


default search action
KSII Transactions on Internet and Information Systems, Volume 7
Volume 7, Number 1, January 2013
- Shuguang Chen, Tingting Sun, Jingjing Yuan, Xiaoyan Geng, Changle Li, Sana Ullah, Mohammed Abdullah Alnuem:

Performance Analysis of IEEE 802.15.4e Time Slotted Channel Hopping for Low-Rate Wireless Networks. 1-21 - Seung Chul Han, Sungwook Chung, Kwang-Sik Lee, Hyunmin Park, Minho Shin:

Distributing Network Loads in Tree-based Content Distribution System. 22-37 - Sangwoo Son, Byungho Rhee:

Adaptive Resource Allocation for Traffic Flow Control in Hybrid Networks. 38-55
- Jianfeng Lu, Li Li, Zhenhua Yang:

Video Watermarking Algorithm for H.264 Scalable Video Coding. 56-67 - Fatma Taher

, Naoufel Werghi
, Hussain Al-Ahmad
:
Automatic Sputum Color Image Segmentation for Lung Cancer Diagnosis. 68-80 - Young-Seob Jeong, Sou-Young Jin, Ho-Jin Choi:

Non-Simultaneous Sampling Deactivation during the Parameter Approximation of a Topic Model. 81-98 - Mohamed Ezzeldin A. Bashir, Ho-Sun Shon, Dong Gyu Lee, Hyeongsoo Kim, Keun Ho Ryu:

Real-Time Automated Cardiac Health Monitoring by Combination of Active Learning and Adaptive Feature Selection. 99-118
- Chun-Ta Li

, Cheng-Chi Lee
, Chi-Yao Weng, Chun-I Fan:
An Extended Multi-Server-Based User Authentication and Key Agreement Scheme with User Anonymity. 119-131 - Li-Chin Huang, Min-Shiang Hwang, Lin-Yu Tseng

:
Reversible and High-Capacity Data Hiding in High Quality Medical Images. 132-148 - Sunghyuck Hong, Sungjin Lee:

Design and Performance Analysis of Queue-based Group Diffie-Hellman Protocol (QGDH). 149-165 - Sung-Hyun Yun, Heuiseok Lim:

The Biometric based Mobile ID and Its Application to Electronic Voting. 166-183
Volume 7, Number 2, February 2013
- Xian Zhang, Qihui Wu, Xiaoqiang Li, Zi Yun:

Optimal Cooperation and Transmission in Cooperative Spectrum Sensing for Cognitive Radio. 184-201 - Soong-Hee Lee:

Combining Communications and Tracking: A New Paradigm of Smartphone Games. 202-215 - Yueying Zhang, Hang Long, Yuexing Peng, Kan Zheng

, Wenbo Wang:
User-Oriented Energy- and Spectral- Efficiency Tradeoff for Wireless Networks. 216-233 - Yahui Wu, Su Deng, Hongbin Huang

:
Energy-efficient Joint Control of Epidemic Routing in Delay Tolerant Networks. 234-252 - Seong-Joong Kim, Dong-Joo Park:

A Self-Calibrated Localization System using Chirp Spread Spectrum in a Wireless Sensor Network. 253-270 - Hoai Phong Ngo, Myung-Kyun Kim:

MRFR - Multipath-based Routing Protocol with Fast-Recovery of Failures on MANETs. 271-287 - Yaru Fu, Qi Zhu:

A Joint Resource Allocation Scheme for Relay Enhanced Multi-cell Orthogonal Frequency Division Multiple Networks. 288-307 - Yong Wang, Wei Peng

, Qiang Dou, Zhenghu Gong:
Stationary Distribution for the Mobilities in Catastrophe Rescue Scenario. 308-326 - Sajad Khorsandroo, Rafidah Md Noor

, Sayid Khorsandroo:
A Generic Quantitative Relationship to Assess Interdependency of QoE and QoS. 327-346 - Dat Tien Nguyen, Young Ho Park, Kwang Yong Shin, Kang Ryoung Park:

New Finger-vein Recognition Method Based on Image Quality Assessment. 347-365 - Ran Li, Zongliang Gan, Ziguan Cui, Minghu Wu, Xiuchang Zhu:

Side Information Extrapolation Using Motion-aligned Auto Regressive Model for Compressed Sensing based Wyner-Ziv Codec. 366-385 - Shaodong Feng, Fan Wang, Yuan Lin, Liang Gou, Guangxia Li:

An Asynchronous Burst Time Plan Generation Method for Broadband Satellite Multimedia System. 386-404 - Phan Trung Huy, Nguyen Hai Thanh, Cheonshik Kim, Ching-Nung Yang

