Abstract is missing.
- Access Control in Distributed Systems: Merging Theory with PracticeIvan Stojmenovic. 1-2 [doi]
- TRUSTIE: Design of a Trustworthy Software Production EnvironmentHuaimin Wang. 3-4 [doi]
- Jacket Matrix and Its Applications to Signal ProcessingMoon Ho Lee. 5-6 [doi]
- Defending against Large-Scale and Coordinated Attacks in the Ubiquitous EnvironmentsYang Xiang. 7-8 [doi]
- Privacy, Identity and Trust in Context-Aware Mobile ServicesValtteri Niemi. 9-10 [doi]
- A Cooperative Mechanism to Defense against Distributed Denial of Service AttacksHakem Beitollahi, Geert Deconinck. 11-20 [doi]
- Estimates of Success Rates of Denial-of-Service AttacksTeodor Sommestad, Hannes Holm, Mathias Ekstedt. 21-28 [doi]
- Uncovering SIP Vulnerabilities to DoS Attacks Using Coloured Petri NetsLin Liu. 29-36 [doi]
- Launching Return-Oriented Programming Attacks against Randomized Relocatable ExecutablesLimin Liu, Jin Han, Debin Gao, Jiwu Jing, Daren Zha. 37-44 [doi]
- A Privacy-Preserving Defense Mechanism against Request Forgery AttacksBen S. Y. Fung, Patrick P. C. Lee. 45-52 [doi]
- A Survey on Latest Botnet Attack and DefenseLei Zhang, Shui Yu, Di Wu, Paul Watters. 53-60 [doi]
- Holistic Solution for Confining Insider Attacks in Wireless Sensor Networks Using Reputation Systems Coupled with Clustering TechniquesZorana Bankovic, José Manuel Moya, Juan Carlos Vallejo, David Fraga, Pedro Malagón. 61-72 [doi]
- Trusted Block as a Service: Towards Sensitive Applications on the CloudJianan Hao, Wentong Cai. 73-82 [doi]
- Privacy-Preserved Access Control for Cloud ComputingMiao Zhou, Yi Mu, Willy Susilo, Man Ho Au, Jun Yan. 83-90 [doi]
- DACC: Distributed Access Control in CloudsSushmita Ruj, Amiya Nayak, Ivan Stojmenovic. 91-98 [doi]
- Secure Virtual Layer Management in CloudsImad M. Abbadi, Muntaha Alawneh, Andrew Martin. 99-110 [doi]
- Trust Ticket Deployment: A Notion of a Data Owner's Trust in Cloud ComputingMahbub Ahmed, Yang Xiang. 111-117 [doi]
- Establishing Trust in Hybrid Cloud Computing EnvironmentsJemal H. Abawajy. 118-125 [doi]
- Towards Scalable, Fine-Grained, Intrusion-Tolerant Data Protection Models for Healthcare CloudLingfeng Chen, Doan B. Hoang. 126-133 [doi]
- A Charged PSO Inspired Method for Generating Immune Detectors for Network Intrusion DetectionMark Heydenrych, Elizabeth Marie Ehlers. 134-141 [doi]
- A New Trust Management Framework for Detecting Malicious and Selfish Behaviour for Mobile Ad Hoc NetworksJi Guo, Alan Marshall, Bosheng Zhou. 142-149 [doi]
- LoongChecker: Practical Summary-Based Semi-simulation to Detect Vulnerability in Binary CodeShaoyin Cheng, Jun Yang, Jiajie Wang, Jinding Wang, Fan Jiang. 150-159 [doi]
- DENNC: A Wireless Malicious Detection Approach Based on Network CodingHong Song, Xiao Xiao, Weiping Wang 0003, LuMing Yang. 160-165 [doi]
- Geometric Invariant Digital Image Watermarking Scheme Based on Feature Points Detector and Histogram DistributionChi-Man Pun, Xiaochen Yuan, C. L. Philip Chen. 166-172 [doi]
- Forecasting the Distribution of Network Traffic for Anomaly DetectionChristian Callegari, Stefano Giordano, Michele Pagano, Teresa Pepe. 173-180 [doi]
- Malware Variant Detection Using Similarity Search over Sets of Control Flow GraphsSilvio Cesare, Yang Xiang. 181-189 [doi]
- A Method for Detecting Unknown Malicious ExecutablesBoris Rozenberg, Ehud Gudes, Yuval Elovici, Yuval Fledel. 190-196 [doi]
- Privacy Crisis Due to Crisis Response on the WebShao-Yu Wu, Ming-Hung Wang, Kuan-Ta Chen. 197-205 [doi]
- A Privacy-Friendly RFID Protocol Using Reusable Anonymous TicketsMahdi Asadpour, Mohammad Torabi Dashti. 206-213 [doi]
- Learning Whom to Trust in a Privacy-Friendly WaySebastian Ries, Marc Fischlin, Leonardo A. Martucci, Max Mühlhäuser. 214-225 [doi]
- Semantics-Enhanced Privacy Recommendation for Social Networking SitesQingrui Li, Juan Li, Hui Wang, Ashok Ginjala. 226-233 [doi]
- Towards a Holistic Privacy Engineering Approach for Smart Grid SystemsHervais Simo Fhom, Kpatcha M. Bayarou. 234-241 [doi]
- Balancing Security and Performance for Enhancing Data Privacy in Data WarehousesRicardo Jorge Santos, Jorge Bernardino, Marco Vieira. 242-249 [doi]
- Privacy Preserving Access Control Policy and Algorithms for Conflicting ProblemsLili Sun, Hua Wang, Xiaohui Tao, Yanchun Zhang, Jing Yang. 250-257 [doi]
