Threat methodology for securing scalable video in the Cloud (Englisch)
- Neue Suche nach: Khan, Afnan Ullah
- Neue Suche nach: Oriol, Manuel
- Neue Suche nach: Kiran, Mariam
- Neue Suche nach: Khan, Afnan Ullah
- Neue Suche nach: Oriol, Manuel
- Neue Suche nach: Kiran, Mariam
In:
2013 IEEE Third International Conference on Information Science and Technology (ICIST)
;
428-436
;
2013
- Aufsatz (Konferenz) / Elektronische Ressource
-
Titel:Threat methodology for securing scalable video in the Cloud
-
Beteiligte:
-
Erschienen in:
-
Verlag:
- Neue Suche nach: IEEE
-
Erscheinungsdatum:01.12.2013
-
Format / Umfang:1181494 byte
-
ISBN:
-
DOI:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Datenquelle:
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Title pageLian, Shuaibin / Dai, Xianhua et al. | 2013
- 2
-
Copyright pageZhang, Yan / Huang, Xiaobin et al. | 2013
- 3
-
Contents pageZhang, Xiaowen / Liu, Zhaomin / Xuan, Yuming et al. | 2013
- 12
-
Keynote speakersLai, Renfa / Li, Zejian / Zhou, Zhiying / Sun, Ting / Hu, Yaqun / Xie, Wei et al. | 2013
- 13
-
ICITST-2013: Keynote speaker 1: Principles of information security risk managementWiley, Jeffrey J. et al. | 2013
- 14
-
ICITST-2013: Keynote speaker 2: Security challenge of TOR and the deep webStupples, David et al. | 2013
- 15
-
ICITST-2013: Keynote speaker 3: Blurred nets: Disruption and the risk to future ‘Internet of Things’ (IoT) architecturesBrooks, Tyson T. et al. | 2013
- 16
-
ICITST-2013: Keynote speaker 4: Writing a sustainable research paperShoniregun, Charles A. et al. | 2013
- 17
-
RISC'13 Workshop: Keynote speaker 5Yoon Seok Chang, et al. | 2013
- 18
-
WorkshopsLiu, Jianzhou / Xiao, Liang / Shao, Xiongkai et al. | 2013
- 19
-
Workshop 1: The 3rd international workshop on information security, theory and practice (ISTP-2013)Zeng, Gaofeng / Zong, Shaohui / He, Jianming / Xiong, Chunxiang / Zhang, Zhiyong / Gao, Taihang / Wei, Bo et al. | 2013
- 20
-
Enhancement of two spatial steganography algorithms by using a chaotic system: Comparative analysisBattikh, D. / El Assad, S. / Bakhache, B. / Deforges, O. / Khalil, M. et al. | 2013
- 26
-
Lightweight chaos-based cryptosystem for secure imagesFawaz, Z. / El Assad, S. / Frajallah, M. / Khalil, A. / Lozi, R. / Deforges, O. et al. | 2013
- 31
-
Cryptanalysis of a chaos-based encryption algorithm for distributed systemsCaragata, Daniel / Tabia, Karim / Luduena, Mauricio et al. | 2013
- 37
-
High-speed encryption method based on switched chaotic model with changeable parametersGarasym, Oleg / Taralova, Ina et al. | 2013
- 43
-
Workshop 2: The 5th international workshop on RFID security and cryptography (RISC'13)Chen, Jiankui / Chen, Maozheng et al. | 2013
- 44
-
A mutual authentication protocol for low-cost RFID tags formally verified using CasperFDR and AVISPAAbughazalah, Sarah / Markantonakis, Kostantinos / Mayes, Keith et al. | 2013
- 52
-
Formally defining NFC M-coupon requirements, with a case studyAlshehri, Ali / Schneider, Steve et al. | 2013
- 59
-
Feasibility analysis of transportation applications based on APIs of social network servicesByon, Young-Ji / Young Seon Jeong, / Easa, Said M. / Joonsang Baek, et al. | 2013
- 65
-
Securing E-Seal real time tracking system for Internet of ThingsShemaili, Mouza Ahmed Bani / Yeun, Chan Yeob / Zemerly, Mohamed Jamal / Mubarak, Khalid / Yoon Seok Chang, et al. | 2013
- 70
-
Workshop 3: The 1st international workshop on big data and social networking management and security (BDSN-2013) Part IWang, Qinggang / Wang, Qingfeng et al. | 2013
- 71
-
A reference architecture for big data solutions introducing a model to perform predictive analytics using big data technologyGeerdink, Bas et al. | 2013
- 77
-
A comparison of major issues for the development of forensics in cloud computingAydin, Mustafa / Jacob, Jeremy et al. | 2013
- 83
-
Multidimensional community detection in TwitterZalmout, Nasser / Ghanem, Moustafa et al. | 2013
- 89
-
An analytical study of Arabic sentiments: Maktoob case studyAl-Kabi, Mohammed N. / Abdulla, Nawaf A. / Al-Ayyoub, Mahmoud et al. | 2013
- 95
-
Workshop 3: The 1st international workshop on big data and social networking management and security (BDSN-2013) Part IIYuan, Zhifang / Zhuang, Jinwu / Wang, Chen et al. | 2013
- 96
-
A recommendation scheme utilizing Collaborative FilteringDzugan, Nicholas / Fannin, Lance / Kami Makki, S. et al. | 2013
- 101
-
Sentiment analysis of arabic social media content: a comparative studyKhasawneh, Rawan T. / Wahsheh, Heider A. / Al-Kabi, Mohammed N. / Alsmadi, Izzat M. et al. | 2013
- 107
-
Framework for handling personal data proposed system of the self-control on buying informationNakagawa, Yuri / Matsuda, Yuuki / Ogi, Tetsuro et al. | 2013
- 113
-
End-to-End cryptographic voting: Potentials and limitationsAwad, Mohammed / Leiss, Ernst L. et al. | 2013
- 119
-
Workshop 3: The 1st international workshop on big data and social networking management and security (BDSN-2013) Part IIIXiong, Junhui / Tang, Shengjing / Guo, Jie / Wu, Xuzhong et al. | 2013
- 120
-
A system for social network analysisRinaldi, Luciene Cristina Alves / de Resende, Briseida Dogo / Moreira, Rodrigo Bossini Tavares / Netto, Marcio Lobo et al. | 2013
- 126
-
A privacy-aware query authentication index for encrypted database in cloudMiyoung Jang, / Ara Jo, / Jae-Woo Chang, et al. | 2013
- 132
-
Mining salient images from a large-scale blogosphereXian Chen, / Meilian Chen, / Hyoseop Shin, / Eun Yi Kim, et al. | 2013
- 137
-
Cloudlet-based for big data collection in body area networksQuwaider, Muhannad / Jararweh, Yaser et al. | 2013
- 142
-
A Cloud Enabled Social Media Monitoring Platform for Events Detection and PredictionBenkhelifa, Elhadj / Welsh, Thomas et al. | 2013
- 149
-
Workshop 4: Cloud applications and security (CAS'13)Tang, Ze / Feng, Jianwen / Zhao, Yi et al. | 2013
- 150
-
Considering an elastic scaling model for cloud SecurityMacDermott, Aine / Qi Shi, / Merabti, Madjid / Kifiyat, Kashif et al. | 2013
- 156
-
Security risk analysis as a serviceAlhomidi, Mohammed A. / Reed, Martin J. et al. | 2013
- 162
-
Evaluating security mechanisms implemented on public Platform-as-a-Service cloud environments case study: Windows AzureAkinbi, A. / Pereira, E. / Beaumont, C. et al. | 2013
- 168
-
A framework for assuring the conformance of cloud-based emailWillett, Melanie / Von Solms, Rossouw et al. | 2013
- 174
-
