Abstract is missing.
- Utilizing Multi-Level Data Fault Tolerance to Converse Energy on Software-Defined StorageShuo-Han Chen, Min-Hong Shen, Yung-Chun Chang, Tseng-Yi Chen, Tsan-sheng Hsu, Hsin-Wen Wei, Wei Kuan Shih. 1-6 [doi]
- SCADIS: Supporting Reliable Scalability in Redis Replication on DemandHaklin Kimm, Zuqing Li, Hanke Kimm. 7-12 [doi]
- A Host-Agnostic, Supervised Machine Learning Approach to Automated Overload Detection in Virtual Machine WorkloadsEli M. Dow, Jeanna N. Matthews. 13-23 [doi]
- Approach for Cloud Recommendation and Integration to Construct User-Centric Hybrid CloudJoonseok Park, Donggyu Yun, Ungsoo Kim, Keunhyuk Yeom. 24-32 [doi]
- A Visual Model-Based Evaluation Framework of Cloud-Based Prognostics and Health ManagementKedun Mao, Yongxin Zhu, Zhixiong Chen, Xiang Tao, Qixuan Xue, Han Wu, Yishu Mao, Junjie Hou. 33-40 [doi]
- A Scheduling Scheme of Task Allocation in Real Time Multiple-Partition Embedded AvionicQixuan Xue, Yongxin Zhu, Yajie Wang, Kedun Mao, Han Wu, Mengjun Li, Yishu Mao, Junjie Hou. 41-46 [doi]
- Helper Data Aware Cloning Method for Physical Unclonable FunctionMasaya Yoshikawa, Yusuke Nozaki. 47-51 [doi]
- Why Should Only Your Home Be Smart? - A Vision for the Office of TomorrowAndrea Horch, Michael Kubach, Heiko RoBnagel, Uwe Laufs. 52-59 [doi]
- An Empirical Study of Different Cloud Migration TechniquesAwatef Balobaid, Debatosh Debnath. 60-65 [doi]
- Efficient and Scalable ACO-Based Task Scheduling for Green Cloud Computing EnvironmentAdo Adamou Abba Ari, Irepran Damakoa, Chafiq Titouna, Nabila Labraoui, Abdelhak Guéroui. 66-71 [doi]
- Detecting Denial of Service Attacks Using a Combination of Dendritic Cell Algorithm and the Negative Selection AlgorithmObinna Igbe, Oluwaseyi Ajayi, Tarek N. Saadawi. 72-77 [doi]
- Secure Cloud Storage and File SharingBharat S. Rawal, S. Sree Vivek. 78-83 [doi]
- A Privacy-Protection Data Separation Approach for Fine-Grained Data Access ManagementWenyun Dai, Longbin Chen, Meikang Qiu, Ana Wu, Bin Chen. 84-89 [doi]
- Leveraging Cloud Native Design Patterns for Security-as-a-Service ApplicationsKennedy A. Torkura, Muhammad I. H. Sukmana, Feng Cheng 0002, Christoph Meinel. 90-97 [doi]
- Hybrid Energy Management System for Community Energy System FacilitiesTai-Yeon Ku, Wan-Ki Park, Hoon Choi. 98-102 [doi]
- Similarity-Based Node Distance Exploring and Locality-Aware Shuffle Optimization for Hadoop MapReduceJihe Wang, Danghui Wang, Meng Zhang, Meikang Qiu, Bing Guo. 103-108 [doi]
- Enabling Smart Urban Surveillance at The EdgeNing Chen, Yu Chen 0002, Erik Blasch, Haibin Ling, Yang You, Xinyue Ye. 109-119 [doi]
- Improving MapReduce Performance with Progress and Feedback Based Speculative ExecutionIbrahim Adel Ibrahim, Mostafa A. Bassiouni. 120-125 [doi]
- Securing Big Data in the Cloud with Integrated AuditingYong Wang, Bharat Rawal, Qiang Duan. 126-131 [doi]
- Adaptive Flow Admission Control in a Software-Defined NetworkZhiguang Xu. 132-137 [doi]
- Cloud Based Web Scraping for Big Data ApplicationsRam Sharan Chaulagain, Santosh Pandey, Sadhu Ram Basnet, Subarna Shakya. 138-143 [doi]
- Distributed High Performance Computing in OpenStack Cloud over SDN InfrastructureSadhu Ram Basnet, Ram Sharan Chaulagain, Santosh Pandey, Subarna Shakya. 144-148 [doi]
- An Extensive Review and Possible Attack on the Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud ComputingN. Deepa, P. Vijayakumar, Bharat S. Rawal, B. Balamurugan. 149-154 [doi]
