Abstract is missing.
- A Privacy-Leakage-Tolerance Based Noise Enhancing Strategy for Privacy Protection in Cloud ComputingGaofeng Zhang, Yun Yang, Jinjun Chen. 1-8 [doi]
- An Iterative Hierarchical Key Exchange Scheme for Secure Scheduling of Big Data Applications in Cloud ComputingChang Liu, Xuyun Zhang, Chengfei Liu, Yun Yang, Rajiv Ranjan, Dimitrios Georgakopoulos, Jinjun Chen. 9-16 [doi]
- A Fuzzy Modeling Approach for Risk-Based Access Control in eHealth CloudJuan Li, Yan Bai, Nazia Zaman. 17-23 [doi]
- Scalable and Privacy-Preserving Variants of the Austrian Electronic Mandate System in the Public CloudBernd Zwattendorfer, Daniel Slamanig. 24-33 [doi]
- KP-ABE Based Verifiable Cloud Access Control SchemeXiaolin Si, Pengpian Wang, Liwu Zhang. 34-41 [doi]
- Light-Weight Trust-Based On-Demand Multipath Routing Protocol for Mobile Ad Hoc NetworksChuanhao Qu, Lei Ju, Zhiping Jia, Huaqiang Xu, Longpeng Zheng. 42-49 [doi]
- Garbled Routing (GR): Towards Unification of Anonymous NetworksShaahin Madani, Ibrahim Khalil. 50-57 [doi]
- Secure Routing Based on Network Coding in Wireless Sensor NetworksJing Chen, RuiYing Du, Qian Wang, Shixiong Yao. 58-64 [doi]
- TIGER: A Trust-based Intelligent Geographical Energy-aware Routing for Smart Grid Communication NetworksMing Xiang, William Liu, Quan Bai. 65-72 [doi]
- AFC: An Effective Metric for Reliable Routing in Wireless Mesh NetworksRakesh Matam, Somanath Tripathy. 73-80 [doi]
- Performance Evaluation of Trust-Based Collaborative Sanctioning in MANETsMarcin Seredynski, Riad Aggoune, Krzysztof Szczypiorski, Djamel Khadraoui. 81-88 [doi]
- Novel Physically-Embedded Data Encryption for Embedded DeviceFangyong Hou, Nong Xiao, Hongjun He, Fang Liu, Zhiguang Chen. 89-93 [doi]
- Server Assisted Key Establishment for WSN: A MIKEY-Ticket ApproachAymen Boudguiga, Alexis Olivereau, Nouha Oualha. 94-101 [doi]
- A Fully-Secure RFID Authentication Protocol from Exact LPN AssumptionMohammad Saiful Islam Mamun, Atsuko Miyaji. 102-109 [doi]
- Determining Similar Recommenders Using Improved Collaborative Filtering in MANETsRaihana Ferdous, Vallipuram Muthukkumarasamy, Elankayer Sithirasenan. 110-117 [doi]
- Privacy-Preserving Wireless Medical Sensor NetworkXun Yi, Jan Willemson, Farid Naït-Abdesselam. 118-125 [doi]
- A Threat to Mobile Cyber-Physical Systems: Sensor-Based Privacy Theft Attacks on Android SmartphonesLingguang Lei, Yuewu Wang, Jian Zhou, Lei Wang, Zhongwen Zhang. 126-133 [doi]
- Protocol Formats Reverse Engineering Based on Association Rules in Wireless EnvironmentYong Wang, Nan Zhang, Yan-mei Wu, Bin-bin Su, Yong-jian Liao. 134-141 [doi]
- Power Based Malicious Code Detection Techniques for SmartphonesBryan Dixon, Shivakant Mishra. 142-149 [doi]
- A Privacy-Preserved Joint Group Time Scheduling Mechanism for Mobile Social ApplicationsYu-Jia Chen, Chia-Yu Lin, Li-Chun Wang. 150-155 [doi]
- ChainDroid: Safe and Flexible Access to Protected Android Resources Based on Call ChainQihui Zhou, Dan Wang, Yan Zhang, Bo Qin, Aimin Yu, Baohua Zhao. 156-162 [doi]
- Droid Analytics: A Signature Based Analytic System to Collect, Extract, Analyze and Associate Android MalwareMin Zheng, Mingshen Sun, John C. S. Lui. 163-171 [doi]
- Securing Domain Name System Combined with MIPv6 for Mobile HostsYounchan Jung, Marnel Peradilla, J. William Atwood. 172-179 [doi]
- Securing Mobile Mashups with SCCMFlorent Batard, Karima Boudaoud, Michel Riveill. 180-187 [doi]
- Secure Data Aggregation with MAC Authentication in Wireless Sensor NetworksSoufiene Ben Othman, Abdelbasset Trad, Habib Youssef, Hani Alzaid. 188-195 [doi]
- Modeling Malware Propagation in Smartphone Social NetworksSancheng Peng, Guojun Wang, Shui Yu. 196-201 [doi]
- Unwanted Content Control via Trust Management in Pervasive Social NetworkingZheng Yan, Raimo Kantola, Gaowa Shi, Peng Zhang. 202-209 [doi]
- Trust Inference Computation for Online Social NetworksSana Hamdi, Amel Bouzeghoub, Alda Lopes Gançarski, Sadok Ben Yahia. 210-217 [doi]
- Fine-Grained Trust Assertions for Privacy Management in the Social Semantic WebOwen Sacco, John G. Breslin, Stefan Decker. 218-225 [doi]
- Preserving Utility in Social Network Graph AnonymizationMohd Izuan Hafez Ninggal, Jemal H. Abawajy. 226-232 [doi]
- DDoS Attack Detection at Local Area Networks Using Information Theoretical MetricsYuan Tao, Shui Yu. 233-240 [doi]
- Towards an Information-Theoretic Approach for Measuring Intelligent False Alarm Reduction in Intrusion DetectionYuxin Meng, Lam-for Kwok. 241-248 [doi]
- Rational Secret Sharing Information - Theoretically Secure against Adaptive AdversariesYang Yu, Zhanfei Zhou. 249-256 [doi]
