Abstract is missing.
- The Design Principle of the Robust Communication System under the Great Disaster EnvironmentShoichi Noguchi. 1-4 [doi]
- High Performance Database ProcessingDavid Taniar. 5-6 [doi]
- Data Replication and Synchronization in P2P Collaborative SystemsFatos Xhafa. 7 [doi]
- Malicioius Software Detection Using Multiple Sequence Alignment and Data MiningYi Chen, Ajit Narayanan, Shaoning Pang, Ban Tao. 8-14 [doi]
- Elastic Application Container: A Lightweight Approach for Cloud Resource ProvisioningSijin He, Li Guo, Yike Guo, Chao Wu, Moustafa Ghanem, Rui Han. 15-22 [doi]
- ADEC: Assured Deletion and Verifiable Version Control for Cloud StorageShin Tezuka, Ryuya Uda, Ken-ichi Okada. 23-30 [doi]
- A Distributed Service Framework for Integrating Robots with Internet ServicesSachiko Nakagawa, Naoto Ohyama, Kazuaki Sakaguchi, Hisashi Nakayama, Noboru Igarashi, Ryota Tsunoda, Shogo Shimizu, Masahiko Narita, Yuka Kato. 31-37 [doi]
- A Rate Adaptive Admission Control Protocol for Multimedia Wireless Mesh NetworksSanjay Kumar Dhurandher, Isaac Woungang, Kirti Kumar, Mamta Joshi, Monika Verma. 38-43 [doi]
- Dynamic Link Quality Aware Routing Protocol for Multi-radio Wireless Mesh NetworksByoungheon Shin, Seon-Yeong Han, Dongman Lee. 44-50 [doi]
- Energy-Aware Link Scheduling Algorithms to Maximize Life Cycle of Relay Nodes on IEEE 802.16e Mesh NetworksChien-Yu Wu, Hann-Jang Ho, Sing-Ling Lee, Shu-Jye Chang. 51-58 [doi]
- Analysis and Countermeasure for Wormhole Attacks in Wireless Mesh Networks on a Real TestbedJie Zhou, Jiannong Cao, Jun Zhang, Chisheng Zhang, Yao Yu. 59-66 [doi]
- Design and Implementation of Mesh RAID with Multiple Parities in Virtual Large-Scale DisksMinoru Uehara. 67-72 [doi]
- Implementing Virtual Machine Replication: A Case Study Using Xen and KVMDarko Petrovic, André Schiper. 73-80 [doi]
- A Diversity-Based Approach for Managing Faults in Web ServicesHanane Abdeldjelil, Noura Faci, Zakaria Maamar, Djamal Benslimane. 81-88 [doi]
- A Large Scale Robust Disaster Information System Based on Never Die NetworkNoriki Uchida, Kazuo Takahata, Yoshitaka Shibata, Norio Shiratori. 89-96 [doi]
- The Proactive Member-Centric Routing Protocol Using the Several Strategy (PMCS) for the Fleet Scenario in the Hybrid VANETChung-Ming Huang, Tzu-Hua Lin, Cheng-Hsiu Chang. 97-104 [doi]
- Abiding Regional Data Distribution Using Relay and Random Network Coding on VANETsNaruhiro Kusumine, Susumu Ishihara. 105-112 [doi]
- Optimal Phase Ordering of Traffic Signals to Reduce Stopped DelayJason Barnes, Vamsi Paruchuri. 113-119 [doi]
- Energy-Efficient Update Protocols for Mobile User ContextStefan Föll, Klaus Herrmann, Kurt Rothermel. 120-127 [doi]
- TARS: An Energy-Efficient Routing Scheme for Wireless Sensor Networks with Mobile Sinks and TargetsYuan-Po Chi, Hsung-Pin Chang. 128-135 [doi]
- PSense: Reducing Energy Consumption in Public Sensing SystemsPatrick Baier, Frank Dürr, Kurt Rothermel. 136-143 [doi]
- Reliable Energy Aware Multi-token Based MAC Protocol for WSNSubhasis Dash, Amulya Ratna Swain, Anuja Ajay. 144-151 [doi]
