on MIBS-80Lu Cheng, Peng Xu, Yuechuan Wei. 203-206 [doi]
- Limitations on Low Variance k-Fold Cross Validation in Learning Set of Rules InducersMichal Vasinek, Jan Platos, Václav Snásel. 207-214 [doi]
- Point-Based Scan Matching by Differential EvolutionPavel Krömer, Jaromir Konecny, Michal Prauzek. 215-221 [doi]
- Optimal Allocation of Public Parking Slots Using Evolutionary AlgorithmsJavier Arellano-Verdejo, Enrique Alba. 222-228 [doi]
- Smart Traffic Lights: A First Parallel Computing ApproachDimitris Souravlias, Gabriel Luque, Enrique Alba, Konstantinos E. Parsopoulos. 229-236 [doi]
- Mission-Oriented Maintenance Optimization Subject to Resources ConstraintsWenbin Cao, Qiwei Hu, Wenyuan Song, Yutao Wu. 237-243 [doi]
- Comparative Assessment of Performance for Home Energy Management Controller in Smart GridMuhammad Hassan Rahim, Nadeem Javaid, Muhammad Bilal Janjua, Muhammad Naeem, Zahoor Ali Khan, Umar Qasim. 244-250 [doi]
- The Features of Low-Connectivity Essential ProteinsYun-yuan Dong. 251-254 [doi]
- A Behavioral Biometrics Based and Machine Learning Aided Framework for Academic Integrity in E-AssessmentAlexander Amigud, Joan Arnedo-Moreno, Thanasis Daradoumis, Ana-Elena Guerrero-Roldán. 255-262 [doi]
- How to Solve Common Human Actions Recognition Use Cases with Gesture Description LanguageTomasz Hachaj. 263-269 [doi]
- Knowledge Management Approaches for Data UnderstandingLidia Ogiela, Marek R. Ogiela. 270-273 [doi]
- Using Exploratory Analysis Modeling to Study the Correlation between EEG Signal and Respiratory RhythmXuan Guo, Yixiao Sun, Zhiting Xiao, Wenhui Wu. 274-279 [doi]
- Identity Authentication System Based on Fingerprint Identification and Pulse CertificationQian Xu, Jie Deng. 280-284 [doi]
- New Differential Fault Attack on Lightweight Cipher LBlockYuechuan Wei, Yisheng Rong, Xu an Wang. 285-288 [doi]
- Wide Image Geometric Mosaic and Measure Algorithm of Mobile Mapping SystemWu Meng, Gao Yang, Guan Bin, Li Kui. 289-293 [doi]
- Research of Web Resources Protection Based on Digital Watermarking and Digital SignatureChun He. 294-297 [doi]
- A Novel QoS-Aware Load Balancing Mechanism in Cloud EnvironmentFeng Ye, Shengyan Wu, Qian Huang, Xu an Wang. 298-301 [doi]
- Binocular Stereo Vision Based Face Recognition Using Sparse RepresentationYang Liu, Yubo Yang, Jing Wang. 302-306 [doi]
- Retail Commodity Sale Forecast Model Based on Data MiningJing Zhang, Juan Li. 307-310 [doi]
- A Star-Topological Privacy Encryption for Telecare Medical Information SystemsJing Li, Licheng Wang, Xinxin Niu. 311-317 [doi]
- A New Approach to Security Analysis of Wireless Sensor Networks for Smart Home SystemsMiao Zhang, Yang Liu, Jiteng Wang, Yangyu Hu. 318-323 [doi]
- Research and Design of Dedicated Instruction for Reconfigurable Matrix Multiplication of VLIW ProcessorYang Su, Yuechuan Wei, Mingshu Zhang. 324-327 [doi]
- Non-transferable Unidirectional Proxy Re-Encryption Scheme for Secure Social Cloud Storage SharingXu an Wang, Fatos Xhafa, Wei Hao, Wei He. 328-331 [doi]
- Position Aware Mobility Pattern of AUVs for Avoiding Void Zone in Underwater WSNsMudassir Ejaz, Anwar Khan, Muhammad, Umar Qasim, Zahoor Ali Khan, Nadeem Javaid. 332-338 [doi]
- Towards a Personalized Summative Model Based on Learner's PreferencesDavid Bañeres. 339-344 [doi]
- A Preliminary Study about the Analytic Maturity of Educational OrganizationsIsabel Guitart, Jordi Conesa, Jordi Casas. 345-350 [doi]
- eOrient@ - A Recommender System to Address Life-Long Learning and Promote EmployabilityDavid Bañeres, Jordi Conesa. 351-356 [doi]
- On the Road to Speed-Reading and Fast Learning with CONCEPTUMDaniele Toti, Marco Rinelli. 357-361 [doi]
- A Prototype of an eLearning Platform in Support for Learning Analytics and GamificationDavid Gañán, Santi Caballé, Robert Clarisó, Jordi Conesa. 362-369 [doi]
- Learning through the Design of Interactive Storie: Exploring the Concept of StoryworldGiuliana Dettori. 370-374 [doi]
- Author Evaluation Based on H-Index and Citation ResponseMilos Kudelka, Jan Platos, Pavel Krömer. 375-379 [doi]
- Intelligent SMS Spam Filtering Using Topic ModelJialin Ma, Yongjun Zhang, Jinling Liu, Kun Yu, Xuan Wang. 380-383 [doi]
- A Rational Secret Sharing Relying on ReputationJianghao Jin, Xie Zhou, Chuangui Ma, Xu'an Wang. 384-387 [doi]
- A Secure Private Information Retrieval in Cloud EnvironmentHaibin Yang, Ling Zhang. 388-391 [doi]
- Design and Implementation of Library Books Search and Management System Using RFID TechnologyHaiming Cheng, Ling Huang, He Xu, Yifan Hu, Xu an Wang. 392-397 [doi]
