Abstract is missing.
- IoT Link: An Internet of Things Prototyping ToolkitFerry Pramudianto, Carlos Alberto Kamienski, Eduardo Souto, Fabrizio F. Borelli, Lucas L. Gomes, Djamel Sadok, Matthias Jarke. 1-9 [doi]
- Situation Inference by Fusion of Opportunistically Available ContextsJiangtao Wang, Yasha Wang, Hongru Ren, Daqing Zhang. 10-17 [doi]
- Detecting Cruising Flagged Taxis' Passenger-Refusal Behaviors Using Traffic Data and CrowdsourcingLi Jin, Ming Han, Gang-Li Liu, Ling Feng. 18-25 [doi]
- Handling Influence among Multiple Applications in a Smart SpaceMa Jun, XianPing Tao, Chun Cao, Lu Jian. 26-33 [doi]
- Implementation of On-Demand Indoor Location-Based Service Using Ad Hoc Wireless Positioning NetworkShigemi Ishida, Koki Tomishige, Akira Izumi, Shigeaki Tagashira, Yutaka Arakawa, Akira Fukuda. 34-41 [doi]
- Shutter: Preventing Information Leakage Based on Domain Gateway for Social NetworksTao Wu, Jianxin Li, Nannan Wu, Tao Ou, Borui Yang, Bo Li. 42-49 [doi]
- Scalable Security Analysis Using a Partition and Merge Approach in an Infrastructure as a Service CloudJin B. Hong, Taehoon Eom, Jong Sou Park, Dong Seong Kim. 50-57 [doi]
- RPC: A Localization Method Based on Regional Partition and CooperationDan Xu, XiaoJiang Chen, Weike Nie, Zhanyong Tang, Zhanglei Li, Dingyi Fang, Na An. 58-65 [doi]
- Recognizing Semantic Locations from Smartphone Log with Combined Machine Learning TechniquesHu Xu, Sung-Bae Cho. 66-71 [doi]
- A Run-Time Generic Decision Framework for Power and Performance Management on Mobile DevicesMartin Peres, Mohamed Aymen Chalouf, Francine Krief. 72-79 [doi]
- Muclouds: Parallel Simulator for Large-Scale Cloud Computing SystemsJinzhao Liu, Yue-Zhi Zhou, Di Zhang, Yujian Fang, Wei Han, Yaoxue Zhang. 80-87 [doi]
- A Management System for Cyber Individuals and Heterogeneous DataJun Ren, Jianhua Ma, Runhe Huang, Qun Jin, Zhigang Chen. 88-95 [doi]
- Nanonetwork Minimum Energy CodingMuhammad Agus Zainuddin, Eugen Dedu, Julien Bourgeois. 96-103 [doi]
- Design of Lower Limb Chair Exercise Support System with Depth SensorToshiya Watanabe, Naohiro Ohtsuka, Susumu Shibusawa, Masaru Kamada, Tatsuhiro Yonekura. 104-111 [doi]
- Indoor Localization Utilizing Tracking Scanners and Motion SensorsTakumi Takafuji, Kazuhisa Fujita, Takamasa Higuchi, Akihito Hiromori, Hirozumi Yamaguchi, Teruo Higashino. 112-119 [doi]
- AR Go-Kon: A System for Facilitating a Smooth Communication in the First MeetingYuma Akaike, Jun Komeda, Yuka Kume, Satoshi Kanamaru, Yutaka Arakawa. 120-126 [doi]
- An Anypath Routing Protocol for Multi-hop Cognitive Radio Ad Hoc NetworksChih-Min Chao, Hsiang-Yuan Fu, Li-Ren Zhang. 127-133 [doi]
- Intuitive Appliance Control System Based on a High-Accuracy Indoor Positioning SystemJun Komeda, Yutaka Arakawa, Morihiko Tamai, Keiichi Yasumoto. 134-139 [doi]
- Discovering Latent Structures for Activity Recognition in Smart EnvironmentsJiahui Wen, Jadwiga Indulska, Zhiying Wang. 140-147 [doi]
- An Opportunistic Music Sharing System Based on Mobility Prediction and Preference LearningFei Yi, Zhiwen Yu, Hui Wang, Bin Guo, Xingshe Zhou. 148-153 [doi]
- Who Move the Treasures: A RFID-based Approach for the TreasuresTianzhang Xing, Binbin Xie, Zhanyong Tang, Xia Zheng, Liqing Ren, XiaoJiang Chen, Dingyi Fang, Na An. 154-162 [doi]
