default search action
KSII Transactions on Internet and Information Systems, Volume 6
Volume 6, Number 1, January 30, 2012
- Kai-Di Chang, Jiann-Liang Chen:
Mobility-Aware Interference Avoidance Scheme for Vehicular WLANs. 5-23 - Dong Chen, Guiran Chang:
A Survey on Security Issues of M2M Communications in Cyber-Physical Systems. 24-45 - Ngoc-Thanh Dinh, Younghan Kim:
RESTful Architecture of Wireless Sensor Network for Building Management System. 46-63 - Hyun-Dong Lee, Mokdong Chung:
Context-Aware Security System for the Smart Phone-based M2M Service Environment. 64-83 - Menghan Chen, Beijun Shen:
Towards Agile Application Integration with M2M Platforms. 84-97 - Sungryel Lim, Boyun Choi, Hongchul Lee:
Control Variables of Remote Joint Analysis Realization on the M2M Case. 98-115 - Ramón Alcarria, Tomás Robles, Augusto Morales Dominguez, Sergio Gonzalez-Miranda:
Flexible Service Composition Based on Bundle Communication in OSGi. 116-130 - Liang Hu, Ling Chi, Hongtu Li, Wei Yuan, Yuyu Sun, Jianfeng Chu:
The Classic Security Application in M2M: the Authentication Scheme of Mobile Payment. 131-146 - Lianhai Shan, Zhenhong Li, Honglin Hu:
Converged Mobile Cellular Networks and Wireless Sensor Networks for Machine-to-Machine Communications. 147-161 - Meng Zhang, Zhe Wang, Menghan Guo:
A Method of Combining Scrambling Technology with Error Control Coding to Realize Both Confidentiality and Reliability in Wireless M2M Communication. 162-177 - Muhammad Omer Farooq, Marc St-Hilaire, Thomas Kunz:
Cross-Layer Architecture for QoS Provisioning in Wireless Multimedia Sensor Networks. 178-202 - Shaoyi Xu, Haiming Wang, Tao Chen, Tao Peng, Kyung Sup Kwak:
Device-to-Device Communication Underlaying Cellular Networks: Connection Establishment and Interference Avoidance. 203-228 - Jose Roberto Perez Cruz, Saúl E. Pomares Hernández, Enrique Munoz de Cote:
Data Alignment for Data Fusion in Wireless Multimedia Sensor Networks Based on M2M. 229-240 - Daniel G. Costa, Luiz Affonso Guedes:
A Survey on Transport Protocols for Wireless Multimedia Sensor Networks. 241-269 - Abdelfettah Belghith, Mohamed Belhassen:
CE-OLSR: a Cartography and Stability Enhanced OLSR for Dynamic MANETs with Obstacles. 270-286 - Thuc Kieu-Xuan, Insoo Koo:
Cooperative Spectrum Sensing using Kalman Filter based Adaptive Fuzzy System for Cognitive Radio Networks. 287-304 - Kai-Di Chang, Chi-Yuan Chen, Shih-Wen Hsu, Han-Chieh Chao, Jiann-Liang Chen:
Advanced Path-Migration Mechanism for Enhancing Signaling Efficiency in IP Multimedia Subsystem. 305-321 - Hui Zheng, Robin Shrestha, Jae Ho Hwang, JaeMong Kim:
A Parallel Combinatory OFDM System with Weighted Phase Subcarriers. 322-340 - Sangwook Kang, Sangbin Lee, Sae-Young Ahn, Sunshin An:
Energy Efficient Topology Control based on Sociological Cluster in Wireless Sensor Networks. 341-360 - Junrong Gu, Sung Jeen Jang, Jae Moung Kim:
A Proactive Dynamic Spectrum Access Method against both Erroneous Spectrum Sensing and Asynchronous Inter-Channel Spectrum Sensing. 361-378 - Chih-Heng Ke:
myEvalSVC: an Integrated Simulation Framework for Evaluation of H.264/SVC Transmission. 379-394 - Jianbin Xie, Tong Liu, Zhangyong Chen, Zhaowen Zhuang:
Joint Template Matching Algorithm for Associated Multi-object Detection. 395-405 - Chih-Lin Hu, Hsin-Cheng Lin, Yu-Feng Hsu, Bing-Jung Hsieh:
A P2P-to-UPnP Proxy Gateway Architecture for Home Multimedia Content Distribution. 406-425 - Ziguan Cui, Zongliang Gan, Xiuchang Zhu:
Joint Spatial-Temporal Quality Improvement Scheme for H.264 Low Bit Rate Video Coding via Adaptive Frameskip. 426-445 - Kuei-Shu Hsu, Wei-Ting Cho, Chin-Feng Lai, Xiaofei Wang, Yueh-Min Huang:
Design and Analysis of an Interactive Motion Simulator in Space Entertainment System. 446-467
Volume 6, Number 2, February 28, 2012
- Young Min Kwon, Jun Suk Kim, Min Young Chung, Hyunseung Choo, Tae-Jin Lee, Mihui Kim:
State of the Art 3GPP M2M Communications toward Smart Grid. 468-479 - Min Chen, Jiafu Wan, Fang Li:
Machine-to-Machine Communications: Architectures, Standards and Applications. 480-497 - Chengzhe Lai, Hui Li, Yueyu Zhang, Jin Cao:
Security Issues on Machine to Machine Communications. 198-514 - Yu-Yi Chen, Jinn-ke Jan, Meng-Lin Tsai, Chun Ching Ku, Der-Chen Huang:
On The Security of RFID-based Monitoring Mechanism for Retail Inventory Management. 515-528 - Marthinus J. Booysen, John S. Gilmore, Sherali Zeadally, Gert-Jan van Rooyen:
Machine-to-Machine (M2M) Communications in Vehicular Networks. 529-546 - Daqiang Zhang, Jiafu Wan, Qiang Liu, Xin Guan, Xuedong Liang:
A Taxonomy of Agent Technologies for Ubiquitous Computing Environments. 547-565 - Seyed Morteza Babamir:
M2M Architecture: Can It Realize Ubiquitous Computing in Daily life? 566-579 - Yongjie Li, Rongfang Song:
A New Compressive Feedback Scheme Based on Distributed Compressed Sensing for Time-Correlated MIMO Channel. 580-592 - Seung Jun Baek:
Reducing Feedback Overhead in Opportunistic Scheduling of Wireless Networks Exploiting Overhearing. 593-609 - Eun Sung Jeon, Jeong-Wook Seo, Janghoon Yang, Jong-Ho Paik, Dong Ku Kim:
Optimal Compensation of Dual Carrier Frequency Offsets for MISO-mode DVB-T2. 610-628 - Wen-Lin Yang, Wan-Ting Hong:
Channel Allocation Strategies for Interference-Free Multicast in Multi-Channel Multi-Radio Wireless Mesh Networks. 629-648 - Jihua Lu, Jianping An, Xiangming Li, Jie Yang, Lei Yang:
A Percolation based M2M Networking Architecture for Data Transmission and Routing. 649-663 - Ping Zhong, Jianghong Shi, Yuxiang Zhuang, Huihuang Chen, Xuemin Hong:
A Generalized Markov Chain Model for IEEE 802.11 Distributed Coordination Function. 664-682 - Changchun Xu, Jingdong Gao, Yanyi Xu, Jianhua He:
Unified Model for Performance Analysis of IEEE 802.11 Ad Hoc Networks in Unsaturated Conditions. 683-701 - Eun Sung Jeon, Jeong-Wook Seo, Janghoon Yang, Jong-Ho Paik, Dong Ku Kim:
Iterative Detection and ICI Cancellation for MISO-mode DVB-T2 System with Dual Carrier Frequency Offsets. 702-721 - Myunghun Lee, Soo-Hyung Kim, Gueesang Lee, Sun-Hee Kim, Hyung Jeong Yang:
Correction for Misrecognition of Korean Texts in Signboard Images using Improved Levenshtein Metric. 722-733 - Sajida Kalsoom, Sheikh Ziauddin, Abdul Rehman Abbasi:
An Image-Based CAPTCHA Scheme Exploiting Human Appearance Characteristics. 734-750 - Junghyun Nam, Moonseong Kim, Juryon Paik, Dongho Won:
Security Weaknesses in Harn-Lin and Dutta-Barua Protocols for Group Key Establishment. 751-765 - Hyoung Chun Kim, Young Han Choi, Dong Hoon Lee:
JsSandbox: A Framework for Analyzing the Behavior of Malicious JavaScript Code using Internal Function Hooking. 766-783
Volume 6, Number 3, March 23, 2012
- Chanhong Kim, Jungwoo Lee:
On OFDM Subcarrier Allocation Strategies for Soft Hand-off in Cellular Systems. 784-793 - Zhian Deng, Yubin Xu, Lin Ma:
Joint Access Point Selection and Local Discriminant Embedding for Energy Efficient and Accurate Wi-Fi Positioning. 794-814 - Kyoung Soo Bok, Dong-Won Kwak, Jae-Soo Yoo:
