![](https://dblp.uni-trier.de/img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://fanyv88.com/img/search.dark.16x16.png)
default search action
28th AINA 2014: Victoria, BC, Canada
- Leonard Barolli, Kin Fun Li, Tomoya Enokido, Fatos Xhafa, Makoto Takizawa:
28th IEEE International Conference on Advanced Information Networking and Applications, AINA 2014, Victoria, BC, Canada, May 13-16, 2014. IEEE Computer Society 2014 - Md. Arifur Rahman, Thomas Kunz, Howard Schwartz:
Delay Asymmetry Correction Model for Master-Slave Synchronization Protocols. 1-8 - Hengky Susanto:
From Self-Regulate to Admission Control in Real-Time Traffic Environment. 9-16 - Kazumasa Koitani, Go Hasegawa
, Masayuki Murata
:
End-to-End Measurement of Hop-by-Hop Available Bandwidth. 17-24 - Moisés Rodrigues, Stenio Fernandes, Judith Kelner, Djamel Sadok:
An Analytical View of Multiple CDNs Collaboration. 25-32 - Samad Nejatian, Sharifah Kamilah Syed Yusof
, N. M. Abdul Latiff
, Vahid Asadpour:
PUSH: Proactive Unified Spectrum Handoff in CR-MANETs. 33-40 - Mahboobeh Parsapoor, Urban Bilstrup:
An Imperialist Competitive Algorithm for Interference-Aware Cluster-Heads Selection in Ad Hoc Networks. 41-48 - Ing-Ray Chen, Jia Guo:
Dynamic Hierarchical Trust Management of Mobile Groups and Its Application to Misbehaving Node Detection. 49-56 - Muhammad Omer Farooq, Thomas Kunz:
Available-Bandwidth-Based Routing in IEEE 802.15.4-Based Ad-Hoc Networks: Proactive vs. Opportunistic Technique. 57-64 - Sho Hatakeyama, Yoshiki Sakata, Hiroshi Shigeno:
Cooperative Mobile Live Streaming Considering Neighbor Reception. 65-72 - Paulo R. S. L. Coelho, Enrique Fynn, Luis F. Faina, Rafael Pasquini
, Lásaro Jonas Camargos:
Node Position Forecast in MANET with PheroCast. 73-80 - Marcio E. F. Maia, Rossana M. C. Andrade
, Carlos A. B. de Queiroz Filho, Reinaldo Bezerra Braga
, Saulo B. de Aguiar, Bruno Gois Mateus, Rute Nogueira Silveira de Castro, Fredrik Toorn:
USABle - A Communication Framework for Ubiquitous Systems. 81-88 - Masato Kasahara, Kosuke Takano, Kin Fun Li:
A Personalized Learning System with an AR Augmented Reality Browser for Ecosystem Fieldwork. 89-97 - Kazumasa Omote, Tran Thao Phuong:
A New Efficient and Secure POR Scheme Based on Network Coding. 98-105 - Marcelo Luiz Brocardo, Issa Traoré, Isaac Woungang:
Toward a Framework for Continuous Authentication Using Stylometry. 106-115 - Victor C. Valgenti, Hai Sun, Min Sik Kim:
Protecting Run-Time Filters for Network Intrusion Detection Systems. 116-122 - Jorge Miguel
, Santi Caballé
, Fatos Xhafa, Josep Prieto
:
Security in Online Learning Assessment Towards an Effective Trustworthiness Approach to Support E-Learning Teams. 123-130 - Ricardo Bennesby, Edjard de Souza Mota, Paulo Fonseca, Alexandre Passito:
Innovating on Interdomain Routing with an Inter-SDN Component. 131-138 - Bruce Simpson, Saleem N. Bhatti
:
An Identifier-Locator Approach to Host Multihoming. 139-147 - André Vitor de Almeida Palhares, Marcelo Anderson Santos, Patricia Takako Endo
, Jonatas Vitalino, Moisés Rodrigues, Glauco Estácio Gonçalves
, Djamel Sadok, Azimeh Sefidcon, Fetahi Wuhib:
Joint Allocation of Nodes and Links with Load Balancing in Network Virtualization. 148-155 - Amani Alheid, Dritan Kaleshi, Angela Doufexi
:
An Analysis of the Impact of Out-of-Order Recovery Algorithms on MPTCP Throughput. 156-163 - Bhanu Kaushik, Honggang Zhang, Xinyu Yang, Xinwen Fu, Benyuan Liu:
CollabAssure: A Collaborative Market Based Data Service Assurance Framework for Mobile Devices. 164-171 - Louisa Harutyunyan, Jaroslav Opatrny:
Efficient Beacon-Less Broadcasting in MANETs. 172-179 - Elis Kulla, Gjergji Mino, Shinji Sakamoto
, Makoto Ikeda, Santi Caballé
, Leonard Barolli:
FBMIS: A Fuzzy-Based Multi-interface System for Cellular and Ad Hoc Networks. 180-185 - Duc Ngoc Minh Dang
, Hanh Ngoc Dang, Vandung Nguyen
, Zaw Htike, Choong Seon Hong
:
HER-MAC: A Hybrid Efficient and Reliable MAC for Vehicular Ad Hoc Networks. 186-193 - Jacques Bou Abdo, Imad Sarji, Imad H. Elhajj
, Ali Chehab
, Ayman I. Kayssi:
Application-Aware Fast Dormancy in LTE. 194-201 - M. Abousaleh, D. Yarish, Deepali Arora, Stephen W. Neville, Thomas E. Darcie:
Determining Per-Mode Battery Usage within Non-trivial Mobile Device Apps. 202-209 - Chuanyou Li, Yun Wang, Michel Hurfin:
Clock Synchronization in Mobile Ad Hoc Networks Based on an Iterative Approximate Byzantine Consensus Protocol. 210-217 - Rhoney Benigno, Natan Pedrosa, Pedro Tome, Wesley Araujo, Jose R. Torres Neto, Eucassio Junior, Savio Mota, José Bringel Filho, Hervé Martin:
Annotation-Based Access Control Approach for Ubiquitous Systems. 218-225 - Sushmita Ruj
, Arindam Pal:
Analyzing Cascading Failures in Smart Grids under Random and Targeted Attacks. 226-233 - Tetsuya Izu, Yumi Sakemi, Masahiko Takenaka, Naoya Torii:
A Spoofing Attack against a Cancelable Biometric Authentication Scheme. 234-239 - Angelina Espejel Trujillo, Mariko Nakano-Miyatake
, Héctor Pérez-Meana:
New Condition for Hierarchical Secret Image Sharing Scheme. 240-244 - Mohammad Saiful Islam Mamun, Atsuko Miyaji
:
RFID Path Authentication, Revisited. 245-252 - Michael Karl, Thorsten Herfet:
Transparent Multi-hop Protocol Termination. 253-259 - Marta C. C. Lacerda, Marcos A. Siqueira, Paulo R. S. L. Coelho, Luis F. Faina, Lásaro Jonas Camargos, Christian Esteve Rothenberg
, Rafael Pasquini
:
ASN-FWD: Shrinking the IPv4 Share on the Forwarding Information Base. 260-267 - Jason B. Ernst, Stefan C. Kremer, Joel J. P. C. Rodrigues:
A Wi-Fi Simulation Model Which Supports Channel Scanning across Multiple Non-overlapping Channels in NS3. 268-275 - Sunghee Lee, Kwangsue Chung:
Congestion Control Scheme for Multimedia Streaming Service over High Bandwidth Delay Product Networks. 276-281 - Shinji Sakamoto
, Tetsuya Oda, Albert Bravo, Leonard Barolli, Makoto Ikeda, Fatos Xhafa:
WMN-SA System for Node Placement in WMNs: Evaluation for Different Realistic Distributions of Mesh Clients. 282-288 - Tetsuya Oda, Admir Barolli, Evjola Spaho
, Leonard Barolli, Fatos Xhafa:
Analysis of Mesh Router Placement in Wireless Mesh Networks Using Friedman Test. 289-296 - Glêdson Elias, Daniel Porto:
Simulation-Based Performance Evaluation of the MLSD Protocol for Infrastructure WMNs. 297-304 - Carlos Ernesto Carrillo Arellano, Víctor M. Ramos R.