- Behaviors and Communications in Working Support through First Person Vision CommunicationYuichi Nakamura, Takahiro Koizumi, Kanako Obata, Kazuaki Kondo, Yasuhiko Watanabe. 163-170 [doi]
- Human-Assisted Rule Satisfaction in Partially Observable EnvironmentsViktoriya Degeler, Edward Curry. 171-178 [doi]
- A Cross-Space, Multi-interaction-Based Dynamic Incentive Mechanism for Mobile Crowd SensingWenqian Nan, Bin Guo, Shenlong Huangfu, Zhiwen Yu, Huihui Chen, Xingshe Zhou. 179-186 [doi]
- GFRT-chord: Flexible Structured Overlay Using Node GroupsHiroya Nagao, Kazuyuki Shudo. 187-195 [doi]
- Influencing Factors Analysis of People's Answering Behaviours on Social Network Based QuestionsZhiwei Sun, Wenge Rong, Yikang Shen, Yuanxin Ouyang, Chao Li, Zhang Xiong. 196-203 [doi]
- An Autonomic Approach to Real-Time Predictive Analytics Using Open Data and Internet of ThingsWassim Derguech, Eanna Bruke, Edward Curry. 204-211 [doi]
- A Multi-armed Bandit Approach to Online Spatial Task AssignmentUmair ul Hassan, Edward Curry. 212-219 [doi]
- Palantir: Crowdsourced Newsification Using TwitterPrthvi Raj, Sumi Helal. 220-227 [doi]
- Historical Trajectories Based Location Privacy Protection QueryLiu Cao, Yuqing Sun, Haoran Xu. 228-235 [doi]
- Near-Optimal Activity Prediction through Efficient Wavelet Modulus Maxima Partitioning and Conditional Random FieldsRoland Assam, Thomas Seidl 0001. 236-243 [doi]
- Taxi Exp: A Novel Framework for City-Wide Package Express Shipping via Taxi Crowd SourcingChao Chen, Daqing Zhang, Leye Wang, Xiaojuan Ma, Xiao Han, Edwin Hsing-Mean Sha. 244-251 [doi]
- Towards Energy Optimization Based on Delay-Sensitive Traffic for WiFi NetworkBo Chen, Xi Li, Xuehai Zhou, Tengfu Liu, Zongwei Zhu. 252-259 [doi]
- BodyRC: Exploring Interaction Modalities Using Human Body as Lossy Signal Transmission MediumYuntao Wang, Chun Yu, Lin Du, Jin Huang, Yuanchun Shi. 260-267 [doi]
- Multi-source Broadcast Scheduling Algorithm of Barrage Relay Network in Tactical MANETJunhua Yan, Chen Tian, Wenyu Liu, Lai Tu, Benxiong Huang. 268-275 [doi]
- Discovering People's Life Patterns from Anonymized WiFi ScanlistsShao Zhao, Zhe Zhao, Yifan Zhao, Runhe Huang, Shijian Li, Gang Pan. 276-283 [doi]
- uStitchHub: Stitching Multi-touch Trajectories on Tiled Very Large TabletopsYongqiang Qin, Yue Shi, Yuanchun Shi. 284-289 [doi]
- Design of a Sensing Service Architecture for Internet of Things with Semantic Sensor SelectionYao-Chung Hsu, Chi-Han Lin, Wen-Tsuen Chen. 290-298 [doi]
- Identifying Hot Lines of Urban Spatial Structure Using Cellphone Call Detail Record DataShu Chen, Hongwei Wu, Lai Tu, Benxiong Huang. 299-304 [doi]
- Study on Complex Event Processing for CPS: An Event Model PerspectiveYuying Wang, Xingshe Zhou, Lijun Shan, Kejian Miao. 305-310 [doi]
- Model-Based Solution for Personalization of the User Interaction in Ubiquitous ComputingRui Neves Madeira, Pedro Albuquerque Santos, AndrƩ Vieira, Nuno Correia. 311-318 [doi]
- Task Scheduling in Cyber-Physical SystemsChunyao Liu, Lichen Zhang, Daqiang Zhang. 319-324 [doi]
- Data Collection Oriented Topology Control for Predictable Delay-Tolerant NetworksHongsheng Chen, Ke Shi, Yao Lin. 325-330 [doi]
- A Novel Email Virus Propagation Model with Local GroupQiguang Miao, Xing Tang, Yi-Ning Quan. 331-336 [doi]
