Abstract is missing.
- An Exercise in Concurrency: From Non-blocking Objects to Fair ObjectsCarole Delporte, Hugues Fauconnier, Michel Raynal. 1-7 [doi]
- A Comparison of Graphics Processor Architectures for RFID SimulationRenato Ferrero, Bartolomeo Montrucchio, Lorenzo David, Kargar Ebrahim, Luca Graglia, Giovanni di Dio Iovino, Marco Ribero. 8-14 [doi]
- Power Consumption Models for Migrating Processes in a Server ClusterDilawaer Duolikun, Ailixier Aikebaier, Tomoya Enokido, Makoto Takizawa. 15-22 [doi]
- Parallel Algorithms for Edge Detection in an ImageC. Mala, M. Sridevi. 23-30 [doi]
- The Improved Delay Time-Based (IDTB) Algorithm to Perform Computation Type Application ProcessesTomoya Enokido, Makoto Takizawa. 31-38 [doi]
- Analysis of Mesh Router Node Placement Using WMN-GA System Considering Different Architectures of WMNsTetsuya Oda, Shinji Sakamoto, Admir Barolli, Makoto Ikeda, Fatos Xhafa, Leonard Barolli. 39-44 [doi]
- Analysis of WMN-SA andWMN-GA Simulation Results: A Comparison Performance for Wireless Mesh NetworksMakoto Ikeda, Tetsuya Oda, Shinji Sakamoto, Taiki Honda, Leonard Barolli. 45-52 [doi]
- Mesh Net Viewer II: An Extended Visualization System for Wireless Mesh NetworksYuki Kumata, Akio Koyama. 53-60 [doi]
- Implementation and Evaluation of Adaptive Multi-gateway Mesh NetworkTakaaki Kawai, Naoki Yusa, Hiroshi Mineno. 61-68 [doi]
- Performance Analysis of WMN-SA: Node Placement Problem Using Simulated Annealing Algorithm for Different Replacement MethodsShinji Sakamoto, Tetsuya Oda, Makoto Ikeda, Fatos Xhafa, Leonard Barolli, Kazunori Uchida. 69-74 [doi]
- A Lifelog System Specialized to Record Timestamp of Daily WorksNobuyoshi Sato. 75-82 [doi]
- A Patient-Centric Distributed Architecture for Electronic Health Record SystemsGiorgio Mario Grasso, Alfredo Cuzzocrea, Andrea Nucita. 83-90 [doi]
- Parallel Low-Complexity Lossless Coding of Three-Dimensional Medical ImagesRaffaele Pizzolante, Arcangelo Castiglione, Bruno Carpentieri, Alfredo De Santis. 91-98 [doi]
- Modelling QoS in IoT ApplicationsIrfan Awan, Muhammad Younas, Wajia Naveed. 99-105 [doi]
- Ranked Matching of OWL-S Process Model for Distributed Discovery of SWs in P2P SystemsAdel Boukhadra, Karima Benatchba, Amar Balla. 106-113 [doi]
- Tsunami Simulation Based on Dijkstra AlgorithmKazunori Uchida, Shinsuke Nogami, Masafumi Takematsu, Junichi Honda. 114-119 [doi]
- Read-Write Abortion (RWA) Based Synchronization Protocols to Prevent Illegal Information FlowShigenari Nakamura, Dilewaer Doulikun, Ailixier Aikebaier, Tomoya Enokido, Makoto Takizawa. 120-127 [doi]
- Explicit Routing in Software-Defined Networking (ERSDN): Addressing Controller ScalabilityHarold Owens II, Arjan Durresi. 128-134 [doi]
- Controlled Quantum Secure Direct Communication Protocol Based on Five-Particle Cluster State and EPR Pair Entanglement SwappingTao Fang. 135-140 [doi]
- New Kick Operators in Iterated Local Search Based Metaheuristic for Solving the Node Placement Problem in Multihop NetworksKengo Katayama, Yuto Akagi, Elis Kulla, Hideo Minamihara, Noritaka Nishihara. 141-148 [doi]
- Optimized Multilevel Threshold Selection Using Evolutionary ComputingM. Sridevi, C. Mala, E. Sivasankar, Ilsun You. 149-156 [doi]
- Energy Saving by Ambient Intelligence TechniquesMatteo Cristani, Erisa Karafili, Claudio Tomazzoli. 157-164 [doi]
- A Tabu Search Approach for the Circle Packing ProblemFrancesco Carrabs, Carmine Cerrone, Raffaele Cerulli. 165-171 [doi]
- A Comparison Study on Meta-Heuristics for Ground Station Scheduling ProblemFatos Xhafa, Xavier Herrero, Admir Barolli, Makoto Takizawa. 172-179 [doi]
