callback( { "result":{ "query":":facetid:toc:\"db/journals/itiis/itiis8.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"76.98" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"266", "@dc":"266", "@oc":"266", "@id":"43359817", "text":":facetid:toc:db/journals/itiis/itiis8.bht" } }, "hits":{ "@total":"266", "@computed":"266", "@sent":"266", "@first":"0", "hit":[{ "@score":"1", "@id":"3725646", "info":{"authors":{"author":[{"@pid":"140/8882","text":"Omar B. Abdul-Ghafoor"},{"@pid":"25/5105","text":"Mahamod Ismail"},{"@pid":"33/11252","text":"Rosdiadee Nordin"},{"@pid":"43/7084","text":"Musbah Shaat"}]},"title":"Resource Allocation in Multiuser Multi-Carrier Cognitive Radio Network via Game and Supermarket Game Theory: Survey, Tutorial, and Open Research Directions.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"11","pages":"3674-3710","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/Abdul-GhafoorIN14","doi":"10.3837/TIIS.2014.11.003","ee":"https://doi.org/10.3837/tiis.2014.11.003","url":"https://dblp.org/rec/journals/itiis/Abdul-GhafoorIN14"}, "url":"URL#3725646" }, { "@score":"1", "@id":"3725647", "info":{"authors":{"author":[{"@pid":"148/0647","text":"Muntadher Qasim Abdulhasan"},{"@pid":"122/1295","text":"Mustafa Ismael Salman"},{"@pid":"74/4063","text":"Chee Kyun Ng"},{"@pid":"23/4754","text":"Nor Kamariah Noordin"},{"@pid":"141/1497","text":"Shaiful J. Hashim"},{"@pid":"72/2821","text":"Fazirulhisham Hashim"}]},"title":"Review of Channel Quality Indicator Estimation Schemes for Multi-User MIMO in 3GPP LTE/LTE-A Systems.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"6","pages":"1848-1868","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/AbdulhasanSNNHH14","doi":"10.3837/TIIS.2014.06.002","ee":"https://doi.org/10.3837/tiis.2014.06.002","url":"https://dblp.org/rec/journals/itiis/AbdulhasanSNNHH14"}, "url":"URL#3725647" }, { "@score":"1", "@id":"3725648", "info":{"authors":{"author":[{"@pid":"120/8326","text":"Muhammad Khalil Afzal"},{"@pid":"79/2310","text":"Byung-Seo Kim"},{"@pid":"41/3038","text":"Sung Won Kim"}]},"title":"A Leader-Based Reliable Multicast MAC Protocol for Multimedia Applications.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"1","pages":"183-195","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/AfzalKK14","doi":"10.3837/TIIS.2014.01.011","ee":"https://doi.org/10.3837/tiis.2014.01.011","url":"https://dblp.org/rec/journals/itiis/AfzalKK14"}, "url":"URL#3725648" }, { "@score":"1", "@id":"3725649", "info":{"authors":{"author":[{"@pid":"05/2122","text":"Hyunchul Ahn"},{"@pid":"92/1634","text":"Seongjin Kim"},{"@pid":"97/6666","text":"Jae Kyeong Kim"}]},"title":"GA-optimized Support Vector Regression for an Improved Emotional State Estimation Model.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"6","pages":"2056-2069","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/AhnKK14","doi":"10.3837/TIIS.2014.06.014","ee":"https://doi.org/10.3837/tiis.2014.06.014","url":"https://dblp.org/rec/journals/itiis/AhnKK14"}, "url":"URL#3725649" }, { "@score":"1", "@id":"3725650", "info":{"authors":{"author":[{"@pid":"155/8749","text":"G. Akilarasu"},{"@pid":"93/4887","text":"S. Mercy Shalinie"}]},"title":"Trust Based Authentication and Key Establishment for Secure Routing in WMN.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"12","pages":"4661-4676","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/AkilarasuS14","doi":"10.3837/TIIS.2014.12.024","ee":"https://doi.org/10.3837/tiis.2014.12.024","url":"https://dblp.org/rec/journals/itiis/AkilarasuS14"}, "url":"URL#3725650" }, { "@score":"1", "@id":"3725651", "info":{"authors":{"author":[{"@pid":"156/5194","text":"Abdulmalek Al-Hemyari"},{"@pid":"25/5105","text":"Mahamod Ismail"},{"@pid":"29/7804","text":"Rosilah Hassan"},{"@pid":"156/4944","text":"Sabri Saeed"}]},"title":"Lightweight Multicast Routing Based on Stable Core for MANETs.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"12","pages":"4411-4431","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/Al-HemyariIHS14","doi":"10.3837/TIIS.2014.12.010","ee":"https://doi.org/10.3837/tiis.2014.12.010","url":"https://dblp.org/rec/journals/itiis/Al-HemyariIHS14"}, "url":"URL#3725651" }, { "@score":"1", "@id":"3725652", "info":{"authors":{"author":[{"@pid":"48/811","text":"Salman Ali"},{"@pid":"66/4707","text":"Saad B. Qaisar"},{"@pid":"77/1757","text":"Emad A. Felemban"}]},"title":"imensioning of Linear and Hierarchical Wireless Sensor Networks for Infrastructure Monitoring with Enhanced Reliability.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"9","pages":"3034-3055","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/AliQF14","doi":"10.3837/TIIS.2014.09.005","ee":"https://doi.org/10.3837/tiis.2014.09.005","url":"https://dblp.org/rec/journals/itiis/AliQF14"}, "url":"URL#3725652" }, { "@score":"1", "@id":"3725653", "info":{"authors":{"author":[{"@pid":"148/0565","text":"Mallikarjun Avula"},{"@pid":"51/2152","text":"Sanggon Lee"},{"@pid":"42/1072","text":"Seong-Moo Yoo"}]},"title":"Security Framework for Hybrid Wireless Mesh Protocol in Wireless Mesh Networks.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"6","pages":"1982-2004","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/AvulaLY14","doi":"10.3837/TIIS.2014.06.010","ee":"https://doi.org/10.3837/tiis.2014.06.010","url":"https://dblp.org/rec/journals/itiis/AvulaLY14"}, "url":"URL#3725653" }, { "@score":"1", "@id":"3725654", "info":{"authors":{"author":[{"@pid":"141/1044","text":"Aisha Azeem"},{"@pid":"17/1140","text":"Muhammad Sharif 0001"},{"@pid":"131/7682","text":"Jamal Hussain Shah"},{"@pid":"93/6456","text":"Mudassar Raza"}]},"title":"Face Recognition Invariant to Partial Occlusions.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"7","pages":"2496-2511","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/AzeemSSR14","doi":"10.3837/TIIS.2014.07.017","ee":"https://doi.org/10.3837/tiis.2014.07.017","url":"https://dblp.org/rec/journals/itiis/AzeemSSR14"}, "url":"URL#3725654" }, { "@score":"1", "@id":"3725655", "info":{"authors":{"author":{"@pid":"143/7148","text":"Tamer M. Barakat"}},"title":"A New Sender-Side Public-Key Deniable Encryption Scheme with Fast Decryption.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"9","pages":"3231-3249","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/Barakat14","doi":"10.3837/TIIS.2014.09.016","ee":"https://doi.org/10.3837/tiis.2014.09.016","url":"https://dblp.org/rec/journals/itiis/Barakat14"}, "url":"URL#3725655" }, { "@score":"1", "@id":"3725656", "info":{"authors":{"author":[{"@pid":"95/4833","text":"Zdenek Becvar"},{"@pid":"150/6749","text":"Jan Plachy"}]},"title":"Radio Resource Sharing Among Users in Hybrid Access Femtocells.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"8","pages":"2590-2606","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/BecvarP14","doi":"10.3837/TIIS.2014.08.001","ee":"https://doi.org/10.3837/tiis.2014.08.001","url":"https://dblp.org/rec/journals/itiis/BecvarP14"}, "url":"URL#3725656" }, { "@score":"1", "@id":"3725657", "info":{"authors":{"author":[{"@pid":"141/0736","text":"Sahana Bhosale"},{"@pid":"44/11463","text":"Rohin D. Daruwala"}]},"title":"Multi-criteria Vertical Handoff Decision Algorithm Using Hierarchy Modeling and Additive Weighting in an Integrated WiFi/WiMAX/UMTS Environment- A Case Study.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"1","pages":"35-57","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/BhosaleD14","doi":"10.3837/TIIS.2014.01.003","ee":"https://doi.org/10.3837/tiis.2014.01.003","url":"https://dblp.org/rec/journals/itiis/BhosaleD14"}, "url":"URL#3725657" }, { "@score":"1", "@id":"3725658", "info":{"authors":{"author":[{"@pid":"31/8812","text":"Hye Won Byun"},{"@pid":"45/1142","text":"Sung-Ho Chin"},{"@pid":"44/6664","text":"Kwang-Sik Chung"}]},"title":"Design and Implementation of Repeatable and Short-spanned m-Learning Model for English Listening and Comprehension Mobile Digital TextbookContents on Smartphone.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"8","pages":"2814-2832","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/ByunCC14","doi":"10.3837/TIIS.2014.08.014","ee":"https://doi.org/10.3837/tiis.2014.08.014","url":"https://dblp.org/rec/journals/itiis/ByunCC14"}, "url":"URL#3725658" }, { "@score":"1", "@id":"3725659", "info":{"authors":{"author":[{"@pid":"148/0655","text":"Chul-Hoon Byun"},{"@pid":"126/5237","text":"Chang-Kyun Jeon"},{"@pid":"29/233","text":"Taek Lee"},{"@pid":"i/HohPeterIn","text":"Hoh Peter In"}]},"title":"Self-adaptive testing to determine sample size for flash memory solutions.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"6","pages":"2139-2151","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/ByunJLI14","doi":"10.3837/TIIS.2014.06.019","ee":"https://doi.org/10.3837/tiis.2014.06.019","url":"https://dblp.org/rec/journals/itiis/ByunJLI14"}, "url":"URL#3725659" }, { "@score":"1", "@id":"3725660", "info":{"authors":{"author":[{"@pid":"35/6628","text":"Young-Joon Chai"},{"@pid":"14/5991","text":"Hyun-Ki Hong"},{"@pid":"14/4847-3","text":"TaeYong Kim 0003"}]},"title":"Disjoint Particle Filter to Track Multiple Objects in Real-time.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"5","pages":"1711-1725","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/ChaiHK14","doi":"10.3837/TIIS.2014.05.012","ee":"https://doi.org/10.3837/tiis.2014.05.012","url":"https://dblp.org/rec/journals/itiis/ChaiHK14"}, "url":"URL#3725660" }, { "@score":"1", "@id":"3725661", "info":{"authors":{"author":[{"@pid":"63/1930","text":"Chi-Shiang Chan"},{"@pid":"01/7015","text":"Yung-Chen Chou"},{"@pid":"89/4335","text":"Yi-Hui Chen"},{"@pid":"45/4549","text":"Yuan-Yu Tsai"}]},"title":"Role-Balance Based Multi-Secret Images Sharing using Boolean Operations.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"5","pages":"1785-1800","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/ChanCCT14","doi":"10.3837/TIIS.2014.05.016","ee":"https://doi.org/10.3837/tiis.2014.05.016","url":"https://dblp.org/rec/journals/itiis/ChanCCT14"}, "url":"URL#3725661" }, { "@score":"1", "@id":"3725662", "info":{"authors":{"author":[{"@pid":"47/10082","text":"Hon-Hang Chang"},{"@pid":"01/7015","text":"Yung-Chen Chou"},{"@pid":"34/6910","text":"Timothy K. Shih"}]},"title":"Indicator Elimination for Locally Adaptive Scheme Using Data Hiding Technique.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"12","pages":"4624-4642","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/ChangCS14","doi":"10.3837/TIIS.2014.12.022","ee":"https://doi.org/10.3837/tiis.2014.12.022","url":"https://dblp.org/rec/journals/itiis/ChangCS14"}, "url":"URL#3725662" }, { "@score":"1", "@id":"3725663", "info":{"authors":{"author":[{"@pid":"c/ChinChenChang","text":"Chin-Chen Chang 0001"},{"@pid":"86/10034","text":"Thai Son Nguyen"},{"@pid":"61/295","text":"Chia-Chen Lin 0001"}]},"title":"Reversible Data Hiding Scheme for VQ Indices Based on Absolute Difference Trees.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"7","pages":"2572-2589","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/ChangNL14","doi":"10.3837/TIIS.2014.07.021","ee":"https://doi.org/10.3837/tiis.2014.07.021","url":"https://dblp.org/rec/journals/itiis/ChangNL14"}, "url":"URL#3725663" }, { "@score":"1", "@id":"3725664", "info":{"authors":{"author":[{"@pid":"144/0398","text":"Zamree Che-aron"},{"@pid":"50/7476","text":"Aisha Hassan Abdalla"},{"@pid":"23/10411","text":"Khaizuran Abdullah"},{"@pid":"119/7203","text":"Md. Arafatur Rahman"}]},"title":"FTCARP: A Fault-Tolerant Routing Protocol for Cognitive Radio Ad Hoc Networks.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"2","pages":"371-388","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/Che-aronAAR14","doi":"10.3837/TIIS.2014.02.003","ee":"https://doi.org/10.3837/tiis.2014.02.003","url":"https://dblp.org/rec/journals/itiis/Che-aronAAR14"}, "url":"URL#3725664" }, { "@score":"1", "@id":"3725665", "info":{"authors":{"author":[{"@pid":"42/2436","text":"Jeanne Chen"},{"@pid":"75/6894","text":"Tung-Shou Chen"},{"@pid":"13/7718","text":"Wien Hong"},{"@pid":"91/4357","text":"Gwoboa Horng"},{"@pid":"79/11036","text":"Han-Yan Wu"},{"@pid":"26/7718","text":"Chih-Wei Shiu"}]},"title":"A New Reference Pixel Prediction for Reversible Data Hiding with Reduced Location Map.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"3","pages":"1105-1118","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/ChenCHHWS14","doi":"10.3837/TIIS.2014.03.023","ee":"https://doi.org/10.3837/tiis.2014.03.023","url":"https://dblp.org/rec/journals/itiis/ChenCHHWS14"}, "url":"URL#3725665" }, { "@score":"1", "@id":"3725666", "info":{"authors":{"author":[{"@pid":"127/9492","text":"Yihong Chen"},{"@pid":"78/7710","text":"Quanyuan Feng"}]},"title":"An Efficient Anti-collision Algorithm for the EPCglobal Class-1 Generation-2 System under the Dynamic Environment.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"11","pages":"3997-4015","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/ChenF14","doi":"10.3837/TIIS.2014.11.019","ee":"https://doi.org/10.3837/tiis.2014.11.019","url":"https://dblp.org/rec/journals/itiis/ChenF14"}, "url":"URL#3725666" }, { "@score":"1", "@id":"3725667", "info":{"authors":{"author":[{"@pid":"02/1003-9","text":"Rui Chen 0009"},{"@pid":"126/5310","text":"Minghu Wu"},{"@pid":"12/1198-42","text":"Jie Yang 0042"},{"@pid":"157/2567","text":"Xiongli Rui"}]},"title":"Priority-based Unequal Error Protection Scheme of Data partitioned H.264 video with Hierarchical QAM.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"11","pages":"4189-4202","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/ChenWYR14","doi":"10.3837/TIIS.2014.11.030","ee":"https://doi.org/10.3837/tiis.2014.11.030","url":"https://dblp.org/rec/journals/itiis/ChenWYR14"}, "url":"URL#3725667" }, { "@score":"1", "@id":"3725668", "info":{"authors":{"author":[{"@pid":"23/1422","text":"Ji-Jian Chin"},{"@pid":"45/873","text":"Swee-Huay Heng"},{"@pid":"p/RCWPhan","text":"Raphael C.-W. Phan"}]},"title":"An Efficient and Provable Secure Certificateless Identification Scheme in the Standard Model.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"7","pages":"2532-2553","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/ChinHP14","doi":"10.3837/TIIS.2014.07.019","ee":"https://doi.org/10.3837/tiis.2014.07.019","url":"https://dblp.org/rec/journals/itiis/ChinHP14"}, "url":"URL#3725668" }, { "@score":"1", "@id":"3725669", "info":{"authors":{"author":[{"@pid":"41/8117","text":"Hye-Jeong Cho"},{"@pid":"97/3266","text":"Chae-Bong Sohn"},{"@pid":"02/2586","text":"Seoung-Jun Oh"}]},"title":"Video Content-Based Bit Rate Estimation Scheme for Transcoding in IPTV Services.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"3","pages":"1040-1057","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/ChoSO14","doi":"10.3837/TIIS.2014.03.019","ee":"https://doi.org/10.3837/tiis.2014.03.019","url":"https://dblp.org/rec/journals/itiis/ChoSO14"}, "url":"URL#3725669" }, { "@score":"1", "@id":"3725670", "info":{"authors":{"author":[{"@pid":"25/1829","text":"Yongjoo Cho"},{"@pid":"130/9488","text":"Ki-Young Seo"},{"@pid":"42/6645","text":"Kyoung Shin Park"}]},"title":"Enhancing Depth Accuracy on the Region of Interest in a Scene for Depth Image Based Rendering.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"7","pages":"2434-2448","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/ChoSP14","doi":"10.3837/TIIS.2014.07.013","ee":"https://doi.org/10.3837/tiis.2014.07.013","url":"https://dblp.org/rec/journals/itiis/ChoSP14"}, "url":"URL#3725670" }, { "@score":"1", "@id":"3725671", "info":{"authors":{"author":[{"@pid":"38/9143","text":"Young-Min Cho"},{"@pid":"33/66","text":"Janghoon Yang"},{"@pid":"04/2850","text":"Jeong-Wook Seo"},{"@pid":"85/1463","text":"Dong Ku Kim"}]},"title":"Sum MSE Minimization for Downlink Multi-Relay Multi-User MIMO Network.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"8","pages":"2722-2742","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/ChoYSK14","doi":"10.3837/TIIS.2014.08.009","ee":"https://doi.org/10.3837/tiis.2014.08.009","url":"https://dblp.org/rec/journals/itiis/ChoYSK14"}, "url":"URL#3725671" }, { "@score":"1", "@id":"3725672", "info":{"authors":{"author":[{"@pid":"c/MiJunChoi","text":"Mi-Jung Choi"},{"@pid":"58/2295","text":"Jun-Sang Park"},{"@pid":"23/3701","text":"Myung-Sup Kim"}]},"title":"Integrated Internet Application-level Traffic Classification.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"3","pages":"838-856","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/ChoiPK14","doi":"10.3837/TIIS.2014.03.007","ee":"https://doi.org/10.3837/tiis.2014.03.007","url":"https://dblp.org/rec/journals/itiis/ChoiPK14"}, "url":"URL#3725672" }, { "@score":"1", "@id":"3725673", "info":{"authors":{"author":[{"@pid":"40/7907","text":"M. Sanaullah Chowdhury"},{"@pid":"88/7588","text":"Pervez Khan"},{"@pid":"144/0814","text":"Jai-Jin Jung"},{"@pid":"61/4074","text":"Kyung Sup Kwak"}]},"title":"Modeling Slotted Aloha of WBAN in Non-Saturated Conditions.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"6","pages":"1901-1913","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/ChowdhuryKJK14","doi":"10.3837/TIIS.2014.06.005","ee":"https://doi.org/10.3837/tiis.2014.06.005","url":"https://dblp.org/rec/journals/itiis/ChowdhuryKJK14"}, "url":"URL#3725673" }, { "@score":"1", "@id":"3725674", "info":{"authors":{"author":[{"@pid":"22/5721","text":"Jong-Moon Chung"},{"@pid":"10/4053","text":"Chang Hyun Kim"},{"@pid":"129/5646","text":"Daeyoung Lee"}]},"title":"A Minimum Energy Consuming Mobile Device Relay Scheme for Reliable QoS Support.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"2","pages":"618-633","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/ChungKL14","doi":"10.3837/TIIS.2014.02.017","ee":"https://doi.org/10.3837/tiis.2014.02.017","url":"https://dblp.org/rec/journals/itiis/ChungKL14"}, "url":"URL#3725674" }, { "@score":"1", "@id":"3725675", "info":{"authors":{"author":[{"@pid":"31/2496","text":"Yongwha Chung"},{"@pid":"135/2597","text":"Haelyeon Kim"},{"@pid":"75/5822","text":"Hansung Lee"},{"@pid":"56/3764","text":"Daihee Park"},{"@pid":"43/6574","text":"Taewoong Jeon"},{"@pid":"144/7293","text":"Hong-Hee Chang"}]},"title":"A Cost-Effective Pigsty Monitoring System Based on a Video Sensor.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"4","pages":"1481-1498","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/ChungKLPJC14","doi":"10.3837/TIIS.2014.04.018","ee":"https://doi.org/10.3837/tiis.2014.04.018","url":"https://dblp.org/rec/journals/itiis/ChungKLPJC14"}, "url":"URL#3725675" }, { "@score":"1", "@id":"3725676", "info":{"authors":{"author":[{"@pid":"56/7757","text":"Jianxin Dai"},{"@pid":"76/5789","text":"Shuai Liu"},{"@pid":"99/311-1","text":"Ming Chen 0001"},{"@pid":"99/3847","text":"Jun Zhou"},{"@pid":"31/7727","text":"Jie Qi"},{"@pid":"52/4698","text":"Jingwei Liang"}]},"title":"Robust Design of Coordinated Set Planning with the Non-Ideal Channel.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"5","pages":"1654-1675","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/DaiLCZQL14","doi":"10.3837/TIIS.2014.05.009","ee":"https://doi.org/10.3837/tiis.2014.05.009","url":"https://dblp.org/rec/journals/itiis/DaiLCZQL14"}, "url":"URL#3725676" }, { "@score":"1", "@id":"3725677", "info":{"authors":{"author":[{"@pid":"18/9804","text":"Zeyang Dai"},{"@pid":"35/295-26","text":"Jian Liu 0026"},{"@pid":"137/9872","text":"Yunji Li"},{"@pid":"53/6133","text":"Keping Long"}]},"title":"Fast Cooperative Sensing with Low Overhead in Cognitive Radios.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"1","pages":"58-73","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/DaiLLL14","doi":"10.3837/TIIS.2014.01.004","ee":"https://doi.org/10.3837/tiis.2014.01.004","url":"https://dblp.org/rec/journals/itiis/DaiLLL14"}, "url":"URL#3725677" }, { "@score":"1", "@id":"3725678", "info":{"authors":{"author":[{"@pid":"141/0775","text":"Sunil Dhakal"},{"@pid":"41/2375","text":"Seokjoo Shin"}]},"title":"Precise-Optimal Frame Length Based Collision Reduction Schemes for Frame Slotted Aloha RFID Systems.