- Obstacle Avoidance for Visually Impaired Using Auto-Adaptive Thresholding on Kinect's Depth ImageMuhamad Risqi Utama Saputra, widyawan, Paulus Insap Santosa. 337-342 [doi]
- Making Business Environments Smarter: A Context-Adaptive Petri Net ApproachEstefanĆa Serral, Johannes De Smedt, Jan Vanthienen. 343-348 [doi]
- Subtractive Clustering as ZUPT DetectorMohd Nazrin Muhammad, Zoran Salcic, Kevin I-Kai Wang. 349-355 [doi]
- An Indoor Location-Tracking Using Wireless Sensor Networks Cooperated with Relative Distance Finger PrintingYoun-Sik Hong, Sung-Hyun Han, Saemina Kim. 356-361 [doi]
- Defining and Analyzing a Gesture Set for Interactive TV Remote on Touchscreen PhonesYuntao Wang, Chun Yu, Yuhang Zhao, Jin Huang, Yuanchun Shi. 362-365 [doi]
- Privacy Perceptive Wireless Service Game ModelWeiwei Li, Yuqing Sun. 366-371 [doi]
- Development of Collaborative Video Streaming for Mobile Networks: From Overview to PrototypeMingyang Zhong, Jadwiga Indulska, Peizhao Hu, Marius Portmann, Mohan J. Kumar. 372-377 [doi]
- MSR: Minimum-Stop Recharging Scheme for Wireless Rechargeable Sensor NetworksLyes Khelladi, Djamel Djenouri, Noureddine Lasla, Nadjib Badache, Abdelmadjid Bouabdallah. 378-383 [doi]
- Service Selection in Ubiquitous Environments: A Novel Approach Using CBR and Skyline ComputingRim Helali, Nadia Ben Azzouna, Khaled GhƩdira. 384-389 [doi]
- Remote Sensing of Forest Stand Parameters for Automated Selection of Trees in Real-Time Mode in the Process of Selective CuttingIgor Petukhov, Luydmila Steshina, Ilya Tanryverdiev. 390-395 [doi]
- The Device Cloud - Applying Cloud Computing Concepts to the Internet of ThingsThomas Renner, Andreas Kliem, Odej Kao. 396-401 [doi]
- Studying Accessible States of User Interfaces on TabletopsQiang Yang, Jie Liu, Yongqiang Qin, Chun Yu, Qing Yuan, Yuanchun Shi. 402-405 [doi]
- Tailor-Made Gaussian Distribution for Intrusion Detection in Wireless Sensor NetworksAmrita Ghosal, Subir Halder. 406-411 [doi]
- Segmentation of Urban Areas Using Vector-Based ModelSi Zhao, Hongwei Wu, Lai Tu, Benxiong Huang. 412-416 [doi]
- A Machine Learning Approach for Self-Diagnosing Multiprocessors Systems under the Generalized Comparison ModelMourad Elhadef. 417-424 [doi]
- Failure Prediction for Cloud Datacenter by Hybrid Message Pattern LearningYukihiro Watanabe, Hiroshi Otsuka, Yasuhide Matsumoto. 425-432 [doi]
- Self-Adaptive Containers: Interoperability Extensions and Cloud IntegrationWei-Chih Huang, William J. Knottenbelt. 433-440 [doi]
- Automatically Generating External OS Kernel Integrity Checkers for Detecting Hidden RootkitsHiromasa Shimada, Tatsuo Nakajima. 441-448 [doi]
- A Privacy-Aware Architecture for Energy Management Systems in Smart GridsFabian Rigoll, Christian Hirsch, Sebastian Kochanneck, Hartmut Schmeck, Ingo Mauser. 449-455 [doi]
- Awareness and Control of Personal Data Based on the Cyber-I Privacy ModelLi Tang, Jianhua Ma, Runhe Huang, Bernady O. Apduhan, He Li, Shaoyin Cheng. 456-463 [doi]
- SW-POR: A Novel POR Scheme Using Slepian-Wolf Coding for Cloud StorageTran Phuong Thao, Lee Chin Kho, Azman Osman Lim. 464-472 [doi]
- Distributed Routing Protocol Based on Biologically-Inspired Attractor Selection with Active Stochastic Exploration and a Short-Term MemoryTomohiro Nakao, Jun-nosuke Teramae, Naoki Wakamiya. 473-478 [doi]
- Towards a Trust Model for Trust Establishment and Management in Business-to-Consumer E-CommerceCong Cao, Jun Yan. 479-486 [doi]
