default search action
KSII Transactions on Internet and Information Systems, Volume 7
Volume 7, Number 1, January 2013
- Shuguang Chen, Tingting Sun, Jingjing Yuan, Xiaoyan Geng, Changle Li, Sana Ullah, Mohammed Abdullah Alnuem:
Performance Analysis of IEEE 802.15.4e Time Slotted Channel Hopping for Low-Rate Wireless Networks. 1-21 - Seung Chul Han, Sungwook Chung, Kwang-Sik Lee, Hyunmin Park, Minho Shin:
Distributing Network Loads in Tree-based Content Distribution System. 22-37 - Sangwoo Son, Byungho Rhee:
Adaptive Resource Allocation for Traffic Flow Control in Hybrid Networks. 38-55
- Jianfeng Lu, Li Li, Zhenhua Yang:
Video Watermarking Algorithm for H.264 Scalable Video Coding. 56-67 - Fatma Taher, Naoufel Werghi, Hussain Al-Ahmad:
Automatic Sputum Color Image Segmentation for Lung Cancer Diagnosis. 68-80 - Young-Seob Jeong, Sou-Young Jin, Ho-Jin Choi:
Non-Simultaneous Sampling Deactivation during the Parameter Approximation of a Topic Model. 81-98 - Mohamed Ezzeldin A. Bashir, Ho-Sun Shon, Dong Gyu Lee, Hyeongsoo Kim, Keun Ho Ryu:
Real-Time Automated Cardiac Health Monitoring by Combination of Active Learning and Adaptive Feature Selection. 99-118
- Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng, Chun-I Fan:
An Extended Multi-Server-Based User Authentication and Key Agreement Scheme with User Anonymity. 119-131 - Li-Chin Huang, Min-Shiang Hwang, Lin-Yu Tseng:
Reversible and High-Capacity Data Hiding in High Quality Medical Images. 132-148 - Sunghyuck Hong, Sungjin Lee:
Design and Performance Analysis of Queue-based Group Diffie-Hellman Protocol (QGDH). 149-165 - Sung-Hyun Yun, Heuiseok Lim:
The Biometric based Mobile ID and Its Application to Electronic Voting. 166-183
Volume 7, Number 2, February 2013
- Xian Zhang, Qihui Wu, Xiaoqiang Li, Zi Yun:
Optimal Cooperation and Transmission in Cooperative Spectrum Sensing for Cognitive Radio. 184-201 - Soong-Hee Lee:
Combining Communications and Tracking: A New Paradigm of Smartphone Games. 202-215 - Yueying Zhang, Hang Long, Yuexing Peng, Kan Zheng, Wenbo Wang:
User-Oriented Energy- and Spectral- Efficiency Tradeoff for Wireless Networks. 216-233 - Yahui Wu, Su Deng, Hongbin Huang:
Energy-efficient Joint Control of Epidemic Routing in Delay Tolerant Networks. 234-252 - Seong-Joong Kim, Dong-Joo Park:
A Self-Calibrated Localization System using Chirp Spread Spectrum in a Wireless Sensor Network. 253-270 - Hoai Phong Ngo, Myung-Kyun Kim:
MRFR - Multipath-based Routing Protocol with Fast-Recovery of Failures on MANETs. 271-287 - Yaru Fu, Qi Zhu:
A Joint Resource Allocation Scheme for Relay Enhanced Multi-cell Orthogonal Frequency Division Multiple Networks. 288-307 - Yong Wang, Wei Peng, Qiang Dou, Zhenghu Gong:
Stationary Distribution for the Mobilities in Catastrophe Rescue Scenario. 308-326 - Sajad Khorsandroo, Rafidah Md Noor, Sayid Khorsandroo:
A Generic Quantitative Relationship to Assess Interdependency of QoE and QoS. 327-346 - Dat Tien Nguyen, Young Ho Park, Kwang Yong Shin, Kang Ryoung Park:
New Finger-vein Recognition Method Based on Image Quality Assessment. 347-365 - Ran Li, Zongliang Gan, Ziguan Cui, Minghu Wu, Xiuchang Zhu:
Side Information Extrapolation Using Motion-aligned Auto Regressive Model for Compressed Sensing based Wyner-Ziv Codec. 366-385 - Shaodong Feng, Fan Wang, Yuan Lin, Liang Gou, Guangxia Li:
An Asynchronous Burst Time Plan Generation Method for Broadband Satellite Multimedia System. 386-404 - Phan Trung Huy, Nguyen Hai Thanh, Cheonshik Kim, Ching-Nung Yang:
Data-Hiding for Halftone Images Using an Improved CPT scheme. 405-424
Volume 7, Number 3, March 2013
- Shahbaz Khan, Sadiq Ullah, Aziz Ahmed, Sahibzada A. Mahmud:
A Survey of Rate-Adaptation Schemes for IEEE 802.11 Compliant WLANs. 425-445 - Jia Zhu:
Energy Efficiency Analysis of Cellular Downlink Transmission with Network Coding over Rayleigh Fading Channels. 446-458 - Shwu-Huey Yen, Ya-ju Hsieh:
A KD-Tree-Based Nearest Neighbor Search for Large Quantities of Data. 459-470 - Min Wang, Junfeng Wang, Xuan Mou, Sunyoung Han:
On-the-fly Data Compression for Efficient TCP Transmission. 471-489 - Xiaoqiang Wang, Peidong Zhu, Xicheng Lu, Kan Chen, Huayang Cao:
Scaling Inter-domain Routing System via Path Exploration Aggregation. 490-508
- Ting Cui, Chenhui Jin:
Finding Impossible Differentials for Rijndael-like and 3D-like Structures. 509-521 - Bin Wang, Xiong Li, Yuncai Liu:
Learning Discriminative Fisher Kernel for Image Retrieval. 522-538 - Cuiyin Liu, Peng Cheng, Shu-qing Chen, Cuiwei Wang, Fenghong Xiang:
A Novel Multifocus Image Fusion Algorithm Based on Nonsubsampled Contourlet Transform. 539-557
- Jinhyung Kim, Choonsik Park, Jun Hwang, Hyung-Jong Kim:
Privacy Level Indicating Data Leakage Prevention System. 558-575 - Fan Pan, Lifa Wu, Zheng Hong, Huabo Li, Haiguang Lai, Chenghui Zheng:
Icefex: Protocol Format Extraction from IL-based Concolic Execution. 576-599 - Wen-Chung Kuo:
Secure Modulus Data Hiding Scheme. 600-612
Volume 7, Number 4, April 30, 2013
- Siavash Sadeghi Ivrigh, Seyed Mohammad Sajad Sadough:
Spectrum Sensing for Cognitive Radio Networks Based on Blind Source Separation. 613-631 - Ping Zhang, Ding Xu, Zhiyong Feng:
Capacity of Spectrum Sharing Cognitive Radio with MRC Diversity under Delay Quality-of-Service Constraints in Nakagami Fading Environments. 632-650 - Chunxiao Liu, Gui-Ran Chang, Jie Jia:
A Novel Routing Algorithm Based on Load Balancing for Multi-Channel Wireless Mesh Networks. 651-669 - Junhuai Li, Guomou Zhang, Lei Yu, Zhixiao Wang, Jing Zhang:
An Advanced RFID Localization Algorithm Based on Region Division and Error Compensation. 670-691 - Hyukjin Chae, Kiyeon Kim, Rong Ran, Dong Ku Kim:
A Single Feedback Based Interference Alignment for Three-User MIMO Interference Channels with Limited Feedback. 692-710 - Yoon-Ho Choi:
Probabilistic Model for Performance Analysis of a Heuristic with Multi-byte Suffix Matching. 711-725 - Kang Jin Yoon, Ronny Yongho Kim, Young Yong Kim:
Modelling of Differentiated Bandwidth Requests in IEEE 802.16m Systems. 726-747 - Yuan Zhou, Zesong Fei, Gaishi Huang, Ang Yang, Jingming Kuang:
A Distributed LT Codes-based Data Transmission Technique for Multicast Services in Vehicular Ad-hoc Networks. 748-766 - Yuheng Huang, Yan Dong, Minho Jo, Yingzhuang Liu:
Selective Demodulation Scheme Based on Log-Likelihood Ratio Threshold. 767-783 - Sunghee Lee, Kwangsue Chung:
Adaptive Rate Control Scheme for Streaming-based Content Sharing Service. 784-799 - Huali Cui, Depei Qian, Xingjun Zhang, Ilsun You, Xiaoshe Dong:
Optimizing the Joint Source/Network Coding for Video Streaming over Multi-hop Wireless Networks. 800-818 - Xiong Li, Bin Wang, Yuncai Liu:
Bio-Inspired Object Recognition Using Parameterized Metric Learning. 819-833 - Eui Chul Lee, Min-Woo Park:
New Eye Tracking Method as a Smartphone Interface. 834-848 - Min Gyu Choi, Oh-Young Song:
Real-Time Simulation of Thin Rod. 849-859 - Young Bae Yoon, Junseok Oh, Bong Gyou Lee:
The Establishment of Security Strategies for Introducing Cloud Computing. 860-877 - Pandi Vijayakumar, Sundan Bose, Arputharaj Kannan, L. Jegatha Deborah:
Computation and Communication Efficient Key Distribution Protocol for Secure Multicast Communication. 878-894 - Zheng Wang, Shian-Shyong Tseng:
Impact Evaluation of DDoS Attacks on DNS Cache Server Using Queuing Model. 895-909 - Syh-Yuan Tan, Ji-Jian Chin, Swee-Huay Heng, Bok-Min Goi:
An Improved Efficient Provable Secure Identity-Based Identification Scheme in the Standard Model. 910-922 - Yoon-Su Jeong, Yong-Tae Kim, Seung-Soo Shin, Sang-Ho Lee:
A Device Authentication Mechanism Reducing Performance Cost in Mobile P2P Networks. 923-948
Volume 7, Number 5, May, 2013
- Xu Zhang, Ying Xia, Shiyan Luo:
Energy-aware Management in Wireless Body Area Network System. 949-966 - Muhammad Khurram Khan, Saru Kumari, Pitam Singh:
Cryptanalysis of an 'Efficient-Strong Authentiction Protocol (E-SAP) for Healthcare Applications Using Wireless Medical Sensor Networks'. 967-979 - Long Hu, Ong Mau Dung, Qiang Liu, Tao Han, Yantao Sun:
Integration of Wireless Body Area Networks (WBANs) and WAN, WiMAX and LTE. 980-997 - Jianxin Chen, Liang Zhou, Yun Zhang, David Fondo Ferreiro:
Human Motion Tracking With Wireless Wearable Sensor Network: Experience and Lessons. 998-1013 - Jianqi Liu, Qinruo Wang, Jiafu Wan, Jianbin Xiong, Bi Zeng:
Towards Key Issues of Disaster Aid based on Wireless Body Area Networks. 1014-1035 - Yahaya O. Mohammed, Uthman A. Baroudi:
Partially Observable Markov Decision Processes (POMDPs) and Wireless Body Area Networks (WBAN): A Survey. 1036-1057 - Sungryel Lim, Hongchul Lee:
Factors Affecting Medical Incident Care on WBAN. 1058-1076 - Ali Çalhan, Sedat Atmaca:
A new Network Coordinator Node Design Selecting the Optimum Wireless Technology for Wireless Body Area Networks. 1077-1093 - An Wang, Xuexin Zheng, Zongyue Wang:
Power Analysis Attacks and Countermeasures on NTRU-Based Wireless Body Area Networks. 1094-1107 - Changle Li, Xiaoyan Geng, Jingjing Yuan, Tingting Sun:
Performance Analysis of IEEE 802.15.6 MAC Protocol in Beacon Mode with Superframes. 1108-1130 - Haobo Qing, Yuanan Liu, Gang Xie:
Robust Spectrum Sensing for Blind Multiband Detection in Cognitive Radio Systems: A Gerschgorin Likelihood Approach. 1131-1145 - Jian An, Xiaolin Gui, Jianwei Yang, Wendong Zhang, Jinhua Jiang:
Research on a Mobile-aware Service Model in the Internet of Things. 1146-1165 - Youngwon Kim An, Seong-Moo Yoo, Changhyuk An, B. Earl Wells:
Noise Mitigation for Target Tracking in Wireless Acoustic Sensor Networks. 1166-1179 - Zhenzhou Tang, Hongyu Wang, Qian Hu, Long Hai:
How Network Coding Benefits Converge-Cast in Wireless Sensor Networks. 1180-1197 - Yanzhe Che, Qiang Yang, Chunming Wu:
Towards a Hierarchical Global Naming Framework in Network Virtualization. 1198-1212 - JinBaek Kim, Sungmin Kang, Hoon S. Cha:
Smartphone Banking: The Factors Influencing the Intention to Use. 1213-1235 - Guannan Wang, Zhizhong Wang, Zhenmin Zhu, Saiping Wen:
A novel route restoring method upon geo-tagged photos. 1236-1251 - Bin Wang, Yuncai Liu:
Collaborative Similarity Metric Learning for Semantic Image Annotation and Retrieval. 1252-1271 - Ihsan Gunes, Alper Bilge, Huseyin Polat:
Shilling Attacks Against Memory-Based Privacy-Preserving Recommendation Algorithms. 1272-1290 - Chenlei Cao, Ru Zhang, Mengyi Zhang, Yixian Yang:
IBC-Based Entity Authentication Protocols for Federated Cloud Systems. 1291-1312 - Xiaowei Li, Yuqing Zhang, Xuefeng Liu, Jin Cao:
A Lightweight Three-Party Privacy-preserving Authentication Key Exchange Protocol Using Smart Card. 1313-1327 - Nam-Su Jho, Dowon Hong:
Symmetric Searchable Encryption with Efficient Conjunctive Keyword Search. 1328-1342 - Leyou Zhang, Yupu Hu:
New Constructions of Hierarchical Attribute-Based Encryption for Fine-Grained Access Control in Cloud Computing. 1343-1356
Volume 7, Number 6, June 2013
- Razieh Sheikhpour, Sam Jabbehdari:
An Energy Efficient Chain-based Routing Protocol for Wireless Sensor Networks. 1357-1378 - Feng Zhao, Jiayi Zhang, Hongbin Chen:
Joint Beamforming and Power Allocation for Multiple Primary Users and Secondary Users in Cognitive MIMO Systems via Game Theory. 1379-1397 - Changhyeon Kim, Wonjoo Lee, Changho Jeon:
A Resource Reduction Scheme with Low Migration Frequency for Virtual Machines on a Cloud Cluster. 1398-1417 - Dandan Li, Ke Xiong, Guanyao Du, Zhengding Qiu:
Secure Beamforming with Artificial Noise for Two-way Relay Networks. 1418-1432
- Jong-Chang Ahn, Sung-Phil Cho, Soon-Ki Jeong:
Virtual Reality to Help Relieve Travel Anxiety. 1433-1448 - Jiye Lee, Hae Won Byun:
Simpson Style Caricature based on MLS. 1449-1462 - Yingying Cao, Xue Chen, Liqian Wang, Xicong Li:
An Unequal Protection FEC Scheme for Video over Optical Access Networks. 1463-1479
- Ji Yao, Jiguo Li, Yichen Zhang:
Certificate-Based Encryption Scheme without Pairing. 1480-1491 - Qian Mao, Chin-Chen Chang, Hsiao-Ling Wu:
An Image Encryption Scheme Based on Concatenated Torus Automorphisms. 1492-1511 - Shi-Jinn Horng, Shiang-Feng Tzeng, Pingzhi Fan, Xian Wang, Tianrui Li, Muhammad Khurram Khan:
Secure Convertible Undeniable Signature Scheme Using Extended Euclidean Algorithm without Random Oracles. 1512-1532
Volume 7, Number 7, July 2013
- Yueyun Chen, Xiangyun Xu, Qun Lei:
Joint Subcarriers and Power Allocation with Imperfect Spectrum Sensing for Cognitive D2D Wireless Multicast. 1533-1546 - Xuelian Cai, Jingjing Yuan, Xiaoming Yuan, Wu Zhu, Jiandong Li, Changle Li, Sana Ullah:
Energy-efficient Relay MAC with Dynamic Power Control in Wireless Body Area Networks. 1547-1568 - Hamed Khiabani, Norbik Bashah Idris, Jamalul-lail Ab Manan:
A Unified Trust Model for Pervasive Environments - Simulation and Analysis. 1569-1584 - Ahmed M. Shamsan Saleh, Borhanuddin Mohd Ali, Hafizal Mohamad, Mohd Fadlee A. Rasid, Alyani Ismail:
RRSEB: A Reliable Routing Scheme for Energy-balancing Using a Self-adaptive Method in Wireless Sensor Networks. 1585-1609 - Hongseok Jeon, Byungjoon Lee, Hoyoung Song, Moonsoo Kang:
An ICN In-Network Caching Policy for Butterfly Network in DCN. 1610-1623 - Sunwoong Choi, Jaehyuk Choi, Joon Yoo:
MRCT: An Efficient Tag Identification Protocol in RFID Systems with Capture Effect. 1624-1637 - Tuan Hao Tieu, Younghan Kim, Gwangyong Gim:
PTT Service Interworking Between IMS Based Networks and P2P Overlay Networks. 1638-1656
- Tuyen Danh Pham, Gi Pyo Nam, Kwang Yong Shin, Kang Ryoung Park:
A Novel Query-by-Singing/Humming Method by Estimating Matching Positions Based on Multi-layered Perceptron. 1657-1670 - Yong Yang, Wenjuan Zheng, Shuying Huang:
A Novel Automatic Block-based Multi-focus Image Fusion via Genetic Algorithm. 1671-1689 - Xiaojie Dong, Erqi Liu, Jie Yang, Qiang Wu:
MEGH: A New Affine Invariant Descriptor. 1690-1704 - Jucheng Yang, Yanbin Jiao, Naixue Xiong, Dong Sun Park:
Fast Face Gender Recognition by Using Local Ternary Pattern and Extreme Learning Machine. 1705-1720
