Abstract is missing.
- DNetSpec: A Distributed Network Testing Toolset for Middleware DevelopersShintaro Ishihara, Fujita Masahiro, Toyokazu Akiyama. 1-6 [doi]
- Improving Packet Capture Trace Import in Trace Compass with a Data Transformation DSLRuediger Gad. 7-12 [doi]
- Interest ACK: A Fast Packet Loss Detection Mechanism for Content-Centric NetworkingTsuyoshi Yabuuchi, Ryo Nakamura, Hiroyuki Ohsaki. 13-18 [doi]
- A Method of Mobile Core Network Load Reduction Using Autonomous Clustering-Based Two-Layered Structure for Information Dissemination in Wireless NetworksToshikazu Terami, Tomoyuki Ohta, Yoshiaki Kakuda. 19-24 [doi]
- Resource Allocation Methods Considering Residual Link Bandwidth for Service Function Chaining DesignNaoki Akutsu, Ken-ichi Baba. 25-30 [doi]
- LXC Container Migration in Cloudlets under Multipath TCPYuqing Qiu, Chung-Horng Lung, Samuel Ajila, Pradeep Srivastava. 31-36 [doi]
- Cache Function Activation on a Client Based DNSSEC Validation and Alert System by MultithreadingKunitaka Kakoi, Yong Jin, Nariyoshi Yamai, Naoya Kitagawa, Masahiko Tomoishi. 37-42 [doi]
- A Spoofed E-Mail Countermeasure Method by Scoring the Reliability of DKIM Signature Using Communication DataKanako Konno, Kenya Dan, Naoya Kitagawa. 43-48 [doi]
- Deployment of Multilanguage Security Awareness Education Online Course by Federated Moodle in JapanHiroshi Ueda, Motonori Nakamura. 49-52 [doi]
- Message from STA 2017 Workshop Co-ChairsFevzi Belli, Rajesh Subramanyan. 53 [doi]
- Applying Feature Selection to Software Defect Prediction Using Multi-objective OptimizationXiang Chen, Yuxiang Shen, Zhanqi Cui, Xiaolin Ju. 54-59 [doi]
- A Model-Based Framework for Cloud API TestingJunyi Wang, Xiaoying Bai, Linyi Li, Zhicheng Ji, Haoran Ma. 60-65 [doi]
- FORMAT: A Tool for Adapting Test Models Based on Feature ModelsBurcu Ergun, Ceren Sahin Gebizli, Hasan Sözer. 66-71 [doi]
- OpenFlow Modeling Based on CPN for Evolution Consideration and Executable Test Case GenerationHongwei Ruan, Lu Wang, Xiao Yang, Lulu Dong, Hua Li. 72-77 [doi]
- Theoretical, Weak and Strong Accuracy Graphs of Spectrum-Based Fault Localization FormulasChung Man Tang, W. K. Chan, Yuen-Tak Yu. 78-83 [doi]
- A Case Study on Context Maintenance in Dynamic Hybrid Race DetectorsJialin Yang, Ernest Bota Pobee, Wing Kwong Chan. 84-89 [doi]
- How Does GUI Testing Exercise Application Logic Functionality?Abdulaziz Alkhalid, Yvan Labiche. 90-95 [doi]
- A Deep-Learning-Based Method of Estimating Water IntakeYutaro Yamada, Takato Saito, Satoshi Kawasaki, Daizo Iketa, Masaji Katagiri, Masafumi Nishimura, Hiroshi Mineno. 96-101 [doi]
- Blood.Health.FOAF: Extending FOAF with Blood OntologyOkan Bursa, Emine Sezer, Ozgu Can, Murat Osman Ünalir. 102-106 [doi]
- Standardizing the Crowdsourcing of Healthcare Data Using Modular OntologiesHengyi Hu, Larry Kerschberg. 107-112 [doi]
- Towards Detecting Sex Offenders in Social NetworksSai K. Vallapu, Thoshitha T. Gamage. 113-118 [doi]
- A Mathematical Model for a Hybrid System Framework for Privacy Preservation of Patient Health RecordsKissi Mireku Kingsford, Fengli Zhang, Mensah Dennis Nii Ayeh, Armah MaryMargaret. 119-124 [doi]
