Abstract is missing.
- Comprehensive GPSR Routing in VANET Communications with Adaptive Beacon IntervalJia Li, Ping Wang, Chao Wang. 1-6 [doi]
- Intelligent Guardrails: An IoT Application for Vehicle Traffic Congestion Reduction in Smart CityMohammad Reza Jabbarpour, Armin Nabaei, Houman Zarrabi. 7-13 [doi]
- User Location Prediction by Diffusion-Type Estimation Using Location-Based SNS Check-in DataKen-ichiro Nishioka, Yoshitatsu Matsuda, Kazunori Yamaguchi. 14-19 [doi]
- Real-Time Energy Management Optimization for Smart HouseholdLeehter Yao, Jin-Yi Shen, Wei Hong Lim. 20-26 [doi]
- A Load Balance Channel Auction Mechanism in Multi-Interface Multi-Channel Wireless Mesh NetworksBaohong Ma, Shibiao He, Tao Liang, Hongjuan Wang, Wenjing Zhang. 27-32 [doi]
- Elastic Management of Physical Spaces and Objects in Multi-Hospital EnvironmentsRodrigo Da Rosa Righi, Gustavo Rostirolla, Cristiano André da Costa, Murillo Goulart, Erico Rocha. 33-38 [doi]
- Analysis on Physical-Layer Security for Internet of Things in Ultra Dense Heterogeneous NetworksZhihao Zhong, Jianhua Peng, Kaizhi Huang, Zhou Zhong. 39-43 [doi]
- Performance Analysis of Split Preamble RAN Overload Control Method for Massive Access of M2M Devices in LTE NetworksAmeneh Pourmoghadas, P. G. Poonacha, Neda Khoenihay. 44-50 [doi]
- An Enhanced Friendship-Based Routing Scheme Exploiting Regularity in an Opportunistic NetworkJi-Hyeun Yoon, Sun-Kyum Kim, JunYeop Lee, Ki-Young Jang. 51-57 [doi]
- An Efficient Routing Protocol Based on Data Posting in an Opportunistic NetworkJi-Hyeun Yoon, Jae-Ho Choi. 58-65 [doi]
- Supporting IoT Multi-Tenancy on Edge DevicesMayra Samaniego, Ralph Deters. 66-73 [doi]
- Performance Analysis of Wireless Powered MIMO Communications Using Stochastic GeometrySiyuan Zhou, Chengxiang Li. 74-79 [doi]
- 3D-LSR: A New Model for Skeletal Representation and SegmentationDi Zhang, Xiaojuan Ban, Di Wu, Hao Wang. 80-86 [doi]
- Self-Learning Fuzzy Controller-Based Energy Management for Smart HomeLeehter Yao, Wei Hong Lim, Chien-Chi Lai. 87-93 [doi]
- Queueing Analysis for Delay/Disruption Tolerant Networks with Random Link InterruptionsYanglong Wu, Zexue Li. 94-99 [doi]
- Research of Food Traceability Technology Based on the Internet of Things Name ServiceZhiqian Wang, Tian Ye, Anping Xiong. 100-106 [doi]
- A Smart Gateway Framework for IOT ServicesYann-Hang Lee, Shankar Nair. 107-114 [doi]
- Obfuscating Software Puzzle for Denial-of-Service Attack MitigationYongdong Wu, Vivy Suhendra, Hendra Saputra, Zhigang Zhao. 115-122 [doi]
- A Collision Free Neighbor Discovery Protocol for Wireless Positioning ApplicationsWei Liu, Xue-En Li, Yang-Gao Ou, Bo You. 123-128 [doi]
- I Am Joe's Fridge: Scalable Identity in the Internet of ThingsPrashant Anantharaman, Kartik Palani, David M. Nicol, Sean W. Smith. 129-135 [doi]
- An Improved Ant Colony Optimization and Its Application on TSP ProblemWei Luo, Dong Lin, Xinxin Feng. 136-141 [doi]
- Goldfish: In-Memory Massive Parallel Processing SQL Engine Based on Columnar StoreJin Wang, Hancong Duan, Geyong Min, Guangqiang Ying, Song Zheng. 142-149 [doi]
- Novel Hybrid Scheme of Solar Energy Forecasting for Home Energy Management SystemLeether Yao, Teng Shih Tsai. 150-155 [doi]
