default search action
Search dblp for Publications
export results for "toc:db/journals/ijmcmc/ijmcmc6.bht:"
@article{DBLP:journals/ijmcmc/AmatoVM14, author = {Alba Amato and Salvatore Venticinque and Beniamino Di Martino}, title = {A Distributed and Scalable Solution for Applying Semantic Techniques to Big Data}, journal = {Int. J. Mob. Comput. Multim. Commun.}, volume = {6}, number = {2}, pages = {50--67}, year = {2014}, url = {https://doi.org/10.4018/ijmcmc.2014040105}, doi = {10.4018/IJMCMC.2014040105}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijmcmc/AmatoVM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmcmc/AwadA14, author = {Wasan Shaker Awad and Hanin Mohammed Abdullah}, title = {Improving the Security of Storage Systems: Bahrain Case Study}, journal = {Int. J. Mob. Comput. Multim. Commun.}, volume = {6}, number = {3}, pages = {75--105}, year = {2014}, url = {https://doi.org/10.4018/IJMCMC.2014070104}, doi = {10.4018/IJMCMC.2014070104}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijmcmc/AwadA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmcmc/BorisenkoKS14, author = {Konstantin Borisenko and Ivan Kholod and Andrey Shorov}, title = {Framework for Infrastructure Attack Modeling in Hybrid Networks}, journal = {Int. J. Mob. Comput. Multim. Commun.}, volume = {6}, number = {4}, pages = {98--114}, year = {2014}, url = {https://doi.org/10.4018/IJMCMC.2014100106}, doi = {10.4018/IJMCMC.2014100106}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijmcmc/BorisenkoKS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmcmc/ChenN14, author = {Kan Chen and Bala Natarajan}, title = {MIMO-Based Secret Key Generation Strategies: Rate Analysis}, journal = {Int. J. Mob. Comput. Multim. Commun.}, volume = {6}, number = {3}, pages = {22--55}, year = {2014}, url = {https://doi.org/10.4018/IJMCMC.2014070102}, doi = {10.4018/IJMCMC.2014070102}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijmcmc/ChenN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmcmc/Edward14, author = {E. Prince Edward}, title = {A Context Transfer Model for Secure Handover in WiMAX/LTE Integrated Networks}, journal = {Int. J. Mob. Comput. Multim. Commun.}, volume = {6}, number = {3}, pages = {56--74}, year = {2014}, url = {https://doi.org/10.4018/IJMCMC.2014070103}, doi = {10.4018/IJMCMC.2014070103}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijmcmc/Edward14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmcmc/FanWWW14, author = {Jianhua Fan and Qiping Wang and Xianglin Wei and Tongxiang Wang}, title = {Jammer Location-Oriented Noise Node Elimination Method for {MHWN}}, journal = {Int. J. Mob. Comput. Multim. Commun.}, volume = {6}, number = {4}, pages = {1--19}, year = {2014}, url = {https://doi.org/10.4018/IJMCMC.2014100101}, doi = {10.4018/IJMCMC.2014100101}, timestamp = {Mon, 05 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijmcmc/FanWWW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmcmc/FrikhO14, author = {Bouchra Frikh and Brahim Ouhbi}, title = {Web Algorithms for Information Retrieval: {A} Performance Comparative Study}, journal = {Int. J. Mob. Comput. Multim. Commun.}, volume = {6}, number = {1}, pages = {1--16}, year = {2014}, url = {https://doi.org/10.4018/ijmcmc.2014010101}, doi = {10.4018/IJMCMC.2014010101}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijmcmc/FrikhO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmcmc/LiuPQH14, author = {Shigang Liu and Yali Peng and Guoyong Qiu and Xuanwen Hao}, title = {A Local Statistical Information Active Contour Model for Image Segmentation}, journal = {Int. J. Mob. Comput. Multim. Commun.}, volume = {6}, number = {2}, pages = {33--49}, year = {2014}, url = {https://doi.org/10.4018/ijmcmc.2014040104}, doi = {10.4018/IJMCMC.2014040104}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijmcmc/LiuPQH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmcmc/LiuZWT14, author = {Yangguang Liu and Yangming Zhou and Shiting Wen and Chaogang Tang}, title = {A Strategy on Selecting Performance Metrics for Classifier Evaluation}, journal = {Int. J. Mob. Comput. Multim. Commun.}, volume = {6}, number = {4}, pages = {20--35}, year = {2014}, url = {https://doi.org/10.4018/IJMCMC.2014100102}, doi = {10.4018/IJMCMC.2014100102}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijmcmc/LiuZWT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmcmc/MatsukidaMF14, author = {Hirotsugu Matsukida and Yuta Mieno and Hiroyuki Fujioka}, title = {Reconstructing Handwriting Character Font Models with Incorrect Stroke Order}, journal = {Int. J. Mob. Comput. Multim. Commun.