


default search action
KSII Transactions on Internet and Information Systems, Volume 9
Volume 9, Number 1, January 2015
- Wenrong Gong, Xiaoxiang Wang:

Joint User Association and Resource Allocation of Device-to-Device Communication in Small Cell Networks. 1-19 - Jaewoo So:

Entropy-based Spectrum Sensing for Cognitive Radio Networks in the Presence of an Unauthorized Signal. 20-33 - Hiran Kumar Singh, Dhananjay Kumar

, Srilakshmi R.:
Short Term Spectrum Trading in Future LTE Based Cognitive Radio Systems. 34-49 - Hyochun Ahn, Jaebeom Kim, Young-Bae Ko:

CLSR: Cognitive Link State Routing for CR-based Tactical Ad Hoc Networks. 50-67 - Su Pan, Weiwei Zhou, Qingqing Gu, Qiang Ye:

Network Selection Algorithm Based on Spectral Bandwidth Mapping and an Economic Model in WLAN & LTE heterogeneous networks. 68-86 - Riming Wang, Jiuchao Feng:

Grid-based Correlation Localization Method in Mixed Line-of-Sight/Non-Line-of-Sight Environments. 87-107 - Inho Hwang, Jeong Woo Lee:

Half-Duplex Relaying Strategy Suitable for a Relay with Mobility. 108-125 - Xiaoshuang Liu, Guixia Kang, Ningbo Zhang:

Percolation Theory-Based Exposure-Path Prevention for 3D-Wireless Sensor Networks Coverage. 126-148 - Qun Lei, Yueyun Chen:

Resource Allocation based on Hybrid Sharing Mode for Heterogeneous Services of Cognitive Radio OFDM Systems. 149-168 - Ponnai Manogaran Ashok Kumar

, Vaidehi V.
:
Anomalous Event Detection in Traffic Video Based on Sequential Temporal Patterns of Spatial Interval Events. 169-189 - Weixing Wang, Sheng Liu:

Online Burning Material Pile Detection on Color Clustering and Quaternion based Edge Detection in Boiler. 190-207 - Weisheng Li, Lidou Wang:

Near-infrared Face Recognition by Fusion of E-GV-LBP and FKNN. 208-223 - Shiping Zhu, Zheng Li:

Local Stereo Matching Using Combined Matching Cost and Adaptive Cost Aggregation. 224-241 - Shiping Zhu, Dongyu Zhao:

Fractal Depth Map Sequence Coding Algorithm with Motion-vector-field-based Motion Estimation. 242-259 - Songqing Wang, Xiaoming Xu, Weiwei Yang:

Physical Layer Security in Underlay CCRNs with Fixed Transmit Power. 260-279 - Wentan Yi, Shaozhen Chen, Kuanyang Wei:

Zero-Correlation Linear Cryptanalysis of Reduced Round ARIA with Partial-sum and FFT. 280-295 - Yanting Ren, Liji Wu, An Wang:

Double Sieve Collision Attack Based on Bitwise Detection. 296-308 - In Kuk Song, Junchul Chun:

Evolving Internet Information & Technology as Enablers for Creating Shared Values. 309-317 - Woo-Sik Lee, Byoung-Dai Lee, Namgi Kim:

An Accelerometer-Assisted Power Management for Wearable Sensor Systems. 318-330 - Gyanendra Prasad Joshi

, Sung Won Kim, Chang-Su Kim, Seung Yeob Nam
:
A Distributed Medium Access Control Protocol for Cognitive Radio Ad Hoc Networks. 331-343 - Murad Khan, Gisu Park, Wooseong Cho, Gihyuk Seong, Kijun Han:

A Handover Management Scheme Based on User-Preferences and Network-Centric Approach. 344-357 - Dung Phan, In Seop Na

, Soo-Hyung Kim, Gueesang Lee, Hyung Jeong Yang:
Triangulation Based Skeletonization and Trajectory Recovery for Handwritten Character Patterns. 358-377 - Yong-Suk Park, Se-Ho Park, Tae Gon Kim, Jong-Moon Chung:

Implementation of Gesture Interface for Projected Surfaces. 378-390 - Yoosin Kim, Seung Ryul Jeong:

Opinion-Mining Methodology for Social Media Analytics. 391-406 - Sungho Shin, Hanmin Jung, Mun Yong Yi:

Building a Business Knowledge Base by a Supervised Learning and Rule-Based Method. 407-420 - Jong-Hwan Kong, Myung-Mook Han:

Malware Containment Using Weight based on Incremental PageRank in Dynamic Social Networks. 421-433 - Mina Lee, Inhye Choi, Seungchan Yang:

When Do People Post a Comment to a News Story on the Internet? 434-445 - Syed Mubarak Ali, Imran Ghani, Muhammad Shafie Abdul Latif

:
Interaction-based Collaborative Recommendation: A Personalized Learning Environment (PLE) Perspective. 446-465 - Jong Sung Hwang, Sung Hyun Kim, Ho Lee:

Breaking the Myths of the IT Productivity Paradox. 466-482
Volume 9, Number 2, February 2015
- Yang Yang, Ziyang Liu, Boao Min, Tao Peng, Wenbo Wang:

Optimal User Density and Power Allocation for Device-to-Device Communication Underlaying Cellular Networks. 486-503 - Ahmad M. Khasawneh

, Muhammad Shafie Abdul Latif
, Hassan Chizari, Moeenuddin Tariq
, Abdullah Bamatraf:
Pressure Based Routing Protocol for Underwater Wireless Sensor Network: A Survey. 504-527 - Zhe Zhang, Jing Yang, Jiankang Zhang, Xiaomin Mu:

Pilot Symbol Assisted Weighted Data Fusion Scheme for Uplink Base-Station Cooperation System. 528-544 - Guanyao Du, Ke Xiong, Yu Zhang, Zhengding Qiu:

Outage Analysis and Optimization for Time Switching-based Two-Way Relaying with Energy Harvesting Relay Node. 545-563 - Fei Li, Jiulong Wu, Wenxue Ge, Wei Ji:

Quantum Bacterial Foraging Optimization for Cognitive Radio Spectrum Allocation. 564-582 - Yi Liu, Wenbo Mei, Huiqian Du:

Group-Sparse Channel Estimation using Bayesian Matching Pursuit for OFDM Systems. 583-599 - Jibum Kim

, Inbin Kim, Namgu Kwon, Heemin Park, Jinseok Chae:
A Hybrid Algorithm for Online Location Update using Feature Point Detection for Portable Devices. 600-619 - Liang Ming, Gang Zhao, Dongxia Wang, Minhuan Huang, Xiang Li, Qing Miao, Fei Xu:

A Novel Method for Survivability Test Based on End Nodes in Large Scale Network. 620-636 - Myungseok Song, Jun-Dong Cho

