Abstract is missing.
- SDN-based container management scheme with flexibly addresses allocation capabilityYaodong Huang, Xiaohong Huang, Pei Zhang. 1-5 [doi]
- AP load balance based handover in software defined WiFi systemsKiran Nahida, Changchuan Yin, Akram Zaid. 6-11 [doi]
- Network anomaly detection based on frequent sub-graph mining approach and association analysisFangyuan Cheng, Xiaofeng Qiu. 12-16 [doi]
- A software defined security architecture for SDN-based 5G networkXiaodong Liang, Xiaofeng Qiu. 17-21 [doi]
- Turning an open source project into a carrier grade vswitch for NFV: Vosyswitch challenges & resultsMichele Paolino, Jeremy Fanguede, Nikolay Nikolaev, Daniel Raho. 22-27 [doi]
- A defense mechanism against the DNS amplification attack in SDNXiaodong Xing, Tao Luo, Jianfeng Li, Yang Hu. 28-33 [doi]
- A data driven orchestration framework in software defined securityWeijia Wang, Xiaofeng Qiu, Li Sun, Rui Zhao. 34-39 [doi]
- A network risk assessment methodology for power communication businessZe Shao, Yang Wang, Xiangzhou Chen, Yan Zhang, Jun He, Zhiqiang Wang. 40-43 [doi]
- Energy saving in C-RAN based on BBU switching schemeHonggang Guo, Ke Wang 0013, Hong Ji, Victor C. M. Leung. 44-49 [doi]
- Full duplex multi-threshold cooperative sensing scheme based on phase differenceTianwei Hou, Xiaodong Ji, Yong Li. 50-55 [doi]
- Future network deployment strategy based on user behavior analysis and stochastic geometryWeichen Liao, Jun Gu, Xinyu Gu, Di Wu, Cong Guo. 56-61 [doi]
- Performance analysis for ad hoc cognitive radio networks using low complexity 2D Markov modelTigang Jiang, Honggang Wang, Wei Wang. 62-65 [doi]
- Nodes and links jointed critical region identification based network vulnerability assessingSong Wang, Tiankui Zhang, Chunyan Feng. 66-71 [doi]
- Research of public opinion hotspot detection model based on Web big dataChunxiao Fan, Yuexin Wu, Jun Zhang, Tianlin Zhao. 72-77 [doi]
- A computing offloading algorithm for F-RAN with limited capacity fronthaulZexian Wu, Ke Wang 0013, Hong Ji, Victor C. M. Leung. 78-83 [doi]
- User behavior analysis of automobile websites based on distributed computing and sequential pattern miningYuanying Peng, Ke Yu. 84-88 [doi]
- Research on the technology of shelling of android reinforced applicationYanhui Guo, Yuhao Gao, Bo Wu, Miao Zhang. 89-93 [doi]
- A fast and scalable supervised topic model using stochastic variational inference and MapReduceWenzhuo Song, Bo Yang, Xuehua Zhao, Fei Li. 94-98 [doi]
- Effect of timer interrupt interval on file system synchronization overheadHankeun Son, Seongjin Lee, Youjip Won. 99-102 [doi]
- A depth cascade face detection algorithm based on adaboostWenxiang Yu, Jiapeng Xiu, Chen Liu, Zhengqiu Yang. 103-107 [doi]
- Design of an all-textile microwave absorber for indoor radar clearJinpil Tak, Jaehoon Choi. 108-111 [doi]
- A gene based semantic encoding method for subsumption testing and LCA detectionYuexin Wu, Chunxiao Fan. 112-116 [doi]
- A Service Discovery System based on Zookeeper with Priority Load Balance StrategyMeina Song, Guimu Luo, Haihong E. 117-119 [doi]
- Two approaches towards EDZL scheduling for performance asymmetric multiprocessorsPeng Wu, Shakaiba Majeed, Minsoo Ryu. 120-123 [doi]
- Semi-automatic metadata annotation of Web of Things with knowledge baseYunong Yang, Zhenyu Wu, Xinning Zhu. 124-129 [doi]
- ECO-UDC: An energy efficient data collection method for disaster area networksShucong Jia, Zubair Md. Fadlullah, Nei Kato, Lin Zhang. 130-134 [doi]
