Ausgabe 2/2013
Special Section on Social Network and High Performance in Smart Communications (pp 611-780) // Special Section on Hybrid Information Security Technologies - Part I (pp 781-1132)
Inhalt (30 Artikel)
Social network and high performance in smart communications
Jongsung Kim, Philip S. Yu, Nasrullah Memon
The QoS-based MCDM system for SaaS ERP applications with Social Network
James (Jong Huk) Park, Hwa-Young Jeong
Dynamic FOAF management method for social networks in the social web environment
Jong-Soo Sohn, In-Jeong Chung
An energy-efficient clustered distributed coding for large-scale wireless sensor networks
Yuexing Peng, Yonghui Li, Lei Shu, Wenbo Wang
A uplink radio resource allocation scheme for localized SC-FDMA transmission in LTE network
Yen Wen Chen, Shaoh Chen Ke
A disk bandwidth allocation mechanism with priority
Xibin Wang, Xia Xie, Hai Jin, Xuanhua Shi, Wenzhi Cao, Xijiang Ke
Churn-aware optimal layer scheduling scheme for scalable video distribution in super-peer overlay networks
Yong-Hyuk Moon, Jeong-Nyeo Kim, Chan-Hyun Youn
Efficient algorithms for team formation with a leader in social networks
Ming-Chin Juang, Chen-Che Huang, Jiun-Long Huang
MODM: multi-objective diffusion model for dynamic social networks using evolutionary algorithm
Iram Fatima, Muhammad Fahim, Young-Koo Lee, Sungyoung Lee
Analysis and effects of smart home dataset characteristics for daily life activity recognition
Iram Fatima, Muhammad Fahim, Young-Koo Lee, Sungyoung Lee
Editorial of special section on hybrid information security technologies—part I
Sangsoo Yeo, Shiuh-Jeng Wang
Adaptive scheduling for parallel tasks with QoS satisfaction for hybrid cloud environments
Wei-Jen Wang, Yue-Shan Chang, Win-Tsung Lo, Yi-Kang Lee
Reversibility of image with balanced fidelity and capacity upon pixels differencing expansion
Fu-Hau Hsu, Min-Hao Wu, Shiuh-Jeng Wang, Chia-Ling Huang
Design and implementation of privacy preserving billing protocol for smart grid
Chun-I Fan, Shi-Yuan Huang, William Artan
Damaged backup data recovery method for Windows mobile
Jewan Bang, Changhoon Lee, Sangjin Lee, Kyungho Lee
Reversible privacy preserving data mining: a combination of difference expansion and privacy preserving
Tung-Shou Chen, Wei-Bin Lee, Jeanne Chen, Yuan-Hung Kao, Pei-Wen Hou
A novel Adaptive Cluster Transformation (ACT)-based intrusion tolerant architecture for hybrid information technology
Jungmin Lim, Yongki Kim, Dongyoung Koo, Soojin Lee, Seokjoo Doo, Hyunsoo Yoon
Reordering computation sequences for memory-efficient binary field multiplication
Tae Youn Han, Mun-Kyu Lee
Information delivery scheme of micro UAVs having limited communication range during tracking the moving target
Hyo Hyun Choi, Su Hyun Nam, Taeshik Shon, Myungwhan Choi
Two ID-based authenticated schemes with key agreement for mobile environments
Chih-Ho Chou, Kuo-Yu Tsai, Chung-Fu Lu
Towards secure and efficient user authentication scheme using smart card for multi-server environments
Te-Yu Chen, Cheng-Chi Lee, Min-Shiang Hwang, Jinn-Ke Jan
Visible watermarking images in high quality of data hiding
Chi-Yao Weng, Yu Hong Zhang, Li Chun Lin, Shiuh-Jeng Wang
Privacy aware image template matching in clouds using ambient data
Arash Nourian, Muthucumaru Maheswaran
Secure and robust multipath routings for advanced metering infrastructure
Binod Vaidya, Dimitrios Makrakis, Hussein Mouftah
Image interpolating based data hiding in conjunction with pixel-shifting of histogram
Ya-Ting Chang, Cheng-Ta Huang, Chin-Feng Lee, Shiuh-Jeng Wang
Contract RBAC in cloud computing
Hsing-Chung (Jack) Chen, Marsha Anjanette Violetta, Cheng-Ying Yang