Abstract is missing.
- FPGA-Driven Table System to Accelerate Network FlowsRalph Duncan, Peder Jungck, Andy Norton, Kenneth Ross, Greg Triplett. 1-8 [doi]
- Redundant Execution Algorithm for Reducing Total Power Consumption of Server Clusters by Differentiating the Starting Time of ProcessesTomoya Enokido, Ailixier Aikebaier, Makoto Takizawa. 9-16 [doi]
- 3 Tiers Storage Model for Low Throughput Off-Line StorageMinoru Uehara. 17-23 [doi]
- A Simulated Annealing Algorithm for Ground Station Scheduling ProblemFatos Xhafa, Xavier Herrero, Admir Barolli, Makoto Takizawa. 24-30 [doi]
- Optimized Hash Lookup for Bloom Filter Based Packet RoutingDagang Li, Pei Chen. 31-37 [doi]
- Single Document Summarization Based on Triangle Analysis of Dependency GraphsKai Cheng, Yanting Li, Xin Wang. 38-43 [doi]
- Video over Software-Defined Networking (VSDN)Harold Owens II, Arjan Durresi. 44-51 [doi]
- A Persistence Analysis of Smartphone Application Stores: An Approach to Understanding Gateways to the InternetToshihiko Yamakami. 52-56 [doi]
- Analysis of Heterogeneous Complex Networks Using the Degree of DiffusionEman AlDwaisan, Maytham Safar, Khaled Mahdi. 57-65 [doi]
- MANET Approaches for Airborne Networks: A SurveyElis Kulla, Shinji Sakamoto, Makoto Ikeda, Leonard Barolli. 66-70 [doi]
- Towards the New Era of Global Aviation Electronic Data Exchange: Ensuring Completeness, Consistency and Quality in Data MigrationFlorian Puersch, Wenny Rahayu, Torab Torabi, Laura Irina Rusu, Karl Reed, Andrew Taylor-Harris. 71-78 [doi]
- The Convergence of Big Data and Mobile ComputingAgustinus Borgy Waluyo, David Taniar, Bala Srinivasan. 79-84 [doi]
- Persuasive Strength Analysis of the Mobile Gang of Four: Toward Understanding Mobile Business Engineering in the Era of Mobile PersuasionToshihiko Yamakami. 85-89 [doi]
- A Proposal for the Deterrence of Information Leakage Using Anti-virus SoftwareTakuya Kaneko, Takumi Nagaya, Keisuke Takemori, Yutaka Miyake, Masakatsu Nishigaki. 90-96 [doi]
- An Efficient Algorithm for Incremental Privacy Breach on (k, e)-Anonymous ModelBowonsak Seisungsittisunti, Juggapong Natwichai. 97-104 [doi]
- Construction of a Multi-domain Functional Encryption System on Functional Information InfrastructureYusuke Niwa, Akira Kanaoka, Eiji Okamoto. 105-112 [doi]
- Healthcare Based on Cloud ComputingTamara Luarasi, Mimoza Durresi, Arjan Durresi. 113-118 [doi]
- Utilizing Security Risk Approach in Managing Cloud Computing ServicesDanilo Valeros Bernardo. 119-125 [doi]
- Targeted Advertisement Using Smartphones and Cloud ComputingMimoza Durresi, Tamara Luarasi, Indrit Baholli, Arjan Durresi. 126-133 [doi]
- Federated Identity Access Broker Pattern for Cloud ComputingTim Reimer, Phil Abraham, Qing Tan. 134-140 [doi]
- A Proposal of Privacy-Preserving Data Aggregation on the Cloud ComputingMebae Ushida, Kouichi Itoh, Yoshinori Katayama, Fumihiko Kozakura, Hiroshi Tsuda. 141-148 [doi]
- Dynamic Clusters of Servers for Reducing Electric Power in P2P Overlay NetworksDilawaer Duolikun, Ailixier Aikebaier, Tomoya Enokido, Makoto Takizawa. 149-155 [doi]
- A Fuzzy-Based System for Peer Reliability in JXTA-Overlay P2P Considering Number of InteractionsEvjola Spaho, Shinji Sakamoto, Leonard Barolli, Fatos Xhafa, Valbona Barolli, Jiro Iwashige. 156-161 [doi]
- A Reputation Aggregation Method Considering File Request Distribution and Peer Behavior in Unstructured P2P NetworksHiroki Ushikubo, Sonoko Takeda, Hiroshi Shigeno. 162-169 [doi]
- Jitter Considerations in On-Demand Route Discovery for Mobile Ad Hoc NetworksJiazi Yi, Juan Antonio Cordero Fuertes, Thomas Heide Clausen. 170-177 [doi]