- An Efficient Trust-Oriented Trip Planning Method in Road NetworksJunqiang Dai, Guanfeng Liu, Jiajie Xu, An Liu, Lei Zhao, Xiaofang Zhou. 487-494 [doi]
- Trust-E: A Trusted Embedded Operating System Based on the ARM TrustzoneXia Yang, Peng Shi, Bo Tian, Bing Zeng, Wei Xiao. 495-501 [doi]
- An Adaptivity-Enhanced Multipath Routing Method for Secure Dispersed Data Transfer Method in Ad Hoc Networks with Varying Node DensityTetsuya Murakami, Eitaro Kohno, Yoshiaki Kakuda. 502-509 [doi]
- Secure Third Party Auditor for Ensuring Data Integrity in Cloud StorageSalah H. Abbdal, Hai Jin, Deqing Zou, Ali. A. Yassen. 510-517 [doi]
- A Routing Scheme Based on Autonomous Clustering and P2P Overlay Network in MANETsShoma Nakahara, Tomoyuki Ohta, Yoshiaki Kakuda. 518-524 [doi]
- Privacy Protection against Query Prediction in Location-Based ServicesZhengang Wu, Liangwen Yu, Jiawei Zhu, Huiping Sun, Zhi Guan, Zhong Chen. 525-532 [doi]
- Forwarding Impact Aware Routing Protocol for Delay Tolerant NetworkQaisar Ayub, M. Soperi Mohd Zahid, Sulma Rashid, Abdul Hanan Abdullah. 533-539 [doi]
- An Architecture for Virtualization-Based Trusted Execution Environment on Mobile DevicesYoung-woo Jung, Hag-Young Kim, Sang-Wook Kim. 540-547 [doi]
- An Autonomic Container for the Management of Component-Based Applications in Pervasive EnvironmentsImen Ben Lahmar, Djamel BelaĆÆd. 548-555 [doi]
- An Efficient Algorithm for Deriving Mobility Scenarios from New Mobility Model Representing Spatially and Temporally Biased Change of Node Mobility and Node Density for Mobile Ad Hoc NetworksTakahiro Shigeta, Eitaro Kohno, Yoshiaki Kakuda. 556-562 [doi]
- Compatibility in Service-Oriented Revision Control SystemsJameel Almalki, Haifeng Shen. 563-570 [doi]
- International Center for Monitoring Cloud Computing Providers (ICMCCP) for Ensuring Trusted CloudsMohssen M. Z. E. Mohammed, Al-Sakib Khan Pathan. 571-576 [doi]
- Virtual Machine Migration Methods for Heterogeneous Power ConsumptionSatoru Ohta, Atsushi Sakai. 577-582 [doi]
- Partial Least Squares Improvement and Research Principal Component Regression Extraction MethodsWangping Xiong, Jianqiang Du, Wang Nie. 583-585 [doi]
- Toward Data-Centric Software Architecture for Automotive Systems - Embedded Data Stream Processing ApproachYukikazu Nakamoto, Akihiro Yamaguchi, Kenya Sato, Shinya Honda, Hiroaki Takada. 586-589 [doi]
- An Anonymous Remote Attestation Protocol to Prevent Masquerading AttackAnna Lan, Zhen Han, Dawei Zhang, Yichen Jiang, Tianhua Liu, Meihong Li. 590-595 [doi]
- SecPlace: A Security-Aware Placement Model for Multi-tenant SaaS EnvironmentsEyad Saleh, Johannes Sianipar, Ibrahim Takouna, Christoph Meinel. 596-602 [doi]
- Analysis of Virtual Machine Monitor as Trusted Dependable SystemsGanis Zulfa Santoso, Young-woo Jung, Hag-Young Kim. 603-608 [doi]
- On the Applicability of the Tree-Based Group ID Reassignment Routing Method for MANETsHiroaki Yagi, Eitaro Kohno, Yoshiaki Kakuda. 609-614 [doi]
- Delay- and Disruption-Tolerant Bluetooth MANET-Based Dual-Purpose Systems for Normal and Disaster SituationsYuya Minami, Yuya Kitaura, Eitaro Kohno, Shinji Inoue, Tomoyuki Ohta, Yoshiaki Kakuda. 615-619 [doi]
- A Study on Providing the Reliable and Secure SMS Authentication ServiceJaesik Lee, Youngseok Oh. 620-624 [doi]
