Abstract is missing.
- Effective data collection scheme by mobile agent over Wireless Sensor NetworkTakaaki Suetsugu, Shunya Matsunaga, Takayuki Torikai, Hiroshi Furukawa. 1-6 [doi]
- ProbT: A temporal probabilistic protocol to mitigate the broadcast storm problem in VANETsDaniel Sucupira Lima, Manoel Rui P. Paula, Filipe Maciel Roberto, André Ribeiro Cardoso, Joaquim Celestino Júnior. 7-12 [doi]
- A role-based routing solution for MANET to support hierarchical rescue teams in emergency scenariosGabriela Coutinho, Judith Kelner, Rafael Aschoff, Eduardo Feitosa. 13-18 [doi]
- Affordable 400MHz long-haul sensor network for greenhouse horticultureMasahiro Kuroda, Hirofumi Ibayashi, Hiroshi Mineno. 19-24 [doi]
- Application of the lowest-ID algorithm in cluster-based TDMA system for VANETsVandung Nguyen, Oanh Tran Thi Kim, Duc Ngoc Minh Dang, Sung-Soo Kim, Choong Seon Hong. 25-30 [doi]
- A secure three-party authenticated key exchange protocol based on extended chaotic maps in cloud storage serviceChun-Ta Li, Chin-Wen Lee, Jau-Ji Shen. 31-36 [doi]
- Secured node-to-node key agreement for wireless sensor networksJaruwan Mesit, Matthias R. Brust. 37-39 [doi]
- Defending flooding attack in Delay Tolerant NetworksPreeti Nagrath, Sandhya Aneja, G. N. Purohit. 40-45 [doi]
- Analysis on end-to-end node selection probability in Tor networkSaurav Dahal, JungHee Lee, JungMin Kang, Seokjoo Shin. 46-50 [doi]
- User authentication using mobile phones for mobile paymentSoonhwa Sung, Cheong Youn, Eunbae Kong, Jaecheol Ryou. 51-56 [doi]
- A traffic flow theory based density adopted emergency message dissemination scheme for vehicular ad hoc networksDongxu Jin, Fei Shi, JooSeok Song. 57-62 [doi]
- A Distributed Bayesian Algorithm for data fault detection in wireless sensor networksHao Yuan, Xiaoxia Zhao, Liyang Yu. 63-68 [doi]
- A cost-effective scheme for restoring connectivity of disconnected WSNsDajin Wang, Juncheng Jia, Liwei Lin. 69-74 [doi]
- Mobile agent based secure code update in wireless sensor networksM. B. Nirmala, A. S. Manjunath. 75-80 [doi]
- Multi-channel MAC protocol with Directional Antennas in wireless ad hoc networksDuc Ngoc Minh Dang, Huong Tra Le, Hyo-Sung Kang, Choong Seon Hong, Jongwon Choe. 81-86 [doi]
- Identity-based access control for digital content based on ciphertext-policy attribute-based encryptionWin-Bin Huang, Wei-Tsung Su. 87-91 [doi]
- An efficient defense mechanism for spoofed IP attack in SDN based CDNiNishat I. Mowla, Inshil Doh, Kijoon Chae. 92-97 [doi]
- Selective-encrypted GIS vector map with low complexityJin-Hyeok Park, Pham Ngoc Giao, Teak-Young Seung, Ki-Ryong Kwon, Kwang-Seok Moon, Gi-Chang Kwon, Suk Hwan Lee. 98-103 [doi]
- Detection of Android ad library focusing on HTTP connections and view object redraw behaviorsNaoya Kajiwara, Junpei Kawamoto, Shinichi Matsumoto, Yoshiaki Hori, Kouichi Sakurai. 104-109 [doi]
- Key management mechanism in ALTO/SDN based CDNi architectureShi Li, Inshil Doh, Kijoon Chae. 110-115 [doi]
- Mobile interface control scheme can extend battery lifeSuguru Doki, Tomohiko Ogishi, Shigehiro Ano. 116-121 [doi]
- A performance simulator for DDS networksChul-Hwan Kim, Gunjae Yoon, Wonjoon Lee, Jungdo Park, Hoon Choi. 122-126 [doi]
- An accountability model for Internet transactionsChian Techapanupreeda, Roongroj Chokngamwong, Chalee Thammarat, Supakorn Kungpisdan. 127-132 [doi]
- A secure lightweight protocol for NFC communications with mutual authentication based on limited-use of session keysChalee Thammarat, Roongroj Chokngamwong, Chian Techapanupreeda, Supakorn Kungpisdan. 133-138 [doi]