:
Data-Hiding for Halftone Images Using an Improved CPT scheme. 405-424
Volume 7, Number 3, March 2013
- Shahbaz Khan, Sadiq Ullah

, Aziz Ahmed, Sahibzada A. Mahmud:
A Survey of Rate-Adaptation Schemes for IEEE 802.11 Compliant WLANs. 425-445 - Jia Zhu:

Energy Efficiency Analysis of Cellular Downlink Transmission with Network Coding over Rayleigh Fading Channels. 446-458 - Shwu-Huey Yen, Ya-ju Hsieh:

A KD-Tree-Based Nearest Neighbor Search for Large Quantities of Data. 459-470 - Min Wang, Junfeng Wang, Xuan Mou, Sunyoung Han:

On-the-fly Data Compression for Efficient TCP Transmission. 471-489 - Xiaoqiang Wang, Peidong Zhu, Xicheng Lu, Kan Chen, Huayang Cao:

Scaling Inter-domain Routing System via Path Exploration Aggregation. 490-508
- Ting Cui, Chenhui Jin:

Finding Impossible Differentials for Rijndael-like and 3D-like Structures. 509-521 - Bin Wang, Xiong Li, Yuncai Liu:

Learning Discriminative Fisher Kernel for Image Retrieval. 522-538 - Cuiyin Liu, Peng Cheng, Shu-qing Chen, Cuiwei Wang, Fenghong Xiang:

A Novel Multifocus Image Fusion Algorithm Based on Nonsubsampled Contourlet Transform. 539-557
- Jinhyung Kim, Choonsik Park, Jun Hwang, Hyung-Jong Kim:

Privacy Level Indicating Data Leakage Prevention System. 558-575 - Fan Pan, Lifa Wu, Zheng Hong, Huabo Li, Haiguang Lai, Chenghui Zheng:

Icefex: Protocol Format Extraction from IL-based Concolic Execution. 576-599 - Wen-Chung Kuo:

Secure Modulus Data Hiding Scheme. 600-612
Volume 7, Number 4, April 30, 2013
- Siavash Sadeghi Ivrigh, Seyed Mohammad Sajad Sadough

:
Spectrum Sensing for Cognitive Radio Networks Based on Blind Source Separation. 613-631 - Ping Zhang, Ding Xu

, Zhiyong Feng:
Capacity of Spectrum Sharing Cognitive Radio with MRC Diversity under Delay Quality-of-Service Constraints in Nakagami Fading Environments. 632-650 - Chunxiao Liu, Gui-Ran Chang, Jie Jia:

A Novel Routing Algorithm Based on Load Balancing for Multi-Channel Wireless Mesh Networks. 651-669 - Junhuai Li, Guomou Zhang, Lei Yu, Zhixiao Wang, Jing Zhang:

An Advanced RFID Localization Algorithm Based on Region Division and Error Compensation. 670-691 - Hyukjin Chae, Kiyeon Kim, Rong Ran, Dong Ku Kim:

A Single Feedback Based Interference Alignment for Three-User MIMO Interference Channels with Limited Feedback. 692-710 - Yoon-Ho Choi:

Probabilistic Model for Performance Analysis of a Heuristic with Multi-byte Suffix Matching. 711-725 - Kang Jin Yoon, Ronny Yongho Kim, Young Yong Kim:

Modelling of Differentiated Bandwidth Requests in IEEE 802.16m Systems. 726-747 - Yuan Zhou, Zesong Fei, Gaishi Huang, Ang Yang, Jingming Kuang:

A Distributed LT Codes-based Data Transmission Technique for Multicast Services in Vehicular Ad-hoc Networks. 748-766 - Yuheng Huang, Yan Dong

, Minho Jo
, Yingzhuang Liu:
Selective Demodulation Scheme Based on Log-Likelihood Ratio Threshold. 767-783 - Sunghee Lee, Kwangsue Chung:

Adaptive Rate Control Scheme for Streaming-based Content Sharing Service. 784-799 - Huali Cui, Depei Qian, Xingjun Zhang

, Ilsun You, Xiaoshe Dong
:
Optimizing the Joint Source/Network Coding for Video Streaming over Multi-hop Wireless Networks. 800-818 - Xiong Li, Bin Wang, Yuncai Liu:

Bio-Inspired Object Recognition Using Parameterized Metric Learning. 819-833 - Eui Chul Lee, Min-Woo Park:

New Eye Tracking Method as a Smartphone Interface. 834-848 - Min Gyu Choi, Oh-Young Song:

Real-Time Simulation of Thin Rod. 849-859 - Young Bae Yoon, Junseok Oh, Bong Gyou Lee:

The Establishment of Security Strategies for Introducing Cloud Computing. 860-877 - Pandi Vijayakumar

, Sundan Bose, Arputharaj Kannan
, L. Jegatha Deborah
:
Computation and Communication Efficient Key Distribution Protocol for Secure Multicast Communication. 878-894 - Zheng Wang, Shian-Shyong Tseng:

Impact Evaluation of DDoS Attacks on DNS Cache Server Using Queuing Model. 895-909 - Syh-Yuan Tan, Ji-Jian Chin

, Swee-Huay Heng
, Bok-Min Goi
:
An Improved Efficient Provable Secure Identity-Based Identification Scheme in the Standard Model. 910-922 - Yoon-Su Jeong, Yong-Tae Kim, Seung-Soo Shin, Sang-Ho Lee:

A Device Authentication Mechanism Reducing Performance Cost in Mobile P2P Networks. 923-948
Volume 7, Number 5, May, 2013
- Xu Zhang, Ying Xia, Shiyan Luo:

Energy-aware Management in Wireless Body Area Network System. 949-966 - Muhammad Khurram Khan

, Saru Kumari
, Pitam Singh
:
Cryptanalysis of an 'Efficient-Strong Authentiction Protocol (E-SAP) for Healthcare Applications Using Wireless Medical Sensor Networks'. 967-979 - Long Hu, Ong Mau Dung

, Qiang Liu, Tao Han, Yantao Sun:
Integration of Wireless Body Area Networks (WBANs) and WAN, WiMAX and LTE. 980-997 - Jianxin Chen, Liang Zhou, Yun Zhang, David Fondo Ferreiro:

Human Motion Tracking With Wireless Wearable Sensor Network: Experience and Lessons. 998-1013 - Jianqi Liu

, Qinruo Wang, Jiafu Wan
, Jianbin Xiong, Bi Zeng:
Towards Key Issues of Disaster Aid based on Wireless Body Area Networks. 1014-1035 - Yahaya O. Mohammed, Uthman A. Baroudi

:
Partially Observable Markov Decision Processes (POMDPs) and Wireless Body Area Networks (WBAN): A Survey. 1036-1057 - Sungryel Lim, Hongchul Lee:

Factors Affecting Medical Incident Care on WBAN. 1058-1076 - Ali Çalhan

, Sedat Atmaca
:
A new Network Coordinator Node Design Selecting the Optimum Wireless Technology for Wireless Body Area Networks. 1077-1093 - An Wang, Xuexin Zheng, Zongyue Wang:

Power Analysis Attacks and Countermeasures on NTRU-Based Wireless Body Area Networks. 1094-1107 - Changle Li, Xiaoyan Geng, Jingjing Yuan, Tingting Sun:

Performance Analysis of IEEE 802.15.6 MAC Protocol in Beacon Mode with Superframes. 1108-1130 - Haobo Qing, Yuanan Liu, Gang Xie:

Robust Spectrum Sensing for Blind Multiband Detection in Cognitive Radio Systems: A Gerschgorin Likelihood Approach. 1131-1145 - Jian An, Xiaolin Gui, Jianwei Yang, Wendong Zhang, Jinhua Jiang:

Research on a Mobile-aware Service Model in the Internet of Things. 1146-1165 - Youngwon Kim An, Seong-Moo Yoo, Changhyuk An, B. Earl Wells:

Noise Mitigation for Target Tracking in Wireless Acoustic Sensor Networks. 1166-1179 - Zhenzhou Tang

, Hongyu Wang, Qian Hu, Long Hai:
How Network Coding Benefits Converge-Cast in Wireless Sensor Networks. 1180-1197 - Yanzhe Che, Qiang Yang, Chunming Wu:

Towards a Hierarchical Global Naming Framework in Network Virtualization. 1198-1212 - JinBaek Kim, Sungmin Kang, Hoon S. Cha:

Smartphone Banking: The Factors Influencing the Intention to Use. 1213-1235 - Guannan Wang, Zhizhong Wang, Zhenmin Zhu, Saiping Wen:

A novel route restoring method upon geo-tagged photos. 1236-1251 - Bin Wang, Yuncai Liu:

Collaborative Similarity Metric Learning for Semantic Image Annotation and Retrieval. 1252-1271 - Ihsan Günes, Alper Bilge