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"1","pages":"165-182","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/DhakalS14","doi":"10.3837/TIIS.2014.01.010","ee":"https://doi.org/10.3837/tiis.2014.01.010","url":"https://dblp.org/rec/journals/itiis/DhakalS14"}, "url":"URL#3725678" }, { "@score":"1", "@id":"3725679", "info":{"authors":{"author":[{"@pid":"29/5145","text":"Lin Dong"},{"@pid":"61/1326","text":"Jinwoo Park"},{"@pid":"21/1967","text":"Junbeom Hur"},{"@pid":"69/6862","text":"Ho-Hyun Park"}]},"title":"An Enhanced Remote Data Checking Scheme for Dynamic Updates.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"5","pages":"1744-1765","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/DongPHP14","doi":"10.3837/TIIS.2014.05.014","ee":"https://doi.org/10.3837/tiis.2014.05.014","url":"https://dblp.org/rec/journals/itiis/DongPHP14"}, "url":"URL#3725679" }, { "@score":"1", "@id":"3725680", "info":{"authors":{"author":[{"@pid":"126/5319","text":"Guanyao Du"},{"@pid":"32/3424","text":"Ke Xiong 0001"},{"@pid":"50/671-42","text":"Yu Zhang 0042"},{"@pid":"45/8604","text":"Zhengding Qiu"}]},"title":"Outage Analysis and Optimization for Four-Phase Two-Way Transmission with Energy Harvesting Relay.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"10","pages":"3321-3341","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/DuXZQ14","doi":"10.3837/TIIS.2014.10.002","ee":"https://doi.org/10.3837/tiis.2014.10.002","url":"https://dblp.org/rec/journals/itiis/DuXZQ14"}, "url":"URL#3725680" }, { "@score":"1", "@id":"3725681", "info":{"authors":{"author":[{"@pid":"144/0395","text":"Frank Elijorde"},{"@pid":"09/623","text":"Sungho Kim"},{"@pid":"48/1184","text":"Jaewan Lee"}]},"title":"A Wind Turbine Fault Detection Approach Based on Cluster Analysis and Frequent Pattern Mining.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"2","pages":"664-677","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/ElijordeKL14","doi":"10.3837/TIIS.2014.02.020","ee":"https://doi.org/10.3837/tiis.2014.02.020","url":"https://dblp.org/rec/journals/itiis/ElijordeKL14"}, "url":"URL#3725681" }, { "@score":"1", "@id":"3725682", "info":{"authors":{"author":[{"@pid":"148/0504","text":"Shu-guang Fang"},{"@pid":"148/0508","text":"Ri-zhao Tang"},{"@pid":"149/3025","text":"Yuning Dong"},{"@pid":"z/HuiZhang34","text":"Hui Zhang 0034"}]},"title":"Virtual Queue Based QoS Layered Vertical Mapping in Wireless Networks.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"6","pages":"1869-1880","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/FangTDZ14","doi":"10.3837/TIIS.2014.06.003","ee":"https://doi.org/10.3837/tiis.2014.06.003","url":"https://dblp.org/rec/journals/itiis/FangTDZ14"}, "url":"URL#3725682" }, { "@score":"1", "@id":"3725683", "info":{"authors":{"author":[{"@pid":"95/8789","text":"Jingyu Feng"},{"@pid":"33/9707","text":"Guangyue Lu"},{"@pid":"144/0417","text":"Xiangcen Min"}]},"title":"Social Incentives for Cooperative Spectrum Sensing in Distributed Cognitive Radio Networks.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"2","pages":"355-370","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/FengLM14","doi":"10.3837/TIIS.2014.02.002","ee":"https://doi.org/10.3837/tiis.2014.02.002","url":"https://dblp.org/rec/journals/itiis/FengLM14"}, "url":"URL#3725683" }, { "@score":"1", "@id":"3725684", "info":{"authors":{"author":[{"@pid":"76/847-1","text":"Lei Feng 0001"},{"@pid":"08/6548-1","text":"Wenjing Li 0001"},{"@pid":"152/1083","text":"Mengjun Yin"},{"@pid":"13/342","text":"Xuesong Qiu 0001"}]},"title":"Modeling and Analysis of Load-Balancing Based on Base-Station CoMP with Guaranteed QoS.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"9","pages":"2982-3003","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/FengLYQ14","doi":"10.3837/TIIS.2014.09.002","ee":"https://doi.org/10.3837/tiis.2014.09.002","url":"https://dblp.org/rec/journals/itiis/FengLYQ14"}, "url":"URL#3725684" }, { "@score":"1", "@id":"3725685", "info":{"authors":{"author":[{"@pid":"04/4053-2","text":"Bin Feng 0002"},{"@pid":"65/2749-1","text":"Zhi-Hui Wang 0001"},{"@pid":"56/139","text":"Duo Wang"},{"@pid":"46/1270","text":"Ching-Yun Chang"},{"@pid":"83/3175","text":"Mingchu Li"}]},"title":"A Novel Reversible Chinese Text Information Hiding Scheme based on Lookalike Traditional and Simplified Chinese Characters.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"1","pages":"269-281","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/FengWWCL14","doi":"10.3837/TIIS.2014.01.016","ee":"https://doi.org/10.3837/tiis.2014.01.016","url":"https://dblp.org/rec/journals/itiis/FengWWCL14"}, "url":"URL#3725685" }, { "@score":"1", "@id":"3725686", "info":{"authors":{"author":[{"@pid":"95/8789","text":"Jingyu Feng"},{"@pid":"83/6530-1","text":"Yuqing Zhang 0001"},{"@pid":"33/9707","text":"Guangyue Lu"},{"@pid":"50/6759","text":"Liang Zhang"}]},"title":"Securing Cooperative Spectrum Sensing against Rational SSDF Attack in Cognitive Radio Networks.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"1","pages":"1-17","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/FengZLZ14","doi":"10.3837/TIIS.2014.01.001","ee":"https://doi.org/10.3837/tiis.2014.01.001","url":"https://dblp.org/rec/journals/itiis/FengZLZ14"}, "url":"URL#3725686" }, { "@score":"1", "@id":"3725687", "info":{"authors":{"author":[{"@pid":"153/6720","text":"Lishi Fu"},{"@pid":"57/3168","text":"Chenhui Jin"}]},"title":"Practical Security Evaluation against Differential and Linear Cryptanalyses for the Lai-Massey Scheme with an SPS F-function.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"10","pages":"3624-3637","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/FuJ14","doi":"10.3837/TIIS.2014.10.020","ee":"https://doi.org/10.3837/tiis.2014.10.020","url":"https://dblp.org/rec/journals/itiis/FuJ14"}, "url":"URL#3725687" }, { "@score":"1", "@id":"3725688", "info":{"authors":{"author":[{"@pid":"88/9558","text":"Anmin Fu"},{"@pid":"80/1012","text":"Gongxuan Zhang"},{"@pid":"67/6201","text":"Yan Yu"},{"@pid":"16/4195","text":"Zhenchao Zhu"}]},"title":"A Privacy Preserving Vertical Handover Authentication Scheme for WiMAX-WiFi Networks.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"9","pages":"3250-3265","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/FuZYZ14","doi":"10.3837/TIIS.2014.09.017","ee":"https://doi.org/10.3837/tiis.2014.09.017","url":"https://dblp.org/rec/journals/itiis/FuZYZ14"}, "url":"URL#3725688" }, { "@score":"1", "@id":"3725689", "info":{"authors":{"author":[{"@pid":"141/0923","text":"Huanqin Gao"},{"@pid":"15/8388","text":"Rongfang Song"}]},"title":"Distributed Compressive Sensing Based Channel Feedback Scheme for Massive Antenna Arrays with Spatial Correlation.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"1","pages":"108-122","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/GaoS14","doi":"10.3837/TIIS.2014.01.007","ee":"https://doi.org/10.3837/tiis.2014.01.007","url":"https://dblp.org/rec/journals/itiis/GaoS14"}, "url":"URL#3725689" }, { "@score":"1", "@id":"3725690", "info":{"authors":{"author":[{"@pid":"02/2658","text":"Zan Gao"},{"@pid":"69/2745-3","text":"Hua Zhang 0003"},{"@pid":"81/5765","text":"Anan Liu"},{"@pid":"96/7727","text":"Yanbing Xue"},{"@pid":"68/4014","text":"Guangping Xu"}]},"title":"Human Action Recognition Using Pyramid Histograms of Oriented Gradients and Collaborative Multi-task Learning.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"2","pages":"483-503","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/GaoZLXX14","doi":"10.3837/TIIS.2014.02.009","ee":"https://doi.org/10.3837/tiis.2014.02.009","url":"https://dblp.org/rec/journals/itiis/GaoZLXX14"}, "url":"URL#3725690" }, { "@score":"1", "@id":"3725691", "info":{"authors":{"author":[{"@pid":"76/2452-7","text":"Yuan Gao 0007"},{"@pid":"133/3931","text":"Changping Zhu"},{"@pid":"133/4164","text":"Yibin Tang"}]},"title":"Spectrum Hole Utilization in Cognitive Two-way Relaying Networks.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"3","pages":"890-910","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/GaoZT14","doi":"10.3837/TIIS.2014.03.010","ee":"https://doi.org/10.3837/tiis.2014.03.010","url":"https://dblp.org/rec/journals/itiis/GaoZT14"}, "url":"URL#3725691" }, { "@score":"1", "@id":"3725692", "info":{"authors":{"author":[{"@pid":"146/3657","text":"Zienab Pouladmast Ghadiri"},{"@pid":"69/9706","text":"Ayman A. El-Saleh"},{"@pid":"139/8309","text":"Gobi Vetharatnam"}]},"title":"Evolutionary Algorithm-based Space Diversity for Imperfect Channel Estimation.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"5","pages":"1588-1603","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/GhadiriEV14","doi":"10.3837/TIIS.2014.05.005","ee":"https://doi.org/10.3837/tiis.2014.05.005","url":"https://dblp.org/rec/journals/itiis/GhadiriEV14"}, "url":"URL#3725692" }, { "@score":"1", "@id":"3725693", "info":{"authors":{"author":[{"@pid":"69/8570","text":"Imran Ghani"},{"@pid":"144/0350","text":"Zulkarnain Azham"},{"@pid":"55/6243","text":"Seung Ryul Jeong"}]},"title":"Integrating Software Security into Agile-Scrum Method.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"2","pages":"646-663","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/GhaniAJ14","doi":"10.3837/TIIS.2014.02.019","ee":"https://doi.org/10.3837/tiis.2014.02.019","url":"https://dblp.org/rec/journals/itiis/GhaniAJ14"}, "url":"URL#3725693" }, { "@score":"1", "@id":"3725694", "info":{"authors":{"author":[{"@pid":"143/6403","text":"Volkan Gunes"},{"@pid":"17/831","text":"Steffen Peter"},{"@pid":"g/TonyGivargis","text":"Tony Givargis"},{"@pid":"v/FrankVahid","text":"Frank Vahid"}]},"title":"A Survey on Concepts, Applications, and Challenges in Cyber-Physical Systems.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"12","pages":"4242-4268","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/GunesPGV14","doi":"10.3837/TIIS.2014.12.001","ee":"https://doi.org/10.3837/tiis.2014.12.001","url":"https://dblp.org/rec/journals/itiis/GunesPGV14"}, "url":"URL#3725694" }, { "@score":"1", "@id":"3725695", "info":{"authors":{"author":[{"@pid":"18/11103","text":"Govind P. Gupta"},{"@pid":"71/3734","text":"Manoj Misra"},{"@pid":"77/6619","text":"Kumkum Garg"}]},"title":"Distributed Information Extraction in Wireless Sensor Networks using Multiple Software Agents with Dynamic Itineraries.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"1","pages":"123-144","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/GuptaMG14","doi":"10.3837/TIIS.2014.01.008","ee":"https://doi.org/10.3837/tiis.2014.01.008","url":"https://dblp.org/rec/journals/itiis/GuptaMG14"}, "url":"URL#3725695" }, { "@score":"1", "@id":"3725696", "info":{"authors":{"author":[{"@pid":"148/0509","text":"Aida Hakemi"},{"@pid":"55/6243","text":"Seung Ryul Jeong"},{"@pid":"69/8570","text":"Imran Ghani"},{"@pid":"148/0707","text":"Mojtaba Ghanaatpisheh Sanaei"}]},"title":"Adapting OCTAVE for Risk Analysis in Legacy System Migration.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"6","pages":"2118-2138","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/HakemiJGS14","doi":"10.3837/TIIS.2014.06.018","ee":"https://doi.org/10.3837/tiis.2014.06.018","url":"https://dblp.org/rec/journals/itiis/HakemiJGS14"}, "url":"URL#3725696" }, { "@score":"1", "@id":"3725697", "info":{"authors":{"author":[{"@pid":"137/4185","text":"Jae-Hyun Ham"},{"@pid":"137/4159","text":"Hyun-Min An"},{"@pid":"23/3701","text":"Myung-Sup Kim"}]},"title":"Application Traffic Classification using PSS Signature.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"7","pages":"2261-2280","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/HamAK14","doi":"10.3837/TIIS.2014.07.004","ee":"https://doi.org/10.3837/tiis.2014.07.004","url":"https://dblp.org/rec/journals/itiis/HamAK14"}, "url":"URL#3725697" }, { "@score":"1", "@id":"3725698", "info":{"authors":{"author":[{"@pid":"57/2703","text":"Longzhe Han"},{"@pid":"70/11078","text":"Nguyen Dinh Han"},{"@pid":"30/2315","text":"Seung-Seok Kang"},{"@pid":"i/HohPeterIn","text":"Hoh Peter In"}]},"title":"Cross-layer Video Streaming Mechanism over Cognitive Radio Ad hoc Information Centric Networks.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"11","pages":"3775-3788","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/HanHKI14","doi":"10.3837/TIIS.2014.11.007","ee":"https://doi.org/10.3837/tiis.2014.11.007","url":"https://dblp.org/rec/journals/itiis/HanHKI14"}, "url":"URL#3725698" }, { "@score":"1", "@id":"3725699", "info":{"authors":{"author":[{"@pid":"144/7233","text":"Weitao Han"},{"@pid":"98/1202","text":"Peng Yi"},{"@pid":"144/7222","text":"Le Tiang"}]},"title":"Prefix Cuttings for Packet Classification with Fast Updates.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"4","pages":"1442-1462","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/HanYT14","doi":"10.3837/TIIS.2014.04.016","ee":"https://doi.org/10.3837/tiis.2014.04.016","url":"https://dblp.org/rec/journals/itiis/HanYT14"}, "url":"URL#3725699" }, { "@score":"1", "@id":"3725700", "info":{"authors":{"author":[{"@pid":"84/4762","text":"Mohammad Mehedi Hassan"},{"@pid":"18/542","text":"Biao Song"},{"@pid":"66/5574","text":"M. Shamim Hossain"},{"@pid":"25/2352","text":"Atif Alamri"},{"@pid":"121/2915","text":"Mohammed Abdullah Alnuem"},{"@pid":"66/3908","text":"Muhammad Mostafa Monowar"},{"@pid":"02/5654","text":"M. Anwar Hossain 0001"}]},"title":"Efficient Virtual Machine Resource Management for Media Cloud Computing.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"5","pages":"1567-1587","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/HassanSHAAMH14","doi":"10.3837/TIIS.2014.05.004","ee":"https://doi.org/10.3837/tiis.2014.05.004","url":"https://dblp.org/rec/journals/itiis/HassanSHAAMH14"}, "url":"URL#3725700" }, { "@score":"1", "@id":"3725701", "info":{"authors":{"author":[{"@pid":"159/5795","text":"Xinxin He"},{"@pid":"159/5790","text":"Weisen Shi"},{"@pid":"43/4720-5","text":"Tao Luo 0005"}]},"title":"Survey of Cognitive Radio VANET.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"11","pages":"3837-3859","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/HeSL14","doi":"10.3837/TIIS.2014.11.010","ee":"https://doi.org/10.3837/tiis.2014.11.010","url":"https://dblp.org/rec/journals/itiis/HeSL14"}, "url":"URL#3725701" }, { "@score":"1", "@id":"3725702", "info":{"authors":{"author":[{"@pid":"148/0684","text":"Sung-Sam Hong"},{"@pid":"148/0533","text":"Jong-Hwan Kong"},{"@pid":"93/2492","text":"Myung-Mook Han"}]},"title":"The Adaptive SPAM Mail Detection System using Clustering based on Text Mining.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"6","pages":"2186-2196","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/HongKH14","doi":"10.3837/TIIS.2014.06.022","ee":"https://doi.org/10.3837/tiis.2014.06.022","url":"https://dblp.org/rec/journals/itiis/HongKH14"}, "url":"URL#3725702" }, { "@score":"1", "@id":"3725703", "info":{"authors":{"author":[{"@pid":"08/5044","text":"Yueh-Teng Hsu"},{"@pid":"08/2076","text":"Chun-Chieh Chen"},{"@pid":"84/1959","text":"Shu-Ming Tseng"}]},"title":"GPU-Accelerated Single Image Depth Estimation with Color-Filtered Aperture.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"3","pages":"1058-1070","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/HsuCT14","doi":"10.3837/TIIS.2014.03.020","ee":"https://doi.org/10.3837/tiis.2014.03.020","url":"https://dblp.org/rec/journals/itiis/HsuCT14"}, "url":"URL#3725703" }, { "@score":"1", "@id":"3725704", "info":{"authors":{"author":[{"@pid":"132/7766","text":"Zhirui Hu"},{"@pid":"68/3731","text":"Chunyan Feng"},{"@pid":"78/1864","text":"Tiankui Zhang"},{"@pid":"57/1439","text":"Qiubin Gao"},{"@pid":"38/7881","text":"Shaohui Sun"}]},"title":"Research on Per-cell Codebook based Channel Quantization for CoMP Transmission.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"6","pages":"1828-1847","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/HuFZGS14","doi":"10.3837/TIIS.2014.06.001","ee":"https://doi.org/10.3837/tiis.2014.06.001","url":"https://dblp.org/rec/journals/itiis/HuFZGS14"}, "url":"URL#3725704" }, { "@score":"1", "@id":"3725705", "info":{"authors":{"author":[{"@pid":"04/9004","text":"Jingjing Huang"},{"@pid":"55/1756","text":"Ting Jiang"}]},"title":"Secret Key Generation Using Reciprocity in Ultra-wideband Outdoor Wireless Channels.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"2","pages":"524-539","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/HuangJ14","doi":"10.3837/TIIS.2014.02.011","ee":"https://doi.org/10.3837/tiis.2014.02.011","url":"https://dblp.org/rec/journals/itiis/HuangJ14"}, "url":"URL#3725705" }, { "@score":"1", "@id":"3725706", "info":{"authors":{"author":[{"@pid":"04/9004","text":"Jingjing Huang"},{"@pid":"55/1756","text":"Ting Jiang"}]},"title":"Secret Key Generation from Common Randomness over Ultra-wideband Wireless Channels.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"10","pages":"3557-3571","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/HuangJ14a","doi":"10.3837/TIIS.2014.10.016","ee":"https://doi.org/10.3837/tiis.2014.10.016","url":"https://dblp.org/rec/journals/itiis/HuangJ14a"}, "url":"URL#3725706" }, { "@score":"1", "@id":"3725707", "info":{"authors":{"author":[{"@pid":"79/8456","text":"Baogui Huang"},{"@pid":"34/25","text":"Jiguo Yu"},{"@pid":"44/7265","text":"Dongxiao Yu"},{"@pid":"79/8453","text":"Chunmei Ma"}]},"title":"SINR based Maximum Link Scheduling with Uniform Power in Wireless Sensor Networks.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"11","pages":"4050-4067","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/HuangYYM14","doi":"10.3837/TIIS.2014.11.022","ee":"https://doi.org/10.3837/tiis.2014.11.022","url":"https://dblp.org/rec/journals/itiis/HuangYYM14"}, "url":"URL#3725707" }, { "@score":"1", "@id":"3725708", "info":{"authors":{"author":[{"@pid":"15/6159-1","text":"Han Huang 0001"},{"@pid":"45/2091-1","text":"Yao Zhao 0001"},{"@pid":"04/7485","text":"Chunyu Lin"},{"@pid":"75/5070-1","text":"Huihui Bai 0001"}]},"title":"Fast Intraframe Coding for High Efficiency Video Coding.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"3","pages":"1093-1104","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/HuangZLB14","doi":"10.3837/TIIS.2014.03.022","ee":"https://doi.org/10.3837/tiis.2014.03.022","url":"https://dblp.org/rec/journals/itiis/HuangZLB14"}, "url":"URL#3725708" }, { "@score":"1", "@id":"3725709", "info":{"authors":{"author":[{"@pid":"58/3121","text":"Jaehyun Hwang"},{"@pid":"47/6934","text":"Joon Yoo"}]},"title":"FaST: Fine-grained and Scalable TCP for Cloud Data Center Networks.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"3","pages":"762-777","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/HwangY14","doi":"10.3837/TIIS.2014.03.003","ee":"https://doi.org/10.3837/tiis.2014.03.003","url":"https://dblp.org/rec/journals/itiis/HwangY14"}, "url":"URL#3725709" }, { "@score":"1", "@id":"3725710", "info":{"authors":{"author":[{"@pid":"149/6989","text":"Sungjin Jang"},{"@pid":"35/7165","text":"Jongbae Kim"},{"@pid":"117/7786","text":"JungWon Byun"},{"@pid":"82/2993","text":"Yongtae Shin"}]},"title":"Game Theory based Dynamic Spectrum Allocation for Secondary Users in the Cell Edge of Cognitive Radio Networks.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"7","pages":"2231-2245","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/JangKBS14","doi":"10.3837/TIIS.2014.07.002","ee":"https://doi.org/10.3837/tiis.2014.07.002","url":"https://dblp.org/rec/journals/itiis/JangKBS14"}, "url":"URL#3725710" }, { "@score":"1", "@id":"3725711", "info":{"authors":{"author":[{"@pid":"143/9329","text":"Yalew Zelalem Jembre"},{"@pid":"40/4314","text":"Young-June Choi"},{"@pid":"59/7911","text":"Rajib Paul"},{"@pid":"19/5636","text":"Wooguil Pak"},{"@pid":"128/3410","text":"Zhetao Li"}]},"title":"Informed Spectrum Discovery in Cognitive Radio Networks using Proactive Out-of-Band Sensing.