Abstract is missing.
- Detecting Pedestrians Behavior in Building Based on Wi-Fi SignalsWenyuan Ma, Xinning Zhu, Junfei Huang, Guochu Shou. 1-8 [doi]
- E-Health Services for Elderly Care Based on Google Cloud MessagingChing-Nung Yang, Fu-Heng Wu, Sin-Yen Tsai, Wen-Chung Kuo. 9-12 [doi]
- On Interesting Place Finding in Social Sensing: An Emerging Smart City Application ParadigmChao Huang, Dong Wang. 13-20 [doi]
- Collaborative Representation-Based Robust Face Recognition by Discriminative Low-Rank RepresentationWen Zhao, Xiao-jun Wu, He-Feng Yin. 21-27 [doi]
- A Self-Adaptive Video Dual Watermarking Based on the Motion Characteristic and Geometric Invariant for Ubiquitous MultimediaZhi Li, Ling-Feng Liu, Chuan-Xian Jiang. 28-32 [doi]
- The Role of Big Data on Smart Grid TransitionThe-Hien Dang-Ha, Roland Olsson, Hao Wang. 33-39 [doi]
- Sensing Information Modelling for Smart CityHongxia Wang. 40-45 [doi]
- Benchmarking RDF Stores for Smart City ServicesPierfrancesco Bellini, Paolo Nesi, Gianni Pantaleo. 46-49 [doi]
- OPC: A Distributed Computing and Memory Computing-Based Effective Solution of Big DataZhi Yang, Chunping Zhang, Mu Hu, Feng Lin. 50-53 [doi]
- Exploration of Collective Pattern to Improve Location Prediction of Mobile Phone UsersChen Zhou, Benxiong Huang. 54-59 [doi]
- Performance Modelling of Preemption-Based Packet Scheduling for Data Plane in Software Defined NetworksWang Miao, Geyong Min, Yulei Wu, Haozhe Wang. 60-65 [doi]
- A Performance Evaluation Model for Virtual Servers in KVM-Based Virtualized SystemJing Yang, Yuqing Lan. 66-71 [doi]
- Toward Vulnerability Assessment for 5G Mobile Communication NetworksShibo Luo, Jun Wu, Jianhua Li, Longhua Guo, Bei Pei. 72-76 [doi]
- Nutshell: Cloud Simulation and Current TrendsUbaid ur Rahman, Owais Hakeem, Muhammad Raheem, Kashif Bilal, Samee U. Khan, Laurence T. Yang. 77-86 [doi]
- Aspect-Oriented Customization of the Scheduling Algorithms and the Resource Access Protocols of a Real-Time Operating System FamilyYusuke Harada, Kazuki Abe, Myungryun Yoo, Takanori Yokoyama. 87-94 [doi]
- A Distributed Scheduling Algorithm for IEEE 802.15.4e NetworksWu-Ping Wang, Ren-Hung Hwang. 95-100 [doi]
- Duplicate Report Detection in Urban Crowdsensing Applications for Smart CityJize Zhang, Dong Wang. 101-107 [doi]
- Aerosol Retrieval over Urban Area by Syngertic Use of Feng Yun-3C MERSI and Terra MODIS DataWeihong Han, Ling Tong, Yunping Chen. 108-111 [doi]
- Air Pollution Sources Identification Precisely Based on Remotely Sensed Aerosol and Glowworm Swarm OptimizationYunping Chen, Weihong Han, Wenhuan Wang, Yaju Xiong, Ling Tong. 112-116 [doi]
- A Smart Decision Support System for Smart CityMarco Bartolozzi, Pierfrancesco Bellini, Paolo Nesi, Gianni Pantaleo, Luca Santi. 117-122 [doi]
- Crowd Energy Information Security Culture - Security Guidelines for Smart EnvironmentsStephanie Teufel, Bernd Teufel. 123-128 [doi]
- A Study on the Reliability of Software Defined Wireless Sensor NetworkYulin Lu, Xin Huang, Baichuan Huang, Weiwen Xu, Qian Zhang, Ruiyang Xu, Dawei Liu. 129-134 [doi]
- Optimal Sink Placement in M2M over LTE NetworksYen-Hsiung Tseng, Ren-Hung Hwang, Chin-Feng Lai, Cheng-yu Hou. 135-140 [doi]
- A Business and Solution Architecture of the Smart City Operating System i-stackHua Yao, Chong Gao, Huangjun Shi, Chao Liu, Gary Yang. 141-146 [doi]