- What is the Pattern of a Botnet?Tianzuo Wang, Huaimin Wang, Bo Liu, Peichang Shi. 257-264 [doi]
- Analyzing Malware by Abstracting the Frequent Itemsets in API Call SequencesYong Qiao, Yuexiang Yang, Lin Ji, Jie He. 265-270 [doi]
- Kappa-Fuzzy ARTMAP: A Feature Selection Based Methodology to Intrusion Detection in Computer NetworksNelcileno Virgilio de Souza Araújo, Ruy de Oliveira, Ed Wilson Tavares Ferreira, Valtemir Emerencio do Nascimento, Ailton Akira Shinoda, Bharat K. Bhargava. 271-276 [doi]
- Visual Analytics Model for Intrusion Detection in Flood AttackJinson Zhang, Mao Lin Huang. 277-284 [doi]
- A Regional Statistics Detection Scheme against Sybil Attacks in WSNsMingxi Li, Yan Xiong, Xuangou Wu, Xiancun Zhou, Yuhui Sun, Shenpei Chen, Xiaoya Zhu. 285-291 [doi]
- A Framework for Improving the Accuracy of Unsupervised Intrusion Detection for SCADA SystemsAbdulmohsen Almalawi, Zahir Tari, Adil Fahad, Ibrahim Khalil. 292-301 [doi]
- Security Aspects of Military Sensor-Based Defence SystemsMichael N. Johnstone, Robert Thompson. 302-309 [doi]
- A Secure and Efficient Fault-Tolerant Group Key Agreement ProtocolAnmin Fu, Gongxuan Zhang, ZhenChao Zhu. 310-314 [doi]
- MDS-Based Trust Estimation of Event Reporting Node in VANETT. Raghu Vamsi Krishna, Rajesh P. Barnwal, Soumya K. Ghosh. 315-320 [doi]
- sEncrypt: An Encryption Algorithm Inspired from Biological ProcessesOliver Bonham-Carter, Abhishek Parakh, Dhundy Bastola. 321-327 [doi]
- A Scalable Architecture for Highly Reliable CertificationXavier Bonnaire, Rudyar Cortes, Fabrice Kordon, Olivier Marin. 328-335 [doi]
- A Secure and Trusted Channel Protocol for the User Centric Smart Card Ownership ModelRaja Naeem Akram, Konstantinos Markantonakis, Keith Mayes. 336-345 [doi]
- A Model for Context-Aware Location Identity Preservation Using Differential PrivacyRoland Assam, Thomas Seidl. 346-353 [doi]
- P3MCF: Practical Privacy-Preserving Multi-domain Collaborative FilteringToru Nakamura, Shinsaku Kiyomoto, Ryu Watanabe, Yutaka Miyake. 354-361 [doi]
- On the Use of LSH for Privacy Preserving PersonalizationArmen Aghasaryan, Makram Bouzid, Dimitre Kostadinov, Mohit Kothari, Animesh Nandi. 362-371 [doi]
- Improving the Utility of Differentially Private Data Releases via k-AnonymityJordi Soria-Comas, Josep Domingo-Ferrer, David Sánchez 0001, Sergio Martínez. 372-379 [doi]
- Scheme of User Privacy Protection Applied to Online MarketingMaria das Gracas da Silva Oliveira, Ruy J. G. B. de Queiroz. 380-387 [doi]
- An Effective Deferentially Private Data Releasing Algorithm for Decision TreeTianqing Zhu, Ping Xiong, Yang Xiang, Wanlei Zhou. 388-395 [doi]
- An Application Security Framework for Near Field CommunicationDirar Abu-Saymeh, Dhiah el Diehn I. Abou-Tair, Ahmad Zmily. 396-403 [doi]
- Scalable Attack Representation Model Using Logic Reduction TechniquesJin Bum Hong, Dong Seong Kim, Tadao Takaoka. 404-411 [doi]
- Formalizing and Modeling Fairness for Benefit Distribution in CollaborationsFlorian Volk, Florian Sokoli, Sascha Hauke, Max Mühlhäuser. 412-420 [doi]
- Attribute-Based Mining Process for the Organization-Based Access Control ModelAhmad Samer Wazan, Gregory Blanc, Hervé Debar, Joaquín García-Alfaro. 421-430 [doi]
- Private Multiparty Set Intersection Protocol in Rational ModelKeita Emura, Atsuko Miyaji, Mohammad Shahriar Rahman. 431-438 [doi]
- A Mutual Nonrepudiation Protocol for Cloud Storage with Interchangeable Accesses of a Single Account from Multiple DevicesGwan-Hwan Hwang, Jenn-Zjone Peng, Wei-Sian Huang. 439-446 [doi]
- Privacy-Enhanced Keyword Search in CloudsMiao Zhou, Yi Mu, Willy Susilo, Man Ho Au. 447-451 [doi]
- iPEKS: Fast and Secure Cloud Data Retrieval from the Public-Key Encryption with Keyword SearchFu-Kuo Tseng, Rong-Jaye Chen, Bao-Shuh Paul Lin. 452-458 [doi]
- A Trust-Aware Framework for Evaluating Security Controls of Service Providers in Cloud MarketplacesSheikh Mahbub Habib, Vijay Varadharajan, Max Mühlhäuser. 459-468 [doi]
- Reputation Attacks Detection for Effective Trust Assessment among Cloud ServicesTalal H. Noor, Quan Z. Sheng, Abdullah Alfazi. 469-476 [doi]
- Hierarchical Attribute-Based Access Control with Authentication for Outsourced Data in Cloud ComputingXuejiao Liu, Yingjie Xia, Shasha Jiang, Fubiao Xia, Yanbo Wang. 477-484 [doi]
- Access Control Management for CloudMansura Habiba, Md. Rafiqul Islam, A. B. M. Shawkat Ali. 485-492 [doi]
- Cloud Computing: Insider Attacks on Virtual Machines during MigrationAdrian J. Duncan, Sadie Creese, Michael Goldsmith, Jamie S. Quinton. 493-500 [doi]
