Regions-of-interest discovering and predicting in smartphone environments Fulltext Access 43 Pages 2018
A genetic algorithms-based hybrid recommender system of matrix factorization and neighborhood-based techniques Fulltext Access 43 Pages 2018
Making sense of performance in in-memory computing frameworks for scientific data analysis: A case study of the spark system Fulltext Access 43 Pages 2018
From ephemeral computing to deep bioinspired algorithms: New trends and applications Fulltext Access 43 Pages 2018
Anonymous biometrics-based authentication scheme with key distribution for mobile multi-server environment Fulltext Access 43 Pages 2018
A benchmark approach and its toolkit for online scheduling of multiple deadline-constrained workflows in big-data processing systems Fulltext Access 43 Pages 2018
Model checking real-time conditional commitment logic using transformation Fulltext Access 43 Pages 2018
Sensing and Actuation as a Service Delivery Model in Cloud Edge centric Internet of Things Fulltext Access 43 Pages 2018
A trust centric optimal service ranking approach for cloud service selection Fulltext Access 43 Pages 2018
Early validation of system requirements and design through correctness-by-construction Fulltext Access 43 Pages 2018
Parallelization of space-aware applications: Modeling and performance analysis Fulltext Access 43 Pages 2018
High-level synthesis of on-chip multiprocessor architectures based on answer set programming Fulltext Access 44 Pages 2018
Show your best self(ie): An exploratory study on selfie-related motivations and behavior in emerging adulthood Fulltext Access 44 Pages 2018
Who finds value in news comment communities? An analysis of the influence of individual user, perceived news site quality, and site type factors Fulltext Access 44 Pages 2018
Technological innovation systems and IT industry sustainability in China: A case study of mobile system innovation Fulltext Access 44 Pages 2018
MASKER: Masking for privacy-preserving aggregation in the smart grid ecosystem Fulltext Access 44 Pages 2018
Identifying, authenticating and authorizing smart objects and end users to cloud services in Internet of Things Fulltext Access 44 Pages 2018
Improving reusability of software libraries through usage pattern mining Fulltext Access 44 Pages 2018
Distributed adaptive beam nulling to survive against jamming in 3D UAV mesh networks Fulltext Access 44 Pages 2018
A predictive approach for the efficient distribution of agent-based systems on a hybrid-cloud Fulltext Access 44 Pages 2018
Supporting end users to control their smart home: design implications from a literature review and an empirical investigation Fulltext Access 44 Pages 2018
Exploring the usefulness of unlabelled test cases in software fault localization Fulltext Access 45 Pages 2018
A predator-prey model on the attacking behavior of malicious objects in wireless nanosensor networks Fulltext Access 45 Pages 2018
Automated poisoning attacks and defenses in malware detection systems: An adversarial machine learning approach Fulltext Access 45 Pages 2018
An approach for optimized feature selection in large-scale software product lines Fulltext Access 45 Pages 2018
Sociometrics and observational assessment of teaming and leadership in a cyber security defense competition Fulltext Access 45 Pages 2018
Design and simulation of the emergent behavior of small drones swarming for distributed target localization Fulltext Access 45 Pages 2018
Mobile phishing attacks and defence mechanisms: State of art and open research challenges Fulltext Access 45 Pages 2018
An alignment-free cancelable fingerprint template for bio-cryptosystems Fulltext Access 45 Pages 2018
Friend-safe evasion attack: An adversarial example that is correctly recognized by a friendly classifier Fulltext Access 45 Pages 2018
A comprehensive survey on spectrum sharing: Architecture, energy efficiency and security issues Fulltext Access 45 Pages 2018
A multi-target approach to estimate software vulnerability characteristics and severity scores Fulltext Access 45 Pages 2018
Scheduling parallel tasks with energy and time constraints on multiple manycore processors in a cloud computing environment Fulltext Access 45 Pages 2018
Optimization of decode-and-forward multihop full duplex relay networks under residual-self-interference Fulltext Access 45 Pages 2018
A novel optimized vertical handover framework for seamless networking integration in cyber-enabled systems Fulltext Access 45 Pages 2018
An approach to task-based parallel programming for undergraduate students Fulltext Access 45 Pages 2018
Cloud provider capacity augmentation through automated resource bartering Fulltext Access 46 Pages 2018
Building situational awareness for network threats in fog/edge computing: Emerging paradigms beyond the security perimeter model Fulltext Access 46 Pages 2018