- On-demand Data Numerosity Reduction for Learning ArtifactsKhamisi Kalegele, Hideyuki Takahashi, Johan Sveholm, Kazuto Sasai, Gen Kitagata, Tetsuo Kinoshita. 152-159 [doi]
- Fuzzy-Based Actuators Controlling for Minimizing Power Consumption in Cyber-physical SystemSheng-Tzong Cheng, Ju-Hsien Chou. 160-166 [doi]
- Combination of Multiple Retrieval Systems Using Rank-Score Function and Cognitive DiversityHongzhi Liu, Zhonghai Wu, D. Frank Hsu. 167-174 [doi]
- MIXED-LSH: Reduction of Remote Accesses in Distributed Locality-Sensitive Hashing Based on L1-distanceHisashi Koga, Masayuki Oguri, Toshinori Watanabe. 175-182 [doi]
- Auto Determining Parameters in Class-Association MiningViet Phan Luong. 183-190 [doi]
- Recommendation of More Interests Based on Collaborative FilteringQian Wu, Feilong Tang, Li Li 0012, Leonard Barolli, Ilsun You, Yi Luo, Huakang Li. 191-198 [doi]
- An Interactive Region-Based Filter for Moving Objects Datasets: Making Sense of ChaosJason Thompson, J. Wenny Rahayu, Torab Torabi. 199-206 [doi]
- A Channel Quality Aware Algorithm for IEEE 802.16 Uplink Burst ConstructionYuan-Cheng Lai, Yen Hung Chen, Ching-Neng Lai. 207-214 [doi]
- Utilization-based Congestion Control: Improvement of Friendliness with TCP over Wireless LinksSatoshi Utsumi, Salahuddin Muhammad Salim Zabir. 215-220 [doi]
- A Bandwidth Negotiation Scheduling for Prioritized Traffic in MMR NetworksYan-Jing Wu, Tsang-Ling Sheu, I.-Chieh Lin. 221-228 [doi]
- A New Loss Recovery Algorithm for Increasing the Performance of TCP Over Wireless Mesh NetworksPrasanthi Sreekumari, Sang-Hwa Chung, Yong-hyun Jo. 229-236 [doi]
- Uncertain Low Penetration Rate - A Practical Issue in Mobile Intelligent Transportation SystemsQuang Tran Minh, Muhammad Ariff Baharudin, Eiji Kamioka. 237-244 [doi]
- How Does Mobile Context Affect People's Web Search Behavior?: A Diary Study of Mobile Information Needs and Search BehaviorsDaijiro Komaki, Takahiro Hara, Shojiro Nishio. 245-252 [doi]
- On Co-scheduling of Periodic Update and Application Transactions with Fixed Priority Assignment for Real-Time MonitoringJiantao Wang, Kam-yiu Lam, Song Han, Sang Hyuk Son, Aloysius K. Mok. 253-260 [doi]
- A Wireless LAN Location Estimation System Using Center of Gravity as an Algorithm Selector for Enhancing Location EstimationQuan Jia Cheng, Joseph Kee-Yin Ng, Kevin Chin Yiu Shum. 261-268 [doi]
- A Quantum Genetic Algorithm for Operon PredictionLi-Yeh Chuang, Cheng-Yi Chiang, Cheng-Hong Yang. 269-275 [doi]
- Layer Partitioned Search Tree for Packet ClassificationYeim-Kuan Chang, Chao-Yen Chien. 276-282 [doi]
- Chaos Embedded Particle Swarm Optimization for Tag Single Nucleotide Polymorphism SelectionLi-Yeh Chuang, Li-Wei Huang, Cheng-Hong Yang. 283-288 [doi]
- Mixed Observability Markov Decision Processes for Overall Network Performance Optimization in Wireless Sensor NetworksDaniel L. Kovacs, Wuyungerile Li, Naoki Fukuta, Takashi Watanabe. 289-298 [doi]
- Evaluation of Genetic Algorithms for Single Ground Station Scheduling ProblemFatos Xhafa, Junzi Sun, Admir Barolli, Makoto Takizawa, Kazunori Uchida. 299-306 [doi]
