


Остановите войну!
for scientists:


default search action
KSII Transactions on Internet and Information Systems, Volume 8
Volume 8, Number 1, January 2014
- Jingyu Feng, Yuqing Zhang, Guangyue Lu, Liang Zhang:
Securing Cooperative Spectrum Sensing against Rational SSDF Attack in Cognitive Radio Networks. 1-17 - Jing Wang, Mingming Lin, Xuemin Hong, Jianghong Shi:
QoS-Guaranteed Capacity of Centralized Cognitive Radio Networks with Interference Averaging Techniques. 18-34 - Sahana Bhosale, Rohin D. Daruwala:
Multi-criteria Vertical Handoff Decision Algorithm Using Hierarchy Modeling and Additive Weighting in an Integrated WiFi/WiMAX/UMTS Environment- A Case Study. 35-57 - Zeyang Dai, Jian Liu, Yunji Li, Keping Long:
Fast Cooperative Sensing with Low Overhead in Cognitive Radios. 58-73 - Mingchuan Zhang, Changqiao Xu, Jianfeng Guan, Ruijuan Zheng, Qingtao Wu, Hongke Zhang:
A Novel Bio-inspired Trusted Routing Protocol for Mobile Wireless Sensor Networks. 74-90 - Xiaolu Wu, Yueyun Chen:
Joint Resource Allocation for Cellular and D2D Multicast Based on Cognitive Radio. 91-107 - Huanqin Gao, Rongfang Song:
Distributed Compressive Sensing Based Channel Feedback Scheme for Massive Antenna Arrays with Spatial Correlation. 108-122 - Govind P. Gupta, Manoj Misra, Kumkum Garg:
Distributed Information Extraction in Wireless Sensor Networks using Multiple Software Agents with Dynamic Itineraries. 123-144 - Jianxin Liao, Min Feng, Tonghong Li, Jingyu Wang, Sude Qing:
Topology-aware Virtual Network Embedding Using Multiple Characteristics. 145-164 - Sunil Dhakal, Seokjoo Shin:
Precise-Optimal Frame Length Based Collision Reduction Schemes for Frame Slotted Aloha RFID Systems. 165-182 - Muhammad Khalil Afzal, Byung-Seo Kim, Sung Won Kim:
A Leader-Based Reliable Multicast MAC Protocol for Multimedia Applications. 183-195
- Xibin Jia, Yanhua Zhang, David M. W. Powers
, Humayra Binte Ali:
Multi-classifier Fusion Based Facial Expression Recognition Approach. 196-212 - Jenq-Haur Wang
, Chuan-Ming Liu, Jhih-Siang Syu, Yen-Lin Chen
:
An Image Retrieving Scheme Using Salient Features and Annotation Watermarking. 213-231 - Wen-sen Yu, Ming-hui Wang, Hua-wen Chang, Shu-qing Chen:
A Fast Kernel Regression Framework for Video Super-Resolution. 232-248 - Menglin Wu, Qiang Chen, Quan-Sen Sun:
Medical Image Retrieval with Relevance Feedback via Pairwise Constraint Propagation. 249-268 - Bin Feng, Zhi-Hui Wang, Duo Wang, Ching-Yun Chang, Mingchu Li:
A Novel Reversible Chinese Text Information Hiding Scheme based on Lookalike Traditional and Simplified Chinese Characters. 269-281
- Jinbo Xiong, Zhiqiang Yao, Jianfeng Ma, Ximeng Liu
, Qi Li, Jun Ma:
PRIAM: Privacy Preserving Identity and Access Management Scheme in Cloud. 282-304 - Zhenji Zhou, Lifa Wu, Zheng Hong, Ming-fei Xu, Fan Pan:
DTSTM: Dynamic Tree Style Trust Measurement Model for Cloud Computing. 305-325
Volume 8, Number 2, February 2014
- Yang Lu, Xuezhi Tan, Yun Mo, Lin Ma:
A New Green Algorithm for Energy Efficiency in High-Density WLANs. 326-354 - Jingyu Feng, Guangyue Lu, Xiangcen Min:
Social Incentives for Cooperative Spectrum Sensing in Distributed Cognitive Radio Networks. 355-370 - Zamree Che-aron, Aisha Hassan Abdalla
, Khaizuran Abdullah, Md. Arafatur Rahman
:
FTCARP: A Fault-Tolerant Routing Protocol for Cognitive Radio Ad Hoc Networks. 371-388 - Sijia Lou, Longxiang Yang:
Opportunistic Multiple Relay Selection for Two-Way Relay Networks with Outdated Channel State Information. 389-405 - Jay Shree Ranjit, Subodh Pudasaini, Seokjoo Shin:
A New Emergency Handling Mechanism based on IEEE 802.15.4 for Health Monitoring Applications. 406-423 - Robin Shrestha, Insan Bae, Jae Moung Kim:
A Leakage-Based Solution for Interference Alignment in MIMO Interference Channel Networks. 424-442 - Jianxin Liao, Shengwen Tian, Jingyu Wang, Tonghong Li
, Qi Qi:
Load-Balanced One-hop Overlay Multipath Routing with Path Diversity. 443-461
- Ching-Ting Tu
, Hwei-Jen Lin, Fu-Wen Yang, Hsiao-Wei Chang:
Approximate Detection Method for Image Up-Sampling. 462-482 - Zan Gao, Hua Zhang, Anan Liu, Yanbing Xue, Guangping Xu
:
Human Action Recognition Using Pyramid Histograms of Oriented Gradients and Collaborative Multi-task Learning. 483-503
- Suk Hwan Lee, Seong Geun Kwon, Ki-Ryong Kwon:
Geometric Multiple Watermarking Scheme for Mobile 3D Content Based on Anonymous Buyer-Seller Watermarking Protocol. 504-523 - Jingjing Huang, Ting Jiang:
Secret Key Generation Using Reciprocity in Ultra-wideband Outdoor Wireless Channels. 524-539
- In Kuk Song:
Emerging Internet Technology & Service toward Government 3.0. 540-546 - Kyu Tae Kwak
, Kyung Hee Song, Soo Kyung Park, Bong Gyou Lee:
The Survival of Paid Broadcasting Channels in Korea, 1993-2010. 547-566 - Ki Youn Kim:
Business Intelligence and Marketing Insights in an Era of Big Data: The Q-sorting Approach. 567-582 - Gil-Young Song, Youngjoon Cheon, Kihwang Lee, Kyung Min Park, Hae-Chang Rim:
Inter-category Map: Building Cognition Network of General Customers through Big Data Mining. 583-600 - Seong-Jun Kim, Kyung Won Park, Kyung-Taek Lee, Hyung-Jin Choi:
An Improved Joint Detection of Frame, Integer Frequency Offset, and Spectral Inversion for Digital Radio Mondiale Plus. 601-617 - Jong-Moon Chung, Chang Hyun Kim, Daeyoung Lee:
A Minimum Energy Consuming Mobile Device Relay Scheme for Reliable QoS Support. 618-633 - Seokung Yoon, Haeryong Park, Hyeong Seon Yoo:
Development of Indicators for Information Security Level Assessment of VoIP Service Providers. 634-645 - Imran Ghani, Zulkarnain Azham, Seung Ryul Jeong:
Integrating Software Security into Agile-Scrum Method. 646-663 - Frank Elijorde, Sungho Kim, Jaewan Lee:
A Wind Turbine Fault Detection Approach Based on Cluster Analysis and Frequent Pattern Mining. 664-677 - Jin-Hyung Park, Hyunhun Cho, Wonhyuk Lee, Seunghae Kim, Byoung-Ju Yun:
A Design of Architecture for Federating between NRNs and Determination Optimal Path. 678-688 - Haksung Kim, Hyun Ahn, Kwanghoon Pio Kim:
Modeling, Discovering, and Visualizing Workflow Performer-Role Affiliation Networking Knowledge. 689-706 - Sun Rae Park, Du-Seok Jin, Jong-Suk Ruth Lee, Kumwon Cho, Kyu-Chul Lee:
Intelligent u-Learning and Research Environment for Computational Science on Mobile Device. 707-720 - Seok-Pil Lee, Hoon Yoo, Dalwon Jang:
A Design of Matching Engine for a Practical Query-by-Singing /Humming System with Polyphonic Recordings. 721-734
Volume 8, Number 3, March 2014
- Shiliang Luo, Lianglun Cheng, Bin Ren:
Practical Swarm Optimization based Fault-Tolerance Algorithm for the Internet of Things. 735-748 - Xiaoqiang Li, Qi Zhou, Hui Dai, Jie Zhang, Ying Li:
A Novel Definition of Spectrum Holes for Improved Spectrum Utilization Efficiency. 749-761 - Jaehyun Hwang, Joon Yoo:
FaST: Fine-grained and Scalable TCP for Cloud Data Center Networks. 762-777 - Kai Liu, Yupeng Zhang, Feng Liu:
An Exposed-Terminal-Eliminated Dual-Channel MAC Protocol for Exploiting Concurrent Transmissions in Multihop Wireless Networks. 778-798 - Ying Zhu, Jia Liu, Zhiyong Feng, Ping Zhang:
Analysis of Improved Cyclostationary Spectrum Sensing with SLC Diversity over Composite Multipath Fading-Lognormal Shadowing Channels. 799-818 - Juan Luo, Shan Fu, Di Wu
:
Energy-aware Virtual Resource Mapping Algorithm in Wireless Data Center. 819-837 - Mi-Jung Choi, Jun-Sang Park, Myung-Sup Kim:
Integrated Internet Application-level Traffic Classification. 838-856 - Guoqiang Zheng
, Lei Fu, Jishun Li
, Ming Li:
A Large-scale Multi-track Mobile Data Collection Mechanism for Wireless Sensor Networks. 857-872 - Jinsoo Kim, Myeong-Cheol Ko, Junghyun Nam, Junghwan Kim:
Bitmap-based Prefix Caching for Fast IP Lookup. 873-889 - Yuan Gao, Changping Zhu, Yibin Tang:
Spectrum Hole Utilization in Cognitive Two-way Relaying Networks. 890-910 - Gyanendra Prasad Joshi
, Seung Yeob Nam
, Srijana Acharya
, Sung Won Kim:
Analysis of Channel Access Delay in CR-MAC Protocol for Ad Hoc Cognitive Radio Wireless Sensor Networks without a Common Control Channel. 911-923 - Jia Liu, GuiXia Kang, Ying Zhu:
Optimal Power Allocation and Outage Analysis for Cognitive MIMO Full Duplex Relay Network Based on Orthogonal Space-Time Block Codes. 924-944 - Yanchun Li, Guangxi Zhu, Hua Chen, Minho Jo
, Yingzhuang Liu:
SLNR-based User Scheduling in Multi-cell networks: from Multi-antenna to Large-Scale Antenna System. 945-964 - Tao Wang, Limin Shen, Chuan Ma:
A Process Algebra-Based Detection Model for Multithreaded Programs in Communication System. 965-983 - Long Yu, Qihui Wu, Jinlong Wang:
Optimal Adaptive Multiband Spectrum Sensing in Cognitive Radio Networks. 984-996 - Seungjae Shin, Namgi Kim, Byoung-Dai Lee, Yoon-Ho Choi, Hyunsoo Yoon:
On the Design of Delay based Admission Control in Hierarchical Networks. 997-1010
- Jongjoo Park, Jongwha Chong:
Edge-preserving Demosaicing Method for Digital Cameras with Bayer-like W-RGB Color Filter Array. 1011-1025 - Seung-Hyun Yoon:
A Sweep Surface Based on Bivariate B-spline Motion. 1026-1039 - Hye-Jeong Cho, Chae-Bong Sohn