, Huseyin Polat:
Shilling Attacks Against Memory-Based Privacy-Preserving Recommendation Algorithms. 1272-1290 - Chenlei Cao, Ru Zhang, Mengyi Zhang, Yixian Yang:

IBC-Based Entity Authentication Protocols for Federated Cloud Systems. 1291-1312 - Xiaowei Li, Yuqing Zhang, Xuefeng Liu, Jin Cao:

A Lightweight Three-Party Privacy-preserving Authentication Key Exchange Protocol Using Smart Card. 1313-1327 - Nam-Su Jho, Dowon Hong:

Symmetric Searchable Encryption with Efficient Conjunctive Keyword Search. 1328-1342 - Leyou Zhang

, Yupu Hu:
New Constructions of Hierarchical Attribute-Based Encryption for Fine-Grained Access Control in Cloud Computing. 1343-1356
Volume 7, Number 6, June 2013
- Razieh Sheikhpour

, Sam Jabbehdari
:
An Energy Efficient Chain-based Routing Protocol for Wireless Sensor Networks. 1357-1378 - Feng Zhao

, Jiayi Zhang, Hongbin Chen:
Joint Beamforming and Power Allocation for Multiple Primary Users and Secondary Users in Cognitive MIMO Systems via Game Theory. 1379-1397 - Changhyeon Kim, Wonjoo Lee, Changho Jeon:

A Resource Reduction Scheme with Low Migration Frequency for Virtual Machines on a Cloud Cluster. 1398-1417 - Dandan Li, Ke Xiong, Guanyao Du, Zhengding Qiu:

Secure Beamforming with Artificial Noise for Two-way Relay Networks. 1418-1432
- Jong-Chang Ahn

, Sung-Phil Cho, Soon-Ki Jeong:
Virtual Reality to Help Relieve Travel Anxiety. 1433-1448 - Jiye Lee, Hae Won Byun:

Simpson Style Caricature based on MLS. 1449-1462 - Yingying Cao, Xue Chen, Liqian Wang, Xicong Li:

An Unequal Protection FEC Scheme for Video over Optical Access Networks. 1463-1479
- Ji Yao, Jiguo Li, Yichen Zhang:

Certificate-Based Encryption Scheme without Pairing. 1480-1491 - Qian Mao, Chin-Chen Chang, Hsiao-Ling Wu:

An Image Encryption Scheme Based on Concatenated Torus Automorphisms. 1492-1511 - Shi-Jinn Horng, Shiang-Feng Tzeng, Pingzhi Fan, Xian Wang, Tianrui Li

, Muhammad Khurram Khan
:
Secure Convertible Undeniable Signature Scheme Using Extended Euclidean Algorithm without Random Oracles. 1512-1532
Volume 7, Number 7, July 2013
- Yueyun Chen, Xiangyun Xu, Qun Lei:

Joint Subcarriers and Power Allocation with Imperfect Spectrum Sensing for Cognitive D2D Wireless Multicast. 1533-1546 - Xuelian Cai, Jingjing Yuan, Xiaoming Yuan, Wu Zhu, Jiandong Li, Changle Li, Sana Ullah:

Energy-efficient Relay MAC with Dynamic Power Control in Wireless Body Area Networks. 1547-1568 - Hamed Khiabani, Norbik Bashah Idris

, Jamalul-lail Ab Manan:
A Unified Trust Model for Pervasive Environments - Simulation and Analysis. 1569-1584 - Ahmed M. Shamsan Saleh, Borhanuddin Mohd Ali, Hafizal Mohamad, Mohd Fadlee A. Rasid, Alyani Ismail:

RRSEB: A Reliable Routing Scheme for Energy-balancing Using a Self-adaptive Method in Wireless Sensor Networks. 1585-1609 - Hongseok Jeon, Byungjoon Lee, Hoyoung Song, Moonsoo Kang:

An ICN In-Network Caching Policy for Butterfly Network in DCN. 1610-1623 - Sunwoong Choi

, Jaehyuk Choi, Joon Yoo:
MRCT: An Efficient Tag Identification Protocol in RFID Systems with Capture Effect. 1624-1637 - Tuan Hao Tieu, Younghan Kim, Gwangyong Gim:

PTT Service Interworking Between IMS Based Networks and P2P Overlay Networks. 1638-1656
- Tuyen Danh Pham

, Gi Pyo Nam, Kwang Yong Shin, Kang Ryoung Park:
A Novel Query-by-Singing/Humming Method by Estimating Matching Positions Based on Multi-layered Perceptron. 1657-1670 - Yong Yang, Wenjuan Zheng