SessionsZhang, Wenge / Ding, Rui et al. | 2013
- 175
-
Session 1: Multimedia and web servicesShi, Wei / Zhou, Weiping / Wu, Zhengguo et al. | 2013
- 176
-
Characteristics analysis for the cyberlockers files study on Rapidgator Speedyshare and 1FichierZhao, Nan / Baud, Loic / Bellot, Patrick et al. | 2013
- 182
-
DA5DCSWS: A Distributed Architecture for semantic Web services Discovery and CompositionBoukhadra, Adel / Benatchba, Karima / Balla, Amar et al. | 2013
- 188
-
ProtoML: A rule-based validation language for Google Protocol BuffersKalman, Miklos et al. | 2013
- 194
-
The hybrid model for web services security access control and information flow controlKedjar, Saadia / Tari, Abdelkamel et al. | 2013
- 203
-
Session 2: Internet applications and technologyGuo, Jianhua / Chu, Liang / Zhang, Yongsheng / Yu, Dawei / Bai, Dongming et al. | 2013
- 204
-
Indirect NFC-loginBorchert, Bernd / Gunther, Max et al. | 2013
- 210
-
Labeled clustering a unique method to label unsupervised classesShaheen, Muhammad / Iqbal, Saeed / Fazl -e - Basit, et al. | 2013
- 215
-
A workflow for parallel and distributed computing of large-scale genomic dataHyun-Hwa Choi, / Byoung-Seob Kim, / Shin-Young Ahn, / Seung-Jo Bae, et al. | 2013
- 219
-
Internet Unite-and-Conquer architectureKarimi, Kamyab / Hauser, Carl et al. | 2013
- 231
-
Session 3: Ubi/cloud computingWang, Lizhi / Zhou, Jun et al. | 2013
- 232
-
Evaluation of the UTAUT model for acceptable user experiences in Identity Access Management SystemsAlotaibi, Sara Jeza / Wald, Mike et al. | 2013
- 238
-
Energy efficient time synchronization for target tracking in heterogeneous sensor networksDaehee Kim, / Sangwook Kang, / Sunshin An, et al. | 2013
- 244
-
Broker-based Cross-Cloud Federation ManagerAbdo, Jacques Bou / Demerjian, Jacques / Chaouchi, Hakima / Barbar, Kabalan / Pujolle, Guy et al. | 2013
- 252
-
Implementing a high-performance recommendation system using Phoenix++Chongxiao Cao, / Fengguang Song, / Waddington, Daniel G. et al. | 2013
- 258
-
Session 4: Internet applications and technologyZhao, Dingxuan / Zhang, Zhiwen / Li, Mufei / Li, Tianyu / Wang, Chengcheng et al. | 2013
- 259
-
A machine learning based method for optimal journal classificationIqbal, Saeed / Shaheen, Muhammad / Fazl-e-basit, et al. | 2013
- 265
-
Data management of RFID-based track-and-trace anti-counterfeiting in apparel supply chainChoi, S.H. / Yang, B. / Cheung, H.H. / Yang, Y.X. et al. | 2013
- 270
-
Web Service constraint optimizationOlmsted, Aspen / Farkas, Csilla et al. | 2013
- 276
-
RUFC: A flexible framework for reliable UDP with flow controlAtya, Ahmed Osama Fathy / Jilong Kuang, et al. | 2013
- 282
-
Session 5: Information securityZhe Ji, / Fan Zhou, / Xiang Tian, / Rongxin Jiang, / Chen, Yaowu et al. | 2013
- 283
-
SV-2FA: Two-factor user authentication with SMS and voiceprint challenge responseFujii, Haruhiko / Tsuruoka, Yukio et al. | 2013
- 288
-
Smartphone security: Overview of security software solutionsFischer, D. / Markscheffel, B. / Seyffarth, T. et al. | 2013
- 290
-
Analysis of security attacks on AODV routingAbdelshafy, Mohamed A. / King, Peter J. B. et al. | 2013
- 296
-
A taxonomy for securely sharing information among others in a trust domainArachchilage, Nalin Asanka Gamagedara / Namiluko, Cornelius / Martin, Andrew et al. | 2013
- 305
-
Session 6: Information securityAn, Libao / Chen, Mingyuan / Yang, Peiqing et al. | 2013
- 306
-
Enhanced Virtual Private Social Networks: Implementing user content confidentialityClarke, Charles / Pfluegel, Eckhard / Tsaptsinos, Dimitris et al. | 2013
- 313
-
DGM approach to network attacker and defender strategiesKayode, Alese Boniface / Babatunde, Iwasokun Gabriel / Haruna Danjuma Israel, et al. | 2013
- 321
-
Zombie-cookies: Case studies and mitigationSorensen, Ove et al. | 2013
- 327
-
Intrusion detection system for Wireless Nano sensor NetworksRahim, Aneel / Malone, Paul et al. | 2013
- 331
-
Session 7: Multimedia and web servicesSingh, Pooran / Vishvakarma, Santosh Kr. et al. | 2013
- 332
-
Pedagogical hypermédias systemsAmmar, Brika / Fahima, Nader et al. | 2013
- 338
-
Adaptation of Web services using policiesVelasco, Margarita / While, David / Raju, Pathmeswaran et al. | 2013
- 344
-
Feedback-driven clustering for automated linking of web pagesOest, Adam / Rege, Manjeet et al. | 2013
- 350
-
Context-aware RESTful services on mobile devicesvan der Westhuizen, Charl / Coetzee, Marijke et al. | 2013
- 356
-
Session 8: Cloud securityWei, Xuejie / Zhang, Jie / Yang, Zhao / Zhao, Zhen et al. | 2013
- 357
-
BoxLock: Mobile-based Serpent cryptographic algorithm and One-Time Password mechanism implementation for Dropbox files securityYulianto, Aditya / Kom, S. / Prasetiyowati, Maria Irmina et al. | 2013
- 363
-
Towards healthcare data security in cloud computingElmogazy, Huda / Bamasak, Omaima et al. | 2013
- 369
-
Combining steganography and biometric cryptosystems for secure mutual authentication and key exchangeAl-Assam, Hisham / Rashid, Rasber / Jassim, Sabah et al. | 2013
- 375
-
Virtual machine remote detection method using network timestamp in cloud computingNoorafiza, Matrazali / Maeda, Hiroshi / Kinoshita, Toshiyuki / Uda, Ryuya et al. | 2013
- 381
-
Session 9: Information securityYu, Lan / Deng, Linhua / Yang, Yunfei / Feng, Song et al. | 2013
- 382
-
Analysing and attacking the 4-way handshake of IEEE 802.11i standardAlabdulatif, Abdullah / Ma, Xiaoqi / Nolle, Lars et al. | 2013
- 388
-
Towards the design of a film-based graphical password schemeCatuogno, Luigi / Galdi, Clemente et al. | 2013
- 394
-
Embedded implementation of Edwards curve- and extended Jacobi quartic curve-based cryptosystemsPeretti, Chiara / Gastaldo, Paolo / Stramezzi, Marco / Zunino, Rodolfo et al. | 2013
- 401
-
DCT sign-based robust image hashingPrungsinchai, Supakorn / Khelifi, Fouad / Bouridane, Ahmed et al. | 2013
- 406
-
Session 10: Internet applications, infonomics, e-learning and e-technologyYang, Bo / Zhang, Wensheng / Xie, Yuan / Li, Qingchun et al. | 2013
- 407
-
Assisted Learning Virtual Support (ALVS) for postgraduate students, through the Graduate Virtual Research Environment (GVRE)Costello, Robert / Shaw, Nigel et al. | 2013
- 411
-
Improving the effectiveness of collaborative learning processes in Libyan Higher EducationKenan, Thuraya / Pislaru, Crinela / Elzawi, Abdussalam / Restoum, Maysoun et al. | 2013
- 417
-
