Abstract is missing.
- An Application-Level Scheduling with Task Bundling Approach for Many-Task Computing in Heterogeneous EnvironmentsJian Xiao, Yu Zhang, Shuwei Chen, Huashan Yu. 1-13 [doi]
- DGraph: Algorithms for Shortgun Reads Assembly Using De Bruijn GraphJintao Meng, Jianrui Yuan, Jiefeng Cheng, Yanjie Wei, Shengzhong Feng. 14-21 [doi]
- Knowledge-Based Adaptive Self-SchedulingYizhuo Wang, Weixing Ji, Feng Shi, Qi Zuo, Ning Deng. 22-32 [doi]
- Communication Locality Analysis of Triplet-Based Hierarchical Interconnection Network in Chip MultiprocessorShahnawaz Talpur, Feng Shi, Yizhuo Wang. 33-41 [doi]
- A Scoring System for Short Answers on the Test in a Large GroupJae Young Lee. 42-47 [doi]
- Reference Variables for Dynamic, Reliable Packet OperationsRalph Duncan, Peder Jungck, Kenneth Ross, Dwight Mulcahy. 48-60 [doi]
- Are Heterogeneous Cellular Networks Superior to Homogeneous Ones?Shelly Salim, Christian Henry Wijaya Oey, Sangman Moh. 61-68 [doi]
- Dynamic Spray and Wait Routing Protocol for Delay Tolerant NetworksLongbo Zhang, Chen Yu, Hai Jin. 69-76 [doi]
- A Dynamic Popularity-Aware Load Balancing Algorithm for Structured P2P SystemsNarjes Soltani, Ehsan Mousavi Khaneghah, Mohsen Sharifi, Seyedeh Leili Mirtaheri. 77-84 [doi]
- NCCPIS: A Co-simulation Tool for Networked Control and Cyber-Physical System EvaluationJinzhi Lin, Ying Wu, Gongyi Wu, Jingdong Xu. 85-93 [doi]
- Dempster-Shafer Theory to Identify Insider Attacker in Wireless Sensor NetworkMuhammad Ahmed, Xu Huang, Dharmendra Sharma. 94-100 [doi]
- MIB-ITrace-CP: An Improvement of ICMP-Based Traceback Efficiency in Network Forensic AnalysisBo-Chao Cheng, Guo-Tan Liao, Ching-Kai Lin, Shih-Chun Hsu, Ping-Hai Hsu, Jong Hyuk Park. 101-109 [doi]
- Breaking a Robust Remote User Authentication Scheme Using Smart CardsDing Wang, Chunguang Ma, Sendong Zhao, Chang-li Zhou. 110-118 [doi]
- An Analysis of Privacy Preserving Data Aggregation Protocols for WSNsIrfana Memon. 119-128 [doi]
- Hybrid Obfuscated Javascript Strength Analysis System for Detection of Malicious WebsitesR. Krishnaveni, Chenniappan Chellappan, Ranaganayakulu Dhanalakshmi. 129-137 [doi]
- Detection and Mitigation of Web Application Vulnerabilities Based on Security TestingTaeseung Lee, Giyoun Won, Seongje Cho, Namje Park, Dongho Won. 138-144 [doi]
- Small World Asynchronous Parallel Model for Genome AssemblyJintao Meng, Jianrui Yuan, Jiefeng Cheng, Yanjie Wei, Shengzhong Feng. 145-155 [doi]
- UKCF: A New Graphics Driver Cross-Platform Translation Framework for Virtual MachinesHaitao Jiang, Yun Xu, Yin Liao, Guojie Jin, Guoliang Chen. 156-163 [doi]
- Fast Parallel Garner Algorithm for Chinese Remainder TheoremYongnan Li, Limin Xiao, Aihua Liang, Yao Zheng, Li Ruan. 164-171 [doi]
- dMPI: Facilitating Debugging of MPI Programs via Deterministic Message PassingXu Zhou, Kai Lu, Xicheng Lu, Xiaoping Wang, Baohua Fan. 172-179 [doi]
- On Dynamic Communication Performance of a Hierarchical 3D-Mesh NetworkM. M. Hafizur Rahman, Asadullah Shah, Yasushi Inoguchi. 180-187 [doi]
- An Elastic Architecture Adaptable to Millions of Application ScenariosYunji Chen, Tianshi Chen, Qi Guo, Zhiwei Xu, Lei Zhang. 188-195 [doi]
- Demystifying Performance Predictions of Distributed FFT3D ImplementationsDaniel A. Orozco, Elkin Garcia, Robert S. Pavel, Orlando Ayala, Lian-Ping Wang, Guang R. Gao. 196-207 [doi]
- numa: Access Patterns Used to Characterize the NUMA Memory Access Optimization Techniques and AlgorithmsQiuming Luo, Chengjian Liu, Chang Kong, Ye Cai. 208-216 [doi]
- mHLogGP: A Parallel Computation Model for CPU/GPU Heterogeneous Computing ClusterGangfeng Liu, Yunlan Wang, Tianhai Zhao, Jianhua Gu, Dongyang Li. 217-224 [doi]