- Smartphone-Based Place Profiling in a Privacy-Preserving MannerMiao Lin, Manoranjan Dash, Watt Pei Yi, Yunye Jin. 156-163 [doi]
- Autonomous Vehicle Security: A Taxonomy of Attacks and DefencesVrizlynn L. L. Thing, Jiaxi Wu. 164-170 [doi]
- Multi-Level Ultra Low-Power Mode Support Mechanisms for Wearable DeviceHyoung Jun Park, Duk-Kyun Woo, Seon-Tae Kim, Pyeong-Soo Mah. 171-176 [doi]
- The Transreality Interaction Platform: Enabling Interaction across Physical and Virtual RealityKyle A. Martin, Joseph J. LaViola. 177-186 [doi]
- Enhancing Lightweight M2M Operations for Managing IoT GatewaysBilhanan Silverajan, Mert Ocak, Jaime Jimenez, Antti Kolehmainen. 187-192 [doi]
- Maximizing Network Coding Opportunity through Buffer Management in Wireless NetworksQinglong Liu, Gang Wang, Gang Feng, Yantao Guo, Qian Yao. 193-198 [doi]
- A Novel Confident Information Coverage Hole Detection Algorithm in Sensor NetworksZenghui Zou, Xianjun Deng, Lingzhi Yi, Zujun Tang, Minghua Wang, Xueyu Gong. 199-204 [doi]
- Improved Sparsest Random Scheduling for Compressive Data Gathering under Unreliable Link in Wireless Sensor NetworksZhijie Fei, Fang Lin, Qiang Zhang, Junying Chen, Jiangwen Wan. 205-210 [doi]
- A Reliable MAC Protocol for Hybrid Wireless Sensor NetworksSijun Dou, Danpu Liu. 211-216 [doi]
- Energy-Efficient Mobile Data Acquisition Using Opportunistic Internet of Things Gateway ServicesMohan Liyanage, Chii Chang, Satish Narayana Srirama. 217-222 [doi]
- SmartDog: Real-Time Detection of Smartphone TheftShan Chang, Ting Lu, Hui Song. 223-228 [doi]
- Graph Based Clustering for Two-Tier Architecture in Internet of ThingsJ. Sathish Kumar, Mukesh A. Zaveri. 229-233 [doi]
- Can SDN Technology Be Transported to Software-Defined WSN/IoT?Thi Minh Chau Nguyen, Doan B. Hoang, Zenon Chaczko. 234-239 [doi]
- Smart World of Internet of Things (IoT) and Its Security ConcernsJonathan Charity Talwana, Huang Jian Hua. 240-245 [doi]
- Research of Secure Service Composition Based on Semantic Security PolicyZhengqiu He, Fangxia Xue, Wenfu Liu, Rongmao He, Zhongfu Xu. 246-251 [doi]
- Contrasting Internet of Things and Wireless Sensor Network from a Conceptual OverviewJohana A. Manrique, Johan S. Rueda-Rueda, Jesús M. T. Portocarrero. 252-257 [doi]
- A New Outlier Detection Algorithm Based on Kernel Density Estimation for ITSYiwen Xu, Ningbin Xu, Xinxin Feng. 258-262 [doi]
- Automatic Ocular Disease Screening and Monitoring Using a Hybrid Cloud SystemFengshou Yin, Beng Hai Lee, Ai Ping Yow, Ying Quan, Damon Wing Kee Wong. 263-268 [doi]
- WiseWare: A Device-to-Device-Based Business Process Management System for Industrial Internet of ThingsJakob Mass, Chii Chang, Satish Narayana Srirama. 269-275 [doi]
- SDGR: An SDN-Based Geographic Routing Protocol for VANETXiang Ji, Huiqun Yu, Guisheng Fan, Wenhao Fu. 276-281 [doi]
- A Terahertz RF Selective Switch Based on GrapheneXiaoyuan Ma, Weijun Hong, Shufang Li, Liang Yin, Li Deng. 282-286 [doi]
- Secure Communication Based on a Modified RB-HARQ ProtocolQinyu Zou, Bangning Zhang, Zhan Ye, Daoxing Guo. 287-292 [doi]
- Efficient and Timely Querying of Massive Trajectory Data in Internet of VehiclesYiwen Xu, Qihao Zou, Xinxin Feng. 293-298 [doi]