, Shuying Huang:
A Novel Automatic Block-based Multi-focus Image Fusion via Genetic Algorithm. 1671-1689 - Xiaojie Dong, Erqi Liu, Jie Yang, Qiang Wu

:
MEGH: A New Affine Invariant Descriptor. 1690-1704 - Jucheng Yang, Yanbin Jiao, Naixue Xiong, Dong Sun Park:

Fast Face Gender Recognition by Using Local Ternary Pattern and Extreme Learning Machine. 1705-1720
- Chundong She, Ping Yi, Junfeng Wang, Hongshen Yang:

Intrusion Detection for Black Hole and Gray Hole in MANETs. 1721-1736 - Sunghyuck Hong, Sungjin Lee:

Design and Performance Analysis of Queue-based Group Diffie-Hellman Protocol (QGDH). 1737-1753
Volume 7, Number 8, Aug 30, 2013
- Wasan Kadhim Saad

, Mahamod Ismail
, Rosdiadee Nordin
, Ayman A. El-Saleh
:
On the Performance of Cooperative Spectrum Sensing of Cognitive Radio Networks in AWGN and Rayleigh Fading Environments. 1754-1769 - Ping Xie, Lihua Li, Junlong Zhu, Jin Jin, Yijing Liu:

Cooperative spectrum leasing using parallel communication of secondary users. 1770-1785 - Peisheng Pan, Baoyu Zheng:

Outage Probability of Two-Hop Relay Networks with Related Interference. 1786-1804 - Ismail Kirbas

, Alper Karahan, Abdullah Sevin
, Cüneyt Bayilmis
:
isMAC: An Adaptive and Energy-Efficient MAC Protocol Based on Multi-Channel Communication for Wireless Body Area Networks. 1805-1824 - Md. Sabbir Hasan, Eui-Nam Huh:

Heuristic based Energy-aware Resource Allocation by Dynamic Consolidation of Virtual Machines in Cloud Data Center. 1825-1842 - Libao Zhang, Hao Li:

Region of Interest Detection Based on Visual Attention and Threshold Segmentation in High Spatial Resolution Remote Sensing Images. 1843-1859 - Ki-Won Kwon, Seong-Jun Kim, Jun Hwang, Jong-Ho Paik:

Performance Evaluation of Synchronization Method for Reducing the Overall Synchronization Time in Digital Radio Mondiale Receivers. 1860-1875 - Jongchan Lee

, MoonHo Lee:
Sub-channel Allocation Based on Multi-level Priority in OFDMA Systems. 1876-1889 - Xiaolei Zhou, Deke Guo, Tao Chen

, Xueshan Luo:
Robust Backup Path Selection in Overlay Routing with Bloom Filters. 1890-1910 - Rongchun Li, Yong Dou, Jie Zhou, Baofeng Li, Jinbo Xu:

From WiFi to WiMAX: Efficient GPU-based Parameterized Transceiver across Different OFDM Protocols. 1911-1932 - Rashid Hafeez Khokhar, Tanveer A. Zia

, Kayhan Zrar Ghafoor
, Jaime Lloret, Muhammad Shiraz:
Realistic and Efficient Radio Propagation Model to Handle Obstacles for Vehicle-to-X Communications. 1933-1954 - Sijia Lou, Longxiang Yang:

Joint Relay Selection and Power Allocation. 1955-1971 - Jiguo Li, Yanqiong Li, Yichen Zhang:

Provably Secure Forward Secure Certificateless Proxy Signature Scheme. 1972-1988 - Zhiqiang Wang, Yuqing Zhang, Qixu Liu:

RPFuzzer: A Framework for Discovering Router Protocols Vulnerabilities Based on Fuzzing. 1989-2009 - Yang Yang, Yupu Hu, Leyou Zhang

:
An Efficient Biometric Identity Based Signature Scheme. 2010-2026 - Chuan Qin

, Chin-Chen Chang, Yen-Chang Chen:
A Novel Reversible Data Hiding Scheme for VQ-Compressed Images Using Index Set Construction Strategy. 2027-2041 - Rong Jiang, Jun Luo, Xiaoping Wang:

HRKT: A Hierarchical Route Key Tree based Group Key Management for Wireless Sensor Networks. 2042-2060 - Xiaowei Li, Yuqing Zhang, Xuefeng Liu, Jin Cao, Qianqian Zhao:

A New Roaming Authentication Framework For Wireless Communication. 2061-2080
Volume 7, Number 9, September, 2013
- Md. Fazlul Kader

