Abstract is missing.
- Recognizing Gait Pattern of Parkinson's Disease Patients Based on Fine-Grained Movement Function FeaturesTianben Wang, Daqing Zhang, Zhu Wang, Jiangbo Jia, Hongbo Ni, Xingshe Zhou. 1-10 [doi]
- SensorAct: A Decentralized and Scriptable Middleware for Smart Energy BuildingsPandarasamy Arjunan, Manaswi Saha, Haksoo Choi, Manoj Gulati, Amarjeet Singh, Pushpendra Singh, Mani B. Srivastava. 11-19 [doi]
- Hygeia: A Practical and Tailored Data Collection Platform for Mobile HealthChao Xu, Wei Zheng, Pan Hui, Kunpeng Zhang, Hengchang Liu. 20-27 [doi]
- SAPM: Self-Adjusting Pipelining Mechanism for Efficient Bulk Data Dissemination in Smart HomesJun-Wei Li, ShiNing Li, Yu Zhang, Bin Guo, Zhe Yang. 28-35 [doi]
- Monitoring Sleep and Detecting Irregular Nights through Unconstrained Smartphone SensingKe Huang, Xiang Ding, Jing Xu, Guanling Chen, Wei Ding. 36-45 [doi]
- Composite Activity Recognition in Smart Homes Using Markov Logic NetworkK. S. Gayathri, Susan Elias, S. Shivashankar. 46-53 [doi]
- WSelector: A Multi-scenario and Multi-view Worker Selection Framework for Crowd-SensingJiangtao Wang, Sumi Helal, Yasha Wang, Daqing Zhang. 54-61 [doi]
- A Novel Graph-Based Method to Study Community Evolutions in Social InteractionsZhenyu Wu, Yu Liu, Jianwei Niu. 62-67 [doi]
- CrowdPic: A Multi-coverage Picture Collection Framework for Mobile Crowd PhotographingHuihui Chen, Bin Guo, Zhiwen Yu, Liming Chen. 68-76 [doi]
- Heterogeneous Sparse Relational Data Co-clustering in Social NetworkGuowei Shen, Wei Wang 0076, Wu Yang, Miao Yu, Guozhong Dong. 77-84 [doi]
- A Context-Aware Spontaneous Mobile Social NetworkNatalia De Arruda Botelho Navarro, Cristiano André da Costa, Jorge Luis Victória Barbosa, Rodrigo Da Rosa Righi. 85-92 [doi]
- Detecting Urban Road Condition and Disseminating Traffic Information by VANETsYuwei Xu, Jian Wang, Tingting Liu, Wenping Yu, Jingdong Xu. 93-98 [doi]
- A Novel Trace-Aided Data Dissemination Algorithm in Vehicular NetworksXian Shi, Gang Zhang, Chunfeng Liu, Tingting Han. 99-104 [doi]
- A Hybrid Cellular Automaton Mechanism Inspired Approach for Dynamic and Real-Time Traffic Lights SchedulingWenbin Hu, Huan Wang, Liping Yan, Bo Du. 105-112 [doi]
- Intelligent Taxi Service System Based on Carrier-Cloud-ClientMinglu Yu, Nanjie Liu, Haitao Zhao, Jiangqin Peng. 113-118 [doi]
- An Acoustic Traffic Monitoring System: Design and ImplementationYueyue Na, Yanmeng Guo, Qiang Fu, Yonghong Yan 0002. 119-126 [doi]
- Taxi Operation Optimization Based on Big Traffic DataQiuyuan Yang, Zhiqiang Gao, Xiangjie Kong, Azizur Rahim, Jinzhong Wang, Feng Xia. 127-134 [doi]
- Sensing the Pulse of Urban Activity Centers Leveraging Bike Sharing Open DataLongbiao Chen, Dingqi Yang, Jérémie Jakubowicz, Gang Pan, Daqing Zhang, Shijian Li. 135-142 [doi]
- An Interpretable Orientation and Placement Invariant Approach for Smartphone Based Activity RecognitionHaodong Guo, Ling Chen, Gencai Chen, Mingqi Lv. 143-150 [doi]
- On Improvement of the DV-RND Localization in Wireless Sensor NetworksCheng Zhong, Bang Wang, Laurence T. Yang. 151-158 [doi]
- Characterising and Predicting Urban Mobility Dynamics by Mining Bike Sharing System DataIda Bagus Irawan Purnama, Neil W. Bergmann, Raja Jurdak, Kun Zhao. 159-167 [doi]
- Underground Magnetic Localization Method and Optimization Based on Simulated Annealing AlgorithmQiwei Huang, Xiaotong Zhang, Jing Ma. 168-173 [doi]
- Programming Method and Formalization for Activity-Oriented Context-Aware ApplicationsXuansong Li, XianPing Tao, Jian Lu. 174-181 [doi]
- An Adaptive Demodulation Structure for UHF RFID Readers Based on the Phase of Input SignalQing Yang, Jian-Cheng Li, Hong-Yi Wang, Xiang-Hua Zeng. 182-186 [doi]
- Intelligently Creating Contextual Tutorials for GUI ApplicationsGuo Li, Tun Lu, Jiang Yang, Xiaomu Zhou, Xianghua Ding, Ning Gu. 187-196 [doi]
- Super Rack: Reusing the Results of Queries in MapReduce SystemsZhanye Wang, Tao Xu, Dongsheng Wang. 197-204 [doi]
- Flexible Management of Cloud-Connected Digital SignageMohit Sethi, Maria Lijding, Mario Di Francesco, Tuomas Aura. 205-212 [doi]
- Recognition of New and Old Banknotes Based on SMOTE and SVMOu Jin, Lizhao Qu, Jianbiao He, Xi Li. 213-220 [doi]
- Guardian Angel: A Smartphone Based Personal Security System for Emergency AlertingHansong Guo, Liusheng Huang, He Huang, Zehao Sun, Jiade Peng, Zhuolong Yu, Zhenyu Zhu, Hongli Xu, Hengchang Liu. 221-228 [doi]
- Deploying and Evaluating Pufferfish Privacy for Smart Meter DataStephan Kessler, Erik Buchmann, Klemens Böhm. 229-238 [doi]
- HyCPK: Securing Identity Authentication in Ubiquitous ComputingGuangquan Xu, Yan Ren, Gaoxu Zhang, Bin Liu, Xiaohong Li, Zhiyong Feng. 239-246 [doi]
- A Scheme for Activity Trajectory Dataset Publishing with Privacy PreservedXianming Li, Shen Wei, Guangzhong Sun. 247-254 [doi]
- Context-Aware Trust-Based Management of Vehicular Ad-Hoc Networks (VANETs)Vangalur S. Alagar, Kaiyu Wan. 255-261 [doi]
- Intelligent Reconfigurable Gateway for Heterogeneous Wireless Sensor and Actuator NetworksKevin I.-Kai Wang, Diwakar Somu, Tejas Parnerkar, Zoran Salcic. 262-269 [doi]
- Passively Testing Routing Protocols in Wireless Sensor NetworksXiaoping Che, Stephane Maag, Hwee-Xian Tan, Hwee Pink Tan. 270-277 [doi]
- BWMesh: A Multi-hop Connectivity Framework on Android for Proximity ServiceYufeng Wang, Jing Tang, Qun Jin, Jianhua Ma. 278-283 [doi]
- The Bimodal Probability Density Distribution of the Survivability for Wireless Sensor Networks under Random FailuresYan Lv, Wei Huangfu, Zhongshan Zhang. 284-291 [doi]
