![](https://dblp.dagstuhl.de/img/logo.ua.320x120.png)
![](https://dblp.dagstuhl.de/img/dropdown.dark.16x16.png)
![](https://dblp.dagstuhl.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
![search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
default search action
Mobile Networks and Applications, Volume 25
Volume 25, Number 1, February 2020
- Lei Wang, Jenhui Chen
, Yang Peng, Lei Zhang:
Editorial: Physical Layer Security and Wireless Access Control (QSHINE 2017). 1-3 - Khuong Ho-Van, Thiem Do-Dac:
Security Performance Analysis of Underlay Cognitive Networks with Helpful Jammer Under Interference from Primary Transmitter. 4-15 - Fei Wu
, Chenxing Li
, Jiafan Wang, Xiangyin Zhang:
An Auxiliary Antenna Based Inter-User Interference Mitigation Approach in Full-Duplex Wireless Networks. 16-22 - Van Nhan Vo, Tri Gia Nguyen
, Chakchai So-In
, Hung Tran:
Outage Performance Analysis of Energy Harvesting Wireless Sensor Networks for NOMA Transmissions. 23-41 - Mamoun F. Al-Mistarihi, Islam M. Tanash, Fedaa S. Yaseen, Khalid A. Darabkh
:
Protecting Source Location Privacy in a Clustered Wireless Sensor Networks against Local Eavesdroppers. 42-54 - Anjana P. Das, Sabu M. Thampi
, Jaime Lloret:
Anomaly Detection in UASN Localization Based on Time Series Analysis and Fuzzy Logic. 55-67 - Zhenquan Qin, Yingxiao Sun
, Junyu Hu, Wei Zhou, Jialin Liu:
Enhancing Efficient Link Performance in ZigBee Under Cross-Technology Interference. 68-81 - Bin Feng, Xiangli Li, Yingmo Jie, Cheng Guo
, Huijuan Fu:
A Novel Semi-fragile Digital Watermarking Scheme for Scrambled Image Authentication and Restoration. 82-94 - Yueyan Zhi, Zhangjie Fu, Xingming Sun, Jingnan Yu:
Security and Privacy Issues of UAV: A Survey. 95-101 - Xu Zhang
, Weigang Hou, Lei Guo, Qihan Zhang, Pengxing Guo
, Ruijia Li:
Joint Optimization of Latency Monitoring and Traffic Scheduling in Software Defined Heterogeneous Networks. 102-113 - Haisheng Yu
, Heng Qi, Keqiu Li:
WECAN: an Efficient West-East Control Associated Network for Large-Scale SDN Systems. 114-124 - Zhangjie Fu, Yangen Liu, Xingming Sun, Yuling Liu, Zuwei Tian:
Confusing-Keyword Based Secure Search over Encrypted Cloud Data. 125-132 - Zhentao Hu, Lin Zhou, Bing Jin, Hai-jiang Liu:
Applying Improved Convolutional Neural Network in Image Classification. 133-141 - Qing Hu
, Xiaoyue Jing, Jianlin Huang, Linlin Xu:
Performance Specifications for the Roll-Off Factor and Filter Order for Filtered Multitone Modulation in the Maritime VHF Data Exchange System. 142-150 - Victor Sucasas, Georgios Mantas, Saud Althunibat, José-Fernán Martínez-Ortega:
Editorial: Security and Privacy Protection for Mobile Applications and Platforms. 151-152 - Saqib Rasool
, Muddesar Iqbal
, Tasos Dagiuklas, Zia Ul-Qayyum, Shancang Li:
Reliable Data Analysis through Blockchain based Crowdsourcing in Mobile Ad-hoc Cloud. 153-163 - José Carlos Ribeiro
, Firooz B. Saghezchi
, Georgios Mantas, Jonathan Rodriguez, Simon J. Shepherd, Raed A. Abd-Alhameed:
An Autonomous Host-Based Intrusion Detection System for Android Mobile Devices. 164-172 - Mohanad Al-Hasanat, Saud Althunibat, Khalid A. Darabkh
, Abdullah Al-Hasanat
, Moath Alsafasfeh:
A Physical-Layer Key Distribution Mechanism for IoT Networks. 173-178 - Mohanad Al-Hasanat, Saud Althunibat, Khalid A. Darabkh
, Abdullah Al-Hasanat
, Moath Alsafasfeh:
Correction to: A Physical-Layer Key Distribution Mechanism for IoT Networks. 179 - Anam Mehtab, Waleed Bin Shahid, Tahreem Yaqoob, Muhammad Faisal Amjad, Haider Abbas
, Hammad Afzal, Malik Najmus Saqib:
AdDroid: Rule-Based Machine Learning Framework for Android Malware Analysis. 180-192 - Van Nhan Vo, Tri Gia Nguyen
, Chakchai So-In
, Hung Tran, Surasak Sanguanpong:
Secrecy Performance in the Internet of Things: Optimal Energy Harvesting Time Under Constraints of Sensors and Eavesdroppers. 193-210 - Kantour Nedjmeddine, Bouroubi Sadek:
Cryptanalysis of Merkle-Hellman Cipher Using Parallel Genetic Algorithm. 211-222 - Mohammed Ramadan, Yongjian Liao, Fagen Li, Shijie Zhou, Hisham Abdalla:
IBEET-RSA: Identity-Based Encryption with Equality Test over RSA for Wireless Body Area Networks. 223-233 - Andrea Lanzi:
Editorial: Advanced Techniques for Memory Forensics Analysis. 234-235 - Mauro Andreolini, Vincenzo Giuseppe Colacino, Michele Colajanni
, Mirco Marchetti
:
A Framework for the Evaluation of Trainee Performance in Cyber Range Exercises. 236-247 - Martin Karresand
, Stefan Axelsson, Geir Olav Dyrkolbotn:
Disk Cluster Allocation Behavior in Windows and NTFS. 248-258 - Gengqian Zhou, Jianwei Zhuge, Yunqian Fan, Kun Du, Shuqiang Lu:
A Market in Dream: the Rapid Development of Anonymous Cybercrime. 259-270 - Trung Q. Duong, Chinmoy Kundu, Antonino Masaracchia
, Van-Dinh Nguyen
:
Editorial: Reliable Communication for Emerging Wireless Networks. 271-273 - Huy T. Nguyen