Results on implementing personal learning environments in Tanzanian secondary schoolsMselle, Leonard J. / Kondo, Tabu S. et al. | 2013
- 422
-
Edge detection methods in palm-print identificationAkinsowon, O. A. / Alese, B. K. et al. | 2013
- 427
-
Session 11: Information securityPopovic, Miroslav / Basicevic, Ilija / Djukic, Miodrag / Cetic, Nenad et al. | 2013
- 428
-
Threat methodology for securing scalable video in the CloudKhan, Afnan Ullah / Oriol, Manuel / Kiran, Mariam et al. | 2013
- 437
-
Counter botnet activities in the Netherlands a study on organisation and effectivenessSchless, Timo / Vranken, Harald et al. | 2013
- 443
-
Automation and evaluation of the semantic annotation of Web resourcesDammak, Sahar Maalej / Jedidi, Anis / Bouaziz, Rafik et al. | 2013
- 449
-
Post-Quantum Crystography: A combination of Post-Quantum Cryptography and SteganographyGabriel, A.J / Alese, B.K. / Adetunmbi, A.O. / Adewale, O.S. et al. | 2013
- 453
-
Session 12: Information securityMa, Yongzheng / Shi, Taotao / Li, Wei / Qian, Fang / Ning, Kang / Cui, Chenzhou / Zhu, Yunqiang et al. | 2013
- 454
-
A model of component interaction between Formal, Technical and Informal components within IS/IT security governanceMusa, Nadianatra / Clift, Bob et al. | 2013
- 463
-
An access control model for easy management of patient privacy in EHR systemsSicuranza, Mario / Esposito, Angelo et al. | 2013
- 471
-
Evaluation of third party tracking on the webHamed, Asma / Kaffel-Ben Ayed, Hella / Kaafar, Mohamed Ali / Kharraz, Ahmed et al. | 2013
- 478
-
Session 13: Internet applications and technologyTu, Shitao / Zhu, Lanjuan et al. | 2013
- 479
-
Design and implementation of the contents visualization system for social networksJong-Hoon Lee, / Jung-Tae Kim, / Ik Kyun Kim, / Ki-Jun Han, et al. | 2013
- 484
-
Design and development of Anti-XSS proxyShahriar, Hossain / North, Sarah / Wei-Chuen Chen, / Mawangi, Edward et al. | 2013
- 490
-
Exploratory study of the attitudes of academic staff in Libyan Universities towards the role of the InternetElzawi, Abdussalam / Wade, Steve / Kenan, Thuraya / Pislaru, Crinela et al. | 2013
- 494
-
Design and implementation of microcontroller based short message service control systemPrince, Nwankwo Nonso et al. | 2013
- 500
-
Session 14: Information securityZhang, Shaolong et al. | 2013
- 501
-
A methodology to build run-time monitors for security-aware workflowsBertolissi, Clara / Ranise, Silvio et al. | 2013
- 503
-
Grayscale image encryption using a hyperchaotic unstable dissipative systemOntanon-Garcia, L. J. / Garcia-Martinez, M. / Campos-Canton, E. / Celikovsky, Sergej et al. | 2013
- 508
-
Social engineering in social networking sites: Affect-based modelAlgarni, Abdullah / Xu, Yue / Taizan Chan, / Yu-Chu Tian, et al. | 2013
- 516
-
A failure to communicate: Security vulnerabilities in the GridStreamX Edgeware applicationBrooks, Tyson / Kaarst-Brown, Michelle / Caicedo, Carlos / Joon Park, / McKnight, Lee et al. | 2013
- 524
-
A new encryption scheme based on hybrid ProblemsSahu, Hemlal / Sharma, B. K. et al. | 2013
- 528
-
Session 15: Cloud securityShen, Bo / Zhou, Xingshe / Yang, Gang et al. | 2013
- 529
-
Trustworthy evidence gathering mechanism for multilayer cloud complianceFlorian, Markus / Paudel, Sarita / Tauber, Markus et al. | 2013
- 531
-
A comparative study between modern encryption algorithms based on cloud computing environmentJasim Mohammad, Omer K. / Abbas, Safia / El-Horbaty, El-Sayed M. / Salem, Abdel-Badeeh M. et al. | 2013
- 536
-
Electrocardiogram (ECG) signals as biometrics in securing Wireless Body Area NetworkRamli, Sofia Najwa / Ahmad, Rabiah / Abdollah, Mohd Faizal et al. | 2013
- 542
-
Security in the cloud based systems: Structure and breachesShandilya, Vivek / Shiva, Sajjan et al. | 2013
- 548
-
Session 16: Internet applications and technologyLi, Qinggong / Chen, Zhen / Song, Wenhua / Lv, Lingyue et al. | 2013
- 549
-
Pseudo Eye: The next-generation shopping application using Augmented RealityAnanda Kanagaraj S, / Arjun G, / Sree Sharmila T, et al. | 2013
- 554
-
Information Access Assistant Service (IAAS)Kabore, Kiswendsida K. / Sie, Oumarou / Sedes, Florence / Peninou, Andre et al. | 2013
- 558
-
Towards an efficient shopping mechanism for M-commerceur Rehman, Shafiq / Ejaz, Naveed et al. | 2013
- 563
-
Extraction methods of e-mail discussion processes considering diversity of description granularity and their complicated relationshipsNakayama, Hiroki / Onuma, Ryo / Kaminaga, Hiroaki / Miyadera, Youzou / Yokoyama, Setsuo / Nakamura, Shoichi et al. | 2013
- 569
-
Session 17: Information securityHong, Lin / Jiang, Ying / Zhou, Yigang et al. | 2013
- 570
-
Reinforcing network security by converting massive data flow to continuous connections for IDSSalem, Maher / Buehler, Ulrich et al. | 2013
- 576
-
Access control enforcement in Named Data NetworkingHamdane, Balkis / Serhrouchni, Ahmed / El Fatmi, Sihem Guemara et al. | 2013
- 582
-
Introducing a new algorithm for medical image encryption based on chaotic feature of cellular automataRanaee, Iman / Nia, Mahdi Majidi / Jahantigh, Reza / Gharib, Amirhossein et al. | 2013
- 588
-
SecureDIS: A framework for secure Data Integration SystemsAkeel, Fatimah Y. / Wills, Gary B. / Gravell, Andrew M. et al. | 2013
- 595
-
Session 18: Ubi/cloud computingBao, Lidan / Xu, Si / Zhang, Tiejun / Wang, Donghui / Hou, Chaohuan et al. | 2013
- 596
-
Automatic data reuse for accelerating data intensive applications in the CloudHan, Liangxiu / Xie, Zheng / Baldock, Richard et al. | 2013
- 601
-
Adaptive market place for converged cloud computing modelMusa, Ibrahim Kabiru / Walker, Stuart D. et al. | 2013
- 607
-
Access control in probative value CloudMsahli, Mounira / Abdeljaoued, Rached / Serhrouchni, Ahmed et al. | 2013
- 612
-
Security risks in the short-range communication of ubiquitous applicationEvesti, Antti / Suomalainen, Jani / Savola, Reijo et al. | 2013
- 618
-
Session 19: Infonomics and e-technologyGan, Shuzhen / Yang, Jianfeng / Yang, Yufang et al. | 2013
- 619
-
Anomaly detection in Online Social Networks using structure-based techniqueRezaei, Abdolazim / Kasirun, Zarinah Mohd / Rohani, Vala Ali / Khodadadi, Touraj et al. | 2013
- 623
-
E-Government web services and security of Personally Identifiable Information in developing nations a case of some Nigerian embassiesAdedayo, Love / Butakov, Sergey / Ruhl, Ron / Lindskog, Dale et al. | 2013
- 630
-