- A Trust Prediction Model for Service WebWanita Sherchan, Surya Nepal, Athman Bouguettaya. 258-265 [doi]
- IntRank: Interaction Ranking-Based Trustworthy Friend RecommendationLizi Zhang, Hui Fang, Wee Keong Ng, Jie Zhang. 266-273 [doi]
- A Research Model for Human-Computer Trust InteractionZheng Yan, Raimo Kantola, Peng Zhang. 274-281 [doi]
- Worm Propagation Modeling Using 2D Cellular Automata in Bluetooth NetworksSancheng Peng, Guojun Wang. 282-287 [doi]
- A Hybrid Trust Model for Authorisation Using Trusted PlatformsAarthi Krishna, Vijay Varadharajan. 288-295 [doi]
- A Model for a Testbed for Evaluating Reputation SystemsPartheeban Chandrasekaran, Babak Esfandiari. 296-303 [doi]
- SMEF: An Entropy-Based Security Framework for Cloud-Oriented Service MashupRuixuan Li, Li Nie, Xiaopu Ma, Meng Dong, Wei Wang. 304-311 [doi]
- A Reputation Mechanism for Virtual Reality - Five-Sense Oriented Feedback Provision and Subjectivity AlignmentHui Fang 0002, Jie Zhang, Murat Sensoy, Nadia Magnenat-Thalmann. 312-319 [doi]
- SWTrust: Generating Trusted Graph for Trust Evaluation in Online Social NetworksWenjun Jiang, Guojun Wang. 320-327 [doi]
- Malware Behavior Capturing Based on Taint Propagation and Stack BacktracingJianming Fu, Xinwen Liu, Binling Cheng. 328-335 [doi]
- Case-Based Trust Evaluation from Provenance InformationQuan Bai, Xing Su, Qing Liu, Andrew Terhorst, Minjie Zhang, Yi Mu. 336-343 [doi]
- A Framework for Reputation Bootstrapping Based on Reputation Utility and Game TheoriesHan Jiao, Jixue Liu, Jiuyong Li, Chengfei Liu. 344-351 [doi]
- Proactive Blacklisting for Malicious Web Sites by Reputation Evaluation Based on Domain and IP Address RegistrationYoshiro Fukushima, Yoshiaki Hori, Kouichi Sakurai. 352-361 [doi]
- Towards Context-Aware Service-Oriented Semantic Reputation FrameworkRehab Alnemr, Maxim Schnjakin, Christoph Meinel. 362-372 [doi]
- A Private and Scalable Authentication for RFID Systems Using Reasonable StorageXiaolin Cao, Máire O'Neill. 373-380 [doi]
- SWHash: An Efficient Data Integrity Verification Scheme Appropriate for USB Flash DiskYong Cheng, Zhiying Wang, Jiangjiang Wu, Songzhu Mei, Jiangchun Ren, Jun Ma. 381-388 [doi]
- An EAP Framework for Unified Authentication in Wireless NetworksElankayer Sithirasenan, Saurabh Kumar, Khosrow Ramezani, Vallipuram Muthukkumarasamy. 389-397 [doi]
- Inter-Chip Authentication through I/O CharacterFangyong Hou, Nong Xiao, Hongjun He, Fang Liu. 398-402 [doi]
- A Simple Balanced Password-Authenticated Key Agreement ProtocolFuwen Liu, Hartmut König. 403-408 [doi]
- Pollination: A Data Authentication Scheme for Unattended Wireless Sensor NetworksTassos Dimitriou, Ahmad Sabouri. 409-416 [doi]
- Mutual Authentication Protocol for Networked RFID SystemsHarinda Fernando, Jemal H. Abawajy. 417-424 [doi]
- A DRTM-Based Method for Trusted Network ConnectionWei Feng, Yu Qin, Aimin Yu, Dengguo Feng. 425-435 [doi]
- Biometric Enabled Portable Trusted Computing PlatformJulian Jang, Hon Hwang, Surya Nepal. 436-442 [doi]
- Ensuring Secure Information Flow in Partially Reconfigurable Architectures by Means of Process Algebra AnalysisAndré Seffrin, Sorin A. Huss. 443-450 [doi]
- A New Security Architecture for BitTorrentFiras Bader, Andra Radoveneanu, Hani Ragab Hassen. 451-455 [doi]
- An Access Control Framework for the Web of DataOwen Sacco, Alexandre Passant, Stefan Decker. 456-463 [doi]
- Trust ME: A Trust Decision Framework for Mobile EnvironmentsGonzalo Huerta Cánepa, Dongman Lee, Seon-Yeong Han. 464-471 [doi]
- A Logical Framework of Proof-Carrying SurvivabilityYanjun Zuo, Suhas Lande. 472-481 [doi]
- CNSSA: A Comprehensive Network Security Situation Awareness SystemRongrong Xi, Shuyuan Jin, Xiao-chun Yun, Yongzheng Zhang 0002. 482-487 [doi]
- A Scalability Study of AAA Support in Heterogeneous Networking Environments with Global Roaming SupportDaniel Granlund, Christer Åhlund. 488-493 [doi]
- Secret Sharing Scheme with FairnessYouliang Tian, Jianfeng Ma, Changgen Peng, Jianming Zhu. 494-500 [doi]
- Distributed Private-Key Generation Scheme with Self-Certified IdentityYongming Xie, Guojun Wang. 501-508 [doi]
- A Double Key-Sharing Based False Data Filtering Scheme in Wireless Sensor NetworksQian Sun, Min Wu. 509-516 [doi]
- Biometric Identification Using User Interactions with Virtual WorldsAhmed Al-Khazzar, Nick Savage. 517-524 [doi]
