default search action
KSII Transactions on Internet and Information Systems, Volume 11
Volume 11, Number 1, January 2017
- Guangwei Xu, Zhifeng Sun, Cairong Yan, Xiujin Shi, Yue Li:
Energy-Efficient Algorithm for Assigning Verification Tasks in Cloud Storage. 1-17 - Huioon Kim, Hyounggyu Kim, Kyungwon Chun, Youngjoo Chung:
Experience in Practical Implementation of Abstraction Interface for Integrated Cloud Resource Management on Multi-Clouds. 18-38 - Yongsheng Hao, Mandan Xia, Na Wen, Rongtao Hou, Hua Deng, Lina Wang, Qin Wang:
Parallel task scheduling under multi-Clouds. 39-60 - Doan Perdana, Ray-Guang Cheng, Riri Fitri Sari:
Analytical Study of the Impact of the Mobility Node on the Multi-channel MAC Coordination Scheme of the IEEE 1609.4 Standard. 61-77 - Jintao Wang, Xi Jin, Peng Zeng, Zhaowei Wang, Ming Wan:
Phase Switching Mechanism for WiFi-based Long Distance Networks in Industrial Real-Time Applications. 78-101 - A. Chaminda J. Samarasekera, Hyundong Shin:
Outage Probability for Cooperative Nano Communication in the THz Gap Frequency Range. 102-122 - Sang-Jo Yoo, Ju-Tae Jang, Myunghwan Seo, Hyung-Weon Cho:
Secondary System Initialization Protocol Using FFT-based Correlation Matching for Cognitive Radio Ad-hoc Networks. 123-145 - Omar M. Zakaria, Aisha Hassan Abdalla Hashim, Wan Haslina Hassan, Othman Omran Khalifa, Mohammad Azram, Shidrokh Goudarzi, Lalitha Bhavani Jivanadham, Mahdi Zareei:
State-Aware Re-configuration Model for Multi-Radio Wireless Mesh Networks. 146-170 - Ye Shen, Jing Feng, Weijun Ma, Lei Jiang, Min Yin:
Overlay Multicast Update Strategy Based on Perturbation Theory. 171-192 - Tao Wang, Zheng Yao, Baoxian Zhang, Cheng Li:
Utility Bounds of Joint Congestion and Medium Access Control for CSMA based Wireless Networks. 193-214 - Yuan Liu, Junjie Chen, Zhenfeng Xu:
Improved DV-Hop Localization Algorithm Based on Bat Algorithm in Wireless Sensor Networks. 215-236 - Wen Liu, Zhigang Wang, Yanming Shen:
Job-aware Network Scheduling for Hadoop Cluster. 237-252 - WeiYe Xu, Min Lin:
Downlink Capacity Analysis of Distributed Antenna Systems with Imperfect Channel State Information. 253-271
- Hainan Wang, Baochang Zhang, Hong Zheng, Yao Cao, Zhenhua Guo, Chengshan Qian:
The Robust Derivative Code for Object Recognition. 272-287 - Jianjun Li, Susu Fan, Zhihui Wang, Haojie Li, Chin-Chen Chang:
An Optimized CLBP Descriptor Based on a Scalable Block Size for Texture Classification. 288-301 - Hai-Gen Min, Xiangmo Zhao, Zhigang Xu, Licheng Zhang:
Robust Features and Accurate Inliers Detection Framework: Application to Stereo Ego-motion Estimation. 302-320 - Vahid Ghasemi, Ali Akbar Pouyan, Mohsen Sharifi:
Human Activity Recognition in Smart Homes Based on a Difference of Convex Programming Problem. 321-344 - Jun Lee, Jeong-Sik Park, Chung-Pyo Hong, Yong-Ho Seo:
Illumination-Robust Foreground Extraction for Text Area Detection in Outdoor Environment. 345-359 - Yuting Su, Fan Yu, Chengqian Zhang:
Digital Video Steganalysis Based on a Spatial Temporal Detector. 360-373 - Arkadiusz Biernacki:
Improving Video Quality by Diversification of Adaptive Streaming Strategies. 374-395 - LiPing Liu, Linlin Ci, Wei Liu, Hui Yang:
Control Flow Checking at Virtual Edges. 396-413 - Sunghee Lee, Kwangsue Chung:
A Multipath Congestion Control Scheme for High-Quality Multimedia Streaming. 414-435 - Jimin Yu, Lijian Tan, Shangbo Zhou, Liping Wang, Chaomei Wang:
Image Denoising Based on Adaptive Fractional Order Anisotropic Diffusion. 436-450 - Zhihui Wang, Sook Yoon, Dong Sun Park:
A novel visual tracking system with adaptive incremental extreme learning machine. 451-465
- Lihui Lin, Kaizhi Chen, Shangping Zhong:
Enhancing the Session Security of Zen Cart based on HMAC-SHA256. 466-483 - Yixun Hu, Kangfeng Zheng, Xu Wang, Yixian Yang:
WORM-HUNTER: A Worm Guard System using Software-defined Networking. 484-510 - Sirapat Boonkrong:
Internet Banking Login with Multi-Factor Authentication. 511-535 - Wei Li, Zhiyong Gao, Dawu Gu, Chenyu Ge, Linfeng Liao, Zhihong Zhou, Ya Liu, Zhiqiang Liu:
Security Analysis of the Whirlpool Hash Function in the Cloud of Things. 536-551 - Xiaofeng Song, Fenlin Liu, Liju Chen, Chunfang Yang, Xiangyang Luo:
Optimal Gabor Filters for Steganalysis of Content-Adaptive JPEG Steganography. 552-569 - Lahouari Ghouti:
A Perceptually-Adaptive High-Capacity Color Image Watermarking System. 570-595 - Il-Hwan Kim, KyungLyul Lee, Jaehyoun Kim:
Role and Function of the Information Public Law. 596-611
Volume 11, Number 2, February 2017
- Guang Yang, Yewen Cao, Deqiang Wang, Jian Xu, Changlei Wu:
Collaborative Sub-channel Allocation with Power Control in Small Cell Networks. 611-627 - Zhihao Zhong, Jianhua Peng, Kaizhi Huang, Lu Xia, Xiaohui Qi:
Secrecy Spectrum and Secrecy Energy Efficiency in Massive MIMO Enabled HetNets. 628-649 - Wen'an Zhou, Jianlong Liu, Yiyu Zhang, Cheng-Yi Yang, Xuhui Yang:
A Novel Resource Scheduling Scheme for CoMP Systems. 650-669 - Qi Liu, Weidong Cai, Qiang Liu, Jian Shen, Zhangjie Fu, Xiaodong Liu, Nigel Linge:
An Adaptively Speculative Execution Strategy Based on Real-Time Resource Awareness in a Multi-Job Heterogeneous Environment. 670-686 - Nannan Sui, Cong Wang, Wei Xie, Youyun Xu:
Hybrid S-ALOHA/TDMA Protocol for LTE/LTE-A Networks with Coexistence of H2H and M2M Traffic. 687-708 - Guolin Sun, Sebakara Samuel Rene Adolphe, Hangming Zhang, Guisong Liu, Wei Jiang:
User Bandwidth Demand Centric Soft-Association Control in Wi-Fi Networks. 709-730 - Muhammad Zahid Abbas, Kamalrulnizam Abu Bakar, Muhammad Ayaz, Muhammad Hafiz Mohammed, Moeenuddin Tariq:
Hop-by-Hop Dynamic Addressing Based Routing Protocol for Monitoring of long range Underwater Pipeline. 731-763 - Taekon Kim, Hyungkeun Lee:
Performance Evaluation of the RIX-MAC Protocol for Wireless Sensor Networks. 764-784
- Zheyi Fan, Shuqin Weng, Yajun Zeng, Jiao Jiang, Fengqian Pang, Zhiwen Liu:
Misclassified Samples based Hierarchical Cascaded Classifier for Video Face Recognition. 785-804 - Xiaozhou Zhu, Xin Song, Xiaoqian Chen, Yuzhu Bai, Huimin Lu:
Size Aware Correlation Filter Tracking with Adaptive Aspect Ratio Estimation. 805-825
- Ling Zhao, Mingwu Zhang, Hua Shen, Yudi Zhang, Jian Shen:
Privacy-preserving Outsourcing Schemes of Modular Exponentiations Using Single Untrusted Cloud Server. 826-845 - Zehui Wu, Qiang Wei, Kailei Ren, Qingxian Wang:
A Dynamic Defense Using Client Puzzle for Identity-Forgery Attack on the South-Bound of Software Defined Networks. 846-864 - Dong Hee Kim, Seungjo Baek, Jongin Lim:
Measures for Automaker's Legal Risks from Security Threats in Connected Car Development Lifecycle. 865-882 - Muhammad Imran, Bruce A. Harvey:
Block Based Blind & Secure Gray Image Watermarking Technique Based on Discrete Wavelet Transform and Singular Value Decomposition. 883-900 - Abderrahmen Guermazi, Abdelfettah Belghith, Mohamed Abid, Sofien Gannouni:
KMMR: An Efficient and scalable Key Management Protocol to Secure Multi-Hop Communications in large scale Wireless Sensor Networks. 901-923 - Xiaoxue Liu, Yanping Li, Juan Qu, Yong Ding:
A Lightweight Pseudonym Authentication and Key Agreement Protocol for Multi-medical Server Architecture in TMIS. 924-944 - Zhenxing Qian, Shu Dai, Boyang Chen:
Reversible Data Hiding in JPEG Images Using Ordered Embedding. 945-958 - Yilin Ye, Lifa Wu, Zheng Hong, Kangyu Huang:
A Risk Classification Based Approach for Android Malware Detection. 959-981
- Soo Kyun Kim, Shin-Jin Kang, Yoo-Joo Choi, Min-Hyung Choi, Min Hong:
Augmented-Reality Survey: from Concept to Application. 982-1004 - YiNa Jeong, Eun-Hee Jeong, Byung kwan Lee:
An App Visualization design based on IoT Self-diagnosis Micro Control Unit for car accident prevention. 1005-1018 - Jong-Hyun Kim, Jung Lee, Chang-Hun Kim, Sun-Jeong Kim:
Realistic Visual Simulation of Water Effects in Response to Human Motion using a Depth Camera. 1019-1031 - Ha Sung Hwang:
The Influence of personality traits on the Facebook Addiction. 1032-1042 - Tae-young Kim, Suntae Kim, Sangchul Choi, Jeong-Ah Kim, Jae-Young Choi, Jong-Won Ko, Jee-Huong Lee, YoungWha Cho:
A Machine-Learning Based Approach for Extracting Logical Structure of a Styled Document. 1043-1056 - Murad Khan, Bhagya Nathali Silva, Changsu Jung, Kijun Han:
A context-Aware Smart Home Control System based on ZigBee Sensor Network. 1057-1069 - Tsung-Han Lee, Lin-Huang Chang, Wei-Chung Cheng:
Design and Implementation of SDN-based 6LBR with QoS Mechanism over Heterogeneous WSN and Internet. 1070-1088 - Jin Ma, Jongsuk Ruth Lee, Kumwon Cho, Minjae Park:
Design and Implementation of Information Management Tools for the EDISON Open Platform. 1089-1104 - Sangmin Lee:
Evaluation of Mobile Application in User's Perspective: Case of P2P Lending Apps in FinTech Industry. 1105-1117 - Md. Zia Uddin, Jaehyoun Kim:
A Robust Approach for Human Activity Recognition Using 3-D Body Joint Motion Features with Deep Belief Network. 1118-1133 - Se Dong Min, Jiyoung Heo, Youngsun Kong, Yunyoung Nam, Preap Ley, Bong-Keun Jung, Dongik Oh, Wonhan Shin:
Thermal Infrared Image Analysis for Breast Cancer Detection. 1134-1147 - Kyoungsook Kim, Moonsuk Yeon, Byeong-Soo Jeong, Kwanghoon Pio Kim:
A Conceptual Approach for Discovering Proportions of Disjunctive Routing Patterns in a Business Process Model. 1148-1161 - Jae-Gu Lee, Jin Kim, Seonwoo Lee, Young Woong Ko:
A Location Tracking System using BLE Beacon Exploiting a Double-Gaussian Filter. 1162-1179 - Sung-Wook Park, Im-Yeong Lee:
Enhanced Mutual Authentication Scheme based on Chaotic Map for PCM in NFC Service Environment. 1180-1200 - Jung-Yeon Kim, Ye-Rin Cha, Sang-Heon Lee, Bong-Keun Jung:
Development and Evaluation of Tip Pinch Strength Measurement on a Paretic hand Rehabilitation Device. 1201-1216 - Amarmend Dashbalbar, Sang-Min Song, Jung-Won Lee, Byungjeong Lee:
Towards Enacting a SPEM-based Test Process with Maturity Levels. 1217-1233 - Jaekwon Lee, Kisub Kim, Yonghyeon Lee, Jang-Eui Hong, Young-Hoon Seo, Byung-Do Yang, Woosung Jung:
Extracting the Source Code Context to Predict Import Changes using GPES. 1234-1249 - Younghan Kim, Hyunseok Ahn, Changseok Yoon, Yongseok Lim, Seung-ok Lim, Myung-Hyun Yoon:
Implementation of Bistatic Backscatter Wireless Communication System Using Ambient Wi-Fi Signals. 1250-1264
Volume 11, Number 3, March 2017
- Bin Hu, Ning Xie, Tingting Zhao, Xiaotong Zhang:
Dynamic Task Scheduling Via Policy Iteration Scheduling Approach for Cloud Computing. 1265-1278 - Yuan Gao, Changping Zhu, Zhixiang Deng, Yibin Tang:
Adaptive Cooperation for Bidirectional Communication in Cognitive Radio Networks. 1279-1300 - Weizhi Zhong, Kunqi Chen, Xin Liu, Jianjiang Zhou:
Holistic Joint Optimal Cooperative Spectrum Sensing and Transmission Based on Cooperative Communication in Cognitive Radio. 1301-1318 - Jaewoo So:
Opportunistic Reporting-based Sensing-Reporting-Throughput Optimization Scheme for Cooperative Cognitive Radio Networks. 1319-1355 - Jing Cao, Junsheng Wu, Wenchao Yang:
Spectrum allocation strategy for heterogeneous wireless service based on bidding game. 1336-1356 - Guangjun Liang, Qi Zhu, Jianfang Xin, Ziyu Pan:
Joint Resource Allocation Scheme for OFDM Wireless-Powered Cooperative Communication Networks. 1357-1372 - Gul Zameen Khan, Ruben Gonzalez, Eun-Chan Park:
On the Design of a WiFi Direct 802.11ac WLAN under a TGn MIMO Multipath Fading Channel. 1373-1392 - Sungryoul Lee:
Sequential Hypothesis Testing based Polling Interval Adaptation in Wireless Sensor Networks for IoT Applications. 1393-1405 - Shaowei Liu, Weimin Lei, Wei Zhang, Xiaoshi Song:
MPMTP-AR: Multipath Message Transport Protocol Based on Application-Level Relay. 1406-1424 - Guowei Lei, Yuanan Liu, Xuefang Xiao:
Analysis of Joint Transmit and Receive Antenna Selection in CPM MIMO Systems. 1425-1440 - Van-Huy Vu, Ibrahim Mashal, Tein-Yaw Chung:
A Novel Bandwidth Estimation Method Based on MACD for DASH. 1441-1461 - Pervez Khan, Niamat Ullah, Hoon Kim:
WBAN MAC Protocols - Non-Saturation Modeling and Performance Analysis. 1462-1476 - Weilong Li, De-Wei Wu, Jia Du, Yang Zhou:
A biologically inspired model based on a multi-scale spatial representation for goal-directed navigation. 1477-1491 - Kwangsoo Kim, Seung-Hun Shin, Byeong-Hee Roh:
Firing Offset Adjustment of Bio-Inspired DESYNC-TDMA to Improve Slot Utilization Performances in Wireless Sensor Networks. 1492-1509 - Shiming He, Weini Zeng, Kun Xie, Hongming Yang, Mingyong Lai, Xin Su:
PPNC: Privacy Preserving Scheme for Random Linear Network Coding in Smart Grid. 1510-1532 - Tahani Gazdar, Abdelfettah Belghith, Ahmad S. Al-Mogren:
DTCF: A Distributed Trust Computing Framework for Vehicular Ad hoc Networks. 1533-1556 - Suchul Lee, Sungil Lee, Jun-Rak Lee:
SPaRe: Efficient SQLite Recovery Using Database Schema Patterns. 1557-1569 - Kyoungsoo Bok, Jinkyung Yun, Yeonwoo Kim, Jongtae Lim, Jaesoo Yoo:
User Reputation computation Method Based on Implicit Ratings on Social Media. 1570-1594
- Yue Ming, Guangchao Wang, Xiaopeng Hong:
Spatial-temporal texture features for 3D human activity recognition using laser-based RGB-D videos. 1595-1613 - Huiwu Luo, Fei Zhao, Shangfeng Chen, Huan-zhang Lu:
A Tree Regularized Classifier - Exploiting Hierarchical Structure Information in Feature Vector for Human Action Recognition. 1614-1632 - Chao Deng, Zhiheng Wang, Xingwang Li, Hui-na Li, Charles Casimiro Cavalcante:
An Improved Remote Sensing Image Fusion Algorithm Based on IHS Transformation. 1633-1649 - Ching-Liang Su:
Ear Recognition by Major Axis and Complex Vector Manipulation. 1650-1669 - Jinghui Chu, Hailan Liang, Zheng Tong, Wei Lu:
Slow Feature Analysis for Mitotic Event Recognition. 1670-1683 - Haiwei Lei, Wenyi Liu, Anhong Wang:
Parallel Deblocking Filter Based on Modified Order of Accessing the Coding Tree Units for HEVC on Multicore Processor. 1684-1699 - Liping Wang, Xiao Zhou, Cheng-You Wang, Baochen Jiang:
Post-Processing for JPEG-Coded Image Deblocking via Sparse Representation and Adaptive Residual Threshold. 1700-1721
- Chaoyuan Cui, Yun Wu, Yonggang Li, Bingyu Sun:
Lightweight Intrusion Detection of Rootkit with VMI-Based Driver Separation Mechanism. 1722-1741 - ZahidMehmood, Gongliang Chen, Jianhua Li, Aiiad Albeshri:
An Untraceable ECC-Based Remote User Authentication Scheme. 1742-1760 - Zhengwei Zhang, Lifa Wu, Yunyang Yan, Shaozhang Xiao, Shangbing Gao:
Adaptive reversible image watermarking algorithm based on DE. 1761-1784 - Xiao Zhang, Chengqi Wang, Zhiming Zheng:
An Efficient Chaotic Image Encryption Algorithm Based on Self-adaptive Model and Feedback Mechanism. 1785-1801 - Danhui Wang, An Wang:
Bitwise Collision Attack Based on Second-Order Distance. 1802-1819
Volume 11, Number 4, April 2017
- Liangmin Guo, Yonglong Luo, Xiaokang He, Guiyin Hu, Yan Dong:
A Method for Service Evaluation Based on Fuzzy Theory for Cloud Computing. 1820-1840 - Yujin Nam, Jaewoo So, Jinsung Kim:
Interference Mitigation Scheme for Device-to-Device MIMO Communications Underlaying a Cellular Network. 1841-1865 - Sukhwinder Sharma, Rakesh Kumar Bansal, Savina Bansal:
Heterogeneity-aware Energy-efficient Clustering (HEC) Technique for WSNs. 1866-1888 - Xuan-Xinh Nguyen, Dinh-Thuan Do:
An Adaptive-Harvest-Then-Transmit Protocol for Wireless Powered Communications: Multiple Antennas System and Performance Analysis. 1889-1910 - Shengwen Tian, Jianxin Liao, Tonghong Li, Jingyu Wang, Guanghai Cui:
Resilient Routing Overlay Network Construction with Super-Relay Nodes. 1911-1930 - Bo Yin, Siwang Zhou, Shiwen Zhang, Ke Gu, Fei Yu:
On Efficient Processing of Continuous Reverse Skyline Queries in Wireless Sensor Networks. 1931-1953 - Jin Xu, Kai Zhang:
A Low-Complexity CLSIC-LMMSE-Based Multi-User Detection Algorithm for Coded MIMO Systems with High Order Modulation. 1954-1971 - Hao Xu, Li-Ning Xing, Lan Huang:
Regional Science and Technology Resource Allocation Optimization Based on Improved Genetic Algorithm. 1972-1986 - Keol Cho, Ki-Seok Chung:
Self-Adaptive Termination Check of Min-Sum Algorithm for LDPC Decoders Using the First Two Minima. 1987-2001 - M. Ali Lodhi, Abdul Rehman, Meer M. Khan, Muhammad Asfand-e-yar, Faisal Bashir Hussain:
Transient Multipath routing protocol for low power and lossy networks. 2002-2019 - Feng Zhang, Xiaoming Wang, Lichen Zhang, Peng Li, Liang Wang, Wangyang Yu:
Dynamic Adjustment Strategy of n-Epidemic Routing Protocol for Opportunistic Networks: A Learning Automata Approach. 2020-2037 - Jia Zhao, Li Lv, Hui Wang, Hui Sun, Runxiu Wu, Jugen Nie, Zhifeng Xie:
Particle Swarm Optimization based on Vector Gaussian Learning. 2038-2057 - Gongchao Su, Bin Chen, Xiaohui Lin, Hui Wang, Lemin Li:
User Association and Base Station Sleep Management in Dense Heterogeneous Cellular Networks. 2058-2074
- Jeonghwan Gwak, Geunpyo Park, Moongu Jeon:
Viewpoint Invariant Person Re-Identification for Global Multi-Object Tracking with Non-Overlapping Cameras. 2075-2092 - Jia Liu:
Recognizing Actions from Different Views by Topic Transfer. 2093-2108 - Yiling Shen, Ningzhong Liu, Han Sun:
Sparse Representation based Two-dimensional Bar Code Image Super-resolution. 2109-2123 - Ying Tong, Yuehong Shen, Bin Gao, Fenggang Sun, Rui Chen, Yefeng Xu:
A Noisy-Robust Approach for Facial Expression Recognition. 2124-2148
- Chuyu She, Wushao Wen, Quanqi Ye, Kesong Zheng:
Vulnerable Path Attack and its Detection. 2149-2170 - Hyun-Kyo Oh, Sang-Wook Kim:
Identifying and Exploiting Trustable Users with Robust Features in Online Rating Systems. 2171-2195 - Zheng Zhao, Fenlin Liu, Daofu Gong:
An SDN based hopping multicast communication against DoS attack. 2196-2218 - Dongmin Kim, Ik Rae Jeong:
Provably-Secure Public Auditing with Deduplication. 2219-2236 - Feng Wang, Bo Han, Lei Niu, Ya Wang:
An Improved Cancelable Fingerprint Template Encryption System Research. 2237-2253