default search action
CITS 2014: Jeju, South Korea
- International Conference on Computer, Information and Telecommunication Systems, CITS 2014, Jeju, South Korea, July 7-9, 2014. IEEE 2014
- Sook-Chin Yip, KokSheik Wong, Raphael C.-W. Phan, Su-Wei Tan, Ivan Ku, Wooi Ping Hew:
A Privacy-Preserving and Cheat-Resilient electricity consumption reporting Scheme for smart grids. 1-5 - Chun-Hsin Wu, Pai-Hsing Wang:
Secure multi-key file-sharing for cloud storage with erasure coding. 1-5 - Nouri Omheni, Faouzi Zarai, Mohammad S. Obaidat, Kuei-Fang Hsiao:
A novel vertical handoff decision making algorithm across Heterogeneous Wireless Networks. 1-6 - Helen D. Karatza:
Scheduling jobs with different characteristics in distributed systems. 1-5 - Noraidah Blar, Syahril Anuar Idris, Fairul Azni Jafar, Mahasan Mat Ali:
Robot and human teacher. 1-3 - Yan-Jing Wu, Wei-Sheng Wang, Wen-Shyang Hwang:
A modified backoff algorithm for safety message delivery in IEEE 802.11p/WAVE networks. 1-5 - Le Quoc Thang, Chivalai Temiyasathit:
Increase performance of four-class classification for motor-imagery based brain-computer interface. 1-5 - Min Kyung An, Hyuk Cho:
Minimum latency data collection in interference-aware Wireless Sensor Networks. 1-5 - Danqing Cai:
A retail application based on indoor location with grid estimations. 1-4 - Xue Fan, Teng Yu, Jingchun Piao, Hyunchul Shin:
Discriminative leaf based Hough Forest for vehicle detection. 1-4 - Mahin K. Atiq, Hasan Wajahat, Hyung Seok Kim:
Energy aware sensing and transmission (EAST) scheme for firefighter monitoring system. 1-5 - Xiaohui Li, Guang Chen, Bing Zhao, Xiaobing Liang:
A kind of intelligent lighting control system using the EnOcean network. 1-5 - Jiann-Liang Chen, Yi-Wei Ma, Po-Sheng Chiu, Da-Wei Jiang:
SDNBroker: Heterogeneous cloud serving systems over software-defined networking. 1-5 - Puhan Zhang, Jianxiong Wu, Wang Xin, Zehui Wu:
Decrypted data detection algorithm based on dynamic dataflow analysis. 1-4 - Xue-Qiang Zeng, Qian-Sheng Chen:
A comparative study of redundant feature detection based feature selection methods. 1-5 - Yuanjun Cai, Bin Wu, Xinwei Zhang, Min Luo, Jinzhao Su:
Flow identification and characteristics mining from internet traffic with hadoop. 1-5 - Mohamed Rawidean Mohd Kassim, Ibrahim Mat, Ahmad Nizar Harun:
Wireless Sensor Network in precision agriculture application. 1-5 - Waransanang Boontarig, Gerald Quirchmayr, Wichian Chutimaskul, Borworn Papasratorn:
An evaluation model for analysing persuasive systems in mobile healthcare. 1-5 - Hassane Aissaoui-Mehrez, Pascal Urien, Guy Pujolle:
Global identity management of virtual machines based on remote secure elements. 1-4 - Ying-Hong Wang, Guo-Rui Huang, Yi-Chia Tung:
A handover prediction mechanism based on LTE-A UE history information. 1-5 - Cai Fu, Kang Zhang, Zhicun Fang, Lansheng Han, Jing Chen:
K-clique community detection based on union-find. 1-5 - Bader Alkandari, Kaveh Pahlavan:
A novel approach for throughput analysis of multi-hop multi-rate WLANs. 1-5 - Teng Yu, Jingchun Piao, Xue Fan, Hyunchul Shin:
Enhancement of hough voting by using appearance similarity for object detection. 1-4 - Ming-Hour Yang, Ming-Chien Yang, Jia-Ning Luo, Wei-Chun Hsu:
High accuracy and low storage hybrid IP traceback. 1-5 - Salwa Othmen, Aymen Belghith, Faouzi Zarai, Mohammad S. Obaidat, Lotfi Kamoun:
Power and Delay-aware Multi-Path Routing Protocol for Ad Hoc Networks. 1-6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.