Abstract is missing.
- MPI-Based Twi-extraction of Traffic State Evaluation RulesYingjie Xia, Yiwen Fang, Zhoumin Ye. 1-4 [doi]
- An Efficient TCB for a Generic Content Distribution SystemSomya D. Mohanty, Arun Velagapalli, Mahalingam Ramkumar. 5-12 [doi]
- Exploiting Attribute Redundancy in Extracting Open Source Forge WebsitesXiang Li, YanXu Zhu, Gang Yin, Tao Wang, Huaimin Wang. 13-20 [doi]
- Enabling Dynamic Analysis of Anonymized Social Network DataXuan Ding, Wei Wang. 21-26 [doi]
- Social Network Analysis in Multiple Social Networks Data for Criminal Group DiscoveryXufeng Shang, Yubo Yuan. 27-30 [doi]
- Local Oriented Efficient Detection of Overlapping Communities in Large NetworksShengdun Liang, Yuchun Guo. 31-38 [doi]
- BTMD: A Framework of Binary Translation Based Malcode DetectorZheng Shan, Haoran Guo, Jianmin Pang. 39-43 [doi]
- Scrapy-Based Crawling and User-Behavior Characteristics Analysis on TaobaoJing Wang, Yuchun Guo. 44-52 [doi]
- A New Evidence Combination Scheme for Decision AssistantWanqing Wang, Yongjun Zhao, Jie Huang. 53-57 [doi]
- Metadata Independent Hashing for Media Identification & P2P Transfer OptimisationJeff Warren, Michael Clear, Ciaran McGoldrick. 58-65 [doi]
- A High Performance and High Reliability Storage Server for Parallel File SystemLiang Ming, Dan Feng, Fang Wang, Haifeng Sun, Sen Wu. 66-72 [doi]
- Parallel Cloning Simulation of Flood Mitigation Operations in the Upper-Middle Reach of Huaihe RiverGuoyi Zhang, Minghui Fang, Mingkai Qian, Shijin Xu. 73-80 [doi]
- Offline Downloading: A Non-Traditional Cloud-Accelerated and Peer-Assisted Content Distribution ServiceNaixiang Ao, Yingying Xu, Changjia Chen, Yuchun Guo. 81-88 [doi]
- File Exchange in a Private Cloud Supported by a Trust ModelEdna Dias Canedo, Rafael Timóteo de Sousa Júnior, Robson de Oliveira Albuquerque, Fabio Lucio Lopes de Mendonca. 89-96 [doi]
- Holistic View Angles of Cloud Computing Services ProvisionsChigozirim Oriaku, Ihsam Alshahib Lami. 97-105 [doi]
- Deadline Based Performance Evaluation of Job Scheduling AlgorithmsHaruna Ahmed Abba, Syed Nasir Mehmood Shah, M. Nordin B. Zakaria, Anindya Jyoti Pal. 106-110 [doi]
- A Case Study on Digital Forensics in the CloudFabio Marturana, Gianluigi Me, Simone Tacconi. 111-116 [doi]
- Service Layer and Axioms for User Access to the Cloud by Means of OntologiesLilliam N. Robinson-Oses, Miguel Vargas-Lombardo. 117-120 [doi]
- A Case Study of Text-Based CAPTCHA AttacksLing-Zi Xiao, Yi-Chun Zhang. 121-124 [doi]
- A Proposed Steganography Method to Uyghur ScriptTalip Munire, Jamal Anwar, Wenqiang Guo. 125-128 [doi]
- Arithmetic Operations on Elliptic Curves Defined over Un-conventional Element Finite FieldsMichael Naseimo Daikpor, Oluwole Adegbenro. 129-136 [doi]
- Provably Secure Identity-Based Aggregate Signature SchemeJayaprakash Kar. 137-142 [doi]
- Security Analysis of the Micro Transport Protocol with a Misbehaving ReceiverFlorian Adamsky, Syed Ali Khayam, Rudolf Jäger, Muttukrishnan Rajarajan. 143-150 [doi]
