Abstract is missing.
- A Novel Channel Model for 3-D HAP-MIMO Communication SystemsZhuxian Lian, Lingge Jiang, Chen He, Qi Xi. 1-6 [doi]
- Enabling Proximity Call Continuity via Common Neighbor Tunneling for Public Safety in LTESok-Ian Sou, Yi-Ting Peng, Meng-Hsun Tsai, Yinman Lee. 7-11 [doi]
- A Time and Frequency Division Algorithm for Control Signaling Collision Avoidance in Standalone LTE-unlicensed NetworksJiying Xu, Yongmei Sun, Yuefeng Ji, Yang Tian. 12-16 [doi]
- Atomic Red-Black Distributed Gauss-Seidel Routing Algorithm for Wireless Sensor NetworksRen-Song Ko. 17-22 [doi]
- Minimizing Packet Delay via Load Balancing in Clos Switching Networks for DatacentersShu Yang, Shanshan Xin, Zhipeng Zhao, Bin Wu. 23-28 [doi]
- Delivery Probability of 3D MANETs with Packet ReplicationWu Wang, Bin Yang, Osamu Takahashi, Xiaohong Jiang, Shikai Shen. 29-34 [doi]
- Measurement and Modeling of 3D Spatial Wireless Backhaul Channels in NLOS ScenariosRuonan Zhang, Kun Wang, Kaijun Ren, Zhimeng Zhong, Xiaomei Zhang, Xiaoyan Pang. 35-40 [doi]
- A Distributed Prioritized Multiple Access Scheme for Ad Hoc Networks Using Time-Frequency Hopping CommunicationsRuonan Zhang, Miao Li, Lin Cai, Bin Li. 41-47 [doi]
- Multicast Delivery Probability of MANETs with Limited Packet RedundancyBin Yang, Yulong Shen, Guilin Chen, Yuanyuan Fan. 48-52 [doi]
- The Dynamic Linear Combination Retransmission Based on Network Coding in Multicast NetworkBin Li, Quan Li, Ruonan Zhang, Yi Jiang, Siying Bi. 53-57 [doi]
- Delay-Intolerant Uplink Traffic Aware Timer-Based Power Management for Infrastructure IEEE 802.11 WLANs with Unreliable Wireless LinksShenji Luan, Yi-hua Zhu, Kaikai Chi. 58-63 [doi]
- Link Selection for Secure Two-Hop Transmissions in Buffer-Aided Relay Wireless NetworksJi He, Yuanyu Zhang, Yulong Shen, Xiaohong Jiang. 64-68 [doi]
- An Improved Amorphous Localization Algorithm for Wireless Sensor NetworksShikai Shen, Bin Yang, KaiGuo Qian, Wu Wang, Xiaohong Jiang, Yumei She, Yujian Wang. 69-72 [doi]
- Achieving Full-View Barrier Coverage with Mobile Camera SensorsXiaolan Liu, Bin Yang, Shenghui Zhao, Yuanyuan Fan. 73-76 [doi]
- DEDV: A Data Collection Method for Mobile Sink Based on Dynamic Estimation of Data Value in WSNXiaoqing Gong, Xuan Wang, Jun Guo, Anwen Wang, Dan Xu, Na An, XiaoJiang Chen, Dingyi Fang, Xia Zheng. 77-83 [doi]
- Optimal Relay-Destination Pair Selection Mechanism for Secure Communications in Wireless Cooperative Relay NetworksPinchang Zhang, Yuanyu Zhang, Bin Yang, Xiaolan Liu. 84-89 [doi]
- Bulk-n-Pick Method for One-to-Many Data Transfer in Dense Wireless SpacesMarat Zhanikeev. 90-94 [doi]
- Improved Node Localization for WSN Using Heuristic Optimization ApproachesChin-Shiuh Shieh, Van-Oanh Sai, Yuh-Chung Lin, Tsair-Fwu Lee, Trong-The Nguyen, Quang-Duy Le. 95-98 [doi]
- An Improved Algorithm of Node Credibility Management for Lightweight WSNLiye Peng, Fangwei Wang, Changguang Wang. 99-102 [doi]
- Power Allocation Optimization for Full-Duplex D2D Communications Underlaying Cellular NetworksBoqun Zuo, Lingge Jiang, Chen He, Zhuxian Lian. 103-108 [doi]