- Repeated Differential Properties of the AES-128 and AES-256 Key SchedulesJianyong Huang, Willy Susilo, Jennifer Seberry. 525-532 [doi]
- Lightweight Hidden ServicesAndriy Panchenko, Otto Spaniol, André Egners, Thomas Engel. 533-540 [doi]
- Security Issues in NoSQL DatabasesLior Okman, Nurit Gal-Oz, Yaron Gonen, Ehud Gudes, Jenny Abramov. 541-547 [doi]
- A Reliable and Secure Distributed In-network Data Storage Scheme in Wireless Sensor NetworksMuhammad Bashir Abdullahi, Guojun Wang, Felix Musau. 548-555 [doi]
- Trust-Based Approaches to Solve Routing Issues in Ad-Hoc Wireless Networks: A SurveyJesus M. Gonzalez, Mohd Anwar, James B. D. Joshi. 556-563 [doi]
- Highly Efficient Distance-Based Anomaly Detection through Univariate with PCA in Wireless Sensor NetworksMiao Xie, Song Han, Biming Tian. 564-571 [doi]
- RealProct: Reliable Protocol Conformance Testing with Real Nodes for Wireless Sensor NetworksJunjie Xiong, Edith C. H. Ngai, Yangfan Zhou, Michael R. Lyu. 572-581 [doi]
- A Quantitative Approach to Triaging in Mobile ForensicsFabio Marturana, Gianluigi Me, Rosamaria Berte, Simone Tacconi. 582-588 [doi]
- Trust-Based Cluster Head Selection Algorithm for Mobile Ad Hoc NetworksRaihana Ferdous, Vallipuram Muthukkumarasamy, Elankayer Sithirasenan. 589-596 [doi]
- Cross-Platform Application Sharing MechanismRaja Naeem Akram, Konstantinos Markantonakis, Keith Mayes. 597-605 [doi]
- TVLAN: Trusted and Virtualised Local Area NetworksUdaya Kiran Tupakula, Vijay Varadharajan. 606-612 [doi]
- A Decentralized Repair Mechanism for Decentralized Erasure Code Based Storage SystemsHsiao-Ying Lin, Wen-Guey Tzeng, Bao-Shuh Paul Lin. 613-620 [doi]
- Intelligent Assistant for Context-Aware PoliciesHelen Balinsky, Neil C. A. Moore, Steven J. Simske. 621-630 [doi]
- Publicly Posted Composite Documents in Variably Ordered WorkflowsHelen Balinsky, Liqun Chen, Steven J. Simske. 631-638 [doi]
- Design Comparison to Identify Malicious Hardware in External Intellectual PropertyTrey Reece, Daniel B. Limbrick, William H. Robinson. 639-646 [doi]
- Unwanted Traffic Control via Global Trust ManagementZheng Yan, Raimo Kantola, Yue Shen. 647-654 [doi]
- A Secure Multicoupon Solution for Multi-merchant ScenariosAndreu Pere Isern-Deyà, M. Francisca Hinarejos, Josep Lluís Ferrer-Gomila, Magdalena Payeras-Capellà. 655-663 [doi]
- Efficiently Achieving Full Three-Way Non-repudiation in Consumer-Level eCommerce and M-Commerce TransactionsStephen W. Neville, Michael Horie. 664-672 [doi]
- Exploring and Enhancing the Performance of Parallel IDS on Multi-core ProcessorsHaiyang Jiang, Jianhua Yang, Gaogang Xie. 673-680 [doi]
- A Model for Automating Persistent Identity Clone in Online Social NetworkBhume Bhumiratana. 681-686 [doi]
- Dependable Context-Sensitive Services in Cyber Physical SystemsKaiyu Wan, Vangalur S. Alagar. 687-694 [doi]
- Statistical Fault Localization via Semi-dynamic Program SlicingRongwei Yu, Lei Zhao, Lina Wang, Xiaodan Yin. 695-700 [doi]
- Decreasing SoC Test Power Dissipation and Test Data Volume Based on Pattern RecombinationChunlei Mei, Maoxiang Yi, Zhifei Shen. 701-705 [doi]
- Flexible Communication: A Secure and Trust-Based Free Wi-Fi Password Sharing ServiceCarlos Ballester Lafuente, Xavier Titi, Jean-Marc Seigneur. 706-713 [doi]
- An ABC-AIS Hybrid Approach to Dynamic Anomaly Detection in AODV-Based MANETsFatemeh Barani, Mahdi Abadi. 714-720 [doi]
- An Enhanced Method for Computation of Similarity between the Contexts in Trust Evaluation Using Weighted OntologyMohammad Amin Morid, Amin Omidvar, Hamid Reza Shahriari. 721-725 [doi]
- A Trusted Integrity Measurement Architecture for Securing Enterprise NetworkTong Liu, Prathima Agrawal. 726-731 [doi]
- Design and Implementation of Single Sign on System with Cluster CAS for Public Service Platform of Science and Technology EvaluationFang Huang, Cai-xia Wang, Jun Long. 732-737 [doi]
- A Framework for the Assessment of the Trustworthiness of Digital Records over TimeJianqiang Ma, Habtamu Abie, Torbjørn Skramstad, Mads Nygård. 738-744 [doi]
- eHCBAC: Flexible Column Based Access Control for Electronic Healthcare SystemsMei Liu, Ge Fu, Jiwu Jing. 745-750 [doi]
- Enhancing Flexibility of TCG's TNC through Layered Property AttestationAimin Yu, Shijun Zhao. 751-756 [doi]
- Monitoring Insiders Activities in Cloud Computing Using Rule Based LearningMd. Tanzim Khorshed, A. B. M. Shawkat Ali, Saleh A. Wasimi. 757-764 [doi]