- MANET Viewer III: 3D Visualization System for Mobile Ad Hoc NetworksAkihiro Inoue, Yuma Takahashi, Akio Koyama. 178-185 [doi]
- Exploratory Coverage in Limited Mobility Sensor NetworksMark E. Snyder, Sriram Chellappan, Mayur Thakur. 186-193 [doi]
- Performance Comparison of Moving Sensors and Sink with Static Sink in WSNsLeonard Barolli, Tao Yang, Elis Kulla, Shinji Sakamoto, Gjergji Mino. 194-200 [doi]
- Performance Evaluation of Mesh Router Node Placement Using Simulated Annealing Considering Exponential and Weibull DistributionsShinji Sakamoto, Tetsuya Oda, Elis Kulla, Evjola Spaho, Leonard Barolli. 201-205 [doi]
- A Comparison Study of GA and HC for Mesh Router Node Placement in Wireless Mesh NetworksTetsuya Oda, Xinyue Chang, Shinji Sakamoto, Evjola Spaho, Fatos Xhafa, Leonard Barolli. 206-213 [doi]
- Effects of Receiver Initiated MAC Protocol for Reducing Power Consumption in Wireless Sensor NetworksHitomi Date, Tetsuya Shigeyasu. 214-221 [doi]
- Delay Tolerant Network with Directional Antenna Control for Disaster Information SystemNoriki Uchida, Norihiro Kawamura, Yoshitaka Shibata. 222-227 [doi]
- A Novel MMSE Based Predictive Method for Narrow Band Interference RemovalNeeraj Varshney, Roop C. Jain. 228-233 [doi]
- A Fast Adaptation Scheme for TFRC over Vertical HandoversDagang Li, Wenpeng Sha. 234-241 [doi]
- Location Estimation Considering Inside and Outside Wireless LAN Coverage AreaAkinori Suzuki, Hiroko Shindo, Hiroshi Shigeno. 242-249 [doi]
- Emotional Recognition from Facial Expression Analysis Using Bezier Curve FittingYong-Hwan Lee, Woori Han, YoungSeop Kim. 250-254 [doi]
- A Novel Resource Allocation Heuristic for a Power Constrained Data CenterShuo Zhang, Baosheng Wang, BaoKang Zhao, Zhenghu Gong, Jing Tao. 255-260 [doi]
- Study on Collaboration System Constructions in Medical SitesHwa Gyoo Park, Yim Kang Bin. 261-266 [doi]
- GEESE: A Cognitive USN PlatformJunyoung Park, YoungJun Lee, Kyungroul Lee, Hanggon Kim, Dmitry Volokhov, Kangbin Yim. 267-269 [doi]
- Secure Aggregation and Attack Detection for Smart Grid SystemInshil Doh, Jiyoung Lim, Kijoon Chae. 270-275 [doi]
- Aggregate Signature-Based Efficient Attributes Proof with Pairing-Based Anonymous CredentialNan Guo, Jianju Cheng, Bin Zhang 0001, Kangbin Yim. 276-281 [doi]
- Detecting Anomaly Teletraffic Using Stochastic Self-Similarity Based on HadoopJongsuk R. Lee, Sang-Kug Ye, Hae-Duck Joshua Jeong. 282-287 [doi]
- The Practical Quality Model for Embedded System and SoftwareHwa-Young Jeong. 288-291 [doi]
- Service Based User Oriented Adaptive Learning SystemHwa-Young Jeong, Jong Hyuk Park. 292-295 [doi]
- Application for Mobile Cloud LearningJae-dong Lee, Jong Hyuk Park. 296-299 [doi]
- Development of Smart Mobile App Assessment ModelHyeyeon Kim, Jae Suhp Oh, Hyeong Nam Moon. 300-304 [doi]
- Proposal of Disaster Management Support System Using Tiled Display Wall EnvironmentTomoyuki Ishida, Akira Sakuraba, Noriki Uchida, Yoshitaka Shibata. 305-310 [doi]
- Tiled Display Environment to Realize GIS Based Disaster Information SystemAkira Sakuraba, Satoshi Noda, Tomoyuki Ishida, Yasuo Ebara, Yoshitaka Shibata. 311-316 [doi]
- An Experiment on Ultra-resolution Video Transmission with Tiled Display Wall in Wide-Area NetworkYasuo Ebara, Satoshi Noda, Akira Sakuraba, Yoshitaka Shibata. 317-322 [doi]
- Building Efficient Questionnaire Survey of Video Contents with Different QoS ParametersKaoru Sugita, Masao Yokota. 323-326 [doi]