- Evaluation of Wireless Network Communication by Autonomous Flight Wireless Nodes for Resilient NetworksNoriki Uchida, Mizue Kimura, Tomoyuki Ishida, Yoshitaka Shibata, Norio Shiratori. 180-185 [doi]
- Dynamic Sliding Contention Window Adjustment in Saturated Wireless NetworksC. Mala, B. Nithya. 186-193 [doi]
- CCR-MAC: A Communication Channel Recommendation MAC for Multi-channel WLANsTetsuya Shigeyasu, Junko Nagamine. 194-200 [doi]
- A Performance Study of ZigBee Network under Wi-Fi InterferenceKeigo Nomura, Fumiaki Sato. 201-207 [doi]
- Functional Experiment of Virtual Policy Based Network Management Scheme in Cloud EnvironmentKazuya Odagiri, Shogo Shimizu, Naohiro Ishii, Makoto Takizawa. 208-214 [doi]
- Resource Allocation Method for Cloud Computing Environments with Different Service Quality to Users at Multiple Access PointsYutaro Magome, Shin-ichi Kuribayashi. 215-220 [doi]
- Hybrid Algorithm for Workflow Scheduling in Cloud-Based CyberinfrastructuresAndrei Alexandru Nicolae, Catalin Negru, Florin Pop, Mariana Mocanu, Valentin Cristea. 221-228 [doi]
- A Novel Cross Layer Approach to Enhance QoS Performance in Multihop Adhoc NetworksB. Nithya, C. Mala, E. Sivasankar. 229-236 [doi]
- A New Multi-channel Protocol Destined for Effective Broadcast on Ad Hoc WLANsTetsuya Shigeyasu, Rina Matsuda. 237-243 [doi]
- A Fuzzy Approach to Actor Selection in Wireless Sensor and Actor NetworksElis Kulla, Makoto Ikeda, Leonard Barolli. 244-248 [doi]
- Performance Evaluation of a Synchronization Protocol for Rechargeable Sensor NetworksFumiaki Sato. 249-256 [doi]
- Prediction-Based Localization for Mobile Wireless Sensor NetworksImane Benkhelifa, Chakib Lamini, Hichem Azouz, Samira Moussaoui, Ashfaq Khokhar. 257-262 [doi]
- Hierarchical and Shared Key AssignmentArcangelo Castiglione, Alfredo De Santis, Barbara Masucci. 263-270 [doi]
- Evaluating a Dynamic Internet Threat Monitoring Method for Preventing PN Code-Based Localization AttackMasaki Narita, Kanayo Ogura, Bhed Bahadur Bista, Toyoo Takata. 271-278 [doi]
- A Possible Pitfall in the Experimental Analysis of Tampering Detection AlgorithmsGiuseppe Cattaneo, Gianluca Roscigno. 279-286 [doi]
- Provably Secure and Efficient ID-Based Strong Designated Verifier Signature Scheme with Message RecoveryMin Li, Tao Fang. 287-293 [doi]
- Flexible Querying in Linked Data SourcesGilles Nachouki. 294-301 [doi]
- Data Replication Strategies in P2P Systems: A SurveyEvjola Spaho, Leonard Barolli, Fatos Xhafa. 302-309 [doi]
- StreamOp: An Innovative Middleware for Supporting Data Management and Query Functionalities over Sensor Network Streams EfficientlyAlfredo Cuzzocrea, José Cecílio, Pedro Furtado. 310-317 [doi]
- Frequent-Pattern Based Facet Extraction from Graph DataTakahiro Komamizu, Toshiyuki Amagasa, Hiroyuki Kitagawa. 318-323 [doi]
- Sentiment Mining through Mixed Graph of TermsFrancesco Colace, Massimo De Santo, Luca Greco 0001. 324-330 [doi]
- NeighborNote: An Evernote Application with Capability of Suggesting Related Notes Based on User Operation HistoryYuki Takahashi, Michitoshi Niibori, Masaru Kamada. 331-335 [doi]
- Techniques for Collecting data in Social NetworksLina Alfantoukh, Arjan Durresi. 336-341 [doi]
- A Non-Zero-Sum Social Experience Approach: Building Blocks of Social Experience DesignToshihiko Yamakami. 342-346 [doi]
- Sampling from Large Graphs with a ReservoirKai Cheng. 347-354 [doi]
- Countering Browser Fingerprinting Techniques: Constructing a Fake Profile with Google ChromeUgo Fiore, Aniello Castiglione, Alfredo De Santis, Francesco Palmieri. 355-360 [doi]