, Asaduzzaman
, Md. Moshiul Hoque:
Hybrid Spectrum Sharing with Cooperative Secondary User Selection in Cognitive Radio Networks. 2081-2100 - Yao Wang, Zhongzhao Zhang, Qiyue Yu, Jiamei Chen:

A Novel Prediction-based Spectrum Allocation Mechanism for Mobile Cognitive Radio Networks. 2101-2119 - Huijin Cao, Yanhui Lu, Jun Cai:

MMSE Transmit Optimization for Multiuser Multiple-Input Single-Output Broadcasting Channels in Cognitive Radio Networks. 2120-2133 - Lei Wang, Yuwang Yang, Wei Zhao, Wei Lu:

Network Coding for Energy-Efficient Distributed Storage System in Wireless Sensor Networks. 2134-2153 - Mingming Lin, Xuemin Hong, Jin Xiong, Ke Xue, Jianghong Shi:

Capacity Analysis of Centralized Cognitive Radio Networks for Best-effort Traffics. 2154-2172 - Hojin Ghim, Dongwook Kim, Namgi Kim:

Autonomous Deployment in Mobile Sensor Systems. 2173-2193 - Omar Said

:
Accurate Performance Evaluation of Internet Multicast Architectures: Hierarchical and Fully Distributed vs. Service-Centric. 2194-2212 - Tahidul Islam, Insoo Koo:

Compressed Sensing-Based Multi-Layer Data Communication in Smart Grid Systems. 2213-2231 - Jinmo Kim:

Efficient Procedural Modeling of Trees Based on Interactive Growth Volume Control. 2232-2245 - Rubén Cuevas

, Michal Kryczka, Ángel Cuevas
, Carmen Guerrero, Arturo Azcorra:
Connectivity Properties of Real BitTorrent Swarms. 2246-2267 - Chang-you Xing, Ming Chen, Chao Hu:

Capacity Aware Scalable Video Coding in P2P on Demand Streaming Systems. 2268-2283 - Zhenzhen Yang, Zhen Yang:

Fast Linearized Bregman Method for Compressed Sensing. 2284-2298 - Jinsoo Cho, Jongkil Won, Jongwoo Bae:

Geometric Image Compensation Method for a Portable Projector Based on Rewarping Using 2D Homography. 2299-2311 - Junsik Lim, In Seop Na

, Soo-Hyung Kim:
Correction of Signboard Distortion by Vertical Stroke Estimation. 2312-2325 - Heegon Kim, Sungju Lee, Yongwha Chung, Sung Bum Pan:

Parallelizing H.264 and AES Collectively. 2326-2337
Volume 7, Number 10, October 2013
- Hoang Anh, Insoo Koo:

Primary User Localization using Bayesian Compressive Sensing and Path-loss Exponent Estimation for Cognitive Radio Networks. 2338-2356 - Qiang Dou, Yong Wang, Wei Peng

, Zhenghu Gong:
Closed Walk Ferry Route Design for Wireless Sensor Networks. 2357-2375 - Jiamei Chen, Yubin Xu, Lin Ma, Yao Wang:

Multi-agent Q-learning based Admission Control Mechanism in Heterogeneous Wireless Networks for Multiple Services. 2376-2394 - Dexiang Meng, Dongchen Zhang, Shoufeng Wang, Xiaoyan Xu, Wenwen Yao:

Evaluation and Optimization of Resource Allocation among Multiple Networks. 2395-2410 - Shu-Ming Tseng

, Shih-Han Wang:
Distributed Quasi-Orthogonal Space Time Block Code for Four Transmit Antennas with Information Exchange Error Mitigation. 2411-2429
- Junghwan Lee, Jaehyun Hwang, Nakjung Choi, Chuck Yoo:

SVC-based Adaptive Video Streaming over Content-Centric Networking. 2430-2447 - Ran Li, Minghu Wu, Zongliang Gan, Ziguan Cui, Xiuchang Zhu:

Joint Overlapped Block Motion Compensation Using Eight-Neighbor Block Motion Vectors for Frame Rate Up-Conversion. 2448-2463 - Jisung Yoo, Sung Soo Hwang, Seong-Dae Kim, MyungSeok Ki, Jihun Cha:

Regional Linear Warping for Image Stitching with Dominant Edge Extraction. 2464-2478 - Jung-Hyun Hong, Won-Jin Kim, Ki-Seok Chung:

A Parallelization Technique with Integrated Multi-Threading for Video Decoding on Multi-core Systems. 2479-2496
- Haomiao Yang, Hyunsung Kim