- Technological Module for Unsupervised, Personalized Cardiac Rehabilitation ExercisingAnargyros Chatzitofis, Dimitrios Zarpalas, Dimitrios Filos, Andreas Triantafyllidis, Ioanna Chouvarda, Nicos Maglaveras, Petros Daras. 125-130 [doi]
- A Semantic Extraction and Sentimental Assessment of Risk Factors (SESARF): An NLP Approach for Precision Medicine: A Medical Decision Support Tool for Early Diagnosis from Clinical NotesSusan Sabra, Khalid Mahmood, Mazen Alobaidi. 131-136 [doi]
- An Intelligent Tracking System: Application to Acute Respiratory Tract Infection (TrackARTI)Duygu Çelik Ertugrul, Atilla Elçi, Yiltan Bitirim. 137-142 [doi]
- Trust-Aware and Location-Based Collaborative Filtering for Web Service QoS PredictionKai Chen, Hongyan Mao, Xiangyu Shi, Yuanmin Xu, Ailun Liu. 143-148 [doi]
- PRUCC-RM: Permission-Role-Usage Cardinality Constrained Role MiningCarlo Blundo, Stelvio Cimato, Luisa Siniscalchi. 149-154 [doi]
- Adaptive Cost Efficient Framework for Cloud-Based Machine LearningRezvan Pakdel, John Herbert. 155-160 [doi]
- Querying Encrypted OLAP DataAlfredo Cuzzocrea, Giorgio Mario Grasso. 161-163 [doi]
- Is Pokémon GO Watching You? A Survey on the Privacy-Awareness of Location-Based Apps' UsersChiara Braghin, Marilisa Del Vecchio. 164-169 [doi]
- Digital Media Tampering Detection Techniques: An OverviewSongpon Teerakanok, Tetsutaro Uehara. 170-174 [doi]
- A Modeling Approach for Flexible Workflow Applications of Cloud ServicesImen Ben Fraj, Yousra Bendaly Hlaoui, Leila Jemni Ben Ayed. 175-180 [doi]
- Towards an ASM Specification for Monitoring and Adaptation Services of Large-Scale Distributed SystemsAndreea Buga, Sorana Tania Nemes. 181-186 [doi]
- From Sequence Diagrams to Event B: A Specification and Verification Approach of Flexible Workflow Applications of Cloud Services Based on Meta-model TransformationYousra Bendaly Hlaoui, Ahlem Ben Younes, Leila Jemni Ben Ayed, Manel Fathalli. 187-192 [doi]
- Chronic Kidney Disease Prediction on Imbalanced Data by Multilayer Perceptron: Chronic Kidney Disease PredictionPinar Yildirim. 193-198 [doi]
- Identify Biological Modules and Hub MiRNAs for Oral Squamous Cell CarcinomasDoudou Zhou, JianQiang Li, Ji-Jiang Yang, Qing Wang, Weiliang Qiu, Shi Chen, Minhua Lu. 199-203 [doi]
- An Initial Screening Method for Tuberculosis Diseases Using a Multi-objective Gradient Evolution-Based Support Vector Machine and C5.0 Decision TreeFerani E. Zulvia, R. J. Kuo, E. Roflin. 204-209 [doi]
- SLC25A36 and ZFAND5 Expression Levels Altered by the Interaction of EtOH Dosage and Exposure Time in Human Dental Pulp Stem CellsZhirui Wang, JianQiang Li, Weiliang Qiu, Ji-Jiang Yang, Rui Mao, Shi Chen. 210-214 [doi]
- Alcohol-Induced Differential Variable GenesSiyuan Liang, JianQiang Li, Juan Li, Caiyun Yang, Weiliang Qiu, Ji-Jiang Yang, Zhihua Sun, Rui Mao. 215-220 [doi]
- Re-Structuring and Specific Similarity Computation of Electronic Medical RecordsYunxuan Zhang, Ziping He, Ji-Jiang Yang, Qing Wang, JianQiang Li. 230-235 [doi]
- A Study of Machine Learning in HealthcareRohan Bhardwaj, Ankita R. Nambiar, Debojyoti Dutta. 236-241 [doi]
- Breaking Implicit Trust in Point-of-Care Medical Technology: A Cyber-Physical Attestation ApproachFredrick Love, Bruce M. McMillin. 242-247 [doi]
