default search action
KSII Transactions on Internet and Information Systems, Volume 9
Volume 9, Number 1, January 2015
- Wenrong Gong, Xiaoxiang Wang:
Joint User Association and Resource Allocation of Device-to-Device Communication in Small Cell Networks. 1-19 - Jaewoo So:
Entropy-based Spectrum Sensing for Cognitive Radio Networks in the Presence of an Unauthorized Signal. 20-33 - Hiran Kumar Singh, Dhananjay Kumar, Srilakshmi R.:
Short Term Spectrum Trading in Future LTE Based Cognitive Radio Systems. 34-49 - Hyochun Ahn, Jaebeom Kim, Young-Bae Ko:
CLSR: Cognitive Link State Routing for CR-based Tactical Ad Hoc Networks. 50-67 - Su Pan, Weiwei Zhou, Qingqing Gu, Qiang Ye:
Network Selection Algorithm Based on Spectral Bandwidth Mapping and an Economic Model in WLAN & LTE heterogeneous networks. 68-86 - Riming Wang, Jiuchao Feng:
Grid-based Correlation Localization Method in Mixed Line-of-Sight/Non-Line-of-Sight Environments. 87-107 - Inho Hwang, Jeong Woo Lee:
Half-Duplex Relaying Strategy Suitable for a Relay with Mobility. 108-125 - Xiaoshuang Liu, Guixia Kang, Ningbo Zhang:
Percolation Theory-Based Exposure-Path Prevention for 3D-Wireless Sensor Networks Coverage. 126-148 - Qun Lei, Yueyun Chen:
Resource Allocation based on Hybrid Sharing Mode for Heterogeneous Services of Cognitive Radio OFDM Systems. 149-168 - Ponnai Manogaran Ashok Kumar, Vaidehi V.:
Anomalous Event Detection in Traffic Video Based on Sequential Temporal Patterns of Spatial Interval Events. 169-189 - Weixing Wang, Sheng Liu:
Online Burning Material Pile Detection on Color Clustering and Quaternion based Edge Detection in Boiler. 190-207 - Weisheng Li, Lidou Wang:
Near-infrared Face Recognition by Fusion of E-GV-LBP and FKNN. 208-223 - Shiping Zhu, Zheng Li:
Local Stereo Matching Using Combined Matching Cost and Adaptive Cost Aggregation. 224-241 - Shiping Zhu, Dongyu Zhao:
Fractal Depth Map Sequence Coding Algorithm with Motion-vector-field-based Motion Estimation. 242-259 - Songqing Wang, Xiaoming Xu, Weiwei Yang:
Physical Layer Security in Underlay CCRNs with Fixed Transmit Power. 260-279 - Wentan Yi, Shaozhen Chen, Kuanyang Wei:
Zero-Correlation Linear Cryptanalysis of Reduced Round ARIA with Partial-sum and FFT. 280-295 - Yanting Ren, Liji Wu, An Wang:
Double Sieve Collision Attack Based on Bitwise Detection. 296-308 - In Kuk Song, Junchul Chun:
Evolving Internet Information & Technology as Enablers for Creating Shared Values. 309-317 - Woo-Sik Lee, Byoung-Dai Lee, Namgi Kim:
An Accelerometer-Assisted Power Management for Wearable Sensor Systems. 318-330 - Gyanendra Prasad Joshi, Sung Won Kim, Chang-Su Kim, Seung Yeob Nam:
A Distributed Medium Access Control Protocol for Cognitive Radio Ad Hoc Networks. 331-343 - Murad Khan, Gisu Park, Wooseong Cho, Gihyuk Seong, Kijun Han:
A Handover Management Scheme Based on User-Preferences and Network-Centric Approach. 344-357 - Dung Phan, In Seop Na, Soo-Hyung Kim, Gueesang Lee, Hyung Jeong Yang:
Triangulation Based Skeletonization and Trajectory Recovery for Handwritten Character Patterns. 358-377 - Yong-Suk Park, Se-Ho Park, Tae Gon Kim, Jong-Moon Chung:
Implementation of Gesture Interface for Projected Surfaces. 378-390 - Yoosin Kim, Seung Ryul Jeong:
Opinion-Mining Methodology for Social Media Analytics. 391-406 - Sungho Shin, Hanmin Jung, Mun Yong Yi:
Building a Business Knowledge Base by a Supervised Learning and Rule-Based Method. 407-420 - Jong-Hwan Kong, Myung-Mook Han:
Malware Containment Using Weight based on Incremental PageRank in Dynamic Social Networks. 421-433 - Mina Lee, Inhye Choi, Seungchan Yang:
When Do People Post a Comment to a News Story on the Internet? 434-445 - Syed Mubarak Ali, Imran Ghani, Muhammad Shafie Abdul Latif:
Interaction-based Collaborative Recommendation: A Personalized Learning Environment (PLE) Perspective. 446-465 - Jong Sung Hwang, Sung Hyun Kim, Ho Lee:
Breaking the Myths of the IT Productivity Paradox. 466-482
Volume 9, Number 2, February 2015
- Yang Yang, Ziyang Liu, Boao Min, Tao Peng, Wenbo Wang:
Optimal User Density and Power Allocation for Device-to-Device Communication Underlaying Cellular Networks. 486-503 - Ahmad M. Khasawneh, Muhammad Shafie Abdul Latif, Hassan Chizari, Moeenuddin Tariq, Abdullah Bamatraf:
Pressure Based Routing Protocol for Underwater Wireless Sensor Network: A Survey. 504-527 - Zhe Zhang, Jing Yang, Jiankang Zhang, Xiaomin Mu:
Pilot Symbol Assisted Weighted Data Fusion Scheme for Uplink Base-Station Cooperation System. 528-544 - Guanyao Du, Ke Xiong, Yu Zhang, Zhengding Qiu:
Outage Analysis and Optimization for Time Switching-based Two-Way Relaying with Energy Harvesting Relay Node. 545-563 - Fei Li, Jiulong Wu, Wenxue Ge, Wei Ji:
Quantum Bacterial Foraging Optimization for Cognitive Radio Spectrum Allocation. 564-582 - Yi Liu, Wenbo Mei, Huiqian Du:
Group-Sparse Channel Estimation using Bayesian Matching Pursuit for OFDM Systems. 583-599 - Jibum Kim, Inbin Kim, Namgu Kwon, Heemin Park, Jinseok Chae:
A Hybrid Algorithm for Online Location Update using Feature Point Detection for Portable Devices. 600-619 - Liang Ming, Gang Zhao, Dongxia Wang, Minhuan Huang, Xiang Li, Qing Miao, Fei Xu:
A Novel Method for Survivability Test Based on End Nodes in Large Scale Network. 620-636 - Myungseok Song, Jun-Dong Cho, Jongpil Jeong:
Global Mobility Management Scheme for Seamless Mobile Multicasting Service Support in PMIPv6 Networks. 637-658 - Ponnai Manogaran Ashok Kumar, Vaidehi V.:
An Anomalous Behavior Detection Method Using System Call Sequences for Distributed Application. 659-679 - M. Buvana, M. Suganthi:
An Efficient Cluster Based Service Discovery Model for Mobile Ad hoc Network. 680-699 - Hu Shen, Shaohe Lv, Xiaodong Wang, Xingming Zhou:
Energy-efficient Routing in MIMO-based Mobile Ad hoc Networks with Multiplexing and Diversity Gains. 700-713 - Fang Li, Min Xie:
Exact Decoding Probability of Random Linear Network Coding for Tree Networks. 714-727 - Cheong Ghil Kim, Yong Soo Choi:
Improved Disparity Map Computation on Stereoscopic Streaming Video with Multi-core Parallel Implementation. 728-741 - Ju-Chin Chen, Pei-Hsun Wu, Jenn-Jier James Lien:
Discriminant Metric Learning Approach for Face Verification. 742-762 - Wenkai Xu, Eung-Joo Lee:
A Novel Method for Hand Posture Recognition Based on Depth Information DescriptorT. 763-774 - Yanna Zhao, Lei Wang, Xu Zhao, Yuncai Liu:
Multiple-Shot Person Re-identification by Features Learned from Third-party Image Sets. 775-792 - Wei Li, Wenwen Zhang, Dawu Gu, Zhi Tao, Zhihong Zhou, Ya Liu, Zhiqiang Liu:
Security Analysis of the Lightweight Cryptosystem TWINE in the Internet of Things. 793-810 - Hongfeng Zhu:
A Provable One-way Authentication Key Agreement Scheme with User Anonymity for Multi-server Environment. 811-829 - Mahir Kutay, Tuncay Ercan:
Formal Trust Assessment with Confidence Probability. 830-842
Volume 9, Number 3, March 2015
- K. Saravanan, Rajaram M.:
An Exploratory Study of Cloud Service Level Agreements - State of the Art Review. 843-871 - Zhigang Li, Yan Shi, Shanzhi Chen, Jingwen Zhao:
Cellular Traffic Offloading through Opportunistic Communications Based on Human Mobility. 872-885 - Kan Zheng, Yue Li, Yingkai Zhang, Zheng Jiang, Hang Long:
Performance Analysis and Evaluation of Deployment in Small Cell Networks. 886-900 - P. Shunmuga Perumal, V. Rhymend Uthariaraj, V. R. Elgin Christo:
WSN Lifetime Analysis: Intelligent UAV and Arc Selection Algorithm for Energy Conservation in Isolated Wireless Sensor Networks. 901-920 - Han Han, Yuhua Xu, Qinfei Huang:
On-demand Allocation of Multiple Mutual-compensating Resources in Wireless Downlinks: a Multi-server Case. 921-940 - Houde Quan, Chuanbao Du, Peizhang Cui:
A Novel Hitting Frequency Point Collision Avoidance Method for Wireless Dual-Channel Networks. 941-955 - Yong Wang, Hao Wu, Liyang Tang, Hui Li:
The Solution for Cooperative Beamforming Design in MIMO Multi-way Relay Networks. 956-970 - Dandan Wang, Yang Yang, Zhenqiang Mi:
QoS-Based and Network-Aware Web Service Composition across Cloud Datacenters. 971-989 - Wei Lu, Yuwang Yang, Wei Zhao, Lei Wang:
Practical Node Deployment Scheme Based on Virtual Force for Wireless Sensor Networks in Complex Environment. 990-1013 - Shigeng Zhang, Shuping Yan, Weitao Hu, Jianxin Wang, Kehua Guo:
A Component-Based Localization Algorithm for Sparse Sensor Networks Combining Angle and Distance Information. 1014-1034 - Chourouk Hammami, Imen Jemili, Achraf Gazdar, Abdelfettah Belghith, Mohamed Mosbah:
HLPSP: A Hybrid Live P2P Streaming Protocol. 1035-1056 - Hualiang Chen, Yueming Cai, Dan Wu:
Joint Spectrum and Power Allocation for Green D2D Communication with Physical Layer Security Consideration. 1057-1073 - Hongbin Chen, Qiong Zhang, Feng Zhao:
Energy-Efficient Base Station Sleep Scheduling in Relay-Assisted Cellular Networks. 1074-1086 - Zhe Chen, Bingbing Yang, Fuliang Yin:
An Eye Location based Head Posture Recognition Method and Its Application in Mouse Operation. 1087-1104 - Filip Cvitic, Mario-Osvin Pavcevic, Jesenka Pibernik:
Two Messages out of One 2D Matrix Bar Code. 1105-1120 - Chunyu Lin, Yao Zhao, Jimin Xiao, Tammam Tillo:
Depth Map Coding Using Histogram-Based Segmentation and Depth Range Updating. 1121-1139 - Huiwen Zhang, Huihui Bai, Meiqin Liu, Yao Zhao:
Optimized Multiple Description Lattice Vector Quantization Coding for 3D Depth Image. 1140-1154 - Yongfeng Ren, Jingbo Zhou, Zhijian Wang, Yunyang Yan:
An Improved Saliency Detection for Different Light Conditions. 1155-1172 - Hansung Lee, Daesung Moon, Ikkyun Kim, Hoseok Jung, Daihee Park:
Anomaly Intrusion Detection Based on Hyper-ellipsoid in the Kernel Feature Space. 1173-1192 - Guangjun Liu:
Practical Schemes for Tunable Secure Network Coding. 1193-1209 - Taenam Cho, Seung-Hyun Seo:
A Strengthened Android Signature Management Method. 1210-1230 - Kuo-Jui Wei, Jung-San Lee, Shin-Jen Chen:
Enhancing the Security of Credit Card Transaction based on Visual DSC. 1231-1245 - Hu Xiong, Shikun Wu, Ji Geng, Emmanuel Ahene, Songyang Wu, Zhiguang Qin:
A Pairing-free Key-insulated Certificate-based Signature Scheme with Provable Security. 1246-1259 - Yukyong Kim, Jong-Seok Choi, Yongtae Shin:
Trustworthy Service Discovery for Dynamic Web Service Composition. 1260-1281
Volume 9, Number 4, April 2015
- Pham Phuoc Hung, Mohammad Aazam, Eui-Nam Huh:
CTaG: An Innovative Approach for Optimizing Recovery Time in Cloud Environment. 1282-1301 - Dinesh Komarasamy, Muthuswamy Vijayalakshmi:
Deadline Constrained Adaptive Multilevel Scheduling System in Cloud Environment. 1302-1320 - Jingyu Feng, Guangyue Lu, Hong Chang:
Behave Well: How to Win a Pop Vacant Band via Cooperative Spectrum Sensing. 1321-1336 - Joanne Mun-Yee Lim, Yoong Choon Chang, Mohamad Yusoff Alias, Jonathan Loo:
Performance Modelling of Adaptive VANET with Enhanced Priority Scheme. 1337-1358 - Juan Feng, Baowang Lian, Hongwei Zhao:
Adaptive Energy Optimization for Object Tracking in Wireless Sensor Network. 1359-1375 - Haiquan Wang, Weijian Ma, Hengkun Shi, Chunhe Xia:
An Interval Algebra-based Modeling and Routing Method in Bus Delay Tolerant Network. 1376-1391 - Dongyan Zhao, Keping Long, Dongxue Wang, Yichuan Zheng, Jiajing Tu:
Energy-saving Strategy Based on an Immunization Algorithm for Network Traffic. 1392-1403 - Hongwei Li, Dongxiao Liu, Khalid Nawaf Alharbi, Shenmin Zhang, Xiaodong Lin:
Enabling Fine-grained Access Control with Efficient Attribute Revocation and Policy Updating in Smart Grid. 1404-1423 - Xiong Li, Qi Lv, Wenting Huang:
Learning Similarity with Probabilistic Latent Semantic Analysis for Image Retrieval. 1424-1440 - Feng-Ping An, Xian-Wei Zhou, Da-chao Lin:
Multiscale Self-coordination of Bidimensional Empirical Mode Decomposition in Image Fusion. 1441-1456 - Cheng-You Wang, Rongyang Shan, Xiao Zhou:
APBT-JPEG Image Coding Based on GPU. 1457-1470 - Ahmad Karim, Syed Adeel Ali Shah, Rosli Bin Salleh, Muhammad Arif, Rafidah Md Noor, Shahaboddin Shamshirband:
Mobile Botnet Attacks - an Emerging Threat: Classification, Review and Open Issues. 1471-1492 - Muhammad Daniel Hafiz Abdullah, Zurina Mohd Hanapi, Zuriati Ahmad Zukarnain, Mohamad Afendee Mohamed:
Attacks, Vulnerabilities and Security Requirements in Smart Metering Networks. 1493-1515 - Bao-Hong Li, Yin-Liang Zhao, Hongping Zhao:
Attribute Set Based Signature Secure in the Standard Model. 1516-1528 - Farruh Ishmanov, Sung Won Kim:
A Novel Trust Establishment Method for Wireless Sensor Networks. 1529-1547
Volume 9, Number 5, May 2015
- Gongchao Su, Bin Chen, Xiaohui Lin, Hui Wang, Lemin Li:
QoS Constrained Optimization of Cell Association and Resource Allocation for Load Balancing in Downlink Heterogeneous Cellular Networks. 1569-1586 - Xing Liu, Chaowei Yuan, Enda Peng, Zhen Yang:
Combined Service Subscription and Delivery Energy-Efficient Scheduling in Mobile Cloud Computing. 1587-1605 - Wan Tang, Bo Yi, Ximin Yang, Jingcong Li:
Dynamic Home Circuit Construction for Datacenter Networks Using LOBS-HC Ring. 1606-1623 - Qiang Wang, Yuquan Shu, Minhua Dong, Ji Xu, Xiaofeng Tao:
Degrees of Freedom of 3-user MIMO Interference Channels with Instantaneous Relay Using Interference Alignment. 1624-1641 - Saleem Iqbal, Abdul Hanan Abdullah, Khalid Hussain, Faraz Ahsan:
Channel Allocation in Multi-radio Multi-channel Wireless Mesh Networks: A Categorized Survey. 1642-1661 - Nik Mohammad Balouchzahi, Mahmood Fathy, Ahmad Akbari:
A Graph-based Model for RSUs Deployment in Vehicular Networks by Considering Urban and Network Limitations and QoS Requirements of Service Advertisement and Discovery. 1662-1681 - Lei Wang, Yueming Cai, Weiwei Yang, Wei Yan, Jialei Song:
Effect of Outdated Channel Estimates on Multiple Antennas Multiple Relaying Networks. 1682-1701 - Joon Yeon Choeh, Hong Joo Lee, Sung Joo Park:
A Personalized Approach for Recommending Useful Product Reviews Based on Information Gain. 1702-1716 - Xuejun Zhang, Xiaolin Gui, Feng Tian:
A Framework for Measuring Query Privacy in Location-based Service. 1717-1732 - Xiaoli Zhang, Yongnu Jin, Kyung Sup Kwak:
Adaptive GTS Allocation Scheme with Applications for Real-time Wireless Body Area Sensor Networks. 1733-1751 - Sungwook Kim:
QoS Sensitive VANET Control Scheme based on Feedback Game Model. 1752-1767 - Zhilu Wu, Lihui Jiang, Guanghui Ren, Gangyi Wang, Nan Zhao, Yaqin Zhao:
A Rapid Convergent Max-SINR Algorithm for Interference Alignment Based on Principle Direction Search. 1768-1789 - Yanjun Li, Jianji Shao:
Optimized Resource Allocation for Utility-Based Routing in Ad Hoc and Sensor Networks. 1790-1806 - Chuan-Ming Liu, Cheng-Hsien Chen, Yen-Lin Chen, Jenq-Haur Wang:
AA Mobile P2P Semantic Information Retrieval System with Effective Updates. 1807-1824 - Yuchen Li, Yitong Liu, Hongwen Yang, Dacheng Yang:
Fast Quadtree Structure Decision for HEVC Intra Coding Using Histogram Statistics. 1825-1839 - Shuanglu Dai, Shu Zhan, Ning Song:
Adaptive Active Contour Model: a Localized Mutual Information Approach for Medical Image Segmentation. 1840-1855 - Adnan Farooq, Ahmad Jalal, Shaharyar Kamal:
Dense RGB-D Map-Based Human Tracking and Activity Recognition using Skin Joints Features and Self-Organizing Map. 1856-1869 - Kang-Woo Lee, Hyunseung Choo:
Constructing Impressions with Multimedia Ringtones and a Smartphone Usage Tracker. 1870-1880 - Yun Mo, Zhongzhao Zhang, Yang Lu, Gul Agha:
A Novel Technique for Human Traffic based Radio Map Updating in Wi-Fi Indoor Positioning Systems. 1881-1903 - Weifeng Wu, Fagen Li:
An Efficient Identity-Based Deniable Authenticated Encryption Scheme. 1904-1919 - Fangfang Dai, Kangfeng Zheng, Bin Wu, Shoushan Luo:
Using Genetic Algorithm for Optimal Security Hardening in Risk Flow Attack Graph. 1920-1937 - Khan Muhammad, Jamil Ahmad, Haleem Farman, Zahoor Jan, Muhammad Sajjad, Sung Wook Baik:
A Secure Method for Color Image Steganography using Gray-Level Modification and Multi-level Encryption. 1938-1962 - M. I. Thariq Hussan, B. Kalaavathi:
An Optimized User Behavior Prediction Model Using Genetic Algorithm on Mobile Web Structure. 1963-1978
Volume 9, Number 6, June 2015
- Xiaomeng Chai, Xu Xu, Zhongshan Zhang:
A Survey of Self-optimization Approaches for HetNets. 1979-1995 - Jinxin Niu, Wei Guo:
Resource Allocation for Cooperative Relay based Wireless D2D Networks with Selfish Users. 1996-2013 - Qin Niu, Zhimin Zeng, Tiankui Zhang, Zhirui Hu:
Interference Alignment Based Transceiver Design in OSG mode of HetNets. 2014-2034 - R. Arokia Paul Rajan, F. Sagayaraj Francis:
RAS: Request Assignment Simulator for Cloud-Based Applications. 2035-2049 - Rajkumar Rajavel, Mala Thangarathinam:
A Negotiation Framework for the Cloud Management System using Similarity and Gale Shapely Stable Matching Approach. 2050-2077 - C. Gopala Krishnan, A. Rengarajan, R. Manikandan:
Delay Reduction by Providing Location Based Services using Hybrid Cache in Peer to Peer Networks. 2078-2094 - Yuan Lin, Bowen Li, Hao Yin, Yuanzhi He:
Throughput-efficient Online Relay Selection for Dual-hop Cooperative Networks. 2095-2110 - Hua Dai, Geng Yang, Haiping Huang, Fu Xiao:
Efficient Verifiable Top-k Queries in Two-tiered Wireless Sensor Networks. 2111-2131 - Junhui Zhao, Hao Zhang, Rong Ran:
Distance Geometry-based Wireless Location Algorithms in Cellular Networks with NLOS Errors. 2132-2143 - Seohyang Kim, Hayoung Oh, Chongkwon Kim:
Energy Cognitive Dynamic Adaptive Streaming over HTTP. 2144-2159 - Qing Yang, Jiancheng Li, Hongyi Wang, Xianghua Zeng, Liming Zheng:
A Slot Allocated Blocking Anti-Collision Algorithm for RFID Tag Identification. 2160-2179 - Ling Fu Xie, Peter Han Joo Chong:
Performance Improvement of Delay-Tolerant Networks with Mobility Control under Group Mobility. 2180-2200 - Pooria Varahram, Borhanuddin Mohd Ali, Somayeh Mohammady, Ahmed Wasif Reza:
Prototype of a Peak to Average Power Ratio Reduction Scheme in Orthogonal Frequency Division Multiplexing Systems. 2201-2216 - Yuting Su, Xiaorong Zhu, Weizhi Nie:
Multiple Person Tracking based on Spatial-temporal Information by Global Graph Clustering. 2217-2229 - Muhammad Umer Kakli, Hassaan Saadat Qureshi, Muhammad Murtaza Khan, Rehan Hafiz, Yongju Cho, Unsang Park:
Quality Assessment of Images Projected Using Multiple Projectors. 2230-2250 - Chun-Heng Ho, Kai-Chun Hou:
Exploring the Attractive Factors of App Icons. 2251-2270 - Jinfu Wu, Baolong Guo, Yunyi Yan, Jie Hou, Dan Zhao:
A Fast TU Size Decision Method for HEVC RQT Coding. 2271-2288 - Changkyoung Eem, Iksu Kim, Yeongseok Jung, Hyunki Hong:
Estimating Illumination Distribution to Generate Realistic Shadows in Augmented Reality. 2289-2301 - T. Sivakumar, R. Venkatesan:
A Novel Image Encryption Using Calligraphy Based Scan Method and Random Number. 2317-2337
Volume 9, Number 7, July 2015
- Ding Xu, Qun Li:
Minimum BER Power Allocation for OFDM-based Cognitive Radio Networks. 2338-2353 - Yuanlong Cao, Qinghua Liu, Yi Zuo, Minghe Huang:
Receiver-driven Cooperation-based Concurrent Multipath Transfer over Heterogeneous Wireless Networks. 2354-2370 - Fangqing Tan, Hui Gao, Xin Su, Tiejun Lv:
Sum-Rate Analysis for 3D MIMO with ZF Receivers in Ricean/Lognormal Fading Channels. 2371-2388 - Yaseein Soubhi Hussein, Borhanuddin Mohd Ali, Mohd Fadlee A. Rasid, Aduwati Sali:
Handover in LTE Networks with Proactive Multiple Preparation Approach and Adaptive Parameters Using Fuzzy Logic Control. 2389-2413 - Xiaofeng Li, Liangfeng Chen, Jianping Wang, Zhong Chu, Qiyue Li, Wei Sun:
Fuzzy System and Improved APIT (FIAPIT) Combined Range-free Localization Method for WSN. 2414-2434 - Zahoor Uddin, Ayaz Ahmad, Muhammad Iqbal, Nadir Shah:
Independent Component Analysis Based MIMO Transceiver With Improved Performance In Time Varying Wireless Channels. 2435-2453 - Haitao Xu, Zhen He, Xianwei Zhou:
Load Balancing Algorithm of Ultra-Dense Networks: a Stochastic Differential Game based Scheme. 2454-2467 - Roliana Ibrahim, Shahid Kamal, Imran Ghani, Seung Ryul Jeong:
A Hybrid Query Disambiguation Adaptive Approach for Web Information Retrieval. 2468-2487 - Muruganantham Arunraja, Veluchamy Malathi:
Collective Prediction Exploiting Spatio Temporal Correlation (CoPeST) for Energy Efficient Wireless Sensor networks. 2488-2511 - Xue Zhang, Guangsong Li, Wenbao Han, Huifang Ji:
A Novel ID-based Multi-domain Handover Protocol for Mesh Points in WMNs. 2512-2529 - Yousef Ali Al-Gumaei, Kamarul Ariffin Noordin, Ahmed Wasif Reza, Kaharudin Dimyati:
A Game Theory Approach for Efficient Power Control and Interference Management in Two-tier Femtocell Networks based on Local Aain. 2530-2547 - Qin Luo, Junfeng Wang, Xiaoqing Wang, Ke Wu:
Aero-Sim: An NS-2 Based Simulator for Aeronautical Ad Hoc Networks. 2548-2567 - Jiang-Zhong Cao, Pei Chen, Bingo Wing-Kuen Ling, Zhijing Yang, Qingyun Dai:
Spectral Clustering with Sparse Graph Construction Based on Markov Random Walk. 2568-2584 - Wenkai Xu, Ick-Soo Lee, Suk-Kwan Lee, Bo Lu, Eung-Joo Lee:
MultiView-Based Hand Posture Recognition Method Based on Point Cloud. 2585-2598 - Yanping Ma, Hailin Zou, Hongtao Xie, Qingtang Su:
Fast Search with Data-Oriented Multi-Index Hashing for Multimedia Data. 2599-2613 - Chanfei Wang, Hui Gao, Tiejun Lv:
Soft-Input Soft-Output Multiple Symbol Detection for Ultra-Wideband Systems. 2614-2632 - Yongwei Zhao, Tianqiang Peng, Bicheng Li, Shengcai Ke:
Bag of Visual Words Method based on PLSA and Chi-Square Model for Object Category. 2633-2648 - Zhiping Peng, Bo Xu, Antonio Marcel Gates, Delong Cui, Weiwei Lin:
The Deasibility and Properties of Dividing Virtual Machine Resources using the Virtual Machine Cluster as the Unit in Cloud Computing. 2649-2666 - Wenkai Xu, Suk-Hwan Lee, Eung-Joo Lee:
A Robust Method for Partially Occluded Face Recognition. 2667-2682 - K. Anitha, A. Chilambuchelvan:
NPFAM: Non-Proliferation Fuzzy ARTMAP for Image Classification in Content Based Image Retrieval. 2683-2702 - Yang Lu:
Efficient Certificate-Based Proxy Re-encryption Scheme for Data Sharing in Public Clouds. 2703-2718 - Haoxing Li, Fenghua Li, Chenggen Song, Yalong Yan:
Towards Smart Card Based Mutual Authentication Schemes in Cloud Computing. 2719-2735 - Xi Xiao, Zhenlong Wang, Qi Li, Qing Li, Yong Jiang:
ANNs on Co-occurrence Matrices for Mobile Malware Detection. 2736-2754
Volume 9, Number 8, August 2015
- Jaewoo So:
Cooperative Spectrum Sensing for Cognitive Radio Networks with Limited Reporting. 2755-2773 - Hangguan Shan, Ziyun Ye, Yuanguo Bi, Aiping Huang:
Genetic Algorithm based Resource Management for Cognitive Mesh Networks with Real-time and Non-real-time Services. 2774-2796 - Guomei Zhang, Bing Wang, Guobing Li, Fei Xiang, Gangming Lv:
Interference Management by Vertical Beam Control Combined with Coordinated Pilot Assignment and Power Allocation in 3D Massive MIMO Systems. 2797-2820 - Omprakash Kaiwartya, Shiv Prakash, Abdul Hanan Abdullah, Ahmed Nazar Hassan:
Minimizing Energy Consumption in Scheduling of Dependent Tasks using Genetic Algorithm in Computational Grid. 2821-2839 - Hossein Ghasvari, Mohammad Ali Raayatpanah:
Robust Capacity Planning in Network Coding under Demand Uncertainty. 2840-2853 - Qingfeng Zhang, Sheng Wang, Dan Liao:
A Game Theoretic Analysis of Public Goods Allocation in P2P Networks. 2854-2874 - Cunbo Lu, Song Xiao, Yinbin Miao:
OQMCAR: An Enhanced Network Coding-aware Routing Algorithm Based on Queue State and Local Topology. 2875-2893 - Taehong Kim:
Learning Based Relay Selection for Reliable Content Distribution in Smart Class Application. 2894-2909 - Hang Sub Kim, Bong Gyou Lee:
An Empirical Analysis of Smart Signage and Its Market Delimitation. 2910-2927 - Zuoyong Li, Kezong Tang, Yong Cheng, Xiaobo Chen, Chongbo Zhou:
Modified Adaptive Gaussian Filter for Removal of Salt and Pepper Noise. 2928-2947 - Jinpyung Kim, Gyujin Jang, Gyujin Kim, Moonhyun Kim:
Crowd Activity Recognition using Optical Flow Orientation Distribution. 2948-2963 - Shubair Abdulla, Altyeb Altaher Altyeb:
Intelligent Approach for Android Malware Detection. 2964-2983 - Andrew Rudder, The Duc Kieu:
A Lossless Data Hiding Scheme for VQ Indexes Based on Joint Neighboring Coding. 2984-3004 - Kan Chen, Peidong Zhu, Liang Chen, Yueshan Xiong:
Modeling and Evaluating Information Diffusion for Spam Detection in Micro-blogging Networks. 3005-3027 - In Kuk Song, Mingoo Kang:
Internet Information Orientation: The Link to National Competitiveness on Internet. 3028-3039 - Bit-Na Kwon, Eui-Hak Lee, Dae-Ki Hong, Sung-Jin Kang, Min-goo Kang, Hyoung-Kyu Song:
Downlink Signal Measurement Algorithm for WCDMA/HSPA/HSPA+. 3040-3053 - Jun-Ki Hong, Han-Shin Jo, Cheol Mun, Jong-Gwan Yook:
Maximum Ratio Transmission for Space-Polarization Division Multiple Access in Dual-Polarized MIMO System. 3054-3067 - Chang-Bin Ha, Byung-Jun Jang, Hyoung-Kyu Song:
Adaptive Power Control Using Large Scale Antenna of the Massive MIMO System in the Mobile Communication. 3068-3078 - Hyun-Sik Kim, Jong-Su Seo, Jeong-Wook Seo:
Performance Evaluation of a Smart CoAP Gateway for Remote Home Safety Services. 3079-3089 - Jong-Moon Chung, Yong-Suk Park, Jong-Hong Park, Hyoung Jun Cho:
Adaptive Cloud Offloading of Augmented Reality Applications on Smart Devices for Minimum Energy Consumption. 3090-3102 - Youn-Sung Lee, Jeong-Wook Seo, Jungwook Wee, Mingoo Kang, Dong Ku Kim:
Single-Phase Energy Metering Chip with Built-in Calibration Function. 3103-3120 - Yejin Sohn, Minju Cho, Minjae Seo, Jongho Paik:
A Synchronization Scheme for Hierarchical Video Streams over Heterogeneous Network. 3121-3135 - Wonggi Kim, Junchul Chun:
An Improved Approach for 3D Hand Pose Estimation Based on a Single Depth Image and Haar Random Fores. 3136-3150 - Yongwha Chung, Dongwhee Choi, Heesu Choi, Daihee Park, Hong-Hee Chang, Suk Kim:
Automated Detection of Cattle Mounting using Side-View Camera. 3151-3168 - Yoosin Kim, Do Young Kwon, Seung Ryul Jeong:
Comparing Machine Learning Classifiers for Movie WOM Opinion Mining. 3169-3181 - Myoungjin Kim, Yun Cui, Hanku Lee:
An Efficient Design and Implementation of an MdbULPS in a Cloud-Computing Environment. 3182-3202 - Yen-Wen Chen, Meng-Hsien Lin, Min-Yan Wu:
Study of Data Placement Schemes for SNS Services in Cloud Environment. 3203-3215 - Min-Joon Kim, Hyun Ahn, Minjae Park:
A GraphML-based Visualization Framework for Workflow-Performers' Closeness Centrality Measurements. 3216-3230 - Imran Ghani, Mannir Bello:
Agile Adoption in IT Organizations. 3231-3248 - Jeong Ho Kwak, Jemin Justin Lee, Han-Joo Lee, Bong Gyou Lee:
Estimation of the Demand Function of the Information and Communication Construction Business. 3249-3257 - Hannah Kang, Saraphine Shiping Pang, Sejung Marina Choi:
Investigating the use of multiple social networking services: A cross-cultural perspective in the United States and Korea. 3258-3275
Volume 9, Number 9, September 2015
- Hongyi Zhao, Yang Cao, Yingzhuang Liu:
Interference Cancellation for Relay-Assisted D2D Communication. 3276-3292 - Li Liu, Miao Zhang:
Multi-objective Optimization Model with AHP Decision-making for Cloud Service Composition. 3293-3311 - Wenhao Jiang, Wenjiang Feng, Yang Yu:
Spectrum Allocation based on Auction in Overlay Cognitive Radio Network. 3312-3334 - Le The Dung, Beongku An:
Connectivity Analysis of Cognitive Radio Ad-hoc Networks with Shadow Fading. 3335-3356 - Kang-Wook Kim:
An Efficient Implementation of Key Frame Extraction and Sharing in Android for Wireless Video Sensor Network. 3357-3376 - Wang-Cheol Song, Shafqat Ur Rehman, Muhammad Bilal Awan:
Road Aware Information Sharing in VANETs. 3377-3395 - Murat Karakaya:
MSCT: An Efficient Data Collection Heuristic for Wireless Sensor Networks with Limited Sensor Memory Capacity. 3396-3411 - Umer Javed, Di He, Peilin Liu:
Exact Performance Analysis of AF Based Hybrid Satellite-Terrestrial Relay Network with Co-Channel Interference. 3412-3431 - Qihui Wu, Liang Yue, Long Wang, Guoru Ding:
Non-cooperative Interference Radio Localization with Binary Proximity Sensors. 3432-3448 - Sang-Chul Kim:
Performance Comparison of MISP-based MANET Strong DAD Protocol. 3449-3467 - Hong Tang, Hui-Zhu Wang:
A Multi-Chain Based Hierarchical Topology Control Algorithm for Wireless Sensor Networks. 3468-3495 - A. Karmel, C. Jayakumar:
Recurrent Ant Colony Optimization for Optimal Path Convergence in Mobile Ad Hoc Networks. 3496-3514 - Usman Barakkath Nisha, N. Uma Maheswari, R. Venkatesh, Rabi Yasir Abdullah:
Improving Data Accuracy Using Proactive Correlated Fuzzy System in Wireless Sensor Networks. 3515-3538 - Lingjun Meng, Wentao Zhao, Haohao Zhao, Yang Ding:
A Network Load Sensitive Block Placement Strategy of HDFS. 3539-3558 - Fangqing Wen, Gong Zhang, De Ben:
Adaptive Selective Compressive Sensing based Signal Acquisition Oriented toward Strong Signal Noise Scene. 3559-3571 - Wei Zhang, Gengxin Zhang, Liang Gou, Bo Kong, Dongming Bian:
A Hierarchical Autonomous System Based Topology Control Algorithm in Space Information Network. 3572-3593 - Meng-Hsien Lin, Yen-Wen Chen:
Performance Analysis of Buffer Aware Scheduling for Video Services in LTE Network. 3594-3610 - Min-Joon Kim, Hyun Ahn, Minjae Park:
A Theoretical Framework for Closeness Centralization Measurements in a Workflow-Supported Organization. 3611-3634 - Yuheng Li, Qianchuan Zhao:
Understanding Watching Patterns of Live TV Programs on Mobile Devices: A Content Centric Perspective. 3635-3654 - Junxing Zhang, Chunjuan Bo, Jianbo Tang, Peng Song:
Object Tracking based on Relaxed Inverse Sparse Representation. 3655-3671 - Seungcheol Choi, Oh-Jin Kwon, Dukhyun Jang, Seokrim Choi:
Evaluation of Various Tone Mapping Operators for Backward Compatible JPEG Image Coding. 3672-3684 - Weisheng Li, Lai Peng, Lifang Zhou:
Robust Three-step Facial Landmark Localization under the Complicated Condition via ASM and POEM. 3685-3700 - Yasser M. Alginahi, Mohammed Mudassar, Muhammad Nomani Kabir:
An Arabic Script Recognition System. 3701-3720 - Yunbo Rao, Xianshu Ding, Bojiang Fan:
An Efficent Method of Binocular Data Reconstruction. 3721-3737 - Wei Shi, Sanyang Liu, Zhaohui Zhang:
A Lightweight Detection Mechanism against Sybil Attack in Wireless Sensor Network. 3738-3750 - Zhipeng Chen, Yao Zhao, Rongrong Ni:
Detection for Operation Chain: Histogram Equalization and Dither-like Operation. 3751-3770
Volume 9, Number 10, October 2015
- Chunhua Ju, Qi Shao:
lobal Optimization for Energy Efficient Resource Management by Game Based Distributed Learning in Internet of Things. 3771-3788 - Hui Tian, Wei Xie, Youyun Xu, Kui Xu, Peng Han:
A Flexible Network Access Scheme for M2M Communications in Heterogeneous Wireless Networks. 3789-3809 - Long Zhang, Wei Huang, Qiwu Wu, Wenjing Cao:
Differential Game Theoretic Approach for Distributed Dynamic Cooperative Power Control in Cognitive Radio Ad Hoc Networks. 3810-3830 - Yahui Hu, Song Ci:
QoE-driven Joint Resource Allocation and User-paring in Virtual MIMO SC-FDMA Systems. 3831-3850 - Sanfeng Zhang, Di Huang, Yin Li:
Prediction-Based Routing Methods in Opportunistic Networks. 3851-3866 - Zhan Gao, Junhong Chen, Yuhua Xu:
Opportunistic Spectrum Access with Discrete Feedback in Unknown and Dynamic Environment: A Multi-agent Learning Approach. 3867-3886 - Wenjing Yue, Yapeng Ren, Zhen Yang, Zhi Chen, Qingmin Meng:
Joint Opportunistic Spectrum Access and Optimal Power Allocation Strategies for Full Duplex Single Secondary User MIMO Cognitive Radio Network. 3887-3907 - Bin Zhong, Dandan Zhang, Zhongshan Zhang:
Power Allocation for Opportunistic Full-Duplex based Relay Selection in Cooperative Systems. 3908-3920 - Peng Yu, Lei Feng, Zifan Li, Wenjing Li, Xuesong Qiu:
Low-Complexity Energy Efficient Base Station Cooperation Mechanism in LTE Networks. 3921-3944 - Fengchen Ouyang, Jianhua Ge, Fengkui Gong:
Slotted ALOHA Based Greedy Relay Selection in Large-scale Wireless Networks. 3945-3964 - Kezhong Liu, Tian Yang, Jie Ma, Zhiming Cheng:
Fault-Tolerant Event Detection in Wireless Sensor Networks using Evidence Theory. 3965-3982 - Lingwei Xu, Hao Zhang, T. Aaron Gulliver:
Performance Analysis of IDF Relaying M2M Cooperative Networks over N-Nakagami Fading Channels. 3983-4001 - Xin Su, Haifeng Yu, KyungHi Chang, Seung-Geun Kim, Yong-Kon Lim:
Case Study for Ship Ad-hoc Networks under a Maritime Channel Model in Coastline Areas. 4002-4014 - Bin Liu, Rongfang Song, Haifeng Hu:
A Receiver-Aided Seamless And Smooth Inter-RAT Handover At Layer-2. 4015-4033 - Shunfu Jin, Xinghua Yao, Zhanyou Ma:
A Novel Spectrum Allocation Strategy with Channel Bonding and Channel Reservation. 4034-4053 - Truong-Xuan Do, Younghan Kim:
Optimal Provider Mobility in Large-Scale Named- Data Networking. 4054-4071 - Tuan Anh Tran, In Seop Na, Soo-Hyung Kim:
Separation of Text and Non-text in Document Layout Analysis using a Recursive Filter. 4072-4091 - Xiaoqing Yin, Bin Wang, Weili Li, Yu Liu, Maojun Zhang:
Background Subtraction for Moving Cameras Based on Trajectory-controlled Segmentation and Label Inference. 4092-4107 - Lijun Zhao, Anhong Wang, Bing Zeng, Jian Jin:
Scalable Coding of Depth Images with Synthesis-Guided Edge Detection. 4108-4125 - Song Dong, Jucheng Yang, Yarui Chen, Chao Wang, Xiaoyuan Zhang, Dong Sun Park:
Finger Vein Recognition Based on Multi-Orientation Weighted Symmetric Local Graph Structure. 4126-4142 - Jiawen Hu, Seng-Su Tsang:
Comics with Drama: New Communication in Wedia. 4143-4159 - J. Florence Gnana Poovathy, Radha Sankararajan:
Non-Iterative Threshold based Recovery Algorithm (NITRA) for Compressively Sensed Images and Videos. 4160-4176 - Sungwook Kim:
Cognitive Radio Anti-Jamming Scheme for Security Provisioning IoT Communications. 4177-4190 - S. Fouzul Hidhaya, Angelina Geetha, B. Nandha Kumar, Loganathan Venkat Sravanth, A. Habeeb:
Supplementary Event-Listener Injection Attack in Smart Phones. 4191-4203 - K. V. Pradeepthi, Arputharaj Kannan:
Cloud Attack Detection with Intelligent Rules. 4204-4222 - K. P. Vijayakumar, P. Ganeshkumar, M. Anandaraj:
A Novel Jamming Detection Technique for Wireless Sensor Networks. 4223-4249 - Zhen Zhao, Jie Chen, Yueyu Zhang, Lanjun Dang:
An Efficient Revocable Group Signature Scheme in Vehicular Ad Hoc Networks. 4250-4267
Volume 9, Number 11, November 2015
- Lirong Jiang, Gang Feng, Shuang Qin:
Content Distribution for 5G Systems Based on Distributed Cloud Service Network Architecture. 4268-4290 - Youming Sun, Hongxiang Shao, Xin Liu, Jian Zhang, Junfei Qiu, Yuhua Xu:
Traffic Offloading in Two-Tier Multi-Mode Small Cell Networks over Unlicensed Bands: A Hierarchical Learning Framework. 4291-4310 - Haoran Ji, Weidong Bao, Xiaomin Zhu, Wenhua Xiao:
Topology-based Workflow Scheduling in Commercial Clouds. 4311-4330 - Mujeeb Ahmed, Sung-Guk Yoon:
Dynamic Access and Power Control Scheme for Interference Mitigation in Femtocell Networks. 4331-4346 - Wenhao Fan, Yuan'an Liu, Bihua Tang:
Adaptive Application Component Mapping for Parallel Computation Offloading in Variable Environments. 4347-4366 - Bosung Kim, Kwangsoo Kim, Byeong-Hee Roh:
ENC-MAC: Energy-efficient Non-overlapping Channel MAC for Cognitive Radio enabled Sensor Networks. 4367-4386 - Bing Ning, Shouyi Yang, Xiaomin Mu, Yanhui Lu, Wanming Hao:
Energy Efficiency Resource Allocation for MIMO Cognitive Radio with Multiple Antenna Spectrum Sensing. 4387-4404 - Xiaoshuang Liu, Guixia Kang, Ningbo Zhang, Yanyan Guo:
Cooperative and Competitive Effect in Heterogeneous Networks of Healthcare System. 4405-4418 - ManKyu Park, DongBae Kang, Deock-Gil Oh:
Two-Step Scheduling Scheme to Support Fairness and QoS in DVB-S2 System. 4419-4435 - Minglei Shu, Dongfeng Yuan, Changfang Chen, Yinglong Wang, Chongqing Zhang:
Modeling and Performance Analysis of MAC Protocol for WBAN with Finite Buffer. 4436-4452 - Jun Yan, Kegen Yu:
Base Station Placement for Wireless Sensor Network Positioning System via Lexicographical Stratified Programming. 4453-4468 - Jinhong Fan, Chaowei Yuan:
Outage Performance for DF Two-Way Relaying with Co-Channel Interference over Nakagami-m Fading. 4469-4482 - Xiangwu Gong, Feihong Dong, Hongjun Li, Wei Shao:
Robust Cooperative Relay Beamforming Design for Security. 4483-4501 - Xinguang Xiang, Fan Liu, Ye Bi, Yanfang Wang, Jinhui Tang:
Local Similarity based Discriminant Analysis for Face Recognition. 4502-4518 - Dooyeol Yun, Kwangsue Chung:
Rate Adaptation for HTTP Video Streaming to Improve the QoE in Multi-client Environments. 4519-4533 - Mohammad Khairul Islam, Farah Jahan, Joong-Hwan Baek:
Object Cataloging Using Heterogeneous Local Features for Image Retrieval. 4534-4555 - Xin-Bin Luo, Shan Fu, Yong Wang:
Chaotic Features for Dynamic Textures Recognition with Group Sparsity Representation. 4556-4572 - Jingchao Li:
A Novel Recognition Algorithm Based on Holder Coefficient Theory and Interval Gray Relation Classifier. 4573-4584 - Waqas ur Rahman, Kwangsue Chung:
Buffer-Based Adaptive Bitrate Algorithm for Streaming over HTTP. 4585-4603 - Han Pan, Zhongliang Jing, Minzhe Li, Peng Dong:
Image Deblurring via Adaptive Proximal Conjugate Gradient Method. 4604-4622 - Tran Trung Duy, Pham Ngoc Son:
Secrecy Performances of Multicast Underlay Cognitive Protocols with Partial Relay Selection and without Eavesdropper's Information. 4623-4643 - Jeevaa Katiravan, Duraipandian N, Dharini N:
A Two level Detection of Routing Layer Attacks in Hierarchical Wireless Sensor Networks using Learning based Energy Prediction. 4644-4661 - Ho-Jae Lee, Min-Woo Park, Jung-Ho Eom, Tai-Myoung Chung:
New Approach for Detecting Leakage of Internal Information; Using Emotional Recognition Technology. 4662-4679 - Fucai Zhou, Muqing Lin, Yang Zhou, Yuxi Li:
Efficient Anonymous Broadcast Encryption with Adaptive Security. 4680-4700 - Anjali Anand, Rinkle Rani, Himanshu Aggarwal:
A Security Model based on Reputation and Collaboration through Route-Request in Mobile Ad Hoc Networks. 4701-4719 - Huhnkuk Lim:
Implementation of a Network Provisioning System with User-driven and Trusty Protection Management. 4720-4738
Volume 9, Number 12, December 2015
- Qazi Emad-ul-Haq, Hatim Aboalsamh, Abdelfettah Belghith, Muhammad Hussain, Wadood Abdul, Mostafa H. Dahshan, Sanaa Ghouzali:
Challenges and Solutions for Internet of Things Driven by IPv6. 4739-4758 - Frank Elijorde, Jaewan Lee:
CloudSwitch: A State-aware Monitoring Strategy Towards Energy-efficient and Performance-aware Cloud Data Centers. 4759-4775 - Shukun Liu, Weijia Jia:
An Adaptive Virtual Machine Location Selection Mechanism in Distributed Cloud. 4776-4798 - Yuanhui Zhang, Chunrong Kan, Kun Xu, Yuhua Xu:
Distributed Carrier Aggregation in Small Cell Networks: A Game-theoretic Approach. 4799-4818 - Sok Chhorn, Seok-Ho Yoon, Si-o Seo, Seung-Yeon Kim, Choong-Ho Cho:
Spectrum Reuse Schemes with Power Control for Device-to-Device Communication in LTE-Advanced Cellular Network. 4819-4834 - Zhen Xue, Liang Shen, Guoru Ding, Qihui Wu:
Geolocation Spectrum Database Assisted Optimal Power Allocation: Device-to-Device Communications in TV White Space. 4835-4855 - Zhenzhen Jiao, Baoxian Zhang, Jun Zheng:
BA Virtual-Queue based Backpressure Scheduling Algorithm for Heterogeneous Multi-Hop Wireless Networks. 4856-4871 - Sana Mazahir, Shahzad Amin Sheikh:
An Adaptive Companding Scheme for Peak-to-average Power Ratio Reduction in OFDM Systems. 4872-4891 - Haifeng Liu, Zhuo Yang, Jun Zhang, Xiaomei Bai, Wei Wang, Feng Xia:
Mining Implicit Correlations between Users with the Same Role for Trust-Aware Recommendation. 4892-4911 - Bohao Feng, Huachun Zhou, Mingchuan Zhang, Hongke Zhang:
Cache-Filter: A Cache Permission Policy for Information-Centric Networking. 4912-4933 - Jingchao Li:
A New Robust Signal Recognition Approach Based on Holder Cloud Features under Varying SNR Environment. 4934-4949 - Qing Li, Qinghai Yang, Qingsu He, Kyung Sup Kwak:
Profit-Maximizing Virtual Machine Provisioning Based on Workload Prediction in Computing Cloud. 4950-4966 - Shuangzhi Li, Xiaomin Mu, Xin Guo, Jing Yang, Jiankang Zhang:
Tensor-Based Channel Estimation Approach for One-Way Multi-Hop Relaying Communications. 4967-4986 - Shipra Kumari, Hari Om:
Remote Login Authentication Scheme based on Bilinear Pairing and Fingerprint. 4987-5014 - Wentao Zhu, Jingbo Yang, Tingting Jia, Xu Liu:
Transceiver Optimization for the Multi-Antenna Downlink in MIMO Cognitive System. 5015-5027 - Heba Nashaat, Rawya Rizk:
Handover Management Based on Location Based Services in F-HMIPv6 Networks. 5028-5057 - Xiaomei Xing, Yuesheng Zhu, Zhiwei Mo, Ziqiang Sun, Zhen Liu:
A Novel Perceptual Hashing for Color Images Using a Full Quaternion Representation. 5058-5072 - Weixing Wang, Yanjie Liang:
Rock Fracture Centerline Extraction based on Hessian Matrix and Steger Algorithm. 5073-5086 - Bo Wang, Yue Tan, Meijuan Zhao, Yanqing Guo, Xiangwei Kong:
Classifier Combination Based Source Identification for Cell Phone Images. 5087-5102 - Junjie Feng, Gong Zhang:
High Resolution ISAR Imaging Based on Improved Smoothed L0 Norm Recovery Algorithm. 5103-5115 - Jinxia Wei, Ru Zhang, Jianyi Liu, Xinxin Niu, Yixian Yang:
Defense Strategy of Network Security based on Dynamic Classification. 5116-5134 - Chung-Fu Lu:
Multi-party Password-Authenticated Key Exchange Scheme with Privacy Preservation for Mobile Environment. 5135-5149 - Vahid Heydari, Seong-Moo Yoo:
Lightweight Acknowledgement-Based Method to Detect Misbehavior in MANETs. 5150-5169 - Zhi-Hui Wang, Kuo-Nan Chen, Chin-Chen Chang, Chuan Qin:
Sharing a Large Secret Image Using Meaningful Shadows Based on VQ and Inpainting. 5170-5188 - Lijun Yang, Chao Ding, Meng Wu:
RPIDA: Recoverable Privacy-preserving Integrity-assured Data Aggregation Scheme for Wireless Sensor Networks. 5189-5208 - Xiaofeng Song, Fenlin Liu, Chunfang Yang, Xiangyang Luo, Zhenyu Li:
Steganalysis of Adaptive JPEG Steganography by Selecting DCT Coefficients According to Embedding Distortion. 5209-5228
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.