- A Discrete Time Financial Option Pricing Model for Cloud ServicesDavid Allenotor, Ruppa K. Thulasiram. 629-636 [doi]
- Proposal of a Distributed Cooperative M2M System for Flood Disaster PreventionShinji Kitagami, Yohtaro Miyanishi, Yoshiyori Urano, Norio Shiratori. 637-642 [doi]
- Trust in Mobile Cloud Computing with LTE-based DeploymentMohammed Hussain, Basel Mohamed Almourad. 643-648 [doi]
- CAVE: Hybrid Approach for In-Network Content CachingKhaled Bakhit, Sirine Taleb, Ayman I. Kayssi, Imad H. Elhajj, Ali Chehab. 649-654 [doi]
- Monitoring Hadoop by Using IEEE1888 in Implementing Energy-Aware Thread SchedulingHiroaki Takasaki, Samih M. Mostafa, Shigeru Kusakabe. 655-658 [doi]
- Estimation of Sleep Quality of Residents in Nursing Homes Using an Internet-Based Automatic Monitoring SystemXin Zhu, Xina Zhou, Wenxi Chen, Keiichiro Kitamura, Tetsu Nemoto. 659-665 [doi]
- A Fine-Grained Cross-Domain Access Control Mechanism for Social Internet of ThingsJun Wu, Mianxiong Dong, Kaoru Ota, Jianhua Li, Bei Pei. 666-671 [doi]
- Intelligent Human Fall Detection for Home SurveillanceHong Lu, Bohong Yang, Rui Zhao, Pengliang Qu, Wenqiang Zhang. 672-676 [doi]
- More than Meets the Eye in Smart City Information Security: Exploring Security Issues Far beyond Privacy ConcernsFelipe Silva Ferraz, Carlos André Guimarães Ferraz. 677-685 [doi]
- Interactive Design and Simulation System for Deploying Wireless Sensor Networks Based on Centriod Multi-touch ScreenJingru Wei, Lin Lu, Chenglei Yang, Xu Yin, Xiangxu Meng. 686-691 [doi]
- Case Study of Constructing Weather Monitoring System in Difficult EnvironmentMasato Yamanouchi, Hideya Ochiai, Y. K. Reddy, Hiroshi Esaki, Hideki Sunahara. 692-696 [doi]
- Sensor Based Vehicle Environment Perception Information SystemKashif Naseer Qureshi, Abdul Hanan Abdullah, Ghufran Ullah. 697-700 [doi]
- Vision Based Mapping and Localization in Unknown Environment for Intelligent Mobile RobotXiaoxin Qiu, Hong Lu, Wenqiang Zhang, Yunhan Bai, Qianzhong Fu. 701-706 [doi]
- Anti-copy of 2D Barcode Using Multi-encryption TechniqueSuwilai Phumpho, Poomyos Payakkawan, Anurak Jansri, Direk Tongaram, Chirasak Promprayoon, Pithuk Keattipun, Boonchu Ruengpongsrisuck, Chanachai Punnua, Satree Areejit, Pitikhate Sooraksa. 707-711 [doi]
- A Novel Automated Software Test Technology with Cloud TechnologyZhenyu Liu, Mingang Chen, Lizhi Cai. 712-716 [doi]
- Restful Design and Implementation of Smart Appliances for Smart HomeSehoon Kim, Jin Young Hong, Seil Kim, Sung Hoon Kim, Jun-Hyung Kim, Jake Chun. 717-722 [doi]
- The Latent Appreciation Effect of Interactive Design in Internet CommunicationWang Ning. 723-726 [doi]
- The Key Features and Applications of Newmedia Interactive DesignWang Ning. 727-731 [doi]
- A Realtime Framework for Video Object Detection with StormWeishan Zhang, Pengcheng Duan, Qinghua Lu, Xin Liu. 732-737 [doi]
- A Service Composition Environment Based on Enterprise Service BusFu Ning, Junhua Duan, Guo Yan. 738-743 [doi]
- A Wearable Internet of Things Mote with Bare Metal 6LoWPAN Protocol for Pervasive HealthcareKevin I-Kai Wang, Ashwin Rajamohan, Shivank Dubey, Samuel A. Catapang, Zoran Salcic. 750-756 [doi]
- Private Smart Space: Cost-Effective ADLs (Activities of Daily Livings) Recognition Based on Superset TransformationXiaohu Fan, Hao Huang, Changsheng Xie, Zhigang Tang, Jing Zeng. 757-762 [doi]