- Feasibility Analysis on Collaborative Platform for Delivery Fulfillment in Smart CityLindawati, Chen Wang, Wei Cui, Niveditha Hari. 147-152 [doi]
- Predicting Short-Term Traffic Flow by Long Short-Term Memory Recurrent Neural NetworkYongxue Tian, Li Pan. 153-158 [doi]
- Path Determination under Stochastic Travel Times Using Target-Oriented Robust OptimizationChen Wang, Bingshui Da. 159-164 [doi]
- Intelligent Traffic Alert System for Smart CitiesAssil Ksiksi, Saeed Al Shehhi, Rashad Ramzan. 165-169 [doi]
- Enabling Technology for Smart City Transportation in Developing CountriesThaw Tar Thein Zan, Lounell Bahoy Gueta, Toshio Okochi. 170-174 [doi]
- A Predictive Taxi Dispatching System for Improved User Satisfaction and Taxi UtilizationSatish Kumar Verma, Hoang Tam Vo. 175-182 [doi]
- A Low-Cost Sparse Recovery Framework for Weighted Networks under Compressive SensingHamidreza Mahyar, Hamid R. Rabiee, Ali Movaghar, Rouzbeh Hasheminezhad, Elaheh Ghalebi, Ali Nazemian. 183-190 [doi]
- Fast Inter-mode Decision Based on Motion Estimation and Texture Feature for HEVCBinfei Shao, Xingang Liu, Deyuan Liu. 191-196 [doi]
- Overlapping Community Detection Using NVPAKeke Gu, Junhua Tang, Li Pan, Jianhua Li. 197-202 [doi]
- Collaboration Prediction in Heterogeneous Information NetworksShuhong Zhang, Feng Xia, Jun Zhang, Xiaomei Bai, Zhaolong Ning. 203-208 [doi]
- Web Cache Replacement Strategy Based on Reference DegreeXiaozhou Wu, Hongzhe Xu, Xiaoguang Zhu, Wen Li. 209-212 [doi]
- Percolation Models of Information Dissemination in Social NetworksS. A. Lesko, D. O. Zhukov. 213-216 [doi]
- A Fast CU Decision Algorithm for MV-HEVCPeicheng Wang, Xingang Liu, Binfei Shao. 217-221 [doi]
- Intent Classification of Short-Text on Social MediaHemant Purohit, Guozhu Dong, Valerie L. Shalin, Krishnaprasad Thirunarayan, Amit P. Sheth. 222-228 [doi]
- What Automaton Model Captures Decision Making? The Necessity of Behavioral ComplexityStephan Schosser, Bodo Vogt. 229-235 [doi]
- Principal Component Analysis Aware BP Neural Network for Personal Information Prediction in Internet Based ServicesYue Qu, Wenge Rong, Yuanxin Ouyang, Hui Chen, Zhang Xiong. 236-241 [doi]
- TAPRank: A Time-Aware Author Ranking Method in Heterogeneous NetworksXiangjie Kong, Jinmeng Zhou, Jun Zhang, Wei Wang, Feng Xia. 242-246 [doi]
- Community Influence Analysis Based on Social Network StructuresYi Li, Xindong Wu, Lei Li. 247-254 [doi]
- Credit Distribution for Influence Maximization in Online Social Networks with Time ConstraintYan Pan, Xiaoheng Deng, Hailan Shen. 255-260 [doi]
- Identifying Highly Potential Enterprises with Social Computing on Supply Chain NetworksTe-Min Chang, Chao-Hsien Sung, Guo-Hsin Hu, Ming-Fu Hsu, Keng-Pei Lin. 261-266 [doi]
- Link Prediction Using Social Network Analysis over Heterogeneous Terrorist NetworkAkash Anil, Durgesh Kumar, Shubhanshu Sharma, Rakesh Singha, Ranjan Sarmah, Nitesh Bhattacharya, Sanasam Ranbir Singh. 267-272 [doi]
- Using Crowd-Source Based Features from Social Media and Conventional Features to Predict the Movies PopularityMehreen Ahmed, Maham Jahangir, Hammad Afzal, Awais Majeed, Imran Siddiqi. 273-278 [doi]
- Social Media Story TellingPatrick Hennig, Philipp Berger, Christian Dullweber, Moritz Finke, Fabian Maschler, Julian Risch, Christoph Meinel. 279-284 [doi]
- Mining Social Groups in Campus Based on Wireless DetectionShan Jiang, Xinning Zhu, Junfei Huang, Guochu Shou. 285-288 [doi]