- Estimating Available Bandwidth in Cooperative Multi-hop Wireless NetworksWei Feng, Jian Liu, Jiannong Cao, Liang Yang, Qin Xin. 225-232 [doi]
- Relative Priority Analysis of Korean IS Audit Standard Check Items Using the Constant-Sum MethodBoo-Hyoung Lee, Chi-Su Kim, Heon-Tag Kong. 233-240 [doi]
- Improving the Performances of Internet-Based Marketplace for Technology: A Korean Case StudyJong Bok Park. 241-247 [doi]
- The Day-of-the Week Effects for Cloud-Based Shipment Timing Support System for Stored ApplesYoungsik Kwak, YoonJung Nam. 248-255 [doi]
- An Empirical View on Opportunistic Forwarding Relay Selection Using Contact RecordsJianbin Jia, Yingwen Chen, Ming Xu. 256-263 [doi]
- Design and Deployment of Testbed for Experimental Sensor Network ResearchZeeshan Hameed Mir, Hyeon Park, Young Bag Moon, Naesoo Kim, Cheol-Sig Pyo. 264-272 [doi]
- Implementation of the Integrated Monitoring System Based on an Automatic Disaster Prevention DeviceYoonsik Kwak. 273-278 [doi]
- Smart Ring: A Model of Node Failure Detection in High Available Cloud Data CenterLei Xu, Wenzhi Chen, Zonghui Wang, Huafei Ni, Jiajie Wu. 279-288 [doi]
- EaSync: A Transparent File Synchronization Service across Multiple MachinesHuajian Mao, Hang Zhang, Xianqiang Bao, Nong Xiao, Weisong Shi, Yutong Lu. 289-296 [doi]
- Relationship between Correcting Code and Module Technique in Hiding Secret DataPhan Trung Huy, Nguyen Hai Thanh, Cheonsick Kim. 297-307 [doi]
- Different Characteristics of Radio Modules in Wireless Body Sensor Network SystemsWoo-Sik Lee, Min Choi, Namgi Kim. 308-314 [doi]
- The Development of Sustainable Growth Strategy Model Based on the User Tendency in the Online Game ServicesHyeog-In Kwon, Hi-Yeob Joo, Dae-Jin Kim, Jong Seok Park. 315-319 [doi]
- Computer Education's Teaching-Learning Methods Using Educational Programming Language Based on STEAM EducationNamje Park, Yeonghae Ko. 320-327 [doi]
- The Performances Study of EDCF with Block_Ack in WLANsChien-Erh Weng, Chien-Hung Chen, Chiung-Hsing Chen, Jyh-Horng Wen. 328-335 [doi]
- A Study of SLA-Based Defense Resource Management Strategy in Network Security Defense SystemWen-Hsu Hsiao, Hui-Kai Su, Yu-Siang Wei, Wei-Sheng Ho, Kim-Joan Chen. 336-348 [doi]
- A New Approach for Detecting SMTPFA Based on Entropy MeasurementHsing-Chung Chen, Jai-Zong Sun, Shian-Shyong Tseng, Chien-Erh Weng. 349-359 [doi]
- A Multi-constraint Resource Search Algorithm for P2P-SIP Conference ServicesHui-Kai Su, Wen-Hsu Hsiao, Jian-Ting Pan, Chen-Hung Liao, Kim-Joan Chen, Chien-Min Wu. 360-372 [doi]
- The Effects of Governmental Subsidy on the Quality of Education in Taiwan's Private Universities and CollegesChing-Hui Shih. 373-380 [doi]
- Examining the Effectiveness of a Distant Learning Education Program: Use of Patient Safety and Reporting Law and Ethics as ExampleChiou-Fen Lin, Meei-Ling Shyu, Meei-Shiow Lu, Chung-I. Huang. 381-385 [doi]
- The Instructional Design of a Web-Based Self-reflective Learning Portfolio for Skill TrainingHung Chang Lin, Yao-Hua Wang. 386-393 [doi]
- The Difference Analysis between Demographic Variables and Personal Attributes - The Case of Internal Auditors in TaiwanLi-Jia Chiu, Neng-Tang Norman Huang. 394-400 [doi]
- Success Factors and Problems Encountered in the Workplace Learning of University/College of Technology Students in Taiwan: A Five-Star Hotel as an ExampleMey-Tyng Wang, Guo-Hong Lei. 401-408 [doi]
- Cross-Cultural Training Programs and Expatriate Adjustment EffectivenessShiang-Lan Kuo. 409-413 [doi]
- Soft Power: A Critical Factor for the Effectiveness and Development of a SchoolHui-Min Ko. 414-420 [doi]
