


default search action
IEEE Transactions on Emerging Topics in Computing, Volume 4
Volume 4, Number 1, January - March 2016
- Fabrizio Lombardi:
Message From the Editor-in-Chief. 3-4 - Franco Zambonelli, Andrea Omicini
, Paul Scerri:
Coordination in Large-Scale Socio-Technical Systems: Introduction to the Special Section. 5-8 - Soufiane Bouarfa
, Henk A. P. Blom, Ricky Curran:
Agent-Based Modeling and Simulation of Coordination by Airline Operations Control. 9-20 - Giuseppe Cardone, Antonio Corradi
, Luca Foschini
, Raffaele Ianniello:
ParticipAct: A Large-Scale Crowdsensing Platform. 21-32 - Giorgio Di Natale, Stefano Zanero
:
Editorial. 33-34 - Luca Allodi
, Marco Corradin, Fabio Massacci
:
Then and Now: On the Maturity of the Cybercrime Markets The Lesson That Black-Hat Marketeers Learned. 35-46 - Yudhistira Nugraha
, Ian Brown, Ashwin Sasongko Sastrosubroto:
An Adaptive Wideband Delphi Method to Study State Cyber-Defence Requirements. 47-59 - Florent Bruguier
, Pascal Benoit, Lionel Torres, Lyonel Barthe, Morgan Bourree, Victor Lomné:
Cost-Effective Design Strategies for Securing Embedded Processors. 60-72 - Riccardo Bernardini
, Roberto Rinaldo:
Theoretical Limits of Helperless Stabilizers for Physically Unclonable Constants. 73-87 - Keita Emura
, Akira Kanaoka, Satoshi Ohta, Kazumasa Omote, Takeshi Takahashi
:
Secure and Anonymous Communication Technique: Formal Model and Its Prototype Implementation. 88-101 - Yuh-Min Tseng, Sen-Shan Huang, Tung-Tso Tsai, Jia-Hua Ke:
List-Free ID-Based Mutual Authentication and Key Agreement Protocol for Multiserver Architectures. 102-112 - Gökçe Görbil, Omer H. Abdelrahman
, Mihajlo Pavloski, Erol Gelenbe:
Modeling and Analysis of RRC-Based Signalling Storms in 3G Networks. 113-127 - Ragib Hasan
, Rasib Khan, Shams Zawoad, Md Munirul Haque:
WORAL: A Witness Oriented Secure Location Provenance Framework for Mobile Devices. 128-141 - Nikos Tsikoudis, Antonis Papadogiannakis, Evangelos P. Markatos:
LEoNIDS: A Low-Latency and Energy-Efficient Network-Level Intrusion Detection System. 142-155 - Klimis S. Ntalianis, Nicolas Tsapatsoulis
:
Remote Authentication via Biometrics: A Robust Video-Object Steganographic Mechanism Over Wireless Networks. 156-174
Volume 4, Number 2, April - June 2016
- Yu-Chee Tseng, Sun-Yuan Hsieh
:
Guest Editorial: Special Section on Emerging Topics in the Design of High Performance Internet Routers. 177-178 - Jiann-Liang Chen, Yi-Wei Ma
, Hung-Yi Kuo, Chu-Sing Yang, Wen-Chien Hung:
Software-Defined Network Virtualization Platform for Enterprise Network Resource Management. 179-186 - Hung-Mao Chu, Tsung-Hsien Li, Pi-Chung Wang
:
IP Address Lookup by Using GPU. 187-198 - Hongke Zhang, Hongbin Luo, Han-Chieh Chao
:
Dealing With Mobility-Caused Outdated Mappings in Networks With Identifier/Locator Separation. 199-213 - Yeim-Kuan Chang, Chun-Sheng Hsueh:
Range-Enhanced Packet Classification Design on FPGA. 214-224 - Ching-Chih Chuang, Ya-Ju Yu, Ai-Chun Pang, Hsueh-Wen Tseng
, Hsin-Peng Lin:
Efficient Multicast Delivery for Data Redundancy Minimization Over Wireless Data Centers. 225-241 - Ying Xiao, Krishnaiyan Thulasiraman, Guoliang Xue, Mamta Yadav:
QoS Routing Under Multiple Additive Constraints: A Generalization of the LARAC Algorithm. 242-251 - Jen-Feng Huang, Guey-Yun Chang, Chun-Feng Wang, Chih-Hao Lin:
Heterogeneous Flow Table Distribution in Software-Defined Networks. 252-261 - Rajiv Ranjan
, Lizhe Wang, Albert Y. Zomaya
, Jie Tao, Prem Prakash Jayaraman
, Dimitrios Georgakopoulos
:
Advances in Methods and Techniques for Processing Streaming Big Data in Datacentre Clouds. 262-265 - He Li
, Mianxiong Dong
, Kaoru Ota
, Minyi Guo:
Pricing and Repurchasing for Big Data Processing in Multi-Clouds. 266-277 - Daniel Sun, Min Fu, Liming Zhu
, Guoqiang Li, Qinghua Lu:
Non-Intrusive Anomaly Detection With Streaming Performance Metrics and Logs for DevOps in Public Clouds: A Case Study in AWS. 278-289 - Shangguang Wang
, Ao Zhou, Ching-Hsien Hsu, Xuanyu Xiao, Fangchun Yang:
Provision of Data-Intensive Services Through Energy- and QoS-Aware Virtual Machine Placement in National Cloud Data Centers. 290-300 - Danan Thilakanathan
, Shiping Chen
, Surya Nepal
, Rafael A. Calvo:
SafeProtect: Controlled Data Sharing With User-Defined Policies in Cloud-Based Collaborative Environment. 301-315
Volume 4, Number 3, July - September 2016
- Mehran Mozaffari Kermani
, Erkay Savas, Shambhu J. Upadhyaya:
Guest Editorial: Introduction to the Special Issue on Emerging Security Trends for Deeply-Embedded Computing Systems. 318-320 - Arsalan Mohsen Nia, Susmita Sur-Kolay, Anand Raghunathan
, Niraj K. Jha:
Physiological Information Leakage: A New Frontier in Health Information Security. 321-334 - Md. Tauhidur Rahman
, Fahim Rahman, Domenic Forte
, Mark M. Tehranipoor:
An Aging-Resistant RO-PUF for Reliable Key Generation. 335-348 - Xiaojing Ma, Wenjun Kevin Zeng
, Laurence T. Yang, Deqing Zou, Hai Jin:
Lossless ROI Privacy Protection of H.264/AVC Compressed Surveillance Videos. 349-362 - Xiaofei Guo, Chenglu Jin, Chi Zhang, Athanasios Papadimitriou
, David Hély
, Ramesh Karri
:
Can Algorithm Diversity in Stream Cipher Implementation Thwart (Natural and) Malicious Faults? 363-373 - Vicenç Torra
, Termeh Shafie
, Julián Salas
:
Data Protection for Online Social Networks and P-Stability for Graphs. 374-381 - Phillip A. Laplante, Claudio Demartini, Fabrizio Lamberti
, Colin J. Neill:
Guest Editorial: Special Issue on Emerging Trends in Education - Part I. 382-384 - Rachel S. Harris, Charles B. Hodges:
Using Google Tools for Online Coursework: Student Perceptions. 385-391 - Fabrizio Riente
, Izhar Hussain, Massimo Ruo Roch
, Marco Vacca:
Understanding CMOS Technology Through TAMTAMS Web. 392-403 - Walter Cazzola
, Diego Mathias Olivares:
Gradually Learning Programming Supported by a Growable Programming Language. 404-415 - Elena Baralis, Luca Cagliero
:
Learning From Summaries: Supporting e-Learning Activities by Means of Document Summarization. 416-428 - Cesar Morillas Barrio
, Mario Muñoz Organero
, Joaquín Sánchez-Soriano
:
Can Gamification Improve the Benefits of Student Response Systems in Learning? An Experimental Study. 429-438 - Cristina Sylla
, I. S. P. Pereira
, Clara P. Coutinho, Pedro Branco
:
Digital Manipulatives as Scaffolds for Preschoolers' Language Development. 439-449 - Peter Brusilovsky
, Sibel Somyürek
, Julio Guerra
, Roya Hosseini, Vladimir Zadorozhny, Paula J. Durlach:
Open Social Student Modeling for Personalized Learning. 450-461 - Marjan Khobreh, Fazel Ansari
, Madjid Fathi, Réka Vas
, Stefan T. Mol
, Hannah A. Berkers
, Krisztián Varga
:
An Ontology-Based Approach for the Semantic Representation of Job Knowledge. 462-473
Volume 4, Number 4, October - December 2016
- Jun Huang, Ying Yin, Yanxiao Zhao, Qiang Duan, Wei Wang, Shui Yu
:
A Game-Theoretic Resource Allocation Approach for Intercell Device-to-Device Communications in Cellular Networks. 475-486 - Dan Wang
, Jiangchuan Liu, Jianliang Xu
, Hongbo Jiang, Chonggang Wang:
Data Sweeper: A Proactive Filtering Framework for Error-Bounded Sensor Data Collection. 487-501 - Ahmed Jedda, Hussein T. Mouftah:
Decentralized RFID Coverage Algorithms With Applications for the Reader Collisions Avoidance Problem. 502-515 - Hung-Hsiang Wang, Hsin-An Hou, Jyh-Cheng Chen:
Design and Analysis of an Antenna Control Mechanism for Time Division Duplexing Distributed Antenna Systems Over High-Speed Rail Communications. 516-527 - Chung-Ming Huang, Chao-Hsien Lee, Hsin-Yi Lai:
Energy-Aware Group LBS Using D2D Offloading and M2M-Based Mobile Proxy Handoff Mechanisms Over the Mobile Converged Networks. 528-540 - Weixian Liao, Ming Li, Sergio Salinas, Pan Li
, Miao Pan:
Energy-Source-Aware Cost Optimization for Green Cellular Networks with Strong Stability. 541-555 - Aiqing Zhang, Jianxin Chen, Liang Zhou, Shui Yu
:
Graph Theory-Based QoE-Driven Cooperation Stimulation for Content Dissemination in Device-to-Device Communication. 556-567 - Jing Zeng
, Laurence T. Yang, Jianhua Ma, Minyi Guo:
HyperspaceFlow: A System-Level Design Methodology for Smart Space. 568-583

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.