:
On the Impact of Network Coding Delay for IEEE 802.11s Infrastructure Wireless Mesh Networks. 305-312 - Mamun I. Abu-Tair, Saleem N. Bhatti
:
Energy Usage of UDP and DCCP over 802.11n. 313-320 - Ismail AlQerm
, Basem Shihada
:
Adaptive Decision-Making Scheme for Cognitive Radio Networks. 321-328 - Salah Zahed, Irfan Awan, Andrea J. Cullen, Muhammad Younas:
Performance Evaluation of Cognitive Radio Networks under Licensed and Unlicensed Spectrum Bands. 329-336 - Makoto Ikeda, Taiki Honda, Tetsuya Oda, Shinji Sakamoto
, Leonard Barolli:
Analysis of WMN-GA Simulation Results: WMN Performance Considering Stationary and Mobile Scenarios. 337-342 - Mohammad Saiful Islam Mamun, Atsuko Miyaji
:
A Scalable and Secure RFID Ownership Transfer Protocol. 343-350 - Arcangelo Castiglione
, Alfredo De Santis
, Aniello Castiglione
, Francesco Palmieri
:
An Efficient and Transparent One-Time Authentication Protocol with Non-interactive Key Scheduling and Update. 351-358 - Hiroaki Kikuchi, Tomoki Sato, Jun Sakuma:
Privacy-Preserving Hypothesis Testing for the Analysis of Epidemiological Medical Data. 359-365 - Giuseppe Cattaneo
, Gianluca Roscigno
, Umberto Ferraro Petrillo:
A Scalable Approach to Source Camera Identification over Hadoop. 366-373 - Manoel Camillo Penna, Edgard Jamhour, Marcio L. F. Miguel:
A Clustered SDN Architecture for Large Scale WSON. 374-381 - Markus Aleksy
, Elina Vartiainen, Veronika Domova
, Martin Naedele:
Augmented Reality for Improved Service Delivery. 382-389 - Olatunde Awobuluyi:
Periodic Control Update Overheads in OpenFlow-Based Enterprise Networks. 390-396 - Cristian Cleder Machado, Lisandro Zambenedetti Granville
, Alberto E. Schaeffer Filho
, Juliano Araujo Wickboldt
:
Towards SLA Policy Refinement for QoS Management in Software-Defined Networking. 397-404 - Alexandre Passito, Edjard de Souza Mota
, Ricardo Bennesby, Paulo Fonseca:
AgNOS: A Framework for Autonomous Control of Software-Defined Networks. 405-412 - Israel Leyva-Mayorga
, Mario E. Rivero-Angeles
, Chadwick Carreto Arellano:
Priority-Based Multi-event Reporting in Hybrid Wireless Sensor Networks. 413-420 - Babar Shah, Ki-Il Kim
:
A Guaranteed Lifetime Protocol for Real-Time Wireless Sensor Networks. 421-428 - Danish Mahmood
, K. Latif, Nadeem Javaid
, Sanaullah U. Qureshi, Imran Ahmed, U. Qasim, Zahoor Ali Khan
:
Investigating Impact of ACK in Non-beacon Enabled Slotted IEEE 802.15.4. 429-434 - S. Ahmed, Nadeem Javaid
, Mariam Akbar, Adeel Iqbal
, Zahoor Ali Khan
, U. Qasim:
LAEEBA: Link Aware and Energy Efficient Scheme for Body Area Networks. 435-440 - Paul A. S. Ward, Kshirasagar Naik, Jakub K. Schmidtke:
Efficient Hashing for Dynamic Per-Flow Network-Interface Selection. 441-448 - Agustinus Borgy Waluyo, Feng Zhu, David Taniar
, Bala Srinivasan:
Design and Implementation of a Mobile Broadcast System. 449-456 - Kiki Maulana Adhinugraha, David Taniar
, Maria Indrawan-Santiago
, Dirda M. K. Latjuba:
Reverse Nearest Neighbour by Region on Mobile Devices. 457-464 - Min Choi, Wonjae Lee, Seong-jun Bae, Hyun-Woo Lee, Jong Hyuk Park:
Faster Translated Binary Execution on Mobile System through Virtualization. 465-471 - Joseph Soryal, Irippuge Milinda Perera, Ihab Darwish, Nelly Fazio, Rosario Gennaro, Tarek N. Saadawi:
Combating Insider Attacks in IEEE 802.11 Wireless Networks with Broadcast Encryption. 472-479 - Shahid Alam
, R. Nigel Horspool, Issa Traoré:
MARD: A Framework for Metamorphic Malware Analysis and Real-Time Detection. 480-489 - Michael McGuire:
Channel Estimation for Secret Key Generation. 490-496 - Hsing-Chung Chen, Alpha Liezel V. Epa:
A Rotation Session Key-Based Transposition Cryptosystem Scheme Applied to Mobile Text Chatting. 497-503 - Rafael L. Gomes
, Luiz F. Bittencourt, Edmundo R. M. Madeira
:
A Bandwidth-Feasibility Algorithm for Reliable Virtual Network Allocation. 504-511 - Ayman Mukaddam, Imad H. Elhajj
, Ayman I. Kayssi, Ali Chehab
:
IP Spoofing Detection Using Modified Hop Count. 512-516 - Hovhannes A. Harutyunyan, Cosmin Jimborean:
New Heuristic for Message Broadcasting in Networks. 517-524 - Marcelo Anderson Santos, Stenio Fernandes, Carlos Kamienski
:
Conducting Network Research in Large-Scale Platforms: Avoiding Pitfalls in PlanetLab. 525-532 - Marcelo Eduardo Pellenz
, Edgard Jamhour, Manoel Camillo Penna, Richard Demo Souza
, Glauber Gomes de Oliveira Brante
:
A Power Assignment Method for Multi-sink WSN with Outage Probability Constraints. 533-540 - Takeshi Yoshimura, Kazuya Murao
, Akimitsu Kanzaki, Shojiro Nishio:
Integration of Push-Based and Pull-Based Connectivity Status Sharing for Efficient Data Forwarding towards Mobile Sinks in Wireless Sensor Networks. 541-548 - Misbah Liaqat, Nadeem Javaid
, Mariam Akbar, Zahoor Ali Khan
, L. Ali, S. Hafizah, A. Ghani:
HEX Clustering Protocol for Routing in Wireless Sensor Network. 549-554 - Mariam Akbar, Nadeem Javaid
, S. Yousaf, A. H. Khan, Zahoor Ali Khan
, U. Qasim, A. A. Khan:
TRP: Tunneling Routing Protocol for WSNs. 555-559 - Yuan-Ko Huang, Lien-Fa Lin:
Processing Probabilistic K-Nearest Neighbor Query Using Rlsd-Tree. 560-567 - Vinicius Bezerra, Misael C. Junior, Olga Valeria, Constantino D. Neto, Liliam Leal, Marcus Lemos, Carlos Giovanni Carvalho, José Bringel Filho, Raimir Holanda Filho
, Nazim Agoulmine:
A Quality-Aware and Energy-Efficient Context Management Framework for Ubiquitous Systems. 568-575 - Manjinder Nir, Ashraf Matrawy, Marc St-Hilaire:
Optimizing Energy Consumption in Broker-Assisted Cyber Foraging Systems. 576-583 - João Ladislau Lopes, Rodrigo Santos de Souza, Ana Marilza Pernas, Adenauer C. Yamin, Cláudio Fernando Resin Geyer:
A Distributed Architecture for Supporting Context-Aware Applications in UbiComp. 584-590 - Haixin Nie, Xiaofeng Chen, Jin Li, Josolph Liu, Wenjing Lou:
Efficient and Verifiable Algorithm for Secure Outsourcing of Large-scale Linear Programming. 591-596 - Vahid Aghaei Foroushani, Nur Zincir-Heywood
:
TDFA: Traceback-Based Defense against DDoS Flooding Attacks. 597-604 - Shrikant H. Talawar, Soumyadev Maity
, Ramesh C. Hansdah:
Secure Routing with an Integrated Localized Key Management Protocol in MANETs. 605-612 - Jéferson Campos Nobre, Lisandro Zambenedetti Granville
, Alexander Clemm, Alberto Gonzalez Prieto:
On the Use of Traffic Information to Improve the Coordinated P2P Detection of SLA Violations. 613-620 - Olfa Bouchaala, Mohamed Yangui, Samir Tata, Mohamed Jmaiel:
DAT: Dependency Analysis Tool for Service Based Business Processes. 621-628 - Jeevan Pokhrel
, Felipe Lalanne, Ana R. Cavalli, Wissam Mallouli:
QoE Estimation for Web Service Selection Using a Fuzzy-Rough Hybrid Expert System. 629-634 - Tor-Morten Grønli
, Jarle Hansen, Gheorghita Ghinea
, Muhammad Younas:
Mobile Application Platform Heterogeneity: Android vs Windows Phone vs iOS vs Firefox OS. 635-641 - Shigeo Shioda
