|
Cloud, Cluster and Grid I |
|
|
|
Transparency in Cloud Business: Cluster Analysis of Software as a Service Characteristics |
|
|
1 | (10) |
|
|
Distributed Accounting in Scope of Privacy Preserving |
|
|
11 | (12) |
|
|
|
Distributed Virtual Machine Monitor for Distributed Cloud Computing Nodes Integration |
|
|
23 | (9) |
|
|
|
|
|
Differentiated Policy Based Job Scheduling with Queue Model and Advanced Reservation Technique in a Private Cloud Environment |
|
|
32 | (8) |
|
|
|
Scaling Out Recommender System for Digital Libraries with MapReduce |
|
|
40 | (8) |
|
|
|
|
|
Layering of the Provenance Data for Cloud Computing |
|
|
48 | (11) |
|
|
|
JCL: An OpenCL Programming Toolkit for Heterogeneous Computing |
|
|
59 | (14) |
|
|
|
Network-Aware Multiway Join for MapReduce |
|
|
73 | (8) |
|
|
|
|
|
Automatic Resource Scaling for Web Applications in the Cloud |
|
|
81 | (10) |
|
|
|
|
|
|
Implementation of Cloud-RAID: A Secure and Reliable Storage above the Clouds |
|
|
91 | (12) |
|
|
|
An Improved Min-Min Task Scheduling Algorithm in Grid Computing |
|
|
103 | (11) |
|
|
|
Cloud, Cluster and Grid II |
|
|
|
Heterogeneous Diskless Remote Booting System on Cloud Operating System |
|
|
114 | (10) |
|
|
|
|
|
RTRM: A Response Time-Based Replica Management Strategy for Cloud Storage System |
|
|
124 | (10) |
|
|
|
|
|
|
Secure Hadoop with Encrypted HDFS |
|
|
134 | (8) |
|
|
|
VM Migration for Fault Tolerance in Spot Instance Based Cloud Computing |
|
|
142 | (10) |
|
|
|
|
|
A Cloud Based Natural Disaster Management System |
|
|
152 | (10) |
|
|
|
A Hybrid Grid/Cloud Distributed Platform: A Case Study |
|
|
162 | (8) |
|
|
|
|
Comparison of Two Yield Management Strategies for Cloud Service Providers |
|
|
170 | (11) |
|
|
|
|
|
Comparing Java Virtual Machines for Sensor Nodes -- First Glance: Takatuka and Darjeeling |
|
|
181 | (8) |
|
|
|
Research on Opinion Formation of Microblog in the View of Multi-agent Simulation |
|
|
189 | (10) |
|
|
|
|
|
Implementation of Cloud IaaS for Virtualization with Live Migration |
|
|
199 | (9) |
|
|
|
|
|
|
Middleware, Resource Management |
|
|
|
Security Considerations in Cloud Computing Virtualization Environment |
|
|
208 | (8) |
|
|
|
Medicine Rating Prediction and Recommendation in Mobile Social Networks |
|
|
216 | (8) |
|
|
|
|
|
Cloud Browser: Enhancing the Web Browser with Cloud Sessions and Downloadable User Interface |
|
|
224 | (10) |
|
|
|
|
Visual Novels: An Methodology Guideline for Pervasive Educational Games that Favors Discernment |
|
|
234 | (10) |
|
|
|
|
An Optimal Radio Access Network Selection Method for Heterogeneous Wireless Networks |
|
|
244 | (9) |
|
|
|
|
|
Desktop Grid Computing at the Age of the Web |
|
|
253 | (9) |
|
|
|
|
A Novel Model for Greenhouse Control Architecture |
|
|
262 | (8) |
|
|
|
|
|
|
|
|
|
Mobile, Peer-to-Peer and Pervasive Computing |
|
|
|
Enhanced Search in Unstructured Peer-to-Peer Overlay Networks |
|
|
270 | (10) |
|
|
|
|
|
|
CE-SeMMS: Cost-Effective and Secure Mobility Management Scheme Based on SIP in NEMO Environments |
|
|