- Chundong She, Ping Yi, Junfeng Wang, Hongshen Yang:
Intrusion Detection for Black Hole and Gray Hole in MANETs. 1721-1736 - Sunghyuck Hong, Sungjin Lee:
Design and Performance Analysis of Queue-based Group Diffie-Hellman Protocol (QGDH). 1737-1753
Volume 7, Number 8, Aug 30, 2013
- Wasan Kadhim Saad, Mahamod Ismail, Rosdiadee Nordin, Ayman A. El-Saleh:
On the Performance of Cooperative Spectrum Sensing of Cognitive Radio Networks in AWGN and Rayleigh Fading Environments. 1754-1769 - Ping Xie, Lihua Li, Junlong Zhu, Jin Jin, Yijing Liu:
Cooperative spectrum leasing using parallel communication of secondary users. 1770-1785 - Peisheng Pan, Baoyu Zheng:
Outage Probability of Two-Hop Relay Networks with Related Interference. 1786-1804 - Ismail Kirbas, Alper Karahan, Abdullah Sevin, Cüneyt Bayilmis:
isMAC: An Adaptive and Energy-Efficient MAC Protocol Based on Multi-Channel Communication for Wireless Body Area Networks. 1805-1824 - Md. Sabbir Hasan, Eui-Nam Huh:
Heuristic based Energy-aware Resource Allocation by Dynamic Consolidation of Virtual Machines in Cloud Data Center. 1825-1842 - Libao Zhang, Hao Li:
Region of Interest Detection Based on Visual Attention and Threshold Segmentation in High Spatial Resolution Remote Sensing Images. 1843-1859 - Ki-Won Kwon, Seong-Jun Kim, Jun Hwang, Jong-Ho Paik:
Performance Evaluation of Synchronization Method for Reducing the Overall Synchronization Time in Digital Radio Mondiale Receivers. 1860-1875 - Jongchan Lee, MoonHo Lee:
Sub-channel Allocation Based on Multi-level Priority in OFDMA Systems. 1876-1889 - Xiaolei Zhou, Deke Guo, Tao Chen, Xueshan Luo:
Robust Backup Path Selection in Overlay Routing with Bloom Filters. 1890-1910 - Rongchun Li, Yong Dou, Jie Zhou, Baofeng Li, Jinbo Xu:
From WiFi to WiMAX: Efficient GPU-based Parameterized Transceiver across Different OFDM Protocols. 1911-1932 - Rashid Hafeez Khokhar, Tanveer A. Zia, Kayhan Zrar Ghafoor, Jaime Lloret, Muhammad Shiraz:
Realistic and Efficient Radio Propagation Model to Handle Obstacles for Vehicle-to-X Communications. 1933-1954 - Sijia Lou, Longxiang Yang:
Joint Relay Selection and Power Allocation. 1955-1971 - Jiguo Li, Yanqiong Li, Yichen Zhang:
Provably Secure Forward Secure Certificateless Proxy Signature Scheme. 1972-1988 - Zhiqiang Wang, Yuqing Zhang, Qixu Liu:
RPFuzzer: A Framework for Discovering Router Protocols Vulnerabilities Based on Fuzzing. 1989-2009 - Yang Yang, Yupu Hu, Leyou Zhang:
An Efficient Biometric Identity Based Signature Scheme. 2010-2026 - Chuan Qin, Chin-Chen Chang, Yen-Chang Chen:
A Novel Reversible Data Hiding Scheme for VQ-Compressed Images Using Index Set Construction Strategy. 2027-2041 - Rong Jiang, Jun Luo, Xiaoping Wang:
HRKT: A Hierarchical Route Key Tree based Group Key Management for Wireless Sensor Networks. 2042-2060 - Xiaowei Li, Yuqing Zhang, Xuefeng Liu, Jin Cao, Qianqian Zhao:
A New Roaming Authentication Framework For Wireless Communication. 2061-2080
Volume 7, Number 9, September, 2013
- Md. Fazlul Kader, Asaduzzaman, Md. Moshiul Hoque:
Hybrid Spectrum Sharing with Cooperative Secondary User Selection in Cognitive Radio Networks. 2081-2100 - Yao Wang, Zhongzhao Zhang, Qiyue Yu, Jiamei Chen:
A Novel Prediction-based Spectrum Allocation Mechanism for Mobile Cognitive Radio Networks. 2101-2119 - Huijin Cao, Yanhui Lu, Jun Cai:
MMSE Transmit Optimization for Multiuser Multiple-Input Single-Output Broadcasting Channels in Cognitive Radio Networks. 2120-2133