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"7","pages":"2212-2230","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/JembreCPPL14","doi":"10.3837/TIIS.2014.07.001","ee":"https://doi.org/10.3837/tiis.2014.07.001","url":"https://dblp.org/rec/journals/itiis/JembreCPPL14"}, "url":"URL#3725711" }, { "@score":"1", "@id":"3725712", "info":{"authors":{"author":[{"@pid":"55/6243","text":"Seung Ryul Jeong"},{"@pid":"69/8570","text":"Imran Ghani"}]},"title":"Semantic Computing for Big Data: Approaches, Tools, and Emerging Directions (2011-2014).","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"6","pages":"2022-2042","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/JeongG14","doi":"10.3837/TIIS.2014.06.012","ee":"https://doi.org/10.3837/tiis.2014.06.012","url":"https://dblp.org/rec/journals/itiis/JeongG14"}, "url":"URL#3725712" }, { "@score":"1", "@id":"3725713", "info":{"authors":{"author":[{"@pid":"119/0021","text":"Hongwei Ji"},{"@pid":"118/6218","text":"Jiangping He"},{"@pid":"44/1152","text":"Xin Yang"}]},"title":"Scale Invariant Auto-context for Object Segmentation and Labeling.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"8","pages":"2881-2894","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/JiHY14","doi":"10.3837/TIIS.2014.08.018","ee":"https://doi.org/10.3837/tiis.2014.08.018","url":"https://dblp.org/rec/journals/itiis/JiHY14"}, "url":"URL#3725713" }, { "@score":"1", "@id":"3725714", "info":{"authors":{"author":[{"@pid":"150/0501","text":"Nianlong Jia"},{"@pid":"14/7830","text":"Wenjiang Feng"},{"@pid":"02/9181","text":"Yuanchang Zhong"},{"@pid":"96/9440","text":"Hong Kang"}]},"title":"An Energy-efficiency Approach for Bidirectional Amplified-and-forward Relaying with Asymmetric Traffic in OFDM Systems.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"11","pages":"4087-4102","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/JiaFZK14","doi":"10.3837/TIIS.2014.11.024","ee":"https://doi.org/10.3837/tiis.2014.11.024","url":"https://dblp.org/rec/journals/itiis/JiaFZK14"}, "url":"URL#3725714" }, { "@score":"1", "@id":"3725715", "info":{"authors":{"author":[{"@pid":"141/0898","text":"Xibin Jia"},{"@pid":"39/731","text":"Yanhua Zhang"},{"@pid":"p/DavidMWPowers","text":"David M. W. Powers"},{"@pid":"44/2141","text":"Humayra Binte Ali"}]},"title":"Multi-classifier Fusion Based Facial Expression Recognition Approach.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"1","pages":"196-212","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/JiaZPA14","doi":"10.3837/TIIS.2014.01.012","ee":"https://doi.org/10.3837/tiis.2014.01.012","url":"https://dblp.org/rec/journals/itiis/JiaZPA14"}, "url":"URL#3725715" }, { "@score":"1", "@id":"3725716", "info":{"authors":{"author":[{"@pid":"120/3082","text":"Ming-Xin Jiang"},{"@pid":"96/3995-1","text":"Hongyu Wang 0001"},{"@pid":"16/5215","text":"Tianshuang Qiu"}]},"title":"Video-based Height Measurements of Multiple Moving Objects.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"9","pages":"3196-3210","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/Jiang0Q14","doi":"10.3837/TIIS.2014.09.014","ee":"https://doi.org/10.3837/tiis.2014.09.014","url":"https://dblp.org/rec/journals/itiis/Jiang0Q14"}, "url":"URL#3725716" }, { "@score":"1", "@id":"3725717", "info":{"authors":{"author":[{"@pid":"74/3468-3","text":"Bo Jin 0003"},{"@pid":"30/4085","text":"Zhongliang Jing"},{"@pid":"129/8171","text":"Han Pan"}]},"title":"Multi-modality Image Fusion via Generalized Riesz-wavelet Transformation.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"11","pages":"4118-4136","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/JinJP14","doi":"10.3837/TIIS.2014.11.026","ee":"https://doi.org/10.3837/tiis.2014.11.026","url":"https://dblp.org/rec/journals/itiis/JinJP14"}, "url":"URL#3725717" }, { "@score":"1", "@id":"3725718", "info":{"authors":{"author":{"@pid":"58/7084","text":"Han-Shin Jo"}},"title":"Multiuser Heterogeneous-SNR MIMO Systems.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"8","pages":"2607-2625","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/Jo14","doi":"10.3837/TIIS.2014.08.002","ee":"https://doi.org/10.3837/tiis.2014.08.002","url":"https://dblp.org/rec/journals/itiis/Jo14"}, "url":"URL#3725718" }, { "@score":"1", "@id":"3725719", "info":{"authors":{"author":[{"@pid":"83/7724","text":"Gyanendra Prasad Joshi"},{"@pid":"94/3058","text":"Seung Yeob Nam"},{"@pid":"144/0424","text":"Srijana Acharya"},{"@pid":"41/3038","text":"Sung Won Kim"}]},"title":"Analysis of Channel Access Delay in CR-MAC Protocol for Ad Hoc Cognitive Radio Wireless Sensor Networks without a Common Control Channel.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"3","pages":"911-923","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/JoshiNAK14","doi":"10.3837/TIIS.2014.03.011","ee":"https://doi.org/10.3837/tiis.2014.03.011","url":"https://dblp.org/rec/journals/itiis/JoshiNAK14"}, "url":"URL#3725719" }, { "@score":"1", "@id":"3725720", "info":{"authors":{"author":[{"@pid":"83/7724","text":"Gyanendra Prasad Joshi"},{"@pid":"94/3058","text":"Seung Yeob Nam"},{"@pid":"41/3038","text":"Sung Won Kim"}]},"title":"Rendezvous Issues in AD Hoc Cognitive Radio Networks.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"11","pages":"3655-3673","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/JoshiNK14","doi":"10.3837/TIIS.2014.11.002","ee":"https://doi.org/10.3837/tiis.2014.11.002","url":"https://dblp.org/rec/journals/itiis/JoshiNK14"}, "url":"URL#3725720" }, { "@score":"1", "@id":"3725721", "info":{"authors":{"author":[{"@pid":"88/10100","text":"Heejin Joung"},{"@pid":"58/7084","text":"Han-Shin Jo"},{"@pid":"33/526","text":"Cheol Mun"},{"@pid":"38/6744","text":"Jong-Gwan Yook"}]},"title":"Space-Polarization Division Multiple Access System with Limited Feedback.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"4","pages":"1292-1306","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/JoungJMY14","doi":"10.3837/TIIS.2014.04.008","ee":"https://doi.org/10.3837/tiis.2014.04.008","url":"https://dblp.org/rec/journals/itiis/JoungJMY14"}, "url":"URL#3725721" }, { "@score":"1", "@id":"3725722", "info":{"authors":{"author":[{"@pid":"32/1307","text":"Woochun Jun"},{"@pid":"79/60","text":"Suk-Ki Hong"}]},"title":"A Study on Development of Quality Standards of Educational Smart Contents.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"6","pages":"2152-2170","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/JunH14","doi":"10.3837/TIIS.2014.06.020","ee":"https://doi.org/10.3837/tiis.2014.06.020","url":"https://dblp.org/rec/journals/itiis/JunH14"}, "url":"URL#3725722" }, { "@score":"1", "@id":"3725723", "info":{"authors":{"author":[{"@pid":"43/8070","text":"Daeyong Jung"},{"@pid":"63/677","text":"Taeweon Suh"},{"@pid":"80/2696","text":"Heon-Chang Yu"},{"@pid":"91/2995","text":"Joon-Min Gil"}]},"title":"A Workflow Scheduling Technique Using Genetic Algorithm in Spot Instance-Based Cloud.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"9","pages":"3126-3145","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/JungSYG14","doi":"10.3837/TIIS.2014.09.010","ee":"https://doi.org/10.3837/tiis.2014.09.010","url":"https://dblp.org/rec/journals/itiis/JungSYG14"}, "url":"URL#3725723" }, { "@score":"1", "@id":"3725724", "info":{"authors":{"author":[{"@pid":"144/7276","text":"Changju Kan"},{"@pid":"00/638","text":"Qihui Wu"},{"@pid":"37/5972-4","text":"Fei Song 0004"},{"@pid":"122/5455","text":"Guoru Ding"}]},"title":"Optimization of Cooperative Sensing in Interference-Aware Cognitive Radio Networks over Imperfect Reporting Channel.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"4","pages":"1208-1222","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/KanWSD14","doi":"10.3837/TIIS.2014.04.003","ee":"https://doi.org/10.3837/tiis.2014.04.003","url":"https://dblp.org/rec/journals/itiis/KanWSD14"}, "url":"URL#3725724" }, { "@score":"1", "@id":"3725725", "info":{"authors":{"author":[{"@pid":"20/3530","text":"Woochul Kang"},{"@pid":"67/5282","text":"Lui Sha"}]},"title":"qPALS: Quality-Aware Synchrony Protocol for Distributed Real-Time Systems.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"10","pages":"3361-3377","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/KangS14","doi":"10.3837/TIIS.2014.10.004","ee":"https://doi.org/10.3837/tiis.2014.10.004","url":"https://dblp.org/rec/journals/itiis/KangS14"}, "url":"URL#3725725" }, { "@score":"1", "@id":"3725726", "info":{"authors":{"author":[{"@pid":"76/10358","text":"L. Kavisankar"},{"@pid":"59/6650","text":"Chenniappan Chellappan"},{"@pid":"146/3619","text":"P. Sivasankar"},{"@pid":"146/3621","text":"Ashwin Karthi"},{"@pid":"07/10234","text":"A. Srinivas"}]},"title":"A Pioneer Scheme in the Detection and Defense of DrDoS Attack Involving Spoofed Flooding Packets.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"5","pages":"1726-1743","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/KavisankarCSKS14","doi":"10.3837/TIIS.2014.05.013","ee":"https://doi.org/10.3837/tiis.2014.05.013","url":"https://dblp.org/rec/journals/itiis/KavisankarCSKS14"}, "url":"URL#3725726" }, { "@score":"1", "@id":"3725727", "info":{"authors":{"author":[{"@pid":"96/9285","text":"Ajmal Khan"},{"@pid":"10/108","text":"You Ze Cho"}]},"title":"BL-CAST: Beacon-Less Broadcast Protocol for Vehicular Ad Hoc Networks.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"4","pages":"1223-1236","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/KhanC14","doi":"10.3837/TIIS.2014.04.004","ee":"https://doi.org/10.3837/tiis.2014.04.004","url":"https://dblp.org/rec/journals/itiis/KhanC14"}, "url":"URL#3725727" }, { "@score":"1", "@id":"3725728", "info":{"authors":{"author":{"@pid":"28/7675","text":"Ki Youn Kim"}},"title":"Business Intelligence and Marketing Insights in an Era of Big Data: The Q-sorting Approach.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"2","pages":"567-582","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/Kim14","doi":"10.3837/TIIS.2014.02.014","ee":"https://doi.org/10.3837/tiis.2014.02.014","url":"https://dblp.org/rec/journals/itiis/Kim14"}, "url":"URL#3725728" }, { "@score":"1", "@id":"3725729", "info":{"authors":{"author":{"@pid":"39/6144","text":"Wonho Kim"}},"title":"DSP Embedded Early Fire Detection Method Using IR Thermal Video.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"10","pages":"3475-3489","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/Kim14a","doi":"10.3837/TIIS.2014.10.011","ee":"https://doi.org/10.3837/tiis.2014.10.011","url":"https://dblp.org/rec/journals/itiis/Kim14a"}, "url":"URL#3725729" }, { "@score":"1", "@id":"3725730", "info":{"authors":{"author":{"@pid":"65/1893","text":"Sungwook Kim"}},"title":"Intervenient Stackelberg Game based Bandwidth Allocation Scheme for Hierarchical Wireless Networks.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"12","pages":"4293-4304","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/Kim14b","doi":"10.3837/TIIS.2014.12.003","ee":"https://doi.org/10.3837/tiis.2014.12.003","url":"https://dblp.org/rec/journals/itiis/Kim14b"}, "url":"URL#3725730" }, { "@score":"1", "@id":"3725731", "info":{"authors":{"author":{"@pid":"16/9584","text":"Kang-Wook Kim"}},"title":"A New Framework for Automatic Extraction of Key Frames Using DC Image Activity.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"12","pages":"4533-4551","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/Kim14c","doi":"10.3837/TIIS.2014.12.017","ee":"https://doi.org/10.3837/tiis.2014.12.017","url":"https://dblp.org/rec/journals/itiis/Kim14c"}, "url":"URL#3725731" }, { "@score":"1", "@id":"3725732", "info":{"authors":{"author":{"@pid":"56/2431","text":"JunSeong Kim"}},"title":"A Case Study on Network Status Classification based on Latency Stability.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"11","pages":"4016-4027","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/Kim14d","doi":"10.3837/TIIS.2014.11.020","ee":"https://doi.org/10.3837/tiis.2014.11.020","url":"https://dblp.org/rec/journals/itiis/Kim14d"}, "url":"URL#3725732" }, { "@score":"1", "@id":"3725733", "info":{"authors":{"author":[{"@pid":"75/349","text":"Haksung Kim"},{"@pid":"127/1464","text":"Hyun Ahn"},{"@pid":"92/10848","text":"Kwanghoon Pio Kim"}]},"title":"Modeling, Discovering, and Visualizing Workflow Performer-Role Affiliation Networking Knowledge.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"2","pages":"689-706","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/KimAK14","doi":"10.3837/TIIS.2014.02.022","ee":"https://doi.org/10.3837/tiis.2014.02.022","url":"https://dblp.org/rec/journals/itiis/KimAK14"}, "url":"URL#3725733" }, { "@score":"1", "@id":"3725734", "info":{"authors":{"author":[{"@pid":"50/11077","text":"Dongchil Kim"},{"@pid":"73/3481","text":"Kwangsue Chung"}]},"title":"Adaptive Multiple TCP-connection Scheme to Improve Video Quality over Wireless Networks.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"11","pages":"4068-4086","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/KimC14","doi":"10.3837/TIIS.2014.11.023","ee":"https://doi.org/10.3837/tiis.2014.11.023","url":"https://dblp.org/rec/journals/itiis/KimC14"}, "url":"URL#3725734" }, { "@score":"1", "@id":"3725735", "info":{"authors":{"author":[{"@pid":"28/7675","text":"Ki Youn Kim"},{"@pid":"144/0983","text":"Dae Keun Cho"},{"@pid":"144/0425","text":"In Kuk Song"}]},"title":"A Subjectivity Study on the Promotion of Korean Smart TV Industry through Q Methodology.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"6","pages":"2171-2185","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/KimCS14","doi":"10.3837/TIIS.2014.06.021","ee":"https://doi.org/10.3837/tiis.2014.06.021","url":"https://dblp.org/rec/journals/itiis/KimCS14"}, "url":"URL#3725735" }, { "@score":"1", "@id":"3725736", "info":{"authors":{"author":[{"@pid":"45/1315-2","text":"Jinsoo Kim 0002"},{"@pid":"36/824","text":"Myeong-Cheol Ko"},{"@pid":"42/2310","text":"Junghyun Nam"},{"@pid":"13/4939","text":"Junghwan Kim"}]},"title":"Bitmap-based Prefix Caching for Fast IP Lookup.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"3","pages":"873-889","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/KimKNK14","doi":"10.3837/TIIS.2014.03.009","ee":"https://doi.org/10.3837/tiis.2014.03.009","url":"https://dblp.org/rec/journals/itiis/KimKNK14"}, "url":"URL#3725736" }, { "@score":"1", "@id":"3725737", "info":{"authors":{"author":[{"@pid":"28/182","text":"Sung-Jin Kim"},{"@pid":"70/9449","text":"Sungryoul Lee"},{"@pid":"39/3904","text":"Byungchul Bae"}]},"title":"HAS-Analyzer: Detecting HTTP-based C&C based on the Analysis of HTTP Activity Sets.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"5","pages":"1801-1816","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/KimLB14","doi":"10.3837/TIIS.2014.05.017","ee":"https://doi.org/10.3837/tiis.2014.05.017","url":"https://dblp.org/rec/journals/itiis/KimLB14"}, "url":"URL#3725737" }, { "@score":"1", "@id":"3725738", "info":{"authors":{"author":[{"@pid":"51/3624","text":"Seung-Yeon Kim"},{"@pid":"152/1000","text":"Chi-Hun Lim"},{"@pid":"37/6676","text":"Choong-Ho Cho"}]},"title":"Performance Analysis of a Dense Device to Device Network.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"9","pages":"2967-2981","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/KimLC14","doi":"10.3837/TIIS.2014.09.001","ee":"https://doi.org/10.3837/tiis.2014.09.001","url":"https://dblp.org/rec/journals/itiis/KimLC14"}, "url":"URL#3725738" }, { "@score":"1", "@id":"3725739", "info":{"authors":{"author":[{"@pid":"26/2715","text":"YoungJun Kim"},{"@pid":"134/7585","text":"Eui-Young Lee"},{"@pid":"148/0606","text":"Beom Cheol Cin"},{"@pid":"96/10226","text":"Byoung-Joon Kim"}]},"title":"Technology Licensing and the Performance of Firms in US Information and Communication Technology Industry: The Case of Licensees.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"6","pages":"2043-2055","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/KimLCK14","doi":"10.3837/TIIS.2014.06.013","ee":"https://doi.org/10.3837/tiis.2014.06.013","url":"https://dblp.org/rec/journals/itiis/KimLCK14"}, "url":"URL#3725739" }, { "@score":"1", "@id":"3725740", "info":{"authors":{"author":[{"@pid":"65/2574","text":"Minseok Kim"},{"@pid":"153/6568","text":"Wui Hwan Oh"},{"@pid":"22/5721","text":"Jong-Moon Chung"},{"@pid":"21/2979","text":"Bong Gyou Lee"},{"@pid":"62/7084","text":"Myunghwan Seo"},{"@pid":"64/6737","text":"Jungsik Kim"},{"@pid":"68/10267","text":"Hyung-Weon Cho"}]},"title":"Pareto Optimized EDCA Parameter Control for Wireless Local Area Networks.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"10","pages":"3458-3474","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/KimOCLSKC14","doi":"10.3837/TIIS.2014.10.010","ee":"https://doi.org/10.3837/tiis.2014.10.010","url":"https://dblp.org/rec/journals/itiis/KimOCLSKC14"}, "url":"URL#3725740" }, { "@score":"1", "@id":"3725741", "info":{"authors":{"author":[{"@pid":"16/5689","text":"Sunwoo Kim"},{"@pid":"120/9129","text":"Dohoo Pyeon"},{"@pid":"70/7891","text":"Ingook Jang"},{"@pid":"88/2310","text":"Hyunsoo Yoon"}]},"title":"A Novel Routing Protocol for Cognitive Radio Networks with Cooperation Process.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"11","pages":"3860-3875","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/KimPJY14","doi":"10.3837/TIIS.2014.11.011","ee":"https://doi.org/10.3837/tiis.2014.11.011","url":"https://dblp.org/rec/journals/itiis/KimPJY14"}, "url":"URL#3725741" }, { "@score":"1", "@id":"3725742", "info":{"authors":{"author":[{"@pid":"78/3968","text":"Seong-Jun Kim"},{"@pid":"21/290","text":"Kyung Won Park"},{"@pid":"27/3970","text":"Kyung-Taek Lee"},{"@pid":"31/1278","text":"Hyung-Jin Choi"}]},"title":"An Improved Joint Detection of Frame, Integer Frequency Offset, and Spectral Inversion for Digital Radio Mondiale Plus.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"2","pages":"601-617","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/KimPLC14","doi":"10.3837/TIIS.2014.02.016","ee":"https://doi.org/10.3837/tiis.2014.02.016","url":"https://dblp.org/rec/journals/itiis/KimPLC14"}, "url":"URL#3725742" }, { "@score":"1", "@id":"3725743", "info":{"authors":{"author":[{"@pid":"132/7740","text":"Jonghak Kim"},{"@pid":"39/6407","text":"Joonhyuk Yang"},{"@pid":"18/3878","text":"Kwangyun Wohn"}]},"title":"AgeCAPTCHA: an Image-based CAPTCHA that Annotates Images of Human Faces with their Age Groups.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"3","pages":"1071-1092","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/KimYW14","doi":"10.3837/TIIS.2014.03.021","ee":"https://doi.org/10.3837/tiis.2014.03.021","url":"https://dblp.org/rec/journals/itiis/KimYW14"}, "url":"URL#3725743" }, { "@score":"1", "@id":"3725744", "info":{"authors":{"author":[{"@pid":"180/2500","text":"Yoney Kirsal Ever"},{"@pid":"131/8076","text":"Agozie Eneh"},{"@pid":"72/1844","text":"Orhan Gemikonakli"},{"@pid":"10/4346","text":"Leonardo Mostarda"}]},"title":"Analysing the Combined Kerberos Timed Authentication Protocol and Frequent Key Renewal Using CSP and Rank Functions.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"12","pages":"4604-4623","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/Kirsal-EverEGM14","doi":"10.3837/TIIS.2014.12.021","ee":"https://doi.org/10.3837/tiis.2014.12.021","url":"https://dblp.org/rec/journals/itiis/Kirsal-EverEGM14"}, "url":"URL#3725744" }, { "@score":"1", "@id":"3725745", "info":{"authors":{"author":[{"@pid":"117/9889","text":"Adarsh Kumar"},{"@pid":"132/0034","text":"Krishna Gopal"},{"@pid":"75/3050","text":"Alok Aggarwal"}]},"title":"Design and Analysis of Lightweight Trust Mechanism for Accessing Data in MANETs.