- A Distributed Graph Database for the Data Management of IoT SystemsKosei Ueta, Xiaoyong Xue, Yukikazu Nakamoto, Sena Murakami. 299-304 [doi]
- Design and Evaluation of Vibrating Footwear for Navigation Assistance to Visually Impaired PeopleQianli Xu, Tian Gan, Shue-Ching Chia, Liyuan Li, Joo-Hwee Lim, Phyoe Kyaw Kyaw. 305-310 [doi]
- An Agentified Use of the Internet of ThingsJoel Kwan, Yassine Gangat, Denis Payet, Rémy Courdier. 311-316 [doi]
- An IoT Application for Inventory Management with a Self-Adaptive Decision ModelLizong Zhang, Nawaf Alharbe, Anthony S. Atkins. 317-322 [doi]
- Lightweight Two-Level Session Key Management for End User Authentication in Internet of ThingsZahid Mahmood, Huansheng Ning, AtaUllah Ghafoor. 323-327 [doi]
- iHRV: Cloud-Based Mobile Heart Rate Variability Monitoring SystemJiehan Zhou, Jukka Riekki, Weishan Zhang, Tie Qiu. 328-333 [doi]
- The Timed Abstract State Machine Based Test Requirement Auto Generation for Embedded SystemsRuan Chenglin, Wang Jinbo. 334-339 [doi]
- A Time-Sensitive Collaborative Filtering Model in Recommendation SystemsLimei Sun, Ejike Ifeanyi Michael, Shen Wang, Yue Li. 340-344 [doi]
- Lightweight Key Management Protocols for Smart GridsVivy Suhendra, Yongdong Wu, Hendra Saputra, Zhigang Zhao, Feng Bao. 345-348 [doi]
- Extraction, Rendering and Augmented Interaction in the Wire Assembly of Commercial AircraftMark D. Rice, Hong Huei Tay, Jamie Ng, Senthil Kumar Selvaraj, Calvin Lim, Ellick Wu. 349-354 [doi]
- Real-Time Vehicle Signal Lights Recognition with HDR CameraJian-Gang Wang, Lubing Zhou, Zhiwei Song, Miaolong Yuan. 355-358 [doi]
- A 2.4GHz Circular Polarization Rectenna with Harmonic Suppression for Microwave Power TransmissionYanjie Cao, Weijun Hong, Li Deng, Shufang Li, Liang Yin. 359-363 [doi]
- A Novel Design of Broadband Metamaterial Absorber Based on Sine-Curved-Surface SubstratesMi Zhou, Weijun Hong, Li Deng, Shufang Li, Yanjie Cao. 364-367 [doi]
- Analysis and Design of Real-Time Micro-Environment Parameter Monitoring System Based on Internet of ThingsBin Xu, Jianying Zheng, Qing Wang. 368-371 [doi]
- Packet Reservation Multiple Access with Cross Multi-Frames in Cognitive Capillary Machine Type Communication NetworksShow-Shiow Tzeng, Ying-Jen Lin, Li-Shiang Wei, Feng Jyh Authur Su. 372-375 [doi]
- Spectrum Allocation Algorithm Based on Improved Ant Colony in Cognitive Radio NetworksZhipei Zhu, Jiangjingxian Chen, Shibing Zhang. 376-379 [doi]
- Intrusion Detection Method Based on Support Vector Machine Access of Modbus TCP ProtocolLi Deng, Yisong Peng, Cancheng Liu, Xiaoshuai Xin, Yucen Xie. 380-383 [doi]
- Remote Video Interception System Implemented on USRPYuan Zhou, Li Deng, Weijun Hong, Chen Zhang, Shufang Li, Zhen Wang. 384-387 [doi]
- An OPC UA Sleepy Proxy Mechanism for Wireless Field DevicesChenggen Pu, Heng Wang, Ping Wang. 388-391 [doi]
- Software Security Considerations for IoTAki Koivu, Lauri Koivunen, Shohreh Hosseinzadeh, Samuel Laurén, Sami Hyrynsalmi, Sampsa Rauti, Ville Leppänen. 392-397 [doi]
- Intelligent Plant Care Hydroponic Box Using IoTtalkTsung-Han Wu, Chun-Hao Chang, Yun-Wei Lin, Lan-Da Van, Yi-Bing Lin. 398-401 [doi]
- SmartFDS: Design and Implementation of Falling Detection System on SmartphonesXiao Li, Yufeng Wang, Qicai Zhou, Qun Jin. 402-405 [doi]
