Volume 10, Issue 2 (April 2013)

Special Issue on Advances on Mobile Collaborative Systems

 

Editorial

Regular Papers


[ view | download | cite ]
Song, F., Zhou, H., Zhang, S., Zhang, H., You, I.: The Throughput Critical Condition Study for Reliable Multipath Transport. Computer Science and Information Systems, Vol. 10, No. 2, 567-587. (2013), https://doi.org/10.2298/CSIS120725024S


[ view | download | cite ]
Chen, C., Tsai, Y., Castiglione, A., Palmieri, F.: Using Bivariate Polynomial to Design a Dynamic Key Management Scheme for Wireless Sensor Networks. Computer Science and Information Systems, Vol. 10, No. 2, 589-609. (2013), https://doi.org/10.2298/CSIS120907025C


[ view | download | cite ]
Zhao, J., Wen, Y.: Evaluation on the Influence of Internet Prefix Hijacking Events. Computer Science and Information Systems, Vol. 10, No. 2, 611-631. (2013), https://doi.org/10.2298/CSIS121108023Z


[ view | download | cite ]
Choi, B., Cho, K.: Two-Step Hierarchical Scheme for Detecting Detoured Attacks to the Web Server. Computer Science and Information Systems, Vol. 10, No. 2, 633-649. (2013), https://doi.org/10.2298/CSIS120908026C


[ view | download | cite ]
Huang, D., Lee, Y., Wu, H.: An Efficient GTS Allocation Scheme for IEEE 802.15.4 MAC Layer. Computer Science and Information Systems, Vol. 10, No. 2, 651-665. (2013), https://doi.org/10.2298/CSIS120702027H


[ view | download | cite ]
Wang, J., Ma, H., Tang, Q., Li, J., Zhu, H., Ma, S., Chen, X.: Efficient Verifiable Fuzzy Keyword Search over Encrypted Data in Cloud Computing. Computer Science and Information Systems, Vol. 10, No. 2, 667-684. (2013), https://doi.org/10.2298/CSIS121104028W


[ view | download | cite ]
Kang, H., Kim, S., Kim, P.: Traffic Deflection Method for DOS Attack Defense using a Location-Based Routing Protocol in the Sensor Network. Computer Science and Information Systems, Vol. 10, No. 2, 685-701. (2013), https://doi.org/10.2298/CSIS120914029K


[ view | download | cite ]
Lee, T., Kim, H., Rhee, K., Shin, S. U.: Design and Implementation of E-Discovery as a Service based on Cloud Computing. Computer Science and Information Systems, Vol. 10, No. 2, 703-724. (2013), https://doi.org/10.2298/CSIS120922030L


[ view | download | cite ]
Huo, J., Deng, B., Wu, S., Yuan, J., You, I.: A Topographic-Awareness and Situational-Perception Based Mobility Model with Artificial Bee Colony Algorithm for Tactical MANET. Computer Science and Information Systems, Vol. 10, No. 2, 725-746. (2013), https://doi.org/10.2298/CSIS120714031H


[ view | download | cite ]
Jeong, H. J., Lim, J., Hyun, W., An, A.: A Real-time Location-based SNS Smartphone Application for the Disabled Population. Computer Science and Information Systems, Vol. 10, No. 2, 747-765. (2013), https://doi.org/10.2298/CSIS120711032J


[ view | download | cite ]
Hwang, M., Jeong, D., Kim, J., Song, S., Jung, H.: Activity Inference for Constructing User Intention Model. Computer Science and Information Systems, Vol. 10, No. 2, 767-778. (2013), https://doi.org/10.2298/CSIS121101033H


[ view | download | cite ]
Chen, H., Violetta, M. A., Weng, C., Kung, T.: Cognitive RBAC in Mobile Heterogeneous Networks. Computer Science and Information Systems, Vol. 10, No. 2, 779-806. (2013), https://doi.org/10.2298/CSIS121110034C


[ view | download | cite ]
Lee, Y., Kim, B., Rhee, S.: Content-based Image Retrieval using Spatial-color and Gabor Texture on a Mobile Device. Computer Science and Information Systems, Vol. 10, No. 2, 807-823. (2013), https://doi.org/10.2298/CSIS120716035L


[ view | download | cite ]
Hu, J., Yang, C., Liu, T.: Design and Implementation of an Efficient and Programmable Future Internet Testbed in Taiwan. Computer Science and Information Systems, Vol. 10, No. 2, 825-842. (2013), https://doi.org/10.2298/CSIS121114036H


[ view | download | cite ]
Doh, I., Lim, J., Chae, K.: Key Management Approach for Secure Mobile Open IPTV Service. Computer Science and Information Systems, Vol. 10, No. 2, 843-863. (2013), https://doi.org/10.2298/CSIS120917037D


[ view | download | cite ]
Bai, B., Feng, Z., Zhao, B., Su, J.: Benefiting From the Community Structure in Opportunistic Forwarding. Computer Science and Information Systems, Vol. 10, No. 2, 865-876. (2013), https://doi.org/10.2298/CSIS120921038B


[ view | download | cite ]
Wen, J., Yao, Y., Kuo, Y.: Wiener-based ICI Cancellation Schemes for OFDM Systems over Fading Channels. Computer Science and Information Systems, Vol. 10, No. 2, 877-896. (2013), https://doi.org/10.2298/CSIS120722039W


[ view | download | cite ]
Tanaka, S., Nishide, T., Sakurai, K.: Efficient Implementation for QUAD Stream Cipher with GPUs. Computer Science and Information Systems, Vol. 10, No. 2, 897-911. (2013), https://doi.org/10.2298/CSIS121102040T


[ view | download | cite ]
Gao, T., Guo, N., Yim, K.: A Hybrid Approach to Secure Hierarchical Mobile IPv6 Networks. Computer Science and Information Systems, Vol. 10, No. 2, 913-938. (2013), https://doi.org/10.2298/CSIS121114041G