, Homare Murakami, Kien Nguyen
, Kentaro Ishizu, Fumihide Kojima, Jong-Deok Kim, Sang-Hwa Chung, Won-Joo Hwang:
Joint User Association and Power Allocation for Millimeter-Wave Ultra-Dense Networks. 274-284 - Fatma A. Al Emam, Mohamed E. Nasr
, Sherif E. Kishk:
Coordinated Handover Signaling and Cross-Layer Adaptation in Heterogeneous Wireless Networking. 285-299 - Basem M. ElHalawany
, Omnia Hashad, Kaishun Wu
, Adly S. Tag Eldien:
Uplink Resource Allocation for Multi-Cluster Internet-of-Things Deployment Underlaying Cellular Networks. 300-313 - Ning Zhao, Hao Wu
, Xiaonan Zhao:
Consortium Blockchain-Based Secure Software Defined Vehicular Network. 314-327 - Tanmoy Maitra
, Sarbani Roy
:
PBDT: an Energy-Efficient Posture based Data Transmission for Repeated Activities in BAN. 328-340 - Zeeshan Kaleem
, Ajmal Khan
, Syed Ali Hassan
, Nguyen-Son Vo
, Long Dinh Nguyen, Hien M. Nguyen:
Full-Duplex Enabled Time-Efficient Device Discovery for Public Safety Communications. 341-349 - Zhiqun Gu, Jiawei Zhang, Yuefeng Ji
:
Topology Optimizing in FSO-based UAVs Relay Networks for Resilience Enhancement. 350-362 - Ba Cao Nguyen
, Xuan Nam Tran
, Tran Manh Hoang
, Le The Dung
:
Performance Analysis of Full-Duplex Vehicle-to-Vehicle Relay System over Double-Rayleigh Fading Channels. 363-372
Volume 25, Number 2, April 2020
- Honghao Gao, Jianwei Yin, Gongzhu Hu:
Editorial: ACM/Springer Mobile Networks & Applications - Special Issue on Mobile Service Computing and Applications. 373-375 - Xiaoxian Yang, Sijing Zhou
, Min Cao:
An Approach to Alleviate the Sparsity Problem of Hybrid Collaborative Filtering Based Recommendations: The Product-Attribute Perspective from User Reviews. 376-390 - Yuyu Yin
, Lu Chen, Yueshen Xu, Jian Wan, He Zhang, Zhida Mai:
QoS Prediction for Service Recommendation with Deep Feature Learning in Edge Computing Environment. 391-401 - Yu Weng, Chunlei Xia:
A New Deep Learning-Based Handwritten Character Recognition System on Mobile Computing Devices. 402-411 - Dikai Fang
, Huahu Xu, Xiaoxian Yang, Minjie Bian:
An Augmented Reality-Based Method for Remote Collaborative Real-Time Assistance: from a System Perspective. 412-425 - Yishan Chen, Shuiguang Deng
, Hongtao Ma, Jianwei Yin:
Deploying Data-intensive Applications with Multiple Services Components on Edge. 426-441 - Xiaolong Xu
, Xihua Liu, Lianyong Qi, Yuhao Chen, Zihao Ding, Jiangang Shi:
Energy-Efficient Virtual Machine Scheduling across Cloudlets in Wireless Metropolitan Area Networks. 442-456 - Cristian Borcea, Shiwen Mao, Jian Tang:
Editorial: Mobile and Ubiquitous Systems: Computing, Networking and Services. 457-458 - Jing Lian
, Yang Li
, Weixi Gu, Shao-Lun Huang, Lin Zhang
:
Mining Regional Mobility Patterns for Urban Dynamic Analytics. 459-473 - Uday Kamal
, Shamir Ahmed, Tarik Reza Toha
, Nafisa Islam
, A. B. M. Alim Al Islam:
Intelligent Human Counting through Environmental Sensing in Closed Indoor Settings. 474-490 - Wei Gong, Xiaoyao Huang
, Baoxian Zhang
, Yawei Zhao:
Task Allocation in Eco-friendly Mobile Crowdsensing: Problems and Algorithms. 491-504 - Suiming Guo
, Chao Chen, Jingyuan Wang, Yaxiao Liu, Ke Xu, Dah Ming Chiu:
Fine-grained Dynamic Price Prediction in Ride-on-demand Services: Models and Evaluations. 505-520 - Hui Liu, Huan Liu, Xin Wang, Wei Shao
, Xiao Wang, Junzhao Du, Jonathan Liono, Flora D. Salim:
SmartMeeting: An Novel Mobile Voice Meeting Minutes Generation and Analysis System. 521-536 - Long Wang
, Till Riedel
, Markus Scholz, Michael Beigl, Panlong Yang:
Phascope: Fine-Grained, Fast, Flexible Motion Profiling based on Phase Offset in Acoustic OFDM Signal. 537-550 - V. Bindhu, Joy Iong-Zong Chen, Subarna Shakya, Z. Faizal Khan:
Editorial: Mobile Edge Computing and Personal Networks. 551-552 - Subbarayan Anitha
, Theagarajan Padma
:
Adaptive Proximate Computing Framework for Mobile Resource Augmentation. 553-564 - Murugan Krishnamoorthy, Varalakshmi Perumal:
Fixing Target Access Point with low load during Handoff in WLAN. 565-575 - K. Sindhanaiselvan, J. Mannar Mannan, S. K. Aruna:
Designing a Dynamic Topology (DHT) for Cluster Head Selection in Mobile Adhoc Network. 576-584 - R. Logesh Babu, P. Balasubramanie
:
Fuzzy Rule Selection Using Hybrid Artificial Bee Colony with 2-Opt Algorithm for MANET. 585-595 - (Withdrawn) Multi Information Amount Movement Aware- Routing in FANET: Flying Ad-hoc Networks. 596-608
- J. Raja
, Balamurugan N, R. Pitchai:
Annealed Glowworm Optimization Graph Theory - Virtual Network Mapping for Home Healthcare in Cloud. 609-619 - Qing Yang, Tigang Jiang, Wenjia Li, Guangchi Liu, Danda B. Rawat
, Jun Wu:
Editorial: Multimedia and Social Data Processing in Vehicular Networks. 620-622 - Hongluan Zhao, Guoyong Han, Xiaofei Niu:
The Signal Control Optimization of Road Intersections with Slow Traffic Based on Improved PSO. 623-631 - Weina Zhang, Ruijuan Zheng
