Volume 10, Issue 2 (April 2013)
Special Issue on Advances on Mobile Collaborative Systems
Regular Papers
The Throughput Critical Condition Study for Reliable Multipath Transport
Fei Song, Huachun Zhou, Sidong Zhang, Hongke Zhang and Ilsun You
[ view | download | cite ]
Song, F., Zhou, H., Zhang, S., Zhang, H., You, I.: The Throughput Critical Condition Study for Reliable Multipath Transport. Computer Science and Information Systems, Vol. 10, No. 2, 567-587. (2013), https://doi.org/10.2298/CSIS120725024S
Using Bivariate Polynomial to Design a Dynamic Key Management Scheme for Wireless Sensor Networks
Chin-Ling Chen, Yu-Ting Tsai, Aniello Castiglione and Francesco Palmieri
[ view | download | cite ]
Chen, C., Tsai, Y., Castiglione, A., Palmieri, F.: Using Bivariate Polynomial to Design a Dynamic Key Management Scheme for Wireless Sensor Networks. Computer Science and Information Systems, Vol. 10, No. 2, 589-609. (2013), https://doi.org/10.2298/CSIS120907025C
Evaluation on the Influence of Internet Prefix Hijacking Events
Jinjing Zhao and Yan Wen
[ view | download | cite ]
Zhao, J., Wen, Y.: Evaluation on the Influence of Internet Prefix Hijacking Events. Computer Science and Information Systems, Vol. 10, No. 2, 611-631. (2013), https://doi.org/10.2298/CSIS121108023Z
Two-Step Hierarchical Scheme for Detecting Detoured Attacks to the Web Server
Byungha Choi and Kyungsan Cho
[ view | download | cite ]
Choi, B., Cho, K.: Two-Step Hierarchical Scheme for Detecting Detoured Attacks to the Web Server. Computer Science and Information Systems, Vol. 10, No. 2, 633-649. (2013), https://doi.org/10.2298/CSIS120908026C
An Efficient GTS Allocation Scheme for IEEE 802.15.4 MAC Layer
Der-Chen Huang, Yi-Wei Lee and Hsiang-Wei Wu
[ view | download | cite ]
Huang, D., Lee, Y., Wu, H.: An Efficient GTS Allocation Scheme for IEEE 802.15.4 MAC Layer. Computer Science and Information Systems, Vol. 10, No. 2, 651-665. (2013), https://doi.org/10.2298/CSIS120702027H
Efficient Verifiable Fuzzy Keyword Search over Encrypted Data in Cloud Computing
Jianfeng Wang, Hua Ma, Qiang Tang, Jin Li, Hui Zhu, Siqi Ma and Xiaofeng Chen
[ view | download | cite ]
Wang, J., Ma, H., Tang, Q., Li, J., Zhu, H., Ma, S., Chen, X.: Efficient Verifiable Fuzzy Keyword Search over Encrypted Data in Cloud Computing. Computer Science and Information Systems, Vol. 10, No. 2, 667-684. (2013), https://doi.org/10.2298/CSIS121104028W
Traffic Deflection Method for DOS Attack Defense using a Location-Based Routing Protocol in the Sensor Network
Ho-Seok Kang, Sung-Ryul Kim and Pankoo Kim
[ view | download | cite ]
Kang, H., Kim, S., Kim, P.: Traffic Deflection Method for DOS Attack Defense using a Location-Based Routing Protocol in the Sensor Network. Computer Science and Information Systems, Vol. 10, No. 2, 685-701. (2013), https://doi.org/10.2298/CSIS120914029K
Design and Implementation of E-Discovery as a Service based on Cloud Computing
Taerim Lee, Hun Kim, Kyung-Hyune Rhee and Sang Uk Shin
[ view | download | cite ]
Lee, T., Kim, H., Rhee, K., Shin, S. U.: Design and Implementation of E-Discovery as a Service based on Cloud Computing. Computer Science and Information Systems, Vol. 10, No. 2, 703-724. (2013), https://doi.org/10.2298/CSIS120922030L
A Topographic-Awareness and Situational-Perception Based Mobility Model with Artificial Bee Colony Algorithm for Tactical MANET
Jinhai Huo, Bowen Deng, Shuhang Wu, Jian Yuan and Ilsun You
[ view | download | cite ]
Huo, J., Deng, B., Wu, S., Yuan, J., You, I.: A Topographic-Awareness and Situational-Perception Based Mobility Model with Artificial Bee Colony Algorithm for Tactical MANET. Computer Science and Information Systems, Vol. 10, No. 2, 725-746. (2013), https://doi.org/10.2298/CSIS120714031H