280 | (8) |
|
|
|
|
|
A System-Level Approach for Designing Context-Aware Distributed Pervasive Applications |
|
|
288 | (11) |
|
|
|
|
|
Architecture of a Context Aware Framework for Automated Mobile Device Configuration |
|
|
299 | (10) |
|
|
|
|
|
AMM-PF: Additional Mobility Management Scheme Based on Pointer |
|
|
|
Forwarding in PMIPv6 Networks |
|
|
309 | (8) |
|
|
|
|
Multi-core and High Performance Computing |
|
|
|
The Evaluation and Optimization of 3-D Jacobi Iteration on a Stream Processor |
|
|
317 | (9) |
|
|
|
|
|
|
DDASTM: Ensuring Conflict Serializability Efficiently in Distributed STM |
|
|
326 | (10) |
|
|
|
|
Research on Log Pre-processing for Exascale System Using Sparse Representation |
|
|
336 | (12) |
|
|
|
|
|
|
|
Using Event-Based Style for Developing M2M Applications |
|
|
348 | (10) |
|
|
|
|
|
|
Scheduling Optimization of the RFID Tagged Explosive Storage Based on Genetic Algorithm |
|
|
358 | (9) |
|
|
|
|
|
|
|
|
|
Weighted Mining Association Rules Based Quantity Item with RFM Score for Personalized u-Commerce Recommendation System |
|
|
367 | (9) |
|
|
|
|
Priority-Based Live Migration of Virtual Machine |
|
|
376 | (10) |
|
|
|
|
|
Improvement of the MCMA Blind Equalization Performance Using the Coordinate Change Method in 16-APSK |
|
|
386 | (7) |
|
|
|
Postural Transition Detection Using a Wireless Sensor Activity Monitoring System |
|
|
393 | (10) |
|
|
|
|
|
Parallel and Distributed Systems |
|
|
|
A Dedicated Serialization Scheme in Homogeneous Cluster RPC Communication |
|
|
403 | (10) |
|
|
|
|
|
Friends Based Keyword Search over Online Social Networks |
|
|
413 | (10) |
|
|
|
GPU Virtualization Support in Cloud System |
|
|
423 | (10) |
|
|
|
|
|
|
|
|
MGMR: Multi-GPU Based MapReduce |
|
|
433 | (10) |
|
|
|
|
|
|
|
|
DDoS Analysis Using Correlation Coefficient Based on Kolmogorov Complexity |
|
|
443 | (10) |
|
|
|
|
An Efficient Attribute-Based Encryption and Access Control Scheme for Cloud Storage Environment |
|
|
453 | (11) |
|
|
|
|
Active One-Time Password Mechanism for User Authentication |
|
|
464 | (8) |
|
|
|
|
|
Hardware Acceleration for Cryptography Algorithms by Hotspot Detection |
|
|
472 | (10) |
|
|
|
|
Chaotic Wireless Communication System Using Retrodirective Array Antenna for Advanced High Security |
|
|
482 | (9) |
|
|
|
Policy-Based Customized Privacy Preserving Mechanism for SaaS Applications |
|
|
491 | (10) |
|
|
|
|
QoC-Aware Access Control Based on Fuzzy Inference for Pervasive Computing Environments |
|
|
501 | (8) |
|
|
|
|
Per-File Secure Deletion Combining with Enhanced Reliability for SSDs |
|
|
509 | (8) |
|
|
|
|
|
|
|
An Energy-Aware Secured Routing Protocol for Mobile Ad Hoc Networks Using Trust-Based Multipath |
|
|
517 | (9) |
|
|
|
|
A Grid-Based Approximate K-NN Query Processing Algorithm for Privacy Protection in Location-Based Services |
|
|
526 | (10) |
|
|
|
Density-Based K-Anonymization Scheme for Preserving Users' Privacy in Location-Based Services |
|
|
536 | (10) |
|
|
|
Ubiquitous Communications, Sensor Networking, and RFID |
|
|
|
