Abstract is missing.
- Evaluation of Optimal Resource Allocation Method for Cloud Computing Environments with Limited Electric Power CapacityKazuki Mochizuki, Shin-ichi Kuribayashi. 1-5 [doi]
- The Computation and Transmission Rate Based (CTRB) Algorithm for Distributed ApplicationsTomoya Enokido, Ailixier Aikebaier, Makoto Takizawa. 6-13 [doi]
- A Sensing and Experimental Analysis of Life Environment for Ecological LifestyleMotoi Yamagiwa, Katsuyoshi Matsumoto, Makoto Murakami, Minoru Uehara. 14-21 [doi]
- Energy-Aware Network Configuration for Wireless Sensor NetworksAda Gogu, Dritan Nace, Yacine Challal. 22-29 [doi]
- Precoder Adaptation and Power Control in Wireless Ad-Hoc Networks for Rate MaximizationDanda B. Rawat, Bhed Bahadur Bista, Gongjun Yan. 30-34 [doi]
- Real Data from a Testbed in Indoor Stairs Environment Considering BATMAN ProtocolElis Kulla, Makoto Ikeda, Masahiro Hiyama, Leonard Barolli, Bexhet Kamo. 35-41 [doi]
- Two-Phase Top-k Query Processing in Mobile Ad Hoc NetworksYuya Sasaki, Takahiro Hara, Shojiro Nishio. 42-49 [doi]
- Application of GA and Multi-objective Optimization for QoS Routing in Ad-Hoc NetworksAdmir Barolli, Evjola Spaho, Fatos Xhafa, Leonard Barolli, Makoto Takizawa. 50-59 [doi]
- An Angle Measurement Method by Using Terrestrial Magnetism Sensors on a Ski Jumper's Motion Monitoring SystemNobuyoshi Sato, Masaki Oikawa, Tsuyoshi Takayama, Yoshitoshi Murata. 60-67 [doi]
- On the Feasibility of Using 802.11p for Communication of Electronic Toll Collection SystemsMei-Wen Li, Tsung-hsun Wu, Wei-Yen Lin, Kun-Chan Lan, Chien-Ming Chou, Chung-Hsien Hsu. 68-75 [doi]
- Quick Damage & Loss Estimation of Tehran City Using Iraninan TEDES SoftwareS. Karimi, S. Montazerolghaem, A. Rajabzadeh. 76-83 [doi]
- E-mail Sender Identification through Trusted Local Deposit-AgentsMasaru Takesue. 84-91 [doi]
- Apriori-PrefixSpan Hybrid Approach for Automated Detection of Botnet Coordinated AttacksMasayuki Ohrui, Hiroaki Kikuchi, Masato Terada, Nur Rohman Rosyid. 92-97 [doi]
- Digital Identity Management within Networked Information Systems: From Vertical Silos View into Horizontal User-Supremacy Processes ManagementGhazi Ben Ayed, Solange Ghernaouti-Helie. 98-103 [doi]
- Lightweight Security for JXME-Proxied Relay AuthenticationMarc Domingo-Prieto, Joan Arnedo-Moreno. 104-111 [doi]
- A Proposal of an Active Access-Point Selection Algorithm in Wireless Mesh NetworksNobuo Funabiki, Junki Shimizu, Toru Nakanishi, Kan Watanabe. 112-117 [doi]
- Goodput Evaluation of AODV, OLSR and DYMO Protocols for Vehicular Networks Using CAVENETEvjola Spaho, Leonard Barolli, Gjergji Mino, Fatos Xhafa, Vladi Kolici. 118-125 [doi]
- Optimization Problems and Resolution Methods for Node Placement in Wireless Mesh NetworksAdmir Barolli, Fatos Xhafa, Makoto Takizawa. 126-134 [doi]
- Performance Evaluation of Wireless Mobile Ad-Hoc Network via NS-3 SimulatorMakoto Ikeda, Elis Kulla, Leonard Barolli, Makoto Takizawa, Rozeta Miho. 135-141 [doi]
- Server-Side Buffering Measurements for VoD SystemsElla Grishikashvili Pereira, Rubem Pereira. 142-147 [doi]
- On Clustering of Risk Mitigation ControlsKiyoshi Nagata. 148-155 [doi]