- Influence Maximization on Signed Social Networks with Integrated PageRankShubo Chen, Kejing He. 289-292 [doi]
- Big Social Data and Political Sentiment: The Tweet Stream during the UK General Election 2015 CampaignGiuseppe Di Fatta, J. James Reade, Sylvia Jaworska, Anupam Nanda. 293-298 [doi]
- Real-Time Local Word Database Construction from TwitterTakuya Kamimura, Naoko Nitta, Noboru Babaguchi. 299-306 [doi]
- Learning Structured Knowledge from Social Tagging Data: A Critical Review of Methods and TechniquesHang Dong, Wei Wang, Hai-Ning Liang. 307-314 [doi]
- Service Discovery Based on Trustworthiness in MSNP: Major Issues, Potential Solutions, and Feasible StrategiesXixi Ma, Qun Jin, Julong Pan, Yufeng Wang. 315-320 [doi]
- SP-TCP: Scheduling Perceived TCP in Virtualized DatacentersJianjian Wang, Hongbo Wang. 321-325 [doi]
- Extracting Image Context from Pinterest for Image RecommendationPhilipp Berger, Patrick Hennig, Daniel Dummer, Alexander Ernst, Thomas Hille, Frederik Schulze, Christoph Meinel. 326-332 [doi]
- A Comparison of Similarity Metrics for Sentiment Analysis on Turkish Twitter FeedsOnder Coban, Baris Ozyer, Gulsah Tumuklu Ozyer. 333-338 [doi]
- A Semi-supervised Learning Approach for Microblog Sentiment ClassificationZhiwei Yu, Raymond K. Wong, Chi-Hung Chi, Fang Chen. 339-344 [doi]
- Learning the Discriminate Patches from the Key Landmarks for Facial Expression RecognitionXun Wang, Xingang Liu. 345-348 [doi]
- Monitor Node Selection Algorithm Based on Mutual Information in Wireless Mesh NetworksYao Yu, Xiaojie Wang, Jie Zhang, Yujuan Lv, Xueyan Zhu, Xin Zhang. 349-353 [doi]
- Triaging Anomalies in Dynamic Graphs: Towards Reducing False PositivesTeng Wang, Chunsheng Victor Fang, Chun-Ming Lai, Shyhtsun Felix Wu. 354-359 [doi]
- Contextual Healing: Privacy through Interpretation ManagementRula Sayaf, Sören Preibusch, Dave Clarke. 360-365 [doi]
- Concerning Popularity in an Online Trust RelationshipHan Jiao, Lu Lu. 366-371 [doi]
- Privacy Preserving Information Dispersal in Social Networks Based on Disposition to PrivacyB. S. Vidyalakshmi, Raymond K. Wong, Chi-Hung Chi. 372-377 [doi]
- Pippy Search: Anomaly Traffic ClusteringLili Yang, Jie Wang, Mansoor Ahmed Khuhro. 378-383 [doi]
- An Integrated Incentive Mechanism for Device to Device (D2D)-Enabled Cellular Traffic OffloadingYufeng Wang, Zhou Ju, Athanasios V. Vasilakos, Jianhua Ma. 384-390 [doi]
- A Framework of Fine-Grained Mobile Sensing Data Collection and Behavior Analysis in an Energy-Configurable WayXiaoyun Mo, Dianxi Shi, Ruosong Yang, Han Li, ZheHang Tong, Feng Wang. 391-398 [doi]
- SONIC: Bridging the Gap between Different Online Social Network PlatformsSebastian Göndör, Felix Beierle, Senan Sharhan, Hussam Hebbo, Evren Kucukbayraktar, Axel Küpper. 399-406 [doi]
- Effects of Punishment in a Structure Population Playing the Social Dilemma Game by Using Discrete PSO AlgorithmXiaoyang Wang, Lei Zhang, Xiaorong Du, Yunlin Sun. 407-414 [doi]
- Portfolio Choice vs. Single Choice: Neural Differences in Cognitive ControlRalf Morgenstern, Marcus Heldmann, Bodo Vogt. 415-420 [doi]
- Defense Technology of Wormhole Attacks Based on Node ConnectivityJiu-hu Zheng, Huan-yan Qian, Lei Wang. 421-425 [doi]
- Agglomerative Hierarchical Clustering for Information Retrieval Using Latent Semantic IndexHansaem Park, Kyunglag Kwon, Abdel-ilah Zakaria Khiati, Jeungmin Lee, In Jeong Chung. 426-431 [doi]
