


default search action
Smart Computing Review, Volume 3
Volume 3, Number 1, February 2013
- Bakkiam David Deebak, Rajappa Muthaiah, Karuppusamy Thenmozhi, Pitchai Iyer Swaminathan:

IP Multimedia Subsystem - An Intrusion Detection System. 1-13 - D. Indumathi, A. Chitra, K. Girthana:

Search Query Expansion using Genetic Algorithm-based Clustering. 14-23 - You Fu, Zesong Fei, Niwei Wang, Chengwen Xing, Lei Wan:

An Energy-Efficient Dense PicoStation Deployment and Power Control Strategy for Heterogeneous Networks. 24-32 - Hayoung Oh:

Practical Online Scheduling for Mobile Video Streaming on Smartphones. 33-41 - Vanga Odelu

, Ashok Kumar Das, Adrijit Goswami:
A New Key Management Scheme for a User Hierarchy based on a Hybrid Cryptosystem. 42-54
Volume 3, Number 2, April 2013
- Tong Liu, Jianbin Xie, Huanzhang Lu, Wei Yan, Peiqin Li:

Finger Vein Representation by Modified Binary Tree Model. 54-61 - Jennifer S. Raj, Rajaguru Harikumar:

A Neighbor-Aware Connectivity Architecture for Mobile Internet Maintenance. 62-73 - A. M. Miyim, Mahamod Ismail, Rosdiadee Nordin:

Fast Networks as a Candidate for LTE-Advanced Networks. 74-85 - Enzhan Zhang, Yujun Kuang, Jerry John Kponyo:

Analysis of Packets Reception Rate for One-Hop Broadcast in 2-D VANETs. 86-102 - Yong Jian Chin, Kian-Ming Lim, Siew Chin Chong, Chin-Poo Lee:

Minimal Redundancy Maximal Relevance Criterion-based Multi-biometric Feature Selection. 103-111 - Ruoyu Wang, Ling Zhang, Zhen Liu:

Classifying imbalanced Internet traffic based PCDD: a per concept drift detection method. 112-122 - Ardiansyah Musa Efendi

, Seungkyo Oh, Deokjai Choi:
6LoWPAN-based Wireless Home Automation: From Secure System Development to Building Energy Management. 123-138
Volume 3, Number 3, June 2013
- Xiao Xia, Xiaodong Wang, Xingming Zhou:

Evolving Recommender System for Mobile Apps: A Diversity Measurement Approach. 139-154 - Md. Iqbal Hasan Sarker, Md. Shahed Iqbal:

Content-based Image Retrieval Using Haar Wavelet Transform and Color Moment. 155-165 - Reza Kasyauqi Sabhara, Chin-Poo Lee, Kian-Ming Lim:

Comparative Study of Hu Moments and Zernike Moments in Object Recognition. 166-173 - Xinghua Li, Xiang Lu, Jianfeng Ma:

An Engine for Automatic Code Generation of Security Protocols in Multiple Languages. 174-189 - Hayoung Oh:

Automated Security Management Using Data-Mining Techniques. 190-198 - Zhiqiang Zou, Yue Wang, Kai Cao, Shu Shen, Bin Zhang:

An Efficient Spatial Data Index Based On Gossip for Overlay Networks. 199-209
Volume 3, Number 4, August 2013
- Xiaoxu He, Chenxi Shao, Yan Xiong:

Using an SQP Algorithm to Choose the Feature Set for Data Field Clustering. 210-219 - Mohsin Bilal

, Muhammad Shams-ur-Rehman, M. Arfan Jaffar:
Evolutionary Reconstruction: Image Restoration for Space Variant Degradation. 220-232 - Jung-Jae Kim, Min-Woo Ryu, Si-Ho Cha, Kuk-Hyun Cho:

A Cluster-based Path-relocation Routing Protocol for Load-balancing in Content-Centric Networks. 233-245 - Fahim Irfan Alam, Muhammad Iqbal Hasan Chowdhury, Md. Reza Rabbani:

A Prediction Model to Support a MultilayerNetwork-based Universal Electronic CashTransaction Framework. 246-260 - Gulbadan Sikander, Mohammad Haseeb Zafar, Ahmad Raza, Muhammad Inayatullah Babar, Sahibzada Ali Mahmud, Gul Muhammad Khan:

A Survey of Cluster-based Routing Schemes for Wireless Sensor Networks. 261-275 - Keun-Wang Lee:

A QoS Control Method Based on SLA. 276-284 - Dong Ma, Yongjun Wang:

Network Threat Behavior Detection and Trend Analysis Based on the TDLC Model. 285-297
Volume 3, Number 5, October 2013
- Md. Iqbal Hasan Sarker, Mohammad Ibrahim Khan:

An Efficient Image Watermarking Scheme Using BFS Technique Based on Hadamard Transform. 298-308 - Walid A. Hassan, Han-Shin Jo, Tharek Abd Rahman:

Simulation Model for Compatibility between LTE-Advanced and Digital Broadcasting in the Digital Dividend Band. 309-322 - Alok Kumar Chowdhury, Md. Ibrahim Khan:

A Tutorial for Audio Watermarking in the Cepstrum Domain. 323-335 - Wei Yan, Jianbin Xie, Peiqin Li, Tong Liu, Xiaoguang Guo:

An Algorithm for Vein Matching Based on Log-polar Transform. 336-345 - Munish Kumar, Manish Kumar Jindal, Rajendra Kumar Sharma:

PCA-based Offline Handwritten Character Recognition System. 346-357 - Kathiravan Srinivasan

, Kanakaraj Jaganathan:
A Review of Magnetic Resonance Imaging Techniques. 358-366 - Kilhun Lee:

Tutorial: WordPress for Secure Virtualization Systems in a CMS Environment. 367-373 - Daewon Jung, Changsoo Lee:

New Introduction: Search Method for Similar Images from Representative Video Frame Images. 374-382 - Hector Bedon, Carlos Miguel, Angel Fernández, Jong Sou Park:

A DTN System for Nanosatellite-based Sensor Networks using a New ALOHA Multiple Access with Gateway Priority. 383-396
Volume 3, Number 6, December 2013
- Munish Kumar, Manish Kumar Jindal, Rajendra Kumar Sharma:

MDP Feature Extraction Technique for Offline Handwritten Gurmukhi Character Recognition. 397-404 - S. A. Hussain, A. Saeed, Safee Ullah Chaudhary:

A Dynamically Controlled Broadcasting Scheme for VANETs in Dense Traffic Environments. 405-415 - Byungwook Jin:

An Introduction: Context-aware Computing for Secure Message Transmission System in M2M. 416-424 - Chunhua Xiao, Zhangqin Huang, Da Li:

A Tutorial for Key Problems in the Design of Hybrid Hierarchical NoC Architectures with Wireless/RF. 425-436 - Danning Feng, Huijun Yue, Xinyue Li, Siyang Tan, Rui Tao, Junbin Lai:

Simulation of Spinal Codes. 437-446 - Jaeseok Yun, Min-Woo Ryu, Sang-Shin Lee:

Visualization of Upper Air Data from Radiosonde Stations using Google Earth API. 447-457 - Abbirah Ahmed, Sameer Qazi

:
Lead Me, Follow Me, or Get Out Of My Way: Cluster Head Selection Algorithm for Mobile-WSNs. 458-470 - Sung-Chan Choi, Jaeho Kim, Jaeseok Yun, Il-Yeop Ahn:

A Tutorial for Energy-efficient Communication for XMPP-based Internet of Things. 471-479 - Aziz Mohaisen

, Joongheon Kim:
The Sybil Attacks and Defenses: A Survey. 480-489

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