A Resource Discovery with Data Dissemination over Unstructured Mobile P2P Networks. 815-834 - Van Vinh Nguyen, Jong Weon Lee:
A Hybrid Positioning System for Indoor Navigation on Mobile Phones using Panoramic Images. 835-854 - Ki-Ryang Moon, Do-Sik Yoo, Seong-Jun Oh:
Capacity Bound for Discrete Memoryless User-Relaying Channel. 855-868 - Bong Gyou Lee, Seong-Jin Kim, Keon Chul Park, Su Jin Kim, Eui Suk Jeong:
Empirical Analysis of Learning Effectiveness in u-Learning Environment with Digital Textbook. 869-885 - Muhammad Shoaib Siddiqui, Choong Seon Hong:
A Set-top Box with Virtual Platform Support for QoS Management in IMS Based Multiple Provider Networks. 886-905 - Inkyoung Cho, Il-Kyoo Lee, Ju-Phil Cho:
Coexistence between Wireless Fidelity and Wireless Microphone in TV Band. 906-918 - Saleh Ali Alomari, Putra Sumari:
Effective Broadcasting and Caching Technique for Video on Demand over Wireless Network. 919-940 - Lin Zhou, Xijian Ping, Haolin Gao, Sen Xu:
A Novel Video Image Text Detection Method. 941-953 - Peichang Shi, Huaimin Wang, Hao Yin, Bo Ding, Tianzuo Wang, Miao Wang:
CDN Scalability Improvement using a Moderate Peer-assisted Method. 954-972
Volume 6, Number 4, April 25, 2012
- Xi Zhang, Xiaofei Wang, Anna Liu, Quan Zhang, Chaojing Tang:
PRI: A Practical Reputation-based Incentive Scheme for Delay Tolerant Networks. 973-988 - Soo Young Shin:
Unsaturated Throughput Analysis of IEEE 802.11 DCF under Imperfect Channel Sensing. 989-1005 - Hyoung-Gook Kim:
Enhanced Timing Recovery Using Active Jitter Estimation for Voice-Over IP Networks. 1006-1025 - Youngtaek Bae, Sungkyu Jung, Jungwoo Lee:
Performance Comparison of Orthogonal and Non-orthogonal AF Protocols in Cooperative Relay Systems. 1026-1040 - Xinrong Guan, Yueming Cai, Weiwei Yang, Yunpeng Cheng, Junquan Hu:
Increasing Secrecy Capacity via Joint Design of Cooperative Beamforming and Jamming. 1041-1062 - Shengdong Xie, Aiqun Hu, Yi Huang:
Time-Delay Estimation in the Multi-Path Channel based on Maximum Likelihood Criterion. 1063-1075 - Dongho Lee, Kwangsue Chung:
Unsynchronized Duty-cycle Control for Sensor Based Home Automation Networks. 1076-1089 - Wan-Young Chung:
Multi-Modal Sensing M2M Healthcare Service in WSN. 1090-1105 - Jianxin Liao, Yang Liu, Jingyu Wang, Xiaomin Zhu:
Service Composition Based on Niching Particle Swarm Optimization in Service Overlay Networks. 1106-1127 - Yequn Wang, Zongju Peng, Gangyi Jiang, Mei Yu, Feng Shao:
Fast Mode Decision For Depth Video Coding Based On Depth Segmentation. 1128-1139 - Lin Zhou, Xijian Ping, Haolin Gao, Sen Xu:
A Novel Video Image Text Detection Method. 1140-1152 - Wen Hui, Chuang Lin, Yang Yang:
MediaCloud: A New Paradigm of Multimedia Computing. 1153-1170 - Ran Liu, Yingchun Tan, Fengchun Tian, Hui Xie, Guoqin Tai, Weimin Tan, Junling Liu, Xiaoyan Xu, Kadri Chaibou, Naana Abakah:
Visual Fatigue Reduction Based on Depth Adjustment for DIBR System. 1171-1187 - Jingbo Zhou, Shangbing Gao, Zhong Jin:
A New Connected Coherence Tree Algorithm For Image Segmentation. 1188-1202 - Bing-Fei Wu, Ying-Han Chen, Chih-Chung Kao, Yen-Feng Li, Chao-Jung Chen:
A Vision-Based Collision Warning System by Surrounding Vehicles Detection. 1203-1222 - Iman M. Almomani, Maha K. Saadeh:
Security Model for Tree-based Routing in Wireless Sensor Networks: Structure and Evaluation. 1223-1247 - Chi-Yao Weng, Shiuh-Jeng Wang, Jonathan C. L. Liu, Dushyant Goyal:
Prediction-based Reversible Data Hiding Using Empirical Histograms in Images. 1248-1266
Volume 6, Number 5, May 2012
- Anup Thapa, Seokjoo Shin:
QoS Provisioning in Wireless Body Area Networks: A Review on MAC Aspects. 1267-1285 - ZhengYi Chai, DeXian Zhang, Sifeng Zhu:
Resource Allocation with Proportional Rate In Cognitive Wireless Network: An Immune Clonal Optimization Scheme. 1286-1302 - Fu-Quan Zhang, Inwhee Joe, Yong-Jin Park:
Tier-based Proactive Path Selection Mode for Wireless Mesh Networks. 1303-1315 - Zhendong Yin, Yunsheng Kuang, Hongjian Sun, Zhilu Wu, Wenyan Tang:
A Hybrid Multiuser Detection Algorithm for Outer Space DS-UWB Ad-hoc Network with Strong Narrowband Interference. 1316-1332 - Li Li, Qing-Shan Jia, Xiaohong Guan, Hengtao Wang:
Enhancing the Robustness and Efficiency of Scale-free Network with Limited Link Addition. 1333-1353 - Megat Zuhairi, Haseeb Zafar, David Harle:
Dynamic Reverse Route for On-Demand Routing Protocol in MANET. 1354-1372 - Jin-Yong Jung, Jung-Hyun Lee, JongWoo Ha, SangKeun Lee:
Vocabulary Expansion Technique for Advertisement Classification. 1373-1387
- Yohan Kim, Jitae Shin, Hokyom Kim:
Lightweight Quality Metric Based on No-Reference Bitstream for H.264/AVC Video. 1388-1399 - Jinseok Lee, Shung Han Cho, Seong-Jun Oh, Sangjin Hong:
Local and Global Information Exchange for Enhancing Object Detection and Tracking. 1400-1420 - Hyun Jung La, Soo Dong Kim:
Balanced MVC Architecture for High Efficiency Mobile Applications. 1421-1444
- Hyuncheol Jeong, Huy Kang Kim, Sangjin Lee, Eunjin Kim:
Detection of Zombie PCs Based on Email Spam Analysis. 1445-1462 - Jianqi Zhu, Feng Fu, Chong-kwon Kim, Ke-xin Yin, Yanheng Liu:
A DoS Detection Method Based on Composition Self-Similarity. 1463-1478
Volume 6, Number 6, June 2012
- Hosseinali Jamal, Seyed Ali Ghorashi, Seyed Mohammad Sajad Sadough:
A Fair Radio Resource Allocation Algorithm for Uplink of FBMC Based CR Systems. 1479-1495 - Yi Xie, Guoming Tang, Daifei Wang, Weidong Xiao, Daquan Tang, Jiuyang Tang:
Rethinking of the Uncertainty: A Fault-Tolerant Target-Tracking Strategy Based on Unreliable Sensing in Wireless Sensor Networks. 1496-1521 - Jiping Li, Shixun Wu, Shouyin Liu:
A Dynamical Hybrid CAC Scheme and Its Performance Analysis for Mobile Cellular Network with Multi-Service. 1522-1545 - Yanhong Ding, Tie Qiu, He Jiang, Weifeng Sun:
A Pattern-based Query Strategy in Wireless Sensor Network. 1546-1564 - Fei Shi, JooSeok Song:
A Cluster-based Countermeasure against Media Access Control Layer Attacks in IEEE 802.11 Ad Hoc Networks. 1565-1585 - Mohammad Moustafa Qabajeh, Aisha H. Adballa, Othman O. Khalifa, Liana Khamis Qabajeh:
Position-Based Multicast Routing in Mobile Ad hoc Networks: An Analytical Study. 1586-1605 - Zhangjun Fan, Kun Xu, Bangning Zhang, Xiaofei Pan:
Performance Analysis of Amplify-and-Forward Two-Way Relaying with Antenna Correlation. 1606-1626 - Yun-Jung Lee, Jin-Su Lim, Jeong-Hoon Ji, Hwan-Gue Cho, Gyun Woo:
Plagiarism Detection among Source Codes using Adaptive Methods. 1627-1648 - Shi Dong, Wei Ding, Liang Chen:
Measure Correlation Analysis of Network Flow Based On Symmetric Uncertainty. 1649-1667 - Jaeshin Jang, Sang Wu Kim, Sunghong Wie:
Throughput and Delay Analysis of a Network Coding-enabled Cooperative MAC Protocol for Ad Hoc Networks. 1668-1688
- Eduardo López Domínguez, Saúl E. Pomares Hernández, Pilar Gómez-Gil, Jorge de la Calleja, Antonio Benítez, Antonio Marín-Hernández:
Intermedia Synchronization Protocol for Continuous Media Using MPEG-4 in Mobile Distributed Systems. 1689-1706 - Mi-Ryang Kim, Mi-Ae Choi, Jaehyoun Kim:
Factors influencing the Usage and Acceptance of Multimedia-based Digital Textbooks in Pilot School. 1707-1717
