default search action
KSII Transactions on Internet and Information Systems, Volume 7
Volume 7, Number 1, January 2013
- Shuguang Chen, Tingting Sun, Jingjing Yuan, Xiaoyan Geng, Changle Li, Sana Ullah, Mohammed Abdullah Alnuem:
Performance Analysis of IEEE 802.15.4e Time Slotted Channel Hopping for Low-Rate Wireless Networks. 1-21 - Seung Chul Han, Sungwook Chung, Kwang-Sik Lee, Hyunmin Park, Minho Shin:
Distributing Network Loads in Tree-based Content Distribution System. 22-37 - Sangwoo Son, Byungho Rhee:
Adaptive Resource Allocation for Traffic Flow Control in Hybrid Networks. 38-55
- Jianfeng Lu, Li Li, Zhenhua Yang:
Video Watermarking Algorithm for H.264 Scalable Video Coding. 56-67 - Fatma Taher, Naoufel Werghi, Hussain Al-Ahmad:
Automatic Sputum Color Image Segmentation for Lung Cancer Diagnosis. 68-80 - Young-Seob Jeong, Sou-Young Jin, Ho-Jin Choi:
Non-Simultaneous Sampling Deactivation during the Parameter Approximation of a Topic Model. 81-98 - Mohamed Ezzeldin A. Bashir, Ho-Sun Shon, Dong Gyu Lee, Hyeongsoo Kim, Keun Ho Ryu:
Real-Time Automated Cardiac Health Monitoring by Combination of Active Learning and Adaptive Feature Selection. 99-118
- Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng, Chun-I Fan:
An Extended Multi-Server-Based User Authentication and Key Agreement Scheme with User Anonymity. 119-131 - Li-Chin Huang, Min-Shiang Hwang, Lin-Yu Tseng:
Reversible and High-Capacity Data Hiding in High Quality Medical Images. 132-148 - Sunghyuck Hong, Sungjin Lee:
Design and Performance Analysis of Queue-based Group Diffie-Hellman Protocol (QGDH). 149-165 - Sung-Hyun Yun, Heuiseok Lim:
The Biometric based Mobile ID and Its Application to Electronic Voting. 166-183
Volume 7, Number 2, February 2013
- Xian Zhang, Qihui Wu, Xiaoqiang Li, Zi Yun:
Optimal Cooperation and Transmission in Cooperative Spectrum Sensing for Cognitive Radio. 184-201 - Soong-Hee Lee:
Combining Communications and Tracking: A New Paradigm of Smartphone Games. 202-215 - Yueying Zhang, Hang Long, Yuexing Peng, Kan Zheng, Wenbo Wang:
User-Oriented Energy- and Spectral- Efficiency Tradeoff for Wireless Networks. 216-233 - Yahui Wu, Su Deng, Hongbin Huang:
Energy-efficient Joint Control of Epidemic Routing in Delay Tolerant Networks. 234-252 - Seong-Joong Kim, Dong-Joo Park:
A Self-Calibrated Localization System using Chirp Spread Spectrum in a Wireless Sensor Network. 253-270 - Hoai Phong Ngo, Myung-Kyun Kim:
MRFR - Multipath-based Routing Protocol with Fast-Recovery of Failures on MANETs. 271-287 - Yaru Fu, Qi Zhu:
A Joint Resource Allocation Scheme for Relay Enhanced Multi-cell Orthogonal Frequency Division Multiple Networks. 288-307 - Yong Wang, Wei Peng, Qiang Dou, Zhenghu Gong:
Stationary Distribution for the Mobilities in Catastrophe Rescue Scenario. 308-326 - Sajad Khorsandroo, Rafidah Md Noor, Sayid Khorsandroo:
A Generic Quantitative Relationship to Assess Interdependency of QoE and QoS. 327-346 - Dat Tien Nguyen, Young Ho Park, Kwang Yong Shin, Kang Ryoung Park:
New Finger-vein Recognition Method Based on Image Quality Assessment. 347-365 - Ran Li, Zongliang Gan, Ziguan Cui, Minghu Wu, Xiuchang Zhu:
Side Information Extrapolation Using Motion-aligned Auto Regressive Model for Compressed Sensing based Wyner-Ziv Codec. 366-385 - Shaodong Feng, Fan Wang, Yuan Lin, Liang Gou, Guangxia Li:
An Asynchronous Burst Time Plan Generation Method for Broadband Satellite Multimedia System. 386-404 - Phan Trung Huy, Nguyen Hai Thanh, Cheonshik Kim, Ching-Nung Yang:
Data-Hiding for Halftone Images Using an Improved CPT scheme. 405-424
Volume 7, Number 3, March 2013
- Shahbaz Khan, Sadiq Ullah, Aziz Ahmed, Sahibzada A. Mahmud:
A Survey of Rate-Adaptation Schemes for IEEE 802.11 Compliant WLANs. 425-445 - Jia Zhu:
Energy Efficiency Analysis of Cellular Downlink Transmission with Network Coding over Rayleigh Fading Channels. 446-458 - Shwu-Huey Yen, Ya-ju Hsieh:
A KD-Tree-Based Nearest Neighbor Search for Large Quantities of Data. 459-470 - Min Wang, Junfeng Wang, Xuan Mou, Sunyoung Han:
On-the-fly Data Compression for Efficient TCP Transmission. 471-489 - Xiaoqiang Wang, Peidong Zhu, Xicheng Lu, Kan Chen, Huayang Cao:
Scaling Inter-domain Routing System via Path Exploration Aggregation. 490-508
- Ting Cui, Chenhui Jin:
Finding Impossible Differentials for Rijndael-like and 3D-like Structures. 509-521 - Bin Wang, Xiong Li, Yuncai Liu:
Learning Discriminative Fisher Kernel for Image Retrieval. 522-538 - Cuiyin Liu, Peng Cheng, Shu-qing Chen, Cuiwei Wang, Fenghong Xiang:
A Novel Multifocus Image Fusion Algorithm Based on Nonsubsampled Contourlet Transform. 539-557
- Jinhyung Kim, Choonsik Park, Jun Hwang, Hyung-Jong Kim:
Privacy Level Indicating Data Leakage Prevention System. 558-575 - Fan Pan, Lifa Wu, Zheng Hong, Huabo Li, Haiguang Lai, Chenghui Zheng:
Icefex: Protocol Format Extraction from IL-based Concolic Execution. 576-599 - Wen-Chung Kuo:
Secure Modulus Data Hiding Scheme. 600-612
Volume 7, Number 4, April 30, 2013
- Siavash Sadeghi Ivrigh, Seyed Mohammad Sajad Sadough:
Spectrum Sensing for Cognitive Radio Networks Based on Blind Source Separation. 613-631 - Ping Zhang, Ding Xu, Zhiyong Feng:
Capacity of Spectrum Sharing Cognitive Radio with MRC Diversity under Delay Quality-of-Service Constraints in Nakagami Fading Environments. 632-650 - Chunxiao Liu, Gui-Ran Chang, Jie Jia:
A Novel Routing Algorithm Based on Load Balancing for Multi-Channel Wireless Mesh Networks. 651-669 - Junhuai Li, Guomou Zhang, Lei Yu, Zhixiao Wang, Jing Zhang:
An Advanced RFID Localization Algorithm Based on Region Division and Error Compensation. 670-691 - Hyukjin Chae, Kiyeon Kim, Rong Ran, Dong Ku Kim:
A Single Feedback Based Interference Alignment for Three-User MIMO Interference Channels with Limited Feedback. 692-710 - Yoon-Ho Choi:
Probabilistic Model for Performance Analysis of a Heuristic with Multi-byte Suffix Matching. 711-725 - Kang Jin Yoon, Ronny Yongho Kim, Young Yong Kim:
Modelling of Differentiated Bandwidth Requests in IEEE 802.16m Systems. 726-747 - Yuan Zhou, Zesong Fei, Gaishi Huang, Ang Yang, Jingming Kuang:
A Distributed LT Codes-based Data Transmission Technique for Multicast Services in Vehicular Ad-hoc Networks. 748-766 - Yuheng Huang, Yan Dong, Minho Jo, Yingzhuang Liu:
Selective Demodulation Scheme Based on Log-Likelihood Ratio Threshold. 767-783 - Sunghee Lee, Kwangsue Chung:
Adaptive Rate Control Scheme for Streaming-based Content Sharing Service. 784-799 - Huali Cui, Depei Qian, Xingjun Zhang, Ilsun You, Xiaoshe Dong:
Optimizing the Joint Source/Network Coding for Video Streaming over Multi-hop Wireless Networks. 800-818 - Xiong Li, Bin Wang, Yuncai Liu:
Bio-Inspired Object Recognition Using Parameterized Metric Learning. 819-833 - Eui Chul Lee, Min-Woo Park:
New Eye Tracking Method as a Smartphone Interface. 834-848 - Min Gyu Choi, Oh-Young Song:
Real-Time Simulation of Thin Rod. 849-859 - Young Bae Yoon, Junseok Oh, Bong Gyou Lee:
The Establishment of Security Strategies for Introducing Cloud Computing. 860-877 - Pandi Vijayakumar, Sundan Bose, Arputharaj Kannan, L. Jegatha Deborah:
Computation and Communication Efficient Key Distribution Protocol for Secure Multicast Communication. 878-894 - Zheng Wang, Shian-Shyong Tseng:
Impact Evaluation of DDoS Attacks on DNS Cache Server Using Queuing Model. 895-909 - Syh-Yuan Tan, Ji-Jian Chin, Swee-Huay Heng, Bok-Min Goi:
An Improved Efficient Provable Secure Identity-Based Identification Scheme in the Standard Model. 910-922 - Yoon-Su Jeong, Yong-Tae Kim, Seung-Soo Shin, Sang-Ho Lee:
A Device Authentication Mechanism Reducing Performance Cost in Mobile P2P Networks. 923-948
Volume 7, Number 5, May, 2013
- Xu Zhang, Ying Xia, Shiyan Luo:
Energy-aware Management in Wireless Body Area Network System. 949-966 - Muhammad Khurram Khan, Saru Kumari, Pitam Singh:
Cryptanalysis of an 'Efficient-Strong Authentiction Protocol (E-SAP) for Healthcare Applications Using Wireless Medical Sensor Networks'. 967-979 - Long Hu, Ong Mau Dung, Qiang Liu, Tao Han, Yantao Sun:
Integration of Wireless Body Area Networks (WBANs) and WAN, WiMAX and LTE. 980-997 - Jianxin Chen, Liang Zhou, Yun Zhang, David Fondo Ferreiro:
Human Motion Tracking With Wireless Wearable Sensor Network: Experience and Lessons. 998-1013 - Jianqi Liu, Qinruo Wang, Jiafu Wan, Jianbin Xiong, Bi Zeng:
Towards Key Issues of Disaster Aid based on Wireless Body Area Networks. 1014-1035 - Yahaya O. Mohammed, Uthman A. Baroudi:
Partially Observable Markov Decision Processes (POMDPs) and Wireless Body Area Networks (WBAN): A Survey. 1036-1057 - Sungryel Lim, Hongchul Lee:
Factors Affecting Medical Incident Care on WBAN. 1058-1076 - Ali Çalhan, Sedat Atmaca:
A new Network Coordinator Node Design Selecting the Optimum Wireless Technology for Wireless Body Area Networks. 1077-1093 - An Wang, Xuexin Zheng, Zongyue Wang:
Power Analysis Attacks and Countermeasures on NTRU-Based Wireless Body Area Networks. 1094-1107 - Changle Li, Xiaoyan Geng, Jingjing Yuan, Tingting Sun:
Performance Analysis of IEEE 802.15.6 MAC Protocol in Beacon Mode with Superframes. 1108-1130 - Haobo Qing, Yuanan Liu, Gang Xie:
Robust Spectrum Sensing for Blind Multiband Detection in Cognitive Radio Systems: A Gerschgorin Likelihood Approach. 1131-1145 - Jian An, Xiaolin Gui, Jianwei Yang, Wendong Zhang, Jinhua Jiang:
Research on a Mobile-aware Service Model in the Internet of Things. 1146-1165 - Youngwon Kim An, Seong-Moo Yoo, Changhyuk An, B. Earl Wells:
Noise Mitigation for Target Tracking in Wireless Acoustic Sensor Networks. 1166-1179 - Zhenzhou Tang, Hongyu Wang, Qian Hu, Long Hai:
How Network Coding Benefits Converge-Cast in Wireless Sensor Networks. 1180-1197 - Yanzhe Che, Qiang Yang, Chunming Wu:
Towards a Hierarchical Global Naming Framework in Network Virtualization. 1198-1212 - JinBaek Kim, Sungmin Kang, Hoon S. Cha:
Smartphone Banking: The Factors Influencing the Intention to Use. 1213-1235 - Guannan Wang, Zhizhong Wang, Zhenmin Zhu, Saiping Wen:
A novel route restoring method upon geo-tagged photos. 1236-1251 - Bin Wang, Yuncai Liu:
Collaborative Similarity Metric Learning for Semantic Image Annotation and Retrieval. 1252-1271 - Ihsan Gunes, Alper Bilge, Huseyin Polat:
Shilling Attacks Against Memory-Based Privacy-Preserving Recommendation Algorithms. 1272-1290 - Chenlei Cao, Ru Zhang, Mengyi Zhang, Yixian Yang:
IBC-Based Entity Authentication Protocols for Federated Cloud Systems. 1291-1312 - Xiaowei Li, Yuqing Zhang, Xuefeng Liu, Jin Cao:
A Lightweight Three-Party Privacy-preserving Authentication Key Exchange Protocol Using Smart Card. 1313-1327 - Nam-Su Jho, Dowon Hong:
Symmetric Searchable Encryption with Efficient Conjunctive Keyword Search. 1328-1342 - Leyou Zhang, Yupu Hu:
New Constructions of Hierarchical Attribute-Based Encryption for Fine-Grained Access Control in Cloud Computing. 1343-1356
Volume 7, Number 6, June 2013
- Razieh Sheikhpour, Sam Jabbehdari:
An Energy Efficient Chain-based Routing Protocol for Wireless Sensor Networks. 1357-1378 - Feng Zhao, Jiayi Zhang, Hongbin Chen:
Joint Beamforming and Power Allocation for Multiple Primary Users and Secondary Users in Cognitive MIMO Systems via Game Theory. 1379-1397 - Changhyeon Kim, Wonjoo Lee, Changho Jeon:
A Resource Reduction Scheme with Low Migration Frequency for Virtual Machines on a Cloud Cluster. 1398-1417 - Dandan Li, Ke Xiong, Guanyao Du, Zhengding Qiu:
Secure Beamforming with Artificial Noise for Two-way Relay Networks. 1418-1432
- Jong-Chang Ahn, Sung-Phil Cho, Soon-Ki Jeong:
Virtual Reality to Help Relieve Travel Anxiety. 1433-1448 - Jiye Lee, Hae Won Byun:
Simpson Style Caricature based on MLS. 1449-1462 - Yingying Cao, Xue Chen, Liqian Wang, Xicong Li:
An Unequal Protection FEC Scheme for Video over Optical Access Networks. 1463-1479
- Ji Yao, Jiguo Li, Yichen Zhang:
Certificate-Based Encryption Scheme without Pairing. 1480-1491 - Qian Mao, Chin-Chen Chang, Hsiao-Ling Wu:
An Image Encryption Scheme Based on Concatenated Torus Automorphisms. 1492-1511 - Shi-Jinn Horng, Shiang-Feng Tzeng, Pingzhi Fan, Xian Wang, Tianrui Li, Muhammad Khurram Khan:
Secure Convertible Undeniable Signature Scheme Using Extended Euclidean Algorithm without Random Oracles. 1512-1532
Volume 7, Number 7, July 2013
- Yueyun Chen, Xiangyun Xu, Qun Lei:
Joint Subcarriers and Power Allocation with Imperfect Spectrum Sensing for Cognitive D2D Wireless Multicast. 1533-1546 - Xuelian Cai, Jingjing Yuan, Xiaoming Yuan, Wu Zhu, Jiandong Li, Changle Li, Sana Ullah:
Energy-efficient Relay MAC with Dynamic Power Control in Wireless Body Area Networks. 1547-1568 - Hamed Khiabani, Norbik Bashah Idris, Jamalul-lail Ab Manan:
A Unified Trust Model for Pervasive Environments - Simulation and Analysis. 1569-1584 - Ahmed M. Shamsan Saleh, Borhanuddin Mohd Ali, Hafizal Mohamad, Mohd Fadlee A. Rasid, Alyani Ismail:
RRSEB: A Reliable Routing Scheme for Energy-balancing Using a Self-adaptive Method in Wireless Sensor Networks. 1585-1609 - Hongseok Jeon, Byungjoon Lee, Hoyoung Song, Moonsoo Kang:
An ICN In-Network Caching Policy for Butterfly Network in DCN. 1610-1623 - Sunwoong Choi, Jaehyuk Choi, Joon Yoo:
MRCT: An Efficient Tag Identification Protocol in RFID Systems with Capture Effect. 1624-1637 - Tuan Hao Tieu, Younghan Kim, Gwangyong Gim:
PTT Service Interworking Between IMS Based Networks and P2P Overlay Networks. 1638-1656
- Tuyen Danh Pham, Gi Pyo Nam, Kwang Yong Shin, Kang Ryoung Park:
A Novel Query-by-Singing/Humming Method by Estimating Matching Positions Based on Multi-layered Perceptron. 1657-1670 - Yong Yang, Wenjuan Zheng, Shuying Huang:
A Novel Automatic Block-based Multi-focus Image Fusion via Genetic Algorithm. 1671-1689 - Xiaojie Dong, Erqi Liu, Jie Yang, Qiang Wu:
MEGH: A New Affine Invariant Descriptor. 1690-1704 - Jucheng Yang, Yanbin Jiao, Naixue Xiong, Dong Sun Park:
Fast Face Gender Recognition by Using Local Ternary Pattern and Extreme Learning Machine. 1705-1720
- Chundong She, Ping Yi, Junfeng Wang, Hongshen Yang:
Intrusion Detection for Black Hole and Gray Hole in MANETs. 1721-1736 - Sunghyuck Hong, Sungjin Lee:
Design and Performance Analysis of Queue-based Group Diffie-Hellman Protocol (QGDH). 1737-1753
Volume 7, Number 8, Aug 30, 2013
- Wasan Kadhim Saad, Mahamod Ismail, Rosdiadee Nordin, Ayman A. El-Saleh:
On the Performance of Cooperative Spectrum Sensing of Cognitive Radio Networks in AWGN and Rayleigh Fading Environments. 1754-1769 - Ping Xie, Lihua Li, Junlong Zhu, Jin Jin, Yijing Liu:
Cooperative spectrum leasing using parallel communication of secondary users. 1770-1785 - Peisheng Pan, Baoyu Zheng:
Outage Probability of Two-Hop Relay Networks with Related Interference. 1786-1804 - Ismail Kirbas, Alper Karahan, Abdullah Sevin, Cüneyt Bayilmis:
isMAC: An Adaptive and Energy-Efficient MAC Protocol Based on Multi-Channel Communication for Wireless Body Area Networks. 1805-1824 - Md. Sabbir Hasan, Eui-Nam Huh:
Heuristic based Energy-aware Resource Allocation by Dynamic Consolidation of Virtual Machines in Cloud Data Center. 1825-1842 - Libao Zhang, Hao Li:
Region of Interest Detection Based on Visual Attention and Threshold Segmentation in High Spatial Resolution Remote Sensing Images. 1843-1859 - Ki-Won Kwon, Seong-Jun Kim, Jun Hwang, Jong-Ho Paik:
Performance Evaluation of Synchronization Method for Reducing the Overall Synchronization Time in Digital Radio Mondiale Receivers. 1860-1875 - Jongchan Lee, MoonHo Lee:
Sub-channel Allocation Based on Multi-level Priority in OFDMA Systems. 1876-1889 - Xiaolei Zhou, Deke Guo, Tao Chen, Xueshan Luo:
Robust Backup Path Selection in Overlay Routing with Bloom Filters. 1890-1910 - Rongchun Li, Yong Dou, Jie Zhou, Baofeng Li, Jinbo Xu:
From WiFi to WiMAX: Efficient GPU-based Parameterized Transceiver across Different OFDM Protocols. 1911-1932 - Rashid Hafeez Khokhar, Tanveer A. Zia, Kayhan Zrar Ghafoor, Jaime Lloret, Muhammad Shiraz:
Realistic and Efficient Radio Propagation Model to Handle Obstacles for Vehicle-to-X Communications. 1933-1954 - Sijia Lou, Longxiang Yang:
Joint Relay Selection and Power Allocation. 1955-1971 - Jiguo Li, Yanqiong Li, Yichen Zhang:
Provably Secure Forward Secure Certificateless Proxy Signature Scheme. 1972-1988 - Zhiqiang Wang, Yuqing Zhang, Qixu Liu:
RPFuzzer: A Framework for Discovering Router Protocols Vulnerabilities Based on Fuzzing. 1989-2009 - Yang Yang, Yupu Hu, Leyou Zhang:
An Efficient Biometric Identity Based Signature Scheme. 2010-2026 - Chuan Qin, Chin-Chen Chang, Yen-Chang Chen:
A Novel Reversible Data Hiding Scheme for VQ-Compressed Images Using Index Set Construction Strategy. 2027-2041 - Rong Jiang, Jun Luo, Xiaoping Wang:
HRKT: A Hierarchical Route Key Tree based Group Key Management for Wireless Sensor Networks. 2042-2060 - Xiaowei Li, Yuqing Zhang, Xuefeng Liu, Jin Cao, Qianqian Zhao:
A New Roaming Authentication Framework For Wireless Communication. 2061-2080
Volume 7, Number 9, September, 2013
- Md. Fazlul Kader, Asaduzzaman, Md. Moshiul Hoque:
Hybrid Spectrum Sharing with Cooperative Secondary User Selection in Cognitive Radio Networks. 2081-2100 - Yao Wang, Zhongzhao Zhang, Qiyue Yu, Jiamei Chen:
A Novel Prediction-based Spectrum Allocation Mechanism for Mobile Cognitive Radio Networks. 2101-2119 - Huijin Cao, Yanhui Lu, Jun Cai:
MMSE Transmit Optimization for Multiuser Multiple-Input Single-Output Broadcasting Channels in Cognitive Radio Networks. 2120-2133 - Lei Wang, Yuwang Yang, Wei Zhao, Wei Lu:
Network Coding for Energy-Efficient Distributed Storage System in Wireless Sensor Networks. 2134-2153 - Mingming Lin, Xuemin Hong, Jin Xiong, Ke Xue, Jianghong Shi:
Capacity Analysis of Centralized Cognitive Radio Networks for Best-effort Traffics. 2154-2172 - Hojin Ghim, Dongwook Kim, Namgi Kim:
Autonomous Deployment in Mobile Sensor Systems. 2173-2193 - Omar Said:
Accurate Performance Evaluation of Internet Multicast Architectures: Hierarchical and Fully Distributed vs. Service-Centric. 2194-2212 - Tahidul Islam, Insoo Koo:
Compressed Sensing-Based Multi-Layer Data Communication in Smart Grid Systems. 2213-2231 - Jinmo Kim:
Efficient Procedural Modeling of Trees Based on Interactive Growth Volume Control. 2232-2245 - Rubén Cuevas, Michal Kryczka, Ángel Cuevas, Carmen Guerrero, Arturo Azcorra:
Connectivity Properties of Real BitTorrent Swarms. 2246-2267 - Chang-you Xing, Ming Chen, Chao Hu:
Capacity Aware Scalable Video Coding in P2P on Demand Streaming Systems. 2268-2283 - Zhenzhen Yang, Zhen Yang:
Fast Linearized Bregman Method for Compressed Sensing. 2284-2298 - Jinsoo Cho, Jongkil Won, Jongwoo Bae:
Geometric Image Compensation Method for a Portable Projector Based on Rewarping Using 2D Homography. 2299-2311 - Junsik Lim, In Seop Na, Soo-Hyung Kim:
Correction of Signboard Distortion by Vertical Stroke Estimation. 2312-2325 - Heegon Kim, Sungju Lee, Yongwha Chung, Sung Bum Pan:
Parallelizing H.264 and AES Collectively. 2326-2337
Volume 7, Number 10, October 2013
- Hoang Anh, Insoo Koo:
Primary User Localization using Bayesian Compressive Sensing and Path-loss Exponent Estimation for Cognitive Radio Networks. 2338-2356 - Qiang Dou, Yong Wang, Wei Peng, Zhenghu Gong:
Closed Walk Ferry Route Design for Wireless Sensor Networks. 2357-2375 - Jiamei Chen, Yubin Xu, Lin Ma, Yao Wang:
Multi-agent Q-learning based Admission Control Mechanism in Heterogeneous Wireless Networks for Multiple Services. 2376-2394 - Dexiang Meng, Dongchen Zhang, Shoufeng Wang, Xiaoyan Xu, Wenwen Yao:
Evaluation and Optimization of Resource Allocation among Multiple Networks. 2395-2410 - Shu-Ming Tseng, Shih-Han Wang:
Distributed Quasi-Orthogonal Space Time Block Code for Four Transmit Antennas with Information Exchange Error Mitigation. 2411-2429
- Junghwan Lee, Jaehyun Hwang, Nakjung Choi, Chuck Yoo:
SVC-based Adaptive Video Streaming over Content-Centric Networking. 2430-2447 - Ran Li, Minghu Wu, Zongliang Gan, Ziguan Cui, Xiuchang Zhu:
Joint Overlapped Block Motion Compensation Using Eight-Neighbor Block Motion Vectors for Frame Rate Up-Conversion. 2448-2463 - Jisung Yoo, Sung Soo Hwang, Seong-Dae Kim, MyungSeok Ki, Jihun Cha:
Regional Linear Warping for Image Stitching with Dominant Edge Extraction. 2464-2478 - Jung-Hyun Hong, Won-Jin Kim, Ki-Seok Chung:
A Parallelization Technique with Integrated Multi-Threading for Video Decoding on Multi-core Systems. 2479-2496
- Haomiao Yang, Hyunsung Kim, Hongwei Li, Eunjun Yoon, Xiaofen Wang, Xuefeng Ding:
An Efficient Somewhat HE scheme over Integers and Its Variation. 2497-2513 - Wenxiang Li, Tao Zhang, Zhenhao Zhu, Yan Zhang, Xin Ping:
Detection of LSB Matching Revisited Using Pixel Difference Feature. 2514-2526 - Yin-Jen Chiang, Pei-Yu Lin, Ran-Zan Wang, Yi-Hui Chen:
Blind QR Code Steganographic Approach Based upon Error Correction Capability. 2527-2543 - Haomiao Yang, Hyunsung Kim, Hongwei Li, Eunjun Yoon, Xiaofen Wang, Xuefeng Ding:
An Efficient Broadcast Authentication Scheme with Batch Verification for ADS-B Messages. 2544-2560
Volume 7, Number 11, November 2013
- Yan Huang, Bing Hui, Xin Su, KyungHi Chang:
Self-weighted Decentralized Cooperative Spectrum Sensing Based On Notification for Hidden Primary User Detection in SANET-CR Network. 2561-2576 - Mandicou Ba, Olivier Flauzac, Bachar Salim Haggar, Rafik Makhloufi, Florent Nolot, Ibrahima Niang:
Energy-Aware Self-Stabilizing Distributed Clustering Protocol for Ad Hoc Networks: the case of WSNs. 2577-2596 - Chang Soon Kang, Tien Dung Nguyen, Junsu Kim, Renato Lo Cigno:
A Downlink Load Control Scheme with a Dynamic Load Threshold and Virtual Coverage Management for Two-Tier Femtocell Networks. 2597-2615 - Young-Min Cho, Janghoon Yang, Dong Ku Kim:
Transceiver Design Using Local Channel State Information at Relays for A Multi-Relay Multi-User MIMO Network. 2616-2635 - Yayan Li, Kai Liu, Feng Liu:
CRP-CMAC: A Priority-Differentiated Cooperative MAC Protocol with Contention Resolution for Multihop Wireless Networks. 2636-2656 - Yongliang Sun, Yubin Xu:
Error Estimation Method for Matrix Correlation-Based Wi-Fi Indoor Localization. 2657-2675 - Si-o Seo, Seung-Yong Baek, Doyeop Keum, Seungwan Ryu, Choong-Ho Cho:
A Tutorial: Information and Communications-based Intelligent Building Energy Monitoring and Efficient Systems. 2676-2689
- Jure Kovac, Peter Peer:
Transformation Based Walking Speed Normalization for Gait Recognition. 2690-2701 - Zhixiao Wang, Xuebin Xu, Wenyao Yan, Wei Wei, Junhuai Li, Deyun Zhang:
Optimal Scheme of Retinal Image Enhancement Using Curvelet Transform and Quantum Genetic Algorithm. 2702-2719 - Wenkai Xu, Eung-Joo Lee:
A Novel Multi-view Face Detection Method Based on Improved Real Adaboost Algorithm. 2720-2736 - Dan Xu, Zhenmin Tang, Wei Xu:
Salient Object Detection Based on Regional Contrast and Relative Spatial Compactness. 2737-2753 - Ziqiang Sun, Yuesheng Zhu, Xiyao Liu, Liming Zhang:
A Robust Video Fingerprinting Algorithm Based on Centroid of Spatio-temporal Gradient Orientations. 2754-2768 - Lijun Yang, Chao Ding, Meng Wu:
TinyIBAK: Design and Prototype Implementation of An Identity-based Authenticated Key Agreement Scheme for Large Scale Sensor Networks. 2769-2792 - Minghu Wu, Rui Chen, Shangli Zhou, Xiuchang Zhu:
Distortion Measurement based Dynamic Packet Scheduling of Video Stream over IEEE 802.11e WLANs. 2793-2803 - Farhana Jabeen, Sarfraz Nawaz:
In-network Distributed Event Boundary Computation in Wireless Sensor Networks: Challenges, State of the Art and Future Directions. 2804-2823 - Kyoung-Mi Lee, Hey-Min Won:
Dynamic Gesture Recognition using a Model-based Temporal Self-similarity and its Application to Taebo Gesture Recognition. 2824-2838 - Muhammad Hameed Siddiqi, Adil Mehmood Khan, Seok-Won Lee:
Active Contours Level Set Based Still Human Body Segmentation from Depth Images For Video-based Activity Recognition. 2839-2852 - Iram Fatima, Muhammad Fahim, Young-Koo Lee, Sungyoung Lee:
A Genetic Algorithm-based Classifier Ensemble Optimization for Activity Recognition in Smart Homes. 2853-2873
