


default search action
IEEE Transactions on Emerging Topics in Computing, Volume 4
Volume 4, Number 1, January - March 2016
- Fabrizio Lombardi:

Message From the Editor-in-Chief. 3-4 - Franco Zambonelli, Andrea Omicini

, Paul Scerri:
Coordination in Large-Scale Socio-Technical Systems: Introduction to the Special Section. 5-8 - Soufiane Bouarfa

, Henk A. P. Blom, Ricky Curran:
Agent-Based Modeling and Simulation of Coordination by Airline Operations Control. 9-20 - Giuseppe Cardone, Antonio Corradi

, Luca Foschini
, Raffaele Ianniello:
ParticipAct: A Large-Scale Crowdsensing Platform. 21-32 - Giorgio Di Natale, Stefano Zanero

:
Editorial. 33-34 - Luca Allodi

, Marco Corradin, Fabio Massacci
:
Then and Now: On the Maturity of the Cybercrime Markets The Lesson That Black-Hat Marketeers Learned. 35-46 - Yudhistira Nugraha

, Ian Brown, Ashwin Sasongko Sastrosubroto:
An Adaptive Wideband Delphi Method to Study State Cyber-Defence Requirements. 47-59 - Florent Bruguier

, Pascal Benoit, Lionel Torres, Lyonel Barthe, Morgan Bourree, Victor Lomné:
Cost-Effective Design Strategies for Securing Embedded Processors. 60-72 - Riccardo Bernardini

, Roberto Rinaldo:
Theoretical Limits of Helperless Stabilizers for Physically Unclonable Constants. 73-87 - Keita Emura

, Akira Kanaoka, Satoshi Ohta, Kazumasa Omote, Takeshi Takahashi
:
Secure and Anonymous Communication Technique: Formal Model and Its Prototype Implementation. 88-101 - Yuh-Min Tseng, Sen-Shan Huang, Tung-Tso Tsai, Jia-Hua Ke:

List-Free ID-Based Mutual Authentication and Key Agreement Protocol for Multiserver Architectures. 102-112 - Gökçe Görbil, Omer H. Abdelrahman

, Mihajlo Pavloski, Erol Gelenbe:
Modeling and Analysis of RRC-Based Signalling Storms in 3G Networks. 113-127 - Ragib Hasan

, Rasib Khan, Shams Zawoad, Md Munirul Haque:
WORAL: A Witness Oriented Secure Location Provenance Framework for Mobile Devices. 128-141 - Nikos Tsikoudis, Antonis Papadogiannakis, Evangelos P. Markatos:

LEoNIDS: A Low-Latency and Energy-Efficient Network-Level Intrusion Detection System. 142-155 - Klimis S. Ntalianis, Nicolas Tsapatsoulis

:
Remote Authentication via Biometrics: A Robust Video-Object Steganographic Mechanism Over Wireless Networks. 156-174
Volume 4, Number 2, April - June 2016
- Yu-Chee Tseng, Sun-Yuan Hsieh

:
Guest Editorial: Special Section on Emerging Topics in the Design of High Performance Internet Routers. 177-178 - Jiann-Liang Chen, Yi-Wei Ma

, Hung-Yi Kuo, Chu-Sing Yang, Wen-Chien Hung:
Software-Defined Network Virtualization Platform for Enterprise Network Resource Management. 179-186 - Hung-Mao Chu, Tsung-Hsien Li, Pi-Chung Wang

:
IP Address Lookup by Using GPU. 187-198 - Hongke Zhang, Hongbin Luo, Han-Chieh Chao

:
Dealing With Mobility-Caused Outdated Mappings in Networks With Identifier/Locator Separation. 199-213 - Yeim-Kuan Chang, Chun-Sheng Hsueh:

Range-Enhanced Packet Classification Design on FPGA. 214-224 - Ching-Chih Chuang, Ya-Ju Yu, Ai-Chun Pang, Hsueh-Wen Tseng

, Hsin-Peng Lin:
Efficient Multicast Delivery for Data Redundancy Minimization Over Wireless Data Centers. 225-241 - Ying Xiao, Krishnaiyan Thulasiraman, Guoliang Xue, Mamta Yadav:

QoS Routing Under Multiple Additive Constraints: A Generalization of the LARAC Algorithm. 242-251 - Jen-Feng Huang, Guey-Yun Chang, Chun-Feng Wang, Chih-Hao Lin:

Heterogeneous Flow Table Distribution in Software-Defined Networks. 252-261 - Rajiv Ranjan

, Lizhe Wang, Albert Y. Zomaya
, Jie Tao, Prem Prakash Jayaraman
, Dimitrios Georgakopoulos
:
Advances in Methods and Techniques for Processing Streaming Big Data in Datacentre Clouds. 262-265 - He Li

, Mianxiong Dong
, Kaoru Ota
, Minyi Guo:
Pricing and Repurchasing for Big Data Processing in Multi-Clouds. 266-277 - Daniel Sun, Min Fu, Liming Zhu

, Guoqiang Li, Qinghua Lu:
Non-Intrusive Anomaly Detection With Streaming Performance Metrics and Logs for DevOps in Public Clouds: A Case Study in AWS. 278-289 - Shangguang Wang

