


default search action
BigCom 2015: Taiyuan, China
- Yu Wang, Hui Xiong, Shlomo Argamon, Xiang-Yang Li, Jianzhong Li:

Big Data Computing and Communications - First International Conference, BigCom 2015, Taiyuan, China, August 1-3, 2015, Proceedings, 1st Edition. Lecture Notes in Computer Science 9196, Springer 2015, ISBN 978-3-319-22046-8
Wireless Communication and Networks
- Yi-hua Zhu, Chaoran Zhu, Xianzhong Tian:

A Novel Markov Chain Model to Derive the Expected Contention Window Size and Backoff Counter for IEEE 802.11 WLAN Nodes. 3-13 - Feng Tian, Di Li, Shuyu Li, Lei Wang, Naigao Jin, Liang Sun:

RTDA: A Novel Reusable Truthful Double Auction Mechanism for Wireless Spectrum Management. 14-27 - Nan Jing, Lin Wang:

Dynamic Sparse Channel Estimation Using \ell _0 -constrained Kalman Filter in OFDM Systems. 28-42 - Ping Li, Panlong Yang, Yubo Yan, Lei Shi:

FOAM: Frequency-Offset Aware Multiple Client Selection for Cooperative Packet Recovery System. 43-52
Database and Big Data
- Meng Huang, Xiaofeng Qiu, Shufang Li

, Daowei Liu:
Research on Light-Weight Compression Schemes Based on Simulative Column-Store. 55-68 - Jiewei Lan, Xiyun Liu, Hong Luo, Peng Li:

Study of Constructing Data Supply Chain Based on PROV. 69-78 - Lin Wang, Ammar Hawbani, Xingfu Wang:

Focused Deep Web Entrance Crawling by Form Feature Classification. 79-87 - Taeho Jung, Xiang-Yang Li, Junze Han:

A Framework for Optimization in Big Data: Privacy-Preserving Multi-agent Greedy Algorithm. 88-102 - Weigang Hou, Pengxing Guo, Lei Guo:

Networking Big Data: Definition, Key Technologies and Challenging Issues of Transmission. 103-112
Smart Phone and Sensing Application
- Yilei Wang, Yuanyang Tang, Jun Ma, Zhen Qin:

Gender Prediction Based on Data Streams of Smartphone Applications. 115-125 - Xiaopu Wang, Yan Xiong, Wenchao Huang:

Anti-multipath Indoor Direction Finding Using Acoustic Signal via Smartphones. 126-140 - Tong Qin, Huadong Ma, Dong Zhao, Tianyuan Li, Jianwei Chen:

Crowdsourcing Based Event Reporting System Using Smartphones with Accurate Localization and Photo Tamper Detection. 141-151 - Chao Wu, Bin Xu, Qi Li:

Parallel Accurate Localization from Cellular Network. 152-166 - Zusheng Zhang, Tiezhu Zhao, Huaqiang Yuan:

A Vehicle Speed Estimation Algorithm Based on Wireless AMR Sensors. 167-176
Security and Privacy
- Yudong Zhao, Ke Xu, Rashid Mijumbi, Meng Shen:

Design and Evaluation of a Policy-Based Security Routing and Switching System for Data Interception Attacks. 179-192 - Dajiang Chen, XuFei Mao, Zhen Qin, Weiyi Wang, Xiang-Yang Li, Zhiguang Qin:

Wireless Device Authentication Using Acoustic Hardware Fingerprints. 193-204 - Zhiguang Qin, Shikun Wu, Hu Xiong:

Strongly Secure and Cost-Effective Certificateless Proxy Re-encryption Scheme for Data Sharing in Cloud Computing. 205-216 - Jing Su, Ying Long, Xiaofeng Qiu, Shufang Li

, Daowei Liu:
Anomaly Detection of Single Sensors Using OCSVM_KNN. 217-230 - Zhiqiang Zhang, Yue Sun, Xiaoqin Xie, Haiwei Pan:

An Efficient Method on Trajectory Privacy Preservation. 231-240
Architecture and Applications
- Chengjian Liu, Kai Ouyang, Xiaowen Chu

, Hai Liu, Yiu-Wing Leung:
R-Memcached: A Reliable In-Memory Cache System for Big Key-Value Stores. 243-256 - Bo Zhao, Wei Gao, Rongcai Zhao, Lin Han, Huihui Sun, Yingying Li:

Performance Evaluation of NPB and SPEC CPU2006 on Various SIMD Extensions. 257-272 - Yingyu Li, Yifang Zhu, Wotao Yin

, Yang Liu
, Guangming Shi, Zhu Han:
Prediction of High Resolution Spatial-Temporal Air Pollutant Map from Big Data Sources. 273-282 - Benika Hall, Andrew Quitadamo

, Xinghua Shi:
A Graph Community Approach for Constructing microRNA Networks. 283-293
Sensor Networks and RFID
- Goutham Kamath

, Lei Shi, Edmond Chow, Wen-Zhan Song
:
Distributed Multigrid Technique for Seismic Tomography in Sensor Networks. 297-310 - Qian Ma, Yu Gu, Tiancheng Zhang, Fangfang Li, Ge Yu:

Energy-Efficient and Smoothing-Sensitive Curve Recovery of Sensing Physical World. 311-324 - Mingyue Cui, Chunhong Zhang, Yuewen Su, Yang Ji:

Feedback-Based Reduplicate Complex Event Processing in IoT. 325-336 - Litian Duan, Zizhong John Wang, Fu Duan:

An Identification Algorithm in Grouping and Paralleling for Data-Intensive RFID Systems. 337-346 - Ju-Min Zhao, Na Li, Deng-ao Li:

I Know When to Do the Replenishment. 347-359
Social Networks and Recommendation
- Ping Yang, Yan Song, Yang Ji:

Tag-Based User Interest Discovery Though Keywords Extraction in Social Network. 363-372 - Yan Song, Ping Yang, Chunhong Zhang, Yang Ji:

Implicit Feedback Mining for Recommendation. 373-385 - Hongyi Su, Xianfei Lin, Bo Yan, Hong Zheng:

The Collaborative Filtering Algorithm with Time Weight Based on MapReduce. 386-395 - Yuewen Su, Mingyue Cui, Yang Ji, Yunxu Yuan:

Recommendation Specially for Fanatic Fans in SNS. 396-406
Signal Processing and Pattern Recognition
- Tiezhu Qiao

, Yanfei Duan, Yusong Pang:
In-Line Monitoring of Belt Transport with Adaptive Bandwidth Mean-Shift Hazard. 409-420 - Dengao Li, Yanfei Bai, Jumin Zhao:

A Method for Automated J Wave Detection and Characterisation Based on Feature Extraction. 421-433 - Yi Tang, Haitao Zhang, Bin Xu:

Metadata Organization and Retrieval with Attribute Tree for Large-Scale Traffic Surveillance Videos. 434-443 - Zhenji Wang, Dan Tao, Pingping Liu:

Development and Challenges of Crowdsourcing Quality of Experience Evaluation for Multimedia. 444-452 - Dengao Li, Xuebo Liu, Jumin Zhao:

An Approach for J Wave Auto-Detection Based on Support Vector Machine. 453-461
Routing and Resource Management
- Liang Shi, Xintong Guo, Lailong Luo, Yudong Qin:

Green and Fault-Tolerant Routing in Data Centers. 465-478 - Shuai Liu, Fan Li, Qian Zhang, Meng Shen:

A Markov Chain Prediction Model for Routing in Delay Tolerant Networks. 479-490 - Weiyang Lin, Cuibo Yu, Xu Zhang:

RAM: Resource Allocation in Mobility for Device-to-Device Communications. 491-502 - Jin Xu, Lan Yao, Fuxiang Gao:

Group Signature Based Trace Hiding in Web Query. 503-511

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














