|
Collaborative Cloud Computing |
|
|
|
Adaptive Multi-keyword Ranked Search Over Encrypted Cloud Data |
|
|
3 | (11) |
|
|
|
|
|
|
|
A Collaborated IPv6-Packets Matching Mechanism Base on Flow Label in OpenFlow |
|
|
14 | (12) |
|
|
|
|
|
|
Traveller: A Novel Tourism Platform for Students Based on Cloud Data |
|
|
26 | (10) |
|
|
|
|
|
|
Achieving Application-Level Utility Max-Min Fairness of Bandwidth Allocation in Datacenter Networks |
|
|
36 | (11) |
|
|
|
|
Cost-Effective Service Provisioning for Hybrid Cloud Applications |
|
|
47 | (12) |
|
|
|
|
Architecture and Evaluation |
|
|
|
On Rule Placement for Multi-path Routing in Software-Defined Networks |
|
|
59 | (13) |
|
|
|
|
|
|
Crowdstore: A Crowdsourcing Graph Database |
|
|
72 | (10) |
|
|
|
|
|
An ARM-Based Hadoop Performance Evaluation Platform: Design and Implementation |
|
|
82 | (13) |
|
|
|
|
|
|
|
|
Research on Service Organization Based on Decorator Pattern |
|
|
95 | (11) |
|
|
|
|
|
|
Personalized QoS Prediction of Cloud Services via Learning Neighborhood-Based Model |
|
|
106 | (15) |
|
|
|
|
|
Collaborative Application |
|
|
|
Multi-core Accelerated Operational Transformation for Collaborative Editing |
|
|
121 | (8) |
|
|
|
|
NFV: Near Field Vibration Based Group Device Pairing |
|
|
129 | (12) |
|
|
|
|
|
A Novel Method for Chinese Named Entity Recognition Based on Character Vector |
|
|
141 | (10) |
|
|
|
|
|
|
Android Apps Security Evaluation System in the Cloud |
|
|
151 | (12) |
|
|
|
|
|
Sensor and Internet of Things |
|
|
|
Protecting Privacy for Big Data in Body Sensor Networks: A Differential Privacy Approach |
|
|
163 | (10) |
|
|
|
|
|
|
Characterizing Interference in a Campus WiFi Network via Mobile Crowd Sensing |
|
|
173 | (10) |
|
|
|
|
|
|
On Participant Selection for Minimum Cost Participatory Urban Sensing with Guaranteed Quality of Information |
|
|
183 | (12) |
|
|
|
|
|
|
|
λ-CoAP: An Internet of Things and Cloud Computing Integration Based on the Lambda Architecture and CoAP |
|
|
195 | (12) |
|
|
|
|
A Framework for Multiscale-, QoC- and Privacy-aware Context Dissemination in the Internet of Things |
|
|
207 | (14) |
|
|
|
|
|
|
|
|
|
|
|
SSG: Sensor Security Guard for Android Smartphones |
|
|
221 | (13) |
|
|
|
|
|
|
Fast Secure Scalar Product Protocol with (almost) Optimal Efficiency |
|
|
234 | (9) |
|
|
|
|
|
|
|
Efficient Secure Authenticated Key Exchange Without NAXOS' Approach Based on Decision Linear Problem |
|
|
243 | (14) |
|
|
|
|
Towards Secure Distributed Hash Table |
|
|
257 | (10) |
|
|
|
An Anomaly Detection Model for Network Intrusions Using One-Class SVM and Scaling Strategy |
|
|
267 | (14) |
|
|
|
|
|
|
Layered Consistency Management for Advanced Collaborative Compound Document Authoring |
|
|
281 | (8) |
|
|
|
|
On Ambiguity Issues of Converting LaTeX Mathematical Formula to Content MathML |
|
|
289 | (7) |
|
|
|
|
LTMF: Local-Based Tag Integration Model for Recommendation |
|
|
296 | (7) |
|
|
|
|
|
|
A Privacy-Friendly Model for an Efficient and Effective Activity Scheduling Inside Dynamic Virtual Organizations |
|
|
303 | (6) |
|
|
A Discovery Method of Service Bottleneck for Distributed Service |
|
|
309 | (8) |
|
|
|
|
|
A Collaborative Rear-End Collision Warning Algorithm in Vehicular Ad Hoc Networks |
|
|
317 | (6) |
|
|
|
|
|
Analysis of Signaling Overhead and Performance Evaluation in Cellular Networks of WeChat Software |
|
|
323 | (6) |
|
|
|
|
|
|
|
Exploration of Applying Crowdsourcing in Geosciences: A Case Study of Qinghai-Tibetan Lake Extraction |
|
|
329 | (6) |
|
|
|
|
Author Index |
|
335 | |