- Development strategy of disaster-resistant WiFi mesh networks and the disaster monitoring and reporting system in a local areaMakoto Sugita, Hideaki Matsue, Kazuhiro Yamaguchi, Tomohiko Shimodaira, Manabu Shirotori, Satoshi Nanamatsu. 139-144 [doi]
- Features extraction of fluorescent light image for positioning information acquisition using steerable Gaussian filterJun Woo Kim, Min-Woo Lee, Soon-Ho Jung, Ju-Phil Cho, Jae Sang Cha. 145-147 [doi]
- An energy-saving small-cell zooming scheme for two-tier hybrid cellular networksYao-Liang Chung. 148-152 [doi]
- A D2D cooperative relay scheme for machine-to-machine communication in the LTE-A cellular networkRung-Shiang Cheng, Chung-Ming Huang, Guan-Shiun Cheng. 153-158 [doi]
- Resource management issues in 5G ultra dense smallcell networksMing-Chin Chuang, Meng Chang Chen, Yeali S. Sun. 159-164 [doi]
- LTE-advanced based handover mechanism for natural disaster situationsSayan Kumar Ray, Nurul I. Sarkar, Devatanu Deka, Swapan Kumar Ray. 165-170 [doi]
- Joint pricing and power allocation for uplink macrocell and femtocell cooperationTuan LeAnh, Nguyen H. Tran, S. M. Ahsan Kazmi, Thant Zin Oo, Choong Seon Hong. 171-176 [doi]
- A system model for energy efficient green-IoT networkSarder Fakhrul Abedin, Md. Golam Rabiul Alam, Rim Haw, Choong Seon Hong. 177-182 [doi]
- Energy efficient gathering of delay tolerant sensing data in wireless sensor networksKeon-Taek Lee, Sunju Park, Seung-Jae Han. 183-188 [doi]
- A study of G.711 and ILBC over WLAN 802.11n with EDCARittichai Chanthong, Pongpisit Wuttidittachotti, Therdpong Daengsi. 189-193 [doi]
- Location-aware utility-based routing for store-carry-forward message deliveryTomotaka Kimura, Tsubasa Matsuura, Masahiro Sasabe, Takahiro Matsuda, Tetsuya Takine. 194-199 [doi]
- Indoor localization for sparse wireless networks with heterogeneous informationHu Li, Yao-Hui Wang, Qi-ming Sun, Jin-Nan Liu. 200-204 [doi]
- Comparison of video telephony: A case study of LINE and Tango over 3G in BangkokPatsita Sirawongphatsara, Pongpisit Wuttidittachotti, Therdpong Daengsi. 205-209 [doi]
- OPF: Open Preference and Feature recommender systemWen-Ching Lin, Huey-Ing Liu. 210-215 [doi]
- Dynamic load balancing for efficient video streaming serviceJunyeop Kim, Youjip Won. 216-221 [doi]
- Rate adaptation scheme for HTTP-based streaming to achieve fairness with competing TCP trafficJiwoo Park, Kwangsue Chung. 222-226 [doi]
- An efficient flow classification algorithm in Software-Defined NetworkingSeungbum Ju, Kyoungtaek Lee, Jonghun Kim, Jaiyong Lee. 227-232 [doi]
- Design intelligence of web application for Internet direct consumer-to-consumer tradingVincent Chan, Tony Hao Wu, Grantham Pang. 233-237 [doi]
- Non-link switching issue for broadcasting visible light communicationNam Tuan Le, Yeong Min Jang. 238-241 [doi]
- Transmission performance evaluation for downlink MU-MIMO system: Computer simulation with Block Diagonalization algorithm and field experiments based on mobile WiMAX systemKazuhiro Yamaguchi, Takaharu Nagahashi, Takuya Akiyama, Hideaki Matsue, Kunio Uekado, Takakazu Namera, Hiroshi Fukui, Satoshi Nanamatsu. 242-247 [doi]
- Mobility-aware time delay compensation algorithm for mobile OFDM systemsSungoh Kwon, Neung-Hyung Lee, Sungyoon Jung, Sangchul Oh. 248-252 [doi]
- Adaptive step control of LMS-based Interference Cancellation for WMAN ICS radio repeaterJeong Gon Kim, Won Geon Bae. 253-258 [doi]
