Abstract is missing.
- Spectrum-Centric Differential Privacy for Hypergraph Spectral ClusteringXiaochun Wang, Yidong Li, Yi Jin, Wei Wang. 3-14 [doi]
- Efficient Scheduling Strategy for Data Collection in Delay-Tolerant Wireless Sensor Networks with a Mobile SinkZhansheng Chen, Hong Shen 0001, Xiaofan Zhao, Tingmei Wang. 15-27 [doi]
- Green vs Revenue: Data Center Profit Maximization Under Green Degree ConstraintsHuaiwen He, Hong Shen 0001. 28-40 [doi]
- Design and Implementation of a Novel SDN-Based Architecture for Wi-Fi NetworksLei Liu, Mingzheng Li, Lei Mei, Ye Tian. 41-49 [doi]
- Location Based One-Time Conference Protocol Without Personal InformationJiyoung Lim, Sanghyun Lim. 50-55 [doi]
- Evaluation for Two Bloom Filters' ConfigurationChenxi Luo, Zhu Wang, Tiejian Luo. 56-62 [doi]
- A Fast Global AVF Calculation Methodology for Multi-core Reliability AssessmentJiajia Jiao, Dezhi Han. 63-72 [doi]
- Adaptive Control and Optimization on Dynamic Load Balancing ModelTinglei Zhao, Jianzhong Qiao, Shukuan Lin, Yanhua Wang. 73-83 [doi]
- Design Considerations for an Intelligent Video Surveillance System Using Cloud ComputingKyung-Soo Lim, Seoung-Hyeon Lee, Jong-Wook Han, Geon Woo Kim 0001. 84-89 [doi]
- Investment Intention Towards Online Peer-to-Peer Platform: A Data Mining Approach Based on Perceived Value TheoryXizi Wang, Li Wang. 90-99 [doi]
- Pipeline Patterns on Top of Task-Based RuntimesEnes Bajrovic, Siegfried Benkner, Jirí Dokulil. 100-110 [doi]
- A Real-Time Routing Protocol in Wireless Sensor-Actuator NetworkYue Lu, Hui Tian, Jiajia Yin. 111-120 [doi]
- Privacy Preserving Classification Based on Perturbation for Network TrafficYue Lu, Hui Tian, Hong Shen, Dongdong Xu. 121-132 [doi]
- Fault Diagnosis of a Wireless Sensor Network Using a Hybrid MethodFarzin Piltan, Jong Myon Kim. 133-142 [doi]
- An Optimization Theory of Home Occupants' Access Data for Determining Smart Grid ServiceSeung-Mo Je, Jun Ho Huh. 143-152 [doi]
- Automatic Classification of Transformed Protocols Using Deep LearningChangmin Jeong, Mirim Ahn, Haengho Lee, Younggiu Jung. 153-158 [doi]
- Covert Timing Channel Design for Uniprocessor Real-Time SystemsJaeheon Kwak, JinKyu Lee. 159-168 [doi]
- Parallelization of the DIANA Algorithm in OpenMPHethini Ribeiro, Roberta Spolon Ulson, Aleardo Manacero Jr., Renata Spolon Lobato. 171-176 [doi]
- Flash Animation Watermarking Algorithm Based on SWF Tag AttributesYiAn Zuo, ZhiXun Zheng, De-li. 177-187 [doi]
- Analysis of Massive E-learning Processes: An Approach Based on Big Association Rules MiningAsma Hassani, Sonia Ayachi Ghannouchi. 188-199 [doi]
- SGNet: Design of Optimized DCNN for Real-Time Face DetectionSeunghyun Lee, Minseop Kim, Inwhee Joe. 200-209 [doi]
- A Study on L1 Data Cache Bypassing Methods for High-Performance GPUsCong Thuan Do, Min Goo Moon, Jong Myon Kim, Cheol Hong Kim. 210-219 [doi]
- Memory Contention Aware Power Management for High Performance GPUsHong Jun Choi, Dong Oh Son, Cheol Hong Kim. 220-229 [doi]
- Dynamic Selective Warp Scheduling for GPUs Using L1 Data Cache Locality InformationGwang Bok Kim, Jong Myon Kim, Cheol Hong Kim. 230-239 [doi]
- An Efficient Model and Algorithm for Privacy-Preserving Trajectory Data PublishingSongyuan Li, Hong Shen 0001, Yingpeng Sang. 240-249 [doi]
