


default search action
11th CollaborateCom 2015: Wuhan, China
- Song Guo, Xiaofei Liao, Fangming Liu, Yanmin Zhu:
Collaborative Computing: Networking, Applications, and Worksharing - 11th International Conference, CollaborateCom 2015, Wuhan, China, November 10-11, 2015. Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 163, Springer 2016, ISBN 978-3-319-28909-0
Collaborative Cloud Computing
- Daudi Mashauri
, Ruixuan Li, Hongmu Han, Xiwu Gu, Zhiyong Xu, Cheng-Zhong Xu
:
Adaptive Multi-keyword Ranked Search Over Encrypted Cloud Data. 3-13 - Weifeng Sun, Huangping Wei, Zhenxing Ji, Qingqing Zhang, Chi Lin:
A Collaborated IPv6-Packets Matching Mechanism Base on Flow Label in OpenFlow. 14-25 - Qi-Ying Hu, Chang-Dong Wang, Jia-Xin Hong, Meng-Zhe Hua, Di Huang:
Traveller: A Novel Tourism Platform for Students Based on Cloud Data. 26-35 - Wangying Ye, Fei Xu, Wei Zhang:
Achieving Application-Level Utility Max-Min Fairness of Bandwidth Allocation in Datacenter Networks. 36-46 - Bin Luo, Yipei Niu
, Fangming Liu:
Cost-Effective Service Provisioning for Hybrid Cloud Applications. 47-56
Architecture and Evaluation
- Jie Zhang
, Deze Zeng, Lin Gu, Hong Yao, Yuanyuan Fan:
On Rule Placement for Multi-path Routing in Software-Defined Networks. 59-71 - Vitaliy Liptchinsky, Benjamin Satzger, Stefan Schulte
, Schahram Dustdar
:
Crowdstore: A Crowdsourcing Graph Database. 72-81 - Xiaohu Fan, Si Chen, Shipeng Qi, Xincheng Luo, Jing Zeng
, Hao Huang, Changsheng Xie:
An ARM-Based Hadoop Performance Evaluation Platform: Design and Implementation. 82-94 - Jianxiao Liu, Zaiwen Feng, Zonglin Tian
, Feng Liu, Xiaoxia Li:
Research on Service Organization Based on Decorator Pattern. 95-105 - Hao Wu, Jun He, Bo Li, Yijian Pei:
Personalized QoS Prediction of Cloud Services via Learning Neighborhood-Based Model. 106-117
Collaborative Application
- Weiwei Cai, Fazhi He, Xiao Lv:
Multi-core Accelerated Operational Transformation for Collaborative Editing. 121-128 - Zhiping Jiang, Jinsong Han, Wei Xi, Jizhong Zhao:
NFV: Near Field Vibration Based Group Device Pairing. 129-140 - Jing Lu, Mao Ye, Zhi Tang, Xiao-Jun Huang, Jia-Le Ma:
A Novel Method for Chinese Named Entity Recognition Based on Character Vector. 141-150 - Hao Wang, Tao Li, Tong Zhang, Jie Wang:
Android Apps Security Evaluation System in the Cloud. 151-160
Sensor and Internet of Things
- Chi Lin, Zihao Song, Qing Liu, Weifeng Sun, Guowei Wu:
Protecting Privacy for Big Data in Body Sensor Networks: A Differential Privacy Approach. 163-172 - Chengwei Zhang, Dongsheng Qiu, Shiling Mao, Xiaojun Hei
, Wenqing Cheng:
Characterizing Interference in a Campus WiFi Network via Mobile Crowd Sensing. 173-182 - Hong Yao, Changkai Zhang, Chao Liu, Qingzhong Liang, Xuesong Yan, Chengyu Hu
:
On Participant Selection for Minimum Cost Participatory Urban Sensing with Guaranteed Quality of Information. 183-194 - Manuel Díaz
, Cristian Martín
, Bartolomé Rubio
:
\lambda -CoAP: An Internet of Things and Cloud Computing Integration Based on the Lambda Architecture and CoAP. 195-206 - Sophie Chabridon
, Denis Conan, Thierry Desprats, Mohamed Mbarki, Chantal Taconet, Léon Lim, Pierrick Marie, Sam Rottenberg:
A Framework for Multiscale-, QoC- and Privacy-aware Context Dissemination in the Internet of Things. 207-218
Security
- Bodong Li, Yuanyuan Zhang, Chen Lyu, Juanru Li, Dawu Gu:
SSG: Sensor Security Guard for Android Smartphones. 221-233 - Youwen Zhu, Zhikuan Wang, Bilal Hassan, Yue Zhang, Jian Wang, Cheng Qian:
Fast Secure Scalar Product Protocol with (almost) Optimal Efficiency. 234-242 - Mojahed Mohamed, Xiaofen Wang, Xiaosong Zhang:
Efficient Secure Authenticated Key Exchange Without NAXOS' Approach Based on Decision Linear Problem. 243-256 - Zhe Wang, Naftaly H. Minsky:
Towards Secure Distributed Hash Table. 257-266 - Ming Zhang
, Boyi Xu, Dongxia Wang:
An Anomaly Detection Model for Network Intrusions Using One-Class SVM and Scaling Strategy. 267-278
Short Paper
- Johannes Klein, Jean Botev
, Steffen Rothkugel:
Layered Consistency Management for Advanced Collaborative Compound Document Authoring. 281-288 - Kai Wang, Xinfu Li, Xuedong Tian:
On Ambiguity Issues of Converting LaTeX Mathematical Formula to Content MathML. 289-295 - Deyuan Zheng, Huan Huo, Shangye Chen, Biao Xu, Liang Liu:
LTMF: Local-Based Tag Integration Model for Recommendation. 296-302 - Salvatore F. Pileggi
:
A Privacy-Friendly Model for an Efficient and Effective Activity Scheduling Inside Dynamic Virtual Organizations. 303-308 - Jie Wang, Tao Li, Hao Wang, Tong Zhang:
A Discovery Method of Service Bottleneck for Distributed Service. 309-316 - Binbin Zhou, Hexin Lv, Huafeng Chen, Ping Xu:
A Collaborative Rear-End Collision Warning Algorithm in Vehicular Ad Hoc Networks. 317-322 - Yuan Gao, Hong Ao, Jian Chu, Zhou Bo, Weigui Zhou, Yi Li:
Analysis of Signaling Overhead and Performance Evaluation in Cellular Networks of WeChat Software. 323-328 - Jianghua Zhao
, Xuezhi Wang, Qinghui Lin, Jianhui Li:
Exploration of Applying Crowdsourcing in Geosciences: A Case Study of Qinghai-Tibetan Lake Extraction. 329-334

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.