Abstract is missing.
- Erratum: Scheduling Optimization of the RFID Tagged Explosive Storage Based on Genetic AlgorithmXiaoling Wu, Huawei Fu, Xiaomin He, Guangcong Liu, Jianjun Li, Hainan Chen, Qianqiu Wang, Qing He. [doi]
- Transparency in Cloud Business: Cluster Analysis of Software as a Service CharacteristicsJonas Repschlaeger. 1-10 [doi]
- Distributed Accounting in Scope of Privacy PreservingMarcus Hilbrich, René Jäkel. 11-22 [doi]
- Distributed Virtual Machine Monitor for Distributed Cloud Computing Nodes IntegrationLi Ruan, Jinbing Peng, Limin Xiao, Mingfa Zhu. 23-31 [doi]
- Differentiated Policy Based Job Scheduling with Queue Model and Advanced Reservation Technique in a Private Cloud EnvironmentShyamala Loganathan, Saswati Mukherjee. 32-39 [doi]
- Scaling Out Recommender System for Digital Libraries with MapReduceLun-Chi Chen, Ping-Jen Kuo, I-En Liao, Jyun-Yao Huang. 40-47 [doi]
- Layering of the Provenance Data for Cloud ComputingMuhammad Imran, Helmut Hlavacs. 48-58 [doi]
- JCL: An OpenCL Programming Toolkit for Heterogeneous ComputingTyng-Yeu Liang, Yu-Jie Lin. 59-72 [doi]
- Network-Aware Multiway Join for MapReduceKenn Slagter, Ching-Hsien Hsu, Yeh-Ching Chung, Jong Hyuk Park. 73-80 [doi]
- Automatic Resource Scaling for Web Applications in the CloudChing-Chi Lin, Jan-Jan Wu, Pangfeng Liu, Jeng-An Lin, Li-Chung Song. 81-90 [doi]
- Implementation of Cloud-RAID: A Secure and Reliable Storage above the CloudsMaxim Schnjakin, Christoph Meinel. 91-102 [doi]
- An Improved Min-Min Task Scheduling Algorithm in Grid ComputingSoheil Anousha, Mahmood Ahmadi. 103-113 [doi]
- Heterogeneous Diskless Remote Booting System on Cloud Operating SystemJin-Neng Wu, Yao-Hsing Ko, Kuo-Ming Huang, Mu-Kai Huang. 114-123 [doi]
- RTRM: A Response Time-Based Replica Management Strategy for Cloud Storage SystemXiaohu Bai, Hai Jin, Xiaofei Liao, Xuanhua Shi, Zhiyuan Shao. 124-133 [doi]
- Secure Hadoop with Encrypted HDFSSeonyoung Park, Youngseok Lee. 134-141 [doi]
- VM Migration for Fault Tolerance in Spot Instance Based Cloud ComputingDaeyong Jung, Sung-Ho Chin, Kwang-Sik Chung, Heon-Chang Yu. 142-151 [doi]
- A Cloud Based Natural Disaster Management SystemMansura Habiba, Shamim Akhter. 152-161 [doi]
- A Hybrid Grid/Cloud Distributed Platform: A Case StudyMohamed Ben Belgacem, Haithem Hafsi, Nabil Abdennadher. 162-169 [doi]
- Comparison of Two Yield Management Strategies for Cloud Service ProvidersMohammad Mahdi Kashef, Azamat Uzbekov, Jörn Altmann, Matthias Hovestadt. 170-180 [doi]
- Comparing Java Virtual Machines for Sensor Nodes - First Glance: Takatuka and DarjeelingOliver Maye, Michael Maaser. 181-188 [doi]
- Research on Opinion Formation of Microblog in the View of Multi-agent SimulationJianyong Zhang, Qihui Mi, Longji Hu, Yue Tang. 189-198 [doi]
- Implementation of Cloud IaaS for Virtualization with Live MigrationChao-Tung Yang, Kuan-Lung Huang, William Cheng-Chung Chu, Fang-Yie Leu, Shao-Feng Wang. 199-207 [doi]
- Security Considerations in Cloud Computing Virtualization EnvironmentSang-Soo Yeo, Jong Hyuk Park. 208-215 [doi]
- Medicine Rating Prediction and Recommendation in Mobile Social NetworksShuai Li, Fei Hao, Mei Li, Hee-Cheol Kim. 216-223 [doi]