- Combining Top-Down and Bottom-Up: Scalable Sub-tree Anonymization over Big Data Using MapReduce on CloudXuyun Zhang, Chang Liu, Surya Nepal, Chi Yang, Wanchun Dou, Jinjun Chen. 501-508 [doi]
- A Framework for Authentication and Authorization Credentials in Cloud ComputingNelson Mimura Gonzalez, Marco Antonio Torrez Rojas, Marcos Vinicius Maciel da Silva, Fernando F. Redigolo, Tereza Cristina Melo de Brito Carvalho, Charles Christian Miers, Mats Näslund, Abu Shohel Ahmed. 509-516 [doi]
- On the Design of a Trust Enhanced Distributed Authorisation Architecture for Service Oriented ArchitecturesAarthi Krishna, Vijay Varadharajan, Nathan Tarr. 517-524 [doi]
- On the Application of Supervised Machine Learning to Trustworthiness AssessmentSascha Hauke, Sebastian Biedermann, Max Mühlhäuser, Dominik Heider. 525-534 [doi]
- Building Confidence in Information-Trustworthiness Metrics for Decision SupportJason R. C. Nurse, Ioannis Agrafiotis, Sadie Creese, Michael Goldsmith, Koen Lamberts. 535-543 [doi]
- Efficient Fair UC-Secure Two-Party Computation on Committed InputsOu Ruan, Cai Fu, Jing Zhou, Lansheng Han, Xiaoyang Liu. 544-551 [doi]
- Trust Enhanced Security Architecture for Detecting Insider ThreatsUdaya Kiran Tupakula, Vijay Varadharajan. 552-559 [doi]
- Integrating Trust with Cryptographic Role-Based Access Control for Secure Cloud Data StorageLan Zhou, Vijay Varadharajan, Michael Hitchens. 560-569 [doi]
- An Online Query Authentication System for Outsourced DatabasesYing Zhou, Chen Wang. 570-577 [doi]
- Word N-Gram Based Classification for Data Leakage PreventionSultan Alneyadi, Elankayer Sithirasenan, Vallipuram Muthukkumarasamy. 578-585 [doi]
- Privacy Protected Data Forwarding in Human Associated Delay Tolerant NetworksLongxiang Gao, Ming Li, Wanlei Zhou, Wen Shi. 586-593 [doi]
- S2Logger: End-to-End Data Tracking Mechanism for Cloud Data ProvenanceChun Hui Suen, Ryan K. L. Ko, Yu Shyang Tan, Peter Jagadpramana, Bu-Sung Lee. 594-602 [doi]
- A Direct Insight into Victims of CybercrimeNicholas Charles Patterson, Michael Hobbs, Darren Palmer. 603-610 [doi]
- Card-Present Transactions on the Internet Using the Smart Card Web ServerLazaros Kyrillidis, Keith Mayes, Boris Chazalet, Konstantinos Markantonakis. 611-619 [doi]
- Secure Single Sign-On Schemes Constructed from Nominative SignaturesJingquan Wang, Guilin Wang, Willy Susilo. 620-627 [doi]
- Profiling Phishing Email Based on Clustering ApproachIsredza Rahmi A. Hamid, Jemal H. Abawajy. 628-635 [doi]
- Developing an Empirical Algorithm for Protecting Text-Based CAPTCHAs against Segmentation AttacksLei Pan, Yan Zhou. 636-643 [doi]
- Distributed Group Key Management Using Multilinear Forms for Multi-privileged Group CommunicationsWei Zhou, Yang Xu, Guojun Wang. 644-650 [doi]
- Research on the Anti-attack Design Principles of Low-Latency Anonymous CommunicationMing Zheng, Jianping Wu, Hai-Xin Duan. 651-658 [doi]
- Securing RTP Packets Using Per-Packet Selective Encryption Scheme for Real-Time Multimedia ApplicationsYounchan Jung, Enrique Festijo. 659-666 [doi]
- Evaluating the Impact of Broadcast Rates and Collisions on Fake Source Protocols for Source Location PrivacyAlasdair Thomason, Matthew Leeke, Matthew Bradbury, Arshad Jhumka. 667-674 [doi]
- Development and Analysis of Generic VoIP Attack Sequences Based on Analysis of Real Attack TrafficAdnan Aziz, Dirk Hoffstadt, Sebastian Ganz, Erwin P. Rathgeb. 675-682 [doi]
- Security Analysis of a Paillier-Based Threshold Proxy Signature SchemeMinghui Zheng, Yongquan Cui, Liang Chen. 683-687 [doi]
- A Novel Evidential Evaluation for Internal Attacks with Dempster-Shafer Theory in WSNMuhammad Ahmed, Xu Huang, Hongyan Cui. 688-693 [doi]
- PREFETCHing to Overcome DNSSEC Performance Issue on Large Resolving PlatformDaniel Migault, Stéphane Sénécal, Stanislas Francfort, Emmanuel Herbert, Maryline Laurent. 694-703 [doi]
- Verifiable and Anonymous Encryption in Asymmetric Bilinear MapsHui Cui, Yi Mu, Man Ho Au. 704-711 [doi]
- From Mini House Game to Hobby-Driven Behavioral Biometrics-Based PasswordWeiyu Jiang, Ji Xiang, Limin Liu, Daren Zha, Lei Wang. 712-719 [doi]
- Towards Automation of Privacy and Security Risks Analysis in Identity Management SystemsEbenezer Paintsil. 720-727 [doi]
- Identity-Based Mediated RSA RevisitedIbrahim F. Elashry, Yi Mu, Willy Susilo. 728-735 [doi]
- Portable Personal Identity Provider in Mobile PhonesMd. Sadek Ferdous, Ron Poet. 736-745 [doi]
- Multi-factor Authentication in Key Management SystemsRick Lopes de Souza, Lau Cheuk Lung, Ricardo Felipe Custódio. 746-752 [doi]