- Seamless Surveillance System by Omni-directional Camera NetworkTakuma Kon, Yoshitaka Shibata. 156-161 [doi]
- Linked Data as Integrating Technology for Industrial DataMarkus Graube, Johannes Pfeffer, Jens Ziegler, Leon Urbas. 162-167 [doi]
- A 3-Stage Transition Model of the Architecture of Mobile Social Games: Lessons from Mobile Social Games in JapanToshihiko Yamakami. 168-172 [doi]
- A Prototype of Attention Simulator on TwitterYoshihiro Kawano, Yoshito Kishimoto, Tatsuhiro Yonekura. 173-177 [doi]
- A Generic Architecture for a Social Network Monitoring and Analysis SystemAlexander Semenov, Jari Veijalainen, Alexander Boukhanovsky. 178-185 [doi]
- Comparison Evaluation for Mobile and Static Sensor Nodes in Wireless Sensor Networks Considering TwoRayGround and Shadowing Propagation ModelsTao Yang, Gjergji Mino, Leonard Barolli, Arjan Durresi, Fatos Xhafa. 186-193 [doi]
- Energy-Efficient Data Gathering Using Sleep Scheduling and Spatial Correlation Based on Data Distribution in Wireless Sensor NetworksShinya Kondo, Akimitsu Kanzaki, Takahiro Hara, Shojiro Nishio. 194-201 [doi]
- A Grid-Based Hole Detection Scheme in WSNsYing-Hong Wang, Kuo-Feng Huang, Shaing-Ting Lin. 202-207 [doi]
- Protecting Information in a Connected World: A Question of Security and of Confidence in SecuritySolange Ghernaouti-Helie, David Simms, Igli Tashi. 208-212 [doi]
- Experimental Research on Personal Awareness and Behavior for Information Security ProtectionNoriaki Yoshikai, Shun ichi Kurino, Ayako Komatsu, Daisuke Takagi, Masashi Ueda, Atsuo Inomata, Hideo Numata. 213-220 [doi]
- Comparison of Properties between Entropy and Chi-Square Based Anomaly Detection MethodShunsuke Oshima, Takuo Nakashima, Toshinori Sueyoshi. 221-228 [doi]
- A GA+TS Hybrid Algorithm for Independent Batch Scheduling in Computational GridsFatos Xhafa, Joanna Kolodziej, Leonard Barolli, Akli Fundo. 229-235 [doi]
- Reconfiguration of Chord Ring Based on Communication Delay for Lookup Performance ImprovementYuta Shimano, Fumiaki Sato. 236-242 [doi]
- Specifying and Implementing an Eventual Leader Service for Dynamic SystemsMikel Larrea, Michel Raynal. 243-249 [doi]
- Trustworthiness-Based Group Making Approach in Scalable P2P GroupAilixier Aikebaier, Tomoya Enokido, Makoto Takizawa. 250-257 [doi]
- Self-Regulated Trade-Off among Timeliness, Messages and Accuracy for Approximate Queries in Large-Scale Information AggregationRené Brunner, Felix Freitag, Leandro Navarro. 258-267 [doi]
- Reputation Based Selection for Services in Cloud EnvironmentsOvidiu-Marian Achim, Florin Pop, Valentin Cristea. 268-273 [doi]
- Performance Evaluation of Local and Cloud Deployment of Web ClustersA. M. Aljohani, D. R. W. Holton, Irfan-Ullah Awan, J. S. Alanazi. 274-278 [doi]
- Disaster Information System from Communication Traffic Analysis and Connectivity (Quick Report from Japan Earthquake and Tsunami on March 11th, 2011)Noriki Uchida, Kazuo Takahata, Yoshitaka Shibata. 279-285 [doi]
- A Multi-layered Communication Model with Hybrid Clocks in P2P Overlay NetworksIsamu Tsuneizumi, Ailixier Aikebaier, Reko Dida, Tomoya Enokido, Makoto Takizawa. 286-293 [doi]
