default search action
KSII Transactions on Internet and Information Systems, Volume 6
Volume 6, Number 1, January 30, 2012
- Kai-Di Chang, Jiann-Liang Chen:
Mobility-Aware Interference Avoidance Scheme for Vehicular WLANs. 5-23 - Dong Chen, Guiran Chang:
A Survey on Security Issues of M2M Communications in Cyber-Physical Systems. 24-45 - Ngoc-Thanh Dinh, Younghan Kim:
RESTful Architecture of Wireless Sensor Network for Building Management System. 46-63 - Hyun-Dong Lee, Mokdong Chung:
Context-Aware Security System for the Smart Phone-based M2M Service Environment. 64-83 - Menghan Chen, Beijun Shen:
Towards Agile Application Integration with M2M Platforms. 84-97 - Sungryel Lim, Boyun Choi, Hongchul Lee:
Control Variables of Remote Joint Analysis Realization on the M2M Case. 98-115 - Ramón Alcarria, Tomás Robles, Augusto Morales Dominguez, Sergio Gonzalez-Miranda:
Flexible Service Composition Based on Bundle Communication in OSGi. 116-130 - Liang Hu, Ling Chi, Hongtu Li, Wei Yuan, Yuyu Sun, Jianfeng Chu:
The Classic Security Application in M2M: the Authentication Scheme of Mobile Payment. 131-146 - Lianhai Shan, Zhenhong Li, Honglin Hu:
Converged Mobile Cellular Networks and Wireless Sensor Networks for Machine-to-Machine Communications. 147-161 - Meng Zhang, Zhe Wang, Menghan Guo:
A Method of Combining Scrambling Technology with Error Control Coding to Realize Both Confidentiality and Reliability in Wireless M2M Communication. 162-177 - Muhammad Omer Farooq, Marc St-Hilaire, Thomas Kunz:
Cross-Layer Architecture for QoS Provisioning in Wireless Multimedia Sensor Networks. 178-202 - Shaoyi Xu, Haiming Wang, Tao Chen, Tao Peng, Kyung Sup Kwak:
Device-to-Device Communication Underlaying Cellular Networks: Connection Establishment and Interference Avoidance. 203-228 - Jose Roberto Perez Cruz, Saúl E. Pomares Hernández, Enrique Munoz de Cote:
Data Alignment for Data Fusion in Wireless Multimedia Sensor Networks Based on M2M. 229-240 - Daniel G. Costa, Luiz Affonso Guedes:
A Survey on Transport Protocols for Wireless Multimedia Sensor Networks. 241-269 - Abdelfettah Belghith, Mohamed Belhassen:
CE-OLSR: a Cartography and Stability Enhanced OLSR for Dynamic MANETs with Obstacles. 270-286 - Thuc Kieu-Xuan, Insoo Koo:
Cooperative Spectrum Sensing using Kalman Filter based Adaptive Fuzzy System for Cognitive Radio Networks. 287-304 - Kai-Di Chang, Chi-Yuan Chen, Shih-Wen Hsu, Han-Chieh Chao, Jiann-Liang Chen:
Advanced Path-Migration Mechanism for Enhancing Signaling Efficiency in IP Multimedia Subsystem. 305-321 - Hui Zheng, Robin Shrestha, Jae Ho Hwang, JaeMong Kim:
A Parallel Combinatory OFDM System with Weighted Phase Subcarriers. 322-340 - Sangwook Kang, Sangbin Lee, Sae-Young Ahn, Sunshin An:
Energy Efficient Topology Control based on Sociological Cluster in Wireless Sensor Networks. 341-360 - Junrong Gu, Sung Jeen Jang, Jae Moung Kim:
A Proactive Dynamic Spectrum Access Method against both Erroneous Spectrum Sensing and Asynchronous Inter-Channel Spectrum Sensing. 361-378 - Chih-Heng Ke:
myEvalSVC: an Integrated Simulation Framework for Evaluation of H.264/SVC Transmission. 379-394 - Jianbin Xie, Tong Liu, Zhangyong Chen, Zhaowen Zhuang:
Joint Template Matching Algorithm for Associated Multi-object Detection. 395-405 - Chih-Lin Hu, Hsin-Cheng Lin, Yu-Feng Hsu, Bing-Jung Hsieh:
A P2P-to-UPnP Proxy Gateway Architecture for Home Multimedia Content Distribution. 406-425 - Ziguan Cui, Zongliang Gan, Xiuchang Zhu:
Joint Spatial-Temporal Quality Improvement Scheme for H.264 Low Bit Rate Video Coding via Adaptive Frameskip. 426-445 - Kuei-Shu Hsu, Wei-Ting Cho, Chin-Feng Lai, Xiaofei Wang, Yueh-Min Huang:
Design and Analysis of an Interactive Motion Simulator in Space Entertainment System. 446-467
Volume 6, Number 2, February 28, 2012
- Young Min Kwon, Jun Suk Kim, Min Young Chung, Hyunseung Choo, Tae-Jin Lee, Mihui Kim:
State of the Art 3GPP M2M Communications toward Smart Grid. 468-479 - Min Chen, Jiafu Wan, Fang Li:
Machine-to-Machine Communications: Architectures, Standards and Applications. 480-497 - Chengzhe Lai, Hui Li, Yueyu Zhang, Jin Cao:
Security Issues on Machine to Machine Communications. 198-514 - Yu-Yi Chen, Jinn-ke Jan, Meng-Lin Tsai, Chun Ching Ku, Der-Chen Huang:
On The Security of RFID-based Monitoring Mechanism for Retail Inventory Management. 515-528 - Marthinus J. Booysen, John S. Gilmore, Sherali Zeadally, Gert-Jan van Rooyen:
Machine-to-Machine (M2M) Communications in Vehicular Networks. 529-546 - Daqiang Zhang, Jiafu Wan, Qiang Liu, Xin Guan, Xuedong Liang:
A Taxonomy of Agent Technologies for Ubiquitous Computing Environments. 547-565 - Seyed Morteza Babamir:
M2M Architecture: Can It Realize Ubiquitous Computing in Daily life? 566-579 - Yongjie Li, Rongfang Song:
A New Compressive Feedback Scheme Based on Distributed Compressed Sensing for Time-Correlated MIMO Channel. 580-592 - Seung Jun Baek:
Reducing Feedback Overhead in Opportunistic Scheduling of Wireless Networks Exploiting Overhearing. 593-609 - Eun Sung Jeon, Jeong-Wook Seo, Janghoon Yang, Jong-Ho Paik, Dong Ku Kim:
Optimal Compensation of Dual Carrier Frequency Offsets for MISO-mode DVB-T2. 610-628 - Wen-Lin Yang, Wan-Ting Hong:
Channel Allocation Strategies for Interference-Free Multicast in Multi-Channel Multi-Radio Wireless Mesh Networks. 629-648 - Jihua Lu, Jianping An, Xiangming Li, Jie Yang, Lei Yang:
A Percolation based M2M Networking Architecture for Data Transmission and Routing. 649-663 - Ping Zhong, Jianghong Shi, Yuxiang Zhuang, Huihuang Chen, Xuemin Hong:
A Generalized Markov Chain Model for IEEE 802.11 Distributed Coordination Function. 664-682 - Changchun Xu, Jingdong Gao, Yanyi Xu, Jianhua He:
Unified Model for Performance Analysis of IEEE 802.11 Ad Hoc Networks in Unsaturated Conditions. 683-701 - Eun Sung Jeon, Jeong-Wook Seo, Janghoon Yang, Jong-Ho Paik, Dong Ku Kim:
Iterative Detection and ICI Cancellation for MISO-mode DVB-T2 System with Dual Carrier Frequency Offsets. 702-721 - Myunghun Lee, Soo-Hyung Kim, Gueesang Lee, Sun-Hee Kim, Hyung Jeong Yang:
Correction for Misrecognition of Korean Texts in Signboard Images using Improved Levenshtein Metric. 722-733 - Sajida Kalsoom, Sheikh Ziauddin, Abdul Rehman Abbasi:
An Image-Based CAPTCHA Scheme Exploiting Human Appearance Characteristics. 734-750 - Junghyun Nam, Moonseong Kim, Juryon Paik, Dongho Won:
Security Weaknesses in Harn-Lin and Dutta-Barua Protocols for Group Key Establishment. 751-765 - Hyoung Chun Kim, Young Han Choi, Dong Hoon Lee:
JsSandbox: A Framework for Analyzing the Behavior of Malicious JavaScript Code using Internal Function Hooking. 766-783
Volume 6, Number 3, March 23, 2012
- Chanhong Kim, Jungwoo Lee:
On OFDM Subcarrier Allocation Strategies for Soft Hand-off in Cellular Systems. 784-793 - Zhian Deng, Yubin Xu, Lin Ma:
Joint Access Point Selection and Local Discriminant Embedding for Energy Efficient and Accurate Wi-Fi Positioning. 794-814 - Kyoung Soo Bok, Dong-Won Kwak, Jae-Soo Yoo:
A Resource Discovery with Data Dissemination over Unstructured Mobile P2P Networks. 815-834 - Van Vinh Nguyen, Jong Weon Lee:
A Hybrid Positioning System for Indoor Navigation on Mobile Phones using Panoramic Images. 835-854 - Ki-Ryang Moon, Do-Sik Yoo, Seong-Jun Oh:
Capacity Bound for Discrete Memoryless User-Relaying Channel. 855-868 - Bong Gyou Lee, Seong-Jin Kim, Keon Chul Park, Su Jin Kim, Eui Suk Jeong:
Empirical Analysis of Learning Effectiveness in u-Learning Environment with Digital Textbook. 869-885 - Muhammad Shoaib Siddiqui, Choong Seon Hong:
A Set-top Box with Virtual Platform Support for QoS Management in IMS Based Multiple Provider Networks. 886-905 - Inkyoung Cho, Il-Kyoo Lee, Ju-Phil Cho:
Coexistence between Wireless Fidelity and Wireless Microphone in TV Band. 906-918 - Saleh Ali Alomari, Putra Sumari:
Effective Broadcasting and Caching Technique for Video on Demand over Wireless Network. 919-940 - Lin Zhou, Xijian Ping, Haolin Gao, Sen Xu:
A Novel Video Image Text Detection Method. 941-953 - Peichang Shi, Huaimin Wang, Hao Yin, Bo Ding, Tianzuo Wang, Miao Wang:
CDN Scalability Improvement using a Moderate Peer-assisted Method. 954-972
Volume 6, Number 4, April 25, 2012
- Xi Zhang, Xiaofei Wang, Anna Liu, Quan Zhang, Chaojing Tang:
PRI: A Practical Reputation-based Incentive Scheme for Delay Tolerant Networks. 973-988 - Soo Young Shin:
Unsaturated Throughput Analysis of IEEE 802.11 DCF under Imperfect Channel Sensing. 989-1005 - Hyoung-Gook Kim:
Enhanced Timing Recovery Using Active Jitter Estimation for Voice-Over IP Networks. 1006-1025 - Youngtaek Bae, Sungkyu Jung, Jungwoo Lee:
Performance Comparison of Orthogonal and Non-orthogonal AF Protocols in Cooperative Relay Systems. 1026-1040 - Xinrong Guan, Yueming Cai, Weiwei Yang, Yunpeng Cheng, Junquan Hu:
Increasing Secrecy Capacity via Joint Design of Cooperative Beamforming and Jamming. 1041-1062 - Shengdong Xie, Aiqun Hu, Yi Huang:
Time-Delay Estimation in the Multi-Path Channel based on Maximum Likelihood Criterion. 1063-1075 - Dongho Lee, Kwangsue Chung:
Unsynchronized Duty-cycle Control for Sensor Based Home Automation Networks. 1076-1089 - Wan-Young Chung:
Multi-Modal Sensing M2M Healthcare Service in WSN. 1090-1105 - Jianxin Liao, Yang Liu, Jingyu Wang, Xiaomin Zhu:
Service Composition Based on Niching Particle Swarm Optimization in Service Overlay Networks. 1106-1127 - Yequn Wang, Zongju Peng, Gangyi Jiang, Mei Yu, Feng Shao:
Fast Mode Decision For Depth Video Coding Based On Depth Segmentation. 1128-1139 - Lin Zhou, Xijian Ping, Haolin Gao, Sen Xu:
A Novel Video Image Text Detection Method. 1140-1152 - Wen Hui, Chuang Lin, Yang Yang:
MediaCloud: A New Paradigm of Multimedia Computing. 1153-1170 - Ran Liu, Yingchun Tan, Fengchun Tian, Hui Xie, Guoqin Tai, Weimin Tan, Junling Liu, Xiaoyan Xu, Kadri Chaibou, Naana Abakah:
Visual Fatigue Reduction Based on Depth Adjustment for DIBR System. 1171-1187 - Jingbo Zhou, Shangbing Gao, Zhong Jin:
A New Connected Coherence Tree Algorithm For Image Segmentation. 1188-1202 - Bing-Fei Wu, Ying-Han Chen, Chih-Chung Kao, Yen-Feng Li, Chao-Jung Chen:
A Vision-Based Collision Warning System by Surrounding Vehicles Detection. 1203-1222 - Iman M. Almomani, Maha K. Saadeh:
Security Model for Tree-based Routing in Wireless Sensor Networks: Structure and Evaluation. 1223-1247 - Chi-Yao Weng, Shiuh-Jeng Wang, Jonathan C. L. Liu, Dushyant Goyal:
Prediction-based Reversible Data Hiding Using Empirical Histograms in Images. 1248-1266
Volume 6, Number 5, May 2012
- Anup Thapa, Seokjoo Shin:
QoS Provisioning in Wireless Body Area Networks: A Review on MAC Aspects. 1267-1285 - ZhengYi Chai, DeXian Zhang, Sifeng Zhu:
Resource Allocation with Proportional Rate In Cognitive Wireless Network: An Immune Clonal Optimization Scheme. 1286-1302 - Fu-Quan Zhang, Inwhee Joe, Yong-Jin Park:
Tier-based Proactive Path Selection Mode for Wireless Mesh Networks. 1303-1315 - Zhendong Yin, Yunsheng Kuang, Hongjian Sun, Zhilu Wu, Wenyan Tang:
A Hybrid Multiuser Detection Algorithm for Outer Space DS-UWB Ad-hoc Network with Strong Narrowband Interference. 1316-1332 - Li Li, Qing-Shan Jia, Xiaohong Guan, Hengtao Wang:
Enhancing the Robustness and Efficiency of Scale-free Network with Limited Link Addition. 1333-1353 - Megat Zuhairi, Haseeb Zafar, David Harle:
Dynamic Reverse Route for On-Demand Routing Protocol in MANET. 1354-1372 - Jin-Yong Jung, Jung-Hyun Lee, JongWoo Ha, SangKeun Lee:
Vocabulary Expansion Technique for Advertisement Classification. 1373-1387
- Yohan Kim, Jitae Shin, Hokyom Kim:
Lightweight Quality Metric Based on No-Reference Bitstream for H.264/AVC Video. 1388-1399 - Jinseok Lee, Shung Han Cho, Seong-Jun Oh, Sangjin Hong:
Local and Global Information Exchange for Enhancing Object Detection and Tracking. 1400-1420 - Hyun Jung La, Soo Dong Kim:
Balanced MVC Architecture for High Efficiency Mobile Applications. 1421-1444
- Hyuncheol Jeong, Huy Kang Kim, Sangjin Lee, Eunjin Kim:
Detection of Zombie PCs Based on Email Spam Analysis. 1445-1462 - Jianqi Zhu, Feng Fu, Chong-kwon Kim, Ke-xin Yin, Yanheng Liu:
A DoS Detection Method Based on Composition Self-Similarity. 1463-1478
Volume 6, Number 6, June 2012
- Hosseinali Jamal, Seyed Ali Ghorashi, Seyed Mohammad Sajad Sadough:
A Fair Radio Resource Allocation Algorithm for Uplink of FBMC Based CR Systems. 1479-1495 - Yi Xie, Guoming Tang, Daifei Wang, Weidong Xiao, Daquan Tang, Jiuyang Tang:
Rethinking of the Uncertainty: A Fault-Tolerant Target-Tracking Strategy Based on Unreliable Sensing in Wireless Sensor Networks. 1496-1521 - Jiping Li, Shixun Wu, Shouyin Liu:
A Dynamical Hybrid CAC Scheme and Its Performance Analysis for Mobile Cellular Network with Multi-Service. 1522-1545 - Yanhong Ding, Tie Qiu, He Jiang, Weifeng Sun:
A Pattern-based Query Strategy in Wireless Sensor Network. 1546-1564 - Fei Shi, JooSeok Song:
A Cluster-based Countermeasure against Media Access Control Layer Attacks in IEEE 802.11 Ad Hoc Networks. 1565-1585 - Mohammad Moustafa Qabajeh, Aisha H. Adballa, Othman O. Khalifa, Liana Khamis Qabajeh:
Position-Based Multicast Routing in Mobile Ad hoc Networks: An Analytical Study. 1586-1605 - Zhangjun Fan, Kun Xu, Bangning Zhang, Xiaofei Pan:
Performance Analysis of Amplify-and-Forward Two-Way Relaying with Antenna Correlation. 1606-1626 - Yun-Jung Lee, Jin-Su Lim, Jeong-Hoon Ji, Hwan-Gue Cho, Gyun Woo:
Plagiarism Detection among Source Codes using Adaptive Methods. 1627-1648 - Shi Dong, Wei Ding, Liang Chen:
Measure Correlation Analysis of Network Flow Based On Symmetric Uncertainty. 1649-1667 - Jaeshin Jang, Sang Wu Kim, Sunghong Wie:
Throughput and Delay Analysis of a Network Coding-enabled Cooperative MAC Protocol for Ad Hoc Networks. 1668-1688
- Eduardo López Domínguez, Saúl E. Pomares Hernández, Pilar Gómez-Gil, Jorge de la Calleja, Antonio Benítez, Antonio Marín-Hernández:
Intermedia Synchronization Protocol for Continuous Media Using MPEG-4 in Mobile Distributed Systems. 1689-1706 - Mi-Ryang Kim, Mi-Ae Choi, Jaehyoun Kim:
Factors influencing the Usage and Acceptance of Multimedia-based Digital Textbooks in Pilot School. 1707-1717
- Chi-Shiang Chan, Yuan-Yu Tsai, Chao-Liang Liu:
An Image Hiding Scheme by Linking Pixels in the Circular Way. 1718-1734
Volume 6, Number 7, July 2012
- Xuxun Liu, Jinglun Shi:
Clustering Routing Algorithms In Wireless Sensor Networks: An Overview. 1735-1755 - Farhana Jabeen, Sarfraz Nawaz, Sadaf Tanveer, Majid Iqbal Khan:
Spatio-Temporal Query Processing Over Sensor Networks: Challenges, State Of The Art And Future Directions. 1756-1776 - Ding Xu, Zhiyong Feng, Ping Zhang:
Power Allocation Schemes For Downlink Cognitive Radio Networks With Opportunistic Sub-channel Access. 1777-1791 - Aymen M. Kareem, Ayman A. El-Saleh, Masuri Othman:
Combined Time Synchronization And Channel Estimation For MB-OFDM UWB Systems. 1792-1801 - Wenzhu Zhang, Kyung Sup Kwak, Chengxiao Feng:
Network Selection Algorithm for Heterogeneous Wireless Networks Based on Multi-Objective Discrete Particle Swarm Optimization. 1802-1814
- SoongSun Shin, Gyoung Bae Kim, Hae-Young Bae:
Adaptive Cell-Based Index For Moving Objects In Indoor. 1815-1830
- Kai Chen, Huiyu Liu, Xiaosu Chen:
Detecting LDoS Attacks based on Abnormal Network Traffic. 1831-1853 - Jea-Tek Ryu, Byeong-Hee Roh, Ki-Yeol Ryu, Myungchul Yoon:
Detection And Countermeasure Scheme For Call-Disruption Attacks On SIP-Based Voip Services. 1854-1873 - Yunho Lee, Sang Guun Yoo, Soojin Lee:
An Efficient Detection And Management Of False Accusation Attacks In Hierarchical Ad-Hoc Networks. 1874-1893
Volume 6, Number 8, August 2012
- Walid A. Hassan, Han-Shin Jo, Maziar M. Nekovee, Chee Yen Leow, Tharek Abd Rahman:
Spectrum Sharing Method for Cognitive Radio in TV White Spaces: Enhancing Spectrum Sensing and Geolocation Database. 1894-1912 - Kan Zheng, Wei Li, Fei Liu, Wei Xiang:
Utility-based Resource Allocation with Bipartite Matching in OFDMA-based Wireless Systems. 1913-1925
- Xiaodan Hou, Tao Zhang, Gang Xiong, Baoji Wan:
Forensics Aided Steganalysis of Heterogeneous Bitmap Images with Different Compression History. 1926-1945 - Kai Zhang, Lin Ding, Junzhi Li, Jie Guan:
Real Time Related Key Attack on Hummingbird-2. 1946-1963 - Mohammad Arabzadeh, Mohammad Reza Rahimi:
Reversible Data Hiding Scheme Based on Maximum Histogram Gap of Image Blocks. 1964-1981 - Zuowen Tan:
Identity-based Authenticated Multiple Key Agreement Protocol with PKG Forward Security. 1982-1997
Volume 6, Number 9, September 2012
- Xiaobo Tan, Hang Zhang:
A CORDIC-Jacobi Based Spectrum Sensing Algorithm For Cognitive Radio. 1998-2016 - Tang Liu, Jian Peng, Xiao-fen Wang, Jin Yang, Bing Guo:
Research on the Energy Hole Problem Based on Non-uniform Node Distribution for Wireless Sensor Networks. 2017-2036 - Mohsen Akbari, Md. Kamal Hossain, Mohsen Riahi Manesh, Ayman A. El-Saleh, Aymen M. Kareem:
Minimizing Sensing Decision Error in Cognitive Radio Networks using Evolutionary Algorithms. 2037-2051 - Dong Chen, Guiran Chang, Jie Jia:
AC4E: An Access Control Model for Emergencies of Mission-Critical Cyber-Physical Systems. 2052-2072 - Walid A. Hassan, Tharek Abd Rahman:
A Spectrum Sharing Model for Compatibility between IMT-Advanced and Digital Broadcasting. 2073-2085 - Jiqing Ni, Zesong Fei, Chengwen Xing, Di Zhao, Jingming Kuang:
Terminal-based Dynamic Clustering Algorithm in Multi-Cell Cellular System. 2086-2097 - Guanyao Du, Ke Xiong, Dandan Li, Zhengding Qiu:
Transmission Power Minimization with Network Coding for Mobile Terminals in Cellular Relay Networks. 2098-2117 - Hayoung Oh:
A Robust Mobile Video Streaming in Heterogeneous Emerging Wireless Systems. 2118-2135