- Capacity analysis and comparison for cellular systems over different frequency bandsZhan Xu, Jienan Liu, Wei Zhang, Shidong Zhou, Weuqi Waug. 135-138 [doi]
- Cooperative spectrum sensing for non-time-slotted full-duplex cognitive radio networksTianwei Hou, Xiaodong Ji, Zexu Li, Yong Li. 139-144 [doi]
- A novel user-centric comp scheme for energy efficiency of dense heterogeneous networkXueying Li, Hailun Xia, Zhimin Zeng. 145-149 [doi]
- Adaptive resource allocation based on satisfaction for LTEXinyu Liang, Jiansong Miao. 150-154 [doi]
- A self-organizing resource allocation strategy based on Q-learning approach in ultra-dense networksMing Chen, Ye Hua, Xinyu Gu, Shiwen Nie, Zhiqiang Fan. 155-160 [doi]
- Research on standardization of the Android malware detection resultsYang Liu, Ya Zhang, Hui Wang, Juan Xu, Jiwen Li. 161-165 [doi]
- Joint computation and communication resource allocation in mobile-edge cloud computing networksXiaopeng Lin, Heli Zhang, Hong Ji, Victor C. M. Leung. 166-171 [doi]
- Program code regeneration method for non-volatile memory platformSeongsu Lee, Youjip Won. 172-175 [doi]
- Mobile-based continuous user authentication system for cloud securityQing Li, Le Wang, TaeGuen Kim 0002, Eul-Gyu Im. 176-179 [doi]
- Analysis of mobile subscribers' behavior pattern based on non-negative matrix factorizationHan Deng, Yonggang Qi, Jun Liu, Jie Yang. 180-185 [doi]
- Enabling declarative service composition for cloud applicationsChengyang Wang, Sangdo Lee, Choonhwa Lee. 186-189 [doi]
- Automatic calculation model of large scale soil loss model based on csle modelKai Wang, Zhengqiu Yang, Jiapeng Xiu, Chen Liu. 190-194 [doi]
- Saliency detection based on multi-cue and multi-scale with cellular automataLing Huang, Songguang Tang, Jiani Hu, Weihong Deng. 195-199 [doi]
- Signal processing on heterogeneous network based on tensor decompositionYuqian Qiao, Kai Niu, Zhiqiang He. 200-204 [doi]
- Revealing functional regions via joint matrix factorization based modelShan Wang, Yajing Xu, Sheng Gao. 205-209 [doi]
- Scalable collaborative filtering based on efficient identification of similar usersSang-Chul Lee, Si-Yong Lee, Dong-Kyu Chae, Sang-Wook Kim. 210-213 [doi]
- Adaptive scalable wireless video coding based on unequal protection and quadtree partitionMengyang Lv, Yu Liu, Yumei Wang. 214-218 [doi]
- Review aspect extraction based on character-enhanced embedding modelsJingxuan Yang, Qinjie Lyu, Sheng Gao, Lin Qiu, Jun Guo. 219-223 [doi]
- Two-stage analysis of large-scale protocol information in mobile storage systemsJunyong Jeong, Yong Ho Song. 224-228 [doi]
- Detection-assisted interference parameter estimation and interference cancellation for LTE-Advanced systemQiangze Chi, Xin Zhang, Dacheng Yang. 229-233 [doi]
- An iterative beamforming scheme based on leakage sum-rate maximization criterionJia Guo, Kai Niu, Chao Dong 0002. 234-238 [doi]
- Digital image processing in led visible light communications using mobile phone cameraZongze Li, Zhenshan Zhang, Qiaozhi Yuan, Yaojun Qiao, Ke Liao, HaiHua Yu. 239-243 [doi]
- Iterative channel estimation algorithm based on compressive sensing for GFDMJinnian Zhang, Yan Li 0034, Kai Niu. 244-248 [doi]
- Interference alignment in cognitive network with cooperative primary usersJiazhen Li, Li Guo 0004, Chao Dong 0002, Tianyu Kang. 249-253 [doi]
- Performance analysis of DOA estimation in the presence of mutual coupling for UAVJunhyuk Kim, Jaehoon Lee, Hyowon Kim, Young-Mi Park, Jaehoon Choi, Keum-Cheol Hwang, Sunwoo Kim. 254-256 [doi]