- Upload Cache in Edge NetworksYuncheng Zhu, Akihiro Nakao. 307-313 [doi]
- Temporary Call-Back Telephone Number ServiceMing-Feng Chang, Chi-Hua Chen. 314-318 [doi]
- An Architecture for Heterogeneous Data Dissemination Using IMSRaymond Peterkin, Dan Ionescu. 319-325 [doi]
- Trying to Unify the LL/SC Synchronization Primitive and the Notion of a Timed RegisterDamien Imbs, Michel Raynal. 326-330 [doi]
- Experimental Evaluation of Alkaline Batteries's Capacity for Low Power Consuming ApplicationsKonstantin Mikhaylov, Jouni Tervonen. 331-337 [doi]
- Time-Dependent Execution PatternMarkus Aleksy, Axel Korthaus. 338-343 [doi]
- Realizing Global Synchronizations for Locally-Connected Two-Dimensional Rectangle Cellular ArraysHiroshi Umeo. 344-351 [doi]
- A Semantic Framework for the Management of Enriched Provenance LogsMohamed Amin Sakka, Bruno Defude, Jorge Tellez. 352-359 [doi]
- Goal-Based Policies for Self-Protecting SystemsJulian Schütte. 360-367 [doi]
- Semantic Uplift of Monitoring Data to Select Policies to Manage Home Area NetworksAnnie Ibrahim Rana, Brendan Jennings. 368-375 [doi]
- Semantics-Aware Storage and Replication of Trust Metadata in Mobile Ad-hoc NetworksVivek Natarajan, Sencun Zhu, Mudhakar Srivatsa, Jeff Opper. 376-383 [doi]
- Evaluation of a MANET Testbed in Outdoor Bridge Environment Using BATMAN Routing ProtocolElis Kulla, Makoto Ikeda, Tetsuya Oda, Leonard Barolli, Fatos Xhafa, Aleksander Biberaj. 384-390 [doi]
- Efficient Route Discovery and Repair in Mobile Ad-hoc NetworksPo-Jen Chuang, Po-Hsun Yen, Ting-Yi Chu. 391-398 [doi]
- A Node-Disjoint Multipath Routing Method Based on AODV Protocol for MANETsChhagan Lal, Vijay Laxmi, Manoj Singh Gaur. 399-405 [doi]
- Assessing the Expected Performance of the OLSR Routing Protocol for Denser Urban Core Ad Hoc Network DeploymentsDeepali Arora, Eamon Millman, Stephen W. Neville. 406-414 [doi]
- File Management in a Mobile DHT-based P2P EnvironmentKhalid Ashraf, Rachid Anane, Behzad Bordbar. 415-422 [doi]
- Collaborative Admission Control Scheme for Group-Based P2P Contents Sharing SystemsKazuma Kadowaki, Satoshi Fujita. 423-430 [doi]
- On Randomness in ISP-friendly P2P ApplicationsS. M. Saif Shams, Paal E. Engelstad, Amund Kvalbein. 431-437 [doi]
- Optimized Range Queries for Large Scale NetworksNicolas Hidalgo, Erika Rosas, Luciana Arantes, Olivier Marin, Pierre Sens, Xavier Bonnaire. 438-445 [doi]
- A Scalable WSN Based Data Center Monitoring Solution with Probabilistic Event PredictionSunil Kumar Vuppala, Animikh Ghosh, Ketan A. Patil, Kumar Padmanabh. 446-453 [doi]
- Effect of Population Size for Node Placement in WMNs Considering Giant Component and Number of Covered Users ParametersTetsuya Oda, Admir Barolli, Evjola Spaho, Fatos Xhafa, Leonard Barolli, Makoto Takizawa, Kazunori Uchida. 454-459 [doi]
- Reliable Wildfire Monitoring with Sparsely Deployed Wireless Sensor NetworksIkjune Yoon, Dong Kun Noh, Dongeun Lee, Rony Teguh, Toshihisa Honma, Heonshik Shin. 460-466 [doi]
- Zero Scanning Time for 802.11 Networks by Using Media Independent Information Server (MIIS)Muhammad Qasim Khan, Steinar Hidle Andresen. 467-473 [doi]
