- Sanghwan Oh, Hanchul Bae, Seongmin Park, Hwankuk Kim:
Real-Time Malicious Script Blocking Technology at the Host-Level. BWCCA 2016: 483-490 - Sungtaek Oh, Woong Go, Taejin Lee:
A Study on The behavior-based Malware Detection Signature. BWCCA 2016: 663-670 - Tomoki Okutake, Noriki Uchida, Noriyasu Yamamoto:
Proposal of Collaborative Object Tracking Methods by Multi-Drones for Flight Surveillance Systems. BWCCA 2016: 593-600 - Ryuji Ono, Elis Kulla, Evjola Spaho
:
Performance Evaluation of VANETs in Different Real Map Scenarios. BWCCA 2016: 639-647 - Masaki Otomo, Goshi Sato, Yoshitaka Shibata:
In-Vehicle Cloudlet Computing based on Delay Tolerant Network Protocol for Disaster Information System. BWCCA 2016: 255-266 - Kosuke Ozera, Tetsuya Oda, Donald Elmazi
, Leonard Barolli:
Design and Implementation of a Simulation System Based on Genetic Algorithm for Node Placement in Wireless Sensor and Actor Networks. BWCCA 2016: 673-682 - Hyun Soo Park, Young Bae Jeon, Ji Won Yoon:
A New Approach to Building a Disguised Server Using the Honey Port Against General Scanning Attacks. BWCCA 2016: 453-465 - Sangjoon Park, Kangbin Yim, Byeong-Gwon Kang:
Error Performance of Successive Interference Cancellation Schemes in MIMO Systems. BWCCA 2016: 649-655 - Yuki Sakai, Tetsuya Oda, Makoto Ikeda, Leonard Barolli:
VegeShop Tool: A Tool for Vegetable Recognition Using DNN. BWCCA 2016: 683-691 - Shinji Sakamoto, Tetsuya Oda, Makoto Ikeda, Leonard Barolli, Fatos Xhafa:
An Integrated Simulation System Considering WMN-PSO Simulation System and Network Simulator 3. BWCCA 2016: 187-198 - Takuhiro Sato, Shoma Kushizaki, Shimpei Matsumoto, Tomoki Kitawaki, Tatsushi Tokuyasu:
Development of Training System for Pedaling Skill by Visualizing Muscle Activity Pattern. BWCCA 2016: 775-782 - Atsuhiro Sawada, Hiroki Kataoka, Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa:
Energy-aware Server Selection Algorithms for Storage and Computation Processes. BWCCA 2016: 45-56 - Lijun Song, Wenan Zhou, Yanjun Hou, Mengyu Gao:
Load-aware ACB Scheme for M2M Traffic in LTE-A Networks. BWCCA 2016: 69-80 - Yuki Takeda, Syuhei Yamamoto, Ryo Nishide, Hideyuki Takada:
Building a Content Delivery Network among Tens of Nearby Devices Using MultihopWireless Communication. BWCCA 2016: 323-330 - Kun-Lin Tsai
, Fang-Yie Leu, King-Shing Yip:
Device Parameter based Secure User Authentication. BWCCA 2016: 721-730 - Minoru Uehara:
OpenFlow Mesh for Metabolic Computing. BWCCA 2016: 613-620 - Ryo Watanabe, Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa:
An Energy-efficient Migration Model of Processes with Virtual Machines in a Server Cluster. BWCCA 2016: 33-44 - Haruka Watanabe, Kaoru Fujioka:
The effective flock control by two sheepdogs. BWCCA 2016: 757-762 - Fushan Wei, Ruijie Zhang, Jian Shen
:
A Provably Secure Two-Factor Authenticated Key Exchange Protocol for Wireless Sensor Networks Based on Authenticated Encryption. BWCCA 2016: 849-855 - Heri Wijayanto, Hsing-Chung Chen, Wen Yen Lin:
A Smart Card-Based Three-Party Quantum Key Distribution Protocol. BWCCA 2016: 291-301 - Masafumi Yamada, Tetsuya Oda, Yi Liu, Keita Matsuo, Leonard Barolli:
Performance Evaluation of an IoT-Based E-Learning Testbed Using Mean Shift Clustering Approach Considering Electroencephalogram Data. BWCCA 2016: 549-557 - Xuewei Yan, Hua Ma, Zhenhua Liu, Ting Peng:
Large Universe Revocable Fine-Grained Encryption with Public Auditing. BWCCA 2016: 823-830 - Jun Yang, Shujuan Li:
Searchable Public Key Encryption Scheme with Data Integrity Checking. BWCCA 2016: 363-370 - Jun Yang, Haixia Yang, Qinshu Xiao:
The Detection Technology of LTE based Stratified Fuzz. BWCCA 2016: 401-409 - Jun Yang, Haipeng Zhang, Lifang Han, Baojiang Cui, Guowei Dong:
Design and implementation of software consistency detection system based on Netty framework. BWCCA 2016: 343-351 - Xuhui Yang, Wenan Zhou, Da Li:
An Energy-Efficient Macro-assisted Sleep-Mode Scheme in Heterogeneous Networks. BWCCA 2016: 81-91 - Linchao Zhang, Hua Ma, Zhenhua Liu, Enting Dong:
Security Analysis and Improvement of A Collusion-Resistant Identity-Based Proxy Re-Encryption Scheme. BWCCA 2016: 839-846 - Zhiwei Zhang, Yunling Wang, Jianfeng Wang, Xiaofeng Chen, Jianfeng Ma:
Location-Sensitive Data Sharing in Mobile Cloud Computing. BWCCA 2016: 799-805 - Yinghui Zhang, Dong Zheng:
Efficient and Expressive Anonymous Attribute-Based Encryption for Mobile Cloud Computing. BWCCA 2016: 807-814 - Jingling Zhao, Lei He, Bing He:
C++ Memory Check tool based on Dynamic Binary Instrumentation Platform. BWCCA 2016: 3-11