- Joint antenna and power allocation scheme for massive MIMO relaying networkBowen Liu, Heli Zhang, Hong Ji, Victor C. M. Leung. 257-261 [doi]
- A novel ICIC scheme for reducing intra cluster interference in LTE-Hi networkZhi Chen, Gang Chuai, Weidong Gao 0003. 262-267 [doi]
- Secure transmission based on cooperative jamming relay in heterogeneous massive MIMO systemChang Li, Xinran Zhang, Wei Lin, Songlin Sun. 268-272 [doi]
- An estimated QoE model for video telephone serviceZhe Wang, Yitong Liu, Yuchen Li, Hongwen Yang, Dacheng Yang. 273-278 [doi]
- An attribute switching mechanism for mobile networksChen Yu, Weiping Li. 279-283 [doi]
- A core code reinforcement method based on dynamic loading on Android platformJunchen Li, Fengmin Li, Jian Kuang, Song Song, Juchen Pan. 284-287 [doi]
- The static detection analysis technology of Android source codesYanhui Guo, Lin Yang, Xiaomeng Gao, Kun Wu. 288-292 [doi]
- Sound classification based on spectrogram for surveillance applicationsYingjie Li, Gang Liu. 293-297 [doi]
- Humming feature extraction based on locality statistical analysisGang Liu, Yanyao Bian, Yanqiu Wang. 298-302 [doi]
- A generation method for acoustic two-dimensional barcodeYe Li, Xiaofeng Ma, Jingsai Jiang, Peng Zhang, Yanhong Fan, Qiuyun Hao, H. V. Davyday. 303-307 [doi]
- Blind estimation of reverberation time using deep neural networkMyungin Lee, Joon-Hyuk Chang. 308-311 [doi]
- Improvement of convergence speed for an adaptive notch filter based on simplified lattice algorithm using pilot notch filtersHiroyuki Munakata, Shunsuke Koshita, Masahide Abe, Masayuki Kawamata. 312-316 [doi]
- Anti-forensic deletion scheme for flash storage systemsJaewook Kwak, Hyung Chan Kim, Il Hwan Park, Yong Ho Song. 317-321 [doi]
- Clusteringfor coordinated zero-forcing beamformingin multi-user interference networksWeidong Gao 0003, Shengjie He, Gang Chuai. 322-326 [doi]
- Semi-blind compensation method for addressing memoryless nonlinearitiesZhonghao Lu, Kai Li 0003, Jing Wang, Jingyu Wang, Qi Qi 0001. 327-331 [doi]
- Compressed sensing for frequency hopping communication signals via analog to information converterLei Chen, Huiyang Peng, Mengyue Liu, Yu Liu. 332-336 [doi]
- Cooperative video coding scheme with fountain code on the concentration on data sizeHao Yu, Yumei Wang, Yu Liu. 337-341 [doi]
- A low complexity decision feedback equalizer for single-carrier amplify-forward MIMO relay systemYang Liu, Chao Dong 0002, Zhiqiang He. 342-346 [doi]
- Fast algorithm based on edge density and gradient angle for intra encoding in HEVCHuiming Huang, Fang Wei. 347-351 [doi]
- Performance analysis of cooperative quickest interference detection for GNSSJaehoon Lee, Junhyuk Kim, Hyowon Kim, Chansik Park, Min Joon Lee, Sunwoo Kim. 352-355 [doi]
- Fast subpixel displacement estimation for images using chirp transform algorithmHayato Iwata, Masahide Abe, Masayuki Kawamata. 356-360 [doi]
- Fine-grained entity typing for knowledge base completionYidong Jia, Weiran Xu, Pengda Qin, Zuyi Bao. 361-365 [doi]
- The joint effect of semantic and syntactic word embeddings on sentiment analysisShu Chen, Guang Chen, Wei Wang. 366-370 [doi]
- Fusing multiple statistical features via explicit feature mapping for person re-identificationHongli Zhang, Honggang Zhang, Jianlou Si. 371-375 [doi]
- A new popularity prediction model based on lifetime forecast of online videosBenle Su, Yumei Wang, Yu Liu. 376-380 [doi]
- A 3D electromagnetic visualization system in snow and ice environmentHai Huang, Bingcai Han. 381-385 [doi]
