-
1
-
Transparency in Cloud Business: Cluster Analysis of Software as a Service Characteristics
-
11
-
Distributed Accounting in Scope of Privacy Preserving
-
23
-
Distributed Virtual Machine Monitor for Distributed Cloud Computing Nodes Integration
-
32
-
Differentiated Policy Based Job Scheduling with Queue Model and Advanced Reservation Technique in a Private Cloud Environment
-
40
-
Scaling Out Recommender System for Digital Libraries with MapReduce
-
48
-
Layering of the Provenance Data for Cloud Computing
-
59
-
JCL: An OpenCL Programming Toolkit for Heterogeneous Computing
-
73
-
Network-Aware Multiway Join for MapReduce
-
81
-
Automatic Resource Scaling for Web Applications in the Cloud
-
91
-
Implementation of Cloud-RAID: A Secure and Reliable Storage above the Clouds
-
103
-
An Improved Min-Min Task Scheduling Algorithm in Grid Computing
-
114
-
Heterogeneous Diskless Remote Booting System on Cloud Operating System
-
124
-
RTRM: A Response Time-Based Replica Management Strategy for Cloud Storage System
-
134
-
Secure Hadoop with Encrypted HDFS
-
142
-
VM Migration for Fault Tolerance in Spot Instance Based Cloud Computing
-
152
-
A Cloud Based Natural Disaster Management System
-
162
-
A Hybrid Grid/Cloud Distributed Platform: A Case Study
-
170
-
Comparison of Two Yield Management Strategies for Cloud Service Providers
-
181
-
Comparing Java Virtual Machines for Sensor Nodes
-
189
-
Research on Opinion Formation of Microblog in the View of Multi-agent Simulation
-
199
-
Implementation of Cloud IaaS for Virtualization with Live Migration
-
208
-
Security Considerations in Cloud Computing Virtualization Environment
-
216
-
Medicine Rating Prediction and Recommendation in Mobile Social Networks
-
224
-
Cloud Browser: Enhancing the Web Browser with Cloud Sessions and Downloadable User Interface
-
234
-
Visual Novels: An Methodology Guideline for Pervasive Educational Games that Favors Discernment
-
244
-
An Optimal Radio Access Network Selection Method for Heterogeneous Wireless Networks
-
253
-
Desktop Grid Computing at the Age of the Web
-
262
-
A Novel Model for Greenhouse Control Architecture
-
270
-
Enhanced Search in Unstructured Peer-to-Peer Overlay Networks
-
280
-
CE-SeMMS: Cost-Effective and Secure Mobility Management Scheme Based on SIP in NEMO Environments
-
288
-
A System-Level Approach for Designing Context-Aware Distributed Pervasive Applications
-
299
-
Architecture of a Context Aware Framework for Automated Mobile Device Configuration
-
309
-
AMM-PF: Additional Mobility Management Scheme Based on Pointer Forwarding in PMIPv6 Networks
-
317
-
The Evaluation and Optimization of 3-D Jacobi Iteration on a Stream Processor
-
326
-
DDASTM: Ensuring Conflict Serializability Efficiently in Distributed STM
-
336
-
Research on Log Pre-processing for Exascale System Using Sparse Representation
-
348
-
Using Event-Based Style for Developing M2M Applications
-
367
-
Weighted Mining Association Rules Based Quantity Item with RFM Score for Personalized u-Commerce Recommendation System
-
376
-
Priority-Based Live Migration of Virtual Machine
-
386
-
Improvement of the MCMA Blind Equalization Performance Using the Coordinate Change Method in 16-APSK
-
393
-
Postural Transition Detection Using a Wireless Sensor Activity Monitoring System
-
403
-
A Dedicated Serialization Scheme in Homogeneous Cluster RPC Communication
-
413
-
Friends Based Keyword Search over Online Social Networks
-
423
-
GPU Virtualization Support in Cloud System
-
433
-
MGMR: Multi-GPU Based MapReduce
-
443
-
DDoS Analysis Using Correlation Coefficient Based on Kolmogorov Complexity
-
453
-
An Efficient Attribute-Based Encryption and Access Control Scheme for Cloud Storage Environment
-
464
-
Active One-Time Password Mechanism for User Authentication
-
472
-
Hardware Acceleration for Cryptography Algorithms by Hotspot Detection
-
482
-
Chaotic Wireless Communication System Using Retrodirective Array Antenna for Advanced High Security
-
491
-
Policy-Based Customized Privacy Preserving Mechanism for SaaS Applications
-
501
-
QoC-Aware Access Control Based on Fuzzy Inference for Pervasive Computing Environments
-
509
-
Per-File Secure Deletion Combining with Enhanced Reliability for SSDs
-
517
-