- A Proactive Approach for Information Sharing Strategies in an Environment of Multiple Connected Ubiquitous DevicesRemus-Alexandru Dobrican, Denis ZampuniƩris. 763-770 [doi]
- Shadow VoD: Performance Evaluation as a Capability in Production P2P-CDN Hybrid VoD NetworksHanzi Mao, Chen Tian, Jingdong Sun, Junhua Yan, Weimin Wu, Benxiong Huang. 771-776 [doi]
- Estimate Dynamic Road Travel Time Based on Uncertainty FeedbackXiao Zhang, Yufeng Dou, Junfeng Zhan, Yinchuang Xie, XueJin Wan. 777-782 [doi]
- Mobiscan3D: A Low Cost Framework for Real Time Dense 3D Reconstruction on Mobile DevicesBrojeshwar Bhowmick, Apurbaa Mallik, Arindam Saha. 783-788 [doi]
- Computing Realistic Images for Audience Interaction in Projection-Based Multi-view Display SystemWei Gai, Lin Lu, Chenglei Yang, Shuo Feng, Tingting Cui, Xiangxu Meng. 789-793 [doi]
- Human Computer Interaction Advancement by Usage of Smart Phones for Motion Tracking and Remote OperationJega Anish Dev. 794-799 [doi]
- Motion Detection and Evaluation of Chair Exercise Support System with Depth Image SensorToshiya Watanabe, Naohiro Ohtsuka, Susumu Shibusawa, Masaru Kamada, Tatsuhiro Yonekura. 800-807 [doi]
- Wireless Multihop Transmissions for Secret Sharing CommunicationTetsuya Kanachi, Hiroaki Higaki. 808-813 [doi]
- DTN Data Message Transmission by Inter-vehicle Communication with Help of Road Map and Statistical Traffic Information in VANETHiroki Hanawa, Hiroaki Higaki. 814-820 [doi]
- BDMap: A Heuristic Application Mapping Algorithm for the Big Data EraThomas Canhao Xu, Jussi Toivonen, Tapio Pahikkala, Ville LeppƤnen. 821-828 [doi]
- Network Traffic Prediction Based on LSSVM Optimized by PSOYi Yang, Yanhua Chen, Caihong Li, Xiangquan Gui, Lian Li. 829-834 [doi]
- Cloud Wave Smart Middleware for DevOps in CloudsBoris Moltchanov, Oscar Rodriguez Rocha. 835-837 [doi]
- Entity Linking and Name Disambiguation in Chinese Micro-BlogsLi Li, Yunlong Guo, Yu Xiang, Xiao Xu, WeiGang Zeng. 838-843 [doi]
- Detecting Suicidal Ideation in Chinese Microblogs with Psychological LexiconsXiaolei Huang, Lei Zhang, David Chiu, Tianli Liu, Xin Li, Tingshao Zhu. 844-849 [doi]
- Personalized Activity Recognition Using Molecular Complex Detection ClusteringJun-zhong, Li Liu 0001, Ye Wei, Dashi Luo, Letian Sun, Yonggang Lu. 850-854 [doi]
- Improving the Architecture of an Autoencoder for Dimension ReductionChangjie Hu, Xiaoli Hou, Yonggang Lu. 855-858 [doi]
- New Methods to Ensure Security to Increase User's Sense of Safety in Cloud ServicesYohtaro Miyanishi, Akira Kanaoka, Fumiaki Sato, Xiaogong Han, Shinji Kitagami, Yoshiyori Urano, Norio Shiratori. 859-866 [doi]
- A Trade Gap Scalability Model for the Forex MarketDavid Ademola Oyemade, David Allenotor. 867-873 [doi]
- Multi-tenant Oriented Elastic Data-Centric Cloud Service Based on Resource Meta-ModelHongyun Yu, Hongming Cai, Cheng Xie, Lihong Jiang. 874-879 [doi]
- Composite Activity Recognition in Smart Homes Using Markov Logic NetworkK. S. Gayathri, Susan Elias, S. Shivashankar. 880-887 [doi]
- Mobile Augmented Reality Mashup for Furture IoT EnvironmentChoonsung Shin, Byoung-Ha Park, Gwang-Mo Jung, Sung Hee Hong. 888-891 [doi]
- Futuring Digital Health and WellnessMounir Mokhtari, Thibaut Tiberghien, Jit Biswas, Aung Aung Phyo Wai. 892-896 [doi]