, Mingchuan Zhang, Junlong Zhu, Qingtao Wu:
ECRA: An Encounter-aware and Clustering-based Routing Algorithm for Information-centric VANETs. 632-642 - Lingwei Xu, Xu Yu, Han Wang
, Xinli Dong, Yun Liu, Wenzhong Lin, Xinjie Wang, Jingjing Wang:
Physical Layer Security Performance of Mobile Vehicular Networks. 643-649 - Meiling Li, Jin Ran, Xiaofei Niu, Baiying Shi:
Estimating the Floor Area Ratio of the Vehicular Infrastructure Network Based on Road Grid Cell. 650-659 - Peng Yang, Lingli Deng, Jing Yang, Junjie Yan:
SASMF: Socially Aware Security Message Forwarding Mechanism in VANETs. 660-671 - Honghao Gao, Yuyu Yin
:
Editorial: ACM/Springer Mobile Networks & Applications - Special Issue on Mobile Computing and Software Engineering. 672-673 - Zhengzhe Xiang, Shuiguang Deng
, Javid Taheri, Albert Y. Zomaya
:
Dynamical Service Deployment and Replacement in Resource-Constrained Edges. 674-689 - Yi Pan, Shu Wang, Lei Wu
, Yunni Xia, Wanbo Zheng, Shanchen Pang, Ziyang Zeng, Peng Chen
, Yawen Li:
A Novel Approach to Scheduling Workflows Upon Cloud Resources with Fluctuating Performance. 690-700 - Bin Cao, Jiawei Wu, Longchun Cao, Yueshen Xu, Jing Fan:
Long-Term and Multi-Step Ahead Call Traffic Forecasting with Temporal Features Mining. 701-712 - Xiaolong Xu
, Xihua Liu, Zhanyang Xu, Chuanjian Wang, Shaohua Wan
, Xiaoxian Yang:
Joint Optimization of Resource Utilization and Load Balance with Privacy Preservation for Edge Services in 5G Networks. 713-724 - Shuo Wang, Qianmu Li
, Jun Hou, Shunmei Meng, Bo Zhang, Cangqi Zhou:
Active Defense by Mimic Association Transmission in Edge Computing. 725-742 - Shaohua Wan
, Lianyong Qi, Xiaolong Xu
, Chao Tong, Zonghua Gu
:
Deep Learning Models for Real-time Human Activity Recognition with Smartphones. 743-755 - Jun Zheng, Wei Xiang
, Pascal Lorenz
, Shiwen Mao:
MONET Special Issue on Towards Future Ad Hoc Networks: Technologies and Applications (I). 756-759 - Yao Zhang, Changle Li, Tom H. Luan
, Yuchuan Fu, Hui Wang:
Prediction Based Vehicular Caching: Where and What to Cache? 760-771 - Wei Gong, Baoxian Zhang
, Cheng Li, Zheng Yao:
Task Allocation in Semi-Opportunistic Mobile Crowdsensing: Paradigm and Algorithms. 772-782 - Feng Yan
, Wenyu Ma, Fei Shen, Weiwei Xia, Lianfeng Shen:
Connectivity Based k-Coverage Hole Detection in Wireless Sensor Networks. 783-793 - Sara Kassan, Jaafar Gaber
, Pascal Lorenz
:
Autonomous Energy Management System Achieving Piezoelectric Energy Harvesting in Wireless Sensors. 794-805 - Deyue Zou, Shuyi Chen
, Shuai Han
, Weixiao Meng, Di An, Jinqiang Li, Wanlong Zhao:
Design of a Practical WSN Based Fingerprint Localization System. 806-818 - Xuyu Wang
, Zhitao Yu, Shiwen Mao
:
Indoor Localization Using Smartphone Magnetic and Light Sensors: a Deep LSTM Approach. 819-832
Volume 25, Number 3, June 2020
- Dagmar Cagánová
, Natália Hornáková
, Jana Stofková
:
Editorial: Smart Solutions with Focus on Innovations from Various Perspectives. 833-835 - Jozef Ristvej
, Maros Lacinák
, Roman Ondrejka
:
On Smart City and Safe City Concepts. 836-845 - Predrag K. Nikolic
, Hua Yang:
Designing Playful Cities: Audio-Visual Metaphors for New Urban Environment Experience. 846-852 - Zdenko Stacho
, Katarína Stachová
, Dagmar Cagánová
:
Participation of all Employee Categories in Innovation Processes in Slovak Organisations. 853-859 - Ondrej Krocil
, Richard Pospísil:
The Influence of GDPR on Activities of Social Enterprises. 860-867 - Mária Holiencinová, Zdenka Kádeková
, Tomás Holota
, Ludmila Nagyová:
Smart Solution of Traffic Congestion through Bike Sharing System in a Small City. 868-875 - Gabriela Pavlendová
, Jana Sujanová
, Dagmar Cagánová
, Renata Nováková
:
Smart Cities Concept for Historical Buildings. 876-881 - Maryam Shafiq, Humaira Ashraf, Ata Ullah
, Shireen Tahira:
Systematic Literature Review on Energy Efficient Routing Schemes in WSN - A Survey. 882-895 - Peter Pistek
, Martin Hudec:
Using SMS for Communication with IoT Devices. 896-903 - Jozef Jandacka
, Michal Holubcik
:
Emissions Production from Small Heat Sources Depending on Various Aspects. 904-912 - Ruhiyati Idayu Abu Talib, Predrag K. Nikolic
, Mohd Shahrizal Sunar
, Rui Prada:
In-Visible Island: Inclusive Storytelling Platform for Visually Impaired Children. 913-924 - Vladimír Svac, Dagmar Cagánová
:
Managerial Skills for Innovation Support. 925-931 - Arpita Ray, Chandreyee Chowdhury, Sakil Mallick, Sukanta Mondal, Soumik Paul, Sarbani Roy:
Designing Energy Efficient Strategies Using Markov Decision Process for Crowd-Sensing Applications. 932-942 - Marco Furini
, Silvia Mirri
, Kevin Bouchard, Armir Bujari
:
Editorial: Smart Objects and Technologies. 943-944 - Catia Prandi
, Lorenzo Monti
, Chiara Ceccarini
, Paola Salomoni:
Smart Campus: Fostering the Community Awareness Through an Intelligent Environment. 945-952 - Charles Cousyn
, Kévin Bouchard, Sébastien Gaboury, Bruno Bouchard
:
Towards Using Scientific Publications to Automatically Extract Information on Rare Diseases. 953-960 - Angelica Moreno Cardenas, Miguel Kiyoshy Nakamura Pinto, Ermanno Pietrosemoli
, Marco Zennaro, Marco Rainone, Pietro Manzoni
:
A Low-Cost and Low-Power Messaging System Based on the LoRa Wireless Technology. 961-968 - Marco Furini
, Giovanna Galli, Maria Cristiana Martini:
An Online Education System to Produce and Distribute Video Lectures. 969-976 - Giovanni Delnevo
, Marco Roccetti
, Silvia Mirri
:
Intelligent and Good Machines? The Role of Domain and Context Codification. 977-985 - Ombretta Gaggi, Agnieszka Kolasinska
, Claudio E. Palazzi
, Giacomo Quadrio
:
Safety First? Users' Perception of Wearable Sensor Networks for Aging. 986-994 - Huimin Lu
, Yujie Li:
Editorial: Cognitive Science and Artificial Intelligence for Human Cognition and Communication. 995-996 - Yin Zhang
, Haoyu Wen, Sheng Zhou, Zie Wang, Ranran Wang, Jianmin Lu:
EEDVMI: Energy-Efficient Dynamic Virtual Machines Integration. 997-1007 - Huimin Lu
, Tomoki Uemura, Dong Wang, Jihua Zhu, Zi Huang
, Hyoungseop Kim:
Deep-Sea Organisms Tracking Using Dehazing and Deep Learning. 1008-1015 - Yixue Hao
, Yinging Jiang, M. Shamim Hossain, Mohammed F. Alhamid, Syed Umar Amin
:
Learning for Smart Edge: Cognitive Learning-Based Computation Offloading. 1016-1022 - Huimin Lu
, Mei Wang, Arun Kumar Sangaiah
:
Human Emotion Recognition Using an EEG Cloud Computing Platform. 1023-1032 - Zheng Fu, Chi-Man Pun
, Hao Gao, Huimin Lu
:
Endmember Extraction of Hyperspectral Remote Sensing Images Based on an Improved Discrete Artificial Bee Colony Algorithm and Genetic Algorithm. 1033-1041 - Kouki Tsuji, Huimin Lu
, Joo Kooi Tan, Hyoungseop Kim, Kazue Yoneda
, Fumihiro Tanaka:
Detection of Circulating Tumor Cells in Fluorescence Microscopy Images Based on ANN Classifier. 1042-1051 - Armir Bujari, Catia Prandi
, Pietro Manzoni:
Editorial: Smart Objects and Technologies. 1052-1054 - Marco Furini
, Silvia Mirri
, Manuela Montangero, Catia Prandi
:
Privacy Perception when Using Smartphone Applications. 1055-1061 - Barbara Guidi
, Kristina Kapanova
, Kevin Koidl
, Andrea Michienzi
, Laura Ricci:
The Contextual Ego Network P2P Overlay for the Next Generation Social Networks. 1062-1074 - Marco Roccetti
, Giovanni Delnevo
, Luca Casini, Paola Salomoni:
A Cautionary Tale for Machine Learning Design: why we Still Need Human-Assisted Big Data Analysis. 1075-1083 - Subhadeep Patra
, David Van Hamme
, Peter Veelaert, Carlos T. Calafate, Juan-Carlos Cano, Pietro Manzoni, Willian Zamora
:
Detecting Vehicles' Relative Position on Two-Lane Highways Through a Smartphone-Based Video Overtaking Aid Application. 1084-1094 - Safa Hamdoun
, Abderrezak Rachedi, Yacine Ghamri-Doudane:
Graph-Based Radio Resource Sharing Schemes for MTC in D2D-based 5G Networks. 1095-1113 - Armir Bujari, Ombretta Gaggi, Michele Luglio, Claudio E. Palazzi
, Giacomo Quadrio, Cesare Roseti, Francesco Zampognaro
:
Addressing the Bandwidth Demand of Immersive Applications Through NFV in a 5G Network. 1114-1121 - Phan Cong Vinh:
Context-Aware Computing and Nature-Inspired Computing. 1122-1124 - Jiaqi Yin, Huibiao Zhu, Phan Cong Vinh
:
Formalization and Analysis of Haystack Architecture from Process Algebra Perspective. 1125-1139 - Hiep Xuan Huynh
, Huy Quang Dang, Huong Hoang Luong
, Linh My Thi Ong, Nghia Duong-Trung
, Toan Phung Huynh, Van-Huy Pham
, Bernard Pottier:
BPH Sensor Network Optimization Based on Cellular Automata and Honeycomb Structure. 1140-1150 - Iqbal H. Sarker
, Alan Colman
, Jun Han, Asif Irshad Khan
, Yoosef B. Abushark, Khaled Salah:
BehavDT: A Behavioral Decision Tree Learning to Build User-Centric Context-Aware Predictive Model. 1151-1161 - Yuan Fei, Huibiao Zhu, Phan Cong Vinh
:
Security Analysis of the Access Control Solution of NDN Using BAN Logic. 1162-1173 - Phuong Luu Vo, Tuan-Anh Le
, Nguyen Hoang Tran
:
An Upward Max-Min Fairness Multipath Flow Control. 1174-1177 - Duc-Minh Ngo, Cuong Pham-Quoc
, Tran Ngoc Thinh:
Heterogeneous Hardware-based Network Intrusion Detection System with Multiple Approaches for SDN. 1178-1192
Volume 25, Number 4, August 2020
- Xiaoxian Yang, Ying Li:
Editorial: Urban Computing in Mobile Environment. 1193-1194 - Rui Li, Zhiping Jiang, Yueshen Xu, Honghao Gao, Fushan Chen, Junzhao Du:
Device-Free Indoor Multi-target Tracking in Mobile Environment. 1195-1207 - Buqing Cao, Junjie Chen, Jianxun Liu, Yiping Wen:
A topic attention mechanism and factorization machines based mobile application recommendation method. 1208-1219 - Xin Chen, Chao Tang, Zhuo Li, Lianyong Qi, Ying Chen, Shuang Chen:
A Pricing Approach Toward Incentive Mechanisms for Participant Mobile Crowdsensing in Edge Computing. 1220-1232 - Honghao Gao, Li Kuang, Yuyu Yin