- Worm Propagation Model for Heterogeneous NetworkLidong Zhai, Wei Guo, Zhaopeng Jia, Li Guo, Jinqiao Shi. 151-154 [doi]
- An Improved Construction for Reusable Anonymous Return Channels Based on Universal Re-encryptionCheng-Qiang Huang, Long-Hai Li, Shao-Feng Fu. 155-159 [doi]
- Securing Encryption Key Distribution in WLAN via QKDRima Djellab, Mohamed Benmohammed. 160-165 [doi]
- Homomorphism Encryption Algorithm for Elementary Operations over Real Number DomainZhang Tong, Wu Qi, Liu Wen, Chen Liang. 166-169 [doi]
- The Digital Aggregated Self: A Literature ReviewLynne Y. Williams, Diane M. Neal. 170-177 [doi]
- Network Survivability Evaluation Model Based on Immune Evolution and Multiple Criteria Decision MakingChunlei Wang, Lan Fang, Yiqi Dai, Liang Ming, Qing Miao, Dongxia Wang. 178-184 [doi]
- Enforcing Trust-Based Intrusion Detection in Cloud Computing Using Algebraic MethodsAmira Bradai, Hossam Afifi. 185-190 [doi]
- A Biometrics-Based SSO Authentication Scheme in TelematicsDi Liu, Zhi-Jiang Zhang, Ni Zhang. 191-194 [doi]
- A Framework for P2P Botnet Detection Using SVMPijush Barthakur, Manoj Dahal, Mrinal Kanti Ghose. 195-200 [doi]
- Visual Analytic Agent-Based Framework for Intrusion Alert AnalysisRiyanat Shittu, Alex Healing, Robin E. Bloomfield, Muttukrishnan Rajarajan. 201-207 [doi]
- A Dual-Mode Fingerprint Fusion Encryption Method Based on Fuzzy VaultXiaolei Li, Dongmei Sun. 208-215 [doi]
- Keystroke Dynamics for Continuous Access Control EnforcementJoao Ferreira, Henrique Santos. 216-223 [doi]
- Non-interactive Exponential Homomorphic Encryption AlgorithmLiang Chen, Zhang Tong, Wen Liu, Chengmin Gao. 224-227 [doi]
- Memory Bandwidth Optimization Strategy of Coarse-Grained Reconfigurable ArchitecturePeng Cao, Huiyan Jiang, Bo Liu, Weiwei Shan. 228-231 [doi]
- SOA-Based Simulation Framework: A Way to Simulation ComposabilityYang Shi, De-sen Zhang, Ming-yan Xiao, Ming-hua Lu. 232-236 [doi]
- The Converged Service Oriented Architecture in Smart Home ServiceSining Ma, Xi Chen, Guicai Song, Juan Wang, Limin Sun, Jia Yan. 237-240 [doi]
- Rule-Based Control of Decentralised Asynchronous SOA for Real-Time ApplicationsAlexander Cameron, Markus Stumptner, Nanda Nandagopal, Wolfgang Mayer, Todd Mansell. 241-248 [doi]
- A Core Broking Model for E-MarketsPen-Choug Sun, Michael O. Odetayo, Rahat Iqbal, Anne E. James. 249-256 [doi]
- A Novel Simulation Time and Wall Clock Time Synchronization Algorithm for HLAZexin Jiang. 257-260 [doi]
- Uniform SystemC Co-Simulation Methodology for System-on-Chip DesignsXuexiang Wang, Weiwei Shan, Hao Liu. 261-267 [doi]
- An Efficient and Flexible Embedded Memory IP CompilerMing Chen 0001, Bai Na. 268-273 [doi]
- Collection System for Pressure Information of Buildings Based on the IoT and CAN BusWeiyuan Sun, Xing Chen, Fangyi Liu, Liang Zhao. 274-277 [doi]
- Fragment Aware Scheduling for Advance Reservations in Multiprocessor SystemsBo Li, Enwei Zhou, Hao Wu, Yijian Pei, Bin Shen. 278-285 [doi]