- Gene Network Modules Associated to DPSCs DifferentiationWenjing Xu, Juan Li, JianQiang Li, Yue Li, Weiliang Qiu, Ji-Jiang Yang, Chunjie Guo, Minhua Lu. 248-252 [doi]
- The Investigation on Effectiveness Evaluation Methods for One Medical Material Used for Surgery Patients Based on Electronic Medical Records DataBo Liu, Kelu Yao, Lan Wei, Xiaolu Fei, WangQing. 253-258 [doi]
- Message from COMPSAC 2017 Fast Abstract Track Co-ChairsDave Towey, Michiharu Takemoto, Hossain Shahriar. 259 [doi]
- Infusing Topic Modeling into Interactive Program Comprehension: An Empirical StudyTianxia Wang, Yan Liu. 260-261 [doi]
- First Meeting Time Formula of Two Random Walkers toward Understanding Epidemic Information DisseminationYusuke Sakumoto, Hiroyuki Ohsaki. 262-263 [doi]
- Toward Design of Garbled Circuits Using Quantum GatesMaryam Ehsanpour. 264-265 [doi]
- New Strategies for Selecting Reuse Candidates on Automated Program RepairAkito Tanikado, Haruki Yokoyama, Masahiro Yamamoto, Soichi Sumi, Yoshiki Higo, Shinji Kusumoto. 266-267 [doi]
- Investigation and Detection of Split CommitRyo Arima, Yoshiki Higo, Shinji Kusumoto. 268-269 [doi]
- Design of a Node Status Visualizing Software Utilizing the AR Technology for Multihop Wireless NetworksTomoyuki Ohta, Ryota Ito, Yoshiaki Kakuda. 270-271 [doi]
- Energy Consumption Measurements in DockerSenay Semu Tadesse, Francesco Malandrino, Carla-Fabiana Chiasserini. 272-273 [doi]
- What Makes Software Energy-Efficient?: Make it FasterHiroyuki Matsuo, Shinsuke Matsumoto, Shinji Kusumoto. 274-275 [doi]
- Identifying Fundamental Goals from Objects in a Scenario to Facilitate System IntroductionYoshihide Chubachi, Haruhiko Kaiya. 276-277 [doi]
- Computer Literacy Education: Challenges in Multicultural Environments: A View on Japanese University EnvironmentSimona Vasilache. 278-279 [doi]
- FATDOG: Hadoop Based Test Data Generation Tool for RESTful Web ServiceJing Liu, Wenjie Chen. 280-281 [doi]
- A Secure and Lightweight IoT Device Remote Monitoring and Control Mechanism Using DNSYong Jin, Masahiko Tomoishi, Nariyoshi Yamai. 282-283 [doi]
- Development of the Edge Computing Platform Based on Functional Modulation ArchitectureTohru Kondo, Hidenobu Watanabe, Toshihiro Ohigashi. 284-285 [doi]
- Traceability Link Mining - Focusing on UsabilityYukiya Yazawa, Shinpei Ogata, Kozo Okano, Haruhiko Kaiya, Hironori Washizaki. 286-287 [doi]
- On the Deployment of Healthcare Applications over Fog Computing InfrastructureOrestis Akribopoulos, Ioannis Chatzigiannakis, Christos Tselios, Athanasios Antoniou. 288-293 [doi]
- Towards Container Orchestration in Fog Computing InfrastructuresSaiful Hoque, Mathias Santos de Brito, Alexander Willner, Oliver Keil, Thomas Magedanz. 294-299 [doi]
- Performance Assessment of BLE Nano BAN Micro-InfrastructuresLuca Vollero, Marco Sabatini. 300-303 [doi]
- Cybersecurity of Wearable Devices: An Experimental Analysis and a Vulnerability Assessment MethodMatteo Langone, Roberto Setola, Javier Lopez. 304-309 [doi]
- LoRaWAN as an e-Health Communication TechnologyM. Talha Buyukakkaslar, Mehmet Ali Ertürk, Muhammed Ali Aydin, Luca Vollero. 310-313 [doi]
- Contactless Detection of ECG Signals: Sensor Architecture and SimulationMarco Santonico, Alessandro Zompanti, Giorgio Pennazza, Giuseppe Ferri, Francesca Romana Parente, Mario Benassai. 314-316 [doi]