A prosodic Text-to-Speech system for Yorùbá languageAkinwonmi, Akintoba Emmanuel / Alese, Boniface Kayode et al. | 2013
- 636
-
Implementation and evaluation of classroom simulation for trainee teacher using second life environmentsAlotaibi, Fahad / Dimitrov, Jordan et al. | 2013
- 644
-
Session 20: Ubi/cloud computingWang, Xiaobin / Zhang, Malu / Yang, Yuanjing et al. | 2013
- 645
-
Security standards taxonomy for Cloud applications in Critical Infrastructure ITPaudel, Sarita / Tauber, Markus / Brandic, Ivona et al. | 2013
- 647
-
Performability models for designing disaster tolerant Infrastructure-as-a-Service cloud computing systemsSilva, Bruno / Maciel, Paulo / Zimmermann, Armin et al. | 2013
- 653
-
Cloud security and compliance concerns: Demystifying stakeholders' roles and responsibilitiesKandira, Muteveri / Mtsweni, Jabu / Padayachee, Keshnee et al. | 2013
- 659
-
Keystone federated securitySitaram, Dinkar / Phalachandra, H. L. / Vishwanath, Anush / Ramesh, Pramod / Prashanth, Meghana / Joshi, Akshay G / Desai, Anoop R / Harikrishna Prabhu C R, / Prafulla, / Shwetha R, et al. | 2013
- 665
-
Session 21: Internet applications and technologyLiu, Xusong / Zhan, Xingmeng / Xiao, Liang et al. | 2013
- 666
-
Security in software engineering requirementAl-Shorafat, Wafa Slaibi et al. | 2013
- 674
-
Real-time adaptive arrival prediction system for public transportObrul, Denis / Zalik, Borut et al. | 2013
- 678
-
Methods for strategic accumulation of context information in research activitiesOnuma, Ryo / Nakayama, Hiroki / Kaminaga, Hiroaki / Morimoto, Yasuhiko / Miyadera, Youzou / Nakamura, Shoichi et al. | 2013
- 684
-
Using multi-agent systems to solve food distribution problem in disaster areaManzoor, Umar / Zubair, Maria / Batool, Kanwal et al. | 2013
- 694
-
Introducing clocks-events to csp for modeling real-time systems with multi-clockShao, Zhucheng / Geng, Juanjuan et al. | 2013
- 698
-
Numerical simulation of liquid chlorine tank leak based on FLUENTLi, Qinggong / Lv, Lingyue / Song, Wenhua / Chen, Zhen et al. | 2013
- 702
-
Real time multi stage unsupervised intelligent engine for NIDS to enhance detection rate of unknown attacksAmoli, Payam Vahdani / Hamalainen, Timo et al. | 2013
- 707
-
Comparison of NoC routing algorithms based on packet-circuit switchingDu, Gaoming / He, Jing / Song, Yukun / Zhang, Duoli / Wu, Huajie et al. | 2013
- 711
-
Three-dimensional dynamic simulation of landslide disasterLi, Yong / An, Ru / Wu, Huayi et al. | 2013
- 714
-
Design of a dynamic reconfigurable coprocessor for flexible precision matrix algorithms in media processing and industrial control applicationsLiu, Hao / Li, Zhaolin / Chen, Zhixiang et al. | 2013
- 718
-
A threshold value-based group key management for satellite networkJiao, Wencheng / Hu, Jianwang / Lu, Zhengjun / Xu, Jing et al. | 2013
- 722
-
BGP performance analysis for large scale VPNMai, Jian / Du, Jiang et al. | 2013
- 726
-
Learning models to simulate electricity marketsDong, Xiuming et al. | 2013
- 729
-
A novel burst assembly algorithm for OBS network based on Auto-Search Optimal Assembly ThresholdGeng, Shouhao / Li, Guangming / Guo, Zunhua et al. | 2013
- 734
-
The theoretical analysis on a regression model of labor-capital relationWang, Jihong / Guo, Shuzhen et al. | 2013
- 738
-
On the collapse of graphs related to scale-free networksYao, Bing / Wang, Hongyu / Yao, Ming / Chen, Xiang'en / Yang, Chao / Zhang, Xiaomin et al. | 2013
- 744
-
An intelligent resource allocation mechanism in the cloud computing environmentSun, Jiajia / Wang, Xingwei / Huang, Min et al. | 2013
- 751
-
An affinity propagation algorithm base on self-tuning kernel geodesic distanceZhang, Jianpeng / Chen, Fucai / Liu, Lixiong / Niu, Dongdong et al. | 2013
- 757
-
The research of improving SSL handshake performanceZi, Yun / Xu, Ping et al. | 2013
- 761
-
Novel method for the prediction of mobile location based on temporal-spatial behavioral patternsZolotukhin, Mikhail / Ivannikova, Elena / Hamalainen, Timo et al. | 2013
- 767
-
The brittleness evaluation of complex systemZhang, Pei / Feng, Lu et al. | 2013
- 771
-
Different Zhang functions leading to various ZNN models illustrated via solving the time-varying overdetermined system of linear equationsZhang, Yunong / Li, Weibing / Guo, Dongsheng / Mu, Bingguo / Zheng, Huicheng et al. | 2013
- 777
-
An online Chinese-English academic dictionary based on bilingual literature abstractsZheng, Qi / Jiang, Shengyi et al. | 2013
- 780
-
Finite element simulation for the mechanical property of optics cabinZhang, Tianyi et al. | 2013
- 783
-
Convergence analysis of semi-supervised clustering ensembleChen, Dahai / Yang, Yan / Wang, Hongjun / Mahmood, Amjad et al. | 2013
- 789
-
Information security culture assessment: Case studyAl-Mayahi, Ibrahim / Mansoor, Sa'ad P. et al. | 2013
- 793
-
Database replication technology having high consistency requirementsZhou, Ting / Wei, Yu et al. | 2013
- 798
-
Multi-criteria pre-selection in heterogeneous wireless networksZhang, Yuanyuan / Wang, Jian et al. | 2013
- 802
-
Query expansion terms based on positive and negative association rulesLiu, Caihong / Qi, Ruihua / Liu, Qiang et al. | 2013
- 809
-
BAPAWSC: A new dynamic web service composition algorithm in distributed environmentsZhao, Minglei / Zhao, Wendong / Peng, Laixian et al. | 2013
- 815
-
A dynamic trust updating model based on multiple constraints in wireless mesh networksPeng, Sancheng / Yang, Aimin / Zhong, Hui / Feng, Ziyuan et al. | 2013
- 820
-
Query and data distribution strategy of data cube in cloud computationLu, Xiaoyan et al. | 2013
- 824
-
An effective community detection algorithm of the social networksHuang, Yuan / Hou, Wei / Li, Xiaowei / Li, Shaomei et al. | 2013
- 828
-
Design and implementation of digital products vertical search engine based on Android clientHuang, Xixin / Zhou, Lanjiang / Wang, Chaobin et al. | 2013
- 832
-
Multi-document Biased Summarization based on topic-oriented characteristic database of term-pair Co-occurrenceLiu, Nan / He, Yanxiang / Chen, Qiang / Peng, Mn / Fang, Wenqi et al. | 2013
- 838
-
Research on computational model of ammunition consumption for shipborne shrapnelHu, Jiang / Li, Jinjun / Xie, Weihe et al. | 2013
- 841
-
The community detection algorithm based on transferring the similarityNiu, Dongdong / Chen, Hongchang / Liu, Lixiong et al. | 2013
- 846
-