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"3","pages":"1119-1143","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/KumarGA14","doi":"10.3837/TIIS.2014.03.024","ee":"https://doi.org/10.3837/tiis.2014.03.024","url":"https://dblp.org/rec/journals/itiis/KumarGA14"}, "url":"URL#3725745" }, { "@score":"1", "@id":"3725746", "info":{"authors":{"author":[{"@pid":"138/7118","text":"Kyu Tae Kwak"},{"@pid":"144/0458","text":"Kyung Hee Song"},{"@pid":"73/8688","text":"Soo Kyung Park"},{"@pid":"21/2979","text":"Bong Gyou Lee"}]},"title":"The Survival of Paid Broadcasting Channels in Korea, 1993-2010.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"2","pages":"547-566","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/KwakSPL14","doi":"10.3837/TIIS.2014.02.013","ee":"https://doi.org/10.3837/tiis.2014.02.013","url":"https://dblp.org/rec/journals/itiis/KwakSPL14"}, "url":"URL#3725746" }, { "@score":"1", "@id":"3725747", "info":{"authors":{"author":[{"@pid":"04/4623","text":"Yongjin Kwon"},{"@pid":"148/0577","text":"Seonguk Heo"},{"@pid":"90/3727","text":"Kyuchang Kang"},{"@pid":"93/3538","text":"Changseok Bae"}]},"title":"Particle Swarm Optimization Using Adaptive Boundary Correction for Human Activity Recognition.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"6","pages":"2070-2086","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/KwonHKB14","doi":"10.3837/TIIS.2014.06.015","ee":"https://doi.org/10.3837/tiis.2014.06.015","url":"https://dblp.org/rec/journals/itiis/KwonHKB14"}, "url":"URL#3725747" }, { "@score":"1", "@id":"3725748", "info":{"authors":{"author":[{"@pid":"06/6914","text":"Wei Kuang Lai"},{"@pid":"72/10578","text":"Chung Shuo Fan"},{"@pid":"16/1981","text":"Chin-Shiuh Shieh"}]},"title":"Efficient Cluster Radius and Transmission Ranges in Corona-based Wireless Sensor Networks.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"4","pages":"1237-1255","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/LaiFS14","doi":"10.3837/TIIS.2014.04.005","ee":"https://doi.org/10.3837/tiis.2014.04.005","url":"https://dblp.org/rec/journals/itiis/LaiFS14"}, "url":"URL#3725748" }, { "@score":"1", "@id":"3725749", "info":{"authors":{"author":[{"@pid":"149/6978-1","text":"Bhagyalakshmi Lakshminarayanan"},{"@pid":"46/2951","text":"Krishnan Murugan"}]},"title":"Avoiding Energy Holes Problem using Load Balancing Approach in Wireless Sensor Network.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"5","pages":"1618-1637","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/LakshminarayananK14","doi":"10.3837/TIIS.2014.05.007","ee":"https://doi.org/10.3837/tiis.2014.05.007","url":"https://dblp.org/rec/journals/itiis/LakshminarayananK14"}, "url":"URL#3725749" }, { "@score":"1", "@id":"3725750", "info":{"authors":{"author":{"@pid":"97/3365","text":"HyungJune Lee"}},"title":"Joint Radio Selection and Relay Scheme through Optimization Model in Multi-Radio Sensor Networks.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"12","pages":"4451-4466","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/Lee14","doi":"10.3837/TIIS.2014.12.012","ee":"https://doi.org/10.3837/tiis.2014.12.012","url":"https://dblp.org/rec/journals/itiis/Lee14"}, "url":"URL#3725750" }, { "@score":"1", "@id":"3725751", "info":{"authors":{"author":[{"@pid":"36/1659","text":"Ho Lee"},{"@pid":"91/3561","text":"Jaewon Choi"}]},"title":"Why Do People Visit Social Commerce Sites But Do Not Buy? The Role of The Scarcity Heuristic As a Momentary Characteristic.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"7","pages":"2383-2399","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/LeeC14","doi":"10.3837/TIIS.2014.07.010","ee":"https://doi.org/10.3837/tiis.2014.07.010","url":"https://dblp.org/rec/journals/itiis/LeeC14"}, "url":"URL#3725751" }, { "@score":"1", "@id":"3725752", "info":{"authors":{"author":[{"@pid":"38/1383","text":"Soong-Hee Lee"},{"@pid":"10/108","text":"You Ze Cho"}]},"title":"Motion-tracked Speed Dialing for Smartphones.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"10","pages":"3508-3519","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/LeeC14a","doi":"10.3837/TIIS.2014.10.013","ee":"https://doi.org/10.3837/tiis.2014.10.013","url":"https://dblp.org/rec/journals/itiis/LeeC14a"}, "url":"URL#3725752" }, { "@score":"1", "@id":"3725753", "info":{"authors":{"author":[{"@pid":"30/8233","text":"Young-Doo Lee"},{"@pid":"19/2423","text":"Insoo Koo"}]},"title":"A Received Signal Strength-based Primary User Localization Scheme for Cognitive Radio Sensor Networks Using Underlay Model-based Spectrum Access.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"8","pages":"2663-2674","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/LeeK14","doi":"10.3837/TIIS.2014.08.005","ee":"https://doi.org/10.3837/tiis.2014.08.005","url":"https://dblp.org/rec/journals/itiis/LeeK14"}, "url":"URL#3725753" }, { "@score":"1", "@id":"3725754", "info":{"authors":{"author":[{"@pid":"53/1427","text":"Suk Hwan Lee"},{"@pid":"29/2311","text":"Seong Geun Kwon"},{"@pid":"89/2690","text":"Ki-Ryong Kwon"}]},"title":"Geometric Multiple Watermarking Scheme for Mobile 3D Content Based on Anonymous Buyer-Seller Watermarking Protocol.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"2","pages":"504-523","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/LeeKK14","doi":"10.3837/TIIS.2014.02.010","ee":"https://doi.org/10.3837/tiis.2014.02.010","url":"https://dblp.org/rec/journals/itiis/LeeKK14"}, "url":"URL#3725754" }, { "@score":"1", "@id":"3725755", "info":{"authors":{"author":[{"@pid":"39/1589","text":"Jongchan Lee"},{"@pid":"133/8933","text":"MoonHo Lee"}]},"title":"Resource Reservation to Support Service Continuity in OFDMA Systems.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"12","pages":"4356-4371","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/LeeL14","doi":"10.3837/TIIS.2014.12.007","ee":"https://doi.org/10.3837/tiis.2014.12.007","url":"https://dblp.org/rec/journals/itiis/LeeL14"}, "url":"URL#3725755" }, { "@score":"1", "@id":"3725756", "info":{"authors":{"author":[{"@pid":"69/9450","text":"Suchul Lee"},{"@pid":"48/9205","text":"Sangsoon Lim"},{"@pid":"132/9433","text":"Jun-Rak Lee"}]},"title":"An Oligopoly Spectrum Pricing with Behavior of Primary Users for Cognitive Radio Networks.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"4","pages":"1192-1207","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/LeeLL14","doi":"10.3837/TIIS.2014.04.002","ee":"https://doi.org/10.3837/tiis.2014.04.002","url":"https://dblp.org/rec/journals/itiis/LeeLL14"}, "url":"URL#3725756" }, { "@score":"1", "@id":"3725757", "info":{"authors":{"author":[{"@pid":"70/3543","text":"Seok-Pil Lee"},{"@pid":"09/5362","text":"Hoon Yoo"},{"@pid":"43/1319","text":"Dalwon Jang"}]},"title":"A Design of Matching Engine for a Practical Query-by-Singing /Humming System with Polyphonic Recordings.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"2","pages":"721-734","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/LeeYJ14","doi":"10.3837/TIIS.2014.02.024","ee":"https://doi.org/10.3837/tiis.2014.02.024","url":"https://dblp.org/rec/journals/itiis/LeeYJ14"}, "url":"URL#3725757" }, { "@score":"1", "@id":"3725758", "info":{"authors":{"author":[{"@pid":"284/8639","text":"Yu Lei"},{"@pid":"15/2643","text":"Zhili Wang"},{"@pid":"52/382","text":"Luoming Meng"},{"@pid":"13/342","text":"Xuesong Qiu 0001"}]},"title":"Clustering and Recommendation for Semantic Web Service in Time Series.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"8","pages":"2743-2762","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/LeiWMQ14","doi":"10.3837/TIIS.2014.08.010","ee":"https://doi.org/10.3837/tiis.2014.08.010","url":"https://dblp.org/rec/journals/itiis/LeiWMQ14"}, "url":"URL#3725758" }, { "@score":"1", "@id":"3725759", "info":{"authors":{"author":[{"@pid":"144/7219","text":"Xingwang Li 0001"},{"@pid":"82/4243-1","text":"Lihua Li 0001"},{"@pid":"14/6862","text":"Ling Xie"}]},"title":"Achievable Sum Rate Analysis of ZF Receivers in 3D MIMO Systems.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"4","pages":"1368-1389","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/LiLX14","doi":"10.3837/TIIS.2014.04.012","ee":"https://doi.org/10.3837/tiis.2014.04.012","url":"https://dblp.org/rec/journals/itiis/LiLX14"}, "url":"URL#3725759" }, { "@score":"1", "@id":"3725760", "info":{"authors":{"author":[{"@pid":"53/2189","text":"Li Li"},{"@pid":"05/10612-1","text":"Guohui Li 0001"},{"@pid":"29/5849-3","text":"Quan Zhou 0003"},{"@pid":"29/240","text":"Yanhong Li"}]},"title":"Ordered Reverse k Nearest Neighbor Search via On-demand Broadcast.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"11","pages":"3896-3915","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/LiLZL14","doi":"10.3837/TIIS.2014.11.013","ee":"https://doi.org/10.3837/tiis.2014.11.013","url":"https://dblp.org/rec/journals/itiis/LiLZL14"}, "url":"URL#3725760" }, { "@score":"1", "@id":"3725761", "info":{"authors":{"author":[{"@pid":"72/872","text":"Qiang Li"},{"@pid":"14/6841-2","text":"Tao Qin 0002"},{"@pid":"45/503","text":"Xiaohong Guan"},{"@pid":"144/7221","text":"Qinghua Zhe"}]},"title":"Exploring Flow Characteristics in IPv6: A Comparative Measurement Study with IPv4 for Traffic Monitoring.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"4","pages":"1307-1323","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/LiQGZ14","doi":"10.3837/TIIS.2014.04.009","ee":"https://doi.org/10.3837/tiis.2014.04.009","url":"https://dblp.org/rec/journals/itiis/LiQGZ14"}, "url":"URL#3725761" }, { "@score":"1", "@id":"3725762", "info":{"authors":{"author":[{"@pid":"l/JingLi-45","text":"Jing Li 0045"},{"@pid":"54/2170","text":"Licheng Wang"},{"@pid":"85/1679","text":"Jianhua Yan"},{"@pid":"26/1990","text":"Xinxin Niu"},{"@pid":"33/5774","text":"Yixian Yang"}]},"title":"A (k, t, n) Verifiable Multi-secret Sharing Scheme Based on Adversary Structure.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"12","pages":"4552-4567","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/LiWYNY14","doi":"10.3837/TIIS.2014.12.018","ee":"https://doi.org/10.3837/tiis.2014.12.018","url":"https://dblp.org/rec/journals/itiis/LiWYNY14"}, "url":"URL#3725762" }, { "@score":"1", "@id":"3725763", "info":{"authors":{"author":[{"@pid":"39/5544-1","text":"Hongwei Li 0001"},{"@pid":"33/4854-27","text":"Yi Yang 0027"},{"@pid":"93/6953","text":"Mi Wen"},{"@pid":"52/3627","text":"Hongwei Luo"},{"@pid":"88/3562","text":"Rongxing Lu"}]},"title":"EMRQ: An Efficient Multi-keyword Range Query Scheme in Smart Grid Auction Market.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"11","pages":"3937-3954","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/LiYWLL14","doi":"10.3837/TIIS.2014.11.015","ee":"https://doi.org/10.3837/tiis.2014.11.015","url":"https://dblp.org/rec/journals/itiis/LiYWLL14"}, "url":"URL#3725763" }, { "@score":"1", "@id":"3725764", "info":{"authors":{"author":[{"@pid":"07/6178","text":"Yanchun Li"},{"@pid":"49/6749","text":"Guangxi Zhu"},{"@pid":"44/2144","text":"Hua Chen"},{"@pid":"21/4301","text":"Minho Jo 0001"},{"@pid":"16/5714","text":"Yingzhuang Liu"}]},"title":"SLNR-based User Scheduling in Multi-cell networks: from Multi-antenna to Large-Scale Antenna System.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"3","pages":"945-964","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/LiZCJL14","doi":"10.3837/TIIS.2014.03.013","ee":"https://doi.org/10.3837/tiis.2014.03.013","url":"https://dblp.org/rec/journals/itiis/LiZCJL14"}, "url":"URL#3725764" }, { "@score":"1", "@id":"3725765", "info":{"authors":{"author":[{"@pid":"63/2893","text":"Xiaoqiang Li"},{"@pid":"15/3785","text":"Qi Zhou"},{"@pid":"92/2557","text":"Hui Dai"},{"@pid":"84/6889","text":"Jie Zhang"},{"@pid":"22/1805","text":"Ying Li"}]},"title":"A Novel Definition of Spectrum Holes for Improved Spectrum Utilization Efficiency.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"3","pages":"749-761","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/LiZDZL14","doi":"10.3837/TIIS.2014.03.002","ee":"https://doi.org/10.3837/tiis.2014.03.002","url":"https://dblp.org/rec/journals/itiis/LiZDZL14"}, "url":"URL#3725765" }, { "@score":"1", "@id":"3725766", "info":{"authors":{"author":[{"@pid":"19/11348","text":"Jiatong Li"},{"@pid":"84/10182","text":"Baojun Zhao"},{"@pid":"133/4127","text":"Linbo Tang"},{"@pid":"73/8538","text":"Chenwei Deng"},{"@pid":"76/373","text":"Lu Han"},{"@pid":"38/10775","text":"Jinghui Wu"}]},"title":"WLSD: A Perceptual Stimulus Model Based Shape Descriptor.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"12","pages":"4513-4532","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/LiZTDHW14","doi":"10.3837/TIIS.2014.12.016","ee":"https://doi.org/10.3837/tiis.2014.12.016","url":"https://dblp.org/rec/journals/itiis/LiZTDHW14"}, "url":"URL#3725766" }, { "@score":"1", "@id":"3725767", "info":{"authors":{"author":[{"@pid":"60/4951","text":"Jianxin Liao"},{"@pid":"04/3799-3","text":"Min Feng 0003"},{"@pid":"98/4254","text":"Tonghong Li"},{"@pid":"37/2749-1","text":"Jingyu Wang 0001"},{"@pid":"122/5072","text":"Sude Qing"}]},"title":"Topology-aware Virtual Network Embedding Using Multiple Characteristics.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"1","pages":"145-164","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/LiaoFLWQ14","doi":"10.3837/TIIS.2014.01.009","ee":"https://doi.org/10.3837/tiis.2014.01.009","url":"https://dblp.org/rec/journals/itiis/LiaoFLWQ14"}, "url":"URL#3725767" }, { "@score":"1", "@id":"3725768", "info":{"authors":{"author":[{"@pid":"82/7699","text":"Dan Liao"},{"@pid":"11/383-1","text":"Gang Sun 0001"},{"@pid":"69/775-1","text":"Vishal Anand 0001"},{"@pid":"94/60","text":"Hongfang Yu"}]},"title":"Efficient Provisioning for Multicast Virtual Network under Single Regional Failure in Cloud-based Datacenters.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"7","pages":"2325-2349","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/LiaoSAY14","doi":"10.3837/TIIS.2014.07.007","ee":"https://doi.org/10.3837/tiis.2014.07.007","url":"https://dblp.org/rec/journals/itiis/LiaoSAY14"}, "url":"URL#3725768" }, { "@score":"1", "@id":"3725769", "info":{"authors":{"author":[{"@pid":"60/4951","text":"Jianxin Liao"},{"@pid":"42/2738","text":"Shengwen Tian"},{"@pid":"37/2749-1","text":"Jingyu Wang 0001"},{"@pid":"98/4254","text":"Tonghong Li"},{"@pid":"80/6406-1","text":"Qi Qi 0001"}]},"title":"Load-Balanced One-hop Overlay Multipath Routing with Path Diversity.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"2","pages":"443-461","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/LiaoTWLQ14","doi":"10.3837/TIIS.2014.02.007","ee":"https://doi.org/10.3837/tiis.2014.02.007","url":"https://dblp.org/rec/journals/itiis/LiaoTWLQ14"}, "url":"URL#3725769" }, { "@score":"1", "@id":"3725770", "info":{"authors":{"author":[{"@pid":"130/4550","text":"Kaiyang Liao"},{"@pid":"32/5135-1","text":"Fan Zhao 0001"},{"@pid":"26/11155","text":"Mingzhu Zhang"}]},"title":"Parallel Implementation Strategy for Content Based Video Copy Detection Using a Multi-core Processor.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"10","pages":"3520-3537","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/LiaoZZ14","doi":"10.3837/TIIS.2014.10.014","ee":"https://doi.org/10.3837/tiis.2014.10.014","url":"https://dblp.org/rec/journals/itiis/LiaoZZ14"}, "url":"URL#3725770" }, { "@score":"1", "@id":"3725771", "info":{"authors":{"author":[{"@pid":"53/1783","text":"Sungsoo Lim"},{"@pid":"19/6088","text":"Daeho Lee"},{"@pid":"53/1530","text":"Youngtae Park"}]},"title":"Lane Detection and Tracking Using Classification in Image Sequences.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"12","pages":"4489-4501","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/LimLP14","doi":"10.3837/TIIS.2014.12.014","ee":"https://doi.org/10.3837/tiis.2014.12.014","url":"https://dblp.org/rec/journals/itiis/LimLP14"}, "url":"URL#3725771" }, { "@score":"1", "@id":"3725772", "info":{"authors":{"author":[{"@pid":"61/295","text":"Chia-Chen Lin 0001"},{"@pid":"156/4946","text":"Yuehong Huang"},{"@pid":"06/183","text":"Wei-Liang Tai"}]},"title":"A High-Quality Image Authentication Scheme for AMBTC-compressed Images.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"12","pages":"4588-4603","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/LinHT14","doi":"10.3837/TIIS.2014.12.020","ee":"https://doi.org/10.3837/tiis.2014.12.020","url":"https://dblp.org/rec/journals/itiis/LinHT14"}, "url":"URL#3725772" }, { "@score":"1", "@id":"3725773", "info":{"authors":{"author":[{"@pid":"69/6038","text":"Fuhong Lin"},{"@pid":"16/3264","text":"Xianwei Zhou"},{"@pid":"25/10451","text":"Daochao Huang"},{"@pid":"62/1539","text":"Wei Song"},{"@pid":"80/8129","text":"Dongsheng Han"}]},"title":"Service Scheduling in Cloud Computing based on Queuing Game Model.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"5","pages":"1554-1566","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/LinZHSH14","doi":"10.3837/TIIS.2014.05.003","ee":"https://doi.org/10.3837/tiis.2014.05.003","url":"https://dblp.org/rec/journals/itiis/LinZHSH14"}, "url":"URL#3725773" }, { "@score":"1", "@id":"3725774", "info":{"authors":{"author":[{"@pid":"07/320","text":"Chen Ling"},{"@pid":"41/8132","text":"Obaid Ur Rehman"},{"@pid":"46/3359-1","text":"Wenjun Zhang 0001"}]},"title":"Semi-fragile Watermarking Scheme for H.264/AVC Video Content Authentication Based on Manifold Feature.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"12","pages":"4568-4587","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/LingR014","doi":"10.3837/TIIS.2014.12.019","ee":"https://doi.org/10.3837/tiis.2014.12.019","url":"https://dblp.org/rec/journals/itiis/LingR014"}, "url":"URL#3725774" }, { "@score":"1", "@id":"3725775", "info":{"authors":{"author":[{"@pid":"31/601","text":"Wanli Liu"},{"@pid":"c/ChinChenChang","text":"Chin-Chen Chang 0001"},{"@pid":"86/10034","text":"Thai Son Nguyen"},{"@pid":"61/295","text":"Chia-Chen Lin 0001"}]},"title":"Image Watermarking Scheme Based on Scale-Invariant Feature Transform.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"10","pages":"3591-3606","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/LiuCNL14","doi":"10.3837/TIIS.2014.10.018","ee":"https://doi.org/10.3837/tiis.2014.10.018","url":"https://dblp.org/rec/journals/itiis/LiuCNL14"}, "url":"URL#3725775" }, { "@score":"1", "@id":"3725776", "info":{"authors":{"author":[{"@pid":"138/9719-1","text":"Xiyao Liu 0001"},{"@pid":"14/1833-1","text":"Yu Ge 0001"},{"@pid":"35/8757","text":"Yuesheng Zhu"},{"@pid":"73/3879","text":"Dajun Wu"}]},"title":"A Lightweight Integrity Authentication Scheme based on Reversible Watermark for Wireless Body Area Networks.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"12","pages":"4643-4660","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/LiuGZW14","doi":"10.3837/TIIS.2014.12.023","ee":"https://doi.org/10.3837/tiis.2014.12.023","url":"https://dblp.org/rec/journals/itiis/LiuGZW14"}, "url":"URL#3725776" }, { "@score":"1", "@id":"3725777", "info":{"authors":{"author":[{"@pid":"75/1219","text":"Hongwu Liu"},{"@pid":"146/3718","text":"Aijin Jung"},{"@pid":"61/4074","text":"Kyung Sup Kwak"}]},"title":"Sequential Optimization for Subcarrier Pairing and Power Allocation in CP-SC Cognitive Relay Systems.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"5","pages":"1638-1653","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/LiuJK14","doi":"10.3837/TIIS.2014.05.008","ee":"https://doi.org/10.3837/tiis.2014.05.008","url":"https://dblp.org/rec/journals/itiis/LiuJK14"}, "url":"URL#3725777" }, { "@score":"1", "@id":"3725778", "info":{"authors":{"author":[{"@pid":"49/1245-29","text":"Jia Liu 0029"},{"@pid":"86/1390","text":"GuiXia Kang"},{"@pid":"01/2082-5","text":"Ying Zhu 0005"}]},"title":"Optimal Power Allocation and Outage Analysis for Cognitive MIMO Full Duplex Relay Network Based on Orthogonal Space-Time Block Codes.