Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/itiis/itiis9.bht:"
@article{DBLP:journals/itiis/0012CYYS15, author = {Lei Wang and Yueming Cai and Weiwei Yang and Wei Yan and Jialei Song}, title = {Effect of Outdated Channel Estimates on Multiple Antennas Multiple Relaying Networks}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {5}, pages = {1682--1701}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.05.007}, doi = {10.3837/TIIS.2015.05.007}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/0012CYYS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/0013ZGTZ0L15, author = {Wei Li and Wenwen Zhang and Dawu Gu and Zhi Tao and Zhihong Zhou and Ya Liu and Zhiqiang Liu}, title = {Security Analysis of the Lightweight Cryptosystem {TWINE} in the Internet of Things}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {2}, pages = {793--810}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.02.018}, doi = {10.3837/TIIS.2015.02.018}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/0013ZGTZ0L15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/AbdullaA15, author = {Shubair Abdulla and Altyeb Altaher Altyeb}, title = {Intelligent Approach for Android Malware Detection}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {8}, pages = {2964--2983}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.08.012}, doi = {10.3837/TIIS.2015.08.012}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itiis/AbdullaA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/AbdullahHZM15, author = {Muhammad Daniel Hafiz Abdullah and Zurina Mohd Hanapi and Zuriati Ahmad Zukarnain and Mohamad Afendee Mohamed}, title = {Attacks, Vulnerabilities and Security Requirements in Smart Metering Networks}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {4}, pages = {1493--1515}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.04.013}, doi = {10.3837/TIIS.2015.04.013}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itiis/AbdullahHZM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/AhmedY15, author = {Mujeeb Ahmed and Sung{-}Guk Yoon}, title = {Dynamic Access and Power Control Scheme for Interference Mitigation in Femtocell Networks}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {11}, pages = {4331--4346}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.11.004}, doi = {10.3837/TIIS.2015.11.004}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itiis/AhmedY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/AhnKK15, author = {Hyochun Ahn and Jaebeom Kim and Young{-}Bae Ko}, title = {{CLSR:} Cognitive Link State Routing for CR-based Tactical Ad Hoc Networks}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {1}, pages = {50--67}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.01.004}, doi = {10.3837/TIIS.2015.01.004}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/AhnKK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/Al-GumaeiNRD15, author = {Yousef Ali Al{-}Gumaei and Kamarul Ariffin Noordin and Ahmed Wasif Reza and Kaharudin Dimyati}, title = {A Game Theory Approach for Efficient Power Control and Interference Management in Two-tier Femtocell Networks based on Local Aain}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {7}, pages = {2530--2547}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.07.011}, doi = {10.3837/TIIS.2015.07.011}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/Al-GumaeiNRD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/AlginahiMK15, author = {Yasser M. Alginahi and Mohammed Mudassar and Muhammad Nomani Kabir}, title = {An Arabic Script Recognition System}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {9}, pages = {3701--3720}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.09.023}, doi = {10.3837/TIIS.2015.09.023}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/AlginahiMK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/AliGL15, author = {Syed Mubarak Ali and Imran Ghani and Muhammad Shafie Abdul Latif}, title = {Interaction-based Collaborative Recommendation: {A} Personalized Learning Environment {(PLE)} Perspective}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {1}, pages = {446--465}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.01.028}, doi = {10.3837/TIIS.2015.01.028}, timestamp = {Wed, 01 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itiis/AliGL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/AnZL15, author = {Feng{-}Ping An and Xian{-}Wei Zhou and Da{-}chao Lin}, title = {Multiscale Self-coordination of Bidimensional Empirical Mode Decomposition in Image Fusion}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {4}, pages = {1441--1456}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.04.010}, doi = {10.3837/TIIS.2015.04.010}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/AnZL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/AnandRA15, author = {Anjali Anand and Rinkle Rani and Himanshu Aggarwal}, title = {A Security Model based on Reputation and Collaboration through Route-Request in Mobile Ad Hoc Networks}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {11}, pages = {4701--4719}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.11.025}, doi = {10.3837/TIIS.2015.11.025}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itiis/AnandRA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/AnithaC15, author = {K. Anitha and A. Chilambuchelvan}, title = {{NPFAM:} Non-Proliferation Fuzzy {ARTMAP} for Image Classification in Content Based Image Retrieval}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {7}, pages = {2683--2702}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.07.020}, doi = {10.3837/TIIS.2015.07.020}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/AnithaC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/ArunrajaM15, author = {Muruganantham Arunraja and Veluchamy Malathi}, title = {Collective Prediction Exploiting Spatio Temporal Correlation (CoPeST) for Energy Efficient Wireless Sensor networks}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {7}, pages = {2488--2511}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.07.009}, doi = {10.3837/TIIS.2015.07.009}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/ArunrajaM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/BalouchzahiFA15, author = {Nik Mohammad Balouchzahi and Mahmood Fathy and Ahmad Akbari}, title = {A Graph-based Model for RSUs Deployment in Vehicular Networks by Considering Urban and Network Limitations and QoS Requirements of Service Advertisement and Discovery}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {5}, pages = {1662--1681}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.05.006}, doi = {10.3837/TIIS.2015.05.006}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/BalouchzahiFA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/BuvanaS15, author = {M. Buvana and M. Suganthi}, title = {An Efficient Cluster Based Service Discovery Model for Mobile Ad hoc Network}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {2}, pages = {680--699}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.02.011}, doi = {10.3837/TIIS.2015.02.011}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/BuvanaS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/CaoCLYD15, author = {Jiang{-}Zhong Cao and Pei Chen and Bingo Wing{-}Kuen Ling and Zhijing Yang and Qingyun Dai}, title = {Spectral Clustering with Sparse Graph Construction Based on Markov Random Walk}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {7}, pages = {2568--2584}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.07.013}, doi = {10.3837/TIIS.2015.07.013}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/CaoCLYD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/CaoLZH15, author = {Yuanlong Cao and Qinghua Liu and Yi Zuo and Minghe Huang}, title = {Receiver-driven Cooperation-based Concurrent Multipath Transfer over Heterogeneous Wireless Networks}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {7}, pages = {2354--2370}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.07.002}, doi = {10.3837/TIIS.2015.07.002}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/CaoLZH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/ChaiXZ15, author = {Xiaomeng Chai and Xu Xu and Zhongshan Zhang}, title = {A Survey of Self-optimization Approaches for HetNets}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {6}, pages = {1979--1995}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.06.001}, doi = {10.3837/TIIS.2015.06.001}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/ChaiXZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/ChenCW15, author = {Hualiang Chen and Yueming Cai and Dan Wu}, title = {Joint Spectrum and Power Allocation for Green {D2D} Communication with Physical Layer Security Consideration}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {3}, pages = {1057--1073}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.03.012}, doi = {10.3837/TIIS.2015.03.012}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/ChenCW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/ChenLW15, author = {Yen{-}Wen Chen and Meng{-}Hsien Lin and Min{-}Yan Wu}, title = {Study of Data Placement Schemes for {SNS} Services in Cloud Environment}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {8}, pages = {3203--3215}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.08.027}, doi = {10.3837/TIIS.2015.08.027}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/ChenLW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/ChenWL15, author = {Ju{-}Chin Chen and Pei{-}Hsun Wu and Jenn{-}Jier James Lien}, title = {Discriminant Metric Learning Approach for Face Verification}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {2}, pages = {742--762}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.02.015}, doi = {10.3837/TIIS.2015.02.015}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/ChenWL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/ChenYY15, author = {Zhe Chen and Bingbing Yang and Fuliang Yin}, title = {An Eye Location based Head Posture Recognition Method and Its Application in Mouse Operation}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {3}, pages = {1087--1104}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.03.014}, doi = {10.3837/TIIS.2015.03.014}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/ChenYY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/ChenZCX15, author = {Kan Chen and Peidong Zhu and Liang Chen and Yueshan Xiong}, title = {Modeling and Evaluating Information Diffusion for Spam Detection in Micro-blogging Networks}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {8}, pages = {3005--3027}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.08.014}, doi = {10.3837/TIIS.2015.08.014}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/ChenZCX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/ChenZN15, author = {Zhipeng Chen and Yao Zhao and Rongrong Ni}, title = {Detection for Operation Chain: Histogram Equalization and Dither-like Operation}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {9}, pages = {3751--3770}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.09.026}, doi = {10.3837/TIIS.2015.09.026}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/ChenZN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/ChenZZ15, author = {Hongbin Chen and Qiong Zhang and Feng Zhao}, title = {Energy-Efficient Base Station Sleep Scheduling in Relay-Assisted Cellular Networks}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {3}, pages = {1074--1086}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.03.013}, doi = {10.3837/TIIS.2015.03.013}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/ChenZZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/ChhornYSKC15, author = {Sok Chhorn and Seok{-}Ho Yoon and Si{-}o Seo and Seung{-}Yeon Kim and Choong{-}Ho Cho}, title = {Spectrum Reuse Schemes with Power Control for Device-to-Device Communication in LTE-Advanced Cellular Network}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {12}, pages = {4819--4834}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.12.005}, doi = {10.3837/TIIS.2015.12.005}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/ChhornYSKC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/ChoS15, author = {Taenam Cho and Seung{-}Hyun Seo}, title = {A Strengthened Android Signature Management Method}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {3}, pages = {1210--1230}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.03.021}, doi = {10.3837/TIIS.2015.03.021}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itiis/ChoS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/ChoehLP15, author = {Joon Yeon Choeh and Hong Joo Lee and Sung Joo Park}, title = {A Personalized Approach for Recommending Useful Product Reviews Based on Information Gain}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {5}, pages = {1702--1716}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.05.008}, doi = {10.3837/TIIS.2015.05.008}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itiis/ChoehLP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/ChoiKJC15, author = {Seungcheol Choi and Oh{-}Jin Kwon and Dukhyun Jang and Seokrim Choi}, title = {Evaluation of Various Tone Mapping Operators for Backward Compatible {JPEG} Image Coding}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {9}, pages = {3672--3684}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.09.021}, doi = {10.3837/TIIS.2015.09.021}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/ChoiKJC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/ChungCCPCK15, author = {Yongwha Chung and Dongwhee Choi and Heesu Choi and Daihee Park and Hong{-}Hee Chang and Suk Kim}, title = {Automated Detection of Cattle Mounting using Side-View Camera}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {8}, pages = {3151--3168}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.08.024}, doi = {10.3837/TIIS.2015.08.024}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/ChungCCPCK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/ChungPPC15, author = {Jong{-}Moon Chung and Yong{-}Suk Park and Jong{-}Hong Park and Hyoung Jun Cho}, title = {Adaptive Cloud Offloading of Augmented Reality Applications on Smart Devices for Minimum Energy Consumption}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {8}, pages = {3090--3102}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.08.020}, doi = {10.3837/TIIS.2015.08.020}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/ChungPPC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/CviticPP15, author = {Filip Cvitic and Mario{-}Osvin Pavcevic and Jesenka Pibernik}, title = {Two Messages out of One 2D Matrix Bar Code}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {3}, pages = {1105--1120}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.03.015}, doi = {10.3837/TIIS.2015.03.015}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/CviticPP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/DaiYHX15, author = {Hua Dai and Geng Yang and Haiping Huang and Fu Xiao}, title = {Efficient Verifiable Top-k Queries in Two-tiered Wireless Sensor Networks}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {6}, pages = {2111--2131}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.06.008}, doi = {10.3837/TIIS.2015.06.008}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/DaiYHX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/DaiZBL15, author = {Fangfang Dai and Kangfeng Zheng and Bin Wu and Shoushan Luo}, title = {Using Genetic Algorithm for Optimal Security Hardening in Risk Flow Attack Graph}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {5}, pages = {1920--1937}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.05.021}, doi = {10.3837/TIIS.2015.05.021}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itiis/DaiZBL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/DaiZS15, author = {Shuanglu Dai and Shu Zhan and Ning Song}, title = {Adaptive Active Contour Model: a Localized Mutual Information Approach for Medical Image Segmentation}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {5}, pages = {1840--1855}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.05.016}, doi = {10.3837/TIIS.2015.05.016}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/DaiZS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/DoK15, author = {Truong{-}Xuan Do and Younghan Kim}, title = {Optimal Provider Mobility in Large-Scale Named- Data Networking}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {10}, pages = {4054--4071}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.10.016}, doi = {10.3837/TIIS.2015.10.016}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/DoK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/DongYCWZP15, author = {Song Dong and Jucheng Yang and Yarui Chen and Chao Wang and Xiaoyuan Zhang and Dong Sun Park}, title = {Finger Vein Recognition Based on Multi-Orientation Weighted Symmetric Local Graph Structure}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {10}, pages = {4126--4142}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.10.020}, doi = {10.3837/TIIS.2015.10.020}, timestamp = {Thu, 02 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/DongYCWZP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/DuXZQ15, author = {Guanyao Du and Ke Xiong and Yu Zhang and Zhengding Qiu}, title = {Outage Analysis and Optimization for Time Switching-based Two-Way Relaying with Energy Harvesting Relay Node}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {2}, pages = {545--563}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.02.004}, doi = {10.3837/TIIS.2015.02.004}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/DuXZQ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/DungA15, author = {Le The Dung and Beongku An}, title = {Connectivity Analysis of Cognitive Radio Ad-hoc Networks with Shadow Fading}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {9}, pages = {3335--3356}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.09.004}, doi = {10.3837/TIIS.2015.09.004}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/DungA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/DuyS15, author = {Tran Trung Duy and Pham Ngoc Son}, title = {Secrecy Performances of Multicast Underlay Cognitive Protocols with Partial Relay Selection and without Eavesdropper's Information}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {11}, pages = {4623--4643}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.11.021}, doi = {10.3837/TIIS.2015.11.021}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/DuyS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/EemKJH15, author = {Changkyoung Eem and Iksu Kim and Yeongseok Jung and Hyunki Hong}, title = {Estimating Illumination Distribution to Generate Realistic Shadows in Augmented Reality}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {6}, pages = {2289--2301}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.06.018}, doi = {10.3837/TIIS.2015.06.018}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/EemKJH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/ElijordeL15, author = {Frank Elijorde and Jaewan Lee}, title = {CloudSwitch: {A} State-aware Monitoring Strategy Towards Energy-efficient and Performance-aware Cloud Data Centers}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {12}, pages = {4759--4775}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.12.002}, doi = {10.3837/TIIS.2015.12.002}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/ElijordeL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/Emad-ul-HaqABHA15, author = {Qazi Emad{-}ul{-}Haq and Hatim Aboalsamh and Abdelfettah Belghith and Muhammad Hussain and Wadood Abdul and Mostafa H. Dahshan and Sanaa Ghouzali}, title = {Challenges and Solutions for Internet of Things Driven by IPv6}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {12}, pages = {4739--4758}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.12.001}, doi = {10.3837/TIIS.2015.12.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itiis/Emad-ul-HaqABHA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/FanLT15, author = {Wenhao Fan and Yuan'an Liu and Bihua Tang}, title = {Adaptive Application Component Mapping for Parallel Computation Offloading in Variable Environments}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {11}, pages = {4347--4366}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.11.005}, doi = {10.3837/TIIS.2015.11.005}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/FanLT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/FanY15, author = {Jinhong Fan and Chaowei Yuan}, title = {Outage Performance for {DF} Two-Way Relaying with Co-Channel Interference over Nakagami-m Fading}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {11}, pages = {4469--4482}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.11.012}, doi = {10.3837/TIIS.2015.11.012}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/FanY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/FarooqJK15, author = {Adnan Farooq and Ahmad Jalal and Shaharyar Kamal}, title = {Dense {RGB-D} Map-Based Human Tracking and Activity Recognition using Skin Joints Features and Self-Organizing Map}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {5}, pages = {1856--1869}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.05.017}, doi = {10.3837/TIIS.2015.05.017}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/FarooqJK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/FengLC15, author = {Jingyu Feng and Guangyue Lu and Hong Chang}, title = {Behave Well: How to Win a Pop Vacant Band via Cooperative Spectrum Sensing}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {4}, pages = {1321--1336}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.04.003}, doi = {10.3837/TIIS.2015.04.003}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/FengLC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/FengLZ15, author = {Juan Feng and Baowang Lian and Hongwei Zhao}, title = {Adaptive Energy Optimization for Object Tracking in Wireless Sensor Network}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {4}, pages = {1359--1375}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.04.005}, doi = {10.3837/TIIS.2015.04.005}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/FengLZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/FengZ15, author = {Junjie Feng and Gong Zhang}, title = {High Resolution {ISAR} Imaging Based on Improved Smoothed {L0} Norm Recovery Algorithm}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {12}, pages = {5103--5115}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.12.020}, doi = {10.3837/TIIS.2015.12.020}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/FengZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/FengZZZ15, author = {Bohao Feng and Huachun Zhou and Mingchuan Zhang and Hongke Zhang}, title = {Cache-Filter: {A} Cache Permission Policy for Information-Centric Networking}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {12}, pages = {4912--4933}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.12.010}, doi = {10.3837/TIIS.2015.12.010}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/FengZZZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/GaoCX15, author = {Zhan Gao and Junhong Chen and Yuhua Xu}, title = {Opportunistic Spectrum Access with Discrete Feedback in Unknown and Dynamic Environment: {A} Multi-agent Learning Approach}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {10}, pages = {3867--3886}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.10.006}, doi = {10.3837/TIIS.2015.10.006}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/GaoCX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/GhaniB15, author = {Imran Ghani and Mannir Bello}, title = {Agile Adoption in {IT} Organizations}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {8}, pages = {3231--3248}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.08.029}, doi = {10.3837/TIIS.2015.08.029}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/GhaniB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/GhasvariR15, author = {Hossein Ghasvari and Mohammad Ali Raayatpanah}, title = {Robust Capacity Planning in Network Coding under Demand Uncertainty}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {8}, pages = {2840--2853}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.08.005}, doi = {10.3837/TIIS.2015.08.005}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itiis/GhasvariR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/GongDLS15, author = {Xiangwu Gong and Feihong Dong and Hongjun Li and Wei Shao}, title = {Robust Cooperative Relay Beamforming Design for Security}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {11}, pages = {4483--4501}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.11.013}, doi = {10.3837/TIIS.2015.11.013}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/GongDLS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/GongW15, author = {Wenrong Gong and Xiaoxiang Wang}, title = {Joint User Association and Resource Allocation of Device-to-Device Communication in Small Cell Networks}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {1}, pages = {1--19}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.01.001}, doi = {10.3837/TIIS.2015.01.001}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/GongW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/HaJS15, author = {Chang{-}Bin Ha and Byung{-}Jun Jang and Hyoung{-}Kyu Song}, title = {Adaptive Power Control Using Large Scale Antenna of the Massive {MIMO} System in the Mobile Communication}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {8}, pages = {3068--3078}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.08.018}, doi = {10.3837/TIIS.2015.08.018}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/HaJS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/HammamiJGBM15, author = {Chourouk Hammami and Imen Jemili and Achraf Gazdar and Abdelfettah Belghith and Mohamed Mosbah}, title = {{HLPSP:} {A} Hybrid Live {P2P} Streaming Protocol}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {3}, pages = {1035--1056}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.03.011}, doi = {10.3837/TIIS.2015.03.011}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itiis/HammamiJGBM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/HanXH15, author = {Han Han and Yuhua Xu and Qinfei Huang}, title = {On-demand Allocation of Multiple Mutual-compensating Resources in Wireless Downlinks: a Multi-server Case}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {3}, pages = {921--940}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.03.005}, doi = {10.3837/TIIS.2015.03.005}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/HanXH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/HeydariY15, author = {Vahid Heydari and Seong{-}Moo Yoo}, title = {Lightweight Acknowledgement-Based Method to Detect Misbehavior in MANETs}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {12}, pages = {5150--5169}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.12.023}, doi = {10.3837/TIIS.2015.12.023}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/HeydariY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/HidhayaGKSH15, author = {S. Fouzul Hidhaya and Angelina Geetha and B. Nandha Kumar and Loganathan Venkat Sravanth and A. Habeeb}, title = {Supplementary Event-Listener Injection Attack in Smart Phones}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {10}, pages = {4191--4203}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.10.024}, doi = {10.3837/TIIS.2015.10.024}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/HidhayaGKSH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/HoH15, author = {Chun{-}Heng Ho and Kai{-}Chun Hou}, title = {Exploring the Attractive Factors of App Icons}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {6}, pages = {2251--2270}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.06.016}, doi = {10.3837/TIIS.2015.06.016}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/HoH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/HongJMY15, author = {Jun{-}Ki Hong and Han{-}Shin Jo and Cheol Mun and Jong{-}Gwan Yook}, title = {Maximum Ratio Transmission for Space-Polarization Division Multiple Access in Dual-Polarized {MIMO} System}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {8}, pages = {3054--3067}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.08.017}, doi = {10.3837/TIIS.2015.08.017}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/HongJMY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/HuC15, author = {Yahui Hu and Song Ci}, title = {QoE-driven Joint Resource Allocation and User-paring in Virtual {MIMO} {SC-FDMA} Systems}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {10}, pages = {3831--3850}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.10.004}, doi = {10.3837/TIIS.2015.10.004}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/HuC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/HuT15, author = {Jiawen Hu and Seng{-}Su Tsang}, title = {Comics with Drama: New Communication in Wedia}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {10}, pages = {4143--4159}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.10.021}, doi = {10.3837/TIIS.2015.10.021}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itiis/HuT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/HungAH15, author = {Pham Phuoc Hung and Mohammad Aazam and Eui{-}Nam Huh}, title = {CTaG: An Innovative Approach for Optimizing Recovery Time in Cloud Environment}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {4}, pages = {1282--1301}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.04.001}, doi = {10.3837/TIIS.2015.04.001}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/HungAH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/HussanK15, author = {M. I. Thariq Hussan and B. Kalaavathi}, title = {An Optimized User Behavior Prediction Model Using Genetic Algorithm on Mobile Web Structure}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {5}, pages = {1963--1978}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.05.023}, doi = {10.3837/TIIS.2015.05.023}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itiis/HussanK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/HusseinARS15, author = {Yaseein Soubhi Hussein and Borhanuddin Mohd Ali and Mohd Fadlee A. Rasid and Aduwati Sali}, title = {Handover in {LTE} Networks with Proactive Multiple Preparation Approach and Adaptive Parameters Using Fuzzy Logic Control}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {7}, pages = {2389--2413}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.07.004}, doi = {10.3837/TIIS.2015.07.004}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/HusseinARS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/HwangKL15, author = {Jong Sung Hwang and Sung Hyun Kim and Ho Lee}, title = {Breaking the Myths of the {IT} Productivity Paradox}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {1}, pages = {466--482}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.01.029}, doi = {10.3837/TIIS.2015.01.029}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/HwangKL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/HwangL15, author = {Inho Hwang and Jeong Woo Lee}, title = {Half-Duplex Relaying Strategy Suitable for a Relay with Mobility}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {1}, pages = {108--125}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.01.007}, doi = {10.3837/TIIS.2015.01.007}, timestamp = {Wed, 02 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/HwangL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/IbrahimKGJ15, author = {Roliana Ibrahim and Shahid Kamal and Imran Ghani and Seung Ryul Jeong}, title = {A Hybrid Query Disambiguation Adaptive Approach for Web Information Retrieval}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {7}, pages = {2468--2487}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.07.008}, doi = {10.3837/TIIS.2015.07.008}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/IbrahimKGJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/IqbalAHA15, author = {Saleem Iqbal and Abdul Hanan Abdullah and Khalid Hussain and Faraz Ahsan}, title = {Channel Allocation in Multi-radio Multi-channel Wireless Mesh Networks: {A} Categorized Survey}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {5}, pages = {1642--1661}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.05.005}, doi = {10.3837/TIIS.2015.05.005}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itiis/IqbalAHA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/IshmanovK15, author = {Farruh Ishmanov and Sung Won Kim}, title = {A Novel Trust Establishment Method for Wireless Sensor Networks}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {4}, pages = {1529--1547}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.04.015}, doi = {10.3837/TIIS.2015.04.015}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/IshmanovK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/IslamJB15, author = {Mohammad Khairul Islam and Farah Jahan and Joong{-}Hwan Baek}, title = {Object Cataloging Using Heterogeneous Local Features for Image Retrieval}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {11}, pages = {4534--4555}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.11.016}, doi = {10.3837/TIIS.2015.11.016}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/IslamJB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/JavedHL15, author = {Umer Javed and Di He and Peilin Liu}, title = {Exact Performance Analysis of {AF} Based Hybrid Satellite-Terrestrial Relay Network with Co-Channel Interference}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {9}, pages = {3412--3431}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.09.008}, doi = {10.3837/TIIS.2015.09.008}, timestamp = {Tue, 14 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/JavedHL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/JiBZX15, author = {Haoran Ji and Weidong Bao and Xiaomin Zhu and Wenhua Xiao}, title = {Topology-based Workflow Scheduling in Commercial Clouds}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {11}, pages = {4311--4330}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.11.003}, doi = {10.3837/TIIS.2015.11.003}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/JiBZX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/JiangFQ15, author = {Lirong Jiang and Gang Feng and Shuang Qin}, title = {Content Distribution for 5G Systems Based on Distributed Cloud Service Network Architecture}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {11}, pages = {4268--4290}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.11.001}, doi = {10.3837/TIIS.2015.11.001}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/JiangFQ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/JiangFY15, author = {Wenhao Jiang and Wenjiang Feng and Yang Yu}, title = {Spectrum Allocation based on Auction in Overlay Cognitive Radio Network}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {9}, pages = {3312--3334}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.09.003}, doi = {10.3837/TIIS.2015.09.003}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/JiangFY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/JiaoZZ15, author = {Zhenzhen Jiao and Baoxian Zhang and Jun Zheng}, title = {{BA} Virtual-Queue based Backpressure Scheduling Algorithm for Heterogeneous Multi-Hop Wireless Networks}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {12}, pages = {4856--4871}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.12.007}, doi = {10.3837/TIIS.2015.12.007}, timestamp = {Mon, 01 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/JiaoZZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/JinYM15, author = {Shunfu Jin and Xinghua Yao and Zhanyou Ma}, title = {A Novel Spectrum Allocation Strategy with Channel Bonding and Channel Reservation}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {10}, pages = {4034--4053}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.10.015}, doi = {10.3837/TIIS.2015.10.015}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/JinYM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/JoshiKKN15, author = {Gyanendra Prasad Joshi and Sung Won Kim and Chang{-}Su Kim and Seung Yeob Nam}, title = {A Distributed Medium Access Control Protocol for Cognitive Radio Ad Hoc Networks}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {1}, pages = {331--343}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.01.020}, doi = {10.3837/TIIS.2015.01.020}, timestamp = {Thu, 13 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/JoshiKKN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/JuS15, author = {Chunhua Ju and Qi Shao}, title = {lobal Optimization for Energy Efficient Resource Management by Game Based Distributed Learning in Internet of Things}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {10}, pages = {3771--3788}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.10.001}, doi = {10.3837/TIIS.2015.10.001}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/JuS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/KM15, author = {K. Saravanan and Rajaram M.}, title = {An Exploratory Study of Cloud Service Level Agreements - State of the Art Review}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {3}, pages = {843--871}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.03.001}, doi = {10.3837/TIIS.2015.03.001}, timestamp = {Fri, 02 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itiis/KM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/KaiwartyaPAH15, author = {Omprakash Kaiwartya and Shiv Prakash and Abdul Hanan Abdullah and Ahmed Nazar Hassan}, title = {Minimizing Energy Consumption in Scheduling of Dependent Tasks using Genetic Algorithm in Computational Grid}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {8}, pages = {2821--2839}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.08.004}, doi = {10.3837/TIIS.2015.08.004}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/KaiwartyaPAH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/KakliQKHCP15, author = {Muhammad Umer Kakli and Hassaan Saadat Qureshi and Muhammad Murtaza Khan and Rehan Hafiz and Yongju Cho and Unsang Park}, title = {Quality Assessment of Images Projected Using Multiple Projectors}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {6}, pages = {2230--2250}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.06.015}, doi = {10.3837/TIIS.2015.06.015}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/KakliQKHCP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/KangPC15, author = {Hannah Kang and Saraphine Shiping Pang and Sejung Marina Choi}, title = {Investigating the use of multiple social networking services: {A} cross-cultural perspective in the United States and Korea}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {8}, pages = {3258--3275}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.08.031}, doi = {10.3837/TIIS.2015.08.031}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itiis/KangPC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/Karakaya15, author = {Murat Karakaya}, title = {{MSCT:} An Efficient Data Collection Heuristic for Wireless Sensor Networks with Limited Sensor Memory Capacity}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {9}, pages = {3396--3411}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.09.007}, doi = {10.3837/TIIS.2015.09.007}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/Karakaya15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/KarimSSANS15, author = {Ahmad Karim and Syed Adeel Ali Shah and Rosli Bin Salleh and Muhammad Arif and Rafidah Md Noor and Shahaboddin Shamshirband}, title = {Mobile Botnet Attacks - an Emerging Threat: Classification, Review and Open Issues}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {4}, pages = {1471--1492}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.04.012}, doi = {10.3837/TIIS.2015.04.012}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/KarimSSANS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/KarmelJ15, author = {A. Karmel and C. Jayakumar}, title = {Recurrent Ant Colony Optimization for Optimal Path Convergence in Mobile Ad Hoc Networks}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {9}, pages = {3496--3514}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.09.012}, doi = {10.3837/TIIS.2015.09.012}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/KarmelJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/KatiravanNN15, author = {Jeevaa Katiravan and Duraipandian N and Dharini N}, title = {A Two level Detection of Routing Layer Attacks in Hierarchical Wireless Sensor Networks using Learning based Energy Prediction}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {11}, pages = {4644--4661}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.11.022}, doi = {10.3837/TIIS.2015.11.022}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itiis/KatiravanNN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/KhanPCSH15, author = {Murad Khan and Gisu Park and Wooseong Cho and Gihyuk Seong and Kijun Han}, title = {A Handover Management Scheme Based on User-Preferences and Network-Centric Approach}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {1}, pages = {344--357}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.01.021}, doi = {10.3837/TIIS.2015.01.021}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/KhanPCSH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/KhasawnehLCTB15, author = {Ahmad M. Khasawneh and Muhammad Shafie Abdul Latif and Hassan Chizari and Moeenuddin Tariq and Abdullah Bamatraf}, title = {Pressure Based Routing Protocol for Underwater Wireless Sensor Network: {A} Survey}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {2}, pages = {504--527}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.02.002}, doi = {10.3837/TIIS.2015.02.002}, timestamp = {Wed, 01 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itiis/KhasawnehLCTB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/Kim15, author = {Sungwook Kim}, title = {QoS Sensitive {VANET} Control Scheme based on Feedback Game Model}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {5}, pages = {1752--1767}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.05.011}, doi = {10.3837/TIIS.2015.05.011}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/Kim15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/Kim15a, author = {Taehong Kim}, title = {Learning Based Relay Selection for Reliable Content Distribution in Smart Class Application}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {8}, pages = {2894--2909}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.08.008}, doi = {10.3837/TIIS.2015.08.008}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itiis/Kim15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/Kim15b, author = {Kang{-}Wook Kim}, title = {An Efficient Implementation of Key Frame Extraction and Sharing in Android for Wireless Video Sensor Network}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {9}, pages = {3357--3376}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.09.005}, doi = {10.3837/TIIS.2015.09.005}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/Kim15b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/Kim15c, author = {Sang{-}Chul Kim}, title = {Performance Comparison of MISP-based {MANET} Strong {DAD} Protocol}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {9}, pages = {3449--3467}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.09.010}, doi = {10.3837/TIIS.2015.09.010}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/Kim15c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/Kim15d, author = {Sungwook Kim}, title = {Cognitive Radio Anti-Jamming Scheme for Security Provisioning IoT Communications}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {10}, pages = {4177--4190}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.10.023}, doi = {10.3837/TIIS.2015.10.023}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/Kim15d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/KimAP15, author = {Min{-}Joon Kim and Hyun Ahn and Minjae Park}, title = {A GraphML-based Visualization Framework for Workflow-Performers' Closeness Centrality Measurements}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {8}, pages = {3216--3230}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.08.028}, doi = {10.3837/TIIS.2015.08.028}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/KimAP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/KimAP15a, author = {Min{-}Joon Kim and Hyun Ahn and Minjae Park}, title = {A Theoretical Framework for Closeness Centralization Measurements in a Workflow-Supported Organization}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {9}, pages = {3611--3634}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.09.018}, doi = {10.3837/TIIS.2015.09.018}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/KimAP15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/KimC15, author = {Cheong Ghil Kim and Yong Soo Choi}, title = {Improved Disparity Map Computation on Stereoscopic Streaming Video with Multi-core Parallel Implementation}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {2}, pages = {728--741}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.02.014}, doi = {10.3837/TIIS.2015.02.014}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/KimC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/KimC15a, author = {Wonggi Kim and Junchul Chun}, title = {An Improved Approach for 3D Hand Pose Estimation Based on a Single Depth Image and Haar Random Fores}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {8}, pages = {3136--3150}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.08.023}, doi = {10.3837/TIIS.2015.08.023}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/KimC15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/KimCL15, author = {Myoungjin Kim and Yun Cui and Hanku Lee}, title = {An Efficient Design and Implementation of an MdbULPS in a Cloud-Computing Environment}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {8}, pages = {3182--3202}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.08.026}, doi = {10.3837/TIIS.2015.08.026}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/KimCL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/KimCS15, author = {Yukyong Kim and Jong{-}Seok Choi and Yongtae Shin}, title = {Trustworthy Service Discovery for Dynamic Web Service Composition}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {3}, pages = {1260--1281}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.03.024}, doi = {10.3837/TIIS.2015.03.024}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/KimCS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/KimJ15, author = {Yoosin Kim and Seung Ryul Jeong}, title = {Opinion-Mining Methodology for Social Media Analytics}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {1}, pages = {391--406}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.01.024}, doi = {10.3837/TIIS.2015.01.024}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/KimJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/KimJKK15, author = {Jinpyung Kim and Gyujin Jang and Gyujin Kim and Moonhyun Kim}, title = {Crowd Activity Recognition using Optical Flow Orientation Distribution}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {8}, pages = {2948--2963}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.08.011}, doi = {10.3837/TIIS.2015.08.011}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/KimJKK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/KimKJ15, author = {Yoosin Kim and Do Young Kwon and Seung Ryul Jeong}, title = {Comparing Machine Learning Classifiers for Movie {WOM} Opinion Mining}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {8}, pages = {3169--3181}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.08.025}, doi = {10.3837/TIIS.2015.08.025}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/KimKJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/KimKKPC15, author = {Jibum Kim and Inbin Kim and Namgu Kwon and Heemin Park and Jinseok Chae}, title = {A Hybrid Algorithm for Online Location Update using Feature Point Detection for Portable Devices}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {2}, pages = {600--619}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.02.007}, doi = {10.3837/TIIS.2015.02.007}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itiis/KimKKPC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/KimKR15, author = {Bosung Kim and Kwangsoo Kim and Byeong{-}Hee Roh}, title = {{ENC-MAC:} Energy-efficient Non-overlapping Channel {MAC} for Cognitive Radio enabled Sensor Networks}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {11}, pages = {4367--4386}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.11.006}, doi = {10.3837/TIIS.2015.11.006}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/KimKR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/KimL15, author = {Hang Sub Kim and Bong Gyou Lee}, title = {An Empirical Analysis of Smart Signage and Its Market Delimitation}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {8}, pages = {2910--2927}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.08.009}, doi = {10.3837/TIIS.2015.08.009}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/KimL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/KimOK15, author = {Seohyang Kim and Hayoung Oh and Chongkwon Kim}, title = {Energy Cognitive Dynamic Adaptive Streaming over {HTTP}}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {6}, pages = {2144--2159}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.06.010}, doi = {10.3837/TIIS.2015.06.010}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itiis/KimOK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/KimSS15, author = {Hyun{-}Sik Kim and Jong{-}Su Seo and Jeong{-}Wook Seo}, title = {Performance Evaluation of a Smart CoAP Gateway for Remote Home Safety Services}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {8}, pages = {3079--3089}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.08.019}, doi = {10.3837/TIIS.2015.08.019}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/KimSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/KomarasamyM15, author = {Dinesh Komarasamy and Muthuswamy Vijayalakshmi}, title = {Deadline Constrained Adaptive Multilevel Scheduling System in Cloud Environment}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {4}, pages = {1302--1320}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.04.002}, doi = {10.3837/TIIS.2015.04.002}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itiis/KomarasamyM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/KongH15, author = {Jong{-}Hwan Kong and Myung{-}Mook Han}, title = {Malware Containment Using Weight based on Incremental PageRank in Dynamic Social Networks}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {1}, pages = {421--433}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.01.026}, doi = {10.3837/TIIS.2015.01.026}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/KongH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/KrishnanRM15, author = {C. Gopala Krishnan and A. Rengarajan and R. Manikandan}, title = {Delay Reduction by Providing Location Based Services using Hybrid Cache in Peer to Peer Networks}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {6}, pages = {2078--2094}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.06.006}, doi = {10.3837/TIIS.2015.06.006}, timestamp = {Mon, 13 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itiis/KrishnanRM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/KumariO15, author = {Shipra Kumari and Hari Om}, title = {Remote Login Authentication Scheme based on Bilinear Pairing and Fingerprint}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {12}, pages = {4987--5014}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.12.014}, doi = {10.3837/TIIS.2015.12.014}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/KumariO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/KutayE15, author = {Mahir Kutay and Tuncay Ercan}, title = {Formal Trust Assessment with Confidence Probability}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {2}, pages = {830--842}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.02.020}, doi = {10.3837/TIIS.2015.02.020}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itiis/KutayE15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/KwakLLL15, author = {Jeong Ho Kwak and Jemin Justin Lee and Han{-}Joo Lee and Bong Gyou Lee}, title = {Estimation of the Demand Function of the Information and Communication Construction Business}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {8}, pages = {3249--3257}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.08.030}, doi = {10.3837/TIIS.2015.08.030}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/KwakLLL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/KwonLHKKS15, author = {Bit{-}Na Kwon and Eui{-}Hak Lee and Dae{-}Ki Hong and Sung{-}Jin Kang and Min{-}goo Kang and Hyoung{-}Kyu Song}, title = {Downlink Signal Measurement Algorithm for {WCDMA/HSPA/HSPA+}}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {8}, pages = {3040--3053}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.08.016}, doi = {10.3837/TIIS.2015.08.016}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/KwonLHKKS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/LeeC15, author = {Kang{-}Woo Lee and Hyunseung Choo}, title = {Constructing Impressions with Multimedia Ringtones and a Smartphone Usage Tracker}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {5}, pages = {1870--1880}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.05.018}, doi = {10.3837/TIIS.2015.05.018}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/LeeC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/LeeCY15, author = {Mina Lee and Inhye Choi and Seungchan Yang}, title = {When Do People Post a Comment to a News Story on the Internet?}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {1}, pages = {434--445}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.01.027}, doi = {10.3837/TIIS.2015.01.027}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/LeeCY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/LeeLK15, author = {Woo{-}Sik Lee and Byoung{-}Dai Lee and Namgi Kim}, title = {An Accelerometer-Assisted Power Management for Wearable Sensor Systems}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {1}, pages = {318--330}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.01.019}, doi = {10.3837/TIIS.2015.01.019}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/LeeLK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/LeeMKJP15, author = {Hansung Lee and Daesung Moon and Ikkyun Kim and Hoseok Jung and Daihee Park}, title = {Anomaly Intrusion Detection Based on Hyper-ellipsoid in the Kernel Feature Space}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {3}, pages = {1173--1192}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.03.019}, doi = {10.3837/TIIS.2015.03.019}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itiis/LeeMKJP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/LeePEC15, author = {Ho{-}Jae Lee and Min{-}Woo Park and Jung{-}Ho Eom and Tai{-}Myoung Chung}, title = {New Approach for Detecting Leakage of Internal Information; Using Emotional Recognition Technology}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {11}, pages = {4662--4679}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.11.023}, doi = {10.3837/TIIS.2015.11.023}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/LeePEC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/LeeSWKK15, author = {Youn{-}Sung Lee and Jeong{-}Wook Seo and Jungwook Wee and Mingoo Kang and Dong Ku Kim}, title = {Single-Phase Energy Metering Chip with Built-in Calibration Function}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {8}, pages = {3103--3120}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.08.021}, doi = {10.3837/TIIS.2015.08.021}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/LeeSWKK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/LeiC15, author = {Qun Lei and Yueyun Chen}, title = {Resource Allocation based on Hybrid Sharing Mode for Heterogeneous Services of Cognitive Radio {OFDM} Systems}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {1}, pages = {149--168}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.01.009}, doi = {10.3837/TIIS.2015.01.009}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/LeiC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/Li15, author = {Jingchao Li}, title = {A Novel Recognition Algorithm Based on Holder Coefficient Theory and Interval Gray Relation Classifier}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {11}, pages = {4573--4584}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.11.018}, doi = {10.3837/TIIS.2015.11.018}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/Li15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/Li15a, author = {Jingchao Li}, title = {A New Robust Signal Recognition Approach Based on Holder Cloud Features under Varying {SNR} Environment}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {12}, pages = {4934--4949}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.12.011}, doi = {10.3837/TIIS.2015.12.011}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/Li15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/LiCWCLS15, author = {Xiaofeng Li and Liangfeng Chen and Jianping Wang and Zhong Chu and Qiyue Li and Wei Sun}, title = {Fuzzy System and Improved {APIT} {(FIAPIT)} Combined Range-free Localization Method for {WSN}}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {7}, pages = {2414--2434}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.07.005}, doi = {10.3837/TIIS.2015.07.005}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/LiCWCLS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/LiLAZL15, author = {Hongwei Li and Dongxiao Liu and Khalid Nawaf Alharbi and Shenmin Zhang and Xiaodong Lin}, title = {Enabling Fine-grained Access Control with Efficient Attribute Revocation and Policy Updating in Smart Grid}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {4}, pages = {1404--1423}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.04.008}, doi = {10.3837/TIIS.2015.04.008}, timestamp = {Tue, 21 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/LiLAZL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/LiLH15, author = {Xiong Li and Qi Lv and Wenting Huang}, title = {Learning Similarity with Probabilistic Latent Semantic Analysis for Image Retrieval}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {4}, pages = {1424--1440}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.04.009}, doi = {10.3837/TIIS.2015.04.009}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/LiLH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/LiLSY15, author = {Haoxing Li and Fenghua Li and Chenggen Song and Yalong Yan}, title = {Towards Smart Card Based Mutual Authentication Schemes in Cloud Computing}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {7}, pages = {2719--2735}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.07.022}, doi = {10.3837/TIIS.2015.07.022}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/LiLSY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/LiLYY15, author = {Yuchen Li and Yitong Liu and Hongwen Yang and Dacheng Yang}, title = {Fast Quadtree Structure Decision for {HEVC} Intra Coding Using Histogram Statistics}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {5}, pages = {1825--1839}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.05.015}, doi = {10.3837/TIIS.2015.05.015}, timestamp = {Tue, 22 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itiis/LiLYY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/LiMGYZ15, author = {Shuangzhi Li and Xiaomin Mu and Xin Guo and Jing Yang and Jiankang Zhang}, title = {Tensor-Based Channel Estimation Approach for One-Way Multi-Hop Relaying Communications}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {12}, pages = {4967--4986}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.12.013}, doi = {10.3837/TIIS.2015.12.013}, timestamp = {Fri, 11 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itiis/LiMGYZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/LiPZ15, author = {Weisheng Li and Lai Peng and Lifang Zhou}, title = {Robust Three-step Facial Landmark Localization under the Complicated Condition via {ASM} and {POEM}}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {9}, pages = {3685--3700}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.09.022}, doi = {10.3837/TIIS.2015.09.022}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/LiPZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/LiS15, author = {Yanjun Li and Jianji Shao}, title = {Optimized Resource Allocation for Utility-Based Routing in Ad Hoc and Sensor Networks}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {5}, pages = {1790--1806}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.05.013}, doi = {10.3837/TIIS.2015.05.013}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/LiS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/LiSCZ15, author = {Zhigang Li and Yan Shi and Shanzhi Chen and Jingwen Zhao}, title = {Cellular Traffic Offloading through Opportunistic Communications Based on Human Mobility}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {3}, pages = {872--885}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.03.002}, doi = {10.3837/TIIS.2015.03.002}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/LiSCZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/LiTCCZ15, author = {Zuoyong Li and Kezong Tang and Yong Cheng and Xiaobo Chen and Chongbo Zhou}, title = {Modified Adaptive Gaussian Filter for Removal of Salt and Pepper Noise}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {8}, pages = {2928--2947}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.08.010}, doi = {10.3837/TIIS.2015.08.010}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/LiTCCZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/LiW15, author = {Weisheng Li and Lidou Wang}, title = {Near-infrared Face Recognition by Fusion of {E-GV-LBP} and {FKNN}}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {1}, pages = {208--223}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.01.012}, doi = {10.3837/TIIS.2015.01.012}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/LiW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/LiWGJ15, author = {Fei Li and Jiulong Wu and Wenxue Ge and Wei Ji}, title = {Quantum Bacterial Foraging Optimization for Cognitive Radio Spectrum Allocation}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {2}, pages = {564--582}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.02.005}, doi = {10.3837/TIIS.2015.02.005}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/LiWGJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/LiX15, author = {Fang Li and Min Xie}, title = {Exact Decoding Probability of Random Linear Network Coding for Tree Networks}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {2}, pages = {714--727}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.02.013}, doi = {10.3837/TIIS.2015.02.013}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/LiX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/LiYHK15, author = {Qing Li and Qinghai Yang and Qingsu He and Kyung Sup Kwak}, title = {Profit-Maximizing Virtual Machine Provisioning Based on Workload Prediction in Computing Cloud}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {12}, pages = {4950--4966}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.12.012}, doi = {10.3837/TIIS.2015.12.012}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itiis/LiYHK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/LiZ15, author = {Yuheng Li and Qianchuan Zhao}, title = {Understanding Watching Patterns of Live {TV} Programs on Mobile Devices: {A} Content Centric Perspective}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {9}, pages = {3635--3654}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.09.019}, doi = {10.3837/TIIS.2015.09.019}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itiis/LiZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/LiZZ15, author = {Bao{-}Hong Li and Yin{-}Liang Zhao and Hongping Zhao}, title = {Attribute Set Based Signature Secure in the Standard Model}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {4}, pages = {1516--1528}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.04.014}, doi = {10.3837/TIIS.2015.04.014}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/LiZZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/Lim15, author = {Huhnkuk Lim}, title = {Implementation of a Network Provisioning System with User-driven and Trusty Protection Management}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {11}, pages = {4720--4738}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.11.026}, doi = {10.3837/TIIS.2015.11.026}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/Lim15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/LimCAL15, author = {Joanne Mun{-}Yee Lim and Yoong Choon Chang and Mohamad Yusoff Alias and Jonathan Loo}, title = {Performance Modelling of Adaptive {VANET} with Enhanced Priority Scheme}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {4}, pages = {1337--1358}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.04.004}, doi = {10.3837/TIIS.2015.04.004}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/LimCAL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/LinC15, author = {Meng{-}Hsien Lin and Yen{-}Wen Chen}, title = {Performance Analysis of Buffer Aware Scheduling for Video Services in {LTE} Network}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {9}, pages = {3594--3610}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.09.017}, doi = {10.3837/TIIS.2015.09.017}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/LinC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/LinLYH15, author = {Yuan Lin and Bowen Li and Hao Yin and Yuanzhi He}, title = {Throughput-efficient Online Relay Selection for Dual-hop Cooperative Networks}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {6}, pages = {2095--2110}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.06.007}, doi = {10.3837/TIIS.2015.06.007}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/LinLYH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/LinZXT15, author = {Chunyu Lin and Yao Zhao and Jimin Xiao and Tammam Tillo}, title = {Depth Map Coding Using Histogram-Based Segmentation and Depth Range Updating}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {3}, pages = {1121--1139}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.03.016}, doi = {10.3837/TIIS.2015.03.016}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itiis/LinZXT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/Liu15, author = {Guangjun Liu}, title = {Practical Schemes for Tunable Secure Network Coding}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {3}, pages = {1193--1209}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.03.020}, doi = {10.3837/TIIS.2015.03.020}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/Liu15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/LiuCCW15, author = {Chuan{-}Ming Liu and Cheng{-}Hsien Chen and Yen{-}Lin Chen and Jenq{-}Haur Wang}, title = {{AA} Mobile {P2P} Semantic Information Retrieval System with Effective Updates}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {5}, pages = {1807--1824}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.05.014}, doi = {10.3837/TIIS.2015.05.014}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/LiuCCW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/LiuJ15, author = {Shukun Liu and Weijia Jia}, title = {An Adaptive Virtual Machine Location Selection Mechanism in Distributed Cloud}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {12}, pages = {4776--4798}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.12.003}, doi = {10.3837/TIIS.2015.12.003}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/LiuJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/LiuKZ15, author = {Xiaoshuang Liu and Guixia Kang and Ningbo Zhang}, title = {Percolation Theory-Based Exposure-Path Prevention for 3D-Wireless Sensor Networks Coverage}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {1}, pages = {126--148}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.01.008}, doi = {10.3837/TIIS.2015.01.008}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/LiuKZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/LiuKZG15, author = {Xiaoshuang Liu and Guixia Kang and Ningbo Zhang and Yanyan Guo}, title = {Cooperative and Competitive Effect in Heterogeneous Networks of Healthcare System}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {11}, pages = {4405--4418}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.11.008}, doi = {10.3837/TIIS.2015.11.008}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/LiuKZG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/LiuMD15, author = {Yi Liu and Wenbo Mei and Huiqian Du}, title = {Group-Sparse Channel Estimation using Bayesian Matching Pursuit for {OFDM} Systems}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {2}, pages = {583--599}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.02.006}, doi = {10.3837/TIIS.2015.02.006}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/LiuMD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/LiuSH15, author = {Bin Liu and Rongfang Song and Haifeng Hu}, title = {A Receiver-Aided Seamless And Smooth Inter-RAT Handover At Layer-2}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {10}, pages = {4015--4033}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.10.014}, doi = {10.3837/TIIS.2015.10.014}, timestamp = {Thu, 16 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/LiuSH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/LiuYMC15, author = {Kezhong Liu and Tian Yang and Jie Ma and Zhiming Cheng}, title = {Fault-Tolerant Event Detection in Wireless Sensor Networks using Evidence Theory}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {10}, pages = {3965--3982}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.10.011}, doi = {10.3837/TIIS.2015.10.011}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/LiuYMC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/LiuYPY15, author = {Xing Liu and Chaowei Yuan and Enda Peng and Zhen Yang}, title = {Combined Service Subscription and Delivery Energy-Efficient Scheduling in Mobile Cloud Computing}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {5}, pages = {1587--1605}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.05.002}, doi = {10.3837/TIIS.2015.05.002}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/LiuYPY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/LiuYZBWX15, author = {Haifeng Liu and Zhuo Yang and Jun Zhang and Xiaomei Bai and Wei Wang and Feng Xia}, title = {Mining Implicit Correlations between Users with the Same Role for Trust-Aware Recommendation}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {12}, pages = {4892--4911}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.12.009}, doi = {10.3837/TIIS.2015.12.009}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itiis/LiuYZBWX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/LiuZ15, author = {Li Liu and Miao Zhang}, title = {Multi-objective Optimization Model with {AHP} Decision-making for Cloud Service Composition}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {9}, pages = {3293--3311}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.09.002}, doi = {10.3837/TIIS.2015.09.002}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/LiuZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/Lu15, author = {Yang Lu}, title = {Efficient Certificate-Based Proxy Re-encryption Scheme for Data Sharing in Public Clouds}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {7}, pages = {2703--2718}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.07.021}, doi = {10.3837/TIIS.2015.07.021}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itiis/Lu15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/Lu15a, author = {Chung{-}Fu Lu}, title = {Multi-party Password-Authenticated Key Exchange Scheme with Privacy Preservation for Mobile Environment}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {12}, pages = {5135--5149}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.12.022}, doi = {10.3837/TIIS.2015.12.022}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/Lu15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/LuXM15, author = {Cunbo Lu and Song Xiao and Yinbin Miao}, title = {{OQMCAR:} An Enhanced Network Coding-aware Routing Algorithm Based on Queue State and Local Topology}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {8}, pages = {2875--2893}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.08.007}, doi = {10.3837/TIIS.2015.08.007}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/LuXM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/LuYZW15, author = {Wei Lu and Yuwang Yang and Wei Zhao and Lei Wang}, title = {Practical Node Deployment Scheme Based on Virtual Force for Wireless Sensor Networks in Complex Environment}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {3}, pages = {990--1013}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.03.009}, doi = {10.3837/TIIS.2015.03.009}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/LuYZW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/LuoFW15, author = {Xin{-}Bin Luo and Shan Fu and Yong Wang}, title = {Chaotic Features for Dynamic Textures Recognition with Group Sparsity Representation}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {11}, pages = {4556--4572}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.11.017}, doi = {10.3837/TIIS.2015.11.017}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/LuoFW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/LuoWWW15, author = {Qin Luo and Junfeng Wang and Xiaoqing Wang and Ke Wu}, title = {Aero-Sim: An {NS-2} Based Simulator for Aeronautical Ad Hoc Networks}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {7}, pages = {2548--2567}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.07.012}, doi = {10.3837/TIIS.2015.07.012}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/LuoWWW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/MV15, author = {Ashok Kumar P. M. and Vaidehi V.}, title = {Anomalous Event Detection in Traffic Video Based on Sequential Temporal Patterns of Spatial Interval Events}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {1}, pages = {169--189}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.01.010}, doi = {10.3837/TIIS.2015.01.010}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/MV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/MV15a, author = {Ashok Kumar P. M. and Vaidehi V.}, title = {An Anomalous Behavior Detection Method Using System Call Sequences for Distributed Application}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {2}, pages = {659--679}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.02.010}, doi = {10.3837/TIIS.2015.02.010}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/MV15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/MaZXS15, author = {Yanping Ma and Hailin Zou and Hongtao Xie and Qingtang Su}, title = {Fast Search with Data-Oriented Multi-Index Hashing for Multimedia Data}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {7}, pages = {2599--2613}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.07.015}, doi = {10.3837/TIIS.2015.07.015}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/MaZXS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/MazahirS15, author = {Sana Mazahir and Shahzad Amin Sheikh}, title = {An Adaptive Companding Scheme for Peak-to-average Power Ratio Reduction in {OFDM} Systems}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {12}, pages = {4872--4891}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.12.008}, doi = {10.3837/TIIS.2015.12.008}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/MazahirS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/MengZZD15, author = {Lingjun Meng and Wentao Zhao and Haohao Zhao and Yang Ding}, title = {A Network Load Sensitive Block Placement Strategy of {HDFS}}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {9}, pages = {3539--3558}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.09.014}, doi = {10.3837/TIIS.2015.09.014}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/MengZZD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/MingZWHLMX15, author = {Liang Ming and Gang Zhao and Dongxia Wang and Minhuan Huang and Xiang Li and Qing Miao and Fei Xu}, title = {A Novel Method for Survivability Test Based on End Nodes in Large Scale Network}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {2}, pages = {620--636}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.02.008}, doi = {10.3837/TIIS.2015.02.008}, timestamp = {Tue, 14 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/MingZWHLMX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/MoZLA15, author = {Yun Mo and Zhongzhao Zhang and Yang Lu and Gul Agha}, title = {A Novel Technique for Human Traffic based Radio Map Updating in Wi-Fi Indoor Positioning Systems}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {5}, pages = {1881--1903}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.05.019}, doi = {10.3837/TIIS.2015.05.019}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/MoZLA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/MuhammadAFJSB15, author = {Khan Muhammad and Jamil Ahmad and Haleem Farman and Zahoor Jan and Muhammad Sajjad and Sung Wook Baik}, title = {A Secure Method for Color Image Steganography using Gray-Level Modification and Multi-level Encryption}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {5}, pages = {1938--1962}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.05.022}, doi = {10.3837/TIIS.2015.05.022}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/MuhammadAFJSB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/NashaatR15, author = {Heba Nashaat and Rawya Rizk}, title = {Handover Management Based on Location Based Services in F-HMIPv6 Networks}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {12}, pages = {5028--5057}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.12.016}, doi = {10.3837/TIIS.2015.12.016}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itiis/NashaatR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/NingYMLH15, author = {Bing Ning and Shouyi Yang and Xiaomin Mu and Yanhui Lu and Wanming Hao}, title = {Energy Efficiency Resource Allocation for {MIMO} Cognitive Radio with Multiple Antenna Spectrum Sensing}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {11}, pages = {4387--4404}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.11.007}, doi = {10.3837/TIIS.2015.11.007}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/NingYMLH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/NishaMVA15, author = {Usman Barakkath Nisha and N. Uma Maheswari and R. Venkatesh and Rabi Yasir Abdullah}, title = {Improving Data Accuracy Using Proactive Correlated Fuzzy System in Wireless Sensor Networks}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {9}, pages = {3515--3538}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.09.013}, doi = {10.3837/TIIS.2015.09.013}, timestamp = {Tue, 30 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itiis/NishaMVA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/NiuG15, author = {Jinxin Niu and Wei Guo}, title = {Resource Allocation for Cooperative Relay based Wireless {D2D} Networks with Selfish Users}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {6}, pages = {1996--2013}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.06.002}, doi = {10.3837/TIIS.2015.06.002}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/NiuG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/NiuZZH15, author = {Qin Niu and Zhimin Zeng and Tiankui Zhang and Zhirui Hu}, title = {Interference Alignment Based Transceiver Design in {OSG} mode of HetNets}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {6}, pages = {2014--2034}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.06.003}, doi = {10.3837/TIIS.2015.06.003}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/NiuZZH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/OuyangGG15, author = {Fengchen Ouyang and Jianhua Ge and Fengkui Gong}, title = {Slotted {ALOHA} Based Greedy Relay Selection in Large-scale Wireless Networks}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {10}, pages = {3945--3964}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.10.010}, doi = {10.3837/TIIS.2015.10.010}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/OuyangGG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/PanJLD15, author = {Han Pan and Zhongliang Jing and Minzhe Li and Peng Dong}, title = {Image Deblurring via Adaptive Proximal Conjugate Gradient Method}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {11}, pages = {4604--4622}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.11.020}, doi = {10.3837/TIIS.2015.11.020}, timestamp = {Thu, 11 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itiis/PanJLD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/PanZGY15, author = {Su Pan and Weiwei Zhou and Qingqing Gu and Qiang Ye}, title = {Network Selection Algorithm Based on Spectral Bandwidth Mapping and an Economic Model in {WLAN} {\&} {LTE} heterogeneous networks}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {1}, pages = {68--86}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.01.005}, doi = {10.3837/TIIS.2015.01.005}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/PanZGY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/ParkKO15, author = {ManKyu Park and DongBae Kang and Deock{-}Gil Oh}, title = {Two-Step Scheduling Scheme to Support Fairness and QoS in {DVB-S2} System}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {11}, pages = {4419--4435}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.11.009}, doi = {10.3837/TIIS.2015.11.009}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/ParkKO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/ParkPKC15, author = {Yong{-}Suk