- Flogger: A File-Centric Logger for Monitoring File Access and Transfers within Cloud Computing EnvironmentsRyan K. L. Ko, Peter Jagadpramana, Bu-Sung Lee. 765-771 [doi]
- Remedying the Hummingbird Cryptographic AlgorithmXinxin Fan, Guang Gong, Honggang Hu. 772-778 [doi]
- A RFID-Based Context-Aware Service ModelJinfang Sheng, Wen Zou, Liu Yang, Bin Wang. 779-784 [doi]
- Defining and Analyzing Insiders and Their Threats in OrganizationsMuntaha Alawneh, Imad M. Abbadi. 785-794 [doi]
- Adaptive Client-Side LUT-Based Digital WatermarkingChi-Man Pun, Jing-Jing Jiang, C. L. Philip Chen. 795-799 [doi]
- Identity-Based Strong Designated Verifier Signature Scheme with Full Non-DelegatabilityFei Tang, Changlu Lin, Yong Li 0002, Shengyuan Zhang. 800-805 [doi]
- Protection Profile of Personal Information Security System: Designing a Secure Personal Information Security SystemHyun Jung Lee, Kwang-Woo Lee, Dongho Won. 806-811 [doi]
- Parity Cloud Service: A Privacy-Protected Personal Data Recovery ServiceChi-won Song, Sungmin Park, Dongwook Kim, Sooyong Kang. 812-817 [doi]
- Home Service Communities and AuthenticationWarodom Werapun, Julien Fasson, Béatrice Paillassa. 818-823 [doi]
- Key Privacy in McEliece Public Key CryptosystemQiang Wang, Xue Qiu, Quan Zhang, Chaojing Tang. 824-828 [doi]
- Integrity Protection for Automated Teller MachinesRonald Petrlic. 829-834 [doi]
- Group Formation with Neighbor Similarity Trust in P2P E-CommerceFelix Musau, Guojun Wang, Muhammad Bashir Abdullahi. 835-840 [doi]
- STrust: A Trust Model for Social NetworksSurya Nepal, Wanita Sherchan, Cécile Paris. 841-846 [doi]
- Attack Vector Analysis and Privacy-Preserving Social Network Data PublishingMohd Izuan Hafez Ninggal, Jemal H. Abawajy. 847-852 [doi]
- Theoretical Issues in the Study of Trust in Human-Computer InteractionZheng Yan, Raimo Kantola, Peng Zhang. 853-856 [doi]
- Implementation of a Reputation System for Pervasive Social NetworkingYu Chen, Zheng Yan, Valtteri Niemi. 857-862 [doi]
- Design and Evaluation of an Architecture for Ubiquitous User Authentication Based on Identity Management SystemsMarc Barisch. 863-872 [doi]
- Building up Trusted Identity Management in Mobile Heterogeneous EnvironmentPeng Zhang, Hanlin Sun, Zheng Yan. 873-877 [doi]
- Internet Users' Security and Privacy While They Interact with AmazonGiampaolo Bella, Lizzie Coles-Kemp. 878-883 [doi]
- A New Multivariate Hash Function with HAIFA ConstructionYoujiao Zou, Wenping Ma, Zhanjun Ran, Shangping Wang. 884-888 [doi]
- The Role of Trust in Social LifeDong Yan, Wang Qi. 889-892 [doi]
- Reputation Based Collaboration among Ethernet SwitchesTimo Kiravuo. 893-896 [doi]
- Gray Map and Quantum Codes over the Ring F_2+uF_2+u^2F_2Xunru Yin, Wenping Ma. 897-899 [doi]
- Quantum Secure Communication Based on Nonmaximally Entangled Qubit Pair and Dining Cryptographers ProblemRonghua Shi, Qian Su, Ying Guo, Moon Ho Lee. 900-904 [doi]
- Multiparty Quantum Group Signature Scheme with Quantum Parallel ComputationRonghua Shi, Jinjing Shi, Ying Guo, Moon Ho Lee. 905-910 [doi]
- Quantum Distributed Ballot Scheme Based on Entanglement SwappingXiaoping Lou, Zhigang Chen. 911-915 [doi]
- Phishing Email Feature Selection ApproachIsredza Rahmi A. Hamid, Jemal H. Abawajy. 916-921 [doi]
- Study on IP Prefix Hijacking in Cloud Computing Networks Based on Attack PlanningYujing Liu, Wei Peng, Jinshu Su. 922-926 [doi]
- User Privacy Issues in Eucalyptus: A Private Cloud Computing EnvironmentAdeela Waqar, Asad Raza, Haider Abbas. 927-932 [doi]
- Towards a Trust Management System for Cloud ComputingSheikh Mahbub Habib, Sebastian Ries, Max Mühlhäuser. 933-939 [doi]
- Migration to Cloud as Real Option: Investment Decision under UncertaintyChew-Yean Yam, Adrian Baldwin, Simon Shiu, Christos Ioannidis. 940-949 [doi]
- Release Offset Bounds for Response Time Analysis of P-FRP Using Exhaustive EnumerationChaitanya Belwal, Albert M. K. Cheng, Walid Taha. 950-957 [doi]
- Permutational Genetic Algorithm for the Optimized Assignment of Priorities to Tasks and Messages in Distributed Real-Time SystemsEkain Azketa, Juan P. Uribe, Marga Marcos, Luís Almeida, J. Javier Gutiérrez. 958-965 [doi]
- Feasibility Interval for the Transactional Event Handlers of P-FRPChaitanya Belwal, Albert M. K. Cheng. 966-973 [doi]