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"3","pages":"924-944","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/LiuKZ14","doi":"10.3837/TIIS.2014.03.012","ee":"https://doi.org/10.3837/tiis.2014.03.012","url":"https://dblp.org/rec/journals/itiis/LiuKZ14"}, "url":"URL#3725778" }, { "@score":"1", "@id":"3725779", "info":{"authors":{"author":[{"@pid":"78/7328-2","text":"Yanjun Liu 0002"},{"@pid":"132/4441","text":"Hsiao-Ling Wu"},{"@pid":"c/ChinChenChang","text":"Chin-Chen Chang 0001"}]},"title":"A Fast and Secure Scheme for Data Outsourcing in the Cloud.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"8","pages":"2708-2722","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/LiuWC14","doi":"10.3837/TIIS.2014.08.008","ee":"https://doi.org/10.3837/tiis.2014.08.008","url":"https://dblp.org/rec/journals/itiis/LiuWC14"}, "url":"URL#3725779" }, { "@score":"1", "@id":"3725780", "info":{"authors":{"author":[{"@pid":"02/8137-4","text":"Yunpeng Liu 0004"},{"@pid":"06/939","text":"Renfang Wang"},{"@pid":"124/5613","text":"Huixia Xu"},{"@pid":"149/6941","text":"Dechao Sun"}]},"title":"GOP Adaptation Coding of H.264/SVC Based on Precise Positions of Video Cuts.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"7","pages":"2449-2463","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/LiuWXS14","doi":"10.3837/TIIS.2014.07.014","ee":"https://doi.org/10.3837/tiis.2014.07.014","url":"https://dblp.org/rec/journals/itiis/LiuWXS14"}, "url":"URL#3725780" }, { "@score":"1", "@id":"3725781", "info":{"authors":{"author":[{"@pid":"73/4566-5","text":"Kai Liu 0005"},{"@pid":"82/4816","text":"Yupeng Zhang"},{"@pid":"77/1318-10","text":"Feng Liu 0010"}]},"title":"An Exposed-Terminal-Eliminated Dual-Channel MAC Protocol for Exploiting Concurrent Transmissions in Multihop Wireless Networks.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"3","pages":"778-798","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/LiuZL14","doi":"10.3837/TIIS.2014.03.004","ee":"https://doi.org/10.3837/tiis.2014.03.004","url":"https://dblp.org/rec/journals/itiis/LiuZL14"}, "url":"URL#3725781" }, { "@score":"1", "@id":"3725782", "info":{"authors":{"author":[{"@pid":"21/2715","text":"Lei Liu"},{"@pid":"45/2091-1","text":"Yao Zhao 0001"},{"@pid":"04/7485","text":"Chunyu Lin"},{"@pid":"75/5070-1","text":"Huihui Bai 0001"}]},"title":"Auto-Covariance Analysis for Depth Map Coding.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"9","pages":"3146-3158","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/LiuZLB14","doi":"10.3837/TIIS.2014.09.011","ee":"https://doi.org/10.3837/tiis.2014.09.011","url":"https://dblp.org/rec/journals/itiis/LiuZLB14"}, "url":"URL#3725782" }, { "@score":"1", "@id":"3725783", "info":{"authors":{"author":[{"@pid":"97/2274-8","text":"Yu Liu 0008"},{"@pid":"150/6648","text":"Chenlin Zuo"},{"@pid":"89/6413","text":"Xin Tan"},{"@pid":"148/0695","text":"Huaxin Xiao"},{"@pid":"05/2983","text":"Maojun Zhang"}]},"title":"A Kalman Filter based Video Denoising Method Using Intensity and Structure Tensor.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"8","pages":"2866-2880","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/LiuZTXZ14","doi":"10.3837/TIIS.2014.08.017","ee":"https://doi.org/10.3837/tiis.2014.08.017","url":"https://dblp.org/rec/journals/itiis/LiuZTXZ14"}, "url":"URL#3725783" }, { "@score":"1", "@id":"3725784", "info":{"authors":{"author":[{"@pid":"70/772","text":"Chunxiao Liu"},{"@pid":"04/3348","text":"Yan Zhang"},{"@pid":"162/1299","text":"Xu E"},{"@pid":"119/9143","text":"Yuqiang Yang"},{"@pid":"144/7272","text":"Xu-Hui Zhao"}]},"title":"A Novel Multi-Path Routing Algorithm Based on Clustering for Wireless Mesh Networks.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"4","pages":"1256-1275","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/LiuZXYZ14","doi":"10.3837/TIIS.2014.04.006","ee":"https://doi.org/10.3837/tiis.2014.04.006","url":"https://dblp.org/rec/journals/itiis/LiuZXYZ14"}, "url":"URL#3725784" }, { "@score":"1", "@id":"3725785", "info":{"authors":{"author":[{"@pid":"33/1429","text":"Wei Long"},{"@pid":"46/5223-1","text":"Hui Gao 0001"},{"@pid":"77/4591","text":"Tiejun Lv"},{"@pid":"01/753","text":"Chau Yuen"}]},"title":"Degrees of Freedom of Y Channel with Single-Antenna Users: Transmission Scheme and Beamforming Optimization.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"12","pages":"4305-4323","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/LongGLY14","doi":"10.3837/TIIS.2014.12.004","ee":"https://doi.org/10.3837/tiis.2014.12.004","url":"https://dblp.org/rec/journals/itiis/LongGLY14"}, "url":"URL#3725785" }, { "@score":"1", "@id":"3725786", "info":{"authors":{"author":[{"@pid":"133/8955","text":"Sijia Lou"},{"@pid":"14/9518","text":"Longxiang Yang"}]},"title":"Opportunistic Multiple Relay Selection for Two-Way Relay Networks with Outdated Channel State Information.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"2","pages":"389-405","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/LouY14","doi":"10.3837/TIIS.2014.02.004","ee":"https://doi.org/10.3837/tiis.2014.02.004","url":"https://dblp.org/rec/journals/itiis/LouY14"}, "url":"URL#3725786" }, { "@score":"1", "@id":"3725787", "info":{"authors":{"author":[{"@pid":"16/6317-1","text":"Yang Lu 0001"},{"@pid":"33/31-1","text":"Jiguo Li 0001"}]},"title":"Provably Secure Certificate-Based Signcryption Scheme without Pairings.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"7","pages":"2554-2571","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/LuL14","doi":"10.3837/TIIS.2014.07.020","ee":"https://doi.org/10.3837/tiis.2014.07.020","url":"https://dblp.org/rec/journals/itiis/LuL14"}, "url":"URL#3725787" }, { "@score":"1", "@id":"3725788", "info":{"authors":{"author":[{"@pid":"77/10934","text":"Jicang Lu"},{"@pid":"87/3557","text":"Fenlin Liu"},{"@pid":"29/5265","text":"Xiangyang Luo"}]},"title":"Recognizing F5-like Stego images from Multi-class JPEG Stego Images.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"11","pages":"4153-4169","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/LuLL14","doi":"10.3837/TIIS.2014.11.028","ee":"https://doi.org/10.3837/tiis.2014.11.028","url":"https://dblp.org/rec/journals/itiis/LuLL14"}, "url":"URL#3725788" }, { "@score":"1", "@id":"3725789", "info":{"authors":{"author":[{"@pid":"129/7104","text":"Bingxian Lu"},{"@pid":"66/8772","text":"Zhenquan Qin"},{"@pid":"w/LeiWang5","text":"Lei Wang 0005"},{"@pid":"18/5837-6","text":"Liang Sun 0006"},{"@pid":"64/6143-1","text":"Ming Zhu 0001"},{"@pid":"19/2932-1","text":"Lei Shu 0001"}]},"title":"Connectivity Properties of Real BitTorrent Swarms.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"4","pages":"1324-1343","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/LuQWSZS14","doi":"10.3837/TIIS.2014.04.010","ee":"https://doi.org/10.3837/tiis.2014.04.010","url":"https://dblp.org/rec/journals/itiis/LuQWSZS14"}, "url":"URL#3725789" }, { "@score":"1", "@id":"3725790", "info":{"authors":{"author":[{"@pid":"16/6317","text":"Yang Lu"},{"@pid":"40/6803","text":"Xuezhi Tan"},{"@pid":"144/0467","text":"Yun Mo"},{"@pid":"74/3608-1","text":"Lin Ma 0001"}]},"title":"A New Green Algorithm for Energy Efficiency in High-Density WLANs.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"2","pages":"326-354","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/LuTMM14","doi":"10.3837/TIIS.2014.02.001","ee":"https://doi.org/10.3837/tiis.2014.02.001","url":"https://dblp.org/rec/journals/itiis/LuTMM14"}, "url":"URL#3725790" }, { "@score":"1", "@id":"3725791", "info":{"authors":{"author":[{"@pid":"16/6317","text":"Yang Lu"},{"@pid":"40/6803","text":"Xuezhi Tan"},{"@pid":"144/0467","text":"Yun Mo"},{"@pid":"74/3608-1","text":"Lin Ma 0001"}]},"title":"Temporary Access Selection Technology in WIFI Networks.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"12","pages":"4269-4292","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/LuTMM14a","doi":"10.3837/TIIS.2014.12.002","ee":"https://doi.org/10.3837/tiis.2014.12.002","url":"https://dblp.org/rec/journals/itiis/LuTMM14a"}, "url":"URL#3725791" }, { "@score":"1", "@id":"3725792", "info":{"authors":{"author":[{"@pid":"148/6472","text":"Xiuhua Lu"},{"@pid":"64/854","text":"Qiaoyan Wen"},{"@pid":"60/2420-1","text":"Wenmin Li 0001"},{"@pid":"54/2170","text":"Licheng Wang"},{"@pid":"69/2745-1","text":"Hua Zhang 0001"}]},"title":"A Fuzzy Identity-Based Signcryption Scheme from Lattices.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"11","pages":"4203-4225","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/LuWLWZ14","doi":"10.3837/TIIS.2014.11.031","ee":"https://doi.org/10.3837/tiis.2014.11.031","url":"https://dblp.org/rec/journals/itiis/LuWLWZ14"}, "url":"URL#3725792" }, { "@score":"1", "@id":"3725793", "info":{"authors":{"author":[{"@pid":"09/2321-6","text":"Yu Lu 0006"},{"@pid":"58/6231","text":"Sook Yoon"},{"@pid":"71/227","text":"Shan Juan Xie"},{"@pid":"137/6487","text":"Jucheng Yang"},{"@pid":"65/2749-3","text":"Zhihui Wang 0003"},{"@pid":"08/9173","text":"Dong Sun Park"}]},"title":"Finger Vein Recognition Using Generalized Local Line Binary Pattern.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"5","pages":"1766-1784","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/LuYXYWP14","doi":"10.3837/TIIS.2014.05.015","ee":"https://doi.org/10.3837/tiis.2014.05.015","url":"https://dblp.org/rec/journals/itiis/LuYXYWP14"}, "url":"URL#3725793" }, { "@score":"1", "@id":"3725794", "info":{"authors":{"author":[{"@pid":"128/3230","text":"Shiliang Luo"},{"@pid":"58/1879","text":"Lianglun Cheng"},{"@pid":"02/6854","text":"Bin Ren"}]},"title":"Practical Swarm Optimization based Fault-Tolerance Algorithm for the Internet of Things.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"3","pages":"735-748","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/LuoCR14","doi":"10.3837/TIIS.2014.03.001","ee":"https://doi.org/10.3837/tiis.2014.03.001","url":"https://dblp.org/rec/journals/itiis/LuoCR14"}, "url":"URL#3725794" }, { "@score":"1", "@id":"3725795", "info":{"authors":{"author":[{"@pid":"128/3230","text":"Shiliang Luo"},{"@pid":"58/1879","text":"Lianglun Cheng"},{"@pid":"02/6854","text":"Bin Ren"}]},"title":"Practical Swarm Optimization based Fault-Tolerance Algorithm for the Internet of Things.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"4","pages":"1178-119","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/LuoCR14a","doi":"10.3837/TIIS.2014.04.001","ee":"https://doi.org/10.3837/tiis.2014.04.001","url":"https://dblp.org/rec/journals/itiis/LuoCR14a"}, "url":"URL#3725795" }, { "@score":"1", "@id":"3725796", "info":{"authors":{"author":[{"@pid":"53/1330","text":"Juan Luo"},{"@pid":"21/8015","text":"Shan Fu"},{"@pid":"52/328-2","text":"Di Wu 0002"}]},"title":"Energy-aware Virtual Resource Mapping Algorithm in Wireless Data Center.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"3","pages":"819-837","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/LuoFW14","doi":"10.3837/TIIS.2014.03.006","ee":"https://doi.org/10.3837/tiis.2014.03.006","url":"https://dblp.org/rec/journals/itiis/LuoFW14"}, "url":"URL#3725796" }, { "@score":"1", "@id":"3725797", "info":{"authors":{"author":[{"@pid":"05/6715","text":"Wei Luo"},{"@pid":"05/7677","text":"Jiansheng Guo"}]},"title":"Related-Key Differential Attacks on CHESS-64.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"9","pages":"3266-3285","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/LuoG14","doi":"10.3837/TIIS.2014.09.018","ee":"https://doi.org/10.3837/tiis.2014.09.018","url":"https://dblp.org/rec/journals/itiis/LuoG14"}, "url":"URL#3725797" }, { "@score":"1", "@id":"3725798", "info":{"authors":{"author":[{"@pid":"30/7866","text":"K. Manivannan"},{"@pid":"139/5005","text":"C. G. Ravichandran"},{"@pid":"159/5804","text":"B. Sakthi Karthi Durai"}]},"title":"A Dynamic QoS Model for Improving the Throughput of Wideband Spectrum Sharing in Cognitive Radio Networks.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"11","pages":"3731-3750","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/ManivannanRD14","doi":"10.3837/TIIS.2014.11.005","ee":"https://doi.org/10.3837/tiis.2014.11.005","url":"https://dblp.org/rec/journals/itiis/ManivannanRD14"}, "url":"URL#3725798" }, { "@score":"1", "@id":"3725799", "info":{"authors":{"author":{"@pid":"81/9124","text":"Mohammad Abdul Matin 0001"}},"title":"Spectrum Sensing Techniques for Cognitive Radio - A Review.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"11","pages":"3638-3654","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/Matin14","doi":"10.3837/TIIS.2014.11.001","ee":"https://doi.org/10.3837/tiis.2014.11.001","url":"https://dblp.org/rec/journals/itiis/Matin14"}, "url":"URL#3725799" }, { "@score":"1", "@id":"3725800", "info":{"authors":{"author":[{"@pid":"133/4362","text":"Burak Memis"},{"@pid":"74/5514","text":"Ibrahim Yakut"}]},"title":"Privacy-Preserving Two-Party Collaborative Filtering on Overlapped Ratings.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"8","pages":"2948-2966","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/MemisY14","doi":"10.3837/TIIS.2014.08.022","ee":"https://doi.org/10.3837/tiis.2014.08.022","url":"https://dblp.org/rec/journals/itiis/MemisY14"}, "url":"URL#3725800" }, { "@score":"1", "@id":"3725801", "info":{"authors":{"author":[{"@pid":"156/7091","text":"Luzango Mfupe"},{"@pid":"35/2574","text":"Fisseha Mekuria"},{"@pid":"80/8209","text":"Mjumo Mzyece"}]},"title":"Geo-location White Space Spectrum Databases: Models and Design of South Africa's First Dynamic Spectrum Access Coexistence Manager.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"11","pages":"3810-3836","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/MfupeMM14","doi":"10.3837/TIIS.2014.11.009","ee":"https://doi.org/10.3837/tiis.2014.11.009","url":"https://dblp.org/rec/journals/itiis/MfupeMM14"}, "url":"URL#3725801" }, { "@score":"1", "@id":"3725802", "info":{"authors":{"author":[{"@pid":"05/8605","text":"Zhenqiang Mi"},{"@pid":"156/5127","text":"Ruochen Yu"},{"@pid":"156/4956","text":"Xiangtian Yi"},{"@pid":"48/450-4","text":"Yang Yang 0004"}]},"title":"Distributed Task Allocation of Mobile Robotic Sensor Networks with Guaranteed Connectivity.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"12","pages":"4372-4388","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/MiYYY14","doi":"10.3837/TIIS.2014.12.008","ee":"https://doi.org/10.3837/tiis.2014.12.008","url":"https://dblp.org/rec/journals/itiis/MiYYY14"}, "url":"URL#3725802" }, { "@score":"1", "@id":"3725803", "info":{"authors":{"author":[{"@pid":"152/4183","text":"Md. Sipon Miah"},{"@pid":"47/6533","text":"Heejung Yu"},{"@pid":"82/9662","text":"Md. Mahbubur Rahman"}]},"title":"Super-allocation and Cluster-based Cooperative Spectrum Sensing in Cognitive Radio Networks.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"10","pages":"3302-3320","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/MiahYR14","doi":"10.3837/TIIS.2014.10.001","ee":"https://doi.org/10.3837/tiis.2014.10.001","url":"https://dblp.org/rec/journals/itiis/MiahYR14"}, "url":"URL#3725803" }, { "@score":"1", "@id":"3725804", "info":{"authors":{"author":[{"@pid":"145/4420","text":"K. Muthumeenakshi"},{"@pid":"54/6266","text":"S. Radha"}]},"title":"A Generalized Markovian Based Framework for Dynamic Spectrum Access in Cognitive Radios.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"5","pages":"1532-1553","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/MuthumeenakshiR14","doi":"10.3837/TIIS.2014.05.002","ee":"https://doi.org/10.3837/tiis.2014.05.002","url":"https://dblp.org/rec/journals/itiis/MuthumeenakshiR14"}, "url":"URL#3725804" }, { "@score":"1", "@id":"3725805", "info":{"authors":{"author":[{"@pid":"94/3058","text":"Seung Yeob Nam"},{"@pid":"137/5028","text":"Sirojiddin Djuraev"}]},"title":"Defending HTTP Web Servers against DDoS Attacks through Busy Period-based Attack Flow Detection.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"7","pages":"2512-2531","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/NamD14","doi":"10.3837/TIIS.2014.07.018","ee":"https://doi.org/10.3837/tiis.2014.07.018","url":"https://dblp.org/rec/journals/itiis/NamD14"}, "url":"URL#3725805" }, { "@score":"1", "@id":"3725806", "info":{"authors":{"author":[{"@pid":"159/5801","text":"Uma Nandhini"},{"@pid":"17/1270","text":"Latha Tamilselvan"}]},"title":"Computational Analytics of Client Awareness for Mobile Application Offloading with Cloud Migration.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"11","pages":"3916-3936","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/NandhiniT14","doi":"10.3837/TIIS.2014.11.014","ee":"https://doi.org/10.3837/tiis.2014.11.014","url":"https://dblp.org/rec/journals/itiis/NandhiniT14"}, "url":"URL#3725806" }, { "@score":"1", "@id":"3725807", "info":{"authors":{"author":[{"@pid":"86/10034","text":"Thai Son Nguyen"},{"@pid":"c/ChinChenChang","text":"Chin-Chen Chang 0001"},{"@pid":"134/3966","text":"Ting-Feng Chung"}]},"title":"A Tamper-Detection Scheme for BTC-Compressed Images with High-Quality Images.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"6","pages":"2005-2012","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/NguyenCC14","doi":"10.3837/TIIS.2014.06.011","ee":"https://doi.org/10.3837/tiis.2014.06.011","url":"https://dblp.org/rec/journals/itiis/NguyenCC14"}, "url":"URL#3725807" }, { "@score":"1", "@id":"3725808", "info":{"authors":{"author":[{"@pid":"30/2864","text":"Thanh Tung Nguyen"},{"@pid":"19/2423","text":"Insoo Koo"}]},"title":"Throughput Maximization for a Primary User with Cognitive Radio and Energy Harvesting Functions.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"9","pages":"3075-3093","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/NguyenK14","doi":"10.3837/TIIS.2014.09.007","ee":"https://doi.org/10.3837/tiis.2014.09.007","url":"https://dblp.org/rec/journals/itiis/NguyenK14"}, "url":"URL#3725808" }, { "@score":"1", "@id":"3725809", "info":{"authors":{"author":[{"@pid":"354/4888","text":"Tien Hoa Nguyen"},{"@pid":"02/627","text":"Thanh Hieu Nguyen"},{"@pid":"08/148","text":"Van Duc Nguyen"},{"@pid":"10/3363","text":"Duyen Trung Ha"},{"@pid":"63/3570","text":"Guillaume Gelle"},{"@pid":"86/1662","text":"Hyunseung Choo"}]},"title":"Second Order Suboptimal Power Allocation for MIMO-OFDM Based Cognitive Radio Systems.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"8","pages":"2647-2662","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/NguyenNNHGC14","doi":"10.3837/TIIS.2014.08.004","ee":"https://doi.org/10.3837/tiis.2014.08.004","url":"https://dblp.org/rec/journals/itiis/NguyenNNHGC14"}, "url":"URL#3725809" }, { "@score":"1", "@id":"3725810", "info":{"authors":{"author":{"@pid":"51/737","text":"Minseok Oh"}},"title":"Pulse Dual Slope Modulation for VLC.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"4","pages":"1276-1291","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/Oh14","doi":"10.3837/TIIS.2014.04.007","ee":"https://doi.org/10.3837/tiis.2014.04.007","url":"https://dblp.org/rec/journals/itiis/Oh14"}, "url":"URL#3725810" }, { "@score":"1", "@id":"3725811", "info":{"authors":{"author":{"@pid":"86/4003","text":"Hayoung Oh"}},"title":"Optimal Stochastic Policies in a Network Coding Capable Ad Hoc Networks.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"12","pages":"4389-4410","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/Oh14a","doi":"10.3837/TIIS.2014.12.009","ee":"https://doi.org/10.3837/tiis.2014.12.009","url":"https://dblp.org/rec/journals/itiis/Oh14a"}, "url":"URL#3725811" }, { "@score":"1", "@id":"3725812", "info":{"authors":{"author":[{"@pid":"117/2545","text":"Junseok Oh"},{"@pid":"21/2979","text":"Bong Gyou Lee"}]},"title":"A Technical Approach for Suggesting Research Directions in Telecommunications Policy.