- A Semantic Policy Framework for Context-Aware Access Control ApplicationsA. S. M. Kayes, Jun Han, Alan Colman. 753-762 [doi]
- Feature Based Video Watermarking Resistant to Geometric DistortionsXiaochen Yuan, Chi-Man Pun. 763-767 [doi]
- Exploring the Guessability of Image Passwords Using Verbal DescriptionsSoumyadeb Chowdhury, Ron Poet, Lewis Mackenzie. 768-775 [doi]
- Public Verification of Outsourced Computation of Polynomial FunctionsPeili Li, Haixia Xu, Shu Guo. 776-780 [doi]
- Mitigating Malicious Updates: Prevention of Insider Threat to DatabasesHarini Ragavan, Brajendra Panda. 781-788 [doi]
- De-anonymization Attack on Geolocated DataSébastien Gambs, Marc-Olivier Killijian, Miguel Núñez del Prado Cortez. 789-797 [doi]
- Verifiable and Privacy Preserving Electronic Voting with Untrusted MachinesManzur Murshed, Tishna Sabrina, Anindya Iqbal, Mortuza Ali. 798-804 [doi]
- Role Mining Using Boolean Matrix Decomposition with HierarchyWei Ye, Ruixuan Li, Huaqing Li. 805-812 [doi]
- A Secure Social-Aware Incentive Scheme for Delay Tolerant NetworksGuowei Wu, Jia Wang, Lin Yao, Chi Lin. 813-820 [doi]
- A Place-Aware Stereotypical Trust Supporting SchemeGonzalo Huerta Cánepa, Seungwook Han, Dongman Lee, Byoungoh Kim. 821-828 [doi]
- An Endorsement Trust ModelCharles Thevathayan, James Harland, Peter Bertók. 829-836 [doi]
- Local Monitoring and Maintenance for Operational Wireless Sensor NetworksMd. Zakirul Alam Bhuiyan, Guojun Wang, Jiannong Cao, Jie Wu 0001. 837-844 [doi]
- A Probabilistic Model for Estimating the Power Consumption of Processors and Network Interface CardsWaltenegus Dargie, Jianjun Wen. 845-852 [doi]
- Automatic Locality Exploitation in the Codelet ModelChen Chen, Yao Wu, Joshua Suetterlein, Long Zheng, Minyi Guo, Guang R. Gao. 853-862 [doi]
- GPU Acceleration of Interior Point Methods in Large Scale SVM TrainingTao Li, Hua Li, Xuechen Liu, Shuai Zhang, Kai Wang, Yulu Yang. 863-870 [doi]
- An Analysis of Driver Domain Offload for Paravirtualized CommunicationChung Hwan Lee, Peter Strazdins. 871-878 [doi]
- Energy-Performance Modeling and Optimization of Parallel Computing in On-Chip NetworksShuai Zhang, Zhiyong Liu, Dongrui Fan, Fenglong Song, Mingzhe Zhang. 879-886 [doi]
- SciHive: Array-Based Query Processing with HiveQLYifeng Geng, Xiaomeng Huang, Meiqi Zhu, Huabin Ruan, Guangwen Yang. 887-894 [doi]
- Multivalued and Deterministic Peer-to-Peer Polling in Social Networks with Reputation Conscious ParticipantsBurkhard Englert, Reza Gheissari. 895-902 [doi]
- Static or Dynamic: Trade-Offs for Task Dependency Analysis for Heterogeneous MPSoCQi Guo, Chao Wang, Xuehai Zhou, Xi Li. 903-910 [doi]
- CFIO: A Fast I/O Library for Climate ModelsWencan Wang, Xiaomeng Huang, Haohuan Fu, Yong Hu, Shizhen Xu, Guangwen Yang. 911-918 [doi]
- Automatic Loop-Based Pipeline Optimization on Reconfigurable PlatformQi Guo, Chao Wang, Xiaojing Feng, Xuehai Zhou. 919-926 [doi]
- Register Allocation by Incremental Graph Colouring for Clustered VLIW ProcessorsXuemeng Zhang, Hui Wu, Haiyan Sun. 927-934 [doi]
- TxSnoop: Power-Aware Transactional SnoopEhsan Atoofian. 935-940 [doi]
- Regional Consistency: Programmability and Performance for Non-cache-coherent SystemsBharath Ramesh, Calvin J. Ribbens, Srinidhi Varadarajan. 941-948 [doi]
- A Comparative Study of Job Scheduling Strategies in Large-Scale Parallel Computational SystemsAftab Ahmed Chandio, Cheng-Zhong Xu, Nikos Tziritas, Kashif Bilal, Samee Ullah Khan. 949-957 [doi]
- Bicriteria Load Balancing for Online Placement in Heterogeneous Servers with Pareto Upper BoundsSavio S. H. Tse. 958-965 [doi]
- Collaborative Parallel Local Search for Simplified Protein Structure PredictionMahmood A. Rashid, M. A. Hakim Newton, Md. Tamjidul Hoque, Abdul Sattar. 966-973 [doi]
- On Change Detection of XML SchemasAbdullah Baqasah, Eric Pardede, Irena Holubová, Wenny Rahayu. 974-982 [doi]
- Deadlock-Free Fully Adaptive Routing in Irregular Networks without Virtual ChannelsDong Xiang, Zhigang Yu, Jie Wu 0001. 983-990 [doi]
- Quantitative Analysis of Inter-block Dependence in Speculative ExecutionJunrui Zhou, Hong An, Yanyan Zou, Tao Sun. 991-998 [doi]
- Heterogeneous Multiconstraint Application Partitioner (HMAP)Servesh Muralidharan, Aravind Vasudevan, Avinash Malik, David Gregg. 999-1007 [doi]
- A Hypercubic Overlay Using Bloom-Filter Based Addressing for a Non-dedicated Distributed Tag-Based Pub/Sub SystemXiaochuan Yu, Toong Shoon Alvin Chan. 1008-1015 [doi]
- KVM-Loongson: An Efficient Hypervisor on MIPSYunfang Tai, Wanwei Cai, Qi Liu, Ge Zhange. 1016-1022 [doi]