- Location-Based Lightweight Security Scheme for Wireless Communications in ROAR ArchitectureSean Grant, Abdulhamid Adebayo, Danda B. Rawat, Moses Garuba, Rajni Goel. 155-160 [doi]
- A Performance-Improved and Storage-Efficient Secondary Index for Big Data ProcessingHan Wu, Yongxin Zhu, Chang Wang, Junjie Hou, Mengjun Li, Qixuan Xue, Kedun Mao. 161-167 [doi]
- Addressing Inefficiency of Floating-Point Operations in Cloud Computing: Implementation and a Case Study of Variable Precision ComputingJunjie Hou, Yongxin Zhu, Yulan Shen, Mengjun Li, Han Wu, Han Song. 168-175 [doi]
- Spectral Graph Wavelets for the Classification of Microcalcifications in MammogramsB. Kiran Bala, S. Audithan. 176-181 [doi]
- A Weakly Supervised Deep Learning Semantic Segmentation FrameworkJizhi Zhang, Guoying Zhang, Qiangyu Wang, Shuang Bai. 182-185 [doi]
- Research on Image Fusion Algorithm Based on Fuzzy Clustering and SemanticsJingxiu Ni, Xu Qian, Guoying Zhang, Xinkai Xu. 186-190 [doi]
- Detecting Multi-Interface from Oil-Water Separation Image Based on Difference Statistics MethodDaihong Zhou, Guoying Zhang, Yu Guo. 191-196 [doi]
- Research and Design on Mixed-Dumping Algorithm in Sanshandao Gold MineGuoying Zhang, Yuanbo He, Yanyan Ma, Han Zhou. 197-201 [doi]
- Research and Construction of Dynamic Awareness Security Protection Model Based on Security PolicyYiming Lu, Wanxing Sheng, Riliang Liu, Peipei Jin. 202-207 [doi]
- Automatically Identifying Fake News in Popular Twitter ThreadsCody Buntain, Jennifer Golbeck. 208-215 [doi]
- A Design for Scalable and Secure Key-Value StoresLongbin Chen, Wenyun Dai, Meikang Qiu, Ning Jiang. 216-221 [doi]
- Analysis of Shearlet Coefficients Based on Alpha Stable DistributionXiaofei Yang, Guangqian Xie, Xiaodong Yu, Yong Shi. 222-225 [doi]
- Smart Cloud Fueling Significant Contribution into Digital Diplomacy in NepalRajendra Man Banepali, Sadhu Ram Basnet, Marut Dhungana, Subarna Shakya. 226-231 [doi]
- Flexible Consistency for Distributed Storage SystemsLongbin Chen, Wenyun Dai, Meikang Qiu, Meiqin Liu, Zenggang Xiong. 232-237 [doi]
- DASS: A Web-Based Fine-Grained Data Access System for SmartphonesWenyun Dai, Longbin Chen, Meikang Qiu, Ana Wu, Meiqin Liu. 238-243 [doi]
- A Greedy Approach for Caching in Distributed Data StoresLongbin Chen, Wenyun Dai, Meikang Qiu. 244-249 [doi]
- Learning Data Privacy and Terms of Service from Different Cloud Service ProvidersMehdi Bahrami, Mukesh Singhal, Wei-Peng Chen. 250-257 [doi]
- An Evaluation of Optimizing for FUD in Scheduling for Shared Computing EnvironmentsArt Sedighi, Milton Smith, Yuefen Deng. 258-262 [doi]
- Forecast of Yearly Stock Returns Based on Adaboost Integration AlgorithmGuoying Zhang, Chen Ping. 263-267 [doi]
- Classification of Patients with Disorder of Consciousness Based on DTI Sequence AnalysisHong Song, Qiang Li, Shixiong Li, Wei Kang, Jian Yang, Yi Yang, Jianghong He. 268-272 [doi]
- Visual Tracking Based on Adaptive Spatially Regularized Correlation FilterCheng Qian, Guiping Zhou, Chunguang Li, Yuming Xu. 273-277 [doi]
- Indoor RSSI Trilateral Algorithm Considering Piecewise and Space-SceneYong Shi, Yi Long, Fuqiang Lu, Zezhong Xu, Xianjian Xiao, Shuming Shi. 278-282 [doi]
- Discriminative Spatial Tree for Image ClassificationYe Xu, Xiaodong Yu, Tian Wang, Fuqiang Lu. 283-288 [doi]
- Aviation Emergency Rescue Evaluation Capability Based on Improved λρ Fuzzy MeasureHong Zhu, Nan Xie. 289-293 [doi]
- Algorithm for the Optimization of RSA Based on Parallelization over GPU SSL/TLS ProtocolMónica Patricia Pineda Vargas, Rafael Antonio Acosta Rodriguez, Octavio José Salcedo Parra. 294-297 [doi]