, Seoung-Jun Oh:
Video Content-Based Bit Rate Estimation Scheme for Transcoding in IPTV Services. 1040-1057 - Yueh-Teng Hsu, Chun-Chieh Chen, Shu-Ming Tseng
:
GPU-Accelerated Single Image Depth Estimation with Color-Filtered Aperture. 1058-1070 - Jonghak Kim, Joonhyuk Yang
, Kwangyun Wohn:
AgeCAPTCHA: an Image-based CAPTCHA that Annotates Images of Human Faces with their Age Groups. 1071-1092 - Han Huang
, Yao Zhao, Chunyu Lin
, Huihui Bai:
Fast Intraframe Coding for High Efficiency Video Coding. 1093-1104
- Jeanne Chen, Tung-Shou Chen, Wien Hong, Gwoboa Horng, Han-Yan Wu, Chih-Wei Shiu
:
A New Reference Pixel Prediction for Reversible Data Hiding with Reduced Location Map. 1105-1118 - Adarsh Kumar, Krishna Gopal, Alok Aggarwal:
Design and Analysis of Lightweight Trust Mechanism for Accessing Data in MANETs. 1119-1143 - Lih-Chyau Wuu, Chi-Hsiang Hung, Wen-Chung Kuo:
Group Key Management based on (2, 2) Secret Sharing. 1144-1156 - Tzong-Sun Wu, Yih-Sen Chen, Han-Yu Lin:
Toward Efficient Convertible Authenticated Encryption Schemes Using Self-Certified Public Key System. 1157-1177
Volume 8, Number 4, April 2014
- Shiliang Luo, Lianglun Cheng, Bin Ren:
Practical Swarm Optimization based Fault-Tolerance Algorithm for the Internet of Things. 1178-119 - Suchul Lee, Sangsoon Lim, Jun-Rak Lee:
An Oligopoly Spectrum Pricing with Behavior of Primary Users for Cognitive Radio Networks. 1192-1207 - Changju Kan, Qihui Wu, Fei Song, Guoru Ding
:
Optimization of Cooperative Sensing in Interference-Aware Cognitive Radio Networks over Imperfect Reporting Channel. 1208-1222 - Ajmal Khan, You Ze Cho:
BL-CAST: Beacon-Less Broadcast Protocol for Vehicular Ad Hoc Networks. 1223-1236 - Wei Kuang Lai, Chung Shuo Fan, Chin-Shiuh Shieh:
Efficient Cluster Radius and Transmission Ranges in Corona-based Wireless Sensor Networks. 1237-1255 - Chunxiao Liu, Yan Zhang, Xu E, Yuqiang Yang, Xu-Hui Zhao:
A Novel Multi-Path Routing Algorithm Based on Clustering for Wireless Mesh Networks. 1256-1275 - Minseok Oh:
Pulse Dual Slope Modulation for VLC. 1276-1291 - Heejin Joung, Han-Shin Jo
, Cheol Mun, Jong-Gwan Yook:
Space-Polarization Division Multiple Access System with Limited Feedback. 1292-1306 - Qiang Li, Tao Qin, Xiaohong Guan, Qinghua Zhe:
Exploring Flow Characteristics in IPv6: A Comparative Measurement Study with IPv4 for Traffic Monitoring. 1307-1323 - Bingxian Lu
, Zhenquan Qin, Lei Wang, Liang Sun, Ming Zhu, Lei Shu
:
Connectivity Properties of Real BitTorrent Swarms. 1324-1343 - Myungseok Song, Jongpil Jeong
:
Performance Analysis of A Novel Inter-Networking Architecture for Cost-Effective Mobility Management Support. 1344-1367 - Xingwang Li
, Lihua Li, Ling Xie:
Achievable Sum Rate Analysis of ZF Receivers in 3D MIMO Systems. 1368-1389 - Mujun Qian, Chen Liu, Youhua Fu, Wei-Ping Zhu:
A Relay Selection and Power Allocation Scheme for Cooperative Wireless Sensor Networks. 1390-1405 - Jingyu Wang, Jianxin Liao, Jing Wang, Tonghong Li, Qi Qi:
Estimating the Effects of Multipath Selection on Concurrent Multipath Transfer. 1406-1423 - Hong Wang, Rongfang Song:
Clustering Based Adaptive Power Control for Interference Mitigation in Two-Tier Femtocell Networks. 1424-1441 - Weitao Han, Peng Yi, Le Tiang:
Prefix Cuttings for Packet Classification with Fast Updates. 1442-1462 - Hao Zheng, Qiaolin Ye, Zhong Jin:
A Novel Multiple Kernel Sparse Representation based Classification for Face Recognition. 1463-1480 - Yongwha Chung, Haelyeon Kim, Hansung Lee, Daihee Park, Taewoong Jeon, Hong-Hee Chang:
A Cost-Effective Pigsty Monitoring System Based on a Video Sensor. 1481-1498 - Dongning Zhao, Weixin Xie:
A Semi-fragile Image Watermarking Scheme Exploiting BTC Quantization Data. 1499-1513
Volume 8, Number 5, May 2014
- Leng-Gan Yi, Yimin Lu:
Two-Tier Interference Elimination for Femtocells Based on Cognitive Radio Centralized Spectrum Management. 1514-1531 - K. Muthumeenakshi, S. Radha:
A Generalized Markovian Based Framework for Dynamic Spectrum Access in Cognitive Radios. 1532-1553 - Fuhong Lin
, Xianwei Zhou, Daochao Huang, Wei Song, Dongsheng Han:
Service Scheduling in Cloud Computing based on Queuing Game Model. 1554-1566 - Mohammad Mehedi Hassan, Biao Song, M. Shamim Hossain, Atif Alamri, Mohammed Abdullah Alnuem, Muhammad Mostafa Monowar, M. Anwar Hossain
:
Efficient Virtual Machine Resource Management for Media Cloud Computing. 1567-1587 - Zienab Pouladmast Ghadiri, Ayman A. El-Saleh
, Gobi Vetharatnam
:
Evolutionary Algorithm-based Space Diversity for Imperfect Channel Estimation. 1588-1603 - Inhye Park, Hyungkeun Lee, Seokjoong Kang:
RIX-MAC: An Energy-Efficient Receiver-Initiated Wakeup MAC Protocol for WSNs. 1604-1617 - Bhagyalakshmi Lakshminarayanan
, Krishnan Murugan
:
Avoiding Energy Holes Problem using Load Balancing Approach in Wireless Sensor Network. 1618-1637 - Hongwu Liu, Aijin Jung, Kyung Sup Kwak:
Sequential Optimization for Subcarrier Pairing and Power Allocation in CP-SC Cognitive Relay Systems. 1638-1653 - Jianxin Dai, Shuai Liu, Ming Chen, Jun Zhou, Jie Qi, Jingwei Liang:
Robust Design of Coordinated Set Planning with the Non-Ideal Channel. 1654-1675 - Xu Zhang, Baolong Guo, Yunyi Yan, Wei Sun, Meng Yi:
Image Retrieval Method Based on IPDSH and SRIP. 1676-1689 - Phuc Huu Truong, Chang-Woo Park, Minsik Lee
, Sang-Il Choi, Sang-Hoon Ji, Gu-Min Jeong:
Rapid Implementation of 3D Facial Reconstruction from a Single Image on an Android Mobile Device. 1690-1710 - Young-Joon Chai, Hyun-Ki Hong, TaeYong Kim:
Disjoint Particle Filter to Track Multiple Objects in Real-time. 1711-1725 - L. Kavisankar
, Chenniappan Chellappan, P. Sivasankar
, Ashwin Karthi, A. Srinivas:
A Pioneer Scheme in the Detection and Defense of DrDoS Attack Involving Spoofed Flooding Packets. 1726-1743 - Lin Dong, Jinwoo Park, Junbeom Hur, Ho-Hyun Park:
An Enhanced Remote Data Checking Scheme for Dynamic Updates. 1744-1765 - Yu Lu
, Sook Yoon, Shan Juan Xie, Jucheng Yang, Zhihui Wang