, Jongpil Jeong
:
Global Mobility Management Scheme for Seamless Mobile Multicasting Service Support in PMIPv6 Networks. 637-658 - Ponnai Manogaran Ashok Kumar, Vaidehi V.:

An Anomalous Behavior Detection Method Using System Call Sequences for Distributed Application. 659-679 - M. Buvana

, M. Suganthi:
An Efficient Cluster Based Service Discovery Model for Mobile Ad hoc Network. 680-699 - Hu Shen, Shaohe Lv, Xiaodong Wang, Xingming Zhou:

Energy-efficient Routing in MIMO-based Mobile Ad hoc Networks with Multiplexing and Diversity Gains. 700-713 - Fang Li, Min Xie:

Exact Decoding Probability of Random Linear Network Coding for Tree Networks. 714-727 - Cheong Ghil Kim, Yong Soo Choi:

Improved Disparity Map Computation on Stereoscopic Streaming Video with Multi-core Parallel Implementation. 728-741 - Ju-Chin Chen, Pei-Hsun Wu, Jenn-Jier James Lien:

Discriminant Metric Learning Approach for Face Verification. 742-762 - Wenkai Xu

, Eung-Joo Lee:
A Novel Method for Hand Posture Recognition Based on Depth Information DescriptorT. 763-774 - Yanna Zhao, Lei Wang, Xu Zhao, Yuncai Liu:

Multiple-Shot Person Re-identification by Features Learned from Third-party Image Sets. 775-792 - Wei Li, Wenwen Zhang, Dawu Gu, Zhi Tao, Zhihong Zhou, Ya Liu, Zhiqiang Liu:

Security Analysis of the Lightweight Cryptosystem TWINE in the Internet of Things. 793-810 - Hongfeng Zhu:

A Provable One-way Authentication Key Agreement Scheme with User Anonymity for Multi-server Environment. 811-829 - Mahir Kutay

, Tuncay Ercan
:
Formal Trust Assessment with Confidence Probability. 830-842
Volume 9, Number 3, March 2015
- K. Saravanan

, Rajaram M.:
An Exploratory Study of Cloud Service Level Agreements - State of the Art Review. 843-871 - Zhigang Li, Yan Shi, Shanzhi Chen, Jingwen Zhao:

Cellular Traffic Offloading through Opportunistic Communications Based on Human Mobility. 872-885 - Kan Zheng

, Yue Li, Yingkai Zhang, Zheng Jiang, Hang Long:
Performance Analysis and Evaluation of Deployment in Small Cell Networks. 886-900 - P. Shunmuga Perumal

, V. Rhymend Uthariaraj, V. R. Elgin Christo:
WSN Lifetime Analysis: Intelligent UAV and Arc Selection Algorithm for Energy Conservation in Isolated Wireless Sensor Networks. 901-920 - Han Han, Yuhua Xu, Qinfei Huang:

On-demand Allocation of Multiple Mutual-compensating Resources in Wireless Downlinks: a Multi-server Case. 921-940 - Houde Quan, Chuanbao Du, Peizhang Cui:

A Novel Hitting Frequency Point Collision Avoidance Method for Wireless Dual-Channel Networks. 941-955 - Yong Wang, Hao Wu, Liyang Tang, Hui Li:

The Solution for Cooperative Beamforming Design in MIMO Multi-way Relay Networks. 956-970 - Dandan Wang, Yang Yang, Zhenqiang Mi:

QoS-Based and Network-Aware Web Service Composition across Cloud Datacenters. 971-989 - Wei Lu, Yuwang Yang, Wei Zhao, Lei Wang:

Practical Node Deployment Scheme Based on Virtual Force for Wireless Sensor Networks in Complex Environment. 990-1013 - Shigeng Zhang, Shuping Yan, Weitao Hu, Jianxin Wang, Kehua Guo:

A Component-Based Localization Algorithm for Sparse Sensor Networks Combining Angle and Distance Information. 1014-1034 - Chourouk Hammami, Imen Jemili

, Achraf Gazdar, Abdelfettah Belghith
, Mohamed Mosbah
:
HLPSP: A Hybrid Live P2P Streaming Protocol. 1035-1056 - Hualiang Chen, Yueming Cai, Dan Wu:

Joint Spectrum and Power Allocation for Green D2D Communication with Physical Layer Security Consideration. 1057-1073 - Hongbin Chen, Qiong Zhang, Feng Zhao:

Energy-Efficient Base Station Sleep Scheduling in Relay-Assisted Cellular Networks. 1074-1086 - Zhe Chen, Bingbing Yang, Fuliang Yin:

An Eye Location based Head Posture Recognition Method and Its Application in Mouse Operation. 1087-1104 - Filip Cvitic, Mario-Osvin Pavcevic

, Jesenka Pibernik:
Two Messages out of One 2D Matrix Bar Code. 1105-1120 - Chunyu Lin

, Yao Zhao, Jimin Xiao, Tammam Tillo:
Depth Map Coding Using Histogram-Based Segmentation and Depth Range Updating. 1121-1139 - Huiwen Zhang, Huihui Bai, Meiqin Liu, Yao Zhao:

Optimized Multiple Description Lattice Vector Quantization Coding for 3D Depth Image. 1140-1154 - Yongfeng Ren, Jingbo Zhou, Zhijian Wang, Yunyang Yan:

An Improved Saliency Detection for Different Light Conditions. 1155-1172 - Hansung Lee

, Daesung Moon, Ikkyun Kim, Hoseok Jung, Daihee Park:
Anomaly Intrusion Detection Based on Hyper-ellipsoid in the Kernel Feature Space. 1173-1192 - Guangjun Liu

:
Practical Schemes for Tunable Secure Network Coding. 1193-1209 - Taenam Cho, Seung-Hyun Seo

:
A Strengthened Android Signature Management Method. 1210-1230 - Kuo-Jui Wei, Jung-San Lee, Shin-Jen Chen:

Enhancing the Security of Credit Card Transaction based on Visual DSC. 1231-1245 - Hu Xiong, Shikun Wu, Ji Geng, Emmanuel Ahene

, Songyang Wu
, Zhiguang Qin:
A Pairing-free Key-insulated Certificate-based Signature Scheme with Provable Security. 1246-1259 - Yukyong Kim

, Jong-Seok Choi, Yongtae Shin:
Trustworthy Service Discovery for Dynamic Web Service Composition. 1260-1281
Volume 9, Number 4, April 2015
- Pham Phuoc Hung, Mohammad Aazam

, Eui-Nam Huh:
CTaG: An Innovative Approach for Optimizing Recovery Time in Cloud Environment. 1282-1301 - Dinesh Komarasamy

, Muthuswamy Vijayalakshmi
:
Deadline Constrained Adaptive Multilevel Scheduling System in Cloud Environment. 1302-1320 - Jingyu Feng, Guangyue Lu, Hong Chang:

Behave Well: How to Win a Pop Vacant Band via Cooperative Spectrum Sensing. 1321-1336 - Joanne Mun-Yee Lim, Yoong Choon Chang

, Mohamad Yusoff Alias
, Jonathan Loo
:
Performance Modelling of Adaptive VANET with Enhanced Priority Scheme. 1337-1358 - Juan Feng, Baowang Lian, Hongwei Zhao:

Adaptive Energy Optimization for Object Tracking in Wireless Sensor Network. 1359-1375 - Haiquan Wang, Weijian Ma, Hengkun Shi, Chunhe Xia:

An Interval Algebra-based Modeling and Routing Method in Bus Delay Tolerant Network. 1376-1391 - Dongyan Zhao, Keping Long, Dongxue Wang, Yichuan Zheng, Jiajing Tu:

Energy-saving Strategy Based on an Immunization Algorithm for Network Traffic. 1392-1403 - Hongwei Li, Dongxiao Liu, Khalid Nawaf Alharbi, Shenmin Zhang, Xiaodong Lin:

Enabling Fine-grained Access Control with Efficient Attribute Revocation and Policy Updating in Smart Grid. 1404-1423 - Xiong Li, Qi Lv, Wenting Huang:

Learning Similarity with Probabilistic Latent Semantic Analysis for Image Retrieval. 1424-1440 - Feng-Ping An

, Xian-Wei Zhou, Da-chao Lin:
Multiscale Self-coordination of Bidimensional Empirical Mode Decomposition in Image Fusion. 1441-1456 - Cheng-You Wang

, Rongyang Shan
, Xiao Zhou
:
APBT-JPEG Image Coding Based on GPU. 1457-1470 - Ahmad Karim, Syed Adeel Ali Shah, Rosli Bin Salleh

, Muhammad Arif, Rafidah Md Noor
, Shahaboddin Shamshirband:
Mobile Botnet Attacks - an Emerging Threat: Classification, Review and Open Issues. 1471-1492 - Muhammad Daniel Hafiz Abdullah, Zurina Mohd Hanapi

, Zuriati Ahmad Zukarnain
, Mohamad Afendee Mohamed:
Attacks, Vulnerabilities and Security Requirements in Smart Metering Networks. 1493-1515 - Bao-Hong Li, Yin-Liang Zhao, Hongping Zhao:

Attribute Set Based Signature Secure in the Standard Model. 1516-1528 - Farruh Ishmanov, Sung Won Kim:

A Novel Trust Establishment Method for Wireless Sensor Networks. 1529-1547
Volume 9, Number 5, May 2015
- Gongchao Su

, Bin Chen, Xiaohui Lin, Hui Wang, Lemin Li:
QoS Constrained Optimization of Cell Association and Resource Allocation for Load Balancing in Downlink Heterogeneous Cellular Networks. 1569-1586 - Xing Liu, Chaowei Yuan, Enda Peng, Zhen Yang:

Combined Service Subscription and Delivery Energy-Efficient Scheduling in Mobile Cloud Computing. 1587-1605 - Wan Tang, Bo Yi, Ximin Yang, Jingcong Li:

Dynamic Home Circuit Construction for Datacenter Networks Using LOBS-HC Ring. 1606-1623 - Qiang Wang, Yuquan Shu, Minhua Dong, Ji Xu, Xiaofeng Tao:

Degrees of Freedom of 3-user MIMO Interference Channels with Instantaneous Relay Using Interference Alignment. 1624-1641 - Saleem Iqbal

, Abdul Hanan Abdullah, Khalid Hussain
, Faraz Ahsan:
Channel Allocation in Multi-radio Multi-channel Wireless Mesh Networks: A Categorized Survey. 1642-1661 - Nik Mohammad Balouchzahi

, Mahmood Fathy
, Ahmad Akbari
:
A Graph-based Model for RSUs Deployment in Vehicular Networks by Considering Urban and Network Limitations and QoS Requirements of Service Advertisement and Discovery. 1662-1681 - Lei Wang, Yueming Cai, Weiwei Yang, Wei Yan, Jialei Song:

Effect of Outdated Channel Estimates on Multiple Antennas Multiple Relaying Networks. 1682-1701 - Joon Yeon Choeh

, Hong Joo Lee
, Sung Joo Park:
A Personalized Approach for Recommending Useful Product Reviews Based on Information Gain. 1702-1716 - Xuejun Zhang, Xiaolin Gui, Feng Tian:

A Framework for Measuring Query Privacy in Location-based Service. 1717-1732 - Xiaoli Zhang, Yongnu Jin, Kyung Sup Kwak:

Adaptive GTS Allocation Scheme with Applications for Real-time Wireless Body Area Sensor Networks. 1733-1751 - Sungwook Kim:

QoS Sensitive VANET Control Scheme based on Feedback Game Model. 1752-1767 - Zhilu Wu, Lihui Jiang, Guanghui Ren, Gangyi Wang, Nan Zhao, Yaqin Zhao

:
A Rapid Convergent Max-SINR Algorithm for Interference Alignment Based on Principle Direction Search. 1768-1789 - Yanjun Li, Jianji Shao:

Optimized Resource Allocation for Utility-Based Routing in Ad Hoc and Sensor Networks. 1790-1806 - Chuan-Ming Liu, Cheng-Hsien Chen, Yen-Lin Chen

, Jenq-Haur Wang:
AA Mobile P2P Semantic Information Retrieval System with Effective Updates. 1807-1824 - Yuchen Li, Yitong Liu, Hongwen Yang, Dacheng Yang:

Fast Quadtree Structure Decision for HEVC Intra Coding Using Histogram Statistics. 1825-1839 - Shuanglu Dai, Shu Zhan, Ning Song:

Adaptive Active Contour Model: a Localized Mutual Information Approach for Medical Image Segmentation. 1840-1855 - Adnan Farooq, Ahmad Jalal, Shaharyar Kamal

:
Dense RGB-D Map-Based Human Tracking and Activity Recognition using Skin Joints Features and Self-Organizing Map. 1856-1869 - Kang-Woo Lee, Hyunseung Choo:

Constructing Impressions with Multimedia Ringtones and a Smartphone Usage Tracker. 1870-1880 - Yun Mo, Zhongzhao Zhang, Yang Lu, Gul Agha

:
A Novel Technique for Human Traffic based Radio Map Updating in Wi-Fi Indoor Positioning Systems. 1881-1903 - Weifeng Wu, Fagen Li

:
An Efficient Identity-Based Deniable Authenticated Encryption Scheme. 1904-1919 - Fangfang Dai, Kangfeng Zheng, Bin Wu, Shoushan Luo:

Using Genetic Algorithm for Optimal Security Hardening in Risk Flow Attack Graph. 1920-1937 - Khan Muhammad