- Security in Cross - Border Medical Data Interchange: A Technical Analysis and a Discussion of Possible ImprovementsRaffaele Martino, Salvatore D'Antonio, Luigi Coppolino, Luigi Romano. 317-322 [doi]
- Design of Common Software Architecture as Base for Application Generator and Meta-Generator for Interactive SystemsAtsushi Esaka, Masami Noro, Atsushi Sawada. 323-328 [doi]
- Dynamically Exposing and Controlling Physical Devices by Expanding Web of Things SchemeTakuya Sakamoto, Hidenobu Ito, Kazuaki Nimura. 329-335 [doi]
- Wrist Player: A Smartwatch Gesture Controller for Smart TVsMateus Machado Luna, Thyago P. Carvalho, Fabrizzio Alphonsus A. M. N. Soares, Hugo A. D. Nascimento, Ronaldo Martins da Costa. 336-341 [doi]
- A Collusion-Resilient Hybrid P2P Framework for Massively Multiplayer Online GamesKazuma Matsumoto, Yasuo Okabe. 342-347 [doi]
- On-Demand Barrier-Free Street View System Using Sensor Information from General-Purpose Wheelchair UsersKenichi Arai, Takuya Tateishi, Toru Kobayashi, Noboru Sonehara. 348-353 [doi]
- Visualization Method for Bicycle Rider Behavior Analysis Using a SmartphoneHajime Kato, Yuto Sakajyo, Shigeo Kaneda. 354-359 [doi]
- Visualization Method Using Probe Bicycle to Analyze Bicycle Rider's Control BehaviorRyoichi Takahashi, Kazuki Miki, Shigeo Kaneda. 360-365 [doi]
- VID: Virtual Information DeskNavid Seidi, Farshad Eshghi, Manoochehr Kelarestaghi. 366-371 [doi]
- Finding All Breadth First Full Spanning Trees in a Directed GraphHoda Khalil, Yvan Labiche. 372-377 [doi]
- Incremental Learning from Multi-level Monitoring Data and Its Application to Component Based Software EngineeringSalman Taherizadeh, Vlado Stankovski. 378-383 [doi]
- IoT Solutions for Precision Farming and Food Manufacturing: Artificial Intelligence Applications in Digital FoodRob Dolci. 384-385 [doi]
- Detection of Irregularities and Rips by Finding Critical Points of Morse Theory - Preliminary Results on Analysis on Sales DataHiroyuki Sato, Yoshihiro Seino, Takanori Ogata, Tatsuya Shirakawa. 386-390 [doi]
- Application of Complex Hilbert Principal Component Analysis to Financial DataWataru Souma, Hiroshi Iyetomi, Hiroshi Yoshikawa. 391-394 [doi]
- Detrending Moving Average Algorithm: Quantifying Heterogeneity in Financial DataLinda Ponta, Anna Carbone, Silvano Cincotti. 395-400 [doi]
- The Impact of Database Layer on Auto-Scaling Decisions in a 3-Tier Web Services Cloud Resource ProvisioningAli Yadavar Nikravesh, Samuel A. Ajila, Chung-Horng Lung. 401-406 [doi]
- ESBSC: Energy-Aware Service Brokering Strategy in CloudsFeng Ma, Xiaodong Liu, Ying Yang, Wei Yao, Jinjin Cai, Fang Wang. 407-412 [doi]
- Automated Constraint-Based Multi-tenant SaaS Configuration Support Using XML Filtering TechniquesAzadeh Etedali, Chung-Horng Lung, Samuel Ajila, Igor Veselinovic. 413-418 [doi]
- Developing a Creative Travel Management System Based on Software Reuse and Abstraction TechniquesSicong Ma, Hongji Yang, Meiyu Shi. 419-424 [doi]
- A Creative Approach to Reusing Data and Generating Knowledge in Enterprise SystemsLin Zou, Qinyun Liu, Hongming Che, Hongji Yang, Hua Zhou. 425-430 [doi]