- Exploring Trust Propagation Behaviors in Online CommunitiesYefeng Ruan, Lina Alfantoukh, Anna Fang, Arjan Durresi. 361-367 [doi]
- A Fuzzy-Based CAC Scheme for Cellular Networks Considering SecurityVladi Kolici, Takaaki Inaba, Algenti Lala, Gjergji Mino, Shinji Sakamoto, Leonard Barolli. 368-373 [doi]
- Industrial Control System Cyber Threats Indicators in Smart Grid TechnologyAntonio Colella, Aniello Castiglione, Clara Maria Colombini. 374-380 [doi]
- A GIS Based Disaster Status Sharing and Representation System Using Ultra Definition Display EnvironmentAkira Sakuraba, Goshi Sato, Tomoyuki Ishida, Yasuo Ebara, Noriki Uchida, Yoshitaka Shibata. 381-386 [doi]
- High-Presence Informal Communication on Tiled Display EnvironmentYoshitaka Shibata, Toshio Noda, Yu Ebisawa, Koji Hashimoto. 387-392 [doi]
- Experimental Evaluation on Transmission and Display of Ultra-Resolution Video on Tiled Display Wall in JGN-X TestbedYasuo Ebara, Satoshi Noda, Akira Sakuraba, Yoshitaka Shibata. 393-398 [doi]
- HyperInfo: Interactive Large Display for Informal Visual CommunicationNobuyuki Kukimoto, Yosuke Onoue, Kazuo Aoki, Kinya Fujita, Koji Koyamada. 399-404 [doi]
- Proposal of New Disaster Support System for Large-Scale Natural DisasterTomoyuki Ishida, Kazuhiro Takahagi, Akira Sakuraba, Noriki Uchida, Yoshitaka Shibata. 405-410 [doi]
- Push Type Digital Signage System that Displays Personalized InformationTetsuro Ogi, Yoshisuke Tateyama, Yuuki Matsuda. 411-415 [doi]
- Applying Fusion Visualization to Unstructured DataHideo Miyachi, Naohisa Sakamoto, Koji Koyamada. 416-419 [doi]
- Cooperation P2P Web Proxy to Reduce Resource UsageKazuki Matsushita, Masashi Nishimine, Kazunori Ueda. 420-425 [doi]
- A Study of Risk Assessment Quantification in Cloud ComputingShigeaki Tanimoto, Ryota Sato, Kazuhiko Kato, Motoi Iwashita, Yohiaki Seki, Hiroyuki Sato, Atsushi Kanai. 426-431 [doi]
- Data Management Approach for Multiple Clouds Using Secret Sharing SchemeAtsushi Kanai, Naoya Kikuchi, Shigeaki Tanimoto, Hiroyuki Sato. 432-437 [doi]
- An Effectiveness Evaluation of PLC/WLAN Cooperative Transmission Scheme under Practical Network EnvironmentAdriano Muniz, Kazuya Tsukamoto, Kenji Kawahara, Yuji Oie. 438-443 [doi]
- Causal Order of Application Events is P2P Publish/Subscribe SystemsHiroki Nakayama, Dilawaer Duolikun, Ailixier Aikebaier, Tomoya Enokido, Makoto Takizawa. 444-449 [doi]
- Controlled Quantum Secure Direct Communication Protocol Based on Extended Three-Particle GHZ State DecoyTao Fang, Min Li. 450-454 [doi]
- A Sensor Data Processing and Access Platform Based on Hadoop for Smart EnvironmentsChi-Yi Lin, Chia-Chen Li, Wei-Hsun Huang, Wei-Che Liao, Wei-Ming Chen. 455-460 [doi]
- Application of Automotive Sensor Information Server Platform to Ubiquitous Sensing SystemGo Hirakawa, Phyu Phyu Kywe, Kenta Ito, Yoshitaka Shibata. 461-464 [doi]
- Smartphone Indoor Localization with Accelerometer and GyroscopeHui-Huang Hsu, Wei-Jan Peng, Timothy K. Shih, Tun-Wen Pai, Ka Lok Man. 465-469 [doi]
- A QoS-Based Fairness-Aware Downlink Scheduling in LTE-AdvancedYing-Hong Wang, Hao-Yi Huang. 470-475 [doi]
- A Group File Encryption Method using Dynamic System Environment KeyKun-Lin Tsai, Jiu Soon Tan, Fang-Yie Leu, Yi-Li Huang. 476-483 [doi]
- A Fuzzy-Based Reliability System for P2P Communication Considering Number of Interactions, Local Score and Security ParametersYi Liu, Leonard Barolli, Evjola Spaho, Makoto Ikeda, Santi Caballé, Fatos Xhafa. 484-489 [doi]
- Trustworthiness-Based Group Communication ProtocolsKazuaki Kouno, Ailixier Aikebaier, Tomoya Enokido, Makoto Takizawa. 490-494 [doi]