- Merging Grid into Clustering-Based Routing Protocol for Wireless Sensor NetworksYing-Hong Wang, Yu-Wei Lin, Yu-Yu Lin, Han-Ming Chang. 421-428 [doi]
- A Termination Detection Technique Using Gossip in Cloud Computing EnvironmentsJongBeom Lim, Kwang-Sik Chung, Heon-Chang Yu. 429-436 [doi]
- OEIRM: An Open Distributed Processing Based Interoperability Reference Model for e-ScienceZhiming Zhao, Paola Grosso, Cees de Laat. 437-444 [doi]
- Using PCI Pass-Through for GPU Virtualization with CUDAChao-Tung Yang, Hsien-Yi Wang, Yu-Tso Liu. 445-452 [doi]
- Parallel Valuation of the Lower and Upper Bound Prices for Multi-asset Bermudan OptionsNan Zhang, Ka Lok Man. 453-462 [doi]
- Insight of Direct Search Methods and Module-Integrated Algorithms for Maximum Power Point Tracking (MPPT) of Stand-Alone Photovoltaic SystemsJieming Ma, Ka Lok Man, T. O. Ting, Hyunshin Lee, Taikyeong Jeong, Jong-Kug Sean, Sheng Uei Guan, Prudence W. H. Wong. 463-471 [doi]
- Pricing Bermudan Interest Rate Swaptions via Parallel Simulation under the Extended Multi-factor LIBOR Market ModelNan Zhang, Ka Lok Man, Eng Gee Lim. 472-481 [doi]
- Evolving Linear Discriminant in a Continuously Growing Dimensional Space for Incremental Attribute LearningTing Wang, Sheng Uei Guan, T. O. Ting, Ka Lok Man, Fei Liu. 482-491 [doi]
- Compact Multiplicative Inverter for Hardware Elliptic Curve CryptosystemM. M. Wong, M. L. D. Wong, Ka Lok Man. 492-499 [doi]
- Space Exploration of Multi-agent Robotics via Genetic AlgorithmT. O. Ting, Kaiyu Wan, Ka Lok Man, Sanghyuk Lee. 500-507 [doi]
- Weightless Swarm Algorithm (WSA) for Dynamic Optimization ProblemsT. O. Ting, Ka Lok Man, Sheng Uei Guan, Mohamed Nayel, Kaiyu Wan. 508-515 [doi]
- Design of a Reliable XOR-XNOR Circuit for Arithmetic Logic UnitsMouna Karmani, Chiraz Khedhiri, Belgacem Hamdi, Amir-Mohammad Rahmani, Ka Lok Man, Kaiyu Wan. 516-523 [doi]
- New Electronic Acupuncture System Using IntelligenceYouSik Hong, Hongkyun Kim, Cheonshik Kim, Geuk Lee. 524-531 [doi]
- A Runtime Environment for Distributed Mashups in Multi-device ScenariosOliver Mroß, Klaus Meißner. 532-541 [doi]
- A Location-Based Algorithm for Supporting Multicast Routing in Mobile Ad-Hoc NetworksLe The Dung, Beongku An. 542-549 [doi]
- Nibble-CRC for Underwater Acoustic CommunicationImtiaz Ahmed Khan, Nam-Yeol Yun, Soo-Hyun Park. 550-558 [doi]
- An Optimized Sub-texture Mapping Technique for an Arbitrary Texture Considering Topology RelationsSangyong Lee, Cheonshik Kim, Seongah Chin. 559-564 [doi]
- Research on a Smart Input Device Using Multimodal Bio-signal InterfaceHyunju Lee, Taehyun Kim, Dongkyoo Shin, HeeWon Park, Soohan Kim, Dongil Shin. 565-574 [doi]
- Cryptanalysis of an RFID Tag Search Protocol Preserving Privacy of Mobile ReaderEun-Jun Yoon. 575-580 [doi]
- Cryptanalysis of Goriparthi et al.'s Bilinear Pairing Based Remote User Authentication SchemeHae Jung Kim, Eun-Jun Yoon. 581-588 [doi]
- Energy-Efficiency Protocol for Securing the Wireless Sensor NetworksLuu Hoang Long, Eunmi Choi. 589-598 [doi]
- A Novel Time Reversal-Least Sidelobe Scheme to Minimize ISI and MUIDo-Hoon Kim, Jungwook Wee, Kyu-Sung Hwang. 599-607 [doi]
- SNR-Based Partial Relay Selection Scheme over Multiple Relay NetworkKyu-Sung Hwang. 608-615 [doi]
- Robust Face Recognition in Low Resolution and Blurred Image Using Joint Information in Space and FrequencyGuoqing Li, Guangling Sun, Xinpeng Zhang. 616-624 [doi]
- Algorithms Based on Finite Automata for Testing of Z-codesDang Quyet Thang, Nguyen Dinh Han, Phan Trung Huy. 625-635 [doi]
- Design of the Cognitive Information Display for Water Level Control of the Steam Generator in Korean Nuclear Power ReactorSooill Lee. 636-644 [doi]