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"12","pages":"4467-4488","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/OhL14","doi":"10.3837/TIIS.2014.12.013","ee":"https://doi.org/10.3837/tiis.2014.12.013","url":"https://dblp.org/rec/journals/itiis/OhL14"}, "url":"URL#3725812" }, { "@score":"1", "@id":"3725813", "info":{"authors":{"author":[{"@pid":"153/6541","text":"Jinglan Ou"},{"@pid":"40/10453","text":"Haowei Wu"},{"@pid":"19/1924","text":"Qi Wang"},{"@pid":"153/6722","text":"Yutao Zou"}]},"title":"A Simple Nth Best-Relay Selection Criterion for Opportunistic Two-Way Relay Networks under Outdated Channel State Information.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"10","pages":"3409-3422","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/OuWWZ14","doi":"10.3837/TIIS.2014.10.007","ee":"https://doi.org/10.3837/tiis.2014.10.007","url":"https://dblp.org/rec/journals/itiis/OuWWZ14"}, "url":"URL#3725813" }, { "@score":"1", "@id":"3725814", "info":{"authors":{"author":{"@pid":"08/3987","text":"Chang Yun Park"}},"title":"Adjusting the Retry Limit for Congestion Control in an Overlapping Private BSS Environment.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"6","pages":"1881-1900","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/Park14","doi":"10.3837/TIIS.2014.06.004","ee":"https://doi.org/10.3837/tiis.2014.06.004","url":"https://dblp.org/rec/journals/itiis/Park14"}, "url":"URL#3725814" }, { "@score":"1", "@id":"3725815", "info":{"authors":{"author":[{"@pid":"84/11239","text":"Jongjoo Park"},{"@pid":"18/6511","text":"Jongwha Chong"}]},"title":"Edge-preserving Demosaicing Method for Digital Cameras with Bayer-like W-RGB Color Filter Array.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"3","pages":"1011-1025","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/ParkC14","doi":"10.3837/TIIS.2014.03.017","ee":"https://doi.org/10.3837/tiis.2014.03.017","url":"https://dblp.org/rec/journals/itiis/ParkC14"}, "url":"URL#3725815" }, { "@score":"1", "@id":"3725816", "info":{"authors":{"author":[{"@pid":"48/2395","text":"Jin-Hyung Park"},{"@pid":"144/0383","text":"Hyunhun Cho"},{"@pid":"27/7186","text":"Wonhyuk Lee"},{"@pid":"98/3647","text":"Seunghae Kim"},{"@pid":"43/1869","text":"Byoung-Ju Yun"}]},"title":"A Design of Architecture for Federating between NRNs and Determination Optimal Path.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"2","pages":"678-688","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/ParkCLKY14","doi":"10.3837/TIIS.2014.02.021","ee":"https://doi.org/10.3837/tiis.2014.02.021","url":"https://dblp.org/rec/journals/itiis/ParkCLKY14"}, "url":"URL#3725816" }, { "@score":"1", "@id":"3725817", "info":{"authors":{"author":[{"@pid":"62/10556","text":"Sun Rae Park"},{"@pid":"12/318","text":"Du-Seok Jin"},{"@pid":"97/3385","text":"Jong-Suk Ruth Lee"},{"@pid":"88/5061","text":"Kumwon Cho"},{"@pid":"36/947","text":"Kyu-Chul Lee"}]},"title":"Intelligent u-Learning and Research Environment for Computational Science on Mobile Device.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"2","pages":"707-720","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/ParkJLCL14","doi":"10.3837/TIIS.2014.02.023","ee":"https://doi.org/10.3837/tiis.2014.02.023","url":"https://dblp.org/rec/journals/itiis/ParkJLCL14"}, "url":"URL#3725817" }, { "@score":"1", "@id":"3725818", "info":{"authors":{"author":[{"@pid":"35/7753","text":"Inhye Park"},{"@pid":"40/3100","text":"Hyungkeun Lee"},{"@pid":"52/5519","text":"Seokjoong Kang"}]},"title":"RIX-MAC: An Energy-Efficient Receiver-Initiated Wakeup MAC Protocol for WSNs.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"5","pages":"1604-1617","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/ParkLK14","doi":"10.3837/TIIS.2014.05.006","ee":"https://doi.org/10.3837/tiis.2014.05.006","url":"https://dblp.org/rec/journals/itiis/ParkLK14"}, "url":"URL#3725818" }, { "@score":"1", "@id":"3725819", "info":{"authors":{"author":[{"@pid":"124/7406","text":"Se-Ho Park"},{"@pid":"09/7956","text":"Yong-Suk Park"},{"@pid":"04/2850","text":"Jeong-Wook Seo"},{"@pid":"33/5781","text":"Jun Rim Choi"}]},"title":"DLNA Protocol Inspection Tool for Compatibility Analysis.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"6","pages":"2104-2117","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/ParkPSC14","doi":"10.3837/TIIS.2014.06.017","ee":"https://doi.org/10.3837/tiis.2014.06.017","url":"https://dblp.org/rec/journals/itiis/ParkPSC14"}, "url":"URL#3725819" }, { "@score":"1", "@id":"3725820", "info":{"authors":{"author":[{"@pid":"71/8688","text":"Keon Chul Park"},{"@pid":"148/0543","text":"Jae Woo Shin"},{"@pid":"21/2979","text":"Bong Gyou Lee"}]},"title":"Analysis of Authentication Methods for Smartphone Banking Service using ANP.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"6","pages":"2087-2103","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/ParkSL14","doi":"10.3837/TIIS.2014.06.016","ee":"https://doi.org/10.3837/tiis.2014.06.016","url":"https://dblp.org/rec/journals/itiis/ParkSL14"}, "url":"URL#3725820" }, { "@score":"1", "@id":"3725821", "info":{"authors":{"author":[{"@pid":"14/6638","text":"Shixin Peng"},{"@pid":"16/5714","text":"Yingzhuang Liu"},{"@pid":"44/2144","text":"Hua Chen"},{"@pid":"126/5291","text":"Zhengmin Kong"}]},"title":"A Signal Subspace Interference Alignment Scheme with Sum Rate Maximization and Altruistic-Egoistic Bayesian Gaming.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"6","pages":"1926-1945","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/PengLCK14","doi":"10.3837/TIIS.2014.06.007","ee":"https://doi.org/10.3837/tiis.2014.06.007","url":"https://dblp.org/rec/journals/itiis/PengLCK14"}, "url":"URL#3725821" }, { "@score":"1", "@id":"3725822", "info":{"authors":{"author":[{"@pid":"131/7378","text":"Limei Peng"},{"@pid":"23/1882","text":"Yantao Sun"},{"@pid":"50/6996-3","text":"Min Chen 0003"},{"@pid":"44/1701","text":"Kiejin Park"}]},"title":"Datacenter-Oriented Elastic Optical Networks: Architecture, Operation, and Solutions.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"11","pages":"3955-3966","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/PengSCP14","doi":"10.3837/TIIS.2014.11.016","ee":"https://doi.org/10.3837/tiis.2014.11.016","url":"https://dblp.org/rec/journals/itiis/PengSCP14"}, "url":"URL#3725822" }, { "@score":"1", "@id":"3725823", "info":{"authors":{"author":[{"@pid":"73/9448","text":"Marko Pesko"},{"@pid":"05/1636","text":"Tomaz Javornik"},{"@pid":"13/4546","text":"Andrej Kosir"},{"@pid":"117/4713","text":"Mitja Stular"},{"@pid":"96/2769","text":"Mihael Mohorcic"}]},"title":"Radio Environment Maps: The Survey of Construction Methods.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"11","pages":"3789-3809","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/PeskoJKSM14","doi":"10.3837/TIIS.2014.11.008","ee":"https://doi.org/10.3837/tiis.2014.11.008","url":"https://dblp.org/rec/journals/itiis/PeskoJKSM14"}, "url":"URL#3725823" }, { "@score":"1", "@id":"3725824", "info":{"authors":{"author":[{"@pid":"137/6258","text":"Yanyan Qi"},{"@pid":"74/4718","text":"Xiaoxiang Wang"}]},"title":"Performance Optimization of Two-Way AF Relaying in Asymmetric Fading Channels.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"12","pages":"4432-4450","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/QiW14","doi":"10.3837/TIIS.2014.12.011","ee":"https://doi.org/10.3837/tiis.2014.12.011","url":"https://dblp.org/rec/journals/itiis/QiW14"}, "url":"URL#3725824" }, { "@score":"1", "@id":"3725825", "info":{"authors":{"author":[{"@pid":"144/7265","text":"Mujun Qian"},{"@pid":"10/2639-5","text":"Chen Liu 0005"},{"@pid":"50/9663","text":"Youhua Fu"},{"@pid":"62/1102","text":"Wei-Ping Zhu 0001"}]},"title":"A Relay Selection and Power Allocation Scheme for Cooperative Wireless Sensor Networks.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"4","pages":"1390-1405","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/QianLFZ14","doi":"10.3837/TIIS.2014.04.013","ee":"https://doi.org/10.3837/tiis.2014.04.013","url":"https://dblp.org/rec/journals/itiis/QianLFZ14"}, "url":"URL#3725825" }, { "@score":"1", "@id":"3725826", "info":{"authors":{"author":[{"@pid":"65/3541","text":"Mohammad E. Ragab"},{"@pid":"92/4523","text":"Ghada F. ElKabbany"}]},"title":"A Parallel Implementation of Multiple Non-overlapping Cameras for Robot Pose Estimation.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"11","pages":"4103-4117","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/RagabE14","doi":"10.3837/TIIS.2014.11.025","ee":"https://doi.org/10.3837/tiis.2014.11.025","url":"https://dblp.org/rec/journals/itiis/RagabE14"}, "url":"URL#3725826" }, { "@score":"1", "@id":"3725827", "info":{"authors":{"author":[{"@pid":"144/0402","text":"Jay Shree Ranjit"},{"@pid":"13/9706","text":"Subodh Pudasaini"},{"@pid":"41/2375","text":"Seokjoo Shin"}]},"title":"A New Emergency Handling Mechanism based on IEEE 802.15.4 for Health Monitoring Applications.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"2","pages":"406-423","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/RanjitPS14","doi":"10.3837/TIIS.2014.02.005","ee":"https://doi.org/10.3837/tiis.2014.02.005","url":"https://dblp.org/rec/journals/itiis/RanjitPS14"}, "url":"URL#3725827" }, { "@score":"1", "@id":"3725828", "info":{"authors":{"author":[{"@pid":"00/468","text":"Ju Ren"},{"@pid":"99/4094","text":"Yaoxue Zhang"},{"@pid":"59/554","text":"Xiaodong Lin 0001"}]},"title":"NUND: Non-Uniform Node Distribution in Cluster-based Wireless Sensor Networks.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"7","pages":"2302-2324","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/RenZL14","doi":"10.3837/TIIS.2014.07.006","ee":"https://doi.org/10.3837/tiis.2014.07.006","url":"https://dblp.org/rec/journals/itiis/RenZL14"}, "url":"URL#3725828" }, { "@score":"1", "@id":"3725829", "info":{"authors":{"author":[{"@pid":"153/6660","text":"Md. Mostafa Kamal Sarker"},{"@pid":"58/6231","text":"Sook Yoon"},{"@pid":"08/9173","text":"Dong Sun Park"}]},"title":"A Fast and Robust License Plate Detection Algorithm Based on Two-stage Cascade AdaBoost.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"10","pages":"3490-3507","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/SarkerYP14","doi":"10.3837/TIIS.2014.10.012","ee":"https://doi.org/10.3837/tiis.2014.10.012","url":"https://dblp.org/rec/journals/itiis/SarkerYP14"}, "url":"URL#3725829" }, { "@score":"1", "@id":"3725830", "info":{"authors":{"author":[{"@pid":"156/5059","text":"Martin Savc"},{"@pid":"00/5788","text":"Bozidar Potocnik"}]},"title":"Colour Constancy using Grey Edge Framework and Image Component Analysis.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"12","pages":"4502-4512","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/SavcP14","doi":"10.3837/TIIS.2014.12.015","ee":"https://doi.org/10.3837/tiis.2014.12.015","url":"https://dblp.org/rec/journals/itiis/SavcP14"}, "url":"URL#3725830" }, { "@score":"1", "@id":"3725831", "info":{"authors":{"author":[{"@pid":"129/1922","text":"Luis Sequeira"},{"@pid":"27/1259","text":"Julián Fernández-Navajas"},{"@pid":"82/7704","text":"Jose Saldana"}]},"title":"The Effect of the Buffer Size in QoS for Multimedia and Bursty Traffic: When an Upgrade Becomes a Downgrade.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"9","pages":"3159-3176","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/SequeiraFS14","doi":"10.3837/TIIS.2014.09.012","ee":"https://doi.org/10.3837/tiis.2014.09.012","url":"https://dblp.org/rec/journals/itiis/SequeiraFS14"}, "url":"URL#3725831" }, { "@score":"1", "@id":"3725832", "info":{"authors":{"author":[{"@pid":"87/8611","text":"Hu Shen"},{"@pid":"32/6817","text":"Shaohe Lv"},{"@pid":"07/1021-2","text":"Xiaodong Wang 0002"},{"@pid":"87/2864","text":"Xingming Zhou"}]},"title":"Distributed Collision-Resolvable Medium Access Control for Wireless LANs with Interference Cancellation Support.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"8","pages":"2691-2707","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/ShenLWZ14","doi":"10.3837/TIIS.2014.08.007","ee":"https://doi.org/10.3837/tiis.2014.08.007","url":"https://dblp.org/rec/journals/itiis/ShenLWZ14"}, "url":"URL#3725832" }, { "@score":"1", "@id":"3725833", "info":{"authors":{"author":[{"@pid":"29/551","text":"Seungjae Shin"},{"@pid":"11/3952","text":"Namgi Kim"},{"@pid":"24/2952","text":"Byoung-Dai Lee"},{"@pid":"04/2081","text":"Yoon-Ho Choi"},{"@pid":"88/2310","text":"Hyunsoo Yoon"}]},"title":"On the Design of Delay based Admission Control in Hierarchical Networks.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"3","pages":"997-1010","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/ShinKLCY14","doi":"10.3837/TIIS.2014.03.016","ee":"https://doi.org/10.3837/tiis.2014.03.016","url":"https://dblp.org/rec/journals/itiis/ShinKLCY14"}, "url":"URL#3725833" }, { "@score":"1", "@id":"3725834", "info":{"authors":{"author":[{"@pid":"18/1446-1","text":"Minsu Shin 0001"},{"@pid":"84/3330","text":"ManKyu Park"},{"@pid":"03/1924","text":"Deockgil Oh"},{"@pid":"45/2888","text":"Byungchul Kim"},{"@pid":"72/6418-1","text":"Jaeyong Lee 0001"}]},"title":"Adaptive Logarithmic Increase Congestion Control Algorithm for Satellite Networks.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"8","pages":"2796-2813","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/ShinPOKL14","doi":"10.3837/TIIS.2014.08.013","ee":"https://doi.org/10.3837/tiis.2014.08.013","url":"https://dblp.org/rec/journals/itiis/ShinPOKL14"}, "url":"URL#3725834" }, { "@score":"1", "@id":"3725835", "info":{"authors":{"author":[{"@pid":"84/10850","text":"Robin Shrestha"},{"@pid":"144/0433","text":"Insan Bae"},{"@pid":"29/5557","text":"Jae Moung Kim"}]},"title":"A Leakage-Based Solution for Interference Alignment in MIMO Interference Channel Networks.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"2","pages":"424-442","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/ShresthaBK14","doi":"10.3837/TIIS.2014.02.006","ee":"https://doi.org/10.3837/tiis.2014.02.006","url":"https://dblp.org/rec/journals/itiis/ShresthaBK14"}, "url":"URL#3725835" }, { "@score":"1", "@id":"3725836", "info":{"authors":{"author":[{"@pid":"152/0848","text":"Zhenqiu Shu"},{"@pid":"78/5979","text":"Chunxia Zhao"},{"@pid":"51/3775","text":"Pu Huang"}]},"title":"Constrained Sparse Concept Coding Algorithm with Application to Image Representation.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"9","pages":"3211-3230","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/ShuZH14","doi":"10.3837/TIIS.2014.09.015","ee":"https://doi.org/10.3837/tiis.2014.09.015","url":"https://dblp.org/rec/journals/itiis/ShuZH14"}, "url":"URL#3725836" }, { "@score":"1", "@id":"3725837", "info":{"authors":{"author":[{"@pid":"64/10461","text":"Haifeng Sima"},{"@pid":"33/5440-2","text":"Ping Guo 0002"}]},"title":"Texture Superpixels Merging by Color-texture Histograms for Color Image Segmentation.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"7","pages":"2400-2419","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/SimaG14","doi":"10.3837/TIIS.2014.07.011","ee":"https://doi.org/10.3837/tiis.2014.07.011","url":"https://dblp.org/rec/journals/itiis/SimaG14"}, "url":"URL#3725837" }, { "@score":"1", "@id":"3725838", "info":{"authors":{"author":{"@pid":"144/0425","text":"In Kuk Song"}},"title":"Emerging Internet Technology & Service toward Government 3.0.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"2","pages":"540-546","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/Song14","doi":"10.3837/TIIS.2014.02.012","ee":"https://doi.org/10.3837/tiis.2014.02.012","url":"https://dblp.org/rec/journals/itiis/Song14"}, "url":"URL#3725838" }, { "@score":"1", "@id":"3725839", "info":{"authors":{"author":[{"@pid":"80/10404","text":"Gil-Young Song"},{"@pid":"144/0377","text":"Youngjoon Cheon"},{"@pid":"144/0427","text":"Kihwang Lee"},{"@pid":"73/11183","text":"Kyung Min Park"},{"@pid":"61/4583","text":"Hae-Chang Rim"}]},"title":"Inter-category Map: Building Cognition Network of General Customers through Big Data Mining.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"2","pages":"583-600","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/SongCLPR14","doi":"10.3837/TIIS.2014.02.015","ee":"https://doi.org/10.3837/tiis.2014.02.015","url":"https://dblp.org/rec/journals/itiis/SongCLPR14"}, "url":"URL#3725839" }, { "@score":"1", "@id":"3725840", "info":{"authors":{"author":[{"@pid":"144/7228","text":"Myungseok Song"},{"@pid":"36/5994","text":"Jongpil Jeong"}]},"title":"Performance Analysis of A Novel Inter-Networking Architecture for Cost-Effective Mobility Management Support.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"4","pages":"1344-1367","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/SongJ14","doi":"10.3837/TIIS.2014.04.011","ee":"https://doi.org/10.3837/tiis.2014.04.011","url":"https://dblp.org/rec/journals/itiis/SongJ14"}, "url":"URL#3725840" }, { "@score":"1", "@id":"3725841", "info":{"authors":{"author":[{"@pid":"54/3643-2","text":"Xin Su 0002"},{"@pid":"50/4552","text":"Bing Hui"},{"@pid":"82/1422","text":"KyungHi Chang"}]},"title":"Robust Decision Feedback Equalizer for OFDM System under Severe ISI Channel.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"6","pages":"1914-1925","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/SuHC14","doi":"10.3837/TIIS.2014.06.006","ee":"https://doi.org/10.3837/tiis.2014.06.006","url":"https://dblp.org/rec/journals/itiis/SuHC14"}, "url":"URL#3725841" }, { "@score":"1", "@id":"3725842", "info":{"authors":{"author":[{"@pid":"149/6954","text":"Sanjay Kumar Suman"},{"@pid":"41/2249","text":"Dhananjay Kumar"},{"@pid":"149/6978-1","text":"L. Bhagyalakshmi 0001"}]},"title":"SINR Pricing in Non Cooperative Power Control Game for Wireless Ad Hoc Networks.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"7","pages":"2281-2301","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/SumanKB14","doi":"10.3837/TIIS.2014.07.005","ee":"https://doi.org/10.3837/tiis.2014.07.005","url":"https://dblp.org/rec/journals/itiis/SumanKB14"}, "url":"URL#3725842" }, { "@score":"1", "@id":"3725843", "info":{"authors":{"author":[{"@pid":"89/6413","text":"Xin Tan"},{"@pid":"97/2274-8","text":"Yu Liu 0008"},{"@pid":"181/2621-11","text":"Zheng Zhang 0011"},{"@pid":"05/2983","text":"Maojun Zhang"}]},"title":"High-frame-rate Video Denoising for Ultra-low Illumination.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"11","pages":"4170-4188","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/TanLZZ14","doi":"10.3837/TIIS.2014.11.029","ee":"https://doi.org/10.3837/tiis.2014.11.029","url":"https://dblp.org/rec/journals/itiis/TanLZZ14"}, "url":"URL#3725843" }, { "@score":"1", "@id":"3725844", "info":{"authors":{"author":[{"@pid":"53/9871","text":"Zhenzhou Tang"},{"@pid":"96/3995-1","text":"Hongyu Wang 0001"},{"@pid":"55/7775","text":"Qian Hu"},{"@pid":"142/3920","text":"Xiukai Ruan"}]},"title":"Linear Network Coding in Convergecast of Wireless Sensor Networks: Friend or Foe?","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"9","pages":"3056-3074","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/Tang0HR14","doi":"10.3837/TIIS.2014.09.006","ee":"https://doi.org/10.3837/tiis.2014.09.006","url":"https://dblp.org/rec/journals/itiis/Tang0HR14"}, "url":"URL#3725844" }, { "@score":"1", "@id":"3725845", "info":{"authors":{"author":[{"@pid":"81/8195","text":"Anup Thapa"},{"@pid":"61/4074","text":"Kyung Sup Kwak"},{"@pid":"41/2375","text":"Seokjoo Shin"}]},"title":"Efficient Transmission Mode Selection Scheme for MIMO-based WLANs.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"7","pages":"2365-2382","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/ThapaKS14","doi":"10.3837/TIIS.2014.07.009","ee":"https://doi.org/10.3837/tiis.2014.07.009","url":"https://dblp.org/rec/journals/itiis/ThapaKS14"}, "url":"URL#3725845" }, { "@score":"1", "@id":"3725846", "info":{"authors":{"author":[{"@pid":"15/4658","text":"Yu Tian"},{"@pid":"04/7083","text":"Linhua Ma"},{"@pid":"153/6640","text":"Le Ru"},{"@pid":"00/2111","text":"Hong Tang"},{"@pid":"70/5472","text":"Bo Song"}]},"title":"A Signal Characteristic Based Cluster Scheme for Aeronautical Ad Hoc Networks.