- Proposal of a Puzzle Authentication Method with Shoulder-surfing Attack ResistanceMirang Park, Yoshihiro Kita, Kentaro Aburada, Naonobu Okazaki. 495-500 [doi]
- SSL/TLS Servers Status Survey about Enabling Forward SecrecyYuji Suga. 501-505 [doi]
- Privacy-Preserving Dose-Response Relationship TestHiroaki Kikuchi, Tomoki Sato, Jun Sakuma. 506-510 [doi]
- A Multi-purpose Group Signature for Vehicular Network SecurityMohammad Saiful Islam Mamun, Atsuko Miyaji, Hiroaki Takada. 511-516 [doi]
- Text-Based CAPTCHA Using Phonemic Restoration Effect and Similar Pronunciation with an Asian AccentMisako Goto, Toru Shirato, Ryuya Uda. 517-524 [doi]
- Transaction Management in WSAN Cloud EnvironmentSyrine Chatti, Habib Ounelli. 525-530 [doi]
- New Distributed Approach for an Autonomous Dynamic Management of Interdependent Virtual MachinesSalah-Eddine Benbrahim, Alejandro Quintero, Martine Bellaïche. 531-534 [doi]
- Centrality-Burst Detection in Social Networks: An Efficient Approach for Data StreamWaranya Mahanan, Juggapong Natwichai, Kazuo Mori. 535-539 [doi]
- Impact of Network Quality Deterioration on User's Perceived Operability in Remote Desktop EnvironmentsRyohei Komatsu, Shin-ichi Kuribayashi. 540-544 [doi]
- A Business Log System to Display Related Logs Based on Past Cyclic Events of BusinessYuto Yoshida, Michitoshi Niibori, Masaru Kamada. 545-548 [doi]
- Performance Analysis of Advertisement Delivery Scenario for Vehicle-Infrastructure Cooperative CommunicationsTaiki Honda, Seiichiro Ishikawa, Makoto Ikeda, Leonard Barolli. 549-554 [doi]
- Propagation Estimation by Using Building Coverage and Floor Area Ratios Based on 1-Ray Model Combined with Okumura-Hata ModeKazunori Uchida, Naoto Hadano, Masafumi Takematsu, Junichi Honda. 555-560 [doi]
- Estimation of Target Detection Rate in Aircraft Surveillance SystemJunichi Honda, Takuya Otsuyama. 561-565 [doi]
- Statistics of Electromagnetic Wave Propagation along Random Rough SurfaceKazunori Uchida, Takuma Hashimoto, Masafumi Takematsu, Junichi Honda. 566-571 [doi]
- Propagation of Intense Electromagnetic Field in a Gas-MediaTatsufumi Nakamura. 572-575 [doi]
- Experimental Study on Crank-Shaped Waveguide in 2D Photonic CrystalHiroshi Maeda, Kiyotoshi Yasumoto. 576-579 [doi]
- Relationship between Reviews at App Store and the Categories for SoftwareMegumi Wano, Jun Iio. 580-583 [doi]
- A Study of the Simulation Technology Application to a Parking Lot Layout DesignNorio Akatsu, Maiko Shimizu, Tatsuhiro Yonekura. 584-589 [doi]
- Technology Trends Indicated in "The IT Study Meeting Calendar"Jun Iio. 590-595 [doi]
- Interactive Animation Authoring Platform Based on State-Transition Diagrams that Runs on Android DevicesErjing Zhou, Shusuke Okamoto, Michitoshi Niibori, Masaru Kamada, Tatsuhiro Yonekura. 596-599 [doi]
- Reconstruction of Self-Actualization Support Service Based on The 7 HabitsYoshihiro Kawano, Yuka Obu. 600-605 [doi]
- Sphero Control System Using a Web BrowserMasaki Kohana, Shusuke Okamoto. 606-610 [doi]
- File Manager that Shows off Notes Out of the FilesSatoshi Kozawa, Michitoshi Niibori, Yasuhiro Ohtaki, Masaru Kamada. 611-614 [doi]
- A Simple Routing Method for Reverse k-Nearest Neighbor Queries in Spatial NetworksYusuke Gotoh. 615-620 [doi]
- Dynamic Data Delivery for Video Interruption Time Reduction in Hybrid Broadcasting EnvironmentsTomoki Yoshihisa. 621-626 [doi]
- GPU Acceleration of Similarity Search for Uncertain Time SeriesJun Hwang, Yusuke Kozawa, Toshiyuki Amagasa, Hiroyuki Kitagawa. 627-632 [doi]
- Dilemma of Service Engineering in the Era of Social Services: Understanding the Ongoing Challenges of Service EngineeringToshihiko Yamakami. 633-637 [doi]