- Channel Orthogonalization (CO) and its Combination with THP (CO-THP) for Multiuser MIMO SystemsLiang Zhou, Xiaohui Li, YongQiang Hei, Weiyi Yin. 474-478 [doi]
- MOS-based Handover Protocol for Next Generation Wireless NetworksSheetal Jadhav, Haibo Zhang 0001, Zhiyi Huang 0001. 479-486 [doi]
- Evaluations of Ant Colony Optimization Inspired SCTP Optimal Path Selection Using E-modelMuhammad Ariff Baharudin, Quang Tran Minh, Eiji Kamioka. 487-494 [doi]
- A Differential Game Approach to Mitigating Primary User Emulation Attacks in Cognitive Radio NetworksDong Hao, Kouichi Sakurai. 495-502 [doi]
- Personalizing EigenTrust in the Face of Communities and Centrality AttackNitin Chiluka, Nazareno Andrade, Dimitra Gkorou, Johan A. Pouwelse. 503-510 [doi]
- Uncertainty in Probabilistic Trust ModelsSadegh Dorri Nogoorani, Rasool Jalili. 511-517 [doi]
- Trust-Based Security for Community-Based Cognitive Radio NetworksSazia Parvin, Farookh Khadeer Hussain. 518-525 [doi]
- Clock Skew Based Client Device Identification in Cloud EnvironmentsDing-Jie Huang, Kai-Ting Yang, Chien-Chun Ni, Wei-Chung Teng, Tien-Ruey Hsiang, Yuh-Jye Lee. 526-533 [doi]
- ScaleStar: Budget Conscious Scheduling Precedence-Constrained Many-task Workflow Applications in CloudLingfang Zeng, Bharadwaj Veeravalli, Xiaorong Li. 534-541 [doi]
- Reliable Provisioning of Spot Instances for Compute-intensive ApplicationsWilliam Voorsluys, Rajkumar Buyya. 542-549 [doi]
- Lightweight Application-Level Task Migration for Mobile Cloud ComputingRicky K. K. Ma, Cho-Li Wang. 550-557 [doi]
- Multi-retransmission Route Discovery Schemes for Ad Hoc Wireless Networks with a Realistic Physical LayerXiangyang Jin, Thomas Kunz, Ivan Stojmenovic. 558-565 [doi]
- On Multicast Routing with Traffic Grooming in Light-Trail NetworksChing-Fang Hsu, Tzu-Huan Tang. 566-572 [doi]
- PC-based Router Virtualization with Hardware SupportMuhammad Siraj Rathore, Markus Hidell, Peter Sjödin. 573-580 [doi]
- AMIR: Another Multipath Interdomain RoutingDonghong Qin, Jiahai Yang, Zhuolin Liu, Hui Wang, Bin Zhang 0016, Wei Zhang. 581-588 [doi]
- Run-time Revenue Maximization for Composite Web Services with Response Time CommitmentsMiroslav Zivkovic, Joost W. Bosman, Hans van den Berg, Rob van der Mei, Hendrik B. Meeuwissen, Rudesindo Núñez-Queija. 589-596 [doi]
- Completable Quorums of Multimedia ObjectsTadateru Ohkawara, Ailixier Aikebaier, Tomoya Enokido, Makoto Takizawa. 597-604 [doi]
- DEMODS: A Description Model for Data-as-a-ServiceQuang Hieu Vu, Tran Vu Pham, Hong Linh Truong, Schahram Dustdar, Rasool Asal. 605-612 [doi]
- Applying Particle Swarm Optimization to Quality-of-Service-Driven Web Service CompositionSimone A. Ludwig. 613-620 [doi]
- Impact of Multi-flow Traffic in Wireless Mobile Ad-hoc NetworksMakoto Ikeda, Elis Kulla, Masahiro Hiyama, Leonard Barolli, Makoto Takizawa. 621-628 [doi]
- Performance Comparison of DSDV and DYMO Protocols for Vehicular Ad Hoc NetworksEvjola Spaho, Makoto Ikeda, Leonard Barolli, Fatos Xhafa, Aleksander Biberaj, Jiro Iwashige. 629-634 [doi]
- Shortcut Anycast Tree Routing in MANETsShyr-Kuen Chen, Pi-Chung Wang. 635-640 [doi]