A Routing Mechanism Using Virtual Coordination Anchor Node Apply to Wireless Sensor Networks |
|
|
546 | (10) |
|
|
|
|
|
Effect of Genetic Parameters in Tour Scheduling and Recommender Services for Electric Vehicles |
|
|
556 | (7) |
|
|
|
|
|
|
|
Enabling Massive Machine-to-Machine Communications in LTE-Advanced |
|
|
563 | (7) |
|
|
Enhancements for Local Repair in AODV-Based Ad-Hoc Networks |
|
|
570 | (7) |
|
|
|
|
Smart Watch and Monitoring System for Dementia Patients |
|
|
577 | (8) |
|
|
|
|
A Lesson from the Development of Surveillance and Reconnaissance Sensor Networks Systems |
|
|
585 | (9) |
|
|
|
|
A Classifier Algorithm Exploiting User's Environmental Context and Bio-signal for U-Home Services |
|
|
594 | (8) |
|
|
|
|
|
DNA-S: Dynamic Cellular Network Architecture for Smart Communications |
|
|
602 | (10) |
|
|
|
Ubiquitous and Multimedia Application Systems |
|
|
|
Predicting of Abnormal Behavior Using Hierarchical Markov Model Based on User Profile in Ubiquitous Environment |
|
|
612 | (11) |
|
|
|
|
Advanced Facial Skin Rendering with Actual Fresnel Refractive Index Reflecting Facial Tissue Features |
|
|
623 | (8) |
|
|
|
Emotion Recognition Technique Using Complex Biomedical Signal Analysis |
|
|
631 | (10) |
|
|
|
|
|
RWA: Reduced Whole Ack Mechanism for Underwater Acoustic Sensor Network |
|
|
641 | (8) |
|
|
|
Data Hiding Based on Palette Images Using Weak Bases of Z2-Modules |
|
|
649 | (10) |
|
|
|
|
|
|
Adaptive Smart Vehicle Middleware Platform for Aspect Oriented Software Engineering |
|
|
659 | (6) |
|
|
|
Design, Analysis and Tools for Integrated Circuits and Systems |
|
|
|
Parallel Generation of Optimal Mortgage Refinancing Threshold Rates |
|
|
665 | (11) |
|
|
|
|
|
|
Pricing American Options on Dividend-Paying Stocks and Estimating the Greek Letters Using Leisen-Reimer Binomial Trees |
|
|
676 | (10) |
|
|
|
|
|
A Resource-Centric Architecture for Service-Oriented Cyber Physical System |
|
|
686 | (8) |
|
|
|
Implied Volatilities of S&P 100 Index with Applications to Financial Market |
|
|
694 | (6) |
|
|
|
|
RF Characteristics of Wireless Capsule Endoscopy in Human Body |
|
|
700 | (7) |
|
|
|
|
|
|
|
Building a Laboratory Surveillance System via a Wireless Sensor Network |
|
|
707 | (8) |
|
|
|
|
|
|
|
S-Theory: A Unified Theory of Multi-paradigm Software Development |
|
|
715 | (8) |
|
|
|
|
|
|
|
Future Science Technologies and Applications |
|
|
|
Design of J-VTS Middleware Based on IVEF Protocol |
|
|
723 | (7) |
|
|
|
On the Use of a Hash Function in a 3-Party Password-Based Authenticated Key Exchange Protocol |
|
|
730 | (7) |
|
|
|
A Sequence Classification Model Based on Pattern Coverage Rate |
|
|
737 | (9) |
|
|
|
|
|
Development of STEAM Program and Teaching Method for Using LEGO Line Tracer Robot in Elementary School |
|
|
746 | (6) |
|
|
|
Improved Authentication Scheme with Anonymity for Roaming Service in Global Mobility Networks |
|
|
752 | (9) |
|
|
|
|
Cryptanalysis of an Authenticated Group Key Transfer Protocol Based on Secret Sharing |
|
|
761 | (6) |
|
|
|
|