A simple simulation environment for calculating the Video Destruction Level of Internet Certification ServiceWang, Wei / Huang, Hao / Xie, Changsheng et al. | 2013
- 850
-
A high performance inter-chip fiber communication scheme with short frame protocolZhang, Qinhong / Li, Zhaolin / Pei, Songwei et al. | 2013
- 854
-
Adaptive image denoising using wavelet thresholdingDong, Liwen et al. | 2013
- 858
-
Fast detection method of checkerboard corners based on the combination of template matching and Harris OperatorSu, Jiandong / Duan, Xiusheng / Xiao, Jing et al. | 2013
- 862
-
Practical on-line near-duplicate detection for web videoBao, Wei / Ji, Lixin / Liu, Lixiong et al. | 2013
- 867
-
An efficient and secure pairwise key establishment scheme for wireless sensor networksLi, Sujun et al. | 2013
- 870
-
A design of sounding rocket video processing system based on wavelet transform compression algorithmWang, Linlin / Chen, Ping / Jiang, Xiujie / Chen, Zhimin / Liu, Bo et al. | 2013
- 874
-
External attack of a quantum secret sharing schemeShi, Jianhong / Zhang, Shengli / Chang, Zhenggang et al. | 2013
- 878
-
An approach to optimize mashup based on QoS-Skyline and transactional propertiesYang, Wanchun / Zhang, Chenxi / Mu, Bin et al. | 2013
- 883
-
Architecture research of Decision Support System for Tariff and Trade based on the multi-dimensional modeling techniquesYu, Changping et al. | 2013
- 889
-
Cooperative co-evolution with correlation identification grouping for large scale function optimizationSun, Jingjing / Dong, Hongbin et al. | 2013
- 894
-
Satellite multi-group key managementSun, Yanming / Ma, Hengtai et al. | 2013
- 900
-
Research on mobile collaborative working environments for digital media technology educationGao, Feng / Hope, Martin / Fan, Tongrang et al. | 2013
- 904
-
Position prediction based method for detecting the track center of the Smart carHao, Yuexing / Liu, Yu et al. | 2013
- 907
-
Real-time keypoint-based object tracking via online learningGuo, Bo / Liu, Juan et al. | 2013
- 912
-
Design of Video Monitoring System based on FPGALiu, Caihong / Ji, Jinshui / Liu, Zilong et al. | 2013
- 915
-
Technology innovation strategy of photovoltaic enterprise based on game analysisGeng, Hejiang / Zhang, Renjun et al. | 2013
- 919
-
A fault-tolerant scheduling algorithm based on grouping for real-time multiprocessorYu, Xingbiao / Zheng, Changwen / Hu, Xiaohui / Zhao, Junsuo et al. | 2013
- 924
-
Toward active and efficient privacy protection for AndroidLuo, Yuhao / Gu, Dawu / Li, Juanru et al. | 2013
- 930
-
Smoothing LUT classifiers for robust face detectionWen, Jiabao / Xiong, Yueshan et al. | 2013
- 937
-
Bottom-up hierarchical real-time risk assessment for information systemLi, Wan / Tian, Shengfeng et al. | 2013
- 942
-
Traffic incident detection based on HMMXu, Yang et al. | 2013
- 946
-
Genetic algorithm and ant colony algorithm based Energy-Efficient Task SchedulingZhao, Jianfeng / Qiu, Hongze et al. | 2013
- 951
-
Forecasting software damage rate from cognitive bias in software requirements gathering and specification processChotisarn, Noptanit / Prompoon, Nakornthip et al. | 2013
- 957
-
The application of XML-based information interactive model in aircraft manufacturing project managementCheng, Xiang / Zhao, Gang / Chen, Changyu / Wang, Wei et al. | 2013
- 961
-
Hadoop-based service registry for geographical knowledge service cloud: Design and implementationLin, Jianfeng / Wu, Xiaozhu / Chen, Chongcheng / Liu, Yewei et al. | 2013
- 967
-
Examples initialization in Chinese text categorizationCheng, Shi / Shi, Yuhui / Qin, Quande et al. | 2013
- 972
-
Class-wise information gainZhang, Pengtao / Tan, Ying et al. | 2013
- 979
-
A unified distance measure scheme for orientation coding in identificationZheng, Shaoqiu / Tan, Ying et al. | 2013
- 986
-
3D surface reconstruction based on KinectChen, Congmei / Zou, Wei / Wang, Jiajun et al. | 2013
- 991
-
A modified McEliece public key encryption system with a higher security levelZhang, Ke / Tomlinsin, Martin / Ahmed, Mohammed Zaki et al. | 2013
- 997
-
Influence of scattering properties due to complex refractive index of iceWang, Jinhu / Ge, Junxiang / Wei, Ming / Yu, Wenwen et al. | 2013
- 1000
-
Topography influence on rainfall and precipitation distribution of Hunan ProvinceZhou, Shenghui / Wei, Ming / Wang, Hao et al. | 2013
- 1005
-
The wind and temperature information of AMDAR data applying to the analysis of severe weather nowcasting of airportZhou, Yuan / Wei, Ming / Zhoujie Cheng, / Yinghui Ning, / Linlin Qi, et al. | 2013
- 1011
-
Improving availability of AGPS positioning algorithm with fuzzy theoryLi, Jizhong / Liu, Jinmei et al. | 2013
- 1016
-
The adaptive research of data layout in large-scale meteorological data storage systemJiang, Xueying / Chen, Wenhui / Wang, Yao et al. | 2013
- 1021
-
Simulated conformal dome wind tunnel experimentsWei, Qun / Jia, Hongguang et al. | 2013
- 1024
-
The climate characteristics of Jiangsu freezing weatherSun, Yan / Zong, Peishu / Yang, Tingya / Wang, Weili et al. | 2013
- 1029
-
Study on spatial-temporal distribution and tendency variation characteristics of annual precipitation in Jiangxi ProvinceXie, Yiwen / Lin, Kangli / Yang, Shenbang / Lin, Ruiyong et al. | 2013
- 1033
-
Improving the efficiency of BRT lane utilization by allowing taxis driving in during released period based on rail block techniqueMao, Jieyi / Nai, Wei / Dong, Decun / Zheng, Wenyi / Chen, Shuai et al. | 2013
- 1037
-
The design of a high speed and high precision sigma-delta modulatorHan, Shuangwei / Wang, Yuliang et al. | 2013
- 1042
-
Design of speech recognition systemWang, Chao / Zhu, Ruifei / Jia, Hongguang / Wei, Qun / Jiang, Huhai / Zhang, Tianyi / Yu, Linyao et al. | 2013
- 1045
-
A Wireless Sensor Network for monitoring of physical conditionsDiakite, Laye Hadji / Li, Yu et al. | 2013
- 1049
-
Single frequency GNSS integer ambiguity resolution with adaptive genetic algorithmXu, Dingjie / Liu, Mingkai / Zhu, Liye et al. | 2013
- 1052
-
Error concealment for low bit rate video communicationXia, Wei / Yang, Di et al. | 2013
- 1056
-
Video compressive sensing with over-completed dictionaryLi, Tao / Wang, Xiaohua et al. | 2013
- 1061
-
Multipath transmission through cooperative network-coded in IPN Internet based on Linear Block CodesGou, Liang / Bian, Dongming / Zhang, Gengxin et al. | 2013
- 1067
-