- Finding Demand for Products in the Social WebPhilipp Berger, Patrick Hennig, Stefan Bunk, Dimitri Korsch, Daniel Kurzynski, Christoph Meinel. 432-439 [doi]
- A Temporal Model of Research Work Tracking and Assessing for an Individual and a GroupWei Liang, Zixian Lu, Qun Jin, Yonghua Xiong, Min Wu. 440-445 [doi]
- An Information-Theoretic Model for Knowledge Sharing in Opportunistic Social NetworksMai ElSherief, Tamer A. ElBatt, Ahmed H. Zahran, Ahmed Helmy. 446-451 [doi]
- A Simple Questionnaire Can Change Everything: Are Strategy Choices in the Coordination and Ultimatum Games Stable?Siegfried K. Berninghaus, Lora R. Todorova, Bodo Vogt. 452-456 [doi]
- Social Community-Oriented Social Attribute Analysis: An Empirical Study on QQ Group DataLei Li, Di Ma, Guanfeng Liu. 457-464 [doi]
- Matrix Based Community Evolution Events Detection in Online Social NetworksYang Sun, Junhua Tang, Li Pan, Jianhua Li. 465-470 [doi]
- HYChat: A Hybrid Interactive Chat System for Mobile Social Networking in ProximityJinhang Zuo, Yufeng Wang, Qun Jin, Jianhua Ma. 471-477 [doi]
- User Emotion Recognition Based on Multi-class Sensors of SmartphoneDianxi Shi, Xi Chen, Jing Wei, Ruosong Yang. 478-485 [doi]
- Trustworthy and Communal Social Classifieds Using HTTP and Wi-FiYung-Ting Chuang. 486-493 [doi]
- An Advertisement Video Analysis System Based on Eye-TrackingXue-Bai Zhang, Chih-Tien Fan, Shyan-Ming Yuan, Zih-You Peng. 494-499 [doi]
- User Preference Modeling by Trust Propagation for Rating PredictionYu Lei, Qiang Chen, Chengyao Chen, Wenjie Li. 500-506 [doi]
- AHITS-UPT: A High Quality Academic Resources Recommendation MethodMeilian Lu, Xudan Wei, Jie Gao, Yan Shi. 507-512 [doi]
- CAR: Incorporating Filtered Citation Relations for Scientific Article RecommendationHaifeng Liu, Zhuo Yang, Ivan Lee, Zhenzhen Xu, Shuo Yu, Feng Xia. 513-518 [doi]
- Variations of Social Psychology of Russian Society in Last 100 YearsValery D. Solovyev, Vladimir V. Bochkarev, A. D. Kaveeva. 519-523 [doi]
- Research on the Structure, Current Situation, and Influence Factors of the Social Inclusion of Migrant Workers: Based on "Three Inclusions" of Migrant Workers Survey in Hunan ProvinceJinyue Yang, Zequan Pan. 524-527 [doi]
- Graph Based Local Risk Estimation in Large Scale Online Social NetworksNaeimeh Laleh, Barbara Carminati, Elena Ferrari. 528-535 [doi]
- MPI Derived Datatypes and Data Communication Analysis in Meteorological ApplicationsYongwen Wu, Junqiang Song, Kaijun Ren, Xiaoyong Li. 536-541 [doi]
- Big Data Techniques for Scalable In-Band and Out-of-Band HPC Energy MeasurementDavid K. Newsom, Sardar F. Azari, Olivier Serres, Abdel-Hameed A. Badawy, Tarek A. El-Ghazawi. 542-549 [doi]
- Energy Efficient Job Co-scheduling for High-Performance Parallel Computing ClustersDavid K. Newsom, Olivier Serres, Sardar F. Azari, Abdel-Hameed A. Badawy, Tarek A. El-Ghazawi. 550-556 [doi]
- Context-Aware Traffic Forwarding Service for Applications in SDNShibo Luo, Jun Wu, Jianhua Li, Longhua Guo, Bei Pei. 557-561 [doi]
- Understanding Compressed Sensing Inspired Approaches for Path Reconstruction in Wireless Sensor NetworksRui Liu, Xiaoyang Zhong, Yao Liang, Jingsha He. 562-567 [doi]
- Greening Data Centers within Cost BudgetHui Dou, Yong Qi. 568-574 [doi]
- Ranking Energy-Aware ServicesNaseem Ibrahim. 575-580 [doi]
