Abstract is missing.
- Quantifying individual communication capability in opportunistic mobile social networksQingsong Cai, Yuqing Bai, Limin Sun, Jianwei Niu. 1-6 [doi]
- Detecting overlapping communities of weighted networks by central figure algorithmChao Tong, Zhongyu Xie, Xiaoyun Mo, Jianwei Niu, Yan Zhang. 7-12 [doi]
- SDN-based ECMP algorithm for data center networksHailong Zhang, Xiao Guo, Jinyao Yan, Bo Liu, Qianjun Shuai. 13-18 [doi]
- An enhanced K-Nearest Neighbor algorithm for indoor positioning systems in a WLANMir Yasir Umair, Kopparapu Venkata Ramana, Dongkai Yang. 19-23 [doi]
- A novel UEP resource allocation scheme for layered source transmission in COFDM systemsKai Zhao, Huijuan Cui, Kun Tang. 24-29 [doi]
- Study on B2M integrated information service platform combined with RFID technology in Medicine circulation fieldMing Sun, Hai Wei. 30-33 [doi]
- Adaptive Learning Objects Assembly with compound constraintsShanshan Wan, Zhendong Niu. 34-39 [doi]
- Equalization-based enterprise service selectionXiao Xue, Shufang Wang. 40-45 [doi]
- High-temperature electrode faulted diagnosis for copper electrolytic cellYiding Wang, Di Zhang, Xiaoyu Zhang, Wenqi Wu. 46-49 [doi]
- Combine dynamic time-slice scaling with DVFS for coordinating thermal and fairness on CPUGangyong Jia, Guangjie Han. 50-55 [doi]
- Optimized Bit Extraction of H.264-SVC MGS stream over error-prone channelsZhao Kai, Cui Huijuan, Tang Kun. 56-61 [doi]
- Fast acquisition method of navigation receiver based on folded PMF-FFTJianzhong Qi, Feixiang Luo, Qingping Song. 62-66 [doi]
- From tie strength to function: Home location estimation in social networkJinpeng Chen, Yu Liu, Ming Zou. 67-71 [doi]
- Cross-layer optimization schemes based on HARQ for Device-to-Device communicationM. M. Miao, J. Sun, S. X. Shao. 72-77 [doi]
- Design of Rake receiver for the multi-path DS-UWB systemPingyan Shi, Zhenguo Shi, Xiaofeng Tao, Jianchao Ji, Xiaohui Liu. 78-83 [doi]
- The performance analysis of QC-LDPC codes constructed by Dayan sequence for coded cooperative relayYan Zhang, Fengfan Yang. 84-88 [doi]
- A secure remote user mutual authentication scheme using smart cardsXiong Li, Junguo Liao, Jiao Zhang, Jianwei Niu, Saru Kumari. 89-92 [doi]
- Overlapped-shaking: A local authentication method for mobile applicationsYu Liu, Jianwei Niu. 93-97 [doi]
- Cyber Security Backdrop: A SCADA testbedAdnan A. Farooqui, Syed Sajjad Haider Zaidi, Attaullah Y. Memon, Sameer Qazi. 98-103 [doi]
- A speed adjustable scheme based selective encryption control model for large-scale multimedia sensing system under resources constraintsChen Xiao, Tiemeng Li, Nan Yang, Lifeng Wang, Shilong Ma. 104-109 [doi]
- An overlapping community detection algorithm for opportunistic networksXuebin Ma, Zhenchao Ouyang, Lin Bai, Xin Zhan, Xiangyu Bai. 110-115 [doi]
- Path prediction based on second-order Markov chain for the opportunistic networksYubo Deng, Wei Liu, Lei Zhang, Yongping Xiong, Yunchuan Sun. 116-120 [doi]
- Energy efficient flooding under minimum delay constraint in synchronous low-duty-cycle wireless sensor networksShaobo Wu, Jianwei Niu, Long Cheng, Wusheng Chou. 121-126 [doi]
- Software defined satellite networks: Benefits and challengesZhu Tang, BaoKang Zhao, Wanrong Yu, Zhenqian Feng, Chunqing Wu. 127-132 [doi]
- Analyzing the cumulative interfering noise in multi-hop IEEE 802.11 networksChenfei Zhang, Lei Lei, Ting Zhang. 133-136 [doi]
- Queuing-theoretical multi-user dynamic spectrum allocation & sharing mechanism in multi-channel cognitive radio networksLong Zhang, Liusheng Huang, Hongli Xu. 137-142 [doi]
- TOPS: Two-phase scheduling for distributed real-time systemsMohammed I. Alghamdi, Xunfei Jiang, Xiao Qin, Jifu Zhang, Minghua Jiang, Meikang Qiu. 143-148 [doi]
- Hot topics detected from micro-bloggings based on word co-occurrence modelLong Cao, Xin Chen, Yuqing Zhang, Donghui Li. 149-154 [doi]
- Designing a self-adaptive and context-aware service composition systemBoxue Wang, Xinhuai Tang. 155-160 [doi]