- An Efficient Channel Utilization Scheme for WIA-PA Industrial Wireless Networks Based on Link SkippingHeng Wang, Lun Shao, Shuyang Xia, Ping Wang, Min Li. 406-409 [doi]
- Data Security and Privacy Challenges in Adopting Solutions for IOTS. Supriya, Sagar Padaki. 410-415 [doi]
- SEMIOT: An Architecture of Semantic Internet of Things MiddlewareMaxim Kolchin, Nikolay Klimov, Ivan Shilin, Daniil Garayzuev, Alexey Andreev, Dmitry Mouromtsev. 416-419 [doi]
- Local Connectivity Based Boundary Detection in Wireless Sensor NetworksRakesh Matam, Shailendra Shukla, Gajendra Tyagi. 420-423 [doi]
- Lightweight Data Security Model for IoT Applications: A Dynamic Key ApproachManish Kumar, Sunil Kumar, Rajat Budhiraja, M. K. Das, Sanjeev Singh. 424-428 [doi]
- Comparison Analysis of Classifiers for Speech under StressXiao Yao, Ning Xu, Mingsheng Gao, Aiming Jiang, Xiaofeng Liu. 429-432 [doi]
- Blockchain as a Service for IoTMayra Samaniego, Ralph Deters. 433-436 [doi]
- Adaptive Adjustment of Compressed Measurement for Energy-Efficient Data Gathering in WSNsZhipeng Nie, Dandan Wang, Donghao Wang, Nan Wang, Jiangwen Wan. 437-440 [doi]
- Social-Based Broadcast in Cognitive Radio Networks: A Network Coding PerspectiveXiaoxiong Zhong, Renhao Lu, Li Li. 441-444 [doi]
- The Internet of Vehicles Based on 5G CommunicationsDamigou Kombate, Wanglina. 445-448 [doi]
- Cyber-Enabled Traditional Chinese MedicineYujia Chen, Yifeng Peng, Leiqi Wang, Yuanyu Zhang, Tao Zhu. 449-450 [doi]
- Future Intelligent Taichi SuitYaodong Yang, Xing Wei, Xiujun Hu, Runlin Cai, Jitong Zhao, Ruofeng Lei. 451-452 [doi]
- A Beautiful Story behind the Battle of PrivacyTianyuan Liu, Guoyun Li, Yaozhi Zhang, Yuqing Sun. 453 [doi]
- User Occupation Aware Conditional Restricted Boltzmann Machine Based RecommendationWeizhu Xie, Yuanxin Ouyang, Jingshuai Ouyang, Wenge Rong, Zhang Xiong. 454-461 [doi]
- Bandwidth Allocation Algorithm of IEEE802.16j Relay Network Based on Utility OptimalizingXinyou Zhang, Jun Zhang, Leiyi Chen. 462-467 [doi]
- On the Effectiveness of Packet Sampling for Early Stage Traffic IdentificationLizhi Peng, Haibo Zhang, Bo Yang, Majing Su, Yuehui Chen. 468-473 [doi]
- An Optimized Privacy Inference Attack Based on Smartwatch Motion SensorsJiazhu Dai, Yitong Duan, Fenglei Yang. 474-479 [doi]
- An Improved Message Passing Schedule of BP-Based Decoding Algorithm for LDPC CodesJingru Dong, Hang Yin, Sijia Wang. 480-484 [doi]
- An Attack-Resilient Middleware Architecture for Grid Integration of Distributed Energy ResourcesYifu Wu, Gihan J. Mendis, Youbiao He, Jin Wei, Bri-Mathias Hodge. 485-491 [doi]
- An Infrared and Visible Image Fusion Method Based on Non-Subsampled Contourlet Transform and Joint Sparse RepresentationGuiqing He, Dandan Dong, Zhaoqiang Xia, Siyuan Xing, Yijing Wei. 492-497 [doi]
- Packet Diversity-Based Anomaly Detection System with OCSVM and Representative ModelSeokjun Lee, Hyunguk Yoo, Jung-Taek Seo, Taeshik Shon. 498-503 [doi]
- Inferring State Machine Using Hybrid TeacherHyunguk Yoo, Taeshik Shon. 504-509 [doi]
- On the Impact of Packet Inter Arrival Time for Early Stage Traffic IdentificationLinlin Wang, Lizhi Peng, Majing Su, Bo Yang, Xiaoqing Zhou. 510-515 [doi]