- An Improved 3D Location Algorithm Model Research Based on Directional TD-MUSICKeyi Zhang, Ping Zhao, Hongfei Yao, Jie Liu, Wenzhe Shi, Wenhao Wang, Zhenjin Wang, Bo Li. 581-585 [doi]
- Tracking and Controlling Maximum Power Point Utilizing Artificial Intelligent SystemMarwa Ahmed Abd El Hamied. 586-589 [doi]
- Towards a Random Walk Controller for Block Management and Wear Leveling in Flash MemoryJiani Lan, Hao Wang, Xinyuan Lou. 590-597 [doi]
- Deister: A Light-Weight Autonomous Block Management in Data-Intensive File Systems Using Deterministic Declustering DistributionXuhong Zhang, Jiangling Yin, Jun Wang, RuiJun Wang, Dan Huang. 598-604 [doi]
- A General Accelerated R Package Using GPUJie Huang, BoJin Zhuang, Fei Su. 605-608 [doi]
- Load Balancing for Parallel Discrete Event Simulation of Stochastic Reaction and DiffusionZhongwei Lin, Yiping Yao. 609-614 [doi]
- Capability Adaptive Elastic IoT ArchitectureTao Zhong, Kshitij A. Doshi, Zhongyan Lu, Gang Deng. 615-622 [doi]
- A Data Placement Strategy for Big Data Based on DCC in Cloud Computing SystemsTao Wang, Shihong Yao, ZhengQuan Xu, Shan Jia, Qiang Xu. 623-630 [doi]
- Design and Construction of a Big Data Analytics Framework for Health ApplicationsMu-Hsing Kuo, Dillon Chrimes, Belaid Moa, Wei Hu. 631-636 [doi]
- D3-MapReduce: Towards MapReduce for Distributed and Dynamic Data SetsHaiwu He, Anthony Simonet, Julio Anjos Jose-Francisco Saray, Gilles Fedak, Bing Tang, Lu Lu, Xuanhua Shi, Hai Jin, Mircea Moca, Gheorghe Cosmin Silaghi, Asma Ben Cheikh, Heithem Abbes. 637-642 [doi]
- Parallel Discrete Event Simulation of Stochastic Reaction and Diffusion Using Reverse ComputationZhongwei Lin, Yiping Yao. 643-648 [doi]
- FlexCloud: A Flexible and Extendible Simulator for Performance Evaluation of Virtual Machine AllocationMinxian Xu, GuoZhong Li, Wutong Yang, Wenhong Tian. 649-655 [doi]
- An Elastic Data Persisting Solution with High Performance for SparkZhipeng Jiang, Haopeng Chen, Huan Zhou, Jenny Wu. 656-661 [doi]
- Towards an Environment for Doing Data Science That Runs in BrowsersLeila Abidi, Christophe Cérin, Gilles Fedak, Haiwu He. 662-667 [doi]
- Data Partition Optimization for Column-Family NoSQL DatabasesLi-Yung Ho, Meng-Ju Hsieh, Jan-Jan Wu, Pangfeng Liu. 668-675 [doi]
- TiQ: A Timeline Query Processing System over Road Traffic DataArdi Imawan, Fadhilah Kurnia Putri, Joonho Kwon. 676-682 [doi]
- An Optimized Cache Replacement Algorithm for Information-centric NetworksXiaocui Sun, Zhijun Wang. 683-688 [doi]
- An Improved Fast Search Clustering Algorithm Based on Kernel DensityRuisheng Zhang, Huiyi Ma, Qi-dong Liu, Zhili Zhao. 689-693 [doi]
- Visualizing Big Hierarchical Datasets on Concentric RingsChao Wen, Kang Zhang, Jie Li, Fanrui Sun. 694-701 [doi]
- Towards Bridging the Gap between Machine Learning Researchers and PractitionersHaytham Assem, Declan O'Sullivan. 702-708 [doi]
- Graph Code Based Isomorphism Query on Graph DataYu Wai Hlaing, Kyaw May Oo. 709-714 [doi]
- BiFennel: Fast Bipartite Graph Partitioning Algorithm for Big DataLyu-Wei Wang, Shih-Chang Chen, Wenguang Chen, Hung-Chang Hsiao, Yeh-Ching Chung. 715-720 [doi]
- MapReduce Implementation of XML Keyword Search AlgorithmYong Zhang, Quanlin Li, Bo Liu. 721-728 [doi]
- Incremental Localization Algorithm Based on Regularized Iteratively Reweighted Least SquareXiaoyong Yan, Aiguo Song, Yu Liu, Jian He, Ronghui Zhu. 729-733 [doi]