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"10","pages":"3439-3457","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/TianMRTS14","doi":"10.3837/TIIS.2014.10.009","ee":"https://doi.org/10.3837/tiis.2014.10.009","url":"https://dblp.org/rec/journals/itiis/TianMRTS14"}, "url":"URL#3725846" }, { "@score":"1", "@id":"3725847", "info":{"authors":{"author":[{"@pid":"147/1356","text":"Anh Tai Tran"},{"@pid":"26/7388","text":"Myung Kyun Kim"}]},"title":"End-to-end Reliable Message Transmission Considering Load Balancing in Wireless Networks.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"9","pages":"3094-3109","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/TranK14","doi":"10.3837/TIIS.2014.09.008","ee":"https://doi.org/10.3837/tiis.2014.09.008","url":"https://dblp.org/rec/journals/itiis/TranK14"}, "url":"URL#3725847" }, { "@score":"1", "@id":"3725848", "info":{"authors":{"author":[{"@pid":"146/3695","text":"Phuc Huu Truong"},{"@pid":"38/2351","text":"Chang-Woo Park"},{"@pid":"33/7590-1","text":"Minsik Lee 0001"},{"@pid":"82/846","text":"Sang-Il Choi"},{"@pid":"25/6834","text":"Sang-Hoon Ji"},{"@pid":"15/1187","text":"Gu-Min Jeong"}]},"title":"Rapid Implementation of 3D Facial Reconstruction from a Single Image on an Android Mobile Device.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"5","pages":"1690-1710","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/TruongPLCJJ14","doi":"10.3837/TIIS.2014.05.011","ee":"https://doi.org/10.3837/tiis.2014.05.011","url":"https://dblp.org/rec/journals/itiis/TruongPLCJJ14"}, "url":"URL#3725848" }, { "@score":"1", "@id":"3725849", "info":{"authors":{"author":[{"@pid":"45/4549","text":"Yuan-Yu Tsai"},{"@pid":"92/10087","text":"Jian-Ting Chen"},{"@pid":"152/0812","text":"Yin-Chi Kuo"},{"@pid":"63/1930","text":"Chi-Shiang Chan"}]},"title":"A Generalized Image Interpolation-based Reversible Data Hiding Scheme with High Embedding Capacity and Image Quality.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"9","pages":"3286-3301","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/TsaiCKC14","doi":"10.3837/TIIS.2014.09.019","ee":"https://doi.org/10.3837/tiis.2014.09.019","url":"https://dblp.org/rec/journals/itiis/TsaiCKC14"}, "url":"URL#3725849" }, { "@score":"1", "@id":"3725850", "info":{"authors":{"author":[{"@pid":"84/1959","text":"Shu-Ming Tseng"},{"@pid":"156/5050","text":"Li-Hsin Chiang"},{"@pid":"64/6370","text":"Yung-Chung Wang"}]},"title":"Throughput of Coded DS CDMA/Unslotted ALOHA Networks with Variable Length Data Traffic and Two User Classes in Rayleigh Fading FSMC Model.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"12","pages":"4324-4342","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/TsengCW14","doi":"10.3837/TIIS.2014.12.005","ee":"https://doi.org/10.3837/tiis.2014.12.005","url":"https://dblp.org/rec/journals/itiis/TsengCW14"}, "url":"URL#3725850" }, { "@score":"1", "@id":"3725851", "info":{"authors":{"author":[{"@pid":"08/3526","text":"Ching-Ting Tu"},{"@pid":"57/58","text":"Hwei-Jen Lin"},{"@pid":"91/3148","text":"Fu-Wen Yang"},{"@pid":"68/2449","text":"Hsiao-Wei Chang"}]},"title":"Approximate Detection Method for Image Up-Sampling.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"2","pages":"462-482","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/TuLYC14","doi":"10.3837/TIIS.2014.02.008","ee":"https://doi.org/10.3837/tiis.2014.02.008","url":"https://dblp.org/rec/journals/itiis/TuLYC14"}, "url":"URL#3725851" }, { "@score":"1", "@id":"3725852", "info":{"authors":{"author":[{"@pid":"84/1754","text":"Dejun Wang"},{"@pid":"181/2839","text":"Kai Chen"},{"@pid":"86/2322","text":"Weiping Sun"},{"@pid":"41/1177","text":"Shengsheng Yu"},{"@pid":"148/0689","text":"Hanbing Wang"}]},"title":"Efficient Mean-Shift Tracking Using an Improved Weighted Histogram Scheme.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"6","pages":"1964-1981","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/WangCSYW14","doi":"10.3837/TIIS.2014.06.009","ee":"https://doi.org/10.3837/tiis.2014.06.009","url":"https://dblp.org/rec/journals/itiis/WangCSYW14"}, "url":"URL#3725852" }, { "@score":"1", "@id":"3725853", "info":{"authors":{"author":[{"@pid":"75/7032","text":"Zhifei Wang"},{"@pid":"60/4122","text":"Su Deng"},{"@pid":"61/2895","text":"Hongbin Huang"},{"@pid":"62/7666","text":"Yahui Wu"}]},"title":"Performance Analysis of Information Propagation in DTN-like Scale-free Mobile Social Network.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"11","pages":"3984-3996","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/WangDHW14","doi":"10.3837/TIIS.2014.11.018","ee":"https://doi.org/10.3837/tiis.2014.11.018","url":"https://dblp.org/rec/journals/itiis/WangDHW14"}, "url":"URL#3725853" }, { "@score":"1", "@id":"3725854", "info":{"authors":{"author":[{"@pid":"84/2694","text":"Yong Wang"},{"@pid":"57/7053","text":"Shiqiang Hu"}]},"title":"Chaotic Features for Traffic Video Classification.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"8","pages":"2833-2850","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/WangH14","doi":"10.3837/TIIS.2014.08.015","ee":"https://doi.org/10.3837/tiis.2014.08.015","url":"https://dblp.org/rec/journals/itiis/WangH14"}, "url":"URL#3725854" }, { "@score":"1", "@id":"3725855", "info":{"authors":{"author":[{"@pid":"84/2694","text":"Yong Wang"},{"@pid":"57/7053","text":"Shiqiang Hu"}]},"title":"Exploiting Chaotic Feature Vector for Dynamic Textures Recognition.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"11","pages":"4137-4152","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/WangH14a","doi":"10.3837/TIIS.2014.11.027","ee":"https://doi.org/10.3837/tiis.2014.11.027","url":"https://dblp.org/rec/journals/itiis/WangH14a"}, "url":"URL#3725855" }, { "@score":"1", "@id":"3725856", "info":{"authors":{"author":[{"@pid":"46/2005","text":"Ning Wang"},{"@pid":"72/2266","text":"Li Lu"},{"@pid":"16/7040","text":"Ge Gao"},{"@pid":"68/6019","text":"Fanglin Wang"},{"@pid":"31/4501","text":"Shi Li"}]},"title":"Multibiometrics Fusion using Acz el-Alsina Triangular Norm.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"7","pages":"2420-2433","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/WangLGWL14","doi":"10.3837/TIIS.2014.07.012","ee":"https://doi.org/10.3837/tiis.2014.07.012","url":"https://dblp.org/rec/journals/itiis/WangLGWL14"}, "url":"URL#3725856" }, { "@score":"1", "@id":"3725857", "info":{"authors":{"author":[{"@pid":"02/736","text":"Jing Wang"},{"@pid":"135/3887","text":"Mingming Lin"},{"@pid":"36/310","text":"Xuemin Hong"},{"@pid":"35/8607","text":"Jianghong Shi"}]},"title":"QoS-Guaranteed Capacity of Centralized Cognitive Radio Networks with Interference Averaging Techniques.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"1","pages":"18-34","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/WangLHS14","doi":"10.3837/TIIS.2014.01.002","ee":"https://doi.org/10.3837/tiis.2014.01.002","url":"https://dblp.org/rec/journals/itiis/WangLHS14"}, "url":"URL#3725857" }, { "@score":"1", "@id":"3725858", "info":{"authors":{"author":[{"@pid":"03/2326","text":"Jenq-Haur Wang"},{"@pid":"58/2882","text":"Chuan-Ming Liu"},{"@pid":"141/0845","text":"Jhih-Siang Syu"},{"@pid":"15/4143","text":"Yen-Lin Chen"}]},"title":"An Image Retrieving Scheme Using Salient Features and Annotation Watermarking.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"1","pages":"213-231","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/WangLSC14","doi":"10.3837/TIIS.2014.01.013","ee":"https://doi.org/10.3837/tiis.2014.01.013","url":"https://dblp.org/rec/journals/itiis/WangLSC14"}, "url":"URL#3725858" }, { "@score":"1", "@id":"3725859", "info":{"authors":{"author":[{"@pid":"37/2749-1","text":"Jingyu Wang 0001"},{"@pid":"60/4951","text":"Jianxin Liao"},{"@pid":"02/736-39","text":"Jing Wang 0039"},{"@pid":"98/4254","text":"Tonghong Li"},{"@pid":"80/6406-1","text":"Qi Qi 0001"}]},"title":"Estimating the Effects of Multipath Selection on Concurrent Multipath Transfer.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"4","pages":"1406-1423","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/WangLWLQ14","doi":"10.3837/TIIS.2014.04.014","ee":"https://doi.org/10.3837/tiis.2014.04.014","url":"https://dblp.org/rec/journals/itiis/WangLWLQ14"}, "url":"URL#3725859" }, { "@score":"1", "@id":"3725860", "info":{"authors":{"author":[{"@pid":"83/5522-11","text":"Hong Wang 0011"},{"@pid":"15/8388","text":"Rongfang Song"}]},"title":"Clustering Based Adaptive Power Control for Interference Mitigation in Two-Tier Femtocell Networks.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"4","pages":"1424-1441","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/WangS14","doi":"10.3837/TIIS.2014.04.015","ee":"https://doi.org/10.3837/tiis.2014.04.015","url":"https://dblp.org/rec/journals/itiis/WangS14"}, "url":"URL#3725860" }, { "@score":"1", "@id":"3725861", "info":{"authors":{"author":[{"@pid":"12/5838","text":"Tao Wang"},{"@pid":"71/3634","text":"Limin Shen"},{"@pid":"87/5241","text":"Chuan Ma"}]},"title":"A Process Algebra-Based Detection Model for Multithreaded Programs in Communication System.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"3","pages":"965-983","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/WangSM14","doi":"10.3837/TIIS.2014.03.014","ee":"https://doi.org/10.3837/tiis.2014.03.014","url":"https://dblp.org/rec/journals/itiis/WangSM14"}, "url":"URL#3725861" }, { "@score":"1", "@id":"3725862", "info":{"authors":{"author":[{"@pid":"150/2237","text":"Cungang Wang"},{"@pid":"13/1898-52","text":"Bin Wang 0052"},{"@pid":"71/571","text":"Liping Zheng"}]},"title":"Learning Free Energy Kernel for Image Retrieval.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"8","pages":"2895-2912","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/WangWZ14","doi":"10.3837/TIIS.2014.08.019","ee":"https://doi.org/10.3837/tiis.2014.08.019","url":"https://dblp.org/rec/journals/itiis/WangWZ14"}, "url":"URL#3725862" }, { "@score":"1", "@id":"3725863", "info":{"authors":{"author":[{"@pid":"65/2749-1","text":"Zhi-Hui Wang 0001"},{"@pid":"136/7688","text":"Hai-Rui Yang"},{"@pid":"c/ChinChenChang","text":"Chin-Chen Chang 0001"},{"@pid":"91/4357","text":"Gwoboa Horng"},{"@pid":"43/1961","text":"Ying-Hsuan Huang"}]},"title":"Lossless VQ Indices Compression Based on the High Correlation of Adjacent Image Blocks.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"8","pages":"2913-2929","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/WangYCHH14","doi":"10.3837/TIIS.2014.08.020","ee":"https://doi.org/10.3837/tiis.2014.08.020","url":"https://dblp.org/rec/journals/itiis/WangYCHH14"}, "url":"URL#3725863" }, { "@score":"1", "@id":"3725864", "info":{"authors":{"author":[{"@pid":"46/2005","text":"Ning Wang"},{"@pid":"48/450-4","text":"Yang Yang 0004"},{"@pid":"153/6727","text":"Liyuan Feng"},{"@pid":"05/8605","text":"Zhenqiang Mi"},{"@pid":"79/3122","text":"Kun Meng"},{"@pid":"78/150","text":"Qing Ji"}]},"title":"SVM-Based Incremental Learning Algorithm for Large-Scale Data Stream in Cloud Computing.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"10","pages":"3378-3393","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/WangYFMMJ14","doi":"10.3837/TIIS.2014.10.005","ee":"https://doi.org/10.3837/tiis.2014.10.005","url":"https://dblp.org/rec/journals/itiis/WangYFMMJ14"}, "url":"URL#3725864" }, { "@score":"1", "@id":"3725865", "info":{"authors":{"author":[{"@pid":"21/1550-5","text":"Jianping Wang 0005"},{"@pid":"87/5735","text":"Jing Yan"},{"@pid":"44/4618","text":"Zhen He"}]},"title":"Overlapped Segmental Clipping for the PAPR Reduction of the OFDM-OQAM system.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"8","pages":"2783-2795","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/WangYH14","doi":"10.3837/TIIS.2014.08.012","ee":"https://doi.org/10.3837/tiis.2014.08.012","url":"https://dblp.org/rec/journals/itiis/WangYH14"}, "url":"URL#3725865" }, { "@score":"1", "@id":"3725866", "info":{"authors":{"author":[{"@pid":"89/1993","text":"Jong-Jin Won"},{"@pid":"147/1779","text":"Cheoloh Kang"},{"@pid":"92/4683","text":"Moon-Hyun Kim"},{"@pid":"63/1954","text":"Moon-Haeng Cho"}]},"title":"Deterministic Multi-dimensional Task Scheduling Algorithms for Wearable Sensor Devices.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"10","pages":"3423-3438","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/WonKKC14","doi":"10.3837/TIIS.2014.10.008","ee":"https://doi.org/10.3837/tiis.2014.10.008","url":"https://dblp.org/rec/journals/itiis/WonKKC14"}, "url":"URL#3725866" }, { "@score":"1", "@id":"3725867", "info":{"authors":{"author":[{"@pid":"141/0828","text":"Xiaolu Wu"},{"@pid":"60/9804","text":"Yueyun Chen"}]},"title":"Joint Resource Allocation for Cellular and D2D Multicast Based on Cognitive Radio.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"1","pages":"91-107","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/WuC14","doi":"10.3837/TIIS.2014.01.006","ee":"https://doi.org/10.3837/tiis.2014.01.006","url":"https://dblp.org/rec/journals/itiis/WuC14"}, "url":"URL#3725867" }, { "@score":"1", "@id":"3725868", "info":{"authors":{"author":[{"@pid":"05/2856","text":"Tzong-Sun Wu"},{"@pid":"47/9344","text":"Yih-Sen Chen"},{"@pid":"82/2264","text":"Han-Yu Lin"}]},"title":"Toward Efficient Convertible Authenticated Encryption Schemes Using Self-Certified Public Key System.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"3","pages":"1157-1177","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/WuCL14","doi":"10.3837/TIIS.2014.03.026","ee":"https://doi.org/10.3837/tiis.2014.03.026","url":"https://dblp.org/rec/journals/itiis/WuCL14"}, "url":"URL#3725868" }, { "@score":"1", "@id":"3725869", "info":{"authors":{"author":[{"@pid":"141/0907","text":"Menglin Wu"},{"@pid":"62/2719-4","text":"Qiang Chen 0004"},{"@pid":"53/367","text":"Quan-Sen Sun"}]},"title":"Medical Image Retrieval with Relevance Feedback via Pairwise Constraint Propagation.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"1","pages":"249-268","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/WuCS14","doi":"10.3837/TIIS.2014.01.015","ee":"https://doi.org/10.3837/tiis.2014.01.015","url":"https://dblp.org/rec/journals/itiis/WuCS14"}, "url":"URL#3725869" }, { "@score":"1", "@id":"3725870", "info":{"authors":{"author":[{"@pid":"126/5310","text":"Minghu Wu"},{"@pid":"96/7816","text":"Xiuchang Zhu"}]},"title":"Distributed Video Compressive Sensing Reconstruction by Adaptive PCA Sparse Basis and Nonlocal Similarity.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"8","pages":"2851-2865","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/WuZ14","doi":"10.3837/TIIS.2014.08.016","ee":"https://doi.org/10.3837/tiis.2014.08.016","url":"https://dblp.org/rec/journals/itiis/WuZ14"}, "url":"URL#3725870" }, { "@score":"1", "@id":"3725871", "info":{"authors":{"author":[{"@pid":"72/195","text":"Lih-Chyau Wuu"},{"@pid":"85/1101","text":"Chi-Hsiang Hung"},{"@pid":"82/2421","text":"Wen-Chung Kuo"}]},"title":"Group Key Management based on (2, 2) Secret Sharing.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"3","pages":"1144-1156","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/WuuHK14","doi":"10.3837/TIIS.2014.03.025","ee":"https://doi.org/10.3837/tiis.2014.03.025","url":"https://dblp.org/rec/journals/itiis/WuuHK14"}, "url":"URL#3725871" }, { "@score":"1", "@id":"3725872", "info":{"authors":{"author":[{"@pid":"17/5533","text":"Yingjie Xia"},{"@pid":"68/10310","text":"Fubiao Xia"},{"@pid":"21/1773-2","text":"Xuejiao Liu 0002"},{"@pid":"20/3535","text":"Xin Sun"},{"@pid":"77/6530","text":"Yuncai Liu"},{"@pid":"79/5417","text":"Yi Ge"}]},"title":"An Improved Privacy Preserving Construction for Data Integrity Verification in Cloud Storage.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"10","pages":"3607-3623","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/XiaXLSLG14","doi":"10.3837/TIIS.2014.10.019","ee":"https://doi.org/10.3837/tiis.2014.10.019","url":"https://dblp.org/rec/journals/itiis/XiaXLSLG14"}, "url":"URL#3725872" }, { "@score":"1", "@id":"3725873", "info":{"authors":{"author":[{"@pid":"148/0695","text":"Huaxin Xiao"},{"@pid":"97/2274-8","text":"Yu Liu 0008"},{"@pid":"148/0690","text":"Shuren Tan"},{"@pid":"02/109","text":"Jiang Duan"},{"@pid":"05/2983","text":"Maojun Zhang"}]},"title":"A Noisy Videos Background Subtraction Algorithm Based on Dictionary Learning.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"6","pages":"1946-1963","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/XiaoLTDZ14","doi":"10.3837/TIIS.2014.06.008","ee":"https://doi.org/10.3837/tiis.2014.06.008","url":"https://dblp.org/rec/journals/itiis/XiaoLTDZ14"}, "url":"URL#3725873" }, { "@score":"1", "@id":"3725874", "info":{"authors":{"author":[{"@pid":"138/4337","text":"Junjie Xie"},{"@pid":"74/6501","text":"Deke Guo"},{"@pid":"95/3616-5","text":"Jia Xu 0005"},{"@pid":"147/1462","text":"Lailong Luo"},{"@pid":"147/1358","text":"Xiaoqiang Teng"}]},"title":"Efficient Multicast Routing on BCube-Based Data Centers.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"12","pages":"4343-4355","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/XieGXLT14","doi":"10.3837/TIIS.2014.12.006","ee":"https://doi.org/10.3837/tiis.2014.12.006","url":"https://dblp.org/rec/journals/itiis/XieGXLT14"}, "url":"URL#3725874" }, { "@score":"1", "@id":"3725875", "info":{"authors":{"author":[{"@pid":"31/7623","text":"Jinbo Xiong"},{"@pid":"34/121","text":"Zhiqiang Yao"},{"@pid":"12/6604-1","text":"Jianfeng Ma 0001"},{"@pid":"134/3945","text":"Ximeng Liu"},{"@pid":"181/2688-11","text":"Qi Li 0011"},{"@pid":"91/4845","text":"Jun Ma"}]},"title":"PRIAM: Privacy Preserving Identity and Access Management Scheme in Cloud.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"1","pages":"282-304","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/XiongYMLLM14","doi":"10.3837/TIIS.2014.01.017","ee":"https://doi.org/10.3837/tiis.2014.01.017","url":"https://dblp.org/rec/journals/itiis/XiongYMLLM14"}, "url":"URL#3725875" }, { "@score":"1", "@id":"3725876", "info":{"authors":{"author":[{"@pid":"94/5218","text":"Shaoyi Xu"},{"@pid":"61/4074","text":"Kyung Sup Kwak"},{"@pid":"r/RameshRRao","text":"Ramesh R. Rao"}]},"title":"Interference-Aware Radio Resource Allocation in D2D Underlaying LTE-Advanced Networks.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"8","pages":"2626-2646","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/XuKR14","doi":"10.3837/TIIS.2014.08.003","ee":"https://doi.org/10.3837/tiis.2014.08.003","url":"https://dblp.org/rec/journals/itiis/XuKR14"}, "url":"URL#3725876" }, { "@score":"1", "@id":"3725877", "info":{"authors":{"author":[{"@pid":"125/0293","text":"Tangwen Xu"},{"@pid":"159/5787","text":"Zhenshuang Li"},{"@pid":"89/1900","text":"Jianhua Ge"},{"@pid":"25/4799","text":"Haiyang Ding"}]},"title":"A Survey on Spectrum Sharing in Cognitive Radio Networks.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"11","pages":"3751-3774","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/XuLGD14","doi":"10.3837/TIIS.2014.11.006","ee":"https://doi.org/10.3837/tiis.2014.11.006","url":"https://dblp.org/rec/journals/itiis/XuLGD14"}, "url":"URL#3725877" }, { "@score":"1", "@id":"3725878", "info":{"authors":{"author":[{"@pid":"03/2611","text":"Feng Xu"},{"@pid":"52/1775","text":"Xin Lv"},{"@pid":"15/3785","text":"Qi Zhou"},{"@pid":"13/5407","text":"Xuan Liu"}]},"title":"Self-Updating One-Time Password Mutual Authentication Protocol for Ad Hoc Network.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"5","pages":"1817-1827","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/XuLZL14","doi":"10.3837/TIIS.2014.05.018","ee":"https://doi.org/10.3837/tiis.2014.05.018","url":"https://dblp.org/rec/journals/itiis/XuLZL14"}, "url":"URL#3725878" }, { "@score":"1", "@id":"3725879", "info":{"authors":{"author":[{"@pid":"39/7417","text":"WeiYe Xu"},{"@pid":"53/3310-1","text":"Qingyun Wang 0001"},{"@pid":"94/3104-37","text":"Ying Wang 0037"},{"@pid":"38/2008","text":"Binbin Wu"}]},"title":"Downlink Performance of Distributed Antenna Systems in MIMO Composite Fading Channel.