Abstract is missing.
- Efficient Heuristic for Placing Monitors on Flow NetworksChang Liu, Guiyuan Jiang, Jigang Wu, Meixia Zhu, Lijia Tu. 1-5 [doi]
- Efficient Implementation of Genetic Algorithms on GP-GPU with Scheduled Persistent CUDA ThreadsNicola Capodieci, Paolo Burgio. 6-12 [doi]
- Exploiting Pure Superword Level Parallelism for Array IndirectionsHuihui Sun, Rongcai Zhao, Wei Gao, Yi Gong, Gang Li. 13-19 [doi]
- Modelling Binary Oriented Software Buffer-Overflow Vulnerability in Process AlgebraWenqing Liu, Liming Yang, Wei Zhang. 20-25 [doi]
- OpenISMA: An Approach of Achieving a Scalable OpenFlow Network by Identifiers Separating and MappingMingxin Wang, Huachun Zhou, Jia Chen. 26-33 [doi]
- PDNI: A Distributed Framework for NFV InfrastructureShicong Ma, Baosheng Wang, Xiaozhe Zhang, Xianming Gao. 34-40 [doi]
- An Efficient Tolerant-Anisotropic Localization for Large-Scale Wireless Sensor NetworkXiaoyong Yan, Aiguo Song, Yu Liu, Xuanyu Gu. 41-44 [doi]
- Distributed Processing of Approximate Range Queries in Wireless Sensor NetworksHaifeng Hu, Jiefang He, Jiansheng Wu. 45-51 [doi]
- Vector Localization Algorithm Based on Signal Strength in Wireless Sensor NetworkJun Xu, Min Wu, Chao Sha, Tianyu Lu, Ruchuan Wang. 52-58 [doi]
- Parallel and Improvement of Pre-computation Technique for Approximation Shortest Distance QueryHuimin Liu, Qiang Fu, Yinghua Zhou. 59-64 [doi]
- Adaptive Generalized Function Projective Lag Synchronization and Parameter Identification of Hyperchaotic SystemsDing Wenke, Chai Xiuli. 65-67 [doi]
- Adaptive Generalized Function Projective Lag Synchronization of Time-Delay Systems with Uncertain ParametersPei-Yan Jia, Xiu-Li Chai, Xia-Jiong Shen. 68-72 [doi]
- The Minimal Exposure Path in Mobile Wireless Sensor NetworkLili Zhang, Xiaoqiang Chen, Jianxi Fan, Dajin Wang, Cheng-Kuan Lin. 73-79 [doi]
- Improvement of Workload Balancing Using Parallel Loop Self-Scheduling on Xeon PhiChao-Wei Huang, Chan-Fu Kuo, Chao-Tung Yang, Jung-Chun Liu, Shuo-Tsung Chen. 80-86 [doi]
- Automated Classification of Brain MR Images by Wavelet-Energy and k-Nearest Neighbors AlgorithmGuangshuai Zhang, Zhihai Lu, Genlin Ji, Ping Sun, Jianfei Yang, Yudong Zhang. 87-91 [doi]
- Research on Test Paper Auto-generating Based on Improved Particle Swarm OptimizationChong Zhang, Jing Zhang. 92-96 [doi]
- Support-Based Prefetching Technique for Hierarchical Collaborative Caching Algorithm to Improve the Performance of a Distributed File SystemRathnamma Gopisetty, T. Ragunathan, C. Shobha Bindu. 97-103 [doi]
- The Implementation of Virtualization in Data Plane of For CESZou Xi, Gao-Ming, Yining Wang, Chunming Wu. 104-109 [doi]
- A Secure Routing Mechanism against Wormhole Attack in IPv6-Based Wireless Sensor NetworksTao Chen, Haiping Huang, Zhengyu Chen, Yiming Wu, Hao Jiang. 110-115 [doi]
- Minimizing the Maximum Sensor Movement towards Grid Points for Barrier CoverageShuangjuan Li, Hong Shen. 116-121 [doi]
- Two Modified Multicast Algorithms for Two Dimensional Mesh and Torus NetworksHovhannes A. Harutyunyan, Meghrig Terzian. 122-128 [doi]
- Explore New Technology Application of the Medical Classroom TeachingChen Chen, Yu Tai, Li Chenqi. 129-133 [doi]
- Fuzzy Optimization of Automobile Supply Chain Network of Considering RisksZhuo Dai, Zaiyue Li. 134-138 [doi]
- Machine Learning Techniques in StormZhijie Han, Miaoxin Xu. 139-142 [doi]
- WCET-Aware Task Assignment and Cache Partitioning for WCRT Minimization on Multi-core SystemsZhi-Hua Gan, Zhi-Min Gu. 143-148 [doi]
- Link Stability Based Comprehensive Weighted Strategy for Inter-satellite Link AssignmentJuan Wang, Jian Zhou, Lijuan Sun, Chong Han, Fu Xiao. 149-154 [doi]
- An Electric Power Big Data Deployment Solution for Distributed Memory ComputingZhi Yang, Chunping Zhang, Mu Hu, Feng Lin. 155-161 [doi]
- A Decision-Making Method Based on Weighted Formal ContextDao-Jun Han, Tian Gan, Manman Ye, Lei Zhang, Xiajiong Shen. 162-166 [doi]
- Mining User Behavior and Similarity in Location-Based Social NetworksZhiqiang Zou, Xingyu Xie, Chao Sha. 167-171 [doi]
- Spark: A Big Data Processing Platform Based on Memory ComputingZhijie Han, Yujie Zhang. 172-176 [doi]
- Measuring User Influence Based on Multiple Metrics on YouTubeChunjing Xiao, Yuxia Xue, Zheng Li, Xucheng Luo, Zhiguang Qin. 177-182 [doi]
- Cloud-Based Mobile Botnets Using Multiple Push ServersWei Chen, Chengyu Yin, Shiwen Zhou, Xiaoshuang Yan. 183-189 [doi]
- Implementation of a Cloud Energy Saving System with Virtual Machine Dynamic Resource Allocation Method Based on OpenStackChien-Chih Chen, Pei-Lun Sun, Chao-Tung Yang, Jung-Chun Liu, Shuo-Tsung Chen, Zong-Yue Wan. 190-196 [doi]
- Improvement of Workload Balancing Using Parallel Loop Self-Scheduling on Intel Xeon PhiChao-Wei Huang, Zong-Yue Wan, Chao-Tung Yang, Jung-Chun Liu, Shuo-Tsung Chen. 197-203 [doi]
- Multi-stage Scheduling with Scalable Resources for Automated Deployment in Platform as a Service CloudJie Zhu, Chao Sha. 204-209 [doi]
- A Data Hiding Scheme Based on Lagrange Interpolation Algorithm and Multi-cloudsYu Jin, Yadan Wang, Wei Xia, Li Deng, Heng He. 210-216 [doi]
- A Medical Healthcare System for Privacy Protection Based on IoTTianhe Gong, Haiping Huang, Pengfei Li, Kai Zhang, Hao Jiang. 217-222 [doi]
- A Multi-authority Attribute-Based Encryption Scheme with Pre-decryptionDanwei Chen, Liangqing Wan, Chen Wang, Su Pan, Yuting Ji. 223-228 [doi]
- Location Privacy Protecting Based on Anonymous Technology in Wireless Sensor NetworksXiaoyan Wang, Lu Dong, Chao Xu, Peng Li. 229-235 [doi]
- Wireless Injection Attacks Based on Fake Data Injection in TinyOSLingfeng Qiu, Wanyuan Jiang, Wei Zhang, Peng Li. 236-242 [doi]