- A Budget Balanced Energy Distribution Mechanism among Consumers and Prosumers in MicrogridM. Nazif Faqiry, Sanjoy Das. 516-520 [doi]
- Visual Background Recommendation for Dance Performances Using Dancer-Shared ImagesJiqing Wen, Xiaopeng Li, James She, Soochang Park, Ming Cheung. 521-527 [doi]
- A Context-Aware Scheduling Mechanism for Smartphone-Based Personal Data Collection from Multiple Wearable DevicesAo Guo, Jianhua Ma. 528-533 [doi]
- Wall-Content Selection in Social Media: A Revelance Feedback Scheme Based on Explicit CrowdsourcingKlimis S. Ntalianis, Nicolas Tsapatsoulis. 534-539 [doi]
- Predicting Human Mobility from Region FunctionsMinjie Wang, Su Yang, Yi Sun, Jun Gao. 540-547 [doi]
- Study on WorldView-2 Image Fusion Method Based on NMF and HCS TransformGuiqing He, Siyuan Xing, Zhaoqiang Xia, Dandan Dong, Yijing Wei. 548-553 [doi]
- Predicting Traffic Congestions with Global Signatures Discovered by Frequent Pattern MiningJun Gao, Yi Sun, Weihua Liu, Su Yang. 554-560 [doi]
- Proactive Service Discovery in Fog Computing Using Mobile Ad Hoc Social Network in ProximitySander Soo, Chii Chang, Satish Narayana Srirama. 561-566 [doi]
- ELR-DC: An Efficient Recommendation Scheme for Location Based Social NetworksRuheng Lv, Yufeng Wang, Qun Jin, Jianhua Ma. 567-572 [doi]
- Enhanced In-Network Capabilities of Information-Centric Networks for Emerging IoT ApplicationsLijun Dong, Guoqiang Wang. 573-577 [doi]
- Contrast-Improved Visual Cryptography for General Access StructureXuehu Yan, Yuliang Lu, Lintao Liu, Song Wan, Wanmeng Ding, Hanlin Liu. 578-583 [doi]
- Continuous Commissioning of Buildings: A Case Study of a Campus Building in DenmarkElena Markoska, Muhyiddine Jradi, Bo Nørregaard Jørgensen. 584-589 [doi]
- Discrimination of RF Harmonics Using Classification Restricted Boltzmann MachineHao Li, Kwang-Yul Kim, Yoan Shin. 590-593 [doi]
- Multiple Studies Using License Plate Recognition System HD CCTVJonghoon Kim, Jungha Jin, Keecheon Kim. 594-597 [doi]
- A Novel Classifier - Weighted Features Cost-Sensitive SVMDing-cheng, Min Wu. 598-603 [doi]
- Design of Motion Capture System Based on MEMSXiaochen Lai, Wenzhe Shi, Xin Liu, Huawei Zhang, Yu Zhao. 604-608 [doi]
- A Novel and Reliable Workflow for Mobile Cloud Computing System Components SubstitutionPeng Wang, Shaohua Zhang, Yu Cao. 609-614 [doi]
- Location Tracking of a Single Inhabitant in Smart Home: A Discrete Event System ApproachJiawei Wu, Min Xia, Shaolong Shu. 615-620 [doi]
- Optimizing Residue Number System on FPGAJiahe Liu, Bangtian Liu, Haohuan Fu. 621-624 [doi]
- Temporal Consistency Analysis of Mediation-Aided Composition of Service Processes with Relation NetworkYanhua Du, Ze Yu, Benyuan Yang, Yang Wang. 625-630 [doi]
- Management of Machine Room in Power System Based on Intelligent MonitoringJie Li, Yuanhong Zhong, Zhongyou Song, Yao Zhou, Tao Chen, Kunpeng Wang. 631-635 [doi]
- An Approach for Safety Analysis of Cyber-Physical System Based on Model TransformationMingfu Tuo, Xingshe Zhou, Gang Yang, Ning Fu. 636-639 [doi]
- A Secure Collaborative Spectrum Sensing Strategy in Cyber-Physical SystemsHui Lin, Jia Hu. 640-645 [doi]
- Application of Adaptive Kalman Filter in High Dynamic GNSS Signal Carrier TrackingYoumu Shi, Di Yan. 646-651 [doi]