An efficient active contour with Gaussian distribution fitting energyWang, Hui / Huang, Tingzhu et al. | 2013
- 1072
-
Symbol timing offset tracking for DRM receiverQin, Guoche / Yan, Ming / Hu, Guorong et al. | 2013
- 1076
-
The bandwidth allocation by queue length (BA-QL) for WiMAX networkChern, HannTzong / Xu, BoHan et al. | 2013
- 1081
-
Vehicle network system communication error detectionLi, Hongmei / Tong, Weiming / Cheng, Shukang et al. | 2013
- 1085
-
The prosodic effect on the temporal realization of segments in ChineseWang, Maolin / Wei Xiong, / Yezi Wu, / Guangling Zi, / Ziyu Xiong, et al. | 2013
- 1089
-
Combined degree distribution: A simple method to design the degree distribution of fountain codesZhang, Meng / Lei, Weijia / Xie, Xianzhong et al. | 2013
- 1093
-
SER performance of opportunistic relaying with direct link using antenna selectionHussain, Ayaz / Bhutto, Zuhaibuddin / Ahmed, Zahoor et al. | 2013
- 1096
-
Polar coding for fading channelIslam, Muhammed Kamrul / RongKe Liu, et al. | 2013
- 1099
-
Fabric defect detection based on Butterworth filtersZhang, Yingying / Han, Runping et al. | 2013
- 1104
-
End-to-end flow inference of encrypted MANETChang, Huijun / Shan, Hong et al. | 2013
- 1110
-
High-precision weighted Bounding Box localization algorithm for Wireless Sensor NetworkShi, Xin / Zhang, Linghua et al. | 2013
- 1114
-
Simulation of coupling studies of EMP to microstrip lines based on MRTD methodFeng, Yanbin / Li, Guolin / Li, Chunrong et al. | 2013
- 1118
-
Research of liquid precursor chemicals recognition based on principal component analysisYu, Daoyang / Liu, Ping / Li, Yanling / Li, Minqiang / Liu, Jinhuai et al. | 2013
- 1121
-
A case study of small and medium-sized enterprises' entrepreneurial models based on independent innovationLo, Andrew et al. | 2013
- 1127
-
The effect of coarticulation in disyllabic sequences in ChineseWang, Maolin / Guangling Zi, / Yisi Liu, / Wei Xiong, / Ziyu Xiong, et al. | 2013
- 1131
-
A multirate cooperative MAC protocol employing statistic channel state informationPi, Xurong / Cai, Yueming / Yang, Wendong et al. | 2013
- 1136
-
Performance analysis for relay selection with secrecy constraints in cooperative networksYanming Sheng, / Chunxiao Cai, / Yueming Cai, / Weiwei Yang, / Wendong Yang, et al. | 2013
- 1140
-
Satellites scheduling based on DMC encoded method and Pareto Front Motivated Particle Swarm Optimization algorithmYuan, Yin / Deng, Yong et al. | 2013
- 1145
-
Kalman filter-based tracking of burst DSSS signalZhou, Xionglin / Liu, Bo / Cheng, Jian / Shi, Shengchao et al. | 2013
- 1149
-
Design of urban intelligent traffic signal control system for large special eventsXie, Yinfen et al. | 2013
- 1152
-
Design of real-time traffic information service system for large special eventsXie, Yinfen et al. | 2013
- 1155
-
Design of variable length code decoder for AVS based on FPGALi, Shenghong / Wang, Zuqiang / Jiang, Xia et al. | 2013
- 1159
-
Separation and reconstruction method for BSS separated source signal blocks in time domainZhao, Wei / Yuehong Shen, / Wang, Jiangong / Hui Li, et al. | 2013
- 1164
-
Regularized fuzzy clustering for fast image segmentationLiu, Guoqi / Zhou, Zhiheng / Xie, Shengli et al. | 2013
- 1168
-
Ultra-wideband planar inverse-F antenna with periodic metal patches ground planeLiu, Haixia / Wang, Fei / Shi, Xiaowei / Li, Long et al. | 2013
- 1171
-
An improved scheme for low complexity of PAPR reduction in OFDM systemLu, Lu / Guo, Daoxing / Yang, Long / Yang, Maoqiang et al. | 2013
- 1175
-
Land-use and land-cover analysis with remote sensing imagesLiu, Jinmei / Li, Jizhong et al. | 2013
- 1178
-
A wide frequency coverage synthesizer with high performance for 3MHz–5GHz transceiverLin Wang, / Yuanwang Yang, / Jiangyue Cai, / Gang Liu, et al. | 2013
- 1182
-
MIM: A new class of hybrid channel error modelHan, Gang / Lu, Jia / Wang, Junhui / Wu, Guofu / Zhu, Yaokai / Dou, Wenhua et al. | 2013
- 1186
-
1 V UWB CG LNA at 3–8 GHz with bulk-bias methodChen, Yenheng / Yang, Jengrern et al. | 2013
- 1190
-
The study to realize effective sharing for education resource based on grid technologyXiong, Shitao / Chen, Changjiang / Huang, Jinhua et al. | 2013
- 1193
-
An efficient network transmission design based on Raptor CodeXue, Yahui / Wang, Feifei / Wang, Jian et al. | 2013
- 1197
-
Qos-Awareness variable neighbor selection for mesh-based P2P live streaming systemWang, Lei / Zhang, Dengyi / Yang, Hongyun et al. | 2013
- 1202
-
Physical layer security for multiuser two-way relay using distributed auction gameWang, An / Cai, Yueming / Guan, Xinrong / Wang, Songqing et al. | 2013
- 1208
-
Evaluating HF antenna communication efficiency based on the influence by irregular terrainZhang, Zhigang / Li, Ting / Luo, Guangsheng / Sun, Jianping et al. | 2013
- 1212
-
Analysis and simulation of HPAs' effects on satellite OFDM systemsCheng, Lei / Tong, Xinhai / Wu, Jiuyin / Kong, Bo et al. | 2013
- 1217
-
Inter-block Differentially Coherent Integration for GPS L5 signal acquisitionLin, Song / Chen, Lingyu et al. | 2013
- 1221
-
An effective data scheduling algorithm for mesh-based P2P live streamingZhang, Dengyi / Wang, Lei / Yang, Hongyun et al. | 2013
- 1225
-
Voice conversion using Bilinear Model integrated with joint GMM-based classificationSun, Xinjian / Zhang, Xiongwei / Yang, Jibin / Cao, Tieyong et al. | 2013
- 1229
-
Linear LLR approximation for LDPC decoding using a Gaussian approximationZhong, Xinyi / Xu, Youyun / Xu, Kui et al. | 2013
- 1232
-
A novel constructing method of wavelength-time OOC based on outer product matrixLi, Xiaobin / Lu, Lizhi et al. | 2013
- 1237
-
Energy-efficient joint resource allocation in two-way OFDM relay systemsQu, Junyue / Cai, Yueming / Yang, Wendong et al. | 2013
- 1242
-
Detection of DS &FH hybrid Spread Spectrum Signal in TT & C communicationMeng, Fanji / Zhang, Lei / Wang, Yuwen et al. | 2013
- 1246
-
Scheduling multipoint-to-point transmissions over HSDPA based Single Frequency NetworkAlfaro, Fabian Montealegre / Hytonen, Vesa / Puchko, Oleksandr / Hamalainen, Timo et al. | 2013
- 1252
-
Research on RS(255,223) code in concatenated decoder systemFang, Lei / Zhang, Yu / Zhu, Jun / Yang, Jianxin et al. | 2013
- 1256
-
Spatial-spectral compressive sensing of hyperspectral imageWang, Zhongliang / Feng, Yan / Jia, Yinbiao et al. | 2013
- 1260
-
Comparison of multiuser MIMO systems with MF, ZF and MMSE receiversJu, Meiyan / Qian, Jia / Li, Yueheng / Tan, Guoping / Li, Xujie et al. | 2013