- A Programmable Networked Processing Node for 3D Brain Vessels ReconstructionSalvatore Vitabile, Carmelo Militello, Filippo Sorbello, Leonard Barolli. 294-301 [doi]
- Adaptive Wireless Routing ProtocolsArjan Durresi, Mimoza Durresi, Leonard Barolli. 302-309 [doi]
- DEH: A Ubiquitous Heritage Exploring System Using the LBS MechanismChung-Ming Huang, Shang-Chun Lu. 310-317 [doi]
- Distributed Computing with Mobile Robots: An Introductory SurveyMaria Potop-Butucaru, Michel Raynal, Sébastien Tixeuil. 318-324 [doi]
- A Signal-Aware Fingerprinting-Based Positioning Technique in Cellular NetworksChung-Ming Huang, Tsung-Han Hsieh, Shih Yang Lin. 325-332 [doi]
- Quorum-Based Replication of Multimedia Objects in Distributed SystemsTadateru Ohkawara, Ailixier Aikebaier, Tomoya Enokido, Makoto Takizawa. 333-340 [doi]
- A Survey of the State of the Art in Data Mining and Integration Query LanguagesSabri Pllana, Ivan Janciak, Peter Brezany, Alexander Wöhrer. 341-348 [doi]
- A Tangible 3D Desktop Environment with Force FeedbackYusuke Ouchi, Hiroaki Nishino, Tsuneo Kagawa, Kouichi Utsumiya. 349-355 [doi]
- A Web-Based Sign Language Translator Using 3D Video ProcessingKin Fun Li, Kylee Lothrop, Ethan Gill, Stephen Lau. 356-361 [doi]
- Virtual Common Gateway Interface Program on the Network Using the Destination Addressing Control System SchemeKazuya Odagiri, Shogo Shimizu, Naohiro Ishii, Makoto Takizawa. 362-369 [doi]
- Metabolic ComputingMinoru Uehara. 370-375 [doi]
- Probabilistic Parameters of Conditional Task GraphsSergiu Carpov, Jacques Carlier, Dritan Nace, Renaud Sirdey. 376-381 [doi]
- A Power Consumption Model of a Storage ServerTakuro Inoue, Ailixier Aikebaier, Tomoya Enokido, Makoto Takizawa. 382-387 [doi]
- Hub Node Reinforcement against Forwarding Obstruction Attacks in Peer-to-Peer NetworksTakashi Yajima, Asaki Matsumoto, Hiroshi Shigeno. 388-393 [doi]
- How Different are Preferences of Children and Adults on Web Pages?Mayu Iwata, Takahiro Hara, Shojiro Nishio. 394-399 [doi]
- Performance Evaluation of WMN Using WMN-GA System for Different Mutation OperatorsTetsuya Oda, Admir Barolli, Evjola Spaho, Fatos Xhafa, Leonard Barolli, Makoto Takizawa. 400-406 [doi]
- Improving Parameters for Wireless Sensor NetworksElma Zanaj, Indrit Enesi, Elda Zenelaj. 407-412 [doi]
- Time Management in Mobile Social Game Design: Lessons from Mobile Social Games in JapanToshihiko Yamakami. 413-418 [doi]
- An Evaluation System for Different Types of User Interfaces According to User Computer Skill and Computer SpecificationsShinichi Inenaga, Kaoru Sugita, Tetsushi Oka, Masao Yokota. 419-424 [doi]
- Author Identification in Albanian LanguageHakik Paci, Elinda Kajo, Evis Trandafili, Igli Tafa, Denisa Salillari. 425-430 [doi]
- Video ForgeryTimothy K. Shih. 431 [doi]
- Digital Guide Map Using Tiled Display and Recommendation FunctionTetsuro Ogi, Yoshisuke Tateyama, Junichi Kawasaki. 432-437 [doi]
- Fundamental Experiment on Multi-video Communication in Multipoint Tiled Display EnvironmentYasuo Ebara. 438-443 [doi]
- Proposal of High Realistic Sensation System Using the Large Scale Tiled Display EnvironmentTomoyuki Ishida, Akira Sakuraba, Yoshitaka Shibata. 444-449 [doi]