- List-Based Task Scheduling for Cloud ComputingMuhammad Fasih Akbar, Ehsan Ullah Munir, M. Mustafa Rafique, Zaki Malik, Samee U. Khan, Laurence T. Yang. 652-659 [doi]
- Detecting Primary User Emulation Attacks Based on PDF-BP Algorithm in Cognitive Radio NetworksYueyun Chen, Liuqing Yang, Shuaishuai Ma, Xiaopan Yuan. 660-666 [doi]
- Case Studies for Analyzing DLMS/COSEM-Based Smart Meter Vulnerabilities in KoreaSeokjun Lee, Jongwan Kim, Hyunguk Yoo, Taeshik Shon. 667-674 [doi]
- A Noise-Resistant UWB Channel Estimation Scheme Based on Compressed SensingKexin Tian, Jian Li, Deqiang Wang. 675-679 [doi]
- Energy-Efficient Real-Time Task Allocation in a Data CenterMingming Zhang, Songyun Wang, Guoquan Yuan, Yefei Li, Zhuzhong Qian. 680-687 [doi]
- Joint Optimization of Beamforming and Power Allocation for Multicell Downlink SystemsNvlan Xie, Yunlong Cai, Minjian Zhao. 688-693 [doi]
- Analysis on the Output Characteristics of Wind Farms in Plateau and Mountain AreasXiankui Wen, Qiang Fan, Chenghui Lin, Yong Xiao, Meimei Xu, Wei Gu, Yutao Xu, Qiufeng Long. 694-697 [doi]
- Energy Cost Minimization in Green Heterogeneous Cellular Networks with Wireless BackhaulsQiang Yang, Xianjun Deng, Bang Wang. 698-704 [doi]
- An Energy Efficient Confident Information Coverage Hole Healing Algorithm in Hybrid Sensor NetworksZujun Tang, Xianjun Deng, Lingzhi Yi, Bang Wang. 705-710 [doi]
- Hybrid Parity-Check and CRC Aided SCL Decoding for Polar CodesQingping Yu, Zhiping Shi, Qinhuai Yan, Zhongpei Zhang. 711-716 [doi]
- iCPBBOCO: A Combination Evaluation Algorithm Based on the Extensional BBOKai Shi, Huiqun Yu, Guisheng Fan, Fei Luo. 717-723 [doi]
- Optimizing Energy Efficiency and Quality of Service in Large Scale Web Server EnvironmentsSimon Kiertscher, Bettina Schnor. 724-731 [doi]
- OPC Communication Protection Method Based on Access Control and Anomaly Traffic DetectionYawen Guo, Chao Cheng, Xiaoshuai Xin, Yucen Xie. 732-737 [doi]
- Adaptive Tile Parallelization for Fast Video Encoding in HEVCMaria G. Koziri, Panos K. Papadopoulos, Nikos Tziritas, Antonios N. Dadaliaris, Thanasis Loukopoulos, Samee U. Khan, Cheng-Zhong Xu. 738-743 [doi]
- A CORDIC with Unified Rotation StrategySiyang Wang, Jia Yu, Kui-Ting Chen, Takaaki Baba. 744-749 [doi]
- Stereoscopic Image Quality Assessment Based on Cyclopean ImageKaixuan Lu, Xingang Liu. 750-753 [doi]
- The Communication Analysis of Implementation in Breadth First Search AlgorithmYichun Sun, Xiaodong Yi, Hengzhu Liu. 754-759 [doi]
- Weighted Energy Detection Receivers for NC-UWB Green Communications Using Parameter Optimized Improved Normalized LMS AlgorithmDanli Liu, Laning Ma, Zhonghua Liang, Peipei Li. 760-764 [doi]
- User Association Based Cooperative Energy-Saving Mechanism in Heterogeneous 5G Access NetworksFei Zheng, Wenjing Li, Peng Yu, Luoming Meng. 765-768 [doi]
- GPSF: General-Purpose Scheduling Framework for Container Based on Cloud EnvironmentSungmin Choi, Rohyoung Myung, Heeseok Choi, KwangSik Chung, JoonMin Gil, HeonChang Yu. 769-772 [doi]
- Feature-Oriented Domain Analysis Framework for Energy-Aware Self-Adaptive SoftwareC. Marimuthu, K. Chandrasekaran. 773-776 [doi]