, Bin Guo, Kai Dou:
Mining consuming Behaviors with Temporal Evolution for Personalized Recommendation in Mobile Marketing Apps. 1233-1248 - Asif Iqbal Middya
, Sarbani Roy, Joy Dutta
, Rituparna Das:
JUSense: A Unified Framework for Participatory-based Urban Sensing System. 1249-1274 - Yuji Yoshimura
, Shan He, Gary Hack, Takehiko Nagakura, Carlo Ratti:
Quantifying Memories: Mapping Urban Perception. 1275-1286 - H. Abdul Shabeer, Palaniappan Palani Ramaswamy, Hameed Abdul Zubar, R. S. D. Wahida Banu:
Editorial: Green Cloud Computing and Communication. 1287-1289 - Juan Antonio García-Fernández, Antonio Jurado-Navas
, Mariano Fernández-Navarro, Carlos Úbeda:
A Comparative Study between Iterative Algorithms for TDOA Based Geolocation Techniques in Real UMTS Networks. 1290-1298 - Muhammad Atif Shahzad
, Waqar Ahmad Gulzar:
Industrie 4.0 Readiness: Green Computing in Relation with Key Performance Indicator for a Manufacturing Industry. 1299-1306 - Abdul Hameed Zubar, Ramasamy Balamurugan:
Green Computing Process and its Optimization Using Machine Learning Algorithm in Healthcare Sector. 1307-1318 - Manoj Kumar
, Mohammed Alshehri
, Rayed AlGhamdi
, Purushottam Sharma
, Vikas Deep:
A DE-ANN Inspired Skin Cancer Detection Approach Using Fuzzy C-Means Clustering. 1319-1329 - Azath Mubarakali
:
Healthcare Services Monitoring in Cloud Using Secure and Robust Healthcare-Based BLOCKCHAIN(SRHB)Approach. 1330-1337 - Omer Elsier Tayfour, Muhammad Nadzir Marsono:
Collaborative Detection and Mitigation of Distributed Denial-of-Service Attacks on Software-Defined Network. 1338-1347 - Xinheng Wang, Muddesar Iqbal
, Honghao Gao, Kaizhu Huang
, Andrei Tchernykh
:
Editorial: Collaborative Computing for Data-Driven Systems. 1348-1350 - Zhenyu Zhu
, Liusheng Huang, Hongli Xu:
Collaborative Thompson Sampling. 1351-1363 - Tao Qin
, Zhaoli Liu, Shancang Li, Xiaohong Guan:
A Two-Stagse Approach for Social Identity Linkage Based on an Enhanced Weighted Graph Model. 1364-1375 - Liangfu Lu, Wenbo Wang, Zhiyuan Tan
:
Double-Arc Parallel Coordinates and its Axes re-Ordering Methods. 1376-1391 - Guiling Wang
, Jinlong Meng, Zhuoran Li, Marc Hesenius
, Weilong Ding
, Yanbo Han, Volker Gruhn:
Adaptive Extraction and Refinement of Marine Lanes from Crowdsourced Trajectory Data. 1392-1404 - Li Kuang, Chunbo Hua, Jiagui Wu, Yuyu Yin
, Honghao Gao:
Traffic Volume Prediction Based on Multi-Sources GPS Trajectory Data by Temporal Convolutional Network. 1405-1417 - Walayat Hussain
, Osama Sohaib
, Mohsen Naderpour
, Honghao Gao
:
Cloud Marginal Resource Allocation: A Decision Support Model. 1418-1433 - Huimin Lu, Yujie Li:
Cognitive Computing for Intelligence Systems. 1434-1435 - Joze Guna
, Gregor Gersak, Iztok Humar, Maja Krebl, Marko Orel
, Huimin Lu, Matevz Pogacnik
:
Virtual Reality Sickness and Challenges Behind Different Technology and Content Settings. 1436-1445 - Li Zhu, Long Jin, Jihua Zhu
, Zhongyu Li, Zhiqiang Tian, Huimin Lu:
Blind Image Deblurring Based on Local Rank. 1446-1456 - Yi Jiang, Jinjin Wang, Jieke Shi
, Junwu Zhu
, Ling Teng:
Network-aware Virtual Machine Migration Based on Gene Aggregation Genetic Algorithm. 1457-1468 - Manshu Shi
, Huan Wang:
Infrared Dim and Small Target Detection Based on Denoising Autoencoder Network. 1469-1483 - Ruijun Liu, Yuqian Shi, Yi Bu, Yang Xu, Huimin Lu, Xiangshang Wang, Weihua Lu, Changjiang Ji:
Humanized Computing for Mass Customization Application in Curriculum Management. 1484-1495 - Fenglei Xu, Huan Wang, Bingwen Hu, Mingwu Ren
:
Road Boundaries Detection based on Modified Occupancy Grid Map Using Millimeter-wave Radar. 1496-1503 - Predrag K. Nikolic, Hua Yang:
Artificial Intelligence Clone Generated Content toward Robot Creativity and Machine Mindfulness. 1504-1513 - Shuai Liu
, Huiyu Zhou, Xiaochun Cheng
:
Recent Advancement in Hybrid Big Data Processing. 1514-1517 - Qiao Tian, Jingmei Li, Di Xue, Weifei Wu, Jiaxiang Wang, Lei Chen, Juzhen Wang:
A Hybrid Task Scheduling Algorithm Based on Task Clustering. 1518-1527 - Xuefei Ma, Bo Wang, Lei Li, Tingting Wang, Pengpeng Hu, Yun Lin
:
A Communication Method between High-speed UUV and Distributed Intelligent Nodes. 1528-1536 - Shuai Liu
, Weiling Bai, Gautam Srivastava, J. A. Tenreiro Machado
:
Property of Self-Similarity Between Baseband and Modulated Signals. 1537-1547 - Xiaoyan Wang, Zhenquan Xu, Ziwei Cai, Tao Wang:
Novel Temporal Perturbation-Based Privacy-Preserving Mechanism for Smart Meters. 1548-1562 - Yihan Xiao, Wenjian Liu, Lipeng Gao:
Radar Signal Recognition Based on Transfer Learning and Feature Fusion. 1563-1571 - Xinchun Zhou, Weina Fu
:
A Multi-Agent Simulation Method of Urban Land Layout Structure Based on FPGA. 1572-1581 - Chang Liu
, Alexander Panchenko, Bondarenko Igor Nikolaevich, Ibraimov Ilver:
Analysis of the Mathematical Model of Open Coaxial Measuring Microwave Converters. 1582-1586 - Ruiya He, Kai Tao:
The Application Study of Subgraph Isomorphism in the SDMA. 1587-1593 - Jian-Wen Gong, Xiao-Feng Wang, Ri-Jie Yang:
Cooperative Tracking Technology of Single Target Multi-Sensor Based on Cooperative Index. 1594-1603 - Hong Tian, Weiguo Zhu, Sharon Wang:
Adaptive electronic differential control of vehicle by torque balance. 1604-1610 - Muhammad Sajjad, Sana Zahir, Amin Ullah
, Zahid Akhtar
, Khan Muhammad
:
Human Behavior Understanding in Big Multimedia Data Using CNN based Facial Expression Recognition. 1611-1621 - Xiaojun Hao, Zhaoyue Zhang, Xiang Chen:
Research on Parameters Estimation of Signals Based on Fractal-Box Dimension. 1622-1627
Volume 25, Number 5, October 2020
- Shuai Han, Jalel Ben-Othman, Shiwen Mao, Ruoyu Su:
Editorial: Intelligent and Holistic Solutions for Next Generation Wireless Networks. 1629-1631 - Fei Ding
, Yan Lu, Zhiwen Pan, Dengyin Zhang, Hongbo Zhu:
Performance Analysis of an Energy-Efficient Clustering Algorithm for Coordination Networks. 1632-1643 - Peng Yu
, Xiao Yang, Fanqin Zhou, Hao Li, Lei Feng, Wenjing Li, Xuesong Qiu:
Deep Reinforcement Learning Aided Cell Outage Compensation Framework in 5G Cloud Radio Access Networks. 1644-1654 - Liang Ye
, Jifu Shi, Hany Ferdinando, Tapio Seppänen, Esko Alasaarela:
A Multi-sensor School Violence Detecting Method Based on Improved Relief-F and D-S Algorithms. 1655-1662 - Xianguo Li, Xuelong Ding, Kunlai Li, Jianxiong Li
, Weiguang Shi:
Relaying Energy Allocation Scheme Based on Multi-User SWIPT Relaying System. 1663-1672 - Kun Hao
, Kaicheng Yu, Zijun Gong
, Xiujuan Du, Yonglei Liu, Lu Zhao:
An Enhanced AUV- Aided TDoA Localization Algorithm for Underwater Acoustic Sensor Networks. 1673-1682 - Deyue Zou
, Jie Liu, Xinyi Cheng, Jing Zhang, Yunfeng Liu, Shouchuan Ma:
Pseudo-Noise Code Shifting Signal for AI Arranged UAV Networking. 1683-1693 - Shuo Peng, Wei Gong, Baoxian Zhang
, Yongxiang Zhao, Cheng Li
:
AP-Assisted Online Task Assignment Algorithms for Mobile Crowdsensing. 1694-1707 - Tong Liu
, Shuo Shi, Xuemai Gu:
Naive Bayes Classifier Based Driving Habit Prediction Scheme for VANET Stable Clustering. 1708-1714 - Xiaoping Jin, Qing Wu, Qian Li, Wenchao Zhai, Ning Jin:
Design of Power Allocation for APSK Non-Coherent Spatial Modulation System. 1715-1721 - Xiaocheng Feng, Zhangyin Feng, Wanlong Zhao
, Bing Qin, Ting Liu:
Enhanced Neural Machine Translation by Joint Decoding with Word and POS-tagging Sequences. 1722-1728 - Huiyun Xia, Xiaokang Zhou, Cheng Li
:
Security Aware Caching Placement Optimization Strategy in Cooperative Networks. 1729-1735 - Jie Zhang
, Hongzhi Guo
, Jiajia Liu
:
Adaptive Task Offloading in Vehicular Edge Computing Networks: a Reinforcement Learning Based Scheme. 1736-1745 - Bo Li, Yong Li, Song Xiao:
Editorial: Emerging Networking Technology for Internet of Things. 1746-1748 - Ali Mamadou Mamadou
, Joël Toussaint, Gérard Chalhoub
:
Survey on Wireless Networks Coexistence: Resource Sharing in the 5G Era. 1749-1764 - Mao Yang
, Bo Li:
Survey and Perspective on Extremely High Throughput (EHT) WLAN - IEEE 802.11be. 1765-1780 - Xiangwei Lin, Huanqiang Zeng
, Jinhui Hou, Jiuwen Cao, Jianqing Zhu, Jing Chen:
Joint Pyramid Feature Representation Network for Vehicle Re-identification. 1781-1792 - Hongwei Zhao
, Zichun Zhang, Xiaozhu Shi, Haowei Xu:
A High Precision Direction-Finding Method Based on Multi-Baseline for Target Rescue. 1793-1804 - Chun-Cheng Lin, Der-Jiunn Deng
, Sirirat Suwatcharachaitiwong, Yan-Sing Li:
Dynamic Weighted Fog Computing Device Placement Using a Bat-Inspired Algorithm with Dynamic Local Search Selection. 1805-1815 - Gaurav Baranwal
, Ravi Yadav
, Deo Prakash Vidyarthi:
QoE Aware IoT Application Placement in Fog Computing Using Modified-TOPSIS. 1816-1832 - Basem M. ElHalawany
, Kaishun Wu
, Ahmed Bayoumy Zaki
:
Deep Learning Based Resources Allocation for Internet-of-Things Deployment Underlaying Cellular Networks. 1833-1841 - Jie Zheng
, Ling Gao, Hai Wang, Jinping Niu, Jie Ren, Hongbo Guo, Xudong Yang, Yi Liu:
Smart Edge Caching-Aided Partial Opportunistic Interference Alignment in HetNets. 1842-1850 - Songyang Ge, Beiling Lu, Liang Xiao
, Jie Gong, Xiang Chen
, Yun Liu:
Mobile Edge Computing Against Smart Attacks with Deep Reinforcement Learning in Cognitive MIMO IoT Systems. 1851-1862 - Hui Yuan, Dexiang Zhang, Weiwei Wang, Yujun Li:
A Sampling-based 3D Point Cloud Compression Algorithm for Immersive Communication. 1863-1872 - Zhongjiang Yan
:
Conflict Graph Based Concurrent Transmission Scheduling Algorithms for the Next Generation WLAN. 1873-1885 - Zhou Zhang, Ye Yan, Tongtong Wang, Zuohong Xu:
Distributed Scheduling in Wireless Multiple Decode-and-forward Relay Networks. 1886-1899 - Tadashi Nakano, Adriana Compagnoni:
Editorial: Biologically Inspired Networking. 1900-1901 - Anna Wisniewska
, Mohammad Abu Shattal
, Bilal Khan, Ala I. Al-Fuqaha
, Kirk Dombrowski:
From Blindness to Foraging to Sensing to Sociality: an Evolutionary Perspective on Cognitive Radio Networks. 1902-1914 - Lamri Sayad
, Louiza Bouallouche-Medjkoune
, Djamil Aïssani
:
A Chemical Reaction Algorithm to Solve the Router Node Placement in Wireless Mesh Networks. 1915-1928 - Fadi Al-Turjman
:
A Cognitive Routing Protocol for Bio-Inspired Networking in the Internet of Nano-Things (IoNT). 1929-1943 - Alan Oliveira de Sá
, Luiz F. R. da Costa Carmo, Raphael C. S. Machado:
Bio-inspired Active System Identification: a Cyber-Physical Intelligence Attack in Networked Control Systems. 1944-1957 - Abbas Rahimi
, Artiom Tchouprina, Pentti Kanerva, José del R. Millán
, Jan M. Rabaey:
Hyperdimensional Computing for Blind and One-Shot Classification of EEG Error-Related Potentials. 1958-1969 - Khajamoinuddin Syed, Ahmed Abdelzaher, Michael L. Mayo, Preetam Ghosh
:
Similar Feed-forward Loop Crosstalk Patterns may Impact Robust Information Transport Across E. coli and S. Cerevisiae Transcriptional Networks. 1970-1982 - Khajamoinuddin Syed, Ahmed Abdelzaher, Michael L. Mayo, Preetam Ghosh
:
Correction to: Similar Feed-forward Loop Crosstalk Patterns may Impact Robust Information Transport Across E. coli and S. Cerevisiae Transcriptional Networks. 1983 - Van-Dinh Nguyen
, Trung Q. Duong, Quoc-Tuan Vien
:
Editorial: Emerging Techniques and Applications for 5G Networks and Beyond. 1984-1986 - Van-Dinh Nguyen
, Trung Q. Duong, Quoc-Tuan Vien
:
Correction to: Editorial: Emerging Techniques and Applications for 5G Networks and Beyond. 1987 - Han Le Duc, Van-Phuc Hoang
, Minh Hong Nguyen, Hien M. Nguyen, Duc Minh Nguyen:
Linearization of RF Power Amplifiers in Wideband Communication Systems by Adaptive Indirect Learning Using RPEM Algorithm. 1988-1997 - Mahdi Kazeminia
, Mehri Mehrjoo, Stefano Tomasin
:
A D2D-Based Solution for MTC Connectivity Problem in NOMA-Based Cellular IoT Networks: Dynamic User Grouping and Resource Allocation. 1998-2011 - Turgay Pamuklu
, Cicek Cavdar, Cem Ersoy
:
Renewable Energy Assisted Function Splitting in Cloud Radio Access Networks. 2012-2023 - Hong Thinh Pham, Nguyen Thanh Dat, Pham Ngoc Nam, Nguyen Huu Thanh
, Hien M. Nguyen, Truong Thu Huong:
An Efficient QoE-Aware HTTP Adaptive Streaming over Software Defined Networking. 2024-2036 - Minh-Phung Bui
, Nguyen-Son Vo
, Sang Quang Nguyen
, Quang-Nhat Tran:
Social-Aware Caching and Resource Sharing Maximized Video Delivery Capacity in 5G Ultra-Dense Networks. 2037-2049 - Bach Tran, Mohamed Elamin, Nghi H. Tran, Shivakumar Sastry:
Performance Analysis of Software Defined Network Concepts in Networked Embedded Systems. 2050-2062 - Alaa A. R. Alsaeedy
, Edwin K. P. Chong:
5G and UAVs for Mission-Critical Communications: Swift Network Recovery for Search-and-Rescue Operations. 2063-2081 - Junhui Zhao, Jin Liu
, Shanjin Ni, Yi Gong
:
Enhancing Transmission on Hybrid Precoding Based Train-to-Train Communication. 2082-2091 - Bashyam Sugumaran
, Ramachandran Balasubramanian
:
Design and Analysis of Fractal Based Monopole Antenna Backed with Modified Jerusalem Cross Frequency Selective Surface for Wireless Personal Area Communications. 2092-2101
Volume 25, Number 6, December 2020
- Jose Antonio Marmolejo Saucedo
, Félix Martínez-Rios
, Román Rodríguez-Aguilar
:
Editorial: Optimization Methods, Mobile Networks and Data Analytics: Applications in Engineering and Industry 4.0. 2103-2104 - Felix Martinez-Rios
, Jose Antonio Marmolejo Saucedo
, César R. García-Jacas, Alfonso Murillo-Suarez:
μ𝜃 -EGF: A New Multi-Thread and Nature-Inspired Algorithm for the Packing Problem. 2105-2117 - Jania Astrid Saucedo-Martínez
, Daniela Román, Lucero Ozuna:
Mixed Integer Programming Model for Facility Location Problems: Case Study for Consolidation Centers. 2118-2125 - Igor S. Litvinchev
, Tatiana E. Romanova
, Rogelio Corrales-Diaz, Aned Esquerra-Arguelles
, Alberto Martinez-Noa
:
Lagrangian Approach to Modeling Placement Conditions in Optimized Packing Problems. 2126-2133 - José Mejía, Alberto Ochoa-Zezzatti, Oliverio Cruz-Mejia
:
Traffic Forecasting on Mobile Networks Using 3D Convolutional Layers. 2134-2140 - Jose Antonio Marmolejo Saucedo
:
Design and Development of Digital Twins: a Case Study in Supply Chains. 2141-2160 - Román Rodríguez-Aguilar
:
Proposal for a Comprehensive Environmental Key Performance Index of the Green Supply Chain. 2161-2171 - Honghao Gao, Yuyu Yin
:
Editorial: Mobile Recommendations for Location-Based Services and Social Networks. 2172-2173 - Lin Wang
, Xing Su, Hecheng Su, Nan Jing:
Contactless Continuous Activity Recognition based on Meta-Action Temporal Correlation in Mobile Environments. 2174-2190 - Mohammad Ali Khoshkholghi