- The Theoretical Analysis of Adaptive Memory Compression in Load Balancing Page Memory with Live-Migration ApproachIgli Tafa, Hakik Paci. 450-455 [doi]
- A New Interface for Large Scale Tiled Display System Considering ScalabilityAkira Sakuraba, Tomoyuki Ishida, Yoshitaka Shibata. 456-461 [doi]
- A CG Learning Tool with Guided Programming EnvironmentHiroaki Nishino, Shogo Sueyasu, Tsuneo Kagawa, Kouichi Utsumiya. 462-467 [doi]
- Frequency Characteristics of Diffracted Waves Considering Transition Region of GTD Shadow BoundaryJiro Iwashige, Leonard Barolli, Katsuki Hayashi, Ryo Nagao, Yuki Isayama. 468-473 [doi]
- Electromagnetic Scattering from Imperfectly Periodic SurfacesKoki Watanabe. 474-477 [doi]
- On the Scattering by Buried ObjectsM. A. Fiaz, L. Pajewski, C. Ponti, G. Schettini, F. Frezza. 478-483 [doi]
- Image Processing of 2-Dimensional BarcodeToshihiko Wakahara, Noriyasu Yamamoto. 484-490 [doi]
- Numerical Analysis of Electromagnetic Wave Scattered by High-Contrast Dielectric Cylinder Using CIP MethodHiroshi Maeda, Hiroyuki Terashima, Tetsuo Maruyama, YongMei Zhang. 491-496 [doi]
- Numerical Analysis of Two-Dimensional Photonic Crystal Waveguide Devices Using Periodic Boundary Conditions and Multilayer TechniqueYoshimasa Nakatake, Koki Watanabe. 497-501 [doi]
- Wi-Fi Behavior in Presence of UMTS for Indoor EnvironmentEzmerina Kotobelli, Renalda Kushe. 502-506 [doi]
- An Algorithm for Allocation of Base Stations in Inhomogeneous Cellular EnvironmentKazunori Uchida, Junichi Honda. 507-512 [doi]
- A Method of GSM Antenna Modeling for the Evaluation of the Exposed Field in the VicinityAlgenti Lala, Bexhet Kamo, Sanije Cela. 513-516 [doi]
- An Implementation and Evaluation of Zone-Based Routing Protocol for Mobile Ad-Hoc NetworksHaruki Osanai, Akio Koyama, Leonard Barolli. 517-522 [doi]
- Proposal for a Cloud-Based Educational EnvironmentShinichiro Kibe, Minoru Uehara. 523-528 [doi]
- Performance Evaluation of 2FT RAIDYuji Nakamura, Minoru Uehara. 529-534 [doi]
- A Study on Improving the System of Grid Powered by Solar CellKenichi Fujii, Motoi Yamagiwa, Minoru Uehara. 535-540 [doi]
- A Design and Implementation of a Terrestrial Magnetism and Acceleration Sensor Device for Worker's Motion Tracing SystemNobuyoshi Sato, Kouichi Ueda, Jun Suzuki, Taiji Ishikawa, Tsuyoshi Takayama, Yoshitoshi Murata. 541-546 [doi]
- Early Evaluation of Road Width Estimation on Rapid Road Map Survey System Using GPS Trajectories as Collective IntelligenceHiromitsu Sugawara, Nobuyoshi Sato, Tsuyoshi Takayama, Yoshitoshi Murata. 547-552 [doi]
- A Practical Calendaring System Conforming with Ambiguous Pattern of Recurring TasksYoshinari Nomura, Syunsuke Mihara, Hideo Taniguchi. 553-558 [doi]
- Wavelet Image Compression Method Combined with the GPCAIndrit Enesi, Elma Zanaj. 559-564 [doi]
- A Study on Automated Security Level Conversion Scheme for Multi-level Secure DocumentsYang-Sun Lee, Leonard Barolli, Sang-Soo Yeo. 565-568 [doi]
- An Efficient Array File System for Multiple Small-Capacity NAND Flash MemoriesSang Oh Park, Sung-Jo Kim. 569-572 [doi]