- Offline Validation of Real-Time Application Constraints Considering Adaptation RulesMohamed-Lamine Boukhanoufa, Ansgar Radermacher, François Terrier. 974-980 [doi]
- Efficient Elastic Resource Management for Dynamic Embedded SystemsRicardo Marau, Karthik Lakshmanan, Paulo Pedreiras, Luís Almeida, Raj Rajkumar. 981-990 [doi]
- Real-Time Scheduling for Phase Change Main Memory SystemsMiao Zhou, Santiago Bock, Alexandre Peixoto Ferreira, Bruce R. Childers, Rami G. Melhem, Daniel Mossé. 991-998 [doi]
- SPARTS: Simulator for Power Aware and Real-Time SystemsBorislav Nikolic, Muhammad Ali Awan, Stefan M. Petters. 999-1004 [doi]
- A Hardware/Software Countermeasure and a Testing Framework for Cache Based Side Channel AttacksAnkita Arora, Sri Parameswaran, Roshan G. Ragel, Darshana Jayasinghe. 1005-1014 [doi]
- hUBI: An Optimized Hybrid Mapping Scheme for NAND Flash-Based SSDsGuangjun Xie, Guangzhi Xu, Gang Wang, Jing Liu, Rui Cao, Yan Gao. 1015-1022 [doi]
- Learning-Directed Dynamic Voltage and Frequency Scaling for Computation Time PredictionMing-Feng Chang, Wen-Yew Liang. 1023-1029 [doi]
- DSBS: Distributed and Scalable Barrier Synchronization in Many-Core Network-on-ChipsXiaowen Chen, Shuming Chen. 1030-1037 [doi]
- Minimizing Schedule Length via Cooperative Register Allocation and Loop Scheduling for Embedded SystemsYazhi Huang, Qing'an Li, Chun Jason Xue. 1038-1044 [doi]
- Optimal Data Placement for Memory Architectures with Scratch-Pad MemoriesYibo Guo, Qingfeng Zhuge, Jingtong Hu, Edwin Hsing-Mean Sha. 1045-1050 [doi]
- On Partitioned Scheduling of Fixed-Priority Mixed-Criticality Task SetsOwen R. Kelly, Hakan Aydin, Baoxian Zhao. 1051-1059 [doi]
- A Sufficient Schedulability Test for Real-Time Software Transactional MemoryChaitanya Belwal, Albert M. K. Cheng. 1060-1067 [doi]
- Response Time Analysis of COTS-Based Multicores Considering the Contention on the Shared Memory BusDakshina Dasari, Björn Andersson, Vincent Nélis, Stefan M. Petters, Arvind Easwaran, JinKyu Lee. 1068-1075 [doi]
- Efficient Implementation of Thermal-Aware Scheduler on a Quad-core ProcessorXiaojing Yin, Yongxin Zhu, Liang Xia, Jingwei Ye, Tian Huang, Yuzhuo Fu, Meikang Qiu. 1076-1082 [doi]
- Thermal-Aware Scheduling of Critical Applications Using Job Migration and Power-Gating on Multi-core ChipsBuyoung Yun, Kang G. Shin, Shige Wang. 1083-1090 [doi]
- Schedulability Analysis of Transactions in Software Transactional Memory Using Timed AutomataChaitanya Belwal, Albert M. K. Cheng. 1091-1098 [doi]
- Visualization of Computational Processes of Procedural Abstraction Optimization PassesStefan Schäckeler, Nityananda Jayadevaprakash. 1099-1108 [doi]
- Tool Support for Automated Traceability of Test/Code Artifacts in Embedded Software SystemsChristian Wiederseiner, Vahid Garousi, Michael Smith. 1109-1117 [doi]
- Automatic Model Building and Verification of Embedded Software with UPPAALXiaoli Gong, Jie Ma, Qingcheng Li, Jin Zhang. 1118-1124 [doi]
- A Precise Memory Model for Operating System Code VerificationGeng Chen, Lei Luo, Lijie Wang. 1125-1132 [doi]
- A Distributed Real-Time Operating System with Location-Transparent System Calls for Task Management and Inter-task SynchronizationTakahiro Chiba, Yuichi Itami, Myungryun Yoo, Takanori Yokoyama. 1133-1138 [doi]
- Parallel Data Cube Construction Based on an Extendible Multidimensional ArrayDong Jin, Tatsuo Tsuji. 1139-1145 [doi]
- Safety Verification of Non-linear, Planar Proportional Control with Differential InclusionsHallstein Asheim Hansen. 1146-1153 [doi]
- Probabilistic Schedulability Guarantees for Dependable Real-Time Systems under Error BurstsHüseyin Aysan, Radu Dobrin, Sasikumar Punnekkat, Rolf Johansson. 1154-1163 [doi]
- FTGS: Fault-Tolerant Fixed-Priority Scheduling on MultiprocessorsRisat Mahmud Pathan, Jan Jonsson. 1164-1175 [doi]
- A UML Model-Based Approach for Replication Assessment of AUTOSAR Safety-Critical ApplicationsSara Tucci Piergiovanni, Chokri Mraidha, Ernest Wozniak, Agnes Lanusse, Sébastien Gérard. 1176-1187 [doi]
- Verification-Based Multi-backup Firmware Architecture, an Assurance of Trusted Boot Process for the Embedded SystemsHongfei Yin, Hongjun Dai, Zhiping Jia. 1188-1195 [doi]
- UML-Based Analysis of Power Consumption for Real-Time Embedded SystemsMatthias Hagner, Adina Aniculaesei, Ursula Goltz. 1196-1201 [doi]