An Energy-Aware Secured Routing Protocol for Mobile Ad Hoc Networks Using Trust-Based Multipath
-
526
-
A Grid-Based Approximate K-NN Query Processing Algorithm for Privacy Protection in Location-Based Services
-
536
-
Density-Based K-Anonymization Scheme for Preserving Users’ Privacy in Location-Based Services
-
546
-
A Routing Mechanism Using Virtual Coordination Anchor Node Apply to Wireless Sensor Networks
-
556
-
Effect of Genetic Parameters in Tour Scheduling and Recommender Services for Electric Vehicles
-
563
-
Enabling Massive Machine-to-Machine Communications in LTE-Advanced
-
570
-
Enhancements for Local Repair in AODV-Based Ad-Hoc Networks
-
577
-
Smart Watch and Monitoring System for Dementia Patients
-
585
-
A Lesson from the Development of Surveillance and Reconnaissance Sensor Networks Systems
-
594
-
A Classifier Algorithm Exploiting User’s Environmental Context and Bio-signal for U-Home Services
-
602
-
DNA-S: Dynamic Cellular Network Architecture for Smart Communications
-
612
-
Predicting of Abnormal Behavior Using Hierarchical Markov Model Based on User Profile in Ubiquitous Environment
-
623
-
Advanced Facial Skin Rendering with Actual Fresnel Refractive Index Reflecting Facial Tissue Features
-
631
-
Emotion Recognition Technique Using Complex Biomedical Signal Analysis
-
641
-
RWA : Reduced Whole Ack Mechanism for Underwater Acoustic Sensor Network
-
649
-
Data Hiding Based on Palette Images Using Weak Bases of Z<Subscript>2</Subscript>-Modules
-
659
-
Adaptive Smart Vehicle Middleware Platform for Aspect Oriented Software Engineering
-
665
-
Parallel Generation of Optimal Mortgage Refinancing Threshold Rates
-
676
-
Pricing American Options on Dividend-Paying Stocks and Estimating the Greek Letters Using Leisen-Reimer Binomial Trees
-
686
-
A Resource-Centric Architecture for Service-Oriented Cyber Physical System
-
694
-
Implied Volatilities of S&P 100 Index with Applications to Financial Market
-
700
-
RF Characteristics of Wireless Capsule Endoscopy in Human Body
-
707
-
Building a Laboratory Surveillance System via a Wireless Sensor Network
-
715
-
S-Theory: A Unified Theory of Multi-paradigm Software Development
-
723
-
Design of J-VTS Middleware Based on IVEF Protocol
-
730
-
On the Use of a Hash Function in a 3-Party Password-Based Authenticated Key Exchange Protocol
-
737
-
A Sequence Classification Model Based on Pattern Coverage Rate
-
746
-
Development of STEAM Program and Teaching Method for Using LEGO Line Tracer Robot in Elementary School
-
752
-
Improved Authentication Scheme with Anonymity for Roaming Service in Global Mobility Networks
-
761
-
Cryptanalysis of an Authenticated Group Key Transfer Protocol Based on Secret Sharing
-
767
-
Development of the STEAM-Based Media Education Materials for Prevention of Media Dysfunction in Elementary School
-
773
-
Access Control Technique of Illegal Harmful Contents for Elementary Schoolchild Online Protection
-
781
-
The Concept of Delegation of Authorization and Its Expansion for Multi Domain Smart Grid System
-
788
-
Security Requirement of End Point Security Software
-
796
-
Collecting and Filtering Out Phishing Suspicious URLs Using SpamTrap System
-
803
-
Improvement of a Chaotic Map Based Key Agreement Protocol That Preserves Anonymity
-
811
-
Solving Router Nodes Placement Problem with Priority Service Constraint in WMNs Using Simulated Annealing
-
819
-
Topology Information Based Spare Capacity Provisioning in WDM Networks
-
826
-
A Contents Service Profit Model Based on the Quality of Experience and User Group Characteristics
-
832
-
Toward Hybrid Model for Architecture-Oriented Semantic Schema of Self-adaptive System
-
838
-
Optimal Channel Sensing in Cognitive Radio Network with Multiple Secondary Users
-
846
-
H.264 Video Delivery over Wireless Mesh Networks Based on Joint Adaptive Cross-Layer Mapping and MDCA MAC
-
854
-
Automatic Tracking Angle of Arrival of Bandpass Sampling OFDM Signal by MUSIC Algorithm
-
860
-
A White-List Based Security Architecture (WLSA) for the Safe Mobile Office in the BYOD Era
-
866
-
A Study of Vessel Deviation Prevention Scheme Using a Triangulation in a Seaway
-
873
-
Analysis of Energy Consumption in Edge Router with Sleep Mode for Green OBS Networks
-
880
-
VLC Based Multi-hop Audio Data Transmission System