-
1
-
A Novel Markov Chain Model to Derive the Expected Contention Window Size and Backoff Counter for IEEE 802.11 WLAN Nodes
-
2
-
RTDA: A Novel Reusable Truthful Double Auction Mechanism for Wireless Spectrum Management
-
3
-
Dynamic Sparse Channel Estimation Using <inline-formula><alternatives><tex-math>\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\ell _0$$\end{document}</tex-math><inline-graphic></inline-graphic></alternatives></inline-formula>-constrained Kalman Filter in OFDM Systems
-
4
-
FOAM: Frequency-Offset Aware Multiple Client Selection for Cooperative Packet Recovery System
-
5
-
Research on Light-Weight Compression Schemes Based on Simulative Column-Store
-
6
-
Study of Constructing Data Supply Chain Based on PROV
-
7
-
Focused Deep Web Entrance Crawling by Form Feature Classification
-
8
-
A Framework for Optimization in Big Data: Privacy-Preserving Multi-agent Greedy Algorithm
-
9
-
Networking Big Data: Definition, Key Technologies and Challenging Issues of Transmission
-
10
-
Gender Prediction Based on Data Streams of Smartphone Applications
-
11
-
Anti-multipath Indoor Direction Finding Using Acoustic Signal via Smartphones
-
12
-
Crowdsourcing Based Event Reporting System Using Smartphones with Accurate Localization and Photo Tamper Detection
-
13
-
Parallel Accurate Localization from Cellular Network
-
14
-
A Vehicle Speed Estimation Algorithm Based on Wireless AMR Sensors
-
15
-
Design and Evaluation of a Policy-Based Security Routing and Switching System for Data Interception Attacks
-
16
-
Wireless Device Authentication Using Acoustic Hardware Fingerprints
-
17
-
Strongly Secure and Cost-Effective Certificateless Proxy Re-encryption Scheme for Data Sharing in Cloud Computing
-
18
-
Anomaly Detection of Single Sensors Using OCSVM_KNN
-
19
-
An Efficient Method on Trajectory Privacy Preservation
-
20
-
R-Memcached: A Reliable In-Memory Cache System for Big Key-Value Stores
-
21
-
Performance Evaluation of NPB and SPEC CPU2006 on Various SIMD Extensions
-
22
-
Prediction of High Resolution Spatial-Temporal Air Pollutant Map from Big Data Sources
-
23
-
A Graph Community Approach for Constructing microRNA Networks
-
24
-
Distributed Multigrid Technique for Seismic Tomography in Sensor Networks
-
25
-
Energy-Efficient and Smoothing-Sensitive Curve Recovery of Sensing Physical World
-
26
-
Feedback-Based Reduplicate Complex Event Processing in IoT
-
27
-
An Identification Algorithm in Grouping and Paralleling for Data-Intensive RFID Systems
-
28
-
I Know When to Do the Replenishment
-
29
-
Tag-Based User Interest Discovery Though Keywords Extraction in Social Network
-
30
-
Implicit Feedback Mining for Recommendation
-
31
-
The Collaborative Filtering Algorithm with Time Weight Based on MapReduce
-
32
-
Recommendation Specially for Fanatic Fans in SNS
-
33
-
In-Line Monitoring of Belt Transport with Adaptive Bandwidth Mean-Shift Hazard
-
34
-
A Method for Automated J Wave Detection and Characterisation Based on Feature Extraction
-
35
-
Metadata Organization and Retrieval with Attribute Tree for Large-Scale Traffic Surveillance Videos
-
36
-
Development and Challenges of Crowdsourcing Quality of Experience Evaluation for Multimedia
-
37
-
An Approach for J Wave Auto-Detection Based on Support Vector Machine
-
38
-
Green and Fault-Tolerant Routing in Data Centers
-
39
-
A Markov Chain Prediction Model for Routing in Delay Tolerant Networks
-
40
-
RAM: Resource Allocation in Mobility for Device-to-Device Communications
-
41
-
Group Signature Based Trace Hiding in Web Query