
International Journal of Space-Based and Situated Computing
2015 Vol.5 No.1
Pages | Title and author(s) |
1-8 | Investigation of diffracted fields in buildings and wedges: a comparison studyJiro Iwashige; Leonard Barolli; Saki Kameyama; Motohiko Iwaida DOI: 10.1504/IJSSC.2015.067968 |
9-22 | Clone attack detection and data loss prevention in mobile ad hoc networksGanapathy Mani DOI: 10.1504/IJSSC.2015.067978 |
23-38 | Test-bed building process for context-aware peer-to-peer information retrieval evaluation Khedija Arour; Saloua Zammali; Amel Bouzeghoub DOI: 10.1504/IJSSC.2015.067980 |
39-52 | Variable social vector clocks for exploring user interactions in social communication networksTa-Yuan Hsu; Ajay D. Kshemkalyani DOI: 10.1504/IJSSC.2015.067997 |
53-62 | Detection of sensitive information leakage in Android applications using signature generation Hiroki Kuzuno; Satoshi Tonami DOI: 10.1504/IJSSC.2015.067998 |