Privacy-preserving personal data operation on mobile cloud-Chances and challenges over advanced persistent threat Fulltext Access 46 Pages 2018
Lessoning travelers' motivating behavior for a growing phenomenon in Taiwan by an advanced hybrid object-oriented hierarchical model Fulltext Access 46 Pages 2018
Accelerating subset sum and lattice based public-key cryptosystems with multi-core CPUs and GPUs Fulltext Access 46 Pages 2018
Hybrid online protocols for source location privacy in wireless sensor networks Fulltext Access 46 Pages 2018
Rate-based thermal, power, and co-location aware resource management for heterogeneous data centers Fulltext Access 46 Pages 2018
Efficient energy management by exploiting retention state for self-powered nonvolatile processors Fulltext Access 46 Pages 2018
The impact of collectivism and psychological ownership on protection motivation: A cross-cultural examination Fulltext Access 46 Pages 2018
Security-oriented opportunistic data forwarding in Mobile Social Networks Fulltext Access 46 Pages 2018
Using behavioral features in tablet-based auditory emotion recognition studies Fulltext Access 46 Pages 2018
Software patterns and requirements engineering activities in real-world settings: A systematic mapping study Fulltext Access 46 Pages 2018
Guided dynamic particle swarm optimization for optimizing digital image watermarking in industry applications Fulltext Access 46 Pages 2018
Cooperative video caching scheme over software defined passive optical network Fulltext Access 47 Pages 2018
Stop and forward: Opportunistic local information sharing under walking mobility Fulltext Access 47 Pages 2018
Maximization of multicast periodic traffic throughput in multi-hop wireless networks with broadcast transmissions Fulltext Access 47 Pages 2018
Harnessing the persuasive potential of data: The combinatory effects of data visualization and interactive narratives on obesity perceptions and policy attitudes Fulltext Access 48 Pages 2018
Gender and age: Do they really moderate mobile tourism shopping behavior? Fulltext Access 48 Pages 2018
Techno-unemployment: A framework for assessing the effects of information and communication technologies on work Fulltext Access 48 Pages 2018
Adaptive multicast streaming for videoconferences on software-defined networks Fulltext Access 48 Pages 2018
Resource discovery for distributed computing systems: A comprehensive survey Fulltext Access 48 Pages 2018
Real-time and energy aware opportunistic mobile crowdsensing framework based on people's connectivity habits Fulltext Access 48 Pages 2018
Enabling robust and reliable transmission in Internet of Things with multiple gateways Fulltext Access 48 Pages 2018
Secondary users selection and sparse narrow-band interference mitigation in cognitive radio networks Fulltext Access 48 Pages 2018
Adaptive generation of challenging scenarios for testing and evaluation of autonomous vehicles Fulltext Access 49 Pages 2018
Distributed nearest neighbor classification for large-scale multi-label data on spark Fulltext Access 49 Pages 2018
Toward trust based protocols in a pervasive and mobile computing environment: A survey Fulltext Access 49 Pages 2018
Building an automotive security assurance case using systematic security evaluations Fulltext Access 49 Pages 2018
Do android developers neglect error handling? a maintenance-Centric study on the relationship between android abstractions and uncaught exceptions Fulltext Access 49 Pages 2018
Exploiting smart e-Health gateways at the edge of healthcare Internet-of-Things: A fog computing approach Fulltext Access 49 Pages 2018
Secure multi-keyword ranked search over encrypted cloud data for multiple data owners Fulltext Access 49 Pages 2018
Solving Stackelberg security Markov games employing the bargaining Nash approach: Convergence analysis Fulltext Access 50 Pages 2018
The role of social support networks in proxy Internet use from the intergenerational solidarity perspective Fulltext Access 50 Pages 2018
The impacts of techniques, programs and tests on automated program repair: An empirical study Fulltext Access 50 Pages 2018
Cloud service evaluation method-based Multi-Criteria Decision-Making: A systematic literature review Fulltext Access 50 Pages 2018
The role of Information and Communication Technologies in healthcare: taxonomies, perspectives, and challenges Fulltext Access 50 Pages 2018
An ensemble learning based approach for impression fraud detection in mobile advertising Fulltext Access 50 Pages 2018
Secure key agreement protocols: Pure biometrics and cancelable biometrics Fulltext Access 50 Pages 2018
A dual-radio approach for reliable emergency signaling in critical infrastructure assets with large wireless networks Fulltext Access 50 Pages 2018