• Performance Analysis of Storm in a Real-World Big Data Stream Computing Environment

  • A Human-Machine Collaborative Detection Model for Identifying Web Attacks

  • Constrained Route Planning Based on the Regular Expression

  • AXE: Objects Search in Mobile Volunteered Service

  • A Reinforcement Learning Based Workflow Application Scheduling Approach in Dynamic Cloud Environment

  • Modeling the Impacts of WiFi Signals on Energy Consumption of Smartphones

  • p-Faster R-CNN Algorithm for Food Detection

  • Route-Oriented Participants Recruitment in Collaborative Crowdsensing

  • A Comparative Analysis of Content Delivery Capability for Collaborative Dual-Architecture Network

  • A Short Review of Constructing Noise Map Using Crowdsensing Technology

  • Management Node Selection Based on Cloud Model in a Distributed Network

  • Minimum Cost Load Migration in Distributed Software Defined Networks

  • CNTE: A Node Centrality-Based Network Trust Evaluation Method

  • Research of Positioning Tracking on Dynamic Target Based on the Integral Complementing Algorithm

  • LWTP: An Improved Automatic Image Annotation Method Based on Image Segmentation

  • Position vs. Attitude: How Topological Factors Influence Our Difference in the Attitudes on Online Interrelationships? A Case Study with Language Use

  • Collaborative and Green Resource Allocation in 5G HetNet with Renewable Energy

  • High Performance Regular Expression Matching on FPGA

  • An Efficient and Privacy Preserving CP-ABE Scheme for Internet-Based Collaboration

  • A Privacy Settings Prediction Model for Textual Posts on Social Networks

  • On Cost Efficient Dataflow Computing Program Deployment in SDN Managed Distributed Computing Environment

  • A Topology-Aware Reliable Broadcast Scheme for Multidimensional VANET Scenarios

  • Android App Classification and Permission Usage Risk Assessment

  • Adaptive Carving Method for Live FLV Streaming

  • Formal Verification of Authorization Policies for Enterprise Social Networks Using