- Cloud Browser: Enhancing the Web Browser with Cloud Sessions and Downloadable User InterfaceAntero Taivalsaari, Tommi Mikkonen, Kari Systä. 224-233 [doi]
- Visual Novels: An Methodology Guideline for Pervasive Educational Games that Favors DiscernmentFrancisco Lepe Salazar, Tatsuo Nakajima, Todorka Alexandrova. 234-243 [doi]
- An Optimal Radio Access Network Selection Method for Heterogeneous Wireless NetworksGlaucio H. S. Carvalho, Isaac Woungang, Md Mizanur Rahman, Alagan Anpalagan. 244-252 [doi]
- Desktop Grid Computing at the Age of the WebLeila Abidi, Christophe Cérin, Mohamed Jemni. 253-261 [doi]
- A Novel Model for Greenhouse Control ArchitectureMiran Baek, Myeongbae Lee, Honggean Kim, Taehyung Kim, Namjin Bae, Yongyun Cho, Jangwoo Park, Chang-Sun Shin. 262-269 [doi]
- Enhanced Search in Unstructured Peer-to-Peer Overlay NetworksChittaranjan Hota, Vikram Nunia, Mario Di Francesco, Jukka K. Nurminen, Antti Ylä-Jääski. 270-279 [doi]
- CE-SeMMS: Cost-Effective and Secure Mobility Management Scheme Based on SIP in NEMO EnvironmentsChulhee Cho, Jae Young Choi, Younghwa Cho, Jong Pil Jeong. 280-287 [doi]
- A System-Level Approach for Designing Context-Aware Distributed Pervasive ApplicationsKevin I-Kai Wang, HeeJong Park, Zoran Salcic, Panith Ratnayaka. 288-298 [doi]
- Architecture of a Context Aware Framework for Automated Mobile Device ConfigurationMd. Fazla Rabbi Opu, Emon Biswas, Mansura Habiba, Cheonshik Kim. 299-308 [doi]
- AMM-PF: Additional Mobility Management Scheme Based on Pointer Forwarding in PMIPv6 NetworksSeung Yoon Park, Jae Young Choi, Jong Pil Jeong. 309-316 [doi]
- The Evaluation and Optimization of 3-D Jacobi Iteration on a Stream ProcessorYing Zhang, Gen Li 0002, Yongjin Li, Caixia Sun, Pingjing Lu. 317-325 [doi]
- DDASTM: Ensuring Conflict Serializability Efficiently in Distributed STMYu Zhang, Hai Jin, Xiaofei Liao. 326-335 [doi]
- Research on Log Pre-processing for Exascale System Using Sparse RepresentationLei Zhu, Jianhua Gu, Tianhai Zhao, Yunlan Wang. 336-347 [doi]
- Using Event-Based Style for Developing M2M ApplicationsTruong Giang Le, Olivier Hermant, Matthieu Manceny, Renaud Pawlak, Renaud Rioboo. 348-357 [doi]
- Scheduling Optimization of the RFID Tagged Explosive Storage Based on Genetic AlgorithmXiaoling Wu, Huawei Fu, Xiaomin He, Guangcong Liu, Jianjun Li, Hainan Chen, Qianqiu Wang, Qing He. 358-366 [doi]
- Weighted Mining Association Rules Based Quantity Item with RFM Score for Personalized u-Commerce Recommendation SystemYoung-Sung Cho, Si Choon Noh, Song Chul Moon. 367-375 [doi]
- Priority-Based Live Migration of Virtual MachineBangjie Jiang, Junmin Wu, Xiaodong Zhu, Die Hu. 376-385 [doi]
- Improvement of the MCMA Blind Equalization Performance Using the Coordinate Change Method in 16-APSKYoungguk Kim, Heung-Gyoon Ryu. 386-392 [doi]
- Postural Transition Detection Using a Wireless Sensor Activity Monitoring SystemRichelle LeMay, Sangil Choi, Jong-Hoon Youn, Jay Newstorm. 393-402 [doi]
- A Dedicated Serialization Scheme in Homogeneous Cluster RPC CommunicationYong Wan, Dan Feng, Fang Wang, Tingwei Zhu. 403-412 [doi]
