default search action
KSII Transactions on Internet and Information Systems, Volume 9
Volume 9, Number 1, January 2015
- Wenrong Gong, Xiaoxiang Wang:
Joint User Association and Resource Allocation of Device-to-Device Communication in Small Cell Networks. 1-19 - Jaewoo So:
Entropy-based Spectrum Sensing for Cognitive Radio Networks in the Presence of an Unauthorized Signal. 20-33 - Hiran Kumar Singh, Dhananjay Kumar, Srilakshmi R.:
Short Term Spectrum Trading in Future LTE Based Cognitive Radio Systems. 34-49 - Hyochun Ahn, Jaebeom Kim, Young-Bae Ko:
CLSR: Cognitive Link State Routing for CR-based Tactical Ad Hoc Networks. 50-67 - Su Pan, Weiwei Zhou, Qingqing Gu, Qiang Ye:
Network Selection Algorithm Based on Spectral Bandwidth Mapping and an Economic Model in WLAN & LTE heterogeneous networks. 68-86 - Riming Wang, Jiuchao Feng:
Grid-based Correlation Localization Method in Mixed Line-of-Sight/Non-Line-of-Sight Environments. 87-107 - Inho Hwang, Jeong Woo Lee:
Half-Duplex Relaying Strategy Suitable for a Relay with Mobility. 108-125 - Xiaoshuang Liu, Guixia Kang, Ningbo Zhang:
Percolation Theory-Based Exposure-Path Prevention for 3D-Wireless Sensor Networks Coverage. 126-148 - Qun Lei, Yueyun Chen:
Resource Allocation based on Hybrid Sharing Mode for Heterogeneous Services of Cognitive Radio OFDM Systems. 149-168 - Ponnai Manogaran Ashok Kumar, Vaidehi V.:
Anomalous Event Detection in Traffic Video Based on Sequential Temporal Patterns of Spatial Interval Events. 169-189 - Weixing Wang, Sheng Liu:
Online Burning Material Pile Detection on Color Clustering and Quaternion based Edge Detection in Boiler. 190-207 - Weisheng Li, Lidou Wang:
Near-infrared Face Recognition by Fusion of E-GV-LBP and FKNN. 208-223 - Shiping Zhu, Zheng Li:
Local Stereo Matching Using Combined Matching Cost and Adaptive Cost Aggregation. 224-241 - Shiping Zhu, Dongyu Zhao:
Fractal Depth Map Sequence Coding Algorithm with Motion-vector-field-based Motion Estimation. 242-259 - Songqing Wang, Xiaoming Xu, Weiwei Yang:
Physical Layer Security in Underlay CCRNs with Fixed Transmit Power. 260-279 - Wentan Yi, Shaozhen Chen, Kuanyang Wei:
Zero-Correlation Linear Cryptanalysis of Reduced Round ARIA with Partial-sum and FFT. 280-295 - Yanting Ren, Liji Wu, An Wang:
Double Sieve Collision Attack Based on Bitwise Detection. 296-308 - In Kuk Song, Junchul Chun:
Evolving Internet Information & Technology as Enablers for Creating Shared Values. 309-317 - Woo-Sik Lee, Byoung-Dai Lee, Namgi Kim:
An Accelerometer-Assisted Power Management for Wearable Sensor Systems. 318-330 - Gyanendra Prasad Joshi, Sung Won Kim, Chang-Su Kim, Seung Yeob Nam:
A Distributed Medium Access Control Protocol for Cognitive Radio Ad Hoc Networks. 331-343 - Murad Khan, Gisu Park, Wooseong Cho, Gihyuk Seong, Kijun Han:
A Handover Management Scheme Based on User-Preferences and Network-Centric Approach. 344-357 - Dung Phan, In Seop Na, Soo-Hyung Kim, Gueesang Lee, Hyung Jeong Yang:
Triangulation Based Skeletonization and Trajectory Recovery for Handwritten Character Patterns. 358-377 - Yong-Suk Park, Se-Ho Park, Tae Gon Kim, Jong-Moon Chung:
Implementation of Gesture Interface for Projected Surfaces. 378-390 - Yoosin Kim, Seung Ryul Jeong:
Opinion-Mining Methodology for Social Media Analytics. 391-406 - Sungho Shin, Hanmin Jung, Mun Yong Yi:
Building a Business Knowledge Base by a Supervised Learning and Rule-Based Method. 407-420 - Jong-Hwan Kong, Myung-Mook Han:
Malware Containment Using Weight based on Incremental PageRank in Dynamic Social Networks. 421-433 - Mina Lee, Inhye Choi, Seungchan Yang:
When Do People Post a Comment to a News Story on the Internet? 434-445 - Syed Mubarak Ali, Imran Ghani, Muhammad Shafie Abdul Latif:
Interaction-based Collaborative Recommendation: A Personalized Learning Environment (PLE) Perspective. 446-465 - Jong Sung Hwang, Sung Hyun Kim, Ho Lee:
Breaking the Myths of the IT Productivity Paradox. 466-482
Volume 9, Number 2, February 2015
- Yang Yang, Ziyang Liu, Boao Min, Tao Peng, Wenbo Wang:
Optimal User Density and Power Allocation for Device-to-Device Communication Underlaying Cellular Networks. 486-503 - Ahmad M. Khasawneh, Muhammad Shafie Abdul Latif, Hassan Chizari, Moeenuddin Tariq, Abdullah Bamatraf:
Pressure Based Routing Protocol for Underwater Wireless Sensor Network: A Survey. 504-527 - Zhe Zhang, Jing Yang, Jiankang Zhang, Xiaomin Mu:
Pilot Symbol Assisted Weighted Data Fusion Scheme for Uplink Base-Station Cooperation System. 528-544 - Guanyao Du, Ke Xiong, Yu Zhang, Zhengding Qiu:
Outage Analysis and Optimization for Time Switching-based Two-Way Relaying with Energy Harvesting Relay Node. 545-563 - Fei Li, Jiulong Wu, Wenxue Ge, Wei Ji:
Quantum Bacterial Foraging Optimization for Cognitive Radio Spectrum Allocation. 564-582 - Yi Liu, Wenbo Mei, Huiqian Du:
Group-Sparse Channel Estimation using Bayesian Matching Pursuit for OFDM Systems. 583-599 - Jibum Kim, Inbin Kim, Namgu Kwon, Heemin Park, Jinseok Chae:
A Hybrid Algorithm for Online Location Update using Feature Point Detection for Portable Devices. 600-619 - Liang Ming, Gang Zhao, Dongxia Wang, Minhuan Huang, Xiang Li, Qing Miao, Fei Xu:
A Novel Method for Survivability Test Based on End Nodes in Large Scale Network. 620-636 - Myungseok Song, Jun-Dong Cho, Jongpil Jeong:
Global Mobility Management Scheme for Seamless Mobile Multicasting Service Support in PMIPv6 Networks. 637-658 - Ponnai Manogaran Ashok Kumar, Vaidehi V.:
An Anomalous Behavior Detection Method Using System Call Sequences for Distributed Application. 659-679 - M. Buvana, M. Suganthi:
An Efficient Cluster Based Service Discovery Model for Mobile Ad hoc Network. 680-699 - Hu Shen, Shaohe Lv, Xiaodong Wang, Xingming Zhou:
Energy-efficient Routing in MIMO-based Mobile Ad hoc Networks with Multiplexing and Diversity Gains. 700-713 - Fang Li, Min Xie:
Exact Decoding Probability of Random Linear Network Coding for Tree Networks. 714-727 - Cheong Ghil Kim, Yong Soo Choi:
Improved Disparity Map Computation on Stereoscopic Streaming Video with Multi-core Parallel Implementation. 728-741 - Ju-Chin Chen, Pei-Hsun Wu, Jenn-Jier James Lien:
Discriminant Metric Learning Approach for Face Verification. 742-762 - Wenkai Xu, Eung-Joo Lee:
A Novel Method for Hand Posture Recognition Based on Depth Information DescriptorT. 763-774 - Yanna Zhao, Lei Wang, Xu Zhao, Yuncai Liu:
Multiple-Shot Person Re-identification by Features Learned from Third-party Image Sets. 775-792 - Wei Li, Wenwen Zhang, Dawu Gu, Zhi Tao, Zhihong Zhou, Ya Liu, Zhiqiang Liu:
Security Analysis of the Lightweight Cryptosystem TWINE in the Internet of Things. 793-810 - Hongfeng Zhu:
A Provable One-way Authentication Key Agreement Scheme with User Anonymity for Multi-server Environment. 811-829 - Mahir Kutay, Tuncay Ercan:
Formal Trust Assessment with Confidence Probability. 830-842
Volume 9, Number 3, March 2015
- K. Saravanan, Rajaram M.:
An Exploratory Study of Cloud Service Level Agreements - State of the Art Review. 843-871 - Zhigang Li, Yan Shi, Shanzhi Chen, Jingwen Zhao:
Cellular Traffic Offloading through Opportunistic Communications Based on Human Mobility. 872-885 - Kan Zheng, Yue Li, Yingkai Zhang, Zheng Jiang, Hang Long:
Performance Analysis and Evaluation of Deployment in Small Cell Networks. 886-900 - P. Shunmuga Perumal, V. Rhymend Uthariaraj, V. R. Elgin Christo:
WSN Lifetime Analysis: Intelligent UAV and Arc Selection Algorithm for Energy Conservation in Isolated Wireless Sensor Networks. 901-920 - Han Han, Yuhua Xu, Qinfei Huang:
On-demand Allocation of Multiple Mutual-compensating Resources in Wireless Downlinks: a Multi-server Case. 921-940 - Houde Quan, Chuanbao Du, Peizhang Cui:
A Novel Hitting Frequency Point Collision Avoidance Method for Wireless Dual-Channel Networks. 941-955 - Yong Wang, Hao Wu, Liyang Tang, Hui Li:
The Solution for Cooperative Beamforming Design in MIMO Multi-way Relay Networks. 956-970 - Dandan Wang, Yang Yang, Zhenqiang Mi:
QoS-Based and Network-Aware Web Service Composition across Cloud Datacenters. 971-989 - Wei Lu, Yuwang Yang, Wei Zhao, Lei Wang:
Practical Node Deployment Scheme Based on Virtual Force for Wireless Sensor Networks in Complex Environment. 990-1013 - Shigeng Zhang, Shuping Yan, Weitao Hu, Jianxin Wang, Kehua Guo:
A Component-Based Localization Algorithm for Sparse Sensor Networks Combining Angle and Distance Information. 1014-1034 - Chourouk Hammami, Imen Jemili, Achraf Gazdar, Abdelfettah Belghith, Mohamed Mosbah:
HLPSP: A Hybrid Live P2P Streaming Protocol. 1035-1056 - Hualiang Chen, Yueming Cai, Dan Wu:
Joint Spectrum and Power Allocation for Green D2D Communication with Physical Layer Security Consideration. 1057-1073 - Hongbin Chen, Qiong Zhang, Feng Zhao:
Energy-Efficient Base Station Sleep Scheduling in Relay-Assisted Cellular Networks. 1074-1086 - Zhe Chen, Bingbing Yang, Fuliang Yin:
An Eye Location based Head Posture Recognition Method and Its Application in Mouse Operation. 1087-1104 - Filip Cvitic, Mario-Osvin Pavcevic, Jesenka Pibernik:
Two Messages out of One 2D Matrix Bar Code. 1105-1120 - Chunyu Lin, Yao Zhao, Jimin Xiao, Tammam Tillo:
Depth Map Coding Using Histogram-Based Segmentation and Depth Range Updating. 1121-1139 - Huiwen Zhang, Huihui Bai, Meiqin Liu, Yao Zhao:
Optimized Multiple Description Lattice Vector Quantization Coding for 3D Depth Image. 1140-1154 - Yongfeng Ren, Jingbo Zhou, Zhijian Wang, Yunyang Yan:
An Improved Saliency Detection for Different Light Conditions. 1155-1172 - Hansung Lee, Daesung Moon, Ikkyun Kim, Hoseok Jung, Daihee Park:
Anomaly Intrusion Detection Based on Hyper-ellipsoid in the Kernel Feature Space. 1173-1192 - Guangjun Liu:
Practical Schemes for Tunable Secure Network Coding. 1193-1209 - Taenam Cho, Seung-Hyun Seo:
A Strengthened Android Signature Management Method. 1210-1230 - Kuo-Jui Wei, Jung-San Lee, Shin-Jen Chen:
Enhancing the Security of Credit Card Transaction based on Visual DSC. 1231-1245 - Hu Xiong, Shikun Wu, Ji Geng, Emmanuel Ahene, Songyang Wu, Zhiguang Qin:
A Pairing-free Key-insulated Certificate-based Signature Scheme with Provable Security. 1246-1259 - Yukyong Kim, Jong-Seok Choi, Yongtae Shin:
Trustworthy Service Discovery for Dynamic Web Service Composition. 1260-1281
Volume 9, Number 4, April 2015
- Pham Phuoc Hung, Mohammad Aazam, Eui-Nam Huh:
CTaG: An Innovative Approach for Optimizing Recovery Time in Cloud Environment. 1282-1301 - Dinesh Komarasamy, Muthuswamy Vijayalakshmi:
Deadline Constrained Adaptive Multilevel Scheduling System in Cloud Environment. 1302-1320 - Jingyu Feng, Guangyue Lu, Hong Chang:
Behave Well: How to Win a Pop Vacant Band via Cooperative Spectrum Sensing. 1321-1336 - Joanne Mun-Yee Lim, Yoong Choon Chang, Mohamad Yusoff Alias, Jonathan Loo:
Performance Modelling of Adaptive VANET with Enhanced Priority Scheme. 1337-1358 - Juan Feng, Baowang Lian, Hongwei Zhao:
Adaptive Energy Optimization for Object Tracking in Wireless Sensor Network. 1359-1375 - Haiquan Wang, Weijian Ma, Hengkun Shi, Chunhe Xia:
An Interval Algebra-based Modeling and Routing Method in Bus Delay Tolerant Network. 1376-1391 - Dongyan Zhao, Keping Long, Dongxue Wang, Yichuan Zheng, Jiajing Tu:
Energy-saving Strategy Based on an Immunization Algorithm for Network Traffic. 1392-1403 - Hongwei Li, Dongxiao Liu, Khalid Nawaf Alharbi, Shenmin Zhang, Xiaodong Lin:
Enabling Fine-grained Access Control with Efficient Attribute Revocation and Policy Updating in Smart Grid. 1404-1423 - Xiong Li, Qi Lv, Wenting Huang:
Learning Similarity with Probabilistic Latent Semantic Analysis for Image Retrieval. 1424-1440 - Feng-Ping An, Xian-Wei Zhou, Da-chao Lin:
Multiscale Self-coordination of Bidimensional Empirical Mode Decomposition in Image Fusion. 1441-1456 - Cheng-You Wang, Rongyang Shan, Xiao Zhou:
APBT-JPEG Image Coding Based on GPU. 1457-1470 - Ahmad Karim, Syed Adeel Ali Shah, Rosli Bin Salleh, Muhammad Arif, Rafidah Md Noor, Shahaboddin Shamshirband:
Mobile Botnet Attacks - an Emerging Threat: Classification, Review and Open Issues. 1471-1492 - Muhammad Daniel Hafiz Abdullah, Zurina Mohd Hanapi, Zuriati Ahmad Zukarnain, Mohamad Afendee Mohamed:
Attacks, Vulnerabilities and Security Requirements in Smart Metering Networks. 1493-1515 - Bao-Hong Li, Yin-Liang Zhao, Hongping Zhao:
Attribute Set Based Signature Secure in the Standard Model. 1516-1528 - Farruh Ishmanov, Sung Won Kim:
A Novel Trust Establishment Method for Wireless Sensor Networks. 1529-1547
Volume 9, Number 5, May 2015
- Gongchao Su, Bin Chen, Xiaohui Lin, Hui Wang, Lemin Li:
QoS Constrained Optimization of Cell Association and Resource Allocation for Load Balancing in Downlink Heterogeneous Cellular Networks. 1569-1586 - Xing Liu, Chaowei Yuan, Enda Peng, Zhen Yang:
Combined Service Subscription and Delivery Energy-Efficient Scheduling in Mobile Cloud Computing. 1587-1605 - Wan Tang, Bo Yi, Ximin Yang, Jingcong Li:
Dynamic Home Circuit Construction for Datacenter Networks Using LOBS-HC Ring. 1606-1623 - Qiang Wang, Yuquan Shu, Minhua Dong, Ji Xu, Xiaofeng Tao:
Degrees of Freedom of 3-user MIMO Interference Channels with Instantaneous Relay Using Interference Alignment. 1624-1641 - Saleem Iqbal, Abdul Hanan Abdullah, Khalid Hussain, Faraz Ahsan:
Channel Allocation in Multi-radio Multi-channel Wireless Mesh Networks: A Categorized Survey. 1642-1661 - Nik Mohammad Balouchzahi, Mahmood Fathy, Ahmad Akbari:
A Graph-based Model for RSUs Deployment in Vehicular Networks by Considering Urban and Network Limitations and QoS Requirements of Service Advertisement and Discovery. 1662-1681 - Lei Wang, Yueming Cai, Weiwei Yang, Wei Yan, Jialei Song:
Effect of Outdated Channel Estimates on Multiple Antennas Multiple Relaying Networks. 1682-1701 - Joon Yeon Choeh, Hong Joo Lee, Sung Joo Park:
A Personalized Approach for Recommending Useful Product Reviews Based on Information Gain. 1702-1716 - Xuejun Zhang, Xiaolin Gui, Feng Tian:
A Framework for Measuring Query Privacy in Location-based Service. 1717-1732 - Xiaoli Zhang, Yongnu Jin, Kyung Sup Kwak:
Adaptive GTS Allocation Scheme with Applications for Real-time Wireless Body Area Sensor Networks. 1733-1751 - Sungwook Kim:
QoS Sensitive VANET Control Scheme based on Feedback Game Model. 1752-1767 - Zhilu Wu, Lihui Jiang, Guanghui Ren, Gangyi Wang, Nan Zhao, Yaqin Zhao:
A Rapid Convergent Max-SINR Algorithm for Interference Alignment Based on Principle Direction Search. 1768-1789 - Yanjun Li, Jianji Shao:
Optimized Resource Allocation for Utility-Based Routing in Ad Hoc and Sensor Networks. 1790-1806 - Chuan-Ming Liu, Cheng-Hsien Chen, Yen-Lin Chen, Jenq-Haur Wang:
AA Mobile P2P Semantic Information Retrieval System with Effective Updates. 1807-1824 - Yuchen Li, Yitong Liu, Hongwen Yang, Dacheng Yang:
Fast Quadtree Structure Decision for HEVC Intra Coding Using Histogram Statistics. 1825-1839 - Shuanglu Dai, Shu Zhan, Ning Song:
Adaptive Active Contour Model: a Localized Mutual Information Approach for Medical Image Segmentation. 1840-1855 - Adnan Farooq, Ahmad Jalal, Shaharyar Kamal:
Dense RGB-D Map-Based Human Tracking and Activity Recognition using Skin Joints Features and Self-Organizing Map. 1856-1869 - Kang-Woo Lee, Hyunseung Choo:
Constructing Impressions with Multimedia Ringtones and a Smartphone Usage Tracker. 1870-1880 - Yun Mo, Zhongzhao Zhang, Yang Lu, Gul Agha:
A Novel Technique for Human Traffic based Radio Map Updating in Wi-Fi Indoor Positioning Systems. 1881-1903 - Weifeng Wu, Fagen Li:
An Efficient Identity-Based Deniable Authenticated Encryption Scheme. 1904-1919 - Fangfang Dai, Kangfeng Zheng, Bin Wu, Shoushan Luo:
Using Genetic Algorithm for Optimal Security Hardening in Risk Flow Attack Graph. 1920-1937 - Khan Muhammad, Jamil Ahmad, Haleem Farman, Zahoor Jan, Muhammad Sajjad, Sung Wook Baik:
A Secure Method for Color Image Steganography using Gray-Level Modification and Multi-level Encryption. 1938-1962 - M. I. Thariq Hussan, B. Kalaavathi:
An Optimized User Behavior Prediction Model Using Genetic Algorithm on Mobile Web Structure. 1963-1978
Volume 9, Number 6, June 2015
- Xiaomeng Chai, Xu Xu, Zhongshan Zhang:
A Survey of Self-optimization Approaches for HetNets. 1979-1995 - Jinxin Niu, Wei Guo:
Resource Allocation for Cooperative Relay based Wireless D2D Networks with Selfish Users. 1996-2013 - Qin Niu, Zhimin Zeng, Tiankui Zhang, Zhirui Hu:
Interference Alignment Based Transceiver Design in OSG mode of HetNets. 2014-2034 - R. Arokia Paul Rajan, F. Sagayaraj Francis:
RAS: Request Assignment Simulator for Cloud-Based Applications. 2035-2049 - Rajkumar Rajavel, Mala Thangarathinam:
A Negotiation Framework for the Cloud Management System using Similarity and Gale Shapely Stable Matching Approach. 2050-2077 - C. Gopala Krishnan, A. Rengarajan, R. Manikandan:
Delay Reduction by Providing Location Based Services using Hybrid Cache in Peer to Peer Networks. 2078-2094 - Yuan Lin, Bowen Li, Hao Yin, Yuanzhi He:
Throughput-efficient Online Relay Selection for Dual-hop Cooperative Networks. 2095-2110 - Hua Dai, Geng Yang, Haiping Huang, Fu Xiao:
Efficient Verifiable Top-k Queries in Two-tiered Wireless Sensor Networks. 2111-2131 - Junhui Zhao, Hao Zhang, Rong Ran:
Distance Geometry-based Wireless Location Algorithms in Cellular Networks with NLOS Errors. 2132-2143 - Seohyang Kim, Hayoung Oh, Chongkwon Kim:
Energy Cognitive Dynamic Adaptive Streaming over HTTP. 2144-2159