- A searching tree-based channel assignment scheme for wireless networksXinyu Yang, Linqi Li, Wei Liu. 259-264 [doi]
- Wireless network performance evaluation through emulation: WiMAX case studyRazvan Beuran, Muhammad Imran Tariq, Shinsuke Miwa, Yoichi Shinoda. 265-270 [doi]
- Federation-less federation of ProtoGENI and VNode platformsYasusi Kanada, Toshiaki Tarui. 271-276 [doi]
- Performance analysis of fast tracking equalization for SC-FDMA and OFDM systems under multipath fading environmentKazuhiro Yamaguchi, Takuya Akiyama, Takahiro Yamaguchi, Takaharu Nagahashi, Hideaki Matsue. 277-282 [doi]
- GFlow: Towards GPU-based high-performance table matching in OpenFlow switchesKun Qiu, Zhe Chen, Yang Chen, Jin Zhao, Xin Wang. 283-288 [doi]
- SDN + cloud integrated control with statistical analysis and discrete event simulationSeiichi Koizumi, Masaya Fujiwaka. 289-294 [doi]
- A general and practical consolidation framework in CloudNFVChuan Pham, Dai Hoang Tran, Seung-Il Moon, Kyi Thar, Choong Seon Hong. 295-300 [doi]
- Centralized ARP proxy server over SDN controller to cut down ARP broadcast in large-scale data center networksHyunjeong Cho, Saehoon Kang, Younghee Lee. 301-306 [doi]
- CoopRED: Cooperative RED for software defined networksSeongyun Jeong, Younghoon Kim, Donghyeok An, Ikjun Yeom. 307-308 [doi]
- A feasible method to combat against DDoS attack in SDN networkNhu-Ngoc Dao, Junho Park, Minho Park, Sungrae Cho. 309-311 [doi]
- Mergeable flexible routing tables: A design framework for reusable structured overlay algorithmsHiroya Nagao, Kazuyuki Shudo. 312-317 [doi]
- Adaptive routing for video streaming with QoS support over SDN networksTsung-Feng Yu, Kuochen Wang, Yi-Huai Hsu. 318-323 [doi]
- A proximal algorithm for joint resource allocation and minimizing carbon footprint in geo-distributed fog computingCuong T. Do, Nguyen H. Tran, Chuan Pham, Md. Golam Rabiul Alam, Jae Hyeok Son, Choong Seon Hong. 324-329 [doi]
- Efficient forwarding and popularity based caching for Content Centric NetworkKyi Thar, Thant Zin Oo, Chuan Pham, Saeed Ullah, Doo Ho Lee, Choong Seon Hong. 330-335 [doi]
- Network independent mobility management scheme using virtual IP addressingYongseung Lee, Hyunseung Choo, Dongsoo S. Kim. 336-339 [doi]
- Adaptive beaconing schemes in VANETs: Hybrid approachSyed Hassan Ahmed, Safdar Hussain Bouk, Dongkyun Kim. 340-345 [doi]
- Design of Exhibition contents using swipe gesture recognition communication based on KinectYi-Yoen Kim, Min-Woo Lee, Joo-Yong Park, Soon-Ho Jung, Kyung-Hoon Kim, Jae Sang Cha. 346-347 [doi]
- Considerations and design on apps for elderly with mild-to-moderate dementiaGrantham Kwok-Hung Pang, Enid Kwong. 348-353 [doi]
- Inter-symbol interference compensation for bit patterned media recording storageSeongkwon Jeong, Oh-Soon Shin, Chulhun Seo, Jaejin Lee. 354-355 [doi]
- A research on the QR Code recognition improvement using the cloud-based pre-generated image matching schemeMisun Ahn, Seunghyun Hong, Sungwon Lee. 356-357 [doi]
- Media synchronization model based on relation flow for Multi-Screen serviceSvetlana Kim, Yong-Ik Yoon. 358-362 [doi]
- New interpolation method based on combination of Discrete cosine transform and wavelet transformRamesh Kumar Lama, Goo-Rak Kwon. 363-366 [doi]
- Multimedia delivery mechanism framework for smart devices based on mega data center and micro data center in PMIPv6 environmentAymen Abdullah Alsaffar, Eui-nam Huh. 367-368 [doi]