- Friends Based Keyword Search over Online Social NetworksJinzhou Huang, Hai Jin. 413-422 [doi]
- GPU Virtualization Support in Cloud SystemChih-Yuan Yeh, Chung-Yao Kao, Wei-Shu Hung, Ching-Chi Lin, Pangfeng Liu, Jan-Jan Wu, Kuang-Chih Liu. 423-432 [doi]
- MGMR: Multi-GPU Based MapReduceYi Chen 0001, Zhi Qiao, Hai Jiang, Kuan-Ching Li, Won Woo Ro. 433-442 [doi]
- DDoS Analysis Using Correlation Coefficient Based on Kolmogorov ComplexitySung-Ju Kim, Byung-Chul Kim, Jae-Yong Lee. 443-452 [doi]
- An Efficient Attribute-Based Encryption and Access Control Scheme for Cloud Storage EnvironmentJyun-Yao Huang, Cheng-Kang Chiang, I-En Liao. 453-463 [doi]
- Active One-Time Password Mechanism for User AuthenticationChun-I Fan, Chien-Nan Wu, Chi-Yao Weng, Chung-Yu Lin. 464-471 [doi]
- Hardware Acceleration for Cryptography Algorithms by Hotspot DetectionJed Kao-Tung Chang, Chen Liu, Jean-Luc Gaudiot. 472-481 [doi]
- Chaotic Wireless Communication System Using Retrodirective Array Antenna for Advanced High SecurityJunyeong Bok, Heung-Gyoon Ryu. 482-490 [doi]
- Policy-Based Customized Privacy Preserving Mechanism for SaaS ApplicationsYuliang Shi, Zhen Jiang, Kun Zhang. 491-500 [doi]
- QoC-Aware Access Control Based on Fuzzy Inference for Pervasive Computing EnvironmentsYao Ma, Hongwei Lu, Zaobin Gan. 501-508 [doi]
- Per-File Secure Deletion Combining with Enhanced Reliability for SSDsYi Qin, Dan Feng, Wei Tong, Jingning Liu, Yang Hu, Zhiming Zhu. 509-516 [doi]
- An Energy-Aware Secured Routing Protocol for Mobile Ad Hoc Networks Using Trust-Based MultipathIsaac Woungang, Sanjay Kumar Dhurandher, Michael Sahai. 517-525 [doi]
- A Grid-Based Approximate K-NN Query Processing Algorithm for Privacy Protection in Location-Based ServicesMi-Young Jang, Jae-Woo Chang. 526-535 [doi]
- Density-Based K-Anonymization Scheme for Preserving Users' Privacy in Location-Based ServicesHyunjo Lee, Jae-Woo Chang. 536-545 [doi]
- A Routing Mechanism Using Virtual Coordination Anchor Node Apply to Wireless Sensor NetworksChih-Hsiao Tsai, Kai-Ti Chang, Cheng-Han Tsai, Ying-Hong Wang. 546-555 [doi]
- Effect of Genetic Parameters in Tour Scheduling and Recommender Services for Electric VehiclesJunghoon Lee, Gyung-Leen Park, Hye-Jin Kim, Byung Jun Lee, Seulbi Lee, Dae-Yong Im. 556-562 [doi]
- Enabling Massive Machine-to-Machine Communications in LTE-AdvancedKyungkoo Jun. 563-569 [doi]
- Enhancements for Local Repair in AODV-Based Ad-Hoc NetworksHyun-Ho Shin, Seungjin Lee, Byung-Seo Kim. 570-576 [doi]
- Smart Watch and Monitoring System for Dementia PatientsDong-Min Shin, Dongil Shin, Dongkyoo Shin. 577-584 [doi]
- A Lesson from the Development of Surveillance and Reconnaissance Sensor Networks SystemsDaeSik Kim, Seongkee Lee, Mirim Ahn. 585-593 [doi]
- A Classifier Algorithm Exploiting User's Environmental Context and Bio-signal for U-Home ServicesHyunju Lee, Dongil Shin, Dongkyoo Shin, Soohan Kim. 594-601 [doi]
- DNA-S: Dynamic Cellular Network Architecture for Smart CommunicationsTae-Gyu Lee, Gi-Soo Chung. 602-611 [doi]
- Predicting of Abnormal Behavior Using Hierarchical Markov Model Based on User Profile in Ubiquitous EnvironmentJaewan Shin, Dongkyoo Shin, Dongil Shin. 612-622 [doi]