, Ao Zhou, Ching-Hsien Hsu, Xuanyu Xiao, Fangchun Yang:
Provision of Data-Intensive Services Through Energy- and QoS-Aware Virtual Machine Placement in National Cloud Data Centers. 290-300 - Danan Thilakanathan

, Shiping Chen
, Surya Nepal
, Rafael A. Calvo:
SafeProtect: Controlled Data Sharing With User-Defined Policies in Cloud-Based Collaborative Environment. 301-315
Volume 4, Number 3, July - September 2016
- Mehran Mozaffari Kermani

, Erkay Savas, Shambhu J. Upadhyaya:
Guest Editorial: Introduction to the Special Issue on Emerging Security Trends for Deeply-Embedded Computing Systems. 318-320 - Arsalan Mohsen Nia, Susmita Sur-Kolay, Anand Raghunathan

, Niraj K. Jha:
Physiological Information Leakage: A New Frontier in Health Information Security. 321-334 - Md. Tauhidur Rahman

, Fahim Rahman, Domenic Forte
, Mark Tehranipoor:
An Aging-Resistant RO-PUF for Reliable Key Generation. 335-348 - Xiaojing Ma, Wenjun Kevin Zeng

, Laurence T. Yang, Deqing Zou, Hai Jin:
Lossless ROI Privacy Protection of H.264/AVC Compressed Surveillance Videos. 349-362 - Xiaofei Guo, Chenglu Jin, Chi Zhang, Athanasios Papadimitriou

, David Hély
, Ramesh Karri
:
Can Algorithm Diversity in Stream Cipher Implementation Thwart (Natural and) Malicious Faults? 363-373 - Vicenç Torra

, Termeh Shafie
, Julián Salas
:
Data Protection for Online Social Networks and P-Stability for Graphs. 374-381 - Phillip A. Laplante, Claudio Demartini, Fabrizio Lamberti

, Colin J. Neill:
Guest Editorial: Special Issue on Emerging Trends in Education - Part I. 382-384 - Rachel S. Harris, Charles B. Hodges

:
Using Google Tools for Online Coursework: Student Perceptions. 385-391 - Fabrizio Riente

, Izhar Hussain, Massimo Ruo Roch
, Marco Vacca:
Understanding CMOS Technology Through TAMTAMS Web. 392-403 - Walter Cazzola

, Diego Mathias Olivares:
Gradually Learning Programming Supported by a Growable Programming Language. 404-415 - Elena Baralis, Luca Cagliero

:
Learning From Summaries: Supporting e-Learning Activities by Means of Document Summarization. 416-428 - Cesar Morillas Barrio

, Mario Muñoz Organero
, Joaquín Sánchez-Soriano
:
Can Gamification Improve the Benefits of Student Response Systems in Learning? An Experimental Study. 429-438 - Cristina Sylla

, I. S. P. Pereira
, Clara P. Coutinho, Pedro Branco
:
Digital Manipulatives as Scaffolds for Preschoolers' Language Development. 439-449 - Peter Brusilovsky

, Sibel Somyürek
, Julio Guerra
, Roya Hosseini, Vladimir Zadorozhny, Paula J. Durlach:
Open Social Student Modeling for Personalized Learning. 450-461 - Marjan Khobreh, Fazel Ansari

, Madjid Fathi, Réka Vas
, Stefan T. Mol
, Hannah A. Berkers
, Krisztián Varga
:
An Ontology-Based Approach for the Semantic Representation of Job Knowledge. 462-473
Volume 4, Number 4, October - December 2016
- Jun Huang, Ying Yin, Yanxiao Zhao, Qiang Duan, Wei Wang, Shui Yu

:
A Game-Theoretic Resource Allocation Approach for Intercell Device-to-Device Communications in Cellular Networks. 475-486 - Dan Wang

, Jiangchuan Liu, Jianliang Xu
, Hongbo Jiang, Chonggang Wang:
Data Sweeper: A Proactive Filtering Framework for Error-Bounded Sensor Data Collection. 487-501 - Ahmed Jedda, Hussein T. Mouftah:

Decentralized RFID Coverage Algorithms With Applications for the Reader Collisions Avoidance Problem. 502-515 - Hung-Hsiang Wang, Hsin-An Hou, Jyh-Cheng Chen:

Design and Analysis of an Antenna Control Mechanism for Time Division Duplexing Distributed Antenna Systems Over High-Speed Rail Communications. 516-527 - Chung-Ming Huang, Chao-Hsien Lee, Hsin-Yi Lai:

Energy-Aware Group LBS Using D2D Offloading and M2M-Based Mobile Proxy Handoff Mechanisms Over the Mobile Converged Networks. 528-540 - Weixian Liao, Ming Li, Sergio Salinas, Pan Li

, Miao Pan:
Energy-Source-Aware Cost Optimization for Green Cellular Networks with Strong Stability. 541-555 - Aiqing Zhang, Jianxin Chen, Liang Zhou, Shui Yu

:
Graph Theory-Based QoE-Driven Cooperation Stimulation for Content Dissemination in Device-to-Device Communication. 556-567 - Jing Zeng

, Laurence T. Yang, Jianhua Ma, Minyi Guo:
HyperspaceFlow: A System-Level Design Methodology for Smart Space. 568-583

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