, Michel Gokan Khan, Kyoomars Alizadeh Noghani, Javid Taheri, Deval Bhamare, Andreas Kassler, Zhengzhe Xiang, Shuiguang Deng
, Xiaoxian Yang:
Service Function Chain Placement for Joint Cost and Latency Optimization. 2191-2205 - Saleh A. Alghamdi
:
Three-Tier Architecture Supporting QoS Multimedia Routing in Cloud-Assisted MANET with 5G Communication (TCM5G). 2206-2225 - Nan Zhang
, Xu Lu, Cong Tian, Zhenhua Duan, Zhifeng Sun, Ting Zhang:
P2P Network Based Smart Parking System Using Edge Computing. 2226-2239 - Han Ding
, Lei Guo, Cui Zhao, Fei Wang, Ge Wang, Zhiping Jiang, Wei Xi, Jizhong Zhao:
RFnet: Automatic Gesture Recognition and Human Identification Using Time Series RFID Signals. 2240-2253 - Tiejun Zhu, Shuai Liu
:
Recent Progress on the Intelligent Computing for Multimodal Information. 2254-2257 - Ao Li, Ruoqi An, Deyun Chen, Guanglu Sun, Xin Liu, Qidi Wu, Hailong Jiang:
Semi-Supervised Subspace Learning for Pattern Classification via Robust Low Rank Constraint. 2258-2269 - Qi Fan, Xiaoyang Yu, Yanqiao Zhao, Shuang Yu:
A Respiratory Motion Prediction Method Based on Improved Relevance Vector Machine. 2270-2279 - Fan Shi, Guochun Xu:
Research on Fault Feature Extraction and Recognition of Rolling Bearings. 2280-2290 - Lantu Guo, Yanan Liu, Wenxin Li:
Intelligent Channel Parameter Estimation System Based on Neural Network Regression Model. 2291-2301 - B. A. Harshanand, Arun Kumar Sangaiah
:
Comprehensive Analysis of Deep Learning Methodology in Classification of Leukocytes and Enhancement Using Swish Activation Units. 2302-2320 - Jianjun Hu, Mengjing Yu, Qingzhen Xu, Jing Gao:
Classifiers Protected against Attacks by Fusion of Multi-Branch Perturbed GAN. 2321-2335 - Jie Xu
, Shuangshuang Ying, Hui Li:
GPS Interference Signal Recognition Based on Machine Learning. 2336-2350 - Xuefei Ma, Tingting Wang, Lei Li, Waleed Raza
, Zhiqiang Wu:
Doppler Compensation of Orthogonal Frequency Division Multiplexing for Ocean Intelligent Multimodal Information Technology. 2351-2358 - Qiao Tian, Jicheng Jia, Changbo Hou
:
Research on Fingerprint Identification of Wireless Devices Based on Information Fusion. 2359-2366 - Karamjeet Singh, Bhisham Sharma, Jaiteg Singh
, Gautam Srivastava
, Suchita Sharma, Ashutosh Aggarwal
, Xiaochun Cheng
:
Local Statistics-based Speckle Reducing Bilateral Filter for Medical Ultrasound Images. 2367-2389 - Xuechao Zhang, Khan Muhammad
:
Adaptive Enhancement Method for Multimode Remote Sensing Image Based on LiDAR. 2390-2397 - Zhixian Chang, Marcin Wozniak
:
Encryption technology of voice transmission in mobile network based on 3DES-ECC algorithm. 2398-2408 - Xiangping Bryce Zhai, Congduan Li, Kai Liu:
Editorial: Machine Learning and Intelligent Wireless Communications (MLICOM 2019). 2409-2411 - Zhenyu Na
, Yue Liu, Jun Wang, Mingxiang Guan, Zihe Gao:
Clustered-NOMA Based Resource Allocation in Wireless Powered Communication Networks. 2412-2420 - Jiale Zhang
, Yanchao Zhao, Junyu Wang, Bing Chen:
FedMEC: Improving Efficiency of Differentially Private Federated Learning via Mobile Edge Computing. 2421-2433 - Cuili Yang, Kaizhe Nie, Junfei Qiao
, Bing Li:
Design of Extreme Learning Machine with Smoothed ℓ 0 Regularization. 2434-2446 - Shu Shen
, Kang Gu, Xinrong Chen
, Caixia Lv, Ruchuan Wang:
Gesture Recognition Through sEMG with Wearable Device Based on Deep Learning. 2447-2458 - Zitong Liu
, Jiachen Sun, Feng Shen, Zheng Wang, Gao Li:
Topology Sensing of Wireless Networks Based on Hawkes Process. 2459-2470 - Yuanyuan Xu, Kun Zhu
:
Cost Sensitive Learning Based HEVC Screen Content Intra Coding for Mobile Devices. 2471-2481 - Xincao Xu
, Kai Liu, Ke Xiao, Liang Feng, Zhou Wu, Songtao Guo:
Vehicular Fog Computing Enabled Real-Time Collision Warning via Trajectory Calibration. 2482-2494 - Xiao-Wei Tang, Xin-Lin Huang:
A Design of SDR-Based Pseudo-analog Wireless Video Transmission System. 2495-2505 - Meng Chen, Kun Zhu
, Bing Chen:
Root Cause Analysis for Self-organizing Cellular Network: an Active Learning Approach. 2506-2516 - Xujie Li, Zhennan Zang, Fei Shen, Ying Sun:
Task Offloading Scheme Based on Improved Contract Net Protocol and Beetle Antennae Search Algorithm in Fog Computing Networks. 2517-2526 - Xin Liu
, Ying Li, Xueyan Zhang, Weidang Lu, Mudi Xiong:
Energy-Efficient Resource Optimization in Green Cognitive Internet of Things. 2527-2535 - Huimin Lu, Tomoki Uemura, Dong Wang, Jihua Zhu, Zi Huang
, Hyoungseop Kim:
Correction to: Deep-Sea Organisms Tracking Using Dehazing and Deep Learning. 2536 - B. Ramesh, J. Senthilkumar, Y. Suresh, V. Mohanraj:
Retraction Note to: Filter Bank Multicarrier Based Generalized Discrete Fourier Transform for Peak to Average Power Ratio Reduction. 2537
![](https://dblp.dagstuhl.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.