- Towards Requirements Reuse by Implementing Traceability in Agile DevelopmentRanda Elamin, Rasha Osman. 431-436 [doi]
- Improving Workflow Anomaly Detection with a C-TreeFeng-Jian Wang, Alex Chang, Tennyson Lu. 437-444 [doi]
- An Approach Based on Structural Differences to Expedite Applying OSS Updates to ProductsMasahiro Fukuyori, Ryuichi Umekawa, Hiroshi Fujino, Junya Yamaguchi, Kota Ariyama. 445-450 [doi]
- Executable Domain-Specific Modelling Based on Domain SpacesQing Duan, Junhui Liu, Dongdai Zhou, Feng Yu, Hongji Yang. 451-456 [doi]
- Combining Neutron and OpenDaylight for Management of NetworkingLu Wang, Hongwei Ruan, Hua Li, Qi Liu. 457-462 [doi]
- DeDuCT: A Data Dependence Based Concern Tagger for Modularity AnalysisAndrea Fornaia, Emiliano Tramontana. 463-468 [doi]
- Towards Service-Oriented Design of Hybrid Systems Modeled in SimulinkTimm Liebrenz, Paula Herber, Thomas Göthel, Sabine Glesner. 469-474 [doi]
- An IoT Architecture for Personalized Recommendations over Big Data Oriented ApplicationsGeorgios Palaiokrassas, Ilias Karlis, Antonios Litke, Vassilios Charlaftis, Theodora A. Varvarigou. 475-480 [doi]
- Improving the Prediction Accuracy of Decision Tree Mining with Data PreprocessingPriyanga Chandrasekar, Kai Qian, Hossain Shahriar, Prabir Bhattacharya. 481-484 [doi]
- Data-Oriented Instrumentation against Information Leakages of Android ApplicationsCong Sun, Pengbin Feng, Teng Li, Jianfeng Ma. 485-490 [doi]
- A Lightweight Multi-receiver Encryption Scheme with Mutual AuthenticationEi Khaing Win, Tomoki Yoshihisa, Yoshimasa Ishi, Tomoya Kawakami, Yuuichi Teranishi, Shinji Shimojo. 491-497 [doi]
- Access Control Model for the Inference Attacks with Access HistoriesHirotsugu Kinoshita, Tetsuya Morizumi. 498-503 [doi]
- An Iris-Based Authentication Framework to Prevent Presentation AttacksHossain Shahriar, Hisham Haddad, Mahbubul Islam. 504-509 [doi]
- Addressing Security Issues in the eHeatlh Domain Relying on SIEM SolutionsLuigi Coppolino, Salvatore D'Antonio, Luigi Romano, Luigi Sgaglione, Mariacarla Staffa. 510-515 [doi]
- Blockchain as an Audit-Able Communication ChannelShigeya Suzuki, Jun Murai. 516-522 [doi]
- Trust as Soft Security for Self-Adaptive Systems: A Literature SurveyHyo-Cheol Lee, Seok-Won Lee. 523-528 [doi]
- Integrating Goal Models and Problem Frames for Requirements Analysis of Self-Adaptive CPSDeshuai Han, Jianchun Xing, Qiliang Yang, Juelong Li, Xiaobing Zhang, Ying Chen. 529-535 [doi]
- A Similarity-Based Approach to Recognizing Voice-Based Task Goals in Self-Adaptive SystemsXiaobing Zhang, Qiliang Yang, Jianchun Xing, Deshuai Han, Ying Chen. 536-542 [doi]
- Talis - A Design Study for a Wearable Device to Assist People with DepressionDirk Siegmund, Laura Chiesa, Oliver Horr, Frank Gabler, Andreas Braun 0001, Arjan Kuijper. 543-548 [doi]
- Method for Text Entry in Smartwatches Using Continuous Gesture RecognitionThamer Hobylon Nascimento, Fabrizzio Alphonsus A. M. N. Soares, Pouang Polad Irani, Leandro Luíz Galdino de Oliveira, Anderson da Silva Soares. 549-554 [doi]
- Tele-operation of Robot Teams: A Comparison of Gamepad-, Mobile Device and Hand Tracking-Based User InterfacesStefano Bonaiuto, Alberto Cannavo, Giovanni Piumatti, Gianluca Paravati, Fabrizio Lamberti. 555-560 [doi]