- Practical design of Screen-to-Camera based Optical Camera CommunicationTrang Nguyen, Nam Tuan Le, Yeong Min Jang. 369-374 [doi]
- Effective bandwidth measurement for Dynamic Adaptive Streaming over HTTPJong-Min Jeong, Jongdeok Kim. 375-378 [doi]
- Transmission model for next-generation digital broadcasting systemsHyung-Yoon Seo, Byungjun Bae, Jongdeok Kim. 379-380 [doi]
- A synchronized playback method with dynamic buffering time awareness for media streamingKisu Ok, Dongwoo Kwon, Hyeonwoo Kim, Huigwang Je, Taeyoung Kim, Hongtaek Ju. 381-385 [doi]
- A simulation approach for analysis of multi-hop connectivity in cognitive radio ad-hoc networksLe The Dung, Beongku An. 386-387 [doi]
- Power allocation scheme for D2D communications in an OFDM-based cellular systemGil-Mo Kang, Jaejin Lee, Oh-Soon Shin. 388-389 [doi]
- Hybrid Cooperative Spectrum Sensing scheme for Cognitive Radio NetworksNhu Tri Do, Beongku An. 390-391 [doi]
- Mitigation of the polarization sensitivity in OFDMA PON uplink transmissionSang-Min Jung, Kyung-Hak Mun, Sang-Kook Han. 392-394 [doi]
- Power control for cognitive users in coexistence with CSMA-based primary networksKwanhee Jeong, Hyuk Lim, Hyunduk Kang. 395-396 [doi]
- A novel medium access scheme for cluster based Device-to-Device broadcast communicationsJun Suk Kim, Jaheon Gu, Min Young Chung, June S. Hong. 397-401 [doi]
- A design of 10 Gigabit Capable Passive Optical Network(XG-PON1) architecture based on Software Defined Network(SDN)Youngsuk Lee, Younghan Kim. 402-404 [doi]
- The performance evaluation of k-means by two MapReduce frameworks, Hadoop vs. TwisterYunHee Kang, Young B. Park. 405-406 [doi]
- A hybrid service discovery approach to mitigate overhead concentration on resource directoryYoona Kim, Ki-Hyung Kim, Taeshik Shon, Jai-Hoon Kim. 407-409 [doi]
- Critical-path aware broadcast scheduling in duty-cycled Wireless Sensor NetworksGiyeol Im, Duc Tai Le, Hyunseung Choo, Dongsoo S. Kim. 410-411 [doi]
- A research on transmission of message and voice using CCNxCheolhoon Kim, Sangyoon Han, Sungwon Lee. 412-413 [doi]
- Content verification in Named Data NetworkingSunWook Nam, Do-Hyung Kim, Ikjun Yeom. 414-415 [doi]
- ICN-OMF: A control, management framework for Information-Centric Network testbedHyunWoo Lee, Donghyun Kim, Junho Suh, Ted Kwon. 416-417 [doi]
- Autonomous handoff management of heterogeneous wireless links using SDNYumi Oh, Sungwon Lee. 418-419 [doi]
- Assessing the impact of resource attack in Software Defined NetworkHiep T. Nguyen Tri, Kyungbaek Kim. 420-425 [doi]
- RAON: A recursive abstraction of SDN control-plane for large-scale production networksMyungchul Kwak, HyunWoo Lee, Jisoo Shin, Junho Suh, Ted Kwon. 426-427 [doi]
- Cloud-based service function chaining with distributed VMs and its underlay-aware improvementTaeheum Na, JongWon Kim. 428-429 [doi]
- A refinement algorithm for rank aggregation over crowdsourced comparison dataNarae Hwang, Sanghwan Lee. 430-432 [doi]
- Phoneme based realtime taboo words similarity browsing system of new words using multi-lingual taboo words databases in web environmentsSaim Shin, Dalwon Jang, Jong-Soel Lee, Da-Hee Kim, Sukhan Yoon. 433-434 [doi]
- Efficient bloom filter design for information hiding in peer to peer social networksNarae Hwang, Sanghwan Lee. 435-436 [doi]
- A measurement model for trustworthiness of information on social network servicesYukyong Kim, Eun-Wha Jhee, Jongwon Choe, Jong-Seok Choi, Yongtae Shin. 437-438 [doi]