- Page Dissemination Modeling and Optimization for Coding-Based Reprogramming Protocols in Wireless Sensor NetworksLina Yang, ShiNing Li, Weidong Yang, Gang Liu, Jinhui Yuan. 109-115 [doi]
- An Auction-Based Approach for Hybrid Access in Macro-Femto NetworksXun Wang, Tingli Mao, Gang Feng, Wei Cao. 116-121 [doi]
- Research of the Enhanced Anti-Xprobe2Junliang Ma, Xili Wang, Bing Xiao. 122-125 [doi]
- A Transceiver Design for Limited Feedback AF MIMO Relay System with MMSE-SIC ReceiverFan-Shuo Tseng, Chao-Yuan Hsu. 126-130 [doi]
- Using SDN and NFV to Implement Satellite Communication NetworksTaixin Li, Huachun Zhou, Hongbin Luo, Qi Xu, Yue Ye. 131-134 [doi]
- A New Interference Aware Routing Metric for Multi-radio Multi-channel Wireless Mesh NetworksWen Jiang Ji, Yichuan Wang, Yanxiao Liu, Lei Zhu, Weigang Ma, Li Yan. 135-140 [doi]
- On a Tangible Interface in Interactive Media Display Using Mobile PhonesKuei-Ping Shih, Su-Chu Hsu, Yen-Da Chen, Yang-Pu Hsiao, Ramon Dario Borja Martinez. 141-144 [doi]
- The Design and Implementation of a NoC System Based on SoCKitHongwei Ye, Quan Wang, Pengfei Yang, Wei Li, Zhibin Yu. 145-148 [doi]
- Using Path Label Routing in Wide Area Software-Defined Networks with OpenFlowWeidong Lin, Yukun Niu, Xia Zhang, Lingbo Wei, Chi Zhang. 149-154 [doi]
- A Hierarchical Quadtree-Based Link State Routing Scheme for Routing Table CompressionJingjing Wu, Tianshu Fang, Chang Chen, Chi Zhang. 155-160 [doi]
- Secure Transmission via Jamming in Wireless Networks with Possion Spatially Distributed EavesdroppersXiang Hu, Xing Zhang, Haozhou Huang, Yongjing Li. 161-166 [doi]
- Exact Secrecy Throughput of MANETs with Guard ZoneXiaochen Li, Shuangrui Zhao, Yuanyu Zhang, Yulong Shen, Xiaohong Jiang. 167-172 [doi]
- The Delay-Security Trade-Off in Two-Hop Buffer-Aided Relay Wireless NetworkXuening Liao, Zhenqiang Wu, Yuanyu Zhang, Xiaohong Jiang. 173-177 [doi]
- Design Issues of Enhanced DDoS Protecting Scheme under the Cloud Computing EnvironmentShin-Jer Yang, Yu-Zhan Li. 178-183 [doi]
- Dynamic Power Control for Maximizing System Throughput in Enterprise Femtocell NetworksXuan Zhou, Gang Wang, Gang Feng, Shuang Qin, Yantao Guo. 184-189 [doi]
- Spoofing Attacks against FM Indoor LocalizationZi Li, Yao Liu, Qingqi Pei, Lei Bai. 190-195 [doi]
- A Preliminary Design and Implementation of Location-Based Mobile Advertising Schemes with Plot Placement Animation over a Cyber-Physical SystemRu-Hung Lee, An-Yi Chen, Chih-Chung Chiang, Yu-Shan Athena Chen, Chun-Hung Liu. 196-201 [doi]
- Backfill: An Efficient Header Compression Scheme for OpenFlow Network with Satellite LinksYukun Niu, Chaobiao Wu, Lingbo Wei, Bin Liu, Jian Cai. 202-205 [doi]
- Privacy-Preserving Cloud-Based Firewall for IaaS-based EnterpriseHualong Sheng, Lingbo Wei, Chi Zhang, Xia Zhang. 206-209 [doi]
- A Lightweight and Secure Data Authentication Scheme with Privacy Preservation for Wireless Sensor NetworksHong Zhong, Lili Shao, Jie Cui. 210-217 [doi]
- Scheduling for Data Collection in Multi-hop IEEE 802.15.4e TSCH NetworksTzung-Shi Chen, Shu-Yu Kuo, Chia-Hsu Kuo. 218-221 [doi]
- The Study of Enhance the 4G LTE-A Mobile Network Deployment EfficiencyHong-Ren Wang, Wu-Ting Liu, Chau-Yun Hsu, Chuan-Hsin Peng, Tsung Sheng Kuo. 222-226 [doi]