- Chi-Shiang Chan, Yuan-Yu Tsai, Chao-Liang Liu:
An Image Hiding Scheme by Linking Pixels in the Circular Way. 1718-1734
Volume 6, Number 7, July 2012
- Xuxun Liu, Jinglun Shi:
Clustering Routing Algorithms In Wireless Sensor Networks: An Overview. 1735-1755 - Farhana Jabeen, Sarfraz Nawaz, Sadaf Tanveer, Majid Iqbal Khan:
Spatio-Temporal Query Processing Over Sensor Networks: Challenges, State Of The Art And Future Directions. 1756-1776 - Ding Xu, Zhiyong Feng, Ping Zhang:
Power Allocation Schemes For Downlink Cognitive Radio Networks With Opportunistic Sub-channel Access. 1777-1791 - Aymen M. Kareem, Ayman A. El-Saleh, Masuri Othman:
Combined Time Synchronization And Channel Estimation For MB-OFDM UWB Systems. 1792-1801 - Wenzhu Zhang, Kyung Sup Kwak, Chengxiao Feng:
Network Selection Algorithm for Heterogeneous Wireless Networks Based on Multi-Objective Discrete Particle Swarm Optimization. 1802-1814
- SoongSun Shin, Gyoung Bae Kim, Hae-Young Bae:
Adaptive Cell-Based Index For Moving Objects In Indoor. 1815-1830
- Kai Chen, Huiyu Liu, Xiaosu Chen:
Detecting LDoS Attacks based on Abnormal Network Traffic. 1831-1853 - Jea-Tek Ryu, Byeong-Hee Roh, Ki-Yeol Ryu, Myungchul Yoon:
Detection And Countermeasure Scheme For Call-Disruption Attacks On SIP-Based Voip Services. 1854-1873 - Yunho Lee, Sang Guun Yoo, Soojin Lee:
An Efficient Detection And Management Of False Accusation Attacks In Hierarchical Ad-Hoc Networks. 1874-1893
Volume 6, Number 8, August 2012
- Walid A. Hassan, Han-Shin Jo, Maziar M. Nekovee, Chee Yen Leow, Tharek Abd Rahman:
Spectrum Sharing Method for Cognitive Radio in TV White Spaces: Enhancing Spectrum Sensing and Geolocation Database. 1894-1912 - Kan Zheng, Wei Li, Fei Liu, Wei Xiang:
Utility-based Resource Allocation with Bipartite Matching in OFDMA-based Wireless Systems. 1913-1925
- Xiaodan Hou, Tao Zhang, Gang Xiong, Baoji Wan:
Forensics Aided Steganalysis of Heterogeneous Bitmap Images with Different Compression History. 1926-1945 - Kai Zhang, Lin Ding, Junzhi Li, Jie Guan:
Real Time Related Key Attack on Hummingbird-2. 1946-1963 - Mohammad Arabzadeh, Mohammad Reza Rahimi:
Reversible Data Hiding Scheme Based on Maximum Histogram Gap of Image Blocks. 1964-1981 - Zuowen Tan:
Identity-based Authenticated Multiple Key Agreement Protocol with PKG Forward Security. 1982-1997
Volume 6, Number 9, September 2012
- Xiaobo Tan, Hang Zhang:
A CORDIC-Jacobi Based Spectrum Sensing Algorithm For Cognitive Radio. 1998-2016 - Tang Liu, Jian Peng, Xiao-fen Wang, Jin Yang, Bing Guo:
Research on the Energy Hole Problem Based on Non-uniform Node Distribution for Wireless Sensor Networks. 2017-2036 - Mohsen Akbari, Md. Kamal Hossain, Mohsen Riahi Manesh, Ayman A. El-Saleh, Aymen M. Kareem:
Minimizing Sensing Decision Error in Cognitive Radio Networks using Evolutionary Algorithms. 2037-2051 - Dong Chen, Guiran Chang, Jie Jia:
AC4E: An Access Control Model for Emergencies of Mission-Critical Cyber-Physical Systems. 2052-2072 - Walid A. Hassan, Tharek Abd Rahman:
A Spectrum Sharing Model for Compatibility between IMT-Advanced and Digital Broadcasting. 2073-2085 - Jiqing Ni, Zesong Fei, Chengwen Xing, Di Zhao, Jingming Kuang:
Terminal-based Dynamic Clustering Algorithm in Multi-Cell Cellular System. 2086-2097 - Guanyao Du, Ke Xiong, Dandan Li, Zhengding Qiu:
Transmission Power Minimization with Network Coding for Mobile Terminals in Cellular Relay Networks. 2098-2117 - Hayoung Oh:
A Robust Mobile Video Streaming in Heterogeneous Emerging Wireless Systems. 2118-2135 - Jinsub Sim, Younghan Kim:
Conferencing Service Interworking in Peer-to-Peer and IMS Networks. 2136-2152 - Insun Lee, Jae Ho Hwang, Sung Jeen Jang, Jae Moung Kim:
Improved Resource Allocation Scheme in LTE Femtocell Systems based on Fractional Frequency Reuse. 2153-2169 - Gyujin Kim, Taeki An, Moonhyun Kim:
Estimation of Crowd Density in Public Areas Based on Neural Network. 2170-2190 - Dai-Hwan Lim, Byung-Ho Rhee:
A Low Complexity PTS Technique using Threshold for PAPR Reduction in OFDM Systems. 2191-2201 - Yahui Wu, Su Deng, Hongbin Huang:
Optimal Control Of Two-Hop Routing In Dtns With Time-Varying Selfish Behavior. 2202-2217 - Seo Weon Heo, Jongtae Lim:
Efficient Channel Delay Estimation for OFDM Systems over Doubly-Selective Fading Channels. 2218-2230 - Hui Wang, Jianbiao Mao, Tao Li, Zhigang Sun, Zhenghu Gong, Gaofeng Lv:
Neighbor Gradient-based Multicast Routing for Service-Oriented Applications. 2231-2252 - Tao Tang, Guo-hong Du:
A Thin Folded Dipole UHF RFID Tag Antenna with Shorting Pins for Metallic Objects. 2253-2265 - Yongju Cho, Jihun Cha, Hayder Radha, Kwang-deok Seo:
On Rate-adaptive LDPC-based Cross-layer SVC over Bursty Wireless Channels. 2266-2284 - Guimin Huang, Min Hu, Ya Zhou, Pingshan Liu, Yanchun Zhang:
A Distributed Trust Model Based on Reputation Management of Peers for P2P VoD Services. 2285-2301 - Sanaz Rezvani, Seyed Ali Ghorashi:
A Novel WBAN MAC protocol with Improved Energy Consumption and Data Rate. 2302-2322 - Hyun Yang, Sungrae Cho, Chang Yun Park:
Improving Performance of Remote TCP in Cognitive Radio Networks. 2323-2340
- Tong Liu, Jianbin Xie, Wei Yan, Peiqin Li:
Driver's Face Detection Using Space-time Restrained Adaboost Method. 2341-2350 - I Made Oka Widyantara, Wirawan, Gamantyo Hendrantoro:
Reducing Decoding Complexity by Improving Motion Field Using Bicubic and Lanczos Interpolation Techniques in Wyner-Ziv Video Coding. 2351-2369
- Hai-Sheng Wang, Xiaolin Gui:
A New Security Modeil In P2P Network Based on Rough Set And Bayesian Learner. 2370-2387 - Kashif Latif, Arshad Aziz, Athar Mahboob:
Look-Up Table Based Implementations of SHA-3 Finalists: JH, Keccak and Skein. 2388-2404 - Zubair Ahmad Khattak, Jamalul-lail Ab Manan, Suziah Sulaiman:
Trustworthy Mutual Attestation Protocol for Local True Single Sign-On System: Proof of Concept and Performance Evaluation. 2405-2423 - Eui Chul Lee, Sung Hoon Son:
Anti-Spoofing Method for Iris Recognition by Combining the Optical and Textural Features of Human Eye. 2424-2441 - Lih-Chyau Wuu, Chi-Hsiang Hung, Chia-Ming Chang:
Quorum-based Key Management Scheme in Wireless Sensor Networks. 2442-2454
Volume 6, Number 10, October 2012
- Zeyang Dai, Jian Liu, Keping Long:
Cooperative Relaying with Interference Cancellation for Secondary Spectrum Access. 2455-2472 - Mohammadreza Eslaminejad, Shukor Abd Razak, Abdul Samad Haji Ismai:
EEDARS: An Energy-Efficient Dual-Sink Algorithm with Role Switching Mechanism for Event-Driven Wireless Sensor Networks. 2473-2492 - Xiangbin Yu, Yun Rui, Xin Yin, Xiaomin Chen, Mingqi Li:
Performance Analysis of Space-time Coded MIMO System with Discrete-rate Adaptive Modulation in Ricean Fading Channels. 2493-2508 - Yun Zuo, Zhihao Ling, Luming Liu:
Energy-efficient Low-delay TDMA Scheduling Algorithm for Industrial Wireless Mesh Networks. 2509-2528 - Jianxin Chen, Yuanyuan Chen, Liang Zhou, Yuelin Du:
A Data Gathering Approach for Wireless Sensor Network with Quadrotor-based Mobile Sink Node. 2529-2547 - Han Hu, Hongbo Zhu, Qi Zhu:
Performance Analysis of Multi-hop Wireless Networks under Different Hopping Strategies with Spatial Diversity. 2548-2566 - Aiqing Zhang, Xinrong Ye, Haifeng Hu:
Point In Triangle Testing Based Trilateration Localization Algorithm In Wireless Sensor Networks. 2567-2586 - Di Wu, Gang Zhu, Li Zhu, Bo Ai:
Trust-based Relay Selection in Relay-based Networks. 2587-2600 - Zhengmin Kong, Yanjun Fang, Yuxuan Zhang, Shixin Peng, Guangxi Zhu:
Differencing Multiuser Detection Using Error Feedback Filter for MIMO DS-UWB System in Nakagami Fading Channel. 2601-2619 - Wei Dong, Junfeng Wang, Minhuan Huang, Jian Tang, Hongxia Zhou:
A Rerouting Controlled ISL Handover Protocol For LEO Satellite Networks. 2620-2631
- Jia Liu, Xiaonian Wang, Tianyu Li, Jie Yang:
Spatio-temporal Semantic Features for Human Action Recognition. 2632-2649 - Minxian Li, Jinhui Tang, Chunxia Zhao:
Active Learning on Sparse Graph for Image Annotation. 2650-2662 - Ran Liu, Hui Xie, Fengchun Tian, Yingjian Wu, Guoqin Tai, Yingchun Tan, Weimin Tan, Bole Li, Hengxin Chen, Liang Ge:
Hole-filling based on disparity map for DIBR. 2663-2678 - Chenhao Wang, Yi Shen, Wenbin Zhang, Yuncai Liu:
Constrained High Accuracy Stereo Reconstruction Method for Surgical Instruments Positioning. 2679-2691
- JuHee Ki, Jung Yeon Hwang, Dong Hoon Lee:
Identity-Based Ring Signature Schemes for Multiple Domains. 2692-2707 - Yuan Tian, Biao Song, Mohammad Mehedi Hassan, Eui-Nam Huh:
A Privacy-aware Graph-based Access Control System for Healthcare Domain. 2708-2730 - Tianzuo Wang, Huaimin Wang, Bo Liu, Bo Ding, Jing Zhang, Peichang Shi:
Further Analyzing the Sybil Attack in Mitigating Peer-to-Peer Botnets. 2731-2749 - Zheng Wang:
Analysis of Flooding DoS Attacks Utilizing DNS Name Error Queries. 2750-2763
Volume 6, Number 11, November 2012
- Sung Won Ahn, Shinhyoung Lee, See-hwan Yoo, DaeYoung Park, Dojung Kim, Chuck Yoo:
Isolation Schemes of Virtual Network Platform for Cloud Computing. 2764-2783 - Beunguk Ahn, Elbashir Abbas, Jin-Ah Park, Ho-Jin Choi:
Increasing Splicing Site Prediction by Training Gene Set Based on Species. 2784-2799 - Jinwon Kang, Sunmi Kim, Kichun Nam:
The Effects of Syllable Boundary Ambiguity on Spoken Word Recognition in Korean Continuous Speech. 2800-2812 - Chang-Kyun Jeon, Neunghoe Kim, Dong-hyun Lee, Taek Lee, Hoh Peter In:
Stakeholder Conflict Resolution Model (S-CRM) Based On Supervised Learning. 2813-2826 - Myoungjin Kim, Seungho Han, Yun Cui, Hanku Lee, Changsung Jeong:
A Hadoop-based Multimedia Transcoding System for Processing Social Media in the PaaS Platform of SMCCSE. 2827-2848 - Kyoung-Ju Lee, Deok-Jai Choi:
Mobile Junk Message Filter Reflecting User Preference. 2849-2865 - Ah Reum Kang, Huy Kang Kim, Jiyoung Woo:
Chatting Pattern Based Game BOT Detection: Do They Talk Like Us? 2866-2879 - Hiroyuki Aoki, JaMee Kim, Yukio Idosaka, Toshiyuki Kamada, Susumu Kanemune, WonGyu Lee:
Development of State-Based Squeak and an Examination of Its Effect on Robot Programming Education. 2880-2900
- Sajjad Hussain Chauhdary, Jeongjoon Lee, Sayed Chhattan Shah, Myong-Soon Park:
EBCO - Efficient Boundary Detection and Tracking Continuous Objects in WSNs. 2901-2919 - Jose Saldana, Julián Fernández-Navajas, José Ruíz-Mas, Luis Casadesus:
Online Games Traffic Multiplexing: Analysisand Effect in Access Networks. 2920-2939 - Faezeh Sadat Babamir, Ziba Eslami:
Data Security in Unattended Wireless Sensor Networks through Aggregate Signcryption. 2940-2955 - Yi-Chung Yen, Tzong-Chen Wu, Nai-Wei Lo, Kuo-Yu Tsai:
A Fair-Exchange E-Payment Protocol For Digital Products With Customer Unlinkability. 2956-2979 - Jeong-Yeob Oak, Young-June Choi, Wooguil Pak:
EP-MAC: Early Preamble MAC To Achieve Low Delay And Energy Consumption In Duty Cycle Based Asynchronous Wireless Sensor Networks. 2980-2991 - Guangjie Han, Huihui Xu, Jinfang Jiang, Lei Shu, Naveen K. Chilamkurti:
The Insights of Localization through Mobile Anchor Nodes in Wireless Sensor Networks with Irregular Radio. 2992-3007
- Linshu Lv, Qi Zhu:
Joint Relay Selection and Resource Allocation for Cooperative OFDMA Network. 3008-3025 - Kun Xu, Yuanyuan Gao, Xiaoxin Yi, Yajun Zhang:
Diversity-Multiplexing Tradeoff Analysis of Wireless Multiple-Antenna Cooperative Systems in General Fading Channels. 3026-3045
Volume 6, Number 12, December 2012
- Sangsoon Lim, Young-myoung Kang, Jiwoong Jeong, Chong-kwon Kim:
Design, Analysis and Evaluation of A New Energy Conserving MAC Protocol for Wireless Sensor Networks. 3046-3060 - Hang Hu, Youyun Xu, Zhiwen Liu, Ning Li, Hang Zhang:
Optimal Strategies for Cooperative Spectrum Sensing in Multiple Cross-over Cognitive Radio Networks. 3061-3080 - Hoai Phong Ngo, Myung-Kyun Kim:
MRFR - Multipath-based Routing Protocol with Fast-Recovery of Failures on MANETs. 3081-3099 - Ya-Fen Chang, Wei-Liang Tai:
Histogram-based Reversible Data Hiding Based on Pixel Differences with Prediction and Sorting. 3100-3116 - Jianguang Weng, Xuelan Zou, Minhong Wang:
Optimization of Tree-like Core Overlay in Hybrid-structured Application-layer Multicast. 3117-3132 - Shasha Zhao, Qi Zhu, Hongbo Zhu:
Optimal Price Strategy Selection for MVNOs in Spectrum Sharing: An Evolutionary Game Approach. 3133-3151 - Sang Hoon Lee, Byung Joon Park, Lynn Choi:
Transient Coordinator: a Collision Resolution Algorithm for Asynchronous MAC Protocols in Wireless Sensor Networks. 3152-3165 - Jiyan Huang:
Calculation Of Mobile Location Based On TOA/SS Measurements. 3166-3181 - Gu-Min Jeong, Jong-Yun Yeo, Dong Mook Won, Sung Han Bae, Kyung-Joon Park:
Design and Implementation of an LED Mood Lighting System Using Personalized Color Sequence Generation. 3182-3196 - Xiangxu Meng, Xinye Lin, Xiaodong Wang, Xingming Zhou:
Intention-Oriented Itinerary Recommendation Through Bridging Physical Trajectories and Online Social Networks. 3197-3218 - Yanjun Li, Yueyun Shen, Kaikai Chi:
A Lifetime-Preserving and Delay-Constrained Data Gathering Tree for Unreliable Sensor Networks. 3219-3236 - Han-Shin Jo:
Spectrum Sharing SDMA with Limited Feedback: Throughput Analysis. 3237-3256 - Weifeng Sun, Feng Xia, Jianhua Ma, Tong Fu, Yu Sun:
An Optimal ODAM-Based Broadcast Algorithm for Vehicular Ad-Hoc Networks. 3257-3274 - Zhangjun Fan, Daoxing Guo, Bangning Zhang, Li Zeng:
Performance Analysis And Optimization For AF Two-Way Relaying With Relay Selection Over Mixed Rician And Rayleigh Fading. 3275-3295
- Heekyung Yang, Kyungha Min:
Simulation of Color Pencil Drawing using LIC. 3296-3314 - Chongjing Wang, Xu Zhao, Yi Zou, Yuncai Liu:
Unsupervised Motion Pattern Mining for Crowded Scenes Analysis. 3315-3337
- Xixiang Lv, Hui Li:
Group Key Agreement From Signcryption. 3338-3351 - Guiyi Wei, Xianbo Yang, Jun Shao:
Efficient Certificateless Authenticated Asymmetric Group Key Agreement Protocol. 3352-3365 - Alfin Syafalni, Azman Samsudin, Yazid Jaafar, Mohd. Adib Omar:
ROSS: Low-Cost Self-Securing VoIP Communication Framework. 3366-3383
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.