- The Buffered Edge Reconfigurable Cell Array and Its ApplicationsRui Shan, Tao Li, Jungang Han. 1023-1030 [doi]
- MapReduce: Limitations, Optimizations and Open IssuesVasiliki Kalavri, Vladimir Vlassov. 1031-1038 [doi]
- Scenario-Based Execution Method for Massively Parallel AcceleratorsShinichi Yamagiwa, Shixun Zhang. 1039-1048 [doi]
- An Iterative Optimization Framework for Adaptive Workflow Management in Computational CloudsLong Wang, Rubing Duan, Xiaorong Li, Sifei Lu, Terence Hung, Rodrigo N. Calheiros, Rajkumar Buyya. 1049-1056 [doi]
- DataSteward: Using Dedicated Compute Nodes for Scalable Data Management on Public CloudsRadu Tudoran, Alexandru Costan, Gabriel Antoniu. 1057-1064 [doi]
- A Data Prefetching Model for Desktop Grids and the Condor Use CaseWalid Saad, Heithem Abbes, Christophe Cérin, Mohamed Jemni. 1065-1072 [doi]
- Scalable Multi Swarm-Based Algorithms with Lagrangian Relaxation for Constrained ProblemsAntonio Gómez-Iglesias, Andreas T. Ernst, Gaurav Singh. 1073-1080 [doi]
- Real-Time Effective Framework for Unstructured Data MiningRichard K. Lomotey, Ralph Deters. 1081-1088 [doi]
- Performance Implications of Task Scheduling by Predicting Network Throughput on the InternetChunghan Lee, Hirotake Abe, Toshio Hirotsu, Kyoji Umemura. 1089-1098 [doi]
- H-PFSP: Efficient Hybrid Parallel PFSP Protected Scheduling for MapReduce SystemYin Li, Chuang Lin, Fengyuan Ren, Yifeng Geng. 1099-1106 [doi]
- Low-Cost Load Balancing for Parallel Particle-in-Cell Simulations with Thick Overlapping LayersYohei Miyake, Hiroshi Nakashima. 1107-1114 [doi]
- An Optimal Algorithm for Extreme Scale Job LaunchingJoshua D. Goehner, Taylor L. Groves, Dorian C. Arnold, Dong H. Ahn, Gregory L. Lee. 1115-1122 [doi]
- Power Management Support to Optimal Duty-Cycling in Stateful Multitasking WSNCarlo Brandolese, William Fornaciari, Luigi Rucco. 1123-1132 [doi]
- An Efficient Task Partitioning and Scheduling Method for Symmetric Multiple GPU ArchitectureCheng Luo, Reiji Suda. 1133-1142 [doi]
- Performance Optimization of Aho-Corasick Algorithm on a GPUNhat-Phuong Tran, Myungho Lee, Sugwon Hong, Jongwoo Bae. 1143-1152 [doi]
- Combining Process-Based Cache Partitioning and Pollute Region Isolation to Improve Shared Last Level Cache Utilization on Multicore SystemsTao Huang, Jing Wang, Xuetao Guan, Qi Zhong, Keyi Wang. 1153-1160 [doi]
- Hybrid Range Consistent Hash Partitioning Strategy - A New Data Partition Strategy for NoSQL DatabaseZhikun Chen, Shuqiang Yang, Shuang Tan, Ge Zhang, Huiyu Yang. 1161-1169 [doi]
- Tuning SPMD Applications in Order to Increase PerformabilityHugo Meyer, Ronal Muresano, Dolores Rexachs, Emilio Luque. 1170-1178 [doi]
- A Parallel Runtime Framework for Communication Intensive Stream ApplicationsServesh Muralidharan, Kevin Casey, David Gregg. 1179-1187 [doi]
- A New Design Paradigm for Designing Reactive Pervasive Concurrent Systems with an Ambient Intelligence ExampleHeeJong Park, Zoran Salcic, Kevin I-Kai Wang, Udayanto Dwi Atmojo, Wei-Tsun Sun, Avinash Malik. 1188-1197 [doi]
- A Path-Adaptive Opto-electronic Hybrid NoC for Chip Multi-processorMingzhe Zhang, Da Wang, Xiaochun Ye, Liqiang He, Dongrui Fan, Zhiyong Liu. 1198-1205 [doi]
- A Study of Leveraging Memory Level Parallelism for DRAM System on Multi-core/Many-Core ArchitectureLicheng Chen, Yongbing Huang, Yungang Bao, Guangming Tan, Zehan Cui. 1206-1215 [doi]
- Multi-core Deployment Optimization Using Simulated Annealing and Ant Colony OptimizationHamilton A. Turner, Jules White. 1216-1223 [doi]
- A Next Generation Object-Oriented Environment for Real-Time Database Application DevelopmentZied Ellouze, Nada Louati, Rafik Bouaziz. 1224-1232 [doi]
- Genome Assembly on a Multicore SystemAbhishek Biswas, Desh Ranjan, Mohammad Zubair. 1233-1240 [doi]
- The Value of Automation: A Study of MPI Application Migration MethodsKarolina Sarnowska-Upton, Andrew S. Grimshaw. 1241-1248 [doi]
- Advanced Validation of the DVMS Approach to Fully Distributed VM SchedulingFlavien Quesnel, Adrien Lebre, Jonathan Pastor, Mario Südholt, Daniel Balouek. 1249-1256 [doi]
- Partitioned Fixed-Priority Real-Time Scheduling Based on Dependent Task-Split on Multicore PlatformGuowei Wu, Ying Li, Jiankang Ren, Chi Lin. 1257-1264 [doi]
- Enhanced Method for the Signature Adaptability to the Application BehaviorAlvaro Wong, Dolores Rexachs, Emilio Luque. 1265-1273 [doi]
- Saving Time in a Program Robustness EvaluationJoao Gramacho, Dolores Rexachs, Emilio Luque. 1274-1282 [doi]