Park and Se{-}Ho Park and Tae Gon Kim and Jong{-}Moon Chung}, title = {Implementation of Gesture Interface for Projected Surfaces}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {1}, pages = {378--390}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.01.023}, doi = {10.3837/TIIS.2015.01.023}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/ParkPKC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/PengXGCL15, author = {Zhiping Peng and Bo Xu and Antonio Marcel Gates and Delong Cui and Weiwei Lin}, title = {The Deasibility and Properties of Dividing Virtual Machine Resources using the Virtual Machine Cluster as the Unit in Cloud Computing}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {7}, pages = {2649--2666}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.07.018}, doi = {10.3837/TIIS.2015.07.018}, timestamp = {Fri, 09 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/PengXGCL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/PerumalUC15, author = {P. Shunmuga Perumal and V. Rhymend Uthariaraj and V. R. Elgin Christo}, title = {{WSN} Lifetime Analysis: Intelligent {UAV} and Arc Selection Algorithm for Energy Conservation in Isolated Wireless Sensor Networks}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {3}, pages = {901--920}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.03.004}, doi = {10.3837/TIIS.2015.03.004}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/PerumalUC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/PhanNKLY15, author = {Dung Phan and In Seop Na and Soo{-}Hyung Kim and Gueesang Lee and Hyung Jeong Yang}, title = {Triangulation Based Skeletonization and Trajectory Recovery for Handwritten Character Patterns}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {1}, pages = {358--377}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.01.022}, doi = {10.3837/TIIS.2015.01.022}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/PhanNKLY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/PoovathyR15, author = {J. Florence Gnana Poovathy and Radha Sankararajan}, title = {Non-Iterative Threshold based Recovery Algorithm {(NITRA)} for Compressively Sensed Images and Videos}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {10}, pages = {4160--4176}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.10.022}, doi = {10.3837/TIIS.2015.10.022}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itiis/PoovathyR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/PradeepthiK15, author = {K. V. Pradeepthi and Arputharaj Kannan}, title = {Cloud Attack Detection with Intelligent Rules}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {10}, pages = {4204--4222}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.10.025}, doi = {10.3837/TIIS.2015.10.025}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/PradeepthiK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/QuanDC15, author = {Houde Quan and Chuanbao Du and Peizhang Cui}, title = {A Novel Hitting Frequency Point Collision Avoidance Method for Wireless Dual-Channel Networks}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {3}, pages = {941--955}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.03.006}, doi = {10.3837/TIIS.2015.03.006}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/QuanDC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/RahmanC15, author = {Waqas ur Rahman and Kwangsue Chung}, title = {Buffer-Based Adaptive Bitrate Algorithm for Streaming over {HTTP}}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {11}, pages = {4585--4603}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.11.019}, doi = {10.3837/TIIS.2015.11.019}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/RahmanC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/RajanF15, author = {R. Arokia Paul Rajan and F. Sagayaraj Francis}, title = {{RAS:} Request Assignment Simulator for Cloud-Based Applications}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {6}, pages = {2035--2049}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.06.004}, doi = {10.3837/TIIS.2015.06.004}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/RajanF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/RajavelT15, author = {Rajkumar Rajavel and Mala Thangarathinam}, title = {A Negotiation Framework for the Cloud Management System using Similarity and Gale Shapely Stable Matching Approach}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {6}, pages = {2050--2077}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.06.005}, doi = {10.3837/TIIS.2015.06.005}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/RajavelT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/RaoDF15, author = {Yunbo Rao and Xianshu Ding and Bojiang Fan}, title = {An Efficent Method of Binocular Data Reconstruction}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {9}, pages = {3721--3737}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.09.024}, doi = {10.3837/TIIS.2015.09.024}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/RaoDF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/RenWW15, author = {Yanting Ren and Liji Wu and An Wang}, title = {Double Sieve Collision Attack Based on Bitwise Detection}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {1}, pages = {296--308}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.01.017}, doi = {10.3837/TIIS.2015.01.017}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/RenWW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/RenZWY15, author = {Yongfeng Ren and Jingbo Zhou and Zhijian Wang and Yunyang Yan}, title = {An Improved Saliency Detection for Different Light Conditions}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {3}, pages = {1155--1172}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.03.018}, doi = {10.3837/TIIS.2015.03.018}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/RenZWY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/RudderK15, author = {Andrew Rudder and The Duc Kieu}, title = {A Lossless Data Hiding Scheme for {VQ} Indexes Based on Joint Neighboring Coding}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {8}, pages = {2984--3004}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.08.013}, doi = {10.3837/TIIS.2015.08.013}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/RudderK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/ShanYBH15, author = {Hangguan Shan and Ziyun Ye and Yuanguo Bi and Aiping Huang}, title = {Genetic Algorithm based Resource Management for Cognitive Mesh Networks with Real-time and Non-real-time Services}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {8}, pages = {2774--2796}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.08.002}, doi = {10.3837/TIIS.2015.08.002}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/ShanYBH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/ShenLWZ15, author = {Hu Shen and Shaohe Lv and Xiaodong Wang and Xingming Zhou}, title = {Energy-efficient Routing in MIMO-based Mobile Ad hoc Networks with Multiplexing and Diversity Gains}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {2}, pages = {700--713}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.02.012}, doi = {10.3837/TIIS.2015.02.012}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/ShenLWZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/ShiLZ15, author = {Wei Shi and Sanyang Liu and Zhaohui Zhang}, title = {A Lightweight Detection Mechanism against Sybil Attack in Wireless Sensor Network}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {9}, pages = {3738--3750}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.09.025}, doi = {10.3837/TIIS.2015.09.025}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/ShiLZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/ShinJY15, author = {Sungho Shin and Hanmin Jung and Mun Yong Yi}, title = {Building a Business Knowledge Base by a Supervised Learning and Rule-Based Method}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {1}, pages = {407--420}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.01.025}, doi = {10.3837/TIIS.2015.01.025}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/ShinJY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/ShuYCWZ15, author = {Minglei Shu and Dongfeng Yuan and Changfang Chen and Yinglong Wang and Chongqing Zhang}, title = {Modeling and Performance Analysis of {MAC} Protocol for {WBAN} with Finite Buffer}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {11}, pages = {4436--4452}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.11.010}, doi = {10.3837/TIIS.2015.11.010}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/ShuYCWZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/SinghKR15, author = {Hiran Kumar Singh and Dhananjay Kumar and Srilakshmi R.}, title = {Short Term Spectrum Trading in Future {LTE} Based Cognitive Radio Systems}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {1}, pages = {34--49}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.01.003}, doi = {10.3837/TIIS.2015.01.003}, timestamp = {Sat, 02 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itiis/SinghKR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/SivakumarV15, author = {T. Sivakumar and R. Venkatesan}, title = {A Novel Image Encryption Using Calligraphy Based Scan Method and Random Number}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {6}, pages = {2317--2337}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.06.019}, doi = {10.3837/TIIS.2015.06.019}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/SivakumarV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/So15, author = {Jaewoo So}, title = {Entropy-based Spectrum Sensing for Cognitive Radio Networks in the Presence of an Unauthorized Signal}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {1}, pages = {20--33}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.01.002}, doi = {10.3837/TIIS.2015.01.002}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/So15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/So15a, author = {Jaewoo So}, title = {Cooperative Spectrum Sensing for Cognitive Radio Networks with Limited Reporting}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {8}, pages = {2755--2773}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.08.001}, doi = {10.3837/TIIS.2015.08.001}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/So15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/SohnCSP15, author = {Yejin Sohn and Minju Cho and Minjae Seo and Jongho Paik}, title = {A Synchronization Scheme for Hierarchical Video Streams over Heterogeneous Network}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {8}, pages = {3121--3135}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.08.022}, doi = {10.3837/TIIS.2015.08.022}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/SohnCSP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/SongC15, author = {In Kuk Song and Junchul Chun}, title = {Evolving Internet Information {\&} Technology as Enablers for Creating Shared Values}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {1}, pages = {309--317}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.01.018}, doi = {10.3837/TIIS.2015.01.018}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/SongC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/SongCJ15, author = {Myungseok Song and Jun{-}Dong Cho and Jongpil Jeong}, title = {Global Mobility Management Scheme for Seamless Mobile Multicasting Service Support in PMIPv6 Networks}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {2}, pages = {637--658}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.02.009}, doi = {10.3837/TIIS.2015.02.009}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/SongCJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/SongK15, author = {In Kuk Song and Mingoo Kang}, title = {Internet Information Orientation: The Link to National Competitiveness on Internet}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {8}, pages = {3028--3039}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.08.015}, doi = {10.3837/TIIS.2015.08.015}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/SongK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/SongLYLL15, author = {Xiaofeng Song and Fenlin Liu and Chunfang Yang and Xiangyang Luo and Zhenyu Li}, title = {Steganalysis of Adaptive {JPEG} Steganography by Selecting {DCT} Coefficients According to Embedding Distortion}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {12}, pages = {5209--5228}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.12.026}, doi = {10.3837/TIIS.2015.12.026}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/SongLYLL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/SongRA15, author = {Wang{-}Cheol Song and Shafqat Ur Rehman and Muhammad Bilal Awan}, title = {Road Aware Information Sharing in VANETs}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {9}, pages = {3377--3395}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.09.006}, doi = {10.3837/TIIS.2015.09.006}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/SongRA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/SuCLWL15, author = {Gongchao Su and Bin Chen and Xiaohui Lin and Hui Wang and Lemin Li}, title = {QoS Constrained Optimization of Cell Association and Resource Allocation for Load Balancing in Downlink Heterogeneous Cellular Networks}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {5}, pages = {1569--1586}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.05.001}, doi = {10.3837/TIIS.2015.05.001}, timestamp = {Tue, 07 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/SuCLWL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/SuYCKL15, author = {Xin Su and Haifeng Yu and KyungHi Chang and Seung{-}Geun Kim and Yong{-}Kon Lim}, title = {Case Study for Ship Ad-hoc Networks under a Maritime Channel Model in Coastline Areas}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {10}, pages = {4002--4014}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.10.013}, doi = {10.3837/TIIS.2015.10.013}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/SuYCKL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/SuZN15, author = {Yuting Su and Xiaorong Zhu and Weizhi Nie}, title = {Multiple Person Tracking based on Spatial-temporal Information by Global Graph Clustering}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {6}, pages = {2217--2229}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.06.014}, doi = {10.3837/TIIS.2015.06.014}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/SuZN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/SunSLZQX15, author = {Youming Sun and Hongxiang Shao and Xin Liu and Jian Zhang and Junfei Qiu and Yuhua Xu}, title = {Traffic Offloading in Two-Tier Multi-Mode Small Cell Networks over Unlicensed Bands: {A} Hierarchical Learning Framework}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {11}, pages = {4291--4310}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.11.002}, doi = {10.3837/TIIS.2015.11.002}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/SunSLZQX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/TanGSL15, author = {Fangqing Tan and Hui Gao and Xin Su and Tiejun Lv}, title = {Sum-Rate Analysis for 3D {MIMO} with {ZF} Receivers in Ricean/Lognormal Fading Channels}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {7}, pages = {2371--2388}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.07.003}, doi = {10.3837/TIIS.2015.07.003}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/TanGSL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/TangW15, author = {Hong Tang and Hui{-}Zhu Wang}, title = {A Multi-Chain Based Hierarchical Topology Control Algorithm for Wireless Sensor Networks}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {9}, pages = {3468--3495}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.09.011}, doi = {10.3837/TIIS.2015.09.011}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/TangW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/TangYYL15, author = {Wan Tang and Bo Yi and Ximin Yang and Jingcong Li}, title = {Dynamic Home Circuit Construction for Datacenter Networks Using {LOBS-HC} Ring}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {5}, pages = {1606--1623}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.05.003}, doi = {10.3837/TIIS.2015.05.003}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/TangYYL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/TianXXXH15, author = {Hui Tian and Wei Xie and Youyun Xu and Kui Xu and Peng Han}, title = {A Flexible