- The Problem of Cognitive Load in GUI's: Towards Establishing the Relationship between Cognitive Load and Our Executive FunctionsAndrés Mejía-Figueroa, Reyes Juárez-Ramírez. 561-565 [doi]
- Making DNS Servers Resistant to Cyber Attacks: An Empirical Study on Formal Methods and PerformanceBarry S. Fagin, Bradley Klanderman, Martin C. Carlisle. 566-571 [doi]
- Secure Double-Layered Defense against HTTP-DDoS AttacksMohamad Samir A. Eid, Hitoshi Aida. 572-577 [doi]
- Application of Hidden Markov Model in SQL Injection DetectionPeng Li, Lei Liu, Jing Xu, Hongji Yang, Liying Yuan, Chenkai Guo, Xiujuan Ji. 578-583 [doi]
- TRUST-CAP: A Trust Model for Cloud-Based ApplicationsEslam G. AbdAllah, Mohammad Zulkernine, Yuan Xiang Gu, Clifford Liem. 584-589 [doi]
- Detecting and Classifying Android PUAs by Similarity of DNS queriesMitsuhiro Hatada, Tatsuya Mori. 590-595 [doi]
- Message from CORCS-IEESD 2017 Workshop ChairsCristina Seceleanu, Detlef Streitferdt, Tiberiu Seceleanu, Philipp Nenninger. 596 [doi]
- System Level Partitioning for Embedded SystemsGaetana Sapienza, N. Meli, J. Eriksson, R. Jansson, Tiberiu Seceleanu, Ivica Crnkovic. 597-602 [doi]
- Adaptive Resource Allocation of Multiple Servers for Service-Based Systems in Cloud ComputingSiqian Gong, Beibei Yin, Wenlong Zhu, Kai-Yuan Cai. 603-608 [doi]
- Simulation Driven Development of Distributed Systems - Improving the System Development Process Using the Example of the German Automatic Toll SystemTommy Baumann, Bernd Pfitzinger. 609-614 [doi]
- Searching Promising Researchers through Network Centrality Measures of Co-author Networks of Technical PapersMasanori Fujita, Hiroto Inoue, Takao Terano. 615-618 [doi]
- Feature Representation Extraction Method of Hotel Reviews Using Co-occurrence Restriction and Dependency GraphKoji Tanaka, Koichi Tsujii, Takashi Ikoma, Akiyuki Sekiguchi, Kazuhiko Tsuda. 619-624 [doi]
- Promoting Environmental Education Using a Multilingual Environment: Manufacturing Soap from Waste OilBo Wang, Hiroshi Suzuki, Yuqi Liao, Yuya Ieiri, Reiko Hishiyama. 625-630 [doi]
- Corroboration Effect of Current Net Earnings and Management's Net Earnings Forecasts in Japan's Corporate Bond MarketHiroaki Joutaki, Hiroshi Takahashi, Yasuo Yamashita, Takao Terano. 631-636 [doi]
- A Walk Rally Application to Motivate Users to Visit Potential Sightseeing ResourcesYuya Ieiri, Yuu Nakajima, Ryota Ayaki, Reiko Hishiyama. 637-642 [doi]
- A Comparative Study Using Discriminant Analysis on a Questionnaire Survey Regarding Project Managers' Cognition and Team CharacteristicsAyako Masuda, Tohru Matsuodani, Kazuhiko Tsuda. 643-648 [doi]
- Online Shopping Frauds Detecting System and Its EvaluationKenichi Yoshida, Kazuhiko Tsuda, Setsuya Kurahashi, Hiroki Azuma. 649-653 [doi]
- Early Signals of Trending Rumor Event in Streaming Social MediaShihan Wang, Izabela Moise, Dirk Helbing, Takao Terano. 654-659 [doi]
- Agent-Based Urban Dynamics Simulation to Analyze Effects of Street Attractiveness and Tramway for an Urban SprawlHideyuki Nagai, Setsuya Kurahashi. 660-665 [doi]
- An Analysis of Multi-language Simultaneous Display in the Translation SystemMizuki Sato, Reiko Hishiyama. 666-671 [doi]