- Evaluation of the Redundant Traffic Reduction Node Using the Packet Cache Coping with Different Byte Offsets among StreamsWataru Yokota, Kenji Ichijo, Akiko Narita. 227-232 [doi]
- Autonomous Decision of Function of the Redundant Traffic Reduction Node Using a New IP OptionTomohiro Yoshida, Yamato Ikeda, Kenji Ichijo, Akiko Narita. 233-238 [doi]
- MVNC: A SDN-based Multi-tenant Virtual Network Customization Mechanism in Cloud Data CenterKai Li, Chun Wang, Qiwei Shen, Jingyu Wang, Qi Qi. 239-243 [doi]
- Optimization of Computation-Intensive Applications in cc-NUMA ArchitectureMing Zhang, Naijie Gu, Kaixin Ren. 244-249 [doi]
- An Efficient Range Query Model over Encrypted Outsourced Data Using Secure K-D TreeYanguo Peng, Hui Li, JiangTao Cui, Yixiao Zhu, Changgen Peng. 250-253 [doi]
- Distributed Secure Service Composition with Declassification in Mobile NetworkNing Xi, Cong Sun, Jianfeng Ma, Yulong Shen, Di Lu. 254-259 [doi]
- A Differential Privacy Incentive Compatible Mechanism and Equilibrium AnalysisHai Liu, Zhenqiang Wu, Lin Zhang. 260-266 [doi]
- A Group-Based Ternary Query Splitting Protocol for Tag Identification in RFID SystemsYi Jiang, Ruonan Zhang, Wei Cheng, Bin Li, Wei Sun. 267-272 [doi]
- DFTCP: A TCP-fiendly Delay-Based High-Speed TCP VariantXu Zhang, Naijie Gu, Junjie Su, Kaixin Ren. 273-278 [doi]
- A Method for Information Security Risk Assessment Based on the Dynamic Bayesian NetworkJiao Wang, Kefeng Fan, Wei Mo, Dongyang Xu. 279-283 [doi]
- (k, n) Secret Sharing Scheme against Two Types of CheatersYanxiao Liu, Yichuan Wang, Lei Zhu, Jiwen Jiang, Xinhong Hei. 284-287 [doi]
- Improved Productivity of Mosaic Image by K-medoids and Feature Selection Mechanism on a Hadoop-Based FrameworkJau-Ji Shen, Chin-Feng Lee, Kun-Liang Hou. 288-293 [doi]
- A Mechanism for IoT Service Provision Based on Transient Private CloudGuilin Chen, Haibao Chen, Huibin Wang, Shenghui Zhao. 294-298 [doi]
- Unified Software-Defined Online Network Experiment Platform for Campus EducationSiyu Wang, Rentao Gu, Yuefeng Ji, Youqiang Hu, Qize Guo, Yanxia Tan, Chen Meng. 299-302 [doi]
- A Real-Time Fraud Detection Algorithm Based on Intelligent Scoring for the Telecom IndustryKun Niu, Haizhen Jiao, Nanjie Deng, Zhipeng Gao. 303-306 [doi]
- Analysis of an SEIVR Epidemic Model with Partial Immunization and Nonlinear Infection RateFangwei Wang, Changguang Wang, Dongmei Zhao, Yunkai Zhang. 307-312 [doi]
- ISO/IEEE 11073-Based Healthcare Services over IoT Platform Using 6LoWPAN and BLE: Architecture and ExperimentationHyung Woo Kang, Cheol Min Kim, Seok Joo Koh. 313-318 [doi]
- A Pixel Value Ordering Predictor for High-Capacity Reversible Data HidingChin-Feng Lee, Yu-Ju Tseng. 319-324 [doi]
- Cumulative Space Time Coding-Based Visible Light Cell Identification for Large-Scale Indoor EnvironmentRunmei Zhao, Zhitong Huang, Wei Li, Yuefeng Ji. 325-329 [doi]
- Load Prediction-Based Automatic Scaling Cloud ComputingTao Li, Jingyu Wang, Wei Li, Tong Xu, Qi Qi. 330-335 [doi]
- Dynamic Load-Balancing Mechanism for Software-Defined NetworkingWen-Hwa Liao, Ssu-Chi Kuai, Cheng-Hsiu Lu. 336-341 [doi]