- A Novel Secure Architecture for the Internet of ThingsJiewei Qian, He Xu, Peng Li. 398-401 [doi]
- A Novel Multi-class Classification Approach Based on Fruit Fly Optimization Algorithm and Relevance Vector MachineJianshe Kang, Kun Wu, Kuo Chi, Xuan Wang. 402-406 [doi]
- A Calibration Approach for Accuracy Infrared TemperatureYan-Hua Liang, Ze-Dong Qian. 407-410 [doi]
- Bayesian Parameter Estimation of Weibull Mixtures Using Cuckoo SearchKuo Chi, Jianshe Kang, Kun Wu, Xuan Wang. 411-414 [doi]
- Numerical Investigation of Initial Condition and Singular Perturbation Parameter Value Influence on the Dynamical System Oscillatory BehaviourZuzana Sutova, Robert Vrabel. 415-419 [doi]
- The Research of the University Public Opinion Management on InternetHongxia Li, Kai Yan. 420-422 [doi]
- Research on Selecting Emergency Material Production Enterprises Based on Productivity ReserveLiying Chen, Feng Wang, Yutao Wu. 423-427 [doi]
- A Bi-objective Model for Relief Supply Location in Post-Disaster ManagementSeyed Mohammad Khalili, M. Babagolzadeh, Maziar Yazdani, M. Saberi, E. Chang. 428-434 [doi]
- A Goal Programming Approach for Group Decision Making with Four Incomplete Preference RelationsBen Cheng, Shan Hu, Jiang-Wei Wang, Yun-yuan Dong. 435-438 [doi]
- Network Design Method by Finding Server Placement and Protected Links to Keep Connectivity to Servers Against Link FailuresDaishi Irie, Hiroyoshi Miwa. 439-444 [doi]
- Network Design Method Based on Link Protection Taking Account of the Connectivity and Distance Between SitesTsuyoshi Yamasaki, Makoto Anan, Hiroyoshi Miwa. 445-450 [doi]
- Proposal of the Network Resonance Method for Estimating Eigenvalues of the Scaled Laplacian MatrixSatoshi Furutani, Chisa Takano, Masaki Aida. 451-456 [doi]
- Making TCP/NC Adjustable to Time Varying Loss RatesNguyen Viet Ha, Kazumi Kumazoe, Masato Tsuru. 457-462 [doi]
- The Price of UnfairnessMario Koeppen, Kaori Yoshida. 463-468 [doi]
- Cloud Security: From Per-Provider to Per-Service Security SLAsAlessandra De Benedictis, Valentina Casola, Massimiliano Rak, Umberto Villano. 469-474 [doi]
- Certificateless Multi-signcryption Scheme in Standard ModelXuguang Wu, Minqing Zhang, Shuaishuai Zhu. 475-479 [doi]
- A Multi-sensor Data Fusion Approach for Detecting Direct Debit FraudsFerdinando Campanile, Gianfranco Cerullo, Salvatore D'Antonio, Giovanni Mazzeo, Gaetano Papale, Luigi Sgaglione. 480-485 [doi]
- Data Leakage Detection Using System Call ProvenanceAbir Awad, Sara Kadry, Guraraj Maddodi, Saul Gill, Brian Lee. 486-491 [doi]
- Fully Detection of Illegal Value Use DefectsYukun Dong, Yalan Wang. 492-497 [doi]
- Intrusion Detection Techniques Based on Cutting-Based Real-Valued Negative SelectionYang Lei, Xu'an Wang, Hongyan Yin. 498-503 [doi]
- Using Topic Model for Intelligent Computer-Aided Diagnosis in Traditional Chinese MedicineJialin Ma, Yongjun Zhang. 504-507 [doi]
- Research on the Job Stress Structure of Coal Miners Based on Textual AnalysisHongxia Li, Hongxi Di. 508-511 [doi]
- Data Security and Privacy Information Challenges in Cloud ComputingWeiwei Kong, Yang Lei, Jing Ma. 512-514 [doi]
- The Prediction of PM2.5 Value Based on ARMA and Improved BP Neural Network ModelHongxia Zhu, Xiuhua Lu. 515-517 [doi]
- Intrusion Detection Techniques Based on Improved Intuitionistic Fuzzy Neural NetworksYang Lei, Jia Liu, Hongyan Yin. 518-521 [doi]
- An Exact Method for Solving Selective Maintenance Problems Considering Imperfect MaintenanceWenbin Cao, Wenyuan Song, Qiwei Hu, Yinxia Du. 522-526 [doi]
- Some Practical Properties of AP14Tanping Zhou, Xiaoyuan Yang 0002, Xu an Wang, Yiliang Han. 527-531 [doi]
- Damage Effectiveness Evaluation on the Time Sensitive Group Targets for Trajectory Correction Missile Carrying with Terminal-Sensitive ProjectilesJie Li, Hong Zhang. 532-537 [doi]
- A Review of the Research Literature on Civil-Military Integration Equipment Support Reform in the United States and Its EnlightenmentYan-fei Zhang, Jun-Yan Wu, Jie Li, Wan-Yi Liu. 538-543 [doi]
- The Infrared and Visible Light Image Fusion Based on the Non-subsample Shearlet Transform and Heat Source Concentration RatioJie Luo, Weiwei Kong. 544-547 [doi]
- Challenges in Efficient Customer Recognition in Contact Centre: State-of-the-Art Survey by Focusing on Big Data Techniques ApplicabilityMorteza Saberi, Anne Karduck, Omar Khadeer Hussain, Elizabeth Chang. 548-554 [doi]