- Evaluation of High Presence Sensation Based on Biological InformationTetsuro Ogi, Yosuke Kubota, Tetsuya Toma, Takeshi Chikakiyo. 327-331 [doi]
- A Scheduling Method for Division Based Broadcasting Considering Dynamic UpdateYusuke Gotoh, Hideo Taniguchi. 332-337 [doi]
- Evaluations on Playback Interruption Control for Broadcast and Communication Integrated Video-on-Demand SystemsTomoki Yoshihisa, Shojiro Nishio. 338-343 [doi]
- Querying MongoDB with LINQ in a Server-Side JavaScript EnvironmentKousuke Nakabasami, Toshiyuki Amagasa, Hiroyuki Kitagawa. 344-349 [doi]
- A User Recognition Method Using Accelerometer for Electric AppliancesTsutomu Terada, Ryota Watanabe, Masahiko Tsukamoto. 350-355 [doi]
- Evaluation of Dynamic Running Mode Switch Mechanism by Presence of OS ProtectionKazutoshi Yokoyama, Hiroki Kumon, Hideo Taniguchi. 356-359 [doi]
- Evaluation of Load Balancing in Multicore Processor for AnTTakeshi Sakoda, Toshihiro Yamauchi, Hideo Taniguchi. 360-365 [doi]
- Memory Segmentation and Transfer in Mint Operating SystemKiyohito Miyazaki, Yoshinari Nomura, Hideo Taniguchi. 366-371 [doi]
- Rapid Deployment for Machine Learning in Educational CloudYuichiro Takabe, Minoru Uehara. 372-376 [doi]
- Proposal for BYOD Based Virtual PC RoomMinoru Uehara. 377-382 [doi]
- Implementation of Web-Based Interactive Interface as Software Execution EnvironmentHideaki Yanagisawa, Kayo Kondou. 383-388 [doi]
- A Proposal and Evaluation of Access Point Allocation Algorithm for Wireless Mesh NetworksTakuma Hoshi, Yuki Kumata, Akio Koyama. 389-394 [doi]
- Non-real Time Data Transmission Mechanism with Mobile Sink in Cluster-Based Wireless Sensor NetworksKuo-Feng Huang, Yi-Hsun Lin, Shao-Wei Tsao, Ying-Hong Wang. 395-400 [doi]
- Building Long-Distance Health Care Network Using Minimized Portable Sensors and Active Alert SystemChun-Che Shih, Kuang-Yi Chou, Huan-Chao Keh, Yuan-Cheng Cheng, Po-Yuan Yu, Nan-Ching Huang. 401-404 [doi]
- Using Decision Tree to Analyze Patient of Aortic Aneurysm with Chronic Diseases in Clinical ApplicationKuang-Yi Chou, Chun-Che Shih, Huan-Chao Keh, Po-Yuan Yu, Yuan-Cheng Cheng, Nan-Ching Huang. 405-409 [doi]
- Using Kinect to Develop a Smart Meeting RoomHui-Huang Hsu, Yi Chiou, Yu-Ren Chen, Timothy K. Shih. 410-415 [doi]
- Effects of Side-Channel Communication: Text-Based Analyses of Chat Transcripts from a Case of Remote Education Using a Tele-conference System and a Social Networking SystemJun Iio. 416-421 [doi]
- A Social TV System for the Senior Community: Stimulating Elderly Communication Using Information and Communications TechnologyMasaru Miyazaki, Masanori Sano, Masahide Naemura, Hideki Sumiyoshi, Shigeaki Mitsuya, Arisa Fujii. 422-427 [doi]
- System Design of Self-Actualization Support Service through Friendly RivalryYoshihiro Kawano, Yuka Obu. 428-431 [doi]
- A Clustering Algorithm Using Twitter User BiographyMasaki Kohana, Shusuke Okamoto, Masaya Kaneko. 432-435 [doi]
- A Dynamic Bus Guide Based on Real-Time Bus Locations - A Demonstration PlanIkuko Shigihara, Akiko Arai, Osamu Saitou, Yuji Kuwahara, Masaru Kamada. 436-438 [doi]
- Consideration of IT Which Solves an Agricultural Problem: Examination of the Solution of an Agricultural Problem Which Utilized the Agricultural Support SystemTadashi Okada, Jun Iio, Mayumi Nakada, Yuka Obu, Tatsuhiro Yonekura. 439-443 [doi]
- Real-Time Water Level Visualization with Pervasive IC SensorsOsamu Saitou, Yuji Kuwahara, Michitoshi Niibori, Masaru Kamada. 444-447 [doi]
- A Parallelization of Interactive Animation Software with Web WorkersYuta Watanabe, Shusuke Okamoto, Masaki Kohana, Masaru Kamada, Tatsuhiro Yonekura. 448-452 [doi]