- Advanced Facial Skin Rendering with Actual Fresnel Refractive Index Reflecting Facial Tissue FeaturesSunghee Lee, Seongah Chin. 623-630 [doi]
- Emotion Recognition Technique Using Complex Biomedical Signal AnalysisGuyoun Hwang, Heejun Cho, Dongkyoo Shin, Dongil Shin. 631-640 [doi]
- RWA : Reduced Whole Ack Mechanism for Underwater Acoustic Sensor NetworkSoo Young Shin, Soo-Hyun Park. 641-648 [doi]
- Data Hiding Based on Palette Images Using Weak Bases of Z2-ModulesPhan Trung Huy, Cheonshik Kim, Nguyen Tuan Anh, Le Quang Hoa, Ching-Nung Yang. 649-658 [doi]
- Adaptive Smart Vehicle Middleware Platform for Aspect Oriented Software EngineeringJin-Hong Kim, Seung-Cheon Kim. 659-664 [doi]
- Parallel Generation of Optimal Mortgage Refinancing Threshold RatesNan Zhang, Dejun Xie, Eng Gee Lim, Kaiyu Wan, Ka Lok Man. 665-675 [doi]
- Pricing American Options on Dividend-Paying Stocks and Estimating the Greek Letters Using Leisen-Reimer Binomial TreesNan Zhang, Kaiyu Wan, Eng Gee Lim, Ka Lok Man. 676-685 [doi]
- A Resource-Centric Architecture for Service-Oriented Cyber Physical SystemKaiyu Wan, Vangalur S. Alagar. 686-693 [doi]
- Implied Volatilities of S&P 100 Index with Applications to Financial MarketJin Zheng, Nan Zhang, Dejun Xie. 694-699 [doi]
- RF Characteristics of Wireless Capsule Endoscopy in Human BodyMeng Zhang, Eng Gee Lim, Zhao Wang, Tammam Tillo, Ka Lok Man, Jing Chen Wang. 700-706 [doi]
- Building a Laboratory Surveillance System via a Wireless Sensor NetworkChi-Un Lei, J. K. Seon, Zhun Shen, Ka Lok Man, Danny Hughes, Youngmin Kim. 707-714 [doi]
- S-Theory: A Unified Theory of Multi-paradigm Software DevelopmentDanny Hughes, Nelly Bencomo, Brice Morin, Christophe Huygens, Zhun Shen, Ka Lok Man. 715-722 [doi]
- Design of J-VTS Middleware Based on IVEF ProtocolTaekyeong Kang, Namje Park. 723-729 [doi]
- On the Use of a Hash Function in a 3-Party Password-Based Authenticated Key Exchange ProtocolYoungsook Lee, Dongho Won. 730-736 [doi]
- A Sequence Classification Model Based on Pattern Coverage RateI-Hui Li, Jyun-Yao Huang, I-En Liao, Jin-Han Lin. 737-745 [doi]
- Development of STEAM Program and Teaching Method for Using LEGO Line Tracer Robot in Elementary SchoolYeonghae Ko, Namje Park. 746-751 [doi]
- Improved Authentication Scheme with Anonymity for Roaming Service in Global Mobility NetworksYoungseok Chung, Youngsook Lee, Dongho Won. 752-760 [doi]
- Cryptanalysis of an Authenticated Group Key Transfer Protocol Based on Secret SharingMijin Kim, Namje Park, Dongho Won. 761-766 [doi]
- Development of the STEAM-Based Media Education Materials for Prevention of Media Dysfunction in Elementary SchoolJaeho An, Namje Park. 767-772 [doi]
- Access Control Technique of Illegal Harmful Contents for Elementary Schoolchild Online ProtectionNamje Park, Yeonghae Ko. 773-780 [doi]
- The Concept of Delegation of Authorization and Its Expansion for Multi Domain Smart Grid SystemMijin Kim, Namje Park. 781-787 [doi]
- Security Requirement of End Point Security SoftwareHyun Jung Lee, Youngsook Lee, Dongho Won. 788-795 [doi]
- Collecting and Filtering Out Phishing Suspicious URLs Using SpamTrap SystemInkyung Jeun, Youngsook Lee, Dongho Won. 796-802 [doi]