- Extracting Baseline Electricity Usage Using Gradient Tree BoostingTaehoon Kim, Dongeun Lee, Jaesik Choi, Anna Spurlock, Alex Sim, Annika Todd, Kesheng Wu. 734-741 [doi]
- Fasting Blood Glucose Change Prediction Model Based on Medical Examination Data and Data Mining TechniquesWenxiang Xao, Fengjing Shao, Jun Ji, RenCheng Sun, Chunxiao Xing. 742-747 [doi]
- Pre-processing Boosting Twitter Sentiment Analysis?Jianqiang Zhao. 748-753 [doi]
- Performance Evaluation of Statistical FunctionsAndre Rodrigues, Carla Silva, Paulo Vinicius Koerich Borges, Sergio Silva, Inês Dutra. 754-760 [doi]
- BEMD-Based Event Analysis for Crude Oil Market: Evidence Using Google Search DataLanyi Hu, Jue Wang, Chen Qi. 761-768 [doi]
- Volatility Analysis of Chinese Stock Market Using High-Frequency Financial Big DataTongtong Dong, Bowei Yang, Tianhai Tian. 769-774 [doi]
- Access Control for Privacy Protection for Dynamic and Correlated DatabasesNafei Zhu, Min Zhang, Dengguo Feng, Jingsha He. 775-779 [doi]
- Preserving the Privacy of Social Recommendation with a Differentially Private ApproachLiang Chen, Peidong Zhu. 780-785 [doi]
- A Workload-Driven Approach to Dynamic Data Balancing in MongoDBShan Lin, Haopeng Chen, Fei Hu. 786-791 [doi]
- SoTree: An Automated Phylogeny Assembly Tool for Ecologists from Big TreeZhen Meng, Jianhui Li, Tuo Yang, Li Lin, Zhiduan Chen. 792-797 [doi]
- Transforming UML Class Diagram into Cassandra Data Model with AnnotationsWenduo Feng, Ping Gu, Chao Zhang, Kai Zhou. 798-805 [doi]
- An Empirical Comparison between Kelly Criterion and Vince's Optimal FMu-En Wu, Chia-Hung Wang, Wei-Ho Chung, Raylin Tso, I.-Hsuan Yang. 806-810 [doi]
- Opportunistic Spectrum Access of Sparse Wideband in Stand-Alone and Cooperative Cognitive Radio NetworksSk. Shariful Alam, M. Lucio, Carlo S. Regazzoni. 811-813 [doi]
- Variants of Graph Matching for Tree-like GraphsTakayuki Nagoya. 814-821 [doi]
- A Big Data Based Intelligent Decision Support System for Sustainable Regional DevelopmentHong Zhou, Christopher Noble, Julie Cotter. 822-826 [doi]
- A Data Generation Algorithm for Internet of Things Based on Complex Event ProcessingHuiqun Zhao, Yankun Yang. 827-831 [doi]
- Combining Semantic and Prior Polarity for Boosting Twitter Sentiment AnalysisJianqiang Zhao, Xueliang Cao. 832-837 [doi]
- Wavelet Enhanced Image Preprocessing and Neural Networks for Hand Gesture RecognitionXingang Fu, Jiang Lu, Ting Zhang, Chadwell Bonair, Marvin L. Coats. 838-843 [doi]
- User Preference Quantity versus Recommendation Performance: A Preliminary StudyPenghua Yu, Lanfen Lin, Jing Wang. 844-849 [doi]
- Big Data Use Case Domains for Telecom OperatorsRabiul Islam Jony, Ahsan Habib, Nabeel Mohammed, Rakibul Islam Rony. 850-855 [doi]
- Detect Similar Mobile Applications with Transfer LearningNing Bu, Lei Yu, Wenjing Ma, Changying Du, Shuzi Niu, Guoping Long. 856-859 [doi]
- Big Data Privacy: Changing Perception of PrivacyQing Tan, Frederique C. Pivot. 860-865 [doi]
- Mid-model Design Used in Model Transition and Data Migration between Relational Databases and NoSQL DatabasesDongzhao Liang, Yunzhen Lin, Guiguang Ding. 866-869 [doi]
- Trends, Self-Similarity, and Forecasting of News Events in the Information Domain, Its Structure and DirectorS. A. Lesko, D. O. Zhukov. 870-873 [doi]
- A Novel Cayley-Based Index in Cloud StorageLan Li, Wanzhao Li, Kefeng Li, Weiqian Chen. 874-877 [doi]