, Jamil Ahmad
, Haleem Farman
, Zahoor Jan, Muhammad Sajjad, Sung Wook Baik
:
A Secure Method for Color Image Steganography using Gray-Level Modification and Multi-level Encryption. 1938-1962 - M. I. Thariq Hussan

, B. Kalaavathi:
An Optimized User Behavior Prediction Model Using Genetic Algorithm on Mobile Web Structure. 1963-1978
Volume 9, Number 6, June 2015
- Xiaomeng Chai, Xu Xu, Zhongshan Zhang:

A Survey of Self-optimization Approaches for HetNets. 1979-1995 - Jinxin Niu, Wei Guo:

Resource Allocation for Cooperative Relay based Wireless D2D Networks with Selfish Users. 1996-2013 - Qin Niu, Zhimin Zeng, Tiankui Zhang, Zhirui Hu:

Interference Alignment Based Transceiver Design in OSG mode of HetNets. 2014-2034 - R. Arokia Paul Rajan

, F. Sagayaraj Francis:
RAS: Request Assignment Simulator for Cloud-Based Applications. 2035-2049 - Rajkumar Rajavel

, Mala Thangarathinam
:
A Negotiation Framework for the Cloud Management System using Similarity and Gale Shapely Stable Matching Approach. 2050-2077 - C. Gopala Krishnan

, A. Rengarajan
, R. Manikandan:
Delay Reduction by Providing Location Based Services using Hybrid Cache in Peer to Peer Networks. 2078-2094 - Yuan Lin, Bowen Li, Hao Yin, Yuanzhi He:

Throughput-efficient Online Relay Selection for Dual-hop Cooperative Networks. 2095-2110 - Hua Dai, Geng Yang, Haiping Huang, Fu Xiao:

Efficient Verifiable Top-k Queries in Two-tiered Wireless Sensor Networks. 2111-2131 - Junhui Zhao, Hao Zhang, Rong Ran:

Distance Geometry-based Wireless Location Algorithms in Cellular Networks with NLOS Errors. 2132-2143 - Seohyang Kim, Hayoung Oh

, Chongkwon Kim:
Energy Cognitive Dynamic Adaptive Streaming over HTTP. 2144-2159 - Qing Yang, Jiancheng Li, Hongyi Wang, Xianghua Zeng, Liming Zheng:

A Slot Allocated Blocking Anti-Collision Algorithm for RFID Tag Identification. 2160-2179 - Ling Fu Xie, Peter Han Joo Chong

:
Performance Improvement of Delay-Tolerant Networks with Mobility Control under Group Mobility. 2180-2200 - Pooria Varahram

, Borhanuddin Mohd Ali, Somayeh Mohammady, Ahmed Wasif Reza
:
Prototype of a Peak to Average Power Ratio Reduction Scheme in Orthogonal Frequency Division Multiplexing Systems. 2201-2216 - Yuting Su, Xiaorong Zhu, Weizhi Nie

:
Multiple Person Tracking based on Spatial-temporal Information by Global Graph Clustering. 2217-2229 - Muhammad Umer Kakli

, Hassaan Saadat Qureshi, Muhammad Murtaza Khan
, Rehan Hafiz
, Yongju Cho, Unsang Park:
Quality Assessment of Images Projected Using Multiple Projectors. 2230-2250 - Chun-Heng Ho

, Kai-Chun Hou:
Exploring the Attractive Factors of App Icons. 2251-2270 - Jinfu Wu, Baolong Guo, Yunyi Yan

, Jie Hou, Dan Zhao:
A Fast TU Size Decision Method for HEVC RQT Coding. 2271-2288 - Changkyoung Eem, Iksu Kim, Yeongseok Jung, Hyunki Hong:

Estimating Illumination Distribution to Generate Realistic Shadows in Augmented Reality. 2289-2301 - T. Sivakumar, R. Venkatesan:

A Novel Image Encryption Using Calligraphy Based Scan Method and Random Number. 2317-2337
Volume 9, Number 7, July 2015
- Ding Xu

, Qun Li:
Minimum BER Power Allocation for OFDM-based Cognitive Radio Networks. 2338-2353 - Yuanlong Cao

, Qinghua Liu, Yi Zuo, Minghe Huang:
Receiver-driven Cooperation-based Concurrent Multipath Transfer over Heterogeneous Wireless Networks. 2354-2370 - Fangqing Tan, Hui Gao, Xin Su, Tiejun Lv:

Sum-Rate Analysis for 3D MIMO with ZF Receivers in Ricean/Lognormal Fading Channels. 2371-2388 - Yaseein Soubhi Hussein

, Borhanuddin Mohd Ali, Mohd Fadlee A. Rasid, Aduwati Sali
:
Handover in LTE Networks with Proactive Multiple Preparation Approach and Adaptive Parameters Using Fuzzy Logic Control. 2389-2413 - Xiaofeng Li, Liangfeng Chen, Jianping Wang, Zhong Chu, Qiyue Li

, Wei Sun:
Fuzzy System and Improved APIT (FIAPIT) Combined Range-free Localization Method for WSN. 2414-2434 - Zahoor Uddin, Ayaz Ahmad

, Muhammad Iqbal, Nadir Shah:
Independent Component Analysis Based MIMO Transceiver With Improved Performance In Time Varying Wireless Channels. 2435-2453 - Haitao Xu, Zhen He, Xianwei Zhou:

Load Balancing Algorithm of Ultra-Dense Networks: a Stochastic Differential Game based Scheme. 2454-2467 - Roliana Ibrahim, Shahid Kamal

, Imran Ghani, Seung Ryul Jeong:
A Hybrid Query Disambiguation Adaptive Approach for Web Information Retrieval. 2468-2487 - Muruganantham Arunraja, Veluchamy Malathi:

Collective Prediction Exploiting Spatio Temporal Correlation (CoPeST) for Energy Efficient Wireless Sensor networks. 2488-2511 - Xue Zhang, Guangsong Li, Wenbao Han, Huifang Ji:

A Novel ID-based Multi-domain Handover Protocol for Mesh Points in WMNs. 2512-2529 - Yousef Ali Al-Gumaei

, Kamarul Ariffin Noordin
, Ahmed Wasif Reza
, Kaharudin Dimyati:
A Game Theory Approach for Efficient Power Control and Interference Management in Two-tier Femtocell Networks based on Local Aain. 2530-2547 - Qin Luo, Junfeng Wang, Xiaoqing Wang, Ke Wu:

Aero-Sim: An NS-2 Based Simulator for Aeronautical Ad Hoc Networks. 2548-2567 - Jiang-Zhong Cao, Pei Chen, Bingo Wing-Kuen Ling, Zhijing Yang, Qingyun Dai:

Spectral Clustering with Sparse Graph Construction Based on Markov Random Walk. 2568-2584 - Wenkai Xu, Ick-Soo Lee, Suk-Kwan Lee, Bo Lu