Network Access Scheme for {M2M} Communications in Heterogeneous Wireless Networks}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {10}, pages = {3789--3809}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.10.002}, doi = {10.3837/TIIS.2015.10.002}, timestamp = {Tue, 23 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/TianXXXH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/TranNK15, author = {Tuan Anh Tran and In Seop Na and Soo{-}Hyung Kim}, title = {Separation of Text and Non-text in Document Layout Analysis using a Recursive Filter}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {10}, pages = {4072--4091}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.10.017}, doi = {10.3837/TIIS.2015.10.017}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/TranNK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/UddinAIS15, author = {Zahoor Uddin and Ayaz Ahmad and Muhammad Iqbal and Nadir Shah}, title = {Independent Component Analysis Based {MIMO} Transceiver With Improved Performance In Time Varying Wireless Channels}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {7}, pages = {2435--2453}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.07.006}, doi = {10.3837/TIIS.2015.07.006}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/UddinAIS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/VarahramAMR15, author = {Pooria Varahram and Borhanuddin Mohd Ali and Somayeh Mohammady and Ahmed Wasif Reza}, title = {Prototype of a Peak to Average Power Ratio Reduction Scheme in Orthogonal Frequency Division Multiplexing Systems}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {6}, pages = {2201--2216}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.06.013}, doi = {10.3837/TIIS.2015.06.013}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/VarahramAMR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/VijayakumarGA15, author = {K. P. Vijayakumar and P. Ganeshkumar and M. Anandaraj}, title = {A Novel Jamming Detection Technique for Wireless Sensor Networks}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {10}, pages = {4223--4249}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.10.026}, doi = {10.3837/TIIS.2015.10.026}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/VijayakumarGA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/WangCCQ15, author = {Zhi{-}Hui Wang and Kuo{-}Nan Chen and Chin{-}Chen Chang and Chuan Qin}, title = {Sharing a Large Secret Image Using Meaningful Shadows Based on {VQ} and Inpainting}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {12}, pages = {5170--5188}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.12.024}, doi = {10.3837/TIIS.2015.12.024}, timestamp = {Mon, 26 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/WangCCQ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/WangF15, author = {Riming Wang and Jiuchao Feng}, title = {Grid-based Correlation Localization Method in Mixed Line-of-Sight/Non-Line-of-Sight Environments}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {1}, pages = {87--107}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.01.006}, doi = {10.3837/TIIS.2015.01.006}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/WangF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/WangGL15, author = {Chanfei Wang and Hui Gao and Tiejun Lv}, title = {Soft-Input Soft-Output Multiple Symbol Detection for Ultra-Wideband Systems}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {7}, pages = {2614--2632}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.07.016}, doi = {10.3837/TIIS.2015.07.016}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/WangGL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/WangL15, author = {Weixing Wang and Sheng Liu}, title = {Online Burning Material Pile Detection on Color Clustering and Quaternion based Edge Detection in Boiler}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {1}, pages = {190--207}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.01.011}, doi = {10.3837/TIIS.2015.01.011}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/WangL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/WangL15a, author = {Weixing Wang and Yanjie Liang}, title = {Rock Fracture Centerline Extraction based on Hessian Matrix and Steger Algorithm}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {12}, pages = {5073--5086}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.12.018}, doi = {10.3837/TIIS.2015.12.018}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/WangL15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/WangMSX15, author = {Haiquan Wang and Weijian Ma and Hengkun Shi and Chunhe Xia}, title = {An Interval Algebra-based Modeling and Routing Method in Bus Delay Tolerant Network}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {4}, pages = {1376--1391}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.04.006}, doi = {10.3837/TIIS.2015.04.006}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/WangMSX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/WangSDXT15, author = {Qiang Wang and Yuquan Shu and Minhua Dong and Ji Xu and Xiaofeng Tao}, title = {Degrees of Freedom of 3-user {MIMO} Interference Channels with Instantaneous Relay Using Interference Alignment}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {5}, pages = {1624--1641}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.05.004}, doi = {10.3837/TIIS.2015.05.004}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/WangSDXT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/WangSZ15, author = {Cheng{-}You Wang and Rongyang Shan and Xiao Zhou}, title = {{APBT-JPEG} Image Coding Based on {GPU}}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {4}, pages = {1457--1470}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.04.011}, doi = {10.3837/TIIS.2015.04.011}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/WangSZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/WangTZGK15, author = {Bo Wang and Yue Tan and Meijuan Zhao and Yanqing Guo and Xiangwei Kong}, title = {Classifier Combination Based Source Identification for Cell Phone Images}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {12}, pages = {5087--5102}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.12.019}, doi = {10.3837/TIIS.2015.12.019}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/WangTZGK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/WangWTL15, author = {Yong Wang and Hao Wu and Liyang Tang and Hui Li}, title = {The Solution for Cooperative Beamforming Design in {MIMO} Multi-way Relay Networks}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {3}, pages = {956--970}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.03.007}, doi = {10.3837/TIIS.2015.03.007}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/WangWTL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/WangXY15, author = {Songqing Wang and Xiaoming Xu and Weiwei Yang}, title = {Physical Layer Security in Underlay CCRNs with Fixed Transmit Power}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {1}, pages = {260--279}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.01.015}, doi = {10.3837/TIIS.2015.01.015}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/WangXY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/WangYM15, author = {Dandan Wang and Yang Yang and Zhenqiang Mi}, title = {QoS-Based and Network-Aware Web Service Composition across Cloud Datacenters}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {3}, pages = {971--989}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.03.008}, doi = {10.3837/TIIS.2015.03.008}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/WangYM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/WeiLC15, author = {Kuo{-}Jui Wei and Jung{-}San Lee and Shin{-}Jen Chen}, title = {Enhancing the Security of Credit Card Transaction based on Visual {DSC}}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {3}, pages = {1231--1245}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.03.022}, doi = {10.3837/TIIS.2015.03.022}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/WeiLC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/WeiZLNY15, author = {Jinxia Wei and Ru Zhang and Jianyi Liu and Xinxin Niu and Yixian Yang}, title = {Defense Strategy of Network Security based on Dynamic Classification}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {12}, pages = {5116--5134}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.12.021}, doi = {10.3837/TIIS.2015.12.021}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/WeiZLNY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/WenZB15, author = {Fangqing Wen and Gong Zhang and De Ben}, title = {Adaptive Selective Compressive Sensing based Signal Acquisition Oriented toward Strong Signal Noise Scene}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {9}, pages = {3559--3571}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.09.015}, doi = {10.3837/TIIS.2015.09.015}, timestamp = {Mon, 27 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/WenZB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/WuGYHZ15, author = {Jinfu Wu and Baolong Guo and Yunyi Yan and Jie Hou and Dan Zhao}, title = {A Fast {TU} Size Decision Method for {HEVC} {RQT} Coding}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {6}, pages = {2271--2288}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.06.017}, doi = {10.3837/TIIS.2015.06.017}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itiis/WuGYHZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/WuJRWZZ15, author = {Zhilu Wu and Lihui Jiang and Guanghui Ren and Gangyi Wang and Nan Zhao and Yaqin Zhao}, title = {A Rapid Convergent Max-SINR Algorithm for Interference Alignment Based on Principle Direction Search}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {5}, pages = {1768--1789}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.05.012}, doi = {10.3837/TIIS.2015.05.012}, timestamp = {Mon, 20 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itiis/WuJRWZZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/WuL15, author = {Weifeng Wu and Fagen Li}, title = {An Efficient Identity-Based Deniable Authenticated Encryption Scheme}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {5}, pages = {1904--1919}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.05.020}, doi = {10.3837/TIIS.2015.05.020}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/WuL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/WuYWD15, author = {Qihui Wu and Liang Yue and Long Wang and Guoru Ding}, title = {Non-cooperative Interference Radio Localization with Binary Proximity Sensors}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {9}, pages = {3432--3448}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.09.009}, doi = {10.3837/TIIS.2015.09.009}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itiis/WuYWD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/XiangLBWT15, author = {Xinguang Xiang and Fan Liu and Ye Bi and Yanfang Wang and Jinhui Tang}, title = {Local Similarity based Discriminant Analysis for Face Recognition}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {11}, pages = {4502--4518}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.11.014}, doi = {10.3837/TIIS.2015.11.014}, timestamp = {Tue, 08 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/XiangLBWT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/XiaoWLLJ15, author = {Xi Xiao and Zhenlong Wang and Qi Li and Qing Li and Yong Jiang}, title = {ANNs on Co-occurrence Matrices for Mobile Malware Detection}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {7}, pages = {2736--2754}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.07.023}, doi = {10.3837/TIIS.2015.07.023}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/XiaoWLLJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/XieC15, author = {Ling Fu Xie and Peter Han Joo Chong}, title = {Performance Improvement of Delay-Tolerant Networks with Mobility Control under Group Mobility}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {6}, pages = {2180--2200}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.06.012}, doi = {10.3837/TIIS.2015.06.012}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/XieC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/XingZMSL15, author = {Xiaomei Xing and Yuesheng Zhu and Zhiwei Mo and Ziqiang Sun and Zhen Liu}, title = {A Novel Perceptual Hashing for Color Images Using a Full Quaternion Representation}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {12}, pages = {5058--5072}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.12.017}, doi = {10.3837/TIIS.2015.12.017}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/XingZMSL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/XiongWGAWQ15, author = {Hu Xiong and Shikun Wu and Ji Geng and Emmanuel Ahene and Songyang Wu and Zhiguang Qin}, title = {A Pairing-free Key-insulated Certificate-based Signature Scheme with Provable Security}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {3}, pages = {1246--1259}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.03.023}, doi = {10.3837/TIIS.2015.03.023}, timestamp = {Fri, 18 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/XiongWGAWQ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/XuHZ15, author = {Haitao Xu and Zhen He and Xianwei Zhou}, title = {Load Balancing Algorithm of Ultra-Dense Networks: a Stochastic Differential Game based Scheme}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {7}, pages = {2454--2467}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.07.007}, doi = {10.3837/TIIS.2015.07.007}, timestamp = {Thu, 05 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itiis/XuHZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/XuL15, author = {Wenkai Xu and Eung{-}Joo Lee}, title = {A Novel Method for Hand Posture Recognition Based on Depth Information DescriptorT}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {2}, pages = {763--774}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.02.016}, doi = {10.3837/TIIS.2015.02.016}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/XuL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/XuL15a, author = {Ding Xu and Qun Li}, title = {Minimum {BER} Power Allocation for OFDM-based Cognitive Radio Networks}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {7}, pages = {2338--2353}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.07.001}, doi = {10.3837/TIIS.2015.07.001}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itiis/XuL15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/XuLL15, author = {Wenkai Xu and Suk{-}Hwan Lee and Eung{-}Joo Lee}, title = {A Robust Method for Partially Occluded Face Recognition}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {7}, pages = {2667--2682}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.07.019}, doi = {10.3837/TIIS.2015.07.019}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/XuLL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/XuLLLL15, author = {Wenkai Xu and Ick{-}Soo Lee and Suk{-}Kwan Lee and Bo Lu and Eung{-}Joo Lee}, title = {MultiView-Based Hand Posture Recognition Method Based on Point Cloud}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {7}, pages = {2585--2598}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.07.014}, doi = {10.3837/TIIS.2015.07.014}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/XuLLLL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/XuZG15, author = {Lingwei Xu and Hao Zhang and T. Aaron Gulliver}, title = {Performance Analysis of {IDF} Relaying {M2M} Cooperative Networks over N-Nakagami Fading Channels}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {10}, pages = {3983--4001}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.10.012}, doi = {10.3837/TIIS.2015.10.012}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/XuZG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/XueSDW15, author = {Zhen Xue and Liang Shen and Guoru Ding and Qihui Wu}, title = {Geolocation Spectrum Database Assisted Optimal Power Allocation: Device-to-Device Communications in {TV} White Space}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {12}, pages = {4835--4855}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.12.006}, doi = {10.3837/TIIS.2015.12.006}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itiis/XueSDW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/YanY15, author = {Jun Yan and Kegen Yu}, title = {Base Station Placement for Wireless Sensor Network Positioning System via Lexicographical Stratified