- Multi-level DC Power Distribution Interface for Data CentersDing-Feng Huang, Hurng-Liahng Jou, Jinn-Chang Wu, Kuen-Der Wu, Jun-Jie Huang. 878-881 [doi]
- SpaceViz: Visualization Tool for the Computer Storage Big-DataJ. Joshua Thomas, Ahamad Tajudin Khader, Bahari Belaton. 882-885 [doi]
- Visual Based Prediction of Physical Characteristics for a Smart Fashion SystemSophie Xiaofan Liu, Bingju Guo, Xiang Fang, Joshua C. Williams. 886-889 [doi]
- Storage-Aware Server Consolidation for Cloud Services Utilizing Local StorageHuining Yan, Huaimin Wang, Bo Ding, Haibo Mi, Dianxi Shi. 890-895 [doi]
- S4STRD: A Scalable in Memory Storage System for Spatio-temporal Real-Time DataTran Vu Pham, Duc Hai Nguyen, Khue Doan. 896-901 [doi]
- Pack Up Cloud: Recursive Datacenter Resource Management and Experimental StudiesYe Xia 0001, Shigang Chen, MaurÃcio O. Tsugawa, José A. B. Fortes. 902-907 [doi]
- Moving SCADA Systems to IaaS CloudsPhilip Church, Harald Mueller, Caspar Ryan, Spyridon V. Gogouvitis, Andrzej Goscinski, Houssam Haitof, Zahir Tari. 908-914 [doi]
- Implementing a Workflow Agent on Federated CloudSyuan-Ru Jhu, Chih-Tien Fan, Shyan-Ming Yuan, Yue-Shan Chang. 915-920 [doi]
- A Disjunctive VMI Model Based on XSMJiangyong Shi, Yuexiang Yang, Chengye Li. 921-925 [doi]
- Modeling and Evaluating of Resource Allocation in Openstack Cloud Computing PlatformJie Ding, Leijie Sha, Xiao Chen, Xinshan Zhu. 926-931 [doi]
- A Heuristic Scheduling Approach to Hybrid Makepsan Problem for Data Intensive ComputingWei Liang, Yonghua Xiong, Min Wu 0002, Qun Jin. 932-937 [doi]
- RPFF: A Remote Page-Fault Filter for Post-copy Live MigrationKui Su, Wenzhi Chen, Guoxi Li, Zonghui Wang. 938-943 [doi]
- An Inter-framework Cache for Diverse Data-Intensive Computing EnvironmentsChun-yu Wang, Tzu-En Huang, Yu-Tang Huang, Jyh-Biau Chang, Ce-Kuen Shieh. 944-949 [doi]
- Design of SDN-Enabled Cloud Data CenterRen-Hung Hwang, Huei-Ping Tseng, Yu-Chi Tang. 950-957 [doi]
- A Discrete DP-Wrap Scheduling Algorithm for Multiprocessor SystemsJingwei Yang, Xiaojian Luo, Xiang Long. 958-962 [doi]
- A Dynamic Network Bandwidth Allocation Mechanism under Network QoS ConstraintsHung-Lin Huang, Min-Huang Ho, Shao-Jui Chen, Yi Feng Chen, Wei-Jen Wang. 963-968 [doi]
- Service Response Time Measurement Model of Service Level Agreements in Cloud EnvironmentClayton Maciel Costa, Cicilia Raquel Maia Leite, Antonio Luis Sousa. 969-974 [doi]
- Efficient Common Prefix Search on Encrypted Data as an Additional Service on the Top of the Storage ProvidersAmir Rezapour, Shiuan-Tung Chen, Hung-Min Sun. 975-981 [doi]
- Specification and Composition of Student-Oriented ServicesNaseem Ibrahim. 982-987 [doi]
- A Public Cloud Based SOA Workflow for Machine Learning Based Recommendation AlgorithmsRam G. Athreya, Srinivasan Thanukrishnan. 988-995 [doi]
- An Oriented-Group Supporting Multi-user Public Auditing for Data SharingJianhong Zhang, Pengyan Li, Jian Mao. 996-1002 [doi]
- Accelerating Raptor Code Decoding Using Group Parameters for IPTV Service DeliveryShiuan-Tung Chen, Hsin-Ta Chiao, Shih-Ying Chang, Hung-Min Sun. 1003-1009 [doi]
- Containerized SQL Query Evaluation in a CloudWeining Zhang, David Holland. 1010-1017 [doi]
- XML Languages for Student-Oriented ServicesNaseem Ibrahim. 1018-1023 [doi]
- Hierarchical ID-Based Searchable Encryption with Constant Size Ciphertext in CloudXiaofen Wang, Xiaosong Zhang, Yi Mu. 1024-1031 [doi]