- WiGroup: A Lightweight Cellular-Assisted Device-to-Device Network Formation FrameworkYufeng Wang, Hongxu Zhang, Chiu Chiang Tan, Xiaojiang Du, Bo Sheng. 292-299 [doi]
- Vista Wearable: Seeing through Whole-Body Touch without ContactEdgardo Molina, Wai L. Khoo, Franklin Palmer, Lei Ai, Tony Ro, Zhigang Zhu. 300-303 [doi]
- On Trajectory Prediction in Indoor Retail Environments for Mobile Advertising Using Selected Self-HistoriesOsama O. Barzaiq, Seng W. Loke, Hongen Lu. 304-307 [doi]
- FRID: Indoor Fine-Grained Real-Time Passive Human Motion DetectionLiangyi Gong, Dapeng Man, Jiguang Lv, Guowei Shen, Wu Yang. 308-311 [doi]
- An Online Approach for Detecting Repackaged Android Applications Based on Multi-user CollaborationQigeng Chen, Jiayu Wang, Yuping Wang. 312-315 [doi]
- Collaborative Bicycle Sensing for Air Pollution on RoadwayXiaofeng Liu, Chaosheng Xiang, Bin Li, Aimin Jiang. 316-319 [doi]
- An Adaptive Memetic Algorithm for Designing Artificial Neural NetworksPengxiao Shan, Weiguo Sheng. 320-323 [doi]
- Mobile Crowd Assisted Navigation for the Visually ImpairedGreg Olmschenk, Christopher Yang, Zhigang Zhu, Hanghang Tong, William H. Seiple. 324-327 [doi]
- Robust Deployment for Data Collecting under Random Node Failures in Wireless Sensor NetworksYan Zhang, Wei Huangfu, Zhongshan Zhang. 328-331 [doi]
- Sparse Multi-target Localization and Tracking in Wireless Sensor NetworkZuoxin Xiahou, Xiaotong Zhang, Jing Ma. 332-335 [doi]
- Multi-class Object Recognition and Segmentation Based on Multi-feature Fusion ModelingJing-Xia Chen, Yan-ning Zhang, Dong-mei Jiang, Fei Li, Jia Xie. 336-339 [doi]
- An Improved WC-RDV Localization Algorithm for WSNsGuozhi Song, Dayuan Tam. 340-343 [doi]
- Multi-link Passive Localization with Low Cost in Wireless Sensor NetworksZhanyong Tang, Jianan Kou, Chao Qu, Tianzhang Xing, XiaoJiang Chen, Dingyi Fang, Ruchen Wang. 344-347 [doi]
- Energy Cost Optimization via Intelligent Cell Breathing in Green Heterogeneous NetworksQiang Yang, Bang Wang, Laurence T. Yang. 348-351 [doi]
- InCamShare: An Automatic Playlist Creator Employs Users' Shared Experience on Mobile DevicesKohei Matsumura, Yasuyuki Sumi. 352-355 [doi]
- Discovering Urban Social Functional Regions Using Taxi TrajectoriesKe-fan, Daqiang Zhang, Yunsheng Wang, Shengjie Zhao. 356-359 [doi]
- strDoctor: Indicate Stroke for Elderly through Body Sensing GameHanchao Yu, Xiaodong Yang, Yiqiang Chen, Junfa Liu. 360-363 [doi]
- Discovering Spatial Contexts for Traffic Flow Prediction with Sparse Representation Based Variable SelectionSu Yang, Shixiong Shi, Xiaobing Hu, Minjie Wang. 364-367 [doi]
- Perception Enhanced Robotic ArmZhenyu Ye, Shugang Wang, Sha Yang, Shijian Li, Gang Pan. 368 [doi]
- The Future of Smart Dressing Mirror: An Open Innovation Concept VideoGuangyu Gao, Chenchen Bai, Wei Zheng, Chi Harold Liu. 369 [doi]
- iPri: Context-Aware Access Control and Privacy Policy RecommendationGuoyun Li, Yaozhi Zhang, Xianqi Yu, Yuqing Sun. 370 [doi]
- Flier Meet: Crowdsensing Enabled Urban Public Information Reposting and SharingHuihui Chen, Wenqian Nan, Bin Guo, Wenle Wu, Zhiwen Yu, Xingshe Zhou. 371-372 [doi]
- Smartworld: A Better WorldGuanqing Liang, Jiannong Cao, Xuefeng Liu. 373-374 [doi]
- Discovering User Connections Using Their Shared Images on Social MediaMing Cheung, James She. 375 [doi]
- Ubiquitous Intelligent Computing in 10 Years VS Chinese KungfuLiantao Ma, Yibo Wang, Junyi Ma, Yuanduo He, Zhaopeng Qiu, Zhengyang Qin, Yasha Wang. 376-377 [doi]
- Exploring the User Response Time of Login Application Based on SOAEDong Wang, Mingquan Zhou, Sajid Ali, Pengbo Zhou, Nighat Saeed, Qiao Liu. 378-385 [doi]
- Fast Processing of Conversion Time Data Flow in Cloud Computing via Weighted FP-Tree Mining AlgorithmsXiao Jun Chen, Jia-Ke. 386-391 [doi]
- An Efficient Dispatch and Decision-Making Model for Taxi-Booking ServiceCheng Qiao, Mingming Lu, Yong Zhang, Kenneth N. Brown. 392-398 [doi]
- A Heuristic Adaptive Threshold Algorithm on IaaS CloudsQingxin Xia, Yuqing Lan, Limin Xiao. 399-406 [doi]
- Semantic Security for E-Health: A Case Study in Enhanced Access ControlYang Lu, Richard O. Sinnott. 407-414 [doi]
- Knowledge-Enhanced Multi-semantic Fusion for Concept Similarity Measurement in Continuous Vector SpaceYuanyuan Cai, Wei Lu, Xiaoping Che, Yuxun Lu. 415-423 [doi]
- Optimizing the Quality of Service for a Publish/Subscribe SystemFusang Zhang, Yuwei Yang, Yuyao Yang, Beihong Jin. 424-431 [doi]
- Management of Unstructured Geological Data Based on HadoopDongqi Wei, Yueqin Zhu. 432-435 [doi]
- Research on Computational Experiment of the Service Operation Strategy in Collaborative ManufacturingXiao Xue, Yan-Min Kou. 436-443 [doi]
- Secure Network Bandwidth Provisioning for Quality of Services (QoS) GuaranteesKaiqi Xiong. 444-451 [doi]
- Towards Trustworthy Integrated Clinical EnvironmentsWenbing Zhao. 452-459 [doi]
- IMSet-SHA3-Tree: The Efficient Data Integrity Verification Based on SHA3 and MSet-XOR-HashFeng Xiao, Cai Luting, Dai Zibin, Li Wei. 460-467 [doi]
- High Spatial Resolution Remote Sensing Data Computing Pattern Based on Feature PrimitivesDongping Ming, Wen Zhou, Tian Tan, Zhanfeng Shen, Jiancheng Luo. 468-475 [doi]
- Survivability Analysis with Border Effects for Power-Aware Mobile Ad Hoc NetworkZhipeng Yi, Tadashi Dohi. 476-483 [doi]
- A Fast Modified DOA Estimation Algorithm with Rotation Array for Vehicle Security in Intelligent Transportation SystemXiaoyu Lan, Liangtian Wan, Guangjie Han, Lei Shu. 484-489 [doi]