, Dong Sun Park:
Finger Vein Recognition Using Generalized Local Line Binary Pattern. 1766-1784 - Chi-Shiang Chan, Yung-Chen Chou, Yi-Hui Chen, Yuan-Yu Tsai:
Role-Balance Based Multi-Secret Images Sharing using Boolean Operations. 1785-1800 - Sung-Jin Kim, Sungryoul Lee, Byungchul Bae:
HAS-Analyzer: Detecting HTTP-based C&C based on the Analysis of HTTP Activity Sets. 1801-1816 - Feng Xu, Xin Lv, Qi Zhou, Xuan Liu:
Self-Updating One-Time Password Mutual Authentication Protocol for Ad Hoc Network. 1817-1827
Volume 8, Number 6, June 2014
- Zhirui Hu, Chunyan Feng, Tiankui Zhang, Qiubin Gao, Shaohui Sun:
Research on Per-cell Codebook based Channel Quantization for CoMP Transmission. 1828-1847 - Muntadher Qasim Abdulhasan, Mustafa Ismael Salman, Chee Kyun Ng, Nor Kamariah Noordin, Shaiful J. Hashim
, Fazirulhisham Hashim:
Review of Channel Quality Indicator Estimation Schemes for Multi-User MIMO in 3GPP LTE/LTE-A Systems. 1848-1868 - Shu-guang Fang, Ri-zhao Tang, Yuning Dong, Hui Zhang:
Virtual Queue Based QoS Layered Vertical Mapping in Wireless Networks. 1869-1880 - Chang Yun Park:
Adjusting the Retry Limit for Congestion Control in an Overlapping Private BSS Environment. 1881-1900 - M. Sanaullah Chowdhury, Pervez Khan, Jai-Jin Jung, Kyung Sup Kwak:
Modeling Slotted Aloha of WBAN in Non-Saturated Conditions. 1901-1913 - Xin Su, Bing Hui, KyungHi Chang:
Robust Decision Feedback Equalizer for OFDM System under Severe ISI Channel. 1914-1925 - Shixin Peng, Yingzhuang Liu, Hua Chen, Zhengmin Kong:
A Signal Subspace Interference Alignment Scheme with Sum Rate Maximization and Altruistic-Egoistic Bayesian Gaming. 1926-1945 - Huaxin Xiao, Yu Liu, Shuren Tan, Jiang Duan, Maojun Zhang:
A Noisy Videos Background Subtraction Algorithm Based on Dictionary Learning. 1946-1963 - Dejun Wang, Kai Chen, Weiping Sun, Shengsheng Yu, Hanbing Wang:
Efficient Mean-Shift Tracking Using an Improved Weighted Histogram Scheme. 1964-1981 - Mallikarjun Avula, Sanggon Lee, Seong-Moo Yoo:
Security Framework for Hybrid Wireless Mesh Protocol in Wireless Mesh Networks. 1982-2004 - Thai Son Nguyen
, Chin-Chen Chang, Ting-Feng Chung:
A Tamper-Detection Scheme for BTC-Compressed Images with High-Quality Images. 2005-2012 - Seung Ryul Jeong, Imran Ghani:
Semantic Computing for Big Data: Approaches, Tools, and Emerging Directions (2011-2014). 2022-2042 - YoungJun Kim, Eui-Young Lee, Beom Cheol Cin, Byoung-Joon Kim:
Technology Licensing and the Performance of Firms in US Information and Communication Technology Industry: The Case of Licensees. 2043-2055 - Hyunchul Ahn
, Seongjin Kim, Jae Kyeong Kim:
GA-optimized Support Vector Regression for an Improved Emotional State Estimation Model. 2056-2069 - Yongjin Kwon, Seonguk Heo, Kyuchang Kang, Changseok Bae:
Particle Swarm Optimization Using Adaptive Boundary Correction for Human Activity Recognition. 2070-2086 - Keon Chul Park
, Jae Woo Shin, Bong Gyou Lee:
Analysis of Authentication Methods for Smartphone Banking Service using ANP. 2087-2103