Programming}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {11}, pages = {4453--4468}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.11.011}, doi = {10.3837/TIIS.2015.11.011}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/YanY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/YangDW15, author = {Lijun Yang and Chao Ding and Meng Wu}, title = {{RPIDA:} Recoverable Privacy-preserving Integrity-assured Data Aggregation Scheme for Wireless Sensor Networks}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {12}, pages = {5189--5208}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.12.025}, doi = {10.3837/TIIS.2015.12.025}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/YangDW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/YangLM0015, author = {Yang Yang and Ziyang Liu and Boao Min and Tao Peng and Wenbo Wang}, title = {Optimal User Density and Power Allocation for Device-to-Device Communication Underlaying Cellular Networks}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {2}, pages = {486--503}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.02.001}, doi = {10.3837/TIIS.2015.02.001}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/YangLM0015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/YangLWZZ15, author = {Qing Yang and Jiancheng Li and Hongyi Wang and Xianghua Zeng and Liming Zheng}, title = {A Slot Allocated Blocking Anti-Collision Algorithm for {RFID} Tag Identification}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {6}, pages = {2160--2179}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.06.011}, doi = {10.3837/TIIS.2015.06.011}, timestamp = {Thu, 21 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/YangLWZZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/YiCW15, author = {Wentan Yi and Shaozhen Chen and Kuanyang Wei}, title = {Zero-Correlation Linear Cryptanalysis of Reduced Round {ARIA} with Partial-sum and {FFT}}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {1}, pages = {280--295}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.01.016}, doi = {10.3837/TIIS.2015.01.016}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/YiCW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/YinWLLZ15, author = {Xiaoqing Yin and Bin Wang and Weili Li and Yu Liu and Maojun Zhang}, title = {Background Subtraction for Moving Cameras Based on Trajectory-controlled Segmentation and Label Inference}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {10}, pages = {4092--4107}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.10.018}, doi = {10.3837/TIIS.2015.10.018}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/YinWLLZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/YuFLLQ15, author = {Peng Yu and Lei Feng and Zifan Li and Wenjing Li and Xuesong Qiu}, title = {Low-Complexity Energy Efficient Base Station Cooperation Mechanism in {LTE} Networks}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {10}, pages = {3921--3944}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.10.009}, doi = {10.3837/TIIS.2015.10.009}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/YuFLLQ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/YueRYCM15, author = {Wenjing Yue and Yapeng Ren and Zhen Yang and Zhi Chen and Qingmin Meng}, title = {Joint Opportunistic Spectrum Access and Optimal Power Allocation Strategies for Full Duplex Single Secondary User {MIMO} Cognitive Radio Network}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {10}, pages = {3887--3907}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.10.007}, doi = {10.3837/TIIS.2015.10.007}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/YueRYCM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/YunC15, author = {Dooyeol Yun and Kwangsue Chung}, title = {Rate Adaptation for {HTTP} Video Streaming to Improve the QoE in Multi-client Environments}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {11}, pages = {4519--4533}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.11.015}, doi = {10.3837/TIIS.2015.11.015}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/YunC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/Zhang0L15, author = {Sanfeng Zhang and Di Huang and Yin Li}, title = {Prediction-Based Routing Methods in Opportunistic Networks}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {10}, pages = {3851--3866}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.10.005}, doi = {10.3837/TIIS.2015.10.005}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itiis/Zhang0L15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/ZhangBLZ15, author = {Huiwen Zhang and Huihui Bai and Meiqin Liu and Yao Zhao}, title = {Optimized Multiple Description Lattice Vector Quantization Coding for 3D Depth Image}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {3}, pages = {1140--1154}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.03.017}, doi = {10.3837/TIIS.2015.03.017}, timestamp = {Wed, 06 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/ZhangBLZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/ZhangBTS15, author = {Junxing Zhang and Chunjuan Bo and Jianbo Tang and Peng Song}, title = {Object Tracking based on Relaxed Inverse Sparse Representation}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {9}, pages = {3655--3671}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.09.020}, doi = {10.3837/TIIS.2015.09.020}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/ZhangBTS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/ZhangGT15, author = {Xuejun Zhang and Xiaolin Gui and Feng Tian}, title = {A Framework for Measuring Query Privacy in Location-based Service}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {5}, pages = {1717--1732}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.05.009}, doi = {10.3837/TIIS.2015.05.009}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/ZhangGT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/ZhangHWC15, author = {Long Zhang and Wei Huang and Qiwu Wu and Wenjing Cao}, title = {Differential Game Theoretic Approach for Distributed Dynamic Cooperative Power Control in Cognitive Radio Ad Hoc Networks}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {10}, pages = {3810--3830}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.10.003}, doi = {10.3837/TIIS.2015.10.003}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/ZhangHWC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/ZhangJK15, author = {Xiaoli Zhang and Yongnu Jin and Kyung Sup Kwak}, title = {Adaptive {GTS} Allocation Scheme with Applications for Real-time Wireless Body Area Sensor Networks}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {5}, pages = {1733--1751}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.05.010}, doi = {10.3837/TIIS.2015.05.010}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/ZhangJK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/ZhangKXX15, author = {Yuanhui Zhang and Chunrong Kan and Kun Xu and Yuhua Xu}, title = {Distributed Carrier Aggregation in Small Cell Networks: {A} Game-theoretic Approach}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {12}, pages = {4799--4818}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.12.004}, doi = {10.3837/TIIS.2015.12.004}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/ZhangKXX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/ZhangLHJ15, author = {Xue Zhang and Guangsong Li and Wenbao Han and Huifang Ji}, title = {A Novel ID-based Multi-domain Handover Protocol for Mesh Points in WMNs}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {7}, pages = {2512--2529}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.07.010}, doi = {10.3837/TIIS.2015.07.010}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/ZhangLHJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/ZhangWL15, author = {Qingfeng Zhang and Sheng Wang and Dan Liao}, title = {A Game Theoretic Analysis of Public Goods Allocation in {P2P} Networks}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {8}, pages = {2854--2874}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.08.006}, doi = {10.3837/TIIS.2015.08.006}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/ZhangWL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/ZhangWLXL15, author = {Guomei Zhang and Bing Wang and Guobing Li and Fei Xiang and Gangming Lv}, title = {Interference Management by Vertical Beam Control Combined with Coordinated Pilot Assignment and Power Allocation in 3D Massive {MIMO} Systems}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {8}, pages = {2797--2820}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.08.003}, doi = {10.3837/TIIS.2015.08.003}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/ZhangWLXL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/ZhangYHWG15, author = {Shigeng Zhang and Shuping Yan and Weitao Hu and Jianxin Wang and Kehua Guo}, title = {A Component-Based Localization Algorithm for Sparse Sensor Networks Combining Angle and Distance Information}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {3}, pages = {1014--1034}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.03.010}, doi = {10.3837/TIIS.2015.03.010}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/ZhangYHWG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/ZhangYZM15, author = {Zhe Zhang and Jing Yang and Jiankang Zhang and Xiaomin Mu}, title = {Pilot Symbol Assisted Weighted Data Fusion Scheme for Uplink Base-Station Cooperation System}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {2}, pages = {528--544}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.02.003}, doi = {10.3837/TIIS.2015.02.003}, timestamp = {Tue, 15 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itiis/ZhangYZM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/ZhangZGKB15, author = {Wei Zhang and Gengxin Zhang and Liang Gou and Bo Kong and Dongming Bian}, title = {A Hierarchical Autonomous System Based Topology Control Algorithm in Space Information Network}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {9}, pages = {3572--3593}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.09.016}, doi = {10.3837/TIIS.2015.09.016}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/ZhangZGKB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/ZhaoCL15, author = {Hongyi Zhao and Yang Cao and Yingzhuang Liu}, title = {Interference Cancellation for Relay-Assisted {D2D} Communication}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {9}, pages = {3276--3292}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.09.001}, doi = {10.3837/TIIS.2015.09.001}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/ZhaoCL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/ZhaoCZD15, author = {Zhen Zhao and Jie Chen and Yueyu Zhang and Lanjun Dang}, title = {An Efficient Revocable Group Signature Scheme in Vehicular Ad Hoc Networks}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {10}, pages = {4250--4267}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.10.027}, doi = {10.3837/TIIS.2015.10.027}, timestamp = {Wed, 09 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itiis/ZhaoCZD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/ZhaoLWZT15, author = {Dongyan Zhao and Keping Long and Dongxue Wang and Yichuan Zheng and Jiajing Tu}, title = {Energy-saving Strategy Based on an Immunization Algorithm for Network Traffic}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {4}, pages = {1392--1403}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.04.007}, doi = {10.3837/TIIS.2015.04.007}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/ZhaoLWZT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/ZhaoPLK15, author = {Yongwei Zhao and Tianqiang Peng and Bicheng Li and Shengcai Ke}, title = {Bag of Visual Words Method based on {PLSA} and Chi-Square Model for Object Category}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {7}, pages = {2633--2648}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.07.017}, doi = {10.3837/TIIS.2015.07.017}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/ZhaoPLK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/ZhaoWZJ15, author = {Lijun Zhao and Anhong Wang and Bing Zeng and Jian Jin}, title = {Scalable Coding of Depth Images with Synthesis-Guided Edge Detection}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {10}, pages = {4108--4125}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.10.019}, doi = {10.3837/TIIS.2015.10.019}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/ZhaoWZJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/ZhaoWZL15, author = {Yanna Zhao and Lei Wang and Xu Zhao and Yuncai Liu}, title = {Multiple-Shot Person Re-identification by Features Learned from Third-party Image Sets}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {2}, pages = {775--792}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.02.017}, doi = {10.3837/TIIS.2015.02.017}, timestamp = {Mon, 31 Oct 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/ZhaoWZL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/ZhaoZR15, author = {Junhui Zhao and Hao Zhang and Rong Ran}, title = {Distance Geometry-based Wireless Location Algorithms in Cellular Networks with {NLOS} Errors}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {6}, pages = {2132--2143}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.06.009}, doi = {10.3837/TIIS.2015.06.009}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/ZhaoZR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/ZhengLZJL15, author = {Kan Zheng and Yue Li and Yingkai Zhang and Zheng Jiang and Hang Long}, title = {Performance Analysis and Evaluation of Deployment in Small Cell Networks}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {3}, pages = {886--900}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.03.003}, doi = {10.3837/TIIS.2015.03.003}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itiis/ZhengLZJL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/ZhongZZ15, author = {Bin Zhong and Dandan Zhang and Zhongshan Zhang}, title = {Power Allocation for Opportunistic Full-Duplex based Relay Selection in Cooperative Systems}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {10}, pages = {3908--3920}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.10.008}, doi = {10.3837/TIIS.2015.10.008}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/ZhongZZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/ZhouLZL15, author = {Fucai Zhou and Muqing Lin and Yang Zhou and Yuxi Li}, title = {Efficient Anonymous Broadcast Encryption with Adaptive Security}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {11}, pages = {4680--4700}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.11.024}, doi = {10.3837/TIIS.2015.11.024}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itiis/ZhouLZL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/Zhu15, author = {Hongfeng Zhu}, title = {A Provable One-way Authentication Key Agreement Scheme with User Anonymity for Multi-server Environment}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {2}, pages = {811--829}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.02.019}, doi = {10.3837/TIIS.2015.02.019}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/Zhu15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/ZhuL15, author = {Shiping Zhu and Zheng Li}, title = {Local Stereo Matching Using Combined Matching Cost and Adaptive Cost Aggregation}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {1}, pages = {224--241}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.01.013}, doi = {10.3837/TIIS.2015.01.013}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/ZhuL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/ZhuYJL15, author = {Wentao Zhu and Jingbo Yang and Tingting Jia and Xu Liu}, title = {Transceiver Optimization for the Multi-Antenna Downlink in {MIMO} Cognitive System}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {12}, pages = {5015--5027}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.12.015}, doi = {10.3837/TIIS.2015.12.015}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/ZhuYJL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/ZhuZ15, author = {Shiping Zhu and Dongyu Zhao}, title = {Fractal Depth Map Sequence Coding Algorithm with Motion-vector-field-based Motion Estimation}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {1}, pages = {242--259}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.01.014}, doi = {10.3837/TIIS.2015.01.014}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/ZhuZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.