- Unequal block for low bandwidth adaption in wireless video broadcastZhexin Li, Yu Liu, Yumei Wang. 386-390 [doi]
- Inferring the average as path length of the InternetCun Wang, Zhengmin Li, Xiaohong Huang, Pei Zhang. 391-395 [doi]
- Topology discovery algorithm for ethernet networks with incomplete information based on VLANJie Zhou, Yan Ma. 396-400 [doi]
- Multicast scheme with subgroups over heterogeneous cellular networkTang Liu, Hailun Xia, Chunyan Feng. 401-405 [doi]
- Calibration algorithm for C-RAN BBU-RRH switching schemesChunli Ye, Yaxin Wang, Xin Zhang, Dacheng Yang. 406-410 [doi]
- QoE analysis of NFV-based mobile edge computing video applicationSuyou Li, Zhigang Guo, Guochu Shou, Yihong Hu, Hongxing Li. 411-415 [doi]
- Understanding online shopping and offline mobility behavior in urban area from the view of multilayer networksYuanyuan Qiao, Yanting Zhang, Anders Lindgren, Jie Yang 0023. 416-421 [doi]
- Video residual reconstruction with sparsity estimationXuemei Wang, Dengyin Zhang, Yingtian Ji, Zhenfei Gu. 422-426 [doi]
- Activation force-based air pollution tracingHuanyu Zhou, Ni Zhang, Di Huang, Zhanyu Ma, Weisong Hu, Jun Guo 0002. 427-431 [doi]
- Edge pruning based community detectionWeibao He, Qianfang Xu, Bo Xiao. 432-436 [doi]
- Learning mention and relation representation with convolutional neural networks for relation extractionShuohong Liang, Guang Chen, Wei Wang. 437-441 [doi]
- SIA: Segment importance based rate adaptation for Dynamic Adaptive Streaming over HTTPYi Zheng, Yumei Wang, Yu Liu. 442-446 [doi]
- Study of feature word extraction and cluster in Chinese product reviewsYanjun Shen, Guang Chen. 447-451 [doi]
- A method of detecting parking slot in hough space and pose estimation using rear view image for autonomous parking systemSeung-Hyun Kim, Joong-Sik Kim, Whoi-Yul Kim. 452-454 [doi]
- A low energy algorithm of wireless sensor networks based on fractal dimensionChunxiao Fan, Ting Dong, Zhigang Wen, Qiong Wu. 455-459 [doi]
- Content caching scheme for D2D communication underlaying cellular networks with capacoty restrictionJinchao Lu, Heli Zhang, Hong Ji, Victor C. M. Leung. 460-465 [doi]
- User interest based distributed cooperative caching and sharing in wireless networksZheng Guo, Hao Jin, Chenglin Zhao, Dong Liang. 466-470 [doi]
- An experimental study: The sufficient respiration rate detection technique via continuous wave Doppler radarKu-young Chung, Bong-Ki Lee, Kwang sub Song, Kangsoo Shin, Seok Hyun Cho, Joon-Hyuk Chang. 471-475 [doi]
- Performande enhancement of multi-human detection using an IR-UWB radar by an adaptive thresholding algorithmEun Chong Lee, Sung Ho Cho. 476-480 [doi]
- Shopping store management system based on IR-UWB radar sensorsXuanjun Quan, Dae Hyeon Yim, Sung Ho Cho. 481-485 [doi]
- Movement analysis during sleep using an IR-UWB radar sensorJae-Min Lee, Jeong Woo Choi, Sung Ho Cho. 486-490 [doi]
- Improved belief propagation with istinctiveness measure for stereo matchingYingnan Geng, Xiuyan Wang. 491-494 [doi]
- UGC quality evaluation based on meta-learning and content feature analysisXiaoyue Cong, Lei Li. 495-499 [doi]
- Cross-modal subspace learning for sketch-based image retrieval: A comparative studyPeng Xu 0005, Ke Li 0004, Zhanyu Ma, Yi-Zhe Song, Liang Wang, Jun Guo 0002. 500-504 [doi]
- No noticeable difference evaluation of image data compressionEuee S. Jang. 505-509 [doi]
- Tone mapping method based on retinex algorithm using threshold functionHeungSoo Kim, Seungwoo Wee, Jechang Jeong. 510-512 [doi]