Development of the STEAM-Based Media Education Materials for Prevention of Media Dysfunction in Elementary School |
|
|
767 | (6) |
|
|
|
Access Control Technique of Illegal Harmful Contents for Elementary Schoolchild Online Protection |
|
|
773 | (8) |
|
|
|
The Concept of Delegation of Authorization and Its Expansion for Multi Domain Smart Grid System |
|
|
781 | (7) |
|
|
|
Security Requirement of End Point Security Software |
|
|
788 | (8) |
|
|
|
|
Collecting and Filtering Out Phishing Suspicious URLs Using Spam Trap System |
|
|
796 | (7) |
|
|
|
|
Improvement of a Chaotic Map Based Key Agreement Protocol That Preserves Anonymity |
|
|
803 | (8) |
|
|
|
|
|
|
Solving Router Nodes Placement Problem with Priority Service Constraint in WMNs Using Simulated Annealing |
|
|
811 | (8) |
|
|
|
|
Green and Human Information Technology |
|
|
|
Topology Information Based Spare Capacity Provisioning in WDM Networks |
|
|
819 | (7) |
|
|
|
A Contents Service Profit Model Based on the Quality of Experience and User Group Characteristics |
|
|
826 | (6) |
|
|
|
|
|
Toward Hybrid Model for Architecture-Oriented Semantic Schema of Self-adaptive System |
|
|
832 | (6) |
|
|
|
Optimal Channel Sensing in Cognitive Radio Network with Multiple Secondary Users |
|
|
838 | (8) |
|
|
H.264 Video Delivery over Wireless Mesh Networks Based on Joint Adaptive Cross-Layer Mapping and MDCA MAC |
|
|
846 | (8) |
|
|
|
Automatic Tracking Angle of Arrival of Bandpass Sampling OFDM Signal by MUSIC Algorithm |
|
|
854 | (6) |
|
|
|
A White-List Based Security Architecture (WLSA) for the Safe Mobile Office in the BYOD Era |
|
|
860 | (6) |
|
|
|
|
A Study of Vessel Deviation Prevention Scheme Using a Triangulation in a Seaway |
|
|
866 | (7) |
|
|
|
|
|
|
Analysis of Energy Consumption in Edge Router with Sleep Mode for Green OBS Networks |
|
|
873 | (7) |
|
|
|
|
|
VLC Based Multi-hop Audio Data Transmission System |
|
|
880 | (6) |
|
|
|
|
A Practical Adaptive Scheme for Enhancing Network Stability in Mobile Ad-Hoc Wireless Networks |
|
|
886 | (7) |
|
|
|
|
A Geomulticast Routing Protocol Based on Route Stability in Mobile Ad-Hoc Wireless Networks |
|
|
893 | (6) |
|
|
|
|
RFID-Based Indoor Location Recognition System for Emergency Rescue Evacuation Support |
|
|
899 | (8) |
|
|
|
|
A Symmetric Hierarchical Clustering Related to the Sink Position and Power Threshold for Sensor Networks |
|
|
907 | (7) |
|
|
A Study of Fire Refuge Guide Simulator Based on Sensor Networks |
|
|
914 | (6) |
|
|
|
|
|
|
Design of Parallel Pipelined Algorithm for Field Arithmetic Architecture Based on Cellular Array |
|
|
920 | (6) |
|
|
|
Follower Classification Through Social Network Analysis in Twitter |
|
|
926 | (6) |
|
|
|
|
An Initial Quantization Parameter Decision Method Based on Frame Complexity with Multiple Objectives of GOP for Rate Control of H.264 |
|
|
932 | (7) |
|
|
|
The Development of Privacy Telephone Sets in Encryption System against Eavesdropping |
|
|
939 | (6) |
|
|
|
New ID-Based Proxy Signature Scheme with Message Recovery |
|
|
945 | (8) |
|
|
|
Author Index |
|
953 | |