, Hongwei Li, Eunjun Yoon, Xiaofen Wang, Xuefeng Ding:
An Efficient Somewhat HE scheme over Integers and Its Variation. 2497-2513 - Wenxiang Li, Tao Zhang, Zhenhao Zhu, Yan Zhang, Xin Ping:

Detection of LSB Matching Revisited Using Pixel Difference Feature. 2514-2526 - Yin-Jen Chiang, Pei-Yu Lin

, Ran-Zan Wang
, Yi-Hui Chen:
Blind QR Code Steganographic Approach Based upon Error Correction Capability. 2527-2543 - Haomiao Yang, Hyunsung Kim

, Hongwei Li, Eunjun Yoon, Xiaofen Wang, Xuefeng Ding:
An Efficient Broadcast Authentication Scheme with Batch Verification for ADS-B Messages. 2544-2560
Volume 7, Number 11, November 2013
- Yan Huang, Bing Hui, Xin Su, KyungHi Chang:

Self-weighted Decentralized Cooperative Spectrum Sensing Based On Notification for Hidden Primary User Detection in SANET-CR Network. 2561-2576 - Mandicou Ba

, Olivier Flauzac, Bachar Salim Haggar, Rafik Makhloufi, Florent Nolot
, Ibrahima Niang:
Energy-Aware Self-Stabilizing Distributed Clustering Protocol for Ad Hoc Networks: the case of WSNs. 2577-2596 - Chang Soon Kang, Tien Dung Nguyen, Junsu Kim

, Renato Lo Cigno
:
A Downlink Load Control Scheme with a Dynamic Load Threshold and Virtual Coverage Management for Two-Tier Femtocell Networks. 2597-2615 - Young-Min Cho, Janghoon Yang, Dong Ku Kim:

Transceiver Design Using Local Channel State Information at Relays for A Multi-Relay Multi-User MIMO Network. 2616-2635 - Yayan Li, Kai Liu, Feng Liu:

CRP-CMAC: A Priority-Differentiated Cooperative MAC Protocol with Contention Resolution for Multihop Wireless Networks. 2636-2656 - Yongliang Sun, Yubin Xu:

Error Estimation Method for Matrix Correlation-Based Wi-Fi Indoor Localization. 2657-2675 - Si-o Seo, Seung-Yong Baek, Doyeop Keum, Seungwan Ryu, Choong-Ho Cho:

A Tutorial: Information and Communications-based Intelligent Building Energy Monitoring and Efficient Systems. 2676-2689
- Jure Kovac, Peter Peer

:
Transformation Based Walking Speed Normalization for Gait Recognition. 2690-2701 - Zhixiao Wang, Xuebin Xu, Wenyao Yan, Wei Wei, Junhuai Li, Deyun Zhang:

Optimal Scheme of Retinal Image Enhancement Using Curvelet Transform and Quantum Genetic Algorithm. 2702-2719 - Wenkai Xu

, Eung-Joo Lee:
A Novel Multi-view Face Detection Method Based on Improved Real Adaboost Algorithm. 2720-2736 - Dan Xu, Zhenmin Tang

, Wei Xu:
Salient Object Detection Based on Regional Contrast and Relative Spatial Compactness. 2737-2753 - Ziqiang Sun, Yuesheng Zhu, Xiyao Liu, Liming Zhang

:
A Robust Video Fingerprinting Algorithm Based on Centroid of Spatio-temporal Gradient Orientations. 2754-2768 - Lijun Yang, Chao Ding, Meng Wu:

TinyIBAK: Design and Prototype Implementation of An Identity-based Authenticated Key Agreement Scheme for Large Scale Sensor Networks. 2769-2792 - Minghu Wu, Rui Chen, Shangli Zhou, Xiuchang Zhu:

Distortion Measurement based Dynamic Packet Scheduling of Video Stream over IEEE 802.11e WLANs. 2793-2803 - Farhana Jabeen, Sarfraz Nawaz:

In-network Distributed Event Boundary Computation in Wireless Sensor Networks: Challenges, State of the Art and Future Directions. 2804-2823 - Kyoung-Mi Lee, Hey-Min Won:

Dynamic Gesture Recognition using a Model-based Temporal Self-similarity and its Application to Taebo Gesture Recognition. 2824-2838 - Muhammad Hameed Siddiqi, Adil Mehmood Khan, Seok-Won Lee:

Active Contours Level Set Based Still Human Body Segmentation from Depth Images For Video-based Activity Recognition. 2839-2852 - Iram Fatima, Muhammad Fahim

, Young-Koo Lee, Sungyoung Lee:
A Genetic Algorithm-based Classifier Ensemble Optimization for Activity Recognition in Smart Homes. 2853-2873
- Bong-Whan Kim, Chang-Seop Park:

Secure and Energy-Efficient Join-Leave Operations in ZigBee Network. 2874-2892 - Hongxia Wang, Bangxu Yin, Linna Zhou:

Geometrically Invariant Image Watermarking using Connected Objects and Gravity Centers. 2893-2912 - Yung-Chen Chou, Ping-Kun Hsu, Iuon-Chang Lin:

Data Hiding for HTML Files Using Character Coding Table and Index Coding Table. 2913-2927 - Chien-Lung Hsu, Han-Yu Lin:

An Identity-Based Key-Insulated Encryption with Message Linkages for Peer-to-Peer Communication Network. 2928-2940 - Chuan Qin

, Chin-Chen Chang, Tai-Jung Hsu:
Effective Fragile Watermarking for Image Authentication with High-quality Recovery Capability. 2941-2956
Volume 7, Number 12, December 2013
- Omar B. Abdul-Ghafoor, Mahamod Ismail

, Rosdiadee Nordin
, Ayman A. El-Saleh
:
Resource Allocation in Spectrum Sharing ad-hoc Cognitive Radio Networks Based on Game Theory: An Overview. 2957-2986 - Heejung Yu:

Optimal Channel Sensing for Heterogeneous Cognitive Networks: An Analytical Approach. 2987-3002 - Zongsheng Zhang, Qihui Wu, Xueqiang Zheng, Jinlong Wang, Lianbao Li:

Outage Analysis of CRNs with SC Diversity Over Nakagami-m Fading Environment. 3003-3017 - Jia Liu, Ying Zhu, GuiXia Kang, Yifan Zhang:

Optimal Energy-Efficient Power Allocation and Outage Performance Analysis for Cognitive Multi-Antenna Relay Network Using Physical-Layer Network Coding. 3018-3036 - Xiaorong Xu, Yu-Dong Yao, Sanqing Hu, Yingbiao Yao:

Joint Subcarrier and Bit Allocation for Secondary User with Primary Users¡¯ Cooperation. 3037-3054 - Won-Jae Shin, Young-Hwan You:

Robust Pilot-aided Frequency Offset Estimation Scheme for OFDM-based Broadcasting System with Cyclic Delay Diversity. 3055-3070 - Xue Chen, Yanling Hu, Anfeng Liu, Zhigang Chen:

Cross Layer Optimal Design with Guaranteed Reliability under Rayleigh Block Fading Channels. 3071-3095 - Vahid Khajehvand

, Hossein Pedram, Mostafa Zandieh
:
SCTTS: Scalable Cost-Time Trade-off Scheduling for Workflow Application in Grids. 3096-3117 - Ali Farzamnia

, Sharifah Kamilah Syed Yusof
, Norsheila Fisal:
Multicasting Multiple Description Coding Using p-Cycle Network Coding. 3118-3134 - Fuhong Lin

, Xianwei Zhou, Changjia Chen:
Novel Pre-pushing & Downloading Model in Mobile Peer-assisted Streaming Network. 3135-3148
- Mussarat Yasmin, Muhammad Sharif

, Sajjad Mohsin, Isma Irum:
Content Based Image Retrieval Using Combined Features of Shape, Color and Relevance Feedback. 3149-3165 - Sangwoo Ahn, Jongjoo Park, Linbo Luo, Jongwha Chong:

Adaptive Object-Region-Based Image Pre-Processing for Noise Removal Algorithm. 3166-3179 - Huy Hoang Nguyen, Gueesang Lee, Soo-Hyung Kim, Hyung Jeong Yang:

An Effective Orientation-based Method and Parameter Space Discretization for Defined Object Segmentation. 3180-3199 - Kalvein Rantelobo

, Wirawan
, Gamantyo Hendrantoro
, Achmad Affandi
, Hua-An Zhao:
Adaptive Combined Scalable Video Coding over MIMO-OFDM Systems using Partial Channel State Information. 3200-3219
- Junghyun Nam, Kim-Kwang Raymond Choo, Moonseong Kim, Juryon Paik, Dongho Won:

Dictionary Attacks against Password-Based Authenticated Three-Party Key Exchange Protocols. 3244-3260 - Geontae Noh, Ik Rae Jeong:

Scalable Hierarchical Identity-based Signature Scheme from Lattices. 3261-3273 - Young-Seob Jeong, Chae-Gyun Lim, Byeong-Soo Jeong, Ho-Jin Choi:

Topic Masks for Image Segmentation. 3274-3292

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