- A new I/O scheduler designed for SSD through exploring performance characteristicsLei Han, Yi Lin, Weiwei Jia. 161-166 [doi]
- Improved dynamic channel allocation algorithm based on ant colony intelligence for P2P serviceZhengping Li, Didi Zhang, Jin Ren, Changliu Niu, Jucheng Zhao, Baotong An, Yihua Meng. 167-172 [doi]
- A checkpointing and instant-on mechanism for a embedded system based on non-volatile memoriesJianwen Sun, Xiang Long, Han Wan, Jingwei Yang. 173-178 [doi]
- Design of a distributed wireless tree-like data acquisition system based on ZigBeeYiding Wang, He Gong, Yun Fan, Haijun Cao. 179-184 [doi]
- Improving the data processing in WSNs through combination of a distributed approach and statistical techniquesOusmane Diallo, Joel J. P. C. Rodrigues, Mbaye Sene, Guangjie Han, Jianwei Niu. 185-190 [doi]
- A cost sensitive approach for Virtual Network reconfigurationLi Xu, Guozhen Tan, Xia Zhang. 191-196 [doi]
- A highway vehicle anti-collision protocol based on broadcasting feedback mechanismYang Yang, Nannan Cheng. 197-201 [doi]
- Iterative detection and decoding of MIMO signal using a low-complexity soft-output detectorJin Ren, Zhengping Li, Yujie Guo. 202-205 [doi]
- Liveness detection of dorsal hand vein based on AutoRegressive modelYiding Wang, Qi Qi, Kefeng Li. 206-210 [doi]
- An automated method of penetration testingXue Qiu, Shuguang Wang, Qiong Jia, Chunhe Xia, Qingxin Xia. 211-216 [doi]
- Safety requirements modeling based on RUCMXue Wu, Chao Liu, Qingxin Xia. 217-222 [doi]
- Scheduling jobs in computational grid using hybrid ACS and GA approachMustafa Muwafak Alobaedy, Ku Ruhana Ku-Mahamud. 223-228 [doi]
- The technical exploration of implementing hybrid TV with cloud computing in radio and TV industryXiang Zheng, Fang Xiong, YaoNan Dai. 229-233 [doi]
- A video sensing oriented speed adjustable fast multimedia encryption scheme and embedded systemChen Xiao, Wendong Wang, Nan Yang, Lifeng Wang. 234-238 [doi]
- Event-based organization model for sensing dataYunchuan Sun, Junsheng Zhang, Rongfang Bie, Hongli Yan, Ye Xia, ZhangBing Zhou. 239-242 [doi]
- Estimation of the number of crop seeds based on image identificationPengfei Li, Qi Meng, Weihong Zhang. 243-248 [doi]
- Sentiment analysis on Weibo dataDi Li, Jianwei Niu, Meikang Qiu, Meiqin Liu. 249-254 [doi]
- Horizontal hierarchy slicing based data compression for WSNYanwen Wang, Xiaoyu Li, Xiaoling Wu, ZhangBing Zhou, Hainan Chen. 255-260 [doi]
- Computation-aware motion estimation algorithm based on QoE controlBing Zhou, Yanjie Zhou, Mingliang Xu, Fei Wu. 261-265 [doi]
- 3D simulation of primary thrombus formation based on Level Set MethodsChaoqing Ma, Ou-Bong Gwun, Seung-Han Jeong. 266-270 [doi]
- Web service sub-chain recommendation leveraging graph searchingZehui Cheng, Beibei Yao, Xiaolei Wang, ZhangBing Zhou. 271-275 [doi]
- Termination analysis with recursive calling graphsTeng Long, Wenhui Zhang. 276-282 [doi]
- An efficient and accurate optimization method of sliding window size for PAAJinyang Liu, Chuanlei Zhang, Shanwen Zhang, Weidong Fang. 283-286 [doi]
- Energy efficient scheduling with probability and task migration considerations for soft real-time systemsYing Li, Jianwei Niu, Xiang Long, Meikang Qiu. 287-293 [doi]
- Bayes topic prediction model for focused crawling of vertical search engineWeihong Zhang, Yong Chen. 294-299 [doi]
- Image latent semantic analysis based face recognition with ensemble extreme learning machineChao Wang, Ju Cheng Yang, Yarui Chen, Cao Wu, Yanbin Jiao. 300-304 [doi]
- Energy-saving analysis of Cloud workload based on K-means clusteringQingxin Xia, Yuqing Lan, Liang Zhao, Limin Xiao. 305-309 [doi]
- Propagation regularity of hot topics in Sina Weibo based on SIR model - A simulation researchDonghui Li, Yuqing Zhang, Xin Chen, Long Cao. 310-315 [doi]
- Optimal power allocation for smart-grid powered point-to-point cognitive radio systemBassem Khalfi, Mahdi Ben Ghorbel, Bechir Hamdaoui, Mohsen Guizani. 316-320 [doi]