- A Suggestion for Cloud Environments New Layer Contemplating and Its Security FactorsJaeik Cho, Junwon Lee, Jung-Taek Seo, Taeshik Shon. 573-577 [doi]
- A Study on Design of FMT Framework for Flex Quality AssuranceYang-Hoon Kim, Guk-Boh Kim, Hangbae Chang. 578-581 [doi]
- IPTV and Secure Digital Contents DownloadingDo-Eun Cho, Sang-Soo Yeo. 582-585 [doi]
- An Efficient Power Management System for Mobile Multimedia DevicesSang Oh Park, Jae Kyoung Lee, Sung-Jo Kim. 586-589 [doi]
- Delay Spread of Electromagnetic Waves Propagating along Random Rough SurfaceJunichi Honda, Kazunori Uchida. 590-595 [doi]
- Performance Analysis of Multicast Routing Protocols MAODV, ODMRP and ADMR for MANETsOlimpjon Shurdi, Rozeta Miho, Bexhet Kamo, Vladi Kolici, Alban Rakipi. 596-601 [doi]
- Improvement of Encryption Processing Speed for a User Attestation System Using a Cellular PhoneNoriyasu Yamamoto, Toshihiko Wakahara. 602-606 [doi]
- Authenticating with Attributes in Online Social NetworksDan Cao, BaoKang Zhao, Xiaofeng Wang, Jinshu Su, Yijiao Chen. 607-611 [doi]
- Adaptive VoIP Steganography for Information Hiding within Network Audio StreamsErchi Xu, Bo Liu, Liyang Xu, Ziling Wei, BaoKang Zhao, Jinshu Su. 612-617 [doi]
- Efficient Malicious Code Detection Using N-Gram Analysis and SVMJunho Choi, Hayoung Kim, Chang Choi, PanKoo Kim. 618-621 [doi]
- Multimodal Security Enhancement Scheme for Java CardYongsang Song, Jongmoo Choi, Kyongho Han. 622-627 [doi]
- Layer-Aware Unequal Error Protection for Scalable H.264 Video Robust Transmission over Packet Lossy NetworksYifei Sun, Xingjun Zhang, Feilong Tang, Scott Fowler, Huali Cui, Xiaoshe Dong. 628-633 [doi]
- R^2NC: Redundant and Random Network Coding for H.264/SVC TransmissionCuiping Jing, Xingjun Zhang, Feilong Tang, Scott Fowler, Huali Cui, Xiaoshe Dong. 634-639 [doi]
- A Method of Context-Driven HCI Service Selection in Multimodal Interaction EnvironmentsMinjie Wang, Xiaoxin Tang, Yao Shen, Feilong Tang, Minyi Guo. 640-645 [doi]
- Authentication and Certificate Managements of Unauthorized Intrusion in Ad-Hoc Networks, Problems and SolutionsNorihito Yosaka, Iichiro Nishimura, Tomoyuki Nagase. 646-650 [doi]
- A Keystroke Logger Detection Using Keyboard-Input-Related API MonitoringKohei Nasaka, Tomohiro Takami, Takumi Yamamoto, Masakatsu Nishigaki. 651-656 [doi]
- Symmetric Searchable Encryption for Database ApplicationsMasayuki Yoshino, Ken Naganuma, Hisayoshi Satoh. 657-662 [doi]
- Survey of Trust Based Communications in Social NetworksPawat Chomphoosang, Ping Zhang 0017, Arjan Durresi, Leonard Barolli. 663-666 [doi]
- A Study on a Practical Measure against Billing FraudsTakehisa Kato, Kohei Nasaka, Takumi Yamamoto, Masakatsu Nishigaki. 667-672 [doi]
- Threat Tree Templates to Ease Difficulties in Threat ModelingIkuya Morikawa, Yuji Yamaoka. 673-678 [doi]
- Improving Efficiency in Privacy-Preserving Automated Trust Negotiation with Conjunctive PoliciesTangtisanon Pikulkaew, Hiroaki Kikuchi. 679-684 [doi]
- Secure Clustering for Building Certificate Management Nodes in Ad-Hoc NetworkIichiro Nishimura, Tomoyuki Nagase, Youjiro Takehana, Yoshio Yoshioka. 685-689 [doi]
- A Cyber Attack Scenario Using SSFNetAdrian Shehu, Renalda Kushe. 690-693 [doi]