:
Unbiased Estimation Based on Biased Sampled Data of Communication Networks. 642-648 - Soufiene Ben Othman, Abdullah Ali Bahattab, Abdelbasset Trad
, Habib Youssef:
Secure Data Transmission Protocol for Medical Wireless Sensor Networks. 649-656 - Muhammad Aslam, Ehsan Ullah Munir, Muhammad Bilal, Muhammad Asad, Asad Ali, Tauseef Shah, Syed Bilal:
HADCC: Hybrid Advanced Distributed and Centralized Clustering Path Planning Algorithm for WSNs. 657-664 - Fumiaki Sato:
A Synchronization and Routing Protocol for Rechargeable Sensor Networks. 665-672 - Mahima Agumbe Suresh, Lidia Smith, Amin Rasekh, Radu Stoleru, M. Katherine Banks, Basem Shihada
:
Mobile Sensor Networks for Leak and Backflow Detection in Water Distribution Systems. 673-680 - Fabrício A. Silva, Thais R. M. Braga Silva, Fabrício Benevenuto
, Linnyer Beatrys Ruiz, Antonio A. F. Loureiro:
Improving Information Dissemination in Vehicular Networks by Selecting Appropriate Disseminators. 681-688 - Celimuge Wu
, Satoshi Ohzahata, Yusheng Ji, Toshihiko Kato:
Joint MAC and Network Layer Control for VANET Broadcast Communications Considering End-to-End Latency. 689-696 - Robert Protzmann, Björn Schünemann, Ilja Radusch
:
A Sensitive Metric for the Assessment of Vehicular Communication Applications. 697-703 - Victor Balogun, Axel W. Krings:
Mitigating Constant Jamming in Cognitive Radio Networks Using Hybrid FEC Code. 704-711 - Jia-Chun Lin, Fang-Yie Leu, Ying-Ping Chen, Waqaas Munawar:
Impact of MapReduce Task Re-execution Policy on Job Completion Reliability and Job Completion Time. 712-718 - Amin M. Khan
, Ümit Cavus Büyüksahin, Felix Freitag
:
Prototyping Incentive-Based Resource Assignment for Clouds in Community Networks. 719-726 - Vlad Serbanescu, Florin Pop, Valentin Cristea, Gabriel Antoniu:
Architecture of Distributed Data Aggregation Service. 727-734 - Alessandro Celestini
, Gianpiero Costantino, Rocco De Nicola
, Zakaria Maamar
, Fabio Martinelli, Marinella Petrocchi, Francesco Tiezzi:
Reputation-Based Composition of Social Web Services. 735-742 - Ming-Chang Lee, Fang-Yie Leu, Ying-Ping Chen:
Cache Replacement Algorithms for YouTube. 743-750 - Dhomas Hatta Fudholi
, J. Wenny Rahayu, Eric Pardede
:
CODE (Common Ontology DEvelopment): A Knowledge Integration Approach from Multiple Ontologies. 751-758 - Eiko Kai, Andrew Rebeiro-Hargrave, Sozo Inoue, Yasunobu Nohara
, Rafiqul Islam Maruf, Naoki Nakashima, Ashir Ahmed
:
Empowering the Healthcare Worker Using the Portable Health Clinic. 759-764 - Nazia Zaman, Juan Li:
Semantics-Enhanced Recommendation System for Social Healthcare. 765-770 - Shadi Esnaashari, Ian Welch
, Brenda Chawner:
Restrictions Affecting New Zealanders' Access to the Internet: A Local Study. 771-774 - Tales Heimfarth, João Paulo de Araujo, Renato Resende Ribeiro de Oliveira, Raphael Winckler de Bettio:
Evaluation of a Genetic Programming Approach to Generate Wireless Sensor Network Applications. 775-782 - Muhammad Moid Sandhu
, Nadeem Javaid
, Mariam Akbar, F. Najeeb, U. Qasim, Zahoor Ali Khan
:
FEEL: Forwarding Data Energy Efficiently with Load Balancing in Wireless Body Area Networks. 783-789 - Ons Mabrouk, Hanen Idoudi, Ichrak Amdouni, Ridha Soua, Pascale Minet, Leïla Azouz Saïdane:
OTICOR: Opportunistic Time Slot Assignment in Cognitive Radio Sensor Networks. 790-797 - Ashutosh Bhatia, R. C. Hansdah:
A TDMA-Based Energy Aware MAC (TEA-MAC) Protocol for Reliable Multicast in WSNs. 798-805 - Edgar E. Báez Esquivel, Mario E. Rivero-Angeles
, Izlian Yolanda Orea-Flores:
Performance Analysis of BitTorrent-Like P2P Networks for Video Streaming Services at the Chunk Level. 806-812 - Rui Zhou, Rong Min, Qi Yu, Chanjuan Li, Yong Sheng, Qingguo Zhou, Xuan Wang, Kuan-Ching Li
:
Formal Verification of Fault-Tolerant and Recovery Mechanisms for Safe Node Sequence Protocol. 813-820 - Deepali Arora, Adam Verigin, Teghan Godkin, Stephen W. Neville:
Statistical Assessment of Sybil-Placement Strategies within DHT-Structured Peer-to-Peer Botnets. 821-828 - Haïdar Safa, Wassim El-Hajj
, Marwa Moutaweh:
Trust Aware System for P2P Routing Protocols. 829-836 - Ying Liu, Vladimir Vlassov
, Leandro Navarro
:
Towards a Community Cloud Storage. 837-844 - Minoru Uehara:
Supersaturated Cloud for Multicore Systems. 845-849 - Chenhao Qu, Rajkumar Buyya:
A Cloud Trust Evaluation System Using Hierarchical Fuzzy Inference System for Service Selection. 850-857 - Deepak Poola, Saurabh Kumar Garg
, Rajkumar Buyya, Yun Yang, Kotagiri Ramamohanarao
:
Robust Scheduling of Scientific Workflows with Deadline and Budget Constraints in Clouds. 858-865 - Ruediger Gad, Martin Kappes, Robin Mueller-Bady, Inmaculada Medina-Bulo
:
Header Field Based Partitioning of Network Traffic for Distributed Packet Capturing and Processing. 866-874 - Oscar Maurício Caicedo Rendón
, Felipe Estrada Solano
, Lisandro Zambenedetti Granville
:
An Approach to Overcome the Complexity of Network Management Situations by Mashments. 875-883 - Sanghwa Han, Kyungtae Kang, Junhee Ryu:
Determination of Delay Bound over Multi-hop Real-Time Switches with Virtual Output Queuing. 892-898 - Nesrine Ouled Abdallah
, Mohamed Jmaiel, Mohamed Mosbah
, Akka Zemmari
:
Greedy Flooding in Redoubtable Sensor Networks. 899-906 - Tales Heimfarth, João Paulo de Araujo:
Using Unmanned Aerial Vehicle to Connect Disjoint Segments of Wireless Sensor Network. 907-914 - S. Yousaf, Mariam Akbar, Nadeem Javaid
, A. Iqba, Zahoor Ali Khan
, U. Qasim:
CEMob: Critical Data Transmission in Emergency with Mobility Support in WBANs. 915-919 - K. Latif, Nadeem Javaid
, Adeel Iqbal
, Zahoor Ali Khan
, U. Qasim, Turki Ali Alghamdi
:
Energy Hole Analysis for Energy Efficient Routing in BANs. 920-924 - Pascal Francois Faye
, Samir Aknine, Mbaye Sene, Onn Shehory:
Stabilizing Agent's Interactions in Dynamic Contexts. 925-932 - Michel Raynal, Julien Stainer, Jiannong Cao
, Weigang Wu:
A Simple Broadcast Algorithm for Recurrent Dynamic Systems. 933-939 - Tomoya Enokido, Ailixier Aikebaier, Makoto Takizawa
:
Evaluation of the Extended Improved Redundant Power Consumption Laxity-Based (EIRPCLB) Algorithm. 940-947 - Hirohito Kakizawa, Ryozo Kiyohara:
Reducing the Amount of Small Data Communication for Telematics Services. 948-954 - Nobuyuki Kukimoto:
Open Government Data Visualization System to Facilitate Evidence-Based Debate Using a Large-Scale Interactive Display. 955-960 - Sameera Abar
, Pierre Lemarinier
, Georgios K. Theodoropoulos
, Gregory M. P. O'Hare
:
Automated Dynamic Resource Provisioning and Monitoring in Virtualized Large-Scale Datacenter. 961-970 - Jin Li, Xiaofeng Chen, Fatos Xhafa, Leonard Barolli:
Secure Deduplication Storage Systems with Keyword Search. 971-977 - Qiang Duan, Zhen Zheng:
Holistic Modeling and Performance Evaluation for Converged Network-Cloud Service Provisioning. 978-984 - Joseph Kee-Yin Ng, Jiantao Wang, Kam-yiu Lam
, Calvin Ho Chuen Kam, Song Han:
Capturing and Analyzing Pervasive Data for SmartHealth. 985-992 - Juan Li, Nazia Zaman:
Personalized Healthcare Recommender Based on Social Media. 993-1000 - Pavel Krömer
, Milos Kudelka, Václav Snásel, Martin Radvanský
, Zdenek Horak:
Computing Sammon's Projection of Social Networks by Differential Evolution. 1001-1006 - Ahmed B. Altamimi
, T. Aaron Gulliver:
Privacy and Node Cooperation in Mobile Social Networks. 1007-1010 - Guoqi Xie, Renfa Li, Xiongren Xiao, Yuekun Chen:
A High-Performance DAG Task Scheduling Algorithm for Heterogeneous Networked Embedded Systems. 1011-1016 - Lei Xia, Nenghai Yu:
Redundant and Relay Assistant Scheduling of Small Satellites. 1017-1024 - Mahmood Ashraf Khan, Nadeem Javaid
, Mokhtar Arif, Shah Saud, Umar Qasim, Zahoor Ali Khan
:
Peak Load Scheduling in Smart Grid Communication Environment. 1025-1032 - Fatos Xhafa, Xavier Herrero, Admir Barolli, Makoto Takizawa
:
A Tabu Search Algorithm for Ground Station Scheduling Problem. 1033-1040 - Aldelir Fernando Luiz, Lau Cheuk Lung, Luciana de Oliveira Rech:
On the Practicality to Implement Byzantine Fault Tolerant Services Based on Tuple Space. 1041-1048 - Nils Müllner, Oliver E. Theel, Martin Fränzle
:
Combining Decomposition and Lumping to Evaluate Semi-hierarchical Systems. 1049-1056 - Hicham Lakhlef, Julien Bourgeois, Hakim Mabed:
Robust Parallel Redeployment Algorithm for MEMS Microrobots. 1057-1064 - Rodrigo Schmidt, Lásaro Jonas Camargos, Fernando Pedone
:
Collision-Fast Atomic Broadcast. 1065-1072 - Yaser Mansouri, Saeed Talatian Azad, Alireza Chamkoori
:
Minimizing Cost of K-Replica in Hierarchical Data Grid Environment. 1073-1080 - Abdullah M. Baqasah
, Eric Pardede
, J. Wenny Rahayu:
XSM - A Tracking System for XML Schema Versions. 1081-1088 - Nawshad Farruque, Wendy Osborn:
Efficient Distributed Spatial Semijoins and Their Application in Multiple-Site Queries. 1089-1096 - Arber Borici, Alex Thomo
:
Semantic Graph Compression with Hypergraphs. 1097-1104 - Juyoung Park, Kuyeon Lee, Kyungtae Kang:
Intelligent Electrocardiogram Monitoring System for Early Arrhythmia Detection. 1105-1110 - Maria Laura Maag, Ludovic Denoyer, Patrick Gallinari:
Graph Anonymization Using Machine Learning. 1111-1118 - Ana Marilza Pernas, Adenauer C. Yamin, João Ladislau Barbará Lopes, José Palazzo Moreira de Oliveira:
A Semantic Approach for Learning Situation Detection. 1119-1126 - Qi Wang, Elis Kulla, Gjergji Mino, Leonard Barolli:
Prediction of Sensor Lifetime in Wireless Sensor Networks Using Fuzzy Logic. 1127-1131 - Dilawaer Duolikun, Ailixier Aikebaier, Tomoya Enokido, Makoto Takizawa
:
Energy-Aware Replication Models of Mobile Agents. 1132-1139 - Shigenari Nakamura, Dilawaer Doulikun, Ailixier Aikebaier, Tomoya Enokido, Makoto Takizawa
:
Role-Based Information Flow Control Models. 1140-1147 - Xinyue Chang, Tetsuya Oda, Evjola Spaho
, Makoto Ikeda, Leonard Barolli, Fatos Xhafa:
Node Placement in WMNs Using WMN-HC System and Different Movement Methods. 1148-1153 - Petra Perner
:
A Novel Method for the Interpretation of Spectrometer Signals Based on Delta-Modulation and Similarity Determination. 1154-1160
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
![](https://fanyv88.com/img/new-feature-top-right.156x64.png)