- Web-Based Tool for Programming Interactive 3D Animations in Terms of State-Transition DiagramsDandy Kwong Ling, Michitoshi Niibori, Shusuke Okamoto, Masaru Kamada, Tatsuhiro Yonekura. 453-458 [doi]
- A Web-Based Platform for Clients and Designers to Prototype Web SitesTsukasa Soutome, Dandy Kwong Ling, Michitoshi Niibori, Masaru Kamada. 459-463 [doi]
- Internal Filtering Approach toward Efficiency Optimization of Matching Large Scale XML SchemasAhmad Abdullah Alqarni, Eric Pardede. 464-469 [doi]
- A Routing Protocol Based on Power Generation Pattern of Sensor Node in Energy Harvesting Wireless Sensor NetworksKazuyasu Kawashima, Fumiaki Sato. 470-475 [doi]
- Experimentation of Group Communication ProtocolsDilawaer Duolikun, Ailixier Aikebaier, Tomoya Enokido, Makoto Takizawa. 476-481 [doi]
- Coordination in Android Mobile TeamsFatos Xhafa, Daniel Palou, Leonard Barolli, Evjola Spaho, Makoto Takizawa. 482-487 [doi]
- Performance Analysis of User Connectivity by Optimizing Placement of Wireless Access PointsTaiki Honda, Makoto Ikeda, Leonard Barolli. 488-493 [doi]
- An Analytic Procedure to Generate Inhomogeneous Random Rough SurfaceKazunori Uchida, Masafumi Takematsu, Jun-Hyuck Lee, Keisuke Shigetomi, Junichi Honda. 494-501 [doi]
- Investigation of Diffracted Waves between Parallel and Arbitrary Angle of Edges: A Comparison StudyJiro Iwashige, Leonard Barolli, Motohiko Iwaida, Saki Kameyama. 502-507 [doi]
- Numerical and Experimental Study on Y-Shaped Branch Waveguide by Post WallHiroshi Maeda, Kiyotoshi Yasumoto, Huili Chen, Kazuya Tomiura, Daichi Ogata. 508-512 [doi]
- Investigation of Scattered H-Wave Based on DRTMMasafumi Takematsu, Kazunori Uchida, Junichi Honda. 513-517 [doi]
- A Smaller Final Exponentiation for Tate and Ate Pairings with Barreto-Naehrig CurveYuki Kono, Taichi Sumo, Yasuyuki Nogami. 518-522 [doi]
- Faster Scalar Multiplication for Elliptic Curve CryptosystemsYumi Sakemi, Tetsuya Izu, Masaaki Shirase. 523-527 [doi]
- An Improved Addition Formula on Elliptic Curves Given by Weierstrass Normal FormMasaaki Shirase. 528-533 [doi]
- Location Privacy Vulnerable from Bluetooth DevicesHiroaki Kikuchi, Takeru Yokomizo. 534-538 [doi]
- A Fast (2, 2^m)-Threshold Secret Sharing Scheme Using m Linearly Independent Binary VectorsYuji Suga. 539-544 [doi]
- Marking Intrusion of Transaction-Based Applications in Wireless Storage Area NetworkSyrine Chatti, Habib Ounelli. 545-550 [doi]
- Context and the Cloud: Situational Awareness in Mobile SystemsPhilip Moore, Mak Sharma, Fatos Xhafa, Leonard Barolli. 551-558 [doi]
- The Impact of LPNs on Positioning Technology in LTE-A SystemsYuanfeng Du, Dongkai Yang, Dengkun Xiao. 559-564 [doi]
- ECIS, an Energy Conservation and Interconnection Scheme between WSN and Internet Based on the 6LoWPANQuan Yuan, Runtong Zhang, Fuzhi Chu, Wei Dai. 565-570 [doi]
- Dynamic High Performance Service Resources ManagementJonathan Liu, Wei Dai. 571-576 [doi]
- Concurrent Intelligent Integration and Optimisation Engine for Supply Chains ManagementPaul Moynihan, Wei Dai. 577-582 [doi]
- Workflow-Based Composite Job Scheduling for Decentralized Distributed SystemsNasi Tantitharanukul, Juggapong Natwichai, Pruet Boonma. 583-588 [doi]
- An Improved Identity Authentication Scheme for Internet of Things in Heterogeneous Networking EnvironmentsFuzhi Chu, Runtong Zhang, Rongqian Ni, Wei Dai. 589-593 [doi]
- A Lightweight Approach to Semantify Saudi Open Government DataHend S. Al-Khalifa. 594-596 [doi]