- SeaRum: A Cloud-Based Service for Association Rule MiningDaniele Apiletti, Elena Baralis, Tania Cerquitelli, Silvia Chiusano, Luigi Grimaudo. 1283-1290 [doi]
- TurboSockets: Democratizing Distributed DeduplicationJoao Salada, João Barreto. 1291-1298 [doi]
- Dependency-Based Energy-Efficient Scheduling for Homogeneous Multi-core ClustersYanheng Zhao, Xin Li, Zhiping Jia, Lei Ju, Ziliang Zong. 1299-1306 [doi]
- Context-Aware Routing Algorithm for WSNs Based on Unequal ClusteringLongpeng Zheng, Zhiping Jia, Ruihua Zhang, Hui Xia, Lei Ju, Chuanhao Qu. 1307-1314 [doi]
- SMC: A Shared Memory Based SpaceWire Controller SolutionQingfeng Yu, Yijiao Chen, Xilong Mao, BaoKang Zhao, Jinfeng Huang. 1315-1322 [doi]
- LogicCrowd: A Declarative Programming Platform for Mobile CrowdsourcingJurairat Phuttharak, Seng W. Loke. 1323-1330 [doi]
- Conflict and Interference Resolution for Physical Annotation SystemsAhmad A. Alzahrani, Seng W. Loke, Hongen Lu. 1331-1338 [doi]
- Normal Vector Based Fault-Tolerant Event Boundary Detection in Wireless Sensor NetworksWei Wang, Ruihua Zhang, Zhongwei Chen, Lei Ju. 1339-1344 [doi]
- Proximity-Based Service beyond 4G Network: Peer-Aware Discovery and Communication Using E-UTRAN and WLANYi-Hsueh Tsai, Yi-Ting Lin, Kanchei Loa, Tsung-Yu Tsai, Chun-Che Chien, Dun-Cheih Huang, Shiann-Tsong Sheu. 1345-1350 [doi]
- Characterization of OSPF Convergence with Correlated FailuresDan Zhao, Chunqing Wu, Xiaofeng Hu, Xiaofeng Wang, BaoKang Zhao. 1351-1356 [doi]
- Fast Intra Mode Decision Algorithm Based on Spatial-Domain Energy for H.264/AVCYinbo Liu, Xingang Liu, Zhixin Shen, Laurence T. Yang. 1357-1361 [doi]
- A Location Management Algorithm for LEO Satellite NetworksYanpeng Ma, Wei Peng, Xiaofeng Wang, BaoKang Zhao, Jinshu Su, Chunqing Wu. 1362-1366 [doi]
- A Distributed Routing Algorithm for LEO Satellite NetworksYanpeng Ma, Wei Peng, Wanrong Yu, Jinshu Su, Chunqing Wu, Guohong Zhao. 1367-1371 [doi]
- Communication and Collaboration Service Components for Ubiquitous Communication ApplicationsKi-Sook Chung, Young Mee Shin. 1372-1377 [doi]
- Quantitative Risk Analysis for Mobile Cloud Computing: A Preliminary Approach and a Health Application Case StudyJaveria Samad, Seng W. Loke, Karl Reed. 1378-1385 [doi]
- Thermal-Aware On-Chip Memory Architecture ExplorationYang Li, Lei Ju, Zhiping Jia, Yi Wang 0003, Zili Shao. 1386-1393 [doi]
- Quality Assessment for Stereoscopic Image Based on DCT Frequency InformationChao Sun, Xingang Liu, Kai Kang, Laurence T. Yang. 1394-1398 [doi]
- Hope: A Fault-Tolerant Distributed Pub/Sub Architecture for Large-Scale Dynamic Network EnvironmentXiaochuan Yu, Toong Shoon Alvin Chan. 1399-1406 [doi]
- Design of the Farmer's Experience Based Greenhouse Operating SystemsAekyung Moon, Sangho Lee. 1407-1411 [doi]
- Validation of a Rowing Oar Angle Measurement System Based on an Inertial Measurement UnitFranz Gravenhorst, Timothy Turner, Conny Draper, Richard M. Smith, Gerhard Tröster. 1412-1419 [doi]
- Platform Zero: A Context-Based Computing Platform for CollaborationAdam Muhlbauer, Timothy Zelinsky, Salil Kanhere. 1420-1427 [doi]
- A Methodology to Transform an OS-Based Application to a Bare Machine ApplicationUzo Okafor, Ramesh K. Karne, Alexander L. Wijesinha, Patrick Appiah-Kubi. 1428-1433 [doi]
- Impact of Mobility Models on Social Structure Formation in Opportunistic NetworksHalikul Lenando, Mohamad Nazim Jambli, Kartinah Zen, Johari Abdullah. 1434-1441 [doi]
- Comparison SIP and IAX to Voice Packet Signaling over VOIPOctavio J. Salcedo Parra, Neil Orlando Diaz Martinez, Gustavo López Rubio. 1442-1449 [doi]
- Reinventing Mobile Community Computing and CommunicationYann Busnel, Nuno Cruz, Denis Gillet, Adrian Holzer, Hugo Miranda. 1450-1457 [doi]
- Measuring Walking and Running Cadence Using MagnetometersUmran Azziz Abdulla, Ken Taylor, Michael Barlow, Khushnood Z. Naqshbandi. 1458-1462 [doi]
- VoIP Spam PreventionSaeed Farooq Khan, Marius Portmann, Neil W. Bergmann. 1463-1470 [doi]
- An Energy-Aware Task Scheduling Algorithm for a Heterogeneous Data CenterShuo Zhang, Baosheng Wang, BaoKang Zhao, Jing Tao. 1471-1477 [doi]
- An OpenFlow-Based Dynamic Path Adjustment Algorithm for Multicast Spanning TreesJingguo Ge, Hanji Shen, Yuepeng E., Yulei Wu, Junling You. 1478-1483 [doi]
- High Radix Montgomery Modular Multiplier on Modern FPGAPingjian Wang, Zongbin Liu, Lei Wang, Neng Gao. 1484-1489 [doi]
- A Model-Based Approach for RFID Application TestingAndreas Huebner, Christian Facchi, Markus Meyer, Helge Janicke. 1490-1497 [doi]
- A Trust Evaluation Method for Supplier SelectionXiaofeng Qiu, Lei Cao, Pengfei Li, Liang Zhao. 1498-1503 [doi]