- Efficient Java Native Interface for Android Based Mobile DevicesYann-Hang Lee, Preetham Chandrian, Bo Li. 1202-1209 [doi]
- Resource Management for Robotic ApplicationsYi-Zong Ou, Edward T.-H. Chu, Wen-wei Lu, Jane W.-S. Liu, Ta-Chih Hung, Jwu-Sheng Hu. 1210-1216 [doi]
- Auction-Based Adaptive Sensor Activation Algorithm for Target Tracking in WSNsShaohua Liang, Md. Zakirul Alam Bhuiyan, Guojun Wang. 1217-1223 [doi]
- A Distributed and Shortest-Path-Based Algorithm for Maximum Cover Sets Problem in Wireless Sensor NetworksFeng Zeng, Lan Yao, Zhigang Chen, Huamei Qi. 1224-1228 [doi]
- Visual Navigation System with Real-Time Image Processing for Patrol Service RobotKenichi Asami, Hayato Hagiwara, Mochimitsu Komori. 1229-1234 [doi]
- An Efficient Stereoscopic Game Conversion System for Embedded PlatformHao Liu, Wei Guo, Chao Lu, Jizeng Wei. 1235-1240 [doi]
- Autonomous Parameter and Schedule Configuration for TDMA-Based Communication Protocols Such as FlexRayPatrick Heinrich, Dirk Eilers, Rudi Knorr, Markus Königer, Bernd Niehoff. 1241-1246 [doi]
- Comparative Analysis of Power Consumption in the Implementation of Arithmetic AlgorithmsAlexandre Wagner Chagas Faria, Leandro Pfleger de Aguiar, Daniel S. D. Lara, Antonio Alfredo Ferreira Loureiro. 1247-1254 [doi]
- Extending EAST-ADL2 to Support Aspectual Requirement Specification and Analysis for Automotive SoftwareXiaojian Liu, Zhixue Wang. 1255-1263 [doi]
- An Advanced and Effective Literature Search Algorithm Based on Analytic Hierarchy ProcessQiong Wang, Cong Liu, Zhiying Wang. 1264-1270 [doi]
- Detection DoS Attack on FPGA Using Fuzzy Association RulesTaner Tuncer, Yetkin Tatar. 1271-1276 [doi]
- Multicast Trusted Routing with QoS Multi-constraints in Wireless Ad Hoc NetworksHui Xia, Zhiping Jia, Lei Ju, Youqin Zhu. 1277-1282 [doi]
- A Software Fault-Tolerant Method Based on Exception Handling in RT/E SystemZhou Lu, Kailong Zhang, Xingshe Zhou. 1283-1287 [doi]
- Using Project-Based Learning and Collaborative Learning in Software Engineering Talent CultivationHongzhi Song, Guodong Si, Lei Yang, Huakun Liang, Lixia Zhang. 1288-1293 [doi]
- Study of Experiment Structure in the Computer Networks Course Using PBL MethodologyLi Cheng, Cong Wang. 1294-1297 [doi]
- The Effective Second Classroom on Embedded System EducationYinbo Xie, Chengcheng Guo, Jianfeng Yang. 1298-1302 [doi]
- The Practice Teaching Reform of Modern Communication Technologies Course for Non-communication MajorsZhenzhou Tang, Chang Li, Chunrong Zhang, Xiaoqiu Shi. 1303-1307 [doi]
- Reform and Practice of Training Engineering Professionals in 2C+E Computer ScienceJianbo Fan, Liangxu Liu, Rina Su, Hua Yu, Qingfeng Li. 1308-1312 [doi]
- Study and Practice on Teaching Team Construction of Computer Specialties in Private Undergraduate Universities and CollegesChaoxiang Chen, Shiping Ye, Binbin Zhou, Guoyong Dai. 1313-1318 [doi]
- Course Improvements to 'the Principle of Computer Organization' Based on the Goal of Disciplinary Education: Taking the Examples of the Computing Science Faculty of Zhejiang University City CollegeQifan Yang, Jianping Cai, Jianzhong Wu, Meimei Huo. 1319-1322 [doi]
- Teaching Method Practicing on Embedded Software Engineering CurriculumYikui Zhang, Yunfen Tian, Liwei Zhu, Haoxiang Zuo. 1323-1327 [doi]
- Optimal Tracking Agent: A New Framework for Multi-agent Reinforcement LearningWeihua Cao, Gang Chen, Xin Chen, Min Wu. 1328-1334 [doi]
- A Global Scheduling Algorithm Based on Dynamic Critical PathXing Gu, Qun Yang, De-Chang Pi, He-yang Ke. 1335-1338 [doi]
- Power Optimization for GPU Programs Based on Software PrefetchingYisong Lin, Tao Tang, Guibin Wang. 1339-1346 [doi]
- I/O Scheduling by Using Multi-network Interfaces of Virtualization SystemXia Xie, Haiqing Zhu, Wenzhi Cao, Hai Jin, Pingpeng Yuan. 1347-1354 [doi]
- The Research of Levenberg-Marquardt Algorithm in Curve Fittings on Multiple GPUsLingjie Zhang, Ying Zhao, Kaixi Hou. 1355-1360 [doi]
- Object-Level Data Model for Keyword Search over Relational DatabasesJun Zhang, Renjun Shao. 1361-1366 [doi]
- Efficient GPGPU-Based Parallel Packet ClassificationChe-Lun Hung, Yaw-Ling Lin, Kuan-Ching Li, Hsiao-Hsi Wang, Shih-Wei Guo. 1367-1374 [doi]
- Context-Aware Vertical Handoff Decision Scheme in Heterogeneous Wireless NetworksJun Peng, Huiyuan Xian, Xiaoyong Zhang, Zheqin Li. 1375-1380 [doi]