- 1264
-
One speaker recognition method based on feature fusionWang, Jinming / Xu, Yulong / Xu, Zhijun / Ni, Xue et al. | 2013
- 1268
-
OFDM-based selective decode-and-forward relay systems with ordered subcarrier pairingYang, Wendong / Cai, Yueming / Yang, Weiwei / Tu, Jia et al. | 2013
- 1272
-
Joint relay selection, subcarrier pairing and power allocation for OFDM-based cooperative networksYang, Wendong / Cai, Yueming / Kang, Guoqin et al. | 2013
- 1277
-
Visibility analysis of wind turbines applied to assessment of wind farms' electromagnetic impactWang, Xiaoliang et al. | 2013
- 1281
-
Pavement crack image detection algorithm under nonuniform illuminanceXu, Kun / Wei, Na / Ma, Ronggui et al. | 2013
- 1285
-
Parameters identification and mathematical modeling of MEMS gyroscopeJiang, Huhai / Jia, Hongguang / Wei, Qun et al. | 2013
- 1288
-
Scene-based nonuniformity correction with adaptively adjusting integration timeLi, Jing / Cao, Xiaohe / Bin Zhu, / Guang Yang, et al. | 2013
- 1292
-
Design of improved LDPC encoder for CMMB based on SIMD architectureYin, Hang / Du, Weitao / Zhu, Nanhao et al. | 2013
- 1296
-
Weighted energy detection method for spectrum sensing in cognitive radioChen, Xiaoyang / Xia, Weiwei / Bao, Nan / Shen, Lianfeng et al. | 2013
- 1301
-
A k-means clustering algorithm based on the distribution of SIFTLv, Hui / Huang, Xianglin / Yang, Lifang / Liu, Tao / Wang, Ping et al. | 2013
- 1305
-
Tobacco frost-proof wireless temperature data acquisition system based on ARMHuan, Hai / Qiu, Wei / Li, Jian / Zhang, Sijun et al. | 2013
- 1308
-
A fast convergence digital pre-distortion of APSK modulations based on joint algorithmHu, Jingming / Guo, Daoxing et al. | 2013
- 1312
-
Joint angle-frequency estimation based on WSF using Artificial Bee Colony algorithmZhang, Zhicheng / Lin, Jun / Shi, Yaowu et al. | 2013
- 1316
-
Bayer patterned image compression based on APIDCBT-JPEG and all phase IDCT interpolationXie, Songzhao / Wang, Chengyou / Yang, Zhiqiang et al. | 2013
- 1320
-
Transformation functions for FLOC time delay estimation in alpha-stable noisesTian, Yao / Zhang, Li et al. | 2013
- 1326
-
A novel adaptive filter based on FDLMS and modified MFLMSFeng, Yuan / Zhuo, Zhihai / Liu, Shengheng / Xiaokang Cheng, / Letao Zhang, / Zhipeng Zhang, et al. | 2013
- 1330
-
Outage probability and capacity of the K fading channelsXiao, Kun / Lu, Xiansong et al. | 2013
- 1335
-
Frequency domain equalization for multi-h CPM with a training sequenceZhang, Lin / Kan, Chunrong / Dong, Xiaohua / Wang, Naichao / Huang, Mengmeng et al. | 2013
- 1339
-
A dual operating frequency band periodic half-width microstrip leaky-wave antennaDing, Yi / Li, Yuanxin / Tan, Hongzhou / Long, Yunliang et al. | 2013
- 1343
-
Phototropism based weighted cooperative spectrum sensing technologyZhao, Xiaolong / Zhao, Hangsheng / Cao, Long / Jinyong Xu, et al. | 2013
- 1346
-
An effective method of active deception jamming for countering ISARZheng, Guangyong / Wang, Liandong / Zeng, Yonghu et al. | 2013
- 1350
-
Simplified accurate new method for the calculation of the ground-wave in the exponential atmosphereLi, Shengli / Ma, Hengmin / Wang, Zujian et al. | 2013
- 1355
-
A fast dark channel prior-based depth map approximation method for dehazing single imagesHan, Ting / Wan, Yi et al. | 2013
- 1360
-
Bayesian rigid point set registration using logarithmic double exponential priorWu, Jiajia / Wan, Yi / Su, Zhenming et al. | 2013
- 1365
-
SPIHT coded image transmission over underwater acoustic channel with unequal error protection using HQAMEsmaiel, Hamada / Jiang, Danchi et al. | 2013
- 1372
-
Adaptive pattern nulling design of linear array antenna by phase perturbations using invasive weed optimization algorithmWu, Huaning / Liu, Chao / Dai, Yufeng et al. | 2013
- 1375
-
Optimizing hardware cost of motion estimation module for H.264/AVC based on FPGADu, Gaoming / He, Mingliang / Song, Yukun / Zhang, Duoli et al. | 2013
- 1379
-
A UAV 3-D space dynamic path planning in complex battlefield environmentRen, Jia / Du, Wencai / Du, Feng et al. | 2013
- 1384
-
An enhanced approach to physical-layer network codingJiang, Tianming / Yuanyuan Gao, / Wujiang Fang, / Baofeng Yang, / Yanshan Long, et al. | 2013
- 1389
-
A Time-threshold-based Dynamic Priority Scheme for vertical handoff in cellular/WLAN interworkingCai, Jialin et al. | 2013
- 1393
-
Target tracking and measuring based on binocular visionLi, Bo / Xie, Wei et al. | 2013
- 1397
-
An energy-aware routing for cognitive radio ad hoc networksZhang, Yaoran / Song, Fei / Deng, Zhang / Li, Chao et al. | 2013
- 1402
-
Localization based on active learning for cognitive radio networksWang, Huifeng / Gao, Zhan / Yin, Qiao et al. | 2013
- 1406
-
Optimal power and number of cooperation node in cooperative spectrum sensingZhang, Xian / Yun, Zi et al. | 2013
- 1410
-
An investigation of north-south asynchrony of solar filament activity: Wavelet transform analysesYu, Lan / Deng, Linhua / Feng, Song et al. | 2013
- 1414
-
Wavelet analysis in power decomposition of blasting vibration wave signalXiong, Yanfei / Yu, Jiang / Ma, Yanli / Quan, Pu et al. | 2013
- 1417
-
Dielectric -filled rectangular resonator and its application in millimeter wave equalizerLv, Dalong / Zhou, Dongfang / Song, Cuilian / Zhang, Dewei et al. | 2013
- 1420
-
An early warning system in explosion operations based on Wireless Sensor NetworkHu, Yanjun / Wang, Yao / Zhang, Wentao / Xu, Yaohua / Lele Qiu, / Yingguan Wang, et al. | 2013
- 1426
-
Energy and bandwidth efficient wireless sensor communications for improving the energy efficiency of the air interface for Wireless Sensor NetworksDiakite, Laye Hadji / Yu, Li et al. | 2013
- 1430
-
An improved bit-parallel RS encoding algorithm in CMMB systemLin, Ziliang / Zhang, Peng / Liu, Lei et al. | 2013
- 1434
-
Design of mid-wave infrared solid catadioptric optical systemYu, Linyao / Wei, Qun / Jiang, Huhai / Zhang, Tianyi / Wang, Chao / Zhu, Ruifei et al. | 2013
- 1437
-
Robust adaptive beamforming via sparse covariance matrix estimation and subspace projectionSun, Lei / Wang, Huali / Wu, Yanjun / Xu, Guangjie et al. | 2013
- 1442
-
Research of strong interference cancellation techniques in satellite communication systemsYang, Heng / Dang, Junhong / Pan, Yahan / Tong, Jun / Liu, Xin et al. | 2013
- 1447
-