}, volume = {6}, number = {2}, pages = {1--12}, year = {2014}, url = {https://doi.org/10.4018/ijmcmc.2014040101}, doi = {10.4018/IJMCMC.2014040101}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijmcmc/MatsukidaMF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmcmc/MountassirNHB14, author = {Tarik Mountassir and Bouchaib Nassereddine and Abdelkrim Haqiq and Samir Bennani}, title = {Optimal Channel Assignment Algorithm for Least Interfered Wireless Mesh Networks}, journal = {Int. J. Mob. Comput. Multim. Commun.}, volume = {6}, number = {1}, pages = {54--67}, year = {2014}, url = {https://doi.org/10.4018/ijmcmc.2014010103}, doi = {10.4018/IJMCMC.2014010103}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijmcmc/MountassirNHB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmcmc/NovakovLLS14, author = {Stevan Novakov and Chung{-}Horng Lung and Ioannis Lambadaris and Nabil Seddigh}, title = {A Hybrid Technique Using {PCA} and Wavelets in Network Traffic Anomaly Detection}, journal = {Int. J. Mob. Comput. Multim. Commun.}, volume = {6}, number = {1}, pages = {17--53}, year = {2014}, url = {https://doi.org/10.4018/ijmcmc.2014010102}, doi = {10.4018/IJMCMC.2014010102}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijmcmc/NovakovLLS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmcmc/NovikovaKF14, author = {Evgenia Novikova and Igor V. Kotenko and Evgenii Fedotov}, title = {Interactive Multi-View Visualization for Fraud Detection in Mobile Money Transfer Services}, journal = {Int. J. Mob. Comput. Multim. Commun.}, volume = {6}, number = {4}, pages = {73--97}, year = {2014}, url = {https://doi.org/10.4018/IJMCMC.2014100105}, doi = {10.4018/IJMCMC.2014100105}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijmcmc/NovikovaKF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmcmc/RehmanAA14, author = {Saeed Ur Rehman and Shafiq Alam and Iman Tabatabaei Ardekani}, title = {An Overview of Radio Frequency Fingerprinting for Low-End Devices}, journal = {Int. J. Mob. Comput. Multim. Commun.}, volume = {6}, number = {3}, pages = {1--21}, year = {2014}, url = {https://doi.org/10.4018/IJMCMC.2014070101}, doi = {10.4018/IJMCMC.2014070101}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijmcmc/RehmanAA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmcmc/SakamotoLOKBX14, author = {Shinji Sakamoto and Algenti Lala and Tetsuya Oda and Vladi Kolici and Leonard Barolli and Fatos Xhafa}, title = {Application of {WMN-SA} Simulation System for Node Placement in Wireless Mesh Networks: {A} Case Study for a Realistic Scenario}, journal = {Int. J. Mob. Comput. Multim. Commun.}, volume = {6}, number = {2}, pages = {13--21}, year = {2014}, url = {https://doi.org/10.4018/ijmcmc.2014040102}, doi = {10.4018/IJMCMC.2014040102}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijmcmc/SakamotoLOKBX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmcmc/ShengY14, author = {Guorui Sheng and Bo Yang}, title = {An Improved Counter-Forensic Algorithm to Erase the {JPEG} Compression Artifacts}, journal = {Int. J. Mob. Comput. Multim. Commun.}, volume = {6}, number = {2}, pages = {22--32}, year = {2014}, url = {https://doi.org/10.4018/ijmcmc.2014040103}, doi = {10.4018/IJMCMC.2014040103}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijmcmc/ShengY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmcmc/WenLHY14, author = {Jyh{-}Horng Wen and Jheng{-}Sian Li and Hsiang{-}Shan Hou and Cheng{-}Ying Yang}, title = {Relay Selection Scheme for Cooperative Communication Systems in Fixed Decode-and-Forward Mode}, journal = {Int. J. Mob. Comput. Multim. Commun.}, volume = {6}, number = {2}, pages = {68--77}, year = {2014}, url = {https://doi.org/10.4018/ijmcmc.2014040106}, doi = {10.4018/IJMCMC.2014040106}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijmcmc/WenLHY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmcmc/YangHCM14, author = {Qinghong Yang and Xiangquan Hu and Zhichao Cheng and Kang Miao}, title = {Machine Learning Based Prediction and Prevention of Malicious Inventory Occupied Orders}, journal = {Int. J. Mob. Comput. Multim. Commun.}, volume = {6}, number = {4}, pages = {56--72}, year = {2014}, url = {https://doi.org/10.4018/IJMCMC.2014100104}, doi = {10.4018/IJMCMC.2014100104}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijmcmc/YangHCM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmcmc/ZhangWWWX14, author = {Guomin Zhang and Zhanfeng Wang and Rui Wang and Na Wang and Chang{-}you Xing}, title = {What is New about the Internet Delay Space?}, journal = {Int. J. Mob. Comput. Multim. Commun.}, volume = {6}, number = {4}, pages = {36--55}, year = {2014}, url = {https://doi.org/10.4018/IJMCMC.2014100103}, doi = {10.4018/IJMCMC.2014100103}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijmcmc/ZhangWWWX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.