- An LIRS-Based Replica Replacement Strategy for Data-Intensive ApplicationsWei Liu, Feiyan Shi, Wei Du. 1381-1386 [doi]
- Abnormal Process Instances Identification Method in Healthcare EnvironmentBingning Han, Lihong Jiang, Hongming Cai. 1387-1392 [doi]
- A Simulation Study of Unstructured P2P Overlay for Multimedia StreamingDeng Li, Zhigang Chen, Jiaqi Liu, Hui Liu, Zhong Ren. 1393-1399 [doi]
- Towards User Intent Based SearchingHaibo Yu, Tsunenori Mine, Makoto Amamiya. 1400-1407 [doi]
- An Efficient Load Balancing Multi-core Frequent Patterns Mining AlgorithmKun-Ming Yu, Shu-Hao Wu. 1408-1412 [doi]
- Fault Tolerance Policy on Dynamic Load Balancing in P2P GridsTian-Liang Huang, Tian-An Hsieh, Kuan-Chou Lai, Kuan-Ching Li, Ching-Hsien Hsu, Hsi-Ya Chang. 1413-1420 [doi]
- Power Control Game Algorithm Based on Combination Pricing FunctionSheng Liu, Hongdan Liu, Zhen-guo Gao. 1421-1424 [doi]
- A Block Gathering Based on Mobile Web Page Segmentation AlgorithmLibing Wu, Yalin Ke, Yanxiang He, Nan Liu. 1425-1430 [doi]
- A Two-Layered Replica Management MethodChuncong Xu, Xiaomeng Huang, Guangwen Yang, Yang Zhou. 1431-1436 [doi]
- An Email Server Optimized for Storage IssuesYi Li, Mingzhe Zhang, Jiaqi Gu. 1437-1443 [doi]
- Improving the Adaptiveness of FAST TCP Based on the Stability with Time-DelayKefei Wang, Heying Zhang, Lihong Peng, Baohua Fan. 1444-1451 [doi]
- Achieving High Throughput in High-Radix SwitchMing Fang, Songqiao Chen, Kefei Wang. 1452-1456 [doi]
- Anisotropic Band-Pass Trilateral Filter for Creating Artistic Painting from Real ImageXiao-hua Zhang, Yuto Yoshida, Ning Xie. 1457-1463 [doi]
- Modeling Trees with Rugged SurfacesAtsushi Mizoguchi, Kazunori Miyata. 1464-1471 [doi]
- A Power Law Transformation Predicting Lightness Conditions Based on Skin Color Space DetectionEmmanuel Kondela, Huang Dong Jun. 1472-1476 [doi]
- An Efficient Method of Tracking across Multiple CamerasMuhammad Hassan, Ahsen Mehmood, Muhammad Faisal Khan. 1477-1481 [doi]
- Nose Surgery Simulation Based on Volumetric Laplacian DeformationJinshun Li, Yanyu Hu. 1482-1487 [doi]
- Fusing Audio-Words with Visual Features for Pornographic Video DetectionYizhi Liu, Xiangdong Wang, Yongdong Zhang, Sheng Tang. 1488-1493 [doi]
- Text Line Based Correction of Distorted Document ImagesSanding Luo, Xiaomin Fang, Cong Zhao, Yisha Luo. 1494-1499 [doi]
- Overlapping One-Class SVMs for Utterance Verification in Speech RecognitionCuiqin Hou, Yibin Hou, Zhangqin Huang, Qian Liu. 1500-1504 [doi]
- Chinese Traffic Police Gesture Recognition in Complex SceneFan Guo, Zixing Cai, Jin Tang. 1505-1511 [doi]
- Preference-Based Top-K Influential Nodes Mining in Social NetworksYunLong Zhang, Jingyu Zhou, Jia Cheng. 1512-1518 [doi]
- A Weighted Cluster Ensemble Algorithm Based on GraphXiao-Ping Fan, Yue-shan Xie, Zhi-fang Liao, Xiao-qing Li, Li-min Liu. 1519-1523 [doi]
- The Hot Keyphrase Extraction Based on TF*PDFYan Gao, Jin Liu, PeiXun Ma. 1524-1528 [doi]
- A Decision Making Ontology Building Process for Analytical Requirements ElicitationFahmi Bargui, Hanêne Ben-Abdallah, Jamel Feki. 1529-1536 [doi]
- Clustering Algorithm for High Dimensional Data Stream over Sliding WindowsWeiguo Liu, Jia OuYang. 1537-1542 [doi]
- Capability as Requirement MetaphorJiang Cao, XinJun Mao, Huining Yan, Yushi Huang, Huaimin Wang, Xicheng Lu. 1543-1549 [doi]
- Variable Precision Rough Set-Based Fault Diagnosis for Web ServicesChengying Mao. 1550-1555 [doi]
- A Web Services Composition Model and Its Verification Algorithm Based on Interface AutomataJianhua Li, Songqiao Chen, Lin Jian, Hongyu Zhang. 1556-1563 [doi]
- Towards a Behavior-Based Restructure Approach for Service CompositionZaiwen Feng, Keqing He, Rong Peng, Buqing Cao. 1564-1571 [doi]
- Design Pattern for Self-Organization Multi-agent Systems Based on PolicyYi Guo, XinJun Mao, Cuiyun Hu. 1572-1577 [doi]
- Plug-In Based Integrated Development Platform for Industrial Control System-P-IDP4ICSBin Wang, Dan Yin, Taiwen Wu, Jinfang Sheng. 1578-1583 [doi]
- A Certificate Driven Access Control Strategy for Service Composition and Its AnalysisGuisheng Fan, Huiqun Yu, Liqiong Chen, Dongmei Liu. 1584-1591 [doi]
- CLOUD SHREDDER: Removing the Laptop On-road Data Disclosure Threat in the Cloud Computing EraNan Zhang, Jiwu Jing, Peng Liu. 1592-1599 [doi]