- Energy Conservation Scheme for IEEE 802.15.4 Based Battery-Free Wireless Sensor NetworksYi-hua Zhu, Hangyu Lv, Yanyan Li, Ertao Li, Kaikai Chi. 342-348 [doi]
- Shared Risk Link Group Enumeration of Node Excluding Disaster FailuresBalazs Vass, Erika R. Bérczi-Kovács, János Tapolcai. 349-354 [doi]
- Using Pinch Technology to Achieve Augmented Reality in Multiple DevicesChih-Yung Chang, Su-Chu Hsu, Chao-Tsun Chang, Jian-Cheng Chen, Jian-Ning Zeng. 355-359 [doi]
- Incremental Mobile Sensor Deploying Method for Intangible Event Region Detection in Wireless Sensor NetworksShih-Chang Huang, Chao-Che Chang, Hong-Yi Chang. 360-363 [doi]
- Uplink Shared Resource Scheduling for Device-to-Device Underlay Communication with Least Transmission Power Resource Selection and Guaranteed Link QualityJen-Yi Pan, Ko-Wei Chang, Houng-Wei Lin. 364-369 [doi]
- IPARBC: An Improved Parallel Association Rule Based on MapReduce FrameworkHong-Yi Chang, Zih Huan Hong, Tu-Liang Lin, Wan-Kun Chang, Yi-Ying Lin. 370-374 [doi]
- A Novel Incremental Data Mining Algorithm Based on FP-growth for Big DataHong-Yi Chang, Jia-Chi Lin, Mei-Li Cheng, Shih-Chang Huang. 375-378 [doi]
- An Effective Wireless Charger Deployment Method for Complete Coverage in Wireless Chargeable Sensor NetworksTu-Liang Lin, Sheng-Lin Li, Hong-Yi Chang, Wan-Kun Chang, Yi-Ying Lin. 379-382 [doi]
- A Parameterized Wildcard Method Based on SDN for Server Load BalancingTu-Liang Lin, Chen-Hao Kuo, Hong-Yi Chang, Wan-Kun Chang, Yi-Ying Lin. 383-386 [doi]
- EmuStack: An OpenStack-Based DTN Network Emulation PlatformHaifeng Li, Huachun Zhou, Hongke Zhang, Bohao Feng. 387-392 [doi]
- A K-Means Based Small Cell Deployment Algorithm for Wireless Access NetworksGwo-Jong Yu, Kuan-Yi Yeh. 393-398 [doi]
- Dual-Wavelength Conversion of 16QAM Signals Based on Four Wave Mixing in Semiconductor Optical AmplifierHongxiang Wang, Yuqian Yang, Yuefeng Ji. 399-403 [doi]
- On the Design and Implementation of an Innovative Smart Building PlatformHong-Ren Wang, Chau-Yun Hsu, Ting-Ren Jian, An-Yi Chen. 404-409 [doi]
- Cache Management for Adaptive Scalable Video Streaming in Vehicular Content-Centric NetworkYiran Wei, Changqiao Xu, Mu Wang, Jianfeng Guan. 410-414 [doi]
- Research on Classifying Web Information with Latent Semantic Based on Modified LDA ModelChunxiao Fan, Tianlin Zhao, Yuexin Wu, Nan Gong. 415-418 [doi]
- Utility Analysis of Network Coding for Coordinated Formation Flight in Unmanned Aerial VehiclesXiaoyu Zhang, Lin Miao, Tao Shang. 419-422 [doi]
- A Novel Approach of Fault Management and Restoration of Network Services in IoT Cluster to Ensure Disaster ReadinessBishnu Prasad Gautam, Katsumi Wasaki, Narayan Sharma. 423-428 [doi]
- ECCN: An Elastic Customized Cloud Network PlatformYuze He, Wei Li, Lejian Zhang, Jingyu Wang, Qi Qi. 429-432 [doi]
- A Formal Validation Method for Trustworthy Services CompositionYuemin Li, Shenghui Zhao, Hailun Diao, Haibao Chen. 433-437 [doi]
- Data Collection Scheme Based on Wake-Up in Body Area NanonetworksBo Liu, Pengfei Lu, Xuanwen Hao, Xiaohong Jiang, Zhenqiang Wu. 438-443 [doi]