Abstract is missing.
- A Novel Markov Chain Model to Derive the Expected Contention Window Size and Backoff Counter for IEEE 802.11 WLAN NodesYi-hua Zhu, Chaoran Zhu, Xianzhong Tian. 3-13 [doi]
- RTDA: A Novel Reusable Truthful Double Auction Mechanism for Wireless Spectrum ManagementFeng Tian, Di Li, Shuyu Li, Lei Wang, Naigao Jin, Liang Sun. 14-27 [doi]
- Dynamic Sparse Channel Estimation Using \ell _0 -constrained Kalman Filter in OFDM SystemsNan Jing, Lin Wang. 28-42 [doi]
- FOAM: Frequency-Offset Aware Multiple Client Selection for Cooperative Packet Recovery SystemPing Li, Panlong Yang, Yubo Yan, Lei Shi. 43-52 [doi]
- Research on Light-Weight Compression Schemes Based on Simulative Column-StoreMeng Huang, Xiaofeng Qiu, Shufang Li, Daowei Liu. 55-68 [doi]
- Study of Constructing Data Supply Chain Based on PROVJiewei Lan, Xiyun Liu, Hong Luo, Peng Li. 69-78 [doi]
- Focused Deep Web Entrance Crawling by Form Feature ClassificationLin Wang, Ammar Hawbani, Xingfu Wang. 79-87 [doi]
- A Framework for Optimization in Big Data: Privacy-Preserving Multi-agent Greedy AlgorithmTaeho Jung, Xiang-Yang Li, Junze Han. 88-102 [doi]
- Networking Big Data: Definition, Key Technologies and Challenging Issues of TransmissionWeigang Hou, Pengxing Guo, Lei Guo 0005. 103-112 [doi]
- Gender Prediction Based on Data Streams of Smartphone ApplicationsYilei Wang, Yuanyang Tang, Jun Ma, Zhen Qin. 115-125 [doi]
- Anti-multipath Indoor Direction Finding Using Acoustic Signal via SmartphonesXiaopu Wang, Yan Xiong, Wenchao Huang. 126-140 [doi]
- Crowdsourcing Based Event Reporting System Using Smartphones with Accurate Localization and Photo Tamper DetectionTong Qin, Huadong Ma, Dong Zhao, Tianyuan Li, Jianwei Chen. 141-151 [doi]
- Parallel Accurate Localization from Cellular NetworkChao Wu, Bin Xu, Qi Li. 152-166 [doi]
- A Vehicle Speed Estimation Algorithm Based on Wireless AMR SensorsZusheng Zhang, Tiezhu Zhao, Huaqiang Yuan. 167-176 [doi]
- Design and Evaluation of a Policy-Based Security Routing and Switching System for Data Interception AttacksYudong Zhao, Ke Xu, Rashid Mijumbi, Meng Shen. 179-192 [doi]
- Wireless Device Authentication Using Acoustic Hardware FingerprintsDajiang Chen, Xufei Mao, Zhen Qin, Weiyi Wang, Xiang-Yang Li, Zhiguang Qin. 193-204 [doi]
- Strongly Secure and Cost-Effective Certificateless Proxy Re-encryption Scheme for Data Sharing in Cloud ComputingZhiguang Qin, Shikun Wu, Hu Xiong. 205-216 [doi]
- Anomaly Detection of Single Sensors Using OCSVM_KNNJing Su, Ying Long, Xiaofeng Qiu, Shufang Li, Daowei Liu. 217-230 [doi]
- An Efficient Method on Trajectory Privacy PreservationZhiqiang Zhang, Yue Sun, Xiaoqin Xie, Haiwei Pan. 231-240 [doi]
- R-Memcached: A Reliable In-Memory Cache System for Big Key-Value StoresChengjian Liu, Kai Ouyang, Xiaowen Chu, Hai Liu, Yiu-Wing Leung. 243-256 [doi]
- Performance Evaluation of NPB and SPEC CPU2006 on Various SIMD ExtensionsBo Zhao, Wei Gao, Rongcai Zhao, Lin Han, Huihui Sun, Yingying Li. 257-272 [doi]
- Prediction of High Resolution Spatial-Temporal Air Pollutant Map from Big Data SourcesYingyu Li, Yifang Zhu, Wotao Yin, Yang Liu, Guangming Shi, Zhu Han. 273-282 [doi]
- A Graph Community Approach for Constructing microRNA NetworksBenika Hall, Andrew Quitadamo, Xinghua Shi. 283-293 [doi]
- Distributed Multigrid Technique for Seismic Tomography in Sensor NetworksGoutham Kamath, Lei Shi, Edmond Chow, Wen-Zhan Song. 297-310 [doi]
- Energy-Efficient and Smoothing-Sensitive Curve Recovery of Sensing Physical WorldQian Ma, Yu Gu 0002, Tiancheng Zhang, Fangfang Li, Ge Yu. 311-324 [doi]
- Feedback-Based Reduplicate Complex Event Processing in IoTMingyue Cui, Chunhong Zhang, Yuewen Su, Yang Ji. 325-336 [doi]
- An Identification Algorithm in Grouping and Paralleling for Data-Intensive RFID SystemsLitian Duan, Zizhong John Wang, Fu Duan. 337-346 [doi]
- I Know When to Do the ReplenishmentJu-min Zhao, Na Li, Deng-ao Li. 347-359 [doi]
- Tag-Based User Interest Discovery Though Keywords Extraction in Social NetworkPing Yang, Yan Song, Yang Ji. 363-372 [doi]
- Implicit Feedback Mining for RecommendationYan Song, Ping Yang, Chunhong Zhang, Yang Ji. 373-385 [doi]
- The Collaborative Filtering Algorithm with Time Weight Based on MapReduceHongyi Su, Xianfei Lin, Bo Yan, Hong Zheng. 386-395 [doi]
- Recommendation Specially for Fanatic Fans in SNSYuewen Su, Mingyue Cui, Yang Ji, Yunxu Yuan. 396-406 [doi]
- In-Line Monitoring of Belt Transport with Adaptive Bandwidth Mean-Shift HazardTiezhu Qiao, Yanfei Duan, Yusong Pang. 409-420 [doi]
- A Method for Automated J Wave Detection and Characterisation Based on Feature ExtractionDengao Li, Yanfei Bai, JuMin Zhao. 421-433 [doi]
- Metadata Organization and Retrieval with Attribute Tree for Large-Scale Traffic Surveillance VideosYi Tang, Haitao Zhang, Bin Xu. 434-443 [doi]
- Development and Challenges of Crowdsourcing Quality of Experience Evaluation for MultimediaZhenji Wang, Dan Tao, Pingping Liu. 444-452 [doi]
- An Approach for J Wave Auto-Detection Based on Support Vector MachineDengao Li, Xuebo Liu, JuMin Zhao. 453-461 [doi]
- Green and Fault-Tolerant Routing in Data CentersLiang Shi, Xintong Guo, Lailong Luo, Yudong Qin. 465-478 [doi]
- A Markov Chain Prediction Model for Routing in Delay Tolerant NetworksShuai Liu, Fan Li, Qian Zhang, Meng Shen. 479-490 [doi]
- RAM: Resource Allocation in Mobility for Device-to-Device CommunicationsWeiyang Lin, Cuibo Yu, Xu Zhang. 491-502 [doi]
- Group Signature Based Trace Hiding in Web QueryJin Xu, Lan Yao, Fuxiang Gao. 503-511 [doi]