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"10","pages":"3342-3360","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/XuWWW14","doi":"10.3837/TIIS.2014.10.003","ee":"https://doi.org/10.3837/tiis.2014.10.003","url":"https://dblp.org/rec/journals/itiis/XuWWW14"}, "url":"URL#3725879" }, { "@score":"1", "@id":"3725880", "info":{"authors":{"author":[{"@pid":"15/49","text":"Chunxiang Xu"},{"@pid":"48/2168-6","text":"Yuan Zhang 0006"},{"@pid":"43/5685-2","text":"Yong Yu 0002"},{"@pid":"24/3507","text":"Xiaojun Zhang"},{"@pid":"156/6664","text":"Junwei Wen"}]},"title":"An Efficient Provable Secure Public Auditing Scheme for Cloud Storage.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"11","pages":"4226-4241","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/XuZYZW14","doi":"10.3837/TIIS.2014.11.032","ee":"https://doi.org/10.3837/tiis.2014.11.032","url":"https://dblp.org/rec/journals/itiis/XuZYZW14"}, "url":"URL#3725880" }, { "@score":"1", "@id":"3725881", "info":{"authors":{"author":{"@pid":"33/66","text":"Janghoon Yang"}},"title":"A Markov Decision Process (MDP) based Load Balancing Algorithm for Multi-cell Networks with Multi-carriers.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"10","pages":"3394-3408","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/Yang14","doi":"10.3837/TIIS.2014.10.006","ee":"https://doi.org/10.3837/tiis.2014.10.006","url":"https://dblp.org/rec/journals/itiis/Yang14"}, "url":"URL#3725881" }, { "@score":"1", "@id":"3725882", "info":{"authors":{"author":[{"@pid":"148/0708","text":"HyeJoo Yang"},{"@pid":"148/0510","text":"DaeSun Ko"},{"@pid":"148/0581","text":"InSung Yeo"}]},"title":"Effects of Computer-Mediated Communication on Achievement Goals in Athletic Performance.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"6","pages":"2197-2211","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/YangKY14","doi":"10.3837/TIIS.2014.06.023","ee":"https://doi.org/10.3837/tiis.2014.06.023","url":"https://dblp.org/rec/journals/itiis/YangKY14"}, "url":"URL#3725882" }, { "@score":"1", "@id":"3725883", "info":{"authors":{"author":[{"@pid":"149/6970","text":"Xuezhou Yang"},{"@pid":"58/1874","text":"Wei Tang"},{"@pid":"71/6601","text":"Wei Guo"}]},"title":"Efficient Resource Allocation with Multiple Practical Constraints in OFDM-based Cooperative Cognitive Radio Networks.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"7","pages":"2350-2364","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/YangTG14","doi":"10.3837/TIIS.2014.07.008","ee":"https://doi.org/10.3837/tiis.2014.07.008","url":"https://dblp.org/rec/journals/itiis/YangTG14"}, "url":"URL#3725883" }, { "@score":"1", "@id":"3725884", "info":{"authors":{"author":[{"@pid":"149/6970","text":"Xuezhou Yang"},{"@pid":"58/1874","text":"Wei Tang"},{"@pid":"71/6601","text":"Wei Guo"}]},"title":"Efficient Joint Resource Allocation for OFDM-Based Cooperative Cognitive Radio Networks with Rate-Guarantee.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"9","pages":"3004-3015","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/YangTG14a","doi":"10.3837/TIIS.2014.09.003","ee":"https://doi.org/10.3837/tiis.2014.09.003","url":"https://dblp.org/rec/journals/itiis/YangTG14a"}, "url":"URL#3725884" }, { "@score":"1", "@id":"3725885", "info":{"authors":{"author":[{"@pid":"28/8547","text":"Meng Yi"},{"@pid":"93/4757","text":"Bao-Long Guo"},{"@pid":"45/8540","text":"Chunman Yan"}]},"title":"Improved Image Alignment Algorithm Based on Projective Invariant for Aerial Video Stabilization.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"9","pages":"3177-3195","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/YiGY14","doi":"10.3837/TIIS.2014.09.013","ee":"https://doi.org/10.3837/tiis.2014.09.013","url":"https://dblp.org/rec/journals/itiis/YiGY14"}, "url":"URL#3725885" }, { "@score":"1", "@id":"3725886", "info":{"authors":{"author":[{"@pid":"146/3716","text":"Leng-Gan Yi"},{"@pid":"75/5278","text":"Yimin Lu"}]},"title":"Two-Tier Interference Elimination for Femtocells Based on Cognitive Radio Centralized Spectrum Management.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"5","pages":"1514-1531","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/YiL14","doi":"10.3837/TIIS.2014.05.001","ee":"https://doi.org/10.3837/tiis.2014.05.001","url":"https://dblp.org/rec/journals/itiis/YiL14"}, "url":"URL#3725886" }, { "@score":"1", "@id":"3725887", "info":{"authors":{"author":[{"@pid":"153/6719","text":"Xiaoqing Yin"},{"@pid":"38/1164","text":"Weili Li"},{"@pid":"13/1898-43","text":"Bin Wang 0043"},{"@pid":"97/2274-8","text":"Yu Liu 0008"},{"@pid":"05/2983","text":"Maojun Zhang"}]},"title":"A Novel Video Stitching Method for Multi-Camera Surveillance Systems.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"10","pages":"3538-3556","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/YinLWLZ14","doi":"10.3837/TIIS.2014.10.015","ee":"https://doi.org/10.3837/tiis.2014.10.015","url":"https://dblp.org/rec/journals/itiis/YinLWLZ14"}, "url":"URL#3725887" }, { "@score":"1", "@id":"3725888", "info":{"authors":{"author":{"@pid":"11/4314","text":"Seung-Hyun Yoon"}},"title":"A Sweep Surface Based on Bivariate B-spline Motion.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"3","pages":"1026-1039","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/Yoon14","doi":"10.3837/TIIS.2014.03.018","ee":"https://doi.org/10.3837/tiis.2014.03.018","url":"https://dblp.org/rec/journals/itiis/Yoon14"}, "url":"URL#3725888" }, { "@score":"1", "@id":"3725889", "info":{"authors":{"author":[{"@pid":"63/5999","text":"Seokung Yoon"},{"@pid":"19/2291","text":"Haeryong Park"},{"@pid":"92/5731","text":"Hyeong Seon Yoo"}]},"title":"Development of Indicators for Information Security Level Assessment of VoIP Service Providers.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"2","pages":"634-645","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/YoonPY14","doi":"10.3837/TIIS.2014.02.018","ee":"https://doi.org/10.3837/tiis.2014.02.018","url":"https://dblp.org/rec/journals/itiis/YoonPY14"}, "url":"URL#3725889" }, { "@score":"1", "@id":"3725890", "info":{"authors":{"author":[{"@pid":"50/6639","text":"Xiangbin Yu 0001"},{"@pid":"152/0947","text":"Wenting Tan"},{"@pid":"94/3104-37","text":"Ying Wang 0037"},{"@pid":"131/1661","text":"Xiaoshuai Liu"},{"@pid":"55/3387","text":"Yun Rui"},{"@pid":"99/311-1","text":"Ming Chen 0001"}]},"title":"Performance Analysis of Distributed Antenna Systems with Antenna Selection over MIMO Rayleigh Fading Channel.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"9","pages":"3016-3033","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/YuTWLRC14","doi":"10.3837/TIIS.2014.09.004","ee":"https://doi.org/10.3837/tiis.2014.09.004","url":"https://dblp.org/rec/journals/itiis/YuTWLRC14"}, "url":"URL#3725890" }, { "@score":"1", "@id":"3725891", "info":{"authors":{"author":[{"@pid":"141/0745","text":"Wen-sen Yu"},{"@pid":"67/4538","text":"Ming-hui Wang"},{"@pid":"16/10424","text":"Hua-wen Chang"},{"@pid":"126/0859","text":"Shu-qing Chen"}]},"title":"A Fast Kernel Regression Framework for Video Super-Resolution.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"1","pages":"232-248","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/YuWCC14","doi":"10.3837/TIIS.2014.01.014","ee":"https://doi.org/10.3837/tiis.2014.01.014","url":"https://dblp.org/rec/journals/itiis/YuWCC14"}, "url":"URL#3725891" }, { "@score":"1", "@id":"3725892", "info":{"authors":{"author":[{"@pid":"86/3457-6","text":"Jia Yu 0006"},{"@pid":"82/4227","text":"Shaohua Wu"},{"@pid":"59/554","text":"Xiaodong Lin 0001"},{"@pid":"10/2002","text":"Qinyu Zhang 0001"}]},"title":"Radio Resource Management of CoMP System in HetNet under Power and Backhaul Constraints.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"11","pages":"3876-3895","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/YuWLZ14","doi":"10.3837/TIIS.2014.11.012","ee":"https://doi.org/10.3837/tiis.2014.11.012","url":"https://dblp.org/rec/journals/itiis/YuWLZ14"}, "url":"URL#3725892" }, { "@score":"1", "@id":"3725893", "info":{"authors":{"author":[{"@pid":"72/5469","text":"Long Yu"},{"@pid":"00/638","text":"Qihui Wu"},{"@pid":"92/2443","text":"Jinlong Wang"}]},"title":"Optimal Adaptive Multiband Spectrum Sensing in Cognitive Radio Networks.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"3","pages":"984-996","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/YuWW14","doi":"10.3837/TIIS.2014.03.015","ee":"https://doi.org/10.3837/tiis.2014.03.015","url":"https://dblp.org/rec/journals/itiis/YuWW14"}, "url":"URL#3725893" }, { "@score":"1", "@id":"3725894", "info":{"authors":{"author":[{"@pid":"31/3845-2","text":"Yinghui Zhang 0002"},{"@pid":"c/XiaofengChen1","text":"Xiaofeng Chen 0001"},{"@pid":"48/1097-2","text":"Jin Li 0002"},{"@pid":"l/HuiLi6","text":"Hui Li 0006"},{"@pid":"20/8277","text":"Fenghua Li"}]},"title":"Attribute-Based Data Sharing with Flexible and Direct Revocation in Cloud Computing.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"11","pages":"4028-4049","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/Zhang000L14","doi":"10.3837/TIIS.2014.11.021","ee":"https://doi.org/10.3837/tiis.2014.11.021","url":"https://dblp.org/rec/journals/itiis/Zhang000L14"}, "url":"URL#3725894" }, { "@score":"1", "@id":"3725895", "info":{"authors":{"author":[{"@pid":"98/5660","text":"Xu Zhang"},{"@pid":"93/4757","text":"Baolong Guo"},{"@pid":"02/2408","text":"Yunyi Yan"},{"@pid":"09/5042-34","text":"Wei Sun 0034"},{"@pid":"28/8547","text":"Meng Yi"}]},"title":"Image Retrieval Method Based on IPDSH and SRIP.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"5","pages":"1676-1689","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/ZhangGYSY14","doi":"10.3837/TIIS.2014.05.010","ee":"https://doi.org/10.3837/tiis.2014.05.010","url":"https://dblp.org/rec/journals/itiis/ZhangGYSY14"}, "url":"URL#3725895" }, { "@score":"1", "@id":"3725896", "info":{"authors":{"author":[{"@pid":"33/748","text":"Sanfeng Zhang"},{"@pid":"45/5842-2","text":"Xiang Lan 0002"},{"@pid":"43/6294","text":"Shuang Li"}]},"title":"Analytic Throughput Model for Network Coded TCP in Wireless Mesh Networks.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"9","pages":"3110-3125","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/ZhangLL14","doi":"10.3837/TIIS.2014.09.009","ee":"https://doi.org/10.3837/tiis.2014.09.009","url":"https://dblp.org/rec/journals/itiis/ZhangLL14"}, "url":"URL#3725896" }, { "@score":"1", "@id":"3725897", "info":{"authors":{"author":[{"@pid":"132/8047","text":"Yingxian Zhang"},{"@pid":"34/4149-1","text":"Aijun Liu 0001"},{"@pid":"126/5281","text":"Xiaofei Pan"},{"@pid":"79/4170","text":"Zhan Ye"}]},"title":"A Secure MQAM Scheme Based on Signal Constellation Hopping.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"7","pages":"2246-2260","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/ZhangLPY14","doi":"10.3837/TIIS.2014.07.003","ee":"https://doi.org/10.3837/tiis.2014.07.003","url":"https://dblp.org/rec/journals/itiis/ZhangLPY14"}, "url":"URL#3725897" }, { "@score":"1", "@id":"3725898", "info":{"authors":{"author":[{"@pid":"52/5264","text":"Xing Zhang"},{"@pid":"88/3562","text":"Rongxing Lu"},{"@pid":"24/6914","text":"Hong Zhang"},{"@pid":"52/8977","text":"Chungen Xu"}]},"title":"A New Public Key Encryption Scheme based on Layered Cellular Automata.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"10","pages":"3572-3590","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/ZhangLZX14","doi":"10.3837/TIIS.2014.10.017","ee":"https://doi.org/10.3837/tiis.2014.10.017","url":"https://dblp.org/rec/journals/itiis/ZhangLZX14"}, "url":"URL#3725898" }, { "@score":"1", "@id":"3725899", "info":{"authors":{"author":[{"@pid":"15/9171","text":"Junsong Zhang"},{"@pid":"26/4870-1","text":"Jian Ma 0001"},{"@pid":"63/6031-2","text":"Xiong Li 0002"},{"@pid":"80/4406","text":"Wendong Wang"}]},"title":"A Secure and Efficient Remote User Authentication Scheme for Multi-server Environments Using ECC.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"8","pages":"2930-2947","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/ZhangMLW14","doi":"10.3837/TIIS.2014.08.021","ee":"https://doi.org/10.3837/tiis.2014.08.021","url":"https://dblp.org/rec/journals/itiis/ZhangMLW14"}, "url":"URL#3725899" }, { "@score":"1", "@id":"3725900", "info":{"authors":{"author":[{"@pid":"89/5992","text":"Li Zhang"},{"@pid":"99/3908","text":"Xianmei Wang"},{"@pid":"119/9148","text":"Yuyu Liang"}]},"title":"Hierarchical Age Estimation based on Dynamic Grouping and OHRank.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"7","pages":"2480-2495","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/ZhangWL14","doi":"10.3837/TIIS.2014.07.016","ee":"https://doi.org/10.3837/tiis.2014.07.016","url":"https://dblp.org/rec/journals/itiis/ZhangWL14"}, "url":"URL#3725900" }, { "@score":"1", "@id":"3725901", "info":{"authors":{"author":[{"@pid":"87/550","text":"Mingchuan Zhang"},{"@pid":"51/4906","text":"Changqiao Xu"},{"@pid":"47/6455","text":"Jianfeng Guan"},{"@pid":"28/6042","text":"Ruijuan Zheng"},{"@pid":"71/4515","text":"Qingtao Wu"},{"@pid":"09/5441","text":"Hongke Zhang"}]},"title":"A Novel Bio-inspired Trusted Routing Protocol for Mobile Wireless Sensor Networks.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"1","pages":"74-90","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/ZhangXGZWZ14","doi":"10.3837/TIIS.2014.01.005","ee":"https://doi.org/10.3837/tiis.2014.01.005","url":"https://dblp.org/rec/journals/itiis/ZhangXGZWZ14"}, "url":"URL#3725901" }, { "@score":"1", "@id":"3725902", "info":{"authors":{"author":[{"@pid":"81/8430","text":"Yuli Zhang"},{"@pid":"54/3817-1","text":"Yuhua Xu 0001"},{"@pid":"00/638","text":"Qihui Wu"},{"@pid":"97/4028","text":"Alagan Anpalagan"}]},"title":"Optimal Opportunistic Spectrum Access with Unknown and Heterogeneous Channel Dynamics in Cognitive Radio Networks.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"8","pages":"2675-2690","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/ZhangXWA14","doi":"10.3837/TIIS.2014.08.006","ee":"https://doi.org/10.3837/tiis.2014.08.006","url":"https://dblp.org/rec/journals/itiis/ZhangXWA14"}, "url":"URL#3725902" }, { "@score":"1", "@id":"3725903", "info":{"authors":{"author":[{"@pid":"32/5135-1","text":"Fan Zhao 0001"},{"@pid":"130/4550","text":"Kaiyang Liao"},{"@pid":"80/2191","text":"Erhu Zhang"},{"@pid":"149/6948","text":"Fangying Qu"}]},"title":"Fast Encoder Design for Multi-view Video.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"7","pages":"2464-2479","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/ZhaoLZQ14","doi":"10.3837/TIIS.2014.07.015","ee":"https://doi.org/10.3837/tiis.2014.07.015","url":"https://dblp.org/rec/journals/itiis/ZhaoLZQ14"}, "url":"URL#3725903" }, { "@score":"1", "@id":"3725904", "info":{"authors":{"author":[{"@pid":"44/4183","text":"Dongning Zhao"},{"@pid":"54/2985","text":"Weixin Xie"}]},"title":"A Semi-fragile Image Watermarking Scheme Exploiting BTC Quantization Data.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"4","pages":"1499-1513","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/ZhaoX14","doi":"10.3837/TIIS.2014.04.019","ee":"https://doi.org/10.3837/tiis.2014.04.019","url":"https://dblp.org/rec/journals/itiis/ZhaoX14"}, "url":"URL#3725904" }, { "@score":"1", "@id":"3725905", "info":{"authors":{"author":[{"@pid":"99/10365","text":"Guoqiang Zheng"},{"@pid":"31/4018","text":"Lei Fu"},{"@pid":"94/565","text":"Jishun Li"},{"@pid":"181/2821","text":"Ming Li"}]},"title":"A Large-scale Multi-track Mobile Data Collection Mechanism for Wireless Sensor Networks.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"3","pages":"857-872","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/ZhengFLL14","doi":"10.3837/TIIS.2014.03.008","ee":"https://doi.org/10.3837/tiis.2014.03.008","url":"https://dblp.org/rec/journals/itiis/ZhengFLL14"}, "url":"URL#3725905" }, { "@score":"1", "@id":"3725906", "info":{"authors":{"author":[{"@pid":"31/6916","text":"Hao Zheng"},{"@pid":"44/7694","text":"Qiaolin Ye"},{"@pid":"24/5268","text":"Zhong Jin"}]},"title":"A Novel Multiple Kernel Sparse Representation based Classification for Face Recognition.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"4","pages":"1463-1480","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/ZhengYJ14","doi":"10.3837/TIIS.2014.04.017","ee":"https://doi.org/10.3837/tiis.2014.04.017","url":"https://dblp.org/rec/journals/itiis/ZhengYJ14"}, "url":"URL#3725906" }, { "@score":"1", "@id":"3725907", "info":{"authors":{"author":[{"@pid":"89/8514","text":"Guohui Zhong"},{"@pid":"63/8512","text":"Jiaming Guo"},{"@pid":"61/5316","text":"Daiming Qu"},{"@pid":"j/TaoJiang-2","text":"Tao Jiang 0002"},{"@pid":"62/10608","text":"Jingchao Sun"}]},"title":"Generalized Likelihood Ratio Test For Cyclostationary Multi-Antenna Spectrum Sensing.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"8","pages":"2763-2782","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/ZhongGQJS14","doi":"10.3837/TIIS.2014.08.011","ee":"https://doi.org/10.3837/tiis.2014.08.011","url":"https://dblp.org/rec/journals/itiis/ZhongGQJS14"}, "url":"URL#3725907" }, { "@score":"1", "@id":"3725908", "info":{"authors":{"author":[{"@pid":"67/5664","text":"Xiaoxiong Zhong"},{"@pid":"181/2860-1","text":"Yang Qin 0001"},{"@pid":"53/2189-15","text":"Li Li 0015"}]},"title":"Transport Protocols in Cognitive Radio Networks: A Survey.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"11","pages":"3711-3730","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/ZhongQL14","doi":"10.3837/TIIS.2014.11.004","ee":"https://doi.org/10.3837/tiis.2014.11.004","url":"https://dblp.org/rec/journals/itiis/ZhongQL14"}, "url":"URL#3725908" }, { "@score":"1", "@id":"3725909", "info":{"authors":{"author":[{"@pid":"79/10179","text":"Bin Zhong"},{"@pid":"12/4711","text":"Zhongshan Zhang"},{"@pid":"74/6359","text":"Dandan Zhang"},{"@pid":"53/6133","text":"Keping Long"},{"@pid":"14/7994","text":"Haiyan Cao"}]},"title":"Partial Relay Selection in Decode and Forward Cooperative Cognitive Radio Networks over Rayleigh Fading Channels.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"11","pages":"3967-3983","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/ZhongZZLC14","doi":"10.3837/TIIS.2014.11.017","ee":"https://doi.org/10.3837/tiis.2014.11.017","url":"https://dblp.org/rec/journals/itiis/ZhongZZLC14"}, "url":"URL#3725909" }, { "@score":"1", "@id":"3725910", "info":{"authors":{"author":[{"@pid":"220/1091","text":"Zhenji Zhou"},{"@pid":"41/9809","text":"Lifa Wu"},{"@pid":"37/7732","text":"Zheng Hong"},{"@pid":"141/0803","text":"Ming-fei Xu"},{"@pid":"128/3424","text":"Fan Pan"}]},"title":"DTSTM: Dynamic Tree Style Trust Measurement Model for Cloud Computing.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"1","pages":"305-325","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/ZhouWHXP14","doi":"10.3837/TIIS.2014.01.018","ee":"https://doi.org/10.3837/tiis.2014.01.018","url":"https://dblp.org/rec/journals/itiis/ZhouWHXP14"}, "url":"URL#3725910" }, { "@score":"1", "@id":"3725911", "info":{"authors":{"author":[{"@pid":"01/2082-5","text":"Ying Zhu 0005"},{"@pid":"49/1245-29","text":"Jia Liu 0029"},{"@pid":"48/195-1","text":"Zhiyong Feng 0001"},{"@pid":"77/2428-3","text":"Ping Zhang 0003"}]},"title":"Analysis of Improved Cyclostationary Spectrum Sensing with SLC Diversity over Composite Multipath Fading-Lognormal Shadowing Channels.","venue":"KSII Trans. Internet Inf. Syst.","volume":"8","number":"3","pages":"799-818","year":"2014","type":"Journal Articles","access":"open","key":"journals/itiis/ZhuLFZ14","doi":"10.3837/TIIS.2014.03.005","ee":"https://doi.org/10.3837/tiis.2014.03.005","url":"https://dblp.org/rec/journals/itiis/ZhuLFZ14"}, "url":"URL#3725911" } ] } } } )