- Improvement of a Chaotic Map Based Key Agreement Protocol That Preserves AnonymityHyunsik Yang, Jin Qiuyan, HanWook Lee, Kwang-Woo Lee, Dongho Won. 803-810 [doi]
- Solving Router Nodes Placement Problem with Priority Service Constraint in WMNs Using Simulated AnnealingChun-Cheng Lin, Yi-Ling Lin, Wan-Yu Liu. 811-818 [doi]
- Topology Information Based Spare Capacity Provisioning in WDM NetworksHoyoung Hwang, Seungcheon Kim. 819-825 [doi]
- A Contents Service Profit Model Based on the Quality of Experience and User Group CharacteristicsGoo Yeon Lee, Hwa Jong Kim, Choong Kyo Jeong, Yong Lee. 826-831 [doi]
- Toward Hybrid Model for Architecture-Oriented Semantic Schema of Self-adaptive SystemJin-Hong Kim, Seung-Cheon Kim. 832-837 [doi]
- Optimal Channel Sensing in Cognitive Radio Network with Multiple Secondary UsersHeejung Yu. 838-845 [doi]
- H.264 Video Delivery over Wireless Mesh Networks Based on Joint Adaptive Cross-Layer Mapping and MDCA MACByung Joon Oh, Ki-Young Lee. 846-853 [doi]
- Automatic Tracking Angle of Arrival of Bandpass Sampling OFDM Signal by MUSIC AlgorithmXin Wang, Heung-Gyoon Ryu. 854-859 [doi]
- A White-List Based Security Architecture (WLSA) for the Safe Mobile Office in the BYOD EraJaeho Lee, Yongjin Lee, Seung-Cheon Kim. 860-865 [doi]
- A Study of Vessel Deviation Prevention Scheme Using a Triangulation in a SeawayShu Chen, Rashid Ahmad, Byung Gil Lee, Byung Doo Kim, Do-Hyeun Kim. 866-872 [doi]
- Analysis of Energy Consumption in Edge Router with Sleep Mode for Green OBS NetworksWon-Hyuk Yang, Mohamed A. Ahmed, Ki-Beom Lee, Young-Chon Kim. 873-879 [doi]
- VLC Based Multi-hop Audio Data Transmission SystemLe The Dung, Seungwan Jo, Beongku An. 880-885 [doi]
- A Practical Adaptive Scheme for Enhancing Network Stability in Mobile Ad-Hoc Wireless NetworksLe The Dung, Sue Hyung Ha, Beongku An. 886-892 [doi]
- A Geomulticast Routing Protocol Based on Route Stability in Mobile Ad-Hoc Wireless NetworksSue Hyung Ha, Le The Dung, Beongku An. 893-898 [doi]
- RFID-Based Indoor Location Recognition System for Emergency Rescue Evacuation SupportDae-Man Do, Maeng-Hwan Hyun, Young-Bok Choi. 899-906 [doi]
- A Symmetric Hierarchical Clustering Related to the Sink Position and Power Threshold for Sensor NetworksJoongjin Kook. 907-913 [doi]
- A Study of Fire Refuge Guide Simulator Based on Sensor NetworksJun-Pill Boo, Sang-Chul Kim, Dong-Hwan Park, Hyo-Chan Bang, Do-Hyeun Kim. 914-919 [doi]
- Design of Parallel Pipelined Algorithm for Field Arithmetic Architecture Based on Cellular ArrayKee-Won Kim, Jun-Cheol Jeon. 920-925 [doi]
- Follower Classification through Social Network Analysis in TwitterJae-Wook Seol, Kwang-Yong Jeong, Kyung-Soon Lee. 926-931 [doi]
- An Initial Quantization Parameter Decision Method Based on Frame Complexity with Multiple Objectives of GOP for Rate Control of H.264Yalin Wu, Sun-Woo Ko. 932-938 [doi]
- The Development of Privacy Telephone Sets in Encryption System against EavesdroppingSeok-Pil Lee, Eui-Seok Nahm. 939-944 [doi]
- New ID-Based Proxy Signature Scheme with Message RecoveryEun-Jun Yoon, Yongsoo Choi, Cheonshik Kim. 945-951 [doi]