A clustering protocol based on Virtual Area Partition Using Double Cluster Heads scheme for wireless sensor networksMa, Dexin / Ma, Jian / Xu, Pengmin et al. | 2013
- 1451
-
An efficient LDPC encoder based on block-row-cycle structure for CMMBLiu, Lei / Zhang, Peng / Lin, Ziliang et al. | 2013
- 1455
-
Delay performance evaluation for supporting heterogeneous traffic in cognitive radio sensor networksLi, Laikang / Li, Ning / Xie, Wei / Xu, Youyun et al. | 2013
- 1460
-
Single-channel blind separation of MPSK and LFM interference using genetic particle filteringLu, Wei / Zhang, Bangning / Lu, Xiping et al. | 2013
- 1465
-
Performance analysis and optimization of dual-hop MIMO relay system with MIMO-MRC scheme in the presence of co-channel interferenceXu, Xiaoming / Yang, Weiwei / Cai, Yueming et al. | 2013
- 1471
-
Performance analysis of SNR-based hybrid incremental/selection Decode-and-Forward relaying in cooperative networksLi, Guoxin / Chen, Jin / Ren, Chengmeng et al. | 2013
- 1476
-
Performance analysis and hardware design of digital transmitter system base on ZIFJiang, Lanxiang / Yang, Fei et al. | 2013
- 1480
-
Outage probability of multi-source multi-relay wireless networks with co-channel interferenceZhang, Tao / Cai, Yueming / Yang, Weiwei / Wang, Lei et al. | 2013
- 1485
-
Wireless quantum communication networks with mesh structureCao, Yang / Yu, Xutao / Cai, Youxun et al. | 2013
- 1490
-
A modified bistatic point target reference spectrum for bistatic highly squint SAR processingRan, Jinhe / Cao, Lei / Jiang, Hairong / Zhang, Jianyun et al. | 2013
- 1494
-
Design of a wind energy harvesting wireless sensor nodeWu, Yin / Liu, Wenbo / Zhu, Yongjun et al. | 2013
- 1498
-
The clutter suppression based on FA and image contrast in TWI applicationZhang, Lanzi / Lu, Biying / Zhou, Zhimin / Sun, Xin et al. | 2013
- 1503
-
Three-dimensional imaging for UWB though-the-wall radarZhao, Yang / Lu, Biying / Sun, Xin et al. | 2013
- 1507
-
Performance analysis for heterogeneous cellular networks based on Matern-like point process modelRen, Chengmeng / Zhang, Jianfeng / Wei Xie, / Dongmei Zhang, et al. | 2013
- 1512
-
Adaptive key generation based on quantization of channel characteristicsDai, Qiao / Liang, Jin / Huang, Kaizhi et al. | 2013
- 1518
-
Improved strategy of time-frequency opportunistic spectral usage for multi-rate wireless systemsWang, Yubo / Wang, Chenggui / Li, Chao / Wu, Ducheng et al. | 2013
- 1522
-
An improved wideband digital baseband conversion methodJiang, Kun / Wang, Yuanqin / Lian, Xin / Ma, Hong et al. | 2013
- 1526
-
Dual-antenna based blind hostile jamming suppression and multi-user detection scheme for ds-cdma systems with unknown hostile jammingZhang, Jiang / Zhang, Hang et al. | 2013
- 1531
-
Video de-noising and parallel implementation for full HD video conferencingWang, Yunlong / Zhang, Xuan / Yang, Jiahai et al. | 2013
- 1535
-
A novel key derivation method for eavesdropper in LTE systemPeng, Jianhua / Zhang, Wenjian / Huang, Kaizhi et al. | 2013
- 1540
-
Physical-layer security based on joint scrambling with spatial and frequency resourceLi, Mingliang / Huang, Kaizhi / Zhong, Zhou et al. | 2013
- 1545
-
A soft fast estimation method of PN sequence based on weighting Walsh Hadamard TransformHuang, Kaizhi / Chen, Song / Yang, Meiyue et al. | 2013
- 1551
-
A polynomial estimation algorithm for PN sequence based on reliability accumulationYang, Meiyue / Huang, Kaizhi / Luo, Wenyu et al. | 2013
- 1557
-
A cooperative jamming based security algorithm for multi-user MIMO systemsSong, Huawei / Yang, Meiyue / Xu, Xiangyang / Luo, Wenyu et al. | 2013
- 1561
-
A partial CSI based Affinity propagation Dynamic clustering algorithmRan, Xiaomin / Tong, Min / Mo, Youquan et al. | 2013
- 1567
-
Data-aided frequency recovery for SOQPSK signals based on the PAM representationWang, Yonggang / Liu, Aijun / Zhao, Kun / Wang, Heng / Zhang, Yingxian et al. | 2013
- 1571
-
Eavesdropping against artificial noise: Hyperplane clusteringLiu, Lu / Liang, Jin / Huang, Kaizhi et al. | 2013
- 1576
-
Research on service scheme in IP multimedia subsystem networkWang, Yafang / Zheng, Xiaozhe / Guan, Lifang et al. | 2013
- 1580
-
Simulation of CSS communication system in VLF atmospheric noiseWu, Yanjun / Wang, Huali / Sun, Lei / Xu, Guangjie et al. | 2013
- 1584
-
A multicarrier-based physical layer security scheme for the multicast systemsLin, Tong / Huang, Kai-Zhi / Luo, Wen-Yu et al. | 2013
- 1588
-
Multi-object tracking based on improved Mean ShiftGao, Meifeng / Liu, Di et al. | 2013
- 1593
-
Moving detection technology for vehicle speed based on pseudorandom code phase modulationLi, Guangming / Huang, Lianhua et al. | 2013
- 1596
-
Image transmission over underwater acoustic environment using OFDM technique with HQAM mapperEsmaiel, Hamada / Jiang, Danchi et al. | 2013
- 1602
-
Design and implementation of voice signal processing system based on DSP and FPGAZhang, Wei / Wu, Diancheng / Xue, Zhiyuan / Zhang, Tiejun / Wang, Donghui / Hou, Chaohuan et al. | 2013
- 1606
-
Enhancing wireless security with theory of ill-posed problem: A novel physical-layer encryption mechanismXu, Xiangyang / Luo, Wenyu / Song, Huawei / Zhang, Lizhi et al. | 2013
- 1610
-
Performance enhanced GFSK demodulator using phase-domain ADC for zero-IF receiversLiu, Jinjia / Yu, Fengqi et al. | 2013
- 1614
-
A second-order spatial hopping transmission scheme for physical layer securityJi, XinSheng / Kang, XiaoLei / Huang, KaiZhi / KeMing Ma, et al. | 2013
- 1620
-
Analysis on carrier delay ambiguity resolving in Connected Elements InterferometryLu, Weitao / Yang, Wenge / Hong, Jiacai et al. | 2013
- 1625
-
An image fusion algorithm based on shearletWang, Hongzhi / Liu, Yan / Xu, Shupeng et al. | 2013
- 1629
-
Vector quantization image coding based on biorthogonal wavelet transform and improved SOFMXie, Songzhao / Wang, Chengyou / Cui, Chao et al. | 2013
- 1633
-
SVD-based method for DOA estimation in the presence of mutual couplingQu, Yi / Zhang, Jian et al. | 2013
- 1637
-
Research of image segmentation algorithm applied to concrete bridge cracksXu, Hongke / Tian, Yuan / Lin, Shan / Wang, Shichao et al. | 2013
- 1641
-
Analysis on reliability of acoustic features for material recognition of damped impacted platesZhang, Bingrui / Chen, Kean / Liang, Yong et al. | 2013
- 1645
-
Wideband beamforming with broad nulls of nested arrayLuo, Jun / Huang, Longyang et al. | 2013