- A Privacy Enhanced Search Approach for Cloud-Based Medical Data SharingLu Liu, Jingchao Sun, JianQiang Li, Rong Li, Juan Li, Xi Meng, Huifang Li, Ji-Jiang Yang. 1032-1037 [doi]
- Automatically Generating Payload-Based Models for Botnet DetectionChung-Nan Lee, Fred Chou, C.-M. Chen. 1038-1044 [doi]
- A Distributed Android Security FrameworkBenjamin Andow, Haodong Wang. 1045-1052 [doi]
- Energy-Efficient Statistical Live Virtual Machine Placement for Big Data Information Systems in Cloud Computing EnvironmentsXinying Zheng, Yu Cai. 1053-1058 [doi]
- Auto-scaling Strategy for Amazon Web Services in Cloud ComputingWen-Hwa Liao, Ssu-Chi Kuai, Yu-Ren Leau. 1059-1064 [doi]
- A Queueing-Theory-Based Bandwidth Allocation Algorithm for Live Virtual Machine MigrationChangpeng Zhu, Bo Han, Yinliang Zhao, Bin Liu. 1065-1072 [doi]
- Distributed Virtual Network Embedding with Bloom FilterSude Qing, Min Feng, Hua Jin. 1073-1078 [doi]
- Efficient Hybriding Auto-scaling for OpenStack PlatformsChia-Ching Chen, Shao-Jui Chen, Fan Yin, Wei-Jen Wang. 1079-1085 [doi]
- A Cost-Driven Multi-objective Optimization Algorithm for SaaS Applications PlacementBin Qian, Fanchao Meng, Dianhui Chu. 1086-1091 [doi]
- An Energy-Aware Random Multi-path Routing Protocol for MANETsSheng-Lung Peng, Yan Hao Chen, Ruay Shiung Chang, Jou-Ming Chang. 1092-1097 [doi]
- Design and Implementation of Private Cloud Storage Platform Based on OpenStackJiuyuan Huo, Hong Qu, Ling Wu. 1098-1101 [doi]
- A Comparison Framework for SOA Maturity ModelsSupriya Pulparambil, Youcef Baghdadi. 1102-1107 [doi]
- eHealth Recommendation Service System Using Ontology and Case-Based ReasoningHyun Jung Lee, Hee-Sun Kim. 1108-1113 [doi]
- Parallelizing R in Hadoop (A Work-in-Progress Study)Yen-Zhou Huang, Yu-Ling Chen, Chia-Ping Tsai, Hung-Chang Hsiao. 1114-1116 [doi]
- A Calculation Model for the Serviceable Evaluation of User Online CommentJing Yang, Taiming Wang, Jun Wang. 1117-1121 [doi]
- A Framework of Analyzing Border Crossing Transportation DataHaibo Wang, Da Huo, Yaquan Xu. 1122-1127 [doi]
- BYOD Security: A New Business ChallengeKathleen Downer, Maumita Bhattacharya. 1128-1133 [doi]
- Research on Behavior Trust Based on Bayesian Inference in Trusted Computing NetworksWei Liu, Linlin Ci, Liping Liu. 1134-1138 [doi]
- A Topic-Level Privacy Preserving Search in the Medical FieldMeng Tian, JianQiang Li, Xi Meng, Rong Li, Jing Bi, Juan Li, Yu Zhao 0002, Bo Liu. 1139-1142 [doi]
- Cloud Storage Access GatewayZe-Yan Yang, Che-Pin Chang, Shyan-Ming Yuan. 1143-1146 [doi]
- Energy Efficient Mobile Computation Offloading through Workload MigrationChengxi Gao, Victor C. S. Lee. 1147-1150 [doi]
- FLAX: A Flexible Architecture for Large Scale Cloud FabricYiyang Shao, Yihang Luo, Xiaohe Hu, Yibo Xue, Yang Xiang, Kevin Yin. 1151-1154 [doi]
- Some Experimental Issues in Financial Fraud Detection: An InvestigationJarrod West, Maumita Bhattacharya. 1155-1158 [doi]
- High Performance Computation Based on Semantic P2P NetworkLican Huang. 1159-1162 [doi]
- A Resource Mapping Method in Cloud-Based Satellite Ground SystemCunqun Fan, Xiangang Zhao, Lizi Xie, You Ma, Yunpeng Zhang, Xiaohu Feng. 1163-1166 [doi]
- File System Allocation in Cloud Storage Services with GlusterFS and LustreWei-Chih Huang, Chuan-Chi Lai, Chun-An Lin, Chuan-Ming Liu. 1167-1170 [doi]
- Hadoop-Based System Design for Website Intrusion Detection and AnalysisXiaoming Zhang, Guang Wang. 1171-1174 [doi]