- A Trusted Remote Attestation Model Based on Trusted ComputingYue Yu, Huaimin Wang, Bo Liu, Gang Yin. 1504-1509 [doi]
- Achieving Collaborative Wi-Fi Sharing without Changing Current TechnologiesCarlos Ballester Lafuente, Jean-Marc Seigneur. 1510-1515 [doi]
- Multivalued Trust Routing Based on Topology Level for Wireless Sensor NetworksZhongwei Chen, Ruihua Zhang, Lei Ju, Wei Wang. 1516-1521 [doi]
- A Research Model for Trustworthy Pervasive Social NetworkingZheng Yan, Peng Zhang, Valtteri Niemi, Raimo Kantola. 1522-1527 [doi]
- The Affect of Familiarity on the Usability of Recognition-Based Graphical Passwords: Cross Cultural Study between Saudi Arabia and the United KingdomHani Moaiteq Aljahdali, Ron Poet. 1528-1534 [doi]
- Disability Parking Permit - Lightweight But Trustworthy Identity DocumentsMiroslaw Kutylowski, Piotr Lipiak. 1535-1540 [doi]
- Evaluating the Trust of Android Applications through an Adaptive and Distributed Multi-criteria ApproachGianluca Dini, Fabio Martinelli, Ilaria Matteucci, Marinella Petrocchi, Andrea Saracino, Daniele Sgandurra. 1541-1546 [doi]
- Continuous Mobile Authentication Using Virtual Key Typing BiometricsTao Feng, Xi Zhao, Bogdan Carbunar, Weidong Shi. 1547-1552 [doi]
- Studies in Socio-technical Security Analysis: Authentication of Identities with TLS CertificatesAna Ferreira, Rosario Giustolisi, Jean-Louis Huynen, Vincent Koenig, Gabriele Lenzini. 1553-1558 [doi]
- Complete Privacy Preserving Auditing for Data Integrity in Cloud ComputingY. Govinda Ramaiah, G. Vijaya Kumari. 1559-1566 [doi]
- On the Complexity of Authorization of Temporal RBAC in Cloud Computing ServiceWenkang Wu, Zhuo Tang, Renfa Li. 1567-1572 [doi]
- On Subjective Trust for Privacy Policy Enforcement in Cloud ComputingKarthick Ramachandran, Hanan Lutfiyya, Mark Perry. 1573-1580 [doi]
- A Reliability-Based Trust Management Mechanism for Cloud ServicesWenjuan Fan, Harry G. Perros. 1581-1586 [doi]
- Towards Building an Automated Security Compliance Tool for the CloudKazi Wali Ullah, Abu Shohel Ahmed, Jukka Ylitalo. 1587-1593 [doi]
- Detecting Intrusive Activity in the Smart Grid Communications Infrastructure Using Self-Organizing MapsZubair Ahmed Baig, Saif Ahmad, Sadiq M. Sait. 1594-1599 [doi]
- A Defense Security Approach for Infrastructures against HackingSaad Alsunbul, Phu Dung Le, Jefferson Tan. 1600-1606 [doi]
- A Lightweight Design of Malware Behavior RepresentationYong Qiao, Yuexiang Yang, Lin Ji, Chuan Tang, Jie He. 1607-1612 [doi]
- Use of Role Based Access Control for Security-Purpose HypervisorsManabu Hirano, David W. Chadwick, Suguru Yamaguchi. 1613-1619 [doi]
- A Comprehensive Approach to Abusing Locality in Shared Web Hosting ServersSeyed Ali Mirheidari, Sajjad Arshad, Saeidreza Khoshkdahan, Rasool Jalili. 1620-1625 [doi]
- Crime Toolkits: The Productisation of CybercrimeAmmar Alazab, Jemal Abawajy, Michael Hobbs, Robert Layton, Ansam Khraisat. 1626-1632 [doi]
- Shear-Based Spatial Transformation to Protect Proximity Attack in Outsourced DatabaseAl-Amin Hossain, Seung-Jin Lee, Eui-nam Huh. 1633-1638 [doi]
- Authorization Policies: Using Decision Support System for Context-Aware Protection of User's Private DataArnaud Oglaza, Romain Laborde, Pascale Zaraté. 1639-1644 [doi]
- Case Study: On the Security of Key Storage on PCsRoberto Gallo, Henrique Kawakami, Ricardo Dahab. 1645-1651 [doi]
- A Power Model Combined of Architectural Level and Gate Level for Multicore ProcessorsManman Peng, Yan Hu. 1652-1655 [doi]
- Defend against Collusive SSDF Attack Using Trust in Cooperative Spectrum Sensing EnvironmentJingyu Feng, Yuqing Zhang, Guangyue Lu, Liang Zhang. 1656-1661 [doi]
- Efficient Random Key Based Encryption System for Data Packet Confidentiality in WSNsKashif Saleem, Mohammed Sayim Khalil, Norsheila Fisal, Adel Ali Ahmed, Mehmet Ali Orgun. 1662-1668 [doi]
- Exposing Clone RFID Tags at the ReaderLuke Mirowski. 1669-1674 [doi]
- ProTACD: A Generic Privacy Process for Vehicle DevelopmentNaim Asaj, Florian Schaub, Michael Müter, Albert Held, Michael Weber 0001. 1675-1682 [doi]
- Mutual Chip AuthenticationLucjan Hanzlik, Kamil Kluczniak, Lukasz Krzywiecki, Miroslaw Kutylowski. 1683-1689 [doi]
- Celerity Hardware Implementation of the AES with Data Parallel and Pipelining Architecture inside the Round FunctionShouwen Yang, Hui Li, Xiaotao Zhang, Gang Zhao. 1690-1695 [doi]
- Toward Coercion-Resistant End-to-End Verifiable Electronic Voting SystemsWagner Medeiros dos Santos, Ruy J. G. B. de Queiroz, Carlos E. R. Saraiva, Gleudson P. V. Junior. 1696-1703 [doi]