- Network Public Comments Sentiment Analysis Based on Multilayer Convolutional Neural NetworkMing Jiang, Liqiang Jin, Feiwei Qin, Min Zhang, Ziyang Li. 777-781 [doi]
- Cyber Security Situational AwarenessHuaglory Tianfield. 782-787 [doi]
- Malicious Application Dynamic Detection in Real-Time API AnalysisShiting Xu, Xinyu Ma, Yuandong Liu, Qiang Sheng. 788-794 [doi]
- CSV-X: A Linked Data Enabled Schema Language, Model, and Processing Engine for Non-Uniform CSVWirawit Chaochaisit, Ken Sakamura, Noboru Koshizuka, Masahiro Bessho. 795-804 [doi]
- Stereo Matching Based on Edge-Aware T-MSTDan Zhou, Jiying Zhao. 805-809 [doi]
- Watermarking Based Quality Assessment for DIBR 3D ImagesLei Chen, Jiying Zhao. 810-814 [doi]
- Deep Learning Based Link Prediction with Social Pattern and External Attribute Knowledge in Bibliographic NetworksChuanting Zhang, Haixia Zhang, Dongfeng Yuan, Minggao Zhang. 815-821 [doi]
- Real Time Failure Prediction of Load Balancers and FirewallsTamoghna Ghosh, Dipanjan Sarkar, Tushar Sharma, Ashok Desai, Raghav Bali. 822-827 [doi]
- Improved Prediction of Dengue Outbreak Using the Delay Permutation EntropyGuohun Zhu, Jane Hunter, Ying Jiang. 828-832 [doi]
- Wavelet-Based Stacked Denoising Autoencoders for Cell Phone Base Station User Number PredictionJing Li, Jingyuan Wang, Zhang Xiong. 833-838 [doi]
- Control-Flow Checking Using Branch Sequence SignaturesLiping Liu, Linlin Ci, Wei Liu, Cheng Bin. 839-845 [doi]
- Shapelets and Parallel Coordinates Based Automated Query Generation for Complex Event ProcessingK. J. P. G. Perera, R. N. Navagamuwa, M. R. M. J. Sally, L. A. V. N. Prashan, H. M. N. Dilum Bandara. 846-853 [doi]
- Estimate of Public Environment-Emotional Index Based on Micro-Blog DataGuyuan Chen, Chao Wang, Fuqiang Liu, Feng Wang, Shun Li, Mingxiang Huang. 854-858 [doi]
- From Big Data to Smart Data with the K-Nearest Neighbours AlgorithmIsaac Triguero, Jesus Maillo, Julián Luengo, Salvador García, Francisco Herrera. 859-864 [doi]
- Control Spare Parts Inventory Obsolescence by Predictive ModellingMadhu Babu Cherukuri, Tamoghna Ghosh. 865-869 [doi]
- A Novel Method of Fault Detection for Solenoid Valves Based on Vibration Signal MeasurementHaifeng Guo, Kai Wang, He Cui, Aidong Xu, Jin Jiang. 870-873 [doi]
- A Fast Coding Unit Size Decision Algorithm for HEVC Intra Coding Based on Image ComplexityDeyuan Liu, Xingang Liu, Yayong Li. 874-877 [doi]
- Time Division Multiplexing Elastic Waveband Switching Algorithm Using Markov Data PredictionFanbo Meng, Yuyang Sun, Xiaoxue Gong, Yitong Yang, Weigang Hou. 878-881 [doi]
- A System Design for Driving Behavior Analysis and AssessmentJiayin Cen, Zhuowen Wang, Chao Wang, Fuqiang Liu. 882-887 [doi]
- A Reliable Big Data Transmission Algorithm for Space Information NetworkRong Geng, Xiaojie Wang, Ning Ye. 888-893 [doi]
- Fast Online-Learning Parameters Decision Algorithm Based on Bayesian Decision Rule for 3D-HEVCYayong Li, Xingang Liu, Tao Yu, Yongyong Mei, Peicheng Wang. 894-898 [doi]
- An Efficient Eye Localization Method Based on Geometrical Approach and SUSAN OperatorZehua Lan, Yingdong Mu. 899-902 [doi]
- Research on MapReduce-Based Fuzzy Associative Classifier for Big Probabilistic Numerical DataBin Pei, Fenmei Wang, Xiuzhen Wang. 903-906 [doi]