- Prediction model for mental and physical health condition using risk ratio EMYuchae Jung, Yongik Yoon. 439-443 [doi]
- Behavior tracking model in dynamic situation using the risk ratio EMYuchae Jung, Yongik Yoon. 444-448 [doi]
- IoT service framework based on mega data center and micro data center in PMIPv6 environment for smart devicesAymen Abdullah Alsaffar, Eui-nam Huh. 449-450 [doi]
- E-government Service The Case of E-tax filing in ThailandNakanya Chumsombat. 451-455 [doi]
- Design of a compact UWB antenna for multi-band wireless applicationsMartins. C. Ezuma, Santosh Subedi, Jae-Young Pyun. 456-461 [doi]
- Designing multi-level connectivity for IoT-enabled SmartX BoxesJongWon Kim. 462-463 [doi]
- DLNA protocol analysis tool for smart device interoperability testYong-Suk Park, Se-Ho Park, Kyung-Taek Lee, Myung-Hyun Yoon. 464-465 [doi]
- Research about relation of music preference and brain-waveDalwon Jang, Yoon Jung Park, Saim Shin, Jong-Seol Lee, Sei-Jin Jang, Tae-Beom Lim. 466-467 [doi]
- Deanonymizing schemes of hidden services in tor network: A surveySabita Nepal, Saurav Dahal, Seokjoo Shin. 468-473 [doi]
- Potentialities and challenges of VLC based outdoor positioningTrong-Hop Do, Myungsik Yoo. 474-477 [doi]
- An improved NLOS detection scheme using stochastic characteristics for indoor localizationManato Horiba, Eiji Okamoto, Toshiko Shinohara, Katsuhiko Matsumura. 478-482 [doi]
- Prediction technique for resource allocation in Micro Data CenterCong-Thinh Huynh, Eui-nam Huh. 483-486 [doi]
- Ethernet switch/terminal simulators for novices to learn computer networksYasusi Kanada. 487-492 [doi]
- Homomorphic encryption in mobile multi cloud computingMaya Louk, Hyotaek Lim. 493-497 [doi]
- Cryptanalysis of an anonymous multi-server authenticated key agreement scheme using smart cards and biometricsChun-Ta Li, Cheng-Chi Lee, Hua-Hsuan Chen, Min-Jie Syu, Chun-Cheng Wang. 498-502 [doi]
- Detecting and tracing leaked private phone number data in Android smartphonesWooguil Pak, Youngrok Cha, Sunki Yeo. 503-508 [doi]
- Ontology based location reasoning method using smart phone dataSang-Il Kim, Hwa-sung Kim. 509-514 [doi]
- Influence of the constellations selection on the bit/power loading in DMT modulationJerzy Siuzdak, Lukasz Maksymiuk. 515-518 [doi]
- RF performance of InGaAs-based T-gate junctionless field-effect transistors which applicable for high frequency network systemsJae Hwa Seo, Young Jun Yoon, Sung Yoon Kim, Young-Jae Kim, In Man Kang. 519-520 [doi]
- A multipath routing protocol based on bloom filter for multi-hop wireless networksJunwei Jin, Sang-Hyun Ahn, Hayoung Oh. 521-522 [doi]
- Enhanced PRoPHET routing protocol that considers contact duration in DTNsHo-Jong Lee, Jae-Choong Nam, Won-Kyeong Seo, You Ze Cho, Soong Hee Lee. 523-524 [doi]
- Contribution-level-based opportunistic flooding for wireless multihop networksSeung-Kyu Byun, Hyeong-Yun Seo, Jong-Deok Kim. 525-528 [doi]
- Analaysis of bit error in wireless LANJongmin Lee, Donghyeok An, Ikjun Yeom. 529-530 [doi]
- IASS: An intelligence access selection scheme for heterogeneous networksBo Hu, Ning Li, Jingjing Zhang. 531-536 [doi]
- Knowledge driven composition model for WoO based self-directed smart learning environmentKwanghyeon Jeong, Hwa-Suk Kim, Ilyoung Chong. 537-540 [doi]
- Improving packet header compression with adaptive sliding window sizeHyejin Cha, Taeshik Shon, Kangseok Kim, Manpyo Hong. 541-543 [doi]
- Comparison of Frequency-domain block FxLMS and FxNLMSYoon Jung Park, Sei-Jin Jang, Dalwon Jang. 544-545 [doi]