- Server-Aided Verification Proxy Re-signatureZhiwei Wang, Wei Lv. 1704-1707 [doi]
- Cryptanalysis of "An Improved Remote Password Authentication Scheme with Smartcard"Muhammad Khurram Khan, Debiao He. 1708-1710 [doi]
- Trust and Adaptation in STRATUSPaul Robertson, Robert Laddaga, Mark H. Burstein. 1711-1716 [doi]
- Using Secure Multiparty Computation for Collaborative Information ExchangeDennis Titze, Hans Hofinger, Peter Schoo. 1717-1722 [doi]
- Pseudonymous Smart Metering without a Trusted Third PartySören Finster, Ingmar Baumgart. 1723-1728 [doi]
- TARS: Trusted Adaptive Routing Strategy with Back-Off Observing MechanismYiqing Hu, Yan Xiong, Xudong Gong, Qiwei Lu, Mingxi Li, Wenchao Huang. 1729-1734 [doi]
- Formal Verification of the Coordinated Robust Authentication Protocol for Wireless NetworksKhosrow Ramezani, Elankayer Sithirasenan, Vallipuram Muthukkumarasamy. 1735-1740 [doi]
- TimSim: A Timestep-Based Wireless Ad-Hoc Network SimulatorChong Yan, Zhiping Jia, Lei Ju, Hui Xia, Huaqiang Xu. 1741-1746 [doi]
- HIWL: An Unsupervised Learning Algorithm for Indoor Wireless LocalizationLi Li, Wang Yang, Guojun Wang. 1747-1753 [doi]
- A Multi-agent Model for Fire Detection in Coal Mines Using Wireless Sensor NetworksZeshan Aslam Khan, Edison Pignaton de Freitas, Tony Larsson, Haider Abbas. 1754-1761 [doi]
- Power Control and Channel Assignment Mechanisms for Cluster-Based Multichannel Vehicular Ad-Hoc NetworksChi-Hsien Wang, Gwo-Jong Yu. 1762-1767 [doi]
- A Novel Device-Device Beam Discovery Scheme with Cross-Layer Design for Millimeter-Wave WPANPingping Xu, Hongyun Chu, Suheng Zhang. 1768-1773 [doi]
- A Distributed Localization Algorithm Based on Random Diffusion in WSNQiong Wu, Pingping Xu, Suheng Zhang, Hongyun Chu. 1774-1777 [doi]
- A Matrix Transformation Algorithm for Virtual Machine Placement in CloudMeng Sun, Weidong Gu, Xinchang Zhang, Huiling Shi, Wei Zhang 0049. 1778-1783 [doi]
- Big Data Real-Time Processing Based on StormWenjie Yang, Xingang Liu, Lan Zhang, Laurence T. Yang. 1784-1787 [doi]
- Detecting Associations in Large Dataset on MapReduceDong Dai, Xi Li, Chao Wang, Junneng Zhang, Xuehai Zhou. 1788-1794 [doi]
- Protecting Cumulative Node Constraint during XML UpdateNorfaradilla Wahid, Eric Pardede. 1795-1802 [doi]
- An Algorithmic Approach to Securing the Three-Stage Quantum Cryptography ProtocolMayssaa El Rifai, Pramode K. Verma. 1803-1807 [doi]
- Social Spam Discovery Using Bayesian Network Classifiers Based on Feature ExtractionsDae-Ha Park, Eun-Ae Cho, Byung-Won On. 1808-1811 [doi]
- The Role of Trust in Absorptive Capacity OperationalizationAthar Mahmood Ahmed Qureshi, Nina Evans. 1812-1816 [doi]
- An Adaptive Rating System for Service ComputingXinfeng Ye, Jupeng Zheng. 1817-1824 [doi]
- An Automatic Parallel-Stage Decoupled Software Pipelining Parallelization Algorithm Based on OpenMPXiaoxian Liu, Rongcai Zhao, Lin Han, Peng Liu. 1825-1831 [doi]
- Mobile Parallel Computing Algorithms for Single-Buffered, Speed-Scalable ProcessorsRashid Khogali, Olivia Das, Kaamran Raahemifar. 1832-1839 [doi]
- Probabilistic Analysis of Parallel Program with Partially Eliminated BarriersNaoki Yonezawa, Ken'ichi Katou, Issei Kino, Koichi Wada. 1840-1847 [doi]
- Simulator Implementation and Performance Study of a Polymorphous Array ComputerHucai Huang, Tao Li, Jungang Han. 1848-1855 [doi]
- Multicore Parallel Implementation of Agent Emotional ProcessesCarlos Domínguez, Houcine Hassan, Vicent Mayans, Alfons Crespo. 1856-1861 [doi]
- COSCHED: A Scheduling Agent Maximizing Cloud Broker's Revenues under the CompatibleOne ArchitectureFelipe Díaz Sánchez, Maurice Gagnaire, James Marshall, Jean-Pierre Laisné. 1862-1867 [doi]
- Performance Analysis of Load-Aware Anycasting Based on OpenFlowJingguo Ge, Chuan Du, Yulei Wu, Yuepeng E., Junling You. 1868-1872 [doi]
- Parallel Realization of Cognitive Cells on Film MammographyAlex Pappachen James, Sherin Sugathan. 1873-1878 [doi]
- Fast and Accurate On-line Prediction of Performance and Power Consumption in Multicore-based SystemsYoung-Ho Lee, Jihong Kim. 1879-1886 [doi]
- Performance Evaluation of the Time Analysable On-Demand Coherent CacheArthur Pyka, Mathias Rohde, Sascha Uhrig. 1887-1892 [doi]
- Communication Pipelining for Code Generation from Simulink ModelsRongjie Yan, Kai Huang, Min Yu, Xiaomeng Zhang. 1893-1900 [doi]
- An Optimizing Strategy Research of LDPC Decoding Based on GPGPULuechao Yuan, Zuocheng Xing, Yang Zhang, Xiaobao Chen. 1901-1906 [doi]
- Environmental Spatio-temporal Ontology for the Linked Open Data CloudAhsan Morshed, Jagannath Aryal, Ritaban Dutta. 1907-1912 [doi]