A Real-time Location-based SNS Smartphone Application for the Disabled Population
Hae-Duck J. Jeong, Jiyoung Lim, WooSeok Hyun and Arisu An
[ view | download | cite ]
Jeong, H. J., Lim, J., Hyun, W., An, A.: A Real-time Location-based SNS Smartphone Application for the Disabled Population. Computer Science and Information Systems, Vol. 10, No. 2, 747-765. (2013), https://doi.org/10.2298/CSIS120711032J
Activity Inference for Constructing User Intention Model
Myunggwon Hwang, Do-Heon Jeong, Jinhyung Kim, Sa-kwang Song and Hanmin Jung
[ view | download | cite ]
Hwang, M., Jeong, D., Kim, J., Song, S., Jung, H.: Activity Inference for Constructing User Intention Model. Computer Science and Information Systems, Vol. 10, No. 2, 767-778. (2013), https://doi.org/10.2298/CSIS121101033H
Cognitive RBAC in Mobile Heterogeneous Networks
Hsing-Chung Chen, Marsha Anjanette Violetta, Chien-Erh Weng and Tzu-Liang Kung
[ view | download | cite ]
Chen, H., Violetta, M. A., Weng, C., Kung, T.: Cognitive RBAC in Mobile Heterogeneous Networks. Computer Science and Information Systems, Vol. 10, No. 2, 779-806. (2013), https://doi.org/10.2298/CSIS121110034C
Content-based Image Retrieval using Spatial-color and Gabor Texture on a Mobile Device
Yong-Hwan Lee, Bonam Kim and Sang-Burm Rhee
[ view | download | cite ]
Lee, Y., Kim, B., Rhee, S.: Content-based Image Retrieval using Spatial-color and Gabor Texture on a Mobile Device. Computer Science and Information Systems, Vol. 10, No. 2, 807-823. (2013), https://doi.org/10.2298/CSIS120716035L
Design and Implementation of an Efficient and Programmable Future Internet Testbed in Taiwan
Jen-Wei Hu, Chu-Sing Yang and Te-Lung Liu
[ view | download | cite ]
Hu, J., Yang, C., Liu, T.: Design and Implementation of an Efficient and Programmable Future Internet Testbed in Taiwan. Computer Science and Information Systems, Vol. 10, No. 2, 825-842. (2013), https://doi.org/10.2298/CSIS121114036H
Key Management Approach for Secure Mobile Open IPTV Service
Inshil Doh, Jiyoung Lim and Kijoon Chae
[ view | download | cite ]
Doh, I., Lim, J., Chae, K.: Key Management Approach for Secure Mobile Open IPTV Service. Computer Science and Information Systems, Vol. 10, No. 2, 843-863. (2013), https://doi.org/10.2298/CSIS120917037D
Benefiting From the Community Structure in Opportunistic Forwarding
Bing Bai, Zhenqian Feng, Baokang Zhao and Jinshu Su
[ view | download | cite ]
Bai, B., Feng, Z., Zhao, B., Su, J.: Benefiting From the Community Structure in Opportunistic Forwarding. Computer Science and Information Systems, Vol. 10, No. 2, 865-876. (2013), https://doi.org/10.2298/CSIS120921038B
Wiener-based ICI Cancellation Schemes for OFDM Systems over Fading Channels
Jyh-Horng Wen, Yung-Cheng Yao and Ying-Chih Kuo
[ view | download | cite ]
Wen, J., Yao, Y., Kuo, Y.: Wiener-based ICI Cancellation Schemes for OFDM Systems over Fading Channels. Computer Science and Information Systems, Vol. 10, No. 2, 877-896. (2013), https://doi.org/10.2298/CSIS120722039W
Efficient Implementation for QUAD Stream Cipher with GPUs
Satoshi Tanaka, Takashi Nishide and Kouichi Sakurai
[ view | download | cite ]
Tanaka, S., Nishide, T., Sakurai, K.: Efficient Implementation for QUAD Stream Cipher with GPUs. Computer Science and Information Systems, Vol. 10, No. 2, 897-911. (2013), https://doi.org/10.2298/CSIS121102040T
A Hybrid Approach to Secure Hierarchical Mobile IPv6 Networks
Tianhan Gao, Nan Guo and Kangbin Yim
[ view | download | cite ]
Gao, T., Guo, N., Yim, K.: A Hybrid Approach to Secure Hierarchical Mobile IPv6 Networks. Computer Science and Information Systems, Vol. 10, No. 2, 913-938. (2013), https://doi.org/10.2298/CSIS121114041G