- What Makes Charitable Crowdfunding Projects Successful: A Research Based on Data Mining and Social Capital TheoryXizi Wang, Li Wang. 250-260 [doi]
- SwarmESB Based Architecture for an European Healthcare Insurance System in Compliance with GDPRCristina Georgiana Calancea, Lenuta Alboaie, Andrei Panu. 261-267 [doi]
- A Study on Deriving and Simulating Pre-risk on Complex Gas Facilities for Preventing AccidentsJeong Seok Oh. 268-273 [doi]
- Body Gesture Modeling for Psychology Analysis in Job Interview Based on Deep Spatio-Temporal ApproachIntissar Khalifa, Ridha Ejbali, Mourad Zaied. 274-284 [doi]
- An Optimized Regularization Method to Enhance Low-Resource MTYatu Ji, Hongxu Hou, Ying Lei, Zhong Ren. 285-295 [doi]
- A Development of Architecture for Risk Area Prediction SystemUgiwyeon Lee, Jeongseok Oh. 296-303 [doi]
- Design of SNS-Based English Word Learning System for Daily StudyChungin Lee, Doyeon Kim, Sujeong Kim, Yunsick Sung. 304-312 [doi]
- Study of Real Toy Tank-Based Mixed Reality ContentsEunhee Park, Namgwang Ryu, Jisun Lee, Yunsick Sung. 313-321 [doi]
- Smart Grid an Advanced Method for Saving Energy in VietnamNhan Tran Van, Hoanh Su Le. 322-328 [doi]
- Autonomous Flight Control Method of Drones for Enforcement of Traffic Law ViolationJeonghoon Kwak, Sang-Geol Lee, Yunsick Sung. 329-334 [doi]
- Cost-Performance Comparison of Various Accelerator Implementation Platforms for Deep Convolutional Neural NetworkYechan Yu, Hojin Kim, Jinjoo Ha, Daewoo Kim, Kang Yi. 335-344 [doi]
- A Prediction Method of Solar Power Generator using Machine Learning TechniquesJungseok Cho, Jeongdoo Lee, Doosan Cho. 345-352 [doi]
- A Glyph Reduction Evaluation of Combined Jeongeum-FontsGa Yeon Kim, Jeong-Yong Byun. 353-358 [doi]
- Software Requirements for an Ultra Large Scale System to Compute Multi Dimension Mean Failure CostMouna Jouini, Latifa Ben Arfa Rabai, Ridha Khédri. 361-370 [doi]
- A Study of an Automated Software Effort Measurement MethodYeong-Seok Seo, Hyun-Soo Jang. 371-380 [doi]
- A Generic Approach for the Verification of Static and Dynamic Behavioral Properties of SCDL/WS-BPEL Service-Component ArchitecturesTaoufik Sakka Rouis, Mohamed Tahar Bhiri, Mourad Kmimech, Layth Sliman. 381-389 [doi]
- Pattern-Based Approaches for Business Process Improvement: A Literature ReviewNesrine Missaoui, Sonia Ayachi Ghannouchi. 390-400 [doi]
- Research on Image Content Authentication Algorithm of Semi-fragile Watermarking for Adaptive Embedding Based on Characteristic of ImageShan Yang, Liang Chen, De-li. 403-413 [doi]
- Autoencoder-Based on Anomaly Detection with Intrusion Scoring for Smart Factory EnvironmentsGimin Bae, Sunggyun Jang, Minseop Kim, Inwhee Joe. 414-423 [doi]
- SwarmESB EcosystemIoana Stanescu, Lenuta Alboaie, Andrei Panu. 424-432 [doi]
- PINUS: Indoor Weighted Centroid Localization with Crowdsourced CalibrationJehn-Ruey Jiang, Hanas Subakti, Ching-chih Chen, Kazuya Sakai. 433-443 [doi]
- A Study on Application Method for Automation Solution Using Blockchain dApp PlatformSeongkyu Kim, Hyun-Taek Kwon, Young-Kun Kim, Yong-Pil Park, Dae-Won Keum, Ung-Mo Kim. 444-458 [doi]
- Towards a Two Factor Authentication Method Using Zero-Knowledge Protocol in Online Banking ServicesManish Singh, Yichen Han. 459-472 [doi]
- Security Vulnerability Analysis of Wi-Fi Connection Hijacking on the Linux-Based Robot Operating System for Drone SystemsJinyeong Kang, Inwhee Joe. 473-482 [doi]