- Proportionally Quasi-fair Scheduling Optimization in Wireless Ad Hoc NetworksDang-Quang Bui, Won-Joo Hwang. 641-648 [doi]
- Video Editing Using Motion InpaintingJoseph C. Tsai, Timothy K. Shih, Kanoksak Wattanachote, Kuan-Ching Li. 649-654 [doi]
- Evaluating Quality of Health Information SourcesLeila Weitzel, Paulo Quaresma, José Palazzo M. de Oliveira. 655-662 [doi]
- Instruction for Remote MR Cooperative Work with Captured Still Worker's View VideoMakoto Kikkawa, Ginga Kamei, Ken-ichi Okada. 663-670 [doi]
- A Tangible Information Explorer Using Vibratory Touch ScreenHiroaki Nishino, Yuki Fukakusa, Akari Hatano, Tsuneo Kagawa, Kouichi Utsumiya. 671-677 [doi]
- Robust Mobile Device Integration of a Fingerprint Biometric Remote Authentication SchemeToan-Thinh Truong, Minh Tran, Anh Duc Duong. 678-685 [doi]
- Compositional Logic for Proof of Correctness of Proposed UDT Security MechanismsDanilo Valeros Bernardo, Doan B. Hoang. 686-694 [doi]
- An Efficient FPGA Design of PingPong-128 Stream Cipher for Secure ComputingAmlan Jyoti Choudhury, Hyotaek Lim, Hoon Jae Lee. 695-700 [doi]
- Efficient and Secure Cross-Realm Client-to-Client Password-Authenticated Key ExchangePo-Jen Chuang, Yi-Ping Liao. 701-708 [doi]
- Investigation of Packet Loss in Mobile WSNs for AODV Protocol and Different Radio ModelsTao Yang, Tetsuya Oda, Leonard Barolli, Jiro Iwashige, Arjan Durresi, Fatos Xhafa. 709-715 [doi]
- Analysis of Field Intensity Distribution in Inhomogeneous Propagation EnvironmentJunichi Honda, Kazunori Uchida. 716-723 [doi]
- An Algorithm for Jammer Localization in Wireless Sensor NetworksTianzhen Cheng, Ping Li, Sencun Zhu. 724-731 [doi]
- Is RSSI a Good Choice for Localization in Wireless Sensor Network?Karel Heurtefeux, Fabrice Valois. 732-739 [doi]
- Toward Data Confidentiality via Integrating Hybrid Encryption Schemes and Hadoop Distributed File SystemHsiao-Ying Lin, Shiuan-Tzuo Shen, Wen-Guey Tzeng, Bao-Shuh Paul Lin. 740-747 [doi]
- Knapsack Cryptosystems and Unreliable Reliance on DensityShang-Ming Jen, Tse-Lin Lai, Chia-Yu Lu, Jar-Ferr Yang. 748-754 [doi]
- Fundamental Incomplete Cryptography Method to Digital Rights Management Based on JPEG Lossy CompressionMunetoshi Iwakiri, Ta Minh Thanh. 755-762 [doi]
- Incomplete Cryptography Method Using Invariant Huffman Code Length to Digital Rights ManagementMunetoshi Iwakiri, Ta Minh Thanh. 763-770 [doi]
- Inducing Scale-Free Characteristics of Dynamic Unstructured P2P NetworksJun'ichi Shimada, Kei Ohnishi, Hitomi Tamura, Yuji Oie. 771-778 [doi]
- Intrusion-Tolerant Shared Memory through a P2P Overlay SegmentationDavi da Silva Böger, Joni da Silva Fraga, Eduardo Adílio Pelinson Alchieri, Michelle S. Wangham. 779-786 [doi]
- A Scheduling Method for Node Relay-based Webcast Considering ReconnectionYusuke Gotoh, Tomoki Yoshihisa, Hideo Taniguchi, Masanori Kanazawa, Wenny Rahayu, Yi-Ping Phoebe Chen. 787-794 [doi]
- Building Distributed Attribute-Value Trees on DHT-based NetworksHoai Son Nguyen, Yasuo Tan, Yoichi Shinoda. 795-802 [doi]