- SocICoAP: Social Interaction with Supplementary Sensors and Actuators through CoAP in SmartphonesCristian Martín, Jaime Chen, Manuel Diaz, Ana Reyna, Bartolomé Rubio. 672-677 [doi]
- Optimizing RPL Objective Function for Mobile Low-Power Wireless NetworksIfeoma Helen Urama, Hossein Fotouhi, Mohammad Mahmoud Abdellatif. 678-683 [doi]
- IoT Agent Platform Mechanism with Transparent Cloud Computing Framework for Improving IoT SecurityIkuo Nakagawa, Shinji Shimojo. 684-689 [doi]
- A Wireless Early Prediction System of Cardiac Arrest through IoTYosuf ElSaadany, A. K. M. Jahangir Alam Majumder, Donald R. Ucci. 690-695 [doi]
- Message from OER 2017 Workshop OrganizersHenry Chan, Edmundo Tovar. 696 [doi]
- MERLOT - A Reliable Framework for OEREli Shmueli. 697-699 [doi]
- Promoting MERLOT Communities Based on OERs in Computer Science and Information SystemsEdmundo Tovar, Henry Chan, Sorel Reisman. 700-706 [doi]
- Developing an Open Educational Resource: Reflections on a Student-Staff CollaborationDave Towey, David Foster, Filippo Gilardi, Paul Martin, Andrew White, Yiru Jiang, Yichen Pan, Yu Qu. 707-711 [doi]
- A Knowledge-Driven Web Tutoring System Framework for Adaptive and Assessment-Driven Open-Source LearningMaria Sette, Lixin Tao, Ning Jiang. 712-717 [doi]
- Verifiable Delegated Authorization for User-Centric Architectures and an OAuth2 ImplementationLuca Ferretti, Mirco Marchetti, Michele Colajanni. 718-723 [doi]
- A Novel Binarization Scheme for Real-Valued Biometric FeatureJialiang Peng, Bian Yang. 724-729 [doi]
- A Threshold-Based Authentication System Which Provides Attributes Using Secret SharingTomohiro Ito, Daisuke Kotani, Yasuo Okabe. 730-737 [doi]
- Flexible Key Revocation and Access Control for a Privacy-Protecting Cloud CBIR SystemHao Liu, Hideaki Goto. 738-743 [doi]
- Enhancing Breeder Document Long-Term Security Using Blockchain TechnologyNicolas Buchmann, Christian Rathgeb, Harald Baier, Christoph Busch, Marian Margraf. 744-748 [doi]
- Ant Colony Optimisation and Geolocation Technologies for the Transportation Assignment ProblemFabio Pompei. 749-753 [doi]
- Modelling Urban Transport Sector: A Methodology Based on OSeMOSYS Model GeneratorDaniele Grosso, Raffaella Gerboni, Dario Cotugno. 754-759 [doi]
- Multi Period Assignment Problem for Social Engagement and Opportunistic IoTEdoardo Fadda, Dario Mana, Guido Perboli, Roberto Tadei. 760-765 [doi]
- The Impact of Combining Inbound and Outbound Demand in City Logistics SystemsPirmin Fontaine, Teodor Gabriel Crainic, Ola Jabali, Walter Rei. 766-770 [doi]
- Car-Sharing: Current and Potential Members Behavior Analysis after the Introduction of the ServiceGuido Perboli, Brunella Caroleo, Stefano Musso. 771-776 [doi]
- One-Way Free Floating Car-Sharing: Applying Vehicle-Generated Data to Assess the Market Demand Potential of Urban ZonesY. M. Chianese, A. Avenali, R. Gambuti, L. Palagi. 777-782 [doi]
- Business Modeling of a City Logistics ICT PlatformAlberto De Marco, Giulio Mangano, Giovanni Zenezini, Anna Corinna Cagliano, Guido Perboli, Mariangela Rosano, Stefano Musso. 783-789 [doi]
- Assessing the Impacts of Electric Vehicles Uptake: A System Dynamics ApproachBrunella Caroleo, Elisa Pautasso, Michele Osella, Enrico Palumbo, Enrico Ferro. 790-795 [doi]