- Bong-Whan Kim, Chang-Seop Park:
Secure and Energy-Efficient Join-Leave Operations in ZigBee Network. 2874-2892 - Hongxia Wang, Bangxu Yin, Linna Zhou:
Geometrically Invariant Image Watermarking using Connected Objects and Gravity Centers. 2893-2912 - Yung-Chen Chou, Ping-Kun Hsu, Iuon-Chang Lin:
Data Hiding for HTML Files Using Character Coding Table and Index Coding Table. 2913-2927 - Chien-Lung Hsu, Han-Yu Lin:
An Identity-Based Key-Insulated Encryption with Message Linkages for Peer-to-Peer Communication Network. 2928-2940 - Chuan Qin, Chin-Chen Chang, Tai-Jung Hsu:
Effective Fragile Watermarking for Image Authentication with High-quality Recovery Capability. 2941-2956
Volume 7, Number 12, December 2013
- Omar B. Abdul-Ghafoor, Mahamod Ismail, Rosdiadee Nordin, Ayman A. El-Saleh:
Resource Allocation in Spectrum Sharing ad-hoc Cognitive Radio Networks Based on Game Theory: An Overview. 2957-2986 - Heejung Yu:
Optimal Channel Sensing for Heterogeneous Cognitive Networks: An Analytical Approach. 2987-3002 - Zongsheng Zhang, Qihui Wu, Xueqiang Zheng, Jinlong Wang, Lianbao Li:
Outage Analysis of CRNs with SC Diversity Over Nakagami-m Fading Environment. 3003-3017 - Jia Liu, Ying Zhu, GuiXia Kang, Yifan Zhang:
Optimal Energy-Efficient Power Allocation and Outage Performance Analysis for Cognitive Multi-Antenna Relay Network Using Physical-Layer Network Coding. 3018-3036 - Xiaorong Xu, Yu-Dong Yao, Sanqing Hu, Yingbiao Yao:
Joint Subcarrier and Bit Allocation for Secondary User with Primary Users¡¯ Cooperation. 3037-3054 - Won-Jae Shin, Young-Hwan You:
Robust Pilot-aided Frequency Offset Estimation Scheme for OFDM-based Broadcasting System with Cyclic Delay Diversity. 3055-3070 - Xue Chen, Yanling Hu, Anfeng Liu, Zhigang Chen:
Cross Layer Optimal Design with Guaranteed Reliability under Rayleigh Block Fading Channels. 3071-3095 - Vahid Khajehvand, Hossein Pedram, Mostafa Zandieh:
SCTTS: Scalable Cost-Time Trade-off Scheduling for Workflow Application in Grids. 3096-3117 - Ali Farzamnia, Sharifah Kamilah Syed Yusof, Norsheila Fisal:
Multicasting Multiple Description Coding Using p-Cycle Network Coding. 3118-3134 - Fuhong Lin, Xianwei Zhou, Changjia Chen:
Novel Pre-pushing & Downloading Model in Mobile Peer-assisted Streaming Network. 3135-3148
- Mussarat Yasmin, Muhammad Sharif, Sajjad Mohsin, Isma Irum:
Content Based Image Retrieval Using Combined Features of Shape, Color and Relevance Feedback. 3149-3165 - Sangwoo Ahn, Jongjoo Park, Lin-bo Luo, Jongwha Chong:
Adaptive Object-Region-Based Image Pre-Processing for Noise Removal Algorithm. 3166-3179 - Huy Hoang Nguyen, Gueesang Lee, Soo-Hyung Kim, Hyung Jeong Yang:
An Effective Orientation-based Method and Parameter Space Discretization for Defined Object Segmentation. 3180-3199 - Kalvein Rantelobo, Wirawan, Gamantyo Hendrantoro, Achmad Affandi, Hua-An Zhao:
Adaptive Combined Scalable Video Coding over MIMO-OFDM Systems using Partial Channel State Information. 3200-3219
- Junghyun Nam, Kim-Kwang Raymond Choo, Moonseong Kim, Juryon Paik, Dongho Won:
Dictionary Attacks against Password-Based Authenticated Three-Party Key Exchange Protocols. 3244-3260 - Geontae Noh, Ik Rae Jeong:
Scalable Hierarchical Identity-based Signature Scheme from Lattices. 3261-3273 - Young-Seob Jeong, Chae-Gyun Lim, Byeong-Soo Jeong, Ho-Jin Choi:
Topic Masks for Image Segmentation. 3274-3292
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.