, Eung-Joo Lee:
MultiView-Based Hand Posture Recognition Method Based on Point Cloud. 2585-2598 - Yanping Ma, Hailin Zou, Hongtao Xie, Qingtang Su:

Fast Search with Data-Oriented Multi-Index Hashing for Multimedia Data. 2599-2613 - Chanfei Wang, Hui Gao, Tiejun Lv:

Soft-Input Soft-Output Multiple Symbol Detection for Ultra-Wideband Systems. 2614-2632 - Yongwei Zhao, Tianqiang Peng, Bicheng Li, Shengcai Ke:

Bag of Visual Words Method based on PLSA and Chi-Square Model for Object Category. 2633-2648 - Zhiping Peng, Bo Xu

, Antonio Marcel Gates, Delong Cui
, Weiwei Lin:
The Deasibility and Properties of Dividing Virtual Machine Resources using the Virtual Machine Cluster as the Unit in Cloud Computing. 2649-2666 - Wenkai Xu

, Suk-Hwan Lee, Eung-Joo Lee:
A Robust Method for Partially Occluded Face Recognition. 2667-2682 - K. Anitha, A. Chilambuchelvan:

NPFAM: Non-Proliferation Fuzzy ARTMAP for Image Classification in Content Based Image Retrieval. 2683-2702 - Yang Lu:

Efficient Certificate-Based Proxy Re-encryption Scheme for Data Sharing in Public Clouds. 2703-2718 - Haoxing Li, Fenghua Li, Chenggen Song, Yalong Yan:

Towards Smart Card Based Mutual Authentication Schemes in Cloud Computing. 2719-2735 - Xi Xiao, Zhenlong Wang, Qi Li

, Qing Li
, Yong Jiang:
ANNs on Co-occurrence Matrices for Mobile Malware Detection. 2736-2754
Volume 9, Number 8, August 2015
- Jaewoo So:

Cooperative Spectrum Sensing for Cognitive Radio Networks with Limited Reporting. 2755-2773 - Hangguan Shan, Ziyun Ye, Yuanguo Bi, Aiping Huang:

Genetic Algorithm based Resource Management for Cognitive Mesh Networks with Real-time and Non-real-time Services. 2774-2796 - Guomei Zhang, Bing Wang, Guobing Li

, Fei Xiang, Gangming Lv:
Interference Management by Vertical Beam Control Combined with Coordinated Pilot Assignment and Power Allocation in 3D Massive MIMO Systems. 2797-2820 - Omprakash Kaiwartya

, Shiv Prakash, Abdul Hanan Abdullah, Ahmed Nazar Hassan:
Minimizing Energy Consumption in Scheduling of Dependent Tasks using Genetic Algorithm in Computational Grid. 2821-2839 - Hossein Ghasvari

, Mohammad Ali Raayatpanah
:
Robust Capacity Planning in Network Coding under Demand Uncertainty. 2840-2853 - Qingfeng Zhang, Sheng Wang, Dan Liao:

A Game Theoretic Analysis of Public Goods Allocation in P2P Networks. 2854-2874 - Cunbo Lu, Song Xiao, Yinbin Miao:

OQMCAR: An Enhanced Network Coding-aware Routing Algorithm Based on Queue State and Local Topology. 2875-2893 - Taehong Kim

:
Learning Based Relay Selection for Reliable Content Distribution in Smart Class Application. 2894-2909 - Hang Sub Kim, Bong Gyou Lee:

An Empirical Analysis of Smart Signage and Its Market Delimitation. 2910-2927 - Zuoyong Li, Kezong Tang, Yong Cheng

, Xiaobo Chen
, Chongbo Zhou:
Modified Adaptive Gaussian Filter for Removal of Salt and Pepper Noise. 2928-2947 - Jinpyung Kim, Gyujin Jang, Gyujin Kim, Moonhyun Kim:

Crowd Activity Recognition using Optical Flow Orientation Distribution. 2948-2963 - Shubair Abdulla

, Altyeb Altaher Altyeb
:
Intelligent Approach for Android Malware Detection. 2964-2983 - Andrew Rudder, The Duc Kieu:

A Lossless Data Hiding Scheme for VQ Indexes Based on Joint Neighboring Coding. 2984-3004 - Kan Chen, Peidong Zhu, Liang Chen, Yueshan Xiong:

Modeling and Evaluating Information Diffusion for Spam Detection in Micro-blogging Networks. 3005-3027 - In Kuk Song, Mingoo Kang:

Internet Information Orientation: The Link to National Competitiveness on Internet. 3028-3039 - Bit-Na Kwon, Eui-Hak Lee, Dae-Ki Hong, Sung-Jin Kang, Min-goo Kang, Hyoung-Kyu Song:

Downlink Signal Measurement Algorithm for WCDMA/HSPA/HSPA+. 3040-3053 - Jun-Ki Hong, Han-Shin Jo, Cheol Mun, Jong-Gwan Yook:

Maximum Ratio Transmission for Space-Polarization Division Multiple Access in Dual-Polarized MIMO System. 3054-3067 - Chang-Bin Ha, Byung-Jun Jang, Hyoung-Kyu Song:

Adaptive Power Control Using Large Scale Antenna of the Massive MIMO System in the Mobile Communication. 3068-3078 - Hyun-Sik Kim, Jong-Su Seo, Jeong-Wook Seo

:
Performance Evaluation of a Smart CoAP Gateway for Remote Home Safety Services. 3079-3089 - Jong-Moon Chung, Yong-Suk Park, Jong-Hong Park, Hyoung Jun Cho:

Adaptive Cloud Offloading of Augmented Reality Applications on Smart Devices for Minimum Energy Consumption. 3090-3102 - Youn-Sung Lee, Jeong-Wook Seo

, Jungwook Wee, Mingoo Kang, Dong Ku Kim:
Single-Phase Energy Metering Chip with Built-in Calibration Function. 3103-3120 - Yejin Sohn, Minju Cho, Minjae Seo, Jongho Paik:

A Synchronization Scheme for Hierarchical Video Streams over Heterogeneous Network. 3121-3135 - Wonggi Kim, Junchul Chun:

An Improved Approach for 3D Hand Pose Estimation Based on a Single Depth Image and Haar Random Fores. 3136-3150 - Yongwha Chung, Dongwhee Choi, Heesu Choi, Daihee Park, Hong-Hee Chang, Suk Kim:

Automated Detection of Cattle Mounting using Side-View Camera. 3151-3168 - Yoosin Kim, Do Young Kwon, Seung Ryul Jeong:

Comparing Machine Learning Classifiers for Movie WOM Opinion Mining. 3169-3181 - Myoungjin Kim, Yun Cui, Hanku Lee:

An Efficient Design and Implementation of an MdbULPS in a Cloud-Computing Environment. 3182-3202 - Yen-Wen Chen, Meng-Hsien Lin, Min-Yan Wu:

Study of Data Placement Schemes for SNS Services in Cloud Environment. 3203-3215 - Min-Joon Kim, Hyun Ahn

, Minjae Park:
A GraphML-based Visualization Framework for Workflow-Performers' Closeness Centrality Measurements. 3216-3230 - Imran Ghani, Mannir Bello:

Agile Adoption in IT Organizations. 3231-3248 - Jeong Ho Kwak, Jemin Justin Lee, Han-Joo Lee, Bong Gyou Lee:

Estimation of the Demand Function of the Information and Communication Construction Business. 3249-3257 - Hannah Kang, Saraphine Shiping Pang, Sejung Marina Choi

:
Investigating the use of multiple social networking services: A cross-cultural perspective in the United States and Korea. 3258-3275
Volume 9, Number 9, September 2015
- Hongyi Zhao, Yang Cao, Yingzhuang Liu:

Interference Cancellation for Relay-Assisted D2D Communication. 3276-3292 - Li Liu, Miao Zhang:

Multi-objective Optimization Model with AHP Decision-making for Cloud Service Composition. 3293-3311 - Wenhao Jiang, Wenjiang Feng, Yang Yu:

Spectrum Allocation based on Auction in Overlay Cognitive Radio Network. 3312-3334 - Le The Dung

, Beongku An:
Connectivity Analysis of Cognitive Radio Ad-hoc Networks with Shadow Fading. 3335-3356 - Kang-Wook Kim:

An Efficient Implementation of Key Frame Extraction and Sharing in Android for Wireless Video Sensor Network. 3357-3376 - Wang-Cheol Song, Shafqat Ur Rehman, Muhammad Bilal Awan:

Road Aware Information Sharing in VANETs. 3377-3395 - Murat Karakaya:

MSCT: An Efficient Data Collection Heuristic for Wireless Sensor Networks with Limited Sensor Memory Capacity. 3396-3411 - Umer Javed, Di He, Peilin Liu:

Exact Performance Analysis of AF Based Hybrid Satellite-Terrestrial Relay Network with Co-Channel Interference. 3412-3431 - Qihui Wu, Liang Yue, Long Wang, Guoru Ding

:
Non-cooperative Interference Radio Localization with Binary Proximity Sensors. 3432-3448 - Sang-Chul Kim:

Performance Comparison of MISP-based MANET Strong DAD Protocol. 3449-3467 - Hong Tang, Hui-Zhu Wang:

A Multi-Chain Based Hierarchical Topology Control Algorithm for Wireless Sensor Networks. 3468-3495 - A. Karmel, C. Jayakumar

:
Recurrent Ant Colony Optimization for Optimal Path Convergence in Mobile Ad Hoc Networks. 3496-3514 - Usman Barakkath Nisha

, N. Uma Maheswari, R. Venkatesh, Rabi Yasir Abdullah:
Improving Data Accuracy Using Proactive Correlated Fuzzy System in Wireless Sensor Networks. 3515-3538 - Lingjun Meng, Wentao Zhao, Haohao Zhao, Yang Ding:

A Network Load Sensitive Block Placement Strategy of HDFS. 3539-3558 - Fangqing Wen, Gong Zhang, De Ben:

Adaptive Selective Compressive Sensing based Signal Acquisition Oriented toward Strong Signal Noise Scene. 3559-3571 - Wei Zhang

, Gengxin Zhang, Liang Gou, Bo Kong, Dongming Bian:
A Hierarchical Autonomous System Based Topology Control Algorithm in Space Information Network. 3572-3593 - Meng-Hsien Lin, Yen-Wen Chen:

Performance Analysis of Buffer Aware Scheduling for Video Services in LTE Network. 3594-3610 - Min-Joon Kim, Hyun Ahn

, Minjae Park:
A Theoretical Framework for Closeness Centralization Measurements in a Workflow-Supported Organization. 3611-3634 - Yuheng Li, Qianchuan Zhao

:
Understanding Watching Patterns of Live TV Programs on Mobile Devices: A Content Centric Perspective. 3635-3654 - Junxing Zhang, Chunjuan Bo, Jianbo Tang, Peng Song:

Object Tracking based on Relaxed Inverse Sparse Representation. 3655-3671 - Seungcheol Choi, Oh-Jin Kwon, Dukhyun Jang, Seokrim Choi:

Evaluation of Various Tone Mapping Operators for Backward Compatible JPEG Image Coding. 3672-3684 - Weisheng Li, Lai Peng, Lifang Zhou:

Robust Three-step Facial Landmark Localization under the Complicated Condition via ASM and POEM. 3685-3700 - Yasser M. Alginahi, Mohammed Mudassar

, Muhammad Nomani Kabir
:
An Arabic Script Recognition System. 3701-3720 - Yunbo Rao, Xianshu Ding, Bojiang Fan:

An Efficent Method of Binocular Data Reconstruction. 3721-3737 - Wei Shi, Sanyang Liu, Zhaohui Zhang:

A Lightweight Detection Mechanism against Sybil Attack in Wireless Sensor Network. 3738-3750 - Zhipeng Chen, Yao Zhao, Rongrong Ni:

Detection for Operation Chain: Histogram Equalization and Dither-like Operation. 3751-3770
Volume 9, Number 10, October 2015
- Chunhua Ju, Qi Shao:

lobal Optimization for Energy Efficient Resource Management by Game Based Distributed Learning in Internet of Things. 3771-3788 - Hui Tian, Wei Xie, Youyun Xu, Kui Xu

, Peng Han:
A Flexible Network Access Scheme for M2M Communications in Heterogeneous Wireless Networks. 3789-3809 - Long Zhang

, Wei Huang, Qiwu Wu, Wenjing Cao:
Differential Game Theoretic Approach for Distributed Dynamic Cooperative Power Control in Cognitive Radio Ad Hoc Networks. 3810-3830 - Yahui Hu, Song Ci:

QoE-driven Joint Resource Allocation and User-paring in Virtual MIMO SC-FDMA Systems. 3831-3850 - Sanfeng Zhang, Di Huang, Yin Li

:
Prediction-Based Routing Methods in Opportunistic Networks. 3851-3866 - Zhan Gao, Junhong Chen, Yuhua Xu:

Opportunistic Spectrum Access with Discrete Feedback in Unknown and Dynamic Environment: A Multi-agent Learning Approach. 3867-3886 - Wenjing Yue, Yapeng Ren, Zhen Yang, Zhi Chen, Qingmin Meng:

Joint Opportunistic Spectrum Access and Optimal Power Allocation Strategies for Full Duplex Single Secondary User MIMO Cognitive Radio Network. 3887-3907 - Bin Zhong, Dandan Zhang, Zhongshan Zhang:

Power Allocation for Opportunistic Full-Duplex based Relay Selection in Cooperative Systems. 3908-3920 - Peng Yu

, Lei Feng, Zifan Li, Wenjing Li, Xuesong Qiu:
Low-Complexity Energy Efficient Base Station Cooperation Mechanism in LTE Networks. 3921-3944 - Fengchen Ouyang, Jianhua Ge, Fengkui Gong:

Slotted ALOHA Based Greedy Relay Selection in Large-scale Wireless Networks. 3945-3964 - Kezhong Liu, Tian Yang, Jie Ma, Zhiming Cheng:

Fault-Tolerant Event Detection in Wireless Sensor Networks using Evidence Theory. 3965-3982 - Lingwei Xu

, Hao Zhang, T. Aaron Gulliver:
Performance Analysis of IDF Relaying M2M Cooperative Networks over N-Nakagami Fading Channels. 3983-4001 - Xin Su, Haifeng Yu, KyungHi Chang, Seung-Geun Kim, Yong-Kon Lim:

Case Study for Ship Ad-hoc Networks under a Maritime Channel Model in Coastline Areas. 4002-4014 - Bin Liu, Rongfang Song, Haifeng Hu:

A Receiver-Aided Seamless And Smooth Inter-RAT Handover At Layer-2. 4015-4033 - Shunfu Jin, Xinghua Yao, Zhanyou Ma:

A Novel Spectrum Allocation Strategy with Channel Bonding and Channel Reservation. 4034-4053 - Truong-Xuan Do, Younghan Kim:

Optimal Provider Mobility in Large-Scale Named- Data Networking. 4054-4071 - Tuan Anh Tran

, In Seop Na
, Soo-Hyung Kim:
Separation of Text and Non-text in Document Layout Analysis using a Recursive Filter. 4072-4091 - Xiaoqing Yin, Bin Wang, Weili Li, Yu Liu, Maojun Zhang:

Background Subtraction for Moving Cameras Based on Trajectory-controlled Segmentation and Label Inference. 4092-4107 - Lijun Zhao

, Anhong Wang, Bing Zeng, Jian Jin:
Scalable Coding of Depth Images with Synthesis-Guided Edge Detection. 4108-4125 - Song Dong, Jucheng Yang, Yarui Chen, Chao Wang, Xiaoyuan Zhang, Dong Sun Park

:
Finger Vein Recognition Based on Multi-Orientation Weighted Symmetric Local Graph Structure. 4126-4142 - Jiawen Hu

, Seng-Su Tsang:
Comics with Drama: New Communication in Wedia. 4143-4159 - J. Florence Gnana Poovathy

, Radha Sankararajan:
Non-Iterative Threshold based Recovery Algorithm (NITRA) for Compressively Sensed Images and Videos. 4160-4176 - Sungwook Kim:

Cognitive Radio Anti-Jamming Scheme for Security Provisioning IoT Communications. 4177-4190 - S. Fouzul Hidhaya, Angelina Geetha

, B. Nandha Kumar, Loganathan Venkat Sravanth, A. Habeeb:
Supplementary Event-Listener Injection Attack in Smart Phones. 4191-4203 - K. V. Pradeepthi, Arputharaj Kannan

:
Cloud Attack Detection with Intelligent Rules. 4204-4222 - K. P. Vijayakumar, P. Ganeshkumar, M. Anandaraj

:
A Novel Jamming Detection Technique for Wireless Sensor Networks. 4223-4249 - Zhen Zhao

, Jie Chen, Yueyu Zhang, Lanjun Dang:
An Efficient Revocable Group Signature Scheme in Vehicular Ad Hoc Networks. 4250-4267
Volume 9, Number 11, November 2015
- Lirong Jiang, Gang Feng, Shuang Qin:

Content Distribution for 5G Systems Based on Distributed Cloud Service Network Architecture. 4268-4290 - Youming Sun, Hongxiang Shao, Xin Liu, Jian Zhang, Junfei Qiu, Yuhua Xu:

Traffic Offloading in Two-Tier Multi-Mode Small Cell Networks over Unlicensed Bands: A Hierarchical Learning Framework. 4291-4310 - Haoran Ji, Weidong Bao, Xiaomin Zhu, Wenhua Xiao:

Topology-based Workflow Scheduling in Commercial Clouds. 4311-4330 - Chuadhry Mujeeb Ahmed

, Sung-Guk Yoon:
Dynamic Access and Power Control Scheme for Interference Mitigation in Femtocell Networks. 4331-4346 - Wenhao Fan, Yuan'an Liu, Bihua Tang:

Adaptive Application Component Mapping for Parallel Computation Offloading in Variable Environments. 4347-4366 - Bosung Kim, Kwangsoo Kim

, Byeong-Hee Roh
:
ENC-MAC: Energy-efficient Non-overlapping Channel MAC for Cognitive Radio enabled Sensor Networks. 4367-4386 - Bing Ning, Shouyi Yang, Xiaomin Mu, Yanhui Lu, Wanming Hao:

Energy Efficiency Resource Allocation for MIMO Cognitive Radio with Multiple Antenna Spectrum Sensing. 4387-4404 - Xiaoshuang Liu, Guixia Kang, Ningbo Zhang, Yanyan Guo:

Cooperative and Competitive Effect in Heterogeneous Networks of Healthcare System. 4405-4418 - ManKyu Park, DongBae Kang, Deock-Gil Oh:

Two-Step Scheduling Scheme to Support Fairness and QoS in DVB-S2 System. 4419-4435 - Minglei Shu, Dongfeng Yuan, Changfang Chen, Yinglong Wang, Chongqing Zhang:

Modeling and Performance Analysis of MAC Protocol for WBAN with Finite Buffer. 4436-4452 - Jun Yan, Kegen Yu

:
Base Station Placement for Wireless Sensor Network Positioning System via Lexicographical Stratified Programming. 4453-4468 - Jinhong Fan, Chaowei Yuan:

Outage Performance for DF Two-Way Relaying with Co-Channel Interference over Nakagami-m Fading. 4469-4482 - Xiangwu Gong, Feihong Dong

, Hongjun Li, Wei Shao:
Robust Cooperative Relay Beamforming Design for Security. 4483-4501 - Xinguang Xiang, Fan Liu, Ye Bi, Yanfang Wang, Jinhui Tang

:
Local Similarity based Discriminant Analysis for Face Recognition. 4502-4518 - Dooyeol Yun, Kwangsue Chung:

Rate Adaptation for HTTP Video Streaming to Improve the QoE in Multi-client Environments. 4519-4533 - Mohammad Khairul Islam

, Farah Jahan
, Joong-Hwan Baek:
Object Cataloging Using Heterogeneous Local Features for Image Retrieval. 4534-4555 - Xin-Bin Luo, Shan Fu, Yong Wang:

Chaotic Features for Dynamic Textures Recognition with Group Sparsity Representation. 4556-4572 - Jingchao Li:

A Novel Recognition Algorithm Based on Holder Coefficient Theory and Interval Gray Relation Classifier. 4573-4584 - Waqas ur Rahman

, Kwangsue Chung:
Buffer-Based Adaptive Bitrate Algorithm for Streaming over HTTP. 4585-4603 - Han Pan, Zhongliang Jing, Minzhe Li, Peng Dong

:
Image Deblurring via Adaptive Proximal Conjugate Gradient Method. 4604-4622 - Tran Trung Duy

, Pham Ngoc Son:
Secrecy Performances of Multicast Underlay Cognitive Protocols with Partial Relay Selection and without Eavesdropper's Information. 4623-4643 - Jeevaa Katiravan

, Duraipandian N, Dharini N:
A Two level Detection of Routing Layer Attacks in Hierarchical Wireless Sensor Networks using Learning based Energy Prediction. 4644-4661 - Ho-Jae Lee, Min-Woo Park, Jung-Ho Eom, Tai-Myoung Chung:

New Approach for Detecting Leakage of Internal Information; Using Emotional Recognition Technology. 4662-4679 - Fucai Zhou, Muqing Lin, Yang Zhou, Yuxi Li:

Efficient Anonymous Broadcast Encryption with Adaptive Security. 4680-4700 - Anjali Anand, Rinkle Rani, Himanshu Aggarwal

:
A Security Model based on Reputation and Collaboration through Route-Request in Mobile Ad Hoc Networks. 4701-4719 - Huhnkuk Lim:

Implementation of a Network Provisioning System with User-driven and Trusty Protection Management. 4720-4738
Volume 9, Number 12, December 2015
- Qazi Emad-ul-Haq, Hatim Aboalsamh

, Abdelfettah Belghith
, Muhammad Hussain
, Wadood Abdul
, Mostafa H. Dahshan
, Sanaa Ghouzali:
Challenges and Solutions for Internet of Things Driven by IPv6. 4739-4758 - Frank Elijorde, Jaewan Lee:

CloudSwitch: A State-aware Monitoring Strategy Towards Energy-efficient and Performance-aware Cloud Data Centers. 4759-4775 - Shukun Liu, Weijia Jia

:
An Adaptive Virtual Machine Location Selection Mechanism in Distributed Cloud. 4776-4798 - Yuanhui Zhang, Chunrong Kan, Kun Xu, Yuhua Xu:

Distributed Carrier Aggregation in Small Cell Networks: A Game-theoretic Approach. 4799-4818 - Sok Chhorn, Seok-Ho Yoon, Si-o Seo, Seung-Yeon Kim, Choong-Ho Cho:

Spectrum Reuse Schemes with Power Control for Device-to-Device Communication in LTE-Advanced Cellular Network. 4819-4834 - Zhen Xue, Liang Shen, Guoru Ding

, Qihui Wu:
Geolocation Spectrum Database Assisted Optimal Power Allocation: Device-to-Device Communications in TV White Space. 4835-4855 - Zhenzhen Jiao, Baoxian Zhang, Jun Zheng:

BA Virtual-Queue based Backpressure Scheduling Algorithm for Heterogeneous Multi-Hop Wireless Networks. 4856-4871 - Sana Mazahir

, Shahzad Amin Sheikh:
An Adaptive Companding Scheme for Peak-to-average Power Ratio Reduction in OFDM Systems. 4872-4891 - Haifeng Liu, Zhuo Yang, Jun Zhang, Xiaomei Bai, Wei Wang

, Feng Xia
:
Mining Implicit Correlations between Users with the Same Role for Trust-Aware Recommendation. 4892-4911 - Bohao Feng

, Huachun Zhou, Mingchuan Zhang, Hongke Zhang:
Cache-Filter: A Cache Permission Policy for Information-Centric Networking. 4912-4933 - Jingchao Li:

A New Robust Signal Recognition Approach Based on Holder Cloud Features under Varying SNR Environment. 4934-4949 - Qing Li, Qinghai Yang, Qingsu He

, Kyung Sup Kwak:
Profit-Maximizing Virtual Machine Provisioning Based on Workload Prediction in Computing Cloud. 4950-4966 - Shuangzhi Li, Xiaomin Mu, Xin Guo, Jing Yang, Jiankang Zhang:

Tensor-Based Channel Estimation Approach for One-Way Multi-Hop Relaying Communications. 4967-4986 - Shipra Kumari, Hari Om:

Remote Login Authentication Scheme based on Bilinear Pairing and Fingerprint. 4987-5014 - Wentao Zhu, Jingbo Yang, Tingting Jia, Xu Liu:

Transceiver Optimization for the Multi-Antenna Downlink in MIMO Cognitive System. 5015-5027 - Heba Nashaat

, Rawya Rizk
:
Handover Management Based on Location Based Services in F-HMIPv6 Networks. 5028-5057 - Xiaomei Xing, Yuesheng Zhu, Zhiwei Mo, Ziqiang Sun, Zhen Liu:

A Novel Perceptual Hashing for Color Images Using a Full Quaternion Representation. 5058-5072 - Weixing Wang, Yanjie Liang:

Rock Fracture Centerline Extraction based on Hessian Matrix and Steger Algorithm. 5073-5086 - Bo Wang, Yue Tan, Meijuan Zhao, Yanqing Guo, Xiangwei Kong:

Classifier Combination Based Source Identification for Cell Phone Images. 5087-5102 - Junjie Feng, Gong Zhang:

High Resolution ISAR Imaging Based on Improved Smoothed L0 Norm Recovery Algorithm. 5103-5115 - Jinxia Wei, Ru Zhang

, Jianyi Liu, Xinxin Niu, Yixian Yang:
Defense Strategy of Network Security based on Dynamic Classification. 5116-5134 - Chung-Fu Lu:

Multi-party Password-Authenticated Key Exchange Scheme with Privacy Preservation for Mobile Environment. 5135-5149 - Vahid Heydari

, Seong-Moo Yoo:
Lightweight Acknowledgement-Based Method to Detect Misbehavior in MANETs. 5150-5169 - Zhi-Hui Wang, Kuo-Nan Chen, Chin-Chen Chang, Chuan Qin

:
Sharing a Large Secret Image Using Meaningful Shadows Based on VQ and Inpainting. 5170-5188 - Lijun Yang, Chao Ding, Meng Wu:

RPIDA: Recoverable Privacy-preserving Integrity-assured Data Aggregation Scheme for Wireless Sensor Networks. 5189-5208 - Xiaofeng Song, Fenlin Liu, Chunfang Yang, Xiangyang Luo, Zhenyu Li:

Steganalysis of Adaptive JPEG Steganography by Selecting DCT Coefficients According to Embedding Distortion. 5209-5228

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