- Towards Detecting Thread Deadlock in Java Programs with JVM IntrospectionYan Wen, Jinjing Zhao, Minhuan Huang, Hua Chen. 1600-1607 [doi]
- VerFAT: A Transparent and Efficient Multi-versioning Mechanism for FAT File SystemJiangjiang Wu, Zhiying Wang, Songzhu Mei, Yong Cheng, Jiangchun Ren. 1608-1615 [doi]
- A Property-Based Attestation Scheme with the Variable PrivacyYu Qin, Dexian Chang, Shijun Zhao, Qianying Zhang. 1616-1623 [doi]
- Multi-relay Cooperative Mechanism with Q-Learning in Cognitive Radio Multimedia Sensor NetworksJun Peng, Junbo Li, Shuo Li, Jing Li. 1624-1629 [doi]
- An Iterative Multi-path Routing Protocol in Wireless Ad Hoc NetworksZhongke Zhang, Yun Wang. 1630-1637 [doi]
- A Game Theoretic Coalitional Bidding Scheme for Efficient Routing in Vehicular Ad Hoc NetworksMuhammad Bilal, Pauline M. L. Chan. 1638-1645 [doi]
- A Novel Energy-Efficient Routing Algorithm in Multi-sink Wireless Sensor NetworksZhiwu Huang, Yuan Cheng, Weirong Liu. 1646-1651 [doi]
- A Method for Searching the Centroid of a 3D Cluster Based on RSSIWeike Chen, Heng Shou, Wenfeng Li. 1652-1656 [doi]
- Routing with Virtual Region Coordinates in Wireless Sensor NetworksZheng Ma, Weijia Jia, Guojun Wang. 1657-1661 [doi]
- Energy Efficient Data Aggregation Scheduling in Wireless Sensor NetworksJin Zheng, Xinlin Xu, Guojun Wang. 1662-1667 [doi]
- Phase-Wise Clustering of Time Series Gene Expression DataPoonam Goyal, Navneet Goyal, Rohan Sunil Karwa, Matthew John. 1668-1674 [doi]
- A Formal Approach for Modeling Interactive Visual InterfacesEmanuele Covino, Giovanni Pani. 1675-1683 [doi]
- A Quasi Physical Method for the Equal Sphere Packing ProblemWenqi Huang, Liang Yu. 1684-1690 [doi]
- A Refined and Heuristic Algorithm for LD tagSNPs SelectionHailin Chen, Zuping Zhang, Jing Xia. 1691-1694 [doi]
- Improved Partial Parallel Decision Feedback Multiuser Detection for Multiuser-MIMO SystemYouxiang Wang, Jianquan Wang, Zhaobiao Lu, Minghui Wang, Wenyue Zhang. 1695-1698 [doi]
- A Data Simulator for ZigBee-Base Wireless Sensor Network SystemKim-Yung Lu. 1699-1703 [doi]
- Energy Aware Routing Protocols for Wireless Sensor Networks Using Discrete Transmission EnergiesBalázs Karlócai, Andras Bojárszky, Janos Levendovszky. 1704-1707 [doi]
- Performance Design and Analysis of Handoff in Hierarchical Wireless NetworksZ. Zabanoot, G. Min. 1708-1714 [doi]
- A Biased Modified Binary Query Tree Protocol for RFID Tag Collision ResolutionXinqing Yan, Yan Xu, Bin Li. 1715-1720 [doi]
- Time-Based Detection and Location of Wormhole Attacks in Wireless Ad Hoc NetworksFei Shi, Dongxu Jin, Weijie Liu, JooSeok Song. 1721-1726 [doi]
- Energy-Efficiency Media Independent Handover MechanismDongxu Jin, Fei Shi, JooSeok Song. 1727-1732 [doi]
- The Four Corners DV-Hop Localization Algorithm for Wireless Sensor NetworkYinghui Meng, Jian Chen, Yingyou Wen, Hong Zhao. 1733-1738 [doi]
- Performance Analysis of Key Management Schemes in Wireless Sensor Network Using Analytic Hierarchy ProcessNa Ruan, Yizhi Ren, Yoshiaki Hori, Kouichi Sakurai. 1739-1744 [doi]
- Chaotic Hash Function Based on Tandem-DM ConstructionLi Gao, Xiaomin Wang, Wenfang Zhang. 1745-1749 [doi]
- Implementation and Performance Evaluation of an Adaptive Routing Algorithm in MANETsAnnapurna P. Patil, K. Rajani Kanth, Apoorva Yadhava, H. P. Rakshith, Joseph Tom. 1750-1755 [doi]
- Session Key Generation for a Group Call and Device for Security ControlYounchan Jung, Enrique Festijo. 1756-1762 [doi]
- Identification of Masses in Digital Mammogram Using an Optimal Set of FeaturesWenfeng Han, Jianwei Dong, Yuting Guo, Ming Zhang, Jianzhong Wang. 1763-1768 [doi]
- Automated Inspection Using X-Ray ImagingWenfei Chen, Zuohua Miao, Delie Ming. 1769-1772 [doi]
- Semantic Web Service Automatic Composition Based on Service Parameter Relationship GraphJianhua Li, Songqiao Chen, Yongjun Li, Qian Zhang. 1773-1778 [doi]
- Exploit TIVs to Find Faster PathsYanhua Zhang, Chunhong Zhang, Gang Wang. 1779-1782 [doi]
- Context Awareness for Self-Adaptiveness in Smart TerminalsZhen Chen, Chunhong Zhang, Yang Ji. 1783-1788 [doi]
- Simulation Tools Enabling Research in Convergence of Fixed and Mobile NetworksAndreas Bontozoglou, Kun Yang, Ken Guild. 1789-1794 [doi]
- Performance Modelling and Analysis of Dynamic Class-Based Call Admission Control Algorithm Using Fuzzy Logic for Heterogeneous Wireless NetworksSha Sha, Rosemary Halliwell. 1795-1800 [doi]