- Verification for Security-Relevant Properties and HyperpropertiesTeng Long, Guoqing Yao. 490-497 [doi]
- Predatory Search Strategy Aided Monte Carlo Localization for Cellular NetworksWenwen Liu, Guozhi Song, Jigang Wu. 498-505 [doi]
- 2DMT Contrast Research for Symmetrical Anisotropic and Isotropic BodiesMiao-Xin Yang, Han-Dong Tan, Xiao-Hong Meng. 506-511 [doi]
- A Hybrid Vertex Outlier Detection Method Based on Distributed Representation and Local Outlier FactorZili Li, Li Zeng. 512-516 [doi]
- Addressing Hardware Security Challenges in Internet of Things: Recent Trends and Possible SolutionsSubha Koley, Prasun Ghosal. 517-520 [doi]
- Integrated Real-Time Self-Organized Control for Transmission Interval and Power in Autonomous Clustering of Mobile Ad Hoc NetworksYoshiaki Kakuda, Keita Kobayashi. 521-526 [doi]
- Optimal Power-Aware Design in a Cluster System: Markov Decision Process ApproachHiroyuki Okamura, Satoshi Miyata, Tadashi Dohi. 527-532 [doi]
- Reliability Improvement of Multi-path Routing for Wireless Sensor Networks and Its Application to Wormhole Attack AvoidanceMasayuki Arai. 533-536 [doi]
- Exploring a Uniform Framework for a Mobile Collaborative Work Support PlatformYukikazu Nakamoto. 537-542 [doi]
- An In-Depth Context-Awareness Framework for Pervasive Video CloudWeishan Zhang, Pengcheng Duan, Licheng Chen. 543-549 [doi]
- A Trust-Based Usage Control Scheme for Resource SharingLu Chen, Li-Qiang Zhang, Qing Zhou, Yun Chen. 550-556 [doi]
- Component-Based Framework for Digital Nautical Chart SystemYuyu, Bin Zhao, Honghai Zhu. 557-564 [doi]
- An Automated Aero-Engine Thrust Detecting Method Based on Sound RecognitionTeng Teng, Zhihua Zhao. 565-569 [doi]
- A High-Throughput Processor for Dual-Field Elliptic Curve Cryptography with Power Analysis ResistanceWei Li, Xiaoyang Zeng, Xiao Feng, Zibin Dai. 570-577 [doi]
- The Research on Broadcast Television User Interest Model Based on Principal Component AnalysisXin Wang, Fu Lian Yin, Tian Rui Yang, Jian Bo Liu. 578-581 [doi]
- Designing Wireless Vibration Monitoring System for Petrochemical Units Fault DiagnosisJianfeng Huang, Guohua Chen, Lei Shu, Huahui Lin, Keming Liu. 582-588 [doi]
- A Study on Parallel Computation Based on Forward Modeling and Inversion Algorithm of 2D MagnetotelluricMao Wang, Handong Tan, Changli Yao, Miaoxin Yang, Huan Ma. 589-594 [doi]
- Mobile Surfing Pattern Analysis over Time and Location on a Big Access RecordGengliang Zhu, Hao Sheng, Wenge Rong, Chao Li, Zhang Xiong. 595-602 [doi]
- Parallel Implementation and Performance Comparison of BiCGStab for Massive Sparse Linear System of Equations on GPU LibrariesLiankai Yao, Xiaohui Ji, Shuai Liu, Jiayue Yang. 603-608 [doi]
- A Generic Formulated KID Model for Pragmatic Processing of Data, Information, and KnowledgeAtsushi Sato, Runhe Huang. 609-616 [doi]
- CDS - A Collaborative Dynamic Source Routing Protocol for Wireless Sensor NetworkHui Yang, Chengping Tian, Bin Cheng, Linlin Ci, Zhiming Wang, Minghua Yang. 617-621 [doi]
- Judging Subjective and Objective Sentence Based on 2-POS Subjective ModelsMin Zhao, Taozheng Zhang, Jianping Chai. 622-625 [doi]
- Analyze Login and Certification Time Based on SOA with EIP ArchitectureDong Wang, Mingquan Zhou, Sajid Ali, Pengbo Zhou, Nighat Saeed, Qiao Liu. 626-629 [doi]
- The Urban Villages' Topographic Database System Construction Based on Oracle Map Fusion MiddlewareJianxiong Tang, Yuanrong He, Guihua Liao, Jing Nie. 630-633 [doi]
- A Microblog Data Acquisition Method Based on Follow-Group ModeBeige Li, Yuqing Zhang, Chuanfeng Zhou, Donghui Li. 634-637 [doi]
- A Job-Shop Scheduling Model with Real-Time Feedback for Physical Internet-Based Manufacturing ShopfloorRay Y. Zhong, Chen Xu. 638-641 [doi]
- Improving Near Surface Soil Moisture Retrieval Based on Radiative Transfer ModelXianghua Wang. 642-644 [doi]
- Hot Topics Extraction from Chinese Micro-blog Based on SentenceChuanfeng Zhou, Yuqing Zhang, Beige Li, Donghui Li. 645-648 [doi]
- Big Data Transformation Testing Based on Data Reverse EngineeringDawit G. Tesfagiorgish, Junyi Li. 649-652 [doi]
- A Probabilistic Homomorphic Encryption Algorithm over Integers - Protecting Data Privacy in CloudsJyh-haw Yeh. 653-656 [doi]
- An Application Research of Unbiased Converted Measurement Kalman FilterZongpeng Qu, Yuan Wei. 657-660 [doi]
- Creating Multi-domain Query Plans on Data ServicesXin Chen, Yanbo Han, Yan Wen, Feng Zhang, Wei Liu. 661-664 [doi]
- Research on Evolvable Hardware Based on Population Hybridization Monkey-King Genetic AlgorithmRan Huan-Huan, Pan Xu-Dong, Tian Jun-Lin. 665-668 [doi]
- An Energy Efficient Routing Protocol for Underwater WSNsBeibei Yao, ZhangBing Zhou, Lei Shu, Riliang Xing. 669-672 [doi]
- API Sequences Based Malware Detection for AndroidJiawei Zhu, Zhengang Wu, Zhi Guan, Zhong Chen. 673-676 [doi]
- The Assessment Strategy for Intelligent Algorithms Using Improved Osculating Value MethodXueshi Dong, Wenyong Dong, Yufeng Wang. 677-680 [doi]
- Study on Intelligent Logistics System: Based on Internet of VehiclesDehong Xu, Xufeng Zhang, Qiuchao Deng. 681-685 [doi]
- Efficiently Preserving the Privacy of the Semantic Routing in Named Data NetworkXinghan Jiang, Qiming Huang. 686-689 [doi]
- Food Image Recognition with Convolutional Neural NetworksWeishan Zhang, Dehai Zhao, Wenjuan Gong, Zhongwei Li, Qinghua Lu, Su Yang. 690-693 [doi]
- Enterprise Application Security in Android Devices Using Short Messaging Service under Unified Communication FrameworkSouvik Chowdhury, Prasun Ghosal. 694-697 [doi]
- Large Scale Distributed Information System Emulation Platform Based on Cloud Computing TechnologyDawei Li. 698-704 [doi]
- Application Reliability Evaluation for Tactical Internet Based on OPNETShuo Zhang, Ning Huang, Xiaolei Sun. 705-709 [doi]
- Research on Tasks Satisfaction Type of Intelligent Planning AlgorithmTong Wang, Yiming Bi, Ping Yang, Shimei Zhai. 710-713 [doi]
- Modeling of Rectangular Periodic Impulsive Noise in Low-Voltage Power Line ChannelsJun Ye, Shenggang Huang, Hongliang Sun, Yi Wang. 714-718 [doi]
- CoGA: Extension of GA on Heterogeneous SystemPeng Cheng, Yutong Lu, Tao Gao, Chenxu Wang. 719-725 [doi]
- Improved Chain Calculation for Sub-chain Dependencies in Layered Queueing NetworksLianhua Li, Greg Franks. 726-733 [doi]
- The Analysis of the Electromagnetic Performance of Planar Mesh Reflector Based on the Electrical Contact Model of Metallic JunctionYu-Ru Mao, Yong Jun Xie, Zhen Hua Tian. 734-737 [doi]
- Review of Pitch Control for Variable Speed Wind TurbineMuhammad Hamid Mughal, Li Guojie. 738-744 [doi]
- Scalable Explicit Multicasting on Internet: A Topological-Aware ApproachWen-Kang Jia, Gen-Hen Liu, Yaw-Chung Chen. 745-752 [doi]
- Visual Analysis of Harbor Hydrological Data in MANETCheng Gong, Wei Huangfu, Zhongshan Zhang, Chunjiang Zhang. 753-757 [doi]
- Accuracy Enhanced Distributed Sparse Matrix Solver with Block-Based Pivoting for Large Linear SystemsEsteban Torres, Yul Chu, Jin Hwan Park. 758-763 [doi]
- Fast Parallel Extract-Shift and Parallel Deposit-Shift in General-Purpose ProcessorsWei Li, Zhongxiang Chang, Xiao Feng, Zibin Dai. 764-771 [doi]
- A Trust-Level Based Authorization Model Using Signaling GamesChen Lu, Zhou Qing, Zhang Li-Qiang, Chen Yun. 772-778 [doi]
- Server-Based Bitrate Allocation in Content Delivery NetworkDongyan Zhang, Hui He, Weihua Li. 779-785 [doi]
- Dynamic Resource Pricing and Scalable Cooperation for Mobile Cloud ComputingXumin Huang, Rong Yu, Jiawen Kang, Jiefei Ding, Sabita Maharjan, Stein Gjessing, Yan Zhang 0002. 786-792 [doi]
- Key Technology of Online Auditing Data Stream ProcessingTuo Li, Lei Wang. 793-797 [doi]
- An Integrated Approach for Vehicle Detection and Type RecognitionWeishan Zhang, Licheng Chen, Wenjuan Gong, Zhongwei Li, Qinghua Lu, Su Yang. 798-801 [doi]
- Survey on Air Levitation Conveyors with Possible Scalability PropertiesLi Zhu, Didier El Baz, Huangsheng Ning. 802-807 [doi]
- Design and Application of Wireless Sensor Network Based on Signal Integrity AnalysisChaoxi Chen, Tianyu Zhang, Xiaohui Sun, Hui Zhuang, Quanwei Zhang, Zhongshan Zhang. 808-813 [doi]
- EDAGF: Estimation & Direction Aware Greedy Forwarding for Urban Scenario in Vehicular Ad-Hoc NetworkRaj K. Jaiswal, Jaidhar C. D.. 814-821 [doi]
- Performance Improvement of Visible Light Communication System Using Reed-Solomon CodeQingqing Han, Huimin Lu. 822-825 [doi]
- An Intrusion Detection System Based on HadoopZhiguo Shi, Jianwei An. 826-830 [doi]
- A Cloud Based Framework for Identification of Influential Health Experts from TwitterAssad Abbas, Muhammad Usman Shahid Khan, Mazhar Ali, Samee U. Khan, Laurence T. Yang. 831-838 [doi]
- Optimal Relay Selection and Cooperative Power Allocation in Cognitive Radio NetworksZhonggui Ma, Sha Ban, Wenbo Yan, Yingying Li, Liyu Liu. 839-845 [doi]
- Research on Multicast Congestion ControlHuo Liwen, Jin Yi. 846-850 [doi]
- Local Recovery of Wireless Multihop Infrastructure with the Autonomous Mobile Base StationRui Teng, Huan-Bang Li, Ryu Miura. 851-858 [doi]
- Measurement Reliability Prediction for Passive Wireless Resonant SAW Sensor SystemBoquan Liu. 859-862 [doi]
- Disease Diagnosis Supported by Hierarchical Temporal MemoryYajing Fu, Xi Guo 0001, Yonghong Xie, Dezheng Zhang, Hailing Li. 863-870 [doi]
- Making Tagging Systems Resistant to Tricky Spam AttacksZhou Li, Cong Tang, Jian-bin Hu, Zhong Chen. 871-879 [doi]
- Modeling Network with Topic Model and Triangle MotifXuewen Bian, Kun Zhang. 880-886 [doi]
- Combining Clustering Algorithm with Factorization Machine for Friend Recommendation in Social NetworkYang Zhao, Yang Yang 0004, Zhenqiang Mi, Zenggang Xiong. 887-893 [doi]
- Detecting Crowdsourcing Click Fraud in Search Advertising Based on Clustering AnalysisXu Jiarui, Li Chen. 894-900 [doi]
- Exploring Cloud Monitoring Data Using Search Cluster and Semantic Media WikiSamneet Singh, Yan Liu, Mehran Khan. 901-908 [doi]
- Software Defined Cities: A Novel Paradigm for Smart Cities through IoT CloudsGiovanni Merlino, Dario Bruneo, Francesco Longo, Antonio Puliafito, Salvatore Distefano. 909-916 [doi]
- An Empirical Comparison of Three Ensemble Methods for Medical Data Mining with Apache SparkYiang Hua, Jian Pan, Zhaofeng Yan, Yunwei Qiu. 917-922 [doi]
- Electricity Consumption Analysis and Applications Based on Smart Grid Big DataHaini Qu, Ping Ling, Libo Wu. 923-928 [doi]
- Fast Fine-Grained Air Quality Index Level Prediction Using Random Forest Algorithm on Cluster Computing of SparkChuanting Zhang, Dongfeng Yuan. 929-934 [doi]
- Processing Skyline Groups on Data StreamsAziguli Wulamu, Hailing Li, Xi Guo 0001, Yonghong Xie, Yajing Fu. 935-942 [doi]
- A MapReduce Cluster Deployment Optimization Framework with Geo-distributed DataShanshan Li, Qinghua Lu, Weishan Zhang, Liming Zhu. 943-949 [doi]
- Experiences on a Video Management Cloud Based on HadoopWeishan Zhang, Ning Wang, Qinghua Lu, Su Yang. 950-955 [doi]
- Dynamic Load Balancing Algorithm in CloudShuixia Hao, Dandan Shen. 956-961 [doi]
- Optimizing Data Partition for NoSQL ClusterXiangdong Huang, Jianmin Wang, Yu Zhong, Philip S. Yu. 962-969 [doi]
- Access Control for Cloud ApplicationsXinfeng Ye. 970-977 [doi]
- Inspection of Hidden Dangers Based on Cloud Messaging Push ServiceRuixin Li, Xiong Luo. 978-985 [doi]
- CPN Based Validation on Pervasive Cloud Task MigrationLianzhang Zhu, Yong Wang, Weishan Zhang, Shaochao Tan. 986-990 [doi]
- Formalizing Mobile Cloud Service Migration with Event-BGuoping Zhang, LuXi Zhao, Weishan Zhang, Kuiyi Yang, Shouchao Tan. 991-996 [doi]
- An Improved Genetic-Based Approach to Task Scheduling in Inter-cloud EnvironmentMiao Zhang, Yang Yang, Zhenqiang Mi, Zenggang Xiong. 997-1003 [doi]
- Tourist Service in Natural Scenic Area Based on RFID TechniqueXiaoming He, Qinglu Ma, Yazao Yang. 1004-1007 [doi]
- GACA-VMP: Virtual Machine Placement Scheduling in Cloud Computing Based on Genetic Ant Colony Algorithm ApproachLiang Hong, Yufei Ge. 1008-1015 [doi]
- Toward a Framework in Cloudlet-Based Architecture for a Real-Time Predictional ModelOlivera Kotevska, Ahmed Lbath, Samia Bouzefrane. 1016-1021 [doi]
- Virtual Cloud Bank: Cloud Service Broker for Intermediating Services Based on Semantic Analysis ModelsJoonseok Park, Youngmin An, Keunhyuk Yeom. 1022-1029 [doi]
- Prediction of Hidden Dangers in Mine Production Using Timeliness Managing Extreme Learning Machine for Cloud ServicesXiong Luo, Xiaona Yang, Xiaohui Chang, Cheng Zhang. 1030-1036 [doi]
- Distributed State Monitoring for IaaS Cloud with Continuous Observation SequenceBin Hong, Yazhou Hu, Fuyang Peng, Bo Deng. 1037-1042 [doi]
- Towards a Deep Belief Network-Based Cloud Resource Demanding PredictionWeishan Zhang, Pengcheng Duan. 1043-1048 [doi]
- SDN-Based ARP Attack Detection for Cloud CentersHuan Ma, Hao Ding, Yang Yang 0004, Zhenqiang Mi, Miao Zhang. 1049-1054 [doi]
- Task Scheduling Algorithm Based on PSO in Cloud EnvironmentAnqi Xu, Yang Yang 0004, Zhenqiang Mi, Zenggang Xiong. 1055-1061 [doi]
- Optimizing NoSQL DB on Flash: A Case Study of RocksDBFei Yang, Kun Dou, Siyu Chen, Mengwei Hou, Jeong-Uk Kang, Sangyeun Cho. 1062-1069 [doi]
- Instruction Emulation and OS Supports of a Hybrid Binary Translator for x86 Instruction Set ArchitectureI-Chun Liu, I-Wei Wu, Jean Jyh-Jiun Shann. 1070-1077 [doi]
- Enabling FPGAs in Hyperscale Data CentersJagath Weerasinghe, François Abel, Christoph Hagleitner, Andreas Herkersdorf. 1078-1086 [doi]
- Uniform Resource Identifier Encoded by Base62xZhenxing Liu, Hao Liu, James Hardy, Lu Liu. 1087-1093 [doi]
- Nash Bargaining Game Based Subcarrier Allocation for Physical Layer Security in Orthogonal Frequency Division Multiplexing SystemShuanglin Huang, Jianjun Tan, Jian Xu. 1094-1100 [doi]
- Utilizing Latent Semantic Word Representations for Automated Essay ScoringCancan Jin, Ben He. 1101-1108 [doi]
- A Healthcare System for Detection and Analysis of Daily Activity Based on Wearable Sensor and SmartphoneYinghui Zhou, Dido Vongsa, Yiming Zhou, Zixue Cheng, Lei Jing. 1109-1114 [doi]
- An Improved S-Box of Lightweight Hash Function SPOGENTXiang Wang, Pei Du, Quanneng Shen, Bin Xu, Lin Li, Weike Wang, Tongsheng Xia. 1115-1119 [doi]
- Research on WiFi User Dwell Time DistributionJie Meng, Yihong Hu, Guochu Shou, Zhigang Guo, Junfei Huang. 1120-1126 [doi]
- Mobile Crowdsourcing: Architecture, Applications, and ChallengesYufeng Wang, Xueyu Jia, Qun Jin, Jianhua Ma. 1127-1132 [doi]
- Digital Explosions and Digital ClonesJianhua Ma, Runhe Huang. 1133-1138 [doi]
- Knowledge Diffusion in Complex NetworksYichao Zhang, M. A. Aziz-Alaoui, Cyrille Bertelle, Jihong Guan, Shuigeng Zhou. 1139-1143 [doi]
- Identify Influential Spreaders in Complex Real-World NetworksYing Liu, Ming Tang, Jing Yue, Jie Gong. 1144-1148 [doi]
- Preference and Movement Pattern Similarity-Based Resource Discovery Enhancement Algorithm for Internet of PeopleRu-Long Chen, Zhi-yuan Li, Yong-zhao Zhan, Pan-Pan Wu. 1149-1154 [doi]
- Prediction and Clustering of User Relationship in Social NetworkPeiyuan Sun, Shengli Liu, Nannan Wu, Bo Li, Jianxin Li. 1155-1162 [doi]
- Threshold Factor Track Classification Algorithm Based on Target Motion ModelXiang Wang, Shiyang Chen, Xiaocui Wang, Yang Xu, Rong Zhang, Tao Wang, Bin Xu. 1163-1168 [doi]
- Modeling of Research Topic Evolution Associated with Social Networks of ResearchersWei Liang, Zixian Lu, Qun Jin, Yonghua Xiong, Min Wu. 1169-1174 [doi]
- Future Transport and the Internet of PeopleJames Hardy, Lu Liu. 1175-1180 [doi]
- Emotion Recognition in Speech Using Multi-classification SVMWeishan Zhang, Xin Meng, Zhongwei Li, Qinghua Lu, Shaochao Tan. 1181-1186 [doi]
- Prototyping and Experimental Comparison of IR-UWB Based High Precision Localization TechnologiesJia Wang, Asad Khalid Raja, Zhibo Pang. 1187-1192 [doi]
- Creating Personal 3D Avatar from a Single Depth SensorWenjuan Gong, Zhichao Wang, Weishan Zhang. 1193-1198 [doi]
- Buy4Me: A Delivery System via Mobility Prediction Based on Mobile Crowd SensingYichu Qu, Zhiyong Yu, Xianghan Zheng. 1199-1203 [doi]
- A User-Side Intelligent Energy Decision Making Method Considering Grid-Load Interaction under Smart GridLiuyin, Yinxin Xie, Ting Lei, Fengyu Wang, Xiaofei Zhang. 1204-1209 [doi]
- Identification of Smart Home Potentials in GermanyMarie-Theres Schmid, Marco Pospiech, Carsten Felden. 1210-1215 [doi]
- SASLL: A System Annotating Semantic Label of LocationRuosong Yang, Dianxi Shi, Han Li, Xiaoyun Mo. 1216-1221 [doi]
- Controlling Smart TVs Using Touch Gestures on Mobile DevicesJiaxu Sun, Yongchao Li, Linzhang Wang, Xuandong Li, Xiaoxiao Ma, Jing Xu, Guanling Chen. 1222-1229 [doi]
- Extracting Features for Cardiovascular Disease Classification Based on BallistocardiographyYalong Song, Hongbo Ni, Xingshe Zhou, Weichao Zhao, Tianben Wang. 1230-1235 [doi]
- Real-Time Activity Recognition on Smartphones Using Deep Neural NetworksLicheng Zhang, Xihong Wu, Dingsheng Luo. 1236-1242 [doi]
- Improving Energy Efficiency in M2M Healthcare Systems Using CP-ABE SchemesFrederic Nzanywayingoma, Qiming Huang. 1243-1248 [doi]
- A Data Fusion Scheme for Modified EKF Banks Positioning Algorithm in Mixed LOS/NLOS ConditionsJun Yan, Lenan Wu. 1249-1252 [doi]
- Design of a Wearable Device for Monitoring SpO2 ContinuouslyJunwei Xue, Yueshan Huang, Xin Du, Xiuyong Wu, Kai Wu, Weijie Zeng, Yusheng Xi, Yimin Chen, Yu Zhao. 1253-1257 [doi]
- Anomaly Detection for User Behavior in Wireless Network Based on Cross EntropyChunxiao Zhang, Yihong Hu, Xinning Zhu, Zhigang Guo, Junfei Huang. 1258-1263 [doi]
- Research on E-Learning in College Education: A Model on Personalized Resource Recommendation Based on Learning SituationJinghua Zhang. 1264-1268 [doi]
- Community Detecting Oriented Directed and Weighted Network in Mobile Crowd SensingJian An, Xiaolin Gui, Xin He, Shiwei Tian, Ruobiao Wu, Yu Sun. 1269-1274 [doi]
- The Algorithm of Recognizing and Comprehending Vague Tasks Based on Fuzzy Mathematical TheoryDanfeng Wu, Zhaopeng Qian, Yajing Pang, Panpan Wang. 1275-1281 [doi]
- Towards Service Evaluation and Ranking Model for Cloud Infrastructure SelectionMuhammad Zubair Khan, Usman Qamar. 1282-1287 [doi]
- (C, K)m-Anonymity: A Model to Resist Sub-trajectory Linkage AttacksHui Guo, Jianmin Han, Jianfeng Lu, Hao Peng, Changbin Tang. 1288-1293 [doi]
- A Modified Asynchronous PSO AlgorithmDaxin Tian, Junjie Hu, Haiying Xia, He Liu. 1294-1299 [doi]
- A Modified Particle Swarm Optimization Based on Selective-Dimension Learning ModelXuewen Xia, Ling Gui. 1300-1305 [doi]
- A New Compound Kernel Function for SVMYonghua Mao, Xiaolin Gui, Xingshi He, Ying Guo. 1306-1309 [doi]
- Research on Uncertainty Intelligent Planning AlgorithmTong Wang, Yiming Bi, Ping Yang, Lin Hao. 1310-1313 [doi]
- Cloud Consumer Oriented Utility Model Research in Cloud ComputingXiaoxiong Liu, Ding Zhao, Yunchuan Qin, Zhuo Tang. 1314-1318 [doi]
- A Live Migration Algorithm for Virtual Machine in a Cloud Computing EnvironmentJun Chen, Yunchuan Qin, Yu Ye, Zhuo Tang. 1319-1326 [doi]
- DeDroid: A Mobile Botnet Detection Approach Based on Static AnalysisAhmad Karim, Rosli Salleh, Syed Adeel Ali Shah. 1327-1332 [doi]
- A Text Clustering Algorithm Hybriding Invasive Weed Optimization with K-MeansChunmei Fan, Taohong Zhang, Zhiyong Yang, Li Wang. 1333-1338 [doi]
- Vulnerabilities Scoring Approach for Cloud SaaSZhou Li, Cong Tang, Jianbin Hu, Zhong Chen. 1339-1347 [doi]
- Similarity Based Hot Spot News ClusteringYu Liu, Li Li. 1348-1353 [doi]
- Polarity Searching for MPRM Logic Circuit Based on Improved Adaptive Genetic AlgorithmXiang Wang, Rong Zhang, Weike Wang, Zhenxue He, Lin Li, Quanneng Shen, Li Ruan, Limin Xiao. 1354-1358 [doi]
- Parameters Optimization of Back Propagation Neural Network Based on Memetic Algorithm Coupled with Genetic AlgorithmQiang Li, Xiaotong Zhang, Azzeddine Rigat, Yiping Li. 1359-1364 [doi]
- Research on Network of Networks TheoryHan Jian, Zhi Hai Tao. 1365-1370 [doi]
- ARP Spoofing Based Access Control for DLNA DevicesYong Wu, Xiaoli Zhi. 1371-1376 [doi]
- BER Analysis of BPSK Based Magneto-Inductive Communication System in Clay ChannelQiwei Huang, Xiaotong Zhang, Jing Ma. 1377-1382 [doi]
- The Simulation and Analysis of Image Change with Improved Cellular Automata and Optimization MethodsXueshi Dong, Wenyong Dong, Kang Sheng. 1383-1387 [doi]
- Analysis and Evaluation of Spoofing Effect on GNSS ReceiverXiaofeng Ouyang, Fangling Zeng, Pan Hou, Ruizhi Guo. 1388-1392 [doi]
- Hardware-Assisted Monitoring for Code Security in Embedded SystemXiang Wang, Quanneng Shen, Pei Du, Rong Zhang, Weike Wang, Lin Li, Bin Xu, Huihui Ji. 1393-1396 [doi]
- Optimization of Elliptic Curve Cryptography Resisting Power Attack Scalar Multiplication Algorithm in Security System on ChipXiang Wang, Liping Wang, Yuanchen Bai, Zhenxue He, Tao Wang, Bin Xu, He Zhang, Xiaocui Wang, Cheng Zhou, Weike Wang, Pei Du. 1397-1401 [doi]
- Study on the Residents Tiered Pricing Model after the Sale of Electricity LiberalizationLianxi Sun, Jinliang Wang, Weiwei Yang, Hao Zhang. 1402-1406 [doi]
- Public Sense: Refined Urban Sensing and Public Facility Management with Crowdsourced DataJiafan Zhang, Bin Guo, Huihui Chen, Zhiwen Yu, Jilei Tian, Alvin Chin. 1407-1412 [doi]
- A Cloud Computing Framework for Smarter District Heating SystemsFisnik Dalipi, Sule Yildirim Yayilgan, Alemayehu Gebremedhin. 1413-1416 [doi]
- A Tutorial Survey on Delivery of Service Data in Vehicular Ad-Hoc NetworksZongtao Duan, Yiqun Yan, Lei Tang, Xinxin Chen, Na An, Zhiliang Kou. 1417-1424 [doi]
- Design Concept Evaluation Based on Rough Number and Information Entropy TheoryJie Hu, Guo-niu Zhu, Jin Qi, Ying-hong Peng, Xiaohong Peng. 1425-1431 [doi]
- From Complex Event Processing to Cognitive Event Processing: Approaches, Challenges, and OpportunitiesJun Yang, Meng Ma, Ping Wang, Ling Liu. 1432-1438 [doi]
- On the Memory Wall and Performance of Symmetric Sparse Matrix Vector Multiplications In Different Data Structures on Shared Memory MachinesTongxiang Gu, Xingping Liu, Zeyao Mo, Xiaowen Xu, Shengxin Zhu. 1439-1444 [doi]
- A Fast Computing Algorithm on Optimal Energy Efficiency in Two-Way OFDM Relay SystemTiantian Yu, Yanliang Jin, Xiaoshuai Zhang, Bin Yao. 1445-1450 [doi]
- Instruction-Level Instantaneous Power Modeling for VLIW ProcessorLichao Zhang, Xuetao Wu, Yiqiang Zhao. 1451-1456 [doi]
- Application of PETSc in the Linear Solver of OpenFOAMZhongyuan Guo, Liyang Xu, Hao Li, Chao Li, Qian Wang, Xinhai Xu. 1457-1460 [doi]
- Application of Cache in P2P SystemsDecheng Qiu, Shuxun Wang, Deqi Xu. 1461-1465 [doi]
- A Novel Tunable Microwave Photonic Band-Pass Filter Based on Chirped Fiber Bragg GratingsQian Liu, Yongtao Li. 1466-1471 [doi]
- Research on the High Penetration Alerting of GMRXia Mao, Kai Chen, Tian-Peng Shi. 1472-1474 [doi]
- Design and Implementation of Cloud Server Remote Management System Based on IMPI ProtocolHongsong Chen, Xiaomei Wang. 1475-1478 [doi]
- The Symptoms and Pathogenesis Entity Recognition of TCM Medical Records Based on CRFHonglan Liu, Xiaona Qin, Bin Fu. 1479-1484 [doi]
- Towards Continuous Certification of Infrastructure-as-a-Service Using Low-Level MetricsPhilipp Stephanow, Niels Fallenbeck. 1485-1492 [doi]
- Detection Changes and Trends in China's Humanity & Social Field by Co-word Analysis: A Case Study on Huang ZongxiMo Chen, Honghe Liu. 1493-1497 [doi]
- Adaptive Dynamic Programming for Multi-Point Scheduling in Energy Harvesting Wireless Sensor NetworksWendong Xiao, Fen Liu, Junjie Zhang. 1498-1502 [doi]
- A New Corrugated Horn with High Gain and Low Side LobeZhen Hua Tian, Yong Jun Xie, Yu-Ru Mao. 1503-1507 [doi]
- Hypergraph Modeling Scheme with Joint Contact Schedule and Prioritized Data Traffic Constraint for Opportunistic Internet of VehiclesLong Zhang, Xinxin Zhang, Qiwu Wu. 1508-1513 [doi]
- Research on Architecture On-Demands for Data Intensive Geoscience ProductWanfeng Zhang, Shengyang Li, Lingjun Zhao. 1514-1519 [doi]
- A Novel Sparse Representation Classification Face Recognition Based on Deep LearningJun-Ying Zeng, Yikui Zhai, Jun-ying Gan. 1520-1523 [doi]
- A Real-Time Face Recognition System Based on IP Camera and Image Sets AlgorithmJun-ying Gan, Xiaolin Wang, Yikui Zhai. 1524-1528 [doi]
- Sparse Autoencoder for Facial Expression RecognitionBinbin Huang, Zilu Ying. 1529-1532 [doi]
- Imbalanced Data Classification Based on a Hybrid Resampling SVM MethodLu Cao, Yikui Zhai. 1533-1536 [doi]
- Fast 3D Measurement Based on Colored Structured Light ProjectionBing Luo, Guiping Guo. 1537-1540 [doi]
- Fourier Transform of Two Component Quasi-Periodic Optical SuperlatticenDong Huang, XiaoJie Liang. 1541-1544 [doi]
- Tunable Plasmon-Induced Transparency in Plasmonic Bus Waveguide with Side-Coupled Nano-cylinder CavityDongzhou Zhong. 1545-1547 [doi]
- Research on a New Power Supply for ElectroplatingYihong He, Shuiyong Yu, Fangguo Li. 1548-1550 [doi]
- Auxiliary Antenna for Spatial Modulation with Space-Time Block CodeZhihua Yang, Zekai Fang, Yuxia Chen, Xiaolu Zhang. 1551-1553 [doi]
- An Analytical Method of Inter-harmonic DetectionYihong He, Fangguo Li. 1554-1557 [doi]
- A Survey and Application of Indoor Positioning Based on Scene Classification OptimizationJian Sun, Yongling Fu, Lin Tan, Shengguang Li. 1558-1562 [doi]
- A Weak Password Cracker of UHF RFID TagsZhentao Zhao, Shufang Li, Yang Kang, Jiankai Li, Shengguang Li, Weijun Hong. 1563-1566 [doi]
- The Application of Data Mining Technology for the Judgment of Poisoning CasesJiong Wang, Yunfeng Zhang, Fanglin Wang, Bin Gao. 1567-1571 [doi]
- High Quality Face Image Acquisition with Multi-camerasShiwei Zhao, Yueming Wang, Rucai Zhang, Hui Zhang. 1572-1576 [doi]
- Analysis for Large Passenger Flow Area and Monitoring TechnologyShengguang Li, Lin Tan, Shiewei Zhao, Qianli Zhou. 1577-1581 [doi]
- Research on the Bistatic Scattering Characteristic of Metal SphereMing Lyu, Yingnan Zhang, Yang Wu, Guangtian Li. 1582-1585 [doi]
- Analysis of Design and Manufacturing Process of Compact Range Reflector PanelYan Wang, Huanqing Wang, Yingnan Zhang, Xin Sun 0003. 1586-1590 [doi]
- The Design of Multi-bandpass FSSHuanqing Wang, Xin Sun, Wei He, Yuwei Wang, Yan Wang. 1591-1596 [doi]
- Preparation and Electromagnetic Characteristics of Flake Shaped Carbonyl Iron-Zinc Oxide NanocompositesXin Sun, Huanqing Wang, Zengming Chao, Lianping Zhang, Yan Wang, Yuping He, Jianping He. 1597-1602 [doi]
- A Method of PRF-Ambiguity Resolution Based on Range Frequency DomainZhiming Xu, Yongge Lu, Jingping Yao. 1603-1606 [doi]
- Extended Modified Equivalent Current Approximation Method for Pure or Low Lossy Dielectric ObjectsLei Zhang, Zhaoguo Hou, Chao Wang, Hong-Cheng Yin. 1607-1610 [doi]
- An Evaluation Method of SAR Images Based on Kullback-Leiber DivergenceLiping Hu, Chao Wang. 1611-1616 [doi]
- Radar Target Precession Feature Extraction Based on Multi-view FusionChuanzi Tang, Hongmei Ren, Zhihe Xiao, Xiaohong Wang. 1617-1620 [doi]
- High Frequency RCS Representation of Trihedral Corner Reflectors with Scalene Triangle ApertureZhefu Zhou, Hua Yan, Hongcheng Yin. 1621-1625 [doi]
- Highly Birefringent Octagonal Photonic Crystal FibersShao-Hua Zhang, Jin-Hai Sun, He Cai, Xu-Tao Zhang. 1626-1630 [doi]
- A Study of Privacy Improvement Using a Randomized Blind Signature Scheme in Vehicular NetworksZhe Liu, Jianwei Liu. 1631-1637 [doi]
- YPAP: The Yoking-Proofs Based Authentication Protocol for Wearable Devices in Wireless CommunicationsHong Liu, Rui Yu, Yueliang Wan. 1638-1643 [doi]
- RFID System Mutual Authentication Protocols Based on ECCLi Feng, Xuanxia Yao. 1644-1649 [doi]
- A Survey on the Integrity Checking of Outsourced Data in Cloud ComputingHaichun Zhao, Xuefeng Zheng. 1650-1656 [doi]
- The Vehicle Terminal Based on GPRS & CDMA CommunicationWang Jian, Hu Ya. 1657-1660 [doi]
- An Evaluation Model for Epidemic Routing in VANETsDaxin Tian, Yue Yang, Haiying Xia, Guohui Zhang. 1661-1664 [doi]
- Cause Analysis of Traffic Accidents Based on Degrees of Attribute Importance of Rough SetGang Tao, Huan-Sheng Song, Yong-Gang Yan, Mohsen Jafari. 1665-1669 [doi]
- Optimizing RSUs Network against Cascading FailureWenzhong Tang, Xiongyu Shan, Daxin Tian, Zhengguo Sheng, Haiying Xia. 1670-1675 [doi]
- A Novel Approach for Decision Support in Uncertain Environments: The Case of Identifying Similar News Tickers in Natural Gas TradingSusann Dreikorn, Carsten Felden, Marco Pospiech, Claudia Koschtial. 1676-1681 [doi]
- Design and Implementation of Scalable QoS Policy Management SystemWentao Xie, Xiaomei Chen, Dandan Li. 1682-1685 [doi]
- A Distributed Hybrid Recommendation Framework to Address the New-User Cold-Start ProblemJenq-Haur Wang, Yi-Hao Chen. 1686-1691 [doi]
- Fall Detection Using Plantar Inclinometer SensorJianfei Sun, Zumin Wang, Bingnan Pei, Shuai Tao, Liming Chen. 1692-1697 [doi]
- Using Self-Histories to Predict Store Visits in Indoor Retail Environments for Mobile Advertising: A Ranked-Based TechniqueOsama O. Barzaiq, Seng W. Loke. 1698-1705 [doi]
- A Bioinspired Feature-Projection-Based Approach to Electromyographic Pattern Recognition Based for High Dimensional Sparse Sensor DataGiovanni Schiboni, Peidong Liang, Chenguang Yang, Liming Chen, Sanja Dogramadzi. 1706-1711 [doi]
- Pervasive Healthcare Monitoring SystemMario Nava Perez, Francisco J. Alvarez Mata, Victor M. Zamudio Rodriguez, Shumei Zhang. 1712-1716 [doi]
- Device-Free Passive Human Detection Using Wi-Fi Technology: Current State and Future TrendQiang Lin, Yuan Yue. 1717-1723 [doi]
- Towards Knowledge Driven Decision Support for Personalized Home-Based Self-Management of Chronic DiseasesJun Qi, Liming Chen, Wolfgang Leister, Shengxiang Yang. 1724-1729 [doi]
- Unsupervised Human Activity Segmentation Applying Smartphone Sensor for HealthcareYin Ling, Heng Wang. 1730-1734 [doi]
- Predicting Dropout-Prone Students in E-Learning Education SystemM. Ali Akber Dewan, Fuhua Lin, Dunwei Wen, Kinshuk. 1735-1740 [doi]
- Open Learning Platform Based on Personal and Social Analytics for Individualized Learning SupportXiaokang Zhou, Bo Wu, Qun Jin. 1741-1745 [doi]
- Task Coordination Mechanism Based on Softman Group in the Syncretic SystemDanfeng Wu, Yajing Pang, Zhaopeng Qian, Qingchuan Zhang. 1746-1752 [doi]
- A Wakeup Adapting Traffic and Receiver-Initiated Duty Cycle Protocol for WSNRen Duan, Dingyi Fang, XiaoJiang Chen. 1753-1759 [doi]
- An Improved Collaborative Filtering Based on a Weighted Network and Triadic ClosureWangpeng Zhan, Qing Li. 1760-1763 [doi]
- Application Research of Ternary Optical Computer on Gaussian EliminationQun Xu, Chao Xu. 1764-1768 [doi]
- Research on Excellent Sequence of Period p^n over GF(q) with Genetic AlgorithmZhihua Niu, Ling Ye, Qinqin Li. 1769-1773 [doi]
- An Event Ontology Description Framework Based on SKOSYujia Zhang, Wei Liu, Ning Ding, Xu Wang, Yue Tan. 1774-1779 [doi]
- Query of Uncertain QoS of Web ServiceMengting Shen, Fangfang Liu. 1780-1785 [doi]
- Multiple User Characteristic Models for Online Survey Based on FP-Tree AlgorithmKaiqiang Guo, Shaochun Wu, Guobing Zou, Honghao Zhu. 1786-1791 [doi]
- Online Survey Prediction Model for High Response Rate via Decision TreeNaibin Luo, Shaochun Wu, Guobing Zou, Xiang Shuai. 1792-1797 [doi]
- Effective User Recommendation Model for Online Survey via BP Neural NetworkHonghao Zhu, Shaochun Wu, Guobing Zou, Naibin Luo. 1798-1802 [doi]
- Analysis of MPICH Communication Interface and Optimization of Data Partitioning in Matrix CalculationXue Chen, Yongmei Lei. 1803-1808 [doi]
- Transformation of an E-R Model into HBase Tables: A Data Store Design for IHE-XDS Document RegistryYan Hou, Shizhong Yuan, Weimin Xu, Daming Wei. 1809-1812 [doi]
- Efficient Frequency and Duty Cycle Control Method for Fast Pulse-Charging of Distributed Battery Packs by Sharing Cell StatusMeng Di Yin, Jiae Youn, Daejin Park, Jeonghun Cho. 1813-1818 [doi]
- Big Data Analytical Architecture Using Divide-and-Conquer Approach in Machine-to-Machine CommunicationAwais Ahmad, Anand Paul, M. Mazhar Rathore, Seungmin Rho. 1819-1824 [doi]
- Priority SDN Controlled Integrated Wireless and Powerline Wired for Smart-Home Internet of ThingsAndrew Mckeown, Habib Rashvand, Tony Wilcox, Paul Thomas. 1825-1830 [doi]
- A Study on Hash Chain-Based Hadoop Security SchemeYoung-Ae Jung, Si-Jae Woo, Sang-Soo Yeo. 1831-1835 [doi]
- Path-Loss Based Power Efficient Relay Networking for WCE in Body Area NetworksDan Liu, Mingda Zhou, Yishuang Geng, Kaveh Pahlavan. 1836-1841 [doi]
- Direction Estimation Error Model of Embedded Magnetometer in Indoor Navigation EnvironmentGuanxiong Liu, Yishuang Geng, Kaveh Pahlavan. 1842-1846 [doi]
- Ultrasound Ranging Method Based on Network-Level SynchronizationXiaofeng You, Xiaotong Zhang, Jie He, Fuqiang Ma. 1847-1852 [doi]
- CRLB for TOA Based Near-Ground Swarm Robotic LocalizationZhishuai Han, Jie He, Yishuang Geng, Cheng Xu, Liyuan Xu, Shihong Duan. 1853-1858 [doi]
- A Ray-Tracing Based Fingerprinting for Indoor PositioningTsai-Mau Wang, Po-Hsuan Tseng, Yao-Chia Chan, Ding-Bing Lin. 1859-1863 [doi]
- An Object Reconstruction Algorithm for Moving Vehicle Detection Based on Three-Frame DifferencingLin Yao, Fang Ma, Shihong Duan. 1864-1868 [doi]