- A Radio-disjoint Geographic Multipath Routing in Wireless Sensor NetworksJeongcheol Lee, Hosung Park, Seungmin Oh, Yongbin Yim, Sang-Ha Kim. 803-809 [doi]
- A Low Cost Reliable Data Transmission Protocol over Multipath in Wireless Sensor NetworksHaosong Gou, Younghwan Yoo. 810-816 [doi]
- A Reliable Communication Strategy for Real-Time Data Dissemination in Wireless Sensor NetworksSeungmin Oh, Yongbin Yim, Jeongcheol Lee, Hosung Park, Sang-Ha Kim. 817-823 [doi]
- Three-Dimensional Location-Based IPv6 Addressing for Wireless Sensor Networks in Smart GridChih-Yung Cheng, Chi-Cheng Chuang, Ray-I Chang. 824-831 [doi]
- Harsh RED: Improving RED for Limited Aggregate TrafficIlpo Järvinen, Aaron Yi Ding, Aki Nyrhinen, Markku Kojo. 832-840 [doi]
- Distributed Reservation-Based MAC Protocol for UWB WiMedia MACJiseon Lee, Hyeonmok Ko, Cheeha Kim. 841-845 [doi]
- Delay Guaranteed Media Access Control for Wireless Home Automation NetworksLei Jing, Zixue Cheng, Yinghui Zhou. 846-853 [doi]
- Preemption-aware Admission Control in a Virtualized Grid FederationMohsen Amini Salehi, Bahman Javadi, Rajkumar Buyya. 854-861 [doi]
- Mining Network Traffic Efficiently to Detect Stepping-Stone IntrusionYingjie Sheng, Yongzhong Zhang, Jianhua Yang. 862-867 [doi]
- Web Spam Detection Using Link-Based Ant Colony OptimizationApichat Taweesiriwate, Bundit Manaskasemsak, Arnon Rungsawang. 868-873 [doi]
- From Meta-computing to Interoperable Infrastructures: A Review of Meta-schedulers for HPC, Grid and CloudStelios Sotiriadis, Nik Bessis, Fatos Xhafa, Nick Antonopoulos. 874-883 [doi]
- Experimental Results of a MANET Testbed in a Mixed Environment Considering Horizontal and Vertical TopologiesMasahiro Hiyama, Elis Kulla, Tetsuya Oda, Makoto Ikeda, Leonard Barolli. 884-889 [doi]
- Scheduling and Flow Control for Delay Guarantees in Multi-hop Wireless NetworksNgoc Thai Pham, Won-Joo Hwang, Nak Woon Sung. 890-897 [doi]
- Stochastic Optimization for Minimum Outage in Cooperative Ad-hoc NetworkThong Huynh, Ngoc Thai Pham, Won-Joo Hwang, Fabrice Theoleyre. 898-905 [doi]
- Implementation and Evaluation of a Real Object-Oriented Communication Method for Ad-hoc NetworksHiroyuki Suzuki, Akio Koyama. 906-911 [doi]
- An Extended Power Consumption Model for Distributed ApplicationsTomoya Enokido, Makoto Takizawa. 912-919 [doi]
- Algorithms for Selecting Energy-Efficient Storage Servers in Storage and Computation Oriented ApplicationsTakuro Inoue, Ailixier Aikebaier, Tomoya Enokido, Makoto Takizawa. 920-927 [doi]
- Greening the Internet Using Multi-frequency Scaling SchemeWei Meng, Yi Wang 0004, Chengchen Hu, Keqiang He, Jun Li, Bin Liu 0001. 928-935 [doi]
- Combining Decomposition and Reduction for State Space Analysis of a Self-Stabilizing SystemNils Müllner, Oliver E. Theel, Martin Fränzle. 936-943 [doi]
- A Study on Coverage Problem of Network Planning in LTE-Advanced Relay NetworksFan-Hsun Tseng, Chi-Yuan Chen, Li-Der Chou, Tin Yu Wu, Han-Chieh Chao. 944-950 [doi]
- Deterministic High Density Packet-Buffer System for Low Cost Network SystemsHisashi Iwamoto, Yuji Yano, Yasuto Kuroda, Koji Yamamoto, Shingo Ata, Kazunari Inoue. 951-956 [doi]