- Configuration Cache Management for Coarse-Grained Reconfigurable Architecture with Multi-ArrayPeng Cao, Yong Cai, Bo Liu, Weiwei Shan. 286-291 [doi]
- A New Approach to Implement Discrete Wavelet Transform on Coarse-Grained Reconfigurable ArchitectureJie Li, Xinxiang Ke, Peng Cao, Weiwei Shan. 292-297 [doi]
- Sequential Scheduling in Space MissionsJinjiang Xing, Yan Zhang, Jian Li, Yuncheng Feng. 298-303 [doi]
- Porting of OSSIE on Texas Instrument's DAVINCI SoC Based SDR PlatformSaleh Usman, Asad Mahmood, Muhammad Rehan Ashraf. 304-308 [doi]
- Optimization of Automatic Conversion of Serial C to Parallel OpenMPD. Dheeraj, B. Nitish, Shruti Ramesh. 309-314 [doi]
- On the Suitability of Multi-Core Processing for Embedded Automotive SystemsSantosh Kumar Jena, M. B. Srinivas. 315-322 [doi]
- Amazon Kindle Fire from a Digital Forensics PerspectiveBabar Iqbal, Asif Iqbal, Mário Guimaraes, Kashif Khan, Hanan Al Obaidli. 323-329 [doi]
- Improving the Collaborative Filtering Recommender System by Using GPUZhanchun Gao, Yuying Liang. 330-333 [doi]
- An Implementation of Embedded Real Time System Framework in Service Oriented ArchitectureMahmood Aghajani, Dayang N. A. Jawawi. 334-340 [doi]
- A Multi-Objective Optimization Framework for Cluster-Based Wireless Sensor NetworksChi-Tsun Cheng, Henry Leung. 341-347 [doi]
- An Analysis on the Delay-Aware Data Collection Network Structure Using Pareto OptimalityChi-Tsun Cheng, Chi Kong Tse. 348-352 [doi]
- A Workload-Aware Link Scheduling for Heterogeneous Wireless Sensor NetworksBo Zeng, Yabo Dong, Zhidan Liu, Dongming Lu. 353-359 [doi]
- An Incremental BP Neural Network Based Spurious Message Filter for VANETJiyu Zhang, Liusheng Huang, Hongli Xu, Mingjun Xiao, Weijie Guo. 360-367 [doi]
- An Appointment Based MAC Protocol for Wireless Sensor NetworksHao Liu, Fulong Jiang, Guoliang Yao. 368-372 [doi]
- A Protocol for Intrusion Detection Based on Learning Automata in Forwarding Packets for Distributed Wireless Sensor NetworksAmirhosein Fathinavid, Amir Bagheri Aghababa. 373-380 [doi]
- An Intelligent Evaluation Model Based on the LEACH Protocol in Wireless Sensor NetworksNing Cao, Russell Higgs, Gregory M. P. O'Hare. 381-388 [doi]
- A Clustering Routing Algorithm Based on Reliability in Wireless Sensor NetworkDong Ting. 389-392 [doi]
- A Self-Monitoring, Adaptive and Resource Efficient Approach for Improving QoS in Wireless Sensor NetworksDima Hamdan, Oum-El-Kheir Aktouf, Ioannis Parissis, Bachar El Hassan, Abbas Hijazi, Bassam Moslem. 393-400 [doi]
- Delay-minimized Energy-efficient Data Aggregation in Wireless Sensor NetworksHuu Nghia Le, Vyacheslav V. Zalyubovskiy, Hyunseung Choo. 401-407 [doi]
- Hybrid-Priority Configuration Cache Supervision Method for Coarse Grained Reconfigurable ArchitectureBo Liu, Peng Cao, Jinjiang Yang. 408-414 [doi]
- Lattice Sphere Decoding Technique Assisted Optimum Detection for Block Data Transmission SystemsMahmoud A. M. Albreem, Mohd Fadzli Mohd Salleh. 415-418 [doi]
- Cooperative Spectrum Sharing in Relay-Trading Mode: A Fairness ViewLixia Liu, Gang Hu, Ming Xu, Yuxing Peng. 419-422 [doi]
- Application of Internet of Things in Power-Line MonitoringXi Chen, Limin Sun, Hongsong Zhu, Yan Zhen, Hongbin Chen. 423-426 [doi]
- Improved Solution to TCP Incast Problem in Data Center NetworksKai Chen, Hongyun Zheng, Yongxiang Zhao, Yuchun Guo. 427-434 [doi]
- Conceptual Framework and a Critical Review for Privacy Preservation in Context Aware SystemsA. A. Pandit, Anup Kumar. 435-442 [doi]
- A Mobility Management Architecture for IPv4/IPv6 NetworksZheng Xiang, Qiuli Kong. 443-446 [doi]
- Electromagnetic Wave Effect on Human Health: Challenges for Developing CountriesBoniface O. Anyaka, Udochukwu B. Akuru. 447-452 [doi]
- Online and Intelligent Route Decision-Making from the Public Health DataSetXingyun Geng, Li Wang, Dong Zhou, Huiqun Wu, Wen Cao, Yuanpeng Zhang, Yalan Chen, Weijia Lu, Kui Jiang, Jiancheng Dong. 453-456 [doi]
- Testing Health-Care Integrated Systems with Anonymized Test-Data Extracted from Production SystemsAli Raza, Stephen Clyde. 457-464 [doi]
- Low-Complexity Anti-Jamming Capability Evaluation Method of Wireless Communication SystemYingtao Niu, Fuqiang Yao, Jianzhong Chen. 465-468 [doi]
- Analysis and Simulation of New Method in LTE-Advanced System to Improve System PerformanceGao Qiang, Yu Zhong Yuan. 469-472 [doi]
- FFT-Based OFDM in Broadband-PLC and Narrowband-PLCTongfei Zhang, Wenjing Liu. 473-478 [doi]
- Capacity of Hybrid Spectrum Sharing System and Analysis Model in Cognitive RadioXiaorong Zhu, Yong Wang. 479-484 [doi]
- 4G Evolution and Multiplexing Techniques with Solution to Implementation ChallengesM. Kaleem Iqbal, M. Bilal Iqbal, Iftikhar Rasheed, Abdullah Sandhu. 485-488 [doi]
- Design and Evaluation of En-LEACH Routing Protocol for Wireless Sensor NetworkSuyog Pawar, Prabha Kasliwal. 489-492 [doi]
- SER Analysis of 8x8 QOSTC with Less Decoding ComplexityMohammad Abu Hanif, Moon Ho Lee. 493-496 [doi]
- DDoS Attack by File Request Redirection in Kad P2P NetworkYeonju Lee, Kwangsoo Kim, Byeong-hee Roh. 497-500 [doi]
- Improvement of Texture Image Retrieval Algorithm Based on Sparse CodingYansi Yang, Yingyun Yang, Xuan Zeng. 501-506 [doi]
- Exploiting the Effect of NAND Flash-Memory SSD on Filesystem DesignJaechun No, Sung Soon Park. 507-511 [doi]
- A measurementMajing Su, Hongli Zhang, Binxing Fang, Ning Yan. 512-518 [doi]
- A Coarse-to-Fine Approach for Motion Pattern DiscoveryBolun Cai, Zhifeng Luo, Kerui Li. 519-522 [doi]
- A Fast System Identification Method Based on Minimum Phase Space VolumeXinzhi Xu, Jingbo Guo. 523-526 [doi]
- A Genetic Algorithm for Task Scheduling Based on User Overall SatisfactionXiaoguang Wang. 527-530 [doi]
- The Domain Decomposition Method in Land Surface ModelJianhui Shi, Wenbo Zhou, Ying Liu. 531-534 [doi]
- Sparse Watermark Embedding and Recovery Using Compressed Sensing Framework for Audio SignalsMohamed Waleed Fakhr. 535-539 [doi]
- Performance Evaluation of Beamforming Algorithm with Jacket Matrix Based